Computer Aptitude Ebook
Computer Aptitude Ebook
Computer Aptitude Ebook
Computer
Aptitude
ebook free
download
www.careerafter.com
Careerafter.com
Careerafter.com
FUNDAMENTALS OF COMPUTERS
1. The term Computer is derived from..........
a. Latin b. German c. French d. Arabic
2. Who is the inventor of Difference Engine?
a. Allen Turing b. Charles Babbage c. Simur Cray d. Augusta Adaming
3. Who is the father of Computer?
a. Allen Turing b. Charles Babbage c. Simur Cray d. Augusta Adaming
4. Who is the father of Computer science?
a. Allen Turing b. Charles Babbage c. Simur Cray d. Augusta Adaming
5. Who is the father of personal computer?
a. Edward Robert b. Allen Turing c. Charles Babbage d. None of these
6. A CPU contains
a. a card reader and a printing device b. an analytical engine and a control unit
c. a control unit and an arithmetic logic unit d. an arithmetic logic unit and a card reader
7. Which of the following controls the process of interaction between the user and the
operating
system?
a. User interface b. Language translator
c. Platform d. Screen saver
8. The first computers were programmed using
a. assembly language b. machine language
c. source code d. object code
School of Distance Education
9. ..........is a combination of hardware and software that facilitates the sharing of information
between computing devices.
a. network b. peripheral c. expansion board d. digital device
10. Coded entries which are used to gain access to a computer system are called
a. Entry codes b. Passwords c. Security commands d. Code words
11. Which of the following statements is true ?
a. Minicomputer works faster than Microcomputer
b. Microcomputer works faster than Minicomputer
c. Speed of both the computers is the same
Careerafter.com
d. The speeds of both these computers cannot be compared with the speed of advanced
12. You organize files by storing them in
a. archives b. folders c. indexes d. lists
13. What type of resource is most likely to be a shared common resource in a computer
Network?
a. Printers b. Speakers c. Floppy disk drives d. Keyboards
14. Which device is required for the Internet connection?
a. Joystick b. Modem c. CD Drive d. NIC Card
15. What is a light pen?
a. A Mechanical Input device b. Optical input device
c. Electronic input device d. Optical output device
16. UNIVAC is
a. Universal Automatic Computer b. Universal Array Computer
c. Unique Automatic Computer d. Unvalued Automatic Computer
17. CD-ROM stands for
a. Compactable Read Only Memory b. Compact Data Read Only Memory
c. Compactable Disk Read Only Memory d. Compact Disk Read Only Memory
18. ALU is
a. Arithmetic Logic Unit b. Array Logic Unit
c. Application Logic Unit d. None of above
19. VGA is
a. Video Graphics Array b. Visual Graphics Array
c. Volatile Graphics Array d. Video Graphics Adapter
20. IBM 1401 is
a. First Generation Computer b. Second Generation Computer
c. Third Generation Computer d . Fourth Generation Computer
School of Distance Education
Fundamentals of Computers Page 3
21. MSI stands for
a. Medium Scale Integrated Circuits b. Medium System Integrated Circuits
c. Medium Scale Intelligent Circuit d. Medium System Intelligent Circuit
22. The capacity of 3.5 inch floppy disk is
Careerafter.com
Careerafter.com
Careerafter.com
Careerafter.com
Careerafter.com
61. Which of the following devices can be sued to directly image printed text?
a. OCR b. OMR
c. MICR d. All of above
62. The output quality of a printer is measured by
a. Dot per inch b. Dot per sq. inch
c. Dots printed per unit time d. All of above
63. In analogue computer
a. Input is first converted to digital form b. Input is never converted to digital form
c. Output is displayed in digital form d. All of above
64. In latest generation computers, the instructions are executed
a. Parallel only b. Sequentially only
c. Both sequentially and parallel d. All of above
65. Who designed the first electronics computer ENIAC?
a. Van-Neumann b. Joseph M. Jacquard
School of Distance Education
Fundamentals of Computers Page 7
c. J. Presper Eckert and John W Mauchly d. All of above
66. Who invented the high level language C?
a. Dennis M. Ritchie b. Niklaus Writh
c. Seymour Papert d. Donald Kunth
67. Personnel who design, program, operate and maintain computer equipment refers to
a. Console-operator b. Programmer
c. Peopleware d. System Analyst
68. When did arch rivals IBM and Apple Computers Inc. decide to join hands?
a. 1978 b. 1984
c. 1990 d. 1991
69. Human beings are referred to as Homosapinens, which device is called Sillico Sapiens?
a. Monitor b. Hardware
c. Robot d. Computer
70. An error in software or hardware is called a bug. What is the alternative computer jargon
for
it?
Careerafter.com
a. Leech b. Squid
c. Slug d. Glitch
71. Modern Computer are very reliable but they are not
a. Fast b. Powerful
c. Infallible d. Cheap
72. What is the name of the display feature that highlights are of the screen which requires
operator attention?
a. Pixel b. Reverse video
c. Touch screen d. Cursor
73. Personal computers use a number of chips mounted on a main circuit board. What is the
common name for such boards?
a. Daughter board b. Motherboard
c. Father board d.Breadboard
74. In most IBM PCs, the CPU, the device drives, memory expansion slots and active
Components are mounted on a single board. What is the name of this board?
a. Motherboard b. Breadboard
c. Daughter board d. Grandmother board
75. What is meant by a dedicated computer?
a. Which is used by one person only b. Which is assigned one and only one task
c. Which uses one kind of software d. Which is meant for application software
School of Distance Education
Fundamentals of Computers Page 8
76. The system unit of a personal computer typically contains all of the following except:
a. Microprocessor b. Disk controller c. Serial interface d. Modem
77. A computer program that converts an entire program into machine language is called a/an
a. Interpreter b. Simulator c. Compiler d. Commander
78. A computer program that translates one program instructions at a time into machine
language
is called a/an
a. Interpreter b. CPU c. Compiler d. Simulator
79. A small or intelligent device is so called because it contains within it a
Careerafter.com
Careerafter.com
Careerafter.com
110. To move a copy of file from one computer to another over a communication channel is
called?
a. File transfer b. File encryption
c. File modification d. File copying
111. The primary function of the ............ is to set up the hardware and load and start an
operating system
a. System Programs b. BIOS
c. CP d. Memory
112. What kind of memory is both static and non -volatile?
a. RAM b. ROM c. BIOS d. CACHE
113. .......... is computer software designed to operate the computer hardware and to provide
platform for running application software
Careerafter.com
Careerafter.com
Careerafter.com
Careerafter.com
Careerafter.com
154. . The process of transferring files from a computer on the Internet to your computer is
called
a. Downloading b. uploading
c. FTP d. JPEG
155. . .......... is the process of dividing the disk into tracks and sectors.
a. Tracking b. Formatting
c. Crashing d. Allotting
156. . Help Menu is available at which button?
a. End b. Start
c. Turnoff d. Restart
157. The technology that stores only the essential instructions on a microprocessor chip and
thus enhances its speed is referred to as
a. CISC b. RISC
c. CD-ROM d. Wi-Fi
158. Which is not a basic function of a computer?
a. Store data b. Accept input
c. Process data d. Copy text
159. ASCII is a coding system that provides
a. 256 different characters b. 512 different characters
c. 1024 different characters d. 128 different characters
160. Which part of the computer is directly involved in executing the instructions of the
computer program?
a. The scanner b. The main storage
c. The secondary storage d. The processor
161. When a computer is switched on, the booting process performs
a. Integrity Test b. Power-On Self-Test
c. Correct Functioning Test d. Reliability Test
162. A computer system that is old and perhaps not satisfactory is referred to as a(n)
a. Ancient system b. Historical system
c. Age old system d. Legacy system
163. Which of the following is not a binary number?
a. 001 b. 101 c. 202 d. 110
Careerafter.com
Careerafter.com
c. Spoofing. d. Hacking.
School of Distance Education
Fundamentals of Computers Page 16
175. Collecting personal information and effectively posing as another individual is known
as the crime of:
a. Spooling. b. Identity theft.
c. Spoofing. d. Hacking. 176. Malicious software is known as:
a. Badware. b. Malware. c. Maliciousware. d. Illegalware. 177. A program that performs a
useful
task while simultaneously allowing destructive acts is
a:
a. Worm. b. Trojan horse.
c. Virus. d. Macro virus.
178. An intentionally disruptive program that spreads from program to program or from disk
to disk is known as a:
a. Trojan horse. b. Virus. c. Time bomb. d. Time-related bomb sequence.
179. In 1999, the Melissa virus was a widely publicised:
a. E-mail virus. b. Macro virus.
c. Trojan horse. d. Time bomb.
180. What type of virus uses computer hosts to reproduce itself?
a. Time bomb b. Worm
c. Melissa virus d. Macro virus
181. The thing that eventually terminates a worm virus is a lack of:
a. Memory or disk space. b. Time. c. CD drives space. d. CD-RW.
182. When a logic bomb is activated by a time-related event, it is known as a:
a. Time-related bomb sequence. b. Virus. c. Time bomb. d. Trojan horse.
183. A logic bomb that was created to erupt on Michelangelos birthday is an
example of a:
a. Time-related bomb sequence. b. Virus. c. Time bomb. d. Trojan horse.
184. What is the name of an application program that gathers user information and sends it
to someone through the Internet?
a. A virus b. Spybot
Careerafter.com
Careerafter.com
Careerafter.com
a. Inkjet b. Laser
c. Thermal d. Dot matrix
207. ......... are used for plotting graphs and design on papers
a. Trackball b. Joystick
c. Light pen d. Plotters
208. Daisy wheel, Drum, chain etc are the ............. a. Flow chart b. Mouse
School of Distance Education
Fundamentals of Computers Page 19
c. Key board d. Printers
209. ....are specific to users needs
a. System software b. Application software
c. Assemblers d. Compilers
210. Joshy, Perfumes are examples of.............
a. Operating system b. Computer languages
c. Computer viruses d. Web portals
211. Which of the following is/ are operating systems
a. Windows b. Unix
c. OS/2 d. All of these
212. MAN stands for
a. Maximum Area Network b. Minimum Area Network
c. Main Area Network d. Metropolitan Area Network
213. Which of the following is a network topology
a. LAN b. WAN
c. MAN d. BUS
214. Which of the following is a type of network
a. Ring b. Bus c. Star d. PAN
215. VOIP stands for..........
a. Voice over IP b. Video over IP
c. Viruses over IP d. Virtual over IP
216. The first web browser is
a. Mosaic b. Netscape
c. Internet explorer d. Collabra
Careerafter.com
ANSWER KEY
1 a 55 b 109 d 163 c 217 c
Careerafter.com
Careerafter.com
34 d 88 b 142 c 196 c
35 a 89 c 143 a 197 c
36 b 90 b 144 c 198 a
37 b 91 c 145 a 199 d
38 d 92 a 146 d 200 b
39 a 93 d 147 c 201 c
40 b 94 a 148 d 202 b
41 b 95 a 149 b 203 c
42 c 96 a 150 d 204 d
43 d 97 c 151 a 205 a
44 c 98 a 152 c 206 b
45 b 99 a 153 b 207 d
46 b 100 a 154 a 208 d
47 d 101 b 155 b 209 b
48 b 102 c 156 b 210 c
49 c 103 c 157 b 211 d
50 d 104 d 158 d 212 d
51 b 105 c 159 c 213 d
52 a 106 d 160 d 214 d
53 c 107 a 161 b 215 a
54 a 108 c 162 d 216 a
1. Which function calculates the largest value in a set of numbers?
(1) Average
(2)Count
(3)Minimum
(4)Maximum
(5)None of these
Ans: (4)
2. What do you use to create a chart?
(1)Pie Wizard
(2)Excel Wizard
(3)Data Wizard
Careerafter.com
(4)Chart Wizard
(5)None of these
Ans: (4)
3. What displays the content of the active cell?
(1)Name box
(2)Row Headings
(3)Formula bar
(4)Task pane
(5)None of these
Ans: (3)
4. By default, your documents print in _mode.
(1)Landscape
(2)Portrait
(3)Page Setup
(4)Print View
(5)None of these
Ans: (2)
5. What is the best way to have a data and the slide number appear on every slide ?
(1) choose Tools, Header and Footer, click Slide tab, select the desired options, click Apply
to
All
(2) choose Insert, Header and Footer, click Slide tab, select the desired options, click Apply
to
All
(3) chouse View, Header and Footer, click Slide tab, select the desired options, click Apply to
All
(4) choose File, Header and Footer, click Slide tab, select the desired options, click Apply to
All
(5) None of these
Ans: (2)
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 3
Careerafter.com
Careerafter.com
Careerafter.com
Careerafter.com
Careerafter.com
Careerafter.com
Ans: (C)
4. What type of resource is most likely to be a shared common resource in a computer
network?
(A) Printers
(B) Speakers
(C) Floppy disk drives
(D) Keyboards
(E) None of these
Ans: (A)
5. Directory in directory is called(A) Mini directory
(B) Junior directory
(C) Part directory
(D) Sub-directory
(E) None of these
Ans: (D)
6. Such a pre-made document, which has coordinating font, layout and background, is(A) Guide
(B) Model
(C) Ruler
(D) Template
(E) None of these Ans: (D)
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 8
7. In order to create columnar data in Word you need to(A) Tab consecutively until your cursor reaches the desired place
(B) Set tabs or use the Table menu
(C) You need to use Excel
(D) Press the space bar until your cursor reaches the desired place
(E) None of these
Ans: (E)
8. Saving is a process-
Careerafter.com
Careerafter.com
Careerafter.com
Careerafter.com
Careerafter.com
Careerafter.com
Careerafter.com
e. None of these
5. The father of Modern Computer is
a. Charles Babbage
b. Von-nuumann
c. Danies Ritchel
d. Blaise Pascal
e. None of these
6. The Word FTP stands for
a. File Translate Protocol
b. File Transit Protocol
c. File Transfer protocol
d. file typing protocol
e. None of these
7. The lowest form of Computer language is called
a. BASIC
b. FORTRAN
c. Machine Language
d. COBOL
e. None of these
8. Best Quality graphics is produced by
a. Dot Matix
b. Laser Printer
c. Inkjet Printer
d. Plotter
e. None of these
9. Memory which forgets everything when you switch off the power is known as
a. Corrupted
b. Volatile
c. Non-Volatile
d. Non-Corrupted
e.None of these
10.The linking of computers with a communication system is called
Careerafter.com
a. Networking
b. Pairing
c. Interlocking
d. Assembling
e. Sharing
11.The 16 bit Microprocessor means that it has
a. 16 address lines
b. 16 Buses
c. 16 Data lines
d. 16 routes
e. None of these
12. Data going into the computer is called
a. Output
b. algorithm
c. Input
d. Calculations
e. flow chart
13. Which of the following refers to a small, single-site network?
a. LAN
b. DSL
c. RAM
d. USB
e. CPU
14. Microsoft Office is
a. Shareware
b.Public domain software
c. Open-sourse software
d. A vertical market application
e. An application suite
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 23
15. How many options does a BINARY choice offer
Careerafter.com
a. None of these
b. One
c. Two
d. it depends on the amount of memory on the computer
e. It depends on the speed of the computers processor
16. A collection of program that controls how your computer system runs and
processes information is called
a. Operating System
b. Computer
c. Office
d. Compiler
e. Interpreter
17. Computer connected to a LAN (Local Area Network) can
a. run faster
b. go on line
c. share information and /or share peripheral equipment
d. E-mail
e. None of these
18. Information travels between components on the mother board through
a. Flash memory
b. CMOS
c. Bays
d. Buses
e. Peripherals
19. How are data organized in a spreadsheet?
a. Lines & spaces
b. Layers & Planes
c. Height & Width
d. Rows & Columns
e. None
20. The blinking symbol on the computer screen is called the
a. mouse
Careerafter.com
b. logo
c. hand
d. palm
e. cursor
21. A fault in a computer program which prevents it from working correctly is
known as
a.B oot
b Bug
c Biff
d. Strap e. None of these
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 24
22. A self replicating program, similar to a virus which was taken from a 1970s
science fiction novel by John Bruner entitled the Shockwave Rider is
a. Bug
b. Vice
c. Lice
d. Worm
e. None of these
23. A states. is a bi-stable electronic circuit that has
a. Multivibrator
b. Flip-flop
c. Logic gates
d. laten
e. None of these
24. Unwanted repetitious messages, such as unsolicited bulk e-mail is known
as
a. Spam
b. Trash
c. Calibri
d. Courier
e. None of these
Careerafter.com
Careerafter.com
Careerafter.com
Careerafter.com
Careerafter.com
5) None of these
5. Every computer connected to an intranet or extranet must have a distinct...
1) Firewall
2) Proxy server
3) IP address
4) Domain name
5) None of these
6. Programming language built into user programs such as Word and Excel are known as...
1) 4GLs
2) Macro languages
3) object-oriented languages
4) Visual programming languages
5) None of these
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 36
7. Firewalls are used to protect against...
1) Unauthorized Attacks
2) Virus Attacks
3) Data Driven Attacks
4) Fire Attacks
5) None of these
8. Which of the following extensions suggest that the file is a backup copy?
1) Bak
2) Bas
3) Com
4) Txt
5) None of these
9. Computer programs are written in a high - level programming language; however, the
human readable version of a program is called...
1) Cache
2) Instruction set
3) Source code
Careerafter.com
4) Word size
5) None of these
10. The software tools that enable a user to interact with a computer for specific purposes are
known as...
1) Hardware
2) Networked Software
3) Shareware
4) Applications
5) None of these
11...............processing is used when a large mail-order company accumulates orders and
processes them together in one large set
1) Batch
2) Online
3) Real-time
4) Group
5) None of these
12. When a file contains instructions that can be carried out by the computer, it is often
called a (n) ... file
1) Data
2) Information
3) Executable
4) Application
5) None of these
13. A complier translates a program written in a high - level language into...
1) Machine language 2) An algorithm
3) A debugged program 4) Java 5) None of these
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 37
14. A set of step - by - step procedures for accomplishing a task is known as a (n)...
1) Algorithm
2) Hardware program
3) Software bug
Careerafter.com
4) Firmware program
5) None of these
15. A complete electronic circuit with transistors and other electronic components on a small
silicon chip is called a (n)...
1) Workstation
2) CPU
3) Magnetic disk
4) Integrated circuit
5) None of these
16. A saved document is referred to as a...
1) File
2) Word
3) Folder
4) Project
5) None of these
17. What is output?
1) What the processor takes from the user
2) What the user gives to the processor
3) What the processor gets from the user
4) What the processor gives to the user
5) None of these
18. When you turn on the computer, the boot routine will perform this test...
1) RAM test
2) Disk drive test
3) Memory test
4) Power - on self-test
5) None of these
19. Which of the following storage media provides sequential access only?
1) Floppy disk
2) Magnetic disk
3) Magnetic tape
4) Optical disk
Careerafter.com
5) None of these
20. In word processing, an efficient way to move the 3rd paragraph to place it after
the 5th paragraph is...
1) Copy and paste 2) Copy, cut and paste
3) Cut, copy and paste 4) Cut and paste
5) None of these
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 38
21. Hardware includes..........
1) All devices used to input data into a computer
2) Sets of instructions that a computer runs or executes
3) The computer and all the devices connected to it that are used to input and output data
4) All devices involved in processing information including the central processing unit,
memory
and storage
5) None of these
22. The quickest and easiest way in Word, to locate a particular word or phrase in a document
is to use the ... command
1) Replace
2) Find
3) Lookup
4) Search
5) None of these
23. The term 'user interface' refers to............
1) What the user sees on the screen and how they can interact with it
2) How the operating system responds to user commands
3) The means by which the user interacts with the peripheral devices on the computer
4) The monitor that is available for the computer
5) None of these
24. For creating a document, you use... command at File Menu.
1) Open
2) Close
Careerafter.com
3) New
4) Save
5) None of these
25. The.............. Becomes different shapes depending on the task you are performing
1) Active tab
2) Insertion point
3) Mouse pointer
4) Ribbon
5) None of these
26. Specilizd programs that assist users in locating information on the Web are called....
1) Information engines
2) Search engines
3) Web browsers
4) Resource locators
5) None of these
27. The background of any Word document...
1) Is always white colour
2) Is the colour you presect under the Options menu
3) Is always the same for the entire document
4) Can have any colour you choose 5) None of these
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 39
28.Correcting errors in a program is referred to as ...
1) Debugging
2) Bugging
3) Rectifying
4) Modifying
5) None of these
29.Any letter, number, or symbol found on the keyboard that you could type into the
computer
..........
1) Output
Careerafter.com
2) Character
3) Type
4) Print
5) Font
30.A symbol or question on the screen that prompts you to take action and tell the computer
what to do next ...
1) Scanner
2) Questionnaire
3) Prompt and dialog box
4) Information seeker
5) None of these
31.Commands at the top of a screen such as FILE-EDIT-FONT-TOOLS to operate and
change
things within programs ...
1) Menu bar
2) Tool bar
3) User friendly
4) Word processor
5) None of these
32.The primary device that a computer uses to store information ...
1) Monitor
2) Memory
3) Disk
4) Hard drive
5) None of these
33.A file extension is separated from the main file name with a(n)..., but no spaces
1) Question nark
2) Exclamation mark
3) Underscore
4) Period
5) None of these
Careerafter.com
Careerafter.com
2) System hardware
3) Applications hardware
4) Applications software
5) None of these
39.Which one of the following would be considered as a way that a computer virus can enter
a
computer system ?
1) Opening an application previously installed on the computer
2) Borrowed an illegal copy of software
3) Viewing a website without causing any additional transactions
4) Running antivirus programs
5) None of these
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 41
40.Programs such as Mozilla Firefox that serve as navigable windows into the Web are called
..........
1) Hypertext
2) Networks
3) Internet
4) Web browsers
5) None of these
41.What is the main difference between a mainframe and a super computer ?
1) Super computer is much larger than mainframe computers
2) Super computers are much smaller than mainframe computers
3) Supercomputers are focused to execute few programs as fast as possible while mainframe
uses its power to execute as many programs concurrently
4) Supercomputers are focused to execute as many programs as possible while mainframe
uses
its power to execute few programs as fast as possible
5) None of these
42.What is the function of Recycle Bin ?
1) Store deleted file
Careerafter.com
Careerafter.com
5) None of these
48.Workgroup means
1) Computers in network
2) Individual user
3) Individual computer
4) All of the above
5) None of these
49.Synonym can be reviewed with
1) Spelling and grammar
2) Thesaurus
3) Both
4) Synonym viewer
5) None of these
50. Which command allows you to reduce fragments of file and optimize the performance of
disk ?
1) Scandisk
2) Diskcomp
3) Chkdsak
4) Defrag
5) None of these
Answers
No Ans No Ans No Ans No Ans No Ans
1 2 11 1 21 4 31 1 41 3
2 2 12 3 22 2 32 4 42 1
3 5 13 1 23 1 33 5 43 4
4 2 14 1 24 3 34 4 44 2
5 2 15 4 25 3 35 3 45 4
6 4 16 1 26 2 36 4 46 4
7 1 17 4 27 4 37 3 47 1
8 1 18 2 28 1 38 1 48 1
9 3 19 2 29 2 39 2 49 2
10 4 20 4 30 3 40 4 50 4
Careerafter.com
Careerafter.com
Careerafter.com
Careerafter.com
Careerafter.com
as:
(A) Instruction cycle
(B) Fetch cycle
(C) Both (A) & (B)
(D) All of these
(E) None of these
23. Which of the following is responsible for all types of calculations?
(A) ALU
(B) Control Unit
(C) Registers
(D) BUS
(E) None of these
24. Internal memory in a CPU is nothing but :
(A) A set of registers
(B) A set of ALU
(C) Microprocessor
(D) BUS
(E) None of these
25. Which of the following is permanent memory?
(A) SRAM
(B) DRAM (C) ROM
(D) All of these
(E) None of these
Answers
No Ans No Ans No Ans
1 A 11 B 21 A
2 B 12 D 22 A
3 B 13 B 23 A
4 B 14 B 24 A
5 B 15 B 25 C
6 A 16 A
7 A 17 B
Careerafter.com
8 C 18 B
9 A 19 B
10 C 20 B
1. In a survey of more than 500 companies and government agencies, percent detected
computer security breaches.
A. 20
B. 75
C. 85
D. 99
Answer: C
2. The survey showed that these businesses lost more than due to security breaches.
A. $100,000 each
B. $377 million
C. five employees each
D. $1 million
Answer: B
3. The typical computer criminal is a(n):
A. young hacker.
B. trusted employee with no criminal record.
C. trusted employee with a long, but unknown criminal record.
D. overseas young cracker.
Answer: B
4. The majority of computer crimes are committed by:
A. hackers.
B. insiders.
C. overseas criminals.
D. young teenage computer geniuses.
Answer: B
5. The common name for the crime of stealing passwords is:
A. spooling.
B. identity theft.
C. spoofing.
Careerafter.com
D. hacking.
Answer: C Reference: Theft by Computer
6. Collecting personal information and effectively posing as another individual is known as
the
crime
of:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: B
7. Malicious software is known as:
A. badware.
B. malware.
C. maliciousware.
D. illegalware.
Answer: B
8. A program that performs a useful task while simultaneously allowing destructive acts is a:
A. worm.
B. Trojan horse.
C. virus.
D. macro virus.
Answer: B Moderate
9. An intentionally disruptive program that spreads from program to program or from disk to
disk is
known as a:
A. Trojan horse.
B. virus.
C. time bomb.
D. time-related bomb sequence.
Answer: B
10. In 1999, the Melissa virus was a widely publicized:
Careerafter.com
A. e-mail virus.
B. macro virus.
C. Trojan horse.
D. Time bomb.
Answer: A
11. What type of virus uses computer hosts to reproduce itself?
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
Answer: B
12. The thing that eventually terminates a worm virus is a lack of:
A. memory or disk space.
B. time.
C. CD drive space.
D. CD-RW.
Answer: A
13. When a logic bomb is activated by a time-related event, it is known as a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 49
14. A logic bomb that was created to erupt on Michelangelos birthday is an example
of a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C
Careerafter.com
15. What is the name of an application program that gathers user information and sends it to
someone through the Internet?
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
Answer: B
16. Standardization of Microsoft programs and the Windows operating system has made the
spread of
viruses:
A. more complicated.
B. more difficult.
C. easier.
D. slower.
Answer: C
17. HTML viruses infect:
A. your computer.
B. a Web page in the HTML code.
C. both a Web page and the computer that is viewing it.
D. No
Answer: B
18. Software programs that close potential security breaches in an operating system are
known
as:
A. security breach fixes.
B. refresh patches.
C. security repairs.
D. security patches.
Answer: D
19. When customers of a Web site are unable to access it due to a bombardment of fake
traffic, it
is
Careerafter.com
known as:
A. a virus.
B. a Trojan horse.
C. cracking.
D. a denial of service attack.
Answer: D
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 50
20. is the measurement of things such as fingerprints and retinal scans used for security
access.
A. Biometrics B. Biomeasurement
C. Computer security D. Smart weapon machinery
Answer: A
21. What is the most common tool used to restrict access to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Answer: B
22. The most common passwords in the U.S. or Britain include all EXCEPT:
A. love.
B. Fred.
C. God.
D. 123.
Answer: D
23. Hardware or software designed to guard against unauthorized access to a computer
network
is
known as a(n):
A. hacker-proof program.
B. firewall.
C. hacker-resistant server.
Careerafter.com
Careerafter.com
Careerafter.com
Careerafter.com
Answer: notebook
42. When you use a disk in several different computers within the same day, you are taking
the
chance of contracting a(n) .
Answer: virus Reference: Viruses Difficulty: Easy
43. A(n) attaches itself to documents that contain embedded programs that automate
tasks.
Answer: macro virus
44. Both viruses and use computer hosts to replicate.
Answer: worms
45. programs search for and eliminate viruses.Answer: Antivirus
46. A security patch is a software program that closes possible security breaches in the
operating system. The cost to the consumer is .
Answer: nothing or free
47. was once the word used for malicious computer wizardry.
Answer: Hackers or hacking
48. refers to electronic trespassing or criminal hacking.
Answer: Cracking
49. DoS stands for .
Answer: denial of service
50. DDoS stands for .
Answer: distributed denial of service
51. hijack Web pages and redirect users to other sites.
Answer: Webjackers
52. software monitors and records computer transactions.
Answer: Audit-control
53. Each individual who uses a public key cryptosystem has keys.
Answer: two Reference: How It Works: 10.2 Cryptography
54. PGP stands for .
Answer: Pretty Good Privacy
55. Mostoperating systems, including Windows XP, assign each user a unique .
Answer: user identifier or user ID
Careerafter.com
56. It should now be common knowledge that users should not open from e-mail recipients
that
the user does notknow.
Answer: attachments
Careerafter.com
3) 2 bits
4) 9 bits
5) None
6. SMPS stands for
1) Switched mode power supply
2) Start mode power supply
3) Store mode power supply
4) Single mode power supply
5) None
7. The device used to carry digital data on analog lines is called as
1) Modem
2) Multiplexer
3) Modulator
4) Demodulator 5) None
MCQs on Computers Part II
8. VDU is also called
1) Screen
2) Monitor
3) Both 1 & 2
4) printer
5) None
9. BIOS stands for
1) Basic Input Output system
2) Binary Input output system
3) Basic Input Off system
4) all the above
5) None
10. Father of C programming language
1) Dennis Ritchie
2) Prof Jhon Kemeny
3) Thomas Kurtz 4) Bill Gates
5) None
Careerafter.com
Careerafter.com
16. A collection of program that controls how your computer system runs and processes
information is called
1) Operating System 2) Computer 3) Office 4) Compiler 5) Interpreter
17. Computer connected to a LAN (Local Area Network) can
1) run faster 2) go on line
3) share information and /or share peripheral equipment
4) E-mail 5) None
18. Information travels between components on the mother board through
1) Flash memory 2) CMOS 3) Bays 4) Buses 5) Peripherals
19. How are data organized in a spreadsheet?
1) Lines & spaces 2) Layers & Planes 3) Height & Width
4) Rows & Columns 5) None
20. The blinking symbol on the computer screen is called the
1) mouse 2) logo 3) hand 4) palm 5) cursor
Ans:01.2 06.1 11.3 16.1
02.3 07.1 12.3 17.3
03.1 08.3 13.1 18.3
04.4 09.1 14.5 19.4
05.1 10.1 15.3 20.5
1. When you are selecting a mouse for a particular computer system, what is the most
important consideration?
(1) The type of drivers that come with the mouse
(2) The length of the mouse cord
(3) The type of connector the mouse is equipped with
(4) The number of buttons the mouse has
(5) None of these
Ans: (3)
2. How is power supplied to a low-power USB device?
(1) Through a power cable
(2) From an external power supply
(3) Directly from the computers power supply
Careerafter.com
Careerafter.com
Careerafter.com
ANSWER: 5
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 59
6. A Web site's main page is called its(1) Home Page
(2) Browser Page
(3) Search Page
(4) Bookmark
(5) None of these
ANSWER: 1
7. The simultaneous processing of two or more programs by multiple processors is(1) multiprogramming
(2) multitasking
(3) time-sharing
(4) multiprocessing (5) None of these
ANSWER: 1
8. Codes consisting of lines of varying widths or lengths that are computer-readable are
known
as(1) an ASCII code
(2) a magnetic tape
(3) an OCR scanner
(4) a bar code
(5) None of these
ANSWER: 4
9. To instruct Word to fit the width of a column to the contents of a table automatically, click
the
..... button and then point to AutoFit Contents.
(1) Fit to Form
(2) Format
(3) Autosize
(4) Contents
Careerafter.com
(5) AutoFit
ANSWER: 5
10. Why is it unethical to share copyrighted files with your friends?
(1) It is not unethical, because it is legal.
(2) It is unethical because the files are being given for free.
(3) Sharing copyrighted files without permission breaks copyright laws.
(4) It is not unethical because the files are being given for free.
(5) It is not unethical-anyone can access a computer
ANSWER: 3
11. Reusable optical storage will typically have the acronym(1) CD
(2) DVD
(3) ROM
(4) RW
(5) ROS
ANSWER: 4
12. The most common type of storage devices are(1) persistent
(2) optical
(3) magnetic
(4) flash
(5) steel
ANSWER: 2
13. A device that connects to a network without the use of cables is said to be(1) distributed
(2) free
(3) centralized
(4) open source
(5) None of these
ANSWER:5
14. A person who used his or her expertise to gain access to other people's computers to get
information illegally or do damage is a-
Careerafter.com
(1) hacker
(2) analyst
(3) instant messenger
(4) programmer
(5) spammer
ANSWER: 1
15. To access properties of an object, the mouse technique to use is(1) dragging
(2) dropping
(3) right-clicking
(4) shift-clicking
(5) None of these
ANSWER:3
16. To change selected text to all capital letters, click the change case button, then click- (1)
UPPERCASE
(2) UPPER ALL
(3) CAPS LOCK
(4) Lock Upper
(5) Large Size
ANSWER: 1
17. The basic unit of a worksheet into which you enter data in Excel is called a(1) tab
(2) cell
(3) box
(4) range
(5) None of these
ANSWER: 2
18. You can keep your personal files / folders
(1) My folder
(2) My Documents
(3) My Files
(4) My Text
Careerafter.com
Careerafter.com
(1) Tracking
(2) Formatting
(3) Crashing
(4) Allotting
(5) None of these
ANSWER:2
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 62
24. Help Menu is available at which button?
(1) End
(2) Start
(3) Turnoff
(4) Restart
(5) Reboot
ANSWER:2
25. The contents of .......... are lost when the computer turns off.
(1) storage
(2) input
(3) output
(4) memory
(5) None of these
ANSWER: 5
26. When you enter text in a cell in Excel, it also appears in which of the following?
(1) Status bar
(2) Formula bar
(3) Row heading
(4) Name box
(5) None of these
ANSWER:2
27. Which elements of a Word document can be displayed in colour?
(1) Only graphics
(2) Only text
Careerafter.com
Careerafter.com
(5) MISC
ANSWER: 2
32. Which is not a basic function of a computer?
(1) Store data
(2)Accept input
(3)Process data
(4) Copy text
(5) Accept and process data
ANSWER: 4
33. ASCII is a coding system that provides
(1) 256 different characters
(2) 512 different characters
(3) 1024 different characters
(4) 128 different characters
(5) 1000 different characters
ANSWER: 4
34. Which part of the computer is directly invoked in executing the instructions of the
computer
program?
(1) The scanner
(2) The main storage
(3) The secondary storage
(4) The printer
(5) The processor
ANSWER: 5
35. In order to create column data in Word, you need to
(1) tab consecutively until your cursor reaches the desired place
(2) set tabs or use the Table menu
(3) use Excel
(4) press the space bar until your cursor reaches the desired place
(5) None of these
ANSWER: 5
Careerafter.com
Careerafter.com
(2) 101
(3) 202
(4) 110
(5) 011
ANSWER:3
41. Which of the following does not store data permanently?
(1) ROM
(2) RAM
(3) Floppy Disk
(4) Hard Disk
(5) None of these
ANSWER:2
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 65
42. Which of the following is the smallest storage?
(1) Megabyte
(2) Gigabyte
(3) Kilobyte
(4) Terabyte
(5) None of these
ANSWER:5
43. Which menu enables the user to choose toolbars?
(1) View
(2) Format
(3) Insert
(4) Edit
(5) Help
ANSWER: 1
44. By viewing the properties of the local hard disk of a computer, the user can find out
(1) the amount of space that has been used up and the remaining free space on the disk.
(2) the name of the user viewing the properties of the disk.
(3) nothing useful to the user.
Careerafter.com
48. Which of the following helps to protect floppy disks from data getting accidentally
erased?
(1) Access notch
(2) Write-protect notch
(3) Entry notch
Careerafter.com
Careerafter.com
ANSWER:5
53. In a computer, most processing takes place in
(1) memory
(2) RAM
(3) motherboard
(4) CPU
(5) None of these
ANSWER:4
MCQs on Computers Part II
54. Data is organized in a worksheet as
(1) charts and diagrams
(2) rows and columns
(3) tables and boxes
(4) graphs
(5) None of the above
ANSWER:2
55. Which of the following is an example of a binary number?
(1) 6AH1
(2) 100101
(3) 005
(4) ABCD
(5) 23456
ANSWER:2
56. Spell Check will find errors in which of the following?
(1) Today is a rainy day
(2) Today is a rainy a day
(3) Is a rainy
(4) Rainy today a day
(5) None of the above
ANSWER:5
57. Which of the following is not a storage medium?
(1) Hard disk
Careerafter.com
Careerafter.com
Careerafter.com
(4) connector
(5) demod
ANSWER: 1
MCQs on Computers Part II
[Compiled by RSTC Gurgaon Canara Bank] Page 69
66. What do you see when you click the right mouse button?
(1) The same effect as the left click
(2) A special menu
(3) No effect
(4) A mouse cannot be right clicked
(5) Computer goes to sleep mode
ANSWER:2
67. In order to choose the font for a sentence in a Word document,
(1) select Font in the Format menu
(2) select Font in the Edit menu
(3) select Font in the Tools menu
(4) select Font in the Insert menu
(5) None of the above
ANSWER:1
68. The ALU performs .......... operations.
(1) logarithm-based
(2) ASCII
(3) algorithm-based
(4) arithmetic
(5) None of the above
ANSWER:4
69. Excel is a program that is used to prepare a
(1) Database
(2) Text Document
(3) Spreadsheet
(4) Slide Presentation
(5) None of the above
Careerafter.com
ANSWER:3
70. .......... consists of volatile chips that temporarily store data or instructions.
(1) CPU
(2) ROM
(3)RMA
(4) RAM
(5) None of these
Q.1 Which of the following is not an scripting language ?
(A) HTML (B) XML
(C) Postscript (D) Javascript
Ans: C Postscript
Q.2 Which of the following is a platform free language
(A) Fortran (B) Assembly
(C) C (D) Java
Ans: D Java
Q.3 A digital signature is
(A) scanned signature (B) signature in binary form
(C) encrypting information (D) handwritten signature
Ans: C encrypting information
Q.4 Mechanism to protect private networks from outside attack is
(A) Firewall (B) Antivirus
(C) Digital signature (D) Formatting
Ans: A Firewall
Q.5 A computer system that permits multiple users to run programs at same time
(A) Real time system (B) Multi programming system
(C) Time sharing system (D) Multi tasking system
Ans: D Multi tasking system
Code: T-16 Subject: E-COMMERCE
2
Q.6 A computer communication technology that provides a way to interconnect
multiple computer across short distance is
(A) LAN (B) MAN
Careerafter.com
Careerafter.com
Careerafter.com
Careerafter.com