Computer Awareness for Upcoming Exams Set 79

Computer Awareness Questions NICL AO Dena Bank PO PGDBF, NIACL Assistant/AO, BoB PO, IBPS PO, IBPS Clerk, BOI, and other competitive exams.

  1. Which of the following statements is true in the context of Watermark?
    A) A watermark can only be applied to a single page in a document
    B) A watermark is not visible to viewers in a hard copy
    C) A watermark is a ghost text
    D) The colour of a watermark cannot be changed
    E) None of these
    View Answer
     Option C
    Explanation:
    A watermark is a ghost text that is set behind the content of a page.
  2. Which among the following is a type of device that is used for identifying people by their unique characteristics?
    A) biometric device
    B) Web camera
    C) joystick
    D) scanner
    E) None of these
    View Answer
     Option A
    Explanation:
    A biometric device is a type of device that records the unique characteristics such as finger prints because it is impossible to have two different persons with the same fingers prints.
  3. A CD player can access data/information using which method?
    A) Sequential Access
    B) Random access
    C) Multivariate Access
    D) All of these
    E) None of these
    View Answer
     Option C
    Explanation:
    All are memory access mechanism which a CD Player can use.
  4. Which one of the following statements is not true for data Buffer?
    A) A data buffer is a region of a physical memory storage used to temporarily store data
    B) A buffer often adjusts timing by implementing a queue (or FIFO) algorithm in memory
    C) A majority of buffers are implemented in software, which typically use the ROM to store temporary data
    D) Buffers are often used in conjunction with I/O to hardware, such as disk drives, sending or receiving data to or from a network
    E) None of these
    View Answer
     Option C               
    Explanation:
    Majority of buffers use the faster RAM to store temporary data, not the ROM, due to the much faster access time compared with hard disk drives.
  5. Which among the following statement is closely related to secondary storage?
    A) It is non-volatile and its content remains after power is switched off
    B) It does not use magnetic media
    C) It consists of four main types of devices
    D) It does not store information for later retrieval
    E) It’s main purpose is to make interconnections of networks
    View Answer
     Option A
    Explanation:
    Secondary storage is non-volatile.
  6. What is a spooler?
    A) Type of printer
    B) Peripheral device
    C) Program
    D) Output device
    E) None of these
    View Answer
     Option C Explanation:
    Spooler is a program in computing that is used to line up print jobs by storing them in the buffer for a short time and allows the printer to print at the time when it is use.
  7. Which of the following techniques can be used to store a large number of files in a small amount of storage space?
    A) File adjustment
    B) File copying
    C) File compatibility
    D) File compression
    E) None of these
    View Answer
     Option D
    Explanation:
    File compression is the technique used to store the large file in a small storage space. It compresses to content of the file in such a way that there is no harm done on the file content and quality.
  8. To which of the following categories do operating systems and debuggers belong?
    A) System software
    B) Application software
    C) Utilities
    D) Programming Language
    E) All of these
    View Answer
     Option A
    Explanation:
    System software is developed to serve as a bridge between the hardware and the user, as the software directly communicates with the hardware. Operating systems and debuggers are two best examples of system software.
  9. Which of the following refers to restarting the system when it is already powered on?
    A) A strong boot
    B) Hibernation
    C) A cold boot
    D) Standby mode
    E) A warm boot
    View Answer
     Option E
    Explanation:
    A restart operation can be carried out by reloading the Operating system while the device is still running. Usually it is carried out by Ctrl +Alt + Delete. Warm boot doesn’t power off and on and doesn’t erase the memory
  10. Every computer connected to an intranet or extranet must have a distinct____
    A) firewall
    B) proxy server
    C) IP address
    D) domain name
    E) None of these
    View Answer
     Option C
    Explanation:
    An Internet Protocol address (IP address) is a numerical label assigned to each device participating in a computer network that uses the Internet Protocol for communication.

Click here for More Computer Awareness Questions

 

 

Related posts

3 Thoughts to “Computer Awareness for Upcoming Exams Set 79”

  1. EKTA

    Mam plss explain q 3. ..

Leave a Comment