QUESTION 1
Which of the following hardware component is/are the
most important for the operation of database
management system?
(a) High resolution video display
(b) Printer
(c) High speed, large capacity disk
(d) Plotter
QUESTION 2
Which of the following is described as a stored link of
a webpage designed to give quicker access later?
(a) Hyperlink
(b) Bookmark
(c) URL
(d) HTTPS
QUESTION 3
Which among the following is an important circuitry
in a computer system that directs the operation of the
processor?
(a) Address Bus
(b) Accumulator
(c) ALU
(d) Control Unit
QUESTION 4
The process is to check and ensure the components of
the computer are operating and connected properly is
known as ______
(a) Repairing
(b) Checking
(c) Paring
(d) Booting
QUESTION 5
UDP and TCP are categorized under the ___layer of the
OSI model.
(a) Data link
(b) Application
(c) Network
(d) Transport
QUESTION 6
Which of the following key is used in the Operating
system to display or hide the start menu?
(a) Windows Logo
(b) Windows logo + Break
(c) Windows Logo + D
(d) Windows Logo + M
QUESTION 7
A is a device that not only provides surge protection,
but also furnishes your computer with battery backup
power during a power outage________
(a) USB
(b) UPS
(c) URC
(d) Battery Strip
QUESTION 8
Convert (960)10 to Hexa-decimal -------------- .
(a) (3C0)16
(b) (4A0)16
(c) (1D0)16
(d) (6C0)16
QUESTION 9
Which of the following key combination can be used to
open task manager?
(a) Ctrl + Shift + ESC
(b) Ctrl + Shift + Tab
(c) Ctrl + Shift + O
(d) Ctrl + Shift + T
QUESTION 10
Any source program on a computer is written with the
help of which among the following languages?
(a) Assembly language
(b) Source code
(c) HTML
(d) High Level Language
QUESTION 11
What type of web technology allows its community
members to continuously change the contents on a
web site?
(a) Web crawler
(b) Social networks
(c) Wiki
(d) Blog
QUESTION 12
______________ is a form of fraud in which an attacker
masquerades as a reputable entity or person in email
or other form of communication.
(a) Pharming
(b) Phishing
(c) Redirecting
(d) Hijacking
QUESTION 13
__________ network is created when two or more PCs
are connected and share resources without going
through a separate server computer
(a) P2P
(b) Extranet
(c) Peer-to-peer
(d) Both (a) and (c)
QUESTION 14
ICMP stand for
(a) Internet Control Massage Protocol
(b) Internet Control Master Protocol
(c) Internet Communication Massage Protocol
(d) Internet Control Main Protocol
QUESTION 15
Which of the following statements is/are true?
(a) Cache memories are bigger than RAM
(b) Cache memories smaller than RAM
(c) ROM is faster than RAM
(d) Information in ROM can be written by users
QUESTION 16
By an intranet we mean:
(a) A LAN of an organization
(b) A Wide Area Network connecting all branches of an
organization
(c) A corporate computer networks
(d) A network connecting all computers of an organization
and using the internet protocol
QUESTION 17
Which of the following is true about Assembly
language?
(a)It is an Object-Oriented Programming Language
(b)It is a High-level programming language
(c)It is a low-level programming language
(d)It is a language for assembling computers
QUESTION 18
WORM stands for?
(a)Write Once Read Many
(b)Wanted Once Read Memory
(c)Wanted Original Read Memory
(d)Write Original Read Memory
QUESTION 19
Where does encryption and decryption of data take
place in OSI model?
(a)Transport layer
(b)Presentation layer
(c)Session layer
(d)Application layer
QUESTION 20
When a computer is turned on, which of the following
is run by BIOS in order to check whether all the
hardware components are working properly?
(a)Booting
(b)Warm Booting
(c)Cold Booting
(d)Power on Self-Test
QUESTION 21
A commonly used graphic format for the Web is ______.
(a)GIF
(b)BMP
(c)TXT
(d)LMP
QUESTION 22
Which of the following features is used to count the
number of pages, words, characters, paragraphs and
lines in a Word document?
(a)Orientation
(b)Page Count
(c)Word Count
(d)Margin
QUESTION 23
What are responsible for storing permanent data and
instructions?
(a)RAM chips
(b)ROM chips
(c)DRAM chips
(d)All of the above
QUESTION 24
Artificial Intelligence is associated with which
generation?
(a)Fourth Generation
(b)Second Generation
(c)Third Generation
(d)Fifth Generation
QUESTION 25
What is a specialized software program that allows
input and output devices to communicate with the
rest of the computer system?
(a)Utility driver
(b)Utility program
(c)Data compression utility
(d)Device driver
QUESTION 26
What is periodically adding, changing and deleting file
records called?
(a)renewing
(b)upgrading
(c)restructuring
(d)updating
QUESTION 27
Java was introduced by which among the following
organisation?
(a)Sun Microsystem
(b)IBM
(c)Intel
(d)Microsoft
QUESTION 28
Word processing, spreadsheet, and photo-editing are
examples of which type of software?
(a)Application software
(b)System software
(c)Operating system software
(d)Platform software
QUESTION 29
Which of the following technologies is used in
answer sheets to check them electronically?
(a)MICR
(b)OMR
(c)OCR
(d)Bar code
QUESTION 30
Which of the following is related to simplex
communication?
(a)Single wire and two-sided communication
(b)Television
(c)Two-wire communication
(d)Walkie-talkie
QUESTION 31
Which of the following device enabling data transfer
between two different networks?
(a) Plotter
(b) Bridge
(c) Gateway
(d) Path
QUESTION 32
What is the default the cell content alignment in
Excel?
(a) Left aligned
(b) Centrally aligned
(c) Text left aligned and numbers right aligned
(d) Text right aligned and numbers left aligned
QUESTION 33
Which of the following is used to switch between open
programs?
(a) Alt+tab
(b) Ctrl+tab
(c) Shift+tab
(d) Ctrl+Alt
QUESTION 34
What is the main protocol used to access data on
WWW?
(a) FTP
(b) HTML
(c) HTTP
(d) SMTP
QUESTION 35
IP address [Link] belong to:
(a) Class A
(b) Class B
(c) Class D
(d) Class E
QUESTION 36
Which of the following is a single communication
channel that is shared by all the users on the
network?
(a) Point-to-Point
(b) Broadcast Network
(c) Protocol
(d) PAN
QUESTION 37
Which of the following is not a type of database?
(a) Hierarchical
(b) Relational
(c) Network
(d) Transition
QUESTION 38
Convert (126)8 to decimal -------------- .
(a) (84)10
(b) (83)10
(c) (86)10
(d) (87)10
QUESTION 39
In MS Word 2010 the feature for Word Count is
available in Proofing under which of the following tab?
(a) Home
(b) Review
(c) Insert
(d) View
QUESTION 40
Which among the following can control the look of
your entire presentation including font, colour,
background, effects and everything else?
(a) Handout Master
(b) Slide Master
(c) Slide Show
(d) Thesaurus
QUESTION 41
What is a hyperlink?
(a) It is a text or image that you can click on to jump to a
new document/page.
(b) It is an input type for multimedia files.
(c) It is a collection or directory of web pages.
(d) It is the home page of a site.
QUESTION 42
Identify the odd term among the following groups.
(a) Optical fiber
(b) Co-axial cable
(c) Twisted pair wire
(d) Micro waves
QUESTION 43
In second generation, which type of primary memory
was used to store data?
(a) Paper tapes
(b) IC
(c) Magnetic core
(d) Magnetic tape
QUESTION 44
The term attribute refers to a ___________ of a table.
(a) Record
(b) Column
(c) Tuple
(d) Key
QUESTION 45
Which type of computer could be found in a
digital watch?
(a) Mainframe
(b) Super computer
(c) Embedded computer
(d) Notebook computer
QUESTION 46
The point at which the flow of text in a document
moves to the top of a new page–
(a) Page insert
(b) Page break
(c) Page format
(d) All of the above
QUESTION 47
To delete the selected item permanently, which of the
following shortcut key combination should be used?
(a) Alt + Delete
(b) Shift + D
(c) Shift + Delete
(d) Alt + D
QUESTION 48
In the given 4 words listed below, which is the odd
one out?
(a) Applications
(b) Peripherals
(c) Programs
(d) Software
QUESTION 49
What key uniquely identifies a record in a database
table?
(a) Main key
(b) Principal key
(c) Foreign key
(d) Primary key
QUESTION 50
What is SQL?
(a) Language used to communicate with database
(b) Language used for object oriented programming
(c) Language used to program system software
(d) Language used to hack into other systems