Computer Awareness Questions for NIACL Assistant

1.

Generally to copy data from a remote computer/internet to a local computer is called __________.

   A.) Upload
   B.) Editing
   C.) Download
   D.) E-mail

Answer: Option 'C'

Generally to copy data from a remote computer/internet to a local computer is called downloading.

2.

Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?

   A.) hacker 
   B.) analyst
   C.) instant messenger 
   D.) programmer

Answer: Option 'A'

hacker is someone who seeks and exploits weaknesses in a computer system.

3.

Which of the following is the activity of purchasing items and products from different websites on the internet and using online modes, such as credit cards and debit cards, to make the payments?  

   A.) E-banking 
   B.) Online shopping 
   C.) Online reservation 
   D.) M-reservation 

Answer: Option 'B'

The activity of purchasing items from different websites on the internet is known as online shopping. 

4.

The process of a computer receiving information from a server on the internet is known as _______.

   A.) Browsing
   B.) Download
   C.) Upload
   D.) All of these 

Answer: Option 'B'

Downloading is the process of a computer receiving information from a server.

5.

Which of the following component is a part of RAM? 

   A.) Magnetic cores 
   B.) Micro-Processors 
   C.) Photoelectric cells 
   D.) Floppy disks 

Answer: Option 'A'

Magnetic-core memory was the predominant form of random-access computer memory for 20 years between about 1955 and 1975. Such memory is often just called core memory, or, informally, core.

6.

Who developed the basic architecture of Computers?

   A.) Charles Babbage
   B.) Blaise Pascal 
   C.) Steve Newton 
   D.) John Von Neumann 

Answer: Option 'D'

The von Neumann architecture, also known as the von Neumann model is computer architecture by John Von Neumann.

7.

The primary purpose of a computer is to process _____________ and convert it into information.

   A.) electricity
   B.) data
   C.) raw material
   D.) a bit

Answer: Option 'B'

Before data is processed by a computer, it has to be fed into the computer using a keyboard, mouse or another input device. The central processing unit (CPU) analyses the raw data and processes it into sensible information. 

8.

In number system, LSD stands for ___________.

   A.) Left Significant Digit
   B.) Low Simple Digit
   C.) Low Significant Digit
   D.) Least Significant Digit

Answer: Option 'D'

In number system, LSD stands for Least Significant Digit. It refers to those digits that carry least weight.

9.

Which of the following threads is used in an operating system?

   A.) User-level thread
   B.) Kernel-level thread
   C.) Hardware-level thread
   D.) Both (a) and (b)

Answer: Option 'D'

There are only two types of threads present in an operating system. One is user-level thread and the other is kernel-level thread. User-level threads are the threads which are controlled and managed by the user of the computer system. Kernel-level threads are the threads which are controlled and created by the operating system. These threads are at the kernel level of the computer system. Kernel is the one who creates the threads.

10.

The SubSeven is an example of :

   A.) antivirus
   B.) Spyware
   C.) Spam
   D.) Trojan horse

Answer: Option 'D'

SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.

11.

The conversion of the binary number 10100111011 into its decimal form is __________.

   A.) 133910
   B.) 134910
   C.) 139310
   D.) 193910

Answer: Option 'A'

133910

12.

The software that is used to create text based documents is referred as :

   A.) DBMS
   B.) Suits
   C.) Spreadsheets
   D.) Word processor 

Answer: Option 'D'

Word processors are used to create text-based documents.

13.

Which of the following is a term related with scanner?  

   A.) Laser
   B.) TWAIN
   C.) Cartridge
   D.) Both (a) and (b)

Answer: Option 'D'

Laser is the term related with scanner as there are laser scanners. TWAIN is an applications programming interface (API) and communications protocol that regulates communication between software and digital imaging devices, such as image scanners. It is a widely-used program that lets you scan an image (using a scanner) directly into the application.

14.

Inheritance is the ability of an object to pass on its characteristics to its _______.

   A.) subclasses 
   B.) off-spring
   C.) super classes
   D.) parents

Answer: Option 'A'

A superclass passes its characteristics to it's subclass in concept of inheritance in programming languages. 

15.

What should be used if a company wants to include its company name and logo at the bottom of every page of a brochure?

   A.) Header
   B.) Macro
   C.) Footer
   D.) Footnote

Answer: Option 'C'

Headers and footers are pieces of text, or graphics, that appear at the top and bottom of a page. If a company wants to include its company name and logo at the bottom of every page of a brochure then it will use the Footer.

Computer Awareness Questions for NIACL Assistant Download Pdf

Recent Posts