LIC AAO Computer Knowledge - Test 2

1.

In order to interpret XML documents, one should

   A.) use standardised tags
   B.) define the tags separately
   C.) specify tag filename
   D.) have a document type definition which defines the tags

Answer: Option 'D'

have a document type definition which defines the tags

2.

A set of step-by-step procedures for accomplishing a task is known as a(n)

   A.) algorithm
   B.) hardware program
   C.) software bug
   D.) firmware program

Answer: Option 'A'

algorithm

3.

A key that will erase information from the computer's memory and characters on the screen, is

   A.) delete key
   B.) dummy out key
   C.) trust key
   D.) edit key

Answer: Option 'A'

delete key

4.

________ are attempts by individuals to obtain confidential information from you by falsifying their identity.

   A.) Phishing trips
   B.) Computer viruses
   C.) Spyware scams
   D.) Viruses

Answer: Option 'A'

Phishing trips

5.

Today, the common form of RAM is built with

   A.) transistors
   B.) vacuum tubes
   C.) semi-conductors ICs
   D.) super conductors ICs

Answer: Option 'C'

semi-conductors ICs

6.

The operating system called UNIX is typically used for

   A.) desktop computers
   B.) laptop computers
   C.) supercomputers
   D.) web servers

Answer: Option 'D'

web servers

7.

Supercomputers

   A.) are smaller in size and processing capability than mainframe computers
   B.) are common in majority of households
   C.) are rarely used by researchers due to their lack of computing capacity
   D.) contain thousands of microprocessors

Answer: Option 'D'

contain thousands of microprocessors

8.

The restart of computer is called ______ when computer is already on.

   A.) logging off
   B.) cold booting
   C.) warm booting
   D.) shut down

Answer: Option 'C'

warm booting

9.

Antivirus software is an example of

   A.) business software
   B.) an operating system
   C.) a security
   D.) an office suite

Answer: Option 'C'

a security

10.

In Excel, this is a prerecorded formula that provides a shortcut for complex calculations.

   A.) Data Series
   B.) Function
   C.) Field
   D.) Value

Answer: Option 'B'

Function

11.

The most important or powerful computer in a typical network is

   A.) desktop
   B.) network client
   C.) network server
   D.) network station

Answer: Option 'C'

network server

12.

Computer keyboard is an example of

   A.) memory device
   B.) input device
   C.) output device
   D.) Both 1 and 3

Answer: Option 'B'

input device

13.

Computer gets _______ with the help of mouse, joystich or keyboard.

   A.) insert
   B.) delete
   C.) input
   D.) output

Answer: Option 'C'

input

14.

When speaking of computer input and output, input refers to

   A.) any data processing that occurs from new data input into the computer
   B.) data or information that has been entered into the computer
   C.) the transmission of data that has been input into the computer
   D.) Both 2 and 3

Answer: Option 'D'

Both 2 and 3

15.

What happens when we try to delete the files on the floppy?

   A.) The files get deleted and cannot be restored again
   B.) The files get moved to the recycle bin
   C.) Files on a floppy cannot be deleted
   D.) The files get deleted and can be restored again from recycle bin

Answer: Option 'A'

The files get deleted and cannot be restored again

16.

Which unit controls the movement of signals between CPU and I/O?

   A.) ALU
   B.) Memory unit
   C.) Control Unit
   D.) Secondary storage

Answer: Option 'C'

Control Unit

17.

Connection or link to other documents or web pages that contain related information is called

   A.) electronic commerce
   B.) hyperlink
   C.) dial-up
   D.) e-cash

Answer: Option 'B'

hyperlink

18.

Which of the folloing printers are you sure, will not use if your objective is to print on multicarbon forms?

   A.) Daisy wheel
   B.) Dot-matrix
   C.) Laser
   D.) Thimble

Answer: Option 'C'

Laser

19.

What type of keys are 'Ctrl' and 'Shift'?

   A.) Adjustment
   B.) Modifier
   C.) Function
   D.) Alphanumeric

Answer: Option 'B'

Modifier

20.

A computer message is "Do you really want to delete the selected file(s)". The user clicks 'Yes' key. It is called.

   A.) Program response
   B.) user response
   C.) program output
   D.) user output

Answer: Option 'B'

user response


LIC AAO Exam Computer Knowledge - Practice Test 2 Download Pdf