CPCT Paper 9 Oct 2016 Shift II on Computer Knowledge

CPCT-English-Typing-Previous-Year-Paper-09 Oct2016-Shif-II-Computer

Sr. No Questions with multiple options
1. Which of the following was used during First Generation of Computers?

(a)    Vacuum Tubes

(b)   Transistors

(c)    Mechanical Gears

(d)   Microprocessor

Ans: a

2. In which of the following methods special pre-printed forms are designed with Boxes that can be marked with a Dark Pencil or Ink?

(a)    OCR

(b)   MICR

(c)    OMR

(d)   Bar Coding

Ans: c

3. For faster processing, which of the following is used as an intermediate buffer between Main Memory and the Processor?

(a)    Secondary Storage

(b)   Flash Memory

(c)    Cache Memory

(d)   Virtual Memory

Ans: c

4. Which of the following is the correct expansion of the term VLSI?

(a)    Very Large System Integrator

(b)   Very Large Storage Integration

(c)    Very Large Scale Internet

(d)   Very Large Scale Integration

Ans: d

5. DVD is a short form of :

(a)    Digital Versatile Disc

(b)   Digital Volatile Disc

(c)    Digital Visible Disc

(d)   Digital Visible Disc

Ans: a

6. An impact Printer prints characters by using one of the following:

(a)    An Ink Spray

(b)   Electrically Charged Ink

(c)    An Ink Pen

(d)   An Inked Ribbon and Print Head

Ans: d

7. ASCII stands for

(a)    Asian Standard Code for Information Interchange

(b)   American Standard Code for Information Interchange

(c)    American Standard Configuration for Information Interchange

(d)   Asian Standard Configuration for Information Interchange

Ans: b

8. A magnetic Tape is a:

(a)    Random Access Medium

(b)   Parallel Access Medium

(c)    Serial Access Medium

(d)   Synchronized Access Medium

Ans: c

9. Upon switching off the power, the type of memory that readily loses data is classified as:

(a)    Volatile Memory

(b)   Impact storage

(c)    Non-Volatile Memory

(d)   Non-Impact Storage

Ans: a

10. Which of the following streams or feeds images on the internet in real time?

(a)    Photo Copy Machine

(b)   Webcam

(c)    DSLR

(d)   Graphics Card

Ans: b

   

 

11. Which of the following is NOT a Desktop Operating System?

(a)    Windows Vista

(b)   Redhat Linux

(c)    Apple Macintosh

(d)   Google Android

Ans: d

12. In computers and digital technology a Nibble is:

(a)    One Bit

(b)   Eight Bits

(c)    Two Bits

(d)   Four Bits

Ans: d

13. A program written in any high-level language is known as:

(a)    Byte Code

(b)   Source Code

(c)    Target Code

(d)   Machine Code

Ans: b

14. One Terabyte (1 TB) is equal to how many Gigabytes (GB)?

(a)    1000

(b)   256

(c)    512

(d)   1024

Ans: d

15. Which of the following provides basic services to all parts of the operating system?

(a)    Interpreter

(b)   Kernel

(c)    Shell

(d)   Linker

Ans: b

16. The concept of “Paging” is implemented by:

(a)    Hardware

(b)   Embedded Software

(c)    Firmware

(d)   Operating System

Ans: d

17. What is False about a “Computer Fire Wall”?

(a)    Firewall prevents unauthorized access to computer data

(b)   Firewall can be implemented as Software

(c)    Firewall can be implemented as Hardware

(d)   Firewall is a Virus Program

Ans: d

18. “Retina Scan” is a part of :

(a)    Biometrics

(b)   Biodegradation

(c)    Biology

(d)   Biogas

Ans: a

19. A mathematical way for demonstrating the authenticity of a digital message or documents is known as:

(a)    Internet Protocol

(b)   Remote Procedure Call

(c)    Digital Signature

(d)   Masquerading

Ans: c

20. A criminal activity done by using computers and internet is generally classified as:

(a)    Social Networking

(b)   Cybercrime

(c)    Blogging

(d)   Spamming

Ans: b

   
  Data Collected By – K. Jeyanthi
  Published On – 29th Dec 2021
   

 


Posted

in

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *