1. The ______ of a system includes the program or instructions.
1) Hardware
1) Hardware
2) Icon
3) Information
3) Information
4) Software
5) None of these
2. In order to save a word document as a web page you need to?
1) Put the appropriate graphic and links on the document
2) Save the document in the simple text format
3) Use your web browser as an editor and save as URL
4) Save as HTML
5) None of these
3. Something which is easily understood instructions is said to be?
1) User friendly
2) Information
3) Word processing
5) None of these
2. In order to save a word document as a web page you need to?
1) Put the appropriate graphic and links on the document
2) Save the document in the simple text format
3) Use your web browser as an editor and save as URL
4) Save as HTML
5) None of these
3. Something which is easily understood instructions is said to be?
1) User friendly
2) Information
3) Word processing
4) Icon
5) None of these
4. The copy command saves the data to which of the following?
1) The desktop
2) The clipboard
3) Microsoft word
5) None of these
4. The copy command saves the data to which of the following?
1) The desktop
2) The clipboard
3) Microsoft word
4) Paste
5) None of these
5. Arranging the data in a sequence is known as?
1) Classifying
5) None of these
5. Arranging the data in a sequence is known as?
1) Classifying
2) Searching
3) Sorting
4) Reproducing
5) None of these
6. Find the Mis-Matched pair ?
1) Chrome - Google
2) Opera - Opera Software
3) Internet Explorer - Microsoft
4) Safari - Net Scape Commu-nications
5) None of these
7. In order to save an existing document with a different name you need to?
1) Retype the document and give it a different name
2) Use the Save as command
3) Copy it to a new folder and then save
4) Use Windows Explorer to save
5) None of these
8. Which of the following is a graphics package?
1) Adobe page maker
2) Acrobat Reader
3) Microsoft word
4) Corel Draw
5) None of these
9. Plotter is very useful in applica-tions such as?
1) Computer aided design
2) Word processing
3) Financial accounting
4) Spell checking
6. Find the Mis-Matched pair ?
1) Chrome - Google
2) Opera - Opera Software
3) Internet Explorer - Microsoft
4) Safari - Net Scape Commu-nications
5) None of these
7. In order to save an existing document with a different name you need to?
1) Retype the document and give it a different name
2) Use the Save as command
3) Copy it to a new folder and then save
4) Use Windows Explorer to save
5) None of these
8. Which of the following is a graphics package?
1) Adobe page maker
2) Acrobat Reader
3) Microsoft word
4) Corel Draw
5) None of these
9. Plotter is very useful in applica-tions such as?
1) Computer aided design
2) Word processing
3) Financial accounting
4) Spell checking
5) None
10. Data processing cycle consists of?
1) Input and output
2) Output and processing
3) Input, processing and output
4) Only input
10. Data processing cycle consists of?
1) Input and output
2) Output and processing
3) Input, processing and output
4) Only input
5) None
11. 'MICR' technology used for clearance of cheques by banks refers to
1) Magnetic Ink Character Recognition
2) Magnetic Intelligence Chara-cter Recognition
3) Magnetic Information Cable Recognition
4) Magnetic Cable Recognition
5) None of these
12. All the information collected during database development is stored in a?
1) Repository
2) Data warehouse
11. 'MICR' technology used for clearance of cheques by banks refers to
1) Magnetic Ink Character Recognition
2) Magnetic Intelligence Chara-cter Recognition
3) Magnetic Information Cable Recognition
4) Magnetic Cable Recognition
5) None of these
12. All the information collected during database development is stored in a?
1) Repository
2) Data warehouse
3) RAD
4) CASE
4) CASE
5) None of these
13. ___ is a type of RAM that stores each bit of data in a separate capacitor within an integrated circuit making it an efficient way to store data in memory.
1) DRAM
13. ___ is a type of RAM that stores each bit of data in a separate capacitor within an integrated circuit making it an efficient way to store data in memory.
1) DRAM
2) PRAM
3) NRAM
3) NRAM
4) NORAM
5) None of these
14. What is the symbol for attachments in yahoo mail :
1) Envelope
5) None of these
14. What is the symbol for attachments in yahoo mail :
1) Envelope
2) Letter A
3) Paper Clip
3) Paper Clip
4) Pen
5) None of these
15. To cover files from a backup you perform________ option
1) Scan
5) None of these
15. To cover files from a backup you perform________ option
1) Scan
2) Move
3) Copy
3) Copy
4) Restore
5) None of these
16. The internet began with the development of?
1) Ethernet
5) None of these
16. The internet began with the development of?
1) Ethernet
2) Internet
3) USENET
3) USENET
4) Extranet
5) ARPANET
17. Select the odd man out
1) Interpreter
5) ARPANET
17. Select the odd man out
1) Interpreter
2) Programmer
3) Operating system
4) Assembler
3) Operating system
4) Assembler
5) Utility
18. The number of pixels displayed on a screen is known as the screen?
1) Resolution
2) Color depth
3) Refresh rate
3) Refresh rate
4) Viewing size
5) None of these
19. Name the certifying authority of digital signatures in banking and financial sector?
1) The IDRBT Certifying Auth-ority
2) Individual Banks
3) Reserve Bank of India
4) Indian Bank's Association
5) None of these
20. Firewall in parlance of computer science is a method of?
1) Stopping unauthorized access
2) Making network more secure against banking attempts
3) Filtering the data that is going out of the network and coming in the network.
4) All the above
5) None of these
19. Name the certifying authority of digital signatures in banking and financial sector?
1) The IDRBT Certifying Auth-ority
2) Individual Banks
3) Reserve Bank of India
4) Indian Bank's Association
5) None of these
20. Firewall in parlance of computer science is a method of?
1) Stopping unauthorized access
2) Making network more secure against banking attempts
3) Filtering the data that is going out of the network and coming in the network.
4) All the above
5) None
21. Encryption is used in computers to?
1) Protect data from unauthor-ized access
2) Protect data from damaging
3) Prevent the computer from unauthorized users
4) All the above
5) None
Answers
1) 4; 2) 4; 3) 1; 4) 2; 5) 3; 6) 4; 7) 2; 8) 4; 9) 1; 10) 3;
11) 1; 12) 2; 13) 1; 14) 3; 15) 4; 16) 5; 17) 2; 18) 1; 19) 1; 20) 4; 21) 1.
21. Encryption is used in computers to?
1) Protect data from unauthor-ized access
2) Protect data from damaging
3) Prevent the computer from unauthorized users
4) All the above
5) None
Answers
1) 4; 2) 4; 3) 1; 4) 2; 5) 3; 6) 4; 7) 2; 8) 4; 9) 1; 10) 3;
11) 1; 12) 2; 13) 1; 14) 3; 15) 4; 16) 5; 17) 2; 18) 1; 19) 1; 20) 4; 21) 1.