Anda di halaman 1dari 22

SAS/IE -(IE 3/PC 3)

INFORMATION TECHNOLOGY (THEORY)


(Compiled By: Jayakumar K P and Suresh A)

1. A _______is an application that responds to certain inputs very very quickly.


Ans: Real Time Application
2. Select the type of operating system you would expect to be used in a
computerized heart monitor
Ans: Real Time OS
3. Which is not a utility software
a) Customization tools b) Disk and file management c) Tabbed Dialog Box
d) Internet security
Ans-Tabbed Dialog Box
4. An OS keeps track of which program have access to which hardware devices and
uses ______ to help the CPU co-ordinate processes.
Ans-Interrupt requests.
5. _____was originally designed as successor to dos?
Ans: Windows NT
6. The term ____is used when referring to windows95,windows98 and windows ME

Ans: Windows 9x
7. ______is the latest in windows suit of desktop OS family.
Ans: Windows 7
8. A______is an OS that is designed to run on a network server dedicated to
providing various services to other computers on the network.
Ans: Network Operating System
9. A_____application is a program with parts that run on different computers
distributing the work and data across the network.
Ans: Distributed application..
10. ________is an OS present in smart cell phones from Sony Erickson and Nokia.
Ans: Symbian
11. Which feature in windows98 enables users to integrate internet resources directly
on the windows desktop?
Ans: Active Desktop
12. An operating system is an example of _____type of software.
Ans: System
13. Which of the following is most likely to use an embedded OS-

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 1 Of 22


a)Computerised life support system b)Macintosh Computer c)Desktop PC
Ans-a) Computerised life support system
14. The desktop of GUI OS is not a real desktop, but simply a
a)Simile b)metaphor c)analogy
Ans: metaphor
15. A ____operating system is a very fast processing and relatively small embedded
OS
a)Single User b)Multiuser c)Real-time
Ans: c)Real-time
16. The process of moving from one open window to another is called task : -
a) Changing b) switching c) shifting d) transferring
Ans: b)switching
17. ____ is a specialized database that contains data about the users of a network and
the computer resources of the network-
Ans: Enterprise directory
18. Windows NT was released as a _____bit OS in 1993
Ans: 32
19. Windows95 was the first version of windows to support the _____standard of
connecting new hardware
Ans:Plug and play
20. Which version of windows2000 was intended for use on desktop computers-
Ans: Windows Professional
21. Microsoft has created a 64bit version of this OS for use with AMD’s Optron and
Athelone64 CPUs.
Ans) Windows XP
22. Current version of MAC Operating System is called _____
Ans: MAC OS system-X
23. How many processors are supported by the data centre server edition of 2003-
Ans:32
24. Which network Operating System has long been the OS of choice for the most
critical servers of the internet, such as those that maintain the list of internet
domain names.
Ans) Unix
25. WindowsXP was released in____
Ans: 2001

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 2 Of 22


26. A centralized computer that allows multiple remote users to share the same
printing device is referred to as: -
Ans: Print Server
27. In a bus topology network, a special device called a ___is placed on each end of
the cable:
Ans:Terminator
28. Each computer on the network needs a hardware component called ____to control
the flow of data:
Ans: Network interface card/Network adapter Card
29. _____is a popular device used to connect a LAN that substantially reduces
broadcast traffic:-
Ans: Switches
30. To create a connection between different types of network you need a _____
Ans: Gateway
31. High end peer to peer networks allow for ____. This let users access the power of
multiple computers to process programs such as 3D illustration software:-
Ans: Distributed computing
32. ____is a device which is used for connecting two LANS or two segments of same
LAN
Ans: Bridges
33. Companies store data on a network server because it is ____.
Ans: easier to track changes made to important data.
34. In a ____network all devices are connected to a device called hub and
communicate through it.
Ans: Star topology
35. ___ is an agreed upon format for transmitting data between two devices.
Ans: Protocol
36. A ___is a complicated device that stores the routing information for networks.
Ans: Router
37. Twisted pair cables normally consist of ____pairs of wires: -
Ans: 4
38. ____means any kind of multiway communication carried out in realtime using
telecommunication or computer network equipment.
Ans: Teleconferencing
39. An extranet is like an intranet except that it allows company employees access to
coroporate website from the _____.

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 3 Of 22


Ans: employee’s desktop PC
40. ____is a type of network usually found where students and school administrators
have a need to share files across several buildings.
Ans: Campus Area Network (CAN)
41. A central computer with a large storage device and other resources which can be
shared by all users is called a ____server.
a) printer b) file c) network d) resource
Ans: Network Server
42. In data conferencing participants can share a ____ where they can draw, write or
import images.
Ans: Whiteboard
43. POTS ____ allow phone calls to jump the gap present between POTS and the
internet.
Ans: Gateways
44. ____is an example of hybrid Network.
Ans: HAN,CAN,MAN
45. ____is a processing location which can be a PC or some other device such as a
networked printer.
Ans: node
46. If a modem detects an error in data it has received from another computer it can
request that the data be :
Ans: Re-sent
47. Most PC modems can emulate a ____.
Ans: fax machine
48. ___modem is similar to circuit board and can be plugged into one of the
computers expansion slots.
Ans: Internal modem
49. The most common file transfer protocols for modems are called ______.
Ans: Kermit, xmodem, ymodem, zmodem and MNP (Microcom Networking
Protocol)
50. The term ____is used to describe any data connection that transmits data faster
than is possible through a standard dial up connection using a modem.
Ans: broadband
51. The most popular digital lines offered by telephone companies include ____.
Ans: T1,T3 and DSL (Digital Subscribers Line)
52. ____ is adapted for transmitting high volume data files such as audio, video and

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 4 Of 22


multimedia files.
Ans. ATM (Asynchronous Transfer Mode)
53. To gain access to Ethernet LAN wirelessly, you need a ____ and a _____needs to
be added to the Ethernet LAN.
Ans: wireless NIC (Network Interface Card), Wireless Access Point (WAP)
54. There are different versions of ____service, each offering its own capabilities and
rates.
Ans: DSL (Digital Subscriber Line)
55. A modems transmission speed is measured in ____.
Ans: bps (bits per second)
56. Your telephone connects to an old fashioned network called ____.
Ans. POTS (Plain Old Telephone System)
57. Modems and communications use ___protocols to recover from transmission
errors.
Ans: Error Correction Protocol
58. ____ is another method to describe 802.11 technology.
Ans: WI-FI (Wireless Fidelity)
59. In a PC, faxes can be exchanged with any other fax machine by using a _____.
Ans: Fax modem.
60. You should consider ____ when purchasing a modem.
Ans: Error correction and Transmission speed
61. ____service offers a total of 44.736 mbps of bandwidth.
Ans: T3
62. If you want to connect to a remote network or the internet using a modem, you
need to connect the modem to a ______.
Ans: analog telephone line.
63. The basic rate ISDN provides ______.
Ans: Two 64 Kbps data channels and one 19 Kbps error checking channel.
64. ____possible through a network or a telephone line.
Ans: Internet access and file transfer.
65. A modem converts the computers digital data into analog signals in the
____phase of its operations.
Ans: modulation.
66. A computers signal is digital it consists of on-off pulses representing _____.

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 5 Of 22


Ans: Ones and Zeroes.
67. Data communications usually takes place over media that are specifically set up
for the network and are known as _______media.
Ans: Dedicated media.
68. ____is a very popular telephone service especially with home users.
Ans: DSL
69. This type of connection needs to be initiated every time the computer needs to
access the internet.
Ans: Dial-up
70. DSL service is provided by this type of organization.
Ans: Telephone company
71. To communicate with the internet, PC applications use a special type of program
called.
Ans: API (Application Programming Interface)
72. The API for Windows is called ____.
Ans: Winsock.
73. A _____data connection can transfer data up to 128 Kbps.
Ans ISDN (Integrated Services Digital Network)
74. ___service is similar to ISDN, but uses more advanced digital signal processing
and algorithms to compress more signals through the telephone lines.
Ans DSL
75. ____provides downstream speeds that are much faster than its upstream speeds.
Ans: asynchronous DSL
76. In a spreadsheet ____can help you make sense of a worksheet’s content.
Ans: label
77. An empty ___looks like a grid of rows and columns.
Ans: Worksheet
78. You can try out a ____program before you must purchase of register it.
Ans: Shareware
79. ____is a software of anytime whose source code is available to users.
Ans: Open source code.
80. Word processors enable you to perform three basis types of formatting;
____,____and___.
Ans: Character format, paragraph format, document format.
81. In a spreadsheet program you actually work in a document called_____.

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 6 Of 22


Ans: worksheet.
82. The term ____refers to the US Postal Service.
Ans: Snail Mail
83. A ____is designed to keep track of different kinds of contact information for
different people.
Ans: PIM (Personal Information Manager)
84. A word processing program or an email program is an example of a
____program. Ans: Stand-alone program.
85. To navigate a worksheet you should understand the system of ____.
Ans: Cell address.
86. In a spreadsheet program____is a set of worksheets in the same file.
Ans: Workbook.
87. To create chart in a slide you enter data in a separate window called a ____.
Ans: Datasheet
88. In a personal information manager a contact list may be called a ____. Ans:
Addressbook
89. Spreadsheet programs are used to create ____based documents such as budget.
Ans: numerically
90. Spreadsheet works with four basic kinds of data-labels,numbers,date and ____.
Ans: formulas
91. The Individual pieces that make up a bit-mapped image are often called ___.
Ans: pixels
92. A ____helps a program what kind of data is contained in a file and how data is
organized.
Ans: file format
93. A _____programs drawing are often used as the basis for construction document.
Ans: CAD (computer aided design)
94. ____is the native graphic format designed by APPLE for use on Macintosh
computer.
Ans: PICT
95. ___image is designed a grid whose cells are filled with color.
Ans: bitmap
96. A____image consists of mathematical equation describing the size, shape,
thickness, position, color and fill of lines or closed graphical shapes.
Ans: Vector

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 7 Of 22


97. Grpahics ____ can be proprietary or universal.
Ans: file format
98. A _____ can convert a printed image into digital format.
Ans: Scanner
99. If a program and a file format cannot work together, they are said to be ______.
Ans: Incompatible.
100. You can use a paint program to change every ____ in a image from one color to
another color.
Ans: Pixel
101. ___ is the computerized version of hand drafting process.
Ans: CAD
102. Although television is an example of multimedia, it is not ____.
Ans: interactive
103. A ____ is a common file format that exists for vector graphic.
Ans: IGES
104. TIFF stands for ____image file format.
Ans: Tagged (image file format.)
105. GIF images are often found on www pages, they contain only ____ or fewer
colors.
Ans: 256
106. Programs can read and save files in specific formats such as RTF by using ___.
Ans: word processing.
107. Computer generated _____ has changed the world of animation in numerous
ways.
Ans: characters
108. Flat file databases are most useful for ____.
Ans: Single user or small group situations.
109. A ____ can store an object such as a picture, rather than text or numeric data.
Ans: binary field.
110. A ____ helps the DBMS to display records that satisfy a condition while hiding
those that do not.
Ans: Filter
111. Clerks or other data entry personnel fill in a _____.
Ans: Form

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 8 Of 22


112. A unique numeric value that the DBMS assigns to each record is called a ____.
Ans: Counter field.
113. The fields which typically include automatic error checking features are _____.
Ans: date and time
114. _____databases are two dimensional tables of fields and records that do not form
relationship with other tables.
Ans: Flat File
115. Applications that can handle high volume traffic are called _____.
Ans: Enterprise
116. An application’s ability to successfully manage changes in scale is known as
_____.
Ans: scalability
117. Enterprise software means ______.
Ans: A very large scale computer system.
118. The data analysis technique that can give you answers to questions you didn’t
even ask is called _____.
Ans: Data mining
119. _____is a common corporate DBMS developed by IBM.
Ans: DB2
120. If a distributed application is divided among more than three machines, it is called
a ____.
Ans: n-tier
121. ____ is the most popular enterprise DBMS for the open source community.
Ans: MySQL
122. The internet can be seen as one huge _____.
Ans: database
123. When a user ‘checks-out’ a disconnected data set, the connection to the database
is _____.
Ans: broken
124. Today’s three most popular enterprise DBMSs are DB2,ORACLE and _____.
Ans: SQL Server.
125. Database programs often provide _____ that resemble familiar paper form.
Ans: datasets
126. _____is a type of database utility designed to analyze data and report back with
useful information.

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 9 Of 22


Ans: knowledge discovery.
127. Many commercial websites access a ____.
Ans: Mainframe computer
128. If the job of managing a database between two computers is divided, it is called a
____application.
Ans: two layer
129. A ____is one type of knowledge discovery where a program searches a database,
discovering hidden information.
Ans: data mining
130. ____continually look for new web pages and send their addresses back to the
search engines database.
Ans: Crawlers
131. The dominant database system in the 1980s was ____.
Ans: dBase
132. Like ORACLE and Microsoft, IBM offers a family of DBMS software called
DB2_____database.
Ans: Universal
133. A ____ is a small text file which is placed on your computer on the request made
by the web server to your browser.
Ans: Cookie
134. A______is a weakness-anything that has not been protected against threats,
making it open to harm.
Ans: vulnerability
135. ___occurs when someone impersonates you by using your name, social security
number or other personal information.
Ans: ID theft
136. A ‘low-tech ID thief’ might resort to ____, searching for personal information in
garbage can.
Ans: dumpster diving
137. In ____, an ID thief tricks victims into providing critical information under the
pretext of something legitimate.
Ans: social engineering
138. If a legal record is available to anyone who wants to see it, the record is said to be
____.
Ans: A public record
139. The correct term for SPAM is _____.

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 10 Of 22


Ans: UCE (Unsolicited commercial e-mail)
140. In _____, the sender of an e-mail message tries to convince the recipient that the
message is from someone else.
Ans: spoofing.
141. A special device called a ____, protects equipment from line noise.
Ans: a line conditioner
142. The term ____ describes viruses, worms, Trojan horses and attack scripts.
Ans: Malware
143. The use of a computer to carry out any conventional criminal act, such as fraud, is
called _____.
Ans: Cyber crime.
144. By pretending to be a legitimate computer, the hackers gain an electronic entry
into one’s computer and this process is known as _____.
Ans: Spoofing.
145. It is important to realize that threats and the harm they can cause are a matter of
____.
Ans: degree
146. In the right setting, a thief can try ____ information by listening in while the
victim gives credit card or other personal information to a legitimate agent.
Ans: snagging
147. Because of the attention paid to the protection of ____, social engineering and
low-tech swindles are the predominant source of ID theft.
Ans: Personal information
148. Any time you use a ‘store loyalty’ card to rent movies or buy groceries; the
purchases are logged in a _____.
Ans: database
149. The use of data about your web surfing habits is called _____.
Ans: Online profiling
150. A ____ protects your computer system against voltage spikes.
Ans: Surge suppressor
151. _____refers to finding a users password by sharing, guessing or by capturing.
Ans: sniffing.
152. A ____ is a document that lists all your financial accounts that can be a source of
credit or that you can use to make purchases or other transactions.
Ans: Credit Report

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 11 Of 22


153. If you select the ____ on a company’s web page or warranty form, the company
promises either not to share your information or not to sent you advertisement.
Ans: Opt Out Option
154. The ____ act of 1970 mandate that personal information assembled credit
reporting agencies must be accurate, fair and private.
Ans: Fair Credit Reporting Act
155. A ___ cookie is temporary; it is automatically deleted when you close your
browser.
Ans: Session Cookie
156. A ____ cookie comes from a different web site that the one you are viewing.
Ans: Third party
157. A _____window is a secondary browser window that may contain an
advertisement and carries spyware.
Ans: Popup window.
158. By creating a ____ in your e-mail program you can tell the program to ignore
messages from a specific sender.
Ans: Filter
159. You can use a backup copy of your data to ____lost files to your PC.
Ans: restore
160. ____is a tool in Windows XP that lists important or unusual events occurring
within the system while an information log is created.
Ans: Event Viewer
161. Before discarding them, you should _____any document that contains sensitive
information such as your social security number, account number or password.
Ans: Shred
162. A bank or legitimate business will never ask you for your account information by
____. a) law b) Itself c) E-mail d) any means Ans:
any means
163. You should check your ____ at least once a year.
a) Credit Report b) e-mail filters c) shredder d) privacy laws
Ans: Credit Report
164. If a company asks you to complete a form on its website, you should first check
the company’s ____.
Ans: Private policy
165. Most web browsers feature built in settings that give you some control over ____.
Ans: Cookies

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 12 Of 22


166. If the web site you are viewing places a cookie on your system, the cookie is
called a ____cookie.
Ans: First Party
167. A key to avoiding ____ is to be careful about downloading files and programs
from the internet.
a) Spam b) Cookies c) spyware d) Popups
Ans: Spyware
168. An e-mail program’s filters also may be called _____.
Ans: rules
169. ____occurs when magnetic media is close enough to a magnetic source to erase
its contents.
a) de-sensitizing b) de-magnetizing c) de-fragmenting
Ans: de-magnetizing
170. A ____ management utility offers many options for identifying and removing
unwanted cookies from you PC.
a) anti-virus b) e-mail c) cookie d) web bug
Ans: Cookie
171. Banner Ads are example of ____ cookies.
Ans: Third party
172. Anti Spyware utility can detect spyware and ____ programs.
a) web bug b) viruses c) net bug
Ans: web bug
173. _____ are small utilities in your PC which prevent secondary browser windows
when you are on the web.
Ans: Pop-up Blocker
174. In an online banking application, which of the following would BEST protect
against identity theft?
a) Encryption of personal password b) Restricting the user to a specific terminal
c) Two-factor authentication d) Periodic review of access logs
Ans: Two-factor authentication
175. When a new system is to be implemented within a short time frame, it is most
important to -----------
a) finish writing user manuals b) perform user acceptance testing c) add last-
minute enhancements to functionalities
Ans: perform user acceptance testing

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 13 Of 22


176. Which of the following is the primary advantage of using computer forensic
software for investigations?
a) The preservation of the chain of custody for electronic evidence
b) Time and cost savings c) Efficiency and effectiveness
Ans: The preservation of the chain of custody for electronic evidence

177. After installing a network, an organization installed a vulnerability assessment


tool or security scanner to identify possible weaknesses. Which is the most
serious risk associated with such tools?
Ans: False-negative reporting
178. A programmer maliciously modified a production program to change data and
then restored the original code. Which of the following would most effectively
detect the malicious activity: -
a) Comparing source code b) Reviewing system log file c) Comparing object
code
Ans: Reviewing system log file
179. Which of the following is the most effective method for dealing with the
spreading of a network worm that exploits vulnerability in protocol: -
a) Install the vendors security fix for the vulnerability b) block the protocol
traffic in the perimeter fire wall c) stop the service until an appropriate
security fix is installed.
Ans: stop the service until an appropriate security fix is installed.
180. Which of the following network components is primarily set up to serve as a
security measure by preventing unauthorized traffic between different segments
of the network: -
a) firewall b) routers c) virtual local area networks
Ans: firewall
181. The most likely error to occur when implementing a firewall.
a) incorrectly configuring the access list b) compromising the password due
to social engineering c) connecting a modem to the computer in the network
Ans: a) ) incorrectly configuring the access list
182. Accountability of the maintenance of appropriate security measures over
information assets resides with the _____
a) security administrator b)system administrator c) data & system
owners
Ans: c) data & system owners

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 14 Of 22


183. The _____ feature in Windows extends its data sharing capability, allowing you
to embed data into a document in an application that cannot, on its own
manipulate the data.
Ans: OLE (Object Linking and Embedding)
184. A ____ is a saved sequence commands, action or key-stroke that is stored and can
be recalled with a single command or a key-stroke.
Ans: Macro
185. In ____ OS the response time is very critical.
a) Multi-tasking b) Batch c) Online d) Real-time
Ans: d) Real-time
186. Which of the following is not an OS: -
a) Windows 95 b) MS-Dos c) Windows 3.1 d) Windows 2000
Ans: Windows 3.1
187. Which of the following is not a database object: -
a) tables b) queries c) relationships d) reports
Ans: relationships
188. ____ are user constructed statements that set conditions for selecting and
manipulating data.
Ans: queries
189. ‘Data diddling’ means _____.
Ans: copying or altering of data on an infiltrated system by a hacker.
190. Unix OS is a/an ____.
a) time sharing OS b) multi-user OS c) multi-tasking OS d) all the
above.
Ans: d) all the above.
191. At the heart of Unix is the ____ which interacts with the actual hardware in
machine language.
Ans: Kernel
192. The functioning of Unix is manned in ____ levels.
Ans: 3
193. In a cable network the ____ is where the cable TV network connects to the
internet.
Ans: “head-end”
194. A ___ is a repository for collection of related data or facts.
Ans: Database

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 15 Of 22


195. What is a shell?
a) a hardware component b) command interpreter c) a part in compiler
d) a tool in CPU scheduling
Ans: b) command interpreter
196. IT Act came into force on _______ Ans: Gazette notification issued on 17
October 2000
197. IT amendment bill came into force on____.
Ans: 27 October 2009
198. Digital signature means authentication of any electronic record by a subscriber by
means of an electronic method or procedure in accordance with the provisions of
____.
Ans: Section 3 of IT Act 2008
199. A system of a secure key pair consisting of a private key for creating a digital
signature and public key for verification is called______. Ans: Asymmetric
Crypto System
200. ____ may suspend digital signature certificate if it is of the opinion that such a
step needs to be taken in public interest.
Ans: The certifying authority (vide section 37)
201. Section 45 provides for _______.
Ans: residuary penalty
202. Section 48 provides for establishment of one or more appellate tribunals to be
known as ____.
Ans: Cyber Regulation Appellate Tribunal
203. Section 50 Qualification of chairperson of CRAT (Cyber Regulations Appellate
Tribunal)-
if that person is a judge or has been or qualified to become a judge of the High
Court
204. (Section 51) The chair person or member of the cyber appellate tribunal shall hold
office for a term of ____years from the date on which he enters upon his office or
until he attains the age of ____ whichever is earlier.
Ans: 5 years, 65 years
205. (Section 54(1)) The chair person or member of the CRAT may by notice in
writing under his hand addressed to the _____ resign his office.
(Central Government)
206. (Section 62) Any person aggrieved by any decision of the Cyber Appellate
Tribunal may file an appeal to the High court within _____days from the date of
communication of the decision or order of the CAT to him on any question of fact
or law arising out of such order.

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 16 Of 22


Ans: 60
207. Section 66 provides that a person who commits hacking shall be punished with a
fine up to ____ or with imprisonment up to ____ years or both.
Ans: 2 lakhs, 3 years
208. Section 66 A-punishment for sending offensive messages through communication
services is _______.
(imprisonment for a term which may extend to 3 years and with fine)
209. Section 67 A-First conviction for publishing or transmitting of material
containing sexually explicit act in electronic form is ______.
Ans: (Imprisonment for a term which may extend to 5 years and with fine which
may extend to 10,00,000 Rupees
210. Whoever commits cyber terrorism shall be punishable with imprisonment which
may extend to ______.
Ans: imprisonment for life
211. Any person found misrepresenting or suppressing any material fact from the
controller and certifying authority shall be punished with _____.
Ans: imprisonment for a term which may extent to 2 years or with fine which
may extent to Rs. 100000 or with both. (Section 71)
212. Section 78-Power to investigate offences related to cyber crime rests with _____.
Ans: A police officer not below the rank of Inspector
213. Which section gives power to state government to make rules relating to this Act.

Ans: Section 90
214. Who invented the high level language c?
Ans: Dennis M. Ritchie
215. Personnel who design, program, operate and maintain computer equipment refers
to_____.
Ans: Peopleware
216. Human beings are referred to as Homosapinens, which device is called Sillico
Sapiens?
Ans: Computer
217. An error in software or hardware is called a bug. What is the alternative computer
jargon for it?
Ans: Glitch
218. What is meant by a dedicated computer?
Ans: Which is assigned one and only one task

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 17 Of 22


219. A computer program that converts an entire program into machine language is
called a/an _____.
Ans: Compiler
220. A computer program that translates one program instructions at a time into
machine language is called a/an
Ans: Interpreter
221. CD-ROM stands for ____.
Ans: Compact Disk Read Only Memory
222. ALU is ____
Ans: Arithmetic Logic Unit
223. ASCII stands for ____
Ans: American Standard Code for Information Interchange
224. An application program that helps the user to change any number and
immediately see the result of that change is _____.

Ans: spreadsheet

225. The instructions for starting the computer are housed in ____.

Ans: Read only memory chip

226. The ALU of a computer normally contains a number of high speed storage
element called ___.

Ans: Registers

227. Which of the following terms is the most closely related to main memory?

Ans: Temporary

228. Which of the following is required when more than one person uses a central
computer at the same time?

Ans: Terminal

229. Which of the following is used only for data entry and storage, and never for
processing?

Ans: Dumb terminal

230. To produce high quality graphics (hardcopy) in color, you would want to use a/n.

Ans: Plotter

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 18 Of 22


231. As compared to the secondary memory, the primary memory of a computer is.
Ans: Fast

232. A 32 bit microprocessor has the word length equal to.

Ans: 4 byte

233. An error in computer data is called.

Ans: Bug

234. Properly arranged data is called _____.

a. Field b. Words c. Information d. File

Ans: c) Information

235. An input /output device at which data enters or leaves a computer system is

a. Keyboard b. Terminal c. Printer d. Plotter

Ans: b. Terminal

236. Which of the following is not a valid type of computer virus: -

a) Boot virus b) Macro virus c) Resident virus d) poly-graphic virus

Ans: d) poly-graphic virus

237. A bank ATM card is an example of _____ a) What you know b) What you
have c) Both a and b d) what you are

Ans: c) Both a and b

238. Which of the following virus prevention technique can be implemented through
hardware: - a) remote booting b) Heuristic scanners c) behavior blockers
d) immunizers

Ans: a) remote booting

239. http stands for ________.

Ans: Hypertext Transfer Protocol

240. XML stands for _______.

Ans: Extensible Markup Language

241. HTML stands for _____.

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 19 Of 22


Ans: Hypertext Markup Language

242. TCP/IP stands for _____.

Ans: Transmission Control Protocol/Internet Protocol

243. DNS stands for _______.

Ans: Domain Name system

244. BIOS stands for _______.

Ans: Basic Input Output System

245. DLL stands for ________.

Ans: Dynamic Link Library

246. LCD stands for ________.

Ans: Liquid Crystal Display

247. HTTPS stands for ______.

Ans: Secure Hyper Text Transfer Protocol

248. A floppy disk contains

a. Circular tracks only b. Sectors only c. Both circular tracks and


sectors d. All of the above

Ans: c. Both circular tracks and sectors

249. The processes of starting or restarting a computer system by loading instructions


from a secondary storage device into the computer memory are called: -
a. Duping b. Booting c. Padding d. All of
above

Ans: b. Booting

250. Which of the following memories must be refreshed many times per second?

a. Static RAM b. Dynamic RAM c. EPROM d. ROM

Ans: b. Dynamic RAM

251. To locate a data item for storage is ______.

Ans: Fetch

252. Programs designed to perform specific tasks is known as _____.

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 20 Of 22


Ans: application software

253. The term gigabyte refers to_____

Ans: 1024 megabytes

254. The central processing unit (CPU) consists of _____.

Ans: Control unit, arithmetic-logic unit and primary storage

255. ____ is used for manufacturing chips.

Ans: Semiconductors

256. A hybrid computer resembles ______.

Ans: Both a digital and analog computer

257. The brain of any computer system is _____

Ans: Central Processing Unit

258. Which language is directly understood by the computer without translation


program?
Ans: Machine language

259. The best way to minimize the risk of communication failures in an e-commerce
environment would be to use _____.

Ans: Leased Asynchronous Transfer Mode Lines.

260. The DBA suggests that the DB efficiency can be improved by denormalizing
some tables. This would result in _____

Ans: Increased Redundancy


261. If file is sent from your computer to another person’s computer, you are
----------the file.
Ans: uploading
262. Which abbreviation is used to refer to DSL service in general ?
Ans: xDSL
263. Wi-Fi Protected Access was created as a replacement for this encryption standard
Ans: WEP (Wireless Encryption Protocol)
264. Most word processors feature one or more -----,which provide buttons that issue
commands.
Ans: Toolbars
265. If you regularly back up your data, this against the threat of data loss.

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 21 Of 22


Ans: Countermeasure
266. When an individual or organization contracts with an ISP for satellite server, an
earth –based communication station is installed, the generic name for which is
_____.
Ans: VSAT (Very Small Aperture Terminal)
267. ___ and ____ Security schemes designed to prevent unauthorized access to
wireless networks
(Ans: WEP,WPA)

Compiled By: Jayakumar K P and Suresh A

Date: 10/08/2011 COMPUTER OBJECTIVE QUESTIONS.doc Page 22 Of 22

Anda mungkin juga menyukai