Computer Questions for NICL AO Mains for 2019

1.

What is the diagnostic testing sequence of a computer called that determines if all input and output devices are properly working?  

   A.) rebooting 
   B.) POST
   C.) scanning 
   D.) defragmentation 

Answer: Option 'B'

POST is a diagnostic testing sequence of a computer that is run before the actual booting to ensure that the computer hardware is functioning well. It stands for ‘Power-On Self-Test’. 

2.

What is ‘Trend Micro’?

   A.) virus program
   B.) anti-virus software
   C.) just a program
   D.) All of these

Answer: Option 'B'

Trend Micro is an antivirus.

3.

The software that is used to create text based documents is referred as :

   A.) DBMS
   B.) Suits 
   C.) Spreadsheets 
   D.) Word processor 

Answer: Option 'D'

Word processors are used to create text-based documents.

4.

______ is a set of keywords, symbols and a system of rules for constructing statements by which human can communicate the instructions to be executed by a computer. 

   A.) A computer program 
   B.) A programming language 
   C.) An assemble 
   D.) Computer I/O Device

Answer: Option 'B'

A programming language is a formal computer language or constructed language designed to communicate instructions to a machine, particularly a computer. Programming languages can be used to create programs to control the behaviour of a machine or to express algorithms.

5.

To which of the following categories do operating systems and debuggers belong? 

   A.) System software 
   B.) Application software 
   C.) Utilities 
   D.) Programming Language

Answer: Option 'B'

System software is developed to serve as a bridge between the hardware and the user, as the software directly communicates with the hardware. Operating systems and debuggers are two best examples of system software.  

6.

What is a spooler? 

   A.) Type of printer 
   B.) Peripheral device 
   C.) Program 
   D.) Output device  

Answer: Option 'C'

Spooler is a program in computing that is used to line up print jobs by storing them in the buffer for a short time and allows the printer to print at the time when it is use.  

7.

Who invented the QWERTY keyboard?

   A.) Carl Sholes
   B.) Karl Sholes
   C.) Christopher Latham Sholes
   D.) Khristopher Sholes

Answer: Option 'C'

Christopher Latham Sholes invented the keyboard in 1868.

8.

______ controls the way in which the computer system functions and provides a means by which users can interact with computer. 

   A.) The platform 
   B.) The operating system 
   C.) Application software 
   D.) The motherboard 

Answer: Option ''

The operating system serves as a platform for user and hardware/computer component’s interaction.

9.

Which among the following is a software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?

   A.) Multimedia Player  
   B.) Backup software 
   C.) Utility programs 
   D.) Antivirus Software

Answer: Option 'D'

Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.

10.

Who is the father of computers? 

   A.) Ada Byron 
   B.) Charles Babbage 
   C.) Blaise Pascal 
   D.) Herman Hollerith 

Answer: Option 'B'

Charles Babbage is the father of computers.

11.

Which one of the following is a set of one or more attributes taken collectively to uniquely identify a record?

   A.) Substitute Key
   B.) Sub key
   C.) Super key
   D.) Foreign key

Answer: Option 'C'

Super key is a set of one or more attributes taken collectively to uniquely identify a record.

12.

Which among the following is software application commonly used to prepare a presentation/slide show?

   A.) Adobe
   B.) Power Point
   C.) Outlook Express 
   D.) Internet Explorer

Answer: Option 'B'

PowerPoint is used to make presentations/slide shows.

13.

IP addresses are converted to ______________.

   A.) A binary string 
   B.) Alphanumeric string 
   C.) A hierarchy of domain names 
   D.) A decimal string 

Answer: Option 'C'

IP addresses are converted to a hierarchy of domain names

14.

Which among the following is the smallest unit of storage:

   A.) Byte 
   B.) Bit
   C.) Bug
   D.) Nibble 

Answer: Option 'B'

Bit is smallest unit of storage, Nibble= 4Bits, Byte= 8Bits. 

15.

Which of the following is not a DBMS software?

   A.) dBASE
   B.) FoxPro
   C.) Oracle
   D.) Database2000

Answer: Option 'D'

Database2000 is not a DBMS Software.

16.

LANs can be connected by devices called ______ which operate on the data link layer.

   A.) hub
   B.) HDLC
   C.) bridges
   D.) tunnel

Answer: Option ''

LANs can be connected by bridges. Bridge is a device used to connect two separate Ethernet networks into one extended Ethernet.

17.

What does P2P stands for? 

   A.) Peer To Peer
   B.) Peek to peek
   C.) Past to past
   D.) Pair to pair

Answer: Option 'A'

P2P stands for Peer To Peer.

18.

DBMS ensures data integrity by managing transactions through ACID test. What does ACID stands for in computer science?

   A.) Artistic, collaborative, inference, durability
   B.) analytic, consistency, inference, duration
   C.) Atomicity, consistency, isolation, durability
   D.) Atomicity, collaborative, inference duration

Answer: Option 'C'

ACID (Atomicity, Consistency, Isolation, and Durability) is a set of properties of database transactions.

19.

Copying a process from memory to disk to allow space for other processes is called _______.

   A.) Swapping
   B.) Deadlock
   C.) Demand Paging
   D.) Page Fault

Answer: Option 'A'

Swapping concept comes in terms of process scheduling. Scheduler removes process from CPU for duration and reduces the degree of multiprogramming. And after some time these process can again be reintroduced into main memory. 

20.

The default and maximum size of text filed in Access is ______.

   A.) 266 characters & 6400 characters 
   B.) 288 characters & 6880 characters 
   C.) 299 characters & 6499 characters 
   D.) 50 and 255 characters 

Answer: Option 'D'

The default and maximum size of text filed in Access is 50 and 255 characters.


Computer Questions for NICL AO Mains Download Pdf

Recent Posts