Computer Awareness MCQ Bits - Part-I

Computer Awareness Most Important Questions (Mock Test)

Answers are Marked as per official Answer Keys, These Questions are extracted from various Competitive Exams Conducted by Govt Recruitment Boards in India
  • Part-I: Total Questions 50 
  • Click on the "Next" Button to go to the next Question

1. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.

a) Nanoscience
b) Microelectrodes
c) Computer forensics
d) Artificial intelligence
Correct Answer: a) Nanoscience

2. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:

a) robotics
b) computer forensics
c) simulation
d) forecasting
Correct Answer: a) robotics

3. All of the following are examples of real security and privacy risks EXCEPT:

a) hackers
b) spam
c) viruses
d) identity theft
Correct Answer: b) spam

4. A process known as ____________ is used by large retailers to study trends.

a) data mining
b) data selection
c) POS
d) data conversion
Correct Answer: a) data mining

5. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.

a) Data
b) Point-of-sale (POS)
c) Sales
d) Query
Correct Answer: b) Point-of-sale (POS)

6. The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called:

a) robotics
b) simulation
c) computer forensics
d) animation
Correct Answer: c) computer forensics

7. Technology no longer protected by copyright, available to everyone, is considered to be:

a) proprietary
b) open
c) experimental
d) in the public domain
Correct Answer: a) proprietary

8. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.

a) PSS
b) POS
c) inventory
d) data mining
Correct Answer: a) PSS

9. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal movements.

a) POS
b) RFID
c) PPS
d) GPS
Correct Answer: b) RFID

10. Which of the following is NOT one of the four major data processing functions of a computer?

a) gathering data
b) processing data into information
c) analyzing the data or information
d) storing the data or information
Correct Answer: c) analyzing the data or information

11. A ____________ is approximately one billion bytes.

a) kilobyte
b) bit
c) gigabyte
d) megabyte
Correct Answer: c) gigabyte

12. A ____________ is approximately a million bytes.

a) gigabyte
b) kilobyte
c) megabyte
d) terabyte
Correct Answer: c) megabyte

13. ____________ is any part of the computer that you can physically touch.

a) Hardware
b) A device
c) A peripheral
d) An application
Correct Answer: a) Hardware

14. The components that process data are located in the:

a) input devices
b) output devices
c) system unit
d) storage component
Correct Answer: c) system unit

15. All of the following are examples of input devices EXCEPT a:

a) scanner
b) mouse
c) keyboard
d) printer
Correct Answer: d) printer

16. Which of the following is an example of an input device?

a) scanner
b) speaker
c) CD
d) printer
Correct Answer: a) scanner

17. All of the following are examples of storage devices EXCEPT:

a) hard disk drives
b) printers
c) floppy disk drives
d) CD drives
Correct Answer: b) printers

18. The ____________, also called the brains of the computer, is responsible for processing data.

a) motherboard
b) memory
c) RAM
d) central processing unit (CPU)
Correct Answer: d) central processing unit (CPU)

19. The CPU and memory are located on the:

a) expansion board
b) motherboard
c) storage device
d) output device
Correct Answer: b) motherboard

20. Word processing, spreadsheet, and photo-editing are examples of:

a) application software
b) system software
c) operating system software
d) platform software
Correct Answer: a) application software

21. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.

a) Nanoscience
b) Nanotechnology
c) Simulation
d) Artificial intelligence (AI)
Correct Answer: d) Artificial intelligence (AI)

22. The term bit is short for:

a) megabyte
b) binary language
c) binary digit
d) binary number
Correct Answer: c) binary digit

23. A string of eight 0s and 1s is called a:

a) megabyte
b) byte
c) kilobyte
d) gigabyte
Correct Answer: b) byte

24. ____________ is data that has been organized or presented in a meaningful fashion.

a) A process
b) Software
c) Storage
d) Information
Correct Answer: d) Information

25. The name for the way that computers manipulate data into information is called:

a) programming
b) processing
c) storing
d) organizing
Correct Answer: b) processing

26. Computers gather data, which means that they allow users to ____________ data.

a) present
b) input
c) output
d) store
Correct Answer: b) input

27. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:

a) data
b) output
c) input
d) the process
Correct Answer: b) output

28. Computers use the ____________ language to process data.

a) processing
b) kilobyte
c) binary
d) representational
Correct Answer: c) binary

29. Computers process data into information by working exclusively with:

a) multimedia
b) words
c) characters
d) numbers
Correct Answer: d) numbers

30. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:

a) eight bytes
b) eight kilobytes
c) eight characters
d) eight bits
Correct Answer: d) eight bits

31. A series of instructions that tells a computer what to do and how to do it is called a _________.

a) program
b) processor
c) command
d) user response
e) None of these
Correct Answer: a) program

32. The Internet is an example of a ________.

a) Cell switched network
b) Circuit switched network
c) Packet switched network
d) All of these
e) None of these
Correct Answer: c) Packet switched network

33. The file that is linked with an e-mail and sent to the receiver of the e-mail is referred to as ____________.

a) Annexure
d) Attachment
c) appendage
d) add-on
e) Article
Correct Answer: d) Attachment

34. ADSL is the abbreviation of _____________.

a) Asymmetric Dual System Line
b) Asymmetric Dual Subscriber Line
c) Asymmetric Digital Subscriber Line
d) Asymmetric Digital System Line
e) None of these
Correct Answer: c) Asymmetric Digital Subscriber Line

35. If you change Windows 98 operating system to Windows XP, you _______.

a) Shortlist
b) Push up
c) Patch
d) Upgrade
e) Pull down
Correct Answer: d) Upgrade

36. A proxy server is used for which of the following?

a) To provide security against unauthorized users
b) To provide TCP/IP
c) To process client requests for database access
d) To process client requests for Web pages
e) None of these
Correct Answer: d) To process client requests for Web pages

37. A term used to describe interconnected computer configuration is

a) Micro program sequence
b) Modulation
c) Multiprocessing
d) Multiprogramming
e) None of these
Correct Answer: d) Multiprogramming

38. A Web _________ consists of one or more Web pages located on a Web server.

a) hub
b) site
c) story
d) template
e) None of these
Correct Answer: b) site

39. Which of the following layers of the OSI model are included in the lower layers?

a) Application, Session, Presentation
b) Physical, Transport, Data Link, Network
c) Data link, Physical, Network
d) Session, Data Link, Physical
e) None of these
Correct Answer: c) Data link, Physical, Network

40. A compiler translates higher level programs into a machine language program, which is called _______________.

a) source code
b) object code
c) compiled code
d) beta code
e) None of these
Correct Answer: b) object code

41. OCR stands for __________ .

a) Optical Character Recognition
b) Optical CPU Recognition
c) Optimal Character Rendering
d) Other Character Restoration
e) None of these
Correct Answer: a) Optical Character Recognition

42. If a new device is attached to a computer, such as a printer or scanner, its _________ must be installed before the device can be used.

a) buffer
b) driver
c) pager
d) server
e) None of these
Correct Answer: b) driver

43. Cyberspace is being governed by a system of law and regulation called?

a) Civil Law
b) Criminal Law
c) Electronic Law
d) Cyber Law
e) Cyber Authority
Correct Answer: b) Criminal Law

44. The software that allows users to surf the Internet is called a/an

a) Search engine
b) Internet Service Provider (ISP)
c) Multimedia application
d) Browser
e) None of these
Correct Answer: d) Browser

45. A tuple is a

a) column of a table
b) two-dimensional table
c) row of a table
d) key of a table
e) None of these
Correct Answer: c) row of a table

46. The method of file organization in which data records in a file are arranged in a specified order according to a key field is known as the

a) Direct access method
b) Queuing method
c) Predetermined method
d) Sequential access method
e) None of these
Correct Answer: d) Sequential access method

47. Which of the following is a popular programming language for developing multimedia web pages, websites, and web-based applications?

a) COBOL
b) Java
c) BASIC
d) Assembler
e) None of these
Correct Answer: b) Java

48. Compiling creates a(n) ________ .

a) program specification
b) algorithm
c) executable program
d) subroutine
e) None of these
Correct Answer: c) executable program

49. A CD-RW disk

a) has a faster access than an internal disk
b) is a form of optical disk, so it can only be written once
c) holds less data than a floppy disk
d) can be erased and rewritten
e) None of these
Correct Answer: d) can be erased and rewritten

50. In Excel, ________ contains one or more worksheets.

a) Template
b) Workbook
c) Active cell
d) Label
e) None of these
Correct Answer: b) Workbook