Home tution & group coaching


Computer Awareness Sheet-3                                       by Khyati Bhatia

Q-1                         Ctrl, Shift and Alt are called __ __ __ __ __  keys.

Q-2                        The pattern of printed lines on most products are  called- ____________

Q-3                        What is the permanent memory built into your computer called ________________________

Q-4                        Various applications and documents are represented on the Windows desktop by __.______________

Q-5                        E-mail addresses separate the user name from the ISP using the __ symbol. __________________

Q-6                        The ________  of a system includes the program s or instructions.

 

Q-7                        The main advantage of magnetic disk compared to magnetic tape is

 

Q-8                        The memory card which is conceptually related to the smart card but is similar to the video disk, is ____________

 

Q-9                        ______________   process rearranges file fragments into contiguous files.

Q-10                    ____ __ __ __ __  Which view is not available in Microsoft Word 2007

Q-11                    _____________ are words that a programming language has set aside for its own use.

Q-12                    When data changes in multiple lists and all lists are not updated, this causes: __________________       

Q-13                    A Proxy server is used for which purpose  ____________________________     

Q-14                    ______ describe what are database fields.

Q-15                    A goal of normalization is to __________          

Q-16             Granting an outside organization access to internet web pages is often implemented using a (n) ___________ 

Q-17                    The most frequently used instructions of a computer program are likely to be fetched from: ________________

Q-18                    ____________ are viruses that are triggered by the passage of time or on a certain date.                       

Q-19                    A process known as ____________ is used by large retailers to study trends.

Q-20                    ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.

Q-21                    Database redesign is not terribly difficult if the database .

Q-22                    Which of following is not normally used  to initialise a computer system ‘s hardware?

Q-23                    The use  of spooler programs and .or ____________ hardware allows personal computer operator  to do the processing work  at the same time when a printing  operation  is  in  progress.

Q-24                    ____________  Which most popular input device is used  for interactive  processing and for one line entry  of data  for batch  processing  

Q-25                       User programmable that combine  VDT hardware with built –in microprocessor is /are called . ____________

 

Computer Awareness Sheet-4                                     by Khyati Bhatia

Q-1         ____________ that can be stored  in a given  physical space is called

Q-2          The storage of a disk system depends  on the bits per of track  per inch of  ______________________.

Q-3         ___________  is not a unit of measurement in a computer system?

Q-4         In window  XP, which shortcut is used  to cycle  through Opened  item  in taskbar ?

Q-5         A digital  Computer  computes  the value  of expression  2 * 5-2>2. Inside which of ___________.

Q-6         If you wish to extend the length of the network without having the signal degrade, you would use a ………………

Q-7         A repair for a known software bug, usually available at no charge on the Internet, is called a ………………

Q-8         URL stands for ………………

Q-9          

Q-10     When data changes in multiple lists and all lists are not updated, this causes ………………

Q-11     What is a backup ____________.

Q-12     The Internet is ………………

Q-13     . Computers that are portable and convenient for users who travel are known as ………………

Q-14     ____________. is the storage area for e-mail messages called

Q-15     ____________. Is the One advantage of dial-up Internet access is.

Q-16     ____________   is the process of copying software programs from secondary storage media to the hard disk called.

Q-17     ____________  process checks to ensure that the components of the computer are operating and connected properly

Q-18     . ____________  is  A means of capturing an image (drawing or photo) so that it can be stored on a computer.

Q-19     An error in a computer program………………

Q-20     Access-control based on a person's fingerprints is .an example of………………

Q-21     The patterns of printed lines on most products are called………………

Q-22     Most mail programs automatically complete the following two parts in an e-mail ………………

Q-23     The computer's capability of distinguishing spoken words is called ………………

Q-24     ____________   is an advantage of mounting an application on the Web.

The first page of a Website is called the …………


For Answers Contact Khyati Bhatia

Make a Free Website with Yola.