ASO Computer Skill Test Question. We covered all the ASO Computer Skill Test Question in this post for free so that you can practice well for the exam.
Install our MCQTUBE Android app from the Google Play Store and prepare for any competitive government exams for free.
We created all the competitive exam MCQs into several small posts on our website for your convenience.
You will get their respective links in the related posts section provided below.
Related Posts:
- MCQ Questions for Class 10 ICSE Computer
- Computer skill test questions with answers pdf free download
- Computer Quiz Questions in Hindi
- Computer skill test question paper pdf with answers download OSSC
ASO Computer Skill Test Question for Students
1. File
2. Tools
3. Special
4. Edit
5. None of these
Option 4 – Edit
The most important or powerful computer in a typical network is
1. desktop
2. network client
3. network server
4. network station
5. None of these
Option 3 – network server
The primary purpose of the software is to turn data into
1. Websites
2. information
3. programs
4. object
5. None of these
Option 2 – information
The ability to find an individual item in a file immediately ……. is used.
1. file allocation table
2. directory
3. sequential access
4. direct access
5. None of these
Option 3 – sequential access
The concept of a virtual machine is used in
1. Pascal
2. C
3. UNIX
4. Java
Option 4 – Java
The …….. uses the language of 0 and 1
1. Assembly language
2. Machine
3. HLL
4. SQL
Option 2 – Machine
…….. translates an assembly language program into machine language?
1. Assembler
2. Compiler
3. Interpreter
4. SQL
Option 1 – Assembler
Ultimately the computer only understands the
1. Assembly language
2. Machine language
3. HLL
4. SQL
Option 2 – Machine language
IQL stands for
1. Interactive query language
2. Internal query language
3. Integrated query language
4. None of these
Option 1 – Interactive query language
CAL stands for
1. Computer-Assisted Learning
2. Computer-Assisted
3. Common Assisted Language
4. None of these
Option 1 – Computer-Assisted Learning
When was the COREAL 66 developed?
1. 1866
2. 1966
3. 1965
4. 1766
Option 2 – 1966
SNOBAL was developed in which year?
1. 1962
2. 1862
3. 1961
4. 1963
Option 1 – 1962
HTML stands for
1. Hyper Text Markup Language
2. Hindu Text Markup Language
3. History Text Markup Language
4. None of these
Option 1 – Hyper Text Markup Language
Operating systems are
1. 3 types
2.4 types
3.5 types
4. None
Option 3 – 5 types
Example of a single-user operating system
1. Unix
2. Xenix
3. MS-DOS
4. None of these
Option 3 – MS-DOS
To protect the system, there are how many levels of security level?
a) One
b) Two
c) Three
d) Four
Option c – Three
The lowest level of security system is
a) A
b) B
c) C
d) D
Option a – A
The security of a system can be improved by
a) Audit log
b) Threat Monitoring
c) Both (a) & (b)
c) None of these
Option b – Threat Monitoring
How many capabilities are in CAP?
a) One
b) Two
c) Three
d) Four
Option b – Two
CAP is
a) Simple & greater power than that of hydra
b) Complex & less powerful than that of hydra
c) Simpler & less powerful than that of hydra
d) None of these
Option c – Simpler & less powerful than that of hydra
What is Cyber Security?
a) Cyber Security provides security against malware
b) Cyber Security provides security against cyber-terrorists
c) Cyber Security protects a system from cyber attacks
d) All of the mentioned
Option d – All of the mentioned
What does cyber security protect?
a) Cyber security protects criminals
b) Cyber security protects internet-connected systems
c) Cyber security protects hackers
d) None of the mentioned
Option b – Cyber security protects internet-connected systems
Who is the father of computer security?
a) August Kerckhoffs
b) Bob Thomas
c) Robert
d) Charles
Option a – August Kerckhoffs
Firewalls are to protect against
a) Virus Attacks
b) Fire Attacks
c) Data Driven Attacks
d) Unauthorized Attacks
Option d – Unauthorized Attacks
The first computer virus is
a) The famous
b) HARLIE
c) PARAM
d) Creeper
Option d – Creeper
A hard copy would be prepared on a
a) Printer
b) Joystick
c) Trackball
d) All of these
Option a – Printer
The first PC virus was developed in
a) 1980
b) 1986
c) 1988
d) 1999
Option b – 1986
The joystick allows movements with
a) 90 degree angle
b) 180-degree angle
c) 360 degree angle
d) 45-degree angle
Option c – 360 degree angle
When the formula bar is activated, you can see?
a) The Edit Formula button
b) The Cancel button
c) The Enter button
d) All of the above
Option d – All of the above
In a worksheet, you can select
a) The entire worksheet
b) Rows
c) Columns
d) a, b & c
Option d – a, b & c
When you print preview a worksheet
a) the entire worksheet is displayed
b) the selected range is displayed
c) the active portion of the worksheet is displayed
d) a, b & c
Option d – a, b & c
You can group noncontiguous worksheets with-
a) The group button on the standard toolbar
b) The shift key & the mouse
c) The ctrl key & mouse
d) The alt+enter key
Option c – The ctrl key & mouse
Weight refers to :
a) The print density of characters
b) The height of the printed character
c) Upright or slanted shape
d) The design & appearance of characters
Option a – The print density of characters
When you link data maintained in an Excel workbook to a Word document?
a) The Word document cannot be edited
b) The Word document contains a reference to the original source application
c) The Word document must contain a hyperlink
d) The Word document contains a copy of the actual data
Option b – The Word document contains a reference to the original source application
To drag a selected range of data to another worksheet in the same workbook, use the
a) Tab key
b) Alt key
c) Shift key
d) Ctrl key
Option d – Ctrl key
When creating a vertical page break-
a) The active cell must be A1
b) The active cell can be anywhere in the worksheet
c) The active cell must be in row 1
d) The active cell must be in column A
Option b – The active cell can be anywhere in the worksheet
To activate the previous cell in a pre-selected range, press-
a) the Alt key
b) the Tab key
c) the Enter key
d) none of the above
Option d – none of the above
Which of the following CANNOT be done to data using a Form?
a. Store
b. Sort
c. Edit
d. Print
Option a – Store
What is one of the advantages of using a form over other Access objects?
a. Utilizes field placement to improve the efficiency of data entry.
b. Forms store information more efficiently.
c. Forms show the summary of all the records.
d. Forms cannot be edited.
Option a – Utilizes field placement to improve the efficiency of data entry
A blinking indicator that shows you where your next action will happen ……..
a. CPU
b. Cursor
c. Toolbar
d. Boot
Option b – Cursor
Which of the following is the first step in sizing a window?
a. Point to the title bar
b. Pull down the view menu to display the toolbar
c. Point to any corner or border
d. Pull down the view menu and change to large icons
Option a – Point to the title bar
In Windows, Icons such as Add/Remove program, Add New Hardware, Modems, etc, are found in
a. Control Panel
b. Network Neighborhood
c. My Computer
d. Task Bar
Option a – Control Panel
A ……… is a major database object used to display information in a printable page format.
a. form
b. query
c. report
d. table
Option c – report
In Datasheet View, new records are added to a table ………
a. in alphabetical order
b. at the end of the table
c. at the beginning of the table
d. in numerical order
Option b – at the end of the table
What happens when a user selects a record in a form and presses Delete?
a. The record is deleted in the form and from its source table.
b. The record is deleted in the form, but not from its source table.
c. The record is neither deleted in the form nor from its source table.
d. The record is not deleted in the form but is deleted from its source table.
Option a – The record is deleted in the form and from its source table
DVD refers to
(a) Digital Video Developer
(b) Digital Video Device
(c) Digital Video Disc
(d) None of the above
Option c – Digital Video Disc
The ……… indicates how much data a particular storage medium can hold.
(a) Storage
(b) Capacity
(c) Access
(d) Memory
Option b – Capacity
A disc’s content that is recorded at the time of manufacture and that can not be changed or erased by the user is –
(a) Memory only
(b) Once only
(c) Read only
(d) Run only
Option c – Read only
Which is not a storage device?
(a) A CD
(b) A DVD
(c) A Floppy disk
(d) A printer
Option d – A printer
Which of the following is not a secondary storage unit?
(a) RAM
(b) DVD
(c) Floppy
(d) Magnetic Tape
Option a – RAM
Storage.
(a) Primary
(b) Device
(c) Secondary
(d) Direct Memory
Option c – Secondary
DVD is
(a) Digital Video Disk
(b) Dynamic Versatile
(c) Digital Versatile Disk
(d) Dynamic Video Disk
Option c – Digital Versatile Disk
A typical acronym of reusable optical storage would be
(a) CD
(b) CD-RW
(c) DVD
(d) RPM
Option b – CD-RW
Kilobyte equals how many bytes
(a) 1000
(b) 100
(c) 1024
(d) 1035
Option c – 1024
The term ‘gigabyte’ refers to
(a) 1024 Byte
(b) 1024 Kilobyte
(c) 1024 Megabyte
(d) 1024 Gigabyte
Option c – 1024 Megabyte
The second generation of computers is known as :
(A) Era of Circuits
(B) Era of Vacuum Tubes
(C) Era of Microchips
(D) Era of Transistors
Option d – Era of Transistors
You can insert a new worksheet in Excel by pressing the ……. key.
(A) Shift + F11
(B) Alt + F11
(C) Shift + F12
(D) Ctrl + F12
Option a – Shift + F11
…….. is a unique address for every computer connected to the Internet.
(A) Search engine address
(B) Memory address
(C) IP address
(D) Web address
Option c – IP address
How will you move to the next sheet in a workbook using a shortcut?
(A) Ctrl+Page up
(B) Ctrl+Page down
(C) Ctrl+Up arrow
(D) Ctrl+Down arrow
Option b – Ctrl+Page down
……… is a portable, multi-tasking, multi-user operating system developed by AT&T.
(A) DOS
(B) windows
(C) Unix
(D) Linux
Option c – Unix
Which type of software are the following DOS, Windows XP, Windows Vista, Unix/Linux?
(A) Language Processors
(B) Operating system software
(C) Utility software
(D) Application software
Option b – Operating system software
The number of specified characters defined in the ASCII coding system is ………
(A) 256
(B) 128
(C) 104
(D) 16
Option b – 128
In the latest generation computers, the instructions are executed
(a) only parallel
(b) only sequentially
(c) Both ‘1’ & ‘2’
(d) Either ‘1’ & ‘2’
Option c – Both ‘1’ & ‘2’
A tablet PC is a type of
(a) Micro Computer
(b) Supercomputer
(c) Mini Computer
(d) Mainframe computer
Option a – Micro Computer
The first supercomputer developed in India is
(a) Param
(b) CRAY-1
(c) PARAM Ishan
(d) EPRAM
Option a – Param
Pratyush is ……. the fastest supercomputer in the world.
(a) First
(b) Second
(c) Third
(d) Fourth
Option d – Fourth
The Pratyush supercomputer is dedicated for
(a) Multimedia
(b) Weather forecasting
(c) Recreation
(d) Military Personnel
Option b – Weather forecasting
Seismograph is an example of
(a) Analog
(b) Digital Computer
(c) Hybrid Computer
(d) All of these
Option a – Analog
Abacus can perform
(a) addition
(b) Subtraction
(c) multiplication
(d) Both ‘1’ & ‘2’
Option d – Both ‘1’ & ‘2’
The first computer that provides storage is
(a) EDSAC
(b) EDVAC
(c) MARK-1
(d) ACE
Option a – EDSAC
Name the first general-purpose electronic computer.
(a) ADVAC
(b) ADSAC
(c) ENIAC
(d) EDVAC
Option c – ENIAC
Which of the following uses a handheld operating system?
(a) A supercomputer
(b) A personal computer
(c) A Laptop
(d) A PDA
Option d – A PDA
PCs are considered fourth-generation and
(a) Information
(b) Data
(c) Vacuum tubes
(d) Microprocessors
Option d – Microprocessors
The third-generation computers were made with
(a) biochips
(b) transistors
(c) integrated circuits
(d) vacuum tubes”
Option c – integrated circuits
What are the features of cyber security?
a) Compliance
b) Defense against internal threats
c) Threat Prevention
d) All of the above
Option d – All of the above
Which of the following is an objective of network security?
a) Confidentiality
b) Integrity
c) Availability
d) All of the above
Option d – All of the above
Which of the following is not a cybercrime?
a) Denial of Service
b) Man in the Middle
c) Malware
d) AES
Option d – AES
Which of the following is a component of cyber security?
a) Internet Of Things
b) AI
c) Database
d) Attacks
Option a – Internet Of Things
Which of the following is a type of cyber attack?
a) Phishing
b) SQL Injections
c) Password Attack
d) All of the above
Option d – All of the above
Which of the following is not an advantage of cyber security?
a) Makes the system slower
b) Minimizes computer freezing & crashes
c) Gives privacy to users
d) Protects system against viruses
Option a – Makes the system slower
“Cyberspace” was coined by
a) Richard Stallman
b) William Gibson
c) Andrew Tannenbaum
d) Scott Fahlman
Option b – William Gibson
In which year has hacking become a practical crime & a matter of concern in the field of cyber technology?
a) 1991
b) 1983
c) 1970
d) 1964
Option c – 1970
Governments hire some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as
a) Nation / State-sponsored hackers
b) CIA triad
c) Special Hackers
d) Government Hackers
Option a – Nation / State-sponsored hackers
Which of the following acts violates cyber security?
a) Exploit
b) Attack
c) Threat
d) Vulnerability
Option b – Attack
Which of the following is defined as an attempt to steal, spy, damage, or destroy computer systems, networks, or their associated information?
a) Cyberattack
b) Computer security
c) Cryptography
d) Digital hacking
Option a – Cyberattack
Which of the following is a type of cyber security?
a) Cloud Security
b) Network Security
c) Application Security
d) All of the above
Option d – All of the above
We covered all the aso computer skill test question above in this post for free so that you can practice well for the exam.
Check out the latest MCQ content by visiting our mcqtube website homepage.
Also, check out:
- Computer Quiz for Class 6 with Answers
- Class 7 Computer Chapter 2 Questions and Answers
- Basic Computer Question and Answer in Hindi