Académique Documents
Professionnel Documents
Culture Documents
1) RAM is a type of
a) Volatile Memory b) Non-volatile Memory c) Tertiary Memory d) NOTA
Answer
a) Volatile Memory
2) The CPU and the Memory are located on the
a) Expansion Board b) Mother board c) Input device d) Storage device
Answer
b) Mother board
3) POS stands for
a) Prepaid off sale b) Postpaid off sale c) Point of sale d) Place of sale
Answer
c) Point of sale
4) A Dumb Terminal is
a) An embedded microprocessor b) Extensive memory c) independent
processing capability d) keyboard and Screen
Answer
d) All of these
6) The display size of a monitor is measured
a) from center b) diagonally c) vertically d) horizontally
Answer
b) diagonally
both b and c
8) USB stands for
a) Utility Standard Bus b) Universal Serial Bus c) Unique Standard Bus d) User
Serial Bus
Answer
c) Both a and b
11) Processor Speed is affected by
a) System Clock rate b) System Storage rate c) Booting rate d) system run rate
Answer
b) Ctrl + E
d) Only a & c
14) Which of the following functions is not performed by servers?
a) Processing Websites b) Database Sharing c) Storage d) Word Processing e)
Email Processing
Answer
e) Email Processing
15) Which of the following is not a web browser?
a) Mozilla b) IE c) CE d) Opera e) Safari
Answer
c) CE
b) Command Based OS
18) What is the full form of BIOS ?
a) Basic Input Output System b) Broad Input Output System c) Breaking Input
Output system d) NOTA
Answer
b) Ctrl + End
Set-2
1.The internet service that provides a multimedia interface to available
resources is called
(1) FTP
(2) World Wide Web
(3) Telnet
(4) VPN
(5) NOTA
Answer
(2) ROM
(2) Merging
4. Help Menu is available at which button?
(1) End
(2) Start
(3) Turnoff
(4) Restart
(5) Reboot
Answer
(2) Start
5.The electronic switches in the ENIAC were:
(1) integrated circuits
(2) transistors
(3) electro-mechanical switches
(4) vacuum tubes
(5) NOTA
Answer
(1)0
(1) CorelDraw
12.A plotter is
(1) An input device to produce good quality graphics
(2) An output device to produce drawings and graphics
(3) A fast output device using camera lenses
(4) NOTA
Answer
Answer
(3) Bit-byte-field-record-file-database
16. When a computer prints a report, this output is called_____.
(1) Hard copy
(2) soft copy
(3) COM
(4) All of the above
(5) NOTA
Answer
(3) GUID
19. PC cards, flash memory cards, and smart cards are all examples of:
(1) Removable hard disks.
(2) Digital video discs.
(3) Volatile memory devices.
(4) Solid state storage devices.
(5) NOTA
Answer
(1) command
Set 3
1.Junk Email Also Called?
a) Crap
b) Spool
C) Spam
d) Virus
e) none of these
Answer
C) Spam
2. Which one of the following is a correct email address?
a) xyz_gmail.com
b) gmail.com_xyz
c) xyz@gmail.com
d)gmail.com@xyz
e) none of these
Answer
c) xyz@gmail.com
3. Windows is an example of?
a) Single User CUI based OS
b) Single User GUI based OS
c) Multi User CUI based OS
d) Multi User GUI based OS
e) None of these
Answer
c) Scanning Device
d) Both Input-Output Device
e) None of these
Answer
b) Output Device
5. What is the default extension of file created in MS-Word?
a) .txt
b) .jpg
c) .doc
d) .xls
e) .mdb
Answer
c) .doc
6. Google is an example of
a) Social Network
b) Job Portal
c) Search Engine
d) Web Browser
e) None of these
Answer
c) Search Engine
7. What is the main folder on a storage device called?
a) Directory
b) Root Directory
c) Interface
d) Device Driver
e) Main directory
Answer
b) Root Directory
d) software license
9. Operating System is an example of
a) application software
b) system software
c) utility software
d) Compiler
e) None of these
Answer
b) system software
10. When data changes in multiple lists and all lists are not updated,
this causes
a) Data Redundancy
b) information overload
c) duplicate data
d) data consistency
e) data inconsistency
Answer
e) data inconsistency
11. Which of the following is not valid version of MS Office?
A) Office XP
B) Office Vista
C) Office 2007
D) Office 2010
E) None of above
Answer
B) Office Vista
12. The key F12 opens a
A) Save As dialog box
B) Open dialog box
C) Save dialog box
D) Close dialog box
E) None of these
Answer
D) Ctrl + F12
C) Right Indent
18. What is place to the left of horizontal scroll bar?
A) Tab stop buttons
B) View buttons
C) Split buttons
D) Indicators
E) None of above
Answer
B) View buttons
19. Which file starts MS Word?
A) Winword.exe
B) Word.exe
C) Msword.exe
D) Word2003.exe
E) None of these
Answer
A) Winword.exe
20. How many ways you can save a document?
A) 3
B) 4
C) 5
D) 6
E) None of the above
Answer
A) 3
Set- 4
1) Which of the following is an operating System ?
1)Windows 8
2) MS word
3) Chrome
4) Photoshop
Answer
a) Windows 8
a) Ctrl + home
3) What is the full form of PDF?1) Portable Document Format
2) Private document format
3) Public document format
4) Post domain free format
Answer
5) Dial-Up
5) Which of the following is a data entry device?
1) Barcode Reader
2) MICR
3) OMR
4) OCR
5) All of the above
Answer
C) Mother Board
10) If a computer provides database services to other, then it will be
known as?
1) Web server
2) Application server
3) Database server
4) FTP server
Answer
C) Database server
11) Full form of URL is?
1) Uniform Resource Locator
2) Uniform Resource Link
3) Uniform Registered Link
4) Unified Resource Link
Answer
A) 0s and 1s only
13) What is the function of a Drop Cap in MS Word?
1) It does not allow capital letters to be used in the documents.
2) It turns the first letter of each word into Upper Case
3) It lets you begin a paragraph with a large dropped Initial capital letter
4) It automatically starts all paragraphs and sentences with capital letters
5) None of these
Answer
3) It lets you begin a paragraph with a large dropped Initial capital letter
14) Which of the following is the short-cut key to close an active tab of
a browser?
1) Alt + F4
2) Ctrl + C
3) Ctrl + F4
4) Shift + C
5) Ctrl + W
Answer
5) Ctrl + W
15) Each Web address is actually a series of numbers, which is usually
called as
1) Domain Name
2) URL
3) http
4) HTML
5) IP address
Answer
5) IP address
16) What is the short-cut key to display save -as dialog box in MSWord?
1) F1
2) Alt + F1
3) F12
4) F5
5) None of these
Answer
3) F12
3) Programs
19) Which of the following is a graphical package?
1)CorelDraw
2) MS-Excel
3) MS-Word
4) all of the above
5) None of these
Answer
1)CorelDraw
20) A floppy disk contains
1) Circular tracks only
2) Sectors only
3) Both circular tracks and sectors
4) all of the above
5) None of these
Answer
Set- 5
1. What is the term for a set of step-by-step instructions that direct a
computer to perform its tasks?
1) setup
2) program
3) system
4) Instruction manual
5) NOTA
Answer
(2) program
2. What is the initial page of the Web site?
1) The start page
2) The hyper link page
3) The link page
4) The home page
5) NOTA
Answer
1) network interface
1) DVD-ROM
5. During the ____________ operation, the control unit determines
what the program is telling the computer to do.
1) fetch
2) execute
3) decode
4) arithmetic
5) NOTA
Answer
3) decode
6.To connect to a WAN, you must have:
1) CSMA/CD
2) Wi-Fi
3) TCP/IP
4) POP
5) NOTA
Answer
4) POP
2) Keyword
4) Operating system
2) System Software
13. You would use this software to create spreadsheets, type
documents, and edit photos
1) Application
2) Utility
3) System
4) Operating
5) NOTA
Answer
1) Application
14. Which key is used in combination with another key to perform a
specific task ?
1) Function
2) Space bar
3) Arrow
4) Control
5) NOTA
Answer
4) Control
15. The following is responsible for number of logical records in a
physical record
1) Blocking factor
2) Block
3) Boolean algebra
4) All of the above
5) NOTA
Answer
1) Blocking factor
16. e-mail account includes a storage area, often called a(n)
1) Attachment
2) Hyperlink
3) Mailbox
4) IP address
5) NOTA
Answer
3) Mailbox
17. The fastest, biggest and most expensive computer among the
following is
1) Laptop
2) High Super computer
3) Notebook
4) Super computer
5) NOTA
Answer
4) Super computer
18. What does SMPS stands for?
1) Switched Mode Power Supply
2) Single Mode Power Supply
3) Simple Mode Power Supply
4) Synchronous Mode Power Supply
5) NOTA
Answer
4) Protocol
20. Which part of the computer helps in storing information?
1) Disk drive
2) Keyboard
3) Monitor
4) Printer
5) NOTA
Answer
1) Disk drive
Set- 7
D.Worm
2. In the binary language each letter of the alphabet, each number and
each special character is made up of a unique combination of:
A.Eight bytes
B.Eight kilobytes.
C.Eight characters.
D.Eight bit.
Answer
D.Eight bit
3.The linking of computers with a communication system is called
A.Networking
B.Pairing
C.Interlocking
D.Assembling
E.Sharing
Answer
A.Networking
4.A collection of program that controls how your computer system runs
and processes information is called
A.Operating System
B.Computer
C.Office
D.Interpreter
E.Compiler
Answer
A.Operating System
5.The name for the way that computers manipulate data into
information is called:
A.Programming.
B.Processing.
C.Storing
D.Organizing.
E.Compiler
Answer
B.Processing.
6.A process known as ____________ is used by large retailers to study
trends.
A.Data mining
B.Data selection
C.POS(Point of Sale)
D.Data conversion
E.None of these
Answer
A.Data mining
7. ____________ is data that has been organized or presented in a
meaningful fashion.
A.Processing
B.Information
C.Software
D.Storage
E.None of these
Answer
B.Information
8.DOS stands for____________
A.Direct Operation System
B.Disk Operation Software
C.Disk Operation System
D.Direct Operation Software
E.None of these
Answer
D.Broadband
10. Memory which forgets every thing when you switch off the power is
known as__________
A.Corrupted
B.Volatile
C.Non-Volatile
D.Non-Corrupted
E.None of these
Answer
B.Volatile
Set- 8
1.___________ translates and executes program at run time line by
line
a. Compiler
b. Interpreter
c. Linker
d. Loader
e. None of these
Answer
b. Interpreter
2. ___________ is an OOP principle
a. Structured programming
b. Procedural programming
c. Inheritance
d. Linking
e. None of these
Answer
c. Inheritance
3. COBOL is widely used in _________ applications
a. Commercial
b. Scientific
c. Space
d. Mathematical
e. None of these
Answer
a. Commercial
4. RAM stands for
a. Random origin money
b. Random only memory
c. Read only memory
a. 8 bits
6. SMPS stands for
a. Switched mode Power Suply
b. Start mode power supply
c. Store mode power supply
d. Single mode power supply
e. None of these
Answer
a. Modem
8. VDU is also called
a. Screen
b. Monitor
c. Both 1 & 2
d. printer
e. None of these
Answer
c. Both 1 & 2
9. BIOS stands for
a. Basic Input Output system
b. Binary Input output system
c. Basic Input Off system
d. all the above
e. None of these
Answer
a. Dennis Ritchie
Set- 9
1. Information travels between components on the motherboard
through
1) Flash memory
2) CMOS
3) Bays
4) Buses
5) Peripherals
Answer
3) Bays
2.
1)
2)
3)
4)
5)
Answer
4) Data inconsistency
7.Granting an outside organisation access to internet web pages is
often implemented using
a(n)________.
1) Extranet
2) Intranet
3) Internet
4) Hacker
5) None of these
Answer
1) Extranet
8.The code that relational database management systems use to
perform their database task
is referred to as
1) QBE
2) SQL
3) OLAP
4) Sequel Server
5) None of these
Answer
2) SQL
1) Placeholder
11.Which of the following statements is not true?
1) Holding down the Shift key while you draw an object creates perfect squares,
circles and
straight lines.
2) The text in a text box cant be formatted.
3) The drawing toolbar contains tools for drawing shapes, lines, arrows and
more.
4) Ctrl+S save the document.
5) None of these
Answer
4) File
2) Outlines
14.In____________, the cells are referred by their fixed position in the
worksheet.
1) Cell referencing
2) Relative referencing
3) Absolute referencing
4) Mixed referencing
5) Fixed referencing
Answer
3) Absolute referencing
15. Bubble memory is only a
1) Sequential access device
2) Direct access device
3) Combination of sequential and direct access devices
4) Interactive device
5) None of these
Answer
Set- 10
1. MS Excel contains _______ columns.
1)255
2)254
3)256
4)250
5)253
Answer
3)256
1) 10%
3. The default lines to drop for drop cap is
1) Three lines
2) Two lines
3) Four lines
4) Eight lines
5) None of these
Answer
1) Three lines
4. What is the main folder on a storage device called?
1) Interface
2) Root directory
3) Platform
4) Device driver
5) None of these
Answer
2) Root directory
5. In database, a field is a
1) Table of information
2) Label
3) Group of related records
4) Category of information
5) None of these
Answer
4) Category of information
6. Computers process data into information by working
exclusively with
1) Multimedia
2) Words
3) Characters
4) numbers
5) None of these
Answer
4) numbers
7. The term bit is the short form of
1) Megabyte
2) Binary language
3) Binary digit
4) Binary number
5) None of these
Answer
3) Binary digit
8. A picture, map or graphics or image that can be used in a
document is known as
l) Clip
2) Object
3) Clip Board
4) Drag Drop
5) None of these
Answer
2)object
9. The display bar that lists all the open folders and active
applications is called
1) Menu bar
2) Toolbar
3) Taskbar
4) Window List
5) None of these
Answer
3) Taskbar
10.
1) Left align
2) Center
3) Justify
4) Right align
5) None of these
Answer
5) None of these
Set- 11
1. While browsing the internet, which of the
following key is used for full screen view?
(a) F3
(b) F5
(c) F11
(d) F9
(e) None of these
Answer
(c) F11
2. Protect document option in Word is
available on______menu.
(a) Insert
(b) View
(c) Design
(d) Review
(e) Layout
Answer
(d) Review
3. Network interface card is housed in
(a) Memory
(b) CPU
(c) Motherboard
(d) RAM
(e) Hard drive
Answer
(c) Motherboard
4. Special software to create a job queue is
called a
(a) Spooler
(b) Drive
(c) Compiler
(d) Interpreter
(e) Linkage editor
Answer
(a) Spooler
5. Which of the following statements is/are
true?
(a) Cache Memories are bigger than RAM
(b) Cache Memories are smaller than RAM
(c) ROM are faster than RAM
(d) Information in ROM can be written by
users
(e) None of these
Answer
7. IP Addresses has..bytes
(a) 2
(b) 4
(c) 8
(d) 16
(e) None of these
Answer
(b) 4
8. What is the use of Digitizer as an input
device?
(a) To Convert graphic and pictorial data into
binary inputs
(b) To Convert graphic and pictorial data into
analog inputs
(c) Debigging
(d) Converting digital data to analog output.
(e) None of these
Answer
Answer
Set- 12
1. 01 Tera byte is equal to how many bites?
(a) 2^40
(b) 2^30
(c) 2^20
(d) 2^10
Answer
(a)2^40
2. Which of the following is not a type of primary storage?
(a) RAM
(b) ROM
(c) Static RAM
(d) EPROM
(e) All are primary storage devices
Answer
(c) MICR
5. Which of the following protects our system from hackers?
(a) IP managers
(b) Anti-virus
(c) Passwords
(d) Firewall
(e)none of these
Answer
(d)Firewall
6. Where is internal card connected in a computer?
(a) USB port
(b) Serial port
(c) Expansion slot
(d) Coaxial slots
(e) None of these
Answer
(d) Spam
8. Which of the following uses icons and menus displayed on the
screen to send command to the computer system?
(a) API
(b) GUI
(c) System utility
(d) User-interface commands
(e) None of these
Answer
(b) GUI
9. Which of the following can be defined as a systemized
collection of records of information?
(a) Records
(b) Array
(c) File
(d) Character
(e) Field
Answer
(c) File
10.
(a) Field
(b) List
(c) Matrix
(d) Record
(e) None of these
Answer
(c) Matrix
11.
(a) List
(b) Key
(c) Field
(d) Character
(e) None of these
Answer
(a) List
12.
Expand EDP.
(c)Transaction files
14.
preview?
(a) Ctrl + F3
(b) Ctrl + Shift + F2
(c) Ctrl + Shift + F3
(d) Ctrl + F2
(e) None of these
Answer
(d) Ctrl + F2
15.
Set- 13
1. Two examples of freeware ___
(a) WinZip & Linux
(b) Shareware and file sharing
(c) MS Word & Google toolbar
(d) Instant messaging and Google toolbar
(e) MS PowerPoint & MS Excel
Answer
(c) Patches
3. Microsoft is an example of ________
(a) Open source software
(b) Closed source software
(c) Open ended software
(d) Vertical market software
(e) None of these
Answer
(c) F7
(d) Phishing
(a)Computer-Generated Imagery
10.
Set- 14
1. Which of the following statement is not correct regarding
SPAMs?
(a)Spam can be used to spread viruses malicious softwares
(b)Spam can be used to do identity theft
(c)Spam cannot be used to spread viruses
(d)CAPTCHA is a method to reduce Spams on a website
(e)All are wrong
Answer
(c) F5
6. How many numbers of cursor control keys are available in a
general keyboard?
(a)2
(b) 4
(c) 3
(d) 6
(e) None of them
Answer
(b) 4
7. Which of the following is not correct about dead keys in a
computer?
(a)These are a special kind of keys
(b)These attach a specific diacritic to a base letter.
(c)The dead key doesnt generate a character itself.
(d)The dead key modifies the character generated by the key struck
immediately after.
(e)All are correct.
Answer
(a)OCR
10.
Set- 15
1. A(n)_____ is a set of programs designed to manage the
resources of a computer, including starting the computer,
managing programs, managing memory, and coordinating tasks
between input
and output devices.
(1) application suite
(2) compiler
(3) input/output system
(4) interface
(5) operating system (OS)
Answer
(4) sheet-spreads
(5) spreadsheets
Answer
(5) spreadsheets
4. The PC productivity tool that manipulates data organized in
rows and columns is called a
(1) spreadsheet
(2) word processing document
(3) presentation mechanism
(4) database record manager
(5) EDI creator
Answer
(1) spreadsheet
5. In the absence of parentheses, the order of operation is
________
(1) Exponentiation, addition or subtraction, multiplication or division
(2) Addition or subtraction, multiplication or division, exponentiation
(3) Multiplication or division, exponentiation, addition or subtraction
(4) Exponentiation, multiplication or division, addition or subtraction
(5) Addition or subtraction, exponentiation, Multiplication or division
Answer
(5) Home
7. What is the easiest way to change the phrase, revenues,
profits, gross margin, to read revenues, profits, and gross
margin ?
(1) Use the insert mode, position the cursor before the g in gross, then
type the word and followed by a space
(2) Use the insert mode, position the cursor after the g in gross, then
type the word and followed by a space
(3) Use the overtype mode, position the cursor before the g in gross,
then type the word and followed by a space
(4) Use the overtype mode, position the cursor after the g in gross,
then type the word and followed by a space
(5) None of these
Answer
(1) Use the insert mode, position the cursor before the g in
gross, then type the word and followed by a space
8. A(n) _____ program is one that is ready town and does not
need to be altered in any way.
(1) interpreter
(2) high-level
(3) compiler.
(4) COBOL
(5) executable
Answer
(5) executable
9. A typical slide in a slide presentation would not include
(1) photo irnagescParts, and graphs
(2) graphs and clip art
(3) clip art and audio clips
(4) full-motion video
(5) content templates
Answer
(5) cookies
Set- 16
1. Which of the following, statements is false concerning file
names?
(1) Files may share the same name or the same extension but not both
(2) Every file in the same folder must have a unique name
(3) File extension is another name for file type
(4) The file extension comes before the dot (.)followed by the files
(5) None of the above
Answer
(4) The file extension comes before the dot (.)followed by the
files
2. A disks content that is recorded at the time of manufacture and
that cannot be changed or erased by the user is
(1) memory-only
(2) write-only
(3) read-only
(4) run-only
(5) None of these
Answer
(3) read-only
3. Distributed processing involves
(1) solving computer component problems from a different computer
(2) solving computing problems by breaking them into smaller parts
that are separately processed by different computers
(3) allowing users to share files on a network
(4) allowing users to access network resources away from the office
(5) None of the above
Answer
(2) LAN
6. The primary purpose of software is to turn data into
(1) websites
(2) information
(3) programs
(4) objects
(5) None of these
Answer
(2) information
7. A compiler translates a program written in a highlevel language
into
(1) Machine language
(2)An algorithm
(3) A debugged program
(4) Java
(5) None of these
Answer
Hardware includes
(3) the computer and all the devices connected to it that are
used to input and output data
11.
(1) password
(2) passport
(3)entry-code
(4) access-code
(5) None of these
Answer
(1) password
13.
(1) Fetching
(2) Storing
(3) Executing
(4) Decoding
(5) None of these
Answer
(3) Executing
15.
Answer
(3) File
2. An operating system that can do multitasking means that
(1) the operating system can divide up work between several CPUs
(2) several programs can be operated concurrently
(3) multiple people can use the computer concurrently
(4) All of the above
(5)None of the above
Answer
(3) Home
4. The term user interface refers to
(1) what the user sees on the screen and how they can interact with it
(2) how the operating system responds to user commands
(3) the means by which the user interacts with the peripheral devices
on the computer
(4) the monitor that is available for the computer
(5) None of the above
Answer
(1) what the user sees on the screen and how they can interact
with it
5. The background of any Word document
(1) is always white colour
(2) is the colour you preset under the Options menu
(3) is always the same for the entire document
(4) can have any colour you choose
(5) Both 3 and 4
Answer
(4) memory
7. The becomes different shapes depending on the task you
are performing.
(1) active tab
(2) insertion point
(3) mouse pointer
(4) Ribbon
(5) None of these
Answer
Of the 5 words listed below, which one is the odd one out?
(1) Applications
(2) Peripherals
(3) Programs
(4) Software
(5) Operating system
Answer
(2) Peripherals
Set 18
(3) resource
3. Secondary storage
(1) does not require constant power
(2) does not use magnetic media
(3) consists of four main types of devices
(4) does not store information for later retrieval
(5) None of the above
Answer
(4) full
6. To find the paste special option, or use the clipboard group on
the tab of Power Point.
(1) design
(2) slide show
(3) page layout
(4) insert
(5) home
Answer
(5) Home
(2) router
9. Which Power Point view displays each slide of the presentation
as a thumbnail and is useful for rearranging slides?
(1) Slide soater
(2) Notes page
(3) Slide design
(4) Slide show
(5) Slide sorter
Answer
10.
(1) Keyboard
(2) Calligraphy
(3) Stensil
(4) Type base
(5) Formation
Answer
(2) Calligraphy
Set- 19
1. Which of these is not a means of personal communication on
the Internet?
(1) chat
(2) instant messaging
(3) Instanotes
(4) electronic mail
(5) None of these
Answer
(3) Instanotes
2. . ______ allows users to upload files to an online site so they
can be viewed and edited from another location.
(1) General-purpose applications
(2) Microsoft Outlook
(3) Web-hosted technology
(4) Office Live
(5) None of these
Answer
Answer
Answer
(1) mouse
9. A detailed written description of the programming cycle and the
program, along with the test results and a printout of the
program is called
(1) documentation
(2) output
(3) reporting
(4) spec sheets
(5) Directory
Answer
(1) documentation
10.
the
(1) cell location
(2) cell position
(3) cell address
(4) cell coordinates
(5) Cell contents
Answer
Set- 20
1. Housing all hardware, software, storage,and processing in one
site called.
A. time-sharing
B. server
C. centralized system
D. a host computer
E. none of these
Answer
(C)-centralized system
2. Which of the following method to save a presentation under a
new file name?
A. select the file menu and choose save as
B. select the file menu and choose save
C. the file will automatically be saved under the new name if you
change the title
D. when you close power point the file will automatically be saved
E. None of these
Answer
(A)
3. In MIME ,I stands for__________
A. internet
B. internal
C. intranet
D. international
E. None of these
Answer
(A)
MIME-multipurpose internet mail extension
4. Which of the following technique is used in high speed modem?
A. PCM
B. FDM
C. TDM
D. QAM
E. None of these
Answer
(C)-TDM
5. Which multiplexing technique transmits analog signals?
A. FDM
B. Synchronous TDM
C. asynchronous TDM
D. Both (2) and (3)
E. None of these
Answer
(A)
FDM-Frequency division multiplexing
6. to find a saved document in the computers memory and bring
it up on the screen to view______
A. Reverse
B. Rerum
C. Retrieve
D. Return
E. None of these
Answer
(C)-Retrive
7. A single application that combines the measure features of
several types of application called
A. intergrated software
B. a suite
C. a combo package
D. high-end
E. None of these
Answer
(A)-integrated software
8. The word processing task associated with changing the
appearance of documents is______
A. Writing
B. Formating
C. Editing
D. Storing
E. None of these
Answer
(B)-formating
9. To save an existing document with a different name_____
A. retype the document and give it a different name
B. use the save as command
C. copy and paste the original document to a new document and then
save
D. use window explorer to copy the document to a different location
and then rename it
E. None of these
Answer
A. Static
B. Internal
C. External
D. Remove
E. None of these
Answer
(B)-internal
Set- 21
1. The rules of a language are called its __________.
1) structure
2) syntax
3) code
4) rigidity
5) None of these
Answer
Ans.) 2
2. A next-generation Web content development language,
__________ typically refers to a suite of technologies that
allow developers to store data in a readable format.
1) HTML
2) XML
3) XSL
4) PHP
5) None of these
Answer
Ans.) 2
Ans.) 4
4. This technology is used to convert XML into HTML.
1) CSS
2) PHP
3) XHTML
4) XSL
5) None of these
Answer
Ans.) 4
5. The __________ is a special database that holds information
about the computers user, installed programs and hardware
devices.
1) dynamic link library
2) compiled help module
3) initialization file
4) Windows Registry
5) None of these
Answer
Ans.) 4
Ans.) 2
7. What type of graphical model is used to define a database?
1) Flowchart
2) Organizational model
3) E-R diagram
4) Programming model
5) None of these
Answer
Ans.) 2
8. Microsofts Access and Corels Paradox are both examples of
which type of software?
1) Network database systems
2) Relational database systems
3) Flat-file database systems
4) Hierarchical database systems
5) None of these
Answer
Ans.) 2
Ans.) 1
10.
creating a worksheet?
1) Placing titles for columns in the first row of data
2) Inserting comments in each cell to define that
data or type of data
3) Using conditional formatting to spot spelling
errors
4) Grouping records according to some
classification
5) None of these
Answer
Ans.) 1
Set- 22
1. A router is a___________
1. Forwards a packet to all outgoing links, except the link upon which
the packet
originated.
Answer-4
2. What would you need to establish if you wanted to insure that
the key in one database table was the same as a key in another
database table?
1) Top-level grouping
2) Connectivity
3) Referential integrity
4) Field properties
5) None of these
Answer
Answer.) 3
3. If you wished to limit what you would see on an Excel
worksheet, what data function would you use?
1) Sort
2) Filter
3) Conditional format
4) Data analysis
5) None of these
Answer
Answer.) 2
4. What Excel tool allows you to create quickly and automatically
summary data from a large data set?
1) Conditional formatting
2) Sorting
3) Pivot tables
4) Field lists
5) None of these
Answer
Answer.) 3
5. A(n) __________ file contains information in an indexed and
cross-linked format.
1) executable
2) initialization
3) help
4) library
5) None of these
Answer
Answer.) 3
6. __________ are text files containing OS commands.
1) Initialization files
2) Batch files
3) Executable files
4) Help files
5) None of these
Answer
Answer.) 2
7. Which of the following will not protect you from spam?
1) spam blockers
2) e-mail rules
3) popup blocker
4) filters
5) None of these
Answer
Answer.) 3
8. To read the system messages and warnings, access the
__________ in Windows.
1) system manager
2) control panel
3) event viewer
4) message screen
5) None of these
Answer
Answer.) 3
9. If configured correctly, the __________ will prevent interaction
with your computer after a specified time period.
1) firewall
2) filter
3) screen saver
4) popup blocker
5) virus
Answer
Answer.) 3
10.
on a system.
1) vulnerabilities
2) countermeasures
3) degree of harm
4) susceptibility
5) none of these
Answer
Answer.) 3
Set- 23
1. Which software coordinates the interaction of technology
devices_________
1) Application software
2) Utility software
3) Development software
4) Systems software
5) None of these
Answer
4) Systems software
2. Which is considered a direct entry input device________
1) Optical scanner
2) Mouse
3) Light pen
4) Digitizer
5) All of the above.
Answer
2) Kilobyte
3) motherboard
4) Gigabyte
5) None of the above
Answer
2) Data type
5. Which one of the following statements is false?
1) The data dictionary is normally maintained by the database
administrator.
2) Data elements in the database can be modified by changing the
data dictionary.
3) The data dictionary contains the name and description of each data
element.
4) The data dictionary is a tool used exclusively by the database
administrator.
5) None of these
Answer
2) compiler
7. The color of an object is an example of a(n) ________
1) attribute
2) detail
3) listing
4) specification
5) None of these
Answer
1) attribute
8. The ________prevents unlawful access to voice
communications by wire.
1) Electronic Communications Privacy Act
2) Freedom of Information Act
3) USA Patriot Act
4) Privacy Act of 1974
5) None of these
Answer
3) Threat
10.
resources?
1) Data administration
2) Database administration
3) Knowledge Management
4) Information Management
5) None of these
Answer
1) Data administration
Set-24
1. A hacker that changes or forges information in an electronic
resource, is engaging in __________.
1) denial of service
2) sniffing
3) terrorism
4) data diddling
5) None of these
Answer
4) data diddling
2. Software, such as Explorer and Firefox, are referred to as
______.
1) internet tools
2) Utility software
3) Development software
4) Browsers
5) None of these
Answer
4) Browsers
3. When two companies are linked together by computers and
they send business transactions through these computers, they
are probably using ______.
1) Digital wallets
2) Electronic data interchange
3) B2C
4) Smart cards
5) None of these.
Answer
3) Pull technology
4) Mobile computing
5) None of these
Answer
4) Mobile computing
5. Which of the following systems mimics human thinking?
1) Artificial intelligence
2) Intelligent agent
3) Bot
4) Database management system
5) All the above
Answer
1) Artificial intelligence
6. What database key uniquely identifies a record within a table?
1) Primary key
2) Foreign key
3) Secondary key
4) Relational key
5) None of these
Answer
1) Primary key
7. What database key links one table to another?
1) Primary key
2) Foreign key
3) Secondary key
4) Relational key
5) None of these
Answer
2) Foreign key
8. Which device can understand difference between data &
programs?
1) Input device
2) Output device
3) Memory
4) Microprocessor
5) None of these
Answer
4) Microprocessor
9. Algorithm and Flow chart help us to__________.
1) Know the memory capacity
2) Memory address register
3) Direct the output to a printer
4) Memory access register
5) None of these
Answer
2) phishing
Set-25
1. What terms is used to identify technology that is used to
support many people working together on one project?
1) E-collaboration
2) I-technology
3) Social networking
4) Knowledge management
5) None of these
Answer
1) E-collaboration
2. Which of the following terms is used to describe the computerbased tools used by people in an organization to support their
information processing needs?
1) Information Technology
3) Artifacts
5) None of these
2) User Systems
4) Computer Tools
Answer
1) Information Technology
3. The name for the way that computers manipulate data into
information is called________.
1) programming
2) processing
3) storing
4) organizing
5) None of these
Answer
2) processing
4. ________is the science that attempts to produce machines that
display the same type of intelligence.
that humans do.
1) Nanoscience
2) Nanotechnology
3) Simulation
4) Artificial intelligence
5) None of these
Answer
4) Artificial intelligence
5. The desktop contains small graphics called________.
1) windows
2) logos
3) icons
4) pictures
5) None of these
Answer
3) icons
6. C, BASIC, COBOL, and Java are examples of ______ languages.
1) low-level
2) computer
3) system programming
4) high-level
5) None of these
Answer
4) high-level
7. A(n) _______ camera is a peripheral device used to capture
still images in a digital format that can be easily transferred
into a computer and manipulated using graphics software.
1) digital
2) analog
3) classic
4) film
5) None of these
Answer
1) digital
8. _____ makes it possible for shoppers to make purchases using
their computers.
1) E-world
2) E-commerce
3) E-spend
4) E-selling
5) None of these
Answer
2) E-commerce
9. A computer ______is a set of program instructions that can
attach itself to a file, reproduce itself.
1) worm
2) virus
3) trojan horse
4) phishing scam
5) None of these
Answer
2) virus
10.
3) Gateway
set-26
1. The computer abbreviation KB usually means_________
1) kilo bite
2) key block
3) key byte
4) kit bit
5) None of these
Answer
1) kilo bite
2. The desktop contains small graphics called_________
1) windows
2) logos
3) icons
4) pictures
5) None of these
Answer
3) icons
3. Which of the following is a part of the Central Processing
Unit__________
1) Printer
2) Keyboard
3) Mouse
4) Arithmetic Logic Unit
5) None of these
Answer
3) Network
5. DSL is an example of a(n) ___________connection.
1) network
2) wireless
3) slow
4) broadband
5) None of these
Answer
4) broadband
6. The metal or plastic case that holds all the physical parts of the
computer is the________
1) system unit.
2) CPU.
3) mainframe.
4) platform.
5) None of these
Answer
1) system unit.
7. Computers use the __________language to process data.
1) processing
2) kilobyte
3) binary
4) representational
5) None of these
Answer
3) binary
8. Which key will open an Open dialogue box__________
1) F12
2) Alt + F12
3) Ctrl + F12
4) Shift + F12
5) None of these
Answer
3) Ctrl + F12
9. Which file is responsible to start MS Word__________
1) Winword.exe
2) Win.exe
3) Word.exe
4) Wordwin.exe
5) None of these
Answer
1) Winword.exe
10.
Set-27
1. Which type of software coordinates the interaction of
technology devices?
1) Application software
2) ROM
3) Utility software
4) Systems software
5) None of these
Answer
4) Systems software
2. SMPS stands for________
1) Switched mode power supply
2) Start mode power supply
3) system mode power supply
4) Simple mode power supply
5) None of these
Answer
4) CPU
5) None of these
Answer
1) Spooler
5. IN Ms-Access, a table can have ______ primary key/keys
1) One
2) Two
3) Three
4) Five
5) None of these
Answer
1) One
6. A commonly use graphic format for the web is
1) GIF
2) BMP
3) TEXT
4) IMP
5) None of these
Answer
1) GIF
7. The ability to find an individual item in a file immediately ____
is used.
1) File allocation table
2) Directory
3) Sequential access
4) Direct access
5) None of these
Answer
4) Direct access
8. The main directory of a disk is called the __________ directory
1) Root
2) Sub
3) Folder
4) Network
5) None of these
Answer
1) Root
9. A ___ is an icon on the desktop that provides a user with
immediate access to a program or file
1) Kernel
2) Buffer
3) Shortcut
4) Spooler
5) None of these
Answer
3) Shortcut
10.
notepad?
1) Edit
2) File
3) Insert
4) View
5) None of these
Answer
3) Insert
Set-28
1. Which of the following is NOT one of the four major data
processing functions of a computer__________
1) gathering data
2) processing data into information
3) analyzing the data or information
4) storing the data or information
5) None of these
Answer
3) CPUs
3. User actions such as keystrokes or mouse clicks are referred to
as__________
1) Interrupts
2) Tasks
3) Events
4) Processes
5) None of these
Answer
3) Events
4. Microsofts Access and Corels Paradox are both examples of
which type of software?
1) Network database systems
2) Relational database systems
3) Flat-file database systems
4) Hierarchical database systems
5) None of these
Answer
3) event viewer
6. In the right setting a thief will steal your information by simply
watching what you type________
1) snagging
2) spying
3) social engineering
4) shoulder surfing
5) None of these
Answer
4) shoulder surfing
7. The __________ of a threat measures its potential impact on a
system.
1) vulnerabilities
2) countermeasures
3) degree of harm
4) susceptibility
5) none of these
Answer
3) degree of harm
8. Most dangerous risk in leaking of information is___________
1) Ready access to online terminals
2) Online processing of data
3) Ignorance about the existence of risk
4) All of these
5) none of these
Answer
4) All of these
9. MCI and AT&T are examples of which of the following?
1) Social networks
2) Communications systems
3) Internet service providers
4) Mobisodes
5) None of these
Answer
2) RSS feed
Set-29
1. Which of the following statements is not true?
1) Holding down the Shift key while you draw an object creates perfect
squares, circles and straight lines.
2) The text in a text box cant be formatted.
3) The drawing toolbar contains tools for drawing shapes, lines, arrows
and more.
4) Ctrl+S save the document.
5) None of these
Answer
Answer
4) File
3. _______terminals (formerly known as cash registers) are often
connected to complex inventory and sales computer systems.
l) Data
2) Sales
3) Query
4) Point-of-sale (POS)
5) None of these
Answer
4) POS
4. The OSI model is divided into ________ processes called
layers.
l) Five
2) Six
3) Seven
4) Eight
5) None of these
Answer
3) Seven
5. The capability of an operating system to enable two or more
than two programs to execute simultaneously in a single
computer system by using a single processor is called________
1) Multiprocessing
2) Multitasking
3) Multiprogramming
4) Multi execution
5) None of these
Answer
3) Multiprogramming
6. What menu is selected for printing?
l) Edit
2) Special
3) File
4) Tools
5) None of these
Answer
3) File
7. _________cells involves creating a single cell by combining
two or more selected cells.
1) Formatting
2) Merging
3) Embedding
4) Splitting
5) None of these
Answer
2) Merging
8. __________is called as a supervisor of computer activities.
1) Memory
2) OS
3) I/O devices
4) CU
5) ALU
Answer
2) OS
9. Repeater works in _______ layer of OSI mode.
1) Application
2) Transport
3) Physical
4) Data link
5) Network
Answer
3) Physical
10.
2) Outlines
Set-30
1. Which of the following computers represent data as discrete
signals?
1) Analog computer
2) Digital computer
3) Both 1) and 2)
4) Digilog computer
5) None of these
Answer
2) Digital computer
2. Who developed the analytical engine ?
1) Jacquard Loom
2) Charles Babbage
3) Shannon
4) IBM
5) None of these
Answer
2) Charles Babbage
3. The box that is displayed to indicate that the text, pictures or
objects are placed in it is called_______?
1) Placeholder
2) Auto text
3) Text box
4) Word Art
5) None of these
Answer
1) Placeholder
4. In_________, the cells are referred by their fixed position in
the worksheet.
1) Cell referencing
2) Relative referencing
3) Absolute referencing
4) Mixed referencing
5) None of these
Answer
3) Absolute referencing
5. Objects on the slide that hold text are called_________.
1) Object holders
2) Text holders
3) Auto layout
4) Place holders
5) None of these
Answer
4) Place holders
6. Bubble memory is only a________
1) Sequential access device
2) Direct access device
3) Combination of sequential and direct access devices
4) Interactive device
5) None of these
Answer
3) 256
4) Three lines
9. In database, a field is a_________
1) Table of information
2) Label
3) Group of related records
4) Category of information
5) None of these
Answer
4) Category of information
10.
1) Modem view
2) Classic view
3) Advanced view
4) Normal view
5) None of these
Answer
2) Classic view
Set-31
3) Permanent
3. The ________ component is used by the data analyst to create
the queries that access the database.
1) Data extraction
2) End-user query tool
3) End-user presentation tool
4) Data store
5) None of these
Answer
3) Tutorial
6. In Windows XP, which shortcut is used to cycle through opened
items in taskbar?
1) Ctrl + Tab
2) Alt + Tab
3) Ctrl + Esc
4) Alt + Esc
5) None of these
Answer
2) Alt + Tab
7. Which multiplexing technique is used in ATM?
1) FDM
2) Synchronous TDM
3) Asynchronous TDM
4) WDM
5) Both 2) and 3)
Answer
3) Asynchronous TDM
8. Network operating systems from Novell is____________
1) NOS
2) UNIX
3) NetWare
4) Solaris
5) None of these
Answer
3) NetWare
9. What is JVM_________
1) Jumber Verbose Mechanics
2) A part of IIS
3) Java Virtual Machine
4) Net Framework
5) None of these
Answer
Set-32
1. What happens when you boot up your PC___________
1) Portions of the operating system are copied from disk into memory.
2) Portions of the operating system are copied from memory onto disk.
3) Portions of the operating system are compiled.
4) Portions of the operating system are emulated.
5) None of these
Answer
3) Object
4) template
4. A complete electronic circuit with transistors and other
electronic components on a small silicon chip is called
a(n)__________
1) workstation
2) CPU
3) magnetic disk
4) integrated circuit
5) None of these
Answer
4) integrated circuit
5. The primary output device for computers is a_________
1) Video monitor
2) printer
3) keyboard
4) mouse
5) None of these
Answer
1) Video monitor
2) Windows
7. The ______enables you to simultaneously keep multiple pages
open in one browser window.
1) status bar
2) menu bar
3) tab row
4) address bar
5) None of these
Answer
3) tab row
8. Which of the following is a popular programming language for
developing multimedia web pages, websites and web-based
applications?
1) COBOL
2) Java
3) BASIC
4) Assembler
5) None of these
Answer
2) Java
4) mesh
10.
system?
1) Performance monitor
2) Supervisor
3) Job-control program
4) I/O control program
5) None of these
Answer
1) Performance monitor
Set-33
1. A database management system (DBMS) is a_______
1) Hardware system used to create, maintain and provide controlled
access to a database.
2) Hardware system used to create, maintain and provide uncontrolled
access to a database.
3) Software system used to create, maintain and provide uncontrolled
access to a database.
4) Software system used to create, maintain and provide controlled
access to a database.
5) None of these
Answer
4) Data inconsistency
4. Physical structure of computer is called_________
1) Hardware
2) software
3) Malware
4) All of these
5) None of these
Answer
1) Hardware
5. _____ are words that a programming language has set aside
for its own use.
1) Control worlds
2) Reserved words
3) Control structures
4) Reserved keys
5) None of these
Answer
2) Reserved words
6. Granting an outside organization access to internet web pages
is often implemented using a (n) _______
1) extranet
2) intranet
3) internet
4) hacker
5) None of these
Answer
2) intranet
7. In which phase of the software design and development project
would you try to understand the proposed project?
1) Planning phase
2) Initial phase
3) Requirements phase
4) Analysis phase
5) None of these
Answer
4) Analysis phase
8. Linux is a (n) ________operating system.
1) opensource
2) Microsoft
3) Windows
4) Mac
5) None of these
Answer
1) opensource
9. __________ are lists of commands that appear on the screen.
1) GUIs
2) Icons
3) Menus
4) Windows
5) None of these
Answer
3) Menus
10.
Answer
1) top-down design
Set-33
1. Which of the following is not the function of the control unit?
1) Read instructions
2) Execute instructions
3) Interpret instructions
4) Direct operations
5) None of these
Answer
Ans.) 4
2. To make the number pad act as directional arrows, you press
the __________ key.
1) num lock
2) caps lock
3) arrow lock
4) shift
5) None of these
Answer
Ans.) 1
3. ASCII stands for___________
1) American Stable Code for International Interchange
2) American Standard Case for Institutional Interchange
3) American Standard Code for Information Interchange
4) American Standard Code for Interchange Information
5) None of these
Answer
Ans.) 3
4. Which of the following types of table constraints will prevent
the entry of duplicate rows?
1) Primary key
2) Unique
3) Null
4) Foreign key
5) None of these
Answer
Ans.) 2
5. The software component of an expert system that draws
conclusions is the___________.
1) User interface
2) database
3) inference engine
4) I/O controller
5) None of these
Answer
Ans.) 3
6. What is the name for the process that is used to convert a
series of instructions, or programs, written in high-level
language into instructions (or a program) that can be run on a
computer?
1) Assembling
2) Compiling
3) Translating
4) Uploading
5) None of these
Answer
Ans.) 2
7. To move to the bottom of a document, press __________
1) insert key
2) home key
3) ctrl + end
4) end key
5) None of these
Answer
Ans.) 3
8. Which of the following commands is given to reboot the
computer?
1) Ctrl+Alt+Del
2) Ctrl+Shift+Del
3) Ctrl+Shift+Del
4) Ctrl+Alt+Shift
5) None of these
Answer
Ans.) 1
9. What happens when a worksheet is not protected___________.
1) It cannot be opened.
2) It cannot be saved.
3) It cannot be edited.
4) It can be edited.
5) None of these
Answer
Ans.) 4
10.
What is a firmware__________
Ans.) 4
Set-34
1. Windows XP, which shortcut is used to cycle through opened
items in taskbar_______
1) Ctrl + Tab
2) Alt + Tab
3) Ctrl + Esc
4) Alt + Esc
5) None of these
Answer
2) Alt + Tab
2. A primary key can also be called a_________
1) super key
2) candidate key
3) alternate key
4) secondary key
5) None of these
Answer
2) candidate key
3. Which shortcut key is used to open a new file in MS Word?
1) Ctrl + X
2) Ctrl + Y
3) Ctrl+N
4) Ctrl + F
5) None of these
Answer
Ans.) 3
4. Bridge operates in which of the following OSI layers?
1) Physical
2) Network
3) Data link
4) Both 1) and 3)
5) None of these
Answer
Ans.) 4
5. ______printer is used for fax machines.
1) Line
2) Dot matrix
3) Laser
4) Inkjet
5) Thermal
Answer
Ans.) 5
Ans.) 1
7. Which storage decive is mounted on reels?
) Floppy disk
2) CD-ROM
3) Magnetic disk
4) Magnetic tape
5) None of these
Answer
Ans.) 4
8. What does AMD stands for?
1) Advanced Mainframe Devices
2) Advanced Micro Devices
3) Advanced Mini Devices
4) Advanced Monitor Devices
5) None of these
Answer
Ans.) 2
9. A language based on graphics for use in education is
called___________
1) PROLONG
2) LOGO
3) COBOL
4) BASIC
5) None of these
Answer
Ans.) 2
10.
Ans. 1)
Set-35
1. ________ controls the way in which the computer system
functions and provides a means by which users can.interact with
the computer
1) The platform
2) Application software
3) Operating system
4) The motherboard
5) None of these
Answer
3) Operating system
2) Reserved words
3. IN MS Access,a table can have ______ primary key/keys.
1) One
2) Two
3) Three
4) Four
5) None of these
Answer
1) One
4. A commonly use graphic format for the web is____________
1) GIF
2) BMP
3) TEXT
4) IMP
5) None of these
Answer
1) GIF
5. Which one of the following allows users to continue to operate
computers whileprinting is in progress?
1) Spooler
2) Job Control Program
3) Os Supervisor
4) compiler
5) None of these
Answer
1) Spooler
6. What is the full form of USB as used in computer related
activities?
1) Universal Security Block
2) Ultra Serial Block
3) United Service Block
4) Universal Serial Bus
5) None of these
Answer
2) Buffer
3) Shortcut
4) Spooler
Answer
3) Shortcut
9. Taking backup of a file against crash is a____________.
1) Preventive measure
2) Curative measure
3) Decisive measure
4) short measure
5) None of these
Answer
1) Preventive measure
10.
Set-36
1. A database management system (DBMS) is a__________
1) hardware system used to create , maintain and provide controlled
access to a
database
2) hardware system used to create, maintain, and provide uncontrolled
access to a
database.
3) software system used to create, maintain, and provide uncontrolled
access to a
database.
4) software system used to create, maintain, and provide controlled
access to a
database.
5) None of these
Answer
3) Insert
3. How is power supplied to a low-power___________
USB device?
1) Through a power cable
2) From an external power supply
3) Directly from the computers power supply
Answer
1) ANSI
8. The power saving mode that allows the computer to be
restarted by simply pressing a key on the keyboard is
called_________
1) standby
2) warm boot
3) power management
4) cold boot
5) None of these
Answer
1) standby
9. Which of the following is not a part of a standard office
suit__________
1) File Manager.
2) Image Editor
3) Database
4) Word Processor
5) None of these
Answer
1) File Manager.
10.
1) .EXE
2) .BAT
3) .Oxe
4) .class
5) None of these
Answer
3) .Oxe
Set-37
1. A(n) ____________ system is a small, wireless handheld
computer that scans an items tag and pulls up the current price
(and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer
A. PSS
2. Which of the following is NOT one of the four major data
processing functions of a computer?
A. gathering data
D. numbers
4. In the binary language each letter of the alphabet, each number
and each special character is made up of a unique combination
of__________
A. eight bytes
B. eight kilobytes
C. eight characters
D. eight bits
Answer
D. eight bits
5. ________ controls the way in which the computer system
functions and provides
a means by which users can.
interact with the computer
1) The platform
2) Application software
3) Operating system
4) The motherboard
Answer
3) Operating system
6. A _________ contains specific rules and words that express the
logical steps of
an algorithm.
1) programming language
2) syntax
3) programming structure
4) logic chart
Answer
2) syntax
7. The most frequently used instructions of a computer program
are likely to be
fetched from__________
1) the hard disk
2) cache memory
3) RAM
4) registers
Answer
2) cache memory
8. Algorithm and Flow chart help us to____________
1) Know the memory capacity
2) Identify the base of a number system
4) Direct access
10.
document
temporarily stored?
1) RAM
2) ROM
3) The CPU
4) Flash memory
Answer
1) RAM
Set-38
1. ________ are used to identify a user who returns to a website.
1) ASPs
2) Scripts
3) Cookies
4) Plug-ins
5) None of These
Answer
3) Cookies
2. Rows of a relation are called__________
1) Relation
2) Tuples
3) Data structure
4) An entity
5) None of these
Answer
2) Tuples
3. Which layer of OSI determines the interface of the system with
the user_________
1) Network
2) Application
3) Data link
4) Session
5) None of these
Answer
2) Application
4. Most database management systems allow you to have more
than one key so that you can sort records in different ways. One
of the keys is designated the ________and must hold a unique
value for each record.
1) Unique Key
2) Prime attribute
3) Index key
4) primary key
5) None of these
Answer
4) primary key
5. _______ is primarily used for mapping host names and email
destinations to IP address but can also be used for other
purposes.
1) TCP (Transfer Control Protocol)
2) DNS (Domain Name System)
3) SHA (Secure Hash Algorithm)
4) Simple Network Management Protocol (SNMP)
5) None of these
Answer
3) Resident virus
3) Spiral model
8. Which of the following TCP/IP protocol is used for remote
terminal connection service?
1) Telnet
2) RARP
3) FTP
4)all of above
5) None of these
Answer
1) Telnet
9. A ________ means that one record in a particular record type is
related to only one record of another record type.
1) One-to-one relationship
2) One-to-many relationship
3) Many-to-one relationship
4) Many-to-many relationship
5) None of these
Answer
1) One-to-one relationship
10.
a__________
1) Double-ended queue
2) Priority queue
3) Stack
4) Trees
5) None of these
Answer
2) Priority queue
Set-39
1. A________ contains the smallest unit of meaningful data, so
you might call it the
basic building block for a data file.
1) File Structures
2) Records
3) Fields
4) Data base
5) None of these
Answer
3) Fields
2. The ________ data mining technique derives rules from realworld case examples.
1) Waterfall Model
2) Spiral Model
3) Prototyping Model
4) Incremental Model
5) None of these
Answer
2) Spiral Model
3. An oracle server index___________
1) Is a schema object
2) Is used to speed up the retrieval of rows by using a pointer
3) Is independent of the table it indexes
4) All of these
5) None of these
Answer
4) List
5. The drawbacks of the binary tree sort are remedied by
the+____________
1) Linear sort
2) Quick sort
3) Heap Sort
4) Insertion sort
5) None of these
Answer
3) Heap Sort
6. Rows of a relation are called____________
1) Relation
2) Tuples
3) Data structure
4) An entity
5) None of these
Answer
2) Tuples
7. Which of the following TCP/IP protocol is used for remote
terminal connection service___________
1) Telnet
2) RARP
3) FTP
4) All of above
5) None of these
Answer
1) Telnet
8. ________ is a virus that inserts itself into a systems memory.
Then it takes a number of actions when an infected file is
executed.
1) Web scripting virus
2) Polymorphic Virus
3) Macro virus
4) Boot sector virus
5) Resident virus
Answer
5) Resident virus
9. A heap allows a very efficient implementation of a__________
1) Double-ended queue
2) Priority queue
3) Stack
4) Trees
5) None of these
Answer
2) Priority queue
10.
2) SQL
Set-40
1. Which of the following functions are not performed by
servers____________
1) Email processing
2) Processing Web sites
3) Both CD-RW disks and Zip disks
4) Database sharing
5) Storag
Answer
1) Email processing
2. The shortcut key to print documents is_____________
1) Ctrl + A
2) Ctrl + P
3) Ctrl + c
4) Ctrl + End
5) None of these
Answer
2) Ctrl + P
3. When you save to this, your data will remain intact even when
the computer is turned off___________
1) RAM
2) Secondary storage device
3) Primary storage device
4) Motherboard
5) None of these
Answer
1) Read
5. Replace option is available in____________
1) Edit menu
2) Tools menu
3) None of these
4) space
5) None of the above
Answer
1) Edit menu
6. What type of network is commonly used in a college lab
environment____________
1) WAN
2) LAN
3) MAN
4) CAN
5) None of these
Answer
2) LAN
7. The first step in PCM is ___________
1) quantization
2) PCM; DM
3) sampling
4) all of the above
5) None of these
Answer
3) sampling
2) ThinkPad
9. Start and stop bits are used in serial communications
for______________
1) Error detection
2) Error correction
3) Synchronization
4) Slowing down the communication
5) None of these
Answer
3) Synchronization
10.
during_____________
1) reverse engineering
2) re-engineering
3) reuse
4) all of the above
5) None of these
Answer
1) reverse engineering
Set-41
1. When an object has many forms, it has__________
1) Inheritance
2) Scalability
3) Encapsulation
4) Polymorphism
5) None of these
Answer
4) Polymorphism
2. A remote control that is used to turn on or off some machine is
called__________
1) class
2) interface
3) message
4) instance
5) None of these
Answer
2) interface
3. What type of commerce is enabled by technology__________
1) Path-to-profitability
2) E-commerce
3) EBuy
4) Internet
5) None of these
Answer
2) E-commerce
3) phased
6. Adding new features is typically performed during the
__________ phase.
1) implementation
2) needs analysis
3) development
4) maintenance
5) all of the above
Answer
4) maintenance
4) Programme
8. Which generation of computers is covered by the period 196477__________
1) First
2) Second
3) Third
4) Forth
5) None of these
Answer
3) Third
9. Which of the following is An ad hoc query___________
1) pre-planned question
2) exclamation mark
3) spur-of-the moment question
4) period
5) None of these
Answer
5) None of these
An ad hoc queryA non-standard inquiry. An ad hoc query is
created to obtain information as the need arises. Contrast with
a query that is predefined and routinely processed.
10.
2) phishing
Set-42
1. which of the following you use to create chart in ms
excel________
1) Pie Wizard
2) Chart Wizard
3) Data Wizard
4) Excel Wizard
5) None of these
Answer
2) Chart Wizard
2. The act of retrieving existing data from memory is_________
1) Read-out
2) Read from
3) Read
4) All of above
5) None of these
Answer
4) All of above
3. main component of first generation computer was__________
1) vaccum tubes and valves.
2) Artificial intelligence
3) transistors
4) Integrated chips
5) None of these
Answer
3) OCR
3) Control section
7. In Microsoft excel short cut key Ctrl+D is used for_________
1) Replace
2) Fill Down
3) Find
4) goto
5) None of these
Answer
2) Fill Down
8. When internet data leaves your campus, it normally goes to
a(n) ________before moving toward its destination.
1) Internet backbone
2) Network access point
3) Base station
4) Communication system
5) None of these
Answer
2) Podcast
Set-43
1. which of the following is the known as semiconductor
memory____________
A) EPROM
2) PROM
3) ROM
4) RAM
5) None of these
Answer
4) RAM
2. Which of the following are graphical file
extensions______________
1) GIF, TCF, WMF
2) TCP, JPG, BMP
3) JPG, GIF, BMP
4) JPG, CPX, GCM
5) None of these
Answer
(3) Bit-byte-field-record-file-database
4. Which of the following is used to create newspaper style
columns___________
1) Format Tabs
2) Table Insert Table
3) Insert Textbox
4) Format Columns
5) None of the Above
Answer
1) MICR
7. Which of the following keyboard shortcuts is used to view the
properties of a selected object___________
1) Alt + Space
2) Ctrl + Space
3) Alt + Enter
4) Ctrl + Enter
5) None of these
Answer
3) Alt + Enter
8. what is adwords__________
1) Advertising Service by Google
2) Advertising Service by Microsoft
3) Automatic words Search Engine by Yahoo
4) Advertising Service by Yahoo
5) None of these
Answer
2) Ctrl + E
10.
1) %
2) +
3) =
4)
5) None of the above
Answer
3) =
Set-44
(1) RAM
2. Select the Odd one_________
(1) Operating system
(2) Interpreter
(3) Compiler
(4) Assembler
(5) None of these
Answer
(2) Register
5. RAID stands for________
(1) Reproduce Array of Intelligent Disks
(2) Reproduce Array of Inexpensive Disks
(3) Redundant Array of Inexpensive Drives
(4) Redundant Array of Inexpensive Disks
(5) none of these
Answer
(1) Storage
(2) Memory
(3) Carrier
(4) All of the above
(5) None of these
Answer
(3) Carrier
8. Programs developed by an outside supplier and provided to the
user in a machine readable form is known as_________
(1) Canned programs
(2) Beta program
(3) Alpha program
(4) All of the above
(5) None of these
Answer
(1) Two
(2) Four
(3) Eight
(4) Ten
(5) None of these
Answer
(3) Eight
Set-45
1. Android Operating system is an example of which kind of
Source Model_________
(1) Vertical Market Software
(2) Open Source
(3) Horizontal Market Software
(4) Shareware
(5) None of these
Answer
(4) Multiplexing
(2) Host
4. Programming language built into user programs such as Word
and Excel are known as _______
(1) 4GLs
(2) Macro languages
(3) object-oriented languages
(4) visual programming languages
(5) None of these
Answer
(2) track
7. Instructions and data that are processed by the CPU are located
in________
(1) CD-ROM
(2) RAM
(3) the hard disk
(4) the motherboard
(5) none of these
Answer
(2) RAM
8. All of the following are considered to be storage devices
EXCEPT_______
(1) floppy disk
(2) CPU
(3) CD
(4) hard disk drive
(5) none of these
Answer
(2) CPU
9. The commonly used UNIX commands like date, ls, cat etc. are
stored in_________
(1) dev directory
(2) bin directory
(3) tmp directory
(4)unix directory
(5) None of these
Answer
1) 1,000 bits
2) 1,000 bytes
3) 1 million bytes
4) 1 million bits
5) 2,000 bytes
Answer
3) 1 million bytes
Set-46
1. Which of the following is the most frequently used input
device_________
(1) Microphone
(2) Scanner
(3) Touch screen
(4) Mouse
(5) None of these
Answer
(4) Mouse
2. MS Excel is a________
(1) Window based word processor package
(2) Window based spreadsheet package
(3) DOS based spreadsheet package
(4) Window based accounting package
(5) None of these
Answer
(2) Spyware
4. Which of the following is a memory management technique that
makes the random access memory appear larger than it
is__________
(1) Byte mapping
(2) Preemptive multitasking
(3) Read-only memory
(4) Virtual memory
(5) None of these
Answer
(4) Executable
8. A set of step-by-step procedures for accomplishing a task is
known as a(n)________
(1) algorithm
(2) hardware program
(3) software bug
(4) firmware program
(5) None of these
Answer
(1) algorithm
9. The main directory of a disk is called the___________directory.
(1) root
(2) sub
(3) folder
(4) network
(5) None of these
Answer
(1) root
10.
(3) database
Set-47
1. Use this when you want to make all letters capital without
having to use the shift key for each character_________
(1) shifter
(2) upper case
(3) caps lock key
(4) icon
(5) None of these
Answer
(1) Firmware
3. What type of memory that must have a constant power supply
is_________
(1) SDRAM
(2) PROM
(3) ROM
(4) EEPROM
(5) None of these
Answer
(1) SDRAM
4. What is the full form of USB__________
(1) Universal Security Block
(2) Universal Security Bus
(3) Under Security Block
(4) Universal Serial Bus
(5) None of these
Answer
(3) Programs
6. Which of the following keyboard short-cut is used to center the
paragraph________
(1) Ctrl + C
(2) Ctrl + E
(3) Ctrl + L
(4) Ctrl + R
(5) None of these
Answer
(2) Ctrl + E
(2) NIC
9. Which of the following is true about CPU_________
(1) It contains electronic circuits that cause processing to occur
(2) It makes the information resulting from processing available for
use
(3) It allows data, programs, commands to be entered into a computer
(4) It is comprised of electronic components that store data
(5) None of these
Answer
(1) Mozilla
(2) IE
(3) CE
(4) Opera
(5) None of these
Answer
(3) CE
Set-48
1. Which of following is a Universal Gate____________
1) AND
2) OR
3) EX OR
4) NAND
5) None of these
Answer
4) NAND
2. Which layer layer of OSI determines the interface of the system
with the user_________
1) Network
2) Application
3) Data link
4) Session
5) None of these
Answer
2) Application
3. Rows of a relation are called_________
1) Relation
2) Tuples
3) Data structure
4) An entity
5) None of these
Answer
2) Tuples
4. The drawbacks of the binary tree sort are remedied by
the___________
1) Linear sort
2) Quick sort
3) Heap Sort
4) Insertion sort
5) None of these
Answer
3) Heap Sort
5. The ________ model remains operative until the software is
retired.
1) Waterfall model
2) Incremental model
3) Spiral model
4) Prototyping model
5) None of these
Answer
3) Spiral model
6. Which of the following TCP/IP protocol is used for remote
terminal connection
service_________
1) Telnet
2) RARP
3) FTP
4) All the above
5) None of these
Answer
1) Telnet
7. Through linked list one can implement_________
1) Stack
2) Graph
3) Queue
4) All of these
5) None of these
Answer
4) All of these
8. Which of the following is MP3_________
1) A mouse
2) A Printer
3) A Sound format
4) A Scanner
5) None of these
Answer
3) A Sound format
in a row_________
1) Hyperlink
2) Index
3) Transpose
4) Rows
5) None of the above
Answer
3) Transpose
Set-49
1. VLSI (Very Large Scale Integration) Integration Circuit
Technology was used in which generation___________
(1) first generation
(2) second generation
(3) third generation
(4) fourth generation
(5) None of these Ans
Answer
(2) Style
6. What is the shortcut key to Delete word to right of
cursor___________
(1) Ctrl + Del
(2) Ctrl + Backspace
(3) Ctrl + End
(4) Alt + Del
(5) None of these
Answer
(4) logic
8. DRAM stands for__________
(1) Decimal Randam Access Memory
(2) F2
10.
(1) .exe
(2) .xls
(3) .ppt
(4) .pst
(5) None of these
Answer
(3) .ppt
Set-50
1. Accumulator is a_________
(1) Hardwired unit
(2) Sequential circuit
(3) Finite state machine
(4) Register
(5) None of these
Answer
(4) Register
2. To minimize all open windows and display the
desktop___________
(1) Windows logo +D
(2) Windows logo + E
(3) Windows logo + F
(4) Windows logo + G
(5) None of these
Answer
(1) Protocol
(2) Program code
(3) Rules
(4) Flowchart
(5) None of these
Answer
(1) Protocol
5. Programming language built into user programs such as Word
and Excel are known as___________
(1) 4GLs
(2) Macro languages
(3) object-oriented languages
(4) visual programming languages
(5) None of these
Answer
(1) MCR
(2) MSI
(3) MIS
(4) RJE
(5) None of these
Answer
(2) MSI
8. One megabyte equals approximately ___________
1) 1,000 bits
2) 1,000 bytes
3) 1 million bytes
4) 1 million bits
5) 2,000 bytes
Answer
3) 1 million bytes
9. What is the ultimate purpose of Defragmentation_________
(1) Make the PC faster
(2) Create More Free Space
(3) Delete temporary files
(4) Reduce Power consumption
(5) none of these
Answer
Office___________
(1) Scanner
(2) Mouse
(3) Keyboard
(4) Joy stick
(5) Light pen
Answer
Set-51
1. Which of the following is graphics solution for Word
Processors__________
1) Clipart
2) WordArt
3) Drop Cap
4) All of above
5) None of these
Answer
A) Clipart
2. The keystrokes Ctrl + I is used to_________
1) Increase font size
2) Inserts a line break
3) Indicate the text should be bold
4) Applies italic format to selected text
5) None of these
Answer
1) 1
2) 1.25
3) 1.5
4) 2
5) None of these
Answer
B) 1.25
4. How can you increase the font size of selected text by one point
every time_______
1) By pressing Ctrl + ] 2) By pressing Ctrl + [
3) By pressing Ctrl + }
4) By pressing Ctrl + {
5) None of these
Answer
A) By pressing Ctrl + ]
5. Which of the following option is not available in Insert >>
Picture_________
1) Chart
2) Word Art
3) Clip Art
4) Graph
5) None of these
Answer
D) Graph
6. DOS floppy disk does not have ________
1) a boot record
2) a file allocation table
3) a root directory
4)virtual memory
5) None of the above
Answer
4)virtual memory
7. Which layer of OSI determines the interface of the system with
the user_________
1) Network
2) Application
3) Data link
4) Session
5) None of these
Answer
2) Application
8. The drawbacks of the binary tree sort are remedied by
the_________
1) Linear sort
2) Quick sort
3) Heap Sort
4) Insertion sort
5) None of these
Answer
4) Insertion sort
9. Rows of a relation are called________
1) Relation
2) Tuples
3) Data structure
4) An entity
5) None of these
Answer
2) Tuples
10.
Hypertext is a _________
Set-52
1. What kind of environment is Facebook or MySpace part
of_________
1) Wiki
2) Blog
3) Social networking
4) VoIP
5) None of these
Answer
Ans.) 3
Ans.) 4
3. What program would you use to gain administrative rights to
someones computer_______
1) Bot
2) Executive Android
3) Rootkit
4) Trojan horse
5) none of these
Answer
Ans.) 3
4. A __________ organizes the web into categories.
1) search engine
2) encyclopedia
3) archive
4) directory
5) None of these
Answer
Ans.) 4
Ans.) 3
6. A word in a web page that, when clicked, opens another
document_________.
1) anchor
2) URL
3) Hyperlink
4) reference
5) All of above
Answer
Ans.) 3
7. MCI and AT&T are examples of which of the
following_________
1) Social networks
2) Communications systems
3) Internet service providers
4) Mobisodes
5) None of these
Answer
Ans.) 3
Ans.) 3
9. Which of the following will not protect you from spam______
1) spam blockers
2) e-mail rules
3) popup blocker
4) filters
5) None of these
Answer
Ans.) 3
10.
Ans.) 2
Set-53
1. Which of the following is the direct entry input
device__________
1) Optical scanner
2) Mouse
3) Light pen
4) Digitizer
5) All of the above.
Answer
3) eight bits
4. Which of the following is the secondary memory
device___________
1) CPU
2) ALU
3) Floppy disk
4) Mouse
5) None of the above
Answer
3) Floppy disk
5. Which is the computer memory that does not
forget__________
1) ROM
2) RAM
3) PROM
4) All of the above
5) None of the above
Answer
1) ROM
6. A computer derives its basic strength from__________
1) Speed
2) Accuracy
3) Memory
4) all of the above
5) None of the above
Answer
1) Byte
8. Which can read data and convert them to a form that a
computer can use_________
1) Logic
2) Storage
3) Control
4) Input device
5) Output device
Answer
4) Input device
9. Software instruction intended to satisfy a users specific
processing needs are called_________
1) System software
2) A microcomputer
3) Documentation
4) Applications software
5) Output device
Answer
4) Applications software
10.
of technical knowledge________
1) Programmer
2) User
3) System analyst
4) Computer operator
5) Computer professional
Answer
2) User
Set-54
1. What Excel tool allows you to create quickly and automatically
summary data from a large data set_________
1) Conditional formatting
2) Sorting
3) Pivot tables
4) Field lists
5) None of these
Answer
3) Pivot tables
2. JavaScript was developed by _________ to run inside of web
pages.
1) Microsoft
2) Sun
3) Oracle
4) Netscape
5) None of these
Answer
4) Netscape
3. This technology is used to convert XML into HTML________
1) CSS
2) XHTML
3) PHP
4) XSL
5) None of these
Answer
4) XSL
4. The _________is a special database that holds information
about the computers user, installed programs and hardware
devices.
1) dynamic link library
2) initialization file
3) compiled help module
4) Windows Registry
5) None of these
Answer
4) Windows Registry
5. The color of an object is an example of a(n) __________.
1) attribute
2) detail
3) listing
4) specification
5) None of these
Answer
1) attribute
2) selection statement
7. The __________ prevents unlawful access to voice
communications by wire.
1) Electronic Communications Privacy Act
2) Freedom of Information Act
3) USA Patriot Act
4) Privacy Act of 1974
5) None of these
Answer
3) popup blocker
2) firewall
10.
__________ in Windows.
1) system manager
2) control panel
3) event viewer
4) message screen
5) None of these
Answer
3) event viewer
Set-55
1. A device for changing the connection on a connector to a
different configuration
is_________
1) a converter
2) a component
3) an attachment
4) an adapter
5) None of these
Answer
4) an adapter
2. A mistake in an algorithm that causes incorrect results is called
a________
1) logical error
2) syntax error
3) procedural error
4) compiler error
5) None of these
Answer
1) logical error
3. Which of the following information systems focuses on making
manufacturing
processes more efficient and of higher quality________
1) Computer-aided manufacturing
2) Computer-integrated manufacturing
3) Computer-aided software engineering
4) Computer-aided system engineering
5) None of these
Answer
2) Computer-integrated manufacturing
4. Which of the following must be contained in a URL_______
1) A protocol identifier
2) The letters www
3) The unique registered domain name
4) www. and the unique registered domain name
5) None of these
Answer
4) Multiplexing
6. Which of the following would you find on Linkedln________
1) Games
2) Connections
3) Chat
4) Applications
5) None of these
Answer
2) Connections
7. Your business has contracted with another company to have
thorn host and run an application for your company over the
Internet. The company providing this service to your business
is called an________
1) internet service provider
2) internet access provider
3) application service provider
1) ALU
9. A(n)________allows you to access your e-mail from anywhere.
1) forum
2) webmail interface
3) message board
4) weblog
5) None of these
Answer
2) webmail interface
10.
pull-down menu_______
1) The command is not currently accessible.
2) A dialog box appears if the command is selected.
3) A Help window appears if the command is selected.
Set-56
1. ________software creates a mirror image of the entire hard
disk, including the
operating system, applications, files, and data.
1) Operating system
2) Backup software
3) Utility programs
4) Driver imaging
5) None of these
Answer
4) Driver imaging
2. What is a URL_______
1) A computer software program
2) A type of programming object
3) The address of a document or page on the World Wide Web
4) An acronym for Unlimited Resources for Learning
5) None of these
Answer
end of every__________
1) line
2) sentence
3) paragraph
4) word
5) None of these
Answer
3) paragraph
4. What refers to a set of characters of a particular
design________
1) Keyface
2) Formation
3) Calligraph
4) Typeface
5) None of these
Answer
5) Typeface
5. ________is used by public and private enterprises to publish
and share financial information with each other and industry
analysts across all computer platforms and the Internet.
1) Extensible Markup Language (XML)
2) Extensible Business Reporting Language (XBRL)
3) Enterprise Application Integration (EAI)
4) Sales Force Automation (SFA) software
5) None of these
Answer
3) paragraph
1) Slide sorter
10.
mathematically.
1) cross-platform programming
2) 3GL business programming
3) event-driven programming
4) functional
5) None of these
Answer
4) functional
Set-57
1. The term host with respect to the internet, means ________
1) A computer that is a stand alone computer
2) A computer that is connected to the Internet
3) A computer reserved for use by the host
4) A large collection of computers
5) None of these
Answer
4) E-Society
3. In reference to your ethical structure, how much do you
identify with the person or persons who will receive the benefit
or suffer the harm is called which of the following________
1) Consequences
2) Relatedness
3) Likelihood of effect
4) Societys opinion
5) none of these
Answer
2) Relatedness
4. Which tracking program records every keystroke you make on
the computer_________
1) ITrack/ULead
2) eFollow
3) Key logger
4) Stalking software
5) none of these
Answer
3) Key logger
5. What is a common medium used for thieves to steal others
identities________
1) Telephone
2) Pick pocketing
3) Burglary
4) Email
5) none of these
Answer
4) Email
6. What is it called when you are rerouted from your requested
internet site to another, undesired site_______
1) Phishing
2) Pharming
3) Redirecting
4) Hijacking
5) None of these
Answer
2) Pharming
7. What is the term that refers to an ad hidden inside software
that you downloaded from an internet site________
1) Spam
2) Phish
3) Cookie
4) Adware
5) None of these
Answer
4) Adware
8. What type of monitoring file is commonly used on and accepted
from Internet sites_______
1) Phishes
2) Smartware
3) Cookies
4) Trojans
5) None of these
Answer
3) Cookies
9. Ideally, your sense of what is ethical should tell you which of
the following_______
1) What to do
2) Who to do it to
3) When to do it
4) Where to do it
5) None of these
Answer
1) What to do
10.
3) Spyware
Set-58
1. In an educational setting, instructors have access to and use a
whole host of copyrighted materials. What allows these
individuals to make use of these materials________
1) Patent laws
2) Fair Use Doctrine
3) Intellectual property laws
4) Higher educational board
5) All the above
Answer
2) A computer word
3. Where are the Editing group and the Replace command
found_______
1) On the Insert tab
2) On the Review tab
3) On the View tab
(2) physical
5. When two or more computers are able to share information,
what is this called_________
1) Shared systems
2) Interoperability
3) Information interchange
4) Data exchange
5) All the above
Answer
2) Interoperability
6. When there is little or no exchange of information within an
organizations information systems, we say that the systems
are _________.
1) independent
2) autonomous
3) self-sufficient
4) decentralized
5) None of these
Answer
4) decentralized
7. When we run a program in HTML coding _____ is used as
backend and ____ works as front-end.
1) Notepad Internet-Explorer
2) Notepad Msn-messenger
3) MS-Word Internet Explorer
4) Both (1) and (2)
5) None of these
Answer
1) Notepad Internet-Explorer
8. How can the user determine what programs are available on a
computer________
1) Checking the hard disk properties
2) Viewing the installed programs during the booting process
3) Checking the operating system for a list of installed
programs.
4) Checking the existing files saved on the disk
5) None of these
Answer
2) Processing
3) Saving
4) Editing
5) None of these
Answer
1) Booting
10.
(1) Paging
Set-59
1. CRC stands for________
1) Cyclic Read Check
2) Cyclic Redundancy Check
3) Cyclic Replicate Check
4) control message control
5) None of the above
Answer
1) arithmetic
3. A file extension is separated from the main file name with a(n)
______but no spaces.
1) question mark
2) exclamation mark
3) underscore
4) period
5) None of these
Answer
4) period
4. An ad hoc query is a_________
1) pre-planned question
2) pre-scheduled question
3) spur-of-the moment question
4) question that will not return any results
5) None of these
Answer
1) hub
2) site
3) story
4) template
5) None of these
Answer
2) site
6. A computer_________is a set of program instructions that can
attach itself to a file, reproduce itself, and spread.
to other files.
1) worm
2) virus
3) trojan horse
4) phishing scam
5) None of these
Answer
2) virus
7. _______ camera is a peripheral device used to capture still
images in a digital format that can be easily transferred into a
computer and manipulated using graphics software.
1) digital
2) analog
3) classic
4) film
5) None of these
Answer
1) digital
2) Nerve center
10.
1) LSI chips
2) Vacuum tubes
3) Valves
4) All the above
5) None of these
Answer
1) LSI chips
Set-60
1) @
2. The motherboard is the_______
1) circuit board that houses peripheral devices 2) same as the CPU chip
3) the first dup that is accessed when the
computer is turned on
4) circuit board that contains a CPU and other chips
5) None of these
Answer
(3) Frames
5. The _________ is the smallest meaningful unit of data.
1) cell
2) field
3) application
4) all of the above
5) none of these
Answer
2) field
6. Using output devices one can_________
1) input data
2) store data
3) scan data
4) view or print data
5) None of these
Answer
1) floppy diskette
2) hard disk
3) permanent disk
4) optical disk
5) None of these
Answer
2) hard disk
8. TCP stands for ________
1) Transfer control protocol
2) Transfer control process
3) Transmission control protocol
4) Transmission control process
5)None of these
Answer
2) MEM commands
10.
(4) A device, which controls the level of humidity in the computer room
(5) None of these
Answer
Set-61
1. Superscript, subscript, outline, emboss, engrave are known as
________
(1) font styles
(2) font effects
(3) word art
(4) text effects
(5) None of these
Answer
(4) HTML
3. Holding the mouse button down while moving an object or text
is known as _______
(1) Moving
(2) Dragging
(3) Dropping
(4) Highlighting
(5) None of these
Answer
(2) Dragging
4. What happens when we try to delete the fries on the
floppy________
(1) The files get moved to the Recycle Bin
(2) Files on a floppy cannot be deleted
(3) The files get deleted and can be restored again from Recycle Bin
(4) The files get deleted and cannot be restored again
(5) None of these
Answer
(2) .edu
6. Which of the following can input graphical images and pictures
for a computer_______
(1) Plotter
(2) Scanner
(3) Mouse
(4) Printer
(5) None of these
Answer
(2) Scanner
7. In Word you can force a page break________
(1) By positioning your cursor at the appropriate place and pressing
the F1 key
(2) By positioning your cursor at the appropriate place and pressing
Ctrl +Enter
(3) By using the Insert/Section Break
(4) By changing the font size of your document
(5) None of these
Answer
Accumulator is a ________
(4) Register
Set-62
1. An IPO chart consists of __________ columns.
1) three
2) four
3) five
4) unlimited
5) None of these
Answer
1) three
4) Windows Registry
3. The phrase _________describes viruses, worms, Trojan horse
attack applets, and attack scripts.
1) malware
2) spam
3) phish
4) virus
5) None of these
Answer
1) malware
4. A hacker contacts you my phone or email and attempts to
acquire your password__________
1) spoofing
2) phishing
3) spamming
4) bugging
5) None of these
Answer
2) phishing
1) web bug
6. In the right setting a thief will steal your information by simply
watching what you type_________
1) snagging
2) spying
3) social engineering
4) shoulder surfing
5) None of these
Answer
4) shoulder surfing
7. Algorithm and Flow chart help us to__________
1) Know the memory capacity
2) Identify the base of a number system
3) Direct the output to a printer
4) Specify the problem completely and clearly
5) None of these
Answer
2) impact
3) ink jet
4) thermal
5) None of these
Answer
2) impact
9. Which AI system finds and identifies patterns; for instance; in
the words you use_________
1) Expert system
2) Intelligent system
3) Neural network
4) Fuzzy logic
5) None of these
Answer
3) Neural network
10.
Set-63
4)Artificial intelligence
2. The name for the way that computers manipulate data into
information is called_____________
1) programming
2) processing
3) storing
4) organizing
5) None of these
Answer
2) processing
3. The Java program file extension is__________
1) .jav
2) .java
3) .ja
4) .jvm
5) None of the above
Answer
2) .java
4) Analytical Engine
5. The transformation of a message into an encoded form is
known as___________
1) Mnemonics
2) Encoding
3) Encryption
4) Decoding
5) None of these
Answer
2) Encoding
6. Which is device that interconnect two or more network,
enabling data transfer to be made between them________
1) Plotter
2) Joystick
3) Gateway
4) Path
5) None of these
Answer
3) Gateway
1) Card punch
8. The unit KIPS is used to measure the speed of__________
1) Processor
2) Disk drive
3) Printer
4) Tape drive
5) None of these
Answer
1) Processor
9. IC are classified on the basis of__________
1) Manufacturing company
2) Type of computer
3) Number of transistors
4) a and b
5) None of these
Answer
3) Number of transistors
10.
2) Segment number
3) Number of transistors
4) a and b
5) None of these
Answer
Set-64
1. ___________is the study of molecules and structures whose
size ranges from 1 to 100 nanometers.
1) Nanoscience
2) Microelectrodes
3) Computer forensics
4) Artificial intelligence
5) None of these
Answer
1) Nanoscience
2. _____ makes it possible for shoppers to make purchases using
their computers.
1) E-world
2) Ecommerce
3) E-spend
4) E-business
5) None of these
Answer
2) E-Commerce
2) virus
4. An Internet connection require_________
1) a personal computer
2) a modem
3) a dial-up telephone line
4) software to operate
5) all the above
Answer
power outage________
1) surge strip
2) USB
3) UPS
4) battery strip
5) None of these
Answer
3) UPS
7. To minimize all open windows and display the
desktop_________
1) Windows logo +D
2) Windows logo + E
3) Windows logo + F
4) Windows logo + G
5) None of these
Answer
1) Windows logo +D
8. In 1983, this person was the first to offer a definition of the
term computer virus_________
1) MC Fee
2) Smiths
3) Frederick Cohen
4) Norton
5) None of these
Answer
3) Frederick Cohen
(1) Protocol
10.
1) Hardware
2) Firmware
3) Software
4) utility
5) None of these
Answer
2) Firmware
Set-65
1. Where are data and program stored when the processor uses
them__________
(1) Main memory
(2) Secondary memory
(3) Disk memory
(4) Program memory
(5) None of these
Answer
(3) 400%
4. Which of the following is the proper way to denote a cell in a
spreadsheet_______
(1) 5C
(2) C5
(3) 2-15
(3) C
(4) None of these
Answer
(2) C5
(1) RAM
7. Select the Odd one________
(1) Operating system
(2) Interpreter
(3) Compiler
(4) Assembler
(5) None of these
Answer
(2) ROM
9. ___________ Store data temporarily and pass it on as directed
by the control unit.
(1) Address
(2) Register
(3) Number
(4) Memory
(5) None of these
Answer
(2) Register
10.
Set-66
1. An adder where all the bits of the two operands are added
simultaneously_______
(1) Parallel adder
(2) Half adder
(3) Full adder
(4) All of the above
(5) None of these
Answer
(2)
(2) SHIFT
(3) ESC
(4) F10
(5) None of these
Answer
(3) ESC
8. The ROM chip which can be rewritten several times and
requires the action of ultraviolet radiations to erase its contents
is________
(1) Flash memory
(2) PROM
(3) EEPROM
(4) EPROM
(5) None of these
Answer
(4) EPROM
9. FPI stands for_______
(1) Faults per inch
(2) Frames per inch
(3) Figure per inch
(4) Film per inch
(5) None of these
Answer
A terabyte comprises________
Set-67
1. The memory which is utmost accessible to the processor
is_____
(1) Cache memory
(2) RAM
(3) Hard disk
(4) Flash memory
(5) None of these
Answer
(1) A comment
5. BISYNC is an abbreviation for________
(1) Binary Input/Binary Output
(2) Binary synchronous
(3) Binary digit
(4) All of the above
(5) None of these
Answer
(4) F11
10.
(1) Winword.exe
(2) Word.exe
(3) Msword.exe
(4) Word2003.exe
(5) None of these
Answer
(1) Winword.exe
Set-68
1. What is RISC__________
(1) Storage Device
(2) Computer Network
(3) Microprocessor
(4) Operating System
(5) None of these
Answer
(3) Microprocessor
2. NORTON is an_________
(1) Software
(2) Anti-Virus Program
(3) Network
(4) Program
(5) None of these
Answer
(4) Gateway
7. The screen background is known as the________
(1) Application
(2) Window
(3) Desktop
(4) Frames
(5) None of these
Answer
(3) Desktop
8. What are the units used to count the speed of a
printer__________
(1) CPM
(2) DPI
(3) PPM
(4) BIT
(5) None of these
Answer
(2) DPI
9. _________Command we can use to close the windows.
(1) Alt+ F1
(2) Alt+ S
(3) Alt+ End
(4) Alt+F4
(5) None of these
Answer
(4) Alt+F4
10.
(2) CTRL+F6
Set-69
e) Search engines
2. Which one of the following is NOT a computer programming
language?
a) BASIC
b) C++
c) JAVA
d) COBOL
e) MS-Excel
Answer
e) MS-Excel
3. Workbook in MS-Excel is a collection of___________
a) Page Setup
b) Charts
c) Buttons
d) Documents
e) Worksheets
Answer
e) Worksheets
d) malware
5. A computer program that converts assembly language into
machine language is__________
a) Complicate
b) Computer
c) Intersection
d) Converter
e) Assembler
Answer
e) Assembler
6. While editing an MS Word document you accidentally losts text.
You should then use__________
a) Copy
b) Undo
c) Insert
d) Replace
e) Add
Answer
b) Undo
e) Cache
8. ALU is part of CPU in many computers. What does the acronym
ALC stand for?
a) Algorithm Logic Unit
b) Arithmetic Logical Unit
c) Auxiliary Logic Unit
d) Algorithmic Logical Unit
e) Arithmetic Logic Unit
Answer
b) Binary Digit
10.
Java is a__________.
a) Hardware Digit
b) High-level language
c) complier
d) low-level language
e) programming mid-level language
Answer
b) High-level language
Set-70
1. Who is known as the father of supercomputer_______
1) David J. Brown
2) Gene Amdahl
3) Adam Dunkels
4) Seymour Cray
5) None of these
Answer
4) Seymour Cray
2. Rotational delay time is also known as________
1) Seek time
2) Shift time
3) Latency
4) Access time
5) None of these
Answer
3) Latency
4) Storage capacity
4. Multiprocessor is a computer system________
1) Where many CPU under a common control
2) Consisting of more than one input devices under common control
3) Where many output devices under
4) All of the above
5) None of these
Answer
2) Dennis Ritchie
6. When NASSCOM (National Association of Software and Services
Companies) was established_______
1) 1988
2) 1997
3) 1993
4) 1882
5) None of these
Answer
1) 1988
7. An adder where all the bits of the two operands are added
simultaneously_______
1) Parallel adder
2) Half adder
3) Full adder
4) All of the above
5) None of these
Answer
1) Parallel adder
8. Who is known as the father of internet_______
1) Alan Perlis
2) Jean E. Sammet
3) Vint Cerf
4) Steve Lawrence
5) None of these
Answer
3) Vint Cerf
9. You can protect a floppy disk________
1) Read
2) Read and Write
3) Write
4) All of the above
5) None of thes
Answer
3) Write
10.
Set-71
1. Which term refers to the extent of detail provided in
information? For instance, some information may
provide summary information while others may provide a great
amount of detail_______
1) Information Depth
2) Aggregate Data
3) Information Granularity
4) Data Detail
5) None of these
Answer
3) Information Granularity
2) Flow
3. A daisy wheel is a type of_______
1) None of these
2) Storage device
3) Pointing device
4) All of the above
5) Printer
Answer
5) Printer
4. A ________ implementation will involve employees utilizing
one part at a time.
1) parallel
2) direct
3) phased
4) pilot
5) None of these
Answer
3) phased
3) Paper
6. A (n)_______is a program that makes the computer easier to
use.
1) Operating system
2) Application
3) Network
4) Utility
5) None of these
Answer
4) Utility
7. ______ cables carry data signals in the form of light?
1) Coaxial
2) Fiber-optic
3) Twisted-pair
4) all of above
5) None of these
Answer
2) Fiber-optic
8. The person contributing the idea of the stored program
was_________
1) Daniel Thomas
2) Charles Babbage
3) Howard Aiken
4) John Neumann
5) Dennis Ritenie.
Answer
4) John Neumann
9. Adding new features is typically performed during the
_________ phase.
1) implementation
2) needs analysis
3) development
4) maintenance
5) None of these
Answer
4) maintenance
10.
Storage that retains its data after the power is turned off is
referred to as_______
1) non-volatile storage
2) volatile storage
3) sequential storage
4) direct storage
5) None of these
Answer
1) non-volatile storage
Set-72
1) Cache memory
2. Which of the following is not an output device________
1) Scanner
2) Printer
3) Flat Screen
4) Mouse
5) Both 1 & 4
Answer
5) Both 1 & 4
3. PARAM and ANURAG is super computer developed in_________
1) China
2) USA
3) India
4) England
5) Japan
Answer
3) India
4. Which of the following device can store large amount of
data________
1) Floppy Disk
2) Hard Disk
3) CDROM
4) Zip Disk
5) None of these
Answer
2) Hard Disk
5. Memory is made up of________
1) Set of wires
2) Set of circuits
3) Large number of cells
4) All of the above
5) None of these
Answer
3) Ctrl + K
7. In MS Excel, what is the shortcut key to Create a formula to
sum all of the above cells________
1) Alt + =
2) Ctrl + =
3) Alt + Shift + =
4) Ctrl + Shift + =
5) Alt + Shift + /
Answer
1) Alt + =
8. In MS word short cut key CTRL +W is used for_______
1) Open the Print Dialog box
2) Update the current web page
3) Close the current window
4) Open the new window
5) None of these
Answer
1) WAN
10.
spreadsheet_________
1) Data, words, numbers
2) Equations, data, numbers
3) Words, numbers, labels
Set-73
1. Which of the following term is used to describe
RAM__________
(1) Dynamic RAM (DRAM)
(2) Static RAM (SRAM)
(3) Videc RAM (VRAM)
(4) None of these
(5) All of the above
Answer
(2) router
(3) server
(4) tunnel
(5) network
Answer
(5) network
7. Which file is responsible to start MS Word________
(1) Winword.exe
(2) Win.exe
(3) Word.exe
(4) Wordwin.exe
(5) None of these
Answer
(1) Winword.exe
8. Asynchronous communication is_________
(1)Communication between independent operating units
(2)Communication between dependent operating units
(3)Communication between independent and dependent operating
units.
(4)Communication within similar operating system
(5)None of these
Answer
(4) EBCDIC
(5) None of these
Answer
(4) EBCDIC
10.
(A) 600 MB
(B) 400 Floppy disk
(C) 320 MB
(D) Both (A) and (B)
(E) None of these
Answer
Set-74
1. What Excel tool allows you to create quickly and automatically
summary data from a large data set_________
1) Conditional formatting
2) Sorting
3) Pivot tables
4) Field lists
5) None of these
Answer
3) Pivot tables
2. JavaScript was developed by _________ to run inside of web
pages.
1) Microsoft
2) Sun
3) Oracle
4) Netscape
5) None of these
Answer
4) Netscape
3. The _________is a special database that holds information
about the computers user, installed programs and hardware
devices.
1) dynamic link library
2) initialization file
3) compiled help module
4) Windows Registry
5) None of these
Answer
4) Windows Registry
4. The __________ prevents unlawful access to voice
communications by wire.
1) Electronic Communications Privacy Act
2) Freedom of Information Act
3) USA Patriot Act
4) Privacy Act of 1974
5) None of these
Answer
1) system manager
2) control panel
3) event viewer
4) message screen
5) None of these
Answer
3) event viewer
6. Which of the following information systems focuses on making
manufacturing
processes more efficient and of higher quality________
1) Computer-aided manufacturing
2) Computer-integrated manufacturing
3) Computer-aided software engineering
4) Computer-aided system engineering
5) None of these
Answer
2) Computer-integrated manufacturing
7. ________is a technique that is used to send more than one call
over a single
line.
1) Digital transmission
2) Infrared transmission
3) Digitizing
4) Multiplexing
5) None of these
Answer
4) Multiplexing
anywhere.
1) forum
2) webmail interface
3) message board
4) weblog
5) None of these
Answer
2) webmail interface
Set- 75
1. In MS-Word alt + shift + d does what__________
(1) Automatically inserts the date
(2) Inserts the time
(3) Inserts the day
(4) All of the above
(5) None of these
Answer
Answer
(2) 1985
4. What happens when we try to delete the files on the
floppy_______
(1) The files get moved to the Recycle Bin
(2) Files on a floppy cannot be deleted
(3) The files get deleted and can be restored again from Recycle Bin
(4) The files get deleted and cannot be restored again
(5) The file gets copied on the Hard disk
Answer
Answer
Answer
Set- 76
1. What is the main difference between a mainframe and a super
computer_______
(1) Super computer is much larger than mainframe computers
(2) Super computers are much smaller than mainframe computers
(3) Supercomputers are focused to execute few programs as fast as
possible while mainframe uses its power to execute as many programs
concurrently
(4) Supercomputers are focused to execute as many programs as
possible while mainframe uses its power to execute few programs as
fast as possible
(5) None of these
Answer
(3)
2. Documentations should include_________
(1) Destination and users of the output data
(2) Press F2
4. Which of the following storage media provides sequential
access only________
(1) Floppy disk
(2) Magnetic disk
(3) Magnetic tape
(4) Optical disk
(5) None of these
Answer
(2) Buses
(3) Slide Master
(4) Consecutives
(5) None of these
Answer
(2) Buses
6. One byte represents________
(1) Eight characters
(2) Eight bits
(3) A single digit with two possible states
(4) A word
(5) None of these
Answer
called________
(1) International information system
(2) EDI
(3) Outsourcing
(4) Trans border data flow
(5) None of these
Answer
Set- 77
2) Bandpass filters
2. Encryption and decryption are functions of________
1) Transport layer
2) None of these
3) Presentation layer
4) Allot the above
5) Session layer
Answer
5) Session layer
3. Which type of switching uses the entire capacity of a dedicated
link ?
1) Datagram Packet Switch-ing
2) Virtual Circuit Packet Switching
3) Circuit switching
4) Message Switching
5) None of these
Answer
2) Data transfer
3) Connection release
4) Connection establishment
5) None of these
Answer
4) Connection establishment
5. The primary purpose of an operating system Is______
1) To make computers easier to use
2) To allow peopleto use the computer,
3) To keep systems programmers employed
4) To make the most efficient use of the computer hardware
5) none of the above
Answer
2) Bootstrap loader
7. Which of the following Operating systems is better for
Implementing a Client-Server network_____
1) MS DOS
2) Windows 2000
3) Windows 98
4) Windows 95
5) none of the above
Answer
2) Windows 2000
8. The operating system manages____
1) Processes
2) Disks and I/O devices/
3) Memory
4) all the above
5) none of the above
Answer
1) Memory management
2) Disk management
3) Virus Protection
4) Application management
5) none of the above
Answer
3) Virus Protection
Set- 78
1. The main directory of a disk is called the___________directory.
1) root
2) sub
3) folder
4) network
5) None of these
Answer
(1) root
2. Android Operating system is an example of which kind of
Source Model_________
1) Vertical Market Software
2) Open Source
3) Horizontal Market Software
4) Shareware
5) None of these
Answer
2) One-to-many relationship
3) Many-to-one relationship
4) Many-to-many relationship
5) None of these
Answer
1) One-to-one relationship
4. A heap allows a very efficient implementation of a__________
1) Double-ended queue
2) Priority queue
3) Stack
4) Trees
5) None of these
Answer
2) Priority queue
5. Which of the following is a popular programming language for
developing multimedia web pages, websites and web-based
applications_______
1) COBOL
2) Java
3) BASIC
4) Assembler
5) None of these
Answer
2) Java
6. Internet is an example of ____________network.
1) star
2) bus
3) hybrid
4) mesh
5) None of these
Answer
4) mesh
7. Which of the following is NOT a part of the operating
system__________
1) Performance monitor
2) Supervisor
3) Job-control program
4) I/O control program
5) None of these
Answer
1) Performance monitor
8. The most frequently used instructions of a computer program
are likely to be
fetched from________
1) the hard disk
2) cache memory
3) RAM
4) registers
Answer
2) cache memory
9. When you save to this, your data will remain intact even when
the computer is turned off_________
1) RAM
2) Secondary storage device
1) Read
2) Read and write
3) System Software
4) Applications Software
5) None of the above
Answer
1) Read
Set- 79
1. Which of the following are the two essential parts of the
computer________
(1) Keyboard & Mouse
(2) Hardware & Software
(3) Printer & Screen
(4) Monitor & Keyboard
(5) None of these
Answer
(2) transistor
4. Cursor is a ______
(1) Pixel
(2) Thin blinking line
(3) Pointing device
(4) Track Ball
(5) None of these
Answer
(2) Start
8. ______Is the Virus that overwrites the files or a few parts
being replaced?
(1) Resident
(2) File infectors
(3) Boot virus
(4) Macro virus
(5) None of these
Answer
(1) Reliability
10.
Set- 80
(4) Keyboard
(4) Joystick
What does a light pen contain_______
(1) Refillableink
(2) Light sensitive elements
(3) Pencil lead
(4) Blue Ink
(5) None of these
Answer
(5) Printer
Factory production lines can be automated using______
(1) Machine tools
(2) VDUs
(3) Plotters
(4) All of the above
(5) None of these
Answer
(2) VDUs
Set- 81
1. Computer memory that temporarily stores information is called
the________
(1) RAM
(2) CPU
(3) ROM
(4) IBM
(5) None of these
Answer
(1) RAM
2. What is the BEST ram solution for the Intel Pentium 4
Processor_________
(1) SDRAM
(2) DDR SDRAM
(3) EDO/Fast Page Ram
(4) Rambuss
(5) None of these
Answer
(1) SDRAM
3. The operating system is also called the ______ between the
user and the computer.
(1) interrelate
(2) interface
(3) interference
(4) intermediate
(5) None of these
Answer
(2) interface
4. When installing a peripheral you also usually need to install
a__________
(1) port
(2) server
(3) driver
(4) password
(5) None of these
Answer
(3) driver
5. Computers use which of the following number systems to store
information_________
(1) base 4
(2) base 2
(3) base 8
(4) base 10
(5) None of these
Answer
(2) base 2
6. What motherboard manufacturer is the most popular out of the
following_________
(1) Abit
(2) AOpen
(3) IWill
(4) Asus
(5) None of these
Answer
(4) Asus
7. Internet Safety relates to_________
(1) only those who buy products online
(2) only those who sign up for chat rooms
(3) only those who do their banking online
(4) everyone who uses a computer that can conned to the Internet
(5) None of these
Answer
(3) .docx
9. How many pins on a standard DDR RAM Dimm_________
(1) 64
(2) 256
(3) 168
(4) 184
(5) None of these
Answer
(4) 184
10.
in__________
(1) Socket 370 / Socket mPGA 370 / Slot 1
(2) Socket 462 / Slot A /Socket 8
(3) Socket 5 / Socket 7 /Socket 3
(4) Slotl/Slot A/Socket A
(5) None of these
Answer
Set- 82
1. Which function calculates your monthly mortage
payment________
(1) PMT (payments)
(2) NPER (number of periods)
(3) PV (present value)
(4) All of above
(5) None of these
Answer
(4) Data
3. In MS Access, a table can have________primary key /keys.
(1) One
(2) Two
(3) Three
(4) Four
(5) None of these
Answer
(1) One
4. _______cells involves creating a single cell by combining two
or more selected cells.
(1) Formatting
(2) Merging
(3) Embedding
(4) Splitting
(5) None of these
Answer
(2) Merging
5. The horizontal and vertical lines on a worksheet are
called________
(1) cells
(2) sheets
(3) blocklines
(4) gridlines
(5) None of these
Answer
(1) cells
6. The most common subtotal used Subtotals command is
the________function, which causes Excel to display a sum
each time the corurol field change.
(1) ADD
(2) SUM
(3) TOTAL
(4) LIST
(5) None of these
Answer
(2) SUM
7. By default, Excel positions text in a cell_______
(1) left-aligned
(2) right-aligned
(3) centered
(4) justified
(5) None of these
Answer
(1) left-aligned
8. To centre a paragraph using shortcut keys, press_______
(1) CTRL + C
(2) CTRL + E
(3) CTRL + L
(4) CTRL + R
(5) None of these
Answer
(2) CTRL + E
9. Which types of charts can excel produce________
(1) Line graphs and pie charts only
(2) Only line graphs
(3) Bar charts, line graphs and pie charts
(4) Bar charts and line graphs only
(5) None of these
Answer
Set- 83
4)virtual memory
The ________ component is used by the data analyst to create queries that access the
database.
1) data store
2) query and reporting
3) ETL tools
4) data visualisation
5) None of these
Answer
4) Encryption
5) None of these
Answer
4) Encryption
Which of the following is a general-purpose programming language designed by Sun
Microsystems and well suited for use on the web________
1) Java
2) Java Script
3) CSS
4) VBS Script
5) None of these
Answer
1) Java
________ are used to identify a user who returns to a website.
1) ASPs
2) Scripts
3) Cookies
4) Plug-ins
5) None of These
Answer
3) Cookies
Programs that automatically submit your search request to several search engines
simultaneously are called ________
1) Hits
2) Webcrawlers
3) Spiders
4) Metasearch engines
5) None of these
Answer
4) Metasearch engines
If you wanted to locate the hardware address of a local device, which protocol would you
use_______
1) PING
2) ICMP
3) ARP
4) RARP
5) PONG
Answer
3) ARP
In Oracle, which is more appropriate to store a small list of values in a single column in
each row in your address table________
1) Index
2) Nested table
3) Oracarray
4) Varray
5) Index
Answer
4) Varray
OLAP applications are widely used by ________ and it uses ________ scheme.
1) RDBMS, Bus
2) Java, Bus
3) Operating System, Star
4) Data mining techniques, star or multidimensional
5) None of these
Answer
Set- 84
1. What is the term for how words will appear on a page________
a) Text formatting
b) Character formatting
c) Point size
d) Typeface
e) None of these
Answer
a) Text formatting
2. The process of a computer receiving information form a server
on the Internet is known as_______
a) Pulling
b) Pushing
c) Downloading
d) Transfering
e) None of these
Answer
c) Downloading
3. A directory within a directory is called________
a) Mini Directory
b) Junior Directory
c) Part Directory
d) Sub Directory
e) None of these
Answer
d) Sub Directory
4. Which of the following refers to too much electricity and may
cause a voltage surge_______
a) Anomaly
b) Shock
c) Spike
d) Virus
e) None of these
Answer
c) Spike
5. ________ is a windows utility program that locates and
eliminates unncessary fragments and rearranges filed and
unused disk space to optimize operations.
a) Backup
b) Disk cleanup
c) Disk defragmenter
d) Restore
e) None of these
Answer
c) Disk defragmenter
6. Saving files in HTML format________
a) Makes it possible for anyone to view the file in a Web browser
b) Increases file conversion costs
c) Decreases software compatibility
d) All of the above
e) None of these
Answer
d) Press F5
e) None of these
Answer
b) Press F2
9. ________is a technique that is used to send more than one call
over a single line.
a) Digital transmission
b) Infrared transmission
c) Digitizing
d) Multiplexing
e) None of these
Answer
d) Multiplexing
10.
spreadsheet_________
a) Data, words, numbers
b) Equations, data, numbers
c) Words, numbers, labels
d) Numbers, formulas, labels
b) None of these
Answer
Set- 85
1. ________software creates a mirror image of the entire hard
disk, including the operating system, applications, files, and
data.
1) Operating system
2) Backup software
3) Utility programs
4) Driver imaging
5) None of these
Answer
4) Driver imaging
2. When entering text within a document, the Enter key is
normally pressed at the end of every________
1) line
2) sentence
3) paragraph
4) word
5) None of these
Answer
3) paragraph
3. What refers to a set of characters of a particular
design________
1) Keyface
2) Formation
3) Calligraph
4) Typeface
5) None of these
Answer
4) Typeface
(2) physical
2) Interoperability
8. A(n)________language reflects the way people think
mathematically.
1) cross-platform programming
2) 3GL business programming
3) event-driven programming
4) functional
5) None of these
Answer
4) functional
9. How can the user determine what programs are available on a
computer________
1) Checking the hard disk properties
2) Viewing the installed programs during the booting process
3) Checking the operating system for a list of installed programs.
4) Checking the existing files saved on the disk
5) None of these
Answer
10.
1) Slide sorter
Set- 86
1. When entering text within a document, the Enter key is
normally pressed at the end of every________
(1) line
(2) sentence
(3) paragraph
(4) word
(5) None of these
Answer
(3) paragraph
2. Which of the following refers to too much electricity and may
cause a voltage surge_______
(1) Anomaly
(2) Shock
(3) Spike
(4) Virus
(5) None of these
Answer
c) Spike
3. What input device could tell you the price of_______
(1) Mouse a bar of chocolate
(2) All of the above
(3) Optical mark reader
(4) Bar code reader
(5) None of these
Answer
4) Encryption
5. The most common subtotal used Subtotals command is
the________function, which causes Excel to display a sum each
time the corurol field change.
(1) ADD
(2) SUM
(3) TOTAL
(4) LIST
(5) None of these
Answer
(2) SUM
6. The operating system is also called the ______ between the
user and the computer.
(1) interrelate
(2) interface
(3) interference
(4) intermediate
(5) None of these
Answer
(2) interface
7. If you wanted to locate the hardware address of a local device,
which protocol would you use_______
(1) PING
(2) ICMP
(3) ARP
(4) RARP
(5) PONG
Answer
3) ARP
8. ODBC is based on ________
1) C++ language
2) RDBMS
3) Structured Query Language
4) .net language
5) C language
Answer
(2) VDUs
10.
1) a boot record
2) a file allocation table
3) a root directory
4) virtual memory
5) None of the above
Answer
4)virtual memory
Set- 87
1. Which of the following systems mimics human thinking?
a) Artificial intelligence
b) Intelligent agent
c) Bot
d) None of these
Answer
a) Artificial intelligence
a) Energy Star
3. An IPO chart consists of __________ columns.
a) three
b) four
c) five
d) None of these
Answer
a) three
4. SIM means_______
a) Speed In Mobile
b) Special Identity Module
c) Subscriber Identity Module
d) None of These
Answer
c) algorithm
d) None of these
Answer
c) algorithm
6. __________ are built around special program flow constructs
called conditional statements.
a) Selection structures
b) Sequence structure
c) Repetition structures
d) None of these
Answer
a) Selection structures
7. Which of the following systems would be used for geocaching?
a) Genetic algorithm
b) Intelligent agent
c) Geographical information system
d) None of these
Answer
a) MAN
a) Intelligent agent
b) Expert system
c) Geographical information system
d) None of these
Answer
b) Expert system
Set- 88
1. To print the power point presentation, press________
a) Ctrl + K
b) Ctrl + T
c) Ctrl + P
d) None of These
Answer
c) Ctrl + P
2. Shortcut key for Subscript is_______
a) Ctrl + =
b) Ctrl +
c) Ctrl + Shift + =
d) None of These
Answer
a) Ctrl + =
3. We can detect spelling and grammar error by________
a) Press Shift + F7
b) Press F7
c) Press Alt + F7
d) None of These
Answer
b) Press F7
4. Shortcut Key for font dialog box is_________
a) Ctrl + F
b) Ctrl + G
c) Ctrl + D
d) None of These
Answer
c) Ctrl + D
5. Which is not he function of Operating System________
a) Virus Protection
b) Application Management
c) Disk Management
d) None of These
Answer
a) Virus Protection
c) RAM
7. Home offices often purchase __________to solve printing and
scanning needs
a) all-in-one peripherals
b) photocopiers
c) ink-jet printers
d) None of the
Answer
a) all-in-one peripherals
8. For a home user that has casual printing needs, the
__________ specification is the most important specification of
a printer.
a) speed
b) cost of use
c) resolution
d) None of the
Answer
b) cost of use
9. PPP stands for________
a) Point Power Protocol
b) Point-to-Point Protocol
10.
network called?
a) System Address
b) SYSID
c) IP Address
d) None of these
Answer
c) IP Address
Set- 89
1. DOS file names are restricted to________
a) 5 Characters
b) 6 Characters
c) 8 Characters
d) None of These
Answer
c) 8 Characters
2. OLE stands for_______
a) Operational Linking and Enabling
b) Object Linking and Enabling
a) Title Bar
4. Open, Print and Save display on________
a) Menu Bar
b) Standard Tool Bar
c) Title Bar
d) None of These
Answer
c) MS Power Point
7. Slides prepares in_______
a) MS Word
b) MS Power Point
c) MS Excel
d) None of These
Answer
b) MS Power Point
8. Full form of DBMS_______
a) Data Base Management System
b) Document Base Management System
c) Digital Base Management System
d) None of These
Answer
Answer
Set- 90
URL stands for________
a) Uniform Resource Locator
b) Universal Region Locator
c) Uninterrupted Resource Locator
d) None of These
Answer
Answer
d) Binary
The transmission mode which allows both communicating devices to
transmit and receive data simultaneously is________
a) Full Duplex
b) Simplex
c) Half Duplex
d) Simple Complex
e) None of These
Answer
a) Full Duplex
Which of the following is not related to the Internet and Web
Development_______
a) HTML
b) DOS
c) Internet Explorer
d) CSS
e) None of These
Answer
b) DOS
MP3 is a__________
a) Sound Format
b) Printer
c) Mouse
d) Scanner
e) None of These
Answer
a) Sound Format
Set- 91
c) Knuth
3. Which of the following is not a internet protocol________
a) STP
b) HTTP
c) FTP
d) None of These
Answer
a) STP
4. Which of the following is not a computer_________
a) Acorn
b) Aptiva
c) Paseo
d) None of These
Answer
c) Paseo
5. Computer calculate number in ______mode.
a) Octal
b) Decimal
c) Binary
d) None of These
Answer
c) Binary
6. GUI stands for________
a) Graphical User Interface
b) Graphic User Interchange
c) Graphical User Interaction
d) None of These
Answer
c) Charles Babbage
8. Hard Copy refers to__________
a) Hardware
b) Print Out of Document
b) Cache Memory
10.
computer________
a) Software
b) Motherboard
c) Keyboard
d) None of These
Answer
b) Motherboard
Set- 92
a) Ctrl + H
Which Operating System does not support long file names________
a) Window NT
b) MS DOS
c) Windows 95
d) None of These
Answer
b) MS DOS
The unit KIPS is used to measure the speed of ________
a) Processor
b) Disk drive
c) Printer
d) None of these
Answer
a) Processor
What is the most common repetitive-stress injury?
a) Carpal tunnel syndrome
b) Headache
c) Cumulative trauma disorder
d) None of these
Answer
c) Ctrl + Shift + =
Shortcut Key for insert hyperlink in document is________
a) Ctrl + H
b) Ctrl + K
c) Ctrl + L
d) None of These
Answer
b) Ctrl + K
Set- 93
1. Which device connects LAN to Internet________
a) HTML
b) Bridge
c) Router
d) None of These
Answer
c) Router
2. Dot matrix and band printers are __________ printers.
a) laser
b) impact
c) ink jet
d) None of the
Answer
b) impact
3. Which of the following measures the speed of dot-matrix
printers?
a) ppm
b) dpi
c) cps
d) None of the
Answer
c) cps
4. In a laser printer, the __________ transfers the image to the
paper
a) laser
b) roller
c) drum
d) None of these
Answer
c) drum
5. What is the address given to a computer connected to a
network called?
a) System Address
b) SYSID
c) IP Address
d) None of these
Answer
c) IP Address
6. CPU is stands for_______
a) Control Processing Unit
b) Computer Programming Unit
c) Central Processing Unit
d) None of These
Answer
c) m-Commerce
8. Programs stored in ROM are called_________
a) Hardware
b) Firmware
c) Software
d) None of these
Answer
b) Firmware
9. Which government organization may possibly provide and
enforce regulations in the near future concerning ergonomics in
the workplace?
a) FCC
b) SEC
c) OSHA
d) None of these
Answer
c) OSHA
10.
Set- 94
1. Home offices often purchase __________to solve printing and
scanning needs
a) all-in-one peripherals
b) photocopiers
c) ink-jet printers
d) None of the
Answer
a) all-in-one peripherals
2. For a home user that has casual printing needs, the
__________ specification is the most important specification of
a printer.
a) speed
b) cost of use
c) resolution
d) None of the
Answer
b) cost of use
3. The phrase __________ describes viruses, worms, Trojan horse
attack applets, and attack scripts.
a) malware
b) spam
c) phish
d) None of these
Answer
a) malware
4. RAM stands for_________
a) Read Access Memory
b) Random Access Memory
c) Rewritable Access Memory
d) None of These
Answer
c) Windows Registry
d) None of these
Answer
c) Windows Registry
6. Ctrl + S is for_______
a) To Italic
b) To Redo
c) To Save
d) None of These
Answer
c) To Save
7. A(n) __________ converts all the source code into machine
code, creating an executable file.
a) linker
b) compiler
c) assembler
d) None of these
Answer
b) compiler
8. Sending an E-mail is similar to________
a) Drawing a Picture
b) Talking On the Phone
c) Writing a Letter
d) None of These
Answer
c) Writing a Letter
Set- 95
1. A screen element of MS Word that is usually located below the
title bar that provides categorized options is________.
(1) Menu mar
(2) Tool Bar
(3) Status Bar
(4) Formula Bar
(5) Ruler Bar
Answer
(2) PROM
(3) MIPS
Set- 96
1. The desktop of a computer refers to ________.
(1) The Visible Screen
(2) The area around the monitor
(3) The top of mouse pad
(4) The inside of a folder
(5) My documents
Answer
(4) Centered
3. What is the maximum scale percentage available in Scale drop
down box?
(1) 500
(2) 200
(3)100
(4) 90
(5) 250
Answer
(2) 200
4. The communications device that allows the computer to access
a network is called a ______ card.
(1) Modem
(2) Video
(3) Sound
(4) Network
(5) Interface
Answer
(4) Network
(3)SRAM
8. The System BIOS and ROM chips are called ____
(1) Software
(2) Firmware
(3) Hardware
(4) Bootware
(5) Motherboard
Answer
(2) Firmware
9. In a document what is the maximum number of columns that
can be inserted in MS Word Table?
(1) 35
(2) 15
(3) 63
(4) 65
(5) 66
Answer
(3) 63
10.
(4) Press F7
Set- 97
1. Which Of the following controls the manner of interaction
between the user and the operating system?
(1) keyboard
4. Use ______, When you want to make all letters capital without
having to use the shift key for each character.
(1) shifter
(2) Data in ROM is nonvolatile, that is, it remains there even without
electrical power
6. To make a notebook act as a desktop Model, the notebook can
be connected to a _____which is connected to a monitor and
other devices.
(1) bay
(2) docking station
(3) port
(4) network
(5) drive
Answer
(4) printers
8. When your computer stops working suddenly. it is referred to
as a ________.
(1) crash
(2) die
(3) death
(4) penalty
(5) fault tolerance
Answer
(1) crash
9. To make the number pad act as directional arrows, you press
the _____ key.
(1) num lock
(2) caps lock
(3) arrow lock
(4) shift
(5) insert
Answer
Set- 98
1. What are individual boxes in spreadsheets called?
(1) Rows
(2) Columns
(3) Grid
(4) Containers
(5) Cells
Answer
(5) Cells
2. What year was Windows XP released?
(1) 1999
(2) 2001
(3) 2003
(4) 2005
(5) 1990
Answer
(2) 2001
3. A device or system connected to a network is also called what?
(1) Branch
(2) Leaf
(3) Node
(4) Block
(5) Hop
Answer
(3) Node
4. What is the purpose of a file extension?
(1) It ensures each file has a unique filename.
(2) It makes the file visible to the user.
(3) It identifies the file type.
(4) It prevents the file from being overwritten.
(5) It ensures each file has a unique file number
Answer
(4) Nybble
(3) 0x64
7. What company originally developed Flash?
(1) Microsoft
(2) Corel
(3) Symantec
(4) Macromedia
(5) Adobe
Answer
(4) Macromedia
8. What do the I and O stand for in I/O?
(1) In / Out
(2) Inside / Outside
(3) Input / Output
(4) Instream / Outstream
(5) Inbound/ Outbound
Answer
(3) 1,000,000
(4) 1,000,000,000
(5) 100000
Answer
(2) 1,000
10.
language?
(1) Apple
(2) Microsoft
(3) IBM
(4) Borland
(5) Dell
Answer
(2) Microsoft
Set- 99
(2) Laser
MAN stands for __________.
(1) Maximum Area Network
(2) Minimum Area Network
(3) Main Area Network
(4) Metropolitan Area Network
(5) Maintenance Area Network
Answer
(4) BUS
Which of the following is a type of network________
(1) Ring
(2) Bus
(3) Star
(4) PAN
(5) Mesh
Answer
(4) PAN
VOIP stands for_________.
(1) Voice Over IP
(2) Video Over IP
(3) Viruses Over IP
(4) Virtual Over IP
(5) Vertical Over IP
Answer
(3) Protocol
(2) Editors
Which of the following is a part of the Central Processing Unit?
(1) Printer
(2) Key board
(3) Mouse
(4) Arithmetic & Logic unit
(5) Logic Unit
Answer
Set- 100
1. You organize files by storing them in _______.
(1) archives
(2) folders
(3) indexes
(4) lists
(5) document
Answer
(2) folders
(1) Printers
3. CAD stands for ________.
(1) Computer Aided Design
(2) Computer Algorithm for Design
(3) Computer Application in Design
(4) Computer Analogue Design
(5) Computer Analyses Design
Answer
(4) Pointer
(5) Mouse
Answer
(2) Cursor
9. The term bandwidth refers to _________.
(1) How much data can be sent through a connection
(2) The amount of data in a multimedia file
(3) How fast your computer is
(4) How much e-mail can be sent through a connection
(5) How much video can be sent through a connection
Answer
(2) Cntrl +Z
Set- 101
1. While browsing the internet, which of the following key is used
for full screen view?
(1) F3
(2) F5
(3) F11
(4) F9
(5) F6
Answer
(3) F11
2. To see the document before the printout is taken, use________
(1) Insert Table
(2) Paste
(3) Cut
(4) Print Preview
(5) Print Layout
Answer
(1) RAM
4. Another name for a pre-programmed formula in Excel
is________
(1) range
(2) graph
(3) function
(4) cell
(5) Label
Answer
(3) function
5. To move data from one part of the document to another,
__________ is used.
(1) Cut and Paste
(2) Copy and Paste
(3) Copy and Undo
(4) Cut an Delete
(5) All
Answer
(3) Registers
7. The ALU performs ____ operations.
(1) Arithmetic and logical
(2) ASCII
(3) Logarithm-based
(4) Algorithm-based
(5) Algebric- based
Answer
(1) hardware
9. In a sequence of events that takes place in an instruction cycle,
the first cycle is_______
(1) Store cycle
(2) Execute cycle
(3) Decode cycle
(4) Fetch cycle
(5) Restore cycle
Answer
(1) Keyboard
(2) Disk
(3) Mouse
(4) ALU
(5) RAM
Answer
(2) Disk
Set- 102
1. Which of the following is not an example of hardware?
(1) word
(2) Printer
(3) Mouse
(4) Monitor
(5) Scanner
Answer
(1) word
2. Pick the wrong statement__________
(1) Banks educational institutions & insurance companies use
mainframe computers to store data about
their customers
(2) Desktop computers, laptops, personal digital assistant (PDA),
tablets & smartphones are all types of microcomputers.
(3) Minicomputers are used by small businesses & firms.
(4) Some super computers can span an entire building.
(5) Supercomputer are not as powerful as Mainframes.
Answer
Answer
(4) Monitor
4. Which of the following is not an input device?
(1) Joystick
(2) Touch Screen
(3) Optical Scanner
(4) Headphone
(5) Bar Code Reader
Answer
(4) Headphone
5. Which of the following is not true about computer files?
(1) They are collections of data saved to a storage medium
(2) Every file has a filename.
(3) A file extension is established by the user to indicate the computer
on which it was created
(4) All files contain data
(5) Files can be created in Word, Excel and PowerPoint.
Answer
Answer
(2) Ethernet
9. Ctrl + D is short cut used for ________.
(1) Open Dialogue Box
(2) Font Dialogue Box
(3) Save as Dialogue Box
(4) Save Dialogue Box
(5) Print Dialogue Box
Answer
in a row?
(1) Transpose
(2) Index
(3) Rows
(4) Hyperlinks
(5) Reverse
Answer
(1) Transpose
Set- 103
1. In terms of network what is meaning of SAP?
(1) Smart Access Point
(2) Service Access Point
(3) Service At Point
(4) Service Access Permission
(5) Service At Permission
Answer
(2) Port
5. What menu is selected for printing?
(1) Edit
(2) Special
(3) File
(4) Tools
(5) Insert
Answer
(3) File
(1) Terminal
9. What word describes inserting data from the clipboard?
(1) Add
(2) Copy
(3) Cut
(4) Paste
(5) Insert
Answer
(4) Paste
10.
(1) Android
(2) Ios
(3) iMac
(4) Mac OS X
(5) Apple
Answer
(2) Ios
Set- 104
1. Which of the following is a good habit to get into when creating
a worksheet?
(1) Placing titles for columns in the first row of data
(2) Using conditional formatting to spot spelling errors
(3) Inserting comments in each cell to define that data or type of data
(4) Grouping records according to some classification
(5) None of these
Answer
environment?
(1) Database
(2) Web site
(3) Wiki
(4) Relation
(5) None of these
Answer
1) Database
3. Microsofts Access and Corels Paradox are both examples of
which type of software?
(1) Network database systems
(2) Relational database systems
(3) Flat-file database systems
(4) Hierarchical database systems
(5) None of these
Answer
2) E-R diagram
5. After you develop a model for your database, you should then
_____ it before building it.
(1) normalize
(2) design
(3) plan
(4) approve
(5) None of these
Answer
1) normalize
6. Which of the following contains information about the structure
of a database?
(1) Database management system
(2) Data dictionary
(3) Data repository
(4) Data warehouse
(5) None of these
Answer
2) Data dictionary
7. The rules of a language are called its __________.
(1) structure
(2) code
(3) syntax
(4) rigidity
(5) None of these
Answer
3) syntax
8. A language that can be written on one platform and executed
on another platform is said to be __________.
(1) portable
(2) robust
(3) third generation
(4) dynamic
(5) None of these
Answer
1) portable
9. __________ is Microsofts latest entry into the programming
arena.
(1) Java
(2) .NET
(3) Visual Basic
(4) Pascal
(5) None of these
Answer
2) .NET
10.
3) XML
Set- 105
(3) Program
(4) Debugger
Answer
(3) Program
5. The primary purpose of software is to turn data into________
(1) Web sites
(2) Information
(3) Programs
(4) Objects
Answer
(2) Information
6. A compiler translates a program written in a high level
language into________
(1) Machine language
(2) An algorithm
(3) A debugged program
(4) Java
Answer
(2) Windows
8. The secret code that restricts entry to some programs
is_________
(1) Password
(2) Passpost
(3) Entry code
(4) Access code
Answer
(1) Password
9. The two major categories of software include_________
(1) Operating system and utility
(2) Personal productivity and system
(3) System and application
(4) System and utility
Answer
(1) Compiling
(2) Testing
(3) Running
(4) Debugging
Answer
(2) Testing
Set- 106
Ans C. Optical
2. What is the ultimate purpose of Defragmentation ?
A. Make the PC faster
B. Create More Free Space
C. Delete temporary files
D. Reduce Power consumption
Answer
Ans A. Routing
7. Select the best description of Read Only Memory(ROM)
A. Volatile used to store information that does not change during
system operation
10.
Ans B. WAN
Set- 107
1. A computer virus normally attaches itself to another computer
program known as a ________
A. Host Program
B. Target Program
C. Backdoor Program
D. Trojan Horse
E. None of the Above
Answer
Ans C. executable
4. When you first turn on a computer, the CPU is preset to execute
instructions stored in ________
A. RAM
B. Flash memory
C. ALU
D. ROM
E. Other than those given as options
Answer
Ans D. ROM
5. Documents converted to ________ can be published to the
web.
A. a doc file
B. http
C. machine language
D. HTML
E. Other than those given as options
Answer
Ans D. HTML
6. Which of the following is not a function of the Control Unit?
A. Read Instructions
B. Interpret Instructions
C. Execute Instructions
D. Direct Operations
E. Provide Control Signals
Answer
Ans E. Clipboard
8. Data duplication wastes the space, but also promotes a more
serious problem called ______
A. Isolated data
B. Data inconsistency
C. Other than those given as options
D. Program dependency
E. Separated data
Answer
Ans B. Bridge
10.
A. They are the same just two different terms used by different
manufacturers
B. A CD-ROM can be written to and a CD-RW can not
C. Other than those given as options
D. A CD-ROM holds more information than a CD-RW
E. A CD-RW can be written to but a CD-ROM can only be read from
Answer
Set- 108
1. ________ includes boot firmware and power management.
A. CD ROM
B. Internal buses
C. BIOS
D. Chip set
E. RAM
Answer
Ans C. BIOS
2. Printing orientation that is wider that it is taller is ______
A. portrait concentration
B. icon
C. page set
D. landscape orientation
E. wide-angle
Answer
Ans E. RAM
4. What is the name of the device that links your computer with
other computers and information services through telephone
lines?
A. Modem
B. LAN
C. URL
D. WAN
E. Server
Answer
Ans A. Modem
5. What is an on-screen display listing of available options or
functions on a computer?
A. document
B. view
C. tool
D. format
E. menu
Answer
Ans E. menu
6. A word used in computing in a search to match a desired topic
is called _______
A. ID name
B. Hint
C. passsword
D. user
E. keyword
Answer
Ans E. keyword
7. What is a stored question about information in a data-base?
A. Query
B. Sort
C. Report
D. Record
E. Field
Answer
Ans A. Query
8. Which of the following is a function of a microprocessor?
A. decode
B. execute
C. fetch
D. store
E. All of the above
Answer
Ans E. Prompt
Set- 109
1. In which language barcode is written?
A. Binary language
B. Machine language
C. HTML
D. CSS
E. None of the Above
Answer
Ans A. Peripheral
3. Which of the following correctly explains monitor?
A. Electronic Visual Display
B. Peripheral
C. Input around the Desktop area
D. Pixel based smart Area
E. Both (B) and (D)
Answer
Ans B. Processing
5. RFID stands for
A. Radio Frequency Instant Download
B. Remote Frequency Instant Download
C. Radio Frequency Identification
D. Remote Frequency Identification
E. None of the Above
Answer
Ans B. Porting
7. In computing, a _______ is a directive to a computer program
in order to perform a specific task.
A. Hard boot
B. Hibernation
C. Command
D. Warm Boot
E. Format
Answer
Ans C. Command
8. Which of the following colours can represent 6 bit?
A. Red
B. Green
C. Blue
D. Yellow
E. Cyan
Answer
Ans B. Green
9. To fit in notebook and many handheld computers, the
keyboards usually are ________
A. Smaller
B. Fewer
C. Firmer
D. More Flexible
E. Both (A) and (B)
Answer
10.
Ans D. MP3
Set- 110
1. The OS, Software and data that the computer is currently using
are stored in
A. PC
B. AGP
C. scanner
D. RAM
E. USB
Answer
Ans D. RAM
2. Which of the following refers to containers used to store related
documents located on the computer?
A. Labels
B. Indexes
C. Programs
D. Folders
E. Sections
Answer
Ans D. Folders
3. Which of the following refers to the means by which an OS or
any other programs interacts with the user?
A. Program front-end
B. Programming Interface
C. User login
D. User Interface
E. User Compatibility
Answer
Answer
Ans A. modulation
6. Which of the following memory has stored data in large
number?
A. RAM
B. ROM
C. Cache Memory
D. Hard Disk
E. None of the Above
Answer
Ans D. Repeater
8. The ________ button on the Quick Access Toolbar allows you to
cancel your recent commands or activities.
A. Search
B. Cut
C. Undo
D. Redo
E. Document
Answer
Ans C. Undo
9. Which among the following is not such an operation which can
be carried out on objects in graphic programme?
A. Spell Check
B. Change Size
C. Move
D. Delete
E. None of the Above
Answer
A. Shells
B. The Background
C. Queues
D. Page frames
E. Lists
Answer
Ans C. Queues
Set- 111
1. If a new device is attached to a computer, such as a printer or
scanner, its ________ must be installed before the device can
be used.
A. buffer
B. driver
C. Pager
D. Server
E. Maker
Answer
Ans B. driver
2. _________ is a self-replicating virus that does not alter files
but resides in active memory and duplicates itself.
A. Time Bomb
B. Worm
C. Mellissa virus
D. Macro virus
E. Trojan
Answer
Ans B. Worm
3. What is gutter margin?
A. Margin that is added to the left margin when printing
B. Margin that is added to the right margin when printing
C. Margin that is added to the binding side of page when printing
D. Margin that is added to the outside of the page when printing
E. None of the Above
Answer
Ans A. Broadband
5. A ______ is a computer connected to two networks.
A. link
B. server
C. gateway
D. bridge way
E. Client
Answer
Ans B. Cache
7. Which of the following terms is just the connection of networks
that can be joined together?
A. Virtual Private Network
B. Internet
C. Intranet
D. Extranet
E. Public Network
Answer
Ans B. Internet
8. An affordable technology that uses existing telephone lines to
provide high-speed connections is called _______
A. ISDN
B. Microwave
C. Cable modem
D. DSL
E. ALU
Answer
Ans D. DSL
9. The capacity of a communication channel is measured in
_________
A. bandwidth
B. bit capacity
C. baud rate
D. data flow
E. store data
Answer
Ans A. bandwidth
10.
D. Hardware Piracy
E. None of the Above
Answer
Set- 112
1. Which process involves running both old and new systems
simultaneously until implementation of the new system is
considered to be complete and successful?
A. Big bang adoption
B. Phased adoption
C. Parallel adoption
D. Pilot adoption
E. None of the Above
Answer
Ans A. : (colon)
5. If you want to keep track of different editions of a document
which feature will you use?
A. Editions
B. Versions
C. Track Change
D. All of the above
E. None of the Above
Answer
Ans B. Versions
Ans A. Processor
8. When we create a chart on a separate sheet in the same
worksheet it is called a ________A. View Chart
B. Embedded Chart
C. Chart Sheet
D. All of the Above
E. None of the Above
Answer
Ans D. Applet
10.
A. Insert
B. Tool
C. Format
D. Data
E. None of the Above
Answer
Ans B. Tool
Set- 113
1. Which of the following is built in memory in computer?
A. EROM
B. RAM
C. ROM
D. PROM
E. None of these
Answer
Ans C. ROM
2. Group of letters, numbers and symbols with a common typeface
is called as ________
A. File
B. Font
C. Style
D. GUI
E. None of these
Answer
Ans B. Font
3. Malware is used to ______
A. disrupt computer operation
B. gather sensitive information
C. gain access to private computer systems
D. All of the Above
E. None of the Above
Answer
Ans D. Middleware
5. How many modes or view are available to open a query?
A. 3
B. 5
C. 6
D. 7
E. None of these
Answer
Ans A. 3
6. Which one of the following rebooting commonly occurs when
the system of computer is crashed?
A. Soft rebooting
B. Cold rebooting
C. Hard rebooting
D. Random rebooting
E. None of these
Answer
Ans A. Rootkits
8. Which of the following language is not the scripting language?
A. Java script
B. Python
C. Perl
D. Lisp
E. Nome of the Above
Answer
Ans D. Lisp
9. RTF stands for _______
A. Rich Text File
B. Rich Text Format
C. Rich Text Folder
D. Rich Track File
E. None of the Above
Answer
presentation?
A. Ctrl + K
B. Ctrl + H
C. Ctrl + S
D. Tab
E. None of the Above
Answer
Ans D. Tab
Set- 114
1. When you cut or copy information it gets place in the ________
A. Clipart
B. Clipboard
C. Motherboard
D. Both (A) and (B)
E. None of the Above
Answer
Ans B. Clipboard
2. A _____ is a large and expensive computer capable of
simultaneously processing data for hundreds or thousands of
users.
A. handheld computer
B. mainframe computer
C. personal computer
D. tablet
E. None of the Above
Answer
Ans A. ANSI
5. Video Processors consist of ______ and _______ which store
and process images.
A. CPU and VGA
B. CPU and Memory
C. VGA and Memory
D, VGI and DVI
E. None of the Above
Answer
Ans A. Java
9. The operating system, that is self-contained in a device and
resident in the ROM is ________
A. Batch Operating System
B. Real-time Operating System
C. Embedded Operating System
D. Multi-Processor Operating System
E. None of the Above
Answer
Ans E. Executable
Set- 115
1. A set of ANSI parallel interfaces that allow personal computers
to communicate with peripheral hardware is known as
____________
A. UPnP
B. SCSI
C. ISRC
D. MTBF
E. ASPI
Answer
C. Device Drivers
D. All of the Above
E. None of the Above
Answer
Ans C. MICR
7. ________ uses a number of bars (lines) of varying thickness
and spacing between them to indicate the desired information.
A. OCR
B. OMR
C. MICR
D. Optical Bar Code Reader
E. None of the Above
Answer
C. MICR
D. Optical Bar Code Reader
E. None of the Above
Answer
Ans A. OCR
9. __________ is the process of capturing human-marked data
from document forms such as surveys and tests.
A. OCR
B. OMR
C. MICR
D. Optical Bar Code Reader
E. None of the Above
Answer
Ans B. OMR
10.
Set- 116
Ans D. Merging
3. Which of the following contains buttons and menus that provide
quick access to commonly used commands.?
A. Scroll bar
B. Menu bar
C. Tool bar
D. All of the Above
E. None of the Above
Answer
Ans C. Function
10.
A. Styles
B. Text
C. Table
D. All of the Above
E. None of the Above
Answer
Ans A. Styles
Set- 117
1. _________ characters can be entered in a single command line.
A. 140
B. 127
C. 60
D. 254
E. None of the above
Answer
Ans B. 127
2. How many function keys are available in the modern keyboard?
A. 10
B. 12
C. 8
D. 6
E. None of the Above
Answer
Ans B. 12
Ans C. Buffer
4. Which of the following number system was used by ENIAC?
A. Decimal Number System
B. Binary Number System
C. Octal Number System
D. Hexadecimal Number System
E. None of the Above
Answer
Ans B. 8 byte
Ans D. COM
9. _________ is a system that converts stored data directly to
microfilm or microfiche.
A. OCR
B. OMR
C. Scanner
D. Barcode Reader
E. COM
Answer