| 1. |
Who is the father of Computer science? |
Charles Babbage |
| 2. |
In a computer, most processing takes place in _______? |
CPU |
| 3. |
In which type of computer, data are represented as discrete signals? |
Digital Computer |
| 4. |
Scientific Name of Computer? |
Sillico sapiens |
| 5. |
What is the name of the display feature that highlights are of the screen which requires operator attention? |
Reverse Video |
| 6. |
Computers, combine both measuring and counting, are called _______? |
Hybrid Computer |
| 7. |
What is FORTRAN? |
Formula Translation |
| 8. |
What translates and executes program at run time line by line? |
Interpreter |
| 9. |
What converts an entire program into machine language? |
Compiler |
| 10. |
Who is the father of personal computer? |
Edward Robert |
| 11. |
EEPROM stands for _______? |
Electronic Erasable Programmable Read Only Memory |
| 12. |
Who developed the first electronic computer? |
J.V. Atansoff |
| 13. |
Which programming languages are classified as low level languages? |
Assembly Language |
| 14. |
The first web browser is _______? |
Mosaic |
| 15. |
First page of Website is termed as _______? |
Homepage |
| 16. |
IBM stands for _______? |
International Business Machines |
| 17. |
Office LANs, which are scattered geographically on large scale, can be connected by the use of corporate _______? |
WAN ( wide area network ) |
| 18. |
To move a copy of file from one computer to another over a communication channel is called? |
File Transfer |
| 19. |
Large transaction processing systems in automated organisations use _______? |
Batch Processing |
| 20. |
MICR stands for _______? |
Magnetic Ink Character Recognition |
| 21. |
Name of 1st electronic computer? |
ENIAC |
| 22. |
No. of different characters in ASCII coding system? |
1024 |
| 23. |
MSIC stands for _______? |
Medium Scale Integrated Circuits |
| 24. |
The scrambling of code is known as _______? |
Encryption |
| 25. |
The first computers were programmed using _______? |
Machine Language |
| 26. |
A fault in a computer program which prevents it from working correctly is known as _______? |
Bug |
| 27. |
Which button makes alphabets/letters in uppercase and lowercase and numbers to symbols? |
Shift |
| 28. |
When a computer is switched on, the booting process performs _______? |
Power on self test |
| 29. |
What is the software frequently utilized by end users called (like Word, PowerPoint)? |
Application Software |
| 30. |
Unit of measurement of the output quality of a printer? |
Dot per sq. inch |
| 31. |
Switching device of fifth generation computer is _______? |
VLSI |
| 32. |
The unit KIPS is used to measure the speed of _______? |
Processor |
| 33. |
DOS stands for _______? |
Disk Operating System |
| 34. |
What is a joy stick primarily in computers used for? |
Computer Gaming |
| 35. |
In 1999, the Melissa virus was a widely publicized _______? |
E-mail virus |
| 36. |
Which of the following commands is given to reboot the computer? |
Ctrl+Alt+Del |
| 37. |
What is correcting errors in a program called? |
Debugging |
| 38. |
BCD is _______? |
Binary Coded Decimal |
| 39. |
What type of virus uses computer hosts to reproduce itself? |
Worm |
| 40. |
SMTP, FTP and DNS are applications of the _______ layer? |
Application |
| 41. |
Which command is used to select the whole document? |
Ctrl+A |
| 42. |
COBOL is an acronym for _______? |
Common Business Oriented Language |
| 43. |
The ability of an OS to run more than one application at a time is called? |
Multitasking |
| 44. |
What is the functional key to display save-as box? |
F12 |
| 45. |
Full form of NOS? |
Network Operating system |
| 46. |
Something which has easily understood instructions is said to be _______? |
Analog Data |
| 47. |
A modem is connected to a _______? |
Telephone Line |
| 48. |
Refresh Rate of monitor is measured in? |
Hertz |
| 49. |
What was the chief component of first generation computer? |
Vacuum tube & Valves |
| 50. |
Name the Father of Computer Mouse? |
Douglas Engelbart |
| 51. |
A program that performs a useful task while simultaneously allowing destructive acts is _______? |
Trojan Horse |
| 52. |
The geometric arrangement of devices on the network is called _______? |
Topology |
| 53. |
The basic goal of computer process is to convert data into _______? |
Information |
| 54. |
Where are the CPU and memory located? |
Motherboard |
| 55. |
Who is known as the founder of IBM Company? |
Thomas J. Watson |
| 56. |
An image on a computer screen is made up of _______? |
Pixels |
| 57. |
Full form of MAN? |
Metropolitan Area Network |
| 58. |
Which command in DOS can be used to recover accidentally deleted files? |
UNDELETE |
| 59. |
A computer program that converts an entire program into machine language atone time is called _______? |
Characters |
| 60. |
In which year, the Microsoft company was founded? |
1975 |
| 61. |
What is the personal computer operating system that organizes and uses a graphic desktop environment? |
Windows |
| 62. |
What are Light pen and joystick? |
Input Devices |
| 63. |
What is a half byte also called as? |
Nibble |
| 64. |
SMPS stands for _______? |
Switched mode Power Supply |
| 65. |
What do we use to change the appearance and positioning of text document in MSWord? |
Formatting |
| 66. |
A _______ is approximately a million bytes? |
Megabyte |
| 67. |
Daisy wheel, Drum, chain etc are the _______? |
Printers |
| 68. |
XML stands for _______? |
Extensible Markup Language |
| 69. |
What kind of scheme is the HTTP protocol? |
Request/Response |
| 70. |
Magnetic disk is an example of _______? |
Secondary Memory |
| 71. |
What is the meaning of OSI, in terms of computers ? |
Open system Interconnection |
| 72. |
Which type of storage device is a BIOS ? |
Primary |
| 73. |
What is the extension type of the excel 2007 files? |
.xlsx |
| 74. |
Collecting personal information and effectively posing as another individual is known as the crime of _______? |
Identity theft |
| 75. |
The amount of vertical space between lines of text in a document is called _______? |
Line Spacing |
| 76. |
A computer cannot ‘boot’ if it does not have the _______? |
Operating system |
| 77. |
What is the other name for programmed chip? |
LSIC |
| 78. |
A normal CD- ROM usually can store up to _______ data? |
680 MB |
| 79. |
What does DMA stand for? |
Direct Memory Access |
| 80. |
Full form of LAN? |
Local Area Network |
| 81. |
ASCII stands for _______? |
American Standard Code for Information Interchange |
| 82. |
Second Generation computers were developed during _______? |
1956-65 |
| 83. |
When did arch rivals IBM and Apple Computers Inc. decide to join hands? |
1991 |
| 84. |
What kind of memory is both static and non-volatile? |
ROM |
| 85. |
An error in software or hardware is called a bug. What is the alternative computer jargon for it? |
Glitch |
| 86. |
Unwanted repetitious messages, such as unsolicited bulk e-mail is known as _______? |
Spam |
| 87. |
The common name for the crime of stealing passwords is _______? |
Spoofing |
| 88. |
BIOS stands for _______? |
Basic Input Output System |
| 89. |
Who is regarded as Father of “C” programming language? |
Dennis Ritchie |
| 90. |
RAM can be treated as the _______ for the computer’s processor. |
Waiting Room |
| 91. |
Computers manipulate data in many ways, and this manipulation is called _______? |
Processing |
| 92. |
Joshy, Perfumes are examples of _______? |
Viruses |
| 93. |
The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called _______? |
Computer Forensics |
| 94. |
Where does most data go first with in a computer memory hierarchy? |
RAM |
| 95. |
Help Menu is available at which button? |
Start |
| 96. |
Which file contains permanent data and gets updated during the processing of transactions? |
Master File |
| 97. |
A DVD is an example of an _______? |
Optical Disc |
| 98. |
Which is most common tool used to restrict access to computer system? |
Passwords |
| 99. |
The technology that stores only essential instructions on a microprocessor chip and thus enhances its speed is referred as _______? |
RISC |
| 100. |
What is the name of an application program that gathers user information and sends it to someone through the Internet? |
Spybot |