Home tution & group coaching

Computer Awareness practices Sheet


1.       _____________  .aim at the boot sector of a hard drive by infecting a very crucial component of the boot process?(1) File infection virus   (2) Boot virus  (3) Network virus  (4) E-mail virus  (5) None of these

2.       One of the more recent e-mail scams, which lures internet users into revealing personal information is referred to as : _____________     (1) phishing  (2) flaming   (3) blogging  (4) pop- ups   (5) None of these  

3.       Malicious software is known as : _____________. (1) Badware (2) Malware  (3) Malicious ware   (4) Iiigalware   (5) None of these   

4.       Hardware or software designed to guard against authorized access to computer network is known a _____________ .   (1) Hacker proof program  (2) Firewall   (3) Hacker resistant serve    (4) Encryption safe wall (5) None of these           

5.       The fastest and quietest type of printer is a(n):(1)  dot-matrix printer  (2)  inkjet printer. (3)  laser printer. (4)  plotter.(5) None of these                            

6.       The type of large printer that can most accurately produce images requiring precise, continuous lines is a(n): _____________    (1)  plotter.   (2)  inkjet printer.(3)  laser printer (4)  dot-matrix printer. (5) none of these

7.         MICR stands for  _____________  (1)  Magnetic Ink Character Recognition  (2)  Magnetic Ink Code Reader (3)  Magnetic Ink Cases Reader  (4)  None of the above (5) All of the above

8.       The main difference between application and system software is that:
(1)  Application software is composed of program instructions but system software is not.
Application software is stored in memory whereas system software is only in the CPU.
System software is unnecessary whereas application software must be present on the computer.
System software manages hardware whereas application software performs user tasks.

(5) None of these

9.           ________ Viruses are often transmitted by a floppy disk left in the floppy drive (1) Trojan horse     (2) Boot sector  (3) Script                      (4) Logic bomb    (5) None of these             

10.    Servers are computers that provide resources to other computers connected to a ___________
(1) mainframe                                (2) network            (3) supercomputer            (4) client             (5) None of these      

11.    A goal of data mining includes which of the following?
(1) To explain some observed event or condition
(2) To confirm that data exists
(3) To analyze data for expected relationships
(4) To create a new data warehouse
(5) None of these 

12.     A Proxy server is used for which of the following?
(1) To provide security against unauthorized users
(2) To process client requests for web pages
(3) To process client requests for database access
(4) To provide TCP/IP
(5) None of these

13.    In the URL http:/www.bankersadda.com, the portion  labeled http is the______.    (1) host            (2) domain name       (3) Protocol                         (4) toolbar   (5) None of these.

14.    When data changes in multiple lists and all lists are not updated, this causes:
(1) data redundancy                     (2) information overload      (3) duplicate data            (4) data inconsistency        (5) None of these          

15.    A repair for a known software bug, usually available at no charge on the Internet, is called a(n)_____.

(1) version                          (2) patch              (3) tutorial    (4) FAQ           (5) None of these.

16.    .  _____________ are words that a programming language has set aside for its own use.
(1) Control worlds     (2) Reserved words      (3) Control structures     (4) Reserved keys     (5) None of these 

17.     You must install a (n) ____________ on a network if you want to share a broadband Internet connection.
(1) router                                       (2) modem      (3) node               (4) cable          (5) None of these 

18.    The ____ shows all the web sites and pages that you have visited over a period of time.  (1) status bar                     (2) taskbar          (3) history list   (4) toolbar                          (5) None of these.

19.    A proxy server is used for which of the following?

   (1) To provide security against unauthorized users            (2)   To process client requests for web pages

   (3) To process client requests for database access          (4) To provide TCP/IP        (5) None of these

20.     The ability to easily add additional users means that a network is: (1) scalable     (2) dedicated     (3) decent   (4) secure                           (5) None of these.


1.       ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer   (a) The operating system   (b).    The motherboard   (c).    The platform (d).    Application software.

2.       The difference between people with access to computers and the Internet and those without this access is known as the: http://tamilcube.com/image/blank.gif (a)   digital divide.(b) Internet divide (c) Web divide   (d) Cyberwaydivide

3.        Register is a (a) Set of capacitors used to register input instructions in a digital computer (b) Set of paper tapes and cards put in a file (c) Temporary storage unit within the CPU having dedicated or general purpose use (d) part of the auxiliary memory (e) device to convert current signal into voltage signal

4.       Errors in computer results could be due to  (a) encoding of data (b) transmission of data  (c) manipulation of data (d) all of the above   (e) none of above

5.        Terminal is a  (a) device used to give supply to a computer  (b) Point at which data may leave or enter the computer  (c) ending point in a program  (d) point where wires are interconnected  (e) an input/output device

6.       Pickup wrong definition  (a) Off line - is a system peripheral equipment not controlled by CPU (b) Online - is system in which peripheral equipment is in direct contact with CPU (c) Peripherals - are hardware under the control of CPU, like punched card readers, tapes, drums, disk, output devices (d) PL/I is the acronym Peripheral Listing /Index (e) Program or routine is a set sequence of instructions given to computer for problem solving 6.

7.       When a CD (Compact Disc used in audio and Video system) is seen in sunlight, rainbow like colours are seen. This can be explained on the basis of phenomenon of

(a) reflection and diffraction (b) reflection and transmission (c) diffraction and transmission (d) refraction, diffraction and transmission (e) none of these

8.       All of the following are examples of real security and privacy risks EXCEPT:
(a). hackers.    (b). spam.         (c). viruses.          (d). identity theft.

9.       A process known as ____________ is used by large retailers to study trends.   (a). data mining    (b). data selection      (c). POS  (d). data conversion

10.    A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.    (a). PSS   (b). POS   (c). inventory   (d). data mining.

11.    . ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.   (a). Data    (b) Point-of-sale (POS)   (c)C. Sales      (d). Query

12.    The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called:  (a). robotics.   (b). simulation.   (c). computer forensics.   (d). animation

13.    Which of the following is NOT one of the four major data processing functions of a computer?
(a). gathering data   (b). processing data into information   (c). analyzing the data or information  (d). storing the data or information

14.    ____________ tags, when placed on an animal, can be used to record and track in a database all of the animals movements.  (a). POS  (b). RFID (c). PPS (d). GPS

15.  In database , a field is a____.  (1) label             (2) table of information          (3) group of related records   (4) category of information  (5) None of these.

16.        The number of pixels displayed on a screen is known as the screen_________ (1)    resolution    (2) colour (3) refresh rate   (4)viewing size      (5) None of these.

17.     Word processing, spreadsheet, and photo-editing are example of ________. (1)  application software                (2) system software     (3) operating system software    (4) plateform software (5) None of these.

18.   If you wish to extend the length of the network without having the signal degrade, you would use a (1) repeater       (2) router            (3) gateway (4) switch         (5) None of these.

19.  .The time it takes a device to locate data and instructions and make them available to the CPU is known as ________ (1) clock speed                  (2) a processing cycle     (3) CPU speed  (4) access time    (5) None of these.

20.  A (n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system. (a) command – based user interface       (b) GUI (c) system utility                (d) API   (5) None of these  

For Answers Contact Khyati Bhatia

Make a Free Website with Yola.