COMPUTER AWARENESS - LTR TEACHERS 2024
COMPUTER/ INTERNET AWARENESS - LTR Teachers 2024
1. What is the full form of CPU?
a) Computer Processing Unit
b) Computer Principle Unit
c) Central Processing Unit
d) Control Processing Unit
2. Which of the following unit is responsible for converting the data received from the user into a computer understandable format?
b) Input Unit
c) Memory Unit
d) Arithmetic & Logic Unit
3. What does USB stand for?
b) Universal Signal Bus
c) Universal Serial Bus
d) Universal Serial Board
4. A computer ________ is a malicious code which self-replicates by copying itself to other programs.
b) virus
c) application
d) worm
5. Shortcut key for "Subscript" is
b) Ctrl+ Shift + =
c) Ctrl + =
d) Ctrl +
6. Any system that uses the HTTP protocol is called ________ ?
b) Web Server
c) WWW
d) TCP/IP
7. Which one of the following is known as 'Permanent Memory"?
b) ROM
c) Cache
d) Registers
8. A place that an user can create to store files is:
b) Folder
c) Boot
d) Text
9. The hardware in which data may be stored for a computer system is called:
b) Chip
c) Memory
d) Control unit
10. The ALU performs _________ operations.
b) Logarithm based
c) Logic
d) ASCII
11. The smallest unit of storage is:
b) Bit
c) Nibble
d) Bug
12. CD-ROM drive is used:
a) To play music
b) To install software
c) To play compact disc
d) To control virus
13. To protect yourself from computer hacker, you should turn on:
a) Google chrome
b) Script
c) Firewall
d) AUP
NOTE - An AUP (Acceptable Use Policy) is a document that defines the acceptable and unacceptable behaviors when using an organization's technology resources, including computers, networks, and the internet.
a) User Interface
b) Screensaver
c) Platform
d) Language Translator
a) FTP
b) JPEG
c) URL
d) HTML
16. Zip is a ______ file.
a) System
b) Combo
c) Executable
d) Compressed
17. To restart the computer, which of the following combination of key is used ?
a) Del + Ctrl
b) Backspace + Ctrl
c) Insert + Esc
d) Ctrl + Alt + Del
18. Malware is used to:
a) Disrupt computer operation
b) Gather sensitive information
c) Gain access to private computer systems
d) All of the above
19. RAM is also called:
a) Volatile memory
b) Non-Volatile memory
c) Permanent Memory
d) Both a and c
a) An operating system
b) A processing device
c) An application software
d) An input device
Post a Comment