Transcript
[Pick the date]
[ESSC COMPUTER AWARENESS]
COMPUTER AWARENESS Practise set 1
1. Manipulating data to create information is known as 1) Feedback 2) Programming 3) Processing 4) Analysis 2. The type of software that control the internal operations in the computer, and control how the computer works with all its parts, is which of the following? 1) Shareware 2) o/s software 3) Application software 4) Public domain software 3. What happens when you boot up a PC? 1) Portions of the o/s are copied form disk into memory 2) Portions of the o/s are copied from memory into disk 3) Portions of the o/s are compiled 4) Portions of the o/s are emulated 4. A complier translates higher-level programs into a machine language program, which is called_____ 1) Source code 2) Object code 3) Complied code 4) Beta code 5. What contains the computer BIOS and maintains its data with the use of a battery for periods when the system is powered down? 1) CMOS 2) RAM 3) DRAM 4) CPU 6. Something which has easily-understood instructions is said to be_____ 1) User friendly 2) Information 3) Word processing 4) Icon 7. What is output? 1) What the processor takes from the user 1|Page
[Pick the date]
[ESSC COMPUTER AWARENESS]
2) What the user gives to the processor 3) What the processor get from the user 4) What the processor gives to the user 8. A repair for a known software bug, usually available at no charge on the Internet, is called an __________ 1) Version 2) Path 3) Tutorial 4) FAQ 9. Reference to each file on a disk are stored in a ________ 1) File Allocation Table 2) Root Allocation Table 3) Linking directory 4) Root directory 10. Only __________ program(s) become(s) active even though we can open many programs at a time. 1) Four 2) Three 3) Two 4) One 11. When the margin on both sides is straight and equal, then there is _________ in document. 1) Full justification 2) Full alignment 3) Left justification 4) Right justification 12. The primary goal of a computer system is to turn data into _________ 1) Ideas 2) Suggestions 3) Information 4) Reports 13. What is the main folder on a storage device called 1) Platform 2) Interface 3) Root directory 4) Device drives 14. If you receiver an e-mail form someone you don’t know, what should you do? 1) Forward it to the police immediately 2) Delete it without opening it 3) Open it and respond to them saying you don’t know them 4) Reply and ask them for their personal information 2|Page
[Pick the date]
[ESSC COMPUTER AWARENESS]
15. Computer __________ is whatever is typed, submitted transmitted to a computer system. 1) Input 2) Output 3) Data 4) Circuitry 16. Which of the following switching methods provides the greatest frame throughput? 1) Sore and forward switching 2) Frame tag switching 3) Cut through switching 4) ISL switching 17. Which kind of lock includes a keypad that can be used to control access into areas? 1) Cipher 2) Warded 3) Device 4) Tumbler 18. Special effect used to introduce slides in a presentation are called 1) Effects 2) Custom animation 3) Transition 4) Animation 19. Computers send and receive data in the forms of _________ signals. 1) Ana log 2) Digital 3) Modulated 4) Demodulated 20. Most World Wide Web pages contain commands in the language 1) NIG 2) URL 3) HTML 4) IRC 21. ___________ are graphical objects used to represent commonly used application. 1) GUI 2) Drivers 3) Windows 4) Application 22. The ability to find an individual item in a file immediately _______ 1) Sequential access 2) File allocation table 3) Direct access 4) Directory 23. Computers connected to a LAN can __________ 1) Run faster 3|Page
[Pick the date]
24.
25. 1) 2) 3) 4) 26.
27.
28.
29.
30.
31.
[ESSC COMPUTER AWARENESS]
2) Go on line 3) Share information and/or share peripheral equipment 4) E-mail A CD-RW Disk __________ 1) Has a faster access than an internal disk 2) Is a form of optical disk, so it can only be written once 3) Holds less data than a floppy disk 4) Can be erased and rewritten Whenever we have to give space between the two words while typing on a PC’s we have to press a key known as _________ Backspace Shift Control Space bar A device that provides emergency power to your computer, conditions the voltage, and protects against power surges is called a ____________ 1) PSU = Power Supply Unit 2) USP – Universal Surge Protector 3) UPPS = Universal Power Protection and Supply 4) UPS = Uninterruptible Power Supply Documentation of computer programs is important so that 1) Users can learn how to use the program 2) Other programmers can know how to maintain the program 3) The programmer can see why the code is written that way while hunting for source of error 4) All of the above Two different files can have the same name if 1) They are in different folders 2) They are in different drives 3) Never 4) The names are capitalised differently Secondary storage 1) Does not require constant power 2) Does not use magnetic media 3) Consists of four main types of devices 4) Does not store information for later retrieval The first computers were programmed using 1) Assembly language 2) Machine language 3) Spaghetti code 4) Source code Which of the following function is not performed by servers? 1) Email processing 2) Database sharing 3) Process Websites 4|Page
[Pick the date]
32.
33.
34.
35.
36.
37.
38.
39.
40.
[ESSC COMPUTER AWARENESS]
4) Word processing Which media has the bailey to have data/information stored (written) on them by users more than once? 1) CD-R disks 2) CD-RW disks 3) Zip disks 4) Optical Disks The process of transferring files form a computer on the Internet to you computer is called 1) Downloading 2) Uploading 3) FTP 4) JPEG The ___________ controls a client’s computer resources 1) Application program 2) Instruction set 3) Operating system 4) Server application To reload a Web page, press the __________ button. 1) Redo 2) Reload 3) Restore 4) Control Edition a document consists of reading through the document you’ve created, then ___________ 1) Correcting your errors 2) Printing it 3) Saving it 4) Deleting it Which of the following is NOT a famous operating system? 1) Windows vista 2) Mac OS X 3) Linux 4) Virtual box The Internet allows you to _________ 1) Send electronic mail 2) View Web pages 3) Connect to servers all around the world 4) All of the above What kind of software would you most likely use to keep track of a billing account? 1) World processing 2) Electronic publishing 3) Spreadsheet 4) Web authoring Text and graphics that have been out of copied are stored in an area called the ____ 1) Pasteboard 5|Page
[Pick the date]
41.
42.
43.
44.
[ESSC COMPUTER AWARENESS]
2) Cupboard 3) Clipboard 4) Cutting board Which of the following is an example of storage devices? 1) magnetic disk 2) tales 3) DVDs 4) All of the these The ________ file format is a method of encoding pictures on a computer. 1) HTML 2) JPEG 3) FTP 4) URL What is the process of copying software programs form secondary storage media to the hard disk called? 1) configuration 2) download 3) storage 4) installation The code for a Web page is written using ________ 1) A fifth generation language 2) WinZip 3) Perl 4) Hypertext Mark-up Language
45. Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as ________ 1) Flash 2) Spiders 3) cookies 4) Applets 46. Example of non-numeric data is 1) Employee address 2) Examination score 3) Bank balance 4) All the above 47. Date and Time are available on the desktop at 1) Keyboard 2) Recycle bin 3) My computer 4) Task bar 48. Periodically adding, changing and deleting file records is called file 1) Updating 2) Upgrading 3) Restructuring 6|Page
[Pick the date]
[ESSC COMPUTER AWARENESS]
4) Renewing 49. Capital letters on a keyboard are referred to as __________ 1) Caps lock key 2) Grumps 3) Big guys 4) Upper case letters 50. Devies that make up a computer system that you can see or touch _______ 1) Menu 2) Print 3) Software 4) Hardware
Answer key
1. (3)
2.(2)
3.(1)
4.(2)
5.(1)
6.(1)
7.(4)
8.(2)
9.(1) 10.(4) 11.(2)
12.(3) 13.(3) 14.(2) 15.(1) 16.(3) 17.(1) 18.(3) 19.(2) 20. (3) 21. (1) 22.(2) 23.(3) 24.(4) 25.(4) 26.(4) 27.(4) 28.(1) 29.(1) 30.(2) 31.(4) 32.(2) 33.(2) 34.(3) 35.(2) 36.(3) 37.(4) 38.(4) 39.(3) 40.(3) 41.(4) 42.(2) 43.(4) 44.(4) 45.(4) 46.(1) 47.(4) 48.(1) 49.(1) 50.(4)
7|Page
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 2
1. The vast network of computers that connects millions of people all over the world is called ________ 1) LAN 2) Web 3) Hypertext 4) Internet 2. The property that, when classes are arranged in a hierarchy each class assumes the attributes and methods of its ancestors is ________ 1) Generalization 2) Inheritance 3) Encapsulation 4) Information hidings 3. The software component of an experts system that draws conclusion is the _____ 1) User interface 2) Database 3) Inference engine 4) I/O Controller 4. The attributes and methods for each object are stored in ________ 1) An object instance 2) An object connection 3) An assembly structure 4) An object repository 5. One advantage of dial up Internet access is ____________ 1) It utilizes broadband technology 2) It utilizes existing telephone service 3) It uses a router for security 4) Modem speeds are very fast 6. What is backup? 1) Adding more component to your network 2) Protecting data by copying it from the original store to a different destination 3) Filtering old data from the new data 4) Accessing data on tape 7. Which of the following is true? 1) Byte is a single digit a binary number 2) Bit represents a grouping of digital numbers 3) Eight digit binary number is called a byte 4) Eight digit binary number is called a bit 8. A hard copy of a file created on a computer refers to data 1) Saved on a floppy disk 8|Page
[Pick the date]
9.
10.
11.
12.
13.
14.
15.
16.
[ESSC COMPUTER AWARENESS]
2) Printed on a printer 3) Backed up on a tape drive 4) Sent as an e-mail A ________ is an organised collection of data about a single entity. 1) File 2) Library 3) Database 4) Dictionary Something which ahs easily understood instruction is said to be 1) User friendly 2) Information 3) Word processing 4) Icon Hardware devices that are not part of the main computer system and are often added later to the system are _________ 1) Clip art 2) Highlight 3) Execute 4) Peripherals All of the following are examples of real security and privacy risks EXCEPT 1) Hackers 2) Spam 3) Viruses 4) Identity theft If you want to move an icon on your desktop, this is called ________ 1) Double clicking 2) Highlighting 3) Dragging 4) Pointing A computer checks the ________ of user names and passwords for a match before granting access. 1) Website 2) Network 3) Backup file 4) Database Computers that the portable and convention for users who travel are known as ________ 1) Supercomputers 2) Laptops 3) Minicomputers 4) Files servers A MODEM is connected in between a telephone line and a ________ 1) Network 2) Computer 3) Communication adapter 4) Serial port 9|Page
[Pick the date]
[ESSC COMPUTER AWARENESS]
17. Window is __________ and window 95, window 98 are __________ 1) Graphical user interface, operating system 2) Graphics useful interface, Executing system 3) Graph user interval, Expert systems 4) Graphical Use interface, Excel systems 18. The most widely used input device is the _________ 1) Mouse 2) Keyboard 3) Modem 4) Monitor 19. the blinking symbol which indicates the next character will appear at which place, is called ____ 1) Delete key 2) Control key 3) Cursor 4) Return key 20. A small figure which depicts some application on the screen is called 1) Menu 2) Photo 3) Modem 4) Icon 21. A(n) _________ is a small group of computers and peripherals linked together in a small geographical area. 1) MAN 2) PAN 3) CAN 4) LAN 22. .bas,.doc.and.htm are examples of 1) Database 2) Extension 3) Domain 4) Protocol 23. Saving is the process 1) To copy document form memory to storage medium 2) To change the content of any document 3) To change the display or entire document 4) To develop document by entering text using keyboard 24. _______ is the process of implementing command 1) Fetching 2) Storing 3) Decoding 4) Executing 25. __________ printed information, exists in real sense and is more permanent from of output than the output existing of display device. 10 | P a g e
[Pick the date]
26.
27.
28.
29.
30.
31.
32.
33.
[ESSC COMPUTER AWARENESS]
1) Soft copy 2) Carbon copy 3) Hard copy 4) Desk copy To move to the beginning of a line of text, press the _________ key 1) Home 2) Page up 3) Enter 4) Alt When sending an e-mail, the ______ line describes the contents of message. 1) To 2) Subject 3) Contents 4) Cc Which grouping do you work with when formatting text in world? 1) Tables, paragraphs and indexes 2) Paragraph, indexes and sections 3) Characters, sections and paragraphs 4) Indexes, characters and tables A __________ is a computer attached to the Internet that runs a special web server software and can send web pages out to other computers over the Internet. 1) Web client 2) Web system 3) Web page 4) Web server C,BASCI,C OBOL, and Java are examples of __________ languages 1) Low-level 2) Computer 3) System programming 4) High-level Deleted data remains on a disk until 1) The data is overwritten 2) The recycle bin is emptied 3) A file compression utility is used 4) The disk is scanned The ________ enables your computer to connect on other computers. 1) Video card 2) Sound card 3) Network interface card 4) Controller card What menu is selected to save or save us? 1) Tools 2) File 3) Format 4) Edit 11 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
34. To make the umber pad act a directional arrows, you 1) Num lock 2) Caps lock 3) Arrows lock 4) Shift 35. A button that makes characters either upper or lower case or numbers to symbols. 1) Monitor 2) Shift key 3) icon 4) mouse 36. To access a mainframe or super computer, users often use a __________ 1) terminal 2) node 3) desktop 4) handheld 37. office LANs that are spread geographically apart on a lagged scale can be connected using a corporate __________ 1) CAM 2) LAN 3) WNA 4) MAN 38. CPU ________________ 1) Contains the electronic circuits that cause processing to occur 2) Make the information resulting form processing available for use 3) Allows data, programs, commands, and user responses to be entered into a computer. 4) consist of electronic components that store data 39. Which process checks to ensure the components of the computer are operating and connected properly? 1) Booting 2) Processing 3) Saving 4) Editing 40. How can the user determine what programmes are available on a computer? 1) Checking the hard disk properties 2) Viewing the installed programs during the booting process 3) Checking the operating system for a list for installed programmes 4) Checking for existing files saved on the disk 41. If you type a work that is not in Word’s dictionary, a wavy _______ underline appears below the word. 1) Red 2) Green 3) Blue 4) Black 42. Which of the following is considered a vulnerability of SNMP? 1) Clear text community strings 12 | P a g e
[Pick the date]
43.
44.
45.
46.
47.
48.
49.
50.
[ESSC COMPUTER AWARENESS]
2) Its use of TCP 3) The fact that is this on by default in widows 2000 server 4) The fact that it is on by default in window XP professionally Network routing information distributed among routers is stored in which of the following? 1) Flash memory 2) Route table 3) Metric table 4) Router memory If the destination did not receive a segment, how will the TCP hasty know to resend the information? 1) The ACK received will not include the segment number that was not received 2) The ACK received will include the segment numbers that was not received 3) The sending host will send a PACK to verify segments receipts 4) The distinction host will send a YACK message to the sending host. Small application programs that run on a Web page and my ensure a form is completed properly for provides animation are known as __________ 1) Flash 2) Spiders 3) Cookies 4) Applets Several computers linked to a server to share progress and strogae space are in 1) Network 2) Grouping 3) Library 4) Integrated system Soft copy refers to __________ 1) Printed output 2) Music sounds 3) Screen output 4) Digitizing The software that allows users to surf the Internet is called is 1) Search engine 2) Internet Service Provider 3) Multimedia application 4) Browser A tuple is a 1) Column of a table 2) Two dimensional table 3) Row of a table 4) Key of a table The method of file organization in which data records in a file are arranged in a specified order according to key field is known as the 1) Direct access method 2) Queuing method 3) Predetermined method 13 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
4) Sequential access method
Answer key
1. (4)
2. (2)
3.(3)
4.(4)
5.(2)
6.(2)
7.(3)
8.(2)
9.(1) 10.(1)
11. (4) 12.(2) 13.(3) 14.(4) 15.(2) 16.(2) 17.(1) 18.(2 ) 19.(3) 20.(4) 21. (4) 22.(2) 23.(1) 24.(1) 25.(3) 26.(1) 27.(2) 28.(*) 29.(4) 30.(4) 31. (2) 32.(3 ) 33.(2 ) 34.(1 ) 35.(2 ) 36.(1 ) 37.(4 ) 38.(1 ) 39.(1 ) 40.(3) 41. (2) 42.(1) 43.(4) 44.(2) 45.(1) 46.(1) 47.(*) 48.(4) 49.(3) 50.(4)
14 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practise set 3 1.
2.
3.
4.
5.
6.
7.
8.
9.
_______ means to enlarge a window to its maximum area so that it will fill entire desktop. 1) Maximize 2) Zoom 3) Enlarge 4) Extend This is the process of getting access to the computer. 1) Sign in 2) Log in 3) Log off 4) enter The full step wise process of closing a computer is called 1) Shutting 2) Closing 3) Log off 4) Shut down A connection form one HTML document to another HTML document is called. 1) Hyper link 2) Connecting link 3) Icon 4) All of these Capability of computer to perform more than one tasks at the same times is 1) Batch processing 2) Real time processing 3) Multitasking 4) Scheduled processing It is the smallest dot that can be uniquely drawn on a computer screen. This is _____ 1) Boxel 2) Computer dot 3) Cursor 4) Pixel A picture map or graphics or image that can be used in a document is known as. 1) Clip 2) Object 3) Clip board 4) Drag drop Display bar that list all the open folders and active application is _________ 1) Menu bar 2) Toolbar 3) Taskbar 4) Window list A large space common in most of the windows which is for users’ work with that application is _________ 1) Application view 15 | P a g e
[Pick the date]
10.
11.
12.
13.
14.
15.
16.
17.
[ESSC COMPUTER AWARENESS]
2) Work area 3) Project view 4) Toolbar A photograph, image or any other visual file which is displayed a the back ground of the windows main icon screen is called as ______ 1) Wall paper 2) Screen saver 3) Window theme 4) Active desktop All window settings are stored in this file 1) Window.INI 2) Goups.INI 3) Win.IMI 4) Tem.INI CPU can directly understand this language 1) C 2) C++ 3) Assembly 4) Java What is the expanded for of CPU? 1) Central Power Unit 2) Cooer Processing Unit 3) Central Processing Unit 4) Core Point Unit A normal compiler takes source code as input and produces this as output ________ 1) Assembly code 2) Object code 3) Machine code 4) All of the these Languages which can easily interact with the hardware are called. 1) High Level Language 2) Low Level Language 3) Middle Level Language 4) They are not normally used computer lines To detect, locate and remove errors in program and/or malfunctions in equipment is _________ 1) Compile 2) Debug 3) Interpret 4) DSS A program written in high-level language is a 1) Complied Program 2) Source Program 3) Objective Program 4) All of the above 16 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
18. Which of the following is the most powerful type of computer 1) Super computer 2) Micro computer 3) Main frame computer 4) Mini computer 19. Compliers are 1) Both OS and Hardware dependent 2) Only OS dependent 3) Only Hardware dependent 4) Cannot be generalized for all compilers. 20. Which among the following is/are interpreted language 1) C 2) Visual basic 3) Java 4) Both 2 and 3 21. Hardware that are easily attached to computer and can be played instantly are called as 1) Multimedia 2) Plug and play 3) Digital 4) Point to point 22. Format for musical data communication between two devices such s computer and synthesizer, is called 1) HTML 2) MP3 3) MPEG 4) MIDI 23. Which of the following is not a web browser? 1) Opera 2) Netscape 3) Microsoft outlook 4) Internet explorer 24. It is a secrets word which is used to prevent access for system or network. It is called _______ 1) Loin 2) Password 3) Account No. 4) Net ID 25. All the deleted items are stored in this place until they are permanently deleted. This place is 1) mailbox 2) temporary folders 3) virtual hard drive 4) recycle bin 26. all the following are examples in input devices except a 1) scanner 2) mouse 17 | P a g e
[Pick the date]
27.
28.
29.
30.
31.
32.
33.
34.
35.
[ESSC COMPUTER AWARENESS]
3) keyboard 4) printer all of the following are example of output devices EXCEPT a 1) scanner 2) speaker 3) CD 4) Printer The CPU and memory are located on the 1) Expansion board 2) Motherboard 3) Storage device Output device ________ is a set of computer program used in a computer to help perform tasks. 1) An instruction 2) Software 3) Memory 4) A processor A __________ is approximately a million bytes. 1) Gigabyte 2) Kilobyte 3) Megabyte 4) Terabyte In the URL. http ://www.prenhall.com, the portion labelled http is the 1) Host 2) Domain name 3) Protocol 4) Top-level domain In a database, a field is a 1) Label 2) Table of information 3) Group of related records 4) Category of information The number of pixels displayed on a screen is known as the screen 1) Resolution 2) Colour depth 3) Refresh rate 4) Viewing size A repair for a known software bug, usually available at no charge on the internet, is called a(n)— 1) Version 2) Patch 3) Tutorial 4) FAQ The time it takes a device to locate data and instructions and make them available to CPU is known as ___ 18 | P a g e
[Pick the date]
36.
37.
38.
39.
40.
41.
42.
43.
[ESSC COMPUTER AWARENESS]
1) Clock speed 2) A processing cycle 3) CPU speed access time 4) Access time Which of the following is the correct order of the four major function of a computer? 1) Process, output, input, storage 2) Input, output, proves, storage 3) Process, storage, input, output 4) Input, process, output, storage A byte can hold one _________ of data. 1) Bit 2) Binary digit 3) Character 4) Kilobyte The O/S is the most common type of ________ software. 1) Communication 2) Application 3) System 4) Word-processing software _______ are specially designed computers that perform complex calculation extremely rapidly. 1) Servers 2) Supercomputers 3) Laptops 4) Mainframes The two broad categories of software are: 1) Word processing and spreadsheet 2) Transaction and application 3) Windows and Mac OS. 4) System an application ______ is the result produced by a computer. 1) Data 2) Memory 3) Output 4) Input The human-readable version of a program is called _________ 1) Source code 2) Program code 3) Human code 4) System code A _______ is approximately a thousand bytes. 1) Gigabyte 2) Kilobyte 3) Megabyte 4) Terabyte 19 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
44. The dies kop contains small graphic called 1) Windows 2) Logos 3) Icons 4) Pictures 45. Which key is used in combination with another key to perform a specific task? 1) Function 2) Control 3) Arrow 4) Space bar 46. With is NOT a good web security strategy? 1) Restrict access to the web server; keep a minimum number of ports open 2) Limit the users who can load software, edit or add files. 3) Add demon programs, so users can test system without accessing perdition data. 4) Remove unnecessary compliers and interpreters. 47. _______ Tags when placed on an animal, can be used to record and track in a database all of the animals movements. 1) POS 2) RFID 3) PPS 4) GPS 48. Smaller and less expensive PC-based servers are replacing _______ in many businesses. 1) Supercomputers 2) Clients 3) Laptops 4) Mainframes 49. The binary system language consists of _______ digit(s). 1) 8 2) 2 3) 1,000 4) 1 50. All of the following are basic principles of networks, except 1) Each computer must have a network card 2) There must be communication media connecting the network and hardware devices 3) There must be at least one connecting device 4) Each computer must have software that supports the movement of information.
Answer key 1.(1) 11.(3) 21.(2) 31.(3) 41.(3)
2.(2) 12.(3 ) 22.(4 ) 32.(3 ) 42.(4)
3.(4) 13.(3) 23.(3) 33.(1) 43.(2)
4.(1) 14.(3) 24.(2) 34.(2) 44.(3)
5.(3) 15.(2) 25.(4) 35.(4) 45.(2)
6.(4) 16.(2) 26.(4) 36.(4) 46.(4)
7.(2) 17.(2) 27.(1) 37.(3) 47.(2)
8.(3) 18.(1) 28.(2) 38.(3) 48.(4)
9.(2) 19.(1) 29.(2) 39.(2) 49.(2)
10.(1) 20. (4) 30.(3) 40.(4) 50.(2)
20 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 4
1. An error is also known as ________. 1) Bug 2) Debug 3) Cursor 4) Icon 2. In database, a field is a ________ 1) Label 2) Table of information 3) Group of related records 4) Category of information 3. Screen that comes on when you turn on your computer that show all the icons is 1) Desktop 2) Face to face 3) Viewer 4) View space 4. A file that contains definitions of the paragraph and character stylus fro you document and all things you customised like toolbars and menu is called a ________ 1) Guide 2) Pattern 3) Base document 4) Template 5. A _________ contains button and menus that provide quick access to commonly used commands. 1) Toolbar 2) Menu bar 3) Window 4) Find 6. The blinking point which shows your position in the text is called 1) Blinker 2) Cursor 3) Causer 4) Pointer 7. What is the name for the process that is used to convert a series of instructions, or program, written in high-level language into instructions (or program) that can be run on a computer? 1) Assembling 2) Compiling 3) Translating 4) Uploading 8. _________ are often delivered to a PC through an email attachment and are often designed to do harm. 1) Viruses 21 | P a g e
[Pick the date]
9.
10.
11.
12.
13.
14.
15.
16.
[ESSC COMPUTER AWARENESS]
2) Spam 3) Portals 4) Email messages You click at B to make the text _________. 1) Italics 2) Underlined 3) centre 4) Bold ________ is the process of finding errors in software code. 1) Debugging 2) Compiling 3) Interpreting 4) Testing A _________ typi9callly connects personal computers within a very limited geographical area, usually within a single building. 1) LAN 2) BAN 3) TAN 4) MAN A(N) ________ camera is a peripheral device used to capture still images in a diagonal format that can be easily transferred into a computer and manipulated using graphics software. 1) Digital 2) Ana log 3) Classics 4) Film _____________ makes it possible for shoppers to make purchasing using their computers. 1) E-world 2) E-commerce 3) E-speed 4) E-business A word in a web page that, when clicked, opened another document is called _________ 1) Anchor 2) hyperlink 3) reference 4) URL The ________ of software contains lists of commands and options. 1) Title bar 2) Menu bar 3) Formula bar 4) Tool bar Commands at the top of a screen such a FILE-EDIT-FONT-TOOLS to operate and change things within programs. 1) Menubar 2) Toolbar 22 | P a g e
[Pick the date]
17.
18.
19.
20.
21.
22.
23.
24.
25.
[ESSC COMPUTER AWARENESS]
3) User-friendly 4) Word processor When your are selecting a mouse for a particular computer system, what is the most important consideration? 1) The type of derivers that come with the mouse 2) The length of the mouse cord 3) The type of connector the mouse is equipped with 4) The number of buttons the mouse has How is it possible that both programs and data can be stored on the same floppy disk? 1) A floppy disk has two sides, one for data and one for programs 2) Programs and data are both software, and both can be stored on any memory device. 3) A floppy disk has to be formatted for once or for the other. 4) Floppy disk can only store data. Not programs Numbers in table columns are usually 1) Right-aligned 2) Left-aligned 3) Justified 4) Centre A __________ is a unique name that you give to a file of information. 1) Folder 2) Filename 3) Filename extension 4) Device letter Anything written own the screen is called 1) Cursor 2) Text 3) Folder 4) Boot A web site address is a unique name that identifies a specific __________ on the web. 1) Web browser 2) PDA 3) Web site 4) Link Every component of your computer is either _________ 1) Hardware or software 2) Software or CPU/RAM 3) Application software or system software 4) Input devices or output devices Which of the following is an O/S? 1) MS Windows 2) Mac 3) MS DOS 4) Windows NT 5) All of the above A terminal that cannot process any information is called ____ 23 | P a g e
[Pick the date]
26.
27.
28.
29.
30.
31.
32.
33.
[ESSC COMPUTER AWARENESS]
1) direct access terminal 2) intelligent terminal 3) smart terminal 4) tamp terminal the horizontal and vertical lines on a work sheet are called 1) cells 2) sheets 3) block lines 4) gridlines To delete an incorrect character in a document, __________ to erase to the right of the insertion point. 1) Press the left mouse key 2) Double – clicking the right mouse key 3) Press BACKSPACE key 4) Press DELETE key Computer connected to LAN can _______ 1) Run faster 2) Go on line 3) Share information and/or share peripheral equipment 4) E-mail Which of the following refers to the memory in your computer? 1) RAM 2) DSL 3) USB 4) LAN What is the full form of the KB related the computer? 1) Key Block 2) Kernel Boot 3) Kilo Byte 4) Kit Bit There term used to different all input and output access to a computer systems are called___ 1) Monitor 2) Software 3) Shared resources 4) Hardware Coded entries which are used to gain access to a computer system are called _______ 1) Entry codes 2) Passwords 3) Security commands 4) Code words Which of the following is the storage area within the computer itself which hold data only temporarily as the computer process instructions? 1) The hard disk 2) Main memory 24 | P a g e
[Pick the date]
34.
35.
36.
37.
38.
39.
40.
41.
[ESSC COMPUTER AWARENESS]
3) The control unit 4) Read-only memory Most of the common available personal computers/laptops have a keyboard popularly known as _________ 1) QWERTY 2) QOLTY 3) ALTER 4) UCLIF A _________ is a computer connected to who networks. 1) Link 2) Server 3) Gateway 4) Bridge way What disk is used to cold-boot a PC? 1) Setup disk 2) System disk 3) Diagnostic disk 4) Program disk The two major categories of software include 1) O/S and utility 2) Personal productivity and system 3) System and application 4) System and utility A field that uniquely identifies which person, thing, or event the record describes is a 1) File 2) Data 3) Field 4) Key A program that enables you to perform calculations involving row and columns of numbers is called a ________ 1) Spreadsheet program 2) Work processor 3) Graphics package 4) Window Application software is designed to accomplish ___________ 1) Real-word tasks 2) Computer-centric tasks 3) Gaming tasks 4) O/S tasks You need to configure a switch form a remote subnet. Woks of the following must be configured on the switch? 1) Console port 2) IP 3) Hostname 4) SNMP 25 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
42. Data (information) is stored in computer as 1) Files 2) Directories 3) floppies 4) matter 43. a computer ________ is a set of program instructions that can attach itself to a file, reproduce, itself, and spread on other files. 1) Worm 2) Virus 3) Trojan horse 4) Phishing scam 44. The desktop contains small graphics called _________ 1) Windows 2) Logos 3) Icons 4) Pictures 45. A __________ includes the file name and possibly a directory or folder. 1) File information packet 2) File button 3) File directory 4) File specification 46. A (n) _________ is text that you want printed at the bottom of the page. 1) Header 2) Endnote 3) Footnote 4) Footer 47. The O/S is the most common type of _______ soft ware. 1) Communication 2) Application 3) System 4) Word-processing 48. Sending an e-mail is same a s 1) Writing a letter 2) Drawing a picture 3) Talking on phone 4) Sending a package 49. In any window, the maximize button, the minimize button and the close buttons appear on 1) The title bar 2) Menu bar 3) Status bar 4) Ruler bar 50. To make the number pad act as directional arrows, you press the ___ key. 1) Shift 2) Arrow lock 3) Num lock 26 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Answer key 1. (1)
2.(2)
3.(1)
4.(4)
5.(1)
6.(2)
7.(2)
8.(1)
9.(4)
10.(4) 11.(1) 12.(1) 13.(4) 14.(2) 15.(2) 16.(1) 17.(3) 18.(2) 19.(1) 20.(2) 21.(2) 22.(*) 23.(1) 24.(5) 25.(4) 26.(4) 27.(4) 28.(3) 29.(1) 30.(3) 31.(4) 32.(2) 33.(2) 34.(1) 35.(4) 36.(2) 37.(1) 38.(4) 39.(1) 40.(3) 41.(2) 42.(1) 43.(2) 44.(3) 45.(4) 46.(4) 47.(3) 48.(1) 49.(1) 50.(3)
27 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 5
1. In oracle, what is the default number of transactions that MAXTRANS is set to if not specified? 1) 512 2) 10 3) 40 4) 1 2. Which of the following groups consist of only input devices? 1) Mouse, Keyboard, Monitor 2) Mouse, Keyboard, Printer 3) Mouse, Keyboard, Plotter 4) Mouse, Keyboard, Scanner 3. To which pin on the RAM chip does the address decoder connect in order to signal which memory chip is being accessed? 1) The address input 2) The output enable 3) The chip enable 4) The data input 4. In windows, by default the files when deleted are sent to ______ 1) Dust bin 2) Recycle bin 3) Waste bin 4) Recycle waste bin 5. When you want to move some text form one page to a different page, the best method is ______ 1) Drag and drop 2) Cut and paste 3) Delete and retype 4) Find and replace 6. To indent the first paragraph of your report, you should use this key ________ 1) Space bar 2) Return key 3) Tab key 4) Shift key 7. Which is the best definition of a software package? 1) An add-on for your computer such as additional memory 2) A set of computer programs used for a certain function such as word processing 3) A protection you can buy for a computer 4) The box, manual and license agreement that accompany commercial software. 8. A ______ represents approximately one billion memory location. 1) Kilobyte 2) Megabyte 28 | P a g e
[Pick the date]
9.
10.
11.
12.
13.
14.
15.
16.
[ESSC COMPUTER AWARENESS]
3) Gigabyte 4) Terabyte A collection of programs that controls how your computer system runs and processes information is called 1) Operating system 2) Computer 3) Office 4) Complier After a user has saved and deleted many files, many scattered areas of stored data remain that are too small to be used efficiently, causing ______ 1) Disorder 2) Turmoil 3) Disarray 4) Fragmentation Which of the following is the communication protocol that sets the standard used by every computer that accesses Web-based information? 1) XML 2) DML 3) HTTP 4) HTML Which of the following many types is also called a drop-down menu? 1) Fly-out 2) Cascading 3) Pop-up 4) Pull-down A _______ is not a form of Biometrics. 1) Fingerprint 2) Password 3) Retina scan 4) Breath scan Which is the smallest item of useful information a computer can handle? 1) Bite 2) Byte 3) Bit 4) Bait What menu is selected to print? 1) Edit 2) Special 3) File 4) Tools Personal computer is 1) MC 2) SC 3) YC 4) PC 29 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
17. The blinking symbol on the computer screen is called the ______ 1) Mouse 2) Logo 3) Hand 4) Cursor 18. The process by which the structure of the database modified to eliminate hidden dependencies and repeated group is 1) Enforcing data integrity 2) Enforcing referential integrity 3) Indexing 4) Normalization 19. In a database, _____ fields store numbers used to perform calculations. 1) Next 2) Key 3) Alphanumeric 4) Numeric 20. This component is required to process data into information and consists of integrated circuits, 1) Hard disk 2) RAM 3) CPU 4) ROM 21. The primary purpose of software is to turn data into _______ 1) Websites 2) Information 3) Programs 4) Objects 22. The ability to find an individual item in a file immediately ______ is used. 1) File allocation table 2) Directory 3) Sequential access 4) Direct access 23. Reusable optical storage will typically have the acronym _______ 1) CD 2) RW 3) DVD 4) ROM 24. In the URL:/www.perenhall.com , the portion labelled http is the _______ 1) Host 2) Domain name 3) Protocol 4) Top-level domain 25. Which of the following statements is not true about two-tier client server database architecture? 1) SQL statements are processed on the server. 30 | P a g e
[Pick the date]
26.
27.
28.
29.
30.
31.
32.
33.
[ESSC COMPUTER AWARENESS]
2) SQL statements may be processed on some of the clients. 3) Business logic is mostly processed on clients. 4) Business logic may be processed on the server. Which layers of the OSI model are included in the lower layers? 1) Application, Session, Presentation 2) Physical, Transport, Data Line, Network 3) Data link, Physical, Network 4) Session, Data Link, Physical 5) None of these Form smallest to largest, rank the following logical pieces of the database: data block, table space, extent, and segment. 1) Table space, segment, extent, data block 2) Data block, segment, extent, table space 3) Segment, extent, data block, tables space 4) Data block, extent, segment, table space Where are cookies stored? 1) On the server 2) In web.xml 3) On the client 4) In HTML The quickest and easiest way in world, to locate a particular worked or phrase in a document is to lose the ______ command. 1) Replace 2) Find 3) Lookup 4) Search Which of the following in NOT a computer programming language? 1) C 2) C++ 3) Java 4) Microsoft _______ is when the more power-hungry components, such as the monitor and hard drive, are put in idle. 1) Hibernation 2) Power down 3) Standby mode 4) The shutdown procedure Compliers and translators are one form of _______ 1) ROM 2) RAM 3) Hard disk 4) Soft ware Hard disk drives are considered _______ storage. 1) Flash 2) Non-volatile 31 | P a g e
[Pick the date]
34.
35.
36.
37.
38.
39.
40.
41.
[ESSC COMPUTER AWARENESS]
3) Temporary 4) Nonpermanent Data representation is based on the ______ number system, which used two numbers to represent all data. 1) Binary 2) Biometric 3) Bicentennial 4) Byte The most common input devices include _______ 1) Monitor and keyboard 2) Monitor and mouse 3) Mouse and keyboard 4) Printer and mouse ________ represents raw facts whereas _______ is data made meaningful. 1) Information, reporting 2) Data, information 3) Information, bits 4) Records, bites Which of the following peripheral devices displays information to a user? 1) Monitor 2) Keyboard 3) Secondary storage devices 4) Secondary storage media When we move any row or column, the text of moved cells 1) Moves with the cell 2) Remains at it s place but formatting moves 3) Moves with cells and formatting is lost 4) Moves with cells and some formatting are changed Which of the following is the first step in the ‘transatction processing cycle’? Which captures business data through various modes such as optical scanning or at an electronic commerce website? 1) Document and report generation 2) Database maintenance 3) Transaction processing 4) Data entry Data mining means analyzing the data stored with 1) The DSA 2) The front-office staff 3) The back-office staff 4) The customers An e-mail address typically consists of a user ID followed by the______ sign and the name of the e-mail server that manages the user’s electronic post office box. 1) @ 2) # 3) & 32 | P a g e
[Pick the date]
42.
43.
44.
45.
46.
47.
48.
49.
50.
[ESSC COMPUTER AWARENESS]
4) * . Correcting errors in a program is referred to as _____ 1) Debugging 2) Bugging 3) Rectifying 4) Modifying An assembler is used to translate a program Witten in ______ 1) A low level language 2) Machine language 3) A high level language 4) Assembly language The capability of the O/S to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is ______ 1) Multiprocessing 2) Multitasking 3) Multiprogramming 4) Multi execution Which is the best definition of a software package? 1) A n add-n for your computer such as additional memory 2) A set of computer programs used for a certain function such as worked processing 3) A protection you can buy for a computer 4) The box manual and license agreement that accompany commercial software. Which of the following groups consists of only output devices? 1) Scanner, Printer Monitor 2) Keyboard, Printer, Monitor 3) Mouse, Printer, Monitor 4) Plotter, Printer Monitor A(n) ______ contains commands that can be selected. 1) Pointer 2) Menu 3) Icon 4) Button The term used to define all input and output devices in a computer system is ______ 1) Monitor 2) Software 3) Shared resources 4) Hardware What type of resource is most likely to be a shared common resource in ac computer networked? 1) Printers 2) Speakers 3) Floppy disk drives 4) Keyboards The vast network of computers that connects millions of people all over the world is called _____ 33 | P a g e
[Pick the date] 1) 2) 3) 4)
[ESSC COMPUTER AWARENESS]
LAN Web Hypertext Internet
Answer key
2. (1)
2.(4) 10.(4)
3.(3)
4.(2)
5.(2)
6.(3)
7.(2)
8.(3)
9.(2)
11.(3) 12.(3) 13.(2) 14.(3) 15.(3) 16.(4) 17.(5) 18.(4) 19.(4) 20.(2) 21.(3) 22.1() 23.(*) 24.(3) 25.(3) 26.(5) 27.(4) 28.(3) 29.(2) 30.(4) 31.(3) 32.(2) 33.(4) 34.(1) 35.(3) 36.(2) 37.(1) 38.(1) 39.(1) 40.(3) 41.(1) 42.(1) 43.(4) 44.(3) 45.(1) 46.(4) 47.(2) 48.(4) 49.(1) 50.(4)
34 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 6
1. The ______ shows all the Web sites and pages that you have visited over a period of time. 1) Status bar 2) Taskbar 3) History list 4) Too bar 2. _______ is a set of computer programs that run or controls computer hardware and acts an ans interface with application programs and users. 1) Object code 2) A complier 3) An O/S 4) The CPU 3. Passwords enable users to ______ 1) Get into the system quickly 2) Make efficient user of time 3) Retain confidentiality of files 4) Simplify life structures 4. The make a user assigns to a document is called a(n) _______ 1) Filename 2) Program 3) Record 4) Data 5. ________ are words that a programming language has set aside for its won use. 1) Control words 2) Reserved words 3) Reserved keys 4) Control structures 6. What are the two types of output devices? 1) Monitor and printer 2) Storage-disks (floppy,CD) 3) Keyboard and a mouse 4) Windows 2000, windows NT 7. Computations and logical operations are performed by the 1) RAM 2) ALU 3) Register 4) Control Unit 8. The portion that shows all the choices you can make while working in a window is called the _______ 1) Options 2) Table 3) Menu bar 35 | P a g e
[Pick the date]
9.
10.
11.
12.
13.
14.
15.
16.
17.
[ESSC COMPUTER AWARENESS]
4) Item bar What is output? 1) Processor takes form user 2) User gives to processor 3) Processor gets form user 4) Processor gives to user What type of program controls the various computer parts and allows the user to interact with the computer? 1) Utility software 2) O/s 3) Word processing software 4) Database program Each cell in a Micro soft Office Excel document is referred to by its cell address, which is the 1) Cell’s column label 2) Cell’s column label and worksheet tab name 3) Cell’s row label 4) Cell’s row and column labels. The collection of links throughout the internet creates an inter connected network called the ______ 1) www 2) web 3) wide area web 4) all of the above CD-ROM stands for ________ 1) Central processing unit 2) CD-remote open mouse 3) CD- resize or minimize 4) CD- read only memory What is the place in the computer system where data and programs and temporarily stored? 1) Paste 2) Open 3) Memory 4) Pocket A key that will erase information form the computer’s memory and characters on the screen. 1) Edit 2) Delete key 3) Dummy out 4) Trust key The central processing unit contains which of the following as a computer? 1) Memory Regulation Unit 2) Flow Control Unit 3) Arithmetic Logic Unit 4) Instruction Manipulation Unit The process of writing out computer instructions is known as 36 | P a g e
[Pick the date]
18.
19.
20.
21.
22.
23.
24.
25.
[ESSC COMPUTER AWARENESS]
1) Assembling 2) Compiling 3) Executing 4) Coding An ad hoc query is a ______ 1) Pre-panned question 2) Pre-scheduled question 3) Spur-of-the moment question 4) Question that will not return any results A Web ______ consists of one or more Web pages located on a Web server. 1) Hub 2) Site 3) Story 4) Template A Sender must not be able to deny that he sent a specific message when he in fact did. This is an aspect of security called ________ 1) Privacy 2) Authentication 3) Integrity 4) Non-repudiation ______ is an access method in which collisions are entirely avoided. 1) CSMA 2) CSMA/CD 3) CSMA/CA 4) All of the above You are planning on using a single network that supports 208 users. Which IP address class would you choose to be the most efficient? 1) Class A 2) Class B 3) Class C 4) Class D The main directory of a disk is called the _____ directory. 1) Root 2) Sub 3) Folder 4) Network You can user the tab key to ________ 1) Move a cursor across the screen 2) Indent the paragraph 3) Move the cursor done the screen 4) Only 1) and 2) A string of eight 0s and 1s is called ______ the document. 1) Megabyte 2) Editing 3) Modifying 37 | P a g e
[Pick the date]
26.
27.
28.
29.
30.
31.
32.
33.
34.
[ESSC COMPUTER AWARENESS]
4) Adjusting Changing an existing document is called _____ the document. 1) Creating 2) Editing 3) Modifying 4) Adjusting Microsoft Office is 1) Shareware 2) Public-domain software 3) Open-source software 4) An application suite Cache and main memory will lose their contents when the power is off. The are ______ 1) Dynamic 2) Static 3) Volatile 4) Non-voltaic The rectangular area of the screen the t displays a program, data, and/or information is a _______ 1) Title bar 2) Button 3) Dialog box 4) Window Each cell in a Microsoft Office Excel documentation is referred to by its cell address, which is the ________ 1) Cell’s column label 2) Cell’s column label and worksheet tab name 3) Cell’s row label 4) Column labels _____ lets you leave a screen or program 1) Boot 2) Programs 3) Exit 4) Text The physical arrangement of elements on a page is referred to as a document’s ______ 1) Features 2) Format 3) Pagination 4) Grid Which of the following describes a relational database? 1) It provides a relationship between integers 2) It consists of separate tables of related data 3) It retrieves data related to its queries 4) It provides a relationship between floats ______ means that the dealt contained in a database is accurate and reliable. 1) Data redundancy 38 | P a g e
[Pick the date]
35.
36.
37.
38.
39.
40.
41.
42.
43.
[ESSC COMPUTER AWARENESS]
2) Data integrity 3) Data reliability 4) Data consistency _______ is the result produced by a computer. 1) Data 2) Memory 3) Output 4) Input ______ is an invalid type of database key. 1) Structured primary key 2) Atomic primary key 3) Primary key 4) Composite primary key Which of the following is a key function of firewall? 1) Monitoring 2) Deleting 3) Copying 4) Moving A(n) ______ converts and executes one statement at a time. 1) Complier 2) Interpreter 3) Converter 4) Instructions Documents converted to ______ can be published to the web. 1) A doc file 2) http 3) machine language 4) HTML You cannot link Excel worksheet data to a word document ______ 1) With the right drag method 2) With the hyperlink 3) With the copy and paste special commands 4) With the copy paste buttons on the standard commands When speaking of computer input and output, input refers to 1) Any data processing that occurs from new data input into computer 2) Retrieval of data or information that has been entered into the computer 3) Data or information that has been entered into the computer 4) The transmission of data that has been entered into the computer Which one of the following objects is passed to a JavaBeans one of its properties is set via a JSP action? 1) Servlet Request 2) http Servlet Request 3) servlet Response 4) http Serve let Response The standard protocol of the Internet is _______ 39 | P a g e
[Pick the date]
44.
45.
46.
47.
48.
49.
50.
[ESSC COMPUTER AWARENESS]
1) TCP/IP 2) Java 3) HTML 4) Flash Memory unit is one part of ______ 1) Control unit 2) Central Processing Unit 3) Input devices 4) Output devices ________ is when the computer is turned on and the O/S is loading. 1) Booting 2) Flashing 3) Tracking 4) Taping Scanner scans 1) Pictures 2) Text 3) Both Picture and Text 4) Neither Picture Nor Text Developing sets of instructions for the computer to follow and to do the task the same way as many times as needed is called.______ 1) Listing 2) Sequencing 3) Programming 4) Directing Programs designed specifically to address general purpose application and special purpose applications are called ______ 1) O/S 2) System software 3) Application software 4) Management information systems A ______ is an electronic device that process data, converting it into information. 1) Processor 2) Computer 3) Case 4) Stylus _________ is the process of finding errors in software code. 1) Compiling 2) Testing 3) Running 4) Debugging
Answer key 40 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
3. (3) 2.(3) 10.(2)
3.(3)
4.(1)
5.(4)
6.(1)
7.(2)
8.(3)
9.(4)
11.(4) 12.(4) 13.(4) 14.(3) 15.(2) 16.(3) 17.(4) 18.(3) 19.(2) 20.(4) 21.(4) 22.(3) 23.(1) 24.(4) 25.(4) 26.(2) 27.(4) 28.(3) 29.(4) 30.(*) 31.(3) 32.(2) 33.(2) 34.(2) 35.(3) 36.(1) 37.(1) 38.(2) 39.(4) 40.(4) 41.(3) 42.(*) 43.(4) 44.(2) 45.(*) 46.(2) 47.(3) 48.(3) 49.(4) 50.(4)
41 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 7
1. A _______ contains specific rules and words that express the logic steps of an algorithm. 1) Programming language 2) Programming structure 3) Syntax 4) Logic chart 2. ________ is a set of key words, symbols, and a system of rules for constructing statements by which humans can communicate the instructions to be executed by a computer. 1) A computer program 2) A programming language 3) An assembler 4) Syntax 3. The general term “Peripheral equipment” is used for ______. 1) Any device that is attached to a computer system 2) Large-scale computer systems 3) A program collection 4) Other office equipment not associated with a desktop computer 4. If a memory chip is volatile, it will _______ 1) Explode if exposed to high temperatures 2) Lose its contents if current is turned off 3) Be used for data storage only 4) Be used to both read and write data 5. _______ is the process of finding errors in software code. 1) Compiling 2) Assembling 3) Interpreting 4) Debugging 6. Approximately how many bytes make one Megabyte? 1) One Thousand 2) Ten Thousands 3) One Hundred 4) One Million 7. What is MP3? 1) A mouse 2) A printer 3) A sound format 4) A scanner 8. All the deleted files go to ______ 1) Recycle Bin 2) Task Bar 3) Tool Bar 4) My Computer 42 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
9. _______ is the act of copying or downloading a program form network and making multiple copies of it. 1) Network piracy 2) Plagiarisms 3) Software piracy 4) Site-license piracy 10. A directory within a directory is called a ______ 1) Mini Directory 2) Junior Directory 3) Part Directory 4) Sub Directory 11. Instructions that tell the computer what to do. Another name for software. 1) Programs 2) CPU 3) Options 4) Folder 12. A program which helps create written document and lets you go back and make corrections as necessary. 1) Spread sheet 2) Personal writer 3) Word printer 4) Word processor 13. A Place that a user can create to store files. 1) Cursor 2) Text 3) Folder 4) Boot 14. Start or restart the computer. 1) Exit 2) Kick 3) Boot 4) Kick-start 15. A blinking indicator that shows you where your next action will happen. 1) CPU 2) Cursor 3) Tool bar 4) Boot 16. The ______ key and the _______ key can be used in combination with other keys to perform shortcuts and special tasks. 1) Control, Alt 2) Function, toggle 3) Delete, Insert 4) Caps Lock, Num Lock 17. What is a file? 1) A file is a section of main storage used to store data. 43 | P a g e
[Pick the date]
18.
19.
20.
21.
22.
23.
24.
25.
[ESSC COMPUTER AWARENESS]
2) A file is a collection of information that has been given a name and is stored in secondary memory. 3) A file is the part of a program that is used to describe what the program should do. 4) A file is another name for floppy disk. For creating a document, you use _______ command at File Menu. 1) Open 2) Close 3) New 4) Save Applications are often referred to as _______ 1) Data file 2) Executable files 3) System software 4) The O/S PC stands for 1) Personal comprehension 2) Personal computing 3) Personal computer 4) Personal calculations Which of the following are advantages of CD-ROM as a storage media? 1) CD-ROM is an inexpensive way to store large amount of data an information 2) CD-ROM disks retrieve data and information more quickly the magnetic disks do. 3) CD-ROMs make less error than magnetic media. 4) All of these A _______ is the term used when a search engine returns a Web page that matches the search criteria. 1) Blog 2) Hit 3) Link 4) View The ______ is the term used to describe the window that is currently being used. 1) Web Window 2) Display Area 3) WordPad Window 4) active window CPU is an abbreviation for 1) Central Programming Unit 2) Central Processing Unit 3) Computer Processing Unit 4) Computer protocol Unit A microprocessor is the brain of the computer and is also called a(n) 1) Microchip 2) Macro chips 3) Macro processor 4) Calculator 44 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
26. An E-mail address typically consists of a user ID followed by the ______ sign and the name of the e-mail server that manages the user’s electronic post office box. 1) @ 2) # 3) & 4) * 27. A personal computer is designed to meet the computing needs of a(n) _______ 1) Individual 2) Department 3) Company 4) City 28. Ctrl, Shift, and Alt are called _____ keys. 1) Adjustment 2) Department 3) Modifier 4) Alphanumeric 29. File ______ shrinks the size of a files so it requires less storage space. 1) Scanning 2) Synthesizing 3) Defragmenting 4) Compressing 30. In addition to the basic typing keys, desktop and notebook computer keyboards include a(n) ______ keypad to efficiently move the screen-based insertion point. 1) Editing 2) Number 3) Locked 4) Docked 31. If the ______ bit in X.25 standard is set to1, it means that there is more than one packet. 1) Q 2) D 3) M 4) P 32. A computer program that will search its database to did items whose tent contains all or at least one of the words given to it. 1) Search engine 2) Internet_ Explorer 3) Searching techniques 4) Particular keywords 33. In UNIX, command “!$” is used to 1) Repeat last word of last command line 2) Repeat entire less command line 3) Count the number of arguments 4) Match to unknown values 34. The _______ allows you to access object and start programmed. 1) Default menu 45 | P a g e
[Pick the date]
35.
36.
37.
38.
39.
40.
41.
42.
43.
[ESSC COMPUTER AWARENESS]
2) XP menu 3) Start menu 4) Stop menu PCM is an example of 1) Digital to digital 2) Digital to analog 3) Analog to analog 4) Analog to digital Files are organized by storing them in ______ 1) Tables 2) Database 3) Folders 4) Graphs What menu is selected to change front and style? 1) Tools 2) File 3) Format 4) Edit In programming, you use the following keys: ______ 1) Arrow keys 2) Function keys 3) Alpha keys 4) Page up and Page Down keys With a CD you can _____ 1) Read 2) write 3) neither Read and write 4) either Read and write A scanner scans ______ 1) Picture 2) Text 3) Both picture and text 4) Neither picture nor text The box that contains the central electronic components of the computer is the 1) Motherboard 2) System unit 3) Peripheral 4) Input device What menu is selected to cut, copy and paste? 1) File 2) Edit 3) Tools 4) Table A program that converts a high level language source file into a machine language file is called a 46 | P a g e
[Pick the date]
44.
45.
46.
47.
48.
49.
50.
[ESSC COMPUTER AWARENESS]
1) Translator 2) Assembler 3) Complier 4) Linker The _____ indicates how much data a particular storage medium can hold. 1) Access 2) Capacity 3) Memory 4) Storage A(n) _______ is created by an application. 1) Executable file 2) Software program 3) Document 4) O/S The computer monitor is which type of devices? 1) Input 2) Output 3) Processing 4) Software How many options does binary choice offer? 1) One 2) Tow 3) Three 4) It depends on the amount of memory in the computer. The smallest unit of information a computer can understand and process is known as 1) Digit 2) Kilobyte 3) Bit 4) Byte RAM is _____ and ______ 1) Volatile, temporary 2) Nonvolatile, permanent 3) Nonvolatile, temporary 4) Volatile, permanent Which is not an item of hardware? 1) An Mp3 file 2) A keyboard 3) A monitor 4) A mouse
Answer key
47 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
4. (3) 2.(4) 3.(1) 10.(4)
4.(2)
5.(1)
6.(4)
7.(3)
8.(1)
9.(3)
11.(1) 12.(4) 13.(3) 14.(3) 15.(2) 16.(1) 17.(2) 18.(3) 19.(2) 20.(3) 21.(1) 22.(2) 23.(4) 24.(2) 25.(1) 26.(1) 27.(1) 28.(3) 29.(4) 30.(1) 31.(3) 32.(1) 33.(2) 34.(3) 35.(4) 36.(3) 37.(3) 38.(2) 39.(4) 40.(3) 41.(2) 42.(2) 43.(1) 44.(2) 45.(3) 46.(2) 47.(2) 48.(3) 49.(1) 50.(1)
48 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 8
1. Which part is the “brain” of the computer? 1) CPU 2) Monitor 3) RAM 4) ROM 2. Something which has easily-understood instructions is said to be 1) Information 2) Word-processing 3) User friendly 4) Icon 3. Information on a computer is stored as 1) Analog data 2) Digital data 3) Modern data 4) Watts data 4. For creating a document, you use _____ command at file menu. 1) New 2) Open 3) Document 4) Type 5. ______ is data that has been organized or presented in a meaningful fashion. 1) A process 2) Storage 3) Software 4) Information 6. A ______ contains buttons and menus that provide quick access to commonly used commands. 1) Menu bar 2) Toolbar 3) Window 4) Find 7. Letters, numbers and symbols found on a keyboard are ______ 1) Icon 2) Screen 3) Keys 4) Menu 8. Which is not an item of hardware? 1) An MP3 file 2) A keyboard 3) A disk drive 49 | P a g e
[Pick the date]
9.
10.
11.
12.
13.
14.
15.
16.
17.
[ESSC COMPUTER AWARENESS]
4) A monitor A (n) ______ is created by an application. 1) Executable file 2) Software program 3) Document 4) O/S Storage media such as a CD read and write information using ________ 1) Laser beam of red light 2) Magnetic dots 3) Magnetic strips 4) All of the above Vendor-created program modification are called _______ 1) Patches 2) Antivirus 3) Holes 4) Fixes When we open an Internet site we see www. What is the full form of www? 1) World wide wakeups 2) World wide web 3) Word wading works 4) World wide Spiderman web What do you use to create a chart? 1) Pei Wizard 2) Excel Wizard 3) Data Wizard 4) Chart Wizard The effect the ROLLBACK command in a transactions is the following: 1) Undo all changes to the database resulting form the execution of the transaction 2) Undo the effects of the last UPDATE command 3) Restore the content of the database to its state at the end of the previous day 4) Make sure that all changes to the database are in effect Each of the following is a true statement except; 1) Online systems continually update the master file 2) In online processing, the user enters transactions into a device that is directly connected to the computer system. 3) Batch processing is still used today in older systems or in some systems with massive columns of transactions. 4) Information in batch systems will always be up-to-date When you save to ______ your data will remain intact even with the computer is turned off. 1) RAM 2) Motherboard 3) Secondary storage device 4) Primary storage device The motherboard is the 1) Circuit board that houses peripheral devices 50 | P a g e
[Pick the date]
18.
19.
20.
21.
22.
23.
24.
25.
26.
[ESSC COMPUTER AWARENESS]
2) Same as the CPU chip 3) The first chip that is accessed when the computer is turned 0n 4) Circuit board that contains a CPU and other chips Each box in a spreadsheet is called a 1) Cell 2) Empty space 3) Record 4) Field What is the term for unsolicited e-mail 1) Newsgroup 2) Usenet 3) Flaming 4) spam The ability to easily add additional users means that a network is 1) Icon 2) Hyperlink 3) Menu 4) Source derived To take information form one source and bring it to your computer is referred to as _____ 1) Upload 2) Download 3) Transfer 4) De-link Under link text, such as text and folder names is referred to as a ______ 1) Icon 2) Hyperlink 3) Menu 4) Source drive Junk e-mail is also called _______ 1) Spam 2) Spoof 3) Sniffer script 4) Spool What is the most common way to get a virus in your computer’s hard disk? 1) By installing games form their CD ROMs 2) By uploading pictures form mobile phones to the computer 3) By opening emails 4) By sending e-mails What is the default extension for all word documents? 1) WRD 2) TXT 3) DOC 4) FIL The keys labeled 0-9 on the keyboards are called ________ 1) Function keys 51 | P a g e
[Pick the date]
27.
28.
29.
30.
31.
32.
33.
34.
35.
[ESSC COMPUTER AWARENESS]
2) Numeric keys 3) Typewriter keys 4) Special keys In a spreadsheet, a cell is defined as the ______ 1) Intersection of a table and a duplet 2) Intersection of a file and a database 3) Intersection of a row and column 4) Intersection of a field and a record The basic goal of computer process is to convert data into ______ 1) Information 2) Tables 3) Files 4) Graphs Dumb terminals have terminal and ______ 1) Mouse 2) Speaker 3) Keyboard 4) Mouse or speaker _______ is when the more power-hungry components, such as the monitor and the hard drive are put in idle. 1) Hibernation 2) Power down 3) Standby mode 4) The shutdown procedure To shrink a window to an icon _____ 1) Open a group window 2) Minimize a window 3) Maximize a window 4) Restore a window Personal computers can be connected together to form a ______ 1) Server 2) Supercomputer 3) Enterprise 4) Network What characteristic of read-only memory (ROM) makes it useful? 1) ROM information can be easily updated 2) Data in ROM is nonvolatile, that is, remains there even without electrical power 3) ROM provides very large amounts of expensive data storage 4) ROM chips are easily swapped between different brands of computers. By CD you can 1) Read 2) Write 3) Read and write 4) Either Read or Write The Word function that corrects text as you type is referred to as 52 | P a g e
[Pick the date]
36.
37.
38.
39.
40.
41.
42.
43.
[ESSC COMPUTER AWARENESS]
1) Auto Summarize 2) Auto Insert 3) Auto Correct 4) Track Changes To combine two or more cells into a single cell is called 1) Merging 2) Joining 3) Sharing 4) Splitting _______ is when the computer is turned on and the O/S is loading 1) Booting 2) Flashing 3) Tracking 4) Taping A device that connects to a network without the use of cables is said to be ______ 1) Distributed 2) Wireless 3) Centralized 4) Open source The particular field of a record that uniquely identifies each record is called the ______ 1) Key field 2) Primary field 3) Master field 4) Order field A CPU contains _______ 1) A card reader and a printing device 2) An analytical engine and a control unit 3) A control unit and an arithmetic logic unit 4) An arithmetic logic unit and a card reader A computer cannot “boot” if it does not have the _______ 1) Complier 2) Loader 3) O/S 4) Assembler The ___ key and the _______ key can be used in combination with other keys to perform shortcuts and special tasks. 1) Control, Alt 2) Function, toggle 3) Delete, Insert 4) Caps Lock, Num Lock When you quickly press and realize the left mouse button twice you are ______ 1) Primary-clicking 2) Pointing 3) Double-clicking 4) Secondary-clicking 53 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
44. What is the process of copying software program form secondary storage media to the hard disk called? 1) Configuration 2) Download 3) Storage 4) Upload 45. _______ provides the means to move the pointer on the screen and give information to the computer by clicking it buttons. 1) Scanner 2) Mouse 3) Keyboard 4) Program 46. Even if a disk fails, the computer applications running and using it can continue processing. This application is said to have been designed with this feature called. 1) 100 percent up-time 2) Fault tolerance 3) High reliability 4) All of these 47. Two or more computers connected to each other sharing information form a ______ 1) Network 2) Router 3) Server 4) Tunnel 48. A computer-intensive problem runs on a _______ 1) Server 2) Mainframe 3) Supercomputer 4) Super PC 49. Programs that automatically submit your search request to several search engines simultaneously are called. 1) Met search engines 2) Web crawlers 3) Spiders 4) Hits 50. Which of the following describes programs that can run independently, travel from system to system, and disrupt computer communications? 1) Trojans 2) Viruses 3) Idlers 4) Droppers
Answer key 54 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
5. (1) 2.(3) 10.(1)
3.(2)
4.(1)
5.(4)
6.(2)
7.(3)
8.(1)
9.(3)
11.(4) 12.(2) 13.(4) 14.(1) 15.(3) 16.(3) 17.(4) 18.(1) 19.(4) 20.(1) 21.(2) 22.(2) 23.(1) 24.(3) 25.(3) 26.(2) 27.(3) 28.(1) 29.(3) 30.(3) 31.(2) 32.(4) 33.(2) 34.(3) 35.(3) 36.(1) 37.(1) 38.(2) 39.(1) 40.(3) 41.(3) 42.(1) 43.(3) 44.(3) 45.(2) 46.(2) 47.(1) 48.(3) 49.(1) 50.(4)
55 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 9 1. What characteristic of Read Only Memory makes it useful? 1) ROM information can be easily updated 2) ROM provides very large amounts of inexpensive data storage 3) Data in ROM is nonvolatile, that is, it remains there even without electrical power. 4) ROM chips are easily swapped between different brands of computers. 2. Which of the following is a computer package for preparing/typing letters/documents? 1) Word 2) Excel 3) Power point 4) Windows 5) Unix 3. Which of the following organizations is a popular name in the filed of computer & Software’s? 1) Rotman 2) Henley 3) Microsoft 4) Louis Vuitton 5) DLA Piper 4. A_______ is a named set of characters that have the same characteristics. 1) Type face 2) Type Style 3) Font 4) Pico 5. A_______pre-designed document that already has coordinating fonts, a layout, and a background. 1) Guide 2) Model 3) Ruler 4) Template 6. Which elements of a word document can be displayed in colour? 1) Only graphics 2) Only text 3) All elements 4) All elements, but only if you have a colour Printer 7. A complete electronic circuit with transistors and other electronic components on a small silicon chip is called an_________ 1) Workstation 2) CPU 3) Magnetic disk 4) Integrated Circuit 8. Which of the following will translate images of text, drawings, and photos into digital form? 1) Digitizer 56 | P a g e
[Pick the date]
9.
10.
11.
12.
13.
14.
15.
[ESSC COMPUTER AWARENESS]
2) Modem 3) Scanner 4) Keyboard By default, your documents print in _________Mode. 1) Landscape 2) Portrait 3) Page Setup 4) Print view Which of the following refers to a small, single – site network? 1) LAN 2) DSL 3) RAM 4) USB The communications device that allows the computer to access a network is called a _________ Card 1) Modem 2) Video 3) Sound 4) Network A screen list of options in a program that tells you what is in that program__________ 1) Screen 2) Icon 3) Menu 4) Backup Computers connected to a LAN (Local Area Network) can__________ 1) Run faster 2) Go on line 3) Share information and/ or Share peripheral equipment 4) E – Mail WWW stands for ___________ 1) World work web 2) Wide work web 3) Wide world web 4) World wide web The first computers were programmed using_______ 1) Assembly language 2) Machine language 3) Source code 4) Object code 5) Spaghetti Code
16. When the pointer is positioned on a _________ , it is shaped like a hand. 1) Grammar error 2) Hyperlink 3) Screen tip 57 | P a g e
[Pick the date]
17.
18.
19.
20.
21.
22.
[ESSC COMPUTER AWARENESS]
4) Spelling Error 5) Formatting Error Choices are referred to as_________ 1) Options 2) Exit 3) Boot 4) Folder To make the number pad act as directional arrow, you press the _______key 1) Numlock 2) Caps lock 3) Arrow lock 4) Shift When creating a word processed document, this step involves the user changing how words on the page appear, both on the screen and in printed form. 1) Editing Text 2) Inserting tables and indexes 3) Formatting Text 4) Proofing documents Software applies__________, also called algorithms, to process data. 1) Arithmetic 2) Procedures 3) Objects 4) Rules Networks are monitored by security personnel and supervised by_________ who set(s) up accounts and passwords for authorized network users. 1) IT managers 2) The government 3) Network Administrators 4) Password Administrators In Oracle, Which statement is true about segments? 1) Each table has its own segment 2) A segment is created every time an extent is created, extended, or altered 3) An index segment is created every time a table is created 4) A segment is deleted whenever a table is truncated
23. A desktop computer is also known as a________ 1) Palm pilot 2) PC 3) Labtop 4) Main frame 24. When a file contains instructions that can be carried out by the computer, it is often called an______ 1) Data 2) Information 58 | P a g e
[Pick the date]
25.
26.
27.
28.
29.
30.
31.
32.
[ESSC COMPUTER AWARENESS]
3) Executable 4) Application A directory within a directory Is called 1) Mini Directory 2) Junior Directory 3) Part Directory 4) Sub Directory Editing a document consists of reading through this document you’ve created, then________ 1) Correcting your errors 2) Printing it 3) Saving it 4) Deleting it The internet allows you to_________ 1) Sending electronic mail 2) View web pages 3) Connect to servers all around the world 4) All of these Most mail programs automatically complete the following two parts in an e-mail_______ 1) From: and Body 2) From: and Date 3) From: and To 4) From : and Subject Where is the disk put in a computer? 1) In the modem 2) In the hard drive 3) Into the CPU 4) In the disk drive The name a user assigns to a document is called an ________ 1) File name 2) Program 3) Record 4) Data A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by user is 1) Read only 2) Memory Only 3) Run only 4) Write only In an information system, alphanumeric data normally takes the form of 1) Sentences and paragraphs 2) Numbers and alphabetical characters 3) Graphic shapes and figures 4) Human voice and other sounds
59 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
33. A web site’s main page is called its___________ 1) Home page 2) Browser Page 3) Search page 4) book mark 34. When Installing________, the user must copy and usually decompress program files from a CD – ROM or other medium to the hard disk 1) Programming software 2) System software 3) Application Hardware 4) Application Software 35. A collection of interrelated files in a computer is a________. 1) File manager 2) Field 3) Record 4) Database 36. To insert a copy the Clipboard contents, whatever was last cut or copied at the insertion point, 1) Paste 2) Stick in 3) Fit in 4) Push in 37. The command used to remove text or graphics from a document, The information is then stored on a clipboard so you past it. 1) Chop 2) Cut 3) Clip 4) Cart away
38. To exit the program without leaving the application. 1) File 2) Edit 3) Copy 4) Close 39. A removable magnetic disc that holds information. 1) Floppy disk 2) Hard drive 3) Monitor 4) Portable 40. A command that saves what you are working on into the hard drive, or onto a disk. 1) View 2) Hold 60 | P a g e
[Pick the date]
41.
42.
43.
44.
[ESSC COMPUTER AWARENESS]
3) Save 4) Go What are bas, doc, and html examples of ? 1) Extensions 2) Domains 3) Protocols 4) Databases Ctrl, Shift and alt are called _______keys 1) Adjustment 2) Function 3) Modifier 4) Alphanumeric Which type of file is created by word processing programs? 1) Database file 2) Storage file 3) Worksheet file 4) Document file 5) Graphical file Personal computers can be connected together to form a ________. 1) Server 2) Super Computer 3) Network 4) Enterprise
45. A modem 1) Translates analog signals from a computer into digital signals that can travel along conventional telephone lines. 2) Translates digital signals from a computer into analog signals that, can travel along conventional telephone lines 3) Demodulates digital signals from a computer 4) Modulates signals from an analog telephone line 46. A CD – ROM disk 1) Can not be erased and rewritten 2) Has more storage capacity than a CD – R 3) Holds less data than a floppy disk 4) Can be written to only once 47. What is the main folder on a storage device called? 1) Platform 2) Interface 3) Root Directory 61 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
4) Home page 48. Storage device found inside the computer. 1) CD – ROM 2) Zip Disk 3) Super Disk 4) Hard Disk 49. Which of these keys Is not on the number keypad? 1) Ctrl 2) Del 3) Enter 4) Num lock 50. If you are going to a site you use often, instead of having to type in the address every time, you should. 1) Save it as a file 2) Make a copy of it 3) Bookmark it 4) Delete it
Answer key 6. (3) 2.(1) 10.(1) 11.(4) 19.(3) 27.(4) 35.(4) 43.(4)
3.(3)
4.(3)
5.(4)
6.(3)
7.(4)
8.(3)
9.(2)
12.(3) 20.(2) 28.(2) 36.(1) 44.(3)
13.(3) 21.(3) 29.(4) 37.(2) 45.(*)
14.(4) 22.(2) 30.(1) 38.(4) 46.(1)
15.(2) 23.(2) 31.(1) 39.(4) 47.(3)
16.(2) 24.(3) 32.(2) 40.(3) 48.(4)
17.(1) 25.(4) 33.(1) 41.(1) 49.(1)
18.(1) 26.(1) 34.(4) 42.(2) 50.(3)
62 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 10 1. A gateway is 1) A device e that enables users to send information simultaneously over a network without slowing down transmission. 2) An electronic device that connects several computing devices to a network 3) A point in one network that is an entrance point to another network 4) A device that links two or more segments of a network and helps direct traffic 2. A processor that collects the transmissions form several communications media and sends them over a single line that operates at a higher capacity it called _________ 1) Multiplexor 2) Bridge 3) Hub 4) Router 3. Bandwidth refers to _________ 1) The cost of the cable required to implement a WAN 2) The cost of the cable required to implement a LAN 3) The amount of information a peer to peer network can store 4) The amount of information a communication medium can transfer in a given amount of time 4. Main memory works in conjunction with ________ 1) Special functions cards 2) RAM 3) CPU 4) Intel 5. Device drivers are 1) Tiny power cords for external storage devices 2) Experts who know to maximize the performance of devices 3) Small, special purpose program 4) The innermost part of the operating system 6. Which of the following places the common data elements in order form smallest to largest? 1) Character, file record, field, database 2) Character. Record, field, database 3) Character , field, record, file, database 4) Bit, byte, character, record, field, file, database 7. When you make graph and picture in document, then your computer holds the data in ________ 1) Restore file 2) Backup drive 3) Clipboard 4) Memory 8. How will works appear on the page? we call it as 1) Text formatting 2) Character formatting 63 | P a g e
[Pick the date]
9.
10.
11.
12.
13.
14.
15.
16.
[ESSC COMPUTER AWARENESS]
3) Point size 4) Type face Which key is used in combination with another key to perform a special task? 1) Function 2) Control 3) Arrow 4) Space bar The real business and competitive value of information technology lies in 1) The software applications that are used by many companies 2) The capabilities of the software and value of the information a business acquires and uses 3) The infrastructure of hardware, networks and other IT facilities that are commonly used by many companies 4) The capabilities of the hardware and the speed a which it processes information In the binary language each letter of the alphabet each number and each special character is made up of a unique combination of ________ 1) Eight bytes 2) Eight kilobytes 3) Eight characters 4) Eight bits The number of pixels displayed on a screen is known as the screen _________ 1) Resolution 2) Color depth 3) Refresh rate 4) Viewing size Word processing, spreadsheet, and photo-editing are examples of ________ 1) Application software 2) System software 3) O/S software 4) Platform software Which function calculates the largest value in a set of numbers? 1) Average 2) Count 3) Minimum 4) Maximum What are the effects of mixing RAM modules with different speed ratings? 1) The system runs at the speed of the slowest RAM stick 2) The system runs normally 3) The system runs at the speed of the memory bus 4) The system may not run, or it crashed periodically The human-readable version of a program is called _________ 1) Source code 2) Program code 3) Human code 4) System code 64 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
17. A _______ computer (also referred to as a laptop) is a small, light weight personal computer that incorporates the screen, the keyboard, storage, and processing components into a single portable unit. 1) Notebook 2) Journal 3) Diary 4) Briefcase 18. What is the name of the protocol use d to eliminate loops? 1) Switching 2) ISL 3) Frame tagging 4) Spanning Tree Protocol 19. A Complier ________ 1) Translates machines language into high level language 2) Translates one statement at a time as the program executes 3) Translates two statements at a time as the program executes 4) Produces object code 20. Digital photos and scanned images are typically stored as ______ graphics with extensions such as bomp, png, jpg, tif, or gif. 1) Vector 2) Bitmap 3) Either vector bitmap 4) Neither vector bitmap 21. What is the best way to have a data and the slide number appear on every slide? 1) Choose Tools, Header and Footer, click Slide tab, select the desired options, click Apply to All 2) Choose Insert, Header and Footer, click Slide tab, select the desired options, click Apply to All 3) Choose View, Header and Footer, click Slide tab, select the desired options, click Apply to All 4) Choose File, Header and Footer, click Slide tab, select the desired options, click Apply to All 22. System software is the set of programs that enables your computers hardware devices and _______ software to work together. 1) Management 2) Processing 3) Utility 4) Application 23. Select the odd one out 1) Interpreter 2) Operating system 3) Compiler 4) Assembler 24. Which one amongst them is not an inter network? 1) MAN 65 | P a g e
[Pick the date]
25.
26.
27.
28.
29.
30.
31.
32.
[ESSC COMPUTER AWARENESS]
2) WAN 3) LAN 4) All are internet networks A _______ is a design tool that graphically shows the logic in a solution algorithm 1) Flowchart 2) Hierarchy chart 3) Structure Chart 4) Context Diagram A multi – purpose window which opens nearly for everything is 1) Main desktop 2) Explorer window 3) Browser window 4) Error window The feature to customize your desktop to display information that you can update from the internet is 1) Active desktop 2) Online desktop 3) E – mail 4) Resource Sharing Computer “virus” is a 1) Hardware 2) Windows tool 3) Computer Program 4) Both (2) and (3) What is “write”? 1) Text editor 2) Word processor 3) Line editor 4) All of the above What is an operating system? 1) It is an interface between user and the computer 2) It manages all resources 3) It does all process management tasks 4) All of the above Factor making windows popular is? 1) Multi tasking capacity 2) Desktop features 3) User friendly GUI features 4) Being inexpensive A series of specially designed documents, which are all linked to be viewed on internet, is called: 1) World wide web 2) Web server 3) Search engine 4) Both 2 and 3 66 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
33. Minimize window, what it means? 1) Close the window 2) Make it an icon and store on taskbar 3) Close window after saving its contents 4) Shut down the computer 34. Software design for a specific purpose is called as 1) Specific program 2) Application program 3) System program 4) Assembly program 35. A standard code used to exchange information among data processing and communication systems, which is __________ 1) ACM 2) ASCII 3) APL 4) ANSI 36. A unit for measuring data transmission speed is called as 1) Cache 2) Broad band channels 3) Byte 4) Baud 37. A storage device used to compensate for the differences in rates of flow of data from one device to another is 1) Buffer 2) Channel 3) Call 4) Chip
38. A device that generates the periodic signals used to control the timing of all CPU operation is 1) COM 2) Collate 3) Chip 4) Clock 39. A processing complex consisting of two or more interconnected computer is 1) Computer network 2) Control program 3) Cybernetics 4) CAI 40. The comprehensive software system that builds, maintains and provides access to a database 1) CPU 2) DASD 3) CAI 67 | P a g e
[Pick the date]
41.
42.
43.
44.
45.
46.
47.
48.
49.
[ESSC COMPUTER AWARENESS]
4) DBMS The components that process data are located in the 1) Input devices 2) Output devices 3) System unit 4) Storage component Processing involves ______ 1) Input in data into a computer system 2) Transforming input into output 3) Displaying output in a useful manner 4) Providing relevant answers Programs form the same developer, sold bundled together, that provide better integration and share common features, toolbars, and menus are known as _________ 1) Software suites 2) Integrated software packages 3) Software processing packages 4) Personal information managers A data warehouse is which of the following? 1) Can be updated by end users 2) Contains numerous naming conventions and formats 3) Organized around important subject areas 4) Contains only current data _______ Servers store and manage files for network users. 1) Authentication 2) Main 3) Web 4) File The OSI model is divided into ________ processed called layers. 1) Five 2) Six 3) Seven 4) Eight System software is the set of programs that enable your computer’s hardware devices and _____ software to work together. 1) Management 2) Processing 3) Utility 4) Application ________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat. 1) Notebook computers 2) Cellular telephones 3) Robotic computers 4) Mainframes The following are all mobile computing devices, except _________ 68 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
1) Note book computers 2) Cellular telephones 3) Digital scanners 4) Personal digital assistants 50. This part of the O/S manages the essential peripherals, such as the keyboard, screen, disk drives, and parallel land serial ports _______ 1) Basic input/output system 2) Secondary input/output system 3) Peripheral input/output system 4) Marginal input/output system
Answer key 7. (3) 2.(1) 10.(2)
3.(4)
4.(3)
5.(3)
6.(3)
7.(4)
8.(1)
9.(2)
11.(4) 12.(1) 13.(1) 14.(4) 15.(4) 16.(1) 17.(1) 18.(4) 19.(4) 20.(2) 21.(2) 22.(4) 23.(2) 24.(3) 25.(1) 26.(2) 27.(2) 28.(3) 29.(1) 30.(4) 31.(3) 32.(1) 33.(2) 34.(2) 35.(2) 36.(4) 37.(1) 38.(4) 39.(1) 40.(4) 41.(3) 42.(2) 43.(2) 44.(3) 45.(3) 46.(3) 47.(4) 48.(2) 49.(3) 50.(3)
69 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 11
1. An error is also known as_____ a. Bug b. Debug] c. Cursor d. Icon 2. A keyboard is this kind of device_____ a. Black b. Input c. Output d. Word processing 3. Arithmetic operations______ a. Involve matching one data item to another to determine if the first item i9s greater then, Equal to or less than the other item. b. Sort data items according to standard, predefined criteria in ascending order or Descending order c. Use conditions with operators such as AND, OR, and NOT d. Include addition, subtraction, multiplication, and division. 4. Which part of the computer helps to store information? a. Disk drive b. Keyboard c. Monitor d. Printer 5. Which of the following is the default mask of a class AIP address? a. 255.0.0.255
70 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
b. 255.255.0.0 c. 255.0.0.0 d. 255.255.255.0 6. What is internet 2? a. A new type of cabling system for wide area networks b. A second local area network that can connect with another online AN To share access c. A new standard for internet browsers d. An association to develop advanced Internet technology 7. To drop a column that is used as a foreign key, first a. Drop the primary key b. Drop the table c. Drop the foreign key constrain d. All of these 8. The name given to a document by user is called a. Filename b. Program c. Data d. Record 9. _____ is a procedure that requires users to enter as identification code and a matching password. a. Paging b. Logging on c. Time sharing d. Multitasking 10. Which device is used as the standard pointing device is a graphical user environment? a. Keyboard b. Mouse 71 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
c. Joystick d. Trackball 11. The assistant is_____ a. An application that allows you to take notes and save them in a file b. An animated character that provides help and suggestions c. A button on the standard toolbar that executes the print command d. A collection of frequently misspelled words in a dictionary file 12. A CPU contains_____ a. A card reader and a printing device b. An analytical engine and a control unit c. A control unit and an arithmetic logic unit d. An arithmetic logic unit and a card reader 13. The ability of an OS to run more than one application at a time is called_____ a. Multitasking b. Object oriented programming c. Multi user computing d. Time sharing 14. Permanent instructions that the computer uses when it is turned on and that cannot be Changed by other instructions are contained in____ a. ROM b. RAM c. ALU d. REM 15. What are .bas, .doc, and .htm examples of? a. Databases b. Extensions c. Domains
72 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
d. Protocols 16. Which type of software manages the computer processes, functioning as an interface, connecting user, the application software and the hardware? a. System software b. Utility program c. Translator program d. Operating program 17. The portion of the CPU that coordinates the activities of all the other computer components is the a. Motherboard b. Coordination board c. Control unit d. Arithmetic logic unit 18. Something which has easily understood instructions is said to be________ a. User friendly b. Information c. Word processing d. Icon 19. The primary device that a computer uses to store information is a. TV b. Storehouse c. Desk d. Hard drive 20. A program that works like a calculator for keeping track of money and making budgets. a. Calculator b. Spreadsheet c. Budgeter d. Financier
73 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
21. What menu is selected to print? a. File b. Tools c. Social d. Edit 22. Programs or a set of electronic instructions that tell a computer what to do_____ a. Menu b. Monitor c. Hardware d. Software 23. ______are symbols that represent any character or combination of characters. a. Playing cards b. Wildcards c. Private keys d. Public keys 24. A word in a web page that, when clicked, opens another document. a. Anchor b. Hyperlink c. Reference d. URL 25. The ______also called the WEB contains billons of documents. a. World Wide Web b. HTTP c.Webportal d. Domain 26. Windows 95, windows 98 and Windows NT are known as a. Processors
74 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
b. domain names c. modems d. operating systems 27. Information on a computer is stored as a. analog data b. digital data c. modem data d. watts data 28. A program that works like a calculator for keeping track of money and making budgets____ a. calculator b. scholastic c. keyboard d. spreadsheet 29. ________ is processed by the computer into information a. numbers b. processor c. input d. data 30. To find and load a file that has been saved______ a. select the close command b. select the new command c. select the save command d. select the open command 31. = SUM(B1:B8) is an example of a ________ a. function b. formula c. cell address
75 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
d. value 32. Which of the following storage media provides sequential access only? a. floppy disk b. magnetic disk c. magnetic tape d. optical disk 33. In a spreadsheet, a _______ is a number you will use in a calculation. a. label b. cell c. field d. value 34. Click _____ check box of transition in a slide group of an animation tab if you want to move a Slide automatically alters stipulated time. a. Transition timer b. Automatically after c. Transition after d. Automatic timer 35. All of the following are included in removable media excepta. CD ROMs b Diskette c. DVDs d. Hard disk drive 36. _____ cells involve creating a single cell by combining two or more selected cells. a. formatting b merging c. embedding d. splitting 76 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
37. The operating system is the most common type of _____ software. a. communication b. application c. systems d. word processing 38. Which of the following is true? a. byte is a single digit in a binary number b. bit represents a grouping of digital numbers c. eight digit binary number is called a byte d. eight digit binary number is called a bit 39. If 20 people need to communicate using symmetric key cryptography, symmetric keys are Needed. a. 190 b. 200 c. 20 d. 19 40. What should you do as soon as you have successfully created the database and the data dictionary? a. Open the database for users to start adding data b. Start adding a bunch of table spaces to allow users to use c. Leave it running for a few days to make sure that nothing bad is going to happen d. shut it down and take a cold backup 41. The process of preparing a floppy diskette for use is called_______ a. assembling b. translating c. parsing d. formatting 42. Which is the slowest internet connection service? 77 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
a. digital subscriber line b. TI c. Cable modem d. Leased line e. Dial up service. 43. Every component of your computer is either a. software or CPU/RAM b. hardware or software c. application software or system software d. input devices or output devices 44. Checking that a pin code number is valid before it is entered into the system is an Example of a. Error correction b. Backup and recovery c. Data preparation d. Data validation 45. How many different documents can you have open at any one time? a. not more than three b. only one c. as many as your computer memory will hold d. no more than your taskbar can display 46. What happens when you press Ctrl + V key? a. A capital V letter is typed into your document at the cursor point b. The selected item is pasted from the clipboard c. The selected item is pasted to the clipboard d. the selected drawing objects are distributed vertically on the page. 47. What do you press to enter the current date in a cell?
78 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
a. CTRL +; (semicolon) b. CTRL + SHIFT +: (colon) c. CTRL +F10 d. CTRL + F11 48. IT stands for______ a. Information technology b. Integrated technology c. Intelligent Technology d. Interesting Technology 49. Something which has easily understood instructions is said to be____ a. user friendly b. information c. word processing d. icon 50. Micro computer hardware consists of three basic categories of physical equipment_____ a. keyboard, monitor, hard drive b. system unit, input/output, memory c. system unit, input/output, secondary storage d. system unit, primary storage, secondary storage
Answer key 8. (a) 2.(b) 10.(b)
3.(d)
4.(a)
5.(c)
6.(d)
7.(c)
8.(a)
9.(b)
11.(b) 12.(c) 13.(a) 14.(a) 15.(b) 16.(d) 17.(c) 18.(a) 19.(d) 20.(b) 21.(a) 22.(d) 23.(b) 24.(b) 25.(a) 26.(d) 27.(b) 28.(d)
79 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS] 29.(d) 30.(d) 31.(b) 32.(c) 33.(d) 34.(b) 35.(d) 36.(b) 37.(c) 38.(c) 39.(a) 40.(b) 41.(d) 42.(e) 43.(b) 44.(c) 45.(c) 46.(b) 47.(a) 48.(a) 49.(a) 50.(b)
80 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 12 1. The primary output device for computers is a a. Video monitor b. Printer c. keyboard d. mouse 2. A directory within a directory is called a. Mini Directory b. Junior Directory c. Part Directory d. Sub Directory 3. Compatibility in regard to computers refers to a. The software doing the right job for the user b. It being versatile enough to handle the job c. The software being able to run on the computer d. Software running with other previously installed software 4. When you save in the following the data would remain intact even after turning off computer? a. RAM b. Motherboard c. Secondary Storage Device d. Primary Storage Device 5. SMPT, FTP and DNS are application of the ----- layer a. Data link b. Network c. Transport d. Application 6. Which of the following is not a common feature of software applications? a. Menus b. Windows c. Help d. Search 7. In MICR, C Stands for a. Code b. Color c. Computer d. Character 8. A ---- computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users a. Server b. Mainframes c. Desktop d. Tablet
81 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
9. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these operating systems, a track ball is described as --a. a roller ball which moves the cursor b. a pen-shaped device which allows data to be entered through the CRT screen c. a figure which resembles a familiar office device d. an outdated input device 10. The --- folder retains copies of messages that you have started but are not yet ready to send a. Inbox b. Outbox c. Drafts d. Sent Items 11. The ability of an OS to run more than one application at a time is called a. Multitasking b. Object-oriented programming c. Multi-user computing d. Time-sharing 12. Example of non-numeric data is a. Employee address b. Examination score c. Bank balance d. All of the above 13. Coded entries which are used to gain access to a computer system are called a. Entry codes b. Passwords c. Security commands d. Code words 14. To move to the bottom of a document, press a. Insert key b. Home key c. Ctrl key + End key d. End key 15. A device that is connected to the motherboard is a. Called an external device b. Called an adjunct device c. Called a peripheral device d. Must connect using ribbon cable 16. Storage and memory differ with respect to which of the following characteristics? a. Price b. Reliability c. Speed d. All of the above 17. What are the two examples of freeware? a. WinZip and Linux b. Shareware and file sharing c. Microsoft word and the Google toolbar 82 | P a g e
[Pick the date]
18.
19.
20.
21.
22.
23.
24.
25.
[ESSC COMPUTER AWARENESS]
d. Instant messaging and the Google toolbar e. Microsoft Power Point and Microsoft Excel What is e-commerce? a. Buying and selling of international goods b. Buying and selling of products and services over the internet c. Buying and selling of products and services not found in stores d. Buying and selling of products having to do with computers e. Buying and selling of electronic goods The --- tells the computer how to use its components. a. Utility b. Network c. Operating System d. Application program A --- contains buttons and menus that provide quick access to commonly used commands a. Menu bar b. Tool bar c. Window d. Action bar Which of the following displays the contents of active cell? a. Tool bar b. Menu bar c. Name box d. Formula bar What type of program controls the various computer parts and allows the user to interact with the computer? a. Utility software b. Operating software c. Word processing software d. Database program What is backup? a. Adding more components to your network b. Protecting data by copying it from the original source to a different destination c. Filtering old data from the new data d. Accessing data on tape Network components are connected to the same cable in the --- topology. a. Star b. Ring c. Bus d. Mesh e. Mixed Which of the following is the largest unit of storage? a. GB b. KB c. MB d. TB 83 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
26. Any letter, number, or symbol found on the keyboard that you can type into the computer a. Output b. Character c. Type d. Print 27. Most of the commonly used personal computers/laptops do not have a command key known as a. Turnover b. Shift c. Alter d. Delete e. Insert 28. What is the full form of USB as used in computer related activities a. Universal Security Block b. Ultra Serial Block c. Universal Service Block d. Universal Serial Bus 29. LAN stands for a. Local Access Network b. Logical Access Network c. Local Area Network d. Logical Area Network 30. Softcopy is the intangible output, so then what is hardcopy? a. The physical parts of the computer b. The printed parts of the computer c. The physical output devices d. The printed output 31. The “desktop” of a computer refers to a. The visible screen b. The area around the monitor c. The top of the mouse pad d. The inside of a folder 32. What type of resource is most likely to be shared common resource in a computer network a. Keyboards b. Speakers c. Floppy disk drives d. Printers 33. Pick the odd one a. Mouse b. Scanner c. Printer d. Keyboard 34. Programs designed specifically to address general purpose applications and special purpose application are called a. Operating system 84 | P a g e
[Pick the date]
35.
36.
37.
38.
39.
40.
41.
42.
[ESSC COMPUTER AWARENESS]
b. System software c. Application software d. Management information systems A series of instructions that tell a computer what to do and how to do it is called a a. Program b. Command c. User response d. Processor When you are working on a document on PC, where is the document temporarily stored a. RAM b. ROM c. The CPU d. Flash Memory e. The CD-ROM How are data organized in a spreadsheet a. Lines and spaces b. Layers and planes c. Height and width d. Rows and columns Magnetic tape is not practical for applications where data must be quickly recalled because tape is a. A random access medium b. A sequential access medium c. A read only medium d. Fragile and easily damaged Which is the part of a computer that one can touch and feel a. Programs b. software c. Hardware d. Output Computers gather data, which means they allow users to – data a. Present b. Store c. Output d. Input What is the purpose of software documenting a. Use and maintenance of software b. To sell software at handsome price c. To sell software to many customers d. To show its importance During the --- portion of the Information processing cycle, the computer acquires data from some source a. Storage and output b. Storage c. Input 85 | P a g e
[Pick the date]
43.
44.
45.
46.
47.
48.
49.
50.
[ESSC COMPUTER AWARENESS]
d. Output The --- of software contains lists of commands and options a. Menu bar b. Tool bar c. Title bar d. Formula bar A --- can make it easier to play games a. Mouse b. Joystick c. Keyboard d. Pen Housing all hardware, software, storage, and processing in one site location is called a. Time-sharing b. A distributed system c. Centralized processing d. A host computer OCR stands for a. Optical Character Recognition b. Optical CPU Recognition c. Optimal Character Rendering d. Other Character Restoration If a new device is attached to a computer, such as a printer or scanner, its ---- must be installed before the device can be used. a. Buffer b. Driver c. Pager d. Server Which of the following best explains e-governance? a. Improving the function of Government b. Teaching Government employees the basics of computing c. Delivery of public services through internet d. Framing of cyber-laws of chatting on internet To send another station a message, the main thing a user has to know is a. How the network works b. The other station’s address c. Whether the network is packet-switched or circuit-switched d. Whether this is a voice or data network Smart card is a. Special purpose cards b. Microprocessor cards c. Processing unit contains memory for storing data d. Processing unit for software handling
86 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Answer key 9. (a) 2.(d) 10.(c)
3.(d)
4.(c)
5.(d)
6.(b)
7.(d)
8.(b)
9.(a)
11.(a) 12.(d) 13.(b) 14.(c) 15.(c) 16.(d) 17.(d) 18.(b) 19.(c) 20.(b) 21.(d) 22.(b) 23.(b) 24.(c) 25.(d) 26.(b) 27.(a) 28.(d) 29.(b) 30.(c) 31.(a) 32.(d) 33.(c) 34.(c) 35.(a) 36.(a) 37.(d) 38.(b) 39.(c) 40.(d) 41.(a) 42.(c) 43.(a) 44.(b) 45.(d) 46.(*) 47.(b) 48.(c) 49.(b) 50.(d)
87 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 13 1. Which of the following statements is true concerning? a. Virtual memory is the space on the hard drive where the operating system begins to store data when it becomes memory-bound b. Accessing data from RAM is a slower than accessing data from virtual memory c. When it is using virtual memory, the operating system builds a file called the RAM file d. If a computer is memory-bound, adding more RAM will not solve the problem 2. The term bit is short for a. Megabyte b. Binary language c. Binary digit d. Binary number 3. All of the following terms are associated with spreadsheet software except a. Worksheet b. Cell c. Formula d. Virus detection 4. --- are devices used to transmit data over telecommunication lines a. Drives b. Drive bays c. Modems d. Platforms 5. A --- is approximately one billion bytes a. Kilobyte b. Bit c. Gigabyte d. Megabyte 6. Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves a. Open source vendors b. Alliances c. Application service providers d. All of the above 7. Which one of the following would be considered as a way that a computer virus can enter a computer system a. Opening an application previously installed on the computer b. Borrowed copies of software c. Viewing a website without causing any additional transactions d. Running antivirus programs 8. Collecting personal information and effectively posing as another individual is known as the crime of a. Spooling b. Identity theft 88 | P a g e
[Pick the date]
9.
10.
11.
12.
13.
14.
15.
16.
[ESSC COMPUTER AWARENESS]
c. Spoofing d. Hacking The first step in the transaction processing cycle is a. Database operations b. Audit c. Data entry d. User inquiry In the information systems concept, the output function involves a. Capturing and assembling elements that enter the system to be processed b. Transformation processes that covert input into output c. Transferring elements that have been produced by a transformation process to their ultimate destination d. Monitoring and evaluating feedback to determine whether a system is moving toward the achievement Where is the disk put in a computer a. In the hard drive b. In the disk drive c. Into the CPU d. In the modem The most common method of entering text and numerical data into a computer system is through the use of a --a. Plotter b. Scanner c. Printer d. Keyboard Which keys enable the input of numbers quickly a. Function keys b. The numeric keypad c. Ctrl, shift and alt d. Arrow keys Information that comes from an external source and is fed into computer software is called a. Input b. Output c. Throughput d. Reports A computer’s hard disk is a. An arithmetic and logical unit b. Computer software c. Operating system d. Computer hardware Which process checks to ensure the components of the computer are operating and connected properly a. Booting b. Processing c. Saving 89 | P a g e
[Pick the date]
17.
18.
19.
20.
21.
22.
23.
24.
25.
[ESSC COMPUTER AWARENESS]
d. Editing Unsolicited commercial email is commonly known as a. Spam b. Junk c. Hoaxes d. Hypertext ---- is processed by the computer into information a. Numbers b. Processor c. Input d. Data A website address is a unique name that identifies a specific ---- on the web a. Web browser b. Web site c. PDA d. Link A device that connects to a network without the use of cables is said to be a. Distributed b. Centralized c. Open source d. Wireless A menu contains a list of a. Commands b. Data c. Objects d. Reports Each ---- on a menu performs a specific action a. Client b. server c. node d. command To make a notebook act as a desktop model, the notebook can be connected to a ---- which is connected to a monitor and other devices a. Bay b. Docking station c. Port d. Network To print to find an individual item in a file immediately a. SHIFT + p b. CTRL + P c. ALT + P d. ESC + P The ability to find an individual item in a file immediately a. File allocation table b. Directory 90 | P a g e
[Pick the date]
26.
27.
28.
29.
30.
31.
32.
33.
34.
[ESSC COMPUTER AWARENESS]
c. Sequential access d. Direct access The first page of a web site is called the a. Home page b. Index c. Java script d. Book mark A telephone number, a birth date, and a customer name are all examples of a. A record b. Data c. A file d. A database Which of the following is not true about RAM? a. RAM is a temporary storage area b. RAM is the same as hard disk storage c. RAM is volatile d. Information stored in RAM is gone when you turn the computer off The --- performs simple mathematics for the CPU a. ALU b. DIMM c. BUS d. Register Control in design of an information system is used to a. Inspect the system and check that it is built as per specifications b. Ensure that the system processes data as it was designed to and that the results are reliable c. Ensure privacy of data processed by it d. Protect data from accidental or intentional loss A prescribed set of well-defined instructions for solving mathematical problems is called a. A compiler b. A code c. A description d. An algorithm A record is related to a file as a statement is related to a a. Procedure b. File c. Program d. Data The part of a computer that coordinates all its functions is called its a. ROM program b. System board c. Arithmetic logic unit d. Control unit The most common input devices are the --- and the --a. Microphone, printer 91 | P a g e
[Pick the date]
35.
36.
37.
38.
39.
40.
41.
42.
[ESSC COMPUTER AWARENESS]
b. Scanner, monitor c. Digital camera, speakers d. Keyboard, mouse To save an existing file with a new name or to a new location, you should use the --command a. Save b. Save and Replace c. Save As d. New file Which of the following is a common extension used in the file names for application programs a. EXE b. DIR c. TXT d. DOC Which of the following is not true about passwords a. A password should be a combination of mixed case alphanumeric characters b. Password should be maximum 6 characters in length c. A password that can be memorized easily should be used, so that it need not be noted down d. A password that can be typed quickly without much effort should be used Which one is easy to use a. User-friendly b. Select c. Helpful d. Ever-ready When your computer stops working suddenly, it is referred to as a a. Crash b. Die c. Death d. Penalty A program that converts a high-level language source file into a machine-language file is called a a. Translator b. Assembler c. Compiler d. Linker Which keys can be used together with other keys for special tasks a. Insert, Delete b. Ctrl, Shift c. Left Arrow, Right Arrow d. Page Up, Page Down The --- button on the quick access toolbar allows you to cancel your recent commands or actions. a. Search 92 | P a g e
[Pick the date]
43.
44.
45.
46.
47.
48.
49.
50.
[ESSC COMPUTER AWARENESS]
b. Cut c. Document d. Undo In MS-Access, a table can have --- primary key a. One b. Two c. Three d. Four --- software allows users to perform calculation on rows and columns of data a. Word processing b. Presentation graphics c. Database management system d. Electronic spreadsheet In a database, information should be organized and accessed according to which of these following a. Physical position b. Logical structures c. Data dictionary d. Physical structure A hard copy of a document is a. Stored in the hard disk b. Stored on a floppy c. Stored on a CD d. Printed on the printer What is the storage area for email messages called a. A folder b. A directory c. A mailbox d. The hard disk The altering of data so that it is not usable unless the changes are undone is a. Biometrics b. Compression c. Encryption d. Ergonomics A DVD-RAM is similar to a --- except it has storage capacities up to 5.2 GB a. CD-R b. Floppy disk c. CD-RW d. Hard-disk A proxy server is used for which of the following a. To provide security against unauthorized users b. To process client requests for web pages c. To process client requests for database access d. To provide TCP/IP
93 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Answer key 10. (a) 2.(c) 10.(a)
3.(d)
4.(c)
5.(c)
6.(c)
7.(c)
8.(c)
9.(c)
11.(b) 12.(d) 13.(b) 14.(a) 15.(d) 16.(a) 17.(a) 18.(d) 19.(d) 20.(d) 21.(a) 22.(d) 23.(b) 24.(b) 25.(c) 26.(a) 27.(a) 28.(b) 29.(a) 30.(b) 31.(d) 32.(c) 33.(d) 34.(d) 35.c() 36.(a) 37.(b) 38.(a) 39.(a) 40.(c) 41.(b) 42.(d) 43.(a) 44.(c) 45.(b) 46.(d) 47.(c) 48.(c) 49.(c) 50.(a)
94 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 14 1. A file extension is separated from the main file name with a(n) ---- but no spaces a. Question mark b. Exclamation mark c. Underscore d. period 2. What is an E-mail attachment a. A receipt sent by the recipient b. A separate document from another program sent along with an E-mail message c. A malicious parasite that feeds off your messages and destroys the contents d. A list of CC or BCC recipients 3. SMTP, FTP and DNS are applications of the --- layer a. Data link b. Network c. Transport d. Application 4. In a database, information should be organized and accessed according to which of the following a. Physical position b. Logical structure c. Data dictionary d. Physical structure 5. Which of these is a quick way to copy formatting from a selected cell to two other cells on the same worksheet a. Use CTRL to select all three cells, then click the paste button image button on the standard toolbar b. Copy the selected cell, then select the other two cells, click style on the format menu, then click modify c. Click format painter button image on the formatting toolbar twice, then click in each cell you want to copy the formatting to d. Use Alt to select all three cells, then click the paste button image button on the standard toolbar 6. How do you prevent emailed word documents from always opening in the Reading Layout a. From the Tools Menu>Options>General Tab>uncheck the ‘Allow starting in Reading Layout’ b. From the View Menu>Reading Layout>General Tab>uncheck the ‘Allow starting Reading Layout c. From the Format Menu>Auto format>Edit Tab>Edit Tab>uncheck the ‘Use with emailed attachments’ d. All of the above 7. Which of the following options is not a JSP implicit object a. Out b. In c. Response 95 | P a g e
[Pick the date]
8.
9.
10.
11.
12.
13.
14.
15.
16.
[ESSC COMPUTER AWARENESS]
d. Page In the straight CGI approach to database connectivity on the Internet a. The external program is located between the client and the web server b. The external program is located between the database server and the database c. The external program is located between the web server and the database server d. There is no external program Computers connected to a LAN can a. Run faster b. Share information and/or share peripheral equipment c. E-mail d. Go online While searching a website, you have been unable to find information that was on the site several months ago. What might you do to attempt to locate that information a. Visit Google’s cached page to view the older copy b. Forget about it, as there is no way to find this information c. Visit a partner site of the organization to see if it is there d. Use the way back machine For selecting or highlighting, which of the following is generally used a. Icon b. Keyboard c. Mouse d. Floppy Disk Which device is used to access your computer by other computer or for talk over phone a. RAM b. CD ROM Drive c. Modem d. Hard Drive Which type of memory is closely related to processor a. Main memory b. Secondary Memory c. Disk Memory d. Tape Memory ---- is a primary key of one file that also appears in another file a. Physical key b. Primary key c. Foreign key d. Logical key The technique that extends storage capacities of main memory beyond the actual size of the main memory is called a. Multitasking b. Virtual memory c. Multiprocessing d. Multiprogramming e. Switching The blinking symbol on the computer screen is called the 96 | P a g e
[Pick the date]
17.
18.
19.
20.
21.
22.
23.
24.
[ESSC COMPUTER AWARENESS]
a. Mouse b. Hand c. Light d. Cursor A word processor would most likely be used to do which of the following a. Keep an account of money spent b. Maintain an inventory c. Type a biography d. Do a computer search in the media centre Which of the following commands is used to select the whole document a. Ctrl + A b. Alt + F5 c. Shift + S d. Can’t be done The computer is made of which of the following hardware equipments a. Monitor, CPU (Central Processing Unit), Keyboard, Mouse, Software and Network b. Monitor, CPU (Central Processing Unit), Keyboard, Mouse, Programmed and Network c. Monitor, CPU (Central Processing Unit), Keyboard, Mouse, Printer and Modem d. Monitor, CPU (Central Processing Unit), Keyboard, Mouse, Applications and Network Where are programs and data kept while the processor is using them a. Main memory b. Secondary memory c. Disk memory d. Program memory ‘GUI’ stands for a. Gnutella Universal Interface b. Graphical User Interface c. Graphic Uninstall/Install d. General Utility Interface When sending an e-mail, the --- line describes the contents of the message a. Subject b. To c. Contents d. CC A(n) --- is a program that makes the computer easier to use a. Utility b. Application c. Operating System d. Network Microsoft Windows 7 is an example of --a. Utility software b. Network solution c. Application program d. Operating system 97 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
25. What is output a. What the processor takes from the user b. What the user gives to the processor c. What the processor gets from the user d. What the processor gives to the user 26. Copyrighted software that can be used for free is a. Shareware b. Freeware c. Groupware d. E-mail 27. The network connecting several computers all over the world is a. Intranet b. Internet c. Arpanet d. Network e. LAN 28. A blinking symbol on the screen that shows where the next character will appear is a/an a. Delete key b. Arrow key c. Cursor d. Return key 29. Sending an e-mail is similar to a. Picturing an event b. Narrating a story c. Writing a letter d. Creating a drawing 30. What are the four things required to connect to the Internet a. Telephone line, Modem, Computer and an ISP b. Modem, Computer, PDA and ISP c. Telephone line, PDA, Modem and Communication Software d. Monitor, Keyboard, Mouse and Modem 31. The abbreviation ISP stands for a. International Spy Project b. Indian Social Planning c. Initial Service Provider d. Internet Service Provider 32. Network components are connected to the same cable in the –topology. a. Star b. Ring c. Bus d. Mesh 33. A symbol on the screen that represents a disk, document or program that you can select a. Keys b. Caps c. Icon 98 | P a g e
[Pick the date]
34.
35.
36.
37.
38.
39.
40.
41.
42.
[ESSC COMPUTER AWARENESS]
d. Monitor This component is required to process data into information and consists of integrated circuits. a. Hard disk b. RAM c. CPU d. ROM There are several primary categories of procedures, which of the following is not a primary category of procedure a. Testing b. Backup and recovery c. Firewall development d. Design Data that is copied from an application is stored in the a. Driver b. Clipboard c. Terminal d. Prompt Every component of your computer is either a. Software or CPU/RAM b. Input devices or Output devices c. Application software or System Software d. Hardware or Software A collection of interrelated record is called a a. Management information system b. Spreadsheet c. Database d. Text file The ----- also called the Web, contains billions of documents a. Web Portal b. HTTP c. World Wide Web d. Domain Choose the web-browser among the following a. MSN Messenger b. Yahoo Messenger c. Rediffibal.net d. Netscape Navigator One advantage of dial-up Internet access is a. It utilizes broadband technology b. It utilizes existing telephone service c. It uses a router for security d. Modem speeds are very fast Office LANs that are spread geographically apart on a large scale can be connected using a corporate 99 | P a g e
[Pick the date]
43.
44.
45.
46.
47.
48.
49.
50.
[ESSC COMPUTER AWARENESS]
a. CAN b. LAN c. DAN d. WAN e. TAN Meaningful filename helps in easy file a. Storing b. Accessing c. Identification d. Printing The code for a Web page is written using a. Fifth generation language b. WinZip c. Hypertext Markup Language d. Perl e. URL Storage that retains its data after the power is turned off is referred to as a. Volatile storage b. Non-volatile storage c. Sequential storage d. Direct storage You can use the tab key to a. Move a cursor across the screen b. Indent a paragraph c. Move the cursor down the screen d. Only (1) and (2) ------- is approximately one thousand bytes a. 1 MB b. 1 GB c. 1 KB d. 1 TB What is the term for unsolicited e-mail a. Newsgroup b. Usenet c. Backbone d. Flaming e. Spam A computer checks the --- of user names and passwords for a match before granting access. a. Website b. Network c. Backup file d. Database Computers that are portable and convenient for users who travel are known as – a. Supercomputers b. Laptops 100 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
c. Minicomputers d. File servers
Answer key 11. (e) 2.(b) 10.(a)
3.(d)
4.(b)
5.(c)
6.(a)
7.(b)
8.(c)
9.(b)
11.(c) 12.(c) 13.(a) 14.(c) 15.(b) 16.(d) 17.(c) 18.(a) 19.(a) 20.(a) 21.(b) 22.(a) 23.(c) 24.(d) 25.(d) 26.(b) 27.(b) 28.(e) 29.(c) 30.(d) 31.(d) 32.(c) 33.(c) 34.(c) 35.(c) 36.(b) 37.(d) 38.(c) 39.(c) 40.(d) 41.(b) 42.(d) 43.(b) 44.(c) 45.(b) 46.(d) 47.(c) 48.(e) 49.(c) 50.(b)
101 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 15 1. A --- contains specific rules and words that express the logical steps of an algorithm a. Syntax b. Programming structure c. Programming language d. Logic chart 2. An example of a telecommunications device is a a. Keyboard b. Mouse c. Printer d. Modem 3. Virtual memory is --a. Memory on the hard disk that the CPU uses as extended RAM b. In RAM c. Only necessary if you do not have any RAM in your computer d. A backup device for floppy disks 4. A proxy server is used for which of the following a. To provide security against unauthorized users b. To process client requests for web pages c. To process client requests for database access d. To provide TCP/IP 5. All of the logic and mathematical calculation done by the computer happen in/on the a. System board b. Central Control Unit c. Central Processing Unit d. Memory 6. A(n)--- is composed of several computers connected together to share resources and data a. Internet b. Network c. Backbone d. Hyperlink e. Protocol 7. Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information a. Floppy diskette b. Hard disk c. Permanent disk d. Optical disk 8. The connection between your computer at home and your local ISP is called a. The last mile b. The home stretch c. The home page d. The backbone 9. ---- helps in capturing row data and entering into computer system 102 | P a g e
[Pick the date]
10.
11.
12.
13.
14.
15.
16.
17.
[ESSC COMPUTER AWARENESS]
a. CPU b. Integrated circuit c. Input device d. Motherboard Title bar, ribbon, status bar, views and document workspace are factors of --- program of words a. Windows b. Browser c. Explorer d. Website Which of the following converts all the statements in a program in the single batch and the resulting collection of instructions is placed in a new file a. Compiler b. Interpreter c. Converter d. Instruction A program that generally has more user-friendly interface than a DBMS is called a a. Front end b. Repository c. Back end d. Form When you install a new program on your computer, it is typically added to the --- menu a. All programs b. Select programs c. Start programs d. Desktop programs Which of the following contains information about a single ‘entity’ in the database like a person, place, event, or thing a. Query b. Form c. Record d. Table Which of the following is not a function of the control unit a. Read instructions b. Execute instructions c. Interpret instructions d. Direct operations The time it takes a device to locate data and instructions and make them available to the CPU is known as a. Clock speed b. A processing cycle c. CPU speed d. Access time --- controls the way in which the computer system functions and provides a means by which users can interact with the computer 103 | P a g e
[Pick the date]
18.
19.
20.
21.
22.
23.
24.
25.
26.
[ESSC COMPUTER AWARENESS]
a. The platform b. The operating system c. Application software d. The motherboard --- is the process of dividing he disk into tracks and sectors a. Tracking b. Formatting c. Crashing d. Allotting Which of the following is the largest unit of storage a. GB b. KB c. MB d. TB The blinking symbol on the computer screen is called the a. Mouse b. Logo c. Hand d. Cursor The ---- primarily take(s) care of the behind-the-scenes details and manage(s) the hardware a. Operating system b. Application software c. Peripheral devices d. Hard disk A ---- is a professionally designed ‘empty’ document that can be adapted to the user’s needs a. File b. Guide c. Template d. User guide file A(n) ---- contains commands that can be selected a. Pointer b. Menu c. Icon d. Button Microcomputer hardware consists of three basic categories of physical equipment a. Keyboard, Monitor, Hard Drive b. System unit, Input/ Output, Memory c. System unit, Input/output, Secondary storage d. System unit, primary storage, secondary storage A piece of hardware that is used to enter information into the computer by using keys is a. Keyboard b. Monitor c. Hard disk d. Icon WWW means 104 | P a g e
[Pick the date]
27.
28.
29.
30.
31.
32.
33.
34.
[ESSC COMPUTER AWARENESS]
a. World Wide Wonder b. World Wide Wizard c. World Wide Web d. Wide World Web --- processing is used when a large mail-order company accumulates orders and processes them together in one large set a. Batch b. Online c. Real-time d. Group What is the different between a CD-ROM and a CD-RW a. They are the same-just two different terms used by different manufacturers b. A CD-ROM can be written to and a CD-RW cannot c. A CD-RW can be written too, but a CD-ROM can only be read from d. A CD-ROM holds more information than a CD-RW Which of the following is not the major function of a computer a. Processing data into information b. Storing data or information c. Modifying data d. Analyzing data or information A repair for a known software bug, usually available at no charge on the internet, is called a(n) a. Version b. Patch c. Tutorial d. FAQ Which type of memory holds only the program and data that the CPU is presently processing a. CMOS b. ROM c. RAM d. ASCII When you cut or copy information it gets place in the a. Clipart b. Clipboard c. Internet d. Motherboard If you wanted to locate the hardware address of a local device, which protocol would you use a. ARP b. RARP c. ICMP d. PING e. PONG The name of the location of particular piece of data is its a. Address 105 | P a g e
[Pick the date]
35.
36.
37.
38.
39.
40.
41.
[ESSC COMPUTER AWARENESS]
b. Memory name c. Storage site d. Data location Which of the following operating systems is not owned and licensed by a company a. Unix b. Linux c. Windows 2000 d. Mac Excel stores its document in form of files which is called a. Worksheets b. Workbooks c. Notebooks d. Excel sheets A symbol or question on the screen that prompts you to take action and tells the computer what to do next a. Scanner b. Questionnaire c. Prompt and dialog box d. Information seeker --- view shows how the contents on printed page will appear with margin, header and footer a. Draft b. Full Screen Reading c. Outline d. Page Layout How do you print your slides in a handout that includes lines for notes a. In the print dialog box, select Handouts and set the number of slides per page to 3 b. In the print dialog box, select Handouts and a number of slides per page, then select the include comment pages option c. In the print dialog box, select notes pages instead of Handouts d. It cannot be done Suppose you have columns of data that span more than one printed page, how can you automatically print the column headings on each page a. Click Page Setup on the File menu, click the Sheet tab, and enter the row that contains these column headings under print titles b. Click Page Setup on the File menu, click the Page tab, click the Options button, then enter your choices c. Click Page Setup on the File menu, click the Sheet tab, and make a selection under the Print heading d. Click Page Preview on the File menu, click the Sheet tab, and enter the row that contains these column headings under Print titles What menu is selected to cut, copy and paste a. File b. Edit c. Tools d. Table 106 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
42. Personal computers are connected to form a. Server b. Super computer c. Network d. Enterprise 43. What does remain in Ram when computer is turned off a. Operating System b. BICS c. Software Application d. Nothing 44. Information travels between components on the motherboard through a. Flash memory b. CMOS c. Bays d. Buses e. Peripherals 45. One megabyte equals approximately a. 1,000 bits b. 1,000 bytes c. 1 million bytes d. 1 million bits e. 2,000 bytes 46. In a relational database, this is a data structure that organizes the information about a single topic into rows and columns a. Block b. Record c. Tuple d. Table e. Command line interface 47. Every computer has a(n) ---- many also have ---a. Operating System; a client system b. Operating system; instruction sets c. Application programs; an operating system d. Application programs; a client system e. Operating system; application programs 48. The --- manual tells you how to use a software program a. Documentation b. Programming c. Technical d. User 49. For seeing the output, you are a. Monitor b. Keyboard c. Mouse d. Scanner 107 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
50. CDs are of which shape a. Square b. Rectangular c. Round d. Hexagonal
Answer key 12. (c) 2.(d) 10.(a)
3.(a)
4.(a)
5.(d) 6.(b)
7.(b)
8.(c)
9.(c)
11.(a) 12.(d) 13.(a) 14.(c) 15.(d) 16.(d) 17.(b) 18.(b) 19.(d) 20.(d) 21.(a) 22.(c) 23.(b) 24.(b) 25.(a) 26.(c) 27.(a) 28.(c) 29.(d) 30.(b) 31.(c) 32.(b) 33.(d) 34.(a) 35.(b) 36.(b) 37.(c) 38.(d) 39.(b) 40.(a) 41.(b) 42.(c) 43.(d) 44.(d) 45.(c) 46.(d) 47.(e) 48.(d) 49.(a) 50.(c)
108 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set: 16 1. The simultaneous execution of two or more instructions is called a. Sequential access b. Reduced instruction set computing c. Multiprocessing d. Disk mirroring. 2. Multiprogramming systems: a. Are easier to develop than single programming systems. b. Execute each job faster. c. Execute more jobs in the same time period d. Use only one large mainframe computer 3. Which device can understand the difference between data and progrms? a. Input device b. Output device c. Memory d. Microprocessor 4. Which of the following devices has a limitation that we can only read it but Cannot erase or modify it? a. Tape drive b. Hard disk c. Compact disk d. Floppy disk 5. Which of the following is not an output device? a. Plotter b. Printer c. Monitor d. Touch screen e. None of these 6. What kind of scheme is the HTTP protocol? a. Get/put b. Store/forward c. Queuing d. Request/response 7. What type of error does a memory parity error create? a. A fatal exception error b. An NMI error c. A corrupt windows operating system file d. A GPF error e. A GPA error 8. Which is not a part of the Oracle database block? 109 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
a. Header b. Row directory c. Data d. Free lists 9. Which of the following cannot be used as the scope when using a JavaBean with JSP? a. Page b. Request c. Session d. Application e. Response 10. Which of the following is used for integrity? a. DES b. Daffy-Hellman c. SED d. AES e. MDS 11. Devices that let the computer communicate with you a. Input b. Output c. Type d. Print 12. Devices that allow you to put information into the computer. a. Input b. Output c. Type d. Print 13. Eight bits of data a. Octabit b. Word c. Sentence d. Byte 14. The secret code that gives you access to some progress a. Clue b. Cue c. Password d. Help 15. The different style of lettering in a word processing program. a. Font b. Calligraphy c. Writing 110 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
d. Manuscript 16. An example of a processing device would be a. A magnetic ink reader b. A tablet PC c. Special function cards d. Scanners. 17. Which of the following is not a type of computer software which can be bought? a. Off – the – shelf b. Tailor - made c. Custom – developed d. Off - the – shelf with alterations e. All of these can be purchased 18. You can use _______ to copy selected text, and _______ to paste it in a document. a. CTRL + C, CTRL + V b. CTRL + C, CTRL + P c. CTRL + S, CTRL + S d. SHIFT + C, ALT + P e. CTRL + D, CTRL + A 19. Video processors consist of __________ and _________ , which store and process images. a. CPU, VGA b. CPU, memory c. VGA, memory d. VGI, DVI e. VGA, VGI 20. The main memory of a computer can also be called a. Primary storage b. Internal storage c. Primary memory d. All of these 21. Use the _________, to choose a slide layout. a. Quick styles gallery b. Format gallery c. Layout gallery d. Layout collection 22. A saved document is referred to as a_________ a. File b. Word c. Folder d. Project 111 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
23. A _________ is a collection of computers and device connected together. a. Protocol b. Memory card c. Network d. Central processing unit 24. The most common subtotal used subtotals command is the ______ function, which causes Excel to display a sum each time the control field change. a. ADD b. SUM c. TOTAL d. LIST 25. In DOS, which of the following command is used to delete all the files as well as sub – directories of a directory? a. Delete b. Del c. Deltree d. Move 26. Errors in a computer program are referred to as_______ a. Bugs b. Mistakes c. Item overlooked d. Blunders 27. A compiler is used to translate a program written in _______ a. A low level language b. A high level language c. Assembly language d. Machine language 28. Computer programs are also known as________ a. Operating systems b. Documents c. Peripherals d. Applications 29. Which of the following are computers that can be carried around easily? a. Laptops b. Supercomputers c. PCs d. Minicomputers 30. The secret code that restricts entry to some programs is ______ a. Entry code b. Passport c. Password 112 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
d. Access code 31. The _______ becomes different shapes depending on the task you are performing. a. Active tab b. Insertion point c. Mouse pointer d. Ribbon 32. Be default, Excel positions text in a cell_______ a. Left aligned b. Right aligned c. Centered d. Justified e. None of these 33. To centre a paragraph using shortcut keys, press a. CTRL + C b. CTRL + E c. CTRL + L d. CTRL + R 34. To print a document, press ________, then press ENTER a. SHIFT + P b. CTRL + P c. ALT + P d. ESC + P 35. Multiplexing involves ________ path and _______ channel. a. One, one b. One, multiple c. Multiple, one d. Multiple, multiple 36. To access properties of an object, the mouse technique to use is ______ a. Dragging b. Dropping c. Right clicking d. Shift clicking 37. A(n) __________ is a program that makes the computer easier to use. a. Operating system b. Application c. Utility d. Network 38. Connections to the internet using a phone line and a modem are called_______ Connections. a. Digital 113 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
b. Dial up c. Broadband d. Dish 39. To access a mainframe or supercomputer, users often use a ________ a. Terminal b. Node c. Desktop d. Handheld 40. Office LANs that are spread geographically apart on a large scale can be connected using a corporate ___________ a. CAN b. LAN c. DAN d. WAN e. TAN 41. Which is the part of a computer that one can touch and feel? a. Hardware b. Software c. Programs d. Output 42. This component is required to process data into information and consists of integrated circuits. a. Hard disk b. RAM c. CPU d. ROM 43. Which part of the computer displays the work done? a. RAM b. Printer c. Monitor d. ROM 44. The main jobs of a CPU is to ______ a. Carry out program instructions b. Store data/information for future use c. Process data and information d. Both 1 and 2 45. _________ are attempts by individuals to obtain confidential information from you by falsifying their identity. a. Phishing trips b. Computer viruses c. Special function cards 114 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
d. Scanners e. Keyboards. 46. A repair for a known software bug, usually available t no charge on the internet, is called a(n)_________ a. Version b. Patch c. Tutorial d. FAQ 47. Computers gather data, which means that they allow users to ________ data. a. Present b. Input c. Output d. Store 48. Which of the following terms is just the connection of networks that can be joined together? a. Virtual private network b. Internet c. Intranet d. Extranet 49. ____________ is a form of permanent memory that holds all the instructions the computer needs to start up and does not get erased when the power is turned off. a. The network interface card (NIC) b. The CPU c. RAM d. ROM 50. Servers are computers that provide resources to other computers connected to a______ a. Network b. Mainframe c. Supercomputers d. Client
Answer key 13. (c)
2.(c) 10.(e)
3.(d)
4.(a)
5.(e)
6.(d)
7.(b)
8.(d)
9.(e)
11.(b) 12.(a) 13.(d) 14.(c) 15.(a) 16.(b) 17.(b) 18.(a) 19.(b)
115 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS] 20.(a) 21.(b) 22.(a) 23.(c) 24.(b) 25.(a) 26.(a) 27.(b) 28.(d) 29.(a) 30.(c) 31.(c) 32.(e) 33.(b) 34.(b) 35.(b) 36.(c) 37.(c) 38.(b) 39.(a) 40.(d) 41.(a) 42.(d) 43.(c) 44.(d) 45.(a) 46.(b) 47.(d) 48.(b) 49.(d) 50.(a)
116 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 17 1. All of the following are examples of real security and privacy risks EXCEPT a. Hackers b. Spam c. Viruses d. Identity theft 2. A (n) _________ system is a small, wireless handheld computer that scans items, tags and pulls up the current price ( and any special offer) as you shop. a. PSS b. POS c. Inventory d. Data mining 3. Which of the following is NOT one of the four major data processing functions of a computer? a. Gathering data b. Processing data into information c. Analyzing the data or information d. Storing the data or information 4. Computers use the ____________ language to process data. a. Processing b. Kilobyte c. Binary d. Representational 5. Computers process data into information by working exclusively with a. Multimedia b. Words c. Characters d. Numbers 117 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
6. The term bit is short for a. Megabyte b. Binary language c. Binary digit d. Binary number 7. A string of eight 0s and one 1s is called a a. Megabyte b. Byte c. Kilobyte d. Gigabyte 8. A _________ is approximately one billion bytes. a. Kilobyte b. Bit c. Gigabyte d. Megabyte 9. SMTP, FTP and DNS are application of the _________ layer. a. Data link b. Network c. Transport d. Application 10. In a database, information should be organized and accessed according to which of the following? a. Physical position b. Logical structure c. Data dictionary d. Physical structure 11. A _______ is not a form of biometrics.
118 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
a. Fingerprint b. Password c. Retina scan d. Breath scan 12. References to each file on a disk are stored in a_________ a. File allocation table b. Root allocation table c. Linking directory d. Root directory 13. Buffering in printers is necessary because. a. A computer is fast in generating data for printing then printer can print it. b. There is not enough memory provided with printers c. It is only because to make printer work for more years d. Both 1 and 2 14. Assembly instructions are in the form of a. Binary digits b. In digits and numbers c. In general English d. In a new format different from all the above 15. Airlines reservation system is a typical example of a. Batch processing b. On line processing c. Real time processing d. All of the above. 16. Which of the following memories below is often used in a typical computer operation? a. RAM
119 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
b. ROM c. FDD d. HDD 17. Which of the following is not a logic gate? a. AND b. OR c. NOT d. NAT 18. ______ is the part of the computer that you can physically touch. a. Hardware b. A device c. A peripheral d. An application 19. The difference between people with access to computers and the internet and those without this access is known as the a. Digital divide b. Internet divide c. Web divide d. Broadband divide 20. DSL is an example of a (n) _____________ connection. a. Network b. Wireless c. Slow d. Broadband 21. ____________ is the study of molecules and structures whose size ranges from 1 to 100 Nanometers? a. Nano science b. Microelectrodes 120 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
c. Computer forensics d. Artificial intelligence 22. ____________ is data that has been organized or presented in Artificial Intelligence. a. A process b. Software c. Storage d. Information 23. The name for the way with which computers manipulate data into information is called a. Programming b. Processing c. Storing d. Organizing 24. Computers gather data, which means that they allow users to ________ data. a. Present b. Input c. Output d. Store 25. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered_______________ a. Data b. Output c. Input d. The process 26. A command that takes what has been typed into the computer and can be seen on the screen and sends it to the printer for output on paper ____________ a. Print b. Return 121 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
c. Jump d. Attention 27. A CPU contains __________ a. A card reader and printing device b. An analytical engine and control unit c. A control unit and an arithmetic logic unit d. An arithmetic logic unit and a card reader 28. Powerful key that lets you exit a program when pushed ______ a. Arrow keys b. Spacebar c. Escape key d. Return key 29. The ability of an OS to run more than one application at a time is called ________ a. Multitasking b. Object oriented programming c. Multi user computing d. Time sharing 30. Which of the following statements best describes the batch method of input? a. Data us processed as soon as it is input b. Data is input at the time it is collected c. Data is collected in the form of source documents, placed into groups, and then input to the computer d. Source documents are not used 31. The benefit of using computers is that a. Computers are very fast and can store huge amounts of correct b. Computers provide accurate output even when input is incorrect c. Computers are designed to be inflexible
122 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
d. All of the above 32. The function of CPU is a. To provide external storage of text b. To communicate with the operator c. To read, interpret and process the information and instruction d. To provide a hard copy 33. What characteristic of read only memory (ROM) makes it useful? a. ROM information can be easily updated b. Data in ROM is nonvolatile, that is, it remains there even without electrical power c. ROM provides very large amounts of inexpensive data storage d. ROM chips are easily swapped between different brands of computers 34. ________ is the process of carrying out commands a. fetching b. Storing c. Decoding d. Executing 35. Which of the following peripheral devices displays information to a user? a. Monitor b. Keyboard c. Secondary storage devices d. Secondary storage media 36. The physical components of a computer system. a. Software b. Hardware c. ALU d. Control unit 37. A computer works on a ________ number system. 123 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
a. Binary b. Octal c. Decimal d. Hexadecimal 38. Which is a graphical representation of an application? a. Windows 95 b. Windows explorer c. Icon d. Taskbar 39. A field is a related group of ______ a. Records b. Files c. Characters d. Cables 40. To restart the computer ____________ key is used. a. Del + Ctrl b. Backspace + Ctrl c. Ctrl + Alt + Del d. Restart 41. To put information in a file on a magnetic disk, or in a computer‟s memory, so it can be used later __________ a. Store b. Ship c. Shift d. Centre 42. Saving is the process of _________ a. Copying a document from memory to a storage medium
124 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
b. Making changes to a documents‟ existing content c. Changing the appearance, or overall look, of a document d. Developing a document by entering text using a keyboard 43. Printed information, called _______, exists physically and is a more permanent form of output than that presented on a display device. a. Soft copy b. Carbon copy c. Hard copy d. Desk copy 44. To find a saved document in the computer‟s memory and bring it up on the screen to view______. a. Reverse b. Rerun c. Retrieve d. Return 45. The internet is a system of ________ a. Software bundles b. Web page c. Website d. Interconnected networks 46. Codes consisting of bars or lines of varying widths or lengths that are computer readable are known as ___________. a. An ASCII code b. A magnetic tape c. An OCR scanner d. A bar code 47. A ________ is a unique name that you give to a file of information. a. Device letter 125 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
b. Folder c. Filename d. Filename extension 48. What is an e mail attachment? a. A receipt sent by the recipient b. A separate document from another program sent along with an E mail message c. A malicious parasite that feeds off of your messages and destroys the contents. d. A list of CC: or BCC: recipients 49. Which of the following are all considered advantages of e-mail? a. Convenience, speed of delivery, generality and reliability b. Printable, global and expensive c. Global, convenience and Microsoft owned d. Slow delivery, reliable, global and inexpensive. 50. E- commerce allows companies to ________ a. Issue important business reports b. Conduct business over the internet c. Support decision making processes d. Keep track of paper based transactions.
Answer key 14. (b)
2.(a) 10.(b)
3.(c)
4.(c)
5.(d)
6.(c)
7.(b)
8.(c)
9.(d)
11.(b) 12.(a) 13.(d) 14.(c) 15.(d) 16.(a) 17.(d) 18.(a) 19.(a) 20.(d) 21.(a) 22.(d) 23.(b) 24.(b) 25.(b) 26.(a) 27.(c) 28.(c)
126 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS] 29.(a) 30.(c) 31.(a) 32.(c) 33.(b) 34.(d) 35.(a) 36.(b) 37.(a) 38.(c) 39.(c) 40.(d) 41.(a) 42.(a) 43.(c) 44.(c) 45.(d) 46.(d) 47. (c) 48.(b) 49.(a) 50.(b)
127 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 18 1. In oracle, which is more appropriate to store a small list of values in a single column in each row in you address table? a. ORACARRAY b. Nested table c. Index organized table d. Index e. VARRAY 2. In a client/server model, a client program a. Asks for information b. Provides information and files c. Serves software files to other computers d. Distributes data files to other computers 3. Computers manipulate data in many ways, and this manipulation is called _________ a. Utilizing b. Batching c. Upgrading d. Processing 4. Which of the following is an example of an optical disk? a. Digital versatile disks b. Magnetic disks c. Memory disks d. Data bus disks 5. Another word for the CPU is _________ a. Microprocessor b. Execute c. Microchip 128 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
d. Decode 6. A menu contains a list of _________ a. Commands b. Data c. Objects d. Reports 7. A command to get a file you worked on from the memory where it was stored. a. Close b. Delete c. Open d. Get it 8. Which of the following commands is given to reboot the computer? a. Ctrl + Alt + Del b. Ctrl + Shift + c. Ctrl + Shift + Del d. Ctrl + Alt + Shift e. Ctrl + Alt + Tab 9. A ____________ is a collection of data that is stored electronically as a series of records in a table. a. Spreadsheet b. Presentation c. Database d. Web page 10. The software tools that enable a user to interact with a computer for specific purposes are known as ________ a. Hardware b. Networked software c. Shareware 129 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
d. Applications 11. What is the shape of CDs? a. Quadrilateral b. Rectangular c. Circular d. Hexagonal 12. The most popular internet activity is _________ a. Downloading music b. Watching movie trailers c. Shopping for books d. E-mailing 13. Which of the following is not an output device? a. Plotter b. Printer c. Scanner d. Monitor 14. A _______ contains buttons and menus that provide quick access to commonly used commands. a. Toolbar b. Menu bar c. Window d. Find 15. The _______ enables you to simultaneously keep multiple web pages open in one browser window. a. Tab box b. Pop up helper c. Tab row d. Address bar 130 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
e. Esc key 16. A _______ is an example of an input device. a. Keyboard b. Monitor c. Mouse d. Central processing unit 17. A (n) ________- is text that you want to be printed at the bottom of the pages. a. Header b. Endnote c. Footnote d. Footer 18. A (n) ___________ is a combination of hardware and software that facilitates the sharing of information between computing devices. a. Network b. Peripheral c. Expansion board d. Digital device 19. The _________ tells the computer how to use its components. a. Utility b. Network c. Operating system d. Application program 20. Which of the following functions is not performed by TCP? a. Flow control b. Sequencing c. Error checking d. Submitting
131 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
21. In addition to keying data directly into a database, data entry can be done from a(n) a. Input form b. Table c. Field d. Data dictionary 22. The term __________ designates equipment that might be added to a computer system to enhance its functionality. a. Digital device b. System add-on c. Disk pack d. Peripheral device 23. A CD RW disk a. Has a faster access than an internal disk b. Is a form of optical disk, so it can only be written once c. Holds less data than a floppy disk d. Can be erased and rewritten 24. To change written work already done is called a. File b. Edit c. Cut d. Close 25. To make a notebook act as a desktop model, the notebook can be connected to a ________ which is connected to a monitor and other devices. a. Bay b. Docking station c. Port d. Network
132 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
26. What is the name for the process that is used to convert a series of instructions, or program, written in a high level language into instructions (or a program) that can be run on a computer? a. Assembling b. Compiling c. Translating d. Uploading 27. Different applications and documents of windows desktop are represented by a. Symbols b. Labels c. Graph d. Icon 28. What does C represent in MICR? a. Code b. Column c. Computer d. Character 29. On which button does help menu exist? a. End b. Start c. Turn off d. Restart 30. Which of the following is the latest version of Excel? a. Excel 2000 b. Excel 2002 c. Excel ME d. Excel XP 31. ___________ processes data which is also called brain of the computer. 133 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
a. Motherboard b. Memory c. RAM d. Central Processing Unit (CPU) 32. Which of the following are objects in an access database? a. Table, form b. Queries, reports c. Macros, modules d. All of the above 33. Which area in an EXCEL window allows entering values and formulas? a. Title bar b. Menu bar c. Formula bar d. Standard tool bar 34. Computer software can be defined as ________ a. The computer and its associated equipment b. The instructions that tell the computer what to do. c. Computer components that act to accomplish a goal. d. An interface between the computer and the network. e. The interaction between the computer and its database. 35. A ________ is a set of rules. a. Resource locator b. Domain c. Hypertext d. URL e. Protocol 36. Which of the following is not an example of hardware? 134 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
a. Mouse b. Printer c. Monitor d. EXCEL 37. Which of the following is part of the system unit? a. Monitor b. CPU c. CD ROM d. Floppy disk 38. Fax machines and imaging systems are examples of a. Bar code readers b. Imaging systems c. Scanning devices d. Pen based systems 39. When writing a document, you can use the _______ feature to find an appropriate word or an alternative word if you find yourself stuck for the right word. a. Dictionary b. Word finder c. Encyclopedia d. Thesaurus 40. Various applications and documents are represented on the windows desktop by a. Symbols b. Labels c. Graphs d. Icons 41. What is usually used for displaying information at public places? a. Monitors
135 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
b. Overhead projections c. Monitors and overhead projections d. Touch screen kiosks 42. Which of the following could be digital input devices for computers? a. Digital camcorder b. Microphone c. Scanner d. All of the above 43. The box that contains the central electronic components of the computer is the a. Motherboard b. System unit c. Peripheral d. Input device 44. You can use the _______ bar to type a URL and display a web page, or type a keyword to display a list of related web pages. a. Menu b. Title c. Search d. Web e. Address 45. A(n) _________ is a private corporate network, used exclusively by company employees. a. Internet b. Local area network c. Peer to peer d. Intranet 46. A saved document is referred to as _________-. a. File 136 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
b. Word c. Folder d. Project 47. A characteristic of a file server is which of the following? a. Manages file operations and is shared on a network b. Manages file operations and is limited to one PC c. Acts as a fat client and is shared on a network d. Acts as a fat client and is limited to one PC 48. Codes consisting of bars or lines of varying widths or lengths that are computer readable are known as ________ a. A bar code b. An ASCII code c. A magnetic tape d. A light pen 49. The output which is made up of pictures, sounds and video is called a. COM b. Hard copy c. Graphics d. Multimedia 50. When cutting and pasting, the item cut is temporarily stored in a. ROM b. Hard drive c. Diskette d. Dashboard e. Clipboard 15. (c)
2.(a) 10.(d)
Answer key 3.(d) 4.(a) 5.(a)
6.(a)
7.(c)
8.(a)
9.(c)
137 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS] 11.(c) 12.(d) 13.(c) 14.(a) 15.(c) 16.(a) 17.(d) 18.(a) 19.(c) 20.(e) 21.(a) 22.(d) 23.(d) 24.(b) 25.(d) 26.(b) 27.(d) 28.(d) 29.(b) 30.(d) 31.(d) 32.(d) 33.(c) 34.(b) 35.(e) 36.(d) 37.(b) 38.(c) 39.(d) 40.(d) 41.(d) 42.(d) 43.(b) 44.(e) 45.(d) 46.(a) 47.(a) 48.(a) 49.(d) 50.(e)
138 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 19 1. What is backup? a. Adding more components to your network b. Protecting data by copying it from the original source to a different destination c. Filtering old data from the new data d. Accessing data on tape 2. ______ are a type of inexpensive digital camera that remains tethered to a computer and are used for videoconferencing, video chatting, and live web broadcast. a. Webcams b. Webpics c. Browsercams d. Browserpics 3. The acronym HTML stands for a. High transfer machine language b. High transmission markup language c. Hypertext markup language d. Hypermedia markup language 4. References to each file on a disk are stored in a______. a. File allocation table b. Root allocation table c. Linking directory d. Root directory e. Directory allocation table 5. What is correcting errors in a program called? a. Interpreting b. Translating c. Debugging 139 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
d. Compiling 6. Sending an E-mail is similar to a. Writing a letter b. Drawing a picture c. Talking on the phone d. Sending a package 7. To ________ a document means to make changes to its existing content. a. Format b. Save c. Edit d. Print 8. Where is the disk put to enable the computer to read it? a. Disk drive b. Memory c. CPU d. ALU 9. What menu is selected to cut, copy and paste? a. File b. Tools c. Special d. Edit 10. The most important or powerful computer in a system network _______ a. Desktop b. Network client c. Network server d. Network station 11. To change hardware components into more powerful or rectified version is called 140 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
a. Expansion b. Plug and play c. Upgrading d. Upsizing 12. Which of the following views is present in power point? a. Document view b. Slide sorter view c. Slide changer view d. Play slide view 13. In order to move from one worksheet to another in excel workbook, one should clik a. Active cell b. Scroll bar c. Sheet tab d. Tab button 14. How many 30 bit SIMMS are required to populate a bank on a 486 system that has a 32 bit data bus? a. 2 b. 3 c. 4 d. 5 15. A sales clerk at a checkout counter scanning a tag on an item rather than keying it into system, is using ________ a. Input automation b. Item data automation c. Scanning automation d. Source data automation 16. To access properties of an object, the mouse technique to use is ________ a. Dragging 141 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
b. Dropping c. Right clicking d. Shift clicking 17. Every device on the internet has a unique ________ address ( also called the “ internet address”) that identified it in the same way that a street address identifies the location of a house. a. DH b. DA c. IP d. IA 18. A set of inter related components that collect, process store and distribute information to support decision making and control in an organization best defines a. Communications technology b. A network c. An information system d. Hardware 19. This type of hardware consists of devices that translate data into a form the computer can process a. Application b. Input c. System d. All of these 20. Which key is used in combination with another key to perform a specific task? a. Function b. Arrow c. Space bar d. Control 21. Software for organizing storage and retrieval of information is a(n) ____________
142 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
a. Operating system b. Database c. Database program d. Data warehouse 22. A set of step-by-step procedures for accomplishing a task is known as a(n) ________ a. Algorithm b. Hardware program c. Software bug d. Firmware program 23. A group of 8 bits is known as a ________ a. Byte b. Kilobyte c. Binary digit d. Megabit 24. The hardware device commonly referred to as the “brain” of the computer is the _______ a. RAM chip b. Data input c. CPU d. Secondary storage 25. What is the intersection of a column and a row on a worksheet called? a. Column b. Value c. Address d. Cell 26. The process of a computer receiving information from a server on the internet is known as ________ a. Pulling 143 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
b. Pushing c. Downloading d. Transferring 27. You Microsoft word by using ________ button. a. New b. Start c. Program d. Control panel 28. Any data or instruction entered into the memory of a computer is considered as ______ a. Storage b. Output c. Input d. Information 29. Which of the following could you do to remove a paragraph from a report you had written? a. Delete and edit b. Highlight and delete c. Cut and paste d. Undo typing 30. All of the following storage media have Read and Write capabilities except _______ a. Flash memory cards b. CD ROMs c. Hard disk drives d. Floppy disks 31. If a user needs information instantly available to the CPU, it should be stored _________ a. On a CD 144 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
b. In secondary storage c. In the CPU d. In RAM 32. To what temporary area can you store text and other data, and later paste them to another location? a. The clipboard b. ROM c. CD ROM d. The hard disk 33. The operating system called UNIX is typically used for a. Desktop computers b. Laptop computers c. Super computers d. Web servers e. All of these 34. Press _______ to move the insertion point to the address box, or to highlight the URL in the address box. a. ALT + D b. ALT + A c. SHIFT + TAB d. TAB + CTRL e. CTRL + S 35. Computer systems are comprised of a. Hardware, programs, information, people and networks b. Hardware, software, procedures, networks and people c. Hardware, programs, information, people and procedures d. Hardware, programs, processors, procedures, networks and people e. Hardware, programs, processors, procedures and people 145 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
36. A collection of unprocessed items is __________ a. Information b. Data c. Memory d. Reports 37. The portion of the CPU that coordinates the activities of all the other computer components is the ____________ a. Motherboard b. Coordination board c. Control unit d. Arithmetic logic unit 38. A ________ is approximately one billion bytes. a. Kilobyte b. Bit c. Gigabyte d. Megabyte 39. The _________ directory is mandatory for every disk. a. Root b. Base c. Sub d. Case 40. WWW stands for _________ a. World word web b. World wide web c. World white web d. World work web 41. To prepare a presentation / slideshow which application is commonly used?
146 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
a. Photoshop b. Power point c. Outlook express d. Internet explorer e. All of these 42. _____________ is the process of carrying out commands. a. Fetching b. Storing c. Executing d. Decoding 43. Which of the following refers to the fastest, biggest and most expensive computers? a. Personal computers b. Super computers c. Laptops d. Notebooks 44. Microsoft word is an example of __________ a. An operating system b. A processing device c. Application software d. An input device 45. ___________ is the process of carrying out commands. a. Fetching b. Storing c. Decoding d. Executing 46. If you do not want to select any option after opening a menu then click menu title again or press key ________ to close the menu.
147 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
a. Shift b. Tab c. Escape d. F1 47. It is easier to change the name of file using _______- process. a. Transforming b. Christening c. Renaming d. Retagging 48. A series 100 POST error code indicates a problem with the a. Hard drive b. Ram or rom c. System board d. Video adapter 49. Which of the following are valid min. & max. Zoom sizes in MS office. a. 10,100 b. 20,250 c. 10,500 d. 10,1000 50. When SHADOWING is enabled in a computers BIOS; a. Instructions stored in various ROM chips are copied into b. Values are stored twice in the memory for redundancy c. The conventional memory is re-mapped to the top d. Data stored in RAM chips on adapter cards are shadowed.
Answer key 16. (b)
2.(a) 10.(c)
3.(c)
4.(a)
5.(c)
6.(a)
7.(c)
8.(a)
9.(d)
148 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
11.(c) 12.(b) 13.(c) 14.(c) 15.(c) 16.(c) 17.(c) 18.(c) 19.(b) 20.(d) 21.(d) 22.(a) 23.(a) 24.(c) 25.(d) 26.(c) 27.(c) 28.(d) 29.(b) 30.(b) 31.(b) 32.(a) 33.(e) 34.(a) 35.(b) 36.(b) 37.(c) 38.(c) 39.(a) 40.(b) 41.(b) 42.(c) 43.(b) 44.(c) 45.(d) 46.(c) 47.(c) 48.(c) 49.(c) 50.(a)
149 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 20 1. In Excel, _________ contains one or more worksheets. a. Template b. Workbook c. Active cell d. Label 2. Which of the following is a popular programming language for developing multimedia web pages, websites, and web based applications? a. COBOL b. Java c. BASIC d. Assembler 3. Compiling creates a(n) _________ a. Program specification b. Algorithm c. Executable program d. Subroutine 4. Computers use the _________ number system to store data and perform calculations. a. Decimal b. Hexadecimal c. Octal d. Binary 5. The ________ key will launch the start button. a. Esc b. Shift c. Windows d. Shortcut
150 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
6. A website address is a unique name that identifies a specific _________ on the web. a. Web browser b. PDA c. Website d. Link 7. A character of information is represented by a(n) _________ a. Byte b. Bit c. Field d. Attribute 8. A set of instructions telling the computer what to do is called __________ a. Mentor b. Instructor c. Compiler d. Program 9. To “maximize” a window means _______ a. Fill it to capacity b. Expand it to fit the desktop c. Put only like files inside d. Drag it to the recycle bin 10. The “home page” of a web site is ________ a. The largest page b. The last page c. The first page d. The most colorful page 11. What is ISL used for? a. To allow an Ethernet interface to understand frame tags 151 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
b. To make two Ethernet interfaces appear as one c. To connect an Ethernet switch with a high speed core switch such as ATM\ d. To allow simultaneous routing and switching 12. Which of the following is NOT associated with computers? a. Bit b. Binary c. Pencil d. Mouse e. Screen 13. „MICR‟ technology used for clearance of cheques by banks refers to _______ a. Magnetic ink character recognition b. Magnetic intelligence character recognition c. Magnetic information cable recognition d. Magnetic insurance cases recognition 14. Modern computers represent characters and numbers internally using one of the following number systems ________ a. Penta b. Octal c. Hexa d. Septa e. Binary 15. A ________ is approximately a million bytes. a. Gigabyte b. Kilobyte c. Megabyte d. Terabyte 16. If you wish to extend the length of the network without having the signal degrade, you would use a 152 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
a. Repeater b. Router c. Gateway d. Switch 17. To move down a page in a document. a. Jump b. Fly c. Wriggle d. Scroll 18. Date and time are available on the desktop at _________. a. Taskbar b. My computer c. Recycle bin d. Only 2 and 3 19. Which type of resource does have greater probability to become shared resource in a computer network? a. Printers b. Speakers c. Floppy disc drivers d. Keyboards 20. Which of the following terms is used to describe the movement of an item with the help of mouse to a new position on screen? a. Clik b. Double clik c. Drag and drop d. Point e. Right clik 21. What does storage unit provide? 153 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
a. Place for typing data b. Storage for information and instruction c. Place for printing information d. All of the above 22. ___________ are distinct items that do not have much meaning to you in a given context. a. Fields b. Data c. Queries d. Properties 23. In oracle, which table space is least required when creating a new database? a. Undo table space b. Temporary table space c. System table space d. Users table space 24. An example of a telecommunication device is a _________. a. Keyboard b. Mouse c. Printer d. Modem 25. Two or more computers connected to each other for sharing information form a ______ a. Network b. Router c. Server d. Tunnel e. Pipeline 26. The benefit of using computers is that ___________ 154 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
a. Computers are very fast and can store huge amounts of data b. Computers provide accurate output even when input is incorrect c. Computers are designed to be inflexible d. All of the above 27. The database administrator‟s function in an organization is a. To be responsible for the more technical aspects of managing the information contained in organizational databases b. To be responsible for the executive level aspects of decisions regarding information management c. To show the relationship among entity classes in a data warehouse d. To define which data mining tools must be used to extract data. 28. The _______ becomes different shapes depending on the task you are performing. a. Active tab b. Insertion point c. Mouse pointer d. Ribbon 29. The capability of the operation system to enable two or more than two instructions to execute simultaneously in a single computer system by using multiple CPUs is a. Multitasking b. Multiprogramming c. Multiprocessing d. Multi execution 30. A collection of related information sorted and dealt with as a unit is a ________ a. Disk b. Data c. File d. Floppy 31. An output device that lets you see what the computer is doing _______ 155 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
a. A disk drive b. Monitor screen c. Shift key d. Printer 32. Bit is short for _________ a. Binary system b. Digital byte c. Binary digit d. Binary unit 33. To access a mainframe or supercomputer, users often use a ___________ a. Terminal b. Node c. Desktop d. Handheld 34. By default, your documents print in ___________ mode. a. Landscape b. Portrait c. Page setup d. Print view 35. Firewalls are used to protect against ______ a. Unauthorized attacks b. Virus attacks c. Data driven attacks d. Fire attacks 36. Which of the following could be a legitimate media access control address? a. 192.168.254.3 b. 3FA2.4756.F9A3 156 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
c. A5514 d. CI.3A.77.5B 37. The term “hypertext” means a. Non sequential writing b. Hypermedia c. Blinking text d. Text with heavy formatting 38. You receive an e-mail message that informs you that a terrible virus has been unleashed on the internet and that you should warn all the people in your address book. Which of the following have you most likely encountered? a. A virus hoax b. A filter c. Spam d. A virus e. A worm 39. We can enter and edit the text efficiently using ________ a. Spreadsheet b. Typewriter c. Word processing program d. Desktop publishing program 40. __________ may be included in other folder while making hierarchical structure folder. a. Mini folder b. Tiered folder c. Sub folder d. Object 41. To access properties of an object, the mouse technique to use is _______ a. Right clicking 157 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
b. Shift clicking c. Dragging d. Dropping 42. A ____________ shares hardware, software, and data among authorized users. a. Network b. Protocol c. Hyperlink d. Transmitter 43. Computer programs are written in a high level programming language: however the human readable version of a program is called _____ a. Cache b. Instruction set c. Source code d. Word size 44. In word processing, an efficient way to move the 3 rd paragraph to place it after the 5 th paragraph is ________ a. Copy and paste b. Copy cut and paste c. Cut, copy and paste d. Cut and paste 45. Which of the following is an example of connectivity? a. Internet b. Floppy disk c. Power cord d. Data 46. A disk on which you store information is caved a. Plate b. Data disk 158 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
c. Paper disk d. TV disk 47. _______ is allows you to print. a. Ribbon b. Monitor c. Go now d. Control P 48. Microsoft office is an example of a __________ a. Closed source software b. Open source software c. Horizontal market software d. Vertical market software e. Compiler 49. A popular way to learn about computers without ever going to a classroom is called _______ a.
i-learning
b. Isolated learning c. E-learning d. Close learning e. Distance learning 50. A person who uses his or her expertise to gain access to other people‟s computers to get information illegally or do damage is a ________ a. Spammer b. Hacker c. Instant messenger d. All of the above 17. (b) 2.(b) 10.(c)
3.(c)
Answer key 4.(d) 5.(c)
6.(d)
7.(b)
8.(d)
9.(b)
159 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
11.(a) 12.(c) 13.(a) 14.(e) 15.(c) 16.(a) 17.(d) 18.(a) 19.(a) 20.(c) 21.(b) 22.(b) 23.(c) 24.(d) 25.(a) 26.(a) 27.(b) 28.(c) 29.(c) 30.(c) 31.(b) 32.(c) 33.(a) 34.(b) 35.(a) 36.(a) 37.(b) 38.(d) 39.(a) 40.(c) 41.(a) 42.(a) 43.(c) 44.(d) 45.(a) 46.(b) 47.(d) 48.(a) 49.(c) 50.(b)
160 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set21
1. Binary coded decimal (BCD) numbers express each decimal digital as a. Bit b. Byte c. Nibble d. Binary digits e. Ward 2. What happens if a worksheet is not protected a. It cannot be opened b. It cannot be saved c. It cannot be edited d. It can be edited e. All cells gets locked 3. What is a Firmware a. A program started in RAM b. A program started in a file c. A program started in boot sector d. A program started in ROM 4. TWAIN is related with which of the following device a. Printer b. Keyboard c. Mouse d. Monitor e. Scanner 5. The Internet is an example of – network a. Star b. Bus c. Hybrid d. Mesh e. Ring 6. Blueprints are usually created using --- software a. CGI b. Paint c. Draw d. CAD e. API 7. The power of a spreadsheet lies in its a. Cells b. Formulas c. Labels d. Worksheets e. Rows and columns 161 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
8. IP address consists of how many bits a. 16 bits b. 8 bits c. 30 bits d. 36 bits e. None of these 9. Which storage device is mounted on ‘reels’ a. Floppy disk b. CD-ROM c. Magnetic disk d. Magnetic tape e. Hard disk 10. A paint program keeps track of every ---- placed on the screen a. Image b. Object c. Pixel d. Color e. Symbol 11. Rules of a programming language are called a. Procedures b. Calls c. Methods d. Login e. Syntax 12. A primary key can also be called a ---a. Super key b. Candidate key c. Alternate key d. Secondary key e. Foreign key 13. Which shortcut is used to open a new file in MS-Word a. Ctrl + N b. Ctrl + M c. Ctrl + Y d. Ctrl + X e. Ctrl + Z 14. Bridge operates in which of the following OSI layers a. Physical b. Network c. Data link d. Both (1) and (3) e. Session 15. ---- printer is used for fax machines a. Line b. Dot matrix 162 | P a g e
[Pick the date]
16.
17.
18.
19.
20.
21.
22.
23.
[ESSC COMPUTER AWARENESS]
c. Laser d. Ink jet e. Thermal What does AMD stand for a. Advanced mainframe Devices b. Advanced Micro Devices c. Advanced Mini Devices d. Advanced Major Devices e. Advanced Monitor Devices FoxPro is an example of a. DBMS b. Relational DBMS c. Object-oriented DBMS d. Distributed DBMS e. Knowledge base DBMS To open the format cells dialog box, we press a. Ctrl + 1 b. Shift + 1 c. Ctrl + Shift + 1 d. Alt + 1 e. F1 --- provides electronic data interchange facility a. ISDN b. LAN c. VAN d. CAN An assembly language is a division of a. Middle level language b. High level language c. Low level language d. Machine language A language based on graphics for use in education is called a. PROLOG b. LOGO c. COBOL d. BASIC e. PASCAL Which is the most popular medium for direct access to secondary storage of a computer a. Magnetic tape b. ROM c. RAM d. Magnetic disk e. PROM Ethernet uses --- topology a. Bus 163 | P a g e
[Pick the date]
24.
25.
26.
27.
28.
29.
30.
[ESSC COMPUTER AWARENESS]
b. Ring c. Star d. Tree e. Mesh Which of the following produces the best-quality graphics reproduction a. Laser printer b. Inkjet printer c. Plotter d. Dot matrix printer e. CAD A process is another name for a. Job b. Program c. Task d. Method e. Call A computer virus is a software program which has the essential ability to a. Damage data b. Clone itself c. Hide itself d. Damage program Communication between computers is almost always a. Serial b. Parallel c. Serially parallel d. Direct e. Indirect The interface of data from a CPU to peripheral devices of a computer is achieved through a. Interface b. Commands c. Buffer d. Parts of computer e. All the above DOS cannot retrieve any data from a disk if a computer virus corrupts the ---- of the computer a. Directory area b. Data area c. BAT files d. File allocation table e. Root directory area Salami attack is a type of attack that operates on a. Confidential data b. Company data c. Employee data d. Financial data 164 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
31. Which of the following is not a part of the operating system a. Supervisor b. Job-control program c. I/O control program d. Performance monitor 32. Reel-to-reel tape drives are commonly used with a. Mini computers b. Micro computers c. Mainframe computers d. Laptops e. Personal computers 33. To select an entire row in the Excel sheet, the shortcut key that is used is a. Ctrl + space b. Ctrl + arrow key c. Shift + arrow key d. Ctrl + tab e. Shift + space 34. What is the number of maximum columns that can be inserted in a word document a. 35 b. 42 c. 45 d. 55 e. 52 35. ---- are the summarized version of slides that display only titles and main text a. Handouts b. Outlines c. Speaker notes d. Slide sorter 36. In --- the cells are referred by their fixed position in the worksheet a. Cell referencing b. Relative referencing c. Absolute referencing d. Mixed referencing e. Fixed referencing 37. How many types of data can be entered in a worksheet a. Three b. Four c. Two d. Five e. Six 38. Which type of protocol is used for accessing internet/web on mobile phones a. PPP b. HTTP c. FTP d. WAP 165 | P a g e
[Pick the date]
39.
40.
41.
42.
43.
44.
45.
46.
[ESSC COMPUTER AWARENESS]
e. SMTP The device which is used to connect the computer to the network media is called a. Cable b. Hub c. Switch d. NIC e. All the above One KB is equal to --- bytes a. 100 b. 1000 c. 1024 d. 1048 e. 1034 IEEE ---- standard is used for wireless LAN a. 802.12 b. 802.13 c. 802.15 d. 802.11 e. 802.10 DNS is extremely important for the correct functioning of the internet to do so, it a. Encrypts data b. Maps symbolic names for machines onto their IP address c. Translates message into machine language d. All the above Which of the following was the first widely used OS with graphical interface a. OS12 b. MVS c. Mac OS d. DOS e. VMS Lynx is a type of a. Search engine b. Web index c. Meta-search engine d. Web browser e. Newsgroup A computer is a box full of electronic a. Chips b. Registers c. Circuits d. Switching devices Which of the following keyboards is the fastest a. QWERTY b. Dvorak c. Alphanumeric 166 | P a g e
[Pick the date]
47.
48.
49.
50.
[ESSC COMPUTER AWARENESS]
d. Numeric Which hole is used to mark the location of the first sector in a soft-sectored disk a. Address b. Location c. Label d. Primary e. Index The process of a computer receiving information from a server on the Internet is known as a. Pulling b. Downloading c. Pushing d. Uploading e. Transferring The part of CPU which coordinates the activities of all other components of the computer is called a. Motherboard b. Coordination board c. Arithmetic logic unit d. Control unit Repair which is usually available on Internet without any change, for a known software bug is called a. Patch b. Version c. Help d. FAQ e. Tutorial
Answer key 1. (c) 2.(d) 10.(c)
3.(d)
4.(e) 5.(d)
6.(d)
7.(b)
8.(e)
9.(d)
11.(d) 12.(b) 13.(a) 14.(d) 15.(e) 16.(b) 17.(a) 18.(a) 19.(c) 20.(c) 21.(b) 22.(d) 23.(a) 24.(c) 25.(c) 26.(b) 27.(a) 28.(d) 29.(d) 30.(d) 31.(d) 32.(c) 33.(e) 34.(c) 35.(b) 36.(c) 37.(a) 38.(d) 39.(d) 40.(c) 41.(d) 42.(b) 43.(c) 44.(d) 45.(d) 46.(b) 167 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
47.(e) 48.(b) 49.(a) 50.(a)
168 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set22 1. Which of the following was he first computer to use transistors instead of vacuum tubes a. Intel-650 b. Burroughs E-101 c. Datametric-1000 d. IBM 1401 e. ENIAC 2. The two basic types of record access methods are --- and --a. Sequential, Random b. Direct, Immediate c. Sequential, Indexed d. On-line, Realtime 3. To save on existing file with a new name or at a new location, you should use ---- command a. Save b. Save and Replace c. New file d. Save as e. All the above 4. The primary job of an operating system is to manage a. Commands b. Users c. Programmes d. Resources e. Process 5. --- fields store the numbers used for calculation in database a. Next b. Key c. Numeric d. Alphanumeric e. Varchar 6. When sending an e-mail, the --- line describes the content of the range a. To b. CC c. Contents d. BCC e. Subject 7. What is the keyboard shortcut for creating chart from the selected cell range a. F2 b. F4 c. F8 d. F10 e. F11 8. Which of the following methods will not enter data into a cell a. Pressing an arrow key 169 | P a g e
[Pick the date]
9.
10.
11.
12.
13.
14.
15.
16.
[ESSC COMPUTER AWARENESS]
b. Pressing the Esc key c. Pressing the tab key d. Clicking the enter button to the formula bar Anti-virus is a --- software a. System b. Utility c. Application d. Operating system A ---- contains commands that can be selected a. Pointer b. Menu c. Icon d. Button e. Table The stock pointer in 8085 microprocessor is a a. 16 bit accumulator b. Memory location in the stock c. Flag register used for the stock d. 16 bit register that points to stock memory location ---- is used in academic testing a. MICR b. POS c. OCR Devices d. OMR e. Bar code reader ---- is called as a supervisor of computer activities a. Memory b. OS c. I/O Devices d. CU e. ALU Repeater works in --- layer of OSI mode a. Application b. Transport c. Physical d. Data link e. Network RAS stands for a. Random Access Security b. Random Access Service c. Remote Access Security d. Remote Access Service e. Remote Access Standard Band, the unit for measuring data transmission speed, is equal to a. One bit per second 170 | P a g e
[Pick the date]
17.
18.
19.
20.
21.
22.
23.
24.
[ESSC COMPUTER AWARENESS]
b. One byte per second c. Two bytes per second d. Two bits per second What type of computer can support hundreds of people at any time a. Desktop b. Super c. Micro d. Mini e. Mainframe ---- uses viruses to destroy computer hardware and software a. Spoofing b. Tunneling c. Sabotage d. Phishing e. Flooding Which of the following is not a Microsoft Internet tool technology a. Dream Weaver b. Internet Explorer c. Web Browser d. Silver Light e. Expression Web What are concentric circles on floppy disks knows as a. Tracks b. Cylinders c. Segments d. Holes e. Sectors The cell reference for cell range of G3 to M13 is a. G3.M13 b. G3-M13 c. G3;M13 d. G3:M13 e. G3+M13 ---- memory has the shortest access time a. Cache b. Virtual c. Secondary d. Primary e. Read only Unix Operating System is a a. Multiuser OS b. Time-sharing OS c. Multitasking OS d. All the above Which access method is used to access cassette tape 171 | P a g e
[Pick the date]
25.
26.
27.
28.
29.
30.
31.
32.
[ESSC COMPUTER AWARENESS]
a. Direct b. Sequential c. Indirect d. Parallel e. Both (1) and (2) How many layers are there in a TCP/IP model a. Four b. Five c. Six d. Seven e. Three A walky-talky set is an example of --- system a. Simplex b. Half duplex c. Full duplex d. Double duplex EBCDIC can code up to how many different characters a. 8 b. 16 c. 32 d. 64 e. 256 ---- provides a connection oriented reliable service for sending message a. IP b. TCP c. UDP d. HTTP In mark sensing data is read a. Optically b. Electrically c. Magnetically d. Mechanically --- layer of OSI model is also called at end-to-layer a. Presentation b. Network c. Session d. Transport Office device is --a. A device which is not connected to a CPU b. A device which is connected to a CPU c. A direct access storage device d. An I/O device A Winchester disk is a a. Disk stack b. Removal disk 172 | P a g e
[Pick the date]
33.
34.
35.
36.
37.
38.
39.
40.
[ESSC COMPUTER AWARENESS]
c. Flexible disk d. All the above IEEE --- is the standard of token bus a. 802.3 b. 802.4 c. 802.5 d. 802.2 e. 802.6 Plotter accuracy is measured in terms of repeatability and a. Buffer size b. Resolution c. Vertical dimension d. Intelligence How many types of storage loops exist in magnetic bubble memory a. 8 b. 4 c. 16 d. 2 e. 32 Which of the following IP address classes is multicast a. Class A b. Class B c. Class C d. Class D e. Class E The blinking symbol on the computer screen is called a. Mouse b. Logo c. Hand d. Palm e. Cursor In second generation computers the speed was measured in a. Nanoseconds b. Milliseconds c. Microseconds d. Picoseconds --- is not an Internet connection a. Broadband b. WWAN c. DSL d. WLAN e. Dial-up The output quality of a printer is measured by a. Dots per sq inch b. Dots per inch 173 | P a g e
[Pick the date]
41.
42.
43.
44.
45.
46.
47.
48.
[ESSC COMPUTER AWARENESS]
c. Dots printed per unit d. Dots printed per line e. Both (1) and (2) How many values can be represented by a single byte a. 4 b. 16 c. 64 d. 256 e. 512 --- is the process of finding errors in software code a. Compiling b. Testing c. Running d. Debugging Which piece of hardware protects the resource of a private network from other networks a. Cache server b. Proxy server c. Firewall d. Router e. Bridge What is the shortcut key for ‘find and replace’ dialogue box a. Ctrl + F b. Ctrl + R c. Ctrl + H d. Ctrl + M e. Ctrl + N ---- are used to identify a user who returns to a website a. Cookies b. Plug-in c. Scripts d. ASPS e. Browser All the information collected during database development is stored in a a. Repository b. Data ware house c. RAD d. CASE COBOL is used in ---- applications a. Commercial b. Scientific c. Space d. Mathematical The altering of data so that it is not usable unless the changes are done is called a. Biometrics b. Compression 174 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
c. Encryption d. Ergonomics 49. Formulas in excel start with a. % b. = c. + d. e. ; 50. The --- key will launch the start button a. Esc b. Shift c. Windows d. Ctrl e. Shortcut
2. (d) 2.(a) 10.(b) 18.(c) 26.(b) 34.(b) 42.(a) 50.(b)
3.(d) 11.(d) 19.(a) 27.(e) 35.(d) 43.(c)
Answer key 4.(d) 5.(c) 12.(d) 13.(d) 20.(a) 21.(d) 28.(b) 29.(b) 36.(d) 37.(e) 44.(a) 45.(a)
6.(e) 14.(c) 22.(a) 30.(d) 38.(c) 46.(b)
7.(e) 15.(d) 23.(d) 31.(a) 39.(b) 47.(a)
8.(b) 16.(a) 24.(b) 32.(a) 40.(a) 48.(c)
9.(b) 17.(e) 25.(b) 33.(b) 41.(d) 49.(b)
175 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set23 1. Search menu is available at which of the following buttons? a. End b. Start c. Turnoff d. Restart e. Reboot 2. Which of the following displays the address and name of the selected cell a. Name box b. Row Heading c. Formula bar d. Task pane 3. In --- generation computer the speed was measured in nenoseconds a. First b. Second c. Third d. Fourth e. Fifth 4. The process of transferring of files from your computer to the computer on the internet is called a. Downloading b. Uploading c. FTP d. JPEG 5. In how many ways can we save a document a. Four b. Two c. Three d. One e. Five 6. Which of the following can be used to select the entire column in a worksheet a. Shift + Space b. Ctrl + Space c. Alt + Space d. Ctrl + Space + 1 e. Shift + Space + 1 7. Machine code is a a. High-level language b. Software language c. Low-level language d. Middle-level language e. Compiler 8. The speedometer of a car represents a. Digital computer 176 | P a g e
[Pick the date]
9.
10.
11.
12.
13.
14.
15.
16.
[ESSC COMPUTER AWARENESS]
b. Hybrid computer c. Analog computer d. Micro computer Objects on the slide that hold text are called a. Object holders b. Text holders c. Auto layout d. Place holders e. Data holders C++ is a. A procedure-oriented language b. A problem-oriented language c. An object-oriented language d. A programme-oriented language What is the number of bit pattern provided by a 7-bit code a. 256 b. 128 c. 64 d. 512 e. 32 Process is a. A program is high-level language kept on disk b. Contents of main memory c. A program in execution d. A job in secondary memory By default the left margin in the word document is a. 1 inch b. 2 inches c. 1.25 inches d. 1.35 inches e. 1.75 inches The parity bit is added for a. Loading b. Indexing c. Updating d. Error detection e. hashing Flash memory is the type of --a. ROM b. PROM c. EPROM d. EEPROM e. RAM MS-Excel contains--- rows a. 65,500 177 | P a g e
[Pick the date]
17.
18.
19.
20.
21.
22.
23.
24.
[ESSC COMPUTER AWARENESS]
b. 65,534 c. 65,535 d. 65,536 e. 65,533 The topology with highest reliability is a. Bus b. Star c. Ring d. Mesh e. Tree The term gigabyte refers to a. 1024 bytes b. 1024 kilobytes c. 1024 megabytes d. 1024 terabytes Hub is applicable in --- layer a. Physical b. Data link c. Network d. Transport e. Application The ‘QWERTY’ keyboard a. Is the most popular keyboard b. Is the fastest keyboard c. Is the keyboard that is rarely used d. Is the keyboard having complex key layout Which of the following IP address classes in reserved for future use a. Class A b. Class B c. Class C d. Class D e. Class E The time during which a job is processed by a computer is a. Delay time b. Real time c. Execution time d. Down time e. Seek time RATS stand for a. Regression Analysis Time Sharing b. Regression Analysis Time Series c. Read Analysis Time Sharing d. Read Analysis Time Series The chip used in computers is made of a. Chromium 178 | P a g e
[Pick the date]
25.
26.
27.
28.
29.
30.
31.
32.
[ESSC COMPUTER AWARENESS]
b. Silica c. Iron Oxide d. Silicon e. Aluminum While running DoS on PC, which of the following commands will be used to duplicate the entire diskette a. COPY b. DISKCOPY c. CHKDSK d. TYPE The following are the components of database except a. User data b. Meta data c. Reparts d. Indexes e. Data dictionary The amount of a cheque is recorded in magnetic ink, using an a. Encoder b. Embosser c. Inscriber d. Imprinter Punched cards use a. Alphanumeric code b. Hollerith code c. EBCDIC code d. BCD code e. ASCII code CSMA/CD is a. An important protocol b. IEEE 802.3 c. IEEE 802.4 d. Both (1) and (2) e. Both (1) and (3) ---- are raw facts from which --- is derived a. Data, Output b. Input, Information c. Data, Information d. Input, Output An algorithm is best described as a. A computer language b. A step-by-step procedure for solving a problem c. A branch of mathematics d. All the above Helping people keep track of things is the purpose of a(n) a. Database 179 | P a g e
[Pick the date]
33.
34.
35.
36.
37.
38.
39.
[ESSC COMPUTER AWARENESS]
b. Table c. Instance d. Record e. Field The size of commonly used floppy disk is a. 4.5” b. 3.5” c. 3.25” d. 4.25” e. 5.5” OSI model has --- layers a. 6 b. 7 c. 8 d. 9 e. 5 Restore command is used to a. Restore files from disks using the backup command b. Restore files which have been deleted c. Restore files which have been deleted recently d. Restore files from recycle bin For opening and closing of file in Excel, you can use --- bar a. Formatting b. Standard c. Title d. Formatting or title ----- is the process of carrying out commands a. Fetching b. Storing c. Decoding d. Coding e. Executing Which of the following types of virus are often transmitted by a floppy disk left in the floppy drive a. Trojan horse b. Boot sector c. Script d. Logic bomb e. Worm To move at the beginning of a line of text, press --- key a. Home b. Enter c. Tab d. Page up e. End 180 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
40. In which of the layers does translation from one character code to another occur a. Transport b. Presentation c. Session d. Application e. Physical 41. Malicious access is called a. Unauthorized reading of data b. Unauthorized modification of data c. Unauthorized destruction of data d. All the above 42. When you work on a document on PC, where is the document temporarily stored a. ROM b. RAM c. CPU d. CD-ROM e. Flash memory 43. Ctrl, Shift and Alt are called ---- keys a. Modifier b. Function c. Alphanumeric d. Adjustment e. Specifier 44. Files deleted from the hard disk are sent to a. Memory b. Recycle bin c. Secondary memory d. Motherboard 45. IEEE 802.5 standard is used for a. Ethernet b. LIC c. Token bus d. Token ring 46. In which of the following topologies, and there are devices in a network, each device has n-1 parts for cables a. Mesh b. Star c. Ring d. Bus 47. A notice on the screen that informs you of a problem is called a. Frame b. Window c. Dialog box d. Message e. Monitor 181 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
48. VDU is used as a(n) a. Input device b. Output device c. Processing device d. Storage units e. Control unit 49. Which of the following items is not used in local area network (LAN) a. Computer b. Modem c. Printer d. Cable e. Connector 50. WWW is based on which of the following modes a. Local server b. Client server c. 3-tier d. 2-tier Answer key 3. (b) 2.(a) 10.(c) 18.(c) 26.(c) 34.(b) 42.(b) 50.(b)
3.(c) 11.(b) 19.(a) 27.(a) 35.(a) 43.(d)
4.(b) 12.(c) 20.(a) 28.(b) 36.(b) 44.( b)
5.(c) 13.(c) 21.(e) 29.(d) 37.(e) 45.(d)
6.(b) 14.(d) 22.(c) 30.(c) 38.(b) 46.(a)
7.(c) 15.(d) 23.(b) 31.(b) 39.(a) 47.(d)
8.(d) 16.(d) 24.(d) 32.(a) 40.(b) 48.(b)
9.(c) 17.(d) 25.(b) 33.(b) 41.(d) 49.(b)
182 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set24 1. Block on buffer caches are used a. To handle interrupts b. In increased capacity of main memory c. To improve disk performance d. To speed up main memory read operation 2. Two basic types of OS are a. Batch and interactive b. Sequential and real-time c. Batch and time-sharing d. Sequential and direct e. Batch and sequential 3. ‘Spelling and Grammar’ check option in Word document 2007 is available in a. Home b. Mailing c. View d. Review e. Page layout 4. ---- contain data in Oracle database a. Extends b. Segments c. Tables d. Data blocks e. records 5. ----- is the maximum data capacity for optical fibre cable a. 10 mbps b. 100 mbps c. 10000 mbps d. 1000 mbps 6. ---- language is most widely used a. PL/I b. BASIC c. PASCAL d. LISP e. FORTRAN 7. Worm was made of a. One program b. Two program c. Three programs d. Four programs e. Five programs
183 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
8. Which of the following is not a web browser a. Mozilla b. Mosaic c. FoxPro d. Amaya e. Firefox 9. Bubble memory is only a a. Sequential access device b. Direct access device c. Combination of sequential and direct access devices d. Interactive device 10. MS Excel contains --- columns a. 255 b. 254 c. 256 d. 250 e. 253 11. A derived class may also be called as a. Sub-class b. Super-class c. Parent-class d. Deprived-class 12. The capacity of program counter is a. 8 bits b. 14 bits c. 16 bits d. 12 bits e. 32 bits 13. Remote computer services involves the use of time sharing and ---a. Interactive processing b. Relative processing c. Multiprocessing d. Real time processing e. Batch processing 14. A beam of light used to record and retrieve data on optical disks is called as a. Polarized light b. Laser beam c. Colored light d. Unpolarized concentric light e. Unpolarized light
15. --- is the default page set-up orientation of slides in Power Point a. Vertical b. Landscape 184 | P a g e
[Pick the date]
16.
17.
18.
19.
20.
21.
22.
23.
[ESSC COMPUTER AWARENESS]
c. Portrait d. Horizontal Information in a memory that is no longer valid or wanted is a. Volatile b. Surplus c. Garbage d. Bug e. Non-volatile In data link layer, we find a. Repeater b. Bridge c. Switches d. (1) and (3) e. (2) and (3) NACS stands for a. Network Asynchronous Communication Services b. Network Asynchronous Communication System c. Netware Asynchronous Communication System d. Netware Asynchronous Communication Services e. National Asynchronous Communication System ---- is added to give the framework a solid appearance in graphics. a. Morphing b. Anti-aliasing c. Coloring d. Shading Using computers and communication technology to help people better use and mange information is called a. Ergonomics b. Except system c. Decision support system d. Office automation e. Executive support system Cells in Excel can be referred in ---- ways a. 2 b. 3 c. 4 d. 5 e. 6 ICMP, RIP and BGP protocols are applicable in --- layer a. Network b. Application c. Presentation d. Session e. Transport --- is capable of operating at electronic speed. 185 | P a g e
[Pick the date]
24.
25.
26.
27.
28.
29.
30.
[ESSC COMPUTER AWARENESS]
a. Magnetic disk b. Magnetic drum c. Magnetic tape d. Semi-conductor disk e. Semi-conductor memory ---- refers to the degree to which data in a database system are accurate and correct a. Data security b. Data verification c. Data independence d. Data validity e. Data integrity ---- virus spreads in application software a. Boot sector b. File infector c. E-mail d. Parasitic e. Macro Twisted pair Ethernet (10 Base T) uses ----- topology a. Bus b. Star c. Ring d. Mesh e. Tree Zone information protocol is used for a. Copying file b. Deleting file c. Editing file d. Pasting file --- is designed to perform a computer system’s routine house-keeping functions a. Operating system b. Interpreter system c. Compiler d. Utility e. Microprocessor Microsoft office button does not contain a. Print b. Save c. New d. Page setup e. Print preview Which of the following is not advantage of multiprogramming a. Increased throughput b. Shorter response time c. Decreased OS overhead d. Ability to assign priorities to jobs 186 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
31. Integrated circuit’s are made by a. Si b. Al c. Mn d. Mg e. All the above 32. Uniform resource location has --- part(s) a. Two b. Three c. One d. Four 33. Daisy wheel printer is a type of a. Matrix printer b. Impact printer c. Laser printer d. Manual printer e. Line printer 34. --- is the keyboard shortcut for opening the Excel Formula Window a. Shift + F3 b. Shift + F1 c. Ctrl + F3 d. Ctrl + F1 e. Ctrl + F1 + 1 35. A set of protocols and layers is called a. Internet work b. Layered network c. Network architecture d. Layered architecture 36. The taskbar is presented a. On the start menu b. On the quick launch toolbar c. On the button of screen d. On the top of screen e. On the right side 37. One megabyte is a. 1048576 bytes b. 1038576 bytes c. 1068576 bytes d. 1058576 bytes e. 1078576 bytes 38. Full adder has --- input terminal(s) a. 4 b. 4 c. 2 d. 6 187 | P a g e
[Pick the date]
39.
40.
41.
42.
43.
44.
45.
46.
[ESSC COMPUTER AWARENESS]
e. 1 Which of the following types of key cannot be used in database a. Primary key b. Foreign key c. Super key d. Secondary key e. Transitive key The default header for a worksheet is a. Your name b. The data and time c. The sheet tab name d. The worksheet name e. None of these The first computer made available for commercial use was a. Mark-1 b. ENIAC c. UNIVAC d. EDSAC e. EDVAC EPROM consists of a. Bipolar transistors b. Diodes c. ETL d. MOSFETS --- contains location of file on the disk a. Boot sector b. File allocation table c. Data area d. Root folder e. Memory unit A device designed to read information encoded into a small plastic card is a. Light pen b. Punched card c. Magnetic tape d. Magnetic disk e. Badge reader DEC (Data Encryption Standard) uses --- bit key for encryption a. 56 b. 54 c. 52 d. 53 e. 55 ---- layer lies between session layer and application layer in OSI model a. Transport b. Network 188 | P a g e
[Pick the date]
47.
48.
49.
50.
[ESSC COMPUTER AWARENESS]
c. Data link d. Presentation e. Physical The metal disk which is permanently housed in sealed containers is called --a. Hard disk b. Floppy disk c. Flexible disk d. Zip disk e. Winchester disk The most common application of twisted pair cable is --a. Cable TV b. Internet c. Extranet d. Network e. Telephone system A dump terminal has a. Processing ability b. Data storage space c. Extensive memory d. A keyboard and a screen e. An embedded microprocessor Decryption and encryption of data are the responsibility of --- layer a. Physical b. Network c. Session d. Presentation e. Transport
Answer key 4. (c) 2.(a) 10.(c) 18.(d) 26.(b) 34.(a) 42.(d) 50.(d)
3.(d) 11.(a) 19.(d) 27.(e) 35.(c) 43.(b)
4.(d) 12.(c) 20.(d) 28.(d) 36.(c) 44.(e)
5.(d) 13.(e) 21.(b) 29.(d) 37.(a) 45.(a)
6.(e) 14.(b) 22.(a) 30.(c) 38.(b) 46.(d)
7.(b) 15.(b) 23.(e) 31.(d) 39.(e) 47.(e)
8.(c) 16.(c) 24.(d) 32.(b) 40.(e) 48.(e)
9.(c) 17.(e) 25.(e) 33.(b) 41.(c) 49.(d)
189 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set24
1. A compiler is used to translate a program written in a. A low-level language b. A high-level language c. Assembly language d. Machine language 2. In programming which of the following keys do you use a. Arrow keys b. Function keys c. Alpha keys d. Page Up and Page Down keys 3. ---- is the process of dividing the disk into tracks and sectors a. Tracking b. Formatting c. Crashing d. Allotting 4. A saved document is referred to as a a. File b. Word c. Folder d. Project 5. Which of the following is the largest unit of storage a. GB b. KB c. MB d. TB 6. The operating system is the most common type of --- software a. Communication b. Application c. System d. Word-processing 7. A --- is approximately one billion bytes a. Kilobyte b. Bit c. Gigabyte d. Megabyte 8. A scanner scans a. Pictures b. Text c. Both pictures and text d. Neither pictures not text 9. Dumb terminals have terminals and 190 | P a g e
[Pick the date]
10.
11.
12.
13.
14.
15.
16.
17.
[ESSC COMPUTER AWARENESS]
a. Mouse b. Speakers c. Keyboard d. Mouse or speakers The portion of the CPU that coordinates the activities of all the other computer components is the a. Motherboard b. Coordination board c. Control unit d. Arithmetic logic unit A repair for a known software bug, usually available at no charge on the Internet, is called a a. Version b. Patch c. Tutorial d. FAQ When data changes in multiple lists and all lists are not updated, this causes a. Data redundancy b. Information overload c. Duplicate data d. Data inconsistency Changing cardinalities in a database is a. A common database design task b. A rare database design task, but does occur c. A database design task that never occurs. d. Is impossible to do, so a new database must be constructed and the data may be moved into it Because of the importance of making data model changes correctly, many professionally are --- about using an automated process for database redesign a. Optimistic b. Skeptical c. Ambivalent d. All the above A computer’s hard disk is a/an a. Arithmetic and logical unit b. Computer software c. Operating system d. Computer hardware Collecting personal information and effectively posing as another individual is known as the crime of a. Spooling b. Identity theft c. Spoofing d. Hacking What type of virus uses computer hosts to reproduce itself a. Time bomb 191 | P a g e
[Pick the date]
18.
19.
20.
21.
22.
23.
24.
25.
[ESSC COMPUTER AWARENESS]
b. Worm c. Melissa virus d. Macro virus What is the name of an application program that gathers user information and sends it to someone through the Internet a. A virus b. Spybot c. Logic bomb d. Security patch ---- is the measurement of things such as fingerprints and retinal scans used for security access a. Biometrics b. Biomeasurement c. Computer security d. Smart weapon machinery The role of a --- generally is to determine a buyer’s needs and match it to the correct hardware and software a. Computer scientist b. Computer sales representative c. Computer consultant d. Corporate trainer To locate a data item for storage is a. Field b. Feed c. Database d. Fetch Programs designed to perform specific tasks is known as a. System software b. Application software c. Utility programs d. Operating system Perforated paper used as input of output media is known as a. Paper tapes b. Magnetic tape c. Punched paper tape d. Card punch Time during which a job is processed by the computer is a. Delay time b. Real time c. Execution time d. Down time A computer with CPU speed around 100 million instructions per second and with the word length of around 64 bits is known as a. Super computer b. Mini computer 192 | P a g e
[Pick the date]
26.
27.
28.
29.
30.
31.
32.
33.
34.
[ESSC COMPUTER AWARENESS]
c. Micro computer d. Macro computer Memory in a PC is addressable through a. Bits b. Bytes c. Nibble d. All of the above One Kilo Byte represents a. 1024 bytes b. 1000bytes c. 1042 bytes d. 1064 bytes Basic building block for a digital circuit is a. Word b. Logic gate c. Processor d. BUS Which of the following is a logic gate a. AND b. OR c. CPU d. Both (1) AND (2) The base of a binary number is a. 2 b. 16 c. 8 d. 10 A processing complex consisting of two or more interconnected computer is called a. Computer network b. Control program c. Cybernetics d. All the above Which of the following high-level language has been developed for business data processing application a. BASIC b. PASCAL c. COBOL d. FORTAIN Languages which can easily interact with the hardware are called a. High-level language b. Low-level language c. Middle-level languages d. (1) and (3) only How man bits are there in ASCII codes a. 8 193 | P a g e
[Pick the date]
35.
36.
37.
38.
39.
40.
41.
42.
[ESSC COMPUTER AWARENESS]
b. 10 c. 12 d. 16 Buffering in printers in necessary because a. The computer is faster in generating data for printing than the printer can print it b. There is not enough memory provided with printers c. We want the printers to work for many years d. Both (1) and (2) The two kinds of main memory are a. Primary and secondary b. Random and sequential c. ROM and RAM d. All the above A kind of serial dot-matrix printer that forms characters with magnetically-charged-inksprayed-dots is called a. Laser printer b. Ink-jet-printer c. Drum printer d. Chan printer Which of the following printers is very commonly used for desktop publishing a. Laser printer b. Ink-jet-printer c. Daisywheel printer d. Dot-matrix printer An output device that uses words or messages recorded on a magnetic medium to produce audio response is a. Voice band b. Magnetic tape c. Voice response unit d. Voice recognition unit Which of the following will happen when data is entered into a memory location a. It will add to the content of the location b. It will change the address of the memory location c. It will erase the previous content d. It will not be fruitful if there is already some data at the location Artificial Intelligence is associated with which of the following generations a. First generation b. Second generation c. Fifth generation d. Sixth generation Which of the following operations is not performed by computer a. Inputting b. Processing c. Controlling d. Understanding 194 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
43. The fifth generation computer is also known as a. Knowledge information processing system b. Very Large Scale Integration (VLSI) c. Superfast computer d. Both (1) and (2) 44. Central Processing Unit is a combination of a. Control and Storage unit b. Control and Output unit c. Arithmetic, Logic and Input unit d. Arithmetic, Logic and Control unit 45. The brain of any computer system is a. Control unit b. Arithmetic and Logic unit c. Central processing unit d. Storage unit 46. Pick the one that is used for logical operation or comparisons such as less than, equal to or greater than a. Arithmetic and Logic Unit b. Control Unit c. Both (1) and (2) d. (2) only 47. Analog computer works on the supply of a. Continuous electrical pulses b. Electrical pulses but no continuous c. Magnetic strength d. None of the above 48. Word processing, spreadsheet and photo-editing are examples of a. Application software b. System software c. Operating system software d. Platform software 49. ---- is a set of computer programs used on a computer to help perform tasks a. An instruction b. Software c. Memory d. A processor 50. System software is the set of programs that enable your computer hardware devices and --software to work together a. Management b. Processing c. Utility d. Application
195 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Answer key 5. (b) 2.(a) 10.(c)
3.(b)
4.(a)
5.(d)
6.(b)
7.(c)
8.(c)
9.(c)
11.(b) 12.(d) 13.(a) 14.(b) 15.(d) 16.(b) 17.(b) 18.(b) 19.(a) 20.(b) 21.(b) 22.(b) 23.(b) 24.(c) 25.(a) 26.(b) 27.(a) 28.(d) 29.(d) 30.(a) 31.(a) 32.(b) 33.(a) 34.(a) 35.(d) 36.(c) 37.(b) 38.(a) 39.(b) 40.(c) 41.(c) 42.(d) 43.(a) 44.(d) 45.(c) 46.(a) 47.(a) 48.(a) 49.(b) 50.(d)
196 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice Set 26
1. ______Bar is located at top of word pad/ Notepad/ Ms Word window. 1) Title 2) Menu 3) Tool 4) Format 2. Computers always use ______Logic. 1) Decimal 2) Fuzzy 3) Binary 4) All of the above 3. Which of the following is not a Word processor? 1) Microsoft Word 2) Word Perfect 3) Microsoft Excel 4) Word Star 4. The Decimal number 36 is expressed in binary as 1) 100100 2) 110100 3) 111100 4) 100110 5. What is the decimal form of 3B4? 1) 846 2) 848 3) 946 4) 948 6. All of the following are parts of the basic logical operations in Boolean algebra except 1) AND 2) NAND 3) OR 4) NOT 7. Let A, B and C be three binary numbers, Which of following is not true according to Boolean algebra laws? 1) A+B=B+A 2) AB = BA 3) A-B=B-A 4) (A+B)+C=A(B+C)
8. CPU does not have________ 197 | P a g e
[Pick the date]
9.
10.
11.
12.
13.
14.
15.
[ESSC COMPUTER AWARENESS]
1) Arithmetic and logic units 2) Control Unit 3) Registers 4) Display Latest Entry Level Desktop PC have at least more than __________of a RAM 1) 100 Bits 2) 100 Bytes 3) 100 KB 4) 100 MB The storage capacity of the Hard Disk is determined as? 1) Number of tracks* Number of sectors * Bytes per sector * Number of read / Write heads 2) Number of tracks * Number of sectors * bytes per sector 3) Number of tracks * Number of sectors * 2 * bits per sector * Number of read / write heads 4) Number of tracks* Number of sectors A standard 3.5” floppy disk can hold _______ of data 1) 1.44 GB 2) 1.44 MB 3) 1.44 KB 4) 1.44 B Modem is used in________ 1) Computer based OCR 2) MICR recognition 3) Communication 4) Multiple Character Printing Which of the following is not a browser? 1) Opera 2) Firefox 3) IE 4) GUI Which of following is not a GUI – based OS? 1) UNIX 2) LINUX 3) Microsoft Windows 4) Mac OS Which of the following is not an open – source software product? 1) Apache 2) Drupal 3) Microsoft Office 4) Mozilla Firefox
16. In windows Environment Ctrl + C is used to 1) Copy 2) Paste 198 | P a g e
[Pick the date]
17.
18.
19.
20.
21.
22.
23.
[ESSC COMPUTER AWARENESS]
3) Cut 4) Undo In windows Environment Ctrl + Z is used to 1) Copy 2) Paste 3) Cut 4) Undo In windows Environment Ctrl + X is used to 1) Copy 2) Paste 3) Cut 4) Undo In windows Environment Ctrl + V is used to 1) Copy 2) Paste 3) Cut 4) Undo AMD manufactures 1) PCs 2) Hard Disks 3) Monitors 4) Processors Which of the following is the advantage of using a spreadsheet? 1) Calculations can be done automatically 2) Changing data automatically updates calculations 3) More flexibility 4) All of the above Which of the following shortcut keys is used to check spelling? 1) F1 2) F2 3) F7 4) F9 On an Excel sheet the active cell is indicated by_____ 1) A dark wide border 2) A dotted border 3) A blinking border 4) All the above
24. To move to the previous worksheet, we press. 1) Alt + Pg UP 2) Ctrl + Pg UP 3) Ctrl + Pg Dn 4) Shift + Tab 25. An Excel Workbook is a collection of ________ 199 | P a g e
[Pick the date]
26.
27.
28.
29.
30.
31.
32.
33.
[ESSC COMPUTER AWARENESS]
1) Workbooks 2) Worksheets 3) Charts 4) Worksheets and charts If you press ______, the cell accepts your typing as its contents. 1) Enter 2) Ctrl + Enter 3) Tab 4) Insert Which of the following displays the buttons for changing text style, alignment and size? 1) Standard tool bar 2) Status bar 3) Drawing tool bar 4) Formatting tool bar All formulas in Excel start with _______ 1) % 2) + 3) = 4) _ To add two cells (A1 and A2) together you use which of the following formula? 1) = A1+A2 2) = Add (A1+A2) 3) = together (A1:A2) 4) A1 plus A2 Find the correct set three types of data found in a spreadsheet. 1) Data, Words, Numbers 2) Equations, Data, Numbers 3) Words, Numbers, Labels 4) Numbers, formulas, Labels When did arch rivals IBM and Apple Computers Inc decide to join hands? 1) 1978 2) 1991 3) 1984 4) 1985 ATM cells comprise how many bytes? 1) 53 bytes 2) 57 bytes 3) 45 bytes 4) 48 bytes A computer with CPU speed around 100 million instructions per second and word length of around 64 bits, is known as _______ 1) Micro computer 2) Macro computer 3) Mini computer 4) Super computer 200 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
34. Two or more computers connected with each other for sharing information form a ______ 1) Tunnel 2) Server 3) Router 4) Network 35. A set of rules that a computer on a network used to communicate with each other is called _______ 1) Netiquettes 2) Communications 3) Regulations 4) Protocol 36. SMPS Stands for _______ 1) Switched Mode Power Supply 2) Start Mode Power Supply 3) Store Mode Power Supply 4) Single Mode Power Supply 37. The device used to carry digital data on analog lines is called 1) Modem 2) Multiplexer 3) Modulator 4) Demodulator 38. VDU is also called _________ 1) Screen 2) Monitor 3) Both 1 and 2 4) Printer 39. BIOS Stands for 1) Basic Input Output system 2) Binary Input Output system 3) Basic Input Off system 4) All of the above 40. Who among the following is the farther of ‘C’ programming language? 1) Dennis Ritchie 2) Prof John kemeny 3) Thomas Kurtz 4) Bill Gates 41. The 16-bit micro processor means that it has 1) 16 address lines 2) 16 buses 3) 16 data lines 4) 16 routes 42. The data going into the computer is called 1) Output 2) Algorithm 3) Input 201 | P a g e
[Pick the date]
43.
44.
45.
46.
47.
48.
49.
50.
[ESSC COMPUTER AWARENESS]
4) Calculations 5) Flow chart Which of the following refers to a small, single-site network? 1) LAN 2) DSL 3) RAM 4) USB 5) CPU Microsoft Office is a/an 1) Shareware 2) Public domain software 3) Open-source software 4) Vertical market application How many options does a binary choice offer? 1) None 2) One 3) Two 4) It depends on the amount of memory on the computer 5) It depends of the speed of the processor of the computer A collection of programs that controls how your computer system runs and processes information is called ______ 1) o/S 2) computer 3) office 4) complier A computer to a LAN can 1) Run faster 2) Go online 3) Share information and/or share peripheral equipment 4) Email Information travels b/w components on the mother board through 1) Flash memory 2) CMOS 3) Bays 4) Buses 5) Peripherals How are data organized in a spreadsheet? 1) Lines and spaces 2) Layers and planes 3) Height and width 4) Rows and columns The blinking symbol on the computer screen is called 1) Mouse 2) Logo 3) Hand 202 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
4) Palm 5) Cursor
Answer key 6. (1) 2.(3) 10.(4)
3.(3)
4.(1)
5.(4)
6.(2)
7.(3)
8.(4)
9.(4)
11.(2) 12.(3) 13.(4) 14.(1) 15.(3) 16.(1) 17.(4) 18.(3) 19.(2) 20.(4) 21.(4) 22.(3) 23.(1) 24.(4) 25.(4) 26.(1) 27.(4) 28.(3) 29.(1) 30.(4) 31.(2) 32.(1) 33.(4) 34.(4) 35.(4) 36.(1) 37.(1) 38.(3) 39.(1) 40.(1) 41.(3) 42.(3) 43.(1) 44.(5) 45.(3) 46.(1) 47.(3) 48.(3) 49.(4) 50.(5)
203 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set27
1. A ______ contains specific rules and words that express the logical steps of an algorithm. 1) Programming language 2) Programming structure 3) Syntax 4) Logic chart 2. ______ is a set of keywords, symbols, and a system of rules for constructing statements by which humans can communicate the instructions to be executed by a computer. 1) A computer program 2) a programming language 3) An Assembler 4) Syntax 3. The general term “peripheral equipment” is used for 1) Any deice that is attached to a computer system 2) Large scale computer systems 3) A program collection 4) Other office equipment not associated with a desktop computer 4. If a memory chip is volatile, it will _______ 1) Explode if exposed to high temperature 2) Lose its contents if current is turned off 3) Be used for data storage only 4) Be used to both read and write data 5. _________ is the process of finding errors in software code. 1) Compiling 2) Assembling 3) Interpreting 4) Debugging 6. Approximately how many bytes make one Megabyte? 1) One Thousand 2) Ten Thousand 3) One Hundred 4) One Million 7. What is MP3? 1) A mouse 2) A printer 3) A sound format 4) A scanner 8. All the deleted files go to 1) Recycle Bin 2) Task Bare 3) Tool Bar 4) My Computer 204 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
9. ________ is the act of copying or downloading a program form a network and making multiple copies of it. 1) Network piracy 2) Plagiarism 3) Software piracy 4) Site-license piracy 10. A directory within a directory is called a _____ 1) Mini directory 2) Junior directory 3) Part directory 4) Sub- directory 11. Name the software which sends instructions to computer what to do. 1) Programs 2) CPU 3) Options 4) Folder 12. A program which helps create written documents and lets you go back and make necessary correction is called ____ 1) Spreadsheet 2) Personal writer 3) Word printer 4) Word processor 13. A place that a user can create to store files is called ____ 1) Cursor 2) Text 3) Folder 4) Boot 14. To start or restart the computer is called 1) Exit 2) Kick 3) Booting 4) Kick-start 15. What do we call a blinking indicator that shows you where your next action will happen? 1) CPU 2) Cursor 3) Tool bar 4) Boot 16. The _____ key and the______ key can be used in combination with other keys to perform shortcuts and special tasks. 1) Control, Alt 2) Function, toggle 3) Delete, Insert 4) Caps Lock, Num Lock 17. A file is 1) A section of main storage used to store data. 205 | P a g e
[Pick the date]
18.
19.
20. 21.
22.
23.
24.
25.
26.
[ESSC COMPUTER AWARENESS]
2) A collection of information that has been given a name and is stored in secondary memory. 3) The part of a program that is used to describe what the program should do. 4) Another name for floppy disk For creating a document, you use _______ command at file menu. 1) Open 2) Close 3) New 4) Save Applications are often referred to as _______ 1) Data file 2) Executable files 3) System software 4) The O/S PC stands for ___ Personal Computer Which of the following are advantages of CD-ROM as a storage media? It 1) Is an inexpensive way to store a large amount of data and information 2) Retrieves data and information quicker than magnetic disks do. 3) Makes less error than magnetic media. 4) All of these A _____ is the term used when a search engine returns a web page that matches the search criteria. 1) Blog 2) Hit 3) Link 4) View The______ is the term used to describe the window that is currently being used. 1) Web window 2) Display area 3) WordPad window 4) Active window 5) Monitor CPU is an abbreviation Unit 1) Central Programming unit 2) Central Processing Unit 3) Computer Processing Unit 4) Computer Protocol Unit 5) Central Protocol Unit A microprocessor is the brain of the computer and is also called an 1) Microchip 2) Microchip 3) Microprocessor 4) Calculator 5) Software Errors in a computer program are referred to as 206 | P a g e
[Pick the date]
27.
28.
29.
30.
31.
32.
[ESSC COMPUTER AWARENESS]
1) Bugs 2) Mistakes 3) Item overlooked 4) Blunders A compiler is used to translate a program written in 1) A low – level language 2) A High – level language 3) Assembly language 4) Machine language Computer programs are also known as 1) Operating system 2) Documents 3) Peripherals 4) Applications Which of the following are computers that can be carried around easily? 1) Laptops 2) Supercomputers 3) PCs 4) Minicomputers The secret code that restricts entry to some program is 1) Entry – Code 2) Passport 3) Password 4) Access – code The ________ becomes different shapes depending on the task you are performing. 1) Active tab 2) Insertion point 3) Mouse pointer 4) Ribbon By default, Excel positions a text in a cell 1) Left aligned 2) Right – aligned 3) Centered 4) Justified 5) None of these
33. To centre a paragraph using shortcut keys, press 1) Ctrl + C 2) Ctrl + E 3) Ctrl + L 4) Ctrl + R 34. To print a document, press_________ then press ENTER 1) SHIFT + P 2) CTRL + P 207 | P a g e
[Pick the date]
35.
36.
37.
38.
39.
40.
41.
42.
[ESSC COMPUTER AWARENESS]
3) ALT + P 4) ESC + P Multiplexing involves_________ paths and_______ channels 1) One, one 2) One, Multiple 3) Multiple, One 4) Multiple, Multiple To access properties of an object, the mouse technique to use is 1) Dragging 2) Dropping 3) Right-clicking] 4) Shift-clicking A(n) _______ is a program that makes the computer easier to use. 1) O/S 2) Application 3) Utility 4) Network Connection to the Internet using a phone line and a modem are called _____ connections. 1) Digital 2) Dial-up 3) Broadband 4) Dish To access a mainframe or supercomputer, users often use a _____ 1) Terminal 2) Node 3) Desktop 4) Handheld Office LAN that are spread geographically apart on a large scale can be connected using a corporate _____ 1) CAN 2) LAN 3) DAN 4) WAN 5) TAN Name the part of a computer that one can touch and feel. 1) Hardware 2) Software 3) Programs 4) Output Name the component which is required to process data into information and consists of integrated circuits. 1) Hard disk 2) RAM 3) CPU 4) ROM 208 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
43. Which of the following parts of the computer displays the work done? 1) RAM 2) Printer 3) Monitor 4) ROM 44. The main job of a CPU is to ______ 1) Carry out program instructions. 2) Store data/information for future use. 3) Process data and information 4) Both (1) and (3) 45. ______ are attempts by individuals to obtain your confidential information by falsifying their identify. 1) Phishing trips 2) Computer viruses 3) Special function cards 4) Scanners 46. A repair for a known software but, usually available at no charge on the internet, is called a(n) ________ 1) Version 2) Patch 3) Tutorial 4) FAQ 47. Computers gather data, which means that they allow users to ______ data. 1) Present 2) Input 3) Output 4) Store 48. Which of the following terms is just the connections of networks that can be joined together? 1) Virtual private network 2) Internet 3) Intranet 4) Extranet 49. _______ is a form of permanent memory that holds all the instructions the computer needs to start up and does not get erased when the power is turned off. 1) The network interface card 2) The CPU 3) RAM 4) ROM 50. Servers are computers that provide resources to other computers connected to a 1) Network 2) Mainframe 3) Supercomputer 4) Client
209 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Answer key 7. (3) 2.(4) 10.(4)
3.(1)
4.(2)
5.(1)
6.(4)
7.(3)
8.(1)
9.(3)
11.(1) 12.(4) 13.(3) 14.(3) 15.(2) 16.(1) 17.(2) 18.(3) 19.(2) 20.(3) 21.(1) 22.(2) 23.(4) 24.(2) 25.(1) 26.(1) 27.(2) 28.(4) 29.(1) 30.(3) 31.(3) 32.(5) 33.(2) 34.(2) 35.(2) 36.(3) 37.(3) 38.(2) 39.(1) 40.(4) 41.(1) 42.(4) 43.(3) 44.(4) 45.(1) 46.(2) 47.(4) 48.(2) 49.(4) 50.(1)
210 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 28
1. If a user turns on a Windows XP system, which of the following programs will be activated rest? 1) Exhaust fan of SMPS will start rotating 2) Windows XP logo screen will appear with progress bar. 3) O/S will start loading its file in RAM. 4) Desktop screen will appear with mouse pointer 2. In Windows Explorer, when a user press Alt key and double clicks a file/folder simultaneously, what will happen? 1) The selected file/folder will open in a new window. 2) The selected file/folder will open in the same window. 3) The selected file/folder will move to recycle bin. 4) The properties/dialog box of the selected file/folder will open. 3. Which of the following in not true? 1) TCP is a connection-oriented protocol 2) 48 is an Octal Number 3) FTP stands for File Transfer Protocol 4) A file having extension PNG is a graphic file. 4. Which of the following is a type of optical media? 1) FDD 2) HDD 3) CD 4) Magnetic Tape 5. DVD stands for 1) Digital video disk 2) Digital versatile disk 3) Digital video device 4) Both 1 and 2 6. Which of the following in an input device? 1) VDU 2) Printer 3) Plotter 4) MICR 7. Identify the odd one: 1) Storage Tape Memory 2) Magnetic Disc Memory 3) Optical Disc Memory 4) Read Only Memory 8. Nibble describes a bits combination of 1) 5 bits 2) 6 bits 3) 7 bits 211 | P a g e
[Pick the date]
9. 10.
11.
12.
13.
14.
15.
16.
17.
18.
[ESSC COMPUTER AWARENESS]
4) 4 bits IT stands for Information Technology Which of the following refers to the fastest, biggest and most expensive computers? 1) Personal Computers 2) Super computers 3) Laptops 4) Notebooks A collection of related information sorted and death which as a unit called a ______ 1) Disk 2) Dada 3) File 4) Floppy The process by which a computer receives information form a server on the internet is known as ___ 1) Pulling 2) Pushing 3) Downloading 4) Transferring Which part of the computer helps in sorting information? 1) Disk Drive 2) Keyboard 3) Monitor 4) Printer _____ is the process of carrying out commands. 1) Fetching 2) Storing 3) Executing 4) Decoding The role is a ______ to determine a buyer’s needs and match it is the correct hardware and software. 1) Computer scientist 2) Computer sales representative 3) Computer consultant 4) Corporate trainer Active Window means 1) A window which is designated by a different color toolbars other than the open window 2) The window that is currently open 3) Both 1 and 2 4) The window that is last used Which of the following is not a logic gate? 1) AND 2) OR 3) NAT 4) NOT When we purchase a product on a mobile, the transaction is called 212 | P a g e
[Pick the date]
19.
20.
21.
22.
23.
24.
25.
26.
[ESSC COMPUTER AWARENESS]
1) Web Commerce 2) E- Commerce 3) M– Commerce 4) Mobile Purchases Who is the founder of Oracle Corporation? 1) Lars Ellison 2) Bill Gates 3) Dennis Ritchie 4) Linux Dorval’s What is the communication protocol that allows you to connect your computer to the internet using a standard telephone line? 1) HTTP 2) ISDN 3) Link 4) Protocol 5) TCP/IP What does SMPS stand for? 1) Switched Mode Power Supply 2) Single Mode Power Supply 3) Simple Mode Power Supply 4) Synchronous Mode Power Supply What is the given to the standard set of rules that two computers use to communicate with each other? 1) Access Control 2) Domain 3) Link 4) Protocol Computer software includes 1) Application programs 2) O/S programs 3) Packages programs 4) All of the above Machine language is ________ 1) Is the language in which programs were first written? 2) Is the only language understood by the computer 3) Differs form the one type of computer to another 4) All of these Which of the following devices is used as the standard pointing device in the graphical use environment? 1) Keyboard m 2) Mouse 3) Joystick 4) Trackball Which of the following is a general purpose programming language designed by sun micro system and well suited for use of the Web? 213 | P a g e
[Pick the date]
27.
28.
29.
30.
31.
32.
33.
34.
[ESSC COMPUTER AWARENESS]
1) VB Script 2) Java Script 3) CSS 4) Java The ______ tier process HTTP protocol, scripts tasks, performs calculations and provide access to data. 1) Client 2) Application/Web server 3) Enterprise server 4) DBA RSA is 1) Symmetric Cryptosystem 2) Digital Signature 3) Asymmetric Cryptosystem 4) Block Cipher A DVD_RAM is similar to a _____ except that it has storage capacities up to 5.2 GB 1) CD-R 2) Floppy disk 3) CD-RW 4) Hard disk When you select a mouse for a particular computer system what is the most important consideration? 1) The type of drivers that come with the mouse 2) The length of the mouse cord 3) The type of connector the mouse is equipped with 4) The number of buttons the mouse has Which of the following is an acronym for Electronic Delay Storage Automatic Calculator? 1) UNIVAC 2) EDSAC 3) EDVAC 4) Abacus Which of the following is a form of semi-conductor memory in which it is possible to change the contently of selected memory locations by applying suitable electrical signals? 1) CAM 2) ROM 3) EPROM 4) Abacus A disk storage medium in the form of an assembly containing a single rigid magnetic disk permanently is called 1) Fixed disk 2) Disk cartridge 3) Card punch 4) Card reader A memory that is capable of determining whether a given datum is contained in one of its addresses is called _______ 214 | P a g e
[Pick the date]
35.
36.
37.
38.
39.
40.
41.
42.
[ESSC COMPUTER AWARENESS]
1) ROM 2) PROM 3) CAM 4) RAM A method of implementing a memory management system is 1) Buddy system 2) Bridge ware 3) Broadband coaxial system 4) All the above One kilo byte represents 1) 1024 bytes 2) 1000 bytes 3) 100 bytes 4) 1064 bytes The most important advantage of a video disk is 1) Compactness 2) Potential capacity’ 3) Durability 4) Cost effectiveness What is the number of read-write heads in the drive for a 9-track magnetic tape? 1) 9 2) 16 3) 18 4) 27 Before a disk drive can access any record a computer program has to provide the record’s disk address. What information does this address specify? 1) Track number 2) Sector number 3) Surface number 4) All the above As compared to diskettes, the hard disks are 1) More expensive 2) More portable 3) Less rigid 4) Slowly accessed Condensing output data to exhibit specific information is called 1) Calculating 2) Recording 3) Merging 4) Summarizing Which of the following chips using special external equipment can reprogram? 1) ROM 2) PROM 3) SAM 4) RAM 215 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
43. A storage device where the access time depends upon the location of the data is called 1) Random access 2) Serial access 3) Sequential access 4) Transaction access 44. Which number system is commonly used as a shortcut notation for a group of four binary digits? 1) Binary 2) Decimal 3) Octal 4) Hexadecimal 45. Which of the following groups consists of only output devices? 1) Scanner, Printer, Monitor 2) keyboard, Printer, Monitor 3) mouse, Printer, Monitor 4) plotter, Printer, Monitor 46. The rectangular area of the screen that displays a program, data, and/or information is called a 1) Title bar 2) Button 3) Dialog box 4) Window 47. Booting is a process to _______ 1) Load DOS 2) Switch on the computer 3) Load the memory 4) All the above 48. Which of the following is the command to restart the computer? Press 1) Ctrl + Z 2) Ctrl + Alt + Del 3) Tab + Alt + Del 4) Shift + Ctrl + Tab 49. A byte consists of 1) 9 bits 2) 8 bits 3) 7 bits 4) 4 bits 50. Memory in PC is addressable through 1) Bits 2) Byte 3) Nibble 4) All the above
Answer key 216 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
8. (3) 2.(2) 10.(2)
3.(4)
4.(3)
5.(2)
6.(4)
7.(4)
8.(4)
9.(1)
11.(3) 12.(3) 13.(1) 14.(1) 15.(2) 16.(2) 17.(3) 18.(3) 19.(1) 20.(1) 21.(4) 22.(1) 23.(4) 24.(4) 25.(3) 26.(2) 27.(1) 28.(2) 29.(3) 30.(3) 31.(2) 32.(3) 33.(2) 34.(3) 35.(1) 36.(1) 37.(2) 38.(1) 39.(3) 40.(1) 41.(4) 42.(2) 43.(2) 44.(4) 45.(4) 46.(4)
47.(2) 48.(2) 49.(2) 50.(2)
Practice set 29
1. Database redesign is not terribly difficult if the database 1) Is structured 2) Is well-designed 3) Has no data 4) Is relatively small 2. Which of the following is normally used to initialize a computer system’s hardware? 1) Bootstrap memory 2) Volatile memory 3) External mass memory 4) Random access memory 3. The use of spooler programs and/ore ___ hardware allows personal computer operators to do the processing work at the same time when a printing operation is in progress. 1) Registered mains 2) Memory 3) CPU 4) Buffer 4. Which most popular input device is used for interactive processing and for one line entry of data batch processing? 1) Mouse 2) Magnetic disk 217 | P a g e
[Pick the date]
5.
6.
7.
8.
9.
10.
11.
12.
[ESSC COMPUTER AWARENESS]
3) Visual display terminal 4) Card punch User programmable terminals the combine VDT hardware with built-in microprocessor is called________ 1) Kips 2) PC 3) Mainframe 4) Intelligent terminals The number of characters that can be stored in a given physical space is called ___ 1) Word length 2) Byte 3) Data density 4) Field The storage capacity of a disk system depends on the bits per inch of track and the tracks per inch of ________ 1) Cylinder 2) Hum 3) Cluster 4) Surface Which of the following is not a unit of measurement in a computer system? 1) DPI 2) PPI 3) API 4) BD 5) MB In windows XP, which shortcut is used to cycled through opened items in taskbar? 1) Ctrl +Tab 2) Alt +Tab 3) Ctrl +Esc 4) Alt +Esc A digital computer computes the value of expression 2*5—2>2 inside which of the following? 1) RAM 2) CPU Chip 3) Hard disk 4) Floppy disk To produce a high-quality graphics (hard copy) in color, you would want to use a 1) Virtual printer 2) Laser printer 3) Ink-printer 4) Plotter Which of the following is the fastest memory? 1) DDR RAM 2) DDR2 RAM 3) DDR3 RAM 218 | P a g e
[Pick the date]
13.
14.
15.
16.
17. 18.
19.
20.
[ESSC COMPUTER AWARENESS]
4) Swap Memory Which protocol is used by the O/S to generate error messages like’ Host Unreachable” over a TCP/IP network? 1) HTTP/1.1 2) ICMP 3) PPP 4) ICGM 5) TCP/IP What does SNMP stand for? 1) Simple Network Mail Protocol 2) Single Network Mail Protocol 3) Single Network Message Protocol 4) Simple Network Management Protocol Which is NOT a good Web security strategy? 1) Restricting access to the Web server, keeping a minimum number of ports open 2) Limiting the users who can load software, edit or add files 3) Adding demo programs so that users can test system without accessing production data 4) Removing unnecessary compliers and interpreters The altering of data so that it is not usable unless the changes are undone is called 1) Biometrics 2) Compression 3) Encryption 4) Ergonomics FTP stand for File Transfer Protocol Which of the following is true for ‘voicemail’? 1) It is the exchange of text messages and computer files transited via a communication network such as a local area network or Internet 2) It permits users to converse in real time with each other via computer while connected to internet 3) It functions much like an answering machine, allowing callers to leave a voice message for the called party. 4) It involves using video and computer technology to conduct a meeting of participants present at geographically separated locations. A communication processor that connects dissimilar networks by providing the translation of one set of protocol to another is called __________ 1) Bridge 2) Gateway 3) Router 4) Modem 5) All the above The lowest form of computer language is called 1) BASIC 2) FORTRAN 3) Machine Language 4) COBOL 219 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
21. The memory which forgets everything when you switch off the power is known as ______ 1) Corrupt 2) Volatile 3) Non-Volatile 4) Non-Corrupts 22. The linking of computers with a communication system is called _____ 1) Networking 2) Pairing 3) Interlocking 4) Assembling 5) Sharing 23. A 16-bit microprocessors has 1) 16 address lines 2) 16 buses 3) 16 data lines 4) 16routes 24. PARAM is an example of a _______ 1) Super computer 2) PC 3) Laptop 4) PDA 25. Who among the following developed the ‘analytical engine’? 1) Jacquard Loom 2) Charles Babbage 3) Shannon 4) IBM 26. ENIAC Stands for 1) Electrical Numerical Integrator and Calculator 2) Electrical Numerical Integrator and Computer 3) Electrical Numerical Integrator and Calculator 4) Electrical Number Integrator and Calculator 27. The first generation of computers was based on which of the following technologies? 1) Transistor 2) Vacuum tube 3) LSI 4) VLSI 28. Microprocessor was introduced in which generation of computers? 1) Second generation 2) Fourth generation 3) Both 1 and 2 4) Third generation 5) All the above 29. GUI stands for 1) Graphical user interface 220 | P a g e
[Pick the date]
30.
31.
32.
33.
34.
35.
36.
37.
[ESSC COMPUTER AWARENESS]
2) Graph user interface 3) Graphical universal interface 4) All the above The time taken b y the CPU to retrieve and interpret the instructions to be executed is called as 1) Instruction cycle 2) Fetch cycle 3) Either1 and 2 4) Both 1 and 2 Which of the following is responsible for all types of calculations? 1) ALU 2) Control Unit 3) Registers 4) BUS Internal memory a CPU is nothing but 1) A set of registers 2) A set of ALU 3) A microprocessor 4) A BUS Which of the following is a permanent memory? 1) SRAM 2) DRAM 3) ROM 4) All the above What type of port sends data one bit at a time? 1) Serial 2) Parallel 3) USB 4) FireWire The power-saying mode that allows the computer to restart by simply pressing a keyboard is called.________ 1) Standby 2) Warm booting 3) Power management 4) Cold boot Retail employees typically use _______ terminals’ to process sales translations 1) Sales processing 2) Transaction point 3) Automatic teller 4) Point of sale The process of ______ involves automated study of consumer’s buying patterns to support marketing, inventory replenishment and pricing decisions. 1) Transaction processing 2) Data mining 3) Simulation 221 | P a g e
[Pick the date]
38.
39.
40.
41.
42.
43.
44.
45.
[ESSC COMPUTER AWARENESS]
4) Information processing The engineering discipline that involves construction of computing devices of the size of a molecule is called _______ 1) Nanotechnology 2) Molecular processing 3) Silicon grafting 4) Nano science The prefix that stands for “billionth” is _____ 1) Giga 2) Tera 3) Nano 4) Peta Program that automatically submit your search request to several search engines simultaneously are called_______ 1) Met search engines 2) WebCrawler’s 3) Spiders 4) Hits Graphical diagrams are used to represent multiple perspectives of a system which include 1) Use-case, class and state diagrams 2) State, interaction and derivative diagrams 3) Interaction, relationship and class diagrams 4) Deployment, relationship and use-case diagrams Which is best view for representing your thoughts as a presentation on a computer? 1) Outline view 2) Notes page view 3) Slide sorter view 4) Slide view The arrangement of elements such as title and subtitle text, picture tables etc is called ______ 1) Layout 2) Presentation 3) Design 4) Scheme A chart can be put as a part of the presentation using which of the following routes? 1) Insert --chart 2) Insert- pictureschart 3) Edit Chart 4) View chart Which view in Power point can be used to enter speaker’s comments? 1) Normal 2) Slide show 3) Slide sorter 4) Notes page view
222 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
46. The boxes that are displayed to indicate that the text pictures or objects are placed in it is called 1) Placeholder 2) Auto text 3) Text box 4) Word art 47. Which of the following languages is more suitable for a structured program? 1) PL/1 2) FORTRAN 3) BASIC 4) PASCAL 48. A computer-assisted method for the recording and analyses of existing or hypothetical system is called ____ 1) Data transmission 2) Data flow 3) Data capture 4) Data processing 49. The brain of the any computer system is also called as 1) ALU 2) Memory 3) CPU 4) Control unit 50. Which of the following is the key difference which separates the computers fof 5thg generation from the rest of the generations? 1) Technological advancement 2) Scientific code 3) Object oriented programming 4) All the above
Answer key 9. (1) 2.(4) 10.(2)
3.(4)
4.(1)
5.(4)
6.(3)
7.(4)
8.(1)
9.(2)
11.(2) 12.(3) 13.(4) 14.(1) 15.(4) 16.(3) 17.(4) 18.(3) 19.(2) 20.(4) 21.(2) 22.(1) 23.(3) 24.(1) 25.(2) 26.(2) 27.(2) 28.(2) 29.(1) 30.(1) 31.(1) 32.(1) 33.(3) 34.(1) 35.(1) 36.(4) 37.(2)
223 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS] 38.(1) 39.(3) 40.(1) 41.(1) 42.(1) 43.(1) 44.(2) 45.(4) 46.(1) 47.(4) 48.(2) 49.(3) 50.(1)
224 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
Practice set 30 1) A hard copy of a document is 1) Stored in the hard disk 2) Stored on a floppy 3) Stored on a CD 4) None of these 2) The capability of the operating system to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is called 1) Multiprocessing 2) Multitasking 3) Multiprogramming 4) Multi execution 5) None of these 3) The basic goal of a computer process is to convert data into 1) Information 2) Tables 3) Files 4) Graphs 5) None of these 4) Which of the following is not an output device? 1) Plotter 2) Printer 3) Scanner 4) Monitor 5) None of these 5) Which keys can be used together with other keys for special tasks? 1) Insert, Delete 2) Ctl , Shift 3) Left Arrow, Right Arrow 4) Page up, Page down 5) None of these 6) Eight bits of data are called 1) Octabit 2) Word 3) Sentence 4) Byte 5) None of these
7) The secret code that gives you access to some programs is called 1) Clue 2) Cue 3) Password 4) Help 225 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
5) None of these 8) The different styles of lettering in a word processing program are called 1) Font 2) Calligraphy 3) Writing 4) Manuscript 5) None of these 9) Which of the following is the name of the part of a computer that one can touch and feel? 1) Programs 2) Software 3) Hardware 4) Output 5) None of these 10) Computers gather data, which means they allow users to ________data. 1) Present 2) Store 3) Output 4) Input 5) None of these 11) CPU stands for 1) CD-run on memory 2) Central processing unit 3) Call powers up 4) Create programs user 5) None of these 12) A disk on which you store information is 1) Plate 2) Data disk 3) Paper disk 4) TV disk 5) None of these 13) Which of the following allows you to print? 1) Ribbon 2) Monitor 3) Go now 4) Control-p 5) None of these 14) Which of the following means ‘easy to use’? 1) User-friendly 2) Select 3) Helpful 4) Ever-ready 5) None of these 15) When your computer stops working suddenly, it is referred to as a 1) Crash 226 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
2) Die 3) Death 4) Penalty 5) None of these 16) The smallest item of useful information that a computer can handle is called 1) Bite 2) Byte 3) Bit 4) Bait 5) None of these 17) Devices that let the computer communicate with you are called 1) Input devices 2) Output device 3) Type devices 4) Print devices 5) None of these 18) Devices that allow you to put information into the computer are called 1) Input devices 2) Output device 3) Type devices 4) Print devices 5) None of these 19) Any latter, number or symbol found on the keyboard that you can type into the computer is called a/an 1) Output 2) Character 3) Type 4) Print 5) None of these 20) A symbol or question on the screen that prompts you to take action and tell the computer what to do next is called 1) Scanner 2) Questionnaire 3) Prompt and dialog box 4) Information seeker 5) None of these 21) Choices are referred to as 1) Options 2) Exit 3) Boot 4) Folder 5) None of these 22) Which of the following represents anything written on the screen? 1) Cursor 2) Text 227 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
3) Folder 4) Boot 5) None of these 23) Which of the following lets you leave a screen or program? 1) Boot 2) Programs 3) Exit 4) Text 5) None of these 24) Which of the following represents the instructions that tell the computer what to do? It can also be taken as another name for software. 1) Programs 2) CPU 3) Options 4) Folder 5) None of these 25) A blinking indicator that shows you where your next action will happen is called 1) CPU 2) Cursor 3) Tool bar 4) Boot 5) None of these
26) Command at the top of a screen such as FILE-EDIT-FONT-TOOLS to operate and change things within programs are referred to as 1) Menu bar 2) Tool bar 3) User friendly 4) Word processor 5) None of these 27) CD-ROM stands for 1) Central Processing Unit 2) CD-Remote Open Mouse 3) CD-Resize or Minimize 4) CD- Read Only Memory 5) None of these 28) TO change the written work which is already done, we use the option 1) File 2) Edit 3) Cut 4) Close 5) None of these
228 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
29) A place in the Computer system where data and programs are temporarily stored is called 1) Paste 2) Open 3) Memory 4) Pocket 5) None of these 30) A key that will erase information from the computer’s memory and characters on the screen is called 1) Edit key 2) Delete key 3) Dummy out key 4) Trust key 5) None of these 31) Which of the following is used to insert a copy of the clipboard contents, whatever was the last cut or copied at the insertion point? 1) Paste 2) Stick in 3) Fit in 4) Push in 5) None of these 32) Which of the following is the command used to remove text of graphics from a document? The information is then stored on a clipboard so that you can paste it. 1) Chop 2) Cut 3) Clip 4) Cart away 5) None of these 33) Which of the following is the command that saves what you are working on into the hard drive, or onto disk? 1) View 2) Hold 3) Save 4) Go 5) None of these 34) Which of the following is a command to get a file you worked on from the memory where it was stored? 1) Close 2) Delete 3) Open 4) Get it 5) None of these 35) Which of the following is used to move down a page in a document? 1) Jump 2) Fly 229 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
3) Wriggle 4) Scroll 5) None of these 36) The primary device that a computer uses to store information is 1) TV 2) Storehouse 3) Desk 4) Hard disk 5) None of these 37) Which of the following is the screen that comes when you turn on your computer and shows all the icons? 1) Desktop 2) Face to Face 3) Viewer 4) View space 5) None of these 38) Which of the following is a program that works like a calculator for keeping track of money and making budgets? 1) Calculator 2) Spreadsheet 3) Budgeter 4) Financier 5) None of these 39) Memory, also called random access memory, or RAM, 1) Contains the electronic circuits that cause processing to occur 2) Makes the information resulting from processing available for use 3) Allows data, programs, commands, and user responses to be entered into a computer 4) Consists of electronic components that store data 5) None of these 40) Correcting errors in a program is referred to as 1) Debugging 2) Bugging 3) Rectifying 4) Modifying 5) None of these 41) An assembler is used to translate a program written in 1) a low-level language 2) Machine language 3) a high-level language 4) Assembly language 5) None of these 42) Which of the following is used to exit the program without leaving the application? 1) File 2) Edit 3) Copy 230 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
4) Close 5) None of these 43) Which of the following is a removable magnetic disc that holds information? 1) Floppy disk 2) Hard drive 3) Monitor 4) Portable 5) None of these 44) Which of the following moves the cursor one space to the right to put spaces in between words? 1) Control key 2) Spacebar 3) Printer 4) Mouse 5) None of these 45) Which of the following is to be used when you want to make all letters capital without having to use the shift key for each character? 1) Shifter 2) Upper case 3) Caps lock key 4) Icon 5) None of these 46) Which of the following is a device that reads the information contained on a disk and transfers it to the computer’s memory? 1) Monitor 2) Screen 3) Keyboard 4) Disk drive 5) None of these 47) Which of the following is not the major function of a computer? 1) Processing data into information 2) Storing data or information 3) Gathering data 4) Analyzing data or information 5) None of these 48) Which of the following is a program which helps create written documents and lets you go back and make correction as necessary? 1) Spreadsheet 2) Personal writer 3) Word printer 4) Word processor 5) None of these 49) Which of the following is a place that a user can create to store files? 1) Cursor 2) Text 231 | P a g e
[Pick the date]
[ESSC COMPUTER AWARENESS]
3) Folder 4) Boot 5) None of these 50) Which of the following is used to start computer? 1) Exit 2) Kick 3) Boot 4) Kick-start 5) None of these
Answer key 10. (4) 2.(2) 10.(4)
3.(1)
4.(3)
5.(2)
6.(4)
7.(3)
8.(1)
9.(3)
11.(2) 12.(2) 13.(4) 14.(1) 15.(1) 16.(3) 17.(2) 18.(1) 19.(2) 20.(3) 21.(1) 22.(2) 23.(3) 24.(1) 25.(2) 26.(1) 27.(4) 28.(2) 29.(3) 30.(2) 31.(1) 32.(2) 33.(3) 34.(3) 35.(4) 36.(4) 37.(1) 38.(2) 39.(4) 40.(1) 41.(4) 42.(4) 43.(2) 44.(2) 45.(3) 46.(4) 47.(4) 48.(4) 49.(3) 50.(3)
232 | P a g e