Q1651. Most websites have a main page, namely ______ which acts as a doorway to the rest of the website pages.
(a) Search engine
(b) System page
(c) Home Page
(d) URL
(e) Browser
Ans: (c) Home page (also called index page) is the starting point or a doorway to the website. It refers to the web page that identifies a website and contains the hyperlinks to other web pages in the website. A browser is special software that enables the user to read/ view web pages and jump from one web page to another.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1652. Which of the following is not a binary number?
(a) 1111
(b) 1001
(c) 1011
(d) 1101
(e) 1231
Ans: (e) In mathematics and digital electronics, a binary number is a number expressed in the binary numeral system, or base-2 numeral system, which represents numeric values using two different symbols: typically 0 (zero) and 1 (one). So 1231 is not a binary number.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1653. Intersection of rows and columns in a spreadsheet is called
(a) Cell
(b) Data
(c) Table
(d) Position
(e) Schema
Ans: (a) An Excel worksheet is made up of columns and rows. Where these columns and rows intersect, they form little boxes called cells. Each cell has a name. Its name is comprised of two parts: the column letter and the row number.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1654. In which of the following forms data is stored in computers?
(a) Binary
(b) Mechanical
(c) Decimal
(d) Hexadecimal
(e) Electrical
Ans: (a) All data and programs are stored on a computer in binary form represented by 1’s and 0’s. A binary digit, or bit, is the smallest unit of data in computing. Binary form makes it quite easy to distinguish the presence of an electric current from an absence of electric current, especially when working with trillions of such connections.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1655. A browser is
(a) a tool for resizing windows
(b) synonymous with directory and used for organizing files and information.
(c) a file manager
(d) a device used for application programs to be used by computers.
(e) a software application for retrieving, presenting and traversing resources on World Wide Web.
Ans: (e) A web browser (commonly referred to as a browser) is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier (URI/URL). The major web browsers are Firefox, Internet Explorer, Google Chrome, Opera, and Safari.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1656. RAM is located in a computer system’s
(a) Mother board
(b) Hard Drive
(c) Expansion Board
(d) CD
(e) External drive
Ans: (a) RAM (Random Access Memory) is the system memory that is usually located on DIMMs. They are on the motherboard and they look like little boards with chips on them. The RAM is accessible through the computer’s brain called the CPU which stands for Central Processing Unit.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1657. Which of the following is a popular DOS based spread sheet?
(a) Word
(b) Excel
(c) Lotus 1-2-3
(d) PPT
(e) Smart cell
Ans: (c) There are many products of spreadsheet packages- some of them are exclusively windows based like MS Excel and others both as DOS and windows based like Lotus 1-2-3. Lotus 1-24, developed by Lotus Development Corporation, is the most popular spreadsheet package among DOS users. MS Excel is the most popular windows based spreadsheet package.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1658. The most important or powerful computer in a network is
(a) Network station
(b) Network client
(c) Network terminal
(d) Network server
(e) Dumb terminal
Ans: (d) Network Server is the most important or powerful computer in a typical network. It is a computer system used as the central repository of data and various programs that are shared by users in a network.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1659. Which of the following is not an output device?
(a) Laser Printer
(b) Plotter
(c) Speaker
(d) Monitor
(e) Mouse
Ans: (e) The computer mouse is considered an input device. With a click of a button, the mouse sends information to the computer. It offers an alternative way to interact with the computer beside a keyboard. Other examples of input devices include keyboards, scanners, digital cameras and joysticks.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1660. LSI in chip technology stands for
(a) Large–Scale Internet
(b) Low–Scale Intergration
(c) Low–Scale Internet
(d) Large–Scale Integration
(e) Local–Scale Integration
Ans: (d) LSI stands for Large Scale Integration, the process of integrating or embedding thousands of transistors on a single silicon semiconductor microchip. LSI technology was conceived in the mid-1970s when computer processor microchips were under development. It was succeeded by very large-scale integration (VLSI) and ultra large-scale integration (ULSI) technologies.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1661. In the 9 digit MICR code, the first three digits represent
(a) Bank
(b) Branch
(c) Instrument type
(d) City
(e) State
Ans: (d) MICR stands for Magnetic Ink Character Recognition, a code that is used to identify the location of the bank branch. The MICR code consists of 9 Characters: I First 3 characters represent the city; I Next 3 characters represents the bank; I Last 3 character denotes the branch identity.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1662. Which of the following places the common data elements in order from smallest to largest?
(a) database, file, record, field, character
(b) character, record, field, file, database
(c) character, file, record, field, database
(d) character, field, record, file, database
(e) character, record, field, database, file
Ans: (d) Data hierarchy refers to the systematic organization of data, often in a hierarchical form. The correct ascending order of data hierarchy is: Bit < Byte (Character) < Field < record < File < Database. I Database: a group of related files I File: a group of related records I Record: a group of related fields I Fields: a group of characters or bytes that conveys meaning I Bytes (characters): 8 bits I Bit: smallest data item on a computer, can have values 0 or 1
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1663. BIOS in a computer system is used for
(a) it helps routing of packets
(b) loading a boot loader or an operating system
(c) it is an output device
(d) updating system information on network
(e) it takes input from input devices
Ans: (b) BIOS (Basic Input/Output System) is a ROM chip located on all motherboards that allows us to access and set up our computer system at the most basic level. It includes instructions on how to load basic computer hardware. The Bootstrap locates the operating system. If a capable operating system is located, the BIOS will pass control to it.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1664. What is the meaning of word ‘Booting’ in computer technology?
(a) The process of starting the computer from power off mode
(b) Increasing the memory of the computer
(c) Connecting the computer to a printer
(d) The process of shutting down the computer
(e) Connecting the computer to the electric switch
Ans: (a) In computing, booting (or booting up) is the initialization of a computerized system from power off mode. The booting process can be “hard”, after electrical power to the CPU is switched from off to on (in order to diagnose particular hardware errors), or “soft”, when those power -on selftests (POST) can be avoided.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1665. Mouse, trackball and joystick are the examples of
(a) Pointing devices
(b) Storing devices
(c) Scanning devices
(d) Multimedia devices
(e) Biometric device
Ans: (a) Mouse, trackball and joystick are the examples of pointing devices. A pointing device is an input interface (specifically a human interface device) that allows a user to input spatial (i.e., continuous and multi-dimensional) data to a computer. Movements of the pointing device are echoed on the screen by movements of the pointer (or cursor) and other visual changes.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1666. If a CPU executes multiple programs/ tasks simultaneously
(a) Multi-executing
(b) Timesharing
(c) Multiprocessor
(d) Multitasking
(e) Multiprogramming
Ans: (d) In computing, multitasking is a concept of performing multiple tasks (also known as processes) over a certain period of time by executing them concurrently. The computer executes segments of multiple tasks in an interleaved manner, while the tasks share common processing resources such as central processing units (CPUs) and main memory.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1667. ‘WWW’ stands for
(a) Wide World Web
(b) World Whole Web
(c) Whole World Web
(d)World Wide Web
(e) WebWorld Wide
Ans: (d) The World Wide Web (www) is an information space where documents and other web resources are identified by URLs, interlinked by hypertext links, and can be accessed via the Internet. It has become known simply as the Web. It was invented by Tim Berners- Lee in 1989.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1668. 1 Mega byte is equal to
(a) 1024 Peta bytes
(b) 1024 bytes
(c) 1024 bits
(d) 1024 Giga bytes
(e) 1024 Kilo bytes
Ans: (e) The megabyte is a multiple of the unit byte for digital information. One megabyte is one million bytes of information. It is commonly used to measure either 10002 bytes or 10242 bytes.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1669. Pathways that support communication among the various electronic components on the motherboard are called
(a) Gateways
(b) Logic paths
(c) Conductors
(d) Network lines
(e) Bus lines
Ans: (e) Connecting lines or Bus lines provide pathways that support communication among the various electronic components that are either located on the system board or attached to it. Slots provide a connection point for specialized cards or circuit boards.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1670. Arranging of data in a logical sequence is called ______.
(a) Searching
(b) Duplication
(c) Sorting
(d) Deduplication
(e) Reproducing
Ans: (c) In computer science, arranging in an ordered sequence is called “sorting”. The main purpose of sorting information is to optimise its usefulness for specific tasks. The opposite of sorting, rearranging a sequence of items in a random or meaningless order, is called shuffling.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1671. A memory in which data is added or removed in a LIFO manner is called
(a) PROM
(b) Links
(c) RAM
(d) Stacks
(e) None of these
Ans: (d) Stacks in computing architectures are regions of memory where data is added or removed in a last-in-first-out (LIFO) manner. In most modern computer systems, each thread has a reserved region of memory referred to as its stack.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1672. HTML is used to create web pages. HTML stands for
(a) Hyper Text Markup Language
(b) Hyper Text Makeup Language
(c) Hypothetical Markup Latitude
(d) Hyper Text Markup Language
(e) Hyper Technical Markup Language
Ans: (a) HTML stands for HyperText Markup Language. It is the standard markup language used to create web pages. HTML describes the structure of a website semantically along with cues for presentation, making it a markup language, rather than a programming language.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1673. Hacker(s) (computer security)
(a) legally break into the computer system to check security
(b) break into other computer systems, with illegal motives.
(c) are technical tutors
(d) another name for a user
(e) are system administrators
Ans: (b) In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, etc. Hacking is mostly illegal, though it can also be used to check computer security.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1674. The storage that does not retain its data after the power is turned off is referred to as
(a) Random storage
(b) Volatile storage
(c) Sequential storage
(d) Non–volatile storage
(e) Direct storage
Ans: (b) Volatile memory is computer storage that only maintains its data while the device is powered. Most RAM (random access memory) used for primary storage in personal computers is volatile memory. Non-volatile memory such as ROM retrieve stored information even after having been power cycled (turned off and back on).
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1675. What is the full form of GUI?
(a) Graphical User Instrument
(b) Geographical User Interface
(c) Graphical Unified Intrument
(d) Graphical User Interface
(e) None of these
Ans: (d) GUI stands for Graphical User Interface. It is a type of interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, as opposed to text-based interfaces, typed command labels or text navigation.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1676. Who among the following is the odd one.
(a) Virus
(b) Spyware
(c) Trojan horse
(d) Firmware
(e) Malware
Ans: (d)
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1677. Which of the following packages is used for composition in printing press?
(a) Fortran
(b) PageMaker
(c) Dbase
(d) Lotus
(e) Word Perfect
Ans: (b) Adobe PageMaker is page laying or page composition (Desktop publishing) software that automates all the steps developing a printed document. Composition is the process of laying out text and graphics typography, line boxes pictures, drawing and colors on a page.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1678. Which of the following is the correct sequence of smallest to largest unit of digital information storage?
(a) kilobyte, megabyte, petabyte, terabyte, gigabyte
(b) kilobyte, megabyte, gigabyte, terabyte, petabyte
(c) megabyte, terabyte, gigabyte, kilobyte, petabyte
(d) kilobyte, megabyte, terabyte, gigabyte, petabyte
(e) kilobyte, gigabyte, megabyte, petabyte, terabyte
Ans: (b) The units of Computer Memory Measurements are: 1 Bit = Binary Digit; 8 Bits = 1 Byte; 1024 Bytes = 1 KB (Kilo Byte); 1024 KB = 1 MB (Mega Byte); 1024 MB = 1 GB(Giga Byte); 1024 GB = 1 TB (Terra Byte); 1024 TB = 1 PB (Petabyte). So the correct sequence is: Kilobyte, Megabyte, Gigabyte, Terabyte, Petabyte.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1679. In a microcomputer system, the CPU is contained on a single chip called the
(a) Control unit
(b) Microprocessor
(c) ALU
(d) Semi–conductor
(e) Folder
Ans: (b) In a microcomputer, the CPU is on a single electronic component called a microprocessor chip. Central Processing Unit (CPU) is the part of the computer that holds data and program instructions for processing the data. It consists of the control unit and the arithmetic-logic unit.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1680. A Hexadecimal number is a number to the base
(a) 8
(b) 20
(c) 4
(d) 2
(e) 16
Ans: (e) The hexadecimal numeral system, also known as just hex, is a numeral system made up of 16 symbols (base 16). The standard numeral system is called decimal (base 10) and uses 10 symbols. Hexadecimal uses the decimal numbers and includes six extra symbols.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1681. Which of the following do digital signatures provide?
(a) Confidentiality
(b) Confidentiality and integrity of data
(c) Authentication and confidentiality of data
(d) Authentication and integrity of data
(e) Authentication and availability of data
Ans: (d) Digital signatures are the public-key primitives of message authentication. It binds a person/entity to the digital data that can be independently verified by receiver as well as any third party. Besides, it provides data integrity: in case an attacker has access to the data and modifies it, the digital signature verification at receiver end fails. The hash of modified data and the output provided by the verification algorithm will not match.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1682. RAM is considered volatile storage, which means it is ____.
(a) optional
(b) random
(c) permanent
(d) read only
(e) temporary
Ans: (e) Random-Access Memory (RAM) is volatile type of memory, i.e., the memory stored in the RAM is temporary. The stored information is lost if power is removed. On the contrary, ROM (Read Only Memory) is non-volatile as the information stored in it is permanent and is not erased off during the power off.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1683. Devices, such as monitors and printers, that are connected to the computer are called ____
(a) system devices
(b) processing devices
(c) input devices
(d) peripheral devices
(e) attachment devices
Ans: (d) A peripheral device is generally defined as any auxiliary device such as a computer mouse or keyboard that connects to and works with the computer in some way. Other examples of peripherals are image scanners, monitors, printers, tape drives, microphones, loudspeakers, webcams, and digital cameras.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1684. _______ tags on goods enable the tracking of the good electronically.
(a) GPS
(b) ASTM
(c) RFID
(d) ISP
(e) IMB
Ans: (c) Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Unlike a barcode, the tag does not necessarily need to be within line of sight of the reader and may be embedded in the tracked object.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1685. Usually, installation files have the extension ________.
(a) .gif
(b) .jpeg
(c) .exe
(d) .doc
(e) .bng
Ans: (c) The files setup.exe and install.exe are common installer files included with Windows and DOS software. Double- clicking these files begin the installation process. Besides the executable program, many .exe files contain other components called resources, such as bitmap graphics and icons which the executable program may use for its graphical user interface.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1686. Which of the following will you consider as most secure?
(a) Login numeral
(b) Login phrase
(c) Password
(d) Login ID
(e) One Time Password
Ans: (e) A one-time password (OTP) is a password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs avoid a number of shortcomings that are associated with traditional (static) password- based authentication. OTPs passwords are not knowledge- based, but token-based. So they are considered the most secure form of password possible when implemented properly.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1687. Which of the following is the correct sequence, the unit of digital information, smallest to largest?
(a) megabyte, terabyte, kilobyte, gigabyte
(b) kilobyte, gigabyte, megabyte, terabyte
(c) kilobyte, megabyte, terabyte, gigabyte
(d) megabyte, kilobyte, gigabyte, terabyte
(e) kilobyte, megabyte, gigabyte, terabyte
Ans: (e) The units of computer memory measurements are: 1 Bit = Binary Digit; 8 Bits = 1 Byte; 1024 Bytes = 1 KB (Kilo Byte); 1024 KB = 1 MB (Mega Byte); 1024 MB = 1 GB(Giga Byte); 1024 GB = 1 TB (Terra Byte); 1024 TB = 1 PB (Petabyte). So the correct sequence is: Kilobyte, Megabyte, Gigabyte, and Terabyte.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1688. Any _________ appearing on a web page opens another document when clicked.
(a) hyperlink
(b) heading
(c) URL
(d) reference
(e) anchor
Ans: (a) In computing, a hyperlink is a reference to data that the reader can directly follow either by clicking or by hovering. A hyperlink points to a whole document or to a specific element within a document. Hyperlinks are the most essential ingredient of all hypertext systems, including the World Wide Web.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1689. An Internet technology environment that sends information to a user without an explicit request from the user is
(a) Push
(b) Infoware
(c) Pull
(d) F202C
(e) Wiki
Ans: (a) In the “push” technology, there is no explicit request from the user before the content provider (push initiator) initiates an information transfer to a user. Rather than requiring users to explicitly request (i.e. pull) information, push technology allows data to be sent to users without having them ask for it explicitly.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1690. If you copy and paste a file ______.
(a) The original file remains unchanged and a new file is created.
(b) The original file remains unchanged and a new file is not created.
(c) The original file is deleted and the new file is created.
(d) The original file is removed and a new file is not created.
(e) The file gets scanned. RRBs OFFICER SCALE-MODEL SOLVED PAPER
Ans: (a) The copy and paste command offers a technique for transferring data. The copy and paste command creates a duplicate of the selected data or file that we can then modify independently of the original file. So when we copy and paste a file, a duplicate of the original file is created; the original file remains unaltered.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1691. A(n) _________analyses and executes each one of source code in succession, without looking at the entire program.
(a) Computer
(b) operating system
(c) Interpreter
(d) Utility
(e) Device driver
Ans: (c) An interpreter analyzes and executes each line of source code in succession, without looking at the entire program. The advantage of interpreters is that they can execute a program immediately. It is a computer program that executes other programs. This is in contrast to a compiler which does not execute its input program (source code), but translates it into executable machine code (object code) which is output to a file for later execution.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1692. ________ bits equal one byte.
(a) One thousand
(b) Eight
(c) Four
(d) Two
(e) One million
Ans: (b) In computing byte is the abbreviation for binary term, a unit of storage capable of holding a single character. On almost all modern computers, a byte is equal to 8 bits. Large amounts of memory are indicated in terms of kilobytes (1,024 bytes), megabytes (1,048,576 bytes), and gigabytes (1,073,741,824 bytes).
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1693. Which of the following refers to restarting the system when it is already powered on?
(a) a warm boot
(b) a strong boot
(c) a cold boot
(d) hibernation
(e) standby mode
Ans: (a) Rebooting is the process by which a running computer system is restarted. Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1694. Which of the following refers to programs stored in ROM?
(a) Programme efforts
(b) Hardware
(c) Firmware
(d) Peripheral
(e) Software SCALE-I & II CWE
Ans: (c) Programs stored in RAM are called software, whilst programs stored in ROM are called firmware. Changing the firmware of a device may rarely or never be done during its economic lifetime. The contents of ROM (Read Only memory) are permanently stored so that information is available immediately after switching on the power supply.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1695. _________ are specially designed computers that perform complex calculation extremely rapidly.
(a) Servers
(b) Supercomputers
(c) Mainframes
(d) Desktops
(e) Laptops
Ans: (b) Supercomputer is a specially designed computer that can perform complex calculations extremely rapidly. It is designed to perform a few programs as quickly as possible. It is used in situations in which complex models requiring intensive mathematical calculations are needed (such as weather forecasting or atomic energy research).
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1696. Which of the following is an electronic or paper log used to track computer activity?
(a) Trace route
(b) Weblog
(c) Monitor
(d) Cookie
(e) Audit trail
Ans: (e) In computing, an audit trail is an electronic or paper log used to track computer activity. It is a record or a series of records that allows the processes carried out by a computer or clerical system to be accurately identified. Audit trails are used to record a customer’s activities in e-commerce.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1697. The individual dots that form the image on a monitor are called ____________.
(a) bytes
(b) bits
(c) pixels
(d) picas
(e) pitens
Ans: (c) The individual dots that make up the actual picture on our computer monitor are known as picture elements or pixels. It is the smallest controllable element of a picture represented on the screen. Each pixel is a sample of an original image; more samples typically provide more accurate representations of the original.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1698. Storage that retains its data after the power is turned off is referred to as ______
(a) non-volatile storage
(b) Sequential storage
(c) volatile storage
(d) direct storage
(e) non-destructive storage
Ans: (a) Nonvolatile storage is a form of static random access memory whose contents are saved when a computer is turned off or loses its external power source. Examples of non-volatile memory include read-only memory (ROM), flash memory, F-RAM, most types of magnetic computer storage devices (hard disk drives, floppy disks, and magnetic tape), etc.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1699. An EULA in computing stands for
(a) Environmental Use Licensing Agreement
(b) End-Use License Arrangement
(c) End-User License Agreement
(d) Everyday-User Learning Assistance
(e) Employee Use Legal Arrangement
Ans: (c) In computing, EULA stands for End User License Agreement. It is a legal contract between a software application author or publisher and the user of that application. The license may define ways under which the copy can be used, in addition to the automatic rights of the buyer including the first sale doctrine. EULA is often referred to as the “software license.”
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1700. In a microcomputer system, the CPU is contained on a single chip called the
(a) control unit
(b) ROM
(c) ALL)
(d) semiconductors
(e) microprocessor
Ans: (e) In a microcomputer system, the CPU is contained on a single chip called the microprocessor. Minicomputers and mainframe computers have CPU’s that occupy several chips. CPU stands for central processing unit and it is the chip that contains all the circuitry for performing arithmetic and logic operations and for directing data to and from memory.