Wednesday, 22 March 2017



Q1. A _________ is a component of motherboard which absorbs the heat produced by the processor and other components of a computer.  
(a) Heat sink 
(b) Northbridge 
(c) CPU socket 
(d) CMOS battery 
(e) None of these 

Q2. What acts as master software that works as a mediator between a computer user and hardware of a computer?  
(a) Application Program 
(b) Hardware 
(c) Software 
(d) Operating System 
(e) User  

Q3. An input device that utillses a light-sensitive detector to select objects on a display screen is known as _________.   
(a) Optical scanner 
(b) Touch screen 
(c) Light Pen 
(d) Mouse 
(e) Keyboard 

Q4. Which of the following cable types is called cheapernet? 
(a) Thicknet 
(b) UTP
(c) SMF
(d) Thinnet 
(e) STP

Q5. 10BaseT uses _________ cables to connect network devices.   
(a) twisted-pair  
(b) coaxial 
(c) multi-mode fiber optic 
(d) single-mode fiber optic 
(e) All of these 

Q6. Which of the following is not an advantage to wireless networking? 
(a) Mobility 
(b) Installation 
(c) Cost effectiveness 
(d) Security 
(e) Options (b) and (c) 

Q7. The ______ button on the Quick Access Toolbar allows you to cancel your recent commands or activities. 
(a) Search 
(b) Cut  
(c) Undo 
(d) Redo 
(e) Shift

Q8. Which among the following is the system root folder for Microsoft Windows by default?
(a) Windows Manager
(b) C:/Windows 
(c) Task Manager
(d) Cmd
(e) Homegroup

Q9.The process of connecting/ accessing to an account is called as:
(a) Login 
(b) Logout 
(c) Sign up
(d) Sign Out 
(e) None of these 

Q10. The first computers were programmed using which of the following language.
(a) Assembly language 
(b) Machine language 
(c) Source code 
(d) Object code 
(e) None of the above

Q11. Which one of the following is a set of one or more attributes taken collectively to uniquely identify a record? 
(a) Candidate key 
(b) Sub key 
(c) Super key 
(d) Foreign key 
(e) None of these 

Q12. In the relational model, a cardinality is termed as  __________.
(a) Number of tuples 
(b) Number of attributes 
(c) Number of tables 
(d) Number of constraints 
(e) None of the above 

Q13. Which of the following can be used to protect sensitive data from prying eyes?
(a) Cascading
(b) Passwords
(c) File locks
(d) File permissions
(e) None of these

Q14. The two ways to arrange multiple windows on the desktop are:
(a) cascade and tile
(b) drag and drop
(c) point and click
(d) minimize and maximize
(e) copy and paste

Q15. When a command is not available for selection until certain other conditions are met, it is called a(n):
(a) Dimmed command
(b) Unavailable command
(c) Dialog box
(d) all of these
(e) None of the above

Solutions

S1. Ans.(a)
Sol. A heat sink is a component of a motherboard which absorbs the heat produced by the processor and other components of a computer. 

S2. Ans.(d)
Sol. Operating system provides an interface between a user and computer hardware. It enables a user to utilise hardware resources efficiently. 

S3. Ans.(c)
Sol. A light pen is a pointing device that uses a photoelectric (light-sensitive) cell to indicate a position on the display screen. 

S4. Ans.(d)
Sol. As the installation cost of thinnet coaxial cable is less, it is also known as cheapernet. 

S5. Ans.(a)
Sol. In 10BaseT, 10 means the transfer rate of this Ethernet is 10 Mbps; Base describes the type of signalling used, that is, Baseband; and T denotes that the cable used is twisted-pair cable. 

S6. Ans.(d)
Sol. A wireless network allows a user to connect different computers or devices by using wireless network protocols. It provides mobility by allowing access to a network irrespective of the location. The installation of a wireless network is easy compared to a wired network. Also, a wireless network does not require expensive wires or cables; therefore, this type of network is cost effective. However, this type of network is insecure as data travels in the air.  

S7. Ans. (c)
Sol. To undo an action Click Undo Button on the Quick Access Toolbar. Keyboard shortcut Press CTRL+Z or F2. For the F2 function key to undo your last action, you might need to press the F-Lock key.

S8. Ans.(b)
Sol. By default, the system root folder for Microsoft Windows is C:/Windows. However, this can be changed for several reasons. The active partition on a hard drive could be designated by a letter other than C.

S9. Ans. (a)
Sol. Login is the process of connecting/ accessing to an account.

S10. Ans. (b)
Sol. First computers were programmed using machine language. 

S11. Ans. (c)
Sol. Super key is a set of one or more attributes taken collectively to uniquely identify a record

S12. Ans. (a)
Sol. In the relational model, cardinality is termed as Number of tuples.

S13. Ans (d)
Sol.  File permissions can be used to selectively provide authorisation to viewer to view data, thus protecting data from prying eyes.

S14. Ans. (a)
Sol. cascade and tile are two ways to arrange multiple windows on the desktop.

S15. Ans. (a)
Sol. Dimmed command is a command is not available for selection until certain other conditions are met.

For more Updates & Notifications for bank exams like SBI PO, SBI CLERK, IBPS PO, IBPS RRB, IBPS CLERK, IBPS SO, NIACL, SSC CHSL, SSC CGL etc. like our facebook page at :

Related Posts:

0 comments:

Post a Comment

Popular Posts