computer literacy and knowledge questions and answers – set 8

Best and important Computer Literacy and Knowledge questions with answers and explanations – multiple-choice questions (MCQs) – for competitive and government exams – UPSC, Civil Service prelims, CDS, NDA, SSC CGL, CHSL, CPO, MTS, ASRB, Junior Court Assistant exams, previous year computer solved questions, central and state government exams

Computer literacy and knowledge Questions and Answers – Set 8

  1. The blinking point which shows your position in the text is called
    1. Blinker
    2. Cursor
    3. Causer
    4. Pointer
    5. None of these

    Answer: 2. Cursor
    Explanation:
    A cursor refers to a movable indicator on a computer screen identifying the point that will be affected by input from the user.

  2. For seeing the output, you use
    1. Monitor
    2. Keyboard
    3. Mouse
    4. Scanner
    5. None of these

    Answer: 1. Monitor
    Explanation:
    Any information that has been processed and comes from a computer or computer device is considered output. When some one is viewing output, they’re seeing it on a output device such as monitor or a hard copy print out or sound from speakers.

  3. For opening and closing of the file in Excel, you can use which bar?
    1 Formatting
    2. Standard
    3. Title
    4. Formatting or Title
    5. None of these

    Answer: 3. Title
    Explanation:
    Title bar is located along the top of window or a dialog box that displays the name of the window or software program being used. On the right hand side of title bar, maximize (open window). minimize and close button appears.

  4. Which of the following controls the manner of interaction between the user and the operating system?
    1. user interface
    2. language translator
    3. platform
    4. screen saver
    5. None of these

    Answer: 1. user interface
    Explanation:
    User interface refers to the visual part of computer application or operating system through which a user interacts with a computer or a software. It determines how commands are given to the computer or the program and low information is displayed on the screen. Three main types of user interfaces are Command language, menus and Graphical user interface.

  5. You click at B to make the text
    1. Italics
    2. Underlined
    3. Italics and Underlined?
    4. Bold
    5. None of these

    Answer: 4. Bold
    Explanation:
    Ctrl + “B” is the keyboard shortcut for making the entire text bold in a document.

  6. Which part is the “brain” of the computer?
    1. CPU
    2. Monitor
    3. RAM
    4. ROM
    5. None of these

    Answer: 1. CPU
    Explanation:
    CPU (Central Processing Unit) is referred to as brain of computer as most of the processing of computer system is performed by it. It executes instructions and provides the resultant output. It is responsible for all computational, arithmetic logical and data processing tasks performed by the computer

  7. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is_____.
    1. memory-only
    2. write-only
    3. read-only
    4. run-only
    5. None of these

    Answer: 3. read – only
    Explanation:
    ROM (Read Only Memory) is a “built-in” memory and that is capable of holding data and having that data read from the chip, but not written to. Data is prepressed or ROM chip by manufacturer. Unlike RAM, ROM retains its contents even when the computer is turned off. ROM is referred to as being non-volatile whereas RAM is volatile.

  8. Help Menu is available at which button?
    1. End
    2. Star
    3. Turnoff
    4. Restart
    5. None of these

    Answer: 2. Star
    Explanation:
    The start button in Microsoft windows launches the start Menu, which is the main access point to both the user programs that are installed on the system and the system resources which control the behaviour of OS. One option on start menu is “Help and Support” which is the first place to go if you are looking for information on how to do something in the OS.

  9. You can keep your personal files/folders in
    1. My folder
    2. My Documents
    3. My Files
    4. My Text
    5. None of these

    Answer: 2. My Documents
    Explanation:
    My Documents folder is a component of the user profile that is used profile that is used as a unified location for storing personal data. By default, My Documents folder is a folder in the user’s profile that is used as a default storage location for saved documents.

  10. A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a(n)____.
    1. supercomputer
    2. minicomputer
    3. laptop
    4. server
    5. None of these

    Answer: 4. server
    Explanation:
    A network server is a computer designed to process requests and deliver data to other (clients) computers over a local network or the Internet.
    Server is the most powerful computer in the network. It manages network resources on the net work. They are configured with additional processing, memory and storage capacity to handle the load of serving clients, eg. Web servers, Proxy servers, FTP servers, Online game servers.

  11. A web site’s main page is called its
    1. Home Page
    2. Browser Page
    3. Search Page
    4. Bookmark
    5. None of these

    Answer: 1. Home Page
    Explanation:
    A home page/index page/main page is the initial page a person sees when he or she opens a website on the internet. It serves as a table of contents for the website.

  12. Data that is copied from an ap plication is stored in the
    1. Driver
    2. Terminal
    3. Prompt
    4. Clipboard
    5. None of these

    Answer: 4. Clipboard
    Explanation:
    A clipboard is a special file or memory area (buffer) where data is stored temporarily before being copied to another location. Many word processor, for example, use a clipboard for cutting and pasting. When you cut a block of text, the word processor copies the block of the text to the clipboard; when you paste the block, the word processor copies it from the clipboard to its final destination.

  13. Changing an existing document is called the document.
    1. creating
    2. deleting
    3. editing
    4. adjusting
    5. None of these

    Answer: 3. editing
    Explanation:
    Editing a document involving opening the existing document in the appropriate editor application, then saving the changes and checking the document back in. Document you edit are automatically check out. eg. in MS Word, depending on a document, its final format and its purpose. the editing can involve checking grammar and spelling, content, word choice and formatting.

  14. In a spreadsheet program the contains related worksheets and documents.
    1. workbook
    2. column
    3. cell
    4. formula
    5. None of these

    Answer: 1. workbook
    Explanation:
    An Excel workbook is a file used by a Microsoft Excel spreadsheet application. Excel workbooks are actually sets of spreadsheet pages (or work sheets), each of which can include separate or co-dependent data.

  15. Which of the following is not an input device?
    1. Keyboard
    2. Monitor
    3. Joystick
    4. Microphone
    5. None of these

    Answer: 2. Monitor
    Explanation:
    A computer monitor is an output device that displays the result of the processing to the user on display or screen of the computer.

  16. A device operating at the physical layer is called a
    1. Bridge
    2. Router
    3. Repeater
    4. All of the above
    5. None of these

    Answer: 3. Repeater
    Explanation:
    A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power or onto the other side of an obstruction, so that the signal can cover longer distances. Because repeaters work with the actual physical signal and do not attempt to interpret the data being transmitted, they operate on the physical layer, the first layer of the OSI model.

  17. Which of the following computer languages is a mathematically oriented languages used for scientific problems?
    1. FORTRAN
    2. COBOL
    3. LISP
    4. PROLOG
    5. APPLE

    Answer: 1. FORTRAN
    Explanation:
    FORTRAN (Formula Translation) is a third- generation programming language that was designed for use by engineers, Mathematicians and other users and creators of scientific algorithms.

  18. Which command be used to clear the screen and display the operating system prompt on the first line of the display?
    1. Cd
    2. Md
    3. Cls
    4. Rename
    5. None of these

    Answer: 3. Cls
    Explanation:
    The cls command is an internal command in Microsoft operating systems. Running the cls command at the command promt would clear the screen of all previous text and only return the prompt.

  19. Name a system/organisation which operates with an objective of creating a unified international tranaction processing and transmission to meet the ever-growing telecommunications requirements of the banking industry.
    1. Internet
    2. CHIPS
    3. CHATS
    4. SWIFT
    5. None of these

    Answer: 4. SWIFT
    Explanation:
    SWIFT stands for society for worldwide Internet financial Tele communications. The objective of the company is for the collective benefit of the members of the company, the study, creation, utilisation and operation of the means necessary for the tele communication. transmission and routing of private, confidential and proprietary financial messages.

  20. SCANDISK command is used to
    1. Analyze the hard disk error
    2. Diagnose the hard disk error
    3. Report the status of files on disk
    4. All of the above
    5. None of these

    Answer: 4. All of the above
    Explanation:
    Microsoft Scan-Disk is a diag nostic utility includes in MS-DOS and Windows ax. It checks & repairs file systems errors on a disk drive. Scan disk included a more user-friendly interface than chkdsk, more configuration options and the ability to detect and recover from physical errors on the disk.

  21. In a ____ topology, if there are n devices in network, each de vice has n-1 ports for cables.
    1. Mesh
    2. Bus
    3. Star
    4. Ring
    5. None of these

    Answer: 1. Mesh
    Explanation:
    In a mesh topology, each device is connected to another device in a network. It is a way of interconnecting devices on a network, eg. if there are N devices, each device will have (n-1) connections to get to every other device in a network. It is most expensive topology structure as it requires extensive cabling.

  22. Which of the following is neces sary for multiplexing?
    1. QAM
    2. high capacity data links
    3. modems
    4. parallel transmission
    5. None of these

    Answer: 3. modems
    Explanation:
    In multiplexing, the signals that carried by the channel are analague and as such susceptible to picking up interference. This can’t be removed from the signal. Each channel in the scheme needs a dedicated modem at each end of the channel to place the signal on a carrier and remove it at the far end.

  23. In MS-Word WYSIWYG stands for
    1. preview
    2. what you see is what you get
    3. what you see is where you get
    4. print
    5. None of these

    Answer: 2. what you see is what you get
    Explanation:
    WYSIWYG is a short for what you see is what you get. A WYSIWYG application is one that enables you to see on the screen exactly what will appear when the document is printed. This differs, for example, from word processors that are incapable of displaying different fonts & graphics on the display screen even though the formatting codes have been inserted into the file. WYSIWYG is especially popular for desktop publishing

  24. The primary purpose of shut down procedure in UNIX system is that
    1. All user’s been informed that system is being switched off
    2. All active process may be properly closed
    3. The power to disk is shut off
    4. Both (1) and (2)
    5. None of these

    Answer: 2. All active process may be properly closed
    Explanation:
    It is important to shut down system properly. There are many processes running in the background all the time. These processes are managing the system and keep of lot of files open. When the system’s power is switched off directly, these files are not closed properly and may become corrupted which in turn can cause serious file system damage.

  25. The circuit board that contains RAM chips is known as a:
    1. CMOS.
    2. SIMM.
    3. ROM.
    4. RAM board.
    5. None of these

    Answer: 2. SIMM.
    Explanation:
    A SIMM (single-in-line memory module) is a module containing one or several random access memory (RAM) chips on a small circuit with pins that connect to the computer motherboard. SIMMS usually come in memory chip multiples of four megabytes.

  26. The permanently etched program in ROM that automatically begins executing the computer’s instructions is the:
    1. ROM.
    2. CMOS.
    3. RAM.
    4. BIOS.
    5. None of these

    Answer: 4. BIOS.
    Explanation:
    BIOS (Basic Input/Output system), is the built-in software that determines what a computer can do without accessing programs from a disk. The BIOS is typically placed in a ROM chip that comes with the computer. This ensures that the BIOS will always be available and will not be damaged by disk failures. It also makes it possible for a computer to boot itself.

  27. An image in a web-page can be aligned and using HTML coding.
    1. Left
    2. Right
    3. Centre
    4. Both (1) and (2)
    5. None of these

    Answer: 4. Both (1) and (2)
    Explanation:
    In HTML, the ‘align’ attribute is used to align images to the left or right side of a page, allowing text to wrap around the image. HTML uses the align attribute in the following way :

    <img src=”image.jpg” align= “right”> or <img src=” “image.jpg” align=”left”>.

  28. Most news readers presents newsgroups articles in:
    1. threads
    2. mail
    3. column
    4. Row
    5. None of these

    Answer: 1. threads
    Explanation:
    A newsgroup is a forum on the internet for textual discussions of specific subjects. A newsgroup essentially is a discussion group that generally in volves an article that serves as a stimulus for message postings that form conversational threads. A thread is an array of multiple posts on the same subject matter of the original post.

  29. The sharing of a medium and its path by two or more devices is called
    1. modulation
    2. demodulation
    3. multiplexing
    4. demultiplexing
    5. None of these

    Answer: 3. multiplexing
    Explanation:
    Multiplexing means combining multiple streams of information for transmission over a shared medium. In this, independent pair of senders & receiver devices share a transmission medium.

  30. Antivirus software is an example of
    1. Business software
    2. An operating system
    3. A security utility
    4. An office suite
    5. None of these

    Answer: 3. A security utility
    Explanation:
    Antivirus software like NORTON is a security utility program. It is asoftware that prevents, searches for, detect and remove software viruses and other malicious software like worms. trojans, adware etc. Installing anti-viruses software on your computer system protects your system from future infection.

  31. A (n)____ backup contains copy of every program, data, and system file on a computer.a
    1. Restoration
    2. Bootstrap
    3. Differential
    4. Full
    5. None of these

    Answer: 4. Full
    Explanation:
    In a full or complete backup. every file of data is copied from one computer to another form of media, including the operating system, all applications & software, all user created files and all your settings.

  32. The most common subtotal used Subtotals command is the_____ function, which causes Excel to display a sum each time the control filed change.
    1. ADD
    2. SUM
    3. TOTAL
    4. LIST
    5. None of these

    Answer: 2. SUM
    Explanation:
    The SUM function in excell takes all of the values in each of the specified cells and totals their values. The syntax is :
    SUM (value1: value 2 :…..).
    you can enter constant, cell, range of cells in the above SUM formula.

  33. Which of the following are ob jects in an access database?
    1. table, form
    2. queries, reports
    3. macros, modules
    4. All of the above
    5. None of these

    Answer: 4. All of the above
    Explanation:
    When you use Access to man age all of information in one file, then you can use objects within an access database file. These objects are:
    • tables to store data.
    • Queries to find and retreive just the data you want.
    • forms to view, add and update data in tables.. Reports to analyze or print data in a specific layout.
    • Macros can be thought of as a simplified programming language. Which you can use to add functionality to database. It contains actions that performs tasks such as opening a report, running a query, etc.
    • Module is a collecton of declarations, statements & procedures that are stored together as a unit. Modules can be written in visual basic for applications (VBA) programming language.

  34. A series 100 POST error code indicates a problem with the:
    1. Hard drive
    2. ROM and RAM
    3. System board
    4. Video adapter
    5. None of these

    Answer: 3. System board
    Explanation:
    A series of error codes from 100 to 199 indicates problem with system board. System board error code 100 means “cannot create another system sempahore”. This error code may also display as “ERROR – TOO – MANY – SEMAPHORES” or as the value 0x64.

  35. When SHADOWING is enabled in a computer BIOS:
    1. Instructions stored in vari ous ROM chips are copied into
    2. Values are stored twice in the memory for redundancy
    3. The conventional memory is re-mapped to the top of the
    4. Data stored in RAM chips on adapter cards are shadowed 5. None of these

    Answer: 1. Instructions stored in vari ous ROM chips are copied into
    Explanation:
    BIOS shadowing is the process in which the contents of the ROM are being copied to the RAM allowing the computer to access that information quicker. Some computer BIOS set ups may allow the user to enable and disable this feature.

  36. Devices, such as monitors and printers, that are connected to the computer are called:
    1. Processing devices
    2. System devices
    3. Peripheral devices
    4. Input devices
    5. None of these

    Answer: 3. Peripheral devices
    Explanation:
    A peripheral device is one which is connected to a host computer but is not a part of the core computer architecture. They are the hardware items for your computer like mouse, keyboard. printer, monitor, etc. They are connected with a computer through several I/O interfaces such as communications (com), universal serial bus (USB) and serial parts.

  37. In addition to keying data directly into the database, data entry can be done from a(n):
    1. Input form
    2. Table
    3. Field
    4. data dictionary
    5. None of these

    Answer: 1. Input form
    Explanation:
    You can enter data directly into the tables in a database. How ever, you can make the process of entering and working with data much easier and more accurate of you use forms. Three types of forms can be created: Data entry (or input) forms; Switch boards and custom dialog boxes. You use data entry forms to add data to your database or view, edit and delete existing data.

  38. A scanner scans____.
    1. Pictures
    2. Text
    3. Both Pictures nor Text
    4. Neither Pictures nor Text
    5. None of these

    Answer: 3. Both Pictures nor Text
    Explanation:
    A scanner is an input device that reads or scans an image and converts it into a digital format. It captures images from photographic prints, posters, magazine pages, print out of documents, etc. for computer editing and display.

  39. CPU stands for:
    1. central production unit
    2. computer processing unit
    3. central processing unit
    4. computer primary unit

    Answer: 3. central processing unit
    Explanation:
    A CPU (Central Processing Unit) is a silicon integrated circuits sometimes called a computer chip. It carries out the instructions of a computer program by performing the basic arithmetical, logical and I/O operations of the system.

  40. Computer language used on internet is
    1. BASIC
    2. COBOL
    3. Java
    4. Pascal
    5. FORTRAN

    Java is a programming language expressely designed for use in the distributed environment of the internet. It can be used to create complete applications that may run on a single computer or be distributed among servers and clients in a network. It can be used to built applets which are used as a part of a web page. Applets make it possible for a web user to interact with the web page.

Leave a Comment