ASO Computer Skill Test Question

ASO Computer Skill Test Question. We covered all the ASO Computer Skill Test Question in this post for free so that you can practice well for the exam.

Install our MCQTUBE Android app from the Google Play Store and prepare for any competitive government exams for free.

We created all the competitive exam MCQs into several small posts on our website for your convenience.

You will get their respective links in the related posts section provided below.

Join Telegram Group and Get FREE Alerts! Join Now

Join WhatsApp Group For FREE Alerts! Join Now

Related Posts:

Questions hide

ASO Computer Skill Test Question for Students

What menu is selected to cut, copy, and paste?

1. File

2. Tools

3. Special

4. Edit

5. None of these

Option 4 – Edit

The most important or powerful computer in a typical network is

1. desktop

2. network client

3. network server

4. network station

5. None of these

Option 3 – network server

The primary purpose of the software is to turn data into

1. Websites

2. information

3. programs

4. object

5. None of these

Option 2 – information

The ability to find an individual item in a file immediately ……. is used.

1. file allocation table

2. directory

3. sequential access

4. direct access

5. None of these

Option 3 – sequential access

The concept of a virtual machine is used in

1. Pascal

2. C

3. UNIX

4. Java

Option 4 – Java

The …….. uses the language of 0 and 1

1. Assembly language

2. Machine

3. HLL

4. SQL

Option 2 – Machine

…….. translates an assembly language program into machine language?

1. Assembler

2. Compiler

3. Interpreter

4. SQL

Option 1 – Assembler

Ultimately the computer only understands the

1. Assembly language

2. Machine language

3. HLL

4. SQL

Option 2 – Machine language

IQL stands for

1. Interactive query language

2. Internal query language

3. Integrated query language

4. None of these

Option 1 – Interactive query language

CAL stands for

1. Computer-Assisted Learning

2. Computer-Assisted

3. Common Assisted Language

4. None of these

Option 1 – Computer-Assisted Learning

When was the COREAL 66 developed?

1. 1866

2. 1966

3. 1965

4. 1766

Option 2 – 1966

SNOBAL was developed in which year?

1. 1962

2. 1862

3. 1961

4. 1963

Option 1 – 1962

HTML stands for

1. Hyper Text Markup Language

2. Hindu Text Markup Language

3. History Text Markup Language

4. None of these

Option 1 – Hyper Text Markup Language

Operating systems are

1. 3 types

2.4 types

3.5 types

4. None

Option 3 – 5 types

Example of a single-user operating system

1. Unix

2. Xenix

3. MS-DOS

4. None of these

Option 3 – MS-DOS

To protect the system, there are how many levels of security level?

a) One

b) Two

c) Three

d) Four

Option c – Three

The lowest level of security system is

a) A

b) B

c) C

d) D

Option a – A

The security of a system can be improved by

a) Audit log

b) Threat Monitoring

c) Both (a) & (b)

c) None of these

Option b – Threat Monitoring

How many capabilities are in CAP?

a) One

b) Two

c) Three

d) Four

Option b – Two

CAP is

a) Simple & greater power than that of hydra

b) Complex & less powerful than that of hydra

c) Simpler & less powerful than that of hydra

d) None of these

Option c – Simpler & less powerful than that of hydra

What is Cyber Security?

a) Cyber Security provides security against malware

b) Cyber Security provides security against cyber-terrorists

c) Cyber Security protects a system from cyber attacks

d) All of the mentioned

Option d – All of the mentioned

What does cyber security protect?

a) Cyber security protects criminals

b) Cyber security protects internet-connected systems

c) Cyber security protects hackers

d) None of the mentioned

Option b – Cyber security protects internet-connected systems

Who is the father of computer security?

a) August Kerckhoffs

b) Bob Thomas

c) Robert

d) Charles

Option a – August Kerckhoffs

Join Telegram Group and Get FREE Alerts! Join Now

Join WhatsApp Group For FREE Alerts! Join Now

Firewalls are to protect against

a) Virus Attacks

b) Fire Attacks

c) Data Driven Attacks

d) Unauthorized Attacks

Option d – Unauthorized Attacks

The first computer virus is

a) The famous

b) HARLIE

c) PARAM

d) Creeper

Option d – Creeper

A hard copy would be prepared on a

a) Printer

b) Joystick

c) Trackball

d) All of these

Option a – Printer

The first PC virus was developed in

a) 1980

b) 1986

c) 1988

d) 1999

Option b – 1986

The joystick allows movements with

a) 90 degree angle

b) 180-degree angle

c) 360 degree angle

d) 45-degree angle

Option c – 360 degree angle

When the formula bar is activated, you can see?

a) The Edit Formula button

b) The Cancel button

c) The Enter button

d) All of the above

Option d – All of the above

In a worksheet, you can select

a) The entire worksheet

b) Rows

c) Columns

d) a, b & c

Option d – a, b & c

When you print preview a worksheet

a) the entire worksheet is displayed

b) the selected range is displayed

c) the active portion of the worksheet is displayed

d) a, b & c

Option d – a, b & c

You can group noncontiguous worksheets with-

a) The group button on the standard toolbar

b) The shift key & the mouse

c) The ctrl key & mouse

d) The alt+enter key

Option c – The ctrl key & mouse

Weight refers to :

a) The print density of characters

b) The height of the printed character

c) Upright or slanted shape

d) The design & appearance of characters

Option a – The print density of characters

When you link data maintained in an Excel workbook to a Word document?

a) The Word document cannot be edited

b) The Word document contains a reference to the original source application

c) The Word document must contain a hyperlink

d) The Word document contains a copy of the actual data

Option b – The Word document contains a reference to the original source application

To drag a selected range of data to another worksheet in the same workbook, use the

a) Tab key

b) Alt key

c) Shift key

d) Ctrl key

Option d – Ctrl key

When creating a vertical page break-

a) The active cell must be A1

b) The active cell can be anywhere in the worksheet

c) The active cell must be in row 1

d) The active cell must be in column A

Option b – The active cell can be anywhere in the worksheet

To activate the previous cell in a pre-selected range, press-

a) the Alt key

b) the Tab key

c) the Enter key

d) none of the above

Option d – none of the above

Which of the following CANNOT be done to data using a Form?

a. Store

b. Sort

c. Edit

d. Print

Option a – Store

What is one of the advantages of using a form over other Access objects?

a. Utilizes field placement to improve the efficiency of data entry.

b. Forms store information more efficiently.

c. Forms show the summary of all the records.

d. Forms cannot be edited.

Option a – Utilizes field placement to improve the efficiency of data entry

A blinking indicator that shows you where your next action will happen ……..

a. CPU

b. Cursor

c. Toolbar

d. Boot

Option b – Cursor

Which of the following is the first step in sizing a window?

a. Point to the title bar

b. Pull down the view menu to display the toolbar

c. Point to any corner or border

d. Pull down the view menu and change to large icons

Option a – Point to the title bar

In Windows, Icons such as Add/Remove program, Add New Hardware, Modems, etc, are found in

a. Control Panel

b. Network Neighborhood

c. My Computer

d. Task Bar

Option a – Control Panel

A ……… is a major database object used to display information in a printable page format.

a. form

b. query

c. report

d. table

Option c – report

In Datasheet View, new records are added to a table ………

a. in alphabetical order

b. at the end of the table

c. at the beginning of the table

d. in numerical order

Option b – at the end of the table

What happens when a user selects a record in a form and presses Delete?

a. The record is deleted in the form and from its source table.

b. The record is deleted in the form, but not from its source table.

c. The record is neither deleted in the form nor from its source table.

d. The record is not deleted in the form but is deleted from its source table.

Option a – The record is deleted in the form and from its source table

DVD refers to

(a) Digital Video Developer

(b) Digital Video Device

(c) Digital Video Disc

(d) None of the above

Option c – Digital Video Disc

The ……… indicates how much data a particular storage medium can hold.

(a) Storage

(b) Capacity

(c) Access

(d) Memory

Option b – Capacity

A disc’s content that is recorded at the time of manufacture and that can not be changed or erased by the user is –

(a) Memory only

(b) Once only

(c) Read only

(d) Run only

Option c – Read only

Which is not a storage device?

(a) A CD

(b) A DVD

(c) A Floppy disk

(d) A printer

Option d – A printer

Which of the following is not a secondary storage unit?

(a) RAM

(b) DVD

(c) Floppy

(d) Magnetic Tape

Option a – RAM

Storage.

(a) Primary

(b) Device

(c) Secondary

(d) Direct Memory

Option c – Secondary

DVD is

(a) Digital Video Disk

(b) Dynamic Versatile

(c) Digital Versatile Disk

(d) Dynamic Video Disk

Option c – Digital Versatile Disk

A typical acronym of reusable optical storage would be

(a) CD

(b) CD-RW

(c) DVD

(d) RPM

Option b – CD-RW

Kilobyte equals how many bytes

(a) 1000

(b) 100

(c) 1024

(d) 1035

Option c – 1024

The term ‘gigabyte’ refers to

(a) 1024 Byte

(b) 1024 Kilobyte

(c) 1024 Megabyte

(d) 1024 Gigabyte

Option c – 1024 Megabyte

The second generation of computers is known as :

(A) Era of Circuits

(B) Era of Vacuum Tubes

(C) Era of Microchips

(D) Era of Transistors

Option d – Era of Transistors

You can insert a new worksheet in Excel by pressing the ……. key.

(A) Shift + F11

(B) Alt + F11

(C) Shift + F12

(D) Ctrl + F12

Option a – Shift + F11

…….. is a unique address for every computer connected to the Internet.

(A) Search engine address

(B) Memory address

(C) IP address

(D) Web address

Option c – IP address

How will you move to the next sheet in a workbook using a shortcut?

(A) Ctrl+Page up

(B) Ctrl+Page down

(C) Ctrl+Up arrow

(D) Ctrl+Down arrow

Option b – Ctrl+Page down

……… is a portable, multi-tasking, multi-user operating system developed by AT&T.

(A) DOS

(B) windows

(C) Unix

(D) Linux

Option c – Unix

Which type of software are the following DOS, Windows XP, Windows Vista, Unix/Linux?

(A) Language Processors

(B) Operating system software

(C) Utility software

(D) Application software

Option b – Operating system software

The number of specified characters defined in the ASCII coding system is ………

(A) 256

(B) 128

(C) 104

(D) 16

Option b – 128

In the latest generation computers, the instructions are executed

(a) only parallel

(b) only sequentially

(c) Both ‘1’ & ‘2’

(d) Either ‘1’ & ‘2’

Option c – Both ‘1’ & ‘2’

A tablet PC is a type of

(a) Micro Computer

(b) Supercomputer

(c) Mini Computer

(d) Mainframe computer

Option a – Micro Computer

The first supercomputer developed in India is

(a) Param

(b) CRAY-1

(c) PARAM Ishan

(d) EPRAM

Option a – Param

Pratyush is ……. the fastest supercomputer in the world.

(a) First

(b) Second

(c) Third

(d) Fourth

Option d – Fourth

The Pratyush supercomputer is dedicated for

(a) Multimedia

(b) Weather forecasting

(c) Recreation

(d) Military Personnel

Option b – Weather forecasting

Seismograph is an example of

(a) Analog

(b) Digital Computer

(c) Hybrid Computer

(d) All of these

Option a – Analog

Abacus can perform

(a) addition

(b) Subtraction

(c) multiplication

(d) Both ‘1’ & ‘2’

Option d – Both ‘1’ & ‘2’

The first computer that provides storage is

(a) EDSAC

(b) EDVAC

(c) MARK-1

(d) ACE

Option a – EDSAC

Name the first general-purpose electronic computer.

(a) ADVAC

(b) ADSAC

(c) ENIAC

(d) EDVAC

Option c – ENIAC

Which of the following uses a handheld operating system?

(a) A supercomputer

(b) A personal computer

(c) A Laptop

(d) A PDA

Option d – A PDA

PCs are considered fourth-generation and

(a) Information

(b) Data

(c) Vacuum tubes

(d) Microprocessors

Option d – Microprocessors

The third-generation computers were made with

(a) biochips

(b) transistors

(c) integrated circuits

(d) vacuum tubes”

Option c – integrated circuits

What are the features of cyber security?

a) Compliance

b) Defense against internal threats

c) Threat Prevention

d) All of the above

Option d – All of the above

Which of the following is an objective of network security?

a) Confidentiality

b) Integrity

c) Availability

d) All of the above

Option d – All of the above

Which of the following is not a cybercrime?

a) Denial of Service

b) Man in the Middle

c) Malware

d) AES

Option d – AES

Which of the following is a component of cyber security?

a) Internet Of Things

b) AI

c) Database

d) Attacks

Option a – Internet Of Things

Which of the following is a type of cyber attack?

a) Phishing

b) SQL Injections

c) Password Attack

d) All of the above

Option d – All of the above

Which of the following is not an advantage of cyber security?

a) Makes the system slower

b) Minimizes computer freezing & crashes

c) Gives privacy to users

d) Protects system against viruses

Option a – Makes the system slower

“Cyberspace” was coined by

a) Richard Stallman

b) William Gibson

c) Andrew Tannenbaum

d) Scott Fahlman

Option b – William Gibson

In which year has hacking become a practical crime & a matter of concern in the field of cyber technology?

a) 1991

b) 1983

c) 1970

d) 1964

Option c – 1970

Governments hire some highly skilled hackers for providing cyber security for the country or state. These types of hackers are termed as

a) Nation / State-sponsored hackers

b) CIA triad

c) Special Hackers

d) Government Hackers

Option a – Nation / State-sponsored hackers

Which of the following acts violates cyber security?

a) Exploit

b) Attack

c) Threat

d) Vulnerability

Option b – Attack

Which of the following is defined as an attempt to steal, spy, damage, or destroy computer systems, networks, or their associated information?

a) Cyberattack

b) Computer security

c) Cryptography

d) Digital hacking

Option a – Cyberattack

Which of the following is a type of cyber security?

a) Cloud Security

b) Network Security

c) Application Security

d) All of the above

Option d – All of the above

We covered all the aso computer skill test question above in this post for free so that you can practice well for the exam.

Check out the latest MCQ content by visiting our mcqtube website homepage.

Also, check out:

Join Telegram Group and Get FREE Alerts! Join Now

Join WhatsApp Group For FREE Alerts! Join Now

Hello, I am the admin of mcqtube.com website. I am a blogger and app developer. Thanks.

Leave a Comment

Sticky Bottom Popup