0

Computer Aptitude - 10

Description: Computer Aptitude - 3
Number of Questions: 25
Created by:
Tags: Computer Aptitude - 3 Computer Knowledge Vocabulary Improvement based on Words in a Sentence Synonyms
Attempted 0/25 Correct 0 Score 0

Information travels between components on the motherboard through

  1. flash memory

  2. CMOS

  3. bays

  4. buses

  5. peripherals


Correct Option: D

Where is the document temporarily stored in a computer?

  1. RAM

  2. ROM

  3. CPU

  4. Flash memory

  5. CD-ROM


Correct Option: A
Explanation:

 Option (1) is correct.

The blinking symbol on the computer screen is called the

  1. mouse

  2. logo

  3. hand

  4. palm

  5. cursor


Correct Option: E

One megabyte equals approximately

  1. 1000 bits

  2. 1000 bytes

  3. 1 million bytes

  4. 1 million bits

  5. 2,000 bytes


Correct Option: C
Explanation:

1 megabyte (MB) = 1024 kilobytes 1 kilobyte (KB) = 1024 bytes So, 1 MB = 1024 * 1024 bytes = 1048576 bytes Which is approximately equal to 1 million bytes.

When cutting and pasting, the item cut is temporarily stored in the

  1. ROM

  2. hard drive

  3. diskette

  4. clipboard

  5. dashboard


Correct Option: D
Explanation:

When cutting and pasting, the item cut is temporarily stored in the clipboard.

Which error detection method uses one's complement arithmetic?

  1. Simply parity check

  2. Checksum

  3. Two-dimensional parity check

  4. CRC

  5. None of these


Correct Option: B

An applet

  1. is an interpreted program that runs on the client

  2. tracks the number of visitors to a website

  3. is a compiled program that usually runs on the client

  4. collects data from visitors to a website

  5. none of these


Correct Option: C

Magnetic tape is not practical for applications where data must be quickly recalled because tape is

  1. a random-access medium

  2. a sequential-access medium

  3. a read-only medium

  4. fragile and easily damaged

  5. an expensive storage medium


Correct Option: B

Which of the following does not describe a data warehouse?

  1. Subject oriented

  2. Integrated

  3. Time variant

  4. Updateable

  5. None of these


Correct Option: D

A _____ sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

  1. system virus

  2. Trojan horse virus

  3. file virus

  4. macro virus

  5. None of these


Correct Option: B

Which layer of OSI Model is the network interface card of LAN related to?

  1. Transport

  2. Network

  3. Data Link

  4. Physical

  5. All of these


Correct Option: E

The total set of interlinked hypertext documents worldwide is

  1. HTTP

  2. Browser

  3. WWW

  4. B2B

  5. None of these


Correct Option: C
Explanation:

 The total set of interlinked hypertext documents worldwide is WWW.

A computer virus can not lead to _____.

  1. disk crash

  2. motherboard crash

  3. corruption of program

  4. deletion of files

  5. None of these


Correct Option: B

Which of the following is true?

  1. Logical design is software dependent.

  2. In a distributed database, database is stored in one physical location.

  3. Conceptual design translates the logical design into internal model.

  4. Logical design is software independent.

  5. None of these


Correct Option: A

A range check

  1. ensures that only the correct data type is entered into a field

  2. verifies that all required data is present

  3. determines whether a number is within a specified limit

  4. tests if the data in two or more associated fields is logical

  5. none of these


Correct Option: C

With the object oriented (OO) approach, an object encapsulates, or _____ a programmer.

  1. carries out, the details of an object for

  2. hides, the details of an object from

  3. reveals, the details of an object to

  4. extends, the details of an object beyond

  5. none of these


Correct Option: B

The ______ converts digital signals to analog signals for the purpose of transmitting data over telephone lines.

  1. modem

  2. router

  3. gateway

  4. bridge

  5. All of the above


Correct Option: A

Every computer connected to intranet or extranet must have a distinct

  1. Firewall

  2. Proxy server

  3. IP address

  4. Domain name

  5. None of these


Correct Option: C
Explanation:

Option (3) is correct. 

Before a package can be used in a java program it must be

  1. executed

  2. referenced

  3. imported

  4. declared

  5. none of these


Correct Option: C

Programming language built into user programs such as Word and Excel are known as

  1. 4GLs

  2. macro languages

  3. object oriented languages

  4. visual programming languages

  5. none of these


Correct Option: D
Explanation:

 Programming language built into user programs such as Word and Excel are known as visual programming languages.

Firewalls are used to protect against

  1. unauthorised attacks

  2. virus attacks

  3. data driven attacks

  4. fire attacks

  5. all of these


Correct Option: A

Choose the correct way to indicate that a line in a C++ program is a comment line, that is, a line the will not be executed as an instruction

  1. begin the line with a # sign

  2. begin the line with double slashes (/ /)

  3. begin and end the line with double hyphens (-_-)

  4. indent the line

  5. none of these


Correct Option: B

Three SQL, DDL, CREATE commands are

  1. Schema, Base and Table

  2. Base, Table and Schema

  3. Key, Base and Table

  4. Schema, Table and View

  5. None of these


Correct Option: D

This is a standard way for a Web server to pass a Web user's request to an application program and to receive data back to forward to the user

  1. interrupt request

  2. forward DNS lookup

  3. data link layer

  4. file transfer protocol

  5. common gateway interface


Correct Option: E

Data are ________ in client/server computing.

  1. never sent to the client machine

  2. sent in very large sections to save processing time

  3. sent only upon the client's request

  4. sent in complete copies for the client to filter and sort

  5. sent from the client to the server for processing


Correct Option: C
- Hide questions