header1.html

Wednesday 27 February 2013

Computer Awareness for government jobs-part5..


1.Virtual Memory is ____________.
A.Extremely Large Main memory
B. Extremely large second memory
C.An illusion of extremely large secondary memory
D.An illusion of extremely large main memory
Click for answer 

D.An illusion of extremely large main memory
2.The process of modifying data so that an unauthorized user cannot read it is called __________.
A.Hashing
B. Decryption
C.Encryption
D.Sorting
Click for answer 

C.Encryption
3.Which of the following statements is INCORRECT?
A.Each website has an address called its URL
B.Conversion of analog signals into digital signals is called modulation.
C.A webserver is a collection of websites
D.None of these
Click for answer 

B.Conversion of analog signals into digital signals is called modulation.
4.What is an extranet?
A.An extra fast computer network
B. An extra network usedby an organization for higher reliability
C.The intranet of two cooperating organisations interconnected via a secure leased line
D.An extra connection provided to co operating organization.
Click for answer 

C.The intranet of two cooperating organisations interconnected via a secure leased line
5.Who defined the binary system?
A.Pascal
B.Newton
C.Aristotle
D.A.N.D. Leibniz
Click for answer 

D.A.N.D. Leibniz
6.What is the addition of 101010 with 111111?
A.1100001
B. 1101001
C.1001001
D.1111001
Click for answer 

B. 1101001
7.The first Indian analog computer was assembled by Indian Statistical Institute (ISI) of Calcutta in
A.1950.
B.1953
C.1963.
D.1946.
Click for answer 

A.1950
8. which of the following high level language is NOT suitable for generating or developing a datafile?
A.FORTRAN.
B.BASIC.
C.COBOL.
D.PASCAL.
Click for answer 

A.FORTRAN.

Computer Awareness for government jobs-part4..


1.The _____ manual tells you how to use a software program.
A.documentation
B.user
C.programming
D.technical
Click for answer 

B.user
2.Which of the following is NOT a type of broadband Internet connection?
A.Cable
B.DSL
C.Satellite
D.Dial-up
Click for answer 

C.Satellite
3.Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
A.spyware
B.malware
C.spam
D.adware
Click for answer 

B.malware
4.Making a field ______ means that it cannot be left blank.
A.numeric
B.calculated
C. validated
D.required
Click for answer 

D.required
5.____________ are viruses that are triggered by the passage of time or on a certain date.
A.Boot-sector viruses
B.Macro viruses
C.Time bombs
D.Worms
Click for answer 

D.Worms
6.What is a backup?
A.Restoring the information backup.
B.An exact copy of a system’s information.
C.The ability to get a system up and running in the event of a system crash or failure
D.All of these
Click for answer 

D.All of these.
7.Which of the following places the common data elements in order from smallest to largest
A.character, file, record, field, database
B.character, record, field, database, file
C.Bit, byte, character, record, field, file, database,
D.character, field, record, file, database
Click for answer 

D.character, field, record, file, database
8.The internet is ……
A.a large network of networks
B.an internal communication system for a business
C.a communication system for the Indian government
D.All of these
Click for answer 

D.All of these

Computer Awareness for government jobs-part3..


1.Programs from the same developer , sold bundled together , that provide better integration and share common features , toolbars and menus are known as ….
A.integrated software packages
B.software suites
C.software processing packages
D.personal information managers
Click for answer 

B.software suites
2.A data warehouse is which of the following?
A.Can be updated by the end users
B.Contains numerous naming conventions and formats
C.Organized around important subject areas
D.Contains only current data
Click for answer 

C.Organized around important subject areas
3.______________ servers store and manages files for network users.
A.Authentication
B.File
C.Main
D.Web
Click for answer 

B.File
4.All of the following are examples of real security and privacy risks Except _____
A.hackers
B. viruses
C.identify theft
D.spam
Click for answer 

D.spam
5.___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems .
A.Data
B.Query
C.(Point-of-sale (POS)
D.Sales
Click for answer 

D.Sales
6.System software is the set of programs that enables your computer’s hardware devices and ______ software to work together.
A.management.
B.application.
C.utility
D.processing
Click for answer 

B.application.
7.________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.
A.Servers.
B.Robotic computers
C.Mainframes
D.Embedded computers.
Click for answer 

D.Embedded computers.
8.The following are all computing devices , except………
A.notebook computers
B.cellular telephones.
C.personal digital assistants
D.digital scanners.
Click for answer 

D.digital scanners