COMPUTER AWARENESS -005
COMPUTER AWARENESS- 005
1. The ‘’Find’’ option can be used to
a) trace files only
b) trace computers on the machine and network only
c) both (a) and (b)
d) none of the above
2. The ‘’Shut Down’’ menu has
a) only restart the computer option
b) only restart the computer in MSDOS mode
c) only shut down the computer option
d) all the above
3. The Windows Explorer can be used to
a) Arranging of file(s) and folders by name, date, size etc., and delete files or folders
b) Create a new folder; rename a folder/file(s)
c)Copy files from one place to another
d) Move folder from one place to another
e) all the above
4. The Windows accessories consist of
a) Games, Internet tools, Multimedia, System Tools, Word pad
b) Calculator, Dial-Up Networking, Direct cable connection
c) Hyper Terminal, Imaging, Notepad, Paint, Phone Dialer
d) All the above
5. The components of UNIX consists of
a) Kemal
b) UNIX utilities
c) Application software
d) All the above
6. Which are the correct features of UNIX
a) Hierarchical file system, UNIX shell
b) Pipes and filters, Utilities, Security
c) Portability, Multi-user operations
d) Background, processing, Software development tools
e) All the above
7. The Versions of UNIX include
a) UNIXWARE, SOLARIS
b) SCO UNIX, IRIX
c) HP-UX, DEC OSF/1
d) AIX, LINUX, A/UX
e) All the above
8. A UNIX file name
a) should not contain a blank or a tab
b) can contain both upper and lower case alphabets
c) both (a) and (b)
d) none of the above
9. The Ordinary files
a) may contain viz., text, data, programs and binary codes
b) can be created through programs or editor or through any other UNIX utility
c) are completely under users control
d) can be made’ as per users own format/ structure
e) all the above
10. The special files
a) are typically associated with input-output devices
b) cannot be altered by the users
c) are mostly the system files in UNIX
d) all the above
11. The types of users in UNIX are
a) System Administrator
b) File Owner
c) Group Owner
d) Other users
e) All the above
12. The System Administrator is
a) is used to create users & groups of users for the system
b) takes regular backup of all data and programs to prevent of data loss due to system breakdown
c) is primarily responsible for the smooth running of the whole system
d) all the above
13. Which command can be used to list the contents of a directory i.e., names of files & subdirectories in a directory
a) Is
b) pwd
c) dir
d) none of the above
14. Which one is the appropriate command can be used to copy files in UNIX?
a) copy
b) cp
c) n copy
d) none of the above
15. Which is the wildcard character of UNIX Operating System
a) *
b) ?
c) [ ]
d) all the above
16. State the invalid vi editor command
a) o – Inserts blank line below and allow insertion
b) i-Inserts text at current cursor position
c) a – Appends text after current cursor position
d) O – Inserts blank line above and allow insertion
e) None of the above
17. Which is the invalid Undo/Restore vi editor commands
a) U – Restore last change
b) u – Undo last change
c) both (a) and (b)
d) none of the above
18. Case conversions of a text require steps such as
a) highlight the word or paragraph
b) choose format and select case
c) choose the desired case option and click OK
d) all the above
19. Microsoft Office consist of
a) MS EXCEL
b) MS POWERPOINT
c) MS WORD
d) MS ACCESS
e) All the above
20. Microsoft Word help us
a) to type letters or documents or creating tables
b) to edit, format, Alignment of text/document/tables
c)for spell checking, text transfer, adding/ removing text
d) for grammatical check and printing
e) all the above
21. Which is the correct user workstation commands
a) ATTACH
b) LOGIN
c) CASTOFF
d) LISTDIR
e) All the above
22. The WHOAMI command displays
a) group membership, security equivalences
b) allotted rights in every directory
c) file server name, user name, login date and time
d) all the above
23. Which is the valid Supervisor or Operator Workstation commands
a) NVER
b) PURGE
c) PSTAT
d) SALVAGE
e) All the above
24. State the valid Console command
a) DOS
b) ENABLE LOGIN
c) BROADCAST
d) All the above
25. The Desktop consists of
a) Network neighborhoods, My Computer
b) Shortcuts, Long File Names
c) Recycle Bin, Task bar and Start Menu
d) All the above