computer awareness
-
తొలి సైబర్ దాడి ఎప్పుడు జరిగింది?
జాతీయ కంప్యూటర్ భద్రతా దినోత్సవాన్ని ప్రతి ఏటా నవంబర్ 30న జరుపుకుంటారు. దీనిని ‘అంతర్జాతీయ సైబర్ సెక్యూరిటీ డే’ అని కూడా అంటారు. సైబర్ బెదిరింపుల నుండి తమ కంప్యూటర్లు, వ్యక్తిగత డేటాను రక్షించుకోవడంపై అవగాహన కల్పించడమే కంప్యూటర్ భద్రతా దినోత్సవ లక్ష్యం. కంప్యూటర్ డే ఎందుకు జరుపుకుంటారు? దీని ప్రాముఖ్యత, చరిత్రకు సంబంధించిన విషయాలు ఇప్పుడు తెలుసుకుందాం.ఇంటర్నెట్, కంప్యూటర్ నెట్వర్క్లు అత్యంత వేగంగా అభివృద్ధి చెందిన 1988లో కంప్యూటర్ సెక్యూరిటీ డే ప్రారంభమైంది. అదేసమయంలో సైబర్ దాడులు, డేటా చోరీ కేసులు వెలుగు చూశాయి. 1988, నవంబర్ 2న కార్నెల్ విశ్వవిద్యాలయంలోని పరిశోధకులు కంప్యూటర్ సిస్టమ్లను ప్రభావితం చేసే రహస్య వైరస్ను గమనించారు. ఇది నాలుగు గంటల్లోనే పలు విశ్వవిద్యాలయ కంప్యూటర్ వ్యవస్థలను ప్రభావితం చేసింది. దీనికి 'మోరిస్ వార్మ్' అని పేరు పెట్టారు. అదే ఏడాది నవంబర్ 14న కార్నెగీ మెల్లన్ యూనివర్సిటీకి చెందిన సాఫ్ట్వేర్ ఇంజనీర్స్ ఇన్స్టిట్యూట్ (ఎస్ఈఐ) కంప్యూటర్ ఎమర్జెన్సీ రెస్పాన్స్ టీమ్ (సీఈఆర్టీ)ని ఏర్పాటు చేసింది. అలాగే కంప్యూటర్ భద్రతపై ప్రజలకు అవగాహన కల్పించేందుకు నవంబర్ 30ని నేషనల్ కంప్యూటర్ సెక్యూరిటీ డేగా జరుపుకోవాలని నిర్ణయించారు.కంప్యూటర్ సెక్యూరిటీ డే మనకు సైబర్ భద్రతను సీరియస్గా పరిగణించాలని గుర్తు చేస్తుంది. ఆన్లైన్ డేటాను సురక్షితంగా ఉంచడం ప్రతి వ్యక్తి , సంస్థ బాధ్యత. కంప్యూటర్ సెక్యూరిటీ కోసం గుర్తుంచుకోవాల్సిన కొన్ని విషయాలుసురక్షిత పాస్వర్డ్లు: బలమైన, అసాధారణమైన పాస్వర్డ్లను ఉపయోగించాలివైరస్, మాల్వేర్ నుంచి రక్షణ: ఉత్తమ యాంటీవైరస్ సాఫ్ట్వేర్ను ఉపయోగించాలి. దానిని క్రమం తప్పకుండా నవీకరించాలి.డేటా బ్యాకప్: ముఖ్యమైన డేటాను బ్యాకప్ చేయడం తప్పనిసరి.నెట్వర్క్ భద్రత: సురక్షిత నెట్వర్క్ కనెక్షన్, ఫైర్వాల్ని ఉపయోగించాలి.సాఫ్ట్వేర్ అప్డేట్: తాజా భద్రతా ప్యాచ్లతో అన్ని సాఫ్ట్వేర్లను అప్డేట్ చేస్తుండాలి. ఇది కూడా చదవండి: మహా కుంభమేళాకు ఐఆర్సీటీసీ ప్రత్యేక ఏర్పాట్లు.. టిక్కెట్ల బుకింగ్ షురూ -
కంప్యూటర్ అవేర్నెస్
1. Which of the following is an electronic device to read printed barcodes? a) Barcode Reader b) Barcode Scanner c) Barcode Converter d) Both a and b e) None of these 2. The simultaneous processing of two or more programs is usually referred to as? a) Multiprogramming b) Multi Tasking c) Time sharing d) Multi processing e) None of these 3. ISDN stands for? a) Integrated Server Dialing Network b) Integrated Services Digital Network c) International Subscriber Dialing Network d) Integrated Server Digital Network e) None of these 4. Getting an instruction from the main memory to the CPU, in computer terminology, is referred to as? a) Getting b) Gathering c) Fetching d) Framing e) Downloading 5. CAN is the acronym for? a) Computer Address Networking b) Campus Area Network c) Computer Aided Networking d) Common Area Network e) None of these 6. Which of the following term is used to describe the window that is currently being used? a) Web window b) Display Area c) Word pad window d) Active window e) Monitor 7. Sending data from one place to another by electronic means is usually referred to as? a) Internet b) Data Transmission c) Data Storage d) E-mail e) Distributed processing 8. DSL is an example of? a) Wireless b) Broadband c) Network d) Slow e) None of these 9. Which of the following is/are the features of Unix Operating System? a) Multiuser b) Time-sharing c) Multitasking d) All the above e) None of the above 10. Which of the following is true about name box in excel? a) It appears at the left side of the formula bar b) It appears below the menu bar c) It shows the locations of the active cell d) Both a and c e) both b and c 11. The rules that govern data communication is called: a) Virtual Dragon b) Protocol c) Multitasking d) Packet e) None of these 12. Which of the following is not a Network Topology? a) Bus b) Ring c) Star d) Tree e) Packet 13. Find the odd one out? a) PROM b) EPROM c) CDROM d) ROM e) None of these 14. Which of the following is not search engine? a) Bing b) MSN c) Google d) Yahoo e) Mosaic 15. Which of the following displays the buttons for changing text style, alignment and size? a) Standard Toolbar b) Status bar c) Drawing Toolbar d) Formatting Toolbar e) Task bar 16. Which of the following is the keyboard shortcut for spell check in MS-Word ? a) F2 b) F3 c) F5 d) F6 e) F7 17. How many bits does IPv6 address consists of ? a) 32 b) 64 c) 128 d) 256 e) 512 18. Anil keys in "Alt+F4" in order to turn-off his computer. Anil can't see which of the following in that dialogue box ? a) Turn off b) Restart c) Switch user d) Cancel e) Stand by 19. Which of the following logic circuit can be used to add more than two binary digits? a) Half adder b) Serial adder c) Subtracter d) Full adder e) Parallel adder 20. Find the odd one out? a) Operating System b) Interpreter c) Compiler d) Assembler e) None of these 21. Creating a single cell by combining two or more selected cells is usually referred to as? a) Formatting b) Merging c) Embedding d) Splitting e) None of these 22. Network Interface card is housed in? a) Memory b) CPU c) Motherboard d) RAM e) Hard Disk 23. Which of the following transmission mode is used for data communication over telephone lines? a) Synchronous b) Parallel c) Asynchronous d) Serial e) Dual 24. Which of the following is the minimum zoom percentage supported by MS Word? a) 10% b) 15% c) 25% d) 4% e) None of these 25. In MS Word, the function that corrects text as you type is referred to as? a) Auto Summarize b) Auto Insert c) Auto Correct d) Track Changes e) None of these 26. Which of the following is a small pen-shaped instrument that is used to input commands to a computer screen or a mobile ? a) Mouse b) Touchpad c) Stylus d) Touch Screen e) Graphic Labels 27. Which of the following is true about Wi-Fi ? a) It is a type of computer b) It is a type of network cable c) It is a type of website d) It is a set of popular technologies and standards for wireless computer and networking e) It is a set of computer programs that help people make money on internet 28. An IP address is a numeric value that identifies? a) The physical location of computer b) The user id of the computer c) The manufacturer of the computer d) A network adapter to other devices on the network e) Other websites in www. 29. Which of the following is needed for uploading and downloading ? a) FTP b) HTTP c) TCP d) IP e) HTML 30. Which of the following is a non volatile memory? a) RAM b) MOS c) ROM d) MSI e) SSI 31. The total number of processes that complete their execution per unit time is referred to as? a) Access time b) Throughput c) Latency Time d) Waiting Time e) All the above 32. Which of the following is true about dial-up internet access ? a) It utilizes broadband technology b) It utilizes existing telephone service c) It uses a router for security d) Modem speed is high e) None of the above 33. PDA is the acronym for? a) Portable Digital Assistant b) Personal Digital Assistant c) Personal Duplex Assistant d) Portable Duplex Assistant e) Public Display of Affection 34. Compiler creates? a) A program Specification b) Algorithm c) An Executable Program d) A Subroutine e) None of these 35. Moving processes between main memory and disk is called? a) Caching b) Swapping c) Spooling d) Transferring e) Scheduling 36. Which of the following is designed to perform a computer system's routine house-keeping functions? a) Operating System b) Interpreter System c) Compiler d) Utility e) Microprocessor 37. In OSI model, which layer works as an interface between the user and the network? a) Transport Layer b) Data-link layer c) Network Layer d) Application Layer e) None of these 38. Which of the following is not one of the four major data processing functions of a computer? a) Gathering Data b) Processing data into information c) Analysing the data or information d) Storing data or information e) None of these 39. Deleted data remains on a disk until? a) The data is overwritten b) The recycle bin is emptied c) A file compression utility is used d) The disk is scanned e) None of these 40. How many types of views are present in Power point? a) 3 b) 4 c) 5 d) 6 e) None of these 41. Which of the following is not a mode in starting windows? a) Command Prompt b) Safe Mode c) Normal Mode d) Turbo Mode e) None of these 42. Which of the following process rearranges file fragments into contiguous files? a) Folder folding b) Defragmentation c) Unfragging d) Disk scanning e) None of these 43. Which of the following server stores and manages files for network users? a) Authorization Server b) Main Server c) Web Server d) File Server e) None of these Answers 1. d 2. d 3. b 4. c 5. b 6. d 7. b 8. b 9. d 10. d 11. b 12. e 13. c 14. e 15. d 16. e 17. c 18. c 19. d 20. a 21. b 22. c 23. d 24. a 25. c 26. c 27. d 28. d 29. a 30. c 31. b 32. b 33. b 34. c 35. b 36. d 37. d 38. c 39. b 40. b 41. d 42. b 43. d. -
కంప్యూటర్ అవగాహన
1. A mistake in an algorithm that cause incorrect results is called? a) Logical error b) Syntax error c) Compiler error d) Machine error e) Procedural error 2. What is URL? a) A computer software program b) A type of programming object c) The address of a document or page on the World Wide Web d) An acronym for Unlimited Resources for learning e) A piece of hardware 3. Which of the following would you find on LinkedIn? a) Games b) Connections c) Chat d) Applications e) None of these 4. Which of the following is the first step in seizing a window? a) Point to the title bar b) Pull down the view menu to display the toolbar c) Point to any corner or border d) Pull down the view menu and change to large icons e) None of these 5. _____ is a technique that is used to send more than one call over a single line? a) Digital transmission b) Infrared transmission c) Digitizing d) Streaming e) Multiplexing 6. Which of these is a point-and-draw device? a) Mouse b) Scanner c) Printer d) CD-ROM e) Key board 7. The letter and number of the intersecting column and row is the? a) Cell location b) Cell position c) Cell address d) Cell coordinates e) Cell contents 8. Which of the following is not a means of personal communication on the internet? a) Chat b) Instant messaging c) Instanotes d) Electronic mail e) None of these 9. NIC is the acronym for? a) Network Integrated Card b) Network Intranet Card c) Network Interface Card d) No Internet Connection e) None of the above 10. In Power Point, the Header & Footer button can be found on the Insert tab in which group? a) Object group b) Illustrations group c) Text group d) Tables group e) None of these 11. _____ is a set of computer programs used on a computer to help perform tasks? a) An instruction b) Software c) Memory d) A processor e) None of these 12. A string of eight 0s and 1s is called a? a) Megabyte b) Byte c) Kilobyte d) Giga byte e) Kilo bite 13. Which of the following is not a threat to security and privacy? a) Hackers b) Spam c) Viruses d) Identify theft e) None of these 14. A collection of programs that controls how the computer system runs and processes information is called? a) Operating system b) Computer c) office d) Compiler e) Interpreter 15. Who among the following is the father of super computer? a) Charles Babbage b) Billgates c) Steve Jobs d) Jeff Stronstrup e) Seymour Cray 16. What do you understand by the term 'Booting'? a) The process of starting the computer from the power-off position b) Connecting the computer to the electric switch c) Increasing the memory of the computer d) The process of shut down the computer e) None of these 17. Housing all hardware, software, Storage and processing in one site location is called? a) Time sharing b) A distributed system c) Centralized processing d) A host computer e) None of these 18. _____ process rearranges file fragments into contiguous files? a) Folder folding b) Defragmentation c) Unflagging d) Disk scanning e) File filling 19. _____ means that the data contained in a database is accurate and reliable? a) Data redundancy b) Data integrity c) Data reliability d) Data consistency e) None of these 20. _____ is the process of carrying out commands? a) Fetching b) Sorting c) Executing d) Decoding e) None of these 21. In Windows environment Ctrl + Z is used to? a) Copy b) Paste c) Cut d) Undo e) None of these 22. PCB is the acronym for? a) Processing Cache Block b) Pixel Control Block c) Process Control Block d) Program Control Block e) None of these 23. A hybrid computer uses a _____ to convert digital signals from a computer into analog signals? a) Modem b) Modulator c) Demodulator d) Decoder e) None of these 24. Hyperlinks cannot be? a) Of special shapes like banners b) Pictures c) Text d) Drawing objects like ovals e) All of the above can be hyperlinks 25. Network components are connected in a linear sequence in _____ topology? a) Star b) Ring c) Bus d) Mesh e) Mixed 26. A directory within the directory? a) Mini Directory b) Junior Directory c) Part Directory d) Sub Directory e) None of these 27. LED stands for? a) Laser Emitting Diode b) Light Emitting Diode c) Liquid Emitting Diode d) All e) None of these 28. Which of the following is the mail client which works without internet? a) MS Access b) MS outlook c) MS InfoPath d) MS publisher e) Both (2) and (3) 29. WI-FI Stands for? a) Wireless facility b) Wireless network c) Wireless fidelity d) Features of wireless e) None of these 30. JVM converts source code in to _____ ? a) Source code b) Object code c) Byte code d) All e) None of these 31. A table is a collection of _____ ? a) Files b) Worksheets c) Fields d) Records e) None of these 32. User actions such as key strokes or mouse click are referred to as: a) Interrupts b) Tasks c) Events d) Processes e) None of these 33. What is the extension flash file format? a) .swf b) .flm c) .mfh d) .fls e) None of these 34. GSM stands for _____? a) General Solutions of Multiple Access b) Global system for mobile communication c) Generation Subscriber Machine d) Gopher Started for machine communication e) None of these 35. Which of the following is not relate to MS-Excel? a) Formula b) Function c) Table d) Frame e) None of these 36. Which of the following is the Short cut to open New Slide _____ ? a) Ctrl + M b) Ctrl + N c) Ctrl + O d) Ctrl + F e) Ctrl + A 37. _____ is the security against viruses, which monitors both incoming and outgoing traffic? a) Encryption b) Spanning c) Firewall d) Worms e) None of these 38. 'Web Page Spoofing' is sometimes referred to as:? a) Spyware b) Antivirus c) Phishing d) Browsing e) None of these 39. The 'Resolution power' of a printer indicates its _____ : a) Speed b) Quality c) Model d) All of these e) None of these 40. The technique that extends storage capacity of main memory beyond the actual size of the main memory is called? a) Multitasking b) multiprocessing c) Virtual storage d) Cache storage e) Switching 41. Internet chatting is an example? a) Simplex Communication b) Duplex Communication c) Half Duplex d) All of the above e) None of these 42. What is the name of the logic circuit which can add two binary digits? a) Half Adder b) Full Adder c) Parallel Adder d) Serial Adder e) None of these 43. Which of the following best defines access time? a) Interval during which a program is executed by the computer b) Time taken for a computer device to transfer information c) Time taken for a device to transfer information from its storage system to the memory d) Duration for which a user is allowed to access the computer facilities e) None of the above 44. Who among the following developed yahoo? a) Dennis Ritchie b) David File & Jerry Yang c) Steve Kaze d) Robert Kahn e) Larry page & Sergy Brin 45. Wireless communication is an example of which of the following mode of transmission? a) Simplex b) Half duplex c) Duplex d) Both b and c e) None of the above 46. Which of the following is not associated with hard disk technology? a) SATA b) IDE c) UDMA d) ATA e) WAP 47. Which of the following best defines Operating System? a) An interface between hardware and software b) An interface between hardware and application program c) An interface between user and an application program d) All of the above e) None of the above 48. Which of the following is merely an output device and has no processing capabilities? a) Personal Computer b) Node c) Dumb Terminal d) Server e) None of the above 49. If the data is to be stored into a secondary storage medium it must be: a) Partitioned b) Defragmented c) Formatted d) Labeled e) None of the above 50. In MS Word, a redline under a word indicates a) Grammar mistake b) Spelling Mistake c) No Mistakes d) Virus Infection e) None of the above Answers 1. a 2. c 3. b 4. a 5. e 6. a 7. c 8. c 9. c 10. c 11. b 12. b 13. b 14. a 15. e 16. a 17. c 18. b 19. b 20. c 21. d 22. c 23. a 24. e 25. c 26. d 27. b 28. b 29. c 30. c 31. d 32. c 33. a 34. b 35. d 36. a 37. c 38. c 39. b 40. c 41. b 42. a 43. c 44. b 45. b 46. e 47. d 48. c 49. c 50. b -
కంప్యూటర్ అవేర్నెస్
1. Which of the following is not shareware software? a) Cute Ftp b) Get Right c) Win Zip d) MSN Messenger e) None of these 2. The term "gigabyte" refers to? a) 1024 bytes b) 1024 kilobytes c) 1024 megabytes d) 1024 gigabytes e) None of these 3. A program written in a high-level language is a? a) Objective program b) Source program c) Compiled Program d) All of the above e) None of these 4. Which of the following is represented by a cluster in a Hard disk? a) Total numbers of tracks b) Group of Tracks c) Group of Rows d) All of the above e) None of the above 5. Unix Operating system was developed by? a) Walter Baatain b) John Burdeen c) Ken Thompson d) All the above e) None of these 6. Which of the following is a graphics solution for word processors? a) Clipart b) Word art c) Drop cap d) All the above e) None of these 7. A program for viewing web pages is called? a) Hardware b) Software c) Storage d) Browser e) None of These 8. What does SNMP Stands for? a) Simple Network Mail Protocol b) Single Network Mail Protocol c) Single Network Message Protocol d) Simple Network Message Protocol e) None of these 9. What is Firmware? a) A program Started in RAM b) A Program started in a file c) A program started in Boot sector d) A program Started in ROM e) None of these 10. To insert a new slide in the current presentation, we can choose? a) Ctrl+M b) Ctrl+N c) Ctrl+O d) Ctrl+F e) None of these 11. An Internet connection requires which of the following? a) a personal computer b) a modem c) a dial-up telephone line d) a software to operate e) All the above 12. ICMP stands for? a) Intranet Control Message Protocol b) Internet Control Message Protocol c) Information Control Message Protocol d) Internet communication message protocol e) None of these 13. Which of the following device interconnects two or more networks, enabling data transfer to be made between them? a) Plotter b) Joystick c) Gateway d) Path e) None of these 14. Which common technique attempts to save time and energy by reducing redundant work in object-oriented programming? a) Reducing lines of programming b) Reuse of code c) Reduce size of systems being developed d) Merging different systems together e) None of these 15. Dot matrix and band printers are _____ printers? a) Ink jet b) Impact c) laser d) thermal e) None of these 16. The topology with highest reliability is? a) Bus b) Ring c) Tree d) Mesh e) Star 17. Verification of a login name and password is knows as? a) Configuration b) Accessibility c) Authentication d) Logging in e) None of these 18. The 16-bit microprocessor means that it has? a) 16 address lines b) 16 Buses c) 16 data lines d) 16 routers e) None of these 19. Which of the following is NOT a goal of Transaction Processing System? a) Capture, process and store transactions b) Produce a variety of documents related to routine business activities c) Reduce manual effort associated with processing d) Produce standard reports used for management decision making e) None of these 20. Which of the following is a program that works like a calculator for keeping track of money and making budgets? a) Calculator b) Spreadsheet c) Budgeter d) Financier e) None of these 21. The process by which a computer receives information from a server on the internet is known as? a) Pulling b) Pushing c) Downloading d) transferring e) None of these 22. Which of the following is NOT a common feature of software application? a) Menu b) Windows c) Help d) Search e) None of the above 23. Selecting landscape changes our page from? a) a wide to tall orientation b) a tall to wide orientation c) a normal font size to a condensed one d) a condensed font size to a normal one e) None of the above 24. Unsolicited commercial E-mails is commonly Known as? a) Junk b) Hypertext c) Spam d) Hoaxes e) All of the above 25. When a computer is attacked by a virus it cannot lead to ? a) Disk Crash b) Motherboard Crash c) Corruption of a program d) Deletion of files e) None of these 26. Which of the following is another name for a preprogrammed formula in Excel? a) Range b) Graph c) Function d) Cell e) None of these 27. The name for the way that computers manipulate data into information is called? a) programming b) processing c) storing d) organizing e) None of these 28. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of? a) eight bytes b) eight kilobytes c) eight characters d) eight bits e) None of these 29. The components that process data are located in the? a) Input devices b) output devices c) System unit d) Storage component e) None of these 30. The keyboard shortcut to centralize the selected text in word is? a) Ctrl+F b) Alt+C c) Ctrl+C d) Ctrl+E e) there is no short key for this operation 31. A touchpad responds to? a) Light b) Pressure c) Clicking d) The sense of from fingertips e) None of these 32. Which command is used to sea-rch all the text files in any drive? a) file.txt b) .txt c) .jpg d) file1.txt e) None of these 33. In a ring topology, the computer in possession of the _____ can transmit data? a) packet b) data c) access method d) token e) None of these 34. A database management system (DBMS) is a? a) Hardware system used to create, maintain and provide controlled access to a database b) Hardware system used to create, maintain and provide un-controlled access to a database c) Software system used to create, maintain and provide un-controlled access to a database d) Software system used to create, maintain and provide controlled access to a database e) None of these 35. Bandwidth refers to? a) the cost of the cable required to implemented a WAN b) the cost of the cable required to implemented a LAN c) the amount of information a peer-to-peer network can store d) the amount of information can transfer in a communication medium in a given time e) None of these 36. Which term identifies a specific computer on the web and the main page of the entire site? a) URL b) Web site address c) Hyperlink d) Domain name e) None of these 37. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as? a) spyware b) Hardware c) spam d) Malware e) None of these 38. Human beings are referred to as Homo Sapiens. Which of the following is referred to as Silico Sapiens? a) Monitor b) Hardware c) Robot d) Computer e) All the above 39. Which of the following is not a form of Biometrics? a) fingerprint b) password c) retina scan d) breath scan e) None of these 40. What type of computer could be found in a digital watch? a) Mainframe computer b) Supercomputer c) Embedded computer d) Notebook computer e) None of these 41. Virtual memory is? a) memory on the hard disk that the CPU uses as extended RAM b) Only necessary if you do not have any RAM in your computer c) a backup device for floppy disks d) Both 1 and 3 e) None of these 42. Servers are those computers which provide resources to other computers connected by? a) Network b) Main frame c) Super computer d) Client e) None of these Answers 1) d 2) c 3) b 4) b 5) c 6) a 7) d 8) d 9) d 10) a 11) e 12) b 13) c 14) b 15) b 16) d 17) c 18) c 19) d 20) b 21) c 22) b 23) b 24) c 25) b 26) c 27) b 28) d 29) c 30) d 31) b 32) b 33) d 34) d 35) d 36) a 37) d 38) d 39) d 40) c 41) a 42) a -
కంప్యూటర్ అవగాహన
1. The advantage of LAN is? a) Sharing peripherals b) Backing up your data c) Saving all your data d) Accessing the web e) Automatic printing of data 2. Of the 5 words listed below, which one is the odd one out? a) Application b) Peripherals c) Programs d) Software e) Operating system 3. What type of device is a computer printer? a) Input b) Input / output c) Software d) Storage e) Output 4. What is the biggest number you can get with 8 bits? a) 256 b) 128 c) 1000 d) 255 e) 1024 5. What type of device is a digital camera? a) Input b) Output c) Software d) Storage e) Input /output 6. What is the mailing list? a) Collection of e - mail addresses b) Collection of files c) Collection of folders d) Collection of data e) Collection of incidence 7. What type of keys are "ctrl" and "shift"? a) Adjustment b) Function c) Modifier d) Alphanumeric e) None of these 8. The following is an example of standard file format for text files? a) JPEG(.jpg) b) Bitmap (.bmp) c) Word (.doc) d) Text (.txt) e) .xis 9. Which of the following devices was used in the computer of first generation? a) Integrated circuit b) Processor c) Microprocessor d) vacuum tubes e) none of these 10. Which part of hardware compensates the difference of speeds of CPU and peripherals? a) scanner b) printer c) video card d) mother board e) interface 11. Which of the following computers is designed to do some specialized work? a) mainframe computer b) special purpose computer c) portable computer d) super computer e) none of these 12. Which of the following can be considered as portable computer? a) mini computer b) mainframe computer c) desktop d) workstation e) PDA 13. Print preview is useful to? a) colour the document b) save the document c) delete the document d) copy the document e) view how the document will appear when printed. 14. Which of the following statements is true about RAM? a) it retains data when pc is turned off b) this is a type of read and write memory c) it contains start - up instructions d) this is a peripheral e) its remaining is 'Read Access Memory' 15. Full form of MB is? a) micro byte b) mega byte c) mini byte d) milli byte e) midi byte 16. Choose the fastest memory? a) hard disk b) DVD ROMs c) cache memory d) static memory e) none of these 17. Which memory is optional to operate the computer system? a) RAM b) ROM c) cash d) secondary memory e) RAM and ROM 18. Translator program used in assembly language is called? a) complier b) interpreter c) translation d) translator e) assembler 19. Which is that part of CPU which coordinates with all other parts of the computer? a) mother board b) coordination board c) control unit d) arithmetic logic unit e) memory 20. Which is that high speed memory that coordinates with the speed gap between processor and main memory? a) cache b) PROM c) EPROM d) SRAM e) none of these 21. A device that connects to a network without the use of cables is said to be? a) distributed b) free c) centralized d) open source e) none of these 22. Codes consisting of lines of varying widths or lengths that are computer readable are known as? a) an ASCII code b) a magnetic tape c) a bar code d) an OCR scanner e) None of these 23. Part number, part description, and number of parts ordered are examples of? a) control b) output c) processing d) feedback e) input 24. Sequential access is formed in? a) hard disk b) memory card c) pen drive d) cassettes e) none of these 25. Why it is unethical to share copyright file with your friends? a) it is not unethical because it is legal b) it is unethical because the files are being given for free c) sharing copyrighted files without permission breaks copyright laws d) it is not unethical because the files are being given for free e) it is not unethical - anyone can access a computer 26. Uniform resource location has ____ part(s)? a) two b) three c) one d) four e) none of these 27. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is? a) memory - only b) write - only c) once - only d) run - only e) read - only 28. Which of the following displays the contents of the active cell in Excel? a) name box b) row heading c) formulabar d) taskpane e) none of these 29. in word you can force a page break? a) by positioning your cursor at the appropriate place and pressing the F1 key b) by positioning your cursor at the appropriate place and pressing Ctrl + Enter c) by using the insert/ section break d) by changing the font size of your document e) none of these 30. grouping and processing all of a firm's transactions at one time is called? a) a database management system b) batch processing c) a real - time system d) an on line system e) none of these 31. A __ is term used when a search engine returns a web page that matches the search criteria? a) blog b) hit c) link d) view e) success 32. Web address is a unique address to identify ____ on web? a) browser b) link c) PDA d) website e) none of these 33. IBM stands for? a) Internal Business Management b) International business management c) international business machines d) internal business machines e) none of these 34. The alerting of data so that it is not usable unless the changes are undone is? a) biometrics b) compression c) encryption d) ergonomics e) none of these 35. Which of the following describes database fields? a) structures b) field markers c) filed definition d) field names e) none of these 36. The term "hyper text" means? a) non - sequential writing b) hyper media c) blinking text d) text with heavy formatting e) none 37. A database management system (DBMS) is a? a) hardware system used to create, maintain and provide controlled access to a database b) hardware system used to create, maintain and provide uncontrolled access to a database c) software system used to create, maintain and provide uncontrolled access to a database d) software system used to create, maintain and provide controlled access to a database e) none of these 38. VIRUS stands for? a) Vital Information Resourse Under Siege b) Vital Information Reason Under Siege c) Vital Information Resourse Under System d) Virus Information Resourse Under Siege e) none of these 39. What is the objective of UPS? a) used for storage b) to increase the speed of a computer c) providing backup power d) all of these e) none of these 40. 'Zipping' a file means? a) encrypting the message b) compressing the message c) transfer the message d) all of the these e) none of these Key 1) a; 2) b; 3) e; 4) d; 5) e; 6) a; 7) c; 8) d; 9) d; 10) e; 11) b; 12) e; 13) c; 14) b; 15) b; 16) c; 17) d; 18) e; 19) c; 20) a; 21) e; 22) c; 23) e; 24) a; 25) c; 26) c; 27) e; 28) c; 29) b; 30) b; 31) b; 32) d; 33) c; 34) c; 35) c; 36) e; 37) d; 38) a; 39) c; 40) b. -
కంప్యూటర్ అవగాహన
1. The primary purpose of this type of software is to create text-based documents? a) Spread sheet b) Presentation c) Word processing d) Web development e) None of these 2. BASIC, ALGOL and COBAL are the examples of ? a) High level Language b) Low level language c) Middle level language d) All the above e) None of these 3. WAV, WMA and AIFF are examples of? a) Encoder programs b) Audio file formats c) Text file formats d) Audio editing software e) None of these 4. IP address means? a) Internet protocol b) Internal power c) Intranet protocol d) Internal protocol e) None of these 5. Which of the following is/are an interpreted language(s)? a) C b) C++ c) Java d) Visual Basic e) All the above 6. The OSI model Consists of ______ Layers? a) Five b) Six c) Seven d) Eight e) None of these 7. NIC stands for? a) Network interface card b) Network internal card c) Network internet client d) Network input card e) None of these 8. Fax is an example of ____ Channel? a) Full duplex b) Half-duplex c) Simplex d) Both a & b e) None of these 9. A _____ is anything that can cause harm? a) Vulnerability b) Phish c) Threat d) Spoof e) None of these 10. To open an existing workbook, you can click the open button on the _____toolbar? a) Drawing b) Formatting c) Forms d) Standard e) None of these 11. Which of the following abbreviations are mismatched? a) EPROM-Erasable Programmable Read Only memory b) FAT- File Allocation Table c) ICMP- Internet Control Message Protocol d) LCD- Liquid Crystal Display e) None of these 12. Which of the following is NOT a Microsoft Internet tool or technology? a) Dreamweaver b) Silverlight c) Internet Explorer d) Expression Web e) None of these 13. A Proxy server is used for which of the following? a) To provide security against unauthorized users b) To process client requests for web pages c) To Process client requests for database access d) To Provide TCP/IP e) None of these 14. The ____ tells the computer how to use its components? a) Utility b) Network c) Operating system d) Application program e) None of these 15. In the language of computer profession, one thousand position of main storage is represented with the letter? a) K b) L c) M d) C e) None of these 16. In MS Excel "Ctrl + space" does the following operation? a) Selects the entire row b) Selects the entire column c) Selects the entire sheet d) Selects the cell e) None of these 17. Which storage device is mounted on 'reels'? a) Floppy Disk b) Hard Disk c) Magnetic Tapes d) CDROM e) None of these 18. Programs that automatically submit your search request to several search engines simultaneously are called? a) Meta search engines b) Inclusive search engines c) Spiders d) Hits e) None of these 19. ____ cash is the internet's equivalent to traditional cash? a) Universal b) Web c) Premium d) Digital e) None of these 20. This type of software works with end users, applications software, and computer hardware to handle the majority of technical details? a) Application software b) Communications software c) System software d) Web software e) None of these 21. In MS Word, From which menu you can insert Header and Footer? a) Insert menu b) View menu c) Format menu d) Tools menu e) None of these 22. A file that includes predefined settings that can be used to create many common types of presentations is called a? a) Pattern b) Model c) Template d) Blueprint e) None of these 23. The most important or powerful computer in a typical network? a) Desktop b) Network client c) Network server d) Network stations e) None of these 24. Network operating systems from Novell? a) NOS b) UNIX c) Netware d) Solairs e) None of these 25. Older networks often use another type of cable, called____? a) Twisted -pair cable b) Unshielded twisted-pair cable c) Coaxial cable d) Optical fiber e) None of these 26. LPT stands for? a) Laser printer b) Link printer c) Line printer d) Line port e) None of these 27. IP Addresses has ____bytes? a) 2 b) 4 c)8 d) 16 e) None of these 28. The rules of a language are called its___? a) Structure b) Code c) Syntax d) Rigidity e) None of these 29. MTBF means a) Mean Time Before Failure b) Master Time Buffer Feature c) Most Treated Buffer time d) Master Test Board Feature e) None of these 30. Compilers are? a) Both OS - and hardware- dependent b) Only OS- dependent c) Only hardware dependent d) All the above e) None of these 31. This technology is used to convert XML into HTML? a) CSS b) XHTML c) PHP d) XSL e) None of these 32. The most common binary code used today is a) BCD b) Unicode c) EBCDIC d) ASCII e) Gray code 33. Magnetic strip reader is a type of _____ device? a) Input b) Output c) Input/output d) Storage e) None of these 34. Which of the following is NOT a type of Broadband Internet connection? a) Cable b) DSL c) Dial-up d) Satellite e) None of these 35. To print an individual item in a file immediately click a) SHIFT+P b) CTRL+P c) ALT+P d) ESC+P e) None of these 36. Letters, memos, term papers, reports, and contracts are all example of? a) Models b) Spread sheet c) Documents d) Menus e) None of these 37. These programs allow parents as well as organizations to block out selected sites and set time limits on internet access? a) Plug -ins b) Filters c) FTP d) DSL e) None of these 38. Picasa is owned by which company? a) Yahoo b) Google c) Microsoft d) Apple e) HP 39. Which of the following is not a type of computer error? a) Compilation error b) Hang c) Abnormal end d) Division by zero e) Restart 40. India's first super computer was _____? a) PARAM 8000 b) kcomputer c) Dell 380 d) Sugar cube sized e) NVIDIA Key 1) c; 2) b; 3) b; 4) a; 5) e; 6) c; 7) a; 8) b; 9) c; 10) d; 11) e; 12) a; 13) a; 14) c; 15) a; 16) b; 17) c; 18) a; 19) d; 20) c; 21) a; 22) c; 23) c; 24) c; 25) c; 26) c; 27) b; 28) c; 29) a; 30) a; 31) d; 32) d; 33) a; 34) c; 35) b; 36) c; 37) b; 38) b; 39) e; 40) a: -
COMPUTER AWARENESS
1. Random Access Memory or RAM? a) Contains the electronic circuit that cause processing to occur b) Makes the information resulti-ng from processing available for use c) Allows data, program, comm-ands, and user responses to be entered into a computer d) Consist of electronic compon-ents that store data e) None 2. Correcting errors in a program is referred to as? a) Debugging b) Bugging c) Rectifying d) Modifying e) None of these 3. An assembler is used to translate a program written in? a) A low level language b) Machine language c) A high level language d) Assembly language e) All of These 4. The capability of operating system to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is? a) Multiprocessing b) Multitasking c) Multiprogramming d) Multi-execution e) None of these 5. The basic goal of computer process is to convert data into? a) Information b) Tables c) Files d) Graphs e) None of these 6. A hard copy of documents is? a) Stored in the hard disk b) Stored in the floppy c) Stored on a CD d) Printed on the printer e) None of these 7. A___is a design tool that graphically shows the logic in a solution algorithm? a) Flow chart b) Hierarchy chart c) Structure chart d) Context diagram e) None of the above 8. Which key combination is used for special tasks? a) Insert, Delete b) Ctrl, Shift c) Left Arrow, Right Arrow d) Page up, Page Down e) None of these 9. Which is the part of a computer that one can touch and feel? a) Program b) Software c) Hardware d) Output e) None of these 10. Circuits that provide a commu-nication path between two or more devices of a digital compu-ter system is? a) Car b) Bus c) Truck d) All the above e) None 11. A keyboard is which kind of device? a) Black b) Input c) Output d) Word processing e) None of these 12. IT stands for? a) Information Technology b) Integrated Technology c) Intelligent Technology d) Interesting Technology e) None of these 13. Which of the following refers to the fastest, biggest and most expensive computers? a) Personal computers b) Super computers c) Laptops d) Note books e) None of these 14. A collection of related informa-tion sorted and dealt with as a unit is? a) Disk b) Data c) File d) Floppy e) None of these 15. The process of a computer recei-ving information from a server on the internet is known as? a) Pulling b) Pushing c) Downloading d) transferring e) None 16. Which part of the computer helps to store information? a) Disk drive b) Keyboard c) Monitor d) Printer e) None of these 17. What is the process of carrying out commands? a) Fetching a) Storing c) Executing d) Decoding e) None of these 18. The patterns of printed lines on most products are called? a) Prices b) Striping c) Scanners d) Barcodes e) None 19. Which of the following groups consist of only output devices? a) Scanner, Printer, Monitor b) Keyboard, Printer, Monitor c) Mouse, Printer, Monitor d) Plotter, Printer, Monitor e) None of these 20. The rectangular area of the screen that displays a program, data, and/or information is a? a) Title bar b) Button c) Dialogue box d) Window e) None of these 21. A(n)____contains commands that can be selected? a) Pointer (b) Menu c) Icon (d) Button e) None of these 22. An error is also known as? a) Bug b) Debug c) Cursor d) Icon e) None of these 23. Arithmetic Operations? a) Involve matching one data item to another to determine if the first item is greater than, equal to, or less than the other item b) Sort data items according to standard, predefined criteria in ascending or descending order c) Use conditions with operators such as AND, OR and NOT d) Include addition, subtraction, multiplication and division e) None of these 24. Sending an e-mail is similar to? a) Picturing an event b) Narrating a story c) Writing a letter d) Creating a drawing e) None 25. TCP is the acronym of? a) Transmit Control Protocol b) Transmission Control Protocol c) Time Control Protocol d) Travel Control Protocol e) None 26. Microsoft Word is an example of? a) An operating system b) A processing device c) Application software d) An input device e) None 27. Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group? a) PROM b) EPROM c) CD ROM d) ROM e) None of these 28. Any data or instruction entered into the memory of a computer is considered as? a) Storage b) Output c) Input d) Information e) None of these 29. Which part of the computer displays the work done? a) RAM b) Printer c) Monitor d) ROM e) None of these 30. Which of the following is not an example of Operating System? a) Windows b) DOS c) Linux d) Pascal e) Unix 31. The first page of a Website is called the? a) Home page b) Index c) Java script d) Bookmark e) None 32. A series of instructions that tells a computer what to do and how to do is called a? a) Program b) Command c) User response d) Processor e) None of these 33. The amount of vertical space between lines of text in a document is called? a) Double spacing b) Line spacing c) Single space d) Vertical spacing e) None of these 34. Access-control based on a person's finger prints is an example of ? a) Biometric identification b) Characteristics identification c) Characteristic security d) Finger print security e) None 35. Which of the following is a non-volatile memory? a) RAM b) MOS c) ROM d) MSI e) SSI 36. The program and data in a computer is stored in? a) ALU b) Control Unit c) Bus d) Memory e) Cache Memory 37. Processing involves? a) Inputting data into a computer system b) Transforming input into output c) displaying output in a useful manner d) Providing relevant answers e) None of these 38. In Microsoft Word, a red line under a word means? a) Grammar mistake b) Spelling mistake c) No mistakes d) Virus infection e) None of these Answers 1) d 2) a 3) d 4) b 5) a 6) d 7) a 8) b 9) c 10) b 11) b 12) a 13) b 14) c 15) c 16) a 17) c 18) d 19) d 20) d 21) b 22) a 23) d 24) c 25) b 26) b 27) c 28) a 29) c 30) d 31) a 32) a 33) b 34) a 35) c 36) d 37) b 38) b