Practice

0%
75

Only 40 minutes is given for better practice of time management.

Best Wishes 🙂 PREPQA Team

Time Off. Practice for better time management.

Thank You!


Computer Operator question Set 1

This test is the model question Unit test Set 1 by PREPQA, by going through this test you can check yourself and understand what you need to improve in this unit i.e. Computer Fundamentals. This test is prepared by prepqa.com team for you under consideration of all the aspect of real exam pattern. And the good thing is it's totally free. You Can participate in this test exam for completely free just by clicking start button. Best Wishes from PREPQA Team.

1 / 50

Which of the following is most powerful computers?

2 / 50

Which of the following is not a computer language

3 / 50

who is ‎Larry Page?

4 / 50

Computer professional working in a computer center are

5 / 50

Which of the programming language started from Second Generation?

6 / 50

Which of the following is/are Web Search Engine?

7 / 50

Hardware and software designed to guard against unauthorized access to computer network is known as

8 / 50

The path from which data flows in a computer system is known as

9 / 50

In which year was chip used inside the computer for the first time?

10 / 50

What is the most common tool used to restrict access to computer system?

11 / 50

Magnetic dicks are the most popular medium for

12 / 50

Memory is made up of

13 / 50

First electronic computer was developed by

14 / 50

A kind of serial dot-matrix printer that forms characters with magnetically charged ink sprayed dots is called

15 / 50

Assembly language started to be used from

16 / 50

what is the name of an application program that gathers user information and sends it to someone through the internet?

17 / 50

……… Is used to prevent the loss of data during power failures.

18 / 50

The Output Quality of  a printer is measured by

19 / 50

Hard disk is coated in both side with

20 / 50

……… Is defined as any crime completed through the use of computer technology

21 / 50

Main storage is also called

22 / 50

In 1999, the Mellissa virus was a widely publicized:

23 / 50

The common name for the crime of stealing password is:

24 / 50

Who invented Slide Rules?

25 / 50

EPROM can be used for

26 / 50

Which part of the computer is used for calculating and comparing?

27 / 50

Second Generation of Computer was based on which of the following ?

28 / 50

Which technology is more reliable?

29 / 50

Row facts and figures about any particular topic are

30 / 50

Which of the following memories allows simultaneous read and write operation?

31 / 50

Latency Time is

32 / 50

When a logic bomb is activated by a time-related event, it is known as a:

33 / 50

Who is the CEO of Google?

34 / 50

In latest generation of computer, the instruction are executed

35 / 50

which of the following is the programming language?

36 / 50

The Computer abbreviation KB usually means

37 / 50

What is the full form of COMPUTER?

38 / 50

Which of the following memories must be refreshed many time per second?

39 / 50

Which of the following required large computer memory?

40 / 50

Which of the following registers is loaded with the contents of the memory location pointed by the PC?

41 / 50

Which of the following is most common type memory in use today?

42 / 50

Malicious software is known as:

43 / 50

Which of the following is not an Xt microprocessor?

44 / 50

Which protocol does ping use?

45 / 50

Every set in the dotted decimal format of IP address is called

46 / 50

An intentionally disruptive program that spread from program to program or disk to disk is known as a

47 / 50

Which of the printers used in conjunction with computers uses dry ink powder?

48 / 50

Which of the computer cocieved by Babbage?

49 / 50

------ is the measurement of things such is fingerprints& retinal scans used for security access.

50 / 50

The term GIGO is related to

Your score is

The average score is 52%

0%

Exit

0%
24

Only 40 minutes is given for better practice of time management.

Best Wishes 🙂 PREPQA Team

Time Off. Practice for better time management.

Thank You!


Practice question Set 1

This test is the practice test Set 1 by PREPQA, by going through this test you can check yourself and understand what you need to improve in this unit i.e. Computer Fundamentals. This test is prepared by prepqa.com team for you under consideration of all the aspect of real exam pattern. And the good thing is it's totally free. You Can participate in this practice test exam for completely free just by clicking start button. Best Wishes from PREPQA Team.

1 / 150

Which is true about Unicode

2 / 150

The.....program compresses large files into a smaller file?

3 / 150

Which of the following memories must be refreshed many time per second?

4 / 150

A computer communication technology that provides a way to interconnect multiple computer across short distance is?

5 / 150

Which of the following can be software?

6 / 150

Which is not correct?

7 / 150

Paging is a technique?

8 / 150

During the boot process, the ........ looks for the system files?

9 / 150

Magnetic dicks are the most popular medium for

10 / 150

Process is?

11 / 150

Since virus are only a form of software, they primarily infect--?

12 / 150

1. Find out who is not the inventor of transistors among the following names

13 / 150

Every file must have a.........?

14 / 150

Second Generation of Computer was based on which of the following ?

15 / 150

A kind of serial dot-matrix printer that forms characters with magnetically charged ink sprayed dots is called

16 / 150

The processes of starting or restarting a computer system by loading instruction from a secondary storage device into the completer memory is called---?

17 / 150

Hardware and software designed to guard against unauthorized access to computer network is known as

18 / 150

Using windows explorer, a plus(+ sign in front of a folder indicates........?

19 / 150

Bootstrap or vector is called?

20 / 150

An approach that permits the computer to work on several programs instead of one is--?

21 / 150

Virtual memory is.......?

22 / 150

A system program that combines the separately compiled modules of a program into a form suittable for execution?

23 / 150

_______Is a high level abstraction over semaphore?

24 / 150

In latest generation of computer, the instruction are executed

25 / 150

The simplest way to break a deadlock is to?

26 / 150

RJ45 UPT cable has ...... cables.

27 / 150

The batch file uses the extension?

28 / 150

Relationship in a database is maintained through

29 / 150

FIFO scheduling is_____?

30 / 150

The number of processes completed per unit time is known as......?

31 / 150

Which of the following memories allows simultaneous read and write operation?

32 / 150

In wildcard specification '?' Is used as replacement for?

33 / 150

2. DCL provides commands to perform actions like

34 / 150

A compiler is______?

35 / 150

Which of the following is the correct HTML code for creating hyperlink?

36 / 150

Which of the following scheduling policy is well suited for time shared operating system?

37 / 150

Hard disk is coated in both side with

38 / 150

Which of the following is not a computer language

39 / 150

What is the maximum length allowed for primary name of a computer file under DOS?

40 / 150

The part of machine level instruction, which tells the Central processor what has to be done,is?

41 / 150

Which of the following registers is loaded with the contents of the memory location pointed by the PC?

42 / 150

who is ‎Larry Page?

43 / 150

The DIR command in DOS operating system?

44 / 150

A microsoft windows is........a(n?

45 / 150

VIRUS Stands for

46 / 150

MS_DOS is a ...... operating system ?

47 / 150

What is the full form of HTML?

48 / 150

An assembler is used to translate a program written in?

49 / 150

Size of the virtual memory depends upon?

50 / 150

In which year was chip used inside the computer for the first time?

51 / 150

Which of the following required large computer memory?

52 / 150

The common name for the crime of stealing password is:

53 / 150

Which command is used to see the sub-directory structure of drive?

54 / 150

Malicious software is known as:

55 / 150

What is the name of the latest server operating system developed by microsoft?

56 / 150

The mechanism that bring a page into memory only when it is needed is called?

57 / 150

Reading data is performed in magnetic disk by?

58 / 150

What is the size of source and destination IP address under IP header?

59 / 150

The startup routine runs, when mechine boots up is known as?

60 / 150

What is the name of the latest server operating system developed by microsoft?

61 / 150

Correcting errors in a program is referred to as?

62 / 150

which of the following is not a selection technique?

63 / 150

Who is the CEO of Google?

64 / 150

Memory management is?

65 / 150

Which of the following topologies consists of multiple CPU connected single communication line running the length of the network?

66 / 150

Assembly language started to be used from

67 / 150

A tree structured file directory system ?

68 / 150

An intentionally disruptive program that spread from program to program or disk to disk is known as a

69 / 150

A system program which helps the execution of user programs is known as........?

70 / 150

Linux is a/n ........ operating system?

71 / 150

The Computer abbreviation KB usually means

72 / 150

Which is not application software?

73 / 150

what degrees of text of alignment orientation is possible in MS excel cells?

74 / 150

With DOS, you may use the '*' and '?':

75 / 150

The path from which data flows in a computer system is known as

76 / 150

Which of the following algorithm suffers from the belady's anomly?

77 / 150

An approach that permits the computer to work on several programs instead of one is--?

78 / 150

Maximum number of decimal places you can put in MS excel is

79 / 150

Which of the programming language started from Second Generation?

80 / 150

……… Is used to prevent the loss of data during power failures.

81 / 150

Memory is made up of

82 / 150

Computer professional working in a computer center are

83 / 150

……… Is defined as any crime completed through the use of computer technology

84 / 150

Round robin scheduling is essentially the preemptive version of_______?

85 / 150

The part of machine level instruction which tells the center processor what has to be done, is?

86 / 150

Which of following approaches do not require knowledge of the system state?

87 / 150

which of the following is the programming language?

88 / 150

Main storage is also called

89 / 150

------ is the measurement of things such is fingerprints& retinal scans used for security access.

90 / 150

Special effect used to introduce slides in presentation are called

91 / 150

EPROM can be used for

92 / 150

Which of the following commands is goven to reboot the computer?

93 / 150

How many characters form a secondary name for a file?

94 / 150

To protect system, there are how many security levels?

95 / 150

What is the name given to the database management system which is able to handle full text data, image data, audio & video?

96 / 150

Every set in the dotted decimal format of IP address is called

97 / 150

What is the most common tool used to restrict access to computer system?

98 / 150

which of the following database object asks a question of information in a database and then displays the results?

99 / 150

A major security problem for operating system is?

100 / 150

A device that forwards data packet from one network to another is called a?

101 / 150

The term GIGO is related to

102 / 150

Latency Time is

103 / 150

Which of the printers used in conjunction with computers uses dry ink powder?

104 / 150

What type of computer programming is used for airplane ticket reservation system?

105 / 150

Which of the following is the process by which a users privileges risks except?

106 / 150

Which of the following is the fastest memory?

107 / 150

A public key encryption system?

108 / 150

what is the name of an application program that gathers user information and sends it to someone through the internet?

109 / 150

Which of the following refers to the associative memory?

110 / 150

All of the following are examples of real security and privacy risks except?

111 / 150

Group of instructions that directs a computer is called--?

112 / 150

In 1999, the Mellissa virus was a widely publicized:

113 / 150

A computer program that instruct other programs to perform a particular type of operation is--?

114 / 150

Which of the following is/are Web Search Engine?

115 / 150

A hard disk becomes totally inaccessible when a computer virus corrupts its?

116 / 150

Row facts and figures about any particular topic are

117 / 150

What is the full form of COMPUTER?

118 / 150

Resolution of externally defined sumbols is performed by?

119 / 150

Which protocol does ping use?

120 / 150

Not a text alignment direction in MS excel cells

121 / 150

Which of the following is most powerful computers?

122 / 150

Which of the following processors use RISE technology?

123 / 150

The bankers algorithm is used?

124 / 150

Which part of the computer is used for calculating and comparing?

125 / 150

Concurrent process are?

126 / 150

Who invented Slide Rules?

127 / 150

A popular operating system used with micro-computer is--?

128 / 150

Which is not the state of the process?

129 / 150

Memory management is?

130 / 150

What is page stealing?

131 / 150

Which of the following is not an Xt microprocessor?

132 / 150

Telnet is a service that runs?

133 / 150

Which of the computer cocieved by Babbage?

134 / 150

A directly accessible appointment calendar is feature of a--- resident package?

135 / 150

When a logic bomb is activated by a time-related event, it is known as a:

136 / 150

Which of the following is most common type memory in use today?

137 / 150

The maximum amount of information that is available in one portion of the disk access arm for a removal disk pack(without further movement of the arm with multiple heads)?

138 / 150

Dead-lock in an Operating System is?

139 / 150

To avoid the race condition, the number of processes that may be simultaneously inside their critical section is?

140 / 150

The Output Quality of  a printer is measured by

141 / 150

Security violation due to?

142 / 150

The software that performs the specific jobs to be done in a business is called?

143 / 150

First electronic computer was developed by

144 / 150

Which directory implementation is used in most Operating System?

145 / 150

Which technology is more reliable?

146 / 150

Operating system is also known as?

147 / 150

Which of the following is program group?

148 / 150

It is not possible to have a deadlock involving only a single process. Why?

149 / 150

A computer system that permits multiple users to run programs at same time ?

150 / 150

A term used to describe interconnected computer configuration is--?

Your score is

0%

Exit

/50
17

Test Question Set 2 (Computer)

This test is the Computer Operator Model Question Set 2 by PREPQA, by going through this test you can check yourself and understand what you need to improve in this unit i.e. Computer Fundamentals. This test is prepared by prepqa.com team for you under consideration of all the aspect of real exam pattern. And the good thing is it's totally free. You Can participate in this test exam for completely free just by clicking start button. Best Wishes from PREPQA Team.

1 / 50

How was the generation of computers classified?

2 / 50

It is possible to display pictures in HTML specification by using the key?

3 / 50

Which page orientation you will select if you wish to print in wide format?

4 / 50

Page setup for slides is available on?

5 / 50

..........presents data in a way similar to an excel spreadsheet?

6 / 50

...........Runs on computer hardware and serve as platform for other software to run on?

7 / 50

FORTRAN programming language is more suitable for........?

8 / 50

MIS is designed for......?

9 / 50

Which of the following is a popular DOS based spreadsheet pakcage?

10 / 50

The cell labeled F5 refers to?

11 / 50

Which of the following device is used only in LAN(local area network)?

12 / 50

The intersection of a row and column is called?

13 / 50

The thesaurus tool?

14 / 50

Which bar is usually located below the title bar that provides categorized option?

15 / 50

Which of the following is a read only memory storage device?

16 / 50

In MS-Excel, B7:B9 indicates?

17 / 50

Which operator will combine text from two cells into one cell?

18 / 50

What term refers to a collection of related information?

19 / 50

How do you display current date and time in MS Excel?

20 / 50

Through which device do the main components of the computer communicate with each other?

21 / 50

In MS-Word, you can convert the document's file format by applying, the command?

22 / 50

Which key used for slide show from beginning?

23 / 50

Mail merge is concerned with?

24 / 50

Which of the following operating system do you choose to implement a client-server network?

25 / 50

You can break the column by?

26 / 50

Which of the following operating system does not implement multitasking truly?

27 / 50

The operating system manages?

28 / 50

How many pair cables does Rj45 UTP cable have<?

29 / 50

When a computer is first truned on or restarted, a special type of absolute loader called is executed?

30 / 50

In word-processing the task of changing the apperarance of a document is?

31 / 50

The digital signals can be represented by?

32 / 50

The operating system is the most common type of...........software?

33 / 50

DBMS is?

34 / 50

Which of the following cables can transmit data at high speed?

35 / 50

A DBMS allows you to create and maintain a database, create reports, and develop application programs,select the best fit answer?

36 / 50

Which is an example of a formula in MS Excel?

37 / 50

A world wide web contains web pages?

38 / 50

What do you call the translator which takes high level language program as input & produce machine language code as output?

39 / 50

In MS-Word, you can insert the hyperlink?

40 / 50

In Ms Excel, what happens when dollar ($) are entered in a cell address?(ex:$B$2:$B$10)?

41 / 50

Database that contains table linked by common field is called a?

42 / 50

An excel workbook is a collection of?

43 / 50

Which among the following are the best tools for fixing errors on disks?

44 / 50

What is the first stage in sofware development?

45 / 50

The program which is as permanent as hardware & stored in ROM is known as?

46 / 50

In MS Excel, what do you mean by a workspace?

47 / 50

Which of the following do you use to change margins?

48 / 50

Where from you can insert shapes in your slide?

49 / 50

A web page is located using a?

50 / 50

The insertion point in a table can be moved by using?

Connect With Us

Your score is

0%

Exit

/50
29

Test Question Set 1 (Computer)

This test is the Computer Operator Model Question Set 1 by PREPQA, by going through this test you can check yourself and understand what you need to improve in this unit i.e. Computer Fundamentals. This test is prepared by prepqa.com team for you under consideration of all the aspect of real exam pattern. And the good thing is it's totally free. You Can participate in this test exam for completely free just by clicking start button. Best Wishes from PREPQA Team.

1 / 50

The result of function left (Examination,4) is______?

2 / 50

Which of the following is not a transmission medium?

3 / 50

Function of macro?

4 / 50

Oldest database model is_______?