CPCT-English-Typing-Previous-Year-Paper-09 Oct2016-Shif-II-Computer
Sr. No | Questions with multiple options |
1. | Which of the following was used during First Generation of Computers?
(a) Vacuum Tubes (b) Transistors (c) Mechanical Gears (d) Microprocessor Ans: a |
2. | In which of the following methods special pre-printed forms are designed with Boxes that can be marked with a Dark Pencil or Ink?
(a) OCR (b) MICR (c) OMR (d) Bar Coding Ans: c |
3. | For faster processing, which of the following is used as an intermediate buffer between Main Memory and the Processor?
(a) Secondary Storage (b) Flash Memory (c) Cache Memory (d) Virtual Memory Ans: c |
4. | Which of the following is the correct expansion of the term VLSI?
(a) Very Large System Integrator (b) Very Large Storage Integration (c) Very Large Scale Internet (d) Very Large Scale Integration Ans: d |
5. | DVD is a short form of :
(a) Digital Versatile Disc (b) Digital Volatile Disc (c) Digital Visible Disc (d) Digital Visible Disc Ans: a |
6. | An impact Printer prints characters by using one of the following:
(a) An Ink Spray (b) Electrically Charged Ink (c) An Ink Pen (d) An Inked Ribbon and Print Head Ans: d |
7. | ASCII stands for
(a) Asian Standard Code for Information Interchange (b) American Standard Code for Information Interchange (c) American Standard Configuration for Information Interchange (d) Asian Standard Configuration for Information Interchange Ans: b |
8. | A magnetic Tape is a:
(a) Random Access Medium (b) Parallel Access Medium (c) Serial Access Medium (d) Synchronized Access Medium Ans: c |
9. | Upon switching off the power, the type of memory that readily loses data is classified as:
(a) Volatile Memory (b) Impact storage (c) Non-Volatile Memory (d) Non-Impact Storage Ans: a |
10. | Which of the following streams or feeds images on the internet in real time?
(a) Photo Copy Machine (b) Webcam (c) DSLR (d) Graphics Card Ans: b |
|
|
11. | Which of the following is NOT a Desktop Operating System?
(a) Windows Vista (b) Redhat Linux (c) Apple Macintosh (d) Google Android Ans: d |
12. | In computers and digital technology a Nibble is:
(a) One Bit (b) Eight Bits (c) Two Bits (d) Four Bits Ans: d |
13. | A program written in any high-level language is known as:
(a) Byte Code (b) Source Code (c) Target Code (d) Machine Code Ans: b |
14. | One Terabyte (1 TB) is equal to how many Gigabytes (GB)?
(a) 1000 (b) 256 (c) 512 (d) 1024 Ans: d |
15. | Which of the following provides basic services to all parts of the operating system?
(a) Interpreter (b) Kernel (c) Shell (d) Linker Ans: b |
16. | The concept of “Paging” is implemented by:
(a) Hardware (b) Embedded Software (c) Firmware (d) Operating System Ans: d |
17. | What is False about a “Computer Fire Wall”?
(a) Firewall prevents unauthorized access to computer data (b) Firewall can be implemented as Software (c) Firewall can be implemented as Hardware (d) Firewall is a Virus Program Ans: d |
18. | “Retina Scan” is a part of :
(a) Biometrics (b) Biodegradation (c) Biology (d) Biogas Ans: a |
19. | A mathematical way for demonstrating the authenticity of a digital message or documents is known as:
(a) Internet Protocol (b) Remote Procedure Call (c) Digital Signature (d) Masquerading Ans: c |
20. | A criminal activity done by using computers and internet is generally classified as:
(a) Social Networking (b) Cybercrime (c) Blogging (d) Spamming Ans: b |
Data Collected By – K. Jeyanthi | |
Published On – 29th Dec 2021 | |
Leave a Reply