Vous êtes sur la page 1sur 5

1.

The Operating System tells the computer how to use its components
2. Backup is Protecting data by copying it from the original source to a different
destination
3. One advantage of dial-up-internet access is it utilizes existing telephone service
4. Spam is the term used for unsolicited e-mail
5. Two or more computers connected to each other of sharing information form a
Network
6. Computers that are portable and convenient for users who travel are known as Laptops
7. Office LANs that are spread geographically apart on a large scale can be connected using
a corporate WAN
8. The code for a Web page is written using HTML
9. The most frequently used instructions of a computer program are likely to be fetched
from: Cache Memory
10. The CD-ROM stops functioning would most likely NOT be a symptom of a virus
11. Mouse > input is the correct association between a hardware component and a
computer function
12. For move to the bottom of a document, press Ctrl + End key
13. By default, your documents print in Portrait mode
14. HTTP considered the 'backbone' of the World Wide Web
15. We access the World Wide Web using: Browsers
16. A wireless network uses Radio waves to transmit signals
17. Router device includes an adapter that decodes data sent in radio signals
18. Record maintenance in database is Not a characteristic of E-mail
19. J Presper Eckert and John W Mauchly designed the first electronic computer – ENIAC
20. Joystick input device cannot be used to work in MS Office
21. Loading Operating System onto RAM is called Booting
22. Computing devices - Cellular telephones, Notebook Computers, PDA
23. The bar at the top of a window that bears the name of the window is known as Title bar
24. Chip is a common nickname for IC
25. Programs such as Internet Explorer that serve as navigable windows into the Web are
called Web Browsers
26. A normal CD-ROM usually can store up to 680 MB
27. CD ROM devices have a limitation that we can only store information to it but cannot
erase or modify it
28. Seagate is the largest manufacturer of Hard Disk Drives
29. The programs which are as permanent as hardware and stored in ROM is known as
Firmware
30. Intel is not a manufacturer of hard disk drive
31. Different components on the motherboard of a PC processor unit are linked together by
sets or parallel electrical conducting lines. What are these lines called?- Buses
32. Dedicated Computer- which is assigned one and only one task
33. Instructions and memory address are represented by binary codes.
34. As compared to diskettes, the hard disks are more expensive
35. Intel is the biggest player in the microprocessor industry
36. Internal memory is used for storing programs and data currently being processed by the
CPU
37. Label is used to set a name to a disk in DOS
38. Winword.exe file starts MS Word
39. In MS-WORD 2007, to get to the 'Symbol' dialog box, click on the Insert menu and
choose 'Symbol'.
40. Superscript, subscript, outline, emboss, engrave are known as Font Effects
41. Shimmer, Sparkle text, Blinking Background etc. are known as Text effects
42. In case of MS-WORD, which of the following is not available in Font Spacing?- Loosely
43. Bold, Italic, Regular are known as Font Styles
44. In case of MS-EXCEL, If you begin typing an entry into a cell and then realize that you
don't want your entry placed into that cell, you: Press Esc
45. Computer connected to a LAN (Local Area Network) can share information and/or share
peripheral equipment
46. A self replicating program, similar to a virus which was taken from a 1970s science
fiction novel by John Bruner entitled the Shockwave Rider is Worm
47. VDU is Screen/Monitor
48. What kind of software would you most likely use to keep track of billing account?-
Spreadsheet
49. What is the purpose of keeping electronic devices such as computers, televisions, and
remote controlled devices on Sleep mode? - Reduce Power consumption
50. A result of a computer virus can not lead to Mother Board Crash
51. Firewalls are used to protect against unauthorized access.
52. Which of the following extensions suggest that the file is a backup copy?- .bak
53. The software tools that enable a user to interact with a computer for specific purposes
are known as Applications.
54. Output is- What the processor gives to the user
55. In word processing, an efficient way to move the 3rd paragraph to place it after the 5th
paragraph is cut and paste
56. Hardware includes all devices involved in processing information including the central
processing unit, memory and storage.
57. The quickest and easiest way in Word, to locate a particular word or phrase in a
document is to use the Find commands
58. For creating a document, you select New option at File Menu
59. The background of any Word document can have any color you choose
60. Which one of the following would be considered as a way that a computer virus can
enter a computer system? - Borrowed an illegal copy of software
61. Programs such as Mozilla Firefox that serve as navigable windows into the Web are
called- Web Browsers
62. Which device cannot be shared in network? – Keyboard
63. The bar code which is used on all types of items is read by a scanning device directly into
the computer.
64. What is the name of this scanning device? - Laser Scanner
65. A set of information that defines the status of resources allocated to a process is Process
Description
66. A family of polynomial block codes designed to correct burst errors is known as – Fire
Codes
67. The MS-DOS operating system is a command-driven interface, single-tasking
operating system
68. Which of the following was an early desktop operating system that included an
integrated graphic user interface with point-and-click features? – Mac OS
69. The most recent version of the Mac OS is based on the UNIX operating system.
70. The UNIX operating system was initially created in the early 1970s at AT&T's Bell
Labs
71. Use of icons and windows are characteristic of a graphical-user interface
72. The main purpose of the offline device is To save computer time.
73.
74.

Vous aimerez peut-être aussi