1. Which of the following is not shareware software?
a) Cute Ftp b) Get Right
c) Win Zip d) MSN Messenger
e) None of these
2. The term "gigabyte" refers to?
a) 1024 bytes b) 1024 kilobytes
c) 1024 megabytes
d) 1024 gigabytes
e) None of these
3. A program written in a high-level language is a?
a) Objective program
b) Source program
c) Compiled Program
d) All of the above
e) None of these
4. Which of the following is represented by a cluster in a Hard disk?
a) Total numbers of tracks
b) Group of Tracks
c) Group of Rows
d) All of the above
e) None of the above
5. Unix Operating system was developed by?
a) Walter Baatain
b) John Burdeen
c) Ken Thompson
d) All the above e) None of these
6. Which of the following is a graphics solution for word processors?
a) Clipart b) Word art
c) Drop cap d) All the above
e) None of these
7. A program for viewing web pages is called?
a) Hardware b) Software
c) Storage d) Browser
e) None of These
8. What does SNMP Stands for?
a) Simple Network Mail Protocol
b) Single Network Mail Protocol
c) Single Network Message Protocol
d) Simple Network Message Protocol
e) None of these
9. What is Firmware?
a) A program Started in RAM
b) A Program started in a file
c) A program started in Boot sector
d) A program Started in ROM
e) None of these
10. To insert a new slide in the current presentation, we can choose?
a) Ctrl+M b) Ctrl+N
c) Ctrl+O d) Ctrl+F
e) None of these
11. An Internet connection requires which of the following?
a) a personal computer
b) a modem
c) a dial-up telephone line
d) a software to operate
e) All the above
12. ICMP stands for?
a) Intranet Control Message Protocol
b) Internet Control Message Protocol
c) Information Control Message Protocol
d) Internet communication message protocol
e) None of these
13. Which of the following device interconnects two or more networks, enabling data transfer to be made between them?
a) Plotter b) Joystick
c) Gateway d) Path
e) None of these
14. Which common technique attempts to save time and energy by reducing redundant work in object-oriented programming?
a) Reducing lines of programming
b) Reuse of code
c) Reduce size of systems being developed
d) Merging different systems together
e) None of these
15. Dot matrix and band printers are _____ printers?
a) Ink jet b) Impact
c) laser d) thermal
e) None of these
16. The topology with highest reliability is?
a) Bus b) Ring
c) Tree d) Mesh
e) Star
17. Verification of a login name and password is knows as?
a) Configuration
b) Accessibility
c) Authentication
d) Logging in e) None of these
18. The 16-bit microprocessor means that it has?
a) 16 address lines
b) 16 Buses c) 16 data lines
d) 16 routers e) None of these
19. Which of the following is NOT a goal of Transaction Processing System?
a) Capture, process and store transactions
b) Produce a variety of documents related to routine business activities
c) Reduce manual effort associated with processing
d) Produce standard reports used for management decision making
e) None of these
20. Which of the following is a program that works like a calculator for keeping track of money and making budgets?
a) Calculator b) Spreadsheet
c) Budgeter d) Financier
e) None of these
21. The process by which a computer receives information from a server on the internet is known as?
a) Pulling b) Pushing
c) Downloading d) transferring
e) None of these
22. Which of the following is NOT a common feature of software application?
a) Menu b) Windows
c) Help d) Search
e) None of the above
23. Selecting landscape changes our page from?
a) a wide to tall orientation
b) a tall to wide orientation
c) a normal font size to a condensed one
d) a condensed font size to a normal one
e) None of the above
24. Unsolicited commercial E-mails is commonly Known as?
a) Junk b) Hypertext
c) Spam d) Hoaxes
e) All of the above
25. When a computer is attacked by a virus it cannot lead to ?
a) Disk Crash
b) Motherboard Crash
c) Corruption of a program
d) Deletion of files
e) None of these
26. Which of the following is another name for a preprogrammed formula in Excel?
a) Range b) Graph
c) Function d) Cell
e) None of these
27. The name for the way that computers manipulate data into information is called?
a) programming b) processing
c) storing d) organizing
e) None of these
28. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of?
a) eight bytes b) eight kilobytes
c) eight characters
d) eight bits e) None of these
29. The components that process data are located in the?
a) Input devices
b) output devices
c) System unit
d) Storage component
e) None of these
30. The keyboard shortcut to centralize the selected text in word is?
a) Ctrl+F b) Alt+C
c) Ctrl+C d) Ctrl+E
e) there is no short key for this operation
31. A touchpad responds to?
a) Light b) Pressure
c) Clicking
d) The sense of from fingertips
e) None of these
32. Which command is used to sea-rch all the text files in any drive?
a) file.txt b) .txt
c) .jpg d) file1.txt
e) None of these
33. In a ring topology, the computer in possession of the _____ can transmit data?
a) packet b) data
c) access method
d) token e) None of these
34. A database management system (DBMS) is a?
a) Hardware system used to create, maintain and provide controlled access to a database
b) Hardware system used to create, maintain and provide un-controlled access to a database
c) Software system used to create, maintain and provide un-controlled access to a database
d) Software system used to create, maintain and provide controlled access to a database
e) None of these
35. Bandwidth refers to?
a) the cost of the cable required to implemented a WAN
b) the cost of the cable required to implemented a LAN
c) the amount of information a peer-to-peer network can store
d) the amount of information can transfer in a communication medium in a given time
e) None of these
36. Which term identifies a specific computer on the web and the main page of the entire site?
a) URL b) Web site address
c) Hyperlink d) Domain name
e) None of these
37. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as?
a) spyware b) Hardware
c) spam d) Malware
e) None of these
38. Human beings are referred to as Homo Sapiens. Which of the following is referred to as Silico Sapiens?
a) Monitor b) Hardware
c) Robot d) Computer
e) All the above
39. Which of the following is not a form of Biometrics?
a) fingerprint b) password
c) retina scan d) breath scan
e) None of these
40. What type of computer could be found in a digital watch?
a) Mainframe computer
b) Supercomputer
c) Embedded computer
d) Notebook computer
e) None of these
41. Virtual memory is?
a) memory on the hard disk that the CPU uses as extended RAM
b) Only necessary if you do not have any RAM in your computer
c) a backup device for floppy disks
d) Both 1 and 3
e) None of these
42. Servers are those computers which provide resources to other computers connected by?
a) Network
b) Main frame
c) Super computer
d) Client
e) None of these
Answers
1) d 2) c 3) b 4) b 5) c 6) a 7) d 8) d 9) d 10) a
11) e 12) b 13) c 14) b 15) b 16) d 17) c 18) c 19) d 20) b
21) c 22) b 23) b 24) c 25) b 26) c 27) b 28) d 29) c 30) d
31) b 32) b 33) d 34) d 35) d 36) a 37) d 38) d 39) d 40) c
41) a 42) a
a) Cute Ftp b) Get Right
c) Win Zip d) MSN Messenger
e) None of these
2. The term "gigabyte" refers to?
a) 1024 bytes b) 1024 kilobytes
c) 1024 megabytes
d) 1024 gigabytes
e) None of these
3. A program written in a high-level language is a?
a) Objective program
b) Source program
c) Compiled Program
d) All of the above
e) None of these
4. Which of the following is represented by a cluster in a Hard disk?
a) Total numbers of tracks
b) Group of Tracks
c) Group of Rows
d) All of the above
e) None of the above
5. Unix Operating system was developed by?
a) Walter Baatain
b) John Burdeen
c) Ken Thompson
d) All the above e) None of these
6. Which of the following is a graphics solution for word processors?
a) Clipart b) Word art
c) Drop cap d) All the above
e) None of these
7. A program for viewing web pages is called?
a) Hardware b) Software
c) Storage d) Browser
e) None of These
8. What does SNMP Stands for?
a) Simple Network Mail Protocol
b) Single Network Mail Protocol
c) Single Network Message Protocol
d) Simple Network Message Protocol
e) None of these
9. What is Firmware?
a) A program Started in RAM
b) A Program started in a file
c) A program started in Boot sector
d) A program Started in ROM
e) None of these
10. To insert a new slide in the current presentation, we can choose?
a) Ctrl+M b) Ctrl+N
c) Ctrl+O d) Ctrl+F
e) None of these
11. An Internet connection requires which of the following?
a) a personal computer
b) a modem
c) a dial-up telephone line
d) a software to operate
e) All the above
12. ICMP stands for?
a) Intranet Control Message Protocol
b) Internet Control Message Protocol
c) Information Control Message Protocol
d) Internet communication message protocol
e) None of these
13. Which of the following device interconnects two or more networks, enabling data transfer to be made between them?
a) Plotter b) Joystick
c) Gateway d) Path
e) None of these
14. Which common technique attempts to save time and energy by reducing redundant work in object-oriented programming?
a) Reducing lines of programming
b) Reuse of code
c) Reduce size of systems being developed
d) Merging different systems together
e) None of these
15. Dot matrix and band printers are _____ printers?
a) Ink jet b) Impact
c) laser d) thermal
e) None of these
16. The topology with highest reliability is?
a) Bus b) Ring
c) Tree d) Mesh
e) Star
17. Verification of a login name and password is knows as?
a) Configuration
b) Accessibility
c) Authentication
d) Logging in e) None of these
18. The 16-bit microprocessor means that it has?
a) 16 address lines
b) 16 Buses c) 16 data lines
d) 16 routers e) None of these
19. Which of the following is NOT a goal of Transaction Processing System?
a) Capture, process and store transactions
b) Produce a variety of documents related to routine business activities
c) Reduce manual effort associated with processing
d) Produce standard reports used for management decision making
e) None of these
20. Which of the following is a program that works like a calculator for keeping track of money and making budgets?
a) Calculator b) Spreadsheet
c) Budgeter d) Financier
e) None of these
21. The process by which a computer receives information from a server on the internet is known as?
a) Pulling b) Pushing
c) Downloading d) transferring
e) None of these
22. Which of the following is NOT a common feature of software application?
a) Menu b) Windows
c) Help d) Search
e) None of the above
23. Selecting landscape changes our page from?
a) a wide to tall orientation
b) a tall to wide orientation
c) a normal font size to a condensed one
d) a condensed font size to a normal one
e) None of the above
24. Unsolicited commercial E-mails is commonly Known as?
a) Junk b) Hypertext
c) Spam d) Hoaxes
e) All of the above
25. When a computer is attacked by a virus it cannot lead to ?
a) Disk Crash
b) Motherboard Crash
c) Corruption of a program
d) Deletion of files
e) None of these
26. Which of the following is another name for a preprogrammed formula in Excel?
a) Range b) Graph
c) Function d) Cell
e) None of these
27. The name for the way that computers manipulate data into information is called?
a) programming b) processing
c) storing d) organizing
e) None of these
28. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of?
a) eight bytes b) eight kilobytes
c) eight characters
d) eight bits e) None of these
29. The components that process data are located in the?
a) Input devices
b) output devices
c) System unit
d) Storage component
e) None of these
30. The keyboard shortcut to centralize the selected text in word is?
a) Ctrl+F b) Alt+C
c) Ctrl+C d) Ctrl+E
e) there is no short key for this operation
31. A touchpad responds to?
a) Light b) Pressure
c) Clicking
d) The sense of from fingertips
e) None of these
32. Which command is used to sea-rch all the text files in any drive?
a) file.txt b) .txt
c) .jpg d) file1.txt
e) None of these
33. In a ring topology, the computer in possession of the _____ can transmit data?
a) packet b) data
c) access method
d) token e) None of these
34. A database management system (DBMS) is a?
a) Hardware system used to create, maintain and provide controlled access to a database
b) Hardware system used to create, maintain and provide un-controlled access to a database
c) Software system used to create, maintain and provide un-controlled access to a database
d) Software system used to create, maintain and provide controlled access to a database
e) None of these
35. Bandwidth refers to?
a) the cost of the cable required to implemented a WAN
b) the cost of the cable required to implemented a LAN
c) the amount of information a peer-to-peer network can store
d) the amount of information can transfer in a communication medium in a given time
e) None of these
36. Which term identifies a specific computer on the web and the main page of the entire site?
a) URL b) Web site address
c) Hyperlink d) Domain name
e) None of these
37. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as?
a) spyware b) Hardware
c) spam d) Malware
e) None of these
38. Human beings are referred to as Homo Sapiens. Which of the following is referred to as Silico Sapiens?
a) Monitor b) Hardware
c) Robot d) Computer
e) All the above
39. Which of the following is not a form of Biometrics?
a) fingerprint b) password
c) retina scan d) breath scan
e) None of these
40. What type of computer could be found in a digital watch?
a) Mainframe computer
b) Supercomputer
c) Embedded computer
d) Notebook computer
e) None of these
41. Virtual memory is?
a) memory on the hard disk that the CPU uses as extended RAM
b) Only necessary if you do not have any RAM in your computer
c) a backup device for floppy disks
d) Both 1 and 3
e) None of these
42. Servers are those computers which provide resources to other computers connected by?
a) Network
b) Main frame
c) Super computer
d) Client
e) None of these
Answers
1) d 2) c 3) b 4) b 5) c 6) a 7) d 8) d 9) d 10) a
11) e 12) b 13) c 14) b 15) b 16) d 17) c 18) c 19) d 20) b
21) c 22) b 23) b 24) c 25) b 26) c 27) b 28) d 29) c 30) d
31) b 32) b 33) d 34) d 35) d 36) a 37) d 38) d 39) d 40) c
41) a 42) a
Thanks for sharing such useful Information
ReplyDeleteHi visit there to know about Computer knowledge alot of information is here.Computer Important Tips
ReplyDeleteExcellent post! I must thank you for this informative read. I hope you will post again soon.
ReplyDeleteLaptop Screen Replacement