1. The Title and Page number of a document can be displayed using which of the following options?
1) Insert table
2) Spelling and Grammar
3) Header and Footer
4) Thesaurus
5) File
2. Which of the following is the advantage of Assembly language over Machine language?
1) Easy to use
2) Easy to understand
3) Easy to modify
4) Only 1 and 3
5) All the above
3. Pop-ups are a form of ..... on the World Wide Web?
1) Instant Messaging
2) Search Engines
3) Browsers
4) Mark-up Languages
5) Online Advertising
4. Which of the following is not used to align text in a document?
1) Left
2) Right
3) Center
4) Diagonal
5) Justify
5. Which of the following characteristics is/are used to compute the results from excel data?
1) Goto
2) Table
3) Diagram
4) Formula and Function
5) None of these
6. ....... is a combination of text, audio, still images, animation, video.
1) Multiplexer
2) Multiplier
3) Multimedia
4) Multiuser
5) None of these
7. Which of the following refers to the process of trading goods over the internet?
1) E-seva
2) E-Trading
3) E-Finance
4) E-Sales
5) E-Commerce
8. Multiple autonomous computers communicating through a computer network to achieve a common goal is called .......
1) Centralized Computing
2) Co-operative Computing
3) Distributed Computing
4) Connected Computing
5) None of these
9. In order to change page margins in a word document:
1) Drag the scroll box on the scroll bars.
2) Delete the margin boundaries on the ruler
3) Right Click on the ruler
4) Drag the margin boundaries on the ruler
5) None of these
10. USB 3.0 is the second major revision of the Universal Serial Bus standard for Computer Connectivity. Which of the following is true about USB 3.0?
1) It is more than 10 times as fast as USB 2.0
2) Its Data transfer rate is up to 5 Gbits/sec
3) Power consumption is less than USB 2.0
4) All the above
5) None of the above
11. MICR is exclusively used in:
1) Libraries
2) Super markets
3) Stock markets
4) Banking Industry
5) None of these
12. A communication system which provides communication in both directions, but not simultaneously is known as:
1) Half-Duplex
2) Full-Duplex
3) Broadcast
4) Only 1 and 2
5) None of these
13. Which of the following uses computers and data communication to transmit data electronically between computers?
1) EDI
2) Physical Media
3) Printing a paper
4) DTE
5) None
14. Which key, when toggled off, causes keyed characters to override existing characters?
1) Delete
2) Insert
3) Page up
4) Page down
5) Down arrow
15. An act of unauthorized copying of computer software is called:
1) Network Piracy
2) License Piracy
3) Plagiarism
4) Software Piracy
5) None of these
16. .... are attempts by individuals to obtain confidential information from the user by falsifying their identity.
1) Phishing Trips
2) Computer Virus
3) Spyware Scams
4) Viruses
5) None of these
17. The default view in Excel is:
1) Work
2) Auto
3) Normal
4) Roman
5) None of these
18. Bus topology is also known as ........
1) Multipoint network
2) Multi drop network
3) Broadcasting network
4) All of these
5) None of these
19. Which of the following is not an advantage of multiprocessor system?
1) Low Cost
2) High Reliability
3) Increased Throughput
4) All of these
5) None of these
20. Data redundancy can be eliminated by using:
1) Networking
2) DBMS
3) Operating System
4) Processing the data manually
5) None of these
21. System bus is also known as :
1) Internal bus
2) Information bus
3) RTA bus
4) Component bus
5) None of these
22. Which memory is normally used between RAM and CPU?
1) Cache
2) Register
3) Virtual
4) Disk
5) None of these
23. ...... is a computer software designed to help people involved in a common task to achieve goals.
1) Shareware
2) Software
3) Freeware
4) Collaborative Software
5) None
24. The CPU of a computer ?
1) understands only assembly language
2) understands machine language and high-level languages
3) understands only machine language
4) understands only high-level language
5) does not understand machine language
25. Which of the following is not a term related to the World Wide Web?
1) Hyperlink
2) Hypertext
3) Website
4) Homepage
5) Keyboard
26. ..... is the process of getting access to the computer.
1) Switch on
2) Login
3) Logoff
4) Enter
5) None
27. Display bar that lists all the open folders and active applications is.......
1) Menubar
2) Toolbar
3) Task bar
4) Window list
5) None of these
28. A picture / image file which is displayed in the background of the computer screen is called ..........
1) Wall Paper
2) Screen Saver
3) Windows Theme
4) Photo Desktop
5) None of these
29. Which of the following operating systems does not exist?
1) Windows 7
2) Mac OS X
3) Windows CE
4) Windows 12
5) Ubuntu
30. Which of the following is true about Operating System?
1) It is an interface between user and the computer.
2) It manages all resources
3) It does all Memory management and Process management tasks
4) All are true
5) None of these
31. ....... is a software for personal computers that combines the most commonly used functions of many productivity software programs into one application.
1) Integrated Software
2) Application Software
3) System Software
4) Software Suite
5) None of these
32. Expand RDBMS.
1) Relative Database Management System
2) Rational Database Minimize System
3) Relational Database Management System
4) Relational Database Maximize System
5) None of these
33. ..... is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law.
1) CID
2) Cryptography
3) Steganography
4) Computer Forensics
5) None of these
34. Find the odd one out.
1) Scanner
2) Mouse
3) Keyboard
4) Printer
5) Barcode Reader
35. Which of the following is not a logic gate?
1) AND
2) OR
3) NOT
4) KNOT
5) None of these
36. DSL is an example of a ...... connection
1) Broadband
2) Dialup
3) Both 1 and 2
4) Computer
5) None of these
37. ...... is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
1) Encryption
2) Cryptography
3) Steganography
4) Forensics
5) None of these
38. 'Bespoke Software' is also known as:
1) Legacy Software
2) Respoke Software
3) System Software
4) Custom Software
5) None of these
39. Which of the following is not a utility program?
1) File copying
2) Listing files
3) Sending files to printer
4) File conversion
5) None of these
40. Which of the following is an audio input device?
1) Microphone
2) Webcam
3) MIDI keyboard
4) Only 1 & 2
5) Only 1 & 3
ANSWERS:
1-3; 2-5; 3-5; 4-4; 5-4; 6-3; 7-5; 8-3; 9-4; 10-4;
11-4; 12-1; 13-1; 14-2; 15-4; 16-1; 17-3; 18-4; 19-5; 20-2;
21-1; 22-1; 23-4; 24-3; 25-5; 26-2; 27-3; 28-1; 29-4; 30-4;
31-1; 32-3; 33-4; 34-4; 35-4; 36-1; 37-3; 38-4; 39-5; 40-5.
This is interesting and very logical idea which help everyone to know something new.
ReplyDeletepst file limit
I ATTEMPTED 27 CORRECTLY....NICE PAPER
ReplyDeletethanks for share nice information and share everyone. Keep it up.1
ReplyDeleteprashamcomputer.com visit this web page