Computer Awareness also known as Computer Aptitude is one of the prominent sections in various recruitment related competitive exams in India. Computer Awareness Important Quiz Practice Sets lists some of the important questions for preparation of Computer Awareness module. The most significant topics to be learnt for Computer Awareness module are as follows:
Q2. A language reflects the way people think mathematically is…..
Q3. A mistake in an algorithm that causes incorrect results is called a….
Q4. A device for changing the connection on a connector to a different configuration is….
Q5. Technique that is used to send more than one call over a single line is
Q6. Which of the following would you find on LinkedIn?
Q7. The method of Internet access that requires a phone line, but offers faster access speeds than dial-up is the…..Connection
Q8. ……is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses.
Q9. A program either talk or music that is made available in digital format for automatic download over the internet is called a…..
Q10. A USB communication device that supports data encryption for secure wireless communication for notebook users is called a…
Q12. The connection between your computer at home and your local ISP is called…..
13. are attempts by individuals to obtain confidential information from you by falsifying their identity through e-mails.
14. ERP is an acronym for….
15. Collecting personal information and effectively posing as another individual is known as the crime of …..
16. The signal that a computer is waiting for a command from the user is….
17. Physical security is concerned with protecting computer hardware from human tampering & natural disasters and security is concerned with protecting software from unauthorized tampering or damage.
18. Which ports connect special types of music instruments to sound cards?
19. Where you are likely to find an embedded operating system?
20. Which of the following places the common data elements in order from smallest to largest?
Q22. Which of the following memory is non-volatile?
Q23. What is embedded system?
Q24. Which device connects a LAN to the Internet ?
Q25. EBCDIC stands for
Q26. The first general purpose electronic digital computer in the world was?
Q27. Signals can be analog or digital and a computer that processes the both type of signals is known as?
Q28. Human beings are referred to as Homo sapiens, which device is called Silico Sapiens?
Q29. EBCDIC can code up to how many different characters?
Q30. Different components of the motherboard of a PC unit are linked together by sets of parallel electrical conducting lines. What are these lines called?
Q32. India’s first supercomputer is
Q33. The metal disks, which are permanently housed in, sealed and contamination free containers are called?
Q34. What was the name of the first commercially available microprocessor chip?
Q35. The first digital computer built with IC chips was known as
Q36. RATS stands for
Q37. The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as
Q38. A computer program that converts an entire program into machine language is called a/an
Q39. A language translator that analyses and executes the source code in-line-by- line manner without looking at the entire program is called a/an
Q40. Who designed the first electronics computer (ENIAC)?
Q42. Computers can be divided into…..major categories.
Q43. SAN stands for
Q44. NAS stands for
Q45. To produce high quality graphics (hardcopy) in color, ……… is used
Q46. Hardware or software designed to guard against unauthorized access to a computer network is known as…..
Q47. The scrambling of code is known as
Q48. A type of message that web servers pass to your web browser when you visit the website
Q49. Software that you can use free of charge for a set period. After that you have to buy it to keep working is known as
Q50. A type of virus (malicious code) that looks for security loopholes in a system and uses that to replicate itself is known as
Q52. Software that monitors your online computer activities is known as
Q53. Software that is made available at no cost and is sometimes used to entice a user to purchase the unbranded version with no advertising.
Q54. Which is used to display one or more web pages within another normal web page?
Q55. What is the main difference between a mainframe and a super computer?
Q56. storage area used to store data to a compensate for the difference in speed at which the different units can handle data is
Q57. Computer is free from tiresome and boardroom. We call it
Q58. Integrated Circuits (ICs) are related to which generation of computers?
Q59. Which type of computers uses the 8-bit code called EBCDIC?
Q60. The ALU of a computer responds to the commands coming from
Q62. A technique used by codes to convert an analog signal into a digital bit stream is known as
Q63. Before a disk drive can access any sector record, a computer program has to provide the record’s disk address. What information does this address specify?
Q64. What is the responsibility of the logical unit in the CPU of a computer?
Q65. The terminal device that functions as a cash register, computer terminal, and OCR reader is the?
Q66. A set of flip flops integrated together is called
Q67. A register organized to allow moving left or right operations is called a
Q68. How many address lines are needed to address each machine location in a 2048 x 4 memory chip?
Q69. Multi user systems provided cost savings for small business because they use a single processing unit to link several
Q70. The difference between memory and storage is that memory is and storage is
Q72. 1 nibble equals to
Q73. The most commonly used standard data code to represent alphabetical, numerical and punctuation characters used in electronic data processing system is called
Q74. The term GIGO (Garbage In Garbage Out) is related to which characteristics of computers?
Q75. Hard disk is coated on both sides with
Q76. The contents of information are stored in
Q77. The programs which are as permanent as hardware and stored in ROM is known as
Q78. Which of the following memories must be refreshed many times per second?
Q79. In which mode, the communication channel is used in both directions at the same time?
Q80. Which of the printers used in conjunction with computers uses dry ink powder?
Q82. Which of these is considered intelligent CASE tool?
Q83. Origin of internet can be tracked from
Q84. is used by public & private enterprises to publish and share financial information with each other and industry analysts across all computer platforms & the Internet.
Q85. System proposal is prepared in …… phase of SDLC.
Q86. A data warehouse
Q87. symbol in DOS commands is used to
Q88. To connect networks of similar protocols, are used
Q89. is one reason for problems of data integrity
Q90. Which of the following is an advantage of mounting an application on the web?
Q92. Which of the following domains is used for non-profit organizations?
Q93. Browsers can be classified into two types. They are
Q94. The displayed data over internet can be classified into two types. They are
Q95. Which is an open source development environment to develop dynamic web pages?
Q96. A protocol that allows a user to log on to a remote computer which is also known as remote login is…..
Q97. A set of rules that enables a user to log on to another computer and transfer information between it & his/ her computer.
Q98. PSTN stands for
Q99. Home Page is also known as
Q100. GPRS stands for
Q102. TCP stands for
Q103. Proprietary Software is also called as
Q104. A product that is owned exclusively by a single company that can only function properly, if it is used with other products owned by the same company?
Q105. Freeware can be classified into four types. It includes
Q106. Which of the following activity can be termed as software piracy?
Q107. Linux is a type of Software
Q108. A coding language that is compatible with windows servers which is used for increased functionality on a website or to work with a database
Q109. A code that represents English characters as numbers and ranging from 0 to 127.
Q110. An email feature, which is used to send a copy of an email to one or many other people at the same time that you are sending it to the main recipient/s is called
Q112. GUI stands for
Q113. A….. is a design tool that graphically shows the logic in a solution algorithm.
Q114. Programs designed to perform specific tasks related to managing computer resources are called
Q115. A file that contains definitions of the paragraph and character styles for your document and all things you customized like toolbars and menus is called a…….
Q116. Programs designed specifically to address general purpose applications & special-purpose applications are called
Q117. A ….. contains buttons & menus that provide quick access to commonly used commands.
Q118. What is the split – MAC Architecture?
Q119. In …..normal form, all non-key fields of data structure are dependent on the whole key.
Q120. Which of the following are tasks that may be completed when configuring your e-mail client?
Q122. Expansion cards are inserted into
Q123. is a communication technology used by some incoming mail servers.
Q124. Which of the following format for storing & backing up computer data on tape that evolved from Digital Audio Tape (DAT) technology?
Q125. The two basic parts of URLs are
Q126. The storage locations in the internal storage of a CPU is called
Q127. The …… database is the most widely used database structure
Q128. Mail from unwanted senders can be blocked by…….
Q129. ATM machines run ……. OS
Q130. Which of the following is possible with open architecture?
Q132. NIC stands for
Q133. Is the Virus that overwrites the files or a few parts being replaced?
Q134. A dynamic website that is normally database driven and which enables the owner/user to manage the content of their own website without needing to know any coding at all is known as
Q135. An Internet service that translates domain names to the IP addresses is called
Q136. A hacker installs malicious code on a personal computer or server. This code then redirects clicks you make on a Web site to another fraudulent Web site without your consent or knowledge. It is known as….
Q137. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
Q138. A type of phishing attack where mobile phone users receive text messages containing a Web site hyperlink is called
Q139. The creation of Internet Protocol (IP) packets with a forged source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system is called …………..
Q140. A malware program that can be used by a black hat cracker to remotely take control of a system for further attacks like spam emails or Denial of Service attacks, without a user’s knowledge is called……
Q142. A type of malicious software that is activated each time your system boots up. This malicious software difficult to detect because they are activated before your system’s Operating System has completely booted up is called
Q143. Spam over instant messenger is called spim while spam over Internet telephony is known as
Q144. The unauthorized activities of malicious software is called
Q145. Unauthorized access to restricted systems or resources is referred as
Q146. Unauthorized access to information by using a terminal that is already logged on with an authorized ID is called
Q147. Modifying data in a Domain Name System (DNS) server so that calls to particular Websites or even entire domains are misdirected for fraudulent purposes is termed as
Q148. Any deliberate damage to operations or equipments is called
Q149. Sending large numbers of unwanted e-mail messages to a single recipient or to a group of such recipients is termed as
Q150. Malicious modification or destruction of data such as changing information on Web sites is called
Q152. Modifying data for fun and profit is defined as
Q153. Internet-mediated attack accomplished by enlisting the services of many compromised systems to launch a denial of service (DoS) is termed as
Q154. Creating a false identity using someone else’s identifying information
Q155. A program or batch file that waits for a specific time before causing damage is……
Q156. A method for exploiting a vulnerability to take control of a system or otherwise compromise it is termed as…….
Q157. The most widely used type of database management system is the
Q158. Which of the following will connect you to the Internet?
Q159. A method in which multiple communication devices are connected to one another efficiently is known as……
Q160. What is considered as the ‘backbone’ of the World Wide Web?
Q162. FPI stands for
Q163. The process of analyzing large data sets in search of new, previously undiscovered relationships is known as:
Q164. Collection of interrelated data and set of program to access them is called
Q165. A repository of data that is designed to serve a particular community of knowledge workers is called
Q166. Keys that are used in combination with some other key, they have been programmed to perform certain tasks is called
Q167. A key that is used to alternate the input mode of a group of keys on a keyboard is known as
Q168. Networking can be classified into two types. It includes
Q169. Which is used to connect a computer to the cabling used in LAN?
Q170. A device which converts data between the analog form used on telephone lines & the digital form used on computers is………
Q172. A device that regenerates the signal transmitted on a cable in a network is called
Q173. A networking device that is used to receive signals from one Computer & transmit them on to other computers in a network is called……..
Q174. Hub can be divided into two types. It includes……
Q175. An intelligent Hub that has the ability to determine the destination of a packet sent across the network is called………
Q176. A most Sophisticated relay device used in a network that can be used to interconnect systems with different protocols, formatting languages and architecture is called………
Q177. CSMA/CD stands for
Q178. A…… is required at each end to absorb the signal so that it does not reflect back across the bus.
Q179. Bus Topologies can be classified into two types. It includes
Q180. A list of rules for transferring data over a network is called?
Q182. A set of stations connected serially by cable is known as
Q183. OSI stands for
Q184. Layer which deals with the transportation of binary data and defines cable & electrical specifications is known as……….
Q185. Layer which converts data frames into bits and also convert bits into frames is known as……….
Q186. Layer which deals with translation of logical & physical addresses & determines route from source to destination & also control network traffic is known as……….
Q187. Layer which manages flow control & ensures reliable delivery of data packets in sequence with no losses or duplications is known as………
Q188. Layer which establishes, maintains & terminates a connection while communicating with other client is known as………
Q189. Layer which translates data format & deals with compression of data and network security is known as………
Q190. Layer which is the user interface to access the network services such as file transfer/ database access is known as………
Q192. ICMP stands for
Q193. IDRP stands for
Q194. RSS Stands for
Q195. What is the full form of UDP?
Q196. An Interface refers to a specification by which programs can communicate with a web server is called
Q197. VoIP stands for
Q198. The two application protocols most commonly associated with
Q199. An attacker outside your network pretends to be a part of your network or legal terminal is called…
Q200. A reliability & flow control technique where the source sends one packet, starts a timer and waits for an acknowledgement before sending a new packet is called
Q202. What is booting?
Q203. What is Warm booting?
Q204. Which of the following is a function of Operating System (OS)? ?
Answer : D
Q205. Which of the following is an example of Single User Operating System? ?
Q206. Which of the following is an example of Multi User Operating System? ?
Q207. What is Multi – Tasking Operating System?
Q208. What is Real Time Operating System (RTOS) ?
Q209. What is Batch Processing Operating System (RTOS)?
Q210. What is Distributed Operating System (RTOS)?
Q212. The program which interprets commands given by the user?
Q213. A system call of OS which is used to create a new process is known as?
Answer : C
Q214. A process which is not executing due to any waiting event is called?
Q215. Which provides an interface between process & OS?
Q216. User Interface can be divided into two types. They are?
Q217. CLI stands for
Q218. In DOS, the DIR command is used
Answer : C
Q219. Which one of the following is an MS-DOS external command?
Q220. Grouping & processing all of a firm’s transactions at one time is called,
Answer : A
Q222. In Windows ME, what does ME stands for?
Q223. There are a total of actions button in PowerPoint.
Answer : A
Q224. Attributes can be defined for
Q225. What is the default size of the data type in MS Access?
Q226. Means that the data contained in a database is accurate & reliable
Q227. The smallest unit of information about a record is called a……
Q228. Which combines efficient implementation techniques that enable them to be used in extremely large database?
Q229. A program that generally has more user-friendly interface than a DBMS is called a
Q230. A collection of conceptual tools for describing data, relationships, semantics & constraints is referred as….
Q232. Dr.EF Codd represented……. rules that a database must obey if it has to be considered truly relational.
Answer : C
Q233. is one reason for problems of data integrity
Q234. Provides total solutions to reduce data redundancy, inconsistency,
Dependence & unauthorized access of data.
Q235. The particular field of a record that uniquely identifies each record is called the
Q236. …are distinct items that don’t have much meaning to you in a given answer
Q237. A collection of related files is called………..
Q238. A logical schema
Answer : A
Q239. In the relational modes, cardinality is termed as
Q240. To locate a data item for storage is
Q242. An entity set that does not have sufficient attributes to form a primary key, is a…..
Q243. A computer checks of username & password for a match before granting
Q244. ….. is a primary key of one file that also appears in another file?
Q245. ……. is an invalid type of database key?
Q246. Key to represent relationship between tables is called
Q247. In ER diagram; relationship type is represented by
Q248. In a relational database, a data structure that organizes the information about a single topic into rows & columns, is….
Answer : D
Q249. Hub is associated with network
Q250. Multiplexing involves…….path and channel
Answer : A
Q252. In OSI architecture, the routing is performed by
Q253. Which of the following is considered a broad band communication channel?
Q254. How many bits are there in the Ethernet address?
Q255. Ethernet, token ring and token bus are types of
Q256. Which of the following items is not used in LANs?
Q257. Which is the name of the network topology in which there are bidirectional links between each possible nodes?
Q258. An alternate name for the completely interconnected network topology is
Answer : A
Q259. Telnet is………based computer protocol
Q260. Through………an administrator or another user can access someone else’s computer remotely.
Q262. The maximum zoom % in MS Power Point is…….
Q263. In Excel, charts are created using which option?
Q264. In order to include picture data type must be?
Q265. A is the term used when a search engine returns a web page that
matches search criteria
Q266. Which is required to create an html document?
Q267. Which of the following will be used if a sender of e-mail wants to bold, italics etc, the text message?
Q268. Which stores information about the user’s web activity?
Q269. Each IP packet must contain
Q270. Vendor-created program modifications are called———
Q272. The of a Threat measures its potential impact on a System
Q273. A digital signature is
Q274. A firewall operated by
Q275. Which one of the following is a cryptographic protocol used to secure http concession?
Q276. Which of the following inputs a computer’s memory, but unlike a virus, it does not replicate itself?
Q277. Which one of the following is a key function of firewall?
Q278. The load instruction is mostly used to designate a transfer from memory to a processor register known as
Q279. The most frequently used instructions of a computer program are likely to be fetched from
Q280. Arithmetic Logic Unit (ALU) and control sections have special purpose locations called
Q282. What are the units used to count the speed of a printer?
Q283. A parallel port is most often used by a
Q284. External devices such as printers, keyboards & modems are known as…….
Q285. You can use the ‘Tab’ key……
Q286. In laser printers, printing is achieved by defecting laser beam on to……..
surface of a drum.
Q287. The rate at which scanning is repeated in a CRT is called…..
Q288. Which is the best position for operating the mouse?
Q289. First computer mouse was built by
Q290. printer cannot print more than one character at a time
Q292. Which of the following memory chip is faster?
Q293. The term refers to data storage systems that make it possible for a
computer or electronic device to store and retrieve data
Q294. Information stored in RAM need to be
Q295. The storage device used to compensate for the difference in rates of flow of data from one device to another is termed as…..
Q296. Floppy disks are organized as
Q 297. ……. is the ability of ‘jump’ directly to the requested data
Q 298. The ….. Is the amount of data that a storage device can move from the storage to the computer per second
Q299. Virtual memory is
Q300.……… acts as a temporary high speed holding area between the memory and the CPU thereby improving processing capabilities