0

Computer Awareness

Description: Covers fundamental aspects of computer knowledge and information technology
Number of Questions: 15
Created by:
Tags: Computer GK Computer Hardware Computer Basics Database Management System Computer Network Network Security and Firewall
Attempted 0/15 Correct 0 Score 0

Which of the following protocols is a stateless protocol?

  1. TELNET

  2. FTP

  3. TCP

  4. HTTP

  5. None of these


Correct Option: D
Explanation:

In networks, stateless protocol treats each request and response as an independent event. HTTP is used to communicate between client and server, where each request and response is treated as an independent event. Hence, it is stateless.

Which of the following languages is used for managing and retrieving data in Relational database management system (RDBMS)?

  1. Sql

  2. Perl

  3. Python

  4. JavaScript

  5. None of the above


Correct Option: A
Explanation:

Sql means structured query language generally used for managing data in RDBMS. 

___________ is the software that establishes a barrier between trusted network and untrusted network, and is generally used as a network security tool.

  1. Firefox

  2. Firewall

  3. Switch

  4. Router

  5. None of the above


Correct Option: B
Explanation:

Firewall acts as a barrier between a trusted network & untrusted network through which we can prevent unauthorized access into the trusted network. Every system has its own firewall which prevents unauthorized access of other users into our system.This option is correct.

Which of the following is the standard connector for network cables used with Ethernet cables in a network?

  1. RJ45

  2. RJ11

  3. RJ22

  4. RJ32

  5. None of the above


Correct Option: A
Explanation:

RJ45 is the standard connector used now-a-days for network cables in a network. It is also called as registered jack 45. This option is true.

Which of the following computer languages is considered as the earliest programming language in the history of computers?

  1. LISP

  2. COBOL

  3. FORTRAN

  4. PASCAL

  5. SNOBOL


Correct Option: C
Explanation:

FORTRAN is considered as the earliest programming language.

By default, what is the port number used by http?

  1. 80

  2. 443

  3. 81

  4. 440

  5. None of the above


Correct Option: A
Explanation:

Port number 80 is the default port used by http. Port numbers are generally used identify senders and receivers of messages.

This option is correct.

Which of the following is an inbuilt Windows application or software used as a simple text editor and creates files with text extension?

  1. Notes

  2. Textpad

  3. Notes++

  4. Notepad

  5. None of the above


Correct Option: D
Explanation:

Notepad is a simple text editor software in Windows generally used to create text files in Windows. This option is correct.  

There are four files F1, F2, F3, F4 and corresponding file size is given below:

|File name|File size|

|---|---| |F1|1 Peta byte (PB)| |F2|1 Tera byte (TB)| |F3|1 Kilo byte (KB)| |F4|1 Zetta byte (ZB)|

Which of the following options provides increasing order of files with respect to memory sizes?

  1. F3, F1, F2, F4

  2. F3, F2, F1, F4

  3. F3, F2, F4, F1

  4. F3, F4, F1, F2

  5. None of these


Correct Option: B
Explanation:

1 ZB = 1021 bytes 1 PB = 1015 bytes 1 TB = 1012 bytes 1 KB = 103 bytes

Now, increasing memory sizes of files will be F3 < F2.  This matches with option sequence, hence, this option is correct. 

Which of the following is an electronic document issued by the Certificate Authority (CA), generally used for authentication and verification of a website?

  1. Http cookie

  2. One Time Password (OTP)

  3. Digital certificate

  4. Message Authentication Code (MAC)

  5. None of the above


Correct Option: C
Explanation:

This also called as public key certificate issued by Certificate Authority (CA) and is an electronic document which authenticates and verifies a website, etc. is not malicious or not fake.

This option is true.

Which of the following is the expanded form of PDF?

  1. Portable Disk Format

  2. Portable Disk File

  3. Paper Document Format

  4. Portable Document Format

  5. None of these


Correct Option: D
Explanation:

PDF stands for Portable Document Format.

Which of the following allows the sender of an e-mail to hide e-mail address of any recipient from other recipients when a user sends an e-mail to multiple recipients?

  1. Bcc

  2. Cc

  3. To

  4. Priority

  5. None of these


Correct Option: A
Explanation:

It is correct.

Which of the following features in a web browser enables to store a URL and can be used for future retrievals when required by the user?

  1. Plugin or extension

  2. Bookmarks or Favourites

  3. Download folder

  4. Filters

  5. None of these


Correct Option: B
Explanation:

Bookmarks (in FireFox & Chrome etc) and Favourites ( in IE) are used to store particular URL and can be used for future use when required by the user. Hence, it is correct.

Which of the following is a small piece of data sent from a web server of a website to a user's web browser when the user is browsing the website?

  1. e-mail

  2. http cookie

  3. html

  4. proxy

  5. None of these


Correct Option: B
Explanation:

The http cookie or web cookie or browser cookie means the same. These are sent from web server of the website to users's browser and are stored in the user's browser. These help in tracking user's previous browsing info and sessions, etc. This is the correct answer.

Which of the following person is responsible for maintaining, installing and upgrading several key operations on the database system of an organisation?

  1. Database Administrator (DBA)

  2. Business Analyst

  3. Chief Executive Officer (CEO) of the organisation

  4. Software Developer

  5. None of these


Correct Option: A
Explanation:

DBA is responsible for entire management of Databases in an organisation.

A/An _________ is the graphical or diagrammatical representation of flow of steps involved in solving a problem or program logic sequence.

  1. flowchart

  2. algorithm

  3. thread

  4. process

  5. None of these


Correct Option: A
Explanation:

Flowcharts are used for pictorial representation of different kinds of diagrams that help us to understand the flow of solving a problem or program logic sequence. Hence, this option is correct.  

- Hide questions