JOIN ADRE 2.0 Telegram Group

Computer Awareness MCQs | Computer Multiple Choice Questions with Answers

Questions
1 For each attribute of a relation, there is a set of permitted values, called the ________ of that attribute.
A Domain
B Relation
C Set
D Schema

Answer: Domain

Sol. The values of the attribute should be present in the domain. Domain is a set of values permitted.

2 In the architecture of a database system external level is the
A Physical level
B logical level
C conceptual level
D View level

Answer: View level

Sol. An external schema specifies a view of the data in terms of the conceptual level. This is also referred to as the view level.

Advertisement
Article and Schedule Quiz Start Test!

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

3 Which of the following products was an early implementation of the relational model developed by E.F. Codd of IBM?
A IDMS
B DB2
C R:base
D SQL

Answer: DB2

Sol. DB2 is a database product from IBM. It is a Relational Database Management System (RDBMS). DB2 is designed to store, analyze and retrieve the data efficiently.

4 Which one of the following design is both software and hardware independent?
A Logical
B Physical
C Conceptual
D Rational

Answer: Conceptual

Sol. Conceptual design is both software and hardware independent.

5 What does ASCII stand for
A American Standard Code for Information Intelligence
B American Standard Code for Income Interchange
C American Standard Code for Information Interchange
D American States Code for Intelligence Interchange

Answer: American Standard Code for Information Interchange

Sol. American Standard Code for Information Interchange, is a character encoding standard (the Internet Assigned Numbers Authority (IANA) prefers the name US-ASCII). ASCII codes represent text in computers, telecommunications equipment, and other devices.

6 ARP (address resolution protocol) is ________
A A TCP/IP protocol used to dynamically bind a high level IP address to a low level physical hardware addres
B A TCP/IP high level protocols for transferring files from one machine to another
C A protocol used to monitor computers
D A protocol that handles error and control messages

Answer: A TCP/IP protocol used to dynamically bind a high level IP address to a low level physical hardware address

Sol. The address resolution protocol is a protocol used by the Internet Protocol (IP), specifically IPv4, to map IP network addresses to the hardware addresses used by a data link protocol. The protocol operates below the network layer as a part of the interface between the OSI network and OSI link layer.

7 Mobile Commerce is best described as
A The use of kiosks in marketing
B Transporting products
C Buying and selling goods/services through wireless handheld devices
D Using notebook PCs in marketing

Answer: Buying and selling goods/services through wireless handheld devices

Sol. M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as cellular telephone and personal digital assistants (PDAs). Known as next-generation e-commerce, m-commerce enables users to access the Internet without needing to find a place to plug in.

8 Which among the following is a software package from Sun Microsystems?
A JPEG
B JDK
C IDE
D IRQ

Answer: JDK

Sol. The Java Development Kit (JDK) is a software development environment used for developing Java applications and applets.

9 Which of the following is a software used for Remote Connection?
A TeamViewer
B Picasa
C Prisma
D Safari

Answer: TeamViewer

Sol. TeamViewer is a proprietary computer software package for remote connection, desktop sharing, online meetings, web conferencing and file transfer between computers.

10 Which of the following component is a part of RAM?
A Magnetic cores
B Micro-Processors
C Photoelectric cells
D Floppy disks

Answer: Magnetic cores

Sol. Magnetic-core memory was the predominant form of random-access computer memory for 20 years between about 1955 and 1975. Such memory is often just called core memory, or, informally, core.

11 Which of the following would most likely not be a symptom of a virus?
A Existing program files and icons disappear
B The CD-ROM stops functioning
C The web browser opens to an unusual home page
D Odd message or images are displayed on the screen

Answer: The CD-ROM stops functioning

Sol. Except option (b) all others are the symptoms of a computer virus.

12 Which of the following heading elements displays text with the same size as the normal text written in an HTML document?
A

B

C

D

Answer:

Sol. The text written within the H4 element has the same size as the normal plain text, whereas the text written within the H1, H2 and H3 elements are larger than the normal text. Text written within the H5 and H6 elements has smaller size than the normal text.

13 Which of the following is related to simplex communication?
A Single wire and two-sided communication
B Television
C Two-wire communication
D Walkie-talkie

Answer: Television

Sol. Television is an example of simplex communication.

14 Each excel file is called a workbook because
A It can contain text and data
B It can be modified
C It can contain many sheets including worksheets and chart sheets
D You have to work hard to create it

Answer: It can contain many sheets including worksheets and chart sheets

Sol. A workbook is a collection of worksheets.

15 A function inside another function is called a _______ function
A Nested
B Round
C Sum
D Text

Answer: Nested

Sol. A function inside another function is called a nested function.

16 What is the diagnostic testing sequence of a computer called that determines if all input and output devices are properly working?
A Rebooting
B POST
C Scanning
D Defragmentation

Answer: POST

Sol. POST is a diagnostic testing sequence of a computer that is run before the actual booting to ensure that the computer hardware is functioning well. It stands for ‘Power-On Self-Test’.

17 UDP and TCP are categorised under the _________ layer of the OSI model
A Physical
B Data link
C Application
D Transport

Answer: Transport

Sol. UDP and TCP protocols are used for providing end-to-end connectivity between nodes in a network as they use connectionless and connection oriented services, respectively. The end-to-end communication between nodes is the responsibility of the Transport layer.

18 Copy and X Copy are same in the sense __________
A Both are internal command of DOS
B Both are external commands of DOS
C Both can be used to copy file or group of files
D Both a and b

Answer: Both can be used to copy file or group of files

Sol. Copy and X Copy both can be used to copy file or group of files.

19 Which among the following options specifies this action: Holding the mouse button down while moving an object of text?
A Moving
B Dragging
C Saving
D Highlighting

Answer: Dragging

Sol. Dragging is the gesture of Holding the mouse button down while moving an object of text or image or any file or its part.

20 These printers do not establish any mechanical contact between the print head and the paper. The examples of such type of printers are
A Line printers, drum printers
B Drum printers and dot-matrix printers
C Line printers and dot-matrix printers
D Inkjet and laser printers

Answer: Inkjet and laser printers

Sol. Non-impact printer does not establish any mechanical contact between the print head and the paper. The well-known non-impact printers are inkjet and laser printers.

View All Computer Awareness Questions Sets

ADRE 2.0 FULL LENGTH MOCK TEST

Take Mock Tests

Missiles Mock Test Start Test!
SSC MTS Mock Test Start Test
IBPS CLERK MOCK TEST Start Test
SSC MTS 2022 JULY 26 Shift 1 (ENGLISH) Start Test!
SSC GD Previous Year Paper 2021 Nov 17 Shift - I (Hindi) Start Test!
SSC CGL Tier - 1 PYP 2022 April 21 Shift- 1 (ENGLISH) Start Test!
MPSC PAPER I MOCK TEST 1 (ENGLISH) Start Test!
IB Security Assistant Mock test 1 (english) Start Test!
UP POLICE CONSTABLE MOCK TEST 1 Start Test!
DELHI POLICE CONSTABLE MOCK TEST 1 (HINDI) Start Test!
Advertisement