1. A
network that is connected to the Internet, but uses encryption to scramble all
the data sent through the Internet is called?
2. The
main advantage of magnetic disk compared to magnetic tape is
(1)
low cost (2) rigidity
(3) direct access (4) high packet density (5) sequential access
3. The
memory card which is conceptually related to the smart card but is similar to
the video disk, is
(1)
Master card (2) Visa card
(3) Optical card (4) Laser card (5) Data card
4. ………
process rearranges file fragments into contiguous files.
(1)
folder folding (2)Defragmentation
(3) Unflagging (4) Disk scanning
(5) File filling
5. Recycle
Bin enables you to restore a file which was deleted from:
(1)
Drive B (2) Drive C
(3) Drive K (4) Drive L
(5) None of these
6. The
collection of commands is called:
(1)
file (2) Program (3) information (4)
data (5) instruction
7. The
processing capability of a microcomputer can be enhanced with the help of :
(1)
secondary memory (2) additional processor (3) expansion card (4) buffer
memory (5) None of these
8. ……….determines
the appearance of your desktop and controls the performance of your hardware.
(1)
Windows Explore (2) Internet Explorer (3) Program file (4)
Control Panel (5) System file
9. A
stand 3.5 floppy disk can hold ----- of data .
(1)
1.44 GB (2) 1.44MB (3) 1.44 KB
(4) 1.44B (5) All the above
10. Latest
Entry Level Desktop PC have at least more than ------ of RAM.
(1)
100bit (2) 100Byte (3) 100KB
(4) 100 MB (5) None of these
11. The
shortcut key to switch between different application is:
(1)
Alt+F1 (2) Alt+Tab (3)Shift +Tab
(4) Ctrl + Tab (5) None of these
12. Linux
is an example of –
(1)
Operating system (2) Input Device (3) Output Device (4) Terminal (5) None of these
13. Which
of following terms is associated with high – speed connection?
(1)
TCP/IP (2) Dial-up access (3)
Ethernet (4) Broadband (5) None of these
14. The
menu option to delete all the list present in the Recycle Bin is :
(1)
Full Recycle Bin (2) Restore (3) Empty Recycle Bin (4)
Fill Delete (5) None of these
15. We
can save our favourite website in a browser as :
(1)
Favourite (2) save (3) Bookmark
(4) Both 1& 2 (5) None of these
16. A
computer checks the------ of user names and password for a match before
granting access.
(1)
website (2) database (3) backup
file (4) network
(5) None of these
17. What
Is E- mail attachment?
(1)
A receipt sent by the recipient (2) A
malicious parasite that feeds off of your messages and destroys the contents
(3)
A computer file sent along with an email message (4) Confirmation of received E-mail (5) None of these
18. Which
of the following phases are present in a software development life cycle?
(1)
Coding (2) Analysis (3)
Design (4) All of
the above (5) None of these
19. Which
of the following is not a(n) search engine?
(1)
Bing (2)
Google (3)
Orkut (4) Duck
Go (5) None of
these
20. The kind
of memory that comes from the CPU that
is erased when you shut the computer off or exit the program that you were in.
(1)
ROM (2) RAM (3) CACHE (4) flash
Drive (5) Hard Drive
21. Which of the
following is not an option in the spelling dialog box?
(1)
Edit (2)
Ignore (3)
Ignore all (4) Change (5) None of these
22. To
copy cell contents using drag and drop, press the
(1) End
key (2) Shift key (3) Esc
key (4) All of above (5) None of
these
23. What
is the keyboard shortcut (button or buttons to be pressed) for creating a chart
from the selected cells?
(1) F3 (2)
F5 (3) F7 (4) F15 (5) None of these
24. You
can use the formula palette to:
(1)
format cells containing numbers (2)
create and edit formulas containing functions (3) entered
assumptions data
(4) copy a range of
cells (5)
None of these
25. Ctrl,
Shift and Alt are called __ keys.
(1)
modifier (2) function (3)
alphanumeric (4) adjustment (5)None of these
26. The
pattern of printed lines on most products are called-
(1)
prices (2)OCR (3)
scanners (4)
barcodes (5)None of these
27. What
is the permanent memory built into your computer called?
(1)
RAM (2) ROM (3)
CPU (4) CD-ROM (5) None of these
28. Various
applications and documents are represented on the Windows desktop by __.
(1)
symbols (2)labels (3)
graphs (4) icons (5) None of these
29. E-mail
addresses separate the user name from the ISP using the __ symbol.
(1)
& (2)
@ (3)
% (4) * (5) None of these
30.
The __ of a system includes the program s or instructions.
(1)
hardware (2) icon (3)
information (4) software (5) None of these
31. Which one of
the following allows user to continue to operate computer while printing in
progress?
(1) Spooler (2)
job control program (3) Device manager
(4) trackball (5) None of these
32. A microprocessor is generally?
(1) Single Chip
SSI (2) Single chip MSI (3) Single chip LSI (4) Both 1 &2 (5) None of these
33. What is other name of Daisy
wheel printer?
(1) Petal printer
(2) Golf ball printer (3) Laser printer
(4) Line printer (5) None of these
34.Optical memory is...............?
(1)
Magnetic disk (2) floppy
disk (3) Pendrive
(4) DVD (5) None
35. Which command
is used to open (open) dialogue box?
(1) F12
(2) Shift+F12 (3) Alt+F12 (4) Ctrl+F12 (5) none
36. A program that converts a
HLL language program to a set of instructions that can run on a computer is
called a?
(1) Assembler
(2) Compiler (3) debugger
(4)
Editor (5)
none
37. The type
of large printer that can most accurately produce images requiring precise,
continuous lines is a(n):
(1) plotter.
(2)
inkjet printer. (3) laser
printer. (4) dot-matrix
printer. (5) none
38. The insert,
caps lock, and num lock keys are all examples of ____________ keys.
(1) Control (2)
Function (3)
Toggle
(4) shortcut (5) Modifier
39. Which of the
following component displays the contents of active cell?
(1) Name box
(2) Formula bar (3) Menu
bar (4) Status
bar (5) none
40. The process of identifying
specific rows and columns so that so that certain columns and rows are always
visible on the screen is
(1) freezing
(2) locking (3) Selecting
(4)
fixing (5)
none
41. Software
instruction intended to satisfy a user's specific processing needs are called:
1)
System software 2) A microcomputer 3) Documentation 4)
Applications software 5) All of the
above
42. The
__________ tells the computer how to use its components.
(1)
utility 2)
network 3) operating system
4) application program 5) None of these
43. The
most important or powerful computer in a typical network.
1)
desktop 2) network client 3) network server
4) network station 5) None of these
44. To
access a mainframe or supercomputer, users often use a ___
1)
terminal 2)
node 3) desktop
4) handheld 5) None of these
45. Which
of the following contains information about the structure of a database?
1)
Database management system 2) Data
dictionary 3) Data repository 4) Data warehouse 5) None of these
46. The
rules of a language are called its __________.
1)
structure 2) code 3) syntax
4) rigidity 5) None of these
47. JavaScript
was developed by __________ to run inside of web pages.
1)
Microsoft 2) Sun 3) Oracle
4) Netscape 5) None of these
48. A
series of steps that always results in an answer is the definition of
__________.
1)
heuristic 2) flowchart 3) algorithm 4)
pseudo code 5) None of these
49. To
create a copy of files in the event of system failure, you create a __________.
1)
restore file 2) backup 3) firewall 4)
redundancy 5) None of these
50. If
configured correctly, the __________ will prevent interaction with your
computer after a specified time period.
1)
firewall 2) filter 3) screen saver
4) popup blocker 5) virus
51. _____________
are words that a programming language has set aside for its own use
(A)
Control worlds (B)
Reserved word (C) Control
structures (D) Reserved key (E) None of
these
52. When
data changes in multiple lists and all lists are not updated, this causes
(A)
data redundancy (B) information overload (C) duplicate
data (D) data inconsistency (E) None of
these
53. A
Proxy server is used for which of the following?
(A)
To provide security against unauthorized users (B) To process client requests for
web pages
(C)
To process client requests for database access (D) To provide TCP/IP (E) None of
these
54. ______
describe what are database fields.
(A)
Structures (B) Field
markers (C) Field definition (D)
Field names (E) None of these
55. A
goal of normalization is to __________
(A)
minimize the number of relationships (B)
minimize the number of entities (C) minimize the number of tables
(D)
minimize the number of redundancy (E)
None of
these
56. Granting
an outside organization access to internet web pages is often implemented using
a (n) ____
(A)
extranet (B)
intranet (C)
internet (D)
hacker (E) None of
these
57. The
most frequently used instructions of a computer program are likely to be
fetched from:
(A)
the hard disk (B) cache memory (C) RAM (D)
registers (E) None of these
58. ____________
are viruses that are triggered by the passage of time or on a certain date.
(A)
Boot-sector viruses (B) Macro viruses (C) Time bombs (D)
Worms (E) None of
these
59. A
process known as ____________ is used by large retailers to study trends.
(A)
data mining (B) data
selection (C)
POS (D) data
conversion (E) None
of these
60. __________terminals
(formerly known as cash registers) are often connected to complex inventory and
sales computer systems.
(A)Data (B)Point-of-sale
(POS) (C)Sales (D)
Query (E) None of these
61. Data
are followed to be transmitted in only one direction in a:
(a)
Simplex channel (b) Dumb channel (c) Half-duplex channel (d) Full-
duplex channel (e) None of these
62. Which
of the following feature is related to virtual circuit?
(a) Connection
oriented (b) Each
packet sent is routed independently of its predecessors
(c) Successive
packets may follow different routes (d) Congestion
control is difficult (e) None
of these
63. PMTLR is
acronym for ______
(a) Page
Memory Table with Limit Register (b) Page
Map Table Limit Register) (c) Both (a)
and (b)(
d) Page
Memory Table Limit Register (e) None
of these
64. The
greatest negative number which can be stored in computer that has 8-bits work
length and use 2’s complement arithmetic is
(a)
-256 (b)
-255
(c)-128 (d)
-127
(e) None of these
65. Which
is the feature of IBS (Integrated Banking Systems)?
(a)Multi
Currency (b) Multi Entity (c) Multi Brach
(d) Bulk Transaction Entry (e) All of
the above
66. OSPF
means
(a)
Open shortest path first protocol (b) Open shortest path
finite protocol (c) Open
slotted path first protocol
(d)
Open source path first protocol
(e) None of these
67. Binding
the same name to multiple operations whose signatures differ in number or types
of arguments?
(a)
Overloading (b) Origin class (c) Object model (d)
Package (e) None of these
68. ___________performs
relocation function?
(a)
Absolute loader (b) Direct linking
loader (c) Relocating
loader (d) Linkage editor (e)
None of these
69. Segmentation
_______
(a) Is
a memory management scheme that supports user view of memory (b) Logical address
space is collection of segments (c) Logical
address consists of two tuple < segment-number, offset (d) All of the above (e) None
70. In
OSI network architecture the routing is performed by:
(a)
Network layer (b) Data
link layer (c) Transport layer
(d) Session layer (e) None of these
71. A linear list
of elements in which deletion can be done from one end and insertion can take
place only at the end
(a)
Stacks (b) Trees (c) Queues (d)
Branch (e) None of these
72. The
ACCEPT command in SQL?
(a) Creates
a customized prompt when accepting user input
(b) Explicitly
defines a NUMBER or DATE data type variable
(c) Hides
user input for security reasons (d) All
of the above (e) None
of these
73. For
tree , which of the following list traversing through the entire list is not
necessary
(a)
Circular list (b) singly linked list (c) Doubly linked
list (d) both (b) and (c) (e) None of these
74. The
maximum no of nodes on level 5 of a binary tree.
(a)
32 (b)
64 (c) 31 (d)
63 (e)
None of these
75. Synchronous
protocols
(a) Transmit
characters one at a time (b) Allow
faster transmission than asynchronous protocols
(c) Are
generally used by personal computers (d) All
of the above (e) None
of these
76. How
many fields are required to represent a header node of a graph?
(a)
3 (b)
2 (c) 4 (d)
5
(e) None of these
77. Pick
entity set from the following.
(a) All
vendors supplying to an organization (b) Vendors
and organizations they supply
(c) Vendors
and transporters (d) A vendor supplying
to many organizations (e) None
of these
78. SLIP
(Serial Line IP)
(a) It
does error detection and correction (b) It
does not do any error detection or correction
(c) Both
(a) & (b) (d) Neither
(a) or (b) (e) None
of these
79. Which
of the following communications service provides messages preparation and
transmission facilities
(a)Teletex
(b) Fax (c) X.400 (d) All of the above
(e) None of these
80. The
least expensive OCR units can read
(a) Hand
printed number (b) Machine
printed number (c) Marks (d) Handwriting (e) None of these
No comments:
Post a Comment