Practice question Set 1

0%
25

Only 40 minutes is given for better practice of time management.

Best Wishes 🙂 PREPQA Team

Time Off. Practice for better time management.

Thank You!


Practice question Set 1

This test is the practice test Set 1 by PREPQA, by going through this test you can check yourself and understand what you need to improve in this unit i.e. Computer Fundamentals. This test is prepared by prepqa.com team for you under consideration of all the aspect of real exam pattern. And the good thing is it's totally free. You Can participate in this practice test exam for completely free just by clicking start button. Best Wishes from PREPQA Team.

1 / 150

A public key encryption system?

2 / 150

The software that performs the specific jobs to be done in a business is called?

3 / 150

Relationship in a database is maintained through

4 / 150

which of the following is the programming language?

5 / 150

Maximum number of decimal places you can put in MS excel is

6 / 150

Using windows explorer, a plus(+ sign in front of a folder indicates........?

7 / 150

The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack(without further movement of the arm with multiple heads)?

8 / 150

VIRUS Stands for

9 / 150

Computer professional working in a computer center are

10 / 150

What is the name of the latest server operating system developed by microsoft?

11 / 150

Which of the following is most powerful computers?

12 / 150

Assembly language started to be used from

13 / 150

First electronic computer was developed by

14 / 150

A microsoft windows is........a(n?

15 / 150

In latest generation of computer, the instruction are executed

16 / 150

The path from which data flows in a computer system is known as

17 / 150

What is the maximum length allowed for primary name of a computer file under DOS?

18 / 150

Every set in the dotted decimal format of IP address is called

19 / 150

Which of the following required large computer memory?

20 / 150

Dead-lock in an Operating System is?

21 / 150

A term used to describe interconnected computer configuration is--?

22 / 150

Row facts and figures about any particular topic are

23 / 150

FIFO scheduling is_____?

24 / 150

_______Is a high level abstraction over semaphore?

25 / 150

Which of the programming language started from Second Generation?

26 / 150

Which of the following is not an Xt microprocessor?

27 / 150

It is not possible to have a deadlock involving only a single process. Why?

28 / 150

Second Generation of Computer was based on which of the following ?

29 / 150

Which of the following is program group?

30 / 150

Who invented Slide Rules?

31 / 150

Which of the printers used in conjunction with computers uses dry ink powder?

32 / 150

Memory management is?

33 / 150

The part of machine level instruction which tells the center processor what has to be done, is?

34 / 150

Telnet is a service that runs?

35 / 150

Which of the following is/are Web Search Engine?

36 / 150

The batch file uses the extension?

37 / 150

All of the following are examples of real security and privacy risks except?

38 / 150

Resolution of externally defined sumbols is performed by?

39 / 150

To protect system, there are how many security levels?

40 / 150

Which of the following processors use RISE technology?

41 / 150

1. Find out who is not the inventor of transistors among the following names

42 / 150

How many characters form a secondary name for a file?

43 / 150

2. DCL provides commands to perform actions like

44 / 150

Which of the following is not a computer language

45 / 150

Not a text alignment direction in MS excel cells

46 / 150

A computer communication technology that provides a way to interconnect multiple computer across short distance is?

47 / 150

Which command is used to see the sub-directory structure of drive?

48 / 150

Which of the following is the correct HTML code for creating hyperlink?

49 / 150

Malicious software is known as:

50 / 150

What type of computer programming is used for airplane ticket reservation system?

51 / 150

A device that forwards data packet from one network to another is called a?

52 / 150

Which of the following scheduling policy is well suited for time shared operating system?

53 / 150

The term GIGO is related to

54 / 150

What is the full form of HTML?

55 / 150

Which is true about Unicode

56 / 150

In which year was chip used inside the computer for the first time?

57 / 150

Which of the following registers is loaded with the contents of the memory location pointed by the PC?

58 / 150

Magnetic dicks are the most popular medium for

59 / 150

What is the full form of COMPUTER?

60 / 150

RJ45 UPT cable has ...... cables.

61 / 150

Since virus are only a form of software, they primarily infect--?

62 / 150

Which of the following is the process by which a users privileges risks except?

63 / 150

A directly accessible appointment calendar is feature of a--- resident package?

64 / 150

What is the name given to the database management system which is able to handle full text data, image data, audio & video?

65 / 150

The common name for the crime of stealing password is:

66 / 150

Every file must have a.........?

67 / 150

Which is not the state of the process?

68 / 150

The Computer abbreviation KB usually means

69 / 150

The processes of starting or restarting a computer system by loading instruction from a secondary storage device into the completer memory is called---?

70 / 150

A computer system that permits multiple users to run programs at same time ?

71 / 150

A computer program that instruct other programs to perform a particular type of operation is--?

72 / 150

Memory is made up of

73 / 150

……… Is used to prevent the loss of data during power failures.

74 / 150

Round robin scheduling is essentially the preemptive version of_______?

75 / 150

Which protocol does ping use?

76 / 150

An intentionally disruptive program that spread from program to program or disk to disk is known as a

77 / 150

Hardware and software designed to guard against unauthorized access to computer network is known as

78 / 150

What is the most common tool used to restrict access to computer system?

79 / 150

When a logic bomb is activated by a time-related event, it is known as a:

80 / 150

Which of the following is the fastest memory?

81 / 150

The Output Quality of  a printer is measured by

82 / 150

Hard disk is coated in both side with

83 / 150

In wildcard specification '?' Is used as replacement for?

84 / 150

A system program that combines the separately compiled modules of a program into a form suittable for execution?

85 / 150

Operating system is also known as?

86 / 150

Which of the following is most common type memory in use today?

87 / 150

Which of the following memories allows simultaneous read and write operation?

88 / 150

Virtual memory is.......?

89 / 150

Correcting errors in a program is referred to as?

90 / 150

Which of the following algorithm suffers from the belady's anomly?

91 / 150

During the boot process, the ........ looks for the system files?

92 / 150

In 1999, the Mellissa virus was a widely publicized:

93 / 150

Memory management is?

94 / 150

Process is?

95 / 150

Size of the virtual memory depends upon?

96 / 150

Reading data is performed in magnetic disk by?

97 / 150

What is page stealing?

98 / 150

A compiler is______?

99 / 150

Linux is a/n ........ operating system?

100 / 150

A kind of serial dot-matrix printer that forms characters with magnetically charged ink sprayed dots is called

101 / 150

An approach that permits the computer to work on several programs instead of one is--?

102 / 150

Which of the computer cocieved by Babbage?

103 / 150

Which directory implementation is used in most Operating System?

104 / 150

The.....program compresses large files into a smaller file?

105 / 150

A tree structured file directory system ?

106 / 150

MS_DOS is a ...... operating system ?

107 / 150

Who is the CEO of Google?

108 / 150

Group of instructions that directs a computer is called--?

109 / 150

What is the name of the latest server operating system developed by microsoft?

110 / 150

With DOS, you may use the '*' and '?':

111 / 150

which of the following is not a selection technique?

112 / 150

The bankers algorithm is used?

113 / 150

Which is not correct?

114 / 150

what is the name of an application program that gathers user information and sends it to someone through the internet?

115 / 150

Which of the following commands is goven to reboot the computer?

116 / 150

Concurrent process are?

117 / 150

EPROM can be used for

118 / 150

Which part of the computer is used for calculating and comparing?

119 / 150

The number of processes completed per unit time is known as......?

120 / 150

The mechanism that bring a page into memory only when it is needed is called?

121 / 150

Which of the following refers to the associative memory?

122 / 150

Which of the following topologies consists of multiple CPU connected single communication line running the length of the network?

123 / 150

To avoid the race condition, the number of processes that may be simultaneously inside their critical section is?

124 / 150

The part of machine level instruction, which tells the Central processor what has to be done,is?

125 / 150

Which of the following can be software?

126 / 150

Which is not application software?

127 / 150

Main storage is also called

128 / 150

Paging is a technique?

129 / 150

Which of following approaches do not require knowledge of the system state?

130 / 150

The DIR command in DOS operating system?

131 / 150

Special effect used to introduce slides in presentation are called

132 / 150

The startup routine runs, when mechine boots up is known as?

133 / 150

who is ‎Larry Page?

134 / 150

An assembler is used to translate a program written in?

135 / 150

What is the size of source and destination IP address under IP header?

136 / 150

Which technology is more reliable?

137 / 150

The simplest way to break a deadlock is to?

138 / 150

Latency Time is

139 / 150

A popular operating system used with micro-computer is--?

140 / 150

------ is the measurement of things such is fingerprints& retinal scans used for security access.

141 / 150

A major security problem for operating system is?

142 / 150

Security violation due to?

143 / 150

A hard disk becomes totally inaccessible when a computer virus corrupts its?

144 / 150

An approach that permits the computer to work on several programs instead of one is--?

145 / 150

A system program which helps the execution of user programs is known as........?

146 / 150

Bootstrap or vector is called?

147 / 150

Which of the following memories must be refreshed many time per second?

148 / 150

which of the following database object asks a question of information in a database and then displays the results?

149 / 150

what degrees of text of alignment orientation is possible in MS excel cells?

150 / 150

……… Is defined as any crime completed through the use of computer technology

Your score is

0%

Exit

2 comments

Leave a comment

Your email address will not be published. Required fields are marked *