100 Basic Computer Related G.K. Questions
100 Basic Computer Related G.K. Questions
COMPUTER APPLICATION CENTRE, KENDRAPARA (Powered by GIT)
| S.No. | Question | Answer |
|---|---|---|
| 1. | Who is the father of Computer science? | Charles Babbage |
| 2. | In a computer, most processing takes place in _______? | CPU |
| 3. | In which type of computer, data are represented as discrete signals? | Digital Computer |
| 4. | Scientific Name of Computer? | Sillico sapiens |
| 5. | What is the name of the display feature that highlights are of the screen which requires operator attention? | Reverse Video |
| 6. | Computers, combine both measuring and counting, are called _______? | Hybrid Computer |
| 7. | What is FORTRAN? | Formula Translation |
| 8. | What translates and executes program at run time line by line? | Interpreter |
| 9. | What converts an entire program into machine language? | Compiler |
| 10. | Who is the father of personal computer? | Edward Robert |
| 11. | EEPROM stands for _______? | Electronic Erasable Programmable Read Only Memory |
| 12. | Who developed the first electronic computer? | J.V. Atansoff |
| 13. | Which programming languages are classified as low level languages? | Assembly Language |
| 14. | The first web browser is _______? | Mosaic |
| 15. | First page of Website is termed as _______? | Homepage |
| 16. | IBM stands for _______? | International Business Machines |
| 17. | Office LANs, which are scattered geographically on large scale, can be connected by the use of corporate _______? | WAN ( wide area network ) |
| 18. | To move a copy of file from one computer to another over a communication channel is called? | File Transfer |
| 19. | Large transaction processing systems in automated organisations use _______? | Batch Processing |
| 20. | MICR stands for _______? | Magnetic Ink Character Recognition |
| 21. | Name of 1st electronic computer? | ENIAC |
| 22. | No. of different characters in ASCII coding system? | 1024 |
| 23. | MSIC stands for _______? | Medium Scale Integrated Circuits |
| 24. | The scrambling of code is known as _______? | Encryption |
| 25. | The first computers were programmed using _______? | Machine Language |
| 26. | A fault in a computer program which prevents it from working correctly is known as _______? | Bug |
| 27. | Which button makes alphabets/letters in uppercase and lowercase and numbers to symbols? | Shift |
| 28. | When a computer is switched on, the booting process performs _______? | Power on self test |
| 29. | What is the software frequently utilized by end users called (like Word, PowerPoint)? | Application Software |
| 30. | Unit of measurement of the output quality of a printer? | Dot per sq. inch |
| 31. | Switching device of fifth generation computer is _______? | VLSI |
| 32. | The unit KIPS is used to measure the speed of _______? | Processor |
| 33. | DOS stands for _______? | Disk Operating System |
| 34. | What is a joy stick primarily in computers used for? | Computer Gaming |
| 35. | In 1999, the Melissa virus was a widely publicized _______? | E-mail virus |
| 36. | Which of the following commands is given to reboot the computer? | Ctrl+Alt+Del |
| 37. | What is correcting errors in a program called? | Debugging |
| 38. | BCD is _______? | Binary Coded Decimal |
| 39. | What type of virus uses computer hosts to reproduce itself? | Worm |
| 40. | SMTP, FTP and DNS are applications of the _______ layer? | Application |
| 41. | Which command is used to select the whole document? | Ctrl+A |
| 42. | COBOL is an acronym for _______? | Common Business Oriented Language |
| 43. | The ability of an OS to run more than one application at a time is called? | Multitasking |
| 44. | What is the functional key to display save-as box? | F12 |
| 45. | Full form of NOS? | Network Operating system |
| 46. | Something which has easily understood instructions is said to be _______? | Analog Data |
| 47. | A modem is connected to a _______? | Telephone Line |
| 48. | Refresh Rate of monitor is measured in? | Hertz |
| 49. | What was the chief component of first generation computer? | Vacuum tube & Valves |
| 50. | Name the Father of Computer Mouse? | Douglas Engelbart |
| 51. | A program that performs a useful task while simultaneously allowing destructive acts is _______? | Trojan Horse |
| 52. | The geometric arrangement of devices on the network is called _______? | Topology |
| 53. | The basic goal of computer process is to convert data into _______? | Information |
| 54. | Where are the CPU and memory located? | Motherboard |
| 55. | Who is known as the founder of IBM Company? | Thomas J. Watson |
| 56. | An image on a computer screen is made up of _______? | Pixels |
| 57. | Full form of MAN? | Metropolitan Area Network |
| 58. | Which command in DOS can be used to recover accidentally deleted files? | UNDELETE |
| 59. | A computer program that converts an entire program into machine language atone time is called _______? | Characters |
| 60. | In which year, the Microsoft company was founded? | 1975 |
| 61. | What is the personal computer operating system that organizes and uses a graphic desktop environment? | Windows |
| 62. | What are Light pen and joystick? | Input Devices |
| 63. | What is a half byte also called as? | Nibble |
| 64. | SMPS stands for _______? | Switched mode Power Supply |
| 65. | What do we use to change the appearance and positioning of text document in MSWord? | Formatting |
| 66. | A _______ is approximately a million bytes? | Megabyte |
| 67. | Daisy wheel, Drum, chain etc are the _______? | Printers |
| 68. | XML stands for _______? | Extensible Markup Language |
| 69. | What kind of scheme is the HTTP protocol? | Request/Response |
| 70. | Magnetic disk is an example of _______? | Secondary Memory |
| 71. | What is the meaning of OSI, in terms of computers ? | Open system Interconnection |
| 72. | Which type of storage device is a BIOS ? | Primary |
| 73. | What is the extension type of the excel 2007 files? | .xlsx |
| 74. | Collecting personal information and effectively posing as another individual is known as the crime of _______? | Identity theft |
| 75. | The amount of vertical space between lines of text in a document is called _______? | Line Spacing |
| 76. | A computer cannot ‘boot’ if it does not have the _______? | Operating system |
| 77. | What is the other name for programmed chip? | LSIC |
| 78. | A normal CD- ROM usually can store up to _______ data? | 680 MB |
| 79. | What does DMA stand for? | Direct Memory Access |
| 80. | Full form of LAN? | Local Area Network |
| 81. | ASCII stands for _______? | American Standard Code for Information Interchange |
| 82. | Second Generation computers were developed during _______? | 1956-65 |
| 83. | When did arch rivals IBM and Apple Computers Inc. decide to join hands? | 1991 |
| 84. | What kind of memory is both static and non-volatile? | ROM |
| 85. | An error in software or hardware is called a bug. What is the alternative computer jargon for it? | Glitch |
| 86. | Unwanted repetitious messages, such as unsolicited bulk e-mail is known as _______? | Spam |
| 87. | The common name for the crime of stealing passwords is _______? | Spoofing |
| 88. | BIOS stands for _______? | Basic Input Output System |
| 89. | Who is regarded as Father of “C” programming language? | Dennis Ritchie |
| 90. | RAM can be treated as the _______ for the computer’s processor. | Waiting Room |
| 91. | Computers manipulate data in many ways, and this manipulation is called _______? | Processing |
| 92. | Joshy, Perfumes are examples of _______? | Viruses |
| 93. | The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called _______? | Computer Forensics |
| 94. | Where does most data go first with in a computer memory hierarchy? | RAM |
| 95. | Help Menu is available at which button? | Start |
| 96. | Which file contains permanent data and gets updated during the processing of transactions? | Master File |
| 97. | A DVD is an example of an _______? | Optical Disc |
| 98. | Which is most common tool used to restrict access to computer system? | Passwords |
| 99. | The technology that stores only essential instructions on a microprocessor chip and thus enhances its speed is referred as _______? | RISC |
| 100. | What is the name of an application program that gathers user information and sends it to someone through the Internet? | Spybot |

Comments
Post a Comment