1. Which of the following component is required to process data into information and consists of integrated circuits.
1) hard disk
2) RAM
3) CPU
4) ROM
5) none of these
2. Which of the following is a networking hardware?
1) Bridge
2) Router
3) NIC
4) Switch
5) All the above
3. Two or more computers connected to each other for sharing information form a ____
1) network
2) router
3) server
4) tunnel
5) pipeline
4. Computers that are portable and convenient for users who travel are known as ____
1) super computers
2) laptops
3) mini computers
4) file server
5) none
5. What is the term for unsolicited e-mail?
1) newsgroup
2) usenet
3) backbone
4) spam
5) none of these
6. Which of the following means that the data stored in the database should not be accessible to people who might misuse it?
1) Data Independence
2) Data Redundancy
3) Data Maintainance
4) Data Security
5) None of these
7. The code for a web page is written using ____
1) a 5th generation language
2) Wip Zip
3) perl
4) HTML
5)URL
8. The first computers were programmed using ____
1) assembly language
2) machine language
3) source code
4) object code
5) none
9. When the pointer is positioned on a ____ it is shaped link a hand.
1) grammar error
2) hyperlink
3) screen tip
4) spelling error
5) all
10. My SQL, MS Access are examples of:
1) Dataware Houses
2) File Management Systems
3) Database Management Systems
4) Multi Dimensional Database
5) None of these
11. Which of the following is the software application which enables the electronic handling of recruitment needs.
1) Applicant Tracking System (ATS)
2) Web Conference
3) Information System
4) Online Interview
5) None of these
12. Which of the following device operates at the physical layer ?
1) bridge
2) router
3) repeater
4) all of the above
5) none
13. For separating channels in FDM, it is necessary to use
1) time slots
2) bandpass filters
3) differentiation
4) all of these
5) none
14. Encryption and decryption are functions of
1) transport layer
2) session layer
3) presentation layer
4) all of these
5) none
15. Which of the following types of table constraints will prevent the entry of duplicate rows?
1) primary key
2) unique
3) null
4) foreign key
5) none of these
16. ____ is the process that transforms data such as voice, text, graphics, audio, and video into digital form.
1) Wireless data transmission
2) Digitization
3) Convergence
4) Analog transfer
5) None of these
17. Which multiplexing technique transmits analog signals?
1) FDM
2) synchronous TDM
3) asynchronous TDM
4) 2 and 3
5) none
18. ____ was a search engine system for the Gopher protocol
1) gobbler
2) archie
3) mikky
4) veronica
5) none of these
19. array is ____
1) linear data structure
2) object
3) class
4) interface
5) none of these
20. How many options does a binary choice offer?
1) none
2) one
3) two
4) four
5) eight
21. Data going into the computer is called
1) output
2) algorithm
3) input
4) flowchart
5) all of these
22. How many values can be represented by a single byte?
1) 4
2) 16
3) 64
4) 256
5) 512
23. ____ is a technique that is used to send more than one call over a single line.
1) Multiplexing
2) Infrared transmission
3) Streaming
4) Digital transmission
5) None of these
24. ____ is the method used in public switched telephone systems where there is a direct connection between communicating devices.
1) Transaction acquisition
2) Internet protocol
3) Circuit switching
4) Packet switching
5) None of these
25. A set of instructions telling the computer what to do is called
1) mentor
2) instructor
3) compiler
4) program
5) debugger
26. computer connected to a LAN can
1) run faster
2) go on line
3) share information
4) E-mail
5) none
27. Which of the following refers to the memory in your computer?
1) RAM
2) DSL
3) USB
4) LAN
5) CPU
28. Information travels between components on the motherboard through
1) flash memory
2) CMOS
3) bays
4) buses
5) peripherals
29. One megabyte equals approximately
1) 1000 bytes
2) 1000 bits
3) 1 million bytes
4) 1 million bits
5) 2000 bytes
30. An expansion board that provides the electronic components to make a connection between a computer and a network is called a ____.
1) collective network
2) logical address
3) network interface card (NIC)
4) wide area network
5) None of these
31. How are data organized in a spreadsheet?
1) lines and spaces
2) layers and planes
3) height
4) columns and rows
5) none
32. The blinking symbol on the computers screen is called the
1) mouse
2) logo
3) hand
4) palm
5) cursor
33. When a particular object or an image is copied, in which of the following places it is stored?
1) ROM
2) hard drive
3) diskette
4) dash bord
5) clipboard
34. A software that is not protected by copyright or trademark is?
1) Vertical Market software
2) Public domain software
3) Shareware Software
4) Trial ware
5) Adware
35. MIME is an acronym for ____
1) Multiprogramming Internet Mail extension
2) Multicasting Internet Mail Extension
3) Multiple Internet Mail Extension
4) Multipurpose Internet Mail Extension
5) None of these
36. Any crime that involves a Computer and a Network is called:
1) Virus
2) Malware
3) Trojan Horse
4) Cyber crime
5) Identity Theft
37. A program embedded in a semiconductor chip during their manufacture is called
1) humanware
2) firmware
3) liveware
4) handware
5) software
38. Which of the following is an Object Oriented Programming Language?
1) C
2) Java
3) C++
4) Both 2 and 3
5) Both 1 and 2
39. The popular name for 'Infor-mation Super Highway' is:
1) Intranet
2) Extranet
3) Virtual Private Network
4) MAN
5) Internet
40. Blu-Ray disk is an example of a(n) ____
1) Hard disk
2) Magnetic Disk
3) Optical Disk
4) Output Device
5) None of these
41. A register that keeps track of the next instruction to be executed is called a(n):
1) Data Register
2) Instruction Register
3) Action Register
4) Program Counter
5) None of these
42. ____ is the storage area for e-mails
1) Folder
2) Mail box
3) Directory
4) Hard Disk
5) None of these
43. Which of the following best defines Embedded system?
1) A program that comes wrapped in a box
2) A program that is permanent part of a computer
3) A computer that is a part of a larger computer
4) A computer and software system that controls a machine
5) None of these
44. Thermal Printer is ____ kind of printer.
1) Impact Printer
2) Non impact printer
3) Laser printer
4) Line printer
5) None of these
45. Which of the following is not a web browser?
1) Firefox
2) IE
3) Opera
4) Skype
5) Chrome
46. Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group.
1) Puck
2) Printer
3) Plotter
4) Television
5) Projector
Answers:
1) 3; 2) 5; 3) 1; 4) 2; 5) 4; 6) 4; 7) 4; 8) 2; 9) 2: 10) 3;
11) 1; 12) 3; 13) 2; 14) 3; 15) 1; 16) 2; 17) 1; 18) 4; 19) 1; 20) 3;
21) 3; 22) 4; 23) 1; 24) 3; 25) 4; 26) 3; 27) 1; 28) 4; 29) 3; 30) 3;
31) 4; 32) 5; 33) 5; 34) 2; 35) 4; 36) 4; 37) 2; 38) 4; 39) 5; 40) 3;
41) 2; 42) 2; 43) 4; 44) 2; 45) 4; 46) 1
1) hard disk
2) RAM
3) CPU
4) ROM
5) none of these
2. Which of the following is a networking hardware?
1) Bridge
2) Router
3) NIC
4) Switch
5) All the above
3. Two or more computers connected to each other for sharing information form a ____
1) network
2) router
3) server
4) tunnel
5) pipeline
4. Computers that are portable and convenient for users who travel are known as ____
1) super computers
2) laptops
3) mini computers
4) file server
5) none
5. What is the term for unsolicited e-mail?
1) newsgroup
2) usenet
3) backbone
4) spam
5) none of these
6. Which of the following means that the data stored in the database should not be accessible to people who might misuse it?
1) Data Independence
2) Data Redundancy
3) Data Maintainance
4) Data Security
5) None of these
7. The code for a web page is written using ____
1) a 5th generation language
2) Wip Zip
3) perl
4) HTML
5)URL
8. The first computers were programmed using ____
1) assembly language
2) machine language
3) source code
4) object code
5) none
9. When the pointer is positioned on a ____ it is shaped link a hand.
1) grammar error
2) hyperlink
3) screen tip
4) spelling error
5) all
10. My SQL, MS Access are examples of:
1) Dataware Houses
2) File Management Systems
3) Database Management Systems
4) Multi Dimensional Database
5) None of these
11. Which of the following is the software application which enables the electronic handling of recruitment needs.
1) Applicant Tracking System (ATS)
2) Web Conference
3) Information System
4) Online Interview
5) None of these
12. Which of the following device operates at the physical layer ?
1) bridge
2) router
3) repeater
4) all of the above
5) none
13. For separating channels in FDM, it is necessary to use
1) time slots
2) bandpass filters
3) differentiation
4) all of these
5) none
14. Encryption and decryption are functions of
1) transport layer
2) session layer
3) presentation layer
4) all of these
5) none
15. Which of the following types of table constraints will prevent the entry of duplicate rows?
1) primary key
2) unique
3) null
4) foreign key
5) none of these
16. ____ is the process that transforms data such as voice, text, graphics, audio, and video into digital form.
1) Wireless data transmission
2) Digitization
3) Convergence
4) Analog transfer
5) None of these
17. Which multiplexing technique transmits analog signals?
1) FDM
2) synchronous TDM
3) asynchronous TDM
4) 2 and 3
5) none
18. ____ was a search engine system for the Gopher protocol
1) gobbler
2) archie
3) mikky
4) veronica
5) none of these
19. array is ____
1) linear data structure
2) object
3) class
4) interface
5) none of these
20. How many options does a binary choice offer?
1) none
2) one
3) two
4) four
5) eight
21. Data going into the computer is called
1) output
2) algorithm
3) input
4) flowchart
5) all of these
22. How many values can be represented by a single byte?
1) 4
2) 16
3) 64
4) 256
5) 512
23. ____ is a technique that is used to send more than one call over a single line.
1) Multiplexing
2) Infrared transmission
3) Streaming
4) Digital transmission
5) None of these
24. ____ is the method used in public switched telephone systems where there is a direct connection between communicating devices.
1) Transaction acquisition
2) Internet protocol
3) Circuit switching
4) Packet switching
5) None of these
25. A set of instructions telling the computer what to do is called
1) mentor
2) instructor
3) compiler
4) program
5) debugger
26. computer connected to a LAN can
1) run faster
2) go on line
3) share information
4) E-mail
5) none
27. Which of the following refers to the memory in your computer?
1) RAM
2) DSL
3) USB
4) LAN
5) CPU
28. Information travels between components on the motherboard through
1) flash memory
2) CMOS
3) bays
4) buses
5) peripherals
29. One megabyte equals approximately
1) 1000 bytes
2) 1000 bits
3) 1 million bytes
4) 1 million bits
5) 2000 bytes
30. An expansion board that provides the electronic components to make a connection between a computer and a network is called a ____.
1) collective network
2) logical address
3) network interface card (NIC)
4) wide area network
5) None of these
31. How are data organized in a spreadsheet?
1) lines and spaces
2) layers and planes
3) height
4) columns and rows
5) none
32. The blinking symbol on the computers screen is called the
1) mouse
2) logo
3) hand
4) palm
5) cursor
33. When a particular object or an image is copied, in which of the following places it is stored?
1) ROM
2) hard drive
3) diskette
4) dash bord
5) clipboard
34. A software that is not protected by copyright or trademark is?
1) Vertical Market software
2) Public domain software
3) Shareware Software
4) Trial ware
5) Adware
35. MIME is an acronym for ____
1) Multiprogramming Internet Mail extension
2) Multicasting Internet Mail Extension
3) Multiple Internet Mail Extension
4) Multipurpose Internet Mail Extension
5) None of these
36. Any crime that involves a Computer and a Network is called:
1) Virus
2) Malware
3) Trojan Horse
4) Cyber crime
5) Identity Theft
37. A program embedded in a semiconductor chip during their manufacture is called
1) humanware
2) firmware
3) liveware
4) handware
5) software
38. Which of the following is an Object Oriented Programming Language?
1) C
2) Java
3) C++
4) Both 2 and 3
5) Both 1 and 2
39. The popular name for 'Infor-mation Super Highway' is:
1) Intranet
2) Extranet
3) Virtual Private Network
4) MAN
5) Internet
40. Blu-Ray disk is an example of a(n) ____
1) Hard disk
2) Magnetic Disk
3) Optical Disk
4) Output Device
5) None of these
41. A register that keeps track of the next instruction to be executed is called a(n):
1) Data Register
2) Instruction Register
3) Action Register
4) Program Counter
5) None of these
42. ____ is the storage area for e-mails
1) Folder
2) Mail box
3) Directory
4) Hard Disk
5) None of these
43. Which of the following best defines Embedded system?
1) A program that comes wrapped in a box
2) A program that is permanent part of a computer
3) A computer that is a part of a larger computer
4) A computer and software system that controls a machine
5) None of these
44. Thermal Printer is ____ kind of printer.
1) Impact Printer
2) Non impact printer
3) Laser printer
4) Line printer
5) None of these
45. Which of the following is not a web browser?
1) Firefox
2) IE
3) Opera
4) Skype
5) Chrome
46. Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group.
1) Puck
2) Printer
3) Plotter
4) Television
5) Projector
Answers:
1) 3; 2) 5; 3) 1; 4) 2; 5) 4; 6) 4; 7) 4; 8) 2; 9) 2: 10) 3;
11) 1; 12) 3; 13) 2; 14) 3; 15) 1; 16) 2; 17) 1; 18) 4; 19) 1; 20) 3;
21) 3; 22) 4; 23) 1; 24) 3; 25) 4; 26) 3; 27) 1; 28) 4; 29) 3; 30) 3;
31) 4; 32) 5; 33) 5; 34) 2; 35) 4; 36) 4; 37) 2; 38) 4; 39) 5; 40) 3;
41) 2; 42) 2; 43) 4; 44) 2; 45) 4; 46) 1
No comments:
Post a Comment