Вы находитесь на странице: 1из 136

1.

The basic goal of computer process is to convert data into (1) information (2) tables (3) files (4) graphs (5) None of these Answer : 1 2. Software allows users to perform calculations on rows and columns of data. (1) Word processing (2) Presentation graphics (3) Database Management Systems (4) Electronic Spreadsheet (5) None of these Answer : 3 3. The memory resident portion of the operating system is called the : (1) registry (2) API (3) CMOS (4) kernel (5) None of these Answer : 4 4. Which of the following is a transaction? (1) A group of SQL statements consisting of one read and one write operation (2) A group of SQL statements consisting only of ready operations. (3) A group of SQL statements defining a user-oriented task (4) A group of SQL statements consisting only of write operations. (5) None of these

Answer : 1 5. In order for computers to communicate across a network, they must beconnected through a(n) (1) TCP/IP (2) Topology (3) Ethernet (4) Thin client (5) None of these Answer : 2 6. Buy Now Pay Now is commonly used for : (1) Debit Cards (2) Vault Cards (3) Credit Cards (4) E-purse (5) None of these Answer : 1 7. The , stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM. (1) BIOS (2) API (3) device driver (4) supervisor program (5) display Answer : 1 8. Choices in computers are referred to as : (1) options (2) exit

(3) boot (4) folder (5) None of these Answer : 1 9. The button on the quick access Toolbar allows you to cancel your recent commands or actions. (1) Search (2) Cut (3) Document (4) Undo (5) None of these Answer : 4 10. During the boot process, the looks for the system files. (1) HDD (2) BIOS (3) CPU (4) DVD (5) CD Answer : 2 11. Computers gather data, which means they allow users to data. (1) present (2) store (3) output (4) input (5) None of these Answer : 4 12. Which of the following is a transaction?

(1) A group of SQL statements consisting of one read and one write operation (2) A group of SQL statements consisting only of ready operations. (3) A group of SQL statements defining a user-oriented task (4) A group of SQL statements consisting only of write operations. (5) None of these Answer : 3 13. What are the four basis connecting hardware devices? (1) Repeater, bridge, router and gateway (2) Repeater, bridge, router and dell (3) Repeater, connector, router and gateway (4) Amplifier, bridge, router and gateway (5) None of these Answer : 1 14. The lists the location of files on the disk (1) FAT (2) boot sector (3) root folder (4) data area (5) None of these Answer : 1 15. A device operating at the physical layer is called a : (1) Bridge (2) Router (3) Repeater (4) All of the above (5) None of these Answer : 3

16. Number of bits per symbol used in Baudot code is (1) 5 (2) 6 (3) 7 (4) 8 (5) 9 Answer : 1 17. All of the following statements concerning windows are true EXCEPT : (1) windows are an example of a command-driven environment. (2) windows can be resized and repositioned on the desktop. (3) more than one window can be open at a time. (4) toolbars and scrollbars are features of windows. (5) None of these. Answer : 1 18. A client / server network . (1) has clients that provide functions such as application control and shared computation. (2) uses client computers to provide copies of software to the server to allow server processing. (3) provides a company with the capability to downsize from lager computer systems and move away from legacy systems. (4) has server computers that perform all processing, clients are dumb’ input/ output devices only. (5) None of these. Answer : 2 19. To get to the Symbol dialog box, click on the menu and chooseSymbol. (1) Insert

(2) Format (3) Tools (4) Table (5) Help Answer : 1 20. Which is not a data source component? (1) mail merge toolbar (2) header row (3) data fields (4) data records (5) All of these 21. Use this when you want to make all letters capital without having to use the shift key for each character (1) shifter (2) upper case (3) caps lock key (4) icon (5) None of these Answer : 3 22. When you quickly press and releaes the left mouse button twice, you are : (1) Primary-clicking (2) pointing (3) Double-clicking (4) Secondary-clicking (5) None of these Answer : 3 23. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the view.

(1) List (2) Thumbnails (3) Details (4) Icon (5) None of these Answer : 3 24. Programming language built into user programs such as Word and Excel are known as (1) 4GLs (2) macro languages (3) object-oriented languages (4) visual programming languages (5) None of these Answer : 4 25. To move a copy of file from one computer to another over a communication channel is called? (1) File transfer (2) File encryption (3) File modification (4) File copying (5) None of the above Answer : 1 26. Which of the following is not a type of hub? (1) Passive hub (2) Inactive hub (3) Switching hub (4) Intelligent hub (5) None of these Answer : 2

27. allows you to print. (1) ribbon (2) monitor (3) go now (4) Control-P (5) None of these Answer : 4 28. Ina synchronous modem, the receive equilizer is known as (1) adaptive equilizer (2) impariment equilizer (3) statistical equalizer (4) compromise equilizer (5) None of these Answer : 1 29. Which of the following is not the part of standard office suite? (1) Word Processor (2) Database (3) Image Editor (4) File manager (5) None of these Answer : 4 30. In a document what is the maximum number of columns that can be inserted in MS Word Table? (1) 35 (2) 15 (3) 63 (4) 65 (5) 70

Answer : 3 31. Where does most data go first with in a computer memory hierarchy? (1) RAM (2) ROM (3) BIOS (4) CACHE (5) None of these Answer : 1 32. COBOL is an acronym for (1) Common Business Oriented Language (2) Computer Business Oriented Language (3) Common Business Operated Language (4) Common Business Organized Language (5) None of these Answer : 1 33. Machine language sometimes also referred as : (1) Binary language (2) High level language (3) Middle level language (4) Low level language (5) None of these Answer : 1 34. When creating a computer program, the designs the structure of the program (1) End user (2) System Analyst (3) Programmer (4) Architect

(5) All of the above Answer : 2 35. Which is an another name for functional language (1) Machine (2) Application (3) Low-level language (4) High-level language (5) None of these Answer : 2 36. is data that has been organized or presented in a meaningful fashion. (1) A process (2) Software (3) Storage (4) Information (5) None of these Answer : 4 37. Every computer connected to an intranet or extranet must have a distinct (1) firewall (2) proxy server (3) IP address (4) domain name (5) None of these Answer : 3 38. translates the semantic instructions developed by programmers into the machine language

(1) Assembler (2) Interpreter (3) Loader (4) Complier (5) None of these Answer : 1 39. is an artificial language designed to communicate instructions to a computer. (1) Programming language (2) Machine language (3) Software language (4) Assembly language (5) None of these Answer : 1 40. This is a standard way for a Web server to pass a Web users request to an application program and to receive data back to forward to the user(1) Interrupt request (2) Forward DNS lookup (3) Data-Link layer (4) File Transfer Protocol (5) Common gateway interface Answer : 5 1. The capability of the operating system to enable two or more than twoprograms to execute simultaneously in a single computer system by using a single processor is (1) Multiprocessing (2) Multitasking (3) Multiprogramming (4) Multiexecution (5) None of these

Answer : 2 42. Virtual memory is typically located: (1) on a floppy disk (2) in the CPU. (3) in a flash card (4) on the hard drive. (5) None of these Answer : 4 43. This type of software is designed for users who want to customize theprograms they use. (1) Shareware (2) Open-source software (3) Freeware (4) Macros (5) None of these Answer : 1 44. The effect of the ROLLBACK command in a transaction is the following (1) Undo all changes to the data- base resulting from the execution of the transaction (2) Undo the effects of the last UPDATE command (3) Restore the content of the database to its state at the end of the previous day (4) Make sure that all changes to the database are in effect (5) None of these Answer : 1 45. A result of a computer virus cannot lead to :

(1) Disk Crash (2) Mother Board Crash (3) Corruption of program (4) Deletion of files (5) None of these Answer : 2 46. The smallest item of useful information a computer can handle (1) bite (2) byte (3) bit (4) bait (5) None of these Answer : 3 47. All of the following are TRUE of Safe Mode EXCEPT: (1) Safe Mode is a special diagnostic mode. (2) Safe Mode loads all nonessential icons. (3) Safe Mode allows users to troubleshoot errors. (4) Safe Mode loads only the most essential devices. (5) None of these Answer : 2 48. Superscript, subscript, outline, emboss, engrave are known as : (1) font styles (2) font effects (3) word art (4) text effects (5) None of these Answer : 2

49. Changing the appearance of a document is called (1) Proofing (2) Editing (3) Formatting (4) Correcting (5) All of the above Answer : 3 50. You can detect spelling and grammar errors by : (1) Press Shift + F7 (2) Press Ctrl + F7 (3) Press Alt+ F7 (4) Press F7 (5) None of these Answer : 4 51. What kind of memory is both static and non-volatile? (1) RAM (2) ROM (3) BIOS (4) CACHE (5) PROM Answer : 2 52. A process known as is used by large organization to study trends. (1) data mining (2) data selection (3) POS (4) data conversion (5) None of these

Answer : 1 53. A(n) system is a small, wireless handheld computer that scans an items tag and pulls up the current price (and any special offers) as you shop. (1) PSS (2) POS (3) inventory (4) data mining (5) None of these Answer : 1 54. cells involve creating a single cell by combining two or more selected cells. (1) Formatting (2) Merging (3) Embedding (4) Splitting (5) None of these Answer : 2 55. Single party disk relying on the disk controller for finding out which disk has failed is used by : (1) RAID level 5 (2) RAID level 2 (3) RAID level 4 (4) RAID level 3 (5) RAID level 1 Answer : 4 56. The sharing of a medium and its path by 2 or more devices is called (1) Modulation

(2) Encoxing (3) Line discipline (4) Multiplexing (5) None of these Answer : 4 57. What happens when you click on Insert > Picture > Clip Art (1) It inserts a clipart picture into document (2) It lets you choose clipart to insert into document (3) It opens Clip Art taskbar (4) It insets symbols (5) None of these Answer : 3 58. Which of the following does NOT occur during the power-on self-test (POST)? (1) The ScanDisk utility begins to run. (2) The video card and video memory are tested. (3) The BIOS identification process occurs. (4) Memory chips are checked to ensure they are working properly. (5) None of these Answer : 1 59. OLE stands for : (1) Online Link Embedding (2) Object Link Export (3) Object Linking and Embedding (4) Online Link Emulation (5) None of these Answer : 3

60. Which of the following is not available in Font Spacing? (1) Normal (2) Loosely (3) Condensed (4) Expanded (5) All are available Answer : 2 maintain pages of documents that are being spooled to the printer. (2) hold a programs data or instructions in virtual memory when it cant fit in RAM. (3) prevent thrashing in a multitasking environment. (4) allow multiple print jobs to print their pages out simultaneously. (5) None of these Answer : 2 62. Software programs that allow you to legally copy files and give them away at no cost are called which of the following : (1) Time sharing (2) Public domain (3) Shareware (4) Freeware (5) None of these Answer : 3 63. Which of the following is NOT a goal of Transaction processing system? (1) Capture, process and store transactions (2) Produce a variety of documents related to Routine business activities (3) Reduce manual effort associated with Processing business transactions (4) Produce standard reports used for Management decision making

(5) None of the above Answer : 2 64. The degree of detail that should be incorporated into a database depends on what? (1) Data integrity (2) The type of database (3) The users perspective (4) The business practices and policies (5) None of these Answer : 2 65. Superscript refers to (1) Characters displayed below the line of the normal text (2) Characters displayed above the line of the normal text (3) Characters displayed vertically centre (4) Both (1) and (2) (5) None of these Answer : 2 66. A is an additional set of commands that the computer displays after you make a selection from the main menu : (1) dialog box (2) submenu (3) menu selection (4) All of the above (5) None of these Answer : 1 67. The difference between people with access to computers and the Internet and those without this access is known as the :

(1) digital divide (2) Internet divide (3) Web divide (4) broadband divide (5) None of these Answer : 1 68. How will you remove all formatting added to your documents (such as bold, italics, and underline etc.) (1) Save (2) Save as plain text file (3) Save as (4) All of the above (5) None of these Answer : 2 69. With the object-oriented (OO) approach, an object encapsulates, or a programmer. (1) carries out, the details of an object for (2) hides, the details of an object from (3) reveals, the details of an object to (4) extends, the details of an object beyond (5) None of these Answer : 2 70. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called : (1) robotics (2) simulation (3) computer forensics (4) animation (5) None of these

Answer : 3 71. Granting an outside organisation access to Internet web pages is oftenimplemented using a (an) : (1) Extranet (2) Intranet (3) Internet (4) Hacker (5) None of these Answer : 1 72. The purpose of the primary key in a database is to : (1) Unlock the database (2) Provide a map of the data (3) Uniquely identify a record (4) Establish constraints on database operations (5) None of the above Answer : 3 73. The code that relational database management Systems use to perform their database task is referred to as : (1) QBE (2) SQL (3) OLAP (4) Sequel Server (5) None of these Answer : 2 74. VIRUS stands for : (1) Vital Information Recourse Under Siege (2) Vital Information Reason Under Siege

(3) Vital Information Recourse Under System (4) Virus Information Recourse Under Siege (5) None of these Answer : 1 75. Data becomes ................ when it is presented in a format that people canunderstand and use. (1) processed (2) graphs (3) information (4) presentation (5) None of these Answer : 3 76. The term ............. designates equipment that might be added to a computer system to enhance its functionality. (1) digital device (2) system add-on (3) disk pack (4) peripheral device (5) None of these Answer : 4 77. is the language that enable user to access or manipulate data asorganized by appropriate data model : (1) DML (2) SDL (3) DDL (4) All of the above (5) None of these Answer : 1

78. The user commands that are used to interact with a database is called as : (1) Query (2) Interaction (3) Command (4) Instruction (5) None of these Answer : 3 79. RAM can be thought of as the ......... for the computers processor : (1) factory (2) operating room (3) waiting room (4) planning room (5) None of these Answer : 3 80. is computer software designed to operate the computer hardware and to provide platform for running application software : (1) Application software (2) System software (3) Software (4) Operating system (5) None of these Answer : 2 An assembler is used to translate a program written in (1) a low level language (2) machine language (3) a high level language (4) assembly language (5) None of these

Answer :4 82. The operating system controls access to the processor by assigning a(n) to each task requiring the processors attention. (1) CPU (2) slice of time (3) stack (4) event (5) None of these Answer :2 83. Which of the following is the correct sequence of actions that takes place during the boot-up process? (1) Load operating system - Activate BIOS-Perform POST-Check configuration settings (2) Activate BIOS-Perform POST-Load operating system-Check configuration settings (3) Perform POST - Load operating system - Activate BIOS - Check configuration settings (4) Activate BIOS - Check configuration settings - Perform POST -Load operating system (5) None of these Answer :2 84. Using Windows Explorer, a plus (+) sign in front of a folder indicates : (1) an open folder (2) the folder contains subfolders (3) a text file (4) a graphics file (5) None of these Answer :2

85. Which of the following position is not available for fonts on MS Word? (1) Normal (2) Raised (3) Lowered (4) Centered (5) All are available Answer :4 86. Buy Now Pay Later is commonly used for : (1) Debit Cards (2) Vault Cards (3) Credit Cards (4) E-purse (5) None of these Answer :3 87. The different styles of lettering in a word processing program (1) font (2) calligraphy (3) writing (4) manuscript (5) None of these Answer :1 88. To move down a page in a document (1) jump (2) fly (3) wriggle (4) scroll (5) None of these

Answer :4 89. Compilers can identify: (1) syntax errors (2) semantic errors (3) logical errors (4) mathematical errors (5) None of these Answer :1 90. Which was the first Scientific Computer Programming Language? (1) COBOL (2) LISP (3) ADA (4) FORTRAN (5) JAVA Answer : 4 91. A hard copy of a document is (1) stored in the hard disk (2) stored on a floppy (3) stored on a CD (4) printed on the paper (5) None of these Answer :4 92. Flow control in TCP/IP is handled using: (1) Urgent pointer (2) Checksum (3) Acknowledgement number (4) Variable-size sliding window (5) None of these

Answer :4 93. This component is required to process data into information and consists of integrated circuits . (1) Hard disk (2) RAM (3) CPU (4) ROM (5) None of these Answer :3 94. From which menu you can insert Header and Footer? (1) Insert Menu (2) View Menu (3) Format menu (4) Tools Menu (5) Edit Menu Answer :2 95. Moves the cursor one space to the right to puts spaces in between words (1) control key (2) space bar (3) printer (4) mouse (5) None of these Answer :2 96. Shimmer, Sparkle text, Blinking Background etc. are known as : (1) font styles (2) font effects

(3) word art (4) text effects (5) None of these Answer :4 97. The horizontal and vertical lines on a worksheet are called : (1) cells (2) sheets (3) block lines (4) gridlines (5) None of these Answer :4 98. The basic input/output system (BIOS) is stored in: (1) RAM (2) ROM (3) the CPU (4) the hard drive (5) None of these Answer :2 99. Which of the following features usually applies to data in a data warehouse? (1) Data are often deleted (2) Most applications consists of transactions (3) Data are rarely deleted (4) Relatively few records are processed by applications (5) None of these Answer :2

100. What type of program controls the various computer parts and allows the user interact with the computer ? (1) Utility software (2) Operating system (3) Word processing software (4) Database program (5) None of these Answer :1 101. Which of the following is an example of connectivity? (1) data (2) hard disk (3) Internet (4) power cord (5) None of these Answer :3 102. The command used to remove text or graphics from a document. Theinformation is then stored on a clipboard so you can paste it. (1) chop (2) cut (3) clip (4) cart away (5) None of these Answer :2 103. People, procedures, software, hardware, and data are the five parts of a(n) : (1) competency system (2) computer system (3) information system (4) software system (5) None of these

Answer :3 104. The feature of Word that automatically adjusts the amount of spacebetween certain combinations of characters so that an entire word looks more evenly spaced. What is that feature called? (1) Spacing (2) Scaling (3) Kerning (4) Positioning (5) None of these Answer :3 105. Which of the following statement is wrong? (1) Windows XP is an operating system (2) Linux is owned and sold by Microsoft (3) Photoshop is a graphical design tool by Adobe (4) Linux is free and open source software (5) None of the above Answer :2 106. A phenomenon in virtual memory schemes in which the processor spends most of the time swapping pages rather than executing instructions is : (1)loading (2) swapping (3) thrashing (4) aging (5) digging Answer :3

107. Give the name of the Linear list in which elements can be added at ends but not in the middle: (1) Array (2) Queue (3) Tree (4) Circular Queue (5) None of these Answer :2 108. Flip-flop is the basic structure of the device: (1) Hard disk (2) Memory (3) Cells (4) Speakers (5) None of these Answer :2 109. What is a specialized software program that allows input and output devices to communicate with the rest of the computer system? (1) Utility driver (2) Utility program (3) Data compression utility (4) Device driver (5) None of these Answer :4 110. When assigning a shortcut key to a symbol, you should always try to select a key or key combination that is: (1) unassigned (2) Located on the ten-key pad section of your keyboard. (3) Assigned to another task. (4) From the same font family as the symbol.

(5) None of these Answer :1 111. Which American Computer Company is called big blue? (1) Microsoft (2) Compaq Corp (3) IBM (4) Tandy Sevenson (5) Hewlett Packard Answer :3 112. A dumb terminal has : (1) An embedded microprocessor (2) Extensive memory (3) Independent processing (4) A keyboard and screen (5) None of these Answer :2 113. Which of the following is a software selection criteria? (1) Appropriateness (2) Efficiency (3) Compatibility (4) All of the above (5) None of these Answer :2 114. Which of the following memories needs refresh? (1) SRAM (2) DRAM

(3) ROM (4) All of above (5) None of these Answer :4 115. is paperless document transfer between companies. (1) EFT (2) EDI (3) ETS (4) RTGS (5) None of these Answer :4 116. The switching devices used in First Generation computers were: (1) Transistors (2) SSI chips (3) VLSI chips (4) Vacuum Tubes (5) None of these Answer :4 117. The Virtual Memory is located logically : (1) in the CPU (2) in main memory (3) in between CPU and primary memory (4) in the Hard disk (5) None of these Answer :2 118. A software used to convert source program instructions to object instruction is known as :

(1) Compiler (2) Assembler (3) Interpreter (4) Language processor (5) None of these Answer :4 119. The subject of cybernetics deals with the science of : (1) Genetics (2) Control and communications (3) Molecular biology (4) Biochemistry (5) None of these Answer :2 120. WAIS stands for : (1) Wide Area Intellectual Service (2) Web Access Information system (3) World wide Application of Intelligent System (4) Wide Area Information Service (5) None of these Answer :4 21. Correcting errors in a program is referred to as (1) debugging (2) bugging (3) rectifying (4) modifying (5) None of these Answer: 1

122. Which type of processing speed measurement is used primarily withsupercomputers? (1) Flops (2) Fractions of second (3) Gigahertz (4) MIPS (5) None of these Answer: 1 123. What is the term associated with the second part of an e-mail address? (1) Local address (2) Eight characters long (3) User name (4) Domain name (5) None of these Answer: 4 124. Bold, Italic, Regular are known as : (1) font styles (2) font effects (3) word art (4) text effects (5) None of these Answer: 1 125. This is a group of servers that share work and may be able to back each other up if one server fails. (1) Channel bank (2) Cluster (3) Tiger team (4) Serverless backup

(5) Logical unit Answer: 2 126. Smart Card is : (1) Special purpose Cards (2) Microprocessor Cards (3) Processing unit contains memory for storing data (4) Processing unit for software handling (5) None of these Answer: 2 127. A screen element of MS Word that is usually located below the title bar that provides categorized options is : (1) Menu mar (2) Tool Bar (3) Status Bar (4) All of the above (5) None of these Answer: 1 128. Which keys can be used together with other keys for special tasks ? (1) Insert, Delete (2) Ctrl, Shift (3) Left Arrow, Right Arrow (4) Page up, Page Down (5) None of these Answer: 2 129. Data related crime does not incorporate : (1) Data Didling (2) Data Spying

(3) Data Leakage (4) Data Mining (5) None of these Answer: 4 130. DOS floppy disk does not have : (1) A Boot Record (2) A File Allocation Table (3) A Root Directory (4) Virtual Memory (5) None of these Answer: 4 131. A disk on which you store information (1) plate (2) data disk (3) paper disk (4) TV disk (5) None of these Answer: 2 132. Lets you leave a screen or program (1) boot (2) programs (3) exit (4) text (5) None of these Answer: 3 133. The operating system does all of the following EXCEPT: (1) provide a way for the user to interact with the computer.

(2) manage the central processing unit (CPU). (3) manage memory and storage. (4) enable users to perform a specific task such as document editing. (5) None of these Answer: 4 134. MS-DOS is a operating system. (1) point-and-click (2) user-friendly (3) command-driven (4) Mac (5) None of these Answer: 3 135. Procedures are typically documented in manuals written by : (1) computer specialists (2) end users (3) Microsoft (4) service providers (5) None of these ] Answer: 1 136. What deletes the entire file except the file structure ? (1) ERASE (2) DELETE (3) ZAP (4) PACK (5) None of these Answer: 3 137. takes one line, checks it for errors and then executes it.

(1) Assembler (2) Interpreter (3) Loader (4) Complier (5) None of these Answer: 2 138. Artificial Intelligence is associated with which generation? (1) First Generation (2) Second Generation (3) Third Generation (4) Fifth Generation (5) Sixth Generation Answer: 4 139. Time during which a job is processed by the computer is : (1) Delay times (2) Real time (3) Execution time (4) Down time (5) None of these Answer: 3 140. Which of the following is not an input device? (1) OCR (2) Optical scanners (3) Voice recognition device (4) COM (Computer Output to Microfilm) (5) None of these Answer: 4 41. In latest generation computers, the instructions are executed :

(1) Parallel only (2) Sequentially only (3) Both sequentially and parallel (4) All of above (5) None of these Answer: 3 142. A technique used by codes to convert an analog signal into a digital bit stream is known as : (1) Pulse code modulation (2) Pulse stretcher (3) Query processing (4) Queue management (5) None of these Answer: 1 143. The number of bits that can be transmitted over a network in a certainperiod of time: (1) Latency (2) Delay (3) Bandwidth (4) Baud (5) None of these Answer: 3 144. Linux partitions are created using the file system: (1) FAT (2) FAT32 (3) EXT3 (4) NTFS (5) None of these

Answer: 3 145. Which of the following data structure is widely used in a network model RDBMS? (1) Arrays (2) trees (3) graphs (4) stacks (5) None of these Answer: 3 146. The scientist who developed the idea of the WWW is : (1) James Gosling (2) Tim Berns Lee (3) Andrew Tannenbaum (4) Linus Torvalds (5) Bill Gates Answer: 2 147. What was the data transmission method in which bi-directional data flow is allowed? (1) Simplex (2) Duplex (3) Analog (4) Single side mode (5) None of these Answer: 2 148. To check the presence of a computer in the network, use the command: (1) ping (2) cmd

(3) check (4) ipconfig (5) connect Answer: 1 149. The word processing task associated with changing the appearance of a document is : (1) Editing (2) Writing (3) Formatting (4) All of above (5) None of these Answer: 3 150. Easy to use (1) user friendly (2) select (3) helpful (4) ever-ready (5) None of these Answer: 1 151. Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs (1) menu bar (2) tool bar (3) user friendly (4) word processor (5) None of these Answer: 1

152. Anything written on the screen (1) cursor (2) text (3) folder (4) boot (5) None of these Answer: 2 153. Which of the following is not the major function of a computer ? (1) Processing data into information (2) Storing data or information (3) Gathering data (4) Analysing data or information (5) None of these Answer: 4 154. A method of executing two or more programs concurrently using the same computer describe: (1) multi processing (2) multiprogramming (3) virtual processing (4) time sharing (5) None of these Answer: 2 155. When you save to your data will remain intact even when thecomputer is turned off. (1) RAM (2) motherboard (3) secondary storage device (4) primary storage device (5) None of these

Answer: 3 156. A one-time password is : (1) one that changes every time it is used (2) one that is assigned once and not changed at all. (3) one that can be used only at a particular time of the day (4) one that is assigned for all session that starts at a particular time (5) None of these Answer: 1 157. A hardware interface that allows for the connection of several peripheral devices to a single PCI board. (1) SCSI (2) SATA (3) ATA (4) PCI (5) None of these Answer: 1 158. is a language, instead of using numbers; programmers began usingEnglish like abbreviations (Mnemonics) to represent the elementary operations. (1) Machine language (2) Mnemonics language (3) Assembly level language (4) High level language (5) None of the these Answer: 3 159. Encryption decryption are functions of : (1) Transport layer

(2) Session layer (3) Presentation layer (4) All of the above (5) None of these Answer: 2 160. The process of building a model that demonstrate the features of a proposed product, service or system is called a : (1) JAD (2) RAD (3) templating (4) prototyping (5) TAD Answer: 4 161. Memory, also called random access memory, or RAM. (1) contains the electronic circuits that cause processing to occur (2) makes the information resulting from processing available for use (3) allows data, programs, commands, and user responses to be entered into a computer (4) consists of electronic components that store data (5) None of these Answer: 4 162. A represent approximately one billion memory locations. (1) kilobyte (2) megabyte (3) gigabyte (4) terabyte (5) None of these Answer: 3

163. An interrupt handler is a(n): (1) location in memory that keeps track of recently generated interrupts. (2) peripheral device. (3) utility program. (4) special numeric code that indicates the priority of a request (5) None of these Answer: 4 164. All of the following are steps involved in the boot process EXCEPT: (1) load the operating system into RAM. (2) the power-on self-test. (3) activate the basic input/output system (BIOS). (4) load application programs. (5) None of these Answer: 4 165. A port that allows 8 bits at a time to be transmitted simultaneously is a(n) . (1) dedicated port (2) parallel port (3) SCSI port (4) USB port (5) None of these Answer: 2 166. Which of these terms refers to the feature of an OS that allows a single computer to process the tasks of several users at different stations, in round-robin fashion? (1) Multiprocessing (2) Multiprogramming (3) Multitasking (4) Time processing

(5) Time-sharing Answer: 5 167. A program which helps create written documents and lets you go back and make corrections as necessary (1) spreadsheet (2) personal writer (3) word printer (4) word processor (5) None of these Answer: 4 168. Screen that comes on when you turn on your computer that shows all the icons (1) desktop (2) face to face (3) viewer (4) view space (5) None of these Answer: 1 169. A place that a user can create to store files (1) cursor (2) text (3) folder (4) boot (5) None of these Answer: 3 170. Electronic pens are used with the mouse to write on a slide in which view?

(1) Master (2) Slide Sorter (3) Slide Show (4) Normal (5) Print preview Answer: 3 171. When you insert a picture and adjust the height, Word automatically adjusts the to maintain the correct proportion. (1) pixel size (2) resolution (3) screen size (4) width (5) None of these Answer: 4 172. Which of the following is NOT one of the steps in the machine cycle? (1) Execute (2) Store (3) Decode (4) Pipelining (5) None of these Answer: 4 173. How many peripheral devices can be connected to a single SCSI port? (1) 1 (2) 8 (3) 16 (4) 32 (5) 64 Answer: 2

174. The four-step process of fetch, decode, execute, and store is called a(n): (1) machine cycle (2) instruction cycle (3) arithmetic operation (4) logical operation (5) None of these Answer: 1 175. All of the following are TRUE regarding virtual memory EXCEPT : (1) any amount of RAM can be allocated to virtual memory. (2) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed. (3) this temporary storage is called the swap file or page file. (4) virtual memory is physical space on the hard drive. (5) None of these Answer: 1 176. The operating system is the most common type of software. (1) communication (2) application (3) system (4) word-processing (5) None of these Answer: 3 177. The human-readable version of a program is called (1) source code (2) program code (3) human code

(4) system code (5) None of these Answer: 4 178. Data are in client/server computing. (1) never sent to the client machine (2) sent in very large sections to save processing time (3) sent only upon the clients request (4) sent in complete copies for the client to filter and sort (5) sent from the client to the server for processing Answer: 3 179. The total set of interlinked hypertext documents worldwide is : (1) HTT (2) Browser (3) WWW (4) B2B (5) None of these Answer: 1 180. Which of the following is not one of the three Mail Merge Helper steps? (1) Merge the two files (2) Create the main document (3) Set the mailing list parameters (4) Create the data source (5) None of these Answer: 3 181. Which is the part of a computer that one can touch and feel ? (1) Programs (2) Software

(3) Hardware (4) Output (5) None of these Answer: 3 182. A command to get a file you worked on from the memory where it was stored (1) close (2) delete (3) open (4) get it (5) None of these Answer: 3 183. There are several security devices used to stop individuals from exploiting your system. Which of the following is used in conjunction with a firewall? (1) Proxy server (2) Intrusion-detection system (3) Terminal server (4) Web server (5) None of these Answer: 1 184. Array is (1) Linear data structure (2) non-linear data structure (3) simple data structure (4) complex data structure (5) None of these Answer: 1

185. A computer checks the of user names and passwords for a match before granting access. (1) website (2) network (3) backup file (4) database (5) None of these Answer: 4 186. Which of the following is the latest version of MS Word? (1) Word 2000 (2) Word 2007 (3) Word 2010 (4) Word 2011 (5) Word 2012 Answer: 3 187. In the online world of electronic commerce, what do the initials CEM stands for ? (1) Costly E-Commerce Marketing (2) Customer Experience Management (3) Customer Experience Misleading (4) Cost Estimates are Mind Boggling (5) None of these Answer: 2 188. What type of program controls the various computer parts and allows the user interact with the computer ? (1) Utility software (2) Operating system (3) Word processing software (4) Database program (5) None of these

Answer: 1 189. Which of the following transmission systems provide the highest data rate to in individual device? (1) computer bus (2) telephone lines (3) voice and mode (4) lease lines Answer: 1 190. The combination of the operating system and the processor is referred to as the computers: (1) CPU (2) platform (3) BIOS (4) CMOS (5) None of these Answer: 2 191. The operating system allows users to organize the computers contents in a hierarchical structure of directories that include all of the following EXCEPT: (1) files (2) folders (3) drives (4) systems (5) None of these Answer: 4 192. Leaves of which of the following trees are at the same level ? (1) Binary tree (2) B-tree

(3) AVL-tree (4) Expression tree (5) None of these Answer: 2 193. The transformation of a message into an encoded form is known as : (1) Mnemonics (2) Encoding (3) Encryption (4) Decoding (5) None of these Answer: 2 194. Firewalls are used to protect against (1) Unauthorized Attacks (2) Virus Attacks (3) Data Driven Attacks (4) Fire Attacks (5) All of these Answer: 1 195. Auto correct was originally designed to replace words as you type. (1) Short, repetitive (2) Grammatically incorrect (3) Misspelled (4) Half (5) None of these Answer: 3

196. Ensuring that the essential peripheral devices are attached and operational is the process. (1) configuration (2) CMOS (3) POST (4) ROM (5) check Answer: 3 197. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an: (1) action (2) event. (3) interrupt (4) activity (5) None of these Answer: 3 198. Before a package can be used in a java program it must be (1) executed (2) referenced (3) imported (4) declared (5) None of these Answer: 3 199. The definition of thrashing is: (1) swapping data between virtual memory and RAM too frequently. (2) insufficient hard disk space. (3) too many processors being managed by the operating system. (4) inaccurate information stored in the registry (5) None of these

Answer: 1 200. The primary device that a computer uses to store information (1) register (2) storehouse (3) desk (4) hard drive (5) None of these Answer: 4 201. Which of the following is a disadvantage of machine language? 1) Machine Dependent 2) Slower Execution 3) Machine Independent 4) It requires Translation 5) None of these Answer: 1 202. Android Operating system is an example of which kind of Source Model? 1) Open Source 2) Vertical Market Software 3) Horizontal Market Software 4) Shareware 5) None of these Answer:1 203. Cache memory is an example of which of the following? 1) Virtual Memory 2) Non Volatile Memory 3) Static Random Access Memory

4) Secondary Memory 5) None of these Answer:3 204. A software that is not protected by copyright or trademark is ...... 1) Vertical Market Software 2) Public Domain Software 3) Shareware Software 4) Trialware 5) Adware Answer:2 205. Which of the following programming languages is associated with Artificial Intelligence? 1) C 2) B 3) C++ 4) JAVA 5) PROLOG Answer:5 206. AltaVista is a(n) 1) Windows Utility 2) Search engine 3) Program 4) Antivirus 5) None of these Answer:2 207. The term Hard copy is related to: 1) Storing data on Hard Disk 2) Output displayed on Monitor 3) Scanned Image

4) Printouts 5) None of the above Answer:4 208. MIME is an acronym for .... 1) Multiprogramming Internet Mail Extension 2) Multicasting Internet Mail Extension 3) Multiple Internet Mail Extension 4) Multipurpose Internet Mail Extension 5) None of these Answer: 4 209. Any crime that involves a Computer and a Network is called: 1) Virus 2) Malware 3) Trojan Horse 4) Cyber crime 5) Identity Theft Answer: 4 210. Which of the following generation computers is referred to an expertsystem? 1) 2nd 2) 1st 3) 4th 4) 3rd 5) 5th Answer: 5 211). ......... is a set of instructions. 1) Hardware 2) Code

3) Language 4) Program 5) All the above Answer: 4 212. Which of the following is the keyboard short-cut for permanent deletion of a file/folder in windows? 1) Del. 2) Shift + Del. 3) Ctrl + Del. 4) Alt + Enter 5) None of these Answer: 2 213. Which of the following is an Object Oriented Programming Language? 1) C 2) Java 3) C++ 4) Both 2 and 3 5) Both 1 and 2 Answer: 4 214. The popular name for Information Super Highway is: 1) Intranet 2) Extranet 3) Virtual Private Network 4) MAN 5) Internet Answer: 5 215. Encryption is primarily used in: 1) Computer Processing

2) File retention 3) Data communication 4) Data Storage 5) None of these Answer: 3 216. The main folder on a storage device is called ..... 1) Root directory 2) Interface 3) Device driver 4) Platform 5) Main directory Answer: 1 217. To protect the computer from hacker intrusions, ..... must be installed. 1) Firewall 2) Mailer 3) Script 4) Yahoo Messenger 5) None of these Answer: 1 218. Which of the following is used to read handwritten or printed text to make a digital image that is stored in memory? 1) Printer 2) Laser beam 3) Scanner 4) Touchpad 5) None of these Answer: 3 219. A program designed to destroy data on the computer which can travel to infect other computers is called a .....

1) Hurricane 2) Infector 3) Disease 4) Virus 5) None Answer: 4 220. Thesaurus option is available in ..... menu. 1) Page layout 2) References 3) Review 4) View 5) Layout Answer: 3 221. Blu-Ray disk is an example of a(n) .... 1) Hard disk 2) Magnetic Disk 3) Optical Disk 4) Output Device 5) None of these Answer:3 222. Which of the following is true about Name box? 1) It appears at the left of the formula bar 2) It appears below the menu bar 3) It shows the locations of the active cell. 4) Both 1 and 3 5) Both 2 and 3 Answer:4 223. Which of the following is known as non volatile memory?

1) Hard Disk 2) Floppy Disk 3) CD-ROM 4) DVD-ROM 5) All the above Answer: 5 224. Auto correct function option is present in ..... menu of MS Word. 1) View 2) Insert 3) Format 4) Tools 5) Table Answer: 4 225. Which of the following is another name for pre-programmed formula in Excel? 1) Range 2) Graph 3) Function 4) Cell 5) None of these Answer: 3 226. ALU works on the instructions held in ....... 1) Notebook 2) Registers 3) Notepad 4) Clipboard 5) I/O Devices Answer: 2 227. To see the document before the printout is taken, use .......

1) Insert Table 2) Paste 3) Format Painter 4) Cut 5) Print Preview Answer: 5 228. .... helps create, manipulate and analyze data arranged in rows and columns? 1) Application Package 2) Word Processing Package 3) Outlining Package 4) Outline Processors 5) Spreadsheet Package Answer: 5 229. A register that keeps track of the next instruction to be executed is called a(n): 1) Data Register 2) Instruction Register 3) Action Register 4) Program Counter 5) None of these Answer: 2 230. Which of the following is the feature that keeps track of the right margin? 1) Find and Replace 2) Dragged Right 3) Ruler 4) Right Justified 5) Left Justified

Answer: 4 231. A network which connects cities or states is known as: 1) LAN 2) CAN 3) PAN 4) VPN 5) MAN Answer: 5 232. Which of the following allows you to insert graphics into a word document? 1) Callouts 2) Flowcharts 3) Basic Shapes 4) All of the above 5) None of these Answer: 4 233. An email address consists of: 1) Domain name 2) User name 3) Username followed by password 4) Domain name followed by user name 5) Username followed by domain name Answer: 5 234. ERP is an acronym for: 1) Enterprise Retirement Planning 2) Enterprise Relationship Planning 3) Enterprise Resource Planning 4) Enterprise Reorder Planning 5) None of these

Answer: 3 235. ...... is the storage area for e-mails. 1) Folder 2) Mail box 3) Directory 4) Hard Disk 5) None of these Answer: 2 236. Three types of Compact disks include CD-ROM, CD-R and ...... 1) CD-W 2) CD-RAM 3) CD-DVD 4) CD-RW 5) None of these Answer: 4 237. Collecting personal information and effectively posing as another individual is known as: 1) Spooling 2) Spoofing 3) Hacking 4) Identity Theft 5) None of these Answer: 2 238. Which of the following controls the manner of interaction between the user and the operating system? 1) Language Translator 2) Platform 3) User Interface

4) Icon 5) None of these Answer: 3 239. Which of the following best defines Embedded system? 1) A program that comes wrapped in a box 2) A program that is permanent part of a computer 3) A computer that is a part of a larger computer 4) A computer and software system that controls a machine 5) None of these Answer: 4 240. The .......... Settings are automatic and standard. 1) Default 2) CPU 3) Peripheral 4) User-friendly 5) None of these Answer: 1 241. Which of the following power point view displays each slide of thepresentation as a thumbnail and is useful for rearranging slides? 1) Slide show 2) Slide master 3) Slide sorter 4) Notes Page 5) Design Slide

Answer: 3 242. A set of rules for telling the computer what operations to perform is / are called: 1) Structures

2) Procedural Language 3) Command Language 4) Natural Language 5) Programming Language Answer: 5 243. Devices that enter information and let you communicate with the computer are called: 1) Software 2) Hardware 3) Output Devices 4) Input / Output devices 5) Input Devices Answer: 5 244. The speed of which of the following memory chips is faster? 1) Not Fixed 2) DRAM 3) SRAM 4) For smaller chips SRAM is faster 5) For larger chips DRAM is faster Answer: 3 245. Mahesh Babu has his cute childhood photos in an album which might fade out in a couple of years, which he wants to show it to his fans by uploading it in his twitter account. Which of the following devices can he use to do that? 1) Keyboard 2) Mouse 3) Printer 4) Scanner 5) None of these

Answer: 4 246. Which of the following is not a social networking site? 1) WAYN 2) Hi 5 3) Orkut 4) Yahoo 5) Facebook Answer: 4 247. In the URL https://twitter.com, what does 's' represent in 'https'? 1) Safe 2) System 3) Start-up 4) Semantic 5) Secured Answer: 5 248. Which among the following is the file extension for Word Documents? 1) .xls 2) .ppt 3) .docx 4) .worddoc 5) None Answer: 3 249. Linux Operating system is an example of which of the following? 1) Freeware 2) Open Source Software 3) Shareware 4) Complimentary 5) None of these

Answer: 2 250. A device that connects to a network without the use of a cable is said to be: 1) Distributed 2) Non-Wired 3) Centralised 4) Open source 5) Wireless Answer: 5 251. Which of the following software applications would be most appropriate for performing Statistical and Numerical calculations: 1) Document Processor 2) Graphics Package II 3) Power Point 4) Spreadsheet 5) Meta Processor Answer: 4 252. Removing and replacing devices without turning off the computer is referred to as: 1) Search Engines 2) Operating System 3) Software 4) Resource Locators 5) Plug-n-Play Answer: 5 253. Mr. Prashanth has a song sung by him on the desktop, in the C drive, and also in the D drive. This scenario in computer language is generally referred to as: 1) Data Redundancy

2) Multiple Data Places 3) Various File Places 4) Data Inconsistency 5) Data Independent Answer: 1 254. What is a Firewall? 1) A wall to protect against Fire 2) A software to protect from computer hacker intrusions 3) A software to destroy computer 4) A wall to make partitions in computer 5) None of these Answer: 2 255. Chiranjeevi sent a mail to Pavan Kalyan by putting his email address in 'Cc' and to Nagababu by putting his email address in 'Bcc'. Which of the following is true based on the given scenario? 1) Pavan Kalyan can view the email address of Chiranjeevi and Nagababu 2) Nagababu can view the email address of Pavan Kalyan & Chiranjeevi 3) Pavan Kalyan can view the email address of Nagababu only 4) Both 1 and 2 5) None of them is true Answer: 2 256. When data changes in multiple lists and all lists are not updated, this causes: 1) Data Population Problem 2) Data Reduction 3) Data Induction 4) Data Overload 5) Data Inconsistency

Answer: 5 257. The legal right to use software based on specific restrictions is granted via a: 1) Software privacy policy 2) Software License 3) Software password manager 4) Software log 5) None of these Answer: 2 258. Which of the following is not an operating system? 1) Windows 2000 2) DOS 3) Windows 7 4) Mac Os X Lion 5) Google Answer: 5 259. Find the Mis-Matched pair. 1) Chrome - Google 2) Opera - Opera Software 3) Internet Explorer - Microsoft 4) Safari - Net Scape Communications 5) None of these Answer: 4 260. What is the full form of RISC? 1) Reduced Instruction Set Computing 2) Reformed Instruction System Computing 3) Reduced Information System Computing

4) Restoration of Information in System Computing 5) Reduced Instruction Sect Code Answer: 1 261. The common name for Modulator and Demodulator is: 1) Modem 2) Joiner 3) Networker 4) Connecter 5) Mom-dom Answer: 1 262. In order to delete a sentence from a document you would use ....... 1) Highlight and copy 2) Cut and Paste 3) Copy and Paste 4) Highlight and Delete 5) Select and Paste Answer: 4 263. What is the keyboard shortcut for Slide Show in Powerpoint ? : 1) F4 2) F8 3) F9 4) F5 5) F12 Answer: 4 264. A ...... is a design tool that graphically shows the logic in a solution algorithm. 1) Flow chart 2) Hierarchy Chart

3) Structure Chart 4) Context Diagram 5) None Answer: 1 265. The justification that aligns text on both margins of a document in Word is ...... 1) Justify 2) Bold 3) Centre 4) Right 5) Balanced Answer: 1 266. The Open, Print and Save Buttons are all located on the ...... 1) Status Bar 2) Formatting Toolbar 3) Standard Toolbar 4) Titlebar 5) Status and Title bars Answer: 3 267. SMPS in a computer stands for? 1) Switched-Mode Power Supply 2) Simple-Mode Power Supply 3) Simple-Mode Power System 4) Switched-Menu Power Supply 5) None of these Answer: 1 268. The process of transforming information using an algorithm to make it unreadable by anyone is usually referred to as: 1) Decryption

2) Encryption 3) Alphabet Coding 4) Encrography 5) Deptography Answer: 2 269. ..... is a type of RAM that stores each bit of data in a separate capacitorwithin an integrated circuit making it an efficient way to store data in memory. 1) DRAM 2) PRAM 3) NRAM 4) NORAM 5) None Answer: 1 270. A computer network that uses Internet protocol technology to shareinformation, Operational system, within an organization is usually referred to as 1) Internet 2) MAN 3) PAN 4) NPN 5) Intranet Answer: 5 271. What is the symbol for attachments in yahoo mail? 1) Envelope 2) Letter A 3) Paper Clip 4) Pen 5) None

Answer: 3 272. Which of the following computers is used in Scientific researches? 1) Super Computers 2) Main Frame 3) Laptop 4) Micro Computers 5) None of these Answer: 1 273. Winzip is an example of : 1) Free ware 2) Shareware 3) Open Source 4) Vertical Market Software 5) None Answer: 1 274. ........... is the science that attempts to produce machines that display the same type of intelligence that humans do 1) Nanoscience 2) Nanotechnology 3) Simulation 4) Artificial intelligence (AI) 5) None Answer: 4 275. COBOL is an acronym for ............. 1) Common Business Oriented Language 2) Computer Business Oriented Language 3) Common Business Operated Language 4) Common Business Organized Language 5) None of these

Answer: 1 276. The human readable version of a software program is called: 1) cache 2) instruction set 3) source code 4) word size 5) None of these Answer: 3 277. Which of the following is not a programming language with Object Oriented Features? 1) COBRA 2) ABAP 3) C++ 4) C# 5) C Answer: 5 278. Which of the following programming language is favoured for Artificial Intelligence? 1) ABAP 2) COBOL 3) LISP 4) JAVA 5) C# Answer: 3 279. The quickest and easiest way in Word, to locate a particular word or phrase in a document 1) Replace 2) Find 3) Lookup

4) Search 5) None of these Answer: 2 280. What symbol is present on the number key '2' on the keyboard? 1) ! 2) % 3) ^ 4) @ 5) * Answer: 4 281. A digital communication system capable of interconnecting, a large number of computers, terminals and other peripheral devices within a limited geographical area is called 1. LAN 2. WAN 3. Internet 4. All of the above 5. None of these Answer: 1 282. A secondary storage device that uses a long plastic strip coated with amagnetic material as a recording medium is 1. Magnetic tape 2. Compact disk 3. Hard disk 4. All of the above 5. None of these Answer: 1 283. An E-mail protocol for storage, manage-ment and change, especially in corporate offices

1. Message handling service 2. Postal services 3. Data storage 4. All of the above 5. None of these Answer: 1 284. Which of the following is an advantage of stored programs? 1. Reliability 2. Reduction in operation costs 3. The computers becoming general-purpose 4. All of the above 5. None of these Answer: 1 285. Which of the following is not true for primary storage? 1. It is a part of the CPU 2. It allows very fast access of data 3. It is relatively more expensive then other storage devices. 4. Can be removed and transported. 5. All of the above Answer: 1 286. Function of control unit in the CPU is 1. To decode program instructions 2. To transfer data to primary storage 3. To perform logical operations 4. To store program instructions 5. All of the above Answer: 4 287. Electronic spreadsheets are useful in situation where relatively .......... data must be input

1. Small 2. Large 3. No 4. All of the above 5. None is true Answer: 1 288. A list of options from which a program user can select anyone in order to perform a desired action is referred as 1. Menu 2. Index 3. Directory 4. All of the above 5. None of these Answer: 2 289. A method whereby messages to be transmitted between computers are all sent to a central computer, which gathers them and routes them to the appropriate destination(s) is known as 1. Message switching 2. Message delete 3. Message accept 4. All of the above 5. None of these Answer: 1 290. Which of the following describe one or more characteristics of a modem computer? 1. An electronic device 2. A mechanical device 3. A electro-mechanical device 4. All of the above 5. None of these

Answer: 1 291. Combining records from two or more ordered files into a single ordered file is called 1. Menu 2. Merging 3. Taking 4. All of the above 5. None of these Answer: 1 292. The ascending order of a data hierarchy is 1. Bit-byte-record-field-file-database 2. Byte-bit-field-record-file-database 3. Byte-bit-record-file-field-database 4. Bit-byte-field-record-file-database 5. All of the above Answer: 2 293. A LSI chip contains the entire CPU of computer except main memory is called 1. Microprocessor 2. Hard disk 3. Input device 4. Output device 5. All of the above Answer: 4 294. A storage medium that loses its contents in the event of power failure is called 1. Volatile storage 2. Non volatile storage

3. Permanent storage 4. All of the above 5. None of these Answer: 1 295. One-millionth of a second is referred as 1. Microsecond 2. Millisecond 3. Hour 4. Minute 5. All of the above Answer: 1 296. Alternate facilities of programs, data files, hardware equipments, etc. used in case the original one is destroyed, lost, or fail to operate is 1. Backup 2. Forehead 3. Delete 4. All of the above 5. None of these Answer: 1 297. One-thousandth of a second is called 1. Microsecond 2. Millisecond 3. Hour 4. Minute 5. All of the above Answer: 1 298. The CPU (central processing unit) consists of 1. Input, output, and processing 2. Control unit, primary storage, and secondary storage 3. Control unit, arithmetic-logic unit, and primary storage

4. All of the above 5. None of these Answer: 2 299. The product of data processing is 1. Data 2. Information 3. Software 4. Computer 5. All of the above Answer: 3 300. The input device used by computer is 1. Motherboard 2. Central processing unit 3. Keyboard 4. System unit 5. All of the above Answer: 2 301. The structure of interconnecting of nodes of a computer network is referred as 1. Network topology 2. Internet 3. Local Area Network 4. Wide Area Network 5. All of the above Answer: 3 302. Nible is 1. Double of byte 2. Half of byte 3. Ten times of byte

4. Five times of byte 5. All of the above Answer: 1 303. Multiprogramming is the 1. The inter-leaved execution of two or more different and independent programs by the same computer 2. The execution of single by the different computers 3. The inter-leaved execution of two or more different and independent programs by the different computers 4. All of the above 5. None of these Answer: 2 304. A facility available in an operating system that allows multiple functions from the same application package is referred as 1. Multi-threading 2. Multi-programming 3. Multi-processing 4. All of the above 5. None of these Answer: 1 305. Narrowband channel is a communication channels 1. That handle low volumes of data 2. Used mainly for telegraph lines and low speed terminals 3. Both 1. and 2. 4. All of the above 5. None of these Answer: 1

306. Following is the example of Network 1. LAN 2. WAN 3. Internet 4. All the above 5. None of these Answer: 4 307. Peer-to-peer is a description 1. Of communications between two dissimilar devices 2. Of communications between two equal devices 3. Of communications between two different devices 4. All of the above 5. None of these Answer: 4 308. Non-document files are 1. Pure ASCII files that can be listed for any word processing software 2. Non ASCII files that can be listed for any word processing software 3. Pure ASCII files that can be listed for specific word processing software 4. Non ASCII files that can be listed for pecific word processing software 5. All of the above Answer: 2 309. The method of dividing a physical channel into many logical channels so that a number of independent signals may be simultaneously transmitted on it is referred as 1. Multithreading 2. Multiprocessing 3. Multiplexing 4. All of the above 5. None of these

Answer: 2 310. An interconnected computer configura-tions or computers with two or more independent CPUs that have the ability to simultaneously execute several programs is called 1. Multithreading 2. Multiprocessing 3. Multiplexing 4. All of the above 5. None of these Answer: 3 311. Following is not a non-impact printer 1. Thermal printer 2. Ink-jet printer 3. Laser printer 4. Dot-matrix printer 5. All of the above Answer: 2 312. A number system with a base of 8 is referred as 1. Binary 2. Decimal 3. Octal 4. All of the above 5. None of these Answer: 3 313. Devices converts digital signals to Sine waves at the sending end and back to digital signals at the receiving end is called 1. Modem 2. Telephone 3. Mobile phone

4. All of the above 5. None of these Answer: 3 314. Dividing a project into segments and smaller units in order to simplify the analysis, design and programming effort is referred as 1. Monitoring 2. Modular approach 3. Microprocessing 4. All of the above 5. None of these Answer: 1 315. The technique where digital signals are converted to its analog form for transmission over an analog facility is called 1. Modulation 2. Digitization 3. Multiprocessing 4. All of the above 5. None of these Answer: 2 316. Multiprocessor is a computer system 1. Where many CPU under a common control 2. Consisting of more than one input devices under common control 3. Where many output devices under 4. All of the above 5. None of these Answer: 1 317. The point at which the flow of text in a document moves to the top of a new page

1. Page break 2. Page insert 3. Page format 4. All of the above 5. None of these Answer: 1 318. Technique to implement virtual memory where memory is divided into units of fixed size memory is 1. Paging 2. De-fragments 3. Segmentation 4. All of the above 5. None of these Answer: 1 319. An adder where all the bits of the two operands are added simultaneously 1. Parallel adder 2. Half adder 3. Full adder 4. All of the above 5. None of these Answer: 1 320. An extra bit added to a string of bits that enables the computer to detect internal errors in the transmission of binary data 1. Parity bit 2. Byte 3. Nibble 4. All of the above 5. None of these

Answer: 1321. Password is 1. Code by which a user gains access to a computer system 2. Pass for viewing movie 3. Entrance without paying something 4. All of the above 5. None of these Answer: 1 322. PL 1 (Programming Language One) is 1. High level programming language 2. Low level programming language 3. Machine language 4. Assembly language 5. All of the above Answer: 1 323. Pascal is 1. A high-level programming language 2. Named after Blaise Pascal 3. Named after mathematician that facilitates structured programming techniques 4. All of the above 5. None of these Answer: 1 324. Storage device where time to retrieve stored information is independent of address where it is stored is called 1. Random access memory (RAM) 2. Primary memory 3. Secondary memory 4. All of the above 5. None of these

Answer: 4 325. Octal number system has a base 1. Two 2. Four 3. Eight 4. Ten 5. All of the above Answer: 3 326. Since input and output devices are on the edge of the main processing therefore they are referred as 1. Peripheral devices 2. Processing devices 3. Personal devices 4. All of the above 5. None of these Answer: 3 327. A system changeover method where complete changeover to the newsystem takes place incrementally over a period of time is referred as 1. Phased replacement 2. Block replacement 3. Complete replacement 4. All of the above 5. None of these Answer: 1 328. One trillionth of a second is 1. Pico second 2. Mille second 3. Micro second

4. Minute 5. All of these Answer: 1 329. Following is of Non-vo a storage device 1. Magnetic tape 2. Compact disk 3. Floppy disk 4. All of the above 5. None of these Answer: 1 330. A storage medium that retains its contents even in the absence of power is referred as 1. Non-volatile storage 2. Volatile storage 3. Secondary storage 4. Primary storage 5. None of these Answer: 4 331. If a word is typed that is not in Words dictionary, a ___ wavy underlineappears below the word. (A) red (B) green (C) blue (D) black (E) None of these Ans (A) 332. The _____ button on the quick access Toolbar allows you to cancel your recent commands or actions. (A) Search

(B) Cut (C) Document (D) Undo (E) None of these Ans (D) 333. In Excel, any set of characters containing a letter , hyphen, or space isconsidered ___ (A) a formula (B) text (C) a name (D) a title (E) None of these Ans (B) 334. ________ Software allows users to perform calculations on rows andcolumns of data. (A) Word processing (B) Presentation graphics (C) Database Management Systems (D) Electronic Spreadsheet (E) None of these Ans (C) 335. A _________ represent approximately one billion memory locations. (A) kilobyte (B) megabyte (C) gigabyte (D) terabyte (E) None of these Ans (C)

336. ______ cells involves creating a single cell by combining two or moreselected cells. (A) Formatting (B) Merging (C) Embedding (D) Splitting (E) None of these Ans (B) 337. The operating system is the most common type of ______________software. (A) communication (B) application (C) system (D) word-processing (E) None of these Ans (C) 338. When you quickly press and releaes the left mouse button twice , you are ____ (A) Primary-clicking (B) pointing (C) Double-clicking (D) Secondary-clicking (E) None of these Ans (C) 339. The horizontal and vertical lines on a worksheet are called ___ (A) cells (B) sheets

(C) block lines (D) gridlines (E) None of these Ans (D) 340. To delete an incorrect character in a document, __________ to erase to the right of the insertion point. (A) press the left mouse key (B) double-click the right mouse key (C) press the BACKSPACE key (D) press the delete key (E) None of these Ans (D) 341. The operating system does all of the following EXCEPT: A. provide a way for the user to interact with the computer. B .manage the central processing unit (CPU). C .manage memory and storage. D. enable users to perform a specific task such as document editing. Ans (D) 342. During the boot process, the ____________ looks for the system files. A CD B. BIOS C. CPU D. DVD AnS (B) 343. ____________ are lists of commands that appear on the screen. A GUIs B Icons

C Menus D Windows Answer: C 344. ____________ is the ability of an operating system to control the activities of multiple programs at the same time. A Multitasking B Streamlining C Multiuser D Simulcasting Answer: A 345. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an: A action. B event. C interrupt. D activity. Answer: C 346. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processors attention. A CPU B slice of time C stack D event Answer: B 347. The blocks of code, included in the operating system, that softwareapplications interact with are known as:

A B C D

application programming interfaces (APIs). complimentary metal-oxide conductors (CMOS). device drivers. bootstrap loaders.

Answer: A 348. MS-DOS is a ____________ operating system. A point-and-click B user-friendly C command-driven D Mac Answer: C 349. An interrupt handler is a(n): A location in memory that keeps track of recently generated interrupts. B peripheral device. C utility program. D special numeric code that indicates the priority of a request. Answer: D 350. A spooler is a(n): A location in memory that maintains the contents of a document until it prints out. B print job. C program that coordinates the print jobs that are waiting to print. D message sent from the printer to the operating system when a print job is completed. Answer: C 351. Virtual memory is typically located:

A on a floppy disk. B in the CPU. C in a flash card. D on the hard drive. Answer: D 352. The purpose of a swap (or page) file is to: A maintain pages of documents that are being spooled to the printer. B hold a programs data or instructions in virtual memory when it cant fit in RAM. C prevent thrashing in a multitasking environment. D allow multiple print jobs to print their pages out simultaneously. Answer: B 353. The definition of thrashing is: A swapping data between virtual memory and RAM too frequently. B insufficient hard disk space. C too many processors being managed by the operating system. D inaccurate information stored in the registry. Answer: A 354. All of the following are TRUE of Safe Mode EXCEPT: A Safe Mode is a special diagnostic mode. B Safe Mode loads all nonessential icons. C Safe Mode allows users to troubleshoot errors. D Safe Mode loads only the most essential devices. Answer: B 355. Verification of a login name and password is known as: A configuration.

B accessibility. C authentication. D logging in. Answer: C 356. The combination of the operating system and the processor is referred to as the computers: A CPU. B platform. C BIOS. D CMOS. Answer: B 357. The following message generally means: A a nonsystem floppy has been left in the floppy disk drive. B the CD drive is not functioning. C the BIOS is corrupted. D there is a problem loading a device. Answer: A 358. Which of the following is the correct sequence of actions that takes place during the boot-up process? A Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings B Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings C Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings D Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system

Answer: B 359. All of the following are steps involved in the boot process EXCEPT: A load the operating system into RAM. B the power-on self-test. C activate the basic input/output system (BIOS). D load application programs. Answer: D 360. The ____________, stored on a ROM chip, is responsible for loading theoperating system from its permanent location on the hard drive into RAM. A BIOS B API C device driver D supervisor program Answer: A 361. The basic input/output system (BIOS) is stored in: A RAM. B ROM. C the CPU. D the hard drive. Answer: B 362. Ensuring that the essential peripheral devices are attached and operational is the ____________ process. A configuration B CMOS C POST D ROM

Answer: C 363. The memory resident portion of the operating system is called the: A registry. B API. C CMOS. D kernel. Answer: D 364. Which of the following does NOT occur during the power-on selftest ? A The ScanDisk utility begins to run. B The video card and video memory are tested. C The BIOS identification process occurs. D Memory chips are checked to ensure they are working properly. Answer: A 365. All of the following are TRUE regarding virtual memory EXCEPT: A any amount of RAM can be allocated to virtual memory. B the setting for the amount of hard drive space to allocate to virtual memory can be manually changed. C this temporary storage is called the swap file (or page file). D virtual memory is physical space on the hard drive. Answer: A 366. The operating system allows users to organize the computers contents in a hierarchical structure of directories that include all of the following EXCEPT: A files. B folders.

D drives. D systems. Answer: D 367. All of the following statements concerning windows are true EXCEPT: A windows are an example of a command-driven environment. B windows can be resized and repositioned on the desktop. C more than one window can be open at a time. D toolbars and scrollbars are features of windows. Answer: A 368. All of the following statements concerning files are true EXCEPT: A A file is a collection of related pieces of information stored together for easy reference. B Files can be generated from an application. C Files are stored in RAM. D Files should be organized in folders. Answer: C 369. Using Windows Explorer, a plus (+) sign in front of a folder indicates: A an open folder. B the folder contains subfolders. C a text file. D a graphics file. Answer: B 370. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view. A List B Thumbnails

C Details D Icon Answer: C 371. All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity theft. Answer: B 372. A process known as ____________ is used by large retailers to study trends. A. data mining B. data selection C. POS D. data conversion Answer: A 373. ____________terminals (formerly known as cash registers) are oftenconnected to complex inventory and sales computer systems. A. Data B. Point-of-sale (POS) C. Sales D. Query Answer: B 374. A(n) ____________ system is a small, wireless handheld computer that scans an items tag and pulls up the current price (and any special offers) as you shop.

A. PSS B. POS C. inventory D. data mining Answer: A 375. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called: A. robotics. B. simulation. C. computer forensics. D. animation. Answer: C 376. Which of the following is NOT one of the four major data processingfunctions of a computer? A. gathering data B. processing data into information C. analyzing the data or information D. storing the data or information Answer: C 377. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animals movements. A. POS B. RFID C. PPS D. GPS Answer: B

378. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as: A. robotics. B. computer forensics. C. simulation. D. forecasting. Answer: A 379. Technology no longer protected by copyright, available to everyone, is considered to be: A. proprietary. B. open. C. experimental. D. in the public domain. Answer: A 380. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers. A. Nanoscience B. Microelectrodes C. Computer forensics D. Artificial intelligence Answer: A 381. ____________ is the science that attempts to produce machines that displaythe same type of intelligence that humans do. A. Nanoscience B. Nanotechnology C. Simulation D. Artificial intelligence (AI) Answer: D

382. ____________ is data that has been organized or presented in a meaningfulfashion. A. A process B. Software C. Storage D. Information Answer: D 383. The name for the way that computers manipulate data into information iscalled: A. programming. B. processing. C. storing. D. organizing. Answer: B 384. Computers gather data, which means that they allow users to ____________data. A. present B. input C. output D. store Answer: B 385. After a picture has been taken with a digital camera and processedappropriately, the actual print of the picture is considered: A. data. B. output. C. input. D. the process. Answer: B

386. Computers use the ____________ language to process data. A. processing B. kilobyte C. binary D. representational Answer: C 387. Computers process data into information by working exclusively with: A. multimedia. B. words. C. characters. D. numbers. Answer: D 388. In the binary language each letter of the alphabet, each number and eachspecial character is made up of a unique combination of: A. eight bytes. B. eight kilobytes. C. eight characters. D. eight bits. Answer: D 389. The term bit is short for: A. megabyte. B. binary language. C. binary digit. D. binary number. Answer: C

390. A string of eight 0s and 1s is called a: A. megabyte. B. byte.

C. kilobyte. D. gigabyte. Answer: B 391. A ____________ is approximately one billion bytes. A. kilobyte B. bit C. gigabyte D. megabyte Answer: C 392. A ____________ is approximately a million bytes. A. gigabyte B. kilobyte C. megabyte D. terabyte Answer: C 393. ____________ is any part of the computer that you can physically touch. A. Hardware B. A device C. A peripheral D. An application Answer: A

394. The components that process data are located in the: A. input devices. B. output devices. C. system unit. D. storage component. Answer: C

395. All of the following are examples of input devices EXCEPT a: A. scanner. B. mouse. C. keyboard. D. printer. Answer: D 396. Which of the following is an example of an input device? A. scanner B. speaker C. CD D. printer Answer: A 397. All of the following are examples of storage devices EXCEPT: A. hard disk drives. B. printers. C. floppy disk drives. D. CD drives. Answer: B 398. The ____________, also called the brains of the computer, isresponsible for processing data. A. motherboard B. memory C. RAM D. central processing unit (CPU) Answer: D 399. The CPU and memory are located on the: A. expansion board. B. motherboard.

C. storage device. D. output device. Answer: B 400. Word processing, spreadsheet, and photo-editing are examples of: A. application software. B. system software. C. operating system software. D. platform software. Answer: A401. ____________ is a set of computer programs used on a computer to helpperform tasks. A. An instruction B. Software C. Memory D. A processor Answer: B 402. System software is the set of programs that enables your computershardware devices and ____________ software to work together. A. management B. processing C. utility D. application Answer: D 403. The PC (personal computer) and the Apple Macintosh are examples of two different: A. platforms. B. applications. C. programs. D. storage devices.

Answer: A 404. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems. A. languages B. methods C. CPUs D. storage devices Answer: C 405. Servers are computers that provide resources to other computers connected to a: A. network. B. mainframe. C. supercomputer. D. client. Answer: A 406. Smaller and less expensive PC-based servers are replacing ____________ in many businesses. A. supercomputers B. clients C. laptops D. mainframes Answer: D 407. ____________ are specially designed computers that perform complexcalculations extremely rapidly. A. Servers B. Supercomputers

C. Laptops D. Mainframes Answer: B 408. DSL is an example of a(n) ____________ connection. A. network B. wireless C. slow D. broadband Answer: D 409. The difference between people with access to computers and the Internet and those without this access is known as the: A. digital divide. B. Internet divide. C. Web divide. D. broadband divide. Answer: A 410. ____________ is the science revolving around the use of nano structures to build devices on an extremely small scale. A. Nanotechnology B. Micro-technology C. Computer forensics D. Artificial intelligence Answer: A 411. Which of the following is the correct order of the four major functions of a computer? A. Process A Output A Input A Storage

B. InputA Output A Process A Storage C. Process A Storage A Input A Output D. Input A Process A Output A Storage Answer: D 412. ____________ bits equal one byte. A. Eight B. Two C. One thousand D. One million Answer: A 413. The binary language consists of ____________ digit(s). A. 8 B. 2 C. 1,000 D. 1 Answer: B 414. A byte can hold one ____________ of data. A. bit B. binary digit C. character D. kilobyte Answer: C 415. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer. A. The platform B. The operating system

C. Application software D. The motherboard Answer: B 416. The operating system is the most common type of ____________ software. A. communication B. application C. system D. word-processing software Answer: C 417. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat. A. Servers B. Embedded computers C. Robotic computers D. Mainframes Answer: B 418. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called: A. instructions. B. the operating system. C. application software. D. the system unit. Answer: A 419. The two broad categories of software are: A. word processing and spreadsheet.

B. transaction and application. C. Windows and Mac OS. D. system and application. Answer: D 420. The metal or plastic case that holds all the physical parts of the computer is the: A. system unit. B. CPU. C. mainframe. D. platform. Answer: A 421. The earliest calculating devices are? a) Clock b) Difference Engine c) Abacus d) Calculator Answer: c 422. The basic operations performed by a computer are? a) Arithmetic Operations b) Logical Operations c) Storage and relative d) All of the above Answer: d 423. The man who built the first Mec-hanical Calculator was? a) Joseph Marie Jacquard b) John Mauchly

c) Blaise Pascal d) Harward Ailken Answer: c 424. Punched cards were first introduced by? a) Powers b) Pascal c) Jacquard d) Herman Hollerith Answer: d 425. LSTs(Large Integration) used in? a) First generation b) Second generation c) Third generation d) Fourth generation Answer: d 426. What is MS Word? a) A game b) An Operating System c) Word Processing Software d) Typing tutor software Answer: c 427. MS Excel is a? a) Window based word processor package b) Window based spreadsheet package c) DOS based spreadsheet package d) Window based accounting package Answer: b

428. Power Point can display date from which of the following add-in software of MS-Office? a) Equation Editor b) Organization Chart c) Photo Album d) All of these Answer: d 429. The first network that planted the seeds of Internet was? a) ARPANET b) NSF net c) V net d) I net Answer: a 430. Abbreviation www in www.yahoo.com, stands for? a) World Word in Wonder b) World Wide Web c) World Web is Widening d) Wonderful World Web Answer: b 431. What is Active Desktop? a) A term that is synonymous with viewing your desktop as a web page b) A feature to customize your desktop to display informat-ion you can update from the Internet. c) Both (a) and (b) above mentioned. d) Software Answer: c 432. Active Window means?

a) The active window is designated by a different color toolbar than other open windows. b) The window that currently open c) Both (a) and (b) above mentioned d) The window that is last used Answer: c 433. A bitmap is? a) Is a format which windows use for desktop wallpaper? b) A graphic file format made up of small dots. c) A specific kind of bitmap file with the BMP extention. d) All of the above. Answer: d 434. Which of the following printers generates character from a grid? a) Inkjet b) Laser c) Daisy wheel d) Dot matrix Answer: d 435. Close Button? a) When clicked will close the dialog box, document or program displayed in the window. b) Is located at the right top end of the title bar of most Win-dows. c) Implies for the small button with an X on it d) All of the above Answer: d 436. A dialog box is a one? a) Which is a sort of on-screen from where you can fill in the blanks, make selections from lists and chose various combinations of options and

settings. b) In which you can connect to another Internet user and establish an audio and video contact using Microsoft Word. c) In which you can give verbal commands to Microsoft Word menu d) All of the above Answer: a 437. A letter, memo, proposal or other file that is created using Microso-ft Word is called as? a) Master b) Slide c) Document d) Worksheet Answer: c 438. The meaning of double-click is? a) Pushing and releasing the main mouse button twice in rapid succession when the on-tree mouse pointer is positioned over the desired item b) Appearance of an icon c) To take a selection from the document and move it to the clipboard d) All of the above Answer: a 439. A folder: (A) is an organizational tool used to store files.(B) is synonymous with directory, but folder is the newer preferred term (C)contains data? a) A only b) B only c) C only d) None of the above Answer: d

440. Commercially produced first computer? a) IBM b) MIPS c) UNIVAC d) EDSAC Answer: c441. Banks and other big organizations requiring large data storage use? a) Laptop PC's b) Desktop PC's c) Mainframe Computer d) Workstation Answer: c 442. High Level Language useful for the beginners is? a) BASIC b) PASCAL c) FORTRON d) COBOL Answer: d 443. For Scientific work the most popular language is? a) PASCAL b) FORTRON c) COBOL d) PROLOG Answer: b 444. Which is not the portable computer? a) Micro-processor b) Calculator c) Series Computes d) Parallel Computers

Answer: d 445. OBJECT ORIENTED language is? a) ADA b) PROLOG c) PASCAL d) FORTRAN Answer: a 446. Information is? a) Summarization process of data b) Data Information c) Textual form of data d) Facts and figures Answer: a 447. Total memory of system can be known using? a) DIR commands b) MEM commands c) Warm boot d) TOT MEM commands Answer: b 448. For running WINDOW minimum disk free space required is? a) 8 MB b) 10 MB c) 16 MB d) 32 MB Answer: a 449. The first graphical web browser are? a) Gopher

b) WAIS c) CERN d) Mosaic Answer: d 450. The programs used to view web pages are called? a) Clients b) Server c) Browser d) Programmer Answer: c 451. FTP means? a) File Transfer Protocol b) File Telnet Protocol c) Fast Track Processing d) Fine Tunning programs Answer: a 452. Which among the following is faster than Main Memory? a) RAM b) ROM c) Cache d) None of the above Answer: c 453. Semi Conductor Memory is known as? a) RAM b) ROM c) PROM d) EPROM

Answer: a 454. In which generation computers IC have been used? a) First b) Second c) Third d) Fourth Answer: c 455. High level language is? a) Machine Independent b) Machine dependent c) (a) And (b) are true d) (a) And (b) are false Answer: a 456. Hypertext is? a) Text stored in the memory of the computer b) Text displayed on the screen of the computer c) Special text used in developing Internet developing package d) A system of managing textual Information by creating associations between different documents Answer: d 457. Information on a computer is sto-red in the form of? a) Files b) Folders c) Directory d) Data dictionary Answer: a 458. TCP is?

a) Transfer control protocol b) Transfer control process c) Transmission control protocol d) Transmission control process Answer: c 459. Every computer on the Internet is known as? a) Host b) Client c) Modem d) Server Answer: a 460. Fax machines are used to send documents through a? a) Telephone line b) Modems c) Co-axial Wire d) All of these Answer: a461.The term overflow means? a) An excess of Internal storage b) An excess of external storage c) A situation where record cannot fit in to its right place d) A device, which controls the level of humidity in the computer room. Answer: a 462. In computer science, by Informa-tion we mean? a) Any output coming out from computer b) A report printed by computer c) Processed data put in intelligent form d) Plural of data Answer: c

463. Which of the following are parts of the CPU? a) Secondary Memory b) Control unit c) Input device d) Printer Answer: b 464. The purpose of an application program is to? a) Meet specific user needs b) Make equivalent run better c) Allow the operating system to control resources better d) Convert program written in high-level language to machine level language Answer: a 465. Micro computers are? a) 8 bit b) 16 bit c) 32 bit d) Either 8 or 16 bit Answer: d 466. Computer uses the_________number system to store data and performcalculations. (A) binary (B) octal (C) decimal (D) hexadecimal (E) None of these Ans : (A) 467. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is_______________

(A) Memory-only (B) Write-only (C) Once-only (D) Run-only (E) Read-only Ans : (E) 468. Which of the following can be used to select the entire document ? (A) CTRL+A (B) ALT+F5 (C) SHIFT+A (D) CTRL+K (E) CTRL+H Ans : (A) 469.___________are 'attempts by individuals to obtain confidential information from you by falsifying their identity. (A) Phishing (B) Computer viruses (C) Spyware scams (D) Viruses (E) None of the above Ans : (A) 470. Part number, part description, and number of parts ordered are examples of__________ (A) control (B) output (C) processing (D) feedback (E) input

Ans : (E) 471. A Web site's main page is called its______________ (A) Home Page (B) Browser Page (C) Search Page (D) Bookmark (E) None of these Ans : (A) 472. The simultaneous processing of two or more programs by multiple Processors is_____________ (A) multiprogramming (B) multitasking (C) time-sharing (D) multiprocessing (E) None of these Ans : (D)

473. Codes consisting of lines of varying widths or lengths that are computer-readable are known as____________ (A) an ASCII code (B) a magnetic tape (C) an OCR scanner (D) a bar code (E) None of these Ans : (D) 474. To instruct Word to fit the width of a column to the contents of a table

automatically, click the button and then point to AutoFit Contents. (A) Fit to Form (B) Format (C) Autosize (D) Contents (E) AutoFit Ans : (E) 475. Why is it unethical to share copyrighted files with your friends ? (A) It is not unethical, because it is legal. (B) It is unethical because the files are being given for free. (C) Sharing copyrighted files without permission breaks copyright laws. (D) It is not unethical because the files are being given for free. (E) It is not unethical-anyone can access a computer Ans : (C) 476. Reusable optical storage will typica1ly have the acronym__________ (A) CO (B) DVD (C) ROM (D) RW (E) ROS Ans : (D) 477. The most common type of storage devices are__________ (A) persistent (B) optical (C) magnetic (D) flash (E) steel

Ans : (D) 478. A device that connects to a network without the use of cables is said to be_________ (A) distributed (B) free (C) centralized (D) open source (E) None of these Ans : (B) 479. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a______________ (A) hacker (B) analyst (C) instant messenger (D) programmer (E) spammer Ans : (A) 480. To access properties of an object, the mouse technique to useis__________________ (A) dragging (B) dropping (C) right-clicking (D) shift-clicking (E) None of these Ans : (C) 481. To change selected text to all capital letters, click the change case button, then click___________

(A) UPPERCASE (B) UPPER ALL (C) CAPS LOCK (D) Lock Upper (E) Large Size Ans : (A) 482. The basic unit of a worksheet into which you enter data in Excel is called a______________ (A) tab (B) cell (C) box (D) range (E) None of these Ans : (B) 483. You can keep your personal files / folders in____________________ (A) My folder (B) My Documents (C) My Files (D) My Text (E) None of these Ans : (B) 484. In Word you can force a page break____________ (A) By positioning your cursor at the appropriate place and pressing the F1 key (B) By positioning your cursor at the appropriate place and pressing Ctrl+Enter (C) By using the Insert/Section Break

(D) By changing the font size of your document (E) None of these Ans : (B) 485. The default view in Excel is___________view. (A) Work (B) Auto (C) Normal (D) Roman (E) None of these Ans : (C) 486. The process of transferring files from a computer on the Internet to your computer is called___________ (A) downloading (B) uploading (C) FTP (D) JPEC (E) downsizing Ans : (A) 487.____________.is the process of dividing the disk into tracks and sectors. (A) Tracking (B) Formatting (C) Crashing (D) Allotting (E) None of these Ans : (B) 488. Help Menu is available at which button ?

(A) End (B) Staft (C) Turnoff (D) Restart (E) Reboot Ans : (B) 489. The contents of____________are lost when the computer turns off. (A) storage (B) input (C) output (D) memory (E) None of these Ans : (D) 490. When you save to this, your data will remain intact even when the computer is turned off________ (A) RAM (B) Motherboard (C) Secondary storage device (D) Primary storage device (E) None of these Ans : (C) 491. A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a(n)_________ (A) supercomputer (B) minicomputer (C) laptop (D) server (E) None of these

Ans : (D) 492. The_________folder retains copies of messages that you have started but are not yet ready to send. (A) Drafts (B) Outbox (C) Address Book (D) Sent Items (E) Inbox Ans : (B) 493. Grouping and processing all of a firm's transactions at one time is called_________ (A) a database management system (B) batch processing (C) a real-time system (D) an on-line system (E) None of these Ans : (B) 494. The___________enables you to simultaneously keep multiple Web pages open in one browser window. (A) tab box (B) pop-up helper (C) tab row (D) address bar (E) Esc key Ans : (C) 495. Which ports connect special types of music instruments to sound cards ?

(A) BUS (B) CPU (C) USB (D) MIDI (E) MINI Ans : (C) 496. You can__________a search by providing more information the search engine can use to select a smaller, more useful set of results. (A) refine (B) expand (C) load (D) query (E) slowdown Ans : (A) 497. What is the permanent memory built into your computer called ? (A) RAM (B) Floppy (C) CPU (D) CO-ROM (E) ROM Ans : (E) 498. What displays the contents of the active cell in Excel ? (A) Name box (B) Row Headings (C) Formula bar (D) Task pane (E) None of these

Ans : (A) 499. The piece of hardware that converts your computer's digital signal to an analog signal that can travel over telephone lines is called a_______ (A) red wire (B) blue cord (C) tower (D) modem (E) None of these Ans : (D) 500. Video processors consist of________and________, which store and process images. (A) CPU and VGA (B) CPU and memory (C) VGA and memory (D) VGI and DVI (E) None of these Ans : (C) 501. If you want to connect to your own computer through the Internet from another location, you can use_________ (A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these Ans : (D) 502. To reload a Web page, press the___________.button.

(A) Redo (B) Reload (C) Restore (D) Ctrl (E) Refresh Ans : (E) 503. This first step in the transaction processing cycle captures business data through various modes such as optical scanning or at an electronic commerce website__________ (A) Document and report generation (B) Database maintenance (C) Transaction processing startup (D) Data Entry (E) None of these Ans : (D) 504. A(n)_____________is a special visual and audio effect applied in Powerpoint to text or content. (A) animation (B) flash (C) wipe (D) dissolve (E) None of these Ans : (A) 505. When the pointer is positioned on a__________it is shaped like a hand. (A) grammar error (B) Formatting error (C) Screen Tip (D) Spelling error

(E) hyperlink Ans : (E) 506. A______________is the term used when a search engine returns a Web page that matches the search criteria. (A) blog (B) hit (C) link (D) view (E) success Ans : (E) 507. ___________are words that a programming language has set aside for its own use. (A) Control words (B) Control structures (C) Reserved words (D) Reserved keys (E) None of these Ans : (C) 508. Mobile Commerce is best described as___________ (A) The use of Kiosks in marketing (B) Transporting products (C) Buying and selling goods/services through wireless handheld devices (D) Using notebook PC's in marketing (E) None of the above Ans : (C)

509. Which of, the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information__________ (A) floppy diskette (B) hard disk (C) permanent disk (D) optical disk (E) None of these Ans : (B) 510. The computer abbreviation KB usually means___________ (A) Key Block (B) Kernel Boot (C) Key Byte (D) Kit Bit (E) Kilo Byte Ans : (E) 511. What is the process of copying software programs from secondary storage media to the hard disk called? (A) Configuration (B) Download (C) Storage (D) Upload (E) Installation Ans : (D) 512. In Excel____________allows users to bring together copies of workbooks that other users have worked on independently. (A) Copying (B) Merging (C) Pasting

(D) Compiling (E) None of these Ans : (B) 513. Which of the following are advantages of CD-ROM as a storage media? (A) CD-ROM is an inexpensive way to store large, amount of data and information (B) CD-ROM disks retrieve data and information more quickly than magnetic disks do (C) CD-ROMs make less errors than magnetic media (D) An of the above (E) None of these Ans : (D) 514. A DVD is an example of a(n) ______________ (A) hard disk (B) optical disc (C) output device (D) solid-state storage device (E) None of these Ans : (B)

Вам также может понравиться