Computer Operator Questions
Typewriting and Computer formatting
1. ……………. is a marker indicating next characters on the computer
screen.
Ans. Cursor
2. The full form of CD
Ans. Compact Disk
3. The longest key of the key board in a computer
Ans. Space bar
4. QWERTY layout of key board was developed by:
Ans. Christopher Sholes
5. Information from a computer that is printed in paper is called:
Ans. Hard Copy
6. Windows was developed by:
Ans. Microsoft
7. The short cut key for ‘Undo’:
Ans. Ctrl+Z
8. A device designed to transform images from photos, drawings and
text into computerized documents is:
Ans. Scanner
9. The most common input device used is:
Ans. Keyboard
10. Who invented Carbon paper?
Ans. Pellegrino Turri
11. Maximum storage capacity of a normal Compact Disk (CD) is:
Ans. 700 MB
12. Foot notes are typed in …………. Line space
Ans. Single
13. Short cut command used for “Print” is
Ans. Ctrl+P
14. Touch system was introduced by
Ans. Frank Mc Gurrin
15. In a Semi Official letter …………. Is used as a Complementary
Close.
Ans. Yours Sincerely
16. Ctrl+A is used for
Ans. Select all
17. What is the size of A4 paper
Ans. 210mm x 297mm
18. In a Typewriter the type bars strike at the cylinder through
…………..
Ans. Centre Guide
19. The invention related to Jack Kilby
Ans. Integrated Circuit
20. Taking copies of typewritten matter by means of Carbon paper
is called ………
Ans. Manifolding
21. The first Computer Game is
Ans. Space War
22. The number of scales in a Typewriter:
Ans. Four
23. What is used for typing ‘degree’ after numbers?
Ans. Variable knob
24. Which finger is to be used for striking the shift key
Ans. Little finger
25. …………… releases the right margin and at the same time unlocks
the keyboard.
Ans. Margin release key
26. Which key is used by Right Thumb in a keyboard
Ans. Space bar
27. What is the use of Key Release Key
Ans. Releases the jammed key levers
28. ……………. are used for typing a single character in the Upper
case.
Ans. Shift keys
29. The graphical pictures that represents file, folder etc is
Ans. Icons
30. ……………. is pressed, it gives impression on paper, but do not
cause movement of carriage
Ans. Dead key
31. Feed Rolls are made by:
Ans. Rubber
32. Carriage moves to the left by the force extended by …………….
Ans. Main Spring
33. Who designed Malayalam Key Board?
Ans. N.S Pandala
34. Full form of “GOI” in a typewriting 2nd paper question
Ans. Government of India
35. Push Button is provided in the ………… side of the cylinder
Ans. Left
36. The notes in offices are typing in ………… line space.
Ans. Double
37. UPS means:
Ans. Uninterrupted Power Supply
38. How many Shift Keys are there in a Typewriter
Ans. Two
39. When we type the Balance sheet of the accounts of Profit &
loss, the first page will contain …………….
Ans. Assets
40. Thumb Wheels are other called
Ans. Cylinder Knobs
41. ………… is used for typing Statistical matters, Account
Statements.
Ans. Tabulator key
42. Width of ribbon in typewriter is
Ans. Half Inch
1) Fastest component of a
computer system is
a) Flash ROM b) Cache memory c) DDR RAM d) CPU
2. Which tags are placed on animals, to track all of the animals movements.
a)POS b) RFID c) PPS d) GPS
3. _______________ uses an FAT for file allocation?
a) WINDOWS b) Linux c) Unix d) Solaris
4. TLB stands for?
a) Table Lookup Buffer b) Translation Look aside Buffer c) Translation table d) None
5. The address space of 8086 CPU is?
a) 1 Megabytes b) 256 Kilobytes c) 1 Kilobyte d) 64 kilobytes
6. The following statement
printf(”%f”, 9/5); prints
(a) 1.8 (b) 1.0 (c) 2.0 (d) none of the above
7. C is a?
(a) high level language (b) low level language
(c) high level language with some low level features.
(d) low level language with some high level features.
8. What will happen if in a C program you assign a value to an array element whose subscript exceeds the size of array?
(a. The element will be set to 0.
(b. The compiler would report an error.
(c. The program may crash if some important data gets overwritten.
(d. The array size would appropriately grow.
9. Which of the following operations can be performed on the file "NOTES.TXT" using the below code? FILE *fp;
fp = fopen("NOTES.TXT", "r+");
(a. Reading
(b. Writing
2. Which tags are placed on animals, to track all of the animals movements.
a)POS b) RFID c) PPS d) GPS
3. _______________ uses an FAT for file allocation?
a) WINDOWS b) Linux c) Unix d) Solaris
4. TLB stands for?
a) Table Lookup Buffer b) Translation Look aside Buffer c) Translation table d) None
5. The address space of 8086 CPU is?
a) 1 Megabytes b) 256 Kilobytes c) 1 Kilobyte d) 64 kilobytes
6. The following statement
printf(”%f”, 9/5); prints
(a) 1.8 (b) 1.0 (c) 2.0 (d) none of the above
7. C is a?
(a) high level language (b) low level language
(c) high level language with some low level features.
(d) low level language with some high level features.
8. What will happen if in a C program you assign a value to an array element whose subscript exceeds the size of array?
(a. The element will be set to 0.
(b. The compiler would report an error.
(c. The program may crash if some important data gets overwritten.
(d. The array size would appropriately grow.
9. Which of the following operations can be performed on the file "NOTES.TXT" using the below code? FILE *fp;
fp = fopen("NOTES.TXT", "r+");
(a. Reading
(b. Writing
(c. Appending
(d,Read and Write
10. One of the following is not a real RDBMS
a) dBase b) DBII c) MA Access d) Oracle
11. Multi –media System involves
a) Only Audio and Video
b) Animation Video Movies
c) Animation movie with Text also
d) All type of movie with Animation Graphics and Text
12. The minimum number of temporary variables needed to swap the contents of two variables is?
(a)1 (b)2 (c)3 (d)0
13. Ping is a command used for
a) Checking MAC address
b) Checking Networking functionality and validity of IP address
c) Checking cabling performance
d) Checking cable connectivity only
14. The candidate key which identifies the tuples in a relation uniquely is called?
a) super key b) Primary key c) Foreign key d) none of the above
15. Back up and restore is preferred for
a) All files and data together b) System data areas only
c) Selected file system components d) Disk image for recovery
16. The term bit is
short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
17. A string of eight 0s and
1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
18. A____________ is approximately one billion bytes.
A. kilobyte
B. bit
A. kilobyte
B. bit
C. gigabyte
D. megabyte
D. megabyte
19.____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
A. Hardware
B. A device
C. A peripheral
D. An application
20. The components
that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
A. input devices.
B. output devices.
C. system unit.
D. storage component.
21. A____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
22. All of the following
are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
23.The____________, also called the “brains” of the computer, is responsible for processing
data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
B. memory
C. RAM
D. central processing unit (CPU)
24. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
25. Word processing, spreadsheet, and photo-editing are examples
of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
A. application software.
B. system software.
C. operating system software.
D. platform software.
26.____________ is a set of computer programs used on a computer
to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
A. An instruction
B. Software
C. Memory
D. A processor
27. The PC (personal computer) and the Apple Macintosh are
examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
A. platforms.
B. applications.
C. programs.
D. storage devices.
28. DSL is an example of a(n)____________ connection.
A. network
B. wireless
C. slow
D. broadband
29. Which of the
following is the correct order of the four major functions of a computer?
A. Process , Output , Input , Storage
B. Input , Output, Process , Storage
C. Process , Storage , Input , Output
D. Input , Process , Output , Storage
A. Process , Output , Input , Storage
B. Input , Output, Process , Storage
C. Process , Storage , Input , Output
D. Input , Process , Output , Storage
30.____________ bits
equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
A. Eight
B. Two
C. One thousand
D. One million
31. The operating system
is the most common type of____________ software.
A. communication
B. application
C. system
D. word-processing software
A. communication
B. application
C. system
D. word-processing software
32. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application
33. All of the following are examples of real security and privacy
risks Except_____
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(A) hackers
(B) spam
(C) viruses
(D) identify theft
34. The OSI model is
divided into_______ processes called layers.
(A) five
(B) six
(C) seven
(D) eight
(C) seven
(D) eight
35. Viruses are often transmitted by a floppy disk left in the
floppy drive
(A) Trojan horse
(B) Boot sector
(A) Trojan horse
(B) Boot sector
(C) Script
(D) Logic bomb
(D) Logic bomb
36. Servers are computers that provide resources to other
computers connected to a
(A) mainframe
(B) Network
(C) supercomputer
(D) client
(A) mainframe
(B) Network
(C) supercomputer
(D) client
37. URL stands for........
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
38. You must install a __________ on a network if you want to
share a broadband Internet.
A) Router
(B) modem
(C) node
(D) cable
(B) modem
(C) node
(D) cable
39. Chip is a common nickname for a (n):
(A) transistor
(B) resistor
(C) Integrated circuit
(D) semiconductor
(A) transistor
(B) resistor
(C) Integrated circuit
(D) semiconductor
40. The design of the network is called the network:
(A) Architecture
(B) server
(C) transmission
(D) type
(A) Architecture
(B) server
(C) transmission
(D) type
41. Personal logs or journal entries posted on the Web are known
as:
(A) Podcast
(B) Webcasts
(C) Blogs
(D) subject directories
(A) Podcast
(B) Webcasts
(C) Blogs
(D) subject directories
42. Linux is a ____________ operating system.
(A) Open-source
(B) Microsoft
(C) Windows
(D) Mac
(A) Open-source
(B) Microsoft
(C) Windows
(D) Mac
43. What is a backup?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
44.____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
45. Verification of a login name and password is known as:
(A) configuration
(B) accessibility
(C) Authentication
(D) logging in
(A) configuration
(B) accessibility
(C) Authentication
(D) logging in
46. 'MICR' technology used for clearance of cheques by banks
refers to—
(1) Magnetic Ink Character Recognition
(2) Magnetic Intelligence Character Recognition
(3) Magnetic Information Cable Recognition
(4) Magnetic Insurance Cases Recognition
(1) Magnetic Ink Character Recognition
(2) Magnetic Intelligence Character Recognition
(3) Magnetic Information Cable Recognition
(4) Magnetic Insurance Cases Recognition
47. The CPU and memory are located on the:
A. expansion board.
B. Motherboard.
C. storage device.
D. output device.
A. expansion board.
B. Motherboard.
C. storage device.
D. output device.
48. First generation computer systems used
(a) Transistors
(a) Transistors
(b) Vacuum tubes
(c) Magnetic cores
(c) Magnetic cores
(d) Silicon chips
49. Charles Babbage invented
(a) ENIAC
(a) ENIAC
(b) Difference engine
(c) Electronic computer
(d) Punched card
50. Which one of the following is not a programming language of a
computer?
(a) BASIC
(a) BASIC
(b) FORTRAN
(c) LASER
(d) PASCAL
1. Which is the first computing device?
a) ABACUS
b) UNIVAC-I
c) IBM-1400
d) MARK-II
a) ABACUS
b) UNIVAC-I
c) IBM-1400
d) MARK-II
2. Which is not impact printer?
a) Laser printer
b) Dot-matrix printer
c) Daisy wheel
d) Line printer
3. Which one is sequential (series) access device?
a) Laser printer
b) Dot-matrix printer
c) Daisy wheel
d) Line printer
3. Which one is sequential (series) access device?
a) Floppy disk
b) Magnetic tape
c) Compact disk
d) None of above
4. Which command is used to copy file myfile.doc from floppy
disk to hard disk
a) Copy a:\myfile.doc
c:
b) Copy c:\myfile.doc a:
c) Copy a:\ c:\myfile.doc
d) None of above
5. Which is not system tool?
a) Folder
b) Backup
c) Scandisk
d) Format
6. Which is not related with control panel?
a) Printer
b) Run application
c) Font
d) Keyboard
7. Desktop is a
a) Provide workspace
b) Screen saver
c) Display Program
d) Working with my doc
8. URL is a
a) Uniform Resource
Locator
b) United Resource Locator
c) United Resource Location
d) Uniform Resource Location
9. The acronym of HTML is
a) Hyper Text Mark-up
Language
b) Hyper-Text Marque Language
c) Hybrid Text Marque Language
d) Hyper Type Marque Location
10. Full form of LSI
a) Large Scale Integrated
b) Large Scale
Integration
c) Long Scale Integrated
d) None of above
11. Which device is used to verify signatures on bank checks?
a) BCR
b) OCR
c) MICR
d) OMR
12. Which one is primary storage?
a) PROM
b) Hard disk
c) CPU
d) Zip disk
13. Which memory loses data when power is off?
a) RAM
b) PROM
c) EAPROM
d) ROM
14. Which program translates one line at a time?
a) Interpreter
b) Translator
c) Compiler
d) Assembler
15. Which setting is applied word is opened?
a) Default setting
b) Formatting setting
c) Paragraph setting
d) Standard Setting
16. Which one displays antonyms and synonyms
a) Tools >>
Language >> Thesaurus
b) Tools >> Language >> Dictionary
c) Tools >> Language >> Synonyms
d) None of above
17. Indentation is a
a) Left margin
b) Right margin
c) Left space of
paragraph
d) Top
18. While typing, number in cell is
a) Right aligned
b) Justified
c) Left aligned
d) center aligned
19. work space is a
a) collection of
workbooks
b) collection of sheets
c) collection of documents
d) none of above
20. Which character fixes row or column?
a) &
b) $
c) =
d) @
21. What is integer value of 3/2+5*0.5+A1 where 0.75 is typed in
A1 cell.
a) 4.75
b) 5
c) 3.75
d) None
22. Which is not numeric data type?
a) Byte
b) Bit
c) Single
d) Double
23. Which object uses table & report?
a) Switchboard
b) Query
c) Report
d) Form
24. How many relations can be formed with two tables?
a) One
b) Two
c) Three
d) Four
25. Which one is unique field?
a) Primary key
b) Foreign key
c) Index key
d) None
26. Which is not data field type?
a) Ole
b) Memo
c) Lokup wizard
d) Email
27. Function of F5 in power point
a) Slide sorter
b) View show
c) Slide view
d) Normal view
28. How many options are displayed in power point starting?
a) 2
b) 4
c) 3
d) 5
29. Which heading appears when exploring PowerPoint slides into
Word?
a) Heading1
b) Heading2
c) Heading3
d) Heading4
30. Web site is a
a) Collection of
related webpage
b) Collection of web page
c) Collection of document
d) Collection of file
31. Which is graphical presentation?
a) Folder
b) Icon
c) File
d) None of above
32. Which fields appears when report is created with report
wizard?
a) All fields
b) Selected fields
c) Related fields
d) All of the above
33. Which character forms the formula module in excel?
a) =
b) +
c) ^
d) *
34. What is multimedia?
a) Sound, text, video,
picture
b) Sound, video, picture
c) Text and picture
d) Video and sound
35. What is the combination of characters and paragraph
formatting?
a) Style
b) Theme
c) Autoformat
d) Prargraph
36. Which chart will show nominal data series?
a) Pie
b) Bar
c) Line
d) Column
37. Which menu provides apply design in PowerPoint?
a) Format menu
b) Slide show menu
c) Insert menu
d) Edit menu
38. How many tracks & sectors contain MFDD?
a) 40,9
b) 30,9
c) 50,9
d) 60,9
39. Which option provides user to create separate document
format or layouts?
a) Create section
break
b) Create page break
c) Create column break
d) Text wrapping break
40. How do you create newspaper column?
a) Format >>
column
b) Insert >> column
c) Edit >> column
d) Tools >> column
41. Full form of E-R diagram
a) Engineer Relational Diagram
b) Entity Relation
Diagram
c) External Relational Diagram
d) External Relation Diagram
42. Which of the following does not detect virus?
a) Oracle
b) Name
c) F-port
d) MacAfee
43. Advantage of networking
a) Internet
b) Email
c) Data Sharing
d) All of above
44. Which is a part of CPU?
a) ALU
b) CU
c) Register Unit
d) All of the above
45. What is the function of print manager?
a) Print queue
b) Print cancel
c) Print stop
d) All of the above
46. How many sheets will open when excel is loaded (default
value)?
a) 3
b) 5
c) 7
d) Unlimited
47. To Go to specified page
a) Goto
b) Search
c) Find
d) All of above
48. Processed details
a) Raw facts
b) Information
c) Data records
d) None of the above
49. In which of the following you cannot send from word?
a) Mail recipient
b) Fax recipient
c) Internet explorer
d) PowerPoint
50. MODEM is used for
a) Data transfer
b) Internet connect
c) Email connect
d) None of above
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.