header1.html

Wednesday, 27 February 2013

Computer Awareness for government jobs-part5..


1.Virtual Memory is ____________.
A.Extremely Large Main memory
B. Extremely large second memory
C.An illusion of extremely large secondary memory
D.An illusion of extremely large main memory
Click for answer 

D.An illusion of extremely large main memory
2.The process of modifying data so that an unauthorized user cannot read it is called __________.
A.Hashing
B. Decryption
C.Encryption
D.Sorting
Click for answer 

C.Encryption
3.Which of the following statements is INCORRECT?
A.Each website has an address called its URL
B.Conversion of analog signals into digital signals is called modulation.
C.A webserver is a collection of websites
D.None of these
Click for answer 

B.Conversion of analog signals into digital signals is called modulation.
4.What is an extranet?
A.An extra fast computer network
B. An extra network usedby an organization for higher reliability
C.The intranet of two cooperating organisations interconnected via a secure leased line
D.An extra connection provided to co operating organization.
Click for answer 

C.The intranet of two cooperating organisations interconnected via a secure leased line
5.Who defined the binary system?
A.Pascal
B.Newton
C.Aristotle
D.A.N.D. Leibniz
Click for answer 

D.A.N.D. Leibniz
6.What is the addition of 101010 with 111111?
A.1100001
B. 1101001
C.1001001
D.1111001
Click for answer 

B. 1101001
7.The first Indian analog computer was assembled by Indian Statistical Institute (ISI) of Calcutta in
A.1950.
B.1953
C.1963.
D.1946.
Click for answer 

A.1950
8. which of the following high level language is NOT suitable for generating or developing a datafile?
A.FORTRAN.
B.BASIC.
C.COBOL.
D.PASCAL.
Click for answer 

A.FORTRAN.

Computer Awareness for government jobs-part4..


1.The _____ manual tells you how to use a software program.
A.documentation
B.user
C.programming
D.technical
Click for answer 

B.user
2.Which of the following is NOT a type of broadband Internet connection?
A.Cable
B.DSL
C.Satellite
D.Dial-up
Click for answer 

C.Satellite
3.Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
A.spyware
B.malware
C.spam
D.adware
Click for answer 

B.malware
4.Making a field ______ means that it cannot be left blank.
A.numeric
B.calculated
C. validated
D.required
Click for answer 

D.required
5.____________ are viruses that are triggered by the passage of time or on a certain date.
A.Boot-sector viruses
B.Macro viruses
C.Time bombs
D.Worms
Click for answer 

D.Worms
6.What is a backup?
A.Restoring the information backup.
B.An exact copy of a system’s information.
C.The ability to get a system up and running in the event of a system crash or failure
D.All of these
Click for answer 

D.All of these.
7.Which of the following places the common data elements in order from smallest to largest
A.character, file, record, field, database
B.character, record, field, database, file
C.Bit, byte, character, record, field, file, database,
D.character, field, record, file, database
Click for answer 

D.character, field, record, file, database
8.The internet is ……
A.a large network of networks
B.an internal communication system for a business
C.a communication system for the Indian government
D.All of these
Click for answer 

D.All of these

Computer Awareness for government jobs-part3..


1.Programs from the same developer , sold bundled together , that provide better integration and share common features , toolbars and menus are known as ….
A.integrated software packages
B.software suites
C.software processing packages
D.personal information managers
Click for answer 

B.software suites
2.A data warehouse is which of the following?
A.Can be updated by the end users
B.Contains numerous naming conventions and formats
C.Organized around important subject areas
D.Contains only current data
Click for answer 

C.Organized around important subject areas
3.______________ servers store and manages files for network users.
A.Authentication
B.File
C.Main
D.Web
Click for answer 

B.File
4.All of the following are examples of real security and privacy risks Except _____
A.hackers
B. viruses
C.identify theft
D.spam
Click for answer 

D.spam
5.___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems .
A.Data
B.Query
C.(Point-of-sale (POS)
D.Sales
Click for answer 

D.Sales
6.System software is the set of programs that enables your computer’s hardware devices and ______ software to work together.
A.management.
B.application.
C.utility
D.processing
Click for answer 

B.application.
7.________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.
A.Servers.
B.Robotic computers
C.Mainframes
D.Embedded computers.
Click for answer 

D.Embedded computers.
8.The following are all computing devices , except………
A.notebook computers
B.cellular telephones.
C.personal digital assistants
D.digital scanners.
Click for answer 

D.digital scanners

Tuesday, 26 February 2013

Sample Question Paper for PO Recruitment (Computers)

Please have look on some Computer Awareness Questions for government jobs,HERE <<--
1. Which of the following is a part of the Central Processing Unit?
    a. Printer
    b. Key board
    c. Mouse
    d. Arithmetic & Logic unit 
    e. None
 
2. CAD stands for
    a. Computer aided design
    b. Computer algorithm for design
    c. Computer application in design
    d. All of the above 
    e. None
 
3. Which of the following printer cannot print graphics?
    a. Ink-jet
    b. Daisy Wheel
    c. Laser
    d. Dot-matrix 
    e. None
 
4. A program written in machine language is called?
    a. Assembler
    b. Object
    c. Computer
    d. Machine 
    e. None
 
5. The father of Modern Computer is
    a. Charles Babbage
    b. Von-nuumann
    c. Danies Ritchel
    d. Blaise Pascal 
    e. None
 
6. The Word FTP stands for
    a. File Translate Protocol
    b. File Transit Protocol
    c. File Transfer protocol
    d. file typing protocol 
    e. None
 
7. The lowest form of Computer language is called
    a. BASIC
    b. FORTRAN
    c. Machine Language
    d. COBOL 
    e. None
 
8. Best Quality graphics is produced by
    a. Dot Matix
    b. Laser Printer
    c. Inkjet Printer 
    d. Plotter
    e. None
 
9. Memory which forgets every thing when you switch off the power is known as
    a. Corrupted
    b. Volatile
    c. Non-Volatile
    d. Non-Corrupted 
    e. None
 
10. The linking of computers with a communication system is called
    a. Networking
    b. Pairing
    c. Interlocking
    d. Assembling 
    e. Sharing
 
11. The 16 bit Microprocessor means that it has
    a. 16 address lines
    b. 16 Buses
    c. 16 Data lines 
    d. 16 routes
    e. None
 
12. Data going into the computer is called
    a. Output
    b. algorithm
    c. Input 
    d. Calculations
    e. flow chart
 
13. Which of the following refers to a small, single-site network?
    a. LAN
    b. DSL
    c. RAM
    d. USB 
    e. CPU
 
14. Microsoft Office is
    a. Shareware
    b.Public domain software
    c. Open-sourse software
    d. A vertical market application 
    e. An application suite
 
15. How many options does a BINARY choice offer
    a. None
    b. One
    c. Two 
    d. it depends on the amount of memory on the computer
    e. It depends on the speed of the computer's processor
 
16. A collection of program that controls how your computer system runs and processes information is called
    a. Operating System
    b. Computer
    c. Office 
    d. Compiler
    e. Interpreter
 
17. Computer connected to a LAN (Local Area Network) can
    a. run faster
    b. go on line
    c. share information and /or share peripheral equipment
    d. E-mail 
    e. None
 
18. Information travels between components on the mother board through 
    a. Flash memory
    b. CMOS
    c. Bays 
    d. Buses
    e. Peripherals
 
19. How are data organized in a spreadsheet?
    a. Lines & spaces
    b. Layers & Planes
    c. Height & Width 
    d. Rows & Columns
    e. None
 
20. The blinking symbol on the computer screen is called the
    a. mouse
    b. logo
    c. hand 
    d. palm
    e. cursor
 
21. A fault in a computer program which prevents it from working correctly is known as
    a. Boot
    b. Bug
    c. Biff 
    d. Strap
    e. None
 
22. A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is _________ 
    a. Bug
    b. Vice
    c. Lice
    d. Worm 
    e. None
 
23. A _______ is a bi-stable electronic circuit that has two stable states. 
    a. Multivibrator
    b. Flip-flop
    c. Logic gates 
    d. laten
    e. None
 
24. Unwanted repetitious messages, such as unsolicited bulk e-mail is known as
    a. Spam 
    b. Trash
    c. Calibri 
    d. Courier 
    e. None
 
25. DOS stands for
    a. Disk Operating System
    b. Disk operating session
    c. Digital Operating System
    d. Digital Open system 
    e. None
 
26. Who is the chief of Miocrosoft
    a. Babbage
    b. Bill Gates
    c. Bill Clinton
    d. Bush 
    e. None
 
27. Which of the following are input devices.
    a. Keyboard
    b. Mouse
    c. Card reader 
    d. Scanner
    e. All of these
 
28. Examples of output devices are 
    a. Screen
    b. Printer
    c. Speaker 
    d. All of these
    e. None
 
29. Which of the following is also known as brain of computer
    a. Control unit
    b. Central Processing unit
    c. Arithmatic and language unit
    d. Monitor 
    e. None
 
30. IBM stands for
    a. Internal Business Management
    b. International Business Management
    c. International Business Machines
    d. Internal Business Machines 
    e. None
 
31.___________ translates and executes program at run time line by line
    a. Compiler
    b. Interpreter
    c. Linker
    d. Loader 
    e. None
 
32. ___________ is an OOP principle
    a. Structured programming
    b. Procedural programming
    c. Inheritance
    d. Linking 
    e. None
 
33. COBOL is widely used in _________ applications
    a. Commercial
    b. Scientific
    c. Space
    d. Mathematical 
    e. None
 
34. RAM stands for
    a. Random origin money
    b. Random only memory
    c. Read only memory
    d. Random access memory 
    e. None
 
35. 1 Byte = ?
    a. 8 bits
    b. 4 bits
    c. 2 bits
    d. 9 bits 
    e. None
 
36. SMPS stands for
    a. Switched mode power supply
    b. Start mode power supply
    c. Store mode power supply
    d. Single mode power supply 
    e. None
 
37. The device used to carry digital data on analog lines is called as
    a. Modem
    b. Multiplexer
    c. Modulator
    d. Demodulator 
    e. None
 
38. VDU is also called
    a. Screen
    b. Monitor
    c. Both 1 & 2
    d. printer 
    e. None
 
39. BIOS stands for
    a. Basic Input Output system
    b. Binary Input output system
    c. Basic Input Off system
    d. all the above
    e. None
 
40. Father of 'C' programming language
    a. Dennis Ritchie
    b. Prof Jhon Kemeny
    c. Thomas Kurtz
    d. Bill Gates
    e. None
Answer Key:-
1. d.   2. a    3. b    4. a    5. a.   6. c    7. c    8. d
9. b    10. a   11. c   12. c   13. a   14. e   15. c   16. a
17. c   18. c   19. d   20. e   21. b   22. d   23. b   24. a   
25. a   26. b   27. e   28. d   29. b   30. c   31. b   32. c
33. a   34. d   35. a   36. a   37. a   38. c   39. a   40. a

Data Communication and Networking Part-2


1.In OSI Network architecture,the routing is performed by
A.Data Link Layer
B.Network Layer
C.Transport Layer
D.session Layer
Click for answer 

B.Network Layer
2.In OSI architecture the dialogue control and token management are responsibilities of..
A.Network Layer
B.Data Link Layer
C.Session Layer
D.Transport Layer
Click for answer 

C.Session Layer
3.Transmission of binary signals requires...
A.less bandwidth than analog
B.more bandwidth than analog
C.same bandwidth as analog
D.a licence from FAA
Click for answer 

B.more bandwidth than analog
4.One unsolved problem with satellite system is..
A.coverage
B.privacy
C.bandwidth
D.access.
Click for answer 

B.privacy
5.Which of the following device copies electrical signals from one Ethernet to another?
A.Bridge
B.Repeater
C.Router
D.Gateway
Click for answer 

B.Repeater
6.Working of WAN generally involves..
A.Satellite.
B.Frame Delay.
C.ATM
D.All of these
Click for answer 

D.All of these.
7.Which of the following protocol is used for remote terminal connection device..
A.TELNET.
B.FTP
C.RARP
D.UDP.
Click for answer 

A.TELNET.
8.Which of the following protocol a diskless machine uses to obtain its IP address from a server?
A.RDP
B.RARP.
C.RIP
D.X.25
Click for answer 

B.RARP

Monday, 25 February 2013

Data Communication and Networking Part-1


1.What is the minimum number of wires needed to send data over a serial communication link layer
A.1
B.2
C.3
D.4
Click for answer 

B.2
2.Which data communication method is used to send data over a serial communication link?
A.Simplex
B. Half Duplex
C.Full Duplex
D.All of these
Click for answer 

C.Full Duplex
3.The interactive transmission of data within a time sharing system may be best suited to..
A.Simplex Lines
B. Half Duplex Lines
C.Full Duplex Lines
D.biflex lines
Click for answer 

B.Half Duplex Lines
4.Which of the following is an example of bounded medium?
A.Coaxial cable
B. wave guide
C.Fibre optic cable
D.All of these.
Click for answer 

D.All of these
5.Coaxial cable has conductors with
A.Equal resistance
B.same diameter
C.Different diameter
D.a common axis
Click for answer 

D.a common axis
6.A central computer surrounded by one or more satellite computers is called..
A.Ring Network.
B.Star network.
C.Bus network
D.none ofv these
Click for answer 

B. Star network.
7.The forms of information that may be sent electronically are
A.voice.
B.data
C.video
D.All Of these.
Click for answer 

D.All Of these.
8.The basic compont necessary for communication is a...
A.computer terminal
B.modem.
C.communication s/w
D.All of these.
Click for answer 

D.All of these

Computer Awareness for government jobs-part2..


This post is continuation of my First Postplease have look here Computer Awareness for government jobs-part1

1.The _____ states that a foreign key must either match a primary key value in another relation or it must be null.
A.referential integrity constraint
B.action assertion
C.composite attribute
D.entity integrity rule
Click for answer 

D.entity integrity rule
2.A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
A.system virus
B. macro virus
C.none of these
D.both
Click for answer 

C.none of these
3.Which error detection method uses one's complement arithmetic?
A.Simply parity check
B. Checksum
C.Two-dimensional parity check
D.CRC
Click for answer 

B.Checksum
4.A result of a computer virus can not lead to ___.
A.Disk Crash.
B. Corruption of program.
C.Mother Board Crash
D.Deletion of files.
Click for answer 

C.Mother Board Crash
5.The network interface card of LAN is related to following layer of OSI Model-
A.Transport
B.Physical
C.Data Link
D.All of these
Click for answer 

D.All of these
6.Which of the following does not describe a data warehouse?
A.Subject-oriented.
B. Updateable.
C.Time-variant.
D.Integrated
Click for answer 

B. Updateable.
7.Which of the following is true ?
A.Logical design is software-dependent.
B.In a distributed database, database is stored in one physical location
C.Conceptual design translates the logical design into internal model
D.Logical design is software independent.
Click for answer 

A.Logical design is software-dependent.
8.A range check _____
A.determines whether a number is within a specified limit.
B.tests if the data in two or more associated fields is logical.
C.verifies that all required data is present.
D.ensures that only the correct data type is entered into a field.
Click for answer 

A.determines whether a number is within a specified limit.

Friday, 22 February 2013

Computer Awareness for government jobs-part1..


1.To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
A.press the left mouse key
B. press the Backspace key
C.double-click the right mouse key
D.press the delete key
Click for answer 

D.press the delete key
2.Which kind of lock includes a keypad that can be used to control access into areas?
A.Cipher
B. Warded
C.Tumbler
D.Device
Click for answer 

C.Tumbler
3.The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
A.CPU
B. slice of time
C.stack
D.event
Click for answer 

B. slice of time
4.The blocks of code, included in the operating system, that software applications interact with are known as:
A.complimentary metal-oxide conductors (CMOS).
B. device drivers.
C.application programming interfaces (APIs).
D.bootstrap loaders.
Click for answer 

C. application programming interfaces (APIs).
5.MS-DOS is a ____________ operating system.
A.point-and-click
B.user-friendly
C.Mac
D.command-driven
Click for answer 

D.command-driven
6.A spooler is a(n):
A.location in memory that maintains the contents of a document until it prints out.
B. program that coordinates the print jobs that are waiting to print.
C.print job.
D.message sent from the printer to the operating system when a print job is completed.
Click for answer 

B. program that coordinates the print jobs that are waiting to print.
7.The definition of thrashing is:
A.swapping data between virtual memory and RAM too frequently.
B.insufficient hard disk space
C.too many processors being managed by the operating system.
D.inaccurate information stored in the registry.
Click for answer 

A.swapping data between virtual memory and RAM too frequently.
8.Verification of a login name and password is known as:
A.authentication.
B.configuration.
C.accessibility.
D.logging in.
Click for answer 

A.authentication.