COMPUTER AWARENESS -005

COMPUTER AWARENESS- 005
1. The ‘’Find’’ option can be used to
a) trace files only    
b) trace computers on the machine and network only
c) both (a) and (b)   
d) none of the above


2. The ‘’Shut Down’’ menu has
a) only restart the computer option          
b) only restart the computer in MSDOS mode
c) only shut down the computer option   
d) all the above

3. The Windows Explorer can be used to
a) Arranging of file(s) and folders by name, date, size etc., and delete files or folders
b) Create a new folder; rename a folder/file(s)    
c)Copy files from one place to another
d) Move folder from one place to another
e) all the above

4. The Windows accessories consist of
a) Games, Internet tools, Multimedia, System Tools, Word pad
b) Calculator, Dial-Up Networking, Direct cable connection
c) Hyper Terminal, Imaging, Notepad, Paint, Phone Dialer  
d) All the above

5. The components of UNIX consists of
a) Kemal  
b) UNIX utilities  
c) Application software  
d) All the above

6. Which are the correct features of UNIX
a) Hierarchical file system, UNIX shell
b) Pipes and filters, Utilities, Security    
c) Portability, Multi-user operations
d) Background, processing, Software development tools
e) All the above

7. The Versions of UNIX include
a) UNIXWARE, SOLARIS         
b) SCO UNIX, IRIX       
c) HP-UX, DEC OSF/1
d) AIX, LINUX, A/UX          
e) All the above

8. A UNIX file name
a) should not contain a blank or a tab
b) can contain both upper and lower case alphabets
c) both (a) and (b)
d) none of the above

9. The Ordinary files
a) may contain viz., text, data, programs and binary codes
b) can be created through programs or editor or through any other UNIX utility
c) are completely under users control
d) can be made' as per users own format/ structure
e) all the above

10. The special files
a) are typically associated with input-output devices
b) cannot be altered by the users
c) are mostly the system files in UNIX
d) all the above

11. The types of users in UNIX are
a) System Administrator
b) File Owner
c) Group Owner
d) Other users
e) All the above

12. The System Administrator is
a) is used to create users & groups of users for the system
b) takes regular backup of all data and programs to prevent of data loss due to system breakdown
c) is primarily responsible for the smooth running of the whole system
d) all the above

13. Which command can be used to list the contents of a directory i.e., names of files & subdirectories in a directory
a) Is
b) pwd
c) dir
d) none of the above

14. Which one is the appropriate command can be used to copy files in UNIX?
a) copy
b) cp
c) n copy  
d) none of the above

15. Which is the wildcard character of UNIX Operating System
a) *
b) ?
c) [ ]
d) all the above

16. State the invalid vi editor command
a) o - Inserts blank line below and allow insertion
b) i-Inserts text at current cursor position
c) a – Appends text after current cursor position
d) O - Inserts blank line above and allow insertion
e) None of the above

17. Which is the invalid Undo/Restore vi editor commands
a) U - Restore last change
b) u - Undo last change
c) both (a) and (b)
d) none of the above

18. Case conversions of a text require steps such as
a) highlight the word or paragraph
b) choose format and select case
c) choose the desired case option and click OK
d) all the above

19. Microsoft Office consist of
a) MS EXCEL
b) MS POWERPOINT
c) MS WORD
d) MS ACCESS
e) All the above

20. Microsoft Word help us
a) to type letters or documents or creating tables
b) to edit, format, Alignment of text/document/tables
c)for spell checking, text transfer, adding/ removing text
d) for grammatical check and printing
e) all the above

21. Which is the correct user workstation commands
a) ATTACH
b) LOGIN
c) CASTOFF
d) LISTDIR
e) All the above

22. The WHOAMI command displays
a) group membership, security equivalences
b) allotted rights in every directory
c) file server name, user name, login date and time
d) all the above

23. Which is the valid Supervisor or Operator Workstation commands
a) NVER
b) PURGE
c) PSTAT
d) SALVAGE
e) All the above

24. State the valid Console command
a) DOS
b) ENABLE LOGIN
c) BROADCAST
d) All the above

25. The Desktop consists of
a) Network neighborhoods, My Computer
b) Shortcuts, Long File Names
c) Recycle Bin, Task bar and Start Menu
d) All the above



----Thanks for your support----

No comments

Powered by Blogger.