SSC Multi-Tasking Non-Technical Staff Model Exams in Telugu

AP Grama Sachivalayam 2023 Free Test Series in Telugu (14,523 Vacancies)

Digital Assistant 2023 PART B - 100 Marks All Topics MCQs

Computer Awareness Questions for NIACL Assistant

1.

Which of the following is a term related with scanner?  

   A.) Laser
   B.) TWAIN
   C.) Cartridge
   D.) Both (a) and (b)

Answer: Option 'D'

Laser is the term related with scanner as there are laser scanners. TWAIN is an applications programming interface (API) and communications protocol that regulates communication between software and digital imaging devices, such as image scanners. It is a widely-used program that lets you scan an image (using a scanner) directly into the application.

2.

FORTRAN is a programming language. It is more suitable for _______.

   A.) business applications
   B.) marketing applications
   C.) scientific applications
   D.) statically calculative applications

Answer: Option 'C'

FORTRAN is the best and only major programming language for scientific applications. It is designed for performing large and complex scientific numerical computing.

3.

__________ ensures secure transfer of data over an unsecured network, such as the Internet.

   A.) Antivirus
   B.) Hacking
   C.) Cracking
   D.) Cryptography

Answer: Option 'D'

In cryptography, data are sent in such a way that they look completely different from the original data. Thus, cryptography ensures secure transfer of data over an unsecured network.

4.

A nibble refers to: 

   A.) 4 bits 
   B.) A value equal to a kilobyte 
   C.) A value equal to a megabyte 
   D.) The smallest unit of digital information 

Answer: Option 'A'

Nibble= 4 Bits

5.

The SubSeven is an example of :

   A.) antivirus
   B.) Spyware
   C.) Spam
   D.) Trojan horse

Answer: Option 'D'

SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.

6.

Which of the following component is a part of RAM? 

   A.) Magnetic cores 
   B.) Micro-Processors 
   C.) Photoelectric cells 
   D.) Floppy disks 

Answer: Option 'A'

Magnetic-core memory was the predominant form of random-access computer memory for 20 years between about 1955 and 1975. Such memory is often just called core memory, or, informally, core.

7.

Which of the following threads is used in an operating system?

   A.) User-level thread
   B.) Kernel-level thread
   C.) Hardware-level thread
   D.) Both (a) and (b)

Answer: Option 'D'

There are only two types of threads present in an operating system. One is user-level thread and the other is kernel-level thread. User-level threads are the threads which are controlled and managed by the user of the computer system. Kernel-level threads are the threads which are controlled and created by the operating system. These threads are at the kernel level of the computer system. Kernel is the one who creates the threads.

8.

Which among the following is a software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?

   A.) Multimedia Player  
   B.) Backup software 
   C.) Utility programs 
   D.) Antivirus Software

Answer: Option 'D'

Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.

9.

Which of the following conditions is responsible for occurrence of context switching?

   A.) When one process expires and a new one is loaded from a ready queue
   B.) No processes are in the ready queue
   C.) When a process is running
   D.) When the CPU is at rest

Answer: Option 'A'

A context switching comes into the picture when the time period provided for one process is over and a new process is loaded from the ready queue for processing.

10.

Which among the following is the most suitable type of network that phone lines would use?

   A.) WAN
   B.) LAN
   C.) WWAN
   D.) CAN

Answer: Option 'A'

Wide Area Network (WAN) usually uses telephone lines for connectivity, as WAN is spread over a large area and offers Internet-related services such as browsing, email, chatting, etc.

11.

The software that is used to create text based documents is referred as :

   A.) DBMS
   B.) Suits
   C.) Spreadsheets
   D.) Word processor 

Answer: Option 'D'

Word processors are used to create text-based documents.

12.

What acts as master software that works as a mediator between a computer user and the hardware of a computer?

   A.) Application Program
   B.) Motherboard
   C.) Antivirus
   D.) Operating System

Answer: Option 'D'

Operating system provided an interface between a user and computer hardware. It enables a user to utilize hardware resources efficiently.

13.

Which among the following type of computers is also known informally as Number crunchier?  

   A.) Mini computer 
   B.) Super computer 
   C.) Micro computer 
   D.) Mainframe computer 

Answer: Option 'B'

Super Computers are also known as number crunchers. A super computer's dominant characteristic is its ability to perform large amounts of numerical computations quickly.

14.

______ is a set of keywords, symbols and a system of rules for constructing statements by which human can communicate the instructions to be executed by a computer. 

   A.) A computer program 
   B.) A programming language 
   C.) An assemble 
   D.) Computer I/O Device

Answer: Option 'B'

A programming language is a formal computer language or constructed language designed to communicate instructions to a machine, particularly a computer. Programming languages can be used to create programs to control the behaviour of a machine or to express algorithms.

15.

Which of the following is the type of software that controls the internal operations in the computer and controls how the computer works with all its parts?

   A.) Shareware
   B.) Public domain software
   C.) Application software
   D.) Operating system software

Answer: Option 'D'

An operating system (OS) is a program or software that manages and coordinates the functions of all the components of a computer. It also acts as an interface between the user and the hardware of a computer.

16.

Which of the following is the activity of purchasing items and products from different websites on the internet and using online modes, such as credit cards and debit cards, to make the payments?  

   A.) E-banking 
   B.) Online shopping 
   C.) Online reservation 
   D.) M-reservation 

Answer: Option 'B'

The activity of purchasing items from different websites on the internet is known as online shopping. 

17.

The process of a computer receiving information from a server on the internet is known as _______.

   A.) Browsing
   B.) Download
   C.) Upload
   D.) All of these 

Answer: Option 'B'

Downloading is the process of a computer receiving information from a server.

18.

What does BASIC stands for? 

   A.) Beginner’s All-purpose Simple Instruction Code
   B.) Beginner’s All-purpose Symbolic Intention Code  
   C.) Beginner’s All-purpose symbolic Instruction code 
   D.) Beginner’s All-purpose Symbolic Instruction Cell 

Answer: Option 'C'

BASIC stands for Beginner’s All-purpose symbolic Instruction code.

19.

______ uses a standard called IEEE802.6. 

   A.) LAN
   B.) WAN
   C.) MAN
   D.) Internet

Answer: Option 'C'

IEEE 802.6 is a standard governed by the ANSI for Metropolitan Area Networks (MAN).

20.

In number system, LSD stands for ___________.

   A.) Left Significant Digit
   B.) Low Simple Digit
   C.) Low Significant Digit
   D.) Least Significant Digit

Answer: Option 'D'

In number system, LSD stands for Least Significant Digit. It refers to those digits that carry least weight.


Computer Awareness Questions for NIACL Assistant Download Pdf

Recent Posts