Hello and welcome to exampundit. Here is a set of Computer Knowledge Quiz for NICL AO Mains 2017.
Advertisement
(adsbygoogle = window.adsbygoogle || []).push({});
1. Which of the following statements is true about Bluetooth?
A. Bluetooth is a proprietary open-wireless-technology standard for exchanging data over short distances
B. Bluetooth uses a radio technology called frequency-hopping spread spectrum.
C. A PC that does not have embedded Bluetooth can be used with a Bluetooth adapter that will enable the PC to communicate with other Bluetooth devices.
1) Only A
2) Only B
3) Both A and C
4) Both B and D
5) All A, B and C
2. Short keys for FIND in MS Office Word 2003 are
1) Ctrl + B
2) Alt + Ctrl + A
3) Alt + Y
4) Ctrl + F
5) None of these
3. _____ is an electronic spreadsheet. You can use it to organise your data into rows and columns. You can also use it to perform mathematical calculations quickly.
1) Microsoft Excel
2) Microsoft Word
3) Microsoft PowerPoint
4) Microsoft Calculator
5) None of these
4. A hard drive consists of spinning ____ made up of aluminum or ceramic that is coated with magnetic media.
1) plates
2) disks
3) relays
4) memories
5) platters
5. The power supply supplies power to every single part in the PC. The power supply is to convert the 230 VAC into 3. 3 V, 5 V and 12 VDC power that the system requires for the operations. It is commonly known as
1) Simple mode power supply
2) Switch mode power supply
3) Uninterrupted power supply
4) Invertor
5) Convertor
6. Which of the following statements is NOT true about a computer?
1) 8085 is an example of 8-bit microprocessor.
2) Software is used to make computer usable.
3) Based on the microprocessor, systems are classified as PC-XT and PC-AT.
4) SMPS converts AC (Alternate Current) into DC (Direct Current) .
5) None of these
7. The Intel 8085 is a/an _____ microprocessor introduced by Intel in the year _____.
1) 16-bit, 1976
2) 16-bit, 1977
3) 8-bit, 1978
4) 8-bit, 1977
5) 8-bit, 1967
8. Which of the following is NOT a goal of transaction processing system?
1) Capture, process and store transactions
2) Produce a variety of documents related to routine business activities
3) Reduce manual effort associated with processing business transactions
4) Produce standard reports used for management decision making
5) None of these
9. Which of the following is not an example of a virus?
1) Polymorphic
2) Logic Bombs
3) Worms
4) Tartan
5) Trojan
10. Timing and Control unit is a part of a(an)
1) ALU
2) Processor
3) Memory
4) CMOS
5) BIOS
11. The most frequently used instructions of a computer program are likely to be fetched from
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these
12. ____ are viruses that are triggered off by the passage of time or on a certain date.
1) Boot-sector viruses
2) Macro viruses
3) Time bombs
4) Worms
5) None of these
13. Which of the following places the common data elements in order from smallest to largest?
1) character, file, record, field, database
2) character, record, field, database, file
3) character, field, record, file, database
4) bit, byte, character, field, record, file, database,
5) None of these
14. The Internet is
1) a large network of networks
2) an internal communication system for a business
3) a communication system for the Indian government
4) All the above
5) None of these
15. Verification of a login name and password is known as
1) configuration
2) accessibility
3) authentication
4) logging in
5) None of these
16. Which of the following would most likely NOT be a symptom of a virus?
1) Existing program files and icons disappear.
2) The CD-ROM stops functioning.
3) The Web browser opens to an unusual home page.
4) Odd messages or images are displayed on the screen.
5) None of these
17. The PC and the Apple Macintosh are examples of two different
1) platforms
2) applications
3) programs
4) storage devices
5) None of these
18. The metal or plastic case that holds all the physical parts of the computer is the
1) system unit
2) CPU
3) mainframe
4) platform
5) None of these
19. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called
1) robotics
2) simulation
3) computer forensics
4) animation
5) None of these
20. ______ server stores and manages files for network users.
1) Authentication
2) Main
3) Web
4) File
5) None of these
ep
Recommended Test Series
Sponsored
(adsbygoogle = window.adsbygoogle || []).push({});
Regards
Team ExamPundit
This post was last modified on November 27, 2017 8:52 am