Computer Awareness Questions for NIACL Assistant

1.

Which of the following is a term related with scanner?  

   A.) Laser
   B.) TWAIN
   C.) Cartridge
   D.) Both (a) and (b)

Answer: Option 'D'

Laser is the term related with scanner as there are laser scanners. TWAIN is an applications programming interface (API) and communications protocol that regulates communication between software and digital imaging devices, such as image scanners. It is a widely-used program that lets you scan an image (using a scanner) directly into the application.

DigitalOcean Referral Badge

2.

FORTRAN is a programming language. It is more suitable for _______.

   A.) business applications
   B.) marketing applications
   C.) scientific applications
   D.) statically calculative applications

Answer: Option 'C'

FORTRAN is the best and only major programming language for scientific applications. It is designed for performing large and complex scientific numerical computing.

DigitalOcean Referral Badge

3.

__________ ensures secure transfer of data over an unsecured network, such as the Internet.

   A.) Antivirus
   B.) Hacking
   C.) Cracking
   D.) Cryptography

Answer: Option 'D'

In cryptography, data are sent in such a way that they look completely different from the original data. Thus, cryptography ensures secure transfer of data over an unsecured network.

DigitalOcean Referral Badge

4.

A nibble refers to: 

   A.) 4 bits 
   B.) A value equal to a kilobyte 
   C.) A value equal to a megabyte 
   D.) The smallest unit of digital information 

Answer: Option 'A'

Nibble= 4 Bits

DigitalOcean Referral Badge

5.

The SubSeven is an example of :

   A.) antivirus
   B.) Spyware
   C.) Spam
   D.) Trojan horse

Answer: Option 'D'

SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.

DigitalOcean Referral Badge

6.

Which of the following component is a part of RAM? 

   A.) Magnetic cores 
   B.) Micro-Processors 
   C.) Photoelectric cells 
   D.) Floppy disks 

Answer: Option 'A'

Magnetic-core memory was the predominant form of random-access computer memory for 20 years between about 1955 and 1975. Such memory is often just called core memory, or, informally, core.

DigitalOcean Referral Badge

7.

Which of the following threads is used in an operating system?

   A.) User-level thread
   B.) Kernel-level thread
   C.) Hardware-level thread
   D.) Both (a) and (b)

Answer: Option 'D'

There are only two types of threads present in an operating system. One is user-level thread and the other is kernel-level thread. User-level threads are the threads which are controlled and managed by the user of the computer system. Kernel-level threads are the threads which are controlled and created by the operating system. These threads are at the kernel level of the computer system. Kernel is the one who creates the threads.

DigitalOcean Referral Badge

8.

Which among the following is a software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?

   A.) Multimedia Player  
   B.) Backup software 
   C.) Utility programs 
   D.) Antivirus Software

Answer: Option 'D'

Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.

DigitalOcean Referral Badge

9.

Which of the following conditions is responsible for occurrence of context switching?

   A.) When one process expires and a new one is loaded from a ready queue
   B.) No processes are in the ready queue
   C.) When a process is running
   D.) When the CPU is at rest

Answer: Option 'A'

A context switching comes into the picture when the time period provided for one process is over and a new process is loaded from the ready queue for processing.

DigitalOcean Referral Badge

10.

Which among the following is the most suitable type of network that phone lines would use?

   A.) WAN
   B.) LAN
   C.) WWAN
   D.) CAN

Answer: Option 'A'

Wide Area Network (WAN) usually uses telephone lines for connectivity, as WAN is spread over a large area and offers Internet-related services such as browsing, email, chatting, etc.

DigitalOcean Referral Badge

11.

The software that is used to create text based documents is referred as :

   A.) DBMS
   B.) Suits
   C.) Spreadsheets
   D.) Word processor 

Answer: Option 'D'

Word processors are used to create text-based documents.

DigitalOcean Referral Badge

12.

What acts as master software that works as a mediator between a computer user and the hardware of a computer?

   A.) Application Program
   B.) Motherboard
   C.) Antivirus
   D.) Operating System

Answer: Option 'D'

Operating system provided an interface between a user and computer hardware. It enables a user to utilize hardware resources efficiently.

DigitalOcean Referral Badge

13.

Which among the following type of computers is also known informally as Number crunchier?  

   A.) Mini computer 
   B.) Super computer 
   C.) Micro computer 
   D.) Mainframe computer 

Answer: Option 'B'

Super Computers are also known as number crunchers. A super computer's dominant characteristic is its ability to perform large amounts of numerical computations quickly.

DigitalOcean Referral Badge

14.

______ is a set of keywords, symbols and a system of rules for constructing statements by which human can communicate the instructions to be executed by a computer. 

   A.) A computer program 
   B.) A programming language 
   C.) An assemble 
   D.) Computer I/O Device

Answer: Option 'B'

A programming language is a formal computer language or constructed language designed to communicate instructions to a machine, particularly a computer. Programming languages can be used to create programs to control the behaviour of a machine or to express algorithms.

DigitalOcean Referral Badge

15.

Which of the following is the type of software that controls the internal operations in the computer and controls how the computer works with all its parts?

   A.) Shareware
   B.) Public domain software
   C.) Application software
   D.) Operating system software

Answer: Option 'D'

An operating system (OS) is a program or software that manages and coordinates the functions of all the components of a computer. It also acts as an interface between the user and the hardware of a computer.

DigitalOcean Referral Badge

16.

Which of the following is the activity of purchasing items and products from different websites on the internet and using online modes, such as credit cards and debit cards, to make the payments?  

   A.) E-banking 
   B.) Online shopping 
   C.) Online reservation 
   D.) M-reservation 

Answer: Option 'B'

The activity of purchasing items from different websites on the internet is known as online shopping. 

DigitalOcean Referral Badge

17.

The process of a computer receiving information from a server on the internet is known as _______.

   A.) Browsing
   B.) Download
   C.) Upload
   D.) All of these 

Answer: Option 'B'

Downloading is the process of a computer receiving information from a server.

DigitalOcean Referral Badge

18.

What does BASIC stands for? 

   A.) Beginner’s All-purpose Simple Instruction Code
   B.) Beginner’s All-purpose Symbolic Intention Code  
   C.) Beginner’s All-purpose symbolic Instruction code 
   D.) Beginner’s All-purpose Symbolic Instruction Cell 

Answer: Option 'C'

BASIC stands for Beginner’s All-purpose symbolic Instruction code.

DigitalOcean Referral Badge

19.

______ uses a standard called IEEE802.6. 

   A.) LAN
   B.) WAN
   C.) MAN
   D.) Internet

Answer: Option 'C'

IEEE 802.6 is a standard governed by the ANSI for Metropolitan Area Networks (MAN).

DigitalOcean Referral Badge

20.

In number system, LSD stands for ___________.

   A.) Left Significant Digit
   B.) Low Simple Digit
   C.) Low Significant Digit
   D.) Least Significant Digit

Answer: Option 'D'

In number system, LSD stands for Least Significant Digit. It refers to those digits that carry least weight.

DigitalOcean Referral Badge

21.

IP addresses are converted to ______________.

   A.) A binary string 
   B.) Alphanumeric string 
   C.) A hierarchy of domain names 
   D.) A decimal string 

Answer: Option 'C'

IP addresses are converted to a hierarchy of domain names

DigitalOcean Referral Badge

22.

The conversion of the binary number 10100111011 into its decimal form is __________.

   A.) 133910
   B.) 134910
   C.) 139310
   D.) 193910

Answer: Option 'A'

133910

DigitalOcean Referral Badge

23.

Word processing, spreadsheet and photo-editing are examples of________.

   A.) application software
   B.) system software
   C.) operating system software
   D.) platform software

Answer: Option 'A'

Word processing, spreadsheet and photo-editing are examples of application software

DigitalOcean Referral Badge

24.

The primary purpose of a computer is to process _____________ and convert it into information.

   A.) electricity
   B.) data
   C.) raw material
   D.) a bit

Answer: Option 'B'

Before data is processed by a computer, it has to be fed into the computer using a keyboard, mouse or another input device. The central processing unit (CPU) analyses the raw data and processes it into sensible information. 

DigitalOcean Referral Badge

25.

The simultaneous processing of executing two or more programs by multiple processors is-

   A.) multiprogramming
   B.) multitasking
   C.) time-sharing
   D.) multiprocessing

Answer: Option 'D'

Multiprocessing is the capability of a computer to multitask, 0or execute more than one program or process at the same time.

DigitalOcean Referral Badge

26.

Help Menu is available at which button?

   A.) End
   B.) Start
   C.) Turnoff
   D.) Restart

Answer: Option 'B'

Help Menu is available at Start button.

DigitalOcean Referral Badge

27.

What should be used if a company wants to include its company name and logo at the bottom of every page of a brochure?

   A.) Header
   B.) Macro
   C.) Footer
   D.) Footnote

Answer: Option 'C'

Headers and footers are pieces of text, or graphics, that appear at the top and bottom of a page. If a company wants to include its company name and logo at the bottom of every page of a brochure then it will use the Footer.

DigitalOcean Referral Badge

28.

Linux is an OS based on_____.

   A.) UNIX
   B.) Network node
   C.) J2EEE
   D.) Python

Answer: Option 'B'

The Linux open source operating system, or Linux OS, is a freely distributable, cross-platform operating system based on Unix.

DigitalOcean Referral Badge

29.

At a time how many operating system can be at work on a computer?

   A.) Only one
   B.) Two
   C.) Three
   D.) Four

Answer: Option 'A'

At a time only one OS can be at work in a computer.

DigitalOcean Referral Badge

30.

The simultaneous processing of executing two or more programs by multiple processors is-

   A.) multiprogramming
   B.) multitasking
   C.) time-sharing
   D.) multiprocessing

Answer: Option 'D'

Multiprocessing is the capability of a computer to multitask, 0or execute more than one program or process at the same time.

DigitalOcean Referral Badge

31.

The ______________ folder retains copies of messages that you have started but are not yet ready to send.

   A.) Drafts
   B.) Outbox
   C.) Address Book
   D.) Sent Items

Answer: Option 'A'

Draft document is a type of technical report that is a work in progress, a preliminary form of a possible future document. 

DigitalOcean Referral Badge

32.

What should be used if a company wants to include its company name and logo at the bottom of every page of a brochure?

   A.) Header
   B.) Macro
   C.) Footer
   D.) Footnote

Answer: Option 'C'

Headers and footers are pieces of text, or graphics, that appear at the top and bottom of a page. If a company wants to include its company name and logo at the bottom of every page of a brochure then it will use the Footer.

DigitalOcean Referral Badge

33.

A program that converts high level language to machine Language is _______.

   A.) Linker
   B.) Assembler
   C.) Compiler
   D.) All of the above

Answer: Option 'C'

Compiler converts high-level languages to low-level languages.

DigitalOcean Referral Badge

34.

Which of the following is used to close a tab on a browser?

   A.) Ctrl + T
   B.) Ctrl + W
   C.) Ctrl + A
   D.) Ctrl + Y

Answer: Option 'B'

Ctrl + W can be used to close a tab in a web browser.

DigitalOcean Referral Badge

35.

What is ‘Trend Micro’?

   A.) virus program
   B.) anti-virus software
   C.) just a program
   D.) All of these

Answer: Option 'B'

Trend Micro is an antivirus.

DigitalOcean Referral Badge

36.

Storage of instructions in computer memory to enables it to perform a variety of tasks in sequence or intermittently. Who introduced the idea of stored program concepts?

   A.) Charles Babbage
   B.) Dennis Ritchie
   C.) Howard Aiken
   D.) John Neumann

Answer: Option 'D'

In the late 1940s by John von Neumann, proposed that a program be electronically stored in binary-number format in a memory device so that instructions could be modified by the computer as determined by intermediate computational results. 

DigitalOcean Referral Badge

37.

DBMS ensures data integrity by managing transactions through ACID test. What does ACID stands for in computer science?

   A.) Artistic, collaborative, inference, durability
   B.) analytic, consistency, inference, duration
   C.) Atomicity, consistency, isolation, durability
   D.) Atomicity, collaborative, inference duration

Answer: Option 'C'

ACID (Atomicity, Consistency, Isolation, and Durability) is a set of properties of database transactions.

DigitalOcean Referral Badge

38.

Table of contents can be prepared in Word2010 by using:

   A.) macros
   B.) by mailings
   C.) by table of contents in references menu
   D.) (b) and (c)

Answer: Option 'C'

by table of contents in references menu

DigitalOcean Referral Badge

39.

Who developed the basic architecture of Computers?

   A.) Charles Babbage
   B.) Blaise Pascal 
   C.) Steve Newton 
   D.) John Von Neumann 

Answer: Option 'D'

The von Neumann architecture, also known as the von Neumann model is computer architecture by John Von Neumann.

DigitalOcean Referral Badge

40.

Which bar is usually located below the Title Bar in MS Word that provides categorized options?

   A.) Menu Bar
   B.) Toolbar
   C.) Status bar 
   D.) Scroll Bar

Answer: Option 'A'

The Menu Bar is the horizontal band that contains commands and options that can be chosen.

DigitalOcean Referral Badge

41.

Inheritance is the ability of an object to pass on its characteristics to its _______.

   A.) subclasses 
   B.) off-spring
   C.) super classes
   D.) parents

Answer: Option 'A'

A superclass passes its characteristics to it's subclass in concept of inheritance in programming languages. 

DigitalOcean Referral Badge

42.

What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?

   A.) CMOS
   B.) RAM
   C.) DRAM
   D.) CPU

Answer: Option 'A'

The CMOS is a physical part of the motherboard: it is a memory chip that houses setting configurations and is powered by the onboard battery. The CMOS is reset and loses all custom settings in case the battery runs out of energy, additionally, the system clock resets when the CMOS loses power.

DigitalOcean Referral Badge

43.

Which type of system can learn and adjust to new circumstances by themselves?

   A.) Database management system
   B.) Expert systems
   C.) Geographical systems
   D.) Neural networks 

Answer: Option 'D'

Neural Network is a computer system modeled on the human brain and nervous system.

DigitalOcean Referral Badge

44.

The default and maximum size of text filed in Access is ______.

   A.) 266 characters & 6400 characters 
   B.) 288 characters & 6880 characters 
   C.) 299 characters & 6499 characters 
   D.) 50 and 255 characters 

Answer: Option 'D'

The default and maximum size of text filed in Access is 50 and 255 characters.

DigitalOcean Referral Badge

45.

Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups? 

   A.) Program thievery
   B.) Data snatching
   C.) Software piracy
   D.) Program looting

Answer: Option 'C'

Software piracy is the illegal copying, distribution, or use of software.

DigitalOcean Referral Badge

46.

Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?

   A.) hacker 
   B.) analyst
   C.) instant messenger 
   D.) programmer

Answer: Option 'A'

hacker is someone who seeks and exploits weaknesses in a computer system.

DigitalOcean Referral Badge

47.

To allow someone else schedule your meetings and appointments, ______ feature of Outlook is used. 

   A.) Monthly calendar 
   B.) Event manager
   C.) Appointments 
   D.) Delegate Access

Answer: Option 'D'

Delegate Access is a more advanced feature than just sharing your Outlook folders. If you want to grant additional permissions, such as allowing a delegate the ability to create e-mail messages or respond to meeting requests on your behalf, you must use Delegate Access.

DigitalOcean Referral Badge

48.

Copying a process from memory to disk to allow space for other processes is called _______.

   A.) Swapping
   B.) Deadlock
   C.) Demand Paging
   D.) Page Fault

Answer: Option 'A'

Swapping concept comes in terms of process scheduling. Scheduler removes process from CPU for duration and reduces the degree of multiprogramming. And after some time these process can again be reintroduced into main memory. 

DigitalOcean Referral Badge

49.

A _________ is a component of motherboard which absorbs the heat produced by the processor and other components of a computer

   A.) Heat sink 
   B.) Northbridge 
   C.) CPU socket 
   D.) CMOS battery 

Answer: Option 'A'

A heat sink is a component of a motherboard which absorbs the heat produced by the processor and other components of a computer. 

DigitalOcean Referral Badge

50.

What acts as master software that works as a mediator between a computer user and hardware of a computer?  

   A.) Application Program 
   B.) Hardware 
   C.) Software 
   D.) Operating System 

Answer: Option 'D'

Operating system provides an interface between a user and computer hardware. It enables a user to utilise hardware resources efficiently. 

DigitalOcean Referral Badge

Computer Awareness Questions for NIACL Assistant Download Pdf

Recent Posts