PREPARATORY QUESTIONS

COMPUTER KNOWLEDGE

PREPARATORY SET-98

Direction (Qs.1-15): Study the following questions carefully and choose your answer from the given five options.

 

Question No : 1

Malicious software is known as _____.

(1) Badware

(2) Malware

(3) Malicious ware

(4) liigalware

(5) None of these

Question No : 2

Integrated Circuit (IC) chips used in computers are made with _____.

(1) Copper

(2) Aluminium

(3) Gold

(4) Silicon

(5) Silver

Question No : 3

Firewalls are used to protect against _____.

(1) Unauthorised attacks

(2) Virus attacks

(3) Data-driven attacks

(4) Fire attacks

(5) None of these

Question No : 4

The main function of the ALU is to _____.

(1) perform arithmetic and logical operations

(2) store data and information for future use

(3) control computer output, such as printing

(4) monitor all computer activities

(5) None of these   

Question No : 5

_____ this is the act of copying or downloading a program from a network and making multiple copies of it.

(1) Network piracy

(2) Plagiarism

(3) Software piracy

(4) Site-license piracy

(5) None of these   

Question No : 6

Which of the following is not true about RAM?

(1) RAM is the same as hard disk storage

(2) RAM is a temporary storage area

(3) RAM is volatile

(4) RAM stands for Random Access Memory

(5) Information stored in RAM is gone when you turn the computer off

Question No : 7

If you wished to limit what you would see on an Excel worksheet, what data function would you use?

(1) Sort

(2) Filter

(3) None of these

(4) Data analysis

(5) Conditional format

Question No : 8

IDE stands for _____.

(1) Integrate Disk Error

(2) Input Data Error

(3) None of these

(4) Integrated Disk Environment

(5) Integrated Development Environment

Question No : 9

_____ are often delivered to a PC through an email attachment and are often designed to do harm.

(1) Viruses

(2) Spam

(3) Portals

(4) SMS messages

(5) None of these

Question No : 10

SMPS stands for_____

(1) Switched Mode Power Supply

(2) Start Mode Power Supply 

(3) Store Mode Power Supply

(4) Single Mode Power Supply

(5) None of these   

Question No : 11

Expansion cards are inserted into_____

(1) Slots

(2) Peripheral devices 

(3) CPU

(4) The back of the computer 

(5) pegs

Question No : 12

Managers use sophisticated tool to combat cyberslacking, especially involving the internet. Such tools include _____

(1) Web filters

(2) Surveillance Software

(3) Proxy Server

(4) Packet sniffer

(5) All of the above

Question No : 13

Who is the creator of PASCAL Language?

(1) Dijkstra

(2) Niklaus Writh

(3) D. Khuth

(4) Aho

(5) Dennis Ritchie

Question No : 14

The hardware device or software program that sends messages between network is known as a _____.

(1) Bridge

(2) Backbone

(3) Router

(4) Gateway

(5) None of these   

Question No : 15

A repair for a known software bug, usually available at no charge on the internet, is called a(n) _____

(1) version

(2) patch

(3) tutorial

(4) FAQ

(5) None of these