Home
MCQS
UPSC,PCS,CDS,NDA MCQ Quiz Hub
Computer Awareness MCQ Competitive Exam - Sample Test 5
Choose a topic to test your knowledge and improve your UPSC,PCS,CDS,NDA skills
1. ____ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
Nanotechnology
Micro-technology
Computer forensics
Artificial intelligence
2. Which of the following is the correct order of the four major functions of a computer?
Process a Output a Input a Storage
Input a Output Process a Storage
Process a Storage a Input a Output
Input a Process a Output a Storage
3. ______ bits equal one byte.
Eight
Two
One thousand
One million
4. The binary language consists of ____________ digit (s).
8
2
1,000
1
5. A byte can hold one ____________ of data.
bit
binary digit
character
kilobyte
6. ____ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
The platform
The operating system
Application software
The motherboard
7. The operating system is the most common type of ____________ software.
communication
application
system
word-processing software
8. ____ are specially designed computer chips that reside inside other devices; such as your car or your electronic thermostat.
Servers
Embedded computers
Robotic computers
Mainframes
9. The steps and tasks needed to process data; such as responses to questions or clicking an icon; are called:
instructions
the operating system.
application software
the system unit
10. The two broad categories of software are:
word processing and spreadsheet.
transaction and application
Windows and Mac OS
system and application
11. The metal or plastic case that holds all the physical parts of the computer is the:
system unit
CPU
mainframe
platform
12. Programs from the same developer; sold bundled together; that provide better integration and share common features; toolbars and menus are known as....
software suites
integrated software packages
software processing packages
personal information managers
13. A data warehouse is which of the following?
Can be updated by the end users
Contains numerous naming conventions and formats
Organized around important subject areas
Contains only current data
14. __________ servers store and manages files for network users.
Authentication
Main
Web
File
15. All of the following are examples of real security and privacy risks Except _____
hackers
spam
viruses
identify theft
16. _____ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
Data
Sales
Query
(Point-of-sale (POS)
17. The OSI model is divided into _______ processes called layers.
five
six
seven
eight
18. System software is the set of programs that enables your computer’s hardware devices and ______ software to work together.
management
processing
utility
application
19. ____ are specially designed computer chips reside inside other devices; such as your car or your electronic thermostat.
Servers
Embedded computers
Robotic computers
Mainframes
20. The following are all computing devices ; except.........
notebook computers
cellular telephones
digital scanners
personal digital assistants
21. in a ring topology; the computer in possession of the ______ can transmit data
packet
data
access method
token
22. This part of operating system manages the essential peripherals; such as the keyboard; screen ; disk drives; and parallel and serial ports ____
basic input/output system
secondary input/output system
peripheral input/output system
marginal input/output system
23. ____ Viruses are often transmitted by a floppy disk left in the floppy drive
Trojan horse
Boot sector
Script
Logic bomb
24. ____ controls the way in which the computer system functions and provides a me Ans: by which users can interact with the computer.
The platform
Application software
Operating system
The motherboard
25. Servers are computers that provide resources to other computers connected to a ______
mainframe
network
supercomputer
client
26. A goal of data mining includes which of the following?
To explain some observed event or condition
To confirm that data exists
To analyses data for expected relationships
To create a new data warehouse
27. URL stands for ....
Universal Research List
Universal Resource List
Uniform Resource Locator
Uniform Research Locator
28. A database management system (DBMS) is a .....
hardware system used to create; maintain and provide controlled access to a database
hardware system used to create; maintain; and provide uncontrolled access to a database.
software system used to create; maintain; and provide uncontrolled access to a database.
software system used to create; maintain; and provide controlled access to a database.
29. Which of the following is NOT a goal of transaction processing system?
Capture; process and store transactions
Produce a variety of documents related to routine business activities
Reduce manual effort associated with processing business transactions
Produce standard reports used for management decision making
30. A Proxy server is used for which of the following?
To provide security against unauthorized users
To process client requests for web pages
To process client requests for database access
To provide TCP/IP
31. When data changes in multiple lists and all lists are not updated; this causes:
data redundancy
information overload
duplicate data
duplicate data
32. _______ are words that a programming language has set aside for its own use.
Control worlds
Reserved words
Control structures
Reserved keys
33. What is the primary difference between a virus and a worm?
A worm has the ability to self-propagate from an infected user’s computer to other computers
A worm is usually written by a cracker: Script bunnies do not have the skills to develop a worm program
A virus is very harmful to the computers it infects : a worm is not a serious a problem
Anti-virus software is effective in fighting viruses but not worms
34. _____ describe what is database fields.
Structures
Field markers
Field definition
Field names
35. You must install a (n) ____________ on a network if you want to share a broadband Internet connection.
router
modem
node
cable
36. A goal of normalization is to _____
minimize the number of relationships
minimize the number of entities
minimize the number of tables
minimize the number of redundancy
37. Granting an outside organization access to internet web pages is often implemented using a (n) ____
extrane
intranet
internet
hacker
38. Which term identifies a specific computer on the web and the main page of the entire site
URL
Web site address
Hyperlink
Domain name
39. The code that relational database management systems use to perform their database task is referred to as....
QBE
SQL
OLAP
Sequel Server
40. Chip is a common nickname for a (n):
transistor
resistor
integrated circuit
semiconductor
41. The purpose of the primary key in a database is to:
unlock the database
provide a map of the data
uniquely identify a record
establish constraints on database operations.
42. A _________ contains specific rules and words that express the logical steps of an algorithm.
programming language
syntax
programming structure
logic chart
43. The design of the network is called the network:
architecture
server
transmission
type
44. The most frequently used instructions of a computer program are likely to be fetched from:
the hard disk
cache memory
RAM
registers
45. The ____________ contains data descriptions and defines the name; data type; and length of each field in the database.
data dictionary
data table
data record
data field
46. Personal logs or journal entries posted on the Web are known as:
listservs
Webcasts
blogs
subject directories
47. A (n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.
command - based user interface
GUI
system utility
API
Submit