Friday, 11 December 2020

General Computer Test - 85

 

1. Personal logs or journal entries posted on the Web are known as :

(a)    listservs

(b)    Webcasts

(c)     blogs

(d)    subject directories

(e)    None of these

Ans : (c)

2. Linux is a(n) operating system.

(a)    open-source

(b)    Microsoft

(c)     Windows

(d)    Mac

(e)    None of these

Ans : (a)

3 .Which of the following places the common data elements in order from smallest to largest

(a)    character, file, record, field, database

(b)    character, record, field, database, file

(c)     character, field, record, file, database

(d)    Bit, byte, character, record, field, file, database

(e)    None of these

Ans : (c)

4. Which of the following statements is FALSE concerning file names?

(a)    Files may share the same name or the same extension but not both

(b)    Every file in the same folder must have a unique name

(c)     File extension is another name for file type

(d)    The file extension comes before the dot (.) followed by the name

(e)    None of these

Ans : (d)

5. Which of the following would most likely NOT be a symptom of a virus?

(a)    Existing program files and icons disappear.

(b)    The CD-ROM stops functioning.

(c)     The Web browser opens to an unusual home page.

(d)    Odd messages or images are displayed on the screen.

(e)    None of these

Ans : (b)

6.  ......are lists of commands that appear on the screen.

(a)    GUIs

(b)    Icons

(c)     Menus

(d)    Windows

(e)    None of these

Ans : (c)

7. What is the correct association between a hardware component and a computer function?

(a)    Monitor > input

(b)    Mouse > input

(c)     CPU > storage

(d)    Hard disk > processing

(e)    None of these

Ans : (b)

8. What is the function of Drop Cap?

(a)    It does not allow capital letters to be used in the documents.

(b)    It makes first letter of each word capital letter in the documents.

(c)     It lets you begin a paragraph with a large dropped initial capital letter.

(d)    It automatically starts all paragraphs and sentences with capital letters.

(e)    None of these

Ans : (c)

9. The errors that can be pointed out by the compiler are :

(a)    Syntax error

(b)    Symantic error

(c)     Logical error

(d)    Internal error

(e)    None of these

Ans : (a)

10. To move to the bottom of a document, press……….

(a)    Auto summarize

(b)    Home key

(c)     Ctrl + Home key

(d)    End key

(e)    Ctrl + End key

Ans : (e)

11. By default, your documents print in……..……mode.

(a)    Landscape

(b)    Portrait

(c)     Page setup

(d)    Print preview

(e)    None of these

Ans : (b)

12. What’s the name for the program or service that lets you view e-mail messages?

(a)    Web browser

(b)    E-mail clients

(c)     E-mail ID

(d)    Internet

(e)    None of these

Ans : (b)

13. What does the SMTP in an SMTP server stand for?

(a)    Simple Mail Transfer Protocol

(b)    Server Message Test Phase

(c)     Short Messaging Text Process

(d)    Short Messaging Transfer Protocol

(e)    None of these

Ans : (c)

14. What’s considered the “backbone” of the World Wide Web?

(a)    Uniform resource locator (URL)

(b)    Hypertext mark-up language (HTML)

(c)     Hypertext transfer protocol (HTTP)

(d)    File transfer protocol (FTP)

(e)    None of these

Ans : (c)

15. We access the World Wide Web using :

(a)    Browsers

(b)    Instant messaging applications

(c)     High bandwidth

(d)    Search engine

(e)    None of these

Ans : (a)

16. The internet began with the development of:

(a)    USENET

(b)    ARPANET

(c)     Ethernet

(d)    Intranet

(e)    None of these

Ans : (b)

17. A wireless network uses……….waves to transmit signals.

(a)    mechanical

(b)    radio

(c)     sound

(d)    magnetic

(e)    None of these

Ans : (b)

18. What device includes an adapter that decodes data sent in radio signals?

(a)    modem

(b)    digital translator

(c)     router

(d)    switch

(e)    None of these

Ans : (c)

19. Network components are connected to the same cable in the topology.

(a)    star

(b)    ring

(c)     bu

(d)    mesh

(e)    mixed

Ans : (a)

20. Small application programs that run on a Web page and may ensure a form is completed properly or provide animation are known as………..

(a)    flash

(b)    spiders

(c)     cookies

(d)    applets

(e)    None of these

Ans : (a)

21. Which of the following is Not a characteristic of a computer?

(a)    Intelligence

(b)    Speed

(c)     Versatility

(d)    Automation

(e)    None of these

Ans : (a)

22. The WWW standard allows programs on many different computer platforms to show the information on a server. Such programs are called :

(a)    ISP

(b)    Web Browsers

(c)     Web Servers

(d)    Web Modular

(e)    None of these

Ans : (b)

23.Outlook Express is a

(a)    E-mail client

(b)    Scheduler

(c)     Address book

(d)    All of these

(e)    None of these

Ans : (d)

24. Which of the following is not a network?

(a)    Local Area Network

(b)    Wide Area Network

(c)     Optical Fibre

(d)    All are networks

(e)    None of these

Ans : (c)

25. Which of the following is Not a characteristic of E-mail?

(a)    Low cost

(b)    Record maintenance in database

(c)     High speed

(d)    Waste reduction

(e)    None of these

Ans : (b)

General Computer Test - 84

 

1. Superscript, subscript, outline, emboss, engrave are known as

(a)    font styles

(b)    font effects

(c)     word art

(d)    text effects

(e)    None of these

Ans : (b)

2. Shimmer, Sparkle text, Blinking Background etc. are known as

(a)    font styles

(b)    font effects

(c)     word art

(d)    text effects

(e)    None of these

Ans : (d)

3. Which of the following is not available in Font Spacing?

(a)    Normal

(b)    Loosely

(c)     Condensed

(d)    Expanded

(e)    None of these

Ans : (b)

4. Bold, Italic, Regular are known as

(a)    font styles

(b)    font effects

(c)     word art

(d)    text effects

(e)    None of these

Ans : (a)

5. If you begin typing an entry into a cell and then realize that you don’t want your entry placed into a cell, you :

(a)    Press the Erase key

(b)    Press Esc

(c)     Press the Enter button

(d)    Press the Edit Formula button

(e)    None of these

Ans : (b)

6. Which of the following will not cut information?

(a)    Pressing Ctrl + C

(b)    Selecting Edit > Cut from the menu

(c)     Clicking the Cut button on the standard

(d)    Pressing Ctrl + X

(e)    None of these

Ans : (a)

7. Computer connected to a LAN (Local Area Network) can

(a)    run faster

(b)    go on line

(c)     share information and /or share peripheral equipment

(d)    E-mail

(e)    None of these

Ans : (c)

8. A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is………….

(a)    Bug

(b)    Vice

(c)     Lice

(d)    Worm

(e)    None of these

Ans : (d)

9. Unwanted repetitious messages, such as unsolicited bulk e-mail is known as

(a)    Spam

(b)    Trash

(c)     Calibri

(d)    Courier

(e)    None of these

Ans : (a)

10. COBOL is widely used in………. applications

(a)    Commercial

(b)    Scientific

(c)     Space

(d)    Mathematical

(e)    None of these

Ans : (a)

11. VDU is also called

(a)    Screen

(b)    Monitor

(c)     Both (a) & (b) & (d) Printer

(d)    None of these

Ans : (c)

12. What kind of software would you most likely use to keep track of billing account?

(a)    Word Processing

(b)    Electronic Publishing

(c)     Spreadsheet

(d)    Web authoring

(e)    None of these

Ans : (c)

13. Test the validity of the statements?

(a)    1 KB = 1024 BYTES

(b)    1 MB = 2048 BYTES

(c)     1 MB = 1000 KILOBYTES

(d)    1 KB = 1000 BYTES

(e)    None of these

Ans : (a)

14. Which of the following is not a computer language?

(a)    BASIC

(b)    C++

(c)     C#

(d)    Java

(e)    Microsoft

Ans : (e)

15. Which among the following is a correct definition of “Digital Divide”?

(a)    Gap between people having access to mobile and internet access

(b)    Gap between people having access to internet/IT and no internet/IT

(c)     Gap between people having access to broadband and narrowband internet

(d)    Gap between people having access to internet banking and normal banking

(e)    Gap between the people having an email account and no email account

Ans : (b)

16.Now a days Vishing has become a criminal practice of using social engineering over which of the following?

(a)    Social networking sites

(b)    Mobile Phones

(c)     E-mails

(d)    Cyber cafes

(e)    All of these

Ans : (b)

17. What is the fullform of W3C?

(a)    World Wide Web Consortium

(b)    World Wide Web Company

(c)     World Wide Web Center

(d)    World Wide Web Command

(e)    None of these

Ans : (a)

18. In the MICR Code Line Structure what do represent the first three digits of Sort field number consisting of nine digits?

(a)    City

(b)    Bank

(c)     Branch

(d)    Account Type

(e)    None of these

Ans : (a)

19. Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry?

(a)    Virtual keyboard

(b)    Finger Touching

(c)     Touchscreen

(d)    ShapeWriter

(e)    Dasher

Ans : (a)

20. ADSL data communications technology uses which of the following for faster data transmission?

(a)    Voiceband modem

(b)    Wireless Modem

(c)     Copper telephone Lines

(d)    Sockets

(e)    None of these

Ans : (c)

21. What is the purpose of keeping electronic devices such as computers, televisions, and remote controlled devices on Sleep mode?

(a)    Reduce Power consumption

(b)    Back up

(c)     To write contents of RAM to hard disc

(d)    To improve download speed

(e)    None of these

Ans : (a)

22. What is the ultimate purpose of Defragmentation?

(a)    Make the PC faster

(b)    Create More Free Space

(c)     Delete temporary files

(d)    Reduce Power consumption

(e)    All of these

Ans : (b)

23. The purpose of the primary key in a database is to :

(a)    unlock the database

(b)    provide a map of the data

(c)     uniquely identify a record

(d)    establish constraints on database operations

(e)    None of these

Ans : (b)

24. The design of the network is called the network :

(a)    architecture

(b)    server

(c)     transmission

(d)    type

(e)    None of these

Ans : (a)

25. The most frequently used instructions of a computer program are likely to be fetched from :

(a)    the hard disk

(b)    cache memory

(c)     RAM

(d)    registers

(e)    None of these

Ans : (b)