Monday, 12 June 2017

Computer Questions for NICL AO Mains 2017

Computer Questions for NICL AO Mains 2017

Q1. What is the maximum zoom percentage in Microsoft PowerPoint?  
(a) 100%
(b) 200%
(c) 400%
(d) 500%
(e) None of these

S1. Ans.(c)
Sol. 400% is the max. zoom percentage in PowerPoint.

Q2. Which among the following option does DBMS helps to achieve?
(a) Data independence
(b) More redundancy
(c) Centralised manner to control of data 
(d) Both (a) and (c)
(e) None of the above

S2. Ans.(d)
Sol.  DBMS reduces data redundancy, provide a centralised manner to control of data and enabled data independence.

Q3. What is Telnet? 
(a) Network or Telephones
(b) Television Network
(c) Remote Login
(d) All of these
(e) None of these

S3. Ans.(c)
Sol.  Telnet is an application layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.

Q4. What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?
(a) CMOS
(b) RAM
(c) DRAM
(d) CPU
(e) None of these 


S4. Ans.(a)
Sol. The CMOS is a physical part of the motherboard: it is a memory chip that houses setting configurations and is powered by the on board battery. The CMOS is reset and loses all custom settings in case the battery runs out of energy. Additionally, the system clock resets when the CMOS loses power.

Q5. Which of the following is a machine independent program? 
(a) High level language
(b) Low level language
(c) Assembly language
(d) Machine language
(e) None of these

S5. Ans.(a)
Sol. It is a machine independent language. It enables user to write programs in a language which resemble English words and familiar mathematical symbols.

Q6.  Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups? 
(a) program thievery
(b) data snatching
(c) software piracy
(d) program looting
(e) data looting

S6. Ans.(c)
Sol. Software piracy is the illegal copying, distribution, or use of software.

Q7. In first generation of computers, they used ______.
(a) batch processing
(b) multithreading
(c) multiprogramming
(d) networking
(e) All of the above

S7. Ans.(a)
Sol. In First Generation mainly batch processing operating system were used.

Q8. Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
(a) hacker
(b) analyst
(c) instant messenger
(d) programmer
(e) spammer

S8. Ans.(a)
Sol.  Hacker is someone who seeks and exploits weaknesses in a computer system.

Q9. Which of the following option may be used to change page-size and margins?
(a) Page Layout
(b) View
(c) Tools
(d) Data
(e) None of these

S9. Ans. (a)
Sol. Page Layout is used may be used to change page-size and margins.

Q10. To justify the selected text, the shortcut key is __________.
(a) Ctrl + 1
(b) Ctrl + J
(c) Ctrl + U
(d) Ctrl + Alt + K
(e) Ctrl + N

S10. Ans. (b)
Sol. Ctrl + J is the shortcut key to justify text.

Q11. The ability of an operating system to run more than one application at a time is called _________.
(a) Multi-tasking
(b) Object-oriented programming
(c) Multi-user computing
(d) Real-Time
(e) None of the above

S11. Ans. (a)
Sol. The ability of an operating system to run more than one application at a time is called Multi-tasking.

Q12. Which one of the following(s) is/are/ real time operating system? 
(a) VxWorks
(b) Windows CE
(c) RTLinux
(d) All of these
(e) None of these

S12. Ans. (d)
Sol. VxWorks, Windows CE, RTLinux are real time OS.

Q13. Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
(a) Toggle
(b) Cold booting
(c) Warm booting
(d) Logging off
(e) None of these

S13. Ans.(b)
Sol.  Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.

Q14. What type of Internet Company provides pay-per-use software?
a) Software leasing
b) Software developers
c) Software-as-a-service (Saas)
d) Application service provider (ASP)
e) None of the above

S14. Ans.(d)
Sol. An Application Service Provider (ASP) is a business providing computer-based services to customers over a network; such as access to a particular software application (such as customer relationship management) using a standard protocol (such as HTTP).

Q15. What is/are different view(s) to display a table in MS Access?
(a) Pivot Table & Pivot Chart View
(b) Design View
(c) Datasheet View
(d) All of the above
(e) None of the above

S15. Ans.(d)
Sol. All are views to display a table in MS Access

No comments:

Post a Comment

thank you

Contact Form

Name

Email *

Message *