question_answer1) Verification of login name and password is known as ______.
A) Alienation done clear
B) Authentication done clear
C) Configuration done clear
D) Logging in done clear
E) Certification done clearView Answer play_arrow
question_answer2) Which of the following is not a computer programming language?
A) ALGOL done clear
B) Microsoft done clear
C) COBOL done clear
D) C++ done clear
E) C# done clearView Answer play_arrow
question_answer3) Unwanted repetitious messages such as bulk mails is known as ______.
A) Calibri done clear
B) Post done clear
C) Thrash done clear
D) Spam done clear
E) Courier done clearView Answer play_arrow
question_answer4) URL is a reference to a resource the internet, URL stands_______.
A) Universal Resource List done clear
B) Uniform Resource Locator done clear
C) Uniform Resource List done clear
D) Uniform Resource Locator done clear
E) Universal Resource List done clearView Answer play_arrow
question_answer5) Which programming languages are classified as low level languages?
A) DC++ done clear
B) Algol done clear
C) Assembly Language done clear
D) COBOL done clear
E) Prolog 2 done clearView Answer play_arrow
question_answer6) In VLSI integrated circuit VLSI stands for ____.
A) Very Low Security Information done clear
B) Very Low Scale Integration done clear
C) Very Largely Secured Information done clear
D) Very Large Scale Immunity done clear
E) Very Large Scale Integration done clearView Answer play_arrow
question_answer7) _____ is known as unauthorized access into others computer system.
A) Editing done clear
B) Encryption done clear
C) Deletion done clear
D) Decryption done clear
E) Hacking done clearView Answer play_arrow
question_answer8) In a MS Word document, Landscape is ___.
A) age orientation done clear
B) paper size done clear
C) a Font style done clear
D) page layout done clear
E) a font effect done clearView Answer play_arrow
question_answer9) A wireless network uses ______waves to transmit signals.
A) Electro-magnetic done clear
B) Electrical done clear
C) Radio done clear
D) Magnetic done clear
E) Mechanical done clearView Answer play_arrow
question_answer10) Which of the following is not a network topology?
A) Tree done clear
B) Star done clear
C) Bus done clear
D) Car done clear
E) Ring done clearView Answer play_arrow
question_answer11) Which of the following is correct statement?
A) 1 MB= 100KB done clear
B) 1KB= 1024 bytes done clear
C) 1MB= 2048 bytes done clear
D) 1GB=1024KB done clear
E) 1KB= 100 bytes done clearView Answer play_arrow
question_answer12) Secure code/verified by VISA is associated in which of the following transactions?
A) E-commerce done clear
B) NEFT done clear
C) Cash deposit done clear
D) Funds transfer done clear
E) Cash withdrawal done clearView Answer play_arrow
question_answer13) The term Internet backbone refers to
A) Software that operates a Web server done clear
B) The main pathway of high speed communications lines through which all Internet traffic flows done clear
C) A broadband Internet connection done clear
D) A set of numbers comprising an Internet address done clear
E) None of these done clearView Answer play_arrow
question_answer14) MICR technology is mainly used by banking industry. MICR denotes _______.
A) Magnetic Ink Computer Reading done clear
B) Magnetic Ink Code Recognition done clear
C) Magnetic Ink Character Recognition done clear
D) Management Ink Check Reading done clear
E) Magnetic Ink Code Recognition done clearView Answer play_arrow
question_answer15) Which files have .mpg extension?
A) Spread sheet done clear
B) Text done clear
C) Video done clear
D) Web done clear
E) Executable done clearView Answer play_arrow
question_answer16) A computer network tool used to detect hosts or to test the reachability of a host on
A) Try done clear
B) Ping done clear
C) Check done clear
D) View done clear
E) Lookup done clearView Answer play_arrow
question_answer17) What is full form of W3C?
A) World Wide Web Centre done clear
B) World Wide Web Consortium done clear
C) World Wide Web Company done clear
D) World Wide Web Command done clear
E) World Wide Web Corporation done clearView Answer play_arrow
question_answer18) Numbers are. stored and transmitted inside a computer in
A) CISC form done clear
B) Alpha-numeric form done clear
C) Binary form done clear
D) ASCII code done clear
E) Alphabets form done clearView Answer play_arrow
question_answer19) Mathematical calculations and comparison decisions are performed by the _____ of the CPU.
A) Numerical calculator done clear
B) Central calculation unit done clear
C) Control unit done clear
D) Arithmetic logic unit done clear
E) Cache done clearView Answer play_arrow
question_answer20) To move to the bottom of a MS Word document, press ___.
A) Auto summarize done clear
B) Home done clear
C) Home key done clear
D) Ctrl + End done clear
E) Ctrl + Home done clearView Answer play_arrow
question_answer21) In MS Word shortcut key, Ctrl + Z will ___.
A) Opens the prints window done clear
B) Redo the last action performed done clear
C) Cut selected text done clear
D) Insert link done clear
E) Undo last action done clearView Answer play_arrow
question_answer22) Which of the following is the smallest, data sixe?
A) Terabyte done clear
B) Gigabyte done clear
C) Kilobyte done clear
D) Megabyte done clear
E) Petabyte done clearView Answer play_arrow
question_answer23) DNS in internet is abbreviation of ___.
A) Dynamic Network Service done clear
B) Dynamic Name Service done clear
C) Domain Network Service done clear
D) Dynamic Naming System done clear
E) Domain Name System done clearView Answer play_arrow
question_answer24) All the formulas in Excel start with
A) ^ done clear
B) = done clear
C) * done clear
D) % done clear
E) / done clearView Answer play_arrow
question_answer25) When any of the files or folders are deleted from Hard Disk, Windows _____.
A) Places it in snipping tools done clear
B) Places it in sticky notes done clear
C) Places it in recycle bin done clear
D) Deletes it permanently done clear
E) Places it in Microsoft office done clearView Answer play_arrow
question_answer26) What is the purpose of keeping electronic devices such as computers, televisions and remote controlled devices on sleep mode?
A) For Back up done clear
B) To improve download speed done clear
C) To write contents of RAM to hard disk done clear
D) Reduce power consumption done clear
E) To enhance the memory done clearView Answer play_arrow
question_answer27) A file which contains readymade layouts, theme effects, background styles and even contents for presentation is called ____.
A) Pre formatting done clear
B) Wizard done clear
C) Auto style done clear
D) Pre styling done clear
E) Template done clearView Answer play_arrow
question_answer28) Which among the following does not belong to the group?
A) Spyware done clear
B) Hub done clear
C) Worm done clear
D) Virus done clear
E) Malware done clearView Answer play_arrow
question_answer29) _______ displays the hierarchical structure of files, folders and drives on the computer and any network drives mapped to the computer.
A) Windows explorer done clear
B) Google chrome done clear
C) Firefox done clear
D) Folder manager done clear
E) Internet explorer done clearView Answer play_arrow
question_answer30) The part of operating system that manages the essential peripherals such as
A) Basic Input/ Output System done clear
B) Secondary system done clear
C) Peripheral system done clear
D) Marginal system done clear
E) Title system done clearView Answer play_arrow
question_answer31) Which of the following is not a web browser?
A) Mozilla done clear
B) Opera done clear
C) Firefox done clear
D) Safari done clear
E) Casio done clearView Answer play_arrow
question_answer32) Which of the following is not a binary number?
A) 123111 done clear
B) 100101 done clear
C) 100000 done clear
D) 101010 done clear
E) 111111 done clearView Answer play_arrow
question_answer33) A computer translates a program written in a high level
A) An algorithm done clear
B) Application language done clear
C) Machine language done clear
D) Java done clear
E) C++ done clearView Answer play_arrow
question_answer34) LINUX is_______.
A) A firewall software done clear
B) A proprietary operating tern of Google done clear
C) An inventory management software done clear
D) A proprietary operating tern of Microsoft done clear
E) An open source operating system done clearView Answer play_arrow
question_answer35) Which of the following places the common data element order from smallest to largest
A) Character, record, file, database done clear
B) Character, file, record field, database done clear
C) Character, record. File record database, file done clear
D) Database, file, record, file, record character done clear
E) Character, field, record file, database done clearView Answer play_arrow
question_answer36) Chip is common nickname for a(n) ____.
A) Structures done clear
B) Semi-conductor done clear
C) Resister done clear
D) Transistor done clear
E) Integrated circuits done clearView Answer play_arrow
question_answer37) In word processing, an efficient way to move the paragraph to place it after the 5th paragraph is _______.
A) Delete and paste done clear
B) Cut and paste done clear
C) Copy and paste done clear
D) Delete and retype done clear
E) Edit and paste done clearView Answer play_arrow
question_answer38) The printing measure means ______.
A) Dots processing inch done clear
B) Dots processing incitation done clear
C) Dots per inch done clear
D) Diagram processing information done clear
E) Diagrams per inch done clearView Answer play_arrow
question_answer39) A stored link to a webpage. In order to have a quick access to it later, is called _____.
A) WP-link done clear
B) Assistant done clear
C) Bookmark done clear
D) Joystick done clear
E) Storage done clearView Answer play_arrow
question_answer40) Which among the following is not a computer programming language?
A) PEARL done clear
B) 4GL done clear
C) COBOL done clear
D) Visual Basic done clear
E) Safari done clearView Answer play_arrow
You need to login to perform this action.
You will be redirected in 3 sec