Computer Sbi | Operating System | Computer Data Storage

1.

The basic goal of computer process is to convert data into…… (1) information (2) tables (3) files (4) graphs (5) None of these Answer : 1 2. ……… Software allows users to perform calculations on rows and columns of data. (1) Word processing (2) Presentation graphics (3) Database Management Systems (4) Electronic Spreadsheet (5) None of these Answer : 3 3. The memory resident portion of the operating system is called the : (1) registry (2) API (3) CMOS (4) kernel (5) None of these Answer : 4 4. Which of the following is a transaction? (1) A group of SQL statements consisting of one read and one write operation (2) A group of SQL statements consisting only of ready operations. (3) A group of SQL statements defining a user-oriented task (4) A group of SQL statements consisting only of write operations. (5) None of these

Answer : 1 5. In order for computers to communicate across a network, they must beconnected through a(n)……… (1) TCP/IP (2) Topology (3) Ethernet (4) Thin client (5) None of these Answer : 2 6. ―Buy Now – Pay Now‖ is commonly used for : (1) Debit Cards (2) Vault Cards (3) Credit Cards (4) E-purse (5) None of these Answer : 1 7. The ……… , stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM. (1) BIOS (2) API (3) device driver (4) supervisor program (5) display Answer : 1 8. Choices in computers are referred to as : (1) options (2) exit

(3) boot (4) folder (5) None of these Answer : 1 9. The ……… button on the quick access Toolbar allows you to cancel your recent commands or actions. (1) Search (2) Cut (3) Document (4) Undo (5) None of these Answer : 4 10. During the boot process, the ……… looks for the system files. (1) HDD (2) BIOS (3) CPU (4) DVD (5) CD Answer : 2 11. Computers gather data, which means they allow users to…… data. (1) present (2) store (3) output (4) input (5) None of these Answer : 4 12. Which of the following is a transaction?

(3) A group of SQL statements defining a user-oriented task (4) A group of SQL statements consisting only of write operations. router and dell (3) Repeater. bridge. What are the four basis connecting hardware devices? (1) Repeater. The ……… lists the location of files on the disk (1) FAT (2) boot sector (3) root folder (4) data area (5) None of these Answer : 1 15. connector.(1) A group of SQL statements consisting of one read and one write operation (2) A group of SQL statements consisting only of ready operations. (5) None of these Answer : 3 13. bridge. router and gateway (2) Repeater. router and gateway (5) None of these Answer : 1 14. A device operating at the physical layer is called a : (1) Bridge (2) Router (3) Repeater (4) All of the above (5) None of these Answer : 3 . bridge. router and gateway (4) Amplifier.

click on the ……… menu and choose‗Symbol‘. To get to the ‗Symbol‘ dialog box. (3) more than one window can be open at a time. A client / server network ………. (5) None of these. Number of bits per symbol used in Baudot code is (1) 5 (2) 6 (3) 7 (4) 8 (5) 9 Answer : 1 17. (4) toolbars and scrollbars are features of windows. (4) has server computers that perform all processing. All of the following statements concerning windows are true EXCEPT : (1) windows are an example of a command-driven environment. (1) Insert . input/ output devices only. (2) windows can be resized and repositioned on the desktop. Answer : 2 19. Answer : 1 18. (3) provides a company with the capability to downsize from lager computer systems and move away from legacy systems. (1) has clients that provide functions such as application control and shared computation. clients are dumb&#8217. (5) None of these.16. (2) uses client computers to provide copies of software to the server to allow server processing.

the best viewing option is the ……… view. In Windows XP. you are : (1) Primary-clicking (2) pointing (3) Double-clicking (4) Secondary-clicking (5) None of these Answer : 3 23. When you quickly press and releaes the left mouse button twice. if you want to see the file size and modified dates of all files in a folder. Which is not a data source component? (1) mail merge toolbar (2) header row (3) data fields (4) data records (5) All of these 21.(2) Format (3) Tools (4) Table (5) Help Answer : 1 20. Use this when you want to make all letters capital without having to use the shift key for each character……… (1) shifter (2) upper case (3) caps lock key (4) icon (5) None of these Answer : 3 22. .

Programming language built into user programs such as Word and Excel are known as ……… (1) 4GLs (2) macro languages (3) object-oriented languages (4) visual programming languages (5) None of these Answer : 4 25. Which of the following is not a type of hub? (1) Passive hub (2) Inactive hub (3) Switching hub (4) Intelligent hub (5) None of these Answer : 2 . To move a copy of file from one computer to another over a communication channel is called? (1) File transfer (2) File encryption (3) File modification (4) File copying (5) None of the above Answer : 1 26.(1) List (2) Thumbnails (3) Details (4) Icon (5) None of these Answer : 3 24.

27. Which of the following is not the part of standard office suite? (1) Word Processor (2) Database (3) Image Editor (4) File manager (5) None of these Answer : 4 30. Ina synchronous modem. In a document what is the maximum number of columns that can be inserted in MS Word Table? (1) 35 (2) 15 (3) 63 (4) 65 (5) 70 . …… allows you to print. the receive equilizer is known as (1) adaptive equilizer (2) impariment equilizer (3) statistical equalizer (4) compromise equilizer (5) None of these Answer : 1 29. (1) ribbon (2) monitor (3) go now (4) Control-P (5) None of these Answer : 4 28.

COBOL is an acronym for ……… (1) Common Business Oriented Language (2) Computer Business Oriented Language (3) Common Business Operated Language (4) Common Business Organized Language (5) None of these Answer : 1 33. the ……… designs the structure of the program (1) End user (2) System Analyst (3) Programmer (4) Architect . Where does most data go first with in a computer memory hierarchy? (1) RAM (2) ROM (3) BIOS (4) CACHE (5) None of these Answer : 1 32. When creating a computer program. Machine language sometimes also referred as : (1) Binary language (2) High level language (3) Middle level language (4) Low level language (5) None of these Answer : 1 34.Answer : 3 31.

(5) All of the above Answer : 2 35. Every computer connected to an intranet or extranet must have a distinct (1) firewall (2) proxy server (3) IP address (4) domain name (5) None of these Answer : 3 38. ……… translates the semantic instructions developed by programmers into the machine language . ……… is data that has been organized or presented in a meaningful fashion. (1) A process (2) Software (3) Storage (4) Information (5) None of these Answer : 4 37. Which is an another name for functional language (1) Machine (2) Application (3) Low-level language (4) High-level language (5) None of these Answer : 2 36.

(1) Programming language (2) Machine language (3) Software language (4) Assembly language (5) None of these Answer : 1 40. The capability of the operating system to enable two or more than twoprograms to execute simultaneously in a single computer system by using a single processor is— (1) Multiprocessing (2) Multitasking (3) Multiprogramming (4) Multiexecution (5) None of these . This is a standard way for a Web server to pass a Web user‘s request to an application program and to receive data back to forward to the user(1) Interrupt request (2) Forward DNS lookup (3) Data-Link layer (4) File Transfer Protocol (5) Common gateway interface Answer : 5 1. ………is an artificial language designed to communicate instructions to a computer.(1) Assembler (2) Interpreter (3) Loader (4) Complier (5) None of these Answer : 1 39.

A result of a computer virus cannot lead to : . The effect of the ROLLBACK command in a transaction is the following — (1) Undo all changes to the data.Answer : 2 42. (3) in a flash card (4) on the hard drive. This type of software is designed for users who want to customize theprograms they use. (1) Shareware (2) Open-source software (3) Freeware (4) Macros (5) None of these Answer : 1 44. Virtual memory is typically located: (1) on a floppy disk (2) in the CPU.base resulting from the execution of the transaction (2) Undo the effects of the last UPDATE command (3) Restore the content of the database to its state at the end of the previous day (4) Make sure that all changes to the database are in effect (5) None of these Answer : 1 45. (5) None of these Answer : 4 43.

(1) Disk Crash (2) Mother Board Crash (3) Corruption of program (4) Deletion of files (5) None of these Answer : 2 46. (3) Safe Mode allows users to troubleshoot errors. subscript. The smallest item of useful information a computer can handle— (1) bite (2) byte (3) bit (4) bait (5) None of these Answer : 3 47. (5) None of these Answer : 2 48. (4) Safe Mode loads only the most essential devices. emboss. engrave are known as : (1) font styles (2) font effects (3) word art (4) text effects (5) None of these Answer : 2 . outline. All of the following are TRUE of Safe Mode EXCEPT: (1) Safe Mode is a special diagnostic mode. (2) Safe Mode loads all nonessential icons. Superscript.

What kind of memory is both static and non-volatile? (1) RAM (2) ROM (3) BIOS (4) CACHE (5) PROM Answer : 2 52. (1) data mining (2) data selection (3) POS (4) data conversion (5) None of these . You can detect spelling and grammar errors by : (1) Press Shift + F7 (2) Press Ctrl + F7 (3) Press Alt+ F7 (4) Press F7 (5) None of these Answer : 4 51. Changing the appearance of a document is called (1) Proofing (2) Editing (3) Formatting (4) Correcting (5) All of the above Answer : 3 50. A process known as — is used by large organization to study trends.49.

The sharing of a medium and its path by 2 or more devices is called — (1) Modulation . Single party disk relying on the disk controller for finding out which disk has failed is used by : (1) RAID level 5 (2) RAID level 2 (3) RAID level 4 (4) RAID level 3 (5) RAID level 1 Answer : 4 56. (1) PSS (2) POS (3) inventory (4) data mining (5) None of these Answer : 1 54. (1) Formatting (2) Merging (3) Embedding (4) Splitting (5) None of these Answer : 2 55.Answer : 1 53. wireless handheld computer that scans an item‘s tag and pulls up the current price (and any special offers) as you shop. — cells involve creating a single cell by combining two or more selected cells. A(n) — system is a small.

(2) Encoxing (3) Line discipline (4) Multiplexing (5) None of these Answer : 4 57. OLE stands for : (1) Online Link Embedding (2) Object Link Export (3) Object Linking and Embedding (4) Online Link Emulation (5) None of these Answer : 3 . What happens when you click on Insert > Picture > Clip Art (1) It inserts a clipart picture into document (2) It lets you choose clipart to insert into document (3) It opens Clip Art taskbar (4) It insets symbols (5) None of these Answer : 3 58. (2) The video card and video memory are tested. (4) Memory chips are checked to ensure they are working properly. (3) The BIOS identification process occurs. (5) None of these Answer : 1 59. Which of the following does NOT occur during the power-on self-test (POST)? (1) The ScanDisk utility begins to run.

(3) prevent thrashing in a multitasking environment. (5) None of these Answer : 2 62. process and store transactions (2) Produce a variety of documents related to Routine business activities (3) Reduce manual effort associated with Processing business transactions (4) Produce standard reports used for Management decision making . Which of the following is not available in Font Spacing? (1) Normal (2) Loosely (3) Condensed (4) Expanded (5) All are available Answer : 2 maintain pages of documents that are being spooled to the printer. Which of the following is NOT a goal of Transaction processing system? (1) Capture. Software programs that allow you to legally copy files and give them away at no cost are called which of the following : (1) Time sharing (2) Public domain (3) Shareware (4) Freeware (5) None of these Answer : 3 63. (2) hold a program‘s data or instructions in virtual memory when it can‘t fit in RAM.60. (4) allow multiple print jobs to print their pages out simultaneously.

A — is an additional set of commands that the computer displays after you make a selection from the main menu : (1) dialog box (2) submenu (3) menu selection (4) All of the above (5) None of these Answer : 1 67.(5) None of the above Answer : 2 64. Superscript refers to — (1) Characters displayed below the line of the normal text (2) Characters displayed above the line of the normal text (3) Characters displayed vertically centre (4) Both (1) and (2) (5) None of these Answer : 2 66. The difference between people with access to computers and the Internet and those without this access is known as the : . The degree of detail that should be incorporated into a database depends on what? (1) Data integrity (2) The type of database (3) The user‘s perspective (4) The business practices and policies (5) None of these Answer : 2 65.

and underline etc. How will you remove all formatting added to your documents (such as bold. italics. (1) carries out. an object encapsulates. or — a programmer. The ability to recover and read deleted or damaged files from a criminal‘s computer is an example of a law enforcement specialty called : (1) robotics (2) simulation (3) computer forensics (4) animation (5) None of these . With the object-oriented (OO) approach. the details of an object from (3) reveals. the details of an object to (4) extends.) (1) Save (2) Save as plain text file (3) Save as (4) All of the above (5) None of these Answer : 2 69. the details of an object beyond (5) None of these Answer : 2 70.(1) digital divide (2) Internet divide (3) Web divide (4) broadband divide (5) None of these Answer : 1 68. the details of an object for (2) hides.

VIRUS stands for : (1) Vital Information Recourse Under Siege (2) Vital Information Reason Under Siege .Answer : 3 71. The code that relational database management Systems use to perform their database task is referred to as : (1) QBE (2) SQL (3) OLAP (4) Sequel Server (5) None of these Answer : 2 74. The purpose of the primary key in a database is to : (1) Unlock the database (2) Provide a map of the data (3) Uniquely identify a record (4) Establish constraints on database operations (5) None of the above Answer : 3 73. Granting an outside organisation access to Internet web pages is oftenimplemented using a (an) : (1) Extranet (2) Intranet (3) Internet (4) Hacker (5) None of these Answer : 1 72.

..... designates equipment that might be added to a computer system to enhance its functionality... Data becomes ..... ……… is the language that enable user to access or manipulate data asorganized by appropriate data model : (1) DML (2) SDL (3) DDL (4) All of the above (5) None of these Answer : 1 .(3) Vital Information Recourse Under System (4) Virus Information Recourse Under Siege (5) None of these Answer : 1 75....... The term ....... (1) processed (2) graphs (3) information (4) presentation (5) None of these Answer : 3 76.. (1) digital device (2) system add-on (3) disk pack (4) peripheral device (5) None of these Answer : 4 77.... when it is presented in a format that people canunderstand and use.

. The user commands that are used to interact with a database is called as : (1) Query (2) Interaction (3) Command (4) Instruction (5) None of these Answer : 3 79. RAM can be thought of as the .... ……… is computer software designed to operate the computer hardware and to provide platform for running application software : (1) Application software (2) System software (3) Software (4) Operating system (5) None of these Answer : 2 An assembler is used to translate a program written in……… (1) a low level language (2) machine language (3) a high level language (4) assembly language (5) None of these ... for the computer‘s processor : (1) factory (2) operating room (3) waiting room (4) planning room (5) None of these Answer : 3 80...78.

Which of the following is the correct sequence of actions that takes place during the boot-up process? (1) Load operating system . (1) CPU (2) slice of time (3) stack (4) event (5) None of these Answer :2 83.Answer :4 82.Check configuration settings . a plus (+) sign in front of a folder indicates : (1) an open folder (2) the folder contains subfolders (3) a text file (4) a graphics file (5) None of these Answer :2 . Using Windows Explorer. The operating system controls access to the processor by assigning a(n) ……… to each task requiring the processor‘s attention.Activate BIOS .Load operating system .Perform POST -Load operating system (5) None of these Answer :2 84.Activate BIOS-Perform POST-Check configuration settings (2) Activate BIOS-Perform POST-Load operating system-Check configuration settings (3) Perform POST .Check configuration settings (4) Activate BIOS .

To move down a page in a document…… (1) jump (2) fly (3) wriggle (4) scroll (5) None of these .85. Which of the following position is not available for fonts on MS Word? (1) Normal (2) Raised (3) Lowered (4) Centered (5) All are available Answer :4 86. The different styles of lettering in a word processing program…… (1) font (2) calligraphy (3) writing (4) manuscript (5) None of these Answer :1 88. ―Buy Now – Pay Later‖ is commonly used for : (1) Debit Cards (2) Vault Cards (3) Credit Cards (4) E-purse (5) None of these Answer :3 87.

Compilers can identify: (1) syntax errors (2) semantic errors (3) logical errors (4) mathematical errors (5) None of these Answer :1 90.Answer :4 89. Flow control in TCP/IP is handled using: (1) Urgent pointer (2) Checksum (3) Acknowledgement number (4) Variable-size sliding window (5) None of these . A hard copy of a document is … (1) stored in the hard disk (2) stored on a floppy (3) stored on a CD (4) printed on the paper (5) None of these Answer :4 92. Which was the first Scientific Computer Programming Language? (1) COBOL (2) LISP (3) ADA (4) FORTRAN (5) JAVA Answer : 4 91.

are known as : (1) font styles (2) font effects . Sparkle text. From which menu you can insert Header and Footer? (1) Insert Menu (2) View Menu (3) Format menu (4) Tools Menu (5) Edit Menu Answer :2 95. This component is required to process data into information and consists of integrated circuits . Moves the cursor one space to the right to puts spaces in between words…… (1) control key (2) space bar (3) printer (4) mouse (5) None of these Answer :2 96.Answer :4 93. Shimmer. Blinking Background etc. (1) Hard disk (2) RAM (3) CPU (4) ROM (5) None of these Answer :3 94.

The basic input/output system (BIOS) is stored in: (1) RAM (2) ROM (3) the CPU (4) the hard drive (5) None of these Answer :2 99. Which of the following features usually applies to data in a data warehouse? (1) Data are often deleted (2) Most applications consists of transactions (3) Data are rarely deleted (4) Relatively few records are processed by applications (5) None of these Answer :2 . The horizontal and vertical lines on a worksheet are called : (1) cells (2) sheets (3) block lines (4) gridlines (5) None of these Answer :4 98.(3) word art (4) text effects (5) None of these Answer :4 97.

People. software. Theinformation is then stored on a clipboard so you can paste it. The command used to remove text or graphics from a document. (1) chop (2) cut (3) clip (4) cart away (5) None of these Answer :2 103. What type of program controls the various computer parts and allows the user interact with the computer ? (1) Utility software (2) Operating system (3) Word processing software (4) Database program (5) None of these Answer :1 101.100. Which of the following is an example of connectivity? (1) data (2) hard disk (3) Internet (4) power cord (5) None of these Answer :3 102. hardware. and data are the five parts of a(n) : (1) competency system (2) computer system (3) information system (4) software system (5) None of these . procedures.

Which of the following statement is wrong? (1) Windows XP is an operating system (2) Linux is owned and sold by Microsoft (3) Photoshop is a graphical design tool by Adobe (4) Linux is free and open source software (5) None of the above Answer :2 106. A phenomenon in virtual memory schemes in which the processor spends most of the time swapping pages rather than executing instructions is : (1)loading (2) swapping (3) thrashing (4) aging (5) digging Answer :3 . What is that feature called? (1) Spacing (2) Scaling (3) Kerning (4) Positioning (5) None of these Answer :3 105.Answer :3 104. The feature of Word that automatically adjusts the amount of spacebetween certain combinations of characters so that an entire word looks more evenly spaced.

What is a specialized software program that allows input and output devices to communicate with the rest of the computer system? (1) Utility driver (2) Utility program (3) Data compression utility (4) Device driver (5) None of these Answer :4 110. . Give the name of the Linear list in which elements can be added at ends but not in the middle: (1) Array (2) Queue (3) Tree (4) Circular Queue (5) None of these Answer :2 108. When assigning a shortcut key to a symbol. (3) Assigned to another task. Flip-flop is the basic structure of the device: (1) Hard disk (2) Memory (3) Cells (4) Speakers (5) None of these Answer :2 109.107. you should always try to select a key or key combination that is: (1) unassigned (2) Located on the ten-key pad section of your keyboard. (4) From the same font family as the symbol.

A dumb terminal has : (1) An embedded microprocessor (2) Extensive memory (3) Independent processing (4) A keyboard and screen (5) None of these Answer :2 113. Which of the following is a software selection criteria? (1) Appropriateness (2) Efficiency (3) Compatibility (4) All of the above (5) None of these Answer :2 114. Which of the following memories needs refresh? (1) SRAM (2) DRAM . Which American Computer Company is called big blue? (1) Microsoft (2) Compaq Corp (3) IBM (4) Tandy Sevenson (5) Hewlett Packard Answer :3 112.(5) None of these Answer :1 111.

……… is paperless document transfer between companies. The Virtual Memory is located logically : (1) in the CPU (2) in main memory (3) in between CPU and primary memory (4) in the Hard disk (5) None of these Answer :2 118. (1) EFT (2) EDI (3) ETS (4) RTGS (5) None of these Answer :4 116.(3) ROM (4) All of above (5) None of these Answer :4 115. A software used to convert source program instructions to object instruction is known as : . The switching devices used in First Generation computer‘s were: (1) Transistors (2) SSI chips (3) VLSI chips (4) Vacuum Tubes (5) None of these Answer :4 117.

WAIS stands for : (1) Wide Area Intellectual Service (2) Web Access Information system (3) World wide Application of Intelligent System (4) Wide Area Information Service (5) None of these Answer :4 21.(1) Compiler (2) Assembler (3) Interpreter (4) Language processor (5) None of these Answer :4 119. Correcting errors in a program is referred to as……… (1) debugging (2) bugging (3) rectifying (4) modifying (5) None of these Answer: 1 . The subject of cybernetics deals with the science of : (1) Genetics (2) Control and communications (3) Molecular biology (4) Biochemistry (5) None of these Answer :2 120.

Regular are known as : (1) font styles (2) font effects (3) word art (4) text effects (5) None of these Answer: 1 125. Bold. This is a group of servers that share work and may be able to back each other up if one server fails. Which type of processing speed measurement is used primarily withsupercomputers? (1) Flops (2) Fractions of second (3) Gigahertz (4) MIPS (5) None of these Answer: 1 123. Italic. (1) Channel bank (2) Cluster (3) Tiger team (4) Serverless backup .122. What is the term associated with the second part of an e-mail address? (1) Local address (2) Eight characters long (3) User name (4) Domain name (5) None of these Answer: 4 124.

A screen element of MS Word that is usually located below the title bar that provides categorized options is : (1) Menu mar (2) Tool Bar (3) Status Bar (4) All of the above (5) None of these Answer: 1 128. Delete (2) Ctrl. Page Down (5) None of these Answer: 2 129.(5) Logical unit Answer: 2 126. Smart Card is : (1) Special purpose Cards (2) Microprocessor Cards (3) Processing unit contains memory for storing data (4) Processing unit for software handling (5) None of these Answer: 2 127. Shift (3) Left Arrow. Data related crime does not incorporate : (1) Data Didling (2) Data Spying . Which keys can be used together with other keys for special tasks ? (1) Insert. Right Arrow (4) Page up.

(3) Data Leakage (4) Data Mining (5) None of these Answer: 4 130. ‗DOS‘ floppy disk does not have : (1) A Boot Record (2) A File Allocation Table (3) A Root Directory (4) Virtual Memory (5) None of these Answer: 4 131. A disk on which you store information……… (1) plate (2) data disk (3) paper disk (4) TV disk (5) None of these Answer: 2 132. The operating system does all of the following EXCEPT: (1) provide a way for the user to interact with the computer. Lets you leave a screen or program…… (1) boot (2) programs (3) exit (4) text (5) None of these Answer: 3 133. .

(2) manage the central processing unit (CPU). checks it for errors and then executes it. MS-DOS is a ……… operating system. (3) manage memory and storage. Procedures are typically documented in manuals written by : (1) computer specialists (2) end users (3) Microsoft (4) service providers (5) None of these ] Answer: 1 136. ……… takes one line. What deletes the entire file except the file structure ? (1) ERASE (2) DELETE (3) ZAP (4) PACK (5) None of these Answer: 3 137. . (1) point-and-click (2) user-friendly (3) command-driven (4) Mac (5) None of these Answer: 3 135. (4) enable users to perform a specific task such as document editing. (5) None of these Answer: 4 134.

In latest generation computers. Artificial Intelligence is associated with which generation? (1) First Generation (2) Second Generation (3) Third Generation (4) Fifth Generation (5) Sixth Generation Answer: 4 139.(1) Assembler (2) Interpreter (3) Loader (4) Complier (5) None of these Answer: 2 138. Time during which a job is processed by the computer is : (1) Delay times (2) Real time (3) Execution time (4) Down time (5) None of these Answer: 3 140. Which of the following is not an input device? (1) OCR (2) Optical scanners (3) Voice recognition device (4) COM (Computer Output to Microfilm) (5) None of these Answer: 4 41. the instructions are executed : .

A technique used by codes to convert an analog signal into a digital bit stream is known as : (1) Pulse code modulation (2) Pulse stretcher (3) Query processing (4) Queue management (5) None of these Answer: 1 143. The number of bits that can be transmitted over a network in a certainperiod of time: (1) Latency (2) Delay (3) Bandwidth (4) Baud (5) None of these Answer: 3 144. Linux partitions are created using the file system: (1) FAT (2) FAT32 (3) EXT3 (4) NTFS (5) None of these .(1) Parallel only (2) Sequentially only (3) Both sequentially and parallel (4) All of above (5) None of these Answer: 3 142.

To check the presence of a computer in the network. use the command: (1) ping (2) cmd . The scientist who developed the idea of the WWW is : (1) James Gosling (2) Tim Berns Lee (3) Andrew Tannenbaum (4) Linus Torvalds (5) Bill Gates Answer: 2 147.Answer: 3 145. What was the data transmission method in which bi-directional data flow is allowed? (1) Simplex (2) Duplex (3) Analog (4) Single side mode (5) None of these Answer: 2 148. Which of the following data structure is widely used in a network model RDBMS? (1) Arrays (2) trees (3) graphs (4) stacks (5) None of these Answer: 3 146.

The word processing task associated with changing the appearance of a document is : (1) Editing (2) Writing (3) Formatting (4) All of above (5) None of these Answer: 3 150.(3) check (4) ipconfig (5) connect Answer: 1 149. Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs…… (1) menu bar (2) tool bar (3) user friendly (4) word processor (5) None of these Answer: 1 . Easy to use…… (1) user friendly (2) select (3) helpful (4) ever-ready (5) None of these Answer: 1 151.

When you save to ……… your data will remain intact even when thecomputer is turned off.152. Which of the following is not the major function of a computer ? (1) Processing data into information (2) Storing data or information (3) Gathering data (4) Analysing data or information (5) None of these Answer: 4 154. A method of executing two or more programs concurrently using the same computer describe: (1) multi processing (2) multiprogramming (3) virtual processing (4) time sharing (5) None of these Answer: 2 155. (1) RAM (2) motherboard (3) secondary storage device (4) primary storage device (5) None of these . Anything written on the screen …… (1) cursor (2) text (3) folder (4) boot (5) None of these Answer: 2 153.

Encryption decryption are functions of : (1) Transport layer . programmers began usingEnglish like abbreviations (Mnemonics) to represent the elementary operations. is a language. (3) one that can be used only at a particular time of the day (4) one that is assigned for all session that starts at a particular time (5) None of these Answer: 1 157. instead of using numbers.Answer: 3 156. A hardware interface that allows for the connection of several peripheral devices to a single PCI board. (1) SCSI (2) SATA (3) ATA (4) PCI (5) None of these Answer: 1 158. A one-time password is : (1) one that changes every time it is used (2) one that is assigned once and not changed at all. (1) Machine language (2) Mnemonics language (3) Assembly level language (4) High level language (5) None of the these Answer: 3 159.

or RAM………. Memory. also called random access memory. service or system is called a : (1) JAD (2) RAD (3) templating (4) prototyping (5) TAD Answer: 4 161. programs. commands. and user responses to be entered into a computer (4) consists of electronic components that store data (5) None of these Answer: 4 162. A ……… represent approximately one billion memory locations. (1) kilobyte (2) megabyte (3) gigabyte (4) terabyte (5) None of these Answer: 3 .(2) Session layer (3) Presentation layer (4) All of the above (5) None of these Answer: 2 160. (1) contains the electronic circuits that cause processing to occur (2) makes the information resulting from processing available for use (3) allows data. The process of building a model that demonstrate the features of a proposed product.

All of the following are steps involved in the boot process EXCEPT: (1) load the operating system into RAM. (2) the power-on self-test. (3) utility program. (2) peripheral device. (4) load application programs. Which of these terms refers to the feature of an OS that allows a single computer to process the tasks of several users at different stations. An interrupt handler is a(n): (1) location in memory that keeps track of recently generated interrupts. A port that allows 8 bits at a time to be transmitted simultaneously is a(n) ………. (3) activate the basic input/output system (BIOS). (5) None of these Answer: 4 165. in round-robin fashion? (1) Multiprocessing (2) Multiprogramming (3) Multitasking (4) Time processing . (4) special numeric code that indicates the priority of a request (5) None of these Answer: 4 164.163. (1) dedicated port (2) parallel port (3) SCSI port (4) USB port (5) None of these Answer: 2 166.

A place that a user can create to store files…… (1) cursor (2) text (3) folder (4) boot (5) None of these Answer: 3 170. Electronic pens are used with the mouse to write on a slide in which view? . Screen that comes on when you turn on your computer that shows all the icons…… (1) desktop (2) face to face (3) viewer (4) view space (5) None of these Answer: 1 169.(5) Time-sharing Answer: 5 167. A program which helps create written documents and lets you go back and make corrections as necessary…… (1) spreadsheet (2) personal writer (3) word printer (4) word processor (5) None of these Answer: 4 168.

Which of the following is NOT one of the steps in the machine cycle? (1) Execute (2) Store (3) Decode (4) Pipelining (5) None of these Answer: 4 173. Word automatically adjusts the ……… to maintain the correct proportion. When you insert a picture and adjust the height. (1) pixel size (2) resolution (3) screen size (4) width (5) None of these Answer: 4 172. How many peripheral devices can be connected to a single SCSI port? (1) 1 (2) 8 (3) 16 (4) 32 (5) 64 Answer: 2 .(1) Master (2) Slide Sorter (3) Slide Show (4) Normal (5) Print preview Answer: 3 171.

(4) virtual memory is physical space on the hard drive. (2) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.174. (5) None of these Answer: 1 176. All of the following are TRUE regarding virtual memory EXCEPT : (1) any amount of RAM can be allocated to virtual memory. The four-step process of fetch. (3) this temporary storage is called the swap file or page file. The operating system is the most common type of ……… software. The human-readable version of a program is called ……… (1) source code (2) program code (3) human code . (1) communication (2) application (3) system (4) word-processing (5) None of these Answer: 3 177. execute. decode. and store is called a(n): (1) machine cycle (2) instruction cycle (3) arithmetic operation (4) logical operation (5) None of these Answer: 1 175.

The total set of interlinked hypertext documents worldwide is : (1) HTT (2) Browser (3) WWW (4) B2B (5) None of these Answer: 1 180.(4) system code (5) None of these Answer: 4 178. (1) never sent to the client machine (2) sent in very large sections to save processing time (3) sent only upon the client‘s request (4) sent in complete copies for the client to filter and sort (5) sent from the client to the server for processing Answer: 3 179. Which is the part of a computer that one can touch and feel ? (1) Programs (2) Software . Which of the following is not one of the three ‗Mail Merge Helper‘ steps? (1) Merge the two files (2) Create the main document (3) Set the mailing list parameters (4) Create the data source (5) None of these Answer: 3 181. Data are ……… in client/server computing.

There are several security devices used to stop individuals from exploiting your system. Which of the following is used in conjunction with a firewall? (1) Proxy server (2) Intrusion-detection system (3) Terminal server (4) Web server (5) None of these Answer: 1 184. A command to get a file you worked on from the memory where it was stored…… (1) close (2) delete (3) open (4) get it (5) None of these Answer: 3 183. Array is ……… (1) Linear data structure (2) non-linear data structure (3) simple data structure (4) complex data structure (5) None of these Answer: 1 .(3) Hardware (4) Output (5) None of these Answer: 3 182.

185. A computer checks the ……… of user names and passwords for a match before granting access. Which of the following is the latest version of MS Word? (1) Word 2000 (2) Word 2007 (3) Word 2010 (4) Word 2011 (5) Word 2012 Answer: 3 187. (1) website (2) network (3) backup file (4) database (5) None of these Answer: 4 186. what do the initials CEM stands for ? (1) Costly E-Commerce Marketing (2) Customer Experience Management (3) Customer Experience Misleading (4) Cost Estimates are Mind Boggling (5) None of these Answer: 2 188. In the online world of electronic commerce. What type of program controls the various computer parts and allows the user interact with the computer ? (1) Utility software (2) Operating system (3) Word processing software (4) Database program (5) None of these .

Answer: 1 189. Leaves of which of the following trees are at the same level ? (1) Binary tree (2) B-tree . Which of the following transmission systems provide the highest data rate to in individual device? (1) computer bus (2) telephone lines (3) voice and mode (4) lease lines Answer: 1 190. The combination of the operating system and the processor is referred to as the computer‘s: (1) CPU (2) platform (3) BIOS (4) CMOS (5) None of these Answer: 2 191. The operating system allows users to organize the computer‘s contents in a hierarchical structure of directories that include all of the following EXCEPT: (1) files (2) folders (3) drives (4) systems (5) None of these Answer: 4 192.

repetitive (2) Grammatically incorrect (3) Misspelled (4) Half (5) None of these Answer: 3 . Firewalls are used to protect against……… (1) Unauthorized Attacks (2) Virus Attacks (3) Data Driven Attacks (4) Fire Attacks (5) All of these Answer: 1 195. Auto correct was originally designed to replace ……… words as you type. (1) Short.(3) AVL-tree (4) Expression tree (5) None of these Answer: 2 193. The transformation of a message into an encoded form is known as : (1) Mnemonics (2) Encoding (3) Encryption (4) Decoding (5) None of these Answer: 2 194.

The unique signal. Ensuring that the essential peripheral devices are attached and operational is the ……… process. (1) configuration (2) CMOS (3) POST (4) ROM (5) check Answer: 3 197. that tells the operating system that it is in need of immediate attention is called an: (1) action (2) event. (3) too many processors being managed by the operating system. The definition of thrashing is: (1) swapping data between virtual memory and RAM too frequently.196. (3) interrupt (4) activity (5) None of these Answer: 3 198. (2) insufficient hard disk space. (4) inaccurate information stored in the registry (5) None of these . generated by a device. Before a package can be used in a java program it must be ……… (1) executed (2) referenced (3) imported (4) declared (5) None of these Answer: 3 199.

Answer: 1 200. Which of the following is a disadvantage of machine language? 1) Machine Dependent 2) Slower Execution 3) Machine Independent 4) It requires Translation 5) None of these Answer: 1 202. The primary device that a computer uses to store information…… (1) register (2) storehouse (3) desk (4) hard drive (5) None of these Answer: 4 201. Android Operating system is an example of which kind of Source Model? 1) Open Source 2) Vertical Market Software 3) Horizontal Market Software 4) Shareware 5) None of these Answer:1 203. Cache memory is an example of which of the following? 1) Virtual Memory 2) Non Volatile Memory 3) Static Random Access Memory .

. A software that is not protected by copyright or trademark is . Which of the following programming languages is associated with Artificial Intelligence? 1) C 2) B 3) C++ 4) JAVA 5) PROLOG Answer:5 206.. The term Hard copy is related to: 1) Storing data on Hard Disk 2) Output displayed on Monitor 3) Scanned Image ...4) Secondary Memory 5) None of these Answer:3 204. AltaVista is a(n) 1) Windows Utility 2) Search engine 3) Program 4) Antivirus 5) None of these Answer:2 207.. 1) Vertical Market Software 2) Public Domain Software 3) Shareware Software 4) Trialware 5) Adware Answer:2 205.

4) Printouts 5) None of the above Answer:4 208. . MIME is an acronym for .. Which of the following generation computers is referred to an expertsystem? 1) 2nd 2) 1st 3) 4th 4) 3rd 5) 5th Answer: 5 211). 1) Hardware 2) Code ..... is a set of instructions..... 1) Multiprogramming Internet Mail Extension 2) Multicasting Internet Mail Extension 3) Multiple Internet Mail Extension 4) Multipurpose Internet Mail Extension 5) None of these Answer: 4 209.. Any crime that involves a Computer and a Network is called: 1) Virus 2) Malware 3) Trojan Horse 4) Cyber crime 5) Identity Theft Answer: 4 210..

3) Language 4) Program 5) All the above Answer: 4 212. Which of the following is the keyboard short-cut for permanent deletion of a file/folder in windows? 1) Del. 2) Shift + Del. 3) Ctrl + Del. 4) Alt + Enter 5) None of these Answer: 2 213. Which of the following is an Object Oriented Programming Language? 1) C 2) Java 3) C++ 4) Both 2 and 3 5) Both 1 and 2 Answer: 4 214. The popular name for ―Information Super Highway‖ is: 1) Intranet 2) Extranet 3) Virtual Private Network 4) MAN 5) Internet Answer: 5 215. Encryption is primarily used in: 1) Computer Processing

2) File retention 3) Data communication 4) Data Storage 5) None of these Answer: 3 216. The main folder on a storage device is called ..... 1) Root directory 2) Interface 3) Device driver 4) Platform 5) Main directory Answer: 1 217. To protect the computer from hacker intrusions, ..... must be installed. 1) Firewall 2) Mailer 3) Script 4) Yahoo Messenger 5) None of these Answer: 1 218. Which of the following is used to read handwritten or printed text to make a digital image that is stored in memory? 1) Printer 2) Laser beam 3) Scanner 4) Touchpad 5) None of these Answer: 3 219. A program designed to destroy data on the computer which can travel to infect other computers is called a .....

1) Hurricane 2) Infector 3) Disease 4) Virus 5) None Answer: 4 220. Thesaurus option is available in ..... menu. 1) Page layout 2) References 3) Review 4) View 5) Layout Answer: 3 221. Blu-Ray disk is an example of a(n) .... 1) Hard disk 2) Magnetic Disk 3) Optical Disk 4) Output Device 5) None of these Answer:3 222. Which of the following is true about Name box? 1) It appears at the left of the formula bar 2) It appears below the menu bar 3) It shows the locations of the active cell. 4) Both 1 and 3 5) Both 2 and 3 Answer:4 223. Which of the following is known as non volatile memory?

. Which of the following is another name for pre-programmed formula in Excel? 1) Range 2) Graph 3) Function 4) Cell 5) None of these Answer: 3 226. 1) View 2) Insert 3) Format 4) Tools 5) Table Answer: 4 225. menu of MS Word..... ALU works on the instructions held in .. To see the document before the printout is taken...... Auto correct function option is present in ... use .. 1) Notebook 2) Registers 3) Notepad 4) Clipboard 5) I/O Devices Answer: 2 227...1) Hard Disk 2) Floppy Disk 3) CD-ROM 4) DVD-ROM 5) All the above Answer: 5 224. .

A register that keeps track of the next instruction to be executed is called a(n): 1) Data Register 2) Instruction Register 3) Action Register 4) Program Counter 5) None of these Answer: 2 230.... helps create. . Which of the following is the feature that keeps track of the right margin? 1) Find and Replace 2) Dragged Right 3) Ruler 4) Right Justified 5) Left Justified .1) Insert Table 2) Paste 3) Format Painter 4) Cut 5) Print Preview Answer: 5 228. manipulate and analyze data arranged in rows and columns? 1) Application Package 2) Word Processing Package 3) Outlining Package 4) Outline Processors 5) Spreadsheet Package Answer: 5 229.

A network which connects cities or states is known as: 1) LAN 2) CAN 3) PAN 4) VPN 5) MAN Answer: 5 232. Which of the following allows you to insert graphics into a word document? 1) Callouts 2) Flowcharts 3) Basic Shapes 4) All of the above 5) None of these Answer: 4 233. ERP is an acronym for: 1) Enterprise Retirement Planning 2) Enterprise Relationship Planning 3) Enterprise Resource Planning 4) Enterprise Reorder Planning 5) None of these .Answer: 4 231. An email address consists of: 1) Domain name 2) User name 3) Username followed by password 4) Domain name followed by user name 5) Username followed by domain name Answer: 5 234.

... Which of the following controls the manner of interaction between the user and the operating system? 1) Language Translator 2) Platform 3) User Interface . 1) Folder 2) Mail box 3) Directory 4) Hard Disk 5) None of these Answer: 2 236.Answer: 3 235... CD-R and . is the storage area for e-mails. Three types of Compact disks include CD-ROM. Collecting personal information and effectively posing as another individual is known as: 1) Spooling 2) Spoofing 3) Hacking 4) Identity Theft 5) None of these Answer: 2 238.. 1) CD-W 2) CD-RAM 3) CD-DVD 4) CD-RW 5) None of these Answer: 4 237. .....

The . Which of the following best defines Embedded system? 1) A program that comes wrapped in a box 2) A program that is permanent part of a computer 3) A computer that is a part of a larger computer 4) A computer and software system that controls a machine 5) None of these Answer: 4 240..4) Icon 5) None of these Answer: 3 239. Which of the following power point view displays each slide of thepresentation as a thumbnail and is useful for rearranging slides? 1) Slide show 2) Slide master 3) Slide sorter 4) Notes Page 5) Design Slide Answer: 3 242. 1) Default 2) CPU 3) Peripheral 4) User-friendly 5) None of these Answer: 1 241....... Settings are automatic and standard.. A set of rules for telling the computer what operations to perform is / are called: 1) Structures ..

Mahesh Babu has his cute childhood photos in an album which might fade out in a couple of years. which he wants to show it to his fans by uploading it in his twitter account.2) Procedural Language 3) Command Language 4) Natural Language 5) Programming Language Answer: 5 243. Which of the following devices can he use to do that? 1) Keyboard 2) Mouse 3) Printer 4) Scanner 5) None of these . Devices that enter information and let you communicate with the computer are called: 1) Software 2) Hardware 3) Output Devices 4) Input / Output devices 5) Input Devices Answer: 5 244. The speed of which of the following memory chips is faster? 1) Not Fixed 2) DRAM 3) SRAM 4) For smaller chips SRAM is faster 5) For larger chips DRAM is faster Answer: 3 245.

com.worddoc 5) None Answer: 3 249. Which among the following is the file extension for Word Documents? 1) .docx 4) . In the URL https://twitter. Linux Operating system is an example of which of the following? 1) Freeware 2) Open Source Software 3) Shareware 4) Complimentary 5) None of these .ppt 3) .xls 2) . Which of the following is not a social networking site? 1) WAYN 2) Hi 5 3) Orkut 4) Yahoo 5) Facebook Answer: 4 247.Answer: 4 246. what does 's' represent in 'https'? 1) Safe 2) System 3) Start-up 4) Semantic 5) Secured Answer: 5 248.

Mr. Which of the following software applications would be most appropriate for performing Statistical and Numerical calculations: 1) Document Processor 2) Graphics Package II 3) Power Point 4) Spreadsheet 5) Meta Processor Answer: 4 252. in the C drive. Removing and replacing devices without turning off the computer is referred to as: 1) Search Engines 2) Operating System 3) Software 4) Resource Locators 5) Plug-n-Play Answer: 5 253. and also in the D drive. A device that connects to a network without the use of a cable is said to be: 1) Distributed 2) Non-Wired 3) Centralised 4) Open source 5) Wireless Answer: 5 251. This scenario in computer language is generally referred to as: 1) Data Redundancy .Answer: 2 250. Prashanth has a song sung by him on the desktop.

When data changes in multiple lists and all lists are not updated. Which of the following is true based on the given scenario? 1) Pavan Kalyan can view the email address of Chiranjeevi and Nagababu 2) Nagababu can view the email address of Pavan Kalyan & Chiranjeevi 3) Pavan Kalyan can view the email address of Nagababu only 4) Both 1 and 2 5) None of them is true Answer: 2 256. Chiranjeevi sent a mail to Pavan Kalyan by putting his email address in 'Cc' and to Nagababu by putting his email address in 'Bcc'. What is a Firewall? 1) A wall to protect against Fire 2) A software to protect from computer hacker intrusions 3) A software to destroy computer 4) A wall to make partitions in computer 5) None of these Answer: 2 255. this causes: 1) Data Population Problem 2) Data Reduction 3) Data Induction 4) Data Overload 5) Data Inconsistency .2) Multiple Data Places 3) Various File Places 4) Data Inconsistency 5) Data Independent Answer: 1 254.

Opera Software 3) Internet Explorer .Net Scape Communications 5) None of these Answer: 4 260.Google 2) Opera . What is the full form of RISC? 1) Reduced Instruction Set Computing 2) Reformed Instruction System Computing 3) Reduced Information System Computing . Find the Mis-Matched pair.Microsoft 4) Safari .Answer: 5 257. 1) Chrome . Which of the following is not an operating system? 1) Windows 2000 2) DOS 3) Windows 7 4) Mac Os X Lion 5) Google Answer: 5 259. The legal right to use software based on specific restrictions is granted via a: 1) Software privacy policy 2) Software License 3) Software password manager 4) Software log 5) None of these Answer: 2 258.

. A . In order to delete a sentence from a document you would use .... 1) Highlight and copy 2) Cut and Paste 3) Copy and Paste 4) Highlight and Delete 5) Select and Paste Answer: 4 263.. What is the keyboard shortcut for Slide Show in Powerpoint ? : 1) F4 2) F8 3) F9 4) F5 5) F12 Answer: 4 264..4) Restoration of Information in System Computing 5) Reduced Instruction Sect Code Answer: 1 261... 1) Flow chart 2) Hierarchy Chart .. is a design tool that graphically shows the logic in a solution algorithm.. The common name for Modulator and Demodulator is: 1) Modem 2) Joiner 3) Networker 4) Connecter 5) Mom-dom Answer: 1 262..

. 1) Status Bar 2) Formatting Toolbar 3) Standard Toolbar 4) Titlebar 5) Status and Title bars Answer: 3 267.. The process of transforming information using an algorithm to make it unreadable by anyone is usually referred to as: 1) Decryption ... Print and Save Buttons are all located on the . SMPS in a computer stands for? 1) Switched-Mode Power Supply 2) Simple-Mode Power Supply 3) Simple-Mode Power System 4) Switched-Menu Power Supply 5) None of these Answer: 1 268. The Open.. The justification that aligns text on both margins of a document in Word is ... 1) Justify 2) Bold 3) Centre 4) Right 5) Balanced Answer: 1 266...3) Structure Chart 4) Context Diagram 5) None Answer: 1 265..

What is the symbol for attachments in yahoo mail? 1) Envelope 2) Letter A 3) Paper Clip 4) Pen 5) None . 1) DRAM 2) PRAM 3) NRAM 4) NORAM 5) None Answer: 1 270. ... is a type of RAM that stores each bit of data in a separate capacitorwithin an integrated circuit making it an efficient way to store data in memory. Operational system.. within an organization is usually referred to as 1) Internet 2) MAN 3) PAN 4) NPN 5) Intranet Answer: 5 271.. A computer network that uses Internet protocol technology to shareinformation.2) Encryption 3) Alphabet Coding 4) Encrography 5) Deptography Answer: 2 269.

... 1) Common Business Oriented Language 2) Computer Business Oriented Language 3) Common Business Operated Language 4) Common Business Organized Language 5) None of these .. is the science that attempts to produce machines that display the same type of intelligence that humans do 1) Nanoscience 2) Nanotechnology 3) Simulation 4) Artificial intelligence (AI) 5) None Answer: 4 275..Answer: 3 272... Winzip is an example of : 1) Free ware 2) Shareware 3) Open Source 4) Vertical Market Software 5) None Answer: 1 274........ Which of the following computers is used in Scientific researches? 1) Super Computers 2) Main Frame 3) Laptop 4) Micro Computers 5) None of these Answer: 1 273....... ... COBOL is an acronym for .

Which of the following is not a programming language with Object Oriented Features? 1) COBRA 2) ABAP 3) C++ 4) C# 5) C Answer: 5 278. The human readable version of a software program is called: 1) cache 2) instruction set 3) source code 4) word size 5) None of these Answer: 3 277. The quickest and easiest way in Word. to locate a particular word or phrase in a document 1) Replace 2) Find 3) Lookup . Which of the following programming language is favoured for Artificial Intelligence? 1) ABAP 2) COBOL 3) LISP 4) JAVA 5) C# Answer: 3 279.Answer: 1 276.

terminals and other peripheral devices within a limited geographical area is called– 1. None of these Answer: 1 283. All of the above 5. A digital communication system capable of interconnecting. Internet 4. LAN 2. Magnetic tape 2. especially in corporate offices– .4) Search 5) None of these Answer: 2 280. An E-mail protocol for storage. Hard disk 4. WAN 3. All of the above 5. None of these Answer: 1 282. a large number of computers. manage-ment and change. Compact disk 3. What symbol is present on the number key '2' on the keyboard? 1) ! 2) % 3) ^ 4) @ 5) * Answer: 4 281. A secondary storage device that uses a long plastic strip coated with amagnetic material as a recording medium is– 1.

1. Message handling service 2. Postal service‘s 3. Data storage 4. All of the above 5. None of these Answer: 1 284. Which of the following is an advantage of stored programs? 1. Reliability 2. Reduction in operation costs 3. The computers becoming general-purpose 4. All of the above 5. None of these Answer: 1 285. Which of the following is not true for primary storage? 1. It is a part of the CPU 2. It allows very fast access of data 3. It is relatively more expensive then other storage devices. 4. Can be removed and transported. 5. All of the above Answer: 1 286. Function of control unit in the CPU is– 1. To decode program instructions 2. To transfer data to primary storage 3. To perform logical operations 4. To store program instructions 5. All of the above Answer: 4 287. Electronic spreadsheets are useful in situation where relatively .......... data must be input

1. Small 2. Large 3. No 4. All of the above 5. None is true Answer: 1 288. A list of options from which a program user can select anyone in order to perform a desired action is referred as– 1. Menu 2. Index 3. Directory 4. All of the above 5. None of these Answer: 2 289. A method whereby messages to be transmitted between computers are all sent to a central computer, which gathers them and routes them to the appropriate destination(s) is known as– 1. Message switching 2. Message delete 3. Message accept 4. All of the above 5. None of these Answer: 1 290. Which of the following describe one or more characteristics of a modem computer? 1. An electronic device 2. A mechanical device 3. A electro-mechanical device 4. All of the above 5. None of these

Answer: 1 291. Combining records from two or more ordered files into a single ordered file is called– 1. Menu 2. Merging 3. Taking 4. All of the above 5. None of these Answer: 1 292. The ascending order of a data hierarchy is 1. Bit-byte-record-field-file-database 2. Byte-bit-field-record-file-database 3. Byte-bit-record-file-field-database 4. Bit-byte-field-record-file-database 5. All of the above Answer: 2 293. A LSI chip contains the entire CPU of computer except main memory is called– 1. Microprocessor 2. Hard disk 3. Input device 4. Output device 5. All of the above Answer: 4 294. A storage medium that loses its contents in the event of power failure is called– 1. Volatile storage 2. Non volatile storage

and primary storage . Minute 5. data files. None of these Answer: 1 295. Delete 4. and processing 2.3. Backup 2. Millisecond 3. primary storage. arithmetic-logic unit. lost. The CPU (central processing unit) consists of 1. Microsecond 2. hardware equipments. Millisecond 3. Control unit. All of the above 5. All of the above Answer: 1 296. All of the above Answer: 1 298. Microsecond 2. Hour 4. Control unit. or fail to operate is– 1. One-millionth of a second is referred as– 1. Hour 4. and secondary storage 3. Input. All of the above 5. used in case the original one is destroyed. Minute 5. Permanent storage 4. One-thousandth of a second is called– 1. Alternate facilities of programs. output. Forehead 3. None of these Answer: 1 297. etc.

Local Area Network 4. Nible is– 1. Data 2. All of the above 5. The input device used by computer is– 1. Ten times of byte .4. Central processing unit 3. Network topology 2. None of these Answer: 2 299. Software 4. The structure of interconnecting of nodes of a computer network is referred as– 1. All of the above Answer: 3 302. System unit 5. The product of data processing is– 1. All of the above Answer: 3 300. Keyboard 4. Wide Area Network 5. Information 3. Double of byte 2. Computer 5. Internet 3. Motherboard 2. Half of byte 3. All of the above Answer: 2 301.

4. Multiprogramming is the– 1. None of these Answer: 2 304. 4. The inter-leaved execution of two or more different and independent programs by the different computers 4. A facility available in an operating system that allows multiple functions from the same application package is referred as– 1. Multi-threading 2. All of the above Answer: 1 303. The inter-leaved execution of two or more different and independent programs by the same computer 2. None of these Answer: 1 . Both 1. Multi-processing 4. That handle low volumes of data 2. Five times of byte 5. Narrowband channel is a communication channels– 1. and 2. None of these Answer: 1 305. Used mainly for telegraph lines and low speed terminals 3. Multi-programming 3. All of the above 5. All of the above 5. The execution of single by the different computers 3. All of the above 5.

All of the above 5. All of the above 5.306. Multiprocessing 3. Non-document files are– 1. Internet 4. Peer-to-peer is a description– 1. The method of dividing a physical channel into many logical channels so that a number of independent signals may be simultaneously transmitted on it is referred as– 1. Following is the example of Network– 1. Of communications between two different devices 4. None of these Answer: 4 307. All the above 5. Pure ASCII files that can be listed for specific word processing software 4. Non ASCII files that can be listed for any word processing software 3. LAN 2. None of these . Non ASCII files that can be listed for pecific word processing software 5. Of communications between two dissimilar devices 2. Multiplexing 4. Pure ASCII files that can be listed for any word processing software 2. WAN 3. None of these Answer: 4 308. Multithreading 2. Of communications between two equal devices 3. All of the above Answer: 2 309.

Laser printer 4. Mobile phone . None of these Answer: 3 311. An interconnected computer configura-tions or computers with two or more independent CPUs that have the ability to simultaneously execute several programs is called– 1. Ink-jet printer 3. Octal 4. Devices converts digital signals to Sine waves at the sending end and back to digital signals at the receiving end is called– 1. All of the above Answer: 2 312. A number system with a base of 8 is referred as– 1. None of these Answer: 3 313. Thermal printer 2. Modem 2. Binary 2. Dot-matrix printer 5. Multithreading 2. Following is not a non-impact printer– 1. All of the above 5. Multiplexing 4. Multiprocessing 3.Answer: 2 310. Decimal 3. Telephone 3. All of the above 5.

The technique where digital signals are converted to its analog form for transmission over an analog facility is called– 1. Microprocessing 4. Modular approach 3. Where many CPU under a common control 2.4. Consisting of more than one input devices under common control 3. Modulation 2. None of these Answer: 1 317. Digitization 3. None of these Answer: 1 315. Monitoring 2. design and programming effort is referred as– 1. The point at which the flow of text in a document moves to the top of a new page– . None of these Answer: 3 314. All of the above 5. All of the above 5. All of the above 5. All of the above 5. Multiprocessing 4. Multiprocessor is a computer system– 1. Where many output devices under 4. None of these Answer: 2 316. Dividing a project into segments and smaller units in order to simplify the analysis.

Byte 3. None of these Answer: 1 318. None of these Answer: 1 319. All of the above 5. Page insert 3. Segmentation 4. Half adder 3. Page format 4. Parallel adder 2.1. De-fragments 3. All of the above 5. Page break 2. Technique to implement virtual memory where memory is divided into units of fixed size memory is– 1. None of these Answer: 1 320. An extra bit added to a string of bits that enables the computer to detect internal errors in the transmission of binary data– 1. An adder where all the bits of the two operands are added simultaneously– 1. All of the above 5. All of the above 5. Parity bit 2. Nibble 4. Paging 2. None of these . Full adder 4.

A high-level programming language 2. Entrance without paying something 4. Code by which a user gains access to a computer system 2. All of the above 5.Answer: 1321. Low level programming language 3. Secondary memory 4. None of these Answer: 1 322. Assembly language 5. High level programming language 2. All of the above 5. Pass for viewing movie 3. None of these . PL 1 (Programming Language One) is– 1. Password is– 1. All of the above Answer: 1 323. Machine language 4. All of the above 5. Named after mathematician that facilitates structured programming techniques 4. None of these Answer: 1 324. Primary memory 3. Random access memory (RAM) 2. Pascal is– 1. Storage device where time to retrieve stored information is independent of address where it is stored is called– 1. Named after Blaise Pascal 3.

Since input and output devices are on the edge of the main processing therefore they are referred as– 1. A system changeover method where complete changeover to the newsystem takes place incrementally over a period of time is referred as– 1. One trillionth of a second is– 1. None of these Answer: 3 327. Eight 4. Complete replacement 4. Micro second . Ten 5. Four 3. Phased replacement 2. All of the above 5. Pico second 2. Peripheral devices 2. All of the above Answer: 3 326. Two 2.Answer: 4 325. All of the above 5. Personal devices 4. Processing devices 3. Octal number system has a base– 1. Mille second 3. Block replacement 3. None of these Answer: 1 328.

All of these Answer: 1 329. None of these Answer: 4 331. If a word is typed that is not in Words dictionary. (A) Search . Secondary storage 4. Volatile storage 3. Magnetic tape 2. A storage medium that retains its contents even in the absence of power is referred as– 1. Non-volatile storage 2. Following is of Non-vo a storage device 1. a ___ wavy underlineappears below the word. (A) red (B) green (C) blue (D) black (E) None of these Ans (A) 332. All of the above 5.4. Compact disk 3. Floppy disk 4. Minute 5. None of these Answer: 1 330. The _____ button on the quick access Toolbar allows you to cancel your recent commands or actions. Primary storage 5.

(B) Cut (C) Document (D) Undo (E) None of these Ans (D) 333. (A) kilobyte (B) megabyte (C) gigabyte (D) terabyte (E) None of these Ans (C) . hyphen. (A) Word processing (B) Presentation graphics (C) Database Management Systems (D) Electronic Spreadsheet (E) None of these Ans (C) 335. In Excel. ________ Software allows users to perform calculations on rows andcolumns of data. any set of characters containing a letter . A _________ represent approximately one billion memory locations. or space isconsidered ___ (A) a formula (B) text (C) a name (D) a title (E) None of these Ans (B) 334.

When you quickly press and releaes the left mouse button twice . (A) communication (B) application (C) system (D) word-processing (E) None of these Ans (C) 338. The horizontal and vertical lines on a worksheet are called ___ (A) cells (B) sheets . The operating system is the most common type of ______________software.336. ______ cells involves creating a single cell by combining two or moreselected cells. (A) Formatting (B) Merging (C) Embedding (D) Splitting (E) None of these Ans (B) 337. you are ____ (A) Primary-clicking (B) pointing (C) Double-clicking (D) Secondary-clicking (E) None of these Ans (C) 339.

D. CPU D. Ans (D) 342. A GUIs B Icons .manage the central processing unit (CPU). enable users to perform a specific task such as document editing. To delete an incorrect character in a document. provide a way for the user to interact with the computer. (A) press the left mouse key (B) double-click the right mouse key (C) press the BACKSPACE key (D) press the delete key (E) None of these Ans (D) 341. A CD B. DVD AnS (B) 343. During the boot process.manage memory and storage. C . ____________ are lists of commands that appear on the screen. the ____________ looks for the system files.(C) block lines (D) gridlines (E) None of these Ans (D) 340. BIOS C. The operating system does all of the following EXCEPT: A. B . __________ to erase to the right of the insertion point.

D activity. B event. The unique signal. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processors attention. that tells the operating system that it is in need of immediate attention is called an: A action.C Menus D Windows Answer: C 344. included in the operating system. The blocks of code. Answer: C 346. A Multitasking B Streamlining C Multiuser D Simulcasting Answer: A 345. generated by a device. ____________ is the ability of an operating system to control the activities of multiple programs at the same time. that softwareapplications interact with are known as: . C interrupt. A CPU B slice of time C stack D event Answer: B 347.

C program that coordinates the print jobs that are waiting to print. A spooler is a(n): A location in memory that maintains the contents of a document until it prints out. complimentary metal-oxide conductors (CMOS). Answer: A 348. An interrupt handler is a(n): A location in memory that keeps track of recently generated interrupts. C utility program. MS-DOS is a ____________ operating system. A point-and-click B user-friendly C command-driven D Mac Answer: C 349. bootstrap loaders. D message sent from the printer to the operating system when a print job is completed. Answer: C 351. B peripheral device. D special numeric code that indicates the priority of a request. device drivers. B print job.A B C D application programming interfaces (APIs). Answer: D 350. Virtual memory is typically located: .

D inaccurate information stored in the registry. C in a flash card. Answer: A 354. . B Safe Mode loads all nonessential icons. C too many processors being managed by the operating system. D allow multiple print jobs to print their pages out simultaneously. B insufficient hard disk space. All of the following are TRUE of Safe Mode EXCEPT: A Safe Mode is a special diagnostic mode. Answer: B 355. D on the hard drive. B hold a program’s data or instructions in virtual memory when it can’t fit in RAM. Answer: D 352. B in the CPU. The purpose of a swap (or page) file is to: A maintain pages of documents that are being spooled to the printer.A on a floppy disk. C prevent thrashing in a multitasking environment. C Safe Mode allows users to troubleshoot errors. Verification of a login name and password is known as: A configuration. The definition of thrashing is: A swapping data between virtual memory and RAM too frequently. Answer: B 353. D Safe Mode loads only the most essential devices.

B accessibility. D logging in. C BIOS. The combination of the operating system and the processor is referred to as the computers: A CPU. The following message generally means: A a nonsystem floppy has been left in the floppy disk drive. Answer: C 356. Which of the following is the correct sequence of actions that takes place during the boot-up process? A Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings B Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings C Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings D Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system . Answer: B 357. C authentication. C the BIOS is corrupted. D CMOS. B platform. Answer: A 358. B the CD drive is not functioning. D there is a problem loading a device.

C activate the basic input/output system (BIOS). A BIOS B API C device driver D supervisor program Answer: A 361. Answer: B 362.Answer: B 359. A configuration B CMOS C POST D ROM . B ROM. stored on a ROM chip. D the hard drive. The basic input/output system (BIOS) is stored in: A RAM. B the power-on self-test. D load application programs. is responsible for loading theoperating system from its permanent location on the hard drive into RAM. Ensuring that the essential peripheral devices are attached and operational is the ____________ process. All of the following are steps involved in the boot process EXCEPT: A load the operating system into RAM. Answer: D 360. The ____________. C the CPU.

C The BIOS identification process occurs. D kernel. Answer: A 365. . B API. C CMOS. The memory resident portion of the operating system is called the: A registry. B folders. Which of the following does NOT occur during the power-on selftest ? A The ScanDisk utility begins to run. B the setting for the amount of hard drive space to allocate to virtual memory can be manually changed. The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT: A files. All of the following are TRUE regarding virtual memory EXCEPT: A any amount of RAM can be allocated to virtual memory. D Memory chips are checked to ensure they are working properly. Answer: A 366.Answer: C 363. Answer: D 364. D virtual memory is physical space on the hard drive. B The video card and video memory are tested. C this temporary storage is called the swap file (or page file).

Answer: A 368. B windows can be resized and repositioned on the desktop. D a graphics file. D toolbars and scrollbars are features of windows. B the folder contains subfolders. C a text file. B Files can be generated from an application. C Files are stored in RAM. A List B Thumbnails . D Files should be organized in folders. a plus (+) sign in front of a folder indicates: A an open folder. C more than one window can be open at a time. In Windows XP. Answer: D 367. D systems. All of the following statements concerning windows are true EXCEPT: A windows are an example of a command-driven environment. if you want to see the file size and modified dates of all files in a folder. Answer: B 370. All of the following statements concerning files are true EXCEPT: A A file is a collection of related pieces of information stored together for easy reference. Using Windows Explorer.D drives. the best viewing option is the __________ view. Answer: C 369.

identity theft. wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop. POS D. Answer: B 372. A(n) ____________ system is a small. A. hackers. data mining B. spam. data conversion Answer: A 373. Query Answer: B 374. A process known as ____________ is used by large retailers to study trends. Point-of-sale (POS) C. All of the following are examples of real security and privacy risks EXCEPT: A. Sales D. D. ____________terminals (formerly known as cash registers) are oftenconnected to complex inventory and sales computer systems. C. data selection C. A.C Details D Icon Answer: C 371. B. viruses. . Data B.

data mining Answer: A 375. robotics. C. RFID C. simulation. computer forensics. Answer: C 376. D. GPS Answer: B . storing the data or information Answer: C 377.A. B. ____________ tags. processing data into information C. Which of the following is NOT one of the four major data processingfunctions of a computer? A. gathering data B. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called: A. PPS D. animation. can be used to record and track in a database all of the animal’s movements. POS C. inventory D. POS B. PSS B. analyzing the data or information D. A. when placed on an animal.

Artificial intelligence Answer: A 381. Nanotechnology C. available to everyone. ____________ is the science that attempts to produce machines that displaythe same type of intelligence that humans do. open. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers. forecasting. A. C. D.378. D. Computer forensics D. simulation. robotics. Artificial intelligence (AI) Answer: D . is considered to be: A. experimental. B. Answer: A 380. Simulation D. Answer: A 379. This technology is known as: A. Technology no longer protected by copyright. C. Nanoscience B. computer forensics. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. proprietary. Microelectrodes C. in the public domain. B. A. Nanoscience B.

C. D. output D. Computers gather data. the actual print of the picture is considered: A. Software C. B. Information Answer: D 383. which means that they allow users to ____________data. output. B. A. A. data. processing. The name for the way that computers manipulate data into information iscalled: A. organizing. input. present B. Answer: B . C. Answer: B 384. programming. After a picture has been taken with a digital camera and processedappropriately. storing. Storage D. D. A process B. input C. ____________ is data that has been organized or presented in a meaningfulfashion. store Answer: B 385.382. the process.

D. B. The term bit is short for: A. eight bits. representational Answer: C 387. words. megabyte. A. C. B. binary number. eight bytes. B. Answer: D 388. D. Answer: C 390.386. Computers process data into information by working exclusively with: A. C. processing B. each number and eachspecial character is made up of a unique combination of: A. C. binary language. Answer: D 389. eight characters. D. multimedia. binary digit. In the binary language each letter of the alphabet. binary D. . numbers. kilobyte C. megabyte. B. A string of eight 0s and 1s is called a: A. Computers use the ____________ language to process data. byte. characters. eight kilobytes.

A ____________ is approximately a million bytes. A. gigabyte. A. kilobyte. terabyte Answer: C 393. A device C. A ____________ is approximately one billion bytes. kilobyte C. A peripheral D. D. Answer: B 391. B. kilobyte B. gigabyte D. Answer: C . storage component. Hardware B. D. An application Answer: A 394. bit C. ____________ is any part of the computer that you can physically touch. input devices. output devices. The components that process data are located in the: A. A. megabyte D. system unit.C. C. megabyte Answer: C 392. gigabyte B.

. All of the following are examples of input devices EXCEPT a: A. printer. scanner B. C. central processing unit (CPU) Answer: D 399. Answer: D 396. motherboard B. A. All of the following are examples of storage devices EXCEPT: A. CD drives. motherboard. printer Answer: A 397. keyboard. D.395. expansion board. B. Which of the following is an example of an input device? A. hard disk drives. memory C. mouse. B. C. isresponsible for processing data. B. floppy disk drives. RAM D. printers. speaker C. scanner. Answer: B 398. The ____________. The CPU and memory are located on the: A. CD D. D. also called the “brains†of the computer.

application software. utility D. B. platform software. Software C. C. operating system software. management B. D. D. B. platforms. An instruction B. storage device. programs. spreadsheet. system software. storage devices. processing C. A. ____________ is a set of computer programs used on a computer to helpperform tasks. A processor Answer: B 402. Answer: A401. applications. and photo-editing are examples of: A. A. . Answer: B 400. System software is the set of programs that enables your computershardware devices and ____________ software to work together. Memory D. D. The PC (personal computer) and the Apple Macintosh are examples of two different: A. Word processing. C. output device.C. application Answer: D 403.

C. Servers B. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems. mainframes Answer: D 407. Servers are computers that provide resources to other computers connected to a: A. Smaller and less expensive PC-based servers are replacing ____________ in many businesses. clients C. network. languages B. storage devices Answer: C 405. D. mainframe. Supercomputers . laptops D. ____________ are specially designed computers that perform complexcalculations extremely rapidly. A. supercomputers B. A. supercomputer. methods C. client. CPUs D.Answer: A 404. A. Answer: A 406. B.

Answer: A 410. Nanotechnology B. digital divide. Process A Output A Input A Storage . Computer forensics D. network B. A. The difference between people with access to computers and the Internet and those without this access is known as the: A. Internet divide. Which of the following is the correct order of the four major functions of a computer? A. Web divide. Laptops D. broadband Answer: D 409. C. Micro-technology C. slow D. A. wireless C. DSL is an example of a(n) ____________ connection. D. B. Mainframes Answer: B 408. ____________ is the science revolving around the use of nano structures to build devices on an extremely small scale.C. broadband divide. Artificial intelligence Answer: A 411.

B. 1. One thousand D. A. binary digit C. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer. ____________ bits equal one byte. InputA Output A Process A Storage C. character D.000 D. A. One million Answer: A 413. A. A. bit B. Eight B. 2 C. Process A Storage A Input A Output D. 1 Answer: B 414. The binary language consists of ____________ digit(s). Input A Process A Output A Storage Answer: D 412. 8 B. kilobyte Answer: C 415. The operating system . The platform B. A byte can hold one ____________ of data. Two C.

Mainframes Answer: B 418. word processing and spreadsheet.C. . The motherboard Answer: B 416. such as responses to questions or clicking an icon. Embedded computers C. C. application software. A. Robotic computers D. application C. A. The two broad categories of software are: A. The operating system is the most common type of ____________ software. system D. word-processing software Answer: C 417. instructions. are called: A. Servers B. D. Answer: A 419. the system unit. ____________ are specially designed computer chips that reside inside other devices. Application software D. The steps and tasks needed to process data. the operating system. such as your car or your electronic thermostat. B. communication B.

mainframe. The metal or plastic case that holds all the physical parts of the computer is the: A. CPU. C.B. Windows and Mac OS. The earliest calculating devices are? a) Clock b) Difference Engine c) Abacus d) Calculator Answer: c 422. transaction and application. platform. system unit. The basic operations performed by a computer are? a) Arithmetic Operations b) Logical Operations c) Storage and relative d) All of the above Answer: d 423. B. D. C. The man who built the first Mec-hanical Calculator was? a) Joseph Marie Jacquard b) John Mauchly . Answer: D 420. Answer: A 421. D. system and application.

MS Excel is a? a) Window based word processor package b) Window based spreadsheet package c) DOS based spreadsheet package d) Window based accounting package Answer: b . Punched cards were first introduced by? a) Powers b) Pascal c) Jacquard d) Herman Hollerith Answer: d 425.c) Blaise Pascal d) Harward Ailken Answer: c 424. LSTs(Large Integration) used in? a) First generation b) Second generation c) Third generation d) Fourth generation Answer: d 426. What is MS Word? a) A game b) An Operating System c) Word Processing Software d) Typing tutor software Answer: c 427.

d) Software Answer: c 432. stands for? a) World Word in Wonder b) World Wide Web c) World Web is Widening d) Wonderful World Web Answer: b 431.com. c) Both (a) and (b) above mentioned. Power Point can display date from which of the following add-in software of MS-Office? a) Equation Editor b) Organization Chart c) Photo Album d) All of these Answer: d 429. Abbreviation www in www.428. What is Active Desktop? a) A term that is synonymous with viewing your desktop as a web page b) A feature to customize your desktop to display informat-ion you can update from the Internet. Active Window means? .yahoo. The first network that planted the seeds of Internet was? a) ARPANET b) NSF net c) V net d) I net Answer: a 430.

A bitmap is? a) Is a format which windows use for desktop wallpaper? b) A graphic file format made up of small dots. b) The window that currently open c) Both (a) and (b) above mentioned d) The window that is last used Answer: c 433. c) A specific kind of bitmap file with the BMP extention. b) Is located at the right top end of the title bar of most Win-dows. document or program displayed in the window.a) The active window is designated by a different color toolbar than other open windows. make selections from lists and chose various combinations of options and . Close Button? a) When clicked will close the dialog box. Answer: d 434. c) Implies for the small button with an X on it d) All of the above Answer: d 436. Which of the following printers generates character from a grid? a) Inkjet b) Laser c) Daisy wheel d) Dot matrix Answer: d 435. A dialog box is a one? a) Which is a sort of on-screen from where you can fill in the blanks. d) All of the above.

but folder is the newer preferred term (C)contains data? a) A only b) B only c) C only d) None of the above Answer: d . A folder: (A) is an organizational tool used to store files. The meaning of double-click is? a) Pushing and releasing the main mouse button twice in rapid succession when the on-tree mouse pointer is positioned over the desired item b) Appearance of an icon c) To take a selection from the document and move it to the clipboard d) All of the above Answer: a 439. memo. A letter. c) In which you can give verbal commands to Microsoft Word menu d) All of the above Answer: a 437.(B) is synonymous with directory.settings. b) In which you can connect to another Internet user and establish an audio and video contact using Microsoft Word. proposal or other file that is created using Microso-ft Word is called as? a) Master b) Slide c) Document d) Worksheet Answer: c 438.

Commercially produced first computer? a) IBM b) MIPS c) UNIVAC d) EDSAC Answer: c441. Which is not the portable computer? a) Micro-processor b) Calculator c) Series Computes d) Parallel Computers . Banks and other big organizations requiring large data storage use? a) Laptop PC's b) Desktop PC's c) Mainframe Computer d) Workstation Answer: c 442. High Level Language useful for the beginners is? a) BASIC b) PASCAL c) FORTRON d) COBOL Answer: d 443.440. For Scientific work the most popular language is? a) PASCAL b) FORTRON c) COBOL d) PROLOG Answer: b 444.

OBJECT ORIENTED language is? a) ADA b) PROLOG c) PASCAL d) FORTRAN Answer: a 446. Total memory of system can be known using? a) DIR commands b) MEM commands c) Warm boot d) TOT MEM commands Answer: b 448. For running WINDOW minimum disk free space required is? a) 8 MB b) 10 MB c) 16 MB d) 32 MB Answer: a 449. The first graphical web browser are? a) Gopher .Answer: d 445. Information is? a) Summarization process of data b) Data Information c) Textual form of data d) Facts and figures Answer: a 447.

The programs used to view web pages are called? a) Clients b) Server c) Browser d) Programmer Answer: c 451. Which among the following is faster than Main Memory? a) RAM b) ROM c) Cache d) None of the above Answer: c 453. FTP means? a) File Transfer Protocol b) File Telnet Protocol c) Fast Track Processing d) Fine Tunning programs Answer: a 452. Semi Conductor Memory is known as? a) RAM b) ROM c) PROM d) EPROM .b) WAIS c) CERN d) Mosaic Answer: d 450.

High level language is? a) Machine Independent b) Machine dependent c) (a) And (b) are true d) (a) And (b) are false Answer: a 456. Hypertext is? a) Text stored in the memory of the computer b) Text displayed on the screen of the computer c) Special text used in developing Internet developing package d) A system of managing textual Information by creating associations between different documents Answer: d 457. Information on a computer is sto-red in the form of? a) Files b) Folders c) Directory d) Data dictionary Answer: a 458. TCP is? . In which generation computers IC have been used? a) First b) Second c) Third d) Fourth Answer: c 455.Answer: a 454.

by Informa-tion we mean? a) Any output coming out from computer b) A report printed by computer c) Processed data put in intelligent form d) Plural of data Answer: c .The term overflow means? a) An excess of Internal storage b) An excess of external storage c) A situation where record cannot fit in to its right place d) A device. which controls the level of humidity in the computer room. In computer science. Fax machines are used to send documents through a? a) Telephone line b) Modems c) Co-axial Wire d) All of these Answer: a461.a) Transfer control protocol b) Transfer control process c) Transmission control protocol d) Transmission control process Answer: c 459. Answer: a 462. Every computer on the Internet is known as? a) Host b) Client c) Modem d) Server Answer: a 460.

(A) binary (B) octal (C) decimal (D) hexadecimal (E) None of these Ans : (A) 467. Which of the following are parts of the CPU? a) Secondary Memory b) Control unit c) Input device d) Printer Answer: b 464.463. Micro computers are? a) 8 bit b) 16 bit c) 32 bit d) Either 8 or 16 bit Answer: d 466. Computer uses the_________number system to store data and performcalculations. The purpose of an application program is to? a) Meet specific user needs b) Make equivalent run better c) Allow the operating system to control resources better d) Convert program written in high-level language to machine level language Answer: a 465. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is_______________ .

(A) Memory-only (B) Write-only (C) Once-only (D) Run-only (E) Read-only Ans : (E) 468. Which of the following can be used to select the entire document ? (A) CTRL+A (B) ALT+F5 (C) SHIFT+A (D) CTRL+K (E) CTRL+H Ans : (A) 469.___________are 'attempts by individuals to obtain confidential information from you by falsifying their identity. (A) Phishing (B) Computer viruses (C) Spyware scams (D) Viruses (E) None of the above Ans : (A) 470. Part number, part description, and number of parts ordered are examples of__________ (A) control (B) output (C) processing (D) feedback (E) input

Ans : (E) 471. A Web site's main page is called its______________ (A) Home Page (B) Browser Page (C) Search Page (D) Bookmark (E) None of these Ans : (A) 472. The simultaneous processing of two or more programs by multiple Processors is_____________ (A) multiprogramming (B) multitasking (C) time-sharing (D) multiprocessing (E) None of these Ans : (D)

473. Codes consisting of lines of varying widths or lengths that are computer-readable are known as____________ (A) an ASCII code (B) a magnetic tape (C) an OCR scanner (D) a bar code (E) None of these Ans : (D) 474. To instruct Word to fit the width of a column to the contents of a table

automatically, click the button and then point to AutoFit Contents. (A) Fit to Form (B) Format (C) Autosize (D) Contents (E) AutoFit Ans : (E) 475. Why is it unethical to share copyrighted files with your friends ? (A) It is not unethical, because it is legal. (B) It is unethical because the files are being given for free. (C) Sharing copyrighted files without permission breaks copyright laws. (D) It is not unethical because the files are being given for free. (E) It is not unethical-anyone can access a computer Ans : (C) 476. Reusable optical storage will typica1ly have the acronym__________ (A) CO (B) DVD (C) ROM (D) RW (E) ROS Ans : (D) 477. The most common type of storage devices are__________ (A) persistent (B) optical (C) magnetic (D) flash (E) steel

A device that connects to a network without the use of cables is said to be_________ (A) distributed (B) free (C) centralized (D) open source (E) None of these Ans : (B) 479. then click___________ . To access properties of an object. click the change case button. To change selected text to all capital letters.Ans : (D) 478. the mouse technique to useis__________________ (A) dragging (B) dropping (C) right-clicking (D) shift-clicking (E) None of these Ans : (C) 481. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a______________ (A) hacker (B) analyst (C) instant messenger (D) programmer (E) spammer Ans : (A) 480.

The basic unit of a worksheet into which you enter data in Excel is called a______________ (A) tab (B) cell (C) box (D) range (E) None of these Ans : (B) 483.(A) UPPERCASE (B) UPPER ALL (C) CAPS LOCK (D) Lock Upper (E) Large Size Ans : (A) 482. You can keep your personal files / folders in____________________ (A) My folder (B) My Documents (C) My Files (D) My Text (E) None of these Ans : (B) 484. In Word you can force a page break____________ (A) By positioning your cursor at the appropriate place and pressing the F1 key (B) By positioning your cursor at the appropriate place and pressing Ctrl+Enter (C) By using the Insert/Section Break .

(A) Work (B) Auto (C) Normal (D) Roman (E) None of these Ans : (C) 486.(D) By changing the font size of your document (E) None of these Ans : (B) 485. The process of transferring files from a computer on the Internet to your computer is called___________ (A) downloading (B) uploading (C) FTP (D) JPEC (E) downsizing Ans : (A) 487. The default view in Excel is___________view.____________.is the process of dividing the disk into tracks and sectors. Help Menu is available at which button ? . (A) Tracking (B) Formatting (C) Crashing (D) Allotting (E) None of these Ans : (B) 488.

(A) End (B) Staft (C) Turnoff (D) Restart (E) Reboot Ans : (B) 489. workstations. and other computers is a(n)_________ (A) supercomputer (B) minicomputer (C) laptop (D) server (E) None of these . (A) storage (B) input (C) output (D) memory (E) None of these Ans : (D) 490. A central computer that holds collections of data and programs for many PCs. When you save to this. your data will remain intact even when the computer is turned off________ (A) RAM (B) Motherboard (C) Secondary storage device (D) Primary storage device (E) None of these Ans : (C) 491. The contents of____________are lost when the computer turns off.

The_________folder retains copies of messages that you have started but are not yet ready to send. (A) Drafts (B) Outbox (C) Address Book (D) Sent Items (E) Inbox Ans : (B) 493. (A) tab box (B) pop-up helper (C) tab row (D) address bar (E) Esc key Ans : (C) 495. Which ports connect special types of music instruments to sound cards ? . Grouping and processing all of a firm's transactions at one time is called_________ (A) a database management system (B) batch processing (C) a real-time system (D) an on-line system (E) None of these Ans : (B) 494.Ans : (D) 492. The___________enables you to simultaneously keep multiple Web pages open in one browser window.

(A) BUS (B) CPU (C) USB (D) MIDI (E) MINI Ans : (C) 496. What is the permanent memory built into your computer called ? (A) RAM (B) Floppy (C) CPU (D) CO-ROM (E) ROM Ans : (E) 498. What displays the contents of the active cell in Excel ? (A) Name box (B) Row Headings (C) Formula bar (D) Task pane (E) None of these . (A) refine (B) expand (C) load (D) query (E) slowdown Ans : (A) 497. You can__________a search by providing more information the search engine can use to select a smaller. more useful set of results.

If you want to connect to your own computer through the Internet from another location. . Video processors consist of________and________. The piece of hardware that converts your computer's digital signal to an analog signal that can travel over telephone lines is called a_______ (A) red wire (B) blue cord (C) tower (D) modem (E) None of these Ans : (D) 500. press the___________.button. which store and process images. (A) CPU and VGA (B) CPU and memory (C) VGA and memory (D) VGI and DVI (E) None of these Ans : (C) 501. you can use_________ (A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these Ans : (D) 502.Ans : (A) 499. To reload a Web page.

A(n)_____________is a special visual and audio effect applied in Powerpoint to text or content.(A) Redo (B) Reload (C) Restore (D) Ctrl (E) Refresh Ans : (E) 503. (A) animation (B) flash (C) wipe (D) dissolve (E) None of these Ans : (A) 505. When the pointer is positioned on a__________it is shaped like a hand. (A) grammar error (B) Formatting error (C) Screen Tip (D) Spelling error . This first step in the transaction processing cycle captures business data through various modes such as optical scanning or at an electronic commerce website__________ (A) Document and report generation (B) Database maintenance (C) Transaction processing startup (D) Data Entry (E) None of these Ans : (D) 504.

A______________is the term used when a search engine returns a Web page that matches the search criteria. (A) blog (B) hit (C) link (D) view (E) success Ans : (E) 507.(E) hyperlink Ans : (E) 506. (A) Control words (B) Control structures (C) Reserved words (D) Reserved keys (E) None of these Ans : (C) 508. Mobile Commerce is best described as___________ (A) The use of Kiosks in marketing (B) Transporting products (C) Buying and selling goods/services through wireless handheld devices (D) Using notebook PC's in marketing (E) None of the above Ans : (C) . ___________are words that a programming language has set aside for its own use.

509. the following is a storage device that uses rigid. Which of. What is the process of copying software programs from secondary storage media to the hard disk called? (A) Configuration (B) Download (C) Storage (D) Upload (E) Installation Ans : (D) 512. permanently installed magnetic disks to store data/information__________ (A) floppy diskette (B) hard disk (C) permanent disk (D) optical disk (E) None of these Ans : (B) 510. (A) Copying (B) Merging (C) Pasting . The computer abbreviation KB usually means___________ (A) Key Block (B) Kernel Boot (C) Key Byte (D) Kit Bit (E) Kilo Byte Ans : (E) 511. In Excel____________allows users to bring together copies of workbooks that other users have worked on independently.

(D) Compiling (E) None of these Ans : (B) 513. amount of data and information (B) CD-ROM disks retrieve data and information more quickly than magnetic disks do (C) CD-ROMs make less errors than magnetic media (D) An of the above (E) None of these Ans : (D) 514. Which of the following are advantages of CD-ROM as a storage media? (A) CD-ROM is an inexpensive way to store large. A DVD is an example of a(n) ______________ (A) hard disk (B) optical disc (C) output device (D) solid-state storage device (E) None of these Ans : (B) .

Sign up to vote on this title
UsefulNot useful

Master Your Semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master Your Semester with a Special Offer from Scribd & The New York Times

Cancel anytime.