Wednesday, 14 December 2011


1. What type of network connection is NOT a way of connecting to the Internet?
b. Dial-up
d. T1
e. T3
2. Which of the following is the correct syntax for a URL?
b. c:\windows
c. index.html
e. All of the Above.
3. A “High Resolution” computer monitor will have:
a. High dpi, e.g. .31 dpi
b. Low dpi, e.g. .26 dpi
c. 256 colors
d. Resolution isn’t measured in dpi or colors
e. The same resolution as your printer.
4. Computer Memory is normally measured in:
a. Kilobytes
b. Megabytes
c. Gigabytes
d. Terabytes
e. None of the Above
5. In Microsoft Excel, which of the following formulas is incorrect?
a. =SUM(A1,B1,B2,C2)
b. =ROUND(SUM(A1:C2),2)
c. =ROUND(A1:C2,2)
d. =SUM(ROUND(A1:B1,B2:C2))
e. All of the Above
6. A world wide web contains web pages 
a. residing in many computers 
b. created using HTML 
c. with links to other web pages 
d. residing in many computers linked together using HTML
7. By an intranet we mean
a. a LAN of an organization
b. a Wide Area Network connecting all branches of an organization
c. a corporate computer network
d. a network connecting all computers of an organization and using the internet protocol
8.  Internet uses
a. Packet switching
b. Circuit switching
c. Telephone switching
d. Telex switching
9.  Internet is
a. a local computer network
b. a world wide network of computers
c. an interconnected network of computers
d. a world wide interconnected network of computers which use a common protocol to communicate with one another
10.  ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
11. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
12. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
13. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
D. storage devices
14. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
15. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
16. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
17. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
18.____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
19. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
20. Which of the following is NOT a necessary characteristic of computer fluency?
A. Understanding the capabilities and limitations of computers
B. Being able to write computer programs
C. Becoming comfortable with the use of computers
D. Understanding the legal, ethical, and societal implications of computing
21. According to the U.S. Department of Labor, approximately ____________ % of American workers used computers on the job as of 2001.
A. 20
B. 40
C. 50
D. 70
22. Retail employees typically use ____________ terminals to process sales transactions.
A. sales processing
B. transaction point
C. automatic teller
D. point of sale
23. The process of ____________ involves automated study of consumer buying patterns in order to support marketing, inventory replenishment, and pricing decisions.
A. transaction processing
B. data mining
C. simulation
D. information processing
24. The engineering discipline that involves construction of molecularly-sized computing devices is called:
A. nanotechnology.
B. molecular processing.
C. silicon grafting.
D. nanoscience.
25. The prefix that stands for â•œbillionthâ•• is:
A. giga. B. tera. C. nano. D. peta.
26. A small biomedical device currently on the market that can be implanted underneath the skin for identification purposes is called the:
A. Identitron.
B. Verichip.
C. Digicard.
D. Nanoguard.
27. The four main functions of a computer are:
A. input, processing, output, and storage.
B. learning, thinking, intelligence, and virtuosity.
C. data, information, bits, and bytes.
D. hardware, software, modeling, and operations.
28. The primary purpose of a computer is to process _____________ and convert it into information.
A. electricity
B. data
C. raw material
D. a bit
29. Bit refers to a:
A. computer language.
B. CPU instruction.
C. 0 or 1 value.
D. digital representation of an alphabetic character.
30. There are ____________ bits in a byte.
A. two
B. four
C. six
D. eight
31. In computer language, each letter, number, and an array of special characters consists of:
A. 8 kilobytes.
B. 8 bytes.
C. a bit.
D. 8 bits.
32. Which of the following is the correct sequence of smallest to largest unit of storage size?
A. megabyte ? terabyte ? gigabyte ? kilobyte ? petabyte
B. kilobyte ? megabyte ? gigabyte ? terabyte ? petabyte
C. kilobyte ? megabyte ? gigabyte ? petabyte ? terabyte
D. kilobyte ? megabyte ? petabyte ? terabyte ? gigabyte
33. The prefix kilo refers to approximately:
A. one thousand.
B. one million.
C. one hundred.
D. one billion.
34. Computers work in:
A. machine linguistics.
B. binary language.
C. HTML code.
D. bit language.
35. The metal or plastic case that houses the physical components of a computer together is called the:
A. central processing unit .
B. storage device.
C. motherboard.
D. system unit.
36. The brains of the computer which executes the instructions, is called the:
C. motherboard.
D. system unit.
37. Instructions and data that are about to be processed by the CPU are located in:
A. a CD-ROM.
C. the hard disk.
D. the motherboard.
38. The circuitry that includes the CPU and memory chips is located on the:
A. system unit.
B. operating system.
C. motherboard.
D. computer platform.
39. All of the following are considered to be storage devices EXCEPT
a: A. floppy disk.
C. CD.
D. hard disk drive.
40. What is the correct association between a hardware component and a computer function?
A. Monitor ? input
B. Mouse ? input
C. CPU ? storage
D. Hard disk ? processing
41. The main difference between application and system software is that:
A. application software is composed of program instructions but system software is not.
B. application software is stored in memory whereas system software is only in the CPU.
C. system software is unnecessary whereas application software must be present on the computer.
D. system software manages hardware whereas application software performs user tasks.
42. A document created in a word processing program or a budget created in a spreadsheet are both examples of documents created in:
A. application software.
B. system software.
C. an operating system.
D. a Windows platform.
43. Which of the following is an example of system software?
A. Word processor
B. Operating system
C. Management information system
D. Spreadsheet
44. The term that refers to computers that provide resources to other computers in a network is:
A. server.
B. mainframe.
C. platform.
D. resource provider.
45. If a large business is going to use a single computer to execute many programs for hundreds of users at the same time, performing relatively simple operations and transactions, the type of computer will probably be a
A. Supercomputer
C. Mainframe

Thursday, 8 December 2011

IBPS Probationary Officers Written Exam., 2011

Computer Knowledge
(Held on 18-9-2011) 

1. Computer uses the……….number system to store data and perform calculations.
(A) binary
(B) octal
(C) decimal
(D) hexadecimal
(E) None of these
Ans : (A)

2. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is–
(A) Memory-only
(B) Write-only
(C) Once-only
(D) Run-only
(E) Read-only
Ans : (E)

3. Which of the following can be used to select the entire document ?
(B) ALT+F5
Ans : (A)

4. ……….are 'attempts by individuals to obtain confidential information from you by falsifying their identity.
(A) Phishing
(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) None of the above
Ans : (A)

5. Part number, part description, and number of parts ordered are examples of–
(A) control
(B) output
(C) processing
(D) feedback
(E) input
Ans : (E)

6. A Web site's main page is called its–
(A) Home Page
(B) Browser Page
(C) Search Page
(D) Bookmark
(E) None of these
Ans : (A)

7. The simultaneous processing of two or more programs by multiple processors is–
(A) multiprogramming
(B) multitasking
(C) time-sharing
(D) multiprocessing
(E) None of these
Ans : (D)

8. Codes consisting of lines of varying widths or lengths that are computer-readable are known as–
(A) an ASCII code
(B) a magnetic tape
(C) an OCR scanner
(D) a bar code
(E) None of these
Ans : (D)

9. To instruct Word to fit the width of a column to the contents of a table automatically, click the button and then point to AutoFit Contents.
(A) Fit to Form
(B) Format
(C) Autosize
(D) Contents
(E) AutoFit
Ans : (E)

10. Why is it unethical to share copyrighted files with your friends ?
(A) It is not unethical, because it is legal.
(B) It is unethical because the files are being given for free.
(C) Sharing copyrighted files without permission breaks copyright laws.
(D) It is not unethical because the files are being given for free.
(E) It is not unethical-anyone can access a computer
Ans : (C)

11. Reusable optical storage will typica1ly have the acronym–
(A) CO
(D) RW
Ans : (D)

12. The most common type of storage devices are–
(A) persistent
(B) optical
(C) magnetic
(D) flash
(E) steel
Ans : (D)

13. A device that connects to a network without the use of cables is said to be–
(A) distributed
(B) free
(C) centralized
(D) open source
(E) None of these
Ans : (B)

14. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a–
(A) hacker
(B) analyst
(C) instant messenger
(D) programmer
(E) spammer
Ans : (A)

15. To access properties of an object, the mouse technique to use is–
(A) dragging
(B) dropping
(C) right-clicking
(D) shift-clicking
(E) None of these
Ans : (C)

16. To change selected text to all capital letters, click the change case button, then click–
(D) Lock Upper
(E) Large Size
Ans : (A)

17. The basic unit of a worksheet into which you enter data in Excel is called a–
(A) tab
(B) cell
(C) box
(D) range
(E) None of these
Ans : (B)

18. You can keep your personal files / folders in–
(A) My folder
(B) My Documents
(C) My Files
(D) My Text
(E) None of these
Ans : (B)

19. In Word you can force a page break–
(A) By positioning your cursor at the appropriate place and pressing the F1 key
(B) By positioning your cursor at the appropriate place and pressing Ctrl+Enter
(C) By using the Insert/Section Break
(D) By changing the font size of your document
(E) None of these
Ans : (B)

20. A DVD is an example of a(n) –
(A) hard disk
(B) optical disc
(C) output device
(D) solid-state storage device
(E) None of these
Ans : (B)

21. The default view in Excel is……….view.
(A) Work
(B) Auto
(C) Normal
(D) Roman
(E) None of these
Ans : (C)

22. The process of transferring files from a computer on the Internet to your computer is called–
(A) downloading
(B) uploading
(E) downsizing
Ans : (A)

23. ……….is the process of dividing the disk into tracks and sectors.
(A) Tracking
(B) Formatting
(C) Crashing
(D) Allotting
(E) None of these
Ans : (B)

24. Help Menu is available at which button ?
(A) End
(B) Staft
(C) Turnoff
(D) Restart
(E) Reboot
Ans : (B)

25. The contents of……….are lost when the computer turns off.
(A) storage
(B) input
(C) output
(D) memory
(E) None of these
Ans : (D)

26. When you save to this, your data will remain intact even when the computer is turned off–
(B) Motherboard
(C) Secondary storage device
(D) Primary storage device
(E) None of these
Ans : (C)

27. A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a(n) –
(A) supercomputer
(B) minicomputer
(C) laptop
(D) server
(E) None of these
Ans : (D)

28. The……….folder retains copies of messages that you have started but are not yet ready to send.
(A) Drafts
(B) Outbox
(C) Address Book
(D) Sent Items
(E) Inbox
Ans : (B)

29. Grouping and processing all of a firm's transactions at one time is called–
(A) a database management system
(B) batch processing
(C) a real-time system
(D) an on-line system
(E) None of these
Ans : (B)

30. The……….enables you to simultaneously keep multiple Web pages open in one browser window.
(A) tab box
(B) pop-up helper
(C) tab row
(D) address bar
(E) Esc key
Ans : (C)

31. Which ports connect special types of music instruments to sound cards ?
Ans : (C)

32. You can……….a search by providing more information the search engine can use to select a smaller, more useful set of results.
(A) refine
(B) expand
(C) load
(D) query
(E) slowdown
Ans : (A)

33. What is the permanent memory built into your computer called ?
(B) Floppy
Ans : (E)

34. What displays the contents of the active cell in Excel ?
(A) Name box
(B) Row Headings
(C) Formula bar
(D) Task pane
(E) None of these
Ans : (A)

35. The piece of hardware that converts your computer's digital signal to an analog signal that can travel over telephone lines is called a–
(A) red wire
(B) blue cord
(C) tower
(D) modem
(E) None of these
Ans : (D)

36. Video processors consist of……….and………., which store and process images.
(A) CPU and VGA
(B) CPU and memory
(C) VGA and memory
(D) VGI and DVI
(E) None of these
Ans : (C)

37. If you want to connect to your own computer through the Internet from another location, you can use–
(A) e-mail
(C) instant message
(D) Telnet
(E) None of these
Ans : (D)

38. To reload a Web page, press the……….button.
(A) Redo
(B) Reload
(C) Restore
(D) Ctrl
(E) Refresh
Ans : (E)

39. This first step in the transaction processing cycle captures business data through various modes such as optical scanning or at an electronic commerce website–
(A) Document and report generation
(B) Database maintenance
(C) Transaction processing startup
(D) Data Entry
(E) None of these
Ans : (D)

40. A(n) ……….is a special visual and audio effect applied in Power-point to text or content.
(A) animation
(B) flash
(C) wipe
(D) dissolve
(E) None of these
Ans : (A)

41. When the pointer is positioned on a……….it is shaped like a hand.
(A) grammar error
(B) Formatting error
(C) Screen Tip
(D) Spelling error
(E) hyperlink
Ans : (E)

42. Personal computers can be connected together to form a–
(A) server
(B) supercomputer
(C) network
(D) enterprise
(E) None of these
Ans : (C)

43. A……….is the term used when a search engine returns a Web page that matches the search criteria.
(A) blog
(B) hit
(C) link
(D) view
(E) success
Ans : (E)

44. ……….are words that a programming language has set aside for its own use.
(A) Control words
(B) Control structures
(C) Reserved words
(D) Reserved keys
(E) None of these
Ans : (C)

45. Mobile Commerce is best described as–
(A) The use of Kiosks in marketing
(B) Transporting products
(C) Buying and selling goods/services through wireless handheld devices
(D) Using notebook PC's in marketing
(E) None of the above
Ans : (C)

46. Which of, the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information–
(A) floppy diskette
(B) hard disk
(C) permanent disk
(D) optical disk
(E) None of these
Ans : (B)

47. The computer abbreviation KB usually means–
(A) Key Block
(B) Kernel Boot
(C) Key Byte
(D) Kit Bit
(E) Kilo Byte
Ans : (E)

48. What is the process of copying software programs from secondary storage media to the hard disk called?
(A) Configuration
(B) Download
(C) Storage
(D) Upload
(E) Installation
Ans : (D)

49. In Excel……….allows users to bring together copies of work-books that other users have worked on independently.
(A) Copying
(B) Merging
(C) Pasting
(D) Compiling
(E) None of these
Ans : (B)

50. Which of the following are advantages of CD-ROM as a storage media?
(A) CD-ROM is an inexpensive way to store large, amount of data and information
(B) CD-ROM disks retrieve data and information more quickly than magnetic disks do
(C) CD-ROMs make less errors than magnetic media
(D) An of the above
(E) None of these
Ans : (D)

Saturday, 3 December 2011


1. Technology no longer protected by copyright, available to everyone, is considered to be:
(A) proprietary     
(B) open   
(C) experimental   
(D) in the public domain
(E) None of these
Answer: (A)

2. A typical modern computer uses  
(A) Magnetic cores     
(B) LSI chips
(C) Magnetic tapes   
(D) More than 1000 vacuum tubes
(E) None of these
Answer: (B) 

3.ALU is called for _____ of a computer               
(A) Heart   
(B) Master dispatcher
(C) Primary memory   
(D) All of the above
(E) None of these
Answer: (C) 

4. A single dimensional array is called             
(A) List   
(B) Subscripts
(C) Matrix   
(D) File
(E) None of these
Answer: (A) 

5.How many types of drawing objects are available in drawing Tool Bar ?         
(A) 4      
 (B) 5   
(C) 10      
 (D) 12
(E) None of these
Answer: (E) 

6.Data processing is___  
(A) data collection   
(B) similar to computer programming
(C) associated with commercial work
(D) akin to data coding       
(E) None of these
Answer: (C) 

7.In computer terminology, information means
(A) Raw data      
(B) Data in more useful
(C) Alphanumeric data       
(D) Program
(E) None of these
Answer: (B) 

8.What is meant by the term RAM?          
(A) Memory which can only be read
(B) Memory which can be both read and written to
(C) Memory which is used for permanent storage
(D) Memory which can only be written to
(E) None of these
Answer: (B) 

9. In UNIX, which command is used to sort the lines of data in a file in reverse order  
(A) sort    
(B) sh
(C) st    
(D) sort –r
(E) None of these
Answer: (D) 

10. The commonly used UNIX commands like date, ls, cat etc. are stored in     
(A) /dev directory
(B) /bin directory
(C) /tmp directory
 (D) /unix directory
(E) None of these
Answer: (B) 

11. In UNIX, which command is used to change the protection mode of files starting with the string emp and ending with 1, 2 or 3 ?  
(A) Chmod u+x emp[1-3]
(B) Chmod 777 emp*
(C) Chmod u+r ??? emp
(D) Chmod 222 emp ?
(E) None of these
Answer: (A) 

12. The variables which can be accessed by all modules in a C program, are known as   
(A) Local variables
(B) Internal variables
(C) External variables
(D) Global variables
(E) None of these
Answer: (D) 

13. Which computer memory is used for storing programs and data currently being processed by the CPU ?     
(A) Mass memory           
(B) Internal memory   
(C) Non-volatile memory       
(E) None of these
Answer: (B) 

14. A record that follws a group of related records and contains data relevant to those records is called as....      
(A) Trailer record
(B) Traffic record   
(C) Transaction record       
(D) Transducer
(E) None of these
Answer: (A) 

15. A type of semiconductor memory that usually has small capacity but very fast access is    
(A) PROM   
(B) RAM   
(C) Scratchpad   
(E) None of these
Answer: (C) 

16. ____ is the study of molecules and structures whose size ranges from 1 to 100 nanometers. 
(A) Nanoscience   
(B) Microelectrodes
(C) Computer forensics
(D) Artificial intelligence
(E) None of these
Answer: (A) 

17.A single pole, single throw switch with one common line and one output line is   
(A) Switch circuit   
(B) SPDT switch
(C) SPST switch   
(D) Star bit
(E) None of these
Answer: (C) 

18.A one-bit signal that indicates the start of data transmission by an asynchronous device is           
(A) Parity bit
(B) Status bit   
(C) Zero bit   
(D) Star bit
(E) None of these
Answer: (D)

19.__ is data that has been organized or presented in a meaningful fashion.
(A) A process  
(B) Software 
(C) Storage   
(D) Information
(E) None of these
Answer: (D)

20. The name for the way that computers manipulate data into information is called  
(A) programming
(B) processing
(C) storing    
(D) organizing
(E) None of these
Answer: (B) 

21. Computers gather data, which means that they allow users to _____ data.    
(A) present   
(B) input
(C) output   
(D) store
(E) None of these
Answer: (B) 

22. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered   
(A) data   
(B) output
(C) input   
(D) the process
(E) None of these
Answer: (B)

23. A circut with about 100 transistors fabricated on a single chip is called     
(A) MCR   
(C) MIS    
(E) None of these
Answer: (B) 


1. One megabyte equals approximately
1) 1,000 bits
2) 1,000 bytes
3) 1 million bytes
4) 1 million bits
5) 2,000 bytes

2. Data going into the computer is called?
1) Output
2) Algorithm
3) Input
4) Calculations
5) Flowchart

3. Which of the following refers to the memory in your computer?
1) RAM
2) DSL
3) USB
4) LAN
5) CPU

4. When you are working on a document on PC, where is the document temporarily stored?
1) RAM
2) ROM
3) The CPU
4) Flash memory
5) The CD-Rom

5. Information travels between components on the mother board through-
1) Flash memory
4) Buses
5) Peripherals

6. How are data organised in a spreadsheet?
1) Lines and spaces
2) Layers and planes
3) Height and width
4) Rows and columns
5) None of these

7. Which of the following is true?
1) Byte is a single digit in a binary number
2) Bit represents a grouping of digital numbers
3) Eight-digit binary number is called a byte
4) Eight-digit binary number is called a bit
5) None of these

8. Transformation of input into output is performed by?
1) Peripherals
2) Memory
3) Storage
4) The Input-Output unit
5) The CPU

9. How many options does a binary choice offer?
1) None
2) One
3) Two
4) It depends on the amount of memory in the computer
5) It depends on the speed of the computer's processor

10. collection of web pages and the very first page that we see on opening of a web-site
1) Home-page, Web-page
2) Web-site, Home-page
3) Web-page, Home-page
4) Web-page, Web-site
5) None of these

11. When the pointer is positioned on a _____ it is shaped like a hand.
1) Grammar error
2) Hyperlink
3) Screen tip
4) Spelling error
5) Formatting error

12. The _____ of a system includes the programs or instructions.
1) Hardware
2) Icon
3) Information
4) Software
5) None of these

13. 'www' stands for _____
1) World Word Web
2) World Wide Web
3) World White Web
4) World Work Web
5) None of these

14. What menu is selected to cut, copy, and paste?
1) File
2) Tools
3) Special
4) Edit
5) None

15. You can use the tab key to
1) Move a cursor across the screen
2) Indent a paragraph
3) Move the cursor down the screen
4) Only (1) and (2)
5) None of these

16. The most important or powerful computer in a typical network is _____
1) Desktop
2) Network client
3) Network server
4) Network station
5) None of these

17. Which of the following is an example of connectivity?
1) Internet
2) Floppy disk
3) Power cord
4) Data
5) None of these

18. The ability to find an individual item in a file immediately _____ is used.
1) File allocation table
2) Directory
3) Sequential access
4) Direct access
5) None of these

19. The primary purpose of software is to turn data into _____
1) Web sites
2) Information
3) Programs
4) Objects
5) None of these

20. To what temporary area can you store text and other data, and later paste them to another location?
1) The clipboard
2) ROM
4) The hard disk
5) None of these

21. Storage that retains its data after the power is tuned off is referred to as
1) volatile storage
2) non-volatile storage
3) sequential storage
4) direct storage
5) None of these

22. _____is the science that attempts to produce machines that display the same type of intelligence that humans do.
1) Nano science
2) Nanotechnology
3) Simulation
4) Artificial intelligence (AI)
5) None of these

23. Changing an existing document is called _____ the document.
1) Creating
2) Editing
3) Modifying
4) Adjusting
5) None of these

24. Computers use the _____ number system to store data and perform calculations.
1) Decimal
2) Hexadecimal
3) Octal
4) Binary
5) None of these

25. Which of the following is the largest unit of storage?
1) GB
2) KB
3) MB
4) TB
5) None of these

26. The _____ key will launch the start buttons.
1) Esc
2) Shift
3) Windows
4) Shortcut
5) None of these

27. _____is the process of finding errors in software code.
1) Compiling
2) Testing
3) Running
4) Debugging
5) None of these

28. To move to the beginning of a line of text, press the _____ key.
1) Home
2) A
3) Page-up
4) Enter
5) None of these

29. Virtual memory is
1) Memory on the hard disk that the CPU uses as an extended RAM
2) RAM
3) Only necessary if you do not have any RAM in your computer
4) A back up device for floppy disks
5) None of these

30. A _____ contains specific rules and words that express the logical steps of an algorithm.
1) Syntax
2) Programming structure
3) Programming language
4) Logic chart
5) None of these

31. When sending an e-mail, the _____ line describes the contents of the message.
1) to
2) subject
3) contents
4) CC
5) None of these

32. The _____ tells the computer how to use its components.
1) Utility
2) Network
3) Operating system
4) Application program
5) None of these

33. Which grouping do you work with when formatting text in word?
1) Tables, paragraphs and indexes
2) Paragraphs, indexes and sections
3) Characters, sections and paragraphs
4) Indexes, characters and tables
5) None of these

34. What is backup?
1) Adding more components to your network
2) Protecting data by copying it from the original source to a different destination
3) Filtering old data from the new data
4) Accessing data on tape
5) None of these

35. Network components are connected to the same cable in the _____ topology.
1) Star
2) Ring
3) Bus
4) Mesh
5) Mixed

36. This component is required to process data into information and consists of integrated circuits.
1) Hard disk
2) RAM
3) CPU
4) ROM
5) None of these

37. One advantage of dial-up-internet access is ___
1) It utilises broadband technology
2) It utilizes existing telephone service
3) It uses a router for security
4) Modem speeds are very fast
5) None of these

38. What is the term for unsolicited e-mail?
1) News group
2) Use net
3) Backbone
4) Flaming
5) Spam

39. Two or more computers connected to each other of sharing information form a _____
1) Network
2) Router
3) Server
4) Tunnel
5) Pipeline

40. Computers that are portable and convenient for users who travel are known as _____
1) Super computers
2) Lap tops
3) Mini computers
4) File servers
5) None of these

41. A computer checks the _____ of user names and passwords for a match before granting access.
1) Website
2) Network
3) Backup file
4) Data base
5) None of these

42. Office LANs that are spread geographically apart on a large scale can be connected using a corporate _____
1) CAN
2) LAN
3) DAN
4) WAN
5) TAN

43. The code for a Web page is written using _____
1) A fifth generation language
2) Win Zip
3) Peripherals
4) Hypertext Markup Language
5) URL

44. What is the process of copying software programs from secondary storage media to the hard disk called?
1) Configuration
2) Download
3) Storage
4) Upload
5) Installation

45. Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as _____
1) Flash
2) Spiders
3) Cookies
4) Applets
5) Sparks

46. The first computers were programmed using _____
1) Assembly language
2) Machine language
3) Source code
4) Object code
5) Spaghetti code

47. Which process checks to ensure the components of the computer and operating are connected properly?
1) Booting
2) Processing
3) Saving
4) Editing
5) None of these

48. In a relational database, this is a data structure that organizes the information about a single topic into rows and columns.
1) Block
2) Record
3) Tuple
4) Table
5) Command line interface

49. How can the user determine what programs are available on a computer?
1) Checking the hard disk properties
2) Viewing the installed programs during the booting process
3) Checking the operating system for a list of installed programs.
4) Checking the existing files saved on the disk
5) None of these

50. When we run a program in HTML coding _____ is used as backend and ____ works as front-end.
1) Notepad - Internet-Explorer
2) Notepad - Msn-messenger
3) MS-Word - Internet Explorer
4) Both (1) and (2)
5) None of these


1)3 2)3 3)1 4)1 5)4 6)3 7)3 8)5 9)3 10)2 11)2 12)4 13)2 14)4 15)2 16)3 17)1 18)1 19)2 20)1 21)2 22)4 23)2 24)4 25)4 26)3 27)4 28)1 29)2 30)3 31)2 32)3 33)1 34)2 35)2 36)3 37)2 38)5 39)1 40)2 41)4 42)4 43)4 44)5 45)4 46)2 47)1 48)4 49)4 50)1