You are on page 1of 13

(3) instant message (4) Telnet

1. Computer uses the_____number system to


store data and perform calculations. 10. The taskbar is located—
1) Binary2) octal 3) Decimal (A) on the Start menu
4) Hexadecimal (B) at the bottom of the screen
(C) on the Quick Launch toolbar
2. ….... is the process of carrying out (D) at the top of the screen
commands.
1) Fetching 2) Storing3) Decoding 4)
11. The term ‘Computer’ is derived
Executing
from..........
a. Latin b. German c. French d. Arabic
3. ______software allows the user to speak
into the computer rather than type in text.
12. BCD is
(1) Speech recognition (2) CHAT
(3) Message (4) All of the above a. Binary Coded Decimalb. Bit Coded
Decimal
4.Linux is a_____ c. Binary Coded Digit d. Bit Coded
(1) Utility program for peer-to-peer file sharing Digit
(2) Real-time operating system
(3) Network operating system 13. A ……… is a collection of information
(4) PDA platform saved as a unit.
(A) folder (B) file (C) path (D) file extension
5.At a time how many operating system can
be at work on a computer ? 14. This can be another word for program—
(1) Only one (2) Two(3) Three (4) Four (A) peripheral (B) disk (C) floppy (D)
software
6. Image can be sent over telephone lines by
using ------ 15. Most Web sites have a main page, the
(1) Larger bandwidth (2) Fax ………, which acts as a doorway to the rest
(3) Scanner (4) Cable of the Web site pages.
(A) search engine (B) home page (C)
7. A computer that combines the browser(D) URL
characteristic of analog and digital
computers_________ 16. What type of computer could be found in
(1) Hybrid Computer (2) Digital Computer a digital watch ?
(3) Analog Computer (4) Super Computer (A) Mainframe computer (B)Supercomputer
(C) Embedded computer (D) Notebook
8. Which type of transmission media is computer
known as regular telephone wire?
(1) Wi-Fi (2) Twisted-pair wire 17.Every computer connected to an intranet
(3) Fiber optic cable (4) Coaxial cable or extranet must have a distinct_____
(a) firewall (b) proxy server (c) IP address
9. If you want to connect to your own (d) domain name
computer through the Internet from another
location, you can use– 18. CAD stands for
(1) e-mail (2) FTP
a. Computer aided design b. Computer (c) Multiprocessing (d) Virtual storage
algorithm for design
c. Computer application in design d. All of the 26.SMTP, FTP and DNS are applications of the
above ____ layer.
1) data link2) network
19. MSIC stands for 3) transport4) application
a. Medium Scale Integrated Circuits
b. Medium System Integrated Circuits
27.A mouse, trackball, and joystick are
c. Medium Scale Intelligent Circuit
examples of
d. Medium System Intelligent Circuit
1. Pointing devices 2. Pen input devices 3.
Data collection devices4. Multimedia
20. What do you call the programs that are
devices
used to find out possible faults and
theircauses?
28. Which button makes alphabets/letters in
a. operating system extensions b. Cookies
uppercase and lowercase and numbers to
c. diagnostic software d. boot diskettes
symbols?
(a) Caps Lock (b) Num Lock (c) Shift (d)
21. SMPS stands for Tab
a. Switched mode Power Supply
b. Start mode power supply 29. To protect your system from computer
c. Store mode power supply hackers you must turn on a(n) _______.
d. Single mode power supply (a) USP (b) VLC (c) Another system (d)
Firewall
22. Creating a job queue is a function of 30.What is a joy stick primarily in
1. Spooler2. Interperator3. Complier4. Drive computers used for?
(a) Editing Text (b) Processing Input
23.Which of the following device can (c) Printing (d) Computer gaming
understand difference between data &
programs? 31. What is the function of control unit?
a) Providing resources to another node on a
a) Input device b) Output device c)
network
Memory d) Microprocessor
b) Performing complex task of logical and
arithmetic functions
24.What does MBps stands for?
c) Managing memory usage
a) Mega Bits per second b) Major Bits d) Directing the operation of the other units
per second by providing timing and control signals.
c) Mega Bytes per second d) Major Bytes
per second 32.________ is usually recorded and played,
displayed, or accessed by information
25.The technique that extends storage
capacities of main memory beyond the content processing devices, such as
actual size of the main memory is called computerized and electronic devices, but can
_______. also be part of a live performance.
(a) Multitasking (b) Multi-programming
(a) Virus (b) BIOS software (c) Multimedia of the primary storage.
(d) C++
4. All of the above
33. When your computer stops working
suddenly, it is referred to as a __________. 40. Acknowledgement from a computer that
(a) crash (b) die (c) death (d) penalty a packet of data has been received and
verified is known as–
34.A computer system includes 1. ACK 2. BCK 3. ECK 4. All of the
(a) Hardware (b) Software above
(c) Peripheral devices (d) All of these
41. If a computer has more than one
35.If you wish to extend the length of the processor then it is known as
network without having the signal degrade, 1.Uniprocess2.Multiprocessor
you would use a _____. 3.Multithreaded 4. Multiprogramming
(a) Repeater (b) Router (c) Gateway (d)
Switch 42. A program written in machine language
is called ........ program.
36. Access control based on a person’s A. object B. computer
fingerprints is an example of _________. C. assembler D. high level
(a) biometric identification
(b) characteristic identification 43. Language translator is program which
(c) fingerprint security translate ……………..
(d) logistics a. One language to all
b. Source program to object program
37.P2P stands for ______. c. One program to low level
(a) Peer to peer (b) Peek to peek d. All
(c) Past to past (d) Pair to pair
44. EBCDIC stands for
38. ______ is a collection of circuitry a. Extended Binary Coded Decimal
functions that together makes an important Interchange
part of a computer system. Code
(a) The platform (b) Application b. Extended Bit Code Decimal Interchange
software Code
(c) Operating system (d) The c. Extended Bit Case Decimal Interchange
motherboard Code
d. Extended Binary Case Decimal Interchange
Code
39.The following is true for Auxiliary
Storage– 45. To execute a given DOS program, you
1. It has an operating speed far slower than must type a(n) __________.
(1) command(2) order
that of the primary storage.
(3) syntax (4) all of the above
2. It has an operating speed faster than that of
the primary storage. 46 __________ has a large storage capacity,
3. It has an operating speed equivalent than that up to 17 GB if both layers and both sides are
used.
(1) DVD(2) CD-ROM
(3) Floppy (4) RAM
55 Accumulator is a _______
47. VPN stands for------- (1) Hardwired unit
(1) Virtual Personal Network (2) Sequential circuit
(2) Very Private Network (3) Finite state machine
(3) Virtual Private Network (4) Register
(4) Vicious Personal Network
56. A saved document is referred to as ____
48. A DVD is an example of a(n) – (a) file(b) folder(c) project(d) data
(1) hard disk (2) optical disc
(3) output device (4) solid-state storage device

49. CD-ROM stands for…… 57.Which of the following is not example of


(1) central processing unit Utility Software?
(2) Compact disc remote open mouse (a) Backup software (b) Antivirus software
(3) Compact disc resize or minimize (c) Disk tools (d) Media Players
(4) Compact disc read only memory
58.Formatting a disk results in all the data
50. What kind of server converts IP
being..?
addresses to domain names?
(1) File (2) DNS (3) Email (4) P2P a) Saved to the diskb) Copied from the disk
c) Deleted from the diskd) All of the above
51 __________ Means that a transaction is
processed fast enough for the result to come 59.The contents of these chips are lost when
back and be acted upon right away. the computer is switched off?
(1) Real-time processing a) RAM b) DRAM c) Both the above d)
(2) Records processing ROM
(3) Batch processing
(4) All of the above 60.What type of technology scrambles the
contents of files sent via the Internet?
52 MIME is an acronym for .... a) Encryption b) Secured data interchange
1) Multiprogramming Internet Mail Extension c) Cryptogram d) Regulated code
2) Multicasting Internet Mail Extension
3) Multiple Internet Mail Extension 61.Which of the following is not a valid
4) Multipurpose Internet Mail Extension memory unit?
5) None of these a) ILB b) KB c) YB d) PB

53. TCP stands for _______ 62.RAM is a part of _________.


(1) Transfer control protocol a) Internet b) Keyboard c) System unit d)
(2) Transfer control process Monitor
(3) Transmission control protocol
(4) Transmission control process 63.What is the number of function keys on a
keyboard?
54 Most cash registers are now computers a) 15 b) 12 c) 11 d) 16 e) 10
that are known as ____________ terminals.
(1) POS(2) DS (3) UDC (4) UPC
64. What is MP3? 1) Del. 2) Shift + Del. 3) Ctrl + Del. 4) Alt +
a) A mouse b) A Printer c) A Scanner d) A Enter
Sound format
72. In a spreadsheet, the columns and a rows
65. What is Remote Desktop Connection?
form individual boxes called:
a) It was known as Terminal Services in
Windows Server 2008 and earlier, it is one of A. intersects.
the components of Microsoft Windows. B. addresses.
b) a technology that allows you to carry your C. cells
computer in remote areas.
c) a technology that allows you to sit at the 73. What is a half byte also called as?
client computer and connect to the host remote a) Nibble b) Bit c) Bits d) Data
computer in a different location
d) both (a) and (c) 74. Which among the following is the largest
space?
66.What is properly arranged data called? a) kilobyte b) petabyte
a) Field b) Words c) Information d) c) terabyte d) Brontobyte
Metadata
75.The overall design, construction,
67.What is the difference between memory organization and interconnecting of the
and storage? various components of a computer system is
a) Memory is Temporary and storage is referred as ______
permanent a) Computer Algorithm b) Computer
b) Memory is Permanent and storage is Flowchart
temporary c) Computer Architecture d) All of the
c) Memory is Slow and storage is fast above
d) Both (b) and (c)
76. Who invented Computer Mouse?
a) Ada Lovelace b) John Mauchly
68.What is Windows Explorer? c) Charles Babbage d) Douglas Engelbart
a) A drive b) A file manager c) A browser
d) A search engine 77. What does the XP stand for in Windows
XP?
69. Any crime that involves a Computer and a) Exponential b) Experience
a Network is called: c) Expertise d) Exchange
1) Virus 2) Malware 3) Trojan Horse 4) Cyber
crime 5) Identity Theft 78.Semi-Conductor Memory is known as?
(a) RAM (b) Hard disk (c) Optical disk
70. Which of the following generation (d) All of the above
computers is referred to an expert system?
79.Who wrote the first computer program?
1) 2nd 2) 1st 3) 4th 4) 3rd 5) 5th
a) Ada Lovelace b) John Mauchly
c) Venumann d) George Lord Byron
71. Which of the following is the keyboard
short-cut for permanent deletion of a
file/folder in windows?
80. Which is NOT a function of a 3. Bus topology 4. Mesh topology
microprocessor?
1. Keeps the system unit cool 87.What does FPI stands for?
2. Controls the rest of the computer's 1. Faults per inch 2. Film per inch
components 3. Figure per inch 4. Frames per inch
3. Processes data
4. Interprets instructions given by software 88.Which of the following is/are type of
Operating System?
81. The memory that stores the computer’s 1.Batch Processing 2.Multipocessing
date, time and calendar is the: 3.Multitasking 4.Real Time 5.All of the
1) RAM 2) Flash Memory above
3) CMOS 4) Register
89. Inheritance is the ability of an object to
82. POS terminal is used as __________. pass on its characteristics to its _______.
1. A type of electronic-transaction terminal (a) subclasses (b) super classes(c) parent (d)
2. An E-living term variable
3. A software to sell items online
4. A networking interface 90. WORM stands for?
(a) Write Once Read Many (b) Wanted Once
83. Which of the following statement is not Read Memory (c) Wanted Original Read
true about UBUNTU operating system? Memory
1. Development of Ubuntu is led by UK-based (d) Write Original Read Memory
Canonical Ltd
2.It is based on Linux 91. Terminal is a
3. It is an open source operating system (a) device used to give supply to a computer
4. It does not run on mobile phones (b) Point at which data may leave or enter
the computer
(c) ending point in a program
84. ____ is the file system used by the (d) point where wires are interconnected
operating system to identify the physical (e) an input/output device
locations of files on the hard drive.
(1) RTOS (2) GIF (3) FAT (4) POST 92. Pickup wrong definition
(a) Off line - is a system peripheral equipment
85.Which of the following committees not controlled by CPU
(b) Online - is system in which peripheral
administers and provides long-range
equipment is in direct contact with CPU
technical direction for Internet (c) Peripherals - are hardware under the control
development? of CPU, like punched card readers, tapes,
drums,
(a) IBSF (b) IAB (c) ARPA (d) ISO disk, output devices
(d) PL/I is the acronym Peripheral Listing
86.Ethernet usually uses which topology? /Index
1. Rhombus topology 2. Ring topology
93. For reproducing sound, a CD (Compact
Disc) audio player uses a 2. Once information is input into a
(a) quartz crystal (b) titanium needle computer, it becomes—
(c) laser beam (d) barium titanium (A) objects (B) data
ceramic (C) ideas (D) facts

94. The memory of a computer is commonly 3. Which among the following is not a
expressed in terms of Kilobytes or mobile Operating System?
Megabytes. A byte is made up of (a) Bada (b) Safari (c) Symbian
(a) eight decimal digits (b) eight binary digits (d) MeeGo (e) WebOS
(c) two binary digits (d) two decimal
4. Which among the following key can be
95.The daily processing of corrections to used as a shortcut to rename a folder in
customer accounts best exemplifies the Microsoft Windows 8 and higher versions?
processing mode of (a) F2 (b) F4 (c) F6
(a) batch processing (b) real-time processing (d) F9 (e) F11
(c) time-sharing (d) off-line processing

96. Which of the following floppy sizes 5.There is a network that can connect
exists? networks ranging from small location or
(a) 5.25 inches (b) 4.75 inches (c) 6 inches (d) area to a bigger range including public
9 inches packet network and large corporate
networks. That network's enterprise allows
97. MS-DOS is the name of a/an users to share access to applications, services
(a) Application software (b) Hardware and other centrally located resources. Its
(c) System software (d) None of these ability for a huge geographical access has
transformed networking. Which among the
98. A term used interchangeably with following is that network?
diskette is (a) SAN (b) CAN (c) LAN (d) WAN (e)
(a) Disk cartridge (b) Disk pack MAN
(c) Floppy disk (d) Packette disk
6.If you are allowing a person on the
99. Magnetic disk a medium known as network based on the credentials to
(a) Serial access (b) Direct access (c) maintain the security of your network, then
Sequential access (d) Sequential and rotational this act refers to the process of ______.
access (a) Authentication (b) Automation
(c) Firewall (d) Encryption
100. A term associated with the comparison
of processing speed is 7.Which among the following is the smallest
(a) FFTS (b) MPG (c) MIPS (d) CPS unit in an image in a computer screen?
(a) Unit (b) Pixel
1. The taskbar is located— (c) Array (d) Resolution
(A) on the Start menu
(B) at the bottom of the screen 8._______ ensure secure transfer of data
(C) on the Quick Launch toolbar over an unsecured network, such as the
(D) at the top of the screen Internet.
(a) Antivirus (b) Hacking 17.Communication between a computer and
(C) Spoofing (d) Cryptography a keyboard involve____ transmission
(a) Automatic(b) Half-duplex
9. Which of the following protocols is (c) Full-duplex(d) Simplex
considered connectionless?
(a) TCP (b) UDP 18. The structure or format of data is called
(c) FTP (d) ICMP (a) Syntax(b) Semantics
(c) None of the mentioned
10 Which among the following cycle consists (d)grammar
of an Input, processing, output and storage
as its constituents? 19.Powerful keys that let you exit a program
(a) Processing (b) Output when pushed
(c) Input (d) Storage (a)arrow keys(b) space bar
(c) escape key (d) ctrl
11. Which of the following character set
supports Japanese and Chinese font? 20. The part of a computer that coordinates
(a) EBCDIC (b) ASCII all its functions is called its…
(c) BCD (d)Unicode (a) ROM program(b) System board
(c) Arithmetic logic unit(d) Control unit
12. Hard drive is used to store :
(a) volatile data (b) non volatile data 22. In Computer programming there is set
(c) permanent data (d) temporary data of subroutine definitions, protocols, and
tools for building software and applications.
13. Which of the following are properties of Which among the following is a term for sets
USB? of requirements that govern how one
(a) Platform independent application can talk to another?
(b) Platform dependent (a) UPS (b) API
(c) Source dependent (c) CGI (d) J2EE
(d) Software dependent
(e) Software independent 23. Which among the following is an
important circuitry in a computer system
14. What governs the communications that directs the operation of the processor?
between computers on a network? (a) Memory (b) Address Bus
(a) Memory bus(b) Communication Protocol (c) Accumulator (d) Control Unit
(c) Control Bus(d) Cache
24.Which among the given options is IBM’s
15. In PROM, P stands for? Supercomputer?
(a) Plausible(b) Program (a) Tihane-2 (b) SunwayTaihu Light
(c) Programmable(d) Proper (c) Watson (d) Shasra-T

16. What is the term used for measurement 25. Which among the given options does not
of how fast data moves from one place to have flash memory?
another? (a) Pen Drive (b) Hard Disk
(a) data per unit(b) bits per second (c) Car Radio (d) Memory
(c) bits per hour(e) ratio per bit Cards
26. Android is a mobile operating system Which of the following is a system type used
designed primarily for touchscreen mobile to process such statements?
devices such as smartphones and tablets. (a) Multitasking (b) Memory Processing
(c) Level Processing (d) Batch Processing
Which among the following was the first
Android Operating System? 32. Which among the following is an
important circuitry in a computer system
(a) Cupcake (b) Alpha
that does the arithmetic and logical
(c) Gingerbread (d) Doughnut processing?
(e) Éclair (a) Memory (b) ALU
(c) Flag Register (d) CU
27. A router is a networking device that
forwards data packets and is connected to 33.What is the maximum number, that each
two or more data lines from different of the four parts of an IP Address can have?
networks. Which among the following was (a) 256 (b) 512 (c) 1024
the earliest device which had almost the (d) 255 (e) 300
same functionality as that of a router?
(a) Interface Delay Device 34.Which of the following statements is true
(b) Interface Traffic Manager
for a piconet?
(c) Interface Routing Processor
(d) Interface Message Processor (a) It works on TCP/IP
(b) It is small network that connects computers
28. In Computer programming API is set of and network device through cables
subroutine definitions, protocols, and tools (c) It is an adhoc network
for building software and applications. (d) It works on Bluetooth technology
Which among the following is an application (e) Option (c) and (d)
programming interface for the
programming language Java, which defines 35. ____technologies is used by banks for
how a client may access a database? faster processing of large volumes of cheque.
(a) J2EE (b) JDK (c) JAVA SE (d) JDBC A. OCR B. OMR
C. MICR D. Bar code
29.Which among the following is a term
representing unit of data storage in 36. What is a bootstrap?
computer memory? a) A memory device b) A device to support
(a) Pixel (b) Decimal (c) Octet (d) Point the computer c) An error correction technique
d) A small initialization program to start up
30.Which among the following is not a a computer
secondary memory?
(a) Cache (b) Pen Drive 37. ____ is the ability of a central processing
(c) Hard Disk (d) Memory Card unit (CPU) to process multiple threads
(e) Memory Stick concurrently, appropriately supported by
the operating system.
31. After a credit card transaction has been a) Multitasking b) Multiprocessing
authorized by the issuing bank by sending c) Multithreading d) Multi-running
an authorization code to the merchant, the
settlement stage of the process begins.
38. Which of the following is not an example
of a Web Browser? 45. ____________ include(s) many different
a) Outlook b) Internet Explorer c) Safari d) categories, such as action, puzzles, role-
Chrome
playing, sports, simulation, strategy, and
39. The productivity software category virtual reality.
includes all of the following EXCEPT: A. Computer games
A. word processing. B. Video-editing software
B. peripheral device management. C. Image-editing software
C. personal information management. D. Multimedia software
D. spreadsheet.
46. Copyrighted software that can be used
40. Android Operating system is an example for free is:
of which kind of Source Model? A. shareware.
1) Open Source 2) Vertical Market Software B. freeware.
3) Horizontal Market Software 4) Shareware C. groupware.
D. e-mail.
41. Cache memory is an example of which of
the following? 47. Programs from the same developer, sold
1) Virtual Memory 2) Non Volatile Memory bundled together, that provide better
3) Static Random Access Memory integration and share common features,
4) Secondary Memory toolbars, and menus are known as:
A. software suites.
42. A software that is not protected by B. integrated software packages.
copyright or trademark is ...... C. software processing packages.
1) Vertical Market Software D. personal information managers.
2) Public Domain Software
3) Shareware Software 48 Which of the following is an Object
4) Trialware Oriented Programming Language?
1) C 2) Java 3) C++ 4) Both 2 and 3
43. Which of the following programming
languages is associated with Artificial 49. The popular name for “Information
Intelligence? Super Highway” is:
1) C 2) B 3) C++ 4) PROLOG 1) Intranet 2) Extranet 3) Virtual Private
Network 4) MAN 5) Internet
44. All of the following are examples of word
processing software EXCEPT: 50. Encryption is primarily used in:
A. Microsoft Excel. 1) Computer Processing 2) File retention 3)
B. Microsoft Word. Data communication 4) Data Storage
C. Corel WordPerfect.
D. Wordpad.
51. To protect the computer from hacker 1) Enterprise Retirement Planning 2)
intrusions, ..... must be installed. Enterprise Relationship Planning 3) Enterprise
1) Firewall 2) Mailer 3) Script 4) Yahoo Resource Planning 4) Enterprise Reorder
Messenger Planning

52. Which of the following is used to read 60 Collecting personal information and
handwritten or printed text to make a effectively posing as another individual is
digital image that is stored in memory? known as:
1) Printer 2) Laser beam 3) Scanner 4) 1) Spooling 2) Spoofing 3) Hacking 4)
Touchpad Identity Theft

53. Thesaurus option is available in ..... 61.Which among the following is not an
menu. Object Oriented Programming Language?
(a) Python
1) Page layout 2) References 3) Review 4)
(b) PASCAL
View 5) Layout (c) Java
(d) C++
54. Blu-Ray disk is an example of a(n) .... (e) Ruby
1) Hard disk 2) Magnetic Disk 3) Optical Disk
4) Output Device 62.7.The use of combination of 1’s and 0’s is
feature of which of the following type of
Computer Language?
55. Auto correct function option is present in
(a) High Level Language
..... menu of MS Word. (b) PASCAL
1) View 2) Insert 3) Format 4) Tools 5) Table (c) Machine Language
(d) C
56. Which of the following is another name
for pre-programmed formula in Excel? 63.._______ ensure secure transfer of data
1) Range 2) Graph 3) Function 4) Cell over an unsecured network, such as the
Internet.
(a) Antivirus
57. ALU works on the instructions held in (b) Hacking
....... (C) Spoofing
1) Notebook 2) Registers 3) Notepad 4) (d) Cryptography
Clipboard
64.Selling and buying products and services
in electronic mode is called ________.
58. An email address consists of:
(a) e-commerce
1) Domain name 2) Username followed by (b) e-banking
password 3) Domain name followed by user (c) e-learning
name 4) Username followed by domain name (d) online shopping

59.ERP is an acronym for: 65._________ is a program that appears or


pretends to be a genuine application, but
actually causes damage to the executable 71.Which of the following is the type of
files on the computer. software that has self-replicating software
(a) Trojan horse that causes damage to files and system?
(b) Adware (a) Viruses
(c) Spyware (b) Trojan horses
(d) Worm (c) Bots
(d) Worms
66. Which of the following software posts
unwanted advertisements on client’s
computer? 72. Which of the following is the
(a) Virus combination of numbers, alphabets along
(b) Malware with username used to get access to a user
(c) Worm account?
(d) Adware (a) password
(b) username
67.What is the full form of RTF? (c) title name
(a) Richer Text Formatting (d) host-id
(b) Rich Text Format
(c) Right Text Fishing 73.The scrambling of code is known as:
(d) Right Text Font
(a) Encryption
68.Which of the following is the text (b) Firewalling
alignment available in word processing (c) Scrambling
software that adjusts the left margin while (d) Deception
keeping the right margin in any way? (e) Permuting
(a) Justify
(b) Left Justify 74. Which is the full form of VoIP?
(c) Right Justify (a) Voice of Internet Power
(d) Centre (b) Voice over Internet Protocol
(c) Voice on Internet Protocol
69The blank white area near the edges of (d) Very optimized Internet Protocol
every page in a word document is known as (e) Very official internet Protocol
a ________.
(a) cut mark 75.A step by step procedure used to solve a
(b) margin problem is called a/an:
(c) new area (a) Operating system
(d) gutter (b) None of the above
(c) Application Program
70How many types of Document Views are (d) Algorithm
available in Word 2010?
76. What is a bootstrap?
(a) 3 (a) A memory device
(b) 4 (b) A device to support the computer
(c) 5 (c) An error correction technique
(d) 6 (d) A small initialization program to start up
a computer
77. Which of the following groups contains
graphical file extensions?
(a) JPG, GIF, BMP
(b) GIF, TCF, WMF
(c) TCP, JPG, BMP
(d) ADP, GIF, PPT
(e) JPG, CPX, GCM

78The structure or format of data is called


(a) Syntax
(b) Semantics
(c) None of the mentioned
(d)grammar

79.Which of the following is a programming


language?
(a) Lotus
(b) Pascal
(c) MS-Excel
(d)Netscape
(e) None of these

80The first computers were programmed


using machine language denoted by
(a) Pseudo code
(b) mnemonics code
(c) source code
(d) object code

You might also like