Computer Awareness

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114
1).
The performance of a hard drive or other storage device, meaning how long it takes to locate a file is called ?
2).
Alerts are mostly appear in ______? 
3).
Which of the following was used in first generation computers? 
4).
A unit of data storage that equals 2 to the 70th power is called? 
5).
What is used in most programs that is a part of a program and guides the user through certain steps? 
6).
A generic name for Intel processors released after the original 8086 processor is ______? 
7).
A network that is connected to the Internet, but uses encryption to scramble all the data sent through the Internet is called ? 
8).
V-RAM is used for access of the following? 
9).
Panther (10.3), Jaguar (10.2), Puma (10.1), and Cheetah (10.0) are examples of _______? 
10).
Structured Query Language (SQL) is used in the following? 
11).
A file which has not been altered, compressed, or manipulated in any way by the computer is called? 
12).
The word bandwidth is also used to mean ________? 
13).
NetBIOS was introduced in 1983 by which company as an improvement to the standard BIOS used by Windows-based computers? 
14).
Which among the following is not a payment card technology? 
15).
Which among the following can be called an electronic check ? 
16).
Which of the following was used in programming the first computers? 
17).
Any piece of data can be returned in a constant time, regardless of its physical location and whether or not it is related to the previous piece of data using which of the following? 
18).
Which Microsoft-based technology was built to link desktop applications to the World Wide Web? 
19).
What is the name of the digital circuit that performs arithmetic and logical operations in computers? 
20).
What is the full form of ADSL? 
21).
Which among the following key is used for checking grammar and spelling? 
22).
An Autoresponder is a_______on mail server that automatically replies to e-mails? 
23).
DDL is used to define the structure of a database, including the tables, columns, and data types that it contains. Its full form is? 
24).
A DSLAM is a device used by Internet Service Providers (ISPs) to route incoming DSL connections to the Internet. What is its correct full form? 
25).
RUP Stands for “Rational Unified Process.” RUP is a software development process from Rational, a division of _______? 
26).
Which among the following defines web2.0 most precisely? 
27).
Microsoft first introduced an operating environment named Windows in which year? 
28).
32 bit operations were introduced for the first time by Microsoft in ________? 
29).
A GUID is a 128-bit (16 byte) number used by software programs to uniquely identify the location of a data object. What is correct full form? 
30).
Which among the following are not Objects in Access Database? 
31).
Which of the following Key is not found in normal computers / laptops? 
32).
A hybrid computer exhibits the features of ______? 
33).
Structured programming languages such as C, COBOL and FORTRAN were used in which of the following computers? 
34).
Which among the following statement is correct? (More than one options are correct) 
35).
Which of the following are called Knowledge Information processing System? 
36).
Which of the following generation of computers is associated with artificial intelligence? 
37).
The sixth-generation era (sometimes referred to as the 128-bit era) refers to which of the following? 
38).
BSNL, Reliance, Shaw cable, AOL, Tata Indicom all can be kept in which one of the following groups? 
39).
One kilobyte has _____? 
40).
Which among the following is correct about 4GL? 
41).
First microprocessors were used in which of the following? 
42).
Which of the following transforms input data into output data? 
43).
In a computer file systems which among the following is top or first in hierarchy? 
44).
What is HTTP 404? 
45).
Core Banking Solutions are developed to perform__? 
46).
Which among the following is not a security / privacy risk? 
47).
Now a days Vishing has become a criminal practice of using social engineering over which of the following? 
48).
When some unidentified / unknown person / firm sends you mail in a trustworthy /lucrative way asking for sensitive banks and online payment information, this is a case of __? 
49).
Which among the following is a correct definition of “Digital Divide”? 
50).
Which among the following is the most common source of Viruses to the hard disk of your computer? 
51).
What is the fullform of W3C? 
52).
What is the fullform of W3C? 
53).
Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider? 
54).
What is the name of the proposed software application that would allow users of automated teller machines (ATMs) to alert the police of a forced cash withdrawal by entering their personal identification number (PIN) in reverse order? 
55).
Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry? 
56).
ADSL data communications technology uses which of the following for faster data transmission? 
57).
While working on Microsoft Word, which among the following is the command for “Undo”? 
58).
While browsing the internet , which of the following key is used for full screen view? 
59).
Which of the following is a suitable term for any programmable content of a hardware device configurations and data for application-specific integrated circuits (ASICs), programmable logic devices, etc.? 
60).
Most of the internet sites now a days use CSS primarily to enable the separation of document content (written in HTML or a similar markup language) from document presentation, including elements such as the layout, colors, and fonts. What is full form? 
61).
What is the purpose of keeping electronic devices such as computers, televisions, and remote controlled devices on Sleep mode? 
62).
Which of the following device is a volatile storage? 
63).
Which of the following company owns/ uses the Virtual Hard Disk (.vhd) format for Virtual PC? 
64).
What is Office Open XML? 
65).
The term Round-trip delay time, used in telecommunication is replaced in computers with which among the following? 
66).
The One-time password (OTPs) can be obtained by a customer, via which among the following? 
67).
The terms “push and pull services” in context with the Banking are used in which among the following generally? 
68).
What do we call the process of collecting, organizing, storing and otherwise maintaining a complete historical record of programs and other documents used or prepared during the different phases of the system? 
69).
Which among the following is an example of “Card not present transaction” in context with the Credit / Debit Cards? 
70).
As a person working in internet banking environment, why you should be aware of the “Dictionary attack”? 
71).
The terms Good put, Throughput and Maximum throughput are most closely associated with which among the following in computers? 
72).
Which among the following is the time period during which a computer is malfunctioning or not operating correctly due to machine failures? 
73).
What would be the number of bytes, transferred at the rate of 1 Kilobit per second? 
74).
What do we call the automatic execution of high-priority computer programs that have been designed to pre-empt the use of computer resources? 
75).
What is the use of Digitizer as an input device? 
76).
What do we call a storage device where the access time is effectively independent of the location of the data? 
77).
What do we call the pictorial representation that uses predefined symbols to describe either the logic of a computer program or the data flow and processing steps of a system? 
78).
The peak cell rate (PCR), sustainable cell rate (SCR), and maximum burst size (MBS) are used for measurement of ? 
79).
What do we call a CPU that is designed specifically to handle the communications processing task with main purpose is to off-load communications processing task from the host computer so that the host computer can be dedicated for applications and data processing jobs? 
80).
Dynamic Adhoc Wireless Networks (DAWN) usually come under ___? 
81).
Which among the following has been standardized in the IEEE 802.3 specification? 
82).
While browsing internet, what do we call the area of storage that compensates for the different speeds of data flow or timings of events by temporarily holding a block of data that is waiting to be processed? 
83).
Which among the following is a high-level language used to develop software applications in compact, efficient code that can be run on different types of computers with minimal change? 
84).
What do we call an input/output device on a computer, reserved for communication between the computer operator or maintenance engineer and the computer? 
85).
Which among the following is NOT a search engine?
86).
Who is the founder of Wikipedia?
87).
For his major role in the development of computer chip ‘Pentium’, which Indian IT expert is called the ‘Father of Pentium’ ?
88).
Which of the following audio / video formats was developed by Microsoft?
89).
In which year Microsoft was founded ?
90).
”Don’t be evil” is the informal corporate motto of which of the following internet giants?
91).
Which among the following was the first operational packet switching network, and the predecessor of the Internet?
92).
Which of the following blogging platform was first launched by Pyra Labs?
93).
Shiv Nadar is related to which of the following companies?
94).
What was UNIVAC?
95).
Who among the following is known for starting the “Free Software movement” in September 1983 and GNU Project to develop software that would free users from the restrictive licenses imposed by software companies?
96).
"Internet escrow ” is a term most commonly related to which of the following?
97).
Which among the following is the essential character of the ADSL Internet Connections?
98).
Which among the following is used for denoting the detectable movement of a computer mouse?
99).
©Brain also known as the first computer virus for MS-DOS was written by two brothers belonging to which among the following countries?
100).
In computers, what is the function of Kernel?
101).
Which among the following was India’s first Teraflop supercomputer?
102).
In context with Mobile telecommunication, what is the full form of CDMA?
103).
In context with the dotted number format used in the IPv4 , which among the following is NOT possible?
104).
Consider the following:
1. Trojans
2. Adware
3. Trackware
4. Keyloggers In context with the everyday computer applications, which among the above can be classified as Spyware?
105).
Which among the following is NOT a web browser?
106).
Which among the following service does not belong to Google?
107).
In the Windows XP, what does XP stands for?
108).
Symantec is the maker of which among the following popular antivirus software?
109).
In computing, 1 nibble = ?
110).
Who among the following are the Founders of Social Networking Site: “Twitter” ?
111).
In Binary System, the power of _____ is used .
112).
“Macintosh” an Operating System is a product of ?
113).
Which among the following is the correct order in which popular company Apple released them?
114).
News websites deliver customized ‘feeds’ of content to their readers via RSS, which stands for :
1. The performance of a hard drive or other storage device, meaning how long it takes to locate a file is called ?
[A] Response Time
[B] Access Time
[C] Quick Time
[D] None of the above
2. Alerts are mostly appear in ______? 
[A] Check box
[B] Combo box
[C] Dialog box
[D] None of the above
3. Which of the following was used in first generation computers? 
[A] Machine Language
[B] High Language
[C] Assembly Language
[D] None of the above
4. A unit of data storage that equals 2 to the 70th power is called? 
[A] Zebibyte
[B] Yottabite
[C] Yobibite
[D] None of the above
5. What is used in most programs that is a part of a program and guides the user through certain steps? 
[A] Software
[B] Wizard
[C] Wiki
[D] None of the above
6. A generic name for Intel processors released after the original 8086 processor is ______? 
[A] Pentium
[B] x86
[C] Pentium 286
[D] None of these
7. A network that is connected to the Internet, but uses encryption to scramble all the data sent through the Internet is called ? 
[A] My network
[B] Virtual private Network
[C] Social Network
[D] None of the above
8. V-RAM is used for access of the following? 
[A] Video & Graphics
[B] Text & Images
[C] programs
[D] None of the above
9. Panther (10.3), Jaguar (10.2), Puma (10.1), and Cheetah (10.0) are examples of _______? 
[A] Windows OS
[B] Mac OS
[C] Open Operating Systems
[D] None of the above
10. Structured Query Language (SQL) is used in the following? 
[A] Create Databases
[B] Create & Modify Databases
[C] Create, Modify & Query Databases
[D] None of the above
Advertisement

Kindly help us to keep GKToday updated and error free. Use this form to report error or outdated information in questions. We shall rectify asap...