Computer GK Quiz-13

Computer GK Quiz-13

Computer Multiple Choice Questions (MCQs) Quiz for State and UPSC Civil Services Examinations. Objective Questions on Computer for competitive examinations.

    241. What is the full form of PDA?

    (1) Personal Digital Assistant
    (2) Personal Data Addition
    (3) Personal Digital Addition
    (4) Peripheral Digital Assistant
    241. (1) The acronym PDA stands for Personal Digital Assistant. Also known as a handheld PC, or personal data assistant, it is a mobile device that functions as a personal information manager. The term evolved from Personal Desktop Assistant, an application that prompts or prods the user of a computer with suggestions or provides quick reference to contacts and other lists.

    242. Communication satellites are used to:

    (1) To transmit communication signals
    (2) To receive and redirect communication signals
    (3) To only receive communication signal
    (4) To provide information of national sources only
    242. (2) A communications satellite works like a relay station: signals transmitted by the ground stations are picked up by the satellite’s receiver antennas, the signals are filtered, their frequency changed and amplified, and then routed via the transmit antennas back down to Earth. The redirected signals are received by ground stations, also called earth stations and further processed to extract the base band signals.

    243. What is MS DOS?

    (1) Multipurpose System Digital Offline Sign
    (2) Microsoft Disk Operating System
    (3) Multi System Disk Operating System
    (4) Microchip Sign Digital System
    243. (2) MS-DOS stands for Microsoft Disk Operating System. It is a discontinued operating system for x86- based personal computers mostly developed by Microsoft. It was the main operating system for IBM PC compatible personal computers during the 1980s and 1990s.

    244. Which of the following is used for very high speed searching applications ?

    (1) Flash Memory
    (2) Content-addressable Memory
    (3) Dynamic Random Access Memory
    (4) Static Random Access Memory
    244. (2) Content-addressable memory (CAM) is a special type of computer memory used in certain very-highspeed searching applications. It is also known as associative memory. It compares input search data (tag) against a table of stored data, and returns the address of matching data (or in the case of associative memory, the matching data).

    245. Which of the following commands is called as three-finger salute in computers ?

    (1) Ctrl + Alt + Delete
    (2) Ctrl + Shift + Escape
    (3) Ctrl + Shift + Enter
    (4) Ctrl + Alt + Arrow key
    245. (1) The three-finger salute refers to the original PCcompatible system command to reboot or restart a computer by pressing three keys simultaneously: Control, Alt and Delete. The three-key combination of Control-Alt-Delete is specifically designed to be impossible to execute with one hand in order to avoid the potential for accidental reboots. It was developed by David Bradley.

    246. Data in database at a particular point of time is called as:

    (1) Intension 
    (2) Extension
    (3) Back up 
    (4) Application
    246. (2) The overall design or description of the database is known as database schema or intension of the database, and is specified while designing the database. The data in the database at a particular point of time is known as database instance of database state or snapshot. The database state is also called extension of the schema.

    247. In computer science, data hazard occurs when

    (1) pipeline changes the order of read/write access to operands
    (2) performance loss
    (3) machine size is limited
    (4) some functional unit is not fully pipelined
    247. (1) A major effect of pipelining is to change the relative timing of instructions by overlapping their execution. This introduces data and control hazards. Data hazards occur when the pipeline changes the order of read/write accesses to operands so that the order differs from the order seen by sequentially executing instructions on the unpipelined machine.

    248. Cancellation of thread occurs only when it reaches a :

    (1) Cancellation point
    (2) Error point
    (3) Virtual point
    (4) Target point
    248. (1) Invoking thread cancellation requests cancellation, but actual cancellation depends on thread state. Cancellation only occurs when thread reaches cancellation point which happens only when cancellation is enabled. At the cancellation point, the cancellation request is acted upon and the thread to be terminated is allowed to perform application-specific cleanup processing.

    249. A _____ is a computer, appliance, or router that sits between the trusted and untrusted systems.

    (1) bridge 
    (2) switch
    (3) firewall 
    (4) hub
    249. (3) Firewall is a computer appliance or router that sits between the trusted and untrusted systems. It enables a computer to be connected safely to an untrustworthy network. It is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.

    250. What is the brain of the computer called?

    (1) CPU 
    (2) Motherboard
    (3) HDD 
    (4) Hardware
    250. (1) The CPU (Central Processing Unit) is commonly referred to as the “brains” of a computer since it carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions. The CPU is also known as the processor or microprocessor.

    251. How many bits are equal to one byte?

    (1) 8 
    (2) 10
    (3) 12 
    (4) 14
    251. (1) The byte is a unit of digital information that most commonly consists of eight bits. Computer storage is usually measured in byte multiples. For example, an 820 MB hard drive holds a nominal 820 million bytes - or megabytes - of data.

    252. Processors contain a control unit and a/an:

    (1) Expansion slot
    (2) Port
    (3) Arithmetic logic unit (ALU)
    (4) CD drive
    252. (3) Principal components of a processor (CPU) include the arithmetic logic unit (ALU) that performs arithmetic and logic operations, processor registers that supply operands to the ALU and store the results of ALU operations, and a control unit that fetches instructions from memory and “executes” them by directing the coordinated operations of the ALU, registers and other components.

    253. Which of the following was used as circuitry for first generation of computers?

    (1) Vacuum tube
    (2) Transistors
    (3) Integrated circuits
    (4) Microprocessors
    253. (1) The computers of first generation (1946-1959) used vacuum tubes as the basic components for memory and circuitry for CPUand magnetic drums for memory. These computers relied on machine language, the lowest-level programming language understood by computers, to perform operations.

    254.Which among the following is the name given to the cursor for the computer language ‘LOGO’?

    (1) Robot 
    (2) Frog
    (3) Spider 
    (4) Turtle
    254. (4) LOGO is a computer programming language used for functional programming. It is used for generating basic shapes using a turtle cursor. The turtle cursor is an on-screen cursor, which can be given movement and drawing instructions, and is used to programmatically produce line graphics.

    255. Which of the following are valid phases of a computer virus?

    (1) Only Triggering, Executing
    (2) Only Propagation, Executing
    (3) Only Dormant, Propagation, Triggering, Executing
    (4) Only Dormant, Propagation, Triggering
    255.(3) The valid phases of a virus are: Dormant phase - Propagation phase - Triggering phase - Execution phase. l Dormant phase: The virus is idle. The virus will eventually be activated by some event); l Propagation phase: The virus places an identical copy of itself into other programs or into certain system areas on the disk. Each infected program will now contain a clone of the virus, which will itself enter a propagation phase; l Triggering phase: The virus is activated to perform the function for which it was intended. Can be caused by a variety of system events; l Execution phase: The goal of the virus software is performed.

    256. In IT, means that the data available in the database is both accurate and consistent.

    (1) Data Security
    (2) Data Availability
    (3) Data Binding
    (4) Data Integrity
    256. (4) Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle. It is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data. Data integrity is the opposite of data corruption, which is a form of data loss.

    257. The first computer made available for commercial use was

    (1) MANIAC 
    (2) ENIAC
    (3) UNIVAC 
    (4) EDSAC
    257. (3) The UNIVAC I (UNIVersal Automatic Computer I) was the first commercial computer produced in the United States. It was designed principally by J. Presper Eckert and John Mauchly, the inventors of the ENIAC. It was the first computer designed for business and administrative use with fast execution of relatively simple arithmetic and data transport operations, as opposed to the complex numerical calculations required of scientific computers.

    258. What is the name of a memory buffer used to accommodate a speed differential ?

    (1) Cache
    (2) Stack Pointer
    (3) Accumulator
    (4) Disc
    258. (1) The memory buffer used to accommodate a speed differential is called cache. It is a hardware or software component that stores data so future requests for that data can be served faster. Cache serves to add fast memory between the CPU and main memory.

    259. Which is not an external storage device ?

    (1) CD - ROM 
    (2) DVD-ROM
    (3) Pen Drive 
    (4) RAM
    259. (4) Random Access Memory (RAM) is an example of internal storage. Commonly called “memory,” it is considered primary storage, since it stores data that is directly accessible by the computer’s CPU. RAM is a high-speed storage medium that can be accessed with minimal delays.

    260. In Networks, WEP stands for

    (1) Wireless Equivalent Privacy
    (2) Wired Extra Privacy
    (3) Wired Equivalent Privacy
    (4) Wireless Embedded Privacy
    260. (3) WEP stands for Wired Equivalent Privacy. It is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wired network. It was superseded by Wi-Fi Protected Access (WPA) in 2003.

    Post a Comment