Comp. Fundamental & Architecture Guess Questions
Comp. Fundamental & Architecture Guess Questions
       (a) CPU.        (b) Memory (c) Storage (d) File               Ans. (b)
102, is the key to close a selected drop-down list: cancel a
     a dialog box.                                           command ano
     (a) TAB          (b) SHIFT       (c) ESC                        Ans. (c)
103. is the key we use to run the                      (d) F10
      (a) SHIFT                     selected comman(d)               Ans. (c)
                       (b) TAB        (c) ENTER        (d) CTRL
104. Is the. functional key to
     (a) F5                    display save-as box.                  Ans. (d)
                      (b) F6          (c) F9          (d) F12
                             Shrey Publishing House
105. Data becomes
                              when it is presented in a
                                                                                 129
     can understand and u^e                              format that people
     (a) processed (b) graphs     (C) information (d)
106. The term
                          designates                  presentation Ans. (c)
      Computer systen to enhance
                                      equipment  that might be added to a
    (a) digital device
                                        its   functionality.
                                         (b) system add-on
     (c) disk pack                        (d) peripheral device
                      is a                                                     Ans. (d)
107. A                 microprocessor-based
     (a) perSonal computer                   computing
                                  (b) mainframe                     device.
    (c) workstation                      (d) server
                                                                               Ans. (a)
108. RAM can be treated as the                          for the computer's processor.
     (a) factory                          (b) operating room
     (c) waiting room                     (d) planning room                    Ans. (c)
  n Which of the following are the functions of a operating system
      (a) MDcates resources        (b) Monitors Activities
     (c)  Manages disks and  files (d) All of the above            Ans. (d)
410. To move a copy oT Tie rOm one Computer to another over a communication
     channel is called?
     (a) File transfer                   (b) File encryption
     (c) File modification               (d) File copying              Ans. (a)
111. The primary function of the         is to set up the hardware and load and
     start an operating system
     (a) System Programs                 (b) BIOS
     (c) CP                               (d) Memory                           Ans. (b)
112. What kind of memory is both static and non-volatile?
     (a) RAM        (b) ROM        (c) BIOS       (d) CACHE      Ans. (b)
113. is computer software designed to operate the computer hardware and to
     provide platform for running application software
     (a) Application softwar             (b) System software
     (c) Software                        (d) Operating system                  Ans. (b)
                                                                  can move
114. The              is the amount of data that a storage device
     from the storage medium to the Computer per second
     (a) data migration rate       (b) data digitizing rate        Ans. (c)
     (c) data transfer rate            data accesS rate
                                         (d)
 125. A device, which is not connected  to CPU, is called as
                                    (b) On-line device
     (a) Land-line device                                                       Ans. (c)
                                         (d) Device
     (c) Off-line device
116. What is the other name for programmed
                                   (c) LSIC
                                            chip* (d)            PROM           Ans. (C)
     (a) RAM          (b) ROM                                             generation
117. On-line real time systems        become popular       in
                                         (b) Second Generation
     (a) First Generation                (d) Fourth Generation               Ans. (c)
     (c) Third Generation                                             mouse, to input
118. You use a(n)                       such as        a keytboard or
     information                         (b) input device                       Ans. (b)
      (a) output device                  (d) processing device
      (C) storage device                                          requested   data
                                      "jump" directly      to the
 119, is the ability of a device to      (b) Random access
                                                                                Ans. (b)
       (a) Sequentia! access              (d) All of the
                                                         above
        C) Quick accesS
                    Computer
                                 Fundamental      & Architecture
(130                                    managernent       services that allow t.
                           and memory
120. prOvides process        programs to run
                                                simultaneously
     more tasks,    jobs, or           (b) Multithread1ng
      (a) Multitasking                 (d) Multicomputin9                       Ans. (a)
      (c) Multiprocessing                                            logical operations is
                                                  arithmetic and
                                operations like
 121.  The task  of  performing
       called
                                   (c) Editing             (d) Sorting           Ans. (a)
         (a) Processing (b) Storing
                                 known as
122. ALUand Control Unit jointly       (c) CPU     (d) PC                         Ans. (c)
     (a) RAM         (b) ROM
123. RAM is an example of           (b) Primary memory
     (a) Secondary memory                                                        Ans. (b)
       (c) Main memory              (d) Both (a) and (b)
124. Magnetic disk is an example of (b) Primary memory
      (a) Secondary memory
                                      (d) Both (a)       and (b)                 Ans. (a)
       (c) Main memory
                                           Computer language
  125. Which one of the following is NOT a          (d) C+ +                     Ans. (a)
                                      (c) COBOL
        (a) MS-Excel (b) BASIC
 126. RAM iS also called as
      (a) Read/Write Memory         (b) Long Memory
      (c) Permanent Memory          (d) Primary Memory               Ans. (a)
                                                           as directed by the
 127. Store data or information temporarily and pass it on
       contro! unit
      (a) Address     (b) Register (c) Number       (d) Memory       Ans. (b)
 128. Select the Odd one
         (a) Operating system         (b) Interpreter
      (c) Compiler                    (d) Assembler                 Ans. (a)
 129. A       .... is an additional set of commands that the computer displays
         after you make a selection from the main menu.
         (a) dialog box                    (b) submenu
         (c)    menu selection             (d) All of the above                  Ans. (a)
 130. COBOL is an acronym for
         (a) Common Business Oriented Language
         (b) Computer Business Oriented Language
         (c) Common Business Operated Language                                   Ans. (a)
         (d) Comnmon Business Organized Language
 131. All of the following are examples of real security and privacy risks EXCEr
       (a) Hackers                     (b) Spam
      (c) Viruses                                                        Ans. (b)
                                      (d) Identity theft
  132.     Which of the following is NOT    one   of the four      major   data processing
         functions of a computer?
          (a) gathering data           (b) processing data into information
       (c) analyzing the data or information
       (d) storing the data or information                              Ans. (c)
  133. All of the following are examples of storage devices EXCEPI :
        (a) Hard d1sk drives            (b) Printers                   Ans. (b)
       (c) Floppy disk drives            (d) CD drives
  134. The CPU and memory are
        (a) expansion board        ocated on the :
         (c) storage device              (b) motherboard               Ans. (b)
                                        (d) output device
                         Shrey Publishing House
135.is the Science that attempts to produce machines that display the same
                                                                           (131)
             intelligence that humans do
     type of
   (a)    Nanoscience
                                     (b) Nanotechnology
   (c) Simulation
                                (d) Artificial intelligence (AI) Ans. (d)
136. Servers are computers that provide resources to other computers
   Connected to a:
    (a)   networked                  (b) mainframe
    (c) supercomputer                (d) client                        Ans. (b)
          creating a    computer program, the
137. When                                                   designs the structure
    of the program
    (a) End user                      (b) System Analyst
    (c) Programmer                   (d) All of the above          Ans. (b)
138, Acomputer program that Converts an entire program into machine language
    at one time is called a/an
     (a) Interpreter (b) Simulator (c) Characters (d) Compiler    Ans. (c)
"39, Computers process datainto information by working exclusively with:
    (a) multimedia (b) word       (C) -numbers (d) characters Ans. (c)
    The difference between people with access to computers and the Internet
    and those without this access is known as the :
    (a) Digital divide              (b) Internet divide
    (c) Web.divide                  (d) E-illiteracy                    Ans. (a)
141. Computers manipulate data in many ways and this manipulation is calie(d)
     (a) upgrading (b) processing (c) batching         (d) utilizing    Ans. (b)
142. The ability to recover and read deleted or damaged files from a criminal's
     computer is an example of a law enforcement speciality called:
     (a) robotics                  (6) simulation
     (c) computer forensics        (d) animation                 Ans. (c)
143. Where does most data go first with in acomputer memory hierarchy?
     (a) RAM        (b) ROM        (c) BIOS       (d) CACHE     Ans. (a)
144. The                 data   mining technique     derives rules from real-world
     case examples.
     (a) Rule discover                 (b) Signal processing
     (C) Neural nets                   (d) Case-based reasoning          Ans. (c)
 145. are used to identify a user who returns to a Website
    (a) Cookies    (b) Plug-ins     (c) Scripts     (d) ASPs        Ans. (a)
40. Codes consisting of lines of varyinq widths or lengths that are computer
     readable are known as
     (a) an ASCII Code                 (b) a magnetic tape
     (C) an OCR SCanner            (d) a bar code                     Ans. (d)
   .Why is it unethical to share copyrighted files with your friends?
     (a) It is not unethical, because it is legal.               free.
      (D) It isS unethical because the files are being given for
                                                              copyright laws.
      () Sharing copyrighted files without permission breaks for free. Ans. (c)
      (0) It is not unethical because the files are being given
 148, Reusable optical storage will typically have the acronym:
      (a) CD                           (c) ROM          (d) RW            Ans. (d)
                        (b) DVD
 149, The most common type of storage devices are :
      (a) Steel          (b) Optical   (c) Magnetic (d) Flash            Ans. (b)
 132)             Computer Fundamental & Architecture
150. A device that connects to a network without the use of cables is caid
     be:
     (a) Distributed                  (b) Free
      (c) Centralized                 (d) none of these                    Ans. (d)
151. A person who used his or her expertise to gain access to other people's
     computers to get information legally or do damage is a :
     (a) Hacker                     (b) Spammer
      (c) Instant messenger          (d) Programmer                 Ans. (a)
152. To access properties of an object, the mouse technique to use is :
     (a) Dragging                 (b) Dropping
    (c) Right-clicking            (d) Shift-clicking              Ans. (c)
153. ADVD is an example of a (n):
     (a) Harddisk                 (b) Optical disc
     (c) Output device            (d) Solid-state storage device Ans. (b)
154. The procesS of transferring files from a computer on the Internet to your
        computer is called
        (a) Downloading                (b) Uploading
        (c) FTP                     (d) JPEG                              Ans. (a)
155. Help Menu is available at which button?
     (a) Tracking (b) Formatting (c) Crashing          (d) Allotting      Ans. (b)
156. is the process of dividing the disk into tracks and sectors.
      (a) End         (b) Start     (c) Turnoff     (d) Restart     Ans. (b)
157. Which is not abasic function of.a computer?
      (a) CISC         (b) RISC     (c) CD-ROM (d) Wi-Fi            Ans. (b)
158. The technology that stores only the essential instructions on a
     microprocessor chip and thus enhances its speed is referred to as
     (a) Store data                 (b) Accept input
     (c) Process data               (d) Copy text                   Ans. (d)
159. ASCII is a coding systern that provides
      (a) 256 different characters  (b) 512 different characters
     (c) 1024 different characters (d) 128 different characters     Ans. (c)
160. Which part of the computer is directly involved in executing the
     of the Computer program?                                           instructons
     (a) The scanner                 (b) The main storage
      (c) The secondary storage      (d) The processor                    Ans. (d)
161. When a computer is switched on, the booting
     (a) Integrity Test                                process performs
                                     (b) Power-On Self-Test
     (c) Correct Functioning Test    (d) Reliatbility Test                Ans. (b)
162. AComputer system that is old and perhaps not
      as afn)                                           satisfactory is rerered
      (a) Ancient system             (b) Historical system
      (c) Age old system              (d) Legacy system                    Ans. (d)
163. Which of the foilowing is not abinary number?
     (a) 001           (b) 101        (c) 202                             Ans. (c)
164, Which of the following does5 not                  (d) 110
      (a) ROM                          store data permanently?
       (C) Floppy Disk,              (b)  RAM
                                     (d) Hard Disk                        Ans. (b)
                              Shrey Publishing House
        Which    the following is the smallest
                of                                                            133
165.
     (a) Megabyte                               storage?
                                       (b) Gigabyte
       (c) Terabyte                    (d) None of these
        Which of the following contains                                   Ans. (d)
166.
       the processing of transactions?
                                          permanent   data and gets  updated during
      (a) Operating System File         (b) Transaction file
      (c) Software File
                                        (d) Master file
        Which of  the following helps to protect floppy disks             Ans. (d)
167.
       accidentally erased?                                      from  data getting
       (a) Access notch
                                         (b) Write-protect notch
    (c) Entry notch                      (d) Input notch                 Ans. (b)
168. Amodem is connected to
       (a) a telephone line              (b) a keyboard
       (c) aprinter                (d) amonitor
60. Large transaction processing systems in automated
                                                                  Ans. (a)
                                                      organisations use
       (a) Online processing             (b) Batch Processing
       (c) Once-a-day Processing         (d) End-of-day processing        Ans. (b)
170. In a computer, most processing takes place in
      (a) Memory                    (b) RAM
      (c) Motherboard                (d) CPU                              Ans. (d)
 171. Which of the following is not storage medium?
       (a) Hard disk                     (b) Flash drive
     (c) DVD                       (d) scanner                            Ans. (d)
172. The computer. abbreviation KB usually means
       (a) Key Block (b) Kernel Boot(c) Kilo Byte (d) Kit Bit             Ans. (c)
173. The typical computer criminal is a(n) :
       (a) Young hacker
       (b) Trusted employee with no criminal record
       (C) Trusted employee with a long, but unknown criminal record
       (d)      Overseas young cracker                                    Ans. (b)
L74. The common name for the crime of stealing passwords is :
     (a) Jacking                 (b) Identity theft
       (c) Spoofing                       (d) Hacking                 Ans. (c)
 ra Collecting personal information and effectively posing as another individual
    IS known as the crime of:
       (a) Spooling                       (b) Identity theft
       (c) Spoofing                       (d).Hacking                      Ans. (b)
176. Malicious software is known as :
        (a) Badware                       (b) Malware
       (C) Maliciousware        (d) Ilegalware                 Ans. (b)
177. A program that performs a useful task while simultaneously allowing
       destructive acts is a:             (b) Trojan horse
    (a) Worm                              (d) Macro virus              Ans. (b)
    (c) Virus
178. An intentionally                                    from program to program
                        disruptive program that spreads
       or from disk to disk is known as a :
       (a) Trojan horse                (b) Virus
                                                                        Ans. (b)
        (C) Time bomb                   (d) Time-related bomb sequence
134                Computer Fundamental & Architecture
179. In 1999, the Melissa virus was a widely publicised :
     (a) E-mail virus               (b) Macro virus.
      (c) Trojan horse               (d) Time bomb                      Ans. (a)
180. What type of virus uses computer hosts to reproduUce itself?
     (a) Time bomb                  (b) Worm
     (c) Melissa virus              (d) Macro virus                ns.       (b)
181. The thing that eventually terminates a worm virus is a lack of::
      (a) Memory or disk space       (b) Time
      (c) CD drives space            (d) CD-RW                          Ans. (a)
 182. When a logic bomb is activated by a time-related event, it is known às
      (a) Time-related bomb sequence
       (b) Virus
      (c) Time bomb             (d) Trojan horse                  Ans. (c)
183. Aogic bomb that was created to erupt on Michelangelo's birthday is an
      example of a :
      (a) Time-related bomb sequence
       (b) Virus
      (c) Time bomb                   (d) Trojan horse                 Ans. (c)
 184. What is the name of an application program that gathers user's nformation
      and sends it to someone through the Internet?
       (a) Avirus                   (b) Spybot
      (c) Logic bomb                (d) Security patch                Ans. (b)
 185. is the measurement of things such as fingerprints and retinal scans used
      for security access.
      (a) Biometrics                   b) Bio measurement
      (c) Computer security      (d) Smart weapon machinery Ans. (a)
 186. What is the most common tool used to restrict access
                                                           to a omputer
      system?
       (a) User logins                (b) Passwords
       (b) Computer keys              (d) Access-control software       Ans. (b)
  187. Hardware or software designed to quard against
       Computer network is known as an):                 unauthorized access tO a
        (a) Hacker-proof program      (b) Firewall
         (c) Hacker-resistant server
                                      (d) Encryption safe wal!          Ans. (b)
 188. The scrambling of code is known as:
       (a) Encryption                 (b) a firewal
       (c) Scrambling                  (d) Password proofing            Ans. (a)
 189, To prevent the loss of data during
       (a) Encryption program              power failures, use a(n):
    (c) Firewall                      (b)  Surge  protector
                                      (d) UPS                           Ans. (d)
 190. is defined as any crime completed
       (a) Computer forensics            through the use of computer tei
       (c) Hacking                    (b) Computer crime
191. refers to electronic           (d) Cracking                        Ans. (b)