Computer Awareness Questions for NIACL Assistant

1.

The simultaneous processing of executing two or more programs by multiple processors is-

   A.) multiprogramming
   B.) multitasking
   C.) time-sharing
   D.) multiprocessing

Answer: Option 'D'

Multiprocessing is the capability of a computer to multitask, 0or execute more than one program or process at the same time.

2.

What should be used if a company wants to include its company name and logo at the bottom of every page of a brochure?

   A.) Header
   B.) Macro
   C.) Footer
   D.) Footnote

Answer: Option 'C'

Headers and footers are pieces of text, or graphics, that appear at the top and bottom of a page. If a company wants to include its company name and logo at the bottom of every page of a brochure then it will use the Footer.

3.

The ______________ folder retains copies of messages that you have started but are not yet ready to send.

   A.) Drafts
   B.) Outbox
   C.) Address Book
   D.) Sent Items

Answer: Option 'A'

Draft document is a type of technical report that is a work in progress, a preliminary form of a possible future document. 

4.

In number system, LSD stands for ___________.

   A.) Left Significant Digit
   B.) Low Simple Digit
   C.) Low Significant Digit
   D.) Least Significant Digit

Answer: Option 'D'

In number system, LSD stands for Least Significant Digit. It refers to those digits that carry least weight.

5.

Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups? 

   A.) Program thievery
   B.) Data snatching
   C.) Software piracy
   D.) Program looting

Answer: Option 'C'

Software piracy is the illegal copying, distribution, or use of software.

6.

What should be used if a company wants to include its company name and logo at the bottom of every page of a brochure?

   A.) Header
   B.) Macro
   C.) Footer
   D.) Footnote

Answer: Option 'C'

Headers and footers are pieces of text, or graphics, that appear at the top and bottom of a page. If a company wants to include its company name and logo at the bottom of every page of a brochure then it will use the Footer.

7.

What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?

   A.) CMOS
   B.) RAM
   C.) DRAM
   D.) CPU

Answer: Option 'A'

The CMOS is a physical part of the motherboard: it is a memory chip that houses setting configurations and is powered by the onboard battery. The CMOS is reset and loses all custom settings in case the battery runs out of energy, additionally, the system clock resets when the CMOS loses power.

8.

What is ‘Trend Micro’?

   A.) virus program
   B.) anti-virus software
   C.) just a program
   D.) All of these

Answer: Option 'B'

Trend Micro is an antivirus.

9.

The process of a computer receiving information from a server on the internet is known as _______.

   A.) Browsing
   B.) Download
   C.) Upload
   D.) All of these 

Answer: Option 'B'

Downloading is the process of a computer receiving information from a server.

10.

Which among the following type of computers is also known informally as Number crunchier?  

   A.) Mini computer 
   B.) Super computer 
   C.) Micro computer 
   D.) Mainframe computer 

Answer: Option 'B'

Super Computers are also known as number crunchers. A super computer's dominant characteristic is its ability to perform large amounts of numerical computations quickly.

11.

A nibble refers to: 

   A.) 4 bits 
   B.) A value equal to a kilobyte 
   C.) A value equal to a megabyte 
   D.) The smallest unit of digital information 

Answer: Option 'A'

Nibble= 4 Bits

12.

DBMS ensures data integrity by managing transactions through ACID test. What does ACID stands for in computer science?

   A.) Artistic, collaborative, inference, durability
   B.) analytic, consistency, inference, duration
   C.) Atomicity, consistency, isolation, durability
   D.) Atomicity, collaborative, inference duration

Answer: Option 'C'

ACID (Atomicity, Consistency, Isolation, and Durability) is a set of properties of database transactions.

13.

Which of the following component is a part of RAM? 

   A.) Magnetic cores 
   B.) Micro-Processors 
   C.) Photoelectric cells 
   D.) Floppy disks 

Answer: Option 'A'

Magnetic-core memory was the predominant form of random-access computer memory for 20 years between about 1955 and 1975. Such memory is often just called core memory, or, informally, core.

14.

FORTRAN is a programming language. It is more suitable for _______.

   A.) business applications
   B.) marketing applications
   C.) scientific applications
   D.) statically calculative applications

Answer: Option 'C'

FORTRAN is the best and only major programming language for scientific applications. It is designed for performing large and complex scientific numerical computing.

15.

Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?

   A.) hacker 
   B.) analyst
   C.) instant messenger 
   D.) programmer

Answer: Option 'A'

hacker is someone who seeks and exploits weaknesses in a computer system.

16.

_________ is a web server that collects data from other web servers and puts it into a database (much like an index), it provides links to pages that contain the object of your search.

   A.) Search Engine
   B.) Browser
   C.) FTP
   D.) HTTP

Answer: Option 'A'

Search Engine is a web server that collects data from other web servers and puts it into a database (much like an index), it provides links to pages that contain the object of your search.

17.

Which of the following is a term related with scanner?  

   A.) Laser
   B.) TWAIN
   C.) Cartridge
   D.) Both (a) and (b)

Answer: Option 'D'

Laser is the term related with scanner as there are laser scanners. TWAIN is an applications programming interface (API) and communications protocol that regulates communication between software and digital imaging devices, such as image scanners. It is a widely-used program that lets you scan an image (using a scanner) directly into the application.

18.

The SubSeven is an example of :

   A.) antivirus
   B.) Spyware
   C.) Spam
   D.) Trojan horse

Answer: Option 'D'

SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.

19.

Which bar is usually located below the Title Bar in MS Word that provides categorized options?

   A.) Menu Bar
   B.) Toolbar
   C.) Status bar 
   D.) Scroll Bar

Answer: Option 'A'

The Menu Bar is the horizontal band that contains commands and options that can be chosen.

20.

The conversion of the binary number 10100111011 into its decimal form is __________.

   A.) 133910
   B.) 134910
   C.) 139310
   D.) 193910

Answer: Option 'A'

133910


Computer Awareness Questions for NIACL Assistant Download Pdf

Recent Posts