computer literacy and knowledge questions and answers – set 5

Best and important Computer Literacy and Knowledge questions with answers and explanations – multiple-choice questions (mcqs) – for competitive and government exams – UPSC, Civil Service prelims, CDS, NDA, SSC CGL, CHSL, CPO, MTS, ASRB, Junior Court Assistant exams, previous year computer solved questions, central and state government exams – computer literacy and knowledge questions and answers – set 5

computer literacy and knowledge questions and answers

set 5

  1. When sending an e-mail, the ____ line describes the contents of the message.
    1. subject
    2. to
    3. contents
    4. cc
    5. None of these

    Answer: 1. subject
    Subject in an email is a description of the topic of the message. The subject line must be informative and tempt the reader into wanting to know more about the content.

  2. A(n)_____is a program that makes the computer easier to use.
    1. utility
    2. application
    3. operating system
    4. network
    5. None of these

    Answer: 1. utility
    A utility program allows a user to perform maintenance-type tasks usually related to managing a computer, its devices or its programs. This makes computer easier to use, eg. Disk fragmenter, file compression, etc.

  3. The __________ tells the computer how to use its components.
    1. utility
    2. network
    3. application program
    4. operating system
    5. None of these

    Answer: 4. operating system
    An operating system is a system software that enables the computer hardware to communicate and operate with the computer software.

  4. Files deleted from the hard disk are sent to the ________ .
    1. Recycle Bin
    2. floppy disk
    3. clipboard
    4. motherboard
    5. None of these

    Answer: 1. Recycle Bin
    Recycle bin is a waste basket that works as a location or Directory for deleted files or folders. All the files, folders, programs that you discard gets stored in it and you must empty it to permanently delete files & folders from your computer.

  5. A ____ is a named set of characters that have the same characteristics.
    1. type face
    2. type style
    3. font
    4. pico
    5. None of these

    Answer: 3. font
    Fonts are designed for a set of characters. It is a graphical representation of text that may include a different typeface, point size, weight or design. eg, Times Roman is a typeface that defines the shape of each character, within Times Roman, there are many fonts to choose fromdifferent sizes, italic, bold, etc.

  6. A ____ pre-designed document that already has coordinating fonts, a layout, and a background.
    1. guide
    2. model
    3. ruler
    4. template
    5. None of these

    Answer: 4. template
    A template is a tool for enforcing a standard layout and look and feel across multiple pages or within content regions. When you change a template any pages or regions that are based on that template are automatically changed as well. It is something which is pre-formatted.

  7. Personal computers can be connected together to form a ____.
    1. server
    2. supercomputer
    3. enterprise
    4. network
    5. None of these

    Answer: 4. network
    A computer network is a group of computers and other hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users.

  8. Which elements of a Word document can be displayed in colour?
    1. Only graphics
    2. Only text
    3. All elements
    4. All elements, but only if you have a colour printer
    5. None of these

    Answer: 4. All elements, but only if you have a colour printer
    All elements like text and images can be displayed in color in MS-Word. The user can choose color of his/her own choice.

  9. A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a (n) ________ .
    1. Workstation
    2. CPU
    3. magnetic disk
    4. integrated circuit
    5. None of these

    Answer: 4. integrated circuit
    An integrated circuit (IC), also called a chip or micro chip, is a semiconductor wafer on which thousands or millions of any resistors, capacitors and transistors are fabricated.

  10. To access properties of an object, the mouse technique to use is _________.
    1. right-clicking
    2. shift-clicking
    3. dragging
    4. dropping
    5. None of these

    Answer: 1. right-clicking
    Right-clicking an item usually displays a list of things you can do with the item. For eg. when you right-click the recycle bin on your desktop, windows displays a menu allowing you to open it, empty it, delete it or see its properties.

  11. What is the term for unsolicited e-mail?
    1. newsgroup
    2. usenet
    3. backbone
    4. flaming
    5. spam

    Answer: 5. spam
    Email spam, also known as junk email or unsolicited buck email is flooding the internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it.

  12. A device operating at the physical layer is called a
    1. Bridge
    2. Router
    3. Repeater
    4. All of the above
    5. None of these

    Answer: 3. Repeater
    A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power or onto the other side of an obstruction, so that the signal can cover longer distances. Because repeaters work with the actual physical signal and do not attempt to interpret the data being transmitted, they operate on the physical layer, the first layer of the OSI model.

  13. A ____ can make it easier to play games.
    1. mouse
    2. Joystick
    3. keyboard
    4. pen
    5. None of these

    Answer: 2. Joystick
    In computers, a joystick is a cursor control device used in computer games and assistive technology. It allows an individual to move an object in a game such as navigating a plane in a flight simulator.

  14. The blinking symbol on the computer screen is called the
    1. mouse
    2. logo
    3. hand
    4. palm
    5. cursor

    Answer: 5. cursor
    A cursor refers to a movable indicator on a computer screen identifying the point that will be affected by input from the user.

  15. To make the number pad act as directional arrows, you press the ____ key.
    1. shift
    2. arrow lock
    3. num lock
    4. caps lock
    5. None of these

    Answer: 3. num lock
    The Num Lock (or numeric lock or number lock) key enables and disables the numeric pad on the keyboard. Turning the Num lock ‘on’ will allow the user to use the numbers on the keypad and turning it ‘off ’ will enable the keys other than functions such as using the keypad as an arrow pad.

  16. Something which has easily-understood instructions is said to be ____ .
    1. user friendly
    2. information
    3. word processing
    4. icon
    5. None of these

    Answer: 1. User friendly
    In computer, use-friendly refers to something which is easy to learn, understand and deal with eg. menu-driven programs are considered more user-friendly than command driven systems. Graphical user interfaces are also considered user friendly. They all make it easier for novices to use a computer.

  17. What is output?
    1. What the processor takes from the user
    2. What the user gives to the processor
    3. What the processor gets from the user
    4. What the processor gives to the user
    5. None of these

    Answer: 4. What the processor gives to the user
    Any information that has been processed by the processor (CPU) and comes from a computer is considered an output. When someone is viewing output, they are seeing it on an output device such as a computer monitor or a hard copy printout.

  18. The basic building block of a database that contains related records is
    1. Query
    2. Form
    3. Table
    4. Edited Page
    5. Report

    Answer: 3. Table
    Tables, the basic building blocks of a database, are made up of records (or rows) and fields (or columns). For eg., a contacts table would contain several records and each record would contain several fields that store information such as the last name, first name, telephone number, etc.

  19. Soft copy is the intangible output, so then what is hardcopy?
    1. The physical parts of the computer
    2. The printed parts of the computer
    3. The printed output
    4. The physical output devices
    5. None of these

    Answer: 3. The printed output
    A hard copy is a printed copy of information from a computer. It is called so because it exists as a physical object.

  20. During boot-up, the memory test:
    1. Checks and verifies that contiguous memory is installed
    2. Displays what memory is installed, but nothing else
    3. Is an operational error
    4. Is a superfluous step that should be ignored
    5. None of these

    Answer: 1. Checks and verifies that contiguous memory is installed
    Your computer’s Bios will run a memory test everytime the computer boots up. The bootup memory test primarily checks memory on the hard drive, checks virtual memory, verifies contiguous memory and displays ROM memory.

  21. —— error code identifies a floppy drive problem
    1. 301
    2. 401
    3. 501
    4. 601
    5. None of these

    Answer: 4. 601
    Error 601 shows this message could not continue scan with NOLOCK due to data movement.

  22. If you get frequent general protection faults, this could indicate
    1. A hard drive cable connected incorrectly
    2. Too much RAM is installed
    3. Poor quality of memory chips
    4. All of the above
    5. None of these

    Answer: 3. Poor quality of memory chips
    Memory chips can be high grade, low-grade, remanufactured or used. Poor-quality memory chips can cause frequent General Protection fault (GPF) errors in windows application errors and errors that hang the system.

  23. The ____________ of the CPU manages the on/off switches inside the CPU.
    1. microprocessor
    2. ALU
    3. transistors
    4. control unit
    5. None of these

    Answer: 4. Control unit
    Switches are the devices inside the computer that can be flipped between the two states- 1 or 0, on or off. Types of electronic switches are vacuum tubes, Transistors (semiconductors) and integrated circuits. The control unit manages the switches inside the CPU. It moves each switch to its correct setting (on or off) and then performs the work of that processing stage.

  24. The system BIOS and ROM chips are called:
    1. Software
    2. Firmware
    3. Hardware
    4. Bootware
    5. None of these

    Answer: 2. Firmware
    Firmware boots up computerized or digital devices, as ROM chips are non-volatile, meaning they do not require a power source to hold their contents. This differentiates firmware from random access memory (RAM), for example, which loses stored data at shutdown. Perhapes the most familiar firmware is the basic input output system (BIOS) chip. The BIOS chip on a computer motherboard holds instructions that, upon powering up, initialize the hardware, ensure components are working, and finally roll out the operating system to take over.

  25. What memory is located above the first 1024K of memory?
    1. Conventional
    2. Extended
    3. Upper
    4. Expanded
    5. None of these

    Memory above and beyond the standard IMB (1024k) of main memory that DOS supports. Extended memory is only available in PCs with an Intel 80286 or later microprocessor.

  26. Which type of RAM is normally the fastest?
    1. DRAM
    2. VRAM
    3. SRAM
    4. WRAM
    5. None of these

    Answer: 4. WRAM
    WRAM is window random access memory. It is a high performance video ram which operates at a 25% increase in bandwidth. It improves performance and is designed for use with graphic cards. WRAM is similar to VRAM but achieves even faster performance at less cost because it supports addressing of large blocks (windows) of video memory.

  27. Which computer system component is used for short- term data storage?
    1. Hard drive
    2. Floppy drive
    3. CD-ROM
    4. RAM
    5. None of these

    Answer: 4. RAM
    Random-access memory (RAM) is a form of computer data storage. It takes the form of integrated circuits that allow stored data to be accessed in any order in a constant time, regardless of its physical location and whether it is related to the previous piece of data. RAM is often associated with volatile (short term data storage) type of memory.

  28. A SIMM has how many pins?
    1. 36
    2. 40
    3. 34
    4. 20

    Answer: 2. 40
    A SIMM, or single in-line memory module, is a type of memory module The first variant of SIMMs has 30 pins and provides 9 bits of data The second variant of SIMMs has 72 pins and provides 32 bits of data Non-IBM PC computers such as UNIX workstations may use proprietary non-standard SIMMs. The Macintosh IIfx uses proprietary non-standard SIMMs with 64 pins.

  29. What is the default font size of a new Word document based on Normal template?
    1. 10 pt
    2. 8 pt
    3. 14 pt
    4. 12 pt
    5. None of these

    Answer: 4. 12 pt
    The default font was changed from 10 point Times New Roman in word 97 and earlier versions to 12-point Time New Roman in Word 2000 and later. According to Microsoft, this change was implemented because many web browsers use 12 pt as their defualt font size. The decision had nothing to do with what may be most appropriate for printed documents.

  30. The ____________ determines how many bits of data can be sent along a given bus at any one time.
    1. control unit
    2. bus width
    3. bus speed
    4. amount of memory
    5. None of these

    Answer: 2. bus width
    The size of the bus, called the bus width, determines the number of bits that the computer can transmit at one time. for eg. a 32- bit bus can transmit 32 bits (4 bytes) at a time on at 64-bit bus, bits transmit from one location to another 64 bits (8 bytes) at a time. The larger the number of bits handled by the bus, the faster the computer transfers data.

  31. The data flow diagram is for analysing
    1. How to do a function efficiently
    2. Restrict the number of times a function can be performed
    3. Requirements of user
    4. All of the above
    5. None of these

    Answer: 3. Requirements of user
    The Data Flow diagram (DFD) is an excellent communication tool for analysts to model processes and functional requirements. The sponser of a project and the end user will need to be briefed and consulted throughout all stages a system’s evalution with a DFD, users are able to visualize how the system will operate what the system will accomplish and how the system will be implemented.

  32. The elements of computer processing system are
    1. Hardware, Software, Information & People
    2. Hardware, Programs and People
    3. Hardware, Data, Users and Procedures
    4. All of the above
    5. None of these

    To be valuable, information must be accurate, organized, timely, accessible, useful and cost effective to produce Generating information from a computer requires the following five elements – Hardware, Software, Data, People (or users) and procedures. Together these five elements comprise an information system.

  33. On August 23, 2008 an accounting clerk prepared an invoice dated August 31, 2008. Which control can check this?
    1. Size check
    2. Hash total
    3. Range check
    4. All of the above
    5. None of these

    Answer: 3. Range check
    Range check control checks that the data lie within a specified range of values. For eg. the month of a person’s date of birth should lie between 1 and 12. Similarly, number of days for the month of August lie between 1 and 31.

  34. CPU contains
    1. Logical unit
    2. Arithmetic unit
    3. Control unit
    4. All of the above
    5. None of these

    Answer: 4. All of the above
    CPU (Central Processing Unit) is the brain of the computer that contains the circuitry necessary to interpret & execute program instructions. It comprises of arithmetic logic unit (to perform arithmetic calculations like addition, multiplications and logical comparisons like NOT, EQUAL TO, etc) and control unit (which coordinates the components of a computer system).

  35. Library management software is for
    1. Documenting the changes that are made to program
    2. Controlling the version numbers of the programs
    3. Both (1) and (2)
    4. All of the above
    5. None of these

    Answer: 2. Controlling the version numbers of the programs
    Library management software performs functions like library access control, software and document version maintenance, change recording and document reconstruction.

  36. Steganography is
    1. Hiding the data to make it necessarily invisible and not easily detectable.
    2. Hiding the data but not necessarily making it invisible and not easily detectable.
    3. Detecting and destroying the hidden data.
    4. All of the above
    5. None of these

    Answer: 2. Hiding the data but not necessarily making it invisible and not easily detectable
    Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication to hide a message from a third party. This differs from cryptography, the art of secret writing, which is intended to make a message unreadable by a third party but doesn’t hide the existence of the secret communication. Steganography hides the covert message but not the fact that two parties are communicating with each other.

  37. A computer is a _____ device.
    1. Calculating
    2. Electrical
    3. Electronic
    4. All of the above
    5. None of these

    Answer: 3. Electronic
    A computer is an electronic device that takes raw data as an input, from the user and processes these data under the control of a set of instructions (called programs) and gives results (output) and saves output for future use.

  38. An online transaction is
    1. One that is done in real time
    2. One that is done via telephone
    3. Transaction done via internet
    4. All of the above
    5. None of these

    Answer: 3. Transaction done via internet
    Transactions done via internet are called online transactions. eg. online shopping, online banking, etc.

  39. Using anti-virus software is
    1. Detective measures
    2. Preventive measure
    3. Corrective measure
    4. All of the above
    5. None of these

    Answer: 2. Preventive measure
    Explanation :
    Installing anti-virus software is preventive measure. It prevents viruses from spreading to and from your computer. It searches for latent viruses on your computer, including viruses that may have spread to your system without your knowledge and fixes them. It protects your system from.

  40. Passwords enable users to __________.
    1. get into the system quickly
    2. make efficient use of time
    3. retain confidentiality of files
    4. simplify file structures
    5. None of these

    Answer: 3. retain confidentiality of files
    Password is a set of secret characters or words utilized to gain access to a computer, web page, network resource or files. Password help ensure that computers or files can be accessed only by those who have been granted the right to view or access them. In this way, passwords provide confidentiality of computers or files from authorized access.

Leave a Comment