ASO Computer Skill Test Question

Questions

    ASO Computer Skill Test Question. We covered all the ASO Computer Skill Test Question in this post for free so that you can practice well for the exam.

    Install our MCQTUBE Android app from the Google Play Store and prepare for any competitive government exams for free.

    We created all the competitive exam MCQs into several small posts on our website for your convenience.

    You will get their respective links in the related posts section provided below.

    Join Telegram Group and Get FREE Alerts! Join Now

    Join WhatsApp Group For FREE Alerts! Join Now

    Related Posts:

    ASO Computer Skill Test Question for Students

    Quick Quiz

    What menu is selected to cut, copy, and paste?

    1. File

    2. Tools

    3. Special

    4. Edit

    5. None of these

    Option 4 – Edit

    The most important or powerful computer in a typical network is

    1. desktop

    2. network client

    3. network server

    4. network station

    5. None of these

    Option 3 – network server

    The primary purpose of the software is to turn data into

    1. Websites

    2. information

    3. programs

    4. object

    5. None of these

    Option 2 – information

    The ability to find an individual item in a file immediately ……. is used.

    1. file allocation table

    2. directory

    3. sequential access

    4. direct access

    5. None of these

    Option 3 – sequential access

    The concept of a virtual machine is used in

    1. Pascal

    2. C

    3. UNIX

    4. Java

    Option 4 – Java

    The …….. uses the language of 0 and 1

    1. Assembly language

    2. Machine

    3. HLL

    4. SQL

    Option 2 – Machine

    …….. translates an assembly language program into machine language?

    1. Assembler

    2. Compiler

    3. Interpreter

    4. SQL

    Option 1 – Assembler

    Ultimately the computer only understands the

    1. Assembly language

    2. Machine language

    3. HLL

    4. SQL

    Option 2 – Machine language

    IQL stands for

    1. Interactive query language

    2. Internal query language

    3. Integrated query language

    4. None of these

    Option 1 – Interactive query language

    CAL stands for

    1. Computer-Assisted Learning

    2. Computer-Assisted

    3. Common Assisted Language

    4. None of these

    Option 1 – Computer-Assisted Learning

    When was the COREAL 66 developed?

    1. 1866

    2. 1966

    3. 1965

    4. 1766

    Option 2 – 1966

    SNOBAL was developed in which year?

    1. 1962

    2. 1862

    3. 1961

    4. 1963

    Option 1 – 1962

    HTML stands for

    1. Hyper Text Markup Language

    2. Hindu Text Markup Language

    3. History Text Markup Language

    4. None of these

    Option 1 – Hyper Text Markup Language

    Operating systems are

    1. 3 types

    2.4 types

    3.5 types

    4. None

    Option 3 – 5 types

    Example of a single-user operating system

    1. Unix

    2. Xenix

    3. MS-DOS

    4. None of these

    Option 3 – MS-DOS

    To protect the system, there are how many levels of security level?

    a) One

    b) Two

    c) Three

    d) Four

    Option c – Three

    The lowest level of security system is

    a) A

    b) B

    c) C

    d) D

    Option a – A

    The security of a system can be improved by

    a) Audit log

    b) Threat Monitoring

    c) Both (a) & (b)

    c) None of these

    Option b – Threat Monitoring

    How many capabilities are in CAP?

    a) One

    b) Two

    c) Three

    d) Four

    Option b – Two

    CAP is

    a) Simple & greater power than that of hydra

    b) Complex & less powerful than that of hydra

    c) Simpler & less powerful than that of hydra

    d) None of these

    Option c – Simpler & less powerful than that of hydra

    What is Cyber Security?

    a) Cyber Security provides security against malware

    b) Cyber Security provides security against cyber-terrorists

    c) Cyber Security protects a system from cyber attacks

    d) All of the mentioned

    Option d – All of the mentioned

    What does cyber security protect?

    a) Cyber security protects criminals

    b) Cyber security protects internet-connected systems

    c) Cyber security protects hackers

    d) None of the mentioned

    Option b – Cyber security protects internet-connected systems

    Who is the father of computer security?

    a) August Kerckhoffs

    b) Bob Thomas

    c) Robert

    d) Charles

    Option a – August Kerckhoffs

    Firewalls are to protect against

    a) Virus Attacks

    b) Fire Attacks

    c) Data Driven Attacks

    d) Unauthorized Attacks

    Option d – Unauthorized Attacks

    The first computer virus is

    a) The famous

    b) HARLIE

    c) PARAM

    d) Creeper

    Option d – Creeper

    A hard copy would be prepared on a

    a) Printer

    b) Joystick

    c) Trackball

    d) All of these

    Option a – Printer

    The first PC virus was developed in

    a) 1980

    b) 1986

    c) 1988

    d) 1999

    Option b – 1986

    The joystick allows movements with

    a) 90 degree angle

    b) 180-degree angle

    c) 360 degree angle

    d) 45-degree angle

    Option c – 360 degree angle

    When the formula bar is activated, you can see?

    a) The Edit Formula button

    b) The Cancel button

    c) The Enter button

    d) All of the above

    Option d – All of the above

    In a worksheet, you can select

    a) The entire worksheet

    b) Rows

    c) Columns

    d) a, b & c

    Option d – a, b & c

    When you print preview a worksheet

    a) the entire worksheet is displayed

    b) the selected range is displayed

    c) the active portion of the worksheet is displayed

    d) a, b & c

    Option d – a, b & c

    You can group noncontiguous worksheets with-

    a) The group button on the standard toolbar

    b) The shift key & the mouse

    c) The ctrl key & mouse

    d) The alt+enter key

    Option c – The ctrl key & mouse

    Weight refers to :

    a) The print density of characters

    b) The height of the printed character

    c) Upright or slanted shape

    d) The design & appearance of characters

    Option a – The print density of characters

    When you link data maintained in an Excel workbook to a Word document?

    a) The Word document cannot be edited

    b) The Word document contains a reference to the original source application

    c) The Word document must contain a hyperlink

    d) The Word document contains a copy of the actual data

    Option b – The Word document contains a reference to the original source application

    To drag a selected range of data to another worksheet in the same workbook, use the

    a) Tab key

    b) Alt key

    c) Shift key

    d) Ctrl key

    Option d – Ctrl key

    When creating a vertical page break-

    a) The active cell must be A1

    b) The active cell can be anywhere in the worksheet

    c) The active cell must be in row 1

    d) The active cell must be in column A

    Option b – The active cell can be anywhere in the worksheet

    To activate the previous cell in a pre-selected range, press-

    a) the Alt key

    b) the Tab key

    c) the Enter key

    d) none of the above

    Option d – none of the above

    Which of the following CANNOT be done to data using a Form?

    a. Store

    b. Sort

    c. Edit

    d. Print

    Option a – Store

    What is one of the advantages of using a form over other Access objects?

    a. Utilizes field placement to improve the efficiency of data entry.

    b. Forms store information more efficiently.

    c. Forms show the summary of all the records.

    d. Forms cannot be edited.

    Option a – Utilizes field placement to improve the efficiency of data entry

    A blinking indicator that shows you where your next action will happen ……..

    a. CPU

    b. Cursor

    c. Toolbar

    d. Boot

    Option b – Cursor

    Which of the following is the first step in sizing a window?

    a. Point to the title bar

    b. Pull down the view menu to display the toolbar

    c. Point to any corner or border

    d. Pull down the view menu and change to large icons

    Option a – Point to the title bar

    In Windows, Icons such as Add/Remove program, Add New Hardware, Modems, etc, are found in

    a. Control Panel

    b. Network Neighborhood

    c. My Computer

    d. Task Bar

    Option a – Control Panel

    A ……… is a major database object used to display information in a printable page format.

    a. form

    b. query

    c. report

    d. table

    Option c – report

    In Datasheet View, new records are added to a table ………

    a. in alphabetical order

    b. at the end of the table

    c. at the beginning of the table

    d. in numerical order

    Option b – at the end of the table

    What happens when a user selects a record in a form and presses Delete?

    a. The record is deleted in the form and from its source table.

    b. The record is deleted in the form, but not from its source table.

    c. The record is neither deleted in the form nor from its source table.

    d. The record is not deleted in the form but is deleted from its source table.

    Option a – The record is deleted in the form and from its source table

    DVD refers to

    (a) Digital Video Developer

    (b) Digital Video Device

    (c) Digital Video Disc

    (d) None of the above

    Option c – Digital Video Disc

    The ……… indicates how much data a particular storage medium can hold.

    (a) Storage

    (b) Capacity

    (c) Access

    (d) Memory

    Option b – Capacity

    A disc’s content that is recorded at the time of manufacture and that can not be changed or erased by the user is –

    (a) Memory only

    (b) Once only

    (c) Read only

    (d) Run only

    Option c – Read only

    Which is not a storage device?

    (a) A CD

    (b) A DVD

    (c) A Floppy disk

    (d) A printer

    Option d – A printer

    Which of the following is not a secondary storage unit?

    (a) RAM

    (b) DVD

    (c) Floppy

    (d) Magnetic Tape

    Option a – RAM

    Storage.

    (a) Primary

    (b) Device

    (c) Secondary

    (d) Direct Memory

    Option c – Secondary

    DVD is

    (a) Digital Video Disk

    (b) Dynamic Versatile

    (c) Digital Versatile Disk

    (d) Dynamic Video Disk

    Option c – Digital Versatile Disk

    A typical acronym of reusable optical storage would be

    (a) CD

    (b) CD-RW

    (c) DVD

    (d) RPM

    Option b – CD-RW

    Kilobyte equals how many bytes

    (a) 1000

    (b) 100

    (c) 1024

    (d) 1035

    Option c – 1024

    The term ‘gigabyte’ refers to

    (a) 1024 Byte

    (b) 1024 Kilobyte

    (c) 1024 Megabyte

    (d) 1024 Gigabyte

    Option c – 1024 Megabyte

    The second generation of computers is known as :

    (A) Era of Circuits

    (B) Era of Vacuum Tubes

    (C) Era of Microchips

    (D) Era of Transistors

    Option d – Era of Transistors

    You can insert a new worksheet in Excel by pressing the ……. key.

    (A) Shift + F11

    (B) Alt + F11

    (C) Shift + F12

    (D) Ctrl + F12

    Option a – Shift + F11

    …….. is a unique address for every computer connected to the Internet.

    (A) Search engine address

    (B) Memory address

    (C) IP address

    (D) Web address

    Option c – IP address

    How will you move to the next sheet in a workbook using a shortcut?

    (A) Ctrl+Page up

    (B) Ctrl+Page down

    (C) Ctrl+Up arrow

    (D) Ctrl+Down arrow

    Option b – Ctrl+Page down

    ……… is a portable, multi-tasking, multi-user operating system developed by AT&T.

    (A) DOS

    (B) windows

    (C) Unix

    (D) Linux

    Option c – Unix

    Which type of software are the following DOS, Windows XP, Windows Vista, Unix/Linux?

    (A) Language Processors

    (B) Operating system software

    (C) Utility software

    (D) Application software

    Option b – Operating system software

    The number of specified characters defined in the ASCII coding system is ………

    (A) 256

    (B) 128

    (C) 104

    (D) 16

    Option b – 128

    In the latest generation computers, the instructions are executed

    (a) only parallel

    (b) only sequentially

    (c) Both ‘1’ & ‘2’

    (d) Either ‘1’ & ‘2’

    Option c – Both ‘1’ & ‘2’

    A tablet PC is a type of

    (a) Micro Computer

    (b) Supercomputer

    (c) Mini Computer

    (d) Mainframe computer

    Option a – Micro Computer

    The first supercomputer developed in India is

    (a) Param

    (b) CRAY-1

    (c) PARAM Ishan

    (d) EPRAM

    Option a – Param

    Pratyush is ……. the fastest supercomputer in the world.

    (a) First

    (b) Second

    (c) Third

    (d) Fourth

    Option d – Fourth

    The Pratyush supercomputer is dedicated for

    (a) Multimedia

    (b) Weather forecasting

    (c) Recreation

    (d) Military Personnel

    Option b – Weather forecasting

    Seismograph is an example of

    (a) Analog

    (b) Digital Computer

    (c) Hybrid Computer

    (d) All of these

    Option a – Analog

    Abacus can perform

    (a) addition

    (b) Subtraction

    (c) multiplication

    (d) Both ‘1’ & ‘2’

    Option d – Both ‘1’ & ‘2’

    The first computer that provides storage is

    (a) EDSAC

    (b) EDVAC

    (c) MARK-1

    (d) ACE

    Option a – EDSAC

    Name the first general-purpose electronic computer.

    (a) ADVAC

    (b) ADSAC

    (c) ENIAC

    (d) EDVAC

    Option c – ENIAC

    Which of the following uses a handheld operating system?

    (a) A supercomputer

    (b) A personal computer

    (c) A Laptop

    (d) A PDA

    Option d – A PDA

    PCs are considered fourth-generation and

    (a) Information

    (b) Data

    (c) Vacuum tubes

    (d) Microprocessors

    Option d – Microprocessors

    The third-generation computers were made with

    (a) biochips

    (b) transistors

    (c) integrated circuits

    (d) vacuum tubes”

    Option c – integrated circuits

    What are the features of cyber security?

    a) Compliance

    b) Defense against internal threats

    c) Threat Prevention

    d) All of the above

    Option d – All of the above

    Which of the following is an objective of network security?

    a) Confidentiality

    b) Integrity

    c) Availability

    d) All of the above

    Option d – All of the above

    Which of the following is not a cybercrime?

    a) Denial of Service

    b) Man in the Middle

    c) Malware

    d) AES

    Option d – AES

    Which of the following is a component of cyber security?

    a) Internet Of Things

    b) AI

    c) Database

    d) Attacks

    Option a – Internet Of Things

    Which of the following is a type of cyber attack?

    a) Phishing

    b) SQL Injections

    c) Password Attack

    d) All of the above

    Option d – All of the above

    Which of the following is not an advantage of cyber security?

    a) Makes the system slower

    b) Minimizes computer freezing & crashes

    c) Gives privacy to users

    d) Protects system against viruses

    Option a – Makes the system slower

    “Cyberspace” was coined by

    a) Richard Stallman

    b) William Gibson

    c) Andrew Tannenbaum

    d) Scott Fahlman

    Option b – William Gibson

    In which year has hacking become a practical crime & a matter of concern in the field of cyber technology?

    a) 1991

    b) 1983

    c) 1970

    d) 1964

    Option c – 1970

    Governments hire some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as

    a) Nation / State-sponsored hackers

    b) CIA triad

    c) Special Hackers

    d) Government Hackers

    Option a – Nation / State-sponsored hackers

    Which of the following acts violates cyber security?

    a) Exploit

    b) Attack

    c) Threat

    d) Vulnerability

    Option b – Attack

    Which of the following is defined as an attempt to steal, spy, damage, or destroy computer systems, networks, or their associated information?

    a) Cyberattack

    b) Computer security

    c) Cryptography

    d) Digital hacking

    Option a – Cyberattack

    Which of the following is a type of cyber security?

    a) Cloud Security

    b) Network Security

    c) Application Security

    d) All of the above

    Option d – All of the above

    We covered all the aso computer skill test question above in this post for free so that you can practice well for the exam.

    Check out the latest MCQ content by visiting our mcqtube website homepage.

    Also, check out:

    Hello, I am the admin of mcqtube.com website. I am a blogger and app developer. Thanks.

    Leave a Comment

    Floating ChatBot
    Ask

    Doubt?, Ask me Anything



    Sticky Bottom Popup