Thursday 25 April 2019

System Unit

Connection point for small specialized electronic parts called chips 1 ) are provided by
A ) sockets
B ) slots
C ) bays
D ) chips
2 ) Which of the following is the highest unit of memory?
A ) Gigabytes.
B ) Bytes.
C ) Megabytes.
D ) Kilobytes.
3 ) ......... type of storage uses pits and lands to represent 1s and 0s.
A ) Cloud
B ) Internet Hard Drives
C ) Optical
D ) Traditional Drives
_____ convert the programming instructions written by programmers into a language that
computers understand and process.
4 )
A ) Utilities
B ) Device Drivers
C ) Language Translators
D ) Mouse
______ ports are a special type of serial port for connecting musical instruments like an electronic
keyboard to a sound card.
5 )
A ) Accelerated Graphics Port
B ) Analog Interface
C ) Musical Instrument Digital Interface (MIDI)
D ) None of these
6 ) _____________ are components of the system board.
A ) Sockets
B ) Slots
C ) Bus lines
…….. are dedicated computers with very large storage capacities that provide users access to fast
storage and retrieval of data.
7 )
A ) Magnetic Tape
B ) Disk Drives
C ) File Apps
D ) File Servers
A chip is a tiny piece of silicon with electronic circuits which is attached to the circuit board inside
the computer.
8 )
A ) TRUE
B ) FALSE
Cache memory is used to store most frequently accessed information 9 ) from the RAM.
A ) TRUE
B ) FALSE
10 ) Capacity of a chip is often expressed in Milligram .
A ) TRUE
B ) FALSE
CMOS chip contains essential information that is required every time the computer system is
turned on.
11 )
A ) TRUE
B ) FALSE
12 ) Data and instructions are represented electronically with a binary, or two-state numbering system.
A ) TRUE
B ) FALSE
13 ) Data stored in Flash RAM does not get erased even when power to the computer is switched off.
A ) TRUE
B ) FALSE
14 ) Data transfer through a serial port is faster than that of a parallel port
A ) TRUE
B ) FALSE
File servers are dedicated computers with very large storage capacities that provide users access
to fast storage and retrieval of data.
15 )
A ) TRUE
B ) FALSE
Following are 16 ) the types of RAM;
A ) DRAM
B ) PrimeRAM
C ) DDR
D ) SDRAM
17 ) Following are the types of RAM; EXCEPT
A ) DRAM
B ) PrimeRAM
C ) DDR
D ) SDRAM
18 ) Graphics coprocessor is also called as Graphics Processing Unit (GPU).
A ) TRUE
B ) FALSE
Graphics Coprocessors chips are specifically designed to handle the processing requirements
related to displaying and manipulating 3-D images.
19 )
A ) TRUE
B ) FALSE
20 ) In a --------, processing power is centralized in one large computer.
A ) terminal network
B ) Client/server network
C ) peer-to-peer network
D ) Organizational Internets
In a microcomputer system, the central processing unit (CPU) or processor is contained on a single
chip called the ---------
21 )
A ) Slot
B ) Port
C ) Microprocessor
D ) None of these
In a microcomputer system, the central processing unit (CPU) or processor is contained on a single
chip called the microprocessor.
22 )
A ) TRUE
B ) FALSE
In parallel port data is transmitted one 23 ) byte after another
A ) TRUE
B ) FALSE
24 ) Numbering system in which all numbers consist of only two digits: 0 and 1 is called as ………….
A ) IST System
B ) Bio System
C ) Data System
D ) Binary System
Numbering system in which all numbers consist of only two digits: 0 and 1 is called as Binary
System.
25 )
A ) TRUE
B ) FALSE
26 ) Numbering system in which all numbers consist of only two digits: 0 and 1 is called as Bio System.
A ) TRUE
B ) FALSE
27 ) Parallel ports are mostly used to connect printers to the system unit.
A ) TRUE
B ) FALSE
28 ) Random Access Memory (RAM) is ____________ type of memory
A ) Permanent.
B ) Temporary.
C ) Flash.
D ) Smart.
29 ) Referring to the given image, identify name of the given image.
A ) RAM
A ) Central Processing Unit
B ) Hard Disk
B ) Motherboard
C ) Printer
C ) CD-ROM
D ) Monitor
D ) None of these
RFID tags are specialty chips embedded in merchandise to track 30 ) their location.
A ) TRUE
B ) FALSE
31 ) Sockets, slots and bus lines are components of the system board.
A ) TRUE
B ) FALSE
Terminal that includes a processing unit, memory, secondary storage, communications software,
and a telephone hook-up or other communication links is known as…
32 )
A ) optical-mark recognition (OMR)
B ) intelligent terminal
The ---- connects all system components and allows input and output devices to communicate with
the system unit.
33 )
A ) System Board
B ) Monitor
C ) Mouse
D ) None of these
The System Board connects all system components and allows input and output devices to
communicate with the system unit.
34 )
A ) TRUE
B ) FALSE
The container that houses most of the electronic components that make up a computer system is
known as the
35 )
A ) Arithmetic-Logic Unit
B ) Primary Storage Unit
C ) Control Unit
D ) System Unit
36 ) The most popular Binary Coding Schemes are
A ) ASCII.
B ) EBCDIC
C ) FTP
D ) Java
The processing speed of a microcomputer is measured in 37 ) following units.
A ) Auqaseconds
B ) Nanosecond
C ) Microsecond
D ) Picosecond
38 ) The processing speed of a microcomputer is measured in following units; EXCEPT
A ) Auqaseconds
B ) Nanosecond
C ) Microsecond
D ) Picosecond
These chips are specifically designed to handle the processing requirements related to displaying
and manipulating 3-D images.
39 )
A ) Graphics Coprocessors
B ) Control Unit Processors
C ) Arithmetic-logic Unit Processors
D ) CISC chips
This device is the communication medium for the entire computer system and placed in the system
unit. Identify this device
40 )
A ) Motherboard
B ) RAM
C ) ROM
D ) None of these
41 ) Warm boot is the process of restarting a computer without turning off the power.
A ) TRUE
B ) FALSE
42 ) You can access all the utilities installed on your computer from ------ menu.
A ) Windows Explorer
B ) System Tools
C ) Remote Desktop Connection
D ) Snipping Tool

System Software

-------------- is a basic text editing program and it is most commonly used to view or 1 ) edit text files.
A ) Calculator
B ) Notepad
C ) Address book
D ) Paint
2 ) ____ are used to control a single desktop or notebook computer.
A ) Network Operating Systems (NOS)
B ) Embedded Operating Systems
C ) Stand-alone Operating Systems
D ) Disk Operating Style
3 ) _____ are used for handheld computers and smaller devices like PDAs.
A ) Network Operating Systems (NOS)
B ) Embedded Operating Systems
C ) Stand-alone Operating Systems
D ) Disk Operating Style
4 ) _____ is the process of restarting a computer without turning off the power.
A ) Cold Boot
B ) First Boot
C ) Restart Boot
D ) Warm Boot
5 ) ______ is a collection of several separate troubleshooting utilities.
A ) Backup
B ) Uninstall
C ) Norton Utilities
D ) All of these
_______ are specialized programs that allow particular input or output devices to communicate with
the rest of the computer system.
6 )
A ) Device Drivers
B ) Utilities
C ) OS
D ) SmartArt
___________ convert the programming instructions written by programmers into a language that
computers understand and process.
7 )
A ) Operating system
B ) Device Drivers
C ) Utilities
D ) Language Translator
…….. program recognizes and corrects computer-related problems before they 8 ) become serious.
A ) Troubleshooting
B ) Testing
C ) Debugging
D ) Uninstall
A cold boot occurs when the computer is already on and you restart it without turning off the
power.
9 )
A ) TRUE
B ) FALSE
10 ) A file created using Notepad is stored with the extension --------------.
A ) .txt
B ) .docx
C ) .png
D ) .jpg
11 ) A program that combines several utilities in one package to improve system performance is ……
A ) WAN
B ) Protocols
C ) Union Suite
D ) Utility Suite
As you type, the text automatically moves to the next line when it reaches the right edge of the
margin. This feature is called “Word Wrap”.
12 )
A ) TRUE
B ) FALSE
Assume that you are working as a Graphics Designer and you have various graphics applications
installed on your computer. Now your C drive is almost full. The disk drives are shown in the given
image. Referring to the above scenario, choosing which one of the following allows you to remove
most of the stuff from your C drive?
13 )
A ) You can defrag your system.
B ) You can delete unwanted files and folders.
C ) You can use Disk Clean-up utility.
D ) All of these
Desktop operating systems control various desktops or notebook 14 ) computers.
A ) TRUE
B ) FALSE
Device Drivers are specialized programs that allow particular input or output devices to
communicate with the rest of the computer system.
15 )
A ) TRUE
B ) FALSE
Disk Defragmenter is used to remove unnecessary files on your hard disk to free up disk space
and help your computer run faster.
16 )
A ) TRUE
B ) FALSE
17 ) Following are three basic categories of operating systems.
A ) Embedded Operating Systems
B ) Network Operating Systems
C ) Spreadsheet Operating Systems
D ) Stand-alone Operating Systems
If you are selecting "Quick Tabs" option, you can see miniature visual view (Thumbnail) of all
your open tabs.
18 )
A ) TRUE
B ) FALSE
If you receive one file through the Internet having Virus, what do you select if you want to remove
virus?
19 )
A ) Disk Cleanup
B ) File Cleanup
C ) Uninstall
D ) Scan using Norton Antivirus
In Paint, you can save your picture in the following 20 ) formats, EXCEPT
A ) BMP
B ) JPEG
C ) GIF
D ) AVI
21 ) In Paint, you can save your picture in the following formats.
A ) PNG
B ) BMP
C ) JPEG
D ) GIF
22 ) In Windows 7 Operating System, you can configure regional languages by using ------ option.
A ) Control Panel --- Region and Language Option
B ) Control Panel --- Additional Options
C ) Control Panel --- Programs
D ) Control Panel --- User Accounts
23 ) In windows operating system -------------- is a power-saving state.
A ) Log Off
B ) Sleep
C ) Restart
D ) Lock
Language Translators convert the programming instructions written by programmers into a
language that computers understand and process.
24 )
A ) TRUE
B ) FALSE
Most icons and toolbar buttons display a “Tool Tip” containing a brief description of the item when
you rest the mouse pointer on it
25 )
A ) True
B ) False
26 ) On the Task bar the time is shown in the...?
A ) Start Menu
B ) Scrollbar
C ) Desktop
D ) Notification area or System Tray
Password is a set of characters used to get access to a computer, network 27 ) resource or data
A ) True
B ) False
Refer the image shown on the screen. In Windows Operating System, you want to reduce the size
of file. To do so, you need to select ------ option from the given image.
28 )
A ) Dropbox
B ) Documents
C ) Compressed (zipped) folder
D ) Skype
Refer the image shown on the screen. In Windows Operating System, you want to reduce the size
of file. To do so, you need to select 'Compressed (zipped) folder' option from the given image.
29 )
A ) TRUE
B ) FALSE
Refer the image shown on the screen. In Windows Operating System, you want to reduce the size
of file. To do so, you need to select 'Dropbox' option from the given image.
30 )
A ) TRUE
B ) FALSE
Referring to the given image, if you type "Flowers" in the search box and clicks on "Search Button",
then the result page shows
31 )
A ) Definition of "Flowers"
B ) "Flower" images only
C ) Definition of Flowers and images
D ) None of these
32 ) Referring to the given image, which menu command do you select to get these options?
A ) Organize --- View
B ) Organize --- Layout
C ) Organize --- Properties
D ) Organize --- Edit
Sumit received a DVD containing some official documents from his Manager. He wants to create
copy of this DVD. Referring to the above requirement identify the name of the peripheral which
Sumit will use?.
33 )
A ) CD Writer
B ) CD ROM
C ) CD R
D ) DVD Writer
Systems software includes all of the 34 ) following except
A ) operating systems
B ) device drivers
C ) utilities
D ) desktop publishing
Task Bar convert the programming instructions written by programmers into a language that
computers understand and process.
35 )
A ) TRUE
B ) FALSE
36 ) The ---- tells the rest of the computer how to carry out a programs instructions.
A ) ALU
B ) System Unit
C ) Control Unit
D ) Motherboard
37 ) The __________ protects your system from hackers.
A ) Firewall
B ) Anti-virus
C ) Backup
D ) Device Drivers
The “System Date” and “System Time” are the date and time as maintained by the computer's
internal clock.
38 )
A ) TRUE
B ) FALSE
39 ) The firewall protects your system from hackers.
A ) TRUE
B ) FALSE
40 ) The set of computer programs that manage the hardware/software of a computer is called ……
A ) Compiler System
B ) Managing System
C ) Operating System
D ) Logical System
Uninstall programs enable removing unneeded programs installed into the computer's 41 ) hard disk.
A ) TRUE
B ) FALSE
42 ) User interact with application programs and computer hardware through a …………..
A ) Compact Disc
B ) User Interface
C ) Compiler
D ) Protocol
43 ) What do we call those small, pictorial representations of objects we see on the desktop?
A ) Desktop Icons
B ) List View
C ) File Menu
D ) Pictures
44 ) What is the best way to protect a computer from viruses?
A ) Never connect your computer to other PC
B ) Install up-to-date virus checking software.
C ) Never connect a computer to the internet.
D ) Install a Photoshop
45 ) Which of the following examples of operating systems?
A ) NetWare
B ) Windows NT Server
C ) Windows 7
D ) Windows Vista
46 ) Which of the following is NOT operating system software?
A ) Windows 7
B ) Windows Vista
C ) Windows ME
D ) Windows FS
You want to take a print out of your document, but after selecting Print command you found that
there is no printer installed on your computer. Referring to the above scenario, how do you install
printer on your computer?
47 )
A ) Control Panel ---- Add a printer
B ) Computer ---- Printers --- Add a printer
C ) Control Panel ---- Printers ---- Add a printer
D ) None of these

Secondary Storage

___ improves hard-disk performance by anticipating 1 ) data needs.
A ) Disk Caching
B ) Disk Defragment
C ) Disk Writing
D ) Disk Formatting
2 ) ____ measures the amount of time required by the storage device to retrieve data and programs.
A ) Media
B ) Capacity
C ) Access Speed
D ) Storage Devices
3 ) ___________ refers to how tightly the bits can be packed next to one another.
A ) Media
B ) Access time
C ) Capacity
D ) Density
A ---- occurs when a read/write head makes contact with the hard disk's surface or with particles
on its surface.
4 )
A ) Media
B ) Capacity
C ) Track
D ) Head Crash
A --------- on a disk is the one of the many circular ring shaped areas where data is written
magnetically.
5 )
A ) Oval
B ) Rectangle
C ) Track
D ) Text Box
A track on a disk is the one of the many circular ring shaped areas where data is written
magnetically.
6 )
A ) TRUE
B ) FALSE
Disk caching, RAID and file compression/ decompression improve hard 7 ) disk performance.
A ) TRUE
B ) FALSE
Like floppy and hard disks, magnetic tape stores data and programs by altering the electromagnetic
charges on a recording surface.
8 )
A ) TRUE
B ) FALSE
9 ) On a hard disk, a _____runs through each track of a stack of platters.
A ) magnetic charge
B ) track
C ) cylinder
D ) sector
Redundant arrays of inexpensive disks (RAID) improve performance by expanding external storage,
improving access speed and providing reliable storage.
10 )
A ) TRUE
B ) FALSE
Refer the image shown on the screen. Which of the following statement about the given image is
true?
11 )
A ) Indicates keyboard entry
B ) Indicates hard disk platter divided into Tracks and Sectors
C ) Shows downloading and uploading data
D ) Shows installation process of operating system
12 ) Referring to the given image, identify type of the device.
A ) Secondary Storage Device
B ) Processing Device
C ) Keyboard Device
D ) None of these
13 ) Tape is described as using this type of access.
A ) Direct
B ) Sequential
C ) DVD
D ) Magneto-optical
The three types 14 ) of hard disks are
A ) Internet hard disk, Hard-disk cartridges And Hard-disk packs
B ) Internal high disk, Hard-disk cartridges And Hard-disk packets
C ) Internet hard disk, Hard-disk cartridges And Hard-disk packets
D ) Internal hard disk, Hard-disk cartridges And Hard-disk packs
15 ) The three types of hard disks are Internal hard disk, Hard-disk cartridges & Hard-disk packs.
A ) TRUE
B ) FALSE
16 ) There are basically 2 types of memory:
A ) Secondary and tertiary
B ) Permanent and temporary
C ) CD and DVD
D ) Primary and Secondary
17 ) This type of storage device has no moving parts.
A ) Hard Disks
B ) Optical Discs
C ) Floppy Disks
D ) Solid State
18 ) Three ways to improve the performance of a hard disk include …….
A ) Disk Caching
B ) Redundant Arrays of Inexpensive Disks (RAID)
C ) Morphing
D ) File Compression/ Decompression
19 ) What is the name given to a part of circle on which data is written in a storage media ?
A ) Track
B ) Sector
C ) Cylinder
D ) Spiral
20 ) Which of the following are characteristics of secondary storage?
A ) Media
B ) Capacity
C ) Access Speed
D ) Storage Devices

Internet, Web and Electronic Commerce

A protocol defines the rules for passing information between two 1 ) or more computers
A ) TRUE
B ) FALSE
2 ) A(n) __________ is a set of rules for sending information and messages over the Internet
A ) protocol
B ) ISP
C ) HTML
D ) applet
___ provides a fast, efficient alternative to traditional mail for sending and receiving electronic
documents.
3 )
A ) E-mail
B ) Topology
C ) e-Shopping
D ) Revolution
4 ) ____ are electronic systems that transmit data from one location to another.
A ) Communication Systems
B ) Communication Software
C ) Computer Systems
D ) Topology
5 ) ____ supports direct, "live" electronic communication between two or more friends or buddies.
A ) Instant Member
B ) Instant Messaging
C ) Internet Mail
D ) Invisible Message
_____ also known as voice grade and low bandwidth which is used for standard telephone
communication.
6 )
A ) Voice band
B ) Voice record
C ) Volume band
D ) Voice Over
______ is a concept related to using computer networks to link people 7 ) and resources.
A ) Data
B ) Information
C ) Linking
D ) Connectivity
8 ) …….….. is the transmission of telephone calls over computer networks.
A ) Voice over IP (VoIP)
B ) Volume over IP (VoIP)
C ) Vide over IP (VoIP)
D ) Vacuum over IP (VoIP)
A Firewall is a security system designed to protect an organization's network against external
threats.
9 )
A ) True
B ) False
10 ) Authority, Accuracy, Objectivity and Currency terms are related to ……..
A ) Application Software s
B ) Operating Systems
C ) Content Evaluation
D ) Accounting Softwares
11 ) B2C, C2C and B2B are types of --------
A ) E-mail
B ) E-commerce
C ) e-cash
D ) ISPs
Bharat Sanchar Nigam Limited (BSNL) and Videsh Sanchar Nigam Limited (VSNL) are most widely
used eLearning web sites.
12 )
A ) TRUE
B ) FALSE
Bharat Sanchar Nigam Limited (BSNL) and Videsh Sanchar Nigam Limited (VSNL) are most widely
used National Service Providers.
13 )
A ) TRUE
B ) FALSE
Communication Systems are electronic systems that transmit data from one location 14 ) to another.
A ) TRUE
B ) FALSE
Company “A” selling the goods to company “B” using Internet. What type of E-commerce they are
doing?
15 )
A ) Customer-to-Customer (C2C)
B ) Business-to-customer (B2C)
C ) Business-to-Business (B2B)
D ) None of these
16 ) Consumer to Consumer (C2C) e-commerce involves individuals selling to individuals.
A ) TRUE
B ) FALSE
17 ) Cyber Patrol, Cybersitter, Net Nanny are all examples of antivirus software.
A ) True
B ) False
18 ) Electronic commerce involving individuals selling to individuals is known as ………...
A ) A2C
B ) B2A
C ) B2B
D ) C2C
Every day, you receive e-mail messages from unknown senders. What is the term for this type of
security threat?
19 )
A ) Phishing
B ) Reading
C ) Spoofing
D ) Spam
20 ) File Compression is the transmission of telephone calls over computer networks.
A ) TRUE
B ) FALSE
21 ) Following are the examples of eCommerce, EXCEPT
A ) An individual purchases a book on the Internet.
B ) A government employee reserves a hotel room over the Internet.
C ) An individual paying his electricity bill through the Internet
D ) Sending an e-mail to your friend
Following are the types 22 ) of Modems except
A ) External
B ) Internal
C ) Wireless
D ) PDA
23 ) Following are three basic categories of Social Networking sites.
A ) Reuniting
B ) Friend-of-a-friend
C ) Netware
D ) Common Interest
24 ) Gtalk is used for the following purpose
A ) To send instant message
B ) To send a file
C ) To buy online items
D ) None of these
25 ) Gtalk is used for the following purpose, EXCEPT
A ) To send instant message
B ) To send a file
C ) To buy online items
If you are having rediffmail account with the name rocky@rediffmail.com and password "rocky".
Now you want to change the password "rocky" to "######". You can change this password with
the help of your System Administrator only.
26 )
A ) TRUE
B ) FALSE
If you are selecting "Quick Tabs" option, you can see all the web pages as shown in the given
image,
27 )
A ) TRUE
B ) FALSE
28 ) Keyword search and Directory search are two search approaches provided by Search Engines.
A ) TRUE
B ) FALSE
PayPal 29 ) offers a form of
A ) spam protection
B ) online stock trading
C ) spider detection
D ) digital cash
30 ) Plug-ins are programs that are automatically started and operate as a part of the browser
A ) TRUE
B ) FALSE
31 ) Primary search and Secondary search are two search approaches provided by Search Engines.
A ) TRUE
B ) FALSE
Process of copying information from your computer to a specially configured FTP server is called
as ……………
32 )
A ) Downloading
B ) Uploading
C ) Deleting
D ) Restoring
Process of copying information from your computer to a specially configured FTP server is called
as uploading.
33 )
A ) TRUE
B ) FALSE
Process of copying information to your computer from a specially configured FTP server is called
as ……………
34 )
A ) Downloading
B ) Uploading
C ) Deleting
D ) Restoring
Process of copying information to your computer from a specially configured FTP server is called
as downloading.
35 )
A ) TRUE
B ) FALSE
Process of copying information to your computer from a specially configured FTP server is known
as restoring.
36 )
A ) TRUE
B ) FALSE
Programs that automatically start and operate as a part of your 37 ) browser are called
A ) plug-ins.
B ) readers.
C ) pop-ups.
D ) ActiveX Controls.
38 ) Refer the image shown on the screen. Identify protocol name from the given URL.
A ) http
B ) www
C ) mkcl
D ) org
Refer the image shown on the screen. Which of the following statements about the given image
are true?
39 )
A ) The first part i.e. mkclsupport is the "user name" and second part i.e. gmail.com is the
"domain name"
B ) The given address is used to remove virus from your computer
C ) The first part i.e. mkclsupport is the "domain name" and second part i.e. gmail.com is the "user
name"
D ) All the options are correct
Refer the image shown on the screen. Which part of the given image defines top-level domain
(TLD)?
40 )
A ) http
B ) www
C ) mkcl
D ) org
Refer the image shown on the screen. You are using Yahoo messenger to chat with your friends.
Referring to the above scenario, you are using …………. activity of the Internet.
41 )
A ) Shopping
B ) Searching
C ) Communication
D ) e-Learning
Refer the image shown on the screen. You want to purchase mobile phone from the given web
page. Referring to the above scenario, you are using .......... activity of the Internet.
42 )
A ) e-blogs
B ) e-learning
C ) e-commerce
D ) e-post
Refer the image shown on the screen. You want to purchase mobile phone from the given web
page. Referring to the above scenario, you are using e-commerce activity of the Internet.
43 )
A ) TRUE
B ) FALSE
The TCP/ IP connects all system components and allows input and output devices to
communicate with the system unit.
44 )
A ) TRUE
B ) FALSE
The globally accepted wireless service for sending messages of up to 160 alphanumeric characters
between mobile subscribers and external systems such as email, paging, and voice mail systems
is popularly known as SMS.
45 )
A ) TRUE
B ) FALSE
The premier business-oriented social networking 46 ) site is …….
A ) Orkut
B ) LinkedIn
C ) Metalink
D ) MySpace
This is a program to block selected Web sites, set time limits, monitor use, and generates reports
on use.
47 )
A ) Center for European Nuclear Research (CERN)
B ) wireless modem
C ) filter
D ) client-server network
This is a type of communication system that uses the Internet to connect two or more people via
telephone.
48 )
A ) scanner
B ) e-mail
C ) facsimile (fax) machine
D ) Internet telephony
This is handheld, book-sized device that display text and graphics. This device is used to view
content downloaded from the web, read online newspapers, magazines and books.
49 )
A ) output
B ) handwriting recognition software
C ) e-book reader
D ) stylus
Using Google search Engine, you can search information in any language other than English
such as Marathi, Hindi etc. also
50 )
A ) TRUE
B ) FALSE
Utilities are programs that are used for retrieving, presenting, and traversing information resources
on the World Wide Web.
51 )
A ) TRUE
B ) FALSE
Voice over IP (VoIP) is the transmission of telephone calls over 52 ) computer networks.
A ) TRUE
B ) FALSE
53 ) Web pages that contain hypertext markup language commands are typically written in Java.
A ) TRUE
B ) FALSE
54 ) What is blog?
A ) Online Music
B ) Intranet
C ) A personal or corporate Google Search
D ) A personal or corporate website in the form of an online journal
55 ) What is PLUGIN?
A ) Content-control software
B ) programs to filter unwanted e-mail messages.
C ) Program that automatically starts and operates as a part of a web browser to fully experience
the content of a web site.
D ) None of these
What is the purpose 56 ) of a firewall?
A ) To provide secure off-site data storage for a computer or network
B ) To provide a computer or network with wireless access to the Internet
C ) To delete temporary Internet files and cookies from a computer or network.
D ) To protect a computer or network against unauthorized intrusion
57 ) What is the purpose of the refresh button in Internet Explorer?
A ) Search for web pages
B ) Remove your favorite websites
C ) Display the home page
D ) Reload the current page
When surfing the Web, the browser interprets the HTML command found in a document file, and
displays it as a(n)
58 )
A ) Web page.
B ) Java page.
C ) Applet page.
D ) domain page
59 ) Which of the following are the examples of eCommerce
A ) An individual purchases a book on the Internet.
B ) A government employee reserves a hotel room over the Internet.
C ) An individual paying his electricity bill through the Internet
D ) An individual paying his Mobile bill through the Internet
60 ) Which of the following network’s strategies are widely used on the Internet.
A ) terminal network
B ) Client/server network
C ) peer-to-peer network
D ) Organizational Internets
61 ) Which of the following terms are related to Content Evaluation?
A ) Authority
B ) Curiosity
C ) Objectivity
D ) Accuracy
Which one of the following option do you use to send your scanned photo to your friend through
the Internet?
62 )
A ) Send as an attachment in e-mail
A ) e-mail
B ) Google Talk
B ) File transfer using Google Talk
C ) Yahoo Messenger
C ) File transfer using Yahoo Messenger
D ) Java
D ) All of these
Wireless service providers provide Internet connections for computers with 63 ) wireless modems.
A ) TRUE
B ) FALSE
You are searching information over the internet and found the page given in the reference image.
Referring to the above scenario, identify the name of Internet Activity?
64 )
A ) Shopping
B ) Communicating
C ) Entertainment
D ) e-learning
You are searching information over the internet and found the page having information about
"Online Learning". Referring to the above scenario, identify the type of web site you are viewing?
65 )
A ) Shopping
B ) Communicating
C ) Entertainment
D ) e-learning
66 ) You can search information using …….
A ) Search Engines
B ) Metasearch Engines
C ) Specialized Search Engines
D ) All of these

Input and Output

…………….. are specialized input and output devices for receiving and sending voice 1 ) communication.
A ) Extranet Aps
B ) Collaborations
C ) Traditional Systems
D ) Internet Telephones
2 ) A Universal Product Code is read by what type of scanner?
A ) OCR
B ) Flatbed
C ) MICR
D ) Bar Code Reader
3 ) Following are three types of Character and Mark Recognition devices; EXCEPT
A ) Magnetic-ink Character Recognition (MICR)
B ) Digital Makeup Recognition (DMR)
C ) Optical Character Recognition (OCR)
D ) Optical Mark Recognition (OMR)
Ink jet printer prints data or images by spraying small droplets of ink at high speed onto the surface
of the paper.
4 )
A ) TRUE
B ) FALSE
Musical Instrument Digital Interface (MIDI) ports provides a wireless mechanism for transferring
data between devices.
5 )
A ) TRUE
B ) FALSE
This type of pointing device has crisscrossed invisible beams of infrared light that are protected
with a clear plastic outer layer.
6 )
A ) Optical Mouse
B ) Pointing Stick
C ) Light Pen
D ) Touch Screen
Three types of Character and Mark Recognition 7 ) devices are ……….
A ) Magnetic-ink Character Recognition (MICR)
B ) Digital Makeup Recognition (DMR)
C ) Optical Character Recognition (OCR)
D ) Optical Mark Recognition (OMR)
Which printer print data or images by spraying small droplets of ink at high speed onto the surface
of the paper?
8 )
A ) Ink jet printer
B ) Laser Printer
C ) Dot matrix printer
D ) Drum printer
You want to copy one file having size 1.50 MB to the Pen Drive. But in your Pen Drive 1.00 MB
free space is available. Referring to the above scenario, identify the name of utility which you can
use?
9 )
A ) Uninstall all the programs
B ) Clean your desktop
C ) Compress your files
D ) Delete your file
You want to record your voice for your marketing presentation. Refereeing to the above scenario,
identify the device you will be using.
10 )
A ) Microphone
B ) Scanner
C ) Speaker
D ) None of these

Important Question

…….. systems enhance organizational security by constantly making backup copies of files moving
across the organization's networks.
1 )
A ) MFD
B ) Analog
C ) ROM
D ) RAID
A protocol defines the rules for passing information between two 2 ) or more computers
A ) TRUE
B ) FALSE
3 ) A(n) __________ is a set of rules for sending information and messages over the Internet
A ) protocol
B ) ISP
C ) HTML
D ) applet
4 ) ___ improves hard-disk performance by anticipating data needs.
A ) Disk Caching
B ) Disk Defragment
C ) Disk Writing
D ) Disk Formatting
5 ) ____ are used to control and coordinate computers that are networked or linked together.
A ) Network Operating Systems (NOS)
B ) Embedded Operating Systems
C ) Stand-alone Operating Systems
D ) Application software
6 ) ____ are used to control a single desktop or notebook computer.
A ) Network Operating Systems (NOS)
B ) Embedded Operating Systems
C ) Stand-alone Operating Systems
D ) Disk Operating Style
____ measures the amount of time required by the storage device to retrieve 7 ) data and programs.
A ) Media
B ) Capacity
C ) Access Speed
D ) Storage Devices
8 ) _____ are used for handheld computers and smaller devices like PDAs.
A ) Network Operating Systems (NOS)
B ) Embedded Operating Systems
C ) Stand-alone Operating Systems
D ) Disk Operating Style
_____ convert the programming instructions written by programmers into a language that
computers understand and process.
9 )
A ) Utilities
B ) Device Drivers
C ) Language Translators
D ) Mouse
10 ) _____ is the process of restarting a computer without turning off the power.
A ) Cold Boot
B ) First Boot
C ) Restart Boot
D ) Warm Boot
______ ports are a special type of serial port for connecting musical instruments like an electronic
keyboard to a sound card.
11 )
A ) Accelerated Graphics Port
B ) Analog Interface
C ) Musical Instrument Digital Interface (MIDI)
D ) None of these
12 ) _______ ports are the standard high-speed networking ports for many of today's computers.
A ) MIDI
B ) Ethernet
C ) Digital
D ) USB
_______ printers are widely 13 ) used with ATMs.
A ) Inkjet
B ) Dot-matrix
C ) Thermal
D ) Laser
_______ search engines focus on subject-specific websites and can save time by narrowing your
search.
14 )
A ) Regular
B ) Specialized
C ) National
D ) International
_______ telephones are specialized input and output devices for receiving and sending voice
communication.
15 )
A ) Network
B ) Internet
C ) MFDs
D ) Analog
16 ) ___________ refers to how tightly the bits can be packed next to one another.
A ) Media
B ) Access time
C ) Capacity
D ) Density
17 ) _____________ are components of the system board.
A ) Sockets
B ) Slots
C ) Bus lines
18 ) …… is a pathway for bits that connects directly to the processor.
A ) Ports
B ) Modem Card
C ) Bus
D ) Digital Card
19 ) ……. indicates the proportional relationship between a display's width and height.
A ) Resolution
B ) Aspect ratio
C ) Dot pitch
D ) Clock speed
……… are appropriate devices to use in an enterprise 20 ) storage system.
A ) Modems
B ) SMPS
C ) File servers
D ) MFDs
……….. devices are specialized high-capacity secondary storage devices designed to store large
amounts of data for an organization.
21 )
A ) Ring topology
B ) Mass storage
C ) Analog
D ) Portable
A --------- on a disk is one of the many circular ring-shaped areas where data is written
magnetically.
22 )
A ) Oval
B ) Rectangle
C ) Track
D ) Text Box
A chip is a tiny piece of silicon with electronic circuits which is attached to the circuit board inside
the computer.
23 )
A ) TRUE
B ) FALSE
24 ) A typical e-mail message has three basic elements: Footer; Margin and Theme.
A ) TRUE
B ) FALSE
25 ) A Universal Product Code is read by what type of scanner?
A ) OCR
B ) Flatbed
C ) MICR
D ) Bar Code Reader
An(n) Internet security suite is a collection of utility programs designed to maintain your security
and privacy while you are on the web.
26 )
A ) TRUE
B ) FALSE
Analog ports are a special type of serial port for connecting musical instruments like an electronic
keyboard to a sound card.
27 )
A ) TRUE
B ) FALSE
Analog systems enhance organizational security by constantly making backup copies of files
moving across the organization's networks.
28 )
A ) TRUE
B ) FALSE
Below are the elements to consider when evaluating the accuracy of information 29 ) on the web ……...:
A ) Authority
B ) Accuracy
C ) Objectivity
D ) Currency
30 ) Cache memory is used to store most frequently accessed information from the RAM.
A ) TRUE
B ) FALSE
31 ) Cloud computing is an example of a social networking site.
A ) TRUE
B ) FALSE
CMOS chip contains essential information that is required every time the computer system is
turned on.
32 )
A ) TRUE
B ) FALSE
Company “A” selling the goods to company “B” using the Internet. What type of e-commerce are
they doing?
33 )
A ) Customer-to-Customer (C2C)
B ) Business-to-customer (B2C)
C ) Business-to-Business (B2B)
D ) None of these
Data and instructions are represented electronically with a binary, or two-state 34 ) numbering system.
A ) TRUE
B ) FALSE
Desktop computers have an(n) _______, located within the system unit, that plugs into a standard
wall outlet, converts AC to DC, and provides the power to drive all of the system unit components.
35 )
A ) USB Drive
B ) DVD Drive
C ) Power Supply Unit
D ) ALU
36 ) Desktop operating systems control various desktops or laptop computers.
A ) TRUE
B ) FALSE
37 ) Disk caching, RAID and file compression/ decompression improve hard disk performance.
A ) TRUE
B ) FALSE
38 ) Every computer system has two basic categories of buses, System buses, and expansion buses.
A ) TRUE
B ) FALSE
39 ) File servers are appropriate devices to use in an enterprise storage system.
A ) TRUE
B ) FALSE
Flash memory cards are credit card–sized solid-state storage devices widely used in portable
devices such as mobile phones and GPS navigation systems.
40 )
A ) TRUE
B ) FALSE
For multicore processors to be used effectively, computers must understand how to divide tasks
into parts that can be distributed across each core—an operation called _______.
41 )
A ) Arithmetic-logic processing
B ) Multiplexer processing
C ) Graphics coprocessing
D ) Parallel processing
Frequently accessed information is 42 ) held in _______.
A ) hard drive
B ) cache memory
C ) flash memory
D ) read only memory
Graphics Coprocessors chips are specifically designed to handle the processing requirements
related to displaying and manipulating 3-D images.
43 )
A ) TRUE
B ) FALSE
If you are having a Gmail account with the name rocky@gmail.com and password "rocky". Now,
you want to change the password "rocky" to "######". You can change this password with the help
of your System Administrator only.
44 )
A ) TRUE
B ) FALSE
In a microcomputer system, the central processing unit (CPU) or processor is contained on a single
chip called the ---------
45 )
A ) Slot
B ) Port
C ) Microprocessor
D ) None of these
In a microcomputer system, the central processing unit (CPU) or processor is contained on a single
chip called the microprocessor.
46 )
A ) TRUE
B ) FALSE
47 ) In a network operating system, this computer coordinates all communication between computers.
A ) Client
B ) Server
C ) Terminal
D ) Mode
48 ) In addition to standard ports, following speciality ports are available,
A ) HDMI
B ) MIDI
C ) Digital
D ) Analog
In most personal computer systems, the CPU is contained on a single chip called 49 ) the _______.
A ) Semiconductor
B ) ALU
C ) Microprocessor
D ) Control Unit
50 ) In windows operating system -------------- is a power-saving state.
A ) Log Off
B ) Sleep
C ) Restart
D ) Lock
International search engines focus on subject-specific websites and can save time by narrowing
your search.
51 )
A ) TRUE
B ) FALSE
Language Translators convert the programming instructions written by programmers into a
language that computers understand and process.
52 )
A ) TRUE
B ) FALSE
53 ) Laptop computers use AC adapters that are typically located outside the system unit.
A ) TRUE
B ) FALSE
Mass storage devices are specialized high-capacity secondary storage devices designed to store
large amounts of data for an organization.
54 )
A ) TRUE
B ) FALSE
MIDI ports are a special type of serial port for connecting musical instruments like an electronic
keyboard to a sound card.
55 )
A ) TRUE
B ) FALSE
Most large organizations store data through a strategy called an(n) _______ to promote the
efficient and safe use of data across the networks within their organizations.
56 )
A ) Data encryption
B ) Ring topology
C ) Enterprise storage system
D ) Entertainment secondary system
Most personal computers allow users to expand their systems by providing these on the system
board.
57 )
A ) Expansion slots
B ) Ports
C ) Sound cards
D ) Network cards
One way to improve the storage capacity of a hard disk 58 ) is to _______.
A ) Format often
B ) Use file compression
C ) Increase memory
D ) Remove all programs
59 ) Parents can use this type of program to block access to selected websites.
A ) Plug-in
B ) FTP
C ) BitTorrent
D ) Filter
Pathways that support communication among the various electronic components on the system
board are called _______.
60 )
A ) Network lines
B ) Logic paths
C ) Bus lines
D ) Gate ways
61 ) Plug-ins are programs that are automatically started and operate as a part of the browser
A ) TRUE
B ) FALSE
Programs that automatically start and operate as a part of your browser are 62 ) called _______.
A ) Readers
B ) Pop-ups
C ) Plug-ins
D ) Videos
RAID systems enhance organizational security by constantly making backup copies of files moving
across the organization's networks.
63 )
A ) TRUE
B ) FALSE
Redundant arrays of inexpensive disks (RAID) improve performance by expanding external storage,
improving access speed and providing reliable storage.
64 )
A ) TRUE
B ) FALSE
65 ) Refer the image shown on the screen. Identify the type of the device.
A ) Secondary Storage Device
B ) Processing Device
C ) Keyboard Device
D ) None of these
Refer the image shown on the screen. if you type "Flowers" in the search box and clicks on
"Search Button", then the result page shows
66 )
A ) Definition of "Flowers"
B ) Flower images only
C ) Definition of Flowers and images
D ) None of these
67 ) RFID tags are specialty chips embedded in merchandise to track their location.
A ) TRUE
B ) FALSE
68 ) Slots provide a connection point for specialized cards or circuit boards.
A ) TRUE
B ) FALSE
69 ) Sockets, slots and bus lines are components of the system board.
A ) TRUE
B ) FALSE
Telephony, also known as Internet telephony, is the VoIP application that uses the Internet rather
than traditional telephone lines to support voice communication.
70 )
A ) TRUE
B ) FALSE
The ---- connects all system components and allows input and output devices to communicate with
the system unit.
71 )
A ) System Board
B ) Monitor
C ) Mouse
D ) None of these
The System Board connects all system components and allows input and output devices to
communicate with the system unit.
72 )
A ) TRUE
B ) FALSE
The ---- tells the rest of the computer how to carry out the instructions 73 ) of a program.
A ) ALU
B ) Graphics Coprocessors
C ) Control Unit
D ) Primary Storage Unit
74 ) The category of operating system used for handheld devices is ……..
A ) Network
B ) Stand-alone
C ) Embedded
D ) Open source
75 ) The firewall protects your system from hackers.
A ) TRUE
B ) FALSE
The globally accepted wireless service for sending messages of up to 160 alphanumeric characters
between mobile subscribers and external systems such as email, paging, and voice mail system
is popularly known as SMS.
76 )
A ) TRUE
B ) FALSE
The number of bits that can travel simultaneously down a bus is known 77 ) as the Bit Wide.
A ) TRUE
B ) FALSE
78 ) The size, or _______, is measured by the diagonal length of a monitor's viewing area.
A ) Resolution
B ) Aspect ratio
C ) Active display area
D ) Dot pitch
79 ) There are three basic categories of an Operating systems, EXCEPT;
A ) Network Operating Systems (NOS)
B ) Embedded Operating Systems
C ) Online Operating Systems
D ) Stand-alone Operating Systems
These chips are specifically designed to handle the processing requirements related to displaying
and manipulating 3-D images.
80 )
A ) Graphics Coprocessors
B ) Control Unit Processors
C ) Arithmetic-logic Unit Processors
D ) CISC chips
These specialty processors are designed to improve specific computing operations such as
displaying 3-D images and encrypting data.
81 )
A ) Smartcards
B ) CPUs
C ) NIC cards
D ) Coprocessors
These types of ports typically provide connections to specialized devices such as camcorders and
storage devices.
82 )
A ) AGP
B ) Serial
C ) Parallel
D ) FireWire
This is a program to block selected websites, set time limits, monitor use, and generates reports
on use.
83 )
A ) Center for European Nuclear Research (CERN)
B ) wireless modem
C ) filter
D ) client-server network
This is a type of communication system that uses the Internet to connect two or more people via
telephone.
84 )
A ) scanner
B ) e-mail
C ) facsimile (fax) machine
D ) Internet telephony
This method of file transfer has been used for decades and is frequently used for uploading
changes to a Website hosted by an Internet service provider.
85 )
A ) SSP
B ) BitTorrent
C ) FTP
D ) Dropbox.com
This operating system is widely used by servers on the web, mainframe computers, and very
powerful personal computers.
86 )
A ) Windows
B ) Mac OS X
C ) Norton
D ) UNIX
This reading device is used in banks to read the numbers on the bottom of checks and deposit
slips.
87 )
A ) MICR
B ) OCR
C ) OMR
D ) UPC
This type of booting occurs when the computer is already on and you restart it without turning off
the power.
88 )
A ) Generic boot
B ) Live boot
C ) Warm boot
D ) Cold boot
Three ways to improve the performance of a hard disk 89 ) include _______.
A ) Disk caching
B ) File compression
C ) Disk caching
D ) RAID
Three ways to improve the
performance of hard disks are ……
90 )
A ) File compression
B ) Redundant Arrays of Inexpensive Disks
C ) File Encryption
D ) Disk Caching
Voice over IP (VoIP) is a set of standards or technologies that support voice and other types of
communication over the Internet.
91 )
A ) TRUE
B ) FALSE
92 ) What is blog?
A ) Online Music
B ) Intranet
C ) A personal or corporate Google Search
D ) A personal or corporate website in the form of an online journal
93 ) What is PLUGIN?
A ) Content-control software
B ) programs to filter unwanted e-mail messages.
C ) Program that automatically starts and operates as a part of a web browser to fully experience
the content of a website.
D ) None of these
94 ) What is the purpose of a firewall?
A ) To provide secure off-site data storage for a computer or network
B ) To provide a computer or network with wireless access to the Internet
C ) To delete temporary Internet files and cookies from a computer or network.
D ) To protect a computer or network against unauthorized intrusion
When evaluating a website's content, whether or not the information is up to date is considered
part of the _______ element.
95 )
A ) Access
B ) Accuracy
C ) Summative
D ) Currency
When you reboot your system, the computer follows start-up instructions stored in this type of
memory.
96 )
A ) DRAM
B ) SDRAM
C ) Cache
D ) Flash
Which input device can be used for marking a multiple 97 ) choice test?
A ) Mouse
B ) Keyboard
C ) Optical Mark Recognition (OMR)
D ) Digital Video Cameras
98 ) Which of the following allows a computer to run two or more operations simultaneously?
A ) Coprocessors
B ) Multiplexing
C ) Multicore chip
D ) Binary system
99 ) Which of the following allows the transmission of telephone calls over computer networks?
A ) Faxing
B ) Cell phones
C ) PDAs
D ) Voice over IP
100 ) Which of the following are characteristics of secondary storage?
A ) Media
B ) Capacity
C ) Access Speed
D ) Storage Devices
Which of the following can be used to connect several devices to the system unit and are widely
used to connect keyboard, mice, printers, storage devices, and a variety of specialty devices?
101 )
A ) SATA
B ) USB port
C ) Parallel port
D ) Firewire bus
Which of the following characteristics about 102 ) RAID is incorrect?
A ) Expanded storage capability
B ) Fast access speed
C ) Highly reliable
D ) One high-capacity hard disk drive
103 ) Which of the following is a function of the control unit?
A ) It provides pathways that support communication among the various electronic components.
B ) It directs the movement of electronic signals between memory and the arithmetic-logic unit.
C ) It performs fundamental math operations like addition
D ) It uses the logic to compare two pieces of data.
104 ) Which of the following offers a combination of the features of RAM and ROM?
A ) Flash Memory
B ) DRAM
C ) DDR
D ) Cache Memory
With this type of memory, large programs are divided into parts and the parts are stored on a
secondary device, usually a hard disk.
105 )
A ) Flash
B ) Cache
C ) Extended
D ) Virtual
You want to build your own professional web page. You will be able to create web pages by using
………… programming language.
106 )
A ) JavaScript
B ) Protocol
C ) Microsoft Access
D ) Domain Code
You want to copy one file having size 1.50 MB to the Pen Drive. But in your Pen Drive 1.00 MB
free space is available. Referring to the above scenario, identify the name of utility which you can
use?
107 )
A ) Uninstall all the programs
B ) Clean your desktop
C ) Compress your files
D ) Delete your file

System Unit

.......... मोठ्या प्रमाणावर स्टोरेजची क्षमता असणारे ववशेष कंप्यूटर आहेत जे वापरकर्तयाांना जलद गतीने
माहहती जतन करण्याची व ती पुन्हा ममळवण्याची सुववधा उपलब्ध करून देतात.
1 )
A ) मॅग्नेहटक टेप
B ) डिस्क ड्राइव्ह्ज
C ) फाईल ॲप्स
D ) फाईल सव्हहहसह
........... पोर्टहस म्हणजे, म्युझिकल कीबोिहसारखी संगीत वाद्ये, एखाद्या साउंि कािहला जोिण्यासाठी
असलेले ववशेष प्रकारचे मसररयल पोटह आहे.
2 )
A ) ऍक्ससलरेट ग्राफफसस पोटह
B ) ऍनालॉग इंटरफेस
C ) म्युक्जकल इन्स्ुमेंट डिक्जटल इंटरफेस (एमआयिीआय)
D ) ्यापैकी कोणतेच नाही.
........... प्रकारचे स्टोरेज १ आझण ० दशहववण्यासाठी वपर्टस (pits) आझण लॅन््स 3 ) (lands) चा वापर करते.
A ) सलाउि
B ) इंटरनेट हािह ड्राइव्ह्ज
C ) ऑक्प्टकल
D ) ट्रॅडिशनल ड्राइव्ह्ज
4 ) ............ हे मसक्स्टम बोिाहच े कााँपोनंर्टस आहेत.
A ) सॉकेर्टस
B ) स्लॉर्टस
C ) बस लाइन्स
____ हा मसस्टीमच्या सवह भागांना / कााँपोनंर्टसना जोितो आझण इनपुट व आऊटपुट डिव्हहायसेसना
मसस्टीम युननटशी कम्युननकेट करणे शसय करतो.
5 )
A ) मसस्टीम बोिह
B ) मॉननटर
C ) माऊस
D ) ्यापैकी कोणतेच नाही.
6 ) _____ मध्ये, प्रोसेमसगं पॉवर ( processing power) एका मोठ्या कं प्यूटरमध्ये कें द्रीत असते.
A ) टममहनल नेटवकह
B ) सलायंट/सव्हहहर नेटवकह
C ) वपअर-टू-वपअर नेटवकह (peer-to-peer network)
D ) ऑगहनायिेशनल इंटरनेर्टस (Organizational Internets)
_______ हे, प्रोग्रामसहनी मलहहलेल्या कंप्यूटरला समजतील व तो प्रोसेस (प्रफिया) करु शकेल अशा
प्रोग्राममंग इन्स्ट्रसशन्सचे रुपांतर करतो.
7 )
A ) युहटमलटीज
B ) डिव्हहाइस ड्रायव्हहसह
C ) लाँग्वेज ट्रान्सलेटसह
D ) माउस
8 ) NULL
A ) ववन्िोज एसस्प्लोरर
B ) मसस्टीम टूल्स
C ) ररमोट िेस्कटॉप कनेसशन
D ) क्स्नवपगं टूल
आर एफ आई िी (RFID) टॅग्ज म्हणजे, र्तयांची जागा कळण्यासाठी मालामध्ये ठेवलेल्या खास अशा चचप्स
असतात.
9 )
A ) बरोबर
B ) चूक
कंप्यूटर मसक्स्टम तयार करण्यासाठी लागणारे बहुतेक इलेसट्रॉननक कााँपोनेंर्टस ज्यात असतात र्तया
कंटेनरला ... असे म्हणतात.
10 )
A ) ऍरेथमेहटक लॉक्जक यूननट
B ) प्रायमरी स्टोअरेज यूननट
C ) कंट्रोल यूननट
D ) मसक्स्टम यूननट
11 ) कॉम्प्युटरची पॉवर बंद के ल्यावरही फ्लॅश रॅम मध्ये साठववलेला िटे ा इरेज होत नाही.
A ) बरोबर
B ) चूक
ग्राफफक कोप्रोसेसर चचप्स ्या त्रीमीतीय (3D) प्रनतमा प्रदमशहत करण्यासाठी व फेरफार करण्यासंबंधीच्या
(मॉननप्युलेट) प्रोसेंमसग ररसवायरमेंर्टस हाताळण्यासाठी खास डििाइन केलेल्या असतात.
12 )
A ) बरोबर
B ) चूक
13 ) ग्राफफसस कोप्रोसेसरला ग्राफफसस प्रोसेमसगं युननट (GPU) देखील म्हटले जाते.
A ) बरोबर
B ) चूक
चचप म्हणजे मसमलकॉनचा इलेसट्रॉननक सफकहर्टस असलेला एक छोटासा तुकिा असून तो कंप्यूटर मधील
सफकहट बोिहला जोिलेला असतो.
14 )
A ) बरोबर
B ) चूक
चचप्सची क्षमता (कपॅमसटी) ही बरेचदा मममलग्राम 15 ) मध्ये व्हयसत के ली जाते.
A ) बरोबर
B ) चूक
ज्या अंकप्रणालीच्या सवह संखयांमध्ये ० आझण १ असे फसत दोनच अंक असतात अशा अंकप्रणालीला
............ म्हणतात.
16 )
A ) आयएसटी मसस्टीम
B ) बायो मसस्टीम
C ) िेटा मसस्टीम
D ) बायनरी मसस्टीम
ज्या अंकप्रणालीच्या सवह संखयांमध्ये ० आझण १ असे फसत दोनच अंक असतात अशा अंकप्रणालीला
बायनरी अंकप्रणाली म्हणतात.
17 )
A ) बरोबर
B ) चूक
ज्या अंकप्रणालीच्या सवह संखयांमध्ये ० आझण १ असे फसत दोनच अंक असतात अशा अंकप्रणालीला बायो
मसस्टीम (Bio System) म्हणतात.
18 )
A ) बरोबर
B ) चूक
टममहनल ज्यामध्ये एक प्रोसेमसंग यूननट, मेमरी, सेकंिरी स्टोरेज, कम्युननकेशन सॉफ्टवेअर आझण एक
टेलीफोन हुक-अप तसेच इतर कम्युननकेशन मलंसस समाववष्ट आहेत, र्तयाला ---- असे म्हणतात.
19 )
A ) ऑक्प्टकल माकह रेकक्ग्नशन (ओएमआर)
B ) इंहटमलजंट टममहनल
20 ) हदलेल्या प्रनतमेच्या/इमेजच्या संदभाहत, हदलेल्या प्रनतमेच े नाव ओळखा
A ) रॅम
A ) सेंट्रल प्रोसेमसंग युननट
B ) हािह डिस्क
B ) मदरबोिह
C ) वप्रटं र
C ) सीिी रॉम
D ) मॉननटर
D ) ्यापैकी कोणतेही नाही
पुढील हदलेल्यांपैकी 21 ) मेमरीच े सवोच्च एकक कोणते?
A ) चगगाबाईटस
B ) बाईर्टस
C ) मेगाबाईटस
D ) फकलोबाईटस
22 ) पुढील रॅम (RAM) च े प्रकार आहेत
A ) िीआरएएम (DRAM)
B ) प्राइम रॅम
C ) िीिीआर (DDR)
D ) एसिीरॅम (SDRAM)
23 ) पुढील रॅम (RAM) च े प्रकार आहेत; …... मशवाय
A ) िीआरएएम (DRAM)
B ) प्राइम रॅम
C ) िीिीआर (DDR)
D ) एसिीरॅम (SDRAM)
24 ) पॅरॅलल पोटहपेक्षा मसररयल पोटहमधून िटे ा अचधक जलद पाठववला जातो.
A ) बरोबर
B ) चूक
25 ) पॅरॅलल पोटहमध्ये िटे ा हा एका बाईटनंतर दसु रा असा पाठववला जातो.
A ) बरोबर
B ) चूक
26 ) पॅरॅलल पोटहस हे मसस्टीम युननटशी वप्रटं सह जोिण्यासाठी अचधकतर वापरले जातात
A ) बरोबर
B ) चूक
फाइल सव्हहहर मोठ्या प्रमाणावर स्टोरेजची क्षमता असणारे ववशेष कंप्यूटर आहेत जे वापरकर्तयाांना माहहतीचे
जलद गतीने संकलन (Store) करण्याची व ती पुन्हा ममळवण्याची सुववधा उपलब्ध करून देतात.
27 )
A ) बरोबर
B ) चूक
28 ) बायनरी फकं वा टू स्टेट नंबररगं मसस्टीमन े िटे ा व सूचना इलेसट्रॉननक ररतीन े दाखववल्या जातात.
A ) बरोबर
B ) चूक
मायिोकंप्यूटरचा 29 ) प्रोसेमसगं स्पीि हा एककामं ध्ये (Units) मोजला जातो.
A ) ॲसवासेकंद्स (Auqaseconds)
B ) नॅनोसेकंद (Nanosecond)
C ) मायिोसेकंद (Microsecond)
D ) वपकोसेकंद (Picosecond)
30 ) मायिोकं प्यूटरचा प्रोसेमसगं स्पीि हा एककामं ध्ये (Units) मोजला जातो.; या व्हयनतररसत
A ) ॲसवासेकंद्स (Auqaseconds)
B ) नॅनोसेकंद (Nanosecond)
C ) मायिोसेकंद (Microsecond)
D ) वपकोसेकंद (Picosecond)
मायिोकॉम्प्युटर मसस्टीम मध्ये, सेंट्रल प्रोसेमसंग युननट (सीपीयु) हे मायिोप्रोसेसर नावाच्या एकाच
चचपमध्ये असते
31 )
A ) बरोबर
B ) चूक
32 ) मायिोकॉम्प्युटर मसस्टीम मध्ये, सेंट्रल प्रोसेमसगं युननट हे ..... नावाच्या एकाच चचपमध्ये असत.े
A ) स्लॉट
B ) पोटह
C ) मायिोप्रोसेसर
D ) ्यापैकी कोणतेच नाही.
33 ) राँिम एससेस मेमरी (रॅम) ही ....... प्रकारची मेमरी आहे.
A ) पमहनंट(कायम)
B ) टेंपररी(तार्तपुरती)
C ) फ्लॅश
D ) स्माटह
34 ) रॅम मधून सवाहत वारंवार एससेस के लेली माहहती साठववण्यासाठी कॅ श मेमरीचा उपयोग के ला जातो.
A ) बरोबर
B ) चूक
35 ) वॉम ह बूट ही ववद्युत पुरवठा बंद न करता कं प्यूटर पुन्हा सुरू करण्याची प्रफिया आहे.
A ) बरोबर
B ) चूक
36 ) सवाहत लोकवप्रय असलेल्या बायनरी कोडिगं क्स्कम्स पुढील प्रमाणे आहेत.
A ) एससीआयआय
B ) ईबीसीिीआयसी
C ) एफटीपी
D ) जावा
मसस्टीम बोिह हा मसस्टीमच्या सवह भागांना / कााँपोनंर्टसना जोितो व इनपुट व आऊटपुट डिव्हहायसेसना
मसस्टीम युननटशी कम्युननकेट करणे शसय करतो.
37 )
A ) बरोबर
B ) चूक
सी मॉस (CMOS) चचपमध्ये, प्रर्तयेकवेळी कंप्यूटर मसक्स्टम ऑन केल्यावर आवश्यक असलेली अर्तयावश्यक
इन्फरमेशन असते.
38 )
A ) बरोबर
B ) चूक
सॉकेर्टस, स्लॉर्टस व बसलाईन्स हे मसस्टीम 39 ) बोिचह े कााँपोनंर्टस असतात.
A ) बरोबर
B ) चूक
हा िीव्हहाईस सवह कंप्यूटर मसक्स्टम चे कम्युननकेशन मीडियम आहे आझण जो मसक्स्टम यूननट च्या आत
असतो. ्या िीव्हहाईस ला ओळखा.
40 )
A ) मदर बोिह
B ) रॅम
C ) रॉम
D ) ्यापैकी एकही नाही
्या चचप्स, त्रीमीतीय प्रनतमांना (3D इमेजेस) प्रदमशहत करणे व कुशलतेने हाताळणे ्या संबंधी असलेल्या
प्रफियांच्या आवश्यकता हाताळण्यासाठी ववशेषर्तवाने डििाईन केलेल्या असतात.
41 )
A ) ग्राफफसस कोप्रोसेससह
B ) कंट्रोल यूननट प्रोसेससह
C ) ऍरेथमेहटक-लॉक्जक यूननट प्रोसेससह
D ) सीआयएससी चचप्स
्यांच्या द्वारे चचप्स ्या नावान े ओळखल्या जाणाऱ्या खास अशा इलेसट्रॉननक पार्टहससाठी जोिण बबदं ु
(कनेसटींग पॉईंर्टस) उपलब्ध केले जातात
42 )
A ) सॉकेर्टस
B ) स्लॉर्टस
C ) बेज
D ) चचप्स