Rajasthan DOITC Informatics Assistant computer GK
1. EBCDIC stands for
Answer . Extended Binary Coded Decimal Interchange Code
2. ............ printer is the cheapest in terms of price and operating cost
Answer . Dot matrix
3. .......... printer is a non-impact printer and is quite in working
Answer . Inkjet
4. .......... are high-end printers
Answer . Laser
5 .Which of the following is a part of the Central Processing Unit?
Answer. Arithmetic & Logic unit
6. CAD stands for
Answer. Computer aided design
7. Junk e-mail is also called
Answer. Spam
8. When a computer is switched on, the booting process performs
Answer . Power-On Self-Test
9. A computer system that is old and perhaps not satisfactory is referred to as a(n)
Answer d. Legacy system
11. Which of the following does not store data permanently?
Answer . RAM
12. Which of the following contains permanent data and gets updated during the
processing of transactions?
Answer . Master file
13. Which of the following helps to protect floppy disks from data getting accidentally
erased?
Answer . Write-protect notch
14. A modem is connected to
Answer . a telephone line
15. Collecting personal information and effectively posing as another individual is
known as the crime of:
Answer. Identity theft.
16. Malicious software is known as:
Answer . Malware
17. A program that performs a useful task while simultaneously allowing destructive
acts is a:
Answer . Trojan horse
18. An intentionally disruptive program that spreads from program to program or
from disk to disk is known as a:
Answer . Virus
19. In 1999, the Melissa virus was a widely publicised:
Answer . E-mail virus.
20. What type of virus uses computer hosts to reproduce itself?
Answer . Worn
21. The thing that eventually terminates a worm virus is a lack of:
Answer. Memory or disk space.
22. When a logic bomb is activated by a time-related event, it is known as a:
Answer . Time bomb.
23. What is embedded system?
Answer . The computer and software system that control the machine
24. First page of Website is termed as-
Answer . Homepage
25. ...................... is the appearance of typed characters?
Answer . Format
26. When a file is saved for the first time
Answer . it must be given a name to identify it
27. Office LANS, which are scattered geographically on large scale, can be connected by
the use of corporate
Answer . WAN
28. Where are data and programme stored when the processor uses them?
Answer . Main memory
29. ............... represents raw facts, where-as................. is data made meaningful.
Answer . Data, information
30. What characteristic of read-only memory (ROM) makes it useful?
Answer. Data in ROM is non-volatile, that is, it remains there even without electrical power.
31. What do you call the programs that are used to find out possible faults and their
causes?
Answer . diagnostic software
32. Which programming languages are classified as low level languages?
Answer . Assembly languages
33. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example
of a:
Answer. Time bomb.
34. What is the name of an application program that gathers user information and
sends it to someone through the Internet?
Answer . Spybot
35. _____ is the measurement of things such as fingerprints and retinal scans used
for security access.
Answer. Biometrics
36. What is the most common tool used to restrict access to a computer system?
Answer. Passwords
37. Hardware or software designed to guard against unauthorized access to a
computer network is known as a(n):
Answer . Firewall
38. The scrambling of code is known as:
Answer . Encryption
39. To prevent the loss of data during power failures, use a(n):
Answer . UPS
40. _____ is defined as any crime completed through the use of computer technology.
Answer . Computer crime
41. _____ refers to electronic trespassing or criminal hacking.
Answer. Cracking
42. The first electronic computer was developed by
Answer . J.V. Attansoff
43. Snowbol is an/a _________
Answer . HLL
44. Switching device of fifth generation computer is ______
Answer . VLSI
45. _____ computers operates essentially by counting
Answer . Digital computer
46. ______ computer is small general purpose micro computer, but larger than
portable computer
Answer . Desktop
47. Cathode Ray Tube is a form of .......
Answer . Monitor
48. Trackball is a ..........
Answer . Input device
49. ............. computer is a medium sized computer
Answer. Mini
50. ........... computer are of large size
Answer . Mainframe
51. Note book, laptop,palm,hand-held computers are coming under the category
of......... computer
Answer . Portable computer
52. Light pen and joystick are ............
Answer . Input devices
53. Touch Screen is ............
Answer. Both a & b above
54. ......... are used for plotting graphs and design on papers
Answer . Plotters
55. Daisy wheel, Drum, chain etc are the .............
Answer . Printers
56. ........ are specific to users’ needs
Answer . Application software
57. Joshy, Perfumes are examples of .............
Answer . Computer viruses
58. “MAN” stands for
Answer . Metropolitan Area Network
59. Which of the following is a network topology
Answer . BUS
214. Which of the following is a type of network
Answer . PAN
60. Hackers
Answer. break into other people's computers
61. What type of computers are client computers (most of the time) in a client-server
system?
Answer . Microcomputer
62. A computer cannot 'boot' if it does not have the
Answer. Operating System
63.The amount of vertical space between lines of text in a document is called
Answer. line spacing
64. Example of non-numeric data is
Answer . Employee address
65. Which of the following is not anti- viruses’ software?
Answer. Oracle
66. Which device is required for the Internet connection?
Answer . Modem
67. What does DMA stand for?
Answer . Direct Memory Access
68. When did John Napier develop logarithm?
Answer . 1614
69. A normal CD- ROM usually can store up to _________ _data?
Answer . 680 MB
70. MIS is designed to provide information needed for effective decision making by?
Answer . Managers
71. What is a light pen?
Answer. Optical input device
72. BCD is
Answer. Binary Coded Decimal
73. ASCII stands for
Answer . American Standard Code for Information Interchange
74. Which of the following is first generation of computer?
Answer . EDSAC
75. Chief component of first generation computer was
Answer. Vacuum Tubes and Valves
76. FORTRAN is
Answer. Formula Translation
77. EEPROM stands for
Answer . Electronic Erasable Programmable Read Only Memory
78. Second Generation computers were developed during
Answer . 1956 to 1965
79. The computer size was very large in
Answer. First Generation
80. Which of the following devices can be sued to directly image printed text?
Answera. OCR
81. The output quality of a printer is measured by
Answer. Dot per sq. inch
82. In analogue computer
Answer . Input is never converted to digital form
83. In latest generation computers, the instructions are executed
Answer. Both sequentially and parallel
84. Who designed the first electronics computer – ENIAC?
Answer . J. Presper Eckert and John W Mauchly
85. Who invented the high level language “C”?
Answer . Dennis M. Ritchie
86. Personnel who design, program, operate and maintain computer equipment refers to
Answer. Peopleware
87. Large transaction processing systems in automated organisations use
Answer. Batch Processing
89. In a computer, most processing takes place in
Answer . CPU
90. Which of the following is not a storage medium?
Answer. Scanner
91. The computer abbreviation KB usually means
Answer. Kilo Byte
92. The typical computer criminal is a(n):
Answer . Trusted employee with no criminal record.
93. The common name for the crime of stealing passwords is:
Answer. Spoofing
94. When did arch rivals IBM and Apple Computers Inc. decide to join hands?
Answer . 1991
95. Human beings are referred to as Homosapinens, which device is called Sillico sapiens?
Answer . Computer
96. An error in software or hardware is called a bug. What is the alternative computer
jargon for it?
Answer . Glitch
97. In world today, most of the computers are :
Answer. Digital
98. Physical structure of computer is called :
Answer. Hardware
99. In which type of computer, data are represented as discrete signals.
Answer . Digital computer
100 .......... are set of rules and procedures to control the data transmission over the internet
Answer . Protocol
Answer . Extended Binary Coded Decimal Interchange Code
2. ............ printer is the cheapest in terms of price and operating cost
Answer . Dot matrix
3. .......... printer is a non-impact printer and is quite in working
Answer . Inkjet
4. .......... are high-end printers
Answer . Laser
5 .Which of the following is a part of the Central Processing Unit?
Answer. Arithmetic & Logic unit
6. CAD stands for
Answer. Computer aided design
7. Junk e-mail is also called
Answer. Spam
8. When a computer is switched on, the booting process performs
Answer . Power-On Self-Test
9. A computer system that is old and perhaps not satisfactory is referred to as a(n)
Answer d. Legacy system
11. Which of the following does not store data permanently?
Answer . RAM
12. Which of the following contains permanent data and gets updated during the
processing of transactions?
Answer . Master file
13. Which of the following helps to protect floppy disks from data getting accidentally
erased?
Answer . Write-protect notch
14. A modem is connected to
Answer . a telephone line
15. Collecting personal information and effectively posing as another individual is
known as the crime of:
Answer. Identity theft.
16. Malicious software is known as:
Answer . Malware
17. A program that performs a useful task while simultaneously allowing destructive
acts is a:
Answer . Trojan horse
18. An intentionally disruptive program that spreads from program to program or
from disk to disk is known as a:
Answer . Virus
19. In 1999, the Melissa virus was a widely publicised:
Answer . E-mail virus.
20. What type of virus uses computer hosts to reproduce itself?
Answer . Worn
21. The thing that eventually terminates a worm virus is a lack of:
Answer. Memory or disk space.
22. When a logic bomb is activated by a time-related event, it is known as a:
Answer . Time bomb.
23. What is embedded system?
Answer . The computer and software system that control the machine
24. First page of Website is termed as-
Answer . Homepage
25. ...................... is the appearance of typed characters?
Answer . Format
26. When a file is saved for the first time
Answer . it must be given a name to identify it
27. Office LANS, which are scattered geographically on large scale, can be connected by
the use of corporate
Answer . WAN
28. Where are data and programme stored when the processor uses them?
Answer . Main memory
29. ............... represents raw facts, where-as................. is data made meaningful.
Answer . Data, information
30. What characteristic of read-only memory (ROM) makes it useful?
Answer. Data in ROM is non-volatile, that is, it remains there even without electrical power.
31. What do you call the programs that are used to find out possible faults and their
causes?
Answer . diagnostic software
32. Which programming languages are classified as low level languages?
Answer . Assembly languages
33. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example
of a:
Answer. Time bomb.
34. What is the name of an application program that gathers user information and
sends it to someone through the Internet?
Answer . Spybot
35. _____ is the measurement of things such as fingerprints and retinal scans used
for security access.
Answer. Biometrics
36. What is the most common tool used to restrict access to a computer system?
Answer. Passwords
37. Hardware or software designed to guard against unauthorized access to a
computer network is known as a(n):
Answer . Firewall
38. The scrambling of code is known as:
Answer . Encryption
39. To prevent the loss of data during power failures, use a(n):
Answer . UPS
40. _____ is defined as any crime completed through the use of computer technology.
Answer . Computer crime
41. _____ refers to electronic trespassing or criminal hacking.
Answer. Cracking
42. The first electronic computer was developed by
Answer . J.V. Attansoff
43. Snowbol is an/a _________
Answer . HLL
44. Switching device of fifth generation computer is ______
Answer . VLSI
45. _____ computers operates essentially by counting
Answer . Digital computer
46. ______ computer is small general purpose micro computer, but larger than
portable computer
Answer . Desktop
47. Cathode Ray Tube is a form of .......
Answer . Monitor
48. Trackball is a ..........
Answer . Input device
49. ............. computer is a medium sized computer
Answer. Mini
50. ........... computer are of large size
Answer . Mainframe
51. Note book, laptop,palm,hand-held computers are coming under the category
of......... computer
Answer . Portable computer
52. Light pen and joystick are ............
Answer . Input devices
53. Touch Screen is ............
Answer. Both a & b above
54. ......... are used for plotting graphs and design on papers
Answer . Plotters
55. Daisy wheel, Drum, chain etc are the .............
Answer . Printers
56. ........ are specific to users’ needs
Answer . Application software
57. Joshy, Perfumes are examples of .............
Answer . Computer viruses
58. “MAN” stands for
Answer . Metropolitan Area Network
59. Which of the following is a network topology
Answer . BUS
214. Which of the following is a type of network
Answer . PAN
60. Hackers
Answer. break into other people's computers
61. What type of computers are client computers (most of the time) in a client-server
system?
Answer . Microcomputer
62. A computer cannot 'boot' if it does not have the
Answer. Operating System
63.The amount of vertical space between lines of text in a document is called
Answer. line spacing
64. Example of non-numeric data is
Answer . Employee address
65. Which of the following is not anti- viruses’ software?
Answer. Oracle
66. Which device is required for the Internet connection?
Answer . Modem
67. What does DMA stand for?
Answer . Direct Memory Access
68. When did John Napier develop logarithm?
Answer . 1614
69. A normal CD- ROM usually can store up to _________ _data?
Answer . 680 MB
70. MIS is designed to provide information needed for effective decision making by?
Answer . Managers
71. What is a light pen?
Answer. Optical input device
72. BCD is
Answer. Binary Coded Decimal
73. ASCII stands for
Answer . American Standard Code for Information Interchange
74. Which of the following is first generation of computer?
Answer . EDSAC
75. Chief component of first generation computer was
Answer. Vacuum Tubes and Valves
76. FORTRAN is
Answer. Formula Translation
77. EEPROM stands for
Answer . Electronic Erasable Programmable Read Only Memory
78. Second Generation computers were developed during
Answer . 1956 to 1965
79. The computer size was very large in
Answer. First Generation
80. Which of the following devices can be sued to directly image printed text?
Answera. OCR
81. The output quality of a printer is measured by
Answer. Dot per sq. inch
82. In analogue computer
Answer . Input is never converted to digital form
83. In latest generation computers, the instructions are executed
Answer. Both sequentially and parallel
84. Who designed the first electronics computer – ENIAC?
Answer . J. Presper Eckert and John W Mauchly
85. Who invented the high level language “C”?
Answer . Dennis M. Ritchie
86. Personnel who design, program, operate and maintain computer equipment refers to
Answer. Peopleware
87. Large transaction processing systems in automated organisations use
Answer. Batch Processing
89. In a computer, most processing takes place in
Answer . CPU
90. Which of the following is not a storage medium?
Answer. Scanner
91. The computer abbreviation KB usually means
Answer. Kilo Byte
92. The typical computer criminal is a(n):
Answer . Trusted employee with no criminal record.
93. The common name for the crime of stealing passwords is:
Answer. Spoofing
94. When did arch rivals IBM and Apple Computers Inc. decide to join hands?
Answer . 1991
95. Human beings are referred to as Homosapinens, which device is called Sillico sapiens?
Answer . Computer
96. An error in software or hardware is called a bug. What is the alternative computer
jargon for it?
Answer . Glitch
97. In world today, most of the computers are :
Answer. Digital
98. Physical structure of computer is called :
Answer. Hardware
99. In which type of computer, data are represented as discrete signals.
Answer . Digital computer
100 .......... are set of rules and procedures to control the data transmission over the internet
Answer . Protocol
1 टिप्पणियाँ
Arunachal Govt Jobs Opportunities for all types of Job Seekers such as 10th Pass, Diploma/ ITI Graduate, Post Graduate, MBBS, Engineering etc. The candidates who are looking the State Government Jobs in Arunachal Pradesh can visit here. You will get an overview of the current upcoming Arunachal Pradesh Government Jobs 2018-19.
जवाब देंहटाएंplease do not enter any spam link in the comment box.