0

GK (Computer 1)

Description: Improving Computer GK to Clear Various Competitive Exams
Number of Questions: 25
Created by:
Tags: GK Current Affairs General Knowledge Current Trends Computer Aptitude General Awareness Time and Distance Triangles Number Systems
Attempted 0/25 Correct 0 Score 0

Which of the following is a component of Internet?

  1. Routers to strengthen the attenuated signals

  2. Repeaters to establish physical connection between various LANs

  3. Gateways to allow a network to use the resources of another main frame

  4. Bridges to optimize the transmission path of massages


Correct Option: C

Which of the following makes a network insecure?

  1. Encryption

  2. Network interface card

  3. Static key

  4. None of these


Correct Option: C

Which of the following s not a transmission technology?

  1. Broadcast linking

  2. Narrowcast linking

  3. Point to point linking

  4. None of these


Correct Option: B

Which of the following is IBM' s micro computer?

  1. Mac

  2. Compaq portable

  3. Macintosh

  4. Both (1) and (2)


Correct Option: B
Explanation:

The compaq portable, the first portable compatible computer of IBM.

Firewall is used in PC for

  1. Security

  2. Authentication

  3. Data transmission

  4. None of these


Correct Option: A

Which of the following are mandatory parts of complete PC system?

  1. Hardware and Software

  2. Input and Output

  3. Keyboard and printer

  4. All the above


Correct Option: A

CD ROMs are

  1. Primary storage devices

  2. Optical storage devices

  3. Magnetic storage devices

  4. None of these


Correct Option: A

Which of the following do you think is NOT necessary for computerization system in a bank?

  1. Effective customer system

  2. Effective bank office integration

  3. Focus on manual records

  4. None of these


Correct Option: C

Processing control procedures have

  1. Authorization and authentication of users

  2. Access control for online data

  3. Reporting of before and after images

  4. None of these


Correct Option: D

Client-server computing is used in

  1. Interactive multi-media

  2. Network multi-media

  3. MPEG video

  4. All the above


Correct Option: B

Library management software is for

  1. documenting the changes that are made to a program

  2. controlling the version numbers of the programs

  3. both (1) and (2)

  4. none of these


Correct Option: C

Floppy disks are

  1. Random access memories

  2. Storage devices

  3. Used for transferring data

  4. All of the above


Correct Option: D

Which of the following is NOT a characteristic of a computer?

  1. Intelligence

  2. Speed

  3. Versatility

  4. Automation


Correct Option: A
Explanation:

Correct answer is (1). 

Which of the following is NOT a part of system?

  1. Peripherals

  2. Electric supply

  3. Logical interconnection between peripherals

  4. Common goal


Correct Option: B

The most common input device used today is a(an) ___________.

  1. Motherboard

  2. VDU

  3. Keyboard

  4. IC chip


Correct Option: C

The third generations of computer were in

  1. 1959-1964

  2. 1965-1971

  3. 1971- 1981

  4. None of these


Correct Option: B

Which of the following is true?

  1. If while executing a program the power goes off all the instructions and data in the memory will be lost

  2. A PC/XT uses a 80186 microprocessor whereas a PC/AT uses a 80286 microprocessor

  3. Both

  4. None of these


Correct Option: A

Which of the following is NOT a server based network features?

  1. File server

  2. DNS

  3. Print server

  4. All are server types


Correct Option: D

Collection of tracks on a disk forms ...........

  1. Track

  2. Cylinder

  3. Block

  4. Disk


Correct Option: D

A device that receives data from slow speed devices and transmits it to different locations is called?

  1. Remote Concentrator

  2. Message switcher

  3. Front and processor

  4. Demux


Correct Option: A

The desirable feature(s) of modem is/are

  1. attenuation and amplification

  2. dynamic equalisation

  3. automatic dial-up

  4. All of the above


Correct Option: A

What does the restructuring of existing source code in Reverse Engineering?

  1. Abstraction

  2. Completeness

  3. Directionality

  4. None of these


Correct Option: B

............ is a supercomputer created by networking many small computes.

  1. ASCI white

  2. Grid

  3. LAN

  4. Network super


Correct Option: B

.............. Is used to read choice filled up by a student in common entrance tests

  1. Hand held scanner

  2. Papers

  3. OMR

  4. Pointing devices


Correct Option: C

File transfer is .............

  1. An application program

  2. The function of the Application Layer

  3. A protocol of the Application Layer

  4. A web application


Correct Option: B
- Hide questions