You are on page 1of 3

Rashtrasant Tukodoji Maharaj Nagpur University Nagpur

Online Backlog Exam. Summer-2020


CENTRAL INDIA COLLEGE OF LAW, NAGPUR
LL.B. Three Years Course Third Semester (C.B.S.) Examination
SUBJECT: - COMPUTER
Time: - One hours] [ Marks :- 40

Note : Each questions carrying two marks solve all questions


(Multiple Choice Questions)
1.Choose the correct option:-

1. The outstanding characteristic of computer that lets it perform large quantities of work
with same accuracy and speed is called as :
(a) Speed
(b) Accuracy
(c) Diligence
(d) Versatility

2. Transistor-based computers are :


(a) First generation
(b) Second generation
(c) Fifth generation
(d) Third generation

3. —————— is referred as permanent storage.


(a) RAM
(b) SRAM
(c) ROM
(d) Cache memory

4. Which one of the following is not a search engine ?


(a) Bing
(b) Google
(c) Yahoo
(d) Windows

5. What is full form of WWW ?


(a) World wide web
(b) World wide word
(c) World wide wood
(d) None of these

6. Another name for Usenet is :


(a) Gopher
(b) Newsgroup
(c) Browser
(d) CERN

7. Which of the following part of the computer that cannot be physically touched ?
(a) Hardware
(b) A device
(c) A peripheral device
(d) Application
8. Which of the following is an example of input device ?
(a) Scanner
(b) Mouse
(c) Keyboard
(d) Printer

9. —————— is a set of computer programmes used in computer to help perform


tasks.
(a) An instruction
(b) Software
(c) Memory
(d) A processor

10. Digital signature is :


(a) Scanned signature
(b) Signature in binary form
(c) Encrypting information
(d) None of the above

11. Mechanism to protect private network from outside attack is :


(a) Firewall
(b) Antivirus
(c) Digital signature
(d) Formatting

12. HTML is a :
(a) Programming language
(b) Scripting language
(c) Programmable language
(d) None

13. Errors in computer programme are referred as :


(a) Bugs
(b) Mistakes
(c) Blunchs
(d) None

14. A collection of unprocessed items is called as :


(a) Information
(b) Data
(c) Memory
(d) Reports

15. A set of instruction telling the computer what to do is called as :


(a) Mentor
(b) Instruction
(c) Compiler
(d) Program

16. A(n) boot occurs when a computer is restarted without turning off the power.
(a) direct
(b) indirect
(c) cold
(d) warm
17. These programs guard your computer against malicious programs that may invade your
computer system.
(a) File compression program
(b) backup program
(c) anti virus program
(d) troubleshooting program

18. Software that allows your computer to interact with the user, applications and
hardware is called.
(a) application software
(b) word processor
(c) system software
(d) database software

19. A concentric ring on a hard disk is referred to as a :


(a) track
(b) table
(c) segment
(d) sector

20. Numbers and formulas entered in a cell are called.


(a) numeric entries
(b) intersection
(c) Labels
(d) text

You might also like