Odia govt jobs   »   Top 30 Computer Awareness MCQS For...

Top 30 Computer Awareness MCQS For OSSSC Accountant, DEO 22 March 2024

Are you preparing for the Odisha Sub-Ordinate Staff Selection Commission (OSSSC) Accountant or Data Entry Operator (DEO) exams? Mastering Computer Awareness is crucial for success in these competitive exams. To assist you in your preparation, we’ve compiled a list of the top 30 Computer Awareness Multiple Choice Questions (MCQs) that commonly appear in these exams. Let’s dive in:

Top 30 Computer Awareness MCQS For OSSSC Accountant, DEO

Q1. Which of the following is a programming language for creating special programs like applets?

(a) Java

(b) cable

(c) domain name

(d) Net

 

S1. Ans. (a)

Sol. Java can be used to create applets. Applet is a very small application, especially a utility program performing one or a few simple functions.

 

Q2. What is the most common way to get a virus in your computer’s hard disk?

(a) By installing games from their CDROMS

(b) By uploading pictures from mobile phones to the computer

(c) By opening emails

(d) By sending emails

 

S2. Ans.(c)

Sol. Opening a virus contain mail is a most common way to get a virus in your computer.

 

Q3. Which of the following is related with 202.191.149.218?

(a) Hardware address

(b) Monitor address

(c) IP address

(d) All of these

 

S3. Ans.(c)

Sol.202.191.149.218 is an IP address.

 

Q4. Which of the following is the most common protocol used in WAN?

(a) Ethernet

(b) X.25

(c) IEEE

(d) ISO

 

S4.(b)

Sol. X.25 was a standard suite of protocols used for packet-switched communications over a wide area network—a WAN. A protocol is an agreed-upon set of procedures and rules. Two devices that follow the same protocols can understand each other and exchange data.

 

Q5. Which of the following is the highest layer of OSI model?

(a) Physical layer

(b) Network layer

(c) Presentation layer

(d) Application layer

 

S5.Ans.(d)

Sol. Application Layer is the top most layer of OSI Model. Manipulation of data(information) in various ways is done in this layer which enables user or software to get access to the network.  Some services provided by this layer includes: E-Mail, transferring files, distributing the results to user, directory services, network resources, etc.

 

Q6. Which of the following programming language is used for creating special programs like applets?

(a) Java

(b) Cable

(c) Domain name

(d) Net

 

S6. Ans.(a)

Sol. An applet is a program that runs in a Web browser. An applet can be a fully functional Java application because it has the entire Java API at its disposal.

 

Q7. EPROM is generally erased by using ______.

(a) ultraviolet rays

(b) infrared rays

(c) 12V electrical pulse

(d) 24V electrical pulse

 

S7. Ans. (a)

Sol. EPROM is generally erased by using ultraviolet rays.

 

Q8. Which of the following would most likely not be a symptom of a virus?

(a) Existing program files and icons disappear

(b) The CD-ROM stops functioning

(c) The web browser opens to an unusual home page

(d) Odd message or images are displayed on the screen

 

S8. Ans.(b)

Sol. The CD-ROM stopping functioning would not be a typical symptom of a virus. Viruses are malicious software programs that can cause various undesirable effects on a computer system. Symptoms of a virus can include disappearing files and icons, unusual homepage settings in web browsers, odd messages or images on the screen, system crashes, slow performance, and other unexpected behaviors. However, a CD-ROM ceasing to function is more likely to be related to a hardware issue or a problem with the CD-ROM drive itself, rather than a virus.

 

Q9. Which of the function in Computers is the one that control processes and accept data in continuous fashion?

(a) Data traffic pattern

(b) Data highway

(c) Highway loop

(d) Feedback loop

 

S9. Ans.(d)

Sol. Feedback occurs when outputs of a system are routed back as inputs as part of a chain of cause-and-effect that forms a circuit or loop. The system can then be said to feed back into itself.

 

Q10. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?

(a) Application

(b) Host-to-Host

(c) Internet

(d) Network Access

 

S10. Ans.(b)

Sol. The four layers of the TCP/IP stack (also called the DoD model) are Application/Process, Host-to-Host, Internet, and Network Access. The Host-to-Host layer is equivalent to the Transport layer of the OSI model.

 

Q11. Which key on a Windows keyboard sets to full-screen mode in most browsers?

(a) F1

(b) F10

(c) F11

(d) F 12

 

S11. Ans.(c)

Sol. The F11 key is a function key found on most computer keyboards. It is typically used to enter or exit full-screen mode in most web browsers and other applications.

Pressing the F11 key in most web browsers, such as Google Chrome, Mozilla Firefox, and Microsoft Edge, toggles between normal and full-screen mode.

 

Q12. Which of the following is the valid subnet mask for class B IP Address?

(a) 251.254.25.5

(b) 255.255.0.0

(c) 155.151.12.9

(d) 255.0.0.0

 

S12. Ans.(b)

Sol. 255.255.0.0 is a valid subnet mask for class B IP.

 

Q13. Which of the following is a machine independent program?

(a) High level language

(b) Low level language

(c) Assembly language

(d) Machine language

 

S13. Ans.(a)

Sol. It is a machine independent language. It enables user to write programs in a language which resemble English words and familiar mathematical symbols.

 

Q14.EPROM is generally erased by using ______?

(a) ultraviolet rays

(b) infrared rays

(c) 12V electrical pulse

(d) 24V electrical pulse

 

S14. Ans. (a)

Sol. EPROM is generally erased by using ultraviolet rays.

 

Q15. Which of the following is related with 216.3.128.12?

(a) CPU address

(b) Monitor address

(c) IP address

(d) All of these

 

S15. Ans. (c)

Sol. 216.3.128.12 is an IP address.

 

Q16. Which of the following is NOT an octal number?

(a) 125

(b) 259

(c) 456

(d) 025

 

S16. Ans.(b)

Sol. The octal number system uses only eight digits (0 through 7) there are no numbers or letters used above 8.  259 is not a valid octal number because it contains the digit 9, which is not in the valid range of octal digits.

 

Q17. When a computer is turned on, which of the following is run by BIOS in order to check whether all the hardware components are working properly?

(a) Booting

(b) Warm Booting

(c) Cold Booting

(d) Power on Self-Test

 

S17. Ans.(d)

Sol. When power is turned on, POST (Power-On Self-Test) is the diagnostic testing sequence that a computer’s basic input/output system (or “starting program”) runs to determine if the computer keyboard, random access memory, disk drives, and other hardware are working correctly.

 

Q18. If internet services are provided by transmitting data over the wires of telephone network, which of the following is used?

(a) Anodes

(b) Digital Subscriber Line

(c) Digital Anodes

(d) Wireless Diodes

 

S18. Ans.(b)

Sol. DSL (Digital Subscriber Line) is a communications medium used to transfer digital signals over standard telephone lines. Along with cable Internet, DSL is one of the most popular ways ISPs provide broadband Internet access.

 

Q19. The address of a memory location is identified by which among the following?

(a) Address Bus

(b) Location Bus

(c) Identity Bus

(d) Attrition Bus

 

S19. Ans.(a)

Sol. An address bus is a computer bus architecture used to transfer data between devices that are identified by the hardware address of the physical memory (the physical address), which is stored in the form of binary numbers to enable the data bus to access memory storage.

 

Q20. Where does encryption and decryption of data take place in OSI model?

(a) Transport layer

(b) Presentation layer

(c) Session layer

(d) Application layer

 

S20. Ans.(b)

Sol. Presentation layer is the second last layer in the OSI model responsible for services like data compression, encryption, decryption, data conversion etc.

 

Q21. Bridge is a _________ device.

(a) layer 4

(b) layer 2

(c) layer 5

(d) layer 7

 

S21. Ans.(b)

Sol. A bridge is a network device used at the data link layer to connect two dissimilar networks as well as similar networks.

 

 

Q22. _____is the science that attempts to produce machines that display the same type of intelligence that humans do.

(a) Micro science

(b) Nanotechnology

(c) Simulation

(d) Artificial intelligence (AI)

 

S22. Ans.(d)

Sol. Artificial intelligence (AI, also machine intelligence) is intelligent behavior by machines, rather than the natural intelligence of humans and other animals

 

Q23. Network components are connected to the same cable in the _____ topology.

(a) Star

(b) Ring

(c) Bus

(d) Mesh

 

S23. Ans.(c)

Sol. In bus topology all computers are connected in a single cable.

 

Q24. Which of the following is the type of software that has self-replicating software that causes damage to files and system?

(a) Viruses

(b) Trojan horses

(c) Bots

(d) Worms

 

S24. Ans.(d)

Sol. A worm is a type of virus that spreads through your computer by creating duplicates of itself on other drives, systems and networks.

 

Q25. Which of the following hardware or software designed to guard against unauthorized access to a computer network?

(a) Hacker-proof program

(b) Firewall

(c) Hacker-resistant server

(d) Encryption safe wall

 

S25. Ans.(b)

Sol. A firewall is either hardware or software, or a combination of both. firewall prevent the unauthorized access to or from a private network.

 

Q26. Which among the following is the first general purpose electronic computer?

(a) EDVAC

(b) ADVAC

(c) Mac

(d) UNIVAC

 

S26. Ans.(d)

Sol. UNIVAC is the first general purpose electronic computer.

 

Q27. Which of the following principles provides reliable information?

(a) Accounting

(b) Authentication

(c) Confidentiality

(d) Integrity

 

S27. Ans.(d)

Sol. Integrity is the assurance that the information is trustworthy and accurate, and availability is a guarantee of reliable access to the information by authorized people.

 

Q28. Software that is actively utilized by end-users (like word or power point) is called

(a) Action ware

(b) Operating system

(c) System software

(d) Application software

 

S28. Ans.(d)

Sol. Applications software (also called end-user programs) include such things as database programs, word processors, Web browsers and spreadsheets, MS Office suite. An application program is a computer program designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.

 

Q29. Frame from one LAN can be transmitted to another LAN via which device?

(a) Router

(b) Bridge

(c) Repeater

(d) Modem

 

S29. Ans.(b)

Sol. A Network Bridge helps to join two otherwise separate computer networks together to enable communication between them. Bridge devices are used with local area networks (LANs) for extending their reach to cover larger physical areas.

 

Q30. Which of the following security protocols is used with IEEE 802.11a?

(a) WPA

(b) Bluetooth

(c) DES

(d) SMTP

 

 S30. Ans.(a)

Sol. IEEE 802.11a is a Wi-Fi standard that uses the WPA (Wi-Fi Protected Access) security protocol.

 

 

 

 


Odisha Test MahaPack

OJPT science & Arts