Computer GK Questions (1-500)

1) The code for a Web page is written using Hypertext Markup language

2) The first computers were programmed using Machine language

3) A filename is a unique name that you give to a file of information

4) This can be another word for program software

5) Any data or instruction entered into the memory of a computer is considered as storage

6) Which part of the computer displays the work done monitor

7) A series of instructions that tells a computer what to do and how to do it is called a program

8) Hardware is the part of a computer that one can touch and feel .

9) The role of a computer sales representative generally is to determine a buyer’s needs and match it to the correct hardware and software.

10) Supercomputers refers to the fastest, biggest and most expensive computers

11) Executing is the process of carrying out commands

12) The rectangular area of the screen that displays a program, data, and or

information is a window

13) The process of a computer receiving information from a server on the internet is

known as downloading

14) Disk drive is the part of the computer helps to store information

15) Arithmetic operations include addition, subtraction, multiplication, and division

16) A keyboard is the king of input device

17) An error is known as bug

18) A collection of related information sorted and dealt with as a unit is a file

19) Sending an e-mail is similar to writing a letter

20) IT stands for information technology

21) A menu contains commands that can be selected

22) Plotter, printer, monitor are the group consists of output devices

23) Edit menu is selected to cut, copy and paste

24) The most important or powerful computer in a typical network is network server

25) The primary purpose of software is to turn data into information

26) The ability to find an individual item in a file immediately direct access is used.

27) To make a notebook act as a desktop model, the notebook can be connected to a

docking station which is connected

to a monitor and other devices

28) You can use the tab key to move a cursor across the screen, indent a paragraph.

29) A collection of related files is called record.

30) Storage that retains its data after the power is turned off is referred to as nonvolatile

storage.

31) Internet is an example of connectivity.

32) Testing is the process of finding errors in software code.

33) A syntax contains specific rules and words that express the logical steps of an

algorithm.

34) Changing an existing document is called the editing documentation

35) Virtual memory is memory on the hard disk that the CPU uses as an extended

RAM.

36) Computers use the binary number system to store data and perform calculations.

37) The windows key will launch the start buttons.

38) To move to the beginning of a line of text, press the home key.

39) When sending an e-mail, the subject lines describe the contents of the message.

40) Tables, paragraphs and indexes work with when formatting text in word.

41) TB is the largest unit of storage.

42) The operating system tells the computer how to use its components.

43) When cutting and pasting, the item cut is temporarily stored in clipboard.

44) The blinking symbol on the computer screen is called the cursor.

45) Magnetic tape is not practical for applications where data must be quickly recalled

because tape is a sequential

because tape is a sequential access medium.

46) Rows and columns are used to organize data in a spread sheet.

47) When you are working on documentation on PC, the document temporarily stored

in flash memory.

48) One megabyte equals approximately 1 million bytes.

49) Information travels between components on the motherboard through buses.

50) RAM refers to the memory in your computer.

51) Computer connected to a LAN can share information and or share peripheral

equipment

52) Microsoft office is an application suite

53) Utilities can handle most system functions that aren’t handled directly by the

operating system

54) If you receive an e-mail from someone you don’t know then you should delete it

without opening it

55) A set of instructions telling the computer what to do is called program

56) LAN refers to a small single site network

57) A collection of programs that controls how your computer system runs and

processes information is called operating

system.

58) Device drivers are small, special-purpose programs

59) Transformation of input into output is performed by the CPU

60) Data going into the computer is called input.

61) Binary choice offer only two options

62) To indent the first paragraph of your report, you should use tab key

63) Fields are distinct item that don’t have much meaning to you in a given context

64) A website address is a unique name that identifies a specific web site on the web

65) Modem is an example of a telecommunications device

66) A set of computer programs used for a certain function such as word processing is

the best definition of a software

package

67) You can start Microsoft word by using start button

68) A blinking symbol on the screen that shows where the next character will appear

is a cursor

69) Highlight and delete is used to remove a paragraph from a report you had written

70) Data and time are available on the desktop at taskbar

71) A directory within a directory is called sub directory

72) Testing is the process of finding errors in software code

73) In Excel, charts are created using chart wizard option

74) Microcomputer hardware consists of three basic categories of physical equipment

system unit, input/output,

memory

75) Windows is not a common feature of software applications

76) A tool bar contains buttons and menus that provide quick access to commonly

used commands

77) For creating a document, you use new command at file menu

78) Input device is equipment used to capture information and commands

79) A programming language contains specific rules and words that express the

logical steps of an algorithm

80) One advantage of dial-up internet access is it utilizes existing telephone security

81) Protecting data by copying it from the original source is backup

82) Network components are connected to the same cable in the star topology

83) Two or more computers connected to each other for sharing information form a

network

84) A compute checks the database of user name and passwords for a match before

granting access

85) Computers that are portable and convenient for users who travel are known as

laptops

86) Spam is the term for unsolicited e-mail

87) Utility software type of program controls the various computer parts and allows

the user to interact with the

computer

88) Each cell in a Microsoft office excel document is referred to by its cell address,

which is the cell’s row and column

labels

89) Eight digit binary number is called a byte

90) Office LANs that are spread geographically apart on a large scale can be

connected using a corporate WAN

91) Storage is the process of copying software programs from secondary storage

media to the hard disk

92) The code for a web page is written using Hyper Text Markup Language

93) Small application programs that run on a Web page and may ensure a form is

completed properly or provide

animation are known as flash

94) In a relational database, table is a data structure that organizes the information

about a single topic into rows and

columns

95) The first computers were programmed using assembly language

96) When the pointer is positioned on a hyperlink it is shaped like a hand

97) Booting process checks to ensure the components of the computer are operating

and connected properly

98) Checking the existing files saved on the disk the user determine what programs

are available on a computer

99) Special effect used to introduce slides in a presentation are called animation

100) Computers send and receive data in the form of digital signals

101) Most World Wide Web pages contain HTML commands in the language

102) Icons are graphical objects used to represent commonly used application

103) UNIX is not owned and licensed by a company

104) In any window, the maximize button, the minimize button and the close buttons

appear on the title bar

105) Dial-up Service is the slowest internet connection service

106) Every component of your computer is either hardware or software

107) Checking that a pin code number is valid before it is entered into the system is an

example of data validation

108) A compiler translates higher level programs into a machine language program,

which is called object code

109) The ability to find an individual item in a file immediately direct access

110) Computers connected to a LAN can share information and/or share peripheral

equipment

111) A CD-RW disk can be erased and rewritten

112) The two major categories of software include system and application

113) Windows 95, Windows 98 and Windows NT are known as operating systems

114) Information on a computer is stored as analog data

115) A spread sheet that works like a calculator for keeping track of money and

making budgets

116) To take information from one source and bring it to your computer is referred to

as download

117) Each box in a spread sheet is called a cell

118) Network components are connected to the same cable in the bus topology

119) Two or more computers connected to each other for sharing information form a

network

120) A computer checks the database of user names and passwords for a match before

granting access.

121) Spam is the other name for unsolicited e-mail

122) Operating system controls the various computer parts and allows the user to

interact with the computer

123) Each cell in a Microsoft Office Excel document is referred to by its cell address,

which is the cell’s row and column

labels

124) Download is the process of copying software programs from secondary storage

media to the hard disk

125) The code for a web page is written using Hypertext Markup Language

126) Small application programs that run on a web page and may ensure a form is

completed properly or provide

animation are known as Flash

127) A file is a unique name that you give to a file of information

128) For seeing the output, you use monitor

129) CDs are of round in shape

130) Control key is used in combination with another key to perform a specific task

131) Scanner will translate images of text, drawings and photos into digital form

132) CPU is the brain of the computer

133) Something which has easily understood instructions is said to be user friendly

134) Information on a computer is stored as digital data

135) For creating a document, you use new command at file menu

136) The programs and data kept in main memory while the processor is using them

137) Ctrl + A command is used to select the whole document

138) Sending an e-mail is same as writing a letter

139) A Website address is a unique name that identifies a specific website on the web

Answer sheets in bank PO’s/Clerk’s examinations are checked by using Optical

Mark Reader

141) Electronic data exchange provides strategic and operational business opportunity

142) Digital signals used in ISDN have whole number values

143) Assembler is language translation software

144) Manual data can be put into computer by scanner

145) In a bank, after computerization cheques are taken care of by MICR

146) The banks use MICR device to minimize conversion process

147) Image can be sent over telephone lines by using scanner

148) Microchip elements are unique to a smart card

149) MS-DOS is a single user operating system

150) Basic can be used for scientific and commercial purpose

151) All computers can execute machine language programs

152) Programs stored in ROM can’t be erased

153) Ethernet is used for high speed telecommunications

154) IP address can change even if the domain name remains same

155) Each directory entry can be of 32 bytes

156) With the help of Control + Del a letter can be erased in a word

157) Disk can keep maximum data

158) FORTRAN is a scientific computer language

159) Computer language COBOL is useful for commercial work

160) COBOL is a high standard language like English

161) In computer the length of a word can be measured by byte

162) Byte is the unit of storage medium

163) ROM is not a computer language

164) Oracle is a database software

165) Sequential circuit is full aid

166) Processor is must for computer

167) ROM keeps permanent memory

168) Screen display is called by windows in lotus

169) Pascal is a computer language

170) Expanded form of IBM is International business machine

171) IC chips are made of silicon

172) India’s Silicon Valley situated at Bangalore

173) RAM and ROM are the storage devices of computer

174) DOS is to create relation between hardware and software

175) LOTUS 1-2-3 is software

176) Voice mail is a personal security code for GSM subscribers

177) Tables holds actual data in the database

178) Trojan is a virus

179) Static keys make WEB insecure

180) Video signal needs highest bandwidth

181) Connectivity means communication between systems

182) Controlling is not required for high level language programs before it is executed

183) 3 out of three rollers are responsible for the movement of cursor on screen

184) Hardware that adds two numbers is arithmetic logical unit

185) Data accuracy is not done by modem

186) LAN is used for networks setup within a building

187) A data communication system requires terminal device, communication channel,

protocols

188) Most common channel used by networks today is satellite

189) Run Time is not a type of error

190) A five-digit card attribute used for postal ZIP codes it will be restored as a

numeric data

191) Computer viruses can be attached to an executable program

192) MS-DOS was the first operating system

193) The smallest space where information on a hard disk is kept in a cluster

194) An information is processed data

195) Intelligence is not a characteristic of a computer

196) Private key is used to spend a digital signature

197) Negative numbers can be represented in binary

198) VDU is not an essential part of a computer

199) The printers are line printer, laser, dot matrix

200) Speed of clock of CPU is measured in megahertz

201) Cache is not a secondary storage device

202) Disk can be used to store sequential files and random files

203) Windows is not an application

204) When taking the output information is produced in hardcopy and/or softcopy

form

205) Control unit’s function is to decode program instructions

206) The most powerful type of computer amongst the following is supercomputer

207) GO TO statement is used in C, C++, basic language

208) File menu is selected to print

209) The name a user assigns to a document is called a filename

210) A processor is an electronic device that processes data, converting it into

information

211) Control words are words that a programming language has set aside for its own

use

212) Monitor and printer are the two types of output devices

213) To access properties of an object, the mouse technique to use is right-clicking

214) An operating system is a program that makes the computer easier to use

Connections to the internet using a phone line and a modem are called dial-up

connections

216) To access a mainframe or supercomputer, users often use a terminal

217) A flaw in a program that causes it to produce incorrect or inappropriate results is

called a bug

218) A web site address is a unique name that identifies a specific web site on the web

219) Every component of your computer is either hardware or software

220) To make the number pad act as directional arrows, you press the num lock key

221) When creating a word-processed document, formatting text involves the user

changing how words on the page

appear, both on the screen and in printed form

222) The ALU performs simple mathematics for the CPU

223) A computer program is a set of keywords, symbols, and a system of rules for

constructing statements by which

humans can communicate the instructions to be executed by a computer

224) The another word for program is software

225) The name of the computer’s brain is CPU

226) A computer is a device that electronically processes data, converting it to

information

227) Laptops are computers that can be carried around easily

228) The secret code that restricts entry to some programs is password

229) The basic goal of computer process is to convert data into information

230) The disk is placed in the CPU in a computer

231) A hard copy of a document is printed on the printer

232) The name that the user gives to a document is referred to as file name

233) Restarting a computer that is already on is referred to as warm booting

234) E-mail is the transmission of messages and files via a computer network

235) The person who writes and tests computer programs is called a programmer

236) The information you put into the computer is called data

237) The output devices make it possible to view or print data

238) A chat is a typed conversation that takes place on a computer

239) Hardware includes the computer and all the devices connected to it that are used

to input and output data

240) The most common method of entering text and numerical data into a computer

system is through the use of a

keyboard

241) Mouse, keyboard, plotter are the group consist of only input devices

242) 256 values can be represented by a single byte

243) Transformation of input into output is performed by the CPU

244) Vertical-market applications can handle most system functions that aren’t

handled directly by the operating system

245) Device drivers are small, special-purpose programs

246) LAN refers to a small, single-site network

247) A set of instructions telling the computer what to do is called program

248) Data going into the computer is called input

249) If you receive an e-mail from someone you don’t know, then delete it without

opening it

250) Two options does a binary choice offer

251) A collection of programs that controls how you computer system runs and

processes information is called

operating system

252) Rows and columns are data organized in a spreadsheet

253) When cutting and pasting, the item cut is temporarily stored in clipboard

254) When you are working on a document on a PC, the document is temporarily

stored in flash memory

255) One megabyte equals approximately 1 million bytes

266) A cluster represents a group of sectors

267) Digital signals used in ISDN have discrete values

268) Assembler is language translation software

269) Manual data can be put into computer by scanner

270) Bandwidth means channel capacity amount of data following via cables and

measure of speed

271) Chip can keep maximum data

272) Debugging is the process of finding errors in software code

273) Time Bomb are viruses that are triggered by the passage of time or on a certain

data

274) Linux is an open source operating system

275) Boot sector viruses are often transmitted by a floppy disk left in the floppy drive

276) Operating system controls the way in which the computer system functions and

provides a medium by which users

can interact with the computer

277) Servers are computers that provide resources to other computers connected to a

network

278) Field names describe what a data field is

279) You must install router on a network if you want to share a broadband internet

connection

280) A goal of normalization is to minimize the number of redundancy

281) Programs from the same developer, sold, bundled, together, that are provide

better integration and share common

features, tool box and menus are known as software suits

282) A data ware house is one that organizes important subject areas

283) URL term identifies a specific computer on the web and the main page of the

entire site

284) A proxy server is used to process client request for web pages

285) When data changes in multiple list and list are not updated, this causes data

inconsistency

286) Granting an outside organization access to internet web pages is often

implemented using a extranet

287) The code that relational database management systems use to perform their

database task is refer to as SQL

288) URL stands for Uniform resource locator

289) A data base management system is a software system used to create, maintain

and provide controlled access to a

database

290) The two broad categories of software are system and application

291) The metal or plastic case that holds all the physical parts of the computer is

known as system unit

292) Data integrity means that the data contained in the database is accurate and

reliable

293) A local area network is a private corporate network used exclusively by

company categories

294) Eight bits equal to one byte

295) A byte can hold one character data

296) A characteristic of a file server is manages files operations and is shared on a

network

298) The development process of computer started in 1617

299) The role of Blaze Pascal in the development of computer is addition and

subtraction of numbers

300) The inventor of computer is Charles Babbage

301) The IBM made the first electronic computer in 1953

302) The silicon based transistor started to made by Gordon Tin in 1954

303) IBM is a company

304) The personal computer invented in 1981

305) 1 Kilobyte is equal to 1024 bytes

306) LCD means liquid crystal display

307) UPS converts DC voltage into AC voltage

308) The word ZIP means Zicxac Inline Pin

309) With the help of Pal switch we can increase or decrease the speed of computer’s

processing

310) The full form of MICR is magnetic ink character reader

311) Swift networks are used between banks

312) Panda is a virus

313) Boot sector is hardware

314) Debug searches the fault of any software

315) OCR means optical character recognition

316) The total printout of a program is called listing

317) With the help of ZIP we can decrease the size of any programs

318) We can format the hard disk with the help of Booting

319) CANNED is called as readymade software

320) The process of creating third file by mixing two files is called as mail merging

321) The figures and lines etc. made by computer is called as graphics

322) Each line represents 65 letters in a WordStar

323) Nokia- 7500 is not the example of Micro Processor

324) The first name of the digital computer is Unvake

325) The modern computer was invented in 1946

326) The full form of DOS is disk operating system

327) The expanded form of FORTRAN is formula translation

328) The great revolution came in computer sector in 1960

329) Magnetic tape is called as Input device of computer

330) The first mechanical computer of Charles Babbage is known as punch card

machine

331) The IC chip used in computer is generally made in silicon

332) Telephone broadcast is the example of simplex transmission

333) Optical, Mechanical are the kinds of mouse

334) Control panel is used for increasing and decreasing the speed of the cursor of

mouse

335) The capacity of modern main frame digital computer is 10(to the power of -12)

mbps

336) With the help of my computer we can know about the usage and availability of

space in computer

337) We use both MS-Word and page maker for making resume

338) Earliest computers that would work with FORTRAN was second generation

339) Back Ups in database are maintained for to restore the lost data

340) IDEA is a encryption technique

341) DBRM takes care of storage of data in a database

342) The job of DBMS is to decrease redundancy

343) Digital signatures use encryption for authenticating

344) OS acts as intermediary agency between user and hardware

345) Plotters gives the highest quality output

346) ROM is built in memory in computer

347) FLASH is a RAM

348) PRAM is not a RAM

349) FLASH device is used in cell phones

350) Internal storage is same as the primary storage

351) IMAC is name of a machine

352) First generation computers could do batch processing

353) The analytic engine was created by Charles Babbage

354) Voicemail of GSM service provider has the personal security code for its

subscribers

355) Senior manager decided about the division of work with respect to IT security

356) Encrypting file system of window XP professional operating system protects the

data of a user, even if the

computer is shared between users

357) The .mpeg is the format of a movie file

358) Controlling is NOT required for high level language program before it is

executed

359) A plotter is output device

360) 80286 is a hardware part of microprocessor

361) Top-bottom approach can not be the measure of network traffic

362) A switching mode power supply is used for converting raw input power to

stabilize DC power

363) Spooler can manage the whole printing process

364) Validity routines control procedures can be used to ensure completeness of data

365) Less expensive than leased line networks is not a characteristic of virtual private

networks (PVN)

366) Program policy framework provides strategic direction to an organization

367) Cross bar switches have common control

368) Row-level security is the most basic part for database security

369) Voice recognition software can not be used for converting text into voice

370) The user account can only be created by the network administrator

371) IBM-700 belongs to second generation

372) Allocating adequate bandwidth would help her in speeding up the data transfer

over net

373) BCD means binary coded decimal

374) Extended system configuration data is same as BIOS

375) Digitizer is an input device

376) Caramel is the latest platform of Intel Centrio microprocessor

377) RISC is known as storage device

378) NORTON is an anti-virus

379) The system file of an operating system is COM

380) ATMs of bank have real currency

381) A program that converts high level language to machine language is assembler

382) ‘.txt’ files can be made in notepad, MS word, DOS editor

383) .Zip is a compressed file

384) Internet is a WAN

385) MP3 technology compresses a sound sequence to one-twelfth of its original size

386) At a time only one operating system can be at work on a computer

387) If multiple programs can be executed at the same time, it is distributed operating

system

388) If the operating system provides quick attention, it is real time operating system

389) Distributed operating system uses network facility

390) FORMAT command in MS-DOS is used for recreating disk information

391) COPY command in MS-DOS is used to copy one or more files in disk drive to

another, copy from one directory to

another directory

392) REN command is Internal command

393) Tom Burners-Li propounded the concept of “World wide web”

394) The memory address sent from the CPU to the main memory over a set of wires

is called address bus

395) MODEM is an electronic device required the computer to connect to the

INTERNET

396) A source program is a program which is to be Tran scripted in machine language

397) Virus in computer relates to program

398) Floppy is not a storage medium in the computer related hardware

399) DOS floppy disk does not have a boot record

400) The CPU in a computer comprises of Store, arithmetic and logical unit and

control unit

401) In computer parlor a mouse is a screen saver

402) UNIVA is the name of the computer which was first used for programming and

playing of music

403) The IC chips for computer is prepared from silicon

404) Database management systems are comprised of tables that made up of rows

called records and columns called

fields

405) Nano is equal to 10(to the power of -9)

406) In computers RAM is a non-volatile memory

407) Disk and tape drives are commonly used as hard copy

408) When computer is connected to LAN and data is sent across it for

storage/processing is online processing

409) The primary storage unit is also referred to as internal storage

410) Oracle is not an operating system

411) Data are raw facts and figures

412) Holding of all data and instructions to be processed is one of the functions of

storage unit

413) To select the entire row in Excel, click mouse at row heading

414) Database is known as structured data

415) Normal view and outline view notes pane appears in power point

416) The user protection feature of an operating system is required in multi-user

system only

417) In word, Ctrl + Del combination of keys press to delete an entire word

418) In MS-Word double clicking a word selects the word

419) Word document can be navigated in web layout view

420) In Excel, addressing mode(s) that can be used in a formula is/are only absolute

and relative

421) Note page views can you use to show just the slide and its contents

422) Hardware that adds two numbers is arithmetic logical unit

423) The computer as a machine and all other physical equipment associated with it

are termed as hardware

424) Plotters are very useful in applications such as computer aided design

425) Corel DRAW is a graphic package

426) The print to file option creates .prn file

427) The enhanced keyboard contains 101 keys

428) Data processing cycle consists of input cycle, output cycle and processing cycle

429) Page Setup is not an option of Edit menu

430) Radar chart is used to show a correlation between two data series

431) A computerized business information system includes hardware, software and

data facts

432) Purchase order file is a transaction file

433) A typical computerized business application system will have both master and

transaction file

434) Problem identification is taken first in designing a program

435) The purpose of the EXIT command is to get out of a condition loop

436) Employees details is a master file for the pay roll system

437) A slow memory can be connected to 8085 by using READY

438) A processor needs software interrupt to obtain system services which need

execution of privileged instructions

439) A CPU has two modes- privileged and non-privileged. In order to change the

mode from the privileged to the nonprivileged,

a software interrupt is needed

440) Swap space resides at disk

441) The process of assigning load addressed to the various parts of the program and

adjusting the code and data in the

program to reflect the assigned address is called relocation

442)1 Sector= 4096 bytes

443) Two stacks of size required to implement a queue of size n

444) 1 Floppy = 6, 30,784 bytes or 308 KB

445) Consider a machine with 64 MB physical memory and a 32-bit virtual address

space. If the page size is 4 KB, then

size of the page table is 2 MB

446) Consider a virtual memory system with FIFO page replacement policy. For an

arbitrary page access pattern,

increasing the number of page frames in main memory will always decrease the

number of page faults

447) Consider a scheme R(A, B, C, D) and functional dependencies A->B and C-> D.

Then the decomposition of R into R1

(AB) and R2 (CD) is dependency preserving and lossless join

448) Main memory requires a device driver

449) RAM can be divided into 2 types

450) Two friends suitably arrange 4 blocks of different colors to exchange coded

information between them. 4 bits of

information is one exchanging each time

451) Cache memory is a part of main memory

452) The number 43 in 2’s complement representation is 01010101

453) The 8085 microprocessor responds to the presence of an interrupt by checking

the TRAP pin for ‘high’ status at the

end of each instruction fetch

454) All machinery and apparatus of computer is called hardware

455) The number 1024 bytes is the complement representation of 1 Kilo byte

456) System design specifications do not include blueprint showing the layout of

hardware

457) Web pages are uniquely identified using URL

458) The results of arithmetic and logical operations are stored in an accumulator

459) The input device that is closely related to touch screen is the light pen

500) F2 keys of control center specified below displays data, toggles browse/edit

 

Leave a Comment