Computer Quiz

0%
24

Only 40 minutes is given for better practice of time management.

Best Wishes 🙂 PREPQA Team

Time Off. Practice for better time management.

Thank You!


Practice question Set 1

This test is the practice test Set 1 by PREPQA, by going through this test you can check yourself and understand what you need to improve in this unit i.e. Computer Fundamentals. This test is prepared by prepqa.com team for you under consideration of all the aspect of real exam pattern. And the good thing is it's totally free. You Can participate in this practice test exam for completely free just by clicking start button. Best Wishes from PREPQA Team.

1 / 150

In which year was chip used inside the computer for the first time?

2 / 150

What is the name of the latest server operating system developed by microsoft?

3 / 150

what degrees of text of alignment orientation is possible in MS excel cells?

4 / 150

During the boot process, the ........ looks for the system files?

5 / 150

A tree structured file directory system ?

6 / 150

A compiler is______?

7 / 150

Correcting errors in a program is referred to as?

8 / 150

What is the maximum length allowed for primary name of a computer file under DOS?

9 / 150

The simplest way to break a deadlock is to?

10 / 150

Which of the following is not a computer language

11 / 150

1. Find out who is not the inventor of transistors among the following names

12 / 150

Relationship in a database is maintained through

13 / 150

Memory management is?

14 / 150

Special effect used to introduce slides in presentation are called

15 / 150

An approach that permits the computer to work on several programs instead of one is--?

16 / 150

Row facts and figures about any particular topic are

17 / 150

Which is not correct?

18 / 150

All of the following are examples of real security and privacy risks except?

19 / 150

Which technology is more reliable?

20 / 150

RJ45 UPT cable has ...... cables.

21 / 150

who is ‎Larry Page?

22 / 150

Hardware and software designed to guard against unauthorized access to computer network is known as

23 / 150

Process is?

24 / 150

Which of the following topologies consists of multiple CPU connected single communication line running the length of the network?

25 / 150

Telnet is a service that runs?

26 / 150

What is the name of the latest server operating system developed by microsoft?

27 / 150

which of the following is not a selection technique?

28 / 150

Since virus are only a form of software, they primarily infect--?

29 / 150

An intentionally disruptive program that spread from program to program or disk to disk is known as a

30 / 150

What is the full form of HTML?

31 / 150

What is the full form of COMPUTER?

32 / 150

Main storage is also called

33 / 150

Which of the following is the correct HTML code for creating hyperlink?

34 / 150

How many characters form a secondary name for a file?

35 / 150

Which of the following is the fastest memory?

36 / 150

In latest generation of computer, the instruction are executed

37 / 150

Computer professional working in a computer center are

38 / 150

Virtual memory is.......?

39 / 150

Which of the following refers to the associative memory?

40 / 150

Maximum number of decimal places you can put in MS excel is

41 / 150

The common name for the crime of stealing password is:

42 / 150

Memory management is?

43 / 150

Which of the following processors use RISE technology?

44 / 150

Which of the following is not an Xt microprocessor?

45 / 150

Malicious software is known as:

46 / 150

Every set in the dotted decimal format of IP address is called

47 / 150

Latency Time is

48 / 150

which of the following is the programming language?

49 / 150

Which is true about Unicode

50 / 150

Which part of the computer is used for calculating and comparing?

51 / 150

An assembler is used to translate a program written in?

52 / 150

Group of instructions that directs a computer is called--?

53 / 150

Which of the following is the process by which a users privileges risks except?

54 / 150

The Computer abbreviation KB usually means

55 / 150

Which of the following registers is loaded with the contents of the memory location pointed by the PC?

56 / 150

What is the size of source and destination IP address under IP header?

57 / 150

A kind of serial dot-matrix printer that forms characters with magnetically charged ink sprayed dots is called

58 / 150

Who is the CEO of Google?

59 / 150

The batch file uses the extension?

60 / 150

Which of the following memories must be refreshed many time per second?

61 / 150

An approach that permits the computer to work on several programs instead of one is--?

62 / 150

Which of the following algorithm suffers from the belady's anomly?

63 / 150

Who invented Slide Rules?

64 / 150

The mechanism that bring a page into memory only when it is needed is called?

65 / 150

A computer program that instruct other programs to perform a particular type of operation is--?

66 / 150

A computer system that permits multiple users to run programs at same time ?

67 / 150

What is the name given to the database management system which is able to handle full text data, image data, audio & video?

68 / 150

It is not possible to have a deadlock involving only a single process. Why?

69 / 150

_______Is a high level abstraction over semaphore?

70 / 150

Round robin scheduling is essentially the preemptive version of_______?

71 / 150

Every file must have a.........?

72 / 150

Which is not the state of the process?

73 / 150

2. DCL provides commands to perform actions like

74 / 150

Dead-lock in an Operating System is?

75 / 150

First electronic computer was developed by

76 / 150

Which command is used to see the sub-directory structure of drive?

77 / 150

what is the name of an application program that gathers user information and sends it to someone through the internet?

78 / 150

A hard disk becomes totally inaccessible when a computer virus corrupts its?

79 / 150

Memory is made up of

80 / 150

A term used to describe interconnected computer configuration is--?

81 / 150

In 1999, the Mellissa virus was a widely publicized:

82 / 150

Which protocol does ping use?

83 / 150

Reading data is performed in magnetic disk by?

84 / 150

To protect system, there are how many security levels?

85 / 150

Which of the following can be software?

86 / 150

Which of the programming language started from Second Generation?

87 / 150

The Output Quality of  a printer is measured by

88 / 150

The bankers algorithm is used?

89 / 150

Security violation due to?

90 / 150

Which of the following is/are Web Search Engine?

91 / 150

EPROM can be used for

92 / 150

Paging is a technique?

93 / 150

which of the following database object asks a question of information in a database and then displays the results?

94 / 150

A device that forwards data packet from one network to another is called a?

95 / 150

Which of the following is most common type memory in use today?

96 / 150

A public key encryption system?

97 / 150

Not a text alignment direction in MS excel cells

98 / 150

The term GIGO is related to

99 / 150

Using windows explorer, a plus(+ sign in front of a folder indicates........?

100 / 150

Bootstrap or vector is called?

101 / 150

……… Is used to prevent the loss of data during power failures.

102 / 150

Which of the following is program group?

103 / 150

Which is not application software?

104 / 150

A microsoft windows is........a(n?

105 / 150

Which of the following is most powerful computers?

106 / 150

……… Is defined as any crime completed through the use of computer technology

107 / 150

Linux is a/n ........ operating system?

108 / 150

Which of the computer cocieved by Babbage?

109 / 150

The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack(without further movement of the arm with multiple heads)?

110 / 150

Resolution of externally defined sumbols is performed by?

111 / 150

The part of machine level instruction which tells the center processor what has to be done, is?

112 / 150

Hard disk is coated in both side with

113 / 150

The software that performs the specific jobs to be done in a business is called?

114 / 150

To avoid the race condition, the number of processes that may be simultaneously inside their critical section is?

115 / 150

A directly accessible appointment calendar is feature of a--- resident package?

116 / 150

Which of the following scheduling policy is well suited for time shared operating system?

117 / 150

With DOS, you may use the '*' and '?':

118 / 150

Second Generation of Computer was based on which of the following ?

119 / 150

Size of the virtual memory depends upon?

120 / 150

A system program which helps the execution of user programs is known as........?

121 / 150

Magnetic dicks are the most popular medium for

122 / 150

A major security problem for operating system is?

123 / 150

Which of the following commands is goven to reboot the computer?

124 / 150

What is the most common tool used to restrict access to computer system?

125 / 150

A computer communication technology that provides a way to interconnect multiple computer across short distance is?

126 / 150

What is page stealing?

127 / 150

MS_DOS is a ...... operating system ?

128 / 150

VIRUS Stands for

129 / 150

The number of processes completed per unit time is known as......?

130 / 150

Which of the following required large computer memory?

131 / 150

FIFO scheduling is_____?

132 / 150

Concurrent process are?

133 / 150

What type of computer programming is used for airplane ticket reservation system?

134 / 150

The.....program compresses large files into a smaller file?

135 / 150

The DIR command in DOS operating system?

136 / 150

Which of the following memories allows simultaneous read and write operation?

137 / 150

The part of machine level instruction, which tells the Central processor what has to be done,is?

138 / 150

Operating system is also known as?

139 / 150

Which directory implementation is used in most Operating System?

140 / 150

Assembly language started to be used from

141 / 150

In wildcard specification '?' Is used as replacement for?

142 / 150

Which of the printers used in conjunction with computers uses dry ink powder?

143 / 150

The startup routine runs, when mechine boots up is known as?

144 / 150

When a logic bomb is activated by a time-related event, it is known as a:

145 / 150

A system program that combines the separately compiled modules of a program into a form suittable for execution?

146 / 150

The path from which data flows in a computer system is known as

147 / 150

------ is the measurement of things such is fingerprints& retinal scans used for security access.

148 / 150

The processes of starting or restarting a computer system by loading instruction from a secondary storage device into the completer memory is called---?

149 / 150

Which of following approaches do not require knowledge of the system state?

150 / 150

A popular operating system used with micro-computer is--?

Your score is

0%

Exit

0%
75

Only 40 minutes is given for better practice of time management.

Best Wishes 🙂 PREPQA Team

Time Off. Practice for better time management.

Thank You!


Computer Operator question Set 1

This test is the model question Unit test Set 1 by PREPQA, by going through this test you can check yourself and understand what you need to improve in this unit i.e. Computer Fundamentals. This test is prepared by prepqa.com team for you under consideration of all the aspect of real exam pattern. And the good thing is it's totally free. You Can participate in this test exam for completely free just by clicking start button. Best Wishes from PREPQA Team.

1 / 50

Which technology is more reliable?

2 / 50

Who invented Slide Rules?

3 / 50

The term GIGO is related to

4 / 50

Hardware and software designed to guard against unauthorized access to computer network is known as

5 / 50

Which of the following is most common type memory in use today?

6 / 50

Which part of the computer is used for calculating and comparing?

7 / 50

Hard disk is coated in both side with

8 / 50

Which of the programming language started from Second Generation?

9 / 50

Assembly language started to be used from

10 / 50

Which of the computer cocieved by Babbage?

11 / 50

First electronic computer was developed by

12 / 50

Every set in the dotted decimal format of IP address is called

13 / 50

……… Is defined as any crime completed through the use of computer technology

14 / 50

The Computer abbreviation KB usually means

15 / 50

The Output Quality of  a printer is measured by

16 / 50

What is the full form of COMPUTER?

17 / 50

Which of the following required large computer memory?

18 / 50

Which of the printers used in conjunction with computers uses dry ink powder?

19 / 50

The common name for the crime of stealing password is:

20 / 50

Which of the following is/are Web Search Engine?

21 / 50

When a logic bomb is activated by a time-related event, it is known as a:

22 / 50

……… Is used to prevent the loss of data during power failures.

23 / 50

Second Generation of Computer was based on which of the following ?

24 / 50

Which of the following registers is loaded with the contents of the memory location pointed by the PC?

25 / 50

Which of the following memories must be refreshed many time per second?

26 / 50

A kind of serial dot-matrix printer that forms characters with magnetically charged ink sprayed dots is called

27 / 50

Which of the following is most powerful computers?

28 / 50

Which of the following is not a computer language

29 / 50

Who is the CEO of Google?

30 / 50

Which of the following memories allows simultaneous read and write operation?

31 / 50

Which protocol does ping use?

32 / 50

In 1999, the Mellissa virus was a widely publicized:

33 / 50

In latest generation of computer, the instruction are executed

34 / 50

Row facts and figures about any particular topic are

35 / 50

what is the name of an application program that gathers user information and sends it to someone through the internet?

36 / 50

Latency Time is

37 / 50

Computer professional working in a computer center are

38 / 50

Memory is made up of

39 / 50

Main storage is also called

40 / 50

An intentionally disruptive program that spread from program to program or disk to disk is known as a

41 / 50

Magnetic dicks are the most popular medium for

42 / 50

In which year was chip used inside the computer for the first time?

43 / 50

EPROM can be used for

44 / 50

which of the following is the programming language?

45 / 50

The path from which data flows in a computer system is known as

46 / 50

who is ‎Larry Page?

47 / 50

Which of the following is not an Xt microprocessor?

48 / 50

------ is the measurement of things such is fingerprints& retinal scans used for security access.

49 / 50

Malicious software is known as:

50 / 50

What is the most common tool used to restrict access to computer system?

Your score is

The average score is 52%

0%

Exit

en_USEnglish