(Set-2) 5000 Computer Questions For CGL22 MAINS
(Set-2) 5000 Computer Questions For CGL22 MAINS
(Set-2) 5000 Computer Questions For CGL22 MAINS
14.One byte can be used to encode any 21.A memory space used for the
integer between ‘0’ and- inclusive temporary storage of data is
A.16 B.256 C.128 D. 255 A. PROM B. SAM
Ans. 255 C. Scratched storage D. Buffer
Ans. Scratched storage
15.Storage on PC allows you to store files
until something erases it, but memory 22. A laser printer does NOT use
loses its contents whenever A. A photo- conductive drum
its_____________ is lost B. A print head
A. static B. disk space C. A laser beam
C. power D. both A and B D. None of these
Ans. Power Ans. A print head
16.Which of the following registers is 23.What do you need for an ink jet printer
loaded with the contents of the memory A. A drum B. A cartridge
location pointed by the PC C. A ribbon D. All of these above
A. Memory Adress Register Ans. A cartridge
B. Memory Data Register
C. Instruction Register 24.A daisy wheel is a type of
D. Program Counter A. Storage device B. Pointing device
Ans. Instruction Register C. Scanning device D. Printer
Ans. Printer
17. Continuous line drawing are produced
using
A. Chain printers B. Daisy wheel printers
25.What are the individual dots which A. DPI B. LMP C. CPM D. PPM
make up a picture on the monitor screen Ans. DPI
called
A. Colored spots B. Pixies 33. If you want to secure a message, use
C. Pixels D. None of these a(n):
Ans. Pixels A. Cryptology source
B. Encryption key
26.What would be the best way to move C. Encryption software package
around a 3D environment D. Cryptosystem
A. Use a tracker ball Ans. Cryptosystem
B. Use a keyboard
C. Use a space mouse 34. The scrambling of code is known as:
D. Use a joystick A. Encryption B. A firewall
Ans. Use a tracker ball C. Scrambling D. Password-
proofing
27.What does a light pen contain Ans. Encryption
A. Refillable ink
B. Light sensitive elements 35.What is the most common tool used to
C. Pencil lead restrict access to a computer system
D. Blue ink A. User log in
Ans. Light sensitive elements B. Passwords
C. Computer keys
28.Where would you find the letters D. Access-control software
QWERTY Ans. Passwords
A. Mouse B. Screen
C. Numeric keypad D. Keyboard 36.is the measurement of things such as
Ans. Keyboard fingerprints and retinal scans used for
security access.
29. Which key on keyboard of a computer A. Biometrics
does not have its name printed on the key B. Bio measurement
A. ESC B. SHIFT C. Computer security
C. F1 D. SPACE D. Smart weapon machinery
Ans. SPACE Ans. Biometrics
41.The thing that eventually terminates a 48. General purpose computer are those
worm virus is a lack of: that can be adopted to countless uses
A. Memory or disk space simply by changing its-
B. Time A. Output device B. Input device
C. CD drive space C. Processor D. Program
D. CD-RW Ans. Program
Ans. Memory or disk space
49. A websites main page is called its-
42.The majority of computer crimes are A. Home page B. Browser page
commited by: C. Bookmark page D. Search page
A. Hackers Ans. Home page
B. Insiders
C. Overseas criminals 50. A disk’s content that is recorded at the
D. Young teenage computer geniuses time of manufacture and cannot be
Ans. Insiders changed or erased by user is-
A. Read-only B. Memory-only
43. The common name for the crime of C. Run-only D. Write- only
stealing passwords is: Ans. Read-only
A. Spooling B. Identity theft
C. Spoofing D. Hacking 51. Measuring unit of capacity of hard
Ans. Spoofing drive is-
A. GHz B. GB
44. In 1999, the Melissa virus was a widely C. Gwatts D. G Newton
publicized: Ans. GB
A. e-mail Virus B. Macro virus
C. Trojan Horse D. Time Bomb 52.Protocols are
Ans. E-mail virus A. Sets of rules B. Sets of maps
45.A program that performs a useful task C. Sets of computers D. Sets of product
while simultaneously allowing destructive Ans. Sets of rules
acts is:
A. Worm B. Trojan Horse 53. Gmail, a free web-based email
C. Virus D. Macro Virus service operated by which company-
Ans. Trojan Horse A. Apple B. Google
C. Microsoft D. Yahoo 61. When a command is not available for
Ans. Google selection until certain other conditions are
met, it is called a(n):
54. Which of the following is not a search A. Dimmed command
engine B. Unavailable command
A. Google B. Yahoo C. Dialog Box
C. Examveda D. Duck Duck Go D. All of these
Ans. Examveda Ans. Dimmed command
55. The term ‘memory’ applies to which 62. Which of the following is an option
one of the following: when shutting down your computer?
A. Logic B. Storage A. Log Off B. Switch User
C. Input Device D. Output Device C. Stand By D. All of these
Ans. Storage Ans. All of these
59.What was the first general-purpose 65. Identify the volatile storage device
electronic computer amongst the following devices?
A. IBM 405 B. Zuse Z3 A. RAM B. Hard disc
C. ENIAC D. CSIRAC C. Magnetic tape D. ROM
Ans. ENIAC Ans. RAM
60.what Does BIOS Stand Foe 66. Computer gathers data, which means
A. Better integrated operating system that they allow user to _________data.
B. Basic input Output System A. Present B. Input
C. Battery integrated Operating Setup C. Output D. Erase
D. Backup Input Output System Ans. Input
Ans. Basic input Output System
67. The smallest unit of information a 73. What does JAR stand for?
computer can understand and process is A. jQuery Application Rapid-
known as________. development
A. Digit B. Byte B. Java Application Resolution
C. Megabyte D. Bit C. Java Archive
Ans. Bit D. jQuery Application Resolution
Ans. Java Archive
68. A _______ is a property of the entire
relation, rather than of the individual 74. Which among the following type of
tuples in which each tuple is unique. computers is also known informally as
A. Rows B. Key number crunchier?
C. attribute D. Fields A. Mini computer B. Super Computer
Ans. Key C. Micro Computer D. Mainframe
computer
69. A __________ is abstract model that Ans. Super Computer
describes, how the data are organised
and represented. 75. Which among the following
A. data model B. instances organisation developed a SAGA-220
C. schemes D. database computer in 2011?
Ans. Data model A. ISRO B. NASA
C. C-DAC D. BARC
70. Which of the following is a storage Ans. ISRO
device that uses rigid permanently
installed magnetic disks to store 76. Which of the following is the activity of
data/information? purchasing items and products from
A. Loss Disk B. Hard Disk different websites on the Internet and
C. Permanent Disk D. Optical Disk using online modes, such as credit cards
Ans. Hard Disk and debit cards to make the payments ?
A. E-banking B. Online shopping
71. A vacuum tube (also called a VT, C. Online reservation D. M-reservation
electron tube, a valve)is a device Ans. Online shopping
sometimes used to amplify electronic
signals vacuum tubes were used in which 77. C was developed by?
generation of computers? A. Ada Byron B. Bill Gates
A. 1st Generation B. 2nd Generation C. Blaise Pascal D. Dennis Ritchie
C. 3rd Generation D. 4th Generation Ans. Dennis Ritchie
Ans. 1st Generation
72. In Computer programming API is set of 78. Which of the following is programming
subroutine definitions protocols and tools language?
definitions, protocols, and tools for A. Lotus B. Pascal
building software and applications. Which C. MS-Excel D. Netscape
among of the following is an application Ans. Pascal
programming interface for the
programming language Java which 79. BIOS stands for:
defines how a client may access a A. Basic Input Output Service
database? B. Basic inner Output System
A. J2EE B. JDK C. Better Input Output Service
C. JAVA SE D. JDBC D. Basic Input Output System
Ans. JDBC Ans. Basic Input Output System
80. Who was the inventor of Tabulating 87. A_________ is a component of
Machine? motherboard which absorbs the heat
A. Charles Babbage B. Blaise Pascal produced by the processor and other
C. Ada Byron D. Heman Hollerith components of a computer?
Ans. Herman Hollerith A. Heat sink B. Northbridge
C. CPU socket D. CMOS Battery
81. To delete the selected item Ans. Heat sink
permanently, press_________.
A. Alt + Delete B. Shift + D 88. Who acts as master software that
C. Shift + Delete D. Alt + D works as a mediator between a computer
Ans. Shift + Delete user and hardware of a computer?
A. Application Program
82. Commands at the top of a screen B. Hardware
such as File-Edit, Format and Tools to C. Software
operate and change things are D. Operating System
incorporated in: Ans. Operating System
A. Menu bar B. Tool bar
C. User friendly D. Word processor 89. __________ is an essential program
Ans. Menu bar which makes it easy to use a computer
for end-user.
83. The simultaneous processing of A. Operating System B. Application
executing two or more programs by C. Utility D. Network
multiple processors is- Ans. Operating System
A. multiprogrammingB. multitasking
C. time-sharing D. multiprocessing 90. Which disk is used to cold boot a PC?
Ans. Multiprocessing A. Setup disk B. System disk
C. Diagnostic disk D. Program disk
84. Help Menu is available at which Ans. System disk
button?
A. End B. Start 91. In second generation, which type of
C. Turnoff D. Restart memory was used to store data?
Ans. Start A. Paper tapes B. Magnetic drum
C. Magnetic core D. Magnetic Tape
85. The_______records the name and Ans. Magnetic Core
exact location of every file on a disk.
A. partition master 92. Which is the blinking symbol on the
B. file allocation table screen that shows where the next
C. disc controller character will appear?
D. boot sector A. Cursor B. Delete key
Ans. File allocation table C. Arrow key D. Return key
Ans. Cursor
86. Which of the following devices used
‘set of beads’ to represent the unit of 93. Which type of device is used by
data? banking websites to enter the password
A. ENIAC B. EDVAC and prevent keystroke legging?
C. Abacus D. MARK-I A. Scanner B. Reader
Ans. Abacus C. Virtual keyboard D. Light Pen
Ans. Virtual keyboard
94. Artificial intelligence is used in which 97. Pressing Windows logo key + E will
of the following generations of open which of the following?
computers? A. My Computer B. My document
A. Second B. Third C. Recycle Bin D. Control Panel
C. Fourth D. Fifth Ans. My Computer
Ans. Fifth
98. An input device that utilizes a light-
95. Which of the following computers sensitive detector to select objects on a
exhibits the features of both analog and display screen is known as________.
the digital computers? A. Optical scanner B. Touch screen
A. Hybrid computer B. Mini computer C. Light Pen D. Mouse
C. Laptop D. Mainframe Ans. Light Pen
computer
Ans. Hybrid computer 99. Which of the following returns
computer memory in large amounts?
96. These printers do not establish any A. Imaging B. Graphics
mechanical contact between the print C. Voice D. All of the above
head and the paper. The examples of Ans. All of the above
such types of printers are
A. line printers, drum printers 100. Which of the following is used by the
B. drum printers and dot-matrix printers tablet PC to write on the screen?
C. line printers and dot-matrix printers A. Finger B. Mouse
D. inkjet and laser printers C. Digitalizer D. Stylus
Ans. Inkjet and laser printers Ans. Stylus