SlideShare a Scribd company logo
1 of 197
Download to read offline
1111....CCCCOOOOMMMMPPPPUUUUTTTTEEEERRRR TTTTEEEERRRRMMMMIIIINNNNOOOOLLLLOOOOGGGGYYYY 
ALGOL : Algorithmic Language is basically a portable for scientific computations and was first introduced with ALGOL 58. 
ARTIFACTS : They are distortions in an image that are produced by the image sensors of the optical system. 
AMBER : It is often referred as orange,in computer it is referred to indicate a temporary or ongoing error. 
BIT : It is basic unit of computers .It has two values 1 & 0 only. 
BYTE : Combination of 8 Bits. 
BAND WIDTH : The total maximum capacity of network or modem connection. The modem band width is generally measured in BPS . 
BROADBAND: It is also referred as wideband transimission .Broadband refers to telecommunication taht provide a variety or channels 
of data over a single communication medium. 
BOOTP : Bootstrap Protocol allows a disk work station to discover certain network information. 
CDN : Content Distribution Network (CDN) is also known as mirroring. It consists of multiple sites around the world taht all contain 
the same information .It is unnecessary because no single website can handle simultaneous requests from several hundred million 
users. 
Bridge : It is a computer bridge which is a device to connect two local area networks (LAN). 
Buffer : It is a memory which refers to temporary shortage of memory at the time of data processing. 
CLUSTER : When referring to hard disk drive a cluster is a managed section by the computer operating system that change sizes 
depending upon the size of hard disk drive . 
DATA BASE : It is general collection of data shared by a variety of users. In particular it has following features. 
Redundancy of data is eliminated. This is an important point in Computer Terminology in exam point of view. 
*. Data is independent of any programme. 
*. Data is usable by many users, simultaneously. 
DEBUGGING: It is a process of riding a computer programme of logical or syntactical errors. 
DIGITAL ZOOM : It is a magnification of an image by internal image processing algorithm. 
EBCDIC : Extended Binary Coded Decimal Interchange Code developed by IBM is a type of coding method. 
ECHELON : It is a code name of a global spy system designed to capture and analyze virtually every phone call,fax, E-mail ,telex 
message.
EDGE: Enhanced Data Rates for Global Evolution is a radio based high speed mobile data standard. It allows the data transmission 
speeds upto 384 kbps to be achieved when all eight time slots are used. 
FIREWALL : It is a software /hardware that limits outside network access to a computer or computer hardware that permanently 
resolve the issue. 
GATE WAY : It refers to a network . A gateway is an address used as entry point. 
GUI : Graphical User Interface uses icons and menus to carry out commands such as opening files ,delete files , move files etc.. 
Internet Group Management Protocol : It is an extension of the IP Protocol and a standard for IP ( Internet Provider) multicasting. 
Kernel : It refers to a computer co-operating system ,which is the first section of the operating system to load into memory. 
LAWN : Local Area Wireless Network which utilizes radio transmissions to communicate with other computers or network devices. 
MICROPROCCESOR: A Single chip based device which is a complete processor in itself and is capable of performing arithmatic & 
logical operations. 
MARKUP LANGUAGE: It consists of easily understood names ,keywords, tags that helps format overall view of a page and the data it 
contains. 
XML is also called meta language. 
NIBBLE : Combination of four bits . 
PROTOCOL : It is also known as access method,it is a standard used to define a method of exchanging data over a computer network or 
through the internet. 
RTOS : Real Time Operating System is an operating system that guarantees a certain capability with in a specified time constrained. 
RATS /BACK DOORS : Remote Administration Tools is a method of controllilng remote machines using the IP Address. 
SMART : Self Monitoring Analysis & Reporting Technology is basically a diagnostic method. 
SMTP : Simple Mail Transfer Protocol is a communication protocol that sends e-mail messages from one server to another. 
TFTP : Trivial File Transfer Protocol is a simple file transfer protocol and is generally used to boot disk work stations or load 
configuration files to network devices such as routers. 
SWAN : State Wide Area Network : It is a minimum bandwidth of twwo Mbps to provide block level connectivity within a state for e-governance. 
WAP : Wireless Application Protocol is a specification for a set of communication protocol used to allow wireless devices to access the 
internet and other utilities .
WIZARD : It is available with other software programmes or hardware devices. 
WLL : Wireless Local Loop : WLL service is based on CDMA technology and applicable for limited mobility system . 
It carries both data and voice with 40-60 kbps data speed & 144 kbps maximum data speed . 
Clicking on an icon with the mouse is a form of giving an instruction to the computer. 
Answer: True 
Output devices store instructions or data that the CPU processes. 
Answer: False (memory) 
The CPU and memory are located on a special circuit board in the system unit called the motherboard. 
Answer: True 
Nanostructures represent the smallest human-made structures that can be built. 
Answer: True 
The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a 
few programs as quickly as possible, whereas mainframes are designed to handle many programs running at the 
same time (but at a slower pace). 
Answer: True 
Being computer fluent means that you should be able to build a computer yourself. 
Answer: False 
Embedded computers are self-contained computer devices that have their own programming and do not receive 
input. 
Answer: True 
A Web browser is a special device that is installed in your computer that allows it to communicate with other devices 
on a network. 
Answer: False (network adapter) 
With a wireless network, it is easier to relocate devices. 
Answer: True 
The most common type of memory that the computer uses to process data is ROM. 
Answer: False (RAM) 
Currently, the performance of tasks by robots is based on preprogrammed algorithms. 
Answer: True 
Data can be a number, a word, a picture, or a sound. 
Answer: True
Strictly defined, a computer is a data processing device. 
Answer: True 
The discrepancy between the â€oehavesâ€0 and â€oehave-notsâ€0 with regard to computer technology is 
commonly referred to as the digital society. 
Answer: False (digital divide) 
One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to 
avoid viruses, the programs that pose threats to computer security. 
Answer: True 
Trend-spotting programs, developed for business, have been used to predict criminal activity. 
Answer: True 
Employers do not have the right to monitor e-mail and network traffic on employee systems used at work. 
Answer: False 
Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation. 
Answer: Mac 
The ____________ is the program that manages the hardware of the computer system, including the CPU, 
memory, storage devices, and input/output devices. 
Answer: operating system 
The type of operating system software you use depends on your computers€™s ____________. 
Answer: platform 
____________software helps you carry out tasks, such as typing a document or creating a spreadsheet. 
Answer: Application 
____________are the fastest and most expensive computers. 
Answer: Supercomputers 
A ____________ is approximately 1,000 bytes. 
Answer: kilobyte 
Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks 
are called ____________. 
Answer: instructions 
A computer gathers data, processes it, outputs the data or information, and ____________ the data or 
information. 
Answer: stores
The binary language consists of two digits: ____________ and ____________. 
Answer: 0 and 1 
A string of ____________ 0s and 1s is called a byte. 
Answer: eight (8) 
The devices you use to enter data into a computer system are known as ____________ devices. 
Answer: input 
The devices on a computer system that let you see the processed information are known as ____________ devices. 
Answer: output 
____________ is the set of computer instructions or programs that enables the hardware to perform different 
tasks. 
Answer: Software 
When you connect to the ____________, your computer is communicating with a server at your Internet service 
provider (ISP). 
Answer: Internet 
____________ are computers that excel at executing many different computer programs at the same time. 
Answer: Mainframes 
____________is the application of computer systems and techniques to gather legal evidence. 
Answer: Computer forensics 
____________ is the science that attempts to create machines that will emulate the human thought process. 
Answer: Artificial intelligence (AI) 
Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as 
an operating system. 
Answer: Microsoft Windows 
A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns. 
Answer: data mining 
You would use ____________ software to create spreadsheets, type documents, and edit photos. 
Answer: application 
____________ are computers that support hundreds or thousands of users simultaneously. 
Answer: Mainframes 
Hard disk drives and CD drives are examples of ____________ devices. 
Answer: storage
____________ is the term given to the act of stealing someone’s identity and ruining their credit rating. 
Answer: Identity theft 
Surgeons are using ____________ to guide robots to perform delicate surgery. 
Answer: computers 
Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just 
like humans. 
Answer: simulators 
AAL- ATM Adaption Layer 
ACL- Access Control List 
ADO- ActiveX Data Objects 
ADSL-Asymmetric Digital Subscriber Line 
ADT- Abstract Data Type 
ALGOL- Algorithmic Language 
ALU- Arithmetic and Logical Unit 
ANSI- American National Standard Institute 
ARP- Address Resolution Protocol 
ARPA- Address and Routing Parameter Area 
ARPA- Advanced Research Projects Agency 
ARPANET- Advanced Research Projects Agency Network 
AS- Access Server 
ASCII- American Standard Code for Information Interchange 
ASM- Algorithmic State Machine 
ASP- Active Server Pages 
ASP- Application Server Provider 
AT- Access Time 
AT- Active Terminology 
ATM- Asynchronous Transfer Mode
AVC- Advanced Video Coding 
AVI- Audio Video Interleaved 
AWT- Abstract Window Toolkit 
BAL- Basic Assembly Language 
BASIC- Beginners All Purpose Symbolic Instruction Code 
BCD- Binary Coded Decimal 
BCNF- Boyce-codd Normal Form 
BER- Bit Error Rate 
BIN- Binary 
BINAC- Binary Automatic Computer 
BIOS- Basic Input Output System 
BLOB- Binary Large Object 
BNC- Bayonet Neill-Concelman 
BPS- Bits per Second 
CAD- Computer Aided Design 
CAM- Computer Aided Manufacturing 
CAT- Computer Aided Translation 
CASE- Computer-Aided Software Engineering 
CDMA- Code Division Multiple Access 
CD-ROM- CD Read Only Memory 
CIFS- Common Internet File System 
CISC- Complex Instruction Set Computer 
CLR- Common Language Runtime 
CMOS- Complementary Metal-Oxide Semiconductor 
COBOL- Common Business Oriented Language 
COM- Component Object Model
CORBA- Common Object Request Broker Architecture 
CPS- Characters per Second 
CPU- Central Processing Unit 
CRC- Cyclic Redundancy Check 
DAC- Digital to Analog Converter 
DAO- Data Access Objects 
DAP- Directory access protocol 
DBA- Data Base Administrator 
DCCP- Datagram Congestion Control Protocol 
DCL- Data Control Language 
DCOM- Distributed Component Object Model 
DDE- Dynamic Data Exchange 
DES- Data Encryption Standard 
DFD- Data Flow Diagram 
DFS- Distributed File System 
DHCP- Dynamic Host Configuration Protocol 
DHTML- Dynamic Hyper Text Markup Language 
DMA- Direct Memory Access 
DML- Data Manipulation Language 
DNS- Domain Name System 
DOM- Document Object Model 
DoS- Denial of Service 
DRAM- Dynamic Random Access Memory 
DSDL- Document Schema Definition Languages 
DSL- Digital Subscriber Line 
DSL- Domain Specific Language
DVD- Digital Video Disc 
DVD-ROM – DVD Read Only Memory 
DVI- Digital Video Interface 
DVR- Digital Video Recorder 
EAI- Extensible Authentication Protocol 
EBML- Extensible Binary Meta Language 
EEPROM- Electronically Erasable Programmable Read Only Memory 
EFI- Extensible Firmware Interface 
ELM- Electronic Mail 
EOF- End of File 
EOL- End of Line 
EUC- Extended UNIX Code 
EXT- Extended File System 
FAP- FORTRAN Assembly Program 
FAT- File Allocation Table 
FAQ- Frequently Asked Questions 
FDD- Floppy Disk Drive 
FDDI- Fiber Distributed Data Interface 
FDMA- Frequency Division Multiple Access 
FEC- Forward Error Correction 
FHS- File system Hierarchy Standard 
FIFO- First in First out 
FORTRAN- Formula Translation 
FPS- Floating Point System 
FSM- Finite State Machine 
FTTP- Fiber to the Premises
FTP- File Transfer Protocol 
FXP- File Exchange Protocol 
GB- Giga Byte 
GIF- Graphic Interchange Format 
GIGO- Garbage in Garbage Out 
GIMP- GNU Image Manipulation Program 
GML- Geography Markup Language 
GUI- Graphical User Interface 
GWT- Google Web Toolkit 
HBA- Host Bus Adaptor 
HDD- Hard Disk Drive 
HD DVD- High Definition DVD 
HDL- Hardware Description Language 
HID- Human Interface Device 
HP- Hewlett-Packard 
HPFS- High Performance File System 
HTM- Hierarchical Temporal Memory 
HTML- Hyper Text Markup language 
HTTP- Hyper Text Transfer Protocol 
Hz- Hertz 
IC- Integrated Circuit 
ICE- In circuit Emulator 
ICMP- Internet Control Message Protocol 
ICP- Internet Cache Protocol 
IDE- Integrated Development Environment 
IDL- Interface Definition Language
IEEE- Institute of Electrical and Electronics Engineering 
IGRP- Integrated Gateway Routing Protocol 
IL- Intermediate Language 
IM- Instant Messenger 
IMAP- Internet Message Access Protocol 
IP- Internet Protocol 
IPC- Inter Process Communication 
IPL- Initial Program Load 
IPP- Internet Printing Protocol 
IPX- Internet Packet Exchange 
ISA- Instruction Set Architecture 
ISDN- Integrated Services Digital Network 
ISO- International Organization for Standardization 
ISP- Internet Service Provider 
J2EE- Java 2 Enterprise Edition 
J2SE- Java 2 standard Edition 
JDBC- Java Database Connectivity 
JDK- Java Development Kit 
JFC- Java Foundation Classes 
JMS- Java Message Service 
JNDI- Java Naming and Directory Interface 
JNI- Java Native Interface 
JPEG- Joint Photographic Experts Group 
JRE- Java Runtime Environment 
JS- Java Script 
JSP- Java Server Pages
JVM- Java Virtual Machine 
KB- Kilo Byte 
KHz- Kilo Hertz 
KBPS- Kilo Bytes Per Second 
LAN- Local Area Network 
LCD- Liquid Crystal Display 
LCR- Least Cost Routing 
LED- Light Emitting Diode 
LIFO- Last in First Out 
LOC- Lines of Code 
MAC- Media Access Control 
MAN- Metropolitan Area Network 
MANET- Mobile Ad-Hoc Network 
MDA- Mail Delivery Agent 
MIB- Management Information Base 
MICR- Magnetic Ink Character Recognition 
MIDI- Musical Instrument Digital Interface 
MIMD- Multiple Instruction Multiple Data 
MIMO- Multiple Input Multiple Output 
MIPS- Million Instructions Per Second 
MOSFET- Metal-Oxide Semi-conductor Field Effect Transistor 
MPEG- Motion Pictures Expert Group 
MTA- Mail Transfer Agent 
MX- Mail Exchange 
NACK- Negative Acknowledgement 
NAT- Network Address Translation
NFS- Network File System 
NOS- Network Operating System 
NUMA- Non-Uniform Memory Access 
NVR- Network Video Recorder 
NVRAM- Non-Volatile Random Access Memory 
OASIS- Organization for the advancement of Structured Information Standards 
ODBC- Open Data Base Connectivity 
OLAP- Online Analytical Processing 
OLE- Object Linking and Embedding 
OLTP- Online Transaction Processing 
OOP- Object Oriented Programming 
OPML- Outline Processor Markup Language 
ORB- Object Request Broker 
OSI- Open Systems Interconnection 
PAN- Personal Area Network 
PAP- Password Authentication Protocol 
PDA- Personal Digital Assistant 
PDF- Portable Document Format 
PERL- Practical Extraction and Reporting Language 
PHP- PHP-Hypertext Preprocessor 
PPI- Pixels per Inch 
PVR- Personal Video Recorder 
QA- Quality Assurance 
QOS- Quality of Service 
RAM- Random Access Memory 
RDBMS- Relational Data Base Connectivity / Relational Data Base Management System
RDM- Relational Data Model 
RDS- Remote Data Service 
RIP- Routing Information Protocol 
RMI- Remote Method Invocationn 
ROM- Read Only Memory 
RPC- Remote Procedure Call
1. Which of the following is not related to a computer monitor? 
(a) VDU 
(b) Plasma Display 
(c) Pointing devices 
(d) CRT 
2. ......... is an input device commonly available in laptops. 
(a) Trackball 
(b) Touchpad 
(c) Touch screen 
(d) Joystick 
3. A temporary storage area attached to the CPU of the computer for input-output operations is a: 
(a) Register 
(b) Buffer 
(c) Channel 
(d) Core 
4. Product of the data processing is: 
(a) Data 
(b) A computer 
(c) Software 
(d) Information 
5. A collection of parallel lines that connects several devices in a computer is called: 
(a) Bus 
(b) Link 
(c) Bidirectional wires 
(d) Cables 
6. Software installed to help prevent hacking is called: 
(a) System software 
(b) Antivirus software 
(c) Firewall software 
(d) Application software 
7. Encryption of data means that: 
(a) Data cannot be sent over the internet 
(b) Data is encoded so it cannot be read without decoding software 
(c) Data is kept locked in special room 
(d) Data has been hacked into 
8. A person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure 
is: 
(a) Hacker 
(b) Cracker
(c) Programmer 
(d) None of these 
9. Linux is a ………….. 
(a) Database program 
(b) Application program 
(c) Operating system 
(d) None of these 
10........... is a legal monopoly granted for a limited time to the owner of an invention? 
(a) Trade secrets 
(b) Copyright 
(c) Trademark 
(d) Patent 
11. This is based on individual who knows how to use information and communication technologies and those who 
do not? 
(a) Access 
(b) Usage 
(c) Usage Quality 
(d) None of the above 
12. The kind of crime involves altering raw data just before a computer processes it and then changing it back after 
the processing is completed: 
(a) Data diddling 
(b) Data tampering 
(c) Salami attacks 
(d) None of the above 
13. Information Technology Act in India was amended in: 
(a) 2000 
(b) 2004 
(c) 2008 
(d) 2010 
14. Which of the following is not a wireless communication device? 
(a) Blue tooth 
(b) GPS 
(c) Infra red communication 
(d) None of these 
15. Computer to computer exchange of business documents is done through? 
(a) EDI 
(b) ERP 
(c) CAM 
(d) CAD 
16. Who started Free Software Foundation? 
(a) Linus Torvald 
(b) Richard Stallman
(c) Bill Gates 
(d) GNU 
17. The resolution of a monitor is governed by the: 
(a) Size of the screen 
(b) Cost of the monitor 
(c) Contrast of the pixels on the screen 
(d) Number of pixels 
18. LCD stands for : 
(A) Liquid Crystal Display 
(B) Laser Crystal Display 
(C) Light Crystal Display 
(D) All of these 
(E) None of these 
19. A Byte constitutes of : 
(A) 9 bits 
(B) 8 bits 
(C) 7 bits 
(D) 4 bits 
(E) None of these 
20. Memory in a PC is addressable through : 
(A) Bits 
(B) Byte 
(C) Nibble 
(D) All of these 
(E) None of these 
21. One Kilo Byte represents : 
(A) 1024 bytes 
(B) 1000 bytes 
(C) 100 bytes 
(D) 1064 bytes 
(E) None of these 
22. RAM in its commercial forms are available as : 
(A) SIMM 
(B) DIMM 
(C) Both (A) & (B) 
(D) CPSB 
(E) None of these 
23. Refresh Rate of monitor is measured in : 
(A) Hz 
(B) Meter 
(C) Volts 
(D) Amp. 
(E) None of these 
24. Such types of printers, in which the printing head contacts with the paper in printing process, are called as : 
(A) Impact Printer 
(B) Non-Impact Printer 
(C) Laser Printer 
(D) All of these 
(E) None of these 
25. Which of the following meaning is used between CPU & RAM to speed up the processing power of a CPU? 
(A) Virtual Memory 
(B) DRAM 
(C) Flash Memory 
(D) Cache Memory 
(E) None of these 
26. Which of the following is lowest in memory hierarchy? 
(A) Cache memory 
(B) Secondary memory
(C) Registers 
(D) RAM 
(E) None of these 
27. Which of the following is an input device? 
(A) Keyboard 
(B) VDU 
(C) Both (A) & (B) 
(D) Dvu 
(E) None of these 
28. Basic building block for a digital circuit is : 
(A) Word 
(B) Logic Gate 
(C) Processor 
(D) BUS 
(E) None of these 
29. Which of the following is a logic gate? 
(A) AND 
(B) OR 
(C) CPU 
(D) Both (A) & (B) 
(E) None of these 
30. ASCII stands for : 
(A) American Standard Code for Institute Interchange 
(B) American Standard Code for Information Interchange 
(C) American Standard Code for Information Institute 
(D) All of these 
(E) None of These 
31. Which of the following requires refreshing during retaining the data? 
(A) DRAM 
(B) SRAM 
(C) Virtual Memory 
(D) FDD 
(E) None of these 
32. RAM stands for : 
(A) Read Access Memory 
(B) Random Access Memory 
(C) Random Assigned Memory 
(D) All of these 
(E) None of these 
33. The base of binary number is : 
(A) 2 
(B) 16 
(C) 8 
(D) 10 
(E) None of these 
34. CRT stands for : 
(A) Character Ray Tube 
(B) Cathode Ray Tube 
(C) Colour Ray Tube 
(D) All of the above 
(E) None of these 
35. Which of the following is a GUI device : 
(A) Keyboard 
(B) Mouse 
(C) OMR 
(D) All of these 
(E) None of these 
36. Which of the following is a type of optical media? 
(A) FDD 
(B) HDD 
(C) CD 
(D) Magnetic Tape
(E) None of these 
37. DVD stands for : 
(A) Digital Video Disk 
(B) Digital Versatile Disk 
(C) Both (A) & (B) 
(D) All of these 
(E) None of these 
38. Which of the following is an input device? 
(A) VDU 
(B) Printer 
(C) Plotter 
(D) MICR 
(E) None of these 
39. Identify the odd one : 
(A) Storage tape memory 
(B) Magnetic disc memory 
(C) Optical disc memory 
(D) Read only memory 
(E) None of these 
40. Nibble describes a bits combination of : 
(A) 5 bits 
(B) 6 bits 
(C) 7 bits 
(D) 4 bits 
(E) None of these 
41. Data in RAM are : 
(A) Volatile in nature 
(B) Non-volatile in nature 
(C) Both (A) & (B) 
(D) All of these 
(E) None of these 
42. BIOS stands for : 
(A) Basic Input Output System 
(B) Basic Instruction Output System 
(C) Basic Interface Output System 
(D) All of these 
(E) None of these 
43. What is the process of copying software programs from secondary storage media to the hard disk called? 
(A) Configuration 
(B) Download 
(C) Storage 
(D) Upload 
(E) Installation 
44. When the pointer is positioned on a _____, it is shaped like a hand. 
(A) Grammar error 
(B) Formatting error 
(C) Screen Tip 
(D) Spelling error
(E) Hyperlink 
45. Personal computers can be connected together to form a- 
(A) server 
(B) Supercomputer 
(C) Network 
(D) Enterprise 
(E) None of these 
46. A _____ is the term used when a search engine returns a Web page that matches the search criteria. 
(A) Blog 
(B) Hit 
(C) Link 
(D) View 
(E) Success 
47. _____are words that a programming language has set aside for its own use. 
(A) Control words 
(B) Control structures 
(C) Reserved words 
(D) Reserved keys 
(E) None of these 
48. Mobile Commerce is best described as- 
(A) The use of Kiosks in marketing 
(B) Transporting products 
(C) Buying and selling goods/ services through wireless hand-held devices 
(D) Using notebook PC’s in marketing 
(E) None of the above 
49. Which of the following controls the manner of interaction between the user and the operating system? 
(A) Language translator 
(B) Platform 
(C) User interface 
(D) Icon
(E) None of these 
50. You can keep your personal files/folders in 
(A) My Folder 
(B) My Documents 
(C) My Files 
(D) My Text 
(E) My Collection 
51. Three types of compact disks include CD-ROM, CD-R, and 
(A) CD-W 
(B) CD-RAM 
(C) CD-DVD 
(D) CD-RW 
(E) None of these 
52. All computers must have 
(A) Â A word processing software 
(B) An operating system 
(C) An attached printer 
(D) A virus checking program 
(E) None of these 
53. Collecting personal information and effectively posing as another individual is known as 
(A) Spooling 
(B) Spoofing 
(C) Hacking 
(D) Identity theft 
(E) None of these 
54. To change selected text to all capital Letters, click the change case buttons, then click 
(A) UPPERCASE 
(B) UPPER ALL 
(C) CAPS LOCK 
(D) Lock Upper
(E) Large Size 
55. A person who used his or her expertise to gain access to other people’s computers to get information illegally or to do 
(A) Hacker 
(B) Analyst 
(C) Instant messenger 
(D) Programmer 
(E) Spammer 
56. A device that connects to a network without the use of cables is said to be 
(A) Distributed 
(B) Free 
(C) Centralized 
(D) Open Source 
(E) None of these 
57. Reusable optical storage will usually have the acronym 
(A) CD 
(B) DVD 
(C) ROM 
(D) RW 
(E) ROS 
58. The most common type of storage devices are: 
(A) Persistent 
(B) Optical 
(C) Magnetic 
(D) Flash 
(E) Steel 
59. Codes consisting of lines of varying widths or lengths that are computer-readable are known as 
(A) An ASCII code 
(B) A magnetic tape 
(C) An OCR scanner 
(D) A bar code
(E) None of these 
60. A Website’s main page is called its 
(A) Home Page 
(B) Browser Page 
(C) Search Page 
(D) Bookmark 
(E) None of these 
61. Part number, part description, and number of parts ordered are examples of 
(A) Control 
(B) Output 
(C) Processing 
(D) Feedback 
(E) Input 
62. To access properties of an object, the mouse technique to use is 
(A) Dragging 
(B) Dropping 
(C) Right-clicking 
(D) Shift-clicking 
(E) None of these 
63. Computers use the number system to store data and perform calculations. 
(A) Binary 
(B) Octal 
(C) Decimal 
(D) Hexadecimal 
(E) None of these 
64. _________are attempts by individuals to obtain confidential information from you by falsifying their identity. 
(A) Phishing trips 
(B) Computer viruses 
(C) Spyware scams 
(D) Viruses
(E) Phishing scams 
65. Why is it unethical to share copyrighted files with your friends ? 
(A) It is not unethical, because it is legal. 
(B) It is unethical because the files are being given for free. 
(C) Sharing copyrighted files without permission breaks copyright laws. 
(D) It is not unethical because the files are being given for free. 
(E) It is not unethical – anyone can access a computer. 
66. Which of the following can be used to select the entire document ? 
(A) CTRL+A 
(B) ALT+F5 
(C) SHIFT+A 
(D) CTRL+K 
(E) CTRL+H 
67. To instruct Word to fit the width of a column to the contents of a table automatically, click the button and 
then point to Auto Fit Contents. 
(A) Fit to Form 
(B) Format 
(C) Auto size 
(D) Contents 
(E) Auto Fit 
68. The simultaneous processing of two or more programs by multiple processors is 
(A) Multiprogramming 
(B) Multitasking 
(C) Time-sharing 
(D) Multiprocessing 
(E) None of these 
69. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is 
(A) Memory-only 
(B) Write-only 
(C) Once-only 
(D) Run-only
(E) Read-only 
70. What is the permanent memory built into your computer called ? 
(A) RAM 
(B) Floppy 
(C) CPU 
(D) CD-ROM 
(E) ROM 
71. The default view in Excel is view. 
(A) Work 
(B) Auto 
(C) Normal 
(D) Roman 
(E) None of these 
72. What displays the contents of the active cell in Excel? 
(A) Name box 
(B) Row Headings 
(C) Formula bar 
(D) Task pane 
(E) None of these 
73. In Word, you can force a page break 
(A) By positioning your cursor at the appropriate place and pressing the Fl key 
(B) By positioning your cursor at the appropriate place and pressing Ctrl+Enter 
(C) By using the Insert/Section Break 
(D) By changing the font size of your document 
(E) None of these 
74. Grouping and processing all of a firm’s transactions at one time is called 
(A) A database management system 
(B) Batch processing 
(C) A real-time system 
(D) An on-line system
(E) None of these 
75. Help Menu is available at which button ? 
(A) End 
(B) Start 
(C) Turnoff 
(D) Restart 
(E) Reboot 
76. You can keep your personal files/ folders in 
(A) My Folder 
(B) My Documents 
(C) My Files 
(D) My Text 
(E) None of these 
77. A central computer that holds collections of data and programs for many PCs, workstations, 
and other computers is a(n) 
(A) Supercomputer 
(B) Minicomputer 
(C) Laptop 
(D) Server 
(E) None of these 
78. When you save to this, your data will remain intact even when the computer is turned off. 
(A) RAM 
(B) Motherboard 
(C) Secondary storage device 
(D) Primary storage device 
(E) None of these 
79. The folder retains copies of messages that you have started but are not yet ready to send. 
(A) Drafts 
(B) Outbox 
(C) Address Book 
(D) Sent Items
(E) Inbox 
80. You can a search by providing more information the search engine can use to select a smaller, more useful set of results. 
(A) Refine 
(B) Expand 
(C) Load 
(D) Query 
(E) Slowdown 
81. The contents of are lost when the computer turns off. 
(A) Storage 
(B) Input 
(C) Output 
(D) Memory 
(E) None of these 
82. The enables you to simultaneously keep multiple Web pages open in one browser window. 
(a) Tab box 
(B) Pop-up helper 
(C) Tab row 
(D) Address bar 
(E) Esc key 
83. A DVD is an example of a(n) 
(A) Hard disk 
(B) Optical disc 
(C) Output device 
(D) Solid-state storage device 
(E) None of these 
84. What are the two parts of an e-mail address? 
(A) User name and street address 
(B) Legal name and phone number 
(C) User name and domain name 
(D) Initials and password
(E) User name and recipient name 
85. If you wish to extend the length of the network without having the signal degrade, you would use a 
(A) Resonance 
(B) Router 
(C) Gateway 
(D) Switch 
(E) Repeater 
86. A repair for a known software bug, usually available at no charge on the internet, is called 
(A) version 
(B) Patch 
(C) Tutorial 
(D) FAQ 
(E) Rectifier 
87. URL stands for 
(A) Universal Research List 
(B) Universal Resource List 
(C) Uniform Research List 
(D) Uniform Research Locator 
(E) Uniform Resource Locator 
88. When data changes in multiple lists and all lists are not updated, this causes 
(A) Data redundancy 
(B) Information overload 
(C) Duplicate data 
(D) Data inconsistency 
(E) Data repetition 
89. What is a backup? 
(A) Restoring the information backup 
(B) An exact copy of a system information 
(C) The ability to get a system up and running in the event of a system crash or failure 
(D) All of these
(E) None of these 
90. The Internet is 
(A) A large network of networks 
(B) An internal communication system for a business 
(C) A communication system for the Indian government 
(D) A communication system for some states of India 
(E) A communication system for some cities of India 
91. Computers that are portable and convenient for users who travel are known as 
(A) Supercomputers 
(B) Planners 
(C) Minicomputers 
(D) File servers 
(E) Laptops 
92. What is the storage area for e-mail messages called? 
(A) A folder 
(B) A mail box 
(C) A directory 
(D) The hard disk 
(E) None of these 
93.The operating system does all of the following EXCEPT: 
1). provide a way for the user to interact with the computer. 
2). manage the central processing unit (CPU). 
3 ). manage memory and storage. 
4 ). enable users to perform a specific task such as document editing. 
94.To move forward through the tabs 
1). CTRL+TAB 
2 ). CTRL+SHIFT+TAB 
3 ). SHIFT+TAB 
4 ). None of these 
95.Which of the following is a valid IP address? 
1). 192.168.111.1111 
2 ). 192.168.1.1 
3 ). 192.168.900.1 
4 ). 192.900.168.1 
96.The ability to recover and read deleted or damaged files from a criminals computer is an example of
a law enforcement specialty called: 
1). simulation 
2 ). animation 
3 ). robotics 
4 ). computer forensics 
97.Allocation of a resources in a time dependent manner to several program simultaneously called 
1). multi user 
2 ). multi tasking 
3 ). time sharing 
4 ). None of these 
98.Which of the following is an example of a binary number? 
1). A1BCD1 
2 ). 23456 
3 ). 005 
4 ). 100101 
99.____________ controls the way in which the computer system functions and provides a means 
by which users can interact with the computer. 
1). The operating system 
2 ). The motherboard 
3 ). The platform 
4 ). Application software 
100.What is the shortcut key of printing a document for computer having windows? 
1). Shift + P 
2 ). Alt + P 
3 ). Ctrl + P 
4 ). Ctrl + Shift + P 
101.Which of the following are true about firewalls? 
1). Follows a set of rules 
2 ). Can be either a hardware or software device 
3 ). Filters network traffic 
4 ). All the above 
102.In the binary language each letter of the alphabet, each number and each special character is made 
up of a unique combination of: 
1). eight bytes. 
2 ). eight characters. 
3 ). eight bits. 
4 ). eight kilobytes. 
103.Verification of a login name and password is known as: 
1). configuration 
2 ). accessibility 
3 ). authentication 
4 ). logging in 
104.Which of the following is a correct format of Email address? 
1). sales@website@info 
2 ). sales@website.info 
3 ). saleswebsite.info 
4 ). sales.website.info
105.The difference between people with access to computers and the Internet and those without this 
access is known as the: 
1). digital divide. 
2 ). Internet divide. 
3 ). Web divide. 
4 ). cyberway divide. 
106.What is e-commerce? 
1). Buying and selling computer products 
2 ). Buying and selling products and services not found in stores 
3 ). Buying and selling international goods 
4 ). Buying and selling products and services over the Internet 
107.'Blue tooth' technology allows 
1). Satellite communication 
2 ). Wireless communication between equipments 
3 ). Signal transmission on mobile phones only 
4 ). Landline phone to mobile phone communication 
108.Java is a 
1). Operating System 
2 ). Compiler 
3 ). Input Device 
4 ). Programming Language 
109.The basic unit of a worksheet into which you enter data in Excel is called a 
1). cell 
2 ). table 
3 ). box 
4 ). column 
110.The set of instructions that tells the computer what to do is 
1). Softcopy 
2 ). Software 
3 ). Hardware 
4 ). Hardcopy 
111.What are the four things needed to connect to the Internet? 
1). Monitor, keyboard, mouse, modem 
2 ). Telephone line, PDA, modem and computer 
3 ). Telephone line, modem, computer, and an ISP 
4 ). Modem, computer, PDA and ISP 
112.What is the commonly used unit for measuring the sped of data transmission? 
1). Mega Hertz 
2 ). Characters per second 
3 ). Nano seconds 
4 ). Bits per second 
113.Word processing, spreadsheet, and photo-editing are examples of: 
1). application software. 
2 ). system software. 
3 ). operating system software. 
4 ). platform software. 
114.Which of the following stores more data? 
1). DVD 
2 ). CD ROM
3 ). Floppy Disk 
4 ). CD RW 
115.The base of the hexadecimal number system is 
1). 2 
2 ). 8 
3 ). 10 
4 ). 16 
116.The Operating System Manages 
1). Processes 
2 ). Memory 
3 ). Disks and I/O devices 
4 ). All of the above 
117.____________ is the ability of an operating system to control the activities of multiple programs at 
the same time. 
1). Streamlining 
2 ). Multiuser 
3 ). Multitasking 
4 ). Simulcasting 
118.What does HTTP stands for? 
1). Head Tail Transfer Protocol 
2 ). Hypertext Transfer Protocol 
3 ). Hypertext Transfer Plot 
4 ). Hypertext Transfer Plotter 
119.____________ is data that has been organized or presented in a meaningful way. 
1). A process 
2 ). Information 
3 ). Software 
4 ). Storage 
120.Computer software includes 
1). Packaged programs 
2 ). Application programs 
3 ). Operating system programs 
4 ). All of these 
121.Data that are accumulated and processed in group called 
1). Group processing 
2 ). Batch Processing 
3 ). Time sharing 
4 ). None of these.
123.Keyboard Shortcuts (Microsoft Windows) 
1. CTRL+C (Copy) 
2. CTRL+X (Cut) 
3. CTRL+V (Paste) 
4. CTRL+Z (Undo) 
5. DELETE (Delete) 
6. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin) 
7. CTRL while dragging an item (Copy the selected item) 
8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item) 
9. F2 key (Rename the selected item) 
10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word) 
11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word) 
12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph) 
13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph) 
14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text) 
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document) 
15. CTRL+A (Select all) 
16. F3 key (Search for a file or a folder) 
17. ALT+ENTER (View the properties for the selected item) 
18. ALT+F4 (Close the active item, or quit the active program) 
19. ALT+ENTER (Display the properties of the selected object) 
20. ALT+SPACEBAR (Open the shortcut menu for the active window) 
21. CTRL+F4 (Close the active document in programs that enable you to have multiple documents opensimultaneously) 
22. ALT+TAB (Switch between the open items) 
23. ALT+ESC (Cycle through items in the order that they had been opened) 
24. F6 key (Cycle through the screen elements in a window or on the desktop) 
25. F4 key (Display the Address bar list in My Computer or Windows Explorer) 
26. SHIFT+F10 (Display the shortcut menu for the selected item) 
27. ALT+SPACEBAR (Display the System menu for the active window) 
28. CTRL+ESC (Display the Start menu) 
29. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a command name on an open menu 
(Perform the corresponding command) 
30. F10 key (Activate the menu bar in the active program) 
31. RIGHT ARROW (Open the next menu to the right, or open a submenu) 
32. LEFT ARROW (Open the next menu to the left, or close a submenu) 
33. F5 key (Update the active window) 
34. BACKSPACE (View the folder onelevel up in My Computer or Windows Explorer) 
35. ESC (Cancel the current task) 
36. SHIFT when you insert a CD-ROMinto the CD-ROM drive (Prevent the CD-ROM from automatically playing) 
124.Dialog Box - Keyboard Shortcuts 
1. CTRL+TAB (Move forward through the tabs) 
2. CTRL+SHIFT+TAB (Move backward through the tabs) 
3. TAB (Move forward through the options)
4. SHIFT+TAB (Move backward through the options) 
5. ALT+Underlined letter (Perform the corresponding command or select the corresponding option) 
6. ENTER (Perform the command for the active option or button) 
7. SPACEBAR (Select or clear the check box if the active option is a check box) 
8. Arrow keys (Select a button if the active option is a group of option buttons) 
9. F1 key (Display Help) 
10. F4 key (Display the items in the active list) 
11. BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box) 
125.Microsoft Natural Keyboard Shortcuts 
1. Windows Logo (Display or hide the Start menu) 
2. Windows Logo+BREAK (Display the System Properties dialog box) 
3. Windows Logo+D (Display the desktop) 
4. Windows Logo+M (Minimize all of the windows) 
5. Windows Logo+SHIFT+M (Restorethe minimized windows) 
6. Windows Logo+E (Open My Computer) 
7. Windows Logo+F (Search for a file or a folder) 
8. CTRL+Windows Logo+F (Search for computers) 
9. Windows Logo+F1 (Display Windows Help) 
10. Windows Logo+ L (Lock the keyboard) 
11. Windows Logo+R (Open the Run dialog box) 
12. Windows Logo+U (Open Utility Manager) 
13. Accessibility Keyboard Shortcuts 
14. Right SHIFT for eight seconds (Switch FilterKeys either on or off) 
15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off) 
16. Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off) 
17. SHIFT five times (Switch the StickyKeys either on or off) 
18. NUM LOCK for five seconds (Switch the ToggleKeys either on or off) 
19. Windows Logo +U (Open Utility Manager) 
20. Windows Explorer Keyboard Shortcuts 
21. END (Display the bottom of the active window) 
22. HOME (Display the top of the active window) 
23. NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder) 
24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder) 
25. NUM LOCK+Minus sign (-) (Collapse the selected folder) 
26. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder) 
27. RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder) 
Shortcut Keys for Character Map 
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
* HTTP - Hyper Text Transfer Protocol. 
* HTTPS - Hyper Text Transfer Protocol Secure. 
* IP - Internet Protocol. 
* URL - Uniform Resource Locator. 
* USB - Universal Serial Bus. 
* VIRUS - Vital Information Resource UnderSeized. 
* 3G -3rd Generation. 
* GSM - Global System for Mobile Communication. 
* CDMA - Code Divison Multiple Access. 
* UMTS - Universal Mobile 
Telecommunication System. 
* SIM - Subscriber Identity Module . 
* AVI = Audio Video Interleave 
* RTS = Real Time Streaming 
* SIS = Symbian OS Installer File 
* AMR = Adaptive Multi-Rate Codec 
* JAD = Java Application Descriptor 
* JAR = Java Archive 
* JAD = Java Application Descriptor 
* 3GPP = 3rd Generation Partnership Project 
* 3GP = 3rd Generation Project 
* MP3 = MPEG player lll 
* MP4 = MPEG-4 video file 
*AAC = Advanced Audio Coding 
* GIF= Graphic Interchangeable Format 
* JPEG = Joint Photographic Expert Group 
* BMP = Bitmap 
* SWF = Shock Wave Flash 
* WMV = Windows Media Video 
* WMA = Windows Media Audio 
* WAV = Waveform Audio 
* PNG = Portable Network Graphics 
* DOC = Document (Microsoft Corporation) 
* PDF = Portable Document Format 
* M3G = Mobile 3D Graphics 
* M4A = MPEG-4 Audio File 
* NTH = Nokia Theme (series 40) 
* THM = Themes (Sony Ericsson) 
* MMF = Synthetic Music Mobile Application File 
* NRT = Nokia Ringtone 
* XMF = Extensible Music File 
* WBMP = Wireless Bitmap Image 
* DVX = DivX Video 
* HTML = Hyper Text Markup Language 
* WML = Wireless Markup Language
* CD -Compact Disk. 
* DVD - Digital Versatile Disk. 
*CRT - Cathode Ray Tube. 
* DAT - Digital Audio Tape. 
* DOS - Disk Operating System. 
* GUI -Graphical User Interface. 
* HTTP - Hyper Text Transfer Protocol. 
* IP - Internet Protocol. 
* ISP - Internet Service Provider. 
* TCP - Transmission Control Protocol. 
* UPS - Uninterruptible Power Supply. 
* HSDPA - High Speed Downlink Packet Access. 
* EDGE - Enhanced Data Rate for GSM [GlobalSystem for Mobile Communication] Evolution. 
* VHF - Very High Frequency. 
* UHF - Ultra High Frequency. 
* GPRS - General Packet Radio Service. 
* WAP - Wireless Application Protocol. 
* TCP - Transmission Control Protocol . 
* ARPANET - Advanced Research 
Project Agency Network. 
* IBM - International Business Machines. 
* HP - Hewlett Packard. 
*AM/FM - Amplitude/ Frequency Modulation. 
* WLAN - Wireless Local Area Network 
126.Computer uses the……….number system to store data and perform calculations. 
1. Binary 
2. Octal bar 
3. Decimal 
4. Hexadecimal 
127.Why is it unethical to share copyrighted files with your friends ? 
1. It is not unethical, because it is legal 
2. It is not unethical, because it is legal 
3. Sharing copyrighted files without permission breaks copyright laws. 
4. It is not unethical because the files are being given for free. 
128.To instruct Word to fit the width of a column to the contents of a table automatically. 
1. Fit to Form 
2. Format 
3. Autosize 
4. AutoFit
129.Which of the following can be used to select the entire document ? 
1. CTRL+A 
2. ALT+F5 
3. SHIFT+A 
4. CTRL+K 
130.A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is– 
1. Memory Only 
2. Write Only 
3. Read only 
4. Run Only 
131. All of the following statements concerning windows are true EXCEPT: 
1). windows are an example of a command-driven environment. 
2 ). windows can be resized and repositioned on the desktop. 
3 ). more than one window can be open at a time. 
4 ). toolbars and scrollbars are features of windows. 
132.____ is a collection of raw, unprocessed facts, figures, and symbols. 
A: Hardware 
B: Software 
C: Information 
D: Data 
133.The metal or plastic case that holds all the physical parts of the computer is the: 
A. system unit. 
B. CPU. 
C. mainframe. 
D. platform. 
Answer: A 
134.The binary language consists of ____________ digit(s). 
A. 8 
B. 2 
C. 1,000
D. 1 
Answer: B 
135.A byte can hold one ____________ of data. 
A. bit 
B. binary digit 
C. character 
D. kilobyte 
Answer: C 
136. ____________ controls the way in which the computer system functions and provides a means by which users 
can interact with the computer. 
A. The platform 
B. The operating system 
C. Application software 
D. The motherboard 
Answer: B 
137.The operating system is the most common type of ____________ software. 
A. communication 
B. application 
C. system 
D. word-processing software 
Answer: C 
138. ____________ are specially designed computer chips that reside inside other devices, such as your car or your 
electronic thermostat. 
A. Servers 
B. Embedded computers 
C. Robotic computers 
D. Mainframes 
Answer: B 
139.The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called: 
A. instructions. 
B. the operating system. 
C. application software. 
D. the system unit. 
Answer: A 
140.The two broad categories of software are: 
A. word processing and spreadsheet. 
B. transaction and application. 
C. Windows and Mac OS.
D. system and application. 
Answer: D 
141.Smaller and less expensive PC-based servers are replacing ____________ in many businesses. 
A. supercomputers 
B. clients 
C. laptops 
D. mainframes 
Answer: D 
142.____________ are specially designed computers that perform complex calculations extremely rapidly. 
A. Servers 
B. Supercomputers 
C. Laptops 
D. Mainframes 
Answer: B 
143.DSL is an example of a(n) ____________ connection. 
A. network 
B. wireless 
C. slow 
D. broadband 
Answer: D 
144.The difference between people with access to computers and the Internet and those without this access is known 
as the: 
A. digital divide. 
B. Internet divide. 
C. Web divide. 
D. broadband divide. 
Answer: A 
145.____________ is the science revolving around the use of nano structures to build devices on an extremely 
small scale. 
A. Nanotechnology 
B. Micro-technology 
C. Computer forensics 
D. Artificial intelligence 
Answer: A 
146.____________ bits equal one byte. 
A. Eight 
B. Two 
C. One thousand
D. One million 
Answer: A 
147.The CPU and memory are located on the: 
A. expansion board. 
B. motherboard. 
C. storage device. 
D. output device. 
Answer: B 
148.Word processing, spreadsheet, and photo-editing are examples of: 
A. application software. 
B. system software. 
C. operating system software. 
D. platform software. 
Answer: A 
149. ____________ is a set of computer programs used on a computer to help perform tasks. 
A. An instruction 
B. Software 
C. Memory 
D. A processor 
Answer: B 
150.System software is the set of programs that enables your computers hardware devices and ____________ 
software to work together. 
A. management 
B. processing 
C. utility 
D. application 
Answer: D 
151.The PC (personal computer) and the Apple Macintosh are examples of two different: 
A. platforms. 
B. applications. 
C. programs. 
D. storage devices. 
Answer: A 
152.Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating 
systems. 
A. languages 
B. methods 
C. CPUs 
D. storage devices
Answer: C 
153.Servers are computers that provide resources to other computers connected to a: 
A. network. 
B. mainframe. 
C. supercomputer. 
D. client. 
Answer: A 
154.A ____________ is approximately a million bytes. 
A. gigabyte 
B. kilobyte 
C. megabyte 
D. terabyte 
Answer: C 
155.____________ is any part of the computer that you can physically touch. 
A. Hardware 
B. A device 
C. A peripheral 
D. An application 
Answer: A 
156.The components that process data are located in the: 
A. input devices. 
B. output devices. 
C. system unit. 
D. storage component. 
Answer: C 
157.All of the following are examples of input devices EXCEPT a: 
A. scanner. 
B. mouse. 
C. keyboard. 
D. printer. 
Answer: D 
158.Which of the following is an example of an input device? 
A. scanner 
B. speaker 
C. CD 
D. printer 
Answer: A 
159.All of the following are examples of storage devices EXCEPT: 
A. hard disk drives. 
B. printers. 
C. floppy disk drives. 
D. CD drives. 
Answer: B 
160.The ____________, also called the â€oebrainsâ€0 of the computer, is responsible for processing data. 
A. motherboard 
B. memory 
C. RAM 
D. central processing unit (CPU) 
Answer: D 
161.After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture 
is considered: 
A. data. 
B. output. 
C. input.
D. the process. 
Answer: B 
162.Computers use the ____________ language to process data. 
A. processing 
B. kilobyte 
C. binary 
D. representational 
Answer: C 
163.Computers process data into information by working exclusively with: 
A. multimedia. 
B. words. 
C. characters. 
D. numbers. 
Answer: D 
164.In the binary language each letter of the alphabet, each number and each special character is made up of a 
unique combination of: 
A. eight bytes. 
B. eight kilobytes. 
C. eight characters. 
D. eight bits. 
Answer: D 
165.The term bit is short for: 
A. megabyte. 
B. binary language. 
C. binary digit. 
D. binary number. 
Answer: C 
166.A string of eight 0s and 1s is called a: 
A. megabyte. 
B. byte. 
C. kilobyte. 
D. gigabyte. 
Answer: B 
167.A ____________ is approximately one billion bytes. 
A. kilobyte 
B. bit 
C. gigabyte
D. megabyte 
Answer: C 
168.Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This 
technology is known as: 
A. robotics. 
B. computer forensics. 
C. simulation. 
D. forecasting. 
Answer: A 
169.Technology no longer protected by copyright, available to everyone, is considered to be: 
A. proprietary. 
B. open. 
C. experimental. 
D. in the public domain. 
Answer: A 
170. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers. 
A. Nanoscience 
B. Microelectrodes 
C. Computer forensics 
D. Artificial intelligence 
Answer: A 
171. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do. 
A. Nanoscience 
B. Nanotechnology 
C. Simulation 
D. Artificial intelligence (AI) 
Answer: D 
172. ____________ is data that has been organized or presented in a meaningful fashion. 
A. A process 
B. Software 
C. Storage 
D. Information 
Answer: D 
173. The name for the way that computers manipulate data into information is called: 
A. programming. 
B. processing. 
C. storing. 
D. organizing. 
Answer: B
174. Computers gather data, which means that they allow users to ____________ data. 
A. present 
B. input 
C. output 
D. store 
Answer: B 
175.All of the following are examples of real security and privacy risks EXCEPT: 
A. hackers. 
B. spam. 
C. viruses. 
D. identity theft. 
Answer: B 
176.A process known as ____________ is used by large retailers to study trends. 
A. data mining 
B. data selection 
C. POS 
D. data conversion 
Answer: A 
177. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer 
systems. 
A. Data 
B. Point-of-sale (POS) 
C. Sales 
D. Query 
Answer: B 
178.A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price 
(and any special offers) as you shop. 
A. PSS 
B. POS 
C. inventory 
D. data mining 
Answer: A 
179.The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement 
specialty called: 
A. robotics. 
B. simulation. 
C. computer forensics. 
D. animation. 
Answer: C
180.Which of the following is NOT one of the four major data processing functions of a computer? 
A. gathering data 
B. processing data into information 
C. analyzing the data or information 
D. storing the data or information 
Answer: C 
181. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements. 
A. POS 
B. RFID 
C. PPS 
D. GPS 
Answer: B 
182.A process known as ____________ is used by large retailers to study trends. 
A. data mining 
B. data selection 
C. POS 
D. data conversion 
Answer: A 
183.All of the following are examples of real security and privacy risks EXCEPT: 
A. hackers. 
B. spam. 
C. viruses. 
D. identity theft. 
Answer: B 
184.Primary memory stores? 
a) Data alone 
b) Only programs 
c) Processed data 
d) All of the above 
Answer : D 
185.Memory unit is one part of 
a) Central Processing Unit 
b) Control Unit 
c) External devices 
d) None of the above
Answer : A 
186.EPROM can be used for? 
a) Erasing the contents of ROM 
b) Rew7riting the contents of ROM 
c) Erasing and rewriting the contents of ROM 
d) None of the above 
Answer : C 
187.Memory is made up of? 
a) Wires 
b) Circuits 
c) Several thousands of cells 
d) None of the above 
Answer : C 
188.When you use mobile phone to purchase the product and transfer the money , the transaction is called 
a) M-Commerce/mobile banking 
b) E-Commerce 
c) Web transaction 
d) None of the above 
Answer : A 
189.JPG is the extension for_ 
a) Microsoft Outlook Files 
b) Image Files 
c) Bitmap Graphic Files 
d)None of the above Files 
Answer : b 
190.What is the extension for Microsoft Word Document 
a) DOC 
b)DOT 
c)DGN 
d)DWG 
Answer : A
191.What is primary object of an operating system? 
a) To activate the system 
b) To make the most efficient use of the computer hardware and other periphery- devices 
c) To save the power 
d) To help the Programming languages 
Answer : B 
192.What is the main object of multiprogramming systems? 
a) To process all the jobs with high speed 
b) To use less memory space 
c) Execute more jobs in the same time period 
d) None of the above 
Answer : B 
193.What is the extension for Microsoft Excel Workspace 
a) XLS 
b)XLT 
c)XLW 
d)XLL 
Answer : A 
194.The basic operations performed by computer are? 
a) ASCII 
b) BCD 
c) Hollerith 
d) None of these 
Answer : a 
195.ROM is composed of 
1. Magnetic cores 
2. Micro-processors 
3. Photoelectric cells 
4. Floppy disks 
5. None of these 
Answer : 2 
196.A device that can convert digital signal to analog signal is
1. A packet 
2. Modem 
3. Switch 
4. Router 
5. None of these 
Answer : 3 
197.Internet-like networks within an enterprise known as 
1. Intranet 
2. Internet 
3. Extranet 
4. Network 
5. None of these 
Answer : 1 
198.File Transfer Protocol (FTP) is 
1. Used to send email 
2. Used to browse the Web 
3. is part of Netscape 
4. is a protocol for the transfer of files between computers 
5. None of these 
Answer : 4 
199.Which of the following types of channels moves data relatively slowly? 
1. Narrowband channel 
2. broadband channel 
3. wideband channel 
4. None of these 
Answer : 1 
200.What does DOS stand for? 
1. Disk Operation Sequence 
2. Disk Operating System 
3. Don't Operate System 
Answer : 2 
201.Device which allows your computer to connect to another computer via a phone line
1. Server 
2. Modem 
3. Jeck 
Answer : 2 
202.'Booting' the computer refers to: 
1. Powering On the Computer 
2. Powering Down the Computer 
3. Closing Windows 
Answer : 1 
203.The list of coded instructions is called 
1. Computer program 
2. Algorithm 
3. Flowchart 
4. Utility programs 
5. None of the above 
Answer : 1 
204.ASCII stands for 
1. American standard code for information interchange 
2. All purpose scientific code for information interchange 
3. American security code for information interchange 
4. American Scientific code for information interchange 
5. None of the above 
Answer : 1 
205.A language which is close to that used within the computer is 
1. High-level language 
2. Assembly language 
3. Low-level language 
4. All of the above
Answer : 3 
206.RAM is used as a short memory because it is 
1. Has small capacity 
2. Is very expensive 
3. Volatile 
4. None of the above 
Answer : 3 
207.In UNIX, which command is used to sort the lines of data in a file in reverse order 
1. sort 
2. sh 
3. st 
4. sort –r 
Answer: 4 
208.A single dimensional array is called 
1. List 
2. File 
3. Martix 
4. None of these 
Answer: 1 
209.C, BASIC, COBOL, and Java are examples of ……… languages. 
1. Computer 
2. System Programming Language 
3. Low Level Programming Language 
4. High Level Programming Language 
Answer: 4
210.The earliest calculating devices are? 
· Calculators 
· Search engines 
· Transistors 
· ABACUS 
211.What is the address given to a computer connected to a network called? 
· Process ID 
· URL 
· IP Address 
· None of the above 
212.Algorithm and Flow chart are helpful to the programmer to? 
· Identify the base of a problem 
· To solve the problem 
· Specify the problem completely and clearly 
· No use 
213.Which of the following have the faster access time? 
· Compact Disks 
· Semiconductor Memories 
· Magnetic Tapes 
· None of the above 
214.What is the main object of multiprogramming systems? 
· To process all the jobs with high speed 
· To use less memory space 
· Execute many jobs in the same time period 
· None of the above
215..JPG is the extension for 
· Microsoft Outlook files 
· Image files 
· Bitmap Graphic files 
· None of the above 
216.Computers manipulate data in many ways, and this manipulation is called 
· utilizing 
· batching 
· upgrading 
· processing 
217.A result of a computer virus can not lead to ...... 
· Disk Crash 
· Mother Board Crash 
· Corruption o f program 
· Deletion of files 
218.A complete electronic circuit with transistors and other electronic components on a small silicon chip is called 
a(n) 
· Workstation 
· CPU 
· Magnetic disk 
· Integrated circuit 
· None of these 
219.What is the main difference between a mainframe and a super computer ? 
· Super computer is much larger than mainframe computers 
· Super computers are much smaller than mainframe computers 
· Supercomputers are focused to execute few programs as fast as possible while mainframe uses its power to 
execute as many programs concurrently
· Supercomputers are focused to execute as many programs as possible while mainframe uses its power to execute few programs 
as fast as possible 
· None of these 
220.By default, your documents print in _ mode. 
· Landscape 
· Portrait 
· Page Setup 
· Print View 
· None of these 
221. 
· Application 
· Peripheral 
· Programme 
· Software 
· None of these 
222.Which of the following commands is given to reboot the computer ? 
· Ctrl + Alt + Del 
· Ctrl + Shift + ? 
· Ctrl + Shift + Del 
· Ctrl +Alt + shift 
· Ctrl + Alt + Tab 
223.Such a pre-made document, which has coordinating font, layout and background, is- 
· Guide 
· Model 
· Ruler 
· Template 
· None of these 
224.A computer cannot 'boot' if it does not have the-
· Compiler 
· Loader 
· Operating System 
· Assembler 
· None of these 
225.COBOL is widely used in __ applications 
· Commercial 
· Scientific 
· Space 
· Mathematical 
· None of these 
226.A collection of interrelated files in a computer is a _ 
· file manager 
· field 
· record 
· database 
· None of these 
227.Voice mail 
· is the exchange of text messages and computer files transmitted via a communications network such as a local area network or 
the Internet 
· permits users to converse in real time with each other via the computer while connected to the Internet 
· functions much like an answering machine, allowing callers to leave a voice message for the called party 
· involves using video and computer technology to conduct a meeting between participants at geographically separate locations 
· None of these 
228.The number of distinct pixels in each dimension that can be displayed is called 
· Quality 
· Correctness 
· Resolution 
· Repetition 
· Projection
229.Which of the following device is used to send and receive information printed on a paper through telephone 
line? 
· Scanner 
· Printer 
· Fax Machine 
· e - mail 
· MICR 
230.When computer processes the data, the intermediate data is stored in? 
· RAM 
· ROM 
· Hard Disk 
· CD 
· BIOS 
231.The Process of sending data to a number of stations at the same time is known as ? 
· Broadcasting 
· Unicasting 
· Bicasting 
· Synchronization 
· None 
232.What is the maximum storage capacity of a CD? 
· 700 MB 
· 1000 MB 
· 1024 MB 
· 2000 MB 
· 100 MB 
233.Which of the following keyboard shortcuts is used to view the properties of a selected object? 
· Alt + Space 
· Ctrl + Space
· Alt + Enter 
· Ctrl + Enter 
· None 
234.Which of the following is true about URL ? 
· It is a web browser 
· It is a messenger 
· It is a mail service 
· It is a global address of documents and other resources on World Wide Web 
· It is same as internet 
235.LinkedIn is a? 
· Search Engine 
· Web Browser 
· Social Networking Site 
· Name of Operating System 
· None of these 
236.Which of the following best defines a compiler? 
· Translates machine language into a high level language 
· Translates one statement at a time as the program executes 
· Translates two statements at a time as the program executes 
· Produces object code 
· is less sophisticated than an assembler 
237.Which of the following device is used to transmit data over telecommunication lines? 
· Drive 
· Folder 
· Modem 
· Platforms 
· 
238.To restart the computer .... key/ button is used
· Reset 
· Ctrl + Alt + del 
· Backspace + Ctrl 
· Ctrl + Del 
· None of these 
239.Simultaneous execution of two or more instructions is called: 
· Multiprocessing 
· Sequential Access 
· Reduced Instruction Set Computing (RISC) 
· Disk Mirroring 
· None of these 
240.Pick the odd one out: 
· Interpreter 
· Compiler 
· Operating System 
· Assembler 
· None of these 
241.What is the symbol for inbox in mail? 
· Envelope 
· BOX 
· Upper Case 'I' 
· Lower case 'I' 
· None of these 
242.An email address typically consists of user id followed by _ and the domain name. 
· @ 
· # 
· & 
· ∗ 
· None of these
243.Which of the following is a function of UPS? 
· It provides battery backup for limited time 
· It limits damage caused by fluctuating levels of electricity 
· It delivers electronic messages via a bus 
· It conducts a power-on self test or POST 
· None of these 
244.The vast network of computers that connects millions of people all over the world is called 
· LAN 
· Web 
· Internet 
· Hypertext 
· None of these 
245.A connection from one HTML document to another HTML document is called: 
· Connecting Link 
· Icon 
· Hyper Link 
· All of these 
· None of these 
246.'FIND' option is available under which of the following menu? 
· File 
· Edit 
· View 
· Tools 
247.Which of the following folder retains copies of mails that are started but are not yet ready to send? 
· Outbox 
· Inbox 
· Drafts 
· Sent Items
248.What is the full form of SQL, related to Database? 
· Structured Query Language 
· Structured Queue Language 
· Systematic Query Language 
· None 
249.A network geometric arrangement in which a single connecting line is shared by a number of nodes is called– 
· Car Topology 
· Bus Topology 
· Truck Topology 
· All of the above 
· None of these 
250.A user who typically has a notebook computer equipped with a modem, enabling her to transfer information 
between her computer and another computer, such as one at the main office, is considered a ____. 
A: home user 
B: small office/home office user 
C: mobile user 
D: power user 
251.The keyboard, mouse, microphone, scanner, digital camera, and PC camera are all ____. 
A: input devices 
B: output devices 
C: storage devices 
D: system units 
252.____ is another name for a handheld computer. 
A: All-in-one computer 
B: Palmtop computer 
C: Notebook computer 
D: Workstation 
253.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce 
results, and store the results for future use. 
A: fax machine 
B: computer 
C: printer 
D: scanner 
254.To access to the Internet and many other specialized services, you use a(n) ____. 
A: Internet service provider (ISP) 
B: application service provider (ASP) 
C: network service provider (NSP) 
D: online service provider (OSP) 
255.Free software that has been donated for public use and has no copyright restrictions is called ____. 
A: freeware
B: public-domain software 
C: shareware 
D: system software 
256.A Web-enabled cellular telephone is sometimes called a(n) ____. 
A: Internet phone 
B: smart phone 
C: smart pager 
D: information appliance 
257.The term ____ means that the accuracy of a computer's output depends on the accuracy of the input. 
A: garbage in, garbage out (GIGO) 
B: what you see is what you get (WYSIWYG) 
C: accuracy for accuracy (AFA) 
D: none of the above 
258.____ is a work arrangement in which employees work away from a company's standard workplace. 
A: Remote employment 
B: Telecommuting 
C: Virtual office 
D: Small office/home office (SOHO) 
259.A(n) ____ is any hardware component that can convey information to a user. 
A: input device 
B: output device 
C: storage device 
D: system unit 
260.A(n) ____ is a computer with limited functionality whose main purpose is to connect to the Internet from home. 
A: desktop computer 
B: handheld computer 
C: Internet appliance 
D: notebook computer 
261.____ is the electric, electronic, and mechanical equipment that makes up a computer. 
A: Hardware 
B: Software 
C: Information 
D: Data 
262.Two popular ____ are America Online and The Microsoft Network. 
A: Internet service providers (ISPs) 
B: application service providers (ASPs) 
C: network service providers (NSPs) 
D: online service providers (OSPs) 
263.____ is copyrighted software that is distributed free for a trial period. 
A: Freeware 
B: Public-domain software 
C: Shareware 
D: System software 
264.Before you can use a program, you must first ____ a part or all of the software on the computer's hard disk. 
A: run
B: copy 
C: duplicate 
D: install 
265.Because their electronic components have a ____ failure rate, modern computers are very dependable. 
A: high 
B: steady 
C: low 
D: consistent 
266.Using ____, you can create online photo albums and store your digital photographs for free. 
A: application service providers (ASPs) 
B: photo communities 
C: message boards 
D: chat rooms 
267.Chassis is another name for the ____. 
A: memory 
B: processor 
C: communications device 
D: system unit 
268.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate. 
A: server 
B: handheld computer 
C: Terminal 
D: workstation 
269.____ is a collection of raw, unprocessed facts, figures, and symbols. 
A: Hardware 
B: Software 
C: Information 
D: Data 
270.A network that connects computers in a limited geographic area is called a(n) ____. 
A: intranet 
B: wide area network (WAN) 
C: local area network (LAN) 
D: small area network (SAN) 
271.A floppy disk drive, a Zip ® drive, a hard disk drive, and a CD-ROM drive are all examples of ____. 
A: input devices 
B: output devices 
C: storage devices 
D: communications devices 
272.If you are ____, you have knowledge and understanding of computers and their uses. 
A: computer literate 
B: computer savvy 
C: technology literate 
D: technology current 
273.The fastest and most powerful computer is the ____.
A: personal computer 
B: supercomputer 
C: handheld computer 
D: mainframe 
274.When your computer connects to a network, you are considered ____. 
A: linked 
B: connected 
C: online 
D: networked 
275.Chassis is another name for the ____. 
A: memory 
B: processor 
C: communications device 
D: system unit 
276.Before you can use a program, you must first ____ a part or all of the software on the computer's hard disk. 
A: run 
B: copy 
C: duplicate 
D: install 
277.A(n) ____ is a computer with limited functionality whose main purpose is to connect to the Internet from home. 
A: desktop computer 
B: handheld computer 
C: Internet appliance 
D: notebook computer 
278.Free software that has been donated for public use and has no copyright restrictions is called ____. 
A: freeware 
B: public-domain software 
C: shareware 
D: system software 
279.The keyboard, mouse, microphone, scanner, digital camera, and PC camera are all ____. 
A: input devices 
B: output devices 
C: storage devices 
D: system units 
280.An Internet appliance is also called a(n) ____. 
A: information appliance 
B: Web device 
C: online assistant 
D: Internet tool 
281.A(n) ____ is an expensive, powerful desktop computer designed for work that requires intense calculations and 
graphics capabilities. 
A: all-in-one computer 
B: server 
C: stand-alone computer
D: workstation 
282.To create documents such as letters, memorandums, and brochures, use ____. 
A: spreadsheet software 
B: database software 
C: presentation graphics software 
D: word processing software 
283.____ is any data or instructions you enter into a computer. 
A: Hardware 
B: Input 
C: Information 
D: Output 
284.Users may choose to publish Web pages to ____. 
A: provide information about their families 
B: provide information about their businesses 
C: to provide distance-learning courses 
D: All of the above 
285.The world's largest network is the ____. 
A: Web 
B: Internet 
C: wide area network (WAN) 
D: online service provider (OSP) 
286.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer 
hardware devices. 
A: utility program 
B: operating system (OS) 
C: user interface 
D: application program 
287.Using ____, you can create online photo albums and store your digital photographs for free. 
A: application service providers (ASPs) 
B: photo communities 
C: message boards 
D: chat rooms 
288.Two popular ____ are America Online and The Microsoft Network. 
A: Internet service providers (ISPs) 
B: application service providers (ASPs) 
C: network service providers (NSPs) 
D: online service providers (OSPs) 
289.Companies that use networks can save time and money because networks allow users to share ____. 
A: hardware devices 
B: software programs 
C: information 
D: all of the above 
290.Text, graphics, sound, or video, and links to other Web documents are contained in ____. 
A: Web pages
B: ISPs 
C: OSPs 
D: Web browsers 
291.A(n) ____ is an expensive, powerful desktop computer designed for work that requires intense calculations and 
graphics capabilities. 
A: all-in-one computer 
B: server 
C: stand-alone computer 
D: workstation 
292.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate. 
A: server 
B: handheld computer 
C: terminal 
D: workstation 
293.A ____ is any company with fewer than 50 employees, as well as the self-employed people who work out of their 
homes. 
A: small office/home office (SOHO) 
B: large business 
C: mobile office 
D: power business 
294.Using ____, you can create online photo albums and store your digital photographs for free. 
A: application service providers (ASPs) 
B: photo communities 
C: message boards 
D: chat rooms 
295.You can use ____ to create Web pages. 
A: presentation graphics software 
B: Web page authoring software 
C: e-mail software 
D: desktop publishing software 
296.Before you can use a program, you must first ____ a part or all of the software on the computer's hard disk. 
A: run 
B: copy 
C: duplicate 
D: install 
297.The primary tool people use to communicate with others today is the ____. 
A: cellular phone 
B: fax machine 
C: Computer 
D: television 
298.____ is the electric, electronic, and mechanical equipment that makes up a computer. 
A: Hardware 
B: Software 
C: Information 
D: Data
299.____ is any data or instructions you enter into a computer. 
A: Hardware 
B: Input 
C: Information 
D: Output 
300.A(n) ____ is any hardware component that can convey information to a user. 
A: input device 
B: output device 
C: storage device 
D: system unit 
301.A floppy disk drive, a Zip ® drive, a hard disk drive, and a CD-ROM drive are all examples of ____. 
A: input devices 
B: output devices 
C: storage devices 
D: communications devices 
302.The term ____ means that the accuracy of a computer's output depends on the accuracy of the input. 
A: garbage in, garbage out (GIGO) 
B: what you see is what you get (WYSIWYG) 
C: accuracy for accuracy (AFA) 
D: none of the above 
303.The computer's ____ performs a specific task, usually related to managing the computer, its devices, or its 
programs. 
A: utility program 
B: operating system (OS) 
C: user interface 
D: application service provider (ASP) 
304..Free software that has been donated for public use and has no copyright restrictions is called ____. 
A: freeware 
B: public-domain software 
C: shareware 
D: system software 
305.A(n) ____ is a network that covers a large geographic area. 
A: intranet 
B: wide area network (WAN) 
C: local area network (LAN) 
D: global area network (GAN) 
306.To access to the Internet and many other specialized services, you use a(n) ____. 
A: Internet service provider (ISP) 
B: application service provider (ASP) 
C: network service provider (NSP) 
D: online service provider (OSP) 
307.The world's largest network is the ____. 
A: Web 
B: Internet 
C: wide area network (WAN)
D: online service provider (OSP) 
308.____ is another name for a handheld computer. 
A: All-in-one computer 
B: Palmtop computer 
C: Notebook computer 
D: Workstation 
309.Before you can use a program, you must first ____ a part or all of the software on the computer's hard disk. 
A: run 
B: copy 
C: duplicate 
D: install 
310.A(n) ____ is a computer with limited functionality whose main purpose is to connect to the Internet from home. 
A: desktop computer 
B: handheld computer 
C: Internet appliance 
D: notebook computer 
311.Free software that has been donated for public use and has no copyright restrictions is called ____. 
A: freeware 
B: public-domain software 
C: shareware 
D: system software 
312.The keyboard, mouse, microphone, scanner, digital camera, and PC camera are all ____. 
A: input devices 
B: output devices 
C: storage devices 
D: system units 
313.An Internet appliance is also called a(n) ____. 
A: information appliance 
B: Web device 
C: online assistant 
D: Internet tool 
6.A(n) ____ is an expensive, powerful desktop computer designed for work that requires intense calculations and 
graphics capabilities. 
A: all-in-one computer 
B: server 
C: stand-alone computer 
D: workstation 
314.To create documents such as letters, memorandums, and brochures, use ____. 
A: spreadsheet software 
B: database software 
C: presentation graphics software 
D: word processing software 
315.____ is any data or instructions you enter into a computer. 
A: Hardware 
B: Input
C: Information 
D: Output 
316.Users may choose to publish Web pages to ____. 
A: provide information about their families 
B: provide information about their businesses 
C: to provide distance-learning courses 
D: all of the above 
317.The world's largest network is the ____. 
A: Web 
B: Internet 
C: wide area network (WAN) 
D: online service provider (OSP) 
318.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer 
hardware devices. 
A: utility program 
B: operating system (OS) 
C: user interface 
D: application program 
319.____ is a collection of raw, unprocessed facts, figures, and symbols. 
A: Hardware 
B: Software 
C: Information 
D: Data 
320.Using ____, you can create online photo albums and store your digital photographs for free. 
A: application service providers (ASPs) 
B: photo communities 
C: message boards 
D: chat rooms 
321.Two popular ____ are America Online and The Microsoft Network. 
A: Internet service providers (ISPs) 
B: application service providers (ASPs) 
C: network service providers (NSPs) 
D: online service providers (OSPs) 
322.The term ____ means that the accuracy of a computer's output depends on the accuracy of the input. 
A: garbage in, garbage out (GIGO) 
B: what you see is what you get (WYSIWYG) 
C: accuracy for accuracy (AFA) 
D: none of the above 
323.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce 
results, and store the results for future use. 
A: fax machine 
B: computer 
C: printer 
D: scanner 
324.A user who typically has a notebook computer equipped with a modem, enabling her to transfer information
between her computer and another computer, such as one at the main office, is considered a ____. 
A: home user 
B: small office/home office user 
C: mobile user 
D: power user 
325.Companies that use networks can save time and money because networks allow users to share ____. 
A: hardware devices 
B: software programs 
C: information 
D: all of the above 
326.____ are used to establish a connection between two computers and transmit items over transmission media, 
such as cables or telephone lines. 
A: Input devices 
B: Output devices 
C: Storage devices 
D: Communications devices 
327.The primary tool people use to communicate with others today is the ____. 
A: cellular phone 
B: fax machine 
C: computer 
D: television 
328.Because their electronic components have a ____ failure rate, modern computers are very dependable. 
A: high 
B: steady 
C: low 
D: consistent 
329.To create documents such as letters, memorandums, and brochures, use ____. 
A: spreadsheet software 
B: database software 
C: presentation graphics software 
D: word processing software 
330.____ is copyrighted software that is distributed free for a trial period. 
A: Freeware 
B: Public-domain software 
C: Shareware 
D: System software 
331.A network that connects computers in a limited geographic area is called a(n) ____. 
A: intranet 
B: wide area network (WAN) 
C: local area network (LAN) 
D: small area network (SAN) 
332.Two popular ____ are America Online and The Microsoft Network. 
A: Internet service providers (ISPs) 
B: application service providers (ASPs) 
C: network service providers (NSPs)
D: online service providers (OSPs) 
333.A type of computer that performs all of its input, processing, output, and storage activities on its own is called 
a(n) ____. 
A: personal computer 
B: Internet appliance 
C: handheld computer 
D: mainframe 
334.A(n) ____ is a computer with limited functionality whose main purpose is to connect to the Internet from home. 
A: desktop computer 
B: handheld computer 
C: Internet appliance 
D: notebook computer 
335.Those who use their computers for personal and business communications, budgeting and personal financial 
management, and Web access are considered ____. 
A: mobile users 
B: large business users 
C: home users 
D: power users 
336.____ is a work arrangement in which employees work away from a company's standard workplace. 
A: Remote employment 
B: Telecommuting 
C: Virtual office 
D: Small office/home office (SOHO) 
337.Users may choose to publish Web pages to ____. 
A: provide information about their families 
B: provide information about their businesses 
C: to provide distance-learning courses 
D: all of the above 
338.A Web-enabled cellular telephone is sometimes called a(n) ____. 
A: Internet phone 
B: smart phone 
C: smart pager 
D: information appliance 
339.If you are ____, you have knowledge and understanding of computers and their uses. 
A: computer literate 
B: computer savvy 
C: technology literate 
D: technology current 
340.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce 
results, and store the results for future use. 
A: fax machine 
B: computer 
C: printer 
D: scanner 
341.____ is data that is organized, meaningful, and useful.
A: Hardware 
B: Software 
C: Information 
D: Input 
342.The keyboard, mouse, microphone, scanner, digital camera, and PC camera are all ____. 
A: input devices 
B: output devices 
C: storage devices 
D: system units 
343.The ____ is the electronic device that interprets and carries out the basic instructions that operate the 
computer. 
A: chassis 
B: central processing unit (CPU) 
C: memory 
D: storage device 
344.The power of a computer depends on its ____. 
A: speed 
B: reliability 
C: accuracy 
D: all of the above 
345.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer 
hardware devices. 
A: utility program 
B: operating system (OS) 
C: user interface 
D: application program 
346.Use ____ to store data in an organized fashion, as well as retrieve, manipulate, and display that data in a variety 
of formats. 
A: spreadsheet software 
B: database software 
C: presentation graphics software 
D: word processing software 
347.When your computer connects to a network, you are considered ____. 
A: linked 
B: connected 
C: online 
D: networked 
348. The power of a computer depends on its ____. 
A: speed 
B: reliability 
C: accuracy 
D: all of the above 
349. A type of computer that performs all of its input, 
processing, output, and storage activities on its own is 
called a(n) ____.
A: personal computer 
B: Internet appliance 
C: handheld computer 
D: mainframe 
350. Application or system software provided at no cost to a user 
by an individual or a company is called ____. 
A: shareware 
B: custom software 
C: freeware 
D: trial software 
351. The term ____ means that the accuracy of a computer's 
output depends on the accuracy of the input. 
A: garbage in, garbage out (GIGO) 
B: what you see is what you get (WYSIWYG) 
C: accuracy for accuracy (AFA) 
D: none of the above 
352. A(n) ____ is an expensive, powerful desktop computer 
designed for work that requires intense calculations and 
graphics capabilities. 
A: all-in-one computer 
B: server 
C: stand-alone computer 
D: workstation 
353. If you are ____, you have knowledge and understanding of 
computers and their uses. 
A: computer literate 
B: computer savvy 
C: technology literate 
D: technology current 
354. Because their electronic components have a ____ failure 
rate, modern computers are very dependable. 
A: high 
B: steady 
C: low 
D: consistent 
355. ____ is another name for a handheld computer. 
A: All-in-one computer 
B: Palmtop computer 
C: Notebook computer 
D: Workstation 
356. The primary tool people use to communicate with others 
today is the ____. 
A: cellular phone 
B: fax machine 
C: computer 
D: television 
357. A(n) ____ is a set of programs containing instructions that 
coordinate all the activities among computer hardware 
devices. 
A: utility program 
B: operating system (OS) 
C: user interface 
D: application program 
358. A(n) ____ is a computer with limited functionality whose 
main purpose is to connect to the Internet from home. 
A: desktop computer 
B: handheld computer 
C: Internet appliance 
D: notebook computer 
359. In the workplace, computers are used to ____. 
A: create memos and letters 
B: calculate payroll 
C: generate invoices
D: all of the above 
360. The computer's ____ performs a specific task, usually 
related to managing the computer, its devices, or its 
programs. 
A: utility program 
B: operating system (OS) 
C: user interface 
D: application service provider (ASP) 
361. A ____ is a computer that does not have any processing 
power, and must be connected to a sever to operate. 
A: server 
B: handheld computer 
C: terminal 
D: workstation 
362. A ____ is an electronic machine that can accept data, 
manipulate the data according to specified rules, produce 
results, and store the results for future use. 
A: fax machine 
B: computer 
C: printer 
D: scanner 
363. To create documents such as letters, memorandums, and 
brochures, use ____. 
A: spreadsheet software 
B: database software 
C: presentation graphics software 
D: word processing software 
364. The fastest and most powerful computer is the ____. 
A: personal computer 
B: supercomputer 
C: handheld computer 
D: mainframe 
365. ____ is the electric, electronic, and mechanical equipment 
that makes up a computer. 
A: Hardware 
B: Software 
C: Information 
D: Data 
366. Use ____ to store data in an organized fashion, as well as 
retrieve, manipulate, and display that data in a variety of 
formats. 
A: spreadsheet software 
B: database software 
C: presentation graphics software 
D: word processing software 
367. Those who use their computers for personal and business 
communications, budgeting and personal financial 
management, and Web access are considered ____. 
A: mobile users 
B: large business users 
C: home users 
D: power users 
368.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer 
hardware devices. 
A: utility program 
B: operating system (OS) 
C: user interface 
D: application program 
369.To create documents such as letters, memorandums, and brochures, use ____.
A: spreadsheet software 
B: database software 
C: presentation graphics software 
D: word processing software 
370.Free software that has been donated for public use and has no copyright restrictions is called ____. 
A: freeware 
B: public-domain software 
C: shareware 
D: system software 
371.When your computer connects to a network, you are considered ____. 
A: linked 
B: connected 
C: online 
D: networked 
372.A network that connects computers in a limited geographic area is called a(n) ____. 
A: intranet 
B: wide area network (WAN) 
C: local area network (LAN) 
D: small area network (SAN) 
373.To access to the Internet and many other specialized services, you use a(n) ____. 
A: Internet service provider (ISP) 
B: application service provider (ASP) 
C: network service provider (NSP) 
D: online service provider (OSP) 
374.Text, graphics, sound, or video, and links to other Web documents are contained in ____. 
A: Web pages 
B: ISPs 
C: OSPs 
D: Web browsers 
375.A type of computer that performs all of its input, processing, output, and storage activities on its own is called 
a(n) ____. 
A: personal computer 
B: Internet appliance 
C: handheld computer 
D: mainframe 
376.____ is another name for a handheld computer. 
A: All-in-one computer 
B: Palmtop computer 
C: Notebook computer 
D: Workstation 
377.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate. 
A: server 
B: handheld computer 
C: terminal 
D: workstation
378.Those who use their computers for personal and business communications, budgeting and personal financial 
management, and Web access are considered ____. 
A: mobile users 
B: large business users 
C: home users 
D: power users 
379.A user who typically has a notebook computer equipped with a modem, enabling her to transfer information 
between her computer and another computer, such as one at the main office, is considered a ____. 
A: home user 
B: small office/home office user 
C: mobile user 
D: power user 
380.Using ____, you can create online photo albums and store your digital photographs for free. 
A: application service providers (ASPs) 
B: photo communities 
C: message boards 
D: chat rooms 
381.Users may choose to publish Web pages to ____. 
A: provide information about their families 
B: provide information about their businesses 
C: to provide distance-learning courses 
D: all of the above 
382.An Internet appliance is also called a(n) ____. 
A: information appliance 
B: Web device 
C: online assistant 
D: Internet tool 
383.Before you can use a program, you must first ____ a part or all of the software on the computer's hard disk. 
A: run 
B: copy 
C: duplicate 
D: install 
384.The primary tool people use to communicate with others today is the ____. 
A: cellular phone 
B: fax machine 
C: computer 
D: television 
385.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce 
results, and store the results for future use. 
A: fax machine 
B: computer 
C: printer 
D: scanner 
386.____ is a collection of raw, unprocessed facts, figures, and symbols. 
A: Hardware
B: Software 
C: Information 
D: Data 
387.____ is any data or instructions you enter into a computer. 
A: Hardware 
B: Input 
C: Information 
D: Output 
388.A type of computer that performs all of its input, processing, output, and storage activities on its own is called 
a(n) ____. 
A: personal computer 
B: Internet appliance 
C: handheld computer 
D: mainframe 
389.If you are ____, you have knowledge and understanding of computers and their uses. 
A: computer literate 
B: computer savvy 
C: technology literate 
D: technology current 
390.A(n) ____ is a network that covers a large geographic area. 
A: intranet 
B: wide area network (WAN) 
C: local area network (LAN) 
D: global area network (GAN) 
391.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer 
hardware devices. 
A: utility program 
B: operating system (OS) 
C: user interface 
D: application program 
392.____ is the process of making a Web page available on the Internet. 
A: Documenting 
B: Launching 
C: Publishing 
D: Uploading 
393.Chassis is another name for the ____. 
A: memory 
B: processor 
C: communications device 
D: system unit 
394.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate. 
A: server 
B: handheld computer 
C: terminal 
D: workstation
395.____ is the electric, electronic, and mechanical equipment that makes up a computer. 
A: Hardware 
B: Software 
C: Information 
D: Data 
396.Two popular ____ are America Online and The Microsoft Network. 
A: Internet service providers (ISPs) 
B: application service providers (ASPs) 
C: network service providers (NSPs) 
D: online service providers (OSPs) 
397.Free software that has been donated for public use and has no copyright restrictions is called ____. 
A: freeware 
B: public-domain software 
C: shareware 
D: system software 
398.A Web-enabled cellular telephone is sometimes called a(n) ____. 
A: Internet phone 
B: smart phone 
C: smart pager 
D: information appliance 
399.The power of a computer depends on its ____. 
A: speed 
B: reliability 
C: accuracy 
D: all of the above 
400.A user who typically has a notebook computer equipped with a modem, enabling her to transfer information 
between her computer and another computer, such as one at the main office, is considered a ____. 
A: home user 
B: small office/home office user 
C: mobile user 
D: power user 
401.A(n) ____ is someone who communicates with a computer or uses the information it generates. 
A: processor 
B: user 
C: programmer 
D: analyst 
402.A(n) ____ is an expensive, powerful desktop computer designed for work that requires intense calculations and 
graphics capabilities. 
A: all-in-one computer 
B: server 
C: stand-alone computer 
D: workstation 
403.The primary tool people use to communicate with others today is the ____. 
A: cellular phone 
B: fax machine
C: computer 
D: television 
404.A network that connects computers in a limited geographic area is called a(n) ____. 
A: intranet 
B: wide area network (WAN) 
C: local area network (LAN) 
D: small area network (SAN) 
405.The computer's ____ performs a specific task, usually related to managing the computer, its devices, or its 
programs. 
A: utility program 
B: operating system (OS) 
C: user interface 
D: application service provider (ASP) 
406.Users may choose to publish Web pages to ____. 
A: provide information about their families 
B: provide information about their businesses 
C: to provide distance-learning courses 
D: all of the above 
407.The ____ is the electronic device that interprets and carries out the basic instructions that operate the 
computer. 
A: chassis 
B: central processing unit (CPU) 
C: memory 
D: storage device 
408.Using ____, you can create online photo albums and store your digital photographs for free. 
A: application service providers (ASPs) 
B: photo communities 
C: message boards 
D: chat rooms 
409.The keyboard, mouse, microphone, scanner, digital camera, and PC camera are all ____. 
A: input devices 
B: output devices 
C: storage devices 
D: system units 
410.____ is another name for a handheld computer. 
A: All-in-one computer 
B: Palmtop computer 
C: Notebook computer 
D: Workstation 
411.The primary tool people use to communicate with others today is the ____. 
A: cellular phone 
B: fax machine 
C: computer 
D: television 
412.A network that connects computers in a limited geographic area is called a(n) ____.
A: intranet 
B: wide area network (WAN) 
C: local area network (LAN) 
D: small area network (SAN) 
413.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer 
hardware devices. 
A: utility program 
B: operating system (OS) 
C: user interface 
D: application program 
414.____ is the process of making a Web page available on the Internet. 
A: Documenting 
B: Launching 
C: Publishing 
D: Uploading 
415.A(n) ____ is any hardware component that can convey information to a user. 
A: input device 
B: output device 
C: storage device 
D: system unit 
416.A(n) ____ is a computer with limited functionality whose main purpose is to connect to the Internet from home. 
A: desktop computer 
B: handheld computer 
C: Internet appliance 
D: notebook computer 
417.In the workplace, computers are used to ____. 
A: create memos and letters 
B: calculate payroll 
C: generate invoices 
D: all of the above 
418.Companies that use networks can save time and money because networks allow users to share ____. 
A: hardware devices 
B: software programs 
C: information 
D: all of the above 
419.The computer's ____ performs a specific task, usually related to managing the computer, its devices, or its 
programs. 
A: utility program 
B: operating system (OS) 
C: user interface 
D: application service provider (ASP) 
420.Users may choose to publish Web pages to ____. 
A: provide information about their families 
B: provide information about their businesses 
C: to provide distance-learning courses
D: all of the above 
421.Chassis is another name for the ____. 
A: memory 
B: processor 
C: communications device 
D: system unit 
422.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate. 
A: server 
B: handheld computer 
C: terminal 
D: workstation 
423.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce 
results, and store the results for future use. 
A: fax machine 
B: computer 
C: printer 
D: scanner 
424.To access to the Internet and many other specialized services, you use a(n) ____. 
A: Internet service provider (ISP) 
B: application service provider (ASP) 
C: network service provider (NSP) 
D: online service provider (OSP) 
425.To create documents such as letters, memorandums, and brochures, use ____. 
A: spreadsheet software 
B: database software 
C: presentation graphics software 
D: word processing software 
426.You can use ____ to create Web pages. 
A: presentation graphics software 
B: Web page authoring software 
C: e-mail software 
D: desktop publishing software 
427.The ____ is the electronic device that interprets and carries out the basic instructions that operate the 
computer. 
A: chassis 
B: central processing unit (CPU) 
C: memory 
D: storage device 
428.Chassis is another name for the ____. 
A: memory 
B: processor 
C: communications device 
D: system unit 
429.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate. 
A: server
B: handheld computer 
C: terminal 
D: workstation 
430.If you are ____, you have knowledge and understanding of computers and their uses. 
A: computer literate 
B: computer savvy 
C: technology literate 
D: technology current 
431.A(n) ____ is a network that covers a large geographic area. 
A: intranet 
B: wide area network (WAN) 
C: local area network (LAN) 
D: global area network (GAN) 
432.____ are used to establish a connection between two computers and transmit items over transmission media, 
such as cables or telephone lines. 
A: Input devices 
B: Output devices 
C: Storage devices 
D: Communications devices 
433.A ____ is any company with fewer than 50 employees, as well as the self-employed people who work out of their 
homes. 
A: small office/home office (SOHO) 
B: large business 
C: mobile office 
D: power business 
434.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce 
results, and store the results for future use. 
A: fax machine 
B: computer 
C: printer 
D: scanner 
435.To access to the Internet and many other specialized services, you use a(n) ____. 
A: Internet service provider (ISP) 
B: application service provider (ASP) 
C: network service provider (NSP) 
D: online service provider (OSP) 
436.Because their electronic components have a ____ failure rate, modern computers are very dependable. 
A: high 
B: steady 
C: low 
D: consistent 
437.Using ____, you can create online photo albums and store your digital photographs for free. 
A: application service providers (ASPs) 
B: photo communities 
C: message boards
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationx

More Related Content

What's hot

Glossary of terms (assignment...)
Glossary of terms (assignment...)Glossary of terms (assignment...)
Glossary of terms (assignment...)gordonpj96
 
common computer terminology
common computer terminologycommon computer terminology
common computer terminologysonykhan3
 
A 101025201954-phpapp02
A 101025201954-phpapp02A 101025201954-phpapp02
A 101025201954-phpapp02theiluminados
 
Alpha Tech Module1 glossary
Alpha Tech Module1 glossaryAlpha Tech Module1 glossary
Alpha Tech Module1 glossarythinkict
 
Chapter 6 Output
Chapter 6 OutputChapter 6 Output
Chapter 6 Outputnorzaini
 
Chapter 9 Communications And Networks
Chapter 9 Communications And NetworksChapter 9 Communications And Networks
Chapter 9 Communications And Networksnorzaini
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers OverviewMISY
 
Input output devices
Input output devicesInput output devices
Input output devicessonykhan3
 
Diccionario kelly ingles
Diccionario kelly inglesDiccionario kelly ingles
Diccionario kelly inglesduranmendez
 
Technical language
Technical languageTechnical language
Technical languageana maria
 
Diccionario andris--------> ingles
Diccionario andris--------> inglesDiccionario andris--------> ingles
Diccionario andris--------> inglesandrisolano
 

What's hot (17)

Glossary of terms (assignment...)
Glossary of terms (assignment...)Glossary of terms (assignment...)
Glossary of terms (assignment...)
 
common computer terminology
common computer terminologycommon computer terminology
common computer terminology
 
Computer Basic
Computer BasicComputer Basic
Computer Basic
 
A 101025201954-phpapp02
A 101025201954-phpapp02A 101025201954-phpapp02
A 101025201954-phpapp02
 
Diccionario en ingles
Diccionario en inglesDiccionario en ingles
Diccionario en ingles
 
Alpha Tech Module1 glossary
Alpha Tech Module1 glossaryAlpha Tech Module1 glossary
Alpha Tech Module1 glossary
 
Chapter 01 (Discovering Computers)
Chapter 01 (Discovering Computers)Chapter 01 (Discovering Computers)
Chapter 01 (Discovering Computers)
 
The Computer
The ComputerThe Computer
The Computer
 
Chapter 6 Output
Chapter 6 OutputChapter 6 Output
Chapter 6 Output
 
Chapter 9 Communications And Networks
Chapter 9 Communications And NetworksChapter 9 Communications And Networks
Chapter 9 Communications And Networks
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
 
Input output devices
Input output devicesInput output devices
Input output devices
 
The Computer
The ComputerThe Computer
The Computer
 
Diccionario kelly ingles
Diccionario kelly inglesDiccionario kelly ingles
Diccionario kelly ingles
 
Technical language
Technical languageTechnical language
Technical language
 
Diccionario andris--------> ingles
Diccionario andris--------> inglesDiccionario andris--------> ingles
Diccionario andris--------> ingles
 
Definitions 2
Definitions 2Definitions 2
Definitions 2
 

Similar to Notes for banking railway opsc psc preparationx

Lec no. 4 hardware and software basic
Lec no. 4 hardware and software basicLec no. 4 hardware and software basic
Lec no. 4 hardware and software basicJiian Francisco
 
2.-HARDWARE.pptx
2.-HARDWARE.pptx2.-HARDWARE.pptx
2.-HARDWARE.pptxAndrewBeka
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT InfrastructureLopamudra Das
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to misJob Thomas
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers OverviewMISY
 
Computer Short Note1.docx
Computer Short Note1.docxComputer Short Note1.docx
Computer Short Note1.docxSamyaGufoor
 
Infrastructure student
Infrastructure studentInfrastructure student
Infrastructure studentJohn Scrugham
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfEYOHAICTMEDIA
 
English Technical Glossary
English Technical GlossaryEnglish Technical Glossary
English Technical Glossaryana maria
 
computer terminology.pdf
computer terminology.pdfcomputer terminology.pdf
computer terminology.pdfmisskholeli
 
Computer Science Terms Need To know AboutHave you ever spent.docx
Computer Science Terms Need To know AboutHave you ever spent.docxComputer Science Terms Need To know AboutHave you ever spent.docx
Computer Science Terms Need To know AboutHave you ever spent.docxpatricke8
 

Similar to Notes for banking railway opsc psc preparationx (20)

DICTIONARY
DICTIONARYDICTIONARY
DICTIONARY
 
Lec no. 4 hardware and software basic
Lec no. 4 hardware and software basicLec no. 4 hardware and software basic
Lec no. 4 hardware and software basic
 
2.-HARDWARE.pptx
2.-HARDWARE.pptx2.-HARDWARE.pptx
2.-HARDWARE.pptx
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT Infrastructure
 
Network
NetworkNetwork
Network
 
Hardware
HardwareHardware
Hardware
 
Hardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. PoirotHardware and Software Basics With Dr. Poirot
Hardware and Software Basics With Dr. Poirot
 
Hwswb
HwswbHwswb
Hwswb
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to mis
 
Glosario
GlosarioGlosario
Glosario
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
 
Trhe glossary
Trhe glossaryTrhe glossary
Trhe glossary
 
Computer Short Note1.docx
Computer Short Note1.docxComputer Short Note1.docx
Computer Short Note1.docx
 
Infrastructure student
Infrastructure studentInfrastructure student
Infrastructure student
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
 
Glossary 2
Glossary 2Glossary 2
Glossary 2
 
Lecture 1 2
Lecture 1 2Lecture 1 2
Lecture 1 2
 
English Technical Glossary
English Technical GlossaryEnglish Technical Glossary
English Technical Glossary
 
computer terminology.pdf
computer terminology.pdfcomputer terminology.pdf
computer terminology.pdf
 
Computer Science Terms Need To know AboutHave you ever spent.docx
Computer Science Terms Need To know AboutHave you ever spent.docxComputer Science Terms Need To know AboutHave you ever spent.docx
Computer Science Terms Need To know AboutHave you ever spent.docx
 

More from RAJSEKHAR PEDINA

More from RAJSEKHAR PEDINA (7)

Bills of exchange 7
Bills of exchange 7Bills of exchange 7
Bills of exchange 7
 
Notes for Hardware
Notes for HardwareNotes for Hardware
Notes for Hardware
 
Notes for Hardware
Notes for HardwareNotes for Hardware
Notes for Hardware
 
Notes for Hardware
Notes for HardwareNotes for Hardware
Notes for Hardware
 
Notes for Hardware
Notes for HardwareNotes for Hardware
Notes for Hardware
 
Notes for Hardware
Notes for HardwareNotes for Hardware
Notes for Hardware
 
Computer notesx
Computer notesxComputer notesx
Computer notesx
 

Recently uploaded

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

Notes for banking railway opsc psc preparationx

  • 1. 1111....CCCCOOOOMMMMPPPPUUUUTTTTEEEERRRR TTTTEEEERRRRMMMMIIIINNNNOOOOLLLLOOOOGGGGYYYY ALGOL : Algorithmic Language is basically a portable for scientific computations and was first introduced with ALGOL 58. ARTIFACTS : They are distortions in an image that are produced by the image sensors of the optical system. AMBER : It is often referred as orange,in computer it is referred to indicate a temporary or ongoing error. BIT : It is basic unit of computers .It has two values 1 & 0 only. BYTE : Combination of 8 Bits. BAND WIDTH : The total maximum capacity of network or modem connection. The modem band width is generally measured in BPS . BROADBAND: It is also referred as wideband transimission .Broadband refers to telecommunication taht provide a variety or channels of data over a single communication medium. BOOTP : Bootstrap Protocol allows a disk work station to discover certain network information. CDN : Content Distribution Network (CDN) is also known as mirroring. It consists of multiple sites around the world taht all contain the same information .It is unnecessary because no single website can handle simultaneous requests from several hundred million users. Bridge : It is a computer bridge which is a device to connect two local area networks (LAN). Buffer : It is a memory which refers to temporary shortage of memory at the time of data processing. CLUSTER : When referring to hard disk drive a cluster is a managed section by the computer operating system that change sizes depending upon the size of hard disk drive . DATA BASE : It is general collection of data shared by a variety of users. In particular it has following features. Redundancy of data is eliminated. This is an important point in Computer Terminology in exam point of view. *. Data is independent of any programme. *. Data is usable by many users, simultaneously. DEBUGGING: It is a process of riding a computer programme of logical or syntactical errors. DIGITAL ZOOM : It is a magnification of an image by internal image processing algorithm. EBCDIC : Extended Binary Coded Decimal Interchange Code developed by IBM is a type of coding method. ECHELON : It is a code name of a global spy system designed to capture and analyze virtually every phone call,fax, E-mail ,telex message.
  • 2. EDGE: Enhanced Data Rates for Global Evolution is a radio based high speed mobile data standard. It allows the data transmission speeds upto 384 kbps to be achieved when all eight time slots are used. FIREWALL : It is a software /hardware that limits outside network access to a computer or computer hardware that permanently resolve the issue. GATE WAY : It refers to a network . A gateway is an address used as entry point. GUI : Graphical User Interface uses icons and menus to carry out commands such as opening files ,delete files , move files etc.. Internet Group Management Protocol : It is an extension of the IP Protocol and a standard for IP ( Internet Provider) multicasting. Kernel : It refers to a computer co-operating system ,which is the first section of the operating system to load into memory. LAWN : Local Area Wireless Network which utilizes radio transmissions to communicate with other computers or network devices. MICROPROCCESOR: A Single chip based device which is a complete processor in itself and is capable of performing arithmatic & logical operations. MARKUP LANGUAGE: It consists of easily understood names ,keywords, tags that helps format overall view of a page and the data it contains. XML is also called meta language. NIBBLE : Combination of four bits . PROTOCOL : It is also known as access method,it is a standard used to define a method of exchanging data over a computer network or through the internet. RTOS : Real Time Operating System is an operating system that guarantees a certain capability with in a specified time constrained. RATS /BACK DOORS : Remote Administration Tools is a method of controllilng remote machines using the IP Address. SMART : Self Monitoring Analysis & Reporting Technology is basically a diagnostic method. SMTP : Simple Mail Transfer Protocol is a communication protocol that sends e-mail messages from one server to another. TFTP : Trivial File Transfer Protocol is a simple file transfer protocol and is generally used to boot disk work stations or load configuration files to network devices such as routers. SWAN : State Wide Area Network : It is a minimum bandwidth of twwo Mbps to provide block level connectivity within a state for e-governance. WAP : Wireless Application Protocol is a specification for a set of communication protocol used to allow wireless devices to access the internet and other utilities .
  • 3. WIZARD : It is available with other software programmes or hardware devices. WLL : Wireless Local Loop : WLL service is based on CDMA technology and applicable for limited mobility system . It carries both data and voice with 40-60 kbps data speed & 144 kbps maximum data speed . Clicking on an icon with the mouse is a form of giving an instruction to the computer. Answer: True Output devices store instructions or data that the CPU processes. Answer: False (memory) The CPU and memory are located on a special circuit board in the system unit called the motherboard. Answer: True Nanostructures represent the smallest human-made structures that can be built. Answer: True The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a few programs as quickly as possible, whereas mainframes are designed to handle many programs running at the same time (but at a slower pace). Answer: True Being computer fluent means that you should be able to build a computer yourself. Answer: False Embedded computers are self-contained computer devices that have their own programming and do not receive input. Answer: True A Web browser is a special device that is installed in your computer that allows it to communicate with other devices on a network. Answer: False (network adapter) With a wireless network, it is easier to relocate devices. Answer: True The most common type of memory that the computer uses to process data is ROM. Answer: False (RAM) Currently, the performance of tasks by robots is based on preprogrammed algorithms. Answer: True Data can be a number, a word, a picture, or a sound. Answer: True
  • 4. Strictly defined, a computer is a data processing device. Answer: True The discrepancy between the â€oehavesâ€0 and â€oehave-notsâ€0 with regard to computer technology is commonly referred to as the digital society. Answer: False (digital divide) One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to avoid viruses, the programs that pose threats to computer security. Answer: True Trend-spotting programs, developed for business, have been used to predict criminal activity. Answer: True Employers do not have the right to monitor e-mail and network traffic on employee systems used at work. Answer: False Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation. Answer: Mac The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input/output devices. Answer: operating system The type of operating system software you use depends on your computers€™s ____________. Answer: platform ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet. Answer: Application ____________are the fastest and most expensive computers. Answer: Supercomputers A ____________ is approximately 1,000 bytes. Answer: kilobyte Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________. Answer: instructions A computer gathers data, processes it, outputs the data or information, and ____________ the data or information. Answer: stores
  • 5. The binary language consists of two digits: ____________ and ____________. Answer: 0 and 1 A string of ____________ 0s and 1s is called a byte. Answer: eight (8) The devices you use to enter data into a computer system are known as ____________ devices. Answer: input The devices on a computer system that let you see the processed information are known as ____________ devices. Answer: output ____________ is the set of computer instructions or programs that enables the hardware to perform different tasks. Answer: Software When you connect to the ____________, your computer is communicating with a server at your Internet service provider (ISP). Answer: Internet ____________ are computers that excel at executing many different computer programs at the same time. Answer: Mainframes ____________is the application of computer systems and techniques to gather legal evidence. Answer: Computer forensics ____________ is the science that attempts to create machines that will emulate the human thought process. Answer: Artificial intelligence (AI) Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as an operating system. Answer: Microsoft Windows A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns. Answer: data mining You would use ____________ software to create spreadsheets, type documents, and edit photos. Answer: application ____________ are computers that support hundreds or thousands of users simultaneously. Answer: Mainframes Hard disk drives and CD drives are examples of ____________ devices. Answer: storage
  • 6. ____________ is the term given to the act of stealing someone’s identity and ruining their credit rating. Answer: Identity theft Surgeons are using ____________ to guide robots to perform delicate surgery. Answer: computers Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans. Answer: simulators AAL- ATM Adaption Layer ACL- Access Control List ADO- ActiveX Data Objects ADSL-Asymmetric Digital Subscriber Line ADT- Abstract Data Type ALGOL- Algorithmic Language ALU- Arithmetic and Logical Unit ANSI- American National Standard Institute ARP- Address Resolution Protocol ARPA- Address and Routing Parameter Area ARPA- Advanced Research Projects Agency ARPANET- Advanced Research Projects Agency Network AS- Access Server ASCII- American Standard Code for Information Interchange ASM- Algorithmic State Machine ASP- Active Server Pages ASP- Application Server Provider AT- Access Time AT- Active Terminology ATM- Asynchronous Transfer Mode
  • 7. AVC- Advanced Video Coding AVI- Audio Video Interleaved AWT- Abstract Window Toolkit BAL- Basic Assembly Language BASIC- Beginners All Purpose Symbolic Instruction Code BCD- Binary Coded Decimal BCNF- Boyce-codd Normal Form BER- Bit Error Rate BIN- Binary BINAC- Binary Automatic Computer BIOS- Basic Input Output System BLOB- Binary Large Object BNC- Bayonet Neill-Concelman BPS- Bits per Second CAD- Computer Aided Design CAM- Computer Aided Manufacturing CAT- Computer Aided Translation CASE- Computer-Aided Software Engineering CDMA- Code Division Multiple Access CD-ROM- CD Read Only Memory CIFS- Common Internet File System CISC- Complex Instruction Set Computer CLR- Common Language Runtime CMOS- Complementary Metal-Oxide Semiconductor COBOL- Common Business Oriented Language COM- Component Object Model
  • 8. CORBA- Common Object Request Broker Architecture CPS- Characters per Second CPU- Central Processing Unit CRC- Cyclic Redundancy Check DAC- Digital to Analog Converter DAO- Data Access Objects DAP- Directory access protocol DBA- Data Base Administrator DCCP- Datagram Congestion Control Protocol DCL- Data Control Language DCOM- Distributed Component Object Model DDE- Dynamic Data Exchange DES- Data Encryption Standard DFD- Data Flow Diagram DFS- Distributed File System DHCP- Dynamic Host Configuration Protocol DHTML- Dynamic Hyper Text Markup Language DMA- Direct Memory Access DML- Data Manipulation Language DNS- Domain Name System DOM- Document Object Model DoS- Denial of Service DRAM- Dynamic Random Access Memory DSDL- Document Schema Definition Languages DSL- Digital Subscriber Line DSL- Domain Specific Language
  • 9. DVD- Digital Video Disc DVD-ROM – DVD Read Only Memory DVI- Digital Video Interface DVR- Digital Video Recorder EAI- Extensible Authentication Protocol EBML- Extensible Binary Meta Language EEPROM- Electronically Erasable Programmable Read Only Memory EFI- Extensible Firmware Interface ELM- Electronic Mail EOF- End of File EOL- End of Line EUC- Extended UNIX Code EXT- Extended File System FAP- FORTRAN Assembly Program FAT- File Allocation Table FAQ- Frequently Asked Questions FDD- Floppy Disk Drive FDDI- Fiber Distributed Data Interface FDMA- Frequency Division Multiple Access FEC- Forward Error Correction FHS- File system Hierarchy Standard FIFO- First in First out FORTRAN- Formula Translation FPS- Floating Point System FSM- Finite State Machine FTTP- Fiber to the Premises
  • 10. FTP- File Transfer Protocol FXP- File Exchange Protocol GB- Giga Byte GIF- Graphic Interchange Format GIGO- Garbage in Garbage Out GIMP- GNU Image Manipulation Program GML- Geography Markup Language GUI- Graphical User Interface GWT- Google Web Toolkit HBA- Host Bus Adaptor HDD- Hard Disk Drive HD DVD- High Definition DVD HDL- Hardware Description Language HID- Human Interface Device HP- Hewlett-Packard HPFS- High Performance File System HTM- Hierarchical Temporal Memory HTML- Hyper Text Markup language HTTP- Hyper Text Transfer Protocol Hz- Hertz IC- Integrated Circuit ICE- In circuit Emulator ICMP- Internet Control Message Protocol ICP- Internet Cache Protocol IDE- Integrated Development Environment IDL- Interface Definition Language
  • 11. IEEE- Institute of Electrical and Electronics Engineering IGRP- Integrated Gateway Routing Protocol IL- Intermediate Language IM- Instant Messenger IMAP- Internet Message Access Protocol IP- Internet Protocol IPC- Inter Process Communication IPL- Initial Program Load IPP- Internet Printing Protocol IPX- Internet Packet Exchange ISA- Instruction Set Architecture ISDN- Integrated Services Digital Network ISO- International Organization for Standardization ISP- Internet Service Provider J2EE- Java 2 Enterprise Edition J2SE- Java 2 standard Edition JDBC- Java Database Connectivity JDK- Java Development Kit JFC- Java Foundation Classes JMS- Java Message Service JNDI- Java Naming and Directory Interface JNI- Java Native Interface JPEG- Joint Photographic Experts Group JRE- Java Runtime Environment JS- Java Script JSP- Java Server Pages
  • 12. JVM- Java Virtual Machine KB- Kilo Byte KHz- Kilo Hertz KBPS- Kilo Bytes Per Second LAN- Local Area Network LCD- Liquid Crystal Display LCR- Least Cost Routing LED- Light Emitting Diode LIFO- Last in First Out LOC- Lines of Code MAC- Media Access Control MAN- Metropolitan Area Network MANET- Mobile Ad-Hoc Network MDA- Mail Delivery Agent MIB- Management Information Base MICR- Magnetic Ink Character Recognition MIDI- Musical Instrument Digital Interface MIMD- Multiple Instruction Multiple Data MIMO- Multiple Input Multiple Output MIPS- Million Instructions Per Second MOSFET- Metal-Oxide Semi-conductor Field Effect Transistor MPEG- Motion Pictures Expert Group MTA- Mail Transfer Agent MX- Mail Exchange NACK- Negative Acknowledgement NAT- Network Address Translation
  • 13. NFS- Network File System NOS- Network Operating System NUMA- Non-Uniform Memory Access NVR- Network Video Recorder NVRAM- Non-Volatile Random Access Memory OASIS- Organization for the advancement of Structured Information Standards ODBC- Open Data Base Connectivity OLAP- Online Analytical Processing OLE- Object Linking and Embedding OLTP- Online Transaction Processing OOP- Object Oriented Programming OPML- Outline Processor Markup Language ORB- Object Request Broker OSI- Open Systems Interconnection PAN- Personal Area Network PAP- Password Authentication Protocol PDA- Personal Digital Assistant PDF- Portable Document Format PERL- Practical Extraction and Reporting Language PHP- PHP-Hypertext Preprocessor PPI- Pixels per Inch PVR- Personal Video Recorder QA- Quality Assurance QOS- Quality of Service RAM- Random Access Memory RDBMS- Relational Data Base Connectivity / Relational Data Base Management System
  • 14. RDM- Relational Data Model RDS- Remote Data Service RIP- Routing Information Protocol RMI- Remote Method Invocationn ROM- Read Only Memory RPC- Remote Procedure Call
  • 15. 1. Which of the following is not related to a computer monitor? (a) VDU (b) Plasma Display (c) Pointing devices (d) CRT 2. ......... is an input device commonly available in laptops. (a) Trackball (b) Touchpad (c) Touch screen (d) Joystick 3. A temporary storage area attached to the CPU of the computer for input-output operations is a: (a) Register (b) Buffer (c) Channel (d) Core 4. Product of the data processing is: (a) Data (b) A computer (c) Software (d) Information 5. A collection of parallel lines that connects several devices in a computer is called: (a) Bus (b) Link (c) Bidirectional wires (d) Cables 6. Software installed to help prevent hacking is called: (a) System software (b) Antivirus software (c) Firewall software (d) Application software 7. Encryption of data means that: (a) Data cannot be sent over the internet (b) Data is encoded so it cannot be read without decoding software (c) Data is kept locked in special room (d) Data has been hacked into 8. A person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure is: (a) Hacker (b) Cracker
  • 16. (c) Programmer (d) None of these 9. Linux is a ………….. (a) Database program (b) Application program (c) Operating system (d) None of these 10........... is a legal monopoly granted for a limited time to the owner of an invention? (a) Trade secrets (b) Copyright (c) Trademark (d) Patent 11. This is based on individual who knows how to use information and communication technologies and those who do not? (a) Access (b) Usage (c) Usage Quality (d) None of the above 12. The kind of crime involves altering raw data just before a computer processes it and then changing it back after the processing is completed: (a) Data diddling (b) Data tampering (c) Salami attacks (d) None of the above 13. Information Technology Act in India was amended in: (a) 2000 (b) 2004 (c) 2008 (d) 2010 14. Which of the following is not a wireless communication device? (a) Blue tooth (b) GPS (c) Infra red communication (d) None of these 15. Computer to computer exchange of business documents is done through? (a) EDI (b) ERP (c) CAM (d) CAD 16. Who started Free Software Foundation? (a) Linus Torvald (b) Richard Stallman
  • 17. (c) Bill Gates (d) GNU 17. The resolution of a monitor is governed by the: (a) Size of the screen (b) Cost of the monitor (c) Contrast of the pixels on the screen (d) Number of pixels 18. LCD stands for : (A) Liquid Crystal Display (B) Laser Crystal Display (C) Light Crystal Display (D) All of these (E) None of these 19. A Byte constitutes of : (A) 9 bits (B) 8 bits (C) 7 bits (D) 4 bits (E) None of these 20. Memory in a PC is addressable through : (A) Bits (B) Byte (C) Nibble (D) All of these (E) None of these 21. One Kilo Byte represents : (A) 1024 bytes (B) 1000 bytes (C) 100 bytes (D) 1064 bytes (E) None of these 22. RAM in its commercial forms are available as : (A) SIMM (B) DIMM (C) Both (A) & (B) (D) CPSB (E) None of these 23. Refresh Rate of monitor is measured in : (A) Hz (B) Meter (C) Volts (D) Amp. (E) None of these 24. Such types of printers, in which the printing head contacts with the paper in printing process, are called as : (A) Impact Printer (B) Non-Impact Printer (C) Laser Printer (D) All of these (E) None of these 25. Which of the following meaning is used between CPU & RAM to speed up the processing power of a CPU? (A) Virtual Memory (B) DRAM (C) Flash Memory (D) Cache Memory (E) None of these 26. Which of the following is lowest in memory hierarchy? (A) Cache memory (B) Secondary memory
  • 18. (C) Registers (D) RAM (E) None of these 27. Which of the following is an input device? (A) Keyboard (B) VDU (C) Both (A) & (B) (D) Dvu (E) None of these 28. Basic building block for a digital circuit is : (A) Word (B) Logic Gate (C) Processor (D) BUS (E) None of these 29. Which of the following is a logic gate? (A) AND (B) OR (C) CPU (D) Both (A) & (B) (E) None of these 30. ASCII stands for : (A) American Standard Code for Institute Interchange (B) American Standard Code for Information Interchange (C) American Standard Code for Information Institute (D) All of these (E) None of These 31. Which of the following requires refreshing during retaining the data? (A) DRAM (B) SRAM (C) Virtual Memory (D) FDD (E) None of these 32. RAM stands for : (A) Read Access Memory (B) Random Access Memory (C) Random Assigned Memory (D) All of these (E) None of these 33. The base of binary number is : (A) 2 (B) 16 (C) 8 (D) 10 (E) None of these 34. CRT stands for : (A) Character Ray Tube (B) Cathode Ray Tube (C) Colour Ray Tube (D) All of the above (E) None of these 35. Which of the following is a GUI device : (A) Keyboard (B) Mouse (C) OMR (D) All of these (E) None of these 36. Which of the following is a type of optical media? (A) FDD (B) HDD (C) CD (D) Magnetic Tape
  • 19. (E) None of these 37. DVD stands for : (A) Digital Video Disk (B) Digital Versatile Disk (C) Both (A) & (B) (D) All of these (E) None of these 38. Which of the following is an input device? (A) VDU (B) Printer (C) Plotter (D) MICR (E) None of these 39. Identify the odd one : (A) Storage tape memory (B) Magnetic disc memory (C) Optical disc memory (D) Read only memory (E) None of these 40. Nibble describes a bits combination of : (A) 5 bits (B) 6 bits (C) 7 bits (D) 4 bits (E) None of these 41. Data in RAM are : (A) Volatile in nature (B) Non-volatile in nature (C) Both (A) & (B) (D) All of these (E) None of these 42. BIOS stands for : (A) Basic Input Output System (B) Basic Instruction Output System (C) Basic Interface Output System (D) All of these (E) None of these 43. What is the process of copying software programs from secondary storage media to the hard disk called? (A) Configuration (B) Download (C) Storage (D) Upload (E) Installation 44. When the pointer is positioned on a _____, it is shaped like a hand. (A) Grammar error (B) Formatting error (C) Screen Tip (D) Spelling error
  • 20. (E) Hyperlink 45. Personal computers can be connected together to form a- (A) server (B) Supercomputer (C) Network (D) Enterprise (E) None of these 46. A _____ is the term used when a search engine returns a Web page that matches the search criteria. (A) Blog (B) Hit (C) Link (D) View (E) Success 47. _____are words that a programming language has set aside for its own use. (A) Control words (B) Control structures (C) Reserved words (D) Reserved keys (E) None of these 48. Mobile Commerce is best described as- (A) The use of Kiosks in marketing (B) Transporting products (C) Buying and selling goods/ services through wireless hand-held devices (D) Using notebook PC’s in marketing (E) None of the above 49. Which of the following controls the manner of interaction between the user and the operating system? (A) Language translator (B) Platform (C) User interface (D) Icon
  • 21. (E) None of these 50. You can keep your personal files/folders in (A) My Folder (B) My Documents (C) My Files (D) My Text (E) My Collection 51. Three types of compact disks include CD-ROM, CD-R, and (A) CD-W (B) CD-RAM (C) CD-DVD (D) CD-RW (E) None of these 52. All computers must have (A) Â A word processing software (B) An operating system (C) An attached printer (D) A virus checking program (E) None of these 53. Collecting personal information and effectively posing as another individual is known as (A) Spooling (B) Spoofing (C) Hacking (D) Identity theft (E) None of these 54. To change selected text to all capital Letters, click the change case buttons, then click (A) UPPERCASE (B) UPPER ALL (C) CAPS LOCK (D) Lock Upper
  • 22. (E) Large Size 55. A person who used his or her expertise to gain access to other people’s computers to get information illegally or to do (A) Hacker (B) Analyst (C) Instant messenger (D) Programmer (E) Spammer 56. A device that connects to a network without the use of cables is said to be (A) Distributed (B) Free (C) Centralized (D) Open Source (E) None of these 57. Reusable optical storage will usually have the acronym (A) CD (B) DVD (C) ROM (D) RW (E) ROS 58. The most common type of storage devices are: (A) Persistent (B) Optical (C) Magnetic (D) Flash (E) Steel 59. Codes consisting of lines of varying widths or lengths that are computer-readable are known as (A) An ASCII code (B) A magnetic tape (C) An OCR scanner (D) A bar code
  • 23. (E) None of these 60. A Website’s main page is called its (A) Home Page (B) Browser Page (C) Search Page (D) Bookmark (E) None of these 61. Part number, part description, and number of parts ordered are examples of (A) Control (B) Output (C) Processing (D) Feedback (E) Input 62. To access properties of an object, the mouse technique to use is (A) Dragging (B) Dropping (C) Right-clicking (D) Shift-clicking (E) None of these 63. Computers use the number system to store data and perform calculations. (A) Binary (B) Octal (C) Decimal (D) Hexadecimal (E) None of these 64. _________are attempts by individuals to obtain confidential information from you by falsifying their identity. (A) Phishing trips (B) Computer viruses (C) Spyware scams (D) Viruses
  • 24. (E) Phishing scams 65. Why is it unethical to share copyrighted files with your friends ? (A) It is not unethical, because it is legal. (B) It is unethical because the files are being given for free. (C) Sharing copyrighted files without permission breaks copyright laws. (D) It is not unethical because the files are being given for free. (E) It is not unethical – anyone can access a computer. 66. Which of the following can be used to select the entire document ? (A) CTRL+A (B) ALT+F5 (C) SHIFT+A (D) CTRL+K (E) CTRL+H 67. To instruct Word to fit the width of a column to the contents of a table automatically, click the button and then point to Auto Fit Contents. (A) Fit to Form (B) Format (C) Auto size (D) Contents (E) Auto Fit 68. The simultaneous processing of two or more programs by multiple processors is (A) Multiprogramming (B) Multitasking (C) Time-sharing (D) Multiprocessing (E) None of these 69. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is (A) Memory-only (B) Write-only (C) Once-only (D) Run-only
  • 25. (E) Read-only 70. What is the permanent memory built into your computer called ? (A) RAM (B) Floppy (C) CPU (D) CD-ROM (E) ROM 71. The default view in Excel is view. (A) Work (B) Auto (C) Normal (D) Roman (E) None of these 72. What displays the contents of the active cell in Excel? (A) Name box (B) Row Headings (C) Formula bar (D) Task pane (E) None of these 73. In Word, you can force a page break (A) By positioning your cursor at the appropriate place and pressing the Fl key (B) By positioning your cursor at the appropriate place and pressing Ctrl+Enter (C) By using the Insert/Section Break (D) By changing the font size of your document (E) None of these 74. Grouping and processing all of a firm’s transactions at one time is called (A) A database management system (B) Batch processing (C) A real-time system (D) An on-line system
  • 26. (E) None of these 75. Help Menu is available at which button ? (A) End (B) Start (C) Turnoff (D) Restart (E) Reboot 76. You can keep your personal files/ folders in (A) My Folder (B) My Documents (C) My Files (D) My Text (E) None of these 77. A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a(n) (A) Supercomputer (B) Minicomputer (C) Laptop (D) Server (E) None of these 78. When you save to this, your data will remain intact even when the computer is turned off. (A) RAM (B) Motherboard (C) Secondary storage device (D) Primary storage device (E) None of these 79. The folder retains copies of messages that you have started but are not yet ready to send. (A) Drafts (B) Outbox (C) Address Book (D) Sent Items
  • 27. (E) Inbox 80. You can a search by providing more information the search engine can use to select a smaller, more useful set of results. (A) Refine (B) Expand (C) Load (D) Query (E) Slowdown 81. The contents of are lost when the computer turns off. (A) Storage (B) Input (C) Output (D) Memory (E) None of these 82. The enables you to simultaneously keep multiple Web pages open in one browser window. (a) Tab box (B) Pop-up helper (C) Tab row (D) Address bar (E) Esc key 83. A DVD is an example of a(n) (A) Hard disk (B) Optical disc (C) Output device (D) Solid-state storage device (E) None of these 84. What are the two parts of an e-mail address? (A) User name and street address (B) Legal name and phone number (C) User name and domain name (D) Initials and password
  • 28. (E) User name and recipient name 85. If you wish to extend the length of the network without having the signal degrade, you would use a (A) Resonance (B) Router (C) Gateway (D) Switch (E) Repeater 86. A repair for a known software bug, usually available at no charge on the internet, is called (A) version (B) Patch (C) Tutorial (D) FAQ (E) Rectifier 87. URL stands for (A) Universal Research List (B) Universal Resource List (C) Uniform Research List (D) Uniform Research Locator (E) Uniform Resource Locator 88. When data changes in multiple lists and all lists are not updated, this causes (A) Data redundancy (B) Information overload (C) Duplicate data (D) Data inconsistency (E) Data repetition 89. What is a backup? (A) Restoring the information backup (B) An exact copy of a system information (C) The ability to get a system up and running in the event of a system crash or failure (D) All of these
  • 29. (E) None of these 90. The Internet is (A) A large network of networks (B) An internal communication system for a business (C) A communication system for the Indian government (D) A communication system for some states of India (E) A communication system for some cities of India 91. Computers that are portable and convenient for users who travel are known as (A) Supercomputers (B) Planners (C) Minicomputers (D) File servers (E) Laptops 92. What is the storage area for e-mail messages called? (A) A folder (B) A mail box (C) A directory (D) The hard disk (E) None of these 93.The operating system does all of the following EXCEPT: 1). provide a way for the user to interact with the computer. 2). manage the central processing unit (CPU). 3 ). manage memory and storage. 4 ). enable users to perform a specific task such as document editing. 94.To move forward through the tabs 1). CTRL+TAB 2 ). CTRL+SHIFT+TAB 3 ). SHIFT+TAB 4 ). None of these 95.Which of the following is a valid IP address? 1). 192.168.111.1111 2 ). 192.168.1.1 3 ). 192.168.900.1 4 ). 192.900.168.1 96.The ability to recover and read deleted or damaged files from a criminals computer is an example of
  • 30. a law enforcement specialty called: 1). simulation 2 ). animation 3 ). robotics 4 ). computer forensics 97.Allocation of a resources in a time dependent manner to several program simultaneously called 1). multi user 2 ). multi tasking 3 ). time sharing 4 ). None of these 98.Which of the following is an example of a binary number? 1). A1BCD1 2 ). 23456 3 ). 005 4 ). 100101 99.____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer. 1). The operating system 2 ). The motherboard 3 ). The platform 4 ). Application software 100.What is the shortcut key of printing a document for computer having windows? 1). Shift + P 2 ). Alt + P 3 ). Ctrl + P 4 ). Ctrl + Shift + P 101.Which of the following are true about firewalls? 1). Follows a set of rules 2 ). Can be either a hardware or software device 3 ). Filters network traffic 4 ). All the above 102.In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of: 1). eight bytes. 2 ). eight characters. 3 ). eight bits. 4 ). eight kilobytes. 103.Verification of a login name and password is known as: 1). configuration 2 ). accessibility 3 ). authentication 4 ). logging in 104.Which of the following is a correct format of Email address? 1). sales@website@info 2 ). sales@website.info 3 ). saleswebsite.info 4 ). sales.website.info
  • 31. 105.The difference between people with access to computers and the Internet and those without this access is known as the: 1). digital divide. 2 ). Internet divide. 3 ). Web divide. 4 ). cyberway divide. 106.What is e-commerce? 1). Buying and selling computer products 2 ). Buying and selling products and services not found in stores 3 ). Buying and selling international goods 4 ). Buying and selling products and services over the Internet 107.'Blue tooth' technology allows 1). Satellite communication 2 ). Wireless communication between equipments 3 ). Signal transmission on mobile phones only 4 ). Landline phone to mobile phone communication 108.Java is a 1). Operating System 2 ). Compiler 3 ). Input Device 4 ). Programming Language 109.The basic unit of a worksheet into which you enter data in Excel is called a 1). cell 2 ). table 3 ). box 4 ). column 110.The set of instructions that tells the computer what to do is 1). Softcopy 2 ). Software 3 ). Hardware 4 ). Hardcopy 111.What are the four things needed to connect to the Internet? 1). Monitor, keyboard, mouse, modem 2 ). Telephone line, PDA, modem and computer 3 ). Telephone line, modem, computer, and an ISP 4 ). Modem, computer, PDA and ISP 112.What is the commonly used unit for measuring the sped of data transmission? 1). Mega Hertz 2 ). Characters per second 3 ). Nano seconds 4 ). Bits per second 113.Word processing, spreadsheet, and photo-editing are examples of: 1). application software. 2 ). system software. 3 ). operating system software. 4 ). platform software. 114.Which of the following stores more data? 1). DVD 2 ). CD ROM
  • 32. 3 ). Floppy Disk 4 ). CD RW 115.The base of the hexadecimal number system is 1). 2 2 ). 8 3 ). 10 4 ). 16 116.The Operating System Manages 1). Processes 2 ). Memory 3 ). Disks and I/O devices 4 ). All of the above 117.____________ is the ability of an operating system to control the activities of multiple programs at the same time. 1). Streamlining 2 ). Multiuser 3 ). Multitasking 4 ). Simulcasting 118.What does HTTP stands for? 1). Head Tail Transfer Protocol 2 ). Hypertext Transfer Protocol 3 ). Hypertext Transfer Plot 4 ). Hypertext Transfer Plotter 119.____________ is data that has been organized or presented in a meaningful way. 1). A process 2 ). Information 3 ). Software 4 ). Storage 120.Computer software includes 1). Packaged programs 2 ). Application programs 3 ). Operating system programs 4 ). All of these 121.Data that are accumulated and processed in group called 1). Group processing 2 ). Batch Processing 3 ). Time sharing 4 ). None of these.
  • 33. 123.Keyboard Shortcuts (Microsoft Windows) 1. CTRL+C (Copy) 2. CTRL+X (Cut) 3. CTRL+V (Paste) 4. CTRL+Z (Undo) 5. DELETE (Delete) 6. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin) 7. CTRL while dragging an item (Copy the selected item) 8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item) 9. F2 key (Rename the selected item) 10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word) 11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word) 12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph) 13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph) 14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text) SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document) 15. CTRL+A (Select all) 16. F3 key (Search for a file or a folder) 17. ALT+ENTER (View the properties for the selected item) 18. ALT+F4 (Close the active item, or quit the active program) 19. ALT+ENTER (Display the properties of the selected object) 20. ALT+SPACEBAR (Open the shortcut menu for the active window) 21. CTRL+F4 (Close the active document in programs that enable you to have multiple documents opensimultaneously) 22. ALT+TAB (Switch between the open items) 23. ALT+ESC (Cycle through items in the order that they had been opened) 24. F6 key (Cycle through the screen elements in a window or on the desktop) 25. F4 key (Display the Address bar list in My Computer or Windows Explorer) 26. SHIFT+F10 (Display the shortcut menu for the selected item) 27. ALT+SPACEBAR (Display the System menu for the active window) 28. CTRL+ESC (Display the Start menu) 29. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a command name on an open menu (Perform the corresponding command) 30. F10 key (Activate the menu bar in the active program) 31. RIGHT ARROW (Open the next menu to the right, or open a submenu) 32. LEFT ARROW (Open the next menu to the left, or close a submenu) 33. F5 key (Update the active window) 34. BACKSPACE (View the folder onelevel up in My Computer or Windows Explorer) 35. ESC (Cancel the current task) 36. SHIFT when you insert a CD-ROMinto the CD-ROM drive (Prevent the CD-ROM from automatically playing) 124.Dialog Box - Keyboard Shortcuts 1. CTRL+TAB (Move forward through the tabs) 2. CTRL+SHIFT+TAB (Move backward through the tabs) 3. TAB (Move forward through the options)
  • 34. 4. SHIFT+TAB (Move backward through the options) 5. ALT+Underlined letter (Perform the corresponding command or select the corresponding option) 6. ENTER (Perform the command for the active option or button) 7. SPACEBAR (Select or clear the check box if the active option is a check box) 8. Arrow keys (Select a button if the active option is a group of option buttons) 9. F1 key (Display Help) 10. F4 key (Display the items in the active list) 11. BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box) 125.Microsoft Natural Keyboard Shortcuts 1. Windows Logo (Display or hide the Start menu) 2. Windows Logo+BREAK (Display the System Properties dialog box) 3. Windows Logo+D (Display the desktop) 4. Windows Logo+M (Minimize all of the windows) 5. Windows Logo+SHIFT+M (Restorethe minimized windows) 6. Windows Logo+E (Open My Computer) 7. Windows Logo+F (Search for a file or a folder) 8. CTRL+Windows Logo+F (Search for computers) 9. Windows Logo+F1 (Display Windows Help) 10. Windows Logo+ L (Lock the keyboard) 11. Windows Logo+R (Open the Run dialog box) 12. Windows Logo+U (Open Utility Manager) 13. Accessibility Keyboard Shortcuts 14. Right SHIFT for eight seconds (Switch FilterKeys either on or off) 15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off) 16. Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off) 17. SHIFT five times (Switch the StickyKeys either on or off) 18. NUM LOCK for five seconds (Switch the ToggleKeys either on or off) 19. Windows Logo +U (Open Utility Manager) 20. Windows Explorer Keyboard Shortcuts 21. END (Display the bottom of the active window) 22. HOME (Display the top of the active window) 23. NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder) 24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder) 25. NUM LOCK+Minus sign (-) (Collapse the selected folder) 26. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder) 27. RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder) Shortcut Keys for Character Map After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
  • 35. * HTTP - Hyper Text Transfer Protocol. * HTTPS - Hyper Text Transfer Protocol Secure. * IP - Internet Protocol. * URL - Uniform Resource Locator. * USB - Universal Serial Bus. * VIRUS - Vital Information Resource UnderSeized. * 3G -3rd Generation. * GSM - Global System for Mobile Communication. * CDMA - Code Divison Multiple Access. * UMTS - Universal Mobile Telecommunication System. * SIM - Subscriber Identity Module . * AVI = Audio Video Interleave * RTS = Real Time Streaming * SIS = Symbian OS Installer File * AMR = Adaptive Multi-Rate Codec * JAD = Java Application Descriptor * JAR = Java Archive * JAD = Java Application Descriptor * 3GPP = 3rd Generation Partnership Project * 3GP = 3rd Generation Project * MP3 = MPEG player lll * MP4 = MPEG-4 video file *AAC = Advanced Audio Coding * GIF= Graphic Interchangeable Format * JPEG = Joint Photographic Expert Group * BMP = Bitmap * SWF = Shock Wave Flash * WMV = Windows Media Video * WMA = Windows Media Audio * WAV = Waveform Audio * PNG = Portable Network Graphics * DOC = Document (Microsoft Corporation) * PDF = Portable Document Format * M3G = Mobile 3D Graphics * M4A = MPEG-4 Audio File * NTH = Nokia Theme (series 40) * THM = Themes (Sony Ericsson) * MMF = Synthetic Music Mobile Application File * NRT = Nokia Ringtone * XMF = Extensible Music File * WBMP = Wireless Bitmap Image * DVX = DivX Video * HTML = Hyper Text Markup Language * WML = Wireless Markup Language
  • 36. * CD -Compact Disk. * DVD - Digital Versatile Disk. *CRT - Cathode Ray Tube. * DAT - Digital Audio Tape. * DOS - Disk Operating System. * GUI -Graphical User Interface. * HTTP - Hyper Text Transfer Protocol. * IP - Internet Protocol. * ISP - Internet Service Provider. * TCP - Transmission Control Protocol. * UPS - Uninterruptible Power Supply. * HSDPA - High Speed Downlink Packet Access. * EDGE - Enhanced Data Rate for GSM [GlobalSystem for Mobile Communication] Evolution. * VHF - Very High Frequency. * UHF - Ultra High Frequency. * GPRS - General Packet Radio Service. * WAP - Wireless Application Protocol. * TCP - Transmission Control Protocol . * ARPANET - Advanced Research Project Agency Network. * IBM - International Business Machines. * HP - Hewlett Packard. *AM/FM - Amplitude/ Frequency Modulation. * WLAN - Wireless Local Area Network 126.Computer uses the……….number system to store data and perform calculations. 1. Binary 2. Octal bar 3. Decimal 4. Hexadecimal 127.Why is it unethical to share copyrighted files with your friends ? 1. It is not unethical, because it is legal 2. It is not unethical, because it is legal 3. Sharing copyrighted files without permission breaks copyright laws. 4. It is not unethical because the files are being given for free. 128.To instruct Word to fit the width of a column to the contents of a table automatically. 1. Fit to Form 2. Format 3. Autosize 4. AutoFit
  • 37. 129.Which of the following can be used to select the entire document ? 1. CTRL+A 2. ALT+F5 3. SHIFT+A 4. CTRL+K 130.A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is– 1. Memory Only 2. Write Only 3. Read only 4. Run Only 131. All of the following statements concerning windows are true EXCEPT: 1). windows are an example of a command-driven environment. 2 ). windows can be resized and repositioned on the desktop. 3 ). more than one window can be open at a time. 4 ). toolbars and scrollbars are features of windows. 132.____ is a collection of raw, unprocessed facts, figures, and symbols. A: Hardware B: Software C: Information D: Data 133.The metal or plastic case that holds all the physical parts of the computer is the: A. system unit. B. CPU. C. mainframe. D. platform. Answer: A 134.The binary language consists of ____________ digit(s). A. 8 B. 2 C. 1,000
  • 38. D. 1 Answer: B 135.A byte can hold one ____________ of data. A. bit B. binary digit C. character D. kilobyte Answer: C 136. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer. A. The platform B. The operating system C. Application software D. The motherboard Answer: B 137.The operating system is the most common type of ____________ software. A. communication B. application C. system D. word-processing software Answer: C 138. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat. A. Servers B. Embedded computers C. Robotic computers D. Mainframes Answer: B 139.The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called: A. instructions. B. the operating system. C. application software. D. the system unit. Answer: A 140.The two broad categories of software are: A. word processing and spreadsheet. B. transaction and application. C. Windows and Mac OS.
  • 39. D. system and application. Answer: D 141.Smaller and less expensive PC-based servers are replacing ____________ in many businesses. A. supercomputers B. clients C. laptops D. mainframes Answer: D 142.____________ are specially designed computers that perform complex calculations extremely rapidly. A. Servers B. Supercomputers C. Laptops D. Mainframes Answer: B 143.DSL is an example of a(n) ____________ connection. A. network B. wireless C. slow D. broadband Answer: D 144.The difference between people with access to computers and the Internet and those without this access is known as the: A. digital divide. B. Internet divide. C. Web divide. D. broadband divide. Answer: A 145.____________ is the science revolving around the use of nano structures to build devices on an extremely small scale. A. Nanotechnology B. Micro-technology C. Computer forensics D. Artificial intelligence Answer: A 146.____________ bits equal one byte. A. Eight B. Two C. One thousand
  • 40. D. One million Answer: A 147.The CPU and memory are located on the: A. expansion board. B. motherboard. C. storage device. D. output device. Answer: B 148.Word processing, spreadsheet, and photo-editing are examples of: A. application software. B. system software. C. operating system software. D. platform software. Answer: A 149. ____________ is a set of computer programs used on a computer to help perform tasks. A. An instruction B. Software C. Memory D. A processor Answer: B 150.System software is the set of programs that enables your computers hardware devices and ____________ software to work together. A. management B. processing C. utility D. application Answer: D 151.The PC (personal computer) and the Apple Macintosh are examples of two different: A. platforms. B. applications. C. programs. D. storage devices. Answer: A 152.Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems. A. languages B. methods C. CPUs D. storage devices
  • 41. Answer: C 153.Servers are computers that provide resources to other computers connected to a: A. network. B. mainframe. C. supercomputer. D. client. Answer: A 154.A ____________ is approximately a million bytes. A. gigabyte B. kilobyte C. megabyte D. terabyte Answer: C 155.____________ is any part of the computer that you can physically touch. A. Hardware B. A device C. A peripheral D. An application Answer: A 156.The components that process data are located in the: A. input devices. B. output devices. C. system unit. D. storage component. Answer: C 157.All of the following are examples of input devices EXCEPT a: A. scanner. B. mouse. C. keyboard. D. printer. Answer: D 158.Which of the following is an example of an input device? A. scanner B. speaker C. CD D. printer Answer: A 159.All of the following are examples of storage devices EXCEPT: A. hard disk drives. B. printers. C. floppy disk drives. D. CD drives. Answer: B 160.The ____________, also called the â€oebrainsâ€0 of the computer, is responsible for processing data. A. motherboard B. memory C. RAM D. central processing unit (CPU) Answer: D 161.After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered: A. data. B. output. C. input.
  • 42. D. the process. Answer: B 162.Computers use the ____________ language to process data. A. processing B. kilobyte C. binary D. representational Answer: C 163.Computers process data into information by working exclusively with: A. multimedia. B. words. C. characters. D. numbers. Answer: D 164.In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of: A. eight bytes. B. eight kilobytes. C. eight characters. D. eight bits. Answer: D 165.The term bit is short for: A. megabyte. B. binary language. C. binary digit. D. binary number. Answer: C 166.A string of eight 0s and 1s is called a: A. megabyte. B. byte. C. kilobyte. D. gigabyte. Answer: B 167.A ____________ is approximately one billion bytes. A. kilobyte B. bit C. gigabyte
  • 43. D. megabyte Answer: C 168.Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as: A. robotics. B. computer forensics. C. simulation. D. forecasting. Answer: A 169.Technology no longer protected by copyright, available to everyone, is considered to be: A. proprietary. B. open. C. experimental. D. in the public domain. Answer: A 170. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers. A. Nanoscience B. Microelectrodes C. Computer forensics D. Artificial intelligence Answer: A 171. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do. A. Nanoscience B. Nanotechnology C. Simulation D. Artificial intelligence (AI) Answer: D 172. ____________ is data that has been organized or presented in a meaningful fashion. A. A process B. Software C. Storage D. Information Answer: D 173. The name for the way that computers manipulate data into information is called: A. programming. B. processing. C. storing. D. organizing. Answer: B
  • 44. 174. Computers gather data, which means that they allow users to ____________ data. A. present B. input C. output D. store Answer: B 175.All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity theft. Answer: B 176.A process known as ____________ is used by large retailers to study trends. A. data mining B. data selection C. POS D. data conversion Answer: A 177. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems. A. Data B. Point-of-sale (POS) C. Sales D. Query Answer: B 178.A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop. A. PSS B. POS C. inventory D. data mining Answer: A 179.The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called: A. robotics. B. simulation. C. computer forensics. D. animation. Answer: C
  • 45. 180.Which of the following is NOT one of the four major data processing functions of a computer? A. gathering data B. processing data into information C. analyzing the data or information D. storing the data or information Answer: C 181. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements. A. POS B. RFID C. PPS D. GPS Answer: B 182.A process known as ____________ is used by large retailers to study trends. A. data mining B. data selection C. POS D. data conversion Answer: A 183.All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity theft. Answer: B 184.Primary memory stores? a) Data alone b) Only programs c) Processed data d) All of the above Answer : D 185.Memory unit is one part of a) Central Processing Unit b) Control Unit c) External devices d) None of the above
  • 46. Answer : A 186.EPROM can be used for? a) Erasing the contents of ROM b) Rew7riting the contents of ROM c) Erasing and rewriting the contents of ROM d) None of the above Answer : C 187.Memory is made up of? a) Wires b) Circuits c) Several thousands of cells d) None of the above Answer : C 188.When you use mobile phone to purchase the product and transfer the money , the transaction is called a) M-Commerce/mobile banking b) E-Commerce c) Web transaction d) None of the above Answer : A 189.JPG is the extension for_ a) Microsoft Outlook Files b) Image Files c) Bitmap Graphic Files d)None of the above Files Answer : b 190.What is the extension for Microsoft Word Document a) DOC b)DOT c)DGN d)DWG Answer : A
  • 47. 191.What is primary object of an operating system? a) To activate the system b) To make the most efficient use of the computer hardware and other periphery- devices c) To save the power d) To help the Programming languages Answer : B 192.What is the main object of multiprogramming systems? a) To process all the jobs with high speed b) To use less memory space c) Execute more jobs in the same time period d) None of the above Answer : B 193.What is the extension for Microsoft Excel Workspace a) XLS b)XLT c)XLW d)XLL Answer : A 194.The basic operations performed by computer are? a) ASCII b) BCD c) Hollerith d) None of these Answer : a 195.ROM is composed of 1. Magnetic cores 2. Micro-processors 3. Photoelectric cells 4. Floppy disks 5. None of these Answer : 2 196.A device that can convert digital signal to analog signal is
  • 48. 1. A packet 2. Modem 3. Switch 4. Router 5. None of these Answer : 3 197.Internet-like networks within an enterprise known as 1. Intranet 2. Internet 3. Extranet 4. Network 5. None of these Answer : 1 198.File Transfer Protocol (FTP) is 1. Used to send email 2. Used to browse the Web 3. is part of Netscape 4. is a protocol for the transfer of files between computers 5. None of these Answer : 4 199.Which of the following types of channels moves data relatively slowly? 1. Narrowband channel 2. broadband channel 3. wideband channel 4. None of these Answer : 1 200.What does DOS stand for? 1. Disk Operation Sequence 2. Disk Operating System 3. Don't Operate System Answer : 2 201.Device which allows your computer to connect to another computer via a phone line
  • 49. 1. Server 2. Modem 3. Jeck Answer : 2 202.'Booting' the computer refers to: 1. Powering On the Computer 2. Powering Down the Computer 3. Closing Windows Answer : 1 203.The list of coded instructions is called 1. Computer program 2. Algorithm 3. Flowchart 4. Utility programs 5. None of the above Answer : 1 204.ASCII stands for 1. American standard code for information interchange 2. All purpose scientific code for information interchange 3. American security code for information interchange 4. American Scientific code for information interchange 5. None of the above Answer : 1 205.A language which is close to that used within the computer is 1. High-level language 2. Assembly language 3. Low-level language 4. All of the above
  • 50. Answer : 3 206.RAM is used as a short memory because it is 1. Has small capacity 2. Is very expensive 3. Volatile 4. None of the above Answer : 3 207.In UNIX, which command is used to sort the lines of data in a file in reverse order 1. sort 2. sh 3. st 4. sort –r Answer: 4 208.A single dimensional array is called 1. List 2. File 3. Martix 4. None of these Answer: 1 209.C, BASIC, COBOL, and Java are examples of ……… languages. 1. Computer 2. System Programming Language 3. Low Level Programming Language 4. High Level Programming Language Answer: 4
  • 51.
  • 52. 210.The earliest calculating devices are? · Calculators · Search engines · Transistors · ABACUS 211.What is the address given to a computer connected to a network called? · Process ID · URL · IP Address · None of the above 212.Algorithm and Flow chart are helpful to the programmer to? · Identify the base of a problem · To solve the problem · Specify the problem completely and clearly · No use 213.Which of the following have the faster access time? · Compact Disks · Semiconductor Memories · Magnetic Tapes · None of the above 214.What is the main object of multiprogramming systems? · To process all the jobs with high speed · To use less memory space · Execute many jobs in the same time period · None of the above
  • 53. 215..JPG is the extension for · Microsoft Outlook files · Image files · Bitmap Graphic files · None of the above 216.Computers manipulate data in many ways, and this manipulation is called · utilizing · batching · upgrading · processing 217.A result of a computer virus can not lead to ...... · Disk Crash · Mother Board Crash · Corruption o f program · Deletion of files 218.A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n) · Workstation · CPU · Magnetic disk · Integrated circuit · None of these 219.What is the main difference between a mainframe and a super computer ? · Super computer is much larger than mainframe computers · Super computers are much smaller than mainframe computers · Supercomputers are focused to execute few programs as fast as possible while mainframe uses its power to execute as many programs concurrently
  • 54. · Supercomputers are focused to execute as many programs as possible while mainframe uses its power to execute few programs as fast as possible · None of these 220.By default, your documents print in _ mode. · Landscape · Portrait · Page Setup · Print View · None of these 221. · Application · Peripheral · Programme · Software · None of these 222.Which of the following commands is given to reboot the computer ? · Ctrl + Alt + Del · Ctrl + Shift + ? · Ctrl + Shift + Del · Ctrl +Alt + shift · Ctrl + Alt + Tab 223.Such a pre-made document, which has coordinating font, layout and background, is- · Guide · Model · Ruler · Template · None of these 224.A computer cannot 'boot' if it does not have the-
  • 55. · Compiler · Loader · Operating System · Assembler · None of these 225.COBOL is widely used in __ applications · Commercial · Scientific · Space · Mathematical · None of these 226.A collection of interrelated files in a computer is a _ · file manager · field · record · database · None of these 227.Voice mail · is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet · permits users to converse in real time with each other via the computer while connected to the Internet · functions much like an answering machine, allowing callers to leave a voice message for the called party · involves using video and computer technology to conduct a meeting between participants at geographically separate locations · None of these 228.The number of distinct pixels in each dimension that can be displayed is called · Quality · Correctness · Resolution · Repetition · Projection
  • 56. 229.Which of the following device is used to send and receive information printed on a paper through telephone line? · Scanner · Printer · Fax Machine · e - mail · MICR 230.When computer processes the data, the intermediate data is stored in? · RAM · ROM · Hard Disk · CD · BIOS 231.The Process of sending data to a number of stations at the same time is known as ? · Broadcasting · Unicasting · Bicasting · Synchronization · None 232.What is the maximum storage capacity of a CD? · 700 MB · 1000 MB · 1024 MB · 2000 MB · 100 MB 233.Which of the following keyboard shortcuts is used to view the properties of a selected object? · Alt + Space · Ctrl + Space
  • 57. · Alt + Enter · Ctrl + Enter · None 234.Which of the following is true about URL ? · It is a web browser · It is a messenger · It is a mail service · It is a global address of documents and other resources on World Wide Web · It is same as internet 235.LinkedIn is a? · Search Engine · Web Browser · Social Networking Site · Name of Operating System · None of these 236.Which of the following best defines a compiler? · Translates machine language into a high level language · Translates one statement at a time as the program executes · Translates two statements at a time as the program executes · Produces object code · is less sophisticated than an assembler 237.Which of the following device is used to transmit data over telecommunication lines? · Drive · Folder · Modem · Platforms · 238.To restart the computer .... key/ button is used
  • 58. · Reset · Ctrl + Alt + del · Backspace + Ctrl · Ctrl + Del · None of these 239.Simultaneous execution of two or more instructions is called: · Multiprocessing · Sequential Access · Reduced Instruction Set Computing (RISC) · Disk Mirroring · None of these 240.Pick the odd one out: · Interpreter · Compiler · Operating System · Assembler · None of these 241.What is the symbol for inbox in mail? · Envelope · BOX · Upper Case 'I' · Lower case 'I' · None of these 242.An email address typically consists of user id followed by _ and the domain name. · @ · # · & · ∗ · None of these
  • 59. 243.Which of the following is a function of UPS? · It provides battery backup for limited time · It limits damage caused by fluctuating levels of electricity · It delivers electronic messages via a bus · It conducts a power-on self test or POST · None of these 244.The vast network of computers that connects millions of people all over the world is called · LAN · Web · Internet · Hypertext · None of these 245.A connection from one HTML document to another HTML document is called: · Connecting Link · Icon · Hyper Link · All of these · None of these 246.'FIND' option is available under which of the following menu? · File · Edit · View · Tools 247.Which of the following folder retains copies of mails that are started but are not yet ready to send? · Outbox · Inbox · Drafts · Sent Items
  • 60. 248.What is the full form of SQL, related to Database? · Structured Query Language · Structured Queue Language · Systematic Query Language · None 249.A network geometric arrangement in which a single connecting line is shared by a number of nodes is called– · Car Topology · Bus Topology · Truck Topology · All of the above · None of these 250.A user who typically has a notebook computer equipped with a modem, enabling her to transfer information between her computer and another computer, such as one at the main office, is considered a ____. A: home user B: small office/home office user C: mobile user D: power user 251.The keyboard, mouse, microphone, scanner, digital camera, and PC camera are all ____. A: input devices B: output devices C: storage devices D: system units 252.____ is another name for a handheld computer. A: All-in-one computer B: Palmtop computer C: Notebook computer D: Workstation 253.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce results, and store the results for future use. A: fax machine B: computer C: printer D: scanner 254.To access to the Internet and many other specialized services, you use a(n) ____. A: Internet service provider (ISP) B: application service provider (ASP) C: network service provider (NSP) D: online service provider (OSP) 255.Free software that has been donated for public use and has no copyright restrictions is called ____. A: freeware
  • 61. B: public-domain software C: shareware D: system software 256.A Web-enabled cellular telephone is sometimes called a(n) ____. A: Internet phone B: smart phone C: smart pager D: information appliance 257.The term ____ means that the accuracy of a computer's output depends on the accuracy of the input. A: garbage in, garbage out (GIGO) B: what you see is what you get (WYSIWYG) C: accuracy for accuracy (AFA) D: none of the above 258.____ is a work arrangement in which employees work away from a company's standard workplace. A: Remote employment B: Telecommuting C: Virtual office D: Small office/home office (SOHO) 259.A(n) ____ is any hardware component that can convey information to a user. A: input device B: output device C: storage device D: system unit 260.A(n) ____ is a computer with limited functionality whose main purpose is to connect to the Internet from home. A: desktop computer B: handheld computer C: Internet appliance D: notebook computer 261.____ is the electric, electronic, and mechanical equipment that makes up a computer. A: Hardware B: Software C: Information D: Data 262.Two popular ____ are America Online and The Microsoft Network. A: Internet service providers (ISPs) B: application service providers (ASPs) C: network service providers (NSPs) D: online service providers (OSPs) 263.____ is copyrighted software that is distributed free for a trial period. A: Freeware B: Public-domain software C: Shareware D: System software 264.Before you can use a program, you must first ____ a part or all of the software on the computer's hard disk. A: run
  • 62. B: copy C: duplicate D: install 265.Because their electronic components have a ____ failure rate, modern computers are very dependable. A: high B: steady C: low D: consistent 266.Using ____, you can create online photo albums and store your digital photographs for free. A: application service providers (ASPs) B: photo communities C: message boards D: chat rooms 267.Chassis is another name for the ____. A: memory B: processor C: communications device D: system unit 268.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate. A: server B: handheld computer C: Terminal D: workstation 269.____ is a collection of raw, unprocessed facts, figures, and symbols. A: Hardware B: Software C: Information D: Data 270.A network that connects computers in a limited geographic area is called a(n) ____. A: intranet B: wide area network (WAN) C: local area network (LAN) D: small area network (SAN) 271.A floppy disk drive, a Zip ® drive, a hard disk drive, and a CD-ROM drive are all examples of ____. A: input devices B: output devices C: storage devices D: communications devices 272.If you are ____, you have knowledge and understanding of computers and their uses. A: computer literate B: computer savvy C: technology literate D: technology current 273.The fastest and most powerful computer is the ____.
  • 63. A: personal computer B: supercomputer C: handheld computer D: mainframe 274.When your computer connects to a network, you are considered ____. A: linked B: connected C: online D: networked 275.Chassis is another name for the ____. A: memory B: processor C: communications device D: system unit 276.Before you can use a program, you must first ____ a part or all of the software on the computer's hard disk. A: run B: copy C: duplicate D: install 277.A(n) ____ is a computer with limited functionality whose main purpose is to connect to the Internet from home. A: desktop computer B: handheld computer C: Internet appliance D: notebook computer 278.Free software that has been donated for public use and has no copyright restrictions is called ____. A: freeware B: public-domain software C: shareware D: system software 279.The keyboard, mouse, microphone, scanner, digital camera, and PC camera are all ____. A: input devices B: output devices C: storage devices D: system units 280.An Internet appliance is also called a(n) ____. A: information appliance B: Web device C: online assistant D: Internet tool 281.A(n) ____ is an expensive, powerful desktop computer designed for work that requires intense calculations and graphics capabilities. A: all-in-one computer B: server C: stand-alone computer
  • 64. D: workstation 282.To create documents such as letters, memorandums, and brochures, use ____. A: spreadsheet software B: database software C: presentation graphics software D: word processing software 283.____ is any data or instructions you enter into a computer. A: Hardware B: Input C: Information D: Output 284.Users may choose to publish Web pages to ____. A: provide information about their families B: provide information about their businesses C: to provide distance-learning courses D: All of the above 285.The world's largest network is the ____. A: Web B: Internet C: wide area network (WAN) D: online service provider (OSP) 286.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer hardware devices. A: utility program B: operating system (OS) C: user interface D: application program 287.Using ____, you can create online photo albums and store your digital photographs for free. A: application service providers (ASPs) B: photo communities C: message boards D: chat rooms 288.Two popular ____ are America Online and The Microsoft Network. A: Internet service providers (ISPs) B: application service providers (ASPs) C: network service providers (NSPs) D: online service providers (OSPs) 289.Companies that use networks can save time and money because networks allow users to share ____. A: hardware devices B: software programs C: information D: all of the above 290.Text, graphics, sound, or video, and links to other Web documents are contained in ____. A: Web pages
  • 65. B: ISPs C: OSPs D: Web browsers 291.A(n) ____ is an expensive, powerful desktop computer designed for work that requires intense calculations and graphics capabilities. A: all-in-one computer B: server C: stand-alone computer D: workstation 292.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate. A: server B: handheld computer C: terminal D: workstation 293.A ____ is any company with fewer than 50 employees, as well as the self-employed people who work out of their homes. A: small office/home office (SOHO) B: large business C: mobile office D: power business 294.Using ____, you can create online photo albums and store your digital photographs for free. A: application service providers (ASPs) B: photo communities C: message boards D: chat rooms 295.You can use ____ to create Web pages. A: presentation graphics software B: Web page authoring software C: e-mail software D: desktop publishing software 296.Before you can use a program, you must first ____ a part or all of the software on the computer's hard disk. A: run B: copy C: duplicate D: install 297.The primary tool people use to communicate with others today is the ____. A: cellular phone B: fax machine C: Computer D: television 298.____ is the electric, electronic, and mechanical equipment that makes up a computer. A: Hardware B: Software C: Information D: Data
  • 66. 299.____ is any data or instructions you enter into a computer. A: Hardware B: Input C: Information D: Output 300.A(n) ____ is any hardware component that can convey information to a user. A: input device B: output device C: storage device D: system unit 301.A floppy disk drive, a Zip ® drive, a hard disk drive, and a CD-ROM drive are all examples of ____. A: input devices B: output devices C: storage devices D: communications devices 302.The term ____ means that the accuracy of a computer's output depends on the accuracy of the input. A: garbage in, garbage out (GIGO) B: what you see is what you get (WYSIWYG) C: accuracy for accuracy (AFA) D: none of the above 303.The computer's ____ performs a specific task, usually related to managing the computer, its devices, or its programs. A: utility program B: operating system (OS) C: user interface D: application service provider (ASP) 304..Free software that has been donated for public use and has no copyright restrictions is called ____. A: freeware B: public-domain software C: shareware D: system software 305.A(n) ____ is a network that covers a large geographic area. A: intranet B: wide area network (WAN) C: local area network (LAN) D: global area network (GAN) 306.To access to the Internet and many other specialized services, you use a(n) ____. A: Internet service provider (ISP) B: application service provider (ASP) C: network service provider (NSP) D: online service provider (OSP) 307.The world's largest network is the ____. A: Web B: Internet C: wide area network (WAN)
  • 67. D: online service provider (OSP) 308.____ is another name for a handheld computer. A: All-in-one computer B: Palmtop computer C: Notebook computer D: Workstation 309.Before you can use a program, you must first ____ a part or all of the software on the computer's hard disk. A: run B: copy C: duplicate D: install 310.A(n) ____ is a computer with limited functionality whose main purpose is to connect to the Internet from home. A: desktop computer B: handheld computer C: Internet appliance D: notebook computer 311.Free software that has been donated for public use and has no copyright restrictions is called ____. A: freeware B: public-domain software C: shareware D: system software 312.The keyboard, mouse, microphone, scanner, digital camera, and PC camera are all ____. A: input devices B: output devices C: storage devices D: system units 313.An Internet appliance is also called a(n) ____. A: information appliance B: Web device C: online assistant D: Internet tool 6.A(n) ____ is an expensive, powerful desktop computer designed for work that requires intense calculations and graphics capabilities. A: all-in-one computer B: server C: stand-alone computer D: workstation 314.To create documents such as letters, memorandums, and brochures, use ____. A: spreadsheet software B: database software C: presentation graphics software D: word processing software 315.____ is any data or instructions you enter into a computer. A: Hardware B: Input
  • 68. C: Information D: Output 316.Users may choose to publish Web pages to ____. A: provide information about their families B: provide information about their businesses C: to provide distance-learning courses D: all of the above 317.The world's largest network is the ____. A: Web B: Internet C: wide area network (WAN) D: online service provider (OSP) 318.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer hardware devices. A: utility program B: operating system (OS) C: user interface D: application program 319.____ is a collection of raw, unprocessed facts, figures, and symbols. A: Hardware B: Software C: Information D: Data 320.Using ____, you can create online photo albums and store your digital photographs for free. A: application service providers (ASPs) B: photo communities C: message boards D: chat rooms 321.Two popular ____ are America Online and The Microsoft Network. A: Internet service providers (ISPs) B: application service providers (ASPs) C: network service providers (NSPs) D: online service providers (OSPs) 322.The term ____ means that the accuracy of a computer's output depends on the accuracy of the input. A: garbage in, garbage out (GIGO) B: what you see is what you get (WYSIWYG) C: accuracy for accuracy (AFA) D: none of the above 323.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce results, and store the results for future use. A: fax machine B: computer C: printer D: scanner 324.A user who typically has a notebook computer equipped with a modem, enabling her to transfer information
  • 69. between her computer and another computer, such as one at the main office, is considered a ____. A: home user B: small office/home office user C: mobile user D: power user 325.Companies that use networks can save time and money because networks allow users to share ____. A: hardware devices B: software programs C: information D: all of the above 326.____ are used to establish a connection between two computers and transmit items over transmission media, such as cables or telephone lines. A: Input devices B: Output devices C: Storage devices D: Communications devices 327.The primary tool people use to communicate with others today is the ____. A: cellular phone B: fax machine C: computer D: television 328.Because their electronic components have a ____ failure rate, modern computers are very dependable. A: high B: steady C: low D: consistent 329.To create documents such as letters, memorandums, and brochures, use ____. A: spreadsheet software B: database software C: presentation graphics software D: word processing software 330.____ is copyrighted software that is distributed free for a trial period. A: Freeware B: Public-domain software C: Shareware D: System software 331.A network that connects computers in a limited geographic area is called a(n) ____. A: intranet B: wide area network (WAN) C: local area network (LAN) D: small area network (SAN) 332.Two popular ____ are America Online and The Microsoft Network. A: Internet service providers (ISPs) B: application service providers (ASPs) C: network service providers (NSPs)
  • 70. D: online service providers (OSPs) 333.A type of computer that performs all of its input, processing, output, and storage activities on its own is called a(n) ____. A: personal computer B: Internet appliance C: handheld computer D: mainframe 334.A(n) ____ is a computer with limited functionality whose main purpose is to connect to the Internet from home. A: desktop computer B: handheld computer C: Internet appliance D: notebook computer 335.Those who use their computers for personal and business communications, budgeting and personal financial management, and Web access are considered ____. A: mobile users B: large business users C: home users D: power users 336.____ is a work arrangement in which employees work away from a company's standard workplace. A: Remote employment B: Telecommuting C: Virtual office D: Small office/home office (SOHO) 337.Users may choose to publish Web pages to ____. A: provide information about their families B: provide information about their businesses C: to provide distance-learning courses D: all of the above 338.A Web-enabled cellular telephone is sometimes called a(n) ____. A: Internet phone B: smart phone C: smart pager D: information appliance 339.If you are ____, you have knowledge and understanding of computers and their uses. A: computer literate B: computer savvy C: technology literate D: technology current 340.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce results, and store the results for future use. A: fax machine B: computer C: printer D: scanner 341.____ is data that is organized, meaningful, and useful.
  • 71. A: Hardware B: Software C: Information D: Input 342.The keyboard, mouse, microphone, scanner, digital camera, and PC camera are all ____. A: input devices B: output devices C: storage devices D: system units 343.The ____ is the electronic device that interprets and carries out the basic instructions that operate the computer. A: chassis B: central processing unit (CPU) C: memory D: storage device 344.The power of a computer depends on its ____. A: speed B: reliability C: accuracy D: all of the above 345.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer hardware devices. A: utility program B: operating system (OS) C: user interface D: application program 346.Use ____ to store data in an organized fashion, as well as retrieve, manipulate, and display that data in a variety of formats. A: spreadsheet software B: database software C: presentation graphics software D: word processing software 347.When your computer connects to a network, you are considered ____. A: linked B: connected C: online D: networked 348. The power of a computer depends on its ____. A: speed B: reliability C: accuracy D: all of the above 349. A type of computer that performs all of its input, processing, output, and storage activities on its own is called a(n) ____.
  • 72. A: personal computer B: Internet appliance C: handheld computer D: mainframe 350. Application or system software provided at no cost to a user by an individual or a company is called ____. A: shareware B: custom software C: freeware D: trial software 351. The term ____ means that the accuracy of a computer's output depends on the accuracy of the input. A: garbage in, garbage out (GIGO) B: what you see is what you get (WYSIWYG) C: accuracy for accuracy (AFA) D: none of the above 352. A(n) ____ is an expensive, powerful desktop computer designed for work that requires intense calculations and graphics capabilities. A: all-in-one computer B: server C: stand-alone computer D: workstation 353. If you are ____, you have knowledge and understanding of computers and their uses. A: computer literate B: computer savvy C: technology literate D: technology current 354. Because their electronic components have a ____ failure rate, modern computers are very dependable. A: high B: steady C: low D: consistent 355. ____ is another name for a handheld computer. A: All-in-one computer B: Palmtop computer C: Notebook computer D: Workstation 356. The primary tool people use to communicate with others today is the ____. A: cellular phone B: fax machine C: computer D: television 357. A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer hardware devices. A: utility program B: operating system (OS) C: user interface D: application program 358. A(n) ____ is a computer with limited functionality whose main purpose is to connect to the Internet from home. A: desktop computer B: handheld computer C: Internet appliance D: notebook computer 359. In the workplace, computers are used to ____. A: create memos and letters B: calculate payroll C: generate invoices
  • 73. D: all of the above 360. The computer's ____ performs a specific task, usually related to managing the computer, its devices, or its programs. A: utility program B: operating system (OS) C: user interface D: application service provider (ASP) 361. A ____ is a computer that does not have any processing power, and must be connected to a sever to operate. A: server B: handheld computer C: terminal D: workstation 362. A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce results, and store the results for future use. A: fax machine B: computer C: printer D: scanner 363. To create documents such as letters, memorandums, and brochures, use ____. A: spreadsheet software B: database software C: presentation graphics software D: word processing software 364. The fastest and most powerful computer is the ____. A: personal computer B: supercomputer C: handheld computer D: mainframe 365. ____ is the electric, electronic, and mechanical equipment that makes up a computer. A: Hardware B: Software C: Information D: Data 366. Use ____ to store data in an organized fashion, as well as retrieve, manipulate, and display that data in a variety of formats. A: spreadsheet software B: database software C: presentation graphics software D: word processing software 367. Those who use their computers for personal and business communications, budgeting and personal financial management, and Web access are considered ____. A: mobile users B: large business users C: home users D: power users 368.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer hardware devices. A: utility program B: operating system (OS) C: user interface D: application program 369.To create documents such as letters, memorandums, and brochures, use ____.
  • 74. A: spreadsheet software B: database software C: presentation graphics software D: word processing software 370.Free software that has been donated for public use and has no copyright restrictions is called ____. A: freeware B: public-domain software C: shareware D: system software 371.When your computer connects to a network, you are considered ____. A: linked B: connected C: online D: networked 372.A network that connects computers in a limited geographic area is called a(n) ____. A: intranet B: wide area network (WAN) C: local area network (LAN) D: small area network (SAN) 373.To access to the Internet and many other specialized services, you use a(n) ____. A: Internet service provider (ISP) B: application service provider (ASP) C: network service provider (NSP) D: online service provider (OSP) 374.Text, graphics, sound, or video, and links to other Web documents are contained in ____. A: Web pages B: ISPs C: OSPs D: Web browsers 375.A type of computer that performs all of its input, processing, output, and storage activities on its own is called a(n) ____. A: personal computer B: Internet appliance C: handheld computer D: mainframe 376.____ is another name for a handheld computer. A: All-in-one computer B: Palmtop computer C: Notebook computer D: Workstation 377.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate. A: server B: handheld computer C: terminal D: workstation
  • 75. 378.Those who use their computers for personal and business communications, budgeting and personal financial management, and Web access are considered ____. A: mobile users B: large business users C: home users D: power users 379.A user who typically has a notebook computer equipped with a modem, enabling her to transfer information between her computer and another computer, such as one at the main office, is considered a ____. A: home user B: small office/home office user C: mobile user D: power user 380.Using ____, you can create online photo albums and store your digital photographs for free. A: application service providers (ASPs) B: photo communities C: message boards D: chat rooms 381.Users may choose to publish Web pages to ____. A: provide information about their families B: provide information about their businesses C: to provide distance-learning courses D: all of the above 382.An Internet appliance is also called a(n) ____. A: information appliance B: Web device C: online assistant D: Internet tool 383.Before you can use a program, you must first ____ a part or all of the software on the computer's hard disk. A: run B: copy C: duplicate D: install 384.The primary tool people use to communicate with others today is the ____. A: cellular phone B: fax machine C: computer D: television 385.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce results, and store the results for future use. A: fax machine B: computer C: printer D: scanner 386.____ is a collection of raw, unprocessed facts, figures, and symbols. A: Hardware
  • 76. B: Software C: Information D: Data 387.____ is any data or instructions you enter into a computer. A: Hardware B: Input C: Information D: Output 388.A type of computer that performs all of its input, processing, output, and storage activities on its own is called a(n) ____. A: personal computer B: Internet appliance C: handheld computer D: mainframe 389.If you are ____, you have knowledge and understanding of computers and their uses. A: computer literate B: computer savvy C: technology literate D: technology current 390.A(n) ____ is a network that covers a large geographic area. A: intranet B: wide area network (WAN) C: local area network (LAN) D: global area network (GAN) 391.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer hardware devices. A: utility program B: operating system (OS) C: user interface D: application program 392.____ is the process of making a Web page available on the Internet. A: Documenting B: Launching C: Publishing D: Uploading 393.Chassis is another name for the ____. A: memory B: processor C: communications device D: system unit 394.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate. A: server B: handheld computer C: terminal D: workstation
  • 77. 395.____ is the electric, electronic, and mechanical equipment that makes up a computer. A: Hardware B: Software C: Information D: Data 396.Two popular ____ are America Online and The Microsoft Network. A: Internet service providers (ISPs) B: application service providers (ASPs) C: network service providers (NSPs) D: online service providers (OSPs) 397.Free software that has been donated for public use and has no copyright restrictions is called ____. A: freeware B: public-domain software C: shareware D: system software 398.A Web-enabled cellular telephone is sometimes called a(n) ____. A: Internet phone B: smart phone C: smart pager D: information appliance 399.The power of a computer depends on its ____. A: speed B: reliability C: accuracy D: all of the above 400.A user who typically has a notebook computer equipped with a modem, enabling her to transfer information between her computer and another computer, such as one at the main office, is considered a ____. A: home user B: small office/home office user C: mobile user D: power user 401.A(n) ____ is someone who communicates with a computer or uses the information it generates. A: processor B: user C: programmer D: analyst 402.A(n) ____ is an expensive, powerful desktop computer designed for work that requires intense calculations and graphics capabilities. A: all-in-one computer B: server C: stand-alone computer D: workstation 403.The primary tool people use to communicate with others today is the ____. A: cellular phone B: fax machine
  • 78. C: computer D: television 404.A network that connects computers in a limited geographic area is called a(n) ____. A: intranet B: wide area network (WAN) C: local area network (LAN) D: small area network (SAN) 405.The computer's ____ performs a specific task, usually related to managing the computer, its devices, or its programs. A: utility program B: operating system (OS) C: user interface D: application service provider (ASP) 406.Users may choose to publish Web pages to ____. A: provide information about their families B: provide information about their businesses C: to provide distance-learning courses D: all of the above 407.The ____ is the electronic device that interprets and carries out the basic instructions that operate the computer. A: chassis B: central processing unit (CPU) C: memory D: storage device 408.Using ____, you can create online photo albums and store your digital photographs for free. A: application service providers (ASPs) B: photo communities C: message boards D: chat rooms 409.The keyboard, mouse, microphone, scanner, digital camera, and PC camera are all ____. A: input devices B: output devices C: storage devices D: system units 410.____ is another name for a handheld computer. A: All-in-one computer B: Palmtop computer C: Notebook computer D: Workstation 411.The primary tool people use to communicate with others today is the ____. A: cellular phone B: fax machine C: computer D: television 412.A network that connects computers in a limited geographic area is called a(n) ____.
  • 79. A: intranet B: wide area network (WAN) C: local area network (LAN) D: small area network (SAN) 413.A(n) ____ is a set of programs containing instructions that coordinate all the activities among computer hardware devices. A: utility program B: operating system (OS) C: user interface D: application program 414.____ is the process of making a Web page available on the Internet. A: Documenting B: Launching C: Publishing D: Uploading 415.A(n) ____ is any hardware component that can convey information to a user. A: input device B: output device C: storage device D: system unit 416.A(n) ____ is a computer with limited functionality whose main purpose is to connect to the Internet from home. A: desktop computer B: handheld computer C: Internet appliance D: notebook computer 417.In the workplace, computers are used to ____. A: create memos and letters B: calculate payroll C: generate invoices D: all of the above 418.Companies that use networks can save time and money because networks allow users to share ____. A: hardware devices B: software programs C: information D: all of the above 419.The computer's ____ performs a specific task, usually related to managing the computer, its devices, or its programs. A: utility program B: operating system (OS) C: user interface D: application service provider (ASP) 420.Users may choose to publish Web pages to ____. A: provide information about their families B: provide information about their businesses C: to provide distance-learning courses
  • 80. D: all of the above 421.Chassis is another name for the ____. A: memory B: processor C: communications device D: system unit 422.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate. A: server B: handheld computer C: terminal D: workstation 423.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce results, and store the results for future use. A: fax machine B: computer C: printer D: scanner 424.To access to the Internet and many other specialized services, you use a(n) ____. A: Internet service provider (ISP) B: application service provider (ASP) C: network service provider (NSP) D: online service provider (OSP) 425.To create documents such as letters, memorandums, and brochures, use ____. A: spreadsheet software B: database software C: presentation graphics software D: word processing software 426.You can use ____ to create Web pages. A: presentation graphics software B: Web page authoring software C: e-mail software D: desktop publishing software 427.The ____ is the electronic device that interprets and carries out the basic instructions that operate the computer. A: chassis B: central processing unit (CPU) C: memory D: storage device 428.Chassis is another name for the ____. A: memory B: processor C: communications device D: system unit 429.A ____ is a computer that does not have any processing power, and must be connected to a sever to operate. A: server
  • 81. B: handheld computer C: terminal D: workstation 430.If you are ____, you have knowledge and understanding of computers and their uses. A: computer literate B: computer savvy C: technology literate D: technology current 431.A(n) ____ is a network that covers a large geographic area. A: intranet B: wide area network (WAN) C: local area network (LAN) D: global area network (GAN) 432.____ are used to establish a connection between two computers and transmit items over transmission media, such as cables or telephone lines. A: Input devices B: Output devices C: Storage devices D: Communications devices 433.A ____ is any company with fewer than 50 employees, as well as the self-employed people who work out of their homes. A: small office/home office (SOHO) B: large business C: mobile office D: power business 434.A ____ is an electronic machine that can accept data, manipulate the data according to specified rules, produce results, and store the results for future use. A: fax machine B: computer C: printer D: scanner 435.To access to the Internet and many other specialized services, you use a(n) ____. A: Internet service provider (ISP) B: application service provider (ASP) C: network service provider (NSP) D: online service provider (OSP) 436.Because their electronic components have a ____ failure rate, modern computers are very dependable. A: high B: steady C: low D: consistent 437.Using ____, you can create online photo albums and store your digital photographs for free. A: application service providers (ASPs) B: photo communities C: message boards