1. Superscript,
subscript, outline, emboss, engrave are known as
(a) font styles
(b) font effects
(c) word art
(d) text effects
(e) None of these
Ans : (b)
2. Shimmer, Sparkle
text, Blinking Background etc. are known as
(a) font styles
(b) font effects
(c) word art
(d) text effects
(e) None of these
Ans : (d)
3. Which of the
following is not available in Font Spacing?
(a) Normal
(b) Loosely
(c) Condensed
(d) Expanded
(e) None of these
Ans : (b)
4. Bold, Italic,
Regular are known as
(a) font styles
(b) font effects
(c) word art
(d) text effects
(e) None of these
Ans : (a)
5. If you begin
typing an entry into a cell and then realize that you don’t want your entry
placed into a cell, you :
(a) Press the Erase key
(b) Press Esc
(c) Press the Enter button
(d) Press the Edit Formula button
(e) None of these
Ans : (b)
6. Which of the
following will not cut information?
(a) Pressing Ctrl + C
(b) Selecting Edit > Cut from the menu
(c) Clicking the Cut button on the standard
(d) Pressing Ctrl + X
(e) None of these
Ans : (a)
7. Computer connected
to a LAN (Local Area Network) can
(a) run faster
(b) go on line
(c) share information and /or share peripheral equipment
(d) E-mail
(e) None of these
Ans : (c)
8. A self replicating
program, similar to a virus which was taken from a 1970s science fiction novel
by John Bruner entitled the Shockwave Rider is………….
(a) Bug
(b) Vice
(c) Lice
(d) Worm
(e) None of these
Ans : (d)
9. Unwanted
repetitious messages, such as unsolicited bulk e-mail is known as
(a) Spam
(b) Trash
(c) Calibri
(d) Courier
(e) None of these
Ans : (a)
10. COBOL is widely used
in………. applications
(a) Commercial
(b) Scientific
(c) Space
(d) Mathematical
(e) None of these
Ans : (a)
11. VDU is also
called
(a) Screen
(b) Monitor
(c) Both (a) & (b) & (d) Printer
(d) None of these
Ans : (c)
12. What kind of
software would you most likely use to keep track of billing account?
(a) Word Processing
(b) Electronic Publishing
(c) Spreadsheet
(d) Web authoring
(e) None of these
Ans : (c)
13. Test the validity
of the statements?
(a) 1 KB = 1024 BYTES
(b) 1 MB = 2048 BYTES
(c) 1 MB = 1000 KILOBYTES
(d) 1 KB = 1000 BYTES
(e) None of these
Ans : (a)
14. Which of the
following is not a computer language?
(a) BASIC
(b) C++
(c) C#
(d) Java
(e) Microsoft
Ans : (e)
15. Which among the
following is a correct definition of “Digital Divide”?
(a) Gap between people having access to mobile and internet access
(b) Gap between people having access to internet/IT and no internet/IT
(c) Gap between people having access to broadband and narrowband internet
(d) Gap between people having access to internet banking and normal banking
(e) Gap between the people having an email account and no email account
Ans : (b)
16.Now a days Vishing
has become a criminal practice of using social engineering over which of the
following?
(a) Social networking sites
(b) Mobile Phones
(c) E-mails
(d) Cyber cafes
(e) All of these
Ans : (b)
17. What is the
fullform of W3C?
(a) World Wide Web Consortium
(b) World Wide Web Company
(c) World Wide Web Center
(d) World Wide Web Command
(e) None of these
Ans : (a)
18. In the MICR Code
Line Structure what do represent the first three digits of Sort field number
consisting of nine digits?
(a) City
(b) Bank
(c) Branch
(d) Account Type
(e) None of these
Ans : (a)
19. Most of the
internet banking sites provide which of the following feature to reduce the
risk of keystroke logging for the password entry?
(a) Virtual keyboard
(b) Finger Touching
(c) Touchscreen
(d) ShapeWriter
(e) Dasher
Ans : (a)
20. ADSL data
communications technology uses which of the following for faster data
transmission?
(a) Voiceband modem
(b) Wireless Modem
(c) Copper telephone Lines
(d) Sockets
(e) None of these
Ans : (c)
21. What is the
purpose of keeping electronic devices such as computers, televisions, and
remote controlled devices on Sleep mode?
(a) Reduce Power consumption
(b) Back up
(c) To write contents of RAM to hard disc
(d) To improve download speed
(e) None of these
Ans : (a)
22. What is the
ultimate purpose of Defragmentation?
(a) Make the PC faster
(b) Create More Free Space
(c) Delete temporary files
(d) Reduce Power consumption
(e) All of these
Ans : (b)
23. The purpose of
the primary key in a database is to :
(a) unlock the database
(b) provide a map of the data
(c) uniquely identify a record
(d) establish constraints on database operations
(e) None of these
Ans : (b)
24. The design of the
network is called the network :
(a) architecture
(b) server
(c) transmission
(d) type
(e) None of these
Ans : (a)
25. The most
frequently used instructions of a computer program are likely to be fetched
from :
(a) the hard disk
(b) cache memory
(c) RAM
(d) registers
(e) None of these
Ans : (b)
No comments:
Post a Comment