Computer Knowledge Paper 2 2012 Questions and Answers Part 1

Get top class preparation for NSO-Level-2 right from your home: get questions, notes, tests, video lectures and more- for all subjects of NSO-Level-2.

1. Programs from the same developer, sold bundled together, that provide better integration and share common features, toolbars and menus are known as …

(A) software suites

(B) integrated software packages

(C) software processing packages

(D) personal information managers

(E) none of these

Ans: (A)

2. A data warehouse is which of the following?

(A) Can be updated by the end users

(B) Contains numerous naming conventions and formats

(C) Organized around important subject areas

(D) Contains only current data

(E) None of these

Ans: (C)

3. ________ servers store and manages files for network users.

(A) Authentication

(B) Main

(C) Web

(D) File

(E) None of these

Ans: (D)

4. All of the following are examples of real security and privacy risks Except ________

(A) hackers

(B) spam

(C) viruses

(D) identify theft

(E) None of these

Ans: (B)

5. ________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.

(A) Data

(B) Sales

(C) Query

D Point-of-sale POS

(E) None of these

Ans: (B)

6. The OSI model is divided into ________ processes called layers.

(A) five

(B) six

(C) seven

(D) eight

(E) None of these

Ans: (C)

7. System software is the set of programs that enables your computer՚s hardware devices and ________ software to work together.

(A) management

(B) processing

(C) utility

(D) application

(E) None of these

Ans: (D)

8. ________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.

(A) Servers

(B) Embedded computers

(C) Robotic computers

(D) Mainframes

(E) None of these

Ans: (B)

9. The following are all computing devices , except …

(A) notebook computers

(B) cellular telephones

(C) digital scanners

(D) personal digital assistants

(E) None of these

Ans: (C)

10.in a ring topology, the computer in possession of the ________ can transmit data

(A) packet

(B) data

(C) access method

(D) token

(E) None of these

Ans: (D)

11. This part of operating system manages the essential peripherals, such as the keyboard, screen , disk drives, and parallel and serial ports ________

(A) basic input⟋output system

(B) secondary input⟋output system

(C) peripheral input⟋output system

(D) marginal input⟋output system

(E) None of these

Ans: (A)

12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive

(A) Trojan horse

(B) Boot sector

(C) Script

(D) Logic bomb

(E) None of these

Ans: (B)