Advertisement

Search Topics....

Wednesday, July 2, 2008

Computer Objective Questions

PSC Solved Paper.

1. _________ is a powder used in laser printers to form the images on a paper.

Toner

2. Worms and Trojan Horses are examples of:

Malware

3. ___________ Printers work by selectively heating regions of special heat-sensitive paper.

Thermal

4.The ISI mark is given by:

BIS

5. The laser printer was invented at:

Xerox

7. A flaw in a system whereby the output is unexpectedly dependent on the sequence or timing of other events is called a:

Race condition

8. A 56k modem can transfer data at up to bits per second over the phone line.

56000

9. The original implementation of the C programming language was standardized by :

ANSI

10. ________Is a signaling method that handles a relatively wide range of frequencies.

Broadband

11. The port number used by SMTP is:

25

13. A packet filter is a type of

Firewall

15. Which among the following utilities can detect a bad sector?

CHKDSK and SCANDISK

16. In 100BASE-T, 'T' stands for:

Twisted pair

17. A head crash is said to occur when the read-write head of a hard disk drive:

Touches the magnetic media

18. Category 5 cable includes ---twisted pairs in a single cable jacket.

4

19. The port number used by the HTTP protocol is

80

20. In PowerPoint presentations, individual pages are called:

Slides

21. Power-on-self-test is built into the:

BIOS

22. PowerPoint can embed content from other applications through:

OLE

23. The latest release of Microsoft Windows is called:

Vista

24. GRUB is an:

Boot loader

25. __________Is a family of programmable interrupt controller chips.

8259

26.card allows television signals to be received by a computer.

TV tuner

27. ________Is an IEEE 1394 implementation.

Fire Wire

28 'Windows protection error' messages may result from:

Damage to the system registry

29 Sound Blaster line of audio cards were made by :

Creative Technology Ltd.

31 Indiscriminate sending of unsolicited bulk messages is known as :

Spamming

32 The 'blue screen of death' may occur due to:

All the above

33 FAT manages files in contiguous groups of sectors called:

Clusters

34 The utility which can be used to clean the windows registry is:

regedit

36. Ultra Wide SCSI had a throughput of: (A) 10 MB/s

40 MB/s

37. A dual-core processor has L1 cache.

2

40. Port 110 is used by _______

POP3

41. A file extension .ogg indicates an ______format

Audio codec

42. Kerberos ts a__________protocol.

Network authentication

43. Athlon series of processors are made by:

AMD

44. Which among the following is a real-time operating system?

QNX

45. The internet top level domain .cn refers to :

China

47. _____________ Is a protocol used by networked computers (clients) to obtain IP addresses and other parameters from a server.

DHCP

48. is the brand name for 64-bit Intel microprocessors with IA-64 architecture.

Itanium

49. is an organization which develops internet standards through RFCs.

IETF

50. The ability to replace components of a computer, while it is operating, is called:

Hot swapping

E&OE

No comments: