Computer Awareness Quiz Set 44

Candidates who are preparing for all competitive examinations they can check this set no. 44 with Questions And Answers along with an accurate explanation. Aspirants can also practice these Questions thoroughly.

Computer Awareness Quiz Set 44

1. Which of the following statements is not true?

2. _______terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.

3. The OSI model is divided into ________ processes called layers.

4. The capability of an operating system to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is

5. __________servers store and manage files for network users.

6. What menu is selected for printing?

7. __________is called as a supervisor of computer activities.

8. Repeater works in _______ layer of OSI mode.

9. _________cells involves creating a single cell by combining two or more selected cells.

10. ___________are the summarised version of slides that display only titles and main text.

11. Which type of software coordinates the interaction of technology devices?

12. File extension are used in order to_________

13. IN Ms-Access, a table can have ______ primary key/keys

14. A commonly use graphic format for the web is

15. SMPS stands for________

16. The ability to find an individual item in a file immediately ____ is used.

17. The main directory of a disk is called the __________ directory

18. A ___ is an icon on the desktop that provides a user with immediate access to a program or file

19. Which one of the following allows users to continue to operate computers while printing is in progress?

20. Which menu is present in WordPad but not present in notepad?

21. Which of the following is NOT one of the four major data processing functions of a computer__________

22. User actions such as keystrokes or mouse clicks are referred to as__________

23. Microsoft’s Access and Corel’s Paradox are both examples of which type of software?

24. To read the system messages and warnings, access the __________ in Windows.

25. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.

26. In the right setting a thief will steal your information by simply watching what you type________

27. Most dangerous risk in leaking of information is___________

28. MCI and AT&T are examples of which of the following?

29. What type of web technology provides news that can automatically download right to your desktop________

30. The __________ of a threat measures its potential impact on a system.



Please enter your comment!
Please enter your name here