Computer Q. by Aditya(Loksewaexam)

Embed Size (px)

Citation preview

1. A is the term used when a search engine returns a Web page that matches the search criteria.(A) blog(B) hit(C) link(D) view(E) successAns : (C)2. Which of the following are advantages of CD-ROM as a storage media ?(A) CD-ROM is an inexpensive way to store large amount of data and information(B) CD-ROM disks retrieve data and information more quickly than magnetic disks do(C) CD-ROMs make less errors than magnetic media(D) All of these(E) None of theseAns : (D)

3. The is the term used to describe the window that is currently being used.(A) Web Window(B) display area(C) WordPad Window(D) active window(E) monitorAns : (D)

4. A microprocessor is the brain of the computer and is also called a(n)(A) microchip(B) macrochip(C) macroprocessor(D) calculator(E) softwareAns : (A)5. CPU is an abbreviation for(A) central programming unit(B) central processing unit(C) computer processing unit(D) computer protocol unit(E) central protocol unitAns : (B)6. What are two examples of freeware ?(A) WinZip and Linux(B) Shareware and file sharing(C) Microsoft Word and the Google toolbar(D) Instant messaging and the Google toolbar(E) Microsoft Power Point and Microsoft ExcelAns : (D)7. Storage and memory differ with respect to which of the following characteristics ?(A) Price(B) Reliability(C) Speed(D) All of these(E) None of theseAns : (D)

8. If a disk drivefails but the computer application running and using it can continue processing, this application is said to have been designed with this feature(A) 100 per cent uptime(B) fault tolerance(C) high reliability(D) All of these(E) None of theseAns : (B)9. What are the four things needed to connect to the Internet ?(A) Telephone line, modem, computer, and an ISP(B) Modem, computer, PDA and ISP(C) Telephone line, PDA, modem and computer(D) Computer, ISP, modem and communication software(E) Monitor, keyboard, mouse, modemAns : (A)10. What is e-commerce ?(A) Buying and selling international goods(B) Buying and selling products and services over the Internet(C) Buying and selling products and services not found in stores(D) Buying and selling products having to do with computers(E) Buying and selling of electronic goodsAns : (B)

11. Which media have the ability to have data/information stored (written) on them by users more than once ?(A) CD-R disks(B) CD-RW disks(C) Zip disks(D) OptiDisks(E) Word processingAns : (E)12. Which of the following functions arenotperformed by servers ?(A) Email processing(B) Database sharing(C) Processing Web sites(D) Storage(E) Both CD-RW disks and Zip disksAns : (A)

13. The process of transferring files from a computer on the Internet to your computer is called(A) downloading(B) uploading(C) FTP(D) JPEG(E) downsizingAns : (C)14. Which of the following could be digital input devices for computers ?(A) Digital camcorder(B) Microphone(C) Scanner(D) All of the above(E) None of theseAns : (D)15. Thecontrols a client computers resources.(A) application program(B) instruction set(C) operating system(D) server application(E) compilerAns : (D)

16. To reload a Web page, press the button.(A) Redo(B) Reload(C) Restore(D) Ctrl(E) RefreshAns : (E)

17. Theenables you to simultaneously keep multiple Web pages open in one browserwindow.(A) tab box(B) pop-up helper(C) tab row(D) address bar(E) Esc keyAns : (A)

18. Storage media such as a CD read and write information using(A) a laser beam of red light(B) magnetic dots(C) magnetic strips(D) All of these(E) None of theseAns : (D)19. You can use thebar to type a URL and display a Web page, or type a keyword to display a list of related Web pages.(A) menu(B) Title(C) Search(D) Web(E) AddressAns : (E)20. Every computer has a(n) ;many also have.(A) operating system, a client system(B) operating system; instruction sets(C) application programs; an operating system(D) application programs; a client system(E) operating system; application programsAns : (E)21. Vendor-created program modifications are called.......(A) patches(B) antiviruses(C) holes(D) fixes(E) overlapsAns : (D)

22. Cache and main memory will lose their contents when the power is off. They are(A) dynamic(B) static(C) volatile(D) non-volatile(E) faultyAns : (C)23. Main memory worksin conjunction with(A) special function cards(B) RAM(C) CPU(D) Intel(E) All of theseAns : (C)24. A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using(A) input automation(B) item data automation(C) scanning automation(D) source data automation(E) None of theseAns : (C)25. The collection of links throughout the Internet creates an interconnected network called the(A) WWW(B) Web(C) World Wide Web(D) All of the above(E) Wide Area WebAns : (D)

26. Which of the following is an example of storage devices ?(A) Magnetic disks(B) Tapes(C) DVDs(D) All of these(E) None of theseAns : (D)27. A(n)is composed of several computers connected together to share resources and data.(A) Internet(B) network(C) backbone(D) hyperlink(E) protocolAns : (B)28. A popular way to learn about computers without ever going to a classroom is called(A) i-learning(B) isolated learning(C) e-learning(D) close learning(E) Distance LearningAns : (C)29. A person who used his or her expertise to gain access to other peoples computers to get information illegally or do damage is a(A) spammer(B) hacker(C) instant messenger(D) programmer(E) analystAns : (B)30. Microsoft Office is an example of a(A) closed-source software(B) open-source software(C) horizontal-market software(D) vertical-market software(E) compilerAns : (A)31. Thefolder retains copies of messages that you have started but are not yet ready to send.(A) Inbox(B) Outbox(C) Drafts(D) Sent Items(E) Address BookAns : (C)

32. The main job of a CPU is to(A) carry out program instructions(B) store data/information for future use(C) process data and information(D) Both (A) and (C)(E) None of theseAns : (D)33. Videoprocessors consist of and , which store and process images.(A) CPU and VGA(B) CPU and memory(C) VGA and memory(D) VGI and DVI(E) VGA and VGIAns : (C)34. Which of the following is an example of an optical disk ?(A) Digital versatile disks(B) Magnetic disks(C) Memory disks(D) Data bus disks(E) None of theseAns : (A)35. are attempts by individuals to obtain confidential information from you by falsifying their identity.(A) Phishing trips(B) Computer viruses(C) Spywarescams(D) Viruses(E) Phishing scamsAns : (E)

36. An example of a processing device would be(A) a magnetic ink reader(B) a tablet PC(C) special function cards(D) scanners(E) keyboardsAns : (B)

37. Which of the following is not a type of computer software which can be bought ?(A) Off-the-shelf(B) Tailor-made(C) Custom-developed(D) Off-the-shelf with alterations(E) All of these can be purchasedAns : (D)

38. You can useto copy selected text, and to paste it in a document.(A) CTRL + C, CTRL + V(B) CTRL + C, CTRL + P(C) CTRL + S, CTRL + S(D) SHIFT + C, ALT + P(E) CTRL + D, CTRL + AAns : (A)

39. The main memory of a computer can also be called(A) primary storage(B) internal memory(C) primary memory(D) All of these(E) None of theseAns : (C)40. When speaking of computer input and output, input refers to(A) any data processing that occurs from new data input into the computer(B) retrieval of data or information that has been input into the computer(C) data or information that has been entered into the computer(D) the transmission of data that has been input into the computer(E) Both (C) and (D) aboveAns : (E)

41. A is a set of rules.(A) resource locator(B) domain(C) hypertext(D) URL(E) protocolAns : (E)42. Thefile format is a method of encoding pictures on a computer.(A) HTML(B) JPEG(C) FTP(D) URL(E) DOCAns : (B)43. Computer software can be defined as(A) the computer and its associated equipment(B) the instructions that tell the computer what to do(C) computer components that act to accomplish a goal(D) an interface between the computer and the network(E) the interaction between the computer and its databaseAns : (B)44. The connection between your computer at home and your local ISP is called(A) the last mile(B) the home stretch(C) the home page(D) the backbone(E) the vital mileAns : (C)

45. There are several primary categories of procedures. Which of the following is not a primary category of procedures ?(A) Testing(B) Backup and recovery(C) Firewall development(D) Design(E) None of theseAns : (C)

46. The operating system called UNIX is typically used for(A) desktop computers(B) laptop computers(C) supercomputers(D) Web servers(E) All of theseAns : (E)47. All of the logic and mathematical calculations done by the computer happen in/on the(A) system board(B) central control unit(C) central processing unit(D) mother board(E) memoryAns : (C)

48. Computer systems are comprised of(A) hardware, programs, information, people and networks(B) hardware, software, procedures, networks and people(C) hardware, programs, information, people and procedures(D) hardware, programs, processors, procedures, networks and people(E) hardware, programs, processors, procedures and peopleAns : (A)49. Pressto move the insertion point to the Address box, or to highlight the URL in the Address box.(A) ALT + D(B) ALT + A(C) SHIFT + TAB(D) TAB + CTRL(E) CTRL + SAns : (A)27. Which of the following is a storage device that uses rigid, permanently installedmagnetic disks to store data/information(A) floppy diskette(B) hard disk(C) permanent disk(D) optical disk(E) None of theseAns : (B)1.The first generation of computers were based upon(a) transistors(b) lCs(c) valves(d) conductorAns : c

2.Turbo switch on computer is in(a) back panel(b) is not there(c) front panel(d) All of theseAns : c

3.The second generation computers were based upon(a) transistors(b) ICs(c) valves(d) chipsAns : a

4.RAM stands for(a) Random Allowed Memory(b) Ready Access Memory(c) Random Access Memory(d) Random Added MemoryAns : c

5.In programming, you use the following keys(a) Arrow keys(b) Function keys(c) Alpha keys(d) Num keysAns : b

6.Printer is a device which(a) input(b) output(c) Both a and b(d) None of theseAns : b7.Laser printer is device which(a) input(b) output(c) Both a and b(d) None of theseAns : b

8.Track ball has a(a) ball(b) track(c) football(d) None of theseAns : a

9.Dot matrix printer uses what for printing(a) hammers(b) slugs(c) mouse(d) nibsAns : a

10.A CD can hold approximately how much of data(a) 200 MB(b) 700 MB(c) 1000 MB(d) 2000 MBAns : b

11. Computer program which controls the operations of computer is called(a) assembles(b) operating System(c) interpreter(d) compilerAns : b

12. System software are of two types operating systems and(a) applications(b) word processing(c) language trans(d) None of theseAns : c13.Debugging tools are there to debug errors in(a) printers(b) keyboards(c) programs(d) languageAns : c14. There are two basic types of disks-floppy disk and(a) low disk(b) hard disk(c) soft disk(d) None of theseAns : b15. It is a collection of facts and figures(a) data(b) information(c) processing(d) fileAns : a16.It converts accepted instructions into machine language(a) input unit(b) output unit(c) processing unit(d) memory unitAns : a17. To open a new file in MS-Word, the shortcut key is(a) Ctrl + X(b) Ctrl + N(c) Ctrl + Y(d) Ctrl + VAns : b18. What is the term used for the word processing programs that show you directly on the PC screen the appearance of your final document as you might expect on the paper?(a) Search & Replace(b) Pagination(c) Soft Copy(d) WYSIWYGAns : d

19. Alignment buttons are available on which toolbar?(a) Status(b) Standard(c) Formatting(d) None of theseAns : c20. Which of the following is not an option of edit menu?(a) Cut(b) Copy(c) Paste(d) Page setupAns : d21. By default the bottom margin in the word document is(a) 2 inch(b) 1 inch(c) 3 inch(d) 1.5 inchAns : b22.A file name cannot contain in MS-Word database file(a) a letter(b) number(c) underscore(d) spaceAns : d23.Selection of text involves only(a) single word(b) line or multiple lines(c) paragraph or paragraphs and complete document(d) All of the aboveAns : d24.Replace option is available in(a) Edit menu(b) File menu(c) Tools menu(d) Insert menuAns : a

25.When you start spelling checker, it starts checking the spellings(a) from the end of the document to upward(b) from the beginning of the document and downward(c) from the insertion point(d) None of the aboveAns : c

1.What is the Permanent memory built into yourComputer called?(a) RAM(b) ROM(C) CPU(d) CD-ROM(e) None of these

ANSWER: (a)2. The physical arrangement of elements on a pageis referred to as a documents.(1) Features(2) Format(3) Pagination(4) Grid(5) None of these

ANSWER. (2)3. All the deleted files go to(a) Recycles Bin(b) Task Bar(c) Tool Bar(d) My computer(e) None of these

ANSWER: (a)4. Most Websites have a main page, theWhich acts as a doorway to the rest of the Website pages.(1) Search engine(2) Home page(3) Browser(4) URL(5) None of these

ANSWER. (2)7. What type of device is a computer printer?(a) Input(b) Output(c) Software(d) Storage(e) None of these

ANSWER: (b)8. Which is not a basic function of a computer?(1) Copy text(2) Accept input(3) Process data(4) Store data(5) None of these

ANSWER. (1)9. When you turn on the computer, the bootRoutine will perform the test(a) RAM test(b) Disk drive test(c) Memory test(d) Power-on self(e) None of these

ANSWER: (e)10. Which of the following system components is thebrain of the computer ?(1) Circuit board(2) CPU(3) Memory(4) Network card(5) None of these

ANSWER. (2)11. For creating a document, you use command at File Menu.(a) Open(b) Close(c) New(d) Save(e) None of these

ANSWER: (c)12. A . .. is a collection of information saved as a unit.(1) Folder(2) File(3) Path(4) File extension(5) None of these

ANSWER. (1)13. A data warehouse is which of the following?(a) Can be updated by the end users(b) Contains numerous naming conventions and formats(c) Organized around important subject areas(d) Contains only current data(e) None of the above

ANSWER: (c)14. All of the following are examples of real security and privacy risks except.(a) Hackers(b) Spam(c) Viruses(d) Identify theft(e) None of these

ANSWER: (b)15. Another word for software is (1) Input(2) Output(3) Program(4) System(5) None of these

ANSWER. (3)16. The OSI model is divided into how manyProcesses called layers?(a) Five(b) Six(c) Seven(d) Eight(e) None of these

ANSWER: (c)17. Generally, you access the Recycle Bin through an icon located..(1) On the desktop(2) On the hard drive(3) On the shortcut menu(4) In the Properties dialog box(5) None of the above

ANSWER. (1)18. A shares hardware, software, and data among authorized users.(1) Network(2) Protocol(3) Hyperlink(4) Transmitter(5) None of these

ANSWER. (1)19. The main system board of a computer is called the(1) Integrated circuit(2) Motherboard(3) Processor(4) Microchip(5) None of these

ANSWER. (2)20. The main directory of a disk is called the directory.(1) Root(2) Sub(3) Folder(4) Network(5) None of these

ANSWER. (1)21. These are specially designed computer chips Reside inside other devices, such as your car orYour electronic thermostat(a) Servers(b) Embedded computers(c) Robotic computers(d) Mainframes(e) None of the above

ANSWER: (b)22. ln a ring topology, the computer in possession ofThe ______can transmit data(a) Packet(b) Data(c) Access method(d) Token(e) None of these

ANSWER: (d)23. Servers are computers that provide resources toOther computers connected to a(a) Mainframe(b) Network(c) Supercomputer(d) Client(e) None of these

ANSWER: (b)24. Computer programs are written in a high-level programming language; however, the human-readable version of a program is called. ..(1) Cache(2) Instruction set(3) Source code(4) Word size(5) None of these

ANSWER (1)25. These type of Viruses are often transmitted by aFloppy disk left in the floppy drive(a) Trojan horse(b) Boot sector(c) Script(d) Logic bomb(e) None of these

ANSWER: (b)

1. URL stands for(a) Universal Research List(b) Universal Resource List(c) Uniform Resource Locator(d) Uniform Research Locator(e) None of the above

ANSWER: (c)2. Which of the following is NOT a goal of Transaction processing system?(a) Capture, process and store transactions(b) Produce a variety of documents related to Routine business activities(c) Reduce manual effort associated with Processing business transactions(d) Produce standard reports used for Management decision making(e) None of the above

ANSWER: (b)3.When data changes in multiple lists and all lists are not updated, this causes(a) Data redundancy(b) Information overload(c) Duplicate data(d) Data inconsistency(e) None of the above

ANSWER: (d)4. Data becomes _ when it is presented in a format that people can understand and use.(1) Processed(2) Graphs(3) Information(4) Presentation(5) None of these

ANSWER (3)5. The term _ designates equipment that might be added to a computer system to enhance its functionality.(1) Digital device(2) System add-on(3) Disk pack(4) Peripheral device(5) None of these

ANSWER (4)6. What is the primary difference between viruses and a worm?(a) A worm has the ability to self-propagate From an infected users computer to otherComputers(b) A worm is usually written by a cracker: Script bunnies do not have the skills toDevelop a worm program(c) A virus is very harmful to the computers it Infects: a worm is not a serious, a problem(d) Anti-virus software is effective in fighting Viruses but not worms(e) None of the above

ANSWER: (c)7. You must install this on a network if you want to Share a broadband Internet connection.(a) router(b) Modem(c) Node(d) Cable(e) None of these

ANSWER: (a)8. ______________ is the ability of a device to jump directly to the requested data.(1) Sequential access(2) Random access(3) Quick access(4) All of these(5) None of these

ANSWER (1)9. Granting an outside organisation access to Internet web pages is often implemented using a(an)(a) Extranet(b) Intranet(c) Internet(d) Hacker(e) None of these

ANSWER: (a)10. The code that relational database management Systems use to perform their database task isReferred to as(a) QBE(b) SQL(c) OLAP(d) Sequel Server(e) None of these

ANSWER: (b)11. The purpose of the primary key in a database is to(a) Unlock the database(b) Provide a map of the data(c) Uniquely identify a record(d) Establish constraints on database operations(e) None of the above

ANSWER: (b)12. The instructions that tell a computer how to carry out the processing tasks are referred to ascomputer(1) Programs(2) Processors(3) Input devices(4) Memory modules(5) None of these

ANSWER (1)13. The ________________ is the amount of data that a storage device can move from the storage medium to thecomputer per second.(1) Data migration rate(2) Data digitizing rate(3) Data transfer rate(4) Data access rate(5) None of these

ANSWER (3)14. C, BASIC, COBOL and Java examples of _languages.(1) Low-level(2) Computer(3) System programming(4) High-level(5) None of the above

ANSWER (2)15. A______________ is a microprocessor-based computing device.(1) Personal computer(2) Mainframe(3) Workstation(4) Server(5) None of these

ANSWER (1)16. The design of the network is called the network(a) Architecture(b) Server(c) Transmission(d) Type(e) None of these

ANSWER: (a)17. A _____________ converts all the statements in a program in a single batch and the resulting collection ofInstructions is placed in a new file.(1) Converter(2) Compiler(3) Interpreter(4) Instruction(5) None of these

ANSWER (2)18. It uses pictures (called icons) and menus Displayed on the screen to send commands to theComputer system(a) command-based user interface(b) GUI(c) System utility(d) API(e) None of the above

ANSWER: (b)19. It contains data descriptions and defines the Name, data type, and length of each field in theDatabase(a) Data dictionary(b) Data table(C) Data record(d) Data field(e) None of these

ANSWER: (a)20. A is an additional set of commands that the computer displays after you make a selectionfrom the main menu.(1) Dialog box(2) Submenu(3) Menu selection(4) All of these(5) None of these

ANSWER (2)21. Which of the following is NOT a type ofBroadband internet connection?(a) Cable(b) DSL(c) Dial-up(d) Satellite(e) None of these

ANSWER: (c)22. in making a field this property show that it Cannot be left blank(a) Numeric(b) Required(c) Calculated(d) Validated(e) None of these

ANSWER: (b)23. There are viruses that are triggered by the Passage of time or on a certain date(a) Boot-sector viruses(b) Macro viruses(c) Time bombs(d) Worms(e) None of these

ANSWER: (c)24. What is a backup?(a) Restoring the information backup(b) An exact copy of a systems information(c) The ability to get a system up and runningIn the event of a system crash or failure(d) All of the above(e) None of the above

ANSWER: (d)25. The internet is(a) A large network of networks(b) An internal communication system for aBusiness(c) A communication system for the IndianGovernment(d) All of the above(e) None of the above

ANSWER: (d)

1. Which of the following is not as language for computer programming ?(a) WINDOWS(b) PASCAL(c) BASIC(d) COBOL(e) All of theseANSWER: (a)2. What digits are representative of all binary Numbers?(H) 0(b) 1(c) Both a and b(d) 3(e) None of these

ANSWER: (c)3. The term gigabyte refers to(a) 1024 bytes(b) 1024 kilobytes(c) 1024 megabytes(d) 1024 gigabytes(e) None of these

ANSWER: (c)4. Off-line operation is the operation of devices without the control of(a) Memory(b) CPU(C) ALU(d) Control unit(e) None of these

ANSWER: (b)5. Name the first general purpose electronic computer(a) ADVAC(b) ADSAC(c) UNIVAC(d) EDVAC(e) None of these

ANSWER: (c)6. Which of the following statement is wrong?(a) Windows XP is an operating system(b) Linux is owned and sold by Microsoft(c) Photoshop is a graphical design tool byAdobe(d) Linux is free and open source software(e) None of the above

ANSWER: (b)7. A software used to convert source program instructions to object instruction is known as(a) Compiler(b) Assembler(c) Interpreter(d) Language processor(e) None of these

ANSWER: (d)8. The term Operating System means(a) A set of programs which control computer working(b) The way a user operates the computer system(c) Conversion of high level language to machine language(d) The way computer operator works(e) None of the above

ANSWER: (a)9. Input, output and processing devices grouped together represent a(n) (a) Mobile device(b) Information processing cycle(c) Circuit boards(d) Computer system(e) None of the above

ANSWER: (d)10. The is the box that houses the most Important parts of a computer system.(a) Software(b) Hardware(c) Input device(d) System unit(e) None of these

ANSWER: (d)11. The physical arrangement of elements on a page is referred to as a documents (a) Features(b) Format(c) Pagination(d) Grid(d) None of these

ANSWER: (b)12. All of the following are examples of real security and privacy risks EXCEPT(a) Hackers(b) Spam(c) Viruses(d) Identity theft(e) None of these

ANSWER: (b)13. The ability to recover and read deleted or damaged files from a Criminals computer is anexample of a law enforcement specialty called(a) Robotics(b) Simulation(C) Computer forensics(d) Animation(e) None of these

ANSWER: (c)14. This tags, when placed on an animal, can be used to record and track in a database all of theAnimals movements(a) POS C(b) RFID(C) PPS(d) GPS(e) None of these

ANSWER: (b)15. These terminals (formerly known as cash Registers) are often connected to complexinventory and sales computer systems(a) Data(b) Point-of-sale (POS)(c) Sales(d) Query(e) None of the above

ANSWER: (b)16. Technology no longer protected by copyright,available to everyone, is considered to be(a) proprietary.(b) Open(c) Experimental(d) In the public domain(e) None of the above

ANSWER: (a)17. It is the science that attempts to produce machines that display the same type ofIntelligence that humans do(a) Nano science(b) Nanotechnology(c) Simulation(d) Artificial intelligence (AI)(e) None of the above

ANSWER: (d)18. The name for the way that computers manipulate data into information is Called(a) Programming(b) Processing(C) Storing(d) Organizing(e) None of these

ANSWER: (b)19.Computers gather data, which means that they allow users to(a) Present data(B) input data(C) Output data(d) Store data(e) None of these

ANSWER: (b)20. Which type of data has been organized or presented in a meaningful fashion ?(a) A process(b) Software(C) Storage(d) Information(e) None of these

ANSWER: (d)21. After a picture has been taken with a digital camera and processed appropriately, the actualprint of the picture is considered -(a) Data(b) Output(c) Input(d) The process(e) None of these

ANSWER: (b)22. Computers process data into information by working exclusively with(a) Multimedia(b) Words(c) Characters(d) Numbers(e) None of these

ANSWER: (d)23. The term bit is short for(a) Megabyte(b) Binary language(C) Binary digit(d) Binary number(e) None of these

ANSWER: (c)24. In the binary language each letter of the alphabet, each number and each specialcharacter is made up of a unique combination of(a) eight bytes(b) eight kilobytes(C) Eight characters(d) eight bits(e) None of these

ANSWER: (d)25. Computers use which language to process data?(a) Processing(b) Kilobyte(C) binary(d) Representational(e) None of these

ANSWER: (c)

1. You would use this software to create spreadsheets, type documents, and edit photos(a) Application(b) Utility(c) System(d) Operating(e) None of these

ANSWER: (a)2. Which key is used in combination with another key to perform a specific task ?(1) Function(2) Space bar(3) Arrow(4) Control(5) None of theseANSWER (4)3. Various applications and documents are represented on the Windows desktop by(1) Symbols(2) Labels(3) Graphs(4) Icons(5) None of these

ANSWER (4)4. In MICR, C stands for(1) Code(2) Colour(3) Computer(4) Character(5) None of these

ANSWER (4)5. The contents of il- are lost when the computer turns off,(1) Storage(2) Input(3) Output(4) Memory(5) None of these

ANSWER (1)6. It is the term given to the act of stealing someoneidentity and ruining their credit rating(a) Find Error(b) Identity(c) Identity theft(d) Virus Indefinites(e) None of these

ANSWER: (c)7. The pattern of printed lines on most products are called(1) Prices(2) OCR(3) Scanners(4) Barcodes(5) None of these

ANSWER (4)8. These are life-sized mannequins that have a pulse and a heartbeat and respond to proceduresjust like humans(a) Embedded computers(b) Servers(c) Robotics computers(d) Pattent simulators(e) None of the above

ANSWER: (d)9. The simultaneous processing of two or more programs by multiple processors is(1) Multiprogramming(2) Multitasking(3) Time-sharing(4) Multiprocessing(5) None of these

ANSWER (4)10. You use a (n)___, such as a keyboard or mouse, to input information.(a) Output device(b) Input device(c) Storage device(d) Processing device(e) None of these

ANSWER: (b)11. When you save to this, your data will remain intact even when the computer is turned off(1) RAM(2) Motherboard(3) Secondary storage device(4) Primary storage device(5) None of the above

ANSWER (3)12. Ab e-mail account includes a storage area, often called a(n)(a) Attachment(b) Hyperlink(c) Mailbox(d) IP address(e) None of these

ANSWER: (c)13. The ____tells the computer how to use its components.(1) Utility(2) Network(3) Application program(4) Operating system(5) None of the above

ANSWER (4)14. A set of computer programs that helps a computer monitor itself and function moreefficiently is a/an(a) Windows(b) System Software(C) DBMS(d) Applications Software(e) None of the above

ANSWER: (b)15. With a CD you can(1) Read(2) Write(3) Read and write(4) Either read or write(5) None of the above

ANSWER (1)16. The __is the amount of data that a storage device can move from the storage medium to the computerper second,(a) Data migration rate(b) Data digitising rate(c) Data transfer rate(d) Data access rate(e) None of these

ANSWER: (c)17. In Excel, Charts are created using which option?(l) Chart Wizard(2) Pivot Table(3) Pie Chart(4) Bar Chart(5) None of the above

ANSWER (3)118. One thousand bytes is a(a) Kilobyte(b) Megabyte(c) Gigabyte(d) Terabyte(e) None of these

ANSWER: (a)19. When sending an e-mail, the ____line describes the contents of the message.(1) Subject(2) To(3) Contents(4) CC(5) None of these

ANSWER (1)20. Which of the following performs modulation and demodulation ?(a) Coaxial cable(b) Satellite(c) Modem(d) Optical fiber

ANSWER: (c)21. Who is the father of computer ?(a) Charles Babbage(b) Newton(c) Isaac Newton(d) Ought red

ANSWER: (a)22. The function of ESC key is(a) To end the action(b) Go to last action(c) To repeat the last action(d) To end the action

ANSWER: (b)23. A____ is a named set of characters that have the same characteristics.(1) Type face(2) Type style(3) Font(4) Pico(5) None of theseANSWER (3)24. A monitor is the distance between the holes in the mask behind the screen. This helpsdetermine how sharp the dots appear(a) Refresh rate(b) Dot pitch(c) Resolution(d) Colour depthANSWER: (b)25. A complete electronic circuit with transistors and other electronic components on a small silicon chipis called a(n) ____(1) Workstation(2) CPU(3) Magnetic disk(4) Integrated circuit(5) None of theseANSWER (4)

1. Which of the following is not an advantage ofmagnetic disk storage ?(a) The access time of magnetic disk is much less than that of magnetic tape(b) Disk storage is longer lasting than magnetic tape(c) Disk storage is less expensive than tape storage(d) None of the aboveANSWER: (d)2. A prefix for billion which is equal to _____is called as billi.(a) 100(b) 10000(c) 1000(d) 10ANSWER: (a)3. One kilobyte -byte(a) 1250(b) 2088(c) 1024(d) 1000

ANSWER: (c)4. To move the cursor to the end of the documentpress(a) Ctrl + Esc(b) Ctrl + End(c) Ctrl + B(d) Ctrl + c

ANSWER: (B)5. The shortcut key to print documents is(a) Ctrl + A(b) Ctrl + B(c) Ctrl + P(d) Ctrl + C

ANSWER: (c)6. In MICR, C stands for(a) Code(b) Colour(c) Computer(d) Character(e) None of these

ANSWER: (d)7. The simultaneous processing of two or morePrograms by multiple processors is(a) Multiprogramming(b) Multitasking(c) Time-sharing(d) Multiprocessing(e) None of these

ANSWER: (d)8. First layer in the OSI reference model is(a) Data link(b) Network(c) Physical(d) Application

ANSWER: (c)9. Viruses, Trojan horses and worms are(a) Able to harm computer system(b) Unable to detect if affected on computer(c) User-friendly applications(d) Harmless applications resident on computer

ANSWER: (a)10. Failure of passwords security due to exposure can result from(a) Electronic monitoring(b) Visual(c) Both a and b(d) Light

ANSWER: (c)11. Data security threats include(a) Hardware failure(b) Privacy invasion(c) Fraudulent manipulation of data(d) All of the above

ANSWER (b)12. Graphical pictures that represent an object like file, folder etc. are(a) Task bar(b) Windows(c) Desktop(d) Icons

ANSWER (d)13. Accessing records from a file directly withoutsearching from the beginning of the file is(a) Time sharing(b) Random(c) Direct access(d) Access time

ANSWER (c)

1.Multiprogramming was made possible byinput/output units that operate independently of the CPUOperating systemsBoth a and bNeither a nor b2.The person contributing the idea of the stored program wasJohn von NeumannCharles BabbageHoward AikenThomas J. Watson, Sr.3.Transistorized computer circuit were introduced in thefirst generationsecond generationthird generationfourth generation4.The first firm to mass-market a microcomputer as a personal computer wasdata general corporationsperry univacradio shackIBM5.The "Father of Punched Card Processing" wasJ. Presper EckertCharles BabbageBlaise PascalDr. Herman Hollerith

6.The punched card used in IBM System/3 contains80 column90 column96 column126 column7.First integrated circuit chip was developed byC.V.RamanW.H.BrittainJ.S.KilbyRobert Noyc8.The main distinguishing features of fifth generation digital computers will beliberal used microprocessorsartificial intelligenceextremely low costversatility9.IBM 7000 digital computerbelongs to second generationuses VLSIemploys semil-conductor memoryhas modular construction10.The first mechanical computer designed by Babbage was calledAnalytical EngineAbacusCalculatorProcessor

1.To reload a Web page, press the ____ button.A:RedoB:ReloadC:RestoreD:Refresh

2.The ____ list contains the names of all Web pages in the order they were displayed during the current session.A:In OrderB:Go ToC:ForwardD:none of the above

3.The ____ file format is a method of encoding pictures on a computer.A:HTMLB:URLC:FTPD:JPEG

4.The ____ method of saving data allows you to copy an entire Web page, and insert the information in any Windows document.A:My DocumentsB:download pageC:copy and pasteD:cut and paste

5.You can use ____ to copy selected text, and ____ to paste it in a document.A:CTRL+C, CTRL+VB:CTRL+C, CTRL+PC:CTRL+S, CTRL+SD:SHIFT+C, ALT+P

6.The ____ is a worldwide collection of networks.A:InternetB:IntranetC:Internet ProtocolD:Backbone

7.The Internet started as a ____.A:new technology for shoppingB:government experiment for the militaryC:way to send mail fasterD:all of the above

8.A ____ provides resources such as text, images, files and links to other computers on the Internet.A:hyperlinkB:domainC:Web serverD:Web page

9.Each Web page has a unique address called a(n) ____.A:URLB:HTTPC:IPD:HTML

10.Each computer on the Internet has a unique address called a(n) ____ address.A:HTMLB:URLC:IPD:HTTP

11.Given the following: http://www.scsite.com/greatoutdoors/canaveral.html, the Web page name is ____.A:greatoutdoorsB:canaveral.htmlC:www.scsite.comD:http:

12.The ____ part of the URL contains the file name and possibly a directory or folder name.A:extensionB:protocolC:domain nameD:file specification

13.A(n) ____ takes the URL associated with a link, locates the computer containing the Web page, and then reads the HTML codes to display a Web page.A:browserB:protocolC:explorerD:navigator

14.The _____ bar appears at the top of the Microsoft Internet Explorer window.A:TitleB:StandardC:AddressD:Menu

15.If you would like Internet Explorer to display Web pages in full screen mode, press _____ on the keyboard.A:ModeB:F11C:HomeD:CTRL+F

16.____ displays the top level domain in black font, while the remainder of the URL is displayed in gray font.A:Path lightingB:Alternate textC:Domain highlightingD:Commanding

17.The ____ allows you to perform a search on the World Wide Web.A:Search Now boxB:Instant Search boxC:Command Search boxD:AutoSearch box15

18.Internet Explorer stores the Web pages you visit in ____.A:a folder on the hard diskB:RAMC:ROMD:cache20

19.The ____ contains links for Web sites and pages visited in previous days and weeks.A:Previous Pages ListB:Back ListC:History ListD:Internet Files Folder button26

20.____ is a word processing program that is supplied with Microsoft Windows.A:WordPadB:TextPadC:JPEGD:HTML