mahendras

| Join Mahendras Telegram Channel | Like Mahendras Facebook Page | Online Admission | Download Mahendras App

Now Subscribe for Free videos

Subscribe Now

Computer Knowledge Questions | NIACL Assistant 2017

Mahendra Guru
Computer Awareness Questions |  NIACL Assistant 2017

1. In addition to keying data directly into a database, data entry can be done from a(n)

1) input form

2) table

3) field

4) data dictionary

5) None of these

Ans : 1) input form

2. What is an e-mail attachment?

1) A receipt sent by the recipient

2) A separate document from another program sent along with an e-mail message

3) A malicious parasite that feeds off your messages and destroys the contents

4) A list of CC or BCC recipients

5) None of these

Ans : 2) A separate document from another program sent along with an e-mail message

3. SMTP, FTP and DNS are applications of the ____ layer.

1) data link

2) network

3) transport

4) application

5) None of these

Ans : 4) application

4. In a database, information should be organised and accessed according to which of the following?

1) Physical position

2) Logical structure

3) Data dictionary

4) Physical structure

5) None of these

Ans : 2) Logical structure

5. A _______ is a computer connected to two networks.

1) link

2) server

3) gateway

4) bridge way

5) None of these

Ans : 4) bridge way

6. A file extension is separated from the main file name with a(n) _______, but no spaces.

1) question mark

2) exclamation mark

3) underscore

4) period

5) None of these

Ans : 4) period

7. A telephone number, a birth date, and a customer name are all examples of

1) a record

2) data

3) a file

4) a database

5) None of these

Ans : 1) a record

8. The term _______ designates equipment that might be added to a computer system to enhance its functionality.

1) digital device

2) system add-on

3) disk pack

4) peripheral device

5) None of these

Ans : 4) peripheral device

9. Which key is used in combination with another key to perform a specific task?

1) Function

2) Control

3) Arrow

4) Space bar

5) None of these

Ans : 2) Control

10. The real business and competitive value of information technology lies in

1) The software applications that are used by many companies

2) The capabilities of the software and value of the information, a business acquires and uses

3) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies

4) The capabilities of the hardware and the speed at which it processes information

5) None of these

Ans : 2) The capabilities of the software and value of the information, a business acquires and uses

0 comments:

Post a Comment

MAHENDRA GURU

Copyright © 2023 www.mahendraguru.com All Right Reserved by Mahendra Educational Pvt . Ltd.