Computer Awareness Questions
Computer Awareness Questions and Quiz for Banking, IBPS, RRB, RBI, SBI, NABARD, RI examinations. Computer awareness mcq and computer knowledge questions answers are important in ssc, upsc, ibps and competitive examination and entrance tests. These questions will help to increase your performance in computer awareness section.
Q.1. The property that, when classes are arranged in a hierarchy, each class assumes the attributes and methods of its ancestors is _.
a) generalization
b) inheritance
c) encapsulation
d) information hiding
e) None of these
Q.2. The software component of an expert system that draws conclusions is the _.
a) user interface
b) database
c) inference engine
d) I/O controller
e) model base
Q.3. The attributes and methods for each object are stored in _.
a) an object instance
b) an object connection
c) an assembly structure
d) an object repository
e) None of these
Q.4. An E-R diagram is a graphic method of presenting __.
a) primary keys and their relationships
b) primary keys and their relationships to instances
c) entity classes and their relationships
d) entity classes and their relationships to primary keys
e) None of these
Q.5. _______________ is an invalid type of database key.
a) Structured primary key
b) Atomic primary key
c) Primary key
d) Composite primary key
e) None of these
Q.6. A processor that collects the transmissions from several communications media and sends them over a single line that operates at a higher capacity is called _________.
a) multiplexor
b) bridge
c) hub
d) router
e) None of these
Q.7. Bandwidth refers to _.
a) the cost of the cable required to implement a WAN
b) the cost of the cable required to implement a LAN
c) the amount of information a peer-to-peer network can store
d) the amount of information a communications medium can transfer in a given amount of time
e) None of these
Q.8. ________ is a primary key of one file that also appears in another file.
a) Physical key
b) Primary key
c) Foreign key
d) Logical key
e) None of these
Q.9. The technique that extends storage capacities of main memory beyond the actual size of the main memory is called _________.
a) multitasking
b) virtual storage
c) multiprocessing
d) multiprogramming
e) switching
Q.10. Customers, facilities, knowledge workers, business information, communication infrastructure and computer equipment are all considerations in a good __________ plan.
a) Hacker
b) Disaster recovery
c) Security
d) Risk management
e) None of these
Answers:
Q.1 b) inheritance
Q.2 c) inference engine
Q.3 d) an object repository
Q.4 c) entity classes and their relationships
Q.5 a) Structured primary key
Q.6 a) multiplexor
Q.7 d) the amount of information a communications medium can transfer in a given amount of time
Q.8 c) Foreign key
Q.9 b) virtual storage
Q.10 d) Risk management