TNPSC Computer Awareness Questions and Answers
TNPSC Computer Science 50 Important Questions Answers
More Computer Awareness Papers - Click Here
301. Which of the following can‟t spread virus?
(a) An e-mail with attachment
(b) A plain text mail
(c) Downloading files over the web
(d) A Pen drive use
Answer: (b) A plain text mail
302. A computer assisted method for the recording and analyzing of existing hypothetical systems is known
as ______?
(a) Distributed processing
(b) Data transmission
(c) Data link
(d) Data flow
(d) Data flow
303. „Zipping‟ a file means _____
(a) Encrypting the message
(b) Compressing the message
(c) Transfer the message
(d) All of the above
(b) Compressing the message
304. In processing cheques which of the following I/O techniques have banks traditionally followed?
(a) OCR
(b) MICR
(c) Barcode
(d) VRT
(b) MICR
305. Which of the following command is required to reboot the computer _____?
(a) CTRL+ALT+DEL
(b) CTRL+ALT+TAB
(c) CTRL+ALT+SHIFT
(d) CTRL+SHIFT+DEL
(a) CTRL+ALT+DEL
306. ATM is an example of ______?
(a) Ring topology
(b) Star topology
(c) Bus topology
(d) All of these
(b) Star topology
307. ____ are words that a programming language has set aside for its own use?
(a) Control words
(b) Reserved words
(c) Reserved Keys
(d) Control structures
(b) Reserved words
308. In order to access a mainframe or supercomputer, users often use a _____?
(a) Terminal
(b) Node
(c) Desktop
(d) Handheld
(c) Desktop
309. A Website address is a unique name that identifies a specific _____ on the Web?
(a) Web browser
(b) PDA
(c) Website
(d) Link
(d) Link
310. Reusable optical storage typically has the acronym?
(a) CD
(b) RW
(c) DVD
(d) ROM
(b) RW
311. Personal computers can be connected together to form a ____?
(a) Server
(b) Supercomputer
(c) Enterprise
(d) Network
(d) Network
312. A _____ contains specific rules and words that express the logical steps of an algorithm?
(a) Syntax
(b) Programming language
(c) Programming structure
(d) logic chart
(b) Programming language
313. Quicktime, Realone and Shockwave are among the most popular Web browser _____?
(a) Plug-ins
(b) Cookies
(c) Cascading style sheets
(d) Search engines
(a) Plug-ins
314. Hard disk drives are considered ____ storage?
(a) Flash
(b) Non-volatile
(c) Temporary
(d) Non-permanent
(b) Non-volatile
315. The _____ tells the computer how to use its components
(a) Utility
(b) Network
(c) Operating system
(d) Application program
(c) Operating system
316. Transformation of input into output is performed by _____?
(a) Peripherals
(b) Memory
(c) Storage
(d) The CPU
(d) The CPU
317. A collection of programs t hat controls how your computer system runs and processes information is
called _____?
(a) Operating system
(b) Computer
(c) Office
(d) Compiler
(a) Operating system
318. The „brains‟ of the computer which executes the instructions, is called the ____?
(a) CPU
(b) RAM
(c) Motherboard
(d) System unit
(a) CPU
319. The Principle advantage of adding memory to a printer is to increase ____?
(a) Resolution
(b) Print Speed
c) Number of colors in output
(d) DPI
(b) Print Speed
320. The „IC‟ Chip, used in computers, is made of _____
(a) Chromium
(b) Iron oxide
(c) Silica
(d) Silicon
(d) Silicon
321. Which of the following memory medium is not used as main memory system?
(a) Magnetic core
(b) Semiconductor
(c) Magnetic tape
(d) Both semiconductor and magnetic tape
(c) Magnetic tape
322. Which of the following memories not needs refresh?
(a) SRAM
(b) DRAM
(c) ROM
(d) all of the above
(b) DRAM
323. Which of the following is not a primary storage device?
(a) Magnetic tape
(b) Magnetic disk
(c) Optical disk
(d) None of these
324. A/An ____ is text that you want printed at the bottom of the page?
(a) Header
(b) Endnote
(c) Footnote
(d) Footer
(d) Footer
325. A _____ includes the file name and possibly a directory or folder?
(a) File information packet
(b) file button
(c) file directory
(d) file specification
(c) file directory
326. Pressing F8 key for three times selects _____?
(a) A word
(b) A sentence
(c) A paragraph
(d) Entire document
(b) A sentence
327. Which is not necessary when using bar codes in supermarkets?
(a) Point-of sale (POS) terminal
(b) Check digit on the bar code
(c) Price on the shelf
(d) Price on the goods
(c) Price on the shelf
328. How many columns can you insert in a word document in maximum?
(a) 35
(b) 45
(c) 55
(d) 65
(b) 45
329. The OSI model is divided into ______ processes called layers?
(a) Five
(b) Six
(c) Seven
(d) Eight
(c) Seven
330. ______ servers store and manage files for network users?
(a) Authentication
(b) Main
(c) Web
(d) File
(d) File
331. Programs from the same developer, sold bundles together, that provide better integration and share
common features, toolbars and menus are known as ____?
(a) Software suits
(b) Integrated software packages
(c) Software processing package
(d) Personal information managers
(a) Software suits
332. In a ring topology, the computers in possession of the ____ can transmit data?
(a) Packet
(b) Data
(c) Access method
(d) Token
(d) Token
333. Which part of a Database that holds only one type of information?
(a) Report
(b) Field
(c) Record
(d) File
(b) Field
334. A computer cannot “Boot” if it does not have the _____?
(a) Compiler
(b) Loader
(c) Operating system
(d) Assembler
(c) Operating system
335. Which of the following cables support the highest bandwidth and faster transmission rate?
(a) Twisted pair cable
(b) Coaxial cable
(c) Open wire cable
(d) Fiber optic cable
(d) Fiber optic cable
336. The computer code for interchange of information between terminals is ____?
(a) ASCII
(b) BCD
(c) BCDIC
(d) Hollerith
(a) ASCII
337. Magnetic disk a medium known as _____
(a) Serial access
(b) Direct Access
(c) Sequential access
(d) Sequential and rotational access
(e) None of these
(a) ASCII
338. An octal number 237 is equal to the binary number?
(a) 010 011 111
(b) 010 111 011
(c) 011 101 101
(d) 011 000 001
(a) 010 011 111
339. What is the maximum font size you can apply for any character?
(a) 163
(b) 1638
(c) 16038
(d) 16638
(b) 1638
340. The following are all computing devices, except _____?
(a) Notebook computers
(b) Cellular telephones
(c) digital scanners
(d) personal digital assistants
(c) digital scanners
341. Errors in computer results could be due to ____?
(a) Encoding of data
(b) Transmission of data
(c) Manipulation of data
(d) All of the above
(d) All of the above
342. For reproducing sound, a CD (Compact disc) audio player uses a _____?
(a) Quartz crystal
(b) Titanium needle
(c) Laser beam
(d) Barium titanium ceramic
(c) Laser beam
343. Which of the following circuit is used as a „Memory device‟ in computers?
(a) Rectifier
(b) Flip-Flop
(c) Comparator
(d) Attenuator
(b) Flip-Flop
344. A program written in a high level language is referred to as _____?
(a) Source code
(b) Object code
(c) Machine code
(d) assembly code
(a) Source code
345. All of the following are examples of real security and privacy risks except ____
(a) Hackers
(b) Spam
(c) Viruses
(d) Identify theft
(b) Spam
346. A digital computer did not score over an analog computer in terms of
(a) Speed
(b) Accuracy
(c) Reliability
(d) Cost
(b) Accuracy
347. IBM 7000 digital computer
(a) Belongs to second generation
(b) Uses VLSI
(c) Employs semi conductor memory
(d) Has modular constructions
(c) Employs semi conductor memory
348. The first microprocessor built by the Intel Corporation was called
(a) 8008
(b) 8080
(c) 4004
(d) 8800
(a) 8008
349. One computer that is not considered a portable computer is
(a) Minicomputer
(b) A laptop computer
(c) Micro computer
(d) All of these
(a) Minicomputer
350. Who invented the microprocessor?
(a) Marcian E Huff
(b) Herman H Goldstein
(c) Joseph Jacquard
(d) All of the above
(a) Marcian E Huff
301. Which of the following can‟t spread virus?
(a) An e-mail with attachment
(b) A plain text mail
(c) Downloading files over the web
(d) A Pen drive use
Answer: (b) A plain text mail
302. A computer assisted method for the recording and analyzing of existing hypothetical systems is known
as ______?
(a) Distributed processing
(b) Data transmission
(c) Data link
(d) Data flow
(d) Data flow
303. „Zipping‟ a file means _____
(a) Encrypting the message
(b) Compressing the message
(c) Transfer the message
(d) All of the above
(b) Compressing the message
304. In processing cheques which of the following I/O techniques have banks traditionally followed?
(a) OCR
(b) MICR
(c) Barcode
(d) VRT
(b) MICR
305. Which of the following command is required to reboot the computer _____?
(a) CTRL+ALT+DEL
(b) CTRL+ALT+TAB
(c) CTRL+ALT+SHIFT
(d) CTRL+SHIFT+DEL
(a) CTRL+ALT+DEL
306. ATM is an example of ______?
(a) Ring topology
(b) Star topology
(c) Bus topology
(d) All of these
(b) Star topology
307. ____ are words that a programming language has set aside for its own use?
(a) Control words
(b) Reserved words
(c) Reserved Keys
(d) Control structures
(b) Reserved words
308. In order to access a mainframe or supercomputer, users often use a _____?
(a) Terminal
(b) Node
(c) Desktop
(d) Handheld
(c) Desktop
309. A Website address is a unique name that identifies a specific _____ on the Web?
(a) Web browser
(b) PDA
(c) Website
(d) Link
(d) Link
310. Reusable optical storage typically has the acronym?
(a) CD
(b) RW
(c) DVD
(d) ROM
(b) RW
311. Personal computers can be connected together to form a ____?
(a) Server
(b) Supercomputer
(c) Enterprise
(d) Network
(d) Network
312. A _____ contains specific rules and words that express the logical steps of an algorithm?
(a) Syntax
(b) Programming language
(c) Programming structure
(d) logic chart
(b) Programming language
313. Quicktime, Realone and Shockwave are among the most popular Web browser _____?
(a) Plug-ins
(b) Cookies
(c) Cascading style sheets
(d) Search engines
(a) Plug-ins
314. Hard disk drives are considered ____ storage?
(a) Flash
(b) Non-volatile
(c) Temporary
(d) Non-permanent
(b) Non-volatile
315. The _____ tells the computer how to use its components
(a) Utility
(b) Network
(c) Operating system
(d) Application program
(c) Operating system
316. Transformation of input into output is performed by _____?
(a) Peripherals
(b) Memory
(c) Storage
(d) The CPU
(d) The CPU
317. A collection of programs t hat controls how your computer system runs and processes information is
called _____?
(a) Operating system
(b) Computer
(c) Office
(d) Compiler
(a) Operating system
318. The „brains‟ of the computer which executes the instructions, is called the ____?
(a) CPU
(b) RAM
(c) Motherboard
(d) System unit
(a) CPU
319. The Principle advantage of adding memory to a printer is to increase ____?
(a) Resolution
(b) Print Speed
c) Number of colors in output
(d) DPI
(b) Print Speed
320. The „IC‟ Chip, used in computers, is made of _____
(a) Chromium
(b) Iron oxide
(c) Silica
(d) Silicon
(d) Silicon
321. Which of the following memory medium is not used as main memory system?
(a) Magnetic core
(b) Semiconductor
(c) Magnetic tape
(d) Both semiconductor and magnetic tape
(c) Magnetic tape
322. Which of the following memories not needs refresh?
(a) SRAM
(b) DRAM
(c) ROM
(d) all of the above
(b) DRAM
323. Which of the following is not a primary storage device?
(a) Magnetic tape
(b) Magnetic disk
(c) Optical disk
(d) None of these
324. A/An ____ is text that you want printed at the bottom of the page?
(a) Header
(b) Endnote
(c) Footnote
(d) Footer
(d) Footer
325. A _____ includes the file name and possibly a directory or folder?
(a) File information packet
(b) file button
(c) file directory
(d) file specification
(c) file directory
326. Pressing F8 key for three times selects _____?
(a) A word
(b) A sentence
(c) A paragraph
(d) Entire document
(b) A sentence
327. Which is not necessary when using bar codes in supermarkets?
(a) Point-of sale (POS) terminal
(b) Check digit on the bar code
(c) Price on the shelf
(d) Price on the goods
(c) Price on the shelf
328. How many columns can you insert in a word document in maximum?
(a) 35
(b) 45
(c) 55
(d) 65
(b) 45
329. The OSI model is divided into ______ processes called layers?
(a) Five
(b) Six
(c) Seven
(d) Eight
(c) Seven
330. ______ servers store and manage files for network users?
(a) Authentication
(b) Main
(c) Web
(d) File
(d) File
331. Programs from the same developer, sold bundles together, that provide better integration and share
common features, toolbars and menus are known as ____?
(a) Software suits
(b) Integrated software packages
(c) Software processing package
(d) Personal information managers
(a) Software suits
332. In a ring topology, the computers in possession of the ____ can transmit data?
(a) Packet
(b) Data
(c) Access method
(d) Token
(d) Token
333. Which part of a Database that holds only one type of information?
(a) Report
(b) Field
(c) Record
(d) File
(b) Field
334. A computer cannot “Boot” if it does not have the _____?
(a) Compiler
(b) Loader
(c) Operating system
(d) Assembler
(c) Operating system
335. Which of the following cables support the highest bandwidth and faster transmission rate?
(a) Twisted pair cable
(b) Coaxial cable
(c) Open wire cable
(d) Fiber optic cable
(d) Fiber optic cable
336. The computer code for interchange of information between terminals is ____?
(a) ASCII
(b) BCD
(c) BCDIC
(d) Hollerith
(a) ASCII
337. Magnetic disk a medium known as _____
(a) Serial access
(b) Direct Access
(c) Sequential access
(d) Sequential and rotational access
(e) None of these
(a) ASCII
338. An octal number 237 is equal to the binary number?
(a) 010 011 111
(b) 010 111 011
(c) 011 101 101
(d) 011 000 001
(a) 010 011 111
339. What is the maximum font size you can apply for any character?
(a) 163
(b) 1638
(c) 16038
(d) 16638
(b) 1638
340. The following are all computing devices, except _____?
(a) Notebook computers
(b) Cellular telephones
(c) digital scanners
(d) personal digital assistants
(c) digital scanners
341. Errors in computer results could be due to ____?
(a) Encoding of data
(b) Transmission of data
(c) Manipulation of data
(d) All of the above
(d) All of the above
342. For reproducing sound, a CD (Compact disc) audio player uses a _____?
(a) Quartz crystal
(b) Titanium needle
(c) Laser beam
(d) Barium titanium ceramic
(c) Laser beam
343. Which of the following circuit is used as a „Memory device‟ in computers?
(a) Rectifier
(b) Flip-Flop
(c) Comparator
(d) Attenuator
(b) Flip-Flop
344. A program written in a high level language is referred to as _____?
(a) Source code
(b) Object code
(c) Machine code
(d) assembly code
(a) Source code
345. All of the following are examples of real security and privacy risks except ____
(a) Hackers
(b) Spam
(c) Viruses
(d) Identify theft
(b) Spam
346. A digital computer did not score over an analog computer in terms of
(a) Speed
(b) Accuracy
(c) Reliability
(d) Cost
(b) Accuracy
347. IBM 7000 digital computer
(a) Belongs to second generation
(b) Uses VLSI
(c) Employs semi conductor memory
(d) Has modular constructions
(c) Employs semi conductor memory
348. The first microprocessor built by the Intel Corporation was called
(a) 8008
(b) 8080
(c) 4004
(d) 8800
(a) 8008
349. One computer that is not considered a portable computer is
(a) Minicomputer
(b) A laptop computer
(c) Micro computer
(d) All of these
(a) Minicomputer
350. Who invented the microprocessor?
(a) Marcian E Huff
(b) Herman H Goldstein
(c) Joseph Jacquard
(d) All of the above
(a) Marcian E Huff