computer literacy and knowledge questions and answers – set 6

Best and important Computer Literacy and Knowledge questions with answers and explanations – multiple-choice questions (mcqs) – for competitive and government exams – UPSC, Civil Service prelims, CDS, NDA, SSC CGL, CHSL, CPO, MTS, ASRB, Junior Court Assistant exams, previous year computer solved questions, central and state government exams

  1. The blinking point which shows your position in the text is called
    1. Blinker
    2. Cursor
    3. Causer
    4. Pointer
    5. None of these

    Answer: 2. Cursor
    A cursor refers to a movable indicator on a computer screen identifying the point that will be affected by input from the user.

  2. Where are programs and data kept while the processor is using them?
    1. Main memory
    2. Secondary memory
    3. Disk memory
    4. Program memory
    5. None of these

    Answer: 1. Main Memory
    Main memory or Random Access memory is the “working memory” in a computer. It is where data is stored that is being accessed by the CPU. Data is stored in RAM on temporary basis to complete tasks.

  3. Which of the following commands is used to select the whole document?
    1. Ctrl + A
    2. Alt + F5
    3. Shift + S
    4. Can’t be done
    5. None of these

    Answer: 1. Ctrl + A
    Ctrl + A is the keyboard shortcut for “select all” i.e, selecting the whole document.

  4. The computer is made of which of the following hardware equipments?
    1. Monitor, CPU (Central Processing Unit), Keyboard, Mouse, Software and Network
    2. Monitor, CPU (Central Processing Unit), Keyboard, Mouse, Programme and Network
    3. Monitor, CPU (Central Processing Unit), Keyboard, Mouse, Printer and Modem
    4. Monitor, CPU (Central Processing Unit), Keyboard, Mouse, Applications and Network
    5. None of these

    Answer: 1. Monitor, CPU (Central Processing Unit), Keyboard, Mouse, Software and Network
    The basic components that make up a computer system are monitor, CPU, keyboard, Mouse, software and network (eg. modem). Monitor, CPU, keyboard, mouse and networked communication devices are all hardware components. Hardware is useless without software to run on it. Software is any program that you load onto a computer-the operating system, games or applications, etc.

  5. Sending an e-mail is same as
    1. writing a letter
    2. drawing a picture
    3. talking on phone
    4. sending a package
    5. None of these

    Answer: 1. writing a letter
    E-mail is the sending of message electronically on computer using internet. It is similar to writing a traditional letter on paper. Email consists of 3 vital components-envelope, header and body of the message. The envelope is something that an email user will never see since it is part of the internal process by which an email is routed Traditional postal offices facilitate letter transfer. Similarly, mail transfer agents (MTA) facilitate email transfers. Header consists of information like To, from, Date, subject. Body of email comprises of the actual message to be sent.

  6. For selecting or highlighting, which of the following is generally used?
    1. Icon
    2. Keyboard
    3. Mouse
    4. Floppy Disk
    5. None of these

    Answer: 3. Mouse
    For selecting or highlight text or any another object like icon, either a mouse or keyboard can be used. Generally a mouse is used because of its convenience. To highlight using mouse, position your cursor at the beginning of the text you want to highlight. Press and hold primary mouse button (left button); while holding the button, move the cursor to the end of the text and let go of the button.

  7. What does storage unit provide?
    1. Place for typing data
    2. Storage for information and instruction
    3. Place for printing information
    4. All of the above
    5. None of these

    Answer: 2. Storage for information and instruction
    Storage unit (or devices) holds data, instructions and information for future use. eg. hard disks, optical disks, memory cards, etc.

  8. Which type of memory is closely related to processor?
    1. Main Memory
    2. Secondary Memory
    3. Disk Memory
    4. Tape Memory
    5. None of these

    Answer: 1. Main Memory
    Main memory (or RAM) is closely related to processor (or CPU). It is the working memory of the computer which stores data and instructions temporarily to be accessed by CPU till the processing gets completed. Data stored in RAM provides quick retrieval to CPU.

  9. Which device is used to access your computer by other computer or for talk over phone?
    1. RAM
    2. CD ROM Drive
    3. Modem
    4. Hard Drive
    5. None of these

    Answer: 3. Modem
    Modem is a communication device that helps one computer to communicate with another computer. Modem modifies telephone communications into a form that can be processed by a computer. Modems also modifies computer output into a form that can be transmitted across standard telephone lines.

  10. Permanent Memory in computer is called
    1. RAM
    2. ROM
    3. CPU
    4. CD ROM
    5. None of these

    Answer: 2. ROM
    The permanent memory of computer is ROM (Read only memory). Unlike main memory (RAM), once data has been written onto a ROM chip, it can not be removed and can only be read. In ROM, data has been pre recorded. It contains critical programs such as the program that boots the computers.

  11. Different applications and documents of windows desktop are represented by
    1. Symbols
    2. Lebels
    3. Graph
    4. Icons
    5. None of these

    Answer: 4. Icons
    A computer icon refers to a small picture on a computer screen that represents a specific file, directory, window, option, program or application. Clicking on an item will start the associated application, program or open the associated file, directory or window.

  12. Scanner scans
    1. Picture
    2. Text
    3. Both Picture and Text
    4. Neither Picture Nor Text
    5. None of these

    Answer: 3. Both Picture and Text
    A scanner is an input device that scans or reads images, printed text, handwriting and converts it to a digital image. It captures images from photographic prints, posters, magazine pages, and similar sources for computer editing and display.

  13. What does ‘C’ represent in MICR?
    1. Code
    2. Column
    3. Computer
    4. Character
    5. None of these

    Answer: 4. Character
    MICR (Magnetic ink character recognition) is a character recognition. technology used mainly by the banking industry to ease the processing and clearance of cheques and other documents.

  14. On which button does help menu exist?
    1. End
    2. Start
    3. Turn off
    4. Restart
    5. None of these

    Answer: 2. Start
    The start button in Microsoft windows launches the start menu, which is the main access point to both the user programs that are installed on the system and the system resources which control the behaviour of OS. One option on start menu is “Help and Support” which is the first place to go if you are looking for information on how to do something in the OS.

  15. By CD you can
    1. Read
    2. Write
    3. Read and Write
    4. Either Read or Write
    5. None of these

    A compact disk (CD) is a plastic fabricated, circular medium for recording, storing and playing back audio, video and computer data. Initially, CDs were read only but new technology allows users to record as well. Some variations of the CD include-CD ROM, CD-RW, CD-W, etc.

  16. Micro instructions are kept in
    1. main memory
    2. control store
    3. cache
    4. Either (1) or (2)
    5. None of these

    Answer: 2. control store
    The control store contains the set of micro-instructions that are used to execute all of the programs run on that computer. The control store is referenced by the MPC, the micro-program counter, a device similar to a register. The MPC stores the location of the micro instruction that is currently being executed.

  17. In HTML coding which out of the following attribute of HR tag suppresses the shading effect and fields a solid line
    1. Noshade
    2. Nocolor
    3. Nohr
    4. Either (1) or (2)
    5. None of these

    Answer: 1. Noshade
    No shade attribute of HR (Horizontal Rule) tag in HTML specifies whether the horizontal rule (or line) should be displayed as flat (one solid color) instead of three dimensional (shaded color).

  18. Internet domains are classified by their functions. In that regard “.com” represents
    1. Government
    2. Commercial
    3. Non-profit organisation
    4. Internet service provider
    5. None of these

    Answer: 2. Commercial
    .Com is the most common of all domain suffixes. It is a toplevel domain (TLD). It stands for “commercial”, It was originally created to represent a website that has a “commercial” content.

  19. HTTP in URL stands for
    1. Hyper Text to Point
    2. Hyperlink for Tiny Text Protocol
    3. Hyper Text Transfer Protocol
    4. Highlighted Text Through Pictures
    5. None of these

    Answer: 3. Hyper Text Transfer Protocol
    HTTP (hyper text transfer protocol) refers to the underlying protocol used by the world wide webs. It defines how messages are formatted and transmitted, and what actions web serves and browsers should take in response to various commands.

  20. The “Nyquist theorem” specifies the minimum sampling rate to be
    1. equal to lowest frequency of signal
    2. equal to highest frequency of signal
    3. twice the bandwidth of a signal
    4. twice the highest frequency of a signal
    5. None of these

    Answer: 3. twice the bandwidth of a signal
    The Nyquist Theorem, also known as the sampling theorem, is a principle that engineers follow in the digitization of analog signals. Any analog signal consists of components at various frequencies. The highest frequency component is an analog signal determines the bandwidth of that signal. The higher the frequency, the greater the bandwidth, if all other factors are held constant. Suppose the highest frequency component, in hertz, for a given analog signal is fmax. So, according to Nyquist theorem, the sampling rate must be at least 2 fmax, or twice the highest analog frequency component. If the sampling rate is less than 2 fmax, some of the highest frequency components in the analog input signal will not be correctly represented in the digitized output.

  21. Memory allocation at the run time is known as
    1. Static memory allocation
    2. Dynamic memory allocation
    3. Paging
    4. Demanding
    5. None of these

    Answer: 2. Dynamic memory allocation
    Dynamic memory allocation is the allocation of memory storage for use in a computer program during the runtime of that program. It can be seen also as a way of distributing ownership of limited memory resources among many pieces of data and code.

  22. Which of the following protocols is used by Internet mail?
    1. HTTP
    2. TCP/IP
    3. FTP
    4. HTMP
    5. None of these

    Answer: 1. HTTP
    Hypertext Transfer Protocol, the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web page. FTP, TCP/IP is the protocols which uses for remote host.

  23. Which of the following statements is true about RAM?
    1. RAM stands for Random Access Memory
    2. RAM does not store any information permanently
    3. RAM is also known as main memory of a computer
    4. All of the above
    5. None of these

    Answer: 4. All of the above
    A computer’s main or primary memory is called as RAM (random access memory). It is the working memory which is used to store data and programs on a temporary basis. The RAM is compared to short-term or volatile memory, as it stores data that is actively used while the system is on.

  24. A policy on firewalls needs not
    1. include log reports of database
    2. include guidelines for assessment of logs
    3. ensure that it is physically secured
    4. ensure that it is logically secured
    5. None of these

    Answer: 4. ensure that it is logically secured
    A firewall is a system designed to prevent unauthorized access to or from a private network. In protecting private information, a firewall is considered a first line of defense, it can’t however, be considered the only such line. Firewalls are generally designed to protect network traffic and connections and therefore do not attempt to authenticate individual users when determining who can access a particular computer or network. While designing firewall security policy, it is important to ensure it is physically secured. That is various components such as routers, firewall servers must be restricted to individuals who are authorized to access. Firewall consoles and management tools must be locked and secured in a network cabinet with control mechanisms over physical access such as biometrics, key and lock or access cards, etc.

  25. The script which is designed to receive value from the web users is—
    1. Web script
    2. Power C91 script
    3. Java Script
    4. All of the above
    5. None of these

    Answer: 3. Java Script
    Java Script is most commonly used as a client side scripting language. This means that Java Script code is written into an HTML page. When a user requests an HTML page with Javascript in it, the script is sent to the browser and it’s up to the browser to do something with it.

  26. The operating system is the most common type of ______ software.
    1. communication
    2. application
    3. system
    4. word-processing software
    5. None of these

    Answer: 3. system
    Software can be divided into 2 types- application software and system software. System software is further divided into 3 types:
    • System control programs: controls the execution of programs, manage the storage and processing resources of the computer and perform other management & monitoring function. The most important of these programs is the operating system. Other examples are DBMS and communication monitors.
    • System support programs: provide routine service functions to other computer programs & computer users eg. utilities, libraries, etc.
    • System development programs: assist in the creation of application programs, eg. language translators such as BASIC interpreter & application generator.

  27. ____ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
    1. Servers
    2. Embedded computers
    3. Robotic computers
    4. Mainframes
    5. None of these

    Answer: 2. Embedded computers
    An embedded system is a computer system with a dedicated function within a larger mechanical or electrical system, often with a real-time computing mechanism. They are selfcontained computer devices that their own programming and typically do not receive input from user nor do they interact with other systems. They can range from portable devices such as digital watches, MP3 players, cars, electronic thermostat, etc, to large stationary installations like traffic lights, factory controllers or the system controlling nuclear power plants.

  28. A toll used to find a synonym or antonym for a particular word
    1. Dictionary
    2. Summary
    3. Thesaurus
    4. Spell check
    5. None of these

    Answer: 3. Thesaurus
    A thesaurus is a book of synonyms. It shows words of the same or similar meaning as the word selected.

  29. In this processing, a number of jobs are put together and executed as a group
    1. Batch processing
    2. Serial processing
    3. Multi programming
    4. Multi threaded programming
    5. None of these

    Answer: 1. Batch processing
    Batch processing is a form of data processing in which a number of input jobs are grouped for processing during the same machine run. No user interaction is required once batch processing is underway. for eg. monthly bills for utilities, generating monthly or bi- weakly payrolls are typically generated by batch processing.

  30. The process of finding and correcting errors in a program is a process called
    1. Debugging
    2. Compiling
    3. Executing
    4. Run
    5. None of these

    Answer: 1. Debugging
    Debugging is the process of locating and fixing errors (called bugs) in a computer program that can cause it to crash, behave erratically or be susceptible to hacker attack.

  31. Which out of the following commands would you use to change your password in UNIX system?
    1. Pass
    2. cn pass
    3. password
    4. setpass
    5. None of these

    Answer: 2. cn pass
    Pass is the standard Unix password manage. All passwords live in ~/. password-store and pass provides commands for adding, editing, generating and retrieving passwords. –cn pass is the command for changing passwords in UNIX.

  32. If there are 5 routers and b networks in an internetwork using link state routing, how many routing tables are there?
    1. 1
    2. 5
    3. 6
    4. 11
    5. None of these

    Answer: 2. 5
    2. 5

  33. A scripting language similar to HTML and which runs only on a browser is
    1. FORTRAN
    2. BASIC
    3. FOXPRO
    4. Java Script
    5. None of these

    Answer: 4. Java Script
    Java Script is a simple, lightweight, interpreted, cross platform programming language with object oriented capabilities that can be written directly into HTML documents to facilitate a more interactive user interface to a static HTML page. It runs in web browsers like Netscape communicator and Microsoft IE and is the defacto scripting language for HTML pages.

  34. In which technique, data is stored in several disk units by breaking them into smaller pieces and storing each piece in separate disk?
    1. EDI
    2. RAID
    3. DISK
    4. Floppy
    5. None of these

    Answer: 2. RAID
    RAID, an acronym for Redundant Array of Independent Disks is a technology that provides increased storage functions and reliability through redundancy. This is achieved by combining multiple disk drive components into a logical unit, where data is distributed across the drives in one of several ways called “RAID levels”.

  35. The most popular network protocol whose routing capabilities provide maximum flexibility in an enterprise wide network is known as
    1. TCP
    2. FTP
    3. IP
    4. TCP/IP
    5. None of these

    Answer: 4. TCP/IP
    Transmission control Protocol/Internet Protocol (TCP/IP) is the most popular network Protocol, and the basis for the Internet. Its routing capabilities provide maximum flexibility in an enterprisewide network. In windows XP, TCP/IP is automatically installed. On a TCP/IP network, you must provide IP addresses to clients. Clients may also require a naming service or a method for name resolution.

  36. HTML stands for
    1. Hyper Text Making Links
    2. Hyper Text Markup Language
    3. Higher Textual Marking of Links
    4. Hyper Text Mixer of Links
    5. None of these

    Answer: 2. Hyper Text Markup Language
    HTML (Hyper text markup language) is the main mark up language for creating web pages and other information that can be displayed in a web browser.

  37. All formula in Excel start with
    1. %
    2. +
    3. =
    4. –
    5. None of these

    Answer: 3. =
    When creating formulas in Microsoft Excel, you always start by typing the equal sign. =). You type it in the cell where you want the answer to appear.

  38. You can print
    1. A range of cells by range name
    2. An entire worksheet
    3. A single worksheet
    4. All of the above
    5. None of these

    Answer: 4. All of the above
    In Excel, you can print either the entire worksheet or a specific portion of the worksheet. Specific portion can be printed by setting print areas and print titles on a worksheet using the “print Area” menu item on the file menu. You can select the range of cells that you want to set as your print area.

  39. Which of the following fill effects can you use for the slide background?
    1. Gradient
    2. Texture
    3. Picture
    4. All of the above
    5. None of these

    Answer: 4. All of the above
    Fill effects allows you to create color gradients, selected textured or patterned backgrounded or set a picture for your slide background.

  40. Which of the following are types of sound files?
    1. LOG files
    2. DAT files
    3. WAV files
    4. DRV files
    5. None of these

    Answer: 3. WAV files
    WAVE or WAV (waveform audio file format) is a Microsoft and IBM audio file format standared for storing an audio bitstream on PCs.

Leave a Comment