Search This Blog

Saturday, June 9, 2018

Computer gk 10 june

1. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:

(1) Spyware 

(2) adware 

(3) spam 

(4) malware 

(5) None of these 

Q.2. Which of the following is a wildcard that stands in the place of a series of letters?

(1) % 

(2) * 

(3) 

( ) 

(4) “ “ 

(5) None of these 

Q.3. A file containing relatively permanent data is

(1) Random file 

(2) Transaction file 

(3) Master file 

(4) Sequential file 

(5) None of these 

Q.4. Which of the following is not an example of operating system?

(1) Windows 98 

(2) BSD unix 

(3) Microsoft office XP 

(4) Red Hat Linux 

(5) None of these 

Q.5. Check the odd term out ————-.

(1) Internet 

(2) Linux 

(3) Unix 

(4) Windows 

(5) None of these 

Q.6. A process known as —— is used by large retailers to study trends ?

(1) Data mining 

(2) Data selection 

(3) POS 

(4) Data conversion 

(5) None of these 

Q.7. Unit testing will be done by —————-.

(1) Testers 

(2) End users 

(3) Customers 

(4) Developers 

(5) None of these 

Q.8. SPICE means ————-.

(1) Software Process Improvement and Capability Determination. 

(2) Software Process Improvement & compatibility Determination. 

(3) Software Process Invention & Compatibility Determination 

(4) Software Process Invention & Capacity Determination. 

(5) None of these 

Q.9. Computer uses the ———— language to process data?

(1) Processing 

(2) Kilobyte 

(3) Binary 

(4) Representational 

(5) None of these 

Q.10. When you quickly press and release the left mouse button twice you are _____.

(1) Primary clicking 

(2) Pointing 

(3) Double clicking 

(4) Secondary clicking 

(5) Drag and drop 

ANSWERS

Q.1. (4) malware 

Q.2. (2) * 

Q.3. (3) Master file 

Q.4. (3) Microsoft office XP 

Q.5. (1) Internet 

Q.6. (1) Data Mining 

Q.7. (4) Developers 

Q.8. (1) Software Process Improvement and Capability Determination. 

Q.9. (3) Binary 

Q.10. (3) Double clicking

No comments:

Post a Comment