KEMBAR78
003) Computer - Sumram | PDF | Operating System | Graphical User Interfaces
0% found this document useful (0 votes)
169 views196 pages

003) Computer - Sumram

Computer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
169 views196 pages

003) Computer - Sumram

Computer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 196

COMPUTER

AWARENESS
For All Government Job Exams, Especially
designed for Odisha Govt. Job Exams

IDEAL FOR
SSC-CGL, SSC-CHSL, CPO-SI, SSC-MTS SSC-GD, DSSSB, SIBANAND PATTNAIK
RRB-NTPC, RRC-Group D and all other government job exams
Sibanand Pattnaik
All Copyright Reserved
Mail: sibanand99.pattnaik@gmail.com

Disclaimer
This book is meant for educational and learning purposes. The author(s) of the book has/have
taken all reasonable care to ensure that the contents of the book do not violate any existing
copyright or other intellectual property rights of any person in any manner whatsoever. In the
event the author(s) has/have been unable to track any source and if any copyright has been
inadvertently infringed, please notify the publisher in writing for corrective action.
Every effort has been made to avoid errors or omissions in this publication. In spite of this,
errors may creep in. Any mistake, error or discrepancy noted may be brought to our notice
which shall be taken care of in the next edition. It is notified that neither the publisher nor the
author or seller will be responsible for any damage or loss of action to any one, of any kind, in
any manner, therefrom. It is suggested that to avoid any doubt the reader should cross-check
all the facts, law and contents of the publication with original Government publication or
notifications.
For binding mistake, misprints or for missing pages, etc., the publisher's liability is limited to
replacement within seven days of purchase by similar edition. All expenses in this connection
are to be borne by the purchaser.

All copyright reserved


No part of this book may be reproduced or copied in any form or by any means(graphic,
electronic or mechanical, including photocopying, recording, taping, or information retrieval
systems) or reproduced on any disc, tape, perforated media or other information storage
device, etc., without the written permission of the publishers. Breach of this condition is liable
for legal action.
Author represents and warrants that the Author is the author and proprietor and sole owner of
all rights in the work, that the Work is original except for such excerpts from copyrighted
works as may be included with the permission of the copyright owner thereof, that the Work
does not violate the right of privacy of or libel any person that it does not infringe any
copyright, trademark, patent or any right of others
COMPUTER
AWARENESS
For All Government Job Exams, Especially
designed for Odisha Govt. Job Exams

I feel a sense of great pride and


achievement in presenting this book to
my students. In my limited but enriching
experience, I have learned that life is too
short to have any regrets. So, it's better to
start today than regret tomorrow. Success
is about your mindset. If you have faith in
yourself and your hard work then, the path towards your
goal becomes clear.

Sibanand Pattnaik wants the best for the students. We feel


that there is not enough reliable study material in the
market. Hence, we decided to bring our own series.

I take this opportunity to thank the Almighty for His


blessings , my parents, and my dear students whose
constant support, appreciation and faith in me motivated
me to take this big leap in my life.

Sibanand Pattnaik
COMPUTER
AWARENESS
For All Government Job Exams, Especially
designed for Odisha Govt. Job Exams

~ Contents ~

1 Hardware 2
2 Software 5
3 History and Generation 11
4 Programming Language 14
5 Number System & Logic Gate 16
6 Memory & Memory Unit 18
7 Internet 20
8 DBMS 25
9 Security, Virus, Anti-Virus 28
10 Abbreviations and File Ext. 29
11 Networking 31
12 Microsoft Office 35
13 Practice Sets 41
14 Mock Tests 161

Publisher: Sibanand Pattnaik


Printing & Publishing Rights with the Publisher
Edition: 2024
Author: Sibanand Pattnaik
Mail: sibanand99.pattnaik@gmail.com
COMPUTER
AWARENESS
For All Government Job Exams, Especially
designed for Odisha Govt. Job Exams

ALL ABOUT COMPUTER


COMPUTER AWARENESS
2

Hardware
Hardware 01
WHAT IS COMPUTER?
Computer cannot do anything without a Program. It can
Computer is an electronic device that is designed to
store, retrieve, and process data.
work with Information.

Hardware is the collection of physical part of a


computer system. Ex. Monitor, Hard discs, keyboards,
Mouse, Cabinet Motherboard etc.

KEYBOARD: QWERTY : QWERTY is a keyboard layout for


Keyboard is a typewriter-style device which uses an Latin script. The name comes from the order of the
arrangement of buttons or keys to act as a mechanical first six keys on the top left letter row of the
lever or electronic switch. keyboard.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
3

MOUSE BCR (Bar Code Reader)


A computer mouse is a pointing device (hand control) A Bar Code Reader, also called a price scanner or
that detects two-dimensional motion relative to a point-of-sale (POS) scanner.
surface. This motion is typically translated into the
motion of a pointer on a display, which allows a OCR (Optical Character Recognition)
smooth control of the graphical user interface. Optical Character Recognition (also Optical Character
Reader, OCR) is the mechanical or electronic
SCANNER conversion of images of typed, handwritten, or printed
A scanner or optical scanner is a hardware input device text into machine-encoded text.
that optically "reads" and image and converts it into a
digital signal. OMR (Optical Mark Recognition)
Optical mark recognition (also called Optical Mark
GAME CONTROLLER Reading and OMR) is the process of capturing human-
A game controller is an input device for playing marked data from document forms such as surveys and
games. tests.

Light Pen Touch Pad


A Light Pen is a pointing device shaped like a pen and A computer input device in the form of a small panel
is connected to a VDU. The tip of the light pen containing different touch-sensitive areas.
contains a light-sensitive element.
Biometric
PDA (Personal Digital Assistant) Biometrics are automated methods of recognizing a
A personal digital assistant (PDA), also known as a person based on a physiological or behavioral
handheld PC, or personal data assistant, is a mobile characteristic.
device that functions as a personal information
manager. Trackball: A trackball is a pointing device.

MICR (Magnetic Ink Character Recognition) Web Camera: A webcam is a video camera that feeds
It is a technology which allows machines to read and or streams its image in real time to or through a
process cheque enabling thousands of cheque computer to a computer network.
transactions in a short time. MICR code is usually a
nine-digit code comprising of some important QR (Quick Response)
information about the transaction and the bank. A machine-readable code consisting of an array of
black and white squares,

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
4

Processing Unit, Output, Storage (LCD) that uses thin-film transistor (TFT) technology
Microprocessor to improve image qualities such as addressability and
A microprocessor is a computer processor which contrast.
incorporates the functions of a computer's central LED: An LED display is a flat panel display, which
processing unit (CPU) on a single integrated circuit uses an array of light-emitting diodes as pixels for a
(IC), or at most a few integrated circuits. video display.
CPU - (Central Processing Unit)
CPU have three Units Printer
I. Memory Unit A printer is a device that accepts text and graphic
II. Control Unit output from a computer and transfers the information
III. Arithmetic Logic Unit to paper, usually to standard size sheets of paper.
First Microprocessor = 4004 (intel)
A processor register (CPU register) is one of a small Types of Printers
set of data holding places that are part of the computer Impact Printer Non-Impact
processor. Impact printer refers to a Non-impact printers are
class of printers that quieter than impact
Motherboard work by banging a head printers, that prints
A motherboard is the main printed circuit board (PCB) or needle against an ink without striking the
found in general purpose microcomputers and other ribbon to make a mark paper
expandable systems. on the paper.
➢ Dot-matrix Printer ➢ Laser Printer,
Components of Motherboard ➢ Daisy-Wheel ➢ Ink-jet Printer,
• Microprocessor Printers, ➢ LED Page Printer
• RAM/ROM ➢ Line Printers.
• BIOS (Basic Input Output System)
• Expansion slot Plotter
• Interconnecting Circuit The plotter is a computer printer for printing vector
graphics. In the past, plotters were used in applications
Output Devices such as computer-aided design, though they have
• Monitor generally been replaced with wide-format
• Printer conventional printers.
• Plotter Speaker
• Speaker Computer speakers, or multimedia speakers, are
speakers sold for use with computers, although usually
• Projector etc.
capable of other audio uses,
Types of Monitors
Projector
• CRT
A projector or image projector is an optical device that
• LCD/TFT projects an image (or moving images) onto a surface,
• LED commonly a projection screen.
CRT: The Cathode Ray Tube (CRT) is a vacuum tube Storage Devices
that contains one or more electron guns and a • Hard Disk Drive
phosphorescent screen and is used to display images.
• Floppy Disk
• Magnetic Tape
LCD: A flat panel screen that uses the Liquid Crystal
Display (LCD) technology and connects to a • Compact Disc
computer. • Digital Versatile Disc
• Blu Ray Disc
TFT: A Thin-Film-Transistor Liquid-Crystal Display • Pen Drive
(TFT LCD) is a variant of a liquid-crystal display • Memory Card

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
5

Software
Software 02
It is a set of programs and procedures. Software tells software serves as the interface between hardware and
the hardware what to do and how to accomplish a the end users. Examples: Operating System,
task. Ex. Operating System (Windows, Unix, Linus, Compilers, Interpreter, Assembler etc.
Mac OS, Web browsers, MS Office etc.
2. Application Software
Types of Software Application software is the set of programs necessary
1. System Software to carry out operations for a specified application.
The system software is collection of programs Application software’s are designed and developed to
designed to operate, control, and extend the processing solve a specific problem in business or scientific area.
capabilities of the computer itself. System software are Examples: Word processors, Data Base System,
generally prepared by computer manufactures. System Accounting Packages, DTP Packages. Graphics
Packages, etc.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
6

OPERATING SYSTEM ANDROID


An operating system (OS) is system software that Android Version Release Year
manages computer hardware and software resources Android 1.0 (Alpha) Sep 2008
and provides common services for computer Android 1.1 (Beta) Feb 2009
programs. Cupcake April 2009
Ex. WINDOWS, MACINTOSH, ANDROID, UNIX, Donut Sep 2009
LINUX Eclair Oct 2009
Froyo May 2010
WINDOW Gingerbread Dec 2010
Windows is a GUI based operating system. In Honeycomb Feb 2011
Windows Operating system multiple applications can Icecream Sandwich Oct 2011
be simultaneously run-in different windows.
Jelly Bean Nov 2012
• In Windows, the screen upon which icons,
KitKat Oct 2013
windows, too are displayed is known as desktop.
Lollipop Nov 2014
• An icon is a graphic symbol that represents a
Marshmallow Oct 2015
window element like, file, folder, or shortcut.
• Boot loading up of operating system files into the Nougat Oct 2016
computer’s memory in called booting up. Oreo Aug 2017
Pie Aug 2018
There are two types of Booting: Android 10 Sep 19
i. Cold Booting: When the system starts from Android 11 Sep 2020
initial state i.e. it is switched on, we call it cold Android 13 Aug 2022
booting or Hard Booting.
LINUX: It is also a multi-tasking operating system,
ii. Warm Booting: When the system restarts or which was originally designed to be used on personal
when Reset button is pressed, we call it computers.
Warm Booting or Soft Booting.
• The taskbar is a bar, which is usually located at the 1. Instruction It is a command given to a computer
bottom of the screen. in the computer language by the user.
• My computer is helpful for viewing the contents 2. Program It is a set of instructions given to a
of a single folder or drive. computer to perform some tasks.
• Windows Explorer is another way of seeing what 3. Data Unprocessed raw facts and figures, like
is on your computer. Windows Explorer shows the numbers, text on piece of paper, are known as data.
computer’s contents as a hierarchy. 4. Information When data is processed, organized,
• File: A program or document stored on a disk. structured, or presented in each context to
• Toolbar: A set of bottoms you click to perform meaningful, then it is called information.
common tasks.
• A folder is a location in which you can store files Freeware: Software which is completely costless. The
and other folders. producers of this kind of software are either public
• To create a new folder, File—New—Folder institutions such as universities or developers who do
commands are clicked in My Computer windows. it for personal interest or advertisement or private
• To find files or folders, Start---Find---Files or company who do it for dumping reasons.
Folder commands are clicked.
• To create a shortcut to a file, firstly select the file Shareware: Software which is initially costless but
or folder, whose shortcut is to be created. Then after a certain period the user is asked to pay a fee or
drag the file icon through right mouse button to delete it. Or software which has two versions a free
desired location where shortcut to be placed, and one, but incomplete or with advertisement banners and
then select create shortcut(s). a complete advertisement free one for which the user
• To shut down the computer, Go to Start and Shut must pay. The most common example is WinZip
Down commands are clicked. compression program.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
7

Commercial: Software for which the user has to pay Storage


a license to use it . Common examples are Microsoft Capacity Computers are capable to store huge amount
Windows operating system and Microsoft office. of data which depends on the capacity of hard disk,
SSD, etc.
Custom software: Software uniquely built, under
payment for a specific customer to fit his need. Only Versatility
the customer may use it. Computers can do different types of work
simultaneously. They can perform multiple tasks at a
Open Source: Software may be modified by anyone, same time.
sometimes under certain restrictions. Open-source
software is also freeware. Reliability
Reliability is an attribute of any computer-related
Proprietary: Software is distributed with the explicit component (software, or hardware, or a network) that
with the explicit legal warning not to modify it and consistently performs according to its specifications.
technically locked to prevent other developers to see Computers always produce exact results. The
or modify its source. possibility of errors occur only if the input is wrong,
i.e. the computers never make mistakes of their own
Four basic functions of Computer are given below: accord.

Introduction to graphic user interface


1. Input Information or data that is entered into a
based operating system
computer is called input. It sends data and
instructions to the Central Processing Unit (CPU). Graphical User Interface (GUI)
Data inputs through Input Devices, Such as GUI stands for Graphical User Interface. it provides a
(Keyboard, Mouse etc.) graphical interface for the user to interact with the
2. Processing It is the sequence of actions taken on computer. It uses icons, menus, etc. to interact with the
data to convert it into information which is user. Moreover, the user can easily interact by just
meaningful to the user. It can be calculations, clicking these items. Therefore, it is very user friendly
comparisons or decisions taken by the computer. and there is no need to remember any commands.
Processing Completed by Microprocessor. (CPU) Examples of GUI based operating system are Microsoft
3. Output It makes processed data available to the Windows, macOS, etc.
user. It is mainly used to display the desired result
to the user as per input instructions. Display Data Types of Operating System (GUI based)
on Output devices like as Monitor, Printer, The different types of operating system on the basis of
Projector etc. GUI are as follows:
4. Storage It stores data and programs permanently.
It is used to store information during the time of
program execution and possible to get any type of 1. Microsoft Windows
information from it. Storge data in Hard Disk, SD Microsoft Windows is one of the most common
Card, SSD, Pendrive etc. graphical OS. It is developed and marketed by
Microsoft. Its common name is windows or win.
Windows 11 is the latest major release of Microsoft's
Main Key Features of Computer
Windows NT operating system, released in October
2021.Moreover, it has several earlier versions like
Speed
Windows XP, Windows 8, Windows 7, etc. Besides, the
The computer can process data very fast at the rate of
most common editions for home computers are
millions of instructions per second.
Windows Home (Win Home) and Windows
Professional (Win Pro or Windows Pro).
Accuracy
Computers provide a high degree of accuracy. They
respond to the user as per the input instructions.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
8

2. Linux necessary operation. For example, in windows, the cd


Linux is a popular operating system. It is not a part of filename command is used for going over to that
any particular firm or organization. Rather, it was directory.
developed by a programmer Linus Torvalds in 1991. It
is an open-source operating system. Moreover, Today, Advantages:
LINUX is run in many organizations, private offices, Here are a few key points that make CUI more
on mobiles, supercomputers, over the internet, etc. feasible:
Therefore, we can say that it is one of the most popular • For performing any task, commands are used
OS today. instead of manually doing it.
It already contains almost all the features of UNIX OS. • Operating CUI is easy because of one linear
Moreover, it also has some additional features, It command.
contains a variety of user interfaces like GNOME,
• Only one task is performed at a time and is
KDE, Mate, Cinnamon, etc. In addition to this, it has
several versions of distributions as follows UBUNTU, efficient.
DEBIAN, SOLAS, LINUX MINT, etc. • Uses less memory when compared to GUI
since there are commands that are to be written
3. Android on the command line.
It is one of the most common versions of the operating • Less expensive to use since the commands are
system today. It is basically used on mobile phones and not updated frequently.
tablets. Most versions of it are an open-source OS.
Disadvantages:
4. Apple iOS Here are a few reasons all users do not widely use its
After android, it is one of the most popular OS. It is users:
designed to run on Apple devices such as iPhones, iPad • A user must memorize all the necessary
tablets, etc. commands to operate the CUI.
• One task is done at a time which means to do
5. Apple macOS multiple tasks, we must wait for the command
It is the operating system used in Apple laptops and to be executed.
Apple desktops. Moreover, Its most popular features • The interface of CUI is less appealing and
are Siri and FaceTime. supports only the usage of a keyboard.

Character User Interface or command- Example of CUI Operating System


line user interface (CUI) CUI is becoming prominent day to day, here are a few
CUI is a short form for character user interface also examples where CUI operating system is mostly used.
known as a command-line user interface. It is a • MS-DOS and the window command prompt
precursor of GUI and was mostly used in early • Terminal
computers. It is preferred for more advanced users • Linux command line
because it provides more advanced features and
controls to the end user over an operating system.
It allows users to issue a command of more than a line
Following are the reasons why the CUI
of text, also known as command lines, to the program operating system is different from that
which can be anything like opening a file or directory, of the GUI operating system:
etc. It provides an easy way to implement scripts in any Difference CUI GUI
programming language by writing a specific command parameters
for it. Full form It stands for It stands for
It acts as a user interface wherein the user interacts with character user the graphical
the computer, purely through a keyboard. For interface user interface
performing any tasks, a command is to be written on Usage It is easy to It is difficult
the interface which gets executed and does the operate to operate

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
9

because of clicking on
icons and sub- icons, etc
icons that the Flexibility It is a little It is highly
GUI has flexible to use flexible
inbuilt on the especially for because a
window or the advanced users graphical
user interface. since the only interface is
Memory The memory The memory command is to provided for
requirement requirement is requirement is be written for executing a
low because high since it executing a task. task.
there is nothing needs to be
to be installed. installed on Some More types of Operating System
the computer.
Interaction The user can The user
1. Batch OS
In this system, the OS does not forward the jobs/tasks
with user interact with a interacts with
directly to the CPU. It works by grouping together
computer by the computer
similar types of jobs under one category. Further, we
using by using
name this group as a ‘batch’. Hence, the name batch
commands like graphical
OS.
text formats like
Examples are the payroll system, bank statement, etc.
icons and
images, etc
Speed It has high speed It has low 2. Time-Shared OS
since commands speed since When more than one task takes place on the system it
are typed and the user needs is called time-shared OS. As multiple tasks can run at
executed. to click an the system at a time as per requirement. Hence, they all
icon which share the CPU time one by one. Therefore, we also
will then load name it multitasking. The time that each task gets is
the necessary called quantum.
output. A fixed interval of time is decided for each task. When
Customizable It is not It is the first task executes for that period of time, the second
feature customizable customizable task executes, and so on. Examples are UNIX etc.
because it is since the
strictly based on graphical 3. Distributed OS
commands. interface has In this system, there is more than one CPU present. The
many options OS distributes the tasks among all the processors. The
for UI. processors do not share any memory or clock time. OS
Navigation It is not easy to Navigation is handles all communication between them through
navigate in CUI easy in GUI various communication lines.
OS since it with the help Examples are LOCUS etc.
executes tasks of the
based on the keyboard or
command mouse of the
4. Network OS
In these OS various systems are connected to a server.
provided. computer.
It allows the system to share resources such as files,
Use of The interaction The user
printers, applications, etc. Moreover, it gives the
peripherals between the interacts with
capability to serve to manage these resources.
user and the the computer
Examples are UNIX, LINUX, Microsoft Windows
computer system by
Server 2008, etc.
system is done using the
by using the mouse of the
keyboard computer,

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
10

5. Real-Time OS (RTOS)
In these systems, the time interval for processing and a) Hard Real-Time Systems
responding to inputs is very small. Therefore, due to In this, the time constraint is very short and strict. Even
this quality, these are used in real-time situations. For seconds of delay is not acceptable.
example in missile systems, robots, etc.
They have two categories as follows: b) Soft Real-Time Systems
In this, the time constraint is not so short and strict.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
11

History and Generation


History and Generation 03
Automation
(P=Peta), exceeding the previous record holder,
A computer is an automated machine. even if it's
Tianhe-2, by around 59 PFLOPS. (Floating Point
humans instruct it. This is because once the
Operations Per Second).
instructions are passed, the computer works on its own
till the task is completely done.
Mainframe
Mainframe computers are used primarily by large
Clarification of Computer
organizations for critical applications, bulk data
Based on Based on Size Based on
processing, such as census, industry and consumer
operation Model
statistics, enterprise resource planning, and transaction
Analog Super XT processing. Mainframe computer serves as a backbone
Computer Computer AT for the entire business world. It is considered as the
Digital Main Frame PS/2 heart of a network of computers or terminals that allow
Computer Computer many people to work at the same time. Mainframe
Hybrid Mini Computer computers are IBM-370, IBM-S/390, UNIVAC-1110,
Computer Micro etc.
Computer Mini Computer
A minicomputer is a type of computer that possesses
ANALOG COMPUTER (1940s and 1950s) most of the features and capabilities of a large
An analog computer is a form of computer that uses computer but is smaller in physical size. the
the continuously changeable aspects of physical minicomputer was designed to carry out some specific
phenomena such as electrical, mechanical, or tasks, like engineering and Computer Aided Design
hydraulic quantities to model the problem being (CAD) calculations. But now, they are being used as
solved. central computer which is known as Server.

DIGITAL COMPUTER (around 1980s) Micro Computer


A digital computer is the most used computer and is A microcomputer contains a microprocessor (a central
used to process information with quantities using processing unit on a microchip), memory in the form
digits, usually using the binary number system. of read-only memory and random access memory, I/O
ports and a bus or system of interconnecting wires,
Hybrid Computer housed in a unit that is usually called a motherboard.
A hybrid computer is a computing system that a. Palmtop
combines both digital and analog components. Palmtop literally fits in your palm. Palmtops are
The first desktop hybrid computing system was the severely limited, but they are practical for certain
Hycomp 250, released by Packard Bell in 1961. functions such as phone books and calendars.
Palmtops that use a pen rather than a keyboard for
SUPER COMPUTER input are often called hand-held computers or
A supercomputer is a high level of performance as PDAs( Personal digital assistants).
compared to a general-purpose computer. b. Desktop Computer or Personal Computer
First used in the New York World in 1929 to refer to These are based on the microprocessor technology
large custom-built tabulators that IBM had made for (Integrated Circuit-IC).
Columbia University. c. Laptop
As of June 2016, the fastest supercomputer in the These are portable and light weighted. They
world is the Sunway TaihuLight, in mainland China, include rechargeable battery, so these can work
with a LINPACK benchmark score of 93 PFLOPS anywhere.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
12

Generations of computers computers. Well, it uses the high-level of computer


• First Generation of computers (1946- 1959) languages by taking the input such as COBOL,
The first generation of computer is introduced in 1946. FORTRAN, etc.
Whereas the first generation used vacuum tubes as the
CPU and magnetic drum for storing the data. The size Main characteristics of second-generation
of the computer in this generation is larger like room computers are: -
size and limited to basic operation. Main electronic Transistor
component
First generation computers are: Programming Machine language
ENIAC: Electronic Numerical Integrator and language and assembly
Computer, built by J. Presper Eckert and John V. language.
Mauchly was a general-purpose computer. It had been Memory Magnetic core and
very heavy, large, and contained 18,000 vacuum tubes. magnetic tape/disk.
It was Turing-complete and able to solve "a large class Input/output Magnetic tape and
of numerical problems" through reprogramming. devices punched cards.
Power and size Smaller in size, low
EDVAC: Electronic Discrete Variable Automatic power
Computer was designed by von Neumann. It could consumption, and
store data also as instruction and thus the speed was generated less heat
enhanced. it was a successor to the ENIAC. (in comparison with
the first-generation
UNIVAC: Universal Automatic Computer was computers)
developed in 1952 by Eckert and Mauchly. The
UNIVAC I was the first general-purpose electronic Third Generation of computers (1965-1972)
digital computer design for business application The second generation of computers uses the
produced in the United States. The UNIVAC I was transistors in the place of vacuum tubes. But the
designed as a commercial data-processing computer, transistor produces the big amount of heat which
intended to replace the punched-card accounting damages sensitive parts in the computers. To eliminate
machines of the day. this problem, the Third Generation of Computer
introduced in 1965. Whereas these computers differ
Main characteristics of First-generation from first and generation of computers and it uses the
computers are: IC (Integrated Circuit). The IC is the small circuit
Main electronic Vacuum tube. which contains the thousands of transistors, resistors to
component make the computer. By inventing the IC’s in the third
Programming Machine language generation, it became possible to fit thousands of
language elements in a small area to create the computer.
Main memory Magnetic tapes and Additionally, it reduces the size of the computer in a
magnetic drums small size.
Input/output devices Paper tape and punched
cards. Main characteristics of third generation
Speed and size Very slow and very computers are:
large in size (often Main electronic Integrated
taking up entire room). component circuits (ICs)
Programming High-level
Second Generation of computers (1959-1965) language language
The Second Generation of Computer uses the Memory Large magnetic
transistor in the place of vacuum tubes. The transistor core, magnetic
was developed in Bell Labs in 1947, but introduced in tape/disk
computers 1950’s. Whereas, it is more reliable, faster, Input / output devices Magnetic tape,
cheaper, and smaller in size than the first generation of monitor,

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
13

keyboard, printer, method (ULSI has


etc. millions of transistors on a
single microchip and
Fourth Generation of computers (1972-1980) Parallel processing
The Fourth Generation of Computers are comes with method use two or more
VLSI (Very Large Scale Technology) also we can call microprocessors to run
it as microprocessors. Whereas, the Intel was the first tasks simultaneously).
company to introduce the microprocessor and firstly, Language Understand natural
design the PC or personal computer in this generation language (human
by IBM. Well, the VLSI circuits include 500 language).
transistors on the single chip which performs the high- Size Portable and small.
level of operations and computations. This generation Input / output device Trackpad (or touchpad),
of computers allows users to use the computer for touchscreen, pen, speech
word processing, spreadsheets, file managing and input (recognize
graphics. The computer languages like C, C++, and voice/speech), light
Data Base are used in this generation to perform the scanner, printer,
accurate operations. The concept of networking and keyboard, monitor,
CD-ROM came into existence in the fourth generation. mouse, etc.
Examples Desktops, laptops, tablets,
Main characteristics of fourth generation smartphones, etc.
computers are:
Main electronic Very large-scale
component integration (VLSI) and the
microprocessor (VLSI has
thousands of transistors on
a single microchip).
Memory Semiconductor memory
(such as RAM, ROM, etc.)
Input/output Pointing devices, optical
devices scanning, keyboard,
monitor, printer, etc.

Fifth Generation of computers (1982- Present)


Fifth Generation of Computers which were started
around 1982. These computers differ from the
previous four generations. Well, these generation
computers use the high level of languages like Perl,
Python, C, JAVA, etc. Moreover, the Ultra Large
Scale Integration technology was introduced in 5th
generation computers which leads to the development
of a microprocessor chip with several millions of chips
on it.

Main characteristics of fifth generation computers


are:
Main electronic Based on artificial
component intelligence, uses the Ultra
Large-Scale Integration
(ULSI) technology and
parallel processing

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
14

Programming Language
Programming Language 04
A translator is a program that converts source code into
Computer Programming Language Generations
object code. Generally, there are three types of
translators:
First Generation Language:
This language is called Machine Language or first- • Compilers: - A compiler takes the source code as
generation language. A computer was able to a whole and translates it into object code all in one
understand it directly without any conversion. This go. Once converted, the object code can be run at
language is also known as Machine Language or any time. This process is called compilation.
Binary language. Binary language because only two • Interpreters: - An interpreter translates source
symbols 1 and 0. code into object code one instruction at a time. It
is like a human translator translating what a person
Second Generation Language: says into another language, sentence by sentence.
Machine Language was just 1’s and 0’s, in which error The resulting object code is then executed
finding and correcting were very difficult. So, must immediately. The process is called interpretation.
develop a second-generation language. Also called an • Assemblers: - Assemblers are a third type of
Assembly Language. translator. The purpose of an assembler is to
In this language, instructions were replaced with some translate assembly language into object code.
coded terms called mnemonic. So that it becomes a Whereas compilers and interpreters generate many
little easier to read, understand, and correct. machine code instructions for each high-level
A computer can understand and work on machine code instruction, assemblers create one machine code
only. So, assembly language needed a special software instruction for each assembly instruction.
called Assembler that converts mnemonic into
machine language.

Computer language: A computer language is a way


to give instructions to a computer to perform desired
tasks.
Program: A set of instruction written in a specific
sequence for the computer to accomplish a given task.
Machine language: The binary medium of
communication with a computer through a designed
set of instruction specific to each computer.
Assembly language: A medium of communication
with a computer in which programs are written in
mnemonics. An assembly language is specific to a Third Generation Languages:
given computer. First, two generations of languages were
Mnemonic: A combination of letter to suggest the comparatively easier for a computer to understand, but
operation of an instruction. E.g, ADD, HALT etc. it was difficult for humans to read, understand and
code in them. These languages are known as High-
Compilers, interpreters, and assemblers Level Languages as they are easier for humans to
Any program written in a high-level language is understand.
known as source code. However, computers cannot
understand source code. Before it can be run, source C, C++, Java, COBOL Pascal, etc. are some
code must first be translated into a form which a High-Level Languages.
computer understands - this form is called object code.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
15

Fourth Generation Language:


Fourth-generation languages just require ‘what’ do we
want from the code rather than ‘how to do’. i.e., the
procedure. These languages are like statements in the
human language mainly used in database
programming. E.g., Python, Ruby, SQL (Structured
Query Language).

Fifth Generation Languages:


The fifth-generation languages are more focused on
artificial intelligence implementation. These have
visual tools to develop a program. E.g. Prolog,

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
16

Number System & Logic Gate


Number System & Logic Gate 05
Number System is a way to represent or express position called place value. The value of the position
numbers. You have heard of various types of number increases by 10 times as we move from right to left in
systems such as the whole numbers and the real the number.
numbers. But in the context of computers, we define Example, the value of 893 is
other types of number systems. They are: = 8 x 102 + 9 x 101 + 3 x 100
= 800 + 90 + 3
• Binary Number System =893
• Decimal Number System
Octal Number System (Base 8)
• Octal Number System This system uses digits 0 to 7 (i.e. 8 digits) to represent
a number and the numbers are as a base of 8.
• Hexadecimal Number System Example, (54)8 in decimal is
= 5×81+4×80
Binary Number System (Base 2) = (44)10
A computer can understand only the “on” and “off”
state of a switch. These two states are represented by 1 Hexadecimal Number System (Base 16)
and 0. The combination of 1 and 0 form binary In this system, 16 digits used to represent a
numbers. These numbers represent various data. As hexadecimal number. Thus, it is also known as the
two digits are used to represent numbers, it is called a base 16 number system. Each digit position represents
binary or base 2 number system. a power of 16. As the base is greater than 10, the
The binary number system uses positional notation. number system is supplemented by letters. Following
But in this case, each digit is multiplied by the are the hexadecimal symbols: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9,
appropriate power of two based on its position. A, B, C, D, E, F
Example, (1101)2 in decimal is To take A, B, C, D, E, and F as part of the number
= 1 x 23 + 1 x 22 + 0 x 21 + 1 x 20 system is conventional and has no logical or deductive
= 8 +4+0+1 reason.
= (13)10
LOGIC GATE
Decimal Number System (Base 10) A logic gate is an elementary building block of a
The digits 0 to 9 represents numbers. As it uses 10 digital circuit. Most logic gates have 2 inputs and 1
digits to represent a number, it is also called the base output. In most logic gates, the low state is
10 number system. Each digit has a value based on its approximately zero volts (0 V), while the high state is
approximately five volts positive (+5 V).

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
17

SYMBOLS

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
18

Memory & Memory Unit


Memory & Memory Unit 06
COMPUTER MEMORY them can store data temporarily and some them can
Memory is best storage part to the computer users to store permanently. Memory consists of instructions
save information, programs and etc, The computer and the data saved into computer through Central
memory offer several kinds of storage media some of Processing Unit (CPU).
Computer memory basically Two types –
Primary memory (RAM and ROM) and Secondary
memory (hard drive, CD, etc).
Random Access Memory (RAM) is primary-volatile
memory and Read-Only Memory (ROM) is primary-
non-volatile memory.

Types of Memory
1. Volatile: - Memory that loses its contents when
the power is turned off. Volatile memory requires
electricity or current to store information. Ex.-
RAM (RANDOM ACCESS MEMORY)

2. Non-Volatile: - Non-volatile memory (NVM) is a


type of computer memory that has the capability
to hold saved data even if the power is turned off.
Ex- ROM (READ OLNY MEMORY), Hard Disk
Drive , Floppy Disk etc.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
19

RAM: - Referred to as main memory, primary Hard Disk


memory, or system memory, (RAM) is a hardware It is a non-removable enclosed magnetic disk included
device that allows information to be stored and in most PCs. It contains a stack of metal platters, each
retrieved on a computer. coated with iron oxide, that spin on a spindle and the
SRAM:- STATIC RAM - SRAM does not entire unit is encased in a sealed chamber.
periodically refreshed. It is used for CPU cache.
DRAM:- DYNAMIC RAM (DRAM) is a type Magnetic Tape
of random-access memory that stores each bit of data This is plastic tape, usually made of Mylar that is
in a separate capacitor within an integrated circuit. coated with iron oxide, thereby enabling the
SDRAM :- Synchronous Dynamic Random Access introduction (writing); retention (memory) and reading
Memory : A type of DRAM that can run at much of magnetically recorded information. The best use of
higher clock speeds. tape storage is for data that we do not use very often.
ROM: - ROM is "built-in" computer memory
containing data that normally can only be read, not Optical Storage
written to. ROM contains the programming that allows CD (Compact Disc)
your computer to be "booted up" or regenerated each DVD (Digital Versatile Disc) BRD (Blu Ray Disc)
time you turn it on. HVD (Holographic Versatile Disc)
• PROM: Programmable Read-Only Memory, a
memory chip on which data can be written only Flash Memory
once. Pen Drive, Memory Card
• EPROM: Erasable Programmable Read-Only
Memory, The ultraviolet light clears its contents, MEMORY UNITS
making it possible to reprogram the memory. Bit (Binary Digit) :- A binary digit is logical 0 and 1
• EEPROM : Electrically Erasable Programmable representing a passive or an active state of a
Read-Only Memory, It is a special type of PROM component in an electric circuit.
that can be erased by exposing it to an electrical
charge. Nibble :- A group of 4 bits is called nibble.

Cache Memory: - It is a very high-speed Byte:- A group of 8 bits is called byte. A byte is the
semiconductor memory which can speed up CPU. It smallest unit which can represent a data item or a
acts as a buffer between the CPU and main memory. character. (1 byte = 8 bits)
SECONDARY MEMORY Bit 0 or 1
This type of memory is also known as external 4 Bits 1 Nibble
memory or non-volatile memory. It is slower than 8 Bits 1 Byte
main memory. Secondary memory is used for storing 1024 Byte 1 Kilo Byte (KB)
data/Information permanently. 1024 KB 1 Mega Byte (MB)
Floppy disk, hard disk, magnetic tapes, and optical 1024 MB 1 Giga Byte (GB)
disks come under the category of external storage 1024 GB 1 Tera Byte (TB)
devices or auxiliary storage devices. These devices are 1024 TB 1 Peta Byte (PB)
very sensitive to environmental conditions (humidity 1024 PB 1 Exa Byte (EB)
and temperature) as well as to external magnetic fields 1024 EB 1 Zeta Byte (ZB)
and need to be stored carefully. 1024 ZB 1 Yotta Byte (YB)

Floppy Disk
Floppy disks are primarily used on PCs. Information
on a floppy disk is recorded in the magnetized states of
particles of iron oxides evenly placed upon concentric
circles which are known as tracks.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
20

Internet
Internet 07
The Internet is a large network of networks, a An Internet service provider (ISP) is an organization
networking infrastructure. It connects millions of that provides services for accessing and using the
computers together globally, forming a network in Internet. Internet service providers may be organized
which any computer can communicate with any other in various forms, such as commercial, community-
computer as long as they are both connected to the owned, non-profit, or otherwise privately owned.
Internet. Examples: - BSNL, VI, Airtel, Jio etc.

Ways to Connect the Internet


• Dial-up access: - Dial-up Internet access is a form
of Internet access that uses the facilities of the
Public Switched Telephone Network (PSTN) to
establish a connection to an Internet service
provider (ISP) by dialing a telephone number on a
conventional telephone line.

History of Internet
• The history of the Internet begins with the
development of electronic computers in the 1950s.
• The US Department of Defense awarded contracts
as early as the 1960s for packet network systems,
including the development of the ARPANET.
• ARPANET - Advanced Research Projects Agency
Network, 1969: ARPANET successfully
completed and carries its first packets.
• WWW-World Wide Web: - Sir Tim Berners-Lee
invented the World Wide Web in 1989. Sir Tim
Berners-Lee is a British computer scientist.
• First graphical web browser, Mosaic was preceded
by World Wide Web. Mosaic was developed at the
National Center for Supercomputing Applications
(NCSA)
ISP: - Internet service provider • Multilink dial-up: - Multilink dial-up provides
increased bandwidth by channel bonding multiple
dial-up connections and accessing them as a single
data channel. It requires two or more modems,
phone lines, and dial-up accounts, as well as an
ISP that supports multilinking – and of course any
line and data charges are also doubled.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
21

• Integrated Services Digital Network: - voice and digital data, is one of the oldest Internet
Integrated Services Digital Network (ISDN) is a access methods. ISDN has been used for voice,
switched telephone service capable of transporting video conferencing, and broadband data
applications.

• Digital subscriber line (DSL, ADSL, SDSL, Web. An information resource is identified by a
VDSL): - Digital Subscriber Line (DSL) service Uniform Resource Identifier (URI/URL) that may be a
provides a connection to the Internet through the web page, image, video, or other piece of content.
telephone network. Unlike dial-up, DSL can
operate using a single phone line without Web Browsers and releasing Years
preventing normal use of the telephone line for World Wide Web February 25, 1990
voice phone calls. Mosaic April 22, 1993
I. ADSL-Asymmetric Digital Subscriber Line Netscape Navigator and October 13, 1994
II. SDSL-symmetric digital subscriber line Netscape Communicator
III. VDSL-Very-high-bit-rate digital subscriber Internet Explorer August 16, 1995
line Opera web browser 1996
Mozilla Navigator June 5, 2002
• Satellite Internet access provides fixed, portable, Safari January 7, 2003
and mobile Internet access. Satellite antenna dish Mozilla Firefox November 9, 2004
requires a clear line of sight to the southern sky, Google Chrome September 2, 2008
due to the equatorial position of all geostationary Microsoft Edge July 9, 2015
satellites.
Web Address
Web Browser An internet address of a website, file, or document in
A Web Browser (commonly referred to as a browser) the general format. Every computer connected to the
is a software application for retrieving, presenting, and internet has its unique web address, without which it
traversing information resources on the World Wide

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
22

cannot be reached by other computers. Also called terminal connection or Remote Access.
universal resource locator or Uniform Resource Default Port no. 23
Locator (URL).
Domain
https://www.xyz.com/studymaterial A domain name is an identification string that defines
a realm of administrative autonomy, authority or
https :- Its Protocol. control within the Internet.
www. :- Its Server
xyz: - Its Domain Name Type of Domain
com: - Type of Domain .edu education
studymaterial :- Resource Path .org organization
.nic Network Information Center
HTTPS - Hyper Text Transfer Protocol Secure, .info information
Default Port No. of HTTP – 80. This protocol is .int international organizations
Request Response Protocol .gov U.S. national and state government
agencies
.com commercial
FTP - File Transfer Protocol .net network
File Transfer Protocol (FTP) is a standard network .mil U.S. military
protocol used for the transfer of computer files from a
server to a client using the Client–server model on a Intranet
computer network. An intranet is a private network accessible only to an
Default port no. of FTP – 21 organization's staff. Generally a wide range of
information and services from the organization's
Telnet internal systems are available that would not be
Telnet is a protocol used on the Internet or local area available to the public from the Internet.
networks to provide a bidirectional interactive text-
oriented communication facility using a virtual

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
23

Extranet launched in 2009. Bing is also a good and best search


An extranet is a private network that uses Internet engine. Bing is the default search engine in
technology and the public telecommunication system Microsoft’s web browser.
to securely share part of a business's information or
operations with suppliers, vendors, partners, Yahoo
customers, or other businesses. Both Yahoo & Bing are not giving competition to
Google but giving competition to each other.
Web Page - A web page or webpage is a document
commonly written in Hyper Text Markup Language Baidu
(HTML) that is accessible through the Internet or other Baidu is Chinese web search engine founded in
network using an Internet browser. January 1, 2000. This web search is made to deliver
results for website, audio files and images.
Website - A website is a collection of related web It is also one of the most used search engine in China.
pages, including multimedia content, typically
identified with a common domain name, and published AOL
on at least one web server. A website accessible via a Aol.com is also among the top search engines in the
public Internet Protocol (IP) network. world.
Ex. https://www.xyz.com/studymaterial
Web Portal - A Web portal is most often a specially Ask.com
designed web site that brings information together Ask.com was previously known ask Ask Jeeves. Its
from diverse sources in a uniform way. search results are based on question answering web
format.
An Internet Protocol address (also known as an IP
address) is a numerical label assigned to each device Excite
(e.g., computer, printer) participating in a computer Most of us don’t know about a search engine named
network. It acts as an identifier for a computer. It is a “Excite”. It provide internet services like email, search
unique address for every computer. engine, news, instant messaging and weather updates.

Top-level domain: Each part of a domain name DuckDuckGo


contains certain information. The first field is the host DuckDuckGo is a popular search engine known for
name, identifying a single computer or organization. protecting the privacy of the users.
The last field is the top-level domain, describing the
type of organization and occasionally country of origin Email (Electronic Mail)
associated with the address. For e.g. - .com – Messages distributed by electronic means from one
Commercial, .edu – Educational. computer user to one or more recipients via a network.
Ray Tomlinson was a American computer
IPv4 and IPv6: IPv4 and IPv6 are two versions of the programmer who implemented the first email program
Internet protocol (IP). IPv4 uses 32-bit address for a on the ARPANET system.
host and IPv6 uses 128-bit address Therefore, IPv6 has Meanwhile in 1978, a 14-year-old boy, Shiva
a vastly enlarged address space compared to IPv4. Ayyadurai began his work on an email system for the
University of Medicine and Dentistry of New Jersey.
Top Best Search Engines in The World Ex. Gmail, Yahoo mail, Rediff mail, Hotmail etc.

Google Gmail
Google Search Engine is the best search engine in the Gmail is a free, advertising-supported email service
world, and it is also one of most popular products from developed by Google.
Google. Almost 70 percent of Search Engine market Launched: April 1, 2004, Owner: Google, Created
has been acquired by Google. by: Paul Buchheit

Bing
Bing is Microsoft’s answer to Google, and it was

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
24

Top Social Networking Platform

S.No Name of Released Headquarters


Social Year
Media
Platform
1 Facebook 2004 Menlo Park,
CA
2 YouTube 2005 San Bruno,
California
3 WhatsApp 2009 Menlo Park,
California
4 Instagram 2010 Menlo Park,
CA
5 TikTok 2016 Culver City,
CA
6 Snapchat 2011 Los Angeles,
CA
7 Pinterest 2005 San Francisco,
CA
Yahoo mail 8 Reddit 2010 San Francisco,
The original incarnation of Yahoo! Inc. was an CA
American multinational technology company 9 LinkedIn 2006 San Francisco,
headquartered in Sunnyvale, California. Yahoo was CA
founded by Jerry Yang and David Filo in January 1994 10 Twitter 2003 Mountain
and was incorporated on March 2, 1995. Yahoo was View, CA
one of the pioneers of the early internet era in the 11 Google+ 2011 Menlo Park,
1990s. CA
12 Tumblr 2007 New York
Rediff mail City, U.S.
Ajit Balakrishnan is an Indian entrepreneur, business
executive and administrator. He is the founder, current
Chairman and Chief Executive Officer of Rediff.com,
an internet company based in Mumbai.

Hotmail
Sabeer Bhatia is an Indian businessman who co-
founded the webmail company Hotmail.com, Sabeer
Bhatia arrived in the United States from Bangalore at
19; now he's a Web gazillionaire. With friend and co-
worker Jack Smith, Bhatia founded Hotmail, the first
free Web-based e-mail service.
Two years later, they sell it to Microsoft for $400
million.

Social Networking Website


Social networking is the use of internet-based social
media programs to make connections with friends,
family, classmates, customers, and clients.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
25

DBMS
DBMS 08
DATABASE
Database as an electronic filing system. Traditional
databases are organized by fields, records, and files.

DBMS
Database Management System is a computer software
application that interacts with the user, other
applications, and the database itself to capture and
analyze data. A general-purpose DBMS is designed to
allow the definition, creation, query, update, and
administration of databases.

Data organized in a data storage hierarchy of


increasing order

Fields - A field is the basic unit of data entry in a


record. After defining a field, you can set validation,
auto entry, and storage options.

Records - Records are composed of fields, each of


which contains one item of information. A set of
records constitutes a file.

File - File is a collection of records.

to use the DBMS, and in designing and running the


Database Component database, using documented procedures, to guide the
• Software users that operate and manage it.
• Hardware
• Data Database Access Language
• Procedures This is used to access the data to and from the database,
• Database Access Language to enter new data, update existing data, or retrieve
• Query Processor required data from databases.
• Run Time Database Manager
Query Processor
• Data Manager
This transforms the user queries into a series of low-
level instructions.
Procedures
These are the instructions and rules that assist on how

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
26

Run Time Database Manager define integrity constraints, views, and tables.
Sometimes referred to as the database control system, II. A physical database schema lays out how data is
this is the central software component of the DBMS stored physically on a storage system in terms of
that interfaces with user-submitted application files and indices.
programs and queries, and handles database access at
run time. Types of Relationship
There are 4 types of Relationships
Data Manager I. ONE TO ONE
Also called the cache manger, this is responsible for II. ONE TO MANY
handling of data in the database, providing a recovery III. MANY TO ONE
to the system that allows it to recover the data after a IV. MANY TO MANY
failure.
Data Dictionary Types of Keys
A data dictionary is a set of read-only table and views, Primary Key -A Primary Key designated to uniquely
containing the different information about the data identify all table records. It must contain a unique
used in the enterprise to ensure that database value for each row of data. It cannot contain null
representation of the data follow one standard as values.
defined in the dictionary.
Superkey - A Superkey is a combination of columns
Report Writer that uniquely identifies any row within a RDBMS
It is a program that extracts information from one or table.
more files and presents the information in a specified
format. Candidate Key - A candidate key is a column, or set
of columns, in a table that can uniquely identify any
Metadata database record without referring to any other data.
Metadata is data that describes other data.
Foreign Key - A foreign key is a field (or collection
Three distinct types of Metadata exist: of fields) in one table that uniquely identifies a row of
I. Descriptive Metadata another table or the same table.
II. Structural Metadata
III. Administrative metadata. Some Important Terms in DBMS
Attributes - It may refer to a database field. Attributes
TYPES OF DATABASE SYSTEMS describe the instances in the row of a database.
• PC DATABASE
• CENTRALIZED DATABASE Instance - A database instance is a set of memory
• DISTRIBUTED DATABASE structures that manage database files.
• In-MEMORY DATABASE
Tuple - A single row of a table, which contains a single
INSTANCES AND SCHEMA record for that relation is called a tuple.
A database instance (Server) is a set of memory
Consistency - Consistency in database systems refers
structure and background processes that access a set of
to the requirement that any given database transaction
database files.
must change affected data only in allowed ways
SCHEMA
Normalization
Schema is the structure of the database that defines the
Database Normalization is the process of organizing
objects in the database.
the columns (attributes) and tables (relations) of a
relational database to reduce data redundancy and
There are two main kinds of database schema:
improve data integrity.
I. A logical database schema conveys the logical
constraints that apply to the stored data. It may

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
27

Normalization rule are divided into following


normal form.
• First Normal Form (1NF)
• Second Normal Form (2NF)
• Third Normal Form (3NF)
• BCNF (Boyce and Codd Normal Form)

RDBMS
A Relational Database Management System
(RDBMS) is a database management system (DBMS)
that is based on the relational model.

SQL
Structured Query Language is a domain-specific
language used in programming and designed for
managing data held in a Relational Database
Management System (RDBMS).

DRL, DDL, DML, TCL and DCL commands

DRL (Data Retrieval Language)


• Select

DDL (Data Definition Language)


• Create
• Alter
• Drop
• Truncate
• Rename

DML (Data Manipulation Language)


• Insert
• Delete
• Update
• Merge

TCL (Transaction Control Language)


• Commit
• Rollback
• Savepoint

DCL (Data Control Language)


• Grant
• Revoke

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
28

Security, Virus, Anti-Virus


Security, Virus, Anti-Virus 09
Viruses & Antivirus
How to prevent Phishing
Virus: - Vital Information Resource Under Siege
Protect your computer from phishing:
A computer virus is a type of malicious software
1. Guard against spam
program ("malware") which, when executed,
2. Communicate personal information only via phone
replicates by reproducing itself (copying its own
or secure web sites.
source code) or infecting other computer programs by
3. Do not click on links, download files, or open
modifying them.
attachments in emails from unknown senders.
4. Never email personal or financial information, even
Types of Viruses
if you are close with the recipient.
➢ Boot Sector Virus
5. Beware of links in emails that ask for personal
➢ Resident Virus
information
➢ Direct Action Virus
6. Never enter personal information in a pop-up screen.
➢ Multipartite Virus
7. Protect your computer with a firewall, spam filters,
➢ Polymorphic Virus
anti-virus, and anti-spyware software.
➢ Overwrite Virus
8. Check your online accounts and bank statements
➢ Trojan Horses etc.
regularly.
Malware
Antivirus
Software which is specifically designed to disrupt,
Anti-virus is a software program or set of programs
damage, or gain authorized access to a computer
that are designed to prevent, detect, and remove
system.
software viruses and other malicious software like
worms, trojans, adware and more.
WORM
A computer worm is a standalone malware computer
Some Antiviruses
program that replicates itself in order to spread to other
computers. • Avast! Free Antivirus
• Panda Cloud Antivirus
Spyware • Microsoft Security Essentials
• Spyware is software that aims to gather • Avira AntiVir Personal Edition
information about a person or organization • AVG Anti-Virus Free Edition
without their knowledge. • Comodo Antivirus
• Phishing is a form of online identity theft in which • Immunet Protect FREE
fraudsters trick Internet users into submitting • PC Tools AntiVirus Free
personal information to unauthorized web sites.

Phishing
Phishing is the attempt to obtain sensitive information
such as username, password, and bank card details
(indirectly money), often for malicious reasons by
disguising as a trustworthy entity in an electronic
communication.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
29

Abbreviations and File Extension


Abbreviations and File Ext. 10
Filename & Extension
A file name extension is an identifier specified as a • .RA – RealAudio
suffix to the name of a computer file. The extension • .RTF - Rich Text Format
indicates a characteristic of the file contents or its • .TIF TIFF – graphic
intended use. • .WAV - Windows sound
• .WK3 - Lotus 1-2-3
• .XLS or .XLSX - Excel spreadsheet
• .ZIP - Zip Compressed Archive

ABBREVIATIONS

RAID - Redundant Array of Inexpensive Disks or


Redundant Array of Independent Disks.
RAID is a data storage virtualization technology that
combines multiple physical disk drive components
Images Extension
into a single logical unit for the purposes of data
There are 5 main formats in which to store images.
redundancy, performance improvement, or both.
• TIFF - Tagged Image File Format.
• JPEG - Joint Photographic Experts Group EBCDIC - Extended Binary Coded Decimal
• GIF - Graphic Interchange Format Interchange Code
• PNG - Portable Network Graphics EBCDIC is an eight-bit character encoding used
• Raw image files contain data from a digital camera mainly on IBM mainframe and IBM midrange
(usually). computer operating systems.

File Extension ASCII - American Standard Code For


• .AIFF or .AIF - Audio Interchange File Format Information Interchange
• .AVI - Multimedia Audio/Video ASCII is the most common format for text files in
• .BAT - PC batch file computers and on the Internet. In an ASCII file, each
• .BMP - Windows BitMap alphabetic, numeric, or special character is represented
• .DBF - dbase II, III, IV data with a 7-bit binary number (a string of seven 0s or 1s).
• .DIF - Data Interchange format 128 possible characters are defined.
• .DOC or .DOCX - Microsoft Word
• .EPS - Encapsulated PostScript • ANSI - American National Standards Institute
• .EXE - PC Application • ALU - Arithmetic Logic Unit
• .GIF - Graphics Interchange Format • ARP - Address Resolution Protocol
• .HTM or .HTML - Web page source text • ATM - Asynchronous Transfer Mode
• .JPG or JPEG - JPEG graphic • ATA - Advanced Technology Attachment
• .MDB - MS Access database • API - Application Programming Interface
• .MID or .MIDI - MIDI sound • BIOS - Basic Input/Output System
• .PDF Acrobat -Portable document format • BRD - Blu-Ray Disc
• .PPT or .PPTX – PowerPoint • CMOS - Complementary Metal-Oxide-
• .PSD - Adobe PhotoShop Semiconductor
• .PSP - PaintShop Pro • CDMA - Code Division Multiple Access
• CPU - Central Processing Unit

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
30

• CRT - Cathode Ray Tube


• CUI - Character User Interface
• DDL - Data Definition Language Or Data
Description Language
• DCIM - Digital Camera Images
• DDR - Double Data Rate
• DLL - Dynamic Link Library
• DMA - Direct Memory Access
• DNS - Domain Name System
• DOS - Disk Operating System
• DPI - Dots Per Inches
• DSL - Digital Subscriber Line
• DML - Data Manipulation Language
• DFS - Distributed File System
• DIMM - Dual In-Line Memory Module
• GSM - Global System For Mobile
• HDMI - High Definition Multimedia Interface
• IEEE Institute Of Electrical And Electronics
Engineers
• LCD - Liquid Crystal Displays
• UPS - Uninterruptible Power Supply
• PDA - Personal Digital Assistant
• TFT - Thin Film Transistor
• LED - Light-Emitting Diode
• GUI - Graphical User Interface
• FSB - Front-Side Bus
• HTML - Hyper Text Mark Up Language
• HTTPS - Hypertext Transfer Protocol Secure
• ICMP - Internet Control Message Protocol
• IMAP - Internet Message Access Protocol
• SIMM Single In-Line Memory Module
• RIMM Rambus Inline Memory Module.
• EDI Electronic Data Interchange
• MIDI Musical Instrument Digital Interface
• MMS Multimedia Messaging Services
• RFID Radio-Frequency Identification
• USB Universal Serial Bus
• UTF Unicode Transformation Format
• W3C World Wide Web Consortium
• XML Extensible Markup Language
• SDRAM Synchronous Dynamic Random-Access
Memory
• RDBMS Relational Database Management
System
• SQL Structured Query Language

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
31

Networking
Networking 11
What is a Network There are three types of transmission mode. They
The word Network “means,” two computers are are:
connected using a transmission media and able to share ➢ Simplex Mode
their resources. The transmission media for the term ➢ Half duplex Mode
network is either cable media or wireless media. ➢ Full duplex Mode

Advantage of Networking Simplex Mode


1. Resource sharing: It is a device or piece of In this type of transmission mode data can be sent only
information on a computer that can be remotely through one direction i.e. communication is
accessed from another computer. unidirectional.
2. High reliability: All files can be copied to two or
more machines, if one goes down, we can use Half Duplex Mode
another. In half duplex system we can send data in both
3. Communication media: Two or more devices directions, but it is done one at a time that is when the
can be interconnected to share resources & sender is sending the data then at that time, we can’t
exchange information. send the sender our message. The data is sent in one
4. High speed: Information can be synchronized direction.
when one user makes changes to online document,
the other can see the change immediately. Full Duplex Mode
In full duplex system we can send data in both
Mode of Transmission directions as it is bidirectional. Data can be sent in both
directions simultaneously. We can send as well as we
receive the data.

Communication Medium in Network


Transmission medium is the means through which we
send our data from one place to another.

Twisted Pair Cable they support many different types of networks.


This cable is the most used and is cheaper than others.
It is lightweight, cheap, can be installed easily, and

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
32

Twisted Pair of two types 4. WAN (Wide Area Network)


• Unshielded Twisted Pair (UTP) 5. PAN (Personal Area Network)

LAN (Local Area Network):


A Local Area Network (LAN) is a group of computer
and associated devices that share a common
• Shielded Twisted Pair (STP) communications line or wireless link to a server.

LAN Features
• Standard PC Hardware
Coaxial Cable • Resource sharing
Coaxial is called by this name because it contains two • Common applications
conductors that are parallel to each other. Copper is • File sharing
used in this as Centre conductor which can be a solid
wire or a standard one.
Hardware devices are used in Networking:

Network Interface Card (NIC)


NIC is a computer circuit board or card that is installed
in a computer so that it can be connected to a network.

Optical Fiber
An optical fiber cable is a cable containing one or Repeater
more optical fibers that are used to carry light. The A repeater connects two segments of your
optical fiber elements are typically individually coated network cable. It retimes and regenerates the signals to
with plastic layers and contained in a protective tube proper amplitudes and sends them to the other
suitable for the environment where the cable will be segments.
deployed.

Connectors

Ethernet Hub or Multiport repeater


A hub is a common connection point for devices in a
network. Hubs are commonly used to connect
segments of a LAN. A hub contains multiple ports.

Types of Networks Bridge


1. LAN (Local Area Network) A network bridge is a computer networking device
2. CAN (Campus Area Network) that creates a single aggregate network from
3. MAN (Metropolitan Area Network) multiple communication networks or network

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
33

segments. more local area networks (LANs) within the limited


geographical area. It can be the college campus,
enterprise campus, office buildings, military base,
industrial complex.

MAN (Metropolitan Area Network)


Router A metropolitan area network (MAN) is a network that
A router is a networking device that forwards data interconnects users with computer resources in a
packets between computer networks. Routers perform geographic area or region larger than that covered by
the traffic directing functions on the Internet. even a large local area network (LAN) but smaller
than the area covered by a wide area network (WAN).

WAN (Wide Area Network)


A Wide Area Network (WAN) is a
telecommunications network or computer network
Switch that extends over a large geographical distance. Wide
A network switch (also called switching hub, bridging area networks are often established with leased
hub, officially MAC bridge) is a computer networking telecommunication circuits.
device that connects devices together on a computer
network. PAN (Personal Area Network)
A personal area network (PAN) is a computer network
used for data transmission amongst devices such as
computers, telephones, tablets.

Bluetooth PAN (Personal Area Network) is used for


close-quarters connections between a Bluetooth
CAN (Campus Area Network)
compatible device, like an iPhone, Android, or iPad,
A Campus Area Network (CAN) is a computer
and a computer, like a Mac or Windows PC.
network that links the buildings and consists of two or

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
34

• Bus Topology
• Hybrid Network

Network Topologies
• Topology of a network refers to the way in which
the network’s nodes (computer or other devices
that need to communicate) are linked together.
• It determines the various data paths available
between any pair of nodes in the network.
• Choice of a topology for a computer network
depends on a combination of factors, such as:
Desired Performance of the system
• Reliability of the system
• Size (Numbers of nodes and their geographical
distribution) of the system)
• Cost of components and services required to
implement network Availability of
communication lines

Types of Topologies
• Star Topology
• Ring Topology

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
35

Microsoft Office
Microsoft Office 12
Microsoft Office was developed by Microsoft Inc in August 24, Office 95 Word, Excel,
1988. It is a collection of software, based on specific 1995 (7.0) PowerPoint,
purpose and mainly used in office work. You can start Schedule+,
any software of MS-Office by using the Start button. Binder, Access,
There are five packages of MS-Office Bookshelf
1. MS-Word (Word Processing) November Office 97 Word 97, Word
2. MS-Excel (Spreadsheet) 19, 1996 (8.0) 98, Excel,
3. MS-PowerPoint (Presentation) June 20, Office 97 PowerPoint,
4. MS-Access (Database Management) 1997 Powered by Access,
5. MS-Outlook (E-mail Client) Word 98 Publisher 97,
6. One Note (Text) (8.5) Publisher 98,
Outlook 97,
Release Title Components Outlook 98,
date BookShelf
October 1, The Word 1.1, Excel Basics, Small
1990 Microsoft 2.0, PowerPoint Business
Office for 2.0 Financial
Windows June 7, Office 2000 Word, Excel,
March 4, Office 1.5 Word 1.1, Excel 1999 (9.0) Outlook,
1991 3.0, PowerPoint PowerPoint,
2.0 Access,
July 8, Office 1.6 Word 1.1, Excel Publisher, Small
1991 3.0, PowerPoint Business Tools,
2.0, Mail 2.1 FrontPage,
Early 1992 Office 2.5 Word 2.0a, PhotoDraw
Excel 4.0, May 31, Office XP Word, Excel,
PowerPoint 2001 (10.0) Outlook,
2.0e, Mail 2.1 PowerPoint,
August 30, Office 3.0 Word 2.0c, Access,
1992 Excel 4.0, FrontPage,
PowerPoint 3.0, Publisher, Small
Mail 3.0 Business Tools
January 17, Office 4.0 Word 6.0, Excel August 19, Office 2003 Word, Excel,
1994 4.0, PowerPoint 2003 (11.0) Outlook,
3.0, Mail 3.1 PowerPoint,
June 2, Office 4.3 Word 6.0, Excel Access,
1994 5.0, PowerPoint Publisher,
4.0, Mail 3.2, OneNote,
Access 2.0 InfoPath
July 3, Office for Word 6.0, Excel January 30, Office 2007 Word, Excel,
1994 NT 4.2 5.0, PowerPoint 2007 (12.0) PowerPoint,
4.0, Office Outlook,
Manager Publisher,

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
36

Access, Groove, Microsoft Word


OneNote, MS-Word is a Word processing application which is
InfoPath, one of the most important and widely used applications
Communicator, found on computer. It provides tools for editing,
Visio Viewer, formatting, and printing of documents smaller size.
OCT
June 15, Office 2010 Word, Excel, Start MS-Word
2010 (14.0) PowerPoint, There are two methods of starting MS-Word
OneNote, which are as follows
Outlook, • Click on Start button and then click on Run option.
Publisher, Run dialog box will be appear on screen. Now,
Access, type winword on text box and press Enter key.
InfoPath, • Click Start button - All Programs - Microsoft
SharePoint Office - Microsoft Office Word 2016.
Workspace,
Visio Viewer, It opens MS-Word with a blank document. By default,
OCT, Lync the name of the blank document is Document1.docx,
January 29, Office 2013 Word, Excel, where.docx are the extensions of a MS-Word file.
2013 (15.0) PowerPoint,
OneNote, Shortcut Keys of MS-Word
Outlook, Shortcut Key Function
Publisher, Ctrl+A Select All
Access, Lync, Ctrl+B Bold
Skype for Ctrl+C Copy
Business, Visio Ctrl+D Open Font dialog box
Viewer Ctrl+E Center Alignment
September Office 2016 Word, Excel, Ctrl+F Find
22, 2015 (16.0) PowerPoint, Ctrl+G Go to
OneNote, Ctrl+H Replace
Outlook, Ctrl+I Italic
Publisher, Ctrl+J Justify
Access, Skype Ctrl+K Hyperlink
for Business, Ctrl+L Left Alignment
Visio Viewer Ctrl+M Indent a paragraph
September Office Word, Excel, Ctrl+N New Document
24, 2018 2019 (16.0) PowerPoint, Ctrl+O Open
OneNote, Ctrl+P Print Box open
Outlook,
Ctrl+Q removes all formatting from a
Publisher,
paragraph
Access, Skype
Ctrl+R Right Alignment
for Business,
Ctrl+S Save
Visio Viewer
Ctrl+T creates a hanging indent
October 5, Office 2021 Word, Excel,
Ctrl+U Underline
2021 (16.0) PowerPoint,
OneNote, Ctrl+V Paste
Outlook, Ctrl+W Close
Publisher, Ctrl+X Cut
Access, Skype Ctrl+Y Redo
for Business, Ctrl+Z Undo
Visio Viewer Ctrl + Shift + S Applies a style or records a

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
37

style. • A cell can be edited either by overwriting or by


Ctrl + Shift + F Changes the font of the partially modifying the cell contents.
selected text. • A range can selected using mouse or keyboard.
Ctrl + Shift + P Changes the font size of the • A range can be either through copy and paste
selected text. operations or by dragging the fill handle.
Alt + Shift + D Insert the current date. • A range can be moved either through cut and paste
Alt + Shift + T Insert the current time operations or by dragging the range border.
Ctrl + Shift + C Copies the formatting of the • A range can be cleared through Edit--Clear
selected text to a specified command.
location (Format Painter) • To erase everything from a worksheet, select all
Ctrl + F2 Displays full pages as they the cells in the worksheet and then use Edit—
are printed. Clear—All.
• To save a workbook use File-Save command.
Microsoft Excel • To open a workbook, use File—Open command.
An electronic spreadsheet is used for analyzing, • To insert cells, rows, or columns in worksheet, use
sharing, and managing information for accounting Insert---Cells----, Insert-----Rows or Insert-----
purpose performing mathematical calculations, Column command respectively.
budgeting, billing etc. A spreadsheet is a matrix of • General arrangement of data is known as
rows and columns like an accounting ledger. The formatting.
spreadsheet program also provides tools for creating • Formatting does not affect the actual cell value
graphs, inserting pictures and chart, analyzing the data only the appearance change.
etc. e.g. Corel Quattro Pro, Snowball, Lotus-1-2-3, • Formatting is performed in MS-Excel through
Apple Numbers etc. options available in Format menu.
The key difference between columns and rows is that • Charts are the pictorial representation of
a column arranges data vertically from top to bottom, worksheet data.
while a row arranges data horizontally from left to • Various chart types in MS- Excel are area chart,
right. column chart, bar chart, line chart, pie chart, XY
Microsoft Excel 2007 is limited to: 1,048,576 rows., (Scatter) chart.
16,384 columns. • Chart in MS-Excel saved in two ways
▪ Embedded chart
Column Represented by A, B.C ……. XFD. ▪ Chart sheet
Row Represented by 1,2,3,4,5………...1048576. • Embedded chart is a chart object that is placed on
a worksheet and saved with that work sheet.
Components of Microsoft Excel Chart sheet is a sheet in workbook that contains only a
• A spreadsheet is a software tool that lets one chart.
enter, calculate, manipulate, and analyze set of Charts are created using chart wizard.
numbers. Function Shortcut Key
• A Worksheet is a grid of cells made up of Close a workbook. Ctrl+W
horizontal rows and vertical columns. Open a workbook. Ctrl+O
• A workbook is a group of worksheets. Go to the Home tab. Alt+H
• Three types of data can be entered in a worksheet Save a workbook. Ctrl+S
are: Copy selection. Ctrl+C
▪ Number Paste selection. Ctrl+V
▪ Text
Undo recent action. Ctrl+Z
▪ Formulas
Cell can be referenced in three ways: Remove cell contents. Delete

▪ Relative Choose a fill color. Alt+H, H
▪ Absolute Cut selection. Ctrl+X
▪ Mixed Go to the Insert tab. Alt+N
Apply bold formatting. Ctrl+B

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
38

Center align cell Alt+H, A, C Open the View tab and Alt+W
contents. preview page breaks and
Go to the Page Alt+P layouts, show and hide
Layout tab. gridlines and headings, set
Go to the Data tab. Alt+A zoom magnification,
Go to the View tab. Alt+W manage windows and
Open the context menu. Shift+F10 or panes, and view macros.
Windows Menu key
Add borders. Alt+H, B MS-POWERPOINT
• The application software that can create
Delete column. Alt+H, D, C
professional looking visual aids is called
Go to the Formula tab. Alt+M
Presentation Graphics Software.
Hide the selected rows. Ctrl+9 MS-PowerPoint can be started by clicking at

Hide the selected Ctrl+0 Start—Program---Microsoft PowerPoint.
columns. • A slide can contain one or more of these
components: Titles, Graphs, Drawing objects,
To go directly to a tab on the ribbon, press one of ClipArt, and Pictures.
the following access keys. Additional tabs might • The slide components that are used for reference
appear depending on your selection in the are: Handouts, Notes, Outlines.
worksheet. • A new presentation can be created through one of
Function Shortcut Key these methods:
Move to the Tell Alt+Q, then enter the ▪ Auto content Wizard
me or Search field on the search term. ▪ Design Templates
ribbon and type a search ▪ Sample Presentation
term for assistance or Help ▪ Blank Presentation
content. • A new slide can be added by either clicking at
Open the File menu. Alt+F Common Tasks options of Formatting toolbar and
Open the Home tab and Alt+H then selecting New Slide option, by clicking at
format text and numbers Insert menu’s New Slide option.
and use the Find tool. • A presentation in PowerPoint can viewed in any of
Open the Insert tab and Alt+N these views: Normal, Outline, Slide, Slide Sorter,
insert PivotTables, charts, Slide Show, and Notes Page View.
add-ins, Sparklines, • To apply new design to slides, click either at Apply
pictures, shapes, headers, or Design Template option of Common Tasks
text boxes. options of Formatting toolbar, or at Format menu’s
Open the Page Layout tab Alt+P Apply Design Template option or ever from the
and work with themes, page shortcut menu.
setup, scale, and alignment. • A color scheme is a combination of various colors
Open the Formulas tab and Alt+M used for text and other presentation elements.
insert, trace, and customize • A color scheme can be changed by clicking at
functions and calculations. Slide Color Scheme option of Format menu.
Open the Data tab and Alt+A • Background color can be changed by clicking at
connect to, sort, filter, Format----Background command or even through
analyze, and work with slide’s shortcut menu.
data. • You can change text font and style by using
Open the Review tab and Alt+R Format---Font command.
check spelling, add notes • Header and Footer information can be viewed and
and threaded comments, changed by clicking at View---Header and Footer
and protect sheets and option.
workbooks.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
39

• The slide ---shorter view in useful for viewing the variety of users.
slides in miniature forms and for rearranging them.
• Movies (Videos) and Sound can be inserted by New item alerts
using Insert—Movies & Sounds command. Incoming messages overlay on the user's display,
While creating slide shows you can add transitions to notifying them of new emails.
slides by using Slide Show --- Slide Transition
command Ignore messages
• To add animation, you can use Slide Show----- All messages in a conversation can be set to bypass a
Custom Animation commands. user's inbox and go to the deleted items folder.

Microsoft Outlook File attachment reminder


Outlook allows you to send and receive email If a user mentions an attachment in an email but forgets
messages, manage your calendar, store names and to attach it, Outlook will ask them if they meant to
numbers of your contacts, and track your tasks. include an attachment before sending the message.
Initial release date: 16 January 1997
Programming language: C++ Clean Up Conversation option
Outlook features include the following: Users can click a button to delete read messages,
leaving only unread messages.
Calendar sharing
Users can share calendars to see the availability of Automatic calendar updates
colleagues when scheduling meetings. Outlook will automatically add flight, hotel and car
rental reservations to the calendar.
@mention
If a user types @ and another user's name, Outlook will Shortcuts Keys
add that user to an email list, highlight the mention of switch to Mail (CTRL+1)
that user and notify the user. switch to Calendar (CTRL+2)
switch to Contacts (CTRL+3)
Email scheduling create new appointments (CTRL+SHIFT+A)
Users can write emails ahead of time and choose when send a message (ALT+S)
to send them. reply to a message (CTRL+R)

Quick Parts
This function enables users to copy the text of one
email and insert it into future messages. This feature is
useful for users that have to send similar emails to a

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER
AWARENESS
For all government exam, Specially designed for
Andaman and Nicobar govt. Jobs

Practice Sets - 13
COMPUTER AWARENESS
42

Practice Set – 01

1. Which is not the portable computer? 10. The overall design, construction, organization
(A) Micro-processor and interconnecting of the various components of
(B) Calculator a computer system is referred as–
(C) Series Computes (A) Computer Architecture
(D) Parallel Computers (B) Computer Flowchart
2. The ROM chip which can be rewritten several (C) Computer Algorithm
times and requires the action of ultraviolet (D) All of the above
radiations to erase its contents is________. 11. BIOS are responsible for-
(A) Flash memory (B) PROM (A) Handling the particulars of input/output
(C) EEPROM (D) EPROM operations.
3. FPI stands for____. (B) Output operations
(A) Faults per inch (B) Frames per inch (C) Input operations
(C) Figure per inch (D) Film per inch (D) All of the above
4. A terabyte comprises 12. BISYNC is an abbreviation for–
(A) 1024 gigabyte (B) 1024 kilobyte (A) Binary Input/Binary Output
(C) 1024 megabyte (D) 1024 byte (B) Binary synchronous
5. The memory which is utmost accessible to the (C) Binary digit
processor is ______. (D) All of the above
(A) Cache memory (B) RAM 13. A process of trying out a new product by
(C) Hard disk (D) Flash memory independent users before it is finally
6. In which kind of disk does the read/write head manufactured/developed–
physically touches the surface? (A) Alpha test (B) Beta Test
(A) Hard Disk (B) Compact Disk (C) Gamma test (D) All of the above
(C) Floppy Disk (D) all of the above 14. An E-mail protocol for storage, management and
7. What is the correct syntax for typing a function change, especially in corporate offices –
into a cell? (A) Message handling service
(A) Equal sign, Function Name, Matching (B) Postal service’s
brackets (C) Data storage
(B) Function Name, Equal sign, Matching (D) All of the above
brackets 15. Password is–
(C) Equal sign, Matching brackets, Function (A) Code by which a user gains access to a
Name computer system
(D) None of the above (B) Pass for viewing movie
8. If you see a small red triangle in the top right (C) Entrance without paying something
corner of a cell, it means there is something (D) All of the above
attached to the call. What is it? 16. The technique where digital signals are
(A) A comment (B) An attachment converted to its analog form for transmission
(C) An error (D) None of these over an analog facility is called.
9. Cache memory is– (A) Modulation (B) Digitization
(A) Smaller and faster than main storage (C) Multiprocessing (D) All of the above
(B) Bigger and slower than main storage 17. Narrowband channel is a communication
(C) Smaller but slower than main memory channels.
(D) Bigger and faster than main memory

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
43

(A) That handles low volumes of data (B) It manages all resources
(B) Used mainly for telegraph lines and low (C) It does all Memory management and Process
speed terminals management tasks
(C) Both (A) and (B) (D) All are true
(D) All of the above 22. All formula in Excel start with
18. MIME is an acronym for .... (A) % (B) +
(A) Multiprogramming Internet Mail Extension (C) = (D) –
(B) Multicasting Internet Mail Extension 23. Which of the following displays the contents of
(C) Multiple Internet Mail Extension the active cell?
(D) Multipurpose Internet Mail Extension (A) Active cell (B) Formula bar
19. The ______ Settings are automatic and standard. (C) Menu bar (D) Name box
(A) Default (B) CPU 24. Tab scrolling buttons -
(C) Peripheral (D) User-friendly (A) Allow you to view a different worksheet
20. Pop-ups are a form of ________on the World (B) Allow you to view additional worksheet row
Wide Web? down
(A) Instant Messaging (C) Allow you to view additional worksheet
(B) Search Engines columns to the right
(C) Browsers (D) Allow you to view additional sheet tabs
(D) Online Advertising 25. What is the keyboard shortcut for creating a chart
21. Which of the following is true about Operating from the selected cells?
System? (A) F3 (B) F5
(A) It is an interface between user and the (C) F7 (D) F11
computer.

Solution
1.(C) Series Calculator computes sum of a defined as 1,024 gigabytes (GB), while a
series over the given interval. It is capable petabyte consists of 1,024 TB.
of computing sums over finite, infinite 5.(A) Cache memory is an extremely fast
(inf) and parametrized sequencies (n). In memory type that acts as a buffer between
the cases where series cannot be reduced RAM and the CPU. It holds frequently
to a closed form expression an requested data and instructions so that
approximate answer could be obtained they are immediately available to the CPU
using definite integral calculator. when needed. Cache memory is used to
2.(D) EPROM (erasable programmable read- reduce the average time to access data
only memory) is programmable read-only from the Main memory.
memory (programmable ROM) that can 6.(C) Floppy disk is read and written using a
be erased and re-used. Erasure is caused floppy disk drive (FDD). Floppy disks
by shining an intense ultraviolet light were an almost universal data format from
through a window that is designed into the the late 1970s into the 1990s, used for
memory chip. primary data storage as well as for backup
3.(B) FPI is used to measure display device's and data transfers between computers.
performance. FPI stands for Frames per 7.(A) Equal sign, Function Name, Matching
inch. brackets
4.(A) A Terabyte (TB) is a measure of computer 8.(A) A comment is a note or annotation that an
storage capacity that is approximately 2 to author or reviewer can add to a document.
the 40th power, or 10 to the 12th power, Microsoft Word displays the comment in
which equals approximately a trillion the Reviewing pane or in a balloon in the
bytes. A Terabyte is more precisely margin of the document.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
44

9.(A) In order to be close to the processor, cache modulating signal that typically contains
memory needs to be much smaller than information to be transmitted.
main memory. Consequently, it has less 17.(A) In radio communications, a narrowband
storage space. Cache memory operates channel is a channel in which the
between 10 to 100 times faster than RAM, bandwidth of the message does not
requiring only a few nanoseconds to significantly exceed the channel's
respond to a CPU request. coherence bandwidth. In telephony,
10.(A) In computer engineering, computer narrowband is usually considered to cover
architecture is a set of rules and methods frequencies 300–3400 Hz.
that describe the functionality, 18.(D) Multipurpose Internet Mail Extensions is
organization, and implementation of an Internet standard that extends the
computer systems. Some definitions of format of email messages to support text
architecture define it as describing the in character sets other than ASCII, as well
capabilities and programming model of a as attachments of audio, video, images,
computer but not a particular and application programs.
implementation. 19.(A) In computer technology, a default (noun,
11.(A) BIOS (basic input/output system) is the pronounced dee-FAWLT) is a
program a personal computer's predesigned value or setting that is used
microprocessor uses to get the computer by a computer program when a value or
system started after you turn it on. It also setting is not specified by the program
manages data flow between the user. The program is said to default when
computer's operating system and attached it uses a default value or setting.
devices such as the hard disk, video 20.(D) A type of window that appears on top of
adapter, keyboard, mouse and printer. (over) the browser window of a Web site
12.(B) Binary Synchronous Communications that a user has visited. Pop-ups ads are
(BSC) is a half-duplex, character-oriented used extensively in advertising on the
data communications protocol originated Web, though advertising is not the only
by IBM in 1964. It includes control application for pop-up windows. A pop-
characters and procedures for controlling up ad is also referred to as a pop-up.
the establishment of a valid connection Pop-ups are a form of Online Advertising
and the transfer of data. Also called on the World Wide Web.
Bisync. 21.(D) An Operating system -
13.(B) A field test of the beta version of a product It is an interface between user and the
(such as software) especially by testers computer.
outside the company developing it that is It manages all resources
conducted prior to commercial release. It does all Memory management and
14.(A) Process management tasks
15.(A) A password, sometimes called a passcode, 22.(C) All Excel formulas begin with the equals
is a memorized secret, typically a string of sign, =, followed by a specific text tag
characters, usually used to confirm the denoting the formula you'd like Excel to
identity of a user. A Password is a word, perform. The SUM formula in Excel is
phrase, or string of characters intended to one of the most basic formulas you can
differentiate an authorized user or process enter into a spreadsheet, allowing you to
from an unauthorized user, or put another find the sum (or total) of two or more
way a password is used to prove one's values.
identity, or authorize access to a resource. 23.(B) The Formula Bar is where data or
16.(A) In electronics and telecommunications, formulas you enter into a worksheet
modulation is the process of varying one appear for the active cell. The Formula
or more properties of a periodic Bar can also be used to edit data or
waveform, called the carrier signal, with a formula in the active cell. The active cell

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
45

displays the results of its formula while we 25.(D) Excel allowed you to create a chart by
see the formula itself in the Formula Bar. selecting the data and pressing the F11
24.(D) The Sheet Tab Scroll Buttons are another key. In response, Excel created a default
means of navigating between sheets of the chart on a new sheet. You can also use the
workbook other than selecting a tab. The Alt+F1 shortcut, which creates a default
value of this functionality will become chart as a chart object embedded in the
more evident with the use of multiple current worksheet.
worksheets.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
46

Practice Set – 02

1. Which file starts MS Word? (A) Speech recognition


(A) Winword.exe (B) Word.exe (B) Handwriting recognition
(C) Msword.exe (D) Word2003.exe (C) Peripheral
2. __________ Means that a transaction is (D) All of the above
processed fast enough for the result to come back 9. Name the technique of processing transactions in
and be acted upon right away. random order.
(A) Real-time processing (A) Transaction processing
(B) Records processing (B) Batch processing
(C) Batch processing (C) Offline processing
(D) All of the above (D) Sequential file processing
3. One of the functions of the arithmetic logic unit 10. __________ uses an area of memory to
is to: temporarily store data from disk that the program
(A) Receive data from the registers might need soon.
(B) Convert negative numbers to hexadecimal (A) Data transferring (B) DVD
code (C) Disk caching (D) All of the above
(C) Send logical operations, such as AND or 11. What is a device that prevents electrical problems
NOT, to the alphabetic unit from affecting computer data files?
(D) Retrieve data from virtual memory (A) An incremental backup
4. Where can you find the horizontal split bar on (B) A full backup
MS Word screen? (C) A surge protector
(A) On the left of horizontal scroll bar (D) A differential backup
(B) On the right of horizontal scroll bar 12. What type of program lets you produce
(C) On the top of vertical scroll bar professional-looking documents containing both
(D) On the bottom of vertical scroll bar text and graphics?
5. What is defined as the number of bits that the (A) A page composer (B) A thesaurus
CPU processes as a unit? (C) A desktop publisher (D) A speller checker
(A) A computer sentence (B) A computer word 13. The letter and number of the intersecting column
(C) A computer phrase (D) A computer term and row is the:
6. __________ Systems use a light beam to scan (A) Cell coordinates (B) Cell location
input data and convert it into electrical signals, (C) Cell position (D) Cell address
which are sent to the computer for processing. 14. What is the standard query language supported
(A) Image recognition by most DBMSs?
(B) Optical recognition (A) Object-oriented language
(C) PDF (B) Report generator language
(D) Application (C) Structured Query Language (SQL)
7. What is any text that can be keyed in, such as a (D) Query-by-example (QBE)
memo? 15. Which of the following are three fundamental
(A) A database characteristics that make a computer useful?
(B) A spreadsheet (A) Lightweight, inexpensive, and sturdy
(C) A text document (B) Speed, reliability, and storage capability
(D) A business presentation (C) Durable, connectible, and renewable
8. __________ Devices accept the spoken word (D) All of the above
through a microphone and convert it into binary 16. Which of the following is an appropriate use of
code that can be understood by the computer. groupware?

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
47

(A) A top-secret project 21. The process of analyzing large data sets in search
(B) A highly classified project of new, previously undiscovered relationships is
(C) An individual employee project known as:
(D) A team project (A) Data Mining (B) Data Marting
17. Software used for database management can (C) Data maintenance (D) data warehousing
store data, update it, __________ it, retrieve it, 22. The focus of the first phase of the systems
report it, and print it. development life cycle is to:
(A) Manipulate (B) download (A) Design what the new system should do
(C) See (D) All of the above (B) Analyze and document the existing system
18. Which of the following is NOT a function of an (C) Identify problems and opportunities
operating system? (D) Implement the new system
(A) Executing and providing services for 23. Which of the following is a network in which
applications software computers are located physically close together,
(B) Managing the computer’s resources often in the same building?
(C) Establishing a user interface (A) WAN (B) PAN
(D) Formatting a word document (C) MAN (D) LAN
19. Which of the following helps describe the 24. What kind of server converts IP addresses to
Windows .NET Server? domain names?
(A) It is designed for different levels of network (A) File (B) DNS
complexity. (C) Email (D) P2P
(B) It is a direct upgrade from Windows NT. 25. Which of the following is NOT true about laptop
(C) It is designed to replace Novell’s Netware. computers?
(D) It has limited complexity. (A) They are typically more expensive than
20. In the OSI model, the actual transmission of data desktops.
is handled in the ____________ layer. (B) They are typically more expensive than
(A) Data link (B) Physical desktops.
(C) Network (D) Transport (C) They often have fewer components than PCs.
(D) They cannot be connected to a PC.

Solution
1.(A) Winword.exe is the executable file name 4.(C) On the top of vertical scroll bar we can
for Microsoft Word which is used when find the horizontal split bar on MS Word
Word is launched. screen.
2.(A) Real-time computing, or reactive 5.(B) A word is a fixed-sized piece of data
computing is the computer science term handled as a unit by the instruction set or
for hardware and software systems subject the hardware of the processor. The
to a "real-time constraint", for example number of bits in a word (the word size,
from event to system response. Real-time word width, or word length) is an
programs must guarantee response within important characteristic of any specific
specified time constraints, often referred processor design or computer architecture.
to as "deadlines". 6.(B) Optical character recognition or optical
3.(A) The arithmetic logical unit (ALU) carries character reader is the electronic or
out the logical operations such as mechanical conversion of images of
comparisons and arithmetic operations typed, handwritten or printed text into
such as addition and multiplication, machine-encoded text, whether from a
required during the program execution. scanned document, a photo of a document,
The ALU knows which operations to a scene-photo or from subtitle text
perform because it is controlled by signals superimposed on an image.
from the control unit.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
48

7.(C) Written, printed, or online document that deleting, and requesting information from
presents or communicates narrative or databases. SQL is an ANSI and ISO
tabulated data in the form of an article, standard, and is the de facto standard
letter, memorandum, memo, report, etc. database query language.
8.(A) Speech recognition is the capability of an 15.(B) The characteristics of computers that have
electronic device to understand spoken made them so powerful and universally
words. A microphone records a person's useful are speed, accuracy, diligence,
voice and the hardware converts the signal versatility and storage capacity. Let us
from analog sound waves to digital audio. discuss them briefly. Computers work at
The audio data is then processed by an incredible speed. A powerful computer
software, which interprets the sound as is capable of performing about 3-4 million
individual words. simple instructions per second.
9.(A) Transaction processing is information 16.(D) The project team is responsible for
processing in computer science that is contributing to the overall project
divided into individual, indivisible objectives and specific team deliverables,
operations called transactions. Each by contributing towards the planning of
transaction must succeed or fail as a project activities and executing assigned
complete unit; it can never be only tasks/work within the expected quality
partially complete. standards, to ensure the project is a
10.(C) A disk cache is a mechanism for success.
improving the time it takes to read from or 17.(A) Software used for database management
write to a hard disk. Today, the disk cache can store data, update it, manipulate it,
is usually included as part of the hard disk. retrieve it, report it, and print it.
A disk cache can also be a specified 18.(D) An Operating System (OS) is an interface
portion of random access memory between a computer user and computer
(RAM). hardware. An operating system is a
11.(C) An antistatic device is any device that software which performs all the basic
reduces, dampens, or otherwise inhibits tasks like file management, memory
electrostatic discharge; the buildup or management, process management,
discharge of static electricity, which can handling input and output, and controlling
damage electrical components such as peripheral devices such as disk drives and
computer hard drives, and even ignite printers. Others are-
flammable liquids and gases. Executing and providing services for
12.(C) Desktop publishers use publishing applications software
software to create various documents and Managing the computer’s resources
products, including financial reports, Establishing a user interface
business proposals, books, newspapers, 19.(A) Windows Server 2003 is a server
newsletters, packaging, tickets, and operating system produced by Microsoft
business cards. They format and combine and released on April 24, 2003, about 18
text, numerical data, photographs, months after the launch of the Windows
illustrations, charts, and other visual XP operating system. It is the successor to
elements. Windows 2000 Server and the predecessor
13.(D) A cell reference, or cell address, is an to Windows Server 2008. NET Enterprise
alphanumeric value used to identify a Server is a family of server products from
specific cell in a spreadsheet. Each cell Microsoft designed to build, integrate,
reference contains one or more letters manage and execute Web-based
followed by a number. The letter or letters enterprise applications in a faster and
identify the column and the number simpler way.
represents the row. 20.(B) The lowest layer of the OSI reference
14.(C) Structured Query Language (SQL) is a model is the physical layer. It is
specialized language for updating, responsible for the actual physical

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
49

connection between the devices. The one user to an enterprise network with
physical layer contains information in the thousands of users and devices in an office
form of bits. It is responsible for or school.
transmitting individual bits from one node 24.(B) DNS translates domain names to IP
to the next. addresses so browsers can load Internet
21.(A) Text analysis, often used synonymously resources. Each device connected to the
with text mining, is the process of Internet has a unique IP address which
analyzing chunk of unstructured data to other machines use to find the device.
find out previously undiscovered DNS servers eliminate the need for
information and insights that can be humans to memorize IP addresses such as
leveraged for informed decision making 192.168.
and other processes. 25.(D) A laptop is a computer designed for
22.(C) This first phase of the systems portability. Laptops are usually less than 3
development lifecycle, begins by inches thick, weigh less than 5 pounds and
identifying what the organization is trying can be powered by a battery. As such
to do and how they currently achieve it. laptops are designed for low power
This is generally a high level overview of consumption and are most often used
the entire system and its functional areas. when space is limited, such as on an
23.(D) A local area network (LAN) is a collection airplane. They are typically more
of devices connected together in one expensive than desktops. They are
physical location, such as a building, typically more expensive than desktops.
office, or home. A LAN can be small or They often have fewer components than
large, ranging from a home network with PCs.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
50

Practice Set – 03

1. On a CD-RW you can- 8. Which device cannot be shared in network?


(A) Read and write information (A) Floppy (B) Keyword
(B) Only read information (C) Computer (D) Printer
(C) Only write information 9. A right click on the desktop itself will........
(D) Read, write and rewrite information (A) Open the Display Properties dialog box
2. In computer terminology, information means (B) Show a context - sensitive menu
(A) Raw data (C) Open the Control Panel
(B) Data in more useful (D) Minimize all open applications
(C) Alphanumeric data 10. The advantage of using a spreadsheet is:
(D) Program (A) Calculations can be done automatically.
3. After a picture has been taken with a digital (B) Changing data automatically updates
camera and processed appropriately, the actual calculations
print of the picture is considered. (C) More flexibility
(A) Data (B) Input (D) All of the above
(C) Output (D) The process 11. Documentations should include…
4. What is output? (A) Destination and users of the output data
(A) What the processor takes from the user (B) Source of input data
(B) What the user gives to the processor (C) Information on the purpose of the workbook
(C) What the processor gets from the user (D) All of above
(D) What the processor gives to the user 12. To edit the selected cell in MS excel-
5. What is the main difference between a (A) Press F1 (B) Press F2
mainframe and a super computer? (C) Press F4 (D) Press F5
(A) Super computer is much larger than 13. You can convert existing Excel worksheet data
mainframe computers and charts to HTML document by using the
(B) Super computers are much smaller than (A) FTP Wizard
mainframe computers (B) Internet Assistant Wizard
(C) Supercomputers are focused to execute few (C) Intranet Wizard
programs as fast as possible while mainframe (D) Import Wizard
uses its power to execute as many programs 14. Which of the following storage media provides
concurrently sequential access only?
(D) Supercomputers are focused to execute as (A) Floppy disk (B) Magnetic disk
many programs as possible while mainframe (C) Magnetic tape (D) Optical disk
uses its power to execute few programs as fast as 15. What is the storage area for e-mail messages
possible called?
6. Programs such as Mozilla Firefox that serve as (A) A folder (B) A directory
navigable windows into the Web are (C) A mailbox (D) The hard disk
called….…… 16. The set of parallel electrical conducting lines
(A) Hypertext (B) Networks through which different components on the
(C) Internet (D) Web browsers mother board of a PC unit are linked together are
7. What is the function of Recycle Bin? called:
(A) Store deleted file (A) Conductors (B) Buses
(B) Store temporary file (C) Slide Master (D) Consecutives
(C) Store corrupted file 17. A PDA's memory contents remain intact when it
(D) Store Document file is turned off because:

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
51

(A) A battery keeps current available for RAM (B) PSTN is comprised of a variety of physical
(B) The memory contents are synchronized with media, including twisted pair and fiber optic
a desktop cable
(C) The memory contents are copied to flash (C) PSTN is exclusively a digital network system
cards (D) PSTN is only used for voice transmissions,
(D) The memory contents are stored in ROM while the Internet is used for data transmissions
18. A network of geographically distant computers 23. Which of the following best describes the
and terminals is called a- difference between the Internet and the World
(A) Integrated Services Digital Network (ISDN) Wide Web?
(B) Metropolitan area network (MAN). (A) The Internet is the collection of computers,
(C) Wide area network (WAN) while the World Wide Web is the wiring and
(D) Local area network (LAN) transmission protocols that connect them
19. One byte represents: (B) The Internet carries traffic for schools,
(A) Eight characters government offices, and other public
(B) Eight bits organizations, while the World Wide Web
(C) A single digit with two possible states carries commercial traffic
(D) A word (C) The Internet consists of software programs
20. Saving files in HTML format: such as e-mail and IRC, while the World Wide
(A) Makes it possible for anyone to view the file Web is a collection of Web pages
in a Web browser (D) The Internet is the physical network of global
(B) Increases file conversion costs computers, while the World Wide Web is many
(C) Decreases software compatibility hypertext documents distributed globally over
(D) All of the above many computers
21. Which of the following would NOT be 24. Which of the following runs on a user's local
performed with application software? computer and is used to request and display Web
(A) Financial report sent to investors pages?
(B) Hard disk cleanup (A) FTP (B) Web browser
(C) Charts for a sales meeting presentation (C) Web server (D) HTML
(D) Customer list used for mailing invoices 25. Which of the following computer types is most
22. Which of the following statements is TRUE powerful?
about the public switched telephone network (A) Professional workstation
(PSTN)? (B) Internet appliance
(A) PSTN is a packet-switching network (C) Desktop computer
(D) Network computer

Solution
1.(D) Because of this high reflectivity, CD-R and printing), output data can again be
discs can be read or played back in most perceived as information.
CD players and CD-ROM drives. 3.(C) After a picture has been taken with a
Compact Disc Rewriteable (CD-RW) is a digital camera and processed
fully rewriteable media, meaning that any appropriately, the actual print of the
spot on a CD-RW disc can be rewritten up picture is considered Output. For example,
to 1,000 times (based on the current the image shows an inkjet printer, an
standard). output device that can make a hard copy
2.(B) Information is stimuli that has meaning in of any information shown on your
some context for its receiver. When monitor, which is another example of an
information is entered into and stored in a output device. Monitors and printers are
computer, it is generally referred to as two of the most common output devices
data. After processing (such as formatting used with a computer. Types of output

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
52

devices. Using an unsuitable image buttons or keys to act as mechanical levers


resolution is one of the most common or electronic switches.
errors designers make when creating 9.(A) Display Properties dialog box: Your
designs for print. The result is a fuzzy desktop is the on-screen window area on
print quality, or having your file is which folders, files, icons, shortcuts may
rejected by your local printing company. appear. It is customized through the
4.(D) Output is defined as the act of producing properties menu selection. Properties are
something, the amount of something that settings that give information, status, and
is produced or the process in which options for almost every element of the
something is delivered. An example of Windows system.
output is the electricity produced by a 10.(D) Spreadsheets are an excellent tool that
power plant. An example of output is allows us to carry out extensive analysis.
producing 1,000 cases of a product. But for the easy retrieval and updating of
5.(C) Supercomputers are focused to executive data, efficiency, data consistency, data
few programs as fast as possible while integrity, speed, and security, relational
mainframe uses its power to executive as databases are definitely the structure to
many programs concurrently is the main opt for.
difference between a mainframe and a 11.(D) Documentation is any communicable
super computer. Thus, the primary focus material that is used to describe, explain or
of a supercomputer is speed, whereas for instruct regarding some attributes of an
a mainframe it is to deal with extensive object, system or procedure, such as its
amount of data. Mainframe computers are parts, assembly, installation, maintenance
not as powerful as supercomputers. A and use. Documentation can be provided
supercomputer is a very powerful on paper, online, or on digital or analog
computer. It is used for carrying out media, such as audio tape or CDs.
calculations at a very fast rate. Although 12.(B) First, the keyboard shortcut for editing a
we all think our mainframes are super, cell is F2 on Windows, and Control + U
mainframes and supercomputers are on a Mac. With Excel's default settings,
different on some fundamental levels. this will put your cursor directly in the
Here's why. Both mainframes and cell, ready to edit. You can also double-
supercomputers push the limits of what click a cell to edit.
can be accomplished through computing. 13.(B) The Internet Assistant for Excel is an add-
They are both large and powerful in wizard that allows you to create and
machines, but they are not the same thing. distribute Excel documents online for
6.(D) A web browser (commonly referred to as viewing with any popular browser. The
a browser) is a software application for Internet Assistant helps you convert your
accessing information on the World Wide spreadsheet data to HTML format.
Web. When a user requests a web page 14.(C) Magnetic tape data storage is a system for
from a particular website, the web browser storing digital information on magnetic
retrieves the necessary content from a web tape using digital recording. Initially,
server and then displays the page on the large open reels were the most common
user's device. format, but modern magnetic tape is most
7.(A) In computing, the trash (also known as the commonly packaged in cartridges and
Recycle Bin in Microsoft Windows and cassettes, such as the widely supported
by other names in other operating Linear Tape-Open.
systems) is temporary storage for files that 15.(C) A mailbox is the storage location of
have been deleted in a file manager by the electronic mail messages found on a
user, but not yet permanently erased from remote server or downloaded to the user's
the file system. hard drive. Software e-mail programs
8.(B) A computer keyboard is a typewriter-style commonly divide the mailbox into
device which uses an arrangement of

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
53

separate folders, notably the inbox, computer's hard drive. The utility first
outbox, sent items, and deleted items. searches and analyzes the hard drive for
16.(B) A bus is a high-speed internal connection. files that are no longer of any use, and then
Buses are used to send control signals and removes the unnecessary files.
data between the processor and other 22.(B) PSTN (public switched telephone
components. Three types of bus are used. network) is the world's collection of
Address bus - carries memory addresses interconnected voice-oriented public
from the processor to other components telephone networks. PSTN stands for
such as primary storage and input/output public switched telephone network, or the
devices. traditional circuit-switched telephone
17.(A) A personal digital assistant (PDA), also network. PSTN is comprised of a variety
known as a handheld PC, is a variety of physical media, including twisted pair
mobile device which functions as a and fiber optic cable.
personal information manager. Nearly all 23.(D) The Internet is a global network of
modern PDAs have the ability to connect networks while the Web, also referred
to the Internet. A PDA has an electronic formally as World Wide Web (www) is
visual display, letting it include a web collection of information which is
browser. accessed via the Internet. Another way to
18.(C) A network of geographically distant look at this difference is; the Internet is
computers and terminals is called a: wide infrastructure while the Web is service on
area network (WAN). top of that infrastructure. The Internet is
19.(B) The byte is a unit of digital information the physical network of global computers,
that most commonly consists of eight bits. while the World Wide Web is many
Historically, the byte was the number of hypertext documents distributed globally
bits used to encode a single character of over many computers.
text in a computer and for this reason it is 24.(B) A web browser (commonly referred to as
the smallest addressable unit of memory a browser) is a software application for
in many computer architectures. accessing information on the World Wide
20.(A) Hypertext Markup Language is the Web. When a user requests a web page
standard markup language for documents from a particular website, the web browser
designed to be displayed in a web retrieves the necessary content from a web
browser. It can be assisted by technologies server and then displays the page on the
such as Cascading Style Sheets and user's device.
scripting languages such as JavaScript. 25.(A) A workstation is a special computer
Saving files in HTML format makes it designed for technical or scientific
possible for anyone to view the file in a applications. Intended primarily to be
Web browser. used by one person at a time, they are
21.(B) Disk Clean-up is a computer maintenance commonly connected to a local area
utility included in Microsoft Windows network and run multi-user operating
designed to free up disk space on a systems.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
54

Practice Set – 04

1. Which of the following is the most frequently (A) Mac OS X


used input device? (B) Microsoft Windows XP
(A) Microphone (B) Scanner (C) UNIX
(C) Touch screen (D) Mouse (D) Linux
2. A modem is necessary if you want to- 10. What term is used to describe software that
(A) Add a scanner to your computer system monitors your online computer activities?
(B) Have voice mail added to your regular (A) Snooper ware (B) Spyware
telephone service (C) Tracker ware (D) Travel ware
(C) Connect to other computers or to the Internet 11. Which of the following is a memory
using phone line, cable, or wireless connections. management technique that makes the random
(D) Display digital camera photographs on your access memory appear larger than it is?
computer screen (A) Byte mapping
3. MS Excel is a? (B) Preemptive multitasking
(A) Window based word processor package (C) Read-only memory
(B) Window based spreadsheet package (D) Virtual memory
(C) DOS based spreadsheet package 12. The two major components of system software
(D) Window based accounting package are:
4. What is the flow of data between countries (A) The operating system and system utilities
commonly called? (B) Application software and system utilities
(A) International information system (C) Primary memory and storage
(B) EDIT (D) The operating system and applications
(C) Outsourcing software
(D) Trans border data flow 13. Which of the following may be necessary for you
5. Which of the following is NOT a purpose of to do after you install new application software?
antivirus programs? (A) Turn the computer power switch off and then
(A) Remove any identified viruses back on
(B) Copy the name of the virus and send it to (B) Do a cold boot
Microsoft for inspection (C) Press Shift + Alt + Del
(C) Notify a user if a virus is found (D) Do a warm boot
(D) Search for viruses 14. The power-on self-test _________
6. <H1> is an example of _____. (A) Checks for upgrades to the application
(A) HTML (B) GML software
(C) SGML (D) NSGML (B) Verifies that the computer hardware is
7. Which type of network requires HPNA adapters working properly
for communication between network nodes? (C) Is able to provide easy-to-follow on-screen
(A) Phone line (B) Wireless instructions to correct hardware problems
(C) Power line (D) Ethernet (D) Is conducted after the BIOS instructions are
8. To analyze vast quantities of scientific data and placed in memory
display underlying patterns, you would use a: 15. Input, processing, output, and storage are
(A) Mainframe (B) Server collectively referred to as:
(C) Supercomputer (D) Minicomputer (A) The systems cycle
9. The free, open-source operating system that is (B) The information processing cycle
becoming popular is: (C) The system unit

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
55

(D) Communication 21. All of the following are examples of real security
16. Which of the following is NOT part of the and privacy risks EXCEPT.
motherboard? (A) Hackers (B) Viruses
(A) System clock (B) Connector (C) Spam (D) Identity theft
(C) CPU (D) Chipset 22. Which of the following is not an example of
17. An example of a wireless medium that sends data hardware?
through the air or space is: (A) Scanner (B) Printer
(A) Fiber-Optic Cable. (B) Coaxial cable. (C) Monitor (D) Interpreter
(C) Twisted pair. (D) Microwaves. 23. In Excel, this is a prerecorded formula that
18. To reverse the effect of your last action in word- provides a shortcut for complex calculations.
(A) Use the cut command ...............
(B) Use the Undo command (A) Value (B) Data Series
(C) Press the delete key (C) Function (D) Field
(D) Use the Redo command 24. The process of trading goods over the Internet is
19. Information that comes from an external source known as ……….………
and fed into computer software is called……. (A) e-selling-n-buying (B) e-trading
(A) Output (B) Input (C) e-finance (D) e-commerce
(C) Throughput (D) Reports 25. A device that connects to a network without the
20. The basic unit of a worksheet into which you use of cables is said to be–
enter data in Excel is called a– (A) Distributed (B) Free
(A) Tab (B) Box (C) Centralized (D) Open source
(C) Range (D) Cell

Solution
1.(C) A touch screen is a computer display would normally be stored or repro- cessed
screen that is also an input device. The in a country other than the originating
screens are sensitive to pressure; a user country. The essence of trans- border data
interacts with the computer by touching flows is that information is transferred in
pictures or words on the screen. a machine-readable form.
2.(C) A modem – a portmanteau of "modulator- 5.(B) Antivirus software is a program or set of
demodulator" – is a hardware device that programs that are designed to prevent,
converts data from a digital format, search for, detect, and remove software
intended for communication directly viruses, and other malicious software like
between devices with specialized wiring, worms, trojans, adware, and more.
into one suitable for a transmission 6.(A) The h1 is an HTML tag that indicates a
medium such as telephone lines or radio. heading on a website. Most websites use
A modem is necessary if you want to this language to create web pages. Tag —
Connect to other computers or to the An HTML tag is a snippet of code that
Internet using phone line, cable, or tells your web browser how to display the
wireless connections. content. Heading — HTML has six
3.(B) MS Excel is a software program created different heading tags — h1, h2, and so
by Microsoft that uses spreadsheets to on.
organize numbers and data with formulas 7.(A) Ethernet is a family of computer
and functions. Excel analysis is ubiquitous networking technologies commonly used
around the world and used by businesses in local area networks, metropolitan area
of all sizes to perform financial analysis. networks and wide area networks. It was
4.(D) A trans-border data flow (TDF) is the commercially introduced in 1980 and first
transfer of data across a national border by standardized in 1983 as IEEE 802.3.
anyone of a variety of media. Such data

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
56

8.(C) Mainframes (also called "big iron") are processing, (C) storage and (D) output.
powerful computers used for large The input stage can be further broken
information processing jobs. They are down into acquisition, data entry and
mainly used by government institutions validation.
and large companies for tasks such as 16.(B) A simple device that physically links,
census, industry and consumer statistics, couples, or connects, two things together.
enterprise resource planning, and financial A male connector has pins that fit into the
transaction processing. sockets, or receptacles, of a female
9.(D) Linux is the best-known and most-used connector, as the connectors mate. A male
open source operating system. As an connector sometimes is referred to as a
operating system, Linux is software that plug, and a female connector as a jack.
sits underneath all of the other software on 17.(D) Microwaves are widely used in modern
a computer, receiving requests from those technology, for example in point-to-point
programs and relaying these requests to communication links, wireless networks,
the computer's hardware. microwave radio relay networks, radar,
10.(B) Spyware describes software with satellite and spacecraft communication,
malicious behavior that aims to gather medical diathermy and cancer treatment,
information about a person or remote sensing, radio astronomy, particle
organization and send such information to accelerators, spectroscopy, industrial.
another entity in a way that harms the user; 18.(B) In most Microsoft Windows applications,
for example by violating their privacy or the keyboard shortcut for the Undo
endangering their device's security. command is Ctrl+Z or Alt+Backspace,
11.(D) A computer can address more memory and the shortcut for Redo is Ctrl+Y or
than the amount physically installed on Ctrl+Shift+Z. In most Apple Macintosh
the system. This extra memory is actually applications, the shortcut for the Undo
called virtual memory and it is a section of command is Command-Z, and the
a hard disk that's set up to emulate the shortcut for Redo is Command-Shift-Z or
computer's RAM. First, it allows us to Command-Y.
extend the use of physical memory by 19.(B) In computer science, the general meaning
using disk. of input is to provide or give something to
12.(A) Your system has three basic types of the computer, in other words, when a
software: application programs, device computer or device is receiving a
drivers, and operating systems. Each type command or signal from outer sources, the
of software performs a completely event is referred to as input to the device.
different job, but all three work closely 20.(D) In Microsoft Excel, a cell is a rectangular
together to perform useful work. box that occurs at the intersection of a
13.(D) A warm boot is sometimes necessary vertical column and a horizontal row in a
when a program encounters an error from worksheet. A cell can only store 1 piece of
which it cannot recover. On PCs, you can data at a time. You can store data in a cell
perform a warm boot by pressing the such as a formula, text value, numeric
Control, Alt, and Delete keys value, or date value.
simultaneously. On Macs, you can 21.(C) Spam is any kind of unwanted, unsolicited
perform a warm boot by pressing the digital communication, often an email,
Restart button. that gets sent out in bulk. Spam can also
14.(B) This is done to make sure that other parts be found on Internet forums, text
of computer are working properly or not. messages, blog comments, and social
It then checks if Rebooting is necessary or media.
not, if not it does a Read/write test for 22.(D) Interpreter is a program that executes
RAM. instructions written in a high-level
15.(B) The sequence of events in processing language. There are two ways to run
information, which includes (A) input, (B) programs written in a high-level language.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
57

The most common is to compile the 24.(D) E-commerce (electronic commerce) is the
program; the other method is to pass the buying and selling of goods and services,
program through an interpreter. or the transmitting of funds or data, over
23.(C) A formula is an expression which an electronic network, primarily the
calculates the value of a cell. Functions internet. These business transactions
are predefined formulas and are already occur either as business-to-business
available in Excel. For example, cell A3 (B2B), business-to-consumer (B2C),
below contains a formula which adds the consumer-to-consumer or consumer-to-
value of cell A2 to the value of cell A1. business.
25.(B)

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
58

Practice Set – 05

1. Which of the following is a circuit that issue 11. When you insert an Excel file into a Word
signals at regular intervals...? document, the data are
(A) Circuit board (B) Clock (A) Hyperlinked
(C) Circuit card (D) Gates (B) Placed in a word table
2. A set of related programs are known as - (C) Linked
(A) File (B) Arrays (D) Embedded
(C) Package (D) Subscripts 12. A function inside another function is called a
3. The 0 and 1 in the binary number system are ________ Function.
called binary digits or .... (A) Nested (B) Round
(A) Bytes (B) Kilobytes (C) Sum (D) Text
(C) Decimal bytes (D) Bits 13. Selects the entire Row press –
4. The 7-bit ASCII code widely used (A) Shift + Space (B) Shift + ctrl
(A) For data communication work (C) Shift + alt (D) Space + enter
(B) In IBM mainframe models 14. In Assembly language _________.
(C) For coding external memory (A) Mnemonics are used to code operations
(D) In large machines produced by non-IBM (B) Alphanumeric symbols are used for
vendors addresses
5. A hard copy would be prepared on a- (C) Language lies between high-level language
(A) Line printer (B) Dot matrix printer and machine language
(C) Type writer terminal (D) Plotter (D) All of the above
6. Which of the following animations cannot be 15. CPU capacity can be measured in__.
done in PowerPoint? (A) BPS (B) MIPS
(A) Bullet list, revealed one bullet point at a time (C) MHz (D) MPI
(B) Clip art - Fly in from the bottom 16. "Zipping" a file means-
(C) Table, revealed row by row (A) Encrypting the message
(D) Chart, revealed by series (B) Compressing the message
7. Several views are available in MS Front Page. (C) Transfer the message
Which one of the following is NOT a valid view? (D) All of these
(A) Design View (B) Folders View 17. A __________ shares hardware, software, and
(C) Navigation View (D) Web Server View data among authorized users.
8. One of the components of central processing unit (A) Network (B) Protocol
(CPU) of the computer that performs (C) Hyperlink (D) Transmitter
mathematical and logical operations is ... 18. To produce a high - quality graphics (hardcopy)
(A) ALU (arithmetic logical unit) in color, you would want to use a….
(B) Address register (A) Virtual Printer (B) Laser Printer
(C) Analog (C) Ink - jet Printer (D) Plotter
(D) All of the above 19. Thesaurus tool in MS Word is used for-
9. ________is the key we use to run the selected (A) Spelling suggestions (B) Grammar options
command (C) Synonyms and Antonyms words
(A) SHIFT (B) TAB (D) All of above
(C) ENTER (D) CTRL 20. What is the smallest and largest font size
10. To name a constant, you use the __dialog box. available in Font Size tool on formatting toolbar?
(A) Create names (B) Define name (A) 8 and 72 (B) 8 and 64
(C) Paste name (D) Format cells (C) 12 and 72 (D) None of above

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
59

21. Aligns the selected text or line to justify the (C) Duplicate data
screen press------- (D) Data inconsistency
(A) Ctrl + c (B) Ctrl + I 24. Granting an outside organization access to
(C) Ctrl + J (D) Ctrl + k internet web pages is often implemented using
22. Which of the following is different from other? a(n)?
(A) Internet (B) Windows (A) Extranet (B) Intranet
(C) Unix (D) Linux (C) Internet (D) Hacker
23. When data changes in multiple lists and all lists 25. Loading Operating System onto RAM is called?
are not updated, this causes? (A) Printing (B) Saving
(A) Data redundancy (C) Booting (D) Staring
(B) Information overload
Solution
1.(B) A clock generator is an electronic Draft view
oscillator (circuit) that produces a clock Web layout
signal for use in synchronizing a circuit's 8.(A) An arithmetic logic unit (ALU) is a digital
operation. The clock generator in a circuit used to perform arithmetic and
motherboard is often changed by logic operations. It represents the
computer enthusiasts to control the speed fundamental building block of the central
of their CPU, FSB, GPU and RAM. processing unit (CPU) of a computer.
2.(C) Computer software, or simply software, or 9.(C) Also called the "Return key," it is the
package is a collection of data or computer keyboard key that is pressed to signal the
instructions that tell the computer how to computer to input the line of data or the
work. This is in contrast to physical command that has just been typed. The
hardware, from which the system is built Enter key was originally the "Return key"
and actually performs the work. on a typewriter, which caused the carriage
3.(D) The bit is a basic unit of information in to return to the beginning of the next line
computing and digital communications. on the paper.
The name is a portmanteau of binary digit. 10.(B) To name a constant, you use the Define
The bit represents a logical state with one name dialog box. On the Formulas tab, in
of two possible values. A single binary the Defined Names group, click Define
digit (like "0" or "1") is called a "bit". Name. In the New Name dialog box, in the
4.(A) Because digital computers use eight-bit Name box, type the name that you want to
bytes, the ASCII code is commonly use for your reference. Note: Names can
embedded in an eight-bit field consisting be up to 255 characters in length.
of the seven information bits and a parity 11.(B) When we insert an excel file into a word
bit that is used for error-checking document and keep the source file linkage
purposes or to represent special symbols. when data is updated in source file update
5.(D) A hard copy would be prepared on each data in liked file also. When you insert an
type of printer- Line printer Excel file into a Word document, the data
Dot matrix printer are placed in a word table.
Typewriter terminal 12.(A) Nested functions are used in many
Plotter approaches to structured programming,
6.(C) PowerPoint can't use animation including early ones, such as ALGOL,
animations in table to revealed it row by Simula 67 and Pascal, and also in many
row. modern dynamic languages and functional
7.(D) In Word, you can view a document in a languages. However, they are traditionally
variety of ways: Print Layout view not supported in the (originally simple) C-
Full Screen Reading view family of languages.
Web Layout view

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
60

13.(A) click on any cell in the column and then hard copy of the output. It draws pictures
press Ctrl + Space. Select the row number on a paper using a pen.
to select the entire row. Or click on any 19.(C)
cell in the row and then press Shift + 20.(A) Using the thesaurus, we can find
Space. synonyms (different words with the same
14.(D) In computer programming, assembly meaning) and antonyms (words with the
language (or assembler language), often opposite meaning). In Microsoft Office
abbreviated asm, is any low-level Word you can look up a word quickly if
programming language in which there is a we right-click anywhere in our document,
very strong correspondence between the and then click Synonym on the shortcut
instructions in the language and the menu.
architecture's machine code instructions. 21.(C) To make text justified, select and highlight
15.(C) CPU processing capacity is typically the text first, then hold down Ctrl (the
referred to in terms of Megahertz (MHz) control key) on the keyboard and then
or Gigahertz (GHz). Professionals talk press J. To make the text left aligned
about clock speed, which is the standard again, press and hold down Ctrl on the
ability of the CPU to cycle through its keyboard and press L.
operations over time. 22.(A) The Internet (or internet) is the global
16.(B) "Zipping" one or more files creates a system of interconnected computer
compressed archive that takes up less disk networks that uses the Internet protocol
space than the uncompressed version. It is suite (TCP/IP) to communicate between
useful for backing up files and reducing networks and devices. While, Microsoft
the size of data transferred over the Windows, commonly referred to as
Internet. An archive compressed with Windows, is a group of several proprietary
standard Zip compression has a. ZIP file graphical operating system families, all of
extension — for example, Archive. which are developed and marketed by
17.(A) A Network shares hardware, software, and Microsoft. Each family caters to a certain
data among authorized users. A network sector of the computing industry.
consists of two or more computers that are 23.(D) Data inconsistency is different and
linked in order to share resources (such as conflicting version of same data occurs at
printers and CDs), exchange files, or different place.it occurs between file when
allow electronic communications. The similar data is kept in different format in
computers on a network may be linked two different files or when matching of
through cables, telephone lines, radio data must be done between files.
waves, satellites, or infrared light beams. 24.(A) Much like the intranet, it allows for
18.(D) To produce high quality graphics private communication, document and
(hardcopy) in color, you would want to knowledge sharing, and transfers between
use an Plotter. The plotter is a computer crucial external partners and an
printer for printing vector graphics. In the organization. A good example of an
past, plotters were used in applications extranet network would be Sharepoint.
such as computer-aided design, though Extranets act as a system of engagement
they have generally been replaced with for your business's prospective clients.
wide-format conventional printers. A 25.(C) In computing, booting is the process of
plotter gives a hard copy of the output. It starting a computer. It can be initiated by
draws pictures on a paper using a pen. The hardware such as a button press, or by a
plotter is a computer printer for printing software command. After it is switched
vector graphics. In the past, plotters were on, a computer's central processing unit
used in applications such as computer- (CPU) has no software in its main
aided design, though they have generally memory, so some process must load
been replaced with wide-format software into memory before it can be
conventional printers. A plotter gives a executed.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
61

Practice Set – 06

1. The purpose of the primary key in a database is (A) Function (B) Control
to: - (C) Arrow (D) Space bar
(A) Unlock the database 10. What is MP3?
(B) Provide a map of the data (A) A mouse (B) A Printer
(C) Uniquely identify a record (C) A Sound format (D) A Scanner
(D) Establish constraints on database operations 11. ____________ is a process that permits multiple
2. Using Windows Explorer, a plus (+) sign in front computers to use the same IP address and hide
of a folder indicates— their actual IP addresses from the Internet.
(A) An open folder (A) Routing
(B) The folder contains subfolders. (B) Network address translation (NAT)
(C) A text file. (C) Signature referencing
(D) a graphics file (D) Packet filtering
3. All of the following statements concerning 12. What characteristic of (ROM) makes it useful?
windows are true EXCEPT— (A) ROM information can be easily updated.
(A) Windows are an example of a command- (B) Data in ROM is nonvolatile, that is, it
driven environment. remains there even without electrical power.
(B) Windows can be resized and repositioned on (C) ROM provides very large amounts of
the desktop. inexpensive data storage.
(C) More than one window can be open at a time. (D) ROM chips are easily swapped between
(D) Toolbars and scrollbars are features of different brands of computers.
windows. 13. Data representation is based on the ______
4. The memory resident portion of the operating number system, which uses two numbers to
system is called the— represent all data.
(A) Registry (B) API (A) Binary (B) Biometric
(C) CMOS (D) Kernel (C) Bicentennial (D) Byte
5. The BIOS is stored in: 14. To what temporary area can you store text and
(A) RAM (B) ROM other data, and later paste them to another
(C) The CPU (D) The hard drive location?
6. Which of the following is not a tower? (A) The clipboard (B) ROM
(A) CPU (B) Motherboard (C) CD-ROM (D) The hard disk
(C) Peripheral (D) All of the above 15. Classes, instances, and methods are
7. The horizontal and vertical lines on a worksheet characteristics of:
are called— (A) Testing plan construction
(A) Cells (B) Sheets (B) Artificial intelligence techniques
(C) Block lines (D) Gridlines (C) Object-oriented design
8. What is usually used for displaying information (D) Flowcharts and pseudo code
at public places? 16. Which of the following correctly describes the
(A) Monitors CD-R and DVD-R discs?
(B) Overhead Projections (A) You may record data to the disc surface
(C) Monitors and Overhead Projections multiple times and can read the current contents
(D) Touch Screen Kiosks at any time.
9. Which key is used in combination with another (B) You may read data from the disc but may not
key to perform a specific task? alter its contents.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
62

(C) You may record data to the disc surface (A) SDRAM (B) PROM
multiple times but have no direct reading (C) ROM (D) EEPROM
capability. 22. _____ is the basic language of web page writing.
(D) You may record data to the disc surface once (A) Generalized markup language
and then may only read its contents (B) Standard generalized markup language
17. To move down a page in a document _________ (C) Nonstandard generalized markup language
(A) Jump (B) Fly (D) Hypertext markup language
(C) Wriggle (D) Scroll 23. The topology where all the nodes are attached in
18. CD-ROM stands for____ a circular wiring arrangement is called a:
(A) Central Processing Unit (A) Star topology. (B) Bus topology.
(B) CD-remote open mouse (C) Network topology. (D) Ring topology
(C) CD-resize or minimize 24. Hard disk performance can be improved by using
(D) CD-read only memory a(n):
19. Use this when you want to make all letters capital (A) Optimal storage device
without having to use the shift key for each (B) Disk cache.
character. (C) Solid-state storage device.
(A) Shifter (B) Upper case (D) Flash memory reader
(C) Caps lock key (D) Icon 25. Which is NOT a characteristic of a system unit?
20. _________ is a program that has been physically (A) Provides a sturdy frame for mounting
etched onto a chip. internal components
(A) Firmware (B) Software (B) Provides room for system upgrades
(C) Compiler (D) Interpreter (C) Represents data as binary numbers
21. The type of memory that must have a constant (D) Houses the connectors for input and output
power supply is: devices

Solution
1.(B) A primary key is a field in a table which can be rewritten without removing the
uniquely identifies each row/record in a chip from the motherboard.
database table. Primary keys must contain 6.(C) A computer case, also known as a
unique values. A table can have only one computer chassis, tower, system unit, or
primary key, which may consist of single cabinet, is the enclosure that contains most
or multiple fields. When multiple fields of the components of a personal computer
are used as a primary key, they are called (usually excluding the display, keyboard,
a composite key. and mouse).
2.(B) In left pane of the Windows Explorer, plus 7.(D) Alternatively referred to as a column
(+) symbol indicates that there are separator or row separator, Grid lines or
additional sub folders in the folder. gridlines are the light gray lines that divide
3.(A) each of the cells, rows, and columns in a
4.(D) A kernel is the foundational layer of an spreadsheet.
operating system (OS). It functions at a 8.(D) A touch screen information kiosk is
basic level, communicating with hardware fundamentally an input device housed in a
and managing resources, such as RAM special container that functions through
and the CPU. Since a kernel handles many physical touch upon the touch screen. By
fundamental processes, it must be loaded simply touching the display screen, users
at the beginning of the boot sequence can perform various functions.
when a computer starts up. 9.(B) Control key is used in combination with
5.(B) In modern computer systems, the BIOS another key to perform a specific task.
contents are stored on flash memory so it These keys are used alone or in
combination with other keys to perform

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
63

certain actions. The most frequently used a computer (words, pictures, movies,
control keys are CTRL, ALT, the sound) is stored and transmitted as
Windows logo key, and ESC. Function sequences of bits, or binary digits. Data
keys. A modifier key modifies the action representation is based on the number
of another key when the keys are pressed system, which uses two numbers to
at the same time. Common modifier keys represent all data.
include Shift, Function, Control, Alt, 14.(A) The clipboard is a data buffer used for
Command, and Option. The Shift key is short-term data storage and/or data
found on all keyboards, while the other transfer between documents
keys may be exclusive to laptops or or applications used by cut, copy and paste
Windows or Macintosh computers. In operations and provided by the operating
computing, a Control key is a modifier system.
key which, when pressed in conjunction 15.(C) Object-oriented design is the process of
with another key, performs a special planning a system of interacting objects
operation (for example, Ctrl + C); similar for the purpose of solving a software
to the Shift key, the Control key rarely problem. It is one approach to software
performs any function when pressed by design.
itself. A command issued by pressing a 16.(D) Stands for "Digital Versatile Disc
keyboard character in conjunction with Recordable." A DVD-R looks the same as
the Control key. Manuals usually a regular DVD, but like a CD-R, it can be
represent control key commands with the used to record data. Once a DVD-R has
prefix CTRL- or CNTL-. For example, been "burned," or written to, it cannot be
CTRL-N means the Control key and N written to again. Most DVD players and
pressed at the same time. DVD-ROM drives can read DVD-R discs.
10.(C) MP3 stands for Moving Pictures Experts 17.(D) To move down a page in a document
Group, Standard One, Audio Layer 3; it Scroll. In computer displays, filmmaking,
was developed to compress audio for television production, and other kinetic
storage and playback on digital devices. It displays, scrolling is sliding text, images
essentially works by stripping out or or video across a monitor or display,
hiding recorded sounds that are near, or vertically or horizontally.
beyond, the threshold of human hearing. 18.(D) A CD-ROM is a pre-pressed optical
11.(B) Network address translation (NAT) is a compact disc that contains data.
method of remapping an IP address space Computers can read—but not write to or
into another by modifying network erase—CD-ROMs, i.e. it is a type of read-
address information in the IP header of only memory.
packets while they are in transit across a 19.(C) Caps Lock is a button on a computer
traffic routing device. keyboard that causes all letters of Latin
12.(B) Read only memory that is ROM has some and Cyrillic based scripts to be generated
characteristics which make it useful. in capital letters. It is a toggle key: each
Those characteristics are data in ROM is press reverses its action. Some keyboards
nonvolatile, that is it remains there even also implement a light, to give visual
without electrical power. it can store data feedback about whether it is on or off.
for a long period of time. Once data is 20.(A) Firmware is a software program or set of
stored it cannot be edited but only be instructions programmed on a hardware
retrieved which is good for security device. It provides the necessary
purpose and if you want to edit the data instructions for how the device
then it should be special type of ROM. communicates with the other computer
hardware.
13.(A) The binary number system is a base-2 21.(A) SDRAM (synchronous DRAM) is a
number system. This means it only has generic name for various kinds of
two numbers: 0 and 1. All information in dynamic random access memory

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
64

(DRAM) that are synchronized with the closed path to create Ring network. In the
clock speed that the microprocessor is coming sections, definition, examples,
optimized for. This tends to increase the advantages and disadvantages of Ring
number of instructions that the processor Network Topology will be discussed.
can perform in a given time. 24.(B) The following tips can help in boosting the
22.(D) Hyper Text Markup Language (HTML) is speed of your hard drive. Scan and clean
the set of markup symbols or codes your hard disk on a regular basis.
inserted into a file intended for display on Defragment your hard disk from time to
the Internet. The markup tells web time. Reinstall your Windows Operating
browsers how to display a web page's System after every few months.
words and images. 25.(C)
23.(D) Ring topology is a type of network
topology where nodes are connected in

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
65

Practice Set – 07

1. Where are the Editing group and the Replace (C) Hard Disk
command found? (D) Half-inch Tape Cartridge
(A) On the Insert tab (B) On the Review tab 11. _________ Types of virus that stays permanently
(C) On the View tab (D) On the Home tab in the RAM memory
2. What function displays row data in a column or (A) Resident (B) File infectors
column data in a row? (C) Boot virus (D) Macro virus
(A) Hyperlink (B) Index 12. Which of the following groups contains
(C) Transpose (D) Rows graphical file extensions?
3. This type of software contains rows and columns. (A) JPG, CPX, GCM (B) GIF, TCF, WMF
(A) Drawing (B) Spreadsheet (C) TCP, JPG, BMP (D) JPG, GIF, BMP
(C) Database (D) Word processing 13. A number system with a base of two is referred
4. Software for organizing storage and retrieval of as-
information is a(n)— (A) Unary number system
(A) Operating system (B) Database (B) Binary number system
(C) Database program (D) Data warehouse (C) Octal number system
5. To insert a word into the middle of a sentence- (D) All of the above
(A) Move the cursor to the desired location in the 14. Which of the following is not true for primary
sentence and type the new word storage?
(B) Move the cursor to the desired location in the (A) It is a part of the CPU
sentence, press Enter key, and type the new word (B) It allows very fast access of data
(C) Move the cursor to the beginning of the (C) It is relatively more expensive than other
sentence and start typing storage devices.
(D) Retype the whole sentence (D) Can be removed and transported.
6. A DVD is an example of a(n) – 15. Which of the following is the advantage of
(A) Hard disk Assembly language over Machine language?
(B) Optical disc (A) Easy to use (B) Easy to understand
(C) Output device (C) Easy to modify (D) All the above
(D) Solid-state storage device 16. VPN stands for_______.
7. Grouping and processing all of a firm's (A) Virtual Personal Network
transactions at one time is called– (B) Very Private Network
(A) A database management system (C) Virtual Private Network
(B) Batch processing (D) Vicious Personal Network
(C) A real-time system 17. Which of the following is true about Dial-up
(D) An on-line system internet access?
8. Semi-Conductor Memory is known as? (A) It utilizes the existing telephone services
(A) RAM (B) ROM (B) It uses a router for security
(C) PROM (D) EPROM (C) It utilizes the broadband technology
9. Every computer on the Internet is known as? (D) Modem speeds are very fast
(A) Host (B) Client 18. Which of the following memories can be read
(C) Modem (D) Server directly by the computer processor?
10. A spiral shape track formatting is present in (A) Hard Disk (B) Main Memory
(A) Floppy Disk (C) CD (D) DVD
(B) Optical Disk

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
66

19. The communication between a processor and (A) Controls the rest of the computer's
other devices inside the computer is done components
through? (B) Keeps the system unit cool
(A) Bus (B) Channel (C) Processes data
(C) Network Cable (D) Chip (D) Interprets instructions given by software
20. Who is/are the founders of Microsoft? 23. To connect to a WAN, you must have:
(A) Bill Gates (A) CSMA/CD (B) Wi-Fi
(B) Bill Gates and Allen Paul (C) TCP/IP (D) POP
(C) Steve Jobs 24. During the ____ operation, the control unit
(D) Bill Gates and Steve Jobs determines what the program is telling the
21. If a memory chip is volatile, it will....... computer to do.
(A) Explode if exposed to high temperatures (A) Fetch (B) Execute
(B) Lose its contents if current is turned off (C) Decode (D) Arithmetic
(C) Be used for data storage only 25. __________ has a large storage capacity, up to
(D) Be used to both read and write data 17 GB if both layers and both sides are used.
22. Which is NOT a function of a microprocessor? (A) DVD-ROM (B) CD-ROM
(C) Floppy (D) RAM

Solution
1.(D) Go to the "Home" tab menu on the Ribbon location in the sentence and type the new
of Microsoft Word 2007/2010/2013, at the word.
furthest right of the group is the "Editing" 6.(B) The definition of a DVD, which stands for
options. Click the Editing item, a popup digital video disc, is an optical disc that
menu will appear and now you can see the can store large quantities of digital
"Find" and "Replace" items at the top of material such as sound, images and data.
the box. An example of a DVD is the disc that
2.(C) The TRANSPOSE function returns a contains prerecorded movies that people
vertical range of cells as a horizontal watch in their homes. "DVD."
range, or vice versa. The TRANSPOSE 7.(B) The OS defines a job which has
function must be entered as an array predefined sequence of commands,
formula in a range that has the same programs and data as a single unit. The OS
number of rows and columns, keeps a number a jobs in memory and
respectively, as the source range has executes them without any manual
columns and rows. information. Jobs are processed in the
3.(B) A spreadsheet is a file that exists of cells order of submission, i.e., first come first
in rows and columns and can help arrange, served fashion.
calculate and sort data. Data in a 8.(A) Semiconductor memory is a digital
spreadsheet can be numeric values, as well electronic semiconductor device used for
as text, formulas, references and digital data storage, such as computer
functions. memory. Non-volatile memory (such as
4.(C) A database program is the heart of a EPROM, EEPROM and flash memory)
business information system and provides uses floating-gate memory cells, which
file creation, data entry, update, query and consist of a single transistor per cell.
reporting functions. The traditional term 9.(A) Every computer on the internet needs a
for database software is "database string called Internet Protocol (IP address)
management system" (see DBMS). to perform its work. So Every computer
5.(A) To insert a word into the middle of a on the internet is known as Host.
sentence move the cursor to the desired 10.(B) An optical disk is any computer disk that
uses optical storage techniques and

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
67

technology to read and write data. It is a 18.(B) The main memory is defined as the central
computer storage disk that stores data storage in a computer. An example of the
digitally and uses laser beams (transmitted main memory is where programs and data
from a laser head mounted on an optical are kept. In computing, memory refers to
disk drive) to read and write data. a device that is used to store information
11.(A) A resident virus is a computer virus that for immediate use in a computer or related
stores itself within memory, allowing it to computer hardware device. It typically
infect other files even when the originally refers to semiconductor memory,
infected program is no longer running. specifically metal–oxide–semiconductor
Being stored in memory allows the virus memory, where data is stored within MOS
to spread easier because it has more access memory cells on a silicon integrated
to other parts of the computer. circuit chip.
12.(D) Graphic images are stored digitally using 19.(A) In computer architecture, a bus (a
a small number of standardized graphic contraction of the Latin omnibus) is a
file formats, including bit map, TIFF, communication system that transfers data
JPEG, GIF, PNG; they can also be stored between components inside a computer,
as raw, unprocessed data. or between computers.
13.(B) In mathematics and digital electronics, a 20.(B) Microsoft Corporation is an American
binary number is a number expressed in multinational technology company with
the base-2 numeral system or binary headquarters in Redmond, Washington. It
numeral system, which uses only two develops, manufactures, licenses,
symbols: typically, "0" and "1". supports, and sells computer software,
14.(A) Primary storage (also known as main consumer electronics, personal
memory) is the component of the computers, and related services.
computer that holds data, programs and 21.(B) Volatile memory, in contrast to non-
instructions that are currently in use. volatile memory, is computer memory
Primary storage is located on the that requires power to maintain the stored
motherboard. random access memory information; it retains its contents while
(RAM) flash memory. powered on but when the power is
15.(D) The symbolic programming of Assembly interrupted, the stored data is quickly lost.
Language is easier to understand and Volatile memory has several uses
saves a lot of time and effort of the including as primary storage.
programmer. It is easier to correct errors 22.(B) A microprocessor is an integrated circuit
and modify program instructions. designed to function as the CPU of a
Assembly Language has the same microcomputer. Functions of
efficiency of execution as the machine Microprocessor
level language. Controlling all other parts of the machine
16.(C) A virtual private network (VPN) extends and sending timing signals.
a private network across a public network Transferring data between memory and
and enables users to send and receive data I/O devices.
across shared or public networks as if their Fetching data and instructions from
computing devices were directly memory.
connected to the private network. Decoding instruction.
17.(A) Dial-up Internet access is a form of Performing arithmetical and logical
Internet access that uses the facilities of operations.
the public switched telephone network to Executing programs stored in memory.
establish a connection to an Internet Performing communication among the
service provider by dialing a telephone I/O devices etc.
number on a conventional telephone line. 23.(D) A point of presence (PoP) is a demarcation
Dial-up internet access utilizes the point, access point, or physical location at
existing telephone services. which two or more networks or

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
68

communication devices share a fetched from the memory is decoded for


connection. the next steps and moved to the
24.(C) The decoding process allows the CPU to appropriate registers.
determine what instruction is to be 25.(A) As a result, the DVD specification
performed so that the CPU can tell how provided a storage capacity of 4.7 GB for
many operands it needs to fetch in order to a single-layered, single-sided disc and 8.5
perform the instruction. The opcode GB for a dual-layered, single-sided disc.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
69

Practice Set – 08

1. LISP is designed for ____ (C) Character User interface


(A) GUI (B) AI (D) Ms-Dos
(C) CUI (D) Transistor 11. _______ virus take up residence in the Computer
2. Computer language used for scientific memory, making them hard to detect
calculation is CALLED? (A) Worms (B) Macro
(A) FORTAN (B) LOGO (C) Stealth (D) Cluster
(C) BASIC (D) PASCAL 12. An operating System provides an interface
3. Which one of the following shortcut key is used between the computer user and the hardware?
to enter the current date? (A) User interface
(A) Ctrl + Shift +; (B) Ctrl +; (B) Graphical User interface
(C) Alt + Shift + D (D) Alt + Shift + T (C) Character User interface
4. Which one of the following takes entire program (D) Ms-Dos
and converts it into object code which is typically 13. Which one is a system call of operating system
stored in a file? and it is used to create a new process?
(A) Complier (B) Converter (A) Shell (B) Thread
(C) Instructor (D) Interpreter (C) Fork (D) Deadlock
5. Which one of the following languages is used to 14. Which one does not allow Execution due to any
developing a game? waiting event?
(A) C (B) C# (A) Shell (B) Thread
(C) SQL (D) Java (C) Fork (D) Deadlock
6. Which one is used to Performs specific task? 15. _________ is a mechanism of interacting with a
(A) System Software computer system or software by typing
(B) Operating system commands to perform specific tasks
(C) Application software (A) User interface
(D) Presentation software (B) Graphical User interface
7. The relationships between cells are called as (C) Character User interface
_____ (D) Ms-dos
(A) Tuple (B) Field 16. Which one is the capability of a computer under
(C) Record (D) Formulas which two or more programs can be
8. In Spreadsheet, the names of the cells are called simultaneously processed?
as_________ (A) Multi programming (B) Multi tasking
(A) Fields (B) Tuples (C) Multi processing (D) Time sharing
(C) Data (D) Labels 17. Which one Refers to the object that is being
9. Which one brings you through the process of currently used or displayed on the desktop?
creating a chart by displaying a series of dialog (A) Working window
boxes? (B) Current window
(A) Chart area (B) Chart title (C) Active window
(C) Chart wizard (D) Legend (D) Processing window
10. _______ is a computer program that enables a 18. _____ provide a password to protect from
person to communicate with a computer through unauthorised access
the use of symbols, visual metaphors and (A) Turn on (B) Log on
pointing device. (C) Turn off (D) Log off
(A) User interface 19. The file format notepad file ____
(B) Graphical User interface (A) .txt (B) .doc

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
70

(C) .rtf (D) .wrd (D) Information Passing


20. Which one is used to insert an link? 23. In which channel, both station can transmit and
(A) Ctrl+F (B) Ctrl+Z receive information Simultaneously?
(C) Ctrl+N (D) Ctrl+K (A) Simplex (B) Half duplex
21. ZIP stands for? (C) Network (D) Full duplex
(A) Zone information process 24. Which one is a wireless technology, used for
(B) Zone information protocol exchanging data over short distances to create a
(C) Zone interface process personal area network?
(D) Zone interface protocol (A) Repeater (B) Bridge
22. Which one is the exchange of data between two (C) Switch (D) Bluetooth
devices using some form of transmission media? 25. Which one is used to measure the speed of
(A) Networking signalling and data transfer?
(B) Communication (A) Bandwidth (B) Baud rate
(C) Data communication (C) Throughput (D) Bit rate

Solution
Ans.1(B) LISP is another language used for Ans.10(B) Graphical User interface (GUI) is a
artificial intelligence development. It is a computer program that enables a person to
family of computer programming communicate with a computer through the
language and is the second oldest use of symbols, visual metaphors and
programming language after Fortran. pointing device.
Ans.2(A) FORTRAN derived from Formula Ans.11(C) Stealth virus take up residence in the
Translation is a general-purpose, Computer memory, making them hard to
compiled imperative programming detect.
language that is especially suited to Ans.12(A) An operating System provides an interface
numeric computation and scientific between the computer user and the
computing. hardware is known as User interface.
Ans.3(B) To enter the current date -> Ctrl +; Ans.13(C) Fork is a system call of operating system
Ans.4(A) A compiler takes entire program and and it is used to create a new process.
converts it into object code which is Ans.14(D) A process which is not executing due to
typically stored in a file. The object code any waiting event is called as Deadlock.
is also refereed as binary code and can be Ans.15(C) Character User interface (CUI) is a
directly executed by the machine after mechanism of interacting with a computer
linking. Examples of compiled system or software by typing commands
programming languages are C and C++. to perform specific tasks.
Ans.5(D) Java language is used to developing a Ans.16(C) Multi processing is the capability of a
games. computer under which two or more
Ans.6(C) Application software is used to Performs programs can be simultaneously
specific task for computer users. processed.
Application software also called as “The Ans.17(C) Active window refers to the object that is
End-user Programs”. These programs do being currently used or displayed on the
the real work for user. desktop.
Ans.7(D) The relationships between cells are called Ans.18(D) Log off provide a password to protect
as Formulas. from unauthorized access.
Ans.8(D) In Spreadsheet, the names of the cells are Ans.19(A) Notepad is a text editor. It is most
called as Labels. commonly used for the edit or view text
Ans.9(C) Chart wizard brings you through the files. The file format notepad file .txt (text
process of creating a chart by displaying a document).
series of dialog boxes. Ans.20(D) Ctrl+K is used to insert a link.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
71

Ans.21(C) ZIP stands for Zone information protocol. Ans.24(D) Bluetooth is a wireless technology, used
This is an application that allows for the for exchanging data over short distances
compression of application files. to create a personal area network.
Ans.22(C) Data communication is the exchange of Ans.25(B) Baud rate is used to measure the speed of
data between two devices using some signaling and data transfer.
form of transmission media.
Ans.23(C) Full duplex channel, both stations can
transmit and receive information
simultaneously.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
72

Practice Set – 09

1. Modem is a device that converts digital to analog (A) Authentication (B) Integrity
signal at _____ side and converts back analog to (C) Access control (D) Non-Repudiation
digital signal at ___ Side 12. ____ converts plain text to cipher text and ____
(A) Receiver, sender (B) Receiver, client converts cipher text to plain text
(C) Client, Sender (D) Sender, Receiver (A) Analog, Digital
2. Which one prints the active documents? (B) Digital, Analog
(A) Ctrl + D (B) Ctrl + S (C) Encryption, Decryption
(C) Ctrl + Shift + F12 (D) Ctrl +F2 (D) Decryption, Encryption
3. Which one is a piece of software designed to fix 13. _____term is sometimes used to refer the
problems with a computer program or its software that displays unwanted advertisements?
supporting data? (A) Cracking (B) Phishing
(A) Patches (B) Buffer (C) Masquerade (D) Adware
(C) Gateway (D) Proxy server 14. Which one aligns the paragraph at both right and
4. Which one is a piece of software, that is used to left indent?
the explodes at a particular time? (A) Ctrl+R (B) Ctrl+L
(A) Proxy server (B) Time bomb (C) Ctrl+J (D) Ctrl+E
(C) Logic bomb (D) Hack bot 15. Which one is used to insert the current time?
5. _______ type of malware that is designed to gain (A) Alt + Shift + S (B) Alt + Shift + D
administrative level control over a computer (C) Alt + Shift + T (D) Alt + Shift + F
system without being detected 16. While studying about networking system, we
(A) Payloads (B) Freeware may came to know about ‘GPRS’. What does R
(C) Root kits (D) Update represents?
6. Which one is used to insert the current date? (A) Ratio (B) Radio
(A) Alt + Shift + S (B) Alt + Shift + D (C) Random (D) Refer
(C) Alt + Shift + T (D) Alt + Shift + F 17. In Windows operating system after you double-
7. _______ is the act of breaking in to computers click a character on the grid of characters,
(A) Cracking (B) Phishing keyboard shortcut SPACEBAR is used for _____
(C) Hacking (D) Spam (A) Move to the first character
8. Which is a piece of code intentionally inserted in (B) Move to the last character
to a computer’s memory that will set off a (C) Switch between Enlarged and Normal mode
malicious function when specified conditions are when a character is selected*
met? (D) Delete the character
(A) Proxy server (B) Time bomb 18. Which of the following is a Note-taking software
(C) Logic bomb (D) Hack bot for use with tablet PCs or regular PCs?
9. ________ is the technique to access the (A) Microsoft OneNote
unauthorised data without concerning to the (B) Microsoft PowerPoint
authorised user (C) Microsoft Word
(A) Cracking (B) Phishing (D) Microsoft Access
(C) Masquerade (D) Adware 19. What is the minimum number of rows and
10. Which one hide information or secret form? columns that a word table can have?
(A) Steganography (B) Cipher Text (A) Zero
(C) Cryptography (D) Plain Text (B) 2 rows and 1 column
11. ____ ensures that originators of messages cannot (C) 2 rows and 2 column
refuse they are not sender of the message? (D) 1 row and 1 column

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
73

20. What is shortcut key to open the dialog box? (A) it allows cache domain to contain redundant
(A) Ctrl + Q (B) Ctrl + O data
(C) Ctrl + P (D) Ctrl + R (B) it does not allow writes to be cached
21. Which of the following can you use to add times (C) its access time is greater than that ofpaged
to the slides in a presentation? caching
(A) Slide show menu (D) read ahead cache domain blocks are
(B) Rehearse timings button necessarily fixed in size
(C) Slide transition button 24. Which types of file organization are supported by
(D) All the above magnetic tape?
22. Which of the following statement is definitely (A) Random files
true based Virtual memory? (B) Contiguous sequential file
(A) simple to implement (C) Indexed sequential file
(B) used on all major commercial operating (D) All of the above
systems 25. What is the total time taken to prepare a disk
(C) less efficient in utilization of memory drive mechanism for a block of data to be
(D) useful when fast I/O devices are notavailable readfrom it?
23. An unpaged cache associates disk domainswith (A) Seek time
the address of the read and continues for a (B) Latency time
specific length. The major disadvantageof (C) Latency plus seek time
unpaged cache is that (D) Transmission time

Solution
Ans.1(D) Modem is a device that converts digital to Ans.9(C) Masquerade is the technique to access the
analog signal (Modulator) at Sender side unauthorized data without concerning to
and converts back analog to digital signal the authorized user. It accesses the
(Demodulator) at Receiver Side. A resources over the network and it is also
modem always placed between a known as Spoofing.
telephone line and computer. Ans.10(C) Cryptography is the science of writing
Ans.2(C) Ctrl + Shift + F12 à Prints the active information in a hidden or secret form and
documents It protects the data in transmit and also the
Ans.3(A) Patches one is a piece of software data stored on the disk.
designed to fix problems with a computer Ans.11(D) Non-Repudiation ensures that originators
program or its supporting data. of messages cannot refuse they are not
Ans.4(B) Time bomb is a piece of software, that is sender of the message.
used to the explodes at a particular time. Ans.12(C) Encryption converts plain text to cipher
Ans.5(C) Root kits is a type of malware that is text and Decryption converts cipher text to
designed to gain administrative level plain text.
control over a computer system without Ans.13(D) Adware term is sometimes used to refer
being detected. the software that displays unwanted
Ans.6(B) Alt + Shift + D is used to insert the current advertisements.
date. Ans.14(C) Ctrl+J aligns the paragraph at both right
Ans.7(A) Cracking is the act of breaking in to and left indent.
computers and it is a popular, growing Ans.15(C) Alt + Shift + T is used to insert the current
subject on the internet. Cracking tools are Time.
widely distributed on the internet. Ans.16(B) GPRS -->General Packet Radio Service
Ans.8(C) bomb is a piece of code intentionally Ans.17(C) In Windows operating system after you
inserted in to a computer’s memory that double- click a character on the grid of
will set off a malicious function when characters, keyboard shortcut
specified conditions are met. SPACEBAR is used for Switch between

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
74

Enlarged and Normal mode when a Ans.22(C)


character is selected Ans.23(A) An unpaged cache associates disk domain
Ans.18(A) Microsoft One Note is a Note-taking with the address of the read and continues
software for use with tablet PCs or regular for a specific length. The major
PCs disadvantage of unpaged cache is that it
Ans.19(D) The minimum number of rows and allows cache domain to contain redundant
columns that a word table can have1 row data.
and 1 column. Ans.24(B) Contiguous sequential file organization is
Ans.20(B) The shortcut key to open the dialog box supported by magnetic tape.
Ctrl +O. Ans.25(C) The total time taken to prepare a disk drive
Ans.21(B) Rehearse timings button can be used to mechanism for a block of data to be read
add times to the slides in a presentation. from it is called Latency plus seek time.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
75

Practice Set – 10

1. The system failure due to power failure is (A) Linear (B) Parallel
considered under, which of the following? (C) Sequential (D) Both 2 and 3
(A) Hardware reliability 9. To access a mainframe or super computer, user
(B) Software reliability often use _____
(C) System reliability (A) Server (B) Client
(D) Operation reliability (C) Terminal (D) Node
2. Which of the following is responsible for 10. Which of the following term is not associated
deciding when the system can be released to with the Spread sheet software?
customers, managing the process of creating (A) Formula (B) Cell
there lease and distribution media and (C) Column (D) Slide
documenting the release? 11. The subsystem of the kernel and hardware that
(A) System procurement cooperates to translate virtual to physical address
(B) System quality assessment comprises _____
(C) System release management (A) Process management subsystem
(D) System reliability (B) Memory management subsystem
3. These objects can be realized as parallel process (C) Input / Output management subsystem
with method corresponding to defined object (D) All the above
operations. 12. Which of the following controls the way in which
(A) Self-descriptiveness (B) Servers the computer system function and provide a
(C) Simplicity (D) All of these means by which user can be interacted with the
4. Transforming of logic and data from design computer?
specifications (design descriptions) into a (A) Keyboard (B) Mouse
programming language is called _______-. (C) Microphone (D) Operating system
(A) Compatibility (B) Compactness 13. The building block of the database that contains
(C) Coding (D) Communication related records are called ____
5. When you save an Access project, what file (A) Query (B) Information
extension do you use? (C) Report (D) Data
(A) .adp (B) .xm 14. Arranging the data in a logical sequence is
(C) .php (D) .mdb known as______.
6. You can switch back and forth between design (A) Searching (B) Screening
and datasheet view by clicking _______. (C) Arranging (D) Sorting
(A) switch command on the view menu 15. Which of the following is a large scale electronic
(B) View button repository of data, that is time variant?
(C) queries object tab (A) Data mining (B) Data storing
(D) select query title bar (C) Data Sorting (D) Data warehousing
7. Which of the following terminals are often 16. The software that is used to create text-based
connected to complex inventory and sales documents is referred as _______.
computer systems? (A) DBMS (B) Suites
(A) Data (C) Spread sheet (D) Word processors
(B) Query 17. Telnet is a ______ based computer protocol
(C) Point of sale (A) Voice (B) Text
(D) Acknowledgement (C) Digital coding (D) Image
8. In the latest generation computers, The 18. Which of the following search method is
Instructions are executed in which format? conducted for a specific title, domain, URL, or
host?

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
76

(A) Keyword (B) Field (C) Graphical text interface


(C) Boolean (D) Logical (D) Point-to-point interface
19. _____ search engine sends request for 23. Which type of software works with end-user,
information to several search engines application software, and computer hardware to
simultaneous and Compiles the result. handle majority of technical details?
(A) Meta (B) Individual (A) Application software
(C) Directory (D) Sub Directory (B) Communication software
20. While studying about communication, we may (C) Utility software
know about the term AM. What does A (D) System software
represent? 24. Which of the following information system
(A) Angular (B) Analog focused on making manufacturing processes
(C) Antilog (D) Amplitude more efficient and of higher quality?
21. Free hard-disk space is used to extend the (A) Computer-aided manufacturing
capacity of RAM is termed as __________ (B) Computer-aided software
(A) Cache memory (C) Computer-developing
(B) Flash memory (D) Computer-program manufacturing
(C) Virtual memory 25. A detailed written description of the
(D) Secondary memory programming cycle and the program, along with
22. What is the major feature of the world wide web, the results and a printout of the program is called
that make it simple to learn and use? _____.
(A) Database interface (A) Documentation (B) Output
(B) Graphical user interface (C) Report (D) Spec sheet

Solution
Ans.1(A) The system failure due to power failure is Ans.8(D) In the latest generation computers, The
considered under Hardware reliability. Instructions are executed in both parallel
Ans.2(C) System release management is and sequential format
responsible for deciding when the system Ans.9(C) To access a mainframe or super computer,
can be released to customers, managing user often use the Terminal
the process of creating the release and Ans.10(D) Slide is not associated with the spread
distribution media and documenting the sheet.
release Ans.11(B) The subsystem of the kernel and hardware
Ans.3(B) These objects can be realized as parallel that cooperates to translate virtual to
process with method corresponding to physical address comprises Memory
defined object operations known as management subsystem
Server. Ans.12(5) Operating system will controls the way in
Ans.4(C) Transforming of logic and data from which the computer system function and
design specifications (design provide a means by which user can be
descriptions) into a programming interacted with the computer
language is called Coding. Ans.13(C) The building block of the database that
Ans.5(A) We have to save Access project in .adp contains related records are called Report.
format. Ans.14(D) Arranging the data in a logical sequence is
Ans.6(B) You can switch back and forth between known as Sorting.
design and data sheet view by clicking Ans.15(D) Data warehousing is a large-scale
View button. electronic repository of data that is time
Ans.7(C) Point of sale are often connected to variant.
complex inventory and sales computer Ans.16(D) The software that is used to create text-
systems based documents is referred as Word
processors.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
77

Ans.17(B) Telnet is a text-based computer protocol. Ans.23(D) System software works with end-user,
Ans.18(B) Field search method is conducted for a application software, and computer
specific title, domain, URL, or host hardware to handle majority of technical
Ans.19(A) Meta search engine sends request for details.
information to several search engines Ans.24(A) Computer-aided manufacturing
simultaneous and Compiles the result. information system focused on making
Ans.20(D) AM -->Frequency Amplitude Modulation manufacturing processes more efficient
Ans.21(C) Free hard-disk space is used to extend the and of higher quality.
capacity of RAM is termed as Virtual Ans.25(A) A detailed written description of the
memory. programming cycle and the program,
Ans.22(B) Graphical user interface is the major along with the results and a printout of the
feature of the world wide web, that make program is called Documentation.
it simple to learn and use.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
78

Practice Set – 11

1. The term used to describe the intangible 10. __________ computers represent data as
instructions that tell the computer, what to do is variable points along a continuous spectrum of
___. values.
(A) Hardware (B) Software (A) Analog (B) Digital
(C) Storage (D) Input/ Output (C) Precise (D) Mainframe
2. Which keys enable the input of numbers quickly? 11. Personal computers can be connected together to
(A) Ctrl, Shift and alt (B) functional keys form a __________.
(C) numerical keys (D) arrow keys (A) Server (B) supercomputer
3. The operating system that is self contained in a (C) network (D) Enterprise
device and resident in the ROM is _____. 12. The main component of a desktop PC is the
(A) Batch Operating system ________ which houses the computer’s critical
(B) Real time Operating system parts.
(C) Embedded Operating system (A) Processor (B) memory
(D) Multi processor Operating system (C) keyboard (D) system case
4. Which of the following is used by the browser to 13. To make a notebook act as a desktop model, the
connect to the location of the Internet resources? notebook can be connected to a ______ which is
(A) Linker (B) Protocol connected to a monitor and other devices.
(C) Cable (D) URL (A) Bay (B) docking station
5. Which of the following contains permanent data (C) port (D) Network
and get updated during the processing of 14. Minicomputers are also called_________
transactions? computers.
(A) Operating System files (A) Midrange (B) laptop
(B) Transaction files (C) handheld (D) Smart
(C) Software file 15. The most important or powerful computer in a
(D) Master file typical network is __________.
6. A(n) __________ is software that you purchase (A) Desktop (B) network client
that solves one task. (C) network server (D) network station
(A) Suite 16. The __________ is used by the tablet PC to write
(B) stand-alone program on the screen.
(C) open-source program (A) Finger (B) mouse
(D) freeware program (C) digitizer (D) Stylus
7. Which of the following is not a programming 17. To access a mainframe or supercomputer, users
language? often use a __________.
(A) Lisp (B) See (A) Terminal (B) node
(C) Java (D) Perl (C) desktop (D) Handheld
8. Which of the following is not related to e-mail? 18. If you magnify a __________ you can see its
(A) BCC (B) SPAM individual pixels.
(C) Pen (D) Pine (A) vector graphic (B) bitmap
9. A __________ is an electronic device that (C) DXF (D) EMF
process data, converting it into information. 19. Paint programs keep track of every __________
(A) Processor (B) computer placed on the screen.
(C) case (D) Stylus (A) Image (B) object
(C) Pixel (D) color

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
79

20. The term __________ originated with large (A) Title (B) Header
books of reproducible images. (C) Footer (D) Sidebar
(A) clip art (B) scanned images 24. Which of the following statements best describes
(C) digital photo (D) bitmap a leaderboard?
21. In a photo editor, you can repair scratches using (A) It is the top section of a webpage.
the __________ tool. (B) It contains the head section of the HTML.
(A) Mask (B) airbrush (C) It displays a website’s site map.
(C) stamper (D) Eraser (D) It is a common ad size used in online
22. Which of the following is most similar to a word advertising.
processor? 25. Which of the following is a type of URI?
(A) Dictionary (B) Thesaurus (A) URL (B) USB
(C) Text Editor (D) Code Inspector (C) UDDI (D) UML
23. Where is the copyright information located on
most webpages?
Solution
Ans.1(B) The term used to describe the intangible Ans.13(B) To make a notebook act as a desktop
instructions that tell the computer, what to model, the notebook can be connected to
do is Software. a docking station.
Ans.2(C) The numerical keys enable the input of Ans.14(A) Minicomputers are also called midrange
numbers quickly. computers.
Ans.3(C) The operating system that is self- Ans.15(C) The most important or powerful computer
contained in a device and resident in the is network server in a typical network.
ROM is called Embedded operating Ans.16(D) The stylus is used by the tablet PC to write
system. on the screen.
Ans.4(D) URL can be used by the browser to Ans.17(A) To access a mainframe or supercomputer,
connect to the location of the Internet users often use a terminal.
resources. Ans.18(B) If you magnify a bitmap you can see its
Ans.5(D) Master file contains permanent data and individual pixels.
get updated during the processing of Ans.19(C) Paint programs keep track of every Pixel
transactions. placed on the screen
Ans.6(B) standalone program is software that you Ans.20(A) The term clip art originated with large
purchase that solves one task. books of reproducible images.
Ans.7(B) See is not a programming language. Ans.21(B) In a photo editor, you can repair scratches
Ans.8(D) Pine is not related to e-mail. using the airbrush tool.
Ans.9(B) Computer is an electronic device that Ans.22(C) A word processor processes words, it is
process data, converting it into similar to Text Editor.
information. Ans.23(C) Footer is often used to display company
Ans.10(A) Analog computers represent data as data or copyright information.
variable points along a continuous Ans.24(D) Leader boards can contain text, images, or
spectrum of values. even animations.
Ans.11(C) Personal computers can be connected Ans.25(A) URIs are similar to URLs in that they
together to form a network. specify the location of a file.
Ans.12(D) The main component of a desktop PC is
the system case, which houses the
computer’s critical parts.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
80

Practice Set – 12

1. Mechanism developed to enforce users to enter 13. What SQL command will allow you to change
data in required format is _______. the table STUDENT to add the constraint named
(A) Data validation (B) Input mask Grade Check that states that the values of the
(C) Criteria (D) Data verification Grade column must be greater than 0?
2. The raw facts and figures are ________. (A) ALTER TABLE STUDENT ALTER
(A) Data (B) Information CONSTRAINT Grade Check (Grade > 0) ;
(C) Snapshot (D) Reports (B) ALTER TABLE STUDENT ADD
3. The feature that database allows to access only CONSTRAINT Grade Check (Grade > ‘O) ;
certain records in database is ________. (C) ALTER TABLE STUDENT ADD
(A) Forms (B) Reports CONSTRAINT Grade Check CHECK (Grade>
(C) Queries (D) Tables O) ;
4. Which filter method lets you filter the records (D) ALTER TABLE STUDENT ADD
that match the selected field? CONSTRAINT Grade Check (Grade> O) ;
(A) Filter by form (B) Filter by selection 14. Input, output and processing devices grouped
(C) Auto filter (D) Advanced filter together represent a (n) ………
5. Which filter method lets you filter records based (A) Mobile device
on criterion you specify? (B) Information processing cycle
(A) Filter by form (B) Filter by selection (C) Circuit board
(C) Auto filter (D) Advanced filter (D) Computer system
6. To place a sound into a Word document, you 15. Which part of the computer helps to store
would use the _____ feature of Windows. information?
(A) OLE (B) Clipboard (A) Disk drive (B) CPU
(C) Paste (D) task switching (C) Monitor (D) Keyboard
7. The program that allows the OS to work with a 16. Various applications and documents are
printer or a video card is a(n) _______. represented on the Windows desktop by ______.
(A) Utility (B) driver (A) Symbols (B) Labels
(C) applet (D) system call (C) Graphs (D) Icons
8. The ____ protects your system from hackers. 17. To see the document before the printout is taken,
(A) Snort (B) backup use .......
(C) anti-virus (D) firewall (A) Insert Table (B) Paste
9. A program currently loaded in the system but not (C) Format Painter (D) Print Preview
active is said to be running in the _______. 18. ..... helps create, manipulate and analyze data
(A) user session (B) kernel arranged in rows and columns?
(C) background (D) foreground (A) Application Package
10. Data that is copied from an application is stored (B) Word Processing Package
in the______. (C) Outlining Package
(A) Driver (B) Clipboard (D) Spreadsheet Package
(C) terminal (D) prompt 19. A register that keeps track of the next instruction
11. What is the shortcut key to Update Formula in a to be executed is called a(n) _______.
table? (A) Data Register
(A) Shift + F9 (B) F9 (B) Instruction Register
(C) Ctrl + F9 (D) Alt + F9 (C) Action Register
12. What is the shortcut key for “Font” dialog box? (D) Program Counter
(A) Ctrl + G (B) Ctrl + F 20. You can use the tab key to ________.
(C) Ctrl + D (D) Ctrl + H (A) Move a cursor across the screen

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
81

(B) Indent a paragraph 23. Which of the following is not a Modifier Key?
(C) Move the cursor down the screen (A) Insert (B) Shift
(D) (A) and (B) (C) Alt (D) Ctrl
21. Which of following is basic data type? 24. In RDBMS, Data is presented as a collection
(A) Array (B) Character of.............
(C) Structure (D) Union (A) Table (B) Attributes
22. Which of the following part will hold many of (C) Relations (D) Entities
the crucial components of a computer, including 25. SMPS stands for?
the central processing unit (CPU), memory and (A) Start mode power supply
connectors for input and output devices? (B) Store mode power supply
(A) Holders (B) Mother Board (C) Switched mode power supply
(C) Main Board (D) System Board (D) Single mode power supply

Solution
Ans.1(B) Mechanism developed to enforce users to Ans.16(D) Various applications and documents are
enter data in required format is input represented on the Windows desktop by
mask. icons.
Ans.2(A) The raw facts and figures are Data. Ans.17(D) We use Print preview to see the document
Ans.3(C) The feature that database allows to access before the printout is taken.
only certain records in database is Queries Ans.18(D) Spreadsheet Package helps create,
Ans.4(B) Filter by selection method lets you filter manipulate and analyze data arranged in
the records that match the selected field. rows and columns.
Ans.5(A) Filter by form method lets you filter Ans.19(B) Instruction register is the part of control
records based on criterion you specify. unit that keeps track of the next instruction
Ans.6(A) To place a sound into a Word document, to be executed.
you would use the OLE feature of Ans.20(B) You can use the tab key to indent a
Windows. paragraph.
Ans.7(B) The program that allows the OS to work Ans.21(B) Character is basic data type.
with a printer or a video card is a driver. Ans.22(B) A motherboard is one of the most essential
Ans.8(D) The firewall protects your system from parts of a computer system. It holds
hackers. together many of the crucial components
Ans.9(C) A program currently loaded in the system of a computer, including the central
but not active is said to be running in the processing unit (CPU), memory and
background. connectors for input and output devices.
Ans.10(B) Data that is copied from an application is Ans.23(A) Shift, Alt, Ctrl and Fn are the Modifier
stored in the clipboard. Key.
Ans.11(B) F9 is the shortcut key to Update Formula Ans.24(C) Relation is sometimes used to refer to a
in a table. table in a relational database.
Ans.12(C) Ctrl + D is the shortcut key for “Font” Ans.25(C) A switched-mode power supply
dialog box. (switching-mode power supply, SMPS, or
Ans.13(C) ALTER TABLE STUDENT ADD switcher) is an electronic power supply
CONSTRAINT Grade Check CHECK that incorporates a switching regulator to
(Grade> O) ; convert electrical power efficiently.
Ans.14(D) Input, output and processing devices Like other power supplies, an SMPS
grouped together represent a computer transfers power from a source, like mains
system. power, to a load, such as a personal
Ans.15(A) Disk drive helps to store information in computer, while converting voltage and
computer system. current characteristics.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
82

Practice Set – 13

1. Who among the following is the chief executive (A) Decoding (B) Encoding
officer of Infosys? (C) Encrypting (D) Decrypting
(A) Salil Parekh (B) Bill Gates 11. What is the name of the portal in computer,
(C) Ginni Rometty (D) Satya Nadella which allow additional devices to connect?
2. Which of the following will translate higher level (A) Primary (B) Secondary
language to lower level language? (C) Peripheral (D) Optional
(A) Translator (B) Linker 12. What is the short cut key to close currently
(C) Converter (D) Compiler opened document in Microsoft word?
3. 1024 TB is called as ____. (A) Ctrl + W (B) Ctrl + D
(A) 1 KB (B) 1 PB (C) Ctrl + T (D) Ctrl + B
(C) 1EB (D) 1 GB 13. In the C coding ‘<stdio.h>’ is used as a _______
4. SRAM retains data as long as power is provided file.
to the memory chip and need not be refreshed (A) Subroutines (B) Footer
periodically. What does ‘S’ represents? (C) Header (D) Increment
(A) Stagnant (B) Storage 14. Which among following organization is
(C) Simple (D) Static concerned with databases?
5. What do you mean by Output in computer (A) Oracle (B) Asus
terminology? (C) Intel (D) Motorola
(A) What the processor takes from the user 15. What does Web Server Error Message 500
(B) What the user gives to the processor mean?
(C) What the processor gets from the user (A) Bad file error/syntax error
(D) What the processor gives to the user (B) Site not found
6. Network components are connected to the same (C) Internet Error/server-configuration problems
cable in which among the following topology? (D) Access forbidden/Password Protected
(A) Star (B) Ring 16. Which of the following is not related with
(C) Bus (D) Mesh ‘Programming’?
7. What is the Short cut key for line break in MS (A) Programmer (B) Language
Word? (C) Operating System (D) Flow Chart
(A) Ctrl + Enter (B) Alt + Enter 17. Raw, unprocessed facts, including text, numbers,
(C) Shift + Enter (D) Space + Enter images, and sounds, are called ______
8. What is the full form of ‘MAN’? (A) applets (B) data
(A) Man Area Network (C) met aware (D) product
(B) Meter Area Network 18. Which of the following is necessary to track
(C) Metropolitan Area Network computer, while connecting to Internet?
(D) Manage Area Network (A) System Number (B) Memory
9. Which of the following is not a network (C) IP (D) VP
protocol? 19. Which of following is not an example for
(A) HTTP (B) FTP simplex?
(C) SMTP (D) HTML (A) Radio broadcasting
10. The data are modified to specific code and (B) Television broadcasting
protected in the sender side while transferring, (C) Speaker
and the special key is used to retrieve the original (D) Walkie talkie
data in the receiver side What is the process used 20. Which of the following layer is responsible for
in receiver side to retrieve the original data? converting electrical impulse to bit streams?

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
83

(A) Presentation (B) Physical 23. Deleted mails from the Inbox can be found
(C) Data link (D) Network in______
(5) None of these (A) Trash (B) Spam
21. The computer’s capability of distinguishing (C) Promotions (D) All Mail
spoken words is called _________ 24. Expand “MODEM”?
(A) Voice analysis (A) Modern development
(B) Speech acknowledgment (B) Medium Development
(C) Speech interpretation (C) Modulation and Demolition
(D) Voice recognition (D) Modulation and Demodulation
22. While working in mail we may came under the 25. What is the short cut to justify the paragraph?
‘BCC’, what does B represents? (A) Ctrl + R (B) Ctrl + J
(A) Blink (B) Black (C) Ctrl + U (D) Ctrl + E
(C) Blind (D) Broad
Solution
Ans.1(A) Salil Parekh is the current Chief Executive repeatedly hit Enter to add a page. Instead,
Officer and Managing Director (CEO & use this handy shortcut to quickly insert a
MD) of Infosys. clean page break.
Ans.2(D) Compiler translates the program from Ans.8(C) A MAN (metropolitan area network) is a
high level language to machine language. larger network that usually covers certain
It is very fast because it converts the whole area, village or several building.
program into machine language. Ans.9(D) HTML (Hypertext Markup Language) is
Ans.3(B) 1024 TB = 1PB (PB --> Petabyte) the programming language.
Ans.4(D) SRAM retains data as long as power is Ans.10(D) Decryption is the process of transforming
provided to the memory chip and need not data that has been rendered unreadable
be refreshed periodically. SRAM stands through encryption back to its
for Static Random Access Memory. unencrypted form. In decryption, the
Ans.5(D) Any information that has been processed system extracts and converts the garbled
by and sent out from a computer or similar data and transforms it to texts and images
device is considered output. that are easily understandable not only by
Ans.6(C) the reader but also by the system.
Decryption may be accomplished
manually or automatically. It may also be
performed with a set of keys or passwords.
Ans.11(C) A peripheral device connects to a
computer system to add functionality.
Examples are a mouse, keyboard,
monitor, printer and scanner.
Ans.12(A) To close currently opened document in
Bus Topology is the simplest of network Microsoft word à Ctrl + W
topologies. In this type of topology, all the Ans.13(C) ‘<stdio.h>’ and ‘<conio.h>’ are used as a
nodes (computers as well as servers) are header file in C program
connected to the single cable (called bus), Ans.14(A) Oracle Corporation is an American
by the help of interface connectors. This multinational computer technology
central cable is the backbone of the corporation headquartered in Redwood
network and is known as Bus (thus the City, California, United States.
name). Every workstation communicates Ans.15(C) The 500 Internal Server Error is a very
with the other device through this Bus. general HTTP status code that means
Ans.7(C) If you want to start some text on a new something has gone wrong on the
page in your Word document, don’t website's server, but the server could not

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
84

be more specific on what the exact Ans.20(B) OSI Model, Layer 1 conveys the bit
problem is. stream - electrical impulse, light or radio
Ans.16(C) Computer programming is the process of signal — through the network at the
writing instructions that get executed by electrical and mechanical level. It
computers. The instructions, also known provides the hardware means of sending
as code, are written in a programming and receiving data on a carrier, including
language which the computer can defining cables, cards and physical
understand and use to perform a task or aspects. Fast Ethernet, RS232, and ATM
solve a problem. are protocols with physical layer
Ans.17(B) Raw, unprocessed facts, including text, components.
numbers, images, and sounds, are called Ans.21(D) The computer’s capability of
Data. distinguishing spoken words is called
Ans.18(C) Internet Protocol (IP) is required to track Voice recognition
computer while assessing Internet. Ans.22(C) BCC --> Blind Carbon copy
Ans.19(D) Simplex communication is a Ans.23(A) Trash will contain all the deleted mails for
communication channel that sends 30 days from deleting the documents.
information in one direction only. Walkie Ans.24(D) MODEM--> Modulation and
talkie is example for Half Duplex, in Demodulation
which transmission is possible in both Ans.25(B) Ctrl + J --> to justify the paragraph.
direction. But only one direction
transmission is possible in One time.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
85

Practice Set – 14

1. Which of the following is a non-volatile 10. While searching the information in Internet, we
memory? may came to notice ‘HTTPS’ what does ‘S’
(A) RAM (B) ROM represents?
(C) Cache (D) Primary (A) Secure (B) Storage
2. Expand DVD? (C) System (D) Secrete
(A) Digital Video Disc 11. Science Novel by John Bruner titled ‘Shockwave
(B) Decoded Versatile Disc Rider’ first time coined the term _________?
(C) Digital Virtual Disc (A) Bug (B) Vice
(D) Dimensional Video Disc (C) Lice (D) Worm
3. Virtual memory is – 12. Microsoft Office is?
(A) An extremely large main memory (A) Shareware
(B) A secondary memory acting as main memory (B) Public domain software
(C) An illusion of an extremely large memory (C) Open-source software
(D) A type of memory used in super computers (D) An application suite
4. Refresh Rate of monitor is measured in____. 13. Who is the founder of ‘WWW’?
(A) Hz (B) Meter (A) Ajay V. Bhatt (B) Tim Berners-Lee
(C) Volts (D) Amp. (C) Ericsson (D) DARPA
5. Hardware includes which among the following? 14. ___________ is a sequence of instructions
(A) All devices used to input data into a compute designed to direct the computer to perform
(B) Sets of instructions that a computer runs or certain functions.
executes (A) Data (B) Program
(C) The computer and all the devices connected (C) Software (D) Subroutines
to it that are used to input and output data 15. Which of the following is not an Operating
(D) All devices involved in processing system?
information including the central processing unit, (A) Windows Vista (B) Ubuntu
memory and storage (C) ARM (D) BeOS
6. OSI is an ISO standard for worldwide 16. Which process should be used to recall a
communications that defines a networking document saved previously?
framework for implementing protocols. What (A) Copy (B) Save
does ‘O’ stands for? (C) Retrieve (D) Enter
(A) Operation (B) Open 17. What does “Zipping" a file mean?
(C) Organization (D) Optical (A) Encrypting the message
7. What does dots per inch (DPI) measure? (B) Compressing the message
(A) number of bits (C) Transferring the message
(B) density of the pixels on a computer screen (D) Decoding the message
(C) the density of bits on a disk 18. …………… defines rules regarding the values
(D) density of graphic files stored on a hard disk allowed in columns and is the standard
8. Which among the following is not an Object mechanism for enforcing database integrity.
Oriented Programming Language? (A) Column (B) Constraint
(A) Python (B) C++ (C) Index (D) Trigger
(C) Java (D) PASCAL 19. A peer-to-peer LAN is an appropriate network
9. What are the components that are used in second architecture for?
generation computers? (A) The Internet
(A) Vacuum tube (B) LSI (B) Home network
(C) Punch cards (D) Transistors

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
86

(C) Network requiring a server with shared (A) Copper (B) Steel
resources (C) Silicon (D) Iron
(D) wide area network 23. What is the term used to denote the repetition of
20. ASCII is a/an ________. data in DBMS?
(A) Numbering system for representing numbers (A) Repeating (B) Restrict
with decimals. (C) Reappear (D) Redundancy
(B) Character representation standard common 24. ____ is the most important/powerful computer in
in older mainframe computers. a typical network.
(C) Encoding standard used to represent letters (A) Network client (B) Desktop
and characters. (C) Network station (D) Network server
(D) Symbolic programming language that 25. The Artificial satellite which revolves around the
directly represents machine instructions. earth and provide transmit information from
21. What is the maximum allowed field size for earth is basically called _____
Boolean (Yes/No) fields? (A) Geo satellites
(A) 1 (B) 8 (B) Geostationary satellites
(C) 50 (D) 255 (C) Low Earth Orbits
22. Which element is used to make computer chips? (D) Sun-Synchronous orbits

Solution
Ans.1(B) ROM is the volatile memory. the input resolution of a photograph or
Ans.2(A) DVD (an abbreviation of "digital video image.
disc" or "digital versatile disc") is a digital Ans.8(D) Pascal is an imperative and procedural
optical disc storage format invented and programming language, which Niklaus
developed by Philips and Sony in 1995. Wirth designed in 1968–69 and published
The medium can store any kind of digital in 1970.
data and is widely used for software and Ans.9(D) Transistors are used in second generation
other computer files as well as video computers.
programs watched using DVD players. Ans.10(A) HTTPS --> Hypertext Transfer Protocol
Ans.3(B) memory that appears to exist as main (HTTP) Secure for secure communication
storage although most of it is over a computer network.
supported by data held in secondary Ans.11(D) The Shockwave Rider is a science fiction
storage, transfer between the two being novel by John Brunner, originally
made automatically as required. published in 1975. It is notable for its
Ans.4(A) Refresh rate of monitor is measured in hero's use of computer hacking skills to
Hertz (Hz) that indicates how many times escape pursuit in a dystopian future, and
per second a monitor screen image is for the coining of the word "worm" to
renewed. For example, a monitor with a describe a program that propagates itself
refresh rate to 75 Hz means the screen is through a computer network.
going to redraw 75 times per second. Ans.12(D) Microsoft Office is a set of interrelated
Ans.5(D) In information technology, hardware is desktop applications, servers and services,
the physical aspect of computers, collectively referred to as an office
telecommunications, and other devices. Application suite.
Ans.6(B) OSI - Open Systems Interconnection. Ans.13(B) English Scientist Tim Berners-Lee
The Open System Interconnection (OSI) invented the World Wide Web in 1989
model defines a networking framework to Ans.14(C) Software is a sequence of instructions
implement protocols in seven layers. designed to direct the computer to perform
Ans.7(B) In printing, DPI (dots per inch) refers to certain functions.
the output resolution of a printer or image
setter, and PPI (pixels per inch) refers to

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
87

Ans.15(C) Windows Vista, Ubuntu, BeOS and Unix characters into 7-bit binary integers as
are the Operating system. ARM is the shown by the ASCII chart on the right.
processor. Ans.21(A) Field Size sets the maximum space
Ans.16(C) Retrieve is defined as to find and bring or available for any one value. In computer
to bring back or restore. An example of science, the Boolean data type is a data
retrieve is to recover lost files on a type that has one of two possible values
computer. (usually denoted true and false).
Ans.17(B) Zipping is the act of packaging a set of Ans.22(C) Computer chips are made of silicon,
files into a single file or archive that is which is a semiconductor, and in order to
called a zip file. make the most efficient use of it, chip
Ans.18(B) Constraints are the rules that we can apply manufacturers use sand that contains as
on the type of data in a table. That is, we much silicon as possible.
can specify the limit on the type of data Ans.23(D) Repetition of data in the DBMS was called
that can be stored in a particular column as Data Redundancy.
in a table using constraints. Ans.24(D) Network server is the most important/
Ans.19(B) In its simplest form, a peer-to-peer (P2P) Powerful computer in a typical network.
network is created when two or more PCs Ans.25(B) The majority of communications satellites
are connected and share resources without are in fact geostationary satellites.
going through a separate server computer. Geostationary satellites like
Ans.20(C) ASCII abbreviated from American geosynchronous satellites take 24 hours
Standard Code for Information to complete a rotation. However,
Interchange, is a character- encoding geostationary satellites are positioned
scheme. Originally based on the English directly over the equator and their path
alphabet, it encodes 128 specified follows the equatorial arth.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
88

Practice Set – 15

1. ULSI microprocessor is used in which among the (A) Mother Board (B) Expansion Board
following generation of computers? (C) Monitor (D) UPS
(A) Second generation (B) Third generation 12. Getting data from a cell located in a different
(C) Fourth generation (D) Fifth generation worksheet in MS Excel is known as?
2. A monitor's _______ is the distance between the (A) Accessing (B) Referencing
holes in the mask behind the screen. This helps (C) Updating (D) Functioning
determine how sharp the dots appear. 13. Which among the following key combination is
(A) Refresh rate (B) Dot pitch used for deleting the selected item permanently
(C) Resolution (D) Colour depth without moving the item to the Recycle Bin?
3. Which among following is not an input device? (A) Shift + Delete (B) Delete
(A) Mouse (B) Scanner (C) Ctrl + Delete (D) Alt + Delete
(C) Keyboard (D) Printer 14. Which among the following is a large-sized,
4. Which of following is not an Application powerful multi-user computer that can support
Software? concurrent programs?
(A) Photoshop (B) SAGE (A) Mainframe Computers
(C) Dreamweaver (D) WinRAR (B) Mini-Computers
5. Print server uses ________ which is a buffer that (C) Workstations
holds data before it is send to the printer. (D) Computer Networks
(A) Queue (B) Spool 15. In Computer terminology ‘CAD’ is stands for?
(C) Node (D) Matrix (A) Computer and Design
6. The______ portion of LAN management (B) Computer Algorithm in Design
software restricts access, records user activities (C) Compact Adding Device
and audit data etc. (D) Computer Aided Design
(A) Configuration Management 16. System files are a set of critical computer file
(B) Security Management without which a computer system may not
(C) Performance Management operate correctly. These files are created and
(D) Action Management maintained by?
7. Which of the following are the sub protocols of (A) User of the operating system
E-Cash system? (B) Administrator
(A) Withdrawal (B) Payment (C) Operating System
(C) Deposit (D) All of the above (D) Database Manager
8. What is the maximum number, that each of the 17. In an ER model, ______ is described in the
four parts of an IP Address can have? database by objects.
(A) 345 (B) 255 (A) Entity (B) Attribute
(C) 197 (D) 301 (C) Relationship (D) Notation
9. Which of the following extension is used to save 18. Excel files are also called by the name of _____.
image in the computer? (A) Workbook (B) Worksheet
(A) .cmd (B) .xls (C) Spreadsheet (D) Spread book
(C) .vlc (D) .jpeg 19. How was multiplication process occurring in
10. ‘Chrome’ is a ______ software ALU?
(A) Operating System (B) Application (A) Repeated Addition
(C) System (D) Utility (B) Repeated Squaring
11. The RAM is located in which part of the (C) Repeated Subtraction
computer system? (D) Repeated Division

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
89

20. What is the name of the first invented digital (B) Binary Input Output System
computer? (C) Basic Input of System
(A) EDVAC (B) ENIAC (D) Binary Integrated Original System
(C) Super Computer (D) Calculator 24. In Microsoft Word while writing a document,
21. Which of the following is the Universal gate? you can use the _____ feature to find an
(A) NOT (B) AND appropriate word or an alternative word?
(C) OR (D) NOR (A) Dictionary (B) Translate
22. To find a saved document in the (C) Encyclopedia (D) Thesaurus
computer’s memory and bring it up on the screen 25. FOXPRO is a?
to view _______. (A) Application Software
(A) Reverse (B) Return (B) Anti-Virus
(C) Retrieve (D) Return (C) Programming Language
23. BIOS stand for? (D) Both (A) and (D)
(A) Basic Input Output System

Solution
Ans.1(D) ULSI (Ultra Large Scale Integration) as finish printing before continuing on to
CPU components and AI (Artificial your next task.
Intelligence) are main features of the fifth Ans.6(B) Security Management is one of the critical
generation. ULSI has more than million portions in network security that ensures
components integrated in single chip. safety of network, data and systems.
The capability of thinking and self- Ans.7(D) E-cash is a payment system designed and
decision making is equipped with implemented for making purchases over
computer. Fifth generation language open networks such as the Internet. All are
(After 1990) is an advance high level or sub protocols of it.
very high level language is used in this Ans.8(B) All IP addresses are made up of four parts
generation. (quadrants) separated by dots, like this:
Ans.2(B) Dot pitch, or "pixel pitch," is a XXX.XXX.XXX.XXX Where each XXX
measurement that defines the sharpness can be any number between 0 and 255.
of a display. It measures the distance Each of these numbers are stored in 8 bits
between the dots used to display the image (binary digits), and the number of
on the screen. This distance is very small possibilities you can have is 2 raised to the
and is typically measured in fractions of power of 8, which is 256 (0-255).
millimeters. Smaller the dot pitch, sharper Ans.9(D) The images in the computer are saved with
the picture. the extension .jpeg
Ans.3(D) Printer is a peripheral device which is used Ans.10(B) Chrome is the Application software. That
to show processed data. are used to perform specific task
Ans.4(D) WinRAR is a Utility Software. WinRAR Ans.11(A) The Motherboard is the main circuit board
is a Windows data compression tool that for the computer, containing both
focuses on the RAR and ZIP data soldered, non-removable components
compression formats for all Windows along with sockets or slots for components
users. that can be removed. The motherboard
Ans.5(B) Printers have a limited amount of holds the CPU, RAM and ROM chips, etc.
memory, often times much smaller than Ans.12(B) A cell reference refers to a cell or a range
the size of a document that we want to of cells on a worksheet and can be used
print. Printer spooling allows us to send in a formula so that Microsoft Office
large documents, or multiple documents, Excel can find the values or data that you
to a printer and not have to wait for it to want that formula to calculate.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
90

Ans.13(A) To permanently delete a file; Select the Ans.18(A) A workbook is another word for Excel
item you want to delete. Press and hold the file. When we start Excel, we click Blank
Shift key, then press the Delete key on workbook to create an Excel workbook
your keyboard. Because you cannot undo from scratch.
this, you will be asked to confirm that you Ans.19(A) Multiplication is the repeated Addition.
want to delete the file or folder. Ans.20(B) ENIAC was the first digital computer and
Ans.14(A) Mainframe computers are generally it was invented by J. Presper Eckert and
known for their large size, amount of John Mauchly at the University of
storage, processing power and high level Pennsylvania and began construction in
of reliability. They are primarily used by 1943.
large organizations for mission-critical Ans.21(D) NAND and NOR gates are the universal
applications requiring high volumes of gates, since it is the combination of all
data processing. three major gates AND, OR and NOT.
Ans.15(D) Computer-aided design (CAD) is the use Ans.22(C) A term used to describe the process of
of computer systems to assist in the searching for, locating, and returning data.
creation, modification, analysis, or For example, a user may retrieve a
optimization of a design. CAD software is document on a computer to be viewed or
used to increase the productivity of the modified.
designer, improve the quality of design, Ans.23(A) BIOS (basic input/output system) is the
improve communications through program a personal computer's
documentation, and to create a database microprocessor uses to get the computer
for manufacturing. system started after you turn it on. It also
Ans.16(C) System files are created and maintained manages data flow between the
by the operating system and are necessary computer's operating system and attached
for the system to perform its many devices such as the hard disk, video
functions. System files are used by many adapter, keyboard, mouse and printer.
commands and subroutines to perform Ans.24(D) A thesaurus is a software tool included
operations. These files can only be with some word processors that provides
changed by a user with root authority. synonyms for selected words on
Ans.17(A) An entity relationship model, also called command. Users using Microsoft Word
an entity-relationship (ER) diagram, is a can open a Thesaurus by highlighting the
graphical representation of entities and word they want to look up and pressing
their relationships to each other. An the shortcut key Shift+F7.
entity can be a real-world object that can Ans.25(D) FoxPro is a text-based procedurally
be easily identifiable. For example, in a oriented programming language and
school database, students, teachers, DBMS, originally published by Fox
classes, and courses offered can be Software and later by Microsoft, for MS-
considered as entities. DOS, Windows, Macintosh, and UNIX.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
91

Practice Set – 16

1. Which of the following is the collection of 10. Which of the following document means the file
related records? is transferred from another computer to your
(A) Data (B) File computer?
(C) Multiple record (D) Table (A) Uploading
2. A typical university or corporate LAN that (B) Downloading
includes one or more servers and clients is called (C) Accessing
a____ (D) Really Simple Syndication
(A) Master slave network (B) Peer-to-peer 11. While going through the 4G network, we may
(C) Client server network (D) LAN come across the term ‘LTE’. What does E
3. Which of these is not a means of personal represent?
communication in Internet? (A) Evolution (B) Improved
(A) Chat (B) Hangout (C) Envelop (D) Enabled
(C) Instant messaging (D) Instanotes 12. To access a mainframe or supercomputer, users
4. A detailed written description of the often use a ___
programming cycle and the program, along with (A) Desktop (B) Terminal
the test results and a printout of the program is (C) Node (D) HUB
called_______ 13. If you wanted to tell the database management
(A) Reporting (B) Documentation system that a specific attribute contained
(C) Output (D) Special sheet numbers only, what would you need to set?
5. To navigate to a new web page for which you (A) Data category
know the URL, type that URL in the browser's (B) Data Manipulating
_______ and press Enter (C) Data Integrity
(A) Name button (B) Home (D) Data type
(C) Address bar (D) Domain bar 14. What type of graphical model is used to define a
6. Computers use the ________ number system to database?
store data and perform calculations (A) Flow chart
(A) Binary (B) Hexadecimal (B) Bar chart
(C) Octal (D) Decimal (C) E-R diagram
7. A directory within a directory is called ________ (D) Programming model
(A) Small directory (B) Sub directory 15. Which of the following will converts all the
(C) Grand directory (D) Junior directory source code into machine code, creating an
8. _________ are specially designed computer executable file?
chips that reside inside other devices, such as (A) Linker (B) Compiler
your car or your electronic thermostat (C) Assembler (D) Interrupter
(A) Server 16. To read the system messages and warnings,
(B) Embedded system access in Windows, Which of the following files
(C) Client system should be checked?
(D) Robotic application (A) System manager (B) Even viewer
9. A(n) _____ allows you to access your e-mail (C) Control panel (D) System message
from anywhere 17. A hacker that changes or forges information in an
(A) forum (B) weblog electronic resource is known as ________
(C) webmail interface (D) message board (A) Terrorism (B) Data diddling
(C) Sniffing (D) Coping

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
92

18. A message with replies on a newsgroup is often 22. What type of monitoring file is commonly used
called a __________. on and accepted from Internet sites?
(A) Post (B) Reply (A) Cookies (B) Blogs
(C) Threads (D) Command (C) Website (D) Links
19. The program, which is used to gain 23. When one computer provides services to another
administrative rights to someone’s computer is computer, the environment is a(n) _____
known as ______. infrastructure.
(A) Boot (B) Rootkit (A) Master slave (B) Client /server
(C) Virus (D) Executive (C) Domain (D) Independent
20. What type of technology allows you to verbally 24. What type of technology scrambles the contents
speak with someone over the Internet? of files sent via the Internet?
(A) Wiki (B) Social Media (A) Encryption (B) Encoding
(C) VoIP (D) Blog (C) Cryptography (D) Security code
21. In the mail transferring process, we may come 25. What term is used to identify people coming
across the term ‘SMTP’. What does S represent? together from various geographical locations to
(A) System (B) Smart complete some task?
(C) Simple (D) Symmetric (A) Distributed team (B) Internet
(C) Virtual team (D) Similar team

Solution
Ans.1(D) Table is the collection of related record. Partnership Project (3GPP) that's designed
Ans.2(C) A typical university or corporate LAN that to provide up to 10x the speeds of 3G
includes one or more servers and clients is networks for mobile devices such as
called a Client server network. smartphones, tablets, netbooks, notebooks
Ans.3(D) Instanote is not a means of personal and wireless hotspots.
communication in Internet. Ans.12(B) The user can assess the Mainframe or
Ans.4(B) A detailed written description of the supercomputer from the Terminal.
programming cycle and the program, Ans.13(D) The specific attribute contained numbers
along with the test results and a printout of only are called Data type.
the program is called Documentation. Ans.14(C) E-R diagram is used to define a database
Ans.5(C) To navigate to a new web page for which Ans.15(B) Compiler will converts all the source code
you know the URL, type that URL in the into machine code, creating an executable
browser's Address bar and press Enter file
Ans.6(A) Computers use the Binary number system Ans.16(B) In Even viewer, the user can read the
to store data and perform calculations system messages and warnings, access in
Ans.7(B) A directory within a directory is called Windows.
Sub directory. Ans.17(B) A hacker will change or forge information
Ans.8(B) Embedded system are specially designed in an electronic resource is known as Data
computer chips that reside inside other diddling.
devices, such as your car or your Ans.18(C) A message with replies on a newsgroup is
electronic thermostat often called as Threads
Ans.9(C) A(n) webmail interface allows you to Ans.19(B) The program, which is used to gain
access your e-mail from anywhere administrative rights to someone’s
Ans.10(D) Really Simple Syndication means the file computer is known as Rootkit.
is transferred from another computer to Ans.20(C) VoIP is short for Voice over Internet
your computer Protocol. Voice over Internet Protocol is a
Ans.11(A) ‘LTE’ à Long Term Evolution(LTE) is a category of hardware and software that
4G wireless communications standard enables people to use the
developed by the 3rd Generation

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
93

Internet as the transmission medium for Ans.24(A) The contents of files will be sent via
telephone calls by sending voice data in internet after the files are encrypted by the
packets using IP process encryption.
rather than by traditional circuit Ans.25(C) A virtual team (also known as a
transmissions of the PSTN. geographically dispersed team, distributed
Ans.21(C) SMTP is known as Simple Mail Transfer team, or remote team) usually refers to a
Protocol. Simple Mail Transfer Protocol group of individuals who work together
(SMTP) is an Internet standard for from different geographic locations and
electronic mail (email) transmission. rely on communication technology such
Ans.22(A) The type of monitoring file is commonly as email, FAX, and video or voice
used on and accepted from Internet sites is conferencing services in order to
known as Cookies. collaborate.
Ans.23(B) If one computer provides services to
another computer, the environment is a(n)
Client /server infrastructure

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
94

Practice Set – 17

1. The computer cannot perform, without which of 11. If you wish to extend the length of the network
the following? without having the signal degrade, you would use
(A) Processor (B) Monitor _______.
(C) Key board (D) Storage (A) Switch (B) Transmitter
2. Which of the following is a hoc query? (C) Gateway (D) Repeater
(A) pre-planned question 12. Optimized for dial-up connections over noisy
(B) spur-of-the moment question telephone lines, the oldest packet-switching
(C) pre-scheduled question protocol for WAN usage, called ____________,
(D) question that will not return any results is still widely used.
3. Which bus carries information between (A) Cat – 5 (B) Cat- 6
processors and peripherals? (C) X.25 (D) Ethernet
(A) Address bus (B) Control bus 13. ADSL, SDSL, HDSL, and VDSL are examples
(C) Data bus (D) All of these of different types of _____________.
4. Which parts of the computer perform arithmetic (A) Ethernet
calculations? (B) Digital subscriber link
(A) ALU (B) Monitor (C) Modem
(C) Register (D) Bus (D) Subscription
5. Which of the following is example for embedded 14. A(n) ___________ is a system that includes the
system? collection of people, hardware, software, data
(A) ROM (B) RAM records, and activities that process the data and
(C) ATM (D) Machine information in an organization.
6. Formatting a disk results in _______ (A) traditional organization structure
(A) Saved to the disk (B) information system
(B) Copied from the disk (C) data mart
(C) Deleted from the disk (D) information functional unit
(D) Arranging the data in the disk 15. Which of the following is a general-purpose
7. What does the company name 'AMD' stand for? application?
(A) Always Making Dough (A) application features.
(B) Advanced Micro Devices (B) Productivity programs
(C) Alternating Micron Deficiencies (C) Multimedia programming
(D) A Mac Device (D) Internet application
8. A computer cannot "boot" if it does not have the 16. Disk is associated with _____
(A) Compiler (B) Loader (A) Internal storage (B) Main storage
(C) Assembler (D) Operating system (C) Secondary storage (D) All of these
9. Which of the following is used to convert one 17. A hybrid computer uses a ________ to convert
type of number system in to the other form? digital signals from a computer into analog
(A) Modifier (B) Translator signals.
(C) Decoder (D) Adder (A) Encryption (B) Decoder
10. The utilized by the computer to process input and (C) Modem (D) Modulator
provide output is known as ______. 18. A(n)________ is a register or main memory
(A) Delay time (B) Execution time location which contains the effective address of
(C) Real time (D) Down time the operand.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
95

(A) Special location (B) Pointer (C) To process client requests for database access
(C) Pen drive (D) Floppy (D) To provide TCP/IP
19. Computers gather data, which means that they 23. Storage that loses its data after the power is
allow users to ________ data. turned off is referred to as ______
(A) Input (B) Output (A) non-volatile (B) volatile storage
(C) Storage (D) All of these (C) sequential storage (D) random memory
20. To print an individual item in a file immediately 24. What type of memory is not directly addressable
click ____ by the CPU and required special software to
(A) Shift + P (B) Ctrl + P access it?
(C) Alt + P (D) Window + P (A) Main (B) Conventional
21. All the logical and mathematical calculations (C) Inbuilt (D) Expanded
done by the computer happen in/on the ______ 25. Signals can be analog or digital and a computer
(A) System board (B) CPU that processes the both type of signals is known
(C) Mother board (D) Memory as _______
22. A proxy server is used for which of the (A) Micro Computer
following? (B) Mainframe computer
(A) To provide security against unauthorized (C) Analog computer
users (D) Hybrid Computer
(B) To process client requests for Web pages

Solution
Ans.1(A) The computer cannot perform without Ans.13(B) ADSL, SDSL, HDSL, and VDSL are
Processor. examples of different types of Digital
Ans.2(B) Spur-of-the moment question is a hoc subscriber link.
query. Ans.14(B) A(n) information system is a system that
Ans.3(A) Address bus will carries information includes the collection of people,
between processor and peripheral devices. hardware, software, data records, and
Ans.4(A) Arithmetic and Logical Unit will perform activities that process the data and
the arithmetic calculation in the computer. information in an organization.
Ans.5(C) ATM (Automatic Teller Machine) is Ans.15(B) Productivity program is a general-purpose
example for embedded system. application.
Ans.6(C) Formatting the disk results in deleting the Ans.16(C) Disk is associated with Secondary storage.
information from disk. Ans.17(D) A hybrid computer uses a Modem to
Ans.7(B) AMD à Advanced Micro Devices is the convert digital signals from a computer
multinational semiconductor company. into analog signals
Ans.8(D) The computer cannot boot the system, if it Ans.18(A) A(n) Special location is a register or main
do not have Operating system. memory location which contains the
Ans.9(C) Decoder will convert one type of number effective address of the operand
system into another form of numbers Ans.19(A) Computers gather data, which means that
Ans.10(B) The utilized by the computer to process they allow users to Input data.
input and provide output is known as Ans.20(B) To print an individual item in a file
Execution time. immediately click Ctrl + P
Ans.11(D) You wish to extend the length of the Ans.21(B) All the logical and mathematical
network without having the signal calculations done by the computer happen
degrade, you would use Repeater. in/on the CPU.
Ans.12(C) Optimized for dial-up connections over Ans.22(A) A proxy server is used for to provide
noisy telephone lines, the oldest packet- security against unauthorized users
switching protocol for WAN usage, called
X.25 is still widely used

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
96

Ans.23(A) Storage that loses its data after the power Ans.25(D) Signals can be analog or digital and a
is turned off is referred to as non-volatile computer that processes the both type of
storage. signals is known as Hybrid Computer.
Ans.24(D) Expanded type of memory is not directly
addressable by the CPU and required
special software to access the memory.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
97

Practice Set – 18

1. Which of the following people probably has the 10. A program that generally has more user-friendly
least amount of technical knowledge? interface than a DBMS is called a ______
(A) Programmer (A) front end (B) back end
(B) Computer Operator (C) tool bar (D) form
(C) System analyst 11. Multi user systems provided cost savings for
(D) User small business because they use a single
2. What key distinctly identifies a record in a processing unit to link several ______
database table? (A) Personal Computer (B) Workstation
(A) Main Key (B) Major Key (C) Mainframes (D) Dumb terminals
(C) Principal Key (D) Primary Key 12. Which is a device designed to absorb and
3. Which of the following refers to a terminal disperse heat away from a microprocessor?
attached to a minicomputer or mainframe and (A) Heat sink (B) Compiler
used to monitor the status of the system? (C) Motherboard (D) PCI
(A) Monitor (B) Mouse 13. A computer that can be accessed by users across
(C) Console (D) Controller a network mainly or exclusively for storing and
4. Unauthorized access to restricted systems or supplying data files is known as ______
resources is referred as __________ (A) application server (B) data server
(A) Pharming (B) Penetrating (C) distributed server (D) file server
(C) Phishing (D) Publishing 14. The __________ is a special database that holds
5. Which is a special type of stored procedure that information about the computer’s user, installed
is automatically invoked whenever the data in the programs and hardware devices.
table is modified? (A) dynamic link library (B) initialization file
(A) Tripped (B) Trigger (C) windows registry (D) complier
(C) Procedure (D) Cursor 15. Software, such as Explorer and Firefox, are
6. A system call of OS which is used to create a new referred to as _____.
process is known as __________. (A) System software (B) Utility software
(A) Kernel (B) Shell (C) Application Software (D) Operating system
(C) Fork (D) None of these 16. Which IT area is well-established in Accounting?
7. Which of the following is the seventh layer of (A) Multimedia system
OSI layer? (B) Web development
(A) Physical Layer (B) Data link Layer (C) Statistical analysis
(C) Application Layer (D) Session Layer (D) Accounting Information Systems
8. The technique that extends storage capacities of 17. What type of web technology allows its
main memory beyond the actual size of the main community members to continuously change the
memory is called _______ contents on a website?
(A) Additional storage (B) Extra storage (A) Intelligent bots (B) Wiki
(C) Virtual storage (D) Stimulated storage (C) Social network (D) Blogs
9. A key that is used to alternate the input mode of 18. What term refers to living life through
a group of keys on a keyboard is known as _____ technology?
(A) Alpha Keys (B) Toggle keys (A) Fake living (B) False living
(C) Numerical key (D) Special key (C) E-livin (D) Social Living

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
98

19. What type of software secretly collects (A) Table sharing


information about you and your internet habits? (B) Multi-tasking
(A) Detection (B) Spy (C) object-oriented programming
(C) Collection (D) Spyware (D) Time sharing
20. What is the shortcut key to open the Document? 24. A simple automated program that scans the web
(A) Windows + r (B) Windows + w for specific data and insert into a designated
(C) Windows + e (D) Windows + p database ___.
21. What is the extension to save Database? (A) Web hacking
(A) .pnb (B) .png (B) Web mining
(C) .exe (D) .mdb (C) Web database integration
22. While we are studying about transmission speed (D) Web crawler
of the computer, we may came to know about the 25. A computer user obsessed with gaining entry into
term ‘MIPS’ What does M represents? highly secured computer system is called a(n)
(A) Million (B) Miles ______.
(C) Micro (D) Macro (A) Hacker (B) Copy
23. The ability of an OS to run more than one (C) Encrypting (D) Cracker
application at a time is called _____.

Solution
Ans.1(D) User will has least amount technical single processing unit to link several
knowledge. Dumb terminals
Ans.2(D) Primary key distinctly identifies a record Ans.12(A) Heat sink is a device designed to absorb
in a database table and disperse heat away from a
Ans.3(C) Console is refers to a terminal attached to microprocessor
a minicomputer or mainframe and used to Ans.13(D) A computer that can be accessed by users
monitor the status of the system across a network mainly or exclusively for
Ans.4(B) Unauthorized access to restricted systems storing and supplying data files is known
or resources is referred as Penetrating as file server
Ans.5(B) Special type of stored procedure that is Ans.14(C) The windows registry is a special database
automatically invoked whenever the data that holds information about the
in the table is modified is known as computer’s user, installed program sand
Trigger. hardware devices.
Ans.6(C) A system call of OS which is used to Ans.15(C) Software, such as Explorer and Firefox,
create a new process is known as Fork. are referred to as Application Software
Ans.7(C) Application Layer is the seventh layer of Ans.16(D) Accounting Information Systems is the IT
OSI layer area, which is well established in
Ans.8(C) The technique that extends storage Accounting.
capacities of main memory beyond the Ans.17(B) Wiki is the type of web technology allows
actual size of the main memory is called its community members to continuously
Virtual storage. change the contents on a website
Ans.9(B) A key that is used to alternate the input Ans.18(C) E-living is the term refers to living life
mode of a group of keys on a keyboard is through technology
known as Toggle Key. Ans.19(D) Spyware is the software secretly collects
Ans.10(D) A program that generally has more user- information about you and your internet
friendly interface than a DBMS is called a habits
form. Ans.20(C) Windows + e is the shortcut key to open
Ans.11(D) Multi user systems provided cost savings the Document
for small business because they use a Ans.21(D) The extension to save Database is .mdb

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
99

Ans.22(A) MIPS -->Million Instructions Per Second Ans.24(D) A simple automated program that scans
Ans.23(B) The ability of an OS to run more than one the web for specific data and insert into a
application at a time is called Multi- designated database Web crawler
tasking Ans.25(D) A computer user obsessed with gaining
entry into highly secured computer system
is called a(n) Cracker.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
100

Practice Set – 19

1. Which of the following printers is used in (B) A CD-ROM can be written to and a CDRW
conjunction with computers and uses dry ink cannot
powder? (C) A CD-RW can be written to but a CDROM
(A) Daisy wheel (B) Laser printer can only be read from
(C) Thermal printer (D) Band printer (D) A CD-ROM holds more information than a
2. A specialized network device that determines the CD-RW
next network point to which it can forward a data 11. The scanner can scan a document or image by
packet towards the destination of the packet is ______.
commonly known as __________ (A) Document by Document
(A) bridge (B) router (B) Line by line
(C) switch (D) hub (C) Pixel by Pixel
3. The operation of a digital computer is based on (D) Paragraph by Paragraph
_______ principle 12. If each and every system in the networks are
(A) electronically (B) computer connected together then such a topology are
(C) operational (D) measuring kwon as _______.
4. Which of the following programs is not a utility? (A) Star (B) Bus
(A) Spooler (B) Debugger (C) Ring (D) Mesh
(C) Edition (D) Both A or B 13. In excel, chats are created using which option
5. RAM chip was invented by which of the (A) chart wizard (B) pie chart
following company? (C) pivot table (D) bar chart
(A) Intel (B) Toshiba 14. Rules for exchanging data between computers
(C) IBM (D) Cisco are called __________
6. Find out who is not the inventor of transistors (A) Procedures (B) Protocols
among following names (C) Hyperlink (D) Programs
(A) John Burdeen (B) William Shockley 15. The Software tools that enable a user to interact
(C) Walter Brattain (D) Lee de Forest with a computer for specific purposes are known
7. Which of the following order is definitely true, as ______________.
based on the distance coverage of the network? (A) Hardware
(A) MAN > LAN > WAN (B) Networked Software
(B) MAN > WAN > LAN (C) Shareware
(C) WAN > LAN > MAN (D) Applications
(D) WAN > MAN > LAN 16. A program which helps create written documents
8. Tape speed can be measured in __________ and lets you go back and make necessary
(A) Feet per second (B) Inch per second corrections is _________.
(C) Meter per second (D) Bits per second (A) Spreadsheet (B) Personal writer
9. Accessing the information in once computer, (C) Word printer (D) Word processor
without their knowledge is known as _____ 17. When a file contains instructions that can be
(A) Tracking (B) Hacking carried out by the computer, it is often called a(n)
(C) Routing (D) Coping ______ file.
10. What is the difference between a CD-ROM and (A) data (B) information
a CD-RW? (C) executable (D) application
(A) They are the same –just two different terms 18. Firewall is used in communication network
used by different manufactures system to save ______.
(A) Unauthorized attack (B) Virus attack
(C) Data driven attack (D) Fire attack

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
101

19. The ___________ folder retains copies of (C) Enterprise Resource Planning
messages that you have started but are not yet (D) Enterprise Reorder Planning
ready to send. 23. Which of the following gate will person addition
(A) Inbox (B) Send mail operation?
(C) Trash (D) Outbox (A) AND (B) OR
20. Which of the following layer is the third layer of (C) NOR (D) NOT
OSI layer? 24. While studying networking we may come across
(A) Physical (B) Application the term ‘TCP’. What does T represent?
(C) Presentation (D) Network (A) Transistor (B) Transfer
21. Which ports connect special types of music (C) Transmission (D) Travel
instruments to sound cards? 25. A ________ computer is a large and expensive
(A) BUS (B) UPS computer capable of simultaneously processing
(C) USB (D) MIDI data for hundreds or thousands for users.
22. Expand ERP? (A) server (B) mainframe
(A) Enterprise Retirement Planning (C) desktop (D) tablet
(B) Enterprise Relationship Planning

Solution
Ans.1(B) Laser printer is used in conjunction with Ans.16(D) A program which helps create written
computers and uses dry ink powder documents and lets you go back and make
Ans.2(B) A specialized network device that necessary corrections is Word processor
determines the next network point to Ans.17(C) When a file contains instructions that can
which it can forward a data packet towards be carried out by the computer, it is often
the destination of the packet is commonly called a(n) executable file
known as Router. Ans.18(A) Firewall is used to protect system from
Ans.3(D) The operation of a digital computer is unauthorized attack.
based on measuring principle Ans.19(D) The Outbox folder retains copies of
Ans.4(A) Spooler is not a utility program. messages, which are not sent
Ans.5(A) RAM chip was invented by Intel company Ans.20(D) Network layer is the third layer of OSI
Ans.6(D) Lee de Forest is the father of Radio. layer.
Ans.7(D) WAN (Country) > MAN (City) > Ans.21(D) MIDI (Musical Instrument Digital
LAN(100m) Interface) is a protocol designed for
Ans.8(B) The Speed of the Tape can be measured in recording and playing back music on
Inch per second digital synthesizers that is supported by
Ans.9(B) Accessing the information in once many makes of personal computer sound
computer, without their knowledge is cards
known as Hacking. Ans.22(C) Enterprise resource planning (ERP) is
Ans.10(C) CD-ROM --> Can only read business process management software
CD – RW --> can read and write. that allows an organization to use a system
Ans.11(C) The scanner can scan a document or image of integrated applications to manage the
by Pixels by Pixels. business and automate many back office
Ans.12(A) In Star topology every system are functions related to technology, services
connected together. and human resources.
Ans.13(A) The Chat can be created in the excel by Ans.23(B) OR operation will perform Addition
using chart wizard operation.
Ans.14(B) Protocols are the rules for exchanging data Ans.24(C) TCP --> Transmission control protocol.
between computers. Ans.25(B) A mainframe computer is a large and
Ans.15(D) The Software tools that enable a user to expensive computer capable of
interact with a computer for specific simultaneously processing data for
purposes are known as Application. hundreds or thousands for users.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
102

Practice Set – 20

1. A program designed to destroy data on your 10. Which of the following is not a error in C
computer which can transfer to other computers programming?
and infect data is called a ______ (A) Syntax error (B) Runtime error
(A) virus (B) infector (C) Logic error (D) Server error
(C) file (D) App 11. Extensible Markup Language (XML) is a simple,
2. Which of the part of a computer that co-ordinates very flexible text format, Which is derived from
all its functions is called ____________. _______.
(A) ALU (B) Mother Board (A) HTML (B) ETML
(C) Storage (D) Control Unit (C) STML (D) SGML
3. The second generation computer which was built 12. ________ is software which has its source code
by transistors was built by ________________. freely available for use, viewing, modification,
(A) Oxford University and redistribution.
(B) Stanford University (A) Source code (B) Free code
(C) ETH Zurich (C) Open source (D) Free Software
(D) University of Manchester 13. Which of the following was the world's first
4. ASCII is the character encoding standard for electronic programmable computing device?
electronic communication. What does ‘II’ (A) EDVAC (B) ENIAC
represents? (C) PC (D) Colossus
(A) International Internship 14. Coded entries which are used to access to a
(B) International Information system are called _____________.
(C) Information Interchange (A) Decrypt Key (B) Password
(D) Input International (C) Source code (D) Folder name
5. The UNIX, which command is used to display 15. The processing speed of the computer is depends
the message or value of any variable on the on_____
screen. (A) Power supply (B) Clock pulse
(A) Char (B) Info (C) Peripheral interfaces (D) Transmission size
(C) Ping (D) Echo 16. Instruction in computer languages consists of
6. Each boxes in the spread sheet are named as ______.
_____ (A) OPCODE (B) OPERAND
(A) Row (B) Column (C) Source code (D) Either A or B
(C) Sheet (D) Cell 17. If in a computer, 16 bits are used to specify
7. Each page in the Microsoft power point are address in a RAM, the number of addresses will
named as ________ be _____ bits
(A) Document (B) Page (A) 216 (B) 64K
(C) Sheet (D) Slide (C) 65536 (D) 1028
8. Which are the following keys are used to runs a 18. FORTRAN programming language is more
Thesaurus check on the selected word? suitable for ____
(A) Shift + A (B) Shift + Y (A) Business Application
(C) Shift + F7 (D) Shift + F3 (B) Marketing Application
9. A computer cannot "boot" if it does not have the (C) Scientific Application
_____________. (D) Social Application
(A) Output device (B) Input device 19. EEPROM stands for ______________
(C) Operating system (D) Application (A) Electrically Erasable Programmable Read
Only Memory

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
103

(B) Electronic Erasable Programmable Read 22. ________ is an early packet switching network
Only Memory and the first network to implement the protocol
(C) Easily Erasable Programmable Read Only suite
Memory (A) CNNET (B) ARPANET
(D) Ever Non Erasable Programmable Read (C) ASAPNET (D) NSFNET
Only Memory 23. Which is most common language used in web
20. The speed of the data transmission in the designing?
networks is calculated by ________. (A) C (B) C++
(A) Bits/Sec (B) GB/hr (C) PHP (D) HTML
(C) Nipple/Sec (D) MB/sec 24. Specialized program that allows user to utilize in
21. Presentation of a series of still images on a specific application is classified as ______
projection screen or electronic display device is (A) Application program (B) Utility program
called as _____ (C) System program (D) Logical program
(A) Video (B) Slide show 25. Which of the following is not a browser?
(C) Slide runner (D) Movie clip (A) Mozilla (B) Internet explore
(C) Google (D) Chrome

Solution
Ans.1(A) A computer virus is a type of malicious Ans.13(D) Colossus was the world's first electronic
software that, when executed, replicates digital programmable computer. It used a
itself by modifying other computer large number of valves (vacuum tubes). It
programs and inserting its own code. had paper-tape input and was capable of
Ans.2(D) Control unit can process and control all being configured to perform a variety of
the data. Boolean logical operations on its data,
Ans.3(D) Second generation computer was built at but it was not Turing-complete.
university of Manchester. Ans.14(B) The coded entries are Password which
Ans.4(C) ASCII --> American Standard Code for was used to access system
Information Interchange Ans.15(B) The clock pulse producing inside the
Ans.5(D) ECHO is a command typically used in computer is the major responsible for the
shell scripts and batch files to output status speed of the computer.
text to the screen or a file, or as a source Ans.16(5) Instruction in computer languages
part of a pipeline consists of OPCODE and OPERAND
Ans.6(5) Each boxes in the spread sheets are named Ans.17(C) If in a computer, 16 bits are used to specify
as Cell address in a RAM, the number of
Ans.7(D) Each page in power point is named as addresses will be 65536 bits
slide Ans.18(C) FORTRAN programming language is
Ans.8(C) Shift + F7 is the key to run a thesaurus more suitable for Scientific Application.
check on the selected word. Ans.19(A) EEPROM --> Electrically Erasable
Ans.9(C) The computer cannot boot without Programmable Read Only Memory
Operating system Ans.20(A) The speed of the data transmission are
Ans.10(5) Sever error is not in C programming mainly calculated by Bits/sec
Ans.11(D) Extensible Markup Language (XML) is a Ans.21(B) Presentation of a series of still images on
simple, very flexible text format derived a projection screen or electronic display
from SGML (Standard Generalized device is called as Slide show
Markup Language). Ans.22(B) The Advanced Research Projects Agency
Ans.12(C) Open Source is software which has its Network (ARPANET) was an early
source code freely available for use, packet switching network and the first
viewing, modification, and redistribution. network to implement the protocol suite

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
104

TCP/IP. Both technologies became the Ans.24(A) Specialized program that allows user to
technical foundation of the Internet. utilize in specific application is classified
Ans.23(D) HTML (Hypertext Markup Language) is as Application program.
the standard markup language for creating Ans.25(C) Google is the search engine it is not a
web pages and web applications. browser.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
105

Practice Set – 21

1. What is the shortcut key for spell check in (A) Batching (B) Processing
Microsoft word? (C) Utilizing (D) Upgrading
(A) F4 (B) F7 11. In which part of the computer, does the data is
(C) F2 (D) F5 stored before entering in to CPU from the Main
2. Large transaction processing systems in memory?
automated organizations use ________. (A) External hard disk
(A) Online processing (B) Secondary memory
(B) Batch processing (C) Cache memory
(C) Once-a-day processing (D) In CPU
(D) End-of-day processing 12. The electronic path, that connect one part of
3. Abacus was the first _________ computer to another is _____
(A) Electronic computer (A) Serial Port (B) Parallel Port
(B) Mechanical computer (C) Logical gate (D) Bus
(C) Electronic calculator 13. In the data flow diagram we may came across the
(D) Mechanical calculator symbol. What does the symbol represents?
4. Which of the following letter is the wild card, (A) Process (B) Decision
that stands in the place of a series of letters? (C) Terminal (D) Start
(A) # (B) * 14. While studying DBMS, we many came across
(C) % (D) + the term SQL, What does ‘S’ represents?
5. Specialized program that assist users in locating (A) Study (B) Sequence
information of the web are called ____ (C) Steady (D) Structured
(A) Search engine (B) Brower 15. ‘COBOL’ is one of the high-level programming
(C) Resource locater (D) Antivirus languages, what does B represents?
(5) None of these (A) Business (B) Buyer
6. What is the short cut key to go to the file menu (C) Backend (D) Busy
option in current program? 16. Which of the following gates is called as Inverse
(A) Alt + W (B) Ctrl + F gate?
(C) Alt + F (D) Ctrl + W (A) EXOR (B) EXNOR
7. What is the extension used in executable file? (C) NOR (D) NOT
(A) .txt (B) .ppl 17. Arranging the data in sequence is known as
(C) .pdf (D) .exe _____
8. What is the full form for MODEM? (A) Processing (B) Sorting
(A) Modern determination (C) Lining (D) Ordering
(B) Module demolition 18. In the 4g connection we may study about the term
(C) Modulation demodulation ‘LTE’ what does T represents?
(D) Model design (A) Transmission (B) Transfer
9. While studying about networking we may came (C) Term (D) Trans
across the term UDP. What does D stands for? 19. ______ type of program controls the various
(A) data (B) description computer parts and allows the user to interact
(C) datagram (D) development with the computer
10. The computer is manipulating data in many (A) Application Software (B) Utility software
ways, and this manipulating is called ________ (C) Middleware (D) System software

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
106

20. The process is to check and ensure the 23. ______ refers to the unauthorized copying and
components of the computer are operating and distribution of software.
connected properly is known as ______ (A) Hacking (B) Manipulating
(A) Repairing (B) Checking (C) Software Integrity (D) Software Piracy
(C) Paring (D) Booting 24. The process of transferring documents, graphics,
21. Which of the following operating system is not and other objects from your computer to a server
licensed by any company? on the Internet is called _________
(A) Windows (B) Apple (A) Downloading (B) Buffering
(C) UNIX (D) LINUX (C) Streaming (D) Uploading
22. Underlined text, such as text and folder names is 25. The most Powerful keys that let you exit a
referred to as a program when pushed
(A) Icon (B) Storage (A) Ctrl (B) Alt
(C) Source (D) Hyperlink (C) Esc (D) Caps lock

Solution
Ans.1(D) Spell Check in Microsoft word can be Ans.15(A) COBOL --> Common Business Oriented
done by F5. Language. It is the primary domain in
Ans.2(B) In computing, batch processing refers to a business, finance and administration.
computer working through a queue or Ans.16(D) NOT gate is also called as Inverse gate.
batch of separate jobs (programs) without Ans.17(B) The Arranging the data in sequence is
manual intervention (non-interactive). known as sorting
Ans.3(D) The abacus is a counting frame, is a Ans.18(C) LTE --> Long term evolution
calculating tool that was in use in Europe, Ans.19(B) Utility software is type of program
China and Russia, centuries before the controls the various computer parts and
adoption of the written Hindu–Arabic allows the user to interact with the
numeral system computer
Ans.4(B) ‘*’ is the wild card letter in the program Ans.20(D) Booting is the process to check and ensure
Ans.5(A) Specialized program that assist users in the components of the computer are
locating information of the web are called operating and connected properly
Search engine. Ans.21(C) UNIX is not owned and licensed by a
Ans.6(C) Alt + F is the short cut key to go to the file company
menu option in current program Ans.22(D) Underlined text, such as text and folder
Ans.7(D) The executable files can be scored in the names is referred to as a Hyperlink
format .exe. Ans.23(D) Software piracy is the stealing of legally
Ans.8(C) Modulation demodulation is the protected software. Under copyright law,
abbreviation for MODEM. software piracy occurs when copyright
Ans.9(D) UDP --> User Datagram Protocol protected software is copied, distributed,
Ans.10(B) The computer is manipulating data in modified or sold. Software piracy is
many ways, and this manipulating is considered direct copyright infringement
called processing. when it denies copyright holders due
Ans.11(C) The data is stored in Cache memory, compensation for use of their creative
before entering in to CPU from the Main works.
memory. Ans.24(D) The process of transferring documents,
Ans.12(D) The electronic path, that connect one part graphics, and other objects from your
of computer to another is called Bus computer to a server on the Internet is
Ans.13(B) It represents the decision-making symbol. called uploading
Ans.14(D) SQL --> Structured Query Language Ans.25(C) The Escape Key is the most powerful key,
which will exit a program.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
107

Practice Set – 22

1. Which one of the following error will not be (C) Produce a set of programs
handle by the operating system? (D) Produce user-understandable programs
(A) Power failure 9. How can a user determine what programs are
(B) Lack of paper in Printer available on a computer?
(C) Failure of Network (A) By checking the hard-disk properties
(D) The Virus attack (B) By viewing the installed programs during the
2. ___________ is a malicious act in which a large booting process
number of email messages are sent to a single (C) By checking the operating system for a list of
email address in a short period of time. installed programs
(A) Sending (B) Copying (D) By checking the existing files saved on the
(C) E-Mail bomb (D) Hacking disk
3. Which button is called as middle button used as 10. The processing speed of the computer are
third mouse button by pressing on it. depends upon _____
(A) Right button (B) Scroll wheel (A) Input power
(C) Select (D) Cursor (B) Network connection
4. ICANN is the nonprofit corporation, which is (C) Number of Peripherals
responsible for allocation of IP address and (D) Clock pulse generating in the system
managing the domain name. What does A 11. Which of the following registers is used to keep
represent? track of the address of the memory location
(A) Assigned (B) Assisted where the next instruction is located?
(C) Aided (D) Adopted (A) Memory address register
5. __________is a type of denial of service (DoS) (B) Memory data register
attack that sends a series of “SYN” messages to (C) Instruction registers
a computer, such as a web server. (D) Program counter
(A) SYN source (B) TCP RST 12. In Hexadecimal numbers, how was F represents?
(C) TCP SYN (D) SYN flood (A) 11 (B) 12
6. To find a saved document in the computer’s (C) 15 (D) 14
memory and bring it up on the screen to view 13. What resides on the motherboard and connects
_______. the CPU to other components on the
(A) Reverse (B) Return Motherboard?
(C) Retrieve (D) Return (A) System Bus (B) Monitor
7. Two different files can have the same name if (C) ALU (D) CPU
_____ 14. In power point the header and footer can be found
(A) They are in different folders on the insert table in what group?
(B) They have same content (A) Illustration group (B) Text group
(C) They have different content (C) Table group (D) Object group
(D) Never 15. Which of the following represents user identity
8. Application software enables the computer to describes a situation in which one person or
______. program successfully masquerades as another by
(A) Produce some specific output for the users falsifying data?
(B) Can access whole system without the (A) Authentication (B) Spoofing
knowledge of user. (C) Altering (D) Malpractice

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
108

16. Which of the following is the corrupted data of 21. ______ is a program that visits web sites and
hard disk? reads their pages and other information in order
(A) Spoofing (B) Ripper to create entries for a search engine index
(C) Corrupt (D) Hang (A) Web hacker (B) Web crawler
17. Telephone is the example for which of the (C) Web source (D) Blogger
following? 22. _______ is a computer that offers a computer
(A) Simplex (B) Half Duplex network service to allow clients to make indirect
(C) Full Duplex (D) Multiplex network connections to other network services.
18. What is the extension to save PowerPoint (A) Server (B) Proxy server
document? (C) Client (D) Back page
(A) .doc (B) .com 23. FAT maintained by OS on a hard disk that
(C) .pdf (D) .ppt provides a map of clusters (logical units of
19. The peripheral nodes are connected to a central storage) that a file has been stored. What does A
node, which rebroadcasts all transmissions represent?
received from any peripheral node to all (A) Allotment (B) Allocation
peripheral nodes on the network, including the (C) Amount (D) Adopt
originating node is known as ____. 24. _____ is the specialized OS for use in computers
(A) Star (B) Bus which are built into larger systems.
(C) Mesh (D) Ring (A) Embedded OS (B) Real time OS
20. Which of the following layer is responsible for (C) Mobile OS (D) Network OS
transmission and reception of the unstructured 25. A(n) ______ allows you to access your e-mail
raw bit stream over a medium? from any-where.
(A) Application layer (A) Interconnector
(B) Physical layer (B) Webmail interface
(C) Data link layer (C) Mother board
(D) Transmission layer (D) Web blog

Solution
Ans.1(D) The error happened by the Virus attack Ans.6(C) To find a saved document in the
cannot be handled by the operating computer’s memory and bring it up on the
system. screen to view is know as Retrive.
Ans.2(C) An email bomb or "mail bomb" is a Ans.7(A) The two different files can be saved in the
malicious act in which a large number of same name, if they are saved in different
email messages are sent to a single email folders.
address in a short period of time. The Ans.8(A) The application software has used to
purpose of an email bomb is typically to produce some specific output.
overflow a user's inbox. Ans.9(C) The user can check the installed programs
Ans.3(B) Scroll wheel is called as middle button in the operation system.
used as third mouse button by pressing on Ans.10(D) The clock pulse generating in the system
it. will determined the processing speed of
Ans.4(A) ICANN --> Internet Corporation for the computer.
Assigned Names and Numbers Ans.11(D) The program counter is used to keep track
Ans.5(D) A SYN flood is a form of denial-of- of the address of the memory location
service attack in which an attacker sends a where the next instruction is located.
succession of SYN requests to a target's Ans.12(C) F ⇒ 15
system in an attempt to consume enough Ans.13(A) System Bus resides on the motherboard
server resources to make the system and connects the CPU to other
unresponsive to legitimate traffic. components on the Motherboard

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
109

Ans.14(B) In power point the header and footer can Ans.20(B) The Physical layers responsible for
be found on the insert table in Text group. transmission and reception of the
Ans.15(B) Spoofing represents user identity unstructured raw bit stream over a
describes a situation in which one person medium
or program successfully masquerades as Ans.21(B) Web crawler is a program that visits web
another by falsifying data. sites and reads their pages and other
Ans.16(B) The corrupted data of hard disk is called information in order to create entries for a
Ripper. search engine index
Ans.17(C) Telephone is the example for Full Duplex Ans.22(B) The proxy server is a computer that offers
Ans.18(D) The extension to save power point a computer network service to allow
document as .ppt clients to make indirect network
Ans.19(A) The peripheral nodes are connected to a connections to other network services.
central node, which rebroadcasts Ans.23(B) FAT ⇒ File Allocation table
originating node received from any Ans.24(A) Embedded OS is the specialized OS for
peripheral node to all peripheral nodes on use in computers which are built into
the network, including the originating larger systems.
node is known as Star topology. Ans.25(B) A Web interface allows you to access your
e-mail from anywhere.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
110

Practice Set – 23

1. ______ is the software creates a mirror image of 11. A(n) ____________ query displays a subset of
the entire hard disk, including operating system, data from one table based on specified criteria.
application, files and data. (A) Select (B) Variable
(A) Operating system (B) Backup software (C) Operational (D) Joint
(C) Drive imaging (D) Utility software 12. What is the name of the interrupt which can be
2. The computer to which a user’s computer minimized?
connects in order to access the internet is called (A) Time interrupt
________. (B) Makeable interrupt
(A) Client (B) Server (C) Maskable interrupt
(C) PDA (D) Super computer (D) Nonpackable interrupt
3. ROLLBACK of the database is called____ 13. A disk scheduling algorithm in an operating
statement. system causes the disk arm to seek back and forth
(A) TCL (B) DCL across the disk surface servicing all requests in
(C) DDL (D) SDL its path, based on ____.
4. ____is the ability of a device to "jump" directly (A) First come first served
to the requested data. (B) Shortest Seek Time First
(A) Sequential access (B) Random access (C) Scan
(C) Quick access (D) All the above (D) Latency time
5. The programs which are as permanent as 14. In an absolute loading scheme, which loader
hardware and stored in ROM is known as _____. function is accomplished by assembler?
(A) Hardware (B) Hard disk (A) Reallocation (B) Allocation
(C) Software (D) Firmware (C) Linking (D) Loading
6. Which of the following is the communications 15. The file structure that redefines its first record at
protocol that sets the standard used by every a base of zero uses the term ______.
computer that accesses Web - based information? (A) Relative organization
(A) XML (B) DML (B) Key fielding
(C) HTTP (D) HTML (C) Dynamic reallocation
7. Hardware devices that are not part of the main (D) Hashing
computer system and are often added later to the 16. Which of the following in not a input device?
system. They are called _____. (A) Touch screen (B) Keyboard
(A) Peripheral (B) Clip art (C) Joystick (D) Printer
(C) Highlight (D) Executive 17. A technique for searching special databases,
8. ________ is when the computer is turned on and called data warehouses, looking for related
the operating system is loading. information and patterns is called _____.
(A) Flashing (B) Tracking (A) Data redundancy
(C) Tapping (D) booting (B) Data mining
9. The name for the way that computers manipulate (C) Data integrity
data into information is called ____. (D) Data programming
(A) Programming (B) Processing 18. While studying about computer, we may came to
(C) Sorting (D) Organizing know about the term QDR. Expand QDR?
10. UTP and STP are example for ____. (A) Quad data rate
(A) CATV Cable (B) Quad decryption region
(B) Thicket coaxial cable (C) Quad degree region
(C) Fiber optical cable (D) Quad deficit rate
(D) Twisted pair cable

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
111

19. Imagine that a user has a WORD document open (A) Online updating (B) Batching
at a workstation and that workstation is (C) Sorting (D) Offline Updating
unexpectedly disconnected from the school 23. While studying about networking, we may came
network and from the Internet. Where should the to know about the term SACK. What does SACK
user BEST save her work? represents?
(A) USB key (B) P drive (A) Selection Acknowledgement
(C) H drive (D) S drive (B) Selective Acknowledgement
20. _____ cells involve creating a single cell by (C) Supreme request
combining two or more selected cells. (D) Suppress Data
(A) Splitting (B) Uniting 24. What is the shortcut key to centre alignment of
(C) Together (D) Merging the paragraph?
21. Multiple choice examination answer sheets can (A) Ctrl + T (B) Ctrl + J
be evaluated automatically by _______ (C) Ctrl + E (D) Ctrl + W
(A) Optical character recognitions 25. Which of the following memories has the
(B) Optical character reader shortest access time?
(C) Optical Mark reader (A) Main memory
(D) Magnetic tape reader (B) Secondary memory
22. A file is corrected immediately after the input of (C) Cache memory
a transaction. This is an example of _____. (D) Virtual memory

Solution
Ans.1(C) Drive imaging is the software creates a Ans.10(D) UTP and STP are example for twisted pair
mirror image of the entire hard disk, cable.
including operating system, application, Ans.11(A) The select query displays a subset of data
files and data. from one table based on specified criteria.
Ans.2(B) The computer to which a user’s computer Ans.12(C) The interrupt, which can be minimized are
connects in order to access the internet is Maskable interrupt
called Server Ans.13(C) A disk scheduling algorithm in an
Ans.3(A) ROLLBACK of the database is called operating system causes the disk arm to
TCL (Transaction control language) seek back and forth across the disk surface
statement servicing all requests in its path, based on
Ans.4(B) Random access is the ability of a device to Scan
"jump" directly to the requested data. Ans.14(A) In an absolute loading scheme,
Ans.5(D) The programs which are as permanent as Reallocation loader function is
hardware and stored in ROM is known as accomplished by an assembler.
Firmware. Ans.15(A) The file structure that redefines its first
Ans.6(C) HTTPis the communications protocol that record at a base of zero uses the term
sets the standard used by every computer relative organization.
that accesses Web - based information Ans.16(5) Printer is an output device
Ans.7(A) Hardware devices that are not part of the Ans.17(B) A technique for searching special
main computer system and are often databases, called data warehouses,
added later to the system. They are called looking for related information and
peripheral. patterns is called Data mining.
Ans.8(D) Booting is when the computer is turned on Ans.18(A) QDR ⇒Quad data rate
and the operating system is loading. Ans.19(C) The data which are opened in the
Ans.9(B) The name for the way that computers workstation, which is disconnected will be
manipulate data into information is called stored in H drive.
Processing

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
112

Ans.20(D) Merging cells involves creating a single Ans.22(A) A file is corrected immediately after the
cell by combining two or more selected input of a transaction. This is an example
cells. of Online updating.
Ans.21(C) Multiple choice examination answer Ans.23(B) SACK ⇒ Selective Acknowledgement
sheets can be evaluated automatically by Ans.24(C) The shortcut key to center alignment of
Optical Mark Reader. the paragraph is Ctrl + E
Ans.25(C) Cache memory will take shortest access
time.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
113

Practice Set – 24

1. Which is not a computer classification? (A) Encryption (B) Audits


(A) mainframe (B) maxframe (C) UPS (D) Firewalls
(C) mini (D) notebook 10. The Internet began with the development of___.
2. Which operation is not performed by computer. (A) USENET (B) ARPANET
(A) Inputting (B) Processing (C) Ethernet (D) Intranet
(C) Controlling (D) Understanding 11. Website is a collection of ________.
3. Cell phones use ___________ to access the (A) HTML documents
Internet. (B) Graphic files
(A) MMS technology (C) Audio and Video files
(B) a notation system (D) All of the above
(C) micro browser software 12. Who designed the first electronic computer -
(D) HTML language ENIAC?
4. In CSMA/CD, the computer sends a fixed unit of (A) Van Neuman
data called a(n)_______ (B) Joseph M Jacquard
(A) Node. (B) Packet. (C) J presper Eckert
(C) Override. (D) Token. (D) Both A and B
5. The uniform resource locator (URL) is case 13. Which of the following is not a network?
sensitive in the ____. (A) Local Area Network
(A) Protocol (B) Authority (B) Wide Area Network
(C) Directory (D) Type (C) Optical Fiber
6. ASCII is a(n)________ (D) All are networks
(A) Numbering system for representing numbers 14. In MICR, C stands for?
with decimals. (A) Code (B) Colour
(B) Character representation standard common (C) Computer (D) Character
in older mainframe computers. 15. Which of the following is the largest unit of
(C) Encoding standard used to represent letters storage?
and characters. (A) GB (B) KB
(D) Symbolic programming language that (C) MB (D) TB
directly represents machine instructions. 16. Virtual memory is?
7. A global network made up of thousands of (A) Memory on the hard disk that the CPU uses
privately owned computers and networks is an extended RAM
called - (B) in RAM
(A) World Wide Web. (C) Only necessary if you do not have any RAM
(B) Internet. in your computer
(C) Specialized search engine. (D) a backup device for floppy disks
(D) Internet2. 17. ___ is the process of finding errors in software
8. Which of the following is NOT a basic function code?
of the operating system? (A) Compiling (B) Testing
(A) Manage memory (C) Running (D) Debugging
(B) Provide the word processing system 18. What is the shortcut key to "Undo" the last action
(C) Start the computer in a document?
(D) Provide the user interface (A) Ctrl + X (B) Ctrl + Y
9. Which of the following scrambles a message by (C) Ctrl + Z (D) Ctrl + U
applying a secret code?

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
114

19. The programs which are as permanent as (A) Push the text in with respect to the margin
hardware and stored in ROM is known as. (B) change the margins on the page
(A) Hardware (B) Software (C) move the text up by one line
(C) Firmware (D) ROM ware (D) move the text down by one line
20. For creating a document, you use........ Command 24. ASCII stands for.........
at File Menu. (A) American Special Computer for Information
(A) Open (B) Close Interaction.
(C) New (D) Save (B) American Standard Computer for
21. Computer uses the _________ number system to Information Interchange.
store data and perform calculations. (C) American Special Code for Information
(A) Binary (B) octal Interchange.
(C) Decimal (D) Hexadecimal (D) American Standard Code for Information
22. ________ is the process of carrying out Interchange.
commands? 25. Which of the following is used by the browser to
(A) Fetching (B) Storing connect to the location of the Internet resources?
(C) Decoding (D) Executing (A) Linkers (B) Protocol
23. In word, when you indent a paragraph, you… (C) Cable (D) URL

Solution
1.(B) Maxframe is not any type of computer. devices “sense” that the wire is clear and
There are 7 types of computer- send packets at the same time, a collision
Supercomputer can occur. If the collision occurs, packets
Mainframe have to be resend after a random period
Server Computer of time.
Workstation Computer 5.(C) In computing, a directory is a file system
Personal Computer or PC cataloging structure which contains
Micro controller references to other computer files, and
Smartphone possibly other directories. On many
2.(D) Understanding is not performed by any computers, directories are known as
computer. Understanding is a folders, or drawers, analogous to a
psychological process related to an workbench or the traditional office filing
abstract or physical object, such as a cabinet.
person, situation, or message whereby one 6.(C) It stands for "American Standard Code for
is able to think about it and use concepts Information Interchange." ASCII is a
to deal adequately with that object. character encoding that uses numeric
Understanding is a relation between the codes to represent characters. These
knower and an object of understanding. include upper and lowercase English
3.(C) Cell phones use a notation system to letters, numbers, and punctuation
access the Internet. A cellular network or symbols.
mobile network is a communication 7.(B) The Internet is a global wide area network
network where the last link is wireless. that connects computer systems across the
The network is distributed over land areas world. It includes several high-bandwidth
called "cells", each served by at least one data lines that comprise the Internet
fixed-location transceiver, but more "backbone. "These lines are connected to
normally, three cell sites or base major Internet hubs that distribute data to
transceiver stations. other locations, such as web servers and
4.(B) CSMA/CD enables devices to “sense” the ISPs.
wire to ensure that no other device is 8.(B) Provide the word processing system is not
currently transmitting packets. But, if two a basic function of operating system. word

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
115

processing system is typically entering a documents, especially checks. Special ink,


text by typing, and the software provides which is sensitive to magnetic fields, is
tools for copying, deleting and various used in the printing of certain characters
types of formatting. Some of the functions on the original documents.
of word processing software include: 15.(D) A Terabyte (TB) is a measure of computer
Creating, editing, saving and printing storage capacity that is approximately 2 to
documents. Copying, pasting, moving and the 40th power, or 10 to the 12th power,
deleting text within a document. which equals approximately a trillion
9.(A) Encryption is a process that encodes a bytes. A Terabyte is more precisely
message or file so that it can be only be defined as 1,024 gigabytes (GB), while a
read by certain people. Encryption uses an petabyte consists of 1,024 TB.
algorithm to scramble, or encrypt, data 16.(A) Virtual memory is a feature of an
and then uses a key for the receiving party operating system that enables a computer
to unscramble, or decrypt, the to be able to compensate shortages of
information. physical memory by transferring pages of
10.(B) ARPANET, in full Advanced Research data from random access memory to disk
Projects Agency Network, experimental storage. This process is done temporarily
computer network that was the forerunner and is designed to work as a combination
of the Internet. The Advanced Research of RAM and space on the hard disk.
Projects Agency (ARPA), an arm of the 17.(D) Debugging is a methodical process of
U.S. Defense Department, funded the finding and reducing the number of bugs,
development of the Advanced Research or defects, in a computer program or
Projects Agency Network (ARPANET) in software code. Whereas, Testing is the
the late 1960s. process of finding bugs in already
11.(D) A website (also written as web site) is a developed software not in software code.
collection of web pages and related 18.(C) To reverse your last action, press
content that is identified by a common CTRL+Z. You can reverse more than one
domain name and published on at least action. To reverse your last Undo, press
one web server. Notable examples are CTRL+Y. You can reverse more than one
wikipedia.org, google.com, and action that has been undone.
amazon.com. All publicly accessible 19.(C) The programs which are as permanent as
websites collectively constitute the World hardware and stored in ROM is known
Wide Web. as Firmware. ROM stands for read-only
12.(A) ENIAC was designed by John Mauchly memory. It's used to store the start-up
and J. Presper Eckert of the University of instructions for a computer, also known as
Pennsylvania, U.S. John William the firmware. Most modern computers use
Mauchly and J. Presper Eckert are the flash-based ROM.
scientists credited with the invention of 20.(C) If you have a command prompt window
the Electronic Numerical Integrator and open, you can open a second, separate
Computer (ENIAC), the first general- command prompt window by executing
purpose electronic digital computer the command below. Once you've typed
completed in 1946. in the command above, press the Enter
13.(C) Fiber optics, or optical fiber, refers to the key and a new command prompt window
medium and the technology associated appears.
with the transmission of information as 21.(A) Computers use the binary number system
light pulses along a glass or plastic strand to store data and perform calculations. In
or fiber. Fiber optics is used long-distance mathematics and digital electronics, a
and high-performance data networking. binary number is a number expressed in
14.(D) MICR (magnetic ink character the base-2 numeral system or binary
recognition) is a technology used to verify numeral system, which uses only two
the legitimacy or originality of paper symbols: typically "0" (zero) and "1"

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
116

(one). The base-2 numeral system is a 24.(D) ASCII (American Standard Code for
positional notation with a radix of 2. Each Information Interchange) is the most
digit is referred to as a bit. common format for text files in computers
22.(D) Executing is the process of carrying out and on the Internet. In an ASCII file, each
commands. Execution in computer and alphabetic, numeric, or special character is
software engineering is the process by represented with a 7-bit binary number (a
which a computer or virtual machine string of seven 0s or 1s). 128 possible
executes the instructions of a computer characters are defined.
program. 25.(D) With Hypertext and HTTP, URL is one of
23.(A) To indent the first line of a paragraph, put the key concepts of the Web. It is the
your cursor at the beginning of the mechanism used by browsers to retrieve
paragraph and press the tab key. When any published resource on the web.
you press Enter to start the next paragraph,
its first line will be indented.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
117

Practice Set – 25

1. ________ is the process of dividing the disk into 10. A unit of computer information that contains data
tracks and sectors? as well as all the procedures or operations is
(A) Tracking (B) Formatting called:
(C) Crashing (D) Allotting (A) method (B) Encapsulation
2. What is the permanent memory built into your (C) An object (D) An OOP
computer called? 11. The world's first truly cross-platform
(A) RAM (B) Floppy programming language is called:
(C) CPU (D) ROM (A) C++. (B) Java.
3. Which computer memory is used for storing (C) Visual Basic.NET (D) Smalltalk
programs and data currently being processed by 12. The most widely used type of database
the CPU? management system is the:
(A) Mass memory (B) Internal memory (A) Flat database.
(C) Non-volatile memory (D) PROM (B) Network database.
4. Changing an existing document is called _____ (C) Relational database.
the document. (D) Hierarchical database.
(A) Creating (B) Editing 13. What is the newest type of database, which is
(C) Modifying (D) Adjusting well suited for multimedia applications, called?
5. What is backup? (A) Object-oriented database
(A) Adding more components to your network (B) Client/server database
(B) Protecting data by copying it from the (C) Data warehouse
original source to a different destination (D) Multimedia database
(C) Filtering old data from the new data 14. What do the circles on a data flow diagram
(D) Accessing data on tape represent?
6. What is a popular program for creating (A) Data sources and destinations
documents that can be read on both a PC and a (B) Data flows
Macintosh computer? (C) Transformation processes
(A) Microsoft Word (B) Adobe in Design (D) Data stores
(C) Adobe Acrobat (D) QuarkXPress 15. The type of printer that prints by selectively
7. An image on a computer screen is made up of a unchanging static electricity from spots on a
matrix of what? metal drum is a/n:
(A) Byte (B) Pixels (A) Plotter (B) Dot-matrix printer
(C) Bit (D) Palette (C) Laser printer (D) Ink-jet printer
8. What does dots per inch (DPI) measure? 16. A warm boot in older versions of Windows is
(A) number of bits it takes to represent each color caused by:
(B) density of the pixels on a computer screen (A) Typing the Alt+ Tab key combination
(C) the density of bits on a disk (B) Selecting Hibernate or Standby when
(D) density of graphic files stored on a hard disk shutting down
9. What type of software creates a smaller file that (C) Typing the Ctrl+ Alt+ Delete key
is faster to transfer over the Internet? combination
(A) MPEG (B) Unzipped (D) Pressing the power switch
(C) Fragmentation (D) Compression 17. Setting fonts for the text in your document is an
example of:

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
118

(A) Formatting. (B) Formulas. 22. Which of the following is NOT a source of
(C) Tracking changes. (D) Tools. viruses?
18. _____ is the file system used by the operating (A) Diskettes (B) The Internet
system to identify the physical locations of files (C) E-mail messages
on the hard drive. (D) Computer networks
(A) RTOS (B) GIF 23. Which of the following activities is NOT a
(C) FAT (D) POST component of e-business?
19. ________ software allows the user to speak into (A) Collaboration with business partners
the computer rather than type in text. (B) Cash flow management
(A) Speech recognition (B) CHAT (C) Customer service
(C) Message (D) All of the above (D) Sealing
20. A server uses _________applications software to 24. Retail employees typically use _________
support its client computers. terminals to process sales transactions.
(A) back-end (B) front end (A) sales processing (B) transaction point
(C) programming (D) java (C) automatic teller (D) point of sale
21. Which symbol is used in Excel to denote 25. The primary purpose of a computer is to process
exponential numbers? _____________ and convert it into information.
(A) * (B) ^ (A) electricity (B) data
(C) & (D) $ (C) raw material (D) a bit

Solution
1.(B) The process of dividing the disk into operation users perform in word
tracks and sectors is called as formatting. processors, which typically also handle
To format a drive means to prepare the graphics and other multimedia files.
chosen partition on the drive to be used by 5.(B) In information technology, a backup, or
an operating system by deleting all of the data backup is a copy of computer data
data and setting up a file system. In taken and stored elsewhere so that it may
Windows, formatting a partition is usually be used to restore the original after a data
done from the Disk Management tool. loss event. The verb form, referring to
2.(D) The permanent memory that is built in the process of doing so, is "back up",
your computer. This is read only. The whereas the noun and adjective form is
computer's working memory, sometimes "backup".
called random-access memory. 6.(C) Adobe InDesign is the industry-leading
3.(B) Computer memory is used for storing layout and page design software for print
program and data currently being and digital media. Easily manage
processed by the CPU is internal memory. production with Adobe Experience
Internal memory is used to store data that Manager. InDesign has everything you
is used by the system at start-up and to run need to create and publish books, digital
various types of programs such as the magazines, eBooks, posters, interactive
operating system. Internal memory is PDFs and more.
mostly contained on small microchips that 7.(B) The term "pixel" is actually short for
are either attached or connected to the "Picture Element." These small little dots
computer's motherboard. are what make up the images on computer
4.(B) Changing an existing document is called displays, whether they are flat-screen
editing the document. The ability to (LCD) or tube (CRT) monitors. The
change text by adding, deleting and screen is divided up into a matrix of
rearranging letters, words, sentences and thousands or even millions of pixels.
paragraphs. Text editing is the main

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
119

8.(B) Print resolution is measured in dots per 15.(C) The printers laser beams your print onto a
inch (or “DPI”), which means the number metal cylinder called a drum. Using static
of dots of ink per square inch that a electricity, the drum attracts powdered
printer deposits on a piece of paper. So, toner from its cartridge to the drum. The
300 DPI means that a printer will output drum rolls the toner onto the paper in the
300 tiny dots of ink to fill every square form of your print. The toner is melted
inch of the print. onto the paper by heat from a fuser as it
9.(D) The type of software which makes a larger passes underneath.
file into "smaller file" that is "faster to 16.(C) A warm boot (also called a "soft boot") is
transfer" over the "internet" is the process of restarting a computer. It
Compression. Compression is used to may be used in contrast to a cold boot,
"create" the files in smaller size that which refers to starting up a computer that
makes it easier to transfer the files over has been turned off. Warm boots are
the internet. typically initiated by a "Restart" command
10.(C) An object is the unit of computer in the operating system. It can be by
information that contains data as well as pressing Ctrl+Alt+Del.
all the procedures for operations. In 17.(A) The process of formatting a document
object-oriented programming (OOP), involves specifying how the document
encapsulation refers to the bundling of will look in its final form on the screen and
data with the methods that operate on that when printed. Common formatting
data, or the restricting of direct access to options include the font, font size, color,
some of an object's components. alignment, spacing, margins and other
11.(B) The world's first truly cross-platform properties.
programming language is Java. It is a 18.(C) A file allocation table (FAT) is a file
general-purpose programming language system developed for hard drives that
that is class-based, object- oriented, and originally used 12 or 16 bits for each
designed to have as few implementation cluster entry into the file allocation table.
dependencies as possible. It is used by the operating system (OS) to
12.(C) Relational databases are the most popular manage files on hard drives and other
and widely used databases. Some of the computer systems.
popular DDBMS are Oracle, SQL Server, 19.(A) Speech recognition software allows the
MySQL, SQLite, and IBM DB2. A user to speak into the computer rather than
relational database is a digital database type in text. Speech Recognition software
based on the relational model of data, as allows computers to interpret human
proposed by E. F. Codd in 1970. A speech and transcribe it to text, or to
software system used to maintain translate text to speech. Speech
relational databases is a relational Recognition software allows computers to
database management system (RDBMS). interpret human speech and transcribe it to
13.(A) An object database is a database text, or to translate text to speech.
management system in which information 20.(A) A server uses backend application
is represented in the form of objects as software to support its client computers.
used in object-oriented programming. The back end refers to parts of a computer
Object databases are different from application or a program's code that allow
relational databases which are table- it to operate and that cannot be accessed
oriented. Object-relational databases are by a user.
a hybrid of both approaches. 21.(B) In Excel, the caret symbol (also known as
14.(B) The external entities relate to the main "œthe little hat," or "œthe symbol when
process of the system. basically they give you press Shift 6" ) is used to indicate
the inputs of the system. A process is exponents. Here's how you use it to find
represented by a circle in basic Data Flow the volume of your room: In cell B2, enter
notation. 10. In cell B3, enter the formula =B2^3.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
120

22.(C) A computer virus is a type of computer 25.(B) The primary purpose of a computer is to
program that, when executed, replicates process electricity and convert it into
itself by modifying other computer information. The purpose of the
programs and inserting its own code. computer is to perform calculations, store
When this replication succeeds, the information, retrieve data and process
affected areas are then said to be information. A computer has programmed
"infected" with a computer virus. Internet data or computer language that tells the
is not a good source of viruses. computer how to fulfil its purpose. The
23.(B) computer will only do what it is
24.(D) programmed to do.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
121

Practice Set – 26

1. The simultaneous processing of two or more (D) Microsoft Windows defines the operating
programs by multiple processors is _____. environment standard for computers with Intel
(A) multiprogramming (B) multitasking processors.
(C) time-sharing (D) multiprocessing 9. The ________ records the name and exact
2. Help Menu is available in which button? location of every file on a disk.
(A) End (B) Start (A) partition master
(C) Turnoff (D) Restart (B) file allocation table
3. The ________folder retains copies of messages (C) disk controller
that you have started but are not yet ready to (D) boot sector
send. 10. Inheritance is the ability of an object to pass on
(A) Drafts (B) Outbox its characteristics to its ____________.
(C) Address Book (D) Sent Items (A) subclasses (B) off-spring
4. What type of software must to be used to (C) super classes (D) parents
translate scanned text into a format that can be 11. Which of the following extends data across
manipulated? networks rather than store it in one central site?
(A) OCR (B) CRT (A) PIM
(C) RGB (D) MIDI (B) File manager
5. Which printer type is an impact printer? (C) Distributed database
(A) Page printers (D) Data mining program
(B) Laser printers 12. What is a serial port that adds a direct connection
(C) Ink-jet printers to a network?
(D) Dot-matrix printers (A) FireWire (B) NIC
6. High Resolution‖ computer monitors will have (C) USB (D) Internal modem
_________. 13. Which of the following is saved to
(A) High dpi noncontiguous clusters on a hard disk?
(B) Low dpi (A) Clustered file (B) Defragmented file
(C) 256 colors (C) Sectored file (D) Fragmented file
(D) Resolution is not measured in dpi 14. What should be used if a company wants to
7. Word processing, spreadsheet, and photo-editing include its company name and logo at the bottom
are examples of________ of every page of a brochure?
(A) application software (A) Header (B) Macro
(B) system software (C) Footer (D) Footnote
(C) operating system software 15. ________ is an event-driven programming
(D) platform soft. language developed in the early 1990.
8. Which of the following statements is true? (A) C (B) VB
(A) Microsoft Windows defines the operating (C) C++ (D) Pascal
environment standard for computers with Linux 16. Linux is a_____
processors. (A) Utility program for peer-to-peer file sharing
(B) Microsoft Windows defines the operating (B) Real-time operating system
environment standard for computers with UNIX (C) Network operating system
processors. (D) PDA platform
(C) Mac OS defines the operating environment 17. The_________ runs the front-end applications
standard for computers with Intel processors. software in a network.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
122

(A) Client (B) Database (A) Linker (B) Assembler


(C) Server (D) CPU (C) Compiler (D) All of the above
18. Which of the following is used for close a tab on 22. Zip is a _______file.
a browser? (A) Executable File (B) Compressed File
(A) Ctrl + T (B) Ctrl + W (C) System File (D) Combo
(C) Ctrl + A (D) Ctrl + Y 23. At a time how many operating system can be at
19. What is RISC? work on a computer?
(A) Storage Device (A) Only one (B) Two
(B) Computer Network (C) Three (D) Four
(C) Microprocessor 24. Answer Sheets in bank PO ‘s/Clerk‘s
(D) Operating System examinations are checked by using –
20. Norton’s an ____ (A) Optical Character Reader
(A) Software (B) Optical Mark Reader
(B) Anti-Virus Program (C) Magnetic ink Character Reader
(C) Network (D) All of the above
(D) Program 25. Image can be sent over telephone lines by using_
21. A program that converts high level language to (A) Larger bandwidth (B) Fax
machine Language is ______. (C) Scanner (D) Cable

Solution
1.(D) The simultaneous processing of two or 5.(D) Impact printers are printers which works
more programs by multiple processors is by creating a direct contact between ink
multiprocessing. Multiprocessing is the ribbon and paper. These printers are noisy
use of two or more central processing yet popular. Impact printers have
units (CPUs) within a single computer mechanical moving parts to conduct
system. The term also refers to the ability printing. Examples: Dot-matrix printers,
of a system to support more than one Daisy-wheel printers, and line printers.
processor or the ability to allocate tasks 6.(A) The higher the resolution, the more
between them. information can be displayed on the
2.(B) Help Menu is available in which button. It screen. These days, many monitors in
is a part of a computer program that gives the 22-to-27-inch range have a native
instructions and information about how to resolution of 1,920 by 1,080 pixels and are
use the program. referred to as full HD or 1080p monitors.
3.(A) The drafts folder retains copies of 7.(A) Application software (app for short) is a
messages that you have started but are program or group of programs designed
not yet ready to send. In Mailbox, look for end users. Examples of an application
for a folder called Drafts, and then double- include a word processor, a spreadsheet,
click the message that was saved in that an accounting application, a web browser,
folder. Outlook automatically saves all an email client, a media player, a file
unfinished messages for you. By default, viewer, simulators, a console game or a
unfinished messages are saved to your photo editor. Word processing,
Drafts folder every three minutes. You spreadsheet, and photo-editing are
can, however, change this time. examples of application software.
4.(A) If authors do not have access to the source 8.(D) Microsoft Windows defines the operating
file and authoring tool, scanned images of environment standard for computers with
text can be converted to PDF using optical Intel processors. Microsoft Windows,
character recognition (OCR). Adobe commonly referred to as Windows, is a
Acrobat Pro can then be used to create group of several proprietary graphical
accessible text. operating system families, all of which are

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
123

developed and marketed by Microsoft. 13.(D) File fragmentation is a term that describes
Each family caters to a certain sector of a group of files that are scattered
the computing industry. throughout a hard drive platter instead of
9.(B) The file allocation table records the name one continuous location. Fragmentation is
and exact location of every file on a disk. caused when information is deleted from
A file allocation table (FAT) is a file a hard drive and small gaps are left behind
system developed for hard drives that to be filled by new data.
originally used 12 or 16 bits for each 14.(C) A header is the top margin of each page,
cluster entry into the file allocation table. and a footer is the bottom margin of each
It is used by the operating system (OS) to page. Headers and footers are useful for
manage files on hard drives and other including material that you want to appear
computer systems. on every page of a document such as your
10.(A) Inheritance is the ability of an object to name, the title of the document, or page
pass on its characteristic to its subclasses. numbers.
In the Java language, classes can be 15.(B) In computer programming, event-driven
derived from other classes, thereby programming is a programming paradigm
inheriting fields and methods from those in which the flow of the program is
classes. Definitions: A class that is derived determined by events such as user actions,
from another class is called a subclass sensor outputs, or messages from other
(also a derived class, extended class, or programs or threads.
child class). 16.(B) RTLinux is a hard realtime real-time
11.(C) A file manager or file browser is a operating system (RTOS) microkernel
computer program that provides a user that runs the entire Linux operating
interface to manage files and folders. The system as a fully preemptive process.
most common operations performed on Even with a similar name it is not related
files or groups of files include creating, the Real-Time Linux project of the Linux
opening (e.g. viewing, playing, editing or Foundation.
printing), renaming, moving or copying, 17.(A) The client is the machine (workstation or
deleting and searching for files, as well as PC) running the front-end applications. It
modifying file attributes, properties and interacts with a user through the keyboard,
file permissions. Folders and files may be display, and pointing device such as a
displayed in a hierarchical tree based on mouse. The client also refers to the client
their directory structure. Some file process that runs on the client machine.
managers contain features inspired by The client has no direct data access
web browsers, including forward and back responsibilities.
navigational buttons. 18.(B) Ctrl+W, Ctrl+F4 – Closes the current tab.
12.(B) FireWire is an I/O interface developed by 19.(C) RISC, or Reduced Instruction Set
Apple Computer. It is also known as IEEE Computer. is a type of microprocessor
1394, which is the technical name architecture that utilizes a small, highly-
standardized by the IEEE. FireWire is optimized set of instructions, rather than
considered a high-speed interface, and a more specialized set of instructions often
therefore can be used for connecting found in other types of architectures.
peripheral devices that require fast data 20.(B) Norton AntiVirus is an anti-virus or anti-
transfer speeds. A direct serial cable malware software product, developed and
connection uses the communication ports distributed by Symantec Corporation
of your computers. Most computers have since 1991 as part of its Norton family of
at least two communication, or COM, computer security products. It uses
ports: COM1 and COM2. Serial port signatures and heuristics to identify
pinouts are less complex than parallel port viruses.
pinouts, but the speed is also a lot slower 21.(C) In computing, a compiler is a computer
-- between 12 Kbps and 14 Kbps. program that translates computer code

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
124

written in one programming language into systems then you can run multiple
another language. The name "compiler" is operating systems at a time. But those
primarily used for programs that translate virtualized operating systems can't not
source code from a high-level have the full hardware support.
programming language to a lower level 24.(B) Optical Mark reading (OMR) is a method
language to create an executable program. of entering data into a computer system.
22.(B) ZIP is an archive file format that supports Optical Mark Readers reads pencil or pen
lossless data compression. A ZIP file may marks made in pre-defined positions on
contain one or more files or directories paper forms as responses to questions or
that may have been compressed. The ZIP tick list prompts.
file format permits a number of 25.(B) Image can be sent over telephone lines by
compression algorithms, though using Fax. Fax sometimes called
DEFLATE is the most common. telecopying or telefax, is the telephonic
23.(A) You can run only one operating system at transmission of scanned printed material,
a time on a Computer natively. If you are normally to a telephone number connected
talking about virtualized operating to a printer or other output device.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
125

Practice Set – 27

1. Which among the following is a Scientific (A) Write Once Read Memory
Computer Language? (B) Wanted Once Read Memory
(A) BASIC (B) COBOL (C) Wanted Original Read Memory
(C) FORTRAN (D) PASCAL (D) Write Original Read Memory
2. What is ―Oracle? 13. Memory unit is a part of ______
(A) Co-ordination System (A) Input Device
(B) Word Software (B) Control Unit
(C) Database Software (C) Output Device
(D) All of the above (D) Central Processing Unit
3. IC Chip is made of ___. 14. Which of the following companies developed
(A) Silicon (B) Nickel MS Office-2000?
(C) Iron (D) Copper (A) Novell (B) Corel
4. At which place is India’s Silicon Valley situated? (C) Lotus (D) Microsoft
(A) Bangalore (B) Hyderabad 15. What is the meaning of “MICR”?
(C) Chennai (D) Kolkata (A) Magnetic Ink Character Recognition
5. A connection from one HTML document to (B) Magnetic Intelligence Character Recognition
another HTML document is called ____. (C) Magnetic Information Cable Recognition
(A) Hyper Link (B) Connecting Link (D) Magnetic Insurance Cases Recognition
(C) Icon (D) All of these 16. VIRUS stands for________.
6. This device is used to connect your computer (A) Very Important Record User Searched
with a telephone line, so that can access (B) Verify Interchanged Result Until Source
information from other servers and ordinary (C) Vital Information Resource Under Seize
users too, said device is called _______. (D) Very Important Resource Under Search
(A) Modem (B) Set Top Box 17. The technique that extends storage capacities of
(C) LAN Card (D) UPS main memory beyond the actual size of the main
7. Device on one network can communicate with memory is called _______.
devices on another network via_______. (A) Multitasking
(A) File Server (B) Utility Server (B) Virtual storage
(C) Printer Server (D) Gateway (C) Multiprocessing
8. The screen background is known as the____. (D) Multiprogramming
(A) Application (B) Window 18. __________ Command we can use to close the
(C) Desktop (D) Frames windows.
9. Which of the following is not an input device? (A) Alt+ F1 (B) Alt+ S
(A) Mouse (B) Keyboard (C) Alt+ End (D) Alt+F4
(C) Light pen (D) VDU 19. Algorithm is used____.
10. What are the units used to count the speed of a (A) To bring itself into desired state by its own
printer? action
(A) CPM (B) DPI (B) To perform logarithmic operations
(C) PPM (D) BIT (C) To describe a set of procedure by given result
11. A computer that combines the characteristic of is obtained
analog and digital computers________. (D) As a high level language
(A) Hybrid Computer (B) Digital Computer 20. FOXPRO is a______.
(C) Analog Computer (D) Super Computer (A) RDMBS (B) DBMS
12. WORM stands for? (C) Language (D) All of the above

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
126

21. Who is considered to the father of computers? (C) A modem (D) Your computer
(A) John Bardeen (B) Charles Babbage 24. When more than one window is open, to switch
(C) John Backus (D) William Shockley to the next window — is the key combination.
22. Which of the following will connect you to the (A) CTRL+F5 (B) CTRL+F6
Internet? (C) CTRL+F7 (D) CTRL+F8
(A) An Commercial online service 25. Where are data and program stored when the
(B) An Internet service provider processor uses them?
(C) A network connection (A) Main memory
(D) All of the above (B) Secondary memory
23. What software allows you to view internet sites? (C) Disk memory
(A) A cyber cafe (B) A browser (D) Program memory

Solution
1.(C) COBOL (Common Business-Oriented hyperlink, it is usually underlined and
Language) is a high-level programming appears as a different color.
language for business applications. It was 6.(A) A digital subscriber line (DSL) modem is
the first popular language designed to be a device used to connect a computer or
operating system-agnostic and is still in router to a telephone line which provides
use in many financial and business the digital subscriber line service for
applications today. COBOL is a compiled connection to the Internet, which is often
English-like computer programming called DSL broadband. A modem is a
language designed for business use. It is small box that connects your devices to
imperative, procedural and, since 2002, the Internet using cables. Unlike a router,
object-oriented. COBOL is primarily used a modem doesn't provide your home with
in business, finance, and administrative Wi-Fi connectivity. A modem acts as a
systems for companies and governments. digital translator, taking an information
2.(C) Oracle Database (commonly referred to as signal from your cable, fiber or phone
Oracle DBMS or simply as Oracle) is a lines and making it accessible to your
multi-model database management computer.
system produced and marketed by Oracle 7.(D) A gateway is a node (router) in a computer
Corporation. It is a database commonly network, a key stopping point for data on
used for running online transaction its way to or from other networks. Thanks
processing (OLTP), data warehousing to gateways, we are able to communicate
(DW) and mixed (OLTP & DW) and send data back and forth. The Internet
database workloads. wouldn't be any use to us without
3.(A) Robert Noyce invented the first gateways (as well as a lot of other
monolithic integrated circuit chip at hardware and software).
Fairchild Semiconductor in 1959. It was 8.(C) A wallpaper or background (also known
made from silicon, and was fabricated as a desktop wallpaper, desktop
using Jean Hoerni's planar process and background, desktop picture or desktop
Mohamed Atalla's surface passivation image on computers) is a digital image.
process. On a computer, wallpapers are generally
4.(A) used on the desktop, while on a mobile
5.(A) Hyperlinks are the primary method used phone they serve as the background for the
to navigate between pages and Web sites. home screen.
Links can point to other web pages, web 9.(D) Short for video display unit, VDU is a
sites, graphics, files, sounds, e-mail computing device that allows for input by
addresses, and other locations on the same a user and output to a display, like a
web page. When text is used as a computer monitor. A VDU consists of a

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
127

display device and a keyboard, and could 15.(A) Magnetic Ink Character Recognition is a
also include a mouse. In the United States, character recognition system that uses
it is sometimes referred to as a video special ink and characters. When a
display terminal, or VDT. document that contains this ink needs to
10.(B) DPI stands for Dots Per Inch which be read, it passes through a machine,
technically means printer dots per inch. which magnetizes the ink and then
Today it is a term often misused, usually translates the magnetic information into
to mean PPI, which stands for Pixels Per characters. MICR technology is used by
Inch. So, when someone says they want a banks.
photo that is 300 dpi they really mean that 16.(C) In more technical terms, a computer virus
they want 300 ppi. is a type of malicious code or program
11.(A) Hybrid computers are computers that written to alter the way a computer
exhibit features of analog computers and operates and is designed to spread from
digital computers. The digital component one computer to another. A virus operates
normally serves as the controller and by inserting or attaching itself to a
provides logical and numerical operations, legitimate program or document that
while the analog component often serves supports macros in order to execute its
as a solver of differential equations and code. It stands for Vital Information
other mathematically complex equations. Resource Under Seize.
12.(A) Write once read many (WORM) describes 17.(B) Virtual storage is the pooling of physical
a data storage device in which storage from multiple network storage
information, once written, cannot be devices into what appears to be a single
modified. This write protection affords the storage device that is managed
assurance that the data cannot be tampered from a central console. The benefit of
with once it is written to the device. On virtualization is that commodity hardware
ordinary (non-WORM) data storage or less-expensive storage can be used to
devices, the number of times data can be provide enterprise-class functionality.
modified is limited only by the lifespan of 18.(D) Just about everyone knows that
the device, as modification involves Alt+Ctrl+Del interrupts the operating
physical changes that may cause wear to system, but most people don't know that
the device. The "read many" aspect is Alt+F4 closes the current window. So, if
unremarkable, as modern storage devices you had pressed Alt+F4 while playing a
permit unlimited reading of data once game, the game window would have
writte. closed. It turns out there are several other
13.(D) Memory or Storage Unit. This unit handy keystrokes like that built into
supplies information to other units of the Windows.
computer when needed. It is also known 19.(C) An algorithm (pronounced AL-go-rith-
as internal storage unit or the main um) is a procedure or formula for solving
memory or the primary storage or a problem, based on conducting a
Random Access Memory (RAM). It stores sequence of specified actions. In
all the data and the instructions required mathematics and computer science, an
for processing. algorithm usually means a small
14.(D) Microsoft Office 2000 is a release of procedure that solves a recurrent problem.
Microsoft Office, an office suite 20.(C) FoxPro is a text-based procedurally
developed and distributed by Microsoft oriented programming language and
for the Windows family of operating database management system (DBMS),
systems. Office 2000 was released to and it is also an object-oriented
manufacturing on March 29, 1999, and programming language, originally
was made available to retail on June 7, published by Fox Software and later by
1999. Microsoft, for MS-DOS, Windows,
Macintosh, and UNIX.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
128

21.(B) Charles Babbage, who was born in 1791, 24.(B) F6 is used to go to the next pane or frame
is regarded as the father of computing in your Word window. You can use this to
because of his research into machines that navigate the window without using your
could calculate. Babbage's Difference mouse. Shift+F6 is used to go to the
Engine Number 1 was the first device ever previous pane or frame. Ctrl+F6 is used to
devised that could calculate and print go to the next open document window.
mathematical tables. 25.(A) At the core of the computer is the central
22.(B) processing unit or CPU, the source of
23.(B) A web browser (commonly referred to as control that runs all programs and
a browser) is a software application for instructions. In order to function,
accessing information on the World Wide computers use two types of memory:
Web. When a user requests a web page primary and secondary. The main storage
from a particular website, the web browser is the primary memory, and data and
retrieves the necessary content from a web programs are stored in secondary
server and then displays the page on the memory.
user's device.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
129

Practice Set – 28

1. ______ Represents raw facts, where- as (C) Network requiring a server with shared
_________ is a meaningful data. resources.
(A) Information, reporting (D) wide area network
(B) Data, information 10. Similar to a hub in an Ethernet network, a __
(C) Information, bits helps relay data between wireless network nodes.
(D) Records, bytes (A) Wireless port
2. Saving is a process- (B) Wireless access point
(A) To copy the document from memory to (C) wireless adapter
storage medium. (D) wireless transceiver
(B) To bring change in present status of the 11. A set of rules for creating markup languages that
document enables programming to capture specific types of
(C) To change entire form data by creating their own elements is called___.
(D) All of the above (A) XML (B) HTML
3. PNG stands for________. (C) Ada (D) XHTML
(A) Portable Name Generator 12. Small plain text files that are written to your
(B) Portable Network Generator computer's hard disk by many of the Web sites
(C) Printed Name Graphics you visit are called______.
(D) Portable Network Graphics (A) RFIDs (B) Web beacons
4. The maximum Zoom percentage in MS Power (C) GUIDs (D) Cookies
Point is ________. 13. MBR stands for_____.
(A) 100% (B) 200% (A) Management Box Register
(C) 400% (D) 300% (B) Memory Buffer Register
5. The word FTP stands for________. (C) Memory Box Registers
(A) File Translate Protocol (D) Memory Building Register
(B) File Transit Protocol 14. The following software is coming under graphics
(C) File Typing Protocol use.
(D) File Transfer Protocol (A) Adobe reader (B) MS power point
6. Compiler in computer system is a_________. (C) Adobe photo shop (D) MS-DOS
(A) Package 15. Which of the following is the proper way to
(B) System Software denote a cell in a spreadsheet?
(C) Process (A) 5C (B) C5
(D) Application Software (C) 2-15 (D) C
7. What is an intersection of a row and column in a 16. Which broadband service is the most available?
spreadsheet? (A) C-able (B) POTS
(A) Formula (B) Worksheet (C) Satellite (D) DSL
(C) Address (D) Cell 17. _____ is a set of rules computers use to talk to
8. What is the process of creating movement from each other.
still images? (A) Protocol (B) Syntax
(A) Transition (B) Twining (C) DOS command (D) HTML
(C) Bit-mapped graphic (D) Animation 18. Which backup method only backs up files that
9. A peer-to-peer LAN is an appropriate network have been modified since the last backup?
architecture for _______. (A) Incremental backup (B) Partial backup
(A) The Internet (C) Selective backup (D) Full backup
(B) Home network

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
130

19. Which type of transmission media is known as (B) Deleting the margin boundaries on the Ruler
regular telephone wire? (C) Dragging the margin boundaries on the Ruler
(A) Wi-Fi (B) Twisted-pair wire (D) Clicking the right mouse button on the Ruler
(C) Fiber optic cable (D) Coaxial cable 23. Which part of the computer helps to store
20. What is the purpose of a firewall on a computer? information?
(A) To protect a computer from unauthorized (A) Monitor (B) Keyboard
access (C) Disk – drive (D) Printer
(B) To protect a computer in case of fire 24. Which key is used to delete one character to the
(C) To protect a computer from spam left of the current position of the cursor?
(D) All of the above (A) Backspace (B) Delete
21. A disk's content that is recorded at the time of (C) Insert (D) Esc
manufacture and that cannot be changed or 25. If you want to connect to your own computer
erased by the user is____________. through the Internet from another location, you
(A) Memory-only (B) Write-only can use–
(C) Once-only (D) Read-only (A) e-mail (B) FTP
22. In word, you can change Page Margins by ___ (C) instant message (D) Telnet
(A) Dragging the scroll box on the scroll bars

Solution
1.(B) The Raw Facts and Figures are Called a file, and a local or remote server will
Data. The word raw means that the facts provide it.
have not yet been processed to get their 6.(B) A compiler is a special program that
exact meaning. Data is collected from processes statements written in a
different sources. particular programming language and
2.(A) Saving, process of setting aside a portion turns them into machine language or
of current income for future use, or the "code" that a computer's processor uses.
flow of resources accumulated in this Typically, a programmer writes language
way over a given period of time. Saving statements in a language such as Pascal or
may take the form of increases in bank C one line at a time using an editor.
deposits, purchases of securities, or 7.(D) The intersection of rows and columns is
increased cash holdings. called cell. Cell is identified with
3.(D) Portable Network Graphics is a raster- Combination of column header and row
graphics file format that supports lossless number.
data compression. PNG was developed as 8.(D) Animation is simply combining drawings,
an improved, non-patented replacement photographs, text, or computer graphics to
for Graphics Interchange Format (GIF). make them move. You don't need to talk
4.(C) Power Point allows users to zoom in and in front of a camera. Short animations can
zoom out of the slides to help focus on also be a way to develop your audience.
specific sections or look at the entire slide 9.(B) A home network or home area network is
as a whole. The minimum zoom supported a type of computer network that
by PowerPoint is 10% and the maximum facilitates communication among devices
is 400%. The zoom bar is located in the within the close vicinity of a home. A
bottom right corner of the PowerPoint home network is a group of devices – such
window. as computers, game systems, printers,
5.(D) File Transfer Protocol (FTP) is a standard and mobile devices – that connect to the
Internet protocol for transmitting files Internet and each other. A wired network,
between computers on the Internet over which connects devices like printers and
TCP/IP connections. FTP is a client- scanners with cables. A wireless network,
server protocol where a client will ask for

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
131

which connects devices like tablets and e- while rows are normally represented by
readers without cables. numbers, 1, 2, 3, etc.
10.(B) Wireless access point is a hardware device 16.(C) Satellite broadband is an option available
or access point (AP) that allows other Wi- for those who live in rural areas where
Fi devices connectivity to a wired network traditional fixed-line based broadband
(Local Access Network). It assists with services aren't available. It uses a satellite
the connectivity between devices and the dish to provide two-way access to
internet. An access point is a device that broadband services but speeds which
creates a wireless local area network, or used to be lower have improved with
WLAN, usually in an office or large download speeds of up to 30 Mbps
building. An access point connects to a available.
wired router, switch, or hub via an 17.(A) A protocol is a set of rules that governs the
Ethernet cable, and projects a Wi-Fi signal communications between computers on a
to a designated area. network. In order for two computers to
11.(A) Extensible Markup Language (XML) is a talk to each other, they must be speaking
markup language that defines a set of rules the same language.
for encoding documents in a format that is 18.(A) Incremental backups: Because an
both human-readable and machine- incremental backup will only copy data
readable. An XML file is an extensible since the last backup of any type, an
markup language file, and it is used to organization may run it as often as
structure data for storage and transport. In desired, with only the most recent changes
an XML file, there are both tags and text. stored. The benefit of an incremental
The tags provide the structure to the data. backup is that it copies a smaller amount
12.(D) Cookies are most commonly used to track of data than a full.
website activity. When you visit some 19.(B) Twisted-pair cable is a type of cabling that
sites, the server gives you a cookie that is used for telephone communications and
acts as your identification card. Upon each most modern Ethernet networks. A pair of
return visit to that site, your browser wires forms a circuit that can transmit
passes that cookie back to the server. data.
Servers can use cookies to provide 20.(A) A firewall is a network security device
personalized web pages. that monitors incoming and outgoing
13.(B) A register is a temporary storage area built network traffic and decides whether to
into a CPU. The instruction register allow or block specific traffic based on a
fetches instructions from the program defined set of security rules. Firewalls
counter (PC) and holds each instruction as have been a first line of defense in network
it is executed by the processor. The security for over 25 years.
memory registers are used to pass data 21.(D) ROM is called read only memory because,
from memory to the processor. historically, it could only be read but not
14.(C) Microsoft PowerPoint is a presentation written. These names are confusing,
program, created by Robert Gaskins and because ROMs are randomly accessed
Dennis Austin at a software company too. Worse yet, most modern ROMs can
named Forethought, Inc. It was released be written as well as read! The important
on April 20, 1987, initially for Macintosh distinction to remember is that RAMs are
computers only. Microsoft acquired volatile and ROMs are nonvolatile.
PowerPoint for $14 million three months 22.(D) Go to Layout > Margins, select Margins,
after it appeared. and then select Custom Margins. In the
15.(B) A spreadsheet consists of a table of cells Top, Bottom, Left, and Right boxes, set
arranged into rows and columns and the margins that you want, and then select
referred to by the X and Y locations. X Default. When you are prompted, select
locations, the columns, are normally Yes to change the default settings for
represented by letters, "A", "B", "C", etc., document layout.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
132

23.(C) A disk drive is a technology that enables deletes the character at that position, and
the reading, writing, deleting and shifts back the text after that position by
modifying of data on a computer storage one position.
disk. It is either a built-in or external 25.(D) Telnet is a network protocol used to
component of a disk that manages the virtually access a computer and to provide
disk's input/output (I/O) operations. a two-way, collaborative and text-based
24.(A) Backspace ← Backspace is the keyboard communication channel between two
key that originally pushed the typewriter machines. It follows a user command
carriage one position backwards and in Transmission Control Protocol/Internet
modern computer systems moves the Protocol (TCP/IP) networking protocol
display cursor one position backwards, for creating remote sessions.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
133

Practice Set – 29

1. A (n) ……….is a special visual and audio effect (C) Common Business Operated Language
applied in Power-point to text or content. (D) Common Business Organized Language
(A) Animation (B) Flash 12. What is the other name for programmed chip?
(C) Wipe (D) Dissolve (A) RAM (B) ROM
2. Where does most data go first with in a computer (C) LSIC (D) PROM
memory hierarchy? 13. __________ Store data temporarily and pass it
(A) RAM (B) ROM on as directed by the control unit.
(C) BIOS (D) CACHE (A) Address (B) Register
3. All of the following are examples of storage (C) Number (D) Memory
devices EXCEPT _______. 14. RAID stands for________.
(A) hard disk drives (B) printers (A) Reproduce Array of Intelligent Disks
(C) floppy disk drives (D) CD drives (B) Reproduce Array of Inexpensive Disks
4. Select the Odd one_____. (C) Redundant Array of Inexpensive Drives
(A) Operating system (B) Interpreter (D) Redundant Array of Inexpensive Disks
(C) Compiler (D) Assembler 15. In most Microsoft programs, what does 'alt+f4'
5. Which of the following is not an advantage of do?
magnetic disk storage? (A) Ends the program
(A) The access time of magnetic disk is much (B) Opens the program
less than that of magnetic tape (C) Run the program
(B) Disk storage is longer lasting than magnetic (D) Modify the program
tape 16. A device that is used to transmit data from one
(C) Disk storage is less expensive than tape location to another is known as ________.
storage (A) Storage (B) Memory
6. Perforated paper used as input or output media is (C) Carrier (D) All of the above
known as_____. 17. Programs developed by an outside supplier and
(A) Paper tape (B) Magnetic tape provided to the user in a machine-readable form
(C) Punched paper tape (D) Card punch is known as ___________.
7. The first-generation computer system used __ (A) Canned programs (B) Beta program
(A) Vacuum tubes (B) Transistors (C) Alpha program (D) All of the above
(C) Registers (D) Magnetic cores 18. Buffer is device/storage area–
8. To access properties of an object, the mouse (A) Where data are temporarily stored
technique to use is _______. (B) Where data is permanently stored
(A) dragging (B) dropping (C) Where data error occurs
(C) right-clicking (D) shift+clicking (D) All of the above
9. The ALU and Control Unit jointly known as___. 19. Cache memory is–
(A) RAM (B) ROM (A) Smaller and faster than main storage
(C) CPU (D) PC (B) Bigger and slower than main storage
10. Computers process data into information by (C) Smaller but slower than main memory
working exclusively with ______. (D) Bigger and faster than main memory
(A) Multimedia (B) Words 20. Which of the following describe one or more
(C) Characters (D) Numbers characteristics of a modem computer?
11. COBOL stands for _______. (A) An electronic device
(A) Common Business Oriented Language (B) A mechanical device
(B) Computer Business Oriented Language (C) An electro-mechanical device

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
134

(D) All of the above (A) Vertical Market soft (B) Open Source
21. Octal number system has a base ______. (C) Horizontal Market (D) Shareware
(A) Two (B) Four 24. You can use the tab key to___________.
(C) Eight (D) Ten (A) Move a cursor across the screen
22. Which of the following is a disadvantage of (B) Indent a paragraph
machine language? (C) Move the cursor down the screen
(A) Machine Dependent (D) Only (A) and (B)
(B) Slower Execution 25. Which process checks to ensure the components
(C) Machine Independent of the computer and operating are connected
(D) All of the above properly?
23. Android Operating system is an example of (A) Booting (B) Processing
which kind of Source Model? (C) Saving (D) Editing

Solution
1.(A) Computer animation is the process used some environment in which it will run and
for digitally generating animated images. perform its task.
The more general term computer- 5.(D) A magnetic disk primarily consists of a
generated imagery (CGI) encompasses rotating magnetic surface and a
both static scenes and dynamic images, mechanical arm that moves over it. The
while computer animation only refers to mechanical arm is used to read from and
moving images. Modern computer write to the disk. The data on a magnetic
animation usually uses 3D computer disk is read and written using a
graphics to generate a two-dimensional magnetization process. Tracks are further
picture, although 2D computer graphics divided into sectors that contain blocks of
are still used for stylistic, low bandwidth, data.
and faster real-time renderings. 6.(A) A slow, low-capacity, sequential storage
Sometimes, the target of the animation is medium used on earlier computing and
the computer itself, but sometimes film as communications devices. Paper tape holds
well. data as patterns of punched holes. A paper
2.(A) Whether it comes from permanent storage roll printed by a calculator or cash
(the hard drive) or input (the keyboard), register. Paper Tape. Paper tape was
most data goes in random access memory widely used in the early years of
(RAM) first. The CPU then stores pieces computing as a storage medium.
of data it will need to access, often in a 7.(A) First generation computers relied on
cache, and maintains certain special 'machine language' (which is the most
instructions in the register. basic programming language that can be
3.(B) In computing, a printer is a peripheral understood by computers). These
device which makes a persistent computers were limited to solving one
representation of graphics or text, usually problem at a time. Input was based on
on paper. While most output is human- punched cards and paper tape.
readable, bar code printers are an example 8.(C) In general, properties are the settings of an
of an expanded use for printers. object on a computer. For example, you
4.(A) An Operating system (OS) is a software could right-click highlighted text and view
which acts as an interface between the the properties of that text. The properties
end user and computer hardware. Every of a font or text could be the font size, font
computer must have at least one OS to run type, and color of the text.
other programs. An application like 9.(C) It stands for "Central Processing Unit."
Chrome, MS Word, Games, etc. needs The CPU is the primary component of a
computer that processes instructions. The

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
135

CPU contains at least one processor, “carrier” is short for wireless carrier.
which is the actual chip inside the CPU Other terms used that refer to the same
that performs calculations. thing include mobile network operator,
10.(C) Between receiving input and providing mobile phone operator, mobile operator,
output, your computer processes. In other cellular company, and wireless service
words, the computer processes input and provider.
produces output. With a computer, you 17.(A) A software package that provides a fixed
have the added element of processing, solution to a problem. Canned industry-
which means doing something to the input oriented business applications must be
so that you get something else as output. analyzed carefully to determine their
Computers process data into information flexibility. See canned routine.
by working exclusively with characters. 18.(A) In computer science, a data buffer (or just
11.(A) Acronym for common business-oriented buffer) is a region of a physical memory
language. Developed in the late 1950s storage used to temporarily store data
and early 1960s, COBOL is the second- while it is being moved from one place to
oldest high-level programming language another.
(FORTRAN is the oldest). It is 19.(A) Cache memory is an extremely fast
particularly popular for business memory type that acts as a buffer
applications that run on large computers. between RAM and the CPU. It holds
12.(D) Unlike main memory (RAM), ROM frequently requested data and instructions
retains its contents even when the so that they are immediately available to
computer is turned off. ROM is referred to the CPU when needed. Cache memory is
as being nonvolatile, whereas RAM is used to reduce the average time to access
volatile. data from the Main memory.
13.(B) Data storage is the recording (storing) of 20.(A) A modem is a device or program that
information (data) in a storage medium. enables a computer to transmit data
DNA and RNA, handwriting, over, for example, telephone or cable
phonographic recording, magnetic tape, lines. Computer information is stored
and optical discs are all examples of digitally, whereas information transmitted
storage media. Electronic data storage over telephone lines is transmitted in the
requires electrical power to store and form of analog waves.
retrieve data. 21.(C) Octal numbers therefore have a range of
14.(D) RAID ("Redundant Array of Inexpensive just “8” digits, (0, 1, 2, 3, 4, 5, 6, 7)
Disks" or "Redundant Array of making them a Base-8 numbering system
Independent Disks") is a data storage and therefore, q is equal to “8”.
virtualization technology that combines 22.(A) Machine dependent means the program
multiple physical disk drive components can only work on the type of computer
into one or more logical units for the it was designed for while Machine
purposes of data redundancy, performance independent means the program can work
improvement, or both. on any computer system. Machine
15.(A) While running any program in Microsoft language is a first-generation language
Windows, if Alt+F4 is pressed, it closes written using 1s and 0s.
the currently active program. If no 23.(B) Open-source software (OSS) is a type of
programs are open or you are at the computer software in which source code
desktop, pressing Alt+F4 opens the is released under a license in which the
Shutdown window. copyright holder grants users the rights to
16.(C) A carrier is a signal used to communicate use, study, change, and distribute the
with other modems, networks, or other software to anyone and for any purpose.
devices. A carrier, in the context of Open-source software may be developed
cellular technology is a company that in a collaborative public manner.
provides mobile services. The term

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
136

24.(B) Pressing the Tab key can either add a tab by hardware such as a button press, or by
or create a first-line indent, depending on a software command. After it is switched
where the insertion point is. Generally, if on, a computer's central processing unit
the insertion point is at the beginning of (CPU) has no software in its main
an existing paragraph, it will create a first- memory, so some process must load
line indent; otherwise, it will create a tab. software into memory before it can be
25.(A) In computing, booting is the process of executed.
starting a computer. It can be initiated

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
137

Practice Set – 30

1. What is the correct association between a (A) Redo (B) Reload


hardware component and a computer function? (C) Restore (D) Refresh
(A) Monitor > input 11. Personal computers can be connected together to
(B) Mouse > input form a_______.
(C) CPU > storage (A) Server (B) Supercomputer
(D) Hard disk > processing (C) Network (D) Enterprise
2. The sharing of a medium and its path by 2 or 12. Which of the following is true?
more devices is called ________. (A) Byte is a single digit in a binary number
(A) Modulation (B) Encoding (B) Bit represents a grouping of digital numbers
(C) Line discipline (D) Multiplexing (C) Eight-digit binary number is called a byte
3. The server on the internet is also known as ___. (D) Eight-digit binary number is called a bit
(A) Repeater (B) Host 13. Which of the following can be used to select the
(C) Gateway (D) AND Gate entire document?
4. A database management system (DBMS) is a__. (A) CTRL+A (B) ALT+F5
(A) Hardware system used to create, maintain (C) SHIFT+A (D) CTRL+K
and provide controlled access to a data- base 14. A concentric circle on a disk is called a_____.
(B) Hardware system used to create, maintain, (A) Cylinder (B) Track
and provide uncontrolled access to a database. (C) Head (D) Sector
(C) Software system used to create, maintain, 15. DSL is an example of a(n) _____connection.
and provide uncontrolled access to a database. (A) Network (B) Wireless
(D) Software system used to create, maintain and (C) Slow (D) Broadband
provide controlled access to a database. 16. The overall design, construction, organization
5. Which of the following is an example of and interconnecting of the various components of
connectivity? a computer system is referred as–
(A) Internet (B) Floppy disk (A) Computer Architecture
(C) Power card (D) Data (B) Computer Flowchart
6. What menu is selected to cut, copy and paste? (C) Computer Algorithm
(A) File (B) Tools (D) All of the above
(C) Special (D) Edit 17. Instructions and data that are processed by the
7. To save a document in different location use __. CPU are located in________.
(A) Save (B) Save as (A) CD-ROM (B) RAM
(C) Save as web page (D) All of above (C) The hard disk (D) The motherboard
8. Programming language built into user programs 18. All of the following are considered to be storage
such as Word and Excel are known as ______. devices EXCEPT_______.
(A) 4GLs (A) Floppy disk (B) CPU
(B) Macro languages (C) CD (D) Hard disk drive
(C) Object-Oriented languages 19. The commonly used UNIX commands like date,
(D) Visual programming languages ls, cat etc. are stored in________.
9. Codes consisting of lines of varying widths or (A) Dev directory (B) Bin directory
lengths that are computer-readable are known (C) Temp directory (D) Unix directory
as_. 20. A circuit with about 100 transistors fabricated on
(A) An ASCII code (B) A magnetic tape a single chip is called _____.
(C) An OCR scanner (D) A bar code (A) MCR (B) MSI
10. To reload a Web page, press the ____button. (C) MIS (D) RJE

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
138

21. One megabyte equals approximately ______. (C) Mini computers (D) File servers
(A) 1,000 bits (B) 1,000 bytes 24. What is the term for unsolicited e-mail?
(C) 1 million bytes (D) 1 million bits (A) News group (B) Use net
22. A computer checks the _____ of user names and (C) Backbone (D) Spam
passwords for a match before granting access. 25. The _____ tells the computer how to use its
(A) Website (B) Network components.
(C) Backup file (D) Data base (A) Utility
23. Computers that are portable and convenient for (B) Network
users who travel are known as _____. (C) Operating system
(A) Super computers (B) Laptops (D) Application program

Solution
1.(B) A computer mouse is an input device that connection to connect to the Internet. An
is used with a computer. Moving a mouse Internet Service Provider (ISP) connects
along a flat surface can move the cursor to the home user to other computers. Files
different items on the screen. Items can be that are transferred over the Internet are
moved or selected by pressing the mouse called Web pages.
buttons (called clicking). 6.(D) Through the Edit menu and right-click
2.(D) In telecommunications and computer menu. It has cut, copy, and paste items.
networks, multiplexing (sometimes The menu makes it easy to perform one of
contracted to muxing) is a method by these functions on the selection of text
which multiple analog or digital signals because it appears next to it. The cut item
are combined into one signal over a shared is also available through the Edit menu
medium. The aim is to share a scarce and when you click the right-mouse
resource. The multiplexed signal is button.
transmitted over a communication 7.(B) Save a copy as a new file (Save As)
channel such as a cable. Press F12 or click File > Save a Copy.
3.(B) A host is a computer that is accessible By default, Office will save the copy in the
over a network. It can be a client, server, same location as the original. If you want
or any other type of computer. Each host to save the new copy in a different
has a unique identifier called a hostname location, choose it at this point.
that allows other computers to access it. Give your new copy a name and click
For example, the hostname of a computer Save.
on a local network might be Tech-Terms. 8.(D) In computing, a visual programming
4.(D) A DBMS is a collection of programs that language (VPL) is any programming
enable users to create and maintain a language that lets users create programs
database. The DBMS is a general purpose by manipulating program elements
software system that facilitates the graphically rather than by specifying them
processes of defining, constructing, textually.
manipulating and sharing databases 9.(D) A barcode essentially is a way to encode
among various users and applications. information in a visual pattern that a
5.(A) The Internet (or internet) is the global machine can read. The combination of
system of interconnected computer black and white bars (elements) represents
networks that uses the Internet protocol different text characters which follows a
suite (TCP/IP) to communicate between set algorithm for that barcode type. The
networks and devices. The Internet is a first six numbers of the barcode is the
collection of computers that share manufacturer's identification number. The
information. Home users commonly use a next five digits represent the item's
phone modem, cable modem, or DSL number. The last number is called a check

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
139

digit which enables the scanner to can be accessed quickly. The more
determine if the barcode was scanned programs your system is running; the
correctly. more memory you'll need.
10.(D) Pressing the F5 function key can refresh 18.(B) CPU Stands for "Central Processing
the Windows desktop screen. Unit." The CPU is the primary component
11.(C) A computer network is a set of computers of a computer that processes instructions.
connected together for the purpose of The CPU contains at least one processor,
sharing resources. The most common which is the actual chip inside the CPU
resource shared today is connection to the that performs calculations.
Internet. Other shared resources can 19.(B) The bin directory is found on Linux
include a printer or a file server. The computers and stores all binary
Internet itself can be considered a executables. This directory includes all
computer network. the command line commands and other
12.(C) In computer parlance, one binary digit is binary executables. Bin is also an
called a bit, two digits are called a crumb, abbreviation sometimes used for the
four digits are called a nibble, and eight Windows Recycle Bin.
digits are called a byte. 20.(B) A circuit with about 100 transistors
13.(A) Alternatively known as Control A and C- fabricated on a single chip is called MSI.
a, Ctrl+A is a shortcut key most often used Medium-scale integration is an integrated
to select all text, or other objects while in circuit that contains between 30 and 1,000
a graphical user environment. Tip. On electronic components on a single chip.
Apple computers, the shortcut to select all Electronics terms, Large scale integration.
is the Command key+A keys. 21.(C) One megabyte is about 1 million bytes (or
14.(B) The tracks are concentric circles around about 1000 kilobytes). One megabyte is
the disk and the sectors are segments about 1 million bytes (or about 1000
within each circle. For example, a kilobytes). An MP3 audio file of a few
formatted disk might have 40 tracks, with minutes or a 10-million-pixel image from
each track divided into 10 sectors. A a digital camera would typically take up
sector that cannot be used due to a few megabytes.
physical flaw on the disk is called a bad 22.(D) A computer checks the data base of
sector. usernames and passwords for a match
15.(D) DSL is defined as an abbreviation that before granting access. Database, also
stands for digital subscriber line which is called electronic database, any collection
defined as the way a computer connects to of data, or information, that is specially
the Internet at high speeds using telephone organized for rapid search and retrieval by
lines. An example of DSL is the phone a computer. Databases are structured to
service that might be down when your facilitate the storage, retrieval,
Internet connection isn't working. modification, and deletion of data in
16.(A) In computer engineering, computer conjunction with various data-processing
architecture is a set of rules and methods operations.
that describe the functionality, 23.(B) Laptop computers, also known as
organization, and implementation of notebooks, are portable computers that
computer systems. Some definitions of you can take with you and use in different
architecture define it as describing the environments. They include a screen,
capabilities and programming model of a keyboard, and a trackpad or trackball,
computer but not a particular which serves as the mouse.
implementation. 24.(D) The word "Spam" as applied to Email
17.(B) Computer memory or random-access means "Unsolicited Bulk Email". Email
memory (RAM) is your system's short- spam, also known as junk email, is
term data storage; it stores the information unsolicited bulk messages sent through
your computer is actively using so that it email. Recipients of spam often have had

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
140

their email addresses obtained by end user and computer hardware. Every
spambots, which are automated programs computer must have at least one OS to run
that crawl the internet looking for email other programs. An application like
addresses. Spammers use spambots to Chrome, MS Word, Games, etc. needs
create email distribution lists. some environment in which it will run and
25.(C) An Operating system (OS) is a software perform its task.
which acts as an interface between the

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
141

Practice Set – 31

1. When sending an e-mail, the _____ line (A) Syntax errors (B) Semantic errors
describes the contents of the message. (C) Logic errors (D) System errors
(A) To (B) Subject 11. A _______ contains specific rules and words that
(C) Contents (D) CC express the logical steps of an algorithm?
2. The _____ key will launch the start buttons. (A) Syntax
(A) Esc (B) Shift (B) Programming structure
(C) Windows (D) Shortcut (C) Programming language
3. What is the ultimate purpose of (D) logic chart
Defragmentation? 12. A Proxy server is used for which of the
(A) Make the PC faster following?
(B) Create More Free Space (A) To provide security against unauthorized
(C) Delete temporary files users
(D) Reduce Power consumption (B) To process client requests for web pages
4. Which input device cannot be used to work in (C) To provide TCP/IP
MS Office? (D) To process client requests for database access
(A) Scanner (B) Mouse 13. Storage that retains its data after the power is
(C) Keyboard (D) Joy stick turned off is referred to as?
5. ________ is a method in which multiple (A) Volatile storage
communication devices are connected to one (B) Non-volatile storage
another efficiently. (C) Sequential storage
(A) Switching (B) Redundancy (D) Direct storage
(C) Capacity (D) Detecting 14. Which term identifies main page of the entire
6. _______ is a collection of web - pages and site?
______ is the very first page that we see on (A) URL (B) Web site address
opening of a website. (C) Hyperlink (D) Domain name
(A) Home page, Web page 15. A hard copy of a document is_______.
(B) Website, Home page (A) Stored in HDD
(C) Web page, Home page (B) Stored on a floppy
(D) Web page, Website (C) Stored on a CD
7. What's considered the 'backbone' of the World (D) Printed on the printer
Wide Web? 16. Which is the part of a computer that one can
(A) URL (B) HTML touch and feel?
(C) HTTP (D) FTP (A) Programs (B) Software
8. SMTP stands for _________. (C) Hardware (D) Output
(A) Simple Mail Transfer Protocol 17. CPU stands for ________.
(B) Serve Message Text Process (A) CD-run on memory
(C) Short Messaging Text Process (B) Central processing unit
(D) Short Messaging Transfer Protocol (C) Call powers up
9. Small application programs that run on a Web (D) Create programs user
page and provide animation are known as 18. Start or restart the computer known as _____.
______. (A) Exit (B) Kick
(A) flash (B) spiders (C) Boot (D) Kick-Start
(C) cookies (D) applets 19. This is not a function category in Excel _____.
10. The errors that can be pointed out by the compiler (A) Logical (B) Data Series
known as ______. (C) Financial (D) Text

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
142

20. The operating system that is self-contained in a (C) Third Generation


device and resident in the ROM is _____. (D) Fourth Generation
(A) Batch Operating System 23. ________ is the ability of a device to "jump"
(B) Real - time Operating System directly to the requested data.
(C) Embedded Operating System (A) Sequential access (B) Random access
(D) Multi Operating System (C) Quick access (D) All of the above
21. To be able to 'boot', the computer must have 24. _______ is the combination of keys to switch
a(n)__. between the last four places that you have edited.
(A) Compiler (B) Loader (A) ALT + CTRL + Z (B) ALT + CTRL + Y
(C) Operating System (D) Assembler (C) ALT + TAB + Z (D) ALT + SHIFT + Z
22. On-line real time systems become popular in__. 25. ____ is the functional key to display save-as box.
(A) First Generation (A) F5 (B) F6
(B) Second Generation (C) F9 (D) F12

Solution
1.(B) When sending an e-mail, the Subject line port or goes out it is called egress. A
describes the contents of the message. An communication system may include
email subject line is the first text recipients number of switches and nodes.
see after your sender name when an email 6.(B) Website is a collection of web - pages and
reaches their inbox. It is important to keep Home page is the very first page that we
an email subject line informative, catchy, see on opening of a website. A home
and brief. page also refers to the first page that
2.(D) The Shortcut key will launch the start appears upon opening a web browser,
button. The Start menu may be launched sometimes called the start page, although
either by pressing ⊞ Win (the Windows the home page of a website can be used as
key) on a keyboard or its equivalent on a a start page.
tablet device, pressing CTRL+ESC on a 7.(C) Hypertext Markup Language is the
keyboard, or by clicking on the visual standard markup language for documents
Start button. designed to be displayed in a web
3.(B) Defragmentation, also known as “defrag” browser. It can be assisted by technologies
or “defragging” is the process of such as Cascading Style Sheets and
reorganizing the data stored on the hard scripting languages such as JavaScript.
drive so that related pieces of data are 8.(A) The Simple Mail Transfer Protocol
put back together, all lined up in a (SMTP) is a communication protocol for
continuous fashion. electronic mail transmission. User-level
4.(D) A joystick is an input device consisting of email clients typically use SMTP only
a stick that pivots on a base and reports its for sending messages to a mail server for
angle or direction to the device it is relaying, and typically submit outgoing
controlling. Joysticks are often used to email to the mail server on port 587 or 465
control video games, and usually have one as per RFC 8314.
or more push-buttons whose state can also 9.(A) Flash displays text, vector graphics and
be read by the computer. raster graphics to provide animations,
5.(A) Switching is a method in which multiple video games and applications. It allows
communication devices are connected to streaming of audio and video, and can
one another efficiently. Switching is capture mouse, keyboard, microphone,
process to forward packets coming in and camera input. Related development
from one port to a port leading towards the platform Adobe AIR continues to be
destination. When data comes on a port it supported.
is called ingress, and when data leaves a

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
143

10.(A) A syntax error is an error in the source display or sent as an e-mail attachment, is
code of a program. For example, a sometimes referred to as a soft copy.
missing semicolon at the end of a line 16.(C) Computer hardware includes the physical
or an extra bracket at the end of a function parts of a computer, such as the case,
may produce a syntax error. In the PHP central processing unit, monitor, mouse,
code below, the second closed bracket keyboard, computer data storage, graphics
would result in a syntax error since there card, sound card, speakers and
is only one open bracket in the function. motherboard. By contrast, software is the
11.(A) A syntax contains specific rules and words set of instructions that can be stored and
that express the logical steps of an run by hardware. There are five parts of
algorithm. Generally a syntax contains computer hardware that can be found in
specific rules and words that express the most computer systems, from smart
logical steps in an algorithm. Syntax is the phones to desktop computers: processor,
grammar, structure or order of elements in primary storage, secondary storage, input
a language statement. Syntax is also devices and output devices.
used to refer to the study of principles 17.(B) A central processing unit, also called a
and processes. central processor, main processor or just
12.(B) A proxy server acts as a gateway between processor, is the electronic circuitry
you and the internet. It's an intermediary within a computer that executes
server separating end users from the instructions that make up a computer
websites they browse. Proxy servers program.
provide varying levels of functionality, 18.(C)
security, and privacy depending on your 19.(A) Booting is a startup sequence that starts
use case, needs, or company policy. the operating system of a computer when
13.(B) Non-volatile memory or non-volatile it is turned on. A boot sequence is the
storage is a type of computer memory that initial set of operations that the computer
can retrieve stored information even after performs when it is switched on. Excel
having been power cycled. In contrast, groups functions into 12 categories:
volatile memory needs constant power in Compatibility, Cube, Database, Date and
order to retain data. Examples of non- Time, Engineering, Financial,
volatile memory include flash memory, Information, Logical, Lookup &
read-only memory (ROM), ferroelectric Reference, Math & Trigonometry,
RAM, most types of magnetic computer Statistical and Text. There is an additional
storage devices (e.g. hard disk drives, category for user-defined functions
floppy disks, and magnetic tape), optical installed with add-ins, Logical is not a
discs, and early computer storage methods function category in Excel.
such as paper tape and punched cards. 20.(C) An embedded operating system (OS) is a
14.(A) URL stands for Uniform Resource specialized operating system designed to
Locator, and is used to specify addresses perform a specific task for a device that is
on the World Wide Web. A URL is the not a computer. An embedded operating
fundamental network identification for system's main job is to run the code that
any resource connected to the web (e.g., allows the device to do its job.
hypertext pages, images, and sound 21.(C) To be able to 'boot', the computer must
files). have an Operating System. A modern PC
15.(D) A hard copy of a document is printed on BIOS (Basic Input/Output System)
the printer. A hard copy (or "hardcopy") is supports booting from various devices.
a printed copy of information from a These include the local hard disk drive,
computer. Sometimes referred to as a optical drive, floppy drive, a network
printout, a hard copy is so-called because interface card, and a USB device.
it exists as a physical object. The same Typically, the BIOS will allow the user to
information, viewed on a computer configure a boot order.

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
144

22.(C) Online real time systems become popular 23.(B) Random access is the ability of a device to
in Third Generation. The period of third "jump" directly to the requested data.
generation was from 1965-1971. The 24.(A) ALT + CTRL + Z is the combination of
computers of third generation used keys to switch between the last four places
Integrated Circuits (ICs) in place of that you have edited.
transistors. A single IC has many 25.(D) Open the Save as a window in the
transistors, resistors, and capacitors along Microsoft Word. Ctrl+F12 opens a
with the associated circuitry. This document in the Word. Shift+F12 saves
development made computers smaller in the Microsoft Word document (like
size, reliable, and efficient. Ctrl+S). Ctrl+Shift+F12 prints a
document in the Microsoft Word.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
145

Practice Set – 32

1. Accessing data on tapes is much ___________ (D) The files get deleted and cannot be restored
than that accessing data on disks. again
(A) Slower (B) Faster 9. An educational institution would generally have
(C) Same (D) All of the above the following in its domain name____.
2. If you begin typing an entry into a cell and then (A) .org (B) .edu
realize that you don't want your entry placed into (C) .inst (D) .com
a cell, you _______. 10. POST stands for ___________
(A) Press Erase key (A) Power on Self-Test
(B) Press esc (B) Program on Self-Test
(C) Press Enter button (C) Power on System Test
(D) Press Edit Formula button (D) Program on System Test
3. Superscript, subscript, outline, emboss, engrave 11. Which of the following can input graphical
are known as _____. images and pictures for a computer?
(A) Font styles (B) Font effects (A) Plotter (B) Scanner
(C) Word art (D) Text effects (C) Mouse (D) Printer
4. What is object of UPS? 12. Which of the following categories would include
(A) Using for storage a keyboard?
(B) To increase the speed of a computer (A) Printing Device (B) Output Device
(C) Provides backup power (C) Input Device (D) Storage Device
(D) All of these 13. In Word you can force a page break–
5. Documents converted to _____ can be published (A) By positioning your cursor at the appropriate
to the Web. place and pressing the F1 key
(A) .doc file (B) Http (B) By positioning your cursor at the appropriate
(C) Machine language (D) HTML place and pressing Ctrl +Enter
6. Holding the mouse button down while moving an (C) By using the Insert/Section Break
object or text is known as ___. (D) By changing the font size of your document
(A) Moving (B) Dragging 14. LSTs (Large Integration) used in?
(C) Dropping (D) Highlighting (A) First generation (B) Second generation
7. What is the difference between a CD-ROM and (C) Third generation (D) Fourth generation
a CD-RW? 15. The purpose of an application program is to?
(A) They are the same; just two different terms (A) Meet specific user needs
used by different manufacturers (B) Make equivalent run better
(B) A D-ROM can be written to and a CD-RW (C) Allow the operating system to control
cannot resources better
(C) A CD-RW can be written to, but a CD-ROM (D) Convert program written in high-level
can only be read from language to machine level language
(D) A CD-ROM holds more information than a 16. Hypertext is a _________.
CD-RW (A) Text stored in the memory of the computer
8. What happens when we try to delete the fries on (B) Text displayed on the screen of the computer
the floppy? (C) Special text used in developing Internet
(A) The files get moved to the Recycle Bin developing package
(B) Files on a floppy cannot be deleted (D) A system of managing textual Information
(C) The files get deleted and can be restored by creating associations between different
again from Recycle Bin documents

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
146

17. For running WINDOW minimum disk free space (C) Frederick Cohen (D) Norton
required is? 22. To minimize all open windows and display the
(A) 8 MB (B) 10 MB desktop?
(C) 16 MB (D) 32 MB (A) Windows logo +D (B) Windows logo + E
18. Which of the following printers generates (C) Windows logo + F (D) Windows logo + G
character from a grid? 23. In MS-Word 'alt + shift + d' does what?
(A) Inkjet (B) Laser (A) Automatically inserts the date
(C) Daisy wheel (D) Dot matrix (B) Inserts the time
19. Accumulator is a _______. (C) Inserts the day
(A) Hardwired unit (B) Sequential circuit (D) All of the above
(C) Finite state machine (D) Register 24. _________ deletes an item immediately without
20. ___________ Function key refreshes the current placing it in the recycle bin.
window. (A) Shift +enter (B) Shift +delete
(A) F5 (B) F6 (C) Shift +right arrow (D) Shift +left arrow
(C) F7 (D) F8 25. Which of the following is not a network
21. In 1983, this person was the first to offer a topology?
definition of the term 'computer virus'? (A) Star (B) Bus
(A) MC Fee (B) Smiths (C) Linear (D) Ring

Solution
1.(A) Accessing data on tapes is much slower 4.(C) An uninterruptible power supply (UPS) is
than that accessing data on disks. a device that allows a computer to keep
Magnetic tape data storage is a system for running for at least a short time when the
storing digital information on magnetic primary power source is lost. It also
tape using digital recording. The device provides protection from power surges.
that performs the writing or reading of 5.(D) An HTML file contains Hypertext
data is called a tape drive, and autoloaders Markup Language (HTML), which is
and tape libraries are often used to used to format the structure of a webpage.
automate cartridge handling. Data is It is stored in a standard text format and
stored on the hard disk in the form of 0 and contains tags that define the page layout
1. Hard disk stores information in the form and content of the webpage, including the
of magnetic fields. Data is stored digitally text, tables, images, and hyperlinks
in the form of tiny magnetized regions displayed on the webpage.
on the platter where each region 6.(B) Dragging the mouse refers to moving its
represents a bit. position while holding the mouse button
2.(B) Pressing the Esc key while editing a cell depressed. Dragging is used in the Plot
aborts the operation and leaves the cell in window to move text items and to move
it's original state. It is a key (frequently the plot itself within the Plot window.
labeled Esc) found on most computer 7.(C) A Compact Disc Read Only Memory
keyboards and used for any of various (CD-ROM) is a read-only disc. ... A
functions, as to interrupt or cancel the Compact Disc Re-Writable (CD-RW) is
current process or running program, or to an erasable disc that can be reused. The
close a pop-up window. data on a CD-RW disc can be erased and
3.(B) On the Home tab, in the Font group, click recorded over numerous times. CD-RW
Text Effect. Click the effect that you want. media may not be readable outside of
For more choices, point to Outline, the drive it was created in.
Shadow, Reflection, or Glow, and then 8.(D) When we try to delete the fries on the
click the effect that you want to add. floppy the files get deleted and cannot be
restored again.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
147

assist the user with a particular process,


9.(B) An educational institution would which may be related to productivity,
generally have (.edu) as its domain name. creativity, and/or communication.
The domain name edu is a sponsored top- 16.(D) Hypertext is a system of managing textual
level domain in the Domain Name System Information by creating associations
of the Internet. The domain was between different documents. The
implemented in 1985 for the purpose of definition of hypertext is a word or words
creating a domain name hierarchy for that contain a link to a website. An
organizations with a focus on education, example of hypertext is the word
evenfor non-U.S.-affiliated entities. "Facebook" that links to the Facebook
10.(A) A power-on self-test (POST) is a process page.
performed by firmware or software 17.(A) For running Windows minimum disk free
routines immediately after a computer or space required is 8 MB. Your computer's
other digital electronic device is powered operating system (OS) manages all of the
on. In addition to running tests, the POST software and hardware on the computer.
process may also set the initial state of the Most of the time, there are several
device from firmware. different computer programs running at
11.(B) Scanner can input graphical images and the same time, and they all need to access
pictures for a computer. A scanner is an your computer's central processing unit
input device that scans documents such as (CPU), memory, and storage.
photographs and pages of text. When a 18.(D) A dot matrix printer is a type of printer
document is scanned, it is converted into a that prints by impact of pins striking up
digital format. Most scanners are flatbed and down on an ink ribbon, rather like a
devices, which means they have a flat traditional typewriter. Dot matrix printers
scanning surface. can produce characters by creating a series
12.(C) In computing, an input device is a piece of of dots, which are closely spaced together.
equipment used to provide data and 19.(D) In a computer's central processing unit
control signals to an information (CPU), the accumulator is a register in
processing system such as a computer or which intermediate arithmetic and logic
information appliance. Examples of input results are stored.
devices include keyboards, mouse, 20.(A) In all modern Internet browsers, pressing
scanners, digital cameras, joysticks, and F5 will reload or refresh the document
microphones. A keyboard could be window or page. Ctrl+F5 forces a
included in Pointing device category. complete refresh of a web page. It clears
13.(B) Word automatically adds a break at the the cache and downloads all contents of
end of each page. You can also insert a the page again. Refresh the list of contents
manual page break anytime you want to in a folder or a file.
start a new page in your document. Put 21.(C) Computer Virus. A computer virus is a
your cursor where you want one page to malicious software program loaded onto
end and the next to begin. Go to Insert and a user's computer without the user's
click on Page Break. knowledge and performs malicious
14.(D) Fourth Generation of computers was actions. The term 'computer virus' was
between 1971 – 1980. These computers first formally defined by Fred Cohen in
used the VLSI technology or the Very 1983.
Large Scale Integrated (VLSI) circuits 22.(A) If your keyboard has a Windows key (and
technology. Therefore, they were also most current keyboards do), you can press
known as the microprocessors. the Windows key and the M or D key
15.(A) Application software is a type of computer simultaneously to minimize all the
program that performs a specific currently open windows on your desktop.
personal, educational, and business
function. Each program is designed to

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
148

23.(A) You can insert today's date by pressing selected files and folders will be
Shift+Alt+D. This shortcut always inserts removed at once and will no longer be
a DATE field, the same as if you had used available.
the Date and Time dialog box and selected 25.(C) There are five types of topology in
the Update Automatically check box. computer networks:
24.(B) In advanced technology for deleting files Mesh Topology
directly from the disk without placing Star Topology
them into the Recycle Bin and it works Bus Topology
when you press the key shortcut Shift + Ring Topology
Delete. When you use this command, Hybrid Topology

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
149

Practice Set – 33

1. A list of rules for transferring data over a network 10. Most cash registers are now computers that are
is called? known as ____________ terminals.
(A) Protocol (B) Program code (A) POS (B) DS
(C) Rules (D) Flowchart (C) UDC (D) UPC
2. A table consists of_________. 11. Which of the following is NOT an example of
(A) Fields and columns (B) Rows and columns system maintenance?
(C) Rows and cells (D) All of the above (A) Replacing user interfaces
3. What does 'ctrl +esc' do? (B) Making backup copies of files
(A) Shows the start menu (C) Adding, deleting, adjusting records
(B) Shows the format menu (D) Providing system security
(C) Shows the tools menu 12. Which of the following is the primary task of a
(D) Shows the insert menu NAS server?
4. A proxy server is used as the computer? (A) Login authentication (B) File sharing
(A) With external access (C) Internet access (D) E-mail processing
(B) Acting as a backup 13. If you change Windows 98 to Windows XP, you
(C) Performing file handling are actually performing ____.
(D) Access user permissions (A) Upstart (B) Upgrade
5. Which of the following best defines embedded (C) Update (D) Patch
system? 14. To make a copy of the current document to
(A) A program that comes wrapped in a box disk____.
(B) A program that is permanent part of a (A) Use the 'Save' command
computer (B) This cannot be done
(C) A computer that is a part of a larger computer (C) Use the 'duplicate' command
(D) A computer and software system that (D) Use the 'save as' command
controls a machine 15. The main system board of a computer is called
6. To see the document before the printout is taken, the _______.
use ______. (A) Integrated circuit (B) Motherboard
(A) Insert Table (B) Paste (C) Processor (D) Microchip
(C) Format Painter (D) Print Preview 16. Your position in the text is shown by a _____.
7. Digital video consists of a series of_____. (A) Blinker (B) Insertion Point
(A) Media clips (B) Captures (C) Causer (D) Pointer
(C) Frames (D) Pictures 17. How many megabytes make a gigabyte?
8. The _______ is the smallest meaningful unit of (A) 1024 (B) 128
data. (C) 256 (D) 512
(A) Cell (B) Field 18. Using output devices one can ________.
(C) Application (D) All of the above (A) Input data (B) Store data
9. What are the four main aspects of data handling (C) Scan data (D) View or print data
with a computer? 19. Which contents are lost when the computer turns
(A) Input, processing, output, and storage off?
(B) Comparing, dividing, sorting, and organizing (A) Storage (B) Input
(C) Decision making, sorting, correcting, and (C) Output (D) Memory
mapping 20. When you save to this, your data will remain
(D) Adding, subtracting, multiplying, and intact even when the computer is turned off–
dividing

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
150

(A) RAM (C) Tower (D) Modem


(B) Motherboard 23. When the pointer is positioned on a______it is
(C) Secondary storage device shaped like a hand.
(D) Primary storage device (A) Grammar error (B) Formatting error
21. A central computer that holds collections of data (C) Screen Tip (D) Hyperlink
and programs for many PCs, workstations, and 24. Web pages are written using ________.
other computers is a(n) – (A) FTP (B) HTTP
(A) Supercomputer (B) Minicomputer (C) HTML (D) URL
(C) Laptop (D) Server 25. Which of the following is a storage device that
22. The piece of hardware that converts your uses rigid, permanently installed magnetic disks
computer's digital signal to an analog signal that to store data/information–
can travel over telephone lines is called a– (A) Floppy diskette (B) Hard disk
(A) Red wire (B) Blue cord (C) Permanent disk (D) Optical disk

Solution
1.(A) A network protocol is an established set of preview, you can discover any errors that
rules that determine how data is may exist in the document or fix the layout
transmitted between different devices in before printing, which can save ink/toner
the same network. Essentially, it allows and paper.
connected devices to communicate with 7.(C) Digital video consists of a series of
each other, regardless of any differences frames. In filmmaking, video production,
in their internal processes, structure or animation, and related fields, a frame is
design. one of the many still images which
2.(B) A table consists of an ordered compose the complete moving picture.
arrangement of rows and columns. A The term may also be used more generally
column name can consist of a word, as a noun or verb to refer to the edges of
phrase or a numerical index; the the image as seen in a camera viewfinder
intersection of a row and a column is or projected on a screen.
called a cell. 8.(B) The Field is the smallest meaningful unit
3.(A) Alternatively referred to as Control Esc of data. A database field is the smallest
and C-Esc, Ctrl+Esc is a shortcut key that unit of storage in a database. Fields are
opens the Start menu in Microsoft needed for every different piece of
Windows. information you wish to store. Database
4.(D) A proxy server, also known as a "proxy" fields are often thought of as the
or "application-level gateway", is a columns within a database table.
computer that acts as a gateway between 9.(A) To function, a computer system requires
a local network (for example, all the four main aspects of data handling: input,
computers at one company or in one processing, output, and storage. The
building) and a larger-scale network hardware responsible for these four areas
such as the internet. Proxy servers provide operates as follows: Input devices accept
increased performance and security. data in a form that the computer can use;
5.(D) An embedded system is a combination of they then send the data to the processing
computer hardware and software designed unit.
for a specific function or functions within 10.(A) In general terms, a POS or Point Of Sale
a larger system. The systems can be machine is a terminal or part of the
programmable or with fixed functionality. checkout process that processes credit or
6.(D) Print Preview option is used to view the debit cards and finalizes the transaction.
page or make adjustments before any Sometimes it can be a whole terminal with
document gets printed. By using print a cash register, printing uni, display

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
151

monitor, etc. or sometimes it can be as 17.(A) One thousand megabytes (1000 MB) is
small as a mobile. equal to one gigabyte (1 GB), where 1 GB
11.(A) Replacing user interfaces is not an is one billion bytes. 1 MB = 1048576
example of system maintenance. System bytes is the definition used by Microsoft
maintenance is an ongoing activity, which Windows in reference to computer
covers a wide variety of activities, memory, such as RAM.
including removing program and design 18.(D) Using output devices one can view or print
errors, updating documentation and test data. A printer is an output device that
data and updating user support. prints paper documents. This includes text
12.(B) Network-Attached Storage (NAS) is a documents, images, or a combination of
computer data storage connected to a both. The two most common types of
network, providing data access to various printers are inkjet and laser printers.
group of clients. NAS not only operates as A computer monitor is a display adapter
a file server, but it is also specialized for that displays information processed by the
this task either by its hardware, software, computer's video card. When a video card
or configuration of those elements. or graphics card converts binary
13.(B) If you change Windows 98 to Windows information from 1s and 0s into images,
XP, you are actually performing upgrade. these images are displayed onto the
Upgrading is the process of replacing a directly connected monitor.
product with a newer version of the same 19.(D) When you abruptly turn off the system,
product. In computing and consumer the files that the system has been writing
electronics an upgrade is generally a may be incomplete resulting in loss of
replacement of hardware, software or data. All those unsaved data and programs
firmware with a newer or better version, can lead to data corruption.
in order to bring the system up to date or 20.(C) If you save data in secondary storage
to improve its characteristics. device your data will remain intact even
14.(D) To make a copy of the current document when the computer is turned off or
to disk use the 'save as' command. A switched off. Secondary storage device is
command in the File menu of most where programs are kept for a long period
applications that causes a copy of the of time.
current document or image to be created. 21.(D) A server is a computer that provides data
"Save As" lets the user make a copy of to other computers. It may serve data to
the file in a different folder or make a copy systems on a local area network (LAN)
with a different name. or a wide area network (WAN) over the
15.(B) The main system board of a computer is Internet. For example, a computer
called the Motherboard. The motherboard connected to a home network can be
is a printed circuit board and foundation designated as a file server, print server,
of a computer that is the biggest board in or both.
a computer chassis. It allocates power and 22.(D) The word "modem" is a contraction of the
allows communication to and between the words modulator-demodulator. A modem
CPU, RAM, and all other computer is typically used to send digital data
hardware components. over a phone line. The sending modem
16.(B) The insertion point is the blinking vertical modulates the data into a signal that is
line in your document. It indicates where compatible with the phone line, and the
you can enter text on the page. You can receiving modem demodulates the signal
use the insertion point in a variety of back into digital data.
ways: Blank document: When a new 23.(D) When the pointer hovers over a hyperlink,
blank document opens, the insertion point a mouse over event changes the pointer
is located in the top-left corner of the page. into a hand with an outstretched index
finger. Often some informative text about
the link may pop up in a tooltip, which

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
152

disappears when the user moves the 25.(B) A hard disk drive (HDD), hard disk, hard
pointer away. drive, or fixed disk is an electro-
24.(C) The core element of a web page is one or mechanical data storage device that uses
more text files written in the Hypertext magnetic storage to store and retrieve
Markup Language (HTML). Many web digital data using one or more rigid rapidly
pages also make use of JavaScript code for rotating platters coated with magnetic
dynamic behavior and Cascading Style material.
Sheets (CSS) code for presentation
semantics

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
153

Practice Set – 34

1. Which of the following are advantages of CD- (B) Appearance of an icon


ROM as a storage media? (C) To take a selection from the document and
(A) CD-ROM is an inexpensive way to store move it to the clipboard.
large, amount of data and information (D) All of the above
(B) CD-ROM disks retrieve data and information 10. The term overflow means?
more quickly than magnetic disks do (A) An excess of Internal storage
(C) CD-ROMs make less errors than magnetic (B) An excess of external storage
media (C) A situation where record cannot fit in to its
(D) All of the above right place
2. A device, which is not connected to CPU, is (D) A device, which controls the level of
called as ______. humidity in the computer room
(A) Land-line device (B) On-line device 11. The access time refers to as___.
(C) Off-line device (D) Device (A) Time required locating and retrieving stored
3. A computer program that converts an entire data
program into machine language at one time is (B) Time required locating the lost data
called a/ an ______. (C) Time required deleting specific data on a
(A) Interpreter (B) Simulator certain memory location
(C) Compiler (D) Numbers (D) All of the above
4. What is MS Word? 12. Rotational delay time is also known as__.
(A) A game (A) Seek time (B) Shift time
(B) An Operating System (C) Latency (D) Access time
(C) Word Processing Software 13. Which memory is non-volatile and may be
(D) Typing tutor software written only once?
5. For Scientific work the most popular language (A) RAM (B) EPROM
is? (C) EEPROM (D) PROM
(A) PASCAL (B) FORTRON 14. Peer-to-peer is a description–
(C) COBOL (D) PROLOG (A) Of communications between two dissimilar
6. TCP stands for _______. devices
(A) Transfer control protocol (B) Of communications between two equal
(B) Transfer control process devices
(C) Transmission control protocol (C) Of communications between two different
(D) Transmission control process devices
7. The first graphical web browser are? (D) All of the above
(A) Gopher (B) WAIS 15. Pascal is__.
(C) CERN (D) Mosaic (A) A high-level programming language
8. Total memory of system can be known using? (B) Named after Blaise Pascal
(A) DIR commands (C) Named after mathematician that facilitates
(B) MEM commands structured programming techniques
(C) Warm boot (D) All of the above
(D) TOT MEM commands 16. Technique to implement virtual memory where
9. The meaning of double-click is? memory is divided into units of fixed size
(A) Pushing and releasing the main mouse button memory is–
twice in rapid succession when the on-tree mouse (A) Paging (B) De-fragments
pointer is positioned over the desired item. (C) Segmentation (D) All of the above

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
154

17. An adder where all the bits of the two operands (A) Thermal printer (B) Ink-jet printer
are added simultaneously– (C) Laser printer (D) Dot-matrix printer
(A) Parallel adder (B) Half adder 22. EDVAC stands for______.
(C) Full adder (D) All of the above (A) Electronic Discrete Variable Automatic
18. The point at which the flow of text in a document Computer
moves to the top of a new page– (B) Electronic Discrete Value Automatic
(A) Page insert (B) Page break Computer
(C) Page format (D) All of the above (C) Electronic Device Variable Automatic
19. Multiprocessor is a computer system– Computer
(A) Where many CPU under a common control (D) Electronic Discrete Variable Advanced
(B) Consisting of more than one input devices Computer
under common control 23. When a file is saved for the first time-_______.
(C) Where many output devices under (A) A copy is automatically printed
(D) All of the above (B) It must be given a name to identify it
20. Non-document files are– (C) It does not need a name
(A) Pure ASCII files that can be listed for any (D) It only needs a name if it is not going to be
word processing software printed
(B) Non-ASCII files that can be listed for any 24. The computers which are relatively rare because
word processing software of their cost and size are:
(C) Pure ASCII files that can be listed for (A) Mini Computers (B) Micro Computers
specific word processing software (C) Super Computers (D) Laptops
(D) Non-ASCII files that can be listed for 25. A mistake in an algorithm that causes incorrect
specific word processing software results is called a ______.
21. Which of the Following is not a non-impact (A) Logical error (B) Syntax error
printer? (C) Machine Error (D) Compiler error

Solution
1.(D) The major advantages of the CD-ROM 4.(C) Microsoft Word or MS-WORD (often
technology are: high-capacity data called Word) is a graphical word
storage; data security and integrity; processing program that users can type
stability of the optical medium, especially with. It is made by the computer company
compared to magnetic media; the ability Microsoft. Its purpose is to allow users to
to store digital, audio, and video data, a type and save documents. Similar to other
direct result of storage capacity and laser word processors, it has helpful tools to
technology. make documents.
2.(C) When a computer or other device is not 5.(B) FORTRAN is a general-purpose,
turned on or connected to other devices, it compiled imperative programming
is said to be "offline." This is the opposite language that is especially suited to
of being "online," when a device can numeric computation and scientific
readily communicate with other devices. computing. FORTRAN was designed for
3.(C) A compiler is a special program that scientists and engineers, and has
processes statements written in a dominated this field. For the past 30 years
particular programming language and FORTRAN has been used for such
turns them into machine language or projects as the design of bridges and
"code" that a computer's processor uses. aeroplane structures, it is used for
Typically, a programmer writes language factory automation control, for storm
statements in a language such as Pascal or drainage design, analysis of scientific data
C one line at a time using an editor. and so on.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
155

6.(C) TCP (Transmission Control Protocol) is a (OTP NVM) is a form of digital memory
standard that defines how to establish and where the setting of each bit is locked
maintain a network conversation through by a fuse or antifuse.
which application programs can exchange 14.(D) In a P2P network, the "peers" are
data. TCP works with the Internet computer systems which are connected
Protocol (IP), which defines how to each other via the Internet. Files can be
computers send packets of data to each shared directly between systems on the
other. network without the need of a central
7.(D) NCSA Mosaic, or simply Mosaic, was the server. In other words, each computer on
web browser that popularized the World a P2P network becomes a file server as
Wide Web and the Internet. It was also a well as a client.
client for earlier internet protocols such as 15.(D) Pascal is an imperative and procedural
File Transfer Protocol, Network News programming language, designed by
Transfer Protocol, and Gopher. The Niklaus Wirth as a small, efficient
browser was named for its support of language intended to encourage good
multiple internet protocols. programming practices using structured
8.(B) MEM commands displays the amount of programming and data structuring. It is
used and free memory in your system. named in honour of the French
Classifies programs by memory usage. mathematician, philosopher and physicist
Lists the size of programs, provides a Blaise Pascal.
summary of memory in use, and lists the 16.(A) Technique to implement virtual memory
largest memory block available. Displays where memory is divided into units of
the status of all modules in memory, fixed size memory is Paging. In Operating
internal drivers, and other information. Systems, Paging is a storage mechanism
9.(A) A double-click is the act of pressing a used to retrieve processes from the
computer mouse button twice quickly secondary storage into the main memory
without moving the mouse. Often, single- in the form of pages. The main idea behind
clicking selects (or highlights) an object, the paging is to divide each process in the
while a double-click executes the function form of pages. The main memory will also
associated with that object. be divided in the form of frames.
10.(A) In computing, an overflow error can occur 17.(A) A single full adder performs the addition
when a calculation is run but the computer of two one bit numbers and an input carry.
is unable to store the answer correctly. All But a Parallel Adder is a digital circuit
computers have a predefined range of capable of finding the arithmetic sum of
values they can represent or store. two binary numbers that is greater than
Overflow errors occur when the execution one bit in length by operating on
of a set of instructions return a value corresponding pairs of bits in parallel.
outside of this range. 18.(B) The page breaks partition only the body
11.(A) Access time is the time delay or latency text of the document, whereas the section
between a request to an electronic system, breaks partition both the body text of the
and the access being completed or the document, as well as partition page
requested data returned. margins, headers and footers, page
12.(C) Latency is measured in milliseconds, and numbers, and the like.
indicates the quality of your connection Go to Layout > Page Setup, select Break,
within your network. Anything at 100ms and then choose Page.
or less is considered acceptable for Click or tap in the document where you
gaming. However, 20-40ms is optimal. want a page break.
13.(D) A programmable read-only memory Go to Insert > Page Break.
(PROM) or field programmable read-only 19.(A) Multiprocessing, in computing, a mode of
memory (FPROM) or one-time operation in which two or more processors
programmable non-volatile memory in a computer simultaneously process two

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
156

or more different portions of the same 23.(B) Save as a different, or older, format
program (set of instructions). On a Click the File tab.
multiprocessor machine, each processor Click Save As.
and RAM is connected through the system Choose a file location, such as OneDrive
bus. Hence the system bus is the hardware or This PC to store your file.
path used by the processors to access the In the File name box, enter a new name for
system memory as well as to access each the file.
other. But going through the slow system In the Save as type list, click the file
bus will slow down the processing. format that you want to save the file in.
20.(B) Non-document-mode definition: Click Save
A word processing mode used for creating 24.(C) A supercomputer is a computer that
source language programs, batch files and performs at or near the currently highest
other text files that contain only text and operational rate for computers.
no proprietary headers and format codes. Traditionally, supercomputers have been
21.(C) A laser printer is a printer that uses a used for scientific and engineering
focused beam or light to transfer text and applications that must handle very large
images onto paper. The result is a clean databases or do a great amount of
copy of the image written on the paper. computation (or both).
Because laser printers do not use ink, they 25.(A) A logic error (or logical error) is a mistake
have less image smearing problems than in a program's source code that results in
inkjet printers and are able to print pages incorrect or unexpected behavior. It is a
faster. type of runtime error that may simply
22.(A) EDVAC (Electronic Discrete Variable produce the wrong output or may cause a
Automatic Computer) was one of the program to crash while running. Many
earliest electronic computers. Unlike its different types of programming mistakes
predecessor the ENIAC, it was binary can cause logic errors.
rather than decimal, and was designed to
be a stored-program computer.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
157

Practice Set – 35

1. A(n) _____ program is one that is ready to run 11. What is the short cut key to open the Open dialog
and does not need to be altered in any way. box in MS word?
(A) Interpreter (B) High-level (A) F12 (B) Shift F12
(C) Compiler (D) Executable (C) Alt + F12 (D) Ctrl + F12
2. A set of step-by-step procedures for 12. How can you disable extended selection mode?
accomplishing a task is known as a(n)— (A) Press F8 again to disable
(A) Algorithm (B) Hardware program (B) Press Del to disable
(C) Software bug (D) Firmware program (C) Press Esc to disable
3. The main directory of a disk is called the (D) Press Enter to disable
_______ directory. 13. Auto Calculate will quickly add selected cells if
(A) Root (B) Sub you _________.
(C) Folder (D) Network (A) Right click on the status bar and select Sum
4. A ________ is a collection of data that is stored (B) Click the Auto Calculate button on the
electronically as a series of records in a table. toolbar
(A) Spreadsheet (B) Presentation (C) Use the key combination Ctrl+$
(C) Database (D) Web page (D) Double click the selection
5. As you create documents, graphs and pictures 14. You can add a hyperlink to your worksheet by
your computer holds the data in—. pressing.
(A) Restore file (B) Backup drive (A) Alt + K (B) Ctrl + H
(C) Clip board (D) Memory (C) Ctrl + K (D) Ctrl + Shift + K
6. All are included in removable media except the 15. ___________ are 'attempts by individuals to
following— obtain confidential information from you by
(A) CD-ROMs (B) Diskette falsifying their identity.
(C) DVDs (D) Hard disk drive (A) Phishing (B) Computer viruses
7. ________ processing is used when a large mail- (C) Spyware scams (D) Viruses
order company accumulates orders and processes 16. Which of the following is the fastest type of
them together in one large set. computer?
(A) Batch (B) Online (A) Laptop (B) Notebook
(C) Real-time (D) Group (C) Personal computer (D) Super computer
8. Computer programs are written in a high-level 17. Which of the following is not a term pertaining
programming language; however, the human to the Internet?
readable version of a program is called— (A) Keyboard (B) Link
(A) Cache (B) Instruction set (C) Browser (D) Search Engine
(C) Source code (D) Word size 18. The operating system that is self-contained in a
9. What happens if you press Ctrl + Shift + F8? device and resident in the ROM is ______.
(A) It activates extended selection. (A) Batch Operating System
(B) It activates the rectangular selection (B) Real - time Operating System
(C) It selects the paragraph on which the (C) Embedded Operating System
insertion line is. (D) Multi Operating System
(D) None of above 19. The computer abbreviation KB usually means–
10. Which of the following is not valid version of MS (A) Key Block (B) Kernel Boot
Office? (C) Key Byte (D) Kilo Byte
(A) Office XP (B) Office Vista
(C) Office 2007 (D) All of the above

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
158

20. _______ is the key to close a selected drop - (C) Storage device (D) Output device
down list; cancel a command and close a dialog 23. A __________ is an additional set of commands
box. that the computer displays after you make a
(A) TAB (B) SHIFT selection from the main menu.
(C) ESC (D) F10 (A) dialog box (B) Submenu
21. Which of the following is NOT one of the four (C) Menu selection (D) All of the above
major data processing functions of a computer? 24. A letter, memo, proposal or other file that is
(A) Gathering data created using Microsoft Word is called as?
(B) Processing data into information (A) Master (B) Slide
(C) Analyzing the data or information (C) Document (D) Worksheet
(D) Storing the data or information 25. Which of the following are parts of the CPU?
22. The CPU and memory are located on the: (A) Secondary Memory (B) Control unit
(A) Expansion board (B) Motherboard (C) Input device (D) Printer

Solution
1.(D) An executable is a file that contains a operating systems, software, and
program - that is, a particular kind of file hardware.
that is capable of being executed or run as 6.(D) A hard drive is the hardware component
a program in the computer. In a Disk that stores all of your digital content.
Operating System or Windows operating Your documents, pictures, music, videos,
system, an executable file usually has a programs, application preferences, and
file name extension of .bat, .com, or .exe. operating system represent digital content
2.(A) An algorithm is a step-by-step stored on a hard drive. Hard drives can be
demonstration of data processing or external or internal.
problem-solving. An algorithm can be 7.(A) Batch processing is a technique in which
described as a procedure or formula for an Operating System collects the
problem-solving. Algorithms can be programs and data together in a batch
widely used in various areas, computer before processing starts. An operating
programming, mathematics, and daily system does the following activities
lives. related to batch processing − The OS
3.(A) In a computer file system, and primarily defines a job which has predefined
used in the Unix and Unix-like operating sequence of commands, programs and
systems, the root directory is the first or data as a single unit.
top-most directory in a hierarchy. It can be 8.(C) Computer programs are written in a high-
likened to the trunk of a tree, as the level programming language; however,
starting point where all branches originate the human- readable version of a program
from. is called source code. Source code is the
4.(C) A database is an organized collection of language or string of words, numbers,
structured information, or data, typically letters and symbols that a computer
stored electronically in a computer programmer uses. An example of source
system. A database is usually controlled code is someone using HTML code to
by a database management system create a screen. "Source code."
(DBMS). 9.(B) To create a rectangular outline, the
5.(D) Computer memory is any physical device simplest and most
capable of storing information flexible approach is to create a rectangular
temporarily, like RAM (random access selection and then stroke it. The
memory), or permanently, like ROM shortcut is Ctrl + Shift + F8.
(read-only memory). Memory devices 10.(B) With the release of Word 2003, the
utilize integrated circuits and are used by numbering was again year-based. Since

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
159

then, Windows versions include Word have been the main input method for
2007, Word 2010, Word 2013, Word computers since the 1970s, supplemented
2016, and most recently, Word for Office by the computer mouse since the 1980s.
365. In 1986, an agreement between Atari 18.(C) The operating system that is self-
and Microsoft brought Word to the Atari contained in a device and resident in the
ST. ROM is Embedded Operating System. An
11.(D) Open an application and then press Ctrl- embedded operating system is a
O, or click the Open icon, to display the specialized OS for use in the computers
Open dialog box. Right-click any of the built into larger systems.
files or folders displayed in that dialog and 19.(D) The kilobyte is a multiple of the unit byte
you'll see a context menu pop open. This for digital information. The International
is the same context menu you'll find in System of Units defines the prefix kilo as
Explorer windows. 1000; per this definition, one kilobyte is
12.(C) If you press the F8 key, you enable what 1000 bytes. The internationally
Word refers to as extend mode. This is the recommended unit symbol for the kilobyte
keyboard method of anchoring the cursor is kB.
in preparation for making a selection. 20.(C) ESC is the key to close a selected drop -
When you move the cursor using the down list; cancel a command and close a
cursor control keys, the size of the text dialog box. The Escape key is located in
selection changes and the letters EXT the upper-left corner of a computer
appear on the status bar. keyboard. It typically resides to the left of
13.(B) Auto Calculate will quickly add selected the Function keys (F1, F2, F3, etc.) and
cells if you click the Auto Calculate button above the tilde (~) key. Most often, is is
on the toolbar. labeled with the abbreviation "esc."
14.(C) The hyperlink is used to add a link from 21.(C) Input, Process, Output, Storage is the
your worksheet to another location. The correct order of the four major functions
shortcut used for inserting a hyperlink is a of a computer.
combination of the CTRL key and letter There are five main hardware components
'K'. Click on the cell where you want to in a computer system: Input, Processing,
include the hyperlink, type an anchor text, Storage, Output and Communication
and then press the ENTER key. devices. A computer is a machine that can
15.(A) Phishing scams are attempts by be programmed to accept data (input),
individuals to obtain confidential process it into useful information (output),
information from you by falsifying their and store it away (in a secondary storage
identity. it is a kind of computer virus. device) for safekeeping or later reuse. The
phishing scams are used to obtain processing of input to output is directed by
sensitive information like user name, the software but performed by the
passwords-band credit card details. hardware. “Computer is a data processing
16.(D) A supercomputer is a computer with a device that performs four major functions:
high level of performance as compared to input, process, output, and storage” 2.
a general-purpose computer. The There are basically for basic functions of
performance of a supercomputer is computers - input, storage, processing and
commonly measured in floating-point output. These are described below: Input:
operations per second (FLOPS) instead of Receiving or accepting information from
million instructions per second (MIPS). outside sources. The most common way of
17.(A) A computer keyboard is a typewriter-style performing this function is through the
device which uses an arrangement of information entered through the keyboard
buttons or keys to act as mechanical levers and the click of mouse.
or electronic switches. Replacing early 22.(B) The motherboard is a printed circuit board
punched cards and paper tape technology, and foundation of a computer that is the
interaction via tele printer-style keyboards biggest board in a computer chassis. It

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
160

allocates power and allows 24.(C) A computer document is a file created by


communication to and between the CPU, a software application. While the term
RAM, and all other computer hardware "document" originally referred
components. specifically to word processor documents,
23.(A) A dialog box is an additional set of it is now used to refer to all types of
commands that the computer displays saved files. Therefore, documents may
after you make a selection from the main contain text, images, audio, video, and
menu. A dialog box is a temporary other types of data.
window an application creates to retrieve 25.(B) The control unit (CU) is a component of a
user input. An application typically uses computer's central processing unit (CPU)
dialog boxes to prompt the user for that directs the operation of the processor.
additional information for menu items. It tells the computer's memory, arithmetic
Windows also provides predefined dialog and logic unit and input and output
boxes that support common menu items devices how to respond to the instructions
such as Open and Print. that have been sent to the processor.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER
AWARENESS
For all government exam, Specially designed for
Andaman and Nicobar govt. Jobs

Mock Tests - 14
COMPUTER AWARENESS
162

Mock Test - 01

1. All of the logic and mathematical calculations 11. The first computer was programmed using
done by the computer happen in/on the ______. ______.
(A) system board (A) Assembly language (B) Machine language
(B) central control unit (C) Spaghetti code (D) Source code
(C) central processing unit 12. An integrated circuit is ______.
(D) mother board (A) a complicated circuit
2. A microprocessor is the brain of the computer (B) an integrated device
and is also called a(n) ______. (C) much costlier that a Dingle transistor
(A) microchip (B) macrochip (D) fabricated on a tiny silicon chip
(C) macroprocessor (D) calculator 13. The two types of output devices are ______.
3. The main job of CPU is to ______. (A) Monitor and Printer
(A) carry out program instructions (B) Floppy disk and CD
(B) store data/information for future use (C) Keyboard and Mouse
(C) process data and information (D) Windows 2000 and Windows NT
(D) Both (A) and (C) 14. A scanner scans ______.
4. Computer ______ is whatever is typed, (A) pictures
submitted, or transmitted to a computer system. (B) text
(A) input (B) output (C) both picture and text
(C) data (D) circuity (D) neither picture nor text
5. Main memory works in conjunction with 15. Which of the following groups have only input
______. devices?
(A) Special function cards (B) RAM (A) Mouse, Keyboard, Monitor
(C) CPU (D) Intel (B) Mouse, Keyboard, Printer
6. Which part of the computer is used for (C) Mouse, keyboard, Plotter
calculating and comparing? (D) Mouse, Keyboard, Scanner
(A) Disk Unit (B) Control Unit 16. The most common input devices are ______.
(C) Modem (D) ALU (A) Microphone, printer
7. Once information is input into a computer it (B) Scanner, monitor
becomes ______. (C) Digital camera, speaker
(A) objects (B) data (D) Keyboard, mouse
(C) ideas (D) facts 17. In MICR, 'C' stands for ______.
8. ______ is any part of the computer that you can (A) Code (B) Colour
physically touch. (C) Computer (D) Character
(A) Hardware (B) A Software 18. Which part of a computer displays the work
(C) Compiler (D) An application done?
9. The complete form of ‘IC’ in electronics is (A) RAM (B) Printer
______. (C) Monitor (D) ROM
(A) Internal circuit 19. Which of these keys is not on the number
(B) Independent circuit keyboard?
(C) Integrated circuit (A) Ctrl (B) Del
(D) Inbuilt circuit (C) Enter (D) Num lock
10. PARAM was developed by ______. 20. Which of the following is an example of storage
(A) C-DAC (B) IIT Kanpur devices?
(C) BARC (D) IIT Delhi

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
163

(A) Magnetic disks (B) Tapes (C) consists of four main types of devices
(C) DVDs (D) All of these (D) does not store information for later retrieval
21. Hard disk drives are considered ______ storage. 24. Which of the following is an example of an
(A) flash (B) non-volatile optical disk?
(C) temporary (D) non-permanent (A) Digital versatile disk
22. Memory that cannot be processed directly by (B) Memory disk
CPU is ______. (C) Magnetic disk
(A) Internal memory (B) External memory (D) No option is correct
(C) Cache memory (D) System memory 25. What part of the computer provides only
23. Secondary storage ______. temporary storage of files?
(A) does not require constant power (A) ROM memory (B) RAM memory
(B) does not use magnetic media (C) Hard drive (D) Mother board

Solution
1. (C) 2. (A) 3. (D) 4. (A) 13. (A) 14. (C) 15. (D) 16. (D)
5. (C) 6. (D) 7. (B) 8. (A) 17. (D) 18. (C) 19. (A) 20. (D)
9. (C) 10. (A) 11. (B) 12. (D) 21. (B) 22. (B) 23. (A) 24. (A)
25. (B)

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
164

Mock Test - 02

1. Which type of memory holds only the program 11. Printed information is existing physically and is
and data that the CPU is presently processing? a more permanent form of output than that
(A) CMOS (B) ROM presented on a display device is called ______.
(C) RAM (D) ASCII (A) Soft copy (B) Carbon copy
2. Where is data saved permanently? (C) Hard copy (D) Desk copy
(A) Memory (B) Storage 12. Mr. X has no printer to print his report. He wants
(C) CPU (D) Printer to take it to Mr. Y’s computer because Mr. Y has
3. The two kinds of main memory are ______. printer. Mr. X could save his report on a ______.
(A) ROM and RAM (A) Hard drive (B) Piece of paper
(B) Floppy Disk and DVD (C) Scanner (D) Mouse
(C) Primary and Secondary 13. A device that connects to a network without the
(D) Random and Sequential use of cables is said to be ______.
4. Which of the following devices have a limitation (A) distributed (B) wireless
that we can only read information from it but (C) centralized (D) open source
can't erase or modify it? 14. The ______ folder retains copies of messages
(A) Tape drive (B) Hard disk that you have started but are not yet ready to
(C) CD - Rom (D) Floppy disk send.
5. A DVD is an example of ______. (A) Inbox (B) Outbox
(A) hard disk (C) Drafts (D) Sent Items
(B) input device 15. A person who used his or her expertise to gain
(C) solid-state storage device access to other people’s computers to get
(D) optical disc information illegally or do damage is a ______.
6. Which device can understand the difference (A) spammer (B) hacker
between data and programs? (C) instant messenger (D) programmer
(A) Input device (B) Output device 16. Junk e-mail is also called ______.
(C) Memory (D) Microprocessor (A) spam (B) spoof
7. Storage device found inside the computer is (C) sniffer script (D) spool
______. 17. Antivirus software is an example of ______.
(A) CD ROM (B) Zip Disk (A) Business software
(C) Super Disk (D) Hard Disk (B) An operating system
8. The computer that process both analog and (C) A security utility
digital is called ______. (D) None of these
(A) Analog computer 18. Which one of the following is the reusable
(B) Hybrid computer optical storage device?
(C) Digital computer (A) CD (B) DVD
(D) Mainframe computer (C) RPM (D) CD-RW
9. Which of following refers to the fastest, biggest 19. Restarting of computer that is already on is
and most expensive computer? referred to as ______.
(A) Personal computer (B) Super computer (A) shut down (B) cold booting
(C) Laptop (D) Notebook (C) warm booting (D) logging off
10. The smallest unit of information a computer can 20. Ctrl, Shift and Alt keys are known as ______.
understand and process is known as a ______. (A) Function keys (B) Adjustment keys
(A) Digit (B) Kilobyte (C) Alphanumeric keys (D) Modifier keys
(C) Bit (D) Byte

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
165

21. What are the four things needed to connect to the (D) Video Card (VC)
Internet? 23. A computer works on a ______ number system.
(A) Floppy disk, modem, computer and an ISP (A) binary (B) octal
(B) Telephone line, PDA, computer and an ISP (C) decimal (D) hexadecimal
(C) Computer, an ISP modem and 24. Which of the following is the largest unit of
communication software storage?
(D) Computer, an ISP, modem and PDA (A) GB (B) KB
22. Which one of the following enables your (C) MB (D) TB
computer to connect to other computers? 25. Information on a computer is stored as ______.
(A) Graphic User Interface (GUII) (A) analog data (B) digital data
(B) Network Interface Card (NIC) (C) modem data (D) outbox data
(C) Controller Card (CnC)
Solution
1. (C) 2. (B) 3. (A) 4. (C) 13. (B) 14. (C) 15. (B) 16. (A)
5. (D) 6. (D) 7. (D) 8. (B) 17. (C) 18. (D) 19. (C) 20. (D)
9. (B) 10. (C) 11. (C) 12. (A) 21. (C) 22. (B) 23. (A) 24. (D)
25. (B)

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
166

Mock Test - 03

1. One thousand bytes is a ______. (C) CPU Scheduler


(A) Kilobyte (B) Megabyte (D) Process Scheduler
(C) Gigabyte (D) Terabyte 10. An error in a program which causes wrong result
2. A compiler is used to translate a program written is called a ______ .
in ______. (A) bug (B) byte
(A) a low level language (C) failure (D) Mistake
(B) a high level language 11. The ______ of a system includes the programs or
(C) assembly language instructions.
(D) machine language (A) information (B) hardware
3. Which is the best definition of a software (C) icon (D) software
package? 12. When you turn on the computer, the boot routine
(A) An add-on for your computer such as will perform which of the following test?
additional memory (A) RAM Test (B) Disk Drive test
(B) A set of computer programs used for a certain (C) Memory test (D) Power-on-self-test
function such as word processing 13. Computers connected to a LAN (local area
(C) A protection you can buy for a computer network) can ______.
(D) The box, manual and license agreement that (A) run faster
accompany commercial software (B) go online
4. Compiling creates a(n) ______. (C) share information and/or share peripheral
(A) program specification equipment
(B) algorithm (D) e-mail
(C) executable program 14. Several computers linked to a server to share
(D) subroutine programs and storage space is called ______.
5. A compiler translates a program written in a high (A) Network (B) Grouping
level language into ______. (C) Library (D) Integrated system
(A) machine language (B) an algorithm 15. The most important or powerful computer in a
(C) a debugged program (D) java typical network is ______.
6. The physical components of a computer system (A) desktop (B) network station
is ______. (C) network client (D) network server
(A) software (B) hardware 16. Which of the following refers to a small, single-
(C) ALU (D) control unit site network?
7. A computer cannot "boot" if it does not have the (A) LAN (B) DSL
______. (C) RAM (D) USB
(A) compiler (B) loader 17. What is the full form of ‘LAN’?
(C) operating system (D) assembler (A) Line Area Network
8. Which process checks to ensure the components (B) Linear Area Network
of the computer are operating and connected (C) Local Area Network
properly? (D) Land Area Network
(A) Booting (B) Processing 18. Users often use ______ to access to mainframe
(C) Saving (D) Editing or supercomputer.
9. In computer processing, ______ selects (A) terminal (B) node
processes from the pool and loads them into (C) desktop (D) handheld
memory for execution. 19. Personal computers can connect together to form
(A) Job Scheduler a ______.
(B) Resource Scheduler

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
167

(A) Sever (B) Super Computer (D) All options are correct
(C) Enterprise (D) Network 23. To view information on the web you must have a
20. A popular way to learn about computers without ______.
ever going to a classroom is called ______. (A) cable modem (B) web browser
(A) i-learning (B) isolated learning (C) domain name server (D) hypertext viewer
(C) e-Iearning (D) close learning 24. ______ allows voice conversations to travel over
21. The standard protocol of the internet is ______. the Internet.
(A) TCP/IP (B) Java (A) Internet telephony (B) Instant messaging
(C) HTML (D) Flash (C) E-mail (D) E-commerce
22. The Internet allows you to ______. 25. The ______ also called the web, contains billions
(A) send electronic mail of documents.
(B) view Web pages (A) World Wide Web (B) HTTP
(C) connect to servers all around the world (C) Web portal (D) Domain

Solution
1. (A) 2. (B) 3. (B) 4. (C) 17. (C) 18. (A) 19. (D) 20. (C)
5. (A) 6. (B) 7. (C) 8. (A) 21. (A) 22. (D) 23. (B) 24. (A)
9. (A) 10. (A) 11. (D) 12. (D) 25. (A)
13. (C) 14. (A) 15. (D) 16. (A)

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
168

Mock Test - 04

1. Teach Text is a text editor in which of the (A) File information packet
following operating systems? (B) File button
(A) Windows (B) Google Chrome (C) File directory
(C) Mozilla Firefox (D) Macintosh (D) File specification
2. A _______ is an agreement between the 11. The name which a user assigns to a document is
communicating parties on how communication is called a(n) ______ .
to proceed. (A) filename (B) program
(A) Path (B) SLA (C) record (D) data
(C) Bond (D) Protocol 12. .Dos, Doc and Html are example of ______.
3. "GUI" Stands for ______. (A) Data bases (B) Extensions
(A) Gnutella Universal Interface (C) Domains (D) Protocols
(B) Graphics User Interface 13. Which of the following command allows you to
(C) Graphic Uninstall/Install bold the select text?
(D) General Utility Interface (A) Shift + P (B) ESC + P
4. Each ______ on a menu performs a specific (C) Alt + P (D) Ctrl + B
action. 14. In a database, ______ fields store numbers used
(A) client (B) server to perform calculation.
(C) node (D) command (A) Next (B) Key
5. The side bar in a window or word processor that (C) Alphanumeric (D) Numeric
has an arrow on both ends and a box in the middle 15. Numbers in table columns are usually ______.
that you use your mouse to move the pages up\or (A) right-aligned (B) left-aligned
down is ______. (C) justified (D) centered
(A) Scroll bar (B) Roll bar 16. In a spreadsheet program, the ______ contains
(C) Page bar (D) Box bar related worksheet and documents.
6. Deleted data remains on a disk until ______. (A) workbook (B) column
(A) the data is overwritten (C) cell (D) formula
(B) the recycle bin is emptied 17. To go to the beginning of a text line, press
(C) a file compression utility is used ______ key.
(D) the disk is scanned (A) Home
7. In Microsoft Word, ______ allows us to move (B) Page up
selected paragraphs to the left. (C) Enter
(A) decrease Indent (B) increase Indent (D) No option is correct
(C) double Indent (D) single Indent 18. Mouse technique used to access properties of an
8. For creating a document, we use which of the object is ______.
following button at file menu? (A) dragging (B) dropping
(A) Open (B) Close (C) right clicking (D) shift clicking
(C) New (D) Save 19. Moves the cursor one space to the right or puts
9. Meaningful filename helps in easy file ______. spaces in between words by using ______.
(A) storing (A) Control key (B) Spacebar
(B) accessing (C) Printer (D) Mouse
(C) printing 20. MS-Word is an example of ______.
(D) No option is correct (A) Operating system
10. A ______ includes the file name and possibly a (B) Application software
directory of folder. (C) Processing device

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
169

(D) Input device (A) Keylogger (B) Firewall


21. A register in CPU used to store the address of the (C) Virus (D) Cracker
next instruction to be executed is known as 24. In a digital computer, a stack is a part of ______.
______. (A) Motherboard (B) Printer
(A) program counter (C) Memory unit (D) Monitor
(B) program library 25. Operating system, these are small pictures that
(C) programmer represent files, folders, programs, and other
(D) No option is correct items. Each one is used to make the computer do
22. Which of the following terms applies to something.
communication between two computer system? (A) Sidebar
(A) computer literacy (B) power supply (B) Icons
(C) applications software (D) connectivity (C) Taskbar
23. ______ is a self - replicating program that infects (D) No option is correct
computer and spreads by inserting copies of itself
into other executable code or document.

Solution
1. (D) 2. (D) 3. (B) 4. (D) 17. (A) 18. (C) 19. (B) 20. (B)
5. (A) 6. (B) 7. (D) 8. (C) 21. (A) 22. (D) 23. (C) 24. (C)
9. (B) 10. (C) 11. (A) 12. (B) 25. (B)
13. (D) 14. (D) 15. (B) 16. (A)

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
170

Mock Test - 05

1. Which of the following shortcut is used to cut 9. In MS–Excel, what does 'SUMIF' function do?
something in MS–Word. (A) Adds up cell values based on a condition
(A) Ctrl + C (B) Adds all the numbers in a range of cells
(B) Ctrl + X (C) Returns a subtotal in a list or database
(C) Ctrl + V (D) No option is correct
(D) No option is correct 10. In MS–Excel, you can use the drag and drop
2. What type of software is used for creating letters, method to ______.
papers and other documents? (A) copy cell contents
(A) Database (B) Word processor (B) delete cells contents
(C) Spreadsheet (D)Operating program (C) add cell contents
3. In Microsoft Word, shortcut key Ctrl + P is used (D) All options are correct
to ______. 11. In MS–Excel, to access the 'Go To' Special
(A) open the Print dialog box feature, you can press ______.
(B) update the current Web page (A) Ctrl + G (B) Ctrl + O
(C) close the current window (C) Ctrl + Shift + G (D) Ctrl + 1
(D) No option is correct 12. In MS–Excel, Status indicators are located on the
4. In MS–Word, which of the following shortcut ______.
key is used to copy something? (A) Vertical scroll bar
(A) Ctrl + C (B) Horizontal scroll bar
(B) Ctrl + X (C) Formula bar
(C) Ctrl + V (D) Standard toolbar
(D) No option is correct 13. In MS–Excel workbook is a collection of
5. In Microsoft Word, shortcut 'Shift + Delete' is ______.
used to ______. (A) Workbooks
(A) delete the selected item permanently without (B) Worksheets
placing the item in the Recycle Bin (C) charts
(B) copy the selected item (D) Worksheets and charts
(C) rename the selected item 14. Excel files have a default extension of ______.
(D) create a shortcut to the selected item (A) Xls (B) Xlw
6. In Microsoft Word, shortcut key 'Ctrl + O' is used (C) Wk1 (D) 123
to ______. 15. In MS–Excel, Hyperlinks can be ______.
(A) open the favorites bar (A) Text
(B) open the Open dialog (B) Drawing objects
(C) start another instance of the browser with the (C) Pictures
same web address (D) All options are correct
(D) No options is correct 16. In MS–PowerPoint, to add a header or footer to
7. In MS–Excel, multiple calculations can be made your handout, you can use ______.
in a single formula using ______. (A) The title master
(A) standard formulas (B) array formula (B) The slide master
(C) complex formulas (D) smart formula (C) The handout master
8. In which of the following form data is stored in (D) All options are correct
computer? 17. Which of the following fill effects can you use
(A) Binary (B) Octal for slide background in MS–PowerPoint?
(C) Hexadecimal (D) Decimal (A) Gradient

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
171

(B) Texture 22. In MS–PowerPoint, boxes that are displayed to


(C) Picture indicate that the text, pictures or objects are
(D) All options are correct placed in it is called ______.
18. The arrangement of elements such as Title and (A) Placeholder (B) Auto text
Subtitle text, Pictures, tables etc. is called (C) Textbox (D) Word art
______. 23. Which of the following is known as ‘wetware’ in
(A) Layout (B) Presentation computer?
(C) Design (D) Scheme (A) Computer programs
19. Which of the following view can be used to enter (B) Circuitry
speaker comments in MS–PowerPoint? (C) Human brain
(A) Normal (B) slide show (D) Chemical storage devices
(C) slide sorter (D) Notes page view 24. Which of the following is an application
20. In MS–PowerPoint, best way to insert a new slide protocol?
in a presentation is to use the ______. (A) HTTP (B) TCP
(A) Normal view (B) Special view (C) IP (D) UDP
(C) Slide show view (D) Slide sorter view 25. In Microsoft Word, ______ allows us to change
21. In MS–PowerPoint, the best view for getting the colour or selected text.
your thoughts for a presentation out on the (A) Font colour
computer is ______. (B) Text colour
(A) Outline view (B) Notes page view (C) Change colour
(C) Slide sorter view (D) Slide view (D) Background colour
Solution
1. (B) 2. (B) 3. (A) 4. (A) 17. (D) 18. (A) 19. (D) 20. (D)
5. (A) 6. (B) 7. (B) 8. (A) 21. (A) 22. (A) 23. (C) 24. (A)
9. (A) 10. (A) 11. (A) 12. (C) 25. (A)
13. (B) 14. (A) 15. (D) 16. (C)

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
172

Mock Test - 06

1. Who created the first mechanical computer, 10. In IT, associative memory is called as ______.
which proved to be the prototype for future (A) Virtual memory
computers? (B) Cache memory
(A) Archimedes (B) John Harrison (C) Content addressable memory
(C) Cai Lun (D) Charles Babbage (D) Main memory
2. ______ software are freely available and can be 11. ALU is a part of computer ______.
edited and customised by anyone. (A) Application (B) ROM
(A) Free Source (B) Open Source (C) RAM (D) Processor
(C) Easy Source (D) Unpaid Source 12. ______ is not a storage device.
3. Which of the following is used to protect objects (A) iPod (B) Pen drives
in computer system, in the absence of more (C) Linux (D) Flash Disks
complete protect schemes? 13. Which among the following is not an input
(A) Digital certificate (B) Digital Signature device?
(C) Passwords (D) Tokens (A) Plotter
4. ______ is a global system of interconnected (B) Magnetic Ink Character Recognition (MICR)
governmental, academic, corporate, public, and (C) Optical Mark Recognition (OMR)
private computers? (D) Barcode Reader
(A) Intranet (B) Internet 14. Which of the following is also known as the brain
(C) Extranet (D) Darknet of the computer?
5. An absolute ______ contains the complete (A) CPU (B) ALU
address of a file on the Internet. (C) Motherboard (D) Keyboard
(A) Java Script (B) URL 15. What is the name of the First Supercomputer of
(C) SQL (D) String the world?
6. C.P.U. consists of ______. (A) CDC 6660 (B) USENET
(A) Arithmetic and Logical unit and Register (C) COMODOR VIC/20 (D) PARAM-10000
(B) Arithmetic and Logical unit, Register and 16. Which of the following are the two versions of
Control unit the Internet Protocol (IP)?
(C) System unit and Memory (A) IP Version 4 & IP Version 6
(D) Hard disk and Control unit (B) IP Version 2 & IP Version 3
7. Which of the following is a volatile memory of a (C) IP Version 4 & IP Version 8
computer? (D) IP Version 2 & IP Version 4
(A) Secondary Memory (B) Cache memory 17. In IT, the method for updating the main memory
(C) RAM (D) ROM as soon as a word is removed from the cache is
8. Cache memory works on the principle of ______. called ______.
(A) Locality of data (A) Write-through (B) Write-back
(B) Locality of reference (C) Protected-write (D) Cache-write
(C) Locality of Memory 18. Protocol used for receiving an email is ______.
(D) Locality of Memory & reference (A) HTTP (B) FTP
9. ______ is telecommunications network or (C) POP (D) SSH
computer network that extends over a large 19. A set of instructions executed directly by a
geographical distance. computer’s central processing unit is ______.
(A) Uniform Resource Locator (A) Command Language
(B) Simple Mail Transfer Protocol (B) Machine Language
(C) Wide Area Network (C) Markup Language
(D) Java Script (D) Style Sheet Language

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
173

20. Which mechanism is used by the computer virus (D) File Transfer Protocol
‘worm’ to duplicate itself? 23. In IT terminology, failure in the Kernel is called
(A) Swap (B) Increment as ______.
(C) Spawn (D) Swarm (A) Crash (B) Crash dump
21. Which of the following errors are identified by (C) Dump (D) Kernel error
the compiler? 24. Which among the following is a light sensitive
(A) Logical Errors (B) Hardware Errors device used for converting images to their digital
(C) Language Errors (D) Syntax Errors form?
22. In computer terminology, what is the full form of (A) Printer (B) Monitor
FTP? (C) Scanner (D) RAM
(A) Final Transfer Position 25. Which is not an external storage device?
(B) File Transfer Position (A) CD-ROM (B) DVD-ROM
(C) File Transfer Packet (C) Pen Drive (D) RAM

Solution
1. (D) 2. (B) 3. (C) 4. (B) 17. (B) 18. (C) 19. (B) 20. (C)
5. (B) 6. (B) 7. (C) 8. (B) 21. (D) 22. (D) 23. (A) 24. (C)
9. (C) 10. (C) 11. (D) 12. (C) 25. (D)
13. (A) 14. (A) 15. (A) 16. (A)

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
174

Mock Test - 07

1. Which of the following is/are Correct? 11. The limit for ASDL service is ______.
I. GUI - Graphical User Interface (A) 6,000 feet (B) 12,000 feet
II. VDU – Visual Display Unit (C) 18,000 feet (D) 9,000 feet
III. ALU – All Logical Unit 12. COBOL is an example of ______ language.
(A) I and II (A) low level
(B) I and III (B) computer
(C) Only II (C) high level
(D) All options are correct (D) system programming
2. Syntax Errors are determined by ______. 13. Which of the following is first commercial
A) Interpreter (B) ALU computer?
(C) Logic Unit (D) Control Unit (A) ENIAC (B) EDSAC
3. Which among the following is a ‘Modifier key’? (C) UNIVAC (D) EDVAC
(A) Control 14. Which of the following can input graphical
(B) Shift images and pictures for a computer?
(C) Alt (A) Plotter (B) Scanner
(D) All options are correct (C) Mouse (D) Keyboard
4. What is the name of a memory buffer used to 15. Cache memory works on the principle of ______.
accommodate a speed differential? (A) locality of reference
(A) Cache (B) Stack Pointer (B) locality of memory
(C) Accumulator (D) DISC (C) locality of data
5. Which among the following has largest storing (D) locality of memory and reference
space? 16. Which is the best definition of a software
(A) Giga byte (B) Mega byte package?
(C) Tera byte (D) Kilo byte (A) An add-on for your computer such as
6. Web pages are created by using which of the additional memory.
following? (B) A set of computer programs used for a certain
(A) HTTP (B) SMTP function such as word processing.
(C) HTML (D) SGML (C) A protection you can buy for a computer.
7. What is a bug in computer terminology? (D) The box, manual and license agreement that
(A) A virus accompany commercial software.
(B) A program 17. A ______ is hardware used to read disks.
(C) An error in program (A) Floppy disk (B) Hardware
(D) Magnetic disk storage device (C) Software (D) Disk drive
8. Dot- Matrix is an example of which of the 18. The programs which are as permanent as
following? hardware and stored in ROM is known as
(A) A software (B) Scanner ______.
(C) Printer (D) Keyboard (A) hardware (B) software
9. Group of 4 bits forms a ______. (C) firmware (D) ROM ware
(A) Byte (B) Nibble 19. ______ is the process of carrying out commands.
(C) Gigabyte (D) Terabyte (A) Fetching (B) Storing
10. In IT, ______ means that the data available in the (C) Decoding (D) Executing
database is both accurate and consistent. 20. Changing an existing document is called ______
(A) Data Security (B) Data Availability the document.
(C) Data Binding (D) Data Integrity (A) creating (B) editing
(C) adjusting (D) coding

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
175

21. Help Menu is available at which button? (A) HTML (B) XML
(A) End (B) Start (C) XHTML (D) None of these
(C) Restart (D) Reboot 24. The first-generation computer system used
22. A program that converts high level language to ______.
machine language is ______. (A) vacuum tubes (B) transistors
(A) linker (B) assembler (C) registers (D) magnetic cores
(C) compiler (D) interpreter 25. Android operating system is an example of
23. A set of rules for creating markup languages that which kind of source model?
enables programming to capture specific types of (A) Vertical Market Software
data by creating their own elements is called (B) Open Source
______. (C) Shareware
(D) Horizontal Market Software

Solution
1. (A) 14.(B)
2. (D) 15.(A)
3. (D) 16.(B)
4. (A) 17.(D)
5. (C) 18.(C)
6. (C) 19.(D)
7. (C) 20.(B)
8. (C) 21.(B)
9. (B) 22.(C)
10. (D) 23.(B)
11.(C) 24.(A)
12.(C) 25.(B)
13.(C)

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
176

Mock Test - 08

1. A __________ card connects each computer to (C) Bit-byte-field-record-file-database


the wiring in the network. (D) Byte-bit-record-file-field-database
(A) Network interface (B) PC interface 10. Which of the following is a graphical package?
(C) Memory (D) All of the above (A) CorelDraw (B) MS-Excel
2. What is the initial page of the Web site? (C) MS-Word (D) All of the above
(A) The start page 11. A mouse, trackball, and joystick are examples of
(B) The hyperlink page ________."
(C) The link page (A) Pointing devices
(D) The home page (B) Pen input devices
3. What is the term for a set of step-by-step (C) Data collection devices
instructions that direct a computer to perform its (D) Multimedia devices
tasks? 12. The Internet uses___________
(A) Setup (B) Program (A) Circuit switching (B) Packet switching
(C) System (D) Instruction manual (C) Hybrid switching (D) All of the above
4. To execute a given DOS program, you must type 13. What would you use for immediate, real-time
a(n) __________. communication with a friend?
(A) Command (B) Order (A) Instant Messaging (B) E-Mail
(C) Syntax (D) all of the above (C) Usenet (D) Blog
5. PC cards, flash memory cards, and smart cards 14. Which of the following is used to create
are all examples of: newspaper style columns?
(A) Removable hard disks. (A) Format Tabs (B) Table Insert Table
(B) Digital video discs. (C) Insert Textbox (D) Format Columns
(C) Volatile memory devices. 15. How much space in minimum must be provided
(D) Solid state storage devices. between columns?
6. A __________ is a unique identification number (A) 0" (B) 0.5"
generated by a computer hardware component or (C) 1" (D) 1.5"
a program. 16. Which operation you will perform if you need to
(A) Cookie (B) .NET Passport move a block of text?
(C) GUID (D) Private Key (A) Copy and Paste (B) Cut and Paste
7. RAM is an example of volatile storage and serves (C) Paste and Delete (D) Paste and Cut
as the computer's________ 17. The electronic switches in the ENIAC were:
(A) Short-term memory (A) Integrated circuits
(B) Hard drive (B) Transistors
(C) Permanent storage unit (C) Electro-mechanical switches
(D) Auxiliary CPU (D) Vacuum tubes
8. When a computer prints a report, this output is 18. In Excel __________ allows users to bring
called ________. together copies of work-books that other user
(A) Hard copy (B) soft copy have worked on independently.
(C) COM (D) All of the above (A) Copying (B) Merging
9. The ascending order of a data hierarchy is (C) Pasting (D) Compiling
_______. 19. What kind of memory is static and nonvolatile?
(A) Bit-byte-record-field-file-database (A) RAM (B) ROM
(B) Byte-bit-field-record-file-database (C) BIOS (D) CACHE

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
177

20. _________ Is the Virus that overwrites the files (A) C (B) Java
or a few parts being replaced? (C) C++ (D) Both B and C
(A) Resident (B) File infectors 23. MICR is exclusively used in__________
(C) Boot virus (D) Macro virus (A) Libraries (B) Super markets
21. Which of the following is an advantage of stored (C) Stock markets (D) Banking Industry
programs? 24. Which of the following is an audio input device?
(A) Reliability (A) Microphone (B) Webcam
(B) Reduction in operation costs (C) MIDI keyboard (D) Only A & C
(C) The computers becoming general-purpose 25. Digital Camera is an?
(D) All of the above (A) Input Device (B) Output Device
22. Which of the following is an Object-Oriented (C) Storage Device (D) Controller Device
Programming Language?

Solution
1.(A) 2.(D) 3.(B) 4.(A) 5.(D)
6.(C) 7.(A) 8.(A) 9.(C) 10.(A)
11.(A) 12.(B) 13.(A) 14.(D) 15.(A)
16.(B) 17.(D) 18.(B) 19.(B) 20.(B)
21.(A) 22.(D) 23.(D) 24.(D) 25.(A)

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
178

Mock Test - 09

1. ______ is any part of the computer that you can 10. A collection of unprocessed items is called
physically touch. ______.
(A) Hardware (B) Software (A) Information (B) Reports
(C) Application (D) None of these (C) Memory (D) Data
2. Computer gathers data, which means that it 11. What are the speakers attached to your computer
allows users to ______ data. used for?
(A) present (B) output (A) Displaying images
(C) input (D) None of these (B) Sending messages
3. The brain of any computer system is ______. (C) Storing messages
(A) ALV (B) Memory (D) Handling sound and music
(C) Control unit (D) CPU 12. The main job of CPU is to ______.
4. The output quality of a printer is measured by (A) carry out program instructions
______. (B) store data/information for future use
(A) dots printed per unit time (C) process data and information
(B) dot per sq. inch (D) both (A) and (C)
(C) dot per inch 13. Portrait and landscape are ______.
(D) All of the above (A) page size (B) page view
5. Which is used for manufacturing chips? (C) page orientation (D) page layout
(A) Semiconductors (B) Control units 14. Which among the following is used to create
(C) Bus (D) None of these webpage?
6. ASCII stands for ______. (A) HTML (B) SMTP
(A) American stable code for international (C) Internet (D) Usenet
interchange 15. Which of the following supports 32-bit
(B) American standard code for interchange processor?
information (A) Window 2000 (B) Window 7
(C) American standard code for information (C) Window 8.1 (D) All of the above
interchange 16. What is the number of function keys on a
(D) American stable code for interchange keyboard?
information (A) 10 (B) 12
7. The main webpage of a website is also known as (C) 15 (D) 16
______. 17. Which among the following was the first
(A) Home page (B) First page network with which the idea of internet began?
(C) Introduction page (D) Contents page (A) ARPANET (B) APRANET
8. Different icons of application software can be (C) PARANET (D) USENET
found in which bar in the latest version of 18. Which of the following key is the example of
Microsoft windows? Toggle key?
(A) Control panel (B) Browser (A) Ctrl (B) Shift
(C) Start menu (D) Status (C) Caps lock (D) Alt
9. Coded entries which are used to gain access to a 19. Each box in a spread sheet is called a ______.
computer system are called ______. (A) Block (B) Cell
(A) Entry code (C) Table (D) Field
(B) Security commands 20. Which among the following port is used to
(C) Passwords connect special types of music instruments to
(D) Code words sound cards?

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
179

(A) BUS (B) USB (A) Byte (B) Bit


(C) MIDI (D) CPU (C) Nibble (D) Binary
21. Which of these keys is NOT on the number 24. Which of the following options are available to
keypad? you when shutting down your computer?
(A) Ctrl (B) Del (A) Switch user (B) Log off
(C) Enter (D) Num Lock (C) Stand by (D) All of the above
22. Once information is input into a computer, then 25. A typically connects personal computers within
it becomes ______. a very limited geographical area, usually within
(A) objects (B) data a single building.
(C) ideas (D) facts (A) LAN (B) WAN
23. Which among the following in the largest unit of (C) MAN (D) TAN
storage?

Solution
1.(A) 14.(A)
2.(C) 15.(D)
3.(D) 16.(B)
4.(C) 17.(A)
5.(A) 18.(C)
6.(C) 19.(B)
7.(A) 20.(C)
8.(C) 21.(A)
9.(C) 22.(B)
10.(D) 23.(A)
11.(D) 24.(D)
12.(D) 25.(A)
13.(C)

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
180

Mock Test - 10

1. What is the other name of Junk Email? (A) command (B) program
(A) Draft (B) Spam (C) user response (D) processor
(C) Compose (D) Inbox 13. A ______ can make it easier to play games.
2. Who invented the WWW? (A) mouse (B) keyboard
(A) Charles Babbage (B) Tim Berners Lee (C) digital pen (D) joystick
(C) Guido Van Rossum (D) Sergey Brin 14. Which of the following can input graphical
3. How many layers are present in OSI model? images and pictures for a computer?
(A) Six (B) Seven (A) Plotter (B) Scanner
(C) Eight (D) Nine (C) Printer (D) Mouse
4. In computer terminology, failure in the kernel is 15. For seeing the output, you use ______.
called. (A) monitor (B) mouse
(A) Spam (B) Virus (C) printer (D) scanner
(C) Antivirus (D) Crash 16. ______ is a permanent storage device.
5. Which memory is called Non-volatile memory in (A) Compact disk (B) Printer
computer? (C) RAM (D) Scanner
(A) ROM (B) RAM 17. Which of following refers to the fastest, biggest
(C) Both (A) and (B) (D) None of the above and most expensive computer?
6. Any data and instruction entered in the memory (A) Personal computer (B) Super computer
of a computer is: (C) Laptop (D) Notebook
(A) Storage (B) Output 18. What kind of device is a printer?
(C) Input (D) Information (A) Input (B) Output
7. In computer whatever is typed, submitted, or (C) Word processor (D) Processing
transmitted to a computer system is ______. 19. A scanner scans ______.
(A) input (B) output (A) Text
(C) data (D) circuitry (B) Picture
8. Who is the father of computer science? (C) Both picture and text
(A) Allen Turing (B) Charles Babbage (D) Neither picture nor text
(C) Tim-Berners Lee (D) Henry Edward 20. Universal product code has been adopted for
Roberts whom?
9. To access properties of an object, the mouse (A) Earthquake resistant building
technique to use is ______. (B) Barcode
(A) Shift-Click (B) Right-Click (C) Fire protection in building
(C) Dragging (D) Dropping (D) Prevention of adulteration of food
10. What type of keys are ‘Ctrl’ and ‘Shift’? 21. DPI indicates ______.
(A) Function (B) Modifier (A) units of the digits (B) inches in diagram
(C) Adjustment (D) Alphanumeric (C) dot per inches (D) inches in the dot
11. All the characters that a device can use is called 22. Which printer is commonly used in desktop
______. printing?
(A) skill set (A) Laser pointer (B)Daisywheel printer
(B) keyboard characters (C) Dot matrix printer (D) None of these
(C) character alphabet 23. UNIVAC is ______.
(D) character set (A) Universal Array Computer
12. A series of instruction that tells a computer what (B) Universal Automatic Computer
to do and how to do it is called a ______. (C) Unique Automatic Computer

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
181

(D) Unvalued Automatic Computer (D) None of these


24. A hybrid computer ______. 25. The ALU of a computer responds to the
(A) resembles digital computer command coming from ______.
(B) resembles analogue computer (A) cache memory (B) primary memory
(C) resembles both a digital and analogue (C) external memory (D) control section
computer

Solution
1.(B) 14.(B)
2.(B) 15.(A)
3.(B) 16.(A)
4.(D) 17.(B)
5.(A) 18.(B)
6.(C) 19.(C)
7.(A) 20.(B)
8.(A) 21.(C)
9.(B) 22.(A)
10.(B) 23.(B)
11.(B) 24.(C)
12.(B) 25.(D)
13.(D)

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
182

Mock Test - 11

1. Which of the following is an example of an 10. A readymade format which is used commonly in
optical disk? all pages of website is ______.
(A) Digital versatile disks (B) Magnetic disks (A) Template (B) Theme
(C) Memory disks (D) Data bus disks (C) Data (D) Program
2. Which of the following are the examples of 11. Where is data saved permanently?
output device? (A) Memory (B) Storage
(A) Monitor and Printer (C) CPU (D) Printer
(B) Floppy disk and CD 12. In MICR, C stands for ______.
(C) Keyboard and Mouse (A) Code (B) Colour
(D) Windows 2000 and Windows NT (C) Computer (D) Character
3. Which of the following IC was used in third 13. An encrypted format, in which product
generation of computers? information stored is used on packing of mostly
(A) SSI (B) MSI products?
(C) LSI (D) Both (A) and (B) (A) Bar code (B) QR code
4. Which of the following storage devices can store (C) Binary code (D) All of the above
maximum amount of data? 14. Which is an auto functioning MALWARE?
(A) Magnets optic disk (B) Hard disk (A) Virus (B) Trojan horse
(C) Floppy disk (D) Compact disk (C) Worm (D) All of the Above
5. A modern electronic computer is a machine that 15. Database is a ______.
is meant for ______. (A) collection of rows
(A) Performing repetitive task accurately (B) collection of columns
(B) Electronic data processing (C) collection of table
(C) Doing quick mathematical calculations (D) collection of data
(D) Input, Storage, Manipulation and Outputting 16. Unique data column of a table is known as ____.
data (A) primary key (B) secondary key
6. Which of the following products the best quality (C) public key (D) foreign key
graphics reproduction? 17. Railway track is an example of which kind of
(A) Laser printer (B) Platter printer transmission?
(C) Ink jet printer (D) Dot matrix printer (A) Simplex (B) Half-duplex
7. Software in computer ______. (C) Full-duplex (D) None of these
(A) Enhance the capabilities of the hardware 18. Set of instruction is known as ______.
machine (A) data (B) program
(B) Increase the speed of CPU (C) data base (D) None of these
(C) Both (A) and (B) 19. What is the extension of android executable file?
(D) None of these (A) .apk (B) .asp
8. The arranging of data in a logical sequence is (C) .exe (D) .dll
called ______. 20. “WWW. Facebook.Com” is an example of
(A) Sorting (B) Reproducing ______.
(C) Summarizing (D) Classifying (A) website (B) source code
9. Which of the following is the first-generation (C) domain (D) URL
computer? 21. Which of the following device has a limitation
(A) CDC – 1004 (B) ICL – 2900 that we can only read it but cannot erase or
(C) IBM – 1401 (D) UNIVAC modify it?

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
183

(A) Tape drive (B) Hard disk (C) Application software (D) All of the above
(C) Compact disk (D) Floppy disk 24. Which one is an example of ISP?
22. Ctrl, Shift and Alt are called ______ keys. (A) Yahoo (B) Twitter
(A) Modifier (B) Function (C) Whatsapp (D) Airtel
(C) Alphanumeric (D) Adjustment 25. Share it, Paytm, Whatsapp etc. applications are
23. A kind of software which is used to direct help to based on which kind of data sharing system?
user ______. (A) QR Code (B) Bar Code
(A) Firmware (B) System software (C) MICR (D) Response Code

Solution
1.(A) 14.(D)
2.(A) 15.(C)
3.(D) 16.(A)
4.(B) 17.(B)
5.(D) 18.(B)
6.(B) 19.(A)
7.(A) 20.(D)
8.(A) 21.(C)
9.(D) 22.(A)
10.(A) 23.(C)
11.(B) 24.(D)
12.(D) 25.(A)
13.(A)

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
184

Mock Test - 12

1. What is the storage capacity of the DVD? 12. Which of the following is not a logical gate?
(A) 750 MB (B) 4.7 GB (A) AND (B) OR
(C) 520 MB (D) 1.2 GB (C) NAT (D) None of these
2. Which one is an example of Impact Printer? 13. Which of the following is 3rd layer of OSI model?
(A) Ink Jet Printer (B) Laser Printer (A) Physical Layer (B) Application Layer
(C) Dot Matrix Printer (D) Plotter Printer (C) Network Layer (D) Session Layer
3. The basic design of computer was developed by 14. Which of the following is not a type of bus?
______. (A) Software Bus (B) Data Bus
(A) John Von Neumann (B) Charles Babbage (C) Control Bus (D) Address Bus
(C) Blaire Pascal (D) Gordon Moore 15. Analytical Engine was made by ______.
4. Which of the following are valid minimum and (A) Charles Babbage
maximum zoom, sizes in MS-Office? (B) John Von Neumann
(A) 10% - 100% (B) 10% - 1000% (C) John McCarthy
(C) 20% - 250% (D) 10% – 500% (D) Alan Border
5. What program is used in MS-Word to check the 16. What type of program controls the various
spelling? computer parts and allows the user to internet
(A) Spell check (B) Spell pro with the computer?
(C) Outlook express (D) All of the above (A) Utility software
6. To run a CD in a computer, we need ______. (B) Operating system
(A) FD drive (B) CD drive (C) Word processing software
(C) Zip drive (D) Pen drive (D) Database software
7. Which is considered a direct entry input device? 17. A printer is which kind of device?
(A) Optical Scanner (A) Input (B) Word Processing
(B) Mouse and digitizer (C) Processing (D) Output
(C) Light Pen 18. In Excel, each sheet in a workbook is displayer
(D) All of the above as ______.
8. Ctrl + Page up will take you to ______. (A) Marker
(A) last cell in the column (B) Down printing arrow
(B) first cell in the column (C) Tab
(C) previous sheet (D) None of these
(D) None of these 19. Which of the following is a connecting device for
9. 192.161.121.100 is an example of which class? Network?
(A) Class A (B) Class B (A) Switch (B) Hub
(C) Class C (D) Class D (C) Router (D) All of the Above
10. Which command is used to close datasheet view 20. In a computer ______ is capable to store single
of the table? binary bit.
(A) Alt + F4 (B) Ctrl + O (A) Flip-Flop (B) Register
(C) Ctrl + W (D) Ctrl + Z (C) Capacitor (D) Conductor
11. Which of the following are the cheapest memory 21. A process known as ______ is used by large
devices in term of cost/bit? retailers to study trends.
(A) Magnetic Disk (A) POS (B) Data mining
(B) Magnetic Tape (C) Data conversion (D) Data selection
(C) Semi-Conductor Memories 22. Computer process data into information by
(D) Compact Disk working exclusively with ______.

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
185

(A) Number (B) Character (A) .jpg (B) .gif


(C) Multimedia (D) Words (C) .wav (D) All of the above
23. What is the maximum number of lines you can 25. Which of the following term is used for
set for a drop cap? unsolicited email?
(A) 10 (B) 15 (A) Trash (B) Spam
(C) 20 (D) Undefine (C) Phishing (D) Backbone
24. Which file format can be added to a PowerPoint
show?
Solution
1.(B) 14.(A)
2.(C) 15.(A)
3.(A) 16.(B)
4.(D) 17.(D)
5.(A) 18.(C)
6.(B) 19.(D)
7.(D) 20.(A)
8.(C) 21.(B)
9.(C) 22.(A)
10.(C) 23.(A)
11.(D) 24.(D)
12.(C) 25.(B)
13.(C)

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
186

Mock Test - 13

1. A graphic presentation of the sequence of steps (B) Device Drivers


needed to solve a programming problem is called (C) Operation system and Graphical user
a ______. interface
(A) Program flowchart (B) Step chart (D) All of the above
(C) Rule diagram (D) Program graph 11. Information on a computer is stored as ______.
2. Hard copy of a document is ______. (A) Analog data (B) Digital data
(A) Printed on paper (B) Stored in floppy (C) Modem data (D) Watts data
(C) Stored in CD (D) Stored in hard disk 12. Which of the following is an output device?
3. In MS-Word, for what does ruler help? (A) Printer (B) Monitor
(A) To set indents (C) Mouse (D) Both (A) and (B)
(B) To set tabs 13. What is the full form of IP?
(C) To change page margin (A) Internet Programming
(D) All of the above (B) Internet Protection
4. What would I choose to create a pre-formatted (C) Internet Protocol
style? (D) None of these
(A) Slider shorter view (B) Slide layout 14. We can detect spelling and grammar error by
(C) Format (D) None of these ______.
5. Right clicking something in Excel ______. (A) Shift + F7 (B) F7
(A) delete the objects (C) Alt + F7 (D) None of these
(B) nothing the right mouse button is there for 15 One Byte is equal to ______.
left handed people (A) 4 Bits (B) 1 Bit
(C) open a shortcut menu listing everything you (C) 1024 Bits (D) 8 Bits
can do to the object 16. MS PowerPoint was officially launched on
(D) select the object ______.
6. PDF stands for ______. (A) May 22, 1990 (B) May 25, 1990
(A) Portable Document File (C) May 27, 1990 (D) None of these
(B) Portable Document Format 17. The step-by-step procedure for executing the task
(C) Paired Drive Format is known as ______.
(D) None of these (A) full cycle (B) flow chart
7. Open, print and save display on ______. (C) algorithm (D) execution cycle
(A) menu bar (B) standard tool bar 18. Name the device which is used for directing and
(C) title bar (D) None of these dispatching data packets between various
8. What is the name of part of the computer which network?
coordinates all the function? (A) Hub (B) Router
(A) ROM program (B) Control unit (C) Switch (D) Repeater
(C) Mother board (D) None of these 19. ‘Replace’ option is available in ______.
9. Java language was released in ______ as core (A) Edit menu (B) Tool menu
component of sun micro-systems Java platform. (C) File menu (D) Insert menu
(A) 1982 (B) 1985 20. Which among the following is the chat program
(C) 1992 (D) 1995 that lets users communicates in real time?
10. In platform software, platform includes the (A) Whatsapp
______. (B) Google chat
(A) Firmware

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
187

(C) Instant messaging (A) Switch off mode (B) Hibernate mode
(D) All of the above (C) Access mode (D) Destroy mode
21. Which of the following is the largest unit of 24. Which of the following appropriately relates with
storage? starting up an operating system?
(A) GB (B) KB (A) Starting (B) Booting
(C) TB (D) MB (C) Formatting (D) None of these
22. Which part of a computer displays the work 25. Networking such as LAN, MAN started from
done? which generation of computer?
(A) RAM (B) Printer (A) First Generation
(C) Monitor (D) ROM (B) Second Generation
23. If you want your computer to start at the stage in (C) Third Generation
which it was turned off, you have to put it in (D) Fourth Generation
______.

Solution
1.(A) 14.(B)
2.(A) 15.(D)
3.(D) 16.(A)
4.(B) 17.(C)
5.(C) 18.(B)
6.(B) 19.(A)
7.(B) 20.(D)
8.(B) 21.(C)
9.(D) 22.(C)
10.(D) 23.(B)
11.(B) 24.(B)
12.(D) 25.(D)
13.(C)

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
188

Mock Test - 14

1. Which among the following device performs 11. The designers of the Internet Protocol defined on
modulation and demodulation? IP address as a ______ number.
(A) Fiber optics (B) Satellite (A) 31 bit (B) 32 bit
(C) Switch (D) Modem (C) 34 bit (D) 62 bit
2. A barcode is a/an ______ code that represents 12. When the information is reverted back into a
data with bars of varying widths or heights. useful form it is called ______.
(A) magnetic (B) laser (A) Standard encryption
(C) optical (D) printed (B) Plain text encryption
3. Which among the following carries signals that (C) Both (A) and (B)
control the actions of the computer? (D) Decryption
(A) Control Bus (B) Address Bus 13. The term ‘Artificial Intelligence’ was first coined
(C) Data Bus (D) NIC in ____.
4. A file which has not been altered, compressed or (A) 1955 (B) 1972
manipulated in any way by the computer is called (C) 1956 (D) 1982
______. 14. Which among the following is used to access the
(A) temp file (B) permanent file network?
(C) raw file (D) directory file (A) Session layer (B) Application layer
5. What is the another name for Android 10.0 (C) Presentation layer (D) Transport layer
developed by Google? 15. In OSI Model, OSI stands for ______.
(A) Pie (B) Android (A) Occur System Interconnection
(C) Nought (D) Jelly bean (B) Operational System Interconnection
6. Computers use the system to process data (C) Open Systems Interconnection
______. (D) None of these
(A) Processing (B) Kilobyte 16. The physical components of a computer system
(C) Binary (D) Representational is ______.
7. Which of following groups are only output (A) software (B) hardware
devices? (C) ALU (D) control unit
(A) Scanner, Printer, Monitor 17. Which of the following is an example of storage
(B) Keyboard, Printer, Monitor devices?
(C) Mouse, Printer, Monitor (A) Magnetic disks (B) Tapes
(D) Plotter, Printer, Monitor (C) DVDs (D) All of these
8. The second-generation computer was based on 18. BIOS stands for ______.
_____. (A) Basic Input Output Software
(A) Vaccum chips (B) Silicon chips (B) Basic Input Output System
(C) Transistor (D) Bio chips (C) Basic Input Output Standard
9. Which of the following is not an internet (D) Basic Input Output Systematic
browser? 19. Who among the following is the father of ‘C’
(A) Netscape Navigator (B) Drupal language?
(C) Chrome (D) Opera (A) Ericsson (B) Dennis Ritchie
10. TCP stands for ______. (C) A.S. Douglas (D) James Gosling
(A) Tools Control Protocol 20. A computer does not suffer from tiredness and
(B) Interior Control Protocol lack of concentration. It is known as ______.
(C) Transmission Control Protocol (A) GIGO (B) Versatility
(D) Transfer Control Protocol (C) Diligence (D) Reliability

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
189

21. Which language is used for Artificial Intelligence (D) Program Counter
(AI)? 24. Computers programs are written in a high-level
(A) FORTRAN (B) COBOL programming language, however, the human
(C) C (D) PROLOG readable version of a program is called ______.
22. Fourth Generation computers were based on (A) Cache (B) Word size +
______. (C) Source code (D) Instruction set
(A) Microprocessors (B) Transistor 25. Which of the following is not a function of the
(C) Vacuum Tube (D) IC control unit?
23. Which registers can interact with secondary (A) Direct operations
memory? (B) Execute instruction
(A) Instruction Register (IR) (C) Read instructions
(B) Memory Address Register (MAR) (D) Interpret instructions
(C) General Purpose Registers

Solution
1.(D) 14.(B)
2.(C) 15.(C)
3.(A) 16.(B)
4.(C) 17.(D)
5.(B) 18.(B)
6.(C) 19.(B)
7.(D) 20.(C)
8.(C) 21.(D)
9.(B) 22.(A)
10.(C) 23.(B)
11.(B) 24.(C)
12.(D) 25.(A)
13.(A)

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER AWARENESS
190

Mock Test - 15

1. MS-Word is an example of ______. (C) Semi – duplex communication


(A) Operating system (D) Full – duplex communication
(B) Application software 10. Which of the following is a popular
(C) Processing device programming language for developing
(D) Input device multimedia web pages, websites and web-based
2. A permanent memory is ______, which holds applications?
data and instruction for start-up the computer and (A) COBOL (B) Java
does not erase data after the power is off. (C) BASIC (D) Assembler
(A) Network interface card 11. A computer cannot “boot” if it does not have the
(B) CPU ______.
(C) RAM (A) compiler (B) loader
(D) ROM (C) operating system (D) assembler
3. The server on the internet is also known as 12. CDs are of which shape?
______. (A) Square (B) Rectangular
(A) Gateway (B) Repeater (C) Round (D) Triangle
(C) Host (D) None of these 13. Transmission of data in one direction is called
4. LANS can be connected by which of the ______.
following devices which operate on the data link (A) simplex (B) duplex
layer? (C) triplex (D) None of these
(A) Hub (B) Tunnel 14. The software that is used to create text-based
(C) HDLC (D) Bridges documents are referred to as ______.
5. Different icons of application software can be (A) DBMS (B) Suites
found in which bar in the latest version of (C) Spreadsheets (D) Word processors
Microsoft Windows? 15. What is the full form of DOS?
(A) Start Menu (B) Browser (A) Digital Output System
(C) Status (D) Control Panel (B) Disk Operating Software
6. Which of the following programs is used to (C) Disk Operating System
restrict access to selected websites? (D) None of these
(A) Channels (B) Filters 16. Which device connects LAN to internet?
(C) Browsers (D) Telent (A) HTML (B) Bridge
7. A ______ typically connects personal computers (C) Router (D) None of these
within a very limited geographical area, usually 17. Daisy Wheel and Band are type of ______.
within a single building? (A) mouse (B) printer
(A) WAN (B) TAN (C) keyboard (D) None of these
(C) LAN (D) VPN 18. Date and time are available on the desktop at
8. Which of the following software posts unwanted ______.
advertisements on client’s computer? (A) Title Bar (B) Format Bar
(A) Virus (B) Worm (C) Task Bar (D) None of these
(C) Adware (D) Malware 19. Which key is used to rename the file?
9. Walkie – Talkie is an example of which of the (A) F3 (B) F4
following? (C) F2 (D) F1
(A) Simplex communication 20. USB stands for ______.
(B) Half – duplex communication

SIBANAND sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


PATTNAIK
COMPUTER AWARENESS
191

(A) Universal Serial Band (D) Conducts a power-on self test, or POST
(B) Unique Serial Bus 23. A mistake is an algorithm that causes incorrect
(C) Universal Serial Bus results is called a ______.
(D) None of these (A) logical error (B) procedural error
21. Hardware devices that are NOT a part ‘Of the (C) syntax error (D) compiler error
main computer system and are ‘Often added later 24. Computer programs are written in a high-level
to the system are ______. programming language, however the human
(A) clip art (B) highlight readable version of a program is called ______.
(C) execute (D) peripherals (A) cache (B) instruction code
22. A UPS ______. (C) source code (D) word size
(A) Limits damage caused by fluctuating levels 25. Which key is used to open the start menu?
of electricity (A) F5 (B) Esc
(B) Provides battery backup for a limited time (C) Ctrl + Esc (D) Ctrl + Shift + Z
(C) Delivers electronic messages via a bus

Solution
1.(B) 14.(D)
2.(D) 15.(C)
3.(C) 16.(C)
4.(D) 17.(B)
5.(A) 18.(C)
6.(B) 19.(C)
7.(C) 20.(C)
8.(C) 21.(D)
9.(B) 22.(B)
10.(B) 23.(C)
11.(C) 24.(C)
12.(C) 25.(C)
13.(A)

sibanand99.pattnaik@gmail.com Sibanand Pattnaik Sibanand Pattnaik O cial


SIBANAND
PATTNAIK
COMPUTER
AWARENESS
Download and feel the difference

For All Government Job Exams, Especially


designed for Odisha Govt. Job Exams

sibanand99.pattnaik@gmail.com

Sibanand Pattnaik Sibanand Pattnaik O cial M.R.P ₹ 699/-

You might also like