Professional Documents
Culture Documents
1. To insert a drop cap in one of the paragraph you should access A) Insert Menu B) Format C) Tools D)
None of above
2. How many different positions can you set for drop cap? A) 1 B) 2 C) 4 D) 6
3. What is the maximum number of lines you can set for lines to drop box? A) 3 B) 5 C) 10 D) 15
4. Which of the following can NOT be used to create parallel style column? A) Format Tabs B) Table
Insert Table C) Insert Textbox D) Format Columns
5. Which of the following is used to create newspaper style columns? A) Format Tabs B) Table Insert
Table C) Insert Textbox D) Format Columns
6. Columns dialog box can be opened from A) Format menu Columns submenu B) Double click on
column space in ruler C) Press Alt + O + C D) All of above
7. You can jump to the next column by A) Clicking with your mouse on the next column B) Press Alt
+ Down-arrow C) Both of above D) None of Above
8. How can you break the current column and start a new column immediately? A) Press Ctrl + Shift
+ Enter B) Press Alt + Enter C) Press Ctrl + Enter D) Press Alt + Shift + Enter
9. What is the smallest width of a column? A) 0" B) 0.5" C) 1" D) 1.5"
10. If the number of columns is selected 1 and the line between check box is marked, where is the line
drawn? A) in the left margin B) in the right margin C) both in left and right margin D) None of
Above
11. The other Col# are inactive when youve select 3 columns. How will you activate those boxes? A)
double click on spacing box B) double click on inactive Col# C) Remove mark from Line between
checkbox D) Remove mark from Equal Column Width check box
12. How much space in minimum must be provided between columns? A) 0" B) 0.5" C) 1" D) 1.5"
13. To open Columns dialog box quickly A) double click on the left margin area of ruler B) double
click the space between area on ruler C) double click the right margin in ruler D) All of above
14. Which of the following command is not available in Tools menu? A) Auto text B) Autocorrect C)
Auto summarize D) Macro
15. To move the cursor page to page of document A) Ctrl+PgDn B) Ctrl+PgUp C) Both of above D)
None of above
16. Text boundary can be displayed or hidden from A) Auto text option from Insert menu B) Options
from Tools menu C) Customize from Tools menu D) All of above
17. Which of the following are word processing software? A) WordPerfect B) Easy Word C) MS
Word D) All of above
18. MS Office provides help in many ways, which of these is one of them? A) What is this? B) Office
Assistant C) Help menu D) All of the above
19. You wished to justify text over the height of paper, which option will you choose A) Page Setup
from File menu B) Paragraph from Format menu C) From formatting toolbar D) Font from Format
menu
20. Which of the following is not of the merge process? A) Sort the data source records B) Format a
main document C) Edit a data source D) Merge the two files to print or create a new document
21. There can be many ways to insert page number in a document. Which of the following lets you
insert page number A) Page number from Insert menu B) Page Setup from file menu C) Footnote from
Insert menu D) Both a & c
22. Which is not a data source component? A) mail merge toolbar B) header row C) data fields D)
data records
23. Which of the following is not the part of standard office suite? A) Word Processor B) Database C)
Image Editor D) File manager
24. Where can you find the Draw Table tool button? A) Standard toolbar B) Formatting toolbar C)
Drawing toolbar D) Tables and Formatting toolbar
25. Which of the following option in File pull down menu is used to close a MS Word document? A)
Quit B) Close C) Exit D) New
26. You need to jump to the next column breaking current column right at the cursor position. How
can you break column? A) Pressing Ctrl+Enter B) Pressing Alt+Shift+Enter C) Break command from
Insert menu D) Both b and c
27. Superscript, subscript, outline, emboss, engrave are known as A) font styles B) font effects C) word
art D) text effects
28. Shimmer, Sparkle text, Blinking Background etc. are known as A) font styles B) font effects C) word
art D) text effects
29. The feature of Word that automatically adjusts the amount of space between certain combination
of characters so that an entire word looks more evenly spaced. What is that feature called? A)
Spacing B) Scaling C) Kerning D) Positioning
30. Which of the following is not available in Font Spacing? A) Normal B) Loosely C) Condensed D)
Expanded
31. Which of the following position is not available for fonts on MS Word? A) Normal B) Raised C)
Lowered D) Centered
32. What is the maximum scale percentage available in Scale drop down box? A) 500 B) 200 C)
100 D) 90
33. Bold, Italic, Regular are known as A) font styles B) font effects C) word art D) text effects
34. Uppercase on Change Case dialog box and All Caps on Fonts dialog box both converts selected
text into Capital Letters. Whats the difference between the two? A) Both are same. They are only
two different ways of capitalize text. B) It is faster to convert from Change Case than from Font
dialog box C) Change Case makes conversion permanent but All Caps on Font can always be
reverted D) All Caps on Font dialog box makes the change permanent where Change Case can be
always reverted
35. If you need to hide some paragraphs, how can you do it? A) From Paragraph dialog box B) From
Font dialog box C) From Options Dialog box D) None of above
36. Which of the following is the latest version of MS Word? A) Word 2000 B) Word 2007 C) Word
2010 D) Word 2011
37. Changing the appearance of a document is called A) Proofing B) Editing C) Formatting D) All of
above
38. In a document what is the maximum number of columns that can be inserted in MS Word Table? A)
35 B) 15 C) 63 D) 65
39. You can detect spelling and grammar errors by A) Press Shift + F7 B) Press Ctrl + F7 C) Press Alt+
F7 D) Press F7
40. A screen element of MS Word that is usually located below the title bar that provides categorized
options is A) Menu mar B) Tool Bar C) Status Bar D) All of the above
Answers:- 1-B, 2-B, 3-C, 4-D, 5-D, 6-D, 7-C, 8-A, 9-B, 10-D, 11-D, 12-A, 13-B, 14-A, 15-C, 16-B, 17-D,
18-D, 19-A, 20-A, 21-A, 22-A, 23-D, 24-D, 25-B, 26-C, 27-B, 28-D, 29-C, 30-B, 31-D, 32-B, 33-A, 34C, 35-B, 36-C, 37-C, 38-C, 39-D, 40-A
Posted by kaivalya at 6/18/2013 01:30:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
6. When inserting Page number in footer it appeared 1 but you wish to show a. How can you do
that? A) From format menu choose bullets and Numbering and configure necessary setting B) From
Insert menu choose Page Number and specify necessary setting C) Click on Page Number Format
tool and specify required setting D) All of above
7. Which of the following statement is false? A) You can set different header footer for even and odd
pages B) You can set different page number formats for different sections C) You can set different
header footer for first page of a section D) You can set different header and footer for last page of a
section
8. Where can you change the vertical alignment? A) Formatting toolbar B) Paragraph dialog box C)
Page Setup dialog box D) Standard toolbar
9. To get to the Symbol dialog box, click on the ______ menu and choose Symbol. A) Insert B)
Format C) Tools D) Table
10. Which of the following symbol sets would be most likely to contain a mathematical symbol such
as a degree sign, greater than or equal to, or a Greek letter? A) Wingdings B) Wingdings 3 C)
Webdings D) Symbol
11. When assigning a shortcut key to a symbol, you should always try to select a key or key
combination that is: A) unassigned B) Located on the ten-key pad section of your keyboard. C)
Assigned to another task. D) From the same font family as the symbol.
12. Suppose you wanted to create an AutoCorrect entry that would type the words We regret to
inform you that your submission has been declined Of the following choices, which would be the
best name you could assign to this entry? A) Regret B) Subdual C) We regret to inform you that your
submission has been declined D) 11
13. If you want to convert a symbol or several lines of text into an AutoCorrect entry, you should:
A) Insert the symbol or type the text in a Word document first. Then, select the text or symbol and
go to the AutoCorrect dialog box.
B) Click the Tools menu and choose AutoCorrect Options. Then, click the Insert menu and choose
Symbol (or click the Format menu and choose Paragraph) to add the symbol or paragraph to
AutoCorrect.
C) AutoCorrect can only accommodate one line of text. It is not possible to convert a symbol or
multiple lines of text into an AutoCorrect entry.
D) Insert the symbol or type the text in a Word document first. Then, select the text or symbol and
click the Edit menu followed by Paste Special. Select New AutoCorrect Entry and then click OK.
14. AutoCorrect was originally designed to replace ______ words as you type. A) Short, repetitive B)
Grammatically incorrect C) Misspelled D) None of the above
15. Which of the following is the second step in creating a macro? A) Start recording B) Using your
mouse or keyboard, perform the task you want to automate C) Assign a keyboard shortcut to the
macro D) Give the macro a name
16. If you will be displaying or printing your document on another computer, youll want to make
sure and select the ____ option under the Save tab. A) Embed Fonts B) Embed True Type Fonts C)
Save True Type Fonts D) Save Fonts
17. In Word, the mailing list is known as the _____. A) Data sheet B) Source C) Data source D)
Sheet
18. Which of the following is not one of the three Mail Merge Helper steps? A) Merge the two
files B) Create the main document C) Set the mailing list parameters D) Create the data source
19. Which of the following button will allow you to add, delete, or change records in your Data
Source? A) Data Source button B) Edit button C) Edit Data Source button D) Data editing button
20. It is possible to _____ a data source before performing a merge. A) Create B) Modify C) Sort D)
all of the above
21. What is the default font size of a new Word document based on Normal template? A) 10 pt B) 12
pt C) 14 pt D) None of above
22. What is the default font used in MS Word document? A) Times New Roman B) Arial C)
Algerian D) Preeti
23. Which tab in Font dialog box contains options to apply font effects? A) Font tab B) Character
Spacing C) Text Effects D) Standard Toolbar
24. If you need to double underline a word, how will you do that? A) Go to Format menu and then
Font option. Open Underline Style and choose Double Underline B) From Format menu choose Font
option and then from Font tab open Underline Style and select Double Underline C) Select the text
then choose Format >> Font and on Font tab open Underline Style and choose Double Underline D)
Click double underline tool on formatting toolbar
25. DropCap means A) All Caps B) Small Caps C) Title case D) None of above
26. What is the short cut key to open Font dialog box? A) Ctrl + F B) Alt + Ctrl + F C) Ctrl + D D) Ctrl
+ Shift + D
27. How can you access the font size tool on formatting toolbar? A) Ctrl + S B) Ctrl + Shift + S C) Ctrl
+ P D) Ctrl + Shift + P
28. How can you make the selected character superscripted? A) Ctrl + = B) Ctrl + Shift + = C) Alt +
Ctrl + Shift + = D) None of above
29. What does Ctrl + = key effect? A) Superscript B) Subscript C) All Caps D) Shadow
30. What happens if you mark on Hidden check box of Font dialog box after you select some text? A)
The text is deleted from document and you need to bring from Recycle Bin if required again. B) The
text is hidden and you need to bring it by removing the check box if needed again C) The text is
deleted and cannot be returned back D) The text is hidden and cannot be returned back
31. How can you increase the font size of selected text by one point every time? A) By pressing Ctrl +
] B) By pressing Ctrl + [ C) By pressing Ctrl + } D) By pressing Ctrl + {
32. Which of the following line spacing is invalid? A) Single B) Double C) Triple D) Multiple
33. How can you apply exactly the same formatting you did to another text? A) Copy the text and
paste in new location. Then type the new text again. B) Copy the text and click on Paste Special tool
on new place C) Select the text then click on Format Painter and select the new text D) All of above
34. What should you do if you require pasting the same format in many places? A) Click the Format
painter and go on pasting in many places holding Alt Key B) Double click the format painter then go
on pasting in many places C) Click the format painter then go on pasting to many places holding Ctrl
Key D) All of above
35. On which toolbar can you find Format Painter tool? A) Standard toolbar B) Formatting toolbar C)
Drawing Toolbar D) Picture Toolbar
36. Which indent marker controls all the lines except first line? A) First Line Indent Marker B) Left
Indent Marker C) Hanging Indent Marker D) Right Indent Marker
37. How can you remove tab stop markers from ruler? A) Double click the tab marker and choose
Clear All B) Drag the tab stop marker out of the ruler C) Right click the tab stop marker and choose
remove D) All of above
38. Which operation you will perform if you need to move a block of text? A) Copy and Paste B) Cut
and Paste C) Paste and Delete D) Paste and Cut
39. What is the extension of Word files? A) FIL B) DOT C) DOC D) TXT
40. Which of the following option is not available in Insert >> Picture? A) Chart B) Word Art C) Clip
Art D) Graph
Answers:- 1-C, 2-D, 3-A, 4-B, 5-B, 6-C, 7-D, 8-C, 9-A, 10-D, 11-A, 12-B, 13-A, 14-C, 15-C, 16-B, 17-C,
18-C, 19-C, 20-D, 21-B, 22-A, 23-A, 24-C, 25-D, 26-C, 27-D, 28-B, 29-B, 30-B, 31-A, 32-C, 33-C, 34B, 35-A, 36-B, 37-B, 38-B, 39-C, 40-D
Posted by kaivalya at 6/18/2013 12:00:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Monday, June 17, 2013
4. What is the short cut key to open the Open dialog box? A) F12 B) Shift F12 C) Alt + F12 D) Ctrl +
F12
5. A feature of MS Word that saves the document automatically after certain interval is available on
A) Save tab on Options dialog box B) Save As dialog box C) Both of above D) None of above
6. Where can you find the horizontal split bar on MS Word screen? A) On the left of horizontal scroll
bar B) On the right of horizontal scroll bar C) On the top of vertical scroll bar D) On the bottom of
vertical scroll bar
7. Which of the following is not available on the Ruler of MS Word screen? A) Tab stop box B) Left
Indent C) Right Indent D) Center Indent E) All of them are available on ruler
8. What is place to the left of horizontal scroll bar? A) Tab stop buttons B) View buttons C) Split
buttons D) Indicators E) None of above
9. Which file starts MS Word? A) Winword.exe B) Word.exe C) Msword.exe D) Word2003.exe
10. How many ways you can save a document? A) 3 B) 4 C) 5 D) 6
11. If you want to keep track of different editions of a document which features will you use? A)
Editions B) Versions C) Track Change D) All of above
12. Background color or effects applied on a document is not visible in A) Web layout view B) Print
Layout view C) Reading View D) Print Preview
13. What is a portion of a document in which you set certain page formatting options? A) Page B)
Document C) Section D) Page Setup
14. Borders can be applied to A) Cells B) Paragraph C) Text D) All of above
15. Which of the following is not a type of page margin? A) Left B) Right C) Center D) Top
16. What is the default left margin in Word 2003 document? A) 1" B) 1.25" C) 1.5" D) 2"
17. What is gutter margin? A) Margin that is added to the left margin when printing B) Margin that is
added to right margin when printing C) Margin that is added to the binding side of page when
printing D) Margin that is added to the outside of the page when printing
18. Portrait and Landscape are A) Page Orientation B) Paper Size C) Page Layout D) All of above
19. If you need to change the typeface of a document, which menu will you choose? A) Edit B)
View C) Format D) Tools
20. Which of the following is not a font style? A) Bold B) Italics C) Regular D) Superscript
21. Pressing F8 key for three times selects A) A word B) A sentence C) A paragraph D) Entire
document
22. What happens if you press Ctrl + Shift + F8? A) It activates extended selection B) It activates the
rectangular selection C) It selects the paragraph on which the insertion line is. D) None of above
23. How can you disable extended selection mode? A) Press F8 again to disable B) Press Del to
disable C) Press Esc to disable D) Press Enter to disable
24. What does EXT indicator on status bar of MS Word indicate? A) It indicates whether the external
text is pasted on document or not B) It indicates whether extended add-ons are installed on MS
Word or not C) It indicates whether Extended Selection mode is turned on or off D) None of above
25. What is the maximum number of lines you can set for a drop cap? A) 3 B) 10 C) 15 D) 20
26. What is the default number of lines to drop for drop cap? A) 3 B) 10 C) 15 D) 20
27. What is the shortcut key you can press to create a copyright symbol? A) Alt+Ctrl+C B) Alt + C C)
Ctrl + C D) Ctrl + Shift + C
28. How many columns can you insert in a word document in maximum? A) 35 B) 45 C) 55 D) 65
29. What is the smallest and largest font size available in Font Size tool on formatting toolbar? A) 8
and 72 B) 8 and 64 C) 12 and 72 D) None of above
30. What is the maximum font size you can apply for any character? A) 163 B) 1638 C) 16038 D)
None of above
31. Which of the following is graphics solution for Word Processors? A) Clipart B) WordArt C) Drop
Cap D) All of above
32. The keystrokes Ctrl + I is used to A) Increase font size B) Inserts a line break C) Indicate the text
should be bold
D) Applies italic format to selected text
33. A character that is raised and smaller above the baseline is known as A) Outlined B) Raised C)
Superscript D) Subscript
34. What is the purpose of inserting header and footer in document? A) To enhance the overall
appearance of the document B) To mark the starting and ending of page C) To make large document
more readable D) To allow page headers and footers appear on document when printed
35. Which of the following function key activates the speller? A) F5 B) F7 C) F9 D) Shift + F7
36. The minimum number of rows and columns in MS Word document is A) 1 and 1 B) 2 and 1 C) 2
and 2 D) None of above
37. Thesaurus tool in MS Word is used for A) Spelling suggestions B) Grammar options C) Synonyms
and Antonyms words D) All of above
38. Why Drop Caps are used in document? A) To drop all the capital letters B) To automatically
begin each paragraph with capital letter C) To begin a paragraph with a large dropped initial capital
letter D) None of above
39. A bookmark is an item or location in document that you identify as a name for future reference.
Which of the following task is accomplished by using bookmarks? A) To add anchors in web page B)
To mark the ending of a paragraph of document C) To quickly jump to specific location in
document D) To add hyperlinks in webpage
40. A word processor would most likely be used to do A) Keep an account of money spent B) Do a
computer search in media center C) Maintain an inventory D) Type a biography
Answers:- 1-B, 2-D, 3-A, 4-D, 5-A, 6-C, 7-D, 8-B, 9-A, 10-A, 11-B, 12-D, 13-C, 14-D, 15-C, 16-B, 17C, 18-A, 19-C, 20-D, 21-B, 22-B, 23-C, 24-C, 25-B, 26-A, 27-A, 28-B, 29-A, 30-B, 31-A, 32-D, 33-C,
34-D, 35-B, 36-A, 37-C, 38-C, 39-C, 40-D
Posted by kaivalya at 6/17/2013 11:19:00 pm No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Tuesday, May 28, 2013
23. Which process checks to ensure the components of the computer are operating and
connected properly :booting
24. Most mail programs automatically complete the ______ two parts of an e-mail:- from
and Date
25. The computers capability of distinguishing spoken words is called: - Voice recognition
26. ERP stands for: - enterprise resource planning
27. The issues that deal with the collection and use of data about individuals is: - Privacy
28. a term related to sending data to a satellite is :- uplink
29. Online Doc. Containing underlined phrases or icons that a user can click I order to move
immediately to
related parts of the current Doc. Or to other Doc. With relative information are called: hypertext
30. Physical security is concerned with protecting computer hardware form human
tampering and natural
disasters and _____ security is concerned with protecting software from unauthorized
tampering or damage :-Cyber
31. Collecting personal information and effectively posing an another individual is known as
:- Spoofing
32. What is usually used for displaying information at public places: - Monitors and
overhead projections
33. What is the most popular hardware for multimedia creation: - PCs
34. The life span of a CD-ROM is: - approx. 5 year
35. Magnetic tape is not practical for applications where data must be quickly recalled
because tape is: - a
sequential access medium
36. How is it possible that both programs and data can be stored in the same floppy disk: Programs and data
are both software and both cab be stored in any memory device
37. What is embedded system: - A computer and software system that controls a machine or
application
38. The signal which shows that a computed is waiting for a command from user is: interrupt
39. which software allows the user to move from page to page on the web by clicking on or
selecting a hyperlink
or by typing in the address of the destination page :- Web Browser
40. Which controls the manner of interaction between the user and the OS: - user interface
41. A _____ is a computer over internets which read IP address on a packet and relay it
towards its
destination:- Router
42. A floppy can be write protected by: - Positioning the slider away from the hole
43. Rotational delay time is also known as Latency
44. The average drives have an access time of: - 9-14ms
45. Father of C programming language was: - Dennis Ritchie
46. How is power supplied to a low power USB device: - through a USB cable
47. The _____ data mining technique derives rules from real world case examples: - Neural
nets
48. ______ is used to identify a user who returns to a website: - cookies
49. Which objects is passed to a java Bean when one of its properties is set via a JSP action:-
Servlet Response
50. Microwave transmission is used in environments where installing physical transmission
media is :- Easy or
promising and where line of sight transmission is available
Posted by kaivalya at 5/28/2013 06:01:00 pm No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
27. A spooler is: - a program that coordinates the print jobs that are waiting to be printed
28. Virtual memory is typically located: - on the hard drive
29. The purpose of a swap (or Page) file is to: - hold a programs data or instructions in
virtual memory when it
cannot be fitted in RAM
30. The definition of thrashing is: - Swapping data between virtual memory and RAM too
frequently
31. Which protocol is used by an operating system to generate error message like HOST
UNREACHABLE
over a TCP/IP network: - ICMP
32. SNMP stands for: - Simple Network Management Protocol
33. ______ are Linux boot loader: - LILO, GRUB
34. ___________ terminals (formerly known as cash registers) are often connected to
computer inventory
and sales computer system: - POS (Point of sale)
35. A ________ is a small program that helps to automate a frequently used series of
commands in most
productivity software tools: - macro
36. Multithread means: - One program doing more than one thing at a time
37. The 4 main functions of a computer are: - Input, Processing, Output, & Storage
38. What menu is selected to change the font and style: - format
39. The field that investigates the mechanics of human intelligence is: - Cognitive science
40. A C data structure called a structure is a group of a items in which each item is
indentified by its own
identifier each of which is known as a member of a structure. The member is also known as
:- field
41. SONET is used: - ????
42. The OSI model is divided into _______ processes called layers : - 7
43. System software is the set of programs that enables your computers hardware devices
and ______
software to work together: - application
44. The altering of data so that it is not usable unless the changes are undone is known as :Encryption
45. A voice mail: - functions much like an answering machine allowing callers to leave a
voice message for the
called party
46. A communication processor that connects dissimilar networks by providing translation
from one set of
protocol to another is known as: - Gateway
47. In MS-Excel 2003 the default workbook sheet contains maximum ______ rows: 65536
48. In MS-word a menu item in dim colour (gray) indicates that the menu is: - unavailable
for current context
49. Hot key is a: - Keyboard shortcut
50. A group of attribute/field in a database is known as a _____ :- Record
Posted by kaivalya at 5/28/2013 05:57:00 pm No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Tuesday, September 25, 2012
15. After a picture has been taken with a digital camera and processed
appropriately, the actual print of the picture is considered: Ans:- output.
16. Computers use the ____________ language to process data. Ans:- binary
17. Computers process data into information by working exclusively with: Ans:numbers.
18. In the binary language each letter of the alphabet, each number and each
special character is made up of a unique combination of: Ans:- eight bits.
19. The term bit is short for: Ans:- binary digit.
20. A string of eight 0s and 1s is called a: Ans:- byte.
21. A ____________ is approximately one billion bytes. Ans:- gigabyte
22. A ____________ is approximately a million bytes. Ans:- megabyte
23. ____________ is any part of the computer that you can physically touch.
Ans:- Hardware
24. The components that process data are located in the: Ans:- system unit.
26. Which of the following is an example of an input device? Ans:- scanner
27. All of the following are examples of storage devices EXCEPT: Ans:printers.
28. The ________, also called the brains
of the computer, is
39. The difference between people with access to computers and the Internet
and those without this access is known as the: Ans:- digital divide.
40. ____________ is the science revolving around the use of nanostructures
to build devices on an extremely small scale. Ans:- Nanotechnology
42. ____________ bits equal one byte.. Ans:- Eight
43. The binary language consists of ____________ digit(s). Ans:- 2
44. A byte can hold one ____________ of data. Ans:- character
45. ____________ controls the way in which the computer system functions
and provides a means by which users can interact with the computer.. Ans:The operating system
46. The operating system is the most common type of ____________
software.. Ans:- system
47. ____________ are specially designed computer chips that reside inside
other devices, such as your car or your electronic thermostat. Ans:- Embedded
computers
48. The steps and tasks needed to process data, such as responses to questions
or clicking an icon, are called: Ans:- instructions.
49. The two broad categories of software are: Ans:- system and application.
50. The metal or plastic case that holds all the physical parts of the computer is
the: Ans:- system unit.
Ans.: Application
5. ____________are the fastest and most expensive computers. Ans.:
Supercomputers
6. A ____________ is approximately 1,000 bytes. Ans.: kilobyte
7. Input devices are used to provide the steps and tasks the computer needs to process
data, and these steps and tasks are called ____________. Ans.: instructions
8. A computer gathers data, processes it, outputs the data or information, and
________ the data or information. Ans.: stores
9. The binary language consists of two digits: _________ and ________. Ans.: 0 and
1
10. A string of ________ 0s and 1s is called a byte. Ans.: eight (8)
11. The devices you use to enter data into a computer system are known as ____
devices.
Ans.: input
12. The devices on a computer system that let you see the processed information are
known as ___________ devices. Ans.: output
13. ______ is the set of computer instructions or programs that enables the hardware
to perform different tasks. Ans.: Software
14. When you connect to the ______, your computer is communicating with a server at
your Internet service provider (ISP). Ans.: Internet
15. ____ are computers that excel at executing many different computer programs at
the same time.
Ans.: Mainframes
16. ________is the application of computer systems and techniques to gather legal
evidence.
Ans.: Computer forensics
17. ____ is the science that attempts to create machines that will emulate the human
thought process.
Ans.: Artificial intelligence (AI)
18. Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs
generally run ________ as an operating system. Ans.: Microsoft Windows
19. A process known as ____ tracks trends and allows retailers to respond to consumer
buying patterns. Ans.: data mining
20. Hard disk drives and CD drives are examples of ______ devices. Ans.: storage
21. You would use _____ software to create spreadsheets, type documents, and edit
photos.
Ans.: application
22. ______ are computers that support hundreds or thousands of users
simultaneously.
Ans.: Mainframes
23. _____ is the term given to the act of stealing someones identity and ruining their
credit rating.
Ans.: Identity theft
24. Surgeons are using ______ to guide robots to perform delicate surgery. Ans.:
computers
25. Patient ______ are life-sized mannequins that have a pulse and a heartbeat and
respond to procedures just like humans. Ans.: simulators
Posted by kaivalya at 4/17/2012 01:13:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Tuesday, March 27, 2012
7. A device that provides emergency power to your computer, conditions the voltage, and protects against
power surges is called a _ (a) PSU = Power Supply Unit (b) USP = Universal Surge Protector (c) UPPS =
Universal Power Protection and Supply (d) UPS = Uninterruptible Power Supply (e) None of the above
8. Secondary storage (a) does not require constant power (b) does not use magnetic media (c) consists of
four main types of devices (d) does not store information for later retrieval (e) None of the above
9. Deleted data remains on a disk until (a) the data is overwritten (b) the recycle bin is emptied (c) a file
compression utility is used (d) the disk is scanned (e) None of the above
10. What is the term for how words will appear on a page? (a) text formatting (b) Character formatting (c)
Point size
(d) Typeface (e) None of these
11. The process of a computer receiving information from a server on the Internet is known as (a)
pulling(b) pushing
(c) downloading(d) transferring (e) None of these
12. When sending an e-rnail. the ........ line describes the contents of the message. (a) subject(b) to (c)
contents(d) cc
(e) None of these
13. The software that allows users to surf the Internet is called alan (a) Search engine (b) Internet Service
Provider (ISP) (c) Multimedia application (d) Browser (e) None of these
14. A CD-RW disk (a) has a faster access than an internal disk (b) is a form of optical disk, so it can only be
written once (c) holds less data than a floppy disk (d) can be erased and rewritten (e) None of these
15. The" first page of a Web site is called the (a) Home page(b) Index (c) Java Script(d) Bookmark (e)
None of these
16. A contains buttons and menus that provide quick access to commonly used commands. (a) menu
bar(b) toolbar(c) window (d) action bar(e) None of these
17. Ctrl, shift and alt are called __ keys. (a) adjustment(b) function(c) modifier (d) alphanumeric(e) None
of these
18. Memory unit is one part of __ . (a) Control unit(b) Central Processing Unit (c) Input device(d) Output
device (e) None of these
19. An example of a telecommunications device is a (a) keyboard(b) mouse(c) printer (d) modem(e) None
of these
20. Which device is used as the standard pointing device in a Graphical User Environment? (a)
Keyboard(b) Mouse
(c) Joystick (d) Trackball(e) None of these
21. Which of the following is not an.output device? (a) Plotter(b) Printer(c) Monitor (d) Touch Screen(e)
None of these
22. Every component of your computer is either (a) software or CPUIRAM (b) input devices or output
devices (c) application software or, system software (d) hardware or software(e) None of these
23. What is an E-mail attachment? (a) A receipt sent by the recipient (b) A separate document from
another program sent along with an E-mail message (c) A malicious parasite that feeds off your messages
and destroys the contents
(d) A list of CC or BCC recipients (e) None of these
24. What is correcting errors in a program called?' (a) Interpreting(b) Translating (c) Debugging(d)
Compiling (e) None of these
25. What is the main folder on a storage device called? (a) Platform(b) Interface (c) Root directory(D)
Device driver
(E) None of these
26. 'DOS' floppy disk does not have(a) A Boot Record(b) A File Allocation Table(c) A Root Directory(d)
Virtual Memory(e) BIOS
27. The word FIP stands for(a) File Translate Protocol(b) File Transit Protocol(c) File Typing
Protocol(d) File Transfer Protocol(e) None of these
28. How is power supplied to a low-power USB device?(a) Through a power cable(b) From an external
power supply
(c) Directly from the computer's power supply(d) Through the USB cable(e) None of these
29. .are used to identify a user who returns to a Website.(a) Cookies(b) Plug-ins(c) Scripts(d)
ASPs(e) None of these
30. A proxy server is used for the which of the following?(a) To provide security against unauthorized
users(b) To process client requests for web pages(c) To process client requests for database access(d) To
provide TCP/IP(e) None of these
31. In the portion lebelled http is the(a) host(b) domain name(c) protocol(d) top-level domain(e) None
of these
32.The number of pixels displayed on a screen is known as the screen(a) resolution(b) colour depth(c)
refresh rate
(d) viewing size(e) None of these
33. Word processing, spreadsheet, and photo-editing are example of(a) application software(b) system
software
(c) operating system software(d) platform software(e) None of these
34. Ais approximately a million bytes.(a) gigabyte(b) kilobyte(c) megabyte(d) terabyte(e) None of
these
35. A computer cannot 'boot' if it does not have the (a) Compiler(b) Loader(c) Operating System(d)
Assembler(e) None of these
36. To view information on the web you must have a (a) cable modem(b) web browser(c) Domain Name
Server (d) hypertext viewer(e) None of these
37. What type of computer could be found in a digital watch?(a) Mainframe computer(b) Super
computer(c) Embedded computer(d) Notebook computer(e) None of these
38. The arrow keys can be used to (a) delete text(b) move the cursor in the text that has already been
entered(c) save the document(d) move the cursor while deleting text(e) None of these
39. Office LANS, which are scattered geographically on large scale, can be connected by the use of
corporate(a) CAN
(b) LAN(c) DAN(d) WAN(e) TAN
40. Directory in directory is called(a) Mini directory(b) Junior directory(c) Part directory(d) Sub
directory(e) None of these
Answer:
1.(a)2.(d)3.(a)4.(b)5.(a)6.(b)7.(d)8.(a)9.(b)10.(a)11.(c)12.(a)13.(d)14.(d)15.(a)16.(b)17.(b)18.(b)1
9.(d)20.(b)21.(e)22.(d)23.(b)24.(c)25.(c)26.(d)27.(a)28.(d)29.(a)30.(a)31.(c)32.(a)33.(a)34.(c)3
5.(c)36.(b)37.(c)38.(b)39(d)40.(d)
Posted by kaivalya at 3/27/2012 09:58:00 pm No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Saturday, December 17, 2011
retrieve data and information more quickly than magnetic disks do (C) CD-ROMs make less
errors than magnetic media (D) An of the above (E) None of these
11. In Excel.allows users to bring together copies of work-books that other users
have worked on independently. (A) Copying (B) Merging (C) Pasting (D) Compiling (E)
None of these
12. Reusable optical storage will typica1ly have the acronym (A) CO (B) DVD (C) ROM (D)
RW (E) ROS
13. Computer uses the.number system to store data and perform calculations. (A)
binary (B) octal (C) decimal (D) hexadecimal (E) None of these
14. Help Menu is available at which button ? (A) End (B) Staft (C) Turnoff (D) Restart (E)
Reboot
15. In Word you can force a page break (A) By positioning your cursor at the appropriate
place and pressing the F1 key (B) By positioning your cursor at the appropriate place and
pressing Ctrl+Enter (C) By using the Insert/Section Break (D) By changing the font size of
your document (E) None of these
16. When you save to this, your data will remain intact even when the computer is turned
off
(A) RAM (B) Motherboard (C) Secondary storage device (D) Primary storage device (E)
None of these
17. Codes consisting of lines of varying widths or lengths that are computer-readable are
known as (A) an ASCII code (B) a magnetic tape (C) an OCR scanner (D) a bar code (E)
None of these
18. Which ports connect special types of music instruments to sound cards ? (A) BUS (B)
CPU (C) USB (D) MIDI (E) MINI
19. A(n) .is a special visual and audio effect applied in Power-point to text or content.
(A) animation (B) flash (C) wipe (D) dissolve (E) None of these
20. Why is it unethical to share copyrighted files with your friends ? (A) It is not unethical,
because it is legal. (B) It is unethical because the files are being given for free. (C) Sharing
copyrighted files without permission breaks copyright laws. (D) It is not unethical because
the files are being given for free. (E) It is not unethical-anyone can access a computer
21. The process of transferring files from a computer on the Internet to your computer is
called(A) downloading (B) uploading (C) FTP (D) JPEC (E) downsizing
22. A DVD is an example of a(n) (A) hard disk (B) optical disc (C) output device (D) solidstate storage device (E) None of these
23. A disk's content that is recorded at the time of manufacture and that cannot be changed
or erased by the user is (A) Memory-only (B) Write-only (C) Once-only (D) Run-only (E)
Read-only
24. Grouping and processing all of a firm's transactions at one time is called (A) a
database management system (B) batch processing (C) a real-time system (D) an on-line
system (E) None of these
25. To access properties of an object, the mouse technique to use is (A) dragging (B)
dropping (C) right-clicking (D) shift-clicking (E) None of these
26. .are words that a programming language has set aside for its own use. (A)
Control words (B) Control structures (C) Reserved words (D) Reserved keys (E) None of
these
27. A central computer that holds collections of data and programs for many PCs,
workstations, and other computers is a(n) (A) supercomputer (B) minicomputer (C) laptop
(D) server (E) None of these
28. You can keep your personal files / folders in (A) My folder (B) My Documents (C) My
Files (D) My Text (E) None of these
29. What is the process of copying software programs from secondary storage media to the
hard disk called?(A) Configuration (B) Download (C) Storage (D) Upload (E) Installation
30. To instruct Word to fit the width of a column to the contents of a table automatically,
click the button and then point to AutoFit Contents. (A) Fit to Form (B) Format (C) Autosize
(D) Contents (E) AutoFit
31. The simultaneous processing of two or more programs by multiple processors is (A)
multiprogramming (B) multitasking (C) time-sharing (D) multiprocessing (E) None of these
32. Which of the following can be used to select the entire document ? (A) CTRL+A (B)
ALT+F5 (C) SHIFT+A (D) CTRL+K (E) CTRL+H
33. Which of, the following is a storage device that uses rigid, permanently installed
magnetic disks to store data/information (A) floppy diskette (B) hard disk (C) permanent
disk (D) optical disk (E) None of these
34. A person who used his or her expertise to gain access to other people's computers to
get information illegally or do damage is a (A) hacker (B) analyst (C) instant messenger
(D) programmer (E) spammer
35. A.is the term used when a search engine returns a Web page that matches the
search criteria.(A) blog (B) hit (C) link (D) view (E) success
36. .are 'attempts by individuals to obtain confidential information from you by
falsifying their identity.(A) Phishing (B) Computer viruses (C) Spyware scams (D) Viruses
(E) None of the above
37. Part number, part description, and number of parts ordered are examples of (A) control
(B) output (C) processing (D) feedback (E) input
38. A Web site's main page is called its (A) Home Page (B) Browser Page (C) Search
Page (D) Bookmark (E) None of these
39. If you want to connect to your own computer through the Internet from another location,
you can use(A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these
40. When the pointer is positioned on a.it is shaped like a hand. (A) grammar error
(B) Formatting error (C) Screen Tip (D) Spelling error (E) hyperlink
41. The most common type of storage devices are (A) persistent (B) optical (C) magnetic
(D) flash (E) steel
42. A device that connects to a network without the use of cables is said to be(A)
distributed (B) free (C) centralized (D) open source (E) None of these
43. The basic unit of a worksheet into which you enter data in Excel is called a(A) tab (B)
cell (C) box (D) range (E) None of these
44. You can.a search by providing more information the search engine can use to
select a smaller, more useful set of results. (A) refine (B) expand (C) load (D) query (E)
slowdown
45. The piece of hardware that converts your computer's digital signal to an analog signal
that can travel over telephone lines is called a (A) red wire (B) blue cord (C) tower (D)
modem (E) None of these
46. To reload a Web page, press the.button. (A) Redo (B) Reload (C) Restore (D)
Ctrl (E) Refresh
47. Personal computers can be connected together to form a (A) server (B) supercomputer
(C) network (D) enterprise (E) None of these
48. What is the permanent memory built into your computer called ? (A) RAM (B) Floppy (C)
CPU (D) CO-ROM (E) ROM
49. This first step in the transaction processing cycle captures business data through
various modes such as optical scanning or at an electronic commerce website (A)
Document and report generation (B) Database maintenance (C) Transaction processing
startup (D) Data Entry (E) None of these
50. The computer abbreviation KB usually means (A) Key Block (B) Kernel Boot (C) Key
Byte (D) Kit Bit (E) Kilo Byte
ANSWER:- 1 : (C) 2 : (B) 3 : (B) 4 : (C) 5 : (D) 6 : (C) 7 : (C) 8 : (A) 9 : (A) 10 : (D) 11 : (B) 12 :
(D) 13 : (A) 14 : (B) 15 : (B) 16 : (C) 17: (D) 18 : (C) 19 : (A) 20 : (C) 21 : (A) 22 : (B) 23 : (E) 24
: (B) 25 : (C) 26 : (C) 27 : (D) 28 : (B) 29 : (D) 30 : (E) 31 : (D) 32 : (A) 33 : (B) 34 : (A) 35 : (E)
36 : (A) 37 : (E) 38 : (A) 39 : (D) 40 : (E) 41 : (D) 42 : (B) 43 : (B) 44 : (A) 45 : (D) 46 : (E) 47 :
(C) 48 : (E) 49 : (D) 50 : (E)
Posted by kaivalya at 12/17/2011 07:57:00 am 2 comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Thursday, September 29, 2011
1. Buffer is device/storage area 1. Where data are temporarily stored 2. Where data is
permanently stored 3. Where data error occurs 4. All of the above 5. None of these
2. A network geometric arrangement in which a single connecting line is shared by a
number of nodes is called
1. Car Topology 2. Bus Topology 3. Truck Topology 4. All of the above 5. None of
these
3. An error in a computer program is referred as1. Bug 2. Bit 3. Virus 4. All of the
above 5. None of these
4. Circuits that provide a communication path between two or more devices of a digital
computer system is
1. Car 2. Bus 3. Truck 4. All of the above 5. None of these
5. A fixed number of adjacent bits that represent a particular character or symbol are
referred as
1. Byte 2. Octal 3. Bubble 4. All of the above 5. None of these
6. Cache memory is a1. Small buffer storage 2. Permanent storage 3. Main memory
4. All of the above 5. None of these
8. Cache memory is1. Smaller and faster than main storage 2. Bigger and slower than
main storage 3. Smaller but slower than main memory 4. Bigger and faster than main
memory 5. None of these
9. Cache memory
1. Is a Static RAM 2. Increases the speed of processing by making current programs
and data available to the CPU at a rapid rate 3. Both 1. and 2. are true . 4. Both 1. and
2. are false 5. None of these
10. Following is false for BASIC1. Beginners All-Purpose Symbolic Instruction Code 2.
High-level interactive programming language 3. Works in time sharing environment 4.
Low level object oriented language 5. None of these
11. A unit for measuring data transmission speed that describes the capacity of a carrier
is referred as
1. Baud 2. Bit 3. Bond 4. All of the above 5. Batch
12. A process of trying out a new product by independent users before it is finally
manufactured/developed
1. Alpha test 2. Beta Test 3. Gamma test 4. All of the above 5. None of these
14. Base band System is1. A networking system 2. Where the channel support a
single digital signal 3. Both 1. and 2. are true 4. All of the above 5. None is true
15. One of the early coding systems, based on the idea of converting each digit of a
decimal number into its binary equivalent rather than converting the entire decimal value
into a pure binary form is1. ASCII code 2. BCD 3. ASCII-8 4. All of the above 5. None
of these
1. Several computer programs runs one after another without human interaction to run
each program individually
2. Several computer programs runs one after another with human interaction to run
each program individually
3. Selected computer programs runs one after another with human interaction to run
each program individually
4. All of the above 5. None is true
18. A device that is used to transmit data from one location to another is referred as1.
Storage 2. Memory 3. Carrier 4. All of the above 5. None of these
19. Programs developed by an outside supplier and provided to the user in a machine
readable form is known as
1. Canned programs 2. Beta program 3. Alpha program 4. All of the above 5. None of
these
24. The overall design, construction, organiz-ation and interconnecting of the various
components of a computer system is referred as1. Computer Architecture 2. Computer
Flowchart 3. Computer Algorithm 4. All of the above 5. None of these
25. A number system with a base of two is referred as1. Unary number system 2.
Binary number system 3. Octal number system 4. All of the above 5. None of these
Answers:
1. (1) 2. (2) 3. (1) 4. (2) 5. (1) 6. (1) 7. (2) 8. (1) 9. (3) 10. (4) 11. (1) 12. (2) 13. (2) 14.
(3) 15. (2) 16. (1) 17. (4) 18. (3) 19. (1) 20. (1) 21. (1) 22. (1) 23. (1) 24. (1) 25. (2)
ANSWER: (b)
3. Main memory is (a) Random Access Memory (b) Read only Memory (c) Serial
Access Memory (d) Storage Memory (e) None of the above
ANSWER: (a)
4. A compact disc (CD) is a data storage of the type (a) Magnetic (b) Optical (c)
Electrical (d) Electromechanical (e) None of these
ANSWER: (a)
5. What are the two basic types of memory that your computer uses ?
(a) RAM (b) RW/ RAM (C) ROM (d) ERAM (e) POST
ANSWER: (a)
6. A computer with CPU speed around 100 million Instructions per second with the
word length of Around 64 bits is known as (a) Super computer (b) Mini computer (c)
Micro computer (d) Macro computer (e) None of these
ANSWER: (a)
7. To locate a data items for storage is (a) Field (b) Feed (c) Database (d) Fetch (e)
None of these
ANSWER: (d)
8. A type of line printer that uses embossed steel band to form the letters printed on the
paper is (a) Golf ball printer (b) Dot-matrix printer (c) Laser printer (d) Band printer (e)
None of these
ANSWER: (d)
9. The chip, used in computers, is made of (a) Chromium (b) Iron oxide (c) Silica (d)
Silicon (e) None of these
ANSWER: (d)
10. The size of commonly used Floppy disk is (a) 4.5" (b) 3.5" (c) 3.25" (d) 5.5" (e)
None of these
ANSWER: (b)
11. Operating system of a computer (a) Enables the programmer to draw a flow chart
(b) Links a program with subroutine with references (c) Provides a layer, user friendly
interface (d) Hardware of computer (e) None of the above
ANSWER: (c)
12. Wild card operators specifies (a) Can be used when writing into multiple files (b)
Allows several files to be read simultaneously (c) Provide an easy way of groups of
related files (d) Are only used when printing the contents of a file (e) None of the above
ANSWER: (c)
13. Most Websites have a main page, the ...... which acts as a doorway to the rest of
the Web side pages.
(a) Search engine (b) Home page (C) Browser (d) URL (e) None of these
ANSWER: (b)
14. Which of the following is not true about Computer files? (a) They are collections of
data saved to a storage medium (b) Every file has a file name (c) A file extension is
established by the user to indicate the file's contents (d) Files usually contain data (e)
None of the above
ANSWER: (c)
15. What type of computer could be found in a digital watch? (a) Mainframe
computer (b) Super computer (c) Embedded computer (d) Note book computer (e)
Micro computer
ANSWER: (e)
16. This process is used by large retailers to study trends. (a) Data mining (b) Data
selection (C) POS (d) Data conversion
(e) None of the above
ANSWER: (a)
17. This system is a small, wireless handheld computer that scans an items tag and
pulls up the current price (and any special offers) as you shop. (a) PSS (b) POS (C)
Inventory (d) Data mining (e) None of these
ANSWER: (a)
18. Which of the following is NOT one of the four major data processing functions of a
computer ?
(a) Gathering data (b) Processing data into information (c) Analyzing the data or
information (d) Storing the data or information (e) None of the above
ANSWER: (c)
20. It is the study of molecules and structures whose size ranges from 1 to 100 Nano
metres (a) Nano science (b) Microelectrodes (C) Computer forensics (d) Artificial
intelligence (e) None of the above
ANSWER: (a)
2. ____Viruses that aim at the boot sector of a hard drive are infect-ing a very crucial
component of the boot process?
a) File infection virus b) Boot virus c) Network virus d) E-mail virus
3. _____Is the virus that they will attach themselves to EXE files, compressed files like
ZIP files and driver files?
a) File infector virus b) Boot virus c) Network virus d) E-mail virus
4. _____Is the virus, which is uniquely created to quickly spread throughout the local
area network?
a) File infector virus b)Boot virus c) Network virus d) E-mail virus
7. Several programs are in a memory concurrently; the syste-m switches among the
programs for efficient processing and minimal idle time is called____? a) Multi tasking
b) Multi programming c) Multi functioning d) None of the above
10. ____ Is the system where fast response is desirable, but not required? a) Real time
systems b) Time sharing systems c) a and b d) None
11. ____Is the system where processing must be completed with in certain time
constraints appropriate for the system?
a) Real time systems b) Time sharing systems c) a and b d) None
12. ____Is the smallest block that can be read or written on a disk? a) Sector b) Track
c) Disk d) None of the above
13. ____Is the collection of sectors all as same circumference on a single surface? a)
Track b) Sector c) Disk d) None of the above
14. ____Is the time interval when a process uses Central Processing Unit only? a) CPU
burst b) I/O burst c) (a)And(b) d) Either (a)or(b)
15. ____Is the time interval when a process uses I/O devices only? a) CPU burst b) I/O
burst c) (a)And(b) d) Either (a)or(b)
16. ____Is simply consists of one or more attributes that determine other attributes? a)
Lock b) Database c) Key d) None of the above
18. A unique key can uniquely identify each ____ in a table? a) Field b) Row c) File d)
Database
19. ____Is a database that treats all of its data as a collection of relations?
a) Relational database b) Rational database c) a and b d) None
20. ____Is the precise set of instructions that describes how to perform a specific
tasks?
a) Algorithm b) Graph c) Pie chart d) None of the above
22. ____Is the process of writing the programs is commonly called? a) Software b)
Coding c) Debugging d) None
23. ____Is the special program that converts programming language instructions into
machine level instructions?
a) Modem b) Central Processing Unit c) Compiler d)None of the above
24. After the program has been complied, the resulting set of instructions is called?
a) Final result b) Information c) Executable code d) Source code
28. Application software is? a) System specific b) User specific c) Platform specific d)
None
29. An operating system runs multiple applications simultan-eously known as? a) Multi
tasking b) Multi programming c) Programming d) None of the above
30. Which of the following language use interpreter? a) C++ b) COBOL c) BASIC d) All
of the above
31. ____Is a database program that stores information that can be manipulated, stored
and filtered to meet your specific needs? a) Access b) Power point c) Excel d) None of
the above
33. ____Allows you develop spreadsheets that display data in various tabular and
visual formats?
a) Access b) Power point c) Excel d) None of the above
34. FORTRAN is? a) Formula translation b) Formula generation c) Format generation
d) Format translation
35. EEPROM stands for? a) Electrically Erasable Program-mable Read Only Memory
b) Electrically Erasable Program-mable Run Only Memory c) Electrically Efficiently
Progr-ammed Read Only Memory d) Efficiently Erasable Program-mable Read Only
Memory
36. ____Generation computers are very big in size with less memory a) Third
Generation b) Fourth Generation c) First Generation d) Fifth Generation
37. EBCDIC stands for? a) Extended Binary Cut Decimal Interchange Code b)
Extended Binary Coded Dedicated Interchange Code c) Extended Binary Coded
Decimal Inner Code d) Extended Binary Coded Decimal Interchange Code
39. ____Is a data model in which the data is organized into a tree like structure? a)
Hierarchical database model b) Sequential model c) Dimensional model d) None
40. SQL stands for? a) Structured Quest Language b) System Query Language c)
Structured Query Language d) Standard Query Language
Answers:
1) a 2) b 3) a 4) c 5) d 6) a 7) b 8) a 9) b 10) b 11) a 12) a 13) a 14) a 15) b 16) c 17) a
18) b 19) a 20) a 21) b 22) b 23) c 24) c 25) a 26) a 27) a 28) c 29) a 30) c 31) a 32) b
33) c 34) a 35) a 36) c 37) d 38) d 39) a 40) c
20. A form of access to a computer or network with specified user name and password
is referred as
1. Account 2. Address 3. Algorithm 4. All of the above 5. None of these
21. A local storage area also called a register, in which the result of an arithmetic or
logic operation is formed, is
1. Accumulator 2. Address 3. Algorithm 4. All of the above 5. None of these
22. Computer that operates on data which is in the form of continuously variable
physical quantities
1. Digital computer 2. Analog computer 3. Mechanical computer 4. All of the above 5.
None of these
23. Anonymous FTP is the 1. Internet file transfer protocol 2. Protocol that requires
password 3. None access files 4. None of these
24. EFF sites allows anonymous FTP that 1. Do not require a password or access 2.
Requires password or access 3. Is a none access file 4. All of the above 5. None of
these
25. ANSI is 1. American National Standards Institute 2. A USA based national
organization that establishes uniform standards in several fields of computers. 3. 1. and
2. both are true 4. All of the above 5. None is true
26. APL is 1. A high level language for specifying complex algorithms. 2. A real-time
language primarily for scientific applications. 3. Only 1. is true 4. Both 1. and 2. are true
5. None of these
27. The overall design, construction, organization and interconnecting of the various
components of a computer system is referred as 1. Computer Architecture 2.
Computer Flow chart 3. Computer Algorithm 4. All of the above 5. None of these
28. Asynchronous communication is 1. Communication between indepen-dently
operating units 2. Communication between dependent operating units 3.
Communication between independent and dependent operating units 4. All of the above
5. None of these
29. Audio response is 1. Output medium 2. Produces verbal responses from the
computer system 3. Both 1. and 2. are true
4. Only A is true 5. None is true
30. Automated Office refers to the merger of ............... in an office environment. 1.
Computers 2. Office 3. Telecommunications 4. All of the above 5. None is true
31. Auxiliary storage is 1. Secondary storage 2. Primary storage 3. Processing device
4. All of the above 5. None of these
32. Archive is 1. Backup storage 2. Forward operation 3. Primary storage 4. All of the
above 5. None of these
33. A branch of computer science that deals with computers that possess reasoning,
learning and thinking capabilities that resemble those of human beings is recognized
as 1. Software engineering 2. Artificial intelligence 3. Hardware engineering 4. All of
the above 5. None of these
34. ASCII is 1. A standard coding system for computers 2. Hardware device 3.
Software 4. All of the above 5. None of these
35. Following is true for Bandwidth
1. The wider the bandwidth of a communication system the more data it can transmit in
a given period of time.
2. The narrow the bandwidth of a communication system the more data it can transmit
in a given period of time.
3. The wider the bandwidth of a communication system the less data it can transmit in
a given period of time.
4. All of the above 5. None is true
36. ASCII-8 is 1. An extended version of ASCII-7 2. Is a 8-bit code 3. Both 1. and 2.
are true 4. Both 1. and 2. are false 5. None of these
37. ASCII File is 1. Document file in the universally recognized text format 2. Word
processor 3. System file 4. All of the above 5. None of these
38. A program that translates mnemonic statements into executable instructions is
referred as
1. Software 2. Assembler 3. Translator 4. All of the above 5. None of these
39. An assembler is 1. Translator 2. Hardware 3. Assembly language 4. All of the
above 5. None of these
40. Following is not true for Backup files
1. These are the files which are generated automatically in when one save a document.
2. These files help in protecting the document due to out of order of the computer or
power failure
3. These files delete as soon computer is off 4. All of the above 5. None of these
41. An algebra that deals with logical propositions which are either true or false is
referred as
1. Boolean algebra 2. Modern Algebra 3. Abstract Algebra 4. All of the above 5. None
of these
42. Bandwidth is 1. The range of frequencies available for data transmission 2. Data
transmission rate 3. Alternate for rubber band 4. All of the above 5. None is true
(B) Storing
(C) Executing
(D) Decoding
(E) None of these
Ans : (C)
8. The role of agenerally is to determine a buyers needs and match it to the
correct hardware and software.
(A) computer Scientist
(B) computer sales representative
(C) computer consultant
(D) corporate trainer
(E) None of these
Ans : (B)
9. Which of the following groups consist of only output devices ?
(A) Scanner, Printer, Monitor
(B) Keyboard, Printer, Monitor
(C) Mouse, Printer, Monitor
(D) Plotter, Printer, Monitor
(E) None of these
Ans : (D)
10. The rectangular area of the screen that displays a program, data, and/or
information is a
(A) title bar
(B) button
(C) dialog box
(D) window
(E) None of these
Ans : (D)
11. A(n)contains commands that can be selected.
(A) pointer
(B) menu
(C) icon
(D) button
(E) None of these
Ans : (B)
12. An error is also known as
(A) bug
(B) debug
(C) cursor
(D) icon
(E) None of these
Ans : (A)
2. ______Is widely used medium of communication for cable television systems a) Twisted Pair b)
Coaxial Cable c) Optical fiber d) None
3. ______Cable consists of one or more filaments of glass fiber wrapped in protective layers that carries
data by means of pulses of light a) Twisted Pair b) Coaxial Cable c) Optical fiber d) None
4. ______Is a computer network used for communications among computers and different inform-ation
technological devices close to one person a) Personal Area Network b) Local Area Network c)
Metropolitan Area Network d) Wide Area Network
5. ______Is a collection of concep-tual tools for describing data, data relationships, data semantics and
constraints
a) Data base b) Data Model c) E_R Model d) None
6. Association among two or more entities called a) Entity b) Entity set c) Relationship d) Degree of
relation
7. DDL stands for a) Data Definition Language b) Data Delete Language c) Data Device Language d)
Database Definition Language
8. SDL stands for a) Storage Definition Language b) Save Definition Language c) Storage Database
Language d) Shortcut Definition Language
9. DML stands for a) Date Manipulation Language b) Database Manipulation Language c) Data
Manuscript Language
d) Data Manipulation Language
10. ____Is the language that enable user to access or manipulate data as organized by appropriate data
model
a) DML b) SDL c) DDL d) All of the above
11. ____Is the language to specify the internal schema. (This language may specify the mapping
between two schemas)
a) DML b) SDL c) DDL d) None of the above
12. All candidate keys excluding the primary key are known as a) Compound key b) Partial key c)
Alternative key d) None of the above
13. The user commands that are used to interact with a database is called as a) Query b) Interaction c)
Command d) Instruction
14. The updates that are applied to database before it becomes effective in real world
a) Retroactive update b) Proactive update c) Simultaneous update d) All of the above
15. The updates that are applied to database after it becomes effective in real world
a) Retroactive update b) Proactive update c) Simultaneous update d) All of the above
16. The updates that are applied to database at the same time when it becomes effective in real world?
a) Retroactive update b) Proactive update c) Simultaneous update d) All of the above
17. Match the following (select the test by using the key board)
a) A word from its beginning to its end b) A paragraph from its begging to its end c) The entire document
1. CTRL+ DOWN ARROW 2. CTRL+LEFT ARROW 3.CTRL+SHIFT+RIGHTARROW
a) a-3,b-1,c-2 b) a-3,b-2,c-3 c) a-3,b-2,c-1 d) a-2,b-3,c-1
a) Possible spelling error/word doesn't recognize a word b) Word thinks that grammar should be
revised c) A word is spelled correctly, but does not seem to be the correct word sentence d) All of the
above
21. In a word document Green underline indicates a) Possible spelling error/word doesn't recognize a
word b) Word thinks that grammar should be revised c) A word is spelled correctly, but does not seem to
be the correct word sentence d) All of the above
22. In a word document Blue underline indicates? a) Possible spelling error/word doesn't recognize a
word b) Word thinks that grammar should be revised c) A word is spelled correctly, but does not seem to
be the correct word sentence d) All of the above
23. By default the Microsoft word document will be saved into a folder called a) Desktop b) My
documents c) D drive d) Personal folder
24. What is the default file name for the word document? a) Taken from the text at the start of the
document b) Word document c) Both (a) and (b) d) None of the above
25. In word-2010____is the key to see numbers and letters displayed over icons, tabs or commands
towards the top of your screen? a) Ctrl key b) Tab key c) Alt key d) None of the above
26. ____ Is the keyboard shortcut key to close the word program a) Alt+F4 b) Alt+F5 c) Alt+F6 d) Alt+F7
27. How will you remove all formatting added to your documents (such as bold, italics, and underline
etc.)
a) Save b) Save as plain text file c) Save as d) All of the above
28. _____Is the file format we can use to distribute the document to some one using totally different word
processing program from a different software manufacturer, such as word perfect
a) Word document (.doc) b) Rich Text Format (.RTF) c) Both (a) and (b) d) None of the above
29. _____Is the Icon to magnify or reduce the display a) Print layout b) Zoom c) View d) All of the above
31. What is text formatting? a) Formatting characters and words with in a document b) Saving the word
document c) Both (a) and (b) d) None of the above
32. By default MS-Word 2010 uses a font called a) Arial b) Times New roman c) Tahoma d) Caliber
33. Superscript refers to____ a) Characters displayed below the line of the normal text b) Characters
displayed above the line of the normal text c) Both (a) and (b) d) None
34. Subscript refers to ___ a) Characters displayed below the line of the normal text b) Characters
displayed above the line of the normal text c) Both (a) and (b) d) None
35. (a+b)2 is an example for ---- a) Subscript b) Superscript c) Both (a) and (b) d) None
36. CO2 is an example for --- a) Subscript b) Superscript c) Both (a) and (b) d) None
37. You need to find a particular word or phrase and replace this item with alternative text, what is the
keyboard shortcut key
a) Ctrl+G b) Ctrl+P c) Ctrl+H d) Ctrl+F
38. _____Is the path to create Header/Footer a) Insert/Header & Footer b) File/Header & Footer c)
Edit/Header & Footer d) None of the above
40. _____ Is the path to save a document in PDF format a) Edit/Save as/PDF/Save b) File/Save
as/PDF/Save c) Both (a) and (b) d) None of the above
ANSWERS:
1) a 2) b 3) c 4) a 5) b 6) c 7) a 8) a 9) d 10) a 11) b 12) c 13) a 14) b 15) a 16) c 17) a 18) a 19) d 20) a
21) b 22) c 23) b 24) a 25) c 26) a 27) b 28) b 29) b 30) c 31) a 32) d 33) b 34) a 35) b 36) a 37) c 38) a
39) a 40) b
63. The operating system manages (A) memory (B) processor (C) disk and I/O
devices (D) all of the above
64. Scheduling is (A) allowing job to use the processor (B) unrelated performance
considerations (C) quiet simple to implement, even on large main frames (D) the same
regardless of the purpose of the system
65. Which of the following translator program converts assembly language
program to object program (A) assembler (B) compiler (C) macroprocessor (D) linker
66. Multiprogramming systems
(A) are easier to develop than single programming systems (B) execute each job faster
(C) execute more jobs in the same time period (D) use only one large mainframe
computer
67. What device is used for entering x - y coordinates (A) card reader (B) joystick
(C) keyboard (D) all of the above
68. Impact printers
(A) strike a ribbon against the paper to produce character images. (B) include ink-jet
and thermal devices (C) are more expensive than laser printers (D) use optical
technology
69. Bar codes stores information using (A) punched holes (B) dots (C) thick and thin
tines (D) all of the above
70. How many types of storage loops exist in magnetic bubble memory (A) 8 (B) 4
(C) 3 (D) 2
71. In comparison to the internal (main) memory, tape or disk memory is
(A) slower and more expensive (B) slower and less expensive (C) faster and more
expensive (D) faster and less expensive
72. One of the main features that distinguish microprocessor from
microcomputers is
(A) words are usually larger in microprocessors (B) words are shorter in
microprocessors (C) microprocessor doesnot contain I/O devices (D) computers are not
fully integrated
73. microprocessor with 'n' address lines is capable of addressing
(A) 2n locations (B) 2(n + 1)locations (C) 2n locations (D) n2 locations
74. Which technique is preferable for transferring a large amount of data to and
from a memory in a short time
(A) DMA (B) Interrupt driven I/O (C) programmed I/O (D) None of these
75. A(n) ____________ system is a small, wireless handheld computer that scans
an items tag and pulls up the current price (and any special offers) as you
shop. (A) PSS (B) POS (C) inventory (D) data mining
76. The binary representation 100110 is numerically equivalent to (A) the decimal
(C) the simultaneous transmission of data to a number of stations (D) all of the above
91. The simultaneous transmission of data to a number of stations is known
as (A) broad cast (B) bandwidth (C) Aloha (D) analog transmission
92. The communication mode that supports data in both directions (A) simplex (B)
half duplex (C) duplex (D) multiplex
93. Modulation is the process of (A) sending a file from one computer to another
computer (B) converting digital signals to analog signals (C) converting analog signals
to digital signals (D) echoing every character that is received
94. A distributed network configuration in which all data/information pass
through a central computer is
(A) bus network (B) star network (C) duplex (D) multiplex
95. To connect a computer with a device in the same room, you might be likely to
use (A) a coaxial cable (B) a dedicated time (C) a ground station (D) all of the above
96. Administrative supervision of database activities is the responsibility of
the (A) data base administrator (B) DP Manager (C) DB Manager (D) VP-DP
administrator
97. Which of the following component of a computer system is the most
important to a data base management system
(A) mouse (B) high resolution video display (C) printer (D) high speed, large capacity
disk
98. What is the serious problem(s) of file management systems (A) data
redundancy (B) difficult to update (C) program dependence (D) All of the above
99. Which of the following contains complete record of all activity that affected
the contents of a database during a certain period of time (A) master file (B)
transaction file (C) report (D) query file
100. In a database, related fields are grouped to form (A) record (B) file (C) bank (D)
field group
ANSWER:51. a 52. a 53. d 54. c 55. B 56. b 57. a 58. a 59. b 60. d 61. d 62. a 63. d 64. a 65. b
66. C 67. b 68. a 69. c 70. d 71. b 72. c 73. c 74. a 75. A 76. b 77. A 78. c 79. c 80.
B 81. d 82. A 83. b 84. c 85. c 86. a 87. a 88. B 89. d 90. a 91. a 92. b 93. b 94. b 95.
a 96. a 97. d 98. d 99. B 100. a
Posted by kaivalya at 8/19/2011 09:00:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Thursday, August 18, 2011
1. Which of the following is the product of data processing (A) information (B) data
(C) software program (D) system
2. The process of putting data into a storage location is called (A) reading (B)
writing (C) controlling (D) hand shaking
3. The process of copying data from a memory location is called (A) reading (B)
writing (C) controlling (D) booting
4. A list of instructions used by a computer is called (A) program (B) CPU (C) text
(D) output
5. The CPU consists of (A) input, output and processing (B)control unit, primary
storage and secondary storage (C) Control unit; arithmetic logic unit and primary
storage (D)input, processing and storage
6. Which of the following is true about primary storage (A) it is a part of the CPU (B)
It allows very fast access to data (C) It is relatively more expensive (D) all of the above
7. Which of the following is the most powerful type of the computer (A) main frame
(B) super conductor (C) micro computer (D) super computer
8. Software instruction intended to satisfy a user's specific processing needs are
called (A) system software (B) process software (C) documentation (D) application
software
9. The computer device primarily used to provide hardcopy is the (A) CRT (B) line
printer (C) computer console (D) card reader
10. Which one of the following can produce the final product of machine
processing in a form usable by humans
(A) storage (B) control (C) input device (D) output device
11. The term 'memory' applies to which one of the following (A) logic (B) storage
(C) input device (D) output device
12. A program written in machine language is called ........ program. (A) object (B)
computer (C) assembler (D) high level
13. A source program is the program written in .......... language. (A) English (B)
symbolic (C) high level (D) object
14. A typical modern computer uses (A) magnetic cores for secondary storage (B)
LSI chips (C) magnetic tape for primary memory (D) more than 10,000 vaccum tubes
15. A collection of 8 bits is called (A) byte (B) record (C) word (D) nibble
16. General purpose computers are those that can be adopted to countless uses
simply by changing its
(A) output device (B) input device (C) processor (D) program
17. The current generation of computers (A) second (B) fifth (C) fourth (D) third
18. All of the following are examples of real security and privacy risks EXCEPT:
(A) hackers (B) spam (C) viruses (D) identity theft.
19. To implement all functions of the basic logic functions, it needs (A) OR gate
(B) NOT gate (C) AND and NOT gates (D) None of these
20. In the binary number 110.101, the fractional part has the value (A) 0.625 (B)
0.125 (C) 0.875 (D) 0.5
21. The value of binary 1111 is (A) 23 -1 (B) 24 (C) 24 - 1 (D) None of these
22. The value of 25 in octal system is (A) 20 (B) 40 (C) 400 (D) None of these
23. A hexa decimal number 'AO' has the decimal value (A) 80 (B) 256 (C) 100 (D)
160
24. The binary representation of hexadecimal 'C3' is (A) 1111 (B) 110011 (C)
110001 (D) 11000011
25. The ASCII code is for information interchange by a binary code for (A)
numbers only (B) alphabets only (C) alphanumeric and other common symbols (D)
None of these
26. A four bit number is given as 1001. Its 1's complement is (A) 1001 (B) 11001
(C) 0110 (D) 0101
27. 2's complement representation of a decimal number -4 is (A) 0100 (B) 1100 (C)
1011 (D) 1010
28. BCD numbers are obtained (A) by converting decimal number to binary (B) by
converting decimal to octal (C) when each decimal digit is represented by four bit binary
(D) by converting binary to decimal.
29. A gate in which all inputs must be low to get a high output is called (A) an
inverter (B) a NOR gate (C) an AND gate (D) a NAND gate
30. For a logical circuit there are 'n' binary inputs. Then the number of different
input combinations in the truth table is
(A) 2n (B) 2/n (C) 2n (D) 2(n+1)
31. Which of the following performs modulation and demodulation? (A) Satellite
(B) modem (C) fiber optic (D) amplifier
32. A characteristic of multiprogramming system is (A) Simultaneous execution of
program instructions from two applications (B) concurrent processing of two or more
programs (C) multiple CPU's (D) all of the above
33. Communication circuits that transmit data in both directions but not at the
same time are operating in (A) Simplex mode (B) half-duplex mode (C) full-duplex
mode (D) asynchronous mode
34. Operating system functions may include (A) input/output control (B) virtual
storage (C) multiprogramming (D) all of the above
35. Transmission of computerised data from one location to another is called (A)
data transfer (B) data flow (C) data communication (D) datamanagement
36. Which of the following items is not used in LAN (A) computers (B) modem (C)
printer (D) cable
37. Which is the device that converts computer output into a form that can be
transmitted over a telephone line
(A) teleport (B) multiplexer (C) concentrator (D) modem
38. What is the commonly used unit for measuring the speed of data
transmission(A) bytes per second (B) bits per second (C) baud (D) either b or d
39. A kilobyte also referred to as KB, is equal to (A) 1000 bytes (B) 1024 bytes (C)
2048 bytes (D) 512 bytes
40. Inputs to your computer is accomplished using the (A) Screen (B) keyboard (C)
printer (D) plotter
41. Which of the following is not used as secondary storage (A) Semiconductor
memory (B) magnetic disks (C) magnetic drums (D) magnetic tapes
42. A collection of wires that connects several device is called (A) link (B) bus (C)
cable (D) port
43. A offline device is (A) a device which is not connected to CPU (B) a device which
is connected to CPU (C) a device which is in breakdown stage (D) None of these
44. Which of the following is the fastest (A) CPU (B) magnetic tapes and disks (C)
video terminal (D) sensors, mechanical controllers
45. Memories in which any location can be reached in a fixed and short amount of
time after specifying its address is called
(A) sequential access memory (B) random access memory (C) secondary memory (D)
mass storage
46. The register which contains the data to be written into or read out of the
addressed location is known as
(A) index register (B) memory address register (C) memory data register (D) program
counter
47. The register which keeps track of the execution of a program and which
contains the memory address of the next instruction to be executed is known
as (A) index register (B) instruction register (C) memory address register (D) program
counter
48. Which of the following is used as storage locations both in the ALU and in the
control section of a computer
(A) accumalator (B) register (C) adder (D) decoder
49. Accumulator is a (A) hardwired unit (B) sequential circuit (C) finite state machine
(D) register
50. Non volatility is an important advantage of (A) CCDs (B) magnetic tapes and
disks (C) magnetic bubbles (D) both b and c
ANSWER:_
4. Software applies, also called algorithms, to process data. (A) arithmetic(B) procedures(C)
objects(D) rules(E) None of these
4. (A)
5. A file extension is separated from the main file name with a(n) , but no spaces.
(A) question mark(B) exclamation mark(C) underscore(D) period(E) None of these
5.(E)
6. An ad hoc query is a(A) pre-planned question(B) pre-scheduled question(C) spur-of-the-moment
question(D) question that will not return any results(E) None of these
6. (B)
7. A Web consists of one or more Web pages located on a Web server.
(A) hub(B) site(C) story(D) template(E) None of these
7. (B)
8. A computer is a set of program instructions that can attach itself to a file, reproduce itself, and
spread to other files.(A) worm(B) virus(C) trojan horse(D) phishing scam(E) None of these
8. (B)
9. The desktop contains small graphics called(A) windows(B) logos(C) icons(D) pictures(E) None of
these
9.(C)
10. C, BASIC, COBOL, and Java are examples of languages.
(A) low-level(B) computer(C) system programming(D) high-level(E) None of these
10.(D)
11. A(n)camera is a peripheral device used to capture still images in a digital format that can be
easily transferred into a computer and manipulated using graphics software.
(A) digital(B) analog(C) classic(D) film(E) None of these
11.(A)
12. makes it possible for shoppers to make purchases using their computers.
(A) E-world(B) E-commerce(C) E-spend(D) E-business(E) None of these
12. (D)
13. Networks are monitored by security personnel and supervised by who set(s) up accounts and
passwords for authorized network users.
(A) IT managers(B) the government(C) network administrators(D) password administrators(E) None of
these
13.(C)
14. Application software is designed to accomplish
(A) real-world tasks(B) computer-centric tasks(C) gaming tasks(D) operating system tasks(E) None of
these
14. (D)
15. A telephone number, a birth date, and a customer name are all examples of
(A) a record(B) data(C) a file(D) a database(E) None of these
15.(D)
16. The human-readable version of a program is called(A) source code(B) program code(C) human
code(D) system code(E) None of these
16. (D)
17. A computer (also referred to as a laptop), is a small, lightweight personal computer that
incorporates the screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook(B) journal(C) diary(D) briefcase(E) None of these
17.(A)
18. is the result produced by a computer.(A) Data(B) Memory(C) Output(D) Input(E) None of these
18. (C)
19. Programs such as Internet Explorer that serve as navigable windows into the Web are called
(A) Hypertext(B) Networks(C) Internet(D) Web browsers(E) None of these
19.(D)
20. A is a device that not only provides surge protection, but also furnishes your computer with
battery backup power during a power outage.(A) surge strip(B) USB(C) UPS(D) battery strip(E) None of
these
20. (C)
21. When you save to , your data will remain intact even when the computer is turned off.
(A) RAM(B) motherboard(C) secondary storage device(D) primary storage device(E) None of these
21.(C)
22. The motherboard is the(A) circuit board that houses peripheral devices(B) same as the CPU chip
(C) the first chip that is accessed when the computer is turned on(D) circuit board that contains a CPU
and other chips(E) None of these
22. (D)
23. A computer-intensive problemruns on a(A) server(B) main frame(C) supercomputer(D) super PC(E)
None of these
23. (C)
24. A(n)converts and executesone statement at a time.(A) compiler(B) interpreter(C) converter(D)
instructions(E) None of these
24.(B)
25. The term designates equipment that might be added to a computer system to enhance its
functionality.
(A) digital device(B) system add-on(C) disk pack(D) peripheral device(E) None of these
25.(D)
26. Approximately how many bytes make one megabyte ?
(A) One thousand(B) Ten thousand(C) One hundred(D) One million(E) None of these
26.(D)
27. What is MP3 ?
(A) A mouse(B) A Printer(C) A Sound format(D) A Scanner(E) None of these
27. (C)
28. All the deleted files go to(A) Recycle Bin(B) Task Bar(C) Tool Bar(D) My Computer(E) None of
these
28. (A)
29. this is the act of copying or downloading a program from a network and making multiple copies
of it.
(A) Network piracy(B) Plagiarism(C) Software piracy(D) Site-license piracy(E) None of these
29.(C)
30. A directory within a directory is called(A) Mini Directory(B) Junior Directory(C) Part Directory(D) Sub
Directory(E) None of these
30. (D)
31. Which is the best definition of a software package ?
(A) An add-on for your computer such as additional memory
(B) A set of computer programs used for a certain function such as word processing
(C) A protection you can buy for a computer
(D) The box, manual and license agreement that accompany commercial software
(E) None of these
31.(B)
32. In MICR, C stands for . (A) Code(B) Colour(C) Computer(D) Character(E) None of these
32. (D)
33. Fax machines and imaging systems are examples of(A) bar-code readers(B) imaging systems(C)
scanning devices(D) pen-based systems(E) None of these
33. (B)
34. When writing a document, you can use the feature to find an appropriate word or an
alternative word if you find yourself stuck for the right word.(A) dictionary(B) word finder(C)
encyclopedia(D) thesaurus(E) None of these
34.(A)
35. Which key is used in combination with another key to perform a specific task ?
(A) Function(B) Control(C) Arrow(D) Space bar(E) None of these
35. (B)
36. A disks content that is recorded at the time of manufacture and that cannot be changed or erased by
the user is(A) read-only(B) memory-only(C) run-only(D) write-only(E) None of these
36. (A)
37. In an information system, alphanumeric data normally takes the form of
(A) Sentences and paragraphs(B) Numbers and alphabetical characters(C) Graphic shapes and
figures(D) Human voice and other sounds(E) None of these
37.(B)
38. A Websites main page is called its(A) home page(B) browser page(C) search place(D)
bookmark(E) None of these
38. (A)
39. When installing , the user must copy and usually decompress program files from a CDROM or
other medium to the hard disk.(A) programming software(B) system hardware(C) applications
hardware(D) applications software(E) None of these
39. (A)
40. A collection of interrelated files in a computer is a
(A) file manager(B) field(C) record(D) database(E) None of these
40. (D)
41. A computer is a large and expensive computer capable of simultaneously processing data for
hundreds or thousands of users.(A) server(B) mainframe(C) desktop(D) tablet(E) None of these
41. (B)
42. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these
operating systems, a trackball is described as
(A) a roller ball which moves the cursor
(B) a pen-shaped device which allows data to be entered through the CRT screen
(C) a figure which resembles a familiar office device
(D) an outdated input device
(E) None of these
42. (A)
43. Various applications and documents are represented on the Windows desktop by
(A) Symbols(B) Labels(C) Graphs(D) Icons(E) None of these
43. (D)
44. What is usually used for displaying information at public places ?
(A) Monitors(B) Overhead Projections(C) Monitors and Overhead Projections(D) Touch Screen Kiosks(E)
None of these
44. (D)
45. The real business and competitive value of information technology lies in
(A) The software applications that are used by many companies
(B) The capabilities of the software and value of the information a business acquires and uses
(C) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many
companies
(D) The capabilities of the hardware and the speed at which it processes information
(E) None of these
45.(B)
46. Companies use which of the following vendors to provide access to software and services rather than
purchasing the applications and maintaining the applications themselves ?(A) Open source vendors(B)
Alliances(C) Application service providers(D) All of the above(E) None of these
46. (C)
47. Which one of the following would be considered as a way that a computer virus can enter a computer
system ?
(A) Opening an application previously installed on the computer(B) Borrowed copies of software(C)
Viewing a website without causing any additional transactions(D) Running antivirus programs(E) None of
these
47.(B)
48. Collecting personal information and effectively posing as another individual is known as the crime of
(A) spooling(B) dentity theft(C) spoofing(D) hacking(E) None of these
48. (B)
49. The first step in the transaction processing cycle is(A) database operations(B) audit(C) data
entry(D) user inquiry(E) None of these
49. (C)
50. In the information systems concept, the output function involves
(A) Capturing and assembling elements that enter the system to be processed
(B) Transformation processes that convert input into output
(C) Transferring elements that have been produced by a transformation process to their ultimate
destination
(D) Monitoring and evaluating feedback to determine whether a system is moving toward the
achievement of its goal (E) None of these
50.(A)
Posted by kaivalya at 8/17/2011 02:52:00 pm No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Saturday, August 13, 2011
23.
24.
25.
26.
27.
28.
29.
30.
a) 2) b) 1)
Circuit
Message
Packet
Metropolitan Area
World Wide Web
True
Extranet
language 10. Binary Language/ 1st Generation Language 11. 2nd Generation Language/ Low level
Language 12. Interpreter 13. Object Oriented Programming Language 14. Language
Translator/System Software 15. Extensions 16. Program 17. Integrated 18. Debugging 19.
Syntax 20. Semantic 21. Syntax 22. Mnemonics 23. Keywords 24. Flow Charts 25. File
Allocation Table 26. Windows key 27. Subdirectory 28. Dialogue 29. Recycle Bin 30.
Ctrl+Alt+Del
11. This part of operating system manages the essential peripherals, such as the
keyboard, screen , disk drives, and parallel and serial ports ____
(A) basic input/output system
(B) secondary input/output system
(C) peripheral input/output system
(D) marginal input/output system
(E) None of these
Ans : (A)
12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse
(B) Boot sector
(C) Script
(D) Logic bomb
(E) None of these
Ans : (B)
13. ________ controls the way in which the computer system functions and provides a
meAns : by which users can interact with the computer
(A) The platform
(B) Application software
(C) Operating system
(D) The motherboard
(E) None of these
Ans : (C)
14. Servers are computers that provide resources to other computers connected to a
___________
(A) mainframe
(B) network
(C) supercomputer
(D) client
(E) None of these
Ans : (B)
15. A goal of data mining includes which of the following?
(A) To explain some observed event or condition
(B) To confirm that data exists
(C) To analyze data for expected relationships
(D) To create a new data warehouse
(E) None of these
Ans : (A)
16. URL stands for ........
(A) Universal Research List
(B) Universal Resource List
(C) technical
(D) user
(E) None of these
Ans : ()
38. Which of the following is NOT a type of broadband Internet connection?
(A) Cable
(B) DSL
(C) Dial-up
(D) Satellite
(E) None of these
Ans : (C)
39. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is
known as:
(A) spyware
(B) adware
(C) spam
(D) malware
(E) None of these
Ans : (D)
40. Making a field ______ meAns : that it cannot be left blank.
(A) numeric
(B) required
(C) calculated
(D) validated
(E) None of these
Ans : (B)
41. _________ is the process of finding errors in software code.
(A) Debugging
(B) Compiling
(C) Testing
(D) Running
(E) None pf these
Ans : ()
42. ____________ are viruses that are triggered by the passage of time or on a certain
date.
(A) Boot-sector viruses
(B) Macro viruses
(C) Time bombs
(D) Worms
(E) None of these
Ans : (C)
(D) The file extension comes before the dot (.) followed by the file name
(E) None of these
Ans : (D)
49. Verification of a login name and password is known as:
(A) configuration
(B) accessibility
(C) authentication
(D) logging in
(E) None of these
Ans : (C)
50. Which of the following would most likely NOT be a symptom of a virus?
(A) Existing program files and icons disappear.
(B) The CD-ROM stops functioning.
(C) The Web browser opens to an unusual home page.
(D) Odd messages or images are displayed on the screen.
(E) None of these
Ans : (B)
Posted by kaivalya at 8/11/2011 01:13:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Wednesday, August 10, 2011
Ans : (A)
18. You can start Microsoft Word by using button. (A) New(B) Start(C) Program(D) Control
Panel(E) None of these
Ans : (C)
19. You click at B to make the text (A) Italics(B) Underlined(C) Italics and Underlined(D) Bold(E)
None of these
Ans : (D)
20. Thebecomes different shapes depending on the task you are performing.(A) Active tab(B)
Insertion point(C) Mouse pointer(D) Ribbon(E) None of these
Ans : (C)
Posted by kaivalya at 8/10/2011 08:18:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Tuesday, August 09, 2011
19. An error in a computer program(A) Crash(B) Power Failure(C) Bug(D) Virus(E) None of these
Ans : (C)
20. What is output ? (A) What the processor takes from the user(B) What the user gives to the
processor(C) What the processor gets from the user(D) What the processor gives to the user(E)
None of these
Ans : (D)
21. A saved document is referred to as a(A) file(B) word(C) folder(D) project(E) None of these
Ans : (A)
22. Specialized programs that assist users in locating information on the Web are called
(A) Information engines(B) Search engines(C) Web browsers(D) Resource locators(E) None of
these
Ans : (B)
23. An application program has which one of the following functions ?
(A) It specifies the informationprocessing procedures required by a particular
informationprocessing job
(B) It controls the input/output and storage functions of the computer system
(C) It provides various support services for the computer system
(D) It supervises the operations of the CPU
(E) None of these
Ans : (A)
24. In page preview mode
(A) You can see all pages of your document(B) You can only see the page you are currently
working(C) You can only see pages that do not contain graphics(D) You can only see the title
page of your document(E) None of these
Ans : (A)
25. An operating system that can do multitasking means that
(A) The operating system can divide up work between several CPUs
(B) Several programs can be operated concurrently
(C) Multiple people can use the computer concurrently
(D) All of the above (E) None of these
Ans : (B)
Posted by kaivalya at 8/09/2011 07:06:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Monday, August 08, 2011
3. allows wireless mobile devices to access the Internet and its services such as the
Web and e-mail(A)TCP/IP(B)Ethernet(3)WAP(D)Token ring (E)None of these
Ans. (C)
4. 'DOS' floppy disk does not have (A)A Boot Record(B)A File Allocation Table(C)A Root
Directory(D)Virtual Memory(E)BIOS
Ans. (D)
6. Which of the following places the common data elements in order from smallest to largest
(A) character, file, record, field, database (B) character, record, field, database, file(C) character,
field, record, file, database (D) Bit, byte, character, record, field, file, database, (E) None of these
Ans : (C)
8. Verification of a login name and password is known as: (A) configuration(B) accessibility(C)
authentication(D) logging in(E) None of these
Ans : (C)
9. Using Windows Explorer, a plus (+) sign in front of a folder indicates (A) an open folder.(B)
the folder contains subfolders.(C) a text file.(D) a graphics file. (E) None of these
Ans : (B)
10. Which of the following would most likely NOT be a symptom of a virus?
(A) Existing program files and icons disappear. (B) The CD-ROM stops functioning.(C) The Web
browser opens to an unusual home page. (D) Odd messages or images are displayed on the
screen. (E) None of these
Ans : (B)
11. Which is NOT a good Web security strategy?
(A)Restrict access to the Web server; keep a minimum number of ports open(B)Limit the users
who can load software, edit or add files.(C)Add demo programs, so users can test system without
accessing production data.(D)Remove unnecessary compilers and interpreters.(E)None of these
Ans. (D)
12. The altering of data so that it is not usable unless the changes are undone is
(A)Biometrics(B)Compression(C)Encryption(D)Ergonomics(E)None of these
Ans. (C)
13. The word FIP stands for (A)File Translate Protocol(B)File Transit Protocol(C)File Typing
Protocol(D)File Transfer Protocol(E)None of these
Ans. (A)
14. Voice mail (A)is the exchange of text messages and computer files transmitted via a
communications network such as a local area network or the Internet (B)permits users to
converse in real time with each other via the computer while connected to the
Internet (C)functions much like an answering machine, allowing callers to leave a voice message
for the called party (D)involves using video and computer technology to conduct a meeting
between participants at geographically separate locations (E)None of these
Ans. (C)
15. A communication processor that connects dissimilar networks by providing the translation
from one set of protocol to another is (A)Bridge(B)Gateway(C)Router(D)Modem(E)All of these
Ans. (B)
16. The memory resident portion of the operating system is called the (A) registry.(B) API.(C)
CMOS.(D) kernel. (E) None of these
Ans : (D)
17. Which of the following is NOT a type of broadband Internet connection? (A) Cable(B) DSL(C)
Dial-up(D) Satellite(E) None of these
Ans : (C)
18. The operating system allows users to organize the computers contents in a hierarchical
structure of directories that include all of the following EXCEPT: (A) files.(B) folders.(D) drives.(D)
systems. (E) None of these
Ans : (D)
19. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
(A) spyware(B) adware(C) spam(D) malware(E) None of these
Ans : (D)
20. All of the following statements concerning windows are true EXCEPT
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows.
(E) None of these
Ans : (A)
21. How is power supplied to a low-power USB device? (A)Through a power cable(B)From an
external power supply(C)Directly from the computer's power supply(D)Through the USB
cable(E)None of these
Ans. (D)
22. All of the following are basic principles of net works, except
(A)each computer must have a network card
(B)there must be communications media connecting the network hardware devices
(C)there must be at least one connecting device
(D)each computer must have software that supports the movement of information
(E)None of these
Ans. (B)
23. The.data mining technique derives rules from real-world case examples.
(A)Rule discover(B)Signal processing(C)Neural nets(D)Case-based reasoning(E)None of these
Ans. (C)
25. Which one of the following objects is passed to a JavaBean when one of its properties is set
via a JSP action?
(A)Servlet Request(B)Http Servlet Request(C)Servlet Response(D)Http Servlet Response(E)None
of these
Ans. (C)
Posted by kaivalya at 8/07/2011 06:00:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Saturday, August 06, 2011
Ans : (C)
3. The purpose of the primary key in a database is to: (A) unlock the database(B) provide a map of
the data(C) uniquely identify a record(D) establish constraints on database operations.(E) None of
these
Ans : (B)
4. All of the following are steps involved in the boot process EXCEPT:
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs.
(E) None of these
Ans : (D)
5. The ____________, stored on a ROM chip, is responsible for loading the operating system from
its permanent location on the hard drive into RAM. (A) BIOS(B) API(C) device driver(D) supervisor
program(E) None of these
Ans : (A)
6. The basic input/output system (BIOS) is stored in: (A) RAM.(B) ROM.(C) the CPU.(D) the hard
drive. (E) None of these
Ans : (B)
7. Personal logs or journal entries posted on the Web are known as: (A) listservs(B) Webcasts(C)
blogs(D) subject directories(E) None of these
Ans : (C)
8. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send
commands to the computer system.
(A) command - based user interface(B) GUI(C) system utility(D) API(E) None of these
Ans : (B)
9. Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
(E) None of these
Ans : (A)
10. All of the following are TRUE regarding virtual memory EXCEPT
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually
changed.
(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive.
(E) None of these
Ans : (A)
11. The secret code that restricts entry to some programs (A) Password(B) Passport(C) Entrycode(D) Access-code(E) None of these
Ans : (A)
12. Computers use the number system to store data and perform calculations. (A) binary(B)
octal(C) decimal(D) hexadecimal(E) None of these
Ans : (A)
13. The main function of the ALU is to
(A) Perform arithmetic and logical operations
(B) Store data and information for future use
(C) Control computer output, such as printing
(D) Monitor all computer activities
(E) None of these
Ans : (A)
14. is the process of carrying out commands.
(A) Fetching(B) Storing(C) Executing(D) Decoding(E) None of these
Ans : (C)
15. Softcopy is the intangible output, so then what is hardcopy ?
(A) The physical parts of the computer (B) The printed parts of the computer (C) The printed
output (D) The physical output devices (E) None of these
Ans : (C)
16. The internet is ......
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) All of these
(E) None of these
Ans : (D)
17. ____________ are lists of commands that appear on the screen. (A) GUIs(B) Icons(C) Menus(D)
Windows(E) None of these
Ans : (C)
18. Which of the following statements is FALSE concerning file names?
(A) Files may share the same name or the same extension but not both
(B) Every file in the same folder must have a unique name
(C) File extension is another name for file type
(D) The file extension comes before the dot (.) followed by the file name
(E) None of these
Ans : (D)
19. The combination of the operating system and the processor is referred to as the computers:
(A) CPU.(B) platform.(C) BIOS.(D) CMOS. (E) None of these
Ans : (B)
20. The following message generally means:
(A) a nonsystem floppy has been left in the floppy disk drive.
(B) the CD drive is not functioning.
(C) the BIOS is corrupted.
(D) there is a problem loading a device.
(E) None of these
Ans : (A)
21. Which of the following is the correct sequence of actions that takes place during the boot-up
process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system
(E) None of these
Ans : (B)
22. The design of the network is called the network: (A) architecture(B) server(C) transmission(D)
type(E) None of these
Ans : (A)
23. The most frequently used instructions of a computer program are likely to be fetched from:
(A) the hard disk(B) cache memory(C) RAM(D) registers (E) None of these
Ans : (B)
24. The ____________ contains data descriptions and defines the name, data type, and length of
each field in the database. (A) data dictionary(B) data table(C) data record(D) data field(E) None of
these
Ans : (A)
25. Ensuring that the essential peripheral devices are attached and operational is
the____________ process. (A) configuration(B) CMOS(C) POST(D) ROM(E) None of these
Ans : (C)
11. This part of operating system manages the essential peripherals, such as the keyboard,
screen , disk drives, and parallel and serial ports ____
(A) basic input/output system(B) secondary input/output system(C) peripheral input/output
system(D) marginal input/output system(E) None of these
Ans : (A)
12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse(B) Boot sector(C) Script(D) Logic bomb(E) None of these
Ans : (B)
13. ________ controls the way in which the computer system functions and provides a means by
which users can interact with the computer
(A) The platform(B) Application software(C) Operating system(D) The motherboard(E) None of
these
Ans : (C)
14. Servers are computers that provide resources to other computers connected to a__________
(A) mainframe(B) network(C) supercomputer(D) client(E) None of these
Ans : (B)
15. A goal of data mining includes which of the following?
(A) To explain some observed event or condition(B) To confirm that data exists(C) To analyze data
for expected relationships(D) To create a new data warehouse(E) None of these
Ans : (A)
16. The operating system controls access to the processor by assigning a(n) ____________ to
each task requiring the processors attention.
(A) CPU(B) slice of time(C) stack(D) event(E) None of these
Ans : (B)
17. The blocks of code, included in the operating system, that software applications interact with
are known as:
(A) application programming interfaces (APIs). (B) complimentary metal-oxide conductors
(CMOS). (C) device drivers.(D) bootstrap loaders. (E) None of these
Ans : (A)
18. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these
Ans : (B)
19. When data changes in multiple lists and all lists are not updated, this causes:
(A) data redundancy(B) information overload(C) duplicate data(D) data inconsistency(E) None of
these
Ans : (D)
20. _____________ are words that a programming language has set aside for its own use.
(A) Control worlds(B) Reserved words(C) Control structures(D) Reserved keys(E) None of these
Ans : (B)
21. The definition of thrashing is:
(A) swapping data between virtual memory and RAM too frequently.
(B) insufficient hard disk space.
(C) too many processors being managed by the operating system.
(D) inaccurate information stored in the registry.
(E) None of these
Ans : (A)
22. All of the following are TRUE of Safe Mode EXCEPT:
(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices.
(E) None of these
Ans : (B)
23. Verification of a login name and password is known as:
(A) configuration.(B) accessibility.(C) authentication.(D) logging in. (E) None of these
Ans : (C)
24. Granting an outside organization access to internet web pages is often implemented using a
(n) ____
(A) extranet(B) intranet(C) internet(D) hacker(E) None of these
Ans : (A)
25. Which term identifies a specific computer on the web and the main page of the entire site
(A) URL(B) Web site address(C) Hyperlink(D) Domain name(E) None of these
Ans : (A)
Posted by kaivalya at 8/05/2011 11:00:00 am No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Links to this post
Ans : (D)
3. In Excel, any set of characters containing a letter , hyphen, or space is considered
(A) a formula(B) text(C) a name(D) a title(E) None of these
Ans : (B)
4. ____________Software allows users to perform calculations on rows and columns of data.
(A) Word processing(B) Presentation graphics(C) Database Management Systems(D) Electronic
Spreadsheet (E) None of these
Ans : (C)
5. A ____________represent approximately one billion memory locations.
(A) kilobyte(B) megabyte(C) gigabyte(D) terabyte(E) None of these
Ans : (C)
6. The OSI model is divided into _______ processes called layers.
(A) five(B) six(C) seven(D) eight(E) None of these
Ans : (C)
7. System software is the set of programs that enables your computer's hardware devices and
______ software to work together. (A) management(B) processing(C) utility(D) application(E) None
of these
Ans : (D)
8. ________ are specially designed computer chips reside inside other devices, such as your car
or your electronic thermostat. (A) Servers(B) Embedded computers(C) Robotic computers(D)
Mainframes(E) None of these
Ans : (B)
9. The following are all computing devices , except.........
(A) notebook computers(B) cellular telephones(C) digital scanners(D) personal digital
assistants(E) None of these
Ans : (C)
10. in a ring topology , the the computer in possession of the ______ can trasmit data (A)
packet(B) data(C) access method(D) token(E) None of these
Ans : (D)
11. The operating system does all of the following EXCEPT:
(A) provide a way for the user to interact with the computer.(B) manage the central processing
unit (CPU).(C) manage memory and storage.(D) enable users to perform a specific task such as
document editing. (E) None
Ans : (D)
12. During the boot process, the____________looks for the system files.
(A) CD (B) BIOS (C) CPU (D) DVD (E) None
Ans : (B)
13. ____________ are lists of commands that appear on the screen.
(A) GUIs(B) Icons(C) Menus(D) Windows(E) None of these
Ans : (C)
14. ____________ is the ability of an operating system to control the activities of multiple
programs at the same time.
(A) Multitasking(B) Streamlining(C) Multiuser(D) Simulcasting(E) None of these
Ans : (A)
15. The unique signal, generated by a device, that tells the operating system that it is in need of
immediate attention is called an:
(A) action.(B) event.(C) interrupt.(D) activity. (E) None of these
Ans : (C)
16. URL stands for ........ (A) Universal Research List(B) Universal Resource List(C) Uniform
Resource Locator(D) Uniform Research Locator(E) None of these
Ans : (C)
17. A database management system (DBMS) is a ............
(A) hardware system used to create , maintain and provide controlled access to a database
(B) hardware system used to create, maintain, and provide uncontrolled access to adatabase.
(C) software system used to create, maintain, and provide uncontrolled access to adatabase.
(D) software system used to create, maintain, and provide controlled access to a database.
(E) None of these
Ans : (D)
18. MS-DOS is a ____________ operating system.
(A) point-and-click(B) user-friendly(C) command-driven(D) Mac(E) None of these
Ans : (C)
19. An interrupt handler is a(n):
(A) location in memory that keeps track of recently generated interrupts.(B) peripheral device.(C)
utility program. (D) special numeric code that indicates the priority of a request.(E) None of these
Ans : (D)
20. A spooler is a(n):
(A) location in memory that maintains the contents of a document until it prints out.(B) print
job.(C) program that coordinates the print jobs that are waiting to print.(D) message sent from the
printer to the operating system when a print job is completed. (E) None of these
Ans : (C)
21. Virtual memory is typically located:
(A) on a floppy disk.(B) in the CPU.(C) in a flash card.(D) on the hard drive. (E) None of these
Ans : (D)
22. The purpose of a swap (or page) file is to:
(A) maintain pages of documents that are being spooled to the printer.
(B) hold a programs data or instructions in virtual memory when it cant fit in RAM.
2. Which term identifies a specific computer on the web and the main page of the entire
site
(A) URL(B) Web site address(C) Hyperlink(D) Domain name(E) None of these
3. Which one of the following objects is passed to a JavaBean when one of its
properties is set via a JSP action?(a) Servlet Request(b) Http Servlet Request(c) Servlet
4. The word FIP stands for(a) File Translate Protocol(b) File Transit Protocol(c) File Typing
Protocol(d) File Transfer Protocol(e) None of these
5. 'DOS' floppy disk does not have(a) A Boot Record(b) A File Allocation Table(c) A Root
Directory (d) Virtual Memory(e) BIOS
6. ____________ are viruses that are triggered by the passage of time or on a certain
date.
(A) Boot-sector viruses(B) Macro viruses(C) Time bombs(D) Worms(E) None of these
8. allows wireless mobile devices to access the Internet and its services
such as the Web and e-mail(A) TCP/IP(B) Ethernet (C)WAP(D) Token ring(E) None of these
9. .are used to identify a user who returns to a Website.
(A) Cookies(B) Plug-ins (C) Scripts(D) ASPs(E) None of these
12. Personal logs or journal entries posted on the Web are known as:
(A) listservs(B) Webcasts(C) blogs(D) subject directories(E) None of these
15. Which of the following places the common data elements in order from smallest to
largest
(A) character, file, record, field, database(B) character, record, field, database, file(C) character,
field, record, file, database(D) Bit, byte, character, record, field, file, database, (E) None of these
16. The.data mining technique derives rules from real-world case examples.
(A) Rule discover (B) Signal processing(C) Neural nets(D) Case-based reasoning(E) None of these
17. A passive threat to computer security is (A) Malicious Intent(B) Sabotage(C) Accident
Errors(D) Espionage Agents(E) None of these
18. Which of the following would most likely NOT be a symptom of a virus?
(A) Existing program files and icons disappear.(B) The CD-ROM stops functioning.(C) The Web
browser opens to an unusual home page.(D) Odd messages or images are displayed on the
screen. (E) None of these
19. The code that relational database management systems use to perform their
database task is referred to as .....(A) QBE (B) SQL(C) OLAP(D) Sequel Server(E) None of these
20. A database management system (DBMS) is a ............
(A) hardware system used to create , maintain and provide controlled access to a database
(B) hardware system used to create, maintain, and provide uncontrolled access to a database.
(C) software system used to create, maintain, and provide uncontrolled access to a database.
(D) software system used to create, maintain, and provide controlled access to a database.
(E) None of these
21. System software is the set of programs that enables your computer's hardware
devices and ______ software to work together.(A) management(B) processing(C) utility(D)
application(E) None of these
23. All of the following are basic principles of net works, except
(A) each computer must have a network card
(B) there must be communications media connecting the network hardware devices
(C) there must be at least one connecting device
(D) each computer must have software that supports the movement of information
(E) None of these
24. A(n) _______ uses pictures (called icons) and menus displayed on the screen to
send commands to the computer system.(A) command - based user interface(B) GUI(C)
system utility(D) API(E) None of these
25. Chip is a common nickname for a (n): (A) transistor(B) resistor (C) integrated circuit(D)
semiconductor(E) None of these
26. When you are selecting a mouse for a particular computer system, what is the most
important consideration? (A) The type of drivers that come with the mouse (B) The length of the
mouse cord(C) The type of connector the mouse is equipped with (D) The number of buttons the
mouse has (E) None of these
27. This part of operating system manages the essential peripherals, such as the
keyboard, screen , disk drives, and parallel and serial ports ____ (A) basic input/output
system(B) secondary input/output system(C) peripheral input/output system(D) marginal
input/output system(E) None of these
28. ______________ Servers store and manages files for network users.
(A) Authentication (B) Main(C) Web (D) File(E) None of these
29. Programs from the same developer , sold bundled together , that provide better
integration and share common features , toolbars and menus are known as ....
(A) software suites(B) integrated software packages(C) software processing packages(D) personal
information managers(E) none of these
30. _____ are lists of commands that appear on the screen.(A) GUIs(B) Icons(C) Menus (D)
Windows(E) None of these
33. The purpose of the primary key in a database is to: (A) unlock the database(B) provide a
map of the data (C) uniquely identify a record(D) establish constraints on database operations.(E)
None of these
41. ___________ terminals (formerly known as cash registers) are often connected to
complex inventory and sales computer systems . (A) Data (B) Sales (C) Query (D) (Point-ofsale (POS)(E) None of these
42. URL stands for ........ (A) Universal Research List(B) Universal Resource List(C) Uniform
Resource Locator(D) Uniform Research Locator(E) None of these
43. The ____________ contains data descriptions and defines the name, data type, and
length of each field in the database. (A) data dictionary(B) data table(C) data record(D) data
field(E) None of these
47. The design of the network is called the network: (A) architecture (B) server(C)
transmission(D) type(E) None of these
49. ________ controls the way in which the computer system functions and provides a
meAns : by which users can interact with the computer (A) The platform(B) Application
software(C) Operating system(D) The motherboard(E) None of these
50. You must install a (n) ____________ on a network if you want to share a broadband
Internet connection.(A) router(B) modem(C) node(D) cable(E) None of these
51. Which of the following is NOT a type of broadband Internet connection?
(A) Cable(B) DSL(C) Dial-up(D) Satellite(E) None of these
52. _____________ are words that a programming language has set aside for its own
use.
(A) Control worlds(B) Reserved words(C) Control structures(D) Reserved keys(E) None of these
53. in a ring topology , the computer in possession of the ______ can transmit data
(A) packet(B) data(C) access method (D) token(E) None of these
55. The OSI model is divided into _______ processes called layers. (A) five (B) six(C)
seven(D) eight(E) None of these
56. Servers are computers that provide resources to other computers connected to a
___________
(A) mainframe(B) network(C) supercomputer(D) client(E) None of these
57. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is
known as:
(A) spyware(B) adware(C) spam(D) malware(E) None of these
59. The internet is ...... (A) a large network of networks (B) an internal communication system
for a business (C) a communication system for the Indian government (D) All of these
(E) None of these
61. The most frequently used instructions of a computer program are likely to be fetched
from:
(A) the hard disk(B) cache memory(C) RAM(D) registers(E) None of these
62. The.component is used by the data analyst to create the queries that
access the database. (1) data extraction(2) end-user query tool(3) end-user presentation tool(4)
data store(5) None of these
63. All of the following are examples of real security and privacy risks Except _____
(A) hackers(B) spam(C) viruses(D) identify theft(E) None of these
64. Granting an outside organization access to internet web pages is often implemented
using a (n) ____(A) extranet(B) intranet(C) internet(D) hacker(E) None of these
65. The altering of data so that it is not usable unless the changes are undone is
(A) Biometrics(B) Compression(C) Encryption(D) Ergonomics(E) None of these
66. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse(B) Boot sector(C) Script(D) Logic bomb(E) None of these
68. When data changes in multiple lists and all lists are not updated, this causes:
(A) data redundancy(B) information overload(C) duplicate data(D) data inconsistency(E) None of
these
70. ________ are specially designed computer chips reside inside other devices, such
as your car or your electronic thermostat. (A) Servers(B) Embedded computers(C) Robotic
computers(D) Mainframes(E) None of these
ANSWERS:
1 : (B) 2 : (A) 3. (c) 4. (a) 5. (d) 6 : (C) 7 : (D) 8. (C) 9. (A) 10. (D) 11 : (A) 12 : (C) 13.
(B) 14. (D) 15 : (C) 16. (C) 17. (A) 18 : (B) 19 : (B) 20 : (D)21 : (D) 22. (A) 23. (B) 24 :
(B) 25 : (C) 26. (C) 27 : (A) 28: (D) 29 :(A) 30 : (C) 31. (A) 32. (C) 33 : (B) 34 : (D) 35 :
(A) 36 : (C) 37 : (C) 38 : (D) 39. (D) 40 : (C) 41 : (B) 42 : (C) 43 : (A) 44. (B) 45 : (D) 46
: (B) 47 : (A) 48. (1) 49 : (C) 50 : (A) 51 : (C) 52 : (B) 53 : (D) 54. (B) 55 : (C) 56 : (B)
57 : (D) 58. (D) 59 : (D) 60. (B) 61 : (B) 62. (2) 63 : (B) 64 : (A) 65. (C) 66 : (B) 67. (D)
68 : (D) 69. (C) 70 : (B)