0

Computer Aptitude - 12

Description: Computer Aptitude - 5
Number of Questions: 25
Created by:
Tags: Computer Aptitude - 5 Computer Knowledge
Attempted 0/24 Correct 0 Score 0

In a ring topology, the computer in possession of the ______ can trasmit data.

  1. packet

  2. data

  3. access method

  4. token

  5. none of these


Correct Option: D

________ are specially designed computer chips which reside inside other devices, such as your car or your electronic thermostat.

  1. Servers

  2. Embedded computers

  3. Robotic computers

  4. Mainframes

  5. None of these


Correct Option: B

The following are all computing devices, except

  1. notebook computers

  2. cell phones

  3. digital scanners

  4. personal digital assistants

  5. none of these


Correct Option: C

System software is the set of programs that enables your computer's hardware devices and ______ software to work together.

  1. management

  2. processing

  3. utility

  4. application


Correct Option: D

________ viruses are often transmitted by a floppy disk left in the floppy drive.

  1. Trojan horse

  2. Boot sector

  3. Script

  4. Logic bomb

  5. None of these


Correct Option: B

Servers are computers that provide resources to other computers connected to a

  1. mainframe

  2. network

  3. supercomputer

  4. client

  5. none of these


Correct Option: B

URL stands for

  1. Universal Research List

  2. Universal Resource List

  3. Uniform Resource Locator

  4. Uniform Research Locator

  5. None of these


Correct Option: C

______ describe what are database fields.

  1. Structures

  2. Field markers

  3. Field definitions

  4. Field names

  5. None of these


Correct Option: D

Which part of the operating system manages the essential peripherals, such as the keyboard, screen, disk drives, and parallel and serial ports?

  1. Basic input/output system

  2. Secondary input/output system

  3. Peripheral input/output system

  4. Marginal input/output system

  5. None of these


Correct Option: A

________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.

  1. The platform

  2. Application software

  3. Operating system

  4. The motherboard

  5. None of these


Correct Option: C

_____________ are words that a programming language has set aside for its own use.

  1. Control words

  2. Reserved words

  3. Control structures

  4. Reserved keys

  5. None of these


Correct Option: B

Which term identifies a specific computer on the web and the main page of the entire site?

  1. URL

  2. Website address

  3. Hyperlink

  4. Domain name

  5. None of these


Correct Option: A

When data changes in multiple lists and all lists are not updated, this causes

  1. data redundancy

  2. information overload

  3. duplicate data

  4. data inconsistency

  5. none of these


Correct Option: D

For which of the following is a proxy server is used?

  1. To provide security against unauthorised users

  2. To process client requests for web pages

  3. To process client requests for database access

  4. To provide TCP/IP

  5. None of these


Correct Option: B

The code that relational database management systems use to perform their database task is referred to as

  1. QBE

  2. SQL

  3. OLAP

  4. OLTP

  5. None of these


Correct Option: B

You must install a (n) ____________ on a network if you want to share a broadband internet connection.

  1. router

  2. modem

  3. node

  4. cable

  5. none of these


Correct Option: A

The design of the network is called the network

  1. architecture

  2. server

  3. transmission

  4. type

  5. none of these


Correct Option: A

The purpose of the primary key in a database is to

  1. unlock the database

  2. provide a map of the data

  3. uniquely identify a record

  4. establish constraints on database operations

  5. none of these


Correct Option: C

A database management system (DBMS) is a

  1. hardware system used to create, maintain and provide controlled access to a database

  2. hardware system used to create, maintain and provide uncontrolled access to a database

  3. software system used to create, maintain and provide uncontrolled access to a database

  4. software system used to create, maintain and provide controlled access to a database

  5. none of these


Correct Option: D
Explanation:

A database management system (DBMS) is a software system used to create, maintain and provide controlled access to a database.

Chip is a common nickname for a/an

  1. transistor

  2. resistor

  3. integrated circuit

  4. semiconductor

  5. none of these


Correct Option: C

The most frequently used instructions of a computer program are likely to be fetched from

  1. hard disk

  2. cache memory

  3. RAM

  4. registers

  5. None of these


Correct Option: B
Explanation:

Option (2) is correct. 

A _________ contains specific rules and words that express the logical steps of an algorithm.

  1. programming language

  2. syntax

  3. programming structure

  4. logic chart

  5. none of these


Correct Option: A

Granting an outside organisation access to internet web pages is often implemented using a (n)

  1. extranet

  2. intranet

  3. internet

  4. hacker

  5. none of these


Correct Option: A

The ____________ contains data descriptions and defines the name, data type and length of each field in the database.

  1. data dictionary

  2. data table

  3. data record

  4. data field

  5. none of these


Correct Option: A
- Hide questions