Practice Quiz set 5 - general awareness mcq Online Quiz (set-1) For All Competitive Exams

Q-1)   Which one of the following is odd?

(a)

(b)

(c)

(d)

Explanation:

IMAP (Internet Message Access Protocol) and POP (Post Office Protocol) are the two most prevailing methods or protocols for retrieving email from a mail server. Both of these protocols are supported by almost all popular mail clients programs like Outlook, Thunderbird and Apple Mail.

Similarly, Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission.

However, Simple Network Management Protocol (SNMP) is an “Internet-standard protocol for managing devices on IP networks”. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks and more.

SNMP is widely used in network management systems to monitor network-attached devices for conditions that warrant administrative attention.


Q-2)   In a computer system, which device is functionally opposite of a Key-board ?

(a)

(b)

(c)

(d)

Explanation:

In a Computer System, the Printer is functionally Opposite of a Keyboard. A keyboard is the most common input device that comprises a set of typewriter-like keys used to enter data into a computer.

On the contrary, a printer is an output device capable of printing text and graphics on paper. Printers convert processed data from a combination of electronic impulses into a printed form called a hard copy.


Q-3)   A place through which, data can enter or leave a computer is called

(a)

(b)

(c)

(d)

Explanation:

port


Q-4)   The device that converts computer output for transmission over telephone lines is called

(a)

(b)

(c)

(d)

Explanation:

The modem is an external device or internal electronic circuitry used to transmit and receive digital data over a communications line normally used for analogue signals. A modem attached to a computer converts digital data to an analogue signal that it uses to modulate a carrier frequency.

This frequency is transmitted over a line, frequently as an audio signal over a telecommunications line, to another modem that converts it back into a copy of the original data.


Q-5)   Which mechanism is used by the computer virus ‘worm’ to duplicate itself?

(a)

(b)

(c)

(d)

Explanation:

After a virus worm enters a computer system, the operating system (OS) creates a single thread for the worm’s execution. Next, the worm spawns or creates another process that is an exact duplicate of the original process. In other words, the worm makes an exact duplicate of itself within the computer’s memory.

The worm continues to duplicate itself each time the OS manages the worm’s process till it paralyzes the OS completely and forces it to shut down.


Q-6)   Which one of the following is used as secondary storage system in computer ?

(a)

(b)

(c)

(d)

Explanation:

Secondary storage, sometimes called auxiliary storage, is all data storage that is not currently in a computer's primary storage or memory.

In a personal computer, secondary storage typically consists of storage on the hard disk and on any removable media, if present, such as a CD or DVD, flash memory, floppy disks, magnetic tape, paper tape, punched cards, standalone RAM disks, and Iomega Zip drives.


Q-7)   The Digital Versatile Disc (DVD) and Blue Ray Disc (BD) differ from each other like:
  1. In DVD data is stored in between two layers of polycarbonate material having thickness of .6 mm each. In BD data isstored on the surface of a layer having thickness of 1.1 mm.
  2. DVD can store upto 4.7 GB of data whereas BD can store upto 27 GB only.

(a)

(b)

(c)

(d)

Explanation:

Just as DVD meant a five to ten-time increase in storage capacity compared to CD, Blu-ray Disc will increase DVD capacity by five to ten times.

This is due, among other reasons, to the usage of a blue instead of a red laser and improved lens specifications, allowing for a much smaller focus laser beam which enables the recording of much smaller and higher density pits on the disc.


Q-8)   Which of the following mobile telephone network is not based on GSM technology ?

(a)

(b)

(c)

(d)

Explanation:

GSM stands for Global System for Mobile Communications. Just like computers, mobile phones have evolved over time.

There were first-generation mobile phones in the 70's, there are 2nd generation mobile phones in the 80’s and 90’s, and now there are 3rd gen phones which are about to enter the Indian market.

GSM is called a 2nd generation, or 2G communications technology. The idea, Airtel, and BPL Mobile are based on GSM technology while Reliance Infocommis not based on GSM technology


Q-9)   WIKILEAKS, a whistleblowers website is an international organisation based in

(a)

(b)

(c)

(d)

Explanation:

WikiLeaks is an international, online, self-described not-for-profit organisation publishing submissions of secret information, news leaks, and classified media from anonymous news sources and whistleblowers.

Its website, launched in 2006 under the Sunshine Press organisation, claimed a database of more than 1.2 million documents within a year of its launch.

Julian Assange, an Australian Internet activist, is generally described as its founder, editor-in-chief, and director. it is based in the USA.


Q-10)   Who introduced “MMX” technology?

(a)

(b)

(c)

(d)

Explanation:

MMX is a single instruction, multiple data (SIMD) instruction set designed by Intel, introduced in 1996 with their P5-based Pentium line of microprocessors, designated as "Pentium with MMX Technology".

It developed out of a similar unit introduced on the Intel i860, and earlier the Intel i750 video pixel processor.