Important Computer Questions Asked in Previous Year Papers for Upcoming Exams 2017 Set-54:
Dear Readers, the List of important computer Quiz from previous year papers were given here for upcoming exams 2017 was given here. Candidates those who are preparing for the exams can use this.
Answer: c)
2). A set of rules for telling the computer what operations to perform is called a
Answer: e)
3). The CPU comprises Control, Memory, and _______ Units.
Answer: b)
4). _________ devices convert human-understandable data and programs into a form that the computer can process.
Answer: e)
5). Networks are monitored by security personnel and supervised by who set(s) up accounts and passwords for authorised network users.
Answer: c)
6). The human-readable version of a program is called
Answer: a)
7). A gateway can be used on which of the following layers of the OSI model?
Answer: d)
8). Meaningful filename helps in easy file
Answer: b)
9). Hackers
Answer: e)
10). Unauthorised copying of software to be used for personal gain instead of for personal backups is called
Answer: c)
1). The letter and number of the intersecting column and row is the
a) cell location
b) cell position
c) cell address
d) cell coordinates
e) cell contents
Answer: c)
2). A set of rules for telling the computer what operations to perform is called a
a) procedural language
b) structures
c) natural language
d) command language
e) programming language
Answer: e)
3). The CPU comprises Control, Memory, and _______ Units.
a) Microprocessor
b) Arithmetic/Logic
c) Output
d) ROM
e) 5) Input
Answer: b)
4). _________ devices convert human-understandable data and programs into a form that the computer can process.
a) Printing
b) Output
c) Solid state
d) Monitor
e) Input
Answer: e)
5). Networks are monitored by security personnel and supervised by who set(s) up accounts and passwords for authorised network users.
a) IT managers
b) the government
c) network administrators
d) password administrators
e) None of these
Answer: c)
6). The human-readable version of a program is called
a) source code
b) program code
c) human code
d) system code
e) None of these
Answer: a)
7). A gateway can be used on which of the following layers of the OSI model?
a) Application
b) Network
c) Session
d) All of the above
e) None of the above
Answer: d)
8). Meaningful filename helps in easy file
a) storing
b) accessing
c) identification
d) printing
e) None of these
Answer: b)
9). Hackers
a) have the same motive
b) are people who maintain computers
c) may legally break into computers as long as they do not do any damage.
d) are people who are allergic to computers.
e) break into other people's computers.
Answer: e)
10). Unauthorised copying of software to be used for personal gain instead of for personal backups is called
a) program theft
b) data snatching
c) software piracy
d) program looting
e) data looting
Answer: c)
1) C 2) E 3) B 4) E 5) C 6) A 7) D 8) B 9) E 10) C
No comments:
Post a Comment