1.Modern Computers represent characters and numbers internally using one of the following number systems
(a) Penta (b) Octal (c) Hexa (d) Septa (e) Binary
Ans.e
2.Which of the following is NOT a computer programing language?
(a) C (b) C++ (c) Java (d) COBOL (e) Microsoft
Ans.e
3.To prepare a presentation/slide show which application is commonly used?
(a) Photoshop (b) Power Point (c) Outlook Express (d) Internet Explorer (e) All of these
Ans.b
4.Which of the following is NOT a famous operating system?
(a) Windows Vista (b) Mac OS X (C) Linux (d) Sun OS (e) Virtual Box
Ans.e
5.What kind of software would you most likely use to keep track of a billing account?
(a) Word processing (b) Electronic publishing (c) Spreadsheet (d) Web authoring
(e) None of these
Ans.C
6.Special effect used to introduce slides in a presentation are called
(a) Effects (b) Custom animation (c) Transition (d) Animation (e) Preset animation
Ans.c
7.A compiler translates higher-level programs into a machine language program, which is called
(a) source code (b) object code (c) compiled code (d) beta code (e) None of these
Ans.a
8.The two major categories of software include
(a) operating system and utility (b) Personal productivity and system (c) system and application (d) system and utility (e) None of these
Ans.c
9.A program that works like a calculator for keeping track of money and making budgets
(a) calculator (b) scholastic (c) keyboard (d) spreadsheet
(C) None of these
Ans.d
10.To take information from one source and bring it to your computer is referred to as
(a) upload (b) download (c) transfer (d) de-link (e) None of these
Ans.b
11.Which is the best definition of a software package?
(a) An add-on for your computer such as additional memory . (b) A computer programs used for a certaal function such as word processing (c) A protection you can buy for a computer (d) The box, manual and license agreement that accompany commercial software (e) None of these
Ans.b
12.—————-is the process of finding errors in software code.
(a) Debugging (b) Compiling (c) Interpreting (d) Testing (e) None of these
Ans.d
13.Which of the following is not a common feature of software applications?
(a) Menus (b) Windows (c) Help (d) Search (e) None of these
Ans.b
14.A_contains specific rules and words that express the logical steps of an algorithm.
(a) programming language (b) programming structure (c) syntax (d) logic chart
(e) None of these
Ans.a
15.For seeing the output, you use
(a) Monitor (b) Keyboard (c) Mouse (d) Scanner (e) None of these
Ans.a
16.The software tools that enable a user to interact with a computer for specific purposes are known as –
(a) Hardware (b) Networked Software (c) Shareware (d) Applications (e) None of these
Ans.d
17.A_ shares hardware, software, and data among authorized users.
(a) network (b) protocol (c) hyperlink(d) transmitter (e) None of these
Ans.a
18.Computer programs are written in a high-level programming language; however, the humanreadable version of a program is called –
(a) cache (b) instruction set (c) source code (d) word size (e) None of these
Ans.c
19.Software for organizing storage and retrieval of information is a(an) –
(a) operating system (b) database (c) database program (d) data warehouse
(e) None of these
Ans.d
20.While running DOS on a PC, which command would be used to duplicate the entire diskette?
(a) COPY (b) DISKCOPY (C) CHKDSK (d) TYPE (e) None of these
Ans.b
21.Data representation is based on the number system, which uses two numbers, to represent all data.
(a) binary (b) biometric (c) bicentennial (d) byte (e) None of these
Ans.a
22.processing is used when a large mail-order company accumulates orders and processes them together in one large set
(a) Batch (b) Online (c) Real-time (d) Group (e) None of these
Ans.a
23.The primarily take(s) of the behindthe-scenes details and manage(s) the hardware.
(a) operating system (b) application software (c) peripheral devices (d) hard disk
(e) None of these
Ans.a
24.Documents converted to can be published to the Web.
(a) a doc file (b) http (c) machine language (d) HTML (e) None of these
Ans.d
25.Only ———–program(s) become(s) active even though we can open many programs at a time.
(a) four (b) three (c) two (d) one (e) None of these
Ans.b
26.All of the followings are included in typical computer programming language which are in use currently Except
(a) CH (b) Java (©) Visual Basic NET (d) Machine language (e) None of these
Ans.d
27.The ability of an OS to run more than one application at a time is called
(a) multitasking (b) object-oriented programming (c) multi-user computing (d) time-sharing (e) None of these
Ans.a
28.- is the process of carrying out commands.
(a) Fetching (b) Storing (c) Decoding (d) Executing () None of these
Ans.d
29.is a set of computer program that runs or controls computer hardware and acts as an interface with application programs and users.
(a) Object code (b) A compiler (c) An operating system (d) The CPU (e) None of these
Ans.c
30.Errors in a computer program are referred to as
(a) bugs (b) mistakes (c) item overlooked (d) blunders (e) None of these
Ans.a
31.A compiler is used to translate a program written in
(a) a low level language (b) a high level language (c) assembly language (d) machine language (e) None of these
Ans.b
32.Computer programs are also known as
(a) operating systems (b) documents (c) peripherals (d) applications
(e) None of these
Ans.d
33.Information that comes from an external source and is fed into computer software is called
(a) Input (b) Output (c) Throughput (d) Reports (e) None of these
Ans.a
34.A repair for å known software bug, usually available at no charge on the internet, is called a(n) ——————-
(a) version (b) patch (c) tutorial (d) FAQ (e) None of these
Ans.b
35.The operating system is the most common type software.
(a) Communication (b) Application (c) System (d) Word-processing (e) None of these
Ans.c
36.Correcting errors in a program is referred to as of—————-
(a) debugging (C) rectifying (e) None of these (b) bugging (d) modifying
Ans.a
37.An assembler is used to translate a program written in
(a) a low level language (b) machine language (c) a high level language (d) assembly language (e) None of these
Ans.d
38.The capability of the operating system to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is
(a) Multiprocessing (b) Multitasking (c) Multiprogramming (d) Multiexecution (e) None of these
Ans.c
39.Instructions that tell the computer what to do. Another name for software.
(a) programs (b) CPU (c) options (d) folder (e) None of these
Ans.a
40.Several programs run at same time and storage is shared especially in
(a) microcomputers (b) mainframe computers (c) enquiry computers (d) dump computers |
Ans.b
41.Programs designed specifically to address general purpose applications special purpose applications are called –
(a) operating system (b) system software (c) application software (d) management information systems (e) None of these
Ans.c
42.Types of software programs usually includes
(a) application programs (b) replicate programs (c) mathematical operations (d) both a and b
Ans.d
43.Programs or a set of electronic instructions than tell a computer what to do
(a) Menu (b) Monitor Hardware (d) Software (e) None of these
Ans. d
44.The ability of an OS to run more than one application at a time is called –
(a) multitasking (b) object-oriented programming (c) multi user computing (d) time-sharing (e) None of these
Ans.c
45.Coded entries which are used to gain access to a computer system are called its –
(a) Entry codes (b) Passwords (c) security commands (d) code words (e) None of these
Ans.b
46.What is the name for the process that is used to convert a series of instructions, or program, written in a high-level language into instructions (or a program) that can be run on a computer?
(a) Assembling (b) Compiling (c) Translating (d) Uploading (e) None of these
Ans.b
47.Set of programs with full set of documentation is considered as
(a) database packages (b) file package C) software (d) software packages
Ans.d
48.The software tools that enable a user to interact with a computer for specific purposes are known as
(a) Hardware (b) Networked Software (C) Shareware (d) Applications (e) None of these
Ans.d
49.Programs used to control system performance are classified as
(a) experimental programs (b) system programs (c) specialized program(d) organized programs
Ans.b
50.Software for organizing storage and retrieval of information is a(n).—————–
(a) operating system (b) database (c) database program (d) data warehouse
(e) None of these
Ans.c
51.Aset of step-by-step procedures for accomplishing a task is known as a(n)_ ———
(a) algorithm (b) hardware program (c) software bug (d) firmware program (e) None of these
Ans. a
52.Compilers and translators are one form of
(a) ROM (b) RAM (c) hard disk (d) Software (e) None of these
Ans.d
53.Data representation is based on the number system, which uses two numbers to represent all data
(a) binary (b) biometric (c) bicentennial (d) byte (e) None of these
Ans.a
54.The primary take(s) care of the behind-the-scenes details and manage(s) the hardware.
(a) operating system (b) application software (c) peripheral devices (d) hard disk S (e) None of these
Ans.a
55.When a file contains instructions that can be carried out by the computer, it is often called a(n)————– pile.
(a) data (b) information (c) executable (d)Aplication (e) None of these
Ans.c
56.A software which you can use to create a budget is called
(a) Word processing software (b) Graphics software (c) Utility software (d) Spreadsheet software (e) None of these
Ans.d
57.Which device uses a hand-held operating system?
(a) PDA (b) A personal computer (C) A laptop (d) A mainframe (e) None of these
Ans.a
58.What is Software?
(a) A type of computer code (b) A computer language (c) A set of instructions for your computer (d) A cover for the computer (e) None of these
Ans.e
59.Computers process binary numbers, which are composed of
(a) 1s and 2s (b) 2s and 4s (c) 1s and 10s (d) 2s and 3s (e) Os and 1s
Ans.e
60.System programs examples includes
(a) operating system of computer (b) trace program (C) compiler (d) all of above
Ans.d
61.is the process of finding errors in software code.
(a) Hacking (b) Compiling (c) Testing (d) Running (e) Debugging
Ans.e
62.Most application softwares today come with an interface called a(n)
(a) graphical user interface (b) character user interface (c) icon user interface (d) button user interface (e) voice instruction system
Ans.a
63.————–are bundles of related software packages that are sold together.
(a) Personal productivity tools (b) Word and PowerPoint (c) Screen savers (d) Excel and WordPerfect (e) Software suites
Ans.e
64.The————-_manual tells you how to use a software program.
(a) documentation (b) programming (c) technical (d) user (e) dictionary
Ans.a
65.The is an information system that must be reliable and capable of handling the expected workload.
(a) hardware (b) software (c) data input (d) data input (e) mobiles
Ans.b
66.Specialised programs that allow particular input or output devices to communicate with the rest of the computer system are called
(a) operating systems (b) utilities (c) device drivers (d) language translators (e) connectors
Ans. a
67.The primary purpose of a software is to turn data into_
(a) Web sites (b) graphs (C) programs (d) objects (e) information
Ans.e
68.You must instruct the to start the application software.
(a) utility program (b) memory (C) operating system (d) processor (e) user
Ans.c
69.Professional designers can create sophisticated documents that contain text, graphics, and many colours, using software.
(a) computer aided design (CAD) (b) illustration (c) image editing (d) desktop publishing (DTP)
(e) PowerPoint
Ans.a
70.Oracle is an example of application software.
(a) database (b) word processing (c) project management (d) presentation graphics (e) desktop
Ans. a
71.A collection of programmes which determines and controls how your computer system works and process information is called
(a) Interpretor (b) Computer (c) Office (d) Compiler (e) Operating system
Ans.e
72.An error in a computer program is called
(a) Crash (b) Power failure (c) Bug (d) Virus (e) Bugger
Ans.c
73.The real business and competitive value of information technology lies in
(a) The software applications that are used by many companies (b) The capabilities of the software and value of the information a business acquires and
Used (c) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies (d) The capabilities of the hardware and the
speed at which it processes information | (e) None of these
Ans. C
74.Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves?
(a) Open source vendors (b) Alliances (c) Application service providers (d) All of the above (e) None of these
Ans.C
75.In the information systems concept, the output function involves
(a) Capturing and assembling elements that enter the system to be processed (b) Transformation processes that convert input into output (c) Transferring elements that have been produced by a transformation process to their ultimate destination (d) Monitoring and evaluating feedback to determine whether a system is moving
toward the achievement of its goal (e) None of these
Ans. A
76.Which of the following is a popular programming language for developing multimedia web pages, websites, and web-based applications?
(a) COBOL (b) Java (C) BASIC (d) Assembler (e) None of these
Ans. A
77.Compiling creates a(n)
(a) program specification (b) algorithm (c) executable program (d) subroutine
(e) None of these
Ans.C
78.The———-manual tells you how to use a software program.
(a) documentation (b) programming (c) technical (d) user (e) None of these
Ans.D
79.The tells the computer how to use its components.
(a) utility (b) network (C) operating system (d) application program (e) None of these
Ans.C
80.The process of writing out computer instructions is known as
(a) assembling (b) compiling (c) executing (d) coding (e) None of these
Ans.D
81.Multiprogramming systems:
(a) are easier to develop than single programming systems. (b) execute each job faster. (c) execute more jobs in the same time period. (d) use only one large mainframe computer. (e) None of these
Ans.C
82.Set of software authorized to specific users is considered as
(a) software library (b) program library (c) directory library (d) library package
Ans.B
83.——————_ is a set of keywords, symbols, and a system of rules for constructing statements by which humans can communicate the instructions to be executed by a computer.
(a) A computer program (b) A programming language (c) An assembler (d) Syntax
(e) None of these
Ans.A
84.A program that converts a high-level language source file into a machine-language file is called as .
(a) translator (b) assembler (c) compiler (d) linker (e) None of the above
Ans.C
85.Housing all hardware, software, storage, and processing in one site location is called
(a) time-sharing (b) a distributed system (c) centralized processing (d) a host computer
(e) None of the above
Ans.C
86.If program can cope data errors, program is called
(a) robust (b) reliable (C) unreliable (d) stable functioning
Ans.A
87.The operating system determines the manner in which all of the following occur except
(a) user creating of a document (b) user interaction with the processor (c) printer output (d) data displayed on the monitor (e) None of these
Ans.B
88.What are the two examples of freeware?
(a) WinZip and Linux (b) Shareware and file sharing (c) Microsoft Word and the Google toolbar (d) Instant messaging and the Google toolbar (e) Microsoft Power Point and Microsoft Excel
Ans.D
89.Vendor-created program modifications are called
(a) patches (b) antiviruses (c) holes (d) fixes (e) overlaps
Ans.A
90.A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using
(a) input automation (b) item data automation (c) scanning automation (d) source data automation (e) None of these
Ans.C
91.Which of the following is not a type of computer software which can be bought?
(a) Off-the-shelf (b) Tailor-made (c) Custom-developed (d) Off-the-shelf with alterations
(e) All of these can be purchased
Ans.D
92.Computer software can be defined as
(a) the computer and its associated equipment. (b) the instructions that tell the computer what to do. C.computer components that act to accomplish a goal. D.an interface between the computer and the network E.the interaction between the computer and
its database.
Ans.B
93.The operating system called UNIX is typically used for
(a) Desktop computers (b) Laptop computers (C) Super computers (d) Web servers (e) All of these
Ans.E
94.Program which exactly perform operations that manual says is classified as
(a) unreliable (b) stable functioning (c) robust (d) reliable
Ans.D
95.Executing more than one program concurrently by one user on one computer is known as
(a) multi-programming (b) multi-processing (c) time sharing (d) multi-tasking
(e) multi-action
Ans.D
96.Which of the following controls the manner of interaction between the user and the operating system?
(a) Language translator (b) Platform (c) User interface (d) Icon (e) None of these
Ans.C
97.Collecting personal information and effectively posing as another individual is known as
(a) spooling (b) spooling (c) hacking (d) identity theft (e) None of these
Ans.D
98.A(n) contains text as well as information about the text.
(a) annotated language (b) browser language (c) markup language (d) protocol language (e) machine language
Ans.C
99.An operating system that can do multitasking means that
(a) the operating system can divide up work between several CPUs. (b) multiple people can use the computerconcurrently. (c) several programs can be operated concurrently. (d) All of these (e) None of these
Ans.C
100.Compilers and translators are one form of –
(a) ROM (b) RAM (c) hard disk (d) software (e) None of these
Ans. D
101.The capability of the operating system to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is
(a) Multiprocessing · (b) Multitasking (c) Multiprogramming (d) Multiexecution (e) None of these
Ans.C
102.The simultaneous execution of two or more instructions is called
(a) sequential access (b) reduced instruction set computing (c) multiprocessing (d) disk mirroring (e) None of these
Ans.C
103.Which of the following is an example of a binary number?
(a) 6AH1 (b) 100101 (c) 005 (d) ABCD (e) 23456
Ans.B
104.Which of the following is not true about computer files?
(a) They are collections of data saved to a storage medium. (b) Every file has a filename. (c) A file extension is established by the user to indicate the date it was created (d) Usually files contains data. (e) None of these
Ans.C
105.How many kilobytes make a megabyte?
(a) 128 (b) 1024 (c) 256 (d) 512 (e) 64
Ans.B
106.In a computer, how many bits does a nibble signify?
(a) 4 (b) 8 (c) 16 (d) 32 (e) 64
Ans.A
107.Which of the following is not true about a compiler?
(a) Translate instruction of a high level language into machine language (b) Translates entire source program into machine language program (c) It is involved in program’s execution (d) Is a translating program (e) Is useful to run program
Ans.C
108.When machine instructions are being executed by a computer, the instruction phase followed by the execution phase is referred to as
(a) program cycle (b) machine instruction (C) execution cycle (d) task cycle (e) machine cycle
Ans.E
109.Which language is directly understood by the computer without translation program?
(a) BASIC language (b) Assembly language (c) High level language (d) C language (e) Machine language
Ans.E
110.The translator program used in assembly language is called
(a) Compiler (b) Assembler (c) Intepreter (d) Translator (e) Operating System
Ans.B
111.A set of instructions telling the computer what to do is called
(a) mentor (b) instructor (c) compiler (d) program (e) None of these
Ans.D
112.Which of the following is not true about computer files?
(a) They are a collection of data saved in a storage medium. (b) Every file has a filename. (c) A file extension is established by the user to indicate the computer on which it was created. (d) All files contain data. (e) None of these
Ans.C
113.Which of the following is not a software?
(a) Excel (b) Printer-Driver (c) Operating System (d) Powerpoint (e) Mouse
Ans. E
114.ASCII is a coding system that provides
(a) 256 different characters (b) 512 different characters (c) 1024 different characters (d) 128 different characters (e) 1000 different characters
Ans.D
115.Which part of the computer is directly invoked in executing the instructions of the computer program?
(a) The scanner (b) The main storage (c) The secondary storage (d) The printer (e) The processor
Ans.E
116.Which of the following is not a binary number?
(a) 001 (b) 101 (c) 202 (d) 110 (e) 011
Ans.C
117.Large transaction processing systems in automated organisations use
(a) Online processing (b) Batch Processing (c) Once-a-day Processing (d) End-of-day processing (e) Once-a-week processing
Ans.B
118.Which of the following is true for the octal system?
(a) It needs less digits to represent a number than in the binary system. (b) It needs more digits to represent a number than in the binary system. (c) It needs the same number of digits to represent a number as in the binary system (d) It needs the same number of digits to represent a number as in the decimal system. (e) None of these
Ans.B
119.The language used in a computer that is similar to the language of humans and is easy to understand is referred to as
(a) Source Code (b) Machine Language (c) High Level Language (d) Object Code (e) Assembly language
Ans.C
Get more important gk topic
in your mailbox
Subscribe to our mailing list and get interesting stuff and updates to your email inbox.