header1.html

Friday, 22 February 2013

Computer Awareness for government jobs-part1..


1.To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
A.press the left mouse key
B. press the Backspace key
C.double-click the right mouse key
D.press the delete key
Click for answer 

D.press the delete key
2.Which kind of lock includes a keypad that can be used to control access into areas?
A.Cipher
B. Warded
C.Tumbler
D.Device
Click for answer 

C.Tumbler
3.The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
A.CPU
B. slice of time
C.stack
D.event
Click for answer 

B. slice of time
4.The blocks of code, included in the operating system, that software applications interact with are known as:
A.complimentary metal-oxide conductors (CMOS).
B. device drivers.
C.application programming interfaces (APIs).
D.bootstrap loaders.
Click for answer 

C. application programming interfaces (APIs).
5.MS-DOS is a ____________ operating system.
A.point-and-click
B.user-friendly
C.Mac
D.command-driven
Click for answer 

D.command-driven
6.A spooler is a(n):
A.location in memory that maintains the contents of a document until it prints out.
B. program that coordinates the print jobs that are waiting to print.
C.print job.
D.message sent from the printer to the operating system when a print job is completed.
Click for answer 

B. program that coordinates the print jobs that are waiting to print.
7.The definition of thrashing is:
A.swapping data between virtual memory and RAM too frequently.
B.insufficient hard disk space
C.too many processors being managed by the operating system.
D.inaccurate information stored in the registry.
Click for answer 

A.swapping data between virtual memory and RAM too frequently.
8.Verification of a login name and password is known as:
A.authentication.
B.configuration.
C.accessibility.
D.logging in.
Click for answer 

A.authentication.