SlideShare a Scribd company logo
1 of 25
1. In addition to keying data directly into a database, data entry can be done from a(n)
1) input form
2) table
3) field
4) data dictionary
5) None of these
2. What is an e-mail attachment?
1) A receipt sent by the recipient
2) A separate document from another program sent along with an e-mail message
3) A malicious parasite that feeds off your messages and destroys the contents
4) A list of CC or BCC recipients
5) None of these
3. SMTP, FTP and DNS are applications of the ____ layer.
1) data link
2) network
3) transport
4) application
5) None of these
4. In a database, information should be organised and accessed according to which of the
following?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these
5. A _______ is a computer connected to two networks.
1) link
2) server
3) gateway
4) bridge way
5) None of these
6. A file extension is separated from the main file name with a(n) _______, but no spaces.
1) question mark
2) exclamation mark
3) underscore
4) period
5) None of these
7. A telephone number, a birth date, and a customer name are all examples of
1) a record
2) data
3) a file
4) a database
5) None of these
8. The term _______ designates equipment that might be added to a computer system to
enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
9. Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None of these
10. The real business and competitive value of information technology lies in
1) The software applications that are used by many companies
2) The capabilities of the software and value of the information, a business
acquires and uses
3) The infrastructure of hardware, networks, and other IT facilities that are commonly
used by many companies
4) The capabilities of the hardware and the speed at which it processes information
5) None of these
11. OCR stands for _____
(1) Optical Character Recognition
(2) Optical CPU Recognition
(3) Optimal Character Rendering
(4) Other Character Restoration
(5) None of these
12. If a new device is attached to a computer, such as a printer or scanner, its ______ must be
installed before the device can be used.
1) buffer
2) driver
3) pager
4) server
5) None of these
13. The software that allows users to surf the Internet is called a/an
(1) Search engine
(2) Internet Service Provider (ISP)
(3) Multimedia application
(4) Browser
(5) None of these
14. A tuple is a
1) column of a table
2) two-dimensional table
3) row of a table
4) key of a table
5) None of these
15. The method of file organization in which data records in a file are arranged in a
specified order according to a key field is known as the
1) Direct access method
2) Queuing method
3) Predetermined method
4) Sequential access method
5) None of these
16. In Excel,_____ contains one or more worksheets.
1) Template
2) Workbook
3) Active cell
4) Label
5) None of these
17. Which of the following is a popular programming language for developing multimedia
web pages, websites, and web-based applications?
1) COBOL
2) Java
3) BASIC
4) Assembler
5) None of these
18. Compiling creates a(n) _____ .
1) program specification
2) algorithm
3) executable program
4) subroutine
5) None of these
19. A CD-RW disk
(1) has a faster access than an internal disk
(2) is a form of optical disk, so it can only be written once
(3) holds less data than a floppy disk
(4) can be erased and rewritten
(5) None of these
20. The first page of a Web site is called the
1) Home page
2) Index
3) Java Script
4) Book mark
5) None of these
1. Full form of TCP is:
(1) Transmission Control Protocol
(2) Total Control Protocol
(3) Transmission Control Program
(4) Totaling Control Program
(5) None of these
2. __ provides a common address space and routes the packets of data across the entire
internet?
(1) IP
(2) TCP
(3) UDP
(4) ALU
(5) None of these
3. Cyberspace is being governed by a system of law and regulation called?
(1) Civil Law
(2) Criminal Law
(3) Electronic Law
(4) Cyber Law
(5) Cyber Authority
4. To move to the beginning of a line of text, press __key?
(1) Home
(2) Ctrl
(3) Space
(4) Enter
(5) None of these
5. What menu is selected to change the font and style?
(1) Tools
(2) File
(3) Format
(4) Edit
(5) None of these
6. The process of starting the computer and loading of operating system programs for
execution is known as
(1) initialization
(2) retrieving
(3) loading
(4) searching
(5) booting
7. Primary memory is used by the:
(1) user
(2) input device
(3) CPU
(4) all of these
(5) None of these
8. In a disk, each block of data is written into -
(1) one sector
(2) three sector
(3) Two sectors
(4) Two or more sectors
(5) either two or three sectors:
9. The Pentium processor contains-
(1) tens of thousands of transistors
(2) hundred thousands of transistors
(3) thousands of transistors
(4) several millions of transistors
(5) hundred transistors
10. __ was the precursor to internet as we know it today?
(1) ARPANET
(2) USENET
(3) TELNET
(4) DBMS
(5) None of these
11. Which of the following is not an operating system?
(1) DOS
(2) Oracle
(3) Linux
(4) Windows
(5) None of these
12. In word, what combination of keys do you press to delete an entire word?
(1) Ctrl + del
(2) Alt + del
(3) Shift + Backspace
(4) Shift + Alt + del
(5) None of these
13. Hardware that adds two numbers is:
(1) the control unit
(2) an internal CPU register
(3) arithmetic Logic Unit
(4) Browser
(5) None of these
14. A small amount of memory included in the processor for high speed access id called-
(1) Register
(2) Cache
(3) RAM
(4) ROM
(5) None of these
15. A byte represents a group of:
(1) 10 bits (2) 40 bits
(3) 16 bits (4) 18 bits
(5) 8 bits
1. Which of the following is partof the system unit?
(1) Keyboard
(2) Floppy disks
(3) Monitor
(4) Memory
(5) CD
2. Specialized programs thatallow particular inputor output devices to communicate with the restof the
computer system are called ____.
(1) operating systems
(2) utilities
(3) device drivers
(4) language translators
(5) Connectors
3. The primary purpose ofsoftware is to turn data into:
(1) Websites
(2) graphs
(3) programs
(4) objects
(5) information
4. The _____________ enables you to simultaneouslykeep multiple web pages open in one browser win dow.
(1) Tab bar
(2) pop-up helper
(3) Tab row
(4) Address bar
(5) None of these
5. Information is?
(1) Summarization process ofdata
(2) Data Information
(3) Textual form of data
(4) Facts and figures
(5) None of these
6. Total memoryof system can be known using?
(1) DIR commands
(2) MEM commands
(3) Warm boot
(4) TOT MEM commands
(5) None of these
7. The first graphical web browser are?
(1) Gopher
(2) WAIS
(3) CERN
(4) Mosaic
(5) None of these
8. Which of the following is correct?
(1) POWER(2^3)
(2) POWER(2,3
(3) POWER(2#3)
(4) POWER(2*3)
(5) None of these
9. What whatis the default font in MS Word?
(1) Gothic Bold
(2) MV Biol
(3) Times new roman
(4) Arial
(5) None of these
10. ………………is the process ofcarrying out commands.
(1) Fetching
(2) Storing
(3) Executing
(4) Decoding
(5) None of these
11. LatestEntry Level Desktop PC have at leastmore than ------ of RAM.
(1) 100bit
(2) 100Byte
(3) 100KB
(4) 100 MB
(5) None of these
12. ---------- Bar is located at top of WordPad / Notepad /MS Word window.
(1) Title
(2) Menu
(3) Tool
(4) Format
(5) None of these
13. What is the decimal from of 3b4?
(1) 846
(2) 848
(3) 946
(4) 948
(5) None of these
14. The ---------- button on the quick access toolbar allow you to cancel your recent commands or action.
(1) Search
(2) Cut
(3) Document
(4) Undo
(5) None of these
15. What type of virus use computer hosts to reproduces it?
(1) Time bomb
(2) worm
(3) Melissa virus
(4) Macro virus
(5) None of these
16. ---------- is a signaling method thathandles a relatively wide range of frequencies.
(1) Broadband
(2) DLF
(3) Dial-up
(4) both 1& 3
(5) None of these
17. Block on buffer caches are used:
(1) to handle interrupts
(2) to increase capacityof main memory
(3) to improve disk performance
(4)to speed up main memoryread operation
(5) None of these
18. The term --- designate equipmentthatmightbe added to a computer system to enhance.Its functionality.
(1) Digital device
(2) system add
(3) Disk pack
(4) Peripheral device
(5) None of these
19. A disk content that is recorded at the time of manufacture and thatcannot be changed or erased by the user.
(1) READ ONLY
(2) Memory only
(3) Run only
(4) WRITES ONLY
(5) None of these
20. A device designed to read information encoded onto a small plastic card is .
(1) lightpen
(2) pun chard card
(3) magnetic tape
(4) magnetic
(5) badge reader
ANSWERS
1. 4
2. 3
3. 5
4. 3
5. 1
6. 2
7. 4
8. 2
9. 5
10. 3
11. 4
12. 1
13. 4
14. 4
15. 2
16. 1
17. 3
18. 4
19. 1
20. 5
1. The vast network of computers thatconnects millions ofpeople all over the world is called.
(1)LAN
(2)web
(3)hypertext
(4)internet
(5)None of these
2. The property that, when classes are arranged in a hierarchy, each class assumes the attributes and methods
of its ancestors is
(1) generalization
(2) inheritance
(3) encapsulation
(4) information hiding
(5) None of these
3. The software componentofan expert system thatdraws conclusions is the.
(1)user interface
(2)database
(3)inference engine
(4)1/0 controller
(5)model base
4. The attributes and methods for each objectare stored in.
(1) an objectinstance
(2) an objectconnection
(3) an assemblystructure
(4) an objectrepository
(5) None of these
5. An E-R diagram is a graphic method of presenting
(1) primarykeys and their relationships
(2) primarykeys and their relationships to instances
(3) entity classes and their relationships
(4) entity classes and their relationships to primarykeys
(5) None of the above
6. The OCR is used for the preparation of
(1) electricity bills
(2) insurance premium
(3) telephone bills
(4) All of these
(5) None of these
7. Speed of line printer is limited by the speed of
(1) paper movements
(2) cartridge used
(3) length of paper
(4) All of these
(5) None of these
8. In laser printers,printing is achieved by deflecting laser beam on to surface of a drum
(1) magnetized
(2) photosensitive
(3) magnetic
(4) Either (1)or (2)
(5) None of these
9. Resolution oflaser printer is specified in terms of
(1) DPI
(2) LPM
(3) CPM
(4) PPM
(5) None of these
10. What are the units used to countthe speed of a printer?
(1) CPM
(2) DPI
(3) PPM
(4) BIT
(5) None of these
11. The binary equivalentof decimal number 98 is
(1) 1110001
(2) 1110100
(3) 1100010
(4) 1111001
(5) None of these
12. The productof two binary numbers (1011) and (1001) is
(1) 1100011
(2) 1010100
(3) 1011001
(4) 100110
(5) None of these
13. A byte represents a group of
(1) 10 bits
(2) 40 bits
(3) 8 bits.
(4) 22 bits
(5) None of these
14. A hexadigit can be represented by
(1) three binary (consecutive) bits
(2) four binary (consecutive) bits
(3) eightbinary (consecutive) bits
(4) sixteen binary (consecutive) bits
(5) None of the above
15. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the
corresponding bits?
(1) ANSI
(2) ASCII
(3) EBCDIC
(4) ISO
(5) None of these
16. Which of the following statements in regard to directories is false?
(1) Directories with files can be deleted
(2) Directories cannotbe renamed
(3) The root directory is always at the highestlevel
(4) Directories can existinside directories
(5) None of the above
17. This part of operating system manages the essential peripherals,such as the keyboard, screen , disk drives,
and parallel and serial ports_____
(1) basic input/outputsystem
(2) secondaryinput/outputsystem
(3) peripheral input/outputsystem
(4) marginal input/outputsystem
(5) None of these
18. MS-DOS is usuallysupplied on a
(1) hard disk
(2) cartridge tape
(3) CD ROM
(4) floppy disk or diskettes
(5) None of these
19. Which one of the following is not a DOS prompt?
(1) C >
(2) B >
(3) A >
(4) ENTER
(5) None of these.
20. Which one of the following is not an internal DOS command?
(1) BACKUP
(2) COPY
(3) CLS
(4) BREAK
(5) None of these
ANSWERS
1. 4
2. 2
3. 3
4. 4
5. 3
6. 4
7. 1
8. 2
9. 1
10. 4
11. 3
12. 1
13. 3
14. 2
15. 1
16. 2
17. 1
18. 4
19. 4
20. 1
1. Extension name of flash file is ___.
1) .pdf
2) .swf
3) .pmd
4) .prd
5) None of these
2. Who invented world wide web?
1) Mosaic corporation
2) Opera corporation
3) Tim berner lee
4) Vint cert
5) None of these
3. URL stands for ____.
1) Uniform Resource Locator
2) Universal resource locator
3) Address bar
4) All 1, 2 & 3 are correct
5) None of these
4. A thing presentin real world in physical form is called____.
1) DBMS
2) Entity
3) Modulation
4) Keywords
5) None of these
5. BUG is -
1) To find error in any software testing
2) To find error in any software code
3) logical error of any program
4) both 1 & 2
5) None of these
6. Which of the following is nota type of key?
1) Alphabetic Keys
2) Numeric keys
3) Function keys
4) Toggle keys
5) None of these
7. If a previously saved file is edited ___?
(1) it cannot be saved again
(2) the changes will automaticallybe saved in the file
(3) the file will only have to be saved again if it is more than one page in length
(4) its name mustbe changed
(5) the file mustbe saved again to store the changes
8. Which of the following converts all the statements in a program in a single batch and the resulting collection of
instructions is placed in a new file?
(1) Compiler
(2) Interpreter
(3) Converter
(4) Instruction
(5) None of these
9.A program that generallyhas more user-friendlyinterface than a DBMS is called a ____?
(1) front end
(2) repository
(3) back end
(4) form
(5) None of these
10.When you install new programs on your computer,it is typically added to the ___?
(1) All programs
(2) Select programs
(3) Start programs
(4) Desktop programs
(5) None of these
11. Which of the following statements is FALSE concerning file names?
(1) Files may share the same name or the same extension butnot both
(2) Every file in the same folder musthave a unique name
(3) File extension is another name for file type
(4) The file extension comes before the dot (.) followed by the file name
(5) None of these
12. Which of the following is the key function of a firewall?
(1) Monitoring
(2) Deleting
(3) Record
(4) Copying
(5) Moving
13. Programming language builtinto user programs such as Word and Excel are known as____?
(1) 4GLs
(2) macro languages
(3) object-oriented languages
(4) visual programming languages
(5) None of these
14. In MS Word Key F12 opens ____?
(1) Save dialog box
(2) print dialog box
(3) New dialog box
(4) Save as dialog
(5) none
15. What is gutter margin?
(1) Margin that is added to the left margin when printing
(2) Margin that is added to right margin when printing
(3) Margin that is added to the binding side ofpage when printing
(4) Margin that is added to the outside ofthe page when printing
(5) None of these
ANSWERS
1. 2
2. 3
3. 1
4. 2
5. 3
6. 5
7. 5
8. 1
9. 1
10. 1
11. 4
12. 1
13. 4
14. 4
15. 3
1. IP address contains ........... bits.
(1) 8 bits
(2)16 bits
(3) 32 bits
(4) 40 bits
(5) None of these
2. Which key is used to indent a paragraph in MS word ?
(1) Shift
(2) tab
(3) Ctrl
(4) Esc
(5) None of these
3. Which is the example of spread sheet ?
(1) MS word
(2) MS excel
(3) Power point
(4) MS Access
(5) None of these
4. Name of the executable file of MS word is-
(1) MS Word
(2) MS Word .exe
(3) Win Word
(4) Win Word.exe
(5) None of these
5. Which disk contains permanent magnetic disk ?
(1) CD
(2) DVD
(3) HDD
(4) BRD
(5) None of these
6._________ is the process of finding and removing errors in software code.
(1) Debugging
(2) Compiling
(3) Testing
(4) Running
(5) None of these
7. ____________ are viruses that are triggered by the passage of time or on a certaindate.
(1) Boot-sector viruses
(2) Macro viruses
(3) Time bombs
(4) Worms
(5) None of these
8. Linux is a (n)______ ______ operating system.
(1) open-source
(2) Microsoft
(3) Windows
(4) Mac
(5) None of these
9. What is a backup?
(1) Restoring the information backup
(2) An exact copy of a system’s information
(3) The ability to get a system up and running in the event of a system crash or failure
(4) All of these
(5) None of these
10. Which of the following places the common data elements in order from smallest to largest
(1) character, file, record,field, database
(2) character, record,field, database,file
(3) character, field,record, file, database
(4) Bit, byte, character, record,field, file, database,
(5) None of these
11. What is the file extension of Ms-Word document?
1) Dot
2) Doc
3) Dom
4) Txt
5) None of these
12. The vast network of computers that connects millions of people all over the world is called—
1) LAN
2) Web
3) Hypertext
4) Internet
5) None of these
13.________ is a primary key that also appears in another file.
1) Physical key
2) Primary key
3) Foreign key
4) Logical key
5) None of these
14. The software component of an export system that draws conclusion is the
1) User interface
2) Database
3) Inference engine
4) I/O controller
5) Model Base
15.________ is an invalid type of database key.
1) Structured primarykey
2) Atomic primarykey
3) Primary key
4) Composite primarykey
5) None of these
16. The OSI model is divided into_______ processes called layers.
(1) five
(2) six
(3) seven
(4) eight
(5) None of these
17. System software is the set of programs that enables your computer’s hardware devices and______
software to work together.
(1) management
(2) processing
(3) utility
(4) application
(5) None of these
18. ________ are specially designed computer chips which reside inside other devices, such as your car
or your electronic thermostat.
(1) Servers
(2) Embedded computers
(3) Robotic computers
(4) Mainframes
(5) None of these
19. The following are all computing devices , except………
(1) notebook computers
(2) cellular telephones
(3) digital scanners
(4) personal digital assistants
(5) None of these
20. In a ring topology , the computer in possession of the______ can trasmit data
(1) packet
(2) data
(3) access method
(4) token
(5) None of these
ANSWERS
1. (3)
2. (2)
3. (2)
4. (4)
5. (3)
6. (1)
7. (3)
8. (1)
9. (4)
10. (3)
11. (2)
12. (4)
13. (3)
14. (3)
15. (1)
16. (3)
17. (4)
18. (2)
19. (3)
20. (4)
1. When you save to _______,your data will remain intact even when the computer is turned off.
a. RAM
b. motherboard
c. secondarystorage device
d. primary storage device
e. None of these
2. The motherboard is the
a. circuit board that houses peripheral devices
b. same as the CPU chip
c. the firstchip that is accessed when the computer is turned on
d. circuit board that contains a CPU and other chips
e. None of these
3. A computer-intensive problem runs on a _______.
1) server
2) mainframe
3) supercomputer
4) super PC
5) None of these
4. A(n) _______ converts and executes one statement at a time.
1) compiler
2) interpreter
3) converter
4) instructions
5) None of these
5. The term _______ designates equipment that might be added to a computer system to enhance its
functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
6. Approximately how many bytes make one Megabyte?
1) One Thousand
2) Ten Thousand
3) One Hundred
4) One Million
5) None of these
7. What is MP3?
1) A mouse
2) A printer
3) A sound format
4) A scanner
5) None of these
8. All the deleted files go to
1) Recycle Bin
2) Task Bar
3) Tool Bar
4) My Computer
5) None of these
9. _______ is the act of copying or downloading a program from a network and making multiple copies of
it.
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-license piracy
5) None of these
10. A directory within a directory is called a _______.
1) Mini Directory
2) Junior Directory
3) Part Directory
4) Sub Directory
5) None of these
11. Which is the best definition of a software package?
a. An add-on for your computer such as additional memory
b. A setof computer programs used for a certain function such as word processing
c. A protection you can buy for a computer
d. The box, manual and licence agreementthataccompanycommercial software
e. None of these
12. In MICR, C stands for
1) Code
2) Colour
3) Computer
4) Character
5) None of these
13. Fax machines and imaging systems are examples of
1) bar-code readers
2) imaging systems
3) scanning devices
4) pen-based systems
5) None of these
14. When writing a document, you can use the _______ feature to find an appropriate word or an
alternative word if you find yourself stuck for the right word.
1) dictionary
2) word finder
3) encyclopedia
4) thesaurus
5) None of these
15. Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None of these
16. A disk’s content that is recordedat the time of manufacture and that cannot be changed or erasedby
the user is
1) read-only
2) memory-only
3) run-only
4) write-only
5) None of these
17. In an information system, alphanumeric data normally takes the form of
a. Sentences and paragraphs
b. Numbers and alphabetical characters
c. Graphic shapes and figures
d. Human voice and other sounds
e. None of these
18. A Web site’s main page is called its _______
1) home page
2) browser page
3) search place
4) bookmark
5) None of these
19. When installing _______,the user must copy and usually decompress program files from a CD-ROM
or other medium to the hard disk.
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these
20. A collection of interrelated files in a computer is a _______.
1) file manager
2) field
3) record
4) database
5) None of these
ANSWERS
ANSWERS
1. c
2. d
3. 3
4. 2
5. 4
6. 4
7. 3
8. 1
9. 3
10. 4
11. b
12. 4
13. 3
14. 4
15. 2
16. 1
17. b
18. 1
19. 4
20. 4
1. A device operating at the physical layeris calleda
1) Bridge
2) Router
3) Repeater
4) All of the above
5) None of these
2. For separating channels in FDM, it is necessary to use
1) Time slots
2) Bandpass filters
3) Differentiation
4) All of the above
5) None of these
3. Encryption and decryption are functions of
1) Transport layer
2) Session layer
3) Presentation layer
4) All of the above
5) None of these
4. Which of the following computer language is a mathematically orientedlanguages usedforscientificproblems?
1) FORTRAN
2) COBOL
3) LISP
4) PROLOG
5) APPLE
5. ________ is when the more power-hungry components, such as the monitorand the hard drive, are put in idle.
1) Hibernation
2) Power down
3) Standby mode
4) The shutdown procedure
5) None of these
6. Hard disk drives are considered________ storage.
1) flash
2) non-volatile
3) temporary
4) nonpermanent
5) None of these
7. The ________ key and the ________ key can be used in combination with otherkeys to perform shortcuts and
special tasks.
1) Control, Alt
2) Function, toggle
3) Delete, Insert
4) Caps Lock, Num Lock
5) None of these
8. The most common input devices are the ________ and the ________.
1) microphone, printer
2) scanner, monitor
3) digital camera, speakers
4) keyboard, mouse
5) None of these
9. To save an existing filewith a newname or to a newlocation, you shoulduse the ________ command.
1) Save
2) Save and Replace
3) Save As
4) New File
5) None of these
10. A(n) ________ is a combination of hardware and software that facilitates the sharing of information between
computing devices.
1) network
2) peripheral
3) expansion board
4) digital device
5) None of these
11. The term bit is short for ________
1) megabyte
2) binary language
3) binary digit
4) binary number
5) None of these
12. Computers gather data, which means that they allow users to ________ data.
1) present
2) input
3) output
4) store
5) None of these
13. Which of the following terms is just the connection of networks that can be joinedtogether?
1) virtual private network
2) internet
3) intranet
4) extranet
5) None of these
14. ________ is a form of permanent memory that holds all the instructions the computerneeds to start up and does
not get erasedwhen the power is turnedoff.
1) The Network Interface Card (NIC)
2) The CPU
3) RAM
4) ROM
5) None of these
15. Servers are computers that provide resources to othercomputers connected to a ________
1) network
2) mainframe
3) supercomputer
4) client
5) None of these
1. 3
2. 2
3. 3
4. 1
5. 3
6. 2
7. 1
8. 4
9. 3
10. 1
11. 3
12. 2
13. 2
14. 4
15. 1
1. What is the responsibilityof the logical unitin the CPU of a computer?
a) Producing result
b) Comparing numbers
c) Controlling flow of information
d) Performing mathematical operations
e) Controlling flow of data
2. Abacus was the first ___
a) Electronic computer
b) Mechanical computer
c) Electronic calculator
d) Mechanical calculator
e) Electronic chip
3. If in a computer,16 bits are used to specify address in a RAM, the number ofaddresses will be ___
a) 216
b) 65,536
c) 64K
d) 128K
e) 135K
4. Instructions and memoryaddress are represented by___
a) Character code
b) Binary code
c) Binary word
d) Parity bit
e) Bite code
5. The terminal device that functions as a cash register,computer terminal and OCR reader is:
a) Data collection terminal
b) OCR register terminal
c) Video Displayterminal
d) POS terminal
e) None of the above
6. A setof flip flops integrated together is called ____
a) Counter
b) Adder
c) Register
d) Flip flop
e) All of the above
7. People often call ______ as the brain of computer system.
a) Control Unit
b) Arithmetic Logic Unit
c) Central Processing Unit
d) Storage Unit
e) Store data
8. Which of the following is used for manufacturing chips?
a) Bus
b) Control unit
c) Semiconductors
d) a and b only
e) None of the above
9. The value of each bead in heaven is ___
a) 1
b) 3
c) 5
d) 7
e) 8
10. The first computer introduced in Nepal was ___
a) IBM 1400
b) IBM 1401
c) IBM 1402
d) IBM 1406
e) IBM 1405
11. Bluetooth is a type of radio wave information transmission system thatis good for about:
a) 30 feet
b) 30 yards
c) 30 miles
d) 300 miles
e) 3000 miles
12. The telephone is an example of a(n)____ signal.
a) analog
b) digital
c) modulated
d) demodulated
e) compiler
13. Acredit card-sized expansion board thatis inserted into portable computers thatconnects the modem
to the telephone wall jack is:
a) Internal modem
b) External modem
c) PC Card modem
d) Wireless modem
e) Wired modem
14. A modem thatis contained within the system unitis called:
a) External
b) Internal
c) Wireless
d) Wi-Fi
e) Bluetooth
15. A modem thatdoesn'tneed to be connected to a telephone line is the ___ modem.
a) external
b) internal
c) wireless
d) DSL
e) NSL
16. Aspecial high-speed line used bylarge corporations to supportdigital communications is known as:
a) satellite/air connection service lines
b) cable modems
c) digital subscriber lines
d) T1, T2, T3 and T4 lines
e) None of the above
17. An affordable technologythat uses existing telephone lines to provide high-speed connections
is called ________.
a) ISDN
b) microwave
c) cable modem
d) DSL
e) ALU
18. The capacity of a communication channel is measured in ___
a) Bandwidth
b) Bit capacity
c) Baud rate
d) Data flow
e) Store data
19. A relatively new technology that allows wireless connectivity:
a) Bluetooth
b) Black tooth
c) Blue band
d) Broadband
e) Wi- fi
20. In MS-DOS 5.0, which is the number that acts as a code to uniquelyidentify the software product?
a) MS
b) DOS
c) MS DOS
d) 5.0
e) 4.2.0
1) b;
2) d;
3) b;
4) b;
5) d;
6) c;
7) c;
8) c;
9) c;
10) b
11) a;
12) a;
13) c;
14) b;
15) c;
16) d;
17) d;
18) a;
19) a;
20) d;
Computer

More Related Content

What's hot

What's hot (7)

Completeosnotes
CompleteosnotesCompleteosnotes
Completeosnotes
 
Os notes
Os notesOs notes
Os notes
 
The structure of process
The structure of processThe structure of process
The structure of process
 
Os lab final
Os lab finalOs lab final
Os lab final
 
Operating system mc qs
Operating system mc qsOperating system mc qs
Operating system mc qs
 
Operating system quiz
Operating system quizOperating system quiz
Operating system quiz
 
An introduction to_ns_nam_and_o_tcl_scripting
An introduction to_ns_nam_and_o_tcl_scriptingAn introduction to_ns_nam_and_o_tcl_scripting
An introduction to_ns_nam_and_o_tcl_scripting
 

Viewers also liked

Mapa conceptual
Mapa conceptualMapa conceptual
Mapa conceptualHinVero
 
Basic computer question
Basic computer questionBasic computer question
Basic computer questionABHISHEK KUMAR
 
Grand Valley Writing Center - Consulting Philosophy
Grand Valley Writing Center - Consulting Philosophy Grand Valley Writing Center - Consulting Philosophy
Grand Valley Writing Center - Consulting Philosophy Ryker616
 
Blog de cesar estornes de historia y deportes: las primeras montañeras del c...
Blog de cesar estornes de historia y deportes: las primeras montañeras del c...Blog de cesar estornes de historia y deportes: las primeras montañeras del c...
Blog de cesar estornes de historia y deportes: las primeras montañeras del c...ManfredNolte
 
A Study on Mood Disorders in Acne among Patients Attending Skin Opd
A Study on Mood Disorders in Acne among Patients Attending Skin OpdA Study on Mood Disorders in Acne among Patients Attending Skin Opd
A Study on Mood Disorders in Acne among Patients Attending Skin Opdiosrjce
 
Case study Sustainability St Willoughby small
Case study Sustainability St Willoughby smallCase study Sustainability St Willoughby small
Case study Sustainability St Willoughby smallErika Van Schellebeck
 
Guia de Cuerpo sachet hidratacion
Guia de Cuerpo sachet hidratacionGuia de Cuerpo sachet hidratacion
Guia de Cuerpo sachet hidratacionOlimpia Merino
 
What Brands Don't Understand About Content Marketing
What Brands Don't Understand About Content Marketing What Brands Don't Understand About Content Marketing
What Brands Don't Understand About Content Marketing Michael Spencer
 
Conference de Paris sur le Climat : un accord financier
Conference de Paris sur le Climat : un accord financierConference de Paris sur le Climat : un accord financier
Conference de Paris sur le Climat : un accord financierDominique Strauss-Kahn
 
Regras do projeto final
Regras do projeto finalRegras do projeto final
Regras do projeto finalPacc UAB
 
Aula 15 - Modularização -parte1
Aula 15 - Modularização -parte1Aula 15 - Modularização -parte1
Aula 15 - Modularização -parte1Pacc UAB
 
Aula 10 - Equivalência Java x Portugol Studio - parte 2
Aula 10 - Equivalência Java x Portugol Studio - parte 2Aula 10 - Equivalência Java x Portugol Studio - parte 2
Aula 10 - Equivalência Java x Portugol Studio - parte 2Pacc UAB
 
Organizational Behavior - Infosys Limited
Organizational Behavior - Infosys LimitedOrganizational Behavior - Infosys Limited
Organizational Behavior - Infosys LimitedPrajakta Talathi
 
Multi-Tenant Operations with Cloudera 5.7 & BT
Multi-Tenant Operations with Cloudera 5.7 & BTMulti-Tenant Operations with Cloudera 5.7 & BT
Multi-Tenant Operations with Cloudera 5.7 & BTCloudera, Inc.
 

Viewers also liked (18)

Mapa conceptual
Mapa conceptualMapa conceptual
Mapa conceptual
 
Basic computer question
Basic computer questionBasic computer question
Basic computer question
 
SS EE conference 2
SS EE conference 2SS EE conference 2
SS EE conference 2
 
Grand Valley Writing Center - Consulting Philosophy
Grand Valley Writing Center - Consulting Philosophy Grand Valley Writing Center - Consulting Philosophy
Grand Valley Writing Center - Consulting Philosophy
 
נכסי יוקרה בהרצליה מרינה והרצליה פיתוח
נכסי יוקרה בהרצליה מרינה והרצליה פיתוחנכסי יוקרה בהרצליה מרינה והרצליה פיתוח
נכסי יוקרה בהרצליה מרינה והרצליה פיתוח
 
Blog de cesar estornes de historia y deportes: las primeras montañeras del c...
Blog de cesar estornes de historia y deportes: las primeras montañeras del c...Blog de cesar estornes de historia y deportes: las primeras montañeras del c...
Blog de cesar estornes de historia y deportes: las primeras montañeras del c...
 
мывмм
мывмммывмм
мывмм
 
SCA600plan
SCA600planSCA600plan
SCA600plan
 
A Study on Mood Disorders in Acne among Patients Attending Skin Opd
A Study on Mood Disorders in Acne among Patients Attending Skin OpdA Study on Mood Disorders in Acne among Patients Attending Skin Opd
A Study on Mood Disorders in Acne among Patients Attending Skin Opd
 
Case study Sustainability St Willoughby small
Case study Sustainability St Willoughby smallCase study Sustainability St Willoughby small
Case study Sustainability St Willoughby small
 
Guia de Cuerpo sachet hidratacion
Guia de Cuerpo sachet hidratacionGuia de Cuerpo sachet hidratacion
Guia de Cuerpo sachet hidratacion
 
What Brands Don't Understand About Content Marketing
What Brands Don't Understand About Content Marketing What Brands Don't Understand About Content Marketing
What Brands Don't Understand About Content Marketing
 
Conference de Paris sur le Climat : un accord financier
Conference de Paris sur le Climat : un accord financierConference de Paris sur le Climat : un accord financier
Conference de Paris sur le Climat : un accord financier
 
Regras do projeto final
Regras do projeto finalRegras do projeto final
Regras do projeto final
 
Aula 15 - Modularização -parte1
Aula 15 - Modularização -parte1Aula 15 - Modularização -parte1
Aula 15 - Modularização -parte1
 
Aula 10 - Equivalência Java x Portugol Studio - parte 2
Aula 10 - Equivalência Java x Portugol Studio - parte 2Aula 10 - Equivalência Java x Portugol Studio - parte 2
Aula 10 - Equivalência Java x Portugol Studio - parte 2
 
Organizational Behavior - Infosys Limited
Organizational Behavior - Infosys LimitedOrganizational Behavior - Infosys Limited
Organizational Behavior - Infosys Limited
 
Multi-Tenant Operations with Cloudera 5.7 & BT
Multi-Tenant Operations with Cloudera 5.7 & BTMulti-Tenant Operations with Cloudera 5.7 & BT
Multi-Tenant Operations with Cloudera 5.7 & BT
 

Similar to Computer

Ibpscomputerknowledgepaperswithanswers 130123104735-phpapp02
Ibpscomputerknowledgepaperswithanswers 130123104735-phpapp02Ibpscomputerknowledgepaperswithanswers 130123104735-phpapp02
Ibpscomputerknowledgepaperswithanswers 130123104735-phpapp02Yazeed Khalid
 
Hscc practiceexamanswerkey-111119180828-phpapp01
Hscc practiceexamanswerkey-111119180828-phpapp01Hscc practiceexamanswerkey-111119180828-phpapp01
Hscc practiceexamanswerkey-111119180828-phpapp01Yazeed Khalid
 
บทที่5 ระบบเครือข่าย(network)
บทที่5 ระบบเครือข่าย(network)บทที่5 ระบบเครือข่าย(network)
บทที่5 ระบบเครือข่าย(network)Beauso English
 
Ibps specialist officer
Ibps specialist officerIbps specialist officer
Ibps specialist officerJohn Edward
 
Computer knowledge-old-papers
Computer knowledge-old-papersComputer knowledge-old-papers
Computer knowledge-old-papersneha rawat
 
MCQ on Computer and ICT
MCQ on Computer and ICTMCQ on Computer and ICT
MCQ on Computer and ICTMd. Gias Uddin
 
2 points For computerclusters with shareddisks discuss .pdf
2 points For computerclusters with shareddisks discuss .pdf2 points For computerclusters with shareddisks discuss .pdf
2 points For computerclusters with shareddisks discuss .pdfadvalue015
 
Input and Output Devices and Systems
Input and Output Devices and SystemsInput and Output Devices and Systems
Input and Output Devices and SystemsNajma Alam
 
บทที่ 3 โครงสร้างของระบบปฏิบัติการ
บทที่ 3 โครงสร้างของระบบปฏิบัติการบทที่ 3 โครงสร้างของระบบปฏิบัติการ
บทที่ 3 โครงสร้างของระบบปฏิบัติการChamp Phinning
 

Similar to Computer (20)

Computer question
Computer questionComputer question
Computer question
 
Ibpscomputerknowledgepaperswithanswers 130123104735-phpapp02
Ibpscomputerknowledgepaperswithanswers 130123104735-phpapp02Ibpscomputerknowledgepaperswithanswers 130123104735-phpapp02
Ibpscomputerknowledgepaperswithanswers 130123104735-phpapp02
 
Computer awareness
Computer awarenessComputer awareness
Computer awareness
 
Sbi po computer quiz
Sbi po computer quizSbi po computer quiz
Sbi po computer quiz
 
Hscc practiceexamanswerkey-111119180828-phpapp01
Hscc practiceexamanswerkey-111119180828-phpapp01Hscc practiceexamanswerkey-111119180828-phpapp01
Hscc practiceexamanswerkey-111119180828-phpapp01
 
บทที่5 ระบบเครือข่าย(network)
บทที่5 ระบบเครือข่าย(network)บทที่5 ระบบเครือข่าย(network)
บทที่5 ระบบเครือข่าย(network)
 
HSCC Practice Exam (Questions and Answers)
HSCC Practice Exam (Questions and Answers)HSCC Practice Exam (Questions and Answers)
HSCC Practice Exam (Questions and Answers)
 
Ibps specialist officer
Ibps specialist officerIbps specialist officer
Ibps specialist officer
 
Computer knowledge-old-papers
Computer knowledge-old-papersComputer knowledge-old-papers
Computer knowledge-old-papers
 
เฉลยโอเน็ต53
เฉลยโอเน็ต53เฉลยโอเน็ต53
เฉลยโอเน็ต53
 
INTRODUCTION TO COMPUTERS
INTRODUCTION TO COMPUTERSINTRODUCTION TO COMPUTERS
INTRODUCTION TO COMPUTERS
 
เทคโนโลยีสารสนเทศและการสื่อสาร
เทคโนโลยีสารสนเทศและการสื่อสารเทคโนโลยีสารสนเทศและการสื่อสาร
เทคโนโลยีสารสนเทศและการสื่อสาร
 
Basic course
Basic courseBasic course
Basic course
 
MCQ on Computer and ICT
MCQ on Computer and ICTMCQ on Computer and ICT
MCQ on Computer and ICT
 
2 points For computerclusters with shareddisks discuss .pdf
2 points For computerclusters with shareddisks discuss .pdf2 points For computerclusters with shareddisks discuss .pdf
2 points For computerclusters with shareddisks discuss .pdf
 
Basic course
Basic courseBasic course
Basic course
 
Section b a
Section b  aSection b  a
Section b a
 
Input and Output Devices and Systems
Input and Output Devices and SystemsInput and Output Devices and Systems
Input and Output Devices and Systems
 
computer quiz
computer quizcomputer quiz
computer quiz
 
บทที่ 3 โครงสร้างของระบบปฏิบัติการ
บทที่ 3 โครงสร้างของระบบปฏิบัติการบทที่ 3 โครงสร้างของระบบปฏิบัติการ
บทที่ 3 โครงสร้างของระบบปฏิบัติการ
 

Recently uploaded

Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 

Recently uploaded (20)

Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 

Computer

  • 1. 1. In addition to keying data directly into a database, data entry can be done from a(n) 1) input form 2) table 3) field 4) data dictionary 5) None of these 2. What is an e-mail attachment? 1) A receipt sent by the recipient 2) A separate document from another program sent along with an e-mail message 3) A malicious parasite that feeds off your messages and destroys the contents 4) A list of CC or BCC recipients 5) None of these 3. SMTP, FTP and DNS are applications of the ____ layer. 1) data link 2) network 3) transport 4) application 5) None of these 4. In a database, information should be organised and accessed according to which of the following? 1) Physical position 2) Logical structure 3) Data dictionary 4) Physical structure 5) None of these 5. A _______ is a computer connected to two networks. 1) link 2) server 3) gateway 4) bridge way 5) None of these 6. A file extension is separated from the main file name with a(n) _______, but no spaces. 1) question mark 2) exclamation mark 3) underscore 4) period 5) None of these 7. A telephone number, a birth date, and a customer name are all examples of
  • 2. 1) a record 2) data 3) a file 4) a database 5) None of these 8. The term _______ designates equipment that might be added to a computer system to enhance its functionality. 1) digital device 2) system add-on 3) disk pack 4) peripheral device 5) None of these 9. Which key is used in combination with another key to perform a specific task? 1) Function 2) Control 3) Arrow 4) Space bar 5) None of these 10. The real business and competitive value of information technology lies in 1) The software applications that are used by many companies 2) The capabilities of the software and value of the information, a business acquires and uses 3) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies 4) The capabilities of the hardware and the speed at which it processes information 5) None of these 11. OCR stands for _____ (1) Optical Character Recognition (2) Optical CPU Recognition (3) Optimal Character Rendering (4) Other Character Restoration (5) None of these 12. If a new device is attached to a computer, such as a printer or scanner, its ______ must be installed before the device can be used. 1) buffer 2) driver 3) pager 4) server 5) None of these 13. The software that allows users to surf the Internet is called a/an
  • 3. (1) Search engine (2) Internet Service Provider (ISP) (3) Multimedia application (4) Browser (5) None of these 14. A tuple is a 1) column of a table 2) two-dimensional table 3) row of a table 4) key of a table 5) None of these 15. The method of file organization in which data records in a file are arranged in a specified order according to a key field is known as the 1) Direct access method 2) Queuing method 3) Predetermined method 4) Sequential access method 5) None of these 16. In Excel,_____ contains one or more worksheets. 1) Template 2) Workbook 3) Active cell 4) Label 5) None of these 17. Which of the following is a popular programming language for developing multimedia web pages, websites, and web-based applications? 1) COBOL 2) Java 3) BASIC 4) Assembler 5) None of these 18. Compiling creates a(n) _____ . 1) program specification 2) algorithm 3) executable program 4) subroutine 5) None of these 19. A CD-RW disk (1) has a faster access than an internal disk (2) is a form of optical disk, so it can only be written once (3) holds less data than a floppy disk (4) can be erased and rewritten (5) None of these
  • 4. 20. The first page of a Web site is called the 1) Home page 2) Index 3) Java Script 4) Book mark 5) None of these 1. Full form of TCP is: (1) Transmission Control Protocol (2) Total Control Protocol (3) Transmission Control Program (4) Totaling Control Program (5) None of these 2. __ provides a common address space and routes the packets of data across the entire internet? (1) IP (2) TCP (3) UDP (4) ALU (5) None of these 3. Cyberspace is being governed by a system of law and regulation called? (1) Civil Law (2) Criminal Law (3) Electronic Law (4) Cyber Law (5) Cyber Authority 4. To move to the beginning of a line of text, press __key? (1) Home (2) Ctrl (3) Space (4) Enter (5) None of these 5. What menu is selected to change the font and style? (1) Tools (2) File (3) Format (4) Edit (5) None of these 6. The process of starting the computer and loading of operating system programs for execution is known as (1) initialization
  • 5. (2) retrieving (3) loading (4) searching (5) booting 7. Primary memory is used by the: (1) user (2) input device (3) CPU (4) all of these (5) None of these 8. In a disk, each block of data is written into - (1) one sector (2) three sector (3) Two sectors (4) Two or more sectors (5) either two or three sectors: 9. The Pentium processor contains- (1) tens of thousands of transistors (2) hundred thousands of transistors (3) thousands of transistors (4) several millions of transistors (5) hundred transistors 10. __ was the precursor to internet as we know it today? (1) ARPANET (2) USENET (3) TELNET (4) DBMS (5) None of these 11. Which of the following is not an operating system? (1) DOS (2) Oracle (3) Linux (4) Windows (5) None of these 12. In word, what combination of keys do you press to delete an entire word? (1) Ctrl + del (2) Alt + del (3) Shift + Backspace (4) Shift + Alt + del (5) None of these 13. Hardware that adds two numbers is: (1) the control unit
  • 6. (2) an internal CPU register (3) arithmetic Logic Unit (4) Browser (5) None of these 14. A small amount of memory included in the processor for high speed access id called- (1) Register (2) Cache (3) RAM (4) ROM (5) None of these 15. A byte represents a group of: (1) 10 bits (2) 40 bits (3) 16 bits (4) 18 bits (5) 8 bits 1. Which of the following is partof the system unit? (1) Keyboard (2) Floppy disks (3) Monitor (4) Memory (5) CD 2. Specialized programs thatallow particular inputor output devices to communicate with the restof the computer system are called ____. (1) operating systems (2) utilities (3) device drivers (4) language translators (5) Connectors 3. The primary purpose ofsoftware is to turn data into: (1) Websites (2) graphs (3) programs (4) objects (5) information 4. The _____________ enables you to simultaneouslykeep multiple web pages open in one browser win dow. (1) Tab bar (2) pop-up helper (3) Tab row (4) Address bar (5) None of these 5. Information is? (1) Summarization process ofdata (2) Data Information (3) Textual form of data (4) Facts and figures (5) None of these 6. Total memoryof system can be known using?
  • 7. (1) DIR commands (2) MEM commands (3) Warm boot (4) TOT MEM commands (5) None of these 7. The first graphical web browser are? (1) Gopher (2) WAIS (3) CERN (4) Mosaic (5) None of these 8. Which of the following is correct? (1) POWER(2^3) (2) POWER(2,3 (3) POWER(2#3) (4) POWER(2*3) (5) None of these 9. What whatis the default font in MS Word? (1) Gothic Bold (2) MV Biol (3) Times new roman (4) Arial (5) None of these 10. ………………is the process ofcarrying out commands. (1) Fetching (2) Storing (3) Executing (4) Decoding (5) None of these 11. LatestEntry Level Desktop PC have at leastmore than ------ of RAM. (1) 100bit (2) 100Byte (3) 100KB (4) 100 MB (5) None of these 12. ---------- Bar is located at top of WordPad / Notepad /MS Word window. (1) Title (2) Menu (3) Tool (4) Format (5) None of these 13. What is the decimal from of 3b4? (1) 846 (2) 848 (3) 946 (4) 948 (5) None of these 14. The ---------- button on the quick access toolbar allow you to cancel your recent commands or action. (1) Search (2) Cut
  • 8. (3) Document (4) Undo (5) None of these 15. What type of virus use computer hosts to reproduces it? (1) Time bomb (2) worm (3) Melissa virus (4) Macro virus (5) None of these 16. ---------- is a signaling method thathandles a relatively wide range of frequencies. (1) Broadband (2) DLF (3) Dial-up (4) both 1& 3 (5) None of these 17. Block on buffer caches are used: (1) to handle interrupts (2) to increase capacityof main memory (3) to improve disk performance (4)to speed up main memoryread operation (5) None of these 18. The term --- designate equipmentthatmightbe added to a computer system to enhance.Its functionality. (1) Digital device (2) system add (3) Disk pack (4) Peripheral device (5) None of these 19. A disk content that is recorded at the time of manufacture and thatcannot be changed or erased by the user. (1) READ ONLY (2) Memory only (3) Run only (4) WRITES ONLY (5) None of these 20. A device designed to read information encoded onto a small plastic card is . (1) lightpen (2) pun chard card (3) magnetic tape (4) magnetic (5) badge reader ANSWERS 1. 4 2. 3 3. 5 4. 3 5. 1 6. 2 7. 4 8. 2 9. 5 10. 3
  • 9. 11. 4 12. 1 13. 4 14. 4 15. 2 16. 1 17. 3 18. 4 19. 1 20. 5 1. The vast network of computers thatconnects millions ofpeople all over the world is called. (1)LAN (2)web (3)hypertext (4)internet (5)None of these 2. The property that, when classes are arranged in a hierarchy, each class assumes the attributes and methods of its ancestors is (1) generalization (2) inheritance (3) encapsulation (4) information hiding (5) None of these 3. The software componentofan expert system thatdraws conclusions is the. (1)user interface (2)database (3)inference engine (4)1/0 controller (5)model base 4. The attributes and methods for each objectare stored in. (1) an objectinstance (2) an objectconnection (3) an assemblystructure (4) an objectrepository (5) None of these 5. An E-R diagram is a graphic method of presenting (1) primarykeys and their relationships (2) primarykeys and their relationships to instances (3) entity classes and their relationships (4) entity classes and their relationships to primarykeys (5) None of the above 6. The OCR is used for the preparation of (1) electricity bills (2) insurance premium (3) telephone bills (4) All of these (5) None of these 7. Speed of line printer is limited by the speed of (1) paper movements (2) cartridge used (3) length of paper
  • 10. (4) All of these (5) None of these 8. In laser printers,printing is achieved by deflecting laser beam on to surface of a drum (1) magnetized (2) photosensitive (3) magnetic (4) Either (1)or (2) (5) None of these 9. Resolution oflaser printer is specified in terms of (1) DPI (2) LPM (3) CPM (4) PPM (5) None of these 10. What are the units used to countthe speed of a printer? (1) CPM (2) DPI (3) PPM (4) BIT (5) None of these 11. The binary equivalentof decimal number 98 is (1) 1110001 (2) 1110100 (3) 1100010 (4) 1111001 (5) None of these 12. The productof two binary numbers (1011) and (1001) is (1) 1100011 (2) 1010100 (3) 1011001 (4) 100110 (5) None of these 13. A byte represents a group of (1) 10 bits (2) 40 bits (3) 8 bits. (4) 22 bits (5) None of these 14. A hexadigit can be represented by (1) three binary (consecutive) bits (2) four binary (consecutive) bits (3) eightbinary (consecutive) bits (4) sixteen binary (consecutive) bits (5) None of the above 15. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the corresponding bits? (1) ANSI (2) ASCII (3) EBCDIC (4) ISO
  • 11. (5) None of these 16. Which of the following statements in regard to directories is false? (1) Directories with files can be deleted (2) Directories cannotbe renamed (3) The root directory is always at the highestlevel (4) Directories can existinside directories (5) None of the above 17. This part of operating system manages the essential peripherals,such as the keyboard, screen , disk drives, and parallel and serial ports_____ (1) basic input/outputsystem (2) secondaryinput/outputsystem (3) peripheral input/outputsystem (4) marginal input/outputsystem (5) None of these 18. MS-DOS is usuallysupplied on a (1) hard disk (2) cartridge tape (3) CD ROM (4) floppy disk or diskettes (5) None of these 19. Which one of the following is not a DOS prompt? (1) C > (2) B > (3) A > (4) ENTER (5) None of these. 20. Which one of the following is not an internal DOS command? (1) BACKUP (2) COPY (3) CLS (4) BREAK (5) None of these ANSWERS 1. 4 2. 2 3. 3 4. 4 5. 3 6. 4 7. 1 8. 2 9. 1 10. 4 11. 3 12. 1 13. 3 14. 2 15. 1 16. 2 17. 1
  • 12. 18. 4 19. 4 20. 1 1. Extension name of flash file is ___. 1) .pdf 2) .swf 3) .pmd 4) .prd 5) None of these 2. Who invented world wide web? 1) Mosaic corporation 2) Opera corporation 3) Tim berner lee 4) Vint cert 5) None of these 3. URL stands for ____. 1) Uniform Resource Locator 2) Universal resource locator 3) Address bar 4) All 1, 2 & 3 are correct 5) None of these 4. A thing presentin real world in physical form is called____. 1) DBMS 2) Entity 3) Modulation 4) Keywords 5) None of these 5. BUG is - 1) To find error in any software testing 2) To find error in any software code 3) logical error of any program 4) both 1 & 2 5) None of these 6. Which of the following is nota type of key? 1) Alphabetic Keys 2) Numeric keys 3) Function keys 4) Toggle keys 5) None of these 7. If a previously saved file is edited ___? (1) it cannot be saved again (2) the changes will automaticallybe saved in the file (3) the file will only have to be saved again if it is more than one page in length (4) its name mustbe changed (5) the file mustbe saved again to store the changes 8. Which of the following converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file? (1) Compiler
  • 13. (2) Interpreter (3) Converter (4) Instruction (5) None of these 9.A program that generallyhas more user-friendlyinterface than a DBMS is called a ____? (1) front end (2) repository (3) back end (4) form (5) None of these 10.When you install new programs on your computer,it is typically added to the ___? (1) All programs (2) Select programs (3) Start programs (4) Desktop programs (5) None of these 11. Which of the following statements is FALSE concerning file names? (1) Files may share the same name or the same extension butnot both (2) Every file in the same folder musthave a unique name (3) File extension is another name for file type (4) The file extension comes before the dot (.) followed by the file name (5) None of these 12. Which of the following is the key function of a firewall? (1) Monitoring (2) Deleting (3) Record (4) Copying (5) Moving 13. Programming language builtinto user programs such as Word and Excel are known as____? (1) 4GLs (2) macro languages (3) object-oriented languages (4) visual programming languages (5) None of these 14. In MS Word Key F12 opens ____? (1) Save dialog box (2) print dialog box (3) New dialog box (4) Save as dialog (5) none 15. What is gutter margin? (1) Margin that is added to the left margin when printing (2) Margin that is added to right margin when printing (3) Margin that is added to the binding side ofpage when printing (4) Margin that is added to the outside ofthe page when printing (5) None of these ANSWERS 1. 2
  • 14. 2. 3 3. 1 4. 2 5. 3 6. 5 7. 5 8. 1 9. 1 10. 1 11. 4 12. 1 13. 4 14. 4 15. 3 1. IP address contains ........... bits. (1) 8 bits (2)16 bits (3) 32 bits (4) 40 bits (5) None of these 2. Which key is used to indent a paragraph in MS word ? (1) Shift (2) tab (3) Ctrl (4) Esc (5) None of these 3. Which is the example of spread sheet ? (1) MS word (2) MS excel (3) Power point (4) MS Access (5) None of these 4. Name of the executable file of MS word is- (1) MS Word (2) MS Word .exe (3) Win Word (4) Win Word.exe (5) None of these 5. Which disk contains permanent magnetic disk ? (1) CD (2) DVD (3) HDD (4) BRD (5) None of these 6._________ is the process of finding and removing errors in software code. (1) Debugging (2) Compiling (3) Testing (4) Running (5) None of these
  • 15. 7. ____________ are viruses that are triggered by the passage of time or on a certaindate. (1) Boot-sector viruses (2) Macro viruses (3) Time bombs (4) Worms (5) None of these 8. Linux is a (n)______ ______ operating system. (1) open-source (2) Microsoft (3) Windows (4) Mac (5) None of these 9. What is a backup? (1) Restoring the information backup (2) An exact copy of a system’s information (3) The ability to get a system up and running in the event of a system crash or failure (4) All of these (5) None of these 10. Which of the following places the common data elements in order from smallest to largest (1) character, file, record,field, database (2) character, record,field, database,file (3) character, field,record, file, database (4) Bit, byte, character, record,field, file, database, (5) None of these 11. What is the file extension of Ms-Word document? 1) Dot 2) Doc 3) Dom 4) Txt 5) None of these 12. The vast network of computers that connects millions of people all over the world is called— 1) LAN 2) Web 3) Hypertext 4) Internet 5) None of these 13.________ is a primary key that also appears in another file. 1) Physical key 2) Primary key 3) Foreign key 4) Logical key 5) None of these 14. The software component of an export system that draws conclusion is the 1) User interface 2) Database 3) Inference engine 4) I/O controller 5) Model Base 15.________ is an invalid type of database key.
  • 16. 1) Structured primarykey 2) Atomic primarykey 3) Primary key 4) Composite primarykey 5) None of these 16. The OSI model is divided into_______ processes called layers. (1) five (2) six (3) seven (4) eight (5) None of these 17. System software is the set of programs that enables your computer’s hardware devices and______ software to work together. (1) management (2) processing (3) utility (4) application (5) None of these 18. ________ are specially designed computer chips which reside inside other devices, such as your car or your electronic thermostat. (1) Servers (2) Embedded computers (3) Robotic computers (4) Mainframes (5) None of these 19. The following are all computing devices , except……… (1) notebook computers (2) cellular telephones (3) digital scanners (4) personal digital assistants (5) None of these 20. In a ring topology , the computer in possession of the______ can trasmit data (1) packet (2) data (3) access method (4) token (5) None of these ANSWERS 1. (3) 2. (2) 3. (2) 4. (4) 5. (3) 6. (1) 7. (3) 8. (1) 9. (4) 10. (3) 11. (2) 12. (4) 13. (3)
  • 17. 14. (3) 15. (1) 16. (3) 17. (4) 18. (2) 19. (3) 20. (4) 1. When you save to _______,your data will remain intact even when the computer is turned off. a. RAM b. motherboard c. secondarystorage device d. primary storage device e. None of these 2. The motherboard is the a. circuit board that houses peripheral devices b. same as the CPU chip c. the firstchip that is accessed when the computer is turned on d. circuit board that contains a CPU and other chips e. None of these 3. A computer-intensive problem runs on a _______. 1) server 2) mainframe 3) supercomputer 4) super PC 5) None of these 4. A(n) _______ converts and executes one statement at a time. 1) compiler 2) interpreter 3) converter 4) instructions 5) None of these 5. The term _______ designates equipment that might be added to a computer system to enhance its functionality. 1) digital device 2) system add-on 3) disk pack 4) peripheral device 5) None of these 6. Approximately how many bytes make one Megabyte? 1) One Thousand 2) Ten Thousand 3) One Hundred 4) One Million 5) None of these 7. What is MP3? 1) A mouse 2) A printer 3) A sound format 4) A scanner
  • 18. 5) None of these 8. All the deleted files go to 1) Recycle Bin 2) Task Bar 3) Tool Bar 4) My Computer 5) None of these 9. _______ is the act of copying or downloading a program from a network and making multiple copies of it. 1) Network piracy 2) Plagiarism 3) Software piracy 4) Site-license piracy 5) None of these 10. A directory within a directory is called a _______. 1) Mini Directory 2) Junior Directory 3) Part Directory 4) Sub Directory 5) None of these 11. Which is the best definition of a software package? a. An add-on for your computer such as additional memory b. A setof computer programs used for a certain function such as word processing c. A protection you can buy for a computer d. The box, manual and licence agreementthataccompanycommercial software e. None of these 12. In MICR, C stands for 1) Code 2) Colour 3) Computer 4) Character 5) None of these 13. Fax machines and imaging systems are examples of 1) bar-code readers 2) imaging systems 3) scanning devices 4) pen-based systems 5) None of these 14. When writing a document, you can use the _______ feature to find an appropriate word or an alternative word if you find yourself stuck for the right word. 1) dictionary 2) word finder 3) encyclopedia 4) thesaurus 5) None of these 15. Which key is used in combination with another key to perform a specific task? 1) Function 2) Control 3) Arrow 4) Space bar
  • 19. 5) None of these 16. A disk’s content that is recordedat the time of manufacture and that cannot be changed or erasedby the user is 1) read-only 2) memory-only 3) run-only 4) write-only 5) None of these 17. In an information system, alphanumeric data normally takes the form of a. Sentences and paragraphs b. Numbers and alphabetical characters c. Graphic shapes and figures d. Human voice and other sounds e. None of these 18. A Web site’s main page is called its _______ 1) home page 2) browser page 3) search place 4) bookmark 5) None of these 19. When installing _______,the user must copy and usually decompress program files from a CD-ROM or other medium to the hard disk. 1) programming software 2) system hardware 3) applications hardware 4) applications software 5) None of these 20. A collection of interrelated files in a computer is a _______. 1) file manager 2) field 3) record 4) database 5) None of these ANSWERS ANSWERS 1. c 2. d 3. 3 4. 2 5. 4 6. 4 7. 3 8. 1 9. 3 10. 4 11. b 12. 4 13. 3 14. 4 15. 2
  • 20. 16. 1 17. b 18. 1 19. 4 20. 4 1. A device operating at the physical layeris calleda 1) Bridge 2) Router 3) Repeater 4) All of the above 5) None of these 2. For separating channels in FDM, it is necessary to use 1) Time slots 2) Bandpass filters 3) Differentiation 4) All of the above 5) None of these 3. Encryption and decryption are functions of 1) Transport layer 2) Session layer 3) Presentation layer 4) All of the above 5) None of these 4. Which of the following computer language is a mathematically orientedlanguages usedforscientificproblems? 1) FORTRAN 2) COBOL 3) LISP 4) PROLOG 5) APPLE 5. ________ is when the more power-hungry components, such as the monitorand the hard drive, are put in idle. 1) Hibernation 2) Power down 3) Standby mode 4) The shutdown procedure 5) None of these 6. Hard disk drives are considered________ storage. 1) flash 2) non-volatile 3) temporary 4) nonpermanent 5) None of these 7. The ________ key and the ________ key can be used in combination with otherkeys to perform shortcuts and special tasks. 1) Control, Alt 2) Function, toggle 3) Delete, Insert 4) Caps Lock, Num Lock 5) None of these 8. The most common input devices are the ________ and the ________. 1) microphone, printer 2) scanner, monitor 3) digital camera, speakers 4) keyboard, mouse 5) None of these
  • 21. 9. To save an existing filewith a newname or to a newlocation, you shoulduse the ________ command. 1) Save 2) Save and Replace 3) Save As 4) New File 5) None of these 10. A(n) ________ is a combination of hardware and software that facilitates the sharing of information between computing devices. 1) network 2) peripheral 3) expansion board 4) digital device 5) None of these 11. The term bit is short for ________ 1) megabyte 2) binary language 3) binary digit 4) binary number 5) None of these 12. Computers gather data, which means that they allow users to ________ data. 1) present 2) input 3) output 4) store 5) None of these 13. Which of the following terms is just the connection of networks that can be joinedtogether? 1) virtual private network 2) internet 3) intranet 4) extranet 5) None of these 14. ________ is a form of permanent memory that holds all the instructions the computerneeds to start up and does not get erasedwhen the power is turnedoff. 1) The Network Interface Card (NIC) 2) The CPU 3) RAM 4) ROM 5) None of these 15. Servers are computers that provide resources to othercomputers connected to a ________ 1) network 2) mainframe 3) supercomputer 4) client 5) None of these 1. 3 2. 2 3. 3 4. 1 5. 3 6. 2 7. 1 8. 4 9. 3 10. 1 11. 3 12. 2
  • 22. 13. 2 14. 4 15. 1 1. What is the responsibilityof the logical unitin the CPU of a computer? a) Producing result b) Comparing numbers c) Controlling flow of information d) Performing mathematical operations e) Controlling flow of data 2. Abacus was the first ___ a) Electronic computer b) Mechanical computer c) Electronic calculator d) Mechanical calculator e) Electronic chip 3. If in a computer,16 bits are used to specify address in a RAM, the number ofaddresses will be ___ a) 216 b) 65,536 c) 64K d) 128K e) 135K 4. Instructions and memoryaddress are represented by___ a) Character code b) Binary code c) Binary word d) Parity bit e) Bite code 5. The terminal device that functions as a cash register,computer terminal and OCR reader is: a) Data collection terminal b) OCR register terminal c) Video Displayterminal d) POS terminal e) None of the above 6. A setof flip flops integrated together is called ____ a) Counter b) Adder c) Register d) Flip flop e) All of the above 7. People often call ______ as the brain of computer system. a) Control Unit b) Arithmetic Logic Unit c) Central Processing Unit d) Storage Unit e) Store data 8. Which of the following is used for manufacturing chips? a) Bus b) Control unit c) Semiconductors
  • 23. d) a and b only e) None of the above 9. The value of each bead in heaven is ___ a) 1 b) 3 c) 5 d) 7 e) 8 10. The first computer introduced in Nepal was ___ a) IBM 1400 b) IBM 1401 c) IBM 1402 d) IBM 1406 e) IBM 1405 11. Bluetooth is a type of radio wave information transmission system thatis good for about: a) 30 feet b) 30 yards c) 30 miles d) 300 miles e) 3000 miles 12. The telephone is an example of a(n)____ signal. a) analog b) digital c) modulated d) demodulated e) compiler 13. Acredit card-sized expansion board thatis inserted into portable computers thatconnects the modem to the telephone wall jack is: a) Internal modem b) External modem c) PC Card modem d) Wireless modem e) Wired modem 14. A modem thatis contained within the system unitis called: a) External b) Internal c) Wireless d) Wi-Fi e) Bluetooth 15. A modem thatdoesn'tneed to be connected to a telephone line is the ___ modem. a) external b) internal c) wireless d) DSL e) NSL 16. Aspecial high-speed line used bylarge corporations to supportdigital communications is known as: a) satellite/air connection service lines b) cable modems c) digital subscriber lines d) T1, T2, T3 and T4 lines
  • 24. e) None of the above 17. An affordable technologythat uses existing telephone lines to provide high-speed connections is called ________. a) ISDN b) microwave c) cable modem d) DSL e) ALU 18. The capacity of a communication channel is measured in ___ a) Bandwidth b) Bit capacity c) Baud rate d) Data flow e) Store data 19. A relatively new technology that allows wireless connectivity: a) Bluetooth b) Black tooth c) Blue band d) Broadband e) Wi- fi 20. In MS-DOS 5.0, which is the number that acts as a code to uniquelyidentify the software product? a) MS b) DOS c) MS DOS d) 5.0 e) 4.2.0 1) b; 2) d; 3) b; 4) b; 5) d; 6) c; 7) c; 8) c; 9) c; 10) b 11) a; 12) a; 13) c; 14) b; 15) c; 16) d; 17) d; 18) a; 19) a; 20) d;