Computer Knowledge Important Mock Test – 3 For APPSC & TSPSC All Competitive Exams Special

Computer Knowledge Important Mock Test – 3 For APPSC & TSPSC All Competitive Exams Special

1. —– Controls access to the resources on a network
a) Server
b) Client
c) Both (a) and (b)
d) None of the above

Answer : A

2. The wider the bus, the —- the transfer of data
a) Greater the number of transfer steps required and the slower
b) Greater the number of transfer steps required and the faster
c) Fewer the number of transfer steps required and the slower
d) Fewer the number of transfer steps required and the faster

Answer : D

3. A micro second is — of a second
a) One-trillionth
b) One-millionth
c) One-billionth
d) None of the above

Answer : B

4. The —- format works best for images that have only a few distinct colors
a) GIF
b) MPEG
c) JPEG
d) Both (b) and (c)

Answer : A

5. Some large businesses use —- to open communications among employees, customers, and/or vendors
a) Blog
b) Mails
c) LAN Network
d) None of the above

Answer : A

6. When the computers power is turned off —- memory does not lose its contents
a) Volatile
b) Non-volatile
c) Cache memory
d) Flash memory

Answer : B

7. — Is needed to access accounts, to pay the bills, to transfer money from one account to another account
a) On-line Banking facility
b) Good relations with customers
c) Both (a) and (b)
d) None of the above

Answer : A

8. Which of the following is used as storage locations both the ALU and in the control sections of a computer?
a) Accumulator
b) Register
c) Adder
d) Decoder

Answer : B

9. Accumulator is a
a) Hardwired unit
b) Sequential circuit
c) Finite state machine
d) Register

Answer : D

10. Which memory is non-volatile and may be written only once
a) RAM
b) EPROM
c) EEPROM
d) PROM

Answer : D

11. The communication mode that supports data in both directions
a) Simplex
b) Half-duplex
c) Full-duplex
d) None of the above

Answer : C

12. To connect a computer with a device in the same room, you might be likely to use
a) Coaxial cable
b) Optical fiber
c) Wireless
d) None of the above

Answer : A

13. A table consists of
a) Fields and columns
b) Rows and columns
c) Rows and cells
d) None of the above

Answer : B

14. Which of the following is an advantage of the database approach
a) Elimination of data redundancy
b) Ability to associate related data
c) Increase security
d) All of the above

Answer : D

15. When the same data field is stored more than once in a file, then it leads to
a) Data redundancy
b) Data inconsistency
c) Both (a) and (b)
d) None of the above

Answer : A

16. —-Means database updating
a) Changing the file structure
b) Re-organizing the database
c) Modifying or adding records
d) All of the above

Answer : D

17. Which of the following is the descending order of data hierarchy
a) File-Database-Field-Record-Byte-Bit
b) Database-File-Record-Field-Byte-Bit
c) Database-Record-File-Field-Byte-Bit
d) Database-Field-File-Record-Bit-Byte

Answer : B

18. Which of the following groups contains graphical file extensions
a) JPG, CPX, GCM
b) GIF, TCF, WMF
c) TCP, JPG, BMP
d) JPG, GIF, BMP

Answer : D

19. A package, which can be used for a short period before purchasing, it is
termed as
a) Try and Buy
b) Freeware
c) Shareware
d) Borrow ware

Answer : C

20. Which one of the following is the main function of a driver file?
a) Useful to open windows
b) Enables a specific device to work
c) To re-start the system
d) To activate the system

Answer : B

21. A proxy server is used as the computer
a) With external access
b) Acting as a backup
c) Performing file handling
d) Access user permissions

Answer : A

22. —- Prevents external access to a system
a) Gateway
b) Firewall
c) Router
d) Switcher

Answer : B

23. A list of rules for transferring data over a network is called
a) Protocol
b) Program code
c) Rules
d) Flowchart

Answer : A

24. Which of the following is a valid e-mail address
a) [email protected]
b) @Gmailsakshi.authors.com
c) Both (a) and (b)
d) None of the above

Answer : A

25. Which of the following is not a network topology
a) Star
b) Bus
c) Linear
d) Ring

Answer : C

26. —- Types of virus that stays permanently in the RAM memory
a) Resident
b) File infectors
c) Boot virus
d) Macro virus

Answer : A

27. —- Is the Virus that overwrites the files or a few parts being replaced
a) Resident
b) File infectors
c) Boot virus
d) Macro virus

Answer : B

28. In 1983, this person was the first to offer a definition of the term
‘computer viruses
a) MC Fee
b) Smiths
c) Cohen
d) Norton

Answer : C

29. If you see a small red triangle in the top right corner of a cell, it means
there is something attached to the call. What is it
a) A comment
b) An attachment
c) An error
d) None of the above

Answer : A

30. Which function would be the best to use to calculate the payout value of
a term deposit?
a) FV
b) NPV
c) IRR
d) PV

Answer : A

31. Sigma button is used for
a) Totaling a Column or row
b) It is a mathematical function
c) Subtracting
d) None of the above

Answer : A

32. What is the correct syntax for typing a function into a cell?
a) Equal sign, Function Name, Matching brackets
b) Function Name, Equal sign, Matching brackets
c) Equal sign, Matching brackets, Function Name
d) None of the above

Answer : A

33. What does ‘ctrl +esc’ do if I am at the desktop?
a) Shows the start menu
b) Shows the format menu
c) Shows the tools menu
d) Shows the insert menu

Answer : A

34. In most Microsoft programs, what does ‘alt+f4’ do
a) Ends the program
b) Opens the program
c) Run the program
d) Modify the program

Answer : A

35. In MS-Word ‘alt+shift+d’ does what
a) Automatically inserts the date
b) Inserts the time
c) Inserts the day
d) None of the above

Answer : A

36. —- Deletes an item immediately without placing it in the recycle bin
a) Shift +enter
b) Shift +delete
c) Shift +right arrow
d) Shift +left arrow

Answer : B

37. — Function key refreshes the current window
a) F5
b) F6
c) F7
d) F8

Answer : A

38. To minimize all open windows and display the desktop
a) Windows logo +D
b) Windows logo + E
c) Windows logo + F
d) Windows logo + G

Answer : A

39. —- Toggles CAPSLOCK On and Off
a) Windows logo + S
b) Windows logo + Q
c) Windows logo + R
d) Windows logo + T

Answer : A

40. —– Opens mouse properties dialog box
a) Windows logo + J
b) Windows logo + I
c) Windows logo + K
d) Windows logo + L

Answer : B

41. —- To undo minimize all
a) Shift + Windows logo + N
b) Shift + Windows logo + O
c) Shift + Windows logo + M
d) Shift + Windows logo + P

Answer : C

42. Using find command in word, we can also search
a) Characters
b) Formats
c) Symbols
d) All of the above

Answer : D

43. Which menu in the MS-word can be used to change character size and
typeface?
a) View
b) Tools
c) Format
d) Data

Answer : C

44. Which key should be pressed to start a new paragraph in MS-Word?
a) Down cursor key
b) Enter key
c) Shift+ enter
d) Ctrl+ enter

Answer : B

45. FTP is a —–
a) Used to send e-mails
b) Uses telephone lines
c) Is part of Netscape
d) Is a protocol for the transfer of files between computers

Answer : D

46. .BMP is a extension for
a) BIT Map image
b) Picture file
c) Java Script file
d) Plain text file

Answer : A

47. .PCT is the extension for
a) BIT Map image
b) Picture file
c) Java Script file
d) Plain text file

Answer : B

48. .JSP is the extension for
a) BIT Map image
b) Picture file
c) Java Script file
d) Plain text file

Answer : C

49. .TXT is the extension for
a) BIT Map image
b) Picture file
c) Java Script file
d) Plain text file

Answer : D

50. .PPS is the extension for
a) BIT Map image
b) Picture file
c) Power point slide show
d) Plain text file

Answer : C

Leave a Reply

Your email address will not be published. Required fields are marked *