Académique Documents
Professionnel Documents
Culture Documents
Ques. : 7 Which device of computer operation dispenses with the use of the keyboard?
1) Joystick
2) Light pen
3) Mouse
4) Touch
5) None of the above
Ans.) 3
Ques. : 8 Any device that performs signal conversion is
1) Modulator
2) Modem
3) Keyboard
4) Plotter
5) None of the above
Ans.) 1
Ques. : 9 Codes consisting of light and dark marks which may be optically read is known
as
1) Mnemonics
2) Bar code
3) Decoder
4) All of the above
5) None of the above
Ans.) 2
Ques. : 10 A type of channel used to connect a central processor and peripherals which
uses multipling is known as
1) Modem
2) Network
3) Multiplexer
4) All of the above
5) None of the above
Ans.) 3
Ques. : 11 The complete picture of data stored in database is known as
1) Record
2) Schema
3) System flowchart
4) DBMS
5) None of the above
Ans.) 2
Ques. : 12 Which of the following is intended to be used in all applications runs on
mainframe computers.
1) LOGO
2) APL
3) PL/1
4) OCCAM
5) None of the above
Ans.) 3
Ques. : 13 A language which is close to that used within the computer is
1) High-level language
2) Assembly language
3) Low-level language
5) None of the above
1) PILOT
3) ADA
5) None of the above
2) SNOBOL
4) SIMULA
Ans.) 4
1) index register
3) memory address register
5) None of the above
2) instruction register
4) memory data register
Ans.) 3
Ques. : 40 What advantage, if any, is there to collapsing the outline so that only the slide
titles are visible?
1) More slides are displayed at one time, making it easier to 2) Transition and build
rearrange the slides in the presentation
effects can be added
3) Graphic objects become visible
4) All of the above
5) None of these
Ans.) 1
Ques. : 41 Which type of computer would best serve express delivery personnel?
1) Pen-based computers
2) Personal digital assistant (PDA)
3) Notebook PC
4) Pocket PC
5) None of these
Ans.) 1
Ques. : 42 Which computer type is the best solution for predicting the weather?
1) Supercomputers
2) Thin clients
3) Servers
4) Workstations
5) None of these
Ans.) 1
Ques. : 43 Which is true when comparing computer to human capabilities?
2) Computers "talk" faster than
1) Computers recognize images quicker than humans.
humans.
3) Computers have a much higher memory capacity
4) Computers are about 95%
than humans.
accurate.
5) None of these
Ans.) 3
Ques. : 44 Which of the following would use a CAD system?
1) Civil service
2) Engineers
3) Salespersons
4) Managers
5) None of these
Ans.) 4
Ques. : 45 Which software type would you use to create a clients list, including dates of
service and other business-related data.
1) Database
2) Communications
3) Presentation
4) Spreadsheet
5) None of these
Ans.) 2
3) computer literacy
5) None of these
4) hard skills
Ans.) 3
Ques. : 59 Membership in _____________________ can help you keep up with your area
of IT interest and provide valuable career contacts.
1) professional organizations
2) college computer club
3) computer forums
4) technology training forums
5) None of these
Ans.) 1
Ques. : 60 A(n) _________________ is a collection of related data that is organized in a
manner that makes it easy to access, manage, update, group, and summarize.
1) knowledge base
2) data warehouse
3) information system
4) database
5) None of these
Ans.) 4
Ques. : 61 A(n) ___________________ is determined by the combination of
microprocessor chip and operating system used by a distinct type of computer.
1) operating system
2) platform
3) server
4) BIOS
5) None of these
Ans.) 2
Ques. : 62 _________________________ are specialized operating systems designed for
specific applications.
1) Embedded operating systems
2) Server operating systems
3) Linux operating systems
4) Unix operating systems
5) None of these
Ans.) 1
Ques. : 63 ___________________ software creates a mirror image of the entire hard disk,
including the operating system, applications, files, and data.
1) Utility programs
2) Operating system
3) Driver imaging
4) Backup software
5) None of these
Ans.) 3
Ques. : 64 A portion of the disk that is unable to store data reliably is a
_______________________.
1) bad sector
2) search utility
3) clean-up utility
4) a and b
5) None of these
Ans.) 1
1) boxes
3) windows
5) None of these
2) doors
4) frames
Ans.) 2
Ques. : 78 _________________ memory is storage that is very fast but released when the
power goes off.
1) Registry
2) Volatile
3) Kernal
4) Booting
5) None of these
Ans.) 2
Ques. : 79 A database, called the _________________, stores configuration information
about installed peripherals and software.
1) BIOS
2) profile
3) registry
4) boot sector
5) None of these
Ans.) 3
Ques. : 80 Word, Excel, Access, and PowerPoint are the programs in
_________________.
1) Internet browser
2) common interface
3) Open Office
4) Microsoft Office 2010
5) None of the above
Ans.) 4
Ques. : 81 Which of these is not a U.S. top-level domain affiliation ID:
1) edu
2) moc
3) org
4) gov
5) None of these
Ans.) 2
Ques. : 82 Which server on the Internet offers hypertext links:
1) Gopher
2) Web
3) ftp
4) QOQ
5) None of these
Ans.) 2
Ques. : 83 All but which one of these would be a common way to search for information
on the Internet:
1) push/pull
2) ask someone on the Net
3) browse
4) search
5) None of these
Ans.) 1
Ques. : 84 What Web features enable the display of more than one page on a screen:
1) borders
3) structures
5) None of these
2) frames
4) windows
Ans.) 2
3) System flowchart
5) None of the above
4) DBMS
Ans.) 2
Ques. : 104 The report card and merit list forms the
1) Output data
2) Data processing
3) Central Processing
4) Input data
5) None of the above
Ans.) 1
Ques. : 105 A number which is stored and processed but not in the standard exponential
form is called
1) Floating point number
2) Fixed point number
3) Octal number
4) Decimal number
5) None of the above
Ans.) 2
Ques. : 106 Which network is a packet switching network?
1) Ring network
2) LAN
3) Star network
4) EuroNET
5) None of the above
Ans.) 4
Ques. : 107 As compared to diskettes, the hard disks are
1) more expensive
2) more portable
3) less rigid
4) slowly accessed
5) None of the above
Ans.) 1
Ques. : 108 The first microprocessors produced by Intel Corpn. and Texas Instruments
were used primarily to control small
1) microwave ovens
2) washing machines
3) calculators
4) personal computers
5) robotics
Ans.) 3
Ques. : 109 Which printer uses a combination of laser-beam & electro photographic
techniques.
1) Laser printers
2) Dot-Matrix
3) Line printer
4) Daisy wheel
5) None of the above
Ans.) 1
Ques. : 110 Which of the following is not currently a topic in computer science?
1) Speech recognition
2) Artificial intelligence
3) Thermodynamics
4) Multiprocessing
Ans.) 3
Ques. : 111 Which of the following is used to insure the high quality of computer output?
1) computer output microfilm
2) output controls
3) voice output systems
4) liquid crystal display
5) None of the above
Ans.) 2
Ques. : 112 The software used to convert source program instructions to object instruction
is known as
1) Compiler
2) Assembler
3) Interpreter
4) Language processor
5) None of the above
Ans.) 4
Ques. : 113 Off-line operation is the operation of devices without the control of
1) Memory
2) CPU
3) ALU
4) Control unit
5) None of the above
Ans.) 2
Ques. : 114 What is meant by a dedicated computer?
1) Which is used by one person only 2) Which is assigned one and only one task
3) Which uses on kind of software 4) Which is meant for application software only
5) None of the above
Ans.) 2
Ques. : 115 Which of the following is the user programmed semiconductor memory?
1) SRAM
2) DRAM
3) EPROM
4) All of the above
5) None of the above
Ans.) 3
Ques. : 116 A _____ is simply an arrangement where multiple disk drives appear as a
single disk drive to the user.
1) disk
2) disk array
3) bunch of disks
4) disk pack
5) spanned drive
Ans.) 2
Ques. : 117 In comparison with static RAM memory, the dynamic RAM memory has
1) lower bit density and higher power
2) higher bit density and higher power
consumption
3) lower bit density and lower power
consumption
5) None of the above
consumption
4) higher bit density and lower power
consumption
Ans.) 4
Ques. : 118 Which of the following holds data and processing instructions temporarily
until the CPU needs it?
1) ROM
2) control unit
3) main memory
4) coprocessor chips
5) None of the above
Ans.) 3
Ques. : 119 A multi programming system is one that can
2) share hardware resources with many programs
1) run very fast
simultaneously
3) compute many programs
4) use many operating systems
simultaneously
5) None of the above
Ans.) 2
Ques. : 120 The language that is an input for statement translation is called
1) Assembly language
2) Source language
3) High-level language
4) Object language
5) None of the above
Ans.) 2
Ques. : 121 A high speed device used in CPU for temporary storage during processing is
called
1) A register
2) A bus
3) A databus
4) All of the above
5) None of the above
Ans.) 1
Ques. : 122 Computers are extremely fast and have fantastic memories. However, the
only thing they can remember is
1) Instruction
2) Series of 1s and 0s
3) Boolean algebra
4) Logic theorems
5) None of the above
Ans.) 2
Ques. : 123 The first electronic digital computer contained?
1) Electronic valves
2) Vacuum tubes
3) Transistors
5) None of the above
4) Semiconductor memory
Ans.) 1
Ques. : 124 Name the two persons who were the first to develop a model of the
microprocessor chip.
1) Marcian Ted Hoff
2) Victor Poor
3) Harry pyle
4) Both (b) and (c)
5) None of the above
Ans.) 4
Ques. : 125 Who is credited with the idea of using punch cards to control patterns in a
weaving machine?
1) Pascal
2) Hollerith
3) Babbage
4) Jackquard
5) None of the above
Ans.) 4
Ques. : 126 What is the name of the computer which was first used for programming and
playing of music?
1) ELLIAC
2) ENIAC
3) UNIVAC
4) All of the above
5) None of the above
Ans.) 1
Ques. : 127 The access method used for cassette tape is
1) Direct
2) Random
3) Sequential
4) All of the above
5) None of the above
Ans.) 3
Ques. : 128 The arranging of data in a logical sequence is called:
1) sorting
2) classifying
3) reproducing
4) summarizing
5) None of the above
Ans.) 1
Ques. : 129 Who is the creator of the PASCAL language?
1) Niklaus Writh
2) Dijkstra
3) Donald Knuth
4) Basic Pascal
5) None of the above
Ans.) 1
3) hardcopy terminal
5) None of the above
Ques. : 137 What is the main advantage of magnetic core memory over semiconductor
RAM memory?
1) more compact and smaller
2) more economical
3) a bit does not have to write after reading
4) non volatile
5) None of the above
Ans.) 4
Ques. : 138 Which of the following is used for serial access storage only?
1) RAM
2) Magnetic tape
3) Magnetic disk
4) Core memory
5) None of the above
Ans.) 2
Ques. : 139 A memory space used for the temporary storage of data is
1) PROM
2) SAM
3) Scratchpad storage
4) Buffer
5) None of the above
Ans.) 3
Ques. : 140 What is the name of the logic circuit which can add two binary digits?
1) Full adder
2) Half adder
3) Buffer
4) Register
5) None of the above
Ans.) 2
Ques. : 141 Which type of display is the latest to be used for portable computer?
1) LED display
2) LCD display
3) Plasma display
4) Electroluminescent display
5) None of the above
Ans.) 4
Ques. : 142 Which of the following is not true of future computers?
1) increased use of CAD/CAM techniques 2) faster turnaround time
3) developments in artificial intelligence 4) development of products more suitable for
systems
human use
5) All of the above are true
Ans.) 5
Ques. : 143 The EAM device that does not use a control panel is the:
1) collator
3) interpreter
5) None of the above
2) reproducer
4) sorter
Ans.) 4
Ans.) 3
Ques. : 150 What was the name of the first stored program electronic computer which
was built in 1949 at Cambridge University in England?
1) EDVAC
2) EDSAC
3) UNIVAC
4) MARK-I
5) None of the above
Ans.) 2
Ques. : 151 Before a disk drive can access any sector record, a computer program has to
provide the record's disk address. What information does this address specify?
1) Track number
2) Sector number
3) Surface number
4) All of the above
5) None of the above
Ans.) 4
Ques. : 152 Computers are extremely fast and have fantastic memories. However, the
only thing they can remember is
1) Instruction
2) Series of 1s and 0s
3) Boolean algebra
4) Logic theorems
5) None of the above
Ans.) 2
Ques. : 153 The first electronic digital computer contained?
1) Electronic valves
2) Vacuum tubes
3) Transistors
4) Semiconductor memory
5) None of the above
Ans.) 1
Ques. : 154 Communication that involves computers, establishing a link through the
telephone system is called
1) Teleprocessing
2) Microprocessing
3) Telecommunications
4) All of the above
5) None of the above
Ans.) 3
Ques. : 155 Which kind of devices allows the user to add components and capabilities to a
computer system?
1) System boards
2) Storage devices
3) Input devices
4) Output devices
5) Expansion slots
Ans.) 5
Ans.) 3
3) I/O Unit
5) None of the above
4) Disks
Ans.) 1
Ques. : 171 The Josephson tunneling device illustrates principles associated with the
advanced storage technique:
1) cryogenics
2) CCD
3) EBAM
4) holographing
5) None of the above
Ans.) 1
Ques. : 172 A floppy disk contains
1) Circular tracks only
2) Sectors only
3) Both circular tracks and sector 4) All of the above
5) None of the above
Ans.) 3
Ques. : 173 What is the general name of the device which produces hardcopy graphics?
1) COM
2) Plotter
3) Printer
4) Microfilm
5) None of the above
Ans.) 2
Ques. : 174 The ALU of a computer responds to the commands coming from
1) primary memory
2) control section
3) external memory
4) cache memory
5) None of the above
Ans.) 2
Ques. : 175 The heart of any computer is the
1) CPU
2) Memory
3) I/O Unit
4) Disks
5) None of the above
Ans.) 1
Ques. : 176 What is the name of the temporary data storage area between a peripheral
device and the CPU which compensates for the difference between their speeds?
1) Backing storage
2) Buffer
3) Main storage
4) Temporary storage
5) None of the above
Ans.) 2
Ques. : 177 Which of the following is the fastest?
1) CPU
2) magnetic tapes and disks
3) video terminal
4) sensors, mechanical controllers
5) None of the above Ans.) 1
Ques. : 178 The invention of the slide rule is attributed to
1) Babbage
2) Oughtred
3) Pascal
4) Napier
5) None of the above
Ans.) 2
Ques. : 179 The control unit of a microprocessor
1) stores data in the memory
2) accepts input data from a keyboard
3) Performs arithmetic / logic / functions 4) All of the above
5) None of the above
Ans.) 5
Ques. : 180 A flat-bed plotter uses a pen which moves in two directions across a piece of
paper fixed on a flat-bed. Can you tell who controls the movements of this pen?
1) microfilm
2) microfiche
3) film card
4) COM
5) None of the above
Ans.) 3
Ques. : 181 Communication ports are found on the back of microcomputers. They are
used to connect the computer to _____
1) printers
2) modems
3) other hardware
4) All of the above
5) None of the above
Ans.) 4
Ques. : 182 Which is considered a direct entry input device?
1) Optical scanner
2) Mouse
3) Light pen
4) Digitizer
5) All of the above
Ans.) 5
Ques. : 201 When the time to establish link is large and the size of data is small, the
preferred mode of data transfer is
1) Circuit switching
2) Packet switching
3) Time division multiplexing
4) All of the above
5) None of the above
Ans.) 2
Ques. : 202 Group of instructions that directs a computer is called
1) Storage
2) Memory
3) Logic
4) Program
5) None of the above
Ans.) 4
Ques. : 203 A computer-controlled device for training exercises that duplicates the work
environment is a:
1) simulator
2) duplicator
3) trainer
4) COM device
5) None of the above
Ans.) 1
Ques. : 204 Which of the following is not an output device of a computer?
1) Printer
2) keyboard
3) VDU
4) CRT screen
5) All of the above
Ans.) 2
Ques. : 205 Which of the following terms could be used to describe the concurrent
processing of computer programs, via CRTs, on one computer system?
1) Time-sharing
2) Online processing
3) Interactive processing
4) All the above processing
5) None of the above
Ans.) 4
Ques. : 206 A typical modern computer uses
1) LSI chips
2) Vacuum tubes
3) Valves
4) All the above
5) None of the above
Ans.) 1
Ques. : 207 A 'number crunching' computer is one that can handle
1) large spreadsheets
2) large alphanumeric data
3) large volume of numbers
4) only numbers
Ans.) 3
Ques. : 208 The barcode which is used on all types of items, is read by a scanning device
directly into the computer. What is the name of this scanning device?
1) Laser scanner
2) Wand
3) OCR
4) MICR
5) None of the above
Ans.) 1
Ques. : 209 A processing unit that coordinates networks and data communication is
known as
1) Control unit
2) Communications processor
3) Register unit
4) CPU
5) None of the above
Ans.) 2
Ques. : 210 A type of line printer that uses an embossed steel band to form the letters
printed on the paper is
1) Golf ball printer
2) Dot-matrix printer
3) Laser printer
4) Band printer
5) None of the above
Ans.) 4
Ques. : 211 Ethernet uses
1) Bus topology
2) Ring topology
3) Star topology
4) Tree topology
5) None of the above Ans.) 1
Ques. : 212 What is the latest write-once optical storage media?
1) Digital paper
2) Magneto-optical disk
3) WORM disk
4) CD-ROM disk
5) None of the above
Ans.) 1
Ques. : 213 The data processing job expected to further decrease in the 1996s is that of:
1) Keypuncher
2) Data entry clerk
3) Computer operator
4) Programmer
5) None of the above
Ans.) 1
Ques. : 214 A computer has no more sense than a light
1) bulb
3) switch
5) None of the above
2) pen
4) pad
Ans.) 3
Ques. : 215 A computer program that converts an entire program into machine language
at one time is called a/an
1) interpreter
2) simulator
3) compiler
4) commander
5) None of the above
Ans.) 3
Ques. : 216 What is the name of the storage device which is used to compensate for the
difference in rates of flow of data from once device to another?
1) Cache
2) Concentrator
3) Buffer
4) I/O device
5) None of the above
Ans.) 3
Ques. : 217 Program execution time would be minimum if the programs are written in
1) Machine Language
2) Assembly language
3) High level language
4) All of the above
5) None of the above
Ans.) 1
Ques. : 218 The processing capability of a microcomputer can be enhanced with the help
of
1) addition processor
2) expansion cards
3) secondary memory
4) buffer memory
5) None of the above
Ans.) 2
Ques. : 219 A menu-driven operating system is one which allows you to pick up from the
menu of choices it displays on the screen. What is the name given to the images which are
used in such image oriented menus?
1) Icon
2) Figure
3) Symbol
4) option
5) None of the above
Ans.) 1
Ques. : 220 The first machine to successfully perform a long series of arithmetic and
logical operations was:
1) ENIAC
2) Mark I
3) Analytic engine
5) None of the above
4) UNIVAC-I
Ans.) 2
1) Star Wars
3) Forbidden Planet
5) None of the above
2) Tron
4) Dark Star
Ans.) 2
activities
5) None of the above
Ans.) 4
Ques. : 241 Which of the following converts assembly language to machine language?
1) Bridge
2) Interpreter
3) Assembler
4) Compiler
5) None of these
Ans.) 3
Ques. : 242 While obtaining a record from a cassette tape, the access method used is
1) Random
2) Sequential
3) Direct
4) Indirect
5) None of these
Ans.) 2
Ques. : 243 At which of the following layers, congestion control takes place?
1) Transport Layer
2) Network Layer
3) Application Layer
4) Data Link Layer
5) None of these
Ans.) 2
Ques. : 244 What is the full form of OLE?
1) Object Linking and Embedding 2) Object Linking and Encrypting
3) Object Linking and Extracting 4) Object Linking and Enmeshing
5) None of these
Ans.) 1
Ques. : 245 Internet based communication was used for which of the following purposes
for the first time?
1) Commercial communication
2) Military purposes
3) Personal interaction
4) Political campaigns
5) None of these
Ans.) 2
Ques. : 246 The main folder on a storage device is called
1) root directory
2) platform
3) home page
4) interface
5) None of these
Ans.) 1
Ques. : 247 Which among the following keys is NOT present on the number keypad?
1) Delete
3) Enter
5) Insert
2) Ctrl
4) Num Lock
Ans.) 2
1) Monitoring
3) Copying
5) None of these
2) Deleting
4) Moving
Ans.) 1
1) word
3) powerpoint
5) None of these
2) access
4) excel
Ans.) 3
Ques. : 281 Which of the following programs is not a popular desktop publishing
program?
1) Adobe PageMaker
2) Microsoft Publisher
3) Lotus AmiPro
4) QuarkXPress
5) None of these
Ans.) 3
Ques. : 282 Which of the following is not an example of a virus?
1) Polymorphic
2) Logic Bombs
3) Worms
4) Tartan
5) Trojan
Ans.) 4
Ques. : 283 Timing and Control unit is a part of a(an)
1) ALU
2) Processor
3) Memory
4) CMOS
5) BIOS
Ans.) 2
Ques. : 284 AVERAGE is an example of a
1) formula
2) function
3) field
4) table
5) None of these
Ans.) 1
Ques. : 285 Performing a what-if analysis is most commonly accomplished using
________ software.
1) spreadsheet
2) database
3) presentation
4) PIM
5) None of these
Ans.) 1
Ques. : 286 ________ are specially designed computer chips that reside inside other
devices such as your car or your electronic thermostat.
1) Servers
2) Embedded computers
3) Robotic computers
4) Mainframes
5) None of these
Ans.) 2
Ques. : 287 Which of the following describes database fields?
1) Structures
2) Field markers
3) Field definition
4) Field names
5) None of these
Ans.) 4
1) arithmetic
3) objects
5) None of these
2) procedures
4) rules
Ans.) 2
Ques. : 315 A file extension is separated from the main file name with a(n) ________, but
no spaces.
1) question mark
2) exclamation mark
3) underscore
4) period
5) None of these
Ans.) 4
Ques. : 316 An ad hoc query is a ________.
1) pre-planned question
2) pre-scheduled question
3) spur-of-the-moment question 4) question that will not return any results
5) None of these
Ans.) 3
Ques. : 317 A Web ________ consists of one or more Web pages located on a Web
server.
1) hub
2) site
3) story
4) template
5) None of these
Ans.) 2
Ques. : 318 A computer ________ is a set of program instructions that can attach itself to
a file, reproduce itself, and spread to other files.
1) worm
2) virus
3) trojan horse
4) phishing scam
5) None of these
Ans.) 2
Ques. : 319 The desktop contains small graphics called ________.
1) windows
2) logos
3) icons
4) pictures
5) None of these
Ans.) 3
Ques. : 320 C, BASIC, COBOL, and Java are examples of ________ languages.
1) low-level
2) computer
3) system programming
4) high-level
5) None of these
Ans.) 4
Ques. : 321 A(n) ________ camera is a peripheral device used to capture still images in a
digital format that can be easily transferred into a computer and manipulated using graphics
software.
1) digital
2) analog
3) classic
4) film
5) None of these
Ans.) 1
Ques. : 322 ________ makes it possible for shoppers to make purchases using their
computers.
1) E-world
2) E-govt
3) E-spend
4) E-business
5) None of these
Ans.) 4
Ques. : 323 Networks are monitored by security personnel and supervised by ________
who set(s) up accounts and passwords for authorized network users.
1) IT managers
2) the government
3) network administrators
4) password administrators
5) None of these
Ans.) 3
Ques. : 324 A telephone number, a birth date, and a customer name are all examples of
1) a record
2) data
3) a file
4) a database
5) None of these
Ans.) 1
Ques. : 325 The human-readable version of a program is called ________.
1) source code
2) program code
3) human code
4) system code
5) None of these
Ans.) 1
Ques. : 345 In an information system, alphanumeric data normally takes the form of
1) Sentences and paragraphs
2) Numbers and alphabetical characters
3) Graphic shapes and figures
4) Human voice and other sounds
5) None of these
Ans.) 2
Ques. : 346 A Web sites main page is called its ________.
1) home page
2) browser page
3) search place
4) bookmark
5) None of these
Ans.) 1
Ques. : 347 When installing ________, the user must copy and usually decompress
program files from a CD-ROM or other medium to the hard disk.
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these
Ans.) 4
Ques. : 348 A collection of interrelated files in a computer is a ________.
1) file manager
2) field
3) record
4) database
5) None of these
Ans.) 4
Ques. : 349 A ________ computer is a large and expensive computer capable of
simultaneously processing data for hundreds or thousands of users
1) server
2) mainframe
3) desktop
4) tablet
5) None of these
Ans.) 2
Ques. : 350 The trend in computer systems is toward the use of graphical user interfaces
(GUIs). In these operating systems, a track ball is described as ________.
1) a roller ball which moves the
2) a pen-shaped device which allows data to be
cursor
entered through the CRT screen
3) a figure which resembles a
4) an outdated input device
familiar office device
5) None of these
Ans.) 1
Ques. : 351 Various applications and documents are represented on the Windows desktop
by
1) Symbols
3) Graphs
5) None of these
2) Labels
4) Icons
Ans.) 4
Ques. : 352 What is usually used for displaying information at public places?
1) Monitors
2) Overhead Projections
3) Monitors and Overhead Projections
4) Touch Screen Kiosks
5) None of these
Ans.) 3
Ques. : 353 The real business and competitive value of information technology lies in
2) The capabilities of the software and
1) The software applications that are used by
value of the information a business
many companies
acquires and uses
3) The infrastructure of hardware, networks, and 4) The capabilities of the hardware and
other IT facilities that are commonly used by
the speed at which it processes
many companies
information
5) None of these
Ans.) 2
Ques. : 354 Companies use which of the following vendors to provide access to software
and services rather than purchasing the applications and maintaining the applications
themselves?
1) Open source vendors
2) Alliances
3) Application service providers
4) All of the above
5) None of these
Ans.) 3
Ques. : 355 Which one of the following would be considered as a way that a computer
virus can enter a computer system?
1) Opening an application previously installed on the
2) Borrowed copies of
computer
software
3) Viewing a website without causing any additional
4) Running antivirus programs
transactions
5) None of these
Ans.) 3
Ques. : 356 Collecting personal information and effectively posing as another individual
is known as the crime of ________.
1) spooling
2) identity theft
3) spoofing
5) None of these
4) hacking
Ans.) 3
Ques. : 357 The first step in the transaction processing cycle is ________.
1) database operations
2) audit
3) data entry
4) user inquiry
5) None of these
Ans.) 3
Ques. : 358 In the information systems concept, the output function involves
1) Capturing and assembling elements that 2) Transformation processes that convert input
enter the system to be processed
into output
3) Transferring elements that have been
4) Monitoring and evaluating feedback to
produced by a transformation process to
determine whether a system is moving toward
their ultimate destination
the achievement of its goal
5) None of these
Ans.) 3
Ques. : 359 The main function of a CPU is to
1) carry out program instructions 2) store data/information for future use
3) process data and information 4) Both 1) and 3)
5) None of these
Ans.) 4
Ques. : 360 A repair for a known software bug, usually available at no charge on the
Internet, is called a(n)
1) version
2) patch
3) tutorial
4) FAQ
5) None of these
Ans.) 2
Ques. : 361 In DOS, which of the following commands is used to delete all the files as
well as sub-directories of a directory?
1) Delete
2) Del
3) Deltree
4) Move
5) None of these
Ans.) 1
Ques. : 362 In programming, you use the following keys:
1) Arrow keys
2) Function keys
3) Alpha keys
4) Page up and Page Down keys
5) None of these
Ans.) 2
Ques. : 363 A Website address is a unique name that identifies a specific ______ on the
Web.
1) Web browser
2) Website
3) PDA
4) link
5) None of these
Ans.) 4
Ques. : 364 A disks content that is recorded at the time of manufacture and that cannot
be changed or erased by the user is
1) read-only
2) memory - only
3) run-only
4) write-only
5) None of these
Ans.) 1
Ques. : 365 If you are going to a site you use often, instead of having to type in the
address every time, you should
1) save it as a file
2) make a copy of it
3) bookmark it
4) delete it
5) None of these
Ans.) 3
Ques. : 366 Two different files can have the same name if
1) they are in different folders 2) they have same content
3) Never
4) they have different content
5) None of these
Ans.) 1
Ques. : 367 The central processing unit contains which of the following as a component?
1) Main Memory
2) Flow Control Unit
3) Arithmetic Logic Unit
4) Instruction Manipulation Unit
5) None of these
Ans.) 3
Ques. : 368 An ad hoc query is a
1) pre-planned question
2) pre-scheduled question
3) spur-of-the - moment question 4) question that will not return any results
5) None of these
Ans.) 3
Ques. : 369 A (n) ________ camera is a peripheral device used to capture still images in a
digital format that can be easily transferred into a computer and manipulated using graphics
software.
1) digital
2) analog
3) classic
4) film
5) None of these
Ans.) 1
Ques. : 370 In a spreadsheet, a cell is defined as the
1) intersection of a table and a tuplet 2) intersection of a table and a database
3) intersection of a row and a column 4) intersection of a field and a record
5) None of these
Ans.) 3
Ques. : 371 What is the process of copying software programs from secondary storage
media to the hard disk called?
1) configuration
2) download
3) storage
4) upload
5) installation
Ans.) 3
Ques. : 372 The effect of the ROLLBACK command in a transaction is the following:
1) Undo all changes to the database resulting from 2) Unto the effects of the last
the execution of the transaction
UPDATE command
3) Restore the content of the database to its state at 4) Make sure that all changes to the
the end of the previous day
database are in effect
5) None of these
Ans.) 1
Ques. : 373 The motherboard is the
1) circuit board that houses peripheral devices
only
3) the first chip that is accessed when the
computer is turned on
5) None of these
Ques. : 374 ___________ represents raw facts whereas ____is data made meaningful.
1) Information, reporting
2) Data, information
3) Information, bits
4) Records, bytes
5) Bits, bytes
Ans.) 2
Ques. : 375 SMPT, FTP and DNS are applications of the ________ layer.
1) Data link
2) Network
3) Transport
4) Application
5) None of these
Ans.) 4
Ques. : 376 A CPU contains
1) a card reader and a printing device
2) an analytical engine and a control unit
3) a control unit and an arithmetic logic unit 4) an arithmetic logic unit and a card reader
5) None of these
Ans.) 3
Ques. : 377 Which of the following is true?
1) Byte is a single digit in a binary number
3) An eight - digit binary number is called a
byte.
5) None of these
Ques. : 386 _________ helps in capturing row data and entering into computer system.
1) CPU
2) Integrated circuit
3) Input device
4) Motherboard
5) None of these
Ans.) 3
Ques. : 387 Which of the following is not the function of the control unit?
1) Read instructions
2) Execute instructions
3) Interpret instructions
4) Direct operations
5) None of these
Ans.) 4
5) None of these
Ans.) 3
Ques. : 395 Which one of the following is NOT a/an image/graphic file format?
1) PNG
2) GIF
3) BMP
4) GUI
5) None of these
Ans.) 4
Ques. : 396 What is the full form of URL?
1) Uniform Resource Locator 2) Uniform Resource Link
3) Uniform Registered Link 4) Unified Resource Link
5) None of these
Ans.) 1
Ques. : 397 In a computer system, RAM is located on
1) Expansion Board
2) External Drive
3) Mother Board
4) Hard drive
5) None of these
Ans.) 3
Ques. : 398 The first generation of computers had
1) Vaccum Tubes and Magnetic Drum 2) Integrated Circuits
3) Magnetic Tape and Transistors
4) All of above
5) None of these
Ans.) 1
Ques. : 399 Assembly language is a
1) Low-level programming language 2) High-level programming language
3) Machine language
4) All of the above
5) None of these
Ans.) 1
Ques. : 400 Data is stored in computer in ______form.
1) decimal
2) binary
3) hexadecimal
4) octal
5) None of these
Ans.) 2
Ques. : 401 ctrl, shift and alt are called __________ keys.
1) adjustment
2) function
3) modifier
4) alphanumeric
5) None of these
Ans.) 3
Ques. : 402 To make the number pad act as directional arrows, you press the __________
key.
1) num lock
2) caps lock
3) arrow lock
4) shift
5) None of these
Ans.) 1
Ques. : 403 The modern keyboard typically has __________ Function keys.
1) 10
2) 12
3) 14
4) 16
5) None of these
Ans.) 2
Ques. : 404 To move to the beginning of a line of text, press the __________ key.
1) page down
2) page up
3) enter
4) home
5) None of these
Ans.) 4
Ques. : 405 The __________ determines how long you must hold down an alphanumeric
key before the keyboard will repeat the character.
1) strike rate
2) repeat rate
3) default rate
4) threshold rate
5) None of these
Ans.) 2
Ques. : 406 The traditional mechanical mouse uses a __________ to track the pointer
position on the screen.
1) light sensor
2) wheel
3) ball
4) ruler
5) None of these
Ans.) 3
Ques. : 407 To access properties of an object, the mouse technique to use is __________.
1) dragging
2) dropping
3) right-clicking
4) shift-clicking
5) None of these
Ans.) 3
Ques. : 408 The __________ key will launch the Start button.
1) esc
3) Windows
5) None of these
2) shift
4) Shortcut
Ans.) 3
Ques. : 422 Which of the following is the most powerful type of the computer?
1) Mainframe
2) Minicomputer
3) Microcomputer
4) Supercomputer
5) None of these
Ans.) 4
Ques. : 423 Software instruction intended to satisfy a users specific processing needs are
called
1) system software
2) process software
3) documentation
4) application software
5) None of these
Ans.) 4
Ques. : 424 The computer device primarily used to provide hardcopy is the
1) CRT
2) printer
3) computer console
4) card reader
5) None of these
Ans.) 2
Ques. : 425 Which one of the following can produce the final product of machine
processing in a form usable by humans?
1) Storage
2) Control
3) Input device
4) Output device
5) None of these
Ans.) 4
Ques. : 426 Secondary storage device is needed to?
1) Perform arithmetic and logical
2) Store small volume of data
operations
4) Store large volume of data that exceed the capacity
3) Print output result
of main memory
5) None of these
Ans.) 4
Ques. : 427 In which one of the following types of disk, the read-write head physically
contacts the surface of disk while recording?
1) Optical disk
2) Floppy disk
3) Hard disk
4) CD Rom
5) None of these
Ans.) 2
Ques. : 428 The term 'memory' applies to which one of the following
1) logic
2) storage
3) input device
4) output device
5) None of these
Ans.) 2
Ques. : 429 A program written in machine language is called _______program.
1) object
2) computer
3) assembler
4) high level
5) None of these
Ans.) 1
Ques. : 430 A source program is the program written in ________language.
1) English
2) symbolic
3) high level
4) object
5) None of these
Ans.) 3
Ques. : 431 The input device used to get a printed diagram into the computer is
1) printer
2) mouse
3) keyboard
4) scanner
5) None of these
Ans.) 4
Ques. : 432 What type of device is a computer mouse?
1) Output
2) Input
3) Storage
4) It is a software
5) None of these
Ans.) 2
Ques. : 433 Any component of the computer you can see and touch is called
1) Software
2) Peripheral
3) Storage
4) CPU
5) Hardware
Ans.) 5
Ques. : 434 What is the value of binary number 101?
1) 3
2) 5
3) 6
4) 101
5) 9
Ans.) 2
Ques. : 442 Which of th following devices is considered both input and putput device?
1) Scanner
2) Monitor
3) Printer
4) Modem
5) None of these
Ans.) 4
Ques. : 443 RAM is a volatile memory because
1) it does not require continuous power
2) for retaining data it requires continuous
supply
power supply
3) from it any of the locations can be
4) it can be used both for reading and writing
accessed directly
5) None of these
Ans.) 2
Ques. : 444 All of the following terms are related with spreadsheet software except
1) formula
2) worksheet
3) Cell
4) virus detection
5) None of these
Ans.) 4
Ques. : 445 What is the name of the program that controls the computer?
1) Application software
2) Operating system
3) Browser
4) Compiler
5) None of these
Ans.) 2
Ques. : 446 The instructions that tell a computer how to carry out the processing tasks are
referred to as computer
1) program
2) processor
3) input device
4) memory modules
5) None of these
Ans.) 1
Ques. : 447 RAM can be thought of as the ____________for the computer's processor.
1) factory
2) waiting room
3) operating room
4) planning room
5) None of these
Ans.) 2
Ques. : 448 An area of computer that temporarily holds data waiting to be processed is
1) CPU
2) Memory
3) Storage
4) File
5) None of these
Ans.) 2
Ques. : 449 An e-mail account includes a storage area, often called a(n)
1) attachment
2) mailbox
3) hypertext
4) IP address
5) None of these
Ans.) 2
Ques. : 450 ________is the ability of a device to jump directly to the requested data.
1) Sequential access
2) Random access
3) Quick access
4) All the above
5) None of these
Ans.) 2
Ques. : 451 ________is collection of web-pages and _________is the very first page that
we see on opening of a web-site.
1) Home page, web page
2) Web page, home page
3) Website, home page
4) Web page, web site
5) None of these
Ans.) 2
Ques. : 452 Which of the following devices runs on Physical layer of the OSI model?
1) Repeater
2) Bridge
3) Router
4) All the above
5) None of these
Ans.) 1
Ques. : 453 Which of the following computer languages is a mathematically oriented
language used for scientific problems?
1) FORTRAN
2) COBOL
3) LISP
4) PROLONG
5) None of these
Ans.) 1
Ques. : 454 Which of the following types of table constraints will prevent the entry of
duplocate rows?
1) Primary key
2) Unique
3) Null
4) Foreign key
5) None of these
Ans.) 2
Ques. : 455 Which of the following type of switching uses the entire capacity of a
dedicated link?
1) Circuit switching
3) Datagram Packet Switching
5) None of these
Ques. : 456 A computer checks the __________ of user names and passworlds for a
match before granting access.
1) website
2) network
3) output device
4) database
5) None of these
Ans.) 4
Ques. : 457 Conputers that are portable and convenient for users who travel are known as
1) supercomputers
2) laptops
3) minicomputers
4) file servers
5) None of these
Ans.) 2
Ques. : 458 What is the term used for unsolicited e-mail?
1) newsgroup
2) usenet
3) backbone
4) spam
5) None of these
Ans.) 4
Ques. : 459 The first computers were programmed using
1) assembly language
2) machine language
3) source code
4) object code
5) None of these
Ans.) 2
Ques. : 460 When the pointer is positioned on a ___________, it is shaped like a hand.
1) grammar error
2) hyperlink
3) formatting error
4) spelling error
5) None of these
Ans.) 2
Ques. : 461 Manipulating data to create information is known as
1) Feedback
2) Programming
3) Processing
4) Analysis
5) None of these
Ans.) 3
___________in document.
1) full justification
3) left justification
5) None of these
2) full alignment
4) right justification
Ans.) 1
3) execute
5) None of these
4) peripheral
Ans.) 4
Ques. : 475 All of the following are examples of real security and privacy risks except
1) Hackers
2) Spam
3) Viruses
4) Identity thept
5) None of these
Ans.) 2
Ques. : 476 ________means to enlarge a window to its maximum area so that it will fill
entire desktop.
1) Maximise
2) Zoom
3) Enlarge
4) Extend
5) None of these
Ans.) 1
Ques. : 477 This is the processn of getting access to the computer.
1) Sign up
2) Log in
3) Log off
4) Enter
5) None of these
Ans.) 2
Ques. : 478 The full step wise process of closing a computer is called ___________.
1) Hibernating
2) Closing
3) Log off
4) Shut down
5) None of these
Ans.) 4
Ques. : 479 It is the smallest dot that can be uniquely drawn on a computer screen. This is
1) Boxel
2) Computer dot
3) Cursor
4) Pixel
5) None of these
Ans.) 4
Ques. : 480 A picture, map or graphics or image that can be used in a document is known
as
1) Hypertext
2) Clipboard
3) Object
4) Drag drop
5) None of these
Ans.) 3
Ques. : 481 Screen that comes on when you turn on your computer that shows all the
icons is
1) desktop
3) viewer
5) None of these
2) face to face
4) view space
Ans.) 1
Ques. : 482 A file that contains definitions of the paragraph and character styles for your
document and all things you customised like toolbars and menus is called a
1) guide
2) pattern
3) base document
4) template
5) None of these
Ans.) 4
Ques. : 483 What is the name for the porcess that is used to convert a series of
instructions, or programs, written in high-level language into instructions (or a program)
that can be run on a computer?
1) Assembling
2) Compiling
3) Translating
4) Uploading
5) None of these
Ans.) 2
Ques. : 484 _______are often delivered to a PC through an email attachment and are
often designed to do harm.
1) Viruses
2) Spam
3) Portals
4) Email messages
5) None of these
Ans.) 1
Ques. : 485 You click on symbol 'B' to make selected text
1) italics
2) underlined
3) italics and underlined
4) bold
5) None of these
Ans.) 4
Ques. : 486 Which of the following groups consist of only input devices?
1) Mouse, Keyboard, Monitor
2) Mouse, Keyboard, Printer
3) Mouse, Keyboard, Plotter
4) Mouse, Keyboard, Scanner
5) None of these
Ans.) 4
Ques. : 487 In Windows, by default the files when deleted are sent to
1) dustbin
2) recycle bin
3) waster bin
5) None of these
Ques. : 488 To indent the first paragraph of your report, your should use the key
1) space bar
2) return key
3) tab key
4) shift key
5) None of these
Ans.) 3
Ques. : 489 Which of the following is the communication protocol that sets the standard
used by every computer that accesses Web-based information?
1) XML
2) DML
3) HTTP
4) HTML
5) None of these
Ans.) 3
Ques. : 490 Which of the following is NOT a form of biometrics?
1) Fingerprint
2) Password
3) Retina scan
4) Breath scan
5) None of these
Ans.) 2
Ques. : 491 _________shows all the websites and pages that you have visited over a
period of time.
1) status bar
2) task bar
3) history list
4) toolbar
5) None of these
Ans.) 3
Ques. : 492 _______ is the set of computer programs that runs or controls computer
hardware and acts as an interface with application programs and users.
1) Object code
2) A compiler
3) An operating system
4) The CPU
5) None of these
Ans.) 3
Ques. : 493 Passwords enable users to
1) get into the system quickly 2) make efficient use of time
3) retain confidentiality of files 4) simplify file structures
5) None of these
Ans.) 3
5) None of these
Ans.) 1
3) Bank balance
5) None of these
Ques. : 508 Coded entries which are used to gain access to a computer system are called
1) entry code
2) Password
3) Security commands
4) codewords
5) None of these
Ans.) 2
Ques. : 509 To move to the bottom of a document, press
1) insert key
2) home key
3) ctrl + end
4) end key
5) None of these
Ans.) 3
Ques. : 510 A device that is connected to the motherboard is called a(n)
1) external device
2) adjunct device
3) peripheral device
4) access device
5) None of these
Ans.) 3
Ques. : 511 To insert a copy of the clipboard contents, whatever was last cut or copieed at
the insertion point.
1) paste
2) stick in
3) fit in
4) push in
5) None of these
Ans.) 1
Ques. : 512 The collection of interrelated files in a computer is a
1) file manager
2) field
3) record
4) database
5) None of these
Ans.) 4
Ques. : 513 The command used to remove text or graphics form a document through
which the removed items are stored on clipboard.
1) chop
2) cut
3) clip
4) cart away
5) None of these
Ans.) 2
Ques. : 514 To exit the program without leaving the application
1) file
3) copy
5) None of these
2) edit
4) close
Ans.) 4
1) Ctrl+Alt+Del
3) Ctrl+Shift+Del
5) None of these
2) Ctrl+Shift+Del
4) Ctrl+Alt+Shift
Ans.) 1
5) None of these
Ans.) 2
1) CGI
3) Draw
5) None of these
2) Paint
4) CAD
Ans.) 4
Ques. : 542 The term worksheet is associated with which of the following programs?
1) MS Word
2) MS Excel
3) MS Power Point
4) Page Maker
5) None of these
Ans.) 2
Ques. : 543 The primary memory of the computer system is also known as
1) ROM
2) RAM
3) firmware
4) BIOS
5) None of these
Ans.) 2
Ques. : 544 An assembly language is a division of
1) Middle level language 2) High level language
3) Low level language
4) Machine language
5) None of these
Ans.) 3
Ques. : 545 DNS is extremely important for the correct functioning of the Internet as it
2) maps symbolic names for machines onto their IP
1) encrypts data
address
3) translates message into machine
4) All the above
language
5) None of these
Ans.) 2
Ques. : 546 Which of the following is NOT a part of the operating system?
1) Performance monitor
2) Supervisor
3) Job-control program
4) I/O control program
5) None of these
Ans.) 1
Ques. : 547 The power of spreadsheet lied in its
1) cells
2) formulas
3) labels
4) worksheet
5) None of these
Ans.) 2
Ques. : 569 Which type of resource does have greater probability to become shared
resource in a computer network?
1) Printer
2) Speakers
3) Floppy disk drivers
4) Keyboards
5) None of these
Ans.) 1
Ques. : 570 Which of the folloiwng terms is used to describe to movement of an item with
the help of mouse to a new position on screen?
1) Click
2) Double click
3) Drag and drop
4) Point
5) None of these
Ans.) 3
Ques. : 571 ______are distinct items that don't have much meaning to you in a given
context.
1) Fields
2) Data
3) Queries
4) Properties
5) None of these
Ans.) 2
Ques. : 572 An example of a telecommunication device is a
1) Keyboard
2) Mouse
3) Printer
4) Modem
5) None of these
Ans.) 4
Ques. : 573 Two or more computers connected to each other for sharing information form
a
1) network
2) router
3) server
4) tunnel
5) pipeline
Ans.) 1
Ques. : 574 The benefit of using computers is that
1) Computers are very fast and can store
2) Computers provide accurate output even
huge amounts of data.
when input is incorrect.
3) Computers are designed to be inflexible. 4) All the above
5) None of these
Ans.) 1
Ques. : 575 The __________becomes different shaped depending on the task you are
performing.
1) active tab
2) insertion point
3) mouse pointer
4) ribbon
5) None of these
Ans.) 3
Ques. : 576 A collection of related information sorted and dealt with as a unit is a
1) disk
2) data
3) file
4) floppy
5) None of these
Ans.) 3
Ques. : 577 An output device that lets you see what the computer is doing
1) a disk drive
2) monitor-screen
3) shift key
4) printer
5) None of these
Ans.) 2
Ques. : 578 Bit is short for
1) Binary unit 2) Binary digit
3) Binary system 4) Digital byte
5) None of these Ans.) 2
Ques. : 579 To access a mainframe or supercomputer, users often use a
1) terminal
2) node
3) desktop
4) binary unit
5) None of these
Ans.) 1
Ques. : 580 Firewalls are used to protect against
1) unauthorised attacks 2) virus attacks
3) fire attacks
4) data driven attacks
5) None of these
Ans.) 1
Ques. : 581 The term 'hypertext' means
1) Non-sequential writing 2) Hypermedia
3) Blinking text
4) Text with heavy formatting
5) None of these
Ans.) 2