Professional Documents
Culture Documents
3. Which of the following protocol is used to access web pages on World Wide Web?
10. Which of the following function is used to get the current date?
12. Ctrl+Alt+Del is
a) Aninvalid key combination b) Recognized by windows only c) used to close the active window d) both
b& c
14. The maximum number of primary portion’s that can be created on disk is
c) Perform maintenance on the hard disk d) Navigate files and folders on the computer
16. A virus program is usually hidden in
18. Types of software that can be freely distributed without violating copyright laws are called
19. Information is a
24. A secret word or numbers to be typed in on a keyboard before any activity can take place are called
25. What is the most common computer crime of these listed below
a) Extortion of bank funds b) IRS database sabotage c) Putting people on junk mailing lists d)
software privacy
33. The printer which can print one complete line at a time is:
a) Dot matrix printer b) daisy wheel printer c) laser printer d) line printer
a) Network adapter cards b) LAN cables c) LAN application software d) All of these
39. FDDI is a
40.Terminal is a
a) Device to give power supply to computer b) point at which data enters or leaves the computer
network
a) 1 b) 2 c) 3 d) Multiple
43. Cabling on a linear bus topology can be extended using which of the following?
44. Project 802 defines standard for which layers of the OSI model?
48. Microwave transmission, coaxial cables, and fiber optics are example of
51. Communication between a computer and a key board involves -------- transmission.
52. The ---------------- is the physical path over which a message travels.
58. Modern computer can perform calculations or process at ___________ high speed
60. Computer based weather forecasting depends on accurate collection of data form
62. Which component is responsible for comparing the contents of two pieces of data?
64. The address of instruction under the processor execution is contained within:
a) Control computer operations b) perform arithmetic functions such as addition and subtraction etc.
c) Perform logical comparison such equal, greater than, less than d) both b and c
66. Data and program not being used by computer are stored in:
1.A secret word or numbers to be typed in on a keyboard before any activity can take place are called
4.Types of software that can be freely distributed without violating copyright laws are called
5.Which component is responsible for comparing the contents of two pieces of data?