0% found this document useful (0 votes)
50 views59 pages

Core Module - 01

Uploaded by

Tamil Masanam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views59 pages

Core Module - 01

Uploaded by

Tamil Masanam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 59

Computer Hardware Maintenance

1. What is a computer virus? 6. The binary system uses which digits?


A. A type of hardware malfunction A. 0 and 1
B. A malicious software program that B. 0, 1, and 2
replicates itself
C. 0, 1, 2, and 3
C. A harmless computer program
D. 0, 1, 2, 3, and 4
D. A network error
ANSWER: A
ANSWER: B

7. Which component is responsible for converting


2. How do viruses typically spread? digital signals to analog signals for display?
A. Through email attachments A. CPU
B. Through infected files B. GPU
C. Through the internet C. RAM
D. All of the above D. Motherboard
ANSWER: D ANSWER: B

3. What is a boot sector virus? 8. Anti-static wrist straps are used to:
A. A virus that infects the master boot record A. Prevent damage to components due to
B. A virus that infects executable files static electricity

C. A virus that infects email attachments B. Improve computer performance

D. A virus that infects the operating system C. Connect components to the motherboard

ANSWER: A D. Reduce noise


ANSWER: A

4. What is a file virus?


A. A virus that infects executable files 9. A driver is:

B. A virus that infects the boot sector A. A type of hardware

C. A virus that infects email attachments B. A software program that controls


hardware
D. A virus that infects the operating system
C. A type of operating system
ANSWER: A
D. A user interface
ANSWER: B
5. RAM stands for:
A. Read Access Memory
B. Random Access Memory
C. Read Only Memory
D. Recordable Access Memory
ANSWER: B

Page | 1
10. When installing software, it's important to: 14. Malware is:
A. Ignore any prompts or warnings A. Beneficial software
B. Read and agree to the license agreement B. Malicious software
C. Install all software without considering C. A type of hardware
system requirements
D. A computer game
D. Share the installation file with others
ANSWER: B
ANSWER: B

15. Which type of memory is non-volatile and retains


11. An operating system: data even when the power is off?
A. Is a type of application software A. RAM
B. Manages computer hardware and B. ROM
software
C. Cache
C. Is primarily used for gaming
D. Register
D. Is not essential for computer operation
ANSWER: B
ANSWER: B

16. A device that converts analog signals into digital


12. Which type of memory is used for temporary signals is called a:
storage of data?
A. Modem
A. ROM
B. Codec
B. RAM
C. Amplifier
C. HDD
D. DAC
D. SSD
ANSWER: A
ANSWER: B

17. The speed of a CPU is measured in:


13. Before disassembling a computer, it's crucial to:
A. Hertz
A. Unplug it from the power source
B. Bytes
B. Open the case immediately
C. Bits
C. Remove all software
D. Watts
D. Take a picture of the internal components
ANSWER: A
ANSWER: A

18. The expansion slots on a motherboard are used to:


A. Install additional memory
B. Install expansion cards
C. Connect cables
D. Secure the CPU
ANSWER: B
Page | 2
19. A chipset is: 24. When organizing cables, it's recommended to:
A. A type of software A. Use zip ties to bundle cables
B. A group of integrated circuits on the B. Leave cables loose for better airflow
motherboard
C. Hide all cables behind the motherboard
C. A cooling device
D. Ignore cable management
D. A storage device
ANSWER: A
ANSWER: B

25. After assembling a computer, it's crucial to:


20. BIOS stands for:
A. Immediately turn it on
A. Basic Input Output System
B. Check for loose components
B. Binary Input Output System
C. Ignore the power supply
C. Built-in Input Output System
D. Install all software
D. Basic Internal Output System
ANSWER: B
ANSWER: A

26. A software patch is used to:


21. Which component is responsible for converting
A. Add new features
digital data into analog signals for audio output?
B. Fix minor software issues
A. Sound card
C. Completely reinstall software
B. Modem
D. Remove unwanted programs
C. Amplifier
ANSWER: B
D. Speaker
ANSWER: A
27. Open-source software is:
A. Always free
22. A bus is:
B. Has limited functionality
A. A physical channel for data transfer
C. Cannot be modified
B. A type of software
D. Has publicly accessible source code
C. A storage device
ANSWER: D
D. A cooling component
ANSWER: A
28. A backup is a:
A. Copy of data for recovery purposes
23. A case fan is used to:
B. Type of software
A. Improve CPU cooling
C. Open Source
B. Increase storage capacity
D. Internet connection
C. Enhance graphics performance
ANSWER: A
D. Improve airflow within the case
ANSWER: D
Page | 3
29. A software suite is a collection of: 33. What is the purpose of a desktop environment?
A. Hardware components A. To provide a graphical interface for users
B. Related software applications B. To manage hardware resources
C. Drivers C. To run applications in the background
D. Operating systems D. To control network connections
ANSWER: B ANSWER: A

30. What is the difference between a full installation 34. What is a window manager?
and a custom installation?
A. A software application that controls the
A. Full installation installs all components, placement and appearance of windows
while custom allows selecting specific
B. A hardware component that manages the
features.
display
B. Full installation is faster, while custom is
C. A type of input device
slower.
D. A network protocol
C. Full installation requires more disk space,
while custom requires less. ANSWER: A
D. There is no difference between the two.
ANSWER: A 35. What is a widget?
A. A small graphical element that performs a
specific function
31. What is a GUI?
B. A type of software application
A. A text-based interface for interacting with
a computer C. A hardware component
B. A graphical interface for interacting with D. A network protocol
a computer
ANSWER: A
C. A programming language
D. A type of hardware
36. Which of the following is an example of a CLI
ANSWER: B command?
A. Click on the "Start" button
32. Which of the following is an example of a GUI B. Type "ls" to list files and directories
element?
C. Double-click on an icon
A. Command prompt
D. Drag and drop a file
B. Icon
ANSWER: B
C. CLI
D. Terminal
ANSWER: B

Page | 4
37. What is a shell? 42. What is the purpose of the "mkdir" command in
Linux?
A. A hardware component
A. Make directory
B. A software application that provides a
CLI interface B. Move directory
C. A programming language C. Modify directory
D. A network protocol D. Delete directory
ANSWER: B ANSWER: A

38. What is Linux? 43. What is the purpose of the "rm" command in
Linux?
A. A type of hardware
A. Remove file or directory
B. A programming language
B. Rename file or directory
C. An operating system
C. Read file
D. A network protocol
D. Write to file
ANSWER: C
ANSWER: A

39. Which of the following is a Linux distribution?


44. What is the purpose of the "cp" command in
A. Windows
Linux?
B. macOS
A. Copy files or directories
C. Ubuntu
B. Create files or directories
D. Microsoft Office
C. Compare files
ANSWER: C
D. Delete files or directories
ANSWER: A
40. What is the kernel of an operating system?
A. The core component that manages
45. What is the primary function of Microsoft Word?
hardware and software
A. Creating spreadsheets
B. A user interface
B. Creating presentations
C. A type of application software
C. Creating documents
D. A network protocol
D. Managing databases
ANSWER: A
ANSWER: C

41. What is a process?


A. A running instance of a program
B. A type of hardware
C. A file system
D. A network protocol
ANSWER: A
Page | 5
46. What is the primary function of Microsoft Excel? 51. What is a presentation?
A. Creating spreadsheets A. A collection of slides containing text,
images, and multimedia
B. Creating presentations
B. A document containing text and images
C. Creating documents
C. A spreadsheet with data
D. Managing databases
D. A database for storing information
ANSWER: A
ANSWER: A

47. What is the primary function of Microsoft


PowerPoint? 52. What is OpenOffice?
A. Creating spreadsheets A. A web browser
B. Creating presentations B. An operating system
C. Creating documents C. A free and open-source office suite
D. Managing databases D. A programming language
ANSWER: B ANSWER: C

48. What is a database? 53. Which of the following is NOT a core component
of OpenOffice?
A. A collection of organized information
A. Writer
B. A type of software application
B. Excel
C. A hardware component
C. Calc
D. A network protocol
D. Impress
ANSWER: A
ANSWER: B

49. What is a spreadsheet?


54. What is the purpose of the toolbar in OpenOffice
A. A document containing text and images
applications?
B. A table of organized data
A. To display the document content
C. A presentation with slides
B. To provide quick access to common
D. A database for storing information commands
ANSWER: B C. To manage files
D. To edit text
50. What is a chart in a spreadsheet? ANSWER: B
A. A graphical representation of data
B. A formula for calculating values
C. A database table
D. A text format
ANSWER: A

Page | 6
55. What is the purpose of styles in OpenOffice 59. What is a conditional formatting in OpenOffice
Writer? Calc?
A. To format text consistently A. Applying specific formatting based on
certain conditions
B. To create tables
B. A type of chart
C. To insert images
C. A formula for calculating values
D. To check spelling
D. A data validation rule
ANSWER: A
ANSWER: A

56. How do you insert a table in OpenOffice Writer?


60. What is the default file extension for a
A. Use the "Insert" -> "Table" menu
presentation created in OpenOffice Impress?
B. Press the "Tab" key multiple times
A. .pptx
C. Use the "Draw" toolbar
B. .ppt
D. All of the above
C. .odp
ANSWER: A
D. .pdf
ANSWER: C
57. What is the function of the AVERAGE function
in OpenOffice Calc?
61. What is a shape in OpenOffice Draw?
A. Adds a range of numbers
A. A basic geometric object
B. Averages a range of numbers
B. A text box
C. Counts the number of cells
C. A picture
D. Finds the maximum value
D. A line
ANSWER: B
ANSWER: A

58. What is a filter in OpenOffice Calc?


62. How do you insert a picture into OpenOffice
A. A way to display only specific data based
Draw?
on criteria
A. Use the "Insert" -> "Picture" menu
B. A type of chart
B. Copy and paste the picture
C. A formula for calculating values
C. Drag and drop the picture
D. A data validation rule
D. All of the above
ANSWER: A
ANSWER: D

Page | 7
63. What is a connector in OpenOffice Draw? 67. How can you update a device driver?
A. A line that connects two objects A. Through the Device Manager
B. A type of shape B. By downloading the driver from the
manufacturer's website
C. A text box
C. Both A and B
D. A picture
D. Neither A nor B
ANSWER: A
ANSWER: C

64. What is a layer in OpenOffice Draw?


68. What is a file system?
A. A way to organize objects
A. A method of organizing and storing files
B. A type of shape
on a storage device
C. A text box
B. A physical division of a hard drive
D. A picture
C. A logical division of a partition
ANSWER: A
D. A type of file
ANSWER: A
65. What is OpenOffice Base used for?
A. Creating databases
69. What is the purpose of disk checking?
B. Creating spreadsheets
A. Checking for errors on the hard drive
C. Creating presentations
B. Deleting unnecessary files
D. Creating diagrams
C. Combining fragmented files into
ANSWER: A contiguous blocks
D. Creating a backup of the hard drive
66. What is a device driver? ANSWER: A
A. A software program that allows the
operating system to communicate with
70. What is the purpose of the subscription feature in
hardware
the Event Viewer?
B. A type of hardware component
A. To receive notifications when specific
C. A file system events occur
D. A network protocol B. To save event logs automatically
ANSWER: A C. To filter events based on specific criteria
D. To clear event logs automatically
ANSWER: A

Page | 8
71. How can you uninstall a device in the Device 75. What is real-time protection?
Manager?
A. An antivirus feature that constantly
A. Right-click the device and select monitors a computer for threats
"Uninstall device"
B. A type of antivirus software
B. Delete the device's driver file
C. A hardware component
C. Disconnect the device from the computer
D. A network protocol
D. Use the "Uninstall" program
ANSWER: A
ANSWER: A

76. What is a worm?


72. What is the primary function of an antivirus
A. A self-replicating program that spreads
program?
through networks
A. Protecting a computer from viruses and
B. A virus that infects executable files
malware
C. A type of antivirus software
B. Speeding up a computer
D. A hardware component
C. Increasing storage capacity
ANSWER: A
D. Improving internet speed
ANSWER: A
77. What is a Trojan horse?
A. A malicious program disguised as
73. How do antivirus programs protect computers?
legitimate software
A. By detecting and removing viruses
B. A self-replicating program
B. By preventing virus infections
C. A virus that infects the boot sector
C. By repairing damaged files
D. A type of antivirus software
D. All of the above
ANSWER: A
ANSWER: D

78. What is a spyware?


74. What is a virus signature?
A. Software that collects information about a
A. A unique pattern of code that identifies a user without their consent
virus
B. A self-replicating program
B. A type of antivirus software
C. A virus that infects executable files
C. A computer hardware component
D. A type of antivirus software
D. A network protocol
ANSWER: A
ANSWER: A

Page | 9
79. What is a ransomware? 83. What is cleaning computer hardware?
A. Malware that encrypts files and demands A. Removing dust and debris from
a ransom to decrypt them components
B. A self-replicating program B. Replacing damaged components
C. A virus that infects executable files C. Upgrading the operating system
D. A type of antivirus software D. Installing new software
ANSWER: A ANSWER: A

80. What is a malware? 84. How often should computer hardware be cleaned?
A. A general term for malicious software A. Once a year
B. A specific type of virus B. Every six months
C. A hardware component C. Every three months
D. A network protocol D. Monthly
ANSWER: A ANSWER: C

81. What is adware? 85. What is thermal paste used for?


A. Software that displays unwanted ads A. Cooling the CPU
B. A virus that infects executable files B. Cleaning the keyboard
C. A type of antivirus software C. Lubricating moving parts
D. A hardware component D. Protecting against static electricity
ANSWER: A ANSWER: A

82. Why is preventive maintenance important? 86. What is a hardware driver?


A. To extend the life of hardware A. A software program that allows the
components operating system to communicate with
hardware
B. To improve computer performance
B. A type of hardware component
C. To prevent data loss
C. A file system
D. All of the above
D. A network protocol
ANSWER: D
ANSWER: A

Page | 10
87. What is BIOS? 92. What is a hard disk drive (HDD)?
A. Basic Input/Output System A. A type of primary storage
B. Binary Input/Output System B. A type of output device
C. Basic Internal Output System C. A type of input device
D. Built-in Input/Output System D. A type of network device
ANSWER: A ANSWER: A

88. What is a CPU? 93. What is a solid-state drive (SSD)?


A. Central Processing Unit A. A type of primary storage with no
moving parts
B. Control Processing Unit
B. A type of optical storage
C. Computer Processing Unit
C. A type of input device
D. Core Processing Unit
D. A type of output device
ANSWER: A
ANSWER: A

89. What is a GPU?


94. What is a RAM?
A. Graphics Processing Unit
A. Random Access Memory
B. General Processing Unit
B. Read-Only Memory
C. Game Processing Unit
C. Read Access Memory
D. Graphical Processing Utility
D. Removable Access Memory
ANSWER: A
ANSWER: A

90. What is a motherboard?


95. How often should you back up your data?
A. The main circuit board of a computer
A. Once a year
B. A storage device
B. Every six years
C. A type of processor
C. Never
D. A cooling component
D. Regularly, based on data importance
ANSWER: A
ANSWER: D

91. What is a power supply unit (PSU)?


96. What is a hacker?
A. Provides power to the computer
components A. Someone who breaks into computer
systems
B. Stores data
B. A computer programmer
C. Processes information
C. A network administrator
D. Displays output
D. A hardware technician
ANSWER: A
ANSWER: A
Page | 11
97. What is the purpose of a wire stripper? 101. The purpose of taskbar in GUI element is:
A. To remove the outer jacket of a cable A. To show all the system task running in
past.
B. To crimp connectors onto wires
B. To show which programming is running
C. To test network cables
currently in the system.
D. To connect computers to a network
C. To show all the directories present in the
ANSWER: A system
D. All are true
98. Which type of malware is designed to replicate ANSWER: B
itself and spread to other systems?
A. Trojan
102. pwd command in Linux OS does which
B. Virus of the following:
C. Spyware A. It prints the path of the working directory,
starting from the root.
D. Adware
B. It is shell built-in command(pwd) or an
ANSWER: B actual binary(/bin/pwd).
C. It is an environment variable which stores
99. Which of the following is/are true for Linux? the path of the current directory.
A. Linux is an operating system or a kernel, D. All are true
it is open source and supports all kinds of ANSWER: D
hardware components.
B. It is like the Unix system.
103. _____________ is the main package
C. Linux has a GUI system management program in Debian used to install,
D. All mentioned are true build, remove, and manage packages.
ANSWER: D A. chmod
B. fdisk
100. The user interface allows the user to C. dpkg
communicate with the OS. Which of the D. Whatis
following is/are example if interfaces:
ANSWER: C
A. Command Line Interface,Graphical User
Interface (GUI)and Menu-driven
B. Command Line Interface,Graphical User
Interface (GUI)
C. Command Line Interface,Graphical User
Interface (GUI),Menu-driven,Form-based
and Natural language
ANSWER: C

Page | 12
104. Which of the following Operating System 108. Most widely used Text Editor is________
is not type of Linux?
A. Wordpad
A. BSD
B. Paint
B. Ubuntu
C. Photoshop
C. Redhat
D. Notepad
D. CentOS
ANSWER: D
ANSWER: A

109. Collection of related files and subfolders


105. The Linux command ______________ is_______
tape archive, is used to create Archive and extract
A. Menu
the Archive files
B. Disk
A. tar
C. Operating System
B. xvgh
D. Folder
C. rmdir
ANSWER:D
D. gzip
ANSWER: A
110. One Gigabyte (GB) is equal to_______-
A. 1024 bytes
106. Taskbar is used for
B. 1024 KB
A. Navigation program
C. 1024 MB
B. Switching between program
D. 1024 TB
C. Start a program
ANSWER:C
D. All of mentioned
ANSWER:D
111. A _______________ is an all-purpose
knife used for cutting.
107. Folder may contain:
A. Metal Vise
A. Files and sub folders
B. Steel File
B. Only files
C. Utility knife
C. Only sub folders
D. Chalk Line
D. None of the mentioned
ANSWER: C
ANSWER:A

112. Which of the following is a hand tool?


A. Bubble levels
B. All of the mentioned
C. Spanner
D. Pliers
ANSWER: B
Page | 13
113. ______________ protects the eyes from 117. Which of the following is a part of the
all directions during machining. CPU
A. Speed Square A. Mouse
B. Safety goggles B. Keyboard
C. Respirator C. Desktop
D. Face shield D. Arithmetic Logic Unit
ANSWER: B ANSWER: D

114. An electronic tool that allows information 118. If you turn ON a PC and the unit is
to be input, processed, and output clearly ON but the monitor is dark, the problem
could be that:
A. Operating Systems
A. The monitor is not plugged in
B. Motherboard
B. The monitor is not turned on
C. Computer
C. The monitor is not plugged into the PC
D. CPU
D. Any or all of the mentioned
ANSWER: C
ANSWER: D

115. Which of the following tasks can be done


on a modern computer? 119. If a PC behaves freezes or behaves
erratically and the system unit is very quiet, there
A. Complex calculations
is a chance that
B. Internet surfing
A. A virus has infected the system
C. All of the mentioned
B. The RAM of the system is failing
D. Watch movies
C. The power supply fan has failed and the
ANSWER: C system is overheating
D. The hard drive is almost out of space
116. The physical part of the computer is ANSWER: C
known as
A. Hardware
120. The hardware in a PC that keeps track of
B. Software the hardware resources of the system is called
C. Internet A. CMOS-RAM
D. Protocol B. Motherboard
ANSWER: A C. ROM BIOS CHIP
D. Power Supply
ANSWER: B

Page | 14
121. A message saying “Invalid drive 125. What program can be used to keep your
configuration” appears during the bootup of a PC. system up to date and patched up?
The problem most likely could be
A. Windows dispatcher
A. The hard drive cable is not attached to the
B. Windows Upgrade
controller
C. Windows Update
B. The hard drive has failed
D. Device Manager
C. The hard drive has no partitions
ANSWER: C
D. Any of the mentioned
ANSWER: D
126. What do we call the power protection
device that has a battery and provides a few
122. You have loaded a new video card on minutes of power?
your computer and now everything looks really
A. Generator
bad. What should you do first?
B. UPS
A. Check the log in the event viewer
C. Line conditioner
B. View the device manager and see if the
card is configured correctly. D. Surge suppressor
C. Go to the printed manual ANSWER: B
D. Restart the computer
ANSWER: B 127. What is the measurement unit of
resistance?
A. Ohms
123. Which of the following should be done
first to remove an application that you no longer B. Watts
need?
C. Volts
A. Delete the program files
D. Amperes
B. Use the uninstall program that came with
the application ANSWER: A

C. Use the add or remove programs feature


D. Use the registry editor to remove the 128. Different components of the motherboard
references to the program of a PC are linked together by a set of parallel
electrical conducting lines. What are these lines
ANSWER: B called?
A. Buses
124. Which utility is useful to identify the B. Connectors
program that is hogging the processing resources
of the computer? C. Conductors

A. Device Manager D. Drivers

B. System Monitor ANSWER: A

C. Task Manager
D. System Information
ANSWER: C

Page | 15
129. RS-232 is a standard that applies to? 133. ___________ is designed to solve a
specific problem or execute a specific task.
A. Serial Communication
A. Utility software
B. Parallel Communication
B. User software
C. Audio ports
C. Application software
D. Network ports
D. System software
ANSWER: A
ANSWER: C

130. In computer terminology, VGA stands


for? 134. Special Purpose Softwares are also called
A. Volatile Graphics Access A. System Softwares
B. Video Graphics Array B. Utility Softwares
C. Video Graphics Adapter C. Application Softwares
D. Voltage Graph Adapter D. User Interface
ANSWER: B ANSWER: C

131. What is the software that controls system 135. In a computer, an Operating System is an
performances called? example of
A. Overlay Software A. System Software
B. System Software B. Device drivers
C. Control Software C. Application Softwares
D. Application Software D. Custom Softwares
ANSWER: B ANSWER: A

132. A program is 136. Choose the two main types of software


from the following.
A. a device where information is stored
A. Operating System and Device drivers
B. control system that controls the ALU
B. LINUX and UNIX
C. a sequence of instructions
C. Application and System
D. None of the mentioned
D. Windows and macOS
ANSWER: C
ANSWER: C

Page | 16
137. Which of the following is NOT an 142. Cursor is a___________
Operating System?
A. Pixel
A. Windows
B. Thin blinking line
B. Android
C. Pointing indicator
C. Ubuntu
D. None of mentioned
D. None of the mentioned
ANSWER:C
ANSWER: D

143. Run command for Calculator to open


138. linux is a(an)______Operating System
A. cals
A. Microsoft
B. calc
B. Mac
C. calee
C. Open source
D. cal
D. Solaris
ANSWER:B
ANSWER:C

144. Recently deleted files are stored in which


139. Which command will display the system place?
date?
A. Desktop
A. Date
B. Recycle bin
B. Ver
C. Taskbar
C. Dir
D. My Computer
D. Format
ANSWER:B
ANSWER:A

145. Open Office is


140. Not based Linux OS is________
A. Application Software
A. Ubuntu
B. System Software
B. Redhat
C. Operating System
C. CentOs
D. All of the mentioned
D. BSD
ANSWER:A
ANSWER:D

146. Navigating one page to another page is


141. Abbreviation of GUI? called______
A. Giga uses internet A. Hyperlink
B. Geographical user interface B. Menu
C. Graphical User interface C. Source drive
D. Graphical unlimited interface D. None of mentioned
ANSWER:C ANSWER:A
Page | 17
147. What is the shortcutkey used for "Open 151. A joystick is primarily used to/for
File" in Word
A. Computer Gaming
A. Ctrl+F
B. Control sound on screen
B. Ctrl+H
C. Enter text
C. Ctrl+O
D. Draw pictures
D. Ctrl+S
ANSWER: A
ANSWER:C

152. Which of the following is not hardware?


148. Text-style feature of word is
A. Mouse
A. WordColor
B. Motherboard
B. WordFont
C. Printer
C. WordArt
D. Java
D. WordFill
ANSWER: D
ANSWER:C

153. Which System Software acts as a link


149. A disk that has a boot partition is called between the hardware and the software on a
as _________ computer?
A. start disk A. Operating System
B. end disk B. Device drivers
C. boot disk C. Utility Software
D. All of the mentioned D. Firmware
ANSWER: C ANSWER: A

150. File virus attaches itself to the file 154. mv command used for which purpose?
_____________
A. Renaming a file
A. source file
B. Move the file to different directory.
B. object file
C. None of the mentioned
C. executable file
D. Both A and B
D. all of the mentioned
ANSWER:D
ANSWER:C

Page | 18
155. Which of the following is primarily 159. Which of the following components
responsible for converting input (data) into remains on the motherboard?
meaningful output (information)?
A. CMOS battery
A. RAM
B. PCI slot
B. CPU
C. Case fan
C. Storage device
D. Expansion slot
D. Input and Output device
E. All of these
ANSWER: B
ANSWER: E

156. Which device is mostly used to enter data


160. Which button is known as a middle
or information in a computer system?
button used as the third mouse button?
A. Touch screen
A. Right button
B. mouse
B. Left button
C. light pen
C. Scroll wheel
D. keyboard
D. None of these
ANSWER: D
ANSWER: C

157. Which of the following is not a type of


161. Through what hardware does one person
mouse?
speak to the other person on a video conference?
A. Wireless mouse
A. Speaker
B. Optical mouse
B. Monitor
C. Mechanical mouse
C. Microphone
D. Electromechanical mouse
D. Camera
ANSWER: D
ANSWER: C

158. Which memory unit communicates


162. The device that produces hard copies on
directly with the CPU?
paper is called ______.
A. Main memory
A. monitor
B. Register
B. scanner
C. Secondary memory
C. tablet
D. Auxiliary memory
D. printer
ANSWER: A
ANSWER: D

Page | 19
163. External devices/ peripherals like 167. Which command is used to display disk
keyboard and mouse can be connected to a consumption of a specific directory
computer using ______ ports.
A. du
A. PS/2
B. ds
B. USB
C. dd
C. both A & B
D. dds
D. neither A nor B
ANSWER: A
ANSWER: C

168. The file system "NTFS" stands for


164. Which is not a valid file system?
A. New Type File System
A. FAT 16
B. Never Terminated File System
B. FAT 32
C. New Technology File System
C. NTFS
D. Non Terminated File System
D. FXZ
ANSWER: C
ANSWER: D

169. What is a scareware?


165. Which file system DOS typically use?
A. Malware that tries to trick users into
A. FAT 16 buying unnecessary software
B. FAT 32 B. A type of antivirus software
C. NTFS C. A hardware component
D. LMFS D. A network protocol
ANSWER: A ANSWER: A

166. Which command changes a file’s group 170. The primary function of the CPU is:
owner
A. Storing data
A. cgrp
B. Processing data
B. chgrp
C. Inputting data
C. change
D. Outputting data
D. group
ANSWER: B
ANSWER: B

Page | 20
171. Which storage device is typically the 175. A graphics card is primarily used for:
fastest?
A. Processing text
A. Hard Disk Drive (HDD)
B. Processing audio
B. Solid State Drive (SSD)
C. Processing images and video
C. Optical Disk Drive (ODD)
D. Storing data
D. Magnetic Tape
ANSWER: C
ANSWER: B

176. A thermal paste should be:


172. When installing a CPU, it's essential to
A. Thickly applied to the CPU
align:
B. Applied in a thin, even layer
A. The pins on the CPU with the socket
C. Not used at all
B. The heatsink with the fan
D. Applied to the heatsink
C. The RAM slots with the CPU
ANSWER: B
D. The power supply connectors with the
motherboard
ANSWER: A 177. When installing a graphics card, it's
essential to:
A. Use a screwdriver to tighten screws
173. The primary function of a motherboard is:
B. Align the PCIe slot correctly
A. Processing data
C. Install the card before the CPU
B. Storing data
D. Apply thermal paste to the graphics card
C. Connecting computer components
ANSWER: B
D. Displaying output
ANSWER: C
178. A software update is typically used to:
A. Remove unwanted features
174. Which component is responsible for
storing the BIOS? B. Fix bugs and improve performance
A. RAM C. Increase hardware requirements
B. ROM D. Reduce software functionality
C. HDD ANSWER: B
D. SSD
ANSWER: B 179. Freeware is software that:
A. Has a high cost
B. Requires payment after a trial period
C. Can be used without payment
D. Is only available for specific operating
systems
ANSWER: C
Page | 21
180. Shareware is software that: 184. When installing RAM, it's crucial to:
A. Can be used freely without limitations A. Use excessive force
B. Requires payment after a trial period B. Align the notches correctly
C. Is always free C. Install all RAM sticks in the same slot
D. Is only available for specific hardware D. Apply thermal paste to the RAM
ANSWER: B ANSWER: B

181. Which component acts as the 185. A standoff is used to:


intermediary between the CPU and main
A. Improve CPU cooling
memory?
B. Secure the motherboard to the case
A. Hard disk
C. Connect cables
B. Cache
D. Reduce noise
C. Motherboard
ANSWER: B
D. GPU
ANSWER: B
186. Proper grounding is essential to prevent:
A. Overheating
182. The cooling system in a computer is
essential to: B. Static electricity damage
A. Improve performance C. Noise
B. Reduce noise D. Software conflicts
C. Prevent overheating ANSWER: B
D. Increase storage capacity
ANSWER: C 187. A peripheral device is:
A. An internal component of the computer
183. Before installing a CPU, it's important to: B. An external device connected to the
computer
A. Apply thermal paste directly to the CPU
C. A software application
B. Check for bent pins
D. A type of memory
C. Install the RAM first
ANSWER: B
D. Connect the power supply
ANSWER: B

Page | 22
188. When installing a power supply unit, it's 192. When uninstalling software, it's important
important to: to:
A. Connect all cables before securing the A. Delete the software folder manually
PSU
B. Use the operating system's uninstaller
B. Align the mounting holes correctly
C. Restart the computer before uninstalling
C. Install the PSU before the motherboard
D. Ignore any prompts or warnings
D. Apply thermal paste to the PSU
ANSWER: B
ANSWER: B

193. What is a software dependency?


189. A software update is often delivered
A. A requirement for specific hardware
through:
components.
A. Physical media
B. A requirement for other software to
B. Email function correctly.
C. Online download C. A need for internet connection during
installation.
D. Hardware upgrade
D. A limitation on the number of users.
ANSWER: C
ANSWER: B

190. Overclocking a CPU means:


194. What is the purpose of a software
A. Reducing its clock speed
registry?
B. Increasing its clock speed beyond the
A. Stores user preferences and settings.
manufacturer's specifications
B. Manages hardware drivers.
C. Underclocking the GPU
C. Controls the operating system.
D. Adding more cores to the CPU
D. All of the above.
ANSWER: B
ANSWER: A

191. A heat sink is used to:


195. What is a silent installation?
A. Increase CPU performance
A. An installation that requires no user
B. Reduce noise
interaction.
C. Dissipate heat from the CPU
B. An installation that is very quiet.
D. Store data
C. An installation that does not require
ANSWER: C administrative privileges.
D. An installation that installs only essential
files.
ANSWER: A

Page | 23
196. What is the purpose of the "cd" command 200. What is a shell script?
in Linux?
A. A graphical user interface script
A. Change directory
B. A text-based program that runs in a shell
B. Create directory environment
C. Copy directory C. A programming language
D. Delete directory D. A type of hardware
ANSWER: A ANSWER: B

197. What is the purpose of the "ls" command 201. What is the purpose of the "if" statement
in Linux? in a shell script?
A. List files and directories A. To perform conditional execution
B. Create a file B. To create loops
C. Copy a file C. To define functions
D. Delete a file D. To manipulate variables
ANSWER: A ANSWER: A

198. What is the purpose of the "mv" 202. What is a variable in a shell script?
command in Linux?
A. A named storage location for data
A. Move or rename files or directories
B. A keyword
B. Modify files or directories
C. A function
C. Make a copy of files or directories
D. A control structure
D. Delete files or directories
ANSWER: A
ANSWER: A

203. What is the purpose of the "while" loop in


199. What is the purpose of the "cat" a shell script?
command in Linux?
A. To perform conditional execution
A. Create a file
B. To create loops
B. Append text to a file
C. To define functions
C. Display the contents of a file
D. To manipulate variables
D. Delete a file
ANSWER: B
ANSWER: C

Page | 24
204. What is a function in a shell script? 208. What is a macro in Excel?
A. A reusable block of code A. A pre-defined formula
B. A variable B. A recorded series of actions that can be
automated
C. A control structure
C. A chart type
D. A command
D. A data validation rule
ANSWER: A
ANSWER: B

205. What is a database management system


(DBMS)? 209. What is a package manager in Linux?
A. Software for creating, managing, and A. A software tool for installing, managing,
accessing databases and removing software packages
B. A type of hardware B. A type of hardware
C. A programming language C. A programming language
D. A network protocol D. A network protocol
ANSWER: A ANSWER: A

206. What is a query in a database? 210. What is the purpose of the "xargs"
command in a shell script?
A. A request for information from a database
A. Builds command lines from standard
B. A table in a database
input
C. A record in a database
B. Creating files
D. A field in a database
C. Modifying file permissions
ANSWER: A
D. Changing file ownership
ANSWER: A
207. What is a mail merge in Word?
A. Combining a document template with a
211. What is a pivot chart in Excel?
data source to create personalized
documents A. A graphical representation of pivot table
data
B. Sending an email from within Word
B. A type of chart
C. Merging multiple documents into one
C. A formula for calculating values
D. Formatting text in a specific style
D. A data validation rule
ANSWER: A
ANSWER: A

Page | 25
212. What is a conditional formatting in 216. What is the purpose of the "eval"
Excel? command in a shell script?
A. Applying specific formatting based on A. To evaluate an expression
certain conditions
B. To create a function
B. A chart type
C. To handle signals
C. A formula for calculating values
D. To change the working directory
D. A data validation rule
ANSWER: A
ANSWER: A

217. What is the purpose of the "return"


213. What is a template in Word? statement in a shell script function?
A. A pre-formatted document that can be A. To return a value from the function
used as a starting point
B. To exit the script
B. A type of chart
C. To create a loop
C. A formula for calculating values
D. To handle signals
D. A data validation rule
ANSWER: A
ANSWER: A

218. What is the purpose of the header and


214. What is a slide transition in PowerPoint? footer in OpenOffice Writer?
A. The animation effect between slides A. To add text at the top and bottom of each
page
B. A chart type
B. To format the main document content
C. A formula for calculating values
C. To insert images
D. A data validation rule
D. To create tables
ANSWER: A
ANSWER: A

215. What is a database query language?


219. What is the basic unit of data in
A. A language used to interact with and
OpenOffice Calc?
manipulate databases
A. Cell
B. A programming language
B. Row
C. A scripting language
C. Column
D. A markup language
D. Worksheet
ANSWER: A
ANSWER: A

Page | 26
220. How do you enter a formula in 224. What is a slide master in OpenOffice
OpenOffice Calc? Impress?
A. Start with an equal sign (=) A. A predefined layout for slides
B. Use the "Formula" menu B. A type of chart
C. Click the "Formula" button C. A sound effect
D. All of the above D. A transition effect
ANSWER: A ANSWER: A

221. What is the function of the SUM function 225. What is a transition effect in OpenOffice
in OpenOffice Calc? Impress?
A. Adds a range of numbers A. The animation effect between slides
B. Averages a range of numbers B. A type of chart
C. Counts the number of cells C. A formula for calculating values
D. Finds the maximum value D. A data validation rule
ANSWER: A ANSWER: A

222. How do you create a chart in OpenOffice 226. How do you start a slide show in
Calc? OpenOffice Impress?
A. Use the "Insert" -> "Chart" menu A. Press the "F5" key
B. Use the "Data" -> "Chart" menu B. Click the "Slide Show" button
C. Use the "Format" -> "Chart" menu C. Use the "File" -> "Slide Show" menu
D. All of the above D. All of the above
ANSWER: A ANSWER: D

223. What is a pivot table in OpenOffice Calc? 227. What is OpenOffice Draw primarily used
for?
A. A type of chart
A. Creating text documents
B. A way to summarize and analyze data
B. Creating spreadsheets
C. A formula for calculating values
C. Creating presentations
D. A database function
D. Creating diagrams and illustrations
ANSWER: B
ANSWER: D

Page | 27
228. What is a table in OpenOffice Base? 233. What is the Event Viewer used for?
A. A collection of related data A. Viewing system events and errors
B. A type of chart B. Managing hardware devices
C. A query C. Creating system restore points
D. A form D. Monitoring network activity
ANSWER: A ANSWER: A

229. What is a query in OpenOffice Base? 234. What is the purpose of the Event Viewer
in troubleshooting computer problems?
A. A request for specific data from a
database A. To identify potential causes of issues
B. A table B. To fix problems automatically
C. A form C. To prevent future problems
D. A report D. To delete unnecessary files
ANSWER: A ANSWER: A

230. What is a form in OpenOffice Base? 235. How do you open the Device Manager in
Windows?
A. A user interface for entering and editing
data A. Right-click the Start button and select
"Device Manager"
B. A table
B. Open the Control Panel and select
C. A query
"Device Manager"
D. A report
C. Both A and B
ANSWER: A
D. None of the above
ANSWER: C
231. What is a report in OpenOffice Base?
A. A formatted presentation of data
236. What is a logical drive?
B. A table
A. A physical division of a hard drive
C. A query
B. A logical division of a partition
D. A form
C. A file system format
ANSWER: A
D. A type of file
ANSWER: B
232. What is the NTFS file system?
A. A file system developed by Apple
B. A file system developed by Linux
C. A file system developed by Microsoft
D. A file system developed by Sony
ANSWER: C
Page | 28
237. What is the purpose of disk cleanup? 241. How can you save an event log for later
analysis?
A. Deleting unnecessary files
A. By exporting it to a text file
B. Combining fragmented files into
contiguous blocks B. By copying and pasting the contents
C. Creating a backup of the hard drive C. By saving it as a CSV file
D. Checking for errors on the hard drive D. By printing the log
ANSWER: A ANSWER: A

238. What is a custom view in the Event 242. What is the purpose of the "Scan for
Viewer? hardware changes" option in the Device
Manager?
A. A predefined filter for events
A. To detect newly installed or modified
B. A user-defined filter for events
hardware
C. A type of event log
B. To fix hardware problems
D. A way to clear event logs
C. To uninstall hardware
ANSWER: B
D. To update device drivers
ANSWER: A
239. What is the purpose of the Clear Event
Log option?
243. How can you troubleshoot a device
A. Deletes all events from a log
problem using the Device Manager?
B. Deletes events older than a specified date
A. Check for yellow exclamation marks
C. Deletes events from a specific source
B. Update device drivers
D. Deletes events with a specific event ID
C. Uninstall and reinstall the device
ANSWER: A
D. All of the above
ANSWER: D
240. What is the difference between an error
event and a warning event?
244. What is a keylogger?
A. Error events indicate a critical problem,
while warning events indicate a potential A. Software that records keystrokes
issue
B. A virus that infects executable files
B. Error events are less severe than warning
C. A type of antivirus software
events
D. A hardware component
C. There is no difference between the two
ANSWER: A
D. Error events are always generated by
hardware, while warning events are
always generated by software
ANSWER: A

Page | 29
245. What is a polymorphic virus? 249. What is the purpose of using surge
protectors?
A. A virus that changes its code to avoid
detection A. To protect computer equipment from
power surges
B. A virus that infects multiple files
B. To increase internet speed
C. A type of antivirus software
C. To improve computer performance
D. A hardware component
D. To reduce noise
ANSWER: A
ANSWER: A

246. What is a social engineering attack?


250. What is the importance of regular system
A. A type of malware
scans for malware?
B. A technique used to manipulate people
A. To detect and remove malicious software
into revealing personal information
B. To improve computer performance
C. A hardware failure
C. To increase storage space
D. A network error
D. To change the operating system
ANSWER: B
ANSWER: A

247. What is the purpose of software updates?


251. What is crimping?
A. To improve performance and security
A. The process of connecting wires to a
B. To increase hardware compatibility
connector
C. To reduce storage space
B. The process of testing network cables
D. To change the operating system
C. The process of installing network devices
ANSWER: A
D. The process of configuring network
settings
248. What should you do if your computer ANSWER: A
overheats?
A. Ignore it
252. What tools are used for crimping?
B. Increase the fan speed
A. Crimping tool and wire stripper
C. Check for dust buildup and improve
B. Screwdriver and pliers
ventilation
C. Multimeter and cable tester
D. Overclock the CPU
D. None of the above
ANSWER: C
ANSWER: A

Page | 30
253. What is a server? 257. What is encryption?
A. A computer that provides services to A. Converting data into a secret code
other computers
B. Speeding up data transfer
B. A computer that requests services from
C. Compressing data
other computers
D. Storing data
C. A software application
ANSWER: A
D. A network device
ANSWER: A
258. Types of malware is?
A. Caterpillars
254. What is a client?
B. Worms
A. A computer that provides services to
other computers C. Lions
B. A computer that requests services from D. Horses
other computers
ANSWER:B
C. A software application
D. A network device
259. Which one Not a linux distribution?
ANSWER: B
A. debian
B. gentoo
255. What is the client-server model?
C. open SUSE
A. A distributed computing model where
clients request services from servers D. multicsr

B. A centralized computing model ANSWER:D

C. A peer-to-peer computing model


D. A cloud computing model 260. _____are computer programs that are
designed by attackers to gain root access to your
ANSWER: A computer
A. Backdoors
256. What is a database server? B. Rootkits
A. A computer that stores and manages C. Malware
databases
D. Spyware
B. A software application
ANSWER:B
C. A network device
D. A type of hardware
ANSWER: A

Page | 31
261. Antivirus software is an example 265. A strong password should contain these
of______ are
A. business software A. Both uppercase and lowercase letters.
B. an operating system B. A word that is easy to remember, such as
the name of a pet.
C. a security utility
C. At least 8 characters, and a combination
D. An office suite
of letters, numbers, and characters.
ANSWER:C
D. None of the mentioned
ANSWER:C
262. Which of the following self-replicating
software that causes damages to file and system?
266. What is the first boot sector virus?
A. Viruses
A. Brain
B. Trojan horses
B. Mind
C. Bots
C. ELK cloner
D. Worms
D. None of the mentioned
ANSWER:D
ANSWER:A

263. The altering of data so that it is not usable


unless the changes are undone is 267. Which of the following retains the
information it's storing even when the power to
A. biometrics
the system is turned off?
B. encryption
A. ALU
C. ergonomics
B. ROM
D. compression
C. RAM
ANSWER:B
D. DROM
ANSWER:B
264. __________are used in DOS
attacks,against targeted web sites.
268. Which one provide command interpreter
A. Trojan horse
environment?
B. Zombie
A. Kernel
C. Worm
B. Shell
D. Virus
C. CELL
ANSWER:B
D. Hardware
ANSWER:B

Page | 32
269. The taskbar located in the windows (by 273. Pressing and releasing the left mouse
default) _________- button quickly is called______
A. On the start menu A. clicking
B. At the bottom of the screen B. dropping
C. On the quick launch toolbar C. pointing
D. at the top of the screen D. dragging
ANSWER:B ANSWER:A

270. Date and Time are available on the 274. Graphics Application in windows named
desktop at is________
A. Key board A. Brush
B. recycle Bin B. Notepad
C. My computer C. paint
D. Task bar D. Fill
ANSWER:D ANSWER:C

271. The computer administrative tools is 275. The distance between lines in a paragraph
called is called_________.
A. Control panel A. Spacing
B. Start button B. Word Spacing
C. Internet explorer C. Line Spacing
D. Recycle bin D. Row Spacing
ANSWER:A ANSWER:C

272. Elements is used to manage files & 276. Which of the following is an example of
folders is open source software?
A. Control panel A. Adobe Photoshop
B. Windows B. Microsoft Word
C. Window explorer C. Libre Office
D. Internet explorer D. Skype
ANSWER:C ANSWER:C

Page | 33
277. Shortcut key used in Word select 281. Which of the following is NOT a type of
everything pliers.
A. Ctrl+S A. Electronic
B. Ctrl+Alt+Delete B. Pump
C. Ctrl+N C. Flush cutter
D. Ctrl+A D. Square
ANSWER:D ANSWER: D

278. Watermark uses of word document 282. A computer program which is designed to
is______ help people perform an activity using the
computer.
A. Text
A. Internet
B. Image
B. Application
C. Both A & B
C. Hardware
D. None of the mentioned
D. Software
ANSWER:C
ANSWER: B

279. Which item is printed at the TOP of each


page 283. In a computer, ALU can perform
A. Header A. Addition
B. Foot Note B. Subtraction
C. Title C. Multiplication
D. Footer D. All of the mentioned
ANSWER:A ANSWER: D

280. _____________ is a type of tweezer. 284. Combination of Arithmetic Logic Unit


and Control Unit results in a
A. Diamond point
A. Arithmetic Control Unit
B. Pointed slant
B. Control Processing Unit
C. Flathead
C. Central Processing Unit
D. Torx
D. Central Control Logic Unit
ANSWER: B
ANSWER: C

Page | 34
285. All the parts of the computers are 289. Which of the following should be used to
connected to this part and this allows all the part extinguish a computer fire?
of the computer to work together
A. Fire hose
A. Operating System
B. Class A extinguisher
B. Disk Drive
C. Class C extinguisher
C. Output Device
D. Silver Foam Water
D. Motherboard
ANSWER: C
ANSWER: D

290. If the boot-up process of a PC halts and


286. Default pointing device in a laptop is the message - “Non-System disk or disk error....
called Replace and press any key when ready” appears,
the problem might be
A. Mouse
A. A non-bootable CD is in the CD-Drive
B. Keyboard
and you should remove it
C. Touchpad
B. The hard drive has failed and you should
D. Tap-pad replace it
ANSWER: C C. RAM has failed and you should remove it
D. A key on the keyboard is stuck and you
should replace the keyboard
287. This part stores programs and other
information on 2 or more disks that are located ANSWER: A
inside the computer
A. Motherboard
291. Installation of software in a computer
B. Hard drive means
C. CPU A. only copying the software in the
computer
D. Operating System
B. making the software ready for execution
ANSWER: B
C. downloading the software from the
internet
288. ________ keys are present on the top row D. running a drive containing the software
of the keyboard.
ANSWER: B
A. Function
B. Typewriter
292. What part of the computer can be used on
C. Numeric its own?
D. Navigation A. Hardware
ANSWER: A B. Software
C. Firmware
D. None of the mentioned
ANSWER: D

Page | 35
293. If a program is being executed, we call it 297. Which of the following can be transferred
a ___________ over HDMI cable?
A. Task A. Video
B. Instance B. Sound
C. Instruction C. Video and Sound
D. Process D. Neither Video nor Sound
ANSWER: D ANSWER: C

294. Choose the correct statement from the 298. Which type of connector is mostly used
following. these days to connect to network cards?
A. Software is a collection of programs A. BNC
B. A program is a collection of software B. 6 pin
C. There is no relation between software and C. RJ-11
program
D. RJ-45
D. Software becomes a program after
ANSWER: D
installation
ANSWER: A
299. From the following choose the option
which is NOT system software.
295. What beep codes may indicate a system
A. MS Office
board or power supply failure?
B. Language translator
A. No beep
C. Navigator
B. Continuous beep
D. Utility
C. Steady long beeps
ANSWER: A
D. All of the mentioned
ANSWER: D
300. Who takes care of running and loading
programs by use of peripherals?
296. What are physical ports on a computer
A. Operating System
usually referred to as?
B. Control System
A. Buses
C. Dump programs
B. Jacks
D. Function System
C. Interfaces
ANSWER: A
D. Hardware plugs
ANSWER: C
301. Uninstalling an application can be done
only by removing the program folder.
A. True
B. False
ANSWER: B
Page | 36
302. Some software in linux is assembled 306. Syntax used to get the following
using other programs in order to use.this is called: permissions -rwxrw-rw-
A. Creating A. chmod 744
B. Initiating B. chmod 766
C. Compiling C. chmod 777
D. Programming D. chmod 754
ANSWER: C ANSWER: B

303. Linux has configuration files stored in 307. Which program provides user access to
one folder.What is the folder name? delete files in Windows OS?
A. etc A. Window Manager
B. var B. Window Explorer
C. bin C. Internet Explorer
D. home D. Start Menu
ANSWER: A ANSWER: B

304. Evaluates the bash order of evalution to 308. Window task bar shows which programs
determine the first instance to the given command are currently running on the computer
A. type A. True
B. which-a B. False
C. which ANSWER: A
D. hash
ANSWER: A 309. Adding new peripherals(hardware) to
your computer often requires what software to
allow Windows to communicate with the new
305. Which will return a value of 9: hardware?
A. echo $[[4+5]] A. Application Software
B. echo $((4+5)) B. Driver
C. echo [4+5] C. Passenger
D. echo "4+5" D. Installers
ANSWER: B ANSWER: B

Page | 37
310. What program shows the user how much 314. TPI stands for
free space remains on their hard drive?
A. Tongs passing increments
A. Window Explorer
B. Triangle penetrating increments
B. Window Manager
C. Teeth per inch
C. Internet Explorer
D. Tangible penetrating instruments
D. Task Managment
ANSWER: C
ANSWER: A

315. Which of the following is NOT a trait of


311. Windows displays three icons on the top modern computers
right window of an application.The icon appear in
A. Speed
the form of a dash,square, and an x.What function
below occurs after clicking the square? B. Accuracy
A. Program is Maximized C. Intelligence
B. Program is Minimized D. Reliability
C. Program is deleted ANSWER: C
D. Program reboots
ANSWER: A 316. Which of the following is the best way to
prevent damaging your PC from static electricity?
A. Wear an Electrostatic Discharge(ESD)
312. Which of the following is NOT a type of
wrist strap
a screwdriver?
B. Wear leather or rubber-soled shoes
A. Slotted
C. Periodically touch a safe ground spot on
B. Phillips
the PC to discharge yourself
C. Hex
D. Place your PC on a rubber mat
D. Diamond
ANSWER: A
ANSWER: D

317. Choose the correct pair from the


313. Wire strippers remove what from wires? following.
A. Magnetism A. Application Software - Low-Level
Software
B. Excess wire
B. System Software - High-Level Software
C. Insulation
C. System Software - Low-Level Software
D. Oil
D. Middleware - High-Level Software
ANSWER: C
ANSWER: C

Page | 38
318. Firewall is__________ 322. Computer gets the input with the help of
A. A program that protects against viruses. A. mouse and keyboard
B. A wall that is reinforced and cannot catch B. joystick
on fire.
C. printer
C. A filter for an internet connection that
D. both a and b
monitors outgoing and incoming activity.
ANSWER: D
D. None of the mentioned
ANSWER:C
323. Which of the following are not input
devices?
319. Which among the following is the fastest
A. Keyboard, trackball, light pen
memory in a computer that holds information?
B. Barcode reader, OMR, OCR, MICR
A. Register
C. Biometric sensor, scanner, Mic
B. Cache
D. Plotter, projector, headphones
C. Main memory
ANSWER: D
D. RAM
ANSWER: A
324. CPU is fabricated on a single integrated
circuit board that is known as
320. Which of the following are the
A. Motherboard
predominant manufacturers for desktop and
laptop processors? B. Microprocessor
A. Intel C. CU
B. AMD (Advanced Micro Devices) D. ALU
C. Motorola ANSWER: B
D. Both A and B
ANSWER: D 325. Monitor is connected to a computer using
______ port.
A. RS232/ serial
321. Which bus is used to carry data to and
from the memory? B. PS/2
A. Address bus C. VGA (Video Graphics Array)
B. Data bus D. LPT (Line printer Terminal)
C. Control bus ANSWER: C
D. None of these
ANSWER: B

Page | 39
326. On a dot matrix printer, you should never 330. Secondary storage of a computer
lubricate which part? performs______operation
A. carriage rails A. Volatile
B. printhead pins B. Non-volatile
C. paper advance bearings C. Complex
D. carriage bearings D. Non-circuit
ANSWER: B ANSWER:B

327. Which provides the fastest data access 331. The most common buses inside the
time? microcomputer are
A. RAM A. Address bus
B. ROM B. Address bus and Data bus
C. CD-ROM C. Address bus and Control bus
D. Hard disk D. Address bus, Data bus, and Control bus
ANSWER: A ANSWER: D

328. What is the first thing you could do to 332. Which command creates an empty file if
check for damage to a printer after receiving it? file does not exist?
A. Run MSD diagnostics A. cat
B. Attach it to a PC and print something B. touch
C. Check the cables C. ed
D. Unbox it and examine it for physical D. read
damage
ANSWER: B
ANSWER: D

333. A driver conflict occurs when:


329. Files are maintain in which hierachical
A. Two or more drivers are incompatible
structure?
B. The operating system is corrupted
A. Descriptors
C. The hardware is faulty
B. Directories
D. The software is outdated
C. Modifiers
ANSWER: A
D. Relative Files
ANSWER:B

Page | 40
334. A rollback is used to: 338. What is a database relationship?
A. Restore a system to a previous state A. A connection between two tables based
on a common field
B. Upgrade the operating system
B. A formula for calculating values
C. Install new software
C. A chart type
D. Increase system performance
D. A report format
ANSWER: A
ANSWER: A

335. It's generally recommended to create a


system restore point before: 339. What is a file permission in Linux?
A. Installing new hardware A. Controls who can access and modify a
file
B. Installing new software
B. Determines the file size
C. Making significant system changes
C. Specifies the file type
D. All of the above
D. Indicates the file creation date
ANSWER: D
ANSWER: A

336. What is the difference between a major


and minor software update? 340. What is a process ID (PID)?
A. Major updates add new features, while A. A unique identifier for a running process
minor updates fix bugs and improve
B. A file permission
performance.
C. A network port number
B. Major updates are paid, while minor
updates are free. D. A hardware address
C. Major updates require a complete ANSWER: A
reinstallation, while minor updates do
not.
D. There is no difference between the two. 341. What is a user group in Linux?

ANSWER: A A. A collection of users with similar


privileges
B. A physical group of people
337. What is a slide master in PowerPoint?
C. A software application
A. A predefined layout for slides
D. A hardware component
B. A special type of chart
ANSWER: A
C. A sound effect
D. A transition effect
ANSWER: A

Page | 41
342. What is a soft link in Linux? 346. What is the purpose of the "getopts"
command in a shell script?
A. A physical copy of a file
A. To parse command-line arguments
B. A pointer to another file
B. To create functions
C. A type of hardware device
C. To handle signals
D. A network protocol
D. To perform arithmetic operations
ANSWER: B
ANSWER: A

343. What is the purpose of the "exit"


command in a shell script? 347. What is the purpose of the "awk"
command in a shell script?
A. To terminate the script execution
A. Text processing and pattern matching
B. To display a message
B. Creating files
C. To perform arithmetic operations
C. Modifying file permissions
D. To create a loop
D. Changing file ownership
ANSWER: A
ANSWER: A

344. What is the purpose of the "trap"


command in a shell script? 348. What is the purpose of the "sed"
command in a shell script?
A. To handle signals and errors
A. Stream editor for filtering and
B. To create functions
transforming text
C. To perform arithmetic operations
B. Creating files
D. To control the flow of the script
C. Modifying file permissions
ANSWER: A
D. Changing file ownership
ANSWER: A
345. What is the purpose of the "shift"
command in a shell script?
349. What is the purpose of the "test"
A. To shift the positional parameters
command or the square brackets [ ] in a shell
B. To change the working directory script?
C. To create a function A. To perform arithmetic operations
D. To exit the script B. To create functions
ANSWER: A C. To test conditions and make decisions
D. To handle signals
ANSWER: C

Page | 42
350. What is the difference between single 353. What is a relative cell reference in
quotes and double quotes in a shell script? OpenOffice Calc?
A. Single quotes treat all characters literally, A. A cell reference that changes when a
while double quotes allow variable formula is copied
expansion
B. A cell reference that remains constant
B. Single quotes allow variable expansion, when a formula is copied
while double quotes treat all characters
C. A type of chart
literally
D. A data validation rule
C. There is no difference between single
quotes and double quotes ANSWER: A
D. Single quotes are used for strings, double
quotes for numbers
354. What are the three main types of logs in
ANSWER: A the Event Viewer?
A. System, Application, and Security
351. What is the purpose of the "here B. Error, Warning, and Information
document" (<<) in a shell script?
C. Critical, Error, and Warning
A. To redirect output to a file
D. Debug, Information, and Verbose
B. To create a multi-line string
ANSWER: A
C. To define a function
D. To handle signals
355. What is a hidden device in the Device
ANSWER: B Manager?
A. A device that is physically broken
352. What is an absolute cell reference in B. A device that is not currently installed
OpenOffice Calc?
C. A device that is not visible by default
A. A cell reference that changes when a
formula is copied D. A device that is malfunctioning

B. A cell reference that remains constant ANSWER: C


when a formula is copied
C. A type of chart 356. Which security feature prevents a user
D. A data validation rule from accessing websites that may contain
malware or inappropriate content?
ANSWER: B
A. Content Filtering
B. Encryption
C. Authentication
D. Hashing
ANSWER: A

Page | 43
357. What is latency? 361. How do we comment in shell script?
A. The time taken for a data packet to travel A. #
from one point to another
B. /* */
B. The error rate of a communication
C. '
channel
D. //
C. Amount of data that can be transmitted
over a communication channel in a given ANSWER: A
amount of time
D. The type of network topology
362. cd command in Linux is used for;
ANSWER: A
A. Change directory
B. Copy dictionary
358. How can you filter events in the Event
Viewer? C. Create directory

A. By event type, source, and date D. Delete directory

B. By user account only ANSWER: A

C. By event description only


D. By event ID only 363. What does the "cat" command do in
Linux?
ANSWER: A
A. Create a file
B. Append text to a file
359. What are the two types of firewalls?
C. Display the contents of a file
A. Internal and external
D. Delete a file
B. Hardware and software
ANSWER: C
C. Public and private
D. Static and dynamic
364. The default file extension for a
ANSWER: B presentation created in OpenOffice Impress is
A. .pptx
360. What does a red exclamation mark icon B. .ppt
next to an event typically indicate?
C. .odp
A. A successful event
D. .pdf
B. A warning event
ANSWER: C
C. An error event
D. An informational event
365. What is the Device Manager used for?
ANSWER: C
A. Managing files and folders
B. Managing hardware devices
C. Managing system processes
D. Managing network connections
ANSWER: B
Page | 44
366. What is disk defragmentation? 370. CPU serves the purpose of:
A. Deleting unnecessary files A. Storing data
B. Combining fragmented files into B. Inputting data
contiguous blocks
C. Outputting data
C. Creating a backup of the hard drive
D. Processing data
D. Checking for errors on the hard drive
ANSWER: D
ANSWER: B

371. Who can be said to be a hacker?


367. What is the function of "chown"
A. Someone who breaks into computer
command in Linux?
systems
A. Change file owner
B. A hardware technician
B. Change file permissions
C. A computer programmer
C. Change file group
D. A network administrator
D. Change file name
ANSWER: A
ANSWER: A

372. What is preventive maintenance?


368. Why do we use single quotes and double
A. Repairing a computer after it breaks down
quotes in a shell script?
B. Regularly inspecting and maintaining
A. Single quotes treat all characters literally,
computer hardware
while double quotes allow variable
expansion C. Upgrading computer components
B. Single quotes allow variable expansion, D. Installing new software
while double quotes treat all characters
literally ANSWER: B

C. There is no difference between single


quotes and double quotes 373. Which type of memory is non-volatile
D. Single quotes are used for strings, double and retains data though the power is off?
quotes for numbers A. Cache
ANSWER: A B. Register
C. ROM
369. A thermal paste is used to: D. RAM
A. Improve CPU performance ANSWER: C
B. Conduct electricity
C. Improve heat transfer between CPU and
heatsink
D. Reduce noise
ANSWER: C

Page | 45
374. Cable management is important for: 379. Which component stores the BIOS?
A. Better aesthetics A. ROM
B. Reducing noise B. HDD
C. Improving airflow C. SSD
D. All of these D. RAM
ANSWER: D ANSWER: A

375. Disk Management is primarily used for 380. Which unit is used to measure the speed
of CPU:
A. Managing files and folders
A. Hertz
B. Managing hardware devices
B. Bytes
C. Managing system processes
C. Bits
D. Managing network connections
D. Watts
ANSWER: A
ANSWER: A

376. A power supply unit (PSU) converts:


381. What is a CLI?
A. DC power to AC power
A. A graphical interface for interacting with
B. Data to information
a computer
C. AC power to DC power
B. A text-based interface for interacting with
D. Digital signals to analog signals a computer
ANSWER: C C. A programming language
D. A type of hardware
377. When removing a CPU cooler, it's ANSWER: B
important to:
A. Remove the motherboard first
382. A beta version of software is:
B. Avoid touching the CPU core
A. The final, released version
C. Use excessive force
B. A preliminary version for testing
D. Apply pressure evenly
C. A type of malware
ANSWER: B
D. An open-source software
ANSWER: B
378. A software license grants:
A. The right to modify the software
B. Permission to use the software
C. Ownership of the software
D. All of these
ANSWER: B

Page | 46
383. What is bandwidth? 387. Which is not a System tool?
A. The amount of data that can be A. Files
transmitted over a communication
B. Backup
channel in a given amount of time
C. Scandisk
B. The distance between two points on a
network D. Format
C. The number of devices connected to a ANSWER:A
network
D. The type of network topology
388. Dir/W is
ANSWER: A
A. Show all details of file
B. Show only file name and directory name
384. The clock speed of a CPU determines:
C. Shows only directory
A. The amount of data it can process
D. All of the mentioned
B. The speed at which it can execute
instructions ANSWER:B

C. The amount of memory it can access


D. The size of the CPU 389. Valid permission in the linux system
is_________
ANSWER: B
A. Write
B. Half control
385. What is the purpose of the "case"
statement in a shell script? C. Modify

A. To perform conditional execution based D. Change


on multiple conditions ANSWER:A
B. To create loops
C. To define functions 390. FAT Stands for
D. To manipulate variables A. File Accomodation Table
ANSWER: A B. File Access Tape
C. File Allocation Table
386. Copying a process from memory to disk D. File Activity Table
to allow space for other processes is
ANSWER:C
A. Swapping
B. Deadlock
391. Which of the following directory contains
C. Demand Paging configuration files?
D. Page Fault A. /dev/
ANSWER:A B. /etc/
C. /bin/
D. /root/
ANSWER:B
Page | 47
392. Which command will show the 395. Which command on Debian/ubuntu based
configuration details of a wireless connection in Linux platform gives root permissions for other
Linux? commands?
A. grep A. sudo
B. ipconfig B. grep
C. iwconfig C. aptitude
D. ifconfig D. apt-get
ANSWER: C ANSWER: A

393. What type of file system is used in most 396. The operations of the arithmetic unit and
modern Linux Operating Systems? the control unit in a computer are controlled by
A. FAT32 A. ALU itself
B. FAT16 B. Control Unit itself
C. NTFS C. Applications
D. EXT4 D. Memory Unit
ANSWER: D ANSWER: B

394. What is the difference between touch and 397. The programs and data currently being
cat command? processed by CPU is stored in
A. cat command is used to create the file A. Mass Memory
with content whereas touch command is
B. RAM
used to create a file without any content.
C. PROM
B. touch command is used to create the file
with content whereas cat command is D. Non-volatile Memory
used to create a file without any content.
ANSWER: B
C. cat command is used to create the folder
with content whereas touch command is
used to create a folder without any 398. Which of the following controls the
content. process of interaction between the user and the
D. touch command is used to create the file computer?
with content whereas cat command is A. User interface
used to create a folder without any
content. B. Screensaver

ANSWER: A C. Platform
D. Language translator
ANSWER: A

Page | 48
399. What characteristic of read-only memory 403. If the Windows system resources drop
(ROM) makes it useful? below 60%, the system is likely to
A. ROM information can be easily updated. A. Overheat
B. Data in ROM is non-volatile, that is, it B. Crash
remains there even without electrical
C. Run optimally if it has an Intel chip
power.
D. Anti-virus systems start running
C. ROM provides very large amounts of
inexpensive data storage. ANSWER: B
D. ROM chips are easily swapped between
different brands of computers
404. How do you know the right direction of
ANSWER: B plugging in an unscreened flat ribbon cable into a
connector?
A. The red line in the cable goes to the
400. A light-sensitive device that converts
highest pin number
drawing, printed text or other images into digital
form is B. The colored line in the cable goes to the
first pin
A. Keyboard
C. The colored line in the cable goes to the
B. Scanner
last pin
C. Plotter
D. It can be connected in any way.
D. OMR
ANSWER: B
ANSWER: B

405. What should be the first action when


401. Which of the following groups consists of Windows reports that your hard drive is
only input devices? developing bad sectors?
A. Mouse, Keyboard, Monitor A. Replace the hard drive
B. Mouse, Scanner, Printer B. Run secclean from DOS
C. Joystick, Keyboard, Plotter C. Run defrag on the hard drive
D. Mouse, Keyboard, Scanner D. Run Scandisk with the thorough option
ANSWER: D ANSWER: D

402. What is GPF? 406. To test the serial and parallel ports on
your computer, which of the following tools
A. A hard drive with insufficient space
might be used?
B. Part of the Microsoft General Procedures
A. High Volt probe
Windows Format toolkit
B. Cable Scanner
C. A Windows General Protection Fault
C. Oscilloscope
D. None of the mentioned
D. Loopbacks (Wrap Plugs)
ANSWER: C
ANSWER: D

Page | 49
407. How can the CMOS be cleared, including 411. How many pins are there in the USB-C
the password? Connector?
A. Unplug the PC A. 12
B. Unplug the PC and remove the CMOS B. 24
battery
C. 16
C. Run a CMOS command from the
D. 20
command line
ANSWER: B
D. It is not possible
ANSWER: B
412. The software can be installed on a
computer by
408. What could result in a fixed disk error?
(i) Simply copying the software into a folder
A. No CD-Drive installed on the computer
B. Bad RAM (ii) Running an installation procedure to
make the software executable
C. Incorrect CMOS settings
A. Only (i)
D. Bad ROM
B. Only (ii)
ANSWER: C
C. Neither (i) nor (ii)
D. Both (i) and (ii)
409. What is the bus architecture used by
SATA cables? ANSWER: D
A. Parallel
B. Serial 413. The supermarket near your house has
installed a new inventory management system.
C. Depends on the chipset used
What type of software is that?
D. Multiplexed
A. Operating System
ANSWER: B
B. Communications Software
C. System Software
410. How many pins does a PS/2 connector
D. Database Software
have?
ANSWER: D
A. 5
B. 9
C. 12
D. 6
ANSWER: D

Page | 50
414. Select the correct statement about 417. Which command are using view Hidden
application software files?
(i) First, the user deals with system software A. ls -a
and then deals with application software.
B. ls -l
(ii) It is programmed for simple as well as
C. ls -h
complex tasks.
D. Is -k
(iii) It can only be installed on a computer.
ANSWER:A
(iv) It can be a single program or a group of
small programs that are referred to as an
application suite.
418. Which command is used to change
A. All the above statements are correct password of linux system?
B. Only (i), (ii), and (iv) A. password
C. Only (i), (ii), and (iii) B. pass
D. Only (i) and (ii) C. change -p
ANSWER: B D. passwd
ANSWER:D
415. Which of the following is NOT a function
performed by application software?
419. Which of the following command is used
A. Managing Information to print the login shell of an user?
B. Manipulating Data A. echo $SHELL
C. Calculating figures B. echo $LSHELL
D. Memory Management C. echo $LOGIN
ANSWER: D D. None of the mentioned
ANSWER:A
416. Which command is used to view
processes running in the background in linux?
420. Which of the following command is used
A. ls delete the directory?
B. bg A. Deltree/f
C. jobs B. Erase *.*
D. dmsg C. Deltree *.*
ANSWER:C D. Del *.*/p
ANSWER: C

Page | 51
421. We can change the thickness of a line 425. Open office writer is not compatible with
from _______ these extension?
A. Line width A. txt
B. Line Height B. doc
C. Line Thick C. sxw
D. Line Style D. csv
ANSWER:D ANSWER:D

422. Color and pattern used to fill a closed 426. List of files are waiting to be printed on
shape is called___________ printer is called
A. Shapes A. print list
B. Word B. print stack
C. Fill Style C. print queue
D. Fill Back D. print line
ANSWER: C ANSWER:C

423. Which of the following is program 427. Zip files are_________


group?
A. Compressed Files
A. Accessories
B. Fragmented File
B. paint
C. Deleted Files
C. Word
D. Save Files
D. All the mentioned
ANSWER:A
ANSWER:A

428. All device files are stored in which


424. Maximum number of lines you can set for directory in Linux
a drop cap in Word?
A. /dev
A. 15
B. /usr
B. 20
C. /etc
C. 10
D. None of the mentioned
D. Undefined
ANSWER: A
ANSWER:C

Page | 52
429. Home directory represented by a _______ 433. which of the following attacks firewall
symbol. protects is?
A. # A. Phishing
B. ~ B. Dumpster diving
C. ! C. Denial of Service (DoS)
D. $ D. Shoulder surfing
ANSWER:B ANSWER:C

430. Which of the command will be used to 434. Not a reason why people create a
delete all the files from the current directory ? computer virus ?
A. rm ? A. Protection
B. rm ?* B. Identity theft
C. rm [*1 C. Pranks
D. rm * D. Research purpose
ANSWER:D ANSWER:A

431. Which module gives control of the CPU 435. How to set the environmental variable in
to the process selected by the short-term Linux?
scheduler?
A. grep i NAME=VALUE
A. dispatcher
B. grep NAME=VALUE
B. interrupt
C. export NAME=VALUE
C. schedule
D. env NAME=VALUE
D. None of the mentioned
ANSWER: C
ANSWER:A

436. If you want to execute the file name


432. Maintaining the security of important demo.sh in linux, what command will you use ?
data is known as
A. chmod -x sh demo
A. data backup
B. chmod +x demo.sh
B. data protection
C. chmod sh demo.sh
C. data locking
D. chmod +x sh demo
D. data securing
ANSWER: B
ANSWER: B

Page | 53
437. When is it mandatory to use a antivirus 441. How to check how long the windows
on linux machine? machine was running in windows machine?
A. While updating the softwares in linux A. System time in Administration Tab
B. For Upgrading linux versions B. System up time in Administration Tab
C. When running linux based C. System wakeup time in Performance Tab
fileserver/mailserver
D. System up time in Performance Tab
D. While executing the linux commands in
ANSWER: D
shell
ANSWER: C
442. Which of the following statement is
correct in windows?
438. How to find a word hello in a
A. MSI is used only with installers
welcome.txt file using linux command?
B. MSI files cannot be used with installers
A. grep welcome.txt find "hello"
C. MSI & EXE can be executed with
B. grep "hello" welcome.txt
installers
C. grep --find "hello" welcome.txt
D. Something else
D. find "hello" welcome.txt
ANSWER: C
ANSWER: B

443. ______ command is used to check the


439. What is the period character of the hidden connection between a local computer and other
file ssh in linux? computer device?
A. .ssh A. check
B. _ssh B. ping
C. ssh. C. connect
D. All of the mentioned D. search
ANSWER: A ANSWER: B

440. What is the following command used to 444. Which register holds the actual
check the IP Address of the machine using instruction being executed currently by the
command prompt? computer?
A. ipcheck A. Memory address register (MIR)
B. ipaddress B. Instruction register (IR)
C. ipaddr C. Memory data register (MDR)
D. ipconfig D. Program counter register
ANSWER: D ANSWER: B

Page | 54
445. Which register holds the address of the 449. A device that allows entering data and
current instruction being executed? instruction into a computer system is called
A. Instruction register A. interaction
B. Memory data register (MDR) B. terminal
C. Stack register C. communication
D. Program counter D. input
ANSWER: D ANSWER: D

446. Which register holds the address of a 450. Which of the keys are also known as
memory location? modifier keys?
A. Memory data register A. Shift
B. Memory address register B. Ctrl
C. Status register C. Alt
D. Stack address D. All the above
ANSWER: B ANSWER: D

447. Which register shows the results of 451. Which keys are also known as toggle
arithmetic and logical operations such as carry, keys?
overflow, negative?
A. Caps lock, Num lock
A. Stack register
B. Control key, Enter key
B. Status register
C. Shift, Esc
C. Memory data register
D. Both a and b
D. Memory buffer
ANSWER: A
ANSWER: B

452. Which key is used to indent a paragraph?


448. Which of the following register holds a
A. Spacebar
data value that is being stored to or retrieved from
the memory location? B. Tab
A. PSW C. Shift
B. Main memory D. None
C. Memory data register ANSWER: B
D. Cache register
ANSWER: C

Page | 55
453. Which key is used to open the Start 457. Which of the following device provides
menu? surge protection and battery backup power during
a power outage?
A. Windows
A. Battery strip
B. Alt
B. Surge strip
C. Ctrl + Alt
C. UPS
D. None of these
D. USB
ANSWER: A
ANSWER: C

454. Which key is used to erase data from the


computer’s memory and characters on the screen? 458. Which of the following is a temporary
storage location attached to CPU for input and
A. Backspace
output operations?
B. Delete
A. Memory chip
C. Shift + Alt
B. Register
D. Both A and B
C. Buffer
ANSWER: B
D. Core
ANSWER: C
455. Which bus is used to connect external
devices?
459. Which of the following is used to
A. Address
measure the speed of the CPU (processor)?
B. Data
A. Processing speed
C. Control
B. Unit
D. External
C. Coprocessor
ANSWER: D
D. Clock speed
ANSWER: D
456. Which of the following is not an integral
part of the computer system?
460. A uniform interval of CPU time allocated
A. CPU
for performing a task is called
B. Mouse
A. real time
C. Monitor
B. seek time
D. UPS
C. time slice
ANSWER: D
D. unit time
ANSWER: C

Page | 56
461. What is the full form of DMA? 465. Most PCs give a single beep on bootup to
indicate they are ok hardware wise. You boot
A. Direct memory access
your PC and don’t get a beep. What should you
B. Dynamic memory access check first?
C. Double memory access A. system board
D. None of these B. RAM
ANSWER: A C. microprocessor
D. speaker
462. Internal memory of central processing ANSWER: D
unit is nothing but
A. a set of registers
466. _____ is the term used to refer to the
B. a set of ALU and CU process of two modems establishing
communications with each other.
C. buses
A. interacting
D. None
B. handshaking
ANSWER: A
C. connecting
D. linking
463. Which memory is used for storing data
and program instructions currently being executed ANSWER: B
by CPU?
A. Mass memory
467. The opening provided in the front panel
B. Auxiliary memory or rear panel of a CPU for connecting peripherals
is called _____.
C. Internal memory
A. socket
D. Non-volatile memory
B. pin
ANSWER: C
C. port
D. part
464. Which of the following key should be
pressed to move to the beginning of a line of text? ANSWER: C
A. Page up
B. Shift 468. External dialup MODEM can be
connected to a computer using ______ port.
C. Home
A. RS232/ serial
D. Enter
B. PS/2
ANSWER: C
C. VGA
D. LPT
ANSWER: A

Page | 57
469. Home Key helps of 473. You suspect that a virus has entered your
PC. What will not be affected by the virus?
A. Moves the cursor beginning of the
document A. Program Files
B. Moves the cursor beginning of the B. Boot sector
paragraph
C. CD in the CD-Drive
C. Moves the cursor beginning of the screen
D. CMOS
D. Moves the cursor beginning of the line
ANSWER: D
ANSWER:D

474. Every video card must have a


470. Shortcutkey for Replace
A. Control Unit
A. Ctrl+J
B. ROM
B. Ctrl+F
C. RAM
C. Ctrl+H
D. All of the mentioned
D. Ctrl+X
ANSWER: C
ANSWER:C

475. Which option of rm command is used to


471. A tool used to put in cross-head screws. remove a directory with all its subdirectories
A. Phillips head screwdriver A. -b
B. Architect ruler B. -o
C. Flathead screwdriver C. -p
D. Ball peen hammer D. -r
ANSWER: A ANSWER: D

472. You suspect that your system is failing to 476. What access rights are required for the
boot because of a corrupt master boot record. /etc/shadow file?
Which utility is the best to fix this?
A. -r--------
A. Device Manager
B. -rw-rw-r--
B. Task Manager
C. -r--r-----
C. Recovery Console
D. -rwxr--r--
D. Automated System Restore
Answer: A
ANSWER: C

Page | 58
477. Which command will immediately shut
down a computer running Linux?
A. shutdown
B. telinit 6
C. shutdown now
D. telinit 0
Answer: D

478. Which command would give the owner


and group of myfile the permissions of read and
execute while all others have read access?
A. chmod 003 myfile
B. chmod 554 myfile
C. chmod 331 myfile
D. chmod 662 myfile
Answer: B

479. The PS1 environment variable is used to


define which of the following?
A. command path
B. home directory
C. shell prompt
D. signature file
Answer: C

480. Which of the following directories is used


to store system utilities used by the superuser?
A. /etc
B. /root
C. /sbin
D. /usr/local
Answer: C

Page | 59

You might also like