All Exams  >   Delhi Police Constable  >   Computer Awareness for Bank Exams  >   All Questions

All questions of Computer Fundamentals /Terminologies for Delhi Police Constable Exam

____ is the area of computer science focusing on creating machines that can engage in behaviors that humans consider intelligent.
  • a)
    Artificial Intelligence
  • b)
    Absolute Address
  • c)
    Absolute Reference
  • d)
    Access Point
  • e)
    Base Point
Correct answer is option 'A'. Can you explain this answer?

Sparsh Mehta answered
Artificial Intelligence (AI) is the area of computer science that focuses on creating machines that can engage in behaviors that humans consider intelligent. It involves developing computer systems that can perform tasks that typically require human intelligence, such as visual perception, speech recognition, decision-making, problem-solving, and natural language understanding.

Key Points:
- AI aims to create machines that can mimic human intelligence and behavior.
- It involves the development of algorithms and models that enable computers to learn from and adapt to data.
- AI systems can be classified into two categories: narrow AI and general AI.
- Narrow AI refers to systems that are designed for a specific task, such as playing chess or diagnosing diseases.
- General AI, on the other hand, refers to systems that possess the ability to understand, learn, and apply knowledge across different domains, similar to human intelligence.
- AI can be further categorized into subfields, such as machine learning, natural language processing, computer vision, and robotics.
- Machine learning is a subset of AI that focuses on developing algorithms that allow computers to learn from and make predictions or decisions based on data.
- Natural language processing involves enabling computers to understand and interact with human language, both written and spoken.
- Computer vision is concerned with enabling computers to interpret and understand visual information from images or videos.
- Robotics combines AI techniques with mechanical engineering to create intelligent machines that can perform physical tasks.

Applications of Artificial Intelligence:
- AI has numerous applications across various industries, including healthcare, finance, transportation, manufacturing, and entertainment.
- In healthcare, AI can be used for diagnosing diseases, analyzing medical images, and developing personalized treatment plans.
- In finance, AI algorithms can be employed for fraud detection, algorithmic trading, and risk assessment.
- In transportation, AI is being used for autonomous vehicles and optimizing traffic flow.
- In manufacturing, AI can improve efficiency and productivity by automating processes and predictive maintenance.
- In entertainment, AI is used for recommendation systems, virtual assistants, and game playing.

Conclusion:
Artificial Intelligence is a rapidly advancing field that aims to create machines capable of performing tasks that require human-like intelligence. Its applications across various industries hold immense potential for improving efficiency, accuracy, and decision-making. By developing intelligent machines, AI has the power to revolutionize how we live, work, and interact with technology.

What is the purpose of an IP address in computer networking?
  • a)
    To identify a website
  • b)
    To establish an internet connection
  • c)
    To encrypt network traffic
  • d)
    To store website data
  • e)
    To uniquely identify a device on a network
Correct answer is option 'E'. Can you explain this answer?

Ishani Khanna answered
Introduction

In computer networking, an IP address plays a crucial role by uniquely identifying a device on a network. It serves as a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. The purpose of an IP address is to facilitate the identification and communication between devices on a network.

Uniquely Identifying Devices

An IP address is used to uniquely identify devices on a network. Just like how a postal address helps in identifying a specific location, an IP address helps in identifying a specific device. Each device connected to a network, whether it's a computer, smartphone, or any other network-enabled device, is assigned a unique IP address.

Routing Data

IP addresses are used to route data across networks. When data is sent from one device to another over a network, it is divided into packets. Each packet contains the source IP address (the address of the device sending the data) and the destination IP address (the address of the device receiving the data). Routers use these IP addresses to determine the best path for the packets to reach their destination.

Internet Protocol Version 4 (IPv4)

IPv4 is the most commonly used version of the Internet Protocol. It uses a 32-bit address space, allowing for approximately 4.3 billion unique IP addresses. An IPv4 address is represented as a series of four numbers separated by dots, such as 192.168.0.1. Each number in the address can range from 0 to 255.

Internet Protocol Version 6 (IPv6)

Due to the limited number of available IPv4 addresses, IPv6 was developed to provide a much larger address space. IPv6 uses a 128-bit address space, allowing for an almost unlimited number of unique IP addresses. IPv6 addresses are represented as eight groups of four hexadecimal digits separated by colons, such as 2001:0db8:85a3:0000:0000:8a2e:0370:7334.

Conclusion

In summary, the purpose of an IP address in computer networking is to uniquely identify devices on a network. It helps in routing data between devices and enables communication over the Internet. IP addresses are essential for the proper functioning of the Internet and play a vital role in ensuring seamless connectivity and data transfer between devices.

_____________ is a specialized server based in a client/server network that has the sole responsibility of running specific applications within that network.
  • a)
    Application Server
  • b)
    Arithmetic Server
  • c)
    Algorithm
  • d)
    Applet
  • e)
    Adware
Correct answer is option 'A'. Can you explain this answer?

Kritika Basu answered
Application Server:
An Application Server is a specialized server in a client/server network that is responsible for running specific applications within that network. It acts as an intermediary between the end-user and the backend database or other data sources. Here are some key points explaining the role and functions of an Application Server:

1. Running Specific Applications:
The primary function of an Application Server is to host and run specific applications within a network. These applications can range from web applications to enterprise-level software.

2. Managing Resources:
Application Servers manage resources such as memory, processing power, and network connections to ensure that the applications running on them perform efficiently and reliably.

3. Load Balancing:
In larger networks with multiple Application Servers, load balancing techniques are used to distribute incoming requests evenly across the servers. This helps in optimizing performance and preventing any single server from getting overwhelmed.

4. Security:
Application Servers often include security features such as encryption, authentication, and access control to protect the applications and data running on them from unauthorized access or attacks.

5. Scalability:
Application Servers are designed to be scalable, allowing them to accommodate an increasing number of users or applications without compromising performance.
In conclusion, an Application Server plays a crucial role in ensuring the smooth operation of specific applications within a client/server network. Its specialized functions make it an integral component in modern IT infrastructure, particularly in environments where multiple applications need to be hosted and managed efficiently.

A formulated cell reference that will not adjust when used to calculate the sum of specific cells is ___.
  • a)
    Absolute Address
  • b)
    Absolute Reference
  • c)
    Access Point
  • d)
    Artificial Intelligence
  • e)
    Actuator
Correct answer is option 'B'. Can you explain this answer?

Arindam Roy answered
Absolute Reference
Absolute reference in Excel is a cell reference that remains constant and does not adjust when copied or filled to other cells. This type of cell reference is denoted by adding dollar signs ($) before the column letter and row number, such as $A$1. Absolute references are commonly used when you want to keep specific cells constant in a formula.

Explanation:
- When you use an absolute reference in a formula to calculate the sum of specific cells, the reference will not adjust as you copy the formula to other cells. This ensures that the sum always refers to the same cells, providing consistent and accurate results.
- Absolute references are particularly useful when you need to refer to fixed values or data that should not change regardless of where the formula is copied.
- By using absolute references, you can easily maintain the integrity of your calculations and avoid errors that may arise from incorrect cell references.
In conclusion, absolute references play a crucial role in Excel formulas by keeping specific cell references constant. They help ensure accuracy and consistency in your calculations, making them an essential tool for working with data in spreadsheets.

Any computer hardware or software device that seeks access to a service offered by a server is referred to as a ________ in home and business networks.
  • a)
    Channel
  • b)
    Cache
  • c)
    Client
  • d)
    Cascade
  • e)
    Clipboard
Correct answer is option 'C'. Can you explain this answer?

Kavya Saxena answered
Any computer hardware or software device that seeks access to a service offered by a server is referred to as a client in home and business networks. In a client-server architecture, clients are often thought of as the requesting program or user.

A networking connection device that is also known as the______.
  • a)
    Absolute Address
  • b)
    Absolute Reference
  • c)
    Access Point
  • d)
    Base Station
  • e)
    Artificial Intelligence
Correct answer is option 'D'. Can you explain this answer?

Krish Iyer answered
Base Station
Base Station is a networking connection device that is commonly known by this name in the tech industry. It serves as a central hub for connecting various devices wirelessly to a network. Here's a breakdown of its key features:

Functionality
- A base station acts as a communication point for devices like smartphones, laptops, and tablets to connect to a Wi-Fi network.
- It provides a stable and secure connection for data transmission between devices and the network.

Usage
- Base stations are commonly used in homes, offices, and public spaces to enable wireless connectivity.
- They are also utilized in cellular networks for connecting mobile devices to the internet.

Features
- Base stations typically have multiple antennas to ensure a strong signal and wide coverage area.
- They may come with additional features like dual-band support, Ethernet ports, and guest network options.

Importance
- Base stations play a crucial role in modern networking setups, allowing multiple devices to connect and communicate efficiently.
- They help in creating a seamless and reliable network environment for users.
In conclusion, a base station is a vital networking device that serves as a central point for connecting devices wirelessly. Its functionality, usage, features, and importance make it an essential component in various networking environments.

Which of the following file extensions is associated with a spreadsheet software?
  • a)
    .docx
  • b)
    .xlsx
  • c)
    .jpg
  • d)
    .mp3
  • e)
    .exe
Correct answer is option 'B'. Can you explain this answer?

Aisha Gupta answered
The file extension .xlsx is associated with spreadsheet software, such as Microsoft Excel or Google Sheets. Spreadsheet software is used for organizing, analyzing, and manipulating numerical data in tabular form. File extensions like .docx (Microsoft Word), .jpg (image), .mp3 (audio), and .exe (executable) are associated with different file formats and applications.

What is the purpose of a firewall in computer networking?
  • a)
    To secure data during transmission
  • b)
    To protect against unauthorized access
  • c)
    To manage network resources
  • d)
    To establish internet connections
  • e)
    To perform encryption and decryption
Correct answer is option 'B'. Can you explain this answer?

Aisha Gupta answered
A firewall is a security device or software that is used to protect a computer network from unauthorized access and potential threats. It monitors incoming and outgoing network traffic, enforcing security policies to allow or block specific connections or packets. Firewalls can prevent unauthorized access attempts, filter malicious traffic, and secure sensitive data within a network.

Which programming language is widely used for creating web pages and web applications?
  • a)
    Java
  • b)
    Python
  • c)
    HTML
  • d)
    C++
  • e)
    JavaScript
Correct answer is option 'E'. Can you explain this answer?

JavaScript is a programming language that is commonly used for creating interactive elements on web pages, such as dynamic content, form validation, and interactive behavior. Java, Python, and C++ are general-purpose programming languages used for a wide range of applications, while HTML (Hypertext Markup Language) is a markup language used for structuring web content.

What does the term "HTTP" stand for in web technology?
  • a)
    HyperText Markup Protocol
  • b)
    HyperText Transfer Protocol
  • c)
    HyperText Transmission Protocol
  • d)
    HyperText Management Protocol
  • e)
    HyperText Manipulation Protocol
Correct answer is option 'B'. Can you explain this answer?

Rhea Reddy answered
HTTP stands for HyperText Transfer Protocol. It is the protocol used for transmitting and receiving hypertext (web) documents on the internet. HTTP defines the rules and standards for communication between web browsers and web servers, allowing users to access websites, retrieve web pages, submit forms, and interact with web-based applications.

______________ is a mathematical core circuitry that applies to all computers central processing units (CPU).
  • a)
    Control Unit
  • b)
    Arithmetic Logic Unit
  • c)
    Archie
  • d)
    Algorithm
  • e)
    Applet
Correct answer is option 'B'. Can you explain this answer?

Kabir Verma answered
The arithmetic Logic Unit is a mathematical core circuitry that applies to all computer's central processing units (CPU). ALUmathematically and logically calculates the results of binary data.

Which of the following is a volatile memory?
  • a)
    ROM
  • b)
    Cache memory
  • c)
    Hard disk drive
  • d)
    DVD
  • e)
    Flash drive
Correct answer is option 'B'. Can you explain this answer?

Aisha Gupta answered
Cache memory is a small, high-speed memory that is located closer to the CPU. It is used to store frequently accessed data and instructions to improve overall system performance. Cache memory is volatile, meaning its contents are lost when the power is turned off. ROM (Read-Only Memory) is non-volatile, while hard disk drives, DVDs, and flash drives are examples of secondary memory.

A _______ is a model for message-based inter-process synchronization and communication in computing.
  • a)
    Modem
  • b)
    Cascade
  • c)
    Channel
  • d)
    Cache
  • e)
    Clipboard
Correct answer is option 'C'. Can you explain this answer?

Kabir Verma answered
A channel is a model for message-based interprocess synchronization and communication in computing. A message can be transmitted over a channel, and another process or thread that has a reference to the channel can receive messages sent over it as a stream.

An _________ is a small program generally written in the Java programming language that was designed to provide interactivity on web pages.
  • a)
    Algorithm
  • b)
    Actuator
  • c)
    Adware
  • d)
    Applet
  • e)
    Aero
Correct answer is option 'D'. Can you explain this answer?

Shanaya Dey answered
Explanation:
An applet is a small program generally written in the Java programming language that was specifically designed to provide interactivity on web pages. Below are some key points to understand this concept:

What is an Applet?
- An applet is a small application that runs within a larger software environment, typically in a web browser.
- It is executed within a web page and can perform various functions such as animations, calculations, and user interactions.

Java Programming Language:
- Applets are primarily written in the Java programming language, which is known for its platform independence and security features.
- Java applets can be easily embedded into HTML documents and run on any platform that supports Java.

Interactivity on Web Pages:
- The main purpose of an applet is to provide interactive features on web pages, allowing users to engage with the content in a dynamic way.
- This interactivity enhances user experience and makes the web page more engaging and user-friendly.

Usage of Applets:
- Applets were popular in the early days of the internet for creating interactive elements such as games, animations, and interactive forms.
- However, with the advancement of web technologies, the usage of Java applets has declined in favor of other web development techniques.
In conclusion, applets are small Java programs that were commonly used to provide interactivity on web pages. They played a significant role in enhancing user experience on the web in the past.

Microprocessor was introduced in which generation of computer?
  • a)
    Second Generation
  • b)
    Fourth Generation
  • c)
    Both (A) and (B)
  • d)
    Third Generation
  • e)
    Allof these
Correct answer is option 'B'. Can you explain this answer?

The microprocessor brought the fourth generation of computers, as thousands of integrated circuits were built onto a single silicon chip. What in the first generation filled an entire room could now fit in the palm of the hand. The Intel 4004 chip, developed in 1971, located all the components of the computer—from the Central processing Unit (CPU) and memory to input/output controls—on a single chip.

Tthese small computers became more powerful, they could be linked together to form networks, which eventually led to the development of the Internet. Fourth generation computers also saw the development of GUIsthe mouse and handheld devices.

Memories which can be read only are called __________.
  • a)
    RAM
  • b)
    ROM
  • c)
    DRAM
  • d)
    Vertual Memory
  • e)
    Secondary Memory
Correct answer is option 'B'. Can you explain this answer?

Aim It Academy answered
ROM is read-only, it cannot be changed, it is permanent and non-volatile, meaning it also holds its memory even when power is removed. By contrast, random access memory (RAM) is volatile; it is lost when power is removed.

Which protocol provides e-mail facility among different hosts?
  • a)
    FTP
  • b)
    SMTP
  • c)
    TELNET
  • d)
    SNMP
  • e)
    None of these
Correct answer is option 'B'. Can you explain this answer?

SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail. However, since it is limited in its ability to queue messages at the receiving end, it is usually used with one of two other protocols, POP3 or IMAP that let the user save messages in a server mailbox and download them periodically from the server. SMTP usually is implemented to operate over Internet port 25.
Many mail servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to be delivered as e-mail.

Which one is not an input device?
  • a)
    Keyboard
  • b)
    Mouse
  • c)
    Speaker
  • d)
    Scanner
  • e)
    None of the above
Correct answer is option 'C'. Can you explain this answer?

Wizius Careers answered
In computing, an input device is a piece of computer hardware equipment used to provide data and control signals to an information processing system such as a computer or information appliance. Examples of input devices include keyboards, mouse, scanners, digital cameras and joysticks.

Which of the following storage devices provides the largest storage capacity?
  • a)
    Hard Disk Drive (HDD)
  • b)
    Solid State Drive (SSD)
  • c)
    USB Flash Drive
  • d)
    DVD
  • e)
    Blu-ray Disc
Correct answer is option 'A'. Can you explain this answer?

Wizius Careers answered
Hard Disk Drives (HDDs) typically offer larger storage capacities compared to other storage devices. They use magnetic storage to store data on spinning disks.

The file extension of MS-Word document in Office 2007 is _______.
  • a)
    .doc
  • b)
    .docx
  • c)
    .pdf
  • d)
    .txt
  • e)
    .xls
Correct answer is option 'B'. Can you explain this answer?

Office Open XML (OOXML) format was introduced with Microsoft Office 2007 and became the default format of Microsoft Word ever since. Pertaining file extensions include: .docx – Word document.

Fifth generation computers are based on
  • a)
    Artificial Intelligence
  • b)
    Programming Intelligence
  • c)
    System Knowledge
  • d)
    VVLSI
  • e)
    None of these
Correct answer is option 'A'. Can you explain this answer?

Fifth generation computing devices, based on artificial intelligence, are still in development, though there are some applications, such as voice recognition, that are being used today. The use of parallel processing and superconductors is helping to make artificial intelligence a reality. Quantum computation and molecular and nanotechnology will radically change the face of computers in years to come. The goal of fifth-generation computing is to develop devices that respond to natural language input and are capable of learning and self-organization.

Which of the following programming languages is used to create web pages and web applications?
  • a)
    Java
  • b)
    C++
  • c)
    HTML
  • d)
    Python
  • e)
    SQL
Correct answer is option 'C'. Can you explain this answer?

HTML (Hypertext Markup Language) is the standard language used for creating web pages and structuring their content. It is used in conjunction with other technologies such as CSS (Cascading Style Sheets) and JavaScript to build interactive web applications.

In order to tell Excel that we are entering a formula in cell, we must begin with an operator such as
  • a)
    $
  • b)
    @
  • c)
    +
  • d)
    =
  • e)
    #
Correct answer is option 'D'. Can you explain this answer?

In MS Excel, formulas are equations that perform various calculations in your worksheets. Though Microsoft has introduced a handful of new functions over the years, the concept of Excel spreadsheet formulas is the same in all versions of Excel 2016, Excel 2013, Excel 2010, Excel 2007 and lower.
All Excel formulas begin with an equal sign (=).

The memory which is programmed at the time it is manufactured is
  • a)
    RAM
  • b)
    ROM
  • c)
    PROM
  • d)
    EPROM
  • e)
    None of these
Correct answer is option 'B'. Can you explain this answer?

ROM is an acronym for Read-Only Memory. It refers to computer memory chips containing permanent or semi-permanent data. Unlike RAM, ROM is non-volatile; even after you turn off your computer, the contents of ROM will remain. Almost every computer comes with a small amount of ROM containing the boot firmware.

What does the term "URL" stand for in the context of the internet?
  • a)
    Universal Resource Locator
  • b)
    Uniform Resource Locator
  • c)
    Unified Resource Locator
  • d)
    Universal Routing Locator
  • e)
    United Routing Locator
Correct answer is option 'B'. Can you explain this answer?

Aisha Gupta answered
URL stands for Uniform Resource Locator. It is a reference to a resource on the internet, such as a webpage, image, or file. A URL consists of various components, including the protocol (e.g., HTTP, HTTPS), domain name or IP address, and the path to the resource.

he 0 and 1 in the binary numbering system are called Binary Digits or
  • a)
    Bytes
  • b)
    Kilobytes
  • c)
    Decimal bytes
  • d)
    Bits
  • e)
    None of these
Correct answer is option 'D'. Can you explain this answer?

In mathematics and digital electronics, a binary number is a number expressed in the base-2 numeral system or binary numeral system, which uses only two symbols: typically 0 (zero) and 1 (one). The base-2 numeral system is a positional notation with a radix of 2. Each digit is referred to as a bit.

Time during which a job is processed by the computer is:
  • a)
    Execution Time
  • b)
    Delay Time
  • c)
    Real Time
  • d)
    Waiting Time
  • e)
    None of these
Correct answer is option 'A'. Can you explain this answer?

Execution time refers to the period during which a job or task is being processed by a computer system. It represents the actual time taken by the computer to execute the instructions or perform the computations required by the job.
Delay time typically refers to the time spent waiting or being delayed in a system, but it is not specifically associated with the processing time of a job.
Real-time refers to systems that require immediate or near-immediate responses to inputs, often with strict timing requirements. Real-time systems process data as it comes in, without significant delays or buffering.
Waiting time typically refers to the time a process or job spends in a queue, waiting for resources or for its turn to be executed. It is related to scheduling and resource allocation in a computer system.
Therefore, the correct answer is A) Execution Time, as it specifically refers to the time during which a job is processed by the computer.

A __________ is a hardware or software component in computing that stores data so that requests for it in the future can be processed more quickly.
  • a)
    Modem
  • b)
    Cascade
  • c)
    Channel
  • d)
    Cache
  • e)
    Clipboard
Correct answer is option 'D'. Can you explain this answer?

Kabir Verma answered
A cache is a hardware or software component in computing that stores data so that requests for it in the future can be processed more quickly. The cached data may be the output of a previous computation or a copy of data that is stored elsewhere.

What is the purpose of a CPU (Central Processing Unit) in a computer?
  • a)
    To store and retrieve data
  • b)
    To execute instructions and perform calculations
  • c)
    To provide internet connectivity
  • d)
    To display graphical output
  • e)
    To manage system resources
Correct answer is option 'B'. Can you explain this answer?

Rhea Reddy answered
The CPU, or Central Processing Unit, is the primary component of a computer responsible for executing instructions and performing calculations. It fetches instructions from memory, decodes them, and executes them by manipulating data stored in memory. The CPU is often referred to as the "brain" of the computer.

Which of the following is an example of secondary memory in a computer system?
  • a)
    RAM
  • b)
    Cache memory
  • c)
    Hard disk drive
  • d)
    CPU
  • e)
    ROM
Correct answer is option 'C'. Can you explain this answer?

Secondary memory refers to the storage devices that are used for long-term storage of data even when the power is turned off. Examples of secondary memory include hard disk drives, solid-state drives (SSDs), optical drives, and magnetic tape drives. RAM (Random Access Memory) is a primary memory, along with cache memory. CPU (Central Processing Unit) is the brain of the computer, responsible for executing instructions. ROM (Read-Only Memory) stores permanent data and instructions but is not considered secondary memory.

An ____________ is a device that creates a wireless local area network, or WLAN, usually in an office or large building.
  • a)
    Absolute Address
  • b)
    Absolute Reference
  • c)
    Access Point
  • d)
    Artificial Intelligence
  • e)
    Base Point
Correct answer is option 'C'. Can you explain this answer?

Naveen Jain answered
Access Point
An access point is a device that creates a wireless local area network (WLAN) in an office or large building. It acts as a central hub that connects wireless devices to the network and allows them to communicate with each other and access the internet.

Function
- An access point typically connects to a wired network, such as an Ethernet network, and then broadcasts a wireless signal for devices to connect to.
- It provides a secure and reliable connection for wireless devices, such as laptops, smartphones, and tablets, to access the network and the internet.

Types of Access Points
- Standalone Access Points: These are individual devices that are connected to a wired network and provide wireless connectivity.
- Controller-Based Access Points: These access points are managed by a central controller, which helps in managing multiple access points from a single interface.
- Cloud-Managed Access Points: These access points are managed through a cloud-based platform, allowing for remote management and monitoring.

Benefits of Access Points
- Increased Mobility: Access points provide wireless connectivity, allowing users to move around freely within the network's coverage area.
- Scalability: Access points can be easily added to expand wireless coverage in an office or building.
- Improved Connectivity: Access points help improve network connectivity by providing a strong and reliable wireless signal.
In conclusion, access points play a crucial role in creating and maintaining wireless networks in offices and large buildings, providing a reliable and secure connection for wireless devices to access the network and the internet.

What does the acronym CPU stand for in computer terminology?
  • a)
    Central Processing Unit
  • b)
    Computer Processing Unit
  • c)
    Control Processing Unit
  • d)
    Central Program Unit
  • e)
    Computer Power Unit
Correct answer is option 'A'. Can you explain this answer?

Wizius Careers answered
The CPU is the central processing unit of a computer. It is responsible for executing instructions, performing calculations, and coordinating the activities of other hardware components.

Which of the following memory is non-volatile?
  • a)
    SRAM
  • b)
    DRAM
  • c)
    ROM
  • d)
    All of the above
  • e)
    None of these
Correct answer is option 'C'. Can you explain this answer?

Aspire Academy answered
Rom is non-volatile memory include read-only memory, flash memory, ferroelectric, most types of magnetic computer storage devices .This is because you cannot erase or modify it when the computer system is turned off. Computer manufacturers write codes on the ROM chip, and users cannot alter or interfere with it.

What is the purpose of an operating system in a computer?
  • a)
    To control and manage hardware resources
  • b)
    To execute application software
  • c)
    To provide a user interface
  • d)
    To store and retrieve data
  • e)
    To connect to the internet
Correct answer is option 'A'. Can you explain this answer?

Aisha Gupta answered
An operating system is a software that acts as an interface between the hardware and the user. Its primary purpose is to control and manage hardware resources, such as the CPU, memory, storage, and input/output devices. The operating system also provides services to application software, manages files and directories, and facilitates user interaction through a user interface.

_______ is a parallel expansion card standard, designed for attaching a video card to a computer system to assist in the acceleration of 3D computer graphics.
  • a)
    TCP
  • b)
    AGP
  • c)
    IP
  • d)
    Applet
  • e)
    Algorithm
Correct answer is option 'B'. Can you explain this answer?

Sharmila Yadav answered
B) AGP (Accelerated Graphics Port) is a parallel expansion card standard designed specifically for attaching a video card to a computer system to assist in the acceleration of 3D computer graphics. It was first introduced in 1997 by Intel and has since become widely adopted in the industry.

AGP provides a direct connection between the video card and the system's memory, allowing for faster data transfer and improved performance in graphics-intensive applications. It offers higher bandwidth and lower latency compared to other expansion card standards such as PCI (Peripheral Component Interconnect).

AGP operates at different speeds, including AGP 1x, AGP 2x, AGP 4x, and AGP 8x. Each speed represents the maximum amount of data that can be transferred per second. The higher the speed, the faster the data transfer and the better the graphics performance.

AGP also supports features such as sideband addressing and pipelining, which further enhance its performance. Sideband addressing allows the video card to send commands and data to the system's memory independently of the main bus, reducing latency and increasing overall efficiency. Pipelining allows multiple data transfers to occur simultaneously, improving overall throughput.

One of the key advantages of AGP is its dedicated bandwidth for graphics data. Unlike other expansion card standards that share bandwidth with other devices on the system bus, AGP provides a dedicated channel for graphics data, ensuring that the video card has the necessary resources to deliver high-quality graphics in real-time.

In conclusion, AGP is a parallel expansion card standard designed specifically for attaching a video card to a computer system to accelerate 3D computer graphics. It offers higher bandwidth, lower latency, and dedicated resources for graphics data, resulting in improved performance in graphics-intensive applications.

What are the two types of monitors?
  • a)
    CRT and DVD
  • b)
    CRT and LCD
  • c)
    DVD and VCD
  • d)
    LCD and DVD
  • e)
    None of these
Correct answer is option 'B'. Can you explain this answer?

CRT : The cathode ray tube (CRT) is a vacuum tube that contains one or more electron guns and a phosphorescent screen, and is used to display images. It modulates, accelerates, and deflects electron beam(s) onto the screen to create the images.

LCD : A liquid-crystal display (LCD) is a flat-panel display or other electronically modulated optical device that uses the light-modulating properties of liquid crystals. Liquid crystals do not emit light directly, instead using a backlight or reflector to produce images in color or monochrome.

Graphical pictures that represent an object like file, folder etc are:
  • a)
    Task bar
  • b)
    Windows
  • c)
    Icons
  • d)
    Desktop
  • e)
    None of these
Correct answer is option 'C'. Can you explain this answer?

Icons are graphical pictures or symbols that represent various objects, such as files, folders, applications, or settings, on a computer system. Icons are commonly found on the desktop, in file managers, or in graphical user interfaces (GUIs) like Windows, macOS, or Linux. They provide a visual representation of objects, making it easier for users to recognize and interact with them.
The taskbar is a horizontal bar typically located at the bottom of the screen in a graphical user interface. It provides quick access to frequently used applications and displays system information, such as the time and date.
Windows is an operating system developed by Microsoft. While Windows does include icons as part of its user interface, the term "Windows" itself does not specifically refer to graphical pictures that represent objects.
The desktop refers to the primary screen area that is visible after starting up a computer. It serves as a workspace where users can organize files, folders, and shortcuts. Icons are commonly found on the desktop, but the desktop itself is not the graphical representation of objects.
Therefore, the correct answer is C) Icons.

What is the purpose of an operating system in a computer?
  • a)
    To run application software
  • b)
    To manage hardware resources
  • c)
    To protect against malware
  • d)
    To create graphical user interfaces
  • e)
    To connect to the internet
Correct answer is option 'B'. Can you explain this answer?

The operating system (OS) is responsible for managing hardware resources such as the processor, memory, storage, and input/output devices. It provides an interface between the user and the computer's hardware.

LAN stands for?
  • a)
    Last Affordable Network
  • b)
    Leased Area Network
  • c)
    Latency Around Netwok
  • d)
    Local Area Network
  • e)
    None of these
Correct answer is option 'D'. Can you explain this answer?

Iq Funda answered
A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.

What does a system bus do?
  • a)
    allows the user to communicate with the computer
  • b)
    carries out instructions
  • c)
    connects various components within the computer
  • d)
    stores data and instructions
  • e)
    None of these
Correct answer is option 'C'. Can you explain this answer?

Aim It Academy answered
A system bus is a single computer bus that connects the major components of a computer system, combining the functions of a data bus to carry information, an address bus to determine where it should be sent, and a control bus to determine its operation.

GUI stands for
  • a)
    Graph Use Interface
  • b)
    Graphical Universal Interface
  • c)
    Graphical User Interface
  • d)
    Graphical Unique Interface
  • e)
    None of these
Correct answer is option 'C'. Can you explain this answer?

Iq Funda answered
A Graphical User Interface is a computer interface that allows users to interact with a device through graphical elements such as pictures and animations, as opposed to text-based commands.

The 'IC' chip, used in computers, is made of
  • a)
    Chomium
  • b)
    Iron Oxide
  • c)
    Silica
  • d)
    Silicon
  • e)
    None of these
Correct answer is option 'D'. Can you explain this answer?

An integrated circuit or monolithic integrated circuit (also referred to as an IC, a chip, or a microchip) is a set of electronic circuits on one small flat piece (or "chip") of semiconductor material, normally silicon.

A wireless technology built in electronic gadgets used for exchanging data over short distances is ______
  • a)
    USB
  • b)
    Bluetooth
  • c)
    Modem
  • d)
    Wifi
  • e)
    None of these
Correct answer is option 'B'. Can you explain this answer?

Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz) from fixed and mobile devices, and building personal area networks (PANs). Invented by Dutch electrical engineer Jaap Haartsen, working for telecom vendor Ericsson in 1994.

A Device that performs an action or outputs a signal in response to a signal from a computer is _______.
  • a)
    Absolute Address
  • b)
    Absolute Reference
  • c)
    Access Point
  • d)
    Actuator
  • e)
    Artificial Intelligence
Correct answer is option 'D'. Can you explain this answer?

Rutuja Das answered
Actuator

An actuator is a device that performs a specific action or outputs a signal in response to a signal from a computer or another control system. It is an essential component of many automated systems and plays a crucial role in converting electrical or digital signals into mechanical motion or physical action.

Function

Actuators serve the purpose of converting energy into mechanical motion. They receive input signals from a computer or control system and translate them into physical actions such as opening or closing valves, moving motors, adjusting positions, or activating other devices. The actuator essentially acts as the "muscle" of the system, carrying out the desired actions based on the instructions received.

Types of Actuators

There are various types of actuators used in different applications, each with its own specific characteristics and purposes. Some common types of actuators include:

1. Electric Actuators: These actuators use electrical energy to generate mechanical motion. They are commonly used in robotics, industrial automation, and other applications that require precise control and high-speed movement.

2. Hydraulic Actuators: These actuators use hydraulic pressure to generate mechanical motion. They are often used in heavy-duty applications that require high force and large movements, such as in construction equipment or aerospace systems.

3. Pneumatic Actuators: These actuators use compressed air or gas to generate mechanical motion. They are commonly used in applications that require quick and responsive movements, such as in automation systems or control valves.

4. Piezoelectric Actuators: These actuators use the piezoelectric effect to generate mechanical motion. They are often used in micro and nano-positioning applications, where precise and small-scale movements are required.

Applications

Actuators find applications in various industries and sectors, including:

- Robotics and automation: Actuators are used in robotic systems to control the movement of arms, legs, grippers, and other parts.

- Manufacturing and industrial processes: Actuators are used to control valves, pumps, motors, and other equipment in industrial processes.

- Aerospace and aviation: Actuators are used in aircraft control systems to move control surfaces, adjust flaps, and perform other critical functions.

- Automotive: Actuators are used in various parts of a vehicle, such as the engine, transmission, braking system, and suspension.

- Healthcare: Actuators are used in medical devices and equipment, such as prosthetics, surgical robots, and automated drug delivery systems.

In conclusion, an actuator is a device that receives signals from a computer or control system and converts them into mechanical motion or physical actions. It plays a vital role in various industries and applications, enabling automation, precise control, and efficient operation of systems and equipment.

What is the purpose of a firewall in a computer network?
  • a)
    To prevent unauthorized access to a computer
  • b)
    To scan and remove viruses from files
  • c)
    To manage network connections
  • d)
    To provide wireless internet access
  • e)
    To store and retrieve data
Correct answer is option 'A'. Can you explain this answer?

Knowledge Hub answered
A firewall is a network security device that acts as a barrier between an internal network and external networks, such as the internet. It monitors and controls incoming and outgoing network traffic, preventing unauthorized access to a computer or network.

What does RAM stand for in a computer system?
  • a)
    Random Access Memory
  • b)
    Read-Only Memory
  • c)
    Read-Accelerated Memory
  • d)
    Randomly Accessed Module
  • e)
    Remote Application Management
Correct answer is option 'A'. Can you explain this answer?

Iq Funda answered
RAM is a type of computer memory that allows data to be read from and written to. It provides fast and temporary storage for data that is actively being used by the computer's processor.

Which of the following is an example of a spreadsheet software?
  • a)
    Microsoft Word
  • b)
    Microsoft Excel
  • c)
    Microsoft PowerPoint
  • d)
    Adobe Photoshop
  • e)
    Google Chrome
Correct answer is option 'B'. Can you explain this answer?

Microsoft Excel is a popular spreadsheet software that allows users to create, edit, and analyze data using spreadsheets. It is widely used for tasks such as budgeting, financial analysis, and data organization.

Chapter doubts & questions for Computer Fundamentals /Terminologies - Computer Awareness for Bank Exams 2025 is part of Delhi Police Constable exam preparation. The chapters have been prepared according to the Delhi Police Constable exam syllabus. The Chapter doubts & questions, notes, tests & MCQs are made for Delhi Police Constable 2025 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests here.

Chapter doubts & questions of Computer Fundamentals /Terminologies - Computer Awareness for Bank Exams in English & Hindi are available as part of Delhi Police Constable exam. Download more important topics, notes, lectures and mock test series for Delhi Police Constable Exam by signing up for free.

Signup to see your scores go up within 7 days!

Study with 1000+ FREE Docs, Videos & Tests
10M+ students study on EduRev