Computer Questions for NICL AO Mains for 2019

1.

The layers of the OSI model, from the top down, are:

   A.) application, presentation, session, transport, network, data link, physical
   B.) session, presentation, data transport, MAC, network, physical
   C.) physical, data link, network, transport, session, presentation, application
   D.) presentation, application, session, network, transport, data link, physical

Answer: Option 'A'

Following is the correct order of layers in OSI Model:
Layer 7- Application Layer
Layer 6 –Presentation Layer
Layer 5 – Session Layer
Layer 4 – Transport Layer
Layer 3 – Network Layer
Layer 2 – Data Link Layer
Layer 1 – Physical Layer

2.

Which of the following is not a DBMS software?

   A.) dBASE
   B.) FoxPro
   C.) Oracle
   D.) Database2000

Answer: Option 'D'

Database2000 is not a DBMS Software.

3.

Name the input device from the given options, that cannot be used to work in MS Office?

   A.) Scanner 
   B.) Mouse 
   C.) Keyboard 
   D.) Joy stick 

Answer: Option 'D'

Joystick is used for gaming purpose and MS Word is a text editing application.

4.

HTTP is a/an ________ protocol.

   A.) application layer
   B.) transport layer
   C.) network layer
   D.) Physical Layer

Answer: Option 'A'

The HyperText Transfer Protocol, or HTTP, is the most widely used Application layer protocol in the world today. It forms the basis of what most people understand the Internet to be—the World Wide Web. Its purpose is to provide a lightweight protocol for the retrieval of HyperText Markup Language (HTML) and other documents from Web sites throughout the Internet. Each time you open a Web browser to surf the Internet, you are using HTTP over TCP/IP.

5.

Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?

   A.) hacker 
   B.) analyst
   C.) instant messenger 
   D.) programmer

Answer: Option 'A'

hacker is someone who seeks and exploits weaknesses in a computer system.

6.

In Microsoft PowerPoint, two kinds of sound effects files that can be added to the presentation are:

   A.) .wav files and .mid files
   B.) .wav files and .gif files
   C.) .wav files and .jpg files
   D.) .jpg files and .gif files

Answer: Option 'A'

mid files- It is a uniform format accepted by electronic music industry
.wav files - This format is considered to be the official format

7.

Which of the following is not a network topology?

   A.) Co-linear
   B.) Bus
   C.) Rhombus
   D.) Both (a) and (c) 

Answer: Option 'D'

Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. Some popular network topologies are Star, Ring, Bus, Mesh, Tree and Hybrid topology

8.

LANs can be connected by devices called ______ which operate on the data link layer.

   A.) hub
   B.) HDLC
   C.) bridges
   D.) tunnel

Answer: Option ''

LANs can be connected by bridges. Bridge is a device used to connect two separate Ethernet networks into one extended Ethernet.

9.

A nibble refers to: 

   A.) 4 bits 
   B.) A value equal to a kilobyte 
   C.) A value equal to a megabyte 
   D.) The smallest unit of digital information 

Answer: Option 'A'

Nibble= 4 Bits

10.

Which of the following HTML elements is the starting element in all HTML document?

   A.) Root
   B.) Metadata
   C.) Section
   D.) Heading

Answer: Option 'A'

The Root element is the starting element in an HTML document, and it is present in all HTML documents.

11.

IP addresses are converted to ____________.

   A.) a bit
   B.) alphanumeric string
   C.) a hierarchy of domain names
   D.) TCP

Answer: Option 'C'

IP addresses are converted to a hierarchy of domain names.

12.

From which of the following contents are lost when a computer is turned off?

   A.) non-volatile storage
   B.) input
   C.) output
   D.) volatile storage

Answer: Option 'D'

Volatile memory, contrary to non-volatile memory, is computer memory that requires power to maintain the stored information; it retains its contents while powered on but when the power is interrupted, the stored data is lost immediately or very rapidly.

13.

A __________ is a property of the entire relation, rather than of the individual tuples in which each tuple is unique.

   A.) Rows
   B.) Key
   C.) Attribute
   D.) Fields

Answer: Option 'B'

Key is a property of the entire relation (relation is a table).

14.

A nibble refers to: 

   A.) 4 bits 
   B.) A value equal to a kilobyte 
   C.) A value equal to a megabyte 
   D.) The smallest unit of digital information 

Answer: Option 'A'

Nibble= 4 Bits

15.

A __________ is an abstract model that describes, how the data are organised and represented.

   A.) data model
   B.) instances
   C.) schema
   D.) database

Answer: Option 'A'

Data model is an abstract model that describes, how the data are organized and represented.

16.

The altering of data so that it is not usable unless the changes are undone is _______.  

   A.) Biometrics 
   B.) Compression 
   C.) Encryption 
   D.) Ergonomics 

Answer: Option 'C'

Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.

17.

Queries in Access can be used as :

   A.) View, change and analyse data in different ways
   B.) A source of records for forms and reports 
   C.) to access internet
   D.) Both a and b

Answer: Option ''

Using a query makes it easier to view, add, delete, or change data in your Access database. Some other reasons for using queries:
Find specific quickly data by filtering on specific criteria (conditions),Calculate or summarize data
Automate data management tasks, such as reviewing the most current data on a recurring basis.

18.

Functions of keys F1, F2 and F3 are _____________ respectively.

   A.) activating menu bar, search and renaming selected icon
   B.) search, reboot and activating menu bar
   C.) activating help, renaming selected icon and search
   D.) reboot, activating help and refresh

Answer: Option 'C'

Functions of keys F1, F2 and F3 are activating help, renaming selected icon and search respectively.

19.

The smallest unit of information, a computer can understand and process is known as ________.

   A.) Digit 
   B.) Byte 
   C.) Megabyte 
   D.) Bit 

Answer: Option 'D'

Bit is the smallest unit of information.

20.

Which of the following is not a DBMS software?

   A.) dBASE
   B.) FoxPro
   C.) Oracle
   D.) Database2000

Answer: Option 'D'

Database2000 is not a DBMS Software.


Computer Questions for NICL AO Mains Download Pdf

Recent Posts