You are on page 1of 3

Question Quiz -01

1. After a picture has been taken with a digital camera and language has set aside for its own use.
processed appropriately, (A) Control words (B) Control structures
the actual print of the picture is considered (C) Reserved words (D) Reserved keys
(A) data (B) output
(C) input (D) the process 12. Mobile Commerce is best described as
(A) The use of Kiosks in marketing
2. Computers use the language to process data. (B) Transporting products
(A) processing (B) kilobyte (C) Buying and selling goods/services through wireless
(C) binary (D) representational handheld devices.
(D) Using notebook PCs in marketing
3. The term bit is short for
(A) megabyte (B) binary language 13. Which of, the following is a storage device that uses rigid,
(C) binary digit (D) binary number permanently installed magnetic disks to store
data/information
4. A string of eight 0s and 1s is called a (A) floppy diskette (B) hard disk
(A) megabyte (B) byte (C) permanent disk (D) optical disk
(C) kilobyte (D) gigabyte
14. The computer abbreviation KB usually means
5. ..is any part of the computer that you can (A) Key Block (B) Kernel Boot
physically touch. (C) Kilo Byte (D) Kit Bit
(A) Hardware (B) A device
(C) A peripheral (D) An application. 15. What is the process of copying software programs from
secondary storage media
6. Trojan Horse to the hard disk called?
(A) a code segment that misuses its file is called Trojan horse (A) Configuration (B) Download
(B) good for filing accessing (C) Storage (D) Upload
(C) both A and B (D) none of these
16. To move to the beginning of a line of text, press the
7. A communication processor that connects dissimilar .. key.
networks by providing the (A) home (B) a
translation from one set of protocol to another is (C) page up (D) enter
(A) Bridge (B) Gateway
(C) Router (D) Modem 17. When sending an e-mail, the .. line
describes the contents of the message.
8. Which of the following is a general-purpose programming (A) to (B) subject
language, designed by (C) contents (D) CC
Sun Microsystems, and well suited for use on the Web?
(A) VB Script (B) Java Script 18. Which groupings do you work with when formatting text
(C) CSS (D) Java in Word
(A) Tables, paragraphs and indexes (B) Paragraphs, indexes
9. This ..tier processes HTTP protocol, and sections
scripting tasks, performs calculations, and provides access to (C) Characters, sections and paragraphs (D) Indexes,
data. characters and tables
(A) Client (B) Applications/Web server
(C) Enterprise server (D) DBA 19. Which of the following is the largest unit of storage?
(A) GB (B) KB
10. RSA is (C) MB (D) TB
(A) Symmetric Cryptosystem (B) Asymmetric Cryptosystem
(C) Block Cypher (D) Digital Signature 20. The .. tells the computer how to use its
11. .. are words that a programming components.
Question Quiz -01
(A) utility (B) network
(C) operating system (D) application program 31. What displays the contents of the active cell in Excel ?
(A) Name box (B) Row Headings
21. Blinking symbol on the computer screen is called (C) Formula bar (D) Task pane
(A) mouse (B) logo
(C) cursor (D) hand 32. The piece of hardware that converts your computers
digital signal to an analog signal that can travel over
22. Examples of output device telephone lines is called a
(A) screen (B) printer (A) red wire (B) blue cord
(C) speaker (D) all of these (C) tower (D) modem

23. IBM stands for 33. Video processors consist of ..and


(A) Internal Business Management (B) International Business ..which store and process images.
Management (A) CPU and VGA (B) CPU and memory
(C) International Business Machine (D) Internal Business (C) VGA and memory (D) VGI and DVI
Machine
34. If you want to connect to your own computer through the
24. BIOS stands for Internet from another location, you can use
(A) basic input output system (B) binary input output system (A) e-mail (B) FTP
(C) basic input off system (D) all the above (C) instant message (D) Telnet

25. DOS stands for


35. To reload a Web page, press the ..
(A) Disk Operating System (B) Disk operating session
button.
(C) Digital Operating System (D) Digital Open system
(A) Redo (B) Reload
(C) Restore (D) Refresh
26. DOS floppy disk does not have
(A) A Boot Record (B) A File Allocation Table
(C) A Root Directory (D) Virtual Memory 36. You can use the tab key to
(A) move cursor across the screen (B) indent a paragraph
27. MICR technology used for clearance of cheques by (C) move the cursor down the screen (D) Only (A) and (B)
banks refers to
(A) Magnetic Ink Character Recognition 37. A collection of related files is called a
(B) Magnetic Intelligence Character Recognition (A) character (B) field
(C) Magnetic Information Cable Recognition (C) database (D) adjusting
(D) Magnetic Insurance Cases Recognition
38. Storage that retains its data after the power is turned off is
28. All the information collected during database referred to as
development is stored in a (A) volatile storage (B) non-volatile storage
(A) repository (B) data warehouse (C) sequential storage (D) direct storage
(C) RAD (D) CASE
39. Which of the following is an example of connectivity?
29. The ..Component is used by the data (A) Internet (B) floppy disk
analyst to create the queries that access the database. (C) power card (D) data
(A) data extraction (B) end-user query tool
(C) end-.user presentation tool (D) data store 40. .. is the process of finding errors in
software code.
30. A(n) ..allows network users to share a (A) Compiling (B) Testing
single copy of software, which resides on the network server. (C) Running (D) Debugging
(A) single-user license agreement (B) network site license 41. Which of the following is a part of CPU
(C) end-user license agreement (D) business software license (A) ALU (B) keyboard
Question Quiz -01
(C) mouse (D) printer (C) tab row (D) address bar

42. FTP stands for 53. Which ports connect special types of music instruments to
(A) file transfer protocol (B) file translate protocol sound cards ?
(C) file typing protocol (D) file transit protocol (A) BUS (B) CPU
(C) USB (D) MIDI
43. Data going into the computer called
(A) output (B) algorithm 54. You can ..a search by providing more
(C) input (D) calculation information the search engine can use to select a smaller,
more useful set of results.
44. Microsoft is a (A) refine (B) expand
(A) shareware (B) an application suit
(C) load (D) query
(C) public domain software (D) market application
55. What is the permanent memory built into your computer
45. Information travels between components on the mother
called ?
board through
(A) RAM (B) Floppy
(A) flash memory (B) CMOS
(C) CPU (D) ROM
(C) cables (D) buses
56. What menu is selected to cut, copy and paste?
46. This is a standard way for a Web server to pass a Web
(A) File (B) Tools
users request to an application program and to receive data
(C) Special (D) Edit
back to forward to the user
(A) Interrupt request (B) Forward DNS lookup 57. The most important or powerful computer in a typical
(C) Data-Link layer (D) Common gateway interface network is
(A) desktop (B) network client
47. Three SQL, DDL, CREATE commands are (C) network server (D) network station
(A) Schema, Base and Table (B) Base, Table and Schema
(C) Key, Base and Table (D) Schema, Table and View 58. The primary purpose of software is to turn data into
(A) Web sites (B) information
48. A passive threat to computer security is (C) programs (D) objects
(A) Malicious Intent (B) Sabotage
(C) Accident Errors (D) Espionage Agents 59. The ability to find an individual item in a file immediately
.. is used.
49. Two program of worm are (A) file allocation table (B) directory
(A) grappling hook program (B) main program (C) sequential access (D) direct access
(C) both A and B (D) external memory
60. To make a notebook act as a desktop model, the notebook
50. ..allows wireless mobile devices to can be connected to a .. which is connected
access the Internet and its services such as the Web and e- to a monitor-and other devices.
mail. (A) bay (B) docking station
(A) TCP/IP (B) Ethernet (C) port (D) network
(C) WAP (D) Token ring
51. Grouping and processing all of a firms transactions at
one time is called
(A) a database management system (B) batch processing
(C) a real-time system (D) an on-line system

52. The ..enables you to simultaneously


keep multiple Web pages open in one browser window.
(A) tab box (B) pop-up helper

You might also like