Practice question Set 1

0%
24

Only 40 minutes is given for better practice of time management.

Best Wishes 🙂 PREPQA Team

Time Off. Practice for better time management.

Thank You!


Practice question Set 1

This test is the practice test Set 1 by PREPQA, by going through this test you can check yourself and understand what you need to improve in this unit i.e. Computer Fundamentals. This test is prepared by prepqa.com team for you under consideration of all the aspect of real exam pattern. And the good thing is it's totally free. You Can participate in this practice test exam for completely free just by clicking start button. Best Wishes from PREPQA Team.

1 / 150

Which of following approaches do not require knowledge of the system state?

2 / 150

1. Find out who is not the inventor of transistors among the following names

3 / 150

Linux is a/n ........ operating system?

4 / 150

Which of the following scheduling policy is well suited for time shared operating system?

5 / 150

Round robin scheduling is essentially the preemptive version of_______?

6 / 150

Which of the following is most powerful computers?

7 / 150

The common name for the crime of stealing password is:

8 / 150

The number of processes completed per unit time is known as......?

9 / 150

FIFO scheduling is_____?

10 / 150

A system program which helps the execution of user programs is known as........?

11 / 150

The part of machine level instruction which tells the center processor what has to be done, is?

12 / 150

What is the most common tool used to restrict access to computer system?

13 / 150

An approach that permits the computer to work on several programs instead of one is--?

14 / 150

The.....program compresses large files into a smaller file?

15 / 150

which of the following database object asks a question of information in a database and then displays the results?

16 / 150

Who invented Slide Rules?

17 / 150

Dead-lock in an Operating System is?

18 / 150

What is the name of the latest server operating system developed by microsoft?

19 / 150

EPROM can be used for

20 / 150

When a logic bomb is activated by a time-related event, it is known as a:

21 / 150

Using windows explorer, a plus(+ sign in front of a folder indicates........?

22 / 150

The software that performs the specific jobs to be done in a business is called?

23 / 150

Who is the CEO of Google?

24 / 150

Process is?

25 / 150

Every file must have a.........?

26 / 150

Reading data is performed in magnetic disk by?

27 / 150

Which of the following memories allows simultaneous read and write operation?

28 / 150

Main storage is also called

29 / 150

Concurrent process are?

30 / 150

The batch file uses the extension?

31 / 150

Which is not application software?

32 / 150

which of the following is not a selection technique?

33 / 150

Hard disk is coated in both side with

34 / 150

Paging is a technique?

35 / 150

Which of the following algorithm suffers from the belady's anomly?

36 / 150

All of the following are examples of real security and privacy risks except?

37 / 150

An approach that permits the computer to work on several programs instead of one is--?

38 / 150

Bootstrap or vector is called?

39 / 150

Which technology is more reliable?

40 / 150

What is page stealing?

41 / 150

Which command is used to see the sub-directory structure of drive?

42 / 150

Group of instructions that directs a computer is called--?

43 / 150

Which of the following required large computer memory?

44 / 150

What type of computer programming is used for airplane ticket reservation system?

45 / 150

Which of the following processors use RISE technology?

46 / 150

Which of the following is not a computer language

47 / 150

A computer program that instruct other programs to perform a particular type of operation is--?

48 / 150

A compiler is______?

49 / 150

2. DCL provides commands to perform actions like

50 / 150

Row facts and figures about any particular topic are

51 / 150

_______Is a high level abstraction over semaphore?

52 / 150

Maximum number of decimal places you can put in MS excel is

53 / 150

Which is true about Unicode

54 / 150

In which year was chip used inside the computer for the first time?

55 / 150

The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack(without further movement of the arm with multiple heads)?

56 / 150

A directly accessible appointment calendar is feature of a--- resident package?

57 / 150

what is the name of an application program that gathers user information and sends it to someone through the internet?

58 / 150

First electronic computer was developed by

59 / 150

A hard disk becomes totally inaccessible when a computer virus corrupts its?

60 / 150

A kind of serial dot-matrix printer that forms characters with magnetically charged ink sprayed dots is called

61 / 150

The Computer abbreviation KB usually means

62 / 150

The path from which data flows in a computer system is known as

63 / 150

The simplest way to break a deadlock is to?

64 / 150

Malicious software is known as:

65 / 150

Which is not correct?

66 / 150

VIRUS Stands for

67 / 150

To avoid the race condition, the number of processes that may be simultaneously inside their critical section is?

68 / 150

A microsoft windows is........a(n?

69 / 150

Which of the following memories must be refreshed many time per second?

70 / 150

The DIR command in DOS operating system?

71 / 150

Telnet is a service that runs?

72 / 150

Which of the following is program group?

73 / 150

Which part of the computer is used for calculating and comparing?

74 / 150

In 1999, the Mellissa virus was a widely publicized:

75 / 150

A term used to describe interconnected computer configuration is--?

76 / 150

A computer system that permits multiple users to run programs at same time ?

77 / 150

Which of the following commands is goven to reboot the computer?

78 / 150

It is not possible to have a deadlock involving only a single process. Why?

79 / 150

------ is the measurement of things such is fingerprints& retinal scans used for security access.

80 / 150

The bankers algorithm is used?

81 / 150

What is the maximum length allowed for primary name of a computer file under DOS?

82 / 150

In latest generation of computer, the instruction are executed

83 / 150

To protect system, there are how many security levels?

84 / 150

Which of the following can be software?

85 / 150

Correcting errors in a program is referred to as?

86 / 150

In wildcard specification '?' Is used as replacement for?

87 / 150

what degrees of text of alignment orientation is possible in MS excel cells?

88 / 150

Which of the following is not an Xt microprocessor?

89 / 150

A device that forwards data packet from one network to another is called a?

90 / 150

Latency Time is

91 / 150

During the boot process, the ........ looks for the system files?

92 / 150

Relationship in a database is maintained through

93 / 150

Which of the following topologies consists of multiple CPU connected single communication line running the length of the network?

94 / 150

Security violation due to?

95 / 150

Which of the programming language started from Second Generation?

96 / 150

Memory is made up of

97 / 150

Every set in the dotted decimal format of IP address is called

98 / 150

Hardware and software designed to guard against unauthorized access to computer network is known as

99 / 150

A popular operating system used with micro-computer is--?

100 / 150

Special effect used to introduce slides in presentation are called

101 / 150

What is the full form of COMPUTER?

102 / 150

The part of machine level instruction, which tells the Central processor what has to be done,is?

103 / 150

The mechanism that bring a page into memory only when it is needed is called?

104 / 150

Which of the computer cocieved by Babbage?

105 / 150

A system program that combines the separately compiled modules of a program into a form suittable for execution?

106 / 150

Resolution of externally defined sumbols is performed by?

107 / 150

Which of the following is the correct HTML code for creating hyperlink?

108 / 150

How many characters form a secondary name for a file?

109 / 150

A computer communication technology that provides a way to interconnect multiple computer across short distance is?

110 / 150

An intentionally disruptive program that spread from program to program or disk to disk is known as a

111 / 150

MS_DOS is a ...... operating system ?

112 / 150

Which of the following is most common type memory in use today?

113 / 150

A public key encryption system?

114 / 150

Magnetic dicks are the most popular medium for

115 / 150

Operating system is also known as?

116 / 150

Assembly language started to be used from

117 / 150

The term GIGO is related to

118 / 150

Memory management is?

119 / 150

Size of the virtual memory depends upon?

120 / 150

which of the following is the programming language?

121 / 150

Which of the following is the fastest memory?

122 / 150

Which of the printers used in conjunction with computers uses dry ink powder?

123 / 150

The startup routine runs, when mechine boots up is known as?

124 / 150

What is the full form of HTML?

125 / 150

Virtual memory is.......?

126 / 150

Which of the following is/are Web Search Engine?

127 / 150

Second Generation of Computer was based on which of the following ?

128 / 150

The processes of starting or restarting a computer system by loading instruction from a secondary storage device into the completer memory is called---?

129 / 150

An assembler is used to translate a program written in?

130 / 150

Which of the following is the process by which a users privileges risks except?

131 / 150

The Output Quality of  a printer is measured by

132 / 150

Computer professional working in a computer center are

133 / 150

A tree structured file directory system ?

134 / 150

Which is not the state of the process?

135 / 150

Which directory implementation is used in most Operating System?

136 / 150

Memory management is?

137 / 150

With DOS, you may use the '*' and '?':

138 / 150

RJ45 UPT cable has ...... cables.

139 / 150

Which protocol does ping use?

140 / 150

A major security problem for operating system is?

141 / 150

Which of the following refers to the associative memory?

142 / 150

Which of the following registers is loaded with the contents of the memory location pointed by the PC?

143 / 150

Since virus are only a form of software, they primarily infect--?

144 / 150

What is the name of the latest server operating system developed by microsoft?

145 / 150

Not a text alignment direction in MS excel cells

146 / 150

……… Is defined as any crime completed through the use of computer technology

147 / 150

What is the size of source and destination IP address under IP header?

148 / 150

who is ‎Larry Page?

149 / 150

……… Is used to prevent the loss of data during power failures.

150 / 150

What is the name given to the database management system which is able to handle full text data, image data, audio & video?

Your score is

0%

Exit

2 comments

Leave a Reply to Sandeep Cancel reply

Your email address will not be published. Required fields are marked *