PREPARATORY QUESTIONS

COMPUTER KNOWLEDGE

PREPARATORY SET-10

Direction (Qs.1-15): Study the following questions carefully and choose your answer from the given five options.

 

Question No : 1

Redundancy is dangerous as it is a potential threat to data _____

(1) Integrity

(2) Consistency

(3) Sufficiency

(4) Both (1) and (3)

(5) None of these

Question No : 2

In E-R diagram, derived attribute(s) is/are represented by _____

(1) Ellipse

(2) Dashed ellipse

(3) Rectangle

(4) Triangle

(5) None of these

Question No : 3

Which of the following hardware component is/are the most important for the operation of database management system?

(1) High resolution video display

(2) Printer

(3) High speed, large capacity disk

(4) Plotter

(5) Mouse

Question No : 4

Which physical layer devices can be used to enlarge the area covered by a single LAN segment?

(I) Switch

(II) NIC

(III) Hub

(IV) Repeater

(V) RJ45 transceiver

(1) Only (I)

(2) Both (I) and (III)

(3) Both (III) and (IV)

(4) Only (V)

(5) None of these

Question No : 5

If you do not want to select any option after opening a menu then click menu title again or press key ____ to close the menu.

(1) Shift

(2) Tab

(3) Escape

(4) F1

(5) None of these

Question No : 6

C, C++, Java, BASIC and COBOL are examples of _____ languages.

(1) Low level programming   

(2) High level programming   

(3) System programming

(4) Computer

(5) None of these   

Question No : 7

Which of the following statement closely associates with a Complier?

(1) Translator to convert source program into object code

(2) Name given to the computer operator

(3) Part of the digital machine to store information

(4) Operator of Boolean Algebra

(5) Part of arithmetic logic unit

Question No : 8

_____ is a mathematically oriented high level language frequently used in time sharing.

(1) ASCII

(2) ANSI

(3) ADA

(4) APL

(5) None of these

Question No : 9

A _____ is one of thousands of programs that can invade computer and perform a variety of functions ranging from annoying (e.g., popping up messages as a joke) to dangerous (e.g., deleting files or destroying your hard disk).

(1) MS Access  

(2) MS Word

(3) Antivirus

(4) Computer Virus    

(5) None of these

Question No : 10

Which of the following describes programs that can run independently travel from system to system and disrupt computer communication?

(1) Trojans

(2) Viruses

(3) Worm

(4) Dropper

(5) All of these

Question No : 11

To protect yourself from computer hacker, you should turn on a _____.

(1) Firewall

(2) Script

(3) VLC    

(4) AUP

(5) None of these

Question No : 12

The term ‘time sharing’ has been replaced by:

(1) Multi-tasking system

(2) Multi-programming system

(3) Multi-processing system

(4) Multi-execution system

(5) None of these   

Question No : 13

How can you access the font size tool on font dialog box in MS Word?

(1) Ctrl + S

(2) Ctrl + Shift + S

(3) Ctrl + P

(4) Ctrl + Shift + P

(5) Alt + P

Question No : 14

What is Visual FOXPRO?

(1) RDMBS

(2) DBMS

(3) Programming Language

(4) All of these

(5) None of these

Question No : 15

What is the difference between memory and storage?

(1) Memory is Temporary and storage is permanent

(2) Memory is Permanent and storage is temporary

(3) Memory is Slow and storage is fast

(4) Both (2) and (3)

(5) All of these