Blogroll

Computer Questions for NICL AO Mains 2017

Computer Questions for NICL AO Mains 2017

Q1. The icons on the __________ are organized according to function and according to the most commonly used commands in MSWord.
(a) GUI
(b) Icon layout 
(c) toolbars
(d) Windows 
(e) None of these 

S1. Ans. (c) 
Sol.  The icons on the toolbars are organized according to function and according to the most commonly used commands in MSWord. The toolbar that usually appears directly below the menu bar is called the Standard Toolbar. The toolbar just below that is called the Formatting Toolbar.

Q2. If you wish to extend the length of the network without having the signal degrade, you would use a _____. 
(a) Repeater 
(b) Router 
(c) Gateway 
(d) Switch 
(e) None of these 

S2. Ans. (a)
Sol. A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.

Q3. What is a Firewall in Computer Network? 
(a) The physical boundary of Network 
(b) An operating System of Computer Network 
(c) A system designed to prevent unauthorized access  
(d) A web browsing Software 
(e) None of these 

S3. Ans. (c)
Sol. Firewall in Computer Network is a system designed to prevent unauthorized access.

Q4. The data to be encrypted at the sender site is called _____ and the data to be decrypted at the receiver end is called _____. 
(a) Secret key, public key  
(b) Public key, secret key 
(c) Plain text, cipher text 
(d) Cipher text, plain text 
(e) None of these

S4. Ans. (c)
Sol. In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm

Q5. Functions of keys F1, F2 and F3 are _____________ respectively.
(a) activating menu bar, search and renaming selected icon
(b) search, reboot and activating menu bar
(c) activating help, renaming selected icon and search
(d) reboot, activating help and refresh
(e) activating help, reboot, renaming selected icon

S5. Ans. (c)
Sol. Functions of keys F1, F2 and F3 are activating help, renaming selected icon and search respectively.

Q6. Name the input device from the given options that cannot be used to work in MS Office?
(a) Scanner 
(b) Mouse 
(c) Keyboard 
(d) Joy stick 
(e) All of the above 

S6. Ans. (d)
Sol. Joystick is used for gaming purpose and MS Word is a text editing application.

Q7. ________ is usually recorded and played, displayed, or accessed by information content processing devices, such as computerized and electronic devices, but can also be part of a live performance. 
(a) Virus  
(b) BIOS software 
(c) Multimedia 
(d) C++
(e) None of these 

S7. Ans.(c)
Sol.  Multimedia is content that uses a combination of different content forms such as text, audio, images, animation, video and interactive content. Multimedia can be recorded and played, displayed, dynamic, interacted with or accessed by information content processing devices, such as computerized and electronic devices, but can also be part of a live performance.

Q8. When your computer stops working suddenly, it is referred to as a __________.
(a) crash 
(b) die
(c) death 
(d) penalty
(e) None of these

S8. Ans.(a)
Sol. A crash (or system crash) in computing is when a computer program, such as a software application or an operating system, stops functioning properly. Often the program will exit after encountering this type of error.

Q9. Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information?
(a) Floppy diskette
(b) Hard disk 
(c) Permanent disk
(d) Optical disk
(e) None of the above

S9. Ans.(b)
Sol. A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.

Q10. What is SQL?
(a) Language used to communicate with database 
(b) Language used for object oriented programming 
(c) Language used to program system software
(d) Language used to hack into other systems
(e) Language used for programming devices

S10. Ans.(a)
Explanation: SQL is a language used to communicate with database.

Q11. The most widely used type of database management system is the:
(a) Flat database
(b) Network database
(c) Relational database 
(d) Hierarchical database
(e) None of the above

S11. Ans.(c)
Sol. A relational database management system (RDBMS) is a database management system (DBMS) that is based on the relational model as invented by E. F. Codd. Relational databases have often replaced legacy hierarchical databases and network databases because they are easier to understand and use.

Q12. Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
(a) Toggle 
(b) Cold booting
(c) Warm booting 
(d) Logging off
(e) None of these

S12. Ans.(b)
Sol.  Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.

Q13. What type of Internet company provides pay-per-use software?
(a) Software leasing
(b) Software developers
(c) Software-as-a-service (Saas)
(d) Application service provider (ASP)
(e) None of the above

S13. Ans.(d)
Sol. An Application Service Provider (ASP) is a business providing computer-based services to customers over a network; such as access to a particular software application (such as customer relationship management) using a standard protocol (such as HTTP).

Q14. ________ is a protocol-based communication system between a server and its clients.  
(a) Selector 
(b) Web socket 
(c) Web worker 
(d) Modernizr 
(e) None of these 

S14. Ans.(b)
Sol. Web socket is a protocol-based communication system between a server and its clients. It allows bidirectional communication between a Web browser and a Web server with the help of Transmission Control Protocol (TCP) connection. 

Q15. Which of the following detects whether the features of HTML5 and CSS3 are supported by your browser or not?  
(a) Web socket 
(b) Web worker 
(c) Modernizr 
(d) Geolocation 
(e) None of these 

S15. Ans.(c)
Sol. Modernizr is an open-source JavaScript library that detects whether the features of HTML5 and CSS3 are supported by a browser or not.
Jika Anda menyukai Artikel di blog ini, Silahkan klik disini untuk berlangganan gratis via email, dengan begitu Anda akan mendapat kiriman artikel setiap ada artikel yang terbit di TULISKAN.com

0 comments:

Post a Comment

thank you

Popular Posts

Blog Archive