Computer Questions for NICL AO Mains for 2019

31.

Who is the father of computers?

   A.) Ada Byron 
   B.) Charles Babbage 
   C.) Blaise Pascal 
   D.) Herman Hollerith 

Answer: Option 'B'

Charles Babbage is the father of computers.

32.

Name the input device from the given options, that cannot be used to work in MS Office?

   A.) Scanner 
   B.) Mouse 
   C.) Keyboard 
   D.) Joy stick 

Answer: Option 'D'

Joystick is used for gaming purpose and MS Word is a text editing application.

33.

To which of the following categories do operating systems and debuggers belong? 

   A.) System software 
   B.) Application software 
   C.) Utilities 
   D.) Programming Language

Answer: Option 'B'

System software is developed to serve as a bridge between the hardware and the user, as the software directly communicates with the hardware. Operating systems and debuggers are two best examples of system software.  

34.

LANs can be connected by devices called ______ which operate on the data link layer.

   A.) hub
   B.) HDLC
   C.) bridges
   D.) tunnel

Answer: Option ''

LANs can be connected by bridges. Bridge is a device used to connect two separate Ethernet networks into one extended Ethernet.

35.

A micro-computer is a small, relatively inexpensive computer with a microprocessor. Which is the first micro-computer?  

   A.) Z2
   B.) Titan-1
   C.) MARK-B
   D.) Altair 

Answer: Option 'D'

The Altair is widely recognized as the spark that ignited the microcomputer revolution as the first commercially successful personal computer.

36.

The process of a computer receiving information from a server on the internet is known as _______.

   A.) Browsing 
   B.) Download 
   C.) Upload 
   D.) All of these 

Answer: Option 'B'

Downloading is the process of a computer receiving information from a server.

37.

If you wish to extend the length of the network without having the signal degrade, you would use a __________.

   A.) repeater
   B.) router
   C.) gateway
   D.) switch

Answer: Option ''

If you wish to extend the length of the network without having the signal degrade, you would use a repeater.

38.

How long is an IPv6 address?

   A.) 32 bits
   B.) 128 bytes
   C.) 64 bits
   D.) 128 bits

Answer: Option 'D'

IPv6 address  is 128 bits long.

39.

Which of the following are considered to be the upper layers in the OSI Model?

   A.) presentation and session
   B.) application and presentation
   C.) application, presentation, and session
   D.) application, presentation, data-link, and transport

Answer: Option 'C'

The last three layers of the OSI model – Application, Presentation and Session layers are considered to be the upper layers.

40.

What does MAN stands for?

   A.) Micro area network
   B.) Metropolitan area network
   C.) Macro area network
   D.) Mix area network

Answer: Option 'B'

MAN is abbreviation for Metropolitan Area Network.

41.

Which among the following is software application commonly used to prepare a presentation/slide show?

   A.) Adobe
   B.) Power Point
   C.) Outlook Express 
   D.) Internet Explorer

Answer: Option 'B'

PowerPoint is used to make presentations/slide shows.

42.

Which among the following is an appropriate binary conversion for the number 013 (which is of base 8)?

   A.) 101010
   B.) 11011
   C.) 1011
   D.) 1110

Answer: Option 'C'

1011

43.

Which of the following is a term related with scanner?

   A.) Laser 
   B.) TWAIN
   C.) Cartridge 
   D.) Both (a) and (b)

Answer: Option 'D'

Laser is the term related with scanner as there are laser scanners. TWAIN is an applications programming interface (API) and communications protocol that regulates communication between software and digital imaging devices, such as image scanners. It is a widely-used program that lets you scan an image (using a scanner) directly into the application.

44.

Which one of the following is a set of one or more attributes taken collectively to uniquely identify a record?

   A.) Substitute Key
   B.) Sub key
   C.) Super key
   D.) Foreign key

Answer: Option 'C'

Super key is a set of one or more attributes taken collectively to uniquely identify a record.

45.

Which among the following is a software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?

   A.) Multimedia Player
   B.) Backup software 
   C.) Utility programs 
   D.) Antivirus Software

Answer: Option 'D'

Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.

Computer Questions for NICL AO Mains Download Pdf

Recent Posts