Está en la página 1de 60

Q(1).

One megabyte equals approximately

A. B. C. D.

1,000 bits 1,000 bytes 1 million bytes 1 million bits

Q(2). Data going into the computer is called?

A. B. C. D.

Output Algorithm Input Calculations

Q(3). Which of the following refers to the memory in your computer?

A. B. C. D.

RAM DSL USB LAN

Q(4). When you are working on a document on PC, where is the document temporarily stored?

A. B. C. D.

RAM ROM The CPU Flash memory

Q(5). Information travels between components on the mother board through

A. Flash memory B. CMOS C.Bays D. Buses Q(6). How are data organised in a spreadsheet?

A. B. C. D.

Lines and spaces Layers and planes Height and width Rows and columns

Q(7). Which of the following is true?

A. B. C. D.

Byte is a single digit in Bit represents a grouping Eight-digit binary number Eight-digit binary number

a binary number of digital numbers is called a byte is called a bit

Q(8). Transformation of input into output is performed by?

A. Peripherals B. Memory C. Storage D. The Input-Output unit E. The CPU Q(9). How many options does a binary choice offer?

A. B. C. D.

None One Two It depends on the amount of memory in the computer

Q(10). .....is collection of web pages and ......is the very first page that we see on opening of a web-site

A. Home-page, Web-page B. Web-site, Home-page C. Web-page, Home-page D. Web-page, Web-site

Q(11). When the pointer is positioned on a _____ it is shaped like a hand.

A. B. C. D.

Grammar error Hyperlink Screen tip Spelling error

Q(12). The _____ of a system includes the programs or instructions.

A. B. C. D.

Hardware Icon Information Software

Q(13). 'www' stands for _____

A. B. C. D.

World World World World

Word Web Wide Web White Web Work Web

Q(14). What menu is selected to cut, copy, and paste?

A. File B. Tools

C. Special D. Edit Q(15). You can use the tab key to

A. B. C. D.

Move a cursor across the screen Indent a paragraph Move the cursor down the screen Only (A) and (B)

Q(16). The most important or powerful computer in a typical network is

A. Desktop B. Network client C. Network server D. Network station Which of the following is an example of connectivity?

A. B. C. D.

Internet Floppy disk Power cord Data

Q(18). The ability to find an individual item in a file immediately _____ is used.

A. B. C. D.

File allocation table Directory Sequential access Direct access

Q(19). The primary purpose of software is to turn data into _____

A. B. C. D.

Web sites Information Programs Objects

Q(20). To what temporary area can you store text and other data, and later paste them to another location?

A. B. C. D.

The clipboard ROM CD-ROM The hard disk

Q(1). Storage that retains its data after the power is tuned off is referred to as

A. B. C. D.

volatile storage non-volatile storage sequential storage direct storage

Q(2). _____is the science that attempts to produce machines that display the same type of intelligence that humans do.

A. Nano science B. Nanotechnology C. Simulation D. Artificial intelligence (AI) Q(3). Changing an existing document is called _____ the document.

A. B. C. D.

Creating Editing Modifying Adjusting

Q(4). Computers use the _____ number system to store data and perform calculations.

A. B. C. D.

Decimal Hexadecimal Octal Binary

Q(5). Which of the following is the largest unit of storage?

A. B. C. D.

GB KB MB TB

Q(6). The _____ key will launch the start buttons.

A. B. C. D.

Esc Shift Windows Shortcut

Q(7). _____is the process of finding errors in software code

A. B. C. D.

Compiling Testing Running Debugging

Q(8). To move to the beginning of a line of text, press the _____ key

A. B. C. D.

Home A Page-up Enter

Q(9). Virtual memory is

A. B. C. D.

Memory on the hard disk that the CPU uses as an extended RAM RAM Only necessary if you do not have any RAM in your computer A back up device for floppy disks

Q(10). A _____ contains specific rules and words that express the logical steps of an algorithm.

A. B. C. D.

Syntax Programming structure Programming language Logic chart

Q(11). When sending an e-mail, the _____ line describes the contents of the message.

A. B. C. D.

to subject contents CC

Q(12). The _____ tells the computer how to use its components

A. B. C. D.

Utility Network Operating system Application program

Q(13). Which grouping do you work with when formatting text in word?

A. B. C. D.

Tables, paragraphs and indexes Paragraphs, indexes and sections Characters, sections and paragraphs Indexes, characters and tables

Q(14). What is backup?

A. Adding more components to your network B. Protecting data by copying it from the original source to a different destination

C. Filtering old data from the new data D. Accessing data on tape Q(15). Network components are connected to the same cable in the _____ topology.

A. B. C. D.

Star Ring Bus Mesh

Q(16). This component is required to process data into information and consists of integrated circuits.

A. B. C. D.

Hard disk RAM CPU ROM

Q(17). One advantage of dial-up-internet access is ___

A. B. C. D.

It utilises broadband technology It utilizes existing telephone service It uses a router for security Modem speeds are very fast

Q(18). What is the term for unsolicited e-mail?

A. B. C. D. E.

News group Use net Backbone Flaming Spam

Q(19). Two or more computers connected to each other of sharing information form a _____

A. B. C. D.

Network Router Server Tunnel

Q(20). Computers that are portable and convenient for users who travel are known as _____

A. B. C. D.

Super computers Lap tops Mini computers File servers

Q(1). A computer checks the _____ of user names and passwords for a match before granting access.

A. B. C. D.

Website Network Backup file Data base

Q(2). Office LANs that are spread geographically apart on a large scale can be connected using a corporate _____

A. B. C. D.

CAN LAN DAN WAN

Q(3). The code for a Web page is written using _____

A. B. C. D.

A fifth generation language Win Zip Peripherals Hypertext Markup Language

Q(4). What is the process of copying software programs from secondary storage media to the hard disk called?

A. B. C. D. E.

Configuration Download Storage Upload Installation

Q(5). Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as _____

A. B. C. D.

Flash Spiders Cookies Applets

Q(6). The first computers were programmed using ___

A. B. C. D.

Assembly language Machine language Source code Object code

Q(7). Which process checks to ensure the components of the computer and operating are connected properly?

A. Booting B. Processing

C. Saving D. Editing Q(8). In a relational database, this is a data structure that organizes the information about a single topic into rows and columns.

A. B. C. D.

Block Record Tuple Table

Q(9). How can the user determine what programs are available on a computer?

A. B. C. D.

Checking the hard disk properties Viewing the installed programs during the booting process Checking the operating system for a list of installed programs. Checking the existing files saved on the disk

Q(10). When we run a program in HTML coding _____ is used as

A. B. C. D.

Notepad - Internet-Explorer Notepad - Msn-messenger MS-Word - Internet Explorer Both (A) and (B)

Q(11). What type of network connection is NOT a way of connecting to the Internet?

A. B. C. D.

TCP/IP Dial-up ISDN T1

Q(12). Which of the following is the correct syntax for a URL?

A. B. C. D.

john@xyz.com c:\windows ../../index.php aol.com

Q(13). A High Resolution computer monitor will have:

A. B. C. D.

High dpi, e.g. .32 dpi Low dpi, e.g. .26 dpi 256 colors Resolution isnt measured in dpi or colors hard disk Memory is normally measured in:

Q(14). Computer

A. Kilobytes

B. Megabytes C. Gigabytes D. Terabytes Q(15). In Microsoft Excel, which of the following formulas is incorrect?

A. B. C. D.

=SUM(A1,B1,B2,C2) =ROUND(SUM(A1:C2),2) =ROUND(A1:C2,2) =SUM(ROUND(A1:B1,B2:C2))

Q(16). A world wide web contains web pages

A. B. C. D.

residing in many computers created using HTML with links to other web pages residing in many computers linked together using HTML

Q(17). By an intranet we mean

A. a LAN of an organization B. a Wide Area Network connecting all branches of an organization C. a corporate computer network D. a network connecting all computers of an organization and using the internet protocol Q(18). Internet uses

A. B. C. D.

Packet switching Circuit switching Telephone switching Telex switching

Q(19). Internet is

A. a local computer network B. a world wide network of computers C. an interconnected network of computers D. a world wide interconnected network of computers which use a common protocol to communicate with one another Q(20). ____________ is a set of computer programs used on a computer to help perform tasks.

A. B. C. D.

An instruction Software Memory A processor

Q(1). System software is the set of programs that enables your computers hardware devices and ____________ software to work together

A. B. C. D.

management processing utility application

Q(2). The PC (personal computer) and the Apple Macintosh are examples of two different:

A. B. C. D.

platforms. applications. programs. storage devices.

Q(3). Apple Macintoshes (Macs) and PCs use different____________ to process data and different operating systems.

A. B. C. D.

languages methods CPUs storage devices

Q(4). Servers are computers that provide resources to other computers connected to a:

A. B. C. D.

network. mainframe. supercomputer. client.

Q(5). Smaller and less expensive PC-based servers are replacing____________ in many businesses.

A. B. C. D.

supercomputers clients laptops mainframes

Q(6). DSL is an example of a(n) ____________ connection.

A. B. C. D.

network wireless slow broadband

Q(7). The difference between people with access to computers and the Internet and those without this access is known as the:

A. digital divide.

B. Internet divide. C. Web divide. D. broadband divide. Q(8). ___________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.

A. B. C. D.

Nanotechnology Micro-technology Computer forensics Artificial intelligence

Q(9). Word processing, spreadsheet, and photo-editing are examples of:

A. B. C. D.

application software. system software. operating system software. platform software.

Q(10). Which of the following is NOT a necessary characteristic of computer fluency?

A. B. C. D.

Understanding the capabilities and limitations of computers Being able to write computer programs Becoming comfortable with the use of computers Understanding the legal, ethical, and societal implications of computing

Q(11). According to the U.S. Department of Labor, approximately____________ % of American workers used computers on th e job as of 2001.

A. B. C. D.

20 40 50 70

Q(12). Retail employees typically use ____________ terminals to process sales transactions.

A. B. C. D.

sales processing transaction point automatic teller point of sale

Q(13). The process of ____________ involves automated study of consumer buying patterns in order to support marketing, inventory replenishment, and pricing decisions

A. B. C. D.

transaction processing data mining simulation information processing

Q(14). The engineering discipline that involves construction of molecularly-sized computing devices is called:

A. B. C. D.

nanotechnology. molecular processing. silicon grafting. nanoscience.

Q(15). The prefix that stands for oebillionth is:

A. B. C. D.

giga. tera. nano. peta.

Q(16). A small biomedical device currently on the market that can be implanted underneath the skin for identification purposes is called the:

A. B. C. D.

Identitron. Verichip. Digicard. Nanoguard.

Q(17). The four main functions of a computer are:

A. B. C. D.

input, processing, output, and storage. learning, thinking, intelligence, and virtuosity. data, information, bits, and bytes. hardware, software, modeling, and operations.

Q(18). The primary purpose of a computer is to process_____________ and convert it into information.

A. B. C. D.

electricity data raw material a bit

Q(19). Bit refers to a:

A. B. C. D.

computer language. CPU instruction. 0 or 1 value. digital representation of an alphabetic character.

Q(20). There are ____________ bits in a byte.

A. two

B. four C. six D. eight

Q(1). In computer language, each letter, number, and an array of special characters consists of:

A. B. C. D.

8 8 a 8

kilobytes. bytes. bit. bits.

Q(2). Which of the following is the correct sequence of smallest to largest unit of storage size?

A. B. C. D.

megabyte kilobyte kilobyte kilobyte

? ? ? ?

terabyte megabyte megabyte megabyte

? ? ? ?

gigabyte gigabyte gigabyte petabyte

? ? ? ?

kilobyte terabyte petabyte terabyte

? ? ? ?

petabyte petabyte terabyte gigabyte

Q(3). The prefix kilo refers to approximately:

A. B. C. D.

one one one one

thousand. million. hundred. billion.

Q(4). Computers work in:

A. B. C. D.

machine linguistics. binary language. HTML code. bit language.

Q(5). The metal or plastic case that houses the physical components of a computer together is called the:

A. B. C. D.

central processing unit . storage device. motherboard. system unit.

Q(6). The brains of the computer which executes the instructions, is called the:

A. B. C. D.

CPU. RAM. motherboard. system unit.

Q(7).Instructions and data that are about to be processed by the CPU are located in:

A. B. C. D.

a CD-ROM. RAM. the hard disk. the motherboard.

Q(8). The circuitry that includes the CPU and memory chips is located on the:

A. B. C. D.

system unit. operating system. motherboard. computer platform.

Q(9). All of the following are considered to be storage devices EXCEPT

A. B. C. D.

floppy disk. CPU. CD. hard disk drive.

Q(10). What is the correct association between a hardware component and a computer function?

A. B. C. D.

Monitor ? input Mouse ? input CPU ? storage Hard disk ? processing

Q(11). The main difference between application and system software is that:

A. application software is composed of program instructions but system software is not. B. application software is stored in memory whereas system software is only in the CPU. C. system software is unnecessary whereas application software must be present on the computer. D. system software manages hardware whereas application software performs user tasks. Q(12). A document created in a word processing program or a budget created in a spreadsheet are both examples of documents created in:

A. B. C. D.

application software. system software. an operating system. a Windows platform.

Q(13). Which of the following is an example of system software?

A. B. C. D.

Word processor Operating system Management information system Spreadsheet

Q(14). The term that refers to computers that provide resources toother computers in a network is:

A. B. C. D.

server. mainframe. platform. resource provider.

Q(15). If a large business is going to use a single computer to execute many programs for hundreds of users at the same time, performing relatively simple operations and transactions, the type of computer will probably be a

A. B. C. D.

Supercomputer PC Mainframe ISP

Q(16). One megabyte equals approximately

A. B. C. D.

1,000 bits 1,000 bytes 1 million bytes 1 million bits

Q(17). Data going into the computer is called?

A. B. C. D.

Output Algorithm Calculations Input

Q(18). Which of the following refers to the memory in your computer?

A. B. C. D.

RAM DSL USB LAN

Q(19). When you are working on a document on PC, where is the document temporarily stored?

A. B. C. D.

ROM RAM The CPU Flash memory

Q(20). Information travels between components on the mother board through-

A. Buses B. CMOS

C. Bays D. Flash memory


Q(1). How are data organised in a spreadsheet?

A. B. C. D.

Lines and spaces Layers and planes Height and width Rows and columns

Q(2). Which of the following is true?

A. B. C. D.

Byte is a single digit in Bit represents a grouping Eight-digit binary number Eight-digit binary number

a binary number of digital numbers is called a byte is called a bit

Q(3). Transformation of input into output is performed by?

A. B. C. D.

Peripherals Memory Storage The Input-Output unit.

Q(4). How many options does a binary choice offer?

A. B. C. D.

None One Two It depends on the amount of memory in the computer

Q(5). .....is collection of web pages and ......is the very first page that we see on opening of a web-site

A. B. C. D.

Home-page, Web-page Web-site, Home-page Web-page, Home-page Web-page, Web-site

Q(6). When the pointer is positioned on a _____ it is shaped like a hand.

A. B. C. D.

Grammar error Hyperlink Screen tip Spelling error

Q(7).The _____ of a system includes the programs or instructions.

A. B. C. D.

Hardware Icon Information Software

Q(8). 'www' stands for _____

A. B. C. D.

World World World World

Word Web Wide Web White Web Work Web

Q(9). What menu is selected to cut, copy, and paste?

A. B. C. D. 5)

File Tools Special Edit None

Q(10). You can use the tab key to

A. B. C. D.

Move a cursor across the screen Indent a paragraph Move the cursor down the screen Only (A. and (B.

Q(11). The most important or powerful computer in a typical network is

A. B. C. D.

Desktop Network client Network server Network station

Q(12). Which of the following is an example of connectivity?

A. B. C. D.

Internet Floppy disk Power cord Data

Q(13). The ability to find an individual item in a file immediately _____is used.

A. B. C. D.

File allocation table Directory Sequential access Direct access

Q(14). The primary purpose of software is to turn data into _____

A. B. C. D.

Web sites Information Programs Objects

Q(15). To what temporary area can you store text and other data, and later paste them to another location?

A. B. C. D.

The clipboard ROM CD-ROM The hard disk

Q(16). Storage that retains its data after the power is tuned off is referred to as

A. B. C. D.

volatile storage non-volatile storage sequential storage direct storage

Q(17). _____is the science that attempts to produce machines that display the same type of intelligence that humans do.

A. B. C. D.

Nano science Nanotechnology Simulation Artificial intelligence (AI)

Q(18). Changing an existing document is called _____ the document.

A. B. C. D.

Creating Editing Modifying Adjusting

Q(19). Computers use the _____ number system to store data and perform calculations.

A. B. 3) D.

Decimal Hexadecimal Octal Binary

Q(20). Which of the following is the largest unit of storage?

A. B. C. D.

GB KB MB TB

Q(1). The _____ key will launch the start buttons.

A. B. C. D.

Esc Shift Windows Shortcut

Q(2). _____is the process of finding errors in software code.

A. B. C. D.

Compiling Testing Running Debugging

Q(3). To move to the beginning of a line of text, press the _____ key.

A. B. C. D.

Home A Page-up Enter

Q(4). Virtual memory is

A. B. C. D.

Memory on the hard disk that the CPU uses as an extended RAM RAM Only necessary if you do not have any RAM in your computer A back up device for floppy disks

Q(5). A _____ contains specific rules and words that express the

A. B. C. D.

Syntax Programming structure Programming language Logic chart

Q(6). When sending an e-mail, the _____ line describes the contents of the message

A. B. C. D.

to subject contents CC

Q(7). The _____ tells the computer how to use its components

A. B. C. D.

Utility Network Operating system Application program

Q(8). Which grouping do you work with when formatting text in word?

A. B. C. D.

Tables, paragraphs and indexes Paragraphs, indexes and sections Characters, sections and paragraphs Indexes, characters and tables

Q(9). What is backup?

A. Adding more components to your network B. Protecting data by copying it from the original source to a different destination C. Filtering old data from the new data D. Accessing data on tape Q(10). Network components are connected to the same cable in the_____ topology.

A. B. C. D.

Star Ring Bus Mesh

Q(11). This component is required to process data into information and consists of integrated circuits.

A. B. C. D.

Hard disk RAM CPU ROM

Q(12). One advantage of dial-up-internet access is ___

A. B. C. D.

It utilises broadband technology It utilizes existing telephone service It uses a router for security Modem speeds are very fast

Q(13). What is the term for unsolicited e-mail?

A. B. C. D.

News group Use net Backbone Flaming

Q(14). Two or more computers connected to each other of sharing information form a _____

A. B. C. D.

Network Router Server Tunnel

Q(15). Computers that are portable and convenient for users who travel are known as _____

A. B. C. D.

Super computers Lap tops Mini computers File servers

Q(16). A computer checks the _____ of user names and passwords for a match before granting access.

A. B. C. D.

Website Network Backup file Data base

Q(17). Office LANs that are spread geographically apart on a large scale can be connected using a corporate _____

A. B. C. D.

CAN LAN DAN WAN

Q(18). The code for a Web page is written using _____

A. B. C. D.

A fifth generation language Win Zip Peripherals Hypertext Markup Language

Q(19). What is the process of copying software programs from secondary storage media to the hard disk called?

A. B. C. D.

Configuration Download Storage Upload

Q(20).Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as _____

A. B. C. D.

Flash Spiders Cookies Applets

Q(1). The first computers were programmed using _____

A. B. C. D.

Assembly language Machine language Source code Object code

Q(2). Which process checks to ensure the components of the computer and operating are connected properly?

A. B. C. D.

Booting Processing Saving Editing

Q(3). In a relational database, this is a data structure that organizes the information about a single topic into rows and columns.

A. B. C. D.

Block Record Tuple Table

Q(4). How can the user determine what programs are available on a computer?

A. B. C. D.

Checking the hard disk properties Viewing the installed programs during the booting process Checking the operating system for a list of installed programs. Checking the existing files saved on the disk

Q(5). When we run a program in HTML coding _____ is used as backend and ____ works as front-end.

A. B. C. D.

Notepad - Internet-Explorer Notepad - Msn-messenger MS-Word - Internet Explorer Both (A. and (B.

Q(6). What is the ultimate purpose of Defragmentation ?

A. B. C. D.

Make the PC faster Create More Free Space Delete temporary files Reduce Power consumption

Q(7). Computers process data into information by working exclusively with :

A. B. C. D.

multimedia words characters numbers

Q(8). You must install a (n) ......... on a network if you want to share a broadband Internet connection

A. B. C. D.

router modem node cable

Q(9). The purpose of the primary key in a database is to :

A. B. C. D.

unlock the database provide a map of the data uniquely identify a record establish constraints on database operations

Q(10). The design of the network is called the network

A. B. C. D.

architecture server transmission type

Q(11). The most frequently used instructions of a computer program are likely to be fetched from:

A. B. C. D.

the hard disk cache memory RAM registers

Q(12). Personal logs or journal entries posted on the Web are known as :

A. B. C. D.

listservs Webcasts blogs subject directories

Q(13). Which of the following is NOT a type of broad band internet connection ?

A. B. C. D.

Cable DSL Dial-up Satellite

Q(14). Linux is a(n) ........ operating system

A. open-source B. Microsoft C. Windows

D. Mac Q(15). Which of the following places the common data elements in order from smallest to largest

A. B. C. D.

character, character, character, Bit, byte,

file, record, field, database record, field, database, file field, record, file, database character, record, field, file, database

Q(16). The internet is ..........

A. B. C. D.

a large network of networkds an internal communication system for a business a communications system for the Indian government All of these

Q(17). Which of the following statements is FALSE concenring file names ?

A. Files may share the same name or the same extension but not both B. Every file in the same foldr must have a unique, name C. File extension is another name for file type D. The file extension comes before the dot (.) followed by the file name Q(18). Which of the following would most likely NOT be a symptom of a virus ?

A. B. C. D.

Existing program files and icons disappear The CD-ROM stops functioning THe Web browser opens to an unusual home page Odd messages or images are displayed on the screen

Q(19). What is a back up ?

A. Restoring the information backup B. An exact copy of a system's information C. The ability to get a system u and runnign in the event of a system crash or failure D. All of these Q(20). ............ are lists of commands that appear on the screen

A. B. C. D.

GUIs Icons Menus Windows

Q(1). What is the correct association between a hardware component and a computer function?

A. B. C. D.

Monitor > input Mouse > input CPU > storage Hard disk > processing

Q(2). What is the function of Drop Cap ?

A. It does not allow capital letters to be used in the documents B. It makes first letter of each word capital letter in the documents C. It lets you begin a paragraph witha large dropped initial capital letter D. In automatically starts all paragraphs and sentences with capital letters Q(3). The errors that can be pointed out by the compiler are :

A. B. C. D.

Syntax error Symantic error Logical error Internal error

Q(4). The move to the bottom of a document, press ........

A. B. C. D.

Auto summarize Home key Ctrl + Home key End key

Q(5). By default, your documents print in ..... mode

A. B. C. D.

Landscape Portrait Page setup Print preview

Q(6). Select the odd one out :

A. B. C. D.

Interpreter Operating system Compiler Assembler

Q(7). For viewing video CDs, you would use ......

A. B. C. D.

CD Player Windows Media Player WIndows Video Player WIndows Movie Player

Q(8). What's the name for the program or service that lets you view e-mail messages ?

A. B. C. D.

Web browser E-mail clients E-mail ID Internet

Q(9). What does the SMTP in an SMTP server stand for ?

A. B. C. D.

Simple Mail Transfer Protocol Serve Message Text Process Short Messaging Text Process Short Messaging Transfer Protocol

Q(10). What's considered the 'backbone' of the World Wide Web ?

A. B. C. D.

Uniform resource locator (URL) Hypertext mark-up language (HTML) Hypertext transfer protocol (HTTP) File transfer protocol (FTP)

Q(11). We access the World Wide Web using :

A. B. C. D.

Browsers Instant messaging applications High bandwidth Search engine

Q(12). The Internet began with the development of

A. B. C. D.

USENET ARPANET Ethernet Intranet

Q(13). A wireless network uses .......... waves to transmit signals

A. B. C. D.

mechanical radio sound magnetic

Q(14). What device includes an adapter that decodes data sent in radio signals ?

A. B. C. D.

modem digital translator router switch

Q(15). Network components are connected to the same cable in the.......... topology

A. B. C. D.

star ring bus mesh

Q(16). Small application programs that run on a Web page and may ensure a form is completed properly or provide animation are known as ......

A. B. C. D.

flash spiders cookies applets

Q(17). Which of the following is Not a characteristic of a compluter ?

A. B. C. D.

Intelligence Speed Versatility Automation

Q(18). The WWW standard allows programs on many different computer platforms to show the information on a server. Such programs are called :

A. B. C. D.

ISP Web Browsers Web Servers Web Modular

Q(19). Outlook Express is a

A. B. C. D.

E-mail client Scheduler Address book All of the above

Q(20). Which of the following is not a network ?

A. B. C. D.

Local Area Network Wide Area Network Optical Fibre All are networks

Q(1). Which of the following is Not a characteristic of E-mail ?

1) B. C. D.

Low cost Record maintenance in database High speed Waste reduction

Q(2).. ........... is the science that attempts to produce machines that display the same type of intelligence that humans do

A. B. C. D.

nanoscience Nanotechnology Simulation Artificial intelligence

Q(3). Who designed the first electronic computer - ENIAC ?

A. B. C. D.

Van Neuman Joseph M Jacquard J presper Eckert and John W mauchly Both 1 and 2

Q(4). ............ is a collection of web - pages and .......... is the very first page that we see on opening of a website

A. B. C. D.

Home page, Web page Website, Home page Web page, Home page Web page, Website

Q(5). When we run progra in HTML coding, ......... is used as back-end and ........... works as front-end

A. B. C. D.

Notepad, Internet Explorer Notepad, MSN messenger MS Word, Internet Explorer Both 1 and 3

Q(6). The server on the internet is also known as :

A. B. C. D.

Repeater Host Gateway AND Gate

Q(7). Website is a collection of :

A. B. C. D.

HTML documents Graphic files Audio and Video files All of the above

Q(8). ........... is a method in which multiple communicatioin devices are connected to one another efficiently

A. B. C. D.

Switching Redundancy Capacity Detecting

Q(9). One computer that is nto considered a portable computer is .......

A. B. C. D.

Mini computer A Laptop Micro computer All of the above

Q(10). The sharing of a medium and its path by 2 or more devices is called ..........

A. B. C. D.

Modulation Encoding Line discipline Multiplexing

Q(11). Device drivers are :

A. B. C. D.

time power cords for external storage devices experts who know to maximise the performance of device small, special purpose programs the innermost part of the operating system

Q(12). Array is ............

A. B. C. D.

linear data structure non-linear data structure complex data structure simple data structure

Q(13). A stored link to a webpage, in order to have a quick and easy access to it later, it called :

A. B. C. D.

Bookmark WP-link Favourite Both 1 and 3

Q(14). Which input device cannot be used to work in MS Office ?

A. Sanner B. Mouse

C. Keyboard D. Joy stick Q(15). ................ is an animated character that gives help in MS Office ?

A. B. C. D.

Office worker Comic assistant Office assistant All of the above

Q(16). Programs from the same developer, sold bundled together, that provide better integration and share common features, toolbars and menus are known as?

A. B. C. D.

software suites integrated software software processing personal information

Q(17). A data warehouse is which of the following?

A. Can be updated by the users B. Contains numerous conventions and formats C. Organized around subject areas D. Contains only current data name Q(18). _____ servers store and manages files for network users

A. B. C. D.

Authentication Main Web File

Q(19). All of the following are examples of real security and privacy risks except?

A. B. C. D.

hackers spam viruses identify theft

Q(20). Loading Operating System onto RAM is called?

A. B. C. D.

Printing Saving Booting Staring

Q(1). In MICR, C stands for?

A. B. C. D.

Code Colour Computer Character

Q(2). System software is the set of programs that enables your computer's hardware devices and ____ software to work together?

A. B. C. D.

management processing utility application

Q(3). _____ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat?

A. B. C. D.

Servers Embedded computers Robotic computers Mainframes

Q(4). The following are all computing devices, except?

A. B. C. D.

notebook computers cellular telephones digital scanners personal digital assistants

Q(5). In a ring topology, the computer in possession of the _____ can transmit data?

A. B. C. D.

packet data access method token

Q(6). This part of operating system manages the essential peripherals, such as the keyboard, screen, disk drives and parallel and serial ports ______

A. B. C. D.

basic input/output secondary system peripheral system marginal system

Q(7). The bar at the top of a window that bears the name of the window is known as?

A. B. C. D.

control panel task bar menu bar status bar

Q(8). ______ controls the way in which the computer system functions and provides a means by which users can interact with the computer.

A. B. C. D.

The platform Application software Operating system The motherboard

Q(9). Servers are computers that provide resources to other computers connected to a?

A. B. C. D.

mainframe network super computer client

Q(10). A device that operates under the control of another device is called?

A. B. C. D.

Stem Slave Simulator Emulator

Q(11). URL stands for?

A. B. C. D.

Universal Research List Universal Resource List Uniform Resource Locator Uniform Research Locator

Q(12). A database management system (DBMS) is a?

A. hardware system used to create, maintain and provide controlled access to a data- base B. hardware system used to create, maintain, and provide uncontrolled access to a database. C. software system used to create, maintain, and provide uncontrolled access to a database. D.software system used to create, maintain and provide controlled access to a database. Q(13). The design of the network is called the network?

A. architecture B. server C. transmission

D. type Q(14). A Proxy server is used for which of the following?

A.To B.To C.To D.To

provide process provide process

security against unauthorized users client requests for web pages TCP/IP client requests for database access

Q(15). When data changes in multiple lists and all lists are not updated, this causes?

A. B. C. D.

data redundancy information overload duplicate data data inconsistency

Q(16). .....are words that a programming language has set aside for its own use?

A. B. C. D.

Control words Reserved words Control structures Reserved keys

Q(17). The most frequently used instru-ctions of a computer program are likely to be fetched from?

A. the hard disk B. cache memory C. RAM D. registers name Q(18). What is the shortcut key to "Undo" the last action in a document?

A. B. C. D.

Ctrl Ctrl Ctrl Ctrl

+ + + +

X Y Z U

Q(19). You must install a(n) ________ on a network if you want to share a broadband Internet connection.

A. B. C. D.

router modem node cable

Q(20). The errors that can be pointed out by the compiler are?

A. B. C. D.

Syntax errors Semantic errors Logic errors System errors

Q(1). Granting an outside organization access to internet web pages is often implemented using a(n)?

A. 2) C. D.

extranet intranet internet hacker

Q(2). Which term identifies a specific computer on the web and the main page of the entire site?

A. B. C. D.

URL Web site address Hyperlink Domain name

Q(3). The code that relational database management systems use to perform their database task is referred to as?

A. B. C. D.

QBE SQL OLAP Sequel Server

Q(4). Chip is a common nickname for a(n)?

A. B. C. D.

transistor resistor integrated circuit semiconductor

Q(5). Programs such as Internet Explorer that serve as navigable windows into the Web are called

A. B. C. D.

Hypertext Networks Internet Web browsers

Q(6). What menu is selected to cut, copy and paste?

A. B. C. D.

File Tools Special Edit

Q(7). The most important or powerful computer in a typical network is?

A. B. C. D.

desktop network client network server network station

Q(8). The primary purpose of software is to turn data into?

A. B. C. D.

Web sites information programs objects

Q(9). The ability to find an individual item in a file immediately _______ is used?

A. B. C. D.

file allocation table directory sequential access direct access

Q(10). To make a notebook act as a desktop model, the notebook can be connected to a ______ which is connected to a monitor and other devices?

A. B. C. D.

bay docking station port network

Q(11). You can use the tab key to?

A. B. C. D.

move cursor across the screen indent a paragraph move the cursor down the screen Only (A. and (B.

Q(12). A collection of related files is called a?

A. B. C. D.

character field database adjusting

Q(13). Storage that retains its data after the power is turned off is referred to as?

A. B. C. D.

volatile storage non-volatile storage sequential storage direct storage

Q(14). Which of the following is an example of connectivity?

A. Internet B. floppy disk

C. power card D. data Q(15)._______ is the process of finding errors in software code?

A. B. C. D.

Compiling Testing Running Debugging

Q(16).A _______ contains specific rules and words that express the logical steps of an algorithm?

A. B. C. D.

syntax programming structure programming language logic chart

Q(17). Changing an existing document is called ______ the document?

A. B. C. D.

creating editing modifying adjusting

Q(18). Virtual memory is?

A. B. C. D.

memory on the hard disk that the CPU uses an extended RAM in RAM only necessary if you do not have any RAM in your computer a back up device for floppy disks

Q(19). Computers use the ________ number system to store data and perform calculations?

A. B. C. D.

decimal hexadecimal octal binary

Q(20). The ______ key will launch the start buttons?

A. 2) C. D.

esc shift windows shortcut

A. 2) C. D.

extranet intranet internet hacker

Q(2). Which term identifies a specific computer on the web and the main page of the entire site?

A. B. C. D.

URL Web site address Hyperlink Domain name

Q(3). The code that relational database management systems use to perform their database task is referred to as?

A. B. C. D.

QBE SQL OLAP Sequel Server

Q(4). Chip is a common nickname for a(n)?

A. B. C. D.

transistor resistor integrated circuit semiconductor

Q(5). Programs such as Internet Explorer that serve as navigable windows into the Web are called

A. B. C. D.

Hypertext Networks Internet Web browsers

Q(6). What menu is selected to cut, copy and paste?

A. B. C. D.

File Tools Special Edit

Q(7). The most important or powerful computer in a typical network is?

A. B. C. D.

desktop network client network server network station

Q(8). The primary purpose of software is to turn data into?

A. B. C. D.

Web sites information programs objects

Q(9). The ability to find an individual item in a file immediately _______ is used?

A. B. C. D.

file allocation table directory sequential access direct access

Q(10). To make a notebook act as a desktop model, the notebook can be connected to a ______ which is connected to a monitor and other devices?

A. B. C. D.

bay docking station port network

Q(11). You can use the tab key to?

A. B. C. D.

move cursor across the screen indent a paragraph move the cursor down the screen Only (A. and (B.

Q(12). A collection of related files is called a?

A. B. C. D.

character field database adjusting

Q(13). Storage that retains its data after the power is turned off is referred to as?

A. B. C. D.

volatile storage non-volatile storage sequential storage direct storage

Q(14). Which of the following is an example of connectivity?

A. B. C. D.

Internet floppy disk power card data

Q(15)._______ is the process of finding errors in software code?

A. B. C. D.

Compiling Testing Running Debugging

Q(16).A _______ contains specific rules and words that express the logical steps of an algorithm?

A. B. C. D.

syntax programming structure programming language logic chart

Q(17). Changing an existing document is called ______ the document?

A. B. C. D.

creating editing modifying adjusting

Q(18). Virtual memory is?

A. B. C. D.

memory on the hard disk that the CPU uses an extended RAM in RAM only necessary if you do not have any RAM in your computer a back up device for floppy disks

Q(19). Computers use the ________ number system to store data and perform calculations?

A. B. C. D.

decimal hexadecimal octal binary

Q(20). The ______ key will launch the start buttons?

A. 2) C. D.

esc shift windows shortcut

Q(1). The secondary storage devices can only store data but they cannot perform

A. B. C. D.

Arithmetic Operation Logic operation Fetch operstions Either of the above

Q(2). A physical connection between the microsprocessor memory and other parts of the microcomputer is known as

A. B. C. D.

Path Address bus Router All of the above

Q(3). A group of magnetic tapes, videos or terminals usually under the control of one master is

A. B. C. D.

Cyinder Surface Track Cluster

Q(4). Each model of a computer has a unique

A. B. C. D.

Assembly of a computer Machine language High level language All of the above

Q(5). Which company is the biggest player in the microprocessor industry ?

A. B. C. D.

Motorola IBM Intel AMD

Q(6). Which computer memory is used for storing programs and data currently being processed by the CPU ?

A. B. C. D.

Mass memory Internal memory Non-volatile memory PROM

Q(7). Microprocessors can be used t make

A. B. C. D.

Computer Digital systems Calculators All of the above

Q(8). The subject of cybernetics deals with the science of

A. B. C. D.

Genetics Control and communications Molecular biology Biochemistry

Q(9). A term associated with the comparison of processing speeds of different computer system is :

A. B. C. D.

EFTS MPG MIPS CFPS

Q(10).An integrated circuit is

A. B. C. D.

A complicated circuit An integrating device Much costlier than a single transistor Fabricated on a tiny silicon chip

Q(11). Which command is used to set a name to a disk in DOS ?

A. B. C. D.

VOLUME VOL LABEL DISKLABEL

Q(12). Which file starts MS Word ?

A. B. C. D.

Winword.exe Word.exe Msword.exe Word2003.exe

Q(13). To get to the 'Symbol' dialog box, click on the ......... menu and choose 'Symbol'.

A. B. C. D.

Insert Format Tools Table

Q(14). Superscript, subscript, outline, emboss, engrave are known as

A. font styles B. font effects C. word art

D. text effects Q(15). Shimmer, Sparkle text, Blinkng Background etc. are known as

A. B. C. D.

font font word text

styles effects art effects

Q(16).Which of the following is not availabel in Font Spacing ?

A. B. C. D.

Normal Loosely Condensed Expanded

Q(17). Bold, Itali, Regular are known as

A. B. C. D.

font font word text

styles effects art effects

Q(18). If you begin typing an entry into acell and then realize that you don't want your entry placed into a cell, you :

A. B. C. D.

Press Press Press Press

the Erase key esc the Enter button the Edit Formula button

Q(19). Which of the following will not cut information?

A. B. C. D.

Pressing Ctrl + C Selecting Edit > Cut. from the menu Clicking the cut button ont he standard Pressing Ctrl + X

Q(20). Computer connected to a LAN (Local Area Network) can

A. B. C. D.

run faster go on line share information and / or share peripheral equipment E-mail

Q(1). A self replicating program, similar to a virus which was taken

from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is ........ A. B. C. D. Bug Vice Lice Worm

Q(2). Unwanted repetitious messages, such as unsolicited bulk - e-mail is known as

A. B. C. D.

Spam Trash Calibri Courier

Q(3). COBOL is widely used in ........... applications

A. B. C. D.

Commericial Scientific Space mathematical

Q(4). VDU is also called

A. B. C. D.

Screen Monitor Both 1 & 2 printer

Q(5). What kind of software would you most likely use to keep track of billing account ?

A. B. C. D.

Word Processing Electronic Publishing Spreadsheet Web authoring

Q(6). Test the validity of the statements ?

A. B. C. D.

1 KB = 1024 BYTES 1 MB = 2048 BYTES 1MB = 100 KILOBYTES 1 KB = 1000 BYTES

Q(7). Which of the following is not a computer language ?

A. B. C. D.

BASIC C++ C# Microsoft

Q(8). Which among the following is a correct definition of "Digital Divide"?

A. gap between people B. gap between people / IT C. gap between people narrowband internet D. gap between people normal banking

having access to mobile and internet access having access to internet / IT and no internet having access to broadband and having access to internet banking and

Q(9). Now a days Vishing has become a criminal practice of using social engineering over which of the following ?

A. B. C. D.

Social networking sites Mobile Phones E-mail Cyber cafes

Q(10).What is the fullform of W3C?

A. B. C. D.

World World World World

Wide Wide Wide Wide

Web Web Web Web

Consortium Company Center Command

Q(11). Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider ?

A. B. C. D.

Version Update Help Patch

Q(12). In the MICR Code Line Structure what do represent the first three digits of Sort field number consisting of nine digits ?

A. B. C. D.

City Bank Branch Account Type

Q(13). Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry ?

A. B. C. D.

Virtual keyboard Finger Touching Touchscreen Shape Writer

Q(14). ADSL data communications technology uses which of the following for faster data transmission ?

A. B. C. D.

Voiceband modem Wireless Modem Copper telephone Lines Sockets

Q(15). What is the purpose of keeping electronic devices such as computers, televisions, and remote controlled devices on Sleep mode ?

A. B. C. D.

Reduce Power consumption Back UP To write contents of RAM to hard disc To improve download speed

Q(16).Which command devides the surface of the blank disk into sectors and assign a unique address to each one

A. B. C. D.

Ver Format Fat Chkdsk

Q(17). If you need to duplicate the entire disk, which command will you use ?

A. B. C. D.

Copy Diskcopy Chkdsk Format

Q(18). A .............. sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk

A. B. C. D.

system virus Trojan horse virus file virus macro virus

Q(19). A result of a computer virus can not lead to ......

A. B. C. D.

Disk Crash Mother Board Crash Corruption o f program Deletion of files

Q(20). Every computer connected to an intranet or extranet must have a distinct .......

A. B. C. D.

firewall proxy server IP address domain name

Q(1). Programming language built into user programs such as Word and Excel are known as ......

A. B. C. D.

4GLs Macro languages object-oriented languages visual programming languages

Q(2). Firewalls are used to protect against .......

A. B. C. D.

unauthorized Attacks virus Attacks Data Driven Attacks Fire Attacks

Q(3). Which of the following extensions suggest that the file is a backup copy

A. B. C. D.

Bak Bas Com Txt

Q(4). Computer programs are written in a high - level programming language; however, the human readable version of a program is called .......

A. B. C. D.

cache instruction set source code word size

Q(5). The software tools that enable a user to interact with a computer for specific purposes are known as .......

A. B. C. D.

Hardware Networked Software Shareware Applications

Q(6). .............. proessing is used when a large mail-order company accumulates orders and processes them together in one large set

A. B. C. D.

Batch Online Real-time Group

Q(7). When a file contains instructions that can be carried out by the computer, it is often called a(n) ...... file

A. data B. information C. executable

D. application Q(8). A complier translates a program written in a high - level language into ........

A. B. C. D.

Machine language An algorithm A debugged program Java

Q(9). A set of step - by - step procedures for accomplishing a task is known as a(n) .....

A. B. C. D.

algorithm hardware program software bug firmware program

Q(10).A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n) ......

A. B. C. D.

Workstation CPU Magnetic disk Integrated circuit

Q(11). A saved document is referred to as a .....

A. B. C. D.

file word folder project

Q(12). What is output ?

A. B. C. D.

What What What What

the the the the

processor takes from the user user gives to the processor processor gets from the user processor gives to the user

Q(13). When you turn on the computer, the boot routine will perform this test ........

A. B. C. D.

RAM test Disk drive test Memory test Power - on self-test

Q(14). Which of the following storage media provides sequential access only ?

A. B. C. D.

Floppy disk Magnetic disk Magnetic tape Optical disk

Q(15). In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is ........

A. B. C. D.

copy and paste copy, cut and paste cut, copy and paste cut and paste

Q(16).Hardware includes ..........

A. all devices used to input data into a computer B. sets of instructions that a computer runs or executes C. the computer and all the devices connected to it that are used to input and output data D. all devices involved in processing information including the central processing unit, memory and storage Q(17). The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the ....... command

A. B. C. D.

Replace Find Lookup Search

Q(18). The term 'user interface' refers to ............

A. it B. C. on D.

What the user sees on the screen and how they can interact with How the the the the operating system responds to user commands means by which the user interacts with the peripheral devices computer monitor that is available for the computer

Q(19). For creating a document, you use ........ command at File Menu.

A. B. C. D.

Open Close New Save

Q(20). The .............. becomes different shapes depending on the task you are performing

A. Active tab

B. Insertion point C. Mouse pointer D. Ribbon

Q(1). Specilizd programs that asist users in locating information on the Web are called ....

A. B. C. D.

Information engines Search engines Web browsers Resource locators

Q(2). The background of any Word document ......

A. B. C. D.

Is always white colour Is the colour you presect under the Options menu Is always the same for the entire document Can have any colour you choose

Q(3). Correcting errors in a program is referred to as .........

A. B. C. D.

debugging bugging rectifying modifying

Q(4). Any letter, number, or symbol found on the keyboard that you can type into the computer ..........

A. B. C. D.

output character type print

Q(5). A symbol or question on the screen that prompts you to take action and tell the computer what to do next ........

A. B. C. D.

scanner questionnaire prompt and dialog box information seeker

Q(6). Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs .....

A. B. C. D.

menu tool user word

bar bar friendly processor

Q(7). The primary device that a computer uses to store information......

A. monitor B. memory

C. disk D. hard drive Q(8). A file extension is separated from the main file name with a(n)......, but no spaces

A. B. C. D.

questiion nark exclamation mark underscore period

Q(9). Application software is designed to accomplish .......

A. B. C. D.

real -w orld tasks computer-centric tasks gaming tasks operating system tasks

Q(10).A ...... is a device that not only provdes surge protection, but also furnishes your computer with battery backup power during a power outage

A. B. C. D.

surge strip USB UPS battery strip

Q(11). The term ............. designates equipment that might be added to a computer system to enhance, its functionality

A. B. C. D.

digitial device system add-on disk pack peripheral device

Q(12). ..... this is the act of copying or downloading a program from a network and making multiple copies of it.

A. B. C. D.

Network piracy Plagiarism Software piracy Site-license piracy

Q(13). When installing ............., the user must copy and usually decompress program files from a CDROM or other medium to the hard disk

A. B. C. D.

programming software system hardware applications hardware applications software

Q(14). Which one of the following would be considered as a way that a computer virus can enter a computer system ?

A. B. C. D.

Opening an application previously installed on the computer Borrowed an illegal copy of software Viewing a website without causing any additional transctions Running antivirus programs

Q(15). Programs such as Mozila Firefox that serve as navigable windows into the Web are called ..........

A. B. C. D.

Hypertext Networks Internet Web browsers

Q(16).What is the main difference between a mainframe and a super computer ?

A. Super computer is much larger than mainframe computers B. Super computers are much smaller than mainframe computers C. Supercomputers are focused to execute few programs as fast as possible while mainframe uses its power to execute as many programs concurrently D. Supercomputers are focused to execute as many programs as possible while mainframe uses its power to execute few programs as fast as possible Q(17). What is the function of Recycle Bin ?

A. B. C. D.

Store Store Store Store

deleted file temporary file corrupted file Document file

Q(18). Which is the latest version of MS Office ?

A. B. C. D.

Office XP Windows XP Office 2007 Office 2010

Q(19). Which device can not be shared in network ?

A. B. C. D.

Floppy Keyword Computer Printer

Q(20). What is the purpose of query ?

A. B. C. D.

Input data Output data Sort & filter All of above

Q(1). Which port doesn't exist in computer ?

A. B. C. D.

USB Parallel Com1 / Com2 RAW

Q(2). What is the name of exel files ?

A. B. C. D.

Workbook Worksheet Spreadsheet Spread book

Q(3). Workgroup means

A. B. C. D.

Computers in network Individual user Individual computer All of he above

Q(4). Synonym can be reviewed with

A. B. C. D.

Spelling and grammar Thesaurus Both Synonym viewer

Q(5). Which command allows you to reduce fragments of file and optimize the performance of disk ?

A. B. C. D.

Scandisk Diskcomp Chkdsak Defrag

Q(6). A framwork in which circuit boards can be mounted is...

(A) (B) (C) (D)

Switch circuit Chip Card cage Bar code

Q(7). A convolutional code that is prone to catastrophic error propagation is...

(A) (B) (C) (D)

Mnemonics Gray code machine code Catastrophic code

Q(8). Which one of the following input device is user-programmable?

(A) (B) (C) (D)

Dumb terminal Smart terminal VDT Intelligent terminal

Q(9). The barcode which is used on all types of items, is read by a scanning device directly into the computer. What is the name of this scanning device?

(A) (B) (C) (D)

Laser scanner Wand OCR MICR

Q(10). A Plastic card similar to a credit card but having some memory and a microprocessor embedded within it is (A) Punched paper tape

(B) Chip card (C) Card punch (D) Magnetic tape Q(1A.. The category of operating system that you most likely have running on your PDA computer is a ____________ operating system.

(A) (B) (C) (D)

real-time single-user, single-task single-user, multi-task multi-user, multi-task

Q(12). Which of the following is an example of a real-time operating system?

(A) (B) (C) (D)

Lynx MS DOS Windows XP Symbian

Q(13). A real-time operating system is most likely to be used for which of the following tasks?

(A) (B) (C) (D)

Controlling access to a shared printer in a network Ensuring that the system clock works correctly on a server Managing the access to system files in a laptop computer Controlling the fuel injection system of an automobile engine

Q(14). An essential difference between the operating system that runs a typical desktop computer and the operating system that runs a

typical PDA is that

(A) the OS does (B) the whereas (C) the OS does (D) the

desktop not desktop the PDA desktop not desktop

OS has a graphical user interface whereas the PDA OS can run several programs simultaneously OS cannot OS manages hardware resources whereas the PDA computer has an OS whereas a PDA does not

Q(15). To set a register or counter to the all-zero-state is...

(A) (B) (C) (D)

Rerun Reset Remote Release

Q(16).A set of information that defines the status of resources allocated to a process is...

(A) (B) (C) (D)

Process control ALU Register Unit Process description

Q(17). A family of polynomial block codes designed to correct burst errors is known as

(A) (A) (C) (D)

Bar codes Gray codes Fire codes mnemonics codes

Q(18). The MS-DOS operating system is a

(A) (B) (C) (D)

graphical user graphical user command-driven command-driven

interface, interface, interface, interface,

single-tasking operating system multi-tasking operating system single-tasking operating system multi-tasking operating system

Q(19). Which of the following was an early desktop operating system that included an integrated graphic user interface with point-and-click features?

(A) (B) (C) (D)

MS-DOS Mac OS Unix Gnome

Q(20). CD-ROM can store upto ____ MB of data

A. B. C. D.

100 200 500 700

MB MB MB MB

También podría gustarte