If Any request contact us :techtanu17@gmail.com << Catch on Facebook << If any link broken, Plz tell. we try to fix them.

Wednesday 12 June 2013

COMPUTER BASIC QUESTION PART-12

UGC NET JUNE 2013 SYLLABUS, MODEL PAPER/ PREVIOUS YEARS SOLVED QUESTION PAPERS.
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.

IF YOU KNOW ANSWER OF ANY QUESTIONS PLEASE TELL ME. THAT ANSWER HELP THE OTHER STUDENT IN FUTURE. THANKS. PLEASE REPLY RIGHT ANSWER.


1. Junk-e-mail is also called ....
(A) Spam 
(B) Spoof
(C) Sniffer script
(D) Spool
(E) None of these
 

ANS (A)
 

2. What is the default file extension for all Word document ?
(A) WRD
(B) TXT
(C) DOC
(D) FIL
(E) None of these
 

ANS (C)

3. A device that connects to a network without the use of cables is said to be ....

(A) distributed
(B) wireless
(C) centralized 
(D) open source
(E) None of these
 

ANS (E)

4. A ______ is a unique name that you give to a file of information ____

(A) Device letter
(B) Folder
(C) Filename
(D) Filename extension

(E) None of these
 

ANS (C)

5. What is the most common way to get a virus in your computer hard disk ?

(A) By installing games from their CDROMS
(B) By uploading pictures from mobile phones to the computer
(C) By opening emails
(D) By sending emails
(E) None of these
 

ANS (C)
 

6. Codes consisting of bars or lines of varying width or lengths that are computer readable are known as ......
(A) an ASCII code
(B) a magnetic tape
(C) an OCR scanner
(D) a bar code
(E) None of these
 

ANS (D)
 

7.Which of the following are all considered advantages of e-mails ?
(A) Convenience, speed of delivery , generality and reliability
(B) printable ,global and expensive
(C) Global ,convenience and Microsoft owned
(D) Slow delivery ,readable ,global and inexpensive
(E) None of these
 

ANS (A)
 

9. What is an E-mail attachment ?
(A) A receipt sent by the recipient
(B) A separate document from another program sent along with an E-mail message
(C) A malicious parasite that feeds off your message and destroys the contents
(D) A list of CC: or BCC: recipients
(E) None of these
 

ANS (B)
 

10. During the boot process, the____________looks for the system files.
A CD
B. BIOS
C. CPU
D. DVD

Ans : (B)
 

11. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows

Ans : (C)
 

12. ____________ is the ability of an operating system to control the activities of multiple programs at the same time.
(A) Multitasking
(B) Streamlining
(C) Multiuser
(D) Simulcasting

Ans : (A)
 

13. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:
(A) action.
(B) event.
(C) interrupt.
(D) activity.

Ans : (C)
 

14. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
(A) CPU
(B) slice of time
(C) stack
(D) event

Ans : (B)
 

15. The blocks of code, included in the operating system, that software applications interact with are known as:
(A) application programming interfaces (APIs).
(B) complimentary metal-oxide conductors (CMOS).
(C) device drivers.
(D) bootstrap loaders.

Ans : (A)
 

16. MS-DOS is a ____________ operating system.
(A) point-and-click
(B) user-friendly
(C) command-driven
(D) Mac

Ans : (C)
 

17. An interrupt handler is a(n):
(A) location in memory that keeps track of recently generated interrupts.
(B) peripheral device.
(C) utility program.
(D) special numeric code that indicates the priority of a request.

Ans : (D)
 

18. A spooler is a(n):
(A) location in memory that maintains the contents of a document until it prints out.
(B) print job.
(C) program that coordinates the print jobs that are waiting to print.
(D) message sent from the printer to the operating system when a print job is completed.

Ans : (C)
 

19. Virtual memory is typically located:
(A) on a floppy disk.
(B) in the CPU.
(C) in a flash card.
(D) on the hard drive.

Ans : (D)
 

20. . If a word is typed that is not in Word’s dictionary, a____________wavy underline appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these


Ans : (A)


21. ____________Software allows users to perform calculations on rows and columns of data.
(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
(E) None of these


Ans : (C)
 

22. The purpose of a swap (or page) file is to:
(A) maintain pages of documents that are being spooled to the printer.
(B) hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
(C) prevent thrashing in a multitasking environment.
(D) allow multiple print jobs to print their pages out simultaneously.


Ans : (B)

23. The definition of thrashing is:
(A) swapping data between virtual memory and RAM too frequently.
(B) insufficient hard disk space.
(C) too many processors being managed by the operating system.
(D) inaccurate information stored in the registry.


Ans : (A)

24. All of the following are TRUE of Safe Mode EXCEPT:
(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices.


Ans : (B)

25. Verification of a login name and password is known as:
(A) configuration.
(B) accessibility.
(C) authentication.
(D) logging in.


Ans : (C)

GOTO COMPUTER BASIC QUESTION PART-11 
 IF YOU FIND ANY ANSWER WRONG,COMMENT ME,SO THAT I RIGHT THAT ANSWER


0 comments:

Post a Comment