1. CRT stands for
(a) Cathode Ray tube
(b) Cathodic ray tube
(c) Cathode ray tub
(d) Cathodic ray tub
(e) None of these
Ans : (a)
2. What is the
meaning of ‘justified text’?
(a) the text headings are all in the same style
(b) all four margins on the page are the same size
(c) the text aligns with both the right and left margins
(d) the text is the maximum size that will fit on a page
(e) None of these
Ans : (c)
3. To identify a
document, it is helpful to include the file name on each page as a
(a) header/footer
(b) bibliography
(c) find/search
(d) macro
(e) None of these
Ans : (a)
4. What is the
purpose of providing a Drafts folder in an email system?
(a) to store spam email
(b) to save unsent emails
(c) to store deleted emails
(d) to save a copy of sent emails
(e) None of these
Ans : (b)
5. Which of the
following is an acceptable way to shut down the computer?
(a) press the reset button
(b) turn the computer off at the power point
(c) select the ‘Shut down’ option from a menu
(d) pull the power card from the back of the computer
(e) None of these
Ans : (c)
6. By an intranet we
mean
(a) a LAN of an organization
(b) a Wide Area Network connecting all branches of an organization
(c) a corporate computer network
(d) a network connecting all computers of an organization and using the internet protocol
(e) None of these
Ans : (d)
7. Computer which are
made of integrated circuits
(a) Digital
(b) Analog
(c) Mechanical
(d) All of these
(e) None of these
Ans : (a)
8. An error in
software or hardware is called a bug. What is the alternative computer jargon
for it?
(a) Leech
(b) Squid
(c) Slug
(d) Glitch
(e) None of these
Ans : (d)
9. Bold, italics and
underline are features used in many programs. To which of the following items
can these features be applied?
(a) files
(b) text
(c) pictures
(d) windows
(e) None of these
Ans : (b)
10. All of the
following are basic principles of net works, except
(a) each computer must have a network card
(b) there must be communications media connecting the network hardware devices
(c) there must be at least one connecting device
(d) each computer must have software that supports the movement of information
(e) None of these
Ans : (b)
11. A passive threat
to computer security is
(a) Malicious Intent
(b) Sabotage
(c) Accident Errors
(d) Espionage Agents
(e) None of these
Ans : (a)
12. Voice mail
(a) is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet
(b) permits users to converse in real time with each other via the computer while connected to the Internet
(c) functions much like an answering machine, allowing callers to leave a voice message for the called party
(d) involves using video and computer technology to conduct a meeting between participants at geographically separate locations
(e) None of these
Ans : (c)
13. A(n) allows
network users to share a single copy of software, which resides on the network
server.
(a) single-user license agreement
(b) network site license
(c) end-user license agreement
(d) business software license
(e) None of these
Ans : (b)
14. Which of the
following is a general purpose programming language, designed by Sun
Microsystems?
(a) VB Script
(b) Java Script
(c) CSS
(d) Linux
(e) None of these
Ans : (b)
15. A communication
processor that connects dissimilar networks by providing the translation from
one set of protocol to another is
(a) Bridge
(b) Gateway
(c) Router
(d) Modem
(e) None of these
Ans : (b)
16. ......allows
wireless mobile devices to access the Internet and its services such as the Web
and e-mail
(a) TCP/IP
(b) Ethernet
(c) WAP
(d) WiFi
(e) None of these
Ans : (c)
17. Which device
cannot be shared in network?
(a) Floppy
(b) Keyword
(c) Computer
(d) Printer
(e) None of these
Ans : (b)
18. Which port
doesn’t exist in computer?
(a) UBS port
(b) Parallel port
(c) Printer port
(d) Computer port
(e) None of these
Ans : (d)
19. The
browser’s………..keeps a list of web pages you have visited during the current
session.
(a) history
(b) cache
(c) favorites
(d) trail
(e) None of these
Ans : (a)
20. Which of the
following identifies a specific web page and its computer on the Web?
(a) Web site
(b) Web site address
(c) URL
(d) Domain Name
(e) None of these
Ans : (d)
21. The type of
software that can store, update, manipulate, and retrieve data is called
(a) desktop publishing
(b) spreadsheet
(c) database management
(d) graphics
(e) None of these
Ans : (c)
22. Which application
is not typically included in an MS Office suite?
(a) word processor
(b) spreadsheet
(c) antivirus
(d) database
(e) None of these
Ans : (c)
23. .......is the time needed by the CPU to
recognize (not service) an interrupt request
(a) Interrupt Latency
(b) Response Deadline
(c) Timer delay
(d) Throughput
(e) None of these
Ans : (a)
24. What is the
transfer rate of a standard USB 2.0 Device?
(a) 100 Mbit/s
(b) 480 Mbit/s
(c) 1 Gbit/s
(d) 250 Mbit/s
(e) None of these
Ans : (b)
25. An interface that
can be used to connect the microcomputer bus to…………..is called an I/O Port.
(a) Flip Flops
(b) Memory
(c) Peripheral devices
(d) Multiplexers
(e) None of these
Ans : (d)
No comments:
Post a Comment