question_answer 1) Verification of login name and password is known as ______.
A)
Alienation
done
clear
B)
Authentication
done
clear
C)
Configuration
done
clear
D)
Logging in
done
clear
E)
Certification
done
clear
View Answer play_arrow
question_answer 2) Which of the following is not a computer programming language?
A)
ALGOL
done
clear
B)
Microsoft
done
clear
C)
COBOL
done
clear
D)
C++
done
clear
E)
C#
done
clear
View Answer play_arrow
question_answer 3) Unwanted repetitious messages such as bulk mails is known as ______.
A)
Calibri
done
clear
B)
Post
done
clear
C)
Thrash
done
clear
D)
Spam
done
clear
E)
Courier
done
clear
View Answer play_arrow
question_answer 4) URL is a reference to a resource the internet, URL stands_______.
A)
Universal Resource List
done
clear
B)
Uniform Resource Locator
done
clear
C)
Uniform Resource List
done
clear
D)
Uniform Resource Locator
done
clear
E)
Universal Resource List
done
clear
View Answer play_arrow
question_answer 5) Which programming languages are classified as low level languages?
A)
DC++
done
clear
B)
Algol
done
clear
C)
Assembly Language
done
clear
D)
COBOL
done
clear
E)
Prolog 2
done
clear
View Answer play_arrow
question_answer 6) In VLSI integrated circuit VLSI stands for ____.
A)
Very Low Security Information
done
clear
B)
Very Low Scale Integration
done
clear
C)
Very Largely Secured Information
done
clear
D)
Very Large Scale Immunity
done
clear
E)
Very Large Scale Integration
done
clear
View Answer play_arrow
question_answer 7) _____ is known as unauthorized access into others computer system.
A)
Editing
done
clear
B)
Encryption
done
clear
C)
Deletion
done
clear
D)
Decryption
done
clear
E)
Hacking
done
clear
View Answer play_arrow
question_answer 8) In a MS Word document, Landscape is ___.
A)
age orientation
done
clear
B)
paper size
done
clear
C)
a Font style
done
clear
D)
page layout
done
clear
E)
a font effect
done
clear
View Answer play_arrow
question_answer 9) A wireless network uses ______waves to transmit signals.
A)
Electro-magnetic
done
clear
B)
Electrical
done
clear
C)
Radio
done
clear
D)
Magnetic
done
clear
E)
Mechanical
done
clear
View Answer play_arrow
question_answer 10) Which of the following is not a network topology?
A)
Tree
done
clear
B)
Star
done
clear
C)
Bus
done
clear
D)
Car
done
clear
E)
Ring
done
clear
View Answer play_arrow
question_answer 11) Which of the following is correct statement?
A)
1 MB= 100KB
done
clear
B)
1KB= 1024 bytes
done
clear
C)
1MB= 2048 bytes
done
clear
D)
1GB=1024KB
done
clear
E)
1KB= 100 bytes
done
clear
View Answer play_arrow
question_answer 12) Secure code/verified by VISA is associated in which of the following transactions?
A)
E-commerce
done
clear
B)
NEFT
done
clear
C)
Cash deposit
done
clear
D)
Funds transfer
done
clear
E)
Cash withdrawal
done
clear
View Answer play_arrow
question_answer 13) The term Internet backbone refers to
A)
Software that operates a Web server
done
clear
B)
The main pathway of high speed communications lines through which all Internet traffic flows
done
clear
C)
A broadband Internet connection
done
clear
D)
A set of numbers comprising an Internet address
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 14) MICR technology is mainly used by banking industry. MICR denotes _______.
A)
Magnetic Ink Computer Reading
done
clear
B)
Magnetic Ink Code Recognition
done
clear
C)
Magnetic Ink Character Recognition
done
clear
D)
Management Ink Check Reading
done
clear
E)
Magnetic Ink Code Recognition
done
clear
View Answer play_arrow
question_answer 15) Which files have .mpg extension?
A)
Spread sheet
done
clear
B)
Text
done
clear
C)
Video
done
clear
D)
Web
done
clear
E)
Executable
done
clear
View Answer play_arrow
question_answer 16) A computer network tool used to detect hosts or to test the reachability of a host on
A)
Try
done
clear
B)
Ping
done
clear
C)
Check
done
clear
D)
View
done
clear
E)
Lookup
done
clear
View Answer play_arrow
question_answer 17) What is full form of W3C?
A)
World Wide Web Centre
done
clear
B)
World Wide Web Consortium
done
clear
C)
World Wide Web Company
done
clear
D)
World Wide Web Command
done
clear
E)
World Wide Web Corporation
done
clear
View Answer play_arrow
question_answer 18) Numbers are. stored and transmitted inside a computer in
A)
CISC form
done
clear
B)
Alpha-numeric form
done
clear
C)
Binary form
done
clear
D)
ASCII code
done
clear
E)
Alphabets form
done
clear
View Answer play_arrow
question_answer 19) Mathematical calculations and comparison decisions are performed by the _____ of the CPU.
A)
Numerical calculator
done
clear
B)
Central calculation unit
done
clear
C)
Control unit
done
clear
D)
Arithmetic logic unit
done
clear
E)
Cache
done
clear
View Answer play_arrow
question_answer 20) To move to the bottom of a MS Word document, press ___.
A)
Auto summarize
done
clear
B)
Home
done
clear
C)
Home key
done
clear
D)
Ctrl + End
done
clear
E)
Ctrl + Home
done
clear
View Answer play_arrow
question_answer 21) In MS Word shortcut key, Ctrl + Z will ___.
A)
Opens the prints window
done
clear
B)
Redo the last action performed
done
clear
C)
Cut selected text
done
clear
D)
Insert link
done
clear
E)
Undo last action
done
clear
View Answer play_arrow
question_answer 22) Which of the following is the smallest, data sixe?
A)
Terabyte
done
clear
B)
Gigabyte
done
clear
C)
Kilobyte
done
clear
D)
Megabyte
done
clear
E)
Petabyte
done
clear
View Answer play_arrow
question_answer 23) DNS in internet is abbreviation of ___.
A)
Dynamic Network Service
done
clear
B)
Dynamic Name Service
done
clear
C)
Domain Network Service
done
clear
D)
Dynamic Naming System
done
clear
E)
Domain Name System
done
clear
View Answer play_arrow
question_answer 24) All the formulas in Excel start with
A)
^
done
clear
B)
=
done
clear
C)
*
done
clear
D)
%
done
clear
E)
/
done
clear
View Answer play_arrow
question_answer 25) When any of the files or folders are deleted from Hard Disk, Windows _____.
A)
Places it in snipping tools
done
clear
B)
Places it in sticky notes
done
clear
C)
Places it in recycle bin
done
clear
D)
Deletes it permanently
done
clear
E)
Places it in Microsoft office
done
clear
View Answer play_arrow
question_answer 26) What is the purpose of keeping electronic devices such as computers, televisions and remote controlled devices on sleep mode?
A)
For Back up
done
clear
B)
To improve download speed
done
clear
C)
To write contents of RAM to hard disk
done
clear
D)
Reduce power consumption
done
clear
E)
To enhance the memory
done
clear
View Answer play_arrow
question_answer 27) A file which contains readymade layouts, theme effects, background styles and even contents for presentation is called ____.
A)
Pre formatting
done
clear
B)
Wizard
done
clear
C)
Auto style
done
clear
D)
Pre styling
done
clear
E)
Template
done
clear
View Answer play_arrow
question_answer 28) Which among the following does not belong to the group?
A)
Spyware
done
clear
B)
Hub
done
clear
C)
Worm
done
clear
D)
Virus
done
clear
E)
Malware
done
clear
View Answer play_arrow
question_answer 29) _______ displays the hierarchical structure of files, folders and drives on the computer and any network drives mapped to the computer.
A)
Windows explorer
done
clear
B)
Google chrome
done
clear
C)
Firefox
done
clear
D)
Folder manager
done
clear
E)
Internet explorer
done
clear
View Answer play_arrow
question_answer 30) The part of operating system that manages the essential peripherals such as
A)
Basic Input/ Output System
done
clear
B)
Secondary system
done
clear
C)
Peripheral system
done
clear
D)
Marginal system
done
clear
E)
Title system
done
clear
View Answer play_arrow
question_answer 31) Which of the following is not a web browser?
A)
Mozilla
done
clear
B)
Opera
done
clear
C)
Firefox
done
clear
D)
Safari
done
clear
E)
Casio
done
clear
View Answer play_arrow
question_answer 32) Which of the following is not a binary number?
A)
123111
done
clear
B)
100101
done
clear
C)
100000
done
clear
D)
101010
done
clear
E)
111111
done
clear
View Answer play_arrow
question_answer 33) A computer translates a program written in a high level
A)
An algorithm
done
clear
B)
Application language
done
clear
C)
Machine language
done
clear
D)
Java
done
clear
E)
C++
done
clear
View Answer play_arrow
question_answer 34) LINUX is_______.
A)
A firewall software
done
clear
B)
A proprietary operating tern of Google
done
clear
C)
An inventory management software
done
clear
D)
A proprietary operating tern of Microsoft
done
clear
E)
An open source operating system
done
clear
View Answer play_arrow
question_answer 35) Which of the following places the common data element order from smallest to largest
A)
Character, record, file, database
done
clear
B)
Character, file, record field, database
done
clear
C)
Character, record. File record database, file
done
clear
D)
Database, file, record, file, record character
done
clear
E)
Character, field, record file, database
done
clear
View Answer play_arrow
question_answer 36) Chip is common nickname for a(n) ____.
A)
Structures
done
clear
B)
Semi-conductor
done
clear
C)
Resister
done
clear
D)
Transistor
done
clear
E)
Integrated circuits
done
clear
View Answer play_arrow
question_answer 37) In word processing, an efficient way to move the paragraph to place it after the 5th paragraph is _______.
A)
Delete and paste
done
clear
B)
Cut and paste
done
clear
C)
Copy and paste
done
clear
D)
Delete and retype
done
clear
E)
Edit and paste
done
clear
View Answer play_arrow
question_answer 38) The printing measure means ______.
A)
Dots processing inch
done
clear
B)
Dots processing incitation
done
clear
C)
Dots per inch
done
clear
D)
Diagram processing information
done
clear
E)
Diagrams per inch
done
clear
View Answer play_arrow
question_answer 39) A stored link to a webpage. In order to have a quick access to it later, is called _____.
A)
WP-link
done
clear
B)
Assistant
done
clear
C)
Bookmark
done
clear
D)
Joystick
done
clear
E)
Storage
done
clear
View Answer play_arrow
question_answer 40) Which among the following is not a computer programming language?
A)
PEARL
done
clear
B)
4GL
done
clear
C)
COBOL
done
clear
D)
Visual Basic
done
clear
E)
Safari
done
clear
View Answer play_arrow