Q1551. A computer program that converts assembly language into machine language is ______
(a) Comparator
(b) Complicate
(c) Intersection
(d) Converter
(e) Assembler
Ans: (e) Assembly language is converted into executable machine code by a utility program referred to as an assembler. The conversion process is referred to as assembly, or assembling the code.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1552. Single-word reference to viruses, worms etc. is _________
(a) virus
(b) harmware
(c) phish
(d) malware
(e) killer ware
Ans: (d) Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It is a general term used to describe all of the viruses, worms, spyware, or anything that is specifically designed to cause harm to a computer or steal information.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1553. Workbook in MS-Excel is a collection of _______
(a) Charts
(b) Page Setup
(c) Buttons
(d) Documents
(e) Worksheets
Ans: (e) A Microsoft Office Excel workbook is a file that contains one or more worksheets that a user can use to organize various kinds of related information. By default, a new workbook contains three worksheets, but one can change the number of worksheets as per need.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1554. Which one of the following is NOT a computer programming language ?
(a) C++
(b) BASIC
(c) JAVA
(d) COBOL
(e) MS-Excel
Ans: (e) The term programming language usually refers to highlevel languages, such as BASIC, C, C++, Java, COBOL, FORTRAN, Ada, and Pascal. Each language has a unique set of keywords (words that it understands) and a special syntax for organizing program instructions. MS Excel is a spreadsheet application developed by Microsoft.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1555. Specialized programs that assist users in location information on the web are called
(a) Information engines
(b) Data engines
(c) Web browsers
(d) Resource locators
(e) Search engines
Ans: (e) Search engines are specialized programs that assist us in locating information on the Web and the Internet. They are programs that search documents for specified keywords and return a list of the documents where the keywords were found. The term is often used to specifically describe systems like Google, Bing and Yahoo Search.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1556. A directory within a directory is called _________
(a) Junior Directory
(b) Mini Directory
(c) Part Directory
(d) Sub Directory
(e) None of these
Ans: (d) A subdirectory is a directory that is located within another directory. Every directory except the root directory is a subdirectory. A similar term can be used to describe a folder beneath another folder in a graphical user interface (GUI) like Microsoft Windows.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1557. Which of the following uniquely identifies a web site ?
(a) Domain name
(b) ERL
(c) Computer
(d) Network
(e) URL
Ans: (e) URL (Uniform Resource Locator) s a reference to a resource that specifies the location of the resource on a computer network and a mechanism for retrieving it. A URL is a specific type of uniform resource identifier (URI). It is the global address of documents and other resources on the World Wide Web.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1558. To move to the bottom of a document, press _________
(a) Insert Key
(b) Home Key
(c) Ctrl + End
(d) End Key
(e) Shift Key
Ans: (c) The command Ctrl + End should be pressed to move to the end of the document. Similarly, Ctrl + Alt + Pg Down should be pressed to move to the end of a document window.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1559. HTTP refers to
(a) Hyper Text Transfer protocol
(b) Hyper Text Transmission Protocol
(c) Home Text Transaction Protocol
(d) Hyper Text Tie Protocol
(e) Home Text Transmission Protocol
Ans: (a) HTTP stands for Hyper Text Transfer Protocol. It is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1560. Which access method is used for obtaining a record from a cassette tape?
(a) Sequential
(b) Direct
(c) Random
(d) Matrix
(e) None of these
Ans: (a) Sequential access method is used for obtaining a record from a cassette tape. Sequential access files are similar to cassette tapes in that each line in the file, like each song on a cassette tape, is both stored and retrieved in consecutive order (sequentially). In other words, before we can record (store) the fourth song on a cassette tape, we must record songs one through three. The same is true for retrieving a song from the cassette tape.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1561. The sharing of a medium and its path by two or more devices is called ________
(a) demodulation
(b) modulation
(c) multiplexing
(d) demultiplexing
(e) connecting
Ans: (c) The sharing of a medium and its link by two or more devices is called Multiplexing. A common type of multiplexing combines several low speed signals for transmission over a high speed connection. Multiplexing is used to enable many users to share the system.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1562. A MODEM is connected to
(a) mother board
(b) processor
(c) phone line
(d) printer
(e) monitor
Ans: (c) A modem (modulator-demodulator) is a device that modulates signals to encode digital information and demodulates signals to decode the transmitted information. It is connected to a telephone line. It turns the digital data of a computer into modulated electrical signal for transmission over telephone lines and demodulated by another modem at the receiver side.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1563. Microsoft Word is an example of _________
(a) a processing device
(b) an input device
(c) system software
(d) an operating system
(e) application software
Ans: (e) Application software is the group of computer software that is created to help users do their required tasks. Microsoft Word is a popular word-processing application that is included in the software suite of applications called Microsoft Office. It is used to create documents such as letters, thesis, reports, books, etc.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1564. What is Linux ?
(a) Operating System
(b) Input Device
(c) Processor
(d) Storage Device
(e) Output Device
Ans: (a) Linux is a computer operating system (OS) assembled under the model of free and open-source software development and distribution. It was originally developed as a free operating system for personal computers based on the Intel x86 architecture, but has since been ported to more computer hardware platforms than any other operating system
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1565. How to specify cell range from A9 to A99 in Excel ?
(a) (A9 – A99)
(b) (A9 : A99)
(c) (A9 to A99)
(d) (A9.A99)
(e) (A9 = A99)
Ans: (b) To Select a Range with the Name box, a user needs to type in the first and last cell address of the range he wants to select, with a colon between them, then hit enter. The first cell is the top left of the range and the last cell is the bottom right. So The cell range from A9 to A99 in Excel can be specified with the help of (A9: A99).
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1566. USB is the acronym for ____
(a) Union Service Bus
(b) United Serial Bus
(c) Universal Serial Bus
(d) Universal Service Bit
(e) Uniform Service Bus
Ans: (c) USB stands for Universal Serial Bus. It is an industry standard developed in the mid- 1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1567. Which of the following commands would you choose to move selected item to another ?
(a) Cut and Paste
(b) Move and Paste
(c) Copy and Paste
(d) Drag and Paste
(e) Delete and Paste
Ans: (a) The cut command removes the selected data from its original position, while the copy command creates a duplicate. So the cut and paste command is used for moving the selected item to another location. The common keyboard shortcuts for cut and paste are: Ctrl + X, followed by Ctrl + V.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1568. The term __________ designates equipment that might be added to a computer to enhance its functionality.
(a) peripheral device
(b) Disk pack
(c) Digital device
(d) System device
(e) operating device
Ans: (a) The term peripheral device designates input, output, and storage equipment that might be added to a computer system to enhance its functionality. Popular peripheral devices include printers, digital cameras, scanners, game controllers and speakers.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1569. Which of the following is the most commonly used input device ?
(a) monitor
(b) printer
(c) speaker
(d) mouse
(e) modem
Ans: (d) The most commonly used input devices on a computer are the keyboard and mouse. While Keyboard is the most common input device which helps in inputting data to the computer, Mouse is most popular pointing device that is used to control the position of cursor on screen.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1570. Information on the computer is stored as _________
(a) digital data
(b) analog data
(c) modem data
(d) watts data
(e) back-up data
Ans: (a) Computer data storage is a technology consisting of computer components and recording media used to retain digital data. Computers store information in the form of “1” and “0”s in different types of storages such as memory, hard disk, etc. The most common digital data storage unit is byte which is 8 bits.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1571. If you copy and paste a file then __________
(a) The file gets scanned,
(b) The original file is deleted and a new file is created.
(c) The original File is removed and a new file is not created.
(d) The original file remains unchanged and a new file is not created.
(e) The original file remains unchanged and a new file is created.
Ans: (e) When we copy and paste a file , we make a duplicate of the original file that we can then modify independently of the original file. So the original file remains as it is and a new file is generally created with the word ‘copy’ at its end.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1572. In order to move from one worksheet to another in excel workbook, one should click _________
(a) scroll bar
(b) active cell
(c) sheet tab
(d) tab button
(e) Backspace button
Ans: (d) To move from a worksheet (or sheet) to another worksheet in a workbook, the tab key should be clicked. To move between open workbooks, Ctrl- Tab should be used. For moving worksheets, Ctrl + Page Up and CTRL + Page Down should be used.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1573. __ ________ is making copies of data these additional copies may be used to restore the original after a data -loss event.
(a) DNS
(b) EMS
(c) DFS
(d) RAID
(e) Backup
Ans: (e) Backup refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. These additional copies are called “backups. Backups are useful primarily in restoring a state following a disaster (called disaster recovery) and in the restoration of a small numbers of files after they have been accidentally deleted or corrupted.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1574. The proper removal of a program require its
(a) removal
(b) installing
(c) disabling
(d) deletion
(e) uninstalling
Ans: (e) Uninstallation is the best way to remove an application from a computer. Uninstalling removes all files that were added to the computer when the application was initially installed. In addition, it might also remove files that were subsequently generated by the application. Frequently, however, uninstalling is not 100% effective, and a few orphan files remain.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1575. SQL stands for ____________
(a) Structured question language
(b) Semi questioning language
(c) Sequential Query language
(d) Structured query language
(e) Sequential question language
Ans: (c) SQL stands for Structured Query Language. It is a specialpurpose programming language designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS).
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1576. A byte in computing consists of _________
(a) 8 bits
(b) 40 bits
(c) 10 bits
(d) 22 bits
(e) 12 bits
Ans: (a)
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1577. Descending order of data hierarchy in data management in computing is __________
(a) Database- fields- filerecord- bit- bytes
(b) Database-record- filebytes- fields- bit
(c) Database- file- recordfields- bit- bytes
(d) Database- file- recordfields- byte- bit
(e) Database- record- fieldsfile- bytes- bit
Ans: (d) The correct descending order of data hierarchy is: Database > File > Record > Field > Byte > Bit. I Database: a group of related files I File: a group of related records I Record: a group of related fields I Fields: a group of characters or bytes that conveys meaning I Byte: 8 bits I Bit: smallest data item on a computer, can have values 0 or 1
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1578. Which of the following is not a binary number ?
(a) 1111
(b) 0101
(c) 0000
(d) 110110
(e) 3110
Ans: (e) In mathematics and digital electronics, a binary number is a number expressed in the binary numeral system, or base- 2 numeral system, which represents numeric values using only two different symbols: typically 0 (zero) and 1 (one).
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1579. Which of the following best describes a private, company wide network, closed to public access ?
(a) Extranet
(b) Cloud Computing
(c) Internet
(d) Virtual Private Network
(e) Intranet
Ans: (e) Intranet refers to a company wide network, closed to public access that uses Internet- type technology. It is a private network, accessible only to an organisation’s staff. An intranet uses network technologies as a tool to facilitate communication between people or work groups to improve the data sharing capability and overall knowledge base of an organization’s employees.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1580. Microprocessors is used in computers to execute instructions. Its speed is measured in ________
(a) kilobytes
(b) bytes
(c) megabytes
(d) gigabytes
(e) gigahertz
Ans: (e) Technically, microprocessor speed is measured in hertz, or cycles per second. Microprocessors are capable of doing billions of things in one second. Therefore, their speed is measured in gigahertz (GHz). A microprocessor that can do 1 billion things per second is rated at 1.0 GHz.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1581. _______ is a condition created within a database or data storage technology in which the same piece of data is held in two separate places.
(a) Data encapsulation
(b) Data redundancy
(c) Data normalization
(d) Data hiding
(e) Data dumping
Ans: (b) Data redundancy is a condition created within a database or data storage technology in which the same piece of data is held in two separate places.This can mean two different fields within a single database, or two different spots in multiple software environments or platforms. Whenever data is repeated, this basically constitutes data redundancy. This can occur by accident, but is also done deliberately for backup and recovery purposes.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1582. ______ is a device that optically scans images, printed text, handwriting, or an object, and converts it to a digital image.
(a) Light Pen
(b) Scanner
(c) Printer
(d) Optical Character Reader
(e) Optical Mark Reader
Ans: (b) A scanner is a device that optically scans images, printed text, handwriting, or an object, and converts it to a digital image. Scanners do not depend on the use of a phone line like a fax does. Scanners are easy to use and the scanned files can be saved in a variety of formats, including images and PDF documents.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1583. A name that identifies an electronic post office box on a network where e-mail can be sent is called _______
(a) envelope stuffer
(b) email address
(c) outlook express
(d) inbox
(e) Drive
Ans: (b) A name that identifies an electronic post office box on a network where e-mail can be sent is called email address. on the internet , all email addresses have the form <name> @ <domain name>.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1584. _____ are used extensively in video arcade games, and they were the primary game controller on home computers.
(a) mouse
(b) Joysticks
(c) Touch Pad
(d) Touch Screen
(e) Light Pen
Ans: (b) Joysticks are used extensively in video arcade games, and they were the primary game controller on home computers during the 1980s and 90s. PCs came equipped with a port dedicated to the joystick; however, that game port is no longer used, and the joystick has given way to much more elaborate controllers with several buttons, triggers and dials.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1585. A ______ is a resource for storing information, which is available to a computer program and is usually based on some kind of durable storage.
(a) RAM
(b) File
(c) Data
(d) ROM
(e) Database
Ans: (b) A computer file is a block of arbitrary memory location or a resource for storing information, which is available to a computer program and is usually based on some kind of durable storage. A file is “durable” in the sense that it remains available for other programs to use after the program that created it has finished executing.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1586. _____ is the process of dividing the disk into tracks and sectors.
(a) Crashing
(b) Allotting
(c) Formatting
(d) Tracking
(e) Dicing URBAN COOPERATIVE BANK MODEL SOLVED PAPER
Ans: (c) Formatting a disk means configuring the disk with a file system so that Windows can store information on the disk.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1587. The main circuit board of the system is the ______
(a) Motherboard
(b) control unit
(c) RAM
(d) Microprocessor
(e) System Unit
Ans: (a) Motherboard (also called system board) – The main circuit board of a computer housing the microprocessor and providing the means of connecting all the components— including memory sockets and expansion slots—that make up the computer.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1588. Computer use the _____ number system to store data and perform calculations.
(a) octal
(b) Binary
(c) decimal
(d) hexadecimal
(e) None of these
Ans: (b) Because of its straightforward implementation in digital electronic circuitry using logic gates, the binary system is used internally by almost all modern computers and computer- based devices. Each digit is referred to as a bit.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1589. Which of the following is not a malware ?
(a) Viruses
(b)Worms
(c) Spyware
(d) Adware
(d) all of the above
Ans: (e) They are all part of a class of software called malware. Malware or malicious code (malcode) is short for malicious software. It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks. I Virus – Software that can replicate itself and spread to other computers or are programmed to damage a computer by deleting files, reformatting the hard disk, or using up computer memory. I Adware – Software that is financially supported (or financially supports another program) by displaying ads when you’re connected to the Internet. I Spyware – Software that surreptitiously gathers information and transmits it to interested parties. Types of information that is gathered includes the Websites visited, browser and system information, and your computer IP address. I Browser hijacking software – Advertising software that modifies your browser settings (e.g., default home page, search bars, toolbars), creates desktop shortcuts, and displays intermittent advertising popups. Once a browser is hijacked, the software may also redirect links to other sites that advertise, or sites that collect Web usage information. I Viruses, worms, Trojans, and bots are all malware.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1590. _______is a separated from the base filename by a dot or space to the name of a computer file applied to indicate the encoding file format of its contents or usage.
(a) file code
(b) file extension
(c) file log
(d) file version
(e) file directory
Ans: (b) A filename extension is a suffix (separated from the base filename by a dot or space) to the name of a computer file applied to indicate the encoding (file format) of its contents or usage. Examples of filename extensions are .png, .jpeg, .exe, .dmg and .txt. Filename extensions can be considered a type of metadata. They are commonly used to imply information about the way data might be stored in the file.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1591. What is the blinking symbol on computer screen ?
(a) logo
(b) Mouse
(c) cursor
(d) Pointer
(e) Pixel
Ans: (c) The cursor is a blinking symbol on the computer screen. In word processing it is analogous to the type writer head in that it indicates where the next character to be entered will appear and moves to the next space to the right after a character is typed.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1592. ‘P’ in CPU denotes ____
(a) process
(b) processor
(c) processing
(d) processed
(e) preprocessor
Ans: (c) The central processing unit (CPU), also called a processor, significantly impacts overall computing power and manages most of a computer’s operations. The CPU contains the control unit and the arithmetic/logic unit.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1593. Which part of the computer is used for calculating and comparing ?
(a) Control Unit
(b) ALU
(c) Disk Unit
(d) Modem
(e) None of these
Ans: (b) The CPU contains the control unit and the arithmetic/ logic unit. The control unit directs and coordinates most of the operations in the computer. Specifically, the ALU carries out three operations: I Arithmetic operations – performing calculations, which include addition, subtraction, multiplication, and division I Comparison operations – comparing data items to determine if the first item is greater than, equal to, or less than the other item I Logical operations – working with conditions and logical operators such as AND, OR, and NOT.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1594. CD stands for ______
(a) Code Disk
(b) Compact disk
(c) Compact Drive
(d) Cheap Disk
(e) Compressed Drive
Ans: (b) Compact disc (CD) is a digital optical disc data storage format.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1595. The default view in excel is ____ view.
(a) Normal
(b)Work
(c) Auto
(d) Roman
(e) None of these
Ans: (a) Excel offers three workbooks views, Normal, Page Layout and Page Break Preview. Excel by default displays the newly added Worksheet in Normal View. But using Excel Options you can change the default view for the new worksheet.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1596. ________ is processed by the computer into information.
(a) pictures
(b) processor
(c) alphabets
(d) data
(e) All of these
Ans: (d)
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1597. Which type of memory gets lost when you switch off ?
(a) RAM
(b) ROM
(c) Cache
(d) Dynamic
(e) Static
Ans: (a) Random access memory (RAM), this type of fast memory is used by the computer to temporarily hold data currently used by a given application. RAM is often referred to as volatile memory, because anything contained in RAM is considered lost when a computer is switched off. Indeed, all data is lost from RAM when the power supply is disconnected; so it is volatile in this context.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1598. _______ is called as unsolicited e-mail.
(a) spam
(b) flaming
(c) inbox
(d) unwanted mails
(e) bad mails
Ans: (a) Email spam, also known as unsolicited bulk email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted email messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1599. The contents of ____ are lost when the computer turns off.
(a) storage
(b) input
(c)memory
(d) output
(e) Program BANK OFFICER EXAM
Ans: (c) The contents of RAM (Random Access Memory) are lost when the computer is turn off. RAM is a type of volatile memory. RAM is used for faster access of data.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1600. _____ is the process of carrying out commands.
(a) fetching
(b) executing
(c) storing
(d) decoding
(e) Registering
Ans: (b) For every instruction, four operations are carried out, fetching, decoding, executing and storing. Fetching is the process of obtaining a program instruction or data item from memory. Decoding is the process of translating the instructions into commands the computer can execute. Executing is the process of carrying out the commands. Storing is the process of writing the result to memory.