1. Which of the following is NOT a computer programming language?
(1) C
(2) C++
(3) Java
(4) COBOL
(5) Microsoft
2. A computer virus normally attaches itself to another computer program known as-
(1) Trojan horse
(3) Host program
(3) Boot program
(4) Spyware
(5) Malware
3. A terminal that cannot process any information is called-
(1) Direct access terminal
(2) Intelligent terminal
(3) Dumb terminal
(4) Smart terminal(5) Blind terminal
4. ____ is a high speed memory that can be used in between CPU and main memory.
(1) CPU
(2) Buffer
(3) Spooling
(4) Cache
(5) None of these5. A ____ port is primarily used to connect printers to a computer.
(1) Serial port
(2) USB port
(3) Parallel port
(4) Address bus(5) None of these
6. ____ is responsible for overall control and co-ordination of instruction execution.
(1) CPU
(2) ALU
(3) RAM
(4) Control Unit
(5) None of these
7. When you start your computer from the off position then it is known as-
(1) Hard booting
(2) Processing
(3) Storage
(4) Soft booting
(5) None of these
8. The component is required to process data into information and consists of integrated circuit.
(1) RAM
(2) Control Unit
(3) Processor
(4) Motherboard(5) None of these
9. ____ is known as network virus.
(1) Trojan horse
(2) Brain Virus
(3) Worm
(4) All of these(5) None of these
10. ____ is a technique of temporarily removing inactive programs from the memory of computer system.
(1) Swapping
(2) Spooling
(3) Semaphore(4) Scheduler
(5) None of these
11. A computer program that translates one program instructions at a time into machine language is called-
(1) Interpreter
(2) CPU
(3) Compiler
(4) Simulator
(5) None of these
12. ____ are device used to transmit data over telecommunication lines.
(1) Drives
(2) Drive bays
(3) Modems
(4) Platforms
(5) None of these
13. Who introduced Internet E-mail?
(1) Jerry Yang
(2) David Filo
(3) Ray Tomlinson
(4) Sergey Brinn
(5) None of these
14. Granting an outside organization access to internet web pages is often implemented using a(n)-
(1) extranet
(2) intranet
(3) internet
(4) hacker
(5) None of these
15. BCC stands for-
(1) Bold Carbon Copy
(2) Blue Carbon Copy
(3) Bandwidth Carbon Copy
(4) Blind Carbon Copy
(5) None of these16. Which of the following contains information about a single ‘entity’ in the database like a person, place, event or thing?
(1) Query
(2) Field
(3) record
(4) table(5) None of these
17. Outlook Express is known as-
(1) E-mal client
(2) Word processor
(3) Spreadsheet
(4) Database
(5) None of these
18. Which is not closed source software package?
(1) VLC
(2) LINUX
(3) Open Office
(4) MS Word
(5) None of these19. Minimum Zoom percentage supported by MS Word is-
(1) 10%
(2) 15%
(3) 25%
(4) 4%
(5) None of these
20. HTML was introduced by-
(1) Vinton Cerf
(2) Bob Willies
(3) Steve Jobs
(4) Tim Burner Lee
(5) None of these21. A message with replies on a newsgroup is often, called a-
(1) post
(2) list
(3) thread
(4) comment(5) None of these
22. To send e-mail to a large group at one time, a ____ can be used.
(1) group
(2) alias
(3) mail server
(4) list serv
(5) None of these23. The E-commerce domain that involves business activity initiated by the consumer and targeted to businesses is known as-
(1) Business to business
(2) Consumer to business
(3) Client to business(4) Business to consumer
(5) None of these
24. A repair for a known software bug, usually available at no change on the internet is called-
(1) Version
(2) Patch
(3) Tutorial(4) FAQ
(5) None of these
25. When sending the e-mail, the ____ line describes the contents of the message.
(1) CC
(2) Contents
(3) To
(4) Subject
(5) BCC26. A port is a connector located on the –
(1) RAM
(2) CPU
(3) ROM
(4) Memory
(5) Motherboard
27. Format command is used to create-
(1) Sector
(2) memory
(3) tracks
(4) tracks & sectors
(5) None of these28. Disk access time is-
(1) seek time
(2) Latency time
(3) Seek time + Latency time
(4) Disk time(5) None of these
29. ____ technology is used by banks for faster processing of large volume of cheques.
(1) OCR
(2) IFSC Code
(3) OMR
(4) MICR
(5) Bar Code30. The Operating System is also called the ____ between the user and the computer.
(1) server
(2) interface
(3) network(4) intermediate
(5) None of these
31. A human being who writes programs, operate and maintain computer is known as-
(1) Liveware
(2) Freeware
(3) Spyware
(4) Shareware
(5) None of these
32. A Public Switched-Telephone Network (PSTN) uses ____ switching technique.
(1) Packet
(2) Message
(3) Circuit
(4) Transport(5) None of these
33. The PC and the Apple Macintosh are example of two different –
(1) applications
(2) programs
(3) platforms
(4) storage device(5) Operating system
34. PROM is a ____ memory that store information even if power is switched off.
(1) Volatile
(2) Buffer
(3) spooling
(4) non-volatile
(5) None of these
35. When installing a peripheral device you also need to install a –
(1) port
(2) server
(3) driver
(4) connection(5) utility software
36. The ____ specifies the operation to be performed and the operands provide the data on which the operation is to be performed.
(1) source code
(2) op code
(3) object code(4) program code
(5) None of these
37. Which of the following can hold maximum amount of data?
(1) Optical disk
(2) Floppy disk
(3) Magnetic disk inside computer
(4) Magnetic tape
(5) None of these38. A ____ is not a form of Biometrics.
(1) fingerprint
(2) password
(3) retina scan(4) breath scan
(5) None of these
39. Full form of OSI is-
(1) Open System Interconnection
(2) Open Software for Internet
(3) Operational System for Interconnect
(4) Operational Software for Internet
(5) None of these
40. A pixel is-
(1) a computer program that draws picture
(2) a picture stored in the secondary memory
(3) the smallest resolvable part of a picture
(4) a virus(5) None of these
Thank u
ReplyDeleteVery good knowledge. Thank you so much!
ReplyDeleteGreetings from India :)