Q2001. A function can return only
(a) Single value
(b) No value
(c) Two Values
(d) Either two or four values
(e) More than five values
Ans: (a) In the most general sense, a function is a structuring element in programming languages to group a set of statements so they can be utilized more than once in a program. A function can return exactly one value, or we should better say one object. For example, in both C and C++ one can only directly return one value.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2002. A bug means
(a) Problem in booting a computer
(b) A virus infection
(c) Problems caused by insects getting inside the CPU
(d) Mistake in a program or error in the working of a computer
(e) None of these
Ans: (d) A bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. Most bugs arise from mistakes and errors made in either a program’s source code or its design, or in components and operating systems used by such programs.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2003. The collection of communication lines and routers form the
(a) Hub
(b) LAN
(c) WAN
(d) MAN
(e) Communication Subnet
Ans: (e) The collection of communication lines and routers (but not the hosts) form the communication subnet. Originally, it simply meant the collection of routers and communication lines that moved packets from the source host to the destination host. However, it has now come to include network addressing as well. It is a part of most wide area networks (WAN).
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2004. A symbol on the screen that represents a disk, document or program that you can select is known as
(a) Cap
(b) Key
(c) Icon
(d) Monitor
(e) Cortana
Ans: (c) An icon is a small image displayed on the screen that represents a program, a document, or some other object that can be selected by a user. It is a pictogram or ideogram and that represents file, folder, disk or tool and helps the user navigate a computer system or mobile device.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2005. Operating system is also called the _____ between the user and the computer.
(a) Interface
(b) Bridge
(c) Communication
(d) Interaction
(e) Topology
Ans: (a) An Operating System (OS) is a program that acts as an interface between the user and the computer hardware and controls the execution of all kinds of programs. It performs all the basic tasks like file management, memory management, process management, handling input and output, etc. Microsoft Windows, Mac, etc are examples of OS.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2006. The OS X has
(a) Hybrid kernel
(b) Monolithic kernel
(c) Microkernel
(d) Monolithic kernel with modules
(e) None of the above
Ans: (a) Mac OSX is a hybrid kernel based on Mach and BSD. It was developed to replace the obsolete classic Mac OS (Mac OS 9 and older) kernel, which had poor memory protection and cooperative multitasking. The other examples of hybrid kernel are: Windows NT and above, BeOS, DragonFly BSD, etc.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2007. Which one of the following error will be handle by the operating system?
(a) Lack of paper in printer
(b) Power failure
(c) Connection failure in the network
(d) All of the above
(e) None of the above
Ans: (d) In a computer system, errors can occur anytime and anywhere; they may occur in CPU, in I/O devices or in the memory hardware (e.g., memory error or power failure), in I/O devices (e.g., a connection failure in a network or lack of paper in a printer), in user program (e.g., attempting to access illegal memory location). For each type of error, the OS takes the appropriate action to ensure correct and consistent computing.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2008. To access the services of operating system, the interface is provided by the
(a) API
(b) System calls
(c) Library
(d) Assembly instructions
(e) None of these
Ans: (b) System calls are programming interface to the services provided by the OS. They are typically written in a high-level language (C or C++) and are the set of abstract operations that the operating system provides to the applications programs. They lie at the top of the operating system.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2009. ____ is the process of carrying out commands.
(a) Executing
(b) Fetching
(c) Storing
(d) Decoding
(e) None of these
Ans: (a) There are four operations carried out for every instruction in a computer. The process of carrying out commands is called executing. The other functions are: I Fetch: Retrieve an instruction from the memory; I Decode: Translate the retrieved instruction into a series of computer commands; I Store: Send and write the results back in memory.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2010. Coded entries which are used to gain access to a computer system are called
(a) Passwords
(b) Entry codes
(c) Security commands
(d) Codewords
(e) None of these
Ans: (a) A password is a string of characters used to verify the identity of a user during the authentication process. Passwords are typically used in conjuncture with a username; they are designed to be known only to the user and allow that user to gain access to a device, application or website.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2011. Most World Wide Web pages contain commands in the language
(a) URL
(b) NIH
(c) HTML
(d) CSS
(e) HTP
Ans: (c) Hypertext Markup Language (HTML) is the standard markup language for creating web pages and web applications. With Cascading Style Sheets (CSS) and JavaScript it forms a triad of cornerstone technologies for the World Wide Web.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2012. In binary algebra, a+b can be implemented by
(a) OR gate
(b) AND gate
(c) NOT gate
(d) FOR gate
(e) INTO gate
Ans: (a) We could implement general Boolean equations with these three primitives: AND, OR and NOT. The expression a + b is described by A OR B (OR).
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2013. The first network was
(a) NSFNET
(b) CNNET
(c) ASAPNET
(d) ARPANET
(e) Internet
Ans: (d) The Advanced Research Projects Agency Network (ARPANET) was the first wide area packet switching network, the “Eve” network of what has evolved into the Internet. It was the first network to implement the protocol suite TCP/ IP. The ARPANET, and so the Internet, was born on August 30, 1969.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2014. Communication between a computer and a keyboard involves ________ transmission
(a) Half-duplex
(b) Automatic
(c) Full-duplex
(d) Simplex
(e) None of the above
Ans: (d) Communication between a computer and a keyboard involves simplex duplex. In this type of transmission mode data can be sent only through one direction i.e. communication is unidirectional. Television and remote, keyboard and monitor etc are examples of simplex duplex transmission.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2015. The structure or format of data is called
(a) Semantics
(b) Syntax
(c) Struct
(d) None of the above
(e) Grammar
Ans: (b) Syntax refers to the structure or format of data, i.e. the order in which they are presented. For example, a simple protocol could define the first 8 bits of a data to be the address of the sender, the second 8 bits to be the address of the receiver, and the rest of the stream to be the information itself.Semantics defines the meaning of each section of data that is being sent.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2016. ____ transmits one bit of a byte, one at a time as a single bit stream of bit.
(a) USB port
(b) Serial port
(c) Parallel port
(d) Address bus
(e) None of these
Ans: (b) In computing, a serial port is a serial communication interface through which information transfers in or out one bit at a time (in contrast to a parallel port). It takes the byte, and sends it out one bit at a time (a serial bit-stream) on the transmit pin of the serial cable connector. Serial port is used for transmitting slow data over long distances.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2017. Disk access time is
(a) Time taken for a disk drive to locate the area on the disk where the data to be read is stored
(b) Total time taken by the computer to process a data request
(c) Time taken for a packet of data to get from one designated point to another
(d) Time interval between starting the transfer and the completion of the transfer
(e) None of these
Ans: (b) Disk access time is the total time it takes the computer to process a data request from the processor and then retrieve the required data from a storage device. It is frequently used to describe the speed of disk drives. Disk access times are measured in milliseconds (thousandths of a second). Fast hard disk drives have access times of about 9 to 15 milliseconds.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2018. Personal logs or journal entries posted on the web are known as
(a) Webcasts
(b) Listservs
(c) Blogs
(d) Subject Directories
(e) None of these
Ans: (c) A blog (a truncation of the expression “weblog”) is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diarystyle text entries (“posts”). Posts are typically displayed in reverse chronological order, so that the most recent post appears first, at the top of the web page.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2019. Firewalls are used to protect against
(a) Vishing
(b) Unauthorized Attacks
(c) External resources
(d) Data Driven Attacks
(e) Phishing
Ans: (b) A firewall is a system designed to prevent unauthorised access to or from a private computer network. It acts as a barrier between a trusted network and an untrusted network. A firewall controls access to the resources of a network through a positive control model.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2020. SMTP stands for
(a) Simple Mail Transport Protocol
(b) Simple Mail Transfer Protocol
(c) Sample Mail Transfer Protocol
(d) Sample Mail Transport Protocol
(e) None of these
Ans: (b) SMTP stands for Simple Mail Transfer Protocol. It is an Internet standard for electronic mail (email) transmission. SMTP is used when email is delivered from an email client, such as Outlook Express, to an email server or when email is delivered from one email server to another.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2021. The part of a computer that coordinates all its functions is called its
(a) System board
(b) ROM program
(c) Arithmetic logic unit
(d) Control unit
(e) None of these
Ans: (d) The part of a computer that coordinates all its functions is called Control Unit. It is considered as the heart of the computer system because it controls the overall operation and function of the computer system. It controls all the other units, directs them to work in an appropriate system and organizes various operations performed.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2022. Date and time are available on the desktop at
(a) Recycle bin
(b) Keyboard
(c) My computer
(d) Task bar
(e) None of these
Ans: (d) Data and time in a computer are shown on Taskbar, an element of a graphical user interface which has various purposes. It typically shows which programs or applications are running on the device, as well as provide links or shortcuts to other programs or places, such as a start menu, notification area, and clock.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2023. BIT is a short form of
(a) Binary language
(b) Megabyte
(c) Binary information unit
(d) Binary number
(e) Binary digit
Ans: (e) A bit (short for binary digit) is the smallest unit of data in a computer. It has a single binary value, either 0 or
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2024. The Internet was originally a project for which government agency?
(a) NSF
(b) ARPA
(c) NSA
(d) FCC
(e) NASA
Ans: (b) The Internet grew out of a project originally funded by the Advanced Research Projects Agency (ARPA) of the United States Department of Defense. It was also known as DARPA. The project resulted in the development of ARPANET, that along with TCP/IP became the technical foundation of the Internet.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2025. Clock speed is a speed at which ___ executes instructions.
(a) ROM
(b) Microprocessor
(c) Cache
(d) RAM
(e) Hardware
Ans: (b) Clock speed is the speed that the microprocessor executes each instruction or each vibration of the clock. It is alternatively referred to as clock rate and processor speed. Clock Speeds are usually determined in MHz, 1 MHz representing 1 million cycles per second, or in GHz, 1 GHz representing 1 thousand million cycles per second.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2026. What type of graphical model is used to define a database?
(a) Organizational model
(b) Flowchart
(c) E-R diagram
(d) Programming model
(e) None of these
Ans: (c) The Entity Relationship (ER) Diagram is one graphical method that is used to define a database. This model captures the relationships between real-world entities and is often used for designing a database conceptually. Here, the people, places, and things about which data points are stored are referred to as entities, each of which has certain attributes that together make up their domain. A common form of the ER diagram is the star schema, in which a central fact table connects to multiple dimensional tables.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2027. Which of the following computer languages is a mathematically oriented language used for scientific problems?
(a) COBOL
(b) FORTRAN
(c) LISP
(d) PROLOG
(e) ANDROID
Ans: (b) FORTRAN (FORmula TRANslation) is a mathematical oriented programming language that is used for solving complicated mathematical, engineering and scientific problems. The grammar, syntax and semantics of this language are such that instructions are similar to the mathematical formulae. It was introduced by IBM Corporation in the year 1957 (Introduction to Computers and Communication by D. Ravichandran).
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2028. VoIP stands for
(a) Voice over IP
(b) Vote over IP
(c) Voice on IP
(d) Vendor on IP
(e) Version over IP
Ans: (a) VoIP stands for Voice over Internet Protocol. It is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. It is also referred to as IP Telephony, Internet Telephony and Internet Calling.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2029. Oracle is a
(a) Hardware
(b) RDBMS
(c) System software
(d) High level language
(e) None of the above
Ans: (b) Oracle is an object-relational database management system (RDBMS) produced and marketed by Oracle Corporation. It is commonly referred to as Oracle RDBMS or simply as database. An RDBMS moves data into a database, stores the data, and retrieves it so that applications can manipulate it.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2030. Powerful keys that let you exit a program when pushed
(a) Spacebar
(b) Arrow keys
(c) Escape key
(d) Return key
(e) None of these
Ans: (c) The Escape key is a key on computer keyboards (usually labeled Esc) that usually cancels or aborts the current operation. It is typically used in a program when we want to abort, cancel or change what is currently being displayed on the screen. It is now generally placed at the top left corner of the keyboard.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2031. Which of the following is not a networking device?
(a) Linux
(b) Gateways
(c) Routers
(d) Modem
(e) Firewall
Ans: (a) Linux is a Unix-like computer operating system assembled under the model of free and open-source software development and distribution. It is the best-known and mostused open source operating system.Because of the dominance of the Linux kernelbased Android OS on smartphones, Linux has the largest installed base of all generalpurpose operating systems.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2032. ___ program provides access to Web resources.
(a) ISP
(b) Web
(c) Browser
(d) URL
(e) HTML
Ans: (c) Short for Web browser, a browser is a software application used to locate, retrieve and display content on the World Wide Web, including Web pages, images, video and other files. It uses a Uniform Resource Locator (URL) or web address to provide access to web resources.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2033. Which one of the following is NOT a computer programming language?
(a) COBOL
(b) BASIC
(c) JavaScript
(d) LISP
(e) Android
Ans: (e) Android is a mobile operating system developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets. Initially developed by Android Inc., it was bought by Google in 2005.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2034. A hard disk is divided into tracks which are further subdivided into:
(a) Sectors
(b) Clusters
(c) Vectors
(d) Quarters
(e) Hemispheres
Ans: (a) A hard disk is divided into concentric circles called tracks, which in turn are further subdivided into sectors. Each sector can storeinformation of about 250 bytes. A track is a physical division of data in a disk drive.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2035. ____ is Microsoft’s latest entry into the programming arena.
(a) .NET
(b) Java
(c) Visual Basic
(d) Pascal
(e) Drupal
Ans: (a) .NET is Microsoft’s newest entry into the programming arena. It combines several programming languages into one IDE. Included are Visual Basic, C++, C# and J#. Using .NET, developers can write programs for Windows, the World Wide Web and PocketPC.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2036. Why do you log off from your computer when going out from your office?
(a) In order to save electricity.
(b) Someone might steal tour files, passwords etc.
(c) logging off is essential to increase performance.
(d) logging off is mandatory you before go out
(e) logging off is a good exercise to perform regularly.
Ans: (b) The option of logging off closes down user applications and logs the user off the computer. The machine itself remains powered on and reverts back to the login screen for the next time we log in. A logged off computer keeps running but no user account accesses it and the only programs running on the computer are system services. Logging off is a good method of protecting the data stored on a computer from the staff and co-workers. Logging in prevents others from unauthorized access to our files and other confidential information.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2037. What is the full form of VoIP?
(a) Voice Over Internet Protocol
(b) Voice of Internet Power
(c) Voice on Internet Protocol
(d) Very Optimized Internet Protocol
(e) Very Official Internet Protocol
Ans: (a) VoIP stands for Voice over Internet Protocol. It is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. VoIP services convert voice into a digital signal that travels over the Internet.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2038. The scrambling of code is known as:
(a) Firewalling
(b) Encryption
(c) Scrambling
(d) Deception
(e) Permuting
Ans: (b) Scrambling of data is known as encryption. It is the translation of data into a secret code. Encryption is the most effective way to achieve data security. There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2039. What is the meaning of Bandwidth in Network?
(a) Connected Computers in the Network
(b) Transmission capacity of a communication channels
(c) Class of IP used in Network
(d) Host of network provider
(e) None of these
Ans: (b)
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2040. The brain of any computer system is
(a) Memory
(b) ALU
(c) CPU
(d) Control unit
(e) RAM
Ans: (c) The central processing unit (CPU) is known as the brain of a computer. It is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/ output (I/O) operations specified by the instructions. It is also known as a processor, central processor, or microprocessor.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2041. Which of the following is the type of software that has selfreplicating software that causes damage to files and system?
(a) Trojan horses
(b) Viruses
(c) Bots
(d) Worms
(e) Backdoors
Ans: (b) Computer viruses are selfreplicating malicious software programs that can cause damage or perform other harmful acts to a computer system. In- fecting computer programs can include as well, data files, or the “boot” sector of the hard drive. When this replication succeeds, the affected areas are then said to be “infected” with a computer virus.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2042. Which of the following is the combination of numbers, alphabets along with username used to get access to user account?
(a) username
(b) password
(c) titlename
(d) host-id
(e) screen name
Ans: (b) Password is the secret series of characters that enables a user to access a file, computer, or program. It is used to determine that a computer user requesting access to a computer system is really that particular user. Advanced password can be combination of numbers, alphabets and special characters to prevent it from being hacked.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2043. Hard drive is used to store ______.
(a) non-volatile data
(b) volatile data
(c) permanent data
(d) temporary data
(e) intermediate data
Ans: (c) A hard disk drive is a nonvolatile memory hardware device that permanently stores and retrieves data on a computer. Permanent storage in a computer can take one of two forms, internal or removable. The hard drive is considered internal storage.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2044. Which of the following is used to access a file from the computer store?
(a) retrieve
(b) insert
(c) file
(d) print
(e) find
Ans: (e) Find is command line tool that every Windows user should use to locate documents, files, folders and you can copy them into any folder on your computer. A user can access the files or even content inside a file by using the keyboard shortcut of Ctrl F.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2045. Which of the following is not responsible for the perfor – mance of the computer?
(a) name of the video/ graphics word.
(b) no. of keys in the keyboard.
(c) memory in the video/ graphics word.
(d) the clock speed of the processor.
(e) no. of cores available in the processor.
Ans: (b) The processor, memory and videocard are the most important components when determining performance of a computer. There are four key factors about CPU architecture that affect its performance: cores (processing units); clock speed (how fast the CPU can run); cache size (small amount of memory that temporarily holds instructions and data that the CPU is likely to reuse); processor type (whether the type is of CPU: CISC and RISC). The number of keys in the keyboard has no effect on the performance of a computer.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2046. Which of the following character set supports Japanese and Chinese font?
(a) ASCII
(b) EBCDIC
(c) BC
(d) ECBI
(e) Unicode
Ans: (e) Unicode an industry standard whose goal is to provide the means by which text of all forms and languages can be encoded for use by computers. To put it simply, Unicode supports multiple languages, therefore eliminating the need to use different page codes for every single language.It supports all of the Chinese, Japanese, and Korean (CJK) characters from JIS X 0208, JIS X 0212, JIS X 0221, or JIS X 0213, for example, and many more.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2047. Which of the following is a valid email address?
(a) [email protected]
(b) name.website@info@ed
(c) [email protected]
(d) website.name@website. com
(e) website@[email protected]
Ans: (d) There are four main parts of an email address, including the user name, the “@” symbol, the mail server and the toplevel domain. The @, or “at” symbol, separates the user name from the second part of the email address, which begins with the mail server. The mail server usually identifies the institution or company that owns the email server. For instance, “company” owns the mail server at “company.com.” The last part of the email is the top-level domain, which breaks down various websites into hierarchies. Several toplevel domains include “.com” used for commercial businesses, “.org” used for non-profit agencies, etc.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2048. What can possibly be the drawback of e-mails?
(a) emails infects computer.
(b) emails requires being physically delivered to the user.
(c) emails are very expensive to transmit.
(d) emails are slow to load.
(e) people don’t check emails regularly.
Ans: (a) Despite all its benefits, emails are often the carrier of virus in computers. The email virus specifically, rather than accidentally, uses the email system to spread. Computers can become infected when users open e-mail attachments that contain malicious code. Cyber criminals often send emails disguised as legitimate messages for tricking users into either opening an infected attachment or clicking a link that takes the user to an infected website.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q2049. Which of the following system is a function of dedicated PCs?
(a) meant for the single task
(b) meant for a single user
(c) deal with single software
(d) deal with only editing
(e) deal for music purpose
Ans: (a) Dedicated systems are designed to perform a single task and solve a specific problem repeatedly. Since they only have to complete a single task, special purpose computers generally have faster processing at the expense of versatility and are mostly used in intelligent systems. In contrast, A general-purpose computer is one that, given the appropriate application and required time, should be able to perform most common computing tasks.
Computer Knowledge Question Bank for Competitve Exams
Q2050. _____ is used for very large files or where a fast response time is not critical. The files to be transmitted are gathered over a period and then send together as a batch.
(a) Online processing
(b) Batch processing
(c) File processing
(d) Data processing
(e) Text processing
Ans: (b) In data transmission, batch processing is used for very large files or where a fast response time is not critical.It is noncontinuous (non-real time) processing of data, instructions, or materials. The files to be transmitted are gathered over a period and then send together as a batch.
Computer Knowledge Question Bank for Competitve Exams
________________________________________