Computer Questions for NICL AO Mains for 2019


A micro-computer is a small, relatively inexpensive computer with a microprocessor. Which is the first micro-computer?  

   A.) Z2
   B.) Titan-1
   C.) MARK-B
   D.) Altair 

Answer: Option 'D'

The Altair is widely recognized as the spark that ignited the microcomputer revolution as the first commercially successful personal computer.


DBMS helps to achieve:

   A.) data independence
   B.) more redundancy
   C.) centralized manner to control of data
   D.) Both (a) and (c)

Answer: Option 'D'

DBMS helps to achieve data independence and centralized manner to control of data. It controls data redundancy.


Name the input device from the given options, that cannot be used to work in MS Office?

   A.) Scanner 
   B.) Mouse 
   C.) Keyboard 
   D.) Joy stick 

Answer: Option 'D'

Joystick is used for gaming purpose and MS Word is a text editing application.


Which of the following operate at the presentation layer?
1) MIDI 
2) FTP 
3) SMTP 
4) TFTP  

   A.) 1 and 2
   B.) 1, 3, and 5
   C.) 3 and 5 
   D.) 1 and 5

Answer: Option 'D'

MIDI and JPEG are presentation layer specific protocols.


Which of the following component is a part of RAM? 

   A.) Magnetic cores 
   B.) Micro-Processors 
   C.) Photoelectric cells 
   D.) Floppy disks 

Answer: Option 'A'

Magnetic-core memory was the predominant form of random-access computer memory for 20 years between about 1955 and 1975. Such memory is often just called core memory, or, informally, core.


FORTRAN is a programming language. It is more suitable for _______.

   A.) business applications
   B.) marketing applications
   C.) scientific applications
   D.) statically calculative applications

Answer: Option 'C'

FORTRAN is the best and only major programming language for scientific applications. It is designed for performing large and complex scientific numerical computing.


The altering of data so that it is not usable unless the changes are undone is _______.  

   A.) Biometrics 
   B.) Compression 
   C.) Encryption 
   D.) Ergonomics 

Answer: Option 'C'

Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.


What does BASIC stands for? 

   A.) Beginner’s All-purpose Simple Instruction Code 
   B.) Beginner’s All-purpose Symbolic Intention Code
   C.) Beginner’s All-purpose symbolic Instruction code 
   D.) Beginner’s All-purpose Symbolic Instruction Cell

Answer: Option 'C'

BASIC stands for Beginner’s All-purpose symbolic Instruction code.


LANs can be connected by devices called ______ which operate on the data link layer.

   A.) hub
   B.) HDLC
   C.) bridges
   D.) tunnel

Answer: Option ''

LANs can be connected by bridges. Bridge is a device used to connect two separate Ethernet networks into one extended Ethernet.


Which of the following number systems is considered as a base-10 number system?

   A.) Decimal number system
   B.) Binary number system
   C.) Octal number system
   D.) Hexadecimal number system

Answer: Option 'A'

Decimal number system has unique 10 digits, that is, from 0 to 9, to represent a number and its base (or radix) is 10. The decimal number system is also called a base-10 system as it has 10 digits.


Which of the following is not a DBMS software?

   A.) dBASE
   B.) FoxPro
   C.) Oracle
   D.) Database2000

Answer: Option 'D'

Database2000 is not a DBMS Software.


Which one of the following is a set of one or more attributes taken collectively to uniquely identify a record?

   A.) Substitute Key
   B.) Sub key
   C.) Super key
   D.) Foreign key

Answer: Option 'C'

Super key is a set of one or more attributes taken collectively to uniquely identify a record.


IP addresses are converted to ______________.

   A.) A binary string 
   B.) Alphanumeric string 
   C.) A hierarchy of domain names 
   D.) A decimal string 

Answer: Option 'C'

IP addresses are converted to a hierarchy of domain names


Which among the following is a software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?

   A.) Multimedia Player
   B.) Backup software 
   C.) Utility programs 
   D.) Antivirus Software

Answer: Option 'D'

Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.


To which of the following categories do operating systems and debuggers belong? 

   A.) System software 
   B.) Application software 
   C.) Utilities 
   D.) Programming Language

Answer: Option 'B'

System software is developed to serve as a bridge between the hardware and the user, as the software directly communicates with the hardware. Operating systems and debuggers are two best examples of system software.  

Computer Questions for NICL AO Mains Download Pdf

Recent Posts