1. The basic goal of computer process is to convert data into…… (1 ...

burgerraraSoftware and s/w Development

Nov 18, 2013 (3 years and 8 months ago)

1,037 views

1. The basic goal of computer process is to convert data into……

(1) information

(2) tables

(3)

files

(4) graphs

(5) None of these


Answer : 1


2. ……… Software allows users to perform calculations on rows and
columns of

data.

(1)

Word processing

(2)
Presentation graphics

(3)

Database

Management Systems

(4) Electronic Spreadsheet

(5) None of these


Answer : 4


3. The memory resident portion of the operating

system

is called the :

(1) registry

(2) API

(3) CMOS

(4) kernel

(5) None of these


Answer : 4


4. Which of the following is a transaction?

(1) A group of SQL statements consisting of one read and one write
operation

(2) A group of SQL statements consisting only of ready operations.

(3) A group of SQL statements defining a user
-
oriented task

(4) A gr
oup of SQL statements consisting only of write operations.

(5) None of these


Answer : 3




5. In order for computers to communicate across a network, they must
be

connected through a(n)………

(1) TCP/IP

(2) Topology

(3) Ethernet

(4) Thin client

(5) None of
these


Answer : 2


6. “Buy Now


Pay Now” is commonly used for :

(1) Debit Cards

(2) Vault Cards

(3)

Credit Cards

(4) E
-
purse

(5) None of these


Answer : 1


7. The ……… , stored on a ROM chip, is responsible for loading the
operating

system

from its
permanent

location

on the hard drive into RAM.

(1) BIOS

(2) API

(3)

device driver

(4) supervisor program

(5) display


Answer : 1


8. Choices in computers are referred to as :

(1) options

(2) exit

(3) boot

(4) folder

(5) None of these


Answer : 1


9. The ……
… button on the quick access Toolbar allows you to cancel your
recent

commands or actions.

(1) Search

(2) Cut

(3) Document

(4) Undo

(5) None of these


Answer : 4


10. During the boot process, the ……… looks for the

system

files.

(1) HDD

(2) BIOS

(3) CPU

(4)

DVD

(5) CD


Answer : 2


11. Computers gather data, which means they allow users to…… data.

(1) present

(2) store

(3) output

(4) input

(5) None of these


Answer : 4


12. Which of the following is a transaction?

(1) A group of SQL statements consisting of o
ne read and one write
operation

(2) A group of SQL statements consisting only of ready operations.

(3) A group of SQL statements defining a user
-
oriented task

(4) A group of SQL statements consisting only of write operations.

(5) None of these


Answer : 3

13. What are the four basis connecting hardware devices?

(1) Repeater, bridge, router and gateway

(2) Repeater, bridge, router and dell

(3) Repeater, connector, router and gateway

(4) Amplifier, bridge, router and gateway

(5) None of these


Answer : 1


14.

The ……… lists the

location

of

files

on the disk

(1) FAT

(2) boot sector

(3) root folder

(4) data area

(5) None of these


Answer : 1


15. A device operating at the physical layer is called a :

(1) Bridge

(2) Router

(3) Repeater

(4) All of the above

(5)
None of these


Answer : 3


16. Number of bits per symbol used in Baudot code is

(1) 5

(2) 6

(3) 7

(4) 8

(5) 9


Answer : 1


17. All of the following statements concerning windows are true EXCEPT :

(1) windows are an example of a command
-
driven environment.

(2) windows can be resized and repositioned on

the desktop.

(3) more than one window can be open at a time.

(4) toolbars and scrollbars are features of windows.

(5) None of these.


Answer : 1


18. A client / server network ……….

(1) has clients that provide

functions such as application control and shared
computation.

(2) uses client computers to provide copies of software to the server to
allow

server processing.

(3) provides a company with the capability to downsize from lager computer
systems and move awa
y from legacy

systems.

(4) has server computers that perform all processing, clients are
dumb’ input/ output devices only.

(5) None of these.


Answer : 2


19. To get to the ‘Symbol’ dialog box, click on the ……… menu and
choose

‘Symbol’.

(1) Insert

(2) Format

(3) Tools

(4) Table

(5) Help


Answer : 1


20. Which is not a data source component?

(1) mail merge toolbar

(2) header row

(3) data fields

(4)

data records

(5) All of these


Answer : 1

21. Use this when you want to make all letters capital withou
t having to use
the

shift key for each character………

(1) shifter

(2) upper case

(3) caps

lock key

(4) icon

(5) None of these


Answer

: 3


22. When you quickly press and releaes the left mouse button twice, you
are :

(1) Primary
-
clicking

(2) pointing

(3)
Double
-
clicking

(4) Secondary
-
clicking

(5) None of these


Answer

: 3


23. In

Windows XP, if you want to see

the file

size and modified dates of all
files in

a folder, the best viewing option is the ……… view.

(1) List

(2) Thumbnails

(3) Details

(4) Icon

(5)

None of these


Answer

: 3

24. Programming language built into user programs such as Word
andExcel

are

known as ………

(1) 4GLs

(2) macro languages

(3) object
-
oriented languages

(4) visual programming languages

(5) None of these


Answer

: 4


25. To move a
copy of file from one computer to another over a
communication

channel is called?

(1)

File transfer

(2)

File encryption

(3) File modification

(4) File copying

(5) None of the above


Answer

: 1


26. Which of the following is not a type of hub?

(1) Passive h
ub

(2) Inactive hub

(3) Switching hub

(4) Intelligent hub

(5) None of these


Answer

: 2


27. …… allows you to print.

(1) ribbon

(2) monitor

(3) go now

(4) Control
-
P

(5) None of these


Answer

: 4

28. Ina synchronous modem, the receive equilizer is known as

(1) adaptive equilizer

(2) impariment equilizer

(3) statistical equalizer

(4) compromise equilizer

(5) None of these


Answer

: 1


29. Which of the following is not the part of standard office suite?

(1) Word Processor

(2) Database

(3) Image Editor

(4) File

manager

(5) None of these


Answer

: 4


30. In a document what is the maximum number of columns that can be
inserted

in

MS Word

Table?

(1) 35

(2) 15

(3) 63

(4) 65

(5) 70


Answer

: 3


31. Where does most data go first with in a computer memory hierarchy?

(1) RAM

(2) ROM

(3) BIOS

(4) CACHE

(5) None of these


Answer

: 1


32. COBOL is an acronym for ………

(1) Common Business Oriented Language

(2)

Computer Business

Oriented Language

(3) Common Business Operated Language

(4) Common Business Organized Language

(5)

None of these


Answer

: 1


33. Machine language sometimes also referred as :

(1) Binary language

(2) High level language

(3) Middle level language

(4) Low level language

(5) None of these


Answer

: 1


34. When creating a computer program, the ……… designs
the structure of
the

program

(1) End user

(2) System Analyst

(3) Programmer

(4) Architect

(5) All of the above


Answer

: 2


35. Which is an another name for functional language

(1) Machine

(2) Application

(3) Low
-
level language

(4) High
-
level language

(5)
None of these


Answer

: 2


36. ……… is data that has been organized or presented in a meaningful
fashion.

(1) A process

(2) Software

(3) Storage

(4) Information

(5) None of these


Answer

: 4


37. Every computer connected to an intranet or extranet must have

a
distinct

(1) firewall

(2) proxy server

(3) IP address

(4) domain name

(5) None of these


Answer

: 3


38. ……… translates the semantic instructions developed by programmers
into the

machine language

(1) Assembler

(2) Interpreter

(3) Loader

(4) Complier

(5) None of these


Answer

: 1


39. ………is an artificial language designed to communicate instructions to
a

computer.

(1) Programming language

(2) Machine language

(3) Software language

(4) Assembly language

(5) None of these


Answer

: 1


40. This is a stand
ard way for a Web server to pass a Web user’s request
to an

application program and to receive data back to forward to the user
-

(1) Interrupt request

(2) Forward DNS lookup

(3) Data
-
Link layer

(4)

File Transfer

Protocol

(5) Common gateway interface


Answer

: 5

41.

The capability of the operating system to enable two or more than
two

programs to execute simultaneously in a

single computer

system by
using a single

processor is


(1) Multiprocessing

(2) Multitasking

(3)

Multiprogramming

(4) Multiexecution

(5) None of these


Answer

: 2


42.

Virtual memory is typically located:

(1) on a floppy disk

(2) in the CPU.

(3) in a flash card

(4) on the hard drive.

(5) None of these


Answer

: 4


43.

This type of software is designed for users who want to customize
the

programs they use.

(1) Shareware

(2)

Open
-
source software

(3) Freeware

(4) Macros

(5) None of these


Answer

: 1


44.

The effect of the ROLLBACK command in a transaction is the following


(1) Undo all changes to the data
-

base resulting from the
execution of the
transaction

(2) Undo the effects of the last UPDATE command

(3) Restore the content of the database to its state at the end of the
previous day

(4) Make sure that all changes to the database are in effect

(5) None of these


Answer

: 1


45.

A result of a computer virus cannot lead to :

(1) Disk Crash

(2) Mother Board Crash

(3) Corruption of program

(4) Deletion of files

(5) None of these


Answer

: 2


46.

The smallest item of useful information a computer can handle


(1) bite

(2) byte

(3) bit

(4) bait

(5) None of these


Answer

: 3


47.

All of the following are

TRUE

of Safe Mode EXCEPT:

(1) Safe Mode is a special diagnostic mode.

(2) Safe Mode loads all nonessential icons.

(3) Safe Mode allows users to troubleshoot errors.

(4) Safe Mode loads
only the most essential devices.

(5) None of these


Answer

: 2


48.

Superscript, subscript, outline, emboss, engrave are known as :

(1)

font styles

(2) font effects

(3)

word art

(4) text effects

(5) None of these


Answer

: 2


49.

Changing the appearance of

a document is called

(1) Proofing

(2) Editing

(3) Formatting

(4) Correcting

(5) All of the above


Answer

: 3


50.

You can detect

spelling and grammar

errors by :

(1) Press Shift + F7

(2) Press Ctrl + F7

(3) Press Alt+ F7

(4) Press F7

(5) None of these


Answer

: 4


51.

What kind of memory is both static and non
-
volatile?

(1) RAM

(2) ROM

(3) BIOS

(4) CACHE

(5) PROM


Answer

: 2



52.

A process known as


is used by large organization to study trends.

(1) data mining

(2) data selection

(3) POS

(4) data
conversion

(5) None of these


Answer

: 1


53.

A(n)


system is a small,

wireless handheld computer

that scans an
item’s tag

and pulls up the current price (and any special offers) as you
shop.

(1) PSS

(2) POS

(3) inventory

(4) data mining

(5) None of these


Answer

: 1


54.



cells involve creating a single cell by combining two or more selected
cells.

(1) Formatting

(2) Merging

(3) Embedding

(4) Splitting

(5) None of these


Answer

: 2


55.

Single party

disk relying on the disk

controller for

finding out whi
ch disk
has

failed is used by :

(1) RAID level 5

(2) RAID level 2

(3) RAID level 4

(4) RAID level 3

(5) RAID

level 1


Answer

: 4


56.

The sharing of a medium and its path by 2 or more devices is called


(1) Modulation

(2) Encoxing

(3) Line discipline

(4)
Multiplexing

(5) None of these


Answer

: 4


57.

What happens when you click on Insert > Picture > Clip Art

(1) It inserts a clipart picture into document

(2) It lets you choose clipart to insert into document

(3) It opens Clip Art taskbar

(4) It insets
symbols

(5) None of these


Answer

: 3


58.

Which of the following does

NOT

occur during the power
-
on self
-
test
(POST)?

(1) The ScanDisk utility begins to run.

(2) The video card and video memory are tested.

(3) The BIOS identification process occurs.

(4)
Memory chips are checked to ensure they are working properly.

(5) None of these


Answer

: 1


59.

OLE stands for :

(1) Online Link Embedding

(2) Object Link Export

(3) Object Linking and Embedding

(4) Online Link Emulation

(5) None of these


Answer

: 3


60.

Which of the following is not available in Font Spacing?

(1) Normal

(2) Loosely

(3) Condensed

(4) Expanded

(5) All are available


Answer

: 2


61.

The purpose of a swap (or page) file is to:

(1) maintain pages of documents that are being spooled to the
printer.

(2) hold a program’s data or instructions in virtual memory when it can’t fit
in RAM.

(3) prevent thrashing in a multitasking environment.

(4) allow multiple

print jobs

to print their pages out simultaneously.

(5) None of these


Answer

: 2


62.

So
ftware programs that allow you to legally copy files and give them
away at

no cost are called which of the

following :

(1) Time sharing

(2) Public domain

(3) Shareware

(4) Freeware

(5) None of these


Answer

: 3


63.

Which of the following is

NOT

a goal of

Transaction processing
system?

(1) Capture, process and store transactions

(2) Produce a variety of documents related to Routine business activities

(3) Reduce manual effort associated with Processing business transactions

(4) Produce standard reports used

for

Management decision

making

(5) None of the above


Answer

: 2


64.

The degree of detail that should be incorporated into a database
depends on

what?

(1) Data integrity

(2) The type of database

(3) The user’s perspective

(4) The business practices and
policies

(5) None of these


Answer

: 2


65.

Superscript refers to


(1) Characters displayed below the line of the normal text

(2) Characters displayed above the line of the normal text

(3) Characters displayed vertically centre

(4) Both (1) and (2)

(5) No
ne of these


Answer

: 2


66.

A


is an additional set of commands that the computer displays after
you

make a selection from the main menu :

(1) dialog box

(2) submenu

(3) menu selection

(4) All of the above

(5) None of these


Answer

: 1


67.

The
difference between people with access to computers and the
Internet and

those without this access is known as the :

(1) digital divide

(2) Internet divide

(3) Web divide

(4) broadband divide

(5) None of these


Answer

: 1


68.

How will you remove all format
ting added to your documents (such as
bold,

italics, and underline etc.)

(1) Save

(2) Save as plain

text file

(3) Save as

(4) All of the above

(5) None of these


Answer

: 2


69.

With the object
-
oriented (OO) approach, an object encapsulates, or


a

program
mer.

(1) carries out,

the details

of an object for

(2) hides,

the details

of an object from

(3) reveals,

the details

of an object to

(4) extends,

the details

of an object beyond

(5) None of these


Answer

: 2


70.

The ability to recover and read deleted or
damaged files from a
criminal’s

computer is an example of a law enforcement specialty called :

(1) robotics

(2) simulation

(3) computer forensics

(4) animation

(5) None of these


Answer

: 3


71.

Granting an outside organisation

access to Internet web pages is
often

implemented using a (an) :

(1) Extranet

(2) Intranet

(3) Internet

(4) Hacker

(5) None of these

Answer

: 1



72.

The purpose of the primary key in a database is to :

(1) Unlock the database

(2) Provide a map of the dat
a

(3) Uniquely identify a record

(4) Establish constraints on database operations

(5) None of the above


Answer

: 3


73.

The code that

relational database management Systems

use to
perform their

database task is referred to as :

(1) QBE

(2) SQL

(3) OLAP

(4) Sequel Server

(5) None of these


Answer

: 2


74.

VIRUS stands for :

(1)

Vital Information

Recourse Under Siege

(2)

Vital Information

Reason Under Siege

(3)

Vital Information

Recourse Under System

(4) Virus Information Recourse Under Siege

(5) None of t
hese


Answer

: 1


75.

Data becomes ................ when it is presented in a format that people
can

understand and use.

(1) processed

(2) graphs

(3) information

(4) presentation

(5) None of these


Answer

: 3


76.

The term ............. designates
equipment that might be added to a
computer

system to enhance its functionality.

(1) digital device

(2) system add
-
on

(3) disk pack

(4) peripheral device

(5) None of these


Answer

: 4







77.

……… is the language that enable user to access or manipulate d
ata
as

organized by appropriate data model :

(1) DML

(2) SDL

(3) DDL

(4) All of the above

(5) None of these


Answer

: 1


78.

The user commands that are used to interact with a database is called
as :

(1) Query

(2) Interaction

(3) Command

(4) Instruction

(5) None of these


Answer

: 3


79.

RAM can be thought of as the ......... for the computer’s processor :

(1) factory

(2) operating room

(3) waiting room

(4) planning room

(5) None of these


Answer

: 3


80.

……… is computer software designed to operate the
computer
hardware and

to provide platform for running

application

software :

(1)

Application

software

(2) System software

(3) Software

(4) Operating system

(5) None of these


Answer

: 2

81.

An assembler is used to translate

a program

written in………

(1) a lo
w level language

(2) machine language

(3) a high level language

(4) assembly language

(5) None of these


Answer

:4


82.

The operating system controls access to the processor by assigning
a(n) ………

to each task requiring the processor’s attention.

(1) CPU

(2) slice of time

(3) stack

(4) event

(5) None of these


Answer

:2


83.

Which of the following is the correct sequence of actions that takes
place

during the boot
-
up process?

(1) Load operating system
-

Activate BIOS
-
Perform POST
-
Check
configuration settin
gs

(2) Activate BIOS
-
Perform POST
-
Load operating system
-
Check
configuration settings

(3) Perform POST
-

Load operating system
-

Activate BIOS
-

Check
configuration settings

(4) Activate BIOS
-

Check configuration settings
-

Perform POST
-
Load
operating sys
tem

(5) None of these


Answer

:2


84.

Using Windows Explorer, a plus (+) sign in front of a folder indicates :

(1) an open folder

(2) the folder contains subfolders

(3) a

text file

(4) a graphics file

(5) None of these


Answer

:2


85.

Which of the
following position is not available for fonts on

MS Word?

(1) Normal

(2) Raised

(3) Lowered

(4) Centered

(5) All are available


Answer

:4


86.

“Buy Now


Pay Later” is commonly used for :

(1) Debit Cards

(2) Vault Cards

(3) Credit Cards

(4) E
-
purse

(5) Non
e of these


Answer

:3


87.

The different styles of

lettering

in a word processing program……

(1) font

(2) calligraphy

(3) writing

(4) manuscript

(5) None of these


Answer

:1


88.

To move down a page in a document……

(1) jump

(2) fly

(3) wriggle

(4) scroll

(5) None of these


Answer

:4


89.

Compilers can identify:

(1) syntax errors

(2) semantic errors

(3) logical errors

(4) mathematical errors

(5) None of these


Answer

:1


90.

Which was the first Scientific

Computer Programming Language?

(1) COBOL

(2) LISP

(3) ADA

(4) FORTRAN

(5) JAVA


Answer

: 4


91.

A hard copy of a document is …

(1) stored in the hard disk

(2) stored on a floppy

(3) stored on a CD

(4) printed on the paper

(5) None of these


Answer

:4


92.

Flow control in TCP/IP is handled using:

(1)
Urgent pointer

(2) Checksum

(3)

Acknowledgement

number

(4) Variable
-
size sliding window

(5) None of these


Answer

:4


93.

This component is required to process data into information and
consists of

integrated circuits .

(1) Hard disk

(2) RAM

(3) CPU

(4) RO
M

(5) None of these


Answer

:3


94.

From which menu you can insert Header and Footer?

(1) Insert Menu

(2) View Menu

(3) Format menu

(4) Tools Menu

(5) Edit Menu


Answer

:2


95.

Moves the cursor one space to the right to puts spaces in between
words……

(1)

control key

(2) space bar

(3) printer

(4) mouse

(5) None of these


Answer

:2


96.

Shimmer, Sparkle text, Blinking Background etc. are known as :

(1)

font styles

(2) font effects

(3)

word art

(4) text effects

(5) None of these


Answer

:4


97.

The
horizontal and vertical lines on a worksheet are called :

(1) cells

(2) sheets

(3) block lines

(4) gridlines

(5) None of these


Answer

:4


98.

The basic input/output system (BIOS) is stored in:

(1) RAM

(2) ROM

(3) the CPU

(4) the hard drive

(5) None of
these


Answer

:2


99.

Which of the following features usually applies to data in a data
warehouse?

(1) Data are often deleted

(2) Most applications consists of transactions

(3) Data are rarely deleted

(4) Relatively few records are processed by application
s

(5) None of these


Answer

:2


100.

What type of program controls the various computer parts and allows
the

user interact with the computer ?

(1) Utility software

(2) Operating system

(3) Word processing software

(4)

Database program

(5) None of these


Answer

:1

101.

Which of the following is an example of connectivity?

(1) data

(2) hard disk

(3) Internet

(4)

power cord

(5) None of these


Answer :3


102.

The command used to remove text or graphics from a document.
The

information is then stored on a clip
board so you can paste it.

(1) chop

(2) cut

(3) clip

(4) cart away

(5) None of these


Answer :2


103.

People, procedures, software, hardware, and data are the five parts of
a(n) :

(1) competency system

(2) computer system

(3) information system

(4)
software system

(5) None of these


Answer :3


104.

The feature of Word that automatically adjusts the amount of
spacebetween certain combinations of characters so that an entire word
looks more

evenly spaced. What is that feature called?

(1) Spacing

(2) Sc
aling

(3) Kerning

(4) Positioning

(5) None of these


Answer :3


105.

Which of the following statement is wrong?

(1) Windows XP is an operating system

(2) Linux is owned and sold by Microsoft

(3) Photoshop is a graphical design tool by Adobe

(4) Linux is fr
ee and open source software

(5) None of the above


Answer :2


106.

A phenomenon in virtual memory schemes in which the processor
spends

most of the time swapping pages rather than executing instructions
is :

(1)loading

(2) swapping

(3) thrashing

(4) aging

(5) digging


Answer :3


107.

Give the name of the Linear list in which elements can be added at
ends but

not in the middle:

(1) Array

(2) Queue

(3) Tree

(4)

Circular

Queue

(5) None of these


Answer :2


108.

Flip
-
flop is the basic structure of the device:

(1) Hard disk

(2) Memory

(3) Cells

(4) Speakers

(5) None of these


Answer :2


109.

What is a specialized

software program that

allows

input and output
devices

to communicate with the rest of the computer system?

(1) Utility driver

(2) Utility program

(3)
Data compression utility

(4) Device driver

(5) None of these


Answer :4


110.

When assigning a shortcut key to a symbol, you should always try
toselect a

key or key combination that is:

(1) unassigned

(2) Located on the ten
-
key pad section of your keyboard
.

(3) Assigned to another task.

(4) From the same font family as the symbol.

(5) None of these


Answer :1



111.

Which American

Computer Company

is called big blue?

(1) Microsoft

(2) Compaq Corp

(3) IBM

(4) Tandy Sevenson

(5) Hewlett Packard


Answer :3


112.

A dumb terminal has :

(1) An embedded microprocessor

(2) Extensive memory

(3) Independent processing

(4) A keyboard and screen

(5) None of these


Answer :2


113.

Which of the following is a software selection criteria?

(1) Appropriateness

(2) Efficien
cy

(3) Compatibility

(4) All of the above

(5) None of these


Answer :2


114.

Which of the following memories needs

refresh?

(1) SRAM

(2) DRAM

(3) ROM

(4) All of above

(5) None of these


Answer :4


115.

……… is paperless document transfer between companies.

(1) EFT

(2) EDI

(3) ETS

(4) RTGS

(5) None of these


Answer :4


116.

The switching devices used in First Generation computer’s were:

(1) Transistors

(2) SSI chips

(3) VLSI chips

(4) Vacuum Tubes

(5) None of these


Answer :4


117.

The Virtual Memory is
located logically :

(1) in the CPU

(2) in main memory

(3) in between CPU and primary memory

(4) in the Hard disk

(5) None of these


Answer :2


118.

A software used to convert

source program

instructions to object
instruction

is known as :

(1) Compiler

(2)
Assembler

(3) Interpreter

(4) Language processor

(5) None of these


Answer :4


119.

The subject of cybernetics deals with the science of :

(1) Genetics

(2) Control and communications

(3) Molecular biology

(4) Biochemistry

(5) None of these


Answer :2


120.

WAIS stands for :

(1) Wide Area Intellectual Service

(2) Web

Access Information

system

(3) World wide Application of Intelligent System

(4) Wide Area Information Service

(5) None of these


Answer :4

121.

Correcting errors in

a program

is referred to as………

(1) debugging

(2) bugging

(3) rectifying

(4) modifying

(5) None of these


Answer: 1


122.

Which type of processing speed measurement is used primarily
with

supercomputers?

(1) Flops

(2) Fractions of second

(3) Gigahertz

(4) MIPS

(5) None of these


Answer:

1



123.

What is the term

associated with the second part of an e
-
mail
address?

(1) Local address

(2) Eight characters long

(3) User name

(4) Domain name

(5) None of these


Answer: 4


124.

Bold,

Italic, Regular are known as :

(1)

font styles

(2) font
effects

(3)

word art

(4)

text effects

(5) None of these


Answer: 1



125.

This is a group of servers that share work and may be able to back
each other

up if one server fails.

(1) Channel bank

(2) Cluster

(3) Tiger team

(4) Serverless backup

(5) Logical
unit


Answer: 2


126.

Smart Card is :

(1) Special purpose Cards

(2) Microprocessor Cards

(3) Processing unit contains memory for storing data

(4) Processing unit for software handling

(5) None of these


Answer: 2


127.

A screen element of

MS Word

that is
usually located below the title
bar that

provides categorized options is :

(1) Menu mar

(2) Tool Bar

(3) Status Bar

(4) All of the above

(5) None of these


Answer: 1


128.

Which keys can be used together with other keys for special tasks ?

(1) Insert, Dele
te

(2) Ctrl, Shift

(3) Left Arrow, Right Arrow

(4) Page up, Page Down

(5) None of these


Answer: 2


129.

Data related crime does not incorporate :

(1) Data Didling

(2) Data Spying

(3) Data Leakage

(4) Data Mining

(5) None of these


Answer: 4


130.

‘DOS’
floppy disk does not have :

(1) A Boot Record

(2) A

File Allocation

Table

(3) A Root Directory

(4) Virtual Memory

(5) None of these


Answer: 4


131.

A disk on which you store information………

(1) plate

(2) data disk

(3) paper disk

(4) TV disk

(5) None of the
se


Answer: 2


132.

Lets you leave a screen or program……

(1) boot

(2) programs

(3) exit

(4) text

(5) None of these


Answer: 3


133.

The operating system does all of the following EXCEPT:

(1) provide a way for the user to interact with the computer.

(2)
manage the central processing unit (CPU).

(3) manage memory and storage.

(4) enable users to perform a specific task such as document editing.

(5) None of these


Answer: 4


134.

MS
-
DOS is a ……… operating system.

(1) point
-
and
-
click

(2) user
-
friendly

(3)
command
-
driven

(4) Mac

(5) None of these


Answer: 3


135.

Procedures are typically documented in manuals written by :

(1) computer specialists

(2) end users

(3) Microsoft

(4) service providers

(5) None of these

]

Answer: 1


136.

What deletes the entire
file except

the file

structure ?

(1) ERASE

(2) DELETE

(3) ZAP

(4) PACK

(5) None of these


Answer: 3


137.

……… takes one line, checks it for errors and then executes it.

(1) Assembler

(2) Interpreter

(3) Loader

(4) Complier

(5) None of these


Answer: 2


138
.

Artificial Intelligence is associated with which generation?

(1) First Generation

(2) Second Generation

(3) Third Generation

(4)

Fifth Generation

(5) Sixth Generation


Answer: 4


139.

Time during which a job is processed by the computer is :

(1) Delay
times

(2) Real time

(3) Execution time

(4) Down time

(5) None of these


Answer: 3


140.

Which of the following is not an input device?

(1) OCR

(2) Optical scanners

(3) Voice recognition device

(4) COM (Computer Output to

Microfilm)

(5) None of these


Answe
r: 4

141.

In latest generation computers, the instructions are executed :

(1) Parallel only

(2) Sequentially only

(3) Both sequentially and parallel

(4) All of above

(5) None of these


Answer: 3


142.

A technique used by codes to convert an analog signal
into a digital
bit

stream is known as :

(1) Pulse code modulation

(2) Pulse stretcher

(3) Query processing

(4) Queue management

(5) None of these


Answer: 1


143.

The number of bits that can be transmitted over a network in a
certain

period of time:

(1) La
tency

(2) Delay

(3) Bandwidth

(4) Baud

(5) None of these


Answer: 3


144.

Linux partitions are created using

the file

system:

(1) FAT

(2) FAT32

(3) EXT3

(4) NTFS

(5) None of these


Answer: 3


145.

Which of the following data structure is widely used in a
network
model

RDBMS?

(1) Arrays

(2) trees

(3) graphs

(4) stacks

(5) None of these


Answer: 3


146.

The scientist who developed the idea of the WWW is :

(1) James Gosling

(2) Tim Berns Lee

(3) Andrew Tannenbaum

(4) Linus Torvalds

(5) Bill Gates


Answer: 2


147.

What was the data transmission method in which bi
-
directional data
flow is

allowed?

(1) Simplex

(2) Duplex

(3) Analog

(4) Single side mode

(5) None of these


Answer: 2


148.

To check

the presence of a computer in the network, use the
command:

(1) ping

(2) cmd

(3) check

(4) ipconfig

(5) connect


Answer: 1


149.

The word processing task associated with changing the appearance of
a

document is :

(1) Editing

(2) Writing

(3) Formatting

(4) All of above

(5) None of these


Answer: 3


150.

Easy to use……

(1)
user friendly

(2) select

(3) helpful

(4) ever
-
ready

(5) None of these


Answer: 1


151.

Commands at the top of a screen such as : FILE
-
EDIT
-
FONT
-
TOOLS
to operate

and change things within programs……

(1) menu bar

(2) tool bar

(3) user friendly

(4) word
processor

(5) None of these


Answer: 1


152.

Anything written on the screen ……

(1) cursor

(2) text

(3) folder

(4) boot

(5) None of these


Answer: 2


153.

Which of the following is not the major function of a computer ?

(1) Processing data into information

(2) Storing data or information

(3)

Gathering data

(4) Analysing data or information

(5) None of these


Answer: 4


154.

A method of executing two or more programs concurrently using the
same

computer describe:

(1) multi processing

(2)

multiprogramming

(3)
virtual processing

(4) time sharing

(5) None of these


Answer: 2


155.

When you save to ……… your data will remain intact even when
thecomputer is turned off.

(1) RAM

(2) motherboard

(3)

secondary storage device

(4)

primary storage device

(5) None of these


Answer: 3


156.

A one
-
time password is :

(1) one that changes every time it is used

(2) one that is assigned once and not changed at all.

(3) one that can be used only at a particular time of the day

(4) one that is assigned for all session that starts at

a particular time

(5) None of these


Answer: 1


157.

A hardware interface that allows for the connection of several
peripheral

devices to a single PCI board.

(1) SCSI

(2) SATA

(3) ATA

(4) PCI

(5) None of these


Answer: 1


158.

is a language, instead of using numbers; programmers began
usingEnglish like abbreviations (Mnemonics) to represent
the

elementaryoperations.

(1) Machine language

(2)

Mnemonics

language

(3) Assembly level language

(4) High level language

(5) None of t
he these


Answer: 3


159.

Encryption decryption are functions of :

(1) Transport layer

(2) Session layer

(3) Presentation layer

(4) All of the above

(5) None of these


Answer: 2


160.

The process of building a model that demonstrate the features of a
proposed

product, service or system is called a :

(1) JAD

(2) RAD

(3) templating

(4) prototyping

(5) TAD


Answer: 4

161.

Memory, also called random access memory, or RAM……….

(1) contains the electronic circuits that cause processing to occur

(2) makes the
information resulting from processing available for use

(3) allows data, programs, commands, and user responses to be entered
into a computer

(4) consists of electronic components that store data

(5) None of these


Answer: 4


162.

A ……… represent approxima
tely one billion memory locations.

(1)

kilobyte

(2) megabyte

(3) gigabyte

(4)

terabyte

(5) None of these


Answer: 3


163.

An interrupt handler is a(n):

(1) location in memory that keeps track of recently generated interrupts.

(2) peripheral device.

(3)
utility program.

(4) special numeric code that indicates the priority of a request

(5) None of these


Answer: 4


164.

All of the following are steps involved in the boot process EXCEPT:

(1) load the operating system into RAM.

(2) the power
-
on self
-
test.

(3
) activate the basic input/output system (BIOS).

(4) load

application

programs.

(5) None of these


Answer: 4


165.

A port that allows 8 bits at a time to be transmitted simultaneously is
a(n)

……….

(1) dedicated port

(2)

parallel port

(3) SCSI port

(4) USB
port

(5) None of these


Answer: 2


166.

Which of these terms refers to the feature of an OS that allows a
single

computer to process the tasks of several users at different stations,
in round
-
robin fashion?

(1) Multiprocessing

(2) Multiprogramming

(3)
Multitasking

(4) Time processing

(5) Time
-
sharing


Answer: 5


167.

A program

which helps create written documents and lets you go back
and

make corrections as necessary……

(1) spreadsheet

(2) personal writer

(3) word printer

(4) word processor

(5) None of
these


Answer: 4


168.

Screen that comes on when you turn on your computer that shows all
the

icons……

(1) desktop

(2) face to face

(3) viewer

(4) view space

(5) None of these


Answer: 1


169.

A place that a user can create to store files……

(1) cursor

(2)
text

(3) folder

(4) boot

(5) None of these


Answer: 3


170.

Electronic pens

are used with the mouse to write on a slide in which
view?

(1) Master

(2)

Slide Sorter

(3) Slide Show

(4) Normal

(5) Print preview


Answer: 3


171.

When you insert a picture and ad
just the height, Word automatically
adjusts

the ……… to maintain the correct proportion.

(1) pixel size

(2) resolution

(3) screen size

(4) width

(5) None of these


Answer: 4


172.

Which of the following is

NOT

one of the steps in the machine cycle?

(1)
Execute

(2) Store

(3) Decode

(4) Pipelining

(5) None of these


Answer: 4


173.

How many peripheral devices can be connected to a single SCSI
port?

(1) 1

(2) 8

(3) 16

(4) 32

(5) 64


Answer: 2


174.

The four
-
step process of fetch, decode, execute, and store
is called
a(n):

(1) machine cycle

(2) instruction cycle

(3) arithmetic operation

(4) logical operation

(5) None of these


Answer: 1


175.

All of the following are

TRUE

regarding virtual memory EXCEPT :

(1) any amount of RAM can be allocated to virtual
memory.

(2) the setting for the amount of hard drive space to allocate to virtual
memory can be

manually

changed.

(3) this temporary storage is called the swap file or page file.

(4) virtual memory is physical space on the hard drive.

(5) None of these


An
swer: 1


176.

The operating system is the most common type of ……… software.

(1) communication

(2)

application

(3) system

(4) word
-
processing

(5) None of these


Answer: 3



177.

The human
-
readable version of

a program

is called ………

(1)

source code

(2) progr
am code

(3) human code

(4) system code

(5) None of these


Answer: 4


178.

Data are ……… in client/server computing.

(1) never sent to the client machine

(2) sent in very large sections to save processing time

(3) sent only upon the client’s request

(4) sent

in complete copies for the client to filter and sort

(5) sent from the client to the server for processing


Answer: 3


179.

The total set of interlinked hypertext documents worldwide is :

(1) HTT

(2) Browser

(3) WWW

(4) B2B

(5) None of these


Answer: 3


1
80.

Which of the following is not one of the three ‘Mail Merge Helper’
steps?

(1) Merge the two files

(2) Create the main document

(3) Set the mailing list parameters

(4) Create the data source

(5) None of
these



Answer: 3

181.

Which is the part of a computer that one can touch and feel ?

(1) Programs

(2) Software

(3) Hardware

(4) Output

(5) None of these


Answer: 3


182.

A command to get a file you work
ed on from the memory where it
was

stored……

(1) close

(2) delete

(3) open

(4) get it

(5) None of these


Answer: 3


183.

There are several security devices used to stop individuals from
exploiting

your system. Which of the following is used in conjunction w
ith a
firewall?

(1) Proxy server

(2) Intrusion
-
detection system

(3)

Terminal server

(4) Web server

(5) None of these


Answer: 1

184.

Array is ………

(1) Linear data structure

(2) non
-
linear data structure

(3) simple data structure

(4) complex data structure

(5) None of these


Answer: 1


185.

A

computer checks

the ……… of user names and passwords for a
match

before granting access.

(1) website

(2) network

(3) backup file

(4) database

(5) None of these


Answer: 4


186.

Which of the following is the

latest versio
n

of

MS Word?

(1) Word 2000

(2) Word 2007

(3) Word 2010

(4) Word 2011

(5) Word 2012


Answer: 3


187.

In the online world of electronic commerce, what do the initials CEM
stands

for ?

(1) Costly E
-
Commerce Marketing

(2)

Customer Experience Management

(3)
Customer Experience Misleading

(4) Cost Estimates are Mind Boggling

(5) None of these


Answer: 2

188.

What type of program controls the various computer parts and allows
the

user interact with the computer ?

(1) Utility software

(2) Operating system

(3)

Wo
rd processing software

(4)

Database program

(5) None of these


Answer: 1


189.

Which of the following transmission systems provide the highest data
rate to

in individual device?

(1) computer bus

(2) telephone lines

(3) voice and mode

(4) lease lines


Answer: 1


190.

The combination of the operating system and the processor is referred
to as

the computer’s:

(1) CPU

(2) platform

(3) BIOS

(4) CMOS

(5) None of these


Answer: 2


191.

The operating system allows users to organize the computer’s
contents in a

hierarchical structure of directories that include all of the
following EXCEPT:

(1) files

(2) folders

(3) drives

(4) systems

(5) None of these

Answer: 4


192.

Leaves of which of the following trees are at the same level ?

(1) Binary tree

(2) B
-
tree

(3) AV
L
-
tree

(4) Expression tree

(5) None of these


Answer: 2


193.

The transformation of a message into an encoded form is known as :

(1) Mnemonics

(2) Encoding

(3) Encryption

(4) Decoding

(5) None of these


Answer: 2


194.

Firewalls are used to protect
against………

(1) Unauthorized Attacks

(2) Virus Attacks

(3) Data Driven Attacks

(4) Fire Attacks

(5) All of these


Answer: 1


195.

Auto correct was originally designed to replace ……… words as you
type.

(1) Short, repetitive

(2) Grammatically incorrect

(3) Mi
sspelled

(4) Half

(5) None of these


Answer: 3


196.

Ensuring that the essential peripheral devices are attached and
operational is

the ……… process.

(1) configuration

(2) CMOS

(3) POST

(4) ROM

(5) check


Answer: 3


197.

The unique signal, generated by a
device, that tells the operating
system that

it is in need of immediate attention is called an:

(1) action

(2) event.

(3) interrupt

(4) activity

(5) None of these


Answer: 3


198.

Before a package can be used in a java program it must be ………

(1) executed

(2) referenced

(3) imported

(4)

declared

(5) None of these


Answer: 3


199.

The definition of thrashing is:

(1) swapping data between virtual memory and RAM too frequently.

(2) insufficient hard disk space.

(3) too many processors being managed by the
operating system.

(4) inaccurate information stored in the registry

(5) None of these


Answer: 1


200.

The primary device that a computer uses to store information……

(1) register

(2) storehouse

(3) desk

(4) hard drive

(5) None of these


Answer: 4

20
1. Whic
h of the following is a disadvantage of machine language?

1) Machine Dependent

2) Slower Execution

3) Machine Independent

4) It requires

Translation

5) None of these


Answer: 1


202. Android Operating system is an example of which kind of Source
Model?

1)
Open Source

2) Vertical Market Software

3) Horizontal Market Software

4) Shareware

5) None of these


Answer:1


203. Cache memory is an example of which of the following?

1) Virtual Memory

2) Non Volatile Memory

3) Static Random Access Memory

4) Secondary M
emory

5) None of these


Answer:3


204. A software that is not protected by copyright or trademark is ......

1) Vertical Market Software

2) Public Domain Software

3) Shareware Software

4) Trialware

5) Adware


Answer:2


205. Which of the following
programming languages is associated with
Artificial

Intelligence?

1) C

2) B

3) C++

4) JAVA

5) PROLOG


Answer:5


206.

AltaVista

is a(n)

1)

Windows Utility

2) Search engine

3) Program

4) Antivirus

5) None of these


Answer:2


207. The term Hard copy is
related to:

1) Storing data on Hard Disk

2) Output displayed on Monitor

3) Scanned Image

4) Printouts

5) None of the above


Answer:4


208. MIME is an acronym for ....

1)

Multiprogramming

Internet Mail Extension

2) Multicasting Internet Mail Extension

3) Mu
ltiple Internet Mail Extension

4) Multipurpose Internet Mail Extension

5) None of these


Answer: 4


209. Any crime that involves a Computer and a Network is called:

1) Virus

2) Malware

3) Trojan Horse

4) Cyber crime

5) Identity Theft


Answer: 4


210. Which

of the following generation computers is referred to an
expert

system?

1) 2nd

2) 1st

3) 4th

4) 3rd

5) 5
th


Answer: 5



211). ......... is a set of instructions.

1) Hardware

2) Code

3) Language

4) Program

5) All the above


Answer: 4


212. Which of the foll
owing is the keyboard short
-
cut for permanent
deletion of a

file/folder in windows?

1) Del.

2) Shift + Del.

3) Ctrl + Del.

4) Alt + Enter

5) None of these


Answer: 2


213. Which of the following is an

Object Oriented ProgrammingLanguage?

1) C

2) Java

3) C+
+

4) Both 2 and 3

5) Both 1 and 2


Answer: 4


214. The popular name for “Information Super Highway” is:

1) Intranet

2) Extranet

3) Virtual

Private Network

4) MAN

5) Internet


Answer: 5


215. Encryption is primarily used in:

1)

Computer Processing

2) File r
etention

3) Data communication

4) Data Storage

5) None of these


Answer: 3


216. The main folder on a storage device is called .....

1) Root directory

2) Interface

3) Device driver

4) Platform

5) Main directory


Answer: 1


217. To protect the computer from

hacker intrusions, ..... must be installed.

1) Firewall

2) Mailer

3) Script

4) Yahoo

Messenger

5) None of these


Answer: 1


218. Which of the following is used to read handwritten or printed text to
make a

digital image that is stored in memory?

1)
Printer

2) Laser beam

3) Scanner

4) Touchpad

5) None of these


Answer: 3


219.

A program

designed to destroy data on the computer which can travel
to

infect other computers is called a .....

1) Hurricane

2) Infector

3) Disease

4) Virus

5) None


Answer: 4


220. Thesaurus option is available in ..... menu.

1) Page layout

2) References

3) Review

4) View

5) Layout


Answer: 3

221.

Blu
-
Ray disk

is an example of a(n) ....

1) Hard disk

2) Magnetic Disk

3)

Optical Disk

4) Output Device

5) None of these


Answer:3


22
2. Which of the following is true about Name box?

1) It appears at the left of the

formula bar

2) It appears below the menu bar

3) It shows the locations of the active cell.

4) Both 1 and 3

5) Both 2 and 3


Answer:4


223. Which of the following is known as

non volatile memory?

1) Hard Disk

2) Floppy Disk

3) CD
-
ROM

4) DVD
-
ROM

5) All the above


Answer: 5


224. Auto correct function option is present in ..... menu of

MS Word.

1) View

2) Insert

3) Format

4) Tools

5) Table


Answer: 4


225. Which of the following

is another name for pre
-
programmed formula
in

Excel?

1) Range

2) Graph

3) Function

4) Cell

5) None of these


Answer: 3


226. ALU works on the instructions held in .......

1) Notebook

2) Registers

3) Notepad

4) Clipboard

5) I/O Devices


Answer: 2


227. To
see the document before the printout is taken, use .......

1)

Insert Table

2) Paste

3) Format Painter

4) Cut

5) Print Preview


Answer: 5


228. .... helps create, manipulate and analyze data arranged in rows and
columns?

1)

Application

Package

2) Word
Processing Package

3) Outlining Package

4) Outline Processors

5) Spreadsheet Package


Answer: 5


229. A register that keeps track of the next instruction to be executed is
called

a(n):

1) Data Register

2) Instruction Register

3) Action Register

4) Program
Counter

5) None of these


Answer: 2


230. Which of the following is the feature that keeps track of the right
margin?

1) Find and Replace

2) Dragged Right

3) Ruler

4) Right Justified

5) Left Justified


Answer: 4



231. A network which connects cities or st
ates is known as:

1) LAN

2) CAN

3) PAN

4) VPN

5) MAN


Answer: 5


232. Which of the following allows you to insert graphics into a word
document?

1) Callouts

2) Flowcharts

3) Basic Shapes

4) All of the above

5) None of these


Answer: 4


233. An email
address consists of:

1) Domain name 2) User name

3) Username followed by password

4) Domain name followed by user name

5) Username followed by domain name


Answer: 5


234. ERP is an acronym for:

1) Enterprise Retirement Planning

2) Enterprise Relationship
Planning

3) Enterprise Resource Planning

4) Enterprise Reorder Planning

5) None of these



Answer: 3


235. ...... is the storage area for e
-
mails.

1) Folder

2) Mail box

3) Directory

4) Hard Disk

5) None of these


Answer: 2


236. Three types of Compact disk
s include CD
-
ROM, CD
-
R and ......

1) CD
-
W

2) CD
-
RAM

3) CD
-
DVD

4) CD
-
RW

5) None of these


Answer: 4


237. Collecting personal information and effectively posing as another
individual

is known as:

1) Spooling

2) Spoofing

3) Hacking

4) Identity Theft

5) None
of these


Answer: 2


238. Which of the following controls the manner of interaction between the
user

and the operating system?

1)

Language Translator

2) Platform

3) User Interface

4) Icon

5) None of these


Answer: 3


239. Which of the following best define
s Embedded system?

1)

A program

that comes wrapped in a box

2)

A program

that is permanent part of a computer

3) A computer that is a part of a larger computer

4) A

computer and software

system that controls a machine

5) None of these


Answer: 4


240. The


.......... Settings are automatic and standard.

1) Default

2) CPU

3) Peripheral

4) User
-
friendly

5) None of these


Answer: 1

241. Which of the following power point view displays each slide of
thepresentation as a thumbnail and is useful for rearranging s
lides?

1) Slide show

2)

Slide master

3)

Slide sorter

4) Notes Page

5) Design Slide



Answer: 3


242. A set of rules for telling the

computer what

operations to perform is /
are

called:

1) Structures

2) Procedural Language

3) Command Language

4) Natural Lan
guage

5) Programming Language


Answer: 5


243. Devices that enter information and let you communicate with the
computer

are called:

1) Software

2) Hardware

3) Output Devices

4) Input / Output devices

5) Input Devices


Answer: 5


244. The speed of which of
the following memory chips is faster?

1) Not Fixed

2) DRAM

3) SRAM

4) For smaller chips SRAM is faster

5) For larger chips DRAM is faster


Answer: 3


245. Mahesh Babu has his cute childhood photos in an album which might
fade

out in a couple of years,
which he wants to show it to his fans by
uploading it in

his twitter account. Which of the following devices can he
use to do that?

1) Keyboard

2) Mouse

3) Printer

4) Scanner

5) None of these


Answer: 4


246. Which of the following is not a social networki
ng site?

1) WAYN

2) Hi 5

3) Orkut

4) Yahoo

5) Facebook


Answer: 4


247. In the URL https://twitter.com, what does 's' represent in 'https'?

1) Safe

2) System

3) Start
-
up

4) Semantic

5) Secured


Answer: 5

24
8. Which among the following is

the file

extension

for Word Documents?

1) .xls

2) .ppt

3) .docx

4) .worddoc

5) None


Answer: 3


249. Linux Operating system is an example of which of the following?

1) Freeware

2) Open Source Software

3) Shareware

4) Complimentary

5) None of these


Answer: 2


250. A device
that connects to a network without the use of a cable is said
to be:

1) Distributed

2) Non
-
Wired

3) Centralised

4) Open source

5) Wireless


Answer: 5


251. Which of the following software applications would be most
appropriate for

performing Statistical
and Numerical calculations:

1) Document Processor

2) Graphics Package II

3) Power Point

4) Spreadsheet

5) Meta Processor


Answer: 4


252. Removing and replacing devices without turning off the computer is
referred

to as:

1) Search Engines

2) Operating Syst
em

3) Software

4) Resource Locators

5) Plug
-
n
-
Play


Answer: 5


253. Mr. Prashanth has a song sung by him on

the desktop, in the C drive,
and

also in the D drive. This scenario in computer language is generally
referred to as:

1) Data Redundancy

2) Multiple

Data Places

3) Various File Places

4) Data Inconsistency

5) Data Independent


Answer: 1


254. What is a Firewall?

1) A wall to protect against Fire

2) A software to protect from computer hacker intrusions

3) A software to destroy computer

4) A wall to mak
e partitions in computer

5) None of these


Answer: 2


255. Chiranjeevi sent a mail to Pavan Kalyan by putting his email address
in 'Cc'

and to Nagababu by putting his email address in 'Bcc'. Which of the
following is

true based on the given scenario?

1) Pa
van Kalyan can view the email address of Chiranjeevi and Nagababu

2) Nagababu can view the email address of Pavan Kalyan & Chiranjeevi

3) Pavan Kalyan can view the email address of Nagababu only

4) Both 1 and 2

5) None of them is true


Answer: 2


256. When

data changes in multiple lists and all lists are not updated, this
causes:

1) Data Population Problem

2) Data Reduction

3) Data Induction

4) Data Overload

5) Data Inconsistency


Answer: 5


257. The legal right to use software based on specific restriction
s is granted
via a:

1) Software privacy policy

2)

Software License

3) Software password manager

4) Software log

5) None of these


Answer: 2


258. Which of the following is not an operating system?

1) Windows 2000

2) DOS

3) Windows 7

4)

Mac Os X Lion

5) Goo
gle



Answer: 5


259. Find the Mis
-
Matched pair.

1) Chrome
-

Google

2) Opera
-

Opera Software

3) Internet Explorer
-

Microsoft

4) Safari
-

Net Scape Communications

5) None of these


Answer: 4


260. What is the full form of RISC?

1) Reduced Instruction Set
Computing

2) Reformed Instruction System Computing

3) Reduced Information System Computing

4) Restoration of Information in System Computing

5) Reduced Instruction Sect Code


Answer: 1

Demodulator

is:

1) Modem

2) Joiner

3) Networker

4)

Connecter

5) Mom
-
dom


Answer: 1


262. In order to delete a sentence from a document you would use .......

1) Highlight and copy

2)

Cut and Paste

3) Copy and Paste

4) Highlight and Delete

5) Select and Paste


Answer: 4


263. What is the keyboard shortcut for Slide Show in
Powerpoint ? :

1) F4

2) F8

3) F9

4) F5

5) F12


Answer: 4


264. A ...... is a design tool that graphically shows the logic in a solution
algorithm.

1) Flow chart

2) Hierarchy Chart

3) Structure Chart

4)

Context Diagram

5) None


Answer: 1


265. The justifica
tion that aligns text on both margins of a document in
Word is

......

1) Justify

2) Bold

3) Centre

4) Right

5) Balanced


Answer: 1


266. The Open, Print and Save Buttons are all located on the ......

1) Status Bar

2) Formatting Toolbar

3) Standard Toolbar

4) Titlebar

5) Status and Title bars


Answer: 3


267. SMPS in a

computer stands

for?

1) Switched
-
Mode Power Supply

2) Simple
-
Mode Power Supply

3) Simple
-
Mode Power System

4) Switched
-
Menu Power Supply

5) None of these


Answer: 1


268. The process of transf
orming information using an algorithm to make
it

unreadable by anyone is usually referred to as:

1) Decryption

2) Encryption

3) Alphabet Coding

4) Encrography

5) Deptography


Answer: 2


269. ..... is a type of RAM that stores each bit of data in a separate

capacitor

within an integrated circuit making it an efficient way to store data
in memory.

1) DRAM

2) PRAM

3) NRAM

4) NORAM

5) None


Answer: 1


270. A computer network that uses Internet protocol technology to
shareinformation, Operational system, within
an organization is usually
referred to as


1) Internet

2) MAN

3) PAN

4) NPN

5) Intranet

Answer: 5


271. What is the symbol for attachments in yahoo mail?

1) Envelope

2) Letter A

3)

Paper Clip

4) Pen

5) None


Answer: 3


272. Which of the following computers

is used in Scientific researches?

1) Super Computers

2) Main Frame

3) Laptop

4)

Micro Computers

5) None of these


Answer: 1


273. Winzip is an example of :

1) Free ware

2) Shareware

3) Open Source

4) Vertical Market Software

5) None


Answer: 1


274. .....
...... is the science that attempts to produce machines that display
the

same type of intelligence that humans do

1) Nanoscience

2) Nanotechnology

3) Simulation

4) Artificial intelligence (AI)

5) None


Answer: 4



275. COBOL is an acronym for .............

1) Common Business Oriented Language

2)

Computer Business

Oriented Language

3) Common Business Operated Language

4) Common Business Organized Language

5) None of these


Answer: 1


276. The human readable version of a software program is called:

1) cache

2)

instruction

set

3)

source code

4) word size

5) None of these


Answer: 3


277. Which of the following is not a programming language with Object
Oriented

Features?

1) COBRA

2) ABAP

3) C++

4) C#

5) C


Answer: 5


278. Which of the following programming lang
uage is favoured for
Artificial

Intelligence?

1) ABAP

2) COBOL

3) LISP

4) JAVA

5) C#


Answer: 3


279. The quickest and easiest way in Word, to locate a particular word or
phrase

in a document

1) Replace

2) Find

3) Lookup

4) Search

5) None of these


Answer:

2


280. What symbol is present on the number key '2' on the keyboard?

1) !

2) %

3) ^

4) @

5) *


Answer: 4

281. A digital communication system capable of interconnecting, a large
number

of computers, terminals and other peripheral devices within a
limited

geographical area is called


1. LAN

2. WAN

3. Internet

4. All of the above

5. None of these


Answer:


1


282. A

secondary storage device

that uses a long plastic strip coated with
a

magnetic material as a recording medium is


1. Magnetic tape

2. Compact di
sk

3. Hard disk

4. All of the above

5. None of these


Answer:


1


283. An E
-
mail protocol for storage, manage
-
ment and change, especially
in

corporate offices


1. Message handling service

2. Postal service’s

3. Data storage

4. All of the above

5. None of
these


Answer:


1

284. Which of the following is an advantage of stored programs?

1. Reliability

2. Reduction in operation costs

3. The computers becoming general
-
purpose

4. All of the above

5. None of these


Answer:


1


285. Which of the following is
not true for primary storage?

1. It is a part of the CPU

2. It allows very fast access of data

3. It is relatively more expensive then other storage devices.

4. Can be removed and transported.

5. All of the above


Answer:


1


286. Function of control unit

in the CPU is


1. To decode program instructions

2. To

transfer

data to primary storage

3. To perform logical operations

4. To store program instructions

5. All of the above


Answer:


4


287. Electronic spreadsheets are useful in situation where relative
ly ..........
data

must be input

1. Small

2. Large

3. No

4. All of the above

5. None is true


Answer:


1


288. A list of options from which

a program

user can select anyone in order
to

perform a desired action is referred as


1. Menu

2. Index

3. Directory

4. All of the above

5. None of these


Answer:


2


289. A method whereby messages to be transmitted between computers
are all

sent to a central computer, which gathers them androutes

them to
the

appropriate destination(s) is known as


1.

Message switching

2. Message delete

3. Message accept

4. All of the above

5. None of these


Answer:


1


290. Which of the following

describe

one or more characteristics of a
modem

computer?

1. An electronic device

2. A mechanical device

3. A electro
-
mechanical device

4. A
ll of the above

5. None of these


Answer:


1


291. Combining records from two or more ordered files into a single
ordered file

is called


1. Menu

2. Merging

3. Taking

4. All of the above

5. None of these


Answer:


1


292. The ascending order of a data hi
erarchy is

1. Bit
-
byte
-
record
-
field
-
file
-
database

2. Byte
-
bit
-
field
-
record
-
file
-
database

3. Byte
-
bit
-
record
-
file
-
field
-
database

4. Bit
-
byte
-
field
-
record
-
file
-
database

5. All of the above



Answer:


2


293. A LSI chip contains the entire CPU of computer ex
cept main memory
is

called


1. Microprocessor

2. Hard disk

3. Input device

4. Output device

5. All of the above


Answer:


4


294. A storage medium that loses its contents in the event of power failure
is

called


1. Volatile storage

2. Non volatile storage

3. Permanent storage

4. All of the above

5. None of these


Answer:


1


295. One
-
millionth of a second is referred as


1. Microsecond

2. Millisecond

3. Hour

4. Minute

5. All of the above


Answer:


1


296. Alternate facilities of programs,

data files, har
dware equipments, etc.
used in

case the original one is destroyed, lost, or fail to operate is


1. Backup

2. Forehead

3. Delete

4. All of the above

5. None of these


Answer:


1


297. One
-
thousandth of a second is called


1. Microsecond

2. Millisecond

3. H
our 4. Minute

5. All of the above


Answer:


1


298. The CPU (central processing unit) consists of

1. Input, output, and processing

2. Control unit, primary storage, and

secondary

storage

3. Control unit, arithmetic
-
logic unit, and primary storage

4. All o
f the above

5. None of these


Answer:


2


299. The product of data processing is


1. Data

2. Information

3. Software