You are on page 1of 41

DreamBigInstitution.

com
COMPUTER MCQs
1. Which of the following is the primary output device for computers?
1) Video monitor 2) Printer 3) Keyboard
4) Mouse 5) None of these

2. A directory within a directory is called


1) Mini Directory 2) Junior Directory 3) Part Directory
4) Sub-Directory 5) None of these

3. In windows XP, which shorcut is used to cycle through opened items in taskbar?
1) Ctrl + Tab 2) Alt + Tab 3) Ctrl + Esc 4) Alt + Esc 5) None of these

4. Stored data in which of the following remains intact even after the computer is turned off?
1) RAM 2) Motherboard 3) Secondary Storage Device
4) Primary Storage Device 5) None of these

5. SMTP, FTP and DNS are applications of the ________ layer.


1) Data link 2) Network 3) Transport 4) Application 4) None of these

6. Which of the following is not a common feature of software applications?


1) Menus 2) Windows 3) Help 4) Search 5) None of these

7. In MICR, C stands for


1) Code 2) Colour 3) Computer 4) Character 5) None of these

8. A _______ computer is a large and expensive computer capable of simultaneously processing data
for hundreds or thousands of users.
1) server 2) mainframe 3) desktop 4) tablet 5) None of these

9. The trend in computer systems is towards the use of graphical user interfaces (GUIs). In these
operating systems, a track ball is described as
1) a roller ball which moves the cursor.
2) a pen-shaped device which allows data to be entered through the CRT screen.
3) a figure which resembles a familiar office device.
4) an outdated input device.
5) None of these

10. The _______ folder retains copies of messages that you have started but are not yet ready to send
1) Inbox 2) Outbox 3) Drafts 4) Sent Items 5) Address Book

11. The ability of an OS to run more than one application at a time is called
1) multitasking 2) object-oriented programming 3) multiuser computing
4) time-sharing 5) None of these

12. Which of the following is an example of non-numeric data?


1) Employee address 2) Examination score 3) Bank balance
4) All the above 5) None of these

13. Coded entries which are used to gain access to a computer system are called
1) Entry codes 2) Passwords 3) Security commands
4) Codewords 5) None of these
DreamBigInstitution.com

14. To move to the bottom of a document, press


1) Insert key 2) Home key 3) Ctrl key + End key
4) End key 5) None of these

15. A device that is connected to the motherboard is _______.


1) called an external device. 2) called an adjunct device.
3) called a peripheral device. 4) connected using ribbon cable.
5) None of these

16. An error is also known as


1) bug 2) debug 3) cursor 4) icon 5) None of these

17. What type of device is a keyboard?


1) Black 2) Input 3) Output 4) Word processing 5) None of these

18. Arithmetic operations


1)involve matching one data item to another to determine if the first item is greater than, equal to or
less than the other item.
2)sort data items according to standard, predefined criteria in ascending or descending order.
3)use conditions with operators such as AND, OR and NOT.
4)include addition, subtraction, multiplication and division.
5)None of these

19. Which part of the computer helps to store information?


1) Disk drive 2) Keyboard 3) Monitor 4) Printer 5) None of these

20. Which of the following is the default mask of a class A IP address?


1) 255.0.0.255 2) 255.255.0.0 3) 255.0.0.0 4) 255.255.255.0 5) None of these

21. What is Internet ?


1) A new type of cabling system for Wide Area Networks
2) A second local area network that can connect with another online LAN to share access
3) A new standard for Internet browsers
4) An association to develop advanced Internet technology
5) None of these

22. To drop a column that is used as a foreign key, first


1) drop the primary key.
2) drop the table.
3) drop the foreign key constraint.
4) All the above
5) None of these

23. The name given to a document by user is called


1) Filename 2) Program 3) Data 4) Record 5) None of these

24. ________ is a procedure that requires users to enter an identification code and a matching password.
1) Paging 2) Logging on 3) Time sharing 4) Multitasking 5) None of these

25. Which device is used as the standard pointing device in a Graphical User Environment?
1) Keyboard 2) Mouse 3) Joystick 4) Track ball 5) None of these
DreamBigInstitution.com
26. The Assistant is
1) an application that allows you to take notes and save them in a file.
2) an animated character that provides help and suggestions.
3) a button on the standard Toolbar that executes the Print command.
4) a collection of frequently misspelled words in a dictionary file.
5) None of these

27. A CPU contains


1) a card reader and a printing device.
2) an analytical engine and a control unit.
3) a control unit and an arithmetic logic unit.
4) an arithmetic logic unit and a card reader.
5) None of these

28. The ability of an OS to run more than one application at a time is called
1) multitasking 2) object-oriented programming 3) multi user computing
4) time-sharing 5) None of these

29. Permanent instructions that the computer uses when it is turned on and that cannot be changed by
other instructions are contained in
1) ROM 2) RAM 3) ALU 4) REM 5) None of these

30. What are .bas, .doc and .htm examples of?


1) Databases 2) Extensions 3) Domains 4) Protocols 5) None of these

31. The vast network of computers that connects millions of people all over the world is called
1) LAN 2) Web 3) Hypertext 4) Internet 5) None of these

32. The property that when classes are arranged in a hierarchy, each class assumes the attributes and
methods of its ancestors is called
1) generalisation 2) inheritance 3) encapsulation
4) information hiding 5) None of these

33. The software component of an expert system that draws conclusions is the
1) user interface 2) database 3) inference engine
4) I/O controller 5) model base

34. The attributes and methods for each object are stored in
1) an object instance 2) an object connection 3) an assembly structure
4) an object repository 5) None of these

35. One advantage of dial-up Internet access is


1) it utilises broadband technology.
2) it utilises existing telephone service.
3) it uses a router for security.
4) modem speed is very fast.
5) None of these

36. What is backup?


1) Adding more components to your network
2) Protecting data by copying it from the original source to a different destination
3) Filtering old data from the new data
4) Accessing data on tape
5) None of these
DreamBigInstitution.com
37. Which of the following is true ?
1) Byte is a single digit in a binary number.
2) Bit represents a grouping of digital numbers.
3) An eight-digit binary number is called a byte.
4) An eight-digit binary number is called a bit.
5) None of these

38. A hard copy of a file created on a computer refers to data


1) saved on a floppy disk.
2) printed on a printer.
3) backed up on a tape drive.
4) sent as an e-mail.
5) None of these

39. A ______ is an organised collection of data about a single entity.


1) file 2) library 3) database 4) dictionary 5) None of these

40. Something which has easily understood instructions is said to be


1) user-friendly 2) information 3) word processing 4) icon 5) None of these

41. Hardware devices that are not part of the main computer system and are often added later to the
system are called
1) clip art 2) highlight 3) execute 4) peripherals 5) None of these

42. All of the following are examples of real security and privacy risks except
1) Hackers 2) Spam 3) Viruses 4) Identity theft 5) None of these

43. If you want to move an icon on your desktop, this is called


1) double clicking 2) highlighting 3) dragging 4) pointing 5) None of these

44. A computer checks the ________ of usernames and passwords for a match before granting access.
1) website 2) network 3) backup file 4) database 5) None of these

45. Computers that are portable and convenient for users who travel are known as
1) supercomputers 2) laptops 3) minicomputers
4) file servers 5) None of these

46. A MODEM is connected in between a telephone line and a


1) Network 2) Computer 3) Communication Adapter
4) Serial Port 5) All of these

47. Windows is ________ and Window 95, Window 98 are________.


1) Graphical User Interface, Operating System
2) Graphics Useful Interface, Executing Systems
3) Graph User Interval, Expert Systems
4) Graphical Use Interphase, Excel Systems
5) None of these

48. Which of the following is the most widely used input device?
1) Mouse 2) Keyboard 3) Modem 4) Monitor 5) None of these

49. The blinking symbol which indicates the next position of the character is called
1) Delete key 2) Control key 3) Cursor 4) Return key 5) None of these
DreamBigInstitution.com

50. A small figure which depicts some application on the screen is called
1) Menu 2) Photo 3) Modem 4) Icon 5) None of these

51. Storage and memory differ with respect to which of the following characteristics?
1) Price 2) Reliability 3) Speed 4) All of the above 5) None of these

52. What are the two examples of freeware?


1) WinZip and Linux
2) Shareware and file sharing
3) Microsoft Word and the Google toolbar
4) Instant messaging and the Google toolbar
5) Microsoft Power Point and Microsoft Excel

53. What is e-commerce?


1) Buying and selling of international goods
2) Buying and selling of products and services over the Internet
3) Buying and selling of products and services not found in stores
4) Buying and selling of products having to do with computers
5) Buying and selling of electronic goods

54. The ________ tells the computer how to use its components.
1) utility 2) network 3) operating system
4) application program 5) None of these

55. A ________ contains buttons and menus that provide quick access to commonly used commands.
1) menu bar 2) toolbar 3) window 4) action bar 5) None of these

56. Which of the following displays the contents of an active cell?


1) Toolbar 2) Menu bar 3) Namebox 4) Formula bar 5) None of these

57. What type of program controls the various computer parts and allows the user to interact with the
computer?
1) Utility software 2) Operating system 3) Word processing software
4) Database program 5) None of these

58. What is backup?


1) Adding more components to your network
2) Protecting data by copying it from the original source to a different destination
3) Filtering old data from the new data
4) Accessing data on tape
5) None of these

59. Network components are connected to the same cable in the ________ topology.
1) star 2) ring 3) bus 4) mesh 5) mixed

60. Which of the following is the largest unit of storage ?


1) GB 2) KB 3) MB 4) TB 5) All are equal

61. Which type of software manages the computer’s processes, functioning as an interface, connecting
user, the application software and the hardware ?
1) System software 2) Utility program 3) Translator program
4) Operating system 5) None of these
DreamBigInstitution.com
62. The portion of the CPU that coordinates the activities of all the other computer components is the
1) motherboard 2) coordination board 3) control unit
4) arithmetic logic unit 5) None of these

63. Something which has easily understood instructions is said to be


1) user-friendly 2) information 3) word processing
4) icon 5) None of these

64. The primary device that a computer uses to store information is


1) TV 2) storehouse 3) desk 4) hard drive 5) None of these

65. Which of the following is a program that works like a calculator for keeping track of money and
making budgets?
1) Calculator 2) Spreadsheet 3) Budgeter 4) Financier 5) None of these

66. What menu is selected to print?


1) File 2) Tools 3) Social 4) Edit 5) None of these

67. Which of the following is a program or a set of electronic instructions that tell a computer what to
do?
1) Menu 2) Monitor 3) Hardware 4) Software 5) None of these

68. ________are symbols that represent any character or combination of characters.


1) Playing cards 2) Wildcards 3) Private keys 4) Public keys 5) None of these

69. Which of the following is a word in a web page that, when clicked, opens another document?
1) Anchor 2) Hyperlink 3) Reference 4) URL 5) None of these

70. The________, also called the Web, contains billons of documents.


1) World Wide Web 2) HTTP 3) Webportal 4) domain 5) None of these

71. A(n)________is a small group of computers and peripherals linked together in a small geographic
area
1) MAN 2) PAN 3) CAN 4) LAN 5) None of these

72. .bas, .doc and . htm are the examples of


1) Database 2) Extension 3) Domain 4) Protocol 5) None of these

73. Saving is a process


1) to copy document from memory to storage medium.
2) to change the content of any document.
3) to change the display or entire document.
4) to develop document by entering text using keyboard
5) None of these

74. ________ is the process of implementing command


1) Fetching 2) Storing 3) Decoding 4) Executing 5) None of these

75. ________ is a printed information that exists in real sense and is more permanent form of output
than the output existing on the display device.
1) Soft copy 2) Carbon copy 3) Hard copy 4) Desk copy 5) None of these

76. The process of a computer receiving information from a server on the Internet is known as
1) pulling 2) pushing 3) downloading 4) transferring 5) None of these

77. You access Microsoft Word by using ________ button.


1) New 2) Start 3) Program 4) Control Panel 5) None of these

78. Any data or instruction entered into the memory of a computer is considered as
1) storage 2) output 3) input 4) information 5) None of these

79. Which of the following could you do to remove a paragraph from a report you had written?
1) Delete and edit 2) Select and delete 3) Cut and paste
4) Undo typing 5) None of these

80. All of the following storage media have Read and Write capabilities except
1) flash memory cards 2) CD-ROMs 3) hard disk drives
4) floppy disks 5) None of these

81. In Excel,_____ contains one or more worksheets.


1) Template 2) Workbook 3) Active cell 4) Label 5) None of these

82. Which of the following is a popular programming language for developing multimedia web pages,
websites, and web-based applications?
1) COBOL 2) Java 3) BASIC 4) Assembler 5) None of these

83. Compiling creates a(n)


1) program specification 2) algorithm 3) executable program
4) subroutine 5) None of these

84. Computers use the ________ number system to store data and perform calculations.
1) decimal 2) hexadecimal 3) octal 4) binary 5) None of these

85. The ________ key will launch the Start button.


1) esc 2) shift 3) Windows 4) Shortcut 5) None of these

86. A Web site address is a unique name that identifies a specific ________ on the Web
1) Web browser 2) PDA 3) Web Site 4) link 5) None of these

87. A character of information is represented by a(n)


1) byte 2) bit 3) field 4) attribute 5) None of these

88. A set of instructions telling the computer what to do is called


1) mentor 2) instructor 3) compiler 4) program 5) None of these

89. To “maximise” a window means to


1) fill it to capacity. 2) expand it to fit the desktop.
3) put it on toolbar. 4) drag it to the Recycle Bin.
5) None of these

90. The “home page” of a web site is


1) the largest page. 2) the last page. 3) the first page.
4) the most colourful page. 5) None of these

91. What is ISL used for?


1) To allow an Ethernet interface to understand frame tags
2) To make two Ethernet interfaces appear as one
3) To connect an Ethernet switch with a high-speed core switch such as ATM
4) To allow simultaneous routing and switching
5) None of these

92. Which of the following is NOT associated with Computers?


1) Bit 2) Binary 3) Pencil 4) Mouse 5) Screen

93. ‘MICR’ technology used for clearance of cheques by banks refers to


1) Magnetic Ink Character Recognition
2) Magnetic Intelligence Character Recognition
3) Magnetic Information Cable Recognition
4) Magnetic Insurance Cases Recognition
5) None of these

94. Modern Computers represent characters and numbers internally using which of the following number
systems?
1) Penta 2) Octal 3) Hexa 4) Septa 5) Binary

95. A ________ is approximately a million bytes.


1) gigabyte 2) kilobyte 3) megabyte 4) terabyte 5) None of these

96. If you wish to extend the length of the network without having the signal degrade, you would use a
1) repeater 2) router 3) gateway 4) switch 5) None of these

97. Which of the following is used to move down a page in a document?


1) Jump 2) Fly 3) Wriggle 4) Scroll 5) None of these

98. Date and Time are available on the desktop at


1) Taskbar 2) My Computer 3) Recycle Bin 4) Only (2) and (3) 5) None of these

99. Which type of resource has greater probability to become shared resource in a computer network?
1) Printers 2) Speakers 3) Floppy Disc Drivers 4) Keyboards 5) None of these

100.Which of the following terms is used to describe the movement of an item with the help of mouse to
a new position on screen?
1) Click 2) Double-click 3) Drag and drop 4) Point 5) Right-click

101. System software is the set of programs that enables your computer’s hardware devices and
________ software to work together.
1) Management 2) Processing 3) Utility 4) Application 5) None of these

102. Select the odd one out.


1) Interpreter 2) Operating System 3) Compiler 4) Assembler 5) None of these

103. To change written work already done is called


1) file 2) edit 3) cut 4) close 5) None of these

104. To make a notebook act as a desktop model, the notebook can be connected to a ________
which is connected to a monitor and other devices.
1) bay 2) docking station 3) port 4) network 5) None of these

105. The benefit of using computers is that

DreamBigInstitution.com
1) Computers are very fast and can store huge amounts of data
2) Computers provide accurate output even when input is incorrect
3) Computers are designed to be inflexible
4) All of the above
5) None of these
DreamBigInstitution.com
106. The database administrator’s function in an organisation is
1) To be responsible for the more technical aspects of managing the information contained
in organisational databases
2) To be responsible for the executive-level aspects of decisions regarding information
management
3) To show the relationship among entity classes in a data warehouse
4) To define which data mining tools must be used to extract data
5) None of these

107. The_____becomes different shapes depending on the task you are performing.
1) active tab 2) insertion point 3) mouse pointer 4) ribbon 5) None of these

108. On which button does Help menu exist?


1) End 2) Start 3) Turn off 4) Restart 5) None of these

109. Which of the following is the latest version of Excel?


1) Excel 2000 2) Excel 2002 3) Excel ME 4) Excel XP 5) Excel 2010

110. Deleted data remains on a disk until


1) the data is overwritten 2) the recycle bin is emptied
3) a file compression utility is used 4) the disk is scanned
5) None of these

111. The________enables your computer to connect to other computers.


1) video card 2) sound card 3) network interface card (NIC)
4) controller card 5) None of these

112. What menu is selected to Save or Save As ?


1) Tools 2) File 3) Format 4) Edit 5) None of these

113. Array is
1) linear data structure 2) non-linear data structure
3) complex data structure 4) simple data structure
5) None of these

114. The Word function that corrects text as you type is referred to as
1) Auto Summarize 2) Auto Insert 3) Auto Correct
4) Track Changes 5) None of these

115. A collection of unprocessed items is


1) information 2) data 3) memory 4) reports 5) None of these

116. The portion of the CPU that coordinates the activities of all the other computer components
is the
1) motherboard 2) coordination board 3) control unit
4) arithmetic logic unit 5) None of these

117. A collection of related fields in data organisation is called

DreamBigInstitution.com
1) Group 2) File 3) Information 4) Register 5) Record

118. A program that enables you to perform calculations involving rows and columns of numbers
is called a
1) spreadsheet program 2) word processor 3) graphics package
4) window 5) None of the above

119. Application software is designed to accomplish


1) real-world tasks 2) computer-centric tasks 3) server tasks
4) operating-system tasks 5) None of these

120. What is the purpose of Software Documenting?


1) use and maintenance of software
2) to sell software at a handsome price DreamBigInstitution.com
3) to sell software to many customers
4) to show its importance
5) None of these

121. During the _______ portion of the Information Processing Cycle, the computer acquires
data from some source.
1) storage and output 2) storage 3) input 4) output 5) None of these

122. The _______ of software contains lists of commands and options.


1) menu bar 2) tool bar 3) title bar 4) formula bar 5) None of these

123. When creating a word-processed document, this step involves the user changing how words
on the page appear, both on the screen and in printed form:
1) Editing text 2) Inserting tables and indexes
3) Formatting text 4) Proofing documents
5) None of these

124. Software applies_______, also called algorithms, to process data.


1) arithmetic 2) procedures 3) objects 4) rules 5) None of these

125. What happens when you press Ctrl + V key?


1) A capital V letter is typed into your document at the cursor point
2) The selected item is pasted from the Clipboard
3) The selected item is pasted to the Clipboard
4) The selected drawing objects are distributed vertically on the page
5) None of these

126. What do you press to enter the current date in a cell?


1) CTRL+ ; (semicolon) 2) CTRL + SHIFT + : (colon) 3) CTRL + F10
4) CTRL + F11 5) None of these

127. IT stands for


1) Information Technology 2) Integrated Technology 3) Intelligent Technology
4) Interesting Technology 5) None of these

128. What type of resource is most likely to be a shared common resource in a computer network?
1) Printers 2) Speakers 3) Floppy disk drives 4) Keyboards 5) None of these

129. The vast network of computers that connects millions of people all over the world is called
1) LAN 2) Web 3) Hypertext 4) Internet 5) None of these
130. Collecting personal information and effectively posing as another individual is known as the
crime of
1) spooling 2) identity theft 3) spoofing 4) hacking 5) None of these

131. All the following are examples of real security and privacy risks except
1) hackers 2) spam 3) viruses 4) identity theft 5) None of these

132. A(n) ________ system is a small, wireless handheld computer that scans items, tags and
pulls up the current price (and any special offer) as you shop.
1) PSS 2) POS 3) Inventory 4) Data mining 5) None of these

133. Which of the following is NOT one of the four major data processing functions of a computer?
1) Gathering data
2) Processing data into information
3) Analysing the data or information
4) Storing the data or information
5) None of these
DreamBigInstitution.com
134. A proxy server is used for which of the following?
1) To provide security against unauthorised users
2) To process client requests for Web pages
3) To process client requests for database access
4) To provide TCP/IP
5) None of these

135. All the logical and mathematical calculations done by the computer happen in/on the
1) system board 2) central control unit 3) central processing unit
4) mother board 5) memory

136. A ________ contains buttons and menus that provide quick access to commonly used
commands.
1) menu bar 2) tool bar 3) window 4) find 5) None of these

137. Letters, numbers and symbols found on a keyboard are


1) icons 2) screen 3) keys 4) menu 5) None of these

138. Which is not an item of hardware?


1) An MP3 file 2) A keyboard 3) A disk drive 4) A monitor 5) None of these

139. You click at B to make the text


1) italics 2) underlined 3) italics and underlined 4) bold 5) None of these

140. ________ is the process of finding errors in software code.


1) Debugging 2) Compiling 3) Interpreting4) Testing 5) None of these

141. To insert a copy of the clipboard contents, whatever was last cut or copied at the insertion
point, you have to
1) paste 2) stick in 3) fit in 4) push in 5) None of these

142. This command is used to remove text or graphics from a document. The information is then
stored on a clipboard so you can paste it
1) chop 2) cut 3) clip 4) cart away 5) None of these

143. To exit the program without leaving the application:


1) file 2) edit 3) copy 4) close 5) None of these
144. To start or restart the computer:
1) exit 2) kick 3) boot 4) kick-start 5) None of these

145. A blinking indicator that shows you where your next action will happen:
1) CPU 2) cursor 3) tool bar 4) boot 5) None of these

146. An example of a processing device would be


1) a magnetic ink reader 2) a tablet PC 3) special function cards
4) scanners 5) keyboards

147. Which of the following is not a type of computer software which can be bought?
1) Off-the-shelf 2) Tailor-made
3) Custom-developed 4) Off-the-shelf with alterations
5) All of these can be purchased.

148. You can use _______ to copy selected text, and _______ to paste it in a document.
1) CTRL + C, CTRL + V 2) CTRL + C, CTRL + P 3) CTRL + S, CTRL + S
4) SHIFT + C, ALT + P 5) CTRL + D, CTRL + A

149. In the “C” language the function scant ( ) reads


1) single character 2) character and strings 3) any possible number
4) any possible variable type 5) limited variable types

150. The main memory of a computer can also be called


1) primary storage 2) internal memory 3) primary memory
4) All of these 5) None of these

151. A menu contains a list of


1) commands 2) data 3) objects 4) reports 5) None of these

152. Each __________ on a menu performs a specific action.


1) client 2) server 3) node 4) command 5) None of these

153. To make a notebook act as a desktop model, the notebook can be connected to a_____
which is connected to a monitor and other devices.
1) bay 2) docking station 3) port 4) network 5) None of these

154. To print an individual item in a file immediately click


1 ) SHIFT+P 2) CTRL+P 3) ALT+P 4) ESC+P 5) None of these

155. To find an individual item in a file immediately:


1) file allocation table 2) directory 3) sequential access
4) direct access 5) None of these

156. Which layers of the OSI model are included in the lower layers?
1) Application, Session, Presentation
2) Data Link, Physical, Transport, Network
3) Physical, Data Link, Network, Application
4) Session, Data Link, Physical
5) None of these

157. From the smallest to the largest, rank the following logical pieces of the database : data
block, tablespace, extent, segment.
1) tablespace, segment, extent, data block
2) data block, segment, extent, tablespace
3) segment, extent, data block, tablespace
4) data block, extent, segment, tablespace
5) None of these

158. Where are cookies stored?


1) On the server 2) In web.xml 3) On the client 4) In HTML 5) None of these

159. A _______ is a named set of characters that have the same characteristics.
1) type face 2) type style 3) font 4) pico 5) None of these

160. A _______ is a pre-designed document that already has co-ordinating fonts, a layout, and
a background:
1) guide 2) model 3) ruler 4) template 5) None of these

161. An output device that let you see what the computer is doing:
1) a disk drive 2) monitor screen 3) shift key 4) printer 5) None of these

162. Bit is a contraction (short) of


1) binary system 2) digital byte 3) binary digit 4) binary unit 5) None of these

163. To access a mainframe or a supercomputer, users often use a


1) terminal 2) node 3) desktop 4) handheld 5) None of these

164. The most common input devices are the ________ and the _________.
1) microphone, printer 2) scanner, monitor 3) digital camera, speakers
4) keyboard, mouse 5) None of these

165. To save an existing file with a new name or to a new location, you should use the ________
command.
1) save 2) save and replace 3) save as 4) new file 5) None of these

166. Which of the following is the correct order of the four major functions of a computer?
1) Process, Output, Input, Storage
2) Input, Output, Process, Storage
3) Process, Storage, Input, Output
4) Input, Process, Output, Storage
5) None of these

167. A byte can hold one ________ of data.


1) bit 2) binary digit 3) character 4) kilobyte 5) None of these

168. The operating system is the most common type of ________ software.
1) communication 2) application 3) system
4) word-processing software 5) None of these

169. How do you print your slides in a handout that includes lines for notes?
1) In the Print dialog box, select Handouts and set the number of slides per page to 3.
2) In the Print dialog box, select Handouts and a number of slides per page, then select the
Include comment pages option.
3) In the Print dialog box, select Notes Pages instead of Handouts.
4) It cannot be done.
5) None of these
170. Suppose you have columns of data that span more than one printed page. How can you
automatically print the column headings on each page?
1) Click Page Setup on the File menu, click the Sheet tab, and enter the row that contains
these column headings under Print titles.
2) Click Page Setup on the File menu, click the Page tab, click the Options button, then
enter your choices.
3) Click Page Setup on the File menu, click the Sheet tab, and make a selection under the
Print heading.
4) Click Page Preview on the File menu, click the Sheet tab, and enter the row that contains
these column headings under Print titles.
5) None of these

171. The process of preparing a floppy diskette for use is called


1) assembling 2) translating 3) parsing 4) formatting 5) None of the above

172. Which is the slowest internet connection service?


1) Digital Subscriber Line 2) Tl 3) Cable modem
4) Leased Line 5) Dial-up Service

173. Every component of your computer is either


1) software or CPU/RAM
2) hardware or software
3) application software or system software
4) input devices or output devices
5) None of these

174. If the destination does not receive a segment, how will the TCP host know how to resend
the information?
1) The ACK received will not include the segment number that was not received.
2) The ACK received will include the segment number that was not received.
3) The sending host will send a PACK to verify segment receipt.
4) The destination host will send a YACK message back to the sending host.
5) None of these

175. Small application programs that run on a Web page and may ensure a form is completed
properly or provide animation are known as
1) flash 2) spiders 3) cookies 4) applets 5) sparks

176. If you do not want to select any option after opening a menu, then click menu title again or
press key ________ to close the menu.
1) Shift 2) Tab 3) Escape 4) F1 5) None of these

177. It is easier to change the name of a file using _______ process.


1) transforming 2) christening 3) renaming 4) retagging 5) None of these

178. A series 100 POST error code indicates a problem with the
1) hard drive 2) ram or rom 3) system board 4) video adapter 5) None of these

179. To send a message to another station, the main thing a user has to know is
1) how the network works
2) the other station’s address
3) whether the network is packet-switched or circuit-switched
4) whether this is a voice or data network
5) None of these
180. Smart Card is a
1) special purpose card
2) microprocessor card
3) processing unit that contains memory for storing data
4) processing unit for software handling
5) None of these

181. Rules of a programming language are called


1) procedures 2) calls 3) methods 4) login 5) syntax

182. A primary key can also be called a ________.


1) super key 2) candidate key 3) alternate key 4) secondary key 5) foreign key

183. Which shortcut key is used to open a new file in MS-Word?


1) ctrl + N 2) ctrl + M 3) ctrl + Y 4) ctrl + X 5) ctrl + Z

184. Bridge operates in which of the following OSI layers?


1) Physical 2) Network 3) Data link 4) Both (1) and (3) 5) Session

185. ________ printer is used for fax machines.


1) Line 2) Dot matrix 3) Laser 4) Ink jet 5) Thermal

186. What does AMD stand for


1) Advanced Mainframe Devices 2) Advanced Micro Devices
3) Advanced Mini Devices 4) Advanced Major Devices
5) Advanced Monitor Devices

187. Foxpro is an example of


1) DBMS 2) Relational DBMS 3) Object-oriented DBMS
4) Distributed DBMS 5) Knowledge base DBMS

188. To open the format cells dialog box, we press


1) Ctrl + 1 2) Shift + 1 3) Ctrl + Shift + 1 4) Alt + 1 5) F1

189. ________ provides electronic data interchange facility.


1) ISDN 2) LAN 3) VAN 4) CAN 5) None of these

190. An assembly language is a division of


1) Middle level language 2) High level language 3) Low level language
4) Machine language 5) None of these

191. Malicious software is known as


1) hardware 2) malware 3) malicious ware 4) illegal ware

192. ________ is the measurement of things such as fingerprints and retinal scans used for security
access.
1) Biometrics 2) Bio measurement 3) Computer security 4) Smart weapon machinery

193.Which of the following can’t be a proper virus detection and prevention tip?
1) Do not open any file attached to an email unless you know what it is, even if it appears to come
from a dear friend or someone you know. Some viruses can replicate themselves and spread through
email. Better be safe than sorry and confirm that they really sent it.
2) Do not open any file attached to an email if the subject line is questionable or unexpected. If the
need to do so is there, always save the file to your hard drive before doing so.
3)Open chain emails or junk mails and forward it to others.
4)Do not download any file from strangers.

194.Which of the following statements is true about Bluetooth?


(A)Bluetooth is a proprietary open-wireless-technology standard for exchanging data over short
distances.
(B)Bluetooth uses a radio technology called frequency-hopping spread spectrum.
(C)A PC that does not have embedded Bluetooth can be used with a Bluetooth adapter that will
enable the PC to communicate with other Bluetooth devices.
1) Only (A) 2) Only (B) 3) Both (A) and (C) 4) All A, B and C

195.System software does all of the following EXCEPT


1)help run the computer.
2)coordinate instructions between application software and the computer’s hardware devices.
3)help manage system resources.
4)add graphics and pictures to files.

196.Microsoft Outlook and Lotus Organiser are examples of ________ software.


1) presentation 2) personal information manager (PIM) 3) database
4) communication 5) None of these

197.If you want to locate the hardware address of a local device, which protocol would you use?
1) ARP 2) RARP 3) ICMP 4) PING 5) PONG

198.Multimedia can contain


1)graphics, animation, video, music and voice
2)only numeric-type data
3)only numeric, text, and picture data
4)databases that in turn contain other databases, creating a massive data collection

199.In Windows Explorer, when a user press Alt key and double-clicks a file/folder simultaneously, what
will happen?
1)The selected file/folder will open in a new window.
2)The selected file/folder will open in the same window.
3)The selected file/folder will move to recycle bin.
4)The properties/dialog box of the selected file/folder will open.

200.Active Window means


1)a window which is designated by a different colour toolbar other than the open window
2)the window that is currently open
3)Both 1) and 2)
4)the window that is last used

201.Which of the following is normally used to initialise a computer system’s hardware?


1) Bootstrap memory
2) Volatile memory
3) External mass memory
4) Random access memory

202.Which is NOT a good Web security strategy?


1)Restricting access to the Web server, keeping a minimum number of ports open
2)Limiting the users who can load software, edit or add files
3)Adding demo programs so that users can test system without accessing production data
4)Removing unnecessary compilers and interpreters
203.The different styles of lettering in a word processing program are called
1) font 2) calligraphy 3) writing 4) manuscript

204.Which of the following is a command used to remove text or graphics from a document? The
information is then stored on a clipboard so that you can paste it.
1) Chop 2) Cut 3) Clip 4) Cart away

205.When data changes in multiple lists and all lists are not updated, this causes
1) data redundancy 2) information overload
3) duplicate data 4) data inconsistency

206.Time during which a job is processed by the computer is


1) Delay time 2) Real time 3) Execution time 4) Down time

207.________ Bar is located at top of Wordpad/Notepad/MS Word window.


1) Title 2) Menu 3) Tool 4) Format

208.The storage capacity of the Hard Disk is determined as?


1)number of tracks × number of sectors × bytes per sector × number of read/write heads
2)number of tracks × number of sectors × bytes per sector
3)number of tracks × number of sectors × 2 × bits per sector × number of read/write heads
4)number of tracks × number of sectors

209.A ________ contains specific rules and words that express the logical steps of an algorithm.
1) programming language 2) programming structure 3) syntax 4) logic chart

210.A program which helps create written documents and lets you go back and make necessary corrections
is called
1) Spreadsheet 2) Personal writer 3) Word printer 4) Word processor

211.The ________ folder retains copies of messages that you have started but are not yet ready to
send.
1) Inbox 2) Outbox 3) Drafts 4) Sent Items

212.Permanent instructions that the computer uses when it is turned on and that cannot be changed by
other instructions are contained in
1) ROM 2) RAM 3) ALU 4) REM

213.Which of the following is a word in a web page that, when clicked, opens another document?
1) Anchor 2) Hyperlink 3) Reference 4) URL

214.‘Saving’ is a process
1) to copy document from memory to storage medium.
2) to change the content of any document.
3) to change the display or entire document.
4) to develop document by entering text using keyboard.

215.If soft copy is the intangible output, what is hard copy?


1) The physical parts of the computer
2) The printed parts of the computer
3) The printed output
4) The physical output devices

216.To make the number pad act as directional arrows, you press the________key.
1) num lock 2) caps lock 3) arrows lock 4) shift

217.Checking that a pin code number is valid before it is entered into the system is an example of
1) error correction 2) backup and recovery
3) data preparation 4) data validation

218.If a new device is attached to a computer, such as a printer or scanner, its ________ must be
installed before the device can be used.
1) buffer 2) driver 3) pager 4) server

219.Blueprints are usually created using ________ software.


1) CGI 2) Paint 3) Draw 4) CAD

220.Which of the following displays the address and name of the selected cell?
1) Name box 2) Row Heading 3) Formula bar 4) Task pane

221.When you instal a new program on your computer, it is typically added to the menu
1) All programs 2) Select progra 3) Start program
4) Desk top program 5) None of these

222.Which of the following is the key function of a firewall?


1) Monitoring 2) Deleting 3) Copying 4) Moving 5) None of these

223._______ are a type of inexpensive digital camera that remains tethered to a computer and are used
for video conferencing, video chatting and live web broadcast.
1) Webcams 2) Webpick 3) Browser cams 4) Browser pics 5) None of these

224.The ________ shows all the web sites and pages that you have visited over a period of time.
1) status bar 2) task bar 3) history list 4) tool bar 5) None of these

225.A proxy server is used for which of the following?


1) To provide security against unauthorised users.
2) To access client request for web pages.
3) To access client request for database access
4) To provide TCP/IP
5) None of these

226.A repair for a known software bug, usually available at no charge on the internet, is called a(n)
1) version 2) patch 3) tutorial 4) FAQ 5) None of these

227.In the URL http://www.yahoo.com. the portion labelled http is the


1) Host 2) Domain name 3) Protocol 4) Top-level 5) None of these

228.In database, a field is a


1) label 2) table of information 3) group of related records
4) category of information 5) None of these

229.The number of pixels displayed on a screen is known as the screen


1) resolution 2) colour depth 3) refresh rate 4) viewing size 5) None of these

230.Word processing, spreadsheet and photo editing are examples of


1) application software 2) system software 3) operating system
4) platform software 5) None of these
231.Computers gather data, which means that they allow users to ________ data.
1) present 2) input 3) output 4) store 5) None of these

232.If you wish to extend the length of the network without having the signal degrade, you would use a
1) repeater 2) router 3) gateway 4) modem 5) None of these

233.The time it takes a device to locate data and instructions and make them available to the CPU is
known as
1) clock speed 2) a processing cycle 3) CPU speed
4) access time 5) None of these

234.________ controls the way in which the computer system functions and provides a means by which
we can interact with the computer.
1) The platform 2) The operating system 3) Application software
4) The motherboard 5) None of these
235.________ means that the data contained in a database is accurate and reliable.
1) Data redundancy 2) Data integrity 3) Data reliability
4) Data consistency 5) None of these

236.A(n) ________ is a private corporate network used exclusively by company employees.


1) internet 2) local area network 3) peer to peer
4) intranet 5) None of these

237.Which of the following terms is just the connection of networks that can be joined together ?
1) virtual private network 2) internet 3) intranet
4) extranet 5) None of these

238.An area of a computer that temporarily holds data waiting to be processed is


1) CPU 2) Memory 3) Storage 4) File 5) None of these

239.A ________ is a microprocessor-based computing device.


1) personal computer 2) mainframe 3) workstation 4) server 5) None of these

240.You use a(n) ________, such as a keyboard or mouse, to input information.


1) output device 2) input device 3) storage device
4) processing device 5) None of these

241.If a user needs information instantly available to the CPU, it should be stored
1) On a CD 2) In secondary storage 3) In the CPU 4) In RAM

242.To what temporary area can you store text and other data, and later paste them to another
location
1) The Clipboard 2) ROM 3) CD-ROM 4) The Hard disk

243.The operating system called UNIX is typically used for


1) Desktop computers 2) Laptop computers 3) Super computers
4) Web servers 5) All of these

244.Press — to move the insertion point to the address box, or to highlight the URL in the address
box
1) Alt + D 2) Alt + A 3) Shift + Tab 4) Tab + Ctrl 5) Ctrl + S

245.Computer systems are comprised of


1) Hardware, Programs, Information, People and Networks
2) Hardware, Software, Procedures, Networks and People
3) Hardware, Programs, Information, People and procedures
4) Hardware, Programs, Processors, Procedures, Networks and People
5) Hardware, Programs, Processors, Procedures and People

246.A collection of unprocessed items is —


1) Information 2) Data 3) Memory 4) Reports

247.The portion of the CPU that coordinates the activities of all the other computer components is the
1) Motherboard 2) Coordination board 3) Control unit 4) Arithmetic logic unit

248.A — is approximately one billion bytes


1) Kilobyte 2) Bit 3) Gigabyte 4) Megabyte

249.The — directory is mandatory for every disk


1) Root 2) Base 3) Sub 4) Case

250.WWW stands for


1) World Work Web 2) World Wide Web
3) Wide Work Web 4) Wide World Web

251.To prepare a presentation/slide show which application is commonly used


1) Photoshop 2) Power point
3) Outlook express 4) Internet explorer

252.— is the process of carrying out commands


1) Fetching 2) Storing 3) Executing 4) Decoding

253.Which of the following refers to the fastest, biggest and most expensive computers
1) Personal computers 2) Supercomputers 3) Laptops 4) Notebooks

254.Microsoft Word is an example of —


1) An operating system 2) A processing device
3) Application software 4) An input device

255.________ contain data in Oracle database.


1) Extents 2) Segments 3) Tables 4) Datablocks 5) Records

256.If you do not want to select any option after opening a menu then click menu title again or press
key — to close the menu
1) Shift 2) Tab 3) Escape 4) F1

257.It is easier to change the name of file using —— process


1) Transforming2) Christening 3) Renaming 4) Retagging

258. A series 100 POST error code indicates a problem with the
1) Hard drive 2) RAM or ROM 3) System Board 4) Video adapter

259.Which of the following are valid Min. & Max. zoom sizes in Ms Office
1) 10, 100 2) 20, 250 3) 10, 500 4) 10,1000

260.When SHADOWING is enabled in a computers BIOS


1) Instructions stored in various ROM chips are copied
2) Values are stored twice in the memory for redundancy
3) The conventional memory is re-mapped to the top
4) Data stored in RAM chips on adapter cards are shadowed

261.What is a Gigabyte?
1) Flash memory
2) An optical storage medium capable of storing vast amount of information
3) Roughly a trillion bytes
4) Roughly a million bytes
5) Roughly a billion bytes

262.Which of the following is a part of session layer?


1) Transports data across the physical link
2) Terminates a session
3) Performs flow control
4) Determines network topology
5) Performs physical addressing

263.Window registry consists of ________ and ________ files.


1) user.dat, win.ini
2) user.dat, system.dat
3) autoexec.bat, config.sys
4) win.reg, user.dat
5) win.reg, system.dat

264.In Open System Interconnection (OSI) model IP belongs to ________ layer.


1) session layer 2) physical layer 3) network layer
4) transport layer 5) application layer

265.________ technology is typically used by Extranet and Intranet.


1) Protocol 2) SSL 3) Proprietary 4) Internet 5) SET

266.A program which is in execution is called


1) data 2) job 3) process 4) information 5) None of these

267.A computer cannot “boot” without a(n)


1) loader 2) linker 3) OS 4) compiler 5) assembler

268.________ are loaded into main memory when the computer is booted.
1) Word processing instructions 2) Utility programs 3) Internal commands
4) Intermediate commands 5) External commands

269.A(n)________ is a register or main memory location which contains the effective address of the
operand.
1) special location 2) pointer 3) scratch pad
4) indexed register 5) direct indexed register

270.Resolution of externally defined symbols is performed by


1) OS 2) compiler 3) linker 4) loader 5) interpreter

271.Which major development led to the production of microcomputer?


1) Logic gates 2) Floppy disks 3) Magnetic disks 4) Magnetic tape 5) Integrated circuits

272.The arranging of data in a logical sequence is called


1) classifying 2) summarizing 3) reproducing 4) sorting 5) sequencing
273.________ company started the personal-computer industry.
1) Compaq 2) Apple 3) HCL 4) IBM 5) Texas instruments

274.________ can be programmed one time by either the manufacturer or the computer user: once
programmed, it cannot be modified.
1) ROM 2) PROM 3) EPROM 4) EEPROM 5) None of these

275.In a computer system, ________ device is functionally opposite of a keyboard.


1) joystick 2) mouse 3) trackball 4) printer 5) scanner

276.The silicon chips used in computers are made from


1) copper 2) germanium 3) ordinary sand4) gallium-arsenide 5) None of these

277.In modems data transfer rate is measured in


1) bandwidth 2) bits per second 3) bits per minute
4) All the above 5) None of these

278.The output of a 2 input and gate is 1 only when its


1) either input is 1 2) both inputs one 0 3) both inputs are 1
4) either input is 0 5) None of these

279.________ printer is a character-at-a time printer.


1) Line 2) Chain 3) Band 4) Daisywheel 5) Drum

280.A half byte is known as


1) data 2) bit 3) half byte 4) word 5) nibble

281.A ________ code is used in retail stores to identify merchandise.


1) mnemonics 2) gray code 3) machine code 4) universal product code 5) access-3 code

282.Which of the following languages is based on graphics for use in education?


1) COBOL 2) BASIC 3) LOGO 4) PROLOG 5) FORTRAN

283.You can activate a cell by


1) pressing the tab key 2) pressing the arrow key 3) pressing the enter key
4) All the above 5) None of these

284.Which of the following is not an option in the spelling dialog box?


1) Ignore 2) Ignore all 3) Change 4) Change all 5) Edit

285.________ layer performs multiplexing and demultiplexing of network connections.


1) Physical 2) Network 3) Transport 4) Data link 5) Application

286.In which of the following topologies, security and privacy are less of an issue for devices?
1) Mesh 2) Star 3) Ring 4) Bus 5) Tree

287.A television broadcast uses _________ transmission mode.


1) half-duplex 2) full-duplex 3) simplex 4) automatic 5) None of these

288.FDDI is an acronym for


1) Fiber Distributed Digital Interface
2) Fast Distributed Data Interface
3) Fiber Distributed Data Interface
4) Fast Data Delivery Interface
5) None of these

289._________ and ________ protocols are defined in transport layer.


1) TCP, UDP 2) TCP, IP 3) UDP, IP 4) UDP, ICMP 5) TCP, ICMP

290.Borders can be applied to


1) paragraph 2) text 3) cell 4) All the above 5) None of these

291.What is the short-cut key to highlight the entire column?


1) Ctrl + Page up 2) Ctrl + Page down 3) Ctrl + Enter
4) Ctrl + Space bar 5) Ctrl + C

292.Which command is used to display current date and time in MS Excel?


1) today 2) now () 3) time () 4) date () 5) system ()

293.________ language is used to create macros in MS Excel.


1) C 2) C++ 3) Visual C++ 4) Java 5) Visual Basic

294.Workspace means
1) Group of worksheets 2) Group of rows 3) Group of columns
4) Group of workbooks 5) Group of cells

295.Which of the following graphical models is used to define a database?


1) Organisation model 2) Programming model 3) Flow chart
4) E-R diagram 5) None of these

296.To refer to a specific record in your library database, for instance, information stored about a specific
book ________ term is used.
1) table 2) column 3) relation 4) instance 5) entity

297.The most important advantage of an IC is


1) low power consumption
2) reduced cost
3) easy replacement in case of circuit failure
4) extremely high reliability
5) None of these

298.To modify the structure of a created table, which SQL command is used?
1) change 2) alter 3) update 4) modify 5) None of these

299.________ can be use to send an e-mail to a large group at one time.


1) Group 2) Alias 3) Mail server 4) List server 5) Remote server

300.To save the current document or to open a previously saved document, ________ is used.
1) file menu 2) tools menu 3) view menu 4) edit 5) review menu

301.Documents of the web that are transported over the Internet are called
1) web sites 2) web link 3) web pages 4) HTML pages5) hypertext

302.The ability to convey a message without disclosing your name or identity is called
1) privacy 2) security 3) encryption 4) anonymity 5) authentication

303.A computer program that scans resumes and is set to locate keywords is called a(n)
1) web interview 2) web discussion 3) web conference
4) information system 5) application tracking system (ATS)

304._________ operating systems are found on ROM chips in portable or dedicated devices.
1) Server 2) Network 3) Embedded 4) Stand-alone 5) Windows

305.Identify the odd term among the following groups.


1) Optical fibre 2) Co-axial cable 3) Twisted pair wire
4) Micro waves 5) None of these

306.________ are tiny charts embedded into the background of an Excel cell.
1) Labels 2) Functions 3) Formulas 4) Sparklines 5) Background

307.A(n) ________ is called an Internet-based online retailer.


1) online tailer 2) net-tailer 3) cybertailer 4) e-tailer 5) None of these

308.For predicting the weather ________ is the best solution.


1) thin clients 2) servers 3) super computer 4) workstations 5) minicomputer

309.To organise the bookmarks, ________ can be used.


1) containers 2) folders 3) structure 4) menus 5) files

310.Different computers are connected to a LAN by a cable and a(n)


1) interface card 2) special wires 3) modem
4) telephone lines 5) channel

311.A ________ is a software that measures, monitors, analyses and controls real-world events.
1) real-time software 2) scientific software 3) system software
4) business software 5) None of these

312.________ operating system uses write through catches.


1) DOS 2) VLTRIX 3) UNIX 4) XENIX 5) None of these

313.When you want to draw a perfect shape ________ should be used.


1) alt-key 2) ctrl-key 3) shift-key 4) space bar 5) backspace

314.Which of the following might prevent a program from being modified in future?
1) Pseudocode 2) Logic errors 3) Syntax error
4) Lack of program documentation 5) All the above

315.Which generation is natural language related to?


1) First generation 2) Second generation 3) Third generation
4) Fourth generation 5) Fifth generation

316.The database environment has all of the following components except


1) database 2) DBA 3) users 4) SQL 5) separate files

317.A number of related records that are treated as a unit is called a


1) field 2) data 3) file 4) batch 5) group

318.Coding and testing are done in a ________ manager.


1) cross-sectional 2) by-sectional 3) ad hoc 4) bottom-up 5) top-down

319.Computer software is composed of


1) mnemonics 2) symbols 3) statements 4) algorithms 5) data
320.Disk checking is associated with
1) debugging a program 2) running a program 3) compiling a program
4) coding a program 5) assembling a program

321.What is the common name given to a program written in any one of the high-level languages?
1) System program 2) Compiler program 3) Object program
4) Source program 5) Data program

322.________ is used to produce graphic outputs.


1) VDU 2) Magnetic tape 3) Magnetic disk
4) Plotter 5) None of these

323.Binary-Coded Decimal (BCD) often uses ________ bits.


1) 64 2) 128 3) 8 4) 16 5) 32

324.________ holds microprograms.


1) ROM 2) RAM 3) Core memory 4) Control memory 5) EPROM

325.A hybrid computer uses a ________ to convert digital signals from a computer into analog signals.
1) modem 2) modulator 3) demodulator 4) decoder 5) None of these

326.________ program gives instructions regarding operations inside the computer.


1) Application 2) System software 3) Utility 4) Compiler 5) Assembler

327.The first electronic computer was made in the year


1) 1946 2) 1955 3) 1964 4) 1967 5) 1969

328.The record produced in an audit trail is known as


1) job stream 2) job file 3) journal tape 4) journal stream 5) job tape

329.A group of magnetic tapes, videos or terminals usually under the control of one master is
called a
1) cluster 2) track 3) cylinder 4) All the above 5) None of these

330.________ is an alternative form of binary code.


1) Decoder 2) Bar code 3) Encoder
4) Gray code 5) Excess-3 code

331.Which of the following layers is responsible for token management?


1) Physical layer 2) Application layer 3) Transport layer
4) Network layer 5) Session layer

332.In a ________ topology, a network that contains multiple hubs is most likely configured.
1) ring 2) star 3) bus 4) mesh 5) tree

333.Communication between a computer and a CPU uses ________ transmission mode.


1) automatic 2) simplex 3) half-duplex 4) full-duplex 5) None of these

334.ISDN is an acronym for


1) Integrated Standard Digital Network
2) Intelligent Services Digital Network
3) Integrated Services Digital Network
4) Integrated Services Data Network
5) None of these
335.In which of the following networks, irregular topologies are used?
1) LAN 2) WAN 3) MAN 4) CAN 5) Broadcast Networks

336.________ standard describes the CSMA/CD protocol.


1) IEEE 802.1 2) IEEE 802.2 3) IEEE 802.3 4) IEEE 802.4 5) IEEE 802.5

337.COBOL is used in ________ applications.


1) scientific 2) space 3) mathematical 4) commercial 5) graphics

338.In MS Excel, to display current date only ________ is used.


1) date () 2) now () 3) today () 4) time () 5) current date ()

339.To rename currently highlighted object ________ is used.


1) F1 2) F2 3) F3 4) F5 5) F6

340.To display the window system properties dialogue, which of the following short cut keys is used?
1) Windows key + P 2) Windows key + D
3) Windows key + Pause 4) Windows key + Shift
5) Windows key + Ctrl

341.A permanent virtual circuit involves


1) Connection establishment 2) Data transfer3) Connection release
4) All of the above 5) None of these

342.________ input/output device is not associated with personal computers.


1) Colour monitors 2) Dot-matrix printer 3) Punched cards
4) Mice 5) Optical scanners

343.A computer enthusiast is called


1) a hacker 2) user friendly 3) a computerist4) All the above 5) None of these

344.Actual execution of instructions in a computer takes place in


1) control unit 2) storage unit 3) arithmetic logic unit 4) All the above 5) None of these

345.________ function displays row data in a column or column data in a row.


1) Index 2) Rows 3) Hyperlink 4) Transpose 5) Columns

346.Multiple calculations can be done by a single formula using


1) complex formula 2) array formula 3) smart formula
4) standard formula 5) advanced formula

347.Which of the following charts can be created in Excel?


1) Line 2) Pie 3) Area 4) All the above 5) None of these

348.________ type of commercial Internet service providers are most widely used.
1) Centralised 2) National 3) Regional 4) Decentralise 5) Application

349.Moving from one website to another is called


1) moving 2) jumping 3) surfing 4) applying 5) changing

350.Which of the following is not one of the basic elements of an e-mail message?
1) Header 2) Message 3) Footer 4) Signature 5) None of these

351.News groups use a special network of computers called


1) address net 2) channel net 3) mail net 4) use net 5) cable net

352.________ are specialised utility programs that make using the Internet and the web easier and
safer.
1) Web utilities 2) Telecom 3) Web firewalls 4) Proxy server 5) Norton Utilities

353.The process that rearranges file fragments into contiguous files is called
1) file filing 2) folder folding 3) unfragging 4) defragmentation 5) file folding

354.________ virus describes the awful consequences of not acting immediately.


1) Android 2) Spoofing 3) Phishing 4) Misleading e-mail 5) Sabotage

355.A computer infected with a malware bot is called


1) android 2) zombie 3) e-ogre 4) dirty bot 5) None of these

356.POS data entry system is used most extensively by the


1) grocery industry 2) railroad industry
3) word-processing industry 4) banking industry
5) None of these

357.A ________ is a non-impact printer that can produce very high-quality, letter-perfect printing.
1) daisy wheel printer 2) laser printer 3) dot-matrix printer
4) thermal printer 5) drum printer

358.A computer can do nothing without a


1) memory 2) program 3) chip 4) output device 5) file

359.RAM chip was invented by ________ company.


1) Intel 2) Toshiba 3) Motorola 4) IBM 5) Microsystem

360.The first item defined for a new system is its


1) processing requirements 2) inputs
3) outputs 4) file formats
5) programs

361.The language that the computer can understand and execute is


1) System program 2) Application software 3) Machine language
4) Only 1) and 2) 5) None of these

362.The number used to identify a storage location is called


1) a byte 2) a bit 3) an address
4) Both 1) and 2) 5) All the above

363.A CD-ROM is
1) an optical ROM 2) an erasable ROM 3) a magnetic ROM
4) Both 2) and 3) 5) None of these

364.The computer device used primarily to provide hard copy is


1) line printer 2) CRT 3) card reader 4) computer console 5) Either 1) or 3)

365.Which of the following devices can be used directly to input printed text?
1) OMR 2) OCR 3) MICR 4) Either 1) or 2) 5) Both 2) and 3)

366.In computer terminology, a compiler is


1) key punch operator
2) same as programmer
3) a program which translates a source program into object code
4) a source program
5) None of these

367.The best graphics reproduction is produced by


1) dot matrix printer 2) laser printer 3) ink jet printer
4) plotter 5) None of these

368.AND and NOT logical operations are performed in


1) ALU 2) control unit 3) registers 4) Either 1) or 2) 5) None of these

369.Ethernet uses
1) ring topology 2) bus topology 3) mesh topology 4) All the above 5) None of these

370.The single user operating system does not have


1) device management schedule 2) memory management schedule
3) CPU scheduling module 4) Only 2) and 3)
5) None of these

371.Computers send data to peripherals with the help of


1) modem 2) serial I/O interface
3) parallel I/O interface 4) All the above
5) None of these

372.Integrated Service Digital Network (ISDN) lines provide


1) Only voice circuits 2) Only data circuits
3) Both data and voice circuits 4) None of these
5) Only 1), 2) and 3)

373.A transaction file is a type of


1) data file 2) master file 3) access method 4) Only 2) and 3) 5) None of these

374.Which of the following programs is not a utility?


1) spooler 2) debugger 3) edition 4) Both 2) and 3) 5) Both 1) and 3)

375.The operating system manages


1) memory 2) processor 3) I/O devices 4) All of these 5) None of these

376.A network consists of interconnected


1) workstations 2) computers 3) servers 4) nodes 5) All the above

377.Which is not true for LAN?


1) It operates at higher speed than WAN.
2) It is a public network.
3) It is designed to work in limited geographical areas.
4) None of these
5) All the above

378.Which of the following is not a transmission medium?


1) modem 2) telephone lines 3) coaxial cables
4) satellite system 5) Either 2) or 3)
379.Faster data communication is possible using
1) optical fibre 2) coaxial cable 3) microwave transmission
4) None of these 5) Only 2) and 3)

380.The operation of a digital computer is based on ________ principle.


1) counting 2) electronic 3) logical 4) measuring 5) All the above

381.HTML viruses infect


1) your computer 2) a web page in HTML code
3) both 1) and 2) 4) Either 1) or 2)
5) Neither 1) nor 2)

382.The scrambling of code is known as


1) encryption 2) firewall 3) scrambling 4) password proofing 5) None of these

383.Which of the following moves the cursor one space to the right to put spaces in between words?
1) Control key 2) Space bar 3) Printer 4) Mouse 5) None of these

384.When your computer suddenly stops working, it is referred to as


1) crash 2) die 3) death 4) penalty 5) None of these

385.A program that works like a calculator for keeping track of money and making budgets, is called
1) Calculator 2) Spreadsheet 3) Budgeter 4) Financier 5) None of these

386.The most frequently used instructions of a computer program are likely to be fetched from
1) The hard disc 2) cache memory 3) RAM
4) registers 5) None of these

387.Verification of a login name and password is known as


1) configuration 2) accessibility 3) authentication 4) logging in 5) None of these

388.In a ring topology, the computer in possession of the ________ can transmit data.
1) packet 2) data 3) access method
4) token 5) None of these

389.You must install a/an ________ on a network if you want to share an Internet connection.
1) router 2) modem 3) node 4) cable 5) None of these

390.The system unit of a personal computer typically contains all of the following except
1) microprocessor 2) disk controller 3) serial interface
4) modem 5) None of these

391.A small or intelligent device is so called because it contains within it a


1) computer 2) microprocessor 3) programmable data
4) sensor 5) None of these

392.EPROM can be used for


1) erasing the contents of ROM
2) reconstructing the contents of ROM
3) 1) and 2)
4) duplicating ROM
5) None of these
393.The 16-bit microprocessor means that it has
1) 16 address lines 2) 16 buses 3) 16 data lines
4) 16 routes 5) None of these

394.What does SNMP stand for?


1) Simple Network Mail Protocol
2) Single Network Mail Protocol
3) Single Network Message Protocol
4) Simple Network Management Protocol
5) None of these

395.________ temporarily holds program instructions, data and output until they are no longer needed
by the computer.
1) Hard disk 2) Motherboard 3) CD 4) RAM 5) Floppy disk

396.Basic Input Output System (BIOS) is necessary for


1) boot-up 2) mouse and keyboard only 3) revolution
4) audio and video system 5) None of these

397.SQL stands for


1) Structured Query Language 2) Solution to Query Language
3) Sub Query Language 4) Structural Query Language
5) None of these

398.A hard drive consists of spinning ________ made up of aluminum or ceramic that is coated with
magnetic media.
1) plates 2) disks 3) relay 4) memories 5) platters

399.POST stands for


1) Positive Operating System Test 2) Particle Of Static Transfer
3) Power-On Self-Test 4) Printer Online Static Test
5) None of these

400.Which of the following is not an example of a virus?


1) Polymorphic 2) Logic Bombs 3) Worms 4) Tartan 5) Trojan

401.A database that spreads information across different tables while maintaining links between them is
referred to as
1) Relational database 2) Rotational database 3) Database connection
4) Tabular database 5) None of these

402.________ is a method of storing data on two or more hard drives that work in combination to do the
job for a larger drive.
1) DAID 2) RAID 3) Shadowing 4) Casting 5) MiniSD

403.C is a programming language developed for developing


1) LINUX Operating system 2) Windows NT
3) UNIX Operating system 4) Mac OS X
5) Windows ME

404.First RAM chip was introduced by which of the following?


1) Microsoft 2) Intel 3) Dell 4) HP 5) Apple

405.________ is a system that predates the World Wide Web for organising and displaying files on
internet servers.
1) HTML 2) SGML 3) Telnet 4) Gopher 5) None of these

406.A specialised network device that determines the next network point to which it can forward a data
packet towards the destination of the packet is commonly known as
1) bridge 2) router 3) switch 4) hub 5) repeater

407.Timing and control unit is a part of a(n)


1) ALU 2) Processor 3) Memory 4) CMOS 5) BIOS

408.Chip is the common name for a(n)


1) transistor 2) resistor 3) integrated circuit 4) semiconductor 5) None of these

409.Malicious software is known as


1) hardware 2) malware 3) malicious ware 4) illegal ware 5) None of these

410.Name the key that will erase information from the computer memory and characters on the screen.
1) Edit 2) Delete key 3) Dummy out 4) Trust key 5) None of these

411.________ determines the appearance of your desktop and controls the performance of your hardware.
1) Windows Explorer 2) Internet Explorer 3) Program file
4) Control Panel 5) System file

412.The processing capability of a microcomputer can be enhanced with the help of


1) secondary memory 2) additional processor 3) expansion card
4) buffer memory 5) None of these

413.Which view is not available in Microsoft Word 2007?


1) Outline 2) Full Screen 3) Page Break
4) Draft 5) Print Layout

414.The collection of commands is called


1) file 2) program 3) information
4) data 5) instruction

415.Recycle Bin enables you to restore a file which was deleted from
1) Drive B 2) Drive C 3) Drive K
4) Drive L 5) None of these

416.________ bar appears immediately below the title bar and provides access to pull-down menus.
1) Tool 2) Menu 3) Task 4) Status 5) None of these

417.By default, number entries are


1) rightied aligned 2) centred 3) left-aligned 4) merged 5) justified

418.________ process rearranges file fragments into contiguous files.


1) Folder folding 2) Defragmentation 3) Unfragging
4) Disk scanning 5) File filling

419.The memory card which is conceptually related to the smart card but is similar to the video disk, is
1) Master card 2) Visa card 3) Optical card 4) Laser card 5) Data card

420.The main advantage of magnetic disk compared to magnetic tape is


1) low cost 2) rigidity 3) direct access
4) high packet density 5) sequential access
421.Which of the following printers is used in conjunction with computers and uses dry ink powder?
1) Daisy wheel 2) Thermal printer 3) Line printer 4) Laser printer 5) Band printer

422.Another term for the Internet is


1) web 2) www 3) cyberspace 4) arpanet 5) None of these

423.Which of the following topologies is not of broadcast type?


1) Star 2) Bus 3) Ring 4) Mesh 5) Tree

424.Enterprise storage unit that uses DVD and CD discs as the storage medium is
1) library 2) data mart 3) jukebox 4) RAID 5) NAS

425.The function of the ‘home key’ in a microcomputer is


1) to interrupt executions 2) to reposition the cursor
3) to cancel the entry 4) to capitalise letters
5) to delete letters

426.A computer user obsessed with gaining entry into highly secured computer system is
called a(n)
1) Hacker 2) Attacker 3) Normal user 4) Cracker 5) Programmer

427.The programming team fixes program errors discovered by users during


1) program maintenance 2) nesting 3) documentation
4) developing 5) flowcharting

428.A data type used for nontextual data like pictures, sound and videos is called
1) Complex data type 2) OLE object data type 3) Memo data type
4) Simple data type 5) Yes/No data type

429.A(n) ________ is a system that is used for capturing knowledge from books and experienced
individuals making it available where needed.
1) expert system 2) executive information system
3) decision support system 4) knowledge management system
5) knowledge database

430.Computer’s language consisting of binary numbers that directly corresponds to its electrical state is
called
1) Natural 2) BASIC 3) Machine language
4) Assembly language 5) High level language

431.________ is a type of computer crime in which knowledgeable thieves remove some of the computer’s
RAM chips but leave enough to start the computer.
1) Memory shaving 2) Software piracy 3) Syn flooding
4) Cybergaming crime 5) None of these

432.The ________ is a portion of Internet that contains billions of documents.


1) internet 2) w3.org 3) www 4) information highway 5) None of these

433.Which of the following is not a program command?


1) READ 2) PRINT 3) PURGE 4) WRITE 5) GO TO

434.This chart shows the proportional size of items that make up a data series with respect to the sum of
the items:
1) Pie chart 2) Bar chart 3) Line chart 4) Column chart5) Scatter chart

435.GDI represents
1) Global Data Interface 2) Graphics Data Interface
3) Graphics Device Interface 4) Global Device Interface
5) None of these

436.A robot consists of three basic components: power supply, memory and
1) software 2) arm 3) micro computer 4) co-axial cable 5) None of these

437.Status indicators are located on the


1) standard toolbar 2) formatting toolbar 3) formula bar
4) vertical scrollbar 5) horizontal scrollbar

438.What is the acronym for Dual-In-Line Memory Module?


1) DIMM 2) DM 3) DMM 4) DILMM 5) None of these

439.Data division is the third division of a ________ program.


1) LISP 2) FORTH 3) COBOL 4) BASIC 5) PASCAL

440.________ file is created in Microsoft Excel.


1) Folder 2) Program 3) Data 4) Instruction 5) Local

441.The view that shows the maximum amount of information about each file in My Computer is called
1) small icons 2) large icons 3) medium icons 4) details 5) list

442.Error messages in an Excel sheet starts with _______ sign/symbol.


1) % 2) $ 3) # 4) = 5) –

443.In SIO2 the figure 2 appears lowered. Which effect has been applied?
1) Superscript 2) Laid down 3) Laid up 4) Lowered 5) Subscript

444.Dvorak is used with reference to


1) Printer 2) Monitor 3) Mouse 4) Keyboard 5) Adapter

445.Which of the following codes is written into serially accessed memory?


1) EOD code 2) Gray code 3) Bar code 4) Excess-3 code 5) Unicode

446.________ program is used to detect overall system malfunction.


1) System software 2) Application software 3) Utilities
4) System diagnostics 5) System analysis

447.To separate mechanism from policy ________ is used in operating system.


1) single-level implementation 2) two-level implementation
3) triple-level implementation 4) multi-level implementation
5) None of these

448.________ is the combination of keys to cut the selected text.


1) CTRL + X 2) CTRL + Y 3) CTRL + Z 4) CTRL + F 5) CTRL + P

449.A portion of disk that is unable to store data reliably is a


1) search utility 2) clean-up utility 3) bad section4) file manager 5) None of these
450.A unit of measurement, ________ is equal to approximately 1 septillion bytes.
1) Zetta byte 2) Yotta byte 3) Exa byte 4) Peta byte 5) Geop byte

451.Which of the following is used for broadband communications?


1) Cable modem 2) DSL modem 3) Satellite modem
4) All the above 5) None of these

452.________ a document means the file is transferred from your computer to another computer.
1) Downloading 2) Really simple syndication 3) Accessing
4) Upgrading 5) Uploading

453.A(n) ________ allows you to communicate over the internet similar to a newsgroup but is easier to
use.
1) forum 2) webmail 3) message board
4) webblog 5) None of these

454.A computer program used by search engine to roam the World Wide Web via the Internet, is
1) spimming 2) spider 3) specialised search engine
4) subject guide 5) None of these

455.A simple automated program that scans the web for specific data and insert into a designated
database.
1) Web mining 2) Web database integration 3) Web crawler
4) Web scanning 5) Web searching

456.In web searching a symbol or keyword that instructs the search software to make sure that any
retrieved records contain a certain word, is called
1) Data operator 2) Increment operator 3) Decrement operator
4) Inclusion operator 5) Search operator

457.Which of the following is a characterstic(s) of education software?


1) linked 2) interactive 3) dynamic 4) All the above 5) None of these

458.A(n) ________ is an open industry OS for data-enabled mobile phones that powers devices at the
lower end of smartphone price spectrum.
1) Symbian OS 2) Palm OS 3) Mac OS 4) iPhone OS 5) Unix OS

459.By which of the following methods can you print out the name and address of all members of your
dance club database?
1) A form 2) A filter 3) A report 4) A query 5) A directory

460.Date is generally entered in the form _______ in computer.


1) DD-YY-MM 2) YY-DD-MM 3) MM-YY-DD 4) MM-DD-YY 5) None of these

461.In addition to keying data directly into a database, data entry can also be done from a (an)
1) field 2) table 3) data dictionary 4) input form 5) None of these

462. A word processor is most likely to be used to do which of the following?


1) Doing a computer search in the media centre
2) Keeping an account of money spent
3) Maintaining an inventory
4) Typing a biography
5) None of these
463.Which of the following is a problem of file management system?
1) Lack of data independence 2) Data redundancy
3) Programme dependence 4) All the above
5) None of these

464. BASIC, ALGOL and COBOL are the examples of


1) high level language 2) low level language
3) middle level language 4) All the above
5) None of these

465. Buffering in printers is necessary because


1) computer is faster in generating data for printing than the printer can print it.
2) there is not enough memory provided with printers.
3) it is only to make the printer work for a longer period.
4) Both 1) and 2)
5) None of these

466.Assembly instructions are in the form of


1) binary digits 2) digits and numbers 3) general English
4) a new format different from all the above 5) None of these

467.Compilers are
1) both OS - and hardware-dependent 2) only OS-dependent
3) only hardware-dependent 4) All the above
5) None of these

468.Which of the following is/are an interpreted language(s)?


1) C 2) C++ 3) Java 4) Visual Basic 5) All the above

469. To indicate decision point in a program, a(n) ________-shaped symbol is used.


1) circle 2) rectangle 3) diamond 4) ellipse 5) parallelogram

470. Thesaurus option is available on ________ menu.


1) page layout 2) references 3) review 4) view 5) layout

471.________ register holds the data to be operated upon, the intermediate results and the result of
processing.
1) Instruction 2) I/O 3) Accumulator 4) Program Counter 5) Memory Buffer

472. Turn off computer dialog box does not contain ________ option.
1) stand by 2) switch user 3) turn off 4) cancel 5) restart

473.To handle ‘lost’ and ‘out-of-sequence’ packet, which of the following layers is responsible?
1) Network layer 2) Transport layer
3) Application layer 4) Session layer
5) Presentation layer

474. To run desktop OS and applications inside virtual machine ________ is used.
1) VGA 2) VDI 3) DVI 4) VGI 5) None of these

475.Which of the following terms is used to describe the connection of networks that can be joined
together?
1) Virtual Private Network 2) Internet 3) Intranet 4) Extranet 5) None of these
476. DML is provided for
1) description of logical structure of database.
2) addition of new structures in the database system.
3) manipulation and processing of database.
4) definition of physical structure of the database system.
5) None of these

477.A polymorphic virus


1) modifies its program code each time it attaches itself to another program or file.
2) is a malicious-logic program that copies itself repeatedly in memory or on a disk drive until no
memory or disk space remains.
3) is a malicious-logic program that hides within or looks like a legitimate program.
4) infects a program file, but still reports the size and creation date of the original, uninfected program.
5) None of these

478.Name the equipment which holds the screen of a computer?


1) Modem 2) Video 3) Scanner 4) Desktop 5) Monitor

479. Which of the following is first-generation cellular technology?


1) GSM 2) DAMPS 3) CDMA 4) AMPS 5) EAMPS

480. A container used to display a set of tabbed pages of elements is known as


1) pop-up helper 2) tab row 3) address bar
4) tab box 5) None of these

481. Storage that loses its data after the power is turned off is referred to as
1) non-volatile storage 2) sequential storage
3) volatile storage 4) direct storage
5) random storage

482.The most common binary code used today is


1) BCD 2) Unicode 3) EBCDIC 4) ASCII 5) Gray code

483. Magnetic strip reader is a type of ________ device.


1) input 2) output 3) input/output 4) storage 5) None of these

484. Which of the following is not an option for changing the case of text?
1) Indent case 2) Sentence case 3) Toggle case 4) Lower case 5) Upper case

485. WAV, WMA and AIFF are examples of


1) encoder programs 2) audio file formats
3) text file formats 4) audio editing software
5) None of these

486.What is the name of the logic circuit which can add more than two binary digits?
1) Half adder 2) Parallel adder 3) Full adder 4) Serial adder 5) Substracter

487. You must instal a ________ on a network if you want to share an Internet connection.
1) router 2) modem 3) node 4) cable 5) None of these

488. The system unit of a personal computer typically contains all of the following except
1) microprocessor 2) disk controller
3) serial interface 4) modem
5) None of these
489. The view that shows the maximum amount of information about each file in My Computer is called
1) small icons 2) large icons 3) medium icons 4) details 5) list

490. Error messages in an Excel sheet start with ________ sign/symbol.


1) % 2) $ 3) # 4) = 5) –

491. The________of software contains lists of commands and options.


1) menu bar 2) tool bar 3) title bar 4) formula bar 5) None of these

492.A________can make it easier to play games.


1) mouse 2) joystick 3) keyboard 4) pen 5) None of these

493. Video processor consists of ________ and ________, which store and process images.
1) CPU and VGA 2) CPU and memory
3) VGA and memory 4) VGI and DVI
5) None of these

494. Fax is an example of ________ channel.


1) Full duplex 2) Half-duplex 3) Simplex 4) Both 1) and 2) 5) None of these

495.The ________ manual tells you how to use a software program.


1) documentation 2) programming 3) technical 4) user 5) None of these

496.Which of the following is NOT a type of Broadband Internet connection?


1) Cable 2) DSL 3) Dial-up 4) Satellite 5) None of these

497. Something which has easily-understood instructions is said to be


1) user-friendly 2) information 3) word processing 4) icon 5) None of these

498. Microcomputer hardware consists of which of the following three basic categories of physical
equipment?
1) Keyboard, monitor, hard drive
2) System unit, input/output, memory
3) System unit, input/output, secondary storage
4) System unit, primary storage, secondary storage
5) None of these

499. The components that process data are located in the


1) input devices 2) output devices 3) system unit 4) storage component 5) None of these

500. Processing involves


1) inputting data into a computer system
2) transforming input into output
3) displaying output in a useful manner
4) providing relevant answers
5) None of these

501.To make a notebook act as a desktop model, the notebook can be connected to a________ which
is connected to a monitor and other devices.
1) bay 2) docking station 3) port 4) network 5) None of these

502. To print an individual item in a file immediately click


1) SHIFT+P 2) CTRL+P 3) ALT+P 4) ESC+P 5) None of these
503. System software is the set of programs that enables your computer’s hardware devices and ________
software to work together.
1) management 2) processing 3) utility 4) application 5) None of these

504.Find the odd man out.


1) Interpreter 2) Operating System 3) Compiler 4) Assembler 5) None of these

505. Which of the following is the key function of a firewall?


1) Monitoring 2) Deleting 3) Copying 4) Moving 5) None of these

506. A(n) ________ converts and executes one statement at a time.


1) compiler 2) interpreter 3) converter 4) instructions 5) None of these

507. The primary device that a computer uses to store information is


1) TV 2) storehouse 3) desk 4) hard drive 5) None of these

508. ________ is program that works like a calculator for keeping track of money and making budgets.
1) Calculator 2) Spreadsheet 3) Budgeter 4) Financier 5) None of these

509. ‘Spelling and Grammar’ check option in Word document 2007 is available in ________ menu.
1) Home 2) Mailing 3) View 4) Review 5) Page layout

510. Computer’s BIOS is stored in


1) ROM 2) RAM 3) Hard disk 4) Flopy drive 5) None of these

ANSWERS

1. 1 2. 4 3. 4 4. 3 5. 4
6. 2 7. 4 8. 2 9. 1 10. 3
11. 1 12. 5 13. 2 14. 3 15. 3
16. 1 17. 2 18. 4 19. 1 20. 3
21. 4 22. 3 23. 1 24. 2 25. 2
26. 2 27. 3 28. 1 29. 1 30. 2
31. 4 32. 2 33. 3 34. 4 35. 2
36. 2 37. 3 38. 2 39. 1 40. 1
41. 4 42. 2 43. 3 44. 4 45. 2
46. 2 47. 1 48. 2 49. 3 50. 4
51. 4 52. 4 53. 2 54. 3 55. 2
56. 4 57. 2 58. 2 59. 3 60. 4
61. 4 62. 3 63. 1 64. 4 65. 2
66. 1 67. 4 68. 2 69. 2 70. 1
71. 4 72. 2 73. 1 74. 4 75. 3
76. 3 77. 3 78. 4 79. 2 80. 2
81. 2 82. 2 83. 3 84. 4 85. 3
86. 4 87. 2 88. 4 89. 2 90. 3
91. 1 92. 3 93. 1 94. 5
95. 3;A Megabyte (MB) is a unit of measurement used to quantify computer memory and storage. One
megabyte is the equivalent of approximately one million bytes and one thousand kilobytes (the exact
conversion is 1 megabyte = 10,48,576 bytes and 1,024 kilobytes in binary measurement).
Megabytes are also used to describe the size of digital files and images as well as capacity of digital
storage units. A megabytes is often referred to as a ‘Meg’ in Computer Vernacular.
96. 1 97. 4 98. 1 99. 1 100. 3
101. 4 102. 2 103. 2 104. 2 105. 1
106. 2 107. 3 108. 2 109. 5 110. 2
111. 3 112. 2 113. 1 114. 3 115. 2
116. 3 117. 5 118. 1 119. 1 120. 1
121. 3 122. 1 123. 3 124. 2 125. 2
126. 1 127. 1 128. 1 129. 4 130. 2
131. 2 132. 1 133. 3 134. 1 135. 3
136. 2 137. 3 138. 1 139. 4 140. 1
141. 1 142. 2 143. 4 144. 3 145. 2
146. 2 147. 2 148. 1 149. 2 150. 4
151. 1 152. 4 153. 2 154. 2 155. 4
156. 2 157. 4 158. 3 159. 3 160. 4
161. 2 162. 3 163. 1 164. 4 165. 3
166. 4 167. 3 168. 3 169. 2 170. 1
171. 4 172. 5 173. 2 174. 2 175. 1
176. 3 177. 3 178. 3 179. 2 180. 2
181. 5
182. 2;In candidate key, one key is considered as a primary key.
183. 1
184. 4; Bridge is applicable in physical as well as data link layer.
185. 5 186. 2 187. 1 188. 1
189. 3; Value Added Network (VAN) service carries electronic mail, access to commercial databases.
190. 3; Assembly language comes under low level language.
191. 2 192. 1 193. 3 194. 4 195. 4
196. 2 197. 1 198. 1 199. 4 200. 2
201. 4 202. 4 203. 1 204. 2 205. 4
206. 3 207. 1 208. 4 209. 3 210. 4
211. 3 212. 1 213. 2 214. 1 215. 3
216. 1 217. 4 218. 2 219. 4 220. 1
221. 1 222. 1 223. 1 224. 3 225. 1
226. 2 227. 3 228. 3 229. 1 230. 1
231. 2 232. 1 233. 4 234. 2 235. 2
236. 4 237. 2 238. 2 239. 1 240. 2
241. 2 242. 1 243. 5 244. 1 245. 2
246. 2 247. 3 248. 3 249. 1 250. 2
251. 2 252. 3 253. 2 254. 3 255. 4
256. 3 257. 3 258. 3 259. 3 260. 1
261. 5 262. 2 263. 2 264. 3 265. 4
266. 3 267. 3 268. 3 269. 2 270. 3
271. 5 272. 4 273. 2 274. 2 275. 4
276. 3 277. 2 278. 3 279. 4 280. 5
281. 4 282. 3 283. 4 284. 5 285. 3
286. 4 287. 3 288. 3 289. 1 290. 4
291. 4 292. 2 293. 5 294. 4 295. 4
296. 4 297. 4 298. 2 299. 4 300. 1
301. 3 302. 4 303. 5 304. 3 305. 4
306. 4 307. 4 308. 3 309. 2 310. 1
311. 1 312. 1 313. 3 314. 4 315. 5
316. 5 317. 3 318. 5 319. 4 320. 1
321. 4 322. 4 323. 3 324. 2 325. 1
326. 2 327. 1 328. 3 329. 1 330. 4
331. 4 332. 5 333. 2 334. 3 335. 2
336. 3 337. 4 338. 3 339. 2 340. 3
341. 2 342. 3 343. 5 344. 3 345. 4
346. 2 347. 4 348. 2 349. 3 350. 3
351. 4 352. 1 353. 4 354. 4 355. 2
356. 1 357. 2 358. 2 359. 1 360. 3
361. 3 362. 3 363. 1 364. 1 365. 2
366. 3 367. 2 368. 1 369. 2 370. 3
371. 3 372. 3 373. 1 374. 1 375. 4
376. 1 377. 2 378. 1 379. 1 380. 3
381. 5 382. 1 383. 2 384. 1 385. 2
386. 2 387. 3 388. 4 389. 1 390. 4
391. 4 392. 3 393. 3 394. 4 395. 4
396. 1 397. 1 398. 5 399. 3 400. 4
401. 1 402. 2 403. 3 404. 2 405. 4
406. 2 407. 2 408. 3 409. 2 410. 2
411. 4 412. 3 413. 3 414. 2 415. 2
416. 2 417. 1 418. 2 419. 4 420. 3
421. 4 422. 3 423. 3 424. 3 425. 2
426. 4 427. 1 428. 2 429. 4 430. 3
431. 1 432. 3 433. 5 434. 1 435. 3
436. 2 437. 3 438. 1 439. 4 440. 3
441. 4 442. 3 443. 5 444. 4 445. 1
446. 4 447. 2 448. 1 449. 3 450. 2
451. 4 452. 5 453. 3 454. 2 455. 3
456. 4 457. 4 458. 1 459. 3 460. 4
461. 4 462. 4 463. 4 464. 2 465. 4
466. 5 467. 1 468. 5 469. 3 470. 3
471. 3 472. 2 473. 2 474. 2 475. 2
476. 3 477. 1 478. 5 479. 4 480. 4
481. 3 482. 4 483. 1 484. 1 485. 2
486. 3 487. 1 488. 4 489. 4 490. 3
491. 1 492. 2 493. 3 494. 2 495. 4
496. 3 497. 1 498. 2 499. 3 500. 2
501. 2 502. 2 503. 4 504. 2 505. 1
506. 2 507. 4 508. 2 509. 4 510. 1
DreamBigInstitution.com

You might also like