1. The basic goal of computer process is to convert data into…… (1

advertisement
1. The basic goal of computer process is to convert data into……
(1) information
(2) tables
(3) files
(4) graphs
(5) None of these
Answer : 1
2. ……… Software allows users to perform calculations on rows and
columns of data.
(1) Word processing
(2) Presentation graphics
(3) Database Management Systems
(4) Electronic Spreadsheet
(5) None of these
Answer : 4
3. The memory resident portion of the operating system is called the :
(1) registry
(2) API
(3) CMOS
(4) kernel
(5) None of these
Answer : 4
4. Which of the following is a transaction?
(1) A group of SQL statements consisting of one read and one write
operation
(2) A group of SQL statements consisting only of ready operations.
(3) A group of SQL statements defining a user-oriented task
(4) A group of SQL statements consisting only of write operations.
(5) None of these
Answer : 3
5. In order for computers to communicate across a network, they must
be connected through a(n)………
(1) TCP/IP
(2) Topology
(3) Ethernet
(4) Thin client
(5) None of these
Answer : 2
6. “Buy Now – Pay Now” is commonly used for :
(1) Debit Cards
(2) Vault Cards
(3) Credit Cards
(4) E-purse
(5) None of these
Answer : 1
7. The ……… , stored on a ROM chip, is responsible for loading the
operating system from its permanent location on the hard drive into RAM.
(1) BIOS
(2) API
(3) device driver
(4) supervisor program
(5) display
Answer : 1
8. Choices in computers are referred to as :
(1) options
(2) exit
(3) boot
(4) folder
(5) None of these
Answer : 1
9. The ……… button on the quick access Toolbar allows you to cancel your
recent commands or actions.
(1) Search
(2) Cut
(3) Document
(4) Undo
(5) None of these
Answer : 4
10. During the boot process, the ……… looks for the system files.
(1) HDD
(2) BIOS
(3) CPU
(4) DVD
(5) CD
Answer : 2
11. Computers gather data, which means they allow users to…… data.
(1) present
(2) store
(3) output
(4) input
(5) None of these
Answer : 4
12. Which of the following is a transaction?
(1) A group of SQL statements consisting of one read and one write
operation
(2) A group of SQL statements consisting only of ready operations.
(3) A group of SQL statements defining a user-oriented task
(4) A group of SQL statements consisting only of write operations.
(5) None of these
Answer : 3
13. What are the four basis connecting hardware devices?
(1) Repeater, bridge, router and gateway
(2) Repeater, bridge, router and dell
(3) Repeater, connector, router and gateway
(4) Amplifier, bridge, router and gateway
(5) None of these
Answer : 1
14. The ……… lists the location of files on the disk
(1) FAT
(2) boot sector
(3) root folder
(4) data area
(5) None of these
Answer : 1
15. A device operating at the physical layer is called a :
(1) Bridge
(2) Router
(3) Repeater
(4) All of the above
(5) None of these
Answer : 3
16. Number of bits per symbol used in Baudot code is
(1) 5
(2) 6
(3) 7
(4) 8
(5) 9
Answer : 1
17. All of the following statements concerning windows are true EXCEPT :
(1) windows are an example of a command-driven environment.
(2) windows can be resized and repositioned on the desktop.
(3) more than one window can be open at a time.
(4) toolbars and scrollbars are features of windows.
(5) None of these.
Answer : 1
18. A client / server network ……….
(1) has clients that provide functions such as application control and shared
computation.
(2) uses client computers to provide copies of software to the server to
allow server processing.
(3) provides a company with the capability to downsize from lager computer
systems and move away from legacy
systems.
(4) has server computers that perform all processing, clients are
dumb’ input/ output devices only.
(5) None of these.
Answer : 2
19. To get to the ‘Symbol’ dialog box, click on the ……… menu and
choose ‘Symbol’.
(1) Insert
(2) Format
(3) Tools
(4) Table
(5) Help
Answer : 1
20. Which is not a data source component?
(1) mail merge toolbar
(2) header row
(3) data fields
(4) data records
(5) All of these
Answer : 1
21. Use this when you want to make all letters capital without having to use
the shift key for each character………
(1) shifter
(2) upper case
(3) caps lock key
(4) icon
(5) None of these
Answer : 3
22. When you quickly press and releaes the left mouse button twice, you
are :
(1) Primary-clicking
(2) pointing
(3) Double-clicking
(4) Secondary-clicking
(5) None of these
Answer : 3
23. In Windows XP, if you want to see the file size and modified dates of all
files in a folder, the best viewing option is the ……… view.
(1) List
(2) Thumbnails
(3) Details
(4) Icon
(5) None of these
Answer : 3
24. Programming language built into user programs such as Word
andExcel are known as ………
(1) 4GLs
(2) macro languages
(3) object-oriented languages
(4) visual programming languages
(5) None of these
Answer : 4
25. To move a copy of file from one computer to another over a
communication channel is called?
(1) File transfer
(2) File encryption
(3) File modification
(4) File copying
(5) None of the above
Answer : 1
26. Which of the following is not a type of hub?
(1) Passive hub
(2) Inactive hub
(3) Switching hub
(4) Intelligent hub
(5) None of these
Answer : 2
27. …… allows you to print.
(1) ribbon
(2) monitor
(3) go now
(4) Control-P
(5) None of these
Answer : 4
28. Ina synchronous modem, the receive equilizer is known as
(1) adaptive equilizer
(2) impariment equilizer
(3) statistical equalizer
(4) compromise equilizer
(5) None of these
Answer : 1
29. Which of the following is not the part of standard office suite?
(1) Word Processor
(2) Database
(3) Image Editor
(4) File manager
(5) None of these
Answer : 4
30. In a document what is the maximum number of columns that can be
inserted in MS Word Table?
(1) 35
(2) 15
(3) 63
(4) 65
(5) 70
Answer : 3
31. Where does most data go first with in a computer memory hierarchy?
(1) RAM
(2) ROM
(3) BIOS
(4) CACHE
(5) None of these
Answer : 1
32. COBOL is an acronym for ………
(1) Common Business Oriented Language
(2) Computer Business Oriented Language
(3) Common Business Operated Language
(4) Common Business Organized Language
(5) None of these
Answer : 1
33. Machine language sometimes also referred as :
(1) Binary language
(2) High level language
(3) Middle level language
(4) Low level language
(5) None of these
Answer : 1
34. When creating a computer program, the ……… designs the structure of
the program
(1) End user
(2) System Analyst
(3) Programmer
(4) Architect
(5) All of the above
Answer : 2
35. Which is an another name for functional language
(1) Machine
(2) Application
(3) Low-level language
(4) High-level language
(5) None of these
Answer : 2
36. ……… is data that has been organized or presented in a meaningful
fashion.
(1) A process
(2) Software
(3) Storage
(4) Information
(5) None of these
Answer : 4
37. Every computer connected to an intranet or extranet must have a
distinct
(1) firewall
(2) proxy server
(3) IP address
(4) domain name
(5) None of these
Answer : 3
38. ……… translates the semantic instructions developed by programmers
into the machine language
(1) Assembler
(2) Interpreter
(3) Loader
(4) Complier
(5) None of these
Answer : 1
39. ………is an artificial language designed to communicate instructions to
a computer.
(1) Programming language
(2) Machine language
(3) Software language
(4) Assembly language
(5) None of these
Answer : 1
40. This is a standard way for a Web server to pass a Web user’s request
to an application program and to receive data back to forward to the user(1) Interrupt request
(2) Forward DNS lookup
(3) Data-Link layer
(4) File Transfer Protocol
(5) Common gateway interface
Answer : 5
41. The capability of the operating system to enable two or more than
two programs to execute simultaneously in a single computer system by
using a single processor is—
(1) Multiprocessing
(2) Multitasking
(3) Multiprogramming
(4) Multiexecution
(5) None of these
Answer : 2
42. Virtual memory is typically located:
(1) on a floppy disk
(2) in the CPU.
(3) in a flash card
(4) on the hard drive.
(5) None of these
Answer : 4
43. This type of software is designed for users who want to customize
the programs they use.
(1) Shareware
(2) Open-source software
(3) Freeware
(4) Macros
(5) None of these
Answer : 1
44. The effect of the ROLLBACK command in a transaction is the following
—
(1) Undo all changes to the data- base resulting from the execution of the
transaction
(2) Undo the effects of the last UPDATE command
(3) Restore the content of the database to its state at the end of the
previous day
(4) Make sure that all changes to the database are in effect
(5) None of these
Answer : 1
45. A result of a computer virus cannot lead to :
(1) Disk Crash
(2) Mother Board Crash
(3) Corruption of program
(4) Deletion of files
(5) None of these
Answer : 2
46. The smallest item of useful information a computer can handle—
(1) bite
(2) byte
(3) bit
(4) bait
(5) None of these
Answer : 3
47. All of the following are TRUE of Safe Mode EXCEPT:
(1) Safe Mode is a special diagnostic mode.
(2) Safe Mode loads all nonessential icons.
(3) Safe Mode allows users to troubleshoot errors.
(4) Safe Mode loads only the most essential devices.
(5) None of these
Answer : 2
48. Superscript, subscript, outline, emboss, engrave are known as :
(1) font styles
(2) font effects
(3) word art
(4) text effects
(5) None of these
Answer : 2
49. Changing the appearance of a document is called
(1) Proofing
(2) Editing
(3) Formatting
(4) Correcting
(5) All of the above
Answer : 3
50. You can detect spelling and grammar errors by :
(1) Press Shift + F7
(2) Press Ctrl + F7
(3) Press Alt+ F7
(4) Press F7
(5) None of these
Answer : 4
51. What kind of memory is both static and non-volatile?
(1) RAM
(2) ROM
(3) BIOS
(4) CACHE
(5) PROM
Answer : 2
52. A process known as — is used by large organization to study trends.
(1) data mining
(2) data selection
(3) POS
(4) data conversion
(5) None of these
Answer : 1
53. A(n) — system is a small, wireless handheld computer that scans an
item’s tag and pulls up the current price (and any special offers) as you
shop.
(1) PSS
(2) POS
(3) inventory
(4) data mining
(5) None of these
Answer : 1
54. — cells involve creating a single cell by combining two or more selected
cells.
(1) Formatting
(2) Merging
(3) Embedding
(4) Splitting
(5) None of these
Answer : 2
55. Single party disk relying on the disk controller for finding out which disk
has failed is used by :
(1) RAID level 5
(2) RAID level 2
(3) RAID level 4
(4) RAID level 3
(5) RAID level 1
Answer : 4
56. The sharing of a medium and its path by 2 or more devices is called —
(1) Modulation
(2) Encoxing
(3) Line discipline
(4) Multiplexing
(5) None of these
Answer : 4
57. What happens when you click on Insert > Picture > Clip Art
(1) It inserts a clipart picture into document
(2) It lets you choose clipart to insert into document
(3) It opens Clip Art taskbar
(4) It insets symbols
(5) None of these
Answer : 3
58. Which of the following does NOT occur during the power-on self-test
(POST)?
(1) The ScanDisk utility begins to run.
(2) The video card and video memory are tested.
(3) The BIOS identification process occurs.
(4) Memory chips are checked to ensure they are working properly.
(5) None of these
Answer : 1
59. OLE stands for :
(1) Online Link Embedding
(2) Object Link Export
(3) Object Linking and Embedding
(4) Online Link Emulation
(5) None of these
Answer : 3
60. Which of the following is not available in Font Spacing?
(1) Normal
(2) Loosely
(3) Condensed
(4) Expanded
(5) All are available
Answer : 2
61. The purpose of a swap (or page) file is to:
(1) maintain pages of documents that are being spooled to the printer.
(2) hold a program’s data or instructions in virtual memory when it can’t fit
in RAM.
(3) prevent thrashing in a multitasking environment.
(4) allow multiple print jobs to print their pages out simultaneously.
(5) None of these
Answer : 2
62. Software programs that allow you to legally copy files and give them
away at no cost are called which of the
following :
(1) Time sharing
(2) Public domain
(3) Shareware
(4) Freeware
(5) None of these
Answer : 3
63. Which of the following is NOT a goal of Transaction processing
system?
(1) Capture, process and store transactions
(2) Produce a variety of documents related to Routine business activities
(3) Reduce manual effort associated with Processing business transactions
(4) Produce standard reports used for Management decision making
(5) None of the above
Answer : 2
64. The degree of detail that should be incorporated into a database
depends on what?
(1) Data integrity
(2) The type of database
(3) The user’s perspective
(4) The business practices and policies
(5) None of these
Answer : 2
65. Superscript refers to —
(1) Characters displayed below the line of the normal text
(2) Characters displayed above the line of the normal text
(3) Characters displayed vertically centre
(4) Both (1) and (2)
(5) None of these
Answer : 2
66. A — is an additional set of commands that the computer displays after
you make a selection from the main menu :
(1) dialog box
(2) submenu
(3) menu selection
(4) All of the above
(5) None of these
Answer : 1
67. The difference between people with access to computers and the
Internet and those without this access is known as the :
(1) digital divide
(2) Internet divide
(3) Web divide
(4) broadband divide
(5) None of these
Answer : 1
68. How will you remove all formatting added to your documents (such as
bold, italics, and underline etc.)
(1) Save
(2) Save as plain text file
(3) Save as
(4) All of the above
(5) None of these
Answer : 2
69. With the object-oriented (OO) approach, an object encapsulates, or —
a programmer.
(1) carries out, the details of an object for
(2) hides, the details of an object from
(3) reveals, the details of an object to
(4) extends, the details of an object beyond
(5) None of these
Answer : 2
70. The ability to recover and read deleted or damaged files from a
criminal’s computer is an example of a law enforcement specialty called :
(1) robotics
(2) simulation
(3) computer forensics
(4) animation
(5) None of these
Answer : 3
71. Granting an outside organisation access to Internet web pages is
often implemented using a (an) :
(1) Extranet
(2) Intranet
(3) Internet
(4) Hacker
(5) None of these
Answer : 1
72. The purpose of the primary key in a database is to :
(1) Unlock the database
(2) Provide a map of the data
(3) Uniquely identify a record
(4) Establish constraints on database operations
(5) None of the above
Answer : 3
73. The code that relational database management Systems use to
perform their database task is referred to as :
(1) QBE
(2) SQL
(3) OLAP
(4) Sequel Server
(5) None of these
Answer : 2
74. VIRUS stands for :
(1) Vital Information Recourse Under Siege
(2) Vital Information Reason Under Siege
(3) Vital Information Recourse Under System
(4) Virus Information Recourse Under Siege
(5) None of these
Answer : 1
75. Data becomes ................ when it is presented in a format that people
can understand and use.
(1) processed
(2) graphs
(3) information
(4) presentation
(5) None of these
Answer : 3
76. The term ............. designates equipment that might be added to a
computer system to enhance its functionality.
(1) digital device
(2) system add-on
(3) disk pack
(4) peripheral device
(5) None of these
Answer : 4
77. ……… is the language that enable user to access or manipulate data
as organized by appropriate data model :
(1) DML
(2) SDL
(3) DDL
(4) All of the above
(5) None of these
Answer : 1
78. The user commands that are used to interact with a database is called
as :
(1) Query
(2) Interaction
(3) Command
(4) Instruction
(5) None of these
Answer : 3
79. RAM can be thought of as the ......... for the computer’s processor :
(1) factory
(2) operating room
(3) waiting room
(4) planning room
(5) None of these
Answer : 3
80. ……… is computer software designed to operate the computer
hardware and to provide platform for running application software :
(1) Application software
(2) System software
(3) Software
(4) Operating system
(5) None of these
Answer : 2
81. An assembler is used to translate a program written in………
(1) a low level language
(2) machine language
(3) a high level language
(4) assembly language
(5) None of these
Answer :4
82. The operating system controls access to the processor by assigning
a(n) ……… to each task requiring the processor’s attention.
(1) CPU
(2) slice of time
(3) stack
(4) event
(5) None of these
Answer :2
83. Which of the following is the correct sequence of actions that takes
place during the boot-up process?
(1) Load operating system - Activate BIOS-Perform POST-Check
configuration settings
(2) Activate BIOS-Perform POST-Load operating system-Check
configuration settings
(3) Perform POST - Load operating system - Activate BIOS - Check
configuration settings
(4) Activate BIOS - Check configuration settings - Perform POST -Load
operating system
(5) None of these
Answer :2
84. Using Windows Explorer, a plus (+) sign in front of a folder indicates :
(1) an open folder
(2) the folder contains subfolders
(3) a text file
(4) a graphics file
(5) None of these
Answer :2
85. Which of the following position is not available for fonts on MS Word?
(1) Normal
(2) Raised
(3) Lowered
(4) Centered
(5) All are available
Answer :4
86. “Buy Now – Pay Later” is commonly used for :
(1) Debit Cards
(2) Vault Cards
(3) Credit Cards
(4) E-purse
(5) None of these
Answer :3
87. The different styles of lettering in a word processing program……
(1) font
(2) calligraphy
(3) writing
(4) manuscript
(5) None of these
Answer :1
88. To move down a page in a document……
(1) jump
(2) fly
(3) wriggle
(4) scroll
(5) None of these
Answer :4
89. Compilers can identify:
(1) syntax errors
(2) semantic errors
(3) logical errors
(4) mathematical errors
(5) None of these
Answer :1
90. Which was the first Scientific Computer Programming Language?
(1) COBOL
(2) LISP
(3) ADA
(4) FORTRAN
(5) JAVA
Answer : 4
91. A hard copy of a document is …
(1) stored in the hard disk
(2) stored on a floppy
(3) stored on a CD
(4) printed on the paper
(5) None of these
Answer :4
92. Flow control in TCP/IP is handled using:
(1) Urgent pointer
(2) Checksum
(3) Acknowledgement number
(4) Variable-size sliding window
(5) None of these
Answer :4
93. This component is required to process data into information and
consists of integrated circuits .
(1) Hard disk
(2) RAM
(3) CPU
(4) ROM
(5) None of these
Answer :3
94. From which menu you can insert Header and Footer?
(1) Insert Menu
(2) View Menu
(3) Format menu
(4) Tools Menu
(5) Edit Menu
Answer :2
95. Moves the cursor one space to the right to puts spaces in between
words……
(1) control key
(2) space bar
(3) printer
(4) mouse
(5) None of these
Answer :2
96. Shimmer, Sparkle text, Blinking Background etc. are known as :
(1) font styles
(2) font effects
(3) word art
(4) text effects
(5) None of these
Answer :4
97. The horizontal and vertical lines on a worksheet are called :
(1) cells
(2) sheets
(3) block lines
(4) gridlines
(5) None of these
Answer :4
98. The basic input/output system (BIOS) is stored in:
(1) RAM
(2) ROM
(3) the CPU
(4) the hard drive
(5) None of these
Answer :2
99. Which of the following features usually applies to data in a data
warehouse?
(1) Data are often deleted
(2) Most applications consists of transactions
(3) Data are rarely deleted
(4) Relatively few records are processed by applications
(5) None of these
Answer :2
100. What type of program controls the various computer parts and allows
the user interact with the computer ?
(1) Utility software
(2) Operating system
(3) Word processing software
(4) Database program
(5) None of these
Answer :1
101. Which of the following is an example of connectivity?
(1) data
(2) hard disk
(3) Internet
(4) power cord
(5) None of these
Answer :3
102. The command used to remove text or graphics from a document.
The information is then stored on a clipboard so you can paste it.
(1) chop
(2) cut
(3) clip
(4) cart away
(5) None of these
Answer :2
103. People, procedures, software, hardware, and data are the five parts of
a(n) :
(1) competency system
(2) computer system
(3) information system
(4) software system
(5) None of these
Answer :3
104. The feature of Word that automatically adjusts the amount of
spacebetween certain combinations of characters so that an entire word
looks more evenly spaced. What is that feature called?
(1) Spacing
(2) Scaling
(3) Kerning
(4) Positioning
(5) None of these
Answer :3
105. Which of the following statement is wrong?
(1) Windows XP is an operating system
(2) Linux is owned and sold by Microsoft
(3) Photoshop is a graphical design tool by Adobe
(4) Linux is free and open source software
(5) None of the above
Answer :2
106. A phenomenon in virtual memory schemes in which the processor
spends most of the time swapping pages rather than executing instructions
is :
(1)loading
(2) swapping
(3) thrashing
(4) aging
(5) digging
Answer :3
107. Give the name of the Linear list in which elements can be added at
ends but not in the middle:
(1) Array
(2) Queue
(3) Tree
(4) Circular Queue
(5) None of these
Answer :2
108. Flip-flop is the basic structure of the device:
(1) Hard disk
(2) Memory
(3) Cells
(4) Speakers
(5) None of these
Answer :2
109. What is a specialized software program that allows input and output
devices to communicate with the rest of the computer system?
(1) Utility driver
(2) Utility program
(3) Data compression utility
(4) Device driver
(5) None of these
Answer :4
110. When assigning a shortcut key to a symbol, you should always try
toselect a key or key combination that is:
(1) unassigned
(2) Located on the ten-key pad section of your keyboard.
(3) Assigned to another task.
(4) From the same font family as the symbol.
(5) None of these
Answer :1
111. Which American Computer Company is called big blue?
(1) Microsoft
(2) Compaq Corp
(3) IBM
(4) Tandy Sevenson
(5) Hewlett Packard
Answer :3
112. A dumb terminal has :
(1) An embedded microprocessor
(2) Extensive memory
(3) Independent processing
(4) A keyboard and screen
(5) None of these
Answer :2
113. Which of the following is a software selection criteria?
(1) Appropriateness
(2) Efficiency
(3) Compatibility
(4) All of the above
(5) None of these
Answer :2
114. Which of the following memories needs refresh?
(1) SRAM
(2) DRAM
(3) ROM
(4) All of above
(5) None of these
Answer :4
115. ……… is paperless document transfer between companies.
(1) EFT
(2) EDI
(3) ETS
(4) RTGS
(5) None of these
Answer :4
116. The switching devices used in First Generation computer’s were:
(1) Transistors
(2) SSI chips
(3) VLSI chips
(4) Vacuum Tubes
(5) None of these
Answer :4
117. The Virtual Memory is located logically :
(1) in the CPU
(2) in main memory
(3) in between CPU and primary memory
(4) in the Hard disk
(5) None of these
Answer :2
118. A software used to convert source program instructions to object
instruction is known as :
(1) Compiler
(2) Assembler
(3) Interpreter
(4) Language processor
(5) None of these
Answer :4
119. The subject of cybernetics deals with the science of :
(1) Genetics
(2) Control and communications
(3) Molecular biology
(4) Biochemistry
(5) None of these
Answer :2
120. WAIS stands for :
(1) Wide Area Intellectual Service
(2) Web Access Information system
(3) World wide Application of Intelligent System
(4) Wide Area Information Service
(5) None of these
Answer :4
121. Correcting errors in a program is referred to as………
(1) debugging
(2) bugging
(3) rectifying
(4) modifying
(5) None of these
Answer: 1
122. Which type of processing speed measurement is used primarily
with supercomputers?
(1) Flops
(2) Fractions of second
(3) Gigahertz
(4) MIPS
(5) None of these
Answer: 1
123. What is the term associated with the second part of an e-mail
address?
(1) Local address
(2) Eight characters long
(3) User name
(4) Domain name
(5) None of these
Answer: 4
124. Bold, Italic, Regular are known as :
(1) font styles
(2) font effects
(3) word art
(4) text effects
(5) None of these
Answer: 1
125. This is a group of servers that share work and may be able to back
each other up if one server fails.
(1) Channel bank
(2) Cluster
(3) Tiger team
(4) Serverless backup
(5) Logical unit
Answer: 2
126. Smart Card is :
(1) Special purpose Cards
(2) Microprocessor Cards
(3) Processing unit contains memory for storing data
(4) Processing unit for software handling
(5) None of these
Answer: 2
127. A screen element of MS Word that is usually located below the title
bar that provides categorized options is :
(1) Menu mar
(2) Tool Bar
(3) Status Bar
(4) All of the above
(5) None of these
Answer: 1
128. Which keys can be used together with other keys for special tasks ?
(1) Insert, Delete
(2) Ctrl, Shift
(3) Left Arrow, Right Arrow
(4) Page up, Page Down
(5) None of these
Answer: 2
129. Data related crime does not incorporate :
(1) Data Didling
(2) Data Spying
(3) Data Leakage
(4) Data Mining
(5) None of these
Answer: 4
130. ‘DOS’ floppy disk does not have :
(1) A Boot Record
(2) A File Allocation Table
(3) A Root Directory
(4) Virtual Memory
(5) None of these
Answer: 4
131. A disk on which you store information………
(1) plate
(2) data disk
(3) paper disk
(4) TV disk
(5) None of these
Answer: 2
132. Lets you leave a screen or program……
(1) boot
(2) programs
(3) exit
(4) text
(5) None of these
Answer: 3
133. The operating system does all of the following EXCEPT:
(1) provide a way for the user to interact with the computer.
(2) manage the central processing unit (CPU).
(3) manage memory and storage.
(4) enable users to perform a specific task such as document editing.
(5) None of these
Answer: 4
134. MS-DOS is a ……… operating system.
(1) point-and-click
(2) user-friendly
(3) command-driven
(4) Mac
(5) None of these
Answer: 3
135. Procedures are typically documented in manuals written by :
(1) computer specialists
(2) end users
(3) Microsoft
(4) service providers
(5) None of these
]
Answer: 1
136. What deletes the entire file except the file structure ?
(1) ERASE
(2) DELETE
(3) ZAP
(4) PACK
(5) None of these
Answer: 3
137. ……… takes one line, checks it for errors and then executes it.
(1) Assembler
(2) Interpreter
(3) Loader
(4) Complier
(5) None of these
Answer: 2
138. Artificial Intelligence is associated with which generation?
(1) First Generation
(2) Second Generation
(3) Third Generation
(4) Fifth Generation
(5) Sixth Generation
Answer: 4
139. Time during which a job is processed by the computer is :
(1) Delay times
(2) Real time
(3) Execution time
(4) Down time
(5) None of these
Answer: 3
140. Which of the following is not an input device?
(1) OCR
(2) Optical scanners
(3) Voice recognition device
(4) COM (Computer Output to Microfilm)
(5) None of these
Answer: 4
141. In latest generation computers, the instructions are executed :
(1) Parallel only
(2) Sequentially only
(3) Both sequentially and parallel
(4) All of above
(5) None of these
Answer: 3
142. A technique used by codes to convert an analog signal into a digital
bit stream is known as :
(1) Pulse code modulation
(2) Pulse stretcher
(3) Query processing
(4) Queue management
(5) None of these
Answer: 1
143. The number of bits that can be transmitted over a network in a
certain period of time:
(1) Latency
(2) Delay
(3) Bandwidth
(4) Baud
(5) None of these
Answer: 3
144. Linux partitions are created using the file system:
(1) FAT
(2) FAT32
(3) EXT3
(4) NTFS
(5) None of these
Answer: 3
145. Which of the following data structure is widely used in a network
model RDBMS?
(1) Arrays
(2) trees
(3) graphs
(4) stacks
(5) None of these
Answer: 3
146. The scientist who developed the idea of the WWW is :
(1) James Gosling
(2) Tim Berns Lee
(3) Andrew Tannenbaum
(4) Linus Torvalds
(5) Bill Gates
Answer: 2
147. What was the data transmission method in which bi-directional data
flow is allowed?
(1) Simplex
(2) Duplex
(3) Analog
(4) Single side mode
(5) None of these
Answer: 2
148. To check the presence of a computer in the network, use the
command:
(1) ping
(2) cmd
(3) check
(4) ipconfig
(5) connect
Answer: 1
149. The word processing task associated with changing the appearance of
a document is :
(1) Editing
(2) Writing
(3) Formatting
(4) All of above
(5) None of these
Answer: 3
150. Easy to use……
(1) user friendly
(2) select
(3) helpful
(4) ever-ready
(5) None of these
Answer: 1
151. Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS
to operate and change things within programs……
(1) menu bar
(2) tool bar
(3) user friendly
(4) word processor
(5) None of these
Answer: 1
152. Anything written on the screen ……
(1) cursor
(2) text
(3) folder
(4) boot
(5) None of these
Answer: 2
153. Which of the following is not the major function of a computer ?
(1) Processing data into information
(2) Storing data or information
(3) Gathering data
(4) Analysing data or information
(5) None of these
Answer: 4
154. A method of executing two or more programs concurrently using the
same computer describe:
(1) multi processing
(2) multiprogramming
(3) virtual processing
(4) time sharing
(5) None of these
Answer: 2
155. When you save to ……… your data will remain intact even when
thecomputer is turned off.
(1) RAM
(2) motherboard
(3) secondary storage device
(4) primary storage device
(5) None of these
Answer: 3
156. A one-time password is :
(1) one that changes every time it is used
(2) one that is assigned once and not changed at all.
(3) one that can be used only at a particular time of the day
(4) one that is assigned for all session that starts at a particular time
(5) None of these
Answer: 1
157. A hardware interface that allows for the connection of several
peripheral devices to a single PCI board.
(1) SCSI
(2) SATA
(3) ATA
(4) PCI
(5) None of these
Answer: 1
158. is a language, instead of using numbers; programmers began
usingEnglish like abbreviations (Mnemonics) to represent
the elementaryoperations.
(1) Machine language
(2) Mnemonics language
(3) Assembly level language
(4) High level language
(5) None of the these
Answer: 3
159. Encryption decryption are functions of :
(1) Transport layer
(2) Session layer
(3) Presentation layer
(4) All of the above
(5) None of these
Answer: 2
160. The process of building a model that demonstrate the features of a
proposed product, service or system is called a :
(1) JAD
(2) RAD
(3) templating
(4) prototyping
(5) TAD
Answer: 4
161. Memory, also called random access memory, or RAM……….
(1) contains the electronic circuits that cause processing to occur
(2) makes the information resulting from processing available for use
(3) allows data, programs, commands, and user responses to be entered
into a computer
(4) consists of electronic components that store data
(5) None of these
Answer: 4
162. A ……… represent approximately one billion memory locations.
(1) kilobyte
(2) megabyte
(3) gigabyte
(4) terabyte
(5) None of these
Answer: 3
163. An interrupt handler is a(n):
(1) location in memory that keeps track of recently generated interrupts.
(2) peripheral device.
(3) utility program.
(4) special numeric code that indicates the priority of a request
(5) None of these
Answer: 4
164. All of the following are steps involved in the boot process EXCEPT:
(1) load the operating system into RAM.
(2) the power-on self-test.
(3) activate the basic input/output system (BIOS).
(4) load application programs.
(5) None of these
Answer: 4
165. A port that allows 8 bits at a time to be transmitted simultaneously is
a(n) ……….
(1) dedicated port
(2) parallel port
(3) SCSI port
(4) USB port
(5) None of these
Answer: 2
166. Which of these terms refers to the feature of an OS that allows a
single computer to process the tasks of several users at different stations,
in round-robin fashion?
(1) Multiprocessing
(2) Multiprogramming
(3) Multitasking
(4) Time processing
(5) Time-sharing
Answer: 5
167. A program which helps create written documents and lets you go back
and make corrections as necessary……
(1) spreadsheet
(2) personal writer
(3) word printer
(4) word processor
(5) None of these
Answer: 4
168. Screen that comes on when you turn on your computer that shows all
the icons……
(1) desktop
(2) face to face
(3) viewer
(4) view space
(5) None of these
Answer: 1
169. A place that a user can create to store files……
(1) cursor
(2) text
(3) folder
(4) boot
(5) None of these
Answer: 3
170. Electronic pens are used with the mouse to write on a slide in which
view?
(1) Master
(2) Slide Sorter
(3) Slide Show
(4) Normal
(5) Print preview
Answer: 3
171. When you insert a picture and adjust the height, Word automatically
adjusts the ……… to maintain the correct proportion.
(1) pixel size
(2) resolution
(3) screen size
(4) width
(5) None of these
Answer: 4
172. Which of the following is NOT one of the steps in the machine cycle?
(1) Execute
(2) Store
(3) Decode
(4) Pipelining
(5) None of these
Answer: 4
173. How many peripheral devices can be connected to a single SCSI
port?
(1) 1
(2) 8
(3) 16
(4) 32
(5) 64
Answer: 2
174. The four-step process of fetch, decode, execute, and store is called
a(n):
(1) machine cycle
(2) instruction cycle
(3) arithmetic operation
(4) logical operation
(5) None of these
Answer: 1
175. All of the following are TRUE regarding virtual memory EXCEPT :
(1) any amount of RAM can be allocated to virtual memory.
(2) the setting for the amount of hard drive space to allocate to virtual
memory can be manually changed.
(3) this temporary storage is called the swap file or page file.
(4) virtual memory is physical space on the hard drive.
(5) None of these
Answer: 1
176. The operating system is the most common type of ……… software.
(1) communication
(2) application
(3) system
(4) word-processing
(5) None of these
Answer: 3
177. The human-readable version of a program is called ………
(1) source code
(2) program code
(3) human code
(4) system code
(5) None of these
Answer: 4
178. Data are ……… in client/server computing.
(1) never sent to the client machine
(2) sent in very large sections to save processing time
(3) sent only upon the client’s request
(4) sent in complete copies for the client to filter and sort
(5) sent from the client to the server for processing
Answer: 3
179. The total set of interlinked hypertext documents worldwide is :
(1) HTT
(2) Browser
(3) WWW
(4) B2B
(5) None of these
Answer: 3
180. Which of the following is not one of the three ‘Mail Merge Helper’
steps?
(1) Merge the two files
(2) Create the main document
(3) Set the mailing list parameters
(4) Create the data source
(5) None of these
Answer: 3
181. Which is the part of a computer that one can touch and feel ?
(1) Programs
(2) Software
(3) Hardware
(4) Output
(5) None of these
Answer: 3
182. A command to get a file you worked on from the memory where it
was stored……
(1) close
(2) delete
(3) open
(4) get it
(5) None of these
Answer: 3
183. There are several security devices used to stop individuals from
exploiting your system. Which of the following is used in conjunction with a
firewall?
(1) Proxy server
(2) Intrusion-detection system
(3) Terminal server
(4) Web server
(5) None of these
Answer: 1
184. Array is ………
(1) Linear data structure
(2) non-linear data structure
(3) simple data structure
(4) complex data structure
(5) None of these
Answer: 1
185. A computer checks the ……… of user names and passwords for a
match before granting access.
(1) website
(2) network
(3) backup file
(4) database
(5) None of these
Answer: 4
186. Which of the following is the latest version of MS Word?
(1) Word 2000
(2) Word 2007
(3) Word 2010
(4) Word 2011
(5) Word 2012
Answer: 3
187. In the online world of electronic commerce, what do the initials CEM
stands for ?
(1) Costly E-Commerce Marketing
(2) Customer Experience Management
(3) Customer Experience Misleading
(4) Cost Estimates are Mind Boggling
(5) None of these
Answer: 2
188. What type of program controls the various computer parts and allows
the user interact with the computer ?
(1) Utility software
(2) Operating system
(3) Word processing software
(4) Database program
(5) None of these
Answer: 1
189. Which of the following transmission systems provide the highest data
rate to in individual device?
(1) computer bus
(2) telephone lines
(3) voice and mode
(4) lease lines
Answer: 1
190. The combination of the operating system and the processor is referred
to as the computer’s:
(1) CPU
(2) platform
(3) BIOS
(4) CMOS
(5) None of these
Answer: 2
191. The operating system allows users to organize the computer’s
contents in a hierarchical structure of directories that include all of the
following EXCEPT:
(1) files
(2) folders
(3) drives
(4) systems
(5) None of these
Answer: 4
192. Leaves of which of the following trees are at the same level ?
(1) Binary tree
(2) B-tree
(3) AVL-tree
(4) Expression tree
(5) None of these
Answer: 2
193. The transformation of a message into an encoded form is known as :
(1) Mnemonics
(2) Encoding
(3) Encryption
(4) Decoding
(5) None of these
Answer: 2
194. Firewalls are used to protect against………
(1) Unauthorized Attacks
(2) Virus Attacks
(3) Data Driven Attacks
(4) Fire Attacks
(5) All of these
Answer: 1
195. Auto correct was originally designed to replace ……… words as you
type.
(1) Short, repetitive
(2) Grammatically incorrect
(3) Misspelled
(4) Half
(5) None of these
Answer: 3
196. Ensuring that the essential peripheral devices are attached and
operational is the ……… process.
(1) configuration
(2) CMOS
(3) POST
(4) ROM
(5) check
Answer: 3
197. The unique signal, generated by a device, that tells the operating
system that it is in need of immediate attention is called an:
(1) action
(2) event.
(3) interrupt
(4) activity
(5) None of these
Answer: 3
198. Before a package can be used in a java program it must be ………
(1) executed
(2) referenced
(3) imported
(4) declared
(5) None of these
Answer: 3
199. The definition of thrashing is:
(1) swapping data between virtual memory and RAM too frequently.
(2) insufficient hard disk space.
(3) too many processors being managed by the operating system.
(4) inaccurate information stored in the registry
(5) None of these
Answer: 1
200. The primary device that a computer uses to store information……
(1) register
(2) storehouse
(3) desk
(4) hard drive
(5) None of these
Answer: 4
201. Which of the following is a disadvantage of machine language?
1) Machine Dependent
2) Slower Execution
3) Machine Independent
4) It requires Translation
5) None of these
Answer: 1
202. Android Operating system is an example of which kind of Source
Model?
1) Open Source
2) Vertical Market Software
3) Horizontal Market Software
4) Shareware
5) None of these
Answer:1
203. Cache memory is an example of which of the following?
1) Virtual Memory
2) Non Volatile Memory
3) Static Random Access Memory
4) Secondary Memory
5) None of these
Answer:3
204. A software that is not protected by copyright or trademark is ......
1) Vertical Market Software
2) Public Domain Software
3) Shareware Software
4) Trialware
5) Adware
Answer:2
205. Which of the following programming languages is associated with
Artificial Intelligence?
1) C
2) B
3) C++
4) JAVA
5) PROLOG
Answer:5
206. AltaVista is a(n)
1) Windows Utility
2) Search engine
3) Program
4) Antivirus
5) None of these
Answer:2
207. The term Hard copy is related to:
1) Storing data on Hard Disk
2) Output displayed on Monitor
3) Scanned Image
4) Printouts
5) None of the above
Answer:4
208. MIME is an acronym for ....
1) Multiprogramming Internet Mail Extension
2) Multicasting Internet Mail Extension
3) Multiple Internet Mail Extension
4) Multipurpose Internet Mail Extension
5) None of these
Answer: 4
209. Any crime that involves a Computer and a Network is called:
1) Virus
2) Malware
3) Trojan Horse
4) Cyber crime
5) Identity Theft
Answer: 4
210. Which of the following generation computers is referred to an
expert system?
1) 2nd
2) 1st
3) 4th
4) 3rd
5) 5th
Answer: 5
211). ......... is a set of instructions.
1) Hardware
2) Code
3) Language
4) Program
5) All the above
Answer: 4
212. Which of the following is the keyboard short-cut for permanent
deletion of a file/folder in windows?
1) Del.
2) Shift + Del.
3) Ctrl + Del.
4) Alt + Enter
5) None of these
Answer: 2
213. Which of the following is an Object Oriented ProgrammingLanguage?
1) C
2) Java
3) C++
4) Both 2 and 3
5) Both 1 and 2
Answer: 4
214. The popular name for “Information Super Highway” is:
1) Intranet
2) Extranet
3) Virtual Private Network
4) MAN
5) Internet
Answer: 5
215. Encryption is primarily used in:
1) Computer Processing
2) File retention
3) Data communication
4) Data Storage
5) None of these
Answer: 3
216. The main folder on a storage device is called .....
1) Root directory
2) Interface
3) Device driver
4) Platform
5) Main directory
Answer: 1
217. To protect the computer from hacker intrusions, ..... must be installed.
1) Firewall
2) Mailer
3) Script
4) Yahoo Messenger
5) None of these
Answer: 1
218. Which of the following is used to read handwritten or printed text to
make a digital image that is stored in memory?
1) Printer
2) Laser beam
3) Scanner
4) Touchpad
5) None of these
Answer: 3
219. A program designed to destroy data on the computer which can travel
to infect other computers is called a .....
1) Hurricane
2) Infector
3) Disease
4) Virus
5) None
Answer: 4
220. Thesaurus option is available in ..... menu.
1) Page layout
2) References
3) Review
4) View
5) Layout
Answer: 3
221. Blu-Ray disk is an example of a(n) ....
1) Hard disk
2) Magnetic Disk
3) Optical Disk
4) Output Device
5) None of these
Answer:3
222. Which of the following is true about Name box?
1) It appears at the left of the formula bar
2) It appears below the menu bar
3) It shows the locations of the active cell.
4) Both 1 and 3
5) Both 2 and 3
Answer:4
223. Which of the following is known as non volatile memory?
1) Hard Disk
2) Floppy Disk
3) CD-ROM
4) DVD-ROM
5) All the above
Answer: 5
224. Auto correct function option is present in ..... menu of MS Word.
1) View
2) Insert
3) Format
4) Tools
5) Table
Answer: 4
225. Which of the following is another name for pre-programmed formula
in Excel?
1) Range
2) Graph
3) Function
4) Cell
5) None of these
Answer: 3
226. ALU works on the instructions held in .......
1) Notebook
2) Registers
3) Notepad
4) Clipboard
5) I/O Devices
Answer: 2
227. To see the document before the printout is taken, use .......
1) Insert Table
2) Paste
3) Format Painter
4) Cut
5) Print Preview
Answer: 5
228. .... helps create, manipulate and analyze data arranged in rows and
columns?
1) Application Package
2) Word Processing Package
3) Outlining Package
4) Outline Processors
5) Spreadsheet Package
Answer: 5
229. A register that keeps track of the next instruction to be executed is
called a(n):
1) Data Register
2) Instruction Register
3) Action Register
4) Program Counter
5) None of these
Answer: 2
230. Which of the following is the feature that keeps track of the right
margin?
1) Find and Replace
2) Dragged Right
3) Ruler
4) Right Justified
5) Left Justified
Answer: 4
231. A network which connects cities or states is known as:
1) LAN
2) CAN
3) PAN
4) VPN
5) MAN
Answer: 5
232. Which of the following allows you to insert graphics into a word
document?
1) Callouts
2) Flowcharts
3) Basic Shapes
4) All of the above
5) None of these
Answer: 4
233. An email address consists of:
1) Domain name 2) User name
3) Username followed by password
4) Domain name followed by user name
5) Username followed by domain name
Answer: 5
234. ERP is an acronym for:
1) Enterprise Retirement Planning
2) Enterprise Relationship Planning
3) Enterprise Resource Planning
4) Enterprise Reorder Planning
5) None of these
Answer: 3
235. ...... is the storage area for e-mails.
1) Folder
2) Mail box
3) Directory
4) Hard Disk
5) None of these
Answer: 2
236. Three types of Compact disks include CD-ROM, CD-R and ......
1) CD-W
2) CD-RAM
3) CD-DVD
4) CD-RW
5) None of these
Answer: 4
237. Collecting personal information and effectively posing as another
individual is known as:
1) Spooling
2) Spoofing
3) Hacking
4) Identity Theft
5) None of these
Answer: 2
238. Which of the following controls the manner of interaction between the
user and the operating system?
1) Language Translator
2) Platform
3) User Interface
4) Icon
5) None of these
Answer: 3
239. Which of the following best defines Embedded system?
1) A program that comes wrapped in a box
2) A program that is permanent part of a computer
3) A computer that is a part of a larger computer
4) A computer and software system that controls a machine
5) None of these
Answer: 4
240. The .......... Settings are automatic and standard.
1) Default
2) CPU
3) Peripheral
4) User-friendly
5) None of these
Answer: 1
241. Which of the following power point view displays each slide of
thepresentation as a thumbnail and is useful for rearranging slides?
1) Slide show
2) Slide master
3) Slide sorter
4) Notes Page
5) Design Slide
Answer: 3
242. A set of rules for telling the computer what operations to perform is /
are called:
1) Structures
2) Procedural Language
3) Command Language
4) Natural Language
5) Programming Language
Answer: 5
243. Devices that enter information and let you communicate with the
computer are called:
1) Software
2) Hardware
3) Output Devices
4) Input / Output devices
5) Input Devices
Answer: 5
244. The speed of which of the following memory chips is faster?
1) Not Fixed
2) DRAM
3) SRAM
4) For smaller chips SRAM is faster
5) For larger chips DRAM is faster
Answer: 3
245. Mahesh Babu has his cute childhood photos in an album which might
fade out in a couple of years, which he wants to show it to his fans by
uploading it in his twitter account. Which of the following devices can he
use to do that?
1) Keyboard
2) Mouse
3) Printer
4) Scanner
5) None of these
Answer: 4
246. Which of the following is not a social networking site?
1) WAYN
2) Hi 5
3) Orkut
4) Yahoo
5) Facebook
Answer: 4
247. In the URL https://twitter.com, what does 's' represent in 'https'?
1) Safe
2) System
3) Start-up
4) Semantic
5) Secured
Answer: 5
248. Which among the following is the file extension for Word Documents?
1) .xls
2) .ppt
3) .docx
4) .worddoc
5) None
Answer: 3
249. Linux Operating system is an example of which of the following?
1) Freeware
2) Open Source Software
3) Shareware
4) Complimentary
5) None of these
Answer: 2
250. A device that connects to a network without the use of a cable is said
to be:
1) Distributed
2) Non-Wired
3) Centralised
4) Open source
5) Wireless
Answer: 5
251. Which of the following software applications would be most
appropriate for performing Statistical and Numerical calculations:
1) Document Processor
2) Graphics Package II
3) Power Point
4) Spreadsheet
5) Meta Processor
Answer: 4
252. Removing and replacing devices without turning off the computer is
referred to as:
1) Search Engines
2) Operating System
3) Software
4) Resource Locators
5) Plug-n-Play
Answer: 5
253. Mr. Prashanth has a song sung by him on the desktop, in the C drive,
and also in the D drive. This scenario in computer language is generally
referred to as:
1) Data Redundancy
2) Multiple Data Places
3) Various File Places
4) Data Inconsistency
5) Data Independent
Answer: 1
254. What is a Firewall?
1) A wall to protect against Fire
2) A software to protect from computer hacker intrusions
3) A software to destroy computer
4) A wall to make partitions in computer
5) None of these
Answer: 2
255. Chiranjeevi sent a mail to Pavan Kalyan by putting his email address
in 'Cc' and to Nagababu by putting his email address in 'Bcc'. Which of the
following is true based on the given scenario?
1) Pavan Kalyan can view the email address of Chiranjeevi and Nagababu
2) Nagababu can view the email address of Pavan Kalyan & Chiranjeevi
3) Pavan Kalyan can view the email address of Nagababu only
4) Both 1 and 2
5) None of them is true
Answer: 2
256. When data changes in multiple lists and all lists are not updated, this
causes:
1) Data Population Problem
2) Data Reduction
3) Data Induction
4) Data Overload
5) Data Inconsistency
Answer: 5
257. The legal right to use software based on specific restrictions is granted
via a:
1) Software privacy policy
2) Software License
3) Software password manager
4) Software log
5) None of these
Answer: 2
258. Which of the following is not an operating system?
1) Windows 2000
2) DOS
3) Windows 7
4) Mac Os X Lion
5) Google
Answer: 5
259. Find the Mis-Matched pair.
1) Chrome - Google
2) Opera - Opera Software
3) Internet Explorer - Microsoft
4) Safari - Net Scape Communications
5) None of these
Answer: 4
260. What is the full form of RISC?
1) Reduced Instruction Set Computing
2) Reformed Instruction System Computing
3) Reduced Information System Computing
4) Restoration of Information in System Computing
5) Reduced Instruction Sect Code
Answer: 1
Demodulator is:
1) Modem
2) Joiner
3) Networker
4) Connecter
5) Mom-dom
Answer: 1
262. In order to delete a sentence from a document you would use .......
1) Highlight and copy
2) Cut and Paste
3) Copy and Paste
4) Highlight and Delete
5) Select and Paste
Answer: 4
263. What is the keyboard shortcut for Slide Show in Powerpoint ? :
1) F4
2) F8
3) F9
4) F5
5) F12
Answer: 4
264. A ...... is a design tool that graphically shows the logic in a solution
algorithm.
1) Flow chart
2) Hierarchy Chart
3) Structure Chart
4) Context Diagram
5) None
Answer: 1
265. The justification that aligns text on both margins of a document in
Word is ......
1) Justify
2) Bold
3) Centre
4) Right
5) Balanced
Answer: 1
266. The Open, Print and Save Buttons are all located on the ......
1) Status Bar
2) Formatting Toolbar
3) Standard Toolbar
4) Titlebar
5) Status and Title bars
Answer: 3
267. SMPS in a computer stands for?
1) Switched-Mode Power Supply
2) Simple-Mode Power Supply
3) Simple-Mode Power System
4) Switched-Menu Power Supply
5) None of these
Answer: 1
268. The process of transforming information using an algorithm to make
it unreadable by anyone is usually referred to as:
1) Decryption
2) Encryption
3) Alphabet Coding
4) Encrography
5) Deptography
Answer: 2
269. ..... is a type of RAM that stores each bit of data in a separate
capacitor within an integrated circuit making it an efficient way to store data
in memory.
1) DRAM
2) PRAM
3) NRAM
4) NORAM
5) None
Answer: 1
270. A computer network that uses Internet protocol technology to
shareinformation, Operational system, within an organization is usually
referred to as
1) Internet
2) MAN
3) PAN
4) NPN
5) Intranet
Answer: 5
271. What is the symbol for attachments in yahoo mail?
1) Envelope
2) Letter A
3) Paper Clip
4) Pen
5) None
Answer: 3
272. Which of the following computers is used in Scientific researches?
1) Super Computers
2) Main Frame
3) Laptop
4) Micro Computers
5) None of these
Answer: 1
273. Winzip is an example of :
1) Free ware
2) Shareware
3) Open Source
4) Vertical Market Software
5) None
Answer: 1
274. ........... is the science that attempts to produce machines that display
the same type of intelligence that humans do
1) Nanoscience
2) Nanotechnology
3) Simulation
4) Artificial intelligence (AI)
5) None
Answer: 4
275. COBOL is an acronym for .............
1) Common Business Oriented Language
2) Computer Business Oriented Language
3) Common Business Operated Language
4) Common Business Organized Language
5) None of these
Answer: 1
276. The human readable version of a software program is called:
1) cache
2) instruction set
3) source code
4) word size
5) None of these
Answer: 3
277. Which of the following is not a programming language with Object
Oriented Features?
1) COBRA
2) ABAP
3) C++
4) C#
5) C
Answer: 5
278. Which of the following programming language is favoured for
Artificial Intelligence?
1) ABAP
2) COBOL
3) LISP
4) JAVA
5) C#
Answer: 3
279. The quickest and easiest way in Word, to locate a particular word or
phrase in a document
1) Replace
2) Find
3) Lookup
4) Search
5) None of these
Answer: 2
280. What symbol is present on the number key '2' on the keyboard?
1) !
2) %
3) ^
4) @
5) *
Answer: 4
281. A digital communication system capable of interconnecting, a large
number of computers, terminals and other peripheral devices within a
limited geographical area is called–
1. LAN
2. WAN
3. Internet
4. All of the above
5. None of these
Answer: 1
282. A secondary storage device that uses a long plastic strip coated with
a magnetic material as a recording medium is–
1. Magnetic tape
2. Compact disk
3. Hard disk
4. All of the above
5. None of these
Answer: 1
283. An E-mail protocol for storage, manage-ment and change, especially
in corporate offices–
1. Message handling service
2. Postal service’s
3. Data storage
4. All of the above
5. None of these
Answer: 1
284. Which of the following is an advantage of stored programs?
1. Reliability
2. Reduction in operation costs
3. The computers becoming general-purpose
4. All of the above
5. None of these
Answer: 1
285. Which of the following is not true for primary storage?
1. It is a part of the CPU
2. It allows very fast access of data
3. It is relatively more expensive then other storage devices.
4. Can be removed and transported.
5. All of the above
Answer: 1
286. Function of control unit in the CPU is–
1. To decode program instructions
2. To transfer data to primary storage
3. To perform logical operations
4. To store program instructions
5. All of the above
Answer: 4
287. Electronic spreadsheets are useful in situation where relatively ..........
data must be input
1. Small
2. Large
3. No
4. All of the above
5. None is true
Answer: 1
288. A list of options from which a program user can select anyone in order
to perform a desired action is referred as–
1. Menu
2. Index
3. Directory
4. All of the above
5. None of these
Answer: 2
289. A method whereby messages to be transmitted between computers
are all sent to a central computer, which gathers them androutes them to
the appropriate destination(s) is known as–
1. Message switching
2. Message delete
3. Message accept
4. All of the above
5. None of these
Answer: 1
290. Which of the following describe one or more characteristics of a
modem computer?
1. An electronic device
2. A mechanical device
3. A electro-mechanical device
4. All of the above
5. None of these
Answer: 1
291. Combining records from two or more ordered files into a single
ordered file is called–
1. Menu
2. Merging
3. Taking
4. All of the above
5. None of these
Answer: 1
292. The ascending order of a data hierarchy is
1. Bit-byte-record-field-file-database
2. Byte-bit-field-record-file-database
3. Byte-bit-record-file-field-database
4. Bit-byte-field-record-file-database
5. All of the above
Answer: 2
293. A LSI chip contains the entire CPU of computer except main memory
is called–
1. Microprocessor
2. Hard disk
3. Input device
4. Output device
5. All of the above
Answer: 4
294. A storage medium that loses its contents in the event of power failure
is called–
1. Volatile storage
2. Non volatile storage
3. Permanent storage
4. All of the above
5. None of these
Answer: 1
295. One-millionth of a second is referred as–
1. Microsecond
2. Millisecond
3. Hour
4. Minute
5. All of the above
Answer: 1
296. Alternate facilities of programs, data files, hardware equipments, etc.
used in case the original one is destroyed, lost, or fail to operate is–
1. Backup
2. Forehead
3. Delete
4. All of the above
5. None of these
Answer: 1
297. One-thousandth of a second is called–
1. Microsecond
2. Millisecond
3. Hour 4. Minute
5. All of the above
Answer: 1
298. The CPU (central processing unit) consists of
1. Input, output, and processing
2. Control unit, primary storage, and secondary storage
3. Control unit, arithmetic-logic unit, and primary storage
4. All of the above
5. None of these
Answer: 2
299. The product of data processing is–
1. Data
2. Information
3. Software
4. Computer
5. All of the above
Answer: 3
300. The input device used by computer is–
1. Motherboard
2. Central processing unit
3. Keyboard
4. System unit
5. All of the above
Answer: 2
301. The structure of interconnecting of nodes of
a computer network is referred as–
1. Network topology 2. Internet
3. Local Area Network
4. Wide Area Network
5. All of the above
Answer: 3
302. Nible is–
1. Double of byte
2. Half of byte
3. Ten times of byte
4. Five times of byte
5. All of the above
Answer: 1
303. Multiprogramming is the–
1. The inter-leaved execution of two or more different and independent
programs by the same computer
2. The execution of single by the different computers
3. The inter-leaved execution of two or more different and independent
programs by the different computers
4. All of the above
5. None of these
Answer: 2
304. A facility available in an operating system that allows multiple
functions from the same application package is referred as–
1. Multi-threading
2. Multi-programming
3. Multi-processing
4. All of the above
5. None of these
Answer: 1
305. Narrowband channel is a communication channels–
1. That handle low volumes of data
2. Used mainly for telegraph lines and low
speed terminals
3. Both 1. and 2.
4. All of the above
5. None of these
Answer: 1
306. Following is the example of Network–
1. LAN
2. WAN
3. Internet
4. All the above
5. None of these
Answer: 4
307. Peer-to-peer is a description–
1. Of communications between two dissimilar devices
2. Of communications between two equal devices
3. Of communications between two different devices
4. All of the above
5. None of these
Answer: 4
308. Non-document files are–
1. Pure ASCII files that can be listed for any word processing software
2. Non ASCII files that can be listed for any word processing software
3. Pure ASCII files that can be listed for specific word processing software
4. Non ASCII files that can be listed for pecific word processing software
5. All of the above
Answer: 2
309. The method of dividing a physical channel into many logical channels
so that a number of independent signals may be simultaneously
transmitted on it is referred as–
1. Multithreading
2. Multiprocessing
3. Multiplexing
4. All of the above
5. None of these
Answer: 2
310. An interconnected computer configura-tions or computers with two or
more independent CPUs that have the ability to simultaneously execute
several programs is called–
1. Multithreading
2. Multiprocessing
3. Multiplexing
4. All of the above
5. None of these
Answer: 3
311. Following is not a non-impact printer–
1. Thermal printer
2. Ink-jet printer
3. Laser printer
4. Dot-matrix printer
5. All of the above
Answer: 2
312. A number system with a base of 8 is referred as–
1. Binary
2. Decimal
3. Octal
4. All of the above
5. None of these
Answer: 3
313. Devices converts digital signals to Sine waves at the sending end and
back to digital signals at the receiving end is called–
1. Modem
2. Telephone
3. Mobile phone
4. All of the above
5. None of these
Answer: 3
314. Dividing a project into segments and smaller units in order to simplify
the analysis, design and programming effort is referred as–
1. Monitoring
2. Modular approach
3. Microprocessing
4. All of the above
5. None of these
Answer: 1
315. The technique where digital signals are converted to its analog form
for transmission over an analog facility is called–
1. Modulation
2. Digitization
3. Multiprocessing
4. All of the above
5. None of these
Answer: 2
316. Multiprocessor is a computer system–
1. Where many CPU under a common control
2. Consisting of more than one input devices under common control
3. Where many output devices under
4. All of the above
5. None of these
Answer: 1
317. The point at which the flow of text in a document moves to the top of a
new page–
1. Page break
2. Page insert
3. Page format
4. All of the above
5. None of these
Answer: 1
318. Technique to implement virtual memory where memory is divided into
units of fixed size memory is–
1. Paging
2. De-fragments
3. Segmentation
4. All of the above
5. None of these
Answer: 1
319. An adder where all the bits of the two operands are added
simultaneously–
1. Parallel adder
2. Half adder
3. Full adder
4. All of the above
5. None of these
Answer: 1
320. An extra bit added to a string of bits that enables the computer to
detect internal errors in the transmission of binary data–
1. Parity bit
2. Byte
3. Nibble
4. All of the above
5. None of these
Answer: 1
321. Password is–
1. Code by which a user gains access to a computer system
2. Pass for viewing movie
3. Entrance without paying something
4. All of the above
5. None of these
Answer: 1
322. PL 1 (Programming Language One) is–
1. High level programming language
2. Low level programming language
3. Machine language
4. Assembly language
5. All of the above
Answer: 1
323. Pascal is–
1. A high-level programming language
2. Named after Blaise Pascal
3. Named after mathematician that facilitates structured programming
techniques
4. All of the above
5. None of these
Answer: 1
324. Storage device where time to retrieve stored information is
independent of address where it is stored is called–
1. Random access memory (RAM)
2. Primary memory
3. Secondary memory
4. All of the above
5. None of these
Answer: 4
325. Octal number system has a base–
1. Two
2. Four
3. Eight
4. Ten
5. All of the above
Answer: 3
326. Since input and output devices are on the edge of the main
processing therefore they are referred as–
1. Peripheral devices
2. Processing devices
3. Personal devices
4. All of the above
5. None of these
Answer: 3
327. A system changeover method where complete changeover to the
new system takes place incrementally over a period of time is referred as–
1. Phased replacement
2. Block replacement
3. Complete replacement
4. All of the above
5. None of these
Answer: 1
328. One trillionth of a second is–
1. Pico second
2. Mille second
3. Micro second
4. Minute
5. All of these
Answer: 1
329. Following is of Non-vo a storage device
1. Magnetic tape
2. Compact disk
3. Floppy disk
4. All of the above
5. None of these
Answer: 1
330. A storage medium that retains its contents even in the absence of
power is referred as–
1. Non-volatile storage
2. Volatile storage
3. Secondary storage
4. Primary storage
5. None of these
Answer: 4
331. If a word is typed that is not in Words dictionary, a ___ wavy
underline appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these
Ans (A)
332. The _____ button on the quick access Toolbar allows you to cancel
your recent commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
Ans (D)
333. In Excel, any set of characters containing a letter , hyphen, or space
is considered ___
(A) a formula
(B) text
(C) a name
(D) a title
(E) None of these
Ans (B)
334. ________ Software allows users to perform calculations on rows
and columns of data.
(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
(E) None of these
Ans (C)
335. A _________ represent approximately one billion memory locations.
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans (C)
336. ______ cells involves creating a single cell by combining two or
more selected cells.
(A) Formatting
(B) Merging
(C) Embedding
(D) Splitting
(E) None of these
Ans (B)
337. The operating system is the most common type of
______________ software.
(A) communication
(B) application
(C) system
(D) word-processing
(E) None of these
Ans (C)
338. When you quickly press and releaes the left mouse button twice , you
are ____
(A) Primary-clicking
(B) pointing
(C) Double-clicking
(D) Secondary-clicking
(E) None of these
Ans (C)
339. The horizontal and vertical lines on a worksheet are called ___
(A) cells
(B) sheets
(C) block lines
(D) gridlines
(E) None of these
Ans (D)
340. To delete an incorrect character in a document, __________ to erase
to the right of the insertion point.
(A) press the left mouse key
(B) double-click the right mouse key
(C) press the BACKSPACE key
(D) press the delete key
(E) None of these
Ans (D)
341. The operating system does all of the following EXCEPT:
A. provide a way for the user to interact with the computer.
B .manage the central processing unit (CPU).
C .manage memory and storage.
D. enable users to perform a specific task such as document editing.
Ans (D)
342. During the boot process, the ____________ looks for the systemfiles.
A CD
B. BIOS
C. CPU
D. DVD
AnS (B)
343. ____________ are lists of commands that appear on the screen.
A GUIs
B Icons
C Menus
D Windows
Answer: C
344. ____________ is the ability of an operating system to control the
activities of multiple programs at the same time.
A Multitasking
B Streamlining
C Multiuser
D Simulcasting
Answer: A
345. The unique signal, generated by a device, that tells the
operatingsystem that it is in need of immediate attention is called an:
A action.
B event.
C interrupt.
D activity.
Answer: C
346. The operating system controls access to the processor by assigning
a(n) ____________ to each task requiring the processors attention.
A CPU
B slice of time
C stack
D event
Answer: B
347. The blocks of code, included in the operating system, that
softwareapplications interact with are known as:
A application programming interfaces (APIs).
B complimentary metal-oxide conductors (CMOS).
C device drivers.
D bootstrap loaders.
Answer: A
348. MS-DOS is a ____________ operating system.
A point-and-click
B user-friendly
C command-driven
D Mac
Answer: C
349. An interrupt handler is a(n):
A location in memory that keeps track of recently generated interrupts.
B peripheral device.
C utility program.
D special numeric code that indicates the priority of a request.
Answer: D
350. A spooler is a(n):
A location in memory that maintains the contents of a document until it
prints out.
B print job.
C program that coordinates the print jobs that are waiting to print.
D message sent from the printer to the operating system when a print job is
completed.
Answer: C
351. Virtual memory is typically located:
A on a floppy disk.
B in the CPU.
C in a flash card.
D on the hard drive.
Answer: D
352. The purpose of a swap (or page) file is to:
A maintain pages of documents that are being spooled to the printer.
B hold a program’s data or instructions in virtual memory when it
can’t fit in RAM.
C prevent thrashing in a multitasking environment.
D allow multiple print jobs to print their pages out simultaneously.
Answer: B
353. The definition of thrashing is:
A swapping data between virtual memory and RAM too frequently.
B insufficient hard disk space.
C too many processors being managed by the operating system.
D inaccurate information stored in the registry.
Answer: A
354. All of the following are TRUE of Safe Mode EXCEPT:
A Safe Mode is a special diagnostic mode.
B Safe Mode loads all nonessential icons.
C Safe Mode allows users to troubleshoot errors.
D Safe Mode loads only the most essential devices.
Answer: B
355. Verification of a login name and password is known as:
A configuration.
B accessibility.
C authentication.
D logging in.
Answer: C
356. The combination of the operating system and the processor is referred
to as the computers:
A CPU.
B platform.
C BIOS.
D CMOS.
Answer: B
357. The following message generally means:
A a nonsystem floppy has been left in the floppy disk drive.
B the CD drive is not functioning.
C the BIOS is corrupted.
D there is a problem loading a device.
Answer: A
358. Which of the following is the correct sequence of actions that takes
place during the boot-up process?
A Load operating system ? Activate BIOS ? Perform POST ?
Checkconfiguration settings
B Activate BIOS ? Perform POST ? Load operating system ?
Checkconfiguration settings
C Perform POST ? Load operating system ? Activate BIOS ?
Checkconfiguration settings
D Activate BIOS ? Check configuration settings ? Perform POST ? Load
operating system
Answer: B
359. All of the following are steps involved in the boot process EXCEPT:
A load the operating system into RAM.
B the power-on self-test.
C activate the basic input/output system (BIOS).
D load application programs.
Answer: D
360. The ____________, stored on a ROM chip, is responsible for loading
the operating system from its permanent location on the hard drive into
RAM.
A BIOS
B API
C device driver
D supervisor program
Answer: A
361. The basic input/output system (BIOS) is stored in:
A RAM.
B ROM.
C the CPU.
D the hard drive.
Answer: B
362. Ensuring that the essential peripheral devices are attached and
operational is the ____________ process.
A configuration
B CMOS
C POST
D ROM
Answer: C
363. The memory resident portion of the operating system is called the:
A registry.
B API.
C CMOS.
D kernel.
Answer: D
364. Which of the following does NOT occur during the power-on self-test ?
A The ScanDisk utility begins to run.
B The video card and video memory are tested.
C The BIOS identification process occurs.
D Memory chips are checked to ensure they are working properly.
Answer: A
365. All of the following are TRUE regarding virtual memory EXCEPT:
A any amount of RAM can be allocated to virtual memory.
B the setting for the amount of hard drive space to allocate to virtual
memory can be manually changed.
C this temporary storage is called the swap file (or page file).
D virtual memory is physical space on the hard drive.
Answer: A
366. The operating system allows users to organize the computer’s
contents in a hierarchical structure of directories that include all of the
following EXCEPT:
A files.
B folders.
D drives.
D systems.
Answer: D
367. All of the following statements concerning windows are true EXCEPT:
A windows are an example of a command-driven environment.
B windows can be resized and repositioned on the desktop.
C more than one window can be open at a time.
D toolbars and scrollbars are features of windows.
Answer: A
368. All of the following statements concerning files are true EXCEPT:
A A file is a collection of related pieces of information stored together for
easy reference.
B Files can be generated from an application.
C Files are stored in RAM.
D Files should be organized in folders.
Answer: C
369. Using Windows Explorer, a plus (+) sign in front of a folder indicates:
A an open folder.
B the folder contains subfolders.
C a text file.
D a graphics file.
Answer: B
370. In Windows XP, if you want to see the file size and modified dates of
all files in a folder, the best viewing option is the __________ view.
A List
B Thumbnails
C Details
D Icon
Answer: C
371. All of the following are examples of real security and privacy risks
EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
372. A process known as ____________ is used by large retailers to study
trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
373. ____________terminals (formerly known as cash registers) are
often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
374. A(n) ____________ system is a small, wireless handheld
computerthat scans an item’s tag and pulls up the current price (and
any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
375. The ability to recover and read deleted or damaged files from a
criminal’s computer is an example of a law enforcement specialty
called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
376. Which of the following is NOT one of the four major data
processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
377. ____________ tags, when placed on an animal, can be used to
record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
378. Surgeons can perform delicate operations by manipulating devices
through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
379. Technology no longer protected by copyright, available to everyone,
is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A
380. ____________ is the study of molecules and structures whose size
ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
381. ____________ is the science that attempts to produce machines that
display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
382. ____________ is data that has been organized or presented in a
meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
383. The name for the way that computers manipulate data into information
iscalled:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
384. Computers gather data, which means that they allow users to
____________ data.
A. present
B. input
C. output
D. store
Answer: B
385. After a picture has been taken with a digital camera and
processedappropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B
386. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
387. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
388. In the binary language each letter of the alphabet, each number and
eachspecial character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
389. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
390. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
391. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C
392. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C
393. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
394. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C
395. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
396. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A
397. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B
398. The ____________, also called the “brains†of the computer,
isresponsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D
399. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B
400. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A
401. ____________ is a set of computer programs used on a computer to
help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B
402. System software is the set of programs that enables your
computers hardware devices and ____________ software to work
together.
A. management
B. processing
C. utility
D. application
Answer: D
403. The PC (personal computer) and the Apple Macintosh areexamples
of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A
404. Apple Macintoshes (Macs) and PCs use different ____________ to
process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C
405. Servers are computers that provide resources to other computers
connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A
406. Smaller and less expensive PC-based servers are replacing
____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D
407. ____________ are specially designed computers that perform
complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B
408. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D
409. The difference between people with access to computers and the
Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A
410. ____________ is the science revolving around the use of nano
structures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A
411. Which of the following is the correct order of the four major functions
of a computer?
A. Process A Output A Input A Storage
B. InputA Output A Process A Storage
C. Process A Storage A Input A Output
D. Input A Process A Output A Storage
Answer: D
412. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Answer: A
413. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Answer: B
414. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C
415. ____________ controls the way in which the computer system
functions and provides a means by which users can interact with the
computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B
416. The operating system is the most common type of ____________
software.
A. communication
B. application
C. system
D. word-processing software
Answer: C
417. ____________ are specially designed computer chips that reside
inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B
418. The steps and tasks needed to process data, such as responses to
questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A
419. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D
420. The metal or plastic case that holds all the physical parts of the
computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A
421. The earliest calculating devices are?
a) Clock
b) Difference Engine
c) Abacus
d) Calculator
Answer: c
422. The basic operations performed by a computer are?
a) Arithmetic Operations
b) Logical Operations
c) Storage and relative
d) All of the above
Answer: d
423. The man who built the first Mec-hanical Calculator was?
a) Joseph Marie Jacquard
b) John Mauchly
c) Blaise Pascal
d) Harward Ailken
Answer: c
424. Punched cards were first introduced by?
a) Powers
b) Pascal
c) Jacquard
d) Herman Hollerith
Answer: d
425. LSTs(Large Integration) used in?
a) First generation
b) Second generation
c) Third generation
d) Fourth generation
Answer: d
426. What is MS Word?
a) A game
b) An Operating System
c) Word Processing Software
d) Typing tutor software
Answer: c
427. MS Excel is a?
a) Window based word processor package
b) Window based spreadsheet package
c) DOS based spreadsheet package
d) Window based accounting package
Answer: b
428. Power Point can display date from which of the following add-in
software of MS-Office?
a) Equation Editor
b) Organization Chart
c) Photo Album
d) All of these
Answer: d
429. The first network that planted the seeds of Internet was?
a) ARPANET
b) NSF net
c) V net
d) I net
Answer: a
430. Abbreviation www in www.yahoo.com, stands for?
a) World Word in Wonder
b) World Wide Web
c) World Web is Widening
d) Wonderful World Web
Answer: b
431. What is Active Desktop?
a) A term that is synonymous with viewing your desktop as a web page
b) A feature to customize your desktop to display informat-ion you can
update from the Internet.
c) Both (a) and (b) above mentioned.
d) Software
Answer: c
432. Active Window means?
a) The active window is designated by a different color toolbar than other
open windows.
b) The window that currently open
c) Both (a) and (b) above mentioned
d) The window that is last used
Answer: c
433. A bitmap is?
a) Is a format which windows use for desktop wallpaper?
b) A graphic file format made up of small dots.
c) A specific kind of bitmap file with the BMP extention.
d) All of the above.
Answer: d
434. Which of the following printers generates character from a grid?
a) Inkjet
b) Laser
c) Daisy wheel
d) Dot matrix
Answer: d
435. Close Button?
a) When clicked will close the dialog box, document or program
displayed in the window.
b) Is located at the right top end of the title bar of most Win-dows.
c) Implies for the small button with an X on it
d) All of the above
Answer: d
436. A dialog box is a one?
a) Which is a sort of on-screen from where you can fill in the blanks, make
selections from lists and chose various combinations of options and
settings.
b) In which you can connect to another Internet user and establish an audio
and video contact using Microsoft Word.
c) In which you can give verbal commands to Microsoft Word menu
d) All of the above
Answer: a
437. A letter, memo, proposal or other file that is created using Microso-ft
Word is called as?
a) Master
b) Slide
c) Document
d) Worksheet
Answer: c
438. The meaning of double-click is?
a) Pushing and releasing the main mouse button twice in rapid succession
when the on-tree mouse pointer is positioned over the desired item
b) Appearance of an icon
c) To take a selection from the document and move it to the clipboard
d) All of the above
Answer: a
439. A folder: (A) is an organizational tool used to store files.(B) is
synonymous with directory, but folder is the newer preferred term
(C)contains data?
a) A only
b) B only
c) C only
d) None of the above
Answer: d
440. Commercially produced first computer?
a) IBM
b) MIPS
c) UNIVAC
d) EDSAC
Answer: c
441. Banks and other big organizations requiring large data storage use?
a) Laptop PC's
b) Desktop PC's
c) Mainframe Computer
d) Workstation
Answer: c
442. High Level Language useful for the beginners is?
a) BASIC
b) PASCAL
c) FORTRON
d) COBOL
Answer: d
443. For Scientific work the most popular language is?
a) PASCAL
b) FORTRON
c) COBOL
d) PROLOG
Answer: b
444. Which is not the portable computer?
a) Micro-processor
b) Calculator
c) Series Computes
d) Parallel Computers
Answer: d
445. OBJECT ORIENTED language is?
a) ADA
b) PROLOG
c) PASCAL
d) FORTRAN
Answer: a
446. Information is?
a) Summarization process of data
b) Data Information
c) Textual form of data
d) Facts and figures
Answer: a
447. Total memory of system can be known using?
a) DIR commands
b) MEM commands
c) Warm boot
d) TOT MEM commands
Answer: b
448. For running WINDOW minimum disk free space required is?
a) 8 MB
b) 10 MB
c) 16 MB
d) 32 MB
Answer: a
449. The first graphical web browser are?
a) Gopher
b) WAIS
c) CERN
d) Mosaic
Answer: d
450. The programs used to view web pages are called?
a) Clients
b) Server
c) Browser
d) Programmer
Answer: c
451. FTP means?
a) File Transfer Protocol
b) File Telnet Protocol
c) Fast Track Processing
d) Fine Tunning programs
Answer: a
452. Which among the following is faster than Main Memory?
a) RAM
b) ROM
c) Cache
d) None of the above
Answer: c
453. Semi Conductor Memory is known as?
a) RAM
b) ROM
c) PROM
d) EPROM
Answer: a
454. In which generation computers IC have been used?
a) First
b) Second
c) Third
d) Fourth
Answer: c
455. High level language is?
a) Machine Independent
b) Machine dependent
c) (a) And (b) are true
d) (a) And (b) are false
Answer: a
456. Hypertext is?
a) Text stored in the memory of the computer
b) Text displayed on the screen of the computer
c) Special text used in developing Internet developing package
d) A system of managing textual Information by creating associations
between different documents
Answer: d
457. Information on a computer is sto-red in the form of?
a) Files
b) Folders
c) Directory
d) Data dictionary
Answer: a
458. TCP is?
a) Transfer control protocol
b) Transfer control process
c) Transmission control protocol
d) Transmission control process
Answer: c
459. Every computer on the Internet is known as?
a) Host
b) Client
c) Modem
d) Server
Answer: a
460. Fax machines are used to send documents through a?
a) Telephone line
b) Modems
c) Co-axial Wire
d) All of these
Answer: a
461.The term overflow means?
a) An excess of Internal storage
b) An excess of external storage
c) A situation where record cannot fit in to its right place
d) A device, which controls the level of humidity in the computer room.
Answer: a
462. In computer science, by Informa-tion we mean?
a) Any output coming out from computer
b) A report printed by computer
c) Processed data put in intelligent form
d) Plural of data
Answer: c
463. Which of the following are parts of the CPU?
a) Secondary Memory
b) Control unit
c) Input device
d) Printer
Answer: b
464. The purpose of an application program is to?
a) Meet specific user needs
b) Make equivalent run better
c) Allow the operating system to control resources better
d) Convert program written in high-level language to machine
levellanguage
Answer: a
465. Micro computers are?
a) 8 bit
b) 16 bit
c) 32 bit
d) Either 8 or 16 bit
Answer: d
466. Computer uses the_________number system to store data and
perform calculations.
(A) binary
(B) octal
(C) decimal
(D) hexadecimal
(E) None of these
Ans : (A)
467. A disk's content that is recorded at the time of manufacture and that
cannot be changed or erased by the user is_______________
(A) Memory-only
(B) Write-only
(C) Once-only
(D) Run-only
(E) Read-only
Ans : (E)
468. Which of the following can be used to select the entire document ?
(A) CTRL+A
(B) ALT+F5
(C) SHIFT+A
(D) CTRL+K
(E) CTRL+H
Ans : (A)
469.___________are 'attempts by individuals to obtain confidential
information from you by falsifying their identity.
(A) Phishing
(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) None of the above
Ans : (A)
470. Part number, part description, and number of parts ordered are
examples of__________
(A) control
(B) output
(C) processing
(D) feedback
(E) input
Ans : (E)
471. A Web site's main page is called its______________
(A) Home Page
(B) Browser Page
(C) Search Page
(D) Bookmark
(E) None of these
Ans : (A)
472. The simultaneous processing of two or more programs by multiple
Processors is_____________
(A) multiprogramming
(B) multitasking
(C) time-sharing
(D) multiprocessing
(E) None of these
Ans : (D)
473. Codes consisting of lines of varying widths or lengths that are
computer-readable are known as____________
(A) an ASCII code
(B) a magnetic tape
(C) an OCR scanner
(D) a bar code
(E) None of these
Ans : (D)
474. To instruct Word to fit the width of a column to the contents of a table
automatically, click the button and then point to AutoFit Contents.
(A) Fit to Form
(B) Format
(C) Autosize
(D) Contents
(E) AutoFit
Ans : (E)
475. Why is it unethical to share copyrighted files with your friends ?
(A) It is not unethical, because it is legal.
(B) It is unethical because the files are being given for free.
(C) Sharing copyrighted files without permission breaks copyright laws.
(D) It is not unethical because the files are being given for free.
(E) It is not unethical-anyone can access a computer
Ans : (C)
476. Reusable optical storage will typica1ly have the acronym__________
(A) CO
(B) DVD
(C) ROM
(D) RW
(E) ROS
Ans : (D)
477. The most common type of storage devices are__________
(A) persistent
(B) optical
(C) magnetic
(D) flash
(E) steel
Ans : (D)
478. A device that connects to a network without the use of cables is said
to be_________
(A) distributed
(B) free
(C) centralized
(D) open source
(E) None of these
Ans : (B)
479. A person who used his or her expertise to gain access to other
people's computers to get information illegally or do damage is
a______________
(A) hacker
(B) analyst
(C) instant messenger
(D) programmer
(E) spammer
Ans : (A)
480. To access properties of an object, the mouse technique to
useis__________________
(A) dragging
(B) dropping
(C) right-clicking
(D) shift-clicking
(E) None of these
Ans : (C)
481. To change selected text to all capital letters, click the change case
button, then click___________
(A) UPPERCASE
(B) UPPER ALL
(C) CAPS LOCK
(D) Lock Upper
(E) Large Size
Ans : (A)
482. The basic unit of a worksheet into which you enter data in Excel is
called a______________
(A) tab
(B) cell
(C) box
(D) range
(E) None of these
Ans : (B)
483. You can keep your personal files / folders in____________________
(A) My folder
(B) My Documents
(C) My Files
(D) My Text
(E) None of these
Ans : (B)
484. In Word you can force a page break____________
(A) By positioning your cursor at the appropriate place and pressing the F1
key
(B) By positioning your cursor at the appropriate place and pressing
Ctrl+Enter
(C) By using the Insert/Section Break
(D) By changing the font size of your document
(E) None of these
Ans : (B)
485. The default view in Excel is___________view.
(A) Work
(B) Auto
(C) Normal
(D) Roman
(E) None of these
Ans : (C)
486. The process of transferring files from a computer on the Internet to
your computer is called___________
(A) downloading
(B) uploading
(C) FTP
(D) JPEC
(E) downsizing
Ans : (A)
487.____________.is the process of dividing the disk into tracks and
sectors.
(A) Tracking
(B) Formatting
(C) Crashing
(D) Allotting
(E) None of these
Ans : (B)
488. Help Menu is available at which button ?
(A) End
(B) Staft
(C) Turnoff
(D) Restart
(E) Reboot
Ans : (B)
489. The contents of____________are lost when the computer turns off.
(A) storage
(B) input
(C) output
(D) memory
(E) None of these
Ans : (D)
490. When you save to this, your data will remain intact even when the
computer is turned off________
(A) RAM
(B) Motherboard
(C) Secondary storage device
(D) Primary storage device
(E) None of these
Ans : (C)
491. A central computer that holds collections of data and programs for
many PCs, workstations, and other computers is a(n)_________
(A) supercomputer
(B) minicomputer
(C) laptop
(D) server
(E) None of these
Ans : (D)
492. The_________folder retains copies of messages that you have
started but are not yet ready to send.
(A) Drafts
(B) Outbox
(C) Address Book
(D) Sent Items
(E) Inbox
Ans : (B)
493. Grouping and processing all of a firm's transactions at one time is
called_________
(A) a database management system
(B) batch processing
(C) a real-time system
(D) an on-line system
(E) None of these
Ans : (B)
494. The___________enables you to simultaneously keep multiple Web
pages open in one browser window.
(A) tab box
(B) pop-up helper
(C) tab row
(D) address bar
(E) Esc key
Ans : (C)
495. Which ports connect special types of music instruments to sound
cards ?
(A) BUS
(B) CPU
(C) USB
(D) MIDI
(E) MINI
Ans : (C)
496. You can__________a search by providing more information the
search engine can use to select a smaller, more useful set of results.
(A) refine
(B) expand
(C) load
(D) query
(E) slowdown
Ans : (A)
497. What is the permanent memory built into your computer called ?
(A) RAM
(B) Floppy
(C) CPU
(D) CO-ROM
(E) ROM
Ans : (E)
498. What displays the contents of the active cell in Excel ?
(A) Name box
(B) Row Headings
(C) Formula bar
(D) Task pane
(E) None of these
Ans : (A)
499. The piece of hardware that converts your computer's digital signal to
an analog signal that can travel over telephone lines is called a_______
(A) red wire
(B) blue cord
(C) tower
(D) modem
(E) None of these
Ans : (D)
500. Video processors consist of________and________, which store and
process images.
(A) CPU and VGA
(B) CPU and memory
(C) VGA and memory
(D) VGI and DVI
(E) None of these
Ans : (C)
501. If you want to connect to your own computer through the Internet from
another location, you can use_________
(A) e-mail
(B) FTP
(C) instant message
(D) Telnet
(E) None of these
Ans : (D)
502. To reload a Web page, press the___________.button.
(A) Redo
(B) Reload
(C) Restore
(D) Ctrl
(E) Refresh
Ans : (E)
503. This first step in the transaction processing cycle captures business
data through various modes such as optical scanning or at an
electroniccommerce website__________
(A) Document and report generation
(B) Database maintenance
(C) Transaction processing startup
(D) Data Entry
(E) None of these
Ans : (D)
504. A(n)_____________is a special visual and audio effect applied in
Power-point to text or content.
(A) animation
(B) flash
(C) wipe
(D) dissolve
(E) None of these
Ans : (A)
505. When the pointer is positioned on a__________it is shaped like a
hand.
(A) grammar error
(B) Formatting error
(C) Screen Tip
(D) Spelling error
(E) hyperlink
Ans : (E)
506. A______________is the term used when a search engine returns a
Web page that matches the search criteria.
(A) blog
(B) hit
(C) link
(D) view
(E) success
Ans : (E)
507. ___________are words that a programming language has set aside
for its own use.
(A) Control words
(B) Control structures
(C) Reserved words
(D) Reserved keys
(E) None of these
Ans : (C)
508. Mobile Commerce is best described as___________
(A) The use of Kiosks in marketing
(B) Transporting products
(C) Buying and selling goods/services through wireless handheld devices
(D) Using notebook PC's in marketing
(E) None of the above
Ans : (C)
509. Which of, the following is a storage device that uses rigid, permanently
installed magnetic disks to store data/information__________
(A) floppy diskette
(B) hard disk
(C) permanent disk
(D) optical disk
(E) None of these
Ans : (B)
510. The computer abbreviation KB usually means___________
(A) Key Block
(B) Kernel Boot
(C) Key Byte
(D) Kit Bit
(E) Kilo Byte
Ans : (E)
511. What is the process of copying software programs from secondary
storage media to the hard disk called?
(A) Configuration
(B) Download
(C) Storage
(D) Upload
(E) Installation
Ans : (D)
512. In Excel____________allows users to bring together copies of workbooks that other users have worked on independently.
(A) Copying
(B) Merging
(C) Pasting
(D) Compiling
(E) None of these
Ans : (B)
513. Which of the following are advantages of CD-ROM as a storage
media?
(A) CD-ROM is an inexpensive way to store large, amount of data and
information
(B) CD-ROM disks retrieve data and information more quickly
thanmagnetic disks do
(C) CD-ROMs make less errors than magnetic media
(D) An of the above
(E) None of these
Ans : (D)
514. A DVD is an example of a(n) ______________
(A) hard disk
(B) optical disc
(C) output device
(D) solid-state storage device
(E) None of these
Ans : (B)
Download