Search This Blog

Friday, June 29, 2018

Computer gk 29 june

1. Comments put in cells are called …..

(1) Smart Tip 

(2) Cell Tip 

(3) Soft Tip 

(4) Web tip 

(5) None of these

Q.2. Which option can be used to set custom timings for slides in a presentation?

(1) Slide Show Setup 

(2) Slider Timer 

(3) Slider Timings

(4) Rehearsal 

(5) None of these

Q.3. Auto text and Auto correct are ___________ tools in word document.

(1) Editing 

(2) Styling 

(3) Designing 

(4) All of the above 

(5) None of these

Q.5. Which enables us to send the same letter to different persons?

(1) Mail merge 

(2) Macros 

(3) Template 

(4) All of the above 

(5) None of these

Q.5. EPROM can be used for………

(1) Reconstructing the contents of ROM 

(2) Erasing the contents of ROM

(3) Erasing and reconstructing the contents of ROM 

(4) Duplicating ROM

(5) All of the above

Q.6. What does COUNTA () function do?

(1) Counts cells having number 

(2) Counts empty cells 

(3) Counts non-empty cells 

(4) Counts cells having alphabets

(5) None of these

Q.7. Which of the following helps to reduce spelling error in the Word document?

(1) Auto Correct 

(2) Auto Format 

(3) Auto Text 

(4) Smart Tags 

(5) None of these

Q.8. Which of the following computer language is used for artificial intelligence?

(1) FORTRAN 

(2) PROLOG 

(3) C 

(4) COBOL 

(5) None of these

Q.9. FIFO stands for__________-.

(1) First in first out 

(2) First input first output 

(3) Final in final out 

(4) First in final out 

(5) None of these

Q.10. Information stored in RAM need to be________.

(1) Check 

(2) Refresh periodically 

(3) Modify

(4) Detecting error 

(5) None of these

ANSWERS

Q.1. (2) Comments put in cells are called Cell Tip.

Q.2. (4) Rehearsal option can be used to set custom timings for slides in a presentation.

Q.3. (1) Auto text and Auto correct are editing tools in word document.

Q.4. (1) Mail merge enables us to send the same letter to different persons.

Q.5. (3) EPROM can be used for erasing and reconstructing the contents of ROM.

Q.6. (3) COUNTA () function Counts non-empty cells.

Q.7. (1) Auto Correct option helps to reduce spelling error in the Word document.

Q.8. (2) PROLOG computer language is used for artificial intelligence.

Q.9. (1) FIFO stands for First in first out.

Q.10. (2) Information stored in RAM need to be refresh periodically.

Thursday, June 28, 2018

Computer gk 28 june

. Other folders, named subfolders, can remain in the folders while creating hierarchical structure—

(1) Mini folder 

(2) Tread folder 

(3) Subfolders 

(4) Object 

(5) None of these

Q.2. The following are included in the word program………….Title Bar, Ribbon, Status Bar, Views, Document workspace.

(1) Window 

(2) Browser 

(3) Explorer 

(4) Website 

(5) None of these

Q.3. Which topology requires a multipoint connection?

(1) Mesh 

(2) Star 

(3) Bus 

(4) Ring 

(5) None of these

Q.4. In the original ARPANET, _______ were directly connected together.

(1) IMPs 

(2) Host computers 

(3) Networks 

(4) Routers 

(5) None of these

Q.5. —————— was the first network.

(1) CSNET 

(2) NSFNET 

(3) ANSNET 

(4) RPANET 

(5) None of these

Q.6. ____________ is any part of the computer that you can physically touch.

(1) Hardware 

(2) A device 

(3) A peripheral 

(4) An application 

(5) None of these

Q.7. ‘DOS’ floppy disk does not have a ———————-.

(1) A Boot Record 

(2) A File Allocation Table 

(3) A Root Directory

(4) Virtual Memory 

(5) BIOS

Q.8. IBM 1401 is………..

(1) 1st Generation Computer 

(2) 2nd Generation Computer

(3) 3rd Generation Computer 

(4) 4th Generation Computer

(5) None of these

Q.9. RSA is a ————-.

(1) Symmetric Cryptosystem 

(2) Asymmetric Cryptosystem 

(3) Block Cypher

(4) Digital Signature Algorithm 

(5) None of these

Q.10. Full form of ADSL is………..

(1) Asymmetric Digital Subscriber Line 

(2) Asymmetric Dual Subscriber Line

(3) Asymmetric Digital System Line 

(4) Asymmetric Dual System Line

(5) None of these 

ANSWERS

Q.1. (3) Other folders, named subfolders, can remain in the folders while creating hierarchical structure subfolders.

Q.2. (1) The word program Window included Title Bar, Ribbon, Status Bar, Views, Document workspace.

Q.3. (2) Star topology requires a multipoint connection.

Q.4. (1) In the original ARPANET, IMP (Interface Message Processor)were directly connected together.

Q.5. (4) ARPANET was the first network.

Q.6. (1) Hardware is a part of the computer that you can physically touch.

Q.7. (4) ‘DOS’ floppy disk does not have a virtual memory.

Q.8. (2) IBM 1401 is 2nd Generation Computer.

Q.9. (4) RSA is a Digital Signature Algorithm.

Q.10. (1) ADSL = Asymmetric Digital Subscriber Line

Tuesday, June 26, 2018

Computer gk 26 june

1. How can you make the selected character superscripted?

(1) Ctrl + = 

(2) Ctrl + Shift + = 

(3) Alt + Ctrl + Shift + = 

(4) All the Above 

(5) None of these

Q.2. Which of the following statement is false?

(1) You can set different header footer for even and odd pages 

(2) You can set different page number formats for different sections 

(3) You can set different header footer for first page of a section 

(4) You can set different header and footer for last page of a section 

(5) None of these

Q.3. To delete and embed an object, first

(1) Double click the object 

(2) Select the object by clicking it

(3) Press the Shift + Delete keys 

(4) Select it and then press Delete key 

(5) None of these

Q.4. ——————— shortcut key used for Bold highlighted selection. 

(1) Ctrl + B 

(2) Ctrl + A 

(3) Ctrl + C 

(4) Ctrl + Z 

(5) None of these

Q.5. The communication mode that supports two-way traffic but only one direction at a time is- 

(1) Simplex 

(2) half duplex 

(3) duplex 

(4) multiplex 

(5) All of the above

Q.6. ——————key use to move to next section of text. 

(1) Ctrl + Alt 

(2) Ctrl + shift 

(3) Shift + Arrow 

(4) Ctrl + Arrow 

(5) None of these

Q.7. Almost every C program begins with the statement- 

(1) main ()

(2) print ()

(3) #include 

(4) Scanf ()

(5) All of the above

Q.8. Which of the command is used to remove files ?

(1) erase 

(2) rm 

(3) delete

(4) dm 

(5) None of these

Q.9. Which of the following command is used to count just the number of lines contained in a file ?

(1) wc-1 

(2) wc-w 

(3) wc-c 

(4) wc-r 

(5) None of these

Q.10. A way to communicate with a remote computer over a network -

(1) Telnet 

(2) Patch 

(3) Keyboard

(4) CPU 

(5) None of these

ANSWERS

Q.1. (2) Ctrl + Shift + = make the selected character superscripted.

Q.2. (4)

Q.3. (4) To delete and embed an object, first select it and then press delete key.

Q.4. (1) Ctrl + B shortcut key is used for bold highlighted selection.

Q.5. (2) The communication mode that supports two-way traffic but only one direction at a time is known as half duplex.

Q.6. (4) Ctrl + arrow key is used to move to next section of text.

Q.7. (3) Almost every C program begins with # include statement.

Q.8. (2) rm command is used to remove files.

Q.9. (1) wc-1 command is used to count just the number of lines contained in a file.

Q.10. (1) Telnet is a way to communicate with a remote computer over a network.

Sunday, June 24, 2018

Computer gk 25 june


Q.1. ——————is a process to find and correct equipment defects or program malfunctions.
(1) Debug 
(2) Bug 
(3) Error
(4) Defects
(5) None of these

Q.2. Which of the following operating system is launched by IBM for personal computers?
(1) IBM-DOS 
(2) MS-DOS 
(3) OS/2 
(4) PC-DOS 
(5) None of these

Q.3. Which generation of computer use Artificial Intelligence?
(1) Third 
(2) Fourth 
(3) Fifth 
(4) Sixth 
(5) None of these

Q.4. Which of the following is not a name of network topology?
(1) Bus 
(2) NetWare 
(3) Tree 
(4) Ring 
(5) Mesh

Q.5. A _______ server store and manages files for network user.
(1) Main 
(2) Web 
(3) File
(4) Authentication 
(5) None of these

Q.6. A medium for transferring data between two locations is called ____?
(1) Network 
(2) Modem 
(3) Sharing 
(4) Communication Channel 
(5) Data Bus

Q.7. Personal logs or journal entries posted on the Web are known as_______?
(1) Twitter 
(2) Blogs 
(3) Web casts 
(4) User-Forum 
(5) None of these

Q.8. What is Rover in Windows XP?
(1) An animated character 
(2) A mouse hover event 
(3) Busy hourglass mouse cursor 
(4) A routing and remote access service
(5) None of these

Q.9. Before a hard disk can be used to store data, it must be _________ firstly?
(1) Partitioned 
(2) Labeled 
(3) Formatted 
(4) Addressed 
(5) None of these

Q.10. How can you increase the font size of selected text by one point every time? 
(1) By pressing Ctrl + ] 
(2) By pressing Ctrl + [ 
(3) By pressing Ctrl + } 
(4) By pressing Ctrl + { 
(5) None of these

ANSWERS

Q.1. (1) Debug is a process to find and correct equipment defects or program malfunctions.
Q.2. (4) PC DOS is an operating system launched by IBM for personal computers.
Q.3. (3) Fifth generation of computer use Artificial Intelligence.
Q.4. (2) Netware is not a name of network topology.
Q.5. (3) A file server stores and manages files for network user.
Q.6. (4) A medium for transferring data between two locations is called Communication Channel.
Q.7. (2) Personal logs or journal entries posted on the Web are known as blog.
Q.8. (1) Rover in Windows XP is an animated character.
Q.9. (3) Before a hard disk can be used to store data, it must be formatted firstly.
Q.10. (1) By pressing Ctrl + ] you can increase the font size of selected text by one point every time.

Computer gk 24 june

1. ____________ are specially designed computers that perform calculations rapidly. 

(1)Servers 

(2) Supercomputers 

(3) Laptops 

(4) Mainframes 

(5) None of these

Q.2. You can do all of the following with Ctrl+S EXCEPT:

(1) save a previously unsaved file.

(2) save a file in a different format.

(3) save a file in two different formats or versions simultaneously.

(4) save a current version of a file over a previously saved file.

(5) None of these

Q.3. Which of the following can be used to select the entire document?

(1) CTRL+ A 

(2) ALT+F5 

(3) SHIFT+A 

(4) CTRL+K 

(5) CTRL+H

Q.4. The simultaneous processing of two or more programs by multiple processors is ____________.

(1) Multiprogramming 

(2) multitasking 

(3) time-sharing 

(4) multiprocessing 

(5) None of these

Q.5. Use all of the following methods EXCEPT ___________ to copy text.

(1) right-click and use the shortcut menu

(2) Drag-and-drop

(3) Ctrl+ C

(4) the Copy command

(5) None of these

Q.6. Which of the following is NOT a function of a systems utility program?

(1) Providing antivirus protection

(2) Backing up system and application files

(3) Providing menu-driven user interfaces

(4) Compressing files so they take up less space

(5) None of these

Q.7. The _______ enables you to simultaneously keep multiple web pages open in one browser window.

(1) Tab box 

(2) pop-up helper 

(3) tab row 

(4) address bar 

(5) Esc key

Q.8. Which of the following port connect special types of music instruments to sound cards?

(1) BUS 

(2) CPU 

(3) USB 

(4) MIDI 

(5) MINI

Q.9. Which of the following is the set of well defined steps for solving a problem in a finite number of operations?

(1) Algorithm 

(2) Address 

(3) ALGOL 

(4) Accumulator 

(5) None of these

Q.10. FDDI is a——————-.

(1) ring network 

(2) star network 

(3) mesh network 

(4) bus based network 

(5) All of the above

ANSWERS

Q.1. (2) Supercomputers are specially designed computers that perform calculations rapidly.

Q.2. (3) Save a file in two different formats or versions simultaneously cannot done by Ctrl+ S.

Q.3. (1) CTRL + A selects the entire document.

Q.4. (4) The simultaneous processing of two or more programs by multiple processors is multiprocessing.

Q.5. (2) Drag and drop is not a method of copy text.

Q.6. (3) Systems utility program cannot provides menu-driven user interfaces.

Q.7. (3) The tab row enables you to simultaneously keep multiple web pages open in one browser window.

Q.8. (3) USB port connects special types of music instruments to sound cards.

Q.9. (1) Algorithm is a set of well defined steps for solving a problem in a finite number of operations.

Q.10. (1) FDDI is a ring network.

Saturday, June 23, 2018

Computer gk 23 june

.1. A setting predetermined by the program unless changed by the user is called as________.

(1) Pre-determined setting 

(2) User setting 

(3) Default

(4) Setting 

(5) None of these

Q.2. The screen background and main area of window where you can open and manage files and program called___________.

(1) Wallpaper 

(2) Desktop 

(3) Background 

(4) All of above 

(5) None of these

Q.3. A letter, memo, or file that is created using Microsoft Word is called_________.

(1) master 

(2) slide 

(3) document 

(4) worksheet 

(5) None of these

Q.4. To reload the Web page press__________ button.

(1) redo 

(2) reload 

(3) restore 

(4) ctrl 

(5) refresh

Q.5. Which of the following is a characteristic of a file server? 

(1) Manages file operations and is shared on a network

(2) Manages file operations and is limited to one PC

(3) Acts as fat client and is shared on a network

(4) Acts as fat client and is limited to one PC

(5) None of these

Q.6. If you wish to extend the length of the network without having the signal degrade, you would use a —

(1) Repeater 

(2) Router 

(3) Gateway 

(4) Switch 

(5) None of these

Q.7. A repair for a known software bug, usually available at no charge on the internet , is called a (n)—

(1) version 

(2) Patch 

(3) Tutorial 

(4) FAQ 

(5) None of these

Q.8. Which conversion technique is the least risky?

(1) Pilot 

(2) Parallel 

(3) Direct 

(4) Phased 

(5) None of these

Q.9. In the binary language each letter of the alphabet, number and special character is made up of a combination of__________.

(1) eight bytes 

(2) eight kilobytes 

(3) eight characters 

(4) eight bits 

(5) None of these

Q.10. Which certification deals with SQL?

(1) Microsoft Certified Systems Administrator

(2) Microsoft Certified Solution Developer

(3) Microsoft Certified Database Administrator

(4) Microsoft Certified Professional

(5) None of these

ANSWERS

Q.1. (3) A setting predetermined by the program unless changed by the user is called as default setting.

Q.2. (2) The screen background and main area of window where you can open and manage files and program called desktop.

Q.3. (3) A letter, memo, or file that is created using Microsoft Word is called document.

Q.4. (5) To reload the Web page press refresh (F5) button.

Q.5. (1) File server Manages file operations and shared it on a network.

Q.6. (1) Repeater extends the length of the network without having the signal degrade.

Q.7. (2) A repair for a known software bug, usually available at no charge on the internet is called a Patch.

Q.8. (2) Parallel conversion technique is the least risky in computer systems.

Q.9. (4) One letter of the alphabet = eight bits

Q.10. (3) Microsoft Certified Database Administrator certification deals with 

Friday, June 22, 2018

Computer gk 22 june

1. What is deadlock……..?

(1) dead computer 

(2) processor stop process 

(3) switch off power

(4) dead hard disk 

(5) none of these

Q.2.Object oriented languages are………….?

(1) Plateform independent 

(2) Plateform dependent 

(3) Machine language

(4) Both 1 & 2 

(5) None of these

Q.3. Who was the 1st company of India which made super computer?

(1) Wipro 

(2) Tec Mahindra 

(3) C DAC 

(4) HCL 

(5) TCS

Q.4. The communication mode that supports data in both directions at the same time is known as______.

(1) simplex 

(2) Half – simplex 

(3) full Duplex 

(4) multiplex 

(5) None of these

Q.5. The number of pixels displayed on a screen is known as the screen _____.

(1) Resolution 

(2) color depth 

(3) refresh rate 

(4) viewing size 

(5) None of these

Q.6. Which utility program is used to “paste” file clusters together?

(1) Scandisk 

(2) Backup 

(3) Format Disk 

(4) Disk Defragmenter 

(5) None of these

Q.7. What is active desktop?

(1) Viewing your desktop as a web page

(2) Display information you can update from the internet

(3) Both 1 & 2 

(4) Software

(5) None of these 

Q.8. Which of the following is the billionth of the second?

(1) Gigabyte 

(2) Terabyte 

(3) Nanosecond 

(4) Microsecond 

(5) Terasecond

Q.9. What is bitmap?

(1) is a format which window use for desktop wallpaper

(2) a graphic file format made up of small dots

(3) a specific kind of file with the .BMP extension

(4) All of the above

(5) None of these

Q.10. Which of the following is NOT part of a manual system?

(1) Data 

(2) People 

(3) Hardware 

(4) Procedures 

(5) None of these

ANSWERS

Q.1. (2) Deadlock is process in which more than one program wait for execution.

Q.2. (1) Object oriented languages are Plate form independent.

Q.3. (3) C DAC was the 1st company of India which made super computer.

Q.4. (3) The communication mode that supports data in both directions at the same time is known as full duplex.

Q.5. (1) The number of pixels displayed on a screen is known as the screen Resolution.

Q.6. (4) Disk defragmenter is a program which is used to “paste” file clusters together.

Q.7. (3) Active desktop Views your desktop as a web page and display information you can update from the internet.

Q.8. (3) One Nanosecond = the billionth of the second.

Q.9. (4)

Q.10. (3) Hardware is NOT part of a manual system.

Wednesday, June 20, 2018

Computer gk 21 june

Q.1. Which command brings you to the first slide in your presentation?
(1) Next slide button 
(2) Page up 
(3) Ctrl + Home
(4) Ctrl + End 
(5) None of these

Q.2. When using PowerPoint, to play a PowerPoint show for previewing the show, select_______.
(1) View, slide sorter 
(2) View, slide 
(3) View, slide show
(4) View outline 
(5) None of these

Q.3. The site mostly used by you every time; if you are going to use it then you can do ___________ instead of type address.
(1) Save as a file 
(2) Copy it 
(3) Bookmark it 
(4) Delete it 
(5) None of these 

Q.4. Using application create a _____________.
(1) Executive file 
(2) Software program 
(3) Document
(4) Operating system 
(5) None of these

Q.5. The primary output device of the computer is known as___________.
(1) Video monitor 
(2) Printer 
(3) Key board 
(4) Mouse 
(5) None of these

Q.6. In the time of first generation the computers were programmed using ______________ language.
(1) Assembly 
(2) Machine 
(3) High level 
(4) Middle level 
(5) None of these

Q.7. ___________ is a soft copy.
(1) Printed output 
(2) Music sound 
(3) Screen output 
(4) Data 
(5) None of these

Q.8. Which of the following communication protocol set the standard of every computer to access the web based information.
(1) XML 
(2) DML 
(3) HTTP 
(4) HTML 
(5) None of these

Q.9. The interface program that is much user friendly with DBMS known as__________.
(1) front end 
(2) Repository 
(3) Back end 
(4) Form 
(5) None of these

Q.10. Which graphic images are comprised of pixels?
(1) Bit-mapped graphics 
(2) Vector graphics 
(3) Raster graphics
(4) JPEG graphics 
(5) None of these

ANSWERS

Q.1. (3) Ctrl + Home command brings to the first slide in presentation.
Q.2. (3) When using PowerPoint, to play a PowerPoint show for previewing the show, select view, slide show.
Q.3. (3) Bookmark option save the address of the web.
Q.4. (3) For creating a document we can use application software.
Q.5. (1) The primary output device of the computer is known as video monitor.
Q.6. (2) In the time of first generation the computers were programmed using machine language.
Q.7. (3) Screen output is known as a soft copy.
Q.8. (3) HTTP communication protocol set the standard of every computer to access the web based information.
Q.9. (1) The interface program that is much user friendly with DBMS known as front end.
Q.10. (1) Bit mapped graphics images are comprised of pixels.

Computer gk 20 june

Q.1. The ___________ is the physical path over which a message travels.
(1) Protocol 
(2) Medium 
(3) Signal 
(4) All of above 
(5) None of these

Q.2. Which topology requires a central controller hub?
(1) Star 
(2) Mesh 
(3) Bus 
(4) Ring 
(5) None of these

Q.3. Communication between computer and a key board involves__________ transmission.
(1) Half duplex 
(2) Full duplex 
(3) Simplex 
(4) Automatic 
(5) None of these

Q.4. Devices may be arranged in a __________ topology.
(1) Star 
(2) Mesh 
(3) Ring 
(4) Bus 
(5) All of above 

Q.5. ________ is a data communication system in a building, campus or nearby building.
(1) LAN 
(2) WAN 
(3) MAN 
(4) Internet 
(5) None of these

Q.6. Which of the following short key use to Copy a picture of the selected window to the clipboard?
(1) ALT+TAB 
(2) ALT+ print screen 
(3) ALT+CTRL
(4) All of above 
(5) None of these

Q.7. Kernel memory is:
(1) very fast RAM used to hold the most frequently used instructions and data.
(2) expanded RAM that is installed with a new SIMMs module.
(3) the portion of RAM that is used to hold the memory-resident code of the operating system.
(4) RAM that can be disconnected from the computer and plugged into another computer via a universal serial bus 
(USB) port 
(5) None of these

Q.8. Which of the following is not a font style in MS word?
(1) Bold 
(2) Italics 
(3) Regular 
(4) Superscript 
(5) None of these

Q.9. The ____________ contains data name, data type, and length of each field in the database.
(1) data dictionary 
(2) data table 
(3) data record 
(4) data field 
(5) None of these

Q.10. In Windows, a file’s extension is useful for identifying:
(1) the full path of the file.
(2) details about the file such as size and creation date.
(3) the folder location of the file.
(4) the type of application that uses the file.
(5) None of these

ANSWERS

Q.1. (2) The medium is the physical path over which a message travels.
Q.2. (1) Star topology requires a central controller hub for control devices.
Q.3. (3) Communication between computer and a key board known as simplex communication.
Q.4. (5) Devices may be arranged in a star, mesh, ring, and bus topology.
Q.5. (1) LAN is a local area network.
Q.6. (2) ALT+ print screen short key use to Copy a picture of the selected window to the clipboard.
Q.7. (3) Kernel memory is the portion of RAM that is used to hold the memory-resident code of the operating system.
Q.8. (4) Superscript is not a font style in MS word.
Q.9. (1) The data dictionary contains data name, data type, and length of each field in the database.
Q.10. (4) In Windows, a file’s extension is useful for identifying the type of application that uses the file.

Tuesday, June 19, 2018

Computer gk 19 june

.1. A DVD-RAM is similar to a ......... except it has storage capacities up to 5.2 GB.

(1) CD-R 

(2) floppy disk 

(3) CD-RW 

(4) hard disk 

(5) None of these

Q.2. Which of the following is a general-purpose programming language, designed by Sun Microsystems, and well suited for use on the Web?

(1) VB Script 

(2) Java Script 

(3) CSS 

(4) Java 

(5) None of these

Q.3. What is the purpose of providing a Drafts folder in an email system? 

(1) to save unsent emails 

(2) to store spam emails 

(3) to save a copy of sent emails 

(4) to store deleted emails 

(5) None of these

Q.4. Voice mail

(1) is the exchange of text messages and computer files transmitted via a communications network such as a local area network or the Internet

(2) functions much like an answering machine, allowing callers to leave a voice message for the called party

(3) involves using video and computer technology to conduct a meeting between participants at geographically separate locations

(4) permits users to converse in real time with each other via the computer while connected to the Internet

(5) None of these

Q.5. Which of the following identifies a specific web page and its computer on the Web? 

(1) Web site 

(2) Web site address 

(3) URL 

(4) Domain Name 

(5) None of these

Q.6. For sound recording, what is necessary? 

(1) Speaker 

(2) Microphone 

(3) Talker 

(4) Mouse 

(5) Telephone

Q.7. Which port doesn’t exist in computer?

(1) Computer port 

(2) USB port 

(3) Printer port 

(4) Parallel port 

(5) None of these

Q.8. What are the two parts of an E-mail address? 

(1) User name and street address 

(2) Legal name and phone number

(3) User name and domain name 

(4) Initials and password.

(5) Username and recepient

Q.9. Workgroup means-

(1) Individual computer 

(2) Individual user 

(3) Computers in network 

(4) All of the above 

(5) None of the above

Q.10. The type of software that can, store, update, manipulate, and retrieve data is called-

(1) database management 

(2) spreadsheet 

(3) desktop publishing 

(4) graphics 

(5) none of these

ANSWERS

Q.1. (3) A DVD - RAM simililar to CD - RW 

Q.2. (4) Java is general purpose programming language developed by sum micro system. 

Q.3. (1) To save unsent E-mails. 

Q.4. (2) Voice mail is like an answering machine.

Q.5. (3) URL identifies a unique web page and its computer on web or internet.

Q.6. (2) Microphone is used for sound recording.

Q.7. (1) Computer has three kinds of port – USB port, printer port and parallel port while it does not contain computer port. 

Q.8. (3) E-mail address consists of two part, of which the first-part is called user name while the second part is called domain name for example in xyz1@gmail.com xyz1 is user name and gmail.com is domain name. 

Q.9. (3) Workgroup consists of all computers in a network.

Q.10. (1) Database management software can store update, manipulate and receive the 

Sunday, June 17, 2018

Computer gk 17 june

Q.1. In the URL http:// www. mahendras.org, the portion labelled http is the ---------. 

(1) host 

(2) domain name 

(3) protocol 

(4) toplevel domain 

(5) None of these

Q.2. The internet is a system of ------.

(1) Software bundles 

(2) Web page 

(3) Website 

(4) Interconnected Network 

(5) None of these

Q.3. A word in a web page that, when clicked,opens another document.

(1) Anchor 

(2) Hyperlink 

(3) Refrence 

(4) URL 

(5) None of these

Q.4. Unsoilicited e - mail is called a ---------.

(1) Newsgroup 

(2) Usenet 

(3) Backbone 

(4) Spam 

(5) None of these

Q.5. How many layers does OSI model have ?

(1) 6 

(2) 7 

(3) 8 

(4) 5 

(5) None of these

Q.6. Computer connected to LAN can -------.

(1) Run faster 

(2) Share information/and/or share peripheral equipment 

(3) e -mail

(4) Go online 

(5) None of these

Q.7. Which of the following refers to a small, single site network? 

(1) LAN 

(2) DSL 

(3) RAM 

(4) USB 

(5) CPU

Q.8. Dumb terminals have terminals and ------.

(1) Mouse 

(2) Scanner 

(3) Light Pen 

(4) Keyboard 

(5) None of these

Q.9. A device that connect to a network without the use of cables is said to be -------.

(1) Distributed 

(2) Wireless 

(3) Centralized 

(4) Open source 

(5) None of these

Q.10. Full form of PAN?

(1) Personal Area Network 

(2) Pre Area Networking

(3) Personal Application Network 

(4) Post Processing Area

(5) None of these

ANSWERS

Q.1. (3) In http:// www.mahendras.org, http is the protocol.

Q.2. (4) The internet is a system of interconnected network.

Q.3. (2) Hyperlink is an element in an electronic document that links to another place in the same document or to an entirely different document.

Q.4. (4) Unsolicited e-mail is called spam.

Q.5. (2) OSI model have seven layers.

Q.6. (2) Computer connected to a LAN can share information and peripheral equipment.

Q.7. (1) LAN is a small single site Local Area Network.

Q.8. (4) Dumb terminals have terminal and keyboard.

Q.9. (2) A device that connect to a network without the use of cable is said to be wire less.

Q.10. (1) PAN stands for Personal Area Network.

Saturday, June 16, 2018

Computer gk 16 june

Q.1. Crptography technique is used in__________.

(1) Polling 

(2) Job Scheduling 

(3) Protection 

(4) File Management 

(5) Job Priority Management

Q.2. Microsoft word is an example of _______.

(1) An operating system 

(2) Application software 

(3) An output devie 

(4) An input device 

(5) None of these

Q.3. In microsoft excel every cell is referred from cell address to ------- ?

(1) Colunm level of cell 

(2) Column level and tab of worksheet of cell 

(3) Row level of cell 

(4) Row level and column level of cell 

(5) None of these

Q.4. If you type a word that is not in word's dictionary, a ------- wavy underline appears below the word.

(1) Red 

(2) Green 

(3) Blue 

(4) Black 

(5) None of these

Q.5. The -------- button on the Quick Access Toolbar allows you to cancel your recent commands or actions.

(1) Search 

(2) Cut 

(3) Document 

(4) Undo 

(5) None of these

Q.6. In excel, any set of characters containing a letter, hyphen or space is considered as --------.

(1) formula 

(2) text 

(3) name 

(4) title 

(5) None of these

Q.7. ------- cells involves creating a single cell by combining two or more selected cells.

(1) Formatting 

(2) Merging 

(3) Embedding 

(4) Splitting 

(5) None of these

Q.8. The horizontal and vertical lines on a worksheet are called -------?

(1) Cells 

(2) Sheets 

(3) Block lines 

(4) Gridlines 

(5) None of these

Q.9. The first page of a web site is called the -----------.

(1) Homepage 

(2) Index 

(3) Java Script 

(4) Bookmark 

(5) Intropage

Q.10. To reload a web page press the ------ button.

(1) Redo 

(2) Reload 

(3) Restore 

(4) Ctrl 

(5) Refresh

ANSWERS

Q.1. (3) Cryptography technique is used in protection.

Q.2. (2) Microsoft word is an example of application software.

Q.3. (4) In Excel, Cell is referred as cell address (as row level and column level).

Q.4. (1) you will type a word that the program doesn’t recognize, so a red line will appear under words.It means it is not in word’s dictionary.

Q.5. (4) The Undo button on quick access toolbar allow you to cancel your recent commands or action.

Q.6. (1) In excel, a set of character containing letter, hyphen or space is known as formula.

Q.7. (2) In Microsoft Excel, it is possible to combine, or concatenate, different cells of data into one cell by cell merging.

Q.8. (1) Horizontal and vertical lines in excel are called cell

Q.9. (1) First page of website is called home page.

Q.10. (5) To reload a web page Refresh button is used.

Friday, June 15, 2018

Computer gk 15 june

Q.1. Vaccum tubes based electronic computer are of which generation computers?

(1) 1st generation 

(2) 2nd generation 

(3) 3rd generation 

(4) 4th generation 

(5) None of these

Q.2. UNIVAC is an example of which generation computers.

(1) 5th generation 

(2) 2nd generation 

(3) 3rd generation 

(4) 1st generation 

(5) None of these

Q.3. Among the following which is a web browser?

(1) Yahoo 

(2) Google 

(3) AOL 

(4) Cello 

(5) Lycos

Q.4. Which of the following is the word processor of MS office?

(1) Word Star 

(2) Word Pad 

(3) Word 

(4) Word perfect 

(5) None of these

Q.5. Excel files has a default extension of -

(1) .XLS 

(2) .XLW 

(3) .WKI 

(4) .123 

(5) None of these

Q.6. Files created with lotus 1 - 2 - 3 have extension______.

(1) .DOC 

(2) .XLS 

(3).123 

(4) .WKI 

(5) None of these

Q.7. M.S - word allows creation of type of documents by default.

(1) .DOC 

(2) .WPP 

(3) .TXT 

(4) .DOT 

(5) None of these

Q.8. A typical worksheet has ---------- number of columns.

(1) 128 

(2) 256 

(3) 512 

(4) 1024 

(5) None of these

Q.9. Latest version of "MS - office" is- 

(1) Office 2010 

(2) Office 2008 

(3) Office Vista 

(4) Office - N 

(5) None of these

Q.10. ____operating system pays more attention on the meeting of the time limits.

(1) Distributed 

(2) Network 

(3) Real Time 

(4) Online 

(5) Multitasking

ANSWERS

Q.1. (1) First Generation computers are characterised by the use of vacuum tubes.

Q.2. (4) UNIVAC, which stood for Universal Automatic Computer, was developed in first generation.It is the world’s first commercially produced electronic digital computer.

Q.3. (4) Cello was an early shareware 16-bit multipurpose web browser for Windows 3.1.

Q.4. (2) WordPad is a basic word processor that is included with almost all versions of Microsoft Windows from Windows 95 onwards.

Q.5. (1) The file extension of the default Excel format is .xls (.xlsx in newer versions).

Q.6. (3) Files that contain the .123 file extension are most commonly used by the Lotus 1-2-3 spreadsheet software application.

Q.7. (1) .doc is default extension for MS word.

Q.8. (2) A worksheet has 256 number of column.

Q.9. (1) Microsoft Office XP, Microsoft Office 2003, the 2007 Microsoft Office suites, and the 2010 Microsoft Office suites are all supported on Windows Vista.

Q.10. (3) Real time operating system pays more attention on the meeting of the ti

Thursday, June 14, 2018

Computer gk 14 june

Q.1. Adding ‘1’ to ‘1’ in binary would give a -
(1) 01 
(2) 00 
(3) 10 
(4) 11 
(5) None of these 

Q.2. PC stands for_____.
(1) Personal computer 
(2) Process control 
(3) Production computer 
(4) Painful creation 
(5) None of these 

Q.3. A flip-flop can store-
(1) 00 
(2) 01 
(3) Both 0 & 1 
(4) Either 1 or 0 
(5) None of these 

Q.4. Which of the following technique is used in mouse to access?
(1) Dragging 
(2) Removing 
(3) Uninstalling 
(4) Disabling 
(5) None of these 

Q.5. Which of the following is not a peripheral ?
(1) VDU 
(2) Cache Memory 
(3) Cable 
(4) Data 
(5) None of these 

Q.6. The most powerful important computer is. 
(1) Desktop 
(2) Network client 
(3) Network server 
(4) Network station 
(5) None of these 

Q.7. Where do you place data so that computer could read?
(1) Harddrive 
(2) Diskdrive 
(3) Modem 
(4) USB port 
(5) None of these 

Q.8. A floating point number is a -
(1) Decimal number 
(2) Real Number 
(3) Partial fraction 
(4) Both 1 and 2 
(5) None of these 

Q.9. Number of values an 8-bit word can store is-
(1) 128 
(2) 127 
(3) 255 
(4) 256 
(5) None of these 

Q.10. ____ is not a hardware of a computer.
(1) Monitor 
(2) Keyboard 
(3) Windows 
(4) CPU 
(5) None of these 

ANSWERS

Q.1.(3) 10 
Q.2.(1) Personal computer 
Q.3.(4) Either 1 or 0
Q.4.(1) Dragging 
Q.5.(4) Data
Q.6.(3) Network server 
Q.7.(1) Harddrive 
Q.8.(1) Decimal number 
Q.9.(4) 256 
Q.10.(3) Windows

Wednesday, June 13, 2018

Computer gk 13 june

1. An example of an embedded system is —————?

(1) A calculator 

(2) A machine tool 

(3) A CD-Rom 

(4) Keyboard 

(5) None of these 

Q.2. Brain of computer______ .

(1) CPU 

(2) CDRAW 

(3) Floppy Disk 

(4) Hard Disk 

(5) None of these 

Q.3. Which computers use single chip processor ?

(1) Personal computer 

(2) Mainframe Computer 

(3) CRAY computer 

(4) Parallel Computer 

(5) None of these 

Q.4. In computer the smallest unit such as 8 unit makes one byte.

(1) Bit 

(2) Binary 

(3) Octal 

(4) Gigabyte 

(5) None of these 

Q.5. Touch Screen a type of _______ device.

(1) Input Device 

(2) Output Device 

(3) Storage Device 

(4) Both 1 and 2 

(5) None of these 

Q.6. What is (1000)2, equal to ()10?

(1) (10)10 

(2) (10)2 

(3) (8)10 

(4) (8)16 

(5) None of these 

Q.7. Which of the following Number system is used by computer to calculate and store data?

(1) Binary 

(2) Octal 

(3) Decimal 

(4) Hexadecimal 

(5) None of these 

Q.8. Computer processes ____into information .

(1) Data 

(2) Number 

(3) Process 

(4) Report 

(5) None of these 

Q.9. Which of the following performs simple Math for CPU?

(1) DIMM 

(2) ALU 

(3) BUS 

(4) Register 

(5) None of these 

Q.10. Which of the following is hardware?

(1) program 

(2) Mouse 

(3) Software 

(4) Utility 

(5) None of these 

ANSWERS

Q.1.(1) A calculator 

Q.2.(1) CPU 

Q.3.(1) Personal computer 

Q.4.(1) Bit 

Q.5.(1) Input Device

Q.6.(3) (8)10

Q.7.(1) Binary 

Q.8.(1) Data 

Q.9.(2) ALU 

Q.10.(2) Mouse

Tuesday, June 12, 2018

Computer gk 12 june

Q.1. Database utility exist in —————— menu ?

(1) Format 

(2) tools 

(3) File 

(4) Edit 

(5) None of these 

Q.2. In which object sql is used ?

(1) Query 

(2) Form 

(3) Report 

(4) Macro 

(5) None of these 

Q.3. What is the function of relationship ?

(1) Relate multiple table 

(2) Relate multiple form 

(3) Relate table and form 

(4) Relate queries and forms 

(5) None of these 

Q.4. Which of the following is not a transmission medium ?

(1) Telephones lines 

(2) Coaxial cables 

(3) Modem 

(4) Micro wave system 

(5) None of these

Q.5. What is the minimum number of wires needed to send data over a serial communication link layer ?

(1) 1 

(2) 2 

(3) 4 

(4) 6 

(5) None of these

Q.6. The loss in signal power as light travels down the fiber is called

(1) Attenuation 

(2) Interruption 

(3) Scattering 

(4) Propogation 

(5) None of these

Q.7. Which of the following is a browser?

(1) Window XP 

(2) C++ 

(3) Internet Explorer 

(4) Front page 

(5) None of these 

Q.8. Which of the following protocol is used in internet?

(1) TCP/IP 

(2) VB.Net 

(3) Java 

(4) SQL 

(5) None of these 

Q.9. If you do not have an any e-mail account on then which of the following will you select ? 

(1) Sign up 

(2) Sign in 

(3) sign write 

(4) sign down 

(5) None of these 

Q.10. Length of IP address is.........? 

(1) 4 byte 

(2) 48 bits 

(3) 6 digit 

(4) 16 bits 

(5) None of these 

ANSWERS

Q.1. (2) Tools

Q.2. (1) Query

Q.3. (1) Relate Multiple Table

Q.4. (3) Modem 

Q.5. (2) 2 

Q.6. (1) Attenuation 

Q.7. (3) Internet Explorer

Q.8. (1) TCP/IP 

Q.9. (1) Sign up

Q.10. (1) 4 byte is lengt

Monday, June 11, 2018

Computer gk 11 june

.1. You can add an image to a template by clicking the Insert Picture From File button on the _______toolbar.

(1) Illustration 

(2) Charts 

(3) Links 

(4) Table 

(5) Text 

Q.2. The Name box _______.

(1) Shows the location of the previously active cell 

(2) Appears to the left of the formula bar 

(3) Appears below the status bar 

(4) Appears below the menu bar 

(5) None of these 

Q.3. Which of the following is not a basic step in creating a worksheet?

(1) Save the workbook 

(2) Modify the worksheet 

(3) Enter text and data 

(4) Copy the worksheet 

(5) None of these 

Q.4. You can activate a cell by ________.

(1) Pressing the Tab key 

(2) Clicking the cell 

(3) Pressing an arrow key 

(4) All of above 

(5) None of these 

Q.5. Which is the shortcut key to jump to the first slide of the presentation?

(1) Home 

(2) Alt + Home 

(3) Ctrl + Home 

(4) Shift + Home 

(5) Shift + 1 

Q.6. To select more than one slide in the presentation, ______.

(1) Just Click on slide 

(2) Ctrl + Click on slide 

(3) Alt + Click on slide 

(4) Shift + Click on slide 

(5) Alt + Shift + Click on slide 

Q.7. To place something in the same position on every slide of presentation automatically, insert into ______.

(1) Slide master 

(2) Notes master 

(3) Handout master 

(4) All 

(5) None of the above 

Q.8. Can edit an already inserted embedded organization chart object by _____.

(1) Double Click on the organization chart object. 

(2) CTRL + Click on the organization chart object 

(3) SHIFT + Click on the organization chart object 

(4) Single Click on the organization chart object 

(5) None of the above 

Q.9. Shortcut key to insert a hyperlink in a slide _____.

(1) Ctrl + H 

(2) Ctrl + K 

(3) Hyperlinks can’t be inserted in slides 

(4) Alt + K 

(5) None of the above 

Q.10. To draw the Square box in the slide by selecting rectangle tool and _____.

(1) Holding CTRL & Draw 

(2) Holding ALT & Draw 

(3) Holding SHIFT & Draw 

(4) All of the above 

(5) None of these 

ANSWERS

Q.1. (1) Illustration 

Q.2. (2) The Name box appears t the left of the formula bar.

Q.3. (4) Copy the worksheet 

Q.4. (4) you can activate a cell by pressing the Tab key, clicking the cell and pressing an arrow key.

Q.5. (3) Ctrl + Home is the shortcut key to jump to the first slide of the presentation

Q.6. (2) To select more than one slide in the presentation Ctrl + Click on slide.

Q.7. (1) Slide master 

Q.8. (1) Double Click on the organization chart object. 

Q.9. (2) Ctrl + K 

Q.10. (3) To draw the Square box in the slide by selecting rectangle tool and Holding SHIFT & Draw

Saturday, June 9, 2018

Computer gk 10 june

1. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:

(1) Spyware 

(2) adware 

(3) spam 

(4) malware 

(5) None of these 

Q.2. Which of the following is a wildcard that stands in the place of a series of letters?

(1) % 

(2) * 

(3) 

( ) 

(4) “ “ 

(5) None of these 

Q.3. A file containing relatively permanent data is

(1) Random file 

(2) Transaction file 

(3) Master file 

(4) Sequential file 

(5) None of these 

Q.4. Which of the following is not an example of operating system?

(1) Windows 98 

(2) BSD unix 

(3) Microsoft office XP 

(4) Red Hat Linux 

(5) None of these 

Q.5. Check the odd term out ————-.

(1) Internet 

(2) Linux 

(3) Unix 

(4) Windows 

(5) None of these 

Q.6. A process known as —— is used by large retailers to study trends ?

(1) Data mining 

(2) Data selection 

(3) POS 

(4) Data conversion 

(5) None of these 

Q.7. Unit testing will be done by —————-.

(1) Testers 

(2) End users 

(3) Customers 

(4) Developers 

(5) None of these 

Q.8. SPICE means ————-.

(1) Software Process Improvement and Capability Determination. 

(2) Software Process Improvement & compatibility Determination. 

(3) Software Process Invention & Compatibility Determination 

(4) Software Process Invention & Capacity Determination. 

(5) None of these 

Q.9. Computer uses the ———— language to process data?

(1) Processing 

(2) Kilobyte 

(3) Binary 

(4) Representational 

(5) None of these 

Q.10. When you quickly press and release the left mouse button twice you are _____.

(1) Primary clicking 

(2) Pointing 

(3) Double clicking 

(4) Secondary clicking 

(5) Drag and drop 

ANSWERS

Q.1. (4) malware 

Q.2. (2) * 

Q.3. (3) Master file 

Q.4. (3) Microsoft office XP 

Q.5. (1) Internet 

Q.6. (1) Data Mining 

Q.7. (4) Developers 

Q.8. (1) Software Process Improvement and Capability Determination. 

Q.9. (3) Binary 

Q.10. (3) Double clicking

computer gk 9 june

Q.1. The first practical commercial typewriter was invented in 1868 in the United States by
(1) Christopher Latham Sholes 
(2) Carlos Glidden 
(3) Samuel Soule 
(4) All of the above 
(5) None of these 

Q.2. Transistor is used in which genration.
(1) First 
(2) Second 
(3) Third 
(4) Fourth 
(5) None of these 

Q.3. Which is first computing device ?
(1) ABACUS 
(2) UNIVAC 
(3) IBM-1400 
(4) MARK-II 
(5) None of these 

Q.4. The third generation of computers uses of technology:
(1) Vaccum Tubes 
(2) Transistors 
(3) Silicon Chips 
(4) Artificial Intelegence 
(5) All

Q.5. Which of the following was (were) not used in first-generation computer?
(1) vaccuum tubes 
(2) cards 
(3) magnetic core 
(4) punched paper tape 
(5) None of these 

Q.6. First generation computers used to -
(1) Multitasking 
(2) Networking 
(3) Batch processing 
(4) Modulation 
(5) None of these 

Q.7. What was the name of first digital computer
(1) unibase 
(2) eniac 
(3) uniform 
(4) universe 
(5) None of these 

Q.8. Which generation of computer is still under development?
(1) Fourth Generation 
(2) Fifth Generation 
(3) Sixth Generation
(4) Seventh Generation 
(5) None of these 

Q.9. Artificial Intelligence is associated with which generation?
(1) First Generation 
(2) Second Generation 
(3) Fifth Generation 
(4) Sixth Generation 
(5) None of these 

Q.10 Fifth generation computer is also known as
(1) Knowledge information processing system 
(2) Very large scale integration (VLSI) 
(3) Both of above 
(4) Process in batch mode 
(5) None of these

ANSWERS

Q.1. (4) All of the above
Q.2. (2) Second generation
Q.3. (1) ABACUS is the first computing device.
Q.4. (3) Silicon Chips 
Q.5. (5) None of these.
Q.6. (3) Batch Processing is used in first Generation.
Q.7. (2) ENIAC is the name of first digital computer.
Q.8. (2) Fifth generation of computer is still under development.
Q.9. (3) Fifth generation
Q.10. (1) Knowledge information processing system