Computer Aptitude
1. A …………. contains commands that can be selected.
(1) pointer
(2) menu
(3) icon
(4) button
(5) None of these
2. F2 key use to change the ………. of file/folder.
(1) colour
(2) size
(3) name
(4) style
(5) None of these
3. Arithmetic operations
(1) involve matching one data item to another to determine if the first item is greater than, equal to, or less than the other item
(2) sort data items according to standard, predefined criteria in ascending order or descending order
(3) use conditions with operators such as AND, OR and NOT
(4) include addition subtraction, multiplication and division
(5) None of the above
4. Sending an e-mail is similar to a/an
(1) picturing an event
(2) narrating a story
(3) writing a letter
(4) creating a drawing
(5) None of these
5. Microsoft Word is an example of a/an
(1) operating system
(2) processing device
(3) application software
(4) input device
(5) None of these
6. In application software (MS Excel), there is ………. immediately below the title bar.
(1) text area
(2) menu bar
(3) standards tool bar
(4) scroll bar
(5) None of these
7. Just below the formatting bar, there is
(1) task bar
(2) tool bar
(3) formula bar
(4) scroll bar
(5) None of these
8. In HTML language, which tag is used to give background colour?
(1) <Bg>
(2) <Bg colour>
(3) <Bg>
(4) <Bgc>
(5) <Background>
9. What is the full form of PPP?
(1) Power to Process Point
(2) Point to Point Protocol
(3) Point to Power Protocol
(4) Protocol for powerpoint
(5) None of the above
10. By ………., text can be made more attractive in different colours, shapes and sizes.
(1) word art
(2) picture
(3) word art text book
(4) mail merge
(5) None of these
11. ……… is a folder where the virus suspected files are kept.
(1) Junk mail
(2) Span mail
(3) (1) and (2)
(4) Delete
(5) Virus affected folder
12. ………. is a type of input machine.
(1) Monitor
(2) Printer
(3) Plotter
(4) Keyboard
(5) None of these
13. Wizard is an ………. programme.
(1) active
(2) inactive
(3) interactive
(4) unable
(5) None of these
14. Drop cap option found in which menu?
(1) Insert
(2) Format
(3) Edit
(4) Tools
(5) None of these
15. Which of the following has been made by research facility of digital electronic corporation of USA?
(1) Yahoo
(2) Web cranler
(3) Altavista
(4) Google
(5) All of these
16. To hyperlink on the web page through HTML language, which tag is used?
(1) <ahref>
(2) <a>
(3) <link>
(4) <hlink>
(5) <href>
17. Which of the following function is used to come out (quit) from e-mail account?
(1) Sign in
(2) Sign up
(3) Sign out
(4) Sign down
(5) Sign X
18. What tag is given to invoke from HTML language?
(1) < Form>
(2) <From method post>
(3) <Form invoke>
(4) <Form><invoke>
(5) None of these
19. Where is your files save by default when works with any computer programme?
(1) My Computer
(2) My Folder
(3) My Shortcut
(4) My Document
(5) None of these
20. ………. does works related to exchange of data between the computers.
(1) Sound card
(2) Network card
(3) Expansion slot
(4) Modem
(5) None of these
21. C++ is a/an ……… language.
(1) unnecessary
(2) object oriented
(3) developed
(4) machine
(5) Assembly
22. Which of the following is not an input unit?
(1) Touch pad
(2) Mouse
(3) Scanner
(4) Monitor
(5) Microphone
23. Apple microprocessor was developed in
(1) 1977
(2) 1978
(3) 1979
(4) 1980
(5) 1981
24. “Comic Sans Ms” is example of
(1) font type
(2) font face
(3) font layout
(4) font structure
(5) font design
25. There are …….. type of system software.
(1) 1
(2) 2
(3) 3
(4) 4
(5) 5
26. In which grouping, the formatting of text is done in Word?
(1) Tables, Paragraphs and Indexes
(2) Paragraphs, Indexes and Sections
(3) Characters, Sections and Paragraphs
(4) Indexes, Characters and Tables
(5) None of the above
27. Device drivers are that
(1) tiny power card for external storage devices
(2) specialists knowing how to maximize the performance of devices
(3) short, special purpose programs
(4) internal part of operating system
(5) substitutes for operating system
28. The item but during cutting and pasting process is stored temporarily in
(1) ROM
(2) Hard drive
(3) Diskette
(4) Dashboard
(5) Clipboard
29. All parts of computer are operated by CPU and the system through which it happens is known as
(1) CU
(2) Mouse
(3) Operating system
(4) Keyboard
(5) None of these
30. When power is supplied to the system then to maintain data with the life of battery, computer BIOS contains the following.
(1) CMOS
(2) RAM
(3) DRAM
(4) CPU
(5) None of these
31. Which of the following operating system is beyond the ownership of any company?
(1) UNIX
(2) LINEX
(3) Windows 2000
(4) Mac
(5) Windows
32. Program or instructions are included in ………. of the system.
(1) hardware
(2) icon
(3) information
(4) software
(5) None of these
33. It displays the result given by computer after processing data.
(1) Input
(2) Output
(3) Input/Output
(4) Program
(5) None of these
34. Telephone number, date of birth, name of customer are the example of
(1) record
(2) data
(3) file
(4) database
(5) None of these
35. In MICR, C stands for
(1) code
(2) colour
(3) computer
(4) character
(5) None of these
36. During installation of which of the following, the program files should be copied into the hard disk from CD-ROM or other medium.
(1) Programming software
(2) System hardware
(3) Application hardware
(4) Application software
(5) None of these
37. The capacity of memory of measured in terms of
(1) bit
(2) byte
(3) megabyte
(4) nibble
(5) All of these
38. The place where data or program goes is known as
(1) mouse
(2) keyboard
(3) CPU
(4) CU
(5) None of these
39. All of the following are examples of real security and privacy risks except
(1) hackers
(2) spam
(3) viruses
(4) identity theft
(5) None of these
40. This process is used by large retailers to study trends
(1) data mining
(2) data selection
(3) POS
(4) data conversion
(5) None of these
41. These terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
(1) Data
(2) Point-of-Sale (POS)
(3) Sales
(4) Query
(5) None of these
42. This system is a small, wireless handheld computer that scans an items tag and pulls up the current price {and any special offers) as you shop.
(1) PSS
(2) POS
(3) Inventory
(4) Data mining
(5) None of these
43. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called
(1) Robotics
(2) Simulation
(3) Computer forensics
(4) Animation
(5) None of these
44. Which of the following is not one of the four major data processing functions of a computer?
(1) Gathering data
(2) Processing data into information
(3) Analysing the data or information
(4) Storing the data or information
(5) None of the above
45. This tags, when placed on an animal, can be used to record and track in an a database all of the animals movements.
(1) POS
(2) RFID
(3) PPS
(4) GPS
(5) None of these
46. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as
(1) robotics
(2) computer forensics
(3) simulation
(4) forecasting
(5) None of these
47. Technology no longer protected by copyright, available to everyone, is considered to be
(1) proprietary
(2) open
(3) experimental
(4) in the public domain
(5) None of these
48. It is the study of molecules and structures whose size ranges from 1 to 100 nanometres.
(1) Nanoscience
(2) Microelectrodes
(3) Computer forensics
(4) Artificial intelligence
(5) None of these
49. It is the science that attempts to produce machines that display the same type of intelligence that humans do.
(1) Nanoscience
(2) Nanotechnology
(3) Simulation
(4) Artificial intelligence [AI]
(5) None of the above
50. Which type of data has been organized or presented in a meaningful fashion?
(1) A process
(2) Software
(3) Storage
(4) Information
(5) None of these
51. The name for the way that computers manipulate data into information is called
(1) Programming
(2) Processing
(3) Storing
(4) Organising
(5) None of these
52. Computers gather data, which means that they allow users to
(1) present data
(2) input data
(3) output data
(4) store data
(5) None of these
53. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered
(1) data
(2) output
(3) input
(4) the process
(5) None of these
54. Computers use which language to process data?
(1) Processing
(2) Kilobyte
(3) Binary
(4) Representational
(5) None of these
55. Computers process data into information by working exclusively with
(1) multimedia
(2) words
(3) characters
(4) numbers
(5) None of these
56. In the binary language, each letter of the alphabets, each number and each special character is made up of a unique combination of
(1) eight bytes
(2) eight kilobytes
(3) eight characters
(4) eight bits
(5) None of these
57. The term bit is short for
(1) megabyte
(2) binary language
(3) binary digit
(4) binary number
(5) None of these
58. A string of eight 0s and 1s is called a
(1) megabyte
(2) byte
(3) kilobyte
(4) gigabyte
(5) None of these
59. It is approximately one billion bytes.
(1) Kilobyte
(2) Bit
(3) Gigabyte
(4) Megabyte
(5) None of these
60. It is approximately a million bytes.
(1) Gigabyte
(2) Tilobyte
(3) Megabyte
(4) Terabyte
(5) None of these
61. It is any part of the computer that you can physically touch.
(1) Hardware
(2) A device
(3) A peripheral
(4) An application
(5) None of these
62. The components that process data are located in the
(1) input devices
(2) output devices
(3) system unit
(4) storage component
(5) None of these
63. The chip, used in computers, is made of
(1) chromium
(2) iron oxide
(3) silica
(4) silicon
(5) None of these
64. Which of the following is an example of an input device?
(1) Scanner
(2) Speaker
(3) CD
(4) Printer
(5) None of these
65. All of the following are examples of storage devices except
(1) hard disk drives
(2) printers
(3) floppy disk drives
(4) CD drives
(5) None of these
66. It is also called the brain of the computer, is responsible for processing data.
(1) Motherboard
(2) Memory
(3) RAM
(4) Central Processing (CPU)
(5) None of the above
67. The CPU and memory are located on the
(1) expansion board
(2) motherboard
(3) storage device
(4) output device
(5) None of these
68. Word processing, spreadsheet and photo-editing are examples of
(1) application software
(2) system software
(3) operating system software
(4) platform software
(5) None of the above
69. It is a set of computer programs used on a computer to help perform tasks
(1) and instruction
(2) software
(3) memory
(4) a processor
(5) None of these
70. It is the set of programs that enables your computer hardware devices and application software to work together
(1) management
(2) processing
(3) utility software
(4) system software
(5) None of these
71. The PC (Personal Computer) and the Apple Macintosh are examples of two different
(1) platforms
(2) applications
(3) programs
(4) storage device
(5) None of these
72. Apple Macintoshes (Macs) and PCs use different CPU’s to process data and different
(1) languages
(2) methods
(3) operating system
(4) storage devices
(5) None of these
73. Servers are computers that provide resources to other computers connected to a
(1) network
(2) mainframe
(3) super computer
(4) client
(5) None of these
74. Smaller and less expensive PC based servers are replacing today in many business
(1) super computers
(2) clients
(3) laptops
(4) mainframes
(5) None of the above
75. These are specially designed computers that perform complex calculations extremely rapidly
(1) servers
(2) super computers
(3) laptops
(4) mainframes
(5) None of these
Latest Govt Job & Exam Updates: