Friday, 11 December 2020

General Computer Test - 87

 

1. CRT stands for

(a)    Cathode Ray tube

(b)    Cathodic ray tube

(c)     Cathode ray tub

(d)    Cathodic ray tub

(e)    None of these

Ans : (a)

2. What is the meaning of ‘justified text’?

(a)    the text headings are all in the same style

(b)    all four margins on the page are the same size

(c)     the text aligns with both the right and left margins

(d)    the text is the maximum size that will fit on a page

(e)    None of these

Ans : (c)

3. To identify a document, it is helpful to include the file name on each page as a

(a)    header/footer

(b)    bibliography

(c)     find/search

(d)    macro

(e)    None of these

Ans : (a)

4. What is the purpose of providing a Drafts folder in an email system?

(a)    to store spam email

(b)    to save unsent emails

(c)     to store deleted emails

(d)    to save a copy of sent emails

(e)    None of these

Ans : (b)

5. Which of the following is an acceptable way to shut down the computer?

(a)    press the reset button

(b)    turn the computer off at the power point

(c)     select the ‘Shut down’ option from a menu

(d)    pull the power card from the back of the computer

(e)    None of these

Ans : (c)

6. By an intranet we mean

(a)    a LAN of an organization

(b)    a Wide Area Network connecting all branches of an organization

(c)     a corporate computer network

(d)    a network connecting all computers of an organization and using the internet protocol

(e)    None of these

Ans : (d)

7. Computer which are made of integrated circuits

(a)    Digital

(b)    Analog

(c)     Mechanical

(d)    All of these

(e)    None of these

Ans : (a)

8. An error in software or hardware is called a bug. What is the alternative computer jargon for it?

(a)    Leech

(b)    Squid

(c)     Slug

(d)    Glitch

(e)    None of these

Ans : (d)

9. Bold, italics and underline are features used in many programs. To which of the following items can these features be applied?

(a)    files

(b)    text

(c)     pictures

(d)    windows

(e)    None of these

Ans : (b)

10. All of the following are basic principles of net works, except

(a)    each computer must have a network card

(b)    there must be communications media connecting the network hardware devices

(c)     there must be at least one connecting device

(d)    each computer must have software that supports the movement of information

(e)    None of these

Ans : (b)

11. A passive threat to computer security is

(a)    Malicious Intent

(b)    Sabotage

(c)     Accident Errors

(d)    Espionage Agents

(e)    None of these

Ans : (a)

12. Voice mail

(a)    is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet

(b)    permits users to converse in real time with each other via the computer while connected to the Internet

(c)     functions much like an answering machine, allowing callers to leave a voice message for the called party

(d)    involves using video and computer technology to conduct a meeting between participants at geographically separate locations

(e)    None of these

Ans : (c)

13. A(n) allows network users to share a single copy of software, which resides on the network server.

(a)    single-user license agreement

(b)    network site license

(c)     end-user license agreement

(d)    business software license

(e)    None of these

Ans : (b)

14. Which of the following is a general purpose programming language, designed by Sun Microsystems?

(a)    VB Script

(b)    Java Script

(c)     CSS

(d)    Linux

(e)    None of these

Ans : (b)

15. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is

(a)    Bridge

(b)    Gateway

(c)     Router

(d)    Modem

(e)    None of these

Ans : (b)

16. ......allows wireless mobile devices to access the Internet and its services such as the Web and e-mail

(a)    TCP/IP

(b)    Ethernet

(c)     WAP

(d)    WiFi

(e)    None of these

Ans : (c)

17. Which device cannot be shared in network?

(a)    Floppy

(b)    Keyword

(c)     Computer

(d)    Printer

(e)    None of these

Ans : (b)

18. Which port doesn’t exist in computer?

(a)    UBS port

(b)    Parallel port

(c)     Printer port

(d)    Computer port

(e)    None of these

Ans : (d)

19. The browser’s………..keeps a list of web pages you have visited during the current session.

(a)    history

(b)    cache

(c)     favorites

(d)    trail

(e)    None of these

Ans : (a)

20. Which of the following identifies a specific web page and its computer on the Web?

(a)    Web site

(b)    Web site address

(c)     URL

(d)    Domain Name

(e)    None of these

Ans : (d)

21. The type of software that can store, update, manipulate, and retrieve data is called

(a)    desktop publishing

(b)    spreadsheet

(c)     database management

(d)    graphics

(e)    None of these

Ans : (c)

22. Which application is not typically included in an MS Office suite?

(a)    word processor

(b)    spreadsheet

(c)     antivirus

(d)    database

(e)    None of these

Ans : (c)

23.  .......is the time needed by the CPU to recognize (not service) an interrupt request

(a)    Interrupt Latency

(b)    Response Deadline

(c)     Timer delay

(d)    Throughput

(e)    None of these

Ans : (a)

24. What is the transfer rate of a standard USB 2.0 Device?

(a)    100 Mbit/s

(b)    480 Mbit/s

(c)     1 Gbit/s

(d)    250 Mbit/s

(e)    None of these

Ans : (b)

25. An interface that can be used to connect the microcomputer bus to…………..is called an I/O Port.

(a)    Flip Flops

(b)    Memory

(c)     Peripheral devices

(d)    Multiplexers

(e)    None of these

Ans : (d)

No comments:

Post a Comment