Computer General knowledge for all competitive exam
www.gkstudies.in
| Q.1 | The ability of an OS to run more than one application at a time is called. | 
| Ans. | Multitasking | 
| Q.2 | You can use the ____________ bar to type URL and display a Web page, or type a keyword to display a list of related Web pages. | 
| Ans. | Address | 
| Q.3 | Which part interprets program instructions and initiate control operations? | 
| Ans. | Control Unit | 
| Q.4 | A program designed to destroy data on your computer which can travel to "infect" other computers is called a | 
| Ans. | Virus | 
| Q.5 | What happens when you boot up a PC? | 
| Ans. | portion of the operating system are copied from disk to memory | 
| Q.6 | The components that process data are located in the- | 
| Ans. | system unit | 
| Q.7 | _________ cells involves creating a single cells by combining two or more selected cells. | 
| Ans. | merging | 
| Q.8 | A device that connects to a network without the use of cable is said to be | 
| Ans. | wireless | 
| Q.9 | What is an e-mail attachment? | 
| Ans. | a separate document from another program sent along with an email | 
| Q.10 | You organise files by storing them in | 
| Ans. | Folders | 
| Q.11 | What type of computers are client computers (most of the time) in a client- server system? | 
| Ans. | mainframe | 
| Q.12 | Removing and replacing devices without turning off your computer is referred to as | 
| Ans. | plug and play plug and play | 
| Q.13 | to protect yourself from computer hackers instruction you should install | 
| Ans. | firewall | 
| Q.14 | to view information on the web you must have a______. | 
| Ans. | web browser | 
| Q.15 | the computer of second generation were characterized by the use of which of the following instead of vacuum tubes | 
| Ans. | transistor | 
| Q.16 | the first transistorized computer was built at______. | 
| Ans. | University of Manchester | 
| Q.17 | the computer's capability of distinguishing spoken words is called_______. | 
| Ans. | voice recognition | 
| Q.18 | to access a mainframe and supercomputer user often used a | 
| Ans. | desktop | 
| Q.20 | advice for changing the connection on a connector to a different configuration is______. | 
| Ans. | an adaptor | 
| Q.21 | CD and DVD drive are example of_____. | 
| Ans. | storage devices | 
| Q.22 | the part of a computer that coordinates all its function is called its_______. | 
| Ans. | control unit | 
| Q.23 | computer networking devices are also called as ______. | 
| Ans. | inter working unit | 
| Q.24 | ASCII stand for_______. | 
| Ans. | American standard code for information interchange | 
| Q.25 | a program written in high level language is referred to as | 
| Ans. | source code | 
| Q.26 | the Unix which command is used to display the message or value of any variable on the screen | 
| Ans. | Echo | 
| Q.27 | the first electronic computer and ISC was able to do how many multiplication per second | 
| Ans. | 300 | 
| Q.28 | a device that connects multiple network segment along the data link layer is called as | 
| Ans. | Bridge | 
| Q.29 | a program that converts a high level language source file into a machine language file is called a__________. | 
| Ans. | compiler | 
| Q.30 | most application software today come with an interface called______. | 
| Ans. | graphical user interface | 
| Q.31 | which of the following was an early desktop operating system that included an integrated graphic user interface point and click feature | 
| Ans. | Mac OS | 
| Q.32 | Microsoft Windows came to dominate the world personal computer market with_____% market share | 
| Ans. | 90% | 
| Q.33 | what type of keys are ctrl and shift | 
| Ans. | Modifier | 
| Q.34 | in which toolbar B bill find short button for auto sum | 
| Ans. | Formula Bar | 
| Q.35. | in order to move from one worksheet to another in Excel workbook what should be clicked | 
| Ans. | Sheet tab | 
| Q.36 | in which chart only one data series can be plotted | 
| Ans. | Stacked bar | 
| Q.37 | material consisting of text and numbers is best presented as_______. | 
| Ans. | A table slide | 
| Q.38 | coded entries which are used to gain access to a computer system are called______. | 
| Ans. | Passwords | 
| Q.39 | a program designed to destroy data on a computer which can travel to infect other computer is called a______. | 
| Ans. | virus | 
| Q.40 | in a computer most processing takes place in_____. | 
| Ans. | CPU | 
| Q.41 | what type of software is most useful for the creation of brochure poster and newsletter | 
| Ans. | desktop publishing software | 
| Q.42 | when the computer is switched on the booting process performs the_____. | 
| Ans. | power-on self-test | 
| Q.43 | the box that contains the central electronic components of the computer is___________. | 
| Ans. | system unit | 
| Q.44 | which key is used in combination with another key to perform a special task | 
| Ans. | control | 
| Q.45 | units which are the last receiver of generate data are called_______. | 
| Ans. | data terminal equipment | 
| Q.46. | a normal compiler text source code as input and produced this as output | 
| Ans. | Machine code | 
| Q.47 | COBOL is widely used in_______application | 
| Ans. | Commercial | 
| Q.48 | _____is a layer of computer system between the hardware and the user program | 
| Ans. | operating equipment environment | 
| Q.49 | in Windows ME, what does M stand for | 
| Ans. | Millennium | 

कोई टिप्पणी नहीं:
एक टिप्पणी भेजें