🏡 You are welcome to your own channel NK Study Cafe.🏡 🏡 If you are preparing for any types of one-day competitive exam. We provide best practice set absolutely free.🏡 🏡 If you want any kind of QUIZ on any specific topic , then you can tell us by writing comment.🏡 🏡 If you want to join our Teaching Team , you can mail us. Contact: nksp.icafe@gmail.com 🏡 🏡Stay Home Stay Safe 🏡 ❤️ With lot of blessings by NK Study Point ❤️ Be late but definitely be something because people don't ask for well-being with time, they ask for status.

🌎 आप सब का स्वागत है आपके अपने चैनल NK Study Cafe पर। 📌 सभी प्रकार के वन डे कॉम्पिटेटिव एक्जाम की तैयारी के लिए हम आपके लिए लेकर आएं है। एक से एक बेहतर प्रैक्टिस सेट बिल्कुल फ्री। 📌 🗞 अगर आप किसी भी तरह की कोई QUIZ चाहते हैं तो आप हमसे कमेंट में लिख कर बता सकते हैं। ⌨️ अगर आप हमारे टीचिंग सेक्शन में जुड़ना चाहते हैं तो भी आप हमें कमेंट कर सकते हैं और मेल भी कर सकते हैं| Contact : nksp.icafe@gmail.com 🌍 🏡 घर पर रहे सुरक्षित रहें stay home stay safe 🏡 ❤️ With lot of blessings by NK Study Point ❤️ देर से बनो पर ज़रूर कुछ बनो क्यूँकि लोग वक़्त के साथ ख़ैरियत नहीं हैसियत पूछते हैं।

Computer Part 1

Computer 100 Questions – Previous HSSC Exams – Part 1

Q1) Which among the following is an empty tag and does not require a closing tag in HTML?
A] <h2>
B] <br>
C] <p>
D] <b>

Q2) Which among the following is a dynamically allocated memory to a process during its run time?
A] Data
B] Text
C] Heap
D] Stack

Who coined the term ‘Artificial Intelligence’?
A] Marvin Minsky
B] John McCarthy
C] Allen Newell
D] Alan Turing

In which among the following layer of the OSI model does multiplexing and splitting of data occurs?
A] Session Layer
B] Data Link Layer
C] Transport Layer
D] Network layer


When you shutdown the Window Operating System computer, it automatically clears the contents of ______ .
A] Hard Drive
B] RAM
C] Floppy Disk
D] CD-ROM
Answer & Explanation

B] RAM

A _____is an input device that can sense hand drawn marks such as small circle or rectangles made on pre-printed format.
A] MBR
B] MICR
C] OCR
D] OMR

From the below statements identify the device referred.
I – It is a device, that provide functionality for other devices.
II – It connects many other computers and provide access to resources like printers, internet, file and programs.

A] Super Computer
B] Server
C] Laptop
D] Workstation

Some Web applications maintain the list of websites and a brief summary of their content in large databases and these large databases are called ____ and these web applications are called _____ .
A] Search Engines, Web Pages
B] Indexes, Search Engines
C] Hyperlink, Web Pages
D] Search Engines, Browsers

The heart of the Computer, CPU has been basic components to perform operations of the computer. What are they?
A] CPU has three basic components – ALU, Memory Unit and Control Unit
B] CPU has three basic components – I/O Unit, Memory Unit and Control Unit
C] CPU has two basis components – Memory Unit, Control Unit
D] CPU has three basic components – ALU, Memory Unit and I/O Unit

User has written a program in a text file and executes it, what happens in this process when the program is loaded into the memory?
A] It is divided into four sections – stack, heap, spool, data
B] It is divided into three sections – process ID, Stack, Data
C] It is divided into four sections – Stack, Heap, Text and data
D] It is divided into two sections – Stack and Data

In E-mail Protocols, POP is one the protocols used. What does POP stand for?
A] Port Open Protocol
B] Physical Office Protocol
C] Process Open Protocol
D] Post Office Protocol

How to manipulate the email message on the server the and avoid downloading it on the local computer?
A] This is possible through SMTP application level protocol which manipulate email message on the email server
B] This is possible through POP which allows the client program to manipulate email message on the server
C] This is possible through SMTP a connections oriented protocol which avoids downloading of emails.
D] This is possible through IMAP which allows the client program to manipulate email message on the server

An _________ translates assembly language into machine code.
A] Compiler
B] Interpreter
C] Assembler
D] Comparator

A page fault is _______ .
A] A spelling error in a page in memory
B] An access to a page not currently in memory
C] A reference to a page which is in another program.
D] An access to a page currently in memory

1- Joy Stick (a) Used to capture images an convert them into digital file format
2- Light Pen                (b) Used to control the movement of cursor
3- Scanners                  © Used to draw pictures on a computer screen or Monitor

A] 1-b, 2-c, 3-a
B] 1-a, 2-c, 3-b
C] 1-c, 2-b, 3-a
D] 1-b, 2-a, 3-c

The ______ monitors user activity on the internet and transmits that information in the background to someone else.
A] Trojan Horses
B] Adware
C] Viruses
D] Spyware (Junior System Engineer Advt No. 11/2019)
Answer & Explanation

 D] Spyware                                             

If the search engine scans the site and gets all information about the site including the URL, it is called as –
A] Sort
B] Crawl
C] Index
D] Rank
Answer & Explanation

 B] Crawl

Which one of the following is an example of a character device?
A] Serial Port
B] Hard Disk
C] Pen Drive
D] USB Camera
Answer & Explanation

 A] Serial Port

An Operating system communicates with the device controller through _____ software.
A] SCSI
B] Device Controller
C] I/O device
D] Device Driver
Answer & Explanation

D] Device Driver

The two references model in the Internet world that serves as a communication architecture are ________ .
A] OSI model and UDP reference Model
B] OSI Model and TCP/ IP reference model
C] TCP/IP and ARCNET reference model
D] SATNET and ARPANET reference model
Answer & Explanation

B] OSI Model and TCP/ IP reference model

BIOS stand for _______
A] Bit-Initiated Operating System
B] Basic Input/ Output System
C] Basic Initial Operating System
D] Bandwidth Initiated Output System
Answer & Explanation

 B] Basic Input/ Output System

Which of the following activities is NOT a part of Process management of the operating system?
A] Scheduling Process and threads on the CPUs.
B] Assigning Memory to process.
C] Creating and Deleting both user and system processes.
D] Providing mechanisms for process synchronization.
Answer & Explanation

 B] Assigning Memory to process.

Which of the following statements is NOT TRUE about video cards?
A] Video cards is attached to the motherboard.
B] Video card controls and calculates an image’s appearance on the screen.
C] Video card enhances the output of images but does not accelerate the video throughput.
D] Video card is also known as graphics Card.
Answer & Explanation

 Video card enhances the output of images but does not accelerate the video throughput.

___________ is a standard Internet Protocol for transmitting files between computers on the Internet over TCP/IP connections.
A] Hyper Text Transfer Protocol (HTTP)
B] Internet Protocol Security (IPSec)
C] Fiber to Home (FTTH)
D] File Transfer Protocol (FTP)
Answer & Explanation

D] File Transfer Protocol (FTP)

What does ‘DAC’ stand for in system security?
A] Direct Access Control
B] Discretionary Access Control
C] Digital and Analog Control
D] Digital to Analog Convertor
Answer & Explanation

B] Discretionary Access Control

A _______ is a classical access enforcement mechanism in operating system architecture.
A] Reference Monitor
B] Authorization Module
C] Policy Store
D] Kernal
Answer & Explanation

 D] Kernal

In ________ system, a unique password is required every time a user tries to login into the system.
A] Authorization
B] Authentication
C] One Time Password
D] Password
Answer & Explanation

C] One Time Password

In Unix/ Linux ______ is the command and system call which is used to change the access permissions of file/ directory.
A] chmod
B] chown
C] chgrp
D] chattr
Answer & Explanation

 A] chmod

What do you call the unsolicited Emails received from false address?
A] Bulk Emails
B] Spam Emails
C] False Emails
D] Threat Emails
Answer & Explanation

B] Spam Emails

_____ is a program designed to infiltrate and damage computers without owner’s approval.
A] Software
B] Hardware
C] Firmware
D] Malware
Answer & Explanation

 D] Malware

Which of the below options is not a computer virus?
A] Capripox Virus
B] Resident Virus
C] Polymorphic Virus
D] Direct Action Virus
Answer & Explanation

A] Capripox Virus

There is a visual indication of _____ ribbon in the documents with invisible digital signatures.
A] Blue
B] Red
C] Black
D] Brown
Answer & Explanation

 A] Blue

______ is a character encoding standard also referred to as ASCII.
A] African standard code for internet interchange
B] American Standard Code for Internet Interchange
C] American Standard Code for Information Interchange
D] African Standard Code for Information Interchange
Answer & Explanation

 C] American Standard Code for Information Interchange

Which of the below is an input peripheral device?
A] Printer
B] Scanner
C] Projector
D] Speakers
Answer & Explanation

 B] Scanner

Which of the below is not a Logical Operator?
A] AND
B] OR
C] XDRD
D] XOR
Answer & Explanation

D] XOR

Which of the below is an input peripheral device?
A] Printer
B] Scanner
C] Projector
D] Speakers
Answer & Explanation

B] Scanner

‘Modem’, a very popular computer peripheral is categorized as ‘_______’ device.
A] Input
B] Output
C] Input/ Output
D] Storage
Answer & Explanation

 C] Input/ Output

The install is a self-compressed Executable file that when you run will extract itself and contains all of the files needed to run your installation.
Which type of software installation can BEST fit the above statement?
A] Media based software Installation
B] Web Based Software Installation
C] Single exe Installation
D] Windows Installer Installation
Answer & Explanation

 C] Single exe Installation

In ______, the ‘ghost’ is created with the complete contents of the computer which are then reinstalled in case of data loss or corruption.
A] Imaged Installation
B] Software-Assisted Installation
C] Scripted Installation
D] Manual software Installations
Answer & Explanation

 A] Imaged Installation

What is the popular path where system engineer creates a home folder for the new software before starting installation on windows operating systems?
A] D:/Program
B] C:\Program Filers
C] E:\Program Files
D] F:/Program Files
Answer & Explanation

 B] C:\Program Filers

Where does the user prefers to place the shortcuts of the newly installed software in windows operating system?
A] Desktop
B] C Drive
C] Documents
D] Favorites
Answer & Explanation

A] Desktop

In software engineering, the process of locating and fixing a bug in the program is called ______ .
A] Testing
B] Processing
C] Running
D] Debugging
Answer & Explanation

 D] Debugging

The _______ sets up an encrypted link for secure data communication with the help of secure software layer or transport layer security.
A] Hyper Transfer Protocol Secure
B] Secure Shell
C] IPsec
D] File Transfer Protocol
Answer & Explanation

 A] Hyper Transfer Protocol Secure

During debugging software if a user wants to halt at a particular line of code, what should he do.
A] Halt manually
B] Add a watch
C] Put a breakpoint
D] Exit the debugger
Answer & Explanation

C] Put a breakpoint

Which of the below options is not a debugging tool?
A] Eclipse
B] Val-grind
C] WinDbg
D] Geany
Answer & Explanation

D] Geany

Antivirus does not protest computers from _______ .
A] Power Failure
B] Computer Worms
C] Spyware
D] Keyloggers
Answer & Explanation

A] Power Failure

If your computer is attacked by a virus then it can do all the below damages except _____ .
A] Damage or Delete files
B] Data loss
C] Slow down the computer
D] Damage the input or output devices
Answer & Explanation

 D] Damage the input or output devices

A network security device that monitors the traffic and filter network traffic based on security rules is _____ .
A] Firewall
B] Threat
C] Vulnerability
D] Attack
Answer & Explanation

 A] Firewall

Out of the below mentioned scans, which takes the maximum time to scan?
A] Full scan
B] Halt Scan
C] Custom Scan
D] Quick Scan
Answer & Explanation

A] Full scan

Which among the following, the user should not do to avoid the virus entering via Email?
A] Take caution when opening graphics and media attachments
B] Disable message preview in your email client
C] Make sure computer has updated antivirus software running.
D] Downloading executable or documents from the internet
Answer & Explanation

 D] Downloading executable or documents from the internet

Window operating system is an example of ______ software.
A] Application software
B] System Software
C] Package Software
D] Custom Software
Answer & Explanation

 B] System Software

Why is System Software called Low-Level-Software?
A] System Software runs on a system with low power
B] System software is written in high level languages to interact with machine software and runs in the computer at advanced level.
C] System software is written in low level languages to interact with hardware and runs in the background at basic level.
D] System software takes lower time to load
Answer & Explanation

C] System software is written in low level languages to interact with hardware and runs in the background at basic level.

Which of the following software acts as an interface between end users and hardware?
A] System Software
B] Custom Software
C] Programming Software
D] Communication Software
Answer & Explanation

 A] System Software

Which of the following is NOT true for System Software?
A] System Software can run independently
B] Device drivers are example of system software
C] System software are provided by computer
D] System Software is specific Purpose software
Answer & Explanation

D] System Software is specific Purpose software

Robotics is an example of ______application.
A] Simulation Software
B] Information Worker Software
C] Multimedia Software
D] Enterprise Software
Answer & Explanation

A] Simulation Software

Word processing software does not include _____ .
A] Notepad
B] Lotus Word Pro
C] Wordpad
D] Keynotes
Answer & Explanation

 D] Keynotes

Which type of application software is used to display information using text, pictures in the form of slides?
A] Multimedia Software
B] Content Access Software
C] Presentation Software
D] Information Worker Software
Answer & Explanation

C] Presentation Software

The application software which is managed remotely by an organization via a cloud by subscribing is known as ______ .
A] Hosted application Software
B] Premise application Software
C] Content Access Software
D] Enterprise Software
Answer & Explanation

A] Hosted application Software

Which of the following is not a feature of the Operating System?
A] Handling I/O Operations
B] Allocation of resources
C] Prevent authorized access
D] Error Handling
Answer & Explanation

C] Prevent authorized access

Which of the following is not a type of operating system?
A] Batch Operating system
B] Distributed Operating System
C] Time Sharing Operating System
D] Real Down time operating system
Answer & Explanation

D] Real Down time operating system

Which one of the following does NOT belong to the real time operating system?
A] Air Traffic control system
B] Missile Systems
C] Space Software Systems
D] LOCUS system
Answer & Explanation

 D] LOCUS system

Which one of the following is NOT an operating system?
A] Ubuntu
B] Window
C] Oxygen OS
D] Trojan Horse
Answer & Explanation

 D] Trojan Horse

Which of the following cannot be termed as software redundancy?
A] Program redundancy
B] Modular redundancy
C] Functional redundancy
D] Temporal redundancy
Answer & Explanation

D] Temporal redundancy

Which of the following is true for the Recovery block scheme?
A] It consists of 3 elements for a given task namely – primary module, acceptance tests, and alternate modules
B] It consists of 4 elements for a given task namely – primary module, secondary module, acceptance tests and acceptance failure.
C] It consists of only 2 elements for a given task namely- primary module and acceptances tests.
D] It consists of many elements for a given task depending on module available and test condition
Answer & Explanation

  A] It consists of 3 elements for a given task namely – primary module, acceptance tests, and alternate modules

RAR is a compressed file that holds one or more other files and folders in compressed form. What does RAR stand for?
A] Roshal Account compressed file
B] Roshal Archive Compressed File
C] Roshal Archive Crammed File
D] Roshal Account Crammed File
Juniro System Engineer Advt 11/2019, Cat 1
Answer & Explanation

 B] Roshal Archive Compressed File

The function ‘Ctrl+A’ is used to ____________ .
A] Convert the text to capital letters
B] Select all text
C] Copy the text
D] Save the text
Answer & Explanation

B] Select all text

Which of the following options should be used to move a sentence from one part of the passage to another part, in a word document?
A] Delete and retype
B] Copy and Paste
C] Cut and paste
D] Find and replace
Answer & Explanation

 C] Cut and paste

The keys present on the top row of a keyboard are –
A] Alphabet keys
B] Numerical Keys
C] Navigation Keys
D] Function Keys
Answer & Explanation

 D] Function Keys

Which of the following is NOT used for browsing the internet?
A] chrome
B] PowerPoint
C] Firefox
D] Internet Explorer
Answer & Explanation

 B] PowerPoint

A low level programming language for microprocessor and other programmable devices is known as –
A] Assembly Language
B] High Level Language
C] Machine Language
D] Language Translator
Answer & Explanation

  A] Assembly Language

In a computer system 4 Bits are equal to _____.
A] 1 Nibble
B] 1 Byte
C] 1 Character
D] 1 Kilo Byte
Answer & Explanation

A] 1 Nibble

In ______ operating System, a user will prepare the job and hand it to a computer operation in form of a device like Punch Card.
A] Multi Programming
B] Time Sharing
C] Batch
D] Distributed
Answer & Explanation

C] Batch

_______ is a network device that modulates and demodulates analog carrier signals for encoding and decoding digital information for processing.
A] Cable Modem
B] Software Modem
C] External Modem
D] Modem
Answer & Explanation

 D] Modem

______device are internal or external device that connect directly to a computer but do not contribute to the computer’s primary function, such as computing.
A] Peripheral
B] Terminal
C] Session
D] Node
Answer & Explanation

 A] Peripheral

A malicious software program that can reside on a computer and can modify, delete the files and can make any software program to act in an unexpected manner is called a _____.
A] Worm
B] Spyware
C] Virus
D] Trojan
Answer & Explanation

C] Virus

In Computer parlance, which of the following options is NOT an Operating System?
A] Window XP
B] Linux
C] DOS
D] Python
Answer & Explanation

D] Python

Which of the following computer devices is both an input an output device and is also a storage device?
A] Monitor
B] Processor
C] Central Processing Unit
D] Keyboard
Answer & Explanation

 C] Central Processing Unit

Which of the following options is NOT a valid email address?
A] contactxzy@abc.corp
B] contactxyz@abc.co.in
C] contactxyz@abc.org
D] contactxyz@abc.gov
Answer & Explanation

 A] contactxzy@abc.corp
What is the full form of ALU?
A] arithmetic login unit
B] arithmetic logic unit
C] allowed logic unit
D] any logic unit
Answer & Explanation

 B] arithmetic logic unit

Which of the below NOT a storage device?
A] SSD
B] DVD
C] HDD
D] BIOS
Answer & Explanation

 D] BIOS

Which one of the following is an example for Volatile Memory?
A] CD
B] DVD
C] RAM
D] Floppy Disk
Answer & Explanation

C] RAM

Second Generation Computers are made up of –
A] Vacuum Tubes
B] Transistors
C] Diodes
D] VLSI Circuits
Protection Assistant, Advt No 11/2019, Cat No. 06
Answer & Explanation

B] Transistors

Laptops and Desktops are examples of _______ computers.
A] Super Computer
B] Mainframe Computer
C] Miniframe Computer
D] Micro Computer
Answer & Explanation

 D] Micro Computer

Which of the following is NOT a type of Operating System?
A] Android
B] Windows
C] Kernal
D] MAC
Answer & Explanation

C] Kernal

Which of the following is an Output Device?
A] Joystick
B] Printer
C] Scanner
D] Light Pen
Answer & Explanation

B] Printer

From the following option, choose the disadvantage of Internet.
A] Spamming
B] Banking
C] Cloud Computing
D] Knowledge and Learning
Answer & Explanation

 A] Spamming

What are the advantages of accessibility features in computers?
A] Computer become vary cost effective
B] People with limited ability can use computer
C] Computer becomes accessible for poor
D] Computer works on its own
Answer & Explanation

 B] People with limited ability can use computer

Which of the following is a Command Line-Operating System?
A] Window 7
B] Windows 2000
C] Unix
D] IOS 10
Answer & Explanation

 C] Unix

USB refers to __________ .
A] A Serial Bus
B] A Processor
C] A Port Type
D] A Storage Device
Answer & Explanation

 C] A Port Type

A ________ is a network security device designed to prevent unauthorized access to or from a private network.
A] Firewall
B] Internet Cable
C] Repeater
D] Modem
Answer & Explanation

 A] Firewall

Which of the following programs is needed to type a letter?
A] MS-Excel
B] MS-Word
C] MS-Robot
D] MS-PowerPoint
Answer & Explanation

 B] MS-Word

The storage in a computing device is measured in Giga Byte.


1 Giga Byte (GB) – ______ MB (Mega Byte)
A] 1048
B] 1052
C] 1024
D] 1216
Answer & Explanation

C] 1024

The mail service of gmail is owned by which of the following companies.
A] GE
B] Facebook
C] Microsoft
D] Google


Answer & Explanation

D] Google

Which among the following is NOT a programming language?
A] Ruby
B] Python
C] COBOL
D] HTML
Answer & Explanation

D] HTML

The operating system basically manages __________ .
A] Hardware resources of the system
B] Software resources of system
C] Database of the system
D] Both hardware and software resources


Answer & Explanation

 D] Both hardware and software resources

Which of the following is NOT true about Braille Reader?
A] The text is sent by the computer to the device
B] In the device, the text is translated into a braille format
C] The main component of a braille reader is display area that uses tiny plastic pins.
D] The output of a braille reader is through audio.


Answer & Explanation

 D] The output of a braille reader is through audio.

SMTP stands for ______________ .
A] Small Mail Transfer Protocol
B] Single Mail Transfer Protocol
C] Simple Mail Transfer Protocol
D] String Mail Transfer Protocol


Answer & Explanation

C] Simple Mail Transfer Protocol

The first digital computer and what most people think of as a computer was called the ________ .
A] COMPATE
B] MECHANIC
C] ENIAC
D] DIGITAL CALCULATOR


Answer & Explanation

C] ENIAC

What do we call a person who controls the computer?
A] Live Ware
B] Programmer
C] Analyst
D] Controller


Answer & Explanation

A] Live Ware

What is meant by ‘operating system’ in computers?
Choose from following options –
A] Mouse
B] Keyboard
C] System Software
D] Hardware


Answer & Explanation

C] System Software

Early computers used ______ and were large (sometimes room size) and were only found in business, universities or governments.
A] Transistors
B] Hard Discs
C] Cardinal Wires
D] Vacuum Tubes
Answer & Explanation

 D] Vacuum Tubes

Post a Comment

0 Comments