1. Programs from the same developer, sold bundled together, that provide better integration and share common features, toolbars and menus are known as?
1) software suites
2) integrated software
3) software processing
4) personal information
5) none of these
2. A data warehouse is which of the following?
1) Can be updated by the users
2) Contains numerous conventions and formats
3) Organized around subject areas
4) Contains only current data
5) None of these
3. _____ servers store and manages files for network users.
1) Authentication
2) Main
3) Web
4) File
5) None of these
4. All of the following are examples of real security and privacy risks except?
1) hackers
2) spam
3) viruses
4) identify theft
5) None of these
5. Loading Operating System onto RAM is called?
1) Printing
2) Saving
3) Booting
4) Staring
5) None of these
6. In MICR, C stands for?
1) Code
2) Colour
3) Computer
4) Character
5) None of these
7. System software is the set of programs that enables your computer's hardware devices and ____ software to work together?
1) management
2) processing
3) utility
4) application
5) None of these
8. _____ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat?
1) Servers
2) Embedded computers
3) Robotic computers
4) Mainframes
5) None of these
9. The following are all computing devices, except?
1) notebook computers
2) cellular telephones
3) digital scanners
4) personal digital assistants
5) None of these
10. In a ring topology, the computer in possession of the _____ can transmit data?
1) packet
2) data
3) access method
4) token
5) None of these
11. This part of operating system manages the essential peripherals, such as the keyboard, screen, disk drives and parallel and serial ports ______
1) basic input/output
2) secondary system
3) peripheral system
4) marginal system
5) None of these
12. The bar at the top of a window that bears the name of the window is known as?
1) control panel
2) task bar
3) menu bar
4) status bar
5) title bar
13. ______ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
1) The platform
2) Application software
3) Operating system
4) The motherboard
5) None of these
14. Servers are computers that provide resources to other computers connected to a?
1) mainframe
2) network
3) super computer
4) client
5) None of these
15. A device that operates under the control of another device is called?
1) Stem
2) Slave
3) Simulator
4) Emulator
5) None of these
16. URL stands for?
1) Universal Research List
2) Universal Resource List
3) Uniform Resource Locator
4) Uniform Research Locator
5) None of these
17. A database management system (DBMS) is a?
1) hardware system used to create, maintain and provide controlled access to a data- base
2) hardware system used to create, maintain, and provide uncontrolled access to a database.
3) software system used to create, maintain, and provide uncontrolled access to a database.
4)software system used to create, maintain and provide controlled access to a database.
5)None of these
18. The design of the network is called the network?
1) architecture
2) server
3) transmission
4) type
5) None of these
19.A Proxy server is used for which of the following?
1)To provide security against unauthorized users
2)To process client requests for web pages
3)To provide TCP/IP
4)To process client requests for database access
5) None of these
20.When data changes in multiple lists and all lists are not updated, this causes?
1) data redundancy
2) information overload
3) duplicate data
4) data inconsistency
5) None of these
21._____ are words that a programming language has set aside for its own use?
1) Control words
2) Reserved words
3) Control structures
4) Reserved keys
5) None of these
22.The most frequently used instru-ctions of a computer program are likely to be fetched from?
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these
23.What is the shortcut key to "Undo" the last action in a document?
1) Ctrl + X
2) Ctrl + Y
3) Ctrl + Z
4) Ctrl + U
5) None of these
24.You must install a(n) ________ on a network if you want to share a broadband Internet connection.
1) router
2) modem
3) node
4) cable
5) None of these
25.The errors that can be pointed out by the compiler are?
1) Syntax errors
2) Semantic errors
3) Logic errors
4) System errors
5) None of these
26.Granting an outside organization access to internet web pages is often implemented using a(n)?
1) extranet
2) intranet
3) internet
4) hacker
5) None of these
27.Which term identifies a specific computer on the web and the main page of the entire site?
1) URL
2) Web site address
3) Hyperlink
4) Domain name
5) None of these
28.The code that relational database management systems use to perform their database task is referred to as?
1) QBE
2) SQL
3) OLAP
4) Sequel Server
5) None of these
29.Chip is a common nickname for a(n)?
1) transistor
2) resistor
3) integrated circuit
4) semiconductor
5) None of these
30.Programs such as Internet Explorer that serve as navigable windows into the Web are called
1) Hypertext
2) Networks
3) Internet
4) Web browsers
5) None of these
31.What menu is selected to cut, copy and paste?
1) File
2) Tools
3) Special
4) Edit
5) None of these
32.The most important or powerful computer in a typical network is?
1) desktop
2) network client
3) network server
4) network station
5) None of these
33.The primary purpose of software is to turn data into?
1) Web sites
2) information
3) programs
4) objects
5) None of these
34.The ability to find an individual item in a file immediately _______ is used?
1) file allocation table
2) directory
3) sequential access
4) direct access
5) None of these
35.To make a notebook act as a desktop model, the notebook can be connected to a ______
which is connected to a monitor and other devices?
1) bay
2) docking station
3) port
4) network
5) None of these
36.You can use the tab key to?
1) move cursor across the screen
2) indent a paragraph
3) move the cursor down the screen
4) Only (1) and (2)
5) None of these
37.A collection of related files is called a?
1) character
2) field
3) database
4) adjusting
5) None of these
38.Storage that retains its data after the power is turned off is referred to as?
1) volatile storage
2) non-volatile storage
3) sequential storage
4) direct storage
5) None of these
39.Which of the following is an example of connectivity?
1) Internet
2) floppy disk
3) power card
4) data
5) None of these
40._______ is the process of finding errors in software code?
1) Compiling
2) Testing
3) Running
4) Debugging
5) None of these
41.A _______ contains specific rules and words that express the logical steps of an algorithm?
1) syntax
2) programming structure
3) programming language
4) logic chart
5) None of these
42.Changing an existing document is called ______ the document?
1) creating
2) editing
3) modifying
4) adjusting
5) None of these
43.Virtual memory is?
1) memory on the hard disk that the CPU uses an extended RAM
2) in RAM
3) only necessary if you do not have any RAM in your computer
4) a back up device for floppy disks
5) None of these
44.Computers use the ________ number system to store data and perform calculations?
1) decimal
2) hexadecimal
3) octal
4) binary
5) None of these
45.The ______ key will launch the start buttons?
1) esc
2) shift
3) windows
4) shortcut
5) None of these
46.To move to the beginning of a line of text, press the _____ key?
1) home
2) a
3) page up
4) enter
5) None of these
47.When sending an e-mail, the ______ line describes the contents of the message?
1) to
2) subject
3) contents
4) CC
5) None of these
48.Which groupings do you work with when formatting text in Word?
1) Tables, paragraphs and indexes
2) Paragraphs, indexes and sections
3) Characters, sections and paragraphs
4) Indexes, characters and tables
5) None of these
49.Which of the following is the largest unit of storage?
1) GB
2) KB
3) MB
4) TB
5) None of these
50.The ______ tells the computer how to use its components?
1) utility
2) network
3) operating system
4) application program
5) None of these
ANSWERS:
1. (1) 2. (3) 3. (4) 4. (2) 5. (3) 6. (4) 7. (4) 8. (2) 9. (3) 10. (4)
11. (1) 12. (5) 13. (3) 14. (2) 15. (2) 16. (3) 17. (4) 18. (1) 19. (2) 20. (4)
21. (2) 22. (2) 23. (3) 24. (1) 25. (1) 26. (1) 27. (1) 28. (2) 29. (3) 30. (4)
31. (4) 32. (3) 33. (2) 34. (3) 35. (2) 36. (4) 37. (3) 38. (2) 39. (1) 40. (2)
41. (1) 42. (2) 43. (1) 44. (4) 45. (3) 46. (1) 47. (2) 48. (1) 49. (1) 50. (3)
1) software suites
2) integrated software
3) software processing
4) personal information
5) none of these
2. A data warehouse is which of the following?
1) Can be updated by the users
2) Contains numerous conventions and formats
3) Organized around subject areas
4) Contains only current data
5) None of these
3. _____ servers store and manages files for network users.
1) Authentication
2) Main
3) Web
4) File
5) None of these
4. All of the following are examples of real security and privacy risks except?
1) hackers
2) spam
3) viruses
4) identify theft
5) None of these
5. Loading Operating System onto RAM is called?
1) Printing
2) Saving
3) Booting
4) Staring
5) None of these
6. In MICR, C stands for?
1) Code
2) Colour
3) Computer
4) Character
5) None of these
7. System software is the set of programs that enables your computer's hardware devices and ____ software to work together?
1) management
2) processing
3) utility
4) application
5) None of these
8. _____ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat?
1) Servers
2) Embedded computers
3) Robotic computers
4) Mainframes
5) None of these
9. The following are all computing devices, except?
1) notebook computers
2) cellular telephones
3) digital scanners
4) personal digital assistants
5) None of these
10. In a ring topology, the computer in possession of the _____ can transmit data?
1) packet
2) data
3) access method
4) token
5) None of these
11. This part of operating system manages the essential peripherals, such as the keyboard, screen, disk drives and parallel and serial ports ______
1) basic input/output
2) secondary system
3) peripheral system
4) marginal system
5) None of these
12. The bar at the top of a window that bears the name of the window is known as?
1) control panel
2) task bar
3) menu bar
4) status bar
5) title bar
13. ______ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
1) The platform
2) Application software
3) Operating system
4) The motherboard
5) None of these
14. Servers are computers that provide resources to other computers connected to a?
1) mainframe
2) network
3) super computer
4) client
5) None of these
15. A device that operates under the control of another device is called?
1) Stem
2) Slave
3) Simulator
4) Emulator
5) None of these
16. URL stands for?
1) Universal Research List
2) Universal Resource List
3) Uniform Resource Locator
4) Uniform Research Locator
5) None of these
17. A database management system (DBMS) is a?
1) hardware system used to create, maintain and provide controlled access to a data- base
2) hardware system used to create, maintain, and provide uncontrolled access to a database.
3) software system used to create, maintain, and provide uncontrolled access to a database.
4)software system used to create, maintain and provide controlled access to a database.
5)None of these
18. The design of the network is called the network?
1) architecture
2) server
3) transmission
4) type
5) None of these
19.A Proxy server is used for which of the following?
1)To provide security against unauthorized users
2)To process client requests for web pages
3)To provide TCP/IP
4)To process client requests for database access
5) None of these
20.When data changes in multiple lists and all lists are not updated, this causes?
1) data redundancy
2) information overload
3) duplicate data
4) data inconsistency
5) None of these
21._____ are words that a programming language has set aside for its own use?
1) Control words
2) Reserved words
3) Control structures
4) Reserved keys
5) None of these
22.The most frequently used instru-ctions of a computer program are likely to be fetched from?
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these
23.What is the shortcut key to "Undo" the last action in a document?
1) Ctrl + X
2) Ctrl + Y
3) Ctrl + Z
4) Ctrl + U
5) None of these
24.You must install a(n) ________ on a network if you want to share a broadband Internet connection.
1) router
2) modem
3) node
4) cable
5) None of these
25.The errors that can be pointed out by the compiler are?
1) Syntax errors
2) Semantic errors
3) Logic errors
4) System errors
5) None of these
26.Granting an outside organization access to internet web pages is often implemented using a(n)?
1) extranet
2) intranet
3) internet
4) hacker
5) None of these
27.Which term identifies a specific computer on the web and the main page of the entire site?
1) URL
2) Web site address
3) Hyperlink
4) Domain name
5) None of these
28.The code that relational database management systems use to perform their database task is referred to as?
1) QBE
2) SQL
3) OLAP
4) Sequel Server
5) None of these
29.Chip is a common nickname for a(n)?
1) transistor
2) resistor
3) integrated circuit
4) semiconductor
5) None of these
30.Programs such as Internet Explorer that serve as navigable windows into the Web are called
1) Hypertext
2) Networks
3) Internet
4) Web browsers
5) None of these
31.What menu is selected to cut, copy and paste?
1) File
2) Tools
3) Special
4) Edit
5) None of these
32.The most important or powerful computer in a typical network is?
1) desktop
2) network client
3) network server
4) network station
5) None of these
33.The primary purpose of software is to turn data into?
1) Web sites
2) information
3) programs
4) objects
5) None of these
34.The ability to find an individual item in a file immediately _______ is used?
1) file allocation table
2) directory
3) sequential access
4) direct access
5) None of these
35.To make a notebook act as a desktop model, the notebook can be connected to a ______
which is connected to a monitor and other devices?
1) bay
2) docking station
3) port
4) network
5) None of these
36.You can use the tab key to?
1) move cursor across the screen
2) indent a paragraph
3) move the cursor down the screen
4) Only (1) and (2)
5) None of these
37.A collection of related files is called a?
1) character
2) field
3) database
4) adjusting
5) None of these
38.Storage that retains its data after the power is turned off is referred to as?
1) volatile storage
2) non-volatile storage
3) sequential storage
4) direct storage
5) None of these
39.Which of the following is an example of connectivity?
1) Internet
2) floppy disk
3) power card
4) data
5) None of these
40._______ is the process of finding errors in software code?
1) Compiling
2) Testing
3) Running
4) Debugging
5) None of these
41.A _______ contains specific rules and words that express the logical steps of an algorithm?
1) syntax
2) programming structure
3) programming language
4) logic chart
5) None of these
42.Changing an existing document is called ______ the document?
1) creating
2) editing
3) modifying
4) adjusting
5) None of these
43.Virtual memory is?
1) memory on the hard disk that the CPU uses an extended RAM
2) in RAM
3) only necessary if you do not have any RAM in your computer
4) a back up device for floppy disks
5) None of these
44.Computers use the ________ number system to store data and perform calculations?
1) decimal
2) hexadecimal
3) octal
4) binary
5) None of these
45.The ______ key will launch the start buttons?
1) esc
2) shift
3) windows
4) shortcut
5) None of these
46.To move to the beginning of a line of text, press the _____ key?
1) home
2) a
3) page up
4) enter
5) None of these
47.When sending an e-mail, the ______ line describes the contents of the message?
1) to
2) subject
3) contents
4) CC
5) None of these
48.Which groupings do you work with when formatting text in Word?
1) Tables, paragraphs and indexes
2) Paragraphs, indexes and sections
3) Characters, sections and paragraphs
4) Indexes, characters and tables
5) None of these
49.Which of the following is the largest unit of storage?
1) GB
2) KB
3) MB
4) TB
5) None of these
50.The ______ tells the computer how to use its components?
1) utility
2) network
3) operating system
4) application program
5) None of these
ANSWERS:
1. (1) 2. (3) 3. (4) 4. (2) 5. (3) 6. (4) 7. (4) 8. (2) 9. (3) 10. (4)
11. (1) 12. (5) 13. (3) 14. (2) 15. (2) 16. (3) 17. (4) 18. (1) 19. (2) 20. (4)
21. (2) 22. (2) 23. (3) 24. (1) 25. (1) 26. (1) 27. (1) 28. (2) 29. (3) 30. (4)
31. (4) 32. (3) 33. (2) 34. (3) 35. (2) 36. (4) 37. (3) 38. (2) 39. (1) 40. (2)
41. (1) 42. (2) 43. (1) 44. (4) 45. (3) 46. (1) 47. (2) 48. (1) 49. (1) 50. (3)
In ques no. 49 its answer is 4)TB.
ReplyDelete