1. …..aim at the boot sector of a hard drive by infecting a very crucial component of the boot process?
2. One of the more recent e-mail scams, which lures internet users into revealing personal information is referred to as :
(1) File infection virus (2) Boot virus
(3) Network virus (4) E-mail virus
(5) None of these
2. One of the more recent e-mail scams, which lures internet users into revealing personal information is referred to as :
(1) phishing (2) flaming
(3) blogging (4) pop- ups
(5) None of these
3. Malicious software is known as :
(1) Badware (2) Malware
(3) Malicious ware (4) Iiigalware
(5) None of these
4. Hardware or software designed to guard against authorized access to computer network is known as …
(1) Hacker proof program (2) Firewall
(3) Hacker resistant server (4) Encryption safe wall
(5) None of these
5. The fastest and quietest type of printer is a(n):
(1) dot-matrix printer. (2) inkjet printer.
(1) dot-matrix printer. (2) inkjet printer.
(3) laser printer. (4) plotter.
(5) None of these
6. The type of large printer that can most accurately produce images requiring precise, continuous lines is a(n):
(1) plotter. (2) inkjet printer.
(1) plotter. (2) inkjet printer.
(3) laser printer. (4) dot-matrix printer.
(5) none of these
7. MICR stands for?
(1) Magnetic Ink Character Recognition
(1) Magnetic Ink Character Recognition
(2) Magnetic Ink Code Reader
(3) Magnetic Ink Cases Reader
(3) Magnetic Ink Cases Reader
(4) None of the above
(5) All of the above
8. The main difference between application and system software is that:
(1) Application software is composed of program instructions but system software is not.
(2) Application software is stored in memory whereas system software is only in the CPU.
(3) System software is unnecessary whereas application software must be present on the computer.
(4) System software manages hardware whereas application software performs user tasks.
(1) Application software is composed of program instructions but system software is not.
(2) Application software is stored in memory whereas system software is only in the CPU.
(3) System software is unnecessary whereas application software must be present on the computer.
(4) System software manages hardware whereas application software performs user tasks.
(5) None of these
9. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(1) Trojan horse (2) Boot sector
(3) Script (4) Logic bomb
(5) None of these
(1) Trojan horse (2) Boot sector
(3) Script (4) Logic bomb
(5) None of these
10. Servers are computers that provide resources to other computers connected to a ___________
(1) mainframe (2) network
(3) supercomputer (4) client
(5) None of these
(1) mainframe (2) network
(3) supercomputer (4) client
(5) None of these
11. A goal of data mining includes which of the following?
(1) To explain some observed event or condition
(2) To confirm that data exists
(3) To analyze data for expected relationships
(4) To create a new data warehouse
(5) None of these
(1) To explain some observed event or condition
(2) To confirm that data exists
(3) To analyze data for expected relationships
(4) To create a new data warehouse
(5) None of these
12. A Proxy server is used for which of the following?
(1) To provide security against unauthorized users
(2) To process client requests for web pages
(3) To process client requests for database access
(4) To provide TCP/IP
(5) None of these
(1) To provide security against unauthorized users
(2) To process client requests for web pages
(3) To process client requests for database access
(4) To provide TCP/IP
(5) None of these
13. When data changes in multiple lists and all lists are not updated, this causes:
(1) data redundancy (2) information overload
(3) duplicate data (4) data inconsistency
(5) None of these
(1) data redundancy (2) information overload
(3) duplicate data (4) data inconsistency
(5) None of these
14. _____________ are words that a programming language has set aside for its own use.
(1) Control worlds (2) Reserved words
(3) Control structures (4) Reserved keys
(5) None of these
(1) Control worlds (2) Reserved words
(3) Control structures (4) Reserved keys
(5) None of these
15. You must install a (n) ____________ on a network if you want to share a broadband Internet connection.
(1) router (2) modem
(1) router (2) modem
(3) node (4) cable
(5) None of these
16. Which term identifies a specific computer on the web and the main page of the entire site
(1) URL (2) Web site address
(1) URL (2) Web site address
(3) Hyperlink (4) Domain name
(5) None of these
17. The code that relational database management systems use to perform their database task is referred to as …..
(1) QBE (2) SQL
(1) QBE (2) SQL
(3) OLAP (4) Sequel Server
(5) None of these
18. The purpose of the primary key in a database is to:
(1) unlock the database
(1) unlock the database
(2) provide a map of the data
(3) uniquely identify a record
(4) establish constraints on database operations.
(5) None of these
(3) uniquely identify a record
(4) establish constraints on database operations.
(5) None of these
19. A _________ contains specific rules and words that express the logical steps of an algorithm.
(1) programming language (2) syntax
(3) programming structure (4) logic chart
(5) None of these
(1) programming language (2) syntax
(3) programming structure (4) logic chart
(5) None of these
20. The most frequently used instructions of a computer program are likely to be fetched from:
(1) the hard disk (2) cache memory
(3) RAM (4) registers
(5) None of these
(1) the hard disk (2) cache memory
(3) RAM (4) registers
(5) None of these
21. A (n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.
(1) command – based user interface
(1) command – based user interface
(2) GUI
(3) system utility
(3) system utility
(4) API
(5) None of these
(5) None of these
22. Which of the following is NOT a type of broadband Internet connection?
(1) Cable (2) DSL
(1) Cable (2) DSL
(3) Dial-up (4) Satellite
(5) None of these
23. In Power Point Animation Schemes can be applied to ___ in the presentation?
(1) All Slides (2) Selected Slides
(3) Current Slides (4) All of the above
(5) None of these
24. The arrangements of elements such as Title and Subtitle text, pictures, tables etc.
(1) Layout (2) Presentation
(3) Design (4) Scheme
(5) None of these
25. In Power Point from where we can set the timing for each object?
(1) Slide show, custom transition
(2) Slide show, Slide transition
(3) Slide show, custom animation
(4) View, slide sorter
(5) None of these
26. After choosing a predefined template, which option has to be chosen change the background colour?
(1) Design Template (2) Colour Scheme
(3) Animation Scheme (4) Colour Effects
(5) None of these
27. The shortcut key to switch between different application is
(1) Alt+F1 (2) Alt+Tab
(3)Shift +Tab (4) Ctrl + Tab
(5) None of these
28. Which of following terms is associated with high – speed connection?
(1) TCP/IP (2) Dial-up access
(3) Ethernet (4) Broadband
(5) None of these
29. ____is the keyboard shortcut for opening the Excel Formula Window.
(1) Shift + F3 (2) Shift + F1
(3) Ctrl + F3 (4) Ctrl + F1
(4) Ctrl + F1 + 1
30. To move the previous work sheet, we press:
(1) Alt + PgUp (2) Ctrl + PgUp
(3) Ctrl + PgDn (4) Shift + Tab
(5) None of these
31. To add two cells (A1 and A2) together you use which of the formula?
(1) = A1+ A2 (2) = Add (A1 + A2)
(3) = together (A1:A2) (4) A1 + A2
(5) None of these
32. Find the correct set of three types of data found on a spreadsheet.
(1) Data, words, numbers
(2) Equation, data, numbers
(3) Words, numbers, labels
(4) Number, formulas, labels
(5) None of these
33. Which of the following displays buttons for changing text style, alignment and size?
(1) Standard tool bar (2) Status bar
(3) Drawing tool bar (4) Formulating tool bar
(5) None of these
34. What is a cookie?
(1)Executable File
(2)Boot device
(3)Hacker File
(4)Internet Information File
(1)Executable File
(2)Boot device
(3)Hacker File
(4)Internet Information File
(5) None of these
35. What was the first ARPANET message?
(1)"Hello World"
(2)"Arpanet"
(3)"Lo"
(4)"My first message"
(1)"Hello World"
(2)"Arpanet"
(3)"Lo"
(4)"My first message"
(5) None of these
36. The windows registry consists of which two files?
(1)Win.reg and User.dat
(2)Win.dat and System.dat
(3)User.Dat And System.Dat
(4)System.reg and User.reg
(1)Win.reg and User.dat
(2)Win.dat and System.dat
(3)User.Dat And System.Dat
(4)System.reg and User.reg
(5) None of these
37. Which of the following is not an option in the spelling dialog box?
(1) Edit (2) Ignore
(3) Ignore all (4) Change
(5) None of these
38. To copy cell contents using drag and drop, press the:
(1) End key (2) Shift key
(3) Esc key (4) All of above
(5) None of these
39. What is the keyboard shortcut (button or buttons to be pressed) for creating a chart from the selected cells?
(1) F3 (2) F5
(3) F7 (4) F11
(5) None of these
40. You can use the formula palette to:
(1) format cells containing numbers
(2) create and edit formulas containing functions
(3) entered assumptions data
(4) copy a range of cells
(5) None of these
41. Ctrl, Shift and Alt are called __ keys.
(1) modifier (2) function
(3) alphanumeric (4) adjustment
(5)None of these
42. The pattern of printed lines on most products are called-
(1) prices (2)OCR
(3) scanners (4) barcodes
(5)None of these
43. What is the permanent memory built into your computer called?
(1) RAM (2) ROM
(3) CPU (4) CD-ROM
(5) None of these
44. Various applications and documents are represented on the Windows desktop by __.
(1) symbols (2)labels
(3) graphs (4) icons
(5) None of these
45. E-mail addresses separate the user name from the ISP using the __ symbol.
(1) & (2) @
(3) % (4) *
(5) None of these
46. The __ of a system includes the program s or instructions.
(1) hardware (2) icon
(3) information (4) software
(5) None of these
47. The main advantage of magnetic disk compared to magnetic tape is
(1) low cost (2) rigidity
(3) direct access (4) high packet density
(5) sequential access
48. The memory card which is conceptually related to the smart card but is similar to the video disk, is
(1) Master card (2) Visa card
(3) Optical card (4) Laser card
(5) Data card
49. ……… process rearranges file fragments into contiguous files.
(1) folder folding (2)Defragmentation
(3) Unflagging (4) Disk scanning
(5) File filling
50. Which view is not available in Microsoft Word 2007?
(1) Outline (2) Full Screen
(3) Page Break (4) Draft
(5)Print Layout
Answers:
1 | 2 | 11 | 3 | 21 | 2 | 31 | 1 | 41 | 1 |
2 | 1 | 12 | 2 | 22 | 3 | 32 | 4 | 42 | 4 |
3 | 2 | 13 | 4 | 23 | 4 | 33 | 4 | 43 | 2 |
4 | 2 | 14 | 2 | 24 | 1 | 34 | 4 | 44 | 4 |
5 | 3 | 15 | 1 | 25 | 3 | 35 | 3 | 45 | 2 |
6 | 1 | 16 | 1 | 26 | 2 | 36 | 3 | 46 | 4 |
7 | 1 | 17 | 2 | 27 | 2 | 37 | 1 | 47 | 3 |
8 | 4 | 18 | 3 | 28 | 4 | 38 | 5 | 48 | 4 |
9 | 2 | 19 | 2 | 29 | 1 | 39 | 4 | 49 | 2 |
10 | 2 | 20 | 2 | 30 | 2 | 40 | 2 | 50 | 4 |
No comments:
Post a Comment