0

Computer Aptitude - 17

Description: Computer Aptitude - 10
Number of Questions: 35
Created by:
Tags: Computer Aptitude - 10 Computer Knowledge Hardware
Attempted 0/35 Correct 0 Score 0

The basic input/output system (BIOS) is stored in

  1. RAM

  2. ROM

  3. CPU

  4. Hard drive


Correct Option: B
Explanation:

Option (2) is correct.

The memory resident portion of the operating system is called the

  1. registry

  2. API

  3. CMOS

  4. kernel


Correct Option: D

Ensuring that the essential peripheral devices are attached and operational is the ____________ process.

  1. configuration

  2. CMOS

  3. POST

  4. ROM


Correct Option: C

The _________ stored on a ROM chip is responsible for loading the operating system from its permanent location on the hard drive into RAM.

  1. BIOS

  2. API

  3. device driver

  4. supervisor program


Correct Option: A

Which of the following does not occur during the power-on self-test (POST)?

  1. The ScanDisk utility begins to run.

  2. The video card and video memory are tested.

  3. The BIOS identification process occurs.

  4. Memory chips are checked to ensure they are working properly.


Correct Option: A

In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.

  1. list

  2. thumbnails

  3. details

  4. icon


Correct Option: C

Which of the following statements is false regarding virtual memory?

  1. Any amount of RAM can be allocated to virtual memory.

  2. The setting for the amount of hard drive space to be allocated to virtual memory can be manually changed.

  3. Virtual memory is also called the swap file (or page file).

  4. Virtual memory is the physical space on the hard drive.

  5. None of these


Correct Option: A
Explanation:

Option (1) is correct.

The operating system allows users to organise the computer's contents in a hierarchical structure of directories that include all of the following, except

  1. files

  2. folders

  3. drives

  4. systems


Correct Option: D

Using Windows Explorer, a plus (+) sign in front of a folder indicates

  1. an open folder

  2. the folder contains subfolders

  3. a text file

  4. a graphics file


Correct Option: B

All the information collected during database development is stored in a

  1. Repository

  2. Data warehouse

  3. RAD

  4. CASE


Correct Option: B

___________ allows wireless mobile devices to access the Internet and its services such as the Web and e-mail

  1. TCP/IP

  2. Ethernet

  3. WAP

  4. Token ring

  5. None of these


Correct Option: C

All of the following statements concerning files are true, except

  1. A file is a collection of related pieces of information stored together for easy reference.

  2. Files can be generated from an application.

  3. Files are stored in RAM.

  4. Files should be organized in folders.


Correct Option: C

'MICR' technology used for clearance of cheques by banks refers to

  1. Magnetic Ink Character Recognition

  2. Magnetic Intelligence Character Recognition

  3. Magnetic Information Cable Recognition

  4. Magnetic Insurance Cases Recognition


Correct Option: A

The ____________ component is used by the data analyst to create the queries that access the database.

  1. data extraction

  2. end-user query tool

  3. end-user presentation tool

  4. data store


Correct Option: B

A/An _________ allows network users to share a single copy of software, which resides on the network server.

  1. single-user license agreement

  2. network site license

  3. end-user license agreement

  4. business software license


Correct Option: B

All of the following statements concerning windows are true, except

  1. windows is an example of a command-driven environment

  2. windows can be resized and repositioned on the desktop

  3. more than one window can be open at a time

  4. toolbars and scrollbars are features of windows


Correct Option: A

The altering of data so that it is not usable unless the changes are undone is

  1. biometrics

  2. compression

  3. encryption

  4. ergonomics


Correct Option: C

FTP stands for

  1. File Translate Protocol

  2. File Transit Protocol

  3. File Typing Protocol

  4. File Transfer Protocol


Correct Option: D

A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is

  1. bridge

  2. gateway

  3. router

  4. modem


Correct Option: B

A polymorphic virus

  1. modifies its program code each time it attaches itself to another program or file

  2. is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains

  3. a malicious-logic program that hides within or looks like a legitimate program

  4. infects a program file, but still reports the size and creation date of the original, uninfected program


Correct Option: A

Which is not a good web security strategy?

  1. Restrict access to the web server; keep a minimum number of ports open.

  2. Limit the users who can load software, edit or add files.

  3. Add demo programs, so users can test the system without accessing production data.

  4. Remove unnecessary compilers and interpreters.


Correct Option: D

Which of the following is a general-purpose programming language, designed by Sun Microsystems and well suited for use on the web?

  1. VB Script

  2. Java Script

  3. CSS

  4. Java


Correct Option: B

This _________ tier processes HTTP protocol, scripts tasks, performs calculations and provides access to data.

  1. client

  2. application/web server

  3. enterprise server

  4. DBA


Correct Option: A

RSA is

  1. symmetric cryptosystem

  2. asymmetric cryptosystem

  3. block cypher

  4. digital signature


Correct Option: D

Microwave transmission is used in environments where installing physical transmission media is

  1. difficult or impossible and where line-of-sight transmission is unavailable

  2. easy or promising and where line-of-sight transmission is unavailable

  3. difficult or impossible and where line-of-sight transmission is available

  4. easy or promising and where line-of-sight transmission is available


Correct Option: D

The ________ data mining technique derives rules from real-world case examples.

  1. rule discover

  2. signal processing

  3. neural nets

  4. case-based reasoning


Correct Option: C

How is power supplied to a low-power USB device?

  1. Through a power cable

  2. From an external power supply

  3. Directly from the computer's power supply

  4. Through the USB cable


Correct Option: D

A DVD-RAM is similar to a _________ except it has storage capacity up to 5.2 GB.

  1. CD-R

  2. Floppy disk

  3. CD-RW

  4. Hard disk


Correct Option: C
Explanation:

Correct Answer: CD-RW

When you are selecting a mouse for a particular computer system. What is the most important consideration?

  1. The type of drivers that come with the mouse

  2. The length of the mouse cord

  3. The type of connector the mouse is equipped with

  4. The number of buttons the mouse has


Correct Option: C

________ are used to identify a user who returns to a website.

  1. Cookies

  2. Plug-ins

  3. Scripts

  4. ASPs


Correct Option: A

Voice mail

  1. is the exchange of text messages and computer files transmitted via a communication network such as a local area network or the internet

  2. permits users to converse in real time with each other via the computer while connected to the Internet

  3. functions much like an answering machine, allowing callers to leave a voice message for the called party

  4. involves using video and computer technology to conduct a meeting between participants at geographically separate locations


Correct Option: C

Programs that automatically submit your search request to several search engines simultaneously are called

  1. metasearch engines

  2. webcrawlers

  3. spiders

  4. hits


Correct Option: A

Which one of the following objects is passed to a JavaBean when one of its properties is set via a JSP action?

  1. Servlet request

  2. Http servlet request

  3. Servlet response

  4. Http servlet response


Correct Option: C

All of the following are basic principles of networks, except

  1. each computer must have a network card

  2. there must be communication media connecting the network hardware devices

  3. there must be at least one connecting device

  4. each computer must have software that supports the movement of information


Correct Option: B

'DOS' floppy disk does not have

  1. a boot record

  2. a file allocation table

  3. a root directory

  4. virtual memory


Correct Option: D
- Hide questions