This article is most important & suitable for those who would like to take admission in University, IAC, Buet Bangladesh,. Those whose want to get the jobs as IT professionals can find this article to be most helpful. Besides, this article will help those who are seeking Bangladesh Public Service Commission, IT Jobs & any kind of competitive jobs. I will update this article from time to time. If you would like to join the online test, please click on Computer Basic Knowledge. After studying this article, if you join this online test, you can get a good score
However, let's study.
1.Gigabyte is approximately equal to
* 1 million bytes
2. LAN means….
* Local area network
3. WAN stands for
2. LAN means….
* Local area network
3. WAN stands for
4. What is a group of independent computers attached to one another through communication media.
* Network
5. Copy an item- How?
*Highlight the item, right click & select copy.
* Highlight the item, press ctrl+c
6. The task bar at the bottom of your screen shows:
*Displays icons and titles of all programs or folders currently active on your screen
7. Which law summarized the improvement of computer hardware theory?
* Moore’s First Law
8. The computer device most widely used is…
* Internal hard disk
9. A Particular task is done by which software?
* Program
10. Whom do you think father of modern computers?* Charles Babbage
11. How many generations of computers do we have?
* Five
12. What did the first generation computers use for circuitry?
* Vacuum tube
13. The period of First generation computers starts --
*1940-1956
14. What is the period of Second generation computers?
*1956-1963
15. The Third generation computers’ period is
*1964-1975
16. What is the period of Fourth generation computers?
*1975-1989
17. VLSI technology is used in which generation computers.
* Fourth
18. Different types of modern digital computers are under which generation
* Fifth
19. Name the fastest type of computer that can perform complex operations at very high speed.
* Super
20. The computer’s input device is__
* Keyboard
21. What is the main working memory of the computer?
* RAM
22. RAM means...
* Random access memory
23. A special type of memory chip holding software which can be read but not written to
* ROM
24. A byte is equal to how many bits.
*8
25. When you start your computer, which program loads automatically
* OS
26.Finite number of sequential instructions is….
* Algorithm
27.Artificial intelligence is used in…… computer knowledge.
* PROLOG
28. How many types of memory….
*2
29. Primary memory is found available in form of _________ chips
* Silicon
30.Ram is considered what type of memory.
* Primary
31. How many types of Ram….
*2
32. Rom can only do _______ operations.
* Read
33. Rom is which type of memory…..
* Non-volatile
34. Auxiliary memory is called….
* Secondary
35. MS-DOS is which type of operating system.
* Text based
36. ________ is the first widely installed operating system which is used in the personal computers
36. ________ is the first widely installed operating system which is used in the personal computers
*Pc-Dos
37. Mainframe computer stores
* Large volumes of data
38. By parallel computing …….
* Many calculations done simultaneously
39.Excess of internal storage is called….
* Overflow
40. For real time applications what type of operating system we use…….
*Real time operating system
41. What is the fundamental purpose of BIOS?
41. What is the fundamental purpose of BIOS?
* Initialize and test system hardware components
42. Who invented the term BIOS ?
43. What can the system analyst do?
* Gary kildall
* Design structure of program
44. What is the process of Debugging?
* Checking errors in the program
45. BASIC is a family of which……
* General purpose and high-level programming
46. The original basic language was designed in which year…….
*1964
47. What is ROM?
* Static and non-volatile
48. What is a diagrammatic representation illustrating a solution to a given problem?
*Flow chart
49. How is BASIC language used?
* Interpreter
50. What type of memory is EEPROM?
* Non-volatile
51. What is a computer code for representing alphanumeric characters?
* Ebcdic
52. On ….. database model the structure allows representing information using parent/child relationship.
* Hierarchical
53. What refers to the physical devices used to store programs or data on a temporary or permanent basis for use in a computer or other digital electronic device.
* Memory
54. ……… is computer software which is designed to translate image of type written test.
* Optical character recognition
55. What type of program can harmful to computer operation?
* Virus
56. The ….. software is under graphics use.
* Adobe photo shop
57. Which technological barrier is designed to prevent unauthorized or unwanted communications between computer networks or hosts?
* Firewall
58. Printers are measured in which….
* Dpi
59. Which shortcut of keyboard is used to move the cursor to the beginning or end of a document?
* Ctrl+Home or Ctrl+End
60. Object program……
* program written in machine language
61. Software can be classified into ……types.
61. Software can be classified into ……types.
*2
62. What gives battery backup for a limited time
* UPS
63. WAN means…..
*Wide area network
64. The first network to implement TCP/IP is ……….. What?
* ARPANET
65. Mosaic is a………..
* Web browser
66. For transferring files from one host to another host over a tcp network that protocol we use……….
* FTP
67. Where are Mini computers used as a server?
* LAN
68. Ethernet is family of protocol used in ….where?
* LAN
69. What uses asynchronous time –division multiplexing and encodes data into small, Fixed-size cells
* ATM
70. Every node on the network is connected through a central device is called ………what kind of topology?
* Star
71. What are a system in which computers are connected to share information and resources ?
* Computer networks
72. Web browser is whose example?
* User agent
73. MIME full form.......
*Multipurpose Internet Mail Extension
74. Password is a………what?
* Case sensitive
75. Which of the following is called as a root directory
* C:\
76.…… is the use of compilers
* Translating source code from a high level programming language to lower level language
77. Where are Twisted pairs used ?
* Telecommunications
78. The IEEE standard of LAN is…..what?
* IEEE 802
90. Fourth layer of OSI reference model is
* Transport layer
91. What allows you to communicate with other computers using a phone line
* Modem
92. A technique reducing the size of saved file by elimination or encoding redundancies is called…. What?
* Compression
93. What is commonly used data format for exchanging information between computers or programs
* ASCII
94. In computer why is binary system is used?
* Processing the data
95. One can transmit and other can receive. This is called…
* Simplex
96. What is the example of Full duplex?
* Telephone
97. Set of rules governing data communication is called…….what?
* Protocol
98. What is the process of dividing a link, the physical medium, into logical channels for better efficiency?
* Multiplexing
99. The range of frequencies that a medium can pass is called………. What?
* Bandwidth
100. Give one of the examples of guided media
101. The concept of sending extra bits for use in error detection is called
102. What controls the way where the computer system functions & provides a means by which users can interact with the computer?
103. .... are computers providing resources to other computers connected to a network.
104. Word processing, spreadsheet & photo-editing are ..... kind of software.
105. Computers use the .... language for processing data.
106. Each letter of the alphabet, each number & each special character in the binary language is made of a unique combination of ...what?
107. ........... is the data organized or presented in a meaningful way.
108........... is the set of information telling the computer what to do.
* software
109. What is the heart of the computer & this is where all the computing is done.
* Central Processing Unit
110.The personal computers can be connected together for forming a .... what?
* network
111. What is the smallest memory size?
* kilobyte
112. The operating system is the most common type of what.....software.
* System
113. ........ is the ability to recover and read the deleted or damaged files from the criminals computers.
* computer forensics
114. ......... is buying & selling products and services over the internet.
* e-commerce.
115. ..... is the process of transferring files from a computer over the internet to your computer.
* downloading.
116. ...... is a person using his expertise to gain access to other people's computers to get information illegally or to cause a damage.
* hacker
117. The ability of an operating system to control the activities of multiple programs at the same time is called..
* multitasking
118. Pentium is related to
* microprocessor
119. The basic unit of a worksheet where you enter your data is called...
* cell.
120. 100101 is an example of .... number.
* binary
121. http means...
*hypertext transfer protocol
comments powered by Disqus
101. The concept of sending extra bits for use in error detection is called
102. What controls the way where the computer system functions & provides a means by which users can interact with the computer?
103. .... are computers providing resources to other computers connected to a network.
104. Word processing, spreadsheet & photo-editing are ..... kind of software.
105. Computers use the .... language for processing data.
106. Each letter of the alphabet, each number & each special character in the binary language is made of a unique combination of ...what?
107. ........... is the data organized or presented in a meaningful way.
* software
109. What is the heart of the computer & this is where all the computing is done.
* Central Processing Unit
110.The personal computers can be connected together for forming a .... what?
* network
111. What is the smallest memory size?
* kilobyte
112. The operating system is the most common type of what.....software.
* System
113. ........ is the ability to recover and read the deleted or damaged files from the criminals computers.
* computer forensics
114. ......... is buying & selling products and services over the internet.
* e-commerce.
115. ..... is the process of transferring files from a computer over the internet to your computer.
* downloading.
116. ...... is a person using his expertise to gain access to other people's computers to get information illegally or to cause a damage.
* hacker
117. The ability of an operating system to control the activities of multiple programs at the same time is called..
* multitasking
118. Pentium is related to
* microprocessor
119. The basic unit of a worksheet where you enter your data is called...
* cell.
120. 100101 is an example of .... number.
* binary
121. http means...
*hypertext transfer protocol
No comments:
Post a Comment