1. Which computer has been designed to be as compact as possible?
1) Mini
2) Super computer
3) Micro computer
4) Mainframe
5) None of the above
2. The symbols used in an assembly language are
1) Codes
2) Mnemonics
3) Assembler
4) Literals
5) All of the above
3. Portrait and Landscape are
1) Page Orientation
2) Paper Size
3) Page Layout
4) Margin type
5) All of the above
4.Any storage device added to a computer beyond the immediately usable main storage is known as
1) Floppy disk
2) Hard disk
3) Backing store
4) Punched card
5) Magnetic Tape
5. Which output device is used for translating information from a computer into pictorial form on paper
1) Mouse
2) Plotter
3) Touch panel
4) Card punch
5) Keyboard
6.A computer assisted method for the recording and analyzing of existing or hypothetical systems is
1) Data transmission
2) Data flow
3) Data capture
4) Data processing
5) Data validation
7. Which access method is used for obtaining a record from a cassette tape?
1) Direct
2) Sequential
3) Random
4) ISAM
5) VSAM
8. Find the ODD one.
1) JAVA
2) Cobol
3) Fortran
4) Linux
5) ADA
9. The 2's compliment of a binary no. is obtained by adding.....to its 1's compliment.
1) 0
2) 1
3)10
4) 12
5) 13
10. With respect to a network interface card, the term 10/100 refers to
1) protocol speed
2) a fiber speed
3) megabits per seconds
4) minimum and maximum server speed
5) data capacity
11. The terms "red book", "yellow book", and "orange book" refer to:
1) SCSI
2) IDE
3) floppy drive technology
4) CD-ROM standards
5) SATA
12. In ROM BIOS, the acronym BIOS stands for:
1) Basic Intuitive Output Set
2) Basic Input Organizational System
3) Basic Input Output System
4) Basic Industry Operating System
5) Basic Input Output Set
13. Which DOS command will format a floppy disk and transfer the system files
1) SYS C: A:
2) SYS A:
3) FORMAT A: /S
4) FORMAT A: /T
5) SYS C:
14. Which command will be used to display file and directory names only, without size, date, and time information?
1) DIR/W
2) DIR A:
3) DIR/B
4) DIR/S
5) DIR
15. Which of the following is not a logical data-base structure?
1) tree
2) relational
3) network
4) chain
5) None of the above
16. Updating a database means
1) revising the file structure
2) reorganizing the database
3) modifying or adding record occurrences
4) Sorting
5) Indexing
17.Any and every command can be found on the
1) Drawing toolbar
2) Formatting toolbar
3) Standard toolbar
4) Menu bar
5) View toolbar
18. Which of the following should be used when you want to add a slide to an existing presentation?
1) File, add a new slide
2) Insert, new slide
3) File, open
4) File, new
5) None of the above
19. Which of the following items are examples of storage devices?
1) Floppy disks
2) CD-ROMs
3) Tape devices
4) Hard Disk
5) All of the above
20. The original ASCII code used .... bits of each byte, reserving that last bit for error checking
1) 5
2) 6
3) 7
4) 8
5) 16
21. Word length of a computer is measured in
1) Bytes
2) Millimeters
3) Meters
4) Bits
5) All the above
22. Which type of computers uses the 8-bit code called EBCDIC?
1) Minicomputers
2) Microcomputers
3) Mainframe computers
4) Super computer
5) Lap Tops
23. ATM terminals are example for
1) Smart Terminals
2) Intelligent terminals
3) Dumb terminals
4) Offline terminals
5) None of the above
24.A name or number used to identify a storage location is called
1) A byte
2) A record
3) An address
4) An instruction
5) All of above
25. The difference between memory and storage is that memory is .... and storage is .....
1) temporary, permanent
2) permanent, temporary
3) slow, fast
4) big, Small
5) None of the above
26. Offline device is
1) A device which is not connected to CPU
2) A device which is connected to CPU
3) A direct access storage device
4) An I/O device
5) None of the above
27. Which of the following registers is used to keep track of address of the memory location where the next instruction is located?
1) Memory address register
2) Memory data register
3) Instruction register
4) Program counter
5) Flag Register
28. Which American Computer Company is called Big Blue?
1) Microsoft
2) Compaq Corp
3) IBM
4) Tandy Stevenson
5) DELL
29.A term associated with the comparison of processing speeds of different computer system is:
1) EFTS
2) MPG
3) MIPS
4) CFPS
5) Bps
30. Daisy wheel printer is a type of
1) Matrix printer
2) Impact printer
3) Laser printer
4) Manual printer
5) Non impact printer
31. Serial access memories are useful in applications where
1) Data consists of numbers
2) Short access time is required
3) Each stored word is processed differently
4) Data naturally needs to flow in and out in a serial form
5) Data naturally needs to flow in
and out in a Random form
32. One of the main feature that distinguish microprocessors from micro-computers is
1) Words are usually larger in microprocessors
2) Words are shorter in microprocessors
3) Microprocessor does not contain I/O devices
4) Exactly the same as the machine cycle time
5) None of the above
33. Example of non-numeric data is..
1) Employee Name
2) Test score
3) Bank Account No.
4) Phone No
5) All the above
34. Numbers in table columns are usually...
1) right-aligned
2) left-aligned
3) justified
4) centered
5) None of the above
35. Most Web sites have a main page known as ........, which acts as a doorway to the rest of the Website pages.
1) search engine
2) home page
3) browser
4) URL
5) Domain
36.A software program that extends the capabilities of your browser in a specific way is known as
1) Plugin
2) Browser software
3) Cookies
4) Applets
5) None of the above
37. Internet is example of
1) LAN
2) MAN
3) WAN
4) SAN
5) CAN
38. ......... refers to maintaining and assuring the accuracy and consistency of data
1) Data redundancy
2) Data inconsistency
3) Data integrity
4) Data independence
5) All the above
39. ........... is a data model for describing a database in an abstract way
1) Data Flow Diagram
2) Flow chart
3) ER-Diagram
4) System chart
5) Network chart
40. Mechanism to protect private network from outside attack is
1) Firewall
2) Antivirus
3) Digital Signature
4) Formatting
5) Tunneling
41. The concept of electronic cash is execute payment by
1) Credit card
2) ATM card
3) Using computers over Network
4) Cheque
5) Debit card
42.Amazon.com comes under the following model
1) B2B
2) B2C
3) C2C
4) C2B
5) None of the above
43. A device that forwards data packets from one network to another is called a
1) Bridge
2) Router
3) Gateway
4) Switch
5) Repeaters
44. Tool that is used to transfer data/ files among computers on the internet
1) FTP
2) TCP
3) Archie
4) Gopher
5) POP
45. ........... is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication
1) Spoofing
2) Hacking
3) Phishing
4) Whaling
5) None of the above
46.A huge collection of information arranged for quick retrieval by computer is known as a
1) Deep web
2) Search Engine
3) Data base
4) URL
5) All the above
47. When using Internet sources, asking whether the site is inwardfocused or outward - focused helps to determine
1) Expertise
2) Objectivity
3) Accuracy
4) Purpose
5) Functionality
48. Network Interface card address is known as
1) IP address
2) MAC address
3) FTP address
4) LAN address
5) System address
49. In keyboard modifier keys are
1) Alt, Shift, Ctrl
2) PgUP, Alt, Ctrl
3) Home, Alt, Ctrl
4) Del, End, Alt
5) Tab, End, Alt
50. ASCII value of ‘D’ is
1) 66
2) 68
3) 74
4) 65
5) 64
51. In SD memory cards SD stands for
1) Standard Digital
2) Secure Digital
3) Secondary
4) Standard Data
5) Secure Data
52. What is the short cut key to open the Open dialog box?
1) F12
2) Shift F12
3) Alt + F12
4) Ctrl + F12
5) F11
ANSWERS:
1-3, 2-2, 3-1, 4-3, 5-2, 6-2, 7-2, 8-4, 9-2, 10-3
11-4, 12-3, 13-3, 14-3, 15-4, 16-3, 17-4, 18-2, 19-5, 20-3
21-4, 22-3, 23-1, 24-3, 25-1, 26-1, 27-4, 28-3, 29-3, 30-2
31-4, 32-3, 33-1, 34-1, 35-2, 36-1, 37-3, 38-3, 39-3, 40-1
41-3, 42-2, 43-2, 44-1, 45-3, 46-3, 47-3, 48-2, 49-1 50-2, 51-2, 52-4.
1) Mini
2) Super computer
3) Micro computer
4) Mainframe
5) None of the above
2. The symbols used in an assembly language are
1) Codes
2) Mnemonics
3) Assembler
4) Literals
5) All of the above
3. Portrait and Landscape are
1) Page Orientation
2) Paper Size
3) Page Layout
4) Margin type
5) All of the above
4.Any storage device added to a computer beyond the immediately usable main storage is known as
1) Floppy disk
2) Hard disk
3) Backing store
4) Punched card
5) Magnetic Tape
5. Which output device is used for translating information from a computer into pictorial form on paper
1) Mouse
2) Plotter
3) Touch panel
4) Card punch
5) Keyboard
6.A computer assisted method for the recording and analyzing of existing or hypothetical systems is
1) Data transmission
2) Data flow
3) Data capture
4) Data processing
5) Data validation
7. Which access method is used for obtaining a record from a cassette tape?
1) Direct
2) Sequential
3) Random
4) ISAM
5) VSAM
8. Find the ODD one.
1) JAVA
2) Cobol
3) Fortran
4) Linux
5) ADA
9. The 2's compliment of a binary no. is obtained by adding.....to its 1's compliment.
1) 0
2) 1
3)10
4) 12
5) 13
10. With respect to a network interface card, the term 10/100 refers to
1) protocol speed
2) a fiber speed
3) megabits per seconds
4) minimum and maximum server speed
5) data capacity
11. The terms "red book", "yellow book", and "orange book" refer to:
1) SCSI
2) IDE
3) floppy drive technology
4) CD-ROM standards
5) SATA
12. In ROM BIOS, the acronym BIOS stands for:
1) Basic Intuitive Output Set
2) Basic Input Organizational System
3) Basic Input Output System
4) Basic Industry Operating System
5) Basic Input Output Set
13. Which DOS command will format a floppy disk and transfer the system files
1) SYS C: A:
2) SYS A:
3) FORMAT A: /S
4) FORMAT A: /T
5) SYS C:
14. Which command will be used to display file and directory names only, without size, date, and time information?
1) DIR/W
2) DIR A:
3) DIR/B
4) DIR/S
5) DIR
15. Which of the following is not a logical data-base structure?
1) tree
2) relational
3) network
4) chain
5) None of the above
16. Updating a database means
1) revising the file structure
2) reorganizing the database
3) modifying or adding record occurrences
4) Sorting
5) Indexing
17.Any and every command can be found on the
1) Drawing toolbar
2) Formatting toolbar
3) Standard toolbar
4) Menu bar
5) View toolbar
18. Which of the following should be used when you want to add a slide to an existing presentation?
1) File, add a new slide
2) Insert, new slide
3) File, open
4) File, new
5) None of the above
19. Which of the following items are examples of storage devices?
1) Floppy disks
2) CD-ROMs
3) Tape devices
4) Hard Disk
5) All of the above
20. The original ASCII code used .... bits of each byte, reserving that last bit for error checking
1) 5
2) 6
3) 7
4) 8
5) 16
21. Word length of a computer is measured in
1) Bytes
2) Millimeters
3) Meters
4) Bits
5) All the above
22. Which type of computers uses the 8-bit code called EBCDIC?
1) Minicomputers
2) Microcomputers
3) Mainframe computers
4) Super computer
5) Lap Tops
23. ATM terminals are example for
1) Smart Terminals
2) Intelligent terminals
3) Dumb terminals
4) Offline terminals
5) None of the above
24.A name or number used to identify a storage location is called
1) A byte
2) A record
3) An address
4) An instruction
5) All of above
25. The difference between memory and storage is that memory is .... and storage is .....
1) temporary, permanent
2) permanent, temporary
3) slow, fast
4) big, Small
5) None of the above
26. Offline device is
1) A device which is not connected to CPU
2) A device which is connected to CPU
3) A direct access storage device
4) An I/O device
5) None of the above
27. Which of the following registers is used to keep track of address of the memory location where the next instruction is located?
1) Memory address register
2) Memory data register
3) Instruction register
4) Program counter
5) Flag Register
28. Which American Computer Company is called Big Blue?
1) Microsoft
2) Compaq Corp
3) IBM
4) Tandy Stevenson
5) DELL
29.A term associated with the comparison of processing speeds of different computer system is:
1) EFTS
2) MPG
3) MIPS
4) CFPS
5) Bps
30. Daisy wheel printer is a type of
1) Matrix printer
2) Impact printer
3) Laser printer
4) Manual printer
5) Non impact printer
31. Serial access memories are useful in applications where
1) Data consists of numbers
2) Short access time is required
3) Each stored word is processed differently
4) Data naturally needs to flow in and out in a serial form
5) Data naturally needs to flow in
and out in a Random form
32. One of the main feature that distinguish microprocessors from micro-computers is
1) Words are usually larger in microprocessors
2) Words are shorter in microprocessors
3) Microprocessor does not contain I/O devices
4) Exactly the same as the machine cycle time
5) None of the above
33. Example of non-numeric data is..
1) Employee Name
2) Test score
3) Bank Account No.
4) Phone No
5) All the above
34. Numbers in table columns are usually...
1) right-aligned
2) left-aligned
3) justified
4) centered
5) None of the above
35. Most Web sites have a main page known as ........, which acts as a doorway to the rest of the Website pages.
1) search engine
2) home page
3) browser
4) URL
5) Domain
36.A software program that extends the capabilities of your browser in a specific way is known as
1) Plugin
2) Browser software
3) Cookies
4) Applets
5) None of the above
37. Internet is example of
1) LAN
2) MAN
3) WAN
4) SAN
5) CAN
38. ......... refers to maintaining and assuring the accuracy and consistency of data
1) Data redundancy
2) Data inconsistency
3) Data integrity
4) Data independence
5) All the above
39. ........... is a data model for describing a database in an abstract way
1) Data Flow Diagram
2) Flow chart
3) ER-Diagram
4) System chart
5) Network chart
40. Mechanism to protect private network from outside attack is
1) Firewall
2) Antivirus
3) Digital Signature
4) Formatting
5) Tunneling
41. The concept of electronic cash is execute payment by
1) Credit card
2) ATM card
3) Using computers over Network
4) Cheque
5) Debit card
42.Amazon.com comes under the following model
1) B2B
2) B2C
3) C2C
4) C2B
5) None of the above
43. A device that forwards data packets from one network to another is called a
1) Bridge
2) Router
3) Gateway
4) Switch
5) Repeaters
44. Tool that is used to transfer data/ files among computers on the internet
1) FTP
2) TCP
3) Archie
4) Gopher
5) POP
45. ........... is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication
1) Spoofing
2) Hacking
3) Phishing
4) Whaling
5) None of the above
46.A huge collection of information arranged for quick retrieval by computer is known as a
1) Deep web
2) Search Engine
3) Data base
4) URL
5) All the above
47. When using Internet sources, asking whether the site is inwardfocused or outward - focused helps to determine
1) Expertise
2) Objectivity
3) Accuracy
4) Purpose
5) Functionality
48. Network Interface card address is known as
1) IP address
2) MAC address
3) FTP address
4) LAN address
5) System address
49. In keyboard modifier keys are
1) Alt, Shift, Ctrl
2) PgUP, Alt, Ctrl
3) Home, Alt, Ctrl
4) Del, End, Alt
5) Tab, End, Alt
50. ASCII value of ‘D’ is
1) 66
2) 68
3) 74
4) 65
5) 64
51. In SD memory cards SD stands for
1) Standard Digital
2) Secure Digital
3) Secondary
4) Standard Data
5) Secure Data
52. What is the short cut key to open the Open dialog box?
1) F12
2) Shift F12
3) Alt + F12
4) Ctrl + F12
5) F11
ANSWERS:
1-3, 2-2, 3-1, 4-3, 5-2, 6-2, 7-2, 8-4, 9-2, 10-3
11-4, 12-3, 13-3, 14-3, 15-4, 16-3, 17-4, 18-2, 19-5, 20-3
21-4, 22-3, 23-1, 24-3, 25-1, 26-1, 27-4, 28-3, 29-3, 30-2
31-4, 32-3, 33-1, 34-1, 35-2, 36-1, 37-3, 38-3, 39-3, 40-1
41-3, 42-2, 43-2, 44-1, 45-3, 46-3, 47-3, 48-2, 49-1 50-2, 51-2, 52-4.
No comments:
Post a Comment