Sunday, 13 December 2020

General Computer Test - 143

 

1. The operation of combining two cells into a single cell in Excel is referred to as

(1) join cells

(2) merge cells

(3) merge table

(4) join table

(5) None of these

ANSWER:2

2. Which of the following can be used to store a large number of files in a small amount of storage space?

(1) File adjustment

(2) File copying

(3) File reading

(4) File compatibility

(5) File compression

ANSWER:5

3. In a computer, most processing takes place in

(1) memory

(2) RAM

(3) motherboard

(4) CPU

(5) None of these

ANSWER:4

4. Data is organized in a worksheet as

(1) charts and diagrams

(2) rows and columns

(3) tables and boxes

(4) graphs

(5) None of the above

ANSWER:2

5. Which of the following is an example of a binary number?

(1) 6AH1

(2) 100101

(3) 005

(4) ABCD

(5) 23456

ANSWER:2

6. Spell Check will find errors in which of the following?

(1) Today is a rainy day

(2) Today is a rainy a day

(3) Is a rainy

(4) Rainy today a day

(5) None of the above

ANSWER:5

7. Which of the following is not a storage medium?

(1) Hard disk

(2) Flash drive

(3) DVD

(4) CD

(5) Keyboard

ANSWER:5

8. In Excel, when the contents and attributes of a cell or range of cells have to be erased using the menu, the user must

(1) select the Cells. choose Edit. and select Clear, then All

(2) select the Cells. and click Delete on the keyboard

(3) select the Cells. choose Tools. and select Clear. then Formats

(4) select the Cells. choose Tools. and select Formula Audit. then Delete

(5) None of the above

ANSWER:1

9. The computer abbreviation KB usually means

(1) Key Block

(2) Kernel Boot

(3) Kilo Byte

(4) Kit Bit

(5) None of these

ANSWER: 3

10. If an Excel Worksheet is to be linked for use in a PowerPoint presentation, the following should be clicked

(1) Edit, Paste Special

(2) Edit, Paste

(3) Edit, Copy

(4) File, Copy

(5) None of the above

ANSWER: 2

11. RAM stands for

(1) Random Access Memory

(2) Ready Application Module

(3) Read Access Memory

(4) Remote Access Machine

(5) None of the above

ANSWER: 1

12. Which of the following is the hardware and not the software? .

(1) Excel

(2) Printer driver

(3) Operating system

(4) Powerpoint

(5) Control Unit

ANSWER:5

13. In Word, which menu would the user select to print a document?

(1) Tools

(2) File

(3) View

(4) Wind0Vob

(5) None of these

ANSWER: 2

14. Which of the following is not true about computer files?

(1) They are collections of data saved to a Storage medium

(2) Every file has a filename

(3) A file extension is established by the user to indicate the date it was created

(4) Usually files contain data

(5) None of the above

ANSWER:5

15. The common name for a modulator-demodulator is

(1) modem

(2) joiner

(3) networker

(4) connector

(5) demod

ANSWER: 1

16. What do you see when you click the right mouse button?

(1) The same effect as the left click

(2) A special menu

(3) No effect

(4) A mouse cannot be right clicked

(5) Computer goes to sleep mode

ANSWER:2

17. In order to choose the font for a sentence in a Word document,

(1) select Font in the Format menu

(2) select Font in the Edit menu

(3) select Font in the Tools menu

(4) select Font in the Insert menu

(5) None of the above

ANSWER:1

18. The ALU performs .......... operations.

(1) logarithm-based

(2) ASCII

(3) algorithm-based

(4) arithmetic

(5) None of the above

ANSWER:4

19. Excel is a program that is used to prepare a

(1) Database

(2) Text Document

(3) Spreadsheet

(4) Slide Presentation

(5) None of the above

ANSWER:3

20. .......... consists of volatile chips that temporarily store data or instructions.

(1) CPU

(2) ROM

(3)RMA

(4) RAM

(5) None of these

Q.21 Which of the following is not an scripting language ?

(A) HTML

(B) XML

(C) Postscript

(D) Javascript

Ans: C Postscript

Q.22 Which of the following is a platform free language

(A) Fortran

 (B) Assembly

(C) C

(D) Java

Ans: D Java

Q.23 A digital signature is

(A) scanned signature

 (B) signature in binary form

(C) encrypting information

 (D) handwritten signature

Ans: C encrypting information

Q.24 Mechanism to protect private networks from outside attack is

(A) Firewall

 (B) Antivirus

(C) Digital signature

(D) Formatting

Ans: A Firewall

Q.25 A computer system that permits multiple users to run programs at same time

(A) Real time system

(B) Multi programming system

(C) Time sharing system

 (D) Multi tasking system

Ans: D Multi tasking system

No comments:

Post a Comment