-
question_answer1) Which of the following commands would you choose to move selected text from one place to another?
A)
Cut and paste
done
clear
B)
Drag and paste
done
clear
C)
Delete and paste
done
clear
D)
Copy and paste
done
clear
E)
Move and paste
done
clear
View Answer play_arrow
-
question_answer2) Descending order of data hierarchy in data management in computing is
A)
Database-records-files bytes-files-bit
done
clear
B)
Database-file-record-ftelds -byte-bit
done
clear
C)
Database-record-fields-file- bytes-bit
done
clear
D)
Database-fields-file-record- bit-bytes
done
clear
E)
Database-file-record-fields-bit-bytes
done
clear
View Answer play_arrow
-
question_answer3) How to specify cell range from A9 to A99 in Excel?
A)
(A9 to A99)
done
clear
B)
(A9: A99)
done
clear
C)
(A9 - A99)
done
clear
D)
(A9; A99)
done
clear
E)
(A9, A99)
done
clear
View Answer play_arrow
-
question_answer4) In computers, a small program that provides an addition to the capabilities provided by the operating system is known as
A)
Extension
done
clear
B)
Utility
done
clear
C)
Device driver
done
clear
D)
Network
done
clear
E)
Update
done
clear
View Answer play_arrow
-
question_answer5) What is the portion of RAM that a computer microprocessor can access more quickly than it can access regular RAM?
A)
Cache
done
clear
B)
Processor
done
clear
C)
Memory Pool
done
clear
D)
Data Pool
done
clear
E)
Processor Pool
done
clear
View Answer play_arrow
-
question_answer6) The ability to perform 'what if?' analysis is key feature of which type of software?
A)
Desktop publishing program
done
clear
B)
Spreadsheet
done
clear
C)
Presentation
done
clear
D)
Word processor
done
clear
E)
E-mail program
done
clear
View Answer play_arrow
-
question_answer7) SQL stands for _______
A)
Semi questioning language
done
clear
B)
Structured query language
done
clear
C)
Structured question language
done
clear
D)
Sequential question language
done
clear
E)
Sequential query language
done
clear
View Answer play_arrow
-
question_answer8) VIRUS stands tor______
A)
Vital Information Resource under Seizure
done
clear
B)
Vital Information Resource under Siege
done
clear
C)
Vital Information Reason under Siege
done
clear
D)
Vital Information Resource under System
done
clear
E)
Vital Information Recourse under Siege
done
clear
View Answer play_arrow
-
question_answer9) To move to the bottom of a document, press _____.
A)
Home key
done
clear
B)
End key
done
clear
C)
Ctrl + End
done
clear
D)
Insert key
done
clear
E)
Shift key
done
clear
View Answer play_arrow
-
question_answer10) Single-word reference to viruses, worms etc. is ______.
A)
killer ware
done
clear
B)
harrnware
done
clear
C)
phish
done
clear
D)
malware
done
clear
E)
virus
done
clear
View Answer play_arrow
-
question_answer11) 'The process of writing computer instructions in a programming language is known as
A)
File
done
clear
B)
Processing
done
clear
C)
Coding
done
clear
D)
Folder
done
clear
E)
Testing
done
clear
View Answer play_arrow
-
question_answer12) If you copy and paste a file
A)
The original file remains unchanged and a new file is created.
done
clear
B)
The file gets scanned.
done
clear
C)
The original file is removed and a new file is not created.
done
clear
D)
The original file remains unchanged and a new file is not created.
done
clear
E)
The original file is deleted and a new file is created.
done
clear
View Answer play_arrow
-
question_answer13) What is the generation of the computers which are built with VLSI technology and microprocessor?
A)
First
done
clear
B)
Fourth
done
clear
C)
Third
done
clear
D)
Second
done
clear
E)
Other than those given as options
done
clear
View Answer play_arrow
-
question_answer14) A function inside another function in excel is called
A)
Round function
done
clear
B)
Sum function
done
clear
C)
Nested function
done
clear
D)
Double function
done
clear
E)
Test function
done
clear
View Answer play_arrow
-
question_answer15) Which of the following best describes a private, company wide network, closed to public access?
A)
Intranet
done
clear
B)
Internet
done
clear
C)
Virtual Private Network
done
clear
D)
Cloud Computing
done
clear
E)
Extranet
done
clear
View Answer play_arrow
-
question_answer16) Which one of the following would not be considered as form of secondary storage?
A)
hard disk
done
clear
B)
RAM
done
clear
C)
optical disk
done
clear
D)
floppy disk
done
clear
E)
flash drive
done
clear
View Answer play_arrow
-
question_answer17) In computing and electronic (system, BCD is abbreviation of
A)
Binary Coded Decimal
done
clear
B)
Bit Coded Digit
done
clear
C)
Byte Coded Digit
done
clear
D)
Bit Coded Decimal
done
clear
E)
Binary Coded Digit
done
clear
View Answer play_arrow
-
question_answer18) IFITP refers to ________.
A)
Home Text Transaction Protocol
done
clear
B)
Hyper Text Tie Protocol
done
clear
C)
Hyper Text Transmission Protocol
done
clear
D)
Hyper Text Transfer Protocol
done
clear
E)
Home Text Transmission Protocol
done
clear
View Answer play_arrow
-
question_answer19) The term______designates equipment that might be added to a computer Lo enhance Its functionality,
A)
System device
done
clear
B)
Disk pack
done
clear
C)
Operating device
done
clear
D)
Digital device
done
clear
E)
Peripheral device
done
clear
View Answer play_arrow
-
question_answer20) A computer program that: converts assembly language to ma chine language is
A)
Assembler
done
clear
B)
Intersection
done
clear
C)
Comparator
done
clear
D)
Complicate
done
clear
E)
Converter
done
clear
View Answer play_arrow