LIC AAO Computer Knowledge - Test 2


In order to interpret XML documents, one should

   A.) use standardised tags
   B.) define the tags separately
   C.) specify tag filename
   D.) have a document type definition which defines the tags

Answer: Option 'D'

have a document type definition which defines the tags


A set of step-by-step procedures for accomplishing a task is known as a(n)

   A.) algorithm
   B.) hardware program
   C.) software bug
   D.) firmware program

Answer: Option 'A'



A key that will erase information from the computer's memory and characters on the screen, is

   A.) delete key
   B.) dummy out key
   C.) trust key
   D.) edit key

Answer: Option 'A'

delete key


________ are attempts by individuals to obtain confidential information from you by falsifying their identity.

   A.) Phishing trips
   B.) Computer viruses
   C.) Spyware scams
   D.) Viruses

Answer: Option 'A'

Phishing trips


Today, the common form of RAM is built with

   A.) transistors
   B.) vacuum tubes
   C.) semi-conductors ICs
   D.) super conductors ICs

Answer: Option 'C'

semi-conductors ICs


The operating system called UNIX is typically used for

   A.) desktop computers
   B.) laptop computers
   C.) supercomputers
   D.) web servers

Answer: Option 'D'

web servers



   A.) are smaller in size and processing capability than mainframe computers
   B.) are common in majority of households
   C.) are rarely used by researchers due to their lack of computing capacity
   D.) contain thousands of microprocessors

Answer: Option 'D'

contain thousands of microprocessors


The restart of computer is called ______ when computer is already on.

   A.) logging off
   B.) cold booting
   C.) warm booting
   D.) shut down

Answer: Option 'C'

warm booting


Antivirus software is an example of

   A.) business software
   B.) an operating system
   C.) a security
   D.) an office suite

Answer: Option 'C'

a security


In Excel, this is a prerecorded formula that provides a shortcut for complex calculations.

   A.) Data Series
   B.) Function
   C.) Field
   D.) Value

Answer: Option 'B'



The most important or powerful computer in a typical network is

   A.) desktop
   B.) network client
   C.) network server
   D.) network station

Answer: Option 'C'

network server


Computer keyboard is an example of

   A.) memory device
   B.) input device
   C.) output device
   D.) Both 1 and 3

Answer: Option 'B'

input device


Computer gets _______ with the help of mouse, joystich or keyboard.

   A.) insert
   B.) delete
   C.) input
   D.) output

Answer: Option 'C'



When speaking of computer input and output, input refers to

   A.) any data processing that occurs from new data input into the computer
   B.) data or information that has been entered into the computer
   C.) the transmission of data that has been input into the computer
   D.) Both 2 and 3

Answer: Option 'D'

Both 2 and 3


What happens when we try to delete the files on the floppy?

   A.) The files get deleted and cannot be restored again
   B.) The files get moved to the recycle bin
   C.) Files on a floppy cannot be deleted
   D.) The files get deleted and can be restored again from recycle bin

Answer: Option 'A'

The files get deleted and cannot be restored again


Which unit controls the movement of signals between CPU and I/O?

   A.) ALU
   B.) Memory unit
   C.) Control Unit
   D.) Secondary storage

Answer: Option 'C'

Control Unit


Connection or link to other documents or web pages that contain related information is called

   A.) electronic commerce
   B.) hyperlink
   C.) dial-up
   D.) e-cash

Answer: Option 'B'



Which of the folloing printers are you sure, will not use if your objective is to print on multicarbon forms?

   A.) Daisy wheel
   B.) Dot-matrix
   C.) Laser
   D.) Thimble

Answer: Option 'C'



What type of keys are 'Ctrl' and 'Shift'?

   A.) Adjustment
   B.) Modifier
   C.) Function
   D.) Alphanumeric

Answer: Option 'B'



A computer message is "Do you really want to delete the selected file(s)". The user clicks 'Yes' key. It is called.

   A.) Program response
   B.) user response
   C.) program output
   D.) user output

Answer: Option 'B'

user response

LIC AAO Exam Computer Knowledge - Practice Test 2 Download Pdf