0% found this document useful (0 votes)
364 views506 pages

500 Questions PDF

Uploaded by

Rahul Yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
364 views506 pages

500 Questions PDF

Uploaded by

Rahul Yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 506

1. Which is not a RAM Type?

(A) DRAM
(B) SRAM
(C) SDRAM
(D) EPRAM
(E) None

Ans (D) EPRAM

Use My Code YOGESH To get


2. RAM is always located on the motherboard. If you manually want to install
the RAM then, the first step is?
(a) Do not install it yourself.
(b) Unplug the cables
(c) Shutdown the Computer
(d) Both (B) & (C)
(E) None

Ans Both (B) & (C)


3. When you change the color and background of a chart in a spreadsheet, you are:
(A) Formatting
(B) Merging
(C) Painting
(D) Calculating
(E) None

Ans (A) Formatting


4. What is the name of the informational video series released in the Health
Ministry’s social media platforms?
(A) COVID Warrior
(B) COVID GuruKool
(C) COVID DRONA
(D) COVID ASTRA
(E) None

Ans (B) COVID GuruKool


5. E-governance is:
A. Improving the way the government functions
B. Making employees aware of the basics of computing
C. Delivering public services by means of internet
D. Framing of laws by the government for online interactions
E. None

Ans (C) Delivering public services by means of internet


6. Mapmakers are GPS to?
a) Store Geographical Information
b) Use Geographical Information
c) View Geographical Information
d) Store, Use & View Geographical Information
e) None of these

Ans (D)
7. From what has the term ‘Wi-Max’ been derived?
a) Worldwide Interoperability for Microwave Access
b) World Interconnection for Microwave Access
c) Worldwide Interchangeability for Microwave Access
d) Worldwide Interconnection for Multiple Access
e) None

Ans (a) Worldwide Interoperability for Microwave Access


8: Superscript, subscript, outline, emboss, engrave all these are collectively
known as?
a) Font Styles
b) Font Effects
c) Word Art
d) Text Effect
e) None

Ans (b) Font Effects


9. A system bus:
A. runs at 100 MHz
B. Transports data between the CPU and memory.
C. Uses a set of serial electrical paths.
D. Is always the same size.
E. None

Ans (B)
10: How you can manually break up the line breakup in MS-Word?
a) Space + Enter
b) Ctrl + Enter
c) Alt + Enter
d) Shift + Enter
e) None

Ans (D) Shift + Enter


11: To split a table in MS-Word, which shortcut key is used?
a) Alt + Shit + Ctrl
b) Alt + Shift + Del
c) Ctrl + Shift + Enter
d) Alt + Ctrl + Enter
e) None

Ans (C) Ctrl + Shift + Enter


12: What is the Portrait & Landscape are called in MS-Word?
A. Page Size
B. Paper Layout
C. Page Orientation
D. All of these
E. None

Ans (C) Page Orientation


13: The shortcuts keys, Ctrl+ Shift + plus sign are used for character formatting
of the following:
A. Underline Words, Not Spaces
B. Superscript
C. Case of Letters
D. All Capitals Letters
E. None

Ans (B) Superscript


Pressing the same key combination again makes the text normal.
Ctlr + = is used for subscript.
14. Bar code symbols are ready by the bar-code reader by using:
A. Photoelectric Scanner
B. Printer
C. Keyboard
D. Mouse
E. None

Ans (A) Photoelectric Scanner


15. Which is not a type of operating system?
(A) Real Value Operating System
(B) Distributes Operating System
(C) Network Operating System
(D) Time-Sharing Operating System
(E) None

Ans (A) Real Value Operating System


16. Which is not a Network device?
(A) Switch
(B) Hub
(C) Star
(D) Router
(E) None

Ans (C) Star


17. Which network security feature prevents users on a network from using
program and information that is unauthorized?
A. Firewall
B. Antivirus
C. Jammer
D. Security Plus
E. None

Ans (A) Firewall


18. In MS-Word, you can detect spelling and grammar errors by pressing the key(s):
a) Shift + F7
b) Ctrl + F7
c) Alt + F7
d) F7
e) None

Ans (D) F7
19: Unsolicited commercial email is commonly known as?
A. Spam
B. Ce-Mail
C. Hoaxes
D. Hypertext
E. None

Ans (A) Spam


20. Which of the following are sequentially arranged steps for installing a
software?
(a) Download, Run, Install
(b) Run, Download, Install
(c) Run, Install, Download
(d) Download, Install, Run
(e) None

Ans (d) Download, Install, Run


21. Which of the following is not a Disk Operating System (DOS) Command?
(A) del
(B) dir
(C) how
(D) format
(E) None

Ans (C) how


22. What type of component may come in a dual-core version?
(a) RAM
(b) SSD
(c) PCI Card
(d) CPU
(E) None

Ans (d) CPU


23. DoS is an acronym for:
(a) Data Operating System
(b) Disc Operating System
(c) Date Operating Section
(d) Disc Operating Station
(e) None of these

Ans (e)
24. One ZB is made up of _______ :
(a) 1024 PB
(b) 1024 EB
(c) 1024 BB
(d) 1024 YB
(e) None

Ans (b)
25. Which is non-volatile memory?
(A) Data is saved regardless of power Off
(B) Lose data when power is Off
(C) Not related to any kind of computer memory
(D) Same as Cache Memory
(E) None

Ans (A) Data is saved regardless of power Off


26. The primary memory of a computer includes:
(a) RAM only
(b) CACHE only
(c) RAM and CACHE both
(d) Hard Device only
(e) None

Ans (a) RAM only


27. What is the full form of GUI in terms of computers?
(a) Graphical user Instrument
(b) Graphical unified interface
(c) Graphical unified instrument
(d) Graphical user interface
(e) None

Ans (d) Graphical User Interface


28. In which of the following form, data is stored in the computer?
(a) Decimal
(b) Binary
(c) Hexa-Decimal
(d) Octal
(e) None

Ans b) Binary
29. In MS-Excel, which of the following formula is not entered correctly?
(A) =22+825
(B) 137+549
(C) =B33+V32
(D) =B2/A15
(E) None

Ans (B) 137+549


30. For each instruction of a program in the memory, the CPU goes through a:
(A) decode – fetch – execute sequence
(B) execute – store – decode sequence
(C) fetch – decode – execute sequence
(D) fetch – execute – decode sequence
(E) None

Ans (C) fetch – decode – execute sequence


31. Which of the following is the fastest memory?
a) Secondary Memory
b) Auxiliary Memory
c) Cache Memory
d) Virtual Memory
e) None

Ans (C) Cache Memory


32. Which is the correct arrangement of memories types from highest to
lowest speed from flowing options?
(A) secondary storage, main memory, cache, registers
(B) registers, cache, secondary storage, main memory
(C) registers, cache, main memory, secondary storage
(D) cache, registers, main memory, secondary storage
(E) None

Ans (C) registers, cache, main memory, secondary storage


33. In Microsoft PowerPoint, the best way to insert a new slide in a
presentation is to use ___________
(A) Normal View
(B) Special View
(C) Slide Show View
(D) Slide Sorter View
(E) None

Ans (D) Slide Sorter View


34. In Microsoft Excel, which one of the following tools allows extracting the
significance from a large detailed data set?
(A) Data Extractor
(B) Data Verifier and Validator
(C) Pivot Table
(D) Vertical Hash Lookup
(E) None

Ans (C) Pivot Table


35. In a computer with Windows operating systems, files are stored in
locations called?
(A) Storages
(B) Programs
(C) Directories
(D) Stack
(E) None

Ans (C) Directories


36. In the email address [email protected], the “@” stands for:
(A) At
(B) At the rate
(C) At rate
(D) All are correct
(E) None

Ans (A)
37. In the Internet business, ISP stands for:
(A) Internet System Protocol
(B) Internet Service Provider
(C) Internet System Provider
(D) Internet Service Protocol
(E) None

Ans (B) Internet Service Provider


38. In MS-Word, what is the smallest font size generally that we can use to text
in Word?
(A) 8
(B) 7
(C) 1
(D) 4
(E) None

Ans (A) 8
39. The files can be saved in which of the following device?
(A) Monitor
(B) Compact Disc
(C) Printer
(D) Speaker
(E) None

Ans (B) Compact Disc


40. In MS Word, Thesaurus tool has made for the Purpose of _______
(A) Spell Checking
(B) Synonyms and Antonyms words
(C) Spelling Suggestions
(D) Grammar Correction
(E) None

Ans (B) Synonyms and Antonyms words


41. The virus attacks on the computer can be stopped or prevented with the
help of which one of the following?
(A) Security Wall
(B) Virus eliminator software
(C) Antivirus Software
(D) Firewall
(E) None

Ans (C) Antivirus Software


42. Network Interface Card is a(n)________ device:
A. Input
B. Output
C. Input/Output
D. Storage
E. None

Ans (C) Input/Output


43. The most popular technique used to automate sending of a customized
letter to different recipients where most of the content is the same except
the customer address of MS Word?
(A) Send mail to all
(B) Mail Merge
(C) Design, review and send
(D) Bulk customized mail
(E) None

Ans (B) Mail Merge


44. Dot Matrix Printer is an example of:
(a) Input Device
(b) Output Device
(c) Processing Unit
(d) Integral Device
(e) None

Ans (b) Output Device


45. Which of the following technique is popular in academic testing?
(A) OMR
(B) OLE
(C) OCR
(D) MICR
(E) None

Ans (A) OMR


OMR stands for Optical mark recognition
46. One Mega Byte (MB) is equal to which of the following:
(A) 1 trillion bytes
(B) 1048 bytes
(C) 1024 KB
(D) 256 KB
(E) None

Ans (C) 1024 KB


47. Speed of CPU is measured in
(A) MHz
(B) GHz
(C) Hz
(D) All of these
(E) None

(D) All of these


48. Which of the following is an advantage of the view in databases?
A) Data Security
B) Hiding of Complex Queries
C) Derived Columns
D) All of the Above
E) None

Ans (D) All of the Above


49. The term HTTP stands for Hypertext Transfer Protocol. Who has developed
this protocol to transfer information over the internet?
A) Tim Berners Lee
B) Bill Gates
C) Sundar Pichai
D) Sandeep Singh
E) None

Ans (A) Tim Berners Lee


50. Which of the following is the extension of A Microsoft Word file?
(A) .document
(B) .txt
(C) .doc
(D) .file
(E) None

Ans (C) .doc


51. Which code is used in Cheque?
(A) OMR
(B) Scanner
(C) Plotter
(D) MICR
(E) None

Ans (D) MICR


MICR stands for Magnetic ink character recognition.
52. To run thesaurus which key will be pressed?
(A) Shift + F12
(B) Shift + F7
(C) Shift + F10
(D) Shift + F11
(E) None

Ans (B) Shift + F7


Thesaurus is a tool in Microsoft Word which is used to find the synonyms
of selected words.
53. Which type of security is provided by ‘https’?
A. TCP
B. TLS
C. SSL
D. Only B & C
E. All A, B & C

Ans (D)
54: The key used to restart a computer is:
A. Del + Ctrl
B. Backspace + Ctrl
C. Ctrl + Alt + Del
D. Reset
E. None

Ans (C) Ctrl + Alt + Del


55. To host a web site which of the following is required?
(A) Web Server
(B) Exchange Server
(C) Mail Server
(D) Database Server
(E) None

Ans (A) Web Server


56: Which file Format can be added to a PowerPoint show?
A. .jpg
B. .gif
C. .wav
D. All of the above
E. None

Ans (D) All of the above


57. Adobe developed______, which allows the document to be transmitted
and stored without loss of formatting.
A. Defragmentation
B. Assembler Document Format
C. Filtering Format
D. Portable Document Format
E. None

Ans (D) Portable Document Format


58. In MS Word, you can move and copy text:
A. Within a word document
B. Between word document
C. Between office application
D. All of the above
E. None

Ans (D) All of the Above


59. Which is of the following is the fastest memory?
A) Secondary Memory
B) Auxiliary Memory
C) Cache Memory
D) Virtual Memory
E) None

Ans (C) Cache Memory


60. Bandwidth refers to:
(A) The amount of data that can be transmitted through a communication channel.
(B) Protocol limitations
(C) The speed of the communication device
(D) A transmission medium
(E) None

Ans (A)
The amount of data that can be transmitted through a communication channel.
61. Which of the following is not an option of edit menu
A. Cut
B. copy
C. Paste
D. Page setup
E. None

Ans D :- Page setup


62. The secondary storage device is needed to?
(A) Perform arithmetic and logical operations
(B) Communicate on a network
(C) Print output result
(D) Store large volumes of data that exceed the capacity of the main memory.
(E) None

Ans (D)
63. What is the language used by most of the DBMSs for helping their users to
access data
A. Assembly level language
B. C++
C. Query Language
D. 1GL
E. None

Ans (c) Query language


64. Which command is used for inserting records in database?
A. INSERT
B. ADD
C. Both 'a' and 'b'
D. None of these
E. None

Ans (A) INSERT


65. If you need to duplicate the entire disk , which command will you use
A. Copy
B. Diskcopy
C. Chkdsk
D. Format
E. None

Ans (B) Diskcopy


66. Computer Virus is
A. A hardware
B. Windows tool
C. A computer program
D. None of these
E. All of the above

Ans (C) A computer program


67. ________ Systems use a light beam to scan input data and convert it into
electrical signals, which are sent to the computer for processing.
A. Image recognition
B. Optical recognition
C. PDF
D. Application
E. None of these

Ans (B) Optical recognition


68. Which virus spread in application software
A. Macro Virus
B. boot virus
C. file virus
D. Anti-virus
E. None

Ans (A) Macro Virus


69. An anti virus is a
A. Program code
B. Computer
C. Company name
D. Application
E. None

Ans (A) Program code


70. First boot sector virus is
A. Computed
B. mind
C. brain
D. Cloner
E. None

Ans (C) brain


71. Error in a program is called
A. bug
B. debug
C. virus
D. Noise
E. None

Ans (A) bug


72. Error which occurs when user tried to use a device which is not switched
ON is classified as
A. user-defined message
B. half message
C. execution error message
D. built in message
E. None

Ans (C) execution error message


73. Data representation in a computer uses the number system
A. Decimal
B. Number
C. Binary
D. Integers
E. None

Ans (A) Binary


74. The basic architecture of computer was developed by
A. John Von Neumann
B. Charles Babbage
C. Blaise Pascal
D. Robert Noyce
E. None

Ans (A) John Von Neumann


75. The binary equivalent of decimal number 99 is
A. 1110001
B. 1110100
C. 1100011
D. 1111001
E. All are wrong

Ans (C) 1100011


76. Arranging customers names in ascending order is an example of
A. process
B. information processing
C. process
D. Information
E. None

Ans (B) information processing


77. Header is
A. Any text printed at the top of every page
B. Any graphics printed at the top of every page
C. Any text or graphics printed at the top of particular page
D. Any text or graphics printed at the top of every page
E. None

Ans (D) Any text or graphics printed at the top of every page
78. This case converts first character of first word of selected sentence to
capital
A. sentence
B. upper
C. toggle
D. Title
E. None

Ans (A) sentence


79. Sometimes sudden power failure lead to the loss of data if a desktop
computer is directly connected to the power plug. Which device should be
attached to the computer for saving this kind of data loss?
(A) Printer
(B) Hard Disk
(C) UPS
(D) Nuclear Power Plant
(E) None

Ans (C) UPS


80. Which of the following will you option for saving the file
A. Save button standard toolbar
B. Save button from file menu
C. By pressing Ctrl + S
D. All of these
E. None

Ans (D) All of these


81. By default the top margin in the word document is
A. 1 inch
B. 2 inch
C. 3 inch
D. 1½ inch
E. None

Ans (A) 1 inch


82. By default the right margin in the word document is
A. 1 inch
B. 2 inch
C. 3 inch
D. 1 ¼ inch
E. None

Ans (D) 1 ¼ inch


83. The Field names are enclosed within
A. <<>>
B. >><<
C. >>>>
D. <<<<
E. None

Ans (A) <<>>


84. You can use the following objects created in MS-word in a web page
A. Auto-shapes
B. Bullets
C. tables and charts
D. All of these
E. None

Ans (D) All of these


85. You can merge the main document with data source in Excel. In mail
merge operation, Word is usually
A. server
B. source
C. client
D. none of above
E. All of the above

Ans (C) client


86. Blinking point which shows your position in the text is called
A. Cursor
B. position
C. Blinker
D. None of these
E. None

Ans (A) Cursor


87. You can use the formula palette to
A. Format cells containing numbers
B. create and edit formula containing functions
C. enter assumptions data
D. copy a range of cells
E. None

Ans (B) create and edit formula containing functions


88. The Name box on to the left of formula bar
A. shows the name of workbook currently working on
B. shows the name of worksheet currently working on
C. shows the name of cell address or range currently working on
D. None of above
E. All are worng

Ans (C) shows the name of cell address or range currently working on
89. Which of the following is not the correct method of editing the cell content?
A. Press the Alt key
B. Press the F2 key
C. Click the formula bar
D. Double click the cell
E. None

Ans (A) Press the Alt key


90. Which command lists the contents of current directory of a disk
A. Copy
B. Tree
C. CD
D. Dir
E. None

Ans (D) Dir


91. ______ Devices accept the spoken word through a microphone and
convert it into binary code that can be understood by the computer.
A. Speech recognition
B. Handwriting recognition
C. Peripheral
D. All of the above
E. None of these

Ans (A) Speech recognition


92. Which of the cell pointer indicates you that you can make selection?
A. Doctors symbol (Big Plus)
B. small thin plus icon
C. Mouse Pointer with anchor at the tip
D. None of above
E. None

Ans (A) Doctors symbol (Big Plus)


93. When a customer makes an online hotel booking, the data base is
update in
A. Batch mode
B. Pseudo real- time
C. 2 Days
D. All of these
E. None

Ans (B) Pseudo real- time


94. DBMS is
A. Collection of data
B. Set of programs to access those data
C. Set of program to update those data
D. All of these
E. None

Ans (D) All of these


95. It is a collection of logically related information
A. Folder
B. Information
C. Processing
D. File
E. None

Ans (D) File


96. COUNT command is used to
A. Count the number of data fields in an active database file
B. Count the number of data files which are active
C. Count the records which are update
D. Count the number of records in an active data base files
E. None

Ans (D) Count the number of records in an active data base files
97. The computer holds data and:
(A) Bytes
(B) Programs
(C) Registers
(D) Bits
(E) None

Ans (B) Programs


98. Special set of characters that computer associates with specific user
identification is classified as
A. password
B. identity code
C. inquiry code
D. dump code
E. None

Ans (A) password


99. Creating a data files means
A. Designing base and defining the structure of the database
B. Getting the information about database
C. Selecting data from database
D. Deleting data from database
E. None

Ans (A) Designing base and defining the structure of the database
100. Function of running and loading programs by use of peripherals is
function of
A. operating system
B. inquiry system
C. dump programs
D. function system
E. None

Ans (A) operating system


101. Each individual data items of record is called a
A. Data base
B. Field
C. Comment
D. All of these
E. None

Ans (B) Field


102. Large collections of files are called
A. Fields
B. Records
C. Data Base
D. File system
E. None

Ans (C) Database


103. Cache memory is–
A. Smaller and faster than main storage
B. Bigger and slower than main storage
C. Smaller but slower than main memory
D. Bigger and faster than main memory
E. None of these

Ans (A) Smaller and faster than main storage


104. Which statement is not valid indexing
A. It stores the index fields
B. It stores the corresponding record number
C. It maintains the alphabetically order
D. It duplicates the database file
E. None

Ans (D) It duplicates the database file


105. It run on computer hardware and serve as platform for the others
software to run on
A. Operating system
B. Application software
C. System software
D. All of these
E. None

Ans (A) Operating system


106. The primary purpose of the operating system is
A. to allow people to use the computer
B. to keep system programmers employed
C. to make the most efficient use of computer hardware
D. to make computers easier to use
E. None

Ans (C) to make the most efficient use of computer hardware


107. The time command is used to display
A. American (US) time
B. Greenwich mean time
C. Julian time
D. System time
E. None

Ans (D) System time


108. Which command can be used to create the disk track and sectors
A. FDISK
B. FORMAT
C. CHKDSK
D. ATTRIB
E. None

Ans (B) FORMAT


109. If you do not know the current time, which command do you use to display
A. Copy
B. Very
C. Time
D. Format
E. None

Ans (C) Time


110. To select one hyperlink after another during a slide presentation, what
do you press?
A. Tab
B. Ctrl + K
C. Ctrl + h
D. All of above
E. None

Ans (A) Tab


111. Which of the following is true about Dial-up internet access?
(A) It utilizes the existing telephone services
(B) It uses a router for security
(C) It utilizes the broadband technology
(D) Modem speeds are very fast
(E) All of the above

Ans (A)
112. in the context of animations, what is a trigger?
A. An action button that advances to the next slide
B. An item on the slide that performs an action when clicked
C. The name of a motion path
D. All of above
E. None

Ans (B) An item on the slide that performs an action when clicked
113. Which among the following computer provides greater speed than average
for performing multi tasking?
A) Personal Computer
B) Notebook
C) Workstation
D) Tablet PC
E) None of these

Ans (C)
114. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(A) an open folder.
(B) the folder contains subfolders.
(C) a text file.
(D) a graphics file
(E) none of these

Ans (B)
115. You can create a new presentation by completing all of the following except
A. Clicking the new button on the standard toolbar
B. Clicking file, new
C. Clicking file open
D. Pressing ctrl + N
E. None

Ans (C) Clicking file open


116. special effects used to introduce slides in a presentation are called
A. Animations
B. custom animations
C. transitions
D. present animations
E. None

Ans (C) transitions


117. How many bits are there in Ex-ASCII and EBCDIC codes respectively
A. 7, 8
B. 8, 7
C. 7, 7
D. 8, 8
E. None

Ans (D) 8, 8
118. During the ____________ operation, the control unit determines what the
program is telling the computer to do.
(A) fetch
(B) execute
(C) decode
(D) arithmetic
(E) None of these

Ans (C)
119. All computer execute
A. basic programs
B. COBOL programs
C. Machine language program
D. FORTRAN program
E. None

Ans (C) Machine language program


120. Program which is written originally by programmer is classified as
A. object code
B. machine code
C. source program
D. interactive programs
E. None

Ans (C) source program


121. The laptop was invented by Adam Osborne in ………..
A. 1981
B. 1984
C. 1982
D. 1983
E. None of these

Ans (A)
Developed by Adam Osborne in April 1981, the Osborne I was the first truly portable
computer and is recognized as the first true laptop computer
122. Charles Babbage designed two engine. They are –
A) Addition and Subtraction Engine
B) Analytic and Difference Engine
C) Analytic and Digital engine
D) Addition and Multiplication Engine
E) None of these

Ans (B)

1822-Charles Babbage (Difference Engine).


1834-Charles Babbage (Analytical engine).
123. Tabulating machine for census was designed by
A. Charles Babbage
B. Alan Turing
C. Herman Hollerith
D. Artificial intelligence (AI)
E. None of these

Ans (C)
1890 - Herman Hollerith (Tabulating Machine).
1911 - Charles Ranlett Flint founded ”Computing-Tabulating-Recording
Company (CTR)” and was renamed "International Business
Machines" in 1924
1950 - Turing test performed by Alan Turing
124. Which one is not an electronic computing device?
A) Analytical Engine
B) Difference Engine
C) ENIAC
D) EMCC
E) None of these

Ans (D)

(1946-1949)-EMCC (Eckert-Mauchly Computer Company) the


First computer company.
125. The ____ address uniquely defines a host on the Internet.
A) physical
B) Logical
C) port
D) specific address
E) None

Ans (B)
126. In order to edit a chart, you can
A. Triple click the chart object
B. Click and drag the chart object
C. Double click the chart object
D. Click the chart object
E. None

Ans (C) Double click the chart object


127. Which of the following device was developed by Jack Kilby & Robert Noyce
A. Transistor
B. IC chip
C. Telegraph
D. Mouse
E. None of these

Ans (B)
1926 - Dr. Julius Edgar Lilienfeld from New York filed for a patent on a transistor.
1947 - The transistor is developed by Bell Telephone Laboratories.
1959 - Texas Instruments and Fairchild Semiconductor both announce the
integrated circuit (Jack Kilby & Robert Noyce).
1836 - Morse Code by Samuel Morse (US) - Morse developed a system of
dots and dashes to help send telegraphs over long distance wire.
1964 - Douglas Engelbart invented first mouse.
128. The ____ created a model called the Open Systems Interconnection, which
allows diverse systems to communicate.
A. OSI
B. ISO
C. IEEE
D. ANSI
E. None

Ans (B)
1. The ____ created a model called the Open Systems Interconnection, which
allows diverse systems to communicate.
A. OSI
B. ISO
C. IEEE
D. ANSI
E. None

Ans (B)
2. The _______ layer links the network support layers and the user support layers.
A) transport
B) network
C) data link
D) session
E) None

Ans (A)
3. The _______ layer coordinates the functions required to transmit a bit
stream over a physical medium.
A) transport
B) network
C) data link
D) physical
E) None

Ans (D)
4. The physical, data link, and network layers are the ______ support layers.
A) user
B) network
C) both (a) and (b)
D) neither (a) nor (b)
E) None

Ans (B)
5. What is the flow of data between countries commonly called?
(A) International information system
(B) EDI
(C) Outsourcing
(D) Transborder data flow
(E) None of these

Ans (D) Transborder data flow


6. What term is used to describe software that monitors your online computer
activities?
(A) Bespoke software
(B) Spyware
(C) Custom software
(D) Travel ware
(E) None of these

Ans (B) Spyware


7. The two major components of system software are:
(A) The operating system and system utilities
(B) Application software and system utilities
(C) Primary memory and storage
(D) The operating system and applications software
(E) None of these

Ans (A) The operating system and system utilities


8. Which of the following may be necessary for you to do after you install new
application software?
(A) Turn the computer power switch off and then back on
(B) Do a cold boot
(C) Press Shift + Alt + Del
(D) Do a warm boot
(E) None of these

Ans (D) Do a warm boot


9. The power-on self-test----------------
(A) Checks for upgrades to the application software
(B) Verifies that the computer hardware is working properly
(C) Is able to provide easy-to-follow on-screen instructions to correct hardware problems
(D) Is conducted after the BIOS instructions are placed in memory
(E) None of these

Ans (B) Verifies that the computer hardware is working properly


10. Which of the following is NOT part of the motherboard?
(A) System clock
(B) Connector
(C) CPU
(D) Chipset
(E) None of these

Ans (B) Connector


11. Which of the following is the advantage of Assembly language over Machine
language?
(A) Easy to use
(B) Easy to understand
(C) Easy to modify
(D) All the above
(E) None of these

Ans (D)
12. An example of a wireless medium that sends data through the air or space is:
(A) Fiber-optic cable.
(B) Coaxial cable.
(C) Twisted pair.
(D) Microwaves.
(E) None of these

Ans (D) Microwaves.


13. If a memory chip is volatile, it will.......
(A) explode if exposed to high temperatures
(B) lose its contents if current is turned off
(C) be used for data storage only
(D) be used to both read and write data
(E) None of these

Ans (B)
14. The session, presentation, and application layers are the ____ support layers.
A) user
B) network
C) both (a) and (b)
D) neither (a) nor (b)
E) None

Ans (A)
15. In Excel, this is a prerecorded formula that provides a shortcut for complex
calculations.........
(A) Value
(B) Data Series
(C) Function
(D) Field
(E) None of these

Ans (C) Function


16. Which of the following is a circuit that issue signals at regular intervals...?
(A) Circuit board
(B) Clock
(C) Circuit card
(D) Gates
(E) None of these

Ans (B) Clock


17. The ______ layer establishes, maintains, and synchronizes the interactions
between communicating devices.
A) transport
B) network
C) session
D) physical
E) None

Ans (C)
18. Which of the following animations cannot be done in PowerPoint?
(A) bullet list, revealed one bullet point at a time
(B) clip art - Fly in from the bottom
(C) table, revealed row by row
(D) chart, revealed by series
(E) None of these

Ans (C) table, revealed row by row


19. .......... is the key we use to run the selected command.
(A) SHIFT
(B) TAB
(C) ENTER
(D)CTRL
(E) None of these

Ans (C) ENTER


20. Which one of the following was world’s first commercial computer?
A) ENIAC
B) EDVAC
C) EDSAC
D) UNIVAC
E) None of these

Ans (D)
1943-1946 - ENIAC (Electronic Numerical Integrator and Computer) is developed by
J. Presper Eckert and John Mauchly. It was the first general purpose Electronic computer.
1949 - EDVAC (Electronic discrete variable automatic computer) unlike the predecessor, it was binary
rather than decimal and was a stored program computer. Idea of stored
program was given by Jon Von Neumann.
1949 - EDSAC(Electronic Delay Storage Automatic Calculator)-Maurice Wilkes
(first fully stored computer based on binary)
1951 - UNIVAC (Universal Automatic Computer) was release which was
the world’s first commercial computer.
21. Which of the following displays the contents of the active cell?
(A) Active cell
(B) Formula bar
(C) Menu bar
(D) Name box
(E) None of the above

Ans (B) Formula bar


22. The purpose of the primary key in a database is to :
(A) unlock the database
(B) provide a map of the data
(C) uniquely identify a record
(D) establish constraints on database operations
(E) None of these

Ans (C) uniquely identify a record


23. This printer places an image on a page without physically touching the page.
A. Line printer
B. Impact printer
C. Non-impact printer
D. Dot-matrix printer
E. None

Ans (C)
24. Which of the following refers to too much electricity and may cause a voltage surge?
a) Anomaly
b) Shock
c) Spike
d) Virus
e) None of these

Ans (C)
25. A function inside another function is called a ….. Function.
(A) Nested
(B) Round
(C) Sum
(D) Text
(E) None of the above

Ans (A) Nested


26. CPU can directly understand this language
A. C
B. C++
C. Assembly
D. Java
E. None of these

Ans (E) None of these


27. World’s first microprocessor was
A. Intel 4000
B. Intel 4002
C. Intel 4004
D. Intel 4008
E. None of these

Answer: C
28. Selects the entire Row press-------
(A) Shift + Space
(B) Shift + ctrl
(C) Shift + alt
(D) Space + enter
(E) None of these

Ans (A) Shift + Space


29. In Assembly language....
(A) Mnemonics are used to code operations
(B) Alphanumeric symbols are used for addresses
(C) Language lies between high-level language and machine language
(D) All of the above
(E) None of these

Ans (D) All of the above


30. To insert a word into the middle of a sentence-
(A) move the cursor to the desired location in the sentence and type the new word
(B) move the cursor to the desired location in the sentence, press Enter key, and type
the new word
(C) move the cursor to the beginning of the sentence and start typing
(D) retype the whole sentence
(E) None of these

Answer: A
move the cursor to the desired location in the sentence and type the new word
1. The overall design, construction, organization and interconnecting of
the various components of a computer system is referred as–
(A) Computer Architecture
(B) Computer Flowchart
(C) Computer Algorithm
(D) All of the above
(E) None of these

Ans (A) Computer Architecture

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


2. Languages which can easily interact with the hardware are
A. High level language
B. low level language
C. middle level language
D. none of these
E. None

Ans (B) low level language


3. Grouping and processing all of a firm's transactions at one time is called–
(A) a database management system
(B) batch processing
(C) a real-time system
(D) an on-line system
(E) None of these

Answer: B
4. A spiral shape track formatting is present in
(A) Floppy Disk
(B) Optical Disk
(C) Hard Disk
(D) Half-inch Tape Cartridge
(E) None of these

Answer: B
5. Which of the following groups contains graphical file extensions?
(A) JPG, DRV, BAK
(B) GIF, TCP, WMV
(C) TCP, JPG, BMP
(D) JPG, GIF, BMP
(E) None of these

Answer: D

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


6. The communication between a processor and other devices inside
the computer is done through?
(A) Bus
(B) Channel
(C) Network Cable
(D) Chip
(E) None of these

Answer: A
7. A storage device or medium where the access time is dependent
upon the location of the data is called ________
A. Parallel access
B. Serial access
C. Both (A) and (B)
D. None of the above

Answer : C
8. ________are attempts by individuals to obtain confidential information
from you by falsifying their identity.
(A) Phishing
(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) None of the above

Ans (A) Phishing

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


9. Which of the following is not true for primary storage?
(A) It is a part of the CPU
(B) It allows very fast access of data
(C) It is relatively more expensive than other storage devices.
(D) Can be removed and transported.
(E) All of the above

Answer: A
10. .………processing is used when a large mail-order company
accumulates orders and processes them together in one large set.
(A) Batch
(B) Online
(C) Real-time
(D) Group
(E) None of these

Ans (A) Batch


11. What is a motion path?
A. A type of animation entrance effect
B. A method of advancing slides
C. A method of moving items on a slide
D. All of the above
E. None

Ans (C) A method of moving items on a slide


12. Which of the following memories can be read directly by the
computer processor?
(A) Hard Disk
(B) Main Memory
(C) CD
(D) DVD
(E) None of these

Answer: B

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


13. Who is/are the founders of Microsoft?
(A) Bill Gates
(B) Bill Gates and Allen Paul
(C) Steve Jobs
(D) Bill Gates and Steve Jobs
(E) None of these

Answer: B
14. Technique of using fixed words for machine code functions is
classified as
A. mnemonics
B. nemonics
C. compiler
D. Translator
E. None

Ans (A) mnemonics


15. ______ is a form of denial of service attack in which a hostile client
repeatedly sends SYN packets to every port on the server using fake IP
addresses.
a) Cyberspace crime
b) Memory shaving
c) Syn flooding
d) Email Flooding
e) None of these

Ans (A)
16. What is the difference between a check box and Radio button?
a) No difference
b) In radio buttons multiple options can be selected whereas in check
boxes only single option can be selected
c) In check boxes as well as radio buttons multiple options can be
selected, but radio buttons can be used only twice
d) In check boxes multiple options can be selected whereas in radio
buttons only single option can be selected
e) None of these

Answer: D
Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir
17. Which is the first electro-mechanical binary programmable computer?
A) Z1
B) Intel 8084
C) IBM 007
D) Intel 8000
E) None of these

Ans (A)
(1936-1938)-Konrad Zuse, Computer (Z1).
18. Which is NOT a function of a microprocessor?
(A) Controls the rest of the computer's components
(B) Keeps the system unit cool
(C) Processes data
(D) Interprets instructions given by software
(E) None of these

Answer: B
19. ________ has a large storage capacity, up to 17 GB if both layers and
both sides are used.
(A) DVD-ROM
(B) CD-ROM
(C) Floppy
(D) RAM
(E) None of these

Answer: A
20. A __________ card connects each computer to the wiring in the network.
(A) network interface
(B) PC interface
(C) Memory
(D) All of the above
(E) None of these

Answer: A

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


21. To execute a given DOS program, you must type a(n) __________.
(A) command
(B) order
(C) syntax
(D) all of the above
(E) none of these

Answer: A
22. You can add a hyperlink to your worksheet by pressing
(A) Alt + K
(B) Ctrl + H
(C) Ctrl + K
(D) Ctrl + Shift + K
(E) None of the above

Ans (C) Ctrl + K


23. The _________ layer enables the users to access the network.
A) transport
B) application
C) data link
D) Physical
E) None

Answer: B
24. When you insert an Excel file into a Word document, the data are
(A) Hyperlinked
(B) Placed in a word table
(C) Linked
(D) Embedded
(E) None of the above

Ans (B) Placed in a word table


26. The TCP/IP _______ layer is equivalent to the combined session,
presentation, and application layers of the OSI model.
A) application
B) network
C) data link
D) Physical
E) None

Answer: A

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


1. Communication between a computer and a keyboard involves
______________ transmission.
A) simplex
B) half-duplex
C) full-duplex
D) Automatic
E) None

Answer: A

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


2. When data changes in multiple lists and all lists are not updated, this
causes?
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
(E) None of these

Ans (D) data inconsistency

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


3. The _______ is the physical path over which a message travels.
A) Protocol
B) Medium
C) Signal
D) All the above
E) None

Answer: B

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


4. The technique where digital signals are converted to its analog form
for transmission over an analog facility is called–
(A) Modulation
(B) Digitization
(C) Demodulation
(D) All of the above
(E) None of these

Ans (A) Modulation

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


5. In a _______ connection, more than two devices can share a single link.
A) point-to-point
B) multipoint
C) primary
D) secondary
E) None

Answer: B

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


6. Which topology requires a multipoint connection?
A) Mesh
B) Star
C) Bus
D) Ring
E) None

Answer: C

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


7. A _______ connection provides a dedicated link between two devices.
A) point-to-point
B) multipoint
C) primary
D) secondary
E) None

Answer: A

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


8. In _______ transmission, the channel capacity is shared by both
communicating devices at all times.
A) simplex
B) half-duplex
C) full-duplex
D) half-simple
E) None

Answer: C

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


9. Which of the following protocol is used for transferring electronic
mail message from one machine to another?
A) SNMP
B) SLIP
C) POP
D) SMTP
E) None

Answer: D

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


10. Internet-like networks within an enterprise known as- ?
A) Extranet
B) Internet
C) Intranet
D) PAN
E) None

Answer: C

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


11. A………is a collection of data that is stored electronically as a series of
records in a table.
(A) spreadsheet
(B) presentation
(C) Database
(D) web page
(E) None of these

Ans (C) Database

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


12. What happens if you press Ctrl + Shift + F8?
(A) It activates extended selection
(B) It activates the rectangular selection
(C) It selects the paragraph on which the insertion line is.
(D) None of above
(E) All the above

Ans (B) It activates the rectangular selection

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


13. What is the correct syntax for typing a function into a cell?
(A) Equal sign, Function Name, Matching brackets
(B) Function Name, Equal sign, Matching brackets
(C) Equal sign, Matching brackets, Function Name
(D) None of the above
(E) None of these

Ans (A) Equal sign, Function Name, Matching brackets

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


14. If you see a small red triangle in the top right corner of a cell, it
means there is something attached to the call. What is it?
(A) A comment
(B) An attachment
(C) An error
(D) None of the above
(E) None of these

Ans (A) A comment

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


15. Which of the following keyboard shortcuts is used to view the
properties of a selected object?
(A) Alt + Space
(B) Ctrl + Space
(C) Alt + Enter
(D) Ctrl + Enter
(E) None of these

Ans (C) Alt + Enter

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


16. A television broadcast is an example of _______ transmission.
A) simplex
B) half-duplex
C) full-duplex
D) Automatic
E) None

Answer: A

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


17. The........... Settings are automatic and standard.
(A) Default
(B) CPU
(C) Peripheral
(D) User-friendly
(E) None of these

Ans (A) Default

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


18. Pop-ups are a form of ________on the World Wide Web?
(A) Instant Messaging
(B) Search Engines
(C) Browsers
(D) Mark-up Languages
(E) Online Advertising

Ans (E) Online Advertising

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


19. Which of the following displays the Absolute contents of the active
cell?
(A) Active cell
(B) Formula bar
(C) Menu bar
(D) Name box
(E) None of the above

Ans (B) Formula bar

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


20. What is the keyboard shortcut for creating a chart from the selected
cells?
(A) F3
(B) F5
(C) F7
(D) F11
(E) None of the above

Ans (D) F11

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


21. The ______ layer is responsible for the source-to-destination
delivery of a packet across multiple network links.
A) transport
B) network
C) data link
D) Physical
E) None

Answer: B

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


22. Which of the following process is used by the computer to ensure
that all the devices connect to it is in working condition?
A) Verifying
B) Hibernating
C) Starting
D) Booting

Answer: D

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


23. Technique of using disk space to make programs believe that the
system contains more Random Access Memory(RAM) than is actually
available is called ___
A. Random Access Memory
B. Primary Memory
C. Secondary Memory
D. Virtual Memory

Answer : D

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


24. A ____ device receives the results from the CPU and provides them to
the liveware.
A) Input
B) Output
C) Memory
D) Processing

Answer: B
Liveware means user. Output devices shows the result to user.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


25. EAROM stands for ______
A. Electrically Altered Read Only Memory
B. Electrically Accepted Read Only Memory
C. Electronically Alterable Read Only Memory
D. Electrically Alterable Read Only Memory

Answer : D

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


OSI Model
1. Physical layer –
• To define the specifications of medium.
• To convert the data in the form of bits and transmit it over medium.
• To define topologies, medium, speed, transmission modes.

2. Data Link Layer


• Construction of data frame.
• Error detection and controlling.
• Data flow controlling.
• Physical addressing (Mac Addressing).

3. Network layer –
• Logical addressing (IP addressing).
• Routing and Packet delivery.
4. Transport layer –
• It provides a reliability of error free, end to end data delivery and
correct destination.
• Segmentation and reassembly.

5. Session layer –
• Time management.
• communication controlling.
• Synchronization.

6. Presentation layer –
• Data is presented in the form size, type,
encryption-decryption and compression.

7. Application layer –
• It provides a user interface or platform to transmit or
receive the data. Example web browser.
1. Which of the following program is the closest to the machine code?
A. Compiler
B. Interpreter
C. Assembler
D. None of the above

Answer : C

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


2. Which of the following is/are example(s) of Word Processors?
A. Microsoft Word
B. WordPerfect
C. Both (A) and (B)
D. None of the above

Answer : C

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


3. Which of the following is/are example(s) of Spreadsheets?
A. Microsoft Excel
B. Lotus 1-2-3
C. Both (A) and (B)
D. None of the above

Answer : C

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


4. __________ is the software which comes with the permission for people
to redistribute copies for a limited period.
A. Freeware
B. Shareware
C. Open Source Software
D. Public Domain Software

Answer : B

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


5. The _________ digits are 0 to 9 and A to F.
A) Decimal
B) Hexadecimal
C) Binomial
D) Trinomial

Answer: B

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


6. What does EULA stand for?
A. Exit User License Agreement
B. Exit Utility License Agreement
C. End Utility License Agreement
D. End User License Agreement

Answer : D

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


7. Which of the following media device cannot perform both the operation of
reading and writing?
A) Hard Disk
B) Pen Drive
C) CD-ROM
D) Floppy Disk
E) None of these

Answer: C
CD- ROM – Read only memory. It cannot perform write operation.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


8. Which of the following software is also called as Closed Source Software?
A. FreeBSD
B. Proprietary Software
C. Mandriva
D. Firefox

Answer : B
Proprietary software, also known as non-free software, or closed-
source software, is computer software for which the software's publisher
or another person retains intellectual property rights—usually copyright
of the source code, but sometimes patent rights.
FreeBSD - Berkeley Software distribution

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


9. Physical addressing is performed by which layer of OSI model?
A) Layer 3
B) Layer 4
C) Layer 2
D) Layer 7
E) None of these

Answer : C

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


10. What is the process of dividing a network into two or more networks
called?
A) divider
B) subnetting
C) ethernet
D) LAN

Answer : B

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


11. ____________ is a collection of one or more files that correct flaws in
the performance, reliability or security of a specific software product.
A. Software Update
B. Software Piracy
C. Software patch
D. None of the above

Answer : C

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


12. Internal hard disk is a ____ memory and pen drive is a ____ memory.
A) Online, Online
B) Offline, offline
C) Offline, Online
D) Online, Offline

Answer: D
A memory which always remains connected to computer is
online memory, while a memory that can be removed or
connected as and when required is offline memory.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


13. The _______ enables you to simultaneously keep multiple Web pages open
in one browser window.
A) tab box
B) pop-up helper
C) tab row
D) address bar

Answer: C

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


14. Who developed the concept of email?
A) Bill Gates
B) Blaise Pascal
C) Sabir Bhatia
D) Ray Tomlinson

Answer: D

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


15. The will be the output when AND operator is applied on
inputs 1 and 0 (i.e 1 AND 0)?
A) 1
B) 0
C) Can be either 0 or 1
D) None of these

Answer: B
If any input is 0 in AND, output will be 0.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


Connecting devices

Physical layer Hub, Modem, Repeater


Datalink layer Bridge, Switch
Network Layer Router
Gateway Transport Layer
Session Layer
Gateway
Presentation Layer
Application Layer
Gateway Gateway is a combination of Software and hardware.
It is used to connect different types of two or more networks.
Bridge It is used to connect same or similar types of two or more networks.
It is also used to divide a big network into two or more small networks.
Router Router works as a data traffic controller in a network.
Addressing and routing are the functions of Router.
Modem Modulator and demodulator.
Modulation and demodulation.
Digital to analog or vice-versa.
Repeater Repeaters are used to recharge or regenerate or
re-boost the week signals to transmits the signals
for long distance.
1. 2^30 bytes represents
A) 1 megabyte
B) 1 gigabyte
C) 1 terabyte
D) 1 petabyte

Answer: B
2^10 byte = KB
2^20 byte = MB
2^30 byte = GB

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


2. Which of the following operation is not performed by ALU?
A) Division
B) Logical AND
C) Complement
D) Exponential

Answer: D
ALU performs – Addition, Subtraction, Multiplication, Division, AND, OR,
Complement(NOT), Increment, Decrement, Left or Right Shit, Clear.
Apart from this exponential, logarithmic, trigonometric are performed
by Floating Point Unit(FPU)

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


3. A _________ is a hardware frame and set of electrical connection interfaces
that enable a notebook computer to effectively serve as a desktop computer
A) Network Interface Card
B) Topology
C) Docking station
D) Virtual Storage Unit

Answer: C

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


4. ___________ is a program that searches for and identifies items in a
database that correspond to keywords, used especially for finding
particular sites on the World Wide Web.
A) Widgets
B) Search Engine
C) Social Media
D) Malware

Answer: B

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


5. Floating Point in computer refers to ____ ?
A) Invalid Hardware type
B) Unsupported Software
C) Decimal Numbers
D) Virus

Answer: C

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


6. What does M stands for in CAM?
A) magnetic
B) manufacturing
C) multiple
D) management

Answer: B

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


7. In computer _________ is a process by which two devices initiate
communications.
A) Protocol
B) Handshaking
C) Topology
D) Networking

Answer: B
The handshaking process usually takes place in order to establish
rules for communication when a computer sets about communicating
with a foreign device.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


8. Which of the following is application software?
A. Database Management System
B. Spreadsheets
C. Image Editor
D. All of the above

Answer : D

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


9. What is a bug bounty?
A) A type of virus
B) Reward for finding a bug and reporting it to any organization
C) Genuine Software
D) Reward for hacking a government website

Answer: B
Reward for finding a bug and reporting it to any organization

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


10. Find the odd one out
A) MeeGo OS
B) Android
C) Windows 10
D) Symbian OS

Answer: C
Rest all are Operating System only for mobile.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


11. ____________ is an organization that provides services for accessing
and using the Internet.
A) Domain
B) Hosting
C) Website
D) ISP

Answer: D
Internet Service Provider

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


12. Which of the following is used to stores programs and files that are to
be used later?
A) Mother Board
B) RAM
C) Hard Disk
D) Cache
E) None of these

Answer: C
RAM and Cache are temporary memory.
Hard Disk stores data to be used later.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


13. Which of the following is not a processor architecture?
A) RISC
B) EPIC
C) CISC
D) DISC

Answer: D
RISC – Reduced Instruction Set Computer ;
CISC – Complex Instruction Set Computer ;
EPIC – Explicitly Parallel Instruction Computing

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


14. Which of the following is mandatory for every disk?
A. root
B. sub
C. bare
D. None of the above

Answer : A

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


15. A ________ is a special program that processes statements written in a
particular programming language and turns them into machine language.
A. Compiler
B. Device Driver
C. Assembler
D. None of the above

Answer : A

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


16. Who among the following is called the father of ′PASCAL′ programming
language?
A) Bjarne Stroustrup
B) Dennis Ritchie
C) Blaise pascal
D) James Gosling
E) None of these

Answer : E

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


17. Segmentation and reassembly are performed by which layer of OSI model?
A) Layer 3
B) Layer 4
C) Layer 2
D) Layer 7
E) None of these

Answer : B

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


18. Small Scale Integration(SSI) is related to which generation of computer?
A) Second Generation
B) Third Generation
C) Fourth Generation
D) First Generation

Answer : B
Third Generation computers use Integrated Circuits(ICs) which are based on
Small Scale Integration(SSI) and Medium Scale Integration(MSI)

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


19. Heat Sink is used to _____ ?
A) Provide warm up power to processor
B) Provide startup power to Operating System
C) Provide cooling to processor
D) None of these

Answer : C
Provide cooling to processor

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


20. The code written by user is called ____ code and the code after
execution is known as ____ code.
A) Object, Source
B) Viewer, Object
C) Source, Object
D) Viewer, Source

Answer : C

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


1. Which of the following is the loopback address?
A. 128.168.1.1
B. 255.255.255.255
C. 127.0.0.1
D. 192.255.254.253
E. None

Loopback address is a special IP number (127.0.0.1) that is


designated for the software loopback interface of a machine.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


2. A byte can represent any number between 0 and _____ .
A) 8
B) 255
C) 256
D) 1024
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


3. A primary key if combined with a foreign key creates
a) Parent-Child relationship between the tables that connect them
b) Many to many relationship between the tables that connect them
c) Network model between the tables that connect them.
d) None of the above.
4. The type of software that controls the internal operations in the
computer, and control how the computer works with all its parts, is
which of the following
(A) Shareware
(B) Operating System
(C) Application software
(D) Public domain software
(E) None of these
5. The database schema is written in
a) HLL
b) DML
c) DDL
d) DCL
e) None of these
6. Architecture of the database can be viewed as
A. Two levels.
B. Four levels.
C. Three levels.
D. One level.
E. None of these
7. Key to represent relationship between tables is called ………..
a) Primary key
b) Secondary Key
c) Foreign Key
d) Both A and C
e) None of these
8. Which symbol is used in Excel to denote exponential numbers?
(1) *
(2) ^
(3) &
(4) $
(5) None of these
9. In case of entity integrity, the primary key should be
a) not Null
b) Null
c) both Null & not Null.
d) any value.
e) None of these
10. The language used in application programs to request data from
the DBMS is referred to as the ……….
a) DML
b) DDL
c) VDL
d) SDL
e) None of these
11. In an E-R diagram attributes are represented by
a) Rectangle.
b) Square.
c) Ellipse.
d) Triangle.
e) None of these
Q12. Related fields in a database are grouped to form a
a) data file.
b) data record.
c) menu.
d) bank.
e) None of these
13 ..…… is mainly responsible for allocating the resources as per
process requirement?
(A) RAM
(B) Compiler
(C) Hardware
(D) Software
(E) None of these
2. Which of the following is not an example of OS?
(A) Windows XP
(B) Mac OS
(C) DOS
(D) LYNX
(E) All are the examples of OS
1. Which of the following is the loopback address?
A. 128.168.1.1
B. 255.255.255.255
C. 127.0.0.1
D. 192.255.254.253
E. None

Loopback address is a special IP number (127.0.0.1) that is


designated for the software loopback interface of a machine.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


2. A byte can represent any number between 0 and _____ .
A) 8
B) 255
C) 256
D) 1024
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


3. A primary key if combined with a foreign key creates
a) Parent-Child relationship between the tables that connect them
b) Many to many relationship between the tables that connect them
c) Network model between the tables that connect them.
d) None of the above.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


4. The type of software that controls the internal operations in the
computer, and control how the computer works with all its parts, is
which of the following
(A) Shareware
(B) Operating System
(C) Application software
(D) Public domain software
(E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


5. The database schema is written in
a) HLL
b) DML
c) DDL
d) DCL
e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


6. Architecture of the database can be viewed as
A. Two levels.
B. Four levels.
C. Three levels.
D. One level.
E. None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


7. Key to represent relationship between tables is called ………..
a) Primary key
b) Secondary Key
c) Foreign Key
d) Both A and C
e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


8. Which symbol is used in Excel to denote exponential numbers?
(1) *
(2) ^
(3) &
(4) $
(5) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


9. In case of entity integrity, the primary key should be
a) not Null
b) Null
c) both Null & not Null.
d) any value.
e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


10. The language used in application programs to request data from
the DBMS is referred to as the ……….
a) DML
b) DDL
c) VDL
d) SDL
e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


11. In an E-R diagram attributes are represented by
a) Rectangle.
b) Square.
c) Ellipse.
d) Triangle.
e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


Q12. Related fields in a database are grouped to form a
a) data file.
b) data record.
c) menu.
d) bank.
e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


13 ..…… is mainly responsible for allocating the resources as per
process requirement?
(A) RAM
(B) Compiler
(C) Hardware
(D) Software
(E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


14. Which of the following is not an example of OS?
(A) Windows XP
(B) Mac OS
(C) DoS
(D) LINUX
(E) All are the examples of OS

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


15. Which of the following statements is wrong?
a) Windows XP is an operating system
b) Linux is owned and sold by Microsoft
c) Photoshop is a graphical design tool by adobe
d) Linux is free and open source software
e) None of the above

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


16. What does the XP stand for in Windows XP?
(1) Exponential
(2) Experience
(3) Expertise
(4) Exchange
(5) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


17. Which of the following is an example for Character printer?
A. Laser
B. Drum
C. Chain
D. Daisy Wheel
E. None

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


18. Multitasking seems in a system due to -
a) Time-stamping
b) Time-sharing
c) Time-responding
d) All
e) None of the above

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


19. Which of the following is not application software?
a) Windows New Technology
b) Page maker
c) Winword
d) Powerpnt
e) None of the above

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


20. What is the full form of a FRU?
a) Filled Replaceable Unit
b) Field Replaceable Unit
c) Full Replaceable Unit
d) Frequent Replaceable Unit
e) None of these

Short for field-replaceable unit, an FRU is an item that can be replaced


or sent out on the field. In other words, the part that needs to be
replaced does not need to be serviced through the company
or a service center.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


21. Which of the following is suitable to implement client
server network?
a) MS-DOS
b) Win 95
c) Win 98
d) Win 2000
e) None of the above

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


22. My Computer was introduced from
a) Windows 95
b) Windows 3.11
c) Windows 2.0
d) Windows 98
e) None

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


23. Which of the following operating system was initially
created at AT&T bell labs in 1970-71?
(A) DOS
(B) LINUX
(C) UNIX
(D) Mac
(E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


24. What is a process in OS?
(A) Procedure
(B) Step by step sequence
(C) Program in execution
(D) Data processing
(E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


25. In which of the concept of OS the CPU never sits idle?
(A) Multi-tasking
(B) Multi-Programming
(C) Batch processing
(D) In all of above
(E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


26. When sending an e-mail, the _____ line describes the contents of the
message.
(1) to
(2) subject
(3) contents
(4) CC
(5) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


27. ………….. is the set of computer instructions or programs that
enables the hardware to performs different tasks.
(A) Information
(B) Hardware
(C) Software
(D) Application
(E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


28. Special I/O devices such as, Joy stick, Data Glove are involved in
______________ applications.
A. Mechanics
B. Haptics
C. Optical
D. None of the Above

Haptics – Science of applying touch sensation and control to


interact with computer applications

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


29 :-In a certain code language, the symbol for '0' is '#' and for '1' is '$'.
There are no other symbols for numbers greater than one. The numbers
greater than one are to be written only by using the two symbols given
above. The value of symbol for '1' doubles itself every time it shifts one
place to the left. 0 is written as #, 1 is written as $, 2 is written as $#, 3
is written as $$, 4 is written as and so on.
($###$$) % of ($$##$###) is what?
(a) $###$$#
(b) $$$#$$
(c) $##$$#$
(d) ###$#$#

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


30. Instructions and data that are processed by the CPU are located
in________
(1) CD-ROM
(2) RAM
(3) the hard disk
(4) the motherboard
(5) none of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


31. ODBC stands for
a) Object Database Connectivity.
b) Oral Database Connectivity.
c) Oracle Database Connectivity.
d) Open Database Connectivity.
e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


32. …………… is used to minimize response time.
(A) Multi-Programming
(B) Multi-Tasking
(C) Batch system
(D) All
(E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


33. 1TB=2x bits what is the value of x?
a) 13
b) 34
c) 43
d) 40
e) None

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


34. A scanner that is moved by hand over the material being captured is
known as ________
A. Sheetfed scanner
B. Flatbed scanner
C. Drum scanner
D. Handheld scanner

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


35. Which of the following is firmware device?
(A) RAM
(B) ROM
(C) HDD
(D) FDD
(E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


36. You can use the ____________ bar to type URL and display a Web page,
or type a keyword to display a list of related Web pages.
a) Menu
b) Title
c) Search
d) Standard bar
e) None

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


37. Which part interprets program instructions and initiate control
operations?
a) Input
b) Storage unit
c) Logic unit
d) Control unit
e) None of the above

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


38. How do you display current date and time in MS Excel?
a) date ()
b) Today ()
c) Datetime ()
d) time ()
e) None of these

DATE: Returns a date, from a user-supplied year, month and day


TODAY: Returns today's date
NOW: Returns the current date & time
TIME: Returns a time, from a user-supplied hour, minute and second

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


39. In a Hierarchical model records are organized as
a) Graph.
b) List.
c) Links.
d) Tree.
e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


40. An entity set that does not have sufficient attributes to form a
primary key is a…………………
a) Strong entity set.
b) Weak entity set.
c) Simple entity set.
d) Primary entity set.
e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


41. What is used in most programs that is a part of a program and
guides the user through certain steps?
a) Software
b) Word
c) Wiki
d) Wizard
e) None of the above

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


42. Panther, Jaguar, Puma, and Cheetah are examples of what kind of
operating system?
a) Windows OS
b) Mac OS
c) Linux Operating Systems
d) Android Operating Systems
e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


43. As a person working in internet banking environment, why you
should be aware of the “Dictionary attack”?
a) It is used to inject worms or viruses in the system
b) It is used to determine a password
c) It is used to access customer’s account by determining other details
d) It is used for stealing info from the Credit Card
e) None of these

A dictionary attack is a method of breaking into a password-protected


computer or server. It is done by systematically entering every word in
a dictionary as a password. A dictionary attack is used as an attempt to
decrypt a message or document.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


44. Most of the internet banking sites provide which of the following
feature to reduce the risk of keystroke logging for the password entry?
a) Virtual keyboard
b) Finger Touching
c) Touch screen
d) Shape Writer
e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


45. Modern computers follow a generalized set of instructions to
perform any function. What are these instructions better known as?
a) Language
b) Instructions
c) Commands
d) Programs
e) None of these
46. Which of the following devices is used for video games, flight
simulators, training simulators and for controlling industrial robots?
a) Mouse
b) Light pen
c) Joystick
d) Keyboards
e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


47. What is the term used for verification of a login name and password
in computer terminology?
a) Configuration
b) Accessibility
c) Authentication
d) Logging
e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


48. In the relational models, cardinality is termed as:
a) Number of tuples.
b) Number of attributes.
c) Number of tables.
d) Number of constraints.
e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


49. What menu is selected to cut, copy and paste?
(1) File
(2) Tools
(3) Special
(4) Edit
(5) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


50. In a relational model, relations are termed as
a) Tuples.
b) Attributes
c) Tables.
d) Rows.
e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


51. ____________ is the file system used by the operating system to identify
the physical locations of files on the hard drive.
(1) RTOS
(2) GIF
(3) FAT
(4) POST
(5) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


52. Which input device cannot be used to work in MS Office?
(1) Scanner
(2) Mouse
(3) Keyboard
(4) Joy stick
(5) Light pen

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


53. ............. is a collection of web - pages and .......... is the very first page
that we see on opening of a website.
(1) Home page, Web page
(2) Website, Home page
(3) Web page, Home page
(4) Web page, Website
(5) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


54. Which input device is used to read information on a credit card?
A. Graphic Tablet
B. Numeric Keyboard
C. Bar Code reader
D. Magnetic Stripe reader
E. None

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


55. In OCR processing, When a character is recognized, it is converted
into_______ code.
A. binary
B. ASCII
C. EBCDIC
D. Both (A) and (B)
E. None of the Above

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


56. Which input device is used for inserting pin numbers for credit
cards?
A. Graphic Tablet
B. Numeric pad
C. Bar Code reader
D. Magnetic Stripe reader
E. None

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


57. ________ printers are the printers that print one page at a time.
A. Thermal
B. Drum
C. Chain
D. Dot Matrix
E. None

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


58. _________ is a protocol designed for recording and playing back music
on digital synthesizers.
A. Musical Interface
B. Graphical User Interface (GUI)
C. MIDI
D. MIME
E. None of the Above

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


59. Which is an interactive device that facilitates touch sensation and
fine-motion control in Robotics and Virtual reality?
A. Light Pen
B. Joystick
C. Data Glove
D. None of the Above

A data glove is an input device that is essentially a glove worn


on the hand that contains various electronic sensors that
monitor the hand's movements and transform them into a
form of input for applications such as virtual reality and
robotics. Some data gloves enable tactile sensing, allowing the
user to seemingly feel a virtual object and to apply fine-motion
control. Data gloves are also known as cyber gloves or wired
gloves.
60. Which device typically attachable to computer keyboard that allows
a blind people to read?
A. Light Pen
B. Joystick
C. Touch screen
D. Braille display
E. None

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


61. Which is an escape code language used to send commands to the
printer for printing documents?
A. Postscript
B. PCL
C. Both (A) and (B)
D. None of the Above

Printer Command Language

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


62. _________ is a device which recognizes physical or behavioral traits of
the individual.
A. Smart Card Reader
B. Optical Character Reader(OCR)
C. Optical Mark Reader(OCR)
D. Biometric Sensor
E. All of the above

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


63. __________ is a device that performs a variety of functions that would
otherwise be carried out by separate peripheral devices.
A. Single Function Peripheral
B. Multi Function Peripheral
C. Dual Function Peripheral
D. None of the Above
E. All of the above

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


64. What is the ultimate purpose of Defragmentation?
(1) Make the PC faster
(2) Create More Free Space
(3) Delete temporary files
(4) Reduce Power consumption
(5) none of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


65. The term ________ refers to data storage systems that make it
possible for a computer or electronic device to store and retrieve data.
A. input technology
B. output technology
C. storage technology
D. None of the Above

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


66. What's considered the 'backbone' of the World Wide Web?
(1) URL
(2) HTML
(3) HTTP
(4) FTP
(5) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


67. Small application programs that run on a Web page and provide
animation are known as _________
(1) flash
(2) spiders
(3) cookies
(4) applets
(5) none of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


68. What is the codename given to Edge web browser?
a) Spartan
b) Opera
c) Google
d) Orange
e) Cortana

Microsoft Edge is codenamed as Spartan. It is a web browser


developed by Microsoft. It was first released for Windows 10
in 2015 and then for Android and iOS in 2017.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


69. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To provide TCP/IP
(D) To process client requests for database access
(E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


70. The operating system that is self-contained in a device and resident
in the ROM is ______
(1) Batch Operating System
(2) Real - time Operating System
(3) Embedded Operating System
(4) Multi Operating System
(5) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


71. What is the correct way to refer the cell A10 on sheet3 from sheet1?
A. sheet3!A10
B. sheet1!A10
C. Sheet3.A10
D. A10
E. None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


72. Which language is used to create macros in Excel?
A. Visual Basic
B. C
C. Visual C++
D. Java
E. None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


73. In MS-Excel worksheet which formula should be entered in A3 so
that a number 20% smaller than the number in A1 should display in A3?
(A) =A1*1.20
(B) =A1*0.80
(C) =A1%20
(D) =A1*110

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


74. The process of rewriting parts of a file in contiguous sectors on a hard
disk to increase the speed of access and retrieval is known as:
(A) Format
(B) Defragmentation
(C) File Allocation Table (FAT)
(D) Configuration

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


75. in MS WORD what is gutter margin?
a. margin that is added to the left margin when printing.
b. margin that is added to right margin when printing.
c. margin that is added to blindside binding side of page when printing.
d. margin that is added to outside of the page when printing

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


76. Which of the following formulas will Excel Not be able to calculate?
A. =SUM(Sales)-A3
B. =SUM(A1:A5)*.5
C. =SUM(A1:A5)/(10-10)
D. =SUM(A1:A5)-10
E. None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


77. A typical worksheet has …. Number of columns for new versions.
A. 128
B. 256
C. 512
D. 1024
E. None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


78. How many characters can be typed in a single cell in Excel?
A. 256
B. 1024
C. 32,000
D. 32,767
E. None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


79. What happens when we try to delete the fries on the floppy ?
(1) The files get moved to the Recycle Bin
(2) Files on a floppy cannot be deleted
(3) The files get deleted and can be restored again from Recycle Bin
(4) The files get deleted and cannot be restored again
(5) The file gets copied on the Hard disk

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


80. In Word you can force a page break–
(1) By positioning your cursor at the appropriate place and pressing the F1 key
(2) By positioning your cursor at the appropriate place and pressing Ctrl +Enter
(3) By using the Insert/Section Break
(4) By changing the font size of your document
(5) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


81: (6702)8=(?)2
(1) (101011010111)2
(2) (101001010110)2
(3) (110111000010)2
(4) (110102101011)2
(5) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


82. Which of the following IP address is belong to C network?
(a) 127.0.0.1
(b) 192.120.10.90
(c) 228.192.255.10
(d) 0.0.0.0
(e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


83. Which of the following are different SDLC Models?
a) Waterfall Model
b) Iterative Model
c) Big Bang Model
d) All of the Above
e) None of these

There are several SDLC models available such as Waterfall Model,


Iterative Model, Spiral model, V-model and Big-bang Model etc.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


84. Retail employees typically use ____________ terminals to process sales
transactions.
(A) sales processing
(B) transaction point
(C) automatic teller
(D) point of sale
(E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


85. The simultaneous processing of two or more programs by multiple
processors is ___
(A) multiprogramming
(B) multitasking
(C) time-sharing
(D) multiprocessing
(E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


86. Which of these protocols is used to login into a remote computer?
a) Telnet
b) IMAP
c) HTTP
d) SMTP
e) None of these

Telnet – Terminal Network.


Telnet is a protocol used to log in to remote computers.
terminals over the Internet or a TCP/IP computer network.

Internet Message Access Protocol (IMAP) is a protocol for accessing


email or bulletin board messages from a (possibly shared) mail
server or service.
87. Which of the following extends data across networks rather than
store it in one central site?
(A) PIM
(B) File manager
(C) Distributed database
(D) Data mining program
(E) None of these

personal information manager

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


88. Which of the following is saved to noncontiguous clusters on a hard
disk?
(A) Clustered file
(B) Defragmented file
(C) Sectored file
(D) Fragmented file
(E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


89. Zip is a -----file.
(A) Executable File
(B) Compressed File
(C) System File
(D) Combo
(E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


90. Which of these web browsers has the largest market share
presently, across all platforms?
a) Edge
b) Chrome
c) Safari
d) Firefox
e) WWW

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


91. Which of the following memories uses a MOS capacitor as its
memory cell?
A. SRAM
B. DRAM
C. ROM
D. FIFO
E. LIFO

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


92. All of the following are considered to be storage devices EXCEPT______
(A) floppy disk
(B) CPU
(C) CD
(D) hard disk drive
(E) none of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


93. What is the full form of DHCP?
a) Destined Host Configuration Protocol
b) Data Hosting Central Protocol
c) Dynamic Housing Central Protocol
d) Dynamic Host Configuration Protocol
e) None of these

DHCP stands for Dynamic Host Configuration Protocol.


It is a client/server protocol that automatically provides an
Internet Protocol host with its IP address and other related
configuration information.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


94. A computer checks the _____ of user names and passwords for a
match before granting access.
(A) Website
(B) Network
(C) Backup file
(D) Data base
(E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


95. What is the term for unsolicited e-mail?
(A) News group
(B) Use net
(C) Backbone
(D) Flaming
(E) Spam

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


96. What is the full form of HVD?
a) Hydraulic Video Disk
b) Halogenated Versatile Disk
c) Holographic Versatile Disc
d) Hyper Video Disk
e) None of these

HVD stands for Holographic Versatile Disc. It has been development by


The Holography System Development (HSD) Forum using a green
writing/reading laser and a red positioning/addressing laser.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


97. The ____ records the name and exact location of every file on a disk.
(1) partition master
(2) file allocation table
(3) disk controller
(4) boot sector
(5) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


98. What should be used if a company wants to include its company name
and logo at the bottom of every page of a brochure?
(A) Header
(B) Macro
(C) Footer
(D) Footnote
(E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


99. Who is known as the father of the electronic spreadsheet?
a) Cullinane
b) Alsop
c) Dan Bricklin
d) Richard Rabins
e) None of these

Daniel Bricklin is best known as the co-creator of VisiCalc, the first


electronic spreadsheet. For his work with VisiCalc, Bricklin is often
referred to as “the father of the Spreadsheet.”

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


100. Which of the following terms is used for a software that is built
from an existing program?
a) Brownfield
b) Greenfield Telegram channel link:
https://t.me/reasoningandcomputerbyyogeshsir
c) Pre-existing
d) All of the above
e) None of the Above

Brownfield software development refers to the development


and deployment of a new software system in the presence of
existing or legacy software systems.

Greenfield software development refers to developing a system


for a totally new environment and requires development from
a clean slate – no legacy code around.
Relational Database model
In relational model, the data and relationships are represented by collection of inter-
related tables. Each table is a group of column and rows, where column represents
attribute of an entity and rows represents records.
1. Attribute – Attributes are the properties which define a relation.
2. Tables – In the Relational model the relations are saved in the table format. It is
stored along with its entities. A table has two properties rows and columns.
3. Tuple – It is nothing but a single row of a table.
4. Relation Schema – A relation schema represents the name of the relation with its
attributes.
5. Degree – The total number of attributes which in the relation.
6. Cardinality – Total number of rows present in the Table.
7. Relation instance – The set of tuples of a relation at a particular
instance of time is called as relation instance.
8. Attribute domain – Every attribute has some pre-defined value
and scope which is known as attribute domain.
Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir
Primar
y Key

Primary Foreign
Key Key

Tuple

Master Table Slave Table


Primary Table Secondary Table
Parent Table Child Table

Primary Key is used to uniquely identify each record in a table.


Primary Key – Unique + Not Null
When a master table contribute its own primary key to another table,
then the contributed key of another table is known as foreign key.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


1. At a time how many operating system can be at work on a computer ?
(1) Only one
(2) Two
(3) Three
(4) Four
(5) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


2. Which of the following is used for close a tab on a browser?
(1) Ctrl + T
(2) Ctrl + W
(3) Ctrl + A
(4) Ctrl + Y
(5) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


3. A _______ contains specific rules and words that express the logical
steps of an algorithm?
(1) syntax
(2) programming structure
(3) programming language
(4) logic chart
(5) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


4. What is the name given to the specialized application that is build for a
specific business?
a) Vertical Application
b) Horizontal Application
c) System Software
d) Both a and b
e) None of the Above

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


5. What does the SCCM stands for?
a) Software Center Configuration Manager
b) Software Configuration Checking Manager
c) System Center Configuration Manager
d) Specific Center For Checking and Management
e) None of the Above

SCCM is a software management suite provided by Microsoft


that allows users to manage a large number of Windows based
computers.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


6. Which of the following languages was first conceived by Alain
Colmerauer?
a) FORTRAN
b) Prolog
c) Java
d) COBOL
e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


7. What is the full form of RAID?
a) Redundant Array of Inexpensive Disks
b) Replicated Array of Independent Data
c) Redundant Array of Independent Disks
d) Replicated module of Identity
e) None of these

It is a data storage virtualization technology that combines multiple


physical disk drive components into one or more logical units for the
purposes of data redundancy, performance improvement, or both.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


8. Which of the following are examples of Access network?
a) ADSL
b) ISP
c) Mobile Network
d) All of the Above
e) None of these

An access network is a user network that connects subscribers


to a particular service provider and, through the carrier network,
to other networks such as the Internet. Examples of access
networks are ISP, home networks, enterprise networks, ADSL,
mobile network etc.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


9. A world wide web contains web pages ______
(1) Residing in many computers
(2) Created using HTML
(3) With links to other web pages
(4) Residing in many computers linked together using HTML
(5) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


10. Which among the following correctly defines a Wide Area Network?
a) Wide Area Network is quite bigger network than the LAN.
b) The internet is one of the biggest WAN in the world.
c) In a WAN network, messages are transmitted fast.
d) All of the Above
e) None of these

A Wide Area Network is not limited to a single location, but it spans over a
large geographical area through a telephone line, fiber optic cable or
satellite links.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


11. Which of the following is the location information application software?
a) MATLAB
b) Google
c) ArcGIS
d) Win
e) None of these

ArcGIS is a geographic information system.


It is used for working with maps and geographic information.
It is used for creating and using maps, compiling geographic data,
analyzing mapped information etc.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


12. What is the name given to any software that is included with a new
computer, hardware, or other software program?
a) Bundled Software
b) Pre-installed Software
c) Free Software
d) Both a and b
e) None of these

Bundle ware, pre-installed software, Bundled software is any software that is


included with a new computer, hardware, or other software program. Bundled
software is included at no additional cost to the user.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


13. What is the name given to the computing infrastructure close to the
sources of data?
A. Edge Computing
B. Embedded Computing
C. Encrypted Computing
D. None of the Above
E. All of the above

Edge computing refers to the computing infrastructure at the edge of the


network, close to the sources of data. Edge computing reduces the
communications bandwidth needed between sensors and the datacenter.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


14. What is the name given to the technique of connecting computers?
a) Node
b) Topology
c) Architecture
d) Ring
e) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


15. Which of the following are the primary ways to enable LAN
connections?
a) Ethernet
b) Wi-Fi
c) Both a and b
d) None of the Above

Ethernet and Wi-Fi are the two primary ways to enable LAN connections.
Ethernet is a specification that enables computers to communicate
with each other. Wi-Fi uses radio waves to connect computers
to the LAN.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


16. Direct Memory Access is used for____.
A) It is used for saving CPU Cycles
B) It is used for Low Speed devices
C) It is used for High Speed devices
D) Both A and C
E) None of these

DMA Stands for ‘Direct Memory Access’. It is a method of transferring data


from RAM to another part of the computer without processing using the
CPU. It is used to save CPU cycles and basically used for
high speed devices.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


17. A _________ is a component of motherboard which absorbs the heat
produced by the processor and other components of a computer.
A) Heat sink
B) Northbridge
C) CPU Socket
D) CMOS battery
E) None of these

A heat sink is a component of a motherboard which absorbs the heat


produced by the processor and other components of a computer

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


18. Which of the following is the oldest web browser still in general use?
a) Lynx
b) Safari
c) Internet Explorer
d) Navigator
e) Mosaic

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


19. Accessing data on tapes is much ....... than that accessing data on disks.
(1) Slower
(2) Faster
(3) Same
(4) All of the above
(5) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


20. ________ is the process of dividing the disk into tracks and sectors.
A) Tracking
B) Formatting
C) Crashing
D) Allotting
E) None
1. Technique to implement virtual memory where memory is divided into
units of fixed size memory is _________
A. Paging
B. De-fragments
C. Segmentation
D. Swapping
E. None of the above

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


2. ___________ is a very high speed memory placed in between RAM and CPU.
A. Magnetic disk
B. Magnetic drum
C. Virtual memory
D. Cache memory
E. None of the above

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


3. Virtual memory is _________
A. an extremely large main memory
B. an extremely large secondary memory
C. a type of used in super computers
D. an illusion of extremely large main memory
E. None of the above

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


4. Which generation of computer uses integrated circuits?
A) 1st generation
B) 2nd generation
C) 3rd generation
D) 4th generation
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


5. Which of the following is not a valid type of mouse?
A) Optical mouse
B) Wireless mouse
C) Magnetic mouse
D) Trackball mouse
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


6. The point used to connect external device to the motherboard is known as?
A) Bus
B) Plug and play
C) Port
D) DMA
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


7. The software used in the banking system will be correctly defined as?
A) System software
B) Application software
C) 5th generation software
D) Interpreters
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


8. Letter ‘G’ is a valid in direct form in which of the following number system?
A) Binary
B) Decimal
C) Hexadecimal
D) All of these
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


9. A note or drawing added to a slide during a presentation in MS PowerPoint is
called
A) footnote
B) annotation
C) notation
D) explanation
E) comment

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


10. The technology of connecting to the Internet via a phone line is called?
A) WiMax
B) VoLTE
C) DSL
D) Telnet
E) None of these

WiMAX is. Acronym for Worldwide Interoperability for Microwave Access.


Based on Wireless MAN technology.
Voice over Long-Term Evolution (VoLTE) is a standard high-speed
wireless communication for mobile phones and data terminals,
including Internet of things (IoT) devices and wearables.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


11. Name the technology that allows one to experience and interact with images
in a simulated three-dimensional environment.
A) Webcam
B) Video Conferencing
C) Virtual Reality
D) Live Streaming
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


12. What does C stands for in WWWC (W3C)?
A) Computer
B) Congress
C) Consortium
D) Community
E) None of these

World Wide Web Consortium (W3C)

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


13. Which of the following is not a valid IP Address?
A) 23.54.231.10
B) 192.168.23.56
C) 168.25.76.56
D) 192.168.1.298
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


14. While typing the URL of a website the term HTTP is followed by?
A) ://
B) :\\
C) :/
D) :\
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


15. Which virus affects the boot sector of a hard disk by altering the boot data?
A) Macro Virus
B) Cavity Virus
C) File Viruses
D) Cluster Virus
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


16. Virus affecting the instructions that are capable of performing series of task
in a single go are called?
A) Macro Virus
B) Boot Sector Virus
C) Memory Resident Virus
D) Overwrite Viruses
E) None of these

Macro is a way to automate those task which we perform repeatedly in MS Office suit.
These macro virus infect these files and get executed whenever these macros are run.

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


17. The virus that encrypt or encode themselves in a different way whenever
they are executed ,making it difficult for antivirus to catch them are known as?
A) Tunning Viruses
B) Boot record Virus
C) Polymorphic Virus
D) Ransomware
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


18. The program which appear to be useful software but will actually do damage
once installed are termed as?
A) Shareware
B) Worms
C) Trojans
D) Wrong ware
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


19. A type of virus which replicates very fast without the need of host file is
called?
A) Worms
B) Trojan
C) Multipartite virus
D) FAT Virus
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


20. How many character can be represent at a time by using 8 Bits?
A) 8
B) 256
C) 255
D) 1024
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


List of some important File extensions for exams
.doc - Microsoft Word Document file used by version 2003 and earlier.
.docx - Microsoft Word Document file used by version 2007 and later.
.xls - Microsoft excel file used by version 2003 and earlier.
.xlsx - Microsoft excel file used by version 2007 and later.
.ppt - Microsoft Power-point presentation used by version 2003 and earlier.
.pptx - Microsoft Power-point presentation used by version 2007 and later.
.pps - Microsoft Power-point slideshow used by version 2003 and earlier.
.ppsx - Microsoft Power-point presentation used by version 2007 and later.
.mdb - Microsoft Access database file used by version 2003 and earlier.
.mdbx - Microsoft Access database file used by version 2007 and later.
.bak - Back up file.
.bat - Batch file
.txt - Text file (Notepad file)

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


.rtf - Rich text format file
.sys - System file
.exe - Executable file
.dll - Dynamic link library file
.ini - Initialization file
.fnt - Font file
.ttf - True type font file
.apk - Android Package kit
.config - configuration file
.jpeg - joint photographic expert group
.gif - Graphics interchange format file
.bmp - Bitmap image file
.tif/tiff - Tagged image format file
.wma - Window media audio file

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


.wmv - Window media audio file
.avi - Audio video interleave file
.mpeg - Motion/Moving picture experts group
.flv - Flash video file
.vob - Video object file
.mkv - Matroska Video file
.obj - Object file
.rar - Roshal archive file
.mime - Multipurpose internet mail extension
.com - Command file
.Ptr - Pointer file
.zip - Compressed file of WinZip
.jar - Java archive file
.c - C language file
.Pkg - package file
.temp - temporary file
Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir
.cpp - C++ language file
.java - Java file
.js - Java Script file
.py - Python Language file
.vbs - Visual Basic Script file
.php - Hypertext Preprocessor
.Cs - C sharp language File (C#)
.Css - Cascading Style sheet
.Htm/html - Hypertext mark-up language
.xhtml - Extensible Html
.Wml - Wireless mark-up language
.Xml - Extensible Mark-up language
.Asp - Active server page
.jsp - Java server page
.ico - Icon file

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


MCQs

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


1. A computer which provides its services to other computer on a network
is termed as?
A) Backend system
B) Client
C) Server
D) Gateway
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


2. The image or text verification used by computer systems to distinguish
between human and bots/spam inputs is known as?

A) Captcha
B) tele-verification
C) group policy
D) firewall
E) None of these

CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart)

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


3. The startup check by a computer to ensure the proper working of all attached
device is known as?
A) BIOS
B) POST
C) CMOS
D) SMPS
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


4. The transaction processing system in which the transaction is processed
immediately without accumulation of transaction is known as?

A) Batch processing
B) OLTP
C) Universal processing
D) Operational processing
E) None of these

OLTP – online transaction processing (real-time processing system)

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


5. Which of the following is an example of decentralized, distributed database
that maintains a continuously-growing list of ordered records and a link to a
previous record?

A) Relational Database
B) Blockchain
C) LTE Database
D) Procedural Database
E) None of these
6. Statements :
(i) Operating System is the main part of Application software
(ii) Assembly language is made up of only 0s and 1s.
(iii) Software provides easy to use interface to work with the hardware
components.

A) Only (i) and (ii) are true


B) Only (ii) and (iii) are true
C) Only (iii) is true
D) Only (ii) is true
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


7. Which of the following address differentiates the computers connected in a
network?

A) IP Address
B) Web Address
C) Host Address
D) MIC Address
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


8. CSS stands for?

A) Corporate Style Sheet


B) Computing System Sheet
C) Cascading Style Sheet
D) Communicative System Sheet
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


9. Which of the following is not a valid protocol of internet system?

A) UDP
B) ADSL
C) SNMP
D) ICMP
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


10. The moving text that appears on websites are known as?

A) bitmap
B) marquee
C) text-stiller
D) animator
E) None of these
11. GUI based operating system are based on the concept of?

A) LIGO
B) FIFO
C) WYSIWYG
D) LIFO
E) None of these

WYSIWYG is an acronym for “what you see is what you get”

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


12. Which of the following is the highest unit of storage in computer field?

A) Pijabyte
B) Exabyte
C) Terabyte
D) Zettabyte
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


14. Which language among these is related to Artificial Intelligence?

A) Basic
B) Prolog
C) Cobol
D) C++
E) None of these
15. The concept of SQL is related to which generation of language?

A) Second Generation Language


B) Third Generation Language
C) Fourth Generation Language
D) Fifth Generation Language
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


16. Which of the following application software suite will be best suited for
basic data calculation and analysis?

A) Database
B) Text Editor
C) Spreadsheet
D) DTP Software
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


17. A person running a photo editing shop may not require which of the
following software?
A) Pagemaker
B) Coreldraw
C) Photoshop
D) Outlook Express
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


18. Which of the following does not represent a compressed file type?

A) .RAR
B) .ZIP
C) .7z
D) .EXE
E) None of these

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir


1. The process of identifying and removing errors from programs is called?

A) SDLC
B) Bug
C) Debugging
D) Testing

View Answer
Option C
2. Find the correct statement in relation to hard disk.
A) Sectors are divided into tracks and platters
B) Tracks are divided into sectors and platters
C) Platters are divided into tracks and sectors
D) Platters are divided into rows and column

View Answer
Option C
3. What is the full form of PDF?
A) Presentation Document File
B) Pre Document File
C) Portable Document Format
D) Post Document Format

View Answer
Option C
4. A local or restricted network in which information is accessible only within this private
network is known as?
A) Extranet
B) Intranet
C) Cloud system
D) WWW

View Answer
Option B
5. When an Intranet can be accessed by outside users for the purpose of information
exchange then It is known as?
A) Public Intranet
B) Extranet
C) Secured WWW
D) Ultranet

View Answer
Option B
6. Which of the following is the correct binary representation of decimal number 23?
A) 10101
B) 11011
C) 11010
D) 10111

View Answer
Option D
7. The term Large scale integration is related with?
A) Hard Disk
B) SMPS
C) Chip
D) Monitor

View Answer
Option C
8. Which of the following is used to connect a computer to computer network?
A) Network Interface Card
B) Network Integrity Card
C) Network Information Connection
D) Network Information Card

View Answer
Option A
9. Which of the following unit can represent the speed of internet connection?
A) bps
B) mhz
C) kb
D) bytes

View Answer
Option A
10. Which of the following is not a display technology used in computer monitors?
A) LCD
B) TFT
C) CRT
D) MRT

View Answer
Option D
11. Two computers can be connected directly for the purpose of file sharing using ____?

i) Ethernet ii) Wifi iii) Bluetooth

A) Both i) and iii)


B) Both ii) and iii)
C) Both i) and ii)
D) All

View Answer
Option D
12. The distortion caused in signals over network channel is termed as?
A) Repeaters
B) Attenuation
C) Gateways
D) Bridges

View Answer
Option B
13. The point of inter connections in a network is known as ____ ?
A) protocol
B) nodes
C) client
D) bus

View Answer
Option B
14. When a computer is booted, BIOS retrieves its information from ____?
A) RAM
B) CMOS chip
C) Hard Disk
D) Cache

View Answer
Option B

When the computer first boots up, BIOS pulls information from the CMOS chip to understand
the hardware settings, time, and anything else that’s stored in it.
CMOS Battery keeps the CMOS chip powered up even when the
computer is shut down.
15. Find the odd one out
A) .doc
B) .txt
C) .xls
D) .rtf

View Answer
Option C
16. “Justify” in MS Word is related to?
A) Paragraph Alignment
B) Page Indent
C) Page Orientation
D) Paragraph length

View Answer
Option A
17. Unauthorized copying and distribution of copyright material in computer world is
known as ___?
A) Spoofing
B) EULA
C) Piracy
D) Hacking

View Answer
Option C
18. The principle that Internet service providers should enable access to all content and
applications equally regardless of the source is known as?
A) Net Servicing
B) Net Equality
C) Net Neutrality
D) Fair Usage Policy

View Answer
Option C
19. The device used to carry out card payment at retail location is known as?
A) PoS
B) OMR
C) ATM
D) CDM

View Answer
Option A

Point of Sale (PoS) terminal


20. Which of the following is not an Impact Printer?
A) Dot Matrix
B) Line Printer
C) Daisy Wheel Printer
D) Thermal Printer

View Answer
Option D
21. Name the device which keeps the computer units powered up during time of
power cut.
A) SMPS
B) UPS
C) DSL
D) UDP

View Answer
Option B

UPS – uninterruptible power supply (UPS)


22. Which of the following represents the smallest storage space?
A) 1024 GB
B) 512 TB
C) 1024 MB
D) 1024 ZB

View Answer
Option C
23. Which of the following is not an example of Optical Disk?
A) CD
B) DVD
C) Hard Disk
D) Blue Ray Disk

View Answer
Option C

Hard Disk is a type of magnetic disk.


24. The measure of the degree of sharpness of a displayed image is known as?
A) CMYK
B) Anchor
C) Resolution
D) Raster

View Answer
Option C
25. Which of the following is not an Operating system of Computer?
A) Windows 2000
B) Symbian OS
C) Mandriva
D) Linux

View Answer
Option B
Symbian OS is an old mobile OS. Xenix is a discontinued OS from UNIX
26. The device used to connect two networks having different architecture and model is?
A) Hub
B) Switch
C) Modem
D) Gateway

View Answer
Option D
27. A situation when a computer software stops working and encounters an error is known as?
A) Flash
B) Cache
C) Crash
D) Command

View Answer
Option C

When a software or system stops working and behaves abnormally it is said to be crashed.
28. The speed of the computer microprocessor is measured based on?
A) RAM speed
B) Port Speed
C) Bus Speed
D) Clock Speed

View Answer
Option D

Clock Speed is the speed at which a microprocessor executes instructions. Clock speed is
expressed in the unit of Hertz(Hz) and its multiple unit.
29. A warm boot in older versions of Windows is caused by:
(1) Typing the Alt+ Tab key combination
(2) Selecting Hibernate or Standby when shutting down
(3) Typing the Ctrl+ Alt+ Delete key combination
(4) Pressing the power switch
(5) None of these

Answer: 3
30. Setting fonts for the text in your document is an example of:
(1) Formatting.
(2) Formulas.
(3) Tracking changes.
(4) Tools.
(5) None of these

Answer: 1
31. ____________ is the file system used by the operating system to identify the
physical locations of files on the hard drive.
(1) RTOS
(2) GIF
(3) FAT
(4) POST
(5) None of these

Answer: 3
32. A server uses _________applications software to support its client computers.
(1) back-end
(2) front end
(3) programming
(4) java
(5) none of these

Answer: 1
33. Help Menu is available at which button?
(1) End
(2) Start
(3) Turnoff
(4) Restart
(5) Reboot

Answer: 2
34. A connection from one HTML document to another HTML document is called __
(1) Hyper Link
(2) Connecting Link
(3) Icon
(4) All of these
(5) None of these

Answer: 1
35. The ___________ records the name and exact location of every file on a disk.
(1) partition master
(2) file allocation table
(3) disk controller
(4) boot sector
(5) None of these

Answer: 2
36. A _____ is a software component that lets the operating system and a device
communicate with each other by specifying the computer’s operating system exactly how to
work with that hardware.
A) mediator
B) driver
C) BUS
D) utility
E) None of these

View Answer
Option B
37. The pattern in which nodes as connected in a network is known as?
A) Network Connectivity
B) Network Methodology
C) Network Alignment
D) Network Topology
E) None of these

View Answer
Option D
38. Web Address is also known as?
A) IP Address
B) URL
C) Web Page
D) Home Page
E) None of these

View Answer
Option B

URL – Uniform Resource Locator is the technical term for web address
39. Find the Odd one out.
A) MS Word : Text
B) MS PowerPoint : Presentation
C) MS FrontPage : Web Site
D) Firefox : Web Site
E) None of these

View Answer
Option D
We create Text document in MS Word. We create presentation in Power Point. We create
website in Frontpage. But we do not create website in Firefox,
we just view website in firefox. Hence its odd one out
40. A computer on the network that utilizes the service of server computer is known as?
A) Client
B) Liveware
C) Bot
D) Server ware
E) None of these

View Answer
Option A
41. The pre-defined configuration or setting of a system or an application is known as ?
A) dynamic setting
B) pre-customed setting
C) customized setting
D) default setting
E) None of these

View Answer
Option D
42. A text-based expression of emotion created from ASCII characters that mimics a facial
expression is known as?
A) Smiler
B) Expressor
C) Emoticon
D) Emofier
E) None of these

View Answer
Option C
43. Which of the following term would best define an Operating System?
A) Utility
B) Motherboard
C) Platform
D) Play-and-Play
E) None of these

View Answer
Option C
44. Android Operating System is based on _____ ?
A) Windows Kernel
B) Linux Kernel
C) Java Kernel
D) Symbian Kernel
E) None of these

View Answer
Option B

Android is an Operating System developed by Google based on linux kernel.


45. A website for discussion or an informational site published on the world wide web is
known as ___?
A) Blog
B) Calloc
C) Home Page
D) Instant Messenger
E) None of these

View Answer
Option A
Blog is website created for some specific purpose like providing information
on a particular thing or sharing the thought of the writer.
46. _____ is a region of a physical memory storage used to temporarily store data while it is
being moved from one place to another.
A) Motherboard
B) Circuit
C) Buffer
D) ROM
E) None of these

View Answer
Option C

Buffer serves this purpose of temporary storage


47. The medium used for communication in in a network is also known as ___ ?
A) Channel
B) Bandwidth
C) Frequency
D) Attenuation
E) None of these

View Answer
Option A
48. In respect to display technology what does “F” stands for in TFT?
A) File
B) Form
C) Film
D) Future
E) None of these

View Answer
Option C
49. The process of encoding an information in such a way that it cannot be read without
proper authorization is known as ___?
A) Encapsulation
B) Encryption
C) Decryption
D) Abstraction
E) None of these

Option B
Encryption is used to code a piece of information so that only authorized user can read it. For
this the information must be first decoded and this process is known as Decryption
50. FAT in computer, is related to?
A) RAM
B) Hard Disk
C) Monitor
D) CPU
E) None of these

View Answer
Option B
51. Flash Memory is a types of ___ ?
A) Volatile memory
B) Non Volatile memory
C) RAM memory
D) ROM memory
E) None of these

View Answer
Option B
52. The statement “If you feed wrong data to the computer, it will give you the wrong output”
is best described in?
A) FIFO
B) GIGO
C) LIFO
D) LILO
E) None of these

View Answer
Option B
53. Which of the following is not a programming language?
A) LISP
B) MIPS
C) SQL
D) Java Script
E) None of these

View Answer
Option B
54. All of the following are considered to be storage devices EXCEPT______
(1) floppy disk
(2) CPU
(3) CD
(4) hard disk drive
(5) none of these

Answer: 2
55. One megabyte equals approximately ___________
1) 1,000 bits
2) 1,000 bytes
3) 1 million bytes
4) 1 million bits
5) 2,000 bytes

Answer: 3
56. A computer checks the _____ of user names and passwords for a match before
granting access.
(1) Website
(2) Network
(3) Backup file
(4) Data base
(5) None of these

Answer: 4
57. What is the term for unsolicited e-mail?
(1) News group
(2) Use net
(3) Backbone
(4) Flaming
(5) Spam

Answer: 5
58. When sending an e-mail, the _____ line describes the contents of the message.
(1) to
(2) subject
(3) contents
(4) CC
(5) None of these

Answer: 2
59. The _____ key will launch the start buttons.
(1) Esc
(2) Shift
(3) Logo
(4) Shortcut
(5) None of these

Answer: 3
60. What is object of UPS?
(1) Using for storage
(2) To increase the speed of a computer
(3) Provides backup power
(4) All of these
(5) None of these

Provides backup power


61. Documents converted to .......... can be published to the Web.
(1) .doc file
(2) http
(3) machine language
(4) HTML
(5) none of these

HTML
62. Which of the following printers generates character from a grid?
(1) Inkjet
(2) Laser
(3) Daisy wheel
(4) Dot matrix
(5) None of these

Dot matrix
63. In MS-Word 'alt + shift + d' does what?
(1) Automatically inserts the date
(2) Automatically Inserts the time
(3) Inserts the day
(4) All of the above
(5) None of these

Automatically inserts the date


64. What does 'ctrl +esc' do?
(1) Shows the start menu
(2) shows the format menu
(3) Shows the tools menu
(4) shows the insert menu
(5) None of these

Shows the start menu


65. Which of the following best defines embedded system?
(1) A program that comes wrapped in a box
(2) A program that is permanent part of a computer
(3) A computer that is a part of a larger computer
(4) A computer and software system that controls a machine
(5) None of these

A computer and software system that controls a machine


66. Digital video consists of a series of_____

(1) Media clips


(2) Captures
(3) Frames
(4) Pictures
(5) none of these

Frames
67. Which of the following is NOT an example of system maintenance?
(1) Replacing user interfaces
(2) Making backup copies of files
(3) Adding, deleting, adjusting records
(4) Providing system security
(5) none of these

Replacing user interfaces


68. If you change Windows 98 to Windows XP, you are actually performing ...........
(1) Upstart
(2) upgrade
(3) update
(4) patch
(5) None of these

upgrade
6. To make a copy of the current document to disk ........
(1) Use the 'Save' command
(2) This cannot be done
(3) Use the 'duplicate' command
(4) Copy the document
(5) Use the 'save as' command

Use the 'save as' command


70. Your position in the text is shown by a ..........
(1) Blinker
(2) Cursor
(3) Causer
(4) Pointer
(5) None of these

Cursor
71. When the pointer is positioned on a……….it is shaped like a hand.
(1) Grammar error
(2) Formatting error
(3) Screen Tip
(4) Spelling error
(5) hyperlink

hyperlink
72. A device, which is not connected to CPU, is called as .......
(1) land-line device
(2) On-line device
(3) Off-line device
(4) Device
(5) None of the above

Off-line device
73. The first graphical web browser are?
(1) BING
(2) EDGE
(3) Alltheweb
(4) Mosaic
(5) WWW

Mosaic
74. The term overflow means?
(1) An excess of Internal storage
(2) An excess of external storage
(3) A situation where record cannot fit in to its right place
(4) A device, which controls the level of humidity in the computer room
(5) None of these

An excess of Internal storage


75. Rotational delay time is also known as
(1) Seek time
(2) Shift time
(3) Latency
(4) Access time
(5) None of these

Latency
76. Pascal is
(1) A high-level programming language
(2) Named after Blaise Pascal
(3) Named after mathematician that facilitates structured programming techniques
(4) All of the above
(5) None of these

All of the above


77. The point at which the flow of text in a document moves to the top of a new page–
(1) Page insert
(2) Page break
(3) Page format
(4) All of the above
(5) None of these

Page break
78. Multiprocessor is a computer system–
(1) Where many CPU under a common control
(2) Consisting of more than one input devices under common control
(3) Where many output devices under
(4) All of the above
(5) None of these

Where many CPU under a common control


79. A mistake in an algorithm that causes incorrect results is called a .......
(1) Logical error
(2) Syntax error
(3) Machine Error
(4) Compiler error
(5) None of these

Logical error
80. Ctrl + D is short cut used for ?
(A) Open Dialogue Box
(B) Font Dialogue Box
(C) Save as Dialogue Box
(D) Save Dialogue Box

Answer : B

Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir

You might also like