Computer Questions Which are important.
1) The code for a Web page is written using Hypertext Markup language
2) The first computers were programmed using Machine language
3) A file name is a unique name that you give to a file of information
4) This can be another word for program software
5) Any data or instruction entered into the memory of a computer is considered as storage
6) Which part of the computer displays the work done monitor
7) A series of instructions that tells a computer what to do and how to do it is called a program
8) Hardware is the part of a computer that one can touch and feel .
9) The role of a computer sales representative generally is to determine a buyer’s needs and match it to the
correct hardware and software.
10) Supercomputers refers to the fastest, biggest and most expensive computers
11) Executing is the process of carrying out commands
12) The rectangular area of the screen that displays a program, data, and or information is a window
13) The process of a computer receiving information from a server on the internet is known as downloading
14) Disk drive is the part of the computer helps to store information
15) Arithmetic operations include addition, subtraction, multiplication, and division
16) A keyboard is the king of input device
17) An error is known as bug
18) A collection of related information sorted and dealt with as a unit is a file
19) Sending an e-mail is similar to writing a letter
20) IT stands for information technology
21) A menu contains commands that can be selected
22) Plotter, printer, monitor are the group consists of output devices
23) Edit menu is selected to cut, copy and paste
24) The most important or powerful computer in a typical network is network server
25) The primary purpose of software is to turn data into information
26) The ability to find an individual item in a file immediately direct access is used.
27) To make a notebook act as a desktop model, the notebook can be connected to a docking station which is connected to a monitor and other devices
28) You can use the tab key to move a cursor across the screen, indent a paragraph.
29) A collection of related files is called record.
30) Storage that retains its data after the power is turned off is referred to as non-volatile storage.
31) Internet is an example of connectivity.
32) Testing is the process of finding errors in software code.
33) A syntax contains specific rules and words that express the logical steps of an algorithm.
34) Changing an existing document is called the editing documentation
35) Virtual memory is memory on the hard disk that the CPU uses as an extended RAM.
36) Computers use the binary number system to store data and perform calculations.
37) The windows key will launch the start buttons.
38) To move to the beginning of a line of text, press the home key.
39) When sending an e-mail, the subject lines describe the contents of the message.
40) Tables, paragraphs and indexes work with when formatting text in word.
41) TB is the largest unit of storage.
42) The operating system tells the computer how to use its components.
43) When cutting and pasting, the item cut is temporarily stored in clipboard.
44) The blinking symbol on the computer screen is called the cursor.
45) Magnetic tape is not practical for applications where data must be quickly recalled because tape is a
sequential because tape is a sequential access medium.
46) Rows and columns are used to organize data in a spread sheet.
47) When you are working on documentation on PC, the document temporarily stored in flash memory.
48) One megabyte equals approximately 1 million bytes.Computer Awareness Part-II
49) Information travels between components on the motherboard through buses.
50) RAM refers to the memory in your computer.
51) Computer connected to a LAN can share information and or share peripheral equipment
52) Microsoft office is an application suite
53) Utilities can handle most system functions that aren’t handled directly by the operating system
54) If you receive an e-mail from someone you don’t know then you should delete it without opening it
55) A set of instructions telling the computer what to do is called program
56) LAN refers to a small single site network
57) A collection of programs that controls how your computer system runs and processes information is called operating system.
58) Device drivers are small, special-purpose programs
59) Transformation of input into output is performed by the CPU
60) Data going into the computer is called input.
61) Binary choice offer only two options
62) To indent the first paragraph of your report, you should use tab key
63) Fields are distinct item that don’t have much meaning to you in a given context
64) A website address is a unique name that identifies a specific web site on the web
65) Modem is an example of a telecommunications device
66) A set of computer programs used for a certain function such as word processing is the best definition of a software package
67) You can start Microsoft word by using start button
68) A blinking symbol on the screen that shows where the next character will appear is a cursor
69) Highlight and delete is used to remove a paragraph from a report you had written
70) Data and time are available on the desktop at taskbar
71) A directory within a directory is called sub directory
72) Testing is the process of finding errors in software code
73) In Excel, charts are created using chart wizard option
74) Microcomputer hardware consists of three basic categories of physical equipment system unit,
input/output, memory
75) Windows is not a common feature of software applications
76) A tool bar contains buttons and menus that provide quick access to commonly used commands
77) For creating a document, you use new command at file menu
78) Input device is equipment used to capture information and commands
79) A programming language contains specific rules and words that express the logical steps of an algorithm
80) One advantage of dial-up internet access is it utilizes existing telephone security
81) Protecting data by copying it from the original source is backup
82) Network components are connected to the same cable in the star topology
83) Two or more computers connected to each other for sharing information form a network
84) A compute checks the database of user name and passwords for a match before granting access
85) Computers that are portable and convenient for users who travel are known as laptops
86) Spam is the term for unsolicited e-mail
87) Utility software type of program controls the various computer parts and allows the user to interact with the computer
88) Each cell in a Microsoft office excel document is referred to by its cell address, which is the cell’s row and column labels
89) Eight digit binary number is called a byte
90) Office LANs that are spread geographically apart on a large scale can be connected using a corporate WAN
91) Storage is the process of copying software programs from secondary storage media to the hard disk
92) The code for a web page is written using Hyper Text Markup Language
93) Small application programs that run on a Web page and may ensure a form is completed properly or provide animation are known as flash
Ques. : 1 Which is considered a direct entry input device?
1) Optical scanner
2) Mouse
3) Light pen
4) Digitizer
5) All of the above.
Ans.4
Ques. : 2 The daily processing of corrections to customer accounts best exemplifies the processing mode of:
1) Batch processing
2) Real-time processing
3) Interactive processing
4) Multi processing
5) All of the above.
111111111111111111111
Ques. : 3 Which is a unit of measurement used with computer systems?
1) Byte
2) Kilobyte
3) Megabyte
4) Gigabyte
5) All of the above
5555555555555
Ques. : 4 A character is represented in EBCDIC by
1) one bit
2) four bits
3) eight bits
4) sixteen bits
5) None of the above
Ans.) 3
Ques. : 5 Which is a secondary memory device?
1) CPU
2) ALU
3) Floppy disk
4) Mouse
5) None of the above
Ans.) 3
Ques. : 6 Which is the computer memory that does not forget?
1) ROM
2) RAM
3) PROM
4) All of the above
5) None of the above
Ans.) 1
Ques. : 7 The most common binary code in use today is the 8 bit ASCII code. What do the letters ASCII stand for?
1) American Standard Code for International Interchange
2) American Standard Code for Information Interchange
3) American Standard Code for Intelligence interchange
4) American Scientific Code for Information Interchange
5) None of the above
Ans.) 2
Ques. : 8 A computer derives its basic strength from
1) Speed
2) Accuracy
3) Memory
4) all of the above
5) None of the above
Ans.) 4
Ques. : 9 A collection of eight bits is called
1) Byte
2) Word
3) Record
4) file
5) None of the above
Ans.) 1
Ques. : 10 A BIT represents a
1) Decimal digit
2) Octal digit
3) Binary digit
4) Hexadecimal digit
5) none of these
Ans.) 3
Ques. : 11 Which can read data and convert them to a form that a computer can use?
1) Logic
2) Storage
3) Control
4) Input device
5) Output device
Ans.) 4
Ques. : 12 Software instruction intended to satisfy a user's specific processing needs are called
1) System software
2) A microcomputer
3) Documentation
4) Applications software
5) All of the above
Ans.) 4
Ques. : 13 Which of the following is the most powerful type of computer?
1) Super micro
2) Super conductor
3) Microcomputer
4) Super computer
5) Mega frame
Ans.) 4
Ques. : 14 Which of the following people probably has the least amount of technical knowledge?
1) Programmer
2) User
3) System analyst
4) Computer operator
5) Computer professional
Ans.) 2
Ques. : 15 The Central Processing Unit (CPU) consists of:
1) Input, output and processing
2) Control unit, primary storage & secondary storage
3) Control unit, arithmetic-logic unit, primary
storage
4) Control unit, processing, and primary storage
5) None of the above
Ans.) 3
Ques. : 16 This is the part of the computer system that one can touch
1) hardware
2) data
3) software
4) input
5) None of these
Ans.) 1
Ques. : 17 Reusable optical storage will typically have the acronym ___.
1) CD
2) RW
3) DVD
4) ROM
5) None of these
Ans.) 2
Ques. : 18 The __________ tells the computer how to use its components.
1) utility
2) network
3) operating system
4) application program
5) None of these
Ans.) 3
Ques. : 19 A(n) __________ is a program that makes the computer easier to use.
1) application
2) utility
3) network
4) operating system
5) None of these
Ans.) 2
Ques. : 20 The ‘Difference Analyzer’ was created in the early 1920s by __
1) Peter Norton
2) Douglas Knuth
3) Vannevar Bush
4) Alan Kay
5) None of these
Ans.) 3
Ques. : 21 The most important or powerful computer in a typical network.
1) desktop
2) network client
3) network server
4) network station
5) None of these
Ans.) 3
Ques. : 22 To access a mainframe or supercomputer, users often use a ___
1) terminal
2) node
3) desktop
4) handheld
5) None of these
Ans.) 1
Ques. : 23 What data base function allows you to define the data your database is storing?
1) Definition wizard
2) Query Function
3) Design view
4) Data dictionary
5) None of these
Ans.) 4
Ques. : 24 If you wanted to tell the database management system that a specific attribute contained numbers only, what
would you need to set?
1) Data category
2) Data type
3) Data dictionary
4) Data definition
5) None of these
Ans.) 2
Ques. : 25 What key distinctly identifies a record in a database table?
1) Main key
2) Primary key
3) Principal key
4) Major key
5) None of these
Ans.) 2
Ques. : 26 What key links records from one database table to a record or records in another database table?
1) Primary key
2) Principal key
3) Foreign key
4) Link key
5) None of these
Ans.) 3
Ques. : 27 When you link one database table to another database table, what are you creating?
1) Primary link
2) Connectivity
3) Relationships
4) Referential integrity
5) None of these
Ans.) 3
Ques. : 28 What would you need to establish if you wanted to insure that the key in one database table was the same as
a key in another database table?
1) Top-level grouping
2) Connectivity
3) Referential integrity
4) Field properties
5) None of these
Ans.) 3
Ques. : 29 What database tool would you use to find answers to your questions about data stored in your database?
1) Queries
2) Tables
3) Show
4) Q&A
5) None of these
Ans.) 1
Ques. : 30 When we describe, or define, the categories of information we collect in an Excel worksheet, what type of
table are we creating?
1) Categorization
2) Classification
3) Explanation
4) List definition
5) None of these
Ans.) 4
Ques. : 31 If you wished to limit what you would see on an Excel worksheet, what data function would you use?
1) Sort
2) Filter
3) Conditional format
4) Data analysis
5) None of these
Ans.) 2
Ques. : 32 If you wished to highlight, not hide, some information in a worksheet because it met some criteria, what Excel
tool would you use?
1) Table
2) Format
3) Conditional Format
4) Filter
5) None of these
Ans.) 3
Ques. : 33 What Excel tool allows you to create quickly and automatically summary data from a large data set?
1) Conditional formatting
2) Sorting
3) Pivot tables
4) Field lists
5) None of these
Ans.) 3
Ques. : 34 When creating a custom filer in Excel, which of the following would not be considered a Boolean operator?
1) If
2) And
3) Or
4) Not
5) None of these
Ans.) 1
Ques. : 35 Which of the following is a good habit to get into when creating a worksheet?
1) Placing titles for columns in the first row of data
2) Using conditional formatting to spot spelling
errors
3) Inserting comments in each cell to define that
data or type of data
4) Grouping records according to some
classification
5) None of these
Ans.) 1
Ques. : 36 What term is used to describe a collection of information that you can use to build reports or discover facts
about an environment?
1) Database
2) Web site
3) Wiki
4) Relation
5) None of these
Ans.) 1
Ques. : 37 Microsoft's Access and Corel's Paradox are both examples of which type of software?
1) Network database systems
2) Relational database systems
3) Flat-file database systems
4) Hierarchical database systems
5) None of these
Ans.) 2
Ques. : 38 What type of graphical model is used to define a database?
1) Flowchart
2) E-R diagram
3) Organizational model
4) Programming model
5) None of these
Ans.) 2
Ques. : 39 After you develop a model for your database, you should then _____ it before building it.
1) normalize
2) design
3) plan
4) approve
5) None of these
Ans.) 1
Ques. : 40 Which of the following contains information about the structure of a database?
1) Database management system
2) Data dictionary
3) Data repository
4) Data warehouse
5) None of these
Ans.) 2
Ques. : 41 The rules of a language are called its __________.
1) structure
2) code
3) syntax
4) rigidity
5) None of these
Ans.) 3
Ques. : 42 A language that can be written on one platform and executed on another platform is said to be __________.
1) portable
2) robust
3) third generation
4) dynamic
5) None of these
Ans.) 1
Ques. : 43 __________ is Microsoft’s latest entry into the programming arena.
1) Java
2) .NET
3) Visual Basic
4) Pascal
5) None of these
Ans.) 2
Ques. : 44 A next-generation Web content development language, __________ typically refers to a suite of technologies
that allow developers to store data in a readable format.
1) HTML
2) XSL
3) XML
4) PHP
5) None of these
Ans.) 3
Ques. : 45 JavaScript was developed by __________ to run inside of web pages.
1) Microsoft
2) Sun
3) Oracle
4) Netscape
5) None of these
Ans.) 4
Ques. : 46 This technology is used to convert XML into HTML.
1) CSS
2) XHTML
3) PHP
4) XSL
5) None of these
Ans.) 4
Ques. : 47 The __________ is a special database that holds information about the computer’s user, installed programs
and hardware devices.
1) dynamic link library
2) initialization file
3) compiled help module
4) Windows Registry
5) None of these
Ans.) 4
Ques. : 48 A(n) __________ converts all the source code into machine code, creating an executable file.
1) linker
2) compiler
3) assembler
4) interpreter
5) None of these
Ans.) 2
Ques. : 49 A series of steps that always results in an answer is the definition of __________.
1) heuristic
2) flowchart
3) algorithm
4) pseudo code
5) None of these
Ans.) 3
Ques. : 50 The color of an object is an example of a(n) __________.
1) attribute
2) detail
3) listing
4) specification
5) None of these
Ans.) 1
Ques. : 51 A(n) __________ file contains information in an indexed and cross-linked format.
1) executable
2) initialization
3) help
4) library
5) None of these
Ans.) 3
Ques. : 52 A(n) __________ encapsulates data and functionality.
1) structured program
2) selection statement
3) object
4) program
5) None of these
Ans.) 2
Ques. : 53 __________ are text files containing OS commands.
1) Initialization files
2) Batch files
3) Executable files
4) Help files
5) None of these
Ans.) 2
Ques. : 54 The __________ prevents unlawful access to voice communications by wire.
1) Electronic Communications Privacy Act
2) Freedom of Information Act
3) USA Patriot Act
4) Privacy Act of 1974
5) None of these
Ans.) 1
Ques. : 55 Which of the following will not protect you from spam?
1) spam blockers
2) e-mail rules
3) popup blocker
4) filters
5) None of these
Ans.) 3
Ques. : 56 A __________’s main purpose is to prohibit unauthorized access to your computer via the Internet.
1) popup blocker
2) firewall
3) spyware blocker
4) spam assassin
5) restore file
Ans.) 2
Ques. : 57 To read the system messages and warnings, access the __________ in Windows.
1) system manager
2) control panel
3) event viewer
4) message screen
5) None of these
Ans.) 3
Ques. : 58 To create a copy of files in the event of system failure, you create a __________.
1) restore file
2) backup
3) firewall
4) redundancy
5) None of these
Ans.) 2
Ques. : 59 If configured correctly, the __________ will prevent interaction with your computer after a specified time
period.
1) firewall
2) filter
3) screen saver
4) popup blocker
5) virus
Ans.) 3
Ques. : 60 To recover files from a backup, you perform a __________.
1) restore
2) scan
3) unerase
4) copy
5) None of these
Ans.) 1
Ques. : 61 A __________ is anything that can cause harm.
1) vulnerability
2) phish
3) Threat
4) spoof
5) All of the above
Ans.) 3
Ques. : 62 In the right setting a thief will steal your information by simply watching what you type.
1) snagging
2) spying
3) social engineering
4) shoulder surfing
5) None of these
Ans.) 4
Ques. : 63 ---------- A hacker contacts you my phone or email and attempts to acquire your password
1) spoofing
2) phishing
3) spamming
4) bugging
5) None of these
Ans.) 2
Ques. : 64 This power protection device includes a battery that provides a few minutes of power.
1) surge suppressor
2) line conditioner
3) generator
4) UPS
5) None of these
Ans.) 4
Ques. : 65 A hacker that changes or forges information in an electronic resource, is engaging in __________.
1) denial of service
2) sniffing
3) terrorism
4) data diddling
5) None of these
Ans.) 4
Ques. : 66 The __________ of a threat measures its potential impact on a system
1) vulnerabilities
2) countermeasures
3) degree of harm
4) susceptibility
5) none of these
Ans.) 3
Ques. : 67 Which of the following identifies a specific web page and its computer on the Web?
1) Web site
2) Web site address
3) URL
4) Domain Name
5) All of above
Ans.) 4
Ques. : 68 Software, such as Explorer and Firefox, are referred to as _____.
1) Systems software
2) Utility software
3) Browsers
4) Internet tools
5) None of these
Ans.) 3
Ques. : 69 Which following ISP is free?
1) CompuServe
2) AOL
3) NetZero
4) MSN
5) None of these
Ans.) 3
Ques. : 70 When internet data leaves your campus, it normally goes to a(n) ______ before moving toward its destination.
1) Internet backbone
2) Network access point
3) Base station
4) Communication system
5) None of these
Ans.) 2
Ques. : 71 MCI and AT&T are examples of which of the following?
1) Social networks
2) Communications systems
3) Internet service providers
4) Mobisodes
5) None of these
Ans.) 3
Ques. : 72 What type of telecommunications hardware allows you to access the web?
1) Browser
2) Modem
3) FTP protocol
4) IRC
5) All of above
Ans.) 2
Ques. : 73 E-mail addresses separate the user name from the ISP using the __________ symbol
1) &
2) @
3) %
4) *
5) None of these
Ans.) 2
Ques. : 74 The mail server as defined in the text uses the __________ protocol
1) HTTP
2) FTP
3) POP
4) SMTP
5) All of above
Ans.) 3
Ques. : 75 When sending an e-mail, the __________ line describes the contents of the message.
1) to
2) subject
3) contents
4) CC
5) All of above
Ans.) 2
Ques. : 76 Unsolicited commercial email is commonly known as __________.
1) junk
2) hoaxes
3) spam
4) hypertext
5) All of above
Ans.) 3
Ques. : 77 News servers utilize __________ to distribute documents to readers.
1) NNTP
2) NEWS
3) HTTP
4) FTP
5) None of these
Ans.) 1
Ques. : 78 Discussion groups may have a __________ who monitors the postings and enforces the site’s rules.
1) judge
2) sysop
3) narrator
4) censor
5) None of these
Ans.) 2
Ques. : 79 A message with replies on a newsgroup is often called a __________.
1) post
2) list
3) thread
4) comment
5) All of above
Ans.) 3
Ques. : 80 The Internet was originally a project for this government agency.
1) ARPA
2) NSF
3) NSA
4) FCC
5) None of these
Ans.) 1
Ques. : 81 A word in a web page that, when clicked, opens another document.
1) anchor
2) URL
3) Hyperlink
4) reference
5) All of above
Ans.) 3
Ques. : 82 A network’s __________ is the central structure that connects other portions of the network.
1) trunk
2) backbone
3) protocol
4) server
5) None of these
Ans.) 2
Ques. : 83 __________ is the protocol that supports linking from one web page to another page.
1) HTML
2) IP
3) HTTP
4) FTP
5) All of above
Ans.) 3
Ques. : 84 You can organize your bookmarks using __________.
1) structures
2) containers
3) folders
4) menus
5) None of these
Ans.) 3
Ques. : 85 The browser’s __________ keeps a list of web pages you have visited during the current session.
1) history
2) cache
3) favorites
4) trail
5) All of the above
Ans.) 1
Ques. : 86 A __________ organizes the web into categories.
1) search engine
2) encyclopedia
3) archive
4) directory
5) None of these
Ans.) 4
Ques. : 87 To match all of the words in your search, the Boolean __________ operator should be used.
1) and
2) or
3) xor
4) both
5) All of above
Ans.) 1
Ques. : 88 What type of accountants may recommend controls for an organization's computer systems?
1) Environment accountant
2) Internal accountant
3) Government accountant
4) Public accountant
5) All of above
Ans.) 2
Ques. : 89 Which IT area is well-established in Accounting?
1) Multimedia systems
2) Web development
3) Statistical analysis
4) Accounting Information Systems
5) None of these
Ans.) 4
Ques. : 90 How do accountants quickly research new government rules and regulations?
1) With an internal database management systems
2) Through the Web
3) With an external database management systems
4) Through organizational network systems
5) All of above
Ans.) 2
Ques. : 91 Which computer virus records every movement you make on your computer?
1) Malware Android
2) Key logger
3) DoS
4) Trapper
5) None of these
Ans.) 2
1) The code for a Web page is written using Hypertext Markup language
2) The first computers were programmed using Machine language
3) A file name is a unique name that you give to a file of information
4) This can be another word for program software
5) Any data or instruction entered into the memory of a computer is considered as storage
6) Which part of the computer displays the work done monitor
7) A series of instructions that tells a computer what to do and how to do it is called a program
8) Hardware is the part of a computer that one can touch and feel .
9) The role of a computer sales representative generally is to determine a buyer’s needs and match it to the
correct hardware and software.
10) Supercomputers refers to the fastest, biggest and most expensive computers
11) Executing is the process of carrying out commands
12) The rectangular area of the screen that displays a program, data, and or information is a window
13) The process of a computer receiving information from a server on the internet is known as downloading
14) Disk drive is the part of the computer helps to store information
15) Arithmetic operations include addition, subtraction, multiplication, and division
16) A keyboard is the king of input device
17) An error is known as bug
18) A collection of related information sorted and dealt with as a unit is a file
19) Sending an e-mail is similar to writing a letter
20) IT stands for information technology
21) A menu contains commands that can be selected
22) Plotter, printer, monitor are the group consists of output devices
23) Edit menu is selected to cut, copy and paste
24) The most important or powerful computer in a typical network is network server
25) The primary purpose of software is to turn data into information
26) The ability to find an individual item in a file immediately direct access is used.
27) To make a notebook act as a desktop model, the notebook can be connected to a docking station which is connected to a monitor and other devices
28) You can use the tab key to move a cursor across the screen, indent a paragraph.
29) A collection of related files is called record.
30) Storage that retains its data after the power is turned off is referred to as non-volatile storage.
31) Internet is an example of connectivity.
32) Testing is the process of finding errors in software code.
33) A syntax contains specific rules and words that express the logical steps of an algorithm.
34) Changing an existing document is called the editing documentation
35) Virtual memory is memory on the hard disk that the CPU uses as an extended RAM.
36) Computers use the binary number system to store data and perform calculations.
37) The windows key will launch the start buttons.
38) To move to the beginning of a line of text, press the home key.
39) When sending an e-mail, the subject lines describe the contents of the message.
40) Tables, paragraphs and indexes work with when formatting text in word.
41) TB is the largest unit of storage.
42) The operating system tells the computer how to use its components.
43) When cutting and pasting, the item cut is temporarily stored in clipboard.
44) The blinking symbol on the computer screen is called the cursor.
45) Magnetic tape is not practical for applications where data must be quickly recalled because tape is a
sequential because tape is a sequential access medium.
46) Rows and columns are used to organize data in a spread sheet.
47) When you are working on documentation on PC, the document temporarily stored in flash memory.
48) One megabyte equals approximately 1 million bytes.Computer Awareness Part-II
49) Information travels between components on the motherboard through buses.
50) RAM refers to the memory in your computer.
51) Computer connected to a LAN can share information and or share peripheral equipment
52) Microsoft office is an application suite
53) Utilities can handle most system functions that aren’t handled directly by the operating system
54) If you receive an e-mail from someone you don’t know then you should delete it without opening it
55) A set of instructions telling the computer what to do is called program
56) LAN refers to a small single site network
57) A collection of programs that controls how your computer system runs and processes information is called operating system.
58) Device drivers are small, special-purpose programs
59) Transformation of input into output is performed by the CPU
60) Data going into the computer is called input.
61) Binary choice offer only two options
62) To indent the first paragraph of your report, you should use tab key
63) Fields are distinct item that don’t have much meaning to you in a given context
64) A website address is a unique name that identifies a specific web site on the web
65) Modem is an example of a telecommunications device
66) A set of computer programs used for a certain function such as word processing is the best definition of a software package
67) You can start Microsoft word by using start button
68) A blinking symbol on the screen that shows where the next character will appear is a cursor
69) Highlight and delete is used to remove a paragraph from a report you had written
70) Data and time are available on the desktop at taskbar
71) A directory within a directory is called sub directory
72) Testing is the process of finding errors in software code
73) In Excel, charts are created using chart wizard option
74) Microcomputer hardware consists of three basic categories of physical equipment system unit,
input/output, memory
75) Windows is not a common feature of software applications
76) A tool bar contains buttons and menus that provide quick access to commonly used commands
77) For creating a document, you use new command at file menu
78) Input device is equipment used to capture information and commands
79) A programming language contains specific rules and words that express the logical steps of an algorithm
80) One advantage of dial-up internet access is it utilizes existing telephone security
81) Protecting data by copying it from the original source is backup
82) Network components are connected to the same cable in the star topology
83) Two or more computers connected to each other for sharing information form a network
84) A compute checks the database of user name and passwords for a match before granting access
85) Computers that are portable and convenient for users who travel are known as laptops
86) Spam is the term for unsolicited e-mail
87) Utility software type of program controls the various computer parts and allows the user to interact with the computer
88) Each cell in a Microsoft office excel document is referred to by its cell address, which is the cell’s row and column labels
89) Eight digit binary number is called a byte
90) Office LANs that are spread geographically apart on a large scale can be connected using a corporate WAN
91) Storage is the process of copying software programs from secondary storage media to the hard disk
92) The code for a web page is written using Hyper Text Markup Language
93) Small application programs that run on a Web page and may ensure a form is completed properly or provide animation are known as flash
91.computer quiz questions For ibps 2015
Ques. : 1 Which is considered a direct entry input device?
1) Optical scanner
2) Mouse
3) Light pen
4) Digitizer
5) All of the above.
Ans.4
Ques. : 2 The daily processing of corrections to customer accounts best exemplifies the processing mode of:
1) Batch processing
2) Real-time processing
3) Interactive processing
4) Multi processing
5) All of the above.
111111111111111111111
Ques. : 3 Which is a unit of measurement used with computer systems?
1) Byte
2) Kilobyte
3) Megabyte
4) Gigabyte
5) All of the above
5555555555555
Ques. : 4 A character is represented in EBCDIC by
1) one bit
2) four bits
3) eight bits
4) sixteen bits
5) None of the above
Ans.) 3
Ques. : 5 Which is a secondary memory device?
1) CPU
2) ALU
3) Floppy disk
4) Mouse
5) None of the above
Ans.) 3
Ques. : 6 Which is the computer memory that does not forget?
1) ROM
2) RAM
3) PROM
4) All of the above
5) None of the above
Ans.) 1
Ques. : 7 The most common binary code in use today is the 8 bit ASCII code. What do the letters ASCII stand for?
1) American Standard Code for International Interchange
2) American Standard Code for Information Interchange
3) American Standard Code for Intelligence interchange
4) American Scientific Code for Information Interchange
5) None of the above
Ans.) 2
Ques. : 8 A computer derives its basic strength from
1) Speed
2) Accuracy
3) Memory
4) all of the above
5) None of the above
Ans.) 4
Ques. : 9 A collection of eight bits is called
1) Byte
2) Word
3) Record
4) file
5) None of the above
Ans.) 1
Ques. : 10 A BIT represents a
1) Decimal digit
2) Octal digit
3) Binary digit
4) Hexadecimal digit
5) none of these
Ans.) 3
Ques. : 11 Which can read data and convert them to a form that a computer can use?
1) Logic
2) Storage
3) Control
4) Input device
5) Output device
Ans.) 4
Ques. : 12 Software instruction intended to satisfy a user's specific processing needs are called
1) System software
2) A microcomputer
3) Documentation
4) Applications software
5) All of the above
Ans.) 4
Ques. : 13 Which of the following is the most powerful type of computer?
1) Super micro
2) Super conductor
3) Microcomputer
4) Super computer
5) Mega frame
Ans.) 4
Ques. : 14 Which of the following people probably has the least amount of technical knowledge?
1) Programmer
2) User
3) System analyst
4) Computer operator
5) Computer professional
Ans.) 2
Ques. : 15 The Central Processing Unit (CPU) consists of:
1) Input, output and processing
2) Control unit, primary storage & secondary storage
3) Control unit, arithmetic-logic unit, primary
storage
4) Control unit, processing, and primary storage
5) None of the above
Ans.) 3
Ques. : 16 This is the part of the computer system that one can touch
1) hardware
2) data
3) software
4) input
5) None of these
Ans.) 1
Ques. : 17 Reusable optical storage will typically have the acronym ___.
1) CD
2) RW
3) DVD
4) ROM
5) None of these
Ans.) 2
Ques. : 18 The __________ tells the computer how to use its components.
1) utility
2) network
3) operating system
4) application program
5) None of these
Ans.) 3
Ques. : 19 A(n) __________ is a program that makes the computer easier to use.
1) application
2) utility
3) network
4) operating system
5) None of these
Ans.) 2
Ques. : 20 The ‘Difference Analyzer’ was created in the early 1920s by __
1) Peter Norton
2) Douglas Knuth
3) Vannevar Bush
4) Alan Kay
5) None of these
Ans.) 3
Ques. : 21 The most important or powerful computer in a typical network.
1) desktop
2) network client
3) network server
4) network station
5) None of these
Ans.) 3
Ques. : 22 To access a mainframe or supercomputer, users often use a ___
1) terminal
2) node
3) desktop
4) handheld
5) None of these
Ans.) 1
Ques. : 23 What data base function allows you to define the data your database is storing?
1) Definition wizard
2) Query Function
3) Design view
4) Data dictionary
5) None of these
Ans.) 4
Ques. : 24 If you wanted to tell the database management system that a specific attribute contained numbers only, what
would you need to set?
1) Data category
2) Data type
3) Data dictionary
4) Data definition
5) None of these
Ans.) 2
Ques. : 25 What key distinctly identifies a record in a database table?
1) Main key
2) Primary key
3) Principal key
4) Major key
5) None of these
Ans.) 2
Ques. : 26 What key links records from one database table to a record or records in another database table?
1) Primary key
2) Principal key
3) Foreign key
4) Link key
5) None of these
Ans.) 3
Ques. : 27 When you link one database table to another database table, what are you creating?
1) Primary link
2) Connectivity
3) Relationships
4) Referential integrity
5) None of these
Ans.) 3
Ques. : 28 What would you need to establish if you wanted to insure that the key in one database table was the same as
a key in another database table?
1) Top-level grouping
2) Connectivity
3) Referential integrity
4) Field properties
5) None of these
Ans.) 3
Ques. : 29 What database tool would you use to find answers to your questions about data stored in your database?
1) Queries
2) Tables
3) Show
4) Q&A
5) None of these
Ans.) 1
Ques. : 30 When we describe, or define, the categories of information we collect in an Excel worksheet, what type of
table are we creating?
1) Categorization
2) Classification
3) Explanation
4) List definition
5) None of these
Ans.) 4
Ques. : 31 If you wished to limit what you would see on an Excel worksheet, what data function would you use?
1) Sort
2) Filter
3) Conditional format
4) Data analysis
5) None of these
Ans.) 2
Ques. : 32 If you wished to highlight, not hide, some information in a worksheet because it met some criteria, what Excel
tool would you use?
1) Table
2) Format
3) Conditional Format
4) Filter
5) None of these
Ans.) 3
Ques. : 33 What Excel tool allows you to create quickly and automatically summary data from a large data set?
1) Conditional formatting
2) Sorting
3) Pivot tables
4) Field lists
5) None of these
Ans.) 3
Ques. : 34 When creating a custom filer in Excel, which of the following would not be considered a Boolean operator?
1) If
2) And
3) Or
4) Not
5) None of these
Ans.) 1
Ques. : 35 Which of the following is a good habit to get into when creating a worksheet?
1) Placing titles for columns in the first row of data
2) Using conditional formatting to spot spelling
errors
3) Inserting comments in each cell to define that
data or type of data
4) Grouping records according to some
classification
5) None of these
Ans.) 1
Ques. : 36 What term is used to describe a collection of information that you can use to build reports or discover facts
about an environment?
1) Database
2) Web site
3) Wiki
4) Relation
5) None of these
Ans.) 1
Ques. : 37 Microsoft's Access and Corel's Paradox are both examples of which type of software?
1) Network database systems
2) Relational database systems
3) Flat-file database systems
4) Hierarchical database systems
5) None of these
Ans.) 2
Ques. : 38 What type of graphical model is used to define a database?
1) Flowchart
2) E-R diagram
3) Organizational model
4) Programming model
5) None of these
Ans.) 2
Ques. : 39 After you develop a model for your database, you should then _____ it before building it.
1) normalize
2) design
3) plan
4) approve
5) None of these
Ans.) 1
Ques. : 40 Which of the following contains information about the structure of a database?
1) Database management system
2) Data dictionary
3) Data repository
4) Data warehouse
5) None of these
Ans.) 2
Ques. : 41 The rules of a language are called its __________.
1) structure
2) code
3) syntax
4) rigidity
5) None of these
Ans.) 3
Ques. : 42 A language that can be written on one platform and executed on another platform is said to be __________.
1) portable
2) robust
3) third generation
4) dynamic
5) None of these
Ans.) 1
Ques. : 43 __________ is Microsoft’s latest entry into the programming arena.
1) Java
2) .NET
3) Visual Basic
4) Pascal
5) None of these
Ans.) 2
Ques. : 44 A next-generation Web content development language, __________ typically refers to a suite of technologies
that allow developers to store data in a readable format.
1) HTML
2) XSL
3) XML
4) PHP
5) None of these
Ans.) 3
Ques. : 45 JavaScript was developed by __________ to run inside of web pages.
1) Microsoft
2) Sun
3) Oracle
4) Netscape
5) None of these
Ans.) 4
Ques. : 46 This technology is used to convert XML into HTML.
1) CSS
2) XHTML
3) PHP
4) XSL
5) None of these
Ans.) 4
Ques. : 47 The __________ is a special database that holds information about the computer’s user, installed programs
and hardware devices.
1) dynamic link library
2) initialization file
3) compiled help module
4) Windows Registry
5) None of these
Ans.) 4
Ques. : 48 A(n) __________ converts all the source code into machine code, creating an executable file.
1) linker
2) compiler
3) assembler
4) interpreter
5) None of these
Ans.) 2
Ques. : 49 A series of steps that always results in an answer is the definition of __________.
1) heuristic
2) flowchart
3) algorithm
4) pseudo code
5) None of these
Ans.) 3
Ques. : 50 The color of an object is an example of a(n) __________.
1) attribute
2) detail
3) listing
4) specification
5) None of these
Ans.) 1
Ques. : 51 A(n) __________ file contains information in an indexed and cross-linked format.
1) executable
2) initialization
3) help
4) library
5) None of these
Ans.) 3
Ques. : 52 A(n) __________ encapsulates data and functionality.
1) structured program
2) selection statement
3) object
4) program
5) None of these
Ans.) 2
Ques. : 53 __________ are text files containing OS commands.
1) Initialization files
2) Batch files
3) Executable files
4) Help files
5) None of these
Ans.) 2
Ques. : 54 The __________ prevents unlawful access to voice communications by wire.
1) Electronic Communications Privacy Act
2) Freedom of Information Act
3) USA Patriot Act
4) Privacy Act of 1974
5) None of these
Ans.) 1
Ques. : 55 Which of the following will not protect you from spam?
1) spam blockers
2) e-mail rules
3) popup blocker
4) filters
5) None of these
Ans.) 3
Ques. : 56 A __________’s main purpose is to prohibit unauthorized access to your computer via the Internet.
1) popup blocker
2) firewall
3) spyware blocker
4) spam assassin
5) restore file
Ans.) 2
Ques. : 57 To read the system messages and warnings, access the __________ in Windows.
1) system manager
2) control panel
3) event viewer
4) message screen
5) None of these
Ans.) 3
Ques. : 58 To create a copy of files in the event of system failure, you create a __________.
1) restore file
2) backup
3) firewall
4) redundancy
5) None of these
Ans.) 2
Ques. : 59 If configured correctly, the __________ will prevent interaction with your computer after a specified time
period.
1) firewall
2) filter
3) screen saver
4) popup blocker
5) virus
Ans.) 3
Ques. : 60 To recover files from a backup, you perform a __________.
1) restore
2) scan
3) unerase
4) copy
5) None of these
Ans.) 1
Ques. : 61 A __________ is anything that can cause harm.
1) vulnerability
2) phish
3) Threat
4) spoof
5) All of the above
Ans.) 3
Ques. : 62 In the right setting a thief will steal your information by simply watching what you type.
1) snagging
2) spying
3) social engineering
4) shoulder surfing
5) None of these
Ans.) 4
Ques. : 63 ---------- A hacker contacts you my phone or email and attempts to acquire your password
1) spoofing
2) phishing
3) spamming
4) bugging
5) None of these
Ans.) 2
Ques. : 64 This power protection device includes a battery that provides a few minutes of power.
1) surge suppressor
2) line conditioner
3) generator
4) UPS
5) None of these
Ans.) 4
Ques. : 65 A hacker that changes or forges information in an electronic resource, is engaging in __________.
1) denial of service
2) sniffing
3) terrorism
4) data diddling
5) None of these
Ans.) 4
Ques. : 66 The __________ of a threat measures its potential impact on a system
1) vulnerabilities
2) countermeasures
3) degree of harm
4) susceptibility
5) none of these
Ans.) 3
Ques. : 67 Which of the following identifies a specific web page and its computer on the Web?
1) Web site
2) Web site address
3) URL
4) Domain Name
5) All of above
Ans.) 4
Ques. : 68 Software, such as Explorer and Firefox, are referred to as _____.
1) Systems software
2) Utility software
3) Browsers
4) Internet tools
5) None of these
Ans.) 3
Ques. : 69 Which following ISP is free?
1) CompuServe
2) AOL
3) NetZero
4) MSN
5) None of these
Ans.) 3
Ques. : 70 When internet data leaves your campus, it normally goes to a(n) ______ before moving toward its destination.
1) Internet backbone
2) Network access point
3) Base station
4) Communication system
5) None of these
Ans.) 2
Ques. : 71 MCI and AT&T are examples of which of the following?
1) Social networks
2) Communications systems
3) Internet service providers
4) Mobisodes
5) None of these
Ans.) 3
Ques. : 72 What type of telecommunications hardware allows you to access the web?
1) Browser
2) Modem
3) FTP protocol
4) IRC
5) All of above
Ans.) 2
Ques. : 73 E-mail addresses separate the user name from the ISP using the __________ symbol
1) &
2) @
3) %
4) *
5) None of these
Ans.) 2
Ques. : 74 The mail server as defined in the text uses the __________ protocol
1) HTTP
2) FTP
3) POP
4) SMTP
5) All of above
Ans.) 3
Ques. : 75 When sending an e-mail, the __________ line describes the contents of the message.
1) to
2) subject
3) contents
4) CC
5) All of above
Ans.) 2
Ques. : 76 Unsolicited commercial email is commonly known as __________.
1) junk
2) hoaxes
3) spam
4) hypertext
5) All of above
Ans.) 3
Ques. : 77 News servers utilize __________ to distribute documents to readers.
1) NNTP
2) NEWS
3) HTTP
4) FTP
5) None of these
Ans.) 1
Ques. : 78 Discussion groups may have a __________ who monitors the postings and enforces the site’s rules.
1) judge
2) sysop
3) narrator
4) censor
5) None of these
Ans.) 2
Ques. : 79 A message with replies on a newsgroup is often called a __________.
1) post
2) list
3) thread
4) comment
5) All of above
Ans.) 3
Ques. : 80 The Internet was originally a project for this government agency.
1) ARPA
2) NSF
3) NSA
4) FCC
5) None of these
Ans.) 1
Ques. : 81 A word in a web page that, when clicked, opens another document.
1) anchor
2) URL
3) Hyperlink
4) reference
5) All of above
Ans.) 3
Ques. : 82 A network’s __________ is the central structure that connects other portions of the network.
1) trunk
2) backbone
3) protocol
4) server
5) None of these
Ans.) 2
Ques. : 83 __________ is the protocol that supports linking from one web page to another page.
1) HTML
2) IP
3) HTTP
4) FTP
5) All of above
Ans.) 3
Ques. : 84 You can organize your bookmarks using __________.
1) structures
2) containers
3) folders
4) menus
5) None of these
Ans.) 3
Ques. : 85 The browser’s __________ keeps a list of web pages you have visited during the current session.
1) history
2) cache
3) favorites
4) trail
5) All of the above
Ans.) 1
Ques. : 86 A __________ organizes the web into categories.
1) search engine
2) encyclopedia
3) archive
4) directory
5) None of these
Ans.) 4
Ques. : 87 To match all of the words in your search, the Boolean __________ operator should be used.
1) and
2) or
3) xor
4) both
5) All of above
Ans.) 1
Ques. : 88 What type of accountants may recommend controls for an organization's computer systems?
1) Environment accountant
2) Internal accountant
3) Government accountant
4) Public accountant
5) All of above
Ans.) 2
Ques. : 89 Which IT area is well-established in Accounting?
1) Multimedia systems
2) Web development
3) Statistical analysis
4) Accounting Information Systems
5) None of these
Ans.) 4
Ques. : 90 How do accountants quickly research new government rules and regulations?
1) With an internal database management systems
2) Through the Web
3) With an external database management systems
4) Through organizational network systems
5) All of above
Ans.) 2
Ques. : 91 Which computer virus records every movement you make on your computer?
1) Malware Android
2) Key logger
3) DoS
4) Trapper
5) None of these
Ans.) 2