Computer Awareness Quiz (21 Mar - 28 Mar)

Saturday, March 20, 2010

Computer Awareness (21 Mar-28 Mar)


1. _________ is the process of finding errors in software code.
(A) Debugging
(B) Compiling
(C) Testing
(D) Running
(E) None of these


ANS (A)


2. ____________ are viruses that are triggered by the passage of time or on a certain date.
(A) Boot-sector viruses
(B) Macro viruses
(C) Time bombs
(D) Worms
(E) None of these


Ans (C)


3. Linux is a (n) ____________ operating system.
(A) open-source
(B) Microsoft
(C) Windows
(D) Mac
(E) None of these


ANS (A)


4. What is a backup?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
(E) None of these


ANS (D)


5. Which of the following places the common data elements in order from smallest to largest
(A) character, file, record, field, database
(B) character, record, field, database, file
(C) character, field, record, file, database
(D) Bit, byte, character, record, field, file, database,
(E) None of these


ANS (C)


6. The internet is ......
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) All of these
(E) None of these


ANS (D)


7. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
(E) None of these


ANS (C)


8. Which of the following statements is FALSE concerning file names?
(A) Files may share the same name or the same extension but not both
(B) Every file in the same folder must have a unique name
(C) File extension is another name for file type
(D) The file extension comes before the dot (.) followed by the file name
(E) None of these


ANS (D)


9. Verification of a login name and password is known as:
(A) configuration
(B) accessibility
(C) authentication
(D) logging in
(E) None of these


ANS (C)


10. Which of the following would most likely NOT be a symptom of a virus?
(A) Existing program files and icons disappear.
(B) The CD-ROM stops functioning.
(C) The Web browser opens to an unusual home page.
(D) Odd messages or images are displayed on the screen.
(E) None of these


ANS (B)




11. A ____ is a pointing device.
A monitor
B mouse
C keyboard
D none of the above


Ans (B)




12. URL stands for ........
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
(E) None of these


ANS (C)


13 A database management system
(DBMS) is a ............
(A) hardware system used to create , maintain and provide controlled access to a database
(B) hardware system used to create, maintain, and provide uncontrolled access to a database.
(C) software system used to create, maintain, and provide uncontrolled access to a database.
(D) software system used to create, maintain, and provide controlled access to a database.
(E) None of these


ANS (D)


14. When data changes in multiple lists and all lists are not updated, this causes:
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
(E) None of these


ANS (D)


15. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these


ANS (B)

For HOT Govt. Jobs Submit your resume!!


Sarkari Naukri, Indian Government Jobs, PSU Jobs, Bank Jobs

0 comments:

Post a Comment

 
 
 
 
Discalimer:AllGovtNaukri.Com-- There may be some error in reporting of some of the job postings, Readers are requested to confirm the information from the original source.
Adsense Policy-This post confirms my ownership of the site and that this site adheres to Google AdSense program policies and Terms and Conditions.