Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Computer
1. 1. In addition to keying data directly into a database, data entry can be done from a(n)
1) input form
2) table
3) field
4) data dictionary
5) None of these
2. What is an e-mail attachment?
1) A receipt sent by the recipient
2) A separate document from another program sent along with an e-mail message
3) A malicious parasite that feeds off your messages and destroys the contents
4) A list of CC or BCC recipients
5) None of these
3. SMTP, FTP and DNS are applications of the ____ layer.
1) data link
2) network
3) transport
4) application
5) None of these
4. In a database, information should be organised and accessed according to which of the
following?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these
5. A _______ is a computer connected to two networks.
1) link
2) server
3) gateway
4) bridge way
5) None of these
6. A file extension is separated from the main file name with a(n) _______, but no spaces.
1) question mark
2) exclamation mark
3) underscore
4) period
5) None of these
7. A telephone number, a birth date, and a customer name are all examples of
2. 1) a record
2) data
3) a file
4) a database
5) None of these
8. The term _______ designates equipment that might be added to a computer system to
enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
9. Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None of these
10. The real business and competitive value of information technology lies in
1) The software applications that are used by many companies
2) The capabilities of the software and value of the information, a business
acquires and uses
3) The infrastructure of hardware, networks, and other IT facilities that are commonly
used by many companies
4) The capabilities of the hardware and the speed at which it processes information
5) None of these
11. OCR stands for _____
(1) Optical Character Recognition
(2) Optical CPU Recognition
(3) Optimal Character Rendering
(4) Other Character Restoration
(5) None of these
12. If a new device is attached to a computer, such as a printer or scanner, its ______ must be
installed before the device can be used.
1) buffer
2) driver
3) pager
4) server
5) None of these
13. The software that allows users to surf the Internet is called a/an
3. (1) Search engine
(2) Internet Service Provider (ISP)
(3) Multimedia application
(4) Browser
(5) None of these
14. A tuple is a
1) column of a table
2) two-dimensional table
3) row of a table
4) key of a table
5) None of these
15. The method of file organization in which data records in a file are arranged in a
specified order according to a key field is known as the
1) Direct access method
2) Queuing method
3) Predetermined method
4) Sequential access method
5) None of these
16. In Excel,_____ contains one or more worksheets.
1) Template
2) Workbook
3) Active cell
4) Label
5) None of these
17. Which of the following is a popular programming language for developing multimedia
web pages, websites, and web-based applications?
1) COBOL
2) Java
3) BASIC
4) Assembler
5) None of these
18. Compiling creates a(n) _____ .
1) program specification
2) algorithm
3) executable program
4) subroutine
5) None of these
19. A CD-RW disk
(1) has a faster access than an internal disk
(2) is a form of optical disk, so it can only be written once
(3) holds less data than a floppy disk
(4) can be erased and rewritten
(5) None of these
4. 20. The first page of a Web site is called the
1) Home page
2) Index
3) Java Script
4) Book mark
5) None of these
1. Full form of TCP is:
(1) Transmission Control Protocol
(2) Total Control Protocol
(3) Transmission Control Program
(4) Totaling Control Program
(5) None of these
2. __ provides a common address space and routes the packets of data across the entire
internet?
(1) IP
(2) TCP
(3) UDP
(4) ALU
(5) None of these
3. Cyberspace is being governed by a system of law and regulation called?
(1) Civil Law
(2) Criminal Law
(3) Electronic Law
(4) Cyber Law
(5) Cyber Authority
4. To move to the beginning of a line of text, press __key?
(1) Home
(2) Ctrl
(3) Space
(4) Enter
(5) None of these
5. What menu is selected to change the font and style?
(1) Tools
(2) File
(3) Format
(4) Edit
(5) None of these
6. The process of starting the computer and loading of operating system programs for
execution is known as
(1) initialization
5. (2) retrieving
(3) loading
(4) searching
(5) booting
7. Primary memory is used by the:
(1) user
(2) input device
(3) CPU
(4) all of these
(5) None of these
8. In a disk, each block of data is written into -
(1) one sector
(2) three sector
(3) Two sectors
(4) Two or more sectors
(5) either two or three sectors:
9. The Pentium processor contains-
(1) tens of thousands of transistors
(2) hundred thousands of transistors
(3) thousands of transistors
(4) several millions of transistors
(5) hundred transistors
10. __ was the precursor to internet as we know it today?
(1) ARPANET
(2) USENET
(3) TELNET
(4) DBMS
(5) None of these
11. Which of the following is not an operating system?
(1) DOS
(2) Oracle
(3) Linux
(4) Windows
(5) None of these
12. In word, what combination of keys do you press to delete an entire word?
(1) Ctrl + del
(2) Alt + del
(3) Shift + Backspace
(4) Shift + Alt + del
(5) None of these
13. Hardware that adds two numbers is:
(1) the control unit
6. (2) an internal CPU register
(3) arithmetic Logic Unit
(4) Browser
(5) None of these
14. A small amount of memory included in the processor for high speed access id called-
(1) Register
(2) Cache
(3) RAM
(4) ROM
(5) None of these
15. A byte represents a group of:
(1) 10 bits (2) 40 bits
(3) 16 bits (4) 18 bits
(5) 8 bits
1. Which of the following is partof the system unit?
(1) Keyboard
(2) Floppy disks
(3) Monitor
(4) Memory
(5) CD
2. Specialized programs thatallow particular inputor output devices to communicate with the restof the
computer system are called ____.
(1) operating systems
(2) utilities
(3) device drivers
(4) language translators
(5) Connectors
3. The primary purpose ofsoftware is to turn data into:
(1) Websites
(2) graphs
(3) programs
(4) objects
(5) information
4. The _____________ enables you to simultaneouslykeep multiple web pages open in one browser win dow.
(1) Tab bar
(2) pop-up helper
(3) Tab row
(4) Address bar
(5) None of these
5. Information is?
(1) Summarization process ofdata
(2) Data Information
(3) Textual form of data
(4) Facts and figures
(5) None of these
6. Total memoryof system can be known using?
7. (1) DIR commands
(2) MEM commands
(3) Warm boot
(4) TOT MEM commands
(5) None of these
7. The first graphical web browser are?
(1) Gopher
(2) WAIS
(3) CERN
(4) Mosaic
(5) None of these
8. Which of the following is correct?
(1) POWER(2^3)
(2) POWER(2,3
(3) POWER(2#3)
(4) POWER(2*3)
(5) None of these
9. What whatis the default font in MS Word?
(1) Gothic Bold
(2) MV Biol
(3) Times new roman
(4) Arial
(5) None of these
10. ………………is the process ofcarrying out commands.
(1) Fetching
(2) Storing
(3) Executing
(4) Decoding
(5) None of these
11. LatestEntry Level Desktop PC have at leastmore than ------ of RAM.
(1) 100bit
(2) 100Byte
(3) 100KB
(4) 100 MB
(5) None of these
12. ---------- Bar is located at top of WordPad / Notepad /MS Word window.
(1) Title
(2) Menu
(3) Tool
(4) Format
(5) None of these
13. What is the decimal from of 3b4?
(1) 846
(2) 848
(3) 946
(4) 948
(5) None of these
14. The ---------- button on the quick access toolbar allow you to cancel your recent commands or action.
(1) Search
(2) Cut
8. (3) Document
(4) Undo
(5) None of these
15. What type of virus use computer hosts to reproduces it?
(1) Time bomb
(2) worm
(3) Melissa virus
(4) Macro virus
(5) None of these
16. ---------- is a signaling method thathandles a relatively wide range of frequencies.
(1) Broadband
(2) DLF
(3) Dial-up
(4) both 1& 3
(5) None of these
17. Block on buffer caches are used:
(1) to handle interrupts
(2) to increase capacityof main memory
(3) to improve disk performance
(4)to speed up main memoryread operation
(5) None of these
18. The term --- designate equipmentthatmightbe added to a computer system to enhance.Its functionality.
(1) Digital device
(2) system add
(3) Disk pack
(4) Peripheral device
(5) None of these
19. A disk content that is recorded at the time of manufacture and thatcannot be changed or erased by the user.
(1) READ ONLY
(2) Memory only
(3) Run only
(4) WRITES ONLY
(5) None of these
20. A device designed to read information encoded onto a small plastic card is .
(1) lightpen
(2) pun chard card
(3) magnetic tape
(4) magnetic
(5) badge reader
ANSWERS
1. 4
2. 3
3. 5
4. 3
5. 1
6. 2
7. 4
8. 2
9. 5
10. 3
9. 11. 4
12. 1
13. 4
14. 4
15. 2
16. 1
17. 3
18. 4
19. 1
20. 5
1. The vast network of computers thatconnects millions ofpeople all over the world is called.
(1)LAN
(2)web
(3)hypertext
(4)internet
(5)None of these
2. The property that, when classes are arranged in a hierarchy, each class assumes the attributes and methods
of its ancestors is
(1) generalization
(2) inheritance
(3) encapsulation
(4) information hiding
(5) None of these
3. The software componentofan expert system thatdraws conclusions is the.
(1)user interface
(2)database
(3)inference engine
(4)1/0 controller
(5)model base
4. The attributes and methods for each objectare stored in.
(1) an objectinstance
(2) an objectconnection
(3) an assemblystructure
(4) an objectrepository
(5) None of these
5. An E-R diagram is a graphic method of presenting
(1) primarykeys and their relationships
(2) primarykeys and their relationships to instances
(3) entity classes and their relationships
(4) entity classes and their relationships to primarykeys
(5) None of the above
6. The OCR is used for the preparation of
(1) electricity bills
(2) insurance premium
(3) telephone bills
(4) All of these
(5) None of these
7. Speed of line printer is limited by the speed of
(1) paper movements
(2) cartridge used
(3) length of paper
10. (4) All of these
(5) None of these
8. In laser printers,printing is achieved by deflecting laser beam on to surface of a drum
(1) magnetized
(2) photosensitive
(3) magnetic
(4) Either (1)or (2)
(5) None of these
9. Resolution oflaser printer is specified in terms of
(1) DPI
(2) LPM
(3) CPM
(4) PPM
(5) None of these
10. What are the units used to countthe speed of a printer?
(1) CPM
(2) DPI
(3) PPM
(4) BIT
(5) None of these
11. The binary equivalentof decimal number 98 is
(1) 1110001
(2) 1110100
(3) 1100010
(4) 1111001
(5) None of these
12. The productof two binary numbers (1011) and (1001) is
(1) 1100011
(2) 1010100
(3) 1011001
(4) 100110
(5) None of these
13. A byte represents a group of
(1) 10 bits
(2) 40 bits
(3) 8 bits.
(4) 22 bits
(5) None of these
14. A hexadigit can be represented by
(1) three binary (consecutive) bits
(2) four binary (consecutive) bits
(3) eightbinary (consecutive) bits
(4) sixteen binary (consecutive) bits
(5) None of the above
15. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the
corresponding bits?
(1) ANSI
(2) ASCII
(3) EBCDIC
(4) ISO
11. (5) None of these
16. Which of the following statements in regard to directories is false?
(1) Directories with files can be deleted
(2) Directories cannotbe renamed
(3) The root directory is always at the highestlevel
(4) Directories can existinside directories
(5) None of the above
17. This part of operating system manages the essential peripherals,such as the keyboard, screen , disk drives,
and parallel and serial ports_____
(1) basic input/outputsystem
(2) secondaryinput/outputsystem
(3) peripheral input/outputsystem
(4) marginal input/outputsystem
(5) None of these
18. MS-DOS is usuallysupplied on a
(1) hard disk
(2) cartridge tape
(3) CD ROM
(4) floppy disk or diskettes
(5) None of these
19. Which one of the following is not a DOS prompt?
(1) C >
(2) B >
(3) A >
(4) ENTER
(5) None of these.
20. Which one of the following is not an internal DOS command?
(1) BACKUP
(2) COPY
(3) CLS
(4) BREAK
(5) None of these
ANSWERS
1. 4
2. 2
3. 3
4. 4
5. 3
6. 4
7. 1
8. 2
9. 1
10. 4
11. 3
12. 1
13. 3
14. 2
15. 1
16. 2
17. 1
12. 18. 4
19. 4
20. 1
1. Extension name of flash file is ___.
1) .pdf
2) .swf
3) .pmd
4) .prd
5) None of these
2. Who invented world wide web?
1) Mosaic corporation
2) Opera corporation
3) Tim berner lee
4) Vint cert
5) None of these
3. URL stands for ____.
1) Uniform Resource Locator
2) Universal resource locator
3) Address bar
4) All 1, 2 & 3 are correct
5) None of these
4. A thing presentin real world in physical form is called____.
1) DBMS
2) Entity
3) Modulation
4) Keywords
5) None of these
5. BUG is -
1) To find error in any software testing
2) To find error in any software code
3) logical error of any program
4) both 1 & 2
5) None of these
6. Which of the following is nota type of key?
1) Alphabetic Keys
2) Numeric keys
3) Function keys
4) Toggle keys
5) None of these
7. If a previously saved file is edited ___?
(1) it cannot be saved again
(2) the changes will automaticallybe saved in the file
(3) the file will only have to be saved again if it is more than one page in length
(4) its name mustbe changed
(5) the file mustbe saved again to store the changes
8. Which of the following converts all the statements in a program in a single batch and the resulting collection of
instructions is placed in a new file?
(1) Compiler
13. (2) Interpreter
(3) Converter
(4) Instruction
(5) None of these
9.A program that generallyhas more user-friendlyinterface than a DBMS is called a ____?
(1) front end
(2) repository
(3) back end
(4) form
(5) None of these
10.When you install new programs on your computer,it is typically added to the ___?
(1) All programs
(2) Select programs
(3) Start programs
(4) Desktop programs
(5) None of these
11. Which of the following statements is FALSE concerning file names?
(1) Files may share the same name or the same extension butnot both
(2) Every file in the same folder musthave a unique name
(3) File extension is another name for file type
(4) The file extension comes before the dot (.) followed by the file name
(5) None of these
12. Which of the following is the key function of a firewall?
(1) Monitoring
(2) Deleting
(3) Record
(4) Copying
(5) Moving
13. Programming language builtinto user programs such as Word and Excel are known as____?
(1) 4GLs
(2) macro languages
(3) object-oriented languages
(4) visual programming languages
(5) None of these
14. In MS Word Key F12 opens ____?
(1) Save dialog box
(2) print dialog box
(3) New dialog box
(4) Save as dialog
(5) none
15. What is gutter margin?
(1) Margin that is added to the left margin when printing
(2) Margin that is added to right margin when printing
(3) Margin that is added to the binding side ofpage when printing
(4) Margin that is added to the outside ofthe page when printing
(5) None of these
ANSWERS
1. 2
14. 2. 3
3. 1
4. 2
5. 3
6. 5
7. 5
8. 1
9. 1
10. 1
11. 4
12. 1
13. 4
14. 4
15. 3
1. IP address contains ........... bits.
(1) 8 bits
(2)16 bits
(3) 32 bits
(4) 40 bits
(5) None of these
2. Which key is used to indent a paragraph in MS word ?
(1) Shift
(2) tab
(3) Ctrl
(4) Esc
(5) None of these
3. Which is the example of spread sheet ?
(1) MS word
(2) MS excel
(3) Power point
(4) MS Access
(5) None of these
4. Name of the executable file of MS word is-
(1) MS Word
(2) MS Word .exe
(3) Win Word
(4) Win Word.exe
(5) None of these
5. Which disk contains permanent magnetic disk ?
(1) CD
(2) DVD
(3) HDD
(4) BRD
(5) None of these
6._________ is the process of finding and removing errors in software code.
(1) Debugging
(2) Compiling
(3) Testing
(4) Running
(5) None of these
15. 7. ____________ are viruses that are triggered by the passage of time or on a certaindate.
(1) Boot-sector viruses
(2) Macro viruses
(3) Time bombs
(4) Worms
(5) None of these
8. Linux is a (n)______ ______ operating system.
(1) open-source
(2) Microsoft
(3) Windows
(4) Mac
(5) None of these
9. What is a backup?
(1) Restoring the information backup
(2) An exact copy of a system’s information
(3) The ability to get a system up and running in the event of a system crash or failure
(4) All of these
(5) None of these
10. Which of the following places the common data elements in order from smallest to largest
(1) character, file, record,field, database
(2) character, record,field, database,file
(3) character, field,record, file, database
(4) Bit, byte, character, record,field, file, database,
(5) None of these
11. What is the file extension of Ms-Word document?
1) Dot
2) Doc
3) Dom
4) Txt
5) None of these
12. The vast network of computers that connects millions of people all over the world is called—
1) LAN
2) Web
3) Hypertext
4) Internet
5) None of these
13.________ is a primary key that also appears in another file.
1) Physical key
2) Primary key
3) Foreign key
4) Logical key
5) None of these
14. The software component of an export system that draws conclusion is the
1) User interface
2) Database
3) Inference engine
4) I/O controller
5) Model Base
15.________ is an invalid type of database key.
16. 1) Structured primarykey
2) Atomic primarykey
3) Primary key
4) Composite primarykey
5) None of these
16. The OSI model is divided into_______ processes called layers.
(1) five
(2) six
(3) seven
(4) eight
(5) None of these
17. System software is the set of programs that enables your computer’s hardware devices and______
software to work together.
(1) management
(2) processing
(3) utility
(4) application
(5) None of these
18. ________ are specially designed computer chips which reside inside other devices, such as your car
or your electronic thermostat.
(1) Servers
(2) Embedded computers
(3) Robotic computers
(4) Mainframes
(5) None of these
19. The following are all computing devices , except………
(1) notebook computers
(2) cellular telephones
(3) digital scanners
(4) personal digital assistants
(5) None of these
20. In a ring topology , the computer in possession of the______ can trasmit data
(1) packet
(2) data
(3) access method
(4) token
(5) None of these
ANSWERS
1. (3)
2. (2)
3. (2)
4. (4)
5. (3)
6. (1)
7. (3)
8. (1)
9. (4)
10. (3)
11. (2)
12. (4)
13. (3)
17. 14. (3)
15. (1)
16. (3)
17. (4)
18. (2)
19. (3)
20. (4)
1. When you save to _______,your data will remain intact even when the computer is turned off.
a. RAM
b. motherboard
c. secondarystorage device
d. primary storage device
e. None of these
2. The motherboard is the
a. circuit board that houses peripheral devices
b. same as the CPU chip
c. the firstchip that is accessed when the computer is turned on
d. circuit board that contains a CPU and other chips
e. None of these
3. A computer-intensive problem runs on a _______.
1) server
2) mainframe
3) supercomputer
4) super PC
5) None of these
4. A(n) _______ converts and executes one statement at a time.
1) compiler
2) interpreter
3) converter
4) instructions
5) None of these
5. The term _______ designates equipment that might be added to a computer system to enhance its
functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
6. Approximately how many bytes make one Megabyte?
1) One Thousand
2) Ten Thousand
3) One Hundred
4) One Million
5) None of these
7. What is MP3?
1) A mouse
2) A printer
3) A sound format
4) A scanner
18. 5) None of these
8. All the deleted files go to
1) Recycle Bin
2) Task Bar
3) Tool Bar
4) My Computer
5) None of these
9. _______ is the act of copying or downloading a program from a network and making multiple copies of
it.
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-license piracy
5) None of these
10. A directory within a directory is called a _______.
1) Mini Directory
2) Junior Directory
3) Part Directory
4) Sub Directory
5) None of these
11. Which is the best definition of a software package?
a. An add-on for your computer such as additional memory
b. A setof computer programs used for a certain function such as word processing
c. A protection you can buy for a computer
d. The box, manual and licence agreementthataccompanycommercial software
e. None of these
12. In MICR, C stands for
1) Code
2) Colour
3) Computer
4) Character
5) None of these
13. Fax machines and imaging systems are examples of
1) bar-code readers
2) imaging systems
3) scanning devices
4) pen-based systems
5) None of these
14. When writing a document, you can use the _______ feature to find an appropriate word or an
alternative word if you find yourself stuck for the right word.
1) dictionary
2) word finder
3) encyclopedia
4) thesaurus
5) None of these
15. Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar
19. 5) None of these
16. A disk’s content that is recordedat the time of manufacture and that cannot be changed or erasedby
the user is
1) read-only
2) memory-only
3) run-only
4) write-only
5) None of these
17. In an information system, alphanumeric data normally takes the form of
a. Sentences and paragraphs
b. Numbers and alphabetical characters
c. Graphic shapes and figures
d. Human voice and other sounds
e. None of these
18. A Web site’s main page is called its _______
1) home page
2) browser page
3) search place
4) bookmark
5) None of these
19. When installing _______,the user must copy and usually decompress program files from a CD-ROM
or other medium to the hard disk.
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these
20. A collection of interrelated files in a computer is a _______.
1) file manager
2) field
3) record
4) database
5) None of these
ANSWERS
ANSWERS
1. c
2. d
3. 3
4. 2
5. 4
6. 4
7. 3
8. 1
9. 3
10. 4
11. b
12. 4
13. 3
14. 4
15. 2
20. 16. 1
17. b
18. 1
19. 4
20. 4
1. A device operating at the physical layeris calleda
1) Bridge
2) Router
3) Repeater
4) All of the above
5) None of these
2. For separating channels in FDM, it is necessary to use
1) Time slots
2) Bandpass filters
3) Differentiation
4) All of the above
5) None of these
3. Encryption and decryption are functions of
1) Transport layer
2) Session layer
3) Presentation layer
4) All of the above
5) None of these
4. Which of the following computer language is a mathematically orientedlanguages usedforscientificproblems?
1) FORTRAN
2) COBOL
3) LISP
4) PROLOG
5) APPLE
5. ________ is when the more power-hungry components, such as the monitorand the hard drive, are put in idle.
1) Hibernation
2) Power down
3) Standby mode
4) The shutdown procedure
5) None of these
6. Hard disk drives are considered________ storage.
1) flash
2) non-volatile
3) temporary
4) nonpermanent
5) None of these
7. The ________ key and the ________ key can be used in combination with otherkeys to perform shortcuts and
special tasks.
1) Control, Alt
2) Function, toggle
3) Delete, Insert
4) Caps Lock, Num Lock
5) None of these
8. The most common input devices are the ________ and the ________.
1) microphone, printer
2) scanner, monitor
3) digital camera, speakers
4) keyboard, mouse
5) None of these
21. 9. To save an existing filewith a newname or to a newlocation, you shoulduse the ________ command.
1) Save
2) Save and Replace
3) Save As
4) New File
5) None of these
10. A(n) ________ is a combination of hardware and software that facilitates the sharing of information between
computing devices.
1) network
2) peripheral
3) expansion board
4) digital device
5) None of these
11. The term bit is short for ________
1) megabyte
2) binary language
3) binary digit
4) binary number
5) None of these
12. Computers gather data, which means that they allow users to ________ data.
1) present
2) input
3) output
4) store
5) None of these
13. Which of the following terms is just the connection of networks that can be joinedtogether?
1) virtual private network
2) internet
3) intranet
4) extranet
5) None of these
14. ________ is a form of permanent memory that holds all the instructions the computerneeds to start up and does
not get erasedwhen the power is turnedoff.
1) The Network Interface Card (NIC)
2) The CPU
3) RAM
4) ROM
5) None of these
15. Servers are computers that provide resources to othercomputers connected to a ________
1) network
2) mainframe
3) supercomputer
4) client
5) None of these
1. 3
2. 2
3. 3
4. 1
5. 3
6. 2
7. 1
8. 4
9. 3
10. 1
11. 3
12. 2
22. 13. 2
14. 4
15. 1
1. What is the responsibilityof the logical unitin the CPU of a computer?
a) Producing result
b) Comparing numbers
c) Controlling flow of information
d) Performing mathematical operations
e) Controlling flow of data
2. Abacus was the first ___
a) Electronic computer
b) Mechanical computer
c) Electronic calculator
d) Mechanical calculator
e) Electronic chip
3. If in a computer,16 bits are used to specify address in a RAM, the number ofaddresses will be ___
a) 216
b) 65,536
c) 64K
d) 128K
e) 135K
4. Instructions and memoryaddress are represented by___
a) Character code
b) Binary code
c) Binary word
d) Parity bit
e) Bite code
5. The terminal device that functions as a cash register,computer terminal and OCR reader is:
a) Data collection terminal
b) OCR register terminal
c) Video Displayterminal
d) POS terminal
e) None of the above
6. A setof flip flops integrated together is called ____
a) Counter
b) Adder
c) Register
d) Flip flop
e) All of the above
7. People often call ______ as the brain of computer system.
a) Control Unit
b) Arithmetic Logic Unit
c) Central Processing Unit
d) Storage Unit
e) Store data
8. Which of the following is used for manufacturing chips?
a) Bus
b) Control unit
c) Semiconductors
23. d) a and b only
e) None of the above
9. The value of each bead in heaven is ___
a) 1
b) 3
c) 5
d) 7
e) 8
10. The first computer introduced in Nepal was ___
a) IBM 1400
b) IBM 1401
c) IBM 1402
d) IBM 1406
e) IBM 1405
11. Bluetooth is a type of radio wave information transmission system thatis good for about:
a) 30 feet
b) 30 yards
c) 30 miles
d) 300 miles
e) 3000 miles
12. The telephone is an example of a(n)____ signal.
a) analog
b) digital
c) modulated
d) demodulated
e) compiler
13. Acredit card-sized expansion board thatis inserted into portable computers thatconnects the modem
to the telephone wall jack is:
a) Internal modem
b) External modem
c) PC Card modem
d) Wireless modem
e) Wired modem
14. A modem thatis contained within the system unitis called:
a) External
b) Internal
c) Wireless
d) Wi-Fi
e) Bluetooth
15. A modem thatdoesn'tneed to be connected to a telephone line is the ___ modem.
a) external
b) internal
c) wireless
d) DSL
e) NSL
16. Aspecial high-speed line used bylarge corporations to supportdigital communications is known as:
a) satellite/air connection service lines
b) cable modems
c) digital subscriber lines
d) T1, T2, T3 and T4 lines
24. e) None of the above
17. An affordable technologythat uses existing telephone lines to provide high-speed connections
is called ________.
a) ISDN
b) microwave
c) cable modem
d) DSL
e) ALU
18. The capacity of a communication channel is measured in ___
a) Bandwidth
b) Bit capacity
c) Baud rate
d) Data flow
e) Store data
19. A relatively new technology that allows wireless connectivity:
a) Bluetooth
b) Black tooth
c) Blue band
d) Broadband
e) Wi- fi
20. In MS-DOS 5.0, which is the number that acts as a code to uniquelyidentify the software product?
a) MS
b) DOS
c) MS DOS
d) 5.0
e) 4.2.0
1) b;
2) d;
3) b;
4) b;
5) d;
6) c;
7) c;
8) c;
9) c;
10) b
11) a;
12) a;
13) c;
14) b;
15) c;
16) d;
17) d;
18) a;
19) a;
20) d;