DRDO Previous Year Computer Question (1000 MCQ)

418 views 142 slides Nov 11, 2024
Slide 1
Slide 1 of 142
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99
Slide 100
100
Slide 101
101
Slide 102
102
Slide 103
103
Slide 104
104
Slide 105
105
Slide 106
106
Slide 107
107
Slide 108
108
Slide 109
109
Slide 110
110
Slide 111
111
Slide 112
112
Slide 113
113
Slide 114
114
Slide 115
115
Slide 116
116
Slide 117
117
Slide 118
118
Slide 119
119
Slide 120
120
Slide 121
121
Slide 122
122
Slide 123
123
Slide 124
124
Slide 125
125
Slide 126
126
Slide 127
127
Slide 128
128
Slide 129
129
Slide 130
130
Slide 131
131
Slide 132
132
Slide 133
133
Slide 134
134
Slide 135
135
Slide 136
136
Slide 137
137
Slide 138
138
Slide 139
139
Slide 140
140
Slide 141
141
Slide 142
142

About This Presentation

DRDO Previous year Computer Question. MCQ Questions and answers for CEPTAM, Tech A, A&A and Computer science exam paper preparation with PDF Download Free (1000 MCQs). These MCQs collected from old Question papers like: DRDO CURDE, DRDO GTRE, ISRO, IOF, RRB, CRPF, ITI COPA, SSC, SBI, RBI, UPPCL...


Slide Content

Most Important Computer Questions Asked in Previous years competitive exams.
Useful for DRDO, ISRO, COPA, CCC, O level, Bank, MTS, Railway, Data Entry Operator, PWD,
PHED, Hindustan Aeronautics Ltd., Air India, NTPC, BHEL, GAIL, PGCIL, MTS, SSC, CGL, CHSL and
all other computer exams.

1. Microsoft 10 was launched in the year _____. [DRDO GTRE 2017]
a) 2013 b) 2014
c) 2016 d) 2015
Ans. d

2. Which of the following is true for testing and debugging? [DRDO CVRDE 2017]
a) Testing checks for logical errors in the programs, while debugging is a process of correcting those errors in the
program.
b) Testing and debugging indicate the same thing.
c) Testing detects the syntax errors in the program while debugging corrects those errors in the program.
d) All of the above
Ans. a

3. Computer systems that store instructions and data without any differences and data from the same memory unit
are based on _____ structure. [DRDO CVRDE 2017]
a) Harvard
b) Babbage
c) Knuth
d) Von-Neumann
Ans. d

4. In the screen is maximized, then the maximize button will be temporarily replaced by the _____ button. [DRDO
GTRE 2017]
a) Close
b) Open
c) Re-store
d) Minimize
Ans. c

5. Which of the following is not a ‘over write’ virus ? [RRB Ranchi Asst. Loco Pilot]
a) Trj. Reboot
b) Meve
c) Way
d) Trivial.88.D
Ans. b

6. Which of the following are machine level languages? [ISRO Satelite Centre Bengaluru]
a) C++
b) Java
c) Python
d) None of these
Ans. d

7. Program Counter (PC) register stores the-
a) Address of the first memory block
b) Address of the last memory block
c) Address of the next instruction to be executed
d) Size of the primary memory
Ans. c

8. Which of the following function(s) is/are provided by operating system? [RRB Ranchi Asst. Loco Pilot]
a) Process management
b) Security Management
c) File management
d) All of these
Ans. d

9. ____ was the first computer language developed for electronic computer in 1949? [RRB Ajmer Asst. Loco Pilot]
a) Short code
b) FORTRAN
c) COBOL
d) Pascal
Ans. a

10. How many layers are there in TCP/IP Model? [Indian Ordnance Factory]
a) 2
b) 4
c) 5
d) 7
Ans. b

11. Program that duplicate the functionality of one system on another system is known as [RRB Chandigarh Asst.
Loco Pilot]
a) Emulators
b) Simulators
c) Evaluators
d) PCB
Ans. a

12. Which of the following is an application protocol? [RRB Ahamadabad Asst. Loco Pilot]
a) HTTP
b) TCP
c) IP
d) UDP
Ans. a

13. Which among them is not an example of mobile operating system? [RRB Chandigarh Asst. Loco Pilot]
a) Android b) Bada
c) Fedora d) Symbian
Ans. c

14. Which of the following is included in Paragraph Formatting in a word processor? [RRB Ahmadabad Asst. Loco
Pilot]
a) Subscript b) Font
c) Underline colour d) Line spacing
Ans. d

15. To declare the version of XML, the correct syntax is:
a) ? xml version =’1.0’/
b) ? xml version =”1.0”/
c) * xml version =’1.0’/
d) /xml version = ‘1.0’/
Ans. b

16. On which of the following storage media, storage of information is organized as a single continuous spiral
groove?
a) RAM
b) Floppy disk
c) Hard disk
d) CD-ROM
Ans. d

17. The addressing mode used in an instruction of the from ADD X,Y is:
a) Absolute
b) Indirect
c) Immediate
d) Index
Ans. d

18. What is garbage collection in the context of java?
a) The operating system periodically deletes all of the Java files available on the system.
b) When all references to an object are gone, and then the memory use by the object is automatically reclaimed.
c) Any java package imported in a program and not being used is automatically deleted.
d) The java virtual machine (JVM) checks the output of any java program and delete anything that does not make
sense at all
Ans. b

19. Which of the following represents the life-cycle of software development?
a) Analysis – design – coding – testing- operation and maintenance
b) Analysis – Design – Coding – Operation and maintenance – testing
c) Design – Analysis – Coding – testing – operation and maintenance
d) Design – analysis – coding – operation and maintenance – testing
Ans. a

20. In a relational database model, cardinality of a relation means
a) The number of tuples b) The number of tables
c) The number of attributes d) The number of constraints
Ans. a

21. The 10 base 5 cabling is also known as _____.
a) Thick Ethernet
b) Gigabit Ethernet
c) Thin Ethernet
d) Fast Ethernet
Ans. a

22. What is the length of an IP address in bytes (pre-IPv6)?
a) 1
b) 4
c) 2
d) 8
Ans. b

23. Program Counter contents indicate:
a) The time elapsed since execution begins
b) The count of programs being executed after switching the power ON.
c) The address where next instruction is stored
d) The time needed to execute a program
Ans. c

24. Which of the following is the most appropriate format for graphics that are to be embedded within an internet
document?
a) BMP
b) GIF
c) TIFF
d) HTML
Ans. b

25. In relational databases, the natural join of two tables is:
a) Combination of Union and filtered Cartesian product.
b) Combination of projection and filtered Cartesian product
c) Combination of selection and filtered Cartesian product
d) Cartesian product always.
Ans. b

26. An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit
rate of the signal are ______ and ______.
a) 1000 bauds/ sec, 500 bps
b) 2000 bauds/sec, 1000 bps
c) 4000 bauds/sec, 1000 bps
d) 1000 bauds/sec, 4000 bps
Ans. d

27. Which of the following data structures is most suitable for evaluating postfix expressions?
a) Stacks b) Queue
c) Linked list d) Tree
Ans. a

28. The number of bits required to represent decimal number 4096 in binary form is _____.
a) 10 b) 13 c) 12 d) 16
Ans. b

29. In the context of visual basic, multiple controls of the same type can be grouped into an array, in the same
manner as a collection of data items. Such a grouping is known as:
a) Primary array
b) An integer array
c) Secondary array
d) Control array
Ans. d

30. Conceptual level, internal level and external level are three components of the three-level RDBMS architecture.
Which of the following is not of the conceptual level?
a) Entities, attributes, relationships
b) Semantic information
c) Constraints
d) Storage dependent details
Ans. d

31. Consider two database relations R and S having 3 tuples in R and 2 tuples in S. What is the maximum number of
tuples that could appear in the natural join of R and S?
a) 2
b) 5
c) 3
d) 6
Ans. d

32. When an ASP.NET file is placed on an IIS server and viewed through a browser, the resulting HTML Page
contains?
a) All ASP.NET code
b) As much ASP.NET code as is in the ASP.NET file
c) all HTML code
d) A mix of ASP.NET and HTML code
Ans. c

33. What result set is returned from the following SQL query? Select customer_name, telephone from customers
where city in (‘Jaipur’,’Delhi’,’Agra’)
a) The customer_name and telephone of all customers
b) The customer_name and telephone of all customers living in Jaipur, Delhi and Agra
c) The customer_name and telephone of all customer Living in either Jaipur, Delhi or Agra
d) The customer _name and telephone of all customers who are not living in Jaipur, Delhi or Agra
Ans. c

34. Semaphores are used to solve the problem of ______.
a) Race Condition b) The belady’s problem
c) Process synchronization d) mutual exclusion
Ans. d

35. A condition that is caused by run-time error in a computer program is known as:
a) Syntax error b) Fault
c) Semantic error d) Exception
Ans. d

36. A register in the microprocessor that keeps track of the answer or result of any arithmetic or logic operation is
the _.
a) Stack pointer
b) Instruction pointer
c) Program counter
d) Accumulator
Ans. d

37. Which of the following is true to define a variable for ASP?
a) DIM
b) Sets
c) $
d) Var
Ans. a

38. ______ is an intermediate storage are used for data processing during the extract, transform and load process of
data warehousing.
a) Buffer
b) Virtual memory
c) Staging area
d) inter-storage area
Ans. c

39. Which of the following Java statements declare and allocate a 2 dimensional array of integers with four rows and
five columns?
a) int array [4][5];
b) int array [][]==new int [4][5];
c) int array [5][4];
d) int array [][]=new int [5][4]
Ans. b

40. In ____ all the logic are implemented using registors and transistors.
Ans. Resistor and Transistor logic

41. _____ logic family implements the logic gates using MOSFET devices
Ans. MOS logic

42. For which logic gate, the output is “true” if either, but not both, of the inputs are “true”.
Ans. XOR

43. The ____ latch is hazard free.
Ans. Earle Latch

44. The flag size of an HDLC frame is ______.
Ans. 8 bits

45. Contents of one disk to another disk can be done using the command ____
Ans. DISK COPY

46. The assembler takes as its source code in _____ language program.
Ans. Assembly

47. In computer graphics, digital differential analyzer is used for ______ of lines, triangles and polygons.
Ans. Rasterization

48. The language that doesn’t use user defined functions, pointers and used defined types is ______
Ans. COBOL

49. ______ is a channel access method used by various radio communication technologies.
Ans. CDMA

50. _____ acts as a multiple input and single output switch.
Ans. Multiplexer

51. The small extremely fast, RAM’s are called as _______
Ans. Cache

52. The decoded instruction is stored in ______
Ans. Instruction Register

53. The instruction, Add#45, R1 does ______
Ans. Adds 45 to the value of R1 and stores it in R1

54. To make an algorithm in to a program which system can be used that defined by Turing Machine?
Ans. binary

55. Which instinct determines the basic learning problem?
Ans. Feedback

56. What will be the outcome if the true function is contained by hypothesis?
Ans. Unrealizable

57. Decision tree technique culminates its decision with _____
Ans. Sequence of tests

58. In a graphic system the number of pixels in a buffer is called ______
Ans. Resolution

59. Electrical Energy can be converted into light using _____ device?
Ans. Emitters

60. Which body transformation will make the objects to move without deformation?
Ans. Translation

61. Cyclomatic complexity can also be called as ____
Ans. White box testing

62. ______ interface transfer data to and from the memory through memory bus.
Ans. Direct Memory Access

63. Most common register, used to store data taken out from the memory is _____.
Ans. Accumulator

64. Unplanned interrupts which are produced during execution of program is called _____
Ans. Exception

65. ____ algorithm determines whether there is a path between any two nodes in the graph.
Ans. Warshall

66. The unformatted I/O command for reading a tape in FORTRAN is ______
Ans. READTAPE

67. How many units in a single bus structure communicate at a time?
Ans. Two

68. An _____ is a collection of operators and operands that represent a specific value.
Ans. Expression

69. A Grammar which produces more than one parse tree for a sentence is called _____.
Ans. Ambiguous

70. The computer language generally translated to pseudo-code is _____
Ans. Assembly

71. Type 0 Grammar is known as _____ grammar.
Ans. Context free

72. The tuple ‘Q’ in Turing machine refers to ____
Ans. States

73. In C++, the ______ cannot be passed to a function.
Ans. Structure

74. The _____ will scan partition table located within sector, for an active partition.
Ans. Master Boot Record

75. _______ is a file system used to help user to hide different file system complexities.
Ans. Virtual File system

76. We can look up a directory object by supplying its name to the _______ service.
Ans. Directory

77. _____ is a description of sequences of events taken together, lead to a system doing something useful.
Ans. Usecase diagram

78. A ______ model is an abstract model that describes how data is represented and used.
Ans. Data model

79. A _____ typically simulates few aspects and may be completely different from final product.
Ans. Prototype

80. The _____ layer provides link between two directly connected nodes.
Ans. Data Link layer

81. Data items that cannot be divided are called as _____.
Ans. Elementary items

82. In MIMD, each processor is connected to its _____ immediate neighbors.
Ans. Four

83. A _____ is a general reusable solution to a commonly occurring problem in Software design.
Ans. Design Pattern

84. _____ is the allocation of a Computer’s processor power to specific tasks.
Ans. Scheduling

85. In, a physical contact is required to be established with the actuator of it, to make/break a connection.
a) proximity switch
b) limit switch
c) relay switch
d) all the above
Ans. b

Question 86. -(i) CDMA uses spread spectrum technology
(ii) GSM Stands for Global System for Mobile
(iii) GSM uses TDMA
A:- (i) and (ii) are correct
B:- (i) and (iii) are correct
C:- (ii) and (iii) are correct
D:- (i),(ii) and (iii) are correct
Ans. d

87. Why is a trailer often added to the end of a frame in the data link layer?
a) Flow control b) Error Control
c) Addressing d) Access control
Ans. B

88. How many bytes are used in an Ethernet physical address?
a) 6
b) 4
c) 2
d) 8
Ans. a

89. Elimination –Yield Non-Preemptive Multiple Access Mechanism (EY-NPMA) is associated with which of the
following technologies?
a) LAN
b) HIPERLAN
c) ATM
d) TOKEN Ring
Ans. b

90. Which modulation mechanism is used in Bluetooth technology to transform bits to a signal?
a) ASK
b) PSK
c) OPSK
d) GFS
Ans. d

91. SEAL (Simple and Efficient Adaptation Layer) is associated with which AAL sub layer of ATM technology?
a) AAL1
b) AAL2
c) AAL3/4
d) AAL5
Ans. d

92. Which among the following is port number of TELNET server?
a) 21
b) 23
c) 25
d) 20
Ans. b

93. In which layer a proxy firewall filters data
a) Network layer
b) Transport layer
c) Application layer
d) Data Link Layer
Ans. c

94. A5 Algorithm is used in GSM for
a) Encryption b) Generation of Cipher key
c) Authentication d) Integrity
Ans. a

95. Which signal received by an 8086 processor indicates that an external device had requested the use of System
bus?
a) HOLD
b) INTR
c) TEST
d) Ready
Ans. a

96. The 10’s complement of ‘(52520)_(10)’ is.
a) 48240
b) 47480
c) 47840
d) 48470
Ans. b

97. If a multiplexer has 16 input lines, how many selection lines would be necessaiy?
a) 16
b) 8
c) 4
d) 2
Ans. c

98. _____ is used to restore the contents of the cells in synchronous DRAM.
a) Sense amplifier
b) Refresh counter
c) Restorer
d) Restore counter
Ans. a

99. If a block can be placed in a limited set of places in the cache, the cache is said to be
a) Fully associative
b) Set associative
c) Direct mapped
d) Restricted mapped
Ans. b

100. BIOS (Basic input output system) resides in
a) RAM
b) ROM
c) Cache
d) CPU
Ans. b

101. In process Scheduling, which of the following does not belong to a scheduler?
a) Medium Term Scheduler b) Short Term Scheduler
c) Long Term Scheduler d) Average Term Scheduler
Ans. d

102. In Java, which of these keywords must be used to monitor for exceptions?
a) Throw
b) Finally
c) Try
d) Catch
Ans. c

103. In Java, if a class member is declared protected, then which type will this member become in a subclass?
a) private member
b) public member
c) protected member
d) static member
Ans. a

104. How many elements will be there in the adjacency matrix if there are 8 verticles?
a) 8
b) 16
c) 32
d) 64
Ans. d

105. In a binary search tree, which of the following traversals print the numbers in ascending order?
a) In-order traversal
b) Pre-order traversal
c) Post-order traversal
d) Level-order traversal
Ans. a

106. DBMS is a ______ that enables user to create and maintain one or more databases.
a) Key
b) File
c) Program
d) Dataset
Ans. c

107. The most efficient lock that allows concurrent transactions to access rows of the same table consistently is
known as
a) Database – level lock
b) Table – level lock
c) Page – level lock
d) Row – level lock
Ans. d

108. In order to maintain transactional integrity and database consistency, what technology does a DBMS deploy?
a) Triggers b) Pointers
c) Locks d) Cursors
Ans. c

109. What kind of the query that retrieves rows from more than one table or view?
a) Delete
b) Insert
c) Join
d) All of the above
Ans. c

110. Which of the following attribute of the text-box control allow to limit the maximum characters inside the text-
box-control?
a) size
b) len
c) maxlength
d) all of these
Ans. c

111. Which of the following option is correct with regard to HTML?
a) It is a modeling language
b) It is a functional language
c) It is a partial programming language
d) it is used to structure documents
Ans. d

112. What will be the output of the following php code?
<?php
$num=1
$num1=2
Print $num.”+”.$num1;
?>
a) 3
b) 1+2
c) 1.+.2
d) $num.”+”.$num1
Ans. b

113. Which mysql command is used to create a backup of the database?
a) mysqldump
b) mysqladmin
c) mysqlimport
d) mysqlexport
Ans. a

114. A user right that is assigned to a user and specifying allowable actions on the system such as shutting down a
system is called a
a) User Permission
b) User Account
c) Use Policy
d) User Privilege
Ans. d

115. What is steganography?
a) It is an algorithm which takes an input and produces a message digest.
b) It is a process of embedding data into digital information for copyright protection.
c) It is an encryption technique used on media files to hide data within data
d) It is a technique used to bind a person or entity to a digital data
Ans. c

116. Which of the following controls is used to duplicate the active layer in photoshop?
a) Ctrl + R b) Ctrl + T
c) Ctrl + J d) Ctrl + D
Ans. c

117. Which of the following methods destroys the session and all the objects stored in a Session object, releasing
their resources?
a) Session.Clear()
b) Session.Abandon()
c) Session.End()
d) Session.Destroy()
Ans. b

118. Which of the following statements is INCORRECT regarding Java Exceptions?
a) An except is an irrecoverable condition and cannot be handled using try catch block
b) The Exception class is a subclass of the Throwable class.
c) Exceptions are divided into checked and unchecked exceptions.
d) Exceptions are mainly caused by the application.
Ans. a

119. Which of the following statements explains forwarding in DNS?
a) It is a feature in DNS server that is used to forward DNS queries for external DNS names to DNS servers outside of
that network.
b) It is a feature in DNS server that is used to forward page requests for websites outside of that network.
c) It is a feature that allows a server to update and resolve IP address within a network
d) It is a feature that allows a server to act as a gateway between a local network and the internet.
Ans. a

120. Which of the following is a 4G mobile telecommunication standard that uses OFDMA and SCFDMA?
a) UMTS b) GSM c) CDMA One d) LTE
Ans. d

121. Which of the following is a technical standard developed by Microsoft, that specifies a common type system
(CTS), Common language specification (CLS) and Virtual Execution System (VES), so that applications written in
multiple high level languages can be executed in different system environments?
a) Open software Foundation (OSF)
b) Common language infrastructure (CLI)
c) Common language Runtime (CLR)
d) Common Standards Revision Group (CSRG)
Ans. b

122. Which of the following elements in HTML5 configures the text that is no longer revelant?
a) <ir>
b) <irt>
c) <c>
d) <s>
Ans. d

123. Which of the following keeps state information about the use of I/O components?
a) Shell
b) Kernel
c) CPU
d) Hardware
Ans. b

124. Which of the following uses UDP and a logical connection to transfer files, and is used in bootstrapping diskless
workstations?
a) Network File system (NFS)
b) Trivial File Transfer Protocol (TFTP)
c) File Transfer Protocol (FTP)
d) Dynamic Host configuration Protocol (DHCP)
Ans. b

125. Which of the following is NOT a derived data type in C?
a) Array
b) Structure
c) Void
d) Pointer
Ans. c

126. Whicn one of the following terms best describes the sequence of analysis, design, implementation and testing
of a product?
a) Debugging
b) Product Development Cycle
c) Maintenance
d) Flowchart
Ans. b

127. Which of the following status codes does a web API sends on successful execution?
a) 201
b) 500
c) 200
d) 404
Ans. c

128. The process of converting a non-pixel based image into a digital based image is called ______.
a) Raster b) Zip
d) Scale d) Render
Ans. a

129. The process of converting data into various specialized formats to be used on a different device or a system for
various other information processing needs is called _________.
a) Obfuscation
b) Encoding
c) Hashing
d) Encryption
Ans. b

130. During connection establishment phase in TCP, which of the following is vulnerable to serious security problem?
a) URG flooding attack
b) SYN flooding attack
c) ACK flooding attack
d) FIN flooding attack
Ans. b

131. In a network with 75 computers, a mesh topology would require ______ cables.
a) 5550
b) 1208
c) 2775
d) 75
Ans. c

132. In windows registry, which of the following is a registry hive subtree that stores configuration data for the
current hardware profile?
a) HKEY_CURRENT_USER
B) HKEY_CURRENT_CONFIG
C) HKEY_LOCAL_MACHINE
D) HKEY_CLASSES_ROOT
Ans. b

133. How many hosts can be on a class C network?
a) 254
b) 64
c) 128
d) 256
Ans. a

134. A _____ is a collection of key value pair where indexing is done via arbitrary keys of any object type and need
not be an integer index
a) Array b) Range
c) Set d) Hash
Ans. d

135. The block in a file system which contains the control information about individual files is:
a) ifiles block b) super block
c) data block d) inodes
Ans. d

136. A simple sorting algorithm that repeatedly steps through the list to be sorted comparing each pair of adjacent
items and swapping them if they are in the wrong order is called the ______.
a) Bubble sort
b) Quick sort
c) Selection sort
d) Insertion sort
Ans. a

137. The schema of table is an example of
a) Relationship
b) Entity
c) Atomicity
d) Metadata
Ans. d

138. What is the approximate address space generated by a 32 bit address?
a) 8 GB
b) 4 GB
c) 4 MB
d) 2 GB
Ans. c

139. ______ is the state of transaction when the normal execution of the transaction cannot proceed.
a) Aborted
b) Failed
c) Inactive
d) Terminated
Ans. b

140. The command which will check if the string begins with “Are” is:
a) [[ $string == ‘Are*’ ]]
b) [[ $string == ‘*Are*’ ]]
c) [[ $string == “Are*” ]]
d) [[ $string == Are* ]]
Ans. c

141. _____ is not a data manipulation language statement.
a) Delete
b) Commit
c) Update
d) Insert
Ans. b

142. If all the columns in a table describe and depend upon primary key, then the table is said to satisfy ______.
a) 2 NF b) 3 NF
c) 4 NF d) 1 NF
Ans. b

143. In JDBC, ______ interface provides methods to manage transaction.
a) Commit b) Prepare Call
c) Rollback d) Connection
Ans. d

144. Pick the correct definition for information Security.
a) The practice of preventing authorized access, use, disclosure, disruption, modification, inspection, recording or
destruction of information.
b) The practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection of public
data.
c) The practice of preventing unauthorized access, use disclosure, disruption, modification, inspection, recording or
destruction of information
d) The practice of reviewing access, use, disclosure, disruption, modification, inspection, reporting or destruction of
information.
Ans. c

145. The protocol jointly developed by Mastercard and VISA for secure financial transactions, which uses standard
Digital Certificates like X.509 Certificate is called _______.
a) Secure Electronic Transaction (SET)
b) Transmission Control Protocol/Internet Protocol (TCP/IP)
c) Hypertext Transfer Protocol Secure (HTTP-S)
d) File Transfer Protocol (FTP)
Ans. a

146. How much faster is binary search when compared to linear search?
a) exponentially faster
b) twice as fast
c) faster by a factor of log n
d) n times faster
Ans. b

147. This sort does not used divide and conquer methodology –
a) Bubble sort
b) Merge sort
c) Quick sort
d) All of the above
Ans. b

148. A CPU has 32-bit address bus. How much memory can it address?
a) 4 GB b) 1 GB c) 2 GB d) 8 GB
Ans. b

149. A page fault:
a) occurs when a program accesses a page of memory
b) is an error in a specific page
c) is an access to a page not currently in memory
d) is a reference to a page belonging to another program
Ans. b

150. Consider subnet mask of class B network on the internet is 255.255.240.0 What is the maximum number of
hosts per subnet?
a) 4096 b) 4098
c) 4092 d) 4094
Ans. b

151. Dynamic memory allocation in C++ is done from the:
a) Circular Queue
b) Bidirectional Link list
c) Stack
d) Heap
Ans. c

152. What is the other name for the third generation mobile technology?
Ans. Try-band 3G
Unsolicited e-mail advertising is known as ____
a) Newsgroup
b) Blog
c) Junk Ads
d) Spam
Ans. d

153. Received mails can be downloaded from the _____.
a) mail box
b) mail server
c) IP server
d) internet
Ans. a
Explanation: Mail box is a place or storage location where incoming mails are stored. It is also known as inbox.
Related Theory: Outbox stores message until, It is successfully sent to the recipient. Sent mails stores all sent
messages.

154. Which one of the following is Rich Text e-mail?
a) message that only includes text
b) message that supports text formatting, such as bold, italic, font etc.
c) message that supports use of hyperlinks and images
d) all of above
Ans. b
Related Theory: A plain text email is a email message that only includes text. There is no formatting such as bold,
italic colored fonts etc. The HTML email format supports hyperlinks, embedded images, different font styles, colours
etc. it also supports the use of most HTML attributes.

155. Which of the following statements about search engine is true? [CBSE 2011]
a) Search engines distinguish between appropriate and inappropriate sites.
b) Search engines have fixed hours of use.
c) Search engines do not provide relevant information.
d) Search engine is a program designed to search for information on the web using keywords.
Ans. d

156. Which software browse the internet in a systematic manner? [CBSE 2013]
a) Web crawler b) Web browser
c) Indexing software d) Search algorithm
Ans. a
Explanation: Web crawlers, also called bots or spiders or agents are small programs that follow links from already
known pages to the new ones, that need to be discovered. Web search engine works by storing information about
web pages, retrieved by a web crawler.

157. BCC stands for: [CBSE 2014]
a) Basic carbon copy b) Blind carbon copy
c) Blind client copy d) Basic client copy
Ans. b

158. Which of the following sites, would you prefer for shopping? [CBSE 2011]
a) www.yahoomail.com
b) www.hdfc.com
c) www.msn.com
d) www.amazon.com
Ans. d

159. A term used for determining the availability and booking of tickets online is:
a) E-booking
b) E-shopping
c) E-reservation
d) E-book
Ans. c
Explanation: E-reservation includes the process of booking/reservation of tickets, hotel rooms, tourist packages etc.
through internet.

160. Which one of the following is not a category of e-governance?
a) G2B
b) G2D
c) G2E
d) G2G
Ans. b

161. MMS stands for:
a) Multimedia mobile service
b) Messaging multimedia service
c) Multimedia messaging service
d) Mobile messaging service
Ans. c

162. Which of the following is not an e-governance project in India?
a) MCA 21 b) Income text Portal
c) DRDO d) Swacch Bharat Mission
Ans. d

163. Which one is the demerit of social networking?
a) Easier to connect with people
b) Pressure to portray oneself greater than others
c) Easy to hold discussions
d) Bringing more awareness
Ans. b

164. Which one of the following is not a feature of social networking?
a) Facility to post videos, pictures etc.
b) Facility to post comment on other member’s post
c) Representing information about user in an organized format
d) Make a video call to other members.
Ans. d

165. G2E refers to the services between:
a) Government to Employee
b) Government to Ex-Service men
c) Government to Entertainers
d) Government to Entrepreneurs
Ans. a

166. The scenario where video conferencing cannot be used is
a) Business meeting customers
b) Education
c) Cleaning a locality
d) Telemedicine
Ans. c
Explanation: A place can only be cleaned if someone is present physically. In all other areas videoconferencing is
being used extensively.

167. _____ is a successor to 3G and offers speed upto 100 Mmps.
Ans. 4G

168. ____ form of online banking is done on computer via modem.
Ans. PC Banking
Explanation: PC banking is a form of online banking that is done on PC via modem. In this type of banking the bank
offers a software program of the bank that allows customers to perform their transactions using their own PC at
home. For making such transactions the customer need to have a customer id or login id and a password.

169. The limit of ____ is up to 160 characters.
Ans. SMS ( The 160 character limit is for Messages encoded using the GSM-7 character set.)

170. _______ learning refers to live online training.
Ans. Synchronous learning
Explanation: Synchronous learning is led by an instructor and all the learners are to be present online at the same
time. It uses a virtual classroom or web conferencing platform such as Zoom, Google Classroom etc. It provide
features like screen sharing, some interaction tools like screen annotation and chat.

171. ______ program have improved administration and service delivery.
Ans. E-Governance

172. Which of the following online service is not considered as e-shopping?
a) Buying clothes
b) Booking a salon service
c) Purchase of flight tickets
d) None of the above
Ans. c

173. Which of the following is not a reason for the popularity of online shopping?
a) same day delivery not possible
b) Order and delivery status can be checked
c) Large variety of products to compare
d) All of the above
Ans. a

174. NeGp stands for:
a) National e-governance project
b) Nationwide e-governance plan
c) National e-governance Plan
d) National e-government plan
Ans. c

175. What is the shortcut key for replace a word in a paragraph?
a) Shift + P
b) Alt + P
c) Ctrl + F
d) Ctrl + Shift + P
Ans. c

176. ______ is approximately one billion bytes.
a) bit
b) kilobyte
c) gigabyte
d) megabyte
Ans. c

177. In the binary language each letter of the alphabet, each number and each special character is made up of a
unique combination of:
a) eight bytes b) eight characters c) eight bits d) eight kilobytes
Ans. c

178. Which of the following stores more data?
a) DVD b) CD ROM
c) Floppy disk d) CD RW
Ans. a

179. To move forward through the tabs
a) Ctrl + Tab
b) Ctrl + Shift + Tab
c) Shift + Tab
d) None of these
Ans. a

180. ______ is the process of finding errors in software code?
a) Compiling
b) Testing
c) Running
d) Debugging
Ans. b

181. The program which are as permanent as hardware and stored in ROM is known as
a) Hardware
b) Software
c) Firmware
d) ROM ware
Ans. c

182. What is a popular program for creating documents that can be read on both a PC and a Macintosh computer?
a) Microsoft word
b) Adobe in Design
c) Adobe Acrobat
d) QuarkXPress
Ans. c

183. What type of software creates a smaller file that is faster to transfer over the internet?
a) MPEG
b) Unzipped
c) Fragmentation
d) Compression
Ans. d

184. A unit of computer information that contains data as well as all the procedures or operations is called:
a) A method
b) Encapsulation
c) An object
d) An OOP
Ans. c

185. The world’s first truly cross-platform programming language is called:
a) C++
b) Java
c) Visual Basic.NET
d) Smalltalk
Ans. b

186. The most widely used type of database management system is the:
a) Flat database
b) Network database
c) Relational database
d) Hierarchical database
Ans. c

187. What is the newest type of database, which is well suited for multimedia applications, called?
a) Object-oriented database
b) Client/server database
c) Data warehouse
d) Multimedia database
Ans. a

188. What do the circles on a data flow diagram represent?
a) Data sources and destinations
b) Data flows
c) Transformation processes
d) Data stores
Ans. c

189. The type of printer that prints by selectively unchanging static electricity from spots on a metal drum is a(n):
a) Plotter
b) Dot-matrix printer
c) Laser printer
d) Ink-jet printer
Ans. c

190. A warm boot in older versions of windows is caused by:
a) Typing the Alt+Tab key combination
b) Selecting Hibernate or Standby when shutting down
c) Typing the Ctrl+Alt+ Delete key combination
d) Pressing the power switch
Ans. c

191. Setting fonts for the text in your document is an example of:
a) Formatting
b) Formulas
c) Tracking changes
d) Tools
Ans. b

192. Server uses _____ applications software to support its client computers.
a) back end
b) front end
c) programming
d) java
Ans. a

193. What does the XP stand for in WindowsXP?
a) Exponential
b) Experience
c) Expertise
d) Exchange
Ans. b

194. What type of software must be used to translate scanned text into a format that can be manipulated?
a) OCR
b) CRT
c) RGB
d) MIDI
Ans. a

195. High resolution computer monitors will have _____
a) High dpi
b) Low dpi
c) 256 colors
d) Resolution is not measured in dpi
Ans. a

196. Which of the following statements is true?
a) Microsoft windows defines the operating environment standard for computers with Linux processors
b) Microsoft Windows defines the operating environment standard for computers with Unix processors
c) Mac OS defines the operating environment standard for computers with Intel processors
d) Microsoft Windows defines the operating environment standard for computer with intel processors
Ans. d

197. Which of the following activities is NOT a component of e-business?
a) Collaboration with business partners
b) Cash flow management
c) Customer service
d) Selling
Ans. b

198. Which of the following extends data across networks rather than store it in one central site?
a) PIM
b) File manager
c) Distributed database
d) Data mining program
Ans. c

199. What is a serial port that adds a direct connection to a network?
a) FireWire
b) NIC (Network interface controller)
c) USB (Universal serial bus)
d) Internal modem
Ans. b

200. Which of the following is saved to noncontiguous clusters on a hard disk?
a) Clustered file
b) Defragmented file
c) Sectored file
d) Fragmented file
Ans. d

201. ______ is an event-driven programming language developed in the early 1990.
a) C
b) VB
c) C++
d) Pascal
Ans. b

202. Linux is a _____
a) Utility program for peer-to-peer file sharing
b) Real-time operating system
c) Network operating system
d) PDA platform
Ans. b

203. Which of the following is used for close a tab on a browser?
a) Ctrl + T
b) Ctrl + W
c) Ctrl + A
d) Ctrl + Y
Ans. b

204. What is RISC?
a) Storage device
b) Computer network
c) Microprocessor
d) Operating system
Ans. c

205. At a time how many operating system can be at work on a computer?
a) One
b) Two
c) Three
d) Four
Ans. a

206. Device on one network can communicate with devices on another network via______
a) File server
b) Utility server
c) Printer server
d) Gateway
Ans. d

207. Algorithm is used ______
a) To bring itself into desired state by its own action
b) To perform logarithmic operations
c) To describe a set of procedure by given result is obtained
d) As a high level language
Ans. c

208. FOXPRO is a _____
a) RDMBS
b) DBMS
c) Language
d) All of the above
Ans. c

209. When more than one window is open, to switch to the next window _____ is the key combination.
a) Ctrl + F5
b) Ctrl + F6
c) Ctrl + F7
d) Ctrl + F8
Ans. b

210. Compiler in computer system is a ______
a) Package
b) System software
c) Process
d) Application software
Ans. d

211. What is the process of creating movement from still images?
a) Transition
b) Twining
c) Bit-mapped graphic
d) Animation
Ans. d

212. A set of rules for creating markup languages that enables programming to capture specific types of data by
creating their own elements is called ______
a) XML
b) HTML
c) Ada
d) XHTML
Ans. a

213. Which broadband service is the most available?
a) C-able b) POTS
c) Satellite d) DSL
Ans. c

214. ______ is a set of rules computer use to talk to each other.
a) Protocol
b) Syntax
c) DOS command
d) HTML
Ans. a

215. Which backup method only backs up files that have been modified since the last backup?
a) Incremental backup
b) Partial backup
c) Selective backup
d) Full backup
Ans. a

216. Which type of transmission media is known as regular telephone wire?
a) Wi-Fi
b) Twisted-pair wire
c) Fiber optic cable
d) None of these
Ans. b

217. If you want to connect to your own computer through the internet from another location, you can use _____
a) e-mail
b) FTP
c) instant message
d) Telnet
Ans. d

218. Where does most data go first with in a computer memory hierarchy?
a) RAM
b) ROM
c) BIOS
d) Cache
Ans. a

219. Perforated paper used as input or output media is known as _____
a) Paper tape
b) Magnetic tape
c) Punched Paper tape
d) Card punch
Ans. a

220. Computer process data into information by working exclusively with ____
a) multimedia
b) words
c) characters
d) numbers
Ans. c

221. What is the other name for programmed chip?
a) RAM
b) ROM
c) LSIC
d) PROM
Ans. b

222. ______ store data temporarily and pass it on as directed by control unit.
a) Address
b) Register
c) Number
d) Memory
Ans. b

223. A device that is used to transmit data from one location to another location is known as ______
a) Storage
b) Memory
c) Carrier
d) All of the above
Ans. c

224. Program developed by an outside supplier and provided to the user in a machine readable form is known as
_____
a) Canned programs
b) Beta program
c) Alpha program
d) All of the above
Ans. a

225. Which of the following describe one or more characteristics of a modem computer?
a) An electronic device
b) A mechanical device
c) An electro-mechanical device
d) All of the above
Ans. a

226. PL1 (Programming language one) is _____
a) High level programming language
b) low level programming language
c) Machine language
d) Assembly language
Ans. a

227. Android operating system is an example of which kind of source model?
a) Vertical Market Software b) Open source
c) Horizontal Market Software d) Shareware
Ans. b

228. The sharing of a medium and its path by 2 or more devices is called _____
a) Modulation
b) Encoding
c) Line discipline
d) Multiplexing
Ans. d

229. Which of the following is an example of connectivity?
a) Internet
b) Floppy disk
c) Power card
d) data
Ans. a

230. What menu is selected to cut, copy and paste?
a) File
b) Tools
c) Special
d) Edit
Ans. d

231. Programming language built into user programs such as Word and Excel are known as ______.
a) 4GLs
b) Macro language
c) object-oriented language
d) visual programming languages
Ans. d

232. Personal computers can be connected together to form a _____.
a) server
b) network
c) enterprise
d) supercomputer
Ans. b

233. DSL is an example of a(n) ______ connection.
a) network
b) wireless
c) slow
d) broadband
Ans. d

234. Instructions and data that are processed by the CPU are located in _______
a) CD-ROM
b) RAM
c) The motherboard
d) The hard disk
Ans. b

235. The commonly used UNIX commands like date, is, cat etc. are stored in ______
a) dev directory
b) bin directory
c) tmp directory
d) unix directory
Ans. b

236. What is the ultimate purpose of Defragmentation?
a) Make the PC faster
b) Create More free space
c) Reduce power consumption
d) Delete temporary files
Ans. b

237. ______ is a method in which communication devices are connected to one another effieciently.
a) Switching
b) Redundancy
c) Capacity
d) Detecting
Ans. a

238. A proxy server is used for which of the following?
a) To provide security against unauthorized users
b) To process client requests for web pages
c) To provide TCP/IP
d) To process client requests for database access
Ans. b

239. On-line real time systems become popular in ______ Generation.
a) First Generation
b) Second Generation
c) Third Generation
d) Fourth Generation
Ans. c

240. _____ is the combination of keys to switch between the last four places that you have edited.
a) Alt + Ctrl + Z
b) Alt + Ctrl + Y
c) Alt + Tab + Z
d) All of the above
Ans. a

241. The number of null links in a binary tree with n nodes is:
a) n-1
b) n
c) n+1
d) 2n
Ans. c

242. If an undirected graph doesn’t have an odd cycle, then it is:
a) tree
b) planner
c) Bi-partite
d) clique
Ans. c

243. An equivalent decimal number of (234.55)8 is ____ [BSNL TTA J.E. 21.2.2016]
a) (106.703)10
b) (153.703)10
c) (146.703)10
d) (308.703)10
Ans. b

244. 0110 in binary form can be written as ______ in decimal form (UPPCL JE Electrical, 11.11.2016)
a) 4
b) 5
c) 6
d) 7
Ans. c

245. (100101)2 is equal to decimal number: (RRB Mumbai 2019)
a) 47
b) 37
c) 21
d) 17
Ans. b

246. The octal representation of 195.25 is _____ (RRB Mumbai 2015)
a) (303.20)8
b) (303.02)8
c) (313.120)8
d) (323.20)8
Ans. a

247. Number of bits needed to code 256 operations is: [RRB SSE (Shift-II), 03.09.2015)
a) 4
b) 6
c) 8
d) 16
Ans. c

248. The binary representation of the decimal number 45.25 is – [RRB JE (Shift-I), 29.08.2015]
a) (101101.01)2
b) (101101.10)2
c) (101010.01)2
d) (1010101.10)2
Ans. a

249. The 2’s complement of the binary number (11001100)2 is (RRB SSE (Shift-II), 01.09.2015)
a) (00110100)2
b) (00110011)2
c) (00110000)2
d) (11110100)2
Ans. a

250. Hexadecimal equivalent of binary number 1010 is: (RRB JE (Shift-III), 16.09.2015)
a) A
b) B
c) C
d) D
Ans. a

251. In Binary coded decimal (BCD) systems, the decimal number 81 is represented as – (RRB JE (Shift-III),
16.09.2015)
a) 10000001
b) 10100010
c) 01010001
d) 00011000
Ans. a

252. The value of the binary 11111 is: (RRB SSE Secunderabad Red Paper, 21.12.2014)
a) 2
4
-1
b) 2
4

c) 2
5

d) 2
5
-1
Ans. d

253. The 2’s complement of the Binary number (1101100)2 is – (RRB JE (Shift-II), 04.09.2015)
a) (00100011)2
b) (11110000)2
c) (00100100)2
d) (00001111)2
Ans. c

254. The octal equivalent of decimal number 66 is- (RRB JE (Shift-2), 29.8.2015)
a) 102
b) 104
c) 84
d) 82
Ans. a

255. The decimal representation of the binary number (101010.011)2 is (RRB JE (Shift-2), 29.8.2015)
a) 42.25 b) 24.25
c) 24.375 d) 42.375
Ans. d

256. The 2’s complement of the binary number (00111100)2 is: (RRB SSE (Shift-III), 01.09.2015)
a) (11000100)2
b) (11000011)2
c) (00110000)2
d) (11110100)2
Ans. a

257. Considering 1’s complement representation for negative numbers, -85 will be stored into an 8-bit memory
space as (RRB SSE Secundrabad (Shfit-I), 02.09.2015)
a) 10101010
b) 10111111
c) 10100110
d) 11101001
Ans. a

258. The binary representation of 195.5 is _____ (RRB JE (Shift-III), 26.08.2015)
a) (11000001.01)2
b) (11000001.11)2
c) (11000011.01)2
d) (11000011.10)2
Ans. d

259. The 2’s complement of the binary number (00000000)2 is (RRB JE (Shift-III), 26.08.2015)
a) (11111111)2
b) (00000000)2
c) (10101010)2
d) (01010101)2
Ans. b

260. 2’s complement of 10011101 is: (Delhi Metro Electronic JE 2017)
a) 01010101
b) 10101010
c) 01101100
d) 01100011
Ans. d

261. If 1 is added after 1’s complement of a binary number, then: (UPPCL JE Trainee-2014)
a) Finds 9’s complement of a binary number
b) Binary number remains same
c) Binary number will be negative
d) Finds 2’s true complement of binary number
Ans. d

262. The 2’s complement of the binary number 100100 is: (U.P.S.I. Computer Operator (Shift-I) -2016)
a) 011101 b) 011110
c) 111100 d) 011100
Ans. d

263. Decimal number -4 is represented in 2’s complement form as:- (Uttrakhand A.E. Paper-II, 2013)
a) 0100
b) 1011
c) 1100
d) 1010
Ans. c

264. What is the addition of (-64)10 and (80)16? (BSNL JE (TTA) Junior Engineer Exam 2015)
a) (-16)10
b) (16)10
c) (1100000)2
d) (01000000)2
Ans. d

265. The decimal equivalent of the hexadecimal number E5 is: (UPRVUNL JE Control and Instrumentation 2015)
a) 279
b) 229
c) 327
d) 227
Ans. b

266. Which of the following binary number is equal to octal number 66.3 (ISRO 2007)
a) 101101.100
b) 1101111.111
c) 111111.1111
d) 110110.011
Ans. d

267. The binary number 111 represents: [BSNL (JTO) 2001]
a) 3 in sign magnitude system and 1 in 2’s complement system
b) 7 in sign magnitude system and 1 in 2’s complement system
c) 3 in sign magnitude system and 3 in 3’s complement system
d) 7 in sign magnitude system and 3 in 2’s complement system
Ans. a

268. The 2’s complement of the number 1101101 is: (Senior Assistant Electronics – 2016)
a) 0101110
b) 0111110
c) 0110010
d) 0010011
Ans. d

269. FG Hexadecimal can be written in Binary system as: (BSNL TTA J.E. 27.09.2016)
a) 11111100
b) 11110011
c) 11111111
d) Not a valid Hexadecimal Number
Ans. d

270. How many bytes are there in binary number 1001101000111010? [BSNL TTA J.E. 27.09.2016]
a) 1
b) 2
c) 3
d) 4
Ans. b

271. The binary equivalent of decimal number 17 is: (BSNL TTA J.E. 27.09.2016)
a) 10001
b) 0111
c) 100001
d) 11111
Ans. a

272. The resultant binary of the decimal problem 49+1 = is _____: (BSNL TTA J.E. 27.09.2016)
a) 00110101
b) 01010101
c) 00110010
d) 00110001
Ans. c

273. Binary numbers can be converted into hexadecimal numbers by grouping bits into group of _____ starting from
_____ and represented each group as Hexadecimal number. (BSNL TTA J.E. 21.2.2016)
a) Three bits, Right Most bit
b) Three bits, Left Most bit
c) Four bits, Right Most bit
d) Sixteen bits, Left Most bit
Ans. c
Explanation: बाइनरी से हेक्साडेसेमस म प िवर्तन न नरने ने मम LSB से चार-चार बाइनरी मबट्स ने स ूह बनाये जातने है | उसने
िश्चातन प्रत्येन स ूह नो उसने हैक्स तनुलया&#155060482;न से प्रमतनस्थामितन कनया जातना है |

274. Convert 1000 of BCD code into Excess 3 code. [Delhi Metro Electronic JE 2017]
a) 1010
b) 1011
c) 1100
d) 0110
Ans. b
Explanation: BCD नोडेस से excess 3 नोडेस प िवर्तन न ने मम BCD नोडेस प 0011 जोड़ नर देतने है ्ही उनना Excess 3 code
होतना है |

275. The decimal equivalent of (101011)2 is: (LMRC SC/TO Shift-2 J.E. 2016)
a) 48
b) 54
c) 44
d) 43
Ans. d

276. Two’s complement of the binary number 10010100 is: (Noida Metro Electronic JE 2017)
a) 01101100
b) 11101100
c) 01101011
d) 10001011
Ans. a

277. The number of different Boolean function of 4 variables is (BSNL (JTO)-2002)
a) 2
16

b) 16
2

c) 4
2

d) 16
4

Ans. a
Explanation: बूममयन फ&#155060482; क्शन नी स&#155060482;ख्या = 2
2n
जहा&#155060481; n = ्ेवर बम नी स&#155060482;ख्या है
अतन: बूममयन फ&#155060482; क्शन नी स&#155060482;ख्या = 22
4

= (2)
(2x2x2x2)
= 2
16


288. (BABA)16 in hexadecimal is what in octal? (U.P. Police Computer Operator – 2013)
a) 134272
b) 132272
c) 135272
d) 135242
Ans. c

289. Binary equivalent of octal number 705 is: (U.P.S.I Computer operator (Shift-I) 2016)
a) 1110101
b) 1010111
c) 111000101
d) 101000111
Ans. c

290. Addition of binary number 11011 and 10111 is: (U.P.S.I. Computer Operator (Shift-1) 2016)
a) 10010
b) 11001
c) 110010
d) 010010
Ans. c

291. The value of substraction of (145)8 from (207)8 is: (U.P.S.I. Computer Operator (Shift-I) 2016)
a) (42)8
b) (602)8
c) (402)8
d) (62)8
Ans. a

292. Total different symbols used in hexadecimal number system are ______ (U.P.S.I. Computer Operator (Shift-1)
2016)
a) 8
b) 4
c) 16
d) 2
Ans. c

293. Addition of binary number 10011 and 11101 are: (U.P.S.I. Computer Operator (Shift-1) 2016)
a) 11000
b) 10000
c) 10001
d) 110000
Ans. d

294. In Octal number system, the different symbol are used is: (U.P.S.I. Computer Operator (Shift-II) 2016)
a) 8
b) 2
c) 16
d) 4
Ans. a

295. What is binary equivalent of decimal number 121? (U.P.S.I. Computer Operator (Shift-II) 2016)
a) 1111111
b) 1001111
c) 10000001
d) 1111001
Ans. d

296. The value of difference of (A0)16-(6A)16 is: (U.P.S.I. Computer Operator (Shift-II) 2016)
a) (30)16
b) (46)16
c) (36)16
d) (63)16
Ans. c

297. 8’s complement of octal number (6100)8: (U.P.S.I. Computer Operator (Shift-II) -2016)
a) (1677)8 b) (1700)8 c) (2700)8 d) (6100)8
Ans. b
हम: यहा&#155060481; िर िहमे 7’s complement number मननामपगे | 7’s नॉम्प्मी पट न&#155060482;बर मननामने ने मम डेसी गयी ऑक्टम स&#155060482;ख्या ने प्रत्येन
अक्षर नो 7 प से घटा &#155060482;गे | जैसे: 7777-6100 = 1677
अब मननामपगे 8’s नॉम्प्मी पट, 7’s नॉम्प्मी पट प 1 जोड़ नर 1677+1=1678 Octal (मगभग)

298. 15
th
complement of hexadecimal number (A01)16 is: (U.P.S.I. Computer operator (Shift-II) 2016)
a) (5F0)16 b) (6EE)16
c) (6E0)16 d) (5FE)16
Ans. d
Solution: FFF-A01 = 5FE

299. Gray code of decimal 3 is: (U.P.S.I. Computer Operator (Shift-II) 2016)
a) 1001
b) 0010
c) 0110
d) 1100
Ans. b

300. Binary code of decimal number 27 would be: (UPRVNAL AE Electrical Instrumentation 2014)
a) 010110
b) 011011
c) 110110
d) 101010
Ans. b

301. The conversion of 10101111100.0112 to octal is: (KVS JE Electrical & Electronic 2016)
a) 2671.328
b) 2561.348
c) 2545.348
d) 2571.348
Ans. d

302. The decimal number represented by 110011.00101 is: (UPPCL Electronic & Telecom. (AE.) 2016)
a) 59.9864
b) 43.33225
c) 625.5115
d) 51.15625
Ans. d

303. 11001, 1001 and 111001 correspond to the 2’s complement representation of which one of the following sets
the number? (DMRC Electronic, 2014)
a) 25, 9 and 57 respectively
b) -6, -6 and -6 respectively
c) 7, 7 and 7 respectively
d) -25, -9 and -57 respectively
Ans. c

304. Given the decimal number 19, an eight bit 2’s complement representation is given by: (ISRO Electronic, 2006)
a) 11101110
b) 11101101
c) 11101100
d) None of these
Ans. b

305. BCD coding scheme uses _____ bits to code decimal digits. (RRB JE (Shift-III), 26.08.2015)
a) 4 b) 8 c) 16 d) 32
Ans. a
हम: BCD - इस प सम्पिूर् डेसेसी म स&#155060482;ख्या नो बाइनरी प बदमने नी बजाय डेसेसी म स&#155060482;ख्या ने प्रत्येन अ&#155060482;न नो उसने चार अ&#155060482;नीय
बाइनरी तनुलया&#155060482;न से प्रमतनस्थामितन नर कदया जातना है | इसे 4 मबट BCD नोडेस नहा जातना है | इसे 8421 नोडेस भी नहतने है |

306. EBCDIC stands for ______ (RRB Mumbai 2015)
a) Extended binary coded data interchange code
b) Expended binary coded decimal interchange code
c) Extended binary coded decimal interchange code
d) Expanded binary coded data interchange code
Ans. c
Explanation: इसे न नै रेक्टर ने मम 8 मबट नोडेस द्वारा प्रयोग कनया जातना है | इसना प्रयोग ुख्य रूि से IBM ेनफ्रे तनथा IBM
ध्य िरास ने न&#155060482; ्यूटर प ऑिरेटट&#155060482;ग मसस्ट प कनया जातना है |

307. In a binary number, the leftmost bit is called: (RRB SSE (Shift-II), 03.09.2015)
a) Most significant bit/सबसे हत््िूर् मबट
b) Least significant bit/न से न हत््िूर् मबट
c) Carry bit
d) Extra bit
Ans. a

308. The number of bits in ASCII is – (RRB JE (Shift-III), 26.08.2015)
a) 7
b) 8
c) 9
d) 10
Ans. a

309. Odd parity generator uses _____ logic (ISRO 2008)
a) XNOR
b) XOR
c) Sequential
d) OR
Ans. b

310. Among the following mentioned codes which one is capable of both error detection and correction? (UPRVUNL
JE Instrumentations Electronics 2014)
a) Hamming code
b) Repetition code
c) Unicode
d) Both A and B
Ans. d

311. The standard binary code for alphanumeric character is: (BSNL (JTO)-2009)
a) ASCII b) GRAY c) BCD d) Excess-3
Ans. a

312. Octal coding involves grouping of bits in (AAI 26.04.2015)
a) 3’s b) 4’s
c) 5’s d) 6’s
Ans. a

313. The ‘radix’ of an octal system is: (Noida Metro Electronic JE 2017)
a) 8
b) 2
c) 16
d) 5
Ans. a

314. Gray code of decimal number 2 is _____ (U.P.S.I. Computer Operator (Shift-1) 2016)
a) 0010
b) 1000
c) 0011
d) 0101
Ans. c

315. Fastest memory cell is: (UPRVUNL JE Control & Instrumentation 2015)
a) Bubble memory
b) Semiconductor RAM
c) Semiconductor Memory
d) Superconductor Memory
Ans. c

316. The number of bits needed to address 4k memory is: (UPRVUNL JE Control & Instrumentation 2015)
a) 6
b) 8
c) 12
d) 16
Ans. c

317. The number of address lines in a 8 bit 4K ROM is: (BSNL (JTO) 2001)
a) 8
b) 10
c) 12
d) 16
Ans. c

318. The basic memory cell in a DRAM is a ____ (Uttarakhand JE Electrical (Paper-1) 2013)
a) MOSFET
b) Capacitor
c) Capacitor and a MOS switch
d) Flip-Flop
Ans. c

319. In microprocessor based system DMA refers to: (Noida Metro Electronic JE 2017)
a) Direct memory access for the user
b) Direct memory access for the microprocessor
c) Direct memory access for the microprocessor and user
d) Direct memory access for the i/o devices
Ans. d

320. What is the magnitude of data stored by a latch? (Noida Metro electronic JE 2017)
a) 8 bit of data
b) 1 bit of data
c) 4 bit of data
d) 16 bit of data
Ans. b

321. A microprocessor with 12-bit address bus will be able to access ______ kilobyte of memory. (ISRO 2011)
a) 0.4
b) 2
c) 10
d) 4
Ans. d

322. What is the name of the computer program that simulates the though process of human beings? [NCVT COPA
(D/S-2/2018)
a) Human logic
b) Expert reason
c) Expert system
d) Personal information
Ans. c

323. If the English Philosopher Thomas Hobbes could be called ‘grandfather; of artificial intelligence, then who could
be called its father? [Mumbai Post Trust 2015]
a) A.M Turning
b) John McCarthy
c) Allen Newell
d) Herbert Simon
Ans. b

324. How may ALU(s) is/are control by one control unit is SIMD (single instruction stream, multiple data stream)
architecture? (WRD 2014)
a) One or more ALU’s
b) One ALU
c) Only two ALU
d) Impossible to say
Ans. a
Explanation: natural language understanding (NLU) आर्ट फीमसयम इ&#155060482;टेममजपस नी न शाखा है जो text या भाषर् प्रारूि प
्ाक्यों ने रूि प कद ग इनिुट नो स झने ने मम , न&#155060482; ्यूटर ना उियोग नरने ने मम ना नरतनी है | यह नेचुरम मैंग््ेज इ&#155060482;टरफ़े स
तनथा नेचुरम मैंग््ेज फ्र&#155060482; ट &#155060482;डेस ने रूि प उियोग कनया जातना है |

325. What ability does a computer require in order to pass the standard Turing test? (HNL 2015)
a) vision b) manipulation of objects c) reasoning d) all of the above
Ans. c
Explanation: ट्यूटर&#155060482;ग टेस्ट मन ट्यूटर&#155060482;ग द्वारा 1950 प म्नमसतन न शीन नी क्ष तना ना िरीक्षर् है, जो ान् ने स ान तनन शमि
या बुमि ान व्य्हार प्रदर्श तन नरतना है |

326. In order to protect computer system from viruses, we use _____ software. (CSIR 2016)
a) Antivirus
b) Anti worm
c) Application
d) Firewall
Ans. a

327. Maximum storage space is available in _____ (ONGC 10.06.2019)
a) CD
b) Floppy
c) ROM
d) Hard Disk
Ans. d

328. The Hexadecimal numbers consist of _____ (BEL 2017)
a) 0-7
b) 0-9
c) 0-9, A-F
d) 1-9, A-F
Ans. c

329. The computer is a part of the firm’s: (NPCIL 24.01.2019)
a) Physical system
b) Conceptual system
c) Both A and B
d) Neither A or B
Ans. c

330. A popular technique for forecasting is : [RSMSSB (Junior Instructor) 24.01.2019]
a) linear programming
b) regression analysis
c) correlation analysis
d) Monte Carlo
Ans. b

331. The three dimensions of system integrity do not include [BHEL (Trade Apprentice 2019)]
a) accuracy
b) completeness
b) security
d) appropriateness
Ans. b

332. The component that use battery power to store the configuration information of a computer is known as the
(NMDC-Technician 15.06.2019)
a) BIOS b) RAM
c) CMOS d) OS
Ans. c

333. Which of the following is not one of the characteristics of the first generation of computers? (NHPC Trade
Apprenticeship 2018)
a) Vacuum Tubes
b) Integrated circuits
c) Magnetic Drums
d) Punched cards
Ans. b

334. The person credited with designing the Harvard Mark I compute is: (HAL Trade Apprenticeship 2018)
a) Aiken
b) Atansoff
c) Eckert
d) Mauchly
Ans. a

335. Which computer pioneer was also a Rear Admiral of the U.S. Navy? (Indian Rare Erath Limited 2016)
a) Steve Jobs
b) John Backus
c) John von Neuman
d) Grace Hooper
Ans. d

336. CD-ROM was developed by: (BSF HC Radio Mechanic)
a) Epson
b) Philips
c) Sony
d) Philips and Sony
Ans. c
Explanation: In 1982, Japanese company Denon developed CD-ROM and introduced it with Sony t at a computer
show in 1984.

337. The first fully transistorized computer ___ (UPSSC Instructor 2016)
a) EDSAC
b) EDVAC
c) TRADIC
d) TRANSIC
Ans. c
Explanation: TRADIC stands for Transistor Digital Computer या Transistorised Airbornic digital computer यह स&#155060482;युि
राज्य अ ेवरना ना िहमा ट्ा&#155060482;मजस्टवरजडेस नोम्प्ज्टर था, मजसे 1954 प िूरा कनया गया था |

338. Hyper threaded P4 cable was introduced by: (THD Apprentices 2017)
a) Linux b) IBM c) Intel d) Cyrix
Ans. c

339. CCD stands for : (Naval Shipyard Technician 2016)
a) Computer control device b) Character Control Device
c) Charge Control Device d) Charge Coupled Device
Ans. d

340. The method of painting each row of video frame from top to bottom is called _____ (ECILO 2018)
a) Progressive video
b) interlacing
c) deinterlacing
d) reducing
Ans. a

341. Display resolution of 1920x1080 pixels is called ______display.(SECR 2019)
a) 480p
b) 576p
c) 720p
d) Full High Definition (FHD)
Ans. d

342. Most of the shortcut keys are designed to use ____ and ____ key along with one or two characters. (HMT 2016)
a) Ctrl
b) Alt
c) Both A & B
d) None of them
Ans. c

343. Processor, main memory (RAM), hard disk, CD/DVD drive, CMOS, BIOS chip, etc. are housed inside _____ (ITI
COPA D/S-1.2018)
a) Input unit
b) Central processing Unit (CPU)
c) output unit
d) all of them
Ans. b

344. CAM stands for _____ (NCVT COPA D/S-2/2018)
a) Computer Analog Manufacture
b) Computer Aided Monitoring
c) Computer Aided Maintenance
d) Computer Aided Manufacturing
Ans. d

345. Mechanical calculator was invented by ____ (HNL 2015)
a) John Napier
b) Edmund Gunter
c) Blaise Pascal
d) Charles Babbage
Ans. c
Explanation: Blaise Pascal invented a Mechanical calculator with a sophisticated carry mechanism in 1642)

346.Analog computer was invented by ____ (RSMSSB Junior instructor 24.01.2019)
a) John Napier b) Sir William Thomson
c) Blaise Pascal d) Charles Babbage
Ans. b

347. Theoretical definition of a general purpose computer was provided by _____ (WCRJ Jabalpur 2012)
a) Allen Turing
b) John Napier
c) Blaise Pascal
d) Edmund Gunter
Ans. a (He is also called Father of Theoretical Compute Science)

348. Second generation computer was created in the year. (Indian Rare Earth Limited 2016)
a) 1945
b) 1959
c) 1965
d) 1971
Ans. b
(मद्वतनीय िीढ़ी 1955-1964 ई. ने ध्य ना स य है | इस िीढ़ी प आ&#155060482;नड़ों नो स&#155060482;ग्रमहतन नरने ने मम ैग्नेवटन मडेसस्न तनथा टेि ना उियोग
कनया जातना था | इस िीढ़ी ने न&#155060482; ्यूटर है : IBM 1401, Honey well 200, CDC 1604)

349. _____ the meaning of the word is a collection of programs. (MMC Tradesman 2017)
a) Information
b) Hardware
c) Software
d) compact
Ans. c

350. In a computer, the system identifies a file by its ____ (ECIL 2018)
a) Name
b) Absolute Path
c) File owner
d) Inode number
Ans. a

351. In the 8085 microprocessor, which of the following is NOT a maskable interrupt? (HMT 2016)
a) TRAP
b) INTR
c) RST 7.5
c) RST 6.5
Ans. a

352. Which of the following is a 4
th
generation programming language? (FACT 2018)
a) C b) SQL c) BASIC d) Mercury
Ans. b

353. Which of the following are the components of CPU? (Rajasthan High Court 2013)
a) RAM and ROM
b) ALU and Memory
c) ALU and Registers
d) ALU and Control
Ans. d

354. Which of the following provides internal storage to the CPU? (ITI COPA 2016)
a) Register
b) Register and RAM
c) RAM
d) Hard Disk
Ans. a

355. The program instructions are represented in binary and stored in the _____ from which they are fetched,
decoded and executed by the CPU. (ITI COPA 2015)
a) Memory
b) Memory and Chip
c) Chip
d) Control Unit
Ans. a

356. A _____ shows how operational attributes are linked together and contributes towards realizing computer’s (ITI
COPA 2016)
a) component design
b) computer architecture
c) computer working
d) computer organization
Ans. d

357. Which of the following statement is wrong? (WRD 2014)
(i) There is limited storage capacity in secondary memory compared to main memory.
(ii) DRAM is slower than SRAM
a) Both (i) and (ii)
b) Only (ii)
c) Only (i)
d) Both are wrong
Ans. c

358. Flash memory is of a specific type. (HNL 2015)
a) EROM
b) ERAM
c) EEPROM
d) EPROM
Ans. c

359. Which of the following is used primarily for cache storage? (FMTTI 2013)
a) DVD b) DRAM
c) SRAM d) Blue-ray Disk
Ans. c

360. What is the full form of SSHD: (CSIR 2016)
a) Silocon State Hybrid Drive b) Solid silicon Hybrid Drive
c) Solid state Hybrid Drive d) Solid state hybrid dish
Ans. c

361. The data will remain in the process. (MP High Court 25.01.2019)
a) Secondary Storage Unit
b) Memory Unit
c) Read protected Unit
d) Control Unit
Ans. a

362. ENIAC, EDVAC are example of ______ generation of computers. (BSF HC Radio Mechanic)
a) Second
b) Third
c) Fourth
d) First
Ans. d

363. Which of the following can support many users at one time? (ECIL 2018)
a) Palm Top
b) PC
c) Micro Computer
d) Mini Computer
Ans. d
Explanation: म नी न&#155060482; ्यूटर नो म डेस रपज न&#155060482; ्यूटर भी नहा जातना है क्योंकन यह ाइक्रो न&#155060482; ्यूटर से बड़ा और ेनफ्रे न&#155060482; ्यूटर से छोटा
होतना है | म नी न&#155060482; ्यूटर ने उदाहरर् है IBM’s AS400e, Honey Well 200, TI-990

364. Mainframe computers are not more powerful than ______. (HMT 2016)
a) Super computer
b) Mini computer
c) Personal computer
d) Micro computer
Ans. a

365. The modernization of modern computers has been possible, using the following. [ITI COPA 2016]
a) Transister
b) Integrated Circuit Chip
c) Nano Material
d) Ultra Operator
Ans. b

366. Which was the first apple computer? (WRD 2014)
a) Apple I b) Apple II
c) Macintosh d) Apple Lisa
Ans. a (1976)

367. Which of the following devices is used to print very large drawings or complex line art by mechanical movement
of a pen on a paper? [NHPC Trade Apprenticeship 2018]
a) Ink Jet Printer b) Scanner
c) Line Printer d) Plotter
Ans. d

368. Which output device draws pictures on a paper based on the commands given from a computer using a pen?
[NHPC Trade Apprenticeship 2018]
a) Scanner
b) Monitor
c) Inkjet Printer
d) Drum Plotter
Ans. d

369. Parallel ports usually are not used to connect ______ [BSF HC Radio mechanic)
a) Modem
b) Scanner
c) Printer
d) CD Writer
Ans. a

370. A Combination of the keyboard and the visual display unit is called a _____. [MMC Tradesman 2017]
a) mouse
b) port
c) terminal
d) cable
Ans. c

371. Which among the following input devices consists of a stick which pivots on a base and reports its angle or
direction of the CPU? [UPSSC Instructor 2016]
a) Microphone
b) Light pen
c) Keyboard
d) Joystick
Ans. d

372. What is the process of input output, processing and storage done under the supervision of the unit? [FACT
2018]
a) ALU
b) Output unit
c) Control Unit
d) Memory unit
Ans. c

373. Which of the following is not a valid category of “system bus” in a computer system? [Rajasthan High Court
2013]
a) Data bus b) Control Unit c) Address Bus d) Memory bus
Ans. d

374. Which of the following CPU registers stores the address of the next instruction to be executed? [ITI COPA 2015]
a) Program Counter Register b) Accumulator register
c) Instruction register d) Memory address register
Ans. a

375. Which of the following function as the central nervous system for other components of a compute system?
[Mumbai Port Trust 2015]
a) Registers
b) Primary memory
c) Arithmetic and logic unit
d) Control unit
Ans. d

376. Processing speed of computer is measured in – [ISRO IPRC 2017]
a) MIPS (Million instruction per second)
b) MHz of clock
c) Both A and B
d) None of these
Ans. b

377. A micro processor has 24 address lines and 32 data lines. If uses 10 bits of opcode, the size of Memory bugger
register is _____ [FMTTI 2013]
a) 22 bits
b) 24 bits
c) 32 bits
d) 14 bits
Ans. c

378. The address space of 8086 CPU is : [BEL 2017]
a) One megabyte
b) 256 Kilobytes
c) 1 Megabytes
d) 64 Kilobytes
Ans. c

379. What is an outlier? [WCS (Jabalpur) 2012]
a) An input pattern which is not included in the test set.
b) An input pattern which produces a classification.
c) An input pattern which is not included in the training set.
d) An input pattern which is very different from the prototype vector of the patterns in the same class.
Ans. d

380. Which is the fastest type of printer? [NHPC (Trade Apprenticeship) 2018]
a) Laser b) DotMatrix
c) Inkjet Printer d) Plotter
Ans. a

381. In Laser printer, the Laser beam produces _____ charge on paper, which makes the toner powder to adhere to
the charged area. [Mumbai Port Trust 2015]
a) (-)ve b) (+)ve
c) Neutral d) None of them
Ans. a

382. Select the incompatible device from the following options. [Rajasthan High Court 2013]
a) Scanner
b) Keyboard
c) WebCam
d) Printer
Ans. d

383. Which of the following printers can use continuous paper instead of one sheet? [ITI COPA 2017]
a) Ink Jet Printer
b) Dot Matrix Printer
c) Ink Jet & Laser Printer Both
d) Laser Printer
Ans. b

384. Which type of printers uses light to produce the dots needed to form the characters to be printed on a page?
a) Line Printers
b) Chain Printers
c) Laser Printers
d) Dot Matrix Printers
Ans. c

385. Computer display is also called ___ [ITI COPA 2016]
a) Multimedia Monitor Terminals
b) Cathode Ray Tube
c) Video Display Terminals
d) Video Distribution Units
Ans. c

386. Which of the following is a real-time operating system? [ITI COPA 2016]
a) MS-Windows
b) Linux
c) Windows CE
d) IOS
Ans. c

387. A Front-end processor is usually used in – [FACT 2018]
a) virtual storage
b) multi programming
c) time sharing
d) multi processing
Ans. c

388. A process is another name for – [Government of India Press 2015]
a) Paging
b) A task
c) A Job
d) The operating system dispatcher
Ans. b

389. The linker – [Rajasthan High Court 2013]
a) is the same as the loader
b) is required to create a load module
c) uses sources code as input
d) is always used before programs are executed
Ans. b

390. Round-robin scheduling – [ITI COPA 2018]
a) allows processor-bound tasks more time in the processor
b) is quite complex to implement
c) gives each task the same chance as the processor
d) allows interactive tasks quicker access to the processor
Ans. c

391. Which of the following checks cannot be carried out on the input data to a system? [ITI COPA 2016]
a) Range check
b) Syntax check
c) Consistency check
d) All of the above
Ans. b

392. Which of the following is not true about an interpreter? [ITI COPA 2016]
a) Interpreter generates an object program from the source program
b) Interpreter analysis each source statements every time it is to be executed
c) Interpreter is a kind of translator
d) All of the above
Ans. a

393. Virtual memory is a _____ [ITI COPA 2015]
a) Volatile memory of unlimited capacity
b) Non-volatile memory of unlimited capacity
c) A Technique to execute largest programs into smaller memory
d) A Technique to execute largest programs into smaller memory
Ans. a

394. In a computer, Disk scheduling involves deciding. [Mumbai Port Trust 2015]
a) Which disk should be accessed next
b) the order in which disk access requests must be serviced
c) the physical location where files should be accessed in the disk
d) None of these
Ans. b [Disk scheduling is also called I/O Scheduling]

395. In windows 8, the screensaver setting include the _____ tab. [MP Vyapam 08.11.2016]
a) 2 b) 4 c) 3 d) 1
Ans. d
(व्&#155060482;डेसोज 8 ाइक्रोसॉफ्ट द्वारा बनाया गया है और यह 26 अक्टूबर 2012 से ार्न ट प उिमब्ध है व्&#155060482;डेसोज 8 प स्क्रीन से्र सेटट&#155060482;ग प
न टैब शाम म है)

396. Which of the following is not the option in the screensaver setting dialog box? [ITI COPA 2015]
a) Circles
b) 3D Texts
c) Ribbons
d) म स्टीफाई
Ans. a

397. Which of the following is not a process for windows setup? [ISRO IPRC 2017]
a) Offline configuration
b) Online configuration
c) Windows PE
d) Down-level
Ans. a

398. In windows 7, how many boxes are available under the ‘Taskbar’ Tab in ‘Taskbar and start Menu Properties’
dialog box? [HNL 2015]
a) 4
b) 2
c) 5
d) 3
Ans. a

399. After booting process, BIOS helps in ______. [ITI COPA 2017]
a) Data transfer
b) Processing
c) Graphics
d) Cloud storage
Ans. a

400. Primary boot process is otherwise called ______. [WRD 2014]
a) POST
b) Loading of operating system
c) installation
d) formatting
Ans. a (प्राइ री बूट प्रोसेस नो दुसरे शब्दों प power on self test या डेसाईग्नोमस्टन टेवस्ट&#155060482;ग सीक्वप स भी नहा जातना है)

401. Which of the following memories is directly accessible by the CPU? [ITI COPA 2015]
a) RAM
b) Hard Disk
c) Magnetic Tape
d) DVD
Ans. a

402. Which of the following works on the principle of ‘locality of reference’? [NCVT COPA 2018]
a) RAM b) ROM
c) Cache Memory d) Associative memory
Ans. c

403. Which of the following statements about static RAM (SRAM) is not correct? [WRD 2014]
a) SRAM used flip-flops
b) SRAM is faster than DRAM
c) SRAM uses capacitors
d) SRAM is costlier than DRAM
Ans. c

404. How to run a process in the background? [Government of India Press 2015]
a) &
b) *
c) ?
d) |
Ans. a

405. Process information in the current shell can be obtained by using [Rajasthan High Court 2013]
a) kill
b) bg
c) fg
d) ps
Ans. d

406. Which of the following symbol is used to redirect standard output (STDOUT) in Linux? [ITI COPA 2017]
a) >
b) <
c) ?
d) $
Ans. a

407. Find the correct option that shows a file containing the Linux file system to be automatically installed at boot
time? [Mumbai Post Trust 2015]
a) /etc/anacrontab
b) /etc/crontab
c) /etc/fstab
d) /etc/mtab
Ans. c

408. The command “mknod myfifo b416” [MP Vyapam 08.11.2016]
a) will create a block device if user is root
b) will create a block device for all users
c) will create a FIFO if user is not root
d) None of the mentioned
Ans. a

409. Which command is used to set terminal IO characteristic? [HMT 2016]
a) tty b) ctty
c) ptty d) stty
Ans. d

410. Which command is used to record a user login session in a file? [FACT 2018]
a) macro
b) read
c) script
d) none of the mentioned
Ans. c

411. Which command is used to display to operating system name? [Government of India Press 2015]
a) os
b) unix
c) kernel
d) uname
Ans. d

412. In Linux, “pwd” command is used to display: [ITI COPA 2018]
a) Absolute path name for the innermost subdirectory
b) Relative path name for the innermost subdirectory
c) Absolute path name for the current working directory
d) Relative path name for the current directory
Ans. c

413. Which of the following commands prints the file-creation permission using symbolic notation? [ITI COPA 2016]
a) unmask-S
b) umask
c) printfp
d) printfps
Ans. a

414. The actual machinery in a computer is known as _____ and the instructions and data are known as _____.
Ans. Hardware, Software

415. Electronic Discrete Variable Automatic Computer (EDVAC) was designed by _____
Ans. John Von Neumann

416. The Number of bits that a computer can process at a time in parallel is known as its _____
Ans. Word length

417. Remington Rand developed ______ which became one of the first commercially available computers.
Ans. UNIVAC-1

418. Two engineering advances that are coming together to enable the creation of fifth-generation computers are
_______ and superconductor technology.
Ans. Parallel processing

419. In the ______ generation computers, the use of operating systems in computer was introduced.
Ans. Third

420. ________ generation computers aim to solve highly complex problems, ones, which require reasoning,
intelligence, and expertise.
Ans. Fifth

421. In ______, IBM introduced its personal computer (PC) for use in the homes, offices and schools.
Ans. 1981

422. A Trillionth of a second is known as _______.
Ans. Picoseconds

423. The actual machinery in a computer is known as:
a) Machinery
b) Software
c) Hardware
d) None of these
Ans. c

424. Which is the component that permits the computer to permanently retain large amount of data?
a) CPU
b) Mass storage device
c) Memory
d) None of these
Ans. b

425. A system that synchronizes hardware and software to produce electronic tones is a:
a) Synthesizer
b) MIDI
c) PlainTalk
d) None of these
Ans. b

426. The number of bits that a computer can process at a time in parallel is known as:
a) Word length
b) Accuracy
c) Speed
d) None of these
Ans. a

427. A monochrome VDU uses ______ color to display text on contrasting background whereas a colour display
presents ______ colours.
Ans. Only one, 256

428. Which of the following keys switches between numbers to arrow keys?
a) Shift key
b) Alt key
c) Num lock key
d) None of these
Ans. c

429. In a microprocessor when a CPU is interrupted, it [RRB SSE 21.12.2014]
a) St5ope execution of instructions
b) Acknowledges interrupt and branches off subroutine
c) Acknowledges interrupt and continues
d) Acknowledges interrupt and wait for the next instruction from the interrupting device.
Ans. d

430. Processing speed of computer is measured in _____ [RRB SSE 21.12.2014]
a) MIPS (Million instruction per second)
b) MHz of clock
c) Both A and B
d) None of these
Ans. c

431. A person in called computer literate if he/she is just able to : [RRB NTPC, (Shift-2) Online, 19.03.2016]
a) Run need-based applications
b) Create anti-virus software
c) Write programs
d) Hack other computer
Ans. a

432. “For computer, world consists of zeros and ones only. To store the zeros and ones, ______ is places inside a
processor: [RRB Chandigarh Section Engineer (Civil), 26.06.2012]
a) I/O device
b) Instruction set
c) Transistor
d) Main Memory
Ans. c

433. High power micro processors are: [RRB Jammu Section Eng. 2013]
a) Pantium, Pantium pro
b) Pantium II and III
c) Pantium II
d) All of these
Ans. d
Explanation: िपवटय न X86-नोम्पिैवटबम ाइक्रो प्रोसेसर है, जो इ&#155060482;टेम द्वारा 1993 प माया गया | िपवटय प्रोसेसर ट और
सेमेरोन से ऊिर तनथा Dual-core i3, i5, i7 से मनचे स्थान रखतने है | इ&#155060482;टेम ने िपवटय ाइक्रो आर्न टेक्वै री बम नो डेसे्ेमोि कनया तनथा
उच्च क्ष तना ्ामे िपवटय -प्रो नो 1995 प बाजार प माया, उसने बाद िपवटय ii तनथा िपवटय iii नो बाजार प उतनारा |

434. Which of the following acts as the central nervous system for other components of the computer system? [RRB
JE (Shift-II) 29.08.2015]
a) Registers
b) Primary Memory
c) Arithmetic and logic unit
d) Control unit
Ans. d

435. Which of the following transmits different commands or control signals from one component to another
component of a computer system? [RRB Bangalore Material Superintendent, 21.11.2004]
a) Data bus
b) Address Bus
c) Both Data Bus and Address Bus
d) Control bus
Ans. d

436. Which of the following is problem oriented language?
a) High level language
b) Machine language
c) Assembly language
d) Low level language
Ans. a

437. Which of the following characteristics of the computer reflects its flexible behavior? [RRB Patna 30.01.2011]
a) Accuracy
b) Reliability
c) Versatility
d) Diligence
Ans. c
Explanation: बहुनोशम (versatility) न&#155060482; ्यूटर ने मचीमे व्य्हार नो दशा तना है जबकन Accuracy, Reliability, Deligence न&#155060482; ्यूटर नी
म्शेषतना &#155060482; है |

438. Arithmometer was invented by [RRB Ranchi Signal Maintainer Group-III, 20.11.2005]
a) Evanglista Torricelli
b) Charles Xavier Thomas
c) Edward Teller
d) Gustav Tauschek
Ans. b

439. In which city is India’s first post office ATM opened? [RRB Bangalore Technical (Eng.) 22.04.2017]
a) Chennai
b) New Delhi
c) Hyderabad
d) Mumbai
Ans. a
Explanation: Country's first post office savings bank ATM is located at the Head Post Office in Thyagaraya Nagar,
Chennai. (27 Feb 2014)

440. ICR stands for: [RRB NTPC, (Shift-2) Online 19.03.2016]
a) Intelligent Character Recognition
b) Information and Communication Reader
c) Integrated Computer Research
d) Institute of Cyber Research
Ans. a
Explanation: ICR is the computer translation of manually entered text characters into machine-readable characters.

441. Unit(s) used for measuring speed of printer is/are? A. CPM B. RMP C. PPM [RRB Banglore Asst. Loco Pilot
08.07.2007]
a) Only A
b) Only B
c) Only C
d) both A & C
Ans. d

442. A Semi conductor Read Only Memory basically is: [RRB J.E. 14.12.2014]
a) a set of flip-flop memory elements
b) a combination logic circuit
c) a sequential circuit with flip flops and gates
d) None of these
Ans. b

443. Which of these memories will be used to store variable data? [RRB J.E. 14.12.2014]
a) RAM
b) ROM
c) EPROM
d) PROM
Ans. c

444. Which of the installed magnetic disks to store data/information? [RRB J.E. 14.12.2014]
a) Floppy diskette
b) Hard disk
c) Permanent disk
d) None of these
Ans. a

445. Unicode uses _____ bits to code a large number of characters, including various special characters. [RRB SSC
(Shift-1) 03.09.2015]
a) 8
b) 16
c) 24
d) 32
Ans. b

446. UTF-8 (Unicode Transformation Format) is a(an) ______ [RRB JE (Shift-1) 28.08.2015]
a) 8-bit fixed width encoding
b) 8-bit variable-width encoding
c) 16-bit variable-width encoding
d) 16-bit fixed-width encoding
Ans. b

447. The _____ between the time at which a read/write command is given to the memory and the time when next
such instruction can be issued to the memory is called: [RRB SSE (Shift-II), 03.09.2015]
a) Access time b) Cycle time c) Write time d) Seek time
Ans. a

448. Static RAM (SRAM) is faster than Dynamic RAM (DRAM) because ______ [RRB JE (Shift-I), 28.08.2015]
a) SRAM uses capacitors
b) SRAM is costlier
c) SRAM does not require refreshing
d) SRAM is cheaper
Ans. c
Explanation: SRAM, DRAM नी तनुमना प तनेज तनथा न&#155060482; ्यूटर प सा ान्यतन: नै श े ोरी ने रूि प प्रयुि होने ्ामी े ोरी है | इसनो
बार-बार वरफ्रे श नरने नी आ्श्यनतना नहीं होतनी इसमम यह DRAM से नाफी तनेज होतनी है |

449. In the word “EDO RAM” what is the full form of EDO? [RRB Chandigarh Asst. Loco Pilot 25.05.2003]
a) Expanded Data Origin
b) Extended Dynamic Output
c) Expanded Dynamic
d) Extended Data Output
Ans. d

450. Which of the following is not true abut PROM – [RRB JE (Shift-I) 27.08.2015]
a) Random Access Memory
b) Programmable Read Only Memory
c) Non-Volatile Memory
d) Sequential access memory
Ans. d

451. Which of the following is not true about EPROM? [RRB JE (Shift-III), 26.08.2015]
a) Random Access Memory
b) Erasable Programmable read only memory
c) Non-volatile memory
d) Sequential access memory
Ans. d
Explanation: EPROM प्राइ री े ोरी ने अ&#155060482;तनग तन आने ्ामी स्थायी े ोरी ना न प्रनार है | इसे रैंडेस क्सेस कनया जा सनतना है |
इसे नॉन-्ोमेटाइम े ोरी भी नहतने है | इस प िराबैंगनी कनरर्ों नी सहायतना से िुराने प्रोग्रा नो न प्रोग्रा प वर्मेस कनया जा सनतना
है, जबकन मद्वतनीय े ोरी क्र ानुसार े ोरी है, मजसना उदाहरर् ैग्नेवटन टेि है |

452. Both EPROM and EEPROM are – [RRB JE (Shift-III), 29.08.2015]
a) Sequential access memory
b) Random access memory
c) Volatile memory
d) Destructive memory
Ans. b

453. A variant of _____ is called flash memory. [RRB SSE (Shift-III), 03.09.2015]
a) Virtual memory b) Cache memory
c) EEPROM d) RAM
Ans. c
Explanation: Flash is technically a variant of EEPROM, but the industry reserves the term EEPROM for byte-level
erasable memory and applies the term flash memory to larger block-level erasable memory.

454. What is the name of memory buffer used to accommodate a speed differential? [RRB Gorakhpur Asst. Loco
Pilot 14.04.2002]
a) Cache
b) Stack Pointer
c) Accumulator
d) DISC
Ans. a

455. Which of the following is not true about Cache memory? [RRB JE (Shift-III) 27.08.2015]
a) Faster memory than RAM
b) Volatile memory
c) Smaller in size than RAM
d) Sequential access memory
Ans. d

456. In IT, the method for updating the main memory as soon as a word is removed from the cache is called ____
[RRB J&K Asst. Loco Pilot 06.06.2010]
a) Write-through
b) Write-back
c) Protected-write
d) Cache-write
Ans. b

457. Which among them is the slowest of memory in terms of data transfer and storage rate? [RRB Kolkata Asst.
Loco Pilot 16.07.2006]
a) Registers
b) Cache memory
c) Main Memory
d) Flash Memory
Ans. d
Explanation: डेसाटा स्थानान्तनरर् ्&#155060482; भण्डेसारर् दर ने अनुसार सबसे &#155060482;द े ोरी, flash memory होतनी है | इसे फ़्मैश रै भी नहा जातना
है | इसनो म टाया तनथा कफर से प्रोग्रा कनया जा सनतना है | इसना प्रयोग सेमुमर फोन, मडेसमजटम नै रा, सेट टॉि बॉक्स आकद प कनया
जातना है |

458. A CD-RW (Compact disk-Re writable) disk: [RRB Kolkata Asst. Loco Pilot 2014]
a) Has a faster access than an internal disk
b) Is a form of optical disk, so it can only be written once
d) Can be erased and rewritten
Ans. d

459. Density of internal track most outer track density is _____ of hard disk. [RRB Kolkata Asst. Loco Pilot
29.09.2002]
a) equal b) less than c) more than d) less than or equal
Ans. c
Explanation: हाडेस मडेसस्न ने आ&#155060482;तनवरन ट्ैन ना घनत्् सबसे बाहरी ट्ैन ने घनत्् से अमधन होतना है, क्योंकन आ&#155060482;तनवरन ट्ैन नी मम्पबाई बाह्य
ट्ैन नी मम्पबाई से न होतनी है | मेकनन दोनों ट्ैन िर स ान ात्रा प डेसाटा स&#155060482;मचतन होतना है | अतन: क्षेत्रफम नी दृमि से बाह्य ट्ैन ना घनत््
न होतना है |

460. Which of the following is not a type of magnetic storage system? [RRB Mumbai Asst. Loco Pilot 03.06.2006]
a) Floppy disk
b) Compact disk
c) Hard disk
d) Magnetic tape
Ans. b

461. Strength of Magnetic disk depends on: [RRB Mumbai Asst. Loco Pilot 05.06.2016]
A. Number of sides
B. Recording density
C. Number of tracks
a) Only A
b) A & C
c) Only C
d) A, B & C
Ans. d

462. Which of the following is a weighted code? [RRB Mumbai Asst. Loco Pilot 16.07.2006]
a) Excell-3
b) Gray
c) Both BCD and Excell-3
d) BCD
Ans. d

463. One gigabyte is approximately – [RRB Patna Asst. Loco Pilot 2014]
a) 1x10
3
bytes
b) 1x10
6
bytes
c) 1x10
9
bytes
d) 1x10
5
bytes
Ans. c
Explanation:
1 Byte = 8 bit
1 Kilobyte = 1024 byte = 10
3
byte
1Megabyte = 1024 kilobyte = 10
6
byte
1 Gigabyte = 1024 megabyte = 10
9
byte

464. One Terabyte is equivalent to: [RRB Ranchi Asst. Loco Pilot 08.07.2007]
a) 2
20
Megabyte
b) 2
20
Kilobyte
c) 2
20
Gigabyte
d) 2
20
Byte
Ans. a

465. Which of the following option is a example of half-duplex communication device. [RRB Ranchi Asst. Loco Pilot
19.01.2003]
a) Radio b) Telephone c) Television d) Wacky-Tacky
Ans. d

466. Which of the following is essential for WAN hardware? [RRB Trivandrum Asst. Loco Pilot 2004]
a) Bridge
b) Switch
c) Router
d) Firewall
Ans. c

467. The network is overloaded with enormous data sent by many computers within the network. The inability of
the network to deliver the data is termed as ______ [RRB Chandigarh Section Engineer (Civil) 2012]
a) Access control
b) Congestion
c) Error propagation
d) Deadlock
Ans. b

468. The transfer of data from one application to another in a computer system is known as ____ [RRB Chandigarh
Section Engineer (Mech.) 2012]
a) Dynamic Data Exchange
b) Dodgy Data Exchange
c) Dogmatic Data Exchange
d) Dynamic Disk Exchange
Ans. a
Explanation: Dynamic Data Exchange कनसी न&#155060482; ्यूटर प न प्रोग्रा प उिमब्ध डेसाटा नो दुसरे प्रोग्रा तनन िहुचाने ्&#155060482; उियोग नरने
ना न ाध्य है | डेसायनाम न डेसाटा क्सचपज ना िहमी बार प्रयोग 1987 प व्&#155060482;डेसोज 2.0 प कनया गया था जो न प्रोग्रा ना दुसरे
प्रोग्रा िर नण्ट्ोम प्रदान नरतना था |

469. UDP is a ____ [RRB Bhubaneshwar App. Electrical, 2001]
a) Connection oriented protocol
b) Connectionless protocol
c) User-defined protocol
d) Security protocol
Ans. b

470. Which of the following networks uses telephone lines? [RRB Allahabad Signal Maintainer 2006]
a) WAN
b) LAN
c) PAN
d) Wireless
Ans. a

471. In which of the following network topology, failure of one node can disbalance the whole network? [RRB
Bangalore Material Superintendent 2004]
a) Mesh
b) Tree
c) Ring
d) Bus
Ans. c

472. From connection of whole n node in mesh topology network, the number keys ____ is [RRB Kolkata Apprentice
supervisors 2001]
a) n
b) n(n-1)/2
c) n(n+1)/2
d) n-1
Ans. b

473. Which is NOT a wireless Technology? [RRB SSE Bilaspur, 2014]
a) Bluetooth
b) A Conventional Telephone
c) Wi-Fi
d) Wi-Max
Ans. b

474. WIMAX stands for [RRB Kolkata Jr. Engineer-II, 2006]
a) Wireless Interoperability for microwave access
b) Wired Interoperability for microwave access
c) Worldwide interoperability for Microwave Access
d) Worldwide Infrastructure for Microwave Access
Ans. c
Explanation: WIMAX न दूरस&#155060482;चार तनननीन है | इस तनननीन ने ाध्य से न न&#155060482; ्यूटर, दुसरे न&#155060482; ्यूटर से मबना तनारों नी सहायतना से
सम्पिन स्थामितन नरतना है | यह इन्टरनेट और सेलयुमर दोनों नेट्नों िर ना नरतना है | यह से्ा भारतन प स् प्रथ जयिुर प आरम्पभ नी
गयी थी |

475. What does audio file extension “AMR” stands for? [RRB Thiruvananthapuram Section Eng. (Mech.), 2009]
a) Adaptive Media-Rate
b) Audio Multi-Rate
c) Adaptive Multi-Rate
d) Audio Media-Rate
Ans. c

476. Alignment buttons are available on the: [RRB Chandigarh Section Eng. (Civil) 2012]
a) Status bar
b) Formatting toolbar
c) Standard toolbar
d) None of these
Ans. b

477. In MS-Word 2007, we can use undo/redo feature for up to _____ action: [RRB Chandigarh Section Eng. (Mech.)
2012]
a) 200 b) 300 c) 150 d) 100
Ans. d

478. Now …….. is the owner of Mobile operating system “Android” [RRB Chandigarh Asst. Loco Pilot 2008]
a) Android Inc. b) Samsung
c) Yahoo d) Google
Ans. d

479. The primary objective of a time-sharing operating system is to – [RRB JE (Shift-III) 30.08.2015]
a) Avoid thrashing
b) Provide fast response to each user of the computer
c) Provide fast execution of processes
d) Optimize computer memory usage
Ans. b

480. Which of the following is not a part of the office suite? [LMRC J.E. 2015]
a) Database
b) Image editor
c) File manager
d) Word Processor
Ans. c

481. In a computer disk scheduling involves deciding [RRB J.E. 2014]
a) Which disk should be accessed next
b) The order in which disk access requests must be serviced
c) The physical location where files should be accessed in the disk
d) None of these
Ans. b

482. Shortcut key “Shift+Tab” is used for _____ [RRB Ranchi Asst. Loco Pilot 2003]
a) Move forward through the tabs
b) Move backward through the tabs
c) Move forward through the options
d) Move backward through the options
Ans. d

483. _____ clicking on mouse selects the entire paragraph by default, while working with text document in MS word.
[RRB NTPC, (Shift-1) Online, 2016]
a) Alt + Single b) Triple c) Double d) Single
Ans. b

484. By default, how is text horizontally aligned inside a cell in Excel? [RRB Kolkata Jr. Engineer-II Electrical, 2006]
a) Left aligned b) Right aligned
c) Center aligned d) None of these
Ans. a
Explanation: Excel प मडेसफ़ॉलट सेम ने अ&#155060482;दर text क्षैमतनज रूि से मेफ्ट अमाइन तनथा न&#155060482;बर और तनारीख राईट अमाइन होतने है |

485. The entire worksheet in Excel can be selected by [RRB Secunderabad Section Engineer (Civil) 2008]
a) Ctrl + Spacebar b) Ctrl + Shift + Spacebar
c) Shift + Spacebar d) All of these
Ans. b
Explanation:
Ctrl + Spacebar = िुरे नॉम नो सेमेक्ट नरना
Shift + Spacebar = िूरी ि&#155060482;मि नो सेमेक्ट नरना
Ctrl + Shift + Spacebar = िूरी ्न शीट नो सेमेक्ट नरना

486. What is the keyboard shortcut for creating a chart from the selected cell range in Excel? [RRB
Thiruvananthapuram Section Eng (Mech.) 2009]
a) F2
b) F4
c) F8
d) F11
Ans. d
Explanation:
F11 - क्सेम प सेमेक्ट कनया ग रपज से न चाट बनाने ने मम
F2 – मक्ट् सेम नो िवर्र्तन तन नरना और न डेसाटा नो अ&#155060482;तन प जोड़ना
F4 – अ&#155060482;मतन न ा&#155060482;डेस या क्शन नो दोहराना
F8 – क्सटपडेस नोडेस नो ऑन/ऑफ़ नरना

487. Processor’s speed of a computer is measured in [SSC CGL, 2010]
a) BPS
b) MIPS
c) Baud
d) Hertz
Ans. b

488. A central computer that holds collections programs for many PCs, workstations computers is a(n) [IBPS PO,
2011]
a) Supercomputer
b) Minicomputer
c) Laptop
d) Server
Ans. d

489. A Group Ware is a [SSC CGL, 2011]
a) Hardware
b) Network
c) Software
d) Firmware
Ans. c
Explanation: Collaborative software or groupware is application software designed to help people working on a
common task to attain their goals.

490. Which of the following is contained on chips connected to the system board and is a holding area for data
instructions and information? (Processed data awaiting to be output to secondary storage) [IBPS Clerk, 2014]
a) Program b) Mouse
c) Internet d) Memory
Ans. d

491. Who among the following introduced the world’s first laptop computer in the market? [SSC CGL, 2014]
a) Hewlett-Packard b) Epson
c) Laplink travelling software Inc d) Microsoft
Ans. b

492. Different types of modern digital computers come under which generation. [IBPS clerk, 2015]
a) Fourth
b) Third
c) Second
d) Fifth
Ans. d

493. Which of the following is machine independent program? [SBI Clerk, 2015]
a) High level language
b) Low level language
c) Assembly level language
d) Machine language
Ans. a

494. CPU Scheduler is also known as _____ [SSC CGL, 2016]
a) Job Scheduler
b) Resource Scheduler
c) Short-term Scheduler
d) Process Scheduler
Ans. c

495. Which among the given options is IBM’s Supercomputer? [IBPS PO Mains, 2016]
a) Tihane-2
b) Sunway Taihu Light
c) Watson
d) Shasra-T
Ans. c

496. Which of the following character set supports Japanese and Chinese font? [IBPS Clerk Mains, 2016]
a) EBCDIC
b) ASCII
c) BCD
d) UTF-8
Ans. d

497. Weibo is a micro-blogging site popular in ____ [IBPS Clerk Mains, 2016]
a) India
b) USA
c) South Korea
d) China
Ans. d

498. Why do you log off from your computer when going out from your office? [IBPS Clerk Mains, 2016]
a) Someone might steal your files, passwords etc.
b) In order to save electricity
c) Logging off is essential to increase performance
d) Logging off is mandatory you before go out
Ans. a

499. Which of the following system is a function of dedicated PCs? [IBPS Clerk Mains, 2016]
a) Meant for a single user
b) Meant for the single task
c) Deal with single software
d) Deal with only editing
Ans. b

500. 1000000 bytes =? [IBPS RRB, 2016]
a) TB
b) KB
c) MB
d) GB
Ans. c

501. What do we call an input/output device on a computer operator or maintenance engineer and the computer?
a) EDP Device
b) Console
c) Jokey
d) Link Device
Ans. b

502. Dynamic Ad-hoc Wireless Networks (DAWN) usually cones under ______?
a) 2G
b) 3G
c) 4G
d) 5G
Ans. c

503. A Portable, personal computer, small enough to fit on your lap, is called a _____
a) notebook computer
b) handheld computer
c) mainframe computer
d) desktop computer
Ans. a

504. Every computer has a(n) _____, many also have _____.
a) operating system; a client system
b) operating system; instruction sets
c) application programs; an operating system
d) application programs; a client system
Ans. b

505. The term _____ refers to any computer component that is required to perform work. [SBI Clerk, 2011]
a) Bootstrap
b) Kernel
c) Resource
d) Source code
Ans. c

506. What is output? [SBI Clerk, 2011]
a) What the processor takes from the processor
b) What the processor gets from the user
c) What the user gives to the processor
d) What the processor gives to the user
Ans. d

507. Computer _____ is whatever is typed, submitted, or transmitted to a compute system. [SBI Clerk, 2011]
a) input
b) output
c) data
d) circuitry
Ans. c

508. All the characters that a device can use is called its? [SBI Clerk, 2012]
a) Skill set
b) Character Alphabet
c) Keyboard Characters
d) Character Set
Ans. c

509. Which of the following does not relate to Input Unit? [SBI Clerk, 2012]
a) If accepts data from the outside world
b) It converts data into binary code that is understandable by the computer
c) It converts binary data into the human readable form that in understandable to the users.
d) It sends data in binary form to the computer for further processing
Ans. c

510. Which printer cannot print more than one character at a time? [SSC CHSL, 2012]
a) Line
b) Daisy-wheel
c) Laser
d) Dot-matrix
Ans. b

511. Video controller [IBPS Clerk, 2012]
a) Controls the resolution of images on screen
b) Controls the signals to be sent and received from processor for display
c) Handles the entire electronic work behind the formation of images on the screen
d) Is responsible for allocating pixels for formation of images
Ans. c

512. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the
corresponding bits? [IBPS PO, 2013]
a) ANSI b) ASCII
c) EBCDIC d) ISO
Ans. b

513. The most widely used computer device is _____. [IBPS Clerk, 2015]
a) Solid state disks
b) External hard disk
c) Internal hard disk
d) Mouse
Ans. c

514. Which of the following houses the most important parts of a computer system? [IBPS RRB 2016]
a) Input Device
b) Client
c) Server
d) Hardware
Ans. d

515.The computer is made of which of the following hardware equipments? ]
a) Monitor, CPU, Keyboard, Mouse, Software and Network
b) Monitor, CPU, Keyboard, Mouse, Programme and Network
c) Monitor, CPU, Keyboard, Mouse, Printer and Modem
d) Monitor, CPU, Keyboard, Mouse, Applications and Network
Ans. c

516. A device that copies or reproduces text and images is also called a(n) ______.
a) optical scanner
b) bar code reader
c) character device
d) digital camera
Ans. a

517. What is usually used for displaying information at public places?
a) Monitor
b) Overhead Projections
c) Monitors and Overhead Projections
d) Touch Screen Kiosks
Ans. c

518. The operation of computer is controlled by
a) Memory system
b) Controlling system
c) Processing system
d) Processing system
Ans. d

519. In a computer most processing takes place in ______.
a) Memory
b) RAM
c) Motherboard
d) CPU
Ans. d

520. Which of the following functions is not performed by the CPU?
a) Graphical display of data
b) Arithmetic Calculations
c) Managing Memory
d) Managing input and output
e) None of these
Ans. e

521. When the mouse is moved, it causes a picture to move on the screen which is referred to as in a
a) menu
b) icon
c) pointer
d) tab
Ans. c

522. A collection of related information sorted and deal with as a unit is a [SBI Clerk, 2009]
a) disk
b) data
c) file
d) floppy
Ans. b

523. Reusable optical storage will typically have the acronym ____ [SBI Clerk, 2009]
a) CD
b) DVD
c) ROM
d) RW
Ans. d

524. During the ______ portion of the information processing cycle, the compute acquires data from some source.
[SBI Clerk, 2009]
a) Storage and output
b) Storage
c) input
d) output
Ans. c

525. Which of the following are advantages of CD-ROM as a storage media? [IBPS PO, 2011]
a) CD-ROM is an inexpensive way to store large amount of data and information.
b) CD-ROM disks retrieve data and information more quickly than magnetic disks do.
c) CD-ROM make less errors than magnetic media.
d) All of the above
Ans. a

526. Which of the following is billion of a second? [SBI PO, 2011]
a) Gigabyte b) Terabyte
c) Nanosecond d) Microsecond
Ans. c

527. The following Computer’s memory is characterised by low cost per bit stored [IBPS Clerk, 2011]
a) Primary
b) Secondary
c) Hard Disk
d) All of these
Ans. b

528. On the following, which is the fastest? [SSC CGL, 2012]
a) CD-ROM
b) RAM
c) CPU Registers
d) Cache
Ans. c

529. Which computer was the first to use the magnetic drum for memory?[SSE CGL, 2005]
a) IBM-650
b) IBM-7090
c) IBM-701
d) IBM – 360
Ans. a

530. EPROM can be used for [IBPS PO, 2013]
a) erasing the content of ROM
b) reconstructing the contents of ROM
c) erasing and reconstructing the contents of ROM
d) duplicating the ROM
Ans. c

531. Which among the following is a term representing unit of data storage in computer memory? [IBPS PO Mains,
2016]
a) Pixel
b) Decimal
c) Octet
d) Point
Ans. c

532. Which of the following error occurs when software tries to access protected memory? [IBPS PO Mains, 2016]
a) Segmentation Fault b) Display time error
c) IO Error d) Runtime Error
Ans. a
Explanation: In computing, a segmentation fault or access violation is a fault, or failure condition, raised by
hardware with memory protection, notifying an operating system the software has attempted to access a restricted
area of memory. On standard x86 computers, this is a form of general protection fault.

533. During the execution of instruction, a copy of instruction is placed in the [IBPS Clerk Mains, 2016]
a) Register b) RAM
c) System heap d) Cache
Ans. d

534. The clicklock property of the mouse – [ECIL 2018]
a) Allows to prevent items from getting clicked
b) Allows to set password for items
c) Allows to drag without holding mouse button
d) None of these
Ans. c

535. By default, the mouse pointer speed is set to:
a) Medium
b) To slow
c) Fast
d) Slow
Ans. a

536. A web camera is normally suitable for _____ [FACT 2018]
a) Low resolution images
b) Streaming videos during video conferencing
c) Both A & B
d) None of them
Ans. c

537. The number of pixels per inch of monitor length is called ____ [Rajasthan High Court 2013]
a) LPI (Lines per inch)
b) DPI (Dots per inch)
c) SPI (Sides Per inch)
d) PPI (Pixels per inch)
Ans. d

538. Which of the following is not a device release device? [Indian Rare Earth Limited 2016]
a) Scanner
b) Printer
c) Flat Screen
d) Touch Screen
Ans. a

539. The wildcard character for matching any number of characters is – [BSF HC Radio Mechanic]
a) Hyphen sign
b) Ampersand Sign
c) Asterisk Sign
d) Dollar Sign
Ans. c

540. Shift key and Print Screen key in a computer keyboard are known as [MMC Tradesman 2017]
a) Special purpose keys
b) Standard keys
c) Navigation keys
d) Function keys
Ans. a

541. Which of the following is not a type of scanner?
a) Flat bed
b) Sheed feed
c) Handheld
d) Drum
Ans. d

542. Plotters are two types, whose names are: [NCVT COPA 2018]
a) Spiral and flatbed
b) Flatbed and cone
c) Drum and flatbed
d) Drum and spiral
Ans. c

543. A.T.M. machines self check-in at airports, whose example is the panel used in hummingbu (loese-check-in kiosk)
etc.? [HNL 2015]
a) laser pens
b) Analog display unit
c) Touch panel
d) Projectors
Ans. c

544. A robot’s “arm” is also known as its: [CSIR 2016]
a) End effector
b) Actuator
c) Manipulator
d) Servomechanism
Ans. c

545. Which company acquired Sun Microsystems on January 27, 2010? [MP High Court, 25.01.2019]
a) Oracle Corporation
b) IBM
c) Apple Inc
d) Microsoft
Ans. a

546. Two basic types of operating systems are – [BEL 2017]
a) Sequential and direct
b) Sequential and real time
c) batch and timesharing
d) batch and interactive
Ans. d

547. GRUB stands for ______. [NPCIL, 24.01.2019]
a) GRand Unified Boot Loader b) Generic Unified Boot Loader
c) Grand United Boot Loader d) Great United Boot Loader
Ans. a

548. Which of the following is not an operating system? [HAL Trade Apprenticeship, 2018]
a) iOS
b) Android
c) Mac OSX
d) Hadoop
Ans. d

549. Which of the following takes one statement of a high-level language program at a time and translate it into
machine instruction, which is immediately executed – [Indian Rare Earth Limited 2016]
a) Assembler
b) Compiler
c) Interpreter
d) Loader
Ans. c

550. MS-Windows operating system is- [ITI COPA, 2017]
a) Case sensitive
b) Processor-dependent
c) Developed marketed, and sold by Intel
d) A metafamily of graphical operating system
Ans. d

551. In windows XP, where is the recyclebin icon? [Mumbai Port Trust 2015]
a) Shortcut
b) Desktop
c) Status bar
d) Property Dialogue Box
Ans. b

552. The windows operating system has _____ standard icons. [WRD 2014]
a) 4 b) 5 c) 6 d) 7
Ans. a
Explanation: Windows operating system प चार स्टैण्डेसडेस आइनॉन होतने है, 1. My computer 2. Recycle bin 3. Internet
Explorer 4, My Document. जब ह न&#155060482; ्यूटर प व्&#155060482;डेसो इनस्टॉम नरतने है तनो ये सभी 4 आइनॉन डेसेस्नटॉि स्क्रीन मडेसफ़ॉलट प कदखाई देतने है

553. Which brand of computers first used the combination of GUI and mouse together? [HNL 2015]
a) IBM Computers b) Babbage Computers
c) Macintosh d) Microsoft windows
Ans. c
Explanation: In 1983, Apple released the Lisa computer. It was the first commercial computer with a graphical user
interface and a mouse, Wired reports, and it took $150 million to develop.

554. When a user delete file, empties the recycle bin, what happens to the file? [UPSSC Instructor 2016]
a) Sector of hard Drive are blanked/erased
b) Clusters are flushed
c) The file is moved to C:/windows/temp
d) Associated entries in the FAT are removed
Ans. d

555. The total time to prepare a drive mechanism for a block of data to be read from is equal to its – [Naval Shipyard
(Technical) 2016]
a) Latency time
b) Latency time + Seek time
c) Latency time + Transmission time
d) None of the above
Ans. b

556. ____ is the translator which perform macro expansion [IOCL 2013]
a) Micro pre-processor
b) Assembler
c) Macro Pre-processor
d) Macro Processor
Ans. c
Explanation: The C preprocessor is a macro preprocessor (allows you to define macros) that transforms your
program before it is compiled.

557. The translator for low level programming language is called – [SECR 2019]
a) Loader
b) Assembler
c) Compiler
d) Linker
Ans. b

558. When an attempt to divide by zero is made what interrupt is generated? [MP Vyapam 08.011.2016]
a) Supervisor call interrupt (SVC)
b) Program interrupt
c) I/O interrupt
d) Timer interrupt
Ans. c

559. _____ is/are bootstrapped compilers. [HMT 2016]
a) C
b) PASCAL
c) LISP
d) All of these
Ans. d

560. Indicate which is a preemptive scheduling algorithm. [WRD 2014]
a) FIFO
b) Shortest-job next
c) Round-robin
d) All of the above
Ans. c
Explanation: Round Robin is the preemptive process scheduling algorithm. Each process is provided a fix time to
execute, it is called a quantum. Once a process is executed for a given time period, it is preempted and other process
executes for a given time period. Context switching is used to save states of preempted processes.

561. In ____ Scheduling, CPU is allocated to the process with least CPU burst time. [ISRO IPRC 2017]
a) Shortest Job First
b) Round Robin
c) Multilevel Queue
d) Priority
Ans. a

562. The “turn-around” time of a user job is- [HNL 2015]
a) The time since its submission to the time its results become available
b) The total time taken to execute the job
c) The time duration for which the CPU is allotted to the job
d) None of the above
Ans. b

563. Which of the following statements about Loader is true? [THD Apprentices 2017]
a) It brings executable files residing on disk into memory and starts execution
b) It takes source files and converts them into executable files
c) it takes source files and converts them into object files
d) It takes object files and converts them into executable files
Ans. a

564. Assembler directives : [SECR 2019]
a) allocate storage for constants and program variables
b) are converted into machine instructions to be included into an object code
c) are instructions to the assembler to tell how assembly of source program is to be performed
d) None of the above
Ans. a

565. An instruction consisting of an operation code and operand address(es) is called: [Government of India Press
2015]
a) Mnemonics b) Pseudo code
c) Assembly language instruction d) Machine language instruction
Ans. d
Explanation: न इ&#155060482;स्ट्क्शन नोडेस प ऑिरेशन नोडेस और ऑिरपडेस ड्रेस होतना है ्ह शीन भाषा इ&#155060482;स्ट्क्शन नहमातना है |

566. What does disk defragmenter do? [BEL 2017]
a) Puts fragmented pieces of disks together
b) Allows files to be stored across disk partitions
c) Keeps track of the fragmented portions
d) Remove holes (unused disk blocks/sectors) on the disk for better utilisation of the disk
Ans. d

567. IMAP protocol is used in: [NMDC-Technician 15.06.2019]
a) E-mails b) Image processing
c) Encryption d) File transfer
Ans. a
Explanation: In computing, the Internet Message Access Protocol is an Internet standard protocol used by email
clients to retrieve email messages from a mail server over a TCP/IP connection.

568. The world wide web may be considered a universe of information available through: [NHPC Trade
Apprenticeship, 2018]
a) HTTP
b) Telnet
c) SMTP
d) FTP
Ans. a
Explanation: HTTP ना अथ ‘Hyper Text Transfer Protocol’ है HTTP ्लडेस ्ाइडेस ्ेब द्वारा उियोग कनया जाने ्ामा अ&#155060482;डेसरमेइ&#155060482;ग
(अ&#155060482;तनर्न महतन) प्रोटोनॉम है, यह न ्मीने शन मेयर ना प्रोटोनॉम है |

569. Which of the following forms is in the IP address? [BSF HC Radio Mechanic]
a) <byte>.<byte>.<byte>.<byte>
b) <nibble>.<nibble>
c) <bit>.<bit>.<bit>.<bit>
d) <byte>.<byte>.<byte>
Ans. a

570. BBA 5
th
sem
In a character printer, the printing speed varies from:
a) 30-600 characters per second
b) 70-900 characters per second
c) 50-500 lines per second
d) None of these
Ans. a

571. Which of the following scrambles a message by applying a secret code?
a) Encryption
b) Audits
c) UPS
d) Firewalls
Ans. a

572. A unit of computer information that contains data as well as all the procedures or operations is called:
a) A method
b) Encapsulation
c) An object
d) An OOP
Ans. c

573. Which input device converts analog information into digital form and can be used for doing fine works of
drawing and image manipulation? [UPPCL JE 2019]
a) Microphone b) Bar Code Reader
c) Digitizer d) Graphic Plotter
Ans. c

574. Where does the operating system keep information about all processes? [UPSSC J2 2016]
a) Memory b) I/O c) CPU d) Process Table
Ans. d

575. In which of the following categories of the operating system the underlying hardware provides more than one
processor? [BSNL JE-2012]
a) Multitasking
b) Multiprocessing
c) Multiprogramming
d) Multithreading
Ans. b

576. Which of the following is a real time operating system? [RRB SSE (Shift-II), 01.09.2015]
a) MS-Windows
b) Linux
c) Unix
d) DNX
Ans. d

577. The first version of window was launched in [UPPCL ARO-18.08.2018]
a) 1990
b) 1987
c) 1984
d) 1985
Ans. d

578. Which of these is a bootloader for windows 10? [UPPCL APS 18.02.2018]
a) NTLDR
b) BOOTMGR
c) BOOTX
d) GRUB2
Ans. b

579. The instant messaging application that comes in a Windows OS is called [UPPCL Asst. Accountant 09.02.2018]
a) Windows Messenger
b) Windows Chat
c) Talk
d) Microsoft Outlook
Ans. a

580. In MS Word, You can display the “Find and Replace” Dialog box by pressing which of the following Function
Keys? [UPP Computer Operator 21-12-2018]
a) F5 b) Ctrl + F5 c) Ctrl + F4 d) F4
Ans. a
Explanation: ाइक्रोसॉफ्ट ्डेस प F5 या CTRL+F नो दबानर “फाइ&#155060482;डेस &#155060482;डेस वर्मेस” डेसायमॉग बॉक्स प्रदर्श तन नर सनतने है |

581. In MS Word, what is the function of Ctrl + Right? [UPPCL Stenographer Exam-18.02.2018]
a) Moves to next character
b) Moves to next page
c) Move to next paragraph
d) Moves to next word
Ans. d

582. In Microsoft word 2013, which of the following menus includes insert row/column in table? [UPPCL Office
Assistant 2018]
a) Design
b) Insert
c) Layout
d) Page Layout
Ans. c

583. In Microsoft Excel, the basic function of ____ is to join two or more text strings together. [H.C. Ald. (ARO) Exam-
2016]
a) CONCATENATE
b) VLOOKUP
c) SUMIF
d) DSUM
Ans. a

584. What is the shortcut key to enable filtering of selected cells in MS-Excel? [UPPCL ARO 2018]
a) Ctrl + Shift + L
b) Ctrl + F
c) Alt + Click + L
d) Shift + F
Ans. a

585. Which among the following is used to navigate through hypermedia structures? [UPPCL ARO 2018]
a) Nodes
b) Keys
c) Buttons
d) None of these
Ans. a

586. A Doughnut chart in Excel is similar to: [UPPCL ARO 2018]
a) Bubble chart
b) Bar chart
c) Scatter chart
d) Pie chart
Ans. d

587. In Microsoft Excel 2013, a cell can contain a total amount of ______ characters. [UPPCL Office Assistant 2018]
a) 32767 b) 16384 c) 409 d) 255
Ans. a
Explanation: Excel 2013 allows you to enter up to 32,767 characters in each cell and displays only the first 1,024
characters in each cell.

588. “What-if Analysis” command is available under ______ section of menu bar in MS-Excel 2007. [UPPCL APS Exam
2018]
a) Review b) View c) Formulas d) Data
Ans. d

589. In Excel, you can select the entire row by pressing [UPPCL TG2 Re-exam 2016]
a) Ctrl + Spacebar
b) F8+arrow key
c) Shift + arrow key
d) Shift + Spacebar
Ans. d

590. What is the keyboard shortcut for creating a chart from the select cell range in Excel? [UPPCL TG-2 2016]
a) F2
b) F4
c) F8
d) F11
Ans. d
Explanation: F11 Creates a chart of the data in the current range in a separate Chart sheet. Shift+F11 inserts a new
worksheet. Alt+F11 opens the Microsoft Visual Basic For Applications Editor, in which you can create a macro by
using Visual Basic for Applications (VBA). F12 Displays the Save As dialog box.

591. Which of the following is NOT an application of Information Technology in railways? [UPPCL ARO 2018]
a) E-ticketing
b) SMS Gateway
c) Bullet Trains
d) National Train Enquiry System
Ans. c

592. Which shortcut key is used to invoke the File menu in the Internet Explorer 11? [UPPCL JE 2019]
a) Alt + F4
b) Shift + F
c) Alt + F
d) Ctrl + F
Ans. c

593. Internet Explorer was launched in [UPPCL Stenographer Exam 2018]
a) 1998
b) 1997
c) 1994
d) 1995
Ans. d

594. Netscape Navigator is a [RRB JE 2015]
a) Network Layer protocol b) Presentation layer protocol
c) Web browser d) Web search engine
Ans. c

595. We press _____ to bookmark the current page in Google Chrome. [UPPCL APS 2018]
a) Ctrl + D b) Ctrl + B
c) Ctrl + Shift + B d) Ctrl + Shift + J
Ans. a

596. URN stands for ______. [UPPCL ARO 2018]
a) Uniform Resource Network
b) Uniform Resource Name
c) Unique Resource Name
d) Unique Resource Network
Ans. b
Explanation: URN ना तनात्िय यूमनफा वरसोस ना होतना है | यह यूमनफा वरसोस आइडेसपटीफायर ना मतनहामसन ना है जो रन
स्नी ना उियोग नरतना है | न URN न ्ेब सोस ने ना नी िहचान नरने ने मम नैरेक्टर वस्ट्&#155060482;ग है |

597. Choose odd one out [SSC 10+2 CHSL 2017]
a) Cyberspace
b) Internet
c) HTML
d) WWW
Ans. c

598. Who invented E-Mail? [SSC 10+2 CHSL 2017]
a) Tim Berners-Lee
b) James Gosling
c) Vinton Cerf
d) VA Shiva Ayyadurai
Ans. d

599. EDGE, UMTS FDD and TDD are _____ cellular networks. [UPPCL APS 2018]
a) 3G
b) 4G
c) 2G
d) 5G
Ans. a

600. Mobile App, “BARD” is meant for people with: [UGC NET 2020]
a) Visual impairment
b) Hearing Impairment
c) Speech and language disability
d) Mental Illness
Ans. a

601. A device that interconnects two or more networks and selectively interchanges packets of data between them
is known as [UGC NET 2020]
a) Switch b) Gateway
c) Hub d) Router
Ans. d

602. ____ is a suit of protocols that were developed by the Department of Defence to provide a highly reliable and
fault-tolerant network infrastructure. [UGC NET 2020]
a) DHCP b) VPN
c) PPPOE d) TCP/IP
Ans. d

603. Lycos is a search engine which was originally started as a research project at - [UGC NET 2020]
a) Standford University
b) Carnegie Mellon University
c) Harvard University
d) Virginia Tech
Ans. b

604. The first version of Unicode was [NTA 2020]
a) 8 bit encoding
b) 16 bit encoding
c) 32 bit encoding
d) 64 bit encoding
Ans. b

605. The first virus recorded, the Creeper virus was written by [UGC NET 2020]
a) Bob Thomas
b) Whitman Diffie
c) Martin Hellman
d) Fred Cohen
Ans. a
Explanation: As noted by Discovery, the Creeper program, often regarded as the first virus, was created in 1971
by Bob Thomas of BBN. Creeper was actually designed as a security test to see if a self-replicating program was
possible.

606. The first US patent for an active RFID tag with rewritable memory was awarded to [JRF (Library & Infor.Scie.)
2020]
a) Kevin Ashton
b) Mario Cardullo
c) Sanjay Sharma
d) David Brock
Ans. b

607. The term “internet of things was first used by: [UGC 2021]
a) D.W. Lewis
b) Bob Thomas
c) Kevin Aston
d) Jian Qin
Ans. c
Explanation: The term 'Internet of Things' was coined in 1999 by the computer scientist Kevin Ashton. While working
at Procter & Gamble, Ashton proposed putting radio-frequency identification (RFID) chips on products to track
them through a supply chain.

608. Which one of the following is the IEEE standard for Wimax? [UGC/NET 2020]
a) IEEE 802.3
b) IEEE 802.11
c) IEEE 802.15
d) IEEE 802.16
Ans. d

609. In data transfer process, which of the following is used for strengthening the signals [UGC/NET 2020]
a) Firewalls
b) Hubs
c) Switching packets
d) Repeater
Ans. d

610. Which layer of the OSI Model is mostly concerned with the syntax of the data? [UGC/NET 2020]
a) Session layer
b) Presentation layer
c) Network layer
d) Data link layer
Ans. b

611. Which of the following devices is used to connect different network segments and manage the traffic between
them? [UGC/NET 2020]
a) Switch
b) Gateway
c) Bridge
d) Repeater
Ans. c

612. _____ command is used to remove a relation from an SQL database. [UGC NET Dec. 2018]
a) Remove table
b) Delete table
c) Update table
d) Drop table
Ans. d
Explanation: Drop table deletes the whole structure of the relation purge removes the table which cannot be
obtained again. The SQL UPDATE Query is used to modify the existing records in a table.

613. Dirty bit is used to show the [UGC NET Dec. 2018]
a) page with low frequency occurrence
b) wrong page
c) page that is modified after being loaded into cache memory
d) page with corrupted data
Ans. c

614. A process residing in Main Memory and Ready and waiting for execution, is kept on [UGC NET Dec. 2018]
a) Execution Queue b) Job Queue
c) Wait Queue d) Ready Queue
Ans. d

615. The software Requirement Specification (SRS) is said to be ____ if and only if no subnet of individual
requirements described in it conflict with each other. [UGC NET Dec. 2018]
a) Verifiable b) Correct
c) Consistent d) Unambiguous
Ans. c

616. A clustering index is defined on the fields which are of type [UGC NET Dec. 2018]
a) non-key and non ordering
b) non-key and ordering
c) key and non-ordering
d) key and ordering
Ans. b

617. Which of the following statement/s is/are true? [UGC NET Dec. 2018]
(i) Firewalls can screen traffic going into or out of an organization
(ii) Virtual private networks can simulate an old leased network to provide certain desirable properties.
Choose the correct option:
a) (ii) only
b) Neither (i) nor (ii)
c) (i) only
d) Both (i) and (ii)
Ans. d

618. Which of the following statements/s is/are true?
(i) Windows XP supports both peer-peer and client-server networks
(ii) Windows XP implements Transport protocols as driver that can be loaded and unloaded from the system
dynamically. [UGC NET Dec. 2018]
Choose the correct answer:
a) (ii) only
b) Neither (i) nor (ii)
c) Both (i) and (ii)
d) (i) only
Ans. c

619. Software products need perfective maintenance for which of the following reasons? [UGC NET Dec. 2018]
a) To overcome wear and tear caused by the repeated use of the software.
b) When the customers need the product to run on new platforms
c) To support the new features that users want it to support
d) To rectify bugs observed while the system is in use
Ans. c

620. The four byte IP Address consists of [UGC NET Dec. 2018]
a) Network Address
b) Host address
c) Neither Network nor Host Address
d) Both Network and Host Addresses
Ans. d (An IP address which is 32 bit long, that means it is of 4 bytes, Example: 8:8:8:8]

621. Data warehouse contains _____ data that is never found in operational environment. [UGC NET Dec. 2018]
a) Summary
b) Encrypted
c) Encoded
d) Scripted
Ans. a

622. Consider ISO-OSI network architecture reference model. Session layer of this model offers dialog control, token
management and _____ as services. [UGC NET Dec. 2018]
a) Flow control
b) Asynchronization
c) Errors
d) Synchronization
Ans. d

623. Which of the following is not one of the principles of agile software development method? [UGC NET Dec. 2018]
a) Embrace change
b) Incremental delivery
c) Customer involvement
d) Following the plan
Ans. d

624. In Linux operating system environment _______ command is used to print a file. [UGC NET Dec. 2018]
a) print
b) lpr
c) pr
d) ptr
Ans. b

625. The Third Generation mobile phones are digital and based on [UGC NET 2018]
a) AMPS
b) Broadband CDMA
c) D-AMPS
d) CDMA
Ans. b
Explanation: Broadband code division multiple access (B-CDMA) is a CDMA based cellphone technology that uses
broadband transmission. The first generation (1G) began in the early 80’s with commercial deployment of Advanced
Mobile Phone Service(AMPS) cellular network.

626. The definition in an XML document are said to be _____ when the tagging system and definitions in the DTD are
all in compliance. [UGC NET 2018]
a) well-formed
b) reasonable
c) valid
d) logical
Ans. c

627. Which of the following is not typically provided by source code management software? [UGC NET 2018]
a) Synchronisation b) Versioning and Revision history
c) Syntax highlighting d) Project forking
Ans. c

628. A software design pattern often used to restrict access to an object: [UGC NET 2018]
a) Adapter b) Decorator c) Delegation d) Proxy
Ans. d

629. CMOS is a computer chip on the motherboard, which is: [UGC NET 2017]
a) RAM
b) EPROM
c) ROM
d) Auxillary storage
Ans. a

630. The Hexadecimal equivalent of the binary integer number 110101101 is: [UGC NET 2018]
a) D24
b) 1BD
c) 1AE
d) 1AD
Ans. d

631. Perform the following operation for the binary equivalent of the decimal numbers (-14)10 + (-15)10 The solution
in 8 bit representation is: [UGC NET 2018]
a) 11100011
b) 00011101
c) 10011101
d) 11110011
Ans. a

632. The Octal equivalent of the binary number 1011101011 is: [UGC NET 2017]
a) 7353
b) 1353
c) 5651
d) 5657
Ans. b

633. In SQL ______ is an Aggregate function. [UGC NET 2017]
a) SELECT
b) CREATE
c) AVG
d) MODIFY
Ans. c

634. In RDBMS, different classes or relations are created using _____ technique to prevent modification anomalies.
[UGC NET 2017]
a) Functional dependencies
b) Data integrity
c) Referential integrity
d) Normal forms
Ans. d

635. ______ SQL command changes one or more fields in a record. [UGC NET 2017]
a) LOOK-UP b) INSERT
c) MODIFY d) CHANGE
Ans. c

636. Which of the following device takes data sent from one network device and forwards it to the destination node
based on MAC address? [UGC NET 2017]
a) Hub
b) Modem
c) Switch
d) Gateway
Ans. c
Explanation: A switch is a multi port bridge with a buffer and a design that can boost its efficiency and performance.
Switch is data link layer device. It can perform error checking before forwarding data.

637. _____ do not take their decisions on measurements or estimates of the current traffic and topology. [UGC NET
2017]
a) Static algorithm
b) Adaptive algorithm
c) Non-adaptive algorithm
d) Recursive algorithm
Ans. c

638. Which of the following layer of OSI Reference model is also called end-to-end layer? [UGC NET 2017]
a) Network layer
b) Datalink layer
c) Session layer
d) Transport layer
Ans. d

639. The IP address _____ is used by hosts when they are being booted. [UGC NET 2017]
a) 0.0.0.0
b) 1.0.0.0
c) 1.1.1.1
d) 255.255.255.255
Ans. a (It is also called DHCP address)

640. In distributed system, the capacity of a system to adapt the increased service load is called ____ [UGC NET
2017]
a) Tolerance
b) Scalability
c) Capability
d) Loading
Ans. b

641. In which website global easy buy is facilitated?
a) ebay.com
b) amazon.com
c) yepme.com
d) None of these
Ans. a

642. Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the
site of the advertiser?
a) affiliate programs
b) click-through
c) spam
d) all of the above
Ans. b

643. What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail
environment?
a) Direct materials
b) indirect materials
c) edi
d) none of the above
Ans. a

644. The threat of new entrants is high when it is:
a) hard for customers to enter the market
b) hard for competitors to enter the market
c) easy for competitors to enter the market
d) easy for customers to enter the market
Ans. c

645. Unique value auction is mainly applies to? [B.Com 2018]
a) new products
b) second hand products
c) engineering products
d) none of the above
Ans. b

646. Paisapay is facilitated in [B.Com 2
nd
sem. 2020]
a) ebay.com.in
b) amazon.com
c) flipkart.com
d) none of the above
Ans. a

647. Which of the following refers to creating products tailored to individual customers? [B.Com 2
nd
sem. 2020]
a) customization
b) aggregation
c) direct materials
d) reverse auction
Ans. a

648. Materials used in the normal operation of a business but not related to primary business operations are called
what? [B.Com 2
nd
sem. 2020]
a) supplies b) direct materials c) indirect materials d) daily stuff
Ans. c

649. What is the name given to an interactive business providing a centralized market where many buyers and
suppliers can come together for e-commerce or commerce-related activities? [B.Com 2
nd
sem. 2020]
a) direct marketplace
b) b2b
c) b2c
d) electronic marketplace
Ans. d

650. Which form of e-marketplace brings together buyers and sellers from multiple industries, often for MRO
materials? [B.Com 2
nd
sem. 2020]
a) Horizontal
b) Vertical
c) Integrated
d) Inclined
Ans. a

651. Which form of e-marketplace brings together buyers and sellers from the same industry? [B.Com 2
nd
sem. 2020]
a) horizontal
b) vertical
c) integrated
d) inclined
Ans. b

652. WPA 2 is used for security in _____
a) Internet b) Bluetooth c) Wi-Fi d) A and B both
Ans. c
Explanation: Wi-Fi Protected Access (WPA) is a security standard for computing devices with wireless internet
connections. It was developed by the Wi-Fi Alliance to provide better data encryption and user authentication than
Wired Equivalent Privacy (WEP), which was the original Wi-Fi security standard.

653. Identify the DBMS among the following:
a) PL/SQL
b) MS-PowerPoint
c) MS-Access
d) MS-Excel
Ans. c

654. BRP stands for _____
a) Business process Re-engineering b) Business product Re-engineering
c) Business Process Requirements d) Business Purpose Requirements
Ans. a

655. What is the reason for avoiding the attributes property in the HTML DOM?
a) Found unnecessary
b) Attributes don’t have attributes
c) Attributes have attributes
d) Considered irrelevant
Ans. b

656. Which of the following life cycle model can be chosen if the development team has less experience on similar
projects?
a) Spiral
b) Waterfall
c) RAD
d) Iterative Enhancement Model
Ans. a

657. Which type of address is 255.255.255.255 according to IPv 4 addressing?
a) Multicast address
b) Limited broadcast address
c) Loopback address
d) Direct broadcast address
Ans. b
 0.0.0.0 – Represents the “default” network, i.e. any connection
 255.255.255.255 – Represents the broadcast address, or place to route messages to be sent to every device
within a network
 127.0.0.1 – Represents “localhost” or the “loopback address”, allowing a device to refer to itself, regardless
of what network it is connected to

658. To extend the connectivity of the processor bus we use ____.
a) PCI bus
b) SCSI bus
c) Controllers
d) Multiple bus
Ans. a

659. Peripheral Component Interconnect (PCI) is a local computer bus for attaching hardware devices in a computer
and is part of the PCI Local Bus standard.
The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be
transferred to peripheral at a more convenient time or in bulk, is known as:
a) Multi-programming
b) Spooling
c) Caching
d) Virtual programming
Ans. b

660. What is Spooling
Spooling is a process in which data is temporarily held to be used and executed by a device, program, or system.
Data is sent to and stored in memory or other volatile storage until the program or computer requests it for
execution.
SPOOL is an acronym for simultaneous peripheral operations online. Generally, the spool is maintained on the
computer's physical memory, buffers, or the I/O device-specific interrupts. The spool is processed in ascending
order, working based on a FIFO (first-in, first-out) algorithm.

661. In how many ways can an object be passed to a function?
a) 1 b) 2 c) 3 d) 4
Ans. c

662. What is the main function of the transport layer?
a) Node to node delivery
b) Synchronization
c) Updating and maintenance of routing tables
d) The process to process message delivery
Ans. d
Explanation: The basic function of the Transport layer is to accept data from the session layer, split it up into
smaller units if need be, pass these to the Network layer, and ensure that all the pieces arrive correctly at the
other end.

663. RTN stands for _____
a) Register Transfer Notation
b) Register Transmission Notation
c) Regular Transmission Notation
d) Regular Transfer Notation
Ans. a

664. Complex networks today are made up of hundred and sometimes thousands of ____.
a) Documents
b) Components
c) Servers
d) Entities
Ans. b

665. Entities having a primary key are called:
a) Primary Entities
b) Strong Entities
c) Weak Entities
d) Primary key
Ans. b

666. ____ register connected to the processor bus is a single-way transfer capable.
a) PC
b) Temp
c) IR
d) Z
Ans. d

667. The data stored in a database must be independent of the applications that access the database. This rule is
called ____.
a) Logical Data Independence b) Physical Data Independence
c) Data Dependency d) None of these
Ans. b

668. Automatic variables use which data structure for space allocation in memory?
a) Stack b) Queue
c) Priority queue d) List
Ans. a

669. Which of the following statements is/are correct regarding Http request methods?
a) The GET method requests information about a document from a resource
b) The post method sends some information to the server from the client.
c) The head method does not have a response body
d) All of these
Ans. d

670. _____ addressing mode is most suitable to change the normal sequence of execution of instructions.
a) Relative b) Indirect
c) Index with Offset d) Immediate
Ans. a

671. Binding of instructions and data to memory addresses can be done at _____.
a) Compile-time
b) Load time
c) Execution time
d) All of these
Ans. d

672. The bus used to connect the monitor to the CPU is _____.
a) PCI bus
b) SCSI bus
c) Memory bus
d) Rambus
Ans. b
Explanation: Small Computer System Interface is a set of standards for physically connecting and transferring data
between computers and peripheral devices. The SCSI standards define commands, protocols, electrical, optical and
logical interfaces.

673. Which of the following is the most common shared resource in a computer network?
a) Keyboard
b) Mouse
c) Combo drive
d) Printer
Ans. d

674. Name the system in which the end-user must not be able to see that the data is distributed over various
locations:
a) Distribution Independence b) Distribution Dependence
c) Logic Dependence d) Distribution logic
Ans. a

675. Name the data in a database that must be independent of its user’s view and any change in logical data must
not affect the applications using it:
a) Logical data independence b) Physical data independence
c) Data Redundancy d) Data logic
Ans. a

676. A language _____ is supported by MS.Net platform.
a) C b) C++ c) Java d) C#
Ans. d

677. Diagram which shows relationship between classes is termed as:
a) Class diagram
b) Sequential diagram
c) Use case diagram
d) Communication diagram
Ans. a

678. The Unified Modeling Lauguage (UML) has become an effective standard for software modelling. How many
different notations does it have?
a) Three
b) Four
c) Six
d) Nine
Ans. d

679. ALU uses _____ to store the intermediate result.
a) accumulators
b) registers
c) heap
d) stack
Ans. a

680. Most of the microcomputer’s operating systems like Apple DOS, MS-DOS and PC DOS etc. Are called disk
operating systems because:
a) They are memory resident
b) They are initially stored on disk
c) They are available on magnetic tapes
d) They are partly in primary memory and partly on disk.
Ans. b

681. The central processing unit in a computer consists of:
a) Input unit, primary storage & secondary storage
b) Input, output and processing
c) Control unit, arithmetic-logic unit, primary storage
d) None of the above
Ans. c

682. What is the meaning of CAPTCHA used in computer terminology?
a) Control Automated Public turing test to tell computers and Humans Apart
b) Completely Automated portal turing test to tell computers and humans apart
c) Completely apprehensive public turing test to tell computer and humans apart
d) Completely automated public turing test to tell computers and humans apart.
Ans. d

683. Who has developed the Automatically Programmable Tool (APT)?
a) Garry kildall
b) Jonathan Fletcher
c) Ralph H Baer
d) Douglas T Ross
Ans. d
Explanation: He is most famous for originating the term CAD for computer-aided design, and is considered to be the
father of Automatically Programmed Tools (APT)

684. Which of the following factor does not makes effective and efficient Network?
a) Performance
b) Reliability
c) Server load
d) Robustness
Ans. c

685. With reference to the hardware parts in computers, what is the full form of VRAM?
a) Video Random Access Media
b) Video Random Access Memory
c) Versatile Read Access Memory
d) Versatile Read Advanced Media
Ans. b

686. Networks that connects a group of computers in a small geographical area is called –
a) Local area network
b) Personal area network
c) Wide area network
d) Metropolitan area network
Ans. a

687. OS that permits multiples programs to run simultaneously using single processor is referred as
a) Multitasking
b) Multi-user
c) Multithreading
d) Multiprocessing
Ans. a

688. Identify the network hardware of a home network:
a) Access Point
b) NIC Card
c) Analog Modem
d) FireWire
Ans. a

689. Which of the following computer language is used for artificial intelligence?
a) PROLOG b) FORTRAN c) C++ d) Java Core
Ans. a
Tip: Prolog is a logic programming language associated with artificial intelligence and computational linguistics.

690. The full form of CAD is-
a) Computer Automatic Design
b) Computer Added Design
c) Computer Automatic decode
d) Computer Aided Design
Ans. d

691. The process of eliminating errors in a program called –
a) Debugging
b) Bug
c) Compiler
d) Deleting
Ans. a
Tip: In computer programming and software development, debugging is the process of finding and resolving bugs
within computer programs, software, or systems

692. What is Michelangelo in the world of Computers?
a) A High Quality Designer Software
b) A Virus
c) A type of circuit
d) A Malicious
Ans. b
Tip: Michelangelo is classified as a boot sector virus, a type of virus that infects the startup sectors of storage
devices—usually the boot sector of a floppy disk or the master boot record (MBR) of a hard disk. Boot sector viruses
are primarily spread through physical media such as floppy disks or USB drives.

693. Which generation computers IBM 1401?
a) 1
st
generation
b) 2
nd
generation
c) 3
rd
generation
d) 4
th
generation
Ans. b
Tip: The IBM 1401 is a variable-wordlength decimal computer that was announced by IBM on October 5, 1959. The
first member of the highly successful IBM 1400 series, it was aimed at replacing unit record equipment for
processing data stored on punched cards and at providing peripheral services for larger computers.

694. Which one of the following is not the jargon of the computers of the Fourth Generation?
a) simulation
b) Android-based hardware
c) visualization
d) Parallel computing
Ans. b

695. What do we call a network whose elements may be separated by some distance, it usually involves two or more
small networks and dedicated high speed telephone lines?
a) URL b) LAN
c) WAN d) WWW
Ans. c

696. Which of the following statements is true?
a) TCP/IP model developed before OSI model
b) TCP/IP model developed after the OSI model
c) TCP/IP model developed simaltaneousaly to the model OSI model
d) TCP/IP model developed to overcome the shortcomings of OSI model
Ans. a
Tip: TCP/IP was developed in the 1970s and adopted as the protocol standard for ARPANET (the predecessor to the
Internet) in 1983. OSI stands for Open Systems Interconnection. It has been developed by ISO – 'International
Organization for Standardization', in the year 1984.

697. A VLAN equals to _____.
a) Router b) Subnet
c) Firewall d) Host/Client ID
Ans. b
Tip: A virtual LAN (VLAN) is a logical overlay network that groups together a subset of devices that share a physical
LAN, isolating the traffic for each group. A LAN is a group of computers or other devices in the same place -- e.g.,
the same building or campus -- that share the same physical network.

698. How many TCP connections does FTP use?
a) one
b) two
c) three
d) four
Ans. b
Tip: FTP uses two TCP connections to copy a file from one system to another. The TCP connections are usually
established in client-server mode, one for control (the server port number is 21) and the other for data transmission
(the server port number is 20).

699. What is work of TDM?
a) Several signals are sent in a time slotted mode on channel
b) Several signals are sent on separate channels at a time
c) One signal is sent to several users
d) A and B Both
Ans. a
Tip: Time-division multiplexing is a method of transmitting and receiving independent signals over a common signal
path by means of synchronized switches at each end of the transmission line so that each signal appears on the line
only a fraction of time in an alternating pattern.

700. DNS can obtain the _____ of host if its domain name is known and vice versa.
a) Station address b) IP address c) Port Address d) Checksum
Ans. b

701. Which Netware protocol works on layer-3 network layer of the OSI model?
a) IPX b) NCP c) SPX d) Net BIOS
Ans. a
Tip: Internetwork Packet Exchange is the network layer protocol in the IPX/SPX protocol suite. IPX is derived from
Xerox Network Systems' IDP. It also has the ability to act as a transport layer protocol.

702. What is the full form of ISP in Software Engineering?
a) Interface Segregation Principle
b) Internet Segregation principle
c) Informal Segregation Principle
d) A and B both
Ans. a

703. A ____ is an electronic device that process data, converting it into information? [SBI Clerk, 2009]
a) computer
b) processor
c) case
d) stylus
Ans. b

704. Compatibility in regard to computers refers to
a) the software doing the right job for the user
b) it being versatile enough to handle the job
c) the software being able to run on the computer
d) software running with other previously installed software
Ans. c

705. Every computer has a(n) ____; many also have _____.
a) operating system; a client system
b) operating system; instruction sets
c) application programs; an operating system
d) operating system; application programs
Ans. d

706. What is an embedded system?
a) A program that comes wrapped in a box
b) A program that is permanent part of a computer
c) A computer that is part of a larger computer
d) A computer and software system that controls a machine or appliance
Ans. d

707. By CD you can
a) Read
b) write
c) Read and write
d) Either Read or write
Ans. a

708. All of the following are included in removable media except –
a) CD-ROMs
b) Diskette
c) DVDs
d) Hard Disk Drive
Ans. d

709. The storage element for a Static RAM is the _____.
a) diode
b) resistor
c) capacitor
d) flip-flop
Ans. d

710. Which of the following another name for a chip?
a) Silicon chip
b) Integrated circuit
c) Semiconductor
d) All of these
Ans. b

711. What disk is used to cold-boot a PC?
a) Setup disk
b) System disk
c) Diagnostic disk
d) Program disk
Ans. b

712. Data (information) stored in computer as
a) files
b) directories
c) floppies
d) matter
Ans. a

713. The _____ indicates how much data a particular storage medium can hold.
a) access
b) capacity
c) memory
d) storage
Ans. b

714. ROM tells the computer to [SBI Clerk 2008]
a) disconnect the computer
b) start up the operating system
c) connect to the hardware
d) turn on
Ans. b

715. A computer’s ROM is ____ [SBI Clerk 2009]
a) ALU
b) Computer software
c) Operating system
d) Computer Hardware
Ans. d

716. The person who write and tests computer program is called a [SBI Clerk 2009]
a) programmer
b) computer scientist
c) software engineer
d) project developer
Ans. a

717. Processing involves [SBI Clerk 2009]
a) inputting data into a computer system
b) transforming input to into output
c) displaying relevant answers
d) providing relevant answers
Ans. b

718. A mistake in an algorithm that causes incorrect results is called a ____. [IBPS PO, 2012]
a) Logical error
b) Syntax error
c) Procedural error
d) compiler error
Ans. a

719. ____ is a feature for scheduling and multiprogramming to provide an economical interactive system of two or
more users [IBPS Clerk, 2012]
a) Time sharing
b) Multitasking
c) Time tracing
d) Multiprocessing
Ans. a

720. A programming language having a ____ is slow in execution [IBPS Clerk, 2012]
a) Interpreter
b) Compiler
c) Assembler
d) Linker
Ans. a

721. System proposal is prepared in _____ phase of SDLC [IBPS Clerk, 2012]
a) Conception
b) Initiation
c) Analysis
d) Design
Ans. b

722. The errors that can be find out by a compiler are [IBPS Clerk, 2012]
a) Logical errors b) Internal errors
c) Semantic errors d) Syntax errors
Ans. d

723. The process that deals with the technical and management issues of software development is [IBPS Clerk, 2012]
a) Delivery process
b) Control process
c) Software process
d) Testing process
Ans. c

724. The two major categories of software include
a) operating system and utility
b) Personal productivity and system
c) System and application
d) System and utility
Ans. a

725. A _____ shares hardware, software, and data among authorized users.
a) Network
b) Protocol
c) Hyperlink
d) Transmitted
Ans. a

726. A repair for a known software bug, usually available at not charge on the internet, is called a(n) ___.
a) Version
b) Patch
c) Tutorial
d) FAQ
Ans. b

727. _____ is the process of carrying out commands.
a) Fetching
b) Storing
c) Decoding
d) Executing
Ans. d

728. The software tools that enable a user to interact with a computer for specific purposes are known as ____.
a) Hardware
b) Network Software
c) Shareware
d) Applications
Ans. d

729. When a file contains instructions that can be carried out by the computer, it is often called a(n) ______ file.
a) data
b) information
c) executable
d) application
Ans. c

730. A _____ contains specific rules and words that express the logical steps of an algorithm.
a) Programming language
b) Syntax
c) Programming structure
d) Logic chart
Ans. c

731. Companies use which of the following vendors to provide access to software and services rather than
purchasing the applications and maintaining the applications themselves?
a) Open source vendors
b) Alliances
c) Application service providers
d) All of the above
Ans. c

732. The _____ tells the computer how to use its components.
a) Utility
b) Network
c) Operating system
d) Application program
Ans. c

733. A _____ contains specific rules and words that express the logical steps of an algorithm.
a) programming language
b) programming structure
c) syntax
d) logic chart
Ans. c

734. The simultaneous execution of two or more instructions is called
a) sequential access
b) reduced instruction set computing
c) multiprocessing
d) disk mirroring
Ans. c

735. When machine instructions are being executed by a computer, the instruction phase followed by the execution
phase is referred to as ____.
a) program cycle b) machine instruction
c) execution cycle d) machine cycle
Ans. d

736. Which of the following is contained on chips connected to the system board and is a holding area for data
instructions and information? (Processed data waiting to be output to secondary storage) [SBI PO 2011]
a) program b) mouse
c) Internet d) memory
Ans. d

737. The box that contains the central electronic components of the computer is the
a) motherboard
b) system unit
c) peripheral
d) input device
Ans. b

738. What is the most popular hardware for multimedia creations?
a) PCs
b) Minicomputers
c) Mainframe Computers
d) WANs
Ans. a

739. _____ is used by public and private enterprises to publish and share financial information with each other and
industry analysts across all computer platforms and the Internet. [IBPS PO, 2012]
a) Extensible Markup Language
b) Extensible Business Reporting Language (XBRL)
c) Enterprise Application Integration (EAI)
d) Sales force automation (SFA) Software
Ans. b

740. ROLLBACK in a database is _____ statement [IBPS Clerk 2012]
a) TCL
b) DCL
c) DML
d) DDL
Ans. a

741. ______ is one reason for problems of data integrity [IBPS Clerk 2012]
a) Data availability constraints
b) Data inconsistency
c) Security constraints
d) Data redundancy
Ans. d

742. A data warehouse [IBPS Clerk 2012]
a) Contains numerous naming conventions and formats
b) Is organized around important subject areas
c) Contains only current data
d) Can be updated by end users
Ans. b

743. A field that uniquely identifies which person, thing, or event the record describes is a _____.
a) file b) data
c) field d) key
Ans. d

744. Files are organised by storing them in ____.
a) Tables
b) Databases
c) Folders
d) Graphs
Ans. c

745. The first step in the transaction processing cycle is _____.
a) database operations
b) audit
c) data entry
d) user inquiry
Ans. c

746. How many options does a binary choice offer?
a) One
b) Two
c) Three
d) It depends on the amount of memory in the computer
Ans. b
Tip: A binary option is a financial exotic option in which the payoff is either some fixed monetary amount or nothing
at all. The two main types of binary options are the cash-or-nothing binary option and the asset-or-nothing binary
option.

747. Meaningful filename helps in easy file _____.
a) Storing
b) Accessing
c) Identification
d) Printing
Ans. b

748. Databases overall structure is maintained in a file called
a) Redolog file b) Data file
c) Control file d) All of the above
Ans. c

749. A data dictionary doesn’t provide information about
a) where data is located b) the size of the disk storage disk
c) who owns or is responsible for the data d) how the data is used
Ans. b

750. A Relation (from the relational database model) consists of a set of tuples, which implies that
a) Relational model supports multi-valued attributes whose values can be represented in sets.
b) for any two tuples, the values associated with all of their attributes may be the same
c) for any two tuples, the value associated with one or more of their attributes must differ.
d) all tuples in particular relation may have different attributes.
Ans. c

751. The method of Internet access that requires a phone line, but offers faster access speeds than dial-up the _____
connection. [IBPS PO 2012]
a) Cable access
b) Satellite access
c) fiber-optic service
d) modem
Ans. d

752. _____ is a technique that is used to send more than one call over a single line. [IBPS PO 2012]
a) Digital transmission
b) Infrared transmission
c) Digitizing
d) Multiplexing
Ans. d

753. Coder refers to [IBPS Clerk 2012]
a) Coder-decoder
b) Co-declaration
c) Command declaration
d) Command decoding
Ans. a
Tip: A codec is a device or computer program which encodes or decodes a data stream or signal. Codec is a
portmanteau of coder/decoder.

754. P2P is a _____ application architecture [IBPS Clerk 2012]
a) Client/server
b) Distributed
c) Centralized
d) 1-tier
Ans. b
Tip: Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or
workloads between peers.

755. An alternate name for the completely interconnected network topology is [SSC CGL 2012]
a) Mesh
b) Star
c) Tree
d) Ring
Ans. a

756. A term related to sending data to a satellite is
a) downlink
b) modulate
c) demodulate
d) uplink
Ans. d
Tip: The communication going from a satellite to ground is called downlink, and when it is going from ground to a
satellite it is called uplink.

757. Frames from one LAN can be transmitted to another LAN via the device
a) Router b) Bridge c) Repeater d) Modem
Ans. b
Tip: The bridge is used at the data link layer in the OSI model to connect a network to another one. Bridges can
connect multiple LAN networks and separate network segments.

758. The ____ enables you to simultaneously keep multiple web pages open in one browser window. [IBPS PO 2011]
a) Tab box
b) Pop-up helper
c) Tab row
d) address bar
Ans. c

759. The process of transferring files from a computer on the Internet to your computer is called [IBPS PO 2011]
a) Downloading
b) Uploading
c) FTP
d) JPEG
Ans. a

760. Which of the following is not true concering user Ids and passwords? [SBI Clerk 2011]
a) When you enter your user ID and password the computer knows it is you
b) If your computer asks for a user ID and password, you can create your own
c) Sometimes you are assigned a user ID and password, for security reasons
d) You should share your user ID and password with at least one other person
Ans. d

761. When a real-time telephone call between people is made over the internet using computers, it is called ____
[IBPS PO 2012]
a) A chat session
b) an e-mail
c) an instant message
d) Internet telephony
Ans. d

762. Your business has contracted with another company to have them host and run an application for your
company over the internet. The company providing this service to your business is called an ______ [IBPS PO 2012]
a) Internet service provider b) Internet access provider
c) Application service provider d) Outsource agency
Ans. d

763. Which of the following must be contained in a URL? [IBPS PO 2012]
a) a protocol identifier
b) the letters, www.
c) the unique registered domain name
d) www. And the unique registered domain name
e) a protocol identifier, www. And the unique registered domain name
Ans. d

764. _____ search engine sends request for information to several search engines simultaneously and compiles the
results [IBPS Clerk, 2012]
a) Meta
b) Individual
c) Directory
d) Subject directory
Ans. a

765. An http request contains ____ parts [IBPS Clerk 2012]
a) 2 b) 5 c) 3 d) 4
Ans. c
Tip: An HTTP request is divided into three parts: Request line, header and body. An HTTP response is also divided
into three parts: Status line, header and body.

766. Which is the slowest internet connection service?
a) Digital Subscriber Line
b) TI
c) Cable Modem
d) Dial-up Service
Ans. d

767. A(n) _____ allows sharing of a broadband Internet connection.
a) Hub
b) Adapter
c) Router
d) Switch
Ans. c

768. With ______, the computer’s modem uses a standard telephone line to connect to the Internet.
a) DSL
b) Dial-up access
c) ISDN
d) Cable Television Internet Services
Ans. b

769. The term “host” with respect to the internet, means _____.
a) A computer that is a stand along computer
b) A computer that is connected to the internet
c) A computer reserved for use by the host
d) A large collection of computers
Ans. b

770. When browsing the world wide web, the browser is a
a) feeder
b) server program
c) application program
d) system program
Ans. c

771. You can keep your personal files/folders in [IBPS PO, 2011]
a) My folder b) My Documents
c) My files d) My text
Ans. b

772. About pasting from the clip board [IBPS PO 2013]
a) A part of the clip board contents can be pasted
b) Whole of the contents of clip board can be pasted
c) sometimes (a) and sometimes (b)
d) (a) and (b)
Ans. b

773. ______ is a window utility program that locates and eliminates unnecessary fragments and rearranges files and
unused disk space to optimize operations. [SBI PO 2013]
a) Backup
b) Disk Cleanup
c) Disk Defragmenter
d) Restore
Ans. c

774. A(n) ______ contains commands that can be selected.
a) pointer
b) menu
c) icon
d) button
Ans. c

775. A _____ contains buttons and menus that provide quick access to commonly used commands.
a) menu bar
b) toolbar
c) window
d) action bar
Ans. b

776. Applications are often referred to as
a) data file
b) executable files
c) system software
d) the operating system
Ans. b

777. Deleted data remains on a disk until
a) the data is overwritten
b) the recycle bin is emptied
c) a file compression utility is used
d) the disk is scanned
Ans. b

778. Press _____ to move the insertion point to the Address box, or to highlight the URL in the Address box.
a) Alt + D
b) Alt + A
c) Shift + Tab
d) Tab + Ctrl
Ans. a

779. The _____ icon represents an e-mail message that has not been read.
a) Closed envelope
b) Red envelope
c) Highlighted envelope
d) Flashing letter
Ans. a

780. To start Internet Explorer, _____ on the Windows taskbar, point to all programs, and then point to Internet
Explorer.
a) double click the Internet Explorer button
b) click the start button
c) right click My computer
d) All of the above
Ans. b

781. When a computer prints a report, this output is called
a) Program
b) Soft copy
c) Hard copy
d) Execution
Ans. c

782. The default view in Excel is ____ view. [IBPS PO 2011]
a) Work
b) Auto
c) Normal
d) Roman
Ans. c

783. What displays the contents of the active cell in Excel? [IBPS PO 2011]
a) Namebox
b) Row Headings
c) Formulabar
d) Taskpane
Ans. c

784. This is not a function category in Excel [IBPS Clerk 2011]
a) Logical b) Data Series
c) Financial d) Text
Ans. b

785. The letter and number of the intersecting column and row is the _____ [IBPS PO 2012]
a) cell location
b) cell position
c) cell address
d) cell coordinates
Ans. c

786. In Power Point, the Header and Footer button can be found on the Insert tab in what group? [IBPS PO, 2012]
a) Illustrations group
b) Object group
c) Text group
d) Tables group
Ans. c

787. Which PowerPoint view displays each slide of the presentation as a thumbnail and is useful for rearranging
slides? [IBPS PO 2012]
a) Slide Sorter
b) Slide Show
c) Slide Master
d) Notes Page
Ans. a

788. When entering text within a document, the Enter key is normally pressed at the end of every ____ [IBPS PO
2012]
a) Line
b) Sentence
c) Paragraph
d) Word
Ans. c

789. Office Assistant is [IBPS Clerk 2012]
a) An application that allows you to take notes and save them in file
b) A button on the standard toolbar that executes the save command
c) A collection of Autocorrect options in word
d) An animated character that offers help and suggestions
Ans. d

790. Pressing Ctrl + 9 in Excel [IBPS Clerk 2012]
a) Prints 9
b) Prints
c) Prints 9 followed by spaces
d) Hides the current row
Ans. d

791. To allow someone else schedule your meetings and appointments, _____ feature of outlook is used [IBPS Clerk
2012]
a) Monthly calendar b) Event manager c) Appointments d) Delegate Access
Ans. d

792. How many types of cell references are available in Excel? [IBPS PO 2013]
a) 3
b) 4
c) 8
d) 10
Ans. A (1. Relative Cell References 2. Absolute Cell References 3. Mixed Cell Reference)

793. A _____ is a collection of data that is stored electronically as a series of records in a table.
a) spreadsheet
b) presentation
c) database
d) web page
Ans. c

794. Saving is the process of ______.
a) copying a document from memory to a storage medium
b) making changes to a documents existing content
c) changing the appearance or overall look of a document
d) developing a document by entering text using a keyboard
Ans. a

795. What is the term for how words will appear on a page?
a) Text formatting
b) Character formatting
c) Point size
d) Typeface
Ans. a

796. Spell check will, find errors in which of the following?
a) Today is a rainy day
b) Today is a rainy
c) is a rainy
d) None of these
Ans. d

797. Editing a document that has been created means _____.
a) saving it
b) printing it
c) scanning it
d) correcting it
Ans. d

798. Passwords enable users to – [SBI Clerk 2009]
a) get into the system quickly
b) make efficient use of time
c) retain confidentiality of files
d) simplify file structures
Ans. c

799. _____ ‘are attempts by individuals to obtain confidential information from you by falsifying their identity. [IBPS
PO 2011]
a) Phishing trips
b) Computer viruses
c) Spyware scams
d) Viruses
Ans. a

800. ____ is a form of virus explicitly designed to hide itself from detection by anti-virus software.
a) Stealth
b) Polymorphic virus
c) Parasitic virus
d) Macro virus
Ans. a
Tip: A stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software.

801. Which virus spreads in application software?
a) Macro virus
b) Boot virus
c) File virus
d) Anti-virus
Ans. a
Explanation: A macro virus is a computer virus written in the same macro language used to create software
programs such as Microsoft Excel or Word. It centers on software applications and does not depend on the
operating system (OS). As a result, it can infect any computer running any kind of OS, including Windows, macOS and
Linux.

802. ‘Trend Micro’ is a
a) virus program
b) anti-virus software
c) just a program
d) All of these
Ans. b

803. WIMP –
a) Window icon menu pointer
b) Window icon mouse pointer
c) Window icon menu pull down menu
d) Window icon menu pen
Ans. a

804. Part Number, description and number of parts ordered are examples of [IBPS Clerk 2013]
a) Control
b) Output
c) Processing
d) Feedback
Ans. c

805. The earliest calculating device is
a) calculator
b) abacus
c) difference engine
d) analytical engine
Ans. b

806. The Napier’s technology used for calculation called
a) Naptologia
b) Vibologia
c) Semiconductor
d) Rabdologia
Ans. d

807. Pascaline is also known by
a) abacus
b) adding machine
c) division machine
d) difference machine
Ans. b
Explain: Pascaline, also called Arithmetic Machine, the first calculator or adding machine to be produced in any
quantity and actually used. The Pascaline was designed and built by the French mathematician-philosopher Blaise
Pascal between 1642 and 1644.

808. Tabulating machine was the first electromechanical machine developed by
a) Herman Hollerith
b) Howard Aiken
c) Blaise pascal
d) John Napier
Ans. a
Tip: The tabulating machine was an electromechanical machine designed to assist in summarizing information stored
on punched cards. Invented by Herman Hollerith, the machine was developed to help process data for the 1890 U.S.
Census.

809. Computer built before the first generation computer was
a) mechanical
b) electromechanical
c) electrical
d) electronics
Ans. b

810. First generation computers used language. [SBI Clerk 2012]
a) machine
b) assembly
c) Both A and B
d) High level
Ans. a

811. Speed of first generation computer was in [IBPS Clerk 2012]
a) nano seconds
b) milli seconds
c) nano-milli seconds
d) micro seconds
Ans. d
Explanation: The first generation (1949-55) of computers used vacuum tubes as their processing units which were
capable to execute addition operations in 200 microseconds and approximately 2800 microseconds to execute
multiplication operations. their speed was around 33.3 microseconds.

812. Time sharing became possible in ____ generation of computers. [SBI PO 2011]
a) first
b) second
c) third
d) fourth
Ans. b
Explanation: Time-sharing became possible with the second-generation computers. In today's era, a specialized
computer can serve multiple users at the same time. This concept was introduced in 1960 when computers were
very expansive even for corporates.

813. Table PC is a type of
a) microcomputer
b) supercomputer
c) minicomputer
d) mainframe computer
Ans. a
Tip: A tablet is a wireless, portable personal computer with a touchscreen interface. The tablet form factor is
typically smaller than a notebook computer, but larger than a smartphone. The idea of tablet computing is generally
credited to Alan Kay of Xerox, who sketched out the idea in 1971.

814. Which of the following is the India’s first multi-peteflops (PF) supercomputer?
a) Param
b) Pratyush
c) Param Ishan
d) Tianhe-2
Ans. b
Explanation: Pratyush is India's fastest and first multi-petaflops (PF) supercomputer unveiled at the Pune-
based Indian Institute of Tropical Meteorology (IITM). The meaning of the word 'Pratyush' is 'rising sun' and the
maximum speed of the supercomputer is 4.0 PetaFlops.

815. The main job of a CPU is to
a) carry out program instructions
b) store data/information for further use
c) process data and information
d) Both A and C
Ans. d

816. Which among the following is an important circuitry in a computer system that directs the operation of the
processor? [IBPS PO 2016]
a) Memory
b) Address Bus
c) Accumulator
d) ALU
e) Control Unit
Ans. e

817. The CPU and memory are located in which of the following devices? [IBPS Clerk Mains 2017]
a) Motherboard
b) Expansion board
c) Storage device
d) Output device
e) System unit
Ans. a
Explanation: The motherboard is the computer's main circuit board. It's a thin plate that holds the CPU, memory,
connectors for the hard drive and optical drives, expansion cards to control the video and audio, and connections to
your computer's ports (such as USB ports).

818. ____ connects components inside the motherboard like CPU and system memory.
a) Data bus
b) Address bus
c) Internal bus
d) External bus
Ans. c
Explanation: The internal bus, also known as internal data bus, memory bus, system bus or front-side bus, connects
all the internal components of a computer, such as CPU and memory, to the motherboard. Internal data buses are
also referred to as local buses, because they are intended to connect to local devices.

819. The read/write line belongs to
a) the data bus
b) the control bus
c) the address bus
d) CPU bus
Ans. b
Tip: The control bus contains a control line for write instructions and a control line for read instructions.

820. When machine instructions are being executed by a computer, the instruction phase followed by the execution
phase is referred to as
a) program cycle b) machine instruction
c) instruction cycle d) task cycle
Ans. c

821. ____ defines the parameters of the action and depends on the operation.
a) Op-code b) Operand
c) instructions d) Data
Ans. b

822. Pipeline strategy is called implement
a) instruction execution
b) instruction prefetch
c) instruction decoding
d) instruction manipulation
Ans. b

823. A joystick allows movements in which angle?
a) 30
0

b) 60
0

c) 90
0

d) 360
0

Ans. d

824. After a picture has taken with a digital camera and processed appropriately, the actual print of the picture is
considered as
a) data
b) output
c) input
d) the process
Ans. b

825. The higher the resolution of a monitor, the [IBPS PO 2011]
a) larger the pixels
b) less clear the screen is
c) further apart the pixels
d) closer together the pixels
Ans. d

826. CRT has a [RBI Grade B 2013]
a) hollow tube
b) vacuum tube
c) long tube
d) round tube
Ans. b
Explanation: cathode-ray tube (CRT), Vacuum tube that produces images when its phosphorescent surface is struck
by electron beams. CRTs can be monochrome (using one electron gun) or colour (typically using three electron guns
to produce red, green, and blue images that, when combined, render a multicolour image).

827. Dot matrix printer is
a) unidirectional
b) bi-directional
c) sequential
d) random
Ans. b
Explanation: Bi-directional printing, sometimes referred to as "boustrophedon printing," involves printing a line from
left-to-right, and then from right-to-left rather than returning to the left to start the next line. This capability is more
efficient for printers whose heads moved down the page line-by-line, such as dot-matrix printers.

828. In laser printers, printing is achieved by deflecting laser beam on to ____ surface of a drum. [SBI PO, IBPS Clerk
2011, 2013]
a) magnetised
b) photosensitive
c) magnetic
d) Either ‘1’ or ‘2’
Ans. b

829. Choose the correct statement.
a) Use of go to enhances the logical clarity of a code
b) Use of go to makes the debugging task easier
c) Use go to when you want to jump out of a nested loop
d) Never use go to
Ans. c

830. C was primarily developed as a
a) systems programming language
b) general purpose language
c) data processing language
d) none of the above
Ans. a

831. C is a
a) High level language
b) low level language
c) high level language with some low level features
d) low level language with some high level features
Ans. c

832. Literal means
a) a string
b) a string constant
c) a character
d) an alphabet
Ans. b

833. Length of the string “correct” is
a) 7
b) 8
c) 6
d) implementation dependent
Ans. a

834. Integer division results in
a) truncation b) rounding
c) overflow d) none of the above
Ans. a

835. Which of the following operators takes only integer operands?
a) + b) * c) / d) %
Ans. d

836. printf(“%c”, 100);
a) print 100
b) prints the ASCII equivalent of 100
c) prints garbage
d) none of the above
Ans. b

837. Which of the following comments regarding the reading of a string, using scanf (with%s option) and gets, is
true?
a) Both can be used interchangeably
b) scanf is delimited by end of line, while gets is not
c) scanf is delimited by blank space, while gets is not.
d) none of the above
Ans. c

838. The statement
printf(“%f”, (float)9/5);
prints
a) 1.8
b) 1.0
c) 2.0
d) none of the above
Ans. a

839. The following program fragment
If (a=7)
printf(“a is seven”);
else
printf(“a is not seven”);
results in the printing of
a) a is seven
b) a is not seven
c) nothing
d) garbage
Ans. a

840. ____ is used to connect audio and video multiple devices like video camera.
a) Firewire b) Serial port c) Parallel port d) USB
Ans. a
Explanation: FireWire, also called IEEE 1394 or i. LINK, high-speed computer data-transfer interface that was used
to connect personal computers, audio and video devices, and other professional and consumer electronics. IEEE
1394 is an interface standard for a serial bus for high-speed communications and isochronous real-time data
transfer. It was developed in the late 1980s and early 1990s by Apple in cooperation with a number of companies,
primarily Sony and Panasonic. Apple called the interface FireWire.

841. Which one of the following input device is user-programmable? [IBPS Clerk 2015]
a) Dumb terminal
b) Smart terminal
c) VDT
d) Intelligent terminal
Ans. d
Explanation: A terminal with built-in processing capability, but no local disk or tape storage. It may use a general-
purpose CPU or may have specialized circuitry as part of a distributed intelligence system.

842. Where are programs and data to be used by the computer available? [SSC FCI 2012]
a) Processing Unit
b) Output
c) Storage
d) Input
Ans. c

843. The two kinds of main memory are
a) ROM and RAM
b) Primary and secondary
c) Floppy disk and hard disk
d) Direct and sequential
Ans. a

844. Virtual Memory allocates hard disk space to supplement the immediate, functional memory capacity of [SBI PO
2014]
a) ROM
b) EPROM
c) The registers
d) RAM
Ans. d

845. _____ is having more memory addresses than are physically available. [SBI PO 2014]
a) Virtual memory
b) System software
c) Application software
d) RAM
Ans. a

846. The storage device used to compensate for the difference in rates of flow of data from one device to another is
termed as [SBI PO 2011]
a) chip b) channel c) floppy d) call e) buffer
Ans. e

847. A track location that cuts across all platters is called a
a) cylinder b) spindle c) diskette d) platters
Ans. a
Tip: For hard disks, each platter is divided into tracks, and a single track location that cuts through all platters (and
both sides of each platter) is called a cylinder.

848. Which of the following can hold maximum data?
a) Optical disc
b) Floppy disk
c) Magnetic disk
d) Magnetic tape
Ans. d
Explanation: The maximum capacity of currently available magnetic tape is 10 TB. Since the capacity of one optical
disk is 300 GB, 34 disks are required to record data of 10 TB. Magnetic tape is superior in terms of acquisition cost
and storage space.

849. DVD refers to [SSC MTS 2013]
a) Digital video developer
b) Digital video device
c) Digital video disc
d) None of the above
Ans. c

850. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called
a) instructions
b) the operating system
c) application software
d) the system unit
Ans. a

851. A linker program
a) places the program in the memory for the purpose of execution
b) relocates the program to execute from the specific memory area allocated to it
c) links the program with other programs needed for its execution
d) interfaces the program with the entities generation its input data
Ans. c

852. Which of the following system software resides in main memory always? [IBPS Clerk 2011]
a) Text editor
b) Assembler
c) Linker
d) Loader
Ans. d

853. Coral Ventura, Illustrator are the examples of
a) Word processing b) Graphic c) Multimedia d) DTP
Ans. d

854. DirectX is a [RBI Grade B 2013]
a) computer part
b) a user interface
c) operating system
d) software that drives graphic software
Ans. d

855. Which type of software is used in organisations to keep track of products in stocks?
a) Enterprise Resource Planning (ERP) software
b) Payroll Software
c) Human resource planning software
d) Accounting software
e) Inventory management software
Ans. e

856. Text editor is a/an [RBI Grade B 2013]
a) application software
b) system software
c) utility software
d) all purpose software
Ans. c

857. The primary purpose of the Windows operating system is
a) to make the most efficient use of the computer hardware
b) to allow people to use the computer
c) to keep systems programmer’s employed
d) to make computers easier to use
Ans. d

858. Every computer has a(n) ____ many also have _____ [RBI Grade B 2014]
a) Operating system, a client system
b) operating system, instruction sets
c) application programs, an operating system
d) operating system, application programs
Ans. d

859. When a file contains instructions that can be carried out by the computer, it is often called a(n) ____ file.
a) data
b) information
c) executable
d) application
Ans. c

860. Grouping and processing all of a firm’s transactions at one time, is called [IBPS Clerk 2011]
a) a database management
b) a real time system
c) batch processing
d) on-time system
Ans. c

861. ____ is a feature for scheduling and multi-programming to provide an economical interactive system of two or
more users. [IBPS Clerk 2012]
a) Time sharing b) Multisharing
c) Time tracing d) Multiprocessing
Ans. a

862. The first graphical user interface was designed by
a) Apple Inc.
b) Microsoft
c) Xerox Corporation
d) None of these
Ans. c

863. In 1973, Xerox PARC developed the Alto personal computer. It had a bitmapped screen, and was the first
computer to demonstrate the desktop metaphor and graphical user interface (GUI).
Restart of computer is called _____ when computer is already ON.
a) cold booting
b) warm booting
c) shut down
d) logging off
Ans. b
Explanation: On a computer running Microsoft Windows, a warm boot can be accomplished by pressing the Ctrl +
Alt + Del keys simultaneously or by selecting a restart option within Windows. A warm boot is faster than turning a
computer off, waiting, and then turning it back on again (cold boot).

864. Which of the following is the latest version of MS Windows?
a) Windows 7
b) Windows 8
c) Windows 14
d) Windows 8.2
Ans. b
Explanation: Windows 8 is a major release of the Windows NT operating system developed by Microsoft. It was
released to manufacturing on August 1, 2012 and Windows 10 was launched in 2015.

865. The purpose of DISKCOPY command is to [RBI Grade B 2014]
a) format the disk if it is not formatted before a write operation is initiated on it
b) overwrite the existing contents of the destination disk as it copies the new information to it
c) make an exact copy of a floppy disk
d) all of the above
Ans. d

866. In DOS, the DIR command is used to [SSC CGL 2013]
a) display content of a file
b) delete file
c) display list of files and sub-directories
d) copy files
Ans. c

867. A factor in the selection of source language is
a) programmer skill
b) language availability
c) program compatibility with other software
d) all of the above
Ans. c

868. Language which can easily interact with the hardware are called
a) High level languages
b) Low level language
c) Middle level language
d) All of the above
Ans. b

869. ____ Serves as the bridge between raw hardware and programming layer of a computer system.
a) Medium level language
b) Low level language
c) High level language
d) Both 1 and 2
Ans. a
Explanation: Medium-level language (MLL) is a computer programming language that interacts with the
abstraction layer of a computer system. Medium-level language serves as the bridge between the raw hardware
and programming layer of a computer system.

870. Which of the following is a machine independent program?
a) High level language
b) Low level language
c) Assembly language
d) Machine language
Ans. a
Explanation: a program that can be used on many different types of computers. The usual way to make a program
machine-independent is to write it in a widely used programming language, such as C or C++, and compile it
separately for each machine.

871. Main application area of ALGOL is
a) General
b) Scientific
c) Engineering
d) Commercial
Ans. b
Explanation: ALGOL is short for algorithmic language. It is a family of portable programming languages for scientific
computations that had a strong influence on other languages.

872. LISP is designed for
a) Artificial intelligence
b) GUI
c) CUI
d) Optical fibre
Ans. a
Explanation: Lisp is a family of programming languages with fully parenthesized prefix notation. Originally specified
in 1958, Lisp is the second-oldest high-level programming language still in common use. Only Fortran is older, by one
year. Lisp's ability to compute with symbolic expressions rather than numbers makes it convenient for artificial
intelligence (AI) applications. While it isn't as popular as C, Python or Perl, Lisp is still used for AI programming as
well as several other functions.

873. Which of the following is not characteristic of COBOL?
a) It is a very standardised language
b) It is a very efficient in terms of coding and execution
c) It had limited facilities for mathematical notation
d) It is very readable language
Ans. b
Explanation: COBOL (Common Business Oriented Language) is an easy-to-learn language that can be compiled and
executed on a variety of computers. It supports a wide syntax vocabulary and features an uncluttered coding style.
Business-oriented capabilities. COBOL's advanced file handling capabilities enable it to handle huge volumes of data.

874. Which of the following is not a computer language? [SBI PO 2014]
a) BASIC
b) COBOL
c) LOTUS
d) FORTRAN
Ans. c
Explanation: Lotus 1-2-3 is a discontinued spreadsheet program from Lotus Software. It was the first killer
application of the IBM PC, was hugely popular in the 1980s.

875. Translator program used in assembly language is called [SBI Clerk 2012]
a) Compiler
b) Interpreter
c) Translation
d) Assembler
Ans. d

876. Windows XP released in
a) 2000
b) 1998
c) 1999
d) 2001
Ans. d

877. In the split window mode, one title bar looks darker than the other, because [RBI Grade B 2012]
a) Darker title bar shows window not in use
b) Darker title bar shows active window
c) Darker title bar shows unavailable window
d) Both ‘1’ and ‘2’
Ans. b

878. Which of the following refers to the rectangular area for displaying information and running programs? [SBI PO
2013]
a) Desktop
b) Dialog box
c) Menu
d) Window
Ans. d

879. Which of the following are lists of commands that appear on the screen? [IBPS Clerk 2015]
a) GUIs
b) Icons
c) Menus
d) Windows
Ans. c

880.The extension of paint file is/are
a) .png
b) .jpg
c) .bmp
d) All of these
Ans. d

881. When embedding object into document, one of the following occurs [RBI Grade B 2014]
a) embedded object becomes a part of the document
b) embedded object remains outside object to the document, but loaded with document
c) Both becomes a zip file
d) Both ‘1’ and ‘2’
Ans. b

882. A ___ is an additional set of commands that the computer displays after you make a selection from main menu.
[SBI Clerk 2009]
a) dialog box
b) sub menu
c) menu selection
d) All of these
Ans. b

883. In order to choose the font for a sentence in a word document [IBPS Clerk 2011]
a) select font in the format menu
b) select font in the Edit menu
c) select font in the tools menu
d) select font in the view menu
Ans. a

884. Which of the following is not a font style?
a) Bold
b) Italic
c) Regular
d) Superscript
e) Bold-italic
Ans. d

885. Auto-text can be used to insert ____ in document. [RBI Grade B 2014]
a) Text b) Graphics
c) Either 1 or 2 d) Both ‘1’ and ‘2’
Ans. d

886. In Word, you can force a page break [IBPS PO 2011]
a) by positioning your cursor at the appropriate place and pressing the F1 key
b) by positioning your cursor at the appropriate place and pressing the Ctrl + Enter
c) by using the insert/section break
d) by changing the font size of your document
Ans. c

887. Where you can find the horizontal split bar on MS-Word screen?
a) On the left of horizontal scroll bar
b) On the right of horizontal scroll bar
c) On the top of the vertical scroll bar
d) On the bottom of vertical scroll bar
Ans. c

888. Which of the following is not available on the ruler of MS-Word screen?
a) Left indent b) Right indent
c) Centre indent d) All of these
Ans. c

889. You specify the save details of your file in the [RBI Grade B 2013]
a) “Save as a file” dialog box
b) “Save the file as” dialog
c) “File save” dialog box
d) Any of ‘1’ and ‘2’
Ans. a

890. Magnifier button is available on [RBI Grade B 2014]
a) Print Preview toolbar
b) Standard toolbar
c) Formatting toolbar
d) Both ‘A’ and ‘B’
Ans. a

891. Which command is used to calculate total characters in a cell? [RBI Grade B 2014]
a) Len
b) Length
c) Mid
d) Sid
Ans. a
Explanation: LEN returns the number of characters in a text string. LENB returns the number of bytes used to
represent the characters in a text string.

892. The function TODAY( ) in Excel, enters the current [RBI Grade B 2014]
a) System time in a cell
b) System date and time in a cell
c) System date only
d) Time at which the current file was opened
Ans. d

893. =Sum(B1:B10) is an example of a
a) function
b) formula
c) cell address
d) value
Ans. b

894. In Excel, an active cell can be represented by
a) 4A
b) A4
c) A$4
d) $A$4
Ans. b

895. Cell address $A4 in a formula means it is a
a) mixed cell reference
b) absolute cell reference
c) relative cell reference
d) All of the above
Ans. a
Explanation: A mixed cell reference is either an absolute column and relative row or absolute row and relative
column. When you add the $ before the column letter you create an absolute column or before the row number you
create an absolute row. For example, $A1 is absolute for column A and relative for row 1, and A$1 is absolute for
row 1 and relative for column A. If you copy or fill the formula across rows or down columns, the relative references
adjust, and the absolute ones don’t adjust.

896. In a worksheet in MS-Excel, what is short-cut key to hide entire row? [SBI PO 2014]
a) Ctrl + 2
b) Ctrl + 9
c) Ctrl + N
d) Ctrl –
Ans. b

897. To select entire row, which shortcut is used? [SBI PO 2014]
a) Shift + Space
b) Ctrl + Space
c) Alt + Space
d) None of these
Ans. a

898. Which of the following bypasses the print dialog box when printing individual slides or an entire presentation?
a) File, Print preview b) Print button c) File, Print d) Ctrl + P
Ans. d

899. How many types of relationships are there in MS-Access?
a) 3 b) 4 c) 5 d) 6
Ans. a

900. What is the default size of the data type in MS-Access? [SBI Clerk 2010]
a) 50
b) 60
c) 70
d) 80
Ans. a

901. We can’t make query by Insert menu? [RBI Grade B 2013]
a) True
b) False
c) Cannot say
d) Sometimes
Ans. a

902. The cardinality property of a relation, refers to the
a) number of database
b) number of columns
c) number of rows
d) number of tables
Ans. c
Tip: cardinality of a relationship is the number of tuples (rows) in a relationship.

903. What is the overall term for creating, editing, formatting, storing, retrieving a text document? [IBPS PO 2012]
a) Word processing
b) Spreadsheet design
c) Web design
d) Database management
Ans. d

904. In which, the database can be restored up to the last consistent state after the system failure?
a) Backup
b) Recovery
c) Redundancy
d) Security
Ans. b

905. A collection of conceptual tools for describing data, relationships, semantics and constraints is referred to as
[IBPS Clerk 2012]
a) E-R model
b) Database
c) Data Model
d) DBMS
Ans. c

906. ____ means that the data contained in a database is accurate and reliable.
a) Data redundancy b) Data integrity
c) Date reliability d) Data consistency
Ans. b

907. Which of the following contains data descriptions and defines the name, data type and length of each field in
the database?
a) Data dictionary
b) Data table
c) Data record
d) Data field
Ans. a

908. Which database language is used to access data in existing database?
a) DDL
b) DML
c) DCL
d) None of these
Ans. b
Tip: Data Manipulation Language (DML) is a set of special commands that allows us to access and manipulate data
stored in existing schema objects

909. An E-R diagram is a graphic method of presenting [IBPS Clerk 2011]
a) Primary keys and their relationships
b) Primary keys and their relationships to instances
c) entity classes and their relationships
d) entity classes and their relationships to primary keys
Ans. c

910. In an E-R diagram, an entity set is are represented by
a) rectangle
b) square
c) ellipse
d) triangle
Ans. a

911. In E-R diagram, relationship type is represented by [IBPS Clerk 2012]
a) ellipse
b) dashed ellipse
c) rectangle
d) diamond
Ans. d

912. _____ is the transmission of data between two or more computers over communication links.
a) Communication
b) Networking
c) Data communication
d) Data networking
Ans. c

913. Communication channel having _____ types.
a) 1 b) 2 c) 3 d) 4
Ans. c (simplex, half-duplex, and full-duplex)

914. Which of the following is the fastest communication channel?
a) Radio wave b) Microwave
c) Optical fibre d) All are operating at nearly the same propagation speed
Ans. b
Explanation: A microwave is the fastest communication channel whereas optical fiber is a way of transferring data
not a way of communication. Microwave is a line-of-sight wireless communication technology that uses high
frequency beams of radio waves to provide high speed wireless connections that can send and receive voice, video,
and data information.

915. What do we call a network whose elements may be separated by some distance? It usually involves two or
more network and dedicated high speed telephone lines. [SBI Clerk 2015]
a) LAN
b) WAN
c) URL
d) Server
Ans. a

916. Ethernet, token ring and token bus are types of [SBI Associates 2012]
a) WAN
b) LAN
c) Communication channels
d) Physical media
Ans. b

917. _____ allows LAN users to share computer programs and data.
a) Communication server
b) Print server
c) File server
d) All of the above
Ans. c
Tip: A file server is a computer containing files available to all users connected to a local-area network (LAN). In
some LANs, a microcomputer is designated as the file server, while in others it is a computer with a large disk drive
and specialized software.

918. Which of the following items is not used in Local Area Network (LANs)? [SSC CGL 2012]
a) Interface card
b) Cable
c) Computer
d) Modem
Ans. d

919. P2P is a _____ application architecture. [IBPS Clerk 2012]
a) client/server b) distributed
c) centralised d) 1-tier
Ans. a
Explanation: In a peer-to-peer (P2P) network, each computer acts as both a server and a client—supplying and
receiving files—with bandwidth and processing distributed among all members of the network. Such a decentralized
network uses resources more efficiently than a traditional network and is less vulnerable to systemic failure.

920. In OSI network architecture, the routing is performed by [IBPS Clerk 2012]
a) Network layer
b) Data link layer
c) Transport layer
d) Session layer
Ans. a
Explain: Routing is the process of selecting a path for traffic in a network or between or across multiple networks.
Broadly, routing is performed in many types of networks, including circuit-switched networks, such as the public
switched telephone network, and computer networks, such as the Internet.

921. How many bits are there in the Ethernet address? [SBI Clerk 2011]
a) 64 bits
b) 48 bits
c) 32 bits
d) 16 bits
Ans. b
Explanation: The Ethernet address is 48 bits long and normally displayed as 12 hexadecimal digits. The MAC address
is often referred to as the Ethernet Address on an Ethernet network.

922. An IP address is ____ bit address [SSC CGL 2017]
a) 8 bit
b) 16 bit
c) 32 bit
d) 64 bit
Ans. c
Explanation: An IPv4 address is 32 bits. An IP Address is shown as 4 decimal numbers representing 4 bytes: d.d.d.d
where d = decimal number (0 - 255). High order bits are the network identifier and lower order bits are the host
identifier.

923. The ____ service allows a group of Internet users to exchange their views on some common topic.
a) nicnet
b) milnet
c) telnet
d) usenet
Ans. d
Explanation: Usenet is a worldwide distributed discussion system available on computers. It was developed from the
general-purpose Unix-to-Unix Copy (UUCP) dial-up network architecture. Tom Truscott and Jim Ellis conceived the
idea in 1979, and it was established in 1980.

924. The ____ uses an addressing schema known as URL indicate the location of files on the web. [SSC CGL 2017]
a) Java Script b) World Wide Web c) SQL d) String
Ans. b

925. Which of the following is most commonly used to identify returns visitors to a website?
a) logged-in visitors b) digital certificates
c) electronic time stamping d) cookies
Ans. d

926. Cracked software are another source of
a) E-mail attack
b) Virus attack
c) Trojan horse
d) All of these
Ans. b

927. A computer virus is
a) deliberately created
b) created accidently
c) produced as result of some program error
d) All of the above
Ans. a

928. The first PC virus was developed in
a) 1980
b) 1984
c) 1986
d) 1988
Ans. c
Explanation: Brain is the industry standard name for a computer virus that was released in its first form on 19
January 1986, and is considered to be the first computer virus for the IBM Personal Computer and compatibles.

929. What is a person called who uses a computer to cause harm to people or destroy critical systems? [IBPS Clerk
2014]
a) Cyber Terrorist
b) Black-hat-Hacker
c) Cyber Cracker
d) Hacktivist
Ans. c
Tip: computer cracker as "an individual who attempts to access computer systems without authorization. These
individuals are often malicious, as opposed to hackers, and have many means at their disposal for breaking into a
system."

930. A firewall operated by [SBI Clerk 2010]
a) The pre-purchase phase
b) isolating intranet from extranet
c) screening packets to/from the network and provide controllable filtering of network traffic
d) All of the above
Ans. c

931. Which of the following a computer’s memory, but unlike a virus, it does not replicate itself? [SBI PO 2011]
a) Trojan Horse b) Logic bomb c) Cracker d) Firewall
Ans. b
Explanation: A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious
function when specified conditions are met. For example, a programmer may hide a piece of code that starts
deleting files, should they ever be terminated from the company.

932. What will you insert, when you need to see all the information from two tables on one form?
a) A page break
b) A subform
c) A linked command button
d) All of the above
Ans. b
Explanation: A subform is a form within a form. It is generally used whenever you want to display data from
multiple tables where there is a one-to-many relationship. For example, you would use a subform if you wanted to
display an order with the order details.

933. To select several cells or ranges that are not touching each other, what would you do while selecting?
a) Hold down the Ctrl key
b) Hold down the Shift key
c) Hold down the Alt key
d) Hold down Ctrl + Shift key
Ans. a

934. In computer science, by information we mean
a) any output coming out from computer
b) processed data put in an intelligent form
c) a report printed by the computer
d) plural of data
Ans. b

935. A software used to convert convert source program instructions to object instruction is known as
a) compiler
b) assembler
c) Interpreter
d) Language processor
Ans. d
Explanation: The language processor is a special translator system that is used for turning a program written in a
high language into a machine code.

936. There are 3 types of language processors:
1. Assembler
2. Interpreter
3. Compiler
The physical arrangement of elements on a page is referred to as a document’s
a) feature b) format c) pagination d) grid
Ans. b

937. Computer systems are comprised of
a) hardware, programs, information, people and network
b) hardware, software, procedures, networks and people
c) hardware, programs, information, people and procedures
d) hardware, programs, processors, procedures, networks and people
Ans. c

938. Press _____ to move the insertion point to the address box or to highlight the URL in the address.
a) Alt + D b) Alt + A c) Shift + Tab d) Tab + Ctrl
Ans. a

939. In analog computer,
a) input is first converted to digital form
b) input is never converted to digital form
c) output is displayed in digital form
d) All of the above
Ans. b

940. The ____ file format is a method of encoding pictures on a computer.
a) HTML b) JPEG c) FTP d) URL
Ans. b

941. All the characters, that a device can use are called its
a) skill set b) character alphabet
c) characters codes d) character set
Ans. d

942. Internet requires
a) an international agreement to connect computers
b) a local area network
c) a commonly agreed set of rules to communicate between computers
d) a world wide web
Ans. c

943. Which of the following is billionth of a second?
a) Gigabyte
b) Terabyte
c) Nanosecond
d) Microsecond
Ans. c
Explanation: A nanosecond (ns) is a unit of time in the International System of Units (SI) equal to one billionth of a
second, that is, 1⁄1 000 000 000 of a second, or 10
−9
seconds.

944. In an ER diagram, attributes are represented by
a) rectangle b) square c) ellipse d) triangle
Ans. c
Explanation: Attributes are included to include details of the various entities that are highlighted in a conceptual ER
diagram. Attributes are characteristics of an entity, a many-to-many relationship, or a one-to-one relationship.

945. Which is a shortcut key to insert a new worksheet in MS-Excel?
a) Ctrl + W b) Ctrl + n c) Ctrl + 1w d) Shirt + F11
Ans. d
Tip: Shift+F11 inserts a new worksheet. Alt+F11 opens the Microsoft Visual Basic For Applications Editor, in which
you can create a macro by using Visual Basic for Applications (VBA). F12 Displays the Save As dialog box

946. Which of the following machines is called a smart machine? [Cyber Olympiad 2014]
a) Mobile phones b) Television
c) Computer d) Microwaves
Ans. c

947. Which of the following jumbled words can complete the sentence given below?
Computer is a _____ machine.
a) Digir
b) Budm
c) Lows
d) Marts
Ans. d
Tip: This is an character arranging question from reasoning. After arrange the word “Marts” we make “Smart”.

948. What is common between Man and Computer?
a) Both can get tired
b) Both can draw and calculate
c) Both can take decisions
d) Both can show emotions
Ans. b

949. Serial printers are slower than-
a) Dot matrix
b) Laser
c) Inkjet
d) All of these
Ans. d

950. Helical-scan cartridge are type of magnetic tape that uses the same technology as –
a) VCR tapes
b) Audio tapes
c) Data tape
d) None of these
Ans. a
Tip: A type of magnetic tape that uses the same technology as VCR tapes. The term helical scan usually refers to
8mm tapes, although 4mm tapes (called DAT tapes)

951. It consists of low-level programs that interact with the computer at a very basic level-
a) System software b) Utility software
c) Application software d) None of these
Ans. a

952. It is a program that performs a very specific task, usually related to managing system resources. Operating
systems contain a number of them for managing disk drives, printers, and other devices –
a) System software b) Utility software
c) Application software d) None of these
Ans. b

953. In Assembly language –
a) Mnemonics are used to code operations
b) Alphanumeric symbols are used for addresses
c) Language lies between high-level language and machine language
d) All the above
Ans. d

954. The latest PC keyboards use a circuit that sense the movement by the change in its capacitance. These
keyboards are referred as –
a) Capacitance keyboards
b) Mechanical keyboards
c) Qwerty keyboards
d) Dvorak keyboards
Ans. a

955. The alternative name for application software is –
a) Utility software
b) Practical software
c) End-user software
d) Practical software
Ans. c

956. Program promised by publisher but never released –
a) Vaporware
b) Shareware
c) Software
d) Mindware
Ans. a
Tip: software or hardware that has been advertised but is not yet available to buy, either because it is only a concept
or because it is still being written or designed.

957. Computer derives its name from the word _____ which means calculation. [Bank Clerk 2008]
a) Computare
b) Calcite
c) Calculator
d) Both (A) and (B)
Ans. a
Tip: The word 'compute' comes from the Latin word computare, meaning "arithmetic, accounting, reckoning".

958. Computer gathers data, which means that they allow users to ____ data. [Bank Clerk 2010]
a) present b) input c) output d) store
Ans. b

959. The word ‘Abacus’ was derived from the greek word _____, which means a table or a board covered with dust.
a) Abax b) Addition
c) Abqua d) Substraction
Ans. a

960. Antikythera mechanism was mainly used to perform
a) addition
b) multiplication and division
c) astronomical calculation
d) logarithm
Ans. c
Tip: The Antikythera mechanism is an Ancient Greek hand-powered orrery, described as the oldest example of an
analogue computer used to predict astronomical positions and eclipses decades in advance.

961. Rabdologia was the technology used for calculation purpose introduced in
a) 1917
b) 1901
c) 1617
d) 1801
Ans. c (Rabdology Book written by John Napier)

962. Napier’s bones performs
a) addition and subtraction
b) multiplication and division
c) only addition
d) Both (A) and (B)
Ans. b

963. Pascaline is also known as [BOB Assistant 2009]
a) mechanical machine
b) adding machine
c) division machine
d) difference machine
Ans. b

964. _____ was the first digital mechanical calculator, which was designed to perform addition, subtraction,
multiplication and division. It can also extract square root by a series of repeated addition.
a) Punch card system
b) Pascaline
c) Stepped reckoner
d) ABC Computer
Ans. c
Tip: The stepped reckoner or Leibniz calculator was a mechanical calculator invented by the German mathematician
Gottfried Wilhelm Leibniz around 1672 and completed in 1694. The name comes from the translation of the German
term for its operating mechanism, Staffelwalze, meaning "stepped drum".

965. The first mass-produced mechanical calculating device was
a) Pascaline b) Arithmometer
c) Punch card d) Mark-1
Ans. b
Tip: The arithmometer, invented by Charles Xavier Thomas de Colmar in 1820, was the first commercially successful
calculating machine capable of performing addition, subtraction, multiplication and division.

966. What do you mean by Jacquard loom? [SBI PO 2011]
a) A bird found in Japan
b) A weaving machine used punched cards
c) The first computer controlled loom
d) A machine for writing match tables
Ans. b

967. The first electro-mechanical computer MARK-1 invented by
a) John W Mauchly
b) Atanasoff-Berry
c) Howard Aiken
d) Clifford Berry
Ans. c
Explanation: The Harvard Mark I, or IBM Automatic Sequence Controlled Calculator, was a general-purpose
electromechanical computer used in the war effort during the last part of World War II. One of the first programs to
run on the Mark I was initiated on 29 March 1944 by John von Neumann.

968. Which of the following computer system introduced the idea of binary calculation?
a) ABC computer
b) Colossus
c) ENIAC
d) EDSAC
Ans. a
Tip: The Atanasoff–Berry computer was the first automatic electronic digital computer in 1937.

969. The first electronic digital computer contained? [SBI PO 2008]
a) Electronic valves
b) Vaccum tubes
c) Transistors
d) Semiconductor memory
Ans. a

970. In second generation, which type of memory was used to store data? [IBPS RRB 2011]
a) Paper tapes
b) Magnetic drum
c) Magnetic core
d) Magnetic tape
Ans. c
Tip: Magnetic-core memory was the predominant form of random-access computer memory for 20 years between
about 1955 and 1975.

971. In which generation did multi-programming start? [SBI Clerk 2010]
a) First generation
b) Second generation
c) Third generation
d) Fourth generation
Ans. c

972. Oracle was introduced in
a) first generation b) second generation
c) third generation d) fourth generation
Ans. d

973. A micro computer can be defined as
a) a small, low-cost digital computer b) which consists of a microprocessor
c) a storage unit and input/output channel d) all of the above
Ans. d

974. Which of the following is the smallest computer? [SBI Clerk 2011]
a) Notebook
b) Laptop
c) Desktop
d) Workstation
Ans. a

975. Which was the world’s first mini computer?
a) PDP-I
b) PDP-II
c) IBM System/36
d) VAX 11/780
Ans. a
Tip: The PDP-1 (Programmed data processor-1) is the first computer in Digital Equipment Corporation's PDP series
and was first produced in 1959. It is famous for being the computer most important in the creation of hacker culture
at Massachusetts Institute of Technology, BBN and elsewhere.

976. Which organisation developed a SAGA-220 super computer in 2011?
a) C-DAC
b) FCC
c) ISRO
d) BARC
Ans. c
Tip: SAGA-220 (Supercomputer for Aerospace with GPU Architecture-220 teraflops) is a supercomputer built by the
Indian Space Research Organisation (ISRO).

977. What is an embedded system? [IOB PO 2011]
a) A program that comes wrapped in a box
b) A program that is permanently part of a computer
c) A computer that is part of a large computer
d) A computer and software system that controls a machine or appliance
Ans. d

978. Which characteristic of computer distinguishes it from electronic calculators? [Allahabad Bank PO 2011]
a) Accuracy b) Storage
c) Versatility d) Automatic
Ans. b
Tip: Computer can store data but calculator does not.

979. Which of the following does not describe one or more characteristic(s) of a computer?
a) Electronic b) External storage
c) Stored program d) Program modification at execution
Ans. d

980. The proper definition of a modern digital computer is [SBI PO 2010]
a) an electronic automated machine that can solve problem involving words and numbers
b) a more sophistic and modified electronic pocket calculator
c) any machine that can perform mathematical operations
d) a machine that works on binary code
Ans. d

981. Computer system are comprised of
a) hardware, programs, information, people and networks
b) hardware, software, procedure, network and people
c) hardware, programs, information, people and procedure
d) hardware, programs, processors, procedures, networks and people
Ans. c

982. Which of the following program is not a utility? [DRDO GTRE 2017]
a) Editor
b) Debugger
c) Spooler
d) None of these
Ans. c
Explanation: The Spooler is a special process that manages access to printers by multiple users. For most users, the
function of the Spooler is transparent. They generate a job for a printer and go to the printer to pick up the output. The
Spooler permits users to continue working without waiting for a print job to finish printing.
Utility Program: A program that performs a specific task related to the management of computer functions, resources, or
files, as password protection, memory management, virus protection, and file compression.
983. A Common LED is made up of – [DRDO 2008]
a) Intrinsic Semiconductor
b) Direct Semiconductor
c) Degenerate semiconductor
d) Indirect Semiconductor
Ans. b

984. GSM system uses TDMA with – [DRDO 2008]
a) 32 users per channel b) 16 users per channel
c) 8 users per channel d) 4 users per channel
Ans. c

985. In the register indirect addressing mode of 8085 microprocessor, data is stored – [DRDO 2008]
a) At the address contained in the register pair
b) In the register pair
c) In the accumulator
d) In a fixed location of the memory
Ans. a

1. What is the keyboard shortcut for opening a new tab in the Google chrome web browser for windows? [DRDO
CVRDE 2017]
a) Alt + N
b) Ctrl + T
c) Alt + Ctrl + T
d) Alt + T

2. For which one of the following ultraviolet light is used to erase the stored contents? [DRDO 2008]
a) PROM
b) EPROM
c) EEPROM
d) PLA

3. In 8085 microprocessor, the accumulator is a – [DRDO 2008]
a) 4 bit register
b) 8 bit register
c) 16 bit register
d) 32 bit register

4. Which of the following memory has highest access speed? [DRDO CVRDE 2017]
a) Hard Disk
b) RAM
c) ROM
d) Cache Memory

5. The multiple access communication scheme in which each user is allocated the full available channel spectrum for
a specific duration of time is known as – [DRDO 2008]
a) CDMA
b) FDMA
c) TDMA
d) MC-CDMA

6. Thermal printer uses _____ coated paper, which turns black when heat is applied. [DRDO CVRDE 2017]
a) Chromium
b) Bisphenol-A
c) Nickel
d) Toner powder

7. Natural language understanding is used in: [DRDO CURDE 2017]
a) natural language interfaces
b) natural language front ends
c) text understanding systems
d) all of the above

8. The device used in the third generation computers is _____ (DRDO GTRE 2017)
a) Vacuum tubes b) Transistors
c) Integrated Circuit d) VLSI

9. Which of the following GUI component user should choose one or more options from one set allow? [DRDO
CVRDE 2017]
a) Radio Button b) Dropdown list c) Check box d) Text Box

10. Which of the following/statement are correct? (DRDO, CVRDE 2017)
(i) Access to primary memory is more than the access time of secondary memory.
(ii) For the same storage capacity, DRAM is cheaper than SRAM.
a) only (i)
b) Both (i) and (ii)
c) Only (ii)
d) Both are wrong

11. Which of the following is an example of High speed microprocessor? (DRDO GTRE 2017)
a) Pentium b) C.D. Rom
c) Keyboard d) Printer

12. _____ gave stored program concept in which program and data to be processed are stored in the same memory.
[DRDO CVRDE 2017]
a) John Von Neumann b) Alan Turing
c) Charles Babbage d) Bill Gates

13. In a desktop computer the board containing micro-processor, RAM and other components is called ______
board. (DRDO GTRE 2017)
a) Graphics b) Motherboard
c) White d) Black

14. Program counter (PC) register is an integral part of: [DRDO CVRDE 2017]
a) Hard Disk b) RAM c) Cache memory d) CPU

15. The set of wires, connecting the microprocessor and the main memory, through which the data flows is called:
[DRDO GTRE 2017]
a) Memory b) Data wire
c) Database d) Databus

Click here for Answers

Computer Best MCQ Book in Just Rs.29/- [7000+ Question in English]
https://bharatskills.in/best-computer-mcq-book-for-competitive-exams/

Computer Best MCQ Book in Just Rs.25/- (2100+ Question in Hindi)
https://bharatskills.in/computer-mcq-book-in-hindi-pdf/

HEETSON

Telegram https://t.me/Heetson_Official
WhatsApp Channel