Professional Documents
Culture Documents
94. The memory of a computer is commonly 3. Which among the following is not a
expressed in terms of Kilobytes or mobile Operating System?
Megabytes. A byte is made up of (a) Bada (b) Safari (c) Symbian
(a) eight decimal digits (b) eight binary digits (d) MeeGo (e) WebOS
(c) two binary digits (d) two decimal
4. Which among the following key can be
95.The daily processing of corrections to used as a shortcut to rename a folder in
customer accounts best exemplifies the Microsoft Windows 8 and higher versions?
processing mode of (a) F2 (b) F4 (c) F6
(a) batch processing (b) real-time processing (d) F9 (e) F11
(c) time-sharing (d) off-line processing
96. Which of the following floppy sizes 5.There is a network that can connect
exists? networks ranging from small location or
(a) 5.25 inches (b) 4.75 inches (c) 6 inches (d) area to a bigger range including public
9 inches packet network and large corporate
networks. That network's enterprise allows
97. MS-DOS is the name of a/an users to share access to applications, services
(a) Application software (b) Hardware and other centrally located resources. Its
(c) System software (d) None of these ability for a huge geographical access has
transformed networking. Which among the
98. A term used interchangeably with following is that network?
diskette is (a) SAN (b) CAN (c) LAN (d) WAN (e)
(a) Disk cartridge (b) Disk pack MAN
(c) Floppy disk (d) Packette disk
6.If you are allowing a person on the
99. Magnetic disk a medium known as network based on the credentials to
(a) Serial access (b) Direct access (c) maintain the security of your network, then
Sequential access (d) Sequential and rotational this act refers to the process of ______.
access (a) Authentication (b) Automation
(c) Firewall (d) Encryption
100. A term associated with the comparison
of processing speed is 7.Which among the following is the smallest
(a) FFTS (b) MPG (c) MIPS (d) CPS unit in an image in a computer screen?
(a) Unit (b) Pixel
1. The taskbar is located— (c) Array (d) Resolution
(A) on the Start menu
(B) at the bottom of the screen 8._______ ensure secure transfer of data
(C) on the Quick Launch toolbar over an unsecured network, such as the
(D) at the top of the screen Internet.
(a) Antivirus (b) Hacking 17.Communication between a computer and
(C) Spoofing (d) Cryptography a keyboard involve____ transmission
(a) Automatic(b) Half-duplex
9. Which of the following protocols is (c) Full-duplex(d) Simplex
considered connectionless?
(a) TCP (b) UDP 18. The structure or format of data is called
(c) FTP (d) ICMP (a) Syntax(b) Semantics
(c) None of the mentioned
10 Which among the following cycle consists (d)grammar
of an Input, processing, output and storage
as its constituents? 19.Powerful keys that let you exit a program
(a) Processing (b) Output when pushed
(c) Input (d) Storage (a)arrow keys(b) space bar
(c) escape key (d) ctrl
11. Which of the following character set
supports Japanese and Chinese font? 20. The part of a computer that coordinates
(a) EBCDIC (b) ASCII all its functions is called its…
(c) BCD (d)Unicode (a) ROM program(b) System board
(c) Arithmetic logic unit(d) Control unit
12. Hard drive is used to store :
(a) volatile data (b) non volatile data 22. In Computer programming there is set
(c) permanent data (d) temporary data of subroutine definitions, protocols, and
tools for building software and applications.
13. Which of the following are properties of Which among the following is a term for sets
USB? of requirements that govern how one
(a) Platform independent application can talk to another?
(b) Platform dependent (a) UPS (b) API
(c) Source dependent (c) CGI (d) J2EE
(d) Software dependent
(e) Software independent 23. Which among the following is an
important circuitry in a computer system
14. What governs the communications that directs the operation of the processor?
between computers on a network? (a) Memory (b) Address Bus
(a) Memory bus(b) Communication Protocol (c) Accumulator (d) Control Unit
(c) Control Bus(d) Cache
24.Which among the given options is IBM’s
15. In PROM, P stands for? Supercomputer?
(a) Plausible(b) Program (a) Tihane-2 (b) SunwayTaihu Light
(c) Programmable(d) Proper (c) Watson (d) Shasra-T
16. What is the term used for measurement 25. Which among the given options does not
of how fast data moves from one place to have flash memory?
another? (a) Pen Drive (b) Hard Disk
(a) data per unit(b) bits per second (c) Car Radio (d) Memory
(c) bits per hour(e) ratio per bit Cards
26. Android is a mobile operating system Which of the following is a system type used
designed primarily for touchscreen mobile to process such statements?
devices such as smartphones and tablets. (a) Multitasking (b) Memory Processing
(c) Level Processing (d) Batch Processing
Which among the following was the first
Android Operating System? 32. Which among the following is an
important circuitry in a computer system
(a) Cupcake (b) Alpha
that does the arithmetic and logical
(c) Gingerbread (d) Doughnut processing?
(e) Éclair (a) Memory (b) ALU
(c) Flag Register (d) CU
27. A router is a networking device that
forwards data packets and is connected to 33.What is the maximum number, that each
two or more data lines from different of the four parts of an IP Address can have?
networks. Which among the following was (a) 256 (b) 512 (c) 1024
the earliest device which had almost the (d) 255 (e) 300
same functionality as that of a router?
(a) Interface Delay Device 34.Which of the following statements is true
(b) Interface Traffic Manager
for a piconet?
(c) Interface Routing Processor
(d) Interface Message Processor (a) It works on TCP/IP
(b) It is small network that connects computers
28. In Computer programming API is set of and network device through cables
subroutine definitions, protocols, and tools (c) It is an adhoc network
for building software and applications. (d) It works on Bluetooth technology
Which among the following is an application (e) Option (c) and (d)
programming interface for the
programming language Java, which defines 35. ____technologies is used by banks for
how a client may access a database? faster processing of large volumes of cheque.
(a) J2EE (b) JDK (c) JAVA SE (d) JDBC A. OCR B. OMR
C. MICR D. Bar code
29.Which among the following is a term
representing unit of data storage in 36. What is a bootstrap?
computer memory? a) A memory device b) A device to support
(a) Pixel (b) Decimal (c) Octet (d) Point the computer c) An error correction technique
d) A small initialization program to start up
30.Which among the following is not a a computer
secondary memory?
(a) Cache (b) Pen Drive 37. ____ is the ability of a central processing
(c) Hard Disk (d) Memory Card unit (CPU) to process multiple threads
(e) Memory Stick concurrently, appropriately supported by
the operating system.
31. After a credit card transaction has been a) Multitasking b) Multiprocessing
authorized by the issuing bank by sending c) Multithreading d) Multi-running
an authorization code to the merchant, the
settlement stage of the process begins.
38. Which of the following is not an example
of a Web Browser? 45. ____________ include(s) many different
a) Outlook b) Internet Explorer c) Safari d) categories, such as action, puzzles, role-
Chrome
playing, sports, simulation, strategy, and
39. The productivity software category virtual reality.
includes all of the following EXCEPT: A. Computer games
A. word processing. B. Video-editing software
B. peripheral device management. C. Image-editing software
C. personal information management. D. Multimedia software
D. spreadsheet.
46. Copyrighted software that can be used
40. Android Operating system is an example for free is:
of which kind of Source Model? A. shareware.
1) Open Source 2) Vertical Market Software B. freeware.
3) Horizontal Market Software 4) Shareware C. groupware.
D. e-mail.
41. Cache memory is an example of which of
the following? 47. Programs from the same developer, sold
1) Virtual Memory 2) Non Volatile Memory bundled together, that provide better
3) Static Random Access Memory integration and share common features,
4) Secondary Memory toolbars, and menus are known as:
A. software suites.
42. A software that is not protected by B. integrated software packages.
copyright or trademark is ...... C. software processing packages.
1) Vertical Market Software D. personal information managers.
2) Public Domain Software
3) Shareware Software 48 Which of the following is an Object
4) Trialware Oriented Programming Language?
1) C 2) Java 3) C++ 4) Both 2 and 3
43. Which of the following programming
languages is associated with Artificial 49. The popular name for “Information
Intelligence? Super Highway” is:
1) C 2) B 3) C++ 4) PROLOG 1) Intranet 2) Extranet 3) Virtual Private
Network 4) MAN 5) Internet
44. All of the following are examples of word
processing software EXCEPT: 50. Encryption is primarily used in:
A. Microsoft Excel. 1) Computer Processing 2) File retention 3)
B. Microsoft Word. Data communication 4) Data Storage
C. Corel WordPerfect.
D. Wordpad.
51. To protect the computer from hacker 1) Enterprise Retirement Planning 2)
intrusions, ..... must be installed. Enterprise Relationship Planning 3) Enterprise
1) Firewall 2) Mailer 3) Script 4) Yahoo Resource Planning 4) Enterprise Reorder
Messenger Planning
52. Which of the following is used to read 60 Collecting personal information and
handwritten or printed text to make a effectively posing as another individual is
digital image that is stored in memory? known as:
1) Printer 2) Laser beam 3) Scanner 4) 1) Spooling 2) Spoofing 3) Hacking 4)
Touchpad Identity Theft
53. Thesaurus option is available in ..... 61.Which among the following is not an
menu. Object Oriented Programming Language?
(a) Python
1) Page layout 2) References 3) Review 4)
(b) PASCAL
View 5) Layout (c) Java
(d) C++
54. Blu-Ray disk is an example of a(n) .... (e) Ruby
1) Hard disk 2) Magnetic Disk 3) Optical Disk
4) Output Device 62.7.The use of combination of 1’s and 0’s is
feature of which of the following type of
Computer Language?
55. Auto correct function option is present in
(a) High Level Language
..... menu of MS Word. (b) PASCAL
1) View 2) Insert 3) Format 4) Tools 5) Table (c) Machine Language
(d) C
56. Which of the following is another name
for pre-programmed formula in Excel? 63.._______ ensure secure transfer of data
1) Range 2) Graph 3) Function 4) Cell over an unsecured network, such as the
Internet.
(a) Antivirus
57. ALU works on the instructions held in (b) Hacking
....... (C) Spoofing
1) Notebook 2) Registers 3) Notepad 4) (d) Cryptography
Clipboard
64.Selling and buying products and services
in electronic mode is called ________.
58. An email address consists of:
(a) e-commerce
1) Domain name 2) Username followed by (b) e-banking
password 3) Domain name followed by user (c) e-learning
name 4) Username followed by domain name (d) online shopping