cpct previous year paper 18 September 2016

cpct previous year paper 18 September 2016 Shift 1


1)  Which memory provides high-speed data access to a processor and stores frequently used computer programs, applications and data?
A)    Cache memory
B)    Hard Disk
C)    ALU
D)    Secondary memory
Ans: A) Cache memory

2) Third Generation computers were developed in:
A)    1960’s
B)    Late 1950’s
C)    1970’s
D)    1990’s
Ans: A) 1960’s

3) Who is known as father of computer?
A)    Tim Berners-Lee
B)    Brent Hoberman
C)    Steve Shirley
D)    Charles Babbage
Ans: D) Charles Babbage

4) Which of the following is not an input device?
A)    Printers
B)    Mouse
C)    Keyboard
D)    Microphone
Ans:  A) Printers

5) Which one of the following is a single user operating system?
A)    MS DOS
B)    Linux
C)    Unix
D)    Windows
Ans: A) MS DOS

6) Which of the following is a non-impact printer?
A)    Dot-Matrix Printers
B)    Laser Printers
C)    Daisy-Wheel Printers
D)    Line Printers
Ans: B) Laser Printers

7) Which of the following is not an USB type?
A)    Type E
B)    Type B 5 pin
C)    Type A
D)    Type C
Ans: A) Type E

8) Which of the following memory uses capacitors and hence they need periodic refreshing?
A)    DRAM
B)    Cache memory
C)    ROM
D)    Hard Disk
Ans: A) DRAM

9) The acronym UPS stands for:
A)    Unique Power System
B)    Universal Power System
C)    Universal Power Source
D)    Uninterruptible Power Supply
Ans: D) Uninterruptible Power Supply

10) Which of the following is not an optical media?
A)    CD
B)    DVD
C)    Floppy
D)    DVD RAM
Ans: C) Floppy

11) By default, programs are installed in:
A)    C Drive
B)    D Drive
C)    E Drive
D)    Flash Drive
Ans: A) C Drive

12) Which of the following is a set of computer programs designed to permit the user to perform a group of coordinated functions, tasks or activities?
A)    Proprietary Software
B)    System Software
C)    Application Software
D)    Embedded Software
Ans: C) Application Software

13) Which of the following is not an open source software?
A)    Firefox (web browser)
B)    Thunderbird (Mail services)
C)    Microsoft office (Spreadsheets, Database, Word etc.)
D)    Gimp (image manipulation program)
Ans: C) Microsoft office (Spreadsheets, Database, Word etc.)

14) Which of the following is a computer software with its source code made available with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose?
A)    Operating System
B)    Proprietary System
C)    Embedded Software
D)    Open-Source Software
Ans: D) Open-Source Software

15) Select proper hierarchy of computer languages from low to High
Ans:   1.  Machine Language
    2. Assembly language
    3  High level language

16) What translates source code into some efficient intermediate representation and immediately executes?
A)    Assembly Language
B)    Machine Language
C)    Programming Language
D)    Interpreter
Ans: D) Interpreter

17) NTFS Stands for:
Ans: New Technology File System.

18) Which process checks, and ensures that all components of the computer are operating and connected properly?
A)    Booting
B)    Processing
C)    Saving
D)    Editing
Ans:  A) Booting

19) The term VPN stands for:
Ans: Virtual private Network

20) Act of making a program ready for execution on a computer by doing a setup of a computer program including device drivers and plugins is called as:
A)    Configuration
B)    Storage
C)    Upload
D)    Installation
Ans: D) Installation

21) A bar that indicates the opened applications and can be used to switch between applications quickly is:
A)    Menu bar
B)    Tool bar
C)    Status bar
D)    Task bar
Ans: D) Task bar

22) Which of the following is not an operating system?
A)    Windows 7
B)    Windows XP
C)    Windows 95
D)    Windows 97
Ans: D) Windows 97

23) Security hardware and software that control access to a company’s intranet and other internal networks is called:
A)    Client
B)    Firewall
C)    NIC
D)    Proxity
Ans: B) Firewall

24) Attempts to slow down or stop a computer system or network by flooding it with requests for information and data is called:
A)    Cracker
B)    Denial of service
C)    Hacker
D)    Trojan horse
Ans: B) Denial of service

25) Allowing user to perform more than one computer task such as the operation of an application program at a time is commonly referred to as:
A)    Multitasking
B)    Multi-processing
C)    Multi-operating
D)    Multi-paging
Ans: A) Multitasking

26) What is known as unauthorized access into others system?
A)    Hacking
B)    Encryption
C)    Scanning
D)    Decryption
Ans: A) Hacking

Comments

Popular posts from this blog

32 cpct objective question and answer in hindi

Computer Related Shortcut keys for cpct exam

microsoft office related cpct objective question and answer