2014-05-10

General Awareness, 

on Information Technology 

(Questions and Answer)

201. Question: The brain of a computer is
1. CPU
2. CD
3. Floppy disc
4. Megabyte
Answer:1 

202. Question: The most widely used commercial programming computer language is
1. BASIC
2. COBOL
3. FORTRAN
4. PASCAL
Answer:2 

203. Question: Who was the inventor of mechanical calculator for adding numbers?
1. Charles Babbage
2. Peano
3. Newton
4. Pascal
Answer:4 

204. Question: Who wrote the book 'Computer Liberation and Dream Machine', the first book on personal computers?
1. John McCarthy
2. Ted Nelson
3. Niklaus Wirth
4. Karl Capek
Answer:2 

205. Question: Charles Babbage invented
1. ENIAC
2. Difference engine
3. Electronic computer
4. Punched card
Answer:2 

206. Question: TrAnswer  istors are associated with which computer system?
1. First generation
2. Fifth generation
3. Second generation
4. None of these
Answer:3 

207. Question: First generation computer systems used
1. TrAnswer  istors
2. Vacuum tubes
3. Magnetic cores
4. Silicon chips
Answer:2 

208. Question: Which one of the following is a stored program machine?
1. Micro-processor
2. Calculator
3. Analog-computer
4. Micro-computer
Answer:4 

209. Question: Computers can be classified in which of the following hierarchical orders?
1. PC, Large, Super Micro, Super Computer
2. Super Micro, PC, Large, Super Computer
3. PC, Super Micro, Large, Super Computer
4. Large, Super Micro, Super Computer, PC
Answer:3 

210. Question: The unit of hardware, which an operator uses to monitor computer processing, is the
1. Card Reader
2. CPU
3. Line Printer
4. Console
Answer:4 

211. Question: The computer device primarily used to provide hard copy is the
1. CRT
2. Line Printer
3. Computer Console
4. Card Reader
Answer:2 

212. Question: Consider the following statements about Internet facility:
1. It serves as the largest one-line information system.
2. It provides the most dependable and latest mode for sending E-mail.
3. Recurring expenditure on communication E-mail is very high.
4. It is often misused and has triggered cyber-crimes.
Answer:1 

213. Question: Which is/are the main provisions of Information Technology (IT) Act, 2000?
1. Finalisation of contracts through electronic media.
2. Legal recognition to digital signatures and documents.
3. Making hacking with computer system an office.
4. All of the above
Answer:4 

214. Question: Which of the following circuit is used as a 'Memory device' in computers?
1. Rectifier
2. Flip-Flop
3. Comparator
4. Attenuator
Answer:2 

215. Question: The memory of a computer is commonly expressed in terms of Kilobytes or Megabytes. A byte is made up of
1. eight decimal digits
2. eight binary digits
3. two binary digits
4. two decimal digits
Answer:2 

216. Question: For reproducing sound, a CD (Compact Disc) audio player uses a
1. quartz crystal
2. titanium needle
3. laser beam
4. barium titanium ceramic
Answer:3 

217. Question: When a CD (Compact Disc used in audio and Video system) is seen in sunlight, rainbow like colours are seen. This can be explained on the basis of phenomenon of
1. reflection and diffraction
2. reflection and trAnswer  mission
3. diffraction and trAnswer  mission
4. refraction, diffraction and trAnswer  mission
Answer:4 

218. Question: Pickup wrong definition
1. Off line - is a system peripheral equipment not controlled by CPU
2. Online - is system in which peripheral equipment is in direct contact with CPU
3. PL/I is the acronym Peripheral Listing /Index
4. Program or routine is a set sequence of instructions given to computer for problem solving
Answer:3 

219. Question: A computer programmer
1. enters data into computer
2. writes programs
3. changes flow chart into instructions
4. does total planning and thinking for a computer
Answer:4 

220. Question: Terminal is a
1. device used to give supply to a computer
2. Point at which data may leave or enter the computer
3. point where wires are interconnected
4. an input/output device
Answer:2 

221. Question: Errors in computer results could be due to
1. encoding of data
2. trAnswer  mission of data
3. manipulation of data
4. all of the above
Answer:4 

222.Question: Register is a
1. Set of capacitors used to register input instructions in a digital computer
2. Set of paper tapes and cards put in a file
3. Temporary storage unit within the CPU having dedicated or general purpose use
4. part of the auxiliary memory
Answer:3 

223. Question: WAN meAnswer   -
1. Wide Area Network
2. Wine Area Network
3. Woll Area Network
4. Wide Allen Network
Answer:1 

224. Question: MAN is a -
1. Cost
2. Company
3. Network
4. Country
Answer:3 

225. Question: Which of the following is the universal gate?
1. NAND-Gate
2. OR-Gate
3. AND-Gate
4. NOT-Gate
Answer:1 

226. Question: The trAnswer  lator program that converts source code in high level language into machine code line by line is called -
1. Assembler
2. Compiler
3. Loader
4. Interpreter
Answer:4 

227. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer   : B

228. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer   : A

229. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer   : B

230. A(n) ____________ system is a small, wireless handheld computer that scAnswer   an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer   : A

231. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer   : C

232. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer   : C

233. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer   : B

234. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer   : A

235. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer   : A

236. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer   : A

237. ____________ is the science that attempts to produce machines that display the same type of intelligence that humAnswer   do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer   : D

238. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer   : D

239. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer   : B

240. Computers gather data, which meAnswer   that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer   : B

241. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer   : B

242. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer   : C

243. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer   : D

244. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer   : D

245. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer   : C

246. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer   : B

247. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer   : C

248. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer   : C

249. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer   : A

250. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer   : C

Show more