Documente Academic
Documente Profesional
Documente Cultură
3. Programs which protect a disk from an infection are called as : (SSC CHSL 2012)
(a) Vaccines
(b) Antidotes
(c) Library routines
(d) Interpreters
ANS (B)
6. printer cannot print more than one character at a time.(SSC CHSL 2013)
(a) Line
(b) Daisy-wheel
(c) Laser
(d) Dot-matrix
ANS (B)
7. The waste generated by end life personal computers is known as (SSC CHSL 2013)
(a) E-waste
(b) PC-waste
(c) Physical waste
(d) Computer waste
ANS (A)
11. All forms of ROM are also known as __________. (SSC CHSL 2015)
(a) Middleware
(b) Firmware
(c) Shareware
(d) Freeware
ANS (B)
15) Window 7, the latest operating system from Microsoft Corporation has .............. Indian languages f
CGL 2010)
(a) 14
(b) 26
(c) 37
(d) 49
ANS (D)
16)The first computer made available for commercial use was: (SSC CGL 2011)
(a) MANIAC
(b) ENIAC
(c) UNIVAC
(d) EDSAC
ANS (C)
17) A communication network which is used by large organizations over regional, national or global are
(SSC CGL 2011)
(a) LAN
(b) WAN
(c) MAN
(d) VAN
ANS (B)
18) In which of the following areas, a spreadsheet software is more useful? (SSC CGL 2011)
(a) Psychology
(b) Publishing
(c) Statistics
(d) Message sending
ANS (C)
20. The transfer of date from a CPU to peripheral devices of computer is achieved through (SSC CGL
(a) interfaces
(b) buffer memory
(c) modems
(d) computer ports
ANS (A)
21. Which of the following items is not used in Local Area Networks (LANs)? (SSC CGL 2012)
(a) Interface Card
(b) Cable
(c) Computer
(d) Modem
ANS (C)
24. What is the name given to the smallest unit of data space available in a spreadsheet software appl
CGL 2012)
(a) Row
(b) Block
(c) Cell
(d) Pixel
ANS (C)
25. An alternate name for the completely interconnected network topology is (SSC CGL 2012)
(a) Mesh
(b) Star
(c) Tree
(d) Ring
ANS (A)
23. Who is the founder of “Facebook” which is currently the No. 1 social networking website in India? (
CGL 2013)
(a) Orkut Buyukkokten
(b) Mark Zuckerberg
(c) Bill Gates
(d) Martin Cooper
ANS (B)
24. Which computer was the first to use the magnetic drum for memory ? (SSC CGL 2013)
(a) IBM - 650
(b) IBM - 7090
(c) IBM - 701
(d) IBM - 360
ANS (A)
25. Which was the first electronic computer constructed at the Moore School of Engineering? (SSC CG
(a) EOVAC
(b) ONIVAC
(c) ENIAC
(d) EDSAC
ANS (C)
26. Which among the following standard protocols is the most widely used by the Internet? (SSC CGL
(a) HTTP
(b) TCP/IP
(c) SMTP
(d) SLIP
ANS (B)
27. Who among the following introduced the world's first laptop computer in the market? (SSC CGL 20
(a) Hewlett-Packard
(b) Epson
(c) Laplink travelling software Inc
(d) Microsoft
ANS (B)
28.What is used to identify whether a data word has an odd or even number of 1's ? (SSC CGL 2015)
(a) Sign bit
(b) Zero bit
(c) Parity bit
(d) Carry bit
ANS (C)
29. Rearranging and allocating space in memory to provide for multiple computing tasks is called (SSC
(a) Multiprogramming
(b) Multitasking
(c) Memory Management
(d) Networking
ANS (C)
31. Which of the following is in the ascending order of Data hierarchy ? (SSC CGL 2015)
(a) Bit–Byte – Record – Field – Database – File
(b) Byte – Bit – File – Record – Database – Field
(c) Bit– Byte – Field – Record – File – Database
(d) Field – Byte – Bit – Record – File– Database
ANS (C)
32. Data in database at a particular point of time is called as? (SSC CGL 2016)
(a) Intension
(b) Extension
(c) Back up
(d) Application
ANS (B)
34. Which of the following is not an operating system? (SSC CGL 2016)
(a) Android
(b) Vista
(c) iOS
(d) Opera
ANS (D)
Question 1: IBM 701, IBM 702, IBM 650 are examples of ____
a) First generation computer
b) Second generation computer
c) Third generation computer
d) Fourth generation computer
Answer: A
Question 3: Which among the following is the name given to the cursor for the computer language ‘LO
a) Robot
b) Frog
c) Spider
d) Turtle
Answer:D
Question 4: Which of the following was used as circuitry for first generation of computers ?
a) Vacuum tube
b) Transistors
c) Integrated circuits
d) Microprocessors
Answer:A
Question 6: A___ is a computer, appliance, or router that sits between the trusted and untrusted system
a) bridge
b) switch
c) firewall
d) hub
Answer:C
Question 7: Which of the following countries has recently (in 2018) unveiled the world’s most powerful
computer that has the capacity to complete over 200,000 trillion calculations per second, the super com
named as SUMMIT?
a) United Kingdom
b) USA
c) Russia
d) Germany
e) Japan
Answer:B
Question 8: The first Electronic digital computer had which of the following components ?
a) Electronic Valve
b) Semiconductor Memory
c) Vacuum tube
d) Transistor
Answer:C
Question 11: The fastest, costlier and relatively small from of storage managed by computer system ha
a) Main memory
b) Cache
c) Flash Memory
d) Disk
Answer:E
Question 12: If an operating system is capable of supporting and utilizing more than one computer pro
kind of operating system is known as?
a) Multi User Operating System
b) Multi-Tasking Operating System
c) Multithreading Operating System
d) Multi Processing Operating System
e) None of the Above
Answer:D
Question 13: The computers which are connected onto a network will have which of the following that
every computer?
a) Utility Software
b) Buffer Server
c) Source Code
d) IP Address
e) Assembler
Answer:D
Question 14: The process of connecting computer on a communication system is known as?
a) Processing
b) Compiling
c) Networking
d) Hosting
e) Pairing
Answer:C
Question 16: Which of the following is the printed circuit board that is the foundation of any computer a
as a bridge between all the connections in the computer?
a) Micro Chip
b) ALU
c) CPU
d) Mother Board
e) Heat Sink
Answer:D
Question 17: Which of the following is the unit for measuring the throughput of a computer?
a) Transactions per second
b) Flip-flops per second
c) Operations per second
d) Bits per second
e) seconds
Answer:D
Question 18: A computer hardware component which connects a computer to a computer network is c
a) Physical Network Interface
b) Network Interface Card
c) Network Adapter
d) Network Interface Controller
e) All of the Above
Answer:E
Question 19: Which of the following documents assists the user in utilizing a software program?
a) Computer Manual
b) Software Manual
c) Documentation Manual
d) Utility Manual
e) Application Manual
Answer:C
Question 20: Which of the following options in system utility allows a user to reset their computer to a p
undoing changes made since that time?
a) Disk Reset
b) Disk Defragmentation
c) System Restore
d) Disk Cleanup
e) Antivirus
Answer:C
Question 21: Which of the following function keys has to be clicked and put on hold for entering the BIO
after turning on the computer system?
a) F9
b) F3
c) F5
d) F2
e) F10
Answer:D
Question 22: Which of the following options is used to rename the existing file and simultaneously save
location in a computer?
a) Save
b) Find and Replace
c) Copy and Replace
d) Copy
e) Save as
Answer:E
Question 23: The size of the computer was very large in which of the following generations?
a) Fifth Generation
b) Third Generation
c) First Generation
d) Second Generation
e) Fourth Generation
Answer:C
Question 24: Which of the following types of number system, a computer uses for performing calculatio
data?
a) Octal Number System
b) Hexadecimal Number System
c) Decimal Number System
d) Binary Number System
e) None of the Above
Answer:D
Question 25: Which of the following types of computers use the handheld operating system?
a) Mainframe Computers
b) Super Computers
c) Personal Digital Assistant
d) Notebook
e) Mini Computer
Answer:C
Question 26: Which of the following application program is used to compress larger files into smaller o
computer system?
a) Compress
b) WinZip
c) Win Clip
d) Defragmenter
e) WinClean
Answer:B
Question 27: Which of the following is the hardware or software designed to safeguard against unauth
to a computer network?
a) Encryption Protocol
b) Firewall
c) Network Guard
d) Spoof Protector
e) Anti Spammer
Answer:B
Question 28: Which of the following is not one of the possible sources of virus attacks on a computer s
a) Installing Software Illegally using Cracks and Patches.
b) Opening Email attachments from unknown/untrustworthy sources.
c) Using a USB flash Drive.
d) A virus attack is possible while browsing the Internet.
e) Running the latest software updates of operating system.
Answer:E
Question 29: Which of the following is not one of the examples of embedded software system?
a) Traffic Lights
b) ATMs
c) Elevators
d) Point of Sale terminals
e) Notebook Computer
Answer:E
Question 30: Which of the following connects the different external devices, peripherals and I/O ports t
the computer?
a) output link
b) peripheral connector
c) control unit
d) external bus
e) expansion connector
Answer:D
7. An electronic path, that sends signals from one part of computer to another is ?
A.Logic Gate
B.Modem
C.Bus
D.Serial Port
Answer :Option C
12. Which among following is responsible for specifying address of a memory location ?
A.RAM
B.Address Bus
C.Control Bus
D.Hard Disk
Answer :Option B
19. Which program is run by BIOS to check hardware components are working properly while compute
?
A.DMOS
B.POST
C.CMOS
D.RIP
Answer :Option B
Explanation:
Full form of POST is Power On Self Test.
20. Which among following is responsible for finding and loading operating system into RAM ?
A.Bootstrap Loader
B.CMOS
C.BIOS
D.DMOS
Answer :Option A
65. Which device among following is used for sending digital data over a phone line ?
A.USB
B.Scanner
C.Printer
D.Modem
Answer :Option D
66. Which of the following are components of Central Processing Unit (CPU) ?
A.Arithmetic logic unit, Mouse
B.Arithmetic logic unit, Control unit
C.Arithmetic logic unit, Integrated Circuits
D.Control Unit, Monitor
Answer :Option B
73. A wireless technology built in electronic gadgets used for exchanging data over short distances is ?
A.Bluetooth
B.Wifi
C.Modem
D.USB
Answer :Option A
79. Technology used to provide internet by transmitting data over wires of telephone network is ?
A.Transmitter
B.Diodes
C.HHL
D.DSL
Answer :Option D
Explanation:
DSL means Digital Subscriber Line.