PREPARATORY QUESTIONS

COMPUTER KNOWLEDGE

PREPARATORY SET-125

Direction (Qs.1-15): Study the following questions carefully and choose your answer from the given five options.

 

Question No : 1

ROM is needed for storing an initial program called _______.

(1) Computer Startup Loader

(2) OS Version

(3) Kernel       

(4) Bootstrap Loader

(5) None of these   

Question No : 2

Which options in PowerPoint allows to carry slides from one computer to another?

(1) Save as

(2) Save and Go

(3) Pack and Go

(4) Web and Go

(5) None of these

Question No : 3

Which one of the following is a key function of a firewall?

(1) Monitoring

(2) Deleting

(3) Copying

(4) Moving

(5) None of these   

Question No : 4

The hardware device commonly referred to as the “brain” of the computer is the _____.

(1) RAM chip

(2) data input

(3) CPU

(4) secondary storage

(5) None of these

Question No : 5

Encryption is related to cryptography in which layer?

(1) Application layer

(2) Presentation layer 

(3) Network Layer

(4) Transport layer

(5) None of these

Question No : 6

In most WANs, the network contains numerous cables of telephone lines, each one connecting a pair of _____.

(1) Packet

(2) Star topology

(3) Router

(4) Antennas

(5) None of these   

Question No : 7

HTTP client requests by establishing a _____ connection to a particular port on the server.

(1) user datagram protocol

(2) transmission control protocol

(3) broader gateway protocol

(4) Bluetooth protocol

(5) None of these

Question No : 8

Junk e-mail is also called _____.

(1) Crap

(2) Spoof

(3) Sniffer script

(4) Spool

(5) Spam

Question No : 9

When you make graph and picture in document, then your computer holds the data in _____.

(1) Restore file

(2) Backup drive

(3) board

(4) Memory

(5) None of these   

Question No : 10

Who invented the language ‘C ‘?

(1) Dennis M. Ritchie  

(2) Niklaus Writh

(3) Seymour Papert

(4) Donald Kunth

(5) None of these

Question No : 11

What is included in an e-mail address?

(1) Domain Name followed by User’s Name

(2) User’s Name followed by Domain Name

(3) User’s Name followed by Postal address

(4) User’s Name followed by street address

(5) None of these   

Question No : 12

What happens when operating system is loaded in RAM?

(1) Copying

(2) Device driving

(3) Booting

(4) Multitasking

(5) None of these

Question No : 13

The process of a computer receiving information from a server on the Internet is known as _____.

(1) Acquisition

(2) Pulling

(3) Transferring

(4) Pushing     

(5) Downloading

Question No : 14

To connect networks of similar protocols, _____ are used.

(1) Routers

(2) Bridges

(3) Gateways

(4) Dial-up routers

(5) None of these

Question No : 15

What is the default file extension for all Word documents?

(1) .doc

(2) .exe

(3) .csv

(4) .prod

(5) .html