Вы находитесь на странице: 1из 4

1. For the purposes of defining data needs, a responsibility area is a) Marketing b) Personnel c) Administration d) Finance 2.

The problem statement should include all of the following except: a) Input. b) Output. c) Processing d) Storage 3. Hotmail, a free web-based email service operated by which company a) Apple b) Rediff c) Microsoft d) Yahoo 4. A collection of 4 binary digits is known as a) Half Bit b)1/2 KB c) Byte d) Nibble 5. How many types of arithmetic operations does the ALU of all computers perform? a) 2 b) 4 c) 6 d) 8 6. Which of the following is not a part of the CPU? a) Arithmetic and Logic Unit b) Storage Unit c) Program Unit d) Control Unit 7. Which of the following is not a unit of measurement in computer systems? a)DPI b)PPI c)API d)Bd 8. In Windows XP, which shortcut is used to cycle through opened items in taskbar? a) Ctrl + Tab b) Alt + Tab c) Ctrl + Esc d) Alt + Esc 9. A digital computer compute the value of expression 2 * 5 - 2 >2 inside a) RAM b) CPU Chip c) Hard Disk d) Floppy Disk 10. To produce a high-quality graphics (hardcopy) in color, you would want to use a a)Virtual Printer b)Laser Printer c)Ink-jet Printer d)Plotter 11. Which of the following is fastest memory ? a) DDR RAM b) DDR2 RAM c) DDR3 RAM d) Swap Memory 12. Which protocol is used by operating system to generate error message like Host Unreachable over a TCP/IP network? a) HTTP/1.1 b) ICMP c) PPP d) ICGM 13. What does SNMP stands for? a) Simple Network Mail Protocol b) Single Network Mail Protocol c) Single Network Message Protocol d) Simple Network Management Protocol 14. On a school computer, Tina learned how to copy programs. A classmate asked her to copy a program for his home use. Her most ethical response would be which of the following? a) I'll copy it, but you have to promise not to tell anyone. b) I don't know how to copy disks.

c) I can't copy it because it will break copyright laws. d) I'll copy it for you, but you can't copy it for anyone else. 15. Which of the following is not true? a)LOGO stands for Live On Googles Orkut b)BIOS is a system software c)GRUB is a Linux bootloader d)Ruby is a web scripting language 16. What is the function of Drop Cap? a) It does not allow capital letters to be used in the documents. b) It makes first letter of each word capital letter in the documents c) It lets you begin a paragraph with a large dropped initial capital letter. d) It automatically starts all paragraphs and sentences with capital letters. 17. What is Mail-Merge? a) a web based e-mail service with no spam b) a name of Yahoo! MINDSET search feature c) a new virus-hoax which can delete data from mail-inbox d) a feature of MS-Word used to create multiple documents like letters, mailing labels, name tags etc. 18. In MS-Excel 2003, the default workbook sheet contain maximum a) 65535 Rows b) 65536 Rows c) 1048576 Rows d) 65537 Rows 19. In MS-Word, a menu item in dim color (gray) indicate that the menu is ? a) Toggle Menu b) Unavailable for current context c) Not much required menu d) Over Used Menu 20. Hot-Key is a a) FireWire port b) Alternate Key c) Keyboard Shortcut d) Primary Key
21. A group of attribute/field in a database is known as a______.

a) Record b) File c) Database d) Entry 22. A ______ describe a category of information in a table of database. a) Record b) File c) Entry d) Field 23. A goal of data mining includes which of the following? a) To confirm that data exists b) To create a new data warehouse c) To analyze data for expected relationships d) To explain some observed event or condition 24. The correct hierarchical order, smallest to largest, for the following database terms is: a) File, Field, Record, Database b) File, Record, Field, Database c) Record, Field, File, Database d) Field, Record, File, Database c) Defining security and integrity rules d) Defining backup and recovery mechanisms

25. When data changes in multiple lists and all lists are not updated, this causes _______. a) Duplicate data b) Data redundancy c) Data inconsistency d) Information overload 26. Which of the following programming method is used to minimize data errors when data is transferred over a network? a) Checksum b) Checkbit c) Cryptography d) Encryption 27. Which device act as a traffic cop over a network? a) Modem b) Hub c) Switch d) Router 28. How many layers are present in Open System Interconnection (OSI) model of network architecture? a) Five b) Six c) Seven d) Eight 29. Which layer of OSI model, firstly make use of unit of data called Packet? a) Datalink Layer b) Transport Layer c) Network Layer d) Presentation Layer 30. Communication between computers is established, maintained and terminated by _____ . a) Network Layer b) Session Layer c) Application Layer d) Presentation Layer 31. Which term identifies a specific computer on the web and the main page of the entiresite? a) URL b) Hyperlink c) Web site address d) Domain name 32. The place where data or information is stored for a short time is a) Memory b) Control Unit c) Buffer d) ALU 33. The section of CPU which selects, interprets and sees to the execution of program instructions? a) ALU b) Control Unit c) Register Unit d) Processing Unit 34. Which program is used to convert assembly language to machine language? a) Compiler b) Interpreter c) Linker d) Assembler 35. The process of finding errors in softwares source code a) Debugging b) Compiling c) Testing d) Running 36. A computer programmer a) can draw only flowchart b) can enter data quickly c) does all the thinking for a computer d) can operate all type of computer equipment 37. Primary Memory of a personal computer consists of a) RAM only b) ROM only c) Hard Disk only d) Both (a) and (b)

38. A Trojan horse is a) An ad ware program b) A virus disguised as a useful program. c) A program that blows up every time you use it d) A spy ware which steal information over internet 39. Which one of the following is not true? a) HTTP Protocol is used to view a web page in a browser b) Android is Google's operating system for mobile devices c) GHz is the measurement used to determine the speed of processor d) WAN requires the same technology as LAN

Вам также может понравиться