COMPUTER AWARENESS - LTR TEACHERS 2024

 COMPUTER/ INTERNET AWARENESS - LTR Teachers 2024

1. What is the full form of CPU? 

a) Computer Processing Unit 
b) Computer Principle Unit 
c) Central Processing Unit 
d) Control Processing Unit

2. Which of  the following unit is responsible for converting the data received from the user into a computer understandable format? 

a) Output Unit 
b) Input Unit 
c) Memory Unit 
d) Arithmetic & Logic Unit 

3. What does USB stand for? 

a) Universal Signal Board 
b) Universal Signal Bus
c) Universal Serial Bus  
d) Universal Serial Board 

4. A computer ________ is a malicious code which self-replicates by copying itself to other programs. 

a) program 
b) virus 
c) application 
d) worm 

NOTE A computer worm is a type of malware that replicates itself and spreads across networks, often without needing user interaction, unlike viruses which require a host program. 

5. Shortcut key for "Subscript" is 

a) Ctrl+ Shift + 
b) Ctrl+ Shift + = 
c) Ctrl + = 
d) Ctrl + 

6.  Any system that uses the HTTP protocol is called ________ ?

a) Web Browser 
b) Web Server 
c) WWW 
d) TCP/IP 

7. Which one of the following is known as 'Permanent Memory"? 

a) RAM 
b) ROM 
c) Cache 
d) Registers 

8. A place that an user can create to store files is: 

a) Cursor 
b) Folder 
c) Boot 
d) Text 

9. The hardware in which data may be stored for a computer system is called: 

a) Registers 
b) Chip 
c) Memory 
d) Control unit 

10. The ALU performs _________ operations.

a) Algorithm based 
b) Logarithm based
c) Logic
d) ASCII 

11. The smallest unit of storage is: 

a) Byte 
b) Bit 
c) Nibble 
d) Bug 

12. CD-ROM drive is used: 

a) To play music 
b) To install software 
c) To play compact disc 
d) To control virus 


13. To protect yourself from computer hacker, you should turn on: 

a) Google chrome 
b) Script 
c) Firewall 
d) AUP 

NOTE - An AUP (Acceptable Use Policy) is a document that defines the acceptable and unacceptable behaviors when using an organization's technology resources, including computers, networks, and the internet. 

14. Which of the following controls the manner of interaction between the user and the operating system? 

a) User Interface 
b) Screensaver 
c) Platform 
d) Language Translator 

15. Which file format is a method of encoding pictures on a computer? 

a) FTP 
b) JPEG 
c) URL 
d) HTML 

16. Zip is a ______ file.  

a) System 
b) Combo 
c) Executable 
d) Compressed

17. To restart the computer, which of the following combination of key is used ? 

a) Del + Ctrl 
b) Backspace + Ctrl 
c) Insert + Esc 
d) Ctrl + Alt + Del 

18. Malware is used to: 

a) Disrupt computer operation 
b) Gather sensitive information 
c) Gain access to private computer systems 
d)  All of the above 

19. RAM is also called: 

a) Volatile memory 
b) Non-Volatile memory 
c) Permanent Memory 
d) Both a and c 

20. Microsoft Word is an example of _________.

a) An operating system 
b) A processing device 
c) An application software 
d) An input device

No comments

Theme images by molotovcoketail. Powered by Blogger.