500 Questions PDF
500 Questions PDF
(A) DRAM
(B) SRAM
(C) SDRAM
(D) EPRAM
(E) None
Ans (D)
7. From what has the term ‘Wi-Max’ been derived?
a) Worldwide Interoperability for Microwave Access
b) World Interconnection for Microwave Access
c) Worldwide Interchangeability for Microwave Access
d) Worldwide Interconnection for Multiple Access
e) None
Ans (B)
10: How you can manually break up the line breakup in MS-Word?
a) Space + Enter
b) Ctrl + Enter
c) Alt + Enter
d) Shift + Enter
e) None
Ans (D) F7
19: Unsolicited commercial email is commonly known as?
A. Spam
B. Ce-Mail
C. Hoaxes
D. Hypertext
E. None
Ans (e)
24. One ZB is made up of _______ :
(a) 1024 PB
(b) 1024 EB
(c) 1024 BB
(d) 1024 YB
(e) None
Ans (b)
25. Which is non-volatile memory?
(A) Data is saved regardless of power Off
(B) Lose data when power is Off
(C) Not related to any kind of computer memory
(D) Same as Cache Memory
(E) None
Ans b) Binary
29. In MS-Excel, which of the following formula is not entered correctly?
(A) =22+825
(B) 137+549
(C) =B33+V32
(D) =B2/A15
(E) None
Ans (A)
37. In the Internet business, ISP stands for:
(A) Internet System Protocol
(B) Internet Service Provider
(C) Internet System Provider
(D) Internet Service Protocol
(E) None
Ans (A) 8
39. The files can be saved in which of the following device?
(A) Monitor
(B) Compact Disc
(C) Printer
(D) Speaker
(E) None
Ans (D)
54: The key used to restart a computer is:
A. Del + Ctrl
B. Backspace + Ctrl
C. Ctrl + Alt + Del
D. Reset
E. None
Ans (A)
The amount of data that can be transmitted through a communication channel.
61. Which of the following is not an option of edit menu
A. Cut
B. copy
C. Paste
D. Page setup
E. None
Ans (D)
63. What is the language used by most of the DBMSs for helping their users to
access data
A. Assembly level language
B. C++
C. Query Language
D. 1GL
E. None
Ans (D) Any text or graphics printed at the top of every page
78. This case converts first character of first word of selected sentence to
capital
A. sentence
B. upper
C. toggle
D. Title
E. None
Ans (C) shows the name of cell address or range currently working on
89. Which of the following is not the correct method of editing the cell content?
A. Press the Alt key
B. Press the F2 key
C. Click the formula bar
D. Double click the cell
E. None
Ans (D) Count the number of records in an active data base files
97. The computer holds data and:
(A) Bytes
(B) Programs
(C) Registers
(D) Bits
(E) None
Ans (A) Designing base and defining the structure of the database
100. Function of running and loading programs by use of peripherals is
function of
A. operating system
B. inquiry system
C. dump programs
D. function system
E. None
Ans (A)
112. in the context of animations, what is a trigger?
A. An action button that advances to the next slide
B. An item on the slide that performs an action when clicked
C. The name of a motion path
D. All of above
E. None
Ans (B) An item on the slide that performs an action when clicked
113. Which among the following computer provides greater speed than average
for performing multi tasking?
A) Personal Computer
B) Notebook
C) Workstation
D) Tablet PC
E) None of these
Ans (C)
114. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(A) an open folder.
(B) the folder contains subfolders.
(C) a text file.
(D) a graphics file
(E) none of these
Ans (B)
115. You can create a new presentation by completing all of the following except
A. Clicking the new button on the standard toolbar
B. Clicking file, new
C. Clicking file open
D. Pressing ctrl + N
E. None
Ans (D) 8, 8
118. During the ____________ operation, the control unit determines what the
program is telling the computer to do.
(A) fetch
(B) execute
(C) decode
(D) arithmetic
(E) None of these
Ans (C)
119. All computer execute
A. basic programs
B. COBOL programs
C. Machine language program
D. FORTRAN program
E. None
Ans (A)
Developed by Adam Osborne in April 1981, the Osborne I was the first truly portable
computer and is recognized as the first true laptop computer
122. Charles Babbage designed two engine. They are –
A) Addition and Subtraction Engine
B) Analytic and Difference Engine
C) Analytic and Digital engine
D) Addition and Multiplication Engine
E) None of these
Ans (B)
Ans (C)
1890 - Herman Hollerith (Tabulating Machine).
1911 - Charles Ranlett Flint founded ”Computing-Tabulating-Recording
Company (CTR)” and was renamed "International Business
Machines" in 1924
1950 - Turing test performed by Alan Turing
124. Which one is not an electronic computing device?
A) Analytical Engine
B) Difference Engine
C) ENIAC
D) EMCC
E) None of these
Ans (D)
Ans (B)
126. In order to edit a chart, you can
A. Triple click the chart object
B. Click and drag the chart object
C. Double click the chart object
D. Click the chart object
E. None
Ans (B)
1926 - Dr. Julius Edgar Lilienfeld from New York filed for a patent on a transistor.
1947 - The transistor is developed by Bell Telephone Laboratories.
1959 - Texas Instruments and Fairchild Semiconductor both announce the
integrated circuit (Jack Kilby & Robert Noyce).
1836 - Morse Code by Samuel Morse (US) - Morse developed a system of
dots and dashes to help send telegraphs over long distance wire.
1964 - Douglas Engelbart invented first mouse.
128. The ____ created a model called the Open Systems Interconnection, which
allows diverse systems to communicate.
A. OSI
B. ISO
C. IEEE
D. ANSI
E. None
Ans (B)
1. The ____ created a model called the Open Systems Interconnection, which
allows diverse systems to communicate.
A. OSI
B. ISO
C. IEEE
D. ANSI
E. None
Ans (B)
2. The _______ layer links the network support layers and the user support layers.
A) transport
B) network
C) data link
D) session
E) None
Ans (A)
3. The _______ layer coordinates the functions required to transmit a bit
stream over a physical medium.
A) transport
B) network
C) data link
D) physical
E) None
Ans (D)
4. The physical, data link, and network layers are the ______ support layers.
A) user
B) network
C) both (a) and (b)
D) neither (a) nor (b)
E) None
Ans (B)
5. What is the flow of data between countries commonly called?
(A) International information system
(B) EDI
(C) Outsourcing
(D) Transborder data flow
(E) None of these
Ans (D)
12. An example of a wireless medium that sends data through the air or space is:
(A) Fiber-optic cable.
(B) Coaxial cable.
(C) Twisted pair.
(D) Microwaves.
(E) None of these
Ans (B)
14. The session, presentation, and application layers are the ____ support layers.
A) user
B) network
C) both (a) and (b)
D) neither (a) nor (b)
E) None
Ans (A)
15. In Excel, this is a prerecorded formula that provides a shortcut for complex
calculations.........
(A) Value
(B) Data Series
(C) Function
(D) Field
(E) None of these
Ans (C)
18. Which of the following animations cannot be done in PowerPoint?
(A) bullet list, revealed one bullet point at a time
(B) clip art - Fly in from the bottom
(C) table, revealed row by row
(D) chart, revealed by series
(E) None of these
Ans (D)
1943-1946 - ENIAC (Electronic Numerical Integrator and Computer) is developed by
J. Presper Eckert and John Mauchly. It was the first general purpose Electronic computer.
1949 - EDVAC (Electronic discrete variable automatic computer) unlike the predecessor, it was binary
rather than decimal and was a stored program computer. Idea of stored
program was given by Jon Von Neumann.
1949 - EDSAC(Electronic Delay Storage Automatic Calculator)-Maurice Wilkes
(first fully stored computer based on binary)
1951 - UNIVAC (Universal Automatic Computer) was release which was
the world’s first commercial computer.
21. Which of the following displays the contents of the active cell?
(A) Active cell
(B) Formula bar
(C) Menu bar
(D) Name box
(E) None of the above
Ans (C)
24. Which of the following refers to too much electricity and may cause a voltage surge?
a) Anomaly
b) Shock
c) Spike
d) Virus
e) None of these
Ans (C)
25. A function inside another function is called a ….. Function.
(A) Nested
(B) Round
(C) Sum
(D) Text
(E) None of the above
Answer: C
28. Selects the entire Row press-------
(A) Shift + Space
(B) Shift + ctrl
(C) Shift + alt
(D) Space + enter
(E) None of these
Answer: A
move the cursor to the desired location in the sentence and type the new word
1. The overall design, construction, organization and interconnecting of
the various components of a computer system is referred as–
(A) Computer Architecture
(B) Computer Flowchart
(C) Computer Algorithm
(D) All of the above
(E) None of these
Answer: B
4. A spiral shape track formatting is present in
(A) Floppy Disk
(B) Optical Disk
(C) Hard Disk
(D) Half-inch Tape Cartridge
(E) None of these
Answer: B
5. Which of the following groups contains graphical file extensions?
(A) JPG, DRV, BAK
(B) GIF, TCP, WMV
(C) TCP, JPG, BMP
(D) JPG, GIF, BMP
(E) None of these
Answer: D
Answer: A
7. A storage device or medium where the access time is dependent
upon the location of the data is called ________
A. Parallel access
B. Serial access
C. Both (A) and (B)
D. None of the above
Answer : C
8. ________are attempts by individuals to obtain confidential information
from you by falsifying their identity.
(A) Phishing
(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) None of the above
Answer: A
10. .………processing is used when a large mail-order company
accumulates orders and processes them together in one large set.
(A) Batch
(B) Online
(C) Real-time
(D) Group
(E) None of these
Answer: B
Answer: B
14. Technique of using fixed words for machine code functions is
classified as
A. mnemonics
B. nemonics
C. compiler
D. Translator
E. None
Ans (A)
16. What is the difference between a check box and Radio button?
a) No difference
b) In radio buttons multiple options can be selected whereas in check
boxes only single option can be selected
c) In check boxes as well as radio buttons multiple options can be
selected, but radio buttons can be used only twice
d) In check boxes multiple options can be selected whereas in radio
buttons only single option can be selected
e) None of these
Answer: D
Telegram channel link: https://t.me/reasoningandcomputerbyyogeshsir
17. Which is the first electro-mechanical binary programmable computer?
A) Z1
B) Intel 8084
C) IBM 007
D) Intel 8000
E) None of these
Ans (A)
(1936-1938)-Konrad Zuse, Computer (Z1).
18. Which is NOT a function of a microprocessor?
(A) Controls the rest of the computer's components
(B) Keeps the system unit cool
(C) Processes data
(D) Interprets instructions given by software
(E) None of these
Answer: B
19. ________ has a large storage capacity, up to 17 GB if both layers and
both sides are used.
(A) DVD-ROM
(B) CD-ROM
(C) Floppy
(D) RAM
(E) None of these
Answer: A
20. A __________ card connects each computer to the wiring in the network.
(A) network interface
(B) PC interface
(C) Memory
(D) All of the above
(E) None of these
Answer: A
Answer: A
22. You can add a hyperlink to your worksheet by pressing
(A) Alt + K
(B) Ctrl + H
(C) Ctrl + K
(D) Ctrl + Shift + K
(E) None of the above
Answer: B
24. When you insert an Excel file into a Word document, the data are
(A) Hyperlinked
(B) Placed in a word table
(C) Linked
(D) Embedded
(E) None of the above
Answer: A
Answer: A
Answer: B
Answer: B
Answer: C
Answer: A
Answer: C
Answer: D
Answer: C
Answer: A
Answer: B
Answer: D
Answer : D
Answer: B
Liveware means user. Output devices shows the result to user.
Answer : D
3. Network layer –
• Logical addressing (IP addressing).
• Routing and Packet delivery.
4. Transport layer –
• It provides a reliability of error free, end to end data delivery and
correct destination.
• Segmentation and reassembly.
5. Session layer –
• Time management.
• communication controlling.
• Synchronization.
6. Presentation layer –
• Data is presented in the form size, type,
encryption-decryption and compression.
7. Application layer –
• It provides a user interface or platform to transmit or
receive the data. Example web browser.
1. Which of the following program is the closest to the machine code?
A. Compiler
B. Interpreter
C. Assembler
D. None of the above
Answer : C
Answer : C
Answer : C
Answer : B
Answer: B
Answer : D
Answer: C
CD- ROM – Read only memory. It cannot perform write operation.
Answer : B
Proprietary software, also known as non-free software, or closed-
source software, is computer software for which the software's publisher
or another person retains intellectual property rights—usually copyright
of the source code, but sometimes patent rights.
FreeBSD - Berkeley Software distribution
Answer : C
Answer : B
Answer : C
Answer: D
A memory which always remains connected to computer is
online memory, while a memory that can be removed or
connected as and when required is offline memory.
Answer: C
Answer: D
Answer: B
If any input is 0 in AND, output will be 0.
Answer: B
2^10 byte = KB
2^20 byte = MB
2^30 byte = GB
Answer: D
ALU performs – Addition, Subtraction, Multiplication, Division, AND, OR,
Complement(NOT), Increment, Decrement, Left or Right Shit, Clear.
Apart from this exponential, logarithmic, trigonometric are performed
by Floating Point Unit(FPU)
Answer: C
Answer: B
Answer: C
Answer: B
Answer: B
The handshaking process usually takes place in order to establish
rules for communication when a computer sets about communicating
with a foreign device.
Answer : D
Answer: B
Reward for finding a bug and reporting it to any organization
Answer: C
Rest all are Operating System only for mobile.
Answer: D
Internet Service Provider
Answer: C
RAM and Cache are temporary memory.
Hard Disk stores data to be used later.
Answer: D
RISC – Reduced Instruction Set Computer ;
CISC – Complex Instruction Set Computer ;
EPIC – Explicitly Parallel Instruction Computing
Answer : A
Answer : A
Answer : E
Answer : B
Answer : B
Third Generation computers use Integrated Circuits(ICs) which are based on
Small Scale Integration(SSI) and Medium Scale Integration(MSI)
Answer : C
Provide cooling to processor
Answer : C
Primary Foreign
Key Key
Tuple
A Wide Area Network is not limited to a single location, but it spans over a
large geographical area through a telephone line, fiber optic cable or
satellite links.
Ethernet and Wi-Fi are the two primary ways to enable LAN connections.
Ethernet is a specification that enables computers to communicate
with each other. Wi-Fi uses radio waves to connect computers
to the LAN.
Macro is a way to automate those task which we perform repeatedly in MS Office suit.
These macro virus infect these files and get executed whenever these macros are run.
A) Captcha
B) tele-verification
C) group policy
D) firewall
E) None of these
CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart)
A) Batch processing
B) OLTP
C) Universal processing
D) Operational processing
E) None of these
A) Relational Database
B) Blockchain
C) LTE Database
D) Procedural Database
E) None of these
6. Statements :
(i) Operating System is the main part of Application software
(ii) Assembly language is made up of only 0s and 1s.
(iii) Software provides easy to use interface to work with the hardware
components.
A) IP Address
B) Web Address
C) Host Address
D) MIC Address
E) None of these
A) UDP
B) ADSL
C) SNMP
D) ICMP
E) None of these
A) bitmap
B) marquee
C) text-stiller
D) animator
E) None of these
11. GUI based operating system are based on the concept of?
A) LIGO
B) FIFO
C) WYSIWYG
D) LIFO
E) None of these
A) Pijabyte
B) Exabyte
C) Terabyte
D) Zettabyte
E) None of these
A) Basic
B) Prolog
C) Cobol
D) C++
E) None of these
15. The concept of SQL is related to which generation of language?
A) Database
B) Text Editor
C) Spreadsheet
D) DTP Software
E) None of these
A) .RAR
B) .ZIP
C) .7z
D) .EXE
E) None of these
A) SDLC
B) Bug
C) Debugging
D) Testing
View Answer
Option C
2. Find the correct statement in relation to hard disk.
A) Sectors are divided into tracks and platters
B) Tracks are divided into sectors and platters
C) Platters are divided into tracks and sectors
D) Platters are divided into rows and column
View Answer
Option C
3. What is the full form of PDF?
A) Presentation Document File
B) Pre Document File
C) Portable Document Format
D) Post Document Format
View Answer
Option C
4. A local or restricted network in which information is accessible only within this private
network is known as?
A) Extranet
B) Intranet
C) Cloud system
D) WWW
View Answer
Option B
5. When an Intranet can be accessed by outside users for the purpose of information
exchange then It is known as?
A) Public Intranet
B) Extranet
C) Secured WWW
D) Ultranet
View Answer
Option B
6. Which of the following is the correct binary representation of decimal number 23?
A) 10101
B) 11011
C) 11010
D) 10111
View Answer
Option D
7. The term Large scale integration is related with?
A) Hard Disk
B) SMPS
C) Chip
D) Monitor
View Answer
Option C
8. Which of the following is used to connect a computer to computer network?
A) Network Interface Card
B) Network Integrity Card
C) Network Information Connection
D) Network Information Card
View Answer
Option A
9. Which of the following unit can represent the speed of internet connection?
A) bps
B) mhz
C) kb
D) bytes
View Answer
Option A
10. Which of the following is not a display technology used in computer monitors?
A) LCD
B) TFT
C) CRT
D) MRT
View Answer
Option D
11. Two computers can be connected directly for the purpose of file sharing using ____?
View Answer
Option D
12. The distortion caused in signals over network channel is termed as?
A) Repeaters
B) Attenuation
C) Gateways
D) Bridges
View Answer
Option B
13. The point of inter connections in a network is known as ____ ?
A) protocol
B) nodes
C) client
D) bus
View Answer
Option B
14. When a computer is booted, BIOS retrieves its information from ____?
A) RAM
B) CMOS chip
C) Hard Disk
D) Cache
View Answer
Option B
When the computer first boots up, BIOS pulls information from the CMOS chip to understand
the hardware settings, time, and anything else that’s stored in it.
CMOS Battery keeps the CMOS chip powered up even when the
computer is shut down.
15. Find the odd one out
A) .doc
B) .txt
C) .xls
D) .rtf
View Answer
Option C
16. “Justify” in MS Word is related to?
A) Paragraph Alignment
B) Page Indent
C) Page Orientation
D) Paragraph length
View Answer
Option A
17. Unauthorized copying and distribution of copyright material in computer world is
known as ___?
A) Spoofing
B) EULA
C) Piracy
D) Hacking
View Answer
Option C
18. The principle that Internet service providers should enable access to all content and
applications equally regardless of the source is known as?
A) Net Servicing
B) Net Equality
C) Net Neutrality
D) Fair Usage Policy
View Answer
Option C
19. The device used to carry out card payment at retail location is known as?
A) PoS
B) OMR
C) ATM
D) CDM
View Answer
Option A
View Answer
Option D
21. Name the device which keeps the computer units powered up during time of
power cut.
A) SMPS
B) UPS
C) DSL
D) UDP
View Answer
Option B
View Answer
Option C
23. Which of the following is not an example of Optical Disk?
A) CD
B) DVD
C) Hard Disk
D) Blue Ray Disk
View Answer
Option C
View Answer
Option C
25. Which of the following is not an Operating system of Computer?
A) Windows 2000
B) Symbian OS
C) Mandriva
D) Linux
View Answer
Option B
Symbian OS is an old mobile OS. Xenix is a discontinued OS from UNIX
26. The device used to connect two networks having different architecture and model is?
A) Hub
B) Switch
C) Modem
D) Gateway
View Answer
Option D
27. A situation when a computer software stops working and encounters an error is known as?
A) Flash
B) Cache
C) Crash
D) Command
View Answer
Option C
When a software or system stops working and behaves abnormally it is said to be crashed.
28. The speed of the computer microprocessor is measured based on?
A) RAM speed
B) Port Speed
C) Bus Speed
D) Clock Speed
View Answer
Option D
Clock Speed is the speed at which a microprocessor executes instructions. Clock speed is
expressed in the unit of Hertz(Hz) and its multiple unit.
29. A warm boot in older versions of Windows is caused by:
(1) Typing the Alt+ Tab key combination
(2) Selecting Hibernate or Standby when shutting down
(3) Typing the Ctrl+ Alt+ Delete key combination
(4) Pressing the power switch
(5) None of these
Answer: 3
30. Setting fonts for the text in your document is an example of:
(1) Formatting.
(2) Formulas.
(3) Tracking changes.
(4) Tools.
(5) None of these
Answer: 1
31. ____________ is the file system used by the operating system to identify the
physical locations of files on the hard drive.
(1) RTOS
(2) GIF
(3) FAT
(4) POST
(5) None of these
Answer: 3
32. A server uses _________applications software to support its client computers.
(1) back-end
(2) front end
(3) programming
(4) java
(5) none of these
Answer: 1
33. Help Menu is available at which button?
(1) End
(2) Start
(3) Turnoff
(4) Restart
(5) Reboot
Answer: 2
34. A connection from one HTML document to another HTML document is called __
(1) Hyper Link
(2) Connecting Link
(3) Icon
(4) All of these
(5) None of these
Answer: 1
35. The ___________ records the name and exact location of every file on a disk.
(1) partition master
(2) file allocation table
(3) disk controller
(4) boot sector
(5) None of these
Answer: 2
36. A _____ is a software component that lets the operating system and a device
communicate with each other by specifying the computer’s operating system exactly how to
work with that hardware.
A) mediator
B) driver
C) BUS
D) utility
E) None of these
View Answer
Option B
37. The pattern in which nodes as connected in a network is known as?
A) Network Connectivity
B) Network Methodology
C) Network Alignment
D) Network Topology
E) None of these
View Answer
Option D
38. Web Address is also known as?
A) IP Address
B) URL
C) Web Page
D) Home Page
E) None of these
View Answer
Option B
URL – Uniform Resource Locator is the technical term for web address
39. Find the Odd one out.
A) MS Word : Text
B) MS PowerPoint : Presentation
C) MS FrontPage : Web Site
D) Firefox : Web Site
E) None of these
View Answer
Option D
We create Text document in MS Word. We create presentation in Power Point. We create
website in Frontpage. But we do not create website in Firefox,
we just view website in firefox. Hence its odd one out
40. A computer on the network that utilizes the service of server computer is known as?
A) Client
B) Liveware
C) Bot
D) Server ware
E) None of these
View Answer
Option A
41. The pre-defined configuration or setting of a system or an application is known as ?
A) dynamic setting
B) pre-customed setting
C) customized setting
D) default setting
E) None of these
View Answer
Option D
42. A text-based expression of emotion created from ASCII characters that mimics a facial
expression is known as?
A) Smiler
B) Expressor
C) Emoticon
D) Emofier
E) None of these
View Answer
Option C
43. Which of the following term would best define an Operating System?
A) Utility
B) Motherboard
C) Platform
D) Play-and-Play
E) None of these
View Answer
Option C
44. Android Operating System is based on _____ ?
A) Windows Kernel
B) Linux Kernel
C) Java Kernel
D) Symbian Kernel
E) None of these
View Answer
Option B
View Answer
Option A
Blog is website created for some specific purpose like providing information
on a particular thing or sharing the thought of the writer.
46. _____ is a region of a physical memory storage used to temporarily store data while it is
being moved from one place to another.
A) Motherboard
B) Circuit
C) Buffer
D) ROM
E) None of these
View Answer
Option C
View Answer
Option A
48. In respect to display technology what does “F” stands for in TFT?
A) File
B) Form
C) Film
D) Future
E) None of these
View Answer
Option C
49. The process of encoding an information in such a way that it cannot be read without
proper authorization is known as ___?
A) Encapsulation
B) Encryption
C) Decryption
D) Abstraction
E) None of these
Option B
Encryption is used to code a piece of information so that only authorized user can read it. For
this the information must be first decoded and this process is known as Decryption
50. FAT in computer, is related to?
A) RAM
B) Hard Disk
C) Monitor
D) CPU
E) None of these
View Answer
Option B
51. Flash Memory is a types of ___ ?
A) Volatile memory
B) Non Volatile memory
C) RAM memory
D) ROM memory
E) None of these
View Answer
Option B
52. The statement “If you feed wrong data to the computer, it will give you the wrong output”
is best described in?
A) FIFO
B) GIGO
C) LIFO
D) LILO
E) None of these
View Answer
Option B
53. Which of the following is not a programming language?
A) LISP
B) MIPS
C) SQL
D) Java Script
E) None of these
View Answer
Option B
54. All of the following are considered to be storage devices EXCEPT______
(1) floppy disk
(2) CPU
(3) CD
(4) hard disk drive
(5) none of these
Answer: 2
55. One megabyte equals approximately ___________
1) 1,000 bits
2) 1,000 bytes
3) 1 million bytes
4) 1 million bits
5) 2,000 bytes
Answer: 3
56. A computer checks the _____ of user names and passwords for a match before
granting access.
(1) Website
(2) Network
(3) Backup file
(4) Data base
(5) None of these
Answer: 4
57. What is the term for unsolicited e-mail?
(1) News group
(2) Use net
(3) Backbone
(4) Flaming
(5) Spam
Answer: 5
58. When sending an e-mail, the _____ line describes the contents of the message.
(1) to
(2) subject
(3) contents
(4) CC
(5) None of these
Answer: 2
59. The _____ key will launch the start buttons.
(1) Esc
(2) Shift
(3) Logo
(4) Shortcut
(5) None of these
Answer: 3
60. What is object of UPS?
(1) Using for storage
(2) To increase the speed of a computer
(3) Provides backup power
(4) All of these
(5) None of these
HTML
62. Which of the following printers generates character from a grid?
(1) Inkjet
(2) Laser
(3) Daisy wheel
(4) Dot matrix
(5) None of these
Dot matrix
63. In MS-Word 'alt + shift + d' does what?
(1) Automatically inserts the date
(2) Automatically Inserts the time
(3) Inserts the day
(4) All of the above
(5) None of these
Frames
67. Which of the following is NOT an example of system maintenance?
(1) Replacing user interfaces
(2) Making backup copies of files
(3) Adding, deleting, adjusting records
(4) Providing system security
(5) none of these
upgrade
6. To make a copy of the current document to disk ........
(1) Use the 'Save' command
(2) This cannot be done
(3) Use the 'duplicate' command
(4) Copy the document
(5) Use the 'save as' command
Cursor
71. When the pointer is positioned on a……….it is shaped like a hand.
(1) Grammar error
(2) Formatting error
(3) Screen Tip
(4) Spelling error
(5) hyperlink
hyperlink
72. A device, which is not connected to CPU, is called as .......
(1) land-line device
(2) On-line device
(3) Off-line device
(4) Device
(5) None of the above
Off-line device
73. The first graphical web browser are?
(1) BING
(2) EDGE
(3) Alltheweb
(4) Mosaic
(5) WWW
Mosaic
74. The term overflow means?
(1) An excess of Internal storage
(2) An excess of external storage
(3) A situation where record cannot fit in to its right place
(4) A device, which controls the level of humidity in the computer room
(5) None of these
Latency
76. Pascal is
(1) A high-level programming language
(2) Named after Blaise Pascal
(3) Named after mathematician that facilitates structured programming techniques
(4) All of the above
(5) None of these
Page break
78. Multiprocessor is a computer system–
(1) Where many CPU under a common control
(2) Consisting of more than one input devices under common control
(3) Where many output devices under
(4) All of the above
(5) None of these
Logical error
80. Ctrl + D is short cut used for ?
(A) Open Dialogue Box
(B) Font Dialogue Box
(C) Save as Dialogue Box
(D) Save Dialogue Box
Answer : B