Professional Documents
Culture Documents
Multiple Choice Questions, COPA - Semester-1: Dr.V.Nagaradjane December 27, 2017
Multiple Choice Questions, COPA - Semester-1: Dr.V.Nagaradjane December 27, 2017
Dr.V.Nagaradjane
1 Semester 1 1
1.1 Basic hardware and software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.1 History of computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.2 Types of computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.3 Advantages of computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1.4 Application of computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1.5 Concept of hardware and software . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1.6 Computer hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1.7 Output devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.1.8 Central Processing Unit (CPU) . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.1.9 Computer software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.2 Computer Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
1.2.1 Booting error signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
1.2.2 BIOS settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
1.2.3 Installation of windows operating system . . . . . . . . . . . . . . . . . . . . . . 26
1.2.4 Common computer problems and solutions . . . . . . . . . . . . . . . . . . . . . 26
1.3 MS DOS and Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.3.1 MS DOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.3.2 Internal DOS commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.3.3 External DOS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
1.3.4 Output redirection in MS DOS . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
1.3.5 Wild cards in MS DOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
1.3.6 Open Source Software (OSS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
1.3.7 Linux shell commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
1.3.8 Special characters in Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
1.4 MS Word . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
1.4.1 Introduction to various application in MS Office . . . . . . . . . . . . . . . . . . 39
1.4.2 Features of MS Word . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
1.4.3 Office button in MS Word . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
1.4.4 Menus and toolbars in MS Word . . . . . . . . . . . . . . . . . . . . . . . . . . 40
1.4.5 Creating & saving a document in MS Word . . . . . . . . . . . . . . . . . . . . . 49
1.4.6 Inserting objects in MS Word . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
1.4.7 Inserting Macros in MS Word . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
1.4.8 Creating mail merge in MS Word . . . . . . . . . . . . . . . . . . . . . . . . . . 52
1.4.9 Creating templates in MS Word . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
1.4.10 Page setup & printing in MS Word . . . . . . . . . . . . . . . . . . . . . . . . . 53
1.5 MS Excel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
1.5.1 Data types in MS Excel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
1.5.2 Cell referencing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
1.5.3 Categories of functions in MS Excel . . . . . . . . . . . . . . . . . . . . . . . . . 57
1.5.4 Sorting in MS Excel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
1.5.5 Filtering in MS Excel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
iii
iv Prepared by: Dr.V.Nagaradjane
Semester 1
1.1 Basic hardware and soft- (a) punched card (b) DVD
(c) hard disk (d) floppy disk
ware
8. Difference engine provided its output
1.1.1 History of computers through .
(a) printer
1. Logarithm was invented by . (b) curve plotter
(a) John Napier (c) card punching machine/ bell
(b) Edmund Gunter (d) all of them
(c) Blaise Pascal 9. The computer which worked on contin-
(d) Charles Babbage uously changing quantities (like electric-
2. Mechanical calculator was invented by ity, water flow, etc.) for input were
. called .
(a) John Napier (a) ENIAC
(b) Edmund Gunter (b) logarithm
(c) Blaise Pascal (c) analog computer
(d) Charles Babbage (d) mainframe computer
3. Slide rule was invented by . 10. Analog computer was invented by
(a) John Napier .
(a) John Napier
(b) Edmund Gunter
(b) Sir William Thomson
(c) Blaise Pascal
(c) Blaise Pascal
(d) Charles Babbage
(d) Charles Babbage
4. First general purpose computer was in-
11. Computers like Colossus, were used for
vented by .
(a) John Napier German military communica-
(b) Edmund Gunter tion during World War II.
(a) decrypting (b) scrambling
(c) Blaise Pascal
(c) randomizing (d) encrypting
(d) Charles Babbage
12. Theoretical definition of a general
5. The first computer was invented by
purpose computer was provided by
Charles Babbage was called .
(a) slide rule .
(a) Allen Turing
(b) difference engine (b) John Napier
(c) ENIAC (c) Blaise Pascal
(d) calculator (d) Edmund Gunter
6. is called father of modern 13. The first general purpose computer,
computers. which fulfilled Turing’s definition of a
(a) John Napier
general purpose computing machine was
(b) Edmund Gunter
.
(c) Blaise Pascal (a) slide rule (b) ENIAC
(d) Charles Babbage (c) logarithm (d) Colossus
7. Difference engine used for in- 14. The first generation computer was called
put. .
1
2 Prepared by: Dr.V.Nagaradjane
(a) slide rule (b) ENIAC 23. Second generation computer was cre-
(c) logarithm (d) Colossus ated in the year .
(a) 1945 (b) 1959
15. First generation computer (named
ENIAC) was designed and fabricated by (c) 1965 (d) 1971
. 24. Second generation computer used
(a) John Napier technology for processing
(b) Endmund Gunter data.
(c) Blaise Pascal (a) transistor
(d) J.P. Eckert & J.W. Mauchy (b) Integrated Circuit (IC)
(c) vacuum tube
16. First generation computer (named
ENIAC) was designed and fabricated at (d) Very Large Scale Integration (VLSI)
. 25. Second generation computer used
(a) University of Pensylvenia, USA for main memory.
(b) University College, London (a) DVD
(c) University of California, Berkeley, USA (b) magnetic core
(d) Cambridge University, UK (c) hard disk
17. First generation computer (named (d) CD
ENIAC) was created in the year 26. Second generation computer used
. for input.
(a) 1945 (b) 1959 (a) magnetic disk
(c) 1965 (d) 1971 (b) magnetic tape
18. First generation computer (named (c) both a & b
ENIAC) used technology for (d) neither a nor b
processing data. 27. Second generation computer used
(a) transistor for output.
(b) Integrated Circuit (IC) (a) magnetic disk
(c) vacuum tube (b) magnetic tape
(d) Very Large Scale Integration (VLSI) (c) both a & b
19. First generation computer (named (d) neither a nor b
ENIAC) used more than kW of 28. language was used to pro-
electric power. gram second generation computer.
(a) 200 (b) 1000 (a) FORTRAN
(c) 2000 (d) 3000 (b) COBOL
20. First generation computer (named (c) both a & b
ENIAC) used for input. (d) neither a nor b
(a) punched card
29. Third generation computer was created
(b) paper tape in the year .
(c) magnetic tape (a) 1945 (b) 1959
(d) all of them (c) 1965 (d) 1971
21. First generation computer (named 30. Third generation computer used
ENIAC) used for output. technology for processing
(a) punched card data.
(b) paper tape (a) transistor
(c) magnetic tape (b) Integrated Circuit (IC)
(d) all of them (c) vacuum tube
22. language was used to pro- (d) Very Large Scale Integration (VLSI)
gram first generation computer (named 31. Third generation computer used
ENIAC). for input.
(a) C (a) magnetic disk
(b) machine language (b) magnetic tape
(c) C++ (c) keyboard
(d) Java (d) all of them
Q. Bank [COPA Semester - 1] 3
32. Third generation computer used 41. Internet was created during the era of
for output. generation compuers.
(a) magnetic disk (a) second (b) third
(b) magnetic tape (c) fourth (d) fifth
(c) monitor 42. Fifth generation computer was created
(d) all of them in the year .
33. language was used to pro- (a) 1959 (b) 1965
gram third generation computer. (c) 1971 (d) 1980
(a) FORTRAN-II to IV,COBOL 43. Fifth generation computer used
(b) BASIC,PASCAL technology for processing
(c) PL/1, ALGOL-60 data.
(d) all of them (a) Integrated Circuit (IC)
(b) vacuum tube
34. Fourth generation computer was created
(c) Very Large Scale Integration (VLSI)
in the year .
(a) 1959 (b) 1965 (d) Ultra Large Scale Integration (ULSI)
(c) 1971 (d) 1980 44. Fifth generation computer used
for input.
35. Fourth generation computer used
(a) mouse
technology for processing
(b) keyboard
data.
(a) Integrated Circuit (IC) (c) scanner/light pen
(b) vacuum tube (d) all of them
(c) Very Large Scale Integration (VLSI) 45. language created during the
(d) Ultra Large Scale Integration (ULSI) advent of fifth generation computers.
(a) Java
36. Fourth generation computer used
(b) C#
for input.
(a) magnetic disk (c) both a & b
(b) magnetic tape (d) neither a nor b
(c) keyboard 46. In fifth generation computers,
(d) all of them were used for secondary
storage of data.
37. language was created during
(a) floppy disk
the advent of fourth generation comput-
(b) hard disk
ers.
(a) C (c) CD/ DVD drive
(b) C++ (d) all of them
(c) both a & b 47. Several new forms of personal computer,
(d) neither a nor b viz., laptop, notebook, ultrabook, tablet
PC, smartphones, Chromebook, Rasp-
38. In fourth generation computers,
were used for secondary berry PI, were created during the era of
storage of data. .
(a) second (b) third
(a) floppy disk (b) hard disk
(c) fourth (d) fifth
(c) tape drive (d) all of them
39. generation computers
first earned the name of Personal Com- 1.1.2 Types of computer
puter (PC).
(a) first (b) second 48. Personal computer is otherwise called
.
(c) third (d) fourth (a) micro-computer
40. Productivity tools like Wordstar, Lotus, (b) desktop
DBASE, FOXPRO, etc. flourished dur- (c) both a & b
ing the era of generaton (d) neither a nor b
computers. 49. In a personal computer, multiple users
(a) first (b) second .
(c) third (d) fourth (a) can login and work at differnt times
(b) cannot login and work at the same time 56. A computer having large processing
(c) although multiple users are supported, only power, used for scientific research, simu-
one person can login at given time lation of experiments, nuclear research,
(d) all of them high power number crunching, etc. is
called .
50. The computer having better graphics (a) smartphone
capacity, more main memory, more pro- (b) micro-computer
cessing power and more storage com- (c) workstation computer
pared to personal computer is called (d) supercomputer
.
(a) tablet PC 57. The most common type of computer
(b) Raspberry PI used at homes and offices is called
.
(c) workstation computer (a) Personal Computer (PC)
(d) smartphone (b) super computer
51. The computer used for professional (c) main frame computer
works like CAD/CAM, animation, desk- (d) mini computer
top publication, high power gaming, etc. 58. In computers, PC is expanded as
is called . .
(a) tablet PC (a) Process Computer
(b) Raspberry PI (b) Progressive Computer
(c) workstation computer (c) Personal Computer
(d) smartphone (d) Plus Computer
59. Personal computer is otherwise called
52. A computer which supports concurrent
.
login for 100 or 200 persons is called (a) super computer
. (b) main frame computer
(a) mini-computer
(c) mini computer
(b) micro-computer (d) micro-computer
(c) tablet PC
60. A micro-computer/PC permits working
(d) laptop
of at the same time.
53. A computer which supports concurrent (a) many users
login for thousands of users is called (b) one user
. (c) hundreds of users
(a) mainframe computer (d) thousands of users
(b) micro-computer 61. Laptops, tabs, mobile phones, raspberry
(c) tablet PC PI, etc. are classified under .
(d) laptop (a) super computer
(b) main frame computer
54. computer has enormous (c) mini computer
processing power, memory and storage (d) micro-computer
and supports thousands of concurrent
logins.
(a) mainframe computer 1.1.3 Advantages of computers
(b) micro-computer
(c) cloud computer 62. The main advantage of computer is
.
(d) laptop (a) speed
55. A collection of computers used for on- (b) large storage capacity
line data storage through the Internet is (c) ease of creating programs for new jobs
called . (d) all of them
(a) mainframe computer 63. CAD stands for .
(b) micro-computer (a) Computer Analog Design
(c) cloud computer (b) Computer Aided Dialog
(d) laptop (c) Computer Aided Design
Q. Bank [COPA Semester - 1] 5
121. VDU is expanded as . 131. The number of pixels per inch of monitor
(a) Visual Display Unit length is called .
(a) LPI (Lines Per Inch)
(b) Virtual Display Unit
(b) DPI (Dots Per Inch)
(c) Visual Deception Unit
(c) SPI Sides Per Inch
(d) Visual Display University
(d) PPI (Pixels Per Inch)
122. In computer monitors, CRT stands for
. 132. Height to width ratio of a monitor screen
(a) Cadmium Ray Tube is called .
(a) aspect ratio
(b) Cathode Ray Tube
(b) length ratio
(c) Cathode Ray Twist
(c) width ratio
(d) Cathode Rim Tube
(d) diagonal ratio
123. Cathode Ray Tube (CRT) monitor sup-
ports input. 133. Generally, CRT monitors had aspect ra-
(a) LASER printer tio of .
(a) 16:9 (b) 4:3
(b) line printer
(c) 16:10 (d) 1:1
(c) light pen
(d) plotter 134. LCD, LED, TFT and Plasma monitors
have aspect ratio of .
124. Cathode Ray Tube (CRT) monitor has (a) 16:9
level of power consumption (b) 16:10
amongst monitors. (c) both a & b
(a) highest (b) lowest
(d) neither a nor b
(c) zero (d) least
135. The monitor having pixel resolution
125. LCD is expanded as .
of 1280 × 720 has aspect ratio of
(a) Linear Crystal Display
.
(b) Liquid Crystal Dialog (a) 16:9 (b) 16:10
(c) Liquid Crystal Display (c) 4:3 (d) 1:1
(d) Liquid Canister Display
136. The monitor having pixel resolution
126. LED is expanded as . of 800 × 600 has aspect ratio of
(a) Linear Emitting Diode .
(b) Light Emitting Diode (a) 16:9 (b) 16:10
(c) Liquid Emitting Diode (c) 4:3 (d) 1:1
(d) Light Emitting Display 137. The monitor having pixel resolution
127. The display of LCD monitor is of 1280 × 800 has aspect ratio of
than that of LED .
monitor. (a) 16:9 (b) 16:10
(a) lighter (b) heavier (c) 4:3 (d) 1:1
(c) brighter (d) duller 138. The monitor having pixel resolution
128. Plasma monitor is suitable for of 1920 × 1080 has aspect ratio of
. .
Q. Bank [COPA Semester - 1] 9
(a) 16:9 (b) 16:10 147. The method of displaying screen con-
(c) 4:3 (d) 1:1 tents using even rows for half a second
and odd rows for another half second is
139. In monitors, HD stands for
. called of video.
(a) Hyper Density (a) progressive video
(b) High Direct (b) interlacing
(c) deinterlacing
(c) Hot Definition
(d) reducing
(d) High Definition
148. The p in display resolutions of
140. Display resolution of 1920 × 1080 pixels
1080p, 720p, 576p&480p stands for
is called display.
(a) 480p (a) progressive video
(b) 576p (b) interlacing
(c) 720p (c) deinterlacing
(d) Full High Definition (FHD) (d) reducing
141. Full High Definition (FHD) of dis- 149. The method of painting each row of
plays correspondes to (ver- video frame from top to bottom is called
tical pixel resolution). .
(a) 480p (b) 576p (a) progressive video
(c) 720p (d) 1080p (b) interlacing
142. Display resolution of 1280 × 720 pixels (c) deinterlacing
is called . (d) reducing
(a) 480p 150. The method of painting odd rows during
(b) 576p the fist pass and even rows during the
(c) 720p second pass is called .
(d) Full High Definition (FHD) (a) progressive video
143. Display resolution of 768 × 576 pixels is (b) interlacing
called . (c) deinterlacing
(a) 480p (d) reducing
(b) 576p
(c) 720p Printer
(d) Full High Definition (FHD)
144. Display resolution of 720 × 480 pixels is 151. The device that produces hard copies on
called . paper is called .
(a) 480p (a) monitor (b) scanner
(b) 576p (c) tablet (d) printer
(c) 720p 152. Paper copy of a document is called
(d) Full High Definition (FHD) .
(a) light copy (b) hard copy
145. The notation HDi for display resolution
denotes . (c) soft copy (d) hot copy
(a) 1080p Interlaced 153. Digital copy of a document stored in
(b) 720p Interlaced secondary storage device (like hard disk,
(c) 576p Interlaced floppy disk, CD, DVD, pen drive, SD
(d) 480p Interlaced card, etc.) is called .
(a) light copy (b) hard copy
146. The method of displaying screen con-
tents using even rows for half a second (c) soft copy (d) hot copy
and odd rows for another half second is 154. The type of printer which hits the paper
called of video. to produce print is called .
(a) progressive scanning (a) monitor
(b) interlacing (b) scanner
(c) deinterlacing (c) non-impact type printer
(d) reducing (d) impact type printer
155. The type of printer which does not hit 163. Thermal printer uses
the paper to produce print is called coated paper, which turns black when
. heat is applied.
(a) monitor (a) chromium (b) BisPhenol A
(b) scanner (c) nickel (d) toner powder
(c) non-impact type printer
(d) impact type printer
1.1.8 Central Processing Unit
156. Dot matrix printer belongs to (CPU)
category.
(a) monitor Micro-processor
(b) scanner
(c) non-impact type printer 164. CPU is expanded as .
(d) impact type printer (a) Central Power Unit
(b) Critical Processing Unit
157. Dot matrix printer, line printer, chain (c) Central Processing Unit
printer, golf ball printer and daisy wheel (d) Cerebral Processing Unit
printer belong to category.
(a) monitor 165. The symbol µP denotes of
(b) scanner a computer.
(a) mighty processor
(c) non-impact type printer
(b) micro presenter
(d) impact type printer
(c) million power
158. LASER printer, ink jet printer, ther- (d) micro-processor
mal printer and plotter belong to 166. is casually called the ”Brain
category. of Computer”.
(a) monitor (a) CPU (b) monitor
(b) scanner (c) keyboard (d) mouse
(c) non-impact type printer
167. The main components housed in CPU
(d) impact type printer are .
159. In LASER printer, the LASER beam pro- (a) micro-processor
duces charge on paper, which (b) Mother board, Random Access Memory
makes the toner powder to adhere to the (RAM)
charged area. (c) Secondary storage devices (hard disk,
(a) (-)ve (b) (+)ve CD/DVD drive, floppy disk drive, etc.)
(c) neutral (d) none of them (d) all of them
168. In the CPU of a computer,
160. In ink jet printer,
delivers power supply to all the compo-
colour cartridges are used to produce
nents at appropriate voltages.
colour/black print. (a) Hard Disk
(a) Red, Blue & Green (RBG)
(b) Mother Board
(b) Cyan, Magenta, Yellow & blacK (CMYK) (c) Switch Mode Power Supply (SMPS)
(c) Red, Green & Blue (RGB) (d) DVD drive
(d) VIBGYOR
169. The chip carrying out all process-
161. In ink jet printer, CMYK stands for ing works in a computer is called
. .
(a) Cream, Magenta, Yellow & blacK (a) micro-processor (µP )
(b) Crimson, Magenta, Yellow & blacK (b) keyboard
(c) Cyan, Magenta, Yellow & blacK (c) BIOS chip
(d) Cyan, Mango, Yellow & blacK (d) RAM
162. The type of printer used for printing on 170. The part of micro-processor which per-
large size papers (A0, A1, etc.) is called forms number crunching and logical
. comparisons is called .
(a) monitor (b) scanner (a) Arithmetic and Logic Unit (ALU)
(c) mouse (d) plotter (b) Register
Q. Bank [COPA Semester - 1] 11
277. Windows 1.0, Windows 3.1, Windows 285. First release of Linux kernel took place
95, Windows 98 and Windows Me were in the year .
based on kernel. (a) 1981 (b) 1984
(a) LINUX (c) 1991 (d) 1993
(b) UNIX
286. Linux is distributed under an open
(c) NT (New Technology) source license called .
(d) MS DOS (a) GNU GPL (GNU Not Unix General Public Li-
278. Windows NT, Windows 2000, Windows cense)
XP, Windows 2003, Windows Vista, (b) Apache license
Windows 7, Windows 8 and Windows (c) Berkeley Software Distribution (BSD) license
10 were based on kernel. (d) Microsoft End User License Agreement
(a) LINUX (EULA)
(b) UNIX 287. Linux operating system was inspired by
(c) NT (New Technology) operating system.
(d) MS DOS (a) Windows (b) Unix
(c) Mac OS (d) iOS
279. The New Technology (NT) kernel based
Windows NT was released in . 288. Linux kernel supports for
(a) 1981 (b) 1993 Graphical User Interface (GUI) based
(c) 2000 (d) 2010 desktop.
(a) GNOME
Mac OS X (b) KDE
(c) Enlightenment
280. First version of Mac OS was released in (d) all of them
the year . 289. is a version of Linux ker-
(a) 1981 (b) 1984 nel modified to run on mobile phones/
(c) 1993 (d) 2000 tablets/ other devices.
281. was the first commercial (a) Android (b) Firefox OS
operating system to support Graphical (c) Tizen (d) all of them
User Interface (GUI). 290. are the shell environments
(a) Windows (b) UNIX commonly supported by Linux.
(c) Linux (d) Mac OS (a) Bourne Again Shell (bash)
282. The latest version of Mac OS X is based (b) Korn Shell (ksh)
on free UNIX kernel called . (c) C Shell (csh)
(a) Darwin (d) all of them
(b) Cygwin
(c) Solaris UNIX
(d) Berkeley Software Distribution
283. The mobile version of Mac OS X, used 291. UNIX was one of the first operating sys-
in iPhone, iPad, iWatch, iPod, etc., is tems to support .
called . (a) multi-tasking
(a) Android (b) Internet
(b) Firefox OS (c) email
(c) iOS (d) all of them
(d) Blackberry OS 292. UNIX operating system was developed
at .
Linux (a) AT&T Bell Labs
(b) Carnegie Milan University
284. Linux kernel was developed by (c) CERN
. (d) NASA
(a) Richard Stallman
293. UNIX was developed in the year
(b) Linus Torvalds .
(c) Bill Gates (a) 1970 (b) 1984
(d) Steve Jobs (c) 1985 (d) 1993
Using scanner, printer and webcam 29. (c) 30. (b) 31. (d) 32. (d)
33. (d) 34. (c) 35. (c) 36. (d)
366. To run a peripheral unit like scan- 37. (c) 38. (d) 39. (d) 40. (d)
ner, printer or webcam, appropriate 41. (c) 42. (d) 43. (d) 44. (d)
needs to be installed first. 45. (c) 46. (d) 47. (d) 48. (c)
(a) driver (b) connector
(c) conductor (d) resistor 49. (d) 50. (c) 51. (c) 52. (a)
53. (a) 54. (a) 55. (c) 56. (d)
367. On connecting a device with pre- 57. (a) 58. (c) 59. (d) 60. (b)
installed driver, Windows .
(a) rejects the device 61. (d) 62. (d) 63. (c) 64. (d)
(b) displays unknown hardware message 65. (c) 66. (a) 67. (a) 68. (b)
(c) initializes the device and makes it ready to 69. (d) 70. (d) 71. (d) 72. (b)
work 73. (a) 74. (a) 75. (b) 76. (a)
(d) does not care about the new device 77. (b) 78. (d) 79. (d) 80. (a)
368. Scanned images may be acquired using 81. (c) 82. (b) 83. (b) 84. (b)
software. 85. (b) 86. (a) 87. (c) 88. (a)
(a) scanner specific 89. (c) 90. (b) 91. (d) 92. (a)
(b) MS Paint 93. (b) 94. (d) 95. (c) 96. (a)
(c) Photoshop 97. (a) 98. (b) 99. (d) 100. (c)
(d) all of them 101. (d) 102. (b) 103. (a) 104. (c)
369. Printer settings permit selection of ap- 105. (a) 106. (b) 107. (c) 108. (a)
propriate of paper. 109. (d) 110. (c) 111. (b) 112. (a)
(a) size 113. (b) 114. (c) 115. (c) 116. (c)
(b) orientation (portrait or landscape) 117. (a) 118. (b) 119. (c) 120. (c)
(c) thickness (in GSM) 121. (a) 122. (b) 123. (c) 124. (a)
(d) all of them 125. (c) 126. (b) 127. (d) 128. (a)
370. A web camera is normally suitable for 129. (b) 130. (c) 131. (d) 132. (a)
. 133. (b) 134. (c) 135. (a) 136. (c)
(a) low resolution images 137. (b) 138. (a) 139. (d) 140. (d)
(b) streaming videos during video conferencing 141. (d) 142. (c) 143. (b) 144. (a)
(c) both a & b 145. (a) 146. (b) 147. (b) 148. (a)
(d) none of them 149. (a) 150. (b) 151. (d) 152. (b)
371. Web camera is normally for 153. (c) 154. (d) 155. (c) 156. (d)
high resolution photography. 157. (d) 158. (c) 159. (a) 160. (b)
(a) recommended (b) not suitable 161. (c) 162. (d) 163. (b) 164. (c)
(c) used (d) suitable 165. (d) 166. (a) 167. (d) 168. (c)
372. Voice Over Internet Protocol (VOIP) 169. (a) 170. (a) 171. (c) 172. (b)
programs like make use of 173. (c) 174. (d) 175. (a) 176. (c)
web camera. 177. (b) 178. (d) 179. (b) 180. (d)
(a) Skype
181. (c) 182. (b) 183. (c) 184. (a)
(b) Hangouts/ Yahoo messenger
185. (d) 186. (b) 187. (c) 188. (a)
(c) WhatsApp/ Viber
189. (a) 190. (d) 191. (b) 192. (c)
(d) all of them
193. (a) 194. (b) 195. (d) 196. (b)
197. (c) 198. (a) 199. (d) 200. (c)
Answers (1 - 372) 201. (a) 202. (c) 203. (a) 204. (c)
205. (d) 206. (a) 207. (b) 208. (a)
1. (a) 2. (c) 3. (b) 4. (d) 209. (c) 210. (d) 211. (a) 212. (b)
5. (b) 6. (d) 7. (a) 8. (d) 213. (c) 214. (b) 215. (a) 216. (a)
9. (c) 10. (b) 11. (a) 12. (a) 217. (b) 218. (c) 219. (c) 220. (a)
13. (b) 14. (b) 15. (d) 16. (a) 221. (d) 222. (a) 223. (c) 224. (c)
17. (a) 18. (c) 19. (a) 20. (d) 225. (a) 226. (b) 227. (d) 228. (c)
21. (d) 22. (b) 23. (b) 24. (a) 229. (c) 230. (b) 231. (d) 232. (c)
25. (b) 26. (c) 27. (c) 28. (c) 233. (a) 234. (b) 235. (d) 236. (c)
Q. Bank [COPA Semester - 1] 23
237. (b) 238. (b) 239. (a) 240. (c) 305. (d) 306. (c) 307. (d) 308. (a)
241. (c) 242. (a) 243. (c) 244. (d) 309. (d) 310. (c) 311. (a) 312. (b)
245. (b) 246. (a) 247. (b) 248. (a) 313. (c) 314. (a) 315. (b) 316. (d)
249. (d) 250. (c) 251. (a) 252. (b) 317. (c) 318. (a) 319. (b) 320. (a)
253. (d) 254. (a) 255. (d) 256. (c) 321. (a) 322. (b) 323. (a) 324. (c)
257. (d) 258. (b) 259. (b) 260. (b) 325. (d) 326. (a) 327. (c) 328. (b)
261. (b) 262. (b) 263. (a) 264. (b) 329. (d) 330. (a) 331. (c) 332. (d)
265. (d) 266. (c) 267. (b) 268. (d) 333. (c) 334. (a) 335. (d) 336. (a)
269. (d) 270. (a) 271. (b) 272. (d) 337. (b) 338. (c) 339. (a) 340. (d)
273. (a) 274. (b) 275. (d) 276. (c) 341. (a) 342. (b) 343. (c) 344. (a)
277. (d) 278. (c) 279. (b) 280. (b) 345. (d) 346. (a) 347. (c) 348. (b)
281. (d) 282. (a) 283. (c) 284. (b) 349. (a) 350. (c) 351. (a) 352. (a)
285. (c) 286. (a) 287. (b) 288. (d) 353. (b) 354. (c) 355. (d) 356. (c)
289. (d) 290. (d) 291. (d) 292. (a) 357. (a) 358. (b) 359. (c) 360. (d)
293. (a) 294. (d) 295. (b) 296. (c) 361. (c) 362. (a) 363. (b) 364. (c)
297. (d) 298. (c) 299. (a) 300. (a) 365. (d) 366. (a) 367. (c) 368. (d)
301. (c) 302. (d) 303. (a) 304. (b) 369. (d) 370. (c) 371. (b) 372. (d)
(a) DEL 46. When the menu for managing hard disk
(b) F2 partitions is displayed, op-
(c) ESC tions help to create, delete and format
(d) any one of them partitions.
Usually, date, time, drive options, mem- (a) New (b) Delete
38.
ory details, etc. are accessible under (c) Format (d) all of them
menu of BIOS settings. 47. After choosing a suitable partition for
(a) Advanced (b) Main installation of Windows, .
(c) Power (d) Boot (a) delete that partition
Usually, processor configuration, on (b) select that partition and press Next button
39.
board settings of motherboard, USB (c) press Ctrl+Alt+Delete
configuration, etc. are accessible under (d) Switch off power supply
menu of BIOS settings. 48. Durign installation of Windows, the
(a) Advanced (b) Main computer after copying
(c) Power (d) Boot files, installing features.
Usually, power options are accessible un- (a) reboots
40.
der menu of BIOS settings. (b) keeps on processing
(a) Advanced (b) Main (c) keeps on beeping
(c) Power (d) Boot (d) plays music
41. Usually, UEFI settings, order of boot 49. During installation of Windows, user
media, etc. are accessible under names and passwords are entered
menu of BIOS settings. the operating system gets
(a) Advanced (b) Main fully ready.
(c) Power (d) Boot (a) before
Passwords for user and administra- (b) after
42.
tor of BIOS may be accessed using (c) only after
menu of BIOS settings. (d) subsequent to
(a) Advanced (b) Security 50. After completing installation of Win-
(c) Power (d) Boot dows, are to be installed
43. Options for saving or discarding changes for making the computer safe and pro-
and exiting BIOS settings is accessible ductive.
(a) anti-virus
from menu of BIOS set-
(b) Office package
tings.
(a) Advanced (b) Security (c) Adobe Reader and other application software
(c) Power (d) Exit packages
(d) all of them
(a) remove all peripherals except keyboard, mouse (c) start print spooler service from control panel
and monitor and reboot (d) all of them
(b) identify the erring peripheral by connecting 61. If a PC displays access violation error
each peripheral one by one and reboots in the middle of working,
(c) try system restore to a previous date
.
(d) all of them (a) check the RAM chip
54. When the PC does not boot, try (b) replace the RAM chip and try whether the
. problem continues
(a) verify power cables (c) both a & b
(b) check whether green LED on mother board (d) neither a nor b
glows If the Internet connection is very slow,
(c) switch on SMPS power switch, if any, and ver- 62.
do .
ify whether the SMPS fan runs (a) disable automatic software updates
(d) all of them (b) stop cloud storage services like drop box, one
55. If a computer emits beeps and halts, do drive, iCloud, etc. from syncing on slow con-
to make the computer work nection
again. (c) stop messenger services which have opened at
(a) remove RAM, clean and refix boot time
(b) remove VGA cable and reconnect (d) all of them
(c) remove CMOS battery (CR2032) and replace 63. If a program does not install or closes
it with new one just after install screen opens, do
(d) all or any one of them .
56. If computer displays the error message (a) check whether the program is compatible to
”Insert boot media”, do . the operating system (64 bit or 32 bit)
(a) modify BIOS settings to boot from hard disk (b) right click on setup program and choose Run
(b) configure the BIOS to boot from alternate in- as Administrator
stallation media like CD/DVD (c) try to run the program in compatibility mode
(c) reboot to try whether secondary boot process (d) all of them
starts 64. When there is a paper jam in printer, do
(d) all of them .
57. When boot is halted due to wrong BIOS (a) switch off printer
settings, . (b) open the lid
(a) press DEL, F2 or ESC key to enter BIOS set- (c) gently remove the jammed paper
tings (d) all of them
(b) set correct date and time
(c) set correct boot order
(d) all of them Answers (373 - 436)
58. If a computer does not switch on, do
1. (b) 2. (a) 3. (a) 4. (a)
.
(a) check power cables 5. (d) 6. (b) 7. (c) 8. (a)
(b) check whether SMPS is running 9. (b) 10. (c) 11. (d) 12. (b)
(c) switch on SMPS, if it has any switch 13. (d) 14. (a) 15. (d) 16. (a)
(d) all of them 17. (d) 18. (c) 19. (c) 20. (a)
59. If a computer looses BIOS settings after 21. (d) 22. (c) 23. (b) 24. (a)
each power off, do . 25. (c) 26. (b) 27. (a) 28. (d)
(a) replace CMOS battery (CR2032) 29. (b) 30. (c) 31. (a) 32. (a)
(b) sell off the computer 33. (b) 34. (d) 35. (c) 36. (b)
(c) switch off the computer 37. (d) 38. (b) 39. (a) 40. (c)
(d) clean the computer 41. (d) 42. (b) 43. (d) 44. (a)
60. If printer does not work in a computer, 45. (c) 46. (d) 47. (b) 48. (a)
do . 49. (a) 50. (d) 51. (a) 52. (d)
(a) check PC to printer connection 53. (d) 54. (d) 55. (d) 56. (d)
(b) check whether appropriate driver has been in- 57. (d) 58. (d) 59. (a) 60. (d)
stalled for the printer 61. (c) 62. (d) 63. (d) 64. (d)
(c) PRINT (d) SYS (a) green cards (b) white cards
82. MS DOS command (re- (c) SIM cards (d) wild cards
moved in the latest version of MS DOS) 92. wild card matches any
checks and repairs files in given drive. number of characters in the name.
(a) SCANDISK (b) SORT (a) * (b) ?
(c) PRINT (d) SYS (c) & (d) $
83. MS DOS command 93. wild card matches a single
sorts the contents of file in alphabetic character.
or numerical order. (a) * (b) ?
(a) SCANDISK (b) SORT (c) & (d) $
(c) PRINT (d) SYS
84. MS DOS command 1.3.6 Open Source Software (OSS)
copy system files and make a disk
bootable. 94. Any software (paid or free), for which
(a) SCANDISK (b) SORT source code is available is called
(c) PRINT (d) SYS .
85. MS DOS command (a) open source software
displays files and folders in a tree struc- (b) free software
ture. (c) virus software
(a) TREE (b) UNDELETE (d) hacked software
(c) XCOPY (d) MOVE 95. helps capable users to im-
86. MS DOS command prove and bug fix the software.
restores the latest file deleted from MS (a) open source software
DOS file system. (b) closed source software
(a) TREE (b) UNDELETE (c) virus software
(c) XCOPY (d) MOVE (d) hacked software
87. MS DOS command 96. model of software helps de-
copies files, directories and subdirecto- velopers across the world to cooperate
ries. in development of software.
(a) TREE (b) UNDELETE (a) open source software
(c) XCOPY (d) MOVE (b) closed source software
(c) virus software
1.3.4 Output redirection in MS DOS (d) hacked software
97. An example of the most popular open
88. redirector writes output of source software is .
a program to a new file, deleting the old (a) Mozilla Firefox browser, GIMP image editor,
contents, if any. QCAD drafting tool, Blender 3D modelling
(a) > (b) >> software
(c) | (d) none of them (b) Linux operating system
89. redirector appends output (c) Open office, Libre Office, KOffice, gnumeric,
of a program to an existing file, creating AbiWord, Scribus
(d) all of them
the file if it does not exist.
(a) > (b) >> 98. are some of the open
(c) | (d) none of them source licensing models.
90. redirector sends output of (a) GNU GPL/ GNU LGPL
a program to another program as input. (b) Apache lincense
(a) > (b) >> (c) BSD/ MIT/ Eclipse/ Mozilla license
(c) | (d) none of them (d) all of them
99. GNU GPL stands for .
1.3.5 Wild cards in MS DOS (a) GNU General Public License
(b) GNU Lesser General Public License
91. The *, ? characters in MS DOS are (c) GNU Not Unix
called . (d) GNU Image Manipulation Programme
Q. Bank [COPA Semester - 1] 33
118. The numeric value of read permission is (a) user (b) group
. (c) world (d) all of them
(a) 4 (b) 2
130. Linux command creates a
(c) 1 (d) 0
copy of given file in new name.
119. The numeric value of write permission is (a) cp (b) ln
. (c) mv (d) cd
(a) 4 (b) 2
(c) 1 (d) 0 131. Linux command creates a
link to the current file (not a full copy
120. In Linux, the numeric value of execute
permission is . of the file).
(a) 4 (b) 2 (a) cp (b) ln
(c) 1 (d) 0 (c) mv (d) cd
121. In Linux, a file having read and write 132. Linux command deletes
permissions would have a numeric value the source file and creates copy of the
of as argument to chmod. source file in a new name.
(a) cp (b) ln
(a) 6 (b) 7
(c) mv (d) cd
(c) 4 (d) 5
133. Linux command helps
122. In Linux, a file having read only per-
missions would have a numeric value of user to change current working direc-
as argument to chmod. tory.
(a) 6 (b) 7 (a) cp (b) ln
(c) 4 (d) 5 (c) mv (d) cd
123. In Linux, a file having read, write and 134. Linux command displays
execute permissions would have a nu- full path of the current directory.
(a) cp (b) pwd
meric value of as argument
(c) mv (d) cd
to chmod.
(a) 6 (b) 7 135. In Linux, the character . denotes
(c) 4 (d) 5 directory.
124. In Linux, a file having read and execute (a) current (b) parent
permissions would have a numeric value (c) home (d) root
of as argument to chmod. 136. In Linux, the characters .. denote
(a) 6 (b) 7 directory.
(c) 4 (d) 5 (a) current (b) parent
125. In Linux, access permission meant for (c) home (d) root
. 137. In Linux, the character denotes
(a) user (b) group directory.
(c) world (d) all of them (a) current (b) parent
126. In Linux, first value of permission pro- (c) home (d) root
vided to chmod command is meant for 138. In Linux, the character / denotes
. directory.
(a) user (b) group
(a) current (b) parent
(c) world (d) all of them
(c) home (d) root
127. In Linux, second value of permission pro-
vided to chmod command is meant for 139. In Linux, command is used
to mount a new file system.
. (a) eject (b) mount
(a) user (b) group
(c) world (d) all of them (c) umount (d) shutdown
128. In Linux, third value of permission pro- 140. In Linux, command is used
vided to chmod command is meant for to unmount a new file system.
. (a) eject (b) mount
(a) user (b) group (c) umount (d) shutdown
(c) world (d) all of them
129. Any person unrelated to the current
user or the group of the current user is
treated with permissions.
Q. Bank [COPA Semester - 1] 35
(d) runs the right side process only if the left side 93. (b) 94. (a) 95. (a) 96. (a)
process succeeds 97. (d) 98. (d) 99. (a) 100. (b)
101. (c) 102. (d) 103. (a) 104. (b)
Answers (437 - 642) 105. (d) 106. (a) 107. (b) 108. (a)
109. (b) 110. (c) 111. (b) 112. (c)
1. (a) 2. (c) 3. (d) 4. (b) 113. (d) 114. (a) 115. (c) 116. (d)
5. (d) 6. (a) 7. (b) 8. (c) 117. (b) 118. (a) 119. (b) 120. (c)
9. (a) 10. (b) 11. (d) 12. (a) 121. (a) 122. (c) 123. (b) 124. (d)
13. (c) 14. (a) 15. (b) 16. (d) 125. (d) 126. (a) 127. (b) 128. (c)
17. (a) 18. (d) 19. (c) 20. (a) 129. (c) 130. (a) 131. (b) 132. (c)
21. (b) 22. (d) 23. (a) 24. (d) 133. (d) 134. (b) 135. (a) 136. (b)
25. (a) 26. (c) 27. (a) 28. (c) 137. (c) 138. (d) 139. (b) 140. (c)
29. (b) 30. (d) 31. (a) 32. (a) 141. (a) 142. (d) 143. (a) 144. (b)
33. (b) 34. (c) 35. (d) 36. (b) 145. (d) 146. (d) 147. (c) 148. (a)
37. (c) 38. (a) 39. (b) 40. (d) 149. (b) 150. (c) 151. (d) 152. (b)
41. (a) 42. (d) 43. (b) 44. (c) 153. (c) 154. (c) 155. (b) 156. (c)
45. (b) 46. (d) 47. (a) 48. (c) 157. (a) 158. (d) 159. (b) 160. (b)
49. (b) 50. (d) 51. (a) 52. (d) 161. (a) 162. (b) 163. (d) 164. (a)
53. (c) 54. (b) 55. (a) 56. (c) 165. (d) 166. (a) 167. (b) 168. (c)
57. (d) 58. (b) 59. (a) 60. (c) 169. (d) 170. (a) 171. (a) 172. (b)
61. (d) 62. (a) 63. (d) 64. (b) 173. (c) 174. (d) 175. (d) 176. (a)
65. (c) 66. (a) 67. (b) 68. (c) 177. (b) 178. (c) 179. (d) 180. (d)
69. (d) 70. (a) 71. (a) 72. (a) 181. (a) 182. (b) 183. (c) 184. (d)
73. (b) 74. (c) 75. (d) 76. (a) 185. (c) 186. (c) 187. (a) 188. (d)
189. (b) 190. (c) 191. (b) 192. (c)
77. (b) 78. (c) 79. (a) 80. (d)
193. (a) 194. (b) 195. (c) 196. (d)
81. (c) 82. (a) 83. (b) 84. (d)
197. (d) 198. (a) 199. (a) 200. (c)
85. (a) 86. (b) 87. (c) 88. (a)
201. (b) 202. (a) 203. (a) 204. (c)
89. (b) 90. (c) 91. (d) 92. (a)
205. (d) 206. (c)
Q. Bank [COPA Semester - 1] 39
56. In MS Word, italic font style may be ac- (a) Alt+H+U (b) Alt+H+N
cessed using the shortcut . (c) Alt+H+M (d) Alt+H+PG
(a) Alt+H+FN
65. In MS Word, bullets may be accessed
(b) Ctrl+B/ Alt+H+1 using the shortcut .
(c) Ctrl+I/ Alt+H+2 (a) Alt+H+U (b) Alt+H+N
(d) Ctrl+U/ Alt+H+3 (c) Alt+H+M (d) Alt+H+PG
57. In MS Word, underline font style may be 66. In MS Word, numbering may be ac-
accessed using the shortcut . cessed using the shortcut .
(a) Alt+H+FN (a) Alt+H+U (b) Alt+H+N
(b) Ctrl+B/ Alt+H+1 (c) Alt+H+M (d) Alt+H+PG
(c) Ctrl+I/ Alt+H+2
67. In MS Word, multi-level list may be ac-
(d) Ctrl+U/ Alt+H+3
cessed using the shortcut .
58. In MS Word, subscript font style may be (a) Alt+H+U (b) Alt+H+N
accessed using the shortcut . (c) Alt+H+M (d) Alt+H+PG
(a) Alt+H+4
(b) Ctrl+Plus/ Alt+H+5 68. In MS Word, left alignment of para-
graph may be accessed using the short-
(c) Ctrl+Shift+Plus/ Alt+H+6
cut .
(d) Alt+H+FF (a) Ctrl+L/ Alt+H+AL
59. In MS Word, superscript font style (b) Ctrl+J/ Alt+H+AJ
may be accessed using the shortcut (c) Ctrl+E/ Alt+H+AC
. (d) Ctrl+R/ Alt+H+AR
(a) Alt+H+4
(b) Ctrl+Plus/ Alt+H+5 69. In MS Word, right alignment of para-
graph may be accessed using the short-
(c) Ctrl+Shift+Plus/ Alt+H+6
cut .
(d) Alt+H+FF (a) Ctrl+L/ Alt+H+AL
60. In MS Word, font name may be accessed (b) Ctrl+J/ Alt+H+AJ
using the shortcut . (c) Ctrl+E/ Alt+H+AC
(a) Alt+H+4 (d) Ctrl+R/ Alt+H+AR
(b) Ctrl+Plus/ Alt+H+5
70. In MS Word, centre alignment of para-
(c) Ctrl+Shift+Plus/ Alt+H+6
graph may be accessed using the short-
(d) Alt+H+FF
cut .
61. In MS Word, strike through font style (a) Ctrl+L/ Alt+H+AL
may be accessed using the shortcut (b) Ctrl+J/ Alt+H+AJ
. (c) Ctrl+E/ Alt+H+AC
(a) Alt+H+4 (d) Ctrl+R/ Alt+H+AR
(b) Ctrl+Plus/ Alt+H+5
(c) Ctrl+Shift+Plus/ Alt+H+6 71. In MS Word, justified alignment of para-
graph may be accessed using the short-
(d) Alt+H+FF
cut .
62. In MS Word, font size may be accessed (a) Ctrl+L/ Alt+H+AL
using the shortcut . (b) Ctrl+J/ Alt+H+AJ
(a) Alt+H+FC (c) Ctrl+E/ Alt+H+AC
(b) Ctrl+Plus/ Alt+H+5 (d) Ctrl+R/ Alt+H+AR
(c) Ctrl+Shift+Plus/ Alt+H+6
72. In MS Word, line spacing of paragraph
(d) Alt+H+FS
may be accessed using the shortcut
63. In MS Word, fill color may be accessed .
using the shortcut . (a) Alt+H+K (b) Alt+H+B
(a) Alt+H+FC (c) Alt+H+H (d) Alt+H+AO
(b) Ctrl+Plus/ Alt+H+5
73. In MS Word, borders may be accessed
(c) Ctrl+Shift+Plus/ Alt+H+6 using the shortcut .
(d) Alt+H+FS (a) Alt+H+K (b) Alt+H+B
64. In MS Word, paragraph formating (c) Alt+H+H (d) Alt+H+AO
may be accessed using the shortcut 74. In MS Word, fill colour may be accessed
. using the shortcut .
Q. Bank [COPA Semester - 1] 43
95. In MS Word, shapes like line, rectangle, 108. In MS Word, drop cap may be inserted
circle, text box, etc. may be inserted using the shortcut .
using the shortcut . (a) Alt+N+Q (b) Alt+N+X
(a) Alt+N+P (b) Alt+N+F (c) Alt+N+I (d) Alt+N+RC
(c) Alt+N+SH (d) Alt+N+C 109. In MS Word, signature may be inserted
96. In MS Word, chart may be inserted using using the shortcut .
the shortcut . (a) Alt+N+G (b) Alt+N+D
(a) Alt+N+P (b) Alt+N+F (c) Alt+N+J (d) Alt+N+RC
(c) Alt+N+SH (d) Alt+N+C
110. In MS Word, date & time may be in-
97. In MS Word, smart art may be inserted serted using the shortcut .
using the shortcut . (a) Alt+N+G (b) Alt+N+D
(a) Alt+N+P (b) Alt+N+M (c) Alt+N+J (d) Alt+N+RC
(c) Alt+N+SC (d) Alt+N+C
111. In MS Word, object may be inserted us-
98. In MS Word, screen shot may be in- ing the shortcut .
serted using the shortcut . (a) Alt+N+G (b) Alt+N+D
(a) Alt+N+P (b) Alt+N+M (c) Alt+N+J (d) Alt+N+RC
(c) Alt+N+SC (d) Alt+N+C
112. In MS Word, equations may be inserted
99. In MS Word, hyper link may be inserted using the shortcut .
using the shortcut . (a) Alt+N+U/ Alt+N+U+M
(a) Alt+N+I (b) Alt+N+K (b) Alt+N+D
(c) Alt+N+RF (d) Alt+N+H (c) Alt+N+J
100. In MS Word, bookmark may be inserted (d) Alt+N+E/ Alt+N+E+I
using the shortcut . 113. In MS Word, symbols and special char-
(a) Alt+N+I (b) Alt+N+K
acters may be inserted using the short-
(c) Alt+N+RF (d) Alt+N+H
cut .
101. In MS Word, cross references may be in- (a) Alt+N+U/ Alt+N+U+M
serted using the shortcut . (b) Alt+N+D
(a) Alt+N+I (b) Alt+N+K (c) Alt+N+J
(c) Alt+N+RF (d) Alt+N+H (d) Alt+N+E/ Alt+N+E+I
102. In MS Word, header may be inserted us-
ing the shortcut . Page Layout menu in MS Word
(a) Alt+N+NU (b) Alt+N+X
(c) Alt+N+O (d) Alt+N+H 114. In MS Word, document theme may be
103. In MS Word, footer may be inserted us- accessed using the shortcut .
ing the shortcut . (a) Alt+P+TH (b) Alt+P+TC
(a) Alt+N+NU (b) Alt+N+X (c) Alt+P+TF (d) Alt+P+TE
(c) Alt+N+O (d) Alt+N+H 115. In MS Word, document colors may be
104. In MS Word, page number may be in- accessed using the shortcut .
serted using the shortcut . (a) Alt+P+TH (b) Alt+P+TC
(a) Alt+N+NU (b) Alt+N+X (c) Alt+P+TF (d) Alt+P+TE
(c) Alt+N+O (d) Alt+N+H 116. In MS Word, document fonts may be
105. In MS Word, text box may be inserted accessed using the shortcut .
using the shortcut . (a) Alt+P+TH (b) Alt+P+TC
(a) Alt+N+NU (b) Alt+N+X (c) Alt+P+TF (d) Alt+P+TE
(c) Alt+N+O (d) Alt+N+H 117. In MS Word, document effects may be
106. In MS Word, word art may be inserted accessed using the shortcut .
using the shortcut . (a) Alt+P+TH (b) Alt+P+TC
(a) Alt+N+Q (b) Alt+N+X (c) Alt+P+TF (d) Alt+P+TE
(c) Alt+N+I (d) Alt+N+RC 118. In MS Word, page setup may be ac-
107. In MS Word, quick parts may be inserted cessed using the shortcut .
using the shortcut . (a) Alt+P+SP (b) Alt+P+M
(a) Alt+N+Q (b) Alt+N+X (c) Alt+P+O (d) Alt+P+SZ
(c) Alt+N+I (d) Alt+N+RC
Q. Bank [COPA Semester - 1] 45
196. is the shortcut to show final 207. Document view may be changed to web
markup under review menu in MS Word. layout using shortcut in
(a) Alt+R+G (b) Alt+R+TD View menu of MS Word.
(a) Alt+W+P (b) Alt+W+F
(c) Alt+R+TM (d) Alt+R+TP
(c) Alt+W+L (d) Alt+W+U
197. is the shortcut to show re-
208. Document view may be changed to out-
viewing pane under review menu in MS
line layout using shortcut in
Word.
(a) Alt+R+G (b) Alt+R+TD View menu of MS Word.
(a) Alt+W+P (b) Alt+W+F
(c) Alt+R+TM (d) Alt+R+TP
(c) Alt+W+L (d) Alt+W+U
198. is the shortcut to accept
209. Document view may be changed to draft
changes under review menu in MS Word.
(a) Alt+R+A (b) Alt+R+J layout using shortcut in
(c) Alt+R+F (d) Alt+R+H View menu of MS Word.
(a) Alt+W+P (b) Alt+W+F
199. is the shortcut to reject (c) Alt+W+E (d) Alt+W+U
changes under review menu in MS Word. 210. Ruler may be set visible or invisible using
(a) Alt+R+A (b) Alt+R+J
shortcut in MS Word.
(c) Alt+R+F (d) Alt+R+H (a) Alt+W+R (b) Alt+W+G
Q. Bank [COPA Semester - 1] 49
(a) template (b) macro (b) Home− > F ont Color (Alt + H + F C)
(c) image (d) table (c) Home− > Background (Alt + H + I)
231. After opening a new document in MS (d) Home− > F ont Size (Alt + H + F S)
Word, one should to create 238. In MS Word, tables, figures and equa-
a comfortable experience. tions may be assigned numbers using
(a) set paper size menu.
(b) set font size (a) P age Layout− > P age Setup (Alt + P +
(c) set paragraph spacing, line spacing SP )
(d) all of them (b) Home− > F ont Color (Alt + H + F C)
232. Page setup in MS Word may be accessed (c) Home− > Background (Alt + H + I)
using menu. (d) Ref erences− > Insert Caption (Alt + S +
(a) P ageLayout− > P ageSetup(Alt + P + SP ) P)
(b) Home− > P aragraph(Alt + H + P G) or 239. In MS Word, book title, chapter title,
P ageLayout− > P aragraph(Alt + P + P G) heading1, heading2, normal text, etc.
(c) Home− > F ontF ace(Alt + H + F F ) may be inserted using menu.
(d) Home− > F ontSize(Alt + H + F S) (a) Home− > Styles (Alt + H + L)
233. Paragraph settings in MS Word may be (b) Home− > F ont Color (Alt + H + F C)
accessed using menu. (c) Home− > Background (Alt + H + I)
(a) P age Layout− > P age Setup (Alt + P + (d) Ref erences− > Insert Caption (Alt + S +
SP ) P)
(b) Home− > P aragraph (Alt + H + P G) or 240. In MS Word, citation to references may
P age Layout− > P aragraph(Alt+P +P G) be inserted using menu.
(c) Home− > F ont F ace (Alt + H + F F ) (a) Ref erences− > Insert Citation(Alt + S +
(d) Home− > F ont Size (Alt + H + F S) C)
234. Font face may be changed in MS Word (b) Ref erences− > M ark Entry (Alt+S +N )
using menu. (c) Home− > Background (Alt + H + I)
(a) P age Layout− > P age Setup (Alt + P + (d) Ref erences− > Insert Caption (Alt + S +
SP ) P)
(b) Home− > P aragraph (Alt + H + P G) or 241. In MS Word, words to be indexed at
P age Layout− > P aragraph (Alt + P + the end of book may be marked using
P G) menu.
(c) Home− > F ont F ace (Alt + H + F F ) (a) Ref erences− > Insert Citation (Alt + S +
(d) Home− > F ont Size (Alt + H + F S) C)
(b) Ref erences− > M ark Entry (Alt+S +N )
235. Font size may be changed in MS Word
(c) Home− > Background (Alt + H + I)
using menu.
(a) P age Layout− > P age Setup (Alt + P + (d) Ref erences− > InsertCaption (Alt + S +
SP ) P)
(b) Home− > P aragraph (Alt + H + P G) or 242. In MS Word, table, picture, shapes, flow
P age Layout− > P aragraph (Alt + P + charts, headers, footers, page numbers,
P G) word art, drop cap, equations or symbols
(c) Home− > F ont F ace (Alt + H + F F ) may be inserted using menu.
(d) Home− > F ont Size (Alt + H + F S) (a) Ref erences− > Insert Citation (Alt + S +
236. In MS Word, font colour may be C)
changed using menu. (b) Ref erences− > M ark Entry(Alt + S + N )
(a) P age Layout− > P age Setup (Alt + P + (c) Home− > Background (Alt + H + I)
SP ) (d) Insert
(b) Home− > F ont Color (Alt + H + F C) 243. In MS Word, menu helps to
(c) Home− > F ont F ace (Alt + H + I) save the document in a new name.
(d) Home− > F ont Size (Alt + H + F S) (a) Home− > Save As (Alt + F + A)
(b) Ref erences− > M ark Entry (Alt+S +N )
237. In MS Word, background colour may be
changed using menu. (c) Home− > Background (Alt + H + I)
(a) P age Layout− > P age Setup (Alt + P + (d) Insert
SP )
Q. Bank [COPA Semester - 1] 51
1.4.6 Inserting objects in MS Word (a) Insert− > Clip Art (Alt + N + F )
(b) Insert− > W ord Art (Alt + N + W )
244. are the most important (c) Insert− > Drop Cap (Alt + N + RC)
objects used in MS Word documents. (d) Insert− > Equation (Alt + N + E)
(a) tables & pictures
(b) shapes, flow charts & clip arts 252. In MS Word, special symbols may be
(c) equations, lists, bullets & numbering inserted using menu.
(a) Insert− > Clip Art (Alt + N + F )
(d) all of them
(b) Insert− > Symbols (Alt + N + U )
245. In MS Word, table can be inserted using (c) Insert− > Drop Cap (Alt + N + RC)
menu. (d) Insert− > Equation (Alt + N + E)
(a) Insert− > T able (Alt + N + T )
(b) Insert− > P icture (Alt + N + P ) 253. In MS Word, objects from other
(c) Ref erences− > Insert Caption (Alt + S + applications may be inserted using
N) menu.
(a) Insert− > T ext f rom F ile (Alt + N + J +
(d) Insert− > Equation (Alt + N + E)
F)
246. In MS Word, picture can be inserted us- (b) Insert− > Symbols (Alt + N + U )
ing menu. (c) Insert− > Objects− > Objects (Alt + N +
(a) Insert− > T able (Alt + N + T )
J + J)
(b) Insert− > P icture (Alt + N + P ) (d) Insert− > Equation (Alt + N + E)
(c) Ref erences− > Insert Caption (Alt + S +
N) 254. In MS Word, text from other ap-
(d) Insert− > Equation (Alt + N + E) plications may be inserted using
menu.
247. In MS Word, caption for table, image or (a) Insert− > T ext f rom F ile (Alt + N + J +
equation number can be inserted using F)
menu. (b) Insert− > Symbols (Alt + N + U )
(a) Insert− > T able (Alt + N + T ) (c) Insert− > Objects− > Objects (Alt + N +
(b) Insert− > P icture (Alt + N + P ) J + J)
(c) Ref erences− > Insert Caption (Alt + S + (d) Insert− > Equation (Alt + N + E)
N)
(d) Insert− > Equation (Alt + N + E)
1.4.7 Inserting Macros in MS Word
248. In MS Word, equation can be inserted
using menu. 255. MS Word has the ability to automate
(a) Insert− > T able (Alt + N + T )
repeated tasks using .
(b) Insert− > P icture (Alt + N + P ) (a) tables (b) pictures
(c) Ref erences− > Insert Caption (Alt + S + (c) equations (d) macros
N)
(d) Insert− > Equation (Alt + N + E) 256. In MS Word, a Macro may be assigned
to invoke its functionality.
249. In MS Word, clip art can be inserted (a) keyboard shortcut
using menu. (b) a button
(a) Insert− > Clip Art (Alt + N + F )
(c) either keyboard shortcut or button
(b) Insert− > P icture (Alt + N + P )
(d) neither keyboard shortcut nor button
(c) Ref erences− > Insert Caption (Alt + S +
N) 257. To make the M acros tab visible, one
(d) Insert− > Equation (Alt + N + E) needs to open the options dialog using
.
250. In MS Word, special artistic design text (a) F ile− > Options (Alt + F + T )
may be inserted using (b) Review− > Options
menu. (c) Insert− > Options
(a) Insert− > Clip Art (Alt + N + F )
(d) Home− > Options
(b) Insert− > W ord Art (Alt + N + RC)
(c) Ref erences− > Insert Caption (Alt + S + 258. In MS Word, one may display the
N) Developer tab in the menu bar
(d) Insert− > Equation (Alt + N + E) through the options dialog by choosing
251. In MS Word, drop cap may be inserted .
(a) CustomizeRibbon− > T oolT abs− >
using menu. Design
(b) CustomizeRibbon− > M ainT abs− > 266. In MS Word, coding in Visual Basic for
Developer Applications (VBA) may be carried out
(c) CustomizeRibbon− > M ainT abs− > to customize the available features or
Outlining add new features using .
(d) CustomizeRibbon− > M ainT abs− > (a) M acros− > M acros (Alt + L + P M )
Insert (b) M acros− > Record M acro (Alt + L + R)
259. In MS Word, Macro security settings (c) M acros− > V isual Basic (Alt + L + V )
may be accessed through . (d) M acros− >
(a) M acros− > M acro Security (Alt+L+AS)
M acros Resume Recorder (Alt + L + S)
(b) M acros− > Record M acro (Alt + L + R)
While creating a macro, its availability
(c) M acros− > P ause Recording (Alt+L+S) 267.
may be .
(d) M acros− > M acros (Alt + L + P M )
(a) granted to all documents
260. In MS Word, New macro may be (b) restricted to the current document
recorded through . (c) both a & b
(a) M acros− > M acro Security (Alt+L+AS)
(d) neither a nor b
(b) M acros− > Record M acro (Alt + L + R)
(c) M acros− > P ause Recording (Alt+L+S)
(d) M acros− > M acros (Alt + L + P M ) 1.4.8 Creating mail merge in MS
261. In MS Word, the default macro security Word
setting is .
(a) Enable all macros 268. The feature in MS Word which helps
(b) Disable all macros to create customized correspondence
(c) Trust VBA Code targeting different recipients is called
(d) Do not trust VBA code .
(a) mail merge (b) charting
262. In MS Word, it is better change macro (c) clip art (d) equations
security setting to before
starting record or use macros. 269. A mail merge document requires a
(a) Enable all macros to fill the blank spaces.
(b) Disable all macros (a) picture
(c) Trust VBA Code (b) record source
(d) Do not trust VBA code (c) chart
(d) equation
263. In MS Word, recording of macros may
be paused and certain actions which 270. To create mail merge using existing list
need not be recorded in the macro may of recipients, choose .
(a) Mailings− >Select Recepients− >Use Exist-
be performed through .
(a) M acros− > M acro Security (Alt+L+AS) ing List
(b) Mailings− >Select Recepients− >Type New
(b) M acros− > Record M acro (Alt + L + R)
List
(c) M acros− > P ause Recording (Alt+L+S) (c) Mailings− >Select Recepients− >Select
(d) M acros− > from Outlook Contacts
M acros Resume Recorder (Alt + L + S) (d) Mailings− >Insert Merge Field
264. In MS Word, paused macro recording 271. To create mail merge using new list,
may be resumed through . choose .
(a) M acros− > M acro Security (Alt+L+AS) (a) Mailings− >Select Recepients− >Use Exist-
(b) M acros− > Record M acro (Alt + L + R) ing List
(c) M acros− > P ause Recording (Alt+L+S) (b) Mailings− >Select Recepients− >Type New
(d) M acros− > List
(c) Mailings− >Select Recepients− >Select
M acros Resume Recorder (Alt + L + S)
from Outlook Contacts
265. In MS Word, recorded macros may be (d) Mailings− >Insert Merge Field
edited or deleted through .
(a) M acros− > M acros (Alt + L + P M ) 272. To create mail merge using Outlook
(b) M acros− > Record M acro (Alt + L + R) contacts list, choose .
(a) Mailings− >Select Recepients− >Use Exist-
(c) M acros− > P ause Recording (Alt+L+S) ing List
(d) M acros− >
M acros Resume Recorder (Alt + L + S)
Q. Bank [COPA Semester - 1] 53
117. (d) 118. (a) 119. (b) 120. (c) 209. (c) 210. (a) 211. (b) 212. (c)
121. (d) 122. (a) 123. (b) 124. (c) 213. (d) 214. (a) 215. (b) 216. (c)
125. (d) 126. (a) 127. (b) 128. (c) 217. (d) 218. (a) 219. (b) 220. (c)
129. (d) 130. (a) 131. (a) 132. (b) 221. (d) 222. (a) 223. (b) 224. (d)
133. (c) 134. (d) 135. (a) 136. (b) 225. (c) 226. (b) 227. (c) 228. (c)
137. (c) 138. (d) 139. (b) 140. (a) 229. (d) 230. (a) 231. (d) 232. (a)
141. (c) 142. (d) 143. (a) 144. (b) 233. (b) 234. (c) 235. (d) 236. (b)
145. (c) 146. (d) 147. (a) 148. (b) 237. (c) 238. (d) 239. (d) 240. (a)
149. (d) 150. (c) 151. (a) 152. (b) 241. (b) 242. (d) 243. (a) 244. (d)
153. (c) 154. (d) 155. (a) 156. (b) 245. (a) 246. (b) 247. (c) 248. (d)
157. (c) 158. (d) 159. (a) 160. (b) 249. (a) 250. (b) 251. (c) 252. (b)
161. (c) 162. (a) 163. (b) 164. (c) 253. (c) 254. (a) 255. (d) 256. (c)
165. (d) 166. (b) 167. (a) 168. (c) 257. (a) 258. (b) 259. (a) 260. (b)
169. (d) 170. (a) 171. (b) 172. (c) 261. (b) 262. (a) 263. (c) 264. (d)
173. (d) 174. (a) 175. (d) 176. (c) 265. (a) 266. (b) 267. (c) 268. (a)
177. (b) 178. (c) 179. (c) 180. (d) 269. (b) 270. (a) 271. (b) 272. (c)
181. (a) 182. (b) 183. (a) 184. (c) 273. (d) 274. (d) 275. (b) 276. (a)
185. (a) 186. (d) 187. (b) 188. (d) 277. (c) 278. (d) 279. (a) 280. (c)
189. (b) 190. (a) 191. (b) 192. (d) 281. (b) 282. (b) 283. (c) 284. (b)
193. (c) 194. (a) 195. (c) 196. (b) 285. (a) 286. (c) 287. (d) 288. (a)
197. (d) 198. (a) 199. (b) 200. (d) 289. (b) 290. (a) 291. (d) 292. (a)
201. (c) 202. (a) 203. (b) 204. (c) 293. (b) 294. (a) 295. (c) 296. (d)
205. (a) 206. (b) 207. (c) 208. (d)
(c) American Standard Code for Information In- (c) PROPER (d) LEN
terchange 175. In MS Excel, function re-
(d) American Standard Character for Information turns a string after replacing given char-
Interchange acters of first string using the last string.
164. In MS Excel, function for- (a) SEARCH (b) REPLACE
mats a number as currency and prefixes (c) REPT (d) LOWER
the currency symbol of the locale.
(a) CHAR (b) CODE 176. In MS Excel, function re-
peats a string for given number of times.
(c) DOLLAR (d) CONCATENATE
(a) SEARCH (b) REPLACE
165. In MS Excel, function ap- (c) REPT (d) LOWER
pends several strings one after the other.
(a) CHAR (b) CODE 177. In MS Excel, function re-
(c) DOLLAR (d) CONCATENATE turns the location of the first string oc-
curring inside the second string.
166. In MS Excel, function com- (a) SEARCH (b) REPLACE
pares two text values. (c) REPT (d) LOWER
(a) FORMAT (b) LEFT
(c) EXACT (d) FIND 178. In MS Excel, function re-
turns a string only when the given input
167. In MS Excel, function re-
is a string, returning blank value other-
turns the location of the first string oc-
wise.
curring within the second, larger string. (a) TEXT (b) SUBSTITUTE
(a) FORMAT (b) LEFT (c) TRIM (d) T
(c) EXACT (d) FIND
179. In MS Excel, function re-
168. In MS Excel, function for- turns formatted version of given num-
mats given number based on rules pro- ber.
vided using # and 0 characters. (a) T (b) TEXT
(a) FORMAT (b) LEFT (c) SUBSTITUTE (d) TRIM
(c) EXACT (d) FIND
180. In MS Excel, function sub-
169. In MS Excel, function re- stitutes new text in place of given old
turns the leftmost character of a string. text.
(a) FORMAT (b) LEFT (a) T (b) TEXT
(c) EXACT (d) RIGHT (c) SUBSTITTE (d) TRIM
170. In MS Excel, function re- 181. In MS Excel, function re-
turns the rightmost character of a string. moves space at the beginning or end of
(a) FORMAT (b) LEFT a string.
(c) EXACT (d) RIGHT (a) T (b) TEXT
171. In MS Excel, function re- (c) SUBSTITTE (d) TRIM
turns the length of given string. 182. In MS Excel, function con-
(a) LOWER (b) UPPER verts given text to number.
(c) PROPER (d) LEN (a) T (b) VALUE
172. In MS Excel, function re- (c) SUBSTITTE (d) TRIM
turns the lower case version of given
string. 1.5.4 Sorting in MS Excel
(a) LOWER (b) UPPER
(c) PROPER (d) LEN 183. Data can be sorted using menu
173. In MS Excel, function re- in MS Excel.
turns the upper case version of given (a) Data− >Filter
string. (b) Data− >Sort
(a) LOWER (b) UPPER (c) Data− >What if analysis− >Data table
(c) PROPER (d) LEN (d) Data− >What if analysis− >Pivot table
174. In MS Excel, function re- 184. To sort data in MS Excel,
turns the first letter capitalized version containing data for sorting should be se-
of given string. lected.
(a) LOWER (b) UPPER (a) all the cells
Q. Bank [COPA Semester - 1] 65
205. (d) 206. (a) 207. (b) 208. (c) 213. (c) 214. (a) 215. (c) 216. (d)
209. (c) 210. (a) 211. (b) 212. (c) 217. (b) 218. (c) 219. (a)
Q. Bank [COPA Semester - 1] 69
(b) people forget the last 3 items (a) a backup plan for alternate delivery (like
(c) people remember the best 3 items through paper handouts)
(d) people remember the worst 3 items (b) a style to say sorry
48. After preparing a presentation, it should (c) a practice to weep in front of the audience over
to make it effective. the failure
(a) be kept in a pen drive or CD till delivery (d) guts to say good bye without making the pre-
(b) never be opened till delivery sentation
(c) be opened just for delivery 53. Before making a presentation, the pre-
(d) be rehearsed many times senter should .
(a) arrive at the room early
49. To make an effective presentation, one (b) verify the presentation loaded on the projector
should the text typed in the (c) choose the best place to stand during the pre-
slides. sentation
(a) simply keep reading (d) all of them
(b) add spice to the text through stories and fables
(c) keep reading (whether the audience listens or
not) Answers (1158 - 1210)
(d) none of them
50. One should record the presentation in 1. (d) 2. (a) 3. (b) 4. (c)
and watch it again to find the 5. (d) 6. (c) 7. (d) 8. (d)
mistakes done during delivery. 9. (d) 10. (c) 11. (d) 12. (c)
(a) paper (b) video 13. (c) 14. (a) 15. (b) 16. (c)
(c) text (d) transcript 17. (d) 18. (a) 19. (a) 20. (a)
21. (b) 22. (d) 23. (c) 24. (b)
51. To make an effective presentation, one
25. (c) 26. (d) 27. (a) 28. (a)
should .
(a) forget what is on the current slide 29. (b) 30. (c) 31. (d) 32. (a)
(b) forget what is on the next slide 33. (a) 34. (b) 35. (c) 36. (a)
(c) remember offer a lead to the next slide 37. (b) 38. (c) 39. (a) 40. (b)
(d) never care for the order of slides 41. (a) 42. (b) 43. (d) 44. (b)
52. One should have to cater 45. (b) 46. (d) 47. (c) 48. (d)
to the unexpected situations of projector 49. (b) 50. (b) 51. (c) 52. (a)
failure, power failure, computer failure, 53. (d)
disk error, etc.
Q. Bank [COPA Semester - 1] 73
38. PSP file extension stands for (a) selecting portions of images
. (b) deleting images
(a) Paint Shop Pro (c) creating images
(b) Paint Shop Photo (d) drawing on images
(c) Paint Shop Picture
46. In GIMP, color in one part of image may
(d) Paint Shop Print
be picked for painting another part using
39. XCF file extension stands for tool.
. (a) color picker (b) zoom
(a) eXtreme Computing Facility (c) measure (d) move
(b) eXtended Computing Facility
47. In GIMP, image size may be enlarged or
(c) eXperimental Computing Facility
reduced using tool.
(d) eXperimental Counting Facility
(a) color picker (b) zoom
40. SVG in image format stands for (c) measure (d) move
.
(a) Scanned Vector Graphics 48. In GIMP, distances and angles can be
(b) Scalable Vector Graphics measured using tool.
(c) Scalable Vector Grayscale (a) color picker (b) zoom
(d) Scalable Vintage Graphics (c) measure (d) move
49. In GIMP, selected portions can be
moved using tool.
1.7.4 Editing of images (a) color picker (b) zoom
(c) measure (d) move
41. The process of enhancing image qual-
ity by rotation, extraction, colour trans- 50. In GIMP, selected portions can be
formation, partial relocation, morphing moved using tool.
and conversion from/ to colour image (a) color picker (b) zoom
to grayscale, etc. are categorized as (c) measure (d) move
. 51. Edges of images can be removed using
(a) image capture tool in GIMP.
(b) image viewing (a) crop tool
(c) image editing (b) alignment tool
(d) none of them (c) rotate tool
42. Adobe Photoshop, Corel Paint Shop (d) scale tool
Pro, GIMP, etc. belong to the category 52. Layers may be aligned using
of software. tool in GIMP.
(a) image capture (a) crop tool
(b) image viewing (b) alignment tool
(c) image editing (c) rotate tool
(d) none of them (d) scale tool
43. is a free and open source 53. Selected portions or layers may be ro-
software for image editing. tated using tool in GIMP.
(a) Adobe Photoshop (a) crop tool
(b) Corel Paint Shop Pro (b) alignment tool
(c) GIMP (c) rotate tool
(d) none of them (d) scale tool
44. GIMP toolbox can be opened using 54. Selected portions or layers may be scaled
. using tool in GIMP.
(a) Windows− >Toolbox menu (a) crop tool
(b) Ctrl+B shortcut (b) alignment tool
(c) both a & b (c) rotate tool
(d) none of them (d) scale tool
45. GIMP toolbox contains rectangle, el- 55. Selected region or layer may be distorted
lipse, freehand, fuzzy tool, colour select, using tool in GIMP.
scissor selection tool, foreground select (a) shear
and path tools for . (b) perspective
29. Codd’s Rule 10 is otherwise called (b) Object Oriented Programming Languages like
rule and it specifies that C++, Java, Smalltalk, Delphi, etc.
data integrity conditions should be de- (c) pen drive
fined in the database management sys- (d) wired connection
tem and not in the application program. 37. OODB with support for SQL (like rela-
(a) logical data independence tional database) is called .
(b) integrity independence (a) hybrid object relational database
(c) distribution independence (b) programming
(d) non-subversion (c) pure relational database
30. Codd’s Rule 11 is otherwise called (d) NOSQL database
rule and it specifies that 38. Objects of OODB may be accessed us-
the end user should feel that the data is ing .
stored at one place, although the stor- (a) NOSQL
age may be distributed on several com- (b) SQL
puters. (c) Object Query Language (OQL)
(a) logical data independence (d) none of them
(b) integrity independence
39. Object schema in OODB use data types
(c) distribution independence to object oriented program-
(d) non-subversion ming languages.
31. Codd’s Rule 12 is otherwise called (a) unrelated
rule and it specifies that (b) unconnected
data access should be provided only (c) similar
through the relational model, without (d) not connected
exposing the low level storage APIs to 40. ODMG stands for , which is
the end user. the consortium in charge of the stan-
(a) logical data independence
dardizing the development of Object
(b) integrity independence
Oriented Data Base.
(c) distribution independence (a) Object Data Management General
(d) non-subversion (b) Object Data Management Group
32. API stands for . (c) Object Digital Management Group
(a) Applied Programming Interface (d) Object Data Maintenace Group
(b) Application Programming Interface 41. OMG in object oriented database stands
(c) Application Programming Integration for .
(d) Application Provider Interface (a) Object Maintenance Group
(b) Oh My God
OODB (c) Object Management Group
(d) Object Management Gimmick
33. Object oriented databases are based on 42. XQuery is language.
the concept of , similar to (a) XML based Query
object oriented programming. (b) Structured Query
(a) SQL (b) table
(c) programming
(c) objects (d) column
(d) object oriented programming
34. Relational databases are
oriented. 43. Object Oriented Data Base is suitable
(a) method (b) table for cases in which relational tables are
(c) objects (d) program to design and manipulate.
(a) too complex (b) too easy
35. OODB stands for .
(c) too simple (d) too plain
(a) Object Oriented Digital Base
(b) Offset Oriented Data Base 44. ORM in database management stands
(c) Object Oriented Data Binary for .
(a) Object Reverse Mapping
(d) Object Oriented Data Base
(b) Offset Relational Mapping
36. OODB is more accessible from (c) Object Relational Mapping
(a) SQL . (d) Object Restricted Mapping
(c) update contact set mobile=’322312112’ where (a) 2332323423 (b) 34234242234
name=’Desiga’; (c) 33423423242 (d) 2342342323
(d) select * from contact;
99. The following query inserts
92. Which of the following queries inserts a in the name column.
new record in a table named contact? insert into contact (name, mobile) val-
(a) create table contact (name varchar(30), mo-
ues (’Nathiya’, ’2332323423’);
bile varchar(20), primary key(name));
(a) values (b) contact
(b) insert into contact val-
(c) name (d) Nathiya
ues(’Desiga’,’329842893’);
(c) update contact set mobile=’322312112’ where 100. The following query updates the mobile
name=’Desiga’; column to new value if the name is
(d) select * from contact; .
93. The following query creates column update contact set mo-
named name, with a data type bile=’453453445343’ where
. name=’Girija’;
create table contact (name var- (a) name (b) Girija
char(30), mobile varchar(20), primary (c) mobile (d) contact
key(name)); 101. The following query updates the mobile
(a) varchar (b) int to where the name is
(c) double (d) blob Girija.
94. The following query creates column update contact set mo-
named name, having varchar type bile=’453453445343’ where
with maximum length of name=’Girija’;
characters. (a) 453453445343 (b) 435353453453
create table contact (name var- (c) 56454646544 (d) 23424234233
char(30), mobile varchar(20), primary 102. The following query deletes a row if the
key(name)); name is .
(a) 10 (b) 20 delete from contact where
(c) 30 (d) 40 name=’Gayathri’;
95. The following query creates column (a) contact (b) name
named mobile, having varchar type (c) Gayathri (d) delete
with maximum length of 103. The following query a table
characters. named contact.
create table contact (name var- drop table contact;
char(30), mobile varchar(20), primary (a) deletes
key(name)); (b) creates
(a) 10 (b) 20 (c) updates
(c) 30 (d) 40 (d) adds new column to
96. The following query designates 104. The following query selects data in
as primary key. order.
create table contact (name var- select * from contact order by name
char(30), mobile varchar(20), primary DESC;
key(name)); (a) ascending (b) descending
(a) name (b) mobile (c) unordered (d) none of them
(c) contact (d) primary key
97. Adding keyword to an inte- 1.8.7 Designing Access Reports and
ger field permits automatic increment to Forms
the record number.
(a) primary key
105. Microsoft Access provides visual envi-
(b) key
ronment for design of .
(c) auto increment
(d) automatic
98. The following query inserts
in the mobile column.
insert into contact (name, mobile) val-
Preparedues
by:(’Nathiya’,
Dr.V.Nagaradjane
’2332323423’);
84 Prepared by: Dr.V.Nagaradjane
56. The node which connects one large net- 1.9.7 Wireless networks
work (a WAN, MAN, etc.) to another
large network is called . 63. Wireless networks communicate using
(a) hub (b) switch signal instead of cables.
(c) gateway (d) MODEM (a) infrared
(b) low frequency radio wave
(c) Wireless Fidelity (WiFi - IEEE 802.11 stan-
1.9.6 Network Cables dard)
(d) all of them
57. The cable containing 4 pairs of twisted
wires without any shielding foil for data 64. In the modern days, is the
transmission is called . best choice for wireless networking.
(c) network (d) transport (b) Reverse Address Resolution Protocol (RARP)
84. The fifth layer of the OSI model is (c) Open System Interconnection (OSI)
layer and it controls connec- (d) none of them
tion between 2 hosts (like client and 93. is the version of Internet
server) during data communication. Protocol now being phased out.
(a) session (b) presentation (a) IP version 1 (IPV1)
(c) application (d) transport (b) IP version 2 (IPV2)
85. The sixth layer of the OSI model is (c) IP version 4 (IPV4)
layer and it takes care of en- (d) IP version 6 (IPV6)
cryption, decryption, compression, de- 94. is the version of Internet
compression and data encoding. Protocol now being introduced to han-
(a) session (b) presentation dle increased size of the Internet.
(c) application (d) transport (a) IP version 1 (IPV1)
86. The seventh layer of the OSI model is (b) IP version 2 (IPV2)
layer and it deals with file (c) IP version 4 (IPV4)
sharing, video sharing, audio sharing, (d) IP version 6 (IPV6)
browsing, etc. using specific programs. 95. IPV4 addresses have a by nu-
(a) session (b) presentation meric address.
(c) application (d) transport (a) 4 (b) 6
(c) 8 (d) 16
1.9.10 Various Network protocols 96. The addresses 216.58.213.36
(www.google.com), 209.191.88.254
87. TCP stands for . (www.yahoo.com) belong to IP version
(a) Transmission Control Protocol .
(b) Transmission Control Procedure (a) 1 (b) 2
(c) Transit Control Protocol (c) 3 (d) 4
(d) Transmission Convergence Protocol
88. UDP stands for . TCP/IP
(a) Unified Datagram Protocol
97. In a client server network, the ports
(b) User Datagram Protocol
in the range of 0 to 1023 are called
(c) User Datagram Procedure
ports.
(d) User Digital Protocol (a) relational ports
89. IP stands for . (b) general ports
(a) Information Protocol (c) well known ports
(b) Internet Procedure (d) user ports
(c) Identity Protocol
98. Network protocols are standardized
(d) Internet Protocol through .
90. DNS stands for . (a) Request For Comment (RFC)
(a) Domain Name Synchronized (b) email
(b) Data Name System (c) web server
(c) Domain Name System (d) telnet
(d) Domain Network System 99. RFC in networking stands for
91. allows for mapping IP ad- .
dress to an ethernet or hardware ad- (a) Rejection For Comment
dress. (b) Request For Comment
(a) Address Resolution Protocol (ARP) (c) Request For Contest
(b) Reverse Address Resolution Protocol (RARP) (d) Request Freight Comment
(c) Open System Interconnection (OSI) 100. W3C in networking stands for
(d) none of them .
92. allows for mapping an eth- (a) World Wide Winter Consortium
ernet or hardware address to an IP ad- (b) World Wide Web Contest
dress. Resolution Protocol (ARP) (c) World White Web Consortium
(a) Address
(d) World Wide Web Consortium (c) Structured Query Language (SQL)
101. TCP/IP port number 7 is assigned for (d) Network News Transfer Protocol (NNTP)
protocol. 110. TCP/IP port number 109 is assigned for
(a) daytime .
(b) echo (a) Hyper Text Transfer Protocol (HTTP)
(c) quote of the day (b) Post Office Protocol (POP)
(d) message send (c) Structured Query Language (SQL)
(d) Network News Transfer Protocol (NNTP)
102. TCP/IP port number 13 is assigned for
protocol. 111. TCP/IP port number 118/ 156 is as-
(a) daytime signed for .
(b) echo (a) Hyper Text Transfer Protocol (HTTP)
(c) quote of the day (b) Post Office Protocol (POP)
(d) message send (c) Structured Query Language (SQL)
(d) Network News Transfer Protocol (NNTP)
103. TCP/IP port number 17 is assigned for
protocol. 112. TCP/IP port number 119/ 443 is as-
(a) daytime signed for .
(b) echo (a) Hyper Text Transfer Protocol (HTTP)
(c) quote of the day (b) Post Office Protocol (POP)
(d) message send (c) Structured Query Language (SQL)
(d) Network News Transfer Protocol (NNTP)
104. TCP/IP port number 18 is assigned for
protocol. 113. TCP/IP port number 143/ 220 is as-
(a) daytime signed for .
(b) echo (a) Internet Message Access Protocol (IMAP)
(c) quote of the day (b) Simple Network Management Protocol
(d) message send (SNMP)
(c) Internet Relay Chat (IRC)
105. TCP/IP port number 20 is assigned for
(d) Precision Time Protocol (PTP)
.
(a) Telnet 114. TCP/IP port number 161 is assigned for
(b) Simple Mail Transfer Protocol (SMTP) .
(c) File Transfer Protocol Protocol (FTP) (a) Internet Message Access Protocol (IMAP)
(d) Trivial File Transfer Protocol (TFTP) (b) Simple Network Management Protocol
(SNMP)
106. TCP/IP port number 23 is assigned for (c) Internet Relay Chat (IRC)
.
(a) Telnet (d) Precision Time Protocol (PTP)
(b) Simple Mail Transfer Protocol (SMTP) 115. TCP/IP port number 194 is assigned for
(c) File Transfer Protocol Protocol (FTP) .
(d) Trivial File Transfer Protocol (TFTP) (a) Internet Message Access Protocol (IMAP)
(b) Simple Network Management Protocol
107. TCP/IP port number 25 is assigned for (SNMP)
. (c) Internet Relay Chat (IRC)
(a) Telnet
(b) Simple Mail Transfer Protocol (SMTP) (d) Precision Time Protocol (PTP)
(c) File Transfer Protocol Protocol (FTP) 116. TCP/IP port number 319 is assigned for
(d) Trivial File Transfer Protocol (TFTP) .
(a) Internet Message Access Protocol (IMAP)
108. TCP/IP port number 69 is assigned for (b) Simple Network Management Protocol
. (SNMP)
(a) Telnet
(c) Internet Relay Chat (IRC)
(b) Simple Mail Transfer Protocol (SMTP)
(d) Precision Time Protocol (PTP)
(c) File Transfer Protocol Protocol (FTP)
(d) Trivial File Transfer Protocol (TFTP) 117. TCP/IP port number 319 is assigned for
.
109. TCP/IP port number 80 is assigned for (a) Internet Message Access Protocol (IMAP)
. (b) Simple Network Management Protocol
(a) Hyper Text Transfer Protocol (HTTP)
(SNMP)
(b) Post Office Protocol (POP)
(c) Internet Relay Chat (IRC)
Q. Bank [COPA Semester - 1] 93
1.9.11 Logical and Physical Ad- (c) 192 - 223 (d) none of them
dresses 145. First byte of class C network is in the
range of .
136. The address of the physical networking (a) 1 - 126 (b) 128 - 191
component (like ethernet, WiFi, etc.) is (c) 192 - 223 (d) none of them
called address. 146. Each class A network supports
(a) virtual (b) logical
(c) physical (d) imaginary hosts.
(a) 1,67,77,214 (b) 65,534
137. The address assigned to a host on get- (c) 254 (d) none of them
ting connected to a network (like the In- 147. Each class B network supports
ternet) is called address. hosts.
(a) virtual (b) logical (a) 1,67,77,214 (b) 65,534
(c) physical (d) imaginary (c) 254 (d) none of them
138. In networking, MAC stands for 148. Each class C network supports
. hosts.
(a) Media Address Control (a) 1,67,77,214 (b) 65,534
(b) Machine Access Control (c) 254 (d) none of them
(c) Media Access Contact
149. IPV4 has got bits for address-
(d) Media Access Control ing of hosts.
139. Logical address of a host connected to (a) 128 (b) 64
a network is otherwise called (c) 32 (d) 16
address. 150. IPV6 has got bits for address-
(a) IP address
ing of hosts.
(b) IP version 4 address (a) 128 (b) 64
(c) IP version 6 address (c) 32 (d) 16
(d) all of them
151. IPV4 has got bytes for ad-
dressing of hosts.
1.9.12 Classes of Networks (a) 16 (b) 8
(c) 4 (d) 2
140. The addresses of class A network has
152. IPV6 has got bytes for ad-
subnet mask of .
(a) 255.0.0.0 dressing of hosts.
(b) 255.255.0.0 (a) 16 (b) 8
(c) 255.255.255.0 (c) 4 (d) 2
(d) none of them 153. The address 2001:db8:a0b:12f0::1 is for-
141. The addresses of class B network has matted in .
(a) IPV0 (b) IPV2
subnet mask of . (c) IPV4 (d) IPV6
(a) 255.0.0.0
(b) 255.255.0.0
(c) 255.255.255.0 1.9.13 Network Security & Firewall
(d) none of them
142. The addresses of class C network has 154. Connection to the Internet requires en-
subnet mask of . forcement of security.
(a) 255.0.0.0 (a) low (b) high
(b) 255.255.0.0 (c) zero (d) no
(c) 255.255.255.0 155. Filtering connections and disallowing
(d) none of them prohibited connections is carried out us-
143. First byte of class A network is in the ing .
range of . (a) MODEM (b) router
(a) 1 - 126 (b) 128 - 191 (c) firewall (d) bridge
(c) 192 - 223 (d) none of them 156. First general firewalls operated at layer
144. First byte of class B network is in the of the OSI model.
range of . (a) 3 (b) 4
(a) 1 - 126 (b) 128 - 191 (c) 5 (d) 7
Q. Bank [COPA Semester - 1] 95
157. Second general firewalls operated at (b) Transmission Control Protocol (TCP)
layer of the OSI model. (c) User Datagram Protocol (UDP)
(a) 3 (b) 4 (d) File Transfer Protocol (FTP)
(c) 5 (d) 7
158. Third general firewalls operated at layer 1.9.15 Internet
of the OSI model.
(a) 3 (b) 4 166. The global network of networks is called
(c) 5 (d) 7 .
159. First generation firewalls were otherwise (a) Local Area Network
called . (b) Internet
(a) packet filters (c) Intranet
(b) stateful filters (d) Metropolitan Area Network
(c) application filters 167. The global network established for a par-
(d) none of them ticular business (not for public access) is
160. Second generation firewalls were other- called .
wise called . (a) Local Area Network
(a) packet filters (b) Internet
(b) stateful filters (c) Intranet
(c) application filters (d) Metropolitan Area Network
(d) none of them
161. Third generation firewalls were other- 1.9.16 Introduction to the Internet
wise called .
(a) packet filters 168. Internet may be used for .
(b) stateful filters (a) sharing information through World Wide Web
(c) application filters (b) sending and receiving emails
(d) none of them (c) sharing of large files
162. IPS in firewall stands for . (d) all of them
(a) Intrusion Protection System 169. Internet may be used for .
(b) Intrusion Prevention Software (a) cloud storage of data in remote computers
(c) Internet Prevention System (b) secure operation of bank accounts through
(d) Intrusion Prevention System netbanking and mobile banking
163. The identity management system binds (c) secure operation of wallet payments
logical addresses to for reputed (d) all of them
servers. 170. Internet helps scientists to .
(a) MAC address
(a) share their research results with other scien-
(b) specific programs
tists
(c) other computers (b) learn what happens in the state of the arch
(d) none of them research
(c) download articles published by other re-
164. Third generation of firewall offers
to prevent web fingerprint at- searchers
(d) all of them
tacks.
(a) web application firewall 171. Internet helps in .
(b) packet filter (a) conducting online examinations
(c) stateful filter (b) conducting online classes
(d) none of them (c) conducting online interaction sessions to clear
the doubts of students
(d) all of them
1.9.14 DHCP Server 172. Internet helps to .
(a) update correct time using Network Time Pro-
165. The protocol used to automatically as-
tocol (NTP)
sign IP address to a newly connected
(b) e-commerce
host in a network is called .
(a) Dynamic Host Configuration Procol (DHCP) (c) job search
(d) all of them
(a) red X to denote unsafe connection 197. Before clicking the link provided in the
(b) Green tick to denote safe connection result list of search engines, one should
(c) both a and b .
(d) none of them (a) believe that the URL is correct
(b) naively click all links
(c) ensure that the URL is authentic
1.9.19 Internet servers (d) click the links without consideration and pay
the sums demanded therein
191. The computers which run software pack- 198. If the user wants a complete phrase to be
ages for web pages (HTTP), email included in verbatim search, the phrase
(SMTP), file transfer (FTP), network should be .
time protocol (NTP), etc are called (a) deleted
. (b) enclosed in double quotes
(a) Internet servers (c) enclosed in brackets
(b) clients (d) enclosed in curly braces
(c) browsers
(d) media players 199. Clicking on links from untrusted search
engines might take an innocent user to
192. Apache web server & Internet Informa- .
tion Server are examples of (a) video sharing websites
servers. (b) audio streaming web sites
(a) web (c) social media websites
(b) email (d) hackers web site which extracts login ID and
(c) file transfer password
(d) none of them
200. Search terms entered in a search engine
.
1.9.20 Search engines (a) can be traced back to the original source
(b) cannot be traced back to the source
193. An Internet service which helps on- (c) can never be traced back to the source
line searching of information is called (d) may not be traced to the source
.
(a) steam engine
(b) search engine 1.9.21 Domain naming Systems
(c) email server
201. All computers on a network are uniquely
(d) video stream identified by .
194. Google, Bing, Yahoo, Rediff, Ask, AOL (a) IP address
etc. are some of the well known (b) mobile number
. (c) landline number
(a) spread sheet programs (d) none of them
(b) search engines
(c) image editors 202. Since IP address is difficult to remem-
ber, easy to remember names are as-
(d) video players
signed to .
195. To get a particular type of files in the re- (a) server hosts
sult list, one should use (b) clients
option at the end of the search string. (c) mobile phones
(a) mailto (b) address (d) none of them
(c) filetype (d) option
203. server offers name for given IP
196. To get only PDF files in the result list, address or IP address for given server
may be used. name.
(a) filetype:pdf (a) Domain Name Service (DNS) server
(b) filetype:mp3 (b) web server
(c) filetype:3gp (c) email server
(d) filetype:docx (d) FTP server
249. Interacting with strangers on social me- 257. Cloud storage can be accessed from any
dia might . host having a .
(a) result in great future (a) RS232 port
Q. Bank [COPA Semester - 1] 101
(a) WiFi evesdropping 17. (a) 18. (b) 19. (b) 20. (a)
(b) spam 21. (b) 22. (c) 23. (a) 24. (b)
(c) spyware 25. (c) 26. (c) 27. (c) 28. (d)
(d) trojen 29. (a) 30. (b) 31. (c) 32. (d)
33. (a) 34. (c) 35. (a) 36. (b)
Internet security products 37. (c) 38. (d) 39. (b) 40. (c)
41. (d) 42. (a) 43. (c) 44. (b)
275. Anti-virus software packages help to 45. (a) 46. (d) 47. (c) 48. (a)
. 49. (b) 50. (a) 51. (a) 52. (b)
(a) protect files 53. (b) 54. (d) 55. (d) 56. (c)
(b) protect login data 57. (a) 58. (b) 59. (c) 60. (d)
(c) protect against online phishing, spoofing, 61. (b) 62. (a) 63. (d) 64. (a)
pharming, etc. 65. (a) 66. (b) 67. (c) 68. (d)
(d) all of them
69. (a) 70. (b) 71. (a) 72. (c)
276. Internet security products mainly con- 73. (c) 74. (d) 75. (a) 76. (d)
centrate on . 77. (c) 78. (d) 79. (a) 80. (a)
(a) firewall
(b) anti-spam 81. (b) 82. (c) 83. (d) 84. (a)
(c) parental control 85. (b) 86. (c) 87. (a) 88. (b)
(d) all of them 89. (d) 90. (c) 91. (a) 92. (b)
93. (c) 94. (d) 95. (a) 96. (d)
277. Popular internet security products are 97. (c) 98. (a) 99. (b) 100. (d)
.
(a) McAffee livescan/ Internet security 101. (b) 102. (a) 103. (c) 104. (d)
(b) Kaspersky Internet Security 105. (c) 106. (a) 107. (b) 108. (d)
(c) Trend Micro Internet security/ Bit defender In- 109. (a) 110. (b) 111. (c) 112. (d)
ternet security 113. (a) 114. (b) 115. (c) 116. (c)
(d) all of them 117. (c) 118. (a) 119. (b) 120. (c)
278. A total security software protects a com- 121. (d) 122. (a) 123. (c) 124. (d)
puter against attacks. 125. (a) 126. (b) 127. (c) 128. (d)
(a) offline attacks 129. (a) 130. (a) 131. (b) 132. (d)
(b) online attacks 133. (c) 134. (d) 135. (b) 136. (c)
(c) both a & b 137. (b) 138. (d) 139. (d) 140. (a)
(d) neither a nor b 141. (b) 142. (c) 143. (a) 144. (b)
279. Examples of total security software 145. (c) 146. (a) 147. (b) 148. (c)
packages are . 149. (c) 150. (a) 151. (c) 152. (a)
(a) Norton total security 153. (d) 154. (b) 155. (c) 156. (a)
(b) Kaspersky Total Security 157. (b) 158. (d) 159. (a) 160. (b)
(c) both a & b 161. (c) 162. (d) 163. (a) 164. (a)
(d) none of them 165. (a) 166. (b) 167. (c) 168. (d)
280. In addition to offering firewall, anti- 169. (d) 170. (d) 171. (d) 172. (d)
spam control and parental control, total 173. (a) 174. (b) 175. (c) 176. (d)
security software offers . 177. (a) 178. (b) 179. (c) 180. (d)
(a) backup and restoration options for data 181. (b) 182. (c) 183. (a) 184. (a)
(b) tuning up the computer for better performance 185. (a) 186. (b) 187. (c) 188. (d)
(c) both a & b 189. (b) 190. (a) 191. (a) 192. (a)
(d) none of them 193. (b) 194. (b) 195. (c) 196. (a)
197. (c) 198. (b) 199. (d) 200. (a)
201. (a) 202. (a) 203. (a) 204. (a)
Answers (1402 - 1681) 205. (d) 206. (a) 207. (b) 208. (a)
209. (c) 210. (b) 211. (b) 212. (c)
1. (d) 2. (a) 3. (c) 4. (a) 213. (a) 214. (d) 215. (d) 216. (a)
5. (b) 6. (c) 7. (d) 8. (a) 217. (a) 218. (c) 219. (d) 220. (a)
9. (c) 10. (c) 11. (d) 12. (b) 221. (c) 222. (a) 223. (b) 224. (c)
13. (c) 14. (c) 15. (a) 16. (c) 225. (d) 226. (a) 227. (b) 228. (a)
Q. Bank [COPA Semester - 1] 103
229. (a) 230. (a) 231. (b) 232. (c) 257. (b) 258. (d) 259. (c) 260. (c)
233. (d) 234. (b) 235. (c) 236. (a) 261. (a) 262. (b) 263. (b) 264. (c)
237. (d) 238. (d) 239. (a) 240. (d) 265. (d) 266. (a) 267. (b) 268. (c)
241. (b) 242. (a) 243. (d) 244. (b) 269. (d) 270. (a) 271. (b) 272. (c)
245. (d) 246. (a) 247. (c) 248. (b) 273. (d) 274. (a) 275. (d) 276. (d)
249. (d) 250. (c) 251. (b) 252. (a) 277. (d) 278. (c) 279. (c) 280. (c)
253. (b) 254. (d) 255. (c) 256. (a)
(c) < T IT LE > ... < /T IT LE > (d) < ahref = “target.htm” > ... < /a >
(d) < BODY > ... < /BODY > 44. HTML tag displays a ta-
37. The main portion of a HTML document ble without border.
is contained between tags. (a) < img src = “f ile.jpg” >
(a) < HT M L > ... < /HT M L > (b) < tableborder = 1 > ... < /table >
(b) < HEAD > ... < /HEAD > (c) < tableborder = 0 > ... < /table >
(c) < T IT LE > ... < /T IT LE > (d) < ahref = “target.htm” > ... < /a >
(d) < BODY > ... < /BODY > 45. HTML tag creates a
38. Paragraph is contained inside click-able hyper link for navigation in-
HTML tags. side the same page or between different
(a) < p > ... < /p > pages.
(b) < center > ... < /center > or < div align = (a) < img src = “f ile.jpg” >
“center” > ... < /div > (b) < tableborder = 1 > ... < /table >
(c) < div align = “lef t” > ... < /div > (c) < tableborder = 0 > ... < /table >
(d) < div align = “right” > ... < /div > (d) < ahref = “target.htm” > ... < /a >
39. Elements to be centre aligned in browser 46. HTML tag displays a ta-
display are enclosed inside ble with border thickness of 1 pixel.
HTML tags. (a) < img src = “f ile.jpg” >
(a) < p > ... < /p > (b) < table border = 1 > ... < /table >
(b) < center > ... < /center > or < div align = (c) < table border = 0 > ... < /table >
“center” > ... < /div > (d) < a href = “target.htm” > ... < /a >
(c) < div align = “lef t” > ... < /div > 47. HTML tag can control font
(d) < div align = “right” > ... < /div > face, size and colour.
40. Elements to be left aligned in browser (a) < f ont f ace = “Arial” size = “ +
display are enclosed inside 1” color = “red” > ... < /f ont >
HTML tags. (b) < H1 > ... < /H1 >
(a) < div align = “justif ied” > ... < /div > (c) < H2 > ... < /H2 >
(b) < center > ... < /center > or < div align = (d) < H3 > ... < /H3 >
“center” > ... < /div > 48. HTML tag displays headings
(c) < div align = “lef t” > ... < /div > of the largest size.
(d) < div align = “right” > ... < /div > (a) < f ont f ace = “Arial” size = “+1”color =
41. Elements to be right aligned in browser “red” > ... < /f ont >
display are enclosed inside (b) < H1 > ... < /H1 >
HTML tags. (c) < H2 > ... < /H2 >
(a) < div align = “justif ied” > ... < /div > (d) < H3 > ... < /H3 >
(b) < center > ... < /center > or < div align = 49. HTML tag displays headings
“center” > ... < /div > of the second largest size.
(c) < div align = “lef t” > ... < /div > (a) < H4 > ... < /H4 >
(d) < div align = “right” > ... < /div > (b) < H1 > ... < /H1 >
42. Elements to be justified (aligned flush (c) < H2 > ... < /H2 >
with left and right edges) in browser dis- (d) < H3 > ... < /H3 >
play are enclosed inside tags in 50. HTML tag displays headings
HTML. of the third largest size.
(a) < div align = “justif ied” > ... < /div > (a) < H4 > ... < /H4 >
(b) < center > ... < /center > or < div align = (b) < H1 > ... < /H1 >
“center” > ... < /div > (c) < H2 > ... < /H2 >
(c) < div align = “lef t” > ... < /div > (d) < H3 > ... < /H3 >
(d) < div align = “right” > ... < /div >
51. HTML tag displays headings
43. HTML tag displays an of the smallest size.
image in HTML page. (a) < H4 > ... < /H4 >
(a) < img src = “f ile.jpg” > (b) < H1 > ... < /H1 >
(b) < tableborder = 1 > ... < /table > (c) < H2 > ... < /H2 >
(c) < tableborder = 0 > ... < /table > (d) < H3 > ... < /H3 >
Q. Bank [COPA Semester - 1] 107
52. In HTML, text size represents (d) < span style = “f ont − weight : 900” >
the normal size of text. ... < /span >
(a) -4 (b) 0 among the given HTML5
59.
(c) +4 (d) +8 tags sets font weight to normal.
53. In HTML5, font tag has been (a) < span style = “f ont − weight : bold” >
. ... < /span >
(a) appreciated (b) reinstated (b) < span style = “f ont−weight : normal” >
(c) deprecated (d) beautified ... < /span >
54. In HTML5, font name can be controlled (c) < span style = “f ont − weight : 1200” >
using tag sets. ... < /span >
(a) < span style = “f ont − weight : bold” > (d) < span style = “f ont − weight : 900” >
... < /span > ... < /span >
(b) < span style = “f ont − size : 16px” > ... <
/span > Colour coding in HTML
(c) < span style = “color : red” > ... <
/span > 60. Colour can be specified using colour
(d) < span style = “f ont − f amily : name (like red, gray, blue, cyan, ma-
verdhana” > ... < /span > genta, etc.) or numeric value in
55. In HTML5, font colour can be controlled colour order.
using tag sets. (a) Red-Green-Blue
(a) < span style = “f ont − weight : bold” > (b) Blue-Green-Red
... < /span > (c) Green-Red-Blue
(b) < span style = “f ont − size : 16px” > ... < (d) Blue-Green-Blue
/span >
61. Colour code of #FF0000 stands for
(c) < span style = “color : red” > ... <
colour.
/span > (a) blue (b) green
(d) < span style = “f ont − f amily : (c) red (d) black
verdhana” > ... < /span >
62. Colour code of #00FF00 stands for
56. In HTML5, font size can be controlled colour.
using tag sets. (a) blue (b) green
(a) < span style = “f ont − weight : bold” > (c) red (d) black
... < /span >
(b) < span style = “f ont − size : 16px” > ... < 63. Colour code of #0000FF stands for
/span > colour.
(a) blue (b) green
(c) < span style = “color : red” > ... <
(c) red (d) black
/span >
(d) < span style = “f ont − f amily : 64. Colour code of #000000 stands for
verdhana” > ... < /span > colour.
(a) blue (b) green
57. among the given HTML5
(c) red (d) black
tags sets font size to 16px.
(a) < span style = “f ont − weight : bold” > 65. Colour code of #FFFFFF stands for
... < /span > colour.
(a) white (b) green
(b) < span style = “f ont − size : 16px” > ... <
(c) red (d) black
/span >
(c) < span style = “color : red” > ... < 66. In HTML, the two digit color code value
/span > ranges from 00 to in hexadec-
(d) < span style = “f ont − f amily : imal.
verdhana” > ... < /span > (a) AA (b) 11
58. among the given HTML5 (c) FF (d) CC
tags sets font weight to bold. 67. tag is used to display different
(a) < span style = “f ont − weight : bold” > HTML pages in a single window (not
... < /span > recommended for mobile viewing).
(b) < span style = “f ont−weight : normal” > (a) font (b) frameset
... < /span > (c) table (d) img
(c) < span style = “f ont − weight : 1200” >
... < /span >
68. Width of elements like image, table, (a) < marquee direction = “lef t” > ... <
etc. can be controlled using at- /marquee >
tribute. (b) < marquee direction = “right” > ... <
(a) width (b) height /marquee >
(c) length (d) breadth (c) < marquee direction = “up” > ... <
69. Height of elements like image, table, /marquee >
etc. can be controlled using at- (d) < marquee direction = “down” > ... <
tribute. /marquee >
(a) width (b) height 77. Text scrolling downwards may be cre-
(c) length (d) breadth ated using tag in HTML.
70. Width and height value can be specified (a) < marquee direction = “lef t” > ... <
in or in pixels. /marquee >
(a) metre (b) kilometre (b) < marquee direction = “right” > ... <
(c) percentage (d) inches /marquee >
71. HTML tag creates a break. (c) < marquee direction = “up” > ... <
(a) < center > ... < /center > /marquee >
(b) < table > ... < /table > (d) < marquee direction = “down” > ... <
(c) < img width = “80%” src = “globe.jpg” > /marquee >
(d) < br/ >
Hyperlink in HTML
72. HTML tag displays an image
named globle.jpg at 80% of the total 78. tag in HTML creates a click-
width available in the browser. able hyperlink.
(a) < center > ... < /center >
(a) < p > ... < /p >
(b) < table > ... < /table >
(b) < img src = “globe.png” >
(c) < img width = “80%” src = “globe.jpg” >
(c) < table border = 1 > ... < /table >
(d) < br/ >
(d) < a href = “page.html” > ... < /a >
73. Scrolling text may be created using
tag in HTML.
(a) < marquee > ... < /marquee > Table in HTML
(b) < span > ... < /span >
79. HTML tag displays a table
(c) < p > ... < /p >
without border.
(d) < f ont > ... < /f ont > (a) < tr > ... < /tr >
74. Text scrolling to left may be created us- (b) < th > ... < /th >
ing tag in HTML. (c) < table border = 1 > ... < /table >
(a) < marquee direction = “lef t” > ... < (d) < table border = 0 > ... < /table >
/marquee > HTML tag displays a table
80.
(b) < marquee direction = “right” > ... <
with border thickness of 1 pixel.
/marquee > (a) < tr > ... < /tr >
(c) < marquee direction = “up” > ... < (b) < th > ... < /th >
/marquee > (c) < table border = 1 > ... < /table >
(d) < marquee direction = “down” > ... <
(d) < table border = 0 > ... < /table >
/marquee >
75. Text scrolling to right may be created 81. HTML tag is used to mark
using tag in HTML. header column for a table.
(a) < tr > ... < /tr >
(a) < marquee direction = “lef t” > ... <
(b) < th > ... < /th >
/marquee >
(b) < marquee direction = “right” > ... < (c) < table border = 1 > ... < /table >
/marquee > (d) < table border = 0 > ... < /table >
(c) < marquee direction = “up” > ... < 82. HTML tag is used to mark a
/marquee > row for a table.
(d) < marquee direction = “down” > ... < (a) < tr > ... < /tr >
/marquee > (b) < th > ... < /th >
76. Text scrolling upwards may be created (c) < table border = 1 > ... < /table >
using tag in HTML. (d) < table border = 0 > ... < /table >
Q. Bank [COPA Semester - 1] 109
83. HTML tag is used to mark a 91. Input tag in HTML supports
column inside a row. attribute.
(a) < td > ... < /td > (a) type (b) value
(b) < th > ... < /th > (c) name/ID (d) all of them
(c) < table border = 1 > ... < /table > 92. among the following tags dis-
(d) < table border = 0 > ... < /table > plays a text field named address.
84. Among the following options, (a) < input type = “text” name =
HTML tag merges 3 columns to create “address” value = “” autocomplete =
a large column. “on” >
(a) < tr > ... < /tr > (b) < input type = “number” name =
(b) < td > ... < /td > “height” value = “”autocomplete =
(c) < td colspan = 3 > ... < /td > “on” >
(c) < input type = “email” name =
(d) < td rowspan = 4 > ... < /td >
“email” value = “” autocomplete =
85. Among the following options, “on” >
HTML tag merges 4 rows to create a (d) < input type = “tel” name =
large row. “phone” value = “” autocomplete =
(a) < tr > ... < /tr > “on” >
(b) < td > ... < /td > 93. among the following tags dis-
(c) < td colspan = 3 > ... < /td > plays a text field named phone.
(d) < td rowspan = 4 > ... < /td > (a) < input type = “text” name =
86. creates an ordered list. “address” value = “” autocomplete =
(a) < ul > ... < /ul > “on” >
(b) < input type = “number” name =
(b) < ol > ... < /ol > “height” value = “”autocomplete =
(c) < li > ... < /li > “on” >
(d) none of them (c) < input type = “email” name =
87. creates an unordered list. “email” value = “” autocomplete =
(a) < ul > ... < /ul > “on” >
(b) < ol > ... < /ol > (d) < input type = “tel” name =
(c) < li > ... < /li > “phone” value = “” autocomplete =
(d) none of them “on” >
94. among the following tags dis-
88. declares a list item which plays a text field named height.
may be part of ordered list or unordered (a) < input type = “text” name =
list. “address” value = “” autocomplete =
(a) < ul > ... < /ul >
“on” >
(b) < ol > ... < /ol > (b) < input type = “number” name =
(c) < li > ... < /li > “height” value = “”autocomplete =
(d) none of them “on” >
(c) < input type = “email” name =
“email” value = “” autocomplete =
1.10.5 Creating Forms with controls
“on” >
using HTML (d) < input type = “tel” name =
“phone” value = “” autocomplete =
89. HTML form controls commonly use “on” >
tag for taking form input. 95. among the following tags dis-
(a) < input > plays a text field named email.
(b) < table > ... < /table > (a) < input type = “text” name =
(c) < img > “address” value = “” autocomplete =
(d) < f orm > ... < /f orm > “on” >
90. HTML form is contained insde (b) < input type = “number” name =
tag. “height” value = “”autocomplete =
(a) < input > “on” >
(c) < input type = “email” name =
(b) < f orm > ... < /f orm >
“email” value = “” autocomplete =
(c) < img >
(d) < f orm > ... < /f orm > “on” >
(d) < input type = “tel” name = 106. To create number input field in HTML
“phone” value = “” autocomplete = form, attribute is used in the
“on” > input tag.
96. To display a button in HTML form, (a) month (b) number
attribute is used in the input (c) password (d) radio
tag. 107. To create password input field in HTML
(a) button (b) checkbox form, attribute is used in the
(c) color (d) date input tag.
97. To display a checkbox in HTML form, (a) month (b) number
attribute is used in the input (c) password (d) radio
tag. 108. To create radio button input field in
(a) button (b) checkbox HTML form, attribute is used
(c) color (d) date in the input tag.
98. To display a colour selection input in (a) month (b) number
HTML form, attribute is used (c) password (d) radio
in the input tag. 109. To create an input field to display num-
(a) button (b) checkbox
bers with specific start, end and step val-
(c) color (d) date
ues in HTML form, attribute
99. To display a date input in HTML form, is used in the input tag.
attribute is used in the input (a) range (b) reset
tag. (c) search (d) tel
(a) button (b) checkbox
110. To create an input field to reset all in-
(c) color (d) date
put elements of a form in HTML form,
100. To display a date and time input in attribute is used in the input
HTML form, attribute is used tag.
in the input tag. (a) range (b) reset
(a) button (b) checkbox (c) search (d) tel
(c) color (d) datetime
111. To create search field (behviour depends
101. To display a field for email input in upon server implementation) in HTML
HTML form, attribute is used form, attribute is used in the
in the input tag. input tag.
(a) email (b) file (a) range (b) reset
(c) hidden (d) image (c) search (d) tel
102. To display a file input input dialog in 112. To create field for telephone number in-
HTML form, attribute is used put in HTML form, attribute
in the input tag. is used in the input tag.
(a) email (b) file (a) range (b) reset
(c) hidden (d) image (c) search (d) tel
103. To create a hidden field in HTML form, 113. To create a field for submitting the
attribute is used in the input contents of HTML form to the server,
tag. attribute is used in the input
(a) email (b) file
tag.
(c) hidden (d) image (a) submit (b) text
104. To create an image selection tool in (c) time (d) url
HTML form, attribute is used
114. To create a text input field in HTML,
in the input tag.
(a) email (b) file attribute is used in the input
(c) hidden (d) image tag.
(a) submit (b) text
105. To create month selection field in HTML (c) time (d) url
form, attribute is used in the
115. To create a time input in HTML,
input tag.
(a) month (b) number attribute is used in the input
(c) password (d) radio tag.
Q. Bank [COPA Semester - 1] 111
97. (b) 98. (c) 99. (d) 100. (d) 129. (b) 130. (a) 131. (c) 132. (a)
101. (a) 102. (b) 103. (c) 104. (d) 133. (a) 134. (c) 135. (d) 136. (a)
105. (a) 106. (b) 107. (c) 108. (d) 137. (a) 138. (b) 139. (c) 140. (d)
109. (a) 110. (b) 111. (c) 112. (d) 141. (d) 142. (c) 143. (a) 144. (d)
113. (a) 114. (a) 115. (c) 116. (d) 145. (b) 146. (c) 147. (c) 148. (b)
117. (a) 118. (d) 119. (b) 120. (a) 149. (d) 150. (c) 151. (b) 152. (c)
121. (d) 122. (a) 123. (c) 124. (d) 153. (a) 154. (d)
125. (b) 126. (c) 127. (d) 128. (a)