Which of the following is a disadvantage of
machine language?
1) Machine Dependent
2) Slower Execution
3) Machine Independent
4) It requires Translation
5) None of these
2. Android Operating system is an example of which kind of Source Model?
1) Open Source
2) Vertical Market Software
3) Horizontal Market Software
4) Shareware
5) None of these
3. Cache memory is an example of which of the following?
1) Virtual Memory
2) Non Volatile Memory
3) Static Random Access Memory
4) Secondary Memory
5) None of these
4. A software that is not protected by copyright or trademark is ......
1) Vertical Market Software
2) Public Domain Software
3) Shareware Software
4) Trialware
5) Adware
5. Which of the following programming languages is associated with Artificial Intelligence?
1) C
2) B
3) C++
4) JAVA
5) PROLOG
6. AltaVista is a(n)
1) Windows Utility
2) Search engine
3) Program
4) Antivirus
5) None of these
7. The term Hard copy is related to:
1) Storing data on Hard Disk
2) Output displayed on Monitor
3) Scanned Image
4) Printouts
5) None of the above
8. MIME is an acronym for ....
1) Multiprogramming Internet Mail Extension
2) Multicasting Internet Mail Extension
3) Multiple Internet Mail Extension
4) Multipurpose Internet Mail Extension
5) None of these
9. Any crime that involves a Computer and a Network is called:
1) Virus
2) Malware
3) Trojan Horse
4) Cyber crime
5) Identity Theft
10. Which of the following generation computers is referred to an expert system?
1) 2nd
2) 1st
3) 4th
4) 3rd
5) 5th
11. ......... is a set of instructions.
1) Hardware
2) Code
3) Language
4) Program
5) All the above
12. Which of the following is the keyboard short-cut for permanent deletion of a file/folder in windows?
1) Del.
2) Shift + Del.
3) Ctrl + Del.
4) Alt + Enter
5) None of these
13. Which of the following is an Object Oriented Programming Language?
1) C
2) Java
3) C++
4) Both 2 and 3
5) Both 1 and 2
14. The popular name for “Information Super Highway” is:
1) Intranet
2) Extranet
3) Virtual Private Network
4) MAN
5) Internet
15. Encryption is primarily used in:
1) Computer Processing
2) File retention
3) Data communication
4) Data Storage
5) None of these
16. The main folder on a storage device is called .....
1) Root directory
2) Interface
3) Device driver
4) Platform
5) Main directory
17. To protect the computer from hacker intrusions, ..... must be installed.
1) Firewall
2) Mailer
3) Script
4) Yahoo Messenger
5) None of these
18. Which of the following is used to read handwritten or printed text to make a digital image that is stored in memory?
1) Printer
2) Laser beam
3) Scanner
4) Touchpad
5) None of these
19. A program designed to destroy data on the computer which can travel to infect other computers is called a .....
1) Hurricane
2) Infector
3) Disease
4) Virus
5) None
20. Thesaurus option is available in ..... menu.
1) Page layout
2) References
3) Review
4) View
5) Layout
21. Blu-Ray disk is an example of a(n) ....
1) Hard disk
2) Magnetic Disk
3) Optical Disk
4) Output Device
5) None of these
22. Which of the following is true about Name box?
1) It appears at the left of the formula bar
2) It appears below the menu bar
3) It shows the locations of the active cell.
4) Both 1 and 3
5) Both 2 and 3
23. Which of the following is known as non volatile memory?
1) Hard Disk
2) Floppy Disk
3) CD-ROM
4) DVD-ROM
5) All the above
24. Auto correct function option is present in ..... menu of MS Word.
1) View
2) Insert
3) Format
4) Tools
5) Table
25. Which of the following is another name for pre-programmed formula in Excel?
1) Range
2) Graph
3) Function
4) Cell
5) None of these
26. ALU works on the instructions held in .......
1) Notebook
2) Registers
3) Notepad
4) Clipboard
5) I/O Devices
27. To see the document before the printout is taken, use .......
1) Insert Table
2) Paste
3) Format Painter
4) Cut
5) Print Preview
28. .... helps create, manipulate and analyze data arranged in rows and columns?
1) Application Package
2) Word Processing Package
3) Outlining Package
4) Outline Processors
5) Spreadsheet Package
29. A register that keeps track of the next instruction to be executed is called a(n):
1) Data Register
2) Instruction Register
3) Action Register
4) Program Counter
5) None of these
30. Which of the following is the feature that keeps track of the right margin?
1) Find and Replace
2) Dragged Right
3) Ruler
4) Right Justified
5) Left Justified
31. A network which connects cities or states is known as:
1) LAN
2) CAN
3) PAN
4) VPN
5) MAN
32. Which of the following allows you to insert graphics into a word document?
1) Callouts
2) Flowcharts
3) Basic Shapes
4) All of the above
5) None of these
33. An email address consists of:
1) Domain name 2) User name
3) Username followed by password
4) Domain name followed by user name
5) Username followed by domain name
34. ERP is an acronym for:
1) Enterprise Retirement Planning
2) Enterprise Relationship Planning
3) Enterprise Resource Planning
4) Enterprise Reorder Planning
5) None of these
35. ...... is the storage area for e-mails.
1) Folder
2) Mail box
3) Directory
4) Hard Disk
5) None of these
36. Three types of Compact disks include CD-ROM, CD-R and ......
1) CD-W
2) CD-RAM
3) CD-DVD
4) CD-RW
5) None of these
37. Collecting personal information and effectively posing as another individual is known as:
1) Spooling
2) Spoofing
3) Hacking
4) Identity Theft
5) None of these
38. Which of the following controls the manner of interaction between the user and the operating system?
1) Language Translator
2) Platform
3) User Interface
4) Icon
5) None of these
39. Which of the following best defines Embedded system?
1) A program that comes wrapped in a box
2) A program that is permanent part of a computer
3) A computer that is a part of a larger computer
4) A computer and software system that controls a machine
5) None of these
40. The ........... settings are automatic and standard.
1) Default
2) CPU
3) Peripheral
4) User-friendly
5) None of these
ANSWERS:
1-1; 2-1; 3-3; 4-2; 5-5; 6-2; 7-4; 8-4; 9-4; 10-5;
11-4; 12-2; 13-4; 14-5; 15-3; 16-1; 17-1; 18-3; 19-4; 20-3;
21-3; 22-4; 23-5; 24-4; 25-3; 26-2; 27-5; 28-5; 29-2; 30-4;
31-5; 32-4; 33-5; 34-3; 35-2; 36-4; 37-2; 38-3; 39-4; 40-1
1) Machine Dependent
2) Slower Execution
3) Machine Independent
4) It requires Translation
5) None of these
2. Android Operating system is an example of which kind of Source Model?
1) Open Source
2) Vertical Market Software
3) Horizontal Market Software
4) Shareware
5) None of these
3. Cache memory is an example of which of the following?
1) Virtual Memory
2) Non Volatile Memory
3) Static Random Access Memory
4) Secondary Memory
5) None of these
4. A software that is not protected by copyright or trademark is ......
1) Vertical Market Software
2) Public Domain Software
3) Shareware Software
4) Trialware
5) Adware
5. Which of the following programming languages is associated with Artificial Intelligence?
1) C
2) B
3) C++
4) JAVA
5) PROLOG
6. AltaVista is a(n)
1) Windows Utility
2) Search engine
3) Program
4) Antivirus
5) None of these
7. The term Hard copy is related to:
1) Storing data on Hard Disk
2) Output displayed on Monitor
3) Scanned Image
4) Printouts
5) None of the above
8. MIME is an acronym for ....
1) Multiprogramming Internet Mail Extension
2) Multicasting Internet Mail Extension
3) Multiple Internet Mail Extension
4) Multipurpose Internet Mail Extension
5) None of these
9. Any crime that involves a Computer and a Network is called:
1) Virus
2) Malware
3) Trojan Horse
4) Cyber crime
5) Identity Theft
10. Which of the following generation computers is referred to an expert system?
1) 2nd
2) 1st
3) 4th
4) 3rd
5) 5th
11. ......... is a set of instructions.
1) Hardware
2) Code
3) Language
4) Program
5) All the above
12. Which of the following is the keyboard short-cut for permanent deletion of a file/folder in windows?
1) Del.
2) Shift + Del.
3) Ctrl + Del.
4) Alt + Enter
5) None of these
13. Which of the following is an Object Oriented Programming Language?
1) C
2) Java
3) C++
4) Both 2 and 3
5) Both 1 and 2
14. The popular name for “Information Super Highway” is:
1) Intranet
2) Extranet
3) Virtual Private Network
4) MAN
5) Internet
15. Encryption is primarily used in:
1) Computer Processing
2) File retention
3) Data communication
4) Data Storage
5) None of these
16. The main folder on a storage device is called .....
1) Root directory
2) Interface
3) Device driver
4) Platform
5) Main directory
17. To protect the computer from hacker intrusions, ..... must be installed.
1) Firewall
2) Mailer
3) Script
4) Yahoo Messenger
5) None of these
18. Which of the following is used to read handwritten or printed text to make a digital image that is stored in memory?
1) Printer
2) Laser beam
3) Scanner
4) Touchpad
5) None of these
19. A program designed to destroy data on the computer which can travel to infect other computers is called a .....
1) Hurricane
2) Infector
3) Disease
4) Virus
5) None
20. Thesaurus option is available in ..... menu.
1) Page layout
2) References
3) Review
4) View
5) Layout
21. Blu-Ray disk is an example of a(n) ....
1) Hard disk
2) Magnetic Disk
3) Optical Disk
4) Output Device
5) None of these
22. Which of the following is true about Name box?
1) It appears at the left of the formula bar
2) It appears below the menu bar
3) It shows the locations of the active cell.
4) Both 1 and 3
5) Both 2 and 3
23. Which of the following is known as non volatile memory?
1) Hard Disk
2) Floppy Disk
3) CD-ROM
4) DVD-ROM
5) All the above
24. Auto correct function option is present in ..... menu of MS Word.
1) View
2) Insert
3) Format
4) Tools
5) Table
25. Which of the following is another name for pre-programmed formula in Excel?
1) Range
2) Graph
3) Function
4) Cell
5) None of these
26. ALU works on the instructions held in .......
1) Notebook
2) Registers
3) Notepad
4) Clipboard
5) I/O Devices
27. To see the document before the printout is taken, use .......
1) Insert Table
2) Paste
3) Format Painter
4) Cut
5) Print Preview
28. .... helps create, manipulate and analyze data arranged in rows and columns?
1) Application Package
2) Word Processing Package
3) Outlining Package
4) Outline Processors
5) Spreadsheet Package
29. A register that keeps track of the next instruction to be executed is called a(n):
1) Data Register
2) Instruction Register
3) Action Register
4) Program Counter
5) None of these
30. Which of the following is the feature that keeps track of the right margin?
1) Find and Replace
2) Dragged Right
3) Ruler
4) Right Justified
5) Left Justified
31. A network which connects cities or states is known as:
1) LAN
2) CAN
3) PAN
4) VPN
5) MAN
32. Which of the following allows you to insert graphics into a word document?
1) Callouts
2) Flowcharts
3) Basic Shapes
4) All of the above
5) None of these
33. An email address consists of:
1) Domain name 2) User name
3) Username followed by password
4) Domain name followed by user name
5) Username followed by domain name
34. ERP is an acronym for:
1) Enterprise Retirement Planning
2) Enterprise Relationship Planning
3) Enterprise Resource Planning
4) Enterprise Reorder Planning
5) None of these
35. ...... is the storage area for e-mails.
1) Folder
2) Mail box
3) Directory
4) Hard Disk
5) None of these
36. Three types of Compact disks include CD-ROM, CD-R and ......
1) CD-W
2) CD-RAM
3) CD-DVD
4) CD-RW
5) None of these
37. Collecting personal information and effectively posing as another individual is known as:
1) Spooling
2) Spoofing
3) Hacking
4) Identity Theft
5) None of these
38. Which of the following controls the manner of interaction between the user and the operating system?
1) Language Translator
2) Platform
3) User Interface
4) Icon
5) None of these
39. Which of the following best defines Embedded system?
1) A program that comes wrapped in a box
2) A program that is permanent part of a computer
3) A computer that is a part of a larger computer
4) A computer and software system that controls a machine
5) None of these
40. The ........... settings are automatic and standard.
1) Default
2) CPU
3) Peripheral
4) User-friendly
5) None of these
ANSWERS:
1-1; 2-1; 3-3; 4-2; 5-5; 6-2; 7-4; 8-4; 9-4; 10-5;
11-4; 12-2; 13-4; 14-5; 15-3; 16-1; 17-1; 18-3; 19-4; 20-3;
21-3; 22-4; 23-5; 24-4; 25-3; 26-2; 27-5; 28-5; 29-2; 30-4;
31-5; 32-4; 33-5; 34-3; 35-2; 36-4; 37-2; 38-3; 39-4; 40-1
1. The Title and Page number of a document can be displayed using which of the following
options?
1) Insert table
2) Spelling and Grammar
3) Header and Footer
4) Thesaurus
5) File
2. Which of the following is the advantage of Assembly language over Machine language?
1) Easy to use
2) Easy to understand
3) Easy to modify
4) Only 1 and 3
5) All the above
3. Pop-ups are a form of ..... on the World Wide Web?
1) Instant Messaging
2) Search Engines
3) Browsers
4) Mark-up Languages
5) Online Advertising
4. Which of the following is not used to align text in a document?
1) Left
2) Right
3) Center
4) Diagonal
5) Justify
5. Which of the following characteristics is/are used to compute the results from excel data?
1) Goto
2) Table
3) Diagram
4) Formula and Function
5) None of these
6. ....... is a combination of text, audio, still images, animation, video.
1) Multiplexer
2) Multiplier
3) Multimedia
4) Multiuser
5) None of these
7. Which of the following refers to the process of trading goods over the internet?
1) E-seva
2) E-Trading
3) E-Finance
4) E-Sales
5) E-Commerce
8. Multiple autonomous computers communicating through a computer network to achieve a common goal is called .......
1) Centralized Computing
2) Co-operative Computing
3) Distributed Computing
4) Connected Computing
5) None of these
9. In order to change page margins in a word document:
1) Drag the scroll box on the scroll bars.
2) Delete the margin boundaries on the ruler
3) Right Click on the ruler
4) Drag the margin boundaries on the ruler
5) None of these
10. USB 3.0 is the second major revision of the Universal Serial Bus standard for Computer Connectivity. Which of the following is true about USB 3.0?
1) It is more than 10 times as fast as USB 2.0
2) Its Data transfer rate is up to 5 Gbits/sec
3) Power consumption is less than USB 2.0
4) All the above
5) None of the above
11. MICR is exclusively used in:
1) Libraries
2) Super markets
3) Stock markets
4) Banking Industry
5) None of these
12. A communication system which provides communication in both directions, but not simultaneously is known as:
1) Half-Duplex
2) Full-Duplex
3) Broadcast
4) Only 1 and 2
5) None of these
13. Which of the following uses computers and data communication to transmit data electronically between computers?
1) EDI
2) Physical Media
3) Printing a paper
4) DTE
5) None
14. Which key, when toggled off, causes keyed characters to override existing characters?
1) Delete
2) Insert
3) Page up
4) Page down
5) Down arrow
15. An act of unauthorized copying of computer software is called:
1) Network Piracy
2) License Piracy
3) Plagiarism
4) Software Piracy
5) None of these
16. .... are attempts by individuals to obtain confidential information from the user by falsifying their identity.
1) Phishing Trips
2) Computer Virus
3) Spyware Scams
4) Viruses
5) None of these
17. The default view in Excel is:
1) Work
2) Auto
3) Normal
4) Roman
5) None of these
18. Bus topology is also known as ........
1) Multipoint network
2) Multi drop network
3) Broadcasting network
4) All of these
5) None of these
19. Which of the following is not an advantage of multiprocessor system?
1) Low Cost
2) High Reliability
3) Increased Throughput
4) All of these
5) None of these
20. Data redundancy can be eliminated by using:
1) Networking
2) DBMS
3) Operating System
4) Processing the data manually
5) None of these
21. System bus is also known as :
1) Internal bus
2) Information bus
3) RTA bus
4) Component bus
5) None of these
22. Which memory is normally used between RAM and CPU?
1) Cache
2) Register
3) Virtual
4) Disk
5) None of these
23. ...... is a computer software designed to help people involved in a common task to achieve goals.
1) Shareware
2) Software
3) Freeware
4) Collaborative Software
5) None
24. The CPU of a computer ?
1) understands only assembly language
2) understands machine language and high-level languages
3) understands only machine language
4) understands only high-level language
5) does not understand machine language
25. Which of the following is not a term related to the World Wide Web?
1) Hyperlink
2) Hypertext
3) Website
4) Homepage
5) Keyboard
26. ..... is the process of getting access to the computer.
1) Switch on
2) Login
3) Logoff
4) Enter
5) None
27. Display bar that lists all the open folders and active applications is.......
1) Menubar
2) Toolbar
3) Task bar
4) Window list
5) None of these
28. A picture / image file which is displayed in the background of the computer screen is called ..........
1) Wall Paper
2) Screen Saver
3) Windows Theme
4) Photo Desktop
5) None of these
29. Which of the following operating systems does not exist?
1) Windows 7
2) Mac OS X
3) Windows CE
4) Windows 12
5) Ubuntu
30. Which of the following is true about Operating System?
1) It is an interface between user and the computer.
2) It manages all resources
3) It does all Memory management and Process management tasks
4) All are true
5) None of these
31. ....... is a software for personal computers that combines the most commonly used functions of many productivity software programs into one application.
1) Integrated Software
2) Application Software
3) System Software
4) Software Suite
5) None of these
32. Expand RDBMS.
1) Relative Database Management System
2) Rational Database Minimize System
3) Relational Database Management System
4) Relational Database Maximize System
5) None of these
33. ..... is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law.
1) CID
2) Cryptography
3) Steganography
4) Computer Forensics
5) None of these
34. Find the odd one out.
1) Scanner
2) Mouse
3) Keyboard
4) Printer
5) Barcode Reader
35. Which of the following is not a logic gate?
1) AND
2) OR
3) NOT
4) KNOT
5) None of these
36. DSL is an example of a ...... connection
1) Broadband
2) Dialup
3) Both 1 and 2
4) Computer
5) None of these
37. ...... is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
1) Encryption
2) Cryptography
3) Steganography
4) Forensics
5) None of these
38. 'Bespoke Software' is also known as:
1) Legacy Software
2) Respoke Software
3) System Software
4) Custom Software
5) None of these
39. Which of the following is not a utility program?
1) File copying
2) Listing files
3) Sending files to printer
4) File conversion
5) None of these
40. Which of the following is an audio input device?
1) Microphone
2) Webcam
3) MIDI keyboard
4) Only 1 & 2
5) Only 1 & 3
ANSWERS:
1-3; 2-5; 3-5; 4-4; 5-4; 6-3; 7-5; 8-3; 9-4; 10-4;
11-4; 12-1; 13-1; 14-2; 15-4; 16-1; 17-3; 18-4; 19-5; 20-2;
21-1; 22-1; 23-4; 24-3; 25-5; 26-2; 27-3; 28-1; 29-4; 30-4;
31-1; 32-3; 33-4; 34-4; 35-4; 36-1; 37-3; 38-4; 39-5; 40-5
1) Insert table
2) Spelling and Grammar
3) Header and Footer
4) Thesaurus
5) File
2. Which of the following is the advantage of Assembly language over Machine language?
1) Easy to use
2) Easy to understand
3) Easy to modify
4) Only 1 and 3
5) All the above
3. Pop-ups are a form of ..... on the World Wide Web?
1) Instant Messaging
2) Search Engines
3) Browsers
4) Mark-up Languages
5) Online Advertising
4. Which of the following is not used to align text in a document?
1) Left
2) Right
3) Center
4) Diagonal
5) Justify
5. Which of the following characteristics is/are used to compute the results from excel data?
1) Goto
2) Table
3) Diagram
4) Formula and Function
5) None of these
6. ....... is a combination of text, audio, still images, animation, video.
1) Multiplexer
2) Multiplier
3) Multimedia
4) Multiuser
5) None of these
7. Which of the following refers to the process of trading goods over the internet?
1) E-seva
2) E-Trading
3) E-Finance
4) E-Sales
5) E-Commerce
8. Multiple autonomous computers communicating through a computer network to achieve a common goal is called .......
1) Centralized Computing
2) Co-operative Computing
3) Distributed Computing
4) Connected Computing
5) None of these
9. In order to change page margins in a word document:
1) Drag the scroll box on the scroll bars.
2) Delete the margin boundaries on the ruler
3) Right Click on the ruler
4) Drag the margin boundaries on the ruler
5) None of these
10. USB 3.0 is the second major revision of the Universal Serial Bus standard for Computer Connectivity. Which of the following is true about USB 3.0?
1) It is more than 10 times as fast as USB 2.0
2) Its Data transfer rate is up to 5 Gbits/sec
3) Power consumption is less than USB 2.0
4) All the above
5) None of the above
11. MICR is exclusively used in:
1) Libraries
2) Super markets
3) Stock markets
4) Banking Industry
5) None of these
12. A communication system which provides communication in both directions, but not simultaneously is known as:
1) Half-Duplex
2) Full-Duplex
3) Broadcast
4) Only 1 and 2
5) None of these
13. Which of the following uses computers and data communication to transmit data electronically between computers?
1) EDI
2) Physical Media
3) Printing a paper
4) DTE
5) None
14. Which key, when toggled off, causes keyed characters to override existing characters?
1) Delete
2) Insert
3) Page up
4) Page down
5) Down arrow
15. An act of unauthorized copying of computer software is called:
1) Network Piracy
2) License Piracy
3) Plagiarism
4) Software Piracy
5) None of these
16. .... are attempts by individuals to obtain confidential information from the user by falsifying their identity.
1) Phishing Trips
2) Computer Virus
3) Spyware Scams
4) Viruses
5) None of these
17. The default view in Excel is:
1) Work
2) Auto
3) Normal
4) Roman
5) None of these
18. Bus topology is also known as ........
1) Multipoint network
2) Multi drop network
3) Broadcasting network
4) All of these
5) None of these
19. Which of the following is not an advantage of multiprocessor system?
1) Low Cost
2) High Reliability
3) Increased Throughput
4) All of these
5) None of these
20. Data redundancy can be eliminated by using:
1) Networking
2) DBMS
3) Operating System
4) Processing the data manually
5) None of these
21. System bus is also known as :
1) Internal bus
2) Information bus
3) RTA bus
4) Component bus
5) None of these
22. Which memory is normally used between RAM and CPU?
1) Cache
2) Register
3) Virtual
4) Disk
5) None of these
23. ...... is a computer software designed to help people involved in a common task to achieve goals.
1) Shareware
2) Software
3) Freeware
4) Collaborative Software
5) None
24. The CPU of a computer ?
1) understands only assembly language
2) understands machine language and high-level languages
3) understands only machine language
4) understands only high-level language
5) does not understand machine language
25. Which of the following is not a term related to the World Wide Web?
1) Hyperlink
2) Hypertext
3) Website
4) Homepage
5) Keyboard
26. ..... is the process of getting access to the computer.
1) Switch on
2) Login
3) Logoff
4) Enter
5) None
27. Display bar that lists all the open folders and active applications is.......
1) Menubar
2) Toolbar
3) Task bar
4) Window list
5) None of these
28. A picture / image file which is displayed in the background of the computer screen is called ..........
1) Wall Paper
2) Screen Saver
3) Windows Theme
4) Photo Desktop
5) None of these
29. Which of the following operating systems does not exist?
1) Windows 7
2) Mac OS X
3) Windows CE
4) Windows 12
5) Ubuntu
30. Which of the following is true about Operating System?
1) It is an interface between user and the computer.
2) It manages all resources
3) It does all Memory management and Process management tasks
4) All are true
5) None of these
31. ....... is a software for personal computers that combines the most commonly used functions of many productivity software programs into one application.
1) Integrated Software
2) Application Software
3) System Software
4) Software Suite
5) None of these
32. Expand RDBMS.
1) Relative Database Management System
2) Rational Database Minimize System
3) Relational Database Management System
4) Relational Database Maximize System
5) None of these
33. ..... is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law.
1) CID
2) Cryptography
3) Steganography
4) Computer Forensics
5) None of these
34. Find the odd one out.
1) Scanner
2) Mouse
3) Keyboard
4) Printer
5) Barcode Reader
35. Which of the following is not a logic gate?
1) AND
2) OR
3) NOT
4) KNOT
5) None of these
36. DSL is an example of a ...... connection
1) Broadband
2) Dialup
3) Both 1 and 2
4) Computer
5) None of these
37. ...... is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
1) Encryption
2) Cryptography
3) Steganography
4) Forensics
5) None of these
38. 'Bespoke Software' is also known as:
1) Legacy Software
2) Respoke Software
3) System Software
4) Custom Software
5) None of these
39. Which of the following is not a utility program?
1) File copying
2) Listing files
3) Sending files to printer
4) File conversion
5) None of these
40. Which of the following is an audio input device?
1) Microphone
2) Webcam
3) MIDI keyboard
4) Only 1 & 2
5) Only 1 & 3
ANSWERS:
1-3; 2-5; 3-5; 4-4; 5-4; 6-3; 7-5; 8-3; 9-4; 10-4;
11-4; 12-1; 13-1; 14-2; 15-4; 16-1; 17-3; 18-4; 19-5; 20-2;
21-1; 22-1; 23-4; 24-3; 25-5; 26-2; 27-3; 28-1; 29-4; 30-4;
31-1; 32-3; 33-4; 34-4; 35-4; 36-1; 37-3; 38-4; 39-5; 40-5
1. Digital Camera is an?
1) Input Device
2) Output Device
3) Storage Device
4) Controller Device
5) None
2. Adwords is a(n)?
1) Advertising Service by Microsoft
2) Advertising Service by Google
3) Advanced Search Engine
4) Automatic words Search Engine by Yahoo
5) Advertising Service by Yahoo
3. When a computer is switched on, during which process POST is performed?
1) In booting process
2) In integrity process
3) During reliability test
4) In shut down process
5) None
4. Which of the following is the largest storage?
1) Mega Byte
2) Kilo Byte
3) Giga Byte
4) Byte
5) Tera Byte
5. Application software contains programs designed for a(n)?
1) Computer Administrator
2) Computer Programmer
3) Initiator
4) End User
5) None
6. System Software includes which of the following?
1) Linkers
2) Debuggers
3) Loaders
4) Compilers
5) All the above
7. Which of the following best defines batch processing?
1) Sharing of a computing resource among many users
2) Execution of bulk jobs at a time
3) Allocation of computer system and its resources to more than one user
4) Execution of series of jobs on a computer without manual intervention
5) None
8. Which of the following is true about RAM and ROM?
1) They belong to internal storage
2) They are directly accessible
3) They are read only memories
4) All of these
5) Only 1 and 2
9. The secret code that restricts entry to some programs / software is:
1) Password
2) Pass code
3) Entry - code
4) Access code
5) None
10. Which of the following is true about CPU?
1) It contains electronic circuits that cause processing to occur
2) It makes the information resulting from processing available for use
3) It allows data, programs, commands to be entered into a computer
4) It is comprised of electronic components that store data
5) None
11. Which of the following keys on keyboard cannot work independently and should be used in combination with another key to perform a task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None
12. The commonly used name for Malicious Software is?
1) Badware
2) Malware
3) Malicious Software
4) Unethical ware
5) Harmful ware
13. Raja wants to print his music notes sheet from a document. He used the keyboard shortcut Ctrl + P. The document, by default is printed in .... mode.
1) Landscape
2) Portrait
3) Page Setup
4) Print View
5) None
14. Which of the following computers is most powerful?
1) Mini Computers
2) Mainframe Computers
3) Super Computers
4) Micro Computers
5) None
15. Word Processing softwares are used to create:
1) Databases
2) Documents
3) Spreadsheets
4) Slides
5) None
16. Which of the following is not a packaged software?
1) MS - PowerPoint
2) MS - Excel
3) MS - Access
4) Adobe Photoshop
5) None
17. The number of distinct pixels in each dimension that can be displayed is called
1) Quality
2) Correctness
3) Resolution
4) Repetition
5) Projection
18. The amount of space that has been used up and the remaining free space of the hard disk is known to the user by?
1) Viewing the properties
2) Opening it
3) Renaming it
4) Moving it to trash / Recyclebin
5) None
19. Which of the following device is used to send and receive information printed on a paper through telephone line?
1) Scanner
2) Printer
3) Fax Machine
4) e - mail
5) MICR
20. Which of the following is a data - entry device?
1) Barcode Reader
2) MICR
3) OMR
4) OCR
5) All of these
21. In Computer terminology, Choices are usually referred to as?
1) Options
2) Exits
3) Sources
4) Codes
5) None
22. Which of the following contains Only input devices?
1) Scanner, Printer, Monitor
2) Keyboard, Printer, Monitor
3) Mouse, Printer, Monitor
4) Plotter, Printer, Monitor
5) None
23. Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group?
1) Printer
2) Scanner
3) Mouse
4) Monitor
5) Windows
24. What is the function of a Drop Cap in MS - Word?
1) It does not allow capital letters to be used in the documents.
2) It turns the first letter of each word into Upper Case
3) It lets you begin a paragraph with a large dropped Initial capital letter
4) It automatically starts all paragraphs and sentences with capital letters
5) None
25. Network Components are connected to the same cable in the ...... topology.
1) Star
2) Ring
3) Bus
4) Mesh
5) None
26. When computer processes the data, the intermediate data is stored in?
1) RAM
2) ROM
3) Hard Disk
4) CD
5) BIOS
27. The Process of sending data to a number of stations at the same time is known as ?
1) Broadcasting
2) Unicasting
3) Bicasting
4) Synchronization
5) None
28. Which of the following is not a web browser?
1) Mozilla
2) IE
3) CE
4) Opera
5) Safari
29. What is the maximum storage capacity of a CD?
1) 700 MB
2) 1000 MB
3) 1024 MB
4) 2000 MB
5) 100 MB
30. Which of the following is not a network protocol?
1) HTTP
2) SMTP
3) FTP
4) html
5) None
31. html is a kind of ?
1) Programming Language
2) Mark-up language
3) Scripting Language
4) Query Language
5) Internet Language
32. 'Mark as Final' in MS Word is used to:
1) Make the document Editable by everybody
2) Make the document Read Only
3) Make the document Editable by authorized persons only
4) Make the document available on the web
5) None of these
33. The backspace key is most often used to?
1) Delete a character to the right of the cursor
2) Delete a character to the left of the cursor
3) Delete a character above the cursor
4) Delete a character below the cursor
5) None
34. Which of the following keyboard shortcuts is used to view the properties of a selected object?
1) Alt + Space
2) Ctrl + Space
3) Alt + Enter
4) Ctrl + Enter
5) None
35. Expand VPN.
1) Virtual Personal Network
2) Very Private Network
3) Virtual Private Network
4) Vicious Personal Network
5) None
36. The example of character user interface is:
1) DOS
2) Windows XP
3) Macintosh
4) Both 1 and 2
5) None
37. What is the short-cut key to display save-as dialog box in MS-Word?
1) F1
2) Alt + F1
3) F12
4) F5
5) None
38. The internet service that provides a multimedia interface to available resources is called:
1) FTP
2) World Wide Web
3) Telnet
4) VPN
5) None
ANSWERS:
1-1; 2-2; 3-1; 4-5; 5-4; 6-5; 7-1;
8-5; 9-1; 10-2; 11-2; 12-2; 13-2; 14-3; 15-2;
16-5; 17-3; 18-1; 19-3; 20-5; 21-1; 22-5;
23-5; 24-3; 25-3; 26-1; 27-1; 28-3; 29-1; 30-4;
31-2; 32-2; 33-2; 34-3; 35-3; 36-1; 37-3; 38-2
1) Input Device
2) Output Device
3) Storage Device
4) Controller Device
5) None
2. Adwords is a(n)?
1) Advertising Service by Microsoft
2) Advertising Service by Google
3) Advanced Search Engine
4) Automatic words Search Engine by Yahoo
5) Advertising Service by Yahoo
3. When a computer is switched on, during which process POST is performed?
1) In booting process
2) In integrity process
3) During reliability test
4) In shut down process
5) None
4. Which of the following is the largest storage?
1) Mega Byte
2) Kilo Byte
3) Giga Byte
4) Byte
5) Tera Byte
5. Application software contains programs designed for a(n)?
1) Computer Administrator
2) Computer Programmer
3) Initiator
4) End User
5) None
6. System Software includes which of the following?
1) Linkers
2) Debuggers
3) Loaders
4) Compilers
5) All the above
7. Which of the following best defines batch processing?
1) Sharing of a computing resource among many users
2) Execution of bulk jobs at a time
3) Allocation of computer system and its resources to more than one user
4) Execution of series of jobs on a computer without manual intervention
5) None
8. Which of the following is true about RAM and ROM?
1) They belong to internal storage
2) They are directly accessible
3) They are read only memories
4) All of these
5) Only 1 and 2
9. The secret code that restricts entry to some programs / software is:
1) Password
2) Pass code
3) Entry - code
4) Access code
5) None
10. Which of the following is true about CPU?
1) It contains electronic circuits that cause processing to occur
2) It makes the information resulting from processing available for use
3) It allows data, programs, commands to be entered into a computer
4) It is comprised of electronic components that store data
5) None
11. Which of the following keys on keyboard cannot work independently and should be used in combination with another key to perform a task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None
12. The commonly used name for Malicious Software is?
1) Badware
2) Malware
3) Malicious Software
4) Unethical ware
5) Harmful ware
13. Raja wants to print his music notes sheet from a document. He used the keyboard shortcut Ctrl + P. The document, by default is printed in .... mode.
1) Landscape
2) Portrait
3) Page Setup
4) Print View
5) None
14. Which of the following computers is most powerful?
1) Mini Computers
2) Mainframe Computers
3) Super Computers
4) Micro Computers
5) None
15. Word Processing softwares are used to create:
1) Databases
2) Documents
3) Spreadsheets
4) Slides
5) None
16. Which of the following is not a packaged software?
1) MS - PowerPoint
2) MS - Excel
3) MS - Access
4) Adobe Photoshop
5) None
17. The number of distinct pixels in each dimension that can be displayed is called
1) Quality
2) Correctness
3) Resolution
4) Repetition
5) Projection
18. The amount of space that has been used up and the remaining free space of the hard disk is known to the user by?
1) Viewing the properties
2) Opening it
3) Renaming it
4) Moving it to trash / Recyclebin
5) None
19. Which of the following device is used to send and receive information printed on a paper through telephone line?
1) Scanner
2) Printer
3) Fax Machine
4) e - mail
5) MICR
20. Which of the following is a data - entry device?
1) Barcode Reader
2) MICR
3) OMR
4) OCR
5) All of these
21. In Computer terminology, Choices are usually referred to as?
1) Options
2) Exits
3) Sources
4) Codes
5) None
22. Which of the following contains Only input devices?
1) Scanner, Printer, Monitor
2) Keyboard, Printer, Monitor
3) Mouse, Printer, Monitor
4) Plotter, Printer, Monitor
5) None
23. Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group?
1) Printer
2) Scanner
3) Mouse
4) Monitor
5) Windows
24. What is the function of a Drop Cap in MS - Word?
1) It does not allow capital letters to be used in the documents.
2) It turns the first letter of each word into Upper Case
3) It lets you begin a paragraph with a large dropped Initial capital letter
4) It automatically starts all paragraphs and sentences with capital letters
5) None
25. Network Components are connected to the same cable in the ...... topology.
1) Star
2) Ring
3) Bus
4) Mesh
5) None
26. When computer processes the data, the intermediate data is stored in?
1) RAM
2) ROM
3) Hard Disk
4) CD
5) BIOS
27. The Process of sending data to a number of stations at the same time is known as ?
1) Broadcasting
2) Unicasting
3) Bicasting
4) Synchronization
5) None
28. Which of the following is not a web browser?
1) Mozilla
2) IE
3) CE
4) Opera
5) Safari
29. What is the maximum storage capacity of a CD?
1) 700 MB
2) 1000 MB
3) 1024 MB
4) 2000 MB
5) 100 MB
30. Which of the following is not a network protocol?
1) HTTP
2) SMTP
3) FTP
4) html
5) None
31. html is a kind of ?
1) Programming Language
2) Mark-up language
3) Scripting Language
4) Query Language
5) Internet Language
32. 'Mark as Final' in MS Word is used to:
1) Make the document Editable by everybody
2) Make the document Read Only
3) Make the document Editable by authorized persons only
4) Make the document available on the web
5) None of these
33. The backspace key is most often used to?
1) Delete a character to the right of the cursor
2) Delete a character to the left of the cursor
3) Delete a character above the cursor
4) Delete a character below the cursor
5) None
34. Which of the following keyboard shortcuts is used to view the properties of a selected object?
1) Alt + Space
2) Ctrl + Space
3) Alt + Enter
4) Ctrl + Enter
5) None
35. Expand VPN.
1) Virtual Personal Network
2) Very Private Network
3) Virtual Private Network
4) Vicious Personal Network
5) None
36. The example of character user interface is:
1) DOS
2) Windows XP
3) Macintosh
4) Both 1 and 2
5) None
37. What is the short-cut key to display save-as dialog box in MS-Word?
1) F1
2) Alt + F1
3) F12
4) F5
5) None
38. The internet service that provides a multimedia interface to available resources is called:
1) FTP
2) World Wide Web
3) Telnet
4) VPN
5) None
ANSWERS:
1-1; 2-2; 3-1; 4-5; 5-4; 6-5; 7-1;
8-5; 9-1; 10-2; 11-2; 12-2; 13-2; 14-3; 15-2;
16-5; 17-3; 18-1; 19-3; 20-5; 21-1; 22-5;
23-5; 24-3; 25-3; 26-1; 27-1; 28-3; 29-1; 30-4;
31-2; 32-2; 33-2; 34-3; 35-3; 36-1; 37-3; 38-2
1. Which of the following memory chip is programmed
during the manufacturing process?
1) RAM
2) ROM
3) PROM
4) EEPROM
5) None
2. Computer uses which of the following languages to process data?
1) High Level
2) Assembly
3) Binary
4) Hexa Decimal
5) Octal
3. Magnetic Disk medium uses ..... method for accessing data.
1) Direct
2) Serial
3) Sequential
4) Rotational
5) None
4. Which of the following is the India's first Super Computer?
1) Aakash
2) Sea Deep
3) First PC
4) PARAM 8000
5) Cray - 1
5. Parallelogram in a flowchart usually represents:
1) Input
2) Output
3) Process
4) Both 1 & 2
5) Decision
6. Registers are located in?
1) Memory
2) ALU
3) OS
4) CPU
5) None
7. ...... terminals are often connected to complex inventory and sales computer systems.
1) Data
2) Information
3) Credit Cards
4) Query
5) Point-of-Sale (POS)
8. Which of the following is true about Dial-up internet access?
1) It utilizes the existing telephone services
2) It uses a router for security
3) It utilizes the broadband technology
4) Modem speeds are very fast
5) All are Correnct
9. Icons, Windows, Menu and buttons are features of ?
1) DOS
2) GUI
3) Command Driven Interface
4) All the above
5) None
10. Which of the following is true about URL ?
1) It is a web browser
2) It is a messenger
3) It is a mail service
4) It is a global address of documents and other resources on World Wide Web
5) It is same as internet
11. A computer program is:
1) A set of instructions that enable the computer to solve a problem or perform a task
2) Main memory
3) Pseudo code
4) A flowchart
5) None
12. Graphical pictures that represent an object like file, folder etc., are:
1) Taskbar
2) Graphical toolbar
3) Desktop
4) Folder
5) Icon
13. Producing Output involves:
1) Accepting information from the outside world
2) Communication with another computer
3) Moving and storing information
4) Communicating information to the outside world
5) None
14. One of the reasons to copy files from CD - ROM to the computer's hard disk is:
1) The above stated procedure cannot be done
2) Faster access
3) To be able to print
4) CD - ROM can only be read once
5) CD - ROM contains only Temporary data
15. The place in a computer, where the OS, application programs and data in current use are kept so that they can be quickly reached by the computer processor is?
1) ROM
2) RAM
3) TRASH
4) Access control list
5) None
16. Which of the following is / are the functions
of operating system?
1) Memory Management
2) Access to I/O devices
3) Controlled Access to files
4) All the above
5) None
17. The easiest way to select text is to left click the mouse and ?
1) Hold the Shift key
2) Hold the Ctrl key
3) Move the mouse
4) Drag Over the words you want to highlight
5) None
18. Which part of the URL http://www.ibps.in/clerks2012.html will specify the rules to be followed when accessing a file ?
1) http://
2) www
3) ibps
4) .in
5) /clerks2012.html
19. Moving the page around to view all the pages in the document on the screen is referred to as:
1) Surfing
2) Navigating
3) Hyperlink
4) Scrolling
5) Browsing
20. Which of the following is the short-cut key to close an active tab of a browser?
1) Alt + F4
2) Ctrl + C
3) Ctrl + F4
4) Shift + C
5) Ctrl + W
21. Which kind of malware typically has a tendency to reside in / to get attach to a computer program?
1) Worm
2) Trojan Horse
3) Computer Virus
4) All the Above
5) None
22. WWW can be accessed using ?
1) Web Browsers
2) e - mail
3) Search Engine
4) http
5) Chatting
23. A wireless network uses ...... waves to transmit signals.
1) Electro-Magnetic
2) Sound
3) Radio
4) Video
5) None
24. Kalyan gave incorrect settings in the CMOS which can prevent him from?
1) Logging on to the internet
2) Searching on the web
3) Booting up the computer
4) Accessing the computer
5) Printing a document
25. The components that process data are located in the....
1) Input Devices
2) Output Devices
3) System Unit
4) Storage Component
5) None of these
26. Which of the following is not one of the major data processing functions of a computer?
1) Gathering Data
2) Processing data into information
3) Analysing the data or information
4) Storing data or information
5) None of these
27. Which of the following are the least powerful, yet the most widely used and fastest - growing type of computers?
1) Mainframe Computers
2) Super Computers
3) Mini Computers
4) Micro Computers
5) None of these
28. Which of the following is used to connect a personal computer to a network?
1) Modem
2) NIC
3) PIC
4) CPU
5) None
29. Each Web address is actually a series of numbers, which is usually called as:
1) Domain Name
2) URL
3) http
4) HTML
5) IP address
30. LinkedIn is a?
1) Search Engine
2) Web Browser
3) Social Networking Site
4) Name of Operating System
5) None of these
31. Programs designed to perform specific tasks related to managing computer resources are called:
1) Programming Software
2) Operating System
3) Application Software
4) Utility Programs
5) None of these
32. Menus are a part of .....
1) Hardware
2) User Interface
3) Status Bar
4) Monitor
5) None of these
33. A business's customer, inventory and payroll records would best be stored in a .... file.
1) Database
2) Document
3) Worksheet
4) Presentation
5) None of these
34. Which of the following is / are the features of word processing?
1) Spell Check
2) Find and Replace
3) Thesaurus
4) All the above
5) None of the above
35. Find the odd one out.
1) Bus
2) Ring
3) Star
4) Tree
5) Train
36. The communication between a processor and other devices inside the computer is done through?
1) Bus
2) Channel
3) Network Cable
4) Chip
5) None of these
37. Which of the following is fastest?
1) Cache Memory
2) Main Memory
3) Secondary Memory
4) Compact Disk
5) Digital Versatile Disk
38. Which of the following memories can be read directly by the computer processor?
1) Hard Disk
2) Main Memory
3) CD
4) DVD
5) None
39. Which of the following term is not associated with Display Device of the computer?
1) LCD
2) LED
3) CRT
4) WAT
5) TFT
40. A rectangular area on a computer screen that contains a document, program or message is referred to as:
1) Cell
2) Window
3) Desktop
4) Field
5) None
ANSWERS:
1-2; 2-3; 3-1; 4-4; 5-4; 6-4; 7-5; 8-1; 9-2; 10-4;
11-1; 12-5; 13-4; 14-2; 15-2; 16-4; 17-4; 18-1; 19-4; 20-5;
21-3; 22-1; 23-3; 24-3; 25-3; 26-3; 27-4; 28-2; 29-5; 30-3;
31-2; 32-2; 33-3; 34-4; 35-5; 36-1; 37-1; 38-2; 39-4; 40-2.
1) RAM
2) ROM
3) PROM
4) EEPROM
5) None
2. Computer uses which of the following languages to process data?
1) High Level
2) Assembly
3) Binary
4) Hexa Decimal
5) Octal
3. Magnetic Disk medium uses ..... method for accessing data.
1) Direct
2) Serial
3) Sequential
4) Rotational
5) None
4. Which of the following is the India's first Super Computer?
1) Aakash
2) Sea Deep
3) First PC
4) PARAM 8000
5) Cray - 1
5. Parallelogram in a flowchart usually represents:
1) Input
2) Output
3) Process
4) Both 1 & 2
5) Decision
6. Registers are located in?
1) Memory
2) ALU
3) OS
4) CPU
5) None
7. ...... terminals are often connected to complex inventory and sales computer systems.
1) Data
2) Information
3) Credit Cards
4) Query
5) Point-of-Sale (POS)
8. Which of the following is true about Dial-up internet access?
1) It utilizes the existing telephone services
2) It uses a router for security
3) It utilizes the broadband technology
4) Modem speeds are very fast
5) All are Correnct
9. Icons, Windows, Menu and buttons are features of ?
1) DOS
2) GUI
3) Command Driven Interface
4) All the above
5) None
10. Which of the following is true about URL ?
1) It is a web browser
2) It is a messenger
3) It is a mail service
4) It is a global address of documents and other resources on World Wide Web
5) It is same as internet
11. A computer program is:
1) A set of instructions that enable the computer to solve a problem or perform a task
2) Main memory
3) Pseudo code
4) A flowchart
5) None
12. Graphical pictures that represent an object like file, folder etc., are:
1) Taskbar
2) Graphical toolbar
3) Desktop
4) Folder
5) Icon
13. Producing Output involves:
1) Accepting information from the outside world
2) Communication with another computer
3) Moving and storing information
4) Communicating information to the outside world
5) None
14. One of the reasons to copy files from CD - ROM to the computer's hard disk is:
1) The above stated procedure cannot be done
2) Faster access
3) To be able to print
4) CD - ROM can only be read once
5) CD - ROM contains only Temporary data
15. The place in a computer, where the OS, application programs and data in current use are kept so that they can be quickly reached by the computer processor is?
1) ROM
2) RAM
3) TRASH
4) Access control list
5) None
16. Which of the following is / are the functions
of operating system?
1) Memory Management
2) Access to I/O devices
3) Controlled Access to files
4) All the above
5) None
17. The easiest way to select text is to left click the mouse and ?
1) Hold the Shift key
2) Hold the Ctrl key
3) Move the mouse
4) Drag Over the words you want to highlight
5) None
18. Which part of the URL http://www.ibps.in/clerks2012.html will specify the rules to be followed when accessing a file ?
1) http://
2) www
3) ibps
4) .in
5) /clerks2012.html
19. Moving the page around to view all the pages in the document on the screen is referred to as:
1) Surfing
2) Navigating
3) Hyperlink
4) Scrolling
5) Browsing
20. Which of the following is the short-cut key to close an active tab of a browser?
1) Alt + F4
2) Ctrl + C
3) Ctrl + F4
4) Shift + C
5) Ctrl + W
21. Which kind of malware typically has a tendency to reside in / to get attach to a computer program?
1) Worm
2) Trojan Horse
3) Computer Virus
4) All the Above
5) None
22. WWW can be accessed using ?
1) Web Browsers
2) e - mail
3) Search Engine
4) http
5) Chatting
23. A wireless network uses ...... waves to transmit signals.
1) Electro-Magnetic
2) Sound
3) Radio
4) Video
5) None
24. Kalyan gave incorrect settings in the CMOS which can prevent him from?
1) Logging on to the internet
2) Searching on the web
3) Booting up the computer
4) Accessing the computer
5) Printing a document
25. The components that process data are located in the....
1) Input Devices
2) Output Devices
3) System Unit
4) Storage Component
5) None of these
26. Which of the following is not one of the major data processing functions of a computer?
1) Gathering Data
2) Processing data into information
3) Analysing the data or information
4) Storing data or information
5) None of these
27. Which of the following are the least powerful, yet the most widely used and fastest - growing type of computers?
1) Mainframe Computers
2) Super Computers
3) Mini Computers
4) Micro Computers
5) None of these
28. Which of the following is used to connect a personal computer to a network?
1) Modem
2) NIC
3) PIC
4) CPU
5) None
29. Each Web address is actually a series of numbers, which is usually called as:
1) Domain Name
2) URL
3) http
4) HTML
5) IP address
30. LinkedIn is a?
1) Search Engine
2) Web Browser
3) Social Networking Site
4) Name of Operating System
5) None of these
31. Programs designed to perform specific tasks related to managing computer resources are called:
1) Programming Software
2) Operating System
3) Application Software
4) Utility Programs
5) None of these
32. Menus are a part of .....
1) Hardware
2) User Interface
3) Status Bar
4) Monitor
5) None of these
33. A business's customer, inventory and payroll records would best be stored in a .... file.
1) Database
2) Document
3) Worksheet
4) Presentation
5) None of these
34. Which of the following is / are the features of word processing?
1) Spell Check
2) Find and Replace
3) Thesaurus
4) All the above
5) None of the above
35. Find the odd one out.
1) Bus
2) Ring
3) Star
4) Tree
5) Train
36. The communication between a processor and other devices inside the computer is done through?
1) Bus
2) Channel
3) Network Cable
4) Chip
5) None of these
37. Which of the following is fastest?
1) Cache Memory
2) Main Memory
3) Secondary Memory
4) Compact Disk
5) Digital Versatile Disk
38. Which of the following memories can be read directly by the computer processor?
1) Hard Disk
2) Main Memory
3) CD
4) DVD
5) None
39. Which of the following term is not associated with Display Device of the computer?
1) LCD
2) LED
3) CRT
4) WAT
5) TFT
40. A rectangular area on a computer screen that contains a document, program or message is referred to as:
1) Cell
2) Window
3) Desktop
4) Field
5) None
ANSWERS:
1-2; 2-3; 3-1; 4-4; 5-4; 6-4; 7-5; 8-1; 9-2; 10-4;
11-1; 12-5; 13-4; 14-2; 15-2; 16-4; 17-4; 18-1; 19-4; 20-5;
21-3; 22-1; 23-3; 24-3; 25-3; 26-3; 27-4; 28-2; 29-5; 30-3;
31-2; 32-2; 33-3; 34-4; 35-5; 36-1; 37-1; 38-2; 39-4; 40-2.
1. Which of the following peripheral devices
displays information to a user?
1) Monitor
2) Keyboard
3) Secondary Storage Devices
4) Secondary Storage Media
5) None
2. Bandwidth refers to
1) The cost of the cable required to implement a WAN
2) The cost of the cable required to implement a LAN
3) The amount of information a peer-to-peer network can store
4) The amount of information a communication medium can transfer in a given amount of time
5) None of these
3. A processor that collects the transmissions from several communication media and send them over a single line that operates at a higher capacity is called ........
1) Multiplexer
2) Bridge
3) Hub
4) Router
5) None of these
4. Which of the following is not a form of Biometrics?
1) Fingerprint
2) Password
3) Retina Scan
4) Breath Scan
5) None of these
5. Which of the following best defines a compiler?
1) Translates machine language into a high level language
2) Translates one statement at a time as the program executes
3) Translates two statements at a time as the program executes
4) Produces object code
5) is less sophisticated than an assembler
6. Which of the following is not a web browser?
1) Opera
2) Netscape
3) Microsoft Outlook
4) Internet Explorer
5) Safari
7. What is the cell content alignment by default in a Excel?
1) Left Aligned
2) Centrally Aligned
3) Text is left aligned and numbers are right aligned
4) Text is right aligned and numbers are left aligned
5) None of these
8. Which of the following device is used to transmit data over telecommunication lines?
1) Drive
2) Folder
3) Modem
4) Platforms
5) None of these
9. A ........ is approximately one billion bytes.
1) Kilobyte
2) Bit
3) Gigabyte
4) Megabyte
5) None of these
10. Printed information called ......, exists physically and is more permanent form of output than that presented on a display device.
1) Soft Copy
2) Hard Copy
3) Carbon Copy
4) Desk Copy
5) None of these
11. To restart the computer .... key/ button is used.
1) Ctrl + Del
2) Backspace + Ctrl
3) Ctrl + Alt + del
4) Reset
5) None
12. Which of the following is the benefit of using computer?
1) Computers are very fast and can store huge amounts of data
2) Computers provide accurate output even when input is incorrect
3) Computers are designed to be inflexible
4) All the above
5) None of these
13. Which of the following keyboard short-cut is used to center the paragraph?
1) Ctrl + C
2) Ctrl + E
3) Ctrl + L
4) Ctrl + R
5) None of these
14. If a memory chip is volatile, it will .......
1) explode if exposed to high temperatures
2) lose its contents if current is turned off
3) be used for data storage only
4) be used to both read and write data
5) None of these
15. Which of the following is not a hardware?
1) An image file
2) A keyboard
3) A monitor
4) A mouse
5) Pen drive
16. Simultaneous execution of two or more instructions is called:
1) Sequential Access
2) Reduced Instruction Set Computing (RISC)
3) Multiprocessing
4) Disk Mirroring
5) None of these
17. The different styles of lettering in a word processing program is called:
1) Font
2) Calligraphy
3) Writing
4) Manuscript
5) None of these
18. A CD-ROM disk ...
1) cannot be erased and rewritten
2) has more storage capacity than a CD-R
3) holds less data than a floppy disk
4) can be written only once
5) None of these
19. Which of the following is not an Operating System of Microsoft?
1) XP
2) 7
3) CE
4) Vista
5) Linux
20. The code for a web page is written using:
1) A fifth generation language
2) Winzip
3) Perl
4) Hypertext Markup Language
5) C++
21. Periodically adding, changing and deleting file records is called
1) Updating
2) Upgrading
3) Restructuring
4) Renewing
5) None of these
22. Which of the following functions is not performed by servers?
1) Processing Websites
2) Database Sharing
3) Storage
4) Word Processing
5) Email Processing
23. Documentation of softwares/ Computer programs is important so that:
1) Users can learn how to use the program
2) Other programmers can know how to maintain the program
3) The programmer can see why the code is written that way while locating sources of error
4) All the above
5) None of these
24. What is the difference between a check box and Radio button?
1) No difference
2) In radio buttons multiple options can be selected whereas in check boxes only single option can be selected
3) In check boxes as well as radio buttons multiple options can be selected, but radio buttons can be used only twice
4) In check boxes multiple options can be selected whereas in radio buttons only single option can be selected
5) None of these
25. Which of the following is true about Secondary Storage?
1) Does not require constant power
2) Does not use magnetic media
3) Consists of four main types of devices
4) Does not store information for later retrieval
5) None of these
26. ..... means that the data contained in a database is accurate and reliable?
1) Data Redundancy
2) Data Integrity
3) Data Reliability
4) Data Consistency
5) None of these
27. Documents converted to ..... can be published to the Web?
1) a doc file
2) http
3) Machine language
4) HTML
5) None of these
28. ........ is an access method in which collisions are entirely avoided.
1) CSMA
2) CSMA/CD
3) CSMA/CA
4) All the above
5) None of these
29. A ....... typically connects personal computers within a very limited geographical area, usually within a single building?
1) LAN
2) BAN
3) TAN
4) VPN
5) None of these
30. Who is/are the founders of Microsoft?
1) Bill Gates
2) Bill Gates and Allen Paul
3) Steve Jobs
4) Bill Gates and Steve Jobs
5) None of these
ANSWERS:
1-1; 2-4; 3-1; 4-2; 5-4; 6-3; 7-3; 8-3; 9-3;
10-2; 11-4; 12-1; 13-2; 14-2; 15-1; 16-3;
17-1; 18-1; 19-5; 20-4; 21-1; 22-4; 23-4;
24-4; 25-1; 26-2; 27-4; 28-5; 29-1; 30-2
1) Monitor
2) Keyboard
3) Secondary Storage Devices
4) Secondary Storage Media
5) None
2. Bandwidth refers to
1) The cost of the cable required to implement a WAN
2) The cost of the cable required to implement a LAN
3) The amount of information a peer-to-peer network can store
4) The amount of information a communication medium can transfer in a given amount of time
5) None of these
3. A processor that collects the transmissions from several communication media and send them over a single line that operates at a higher capacity is called ........
1) Multiplexer
2) Bridge
3) Hub
4) Router
5) None of these
4. Which of the following is not a form of Biometrics?
1) Fingerprint
2) Password
3) Retina Scan
4) Breath Scan
5) None of these
5. Which of the following best defines a compiler?
1) Translates machine language into a high level language
2) Translates one statement at a time as the program executes
3) Translates two statements at a time as the program executes
4) Produces object code
5) is less sophisticated than an assembler
6. Which of the following is not a web browser?
1) Opera
2) Netscape
3) Microsoft Outlook
4) Internet Explorer
5) Safari
7. What is the cell content alignment by default in a Excel?
1) Left Aligned
2) Centrally Aligned
3) Text is left aligned and numbers are right aligned
4) Text is right aligned and numbers are left aligned
5) None of these
8. Which of the following device is used to transmit data over telecommunication lines?
1) Drive
2) Folder
3) Modem
4) Platforms
5) None of these
9. A ........ is approximately one billion bytes.
1) Kilobyte
2) Bit
3) Gigabyte
4) Megabyte
5) None of these
10. Printed information called ......, exists physically and is more permanent form of output than that presented on a display device.
1) Soft Copy
2) Hard Copy
3) Carbon Copy
4) Desk Copy
5) None of these
11. To restart the computer .... key/ button is used.
1) Ctrl + Del
2) Backspace + Ctrl
3) Ctrl + Alt + del
4) Reset
5) None
12. Which of the following is the benefit of using computer?
1) Computers are very fast and can store huge amounts of data
2) Computers provide accurate output even when input is incorrect
3) Computers are designed to be inflexible
4) All the above
5) None of these
13. Which of the following keyboard short-cut is used to center the paragraph?
1) Ctrl + C
2) Ctrl + E
3) Ctrl + L
4) Ctrl + R
5) None of these
14. If a memory chip is volatile, it will .......
1) explode if exposed to high temperatures
2) lose its contents if current is turned off
3) be used for data storage only
4) be used to both read and write data
5) None of these
15. Which of the following is not a hardware?
1) An image file
2) A keyboard
3) A monitor
4) A mouse
5) Pen drive
16. Simultaneous execution of two or more instructions is called:
1) Sequential Access
2) Reduced Instruction Set Computing (RISC)
3) Multiprocessing
4) Disk Mirroring
5) None of these
17. The different styles of lettering in a word processing program is called:
1) Font
2) Calligraphy
3) Writing
4) Manuscript
5) None of these
18. A CD-ROM disk ...
1) cannot be erased and rewritten
2) has more storage capacity than a CD-R
3) holds less data than a floppy disk
4) can be written only once
5) None of these
19. Which of the following is not an Operating System of Microsoft?
1) XP
2) 7
3) CE
4) Vista
5) Linux
20. The code for a web page is written using:
1) A fifth generation language
2) Winzip
3) Perl
4) Hypertext Markup Language
5) C++
21. Periodically adding, changing and deleting file records is called
1) Updating
2) Upgrading
3) Restructuring
4) Renewing
5) None of these
22. Which of the following functions is not performed by servers?
1) Processing Websites
2) Database Sharing
3) Storage
4) Word Processing
5) Email Processing
23. Documentation of softwares/ Computer programs is important so that:
1) Users can learn how to use the program
2) Other programmers can know how to maintain the program
3) The programmer can see why the code is written that way while locating sources of error
4) All the above
5) None of these
24. What is the difference between a check box and Radio button?
1) No difference
2) In radio buttons multiple options can be selected whereas in check boxes only single option can be selected
3) In check boxes as well as radio buttons multiple options can be selected, but radio buttons can be used only twice
4) In check boxes multiple options can be selected whereas in radio buttons only single option can be selected
5) None of these
25. Which of the following is true about Secondary Storage?
1) Does not require constant power
2) Does not use magnetic media
3) Consists of four main types of devices
4) Does not store information for later retrieval
5) None of these
26. ..... means that the data contained in a database is accurate and reliable?
1) Data Redundancy
2) Data Integrity
3) Data Reliability
4) Data Consistency
5) None of these
27. Documents converted to ..... can be published to the Web?
1) a doc file
2) http
3) Machine language
4) HTML
5) None of these
28. ........ is an access method in which collisions are entirely avoided.
1) CSMA
2) CSMA/CD
3) CSMA/CA
4) All the above
5) None of these
29. A ....... typically connects personal computers within a very limited geographical area, usually within a single building?
1) LAN
2) BAN
3) TAN
4) VPN
5) None of these
30. Who is/are the founders of Microsoft?
1) Bill Gates
2) Bill Gates and Allen Paul
3) Steve Jobs
4) Bill Gates and Steve Jobs
5) None of these
ANSWERS:
1-1; 2-4; 3-1; 4-2; 5-4; 6-3; 7-3; 8-3; 9-3;
10-2; 11-4; 12-1; 13-2; 14-2; 15-1; 16-3;
17-1; 18-1; 19-5; 20-4; 21-1; 22-4; 23-4;
24-4; 25-1; 26-2; 27-4; 28-5; 29-1; 30-2
1. Pick the odd one out:
1) Interpreter
2) Operating System
3) Compiler
4) Assembler
5) None of these
2. When a particular object or an image is copied, in which of the following places it is stored?
1) Notice Board
2) Interim Board
3) Notepad
4) Clipboard
5) None of these
3. The Term 'BIT' is the short form for:
1) Mega Byte
2) Binary Language
3) Binary Digit
4) Binary Number
5) None of these
4. Servers are computers that provide resources to other computers connected to a 1) Network
2) Super Computer
3) Micro Computer
4) Client
5) None of these
5. A bar which is seen at the bottom of the screen (usually) when the computer is turned on is known as:
1) Address Bar
2) Task Bar
3) Windows Bar
4) Line bar
5) None of these
6. Something which has easily understood instructions is said to be:
1) User friendly
2) Information
3) Word Processing
4) Icon
5) None of these
7. To save an existing file with a new name or to a new location, you should use the ..... command.
1) Save
2) Save and Replace
3) Save as
4) New file
5) None of these
8. Peripheral devices such as printers and monitors are considered to be:
1) Hardware
2) Software
3) Data
4) Information
5) None of these
9. In a database, ....... fields store numbers used to perform calculations.
1) Next
2) Key
3) Alpha Numeric
4) Numeric
5) None of these
10. Where is data saved permanently?
1) RAM
2) ROM
3) CPU
4) Printer
5) None of these
11. Which of the following describes relational database?
1) It provides relationship between integers
2) It consists of separate tables of related data
3) It retrieves data related to its queries
4) It provides the relationship between floats
5) None of these
12. Find the odd one out:
1) Projector
2) Speakers
3) Monitor
4) Microphone
5) Printer
13. A program for viewing webpages is called:
1) Word Processor
2) Spread sheet
3) Protocol
4) Browser
5) Database
14. Domain name Extension '.nic.in' is generally used for which of the following:
1) Organization websites
2) Educational Websites in india
3) Companies in india
4) e-governance websites
5) None of these
15. ........... view shows how the content on printed page, along with footer and margin header, appear.
1) Draft
2) Full screen reading
3) Outline
4) Page layout
5) None of these
16. What is the symbol for inbox in mail?
1) BOX
2) Envelope
3) Upper Case 'I'
4) Lower case 'I'
5) None of these
17. '©' symbol in computers refers to:
1) Copy
2) Circled 'C'
3) Copyright
4) Italicized C
5) None of these
18. Which of the following is a professional social networking site?
1) Facebook
2) Orkut
3) Twitter
4) LinkedIn
5) None of these
19. File ....... shrinks the size of a file so that it requires less storage space.
1) Scanning
2) Synthesizing
3) Defragmenting
4) Compression
5) None of these
20. Ctrl, shift, alt are called ....... keys.
1) Adjustment
2) Function
3) Modifier
4) Alphanumeric
5) None of these
21. An email address typically consists of user id followed by ........ and the domain name.
1) @
2) #
3) &
4) ∗
5) None of these
22. The name, a user assigns to a document is called:
1) File name
2) Program
3) Record
4) Data
5) None of these
23. ........... is processed by the computer into information.
1) Numbers
2) Processor
3) Input
4) Data
5) None of these
24. A menu contains a list of ........
1) commands
2) data
3) objects
4) reports
5) None of these
25. The internet allows you to:
1) Send electronic mail
2) View web pages
3) Connect to servers all around the world
4) All the above
5) None of these
26. Which of the following is a function of UPS?
1) It limits damage caused by fluctuating levels of electricity
2) It provides battery back up for limited time
3) It delivers electronic messages via a bus
4) It conducts a power-on self test or POST
5) None of these
27. Youtube, which provides a service of streaming videos online is provided by ....
1) Google
2) Microsoft
3) IBM
4) Apple
5) Sony
28. ...... is known as unauthorized access to others system.
1) Hacking
2) Encryption
3) Decryption
4) Trafficking
5) None of these
29. The vast network of computers that connects millions of people all over the world is called.......
1) LAN
2) Web
3) Hypertext
4) Internet
5) None of these
30. CRT stands for:
1) Copper Rod Tube
2) Campus Report Truncation
3) Completely Ready Tube
4) Cathode Ray Tube
5) None of these
31. To prevent a slide from being displayed during the slide show one should:
1) delete the slide
2) hide the slide by using animation button
3) hide the slide by using the slide show menu
4) Any of the above
5) None of the above
32. The ALU of a computer usually contains a number of high speed storage elements called ........
1) Semiconductor memory
2) Registers
3) Hard disk
4) Magnetic Disk
5) None of these
33. A connection from one HTML document to another HTML document is called:
1) Hyper Link
2) Connecting Link
3) Icon
4) All of these
5) None of these
34. Which of the following is true about RAM?
A) It is an acronym for Random Access Memory
B) It is memory built from silicon chips that is used to store programs and data temporarily while they are being processed
C) RAM stores the data permanently like Hard Disks
1) Only A and C
2) Only B and C
3) Only A and B
4) All the three
5) None of these
35. Capability of computer to perform more than one tasks at the same time is:
1) Batch Processing
2) Real Time Processing
3) Multitasking
4) Scheduled Processing
5) None of these
36. Computer Virus is:
1) A hardware
2) Windows tool
3) A computer program
4) Combination of 1 and 2
5) None of these
37. Firewall is used in communication network / system to save:
1) Unauthorized attack
2) Virus attack
3) Data driven attack
4) Fire attack
5) None of these
38. Which of the following can hold maximum data?
1) Optical disk
2) Floppy disk
3) Magnetic disk inside computer
4) Magnetic tape
5) None of these
39. ........ is a process of sending documents to a storage where they are temporarily stored and remain there until printer prints them.
1) Printing
2) Queuing
3) Waiting Queue
4) Print Spooling
5) None of these
40. The feature to customize the desktop to display information that can be updated from internet is:
1) Active desktop
2) Online desktop
3) E-mail
4) Resource Sharing
5) None of these
ANSWERS:
1-2; 2-4; 3-3; 4-1; 5-2; 6-1; 7-3; 8-1; 9-4; 10-2;
11-2; 12-4; 13-4; 14-4; 15-4; 16-2; 17-3; 18-4; 19-4; 20-3;
21-1; 22-1; 23-4; 24-1; 25-4; 26-2; 27-1; 28-1; 29-4; 30-4;
31-1; 32-2; 33-1; 34-3; 35-3; 36-3; 37-1; 38-4; 39-4; 40-1
1) Interpreter
2) Operating System
3) Compiler
4) Assembler
5) None of these
2. When a particular object or an image is copied, in which of the following places it is stored?
1) Notice Board
2) Interim Board
3) Notepad
4) Clipboard
5) None of these
3. The Term 'BIT' is the short form for:
1) Mega Byte
2) Binary Language
3) Binary Digit
4) Binary Number
5) None of these
4. Servers are computers that provide resources to other computers connected to a 1) Network
2) Super Computer
3) Micro Computer
4) Client
5) None of these
5. A bar which is seen at the bottom of the screen (usually) when the computer is turned on is known as:
1) Address Bar
2) Task Bar
3) Windows Bar
4) Line bar
5) None of these
6. Something which has easily understood instructions is said to be:
1) User friendly
2) Information
3) Word Processing
4) Icon
5) None of these
7. To save an existing file with a new name or to a new location, you should use the ..... command.
1) Save
2) Save and Replace
3) Save as
4) New file
5) None of these
8. Peripheral devices such as printers and monitors are considered to be:
1) Hardware
2) Software
3) Data
4) Information
5) None of these
9. In a database, ....... fields store numbers used to perform calculations.
1) Next
2) Key
3) Alpha Numeric
4) Numeric
5) None of these
10. Where is data saved permanently?
1) RAM
2) ROM
3) CPU
4) Printer
5) None of these
11. Which of the following describes relational database?
1) It provides relationship between integers
2) It consists of separate tables of related data
3) It retrieves data related to its queries
4) It provides the relationship between floats
5) None of these
12. Find the odd one out:
1) Projector
2) Speakers
3) Monitor
4) Microphone
5) Printer
13. A program for viewing webpages is called:
1) Word Processor
2) Spread sheet
3) Protocol
4) Browser
5) Database
14. Domain name Extension '.nic.in' is generally used for which of the following:
1) Organization websites
2) Educational Websites in india
3) Companies in india
4) e-governance websites
5) None of these
15. ........... view shows how the content on printed page, along with footer and margin header, appear.
1) Draft
2) Full screen reading
3) Outline
4) Page layout
5) None of these
16. What is the symbol for inbox in mail?
1) BOX
2) Envelope
3) Upper Case 'I'
4) Lower case 'I'
5) None of these
17. '©' symbol in computers refers to:
1) Copy
2) Circled 'C'
3) Copyright
4) Italicized C
5) None of these
18. Which of the following is a professional social networking site?
1) Facebook
2) Orkut
3) Twitter
4) LinkedIn
5) None of these
19. File ....... shrinks the size of a file so that it requires less storage space.
1) Scanning
2) Synthesizing
3) Defragmenting
4) Compression
5) None of these
20. Ctrl, shift, alt are called ....... keys.
1) Adjustment
2) Function
3) Modifier
4) Alphanumeric
5) None of these
21. An email address typically consists of user id followed by ........ and the domain name.
1) @
2) #
3) &
4) ∗
5) None of these
22. The name, a user assigns to a document is called:
1) File name
2) Program
3) Record
4) Data
5) None of these
23. ........... is processed by the computer into information.
1) Numbers
2) Processor
3) Input
4) Data
5) None of these
24. A menu contains a list of ........
1) commands
2) data
3) objects
4) reports
5) None of these
25. The internet allows you to:
1) Send electronic mail
2) View web pages
3) Connect to servers all around the world
4) All the above
5) None of these
26. Which of the following is a function of UPS?
1) It limits damage caused by fluctuating levels of electricity
2) It provides battery back up for limited time
3) It delivers electronic messages via a bus
4) It conducts a power-on self test or POST
5) None of these
27. Youtube, which provides a service of streaming videos online is provided by ....
1) Google
2) Microsoft
3) IBM
4) Apple
5) Sony
28. ...... is known as unauthorized access to others system.
1) Hacking
2) Encryption
3) Decryption
4) Trafficking
5) None of these
29. The vast network of computers that connects millions of people all over the world is called.......
1) LAN
2) Web
3) Hypertext
4) Internet
5) None of these
30. CRT stands for:
1) Copper Rod Tube
2) Campus Report Truncation
3) Completely Ready Tube
4) Cathode Ray Tube
5) None of these
31. To prevent a slide from being displayed during the slide show one should:
1) delete the slide
2) hide the slide by using animation button
3) hide the slide by using the slide show menu
4) Any of the above
5) None of the above
32. The ALU of a computer usually contains a number of high speed storage elements called ........
1) Semiconductor memory
2) Registers
3) Hard disk
4) Magnetic Disk
5) None of these
33. A connection from one HTML document to another HTML document is called:
1) Hyper Link
2) Connecting Link
3) Icon
4) All of these
5) None of these
34. Which of the following is true about RAM?
A) It is an acronym for Random Access Memory
B) It is memory built from silicon chips that is used to store programs and data temporarily while they are being processed
C) RAM stores the data permanently like Hard Disks
1) Only A and C
2) Only B and C
3) Only A and B
4) All the three
5) None of these
35. Capability of computer to perform more than one tasks at the same time is:
1) Batch Processing
2) Real Time Processing
3) Multitasking
4) Scheduled Processing
5) None of these
36. Computer Virus is:
1) A hardware
2) Windows tool
3) A computer program
4) Combination of 1 and 2
5) None of these
37. Firewall is used in communication network / system to save:
1) Unauthorized attack
2) Virus attack
3) Data driven attack
4) Fire attack
5) None of these
38. Which of the following can hold maximum data?
1) Optical disk
2) Floppy disk
3) Magnetic disk inside computer
4) Magnetic tape
5) None of these
39. ........ is a process of sending documents to a storage where they are temporarily stored and remain there until printer prints them.
1) Printing
2) Queuing
3) Waiting Queue
4) Print Spooling
5) None of these
40. The feature to customize the desktop to display information that can be updated from internet is:
1) Active desktop
2) Online desktop
3) E-mail
4) Resource Sharing
5) None of these
ANSWERS:
1-2; 2-4; 3-3; 4-1; 5-2; 6-1; 7-3; 8-1; 9-4; 10-2;
11-2; 12-4; 13-4; 14-4; 15-4; 16-2; 17-3; 18-4; 19-4; 20-3;
21-1; 22-1; 23-4; 24-1; 25-4; 26-2; 27-1; 28-1; 29-4; 30-4;
31-1; 32-2; 33-1; 34-3; 35-3; 36-3; 37-1; 38-4; 39-4; 40-1
1. Internet Protocol Version 4, Consists of
how many bits?
1) 16 bits
2) 8 bits
3) 30 bits
4) 32 bits
5) 64 bits
2. A computer virus is a software program which has the essential ability to-
1) Clone itself
2) Hide itself
3) Damage Program
4) Damage Data
5) None
3. Which of the following is the short cut for opening Task Manager?
1) Ctrl + Shift + Del
2) Alt + Shift + Del
3) Ctrl + Alt + Del
4) Alt + Windows + Del
5) None
4. A ....... is approximately equal to one billion bytes.
1) Kilobyte
2) Bit
3) Gigabyte
4) Megabyte
5) None
5. Which of the following operations is not performed by Computer?
1) Taking the input
2) Processing
3) Controlling
4) Understanding
5) None
6. ....... is a set of computer programs used on a computer to help perform tasks.
1) An instruction
2) Software
3) Memory
4) Processor
5) None
7. What is the capacity of a standard 3.5'' floppy disk?
1) 1.44 GB
2) 1.44 MB
3) 1.44 KB
4) 1.44 B
5) None
8. Which of the following Operating Systems does not have a Graphical User Interface?
1) UNIX
2) LINUX
3) Microsoft Windows
4) Mac OS
5) None
9. Which of the following shortcut keys is used to check spelling in Microsoft Word?
1) F1
2) F5
3) F4
4) F7
5) None
10. A collection of programs that controls how the computer runs and processes information is called:
1) Operating System
2) Computer
3) Office
4) Compiler
5) Interpreter
11. Which of the following is not an example of hardware?
1) Word
2) Printer
3) Monitor
4) Mouse
5) Scanner
12. Peripheral Devices such as Printers and Plotters are considered to be:
1) Hardware
2) Software
3) Data
4) Information
5) None
13. Find the odd one out.
1) Hard Disk
2) Flash Drive
3) DVD
4) CD
5) Monitor
14. To move the data from one part of the document to another, which of the following is used?
1) Cut and Paste
2) Copy and Paste
3) Cut and Delete
4) Copy and Undo
5) Cut and Insert
15. Which of the following is the full form of LSI?
1) Low Scale Information
2) Large Scale Information
3) Low Scale Integration
4) Large Scale Integration
5) Local Scale Integration
16. Which of the following is an active cell in Excel?
1) Current Cell
2) Formula
3) Range
4) Cell Address
5) None
17. Which of the following is the short cut key to center a paragraph?
1) Ctrl + C
2) Ctrl + E
3) Alt + P
4) Alt + C
5) None
18. In windows XP, what does 'XP' stand for?
1) XTRA Programming
2) XTREME Programming
3) XTRA Processing
4) XTREME Power
5) None
19. ADSL is the abbreviation of:
1) Asymmetric Digital Subscriber Line
2) Anti Dot Subscriber Line
3) Asymmetric
Digital System Line
4) Anti Digital
System Line
5) None
20. 'FIND' option is available under which of the following menu?
1) Tools
2) View
3) File
4) Edit
5) None
21. Which of the following keys launches 'Start' button?
1) Windows
2) Shift
3) Shortcut
4) Esc
5) None
22. Which of the following is not a type of error?
1) Logical Error
2) Runtime Error
3) Syntax Error
4) All the above
5) None
23. '.bmp' extension is used by which of the following software?
1) MS- Powerpoint
2) MS- Word
3) MS-Excel
4) Paint
5) All the above
24. Which of the following is the minimum zoom percentage supported by MS Word?
1) 10%
2) 15%
3) 25%
4) 4%
5) None
25. DSL is an example of ............ connection.
1) Network
2) Wireless
3) Slow
4) Broadband
5) None
26. The number of pixels displayed on a screen is known as the screen .....
1) Resolution
2) Colour Depth
3) Refresh Rate
4) Viewing Size
5) None
27. Which of the following is the correct order of the four major functions of a computer?
1) Process, Output, Input, Storage
2) Input, Output, Process, Storage
3) Process, Storage, Input, Output
4) Input, Process, Output, Storage
5) None
28. ....... servers store and manage files for network users.
1) Authentication
2) Main
3) Web
4) File
5) None
29. Which of the following keys is used to move to the bottom of the document?
1) Insert key
2) Home Key
3) Ctrl + End
4) End
5) None
30. Which of the following folder retains copies of mails that are started but are not yet ready to send?
1) Inbox
2) Outbox
3) Drafts
4) Sent Items
5) Address Box
31. Date and time are available on the desktop are available at which of the following places?
1) TaskBar
2) My Computer
3) Recycle Bin
4) Only 2 and 3
5) None
32. What is the full form of USB?
1) Universal Security Block
2) Universal Security Bus
3) Under Security Block
4) Universal Serial Block
5) Universal Serial Bus
33. Before beginning to use e-mail, one must have a(n)
1) Printer
2) Mouse
3) Server
4) Scanner
5) e-mail Account
34. Which of the following is the slowest Internet connection?
1) Digital Subscriber Line
2) T1
3) Cable Modem
4) Leased Line
5) Dial-Up
35. What happens when Ctrl + V is pressed?
1) A capital V letter is typed into your document at the cursor point
2) The selected item is pasted from the clipboard
3) The selected item is pasted to the Clipboard.
4) The selected drawing objects are distributed vertically on the page.
5) None
36. The speed of the clock frequency of a micro-processor is measured in ....
1) Hertz
2) Baud Rate
3) CPS
4) Bits
5) Bytes/sec
37. Which among the following has the smallest storage capacity?
1) Hard Disk
2) Floppy Disk
3) CD
4) DVD
5) Zip Disk
38. How many types of views are present in Power point?
1) 3
2) 4
3) 5
4) 6
5) None
39. Which of the following Computer languages is used for Artificial Intelligence?
1) FORTRAN
2) PROLOG
3) C
4) COBOL
5) None
40. What is the full form of SQL, related to Database?
1) Structured Queue Language
2) Systematic Queue Language
3) Structured Query Language
4) Systematic Query Language
5) None
1) 16 bits
2) 8 bits
3) 30 bits
4) 32 bits
5) 64 bits
2. A computer virus is a software program which has the essential ability to-
1) Clone itself
2) Hide itself
3) Damage Program
4) Damage Data
5) None
3. Which of the following is the short cut for opening Task Manager?
1) Ctrl + Shift + Del
2) Alt + Shift + Del
3) Ctrl + Alt + Del
4) Alt + Windows + Del
5) None
4. A ....... is approximately equal to one billion bytes.
1) Kilobyte
2) Bit
3) Gigabyte
4) Megabyte
5) None
5. Which of the following operations is not performed by Computer?
1) Taking the input
2) Processing
3) Controlling
4) Understanding
5) None
6. ....... is a set of computer programs used on a computer to help perform tasks.
1) An instruction
2) Software
3) Memory
4) Processor
5) None
7. What is the capacity of a standard 3.5'' floppy disk?
1) 1.44 GB
2) 1.44 MB
3) 1.44 KB
4) 1.44 B
5) None
8. Which of the following Operating Systems does not have a Graphical User Interface?
1) UNIX
2) LINUX
3) Microsoft Windows
4) Mac OS
5) None
9. Which of the following shortcut keys is used to check spelling in Microsoft Word?
1) F1
2) F5
3) F4
4) F7
5) None
10. A collection of programs that controls how the computer runs and processes information is called:
1) Operating System
2) Computer
3) Office
4) Compiler
5) Interpreter
11. Which of the following is not an example of hardware?
1) Word
2) Printer
3) Monitor
4) Mouse
5) Scanner
12. Peripheral Devices such as Printers and Plotters are considered to be:
1) Hardware
2) Software
3) Data
4) Information
5) None
13. Find the odd one out.
1) Hard Disk
2) Flash Drive
3) DVD
4) CD
5) Monitor
14. To move the data from one part of the document to another, which of the following is used?
1) Cut and Paste
2) Copy and Paste
3) Cut and Delete
4) Copy and Undo
5) Cut and Insert
15. Which of the following is the full form of LSI?
1) Low Scale Information
2) Large Scale Information
3) Low Scale Integration
4) Large Scale Integration
5) Local Scale Integration
16. Which of the following is an active cell in Excel?
1) Current Cell
2) Formula
3) Range
4) Cell Address
5) None
17. Which of the following is the short cut key to center a paragraph?
1) Ctrl + C
2) Ctrl + E
3) Alt + P
4) Alt + C
5) None
18. In windows XP, what does 'XP' stand for?
1) XTRA Programming
2) XTREME Programming
3) XTRA Processing
4) XTREME Power
5) None
19. ADSL is the abbreviation of:
1) Asymmetric Digital Subscriber Line
2) Anti Dot Subscriber Line
3) Asymmetric
Digital System Line
4) Anti Digital
System Line
5) None
20. 'FIND' option is available under which of the following menu?
1) Tools
2) View
3) File
4) Edit
5) None
21. Which of the following keys launches 'Start' button?
1) Windows
2) Shift
3) Shortcut
4) Esc
5) None
22. Which of the following is not a type of error?
1) Logical Error
2) Runtime Error
3) Syntax Error
4) All the above
5) None
23. '.bmp' extension is used by which of the following software?
1) MS- Powerpoint
2) MS- Word
3) MS-Excel
4) Paint
5) All the above
24. Which of the following is the minimum zoom percentage supported by MS Word?
1) 10%
2) 15%
3) 25%
4) 4%
5) None
25. DSL is an example of ............ connection.
1) Network
2) Wireless
3) Slow
4) Broadband
5) None
26. The number of pixels displayed on a screen is known as the screen .....
1) Resolution
2) Colour Depth
3) Refresh Rate
4) Viewing Size
5) None
27. Which of the following is the correct order of the four major functions of a computer?
1) Process, Output, Input, Storage
2) Input, Output, Process, Storage
3) Process, Storage, Input, Output
4) Input, Process, Output, Storage
5) None
28. ....... servers store and manage files for network users.
1) Authentication
2) Main
3) Web
4) File
5) None
29. Which of the following keys is used to move to the bottom of the document?
1) Insert key
2) Home Key
3) Ctrl + End
4) End
5) None
30. Which of the following folder retains copies of mails that are started but are not yet ready to send?
1) Inbox
2) Outbox
3) Drafts
4) Sent Items
5) Address Box
31. Date and time are available on the desktop are available at which of the following places?
1) TaskBar
2) My Computer
3) Recycle Bin
4) Only 2 and 3
5) None
32. What is the full form of USB?
1) Universal Security Block
2) Universal Security Bus
3) Under Security Block
4) Universal Serial Block
5) Universal Serial Bus
33. Before beginning to use e-mail, one must have a(n)
1) Printer
2) Mouse
3) Server
4) Scanner
5) e-mail Account
34. Which of the following is the slowest Internet connection?
1) Digital Subscriber Line
2) T1
3) Cable Modem
4) Leased Line
5) Dial-Up
35. What happens when Ctrl + V is pressed?
1) A capital V letter is typed into your document at the cursor point
2) The selected item is pasted from the clipboard
3) The selected item is pasted to the Clipboard.
4) The selected drawing objects are distributed vertically on the page.
5) None
36. The speed of the clock frequency of a micro-processor is measured in ....
1) Hertz
2) Baud Rate
3) CPS
4) Bits
5) Bytes/sec
37. Which among the following has the smallest storage capacity?
1) Hard Disk
2) Floppy Disk
3) CD
4) DVD
5) Zip Disk
38. How many types of views are present in Power point?
1) 3
2) 4
3) 5
4) 6
5) None
39. Which of the following Computer languages is used for Artificial Intelligence?
1) FORTRAN
2) PROLOG
3) C
4) COBOL
5) None
40. What is the full form of SQL, related to Database?
1) Structured Queue Language
2) Systematic Queue Language
3) Structured Query Language
4) Systematic Query Language
5) None
ANSWERS:
1-4; 2-1; 3-3; 4-3; 5-4; 6-2; 7-2; 8-1; 9-4; 10-1;
11-1; 12-1; 13-5; 14-1; 15-4; 16-1; 17-2; 18-2; 19-1; 20-4;
21-1; 22-5; 23-4; 24-1; 25-4; 26-1; 27-4; 28-3; 29-3; 30-3;
31-1; 32-5; 33-5; 34-5; 35-2; 36-1; 37-2; 38-2; 39-2; 40-3
1. Which of the following powerpoint view
displays each slide of the presentation as a thumbnail and is useful for
rearranging slides?
1) Slide show
2) Slide master
3) Slide sorter
4) Notes Page
5) Design Slide
2. A set of rules for telling the computer what operations to perform is / are called:
1) Structures
2) Procedural Language
3) Command Language
4) Natural Language
5) Programming Language
3. Devices that enter information and let you communicate with the computer are called:
1) Software
2) Hardware
3) Output Devices
4) Input / Output devices
5) Input Devices
4. The speed of which of the following memory chips is faster?
1) Not Fixed
2) DRAM
3) SRAM
4) For smaller chips SRAM is faster
5) For larger chips DRAM is faster
5. Mahesh Babu has his cute childhood photos in an album which might fade out in a couple of years, which he wants to show it to his fans by uploading it in his twitter account. Which of the following devices can he use to do that?
1) Keyboard
2) Mouse
3) Printer
4) Scanner
5) None of these
6. Which of the following is not a social networking site?
1) WAYN
2) Hi 5
3) Orkut
4) Yahoo
5) Facebook
7. In the URL https://twitter.com, what does 's' represent in 'https'?
1) Safe
2) System
3) Start-up
4) Semantic
5) Secured
8. Which among the following is the file extension for Word Documents?
1) .xls
2) .ppt
3) .docx
4) .worddoc
5) None
9. Linux Operating system is an example of which of the following?
1) Freeware
2) Open Source Software
3) Shareware
4) Complimentary
5) None of these
10. A device that connects to a network without the use of a cable is said to be:
1) Distributed
2) Non-Wired
3) Centralised
4) Open source
5) Wireless
11. Which of the following software applications would be most appropriate for performing Statistical and Numerical calculations:
1) Document Processor
2) Graphics Package II
3) Power Point
4) SpreadSheet
5) Meta Processor
12. Removing and replacing devices without turning off the computer is referred to as:
1) Search Engines
2) Operating System
3) Software
4) Resource Locators
5) Plug-n-Play
13. Mr. Prashanth has a song sung by him on the desktop, in the C drive, and also in the D drive. This scenario in computer language is generally referred to as:
1) Data Redundancy
2) Multiple Data Places
3) Various File Places
4) Data Inconsistency
5) Data Independent
14. What is a Firewall?
1) A wall to protect against Fire
2) A software to protect from computer hacker intrusions
3) A software to destroy computer
4) A wall to make partitions in computer
5) None of these
15. Chiranjeevi sent a mail to Pavan Kalyan by putting his email address in 'Cc' and to Nagababu by putting his email address in 'Bcc'. Which of the following is true based on the given scenario?
1) Pavan Kalyan can view the email address of Chiranjeevi and Nagababu
2) Nagababu can view the email address of Pavan Kalyan & Chiranjeevi
3) Pavan Kalyan can view the email address of Nagababu only
4) Both 1 and 2
5) None of them is true
16. When data changes in multiple lists and all lists are not updated, this causes:
1) Data Population Problem
2) Data Reduction
3) Data Induction
4) Data Overload
5) Data Inconsistency
17. The legal right to use software based on specific restrictions is granted via a:
1) Software privacy policy
2) Software License
3) Software password manager
4) Software log
5) None of these
18. Which of the following is not an operating system?
1) Windows 2000
2) DOS
3) Windows 7
4) Mac Os X Lion
5) Google
19. Find the Mis-Matched pair.
1) Chrome - Google
2) Opera - Opera Software
3) Internet Explorer - Microsoft
4) Safari - Net Scape Communications
5) None of these
20. What is the full form of RISC?
1) Reduced Instruction Set Computing
2) Reformed Instruction System Computing
3) Reduced Information System Computing
4) Restoration of Information in System Computing
5) Reduced Instruction Sect Code
21. The common name for Modulator and Demodulator is:
1) Modem
2) Joiner
3) Networker
4) Connecter
5) Mom-dom
22. In order to delete a sentence from a document you would use .......
1) Highlight and copy
2) Cut and Paste
3) Copy and Paste
4) Highlight and Delete
5) Select and Paste
23. What is the keyboard shortcut for Slide Show in Powerpoint ? :
1) F4
2) F8
3) F9
4) F5
5) F12
24. A ...... is a design tool that graphically shows the logic in a solution algorithm.
1) Flow chart
2) Hierarchy Chart
3) Structure Chart
4) Context Diagram
5) None
25. The justification that aligns text on both margins of a document in Word is ......
1) Justify
2) Bold
3) Centre
4) Right
5) Balanced
26. The Open, Print and Save Buttons are all located on the ......
1) Status Bar
2) Formatting Toolbar
3) Standard Toolbar
4) Titlebar
5) Status and Title bars
27. SMPS in a computer stands for?
1) Switched-Mode Power Supply
2) Simple-Mode Power Supply
3) Simple-Mode Power System
4) Switched-Menu Power Supply
5) None of these
28. The process of transforming information using an algorithm to make it unreadable by anyone is usually referred to as:
1) Decryption
2) Encryption
3) Alphabet Coding
4) Encrography
5) Deptography
29. ..... is a type of RAM that stores each bit of data in a separate capacitor within an integrated circuit making it an efficient way to store data in memory.
1) DRAM
2) PRAM
3) NRAM
4) NORAM
5) None
30. A computer network that uses Internet protocol technology to share information, Operational system, within an organization is usually referred to as ......
1) Internet
2) MAN
3) PAN
4) NPN
5) Intranet
31. What is the symbol for attachments in yahoo mail?
1) Envelope
2) Letter A
3) Paper Clip
4) Pen
5) None
32. Which of the following computers is used in Scientific researches?
1) Super Computers
2) Main Frame
3) Laptop
4) Micro Computers
5) None of these
33. Winzip is an example of :
1) Free ware
2) Shareware
3) Open Source
4) Vertical Market Software
5) None
34. ........... is the science that attempts to produce machines that display the same type of intelligence that humans do
1) Nanoscience
2) Nanotechnology
3) Simulation
4) Artificial intelligence (AI)
5) None
35. COBOL is an acronym for .............
1) Common Business Oriented Language
2) Computer Business Oriented Language
3) Common Business Operated Language
4) Common Business Organized Language
5) None of these
36. The human readable version of a software program is called:
1) cache
2) instruction set
3) source code
4) word size
5) None of these
37. Which of the following is not a programming language with Object Oriented Features?
1) COBRA
2) ABAP
3) C++
4) C#
5) C
38. Which of the following programming language is favoured for Artificial Intelligence?
1) ABAP
2) COBOL
3) LISP
4) JAVA
5) C#
39. The quickest and easiest way in Word, to locate a particular word or phrase in a document
1) Replace
2) Find
3) Lookup
4) Search
5) None of these
40. What symbol is present on the number key '2' on the keyboard?
1) !
2) %
3) ^
4) ∗
5) @
1) Slide show
2) Slide master
3) Slide sorter
4) Notes Page
5) Design Slide
2. A set of rules for telling the computer what operations to perform is / are called:
1) Structures
2) Procedural Language
3) Command Language
4) Natural Language
5) Programming Language
3. Devices that enter information and let you communicate with the computer are called:
1) Software
2) Hardware
3) Output Devices
4) Input / Output devices
5) Input Devices
4. The speed of which of the following memory chips is faster?
1) Not Fixed
2) DRAM
3) SRAM
4) For smaller chips SRAM is faster
5) For larger chips DRAM is faster
5. Mahesh Babu has his cute childhood photos in an album which might fade out in a couple of years, which he wants to show it to his fans by uploading it in his twitter account. Which of the following devices can he use to do that?
1) Keyboard
2) Mouse
3) Printer
4) Scanner
5) None of these
6. Which of the following is not a social networking site?
1) WAYN
2) Hi 5
3) Orkut
4) Yahoo
5) Facebook
7. In the URL https://twitter.com, what does 's' represent in 'https'?
1) Safe
2) System
3) Start-up
4) Semantic
5) Secured
8. Which among the following is the file extension for Word Documents?
1) .xls
2) .ppt
3) .docx
4) .worddoc
5) None
9. Linux Operating system is an example of which of the following?
1) Freeware
2) Open Source Software
3) Shareware
4) Complimentary
5) None of these
10. A device that connects to a network without the use of a cable is said to be:
1) Distributed
2) Non-Wired
3) Centralised
4) Open source
5) Wireless
11. Which of the following software applications would be most appropriate for performing Statistical and Numerical calculations:
1) Document Processor
2) Graphics Package II
3) Power Point
4) SpreadSheet
5) Meta Processor
12. Removing and replacing devices without turning off the computer is referred to as:
1) Search Engines
2) Operating System
3) Software
4) Resource Locators
5) Plug-n-Play
13. Mr. Prashanth has a song sung by him on the desktop, in the C drive, and also in the D drive. This scenario in computer language is generally referred to as:
1) Data Redundancy
2) Multiple Data Places
3) Various File Places
4) Data Inconsistency
5) Data Independent
14. What is a Firewall?
1) A wall to protect against Fire
2) A software to protect from computer hacker intrusions
3) A software to destroy computer
4) A wall to make partitions in computer
5) None of these
15. Chiranjeevi sent a mail to Pavan Kalyan by putting his email address in 'Cc' and to Nagababu by putting his email address in 'Bcc'. Which of the following is true based on the given scenario?
1) Pavan Kalyan can view the email address of Chiranjeevi and Nagababu
2) Nagababu can view the email address of Pavan Kalyan & Chiranjeevi
3) Pavan Kalyan can view the email address of Nagababu only
4) Both 1 and 2
5) None of them is true
16. When data changes in multiple lists and all lists are not updated, this causes:
1) Data Population Problem
2) Data Reduction
3) Data Induction
4) Data Overload
5) Data Inconsistency
17. The legal right to use software based on specific restrictions is granted via a:
1) Software privacy policy
2) Software License
3) Software password manager
4) Software log
5) None of these
18. Which of the following is not an operating system?
1) Windows 2000
2) DOS
3) Windows 7
4) Mac Os X Lion
5) Google
19. Find the Mis-Matched pair.
1) Chrome - Google
2) Opera - Opera Software
3) Internet Explorer - Microsoft
4) Safari - Net Scape Communications
5) None of these
20. What is the full form of RISC?
1) Reduced Instruction Set Computing
2) Reformed Instruction System Computing
3) Reduced Information System Computing
4) Restoration of Information in System Computing
5) Reduced Instruction Sect Code
21. The common name for Modulator and Demodulator is:
1) Modem
2) Joiner
3) Networker
4) Connecter
5) Mom-dom
22. In order to delete a sentence from a document you would use .......
1) Highlight and copy
2) Cut and Paste
3) Copy and Paste
4) Highlight and Delete
5) Select and Paste
23. What is the keyboard shortcut for Slide Show in Powerpoint ? :
1) F4
2) F8
3) F9
4) F5
5) F12
24. A ...... is a design tool that graphically shows the logic in a solution algorithm.
1) Flow chart
2) Hierarchy Chart
3) Structure Chart
4) Context Diagram
5) None
25. The justification that aligns text on both margins of a document in Word is ......
1) Justify
2) Bold
3) Centre
4) Right
5) Balanced
26. The Open, Print and Save Buttons are all located on the ......
1) Status Bar
2) Formatting Toolbar
3) Standard Toolbar
4) Titlebar
5) Status and Title bars
27. SMPS in a computer stands for?
1) Switched-Mode Power Supply
2) Simple-Mode Power Supply
3) Simple-Mode Power System
4) Switched-Menu Power Supply
5) None of these
28. The process of transforming information using an algorithm to make it unreadable by anyone is usually referred to as:
1) Decryption
2) Encryption
3) Alphabet Coding
4) Encrography
5) Deptography
29. ..... is a type of RAM that stores each bit of data in a separate capacitor within an integrated circuit making it an efficient way to store data in memory.
1) DRAM
2) PRAM
3) NRAM
4) NORAM
5) None
30. A computer network that uses Internet protocol technology to share information, Operational system, within an organization is usually referred to as ......
1) Internet
2) MAN
3) PAN
4) NPN
5) Intranet
31. What is the symbol for attachments in yahoo mail?
1) Envelope
2) Letter A
3) Paper Clip
4) Pen
5) None
32. Which of the following computers is used in Scientific researches?
1) Super Computers
2) Main Frame
3) Laptop
4) Micro Computers
5) None of these
33. Winzip is an example of :
1) Free ware
2) Shareware
3) Open Source
4) Vertical Market Software
5) None
34. ........... is the science that attempts to produce machines that display the same type of intelligence that humans do
1) Nanoscience
2) Nanotechnology
3) Simulation
4) Artificial intelligence (AI)
5) None
35. COBOL is an acronym for .............
1) Common Business Oriented Language
2) Computer Business Oriented Language
3) Common Business Operated Language
4) Common Business Organized Language
5) None of these
36. The human readable version of a software program is called:
1) cache
2) instruction set
3) source code
4) word size
5) None of these
37. Which of the following is not a programming language with Object Oriented Features?
1) COBRA
2) ABAP
3) C++
4) C#
5) C
38. Which of the following programming language is favoured for Artificial Intelligence?
1) ABAP
2) COBOL
3) LISP
4) JAVA
5) C#
39. The quickest and easiest way in Word, to locate a particular word or phrase in a document
1) Replace
2) Find
3) Lookup
4) Search
5) None of these
40. What symbol is present on the number key '2' on the keyboard?
1) !
2) %
3) ^
4) ∗
5) @
ANSWERS:
1-3; 2-5; 3-5; 4-3; 5-4; 6-4; 7-5; 8-3; 9-2; 10-5;
11-4; 12-5; 13-1; 14-2; 15-2; 16-5; 17-2; 18-5; 19-4; 20-1;
21-1; 22-4; 23-4; 24-1; 25-1; 26-3; 27-1; 28-2; 29-1; 30-5;
31-3; 32-1; 33-1; 34-4; 35-1; 36-3; 37-5; 38-3; 39-2; 40-5
1. Which type of memory gets lost when you
switch off?
1) ROM
2) RAM
3) CACHE
4) Dynamic
5) Static
2. Which type of network would use phone lines?
1) WAN
2) LAN
3) WWAN
4) Wireless
5) None of these
3. Speakers / Headphones are ____ devices.
1) Input
2) Input/ Output
3) Software
4) Storage
5) Output
4. A program for viewing web pages is called:
1) hardware
2) software
3) storage
4) browser
5) None of these
5. A computer cannot perform which of the following functions?
1) Addition
2) Subtraction
3) Bake a cake
4) Division
5) None of these
6. CD's or DVD's are ____ type of devices.
1) Input
2) Output
3) Software
4) Storage
5) Input/output
7. In the URL 'www.dbsdynamic.blogspot.in' what does the domain name extension '.in' represent?
1) International
2) internet
3) intra net
4) India
5) None of these
8. Free of cost repair of the software bug available in internet is called:
1) Version
2) Ad-on
3) Tutorial
4) FAR
5) Patch
9. Which of the following is READ only disc?
1) DVD-R
2) DVD-ROM
3) DVD-RW
4) CD-R
5) None of these
10. Which of the following is an/ are advantages of LAN?
1) Sharing peripherals
2) Backing up your data
3) Saving all your data
4) Accessing the web
5) Automatic printing of data
11. Four of the following are alike in a certain way and so form a group. Which is the one that does not belong to the group?
1) Applications
2) Peripherals
3) Programs
4) Software
5) Operating system
12. Digital camera is a ____device.
1) Input
2) Output
3) Software
4) Storage device
5) Input/ output
13. The example of standard file format is:
1) JPEG (.jpg)
2) Bitmap (.bmp)
3) Word (.doc)
4) Text (.txt)
5) Excel (.xls)
14. Which of the following is the fastest Memory?
1) Hard disk
2) DVD ROMs
3) Cache Memory
4) Static RAM
5) None of these
15. Which of the following is NOT a common feature of software application?
1) Menus
2) Windows
3) Help
4) Search
5) None of these
16. The ability of an Operating system to run more than one application at a time is called:
1) Multitasking
2) Multi user computing
3) Time sharing
4) Programming language
5) None of these
17. While filling up an application form which of the following keys is used to move the
cursor to the next box?
1) Esc
2) Shift
3) Control
4) Tab
5) Alt
18. The Softwares which are used in Banks generally are:
1) Character Driven
2) Folder Driven
3) Menu Driven
4) Touch screens
5) None of these
19. Which of the following is a measurement of speed of internet?
1) MB
2) Kbps
3) KB
4) TB
5) QPSI
20. When a computer is attacked by a virus it cannot lead to:
1) Disk Crash
2) Motherboard Crash
3) Corruption of a program
4) Deletion of files
5) None of these
21. In page preview mode-
1) You can see all pages of your document
2) You can only see the page you are currently working
3) You can only see pages that do not contain graphics
4) You can only see the title page of your document
5) None of these
22. What is the full form of EDI?
1) Electronic Data Information
2) Electronic Disk Information
3) Electric Data information
4) Electronic Data Interchange
5) None of these
23. How many different documents can be opened at one time?
1) Not more than Three
2) Only One
3) As many as your computer memory will hold
4) No more than your taskbar can display
5) None of these
24. Files are organized by storing them in:
1) Archives
2) Folders
3) Indexes
4) Lists
5) None of these
25. What kind of resource is most likely to be a shared common resource in a computer network?
1) Printers
2) Speakers
3) Floppy drives
4) Keyboards
5) None of these
26. Saving is a process to:
1) Copy the document from memory to storage medium
2) Bring change in the present status of the document
3) Change the face or entire form
4) Develop the document by recording the text with the use of keyboard
5) None of these
27. In word you can force a page break by:
1) Positioning your cursor at the appropriate place and pressing the F1 key
2) Using the Insert / section Break
3) By positioning your cursor at the appropriate place and pressing Ctrl + Enter
4) By changing the font size of your document
5) None of these
28. A computer cannot 'boot' if it does not have:
1) Compiler
2) Loader
3) Operating System
4) Assembler
5) None of these
29. The among of vertical space between lines
of text in a document is called :
1) Double-space
2) Line spacing
3) Single space
4) Vertical spacing
5) None of these
30. Which of the following shortcut keys is used to underline a word / line in a word document
1) Ctrl + L
2) Ctrl + U
3) Ctrl + K
4) Alt + U
5) Tab + L
31. A software which has a capability of replicating itself and can be harmful to the computer is:
1) MS-Office
2) Win Zip
3) Virus
4) Windows Media Player
5) Notepad
32. What is the full form of Wi-Fi?
1) Wireless Front
2) Wired Front
3) Wireless Fidelity
4) Wired Fidelity
5) None of these
33. The process of transferring files from a computer on the Internet to your computer is called:
1) Downloading
2) Uploading
3) FTP
4) JPEG
5) Downsizing
34. What is the full form of EPROM?
1) Erasable Programmable Read-Only Memory
2) Electronic Programmable Read-Only Memory
3) Enterprise Programmable Read-Only Memory
4) Extended Programmable Read-Only Memory
5) Electrical Programmable Read-Only Memory
35. CISC the abbreviation of:
1) Complex Instruction Set Code
2) Communication Instruction Set Computing
3) Complex Instruction Signal Computing
4) Communication Instruction Signal Code
5) Complex Instruction Set Computing
1) ROM
2) RAM
3) CACHE
4) Dynamic
5) Static
2. Which type of network would use phone lines?
1) WAN
2) LAN
3) WWAN
4) Wireless
5) None of these
3. Speakers / Headphones are ____ devices.
1) Input
2) Input/ Output
3) Software
4) Storage
5) Output
4. A program for viewing web pages is called:
1) hardware
2) software
3) storage
4) browser
5) None of these
5. A computer cannot perform which of the following functions?
1) Addition
2) Subtraction
3) Bake a cake
4) Division
5) None of these
6. CD's or DVD's are ____ type of devices.
1) Input
2) Output
3) Software
4) Storage
5) Input/output
7. In the URL 'www.dbsdynamic.blogspot.in' what does the domain name extension '.in' represent?
1) International
2) internet
3) intra net
4) India
5) None of these
8. Free of cost repair of the software bug available in internet is called:
1) Version
2) Ad-on
3) Tutorial
4) FAR
5) Patch
9. Which of the following is READ only disc?
1) DVD-R
2) DVD-ROM
3) DVD-RW
4) CD-R
5) None of these
10. Which of the following is an/ are advantages of LAN?
1) Sharing peripherals
2) Backing up your data
3) Saving all your data
4) Accessing the web
5) Automatic printing of data
11. Four of the following are alike in a certain way and so form a group. Which is the one that does not belong to the group?
1) Applications
2) Peripherals
3) Programs
4) Software
5) Operating system
12. Digital camera is a ____device.
1) Input
2) Output
3) Software
4) Storage device
5) Input/ output
13. The example of standard file format is:
1) JPEG (.jpg)
2) Bitmap (.bmp)
3) Word (.doc)
4) Text (.txt)
5) Excel (.xls)
14. Which of the following is the fastest Memory?
1) Hard disk
2) DVD ROMs
3) Cache Memory
4) Static RAM
5) None of these
15. Which of the following is NOT a common feature of software application?
1) Menus
2) Windows
3) Help
4) Search
5) None of these
16. The ability of an Operating system to run more than one application at a time is called:
1) Multitasking
2) Multi user computing
3) Time sharing
4) Programming language
5) None of these
17. While filling up an application form which of the following keys is used to move the
cursor to the next box?
1) Esc
2) Shift
3) Control
4) Tab
5) Alt
18. The Softwares which are used in Banks generally are:
1) Character Driven
2) Folder Driven
3) Menu Driven
4) Touch screens
5) None of these
19. Which of the following is a measurement of speed of internet?
1) MB
2) Kbps
3) KB
4) TB
5) QPSI
20. When a computer is attacked by a virus it cannot lead to:
1) Disk Crash
2) Motherboard Crash
3) Corruption of a program
4) Deletion of files
5) None of these
21. In page preview mode-
1) You can see all pages of your document
2) You can only see the page you are currently working
3) You can only see pages that do not contain graphics
4) You can only see the title page of your document
5) None of these
22. What is the full form of EDI?
1) Electronic Data Information
2) Electronic Disk Information
3) Electric Data information
4) Electronic Data Interchange
5) None of these
23. How many different documents can be opened at one time?
1) Not more than Three
2) Only One
3) As many as your computer memory will hold
4) No more than your taskbar can display
5) None of these
24. Files are organized by storing them in:
1) Archives
2) Folders
3) Indexes
4) Lists
5) None of these
25. What kind of resource is most likely to be a shared common resource in a computer network?
1) Printers
2) Speakers
3) Floppy drives
4) Keyboards
5) None of these
26. Saving is a process to:
1) Copy the document from memory to storage medium
2) Bring change in the present status of the document
3) Change the face or entire form
4) Develop the document by recording the text with the use of keyboard
5) None of these
27. In word you can force a page break by:
1) Positioning your cursor at the appropriate place and pressing the F1 key
2) Using the Insert / section Break
3) By positioning your cursor at the appropriate place and pressing Ctrl + Enter
4) By changing the font size of your document
5) None of these
28. A computer cannot 'boot' if it does not have:
1) Compiler
2) Loader
3) Operating System
4) Assembler
5) None of these
29. The among of vertical space between lines
of text in a document is called :
1) Double-space
2) Line spacing
3) Single space
4) Vertical spacing
5) None of these
30. Which of the following shortcut keys is used to underline a word / line in a word document
1) Ctrl + L
2) Ctrl + U
3) Ctrl + K
4) Alt + U
5) Tab + L
31. A software which has a capability of replicating itself and can be harmful to the computer is:
1) MS-Office
2) Win Zip
3) Virus
4) Windows Media Player
5) Notepad
32. What is the full form of Wi-Fi?
1) Wireless Front
2) Wired Front
3) Wireless Fidelity
4) Wired Fidelity
5) None of these
33. The process of transferring files from a computer on the Internet to your computer is called:
1) Downloading
2) Uploading
3) FTP
4) JPEG
5) Downsizing
34. What is the full form of EPROM?
1) Erasable Programmable Read-Only Memory
2) Electronic Programmable Read-Only Memory
3) Enterprise Programmable Read-Only Memory
4) Extended Programmable Read-Only Memory
5) Electrical Programmable Read-Only Memory
35. CISC the abbreviation of:
1) Complex Instruction Set Code
2) Communication Instruction Set Computing
3) Complex Instruction Signal Computing
4) Communication Instruction Signal Code
5) Complex Instruction Set Computing
ANSWERS:
1-2; 2-1; 3-5; 4-4; 5-3; 6-4; 7-4; 8-5; 9-2; 10-1;
11-2; 12-5; 13-4; 14-3; 15-2; 16-1;17-4; 18-3; 19-2; 20-2;
21-1; 22-4; 23-3; 24-2; 25-1; 26-1; 27-3; 28-3; 29-2; 30-2;
31-3; 32-3; 33-2; 34-1; 35-5
11-2; 12-5; 13-4; 14-3; 15-2; 16-1;17-4; 18-3; 19-2; 20-2;
21-1; 22-4; 23-3; 24-2; 25-1; 26-1; 27-3; 28-3; 29-2; 30-2;
31-3; 32-3; 33-2; 34-1; 35-5
Thank you for your nice sharing about
ReplyDeletepaint barcode using c#
I have been reading your posts regularly. I need to say that you are doing a fantastic job. Please keep up the great work.
ReplyDelete123hpremoteassistance Officejet 7110 Printer Setup