marquee

Welcome to Competative Exams Guide.For Your aluable Suggestions Mail us to Urlasurace@Gmail.com

menu

Search here for anything you want

computer Knowledge

1. The basic goal of computer process is to convert data into……

(1) information
(2) tables
(3) files
(4) graphs
(5) None of these

Answer : 1

2. ……… Software allows users to perform calculations on rows and columns of data.

(1) Word processing
(2) Presentation graphics
(3) Database Management Systems
(4) Electronic Spreadsheet
(5) None of these

Answer : 3

3. The memory resident portion of the operating system is called the :

(1) registry
(2) API
(3) CMOS
(4) kernel
(5) None of these

Answer : 4

4. Which of the following is a transaction?

(1) A group of SQL statements consisting of one read and one write operation
(2) A group of SQL statements consisting only of ready operations.
(3) A group of SQL statements defining a user-oriented task
(4) A group of SQL statements consisting only of write operations.
(5) None of these

Answer : 3

5. In order for computers to communicate across a network, they must be connected through a(n)………

(1) TCP/IP
(2) Topology
(3) Ethernet
(4) Thin client
(5) None of these

Answer : 2

6. “Buy Now – Pay Now” is commonly used for :

(1) Debit Cards
(2) Vault Cards
(3) Credit Cards
(4) E-purse
(5) None of these

Answer : 1

7. The ……… , stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.

(1) BIOS
(2) API
(3) device driver
(4) supervisor program
(5) display

Answer : 1

8. Choices in computers are referred to as :

(1) options
(2) exit
(3) boot
(4) folder
(5) None of these

Answer : 1

9. The ……… button on the quick access Toolbar allows you to cancel your recent commands or actions.

(1) Search
(2) Cut
(3) Document
(4) Undo
(5) None of these

Answer : 4

10. During the boot process, the ……… looks for the system files.

(1) HDD
(2) BIOS
(3) CPU
(4) DVD
(5) CD

Answer : 2

11. Computers gather data, which means they allow users to…… data.

(1) present
(2) store
(3) output
(4) input
(5) None of these

Answer : 4

12. Which of the following is a transaction?

(1) A group of SQL statements consisting of one read and one write operation
(2) A group of SQL statements consisting only of ready operations.
(3) A group of SQL statements defining a user-oriented task
(4) A group of SQL statements consisting only of write operations.
(5) None of these

Answer : 3
13. What are the four basis connecting hardware devices?

(1) Repeater, bridge, router and gateway
(2) Repeater, bridge, router and dell
(3) Repeater, connector, router and gateway
(4) Amplifier, bridge, router and gateway
(5) None of these

Answer : 1

14. The ……… lists the location of files on the disk

(1) FAT
(2) boot sector
(3) root folder
(4) data area
(5) None of these

Answer : 1

15. A device operating at the physical layer is called a :

(1) Bridge
(2) Router
(3) Repeater
(4) All of the above
(5) None of these

Answer : 3

16. Number of bits per symbol used in Baudot code is

(1) 5
(2) 6
(3) 7
(4) 8
(5) 9

Answer : 1

17. All of the following statements concerning windows are true EXCEPT :

(1) windows are an example of a command-driven environment.
(2) windows can be resized and repositioned on the desktop.
(3) more than one window can be open at a time.
(4) toolbars and scrollbars are features of windows.
(5) None of these.

Answer : 1

18. A client / server network ……….

(1) has clients that provide functions such as application control and shared computation.
(2) uses client computers to provide copies of software to the server to allow server processing.
(3) provides a company with the capability to downsize from lager computer systems and move away from legacy
systems.
(4) has server computers that perform all processing, clients are dumb’ input/ output devices only.
(5) None of these.

Answer : 2

19. To get to the ‘Symbol’ dialog box, click on the ……… menu and choose ‘Symbol’.

(1) Insert
(2) Format
(3) Tools
(4) Table
(5) Help

Answer : 1

20. Which is not a data source component?

(1) mail merge toolbar
(2) header row
(3) data fields
(4) data records
(5) All of these

Answer : 1


21. Use this when you want to make all letters capital without having to use the shift key for each character………
(1) shifter
(2) upper case
(3) caps lock key
(4) icon
(5) None of these

Answer : 3

22. When you quickly press and releaes the left mouse button twice, you are :
(1) Primary-clicking
(2) pointing
(3) Double-clicking
(4) Secondary-clicking
(5) None of these

Answer : 3

23. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the ……… view.
(1) List
(2) Thumbnails
(3) Details
(4) Icon
(5) None of these

Answer : 3
24. Programming language built into user programs such as Word and Excel are known as ………
(1) 4GLs
(2) macro languages
(3) object-oriented languages
(4) visual programming languages
(5) None of these

Answer : 4

25. To move a copy of file from one computer to another over a communication channel is called?
(1) File transfer
(2) File encryption
(3) File modification
(4) File copying
(5) None of the above

Answer : 1

26. Which of the following is not a type of hub?
(1) Passive hub
(2) Inactive hub
(3) Switching hub
(4) Intelligent hub
(5) None of these

Answer : 2

27. …… allows you to print.
(1) ribbon
(2) monitor
(3) go now
(4) Control-P
(5) None of these

Answer : 4
28. Ina synchronous modem, the receive equilizer is known as
(1) adaptive equilizer
(2) impariment equilizer
(3) statistical equalizer
(4) compromise equilizer
(5) None of these

Answer : 1

29. Which of the following is not the part of standard office suite?
(1) Word Processor
(2) Database
(3) Image Editor
(4) File manager
(5) None of these

Answer : 4

30. In a document what is the maximum number of columns that can be inserted in MS Word Table?
(1) 35
(2) 15
(3) 63
(4) 65
(5) 70

Answer : 3

31. Where does most data go first with in a computer memory hierarchy?
(1) RAM
(2) ROM
(3) BIOS
(4) CACHE
(5) None of these

Answer : 1

32. COBOL is an acronym for ………
(1) Common Business Oriented Language
(2) Computer Business Oriented Language
(3) Common Business Operated Language
(4) Common Business Organized Language
(5) None of these

Answer : 1

33. Machine language sometimes also referred as :
(1) Binary language
(2) High level language
(3) Middle level language
(4) Low level language
(5) None of these

Answer : 1

34. When creating a computer program, the ……… designs the structure of the program
(1) End user
(2) System Analyst
(3) Programmer
(4) Architect
(5) All of the above

Answer : 2

35. Which is an another name for functional language
(1) Machine
(2) Application
(3) Low-level language
(4) High-level language
(5) None of these

Answer : 2

36. ……… is data that has been organized or presented in a meaningful fashion.
(1) A process
(2) Software
(3) Storage
(4) Information
(5) None of these

Answer : 4

37. Every computer connected to an intranet or extranet must have a distinct
(1) firewall
(2) proxy server
(3) IP address
(4) domain name
(5) None of these

Answer : 3

38. ……… translates the semantic instructions developed by programmers into the machine language
(1) Assembler
(2) Interpreter
(3) Loader
(4) Complier
(5) None of these

Answer : 1

39. ………is an artificial language designed to communicate instructions to a computer.
(1) Programming language
(2) Machine language
(3) Software language
(4) Assembly language
(5) None of these

Answer : 1

40. This is a standard way for a Web server to pass a Web user’s request to an application program and to receive data back to forward to the user-
(1) Interrupt request
(2) Forward DNS lookup
(3) Data-Link layer
(4) File Transfer Protocol
(5) Common gateway interface

Answer : 5



41. The capability of the operating system to enable two or more than two programs to execute simultaneously in a single computer system by using a single processor is—
(1) Multiprocessing
(2) Multitasking
(3) Multiprogramming
(4) Multiexecution
(5) None of these

Answer : 2

42. Virtual memory is typically located:
(1) on a floppy disk
(2) in the CPU.
(3) in a flash card
(4) on the hard drive.
(5) None of these

Answer : 4

43. This type of software is designed for users who want to customize the programs they use.
(1) Shareware
(2) Open-source software
(3) Freeware
(4) Macros
(5) None of these

Answer : 1

44. The effect of the ROLLBACK command in a transaction is the following —
(1) Undo all changes to the data- base resulting from the execution of the transaction
(2) Undo the effects of the last UPDATE command
(3) Restore the content of the database to its state at the end of the previous day
(4) Make sure that all changes to the database are in effect
(5) None of these

Answer : 1

45. A result of a computer virus cannot lead to :
(1) Disk Crash
(2) Mother Board Crash
(3) Corruption of program
(4) Deletion of files
(5) None of these

Answer : 2

46. The smallest item of useful information a computer can handle—
(1) bite
(2) byte
(3) bit
(4) bait
(5) None of these

Answer : 3

47. All of the following are TRUE of Safe Mode EXCEPT:
(1) Safe Mode is a special diagnostic mode.
(2) Safe Mode loads all nonessential icons.
(3) Safe Mode allows users to troubleshoot errors.
(4) Safe Mode loads only the most essential devices.
(5) None of these

Answer : 2

48. Superscript, subscript, outline, emboss, engrave are known as :
(1) font styles
(2) font effects
(3) word art
(4) text effects
(5) None of these

Answer : 2

49. Changing the appearance of a document is called
(1) Proofing
(2) Editing
(3) Formatting
(4) Correcting
(5) All of the above

Answer : 3

50. You can detect spelling and grammar errors by :
(1) Press Shift + F7
(2) Press Ctrl + F7
(3) Press Alt+ F7
(4) Press F7
(5) None of these

Answer : 4

51. What kind of memory is both static and non-volatile?
(1) RAM
(2) ROM
(3) BIOS
(4) CACHE
(5) PROM

Answer : 2


52. A process known as — is used by large organization to study trends.
(1) data mining
(2) data selection
(3) POS
(4) data conversion
(5) None of these

Answer : 1

53. A(n) — system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
(1) PSS
(2) POS
(3) inventory
(4) data mining
(5) None of these

Answer : 1

54. — cells involve creating a single cell by combining two or more selected cells.
(1) Formatting
(2) Merging
(3) Embedding
(4) Splitting
(5) None of these

Answer : 2

55. Single party disk relying on the disk controller for finding out which disk has failed is used by :
(1) RAID level 5
(2) RAID level 2
(3) RAID level 4
(4) RAID level 3
(5) RAID level 1

Answer : 4

56. The sharing of a medium and its path by 2 or more devices is called —
(1) Modulation
(2) Encoxing
(3) Line discipline
(4) Multiplexing
(5) None of these

Answer : 4

57. What happens when you click on Insert > Picture > Clip Art
(1) It inserts a clipart picture into document
(2) It lets you choose clipart to insert into document
(3) It opens Clip Art taskbar
(4) It insets symbols
(5) None of these

Answer : 3

58. Which of the following does NOT occur during the power-on self-test (POST)?
(1) The ScanDisk utility begins to run.
(2) The video card and video memory are tested.
(3) The BIOS identification process occurs.
(4) Memory chips are checked to ensure they are working properly.
(5) None of these

Answer : 1

59. OLE stands for :
(1) Online Link Embedding
(2) Object Link Export
(3) Object Linking and Embedding
(4) Online Link Emulation
(5) None of these

Answer : 3

60. Which of the following is not available in Font Spacing?
(1) Normal
(2) Loosely
(3) Condensed
(4) Expanded
(5) All are available

Answer : 2

61. The purpose of a swap (or page) file is to:
(1) maintain pages of documents that are being spooled to the printer.
(2) hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
(3) prevent thrashing in a multitasking environment.
(4) allow multiple print jobs to print their pages out simultaneously.
(5) None of these

Answer : 2

62. Software programs that allow you to legally copy files and give them away at no cost are called which of the
following :
(1) Time sharing
(2) Public domain
(3) Shareware
(4) Freeware
(5) None of these

Answer : 3

63. Which of the following is NOT a goal of Transaction processing system?
(1) Capture, process and store transactions
(2) Produce a variety of documents related to Routine business activities
(3) Reduce manual effort associated with Processing business transactions
(4) Produce standard reports used for Management decision making
(5) None of the above

Answer : 2

64. The degree of detail that should be incorporated into a databasedepends on what?
(1) Data integrity
(2) The type of database
(3) The user’s perspective
(4) The business practices and policies
(5) None of these

Answer : 2

65. Superscript refers to —
(1) Characters displayed below the line of the normal text
(2) Characters displayed above the line of the normal text
(3) Characters displayed vertically centre
(4) Both (1) and (2)
(5) None of these

Answer : 2

66. A — is an additional set of commands that the computer displaysafter you make a selection from the main menu :
(1) dialog box
(2) submenu
(3) menu selection
(4) All of the above
(5) None of these

Answer : 1

67. The difference between people with access to computers and the Internet and those without this access is known as the :
(1) digital divide
(2) Internet divide
(3) Web divide
(4) broadband divide
(5) None of these

Answer : 1

68. How will you remove all formatting added to your documents (such as bold, italics, and underline etc.)
(1) Save
(2) Save as plain text file
(3) Save as
(4) All of the above
(5) None of these

Answer : 2

69. With the object-oriented (OO) approach, an object encapsulates, or — a programmer.
(1) carries out, the details of an object for
(2) hides, the details of an object from
(3) reveals, the details of an object to
(4) extends, the details of an object beyond
(5) None of these

Answer : 2

70. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called :
(1) robotics
(2) simulation
(3) computer forensics
(4) animation
(5) None of these

Answer : 3

71. Granting an outside organisation access to Internet web pages is often implemented using a (an) :
(1) Extranet
(2) Intranet
(3) Internet
(4) Hacker
(5) None of these
Answer : 1


72. The purpose of the primary key in a database is to :
(1) Unlock the database
(2) Provide a map of the data
(3) Uniquely identify a record
(4) Establish constraints on database operations
(5) None of the above

Answer : 3

73. The code that relational database management Systems use to perform their database task is referred to as :
(1) QBE
(2) SQL
(3) OLAP
(4) Sequel Server
(5) None of these

Answer : 2

74. VIRUS stands for :
(1) Vital Information Recourse Under Siege
(2) Vital Information Reason Under Siege
(3) Vital Information Recourse Under System
(4) Virus Information Recourse Under Siege
(5) None of these

Answer : 1

75. Data becomes ................ when it is presented in a format that people can understand and use.
(1) processed
(2) graphs
(3) information
(4) presentation
(5) None of these

Answer : 3

76. The term ............. designates equipment that might be added to a computer system to enhance its functionality.
(1) digital device
(2) system add-on
(3) disk pack
(4) peripheral device
(5) None of these

Answer : 4

77. ……… is the language that enable user to access or manipulate data as organized by appropriate data model :
(1) DML
(2) SDL
(3) DDL
(4) All of the above
(5) None of these

Answer : 1

78. The user commands that are used to interact with a database is called as :
(1) Query
(2) Interaction
(3) Command
(4) Instruction
(5) None of these

Answer : 3

79. RAM can be thought of as the ......... for the computer’s processor :
(1) factory
(2) operating room
(3) waiting room
(4) planning room
(5) None of these

Answer : 3

80. ……… is computer software designed to operate the computer hardware and to provide platform for running application software :
(1) Application software
(2) System software
(3) Software
(4) Operating system
(5) None of these

Answer : 2



81. An assembler is used to translate a program written in………
(1) a low level language
(2) machine language
(3) a high level language
(4) assembly language
(5) None of these

Answer :4

82. The operating system controls access to the processor by assigning a(n) ……… to each task requiring the processor’s attention.
(1) CPU
(2) slice of time
(3) stack
(4) event
(5) None of these

Answer :2

83. Which of the following is the correct sequence of actions that takes place during the boot-up process?
(1) Load operating system - Activate BIOS-Perform POST-Check configuration settings
(2) Activate BIOS-Perform POST-Load operating system-Check configuration settings
(3) Perform POST - Load operating system - Activate BIOS - Check configuration settings
(4) Activate BIOS - Check configuration settings - Perform POST -Load operating system
(5) None of these

Answer :2

84. Using Windows Explorer, a plus (+) sign in front of a folder indicates :
(1) an open folder
(2) the folder contains subfolders
(3) a text file
(4) a graphics file
(5) None of these

Answer :2

85. Which of the following position is not available for fonts on MS Word?
(1) Normal
(2) Raised
(3) Lowered
(4) Centered
(5) All are available

Answer :4

86. “Buy Now – Pay Later” is commonly used for :
(1) Debit Cards
(2) Vault Cards
(3) Credit Cards
(4) E-purse
(5) None of these

Answer :3

87. The different styles of lettering in a word processing program……
(1) font
(2) calligraphy
(3) writing
(4) manuscript
(5) None of these

Answer :1

88. To move down a page in a document……
(1) jump
(2) fly
(3) wriggle
(4) scroll
(5) None of these

Answer :4

89. Compilers can identify:
(1) syntax errors
(2) semantic errors
(3) logical errors
(4) mathematical errors
(5) None of these

Answer :1

90. Which was the first Scientific Computer Programming Language?
(1) COBOL
(2) LISP
(3) ADA
(4) FORTRAN
(5) JAVA

Answer : 4

91. A hard copy of a document is …
(1) stored in the hard disk
(2) stored on a floppy
(3) stored on a CD
(4) printed on the paper
(5) None of these

Answer :4

92. Flow control in TCP/IP is handled using:
(1) Urgent pointer
(2) Checksum
(3) Acknowledgement number
(4) Variable-size sliding window
(5) None of these

Answer :4

93. This component is required to process data into information and consists of integrated circuits .
(1) Hard disk
(2) RAM
(3) CPU
(4) ROM
(5) None of these

Answer :3

94. From which menu you can insert Header and Footer?
(1) Insert Menu
(2) View Menu
(3) Format menu
(4) Tools Menu
(5) Edit Menu

Answer :2

95. Moves the cursor one space to the right to puts spaces in between words……
(1) control key
(2) space bar
(3) printer
(4) mouse
(5) None of these

Answer :2

96. Shimmer, Sparkle text, Blinking Background etc. are known as :
(1) font styles
(2) font effects
(3) word art
(4) text effects
(5) None of these

Answer :4

97. The horizontal and vertical lines on a worksheet are called :
(1) cells
(2) sheets
(3) block lines
(4) gridlines
(5) None of these

Answer :4

98. The basic input/output system (BIOS) is stored in:
(1) RAM
(2) ROM
(3) the CPU
(4) the hard drive
(5) None of these

Answer :2

99. Which of the following features usually applies to data in a data warehouse?
(1) Data are often deleted
(2) Most applications consists of transactions
(3) Data are rarely deleted
(4) Relatively few records are processed by applications
(5) None of these

Answer :2

100. What type of program controls the various computer parts and allows the user interact with the computer ?
(1) Utility software
(2) Operating system
(3) Word processing software
(4) Database program
(5) None of these


Answer :1


101. Which of the following is an example of connectivity?
(1) data
(2) hard disk
(3) Internet
(4) power cord
(5) None of these

Answer :3

102. The command used to remove text or graphics from a document. The information is then stored on a clipboard so you can paste it.
(1) chop
(2) cut
(3) clip
(4) cart away
(5) None of these

Answer :2

103. People, procedures, software, hardware, and data are the five parts of a(n) :
(1) competency system
(2) computer system
(3) information system
(4) software system
(5) None of these

Answer :3

104. The feature of Word that automatically adjusts the amount of spacebetween certain combinations of characters so that an entire word looks more evenly spaced. What is that feature called?
(1) Spacing
(2) Scaling
(3) Kerning
(4) Positioning
(5) None of these

Answer :3

105. Which of the following statement is wrong?
(1) Windows XP is an operating system
(2) Linux is owned and sold by Microsoft
(3) Photoshop is a graphical design tool by Adobe
(4) Linux is free and open source software
(5) None of the above

Answer :2

106. A phenomenon in virtual memory schemes in which the processor spends most of the time swapping pages rather than executing instructions is :
(1)loading
(2) swapping
(3) thrashing
(4) aging
(5) digging

Answer :3

107. Give the name of the Linear list in which elements can be added at ends but not in the middle:
(1) Array
(2) Queue
(3) Tree
(4) Circular Queue
(5) None of these

Answer :2

108. Flip-flop is the basic structure of the device:
(1) Hard disk
(2) Memory
(3) Cells
(4) Speakers
(5) None of these

Answer :2

109. What is a specialized software program that allows input and output devices to communicate with the rest of the computer system?
(1) Utility driver
(2) Utility program
(3) Data compression utility
(4) Device driver
(5) None of these

Answer :4

110. When assigning a shortcut key to a symbol, you should always try to select a key or key combination that is:
(1) unassigned
(2) Located on the ten-key pad section of your keyboard.
(3) Assigned to another task.
(4) From the same font family as the symbol.
(5) None of these

Answer :1


111. Which American Computer Company is called big blue?
(1) Microsoft
(2) Compaq Corp
(3) IBM
(4) Tandy Sevenson
(5) Hewlett Packard

Answer :3

112. A dumb terminal has :
(1) An embedded microprocessor
(2) Extensive memory
(3) Independent processing
(4) A keyboard and screen
(5) None of these

Answer :2

113. Which of the following is a software selection criteria?
(1) Appropriateness
(2) Efficiency
(3) Compatibility
(4) All of the above
(5) None of these

Answer :2

114. Which of the following memories needs refresh?
(1) SRAM
(2) DRAM
(3) ROM
(4) All of above
(5) None of these

Answer :4

115. ……… is paperless document transfer between companies.
(1) EFT
(2) EDI
(3) ETS
(4) RTGS
(5) None of these

Answer :4

116. The switching devices used in First Generation computer’s were:
(1) Transistors
(2) SSI chips
(3) VLSI chips
(4) Vacuum Tubes
(5) None of these

Answer :4

117. The Virtual Memory is located logically :
(1) in the CPU
(2) in main memory
(3) in between CPU and primary memory
(4) in the Hard disk
(5) None of these

Answer :2

118. A software used to convert source program instructions to object instruction is known as :
(1) Compiler
(2) Assembler
(3) Interpreter
(4) Language processor
(5) None of these

Answer :4

119. The subject of cybernetics deals with the science of :
(1) Genetics
(2) Control and communications
(3) Molecular biology
(4) Biochemistry
(5) None of these

Answer :2

120. WAIS stands for :
(1) Wide Area Intellectual Service
(2) Web Access Information system
(3) World wide Application of Intelligent System
(4) Wide Area Information Service
(5) None of these

Answer :4

121. Correcting errors in a program is referred to as………
(1) debugging
(2) bugging
(3) rectifying
(4) modifying
(5) None of these

Answer: 1

122. Which type of processing speed measurement is used primarily with supercomputers?
(1) Flops
(2) Fractions of second
(3) Gigahertz
(4) MIPS
(5) None of these

Answer: 1

123. What is the term associated with the second part of an e-mail address?
(1) Local address
(2) Eight characters long
(3) User name
(4) Domain name
(5) None of these

Answer: 4

124. Bold, Italic, Regular are known as :
(1) font styles
(2) font effects
(3) word art
(4) text effects
(5) None of these

Answer: 1


125. This is a group of servers that share work and may be able to back each other up if one server fails.
(1) Channel bank
(2) Cluster
(3) Tiger team
(4) Serverless backup
(5) Logical unit

Answer: 2

126. Smart Card is :
(1) Special purpose Cards
(2) Microprocessor Cards
(3) Processing unit contains memory for storing data
(4) Processing unit for software handling
(5) None of these

Answer: 2

127. A screen element of MS Word that is usually located below the title bar that provides categorized options is :
(1) Menu mar
(2) Tool Bar
(3) Status Bar
(4) All of the above
(5) None of these

Answer: 1

128. Which keys can be used together with other keys for special tasks ?
(1) Insert, Delete
(2) Ctrl, Shift
(3) Left Arrow, Right Arrow
(4) Page up, Page Down
(5) None of these

Answer: 2

129. Data related crime does not incorporate :
(1) Data Didling
(2) Data Spying
(3) Data Leakage
(4) Data Mining
(5) None of these

Answer: 4

130. ‘DOS’ floppy disk does not have :
(1) A Boot Record
(2) A File Allocation Table
(3) A Root Directory
(4) Virtual Memory
(5) None of these

Answer: 4

131. A disk on which you store information………
(1) plate
(2) data disk
(3) paper disk
(4) TV disk
(5) None of these

Answer: 2

132. Lets you leave a screen or program……
(1) boot
(2) programs
(3) exit
(4) text
(5) None of these

Answer: 3

133. The operating system does all of the following EXCEPT:
(1) provide a way for the user to interact with the computer.
(2) manage the central processing unit (CPU).
(3) manage memory and storage.
(4) enable users to perform a specific task such as document editing.
(5) None of these

Answer: 4

134. MS-DOS is a ……… operating system.
(1) point-and-click
(2) user-friendly
(3) command-driven
(4) Mac
(5) None of these

Answer: 3

135. Procedures are typically documented in manuals written by :
(1) computer specialists
(2) end users
(3) Microsoft
(4) service providers
(5) None of these
]
Answer: 1

136. What deletes the entire file except the file structure ?
(1) ERASE
(2) DELETE
(3) ZAP
(4) PACK
(5) None of these

Answer: 3

137. ……… takes one line, checks it for errors and then executes it.
(1) Assembler
(2) Interpreter
(3) Loader
(4) Complier
(5) None of these

Answer: 2

138. Artificial Intelligence is associated with which generation?
(1) First Generation
(2) Second Generation
(3) Third Generation
(4) Fifth Generation
(5) Sixth Generation

Answer: 4

139. Time during which a job is processed by the computer is :
(1) Delay times
(2) Real time
(3) Execution time
(4) Down time
(5) None of these

Answer: 3

140. Which of the following is not an input device?
(1) OCR
(2) Optical scanners
(3) Voice recognition device
(4) COM (Computer Output to Microfilm)
(5) None of these

Answer: 4


141. In latest generation computers, the instructions are executed :
(1) Parallel only
(2) Sequentially only
(3) Both sequentially and parallel
(4) All of above
(5) None of these

Answer: 3

142. A technique used by codes to convert an analog signal into a digital bit stream is known as :
(1) Pulse code modulation
(2) Pulse stretcher
(3) Query processing
(4) Queue management
(5) None of these

Answer: 1

143. The number of bits that can be transmitted over a network in a certain period of time:
(1) Latency
(2) Delay
(3) Bandwidth
(4) Baud
(5) None of these

Answer: 3

144. Linux partitions are created using the file system:
(1) FAT
(2) FAT32
(3) EXT3
(4) NTFS
(5) None of these

Answer: 3

145. Which of the following data structure is widely used in a network model RDBMS?
(1) Arrays
(2) trees
(3) graphs
(4) stacks
(5) None of these

Answer: 3

146. The scientist who developed the idea of the WWW is :
(1) James Gosling
(2) Tim Berns Lee
(3) Andrew Tannenbaum
(4) Linus Torvalds
(5) Bill Gates

Answer: 2

147. What was the data transmission method in which bi-directional data flow is allowed?
(1) Simplex
(2) Duplex
(3) Analog
(4) Single side mode
(5) None of these

Answer: 2

148. To check the presence of a computer in the network, use the command:
(1) ping
(2) cmd
(3) check
(4) ipconfig
(5) connect

Answer: 1

149. The word processing task associated with changing the appearance of a document is :
(1) Editing
(2) Writing
(3) Formatting
(4) All of above
(5) None of these

Answer: 3

150. Easy to use……
(1) user friendly
(2) select
(3) helpful
(4) ever-ready
(5) None of these

Answer: 1

151. Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs……
(1) menu bar
(2) tool bar
(3) user friendly
(4) word processor
(5) None of these

Answer: 1

152. Anything written on the screen ……
(1) cursor
(2) text
(3) folder
(4) boot
(5) None of these

Answer: 2

153. Which of the following is not the major function of a computer ?
(1) Processing data into information
(2) Storing data or information
(3) Gathering data
(4) Analysing data or information
(5) None of these

Answer: 4

154. A method of executing two or more programs concurrently using the same computer describe:
(1) multi processing
(2) multiprogramming
(3) virtual processing
(4) time sharing
(5) None of these

Answer: 2

155. When you save to ……… your data will remain intact even when thecomputer is turned off.
(1) RAM
(2) motherboard
(3) secondary storage device
(4) primary storage device
(5) None of these

Answer: 3

156. A one-time password is :
(1) one that changes every time it is used
(2) one that is assigned once and not changed at all.
(3) one that can be used only at a particular time of the day
(4) one that is assigned for all session that starts at a particular time
(5) None of these

Answer: 1

157. A hardware interface that allows for the connection of several peripheral devices to a single PCI board.
(1) SCSI
(2) SATA
(3) ATA
(4) PCI
(5) None of these

Answer: 1

158. is a language, instead of using numbers; programmers began usingEnglish like abbreviations (Mnemonics) to represent the elementary operations.
(1) Machine language
(2) Mnemonics language
(3) Assembly level language
(4) High level language
(5) None of the these

Answer: 3

159. Encryption decryption are functions of :
(1) Transport layer
(2) Session layer
(3) Presentation layer
(4) All of the above
(5) None of these

Answer: 2

160. The process of building a model that demonstrate the features of a proposed product, service or system is called a :
(1) JAD
(2) RAD
(3) templating
(4) prototyping
(5) TAD

Answer: 4

161. Memory, also called random access memory, or RAM……….
(1) contains the electronic circuits that cause processing to occur
(2) makes the information resulting from processing available for use
(3) allows data, programs, commands, and user responses to be entered into a computer
(4) consists of electronic components that store data
(5) None of these

Answer: 4

162. A ……… represent approximately one billion memory locations.
(1) kilobyte
(2) megabyte
(3) gigabyte
(4) terabyte
(5) None of these

Answer: 3

163. An interrupt handler is a(n):
(1) location in memory that keeps track of recently generated interrupts.
(2) peripheral device.
(3) utility program.
(4) special numeric code that indicates the priority of a request
(5) None of these

Answer: 4

164. All of the following are steps involved in the boot process EXCEPT:
(1) load the operating system into RAM.
(2) the power-on self-test.
(3) activate the basic input/output system (BIOS).
(4) load application programs.
(5) None of these

Answer: 4

165. A port that allows 8 bits at a time to be transmitted simultaneously is a(n) ……….
(1) dedicated port
(2) parallel port
(3) SCSI port
(4) USB port
(5) None of these

Answer: 2

166. Which of these terms refers to the feature of an OS that allows asingle computer to process the tasks of several users at different stations, in round-robin fashion?
(1) Multiprocessing
(2) Multiprogramming
(3) Multitasking
(4) Time processing
(5) Time-sharing

Answer: 5

167. A program which helps create written documents and lets you go back and make corrections as necessary……
(1) spreadsheet
(2) personal writer
(3) word printer
(4) word processor
(5) None of these

Answer: 4

168. Screen that comes on when you turn on your computer that shows all the icons……
(1) desktop
(2) face to face
(3) viewer
(4) view space
(5) None of these

Answer: 1

169. A place that a user can create to store files……
(1) cursor
(2) text
(3) folder
(4) boot
(5) None of these

Answer: 3

170. Electronic pens are used with the mouse to write on a slide in which view?
(1) Master
(2) Slide Sorter
(3) Slide Show
(4) Normal
(5) Print preview

Answer: 3

171. When you insert a picture and adjust the height, Word automatically adjusts the ……… to maintain the correct proportion.
(1) pixel size
(2) resolution
(3) screen size
(4) width
(5) None of these

Answer: 4

172. Which of the following is NOT one of the steps in the machine cycle?
(1) Execute
(2) Store
(3) Decode
(4) Pipelining
(5) None of these

Answer: 4

173. How many peripheral devices can be connected to a single SCSI port?
(1) 1
(2) 8
(3) 16
(4) 32
(5) 64

Answer: 2

174. The four-step process of fetch, decode, execute, and store is called a(n):
(1) machine cycle
(2) instruction cycle
(3) arithmetic operation
(4) logical operation
(5) None of these

Answer: 1

175. All of the following are TRUE regarding virtual memory EXCEPT :
(1) any amount of RAM can be allocated to virtual memory.
(2) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
(3) this temporary storage is called the swap file or page file.
(4) virtual memory is physical space on the hard drive.
(5) None of these

Answer: 1

176. The operating system is the most common type of ……… software.
(1) communication
(2) application
(3) system
(4) word-processing
(5) None of these

Answer: 3


177. The human-readable version of a program is called ………
(1) source code
(2) program code
(3) human code
(4) system code
(5) None of these

Answer: 4

178. Data are ……… in client/server computing.
(1) never sent to the client machine
(2) sent in very large sections to save processing time
(3) sent only upon the client’s request
(4) sent in complete copies for the client to filter and sort
(5) sent from the client to the server for processing

Answer: 3

179. The total set of interlinked hypertext documents worldwide is :
(1) HTT
(2) Browser
(3) WWW
(4) B2B
(5) None of these

Answer: 1

180. Which of the following is not one of the three ‘Mail Merge Helper’ steps?
(1) Merge the two files
(2) Create the main document
(3) Set the mailing list parameters
(4) Create the data source
(5) None of these                                                       

Answer: 3


181. Which is the part of a computer that one can touch and feel ?
(1) Programs
(2) Software
(3) Hardware
(4) Output
(5) None of these

Answer: 3

182. A command to get a file you worked on from the memory where it was stored……
(1) close
(2) delete
(3) open
(4) get it
(5) None of these

Answer: 3

183. There are several security devices used to stop individuals from exploiting your system. Which of the following is used in conjunction with a firewall?
(1) Proxy server
(2) Intrusion-detection system
(3) Terminal server
(4) Web server
(5) None of these

Answer: 1
184. Array is ………
(1) Linear data structure
(2) non-linear data structure
(3) simple data structure
(4) complex data structure
(5) None of these

Answer: 1

185. computer checks the ……… of user names and passwords for a match before granting access.
(1) website
(2) network
(3) backup file
(4) database
(5) None of these

Answer: 4

186. Which of the following is the latest version of MS Word?
(1) Word 2000
(2) Word 2007
(3) Word 2010
(4) Word 2011
(5) Word 2012

Answer: 3

187. In the online world of electronic commerce, what do the initials CEM stands for ?
(1) Costly E-Commerce Marketing
(2) Customer Experience Management
(3) Customer Experience Misleading
(4) Cost Estimates are Mind Boggling
(5) None of these

Answer: 2
188. What type of program controls the various computer parts and allows the user interact with the computer ?
(1) Utility software
(2) Operating system
(3) Word processing software
(4) Database program
(5) None of these

Answer: 1

189. Which of the following transmission systems provide the highest data rate to in individual device?
(1) computer bus
(2) telephone lines
(3) voice and mode
(4) lease lines

Answer: 1

190. The combination of the operating system and the processor is referred to as the computer’s:
(1) CPU
(2) platform
(3) BIOS
(4) CMOS
(5) None of these

Answer: 2

191. The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT:
(1) files
(2) folders
(3) drives
(4) systems
(5) None of these
Answer: 4

192. Leaves of which of the following trees are at the same level ?
(1) Binary tree
(2) B-tree
(3) AVL-tree
(4) Expression tree
(5) None of these

Answer: 2

193. The transformation of a message into an encoded form is known as :
(1) Mnemonics
(2) Encoding
(3) Encryption
(4) Decoding
(5) None of these

Answer: 2

194. Firewalls are used to protect against………
(1) Unauthorized Attacks
(2) Virus Attacks
(3) Data Driven Attacks
(4) Fire Attacks
(5) All of these

Answer: 1

195. Auto correct was originally designed to replace ……… words as you type.
(1) Short, repetitive
(2) Grammatically incorrect
(3) Misspelled
(4) Half
(5) None of these

Answer: 3

196. Ensuring that the essential peripheral devices are attached and operational is the ……… process.
(1) configuration
(2) CMOS
(3) POST
(4) ROM
(5) check

Answer: 3

197. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:
(1) action
(2) event.
(3) interrupt
(4) activity
(5) None of these

Answer: 3

198. Before a package can be used in a java program it must be ………
(1) executed
(2) referenced
(3) imported
(4) declared
(5) None of these

Answer: 3

199. The definition of thrashing is:
(1) swapping data between virtual memory and RAM too frequently.
(2) insufficient hard disk space.
(3) too many processors being managed by the operating system.
(4) inaccurate information stored in the registry
(5) None of these

Answer: 1

200. The primary device that a computer uses to store information……
(1) register
(2) storehouse
(3) desk
(4) hard drive
(5) None of these
 Answer: 4

201. Which of the following is a disadvantage of machine language?1) Machine Dependent
2) Slower Execution
3) Machine Independent
4) It requires Translation
5) None of these

Answer: 1

202. Android Operating system is an example of which kind of Source Model?1) Open Source
2) Vertical Market Software
3) Horizontal Market Software
4) Shareware
5) None of these

Answer:1

203. Cache memory is an example of which of the following?1) Virtual Memory
2) Non Volatile Memory
3) Static Random Access Memory
4) Secondary Memory
5) None of these

Answer:3

204. A software that is not protected by copyright or trademark is ......1) Vertical Market Software
2) Public Domain Software
3) Shareware Software
4) Trialware
5) Adware

Answer:2

205. Which of the following programming languages is associated with Artificial Intelligence?1) C
2) B
3) C++
4) JAVA
5) PROLOG

Answer:5

206. AltaVista is a(n)1) Windows Utility
2) Search engine
3) Program
4) Antivirus
5) None of these

Answer:2

207. The term Hard copy is related to:1) Storing data on Hard Disk
2) Output displayed on Monitor
3) Scanned Image
4) Printouts
5) None of the above

Answer:4

208. MIME is an acronym for ....1) Multiprogramming Internet Mail Extension
2) Multicasting Internet Mail Extension
3) Multiple Internet Mail Extension
4) Multipurpose Internet Mail Extension
5) None of these

Answer: 4

209. Any crime that involves a Computer and a Network is called:1) Virus
2) Malware
3) Trojan Horse
4) Cyber crime
5) Identity Theft

Answer: 4

210. Which of the following generation computers is referred to an expert system?1) 2nd
2) 1st
3) 4th
4) 3rd
5) 5th

Answer: 5

211). ......... is a set of instructions.1) Hardware
2) Code
3) Language
4) Program
5) All the above

Answer: 4

212. Which of the following is the keyboard short-cut for permanent deletion of a file/folder in windows?
1) Del.
2) Shift + Del.
3) Ctrl + Del.
4) Alt + Enter
5) None of these

Answer: 2

213. Which of the following is an Object Oriented Programming Language?1) C
2) Java
3) C++
4) Both 2 and 3
5) Both 1 and 2

Answer: 4

214. The popular name for “Information Super Highway” is:1) Intranet
2) Extranet
3) Virtual Private Network
4) MAN
5) Internet

Answer: 5

215. Encryption is primarily used in:1) Computer Processing
2) File retention
3) Data communication
4) Data Storage
5) None of these

Answer: 3

216. The main folder on a storage device is called .....1) Root directory
2) Interface
3) Device driver
4) Platform
5) Main directory

Answer: 1

217. To protect the computer from hacker intrusions, ..... must be installed.1) Firewall
2) Mailer
3) Script
4) Yahoo Messenger
5) None of these

Answer: 1

218. Which of the following is used to read handwritten or printed text to make a digital image that is stored in memory?1) Printer
2) Laser beam
3) Scanner
4) Touchpad
5) None of these

Answer: 3

219. A program designed to destroy data on the computer which can travel to infect other computers is called a .....1) Hurricane
2) Infector
3) Disease
4) Virus
5) None

Answer: 4

220. Thesaurus option is available in ..... menu.1) Page layout
2) References
3) Review
4) View
5) Layout

Answer: 3


221. Blu-Ray disk is an example of a(n) ....1) Hard disk
2) Magnetic Disk
3) Optical Disk
4) Output Device
5) None of these

Answer:3

222. Which of the following is true about Name box?1) It appears at the left of the formula bar
2) It appears below the menu bar
3) It shows the locations of the active cell.
4) Both 1 and 3
5) Both 2 and 3

Answer:4

223. Which of the following is known as non volatile memory?
1) Hard Disk
2) Floppy Disk
3) CD-ROM
4) DVD-ROM
5) All the above

Answer: 5

224. Auto correct function option is present in ..... menu of MS Word.1) View
2) Insert
3) Format
4) Tools
5) Table

Answer: 4

225. Which of the following is another name for pre-programmed formula in Excel?1) Range
2) Graph
3) Function
4) Cell
5) None of these

Answer: 3

226. ALU works on the instructions held in .......1) Notebook
2) Registers
3) Notepad
4) Clipboard
5) I/O Devices

Answer: 2

227. To see the document before the printout is taken, use .......1) Insert Table
2) Paste
3) Format Painter
4) Cut
5) Print Preview

Answer: 5

228. .... helps create, manipulate and analyze data arranged in rows and columns?1) Application Package
2) Word Processing Package
3) Outlining Package
4) Outline Processors
5) Spreadsheet Package

Answer: 5

229. A register that keeps track of the next instruction to be executed is called a(n):1) Data Register
2) Instruction Register
3) Action Register
4) Program Counter
5) None of these

Answer: 2

230. Which of the following is the feature that keeps track of the right margin?1) Find and Replace
2) Dragged Right
3) Ruler
4) Right Justified
5) Left Justified

Answer: 4

231. A network which connects cities or states is known as:1) LAN
2) CAN
3) PAN
4) VPN
5) MAN

Answer: 5

232. Which of the following allows you to insert graphics into a word document?1) Callouts
2) Flowcharts
3) Basic Shapes
4) All of the above
5) None of these

Answer: 4

233. An email address consists of:1) Domain name 2) User name
3) Username followed by password
4) Domain name followed by user name
5) Username followed by domain name

Answer: 5

234. ERP is an acronym for:1) Enterprise Retirement Planning
2) Enterprise Relationship Planning
3) Enterprise Resource Planning
4) Enterprise Reorder Planning
5) None of these

Answer: 3

235. ...... is the storage area for e-mails.1) Folder
2) Mail box
3) Directory
4) Hard Disk
5) None of these

Answer: 2

236. Three types of Compact disks include CD-ROM, CD-R and ......1) CD-W
2) CD-RAM
3) CD-DVD
4) CD-RW
5) None of these

Answer: 4

237. Collecting personal information and effectively posing as another individual is known as:
1) Spooling
2) Spoofing
3) Hacking
4) Identity Theft
5) None of these

Answer: 2

238. Which of the following controls the manner of interaction between the user and the operating system?1) Language Translator
2) Platform
3) User Interface
4) Icon
5) None of these

Answer: 3

239. Which of the following best defines Embedded system?1) A program that comes wrapped in a box
2) A program that is permanent part of a computer
3) A computer that is a part of a larger computer
4) A computer and software system that controls a machine
5) None of these

Answer: 4

240. The  .......... Settings are automatic and standard.1) Default
2) CPU
3) Peripheral
4) User-friendly
5) None of these

Answer: 1



241. Which of the following power point view displays each slide of thepresentation as a thumbnail and is useful for rearranging slides?1) Slide show
2) Slide master
3) Slide sorter
4) Notes Page
5) Design Slide

Answer: 3

242. A set of rules for telling the computer what operations to perform is / are called:1) Structures
2) Procedural Language
3) Command Language
4) Natural Language
5) Programming Language

Answer: 5
243. Devices that enter information and let you communicate with the computer are called:1) Software
2) Hardware
3) Output Devices
4) Input / Output devices
5) Input Devices

Answer: 5
244. The speed of which of the following memory chips is faster?1) Not Fixed
2) DRAM
3) SRAM
4) For smaller chips SRAM is faster
5) For larger chips DRAM is faster

Answer: 3
245. Mahesh Babu has his cute childhood photos in an album which might fade out in a couple of years, which he wants to show it to his fans by uploading it in his twitter account. Which of the following devices can he use to do that?1) Keyboard
2) Mouse
3) Printer
4) Scanner
5) None of these

Answer: 4
246. Which of the following is not a social networking site?1) WAYN
2) Hi 5
3) Orkut
4) Yahoo
5) Facebook

Answer: 4
247. In the URL https://twitter.com, what does 's' represent in 'https'?1) Safe
2) System
3) Start-up
4) Semantic
5) Secured

Answer: 5
248. Which among the following is the file extension for Word Documents?1) .xls
2) .ppt
3) .docx
4) .worddoc
5) None

Answer: 3
249. Linux Operating system is an example of which of the following?1) Freeware
2) Open Source Software
3) Shareware
4) Complimentary
5) None of these

Answer: 2

250. A device that connects to a network without the use of a cable is said to be:1) Distributed
2) Non-Wired
3) Centralised
4) Open source
5) Wireless

Answer: 5

251. Which of the following software applications would be most appropriate for performing Statistical and Numerical calculations:
1) Document Processor
2) Graphics Package II
3) Power Point
4) Spreadsheet
5) Meta Processor

Answer: 4

252. Removing and replacing devices without turning off the computer is referred to as:1) Search Engines
2) Operating System
3) Software
4) Resource Locators
5) Plug-n-Play

Answer: 5

253. Mr. Prashanth has a song sung by him on the desktop, in the C drive, and also in the D drive. This scenario in computer language is generally referred to as:1) Data Redundancy
2) Multiple Data Places
3) Various File Places
4) Data Inconsistency
5) Data Independent

Answer: 1

254. What is a Firewall?1) A wall to protect against Fire
2) A software to protect from computer hacker intrusions
3) A software to destroy computer
4) A wall to make partitions in computer
5) None of these

Answer: 2

255. Chiranjeevi sent a mail to Pavan Kalyan by putting his email address in 'Cc' and to Nagababu by putting his email address in 'Bcc'. Which of the following is true based on the given scenario?1) Pavan Kalyan can view the email address of Chiranjeevi and Nagababu
2) Nagababu can view the email address of Pavan Kalyan & Chiranjeevi
3) Pavan Kalyan can view the email address of Nagababu only
4) Both 1 and 2
5) None of them is true

Answer: 2

256. When data changes in multiple lists and all lists are not updated, this causes:1) Data Population Problem
2) Data Reduction
3) Data Induction
4) Data Overload
5) Data Inconsistency

Answer: 5

257. The legal right to use software based on specific restrictions is granted via a:1) Software privacy policy
2) Software License
3) Software password manager
4) Software log
5) None of these

Answer: 2

258. Which of the following is not an operating system?1) Windows 2000
2) DOS
3) Windows 7
4) Mac Os X Lion
5) Google

Answer: 5

259. Find the Mis-Matched pair.1) Chrome - Google
2) Opera - Opera Software
3) Internet Explorer - Microsoft
4) Safari - Net Scape Communications
5) None of these

Answer: 4

260. What is the full form of RISC?1) Reduced Instruction Set Computing
2) Reformed Instruction System Computing
3) Reduced Information System Computing
4) Restoration of Information in System Computing
5) Reduced Instruction Sect Code

Answer: 1

261. The common name for Modulator and Demodulator is:1) Modem
2) Joiner
3) Networker
4) Connecter
5) Mom-dom

Answer: 1

262. In order to delete a sentence from a document you would use .......1) Highlight and copy
2) Cut and Paste
3) Copy and Paste
4) Highlight and Delete
5) Select and Paste

Answer: 4

263. What is the keyboard shortcut for Slide Show in Powerpoint ? :1) F4
2) F8
3) F9
4) F5
5) F12

Answer: 4

264. A ...... is a design tool that graphically shows the logic in a solution algorithm.1) Flow chart
2) Hierarchy Chart
3) Structure Chart
4) Context Diagram
5) None

Answer: 1

265. The justification that aligns text on both margins of a document in Word is ......
1) Justify
2) Bold
3) Centre
4) Right
5) Balanced

Answer: 1

266. The Open, Print and Save Buttons are all located on the ......1) Status Bar
2) Formatting Toolbar
3) Standard Toolbar
4) Titlebar
5) Status and Title bars

Answer: 3

267. SMPS in a computer stands for?1) Switched-Mode Power Supply
2) Simple-Mode Power Supply
3) Simple-Mode Power System
4) Switched-Menu Power Supply
5) None of these

Answer: 1

268. The process of transforming information using an algorithm to make it unreadable by anyone is usually referred to as:
1) Decryption
2) Encryption
3) Alphabet Coding
4) Encrography
5) Deptography

Answer: 2

269. ..... is a type of RAM that stores each bit of data in a separate capacitor within an integrated circuit making it an efficient way to store data in memory.
1) DRAM
2) PRAM
3) NRAM
4) NORAM
5) None

Answer: 1

270. A computer network that uses Internet protocol technology to shareinformation, Operational system, within an organization is usually referred to as
1) Internet
2) MAN
3) PAN
4) NPN
5) Intranet
Answer: 5

271. What is the symbol for attachments in yahoo mail?1) Envelope
2) Letter A
3) Paper Clip
4) Pen
5) None

Answer: 3

272. Which of the following computers is used in Scientific researches?1) Super Computers
2) Main Frame
3) Laptop
4) Micro Computers
5) None of these

Answer: 1

273. Winzip is an example of :1) Free ware
2) Shareware
3) Open Source
4) Vertical Market Software
5) None

Answer: 1

274. ........... is the science that attempts to produce machines that display the same type of intelligence that humans do1) Nanoscience
2) Nanotechnology
3) Simulation
4) Artificial intelligence (AI)
5) None

Answer: 4

275. COBOL is an acronym for .............1) Common Business Oriented Language
2) Computer Business Oriented Language
3) Common Business Operated Language
4) Common Business Organized Language
5) None of these

Answer: 1

276. The human readable version of a software program is called:1) cache
2) instruction set
3) source code
4) word size
5) None of these

Answer: 3

277. Which of the following is not a programming language with Object Oriented Features?
1) COBRA
2) ABAP
3) C++
4) C#
5) C

Answer: 5

278. Which of the following programming language is favoured for Artificial Intelligence?
1) ABAP
2) COBOL
3) LISP
4) JAVA
5) C#

Answer: 3

279. The quickest and easiest way in Word, to locate a particular word or phrase in a document1) Replace
2) Find
3) Lookup
4) Search
5) None of these

Answer: 2

280. What symbol is present on the number key '2' on the keyboard?1) !
2) %
3) ^
4) @
5) *

Answer: 4



281. A digital communication system capable of interconnecting, a large number of computers, terminals and other peripheral devices within a limited geographical area is called–1. LAN
2. WAN
3. Internet
4. All of the above
5. None of these

Answer:  1

282. A secondary storage device that uses a long plastic strip coated with a magnetic material as a recording medium is–1. Magnetic tape
2. Compact disk
3. Hard disk
4. All of the above
5. None of these

Answer:   1

283. An E-mail protocol for storage, manage-ment and change, especially in corporate offices–1. Message handling service
2. Postal service’s
3. Data storage
4. All of the above
5. None of these

Answer:   1

284. Which of the following is an advantage of stored programs?
1. Reliability
2. Reduction in operation costs
3. The computers becoming general-purpose
4. All of the above
5. None of these

Answer:   1

285. Which of the following is not true for primary storage?1. It is a part of the CPU
2. It allows very fast access of data
3. It is relatively more expensive then other storage devices.
4. Can be removed and transported.
5. All of the above

Answer:   1

286. Function of control unit in the CPU is–1. To decode program instructions
2. To transfer data to primary storage
3. To perform logical operations
4. To store program instructions
5. All of the above

Answer:   4

287. Electronic spreadsheets are useful in situation where relatively .......... data must be input1. Small
2. Large
3. No
4. All of the above
5. None is true

Answer:   1

288. A list of options from which a program user can select anyone in order to perform a desired action is referred as–1. Menu
2. Index
3. Directory
4. All of the above
5. None of these

Answer:   2

289. A method whereby messages to be transmitted between computers are all sent to a central computer, which gathers them androutes them to the appropriate destination(s) is known as–
1. Message switching
2. Message delete
3. Message accept
4. All of the above
5. None of these

Answer:   1

290. Which of the following describe one or more characteristics of a modem computer?
1. An electronic device
2. A mechanical device
3. A electro-mechanical device
4. All of the above
5. None of these

Answer:   1

291. Combining records from two or more ordered files into a singleordered file is called–1. Menu
2. Merging
3. Taking
4. All of the above
5. None of these

Answer:   1

292. The ascending order of a data hierarchy is1. Bit-byte-record-field-file-database
2. Byte-bit-field-record-file-database
3. Byte-bit-record-file-field-database
4. Bit-byte-field-record-file-database
5. All of the above

Answer:   2

293. A LSI chip contains the entire CPU of computer except main memory is called–1. Microprocessor
2. Hard disk
3. Input device
4. Output device
5. All of the above

Answer:   4

294. A storage medium that loses its contents in the event of power failure is called–1. Volatile storage
2. Non volatile storage
3. Permanent storage
4. All of the above
5. None of these

Answer:   1

295. One-millionth of a second is referred as–1. Microsecond
2. Millisecond
3. Hour
4. Minute
5. All of the above

Answer:   1

296. Alternate facilities of programs, data files, hardware equipments, etc. used in case the original one is destroyed, lost, or fail to operate is–
1. Backup
2. Forehead
3. Delete
4. All of the above
5. None of these

Answer:   1

297. One-thousandth of a second is called–1. Microsecond
2. Millisecond
3. Hour 4. Minute
5. All of the above

Answer:   1

298. The CPU (central processing unit) consists of1. Input, output, and processing
2. Control unit, primary storage, and secondary storage
3. Control unit, arithmetic-logic unit, and primary storage
4. All of the above
5. None of these

Answer:   2

299. The product of data processing is–1. Data
2. Information
3. Software
4. Computer
5. All of the above

Answer:   3

300. The input device used by computer is–
1. Motherboard
2. Central processing unit
3. Keyboard
4. System unit
5. All of the above

Answer:   2

301. The structure of interconnecting of nodes ofa computer network is referred as–
1. Network topology 2. Internet
3. Local Area Network
4. Wide Area Network
5. All of the above

Answer:   3

302. Nible is–1. Double of byte
2. Half of byte
3. Ten times of byte
4. Five times of byte
5. All of the above

Answer:   1

303. Multiprogramming is the–1. The inter-leaved execution of two or more different and independent programs by the same computer
2. The execution of single by the different computers
3. The inter-leaved execution of two or more different and independent programs by the different computers
4. All of the above
5. None of these

Answer:   2

304. A facility available in an operating system that allows multiple functions from the same application package is referred as–1. Multi-threading
2. Multi-programming
3. Multi-processing
4. All of the above
5. None of these

Answer:   1

305. Narrowband channel is a communication channels–1. That handle low volumes of data
2. Used mainly for telegraph lines and low
speed terminals
3. Both 1. and 2.
4. All of the above
5. None of these

Answer:   1

306. Following is the example of Network–1. LAN
2. WAN
3. Internet
4. All the above
5. None of these

Answer:   4

307. Peer-to-peer is a description–1. Of communications between two dissimilar devices
2. Of communications between two equal devices
3. Of communications between two different devices
4. All of the above
5. None of these

Answer:   4

308. Non-document files are–1. Pure ASCII files that can be listed for any word processing software
2. Non ASCII files that can be listed for any word processing software
3. Pure ASCII files that can be listed for specific word processing software
4. Non ASCII files that can be listed for pecific word processing software
5. All of the above

Answer:   2

309. The method of dividing a physical channel into many logical channels so that a number of independent signals may be simultaneously transmitted on it is referred as–1. Multithreading
2. Multiprocessing
3. Multiplexing
4. All of the above
5. None of these

Answer:   2

310. An interconnected computer configura-tions or computers with two or more independent CPUs that have the ability to simultaneously execute several programs is called–1. Multithreading
2. Multiprocessing
3. Multiplexing
4. All of the above
5. None of these

Answer:   3

311. Following is not a non-impact printer–1. Thermal printer
2. Ink-jet printer
3. Laser printer
4. Dot-matrix printer
5. All of the above

Answer:   2

312. A number system with a base of 8 is referred as–1. Binary
2. Decimal
3. Octal
4. All of the above
5. None of these

Answer:   3

313. Devices converts digital signals to Sine waves at the sending end and back to digital signals at the receiving end is called–1. Modem
2. Telephone
3. Mobile phone
4. All of the above
5. None of these

Answer:   3

314. Dividing a project into segments and smaller units in order to simplify the analysis, design and programming effort is referred as–1. Monitoring
2. Modular approach
3. Microprocessing
4. All of the above
5. None of these

Answer:   1

315. The technique where digital signals are converted to its analog form for transmission over an analog facility is called–1. Modulation
2. Digitization
3. Multiprocessing
4. All of the above
5. None of these

Answer:   2

316. Multiprocessor is a computer system–1. Where many CPU under a common control
2. Consisting of more than one input devices under common control
3. Where many output devices under
4. All of the above
5. None of these

Answer:   1

317. The point at which the flow of text in a document moves to the top of a new page–1. Page break
2. Page insert
3. Page format
4. All of the above
5. None of these

Answer:   1

318. Technique to implement virtual memory where memory is divided into units of fixed size memory is–1. Paging
2. De-fragments
3. Segmentation
4. All of the above
5. None of these

Answer:   1

319. An adder where all the bits of the two operands are added simultaneously–1. Parallel adder
2. Half adder
3. Full adder
4. All of the above
5. None of these

Answer:   1

320. An extra bit added to a string of bits that enables the computer to detect internal errors in the transmission of binary data–1. Parity bit
2. Byte
3. Nibble
4. All of the above
5. None of these

Answer:   1

321. Password is–1. Code by which a user gains access to a computer system
2. Pass for viewing movie
3. Entrance without paying something
4. All of the above
5. None of these

Answer:   1

322. PL 1 (Programming Language One) is–1. High level programming language
2. Low level programming language
3. Machine language
4. Assembly language
5. All of the above

Answer:   1

323. Pascal is–1. A high-level programming language
2. Named after Blaise Pascal
3. Named after mathematician that facilitates structured programming techniques
4. All of the above
5. None of these

Answer:   1

324. Storage device where time to retrieve stored information is independent of address where it is stored is called–1. Random access memory (RAM)
2. Primary memory
3. Secondary memory
4. All of the above
5. None of these

Answer:   4

325. Octal number system has a base–1. Two
2. Four
3. Eight
4. Ten
5. All of the above

Answer:   3

326. Since input and output devices are on the edge of the main processing therefore they are referred as–1. Peripheral devices
2. Processing devices
3. Personal devices
4. All of the above
5. None of these

Answer:   3

327. A system changeover method where complete changeover to the new system takes place incrementally over a period of time is referred as–1. Phased replacement
2. Block replacement
3. Complete replacement
4. All of the above
5. None of these

Answer:   1

328. One trillionth of a second is–1. Pico second
2. Mille second
3. Micro second
4. Minute
5. All of these

Answer:   1

329. Following is of Non-vo a storage device1. Magnetic tape
2. Compact disk
3. Floppy disk
4. All of the above
5. None of these

Answer:   1

330. A storage medium that retains its contents even in the absence of power is referred as–1. Non-volatile storage
2. Volatile storage
3. Secondary storage
4. Primary storage
5. None of these

Answer:   4

331. If a word is typed that is not in Words dictionary, a ___ wavy underline appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these

Ans (A)

332. The _____ button on the quick access Toolbar allows you to cancel your recent commands or actions.(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these

Ans (D)

333. In Excel, any set of characters containing a letter , hyphen, or space is considered ___(A) a formula
(B) text
(C) a name
(D) a title
(E) None of these

Ans (B)

334. ________ Software allows users to perform calculations on rows and columns of data.(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
(E) None of these

Ans (C)


335. A _________ represent approximately one billion memory locations.(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these

Ans (C)

336. ______ cells involves creating a single cell by combining two or more selected cells.(A) Formatting
(B) Merging
(C) Embedding
(D) Splitting
(E) None of these

Ans (B)

337. The operating system is the most common type of ______________ software.(A) communication
(B) application
(C) system
(D) word-processing
(E) None of these

Ans (C)

338. When you quickly press and releaes the left mouse button twice , you are ____(A) Primary-clicking
(B) pointing
(C) Double-clicking
(D) Secondary-clicking
(E) None of these

Ans (C)

339. The horizontal and vertical lines on a worksheet are called ___(A) cells
(B) sheets
(C) block lines
(D) gridlines
(E) None of these

Ans (D)

340. To delete an incorrect character in a document, __________ to erase to the right of the insertion point.(A) press the left mouse key
(B) double-click the right mouse key
(C) press the BACKSPACE key
(D) press the delete key
(E) None of these

Ans (D)

341. The operating system does all of the following EXCEPT:A. provide a way for the user to interact with the computer.
B .manage the central processing unit (CPU).
C .manage memory and storage.
D. enable users to perform a specific task such as document editing.

Ans (D)

342. During the boot process, the ____________ looks for the system files.A CD
B. BIOS
C. CPU
D. DVD

AnS (B)

343. ____________ are lists of commands that appear on the screen.A GUIs
B Icons
C Menus
D Windows

Answer: C

344. ____________ is the ability of an operating system to control the activities of multiple programs at the same time.A Multitasking
B Streamlining
C Multiuser
D Simulcasting

Answer: A

345. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:A action.
B event.
C interrupt.
D activity.

Answer: C

346. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processors attention.A  CPU
B  slice of time
C  stack
D  event

Answer: B

347. The blocks of code, included in the operating system, that softwareapplications interact with are known as:A  application programming interfaces (APIs).
B  complimentary metal-oxide conductors (CMOS).
C  device drivers.
D  bootstrap loaders.

Answer: A

348. MS-DOS is a ____________ operating system.A point-and-click
B user-friendly
C command-driven
D Mac

Answer: C

349. An interrupt handler is a(n):
A location in memory that keeps track of recently generated interrupts.
B peripheral device.
utility program.
D special numeric code that indicates the priority of a request.

Answer: D

350. A spooler is a(n):A location in memory that maintains the contents of a document until it prints out.
print job.
C program that coordinates the print jobs that are waiting to print.
D message sent from the printer to the operating system when a print jobis completed.

Answer: C

351. Virtual memory is typically located:A on a floppy disk.
B in the CPU.
C in a flash card.
D on the hard drive.

Answer: D

352. The purpose of a swap (or page) file is to:A maintain pages of documents that are being spooled to the printer.
B hold a program̢۪s data or instructions in virtual memory when it can̢۪t fit in RAM.
C prevent thrashing in a multitasking environment.
D allow multiple print jobs to print their pages out simultaneously.

Answer: B

353. The definition of thrashing is:A swapping data between virtual memory and RAM too frequently.
B insufficient hard disk space.
C too many processors being managed by the operating system.
D inaccurate information stored in the registry.

Answer: A

354. All of the following are TRUE of Safe Mode EXCEPT:A Safe Mode is a special diagnostic mode.
B Safe Mode loads all nonessential icons.
C Safe Mode allows users to troubleshoot errors.
D Safe Mode loads only the most essential devices.

Answer: B

355. Verification of a login name and password is known as:A configuration.
B accessibility.
C authentication.
logging in.

Answer: C

356. The combination of the operating system and the processor is referred to as the computers:A CPU.
B platform.
C BIOS.
D CMOS.

Answer: B

357. The following message generally means:A a nonsystem floppy has been left in the floppy disk drive.
B the CD drive is not functioning.
C the BIOS is corrupted.
D there is a problem loading a device.

Answer: A

358. Which of the following is the correct sequence of actions that takes place during the boot-up process?A Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
B Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
C Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
D Activate BIOS ? Check configuration settings ? Perform POST ? Load operating system

Answer: B

359. All of the following are steps involved in the boot process EXCEPT:A load the operating system into RAM.
B the power-on self-test.
C activate the basic input/output system (BIOS).
D load application programs.

Answer: D

360. The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.A BIOS
B API
C device driver
supervisor program

Answer: A

361. The basic input/output system (BIOS) is stored in:A RAM.
B ROM.
C the CPU.
D the hard drive.

Answer: B

362. Ensuring that the essential peripheral devices are attached and operational is
 the ____________ process.A configuration
B CMOS
C POST
D ROM

Answer: C

363. The memory resident portion of the operating system is called the:A registry.
B API.
C CMOS.
D kernel.

Answer: D

364. Which of the following does NOT occur during the power-on self-test ?
A The ScanDisk utility begins to run.
B The video card and video memory are tested.
C The BIOS identification process occurs.
D Memory chips are checked to ensure they are working properly.

Answer: A

365. All of the following are TRUE regarding virtual memory EXCEPT:A any amount of RAM can be allocated to virtual memory.
B the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
C this temporary storage is called the swap file (or page file).
D virtual memory is physical space on the hard drive.

Answer: A

366. The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT:A files.
B folders.
D drives.
D systems.

Answer: D

367. All of the following statements concerning windows are true EXCEPT:A windows are an example of a command-driven environment.
B windows can be resized and repositioned on the desktop.
C more than one window can be open at a time.
D toolbars and scrollbars are features of windows.

Answer: A

368. All of the following statements concerning files are true EXCEPT:A A file is a collection of related pieces of information stored together for easy reference.
B Files can be generated from an application.
C Files are stored in RAM.
D Files should be organized in folders.

Answer: C

369. Using Windows Explorer, a plus (+) sign in front of a folder indicates:A an open folder.
B the folder contains subfolders.
C a text file.
D a graphics file.

Answer: B

370. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.A List
B Thumbnails
C Details
D Icon

Answer: C

371. All of the following are examples of real security and privacy risks EXCEPT:A. hackers.
B. spam.
C. viruses.
D. identity theft.

Answer: B

372. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion

Answer: A
373. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query

Answer: B
374. A(n) ____________ system is a small, wireless handheld computerthat scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining

Answer: A
375. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.

Answer: C
376. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information

Answer: C
377. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS

Answer: B
378. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.

Answer: A
379. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.

Answer: A
380. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence

Answer: A

381. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)


Answer: D
382. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information


Answer: D
383. The name for the way that computers manipulate data into information iscalled:
A. programming.
B. processing.
C. storing.
D. organizing.


Answer: B
384. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store


Answer: B
385. After a picture has been taken with a digital camera and processedappropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.


Answer: B

386. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational


Answer: C
387. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.


Answer: D
388. In the binary language each letter of the alphabet, each number and eachspecial character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.


Answer: D
389. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.


Answer: C

390. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.


Answer: B
391. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte


Answer: C
392. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte


Answer: C
393. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application


Answer: A

394. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.


Answer: C
395. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.


Answer: D
396. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer


Answer: A
397. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.


Answer: B
398. The ____________, also called the â€Å“brains†of the computer, isresponsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)



Answer: D
399. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.


Answer: B
400. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.


Answer: A




401. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor

Answer: B
402. System software is the set of programs that enables your computers hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application

Answer: D
403. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.

Answer: A
404. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices

Answer: C
405. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.

Answer: A
406. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes

Answer: D
407. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes

Answer: B
408. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband

Answer: D
409. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.

Answer: A
410. ____________ is the science revolving around the use of nano structures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence

Answer: A
411. Which of the following is the correct order of the four major functions of a computer?
A. Process A  Output A Input A Storage
B. InputA  Output A  Process A Storage
C. Process A  Storage A  Input A  Output
D. Input A Process A  Output A  Storage

Answer: D
412. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million

Answer: A
413. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1

Answer: B
414. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte

Answer: C
415. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard

Answer: B
416. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software

Answer: C
417. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes

Answer: B
418. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.

Answer: A
419. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.

Answer: D
420. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.

Answer: A




421. The earliest calculating devices are?a) Clock
b) Difference Engine
c) Abacus
d) Calculator

Answer: c

422. The basic operations performed by a computer are?a) Arithmetic Operations
b) Logical Operations
c) Storage and relative
d) All of the above

Answer: d
423. The man who built the first Mec-hanical Calculator was?a) Joseph Marie Jacquard
b) John Mauchly
c) Blaise Pascal
d) Harward Ailken

Answer: c
424. Punched cards were first introduced by?a) Powers
b) Pascal
c) Jacquard
d) Herman Hollerith

Answer: d
425. LSTs(Large Integration) used in?a) First generation
b) Second generation
c) Third generation
d) Fourth generation

Answer: d
426. What is MS Word?a) A game
b) An Operating System
c) Word Processing Software
d) Typing tutor software

Answer: c
427. MS Excel is a?a) Window based word processor package
b) Window based spreadsheet package
c) DOS based spreadsheet package
d) Window based accounting package

Answer: b

428. Power Point can display date from which of the following add-in software of MS-Office?a) Equation Editor
b) Organization Chart
c) Photo Album
d) All of these

Answer: d
429. The first network that planted the seeds of Internet was?a) ARPANET
b) NSF net
c) V net
d) I net

Answer: a

430. Abbreviation www in www.yahoo.com, stands for?a) World Word in Wonder
b) World Wide Web
c) World Web is Widening
d) Wonderful World Web

Answer: b

431. What is Active Desktop?a) A term that is synonymous with viewing your desktop as a web page
b) A feature to customize your desktop to display informat-ion you can update from the Internet.
c) Both (a) and (b) above mentioned.
d) Software

Answer: c

432. Active Window means?a) The active window is designated by a different color toolbar than other open windows.
b) The window that currently open
c) Both (a) and (b) above mentioned
d) The window that is last used

Answer: c

433. A bitmap is?a) Is a format which windows use for desktop wallpaper?
b) A graphic file format made up of small dots.
c) A specific kind of bitmap file with the BMP extention.
d) All of the above.

Answer: d

434. Which of the following printers generates character from a grid?a) Inkjet
b) Laser
c) Daisy wheel
d) Dot matrix

Answer: d

435. Close Button?a) When clicked will close the dialog box, document or program displayed in the window.
b) Is located at the right top end of the title bar of most Win-dows.
c) Implies for the small button with an X on it
d) All of the above

Answer: d

436. A dialog box is a one?a) Which is a sort of on-screen from where you can fill in the blanks, make selections from lists and chose various combinations of options and settings.
b) In which you can connect to another Internet user and establish an audio and video contact using Microsoft Word.
c) In which you can give verbal commands to Microsoft Word menu
d) All of the above

Answer: a

437. A letter, memo, proposal or other file that is created using Microso-ft Word is called as?
a) Master
b) Slide
c) Document
d) Worksheet

Answer: c

438. The meaning of double-click is?a) Pushing and releasing the main mouse button twice in rapid succession when the on-tree mouse pointer is positioned over the desired item
b) Appearance of an icon
c) To take a selection from the document and move it to the clipboard
d) All of the above

Answer: a

439. A folder: (A) is an organizational tool used to store files.(B) is synonymous with directory, but folder is the newer preferred term (C)contains data?
a) A only
b) B only
c) C only
d) None of the above

Answer: d

440. Commercially produced first computer?a) IBM
b) MIPS
c) UNIVAC
d) EDSAC

Answer: c


441. Banks and other big organizations requiring large data storage use?a) Laptop PC's
b) Desktop PC's
c) Mainframe Computer
d) Workstation

Answer: c

442. High Level Language useful for the beginners is?a) BASIC
b) PASCAL
c) FORTRON
d) COBOL

Answer: d

443. For Scientific work the most popular language is?a) PASCAL
b) FORTRON
c) COBOL
d) PROLOG

Answer: b

444. Which is not the portable computer?a) Micro-processor
b) Calculator
c) Series Computes
d) Parallel Computers

Answer: d

445. OBJECT ORIENTED language is?a) ADA
b) PROLOG
c) PASCAL
d) FORTRAN

Answer: a

446. Information is?a) Summarization process of data
b) Data Information
c) Textual form of data
d) Facts and figures

Answer: a

447. Total memory of system can be known using?a) DIR commands
b) MEM commands
c) Warm boot
d) TOT MEM commands

Answer: b

448. For running WINDOW minimum disk free space required is?a) 8 MB
b) 10 MB
c) 16 MB
d) 32 MB

Answer: a

449. The first graphical web browser are?a) Gopher
b) WAIS
c) CERN
d) Mosaic

Answer: d

450. The programs used to view web pages are called?a) Clients
b) Server
c) Browser
d) Programmer

Answer: c

451. FTP means?a) File Transfer Protocol
b) File Telnet Protocol
c) Fast Track Processing
d) Fine Tunning programs

Answer: a

452. Which among the following is faster than Main Memory?a) RAM
b) ROM
c) Cache
d) None of the above

Answer: c

453. Semi Conductor Memory is known as?a) RAM
b) ROM
c) PROM
d) EPROM

Answer: a

454. In which generation computers IC have been used?a) First
b) Second
c) Third
d) Fourth

Answer: c

455. High level language is?a) Machine Independent
b) Machine dependent
c) (a) And (b) are true
d) (a) And (b) are false

Answer: a

456. Hypertext is?a) Text stored in the memory of the computer
b) Text displayed on the screen of the computer
c) Special text used in developing Internet developing package
d) A system of managing textual Information by creating associations between different documents

Answer: d

457. Information on a computer is sto-red in the form of?a) Files
b) Folders
c) Directory
d) Data dictionary

Answer: a

458. TCP is?a) Transfer control protocol
b) Transfer control process
c) Transmission control protocol
d) Transmission control process

Answer: c

459. Every computer on the Internet is known as?a) Host
b) Client
c) Modem
d) Server

Answer: a

460. Fax machines are used to send documents through a?a) Telephone line
b) Modems
c) Co-axial Wire
d) All of these

Answer: a

461.The term overflow means?a) An excess of Internal storage
b) An excess of external storage
c) A situation where record cannot fit in to its right place
d) A device, which controls the level of humidity in the computer room.

Answer: a

462. In computer science, by Informa-tion we mean?a) Any output coming out from computer
b) A report printed by computer
c) Processed data put in intelligent form
d) Plural of data

Answer: c
463. Which of the following are parts of the CPU?a) Secondary Memory
b) Control unit
c) Input device
d) Printer

Answer: b

464. The purpose of an application program is to?a) Meet specific user needs
b) Make equivalent run better
c) Allow the operating system to control resources better
d) Convert program written in high-level language to machine levellanguage

Answer: a

465. Micro computers are?a) 8 bit
b) 16 bit
c) 32 bit
d) Either 8 or 16 bit

Answer: d

466. Computer uses the_________number system to store data and perform calculations.
(A) binary
(B) octal
(C) decimal
(D) hexadecimal
(E) None of these

Ans : (A)

467. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is_______________
(A) Memory-only
(B) Write-only
(C) Once-only
(D) Run-only
(E) Read-only

Ans : (E)

468. Which of the following can be used to select the entire document ?
(A) CTRL+A
(B) ALT+F5
(C) SHIFT+A
(D) CTRL+K
(E) CTRL+H

Ans : (A)

469.___________are 'attempts by individuals to obtain confidential information from you by falsifying their identity.
(A) Phishing
(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) None of the above

Ans : (A)

470. Part number, part description, and number of parts ordered are examples of__________
(A) control
(B) output
(C) processing
(D) feedback
(E) input

Ans : (E)

471. A Web site's main page is called its______________
(A) Home Page
(B) Browser Page
(C) Search Page
(D) Bookmark
(E) None of these

Ans : (A)

472. The simultaneous processing of two or more programs by multiple
Processors is_____________
(A) multiprogramming
(B) multitasking
(C) time-sharing
(D) multiprocessing
(E) None of these

Ans : (D)

 
473. Codes consisting of lines of varying widths or lengths that are computer-readable are known as____________
(A) an ASCII code
(B) a magnetic tape
(C) an OCR scanner
(D) a bar code
(E) None of these

Ans : (D)

474. To instruct Word to fit the width of a column to the contents of a table
automatically, click the button and then point to AutoFit Contents.
(A) Fit to Form
(B) Format
(C) Autosize
(D) Contents
(E) AutoFit

Ans : (E)

475. Why is it unethical to share copyrighted files with your friends ?
(A) It is not unethical, because it is legal.
(B) It is unethical because the files are being given for free.
(C) Sharing copyrighted files without permission breaks copyright laws.
(D) It is not unethical because the files are being given for free.
(E) It is not unethical-anyone can access a computer

Ans : (C)

476. Reusable optical storage will typica1ly have the acronym__________
(A) CO
(B) DVD
(C) ROM
(D) RW
(E) ROS

Ans : (D)

477. The most common type of storage devices are__________
(A) persistent
(B) optical
(C) magnetic
(D) flash
(E) steel

Ans : (D)


478. A device that connects to a network without the use of cables is said to be_________
(A) distributed
(B) free
(C) centralized
(D) open source
(E) None of these

Ans : (B)

479. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a______________
(A) hacker
(B) analyst
(C) instant messenger
(D) programmer
(E) spammer

Ans : (A)

480. To access properties of an object, the mouse technique to useis__________________
(A) dragging
(B) dropping
(C) right-clicking
(D) shift-clicking
(E) None of these

Ans : (C)

481. To change selected text to all capital letters, click the change case button, then click___________

(A) UPPERCASE
(B) UPPER ALL
(C) CAPS LOCK
(D) Lock Upper
(E) Large Size

Ans : (A)

482. The basic unit of a worksheet into which you enter data in Excel is called a______________
(A) tab
(B) cell
(C) box
(D) range
(E) None of these

Ans : (B)


483. You can keep your personal files / folders in____________________
(A) My folder
(B) My Documents
(C) My Files
(D) My Text
(E) None of these

Ans : (B)

484. In Word you can force a page break____________
(A) By positioning your cursor at the appropriate place and pressing the F1 key
(B) By positioning your cursor at the appropriate place and pressing Ctrl+Enter
(C) By using the Insert/Section Break
(D) By changing the font size of your document
(E) None of these

Ans : (B)

485. The default view in Excel is___________view.
(A) Work
(B) Auto
(C) Normal
(D) Roman
(E) None of these

Ans : (C)

486. The process of transferring files from a computer on the Internet to your computer is called___________
(A) downloading
(B) uploading
(C) FTP
(D) JPEC
(E) downsizing

Ans : (A)

487.____________.is the process of dividing the disk into tracks and sectors.
(A) Tracking
(B) Formatting
(C) Crashing
(D) Allotting
(E) None of these

Ans : (B)

488. Help Menu is available at which button ?
(A) End
(B) Staft
(C) Turnoff
(D) Restart
(E) Reboot

Ans : (B)

489. The contents of____________are lost when the computer turns off.
(A) storage
(B) input
(C) output
(D) memory
(E) None of these

Ans : (D)

490. When you save to this, your data will remain intact even when the computer is turned off________

(A) RAM
(B) Motherboard
(C) Secondary storage device
(D) Primary storage device
(E) None of these
Ans : (C)

491. A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a(n)_________
(A) supercomputer
(B) minicomputer
(C) laptop
(D) server
(E) None of these

Ans : (D)

492. The_________folder retains copies of messages that you have started but are not yet ready to send.

(A) Drafts
(B) Outbox
(C) Address Book
(D) Sent Items
(E) Inbox

Ans : (B)

493. Grouping and processing all of a firm's transactions at one time is called_________
(A) a database management system
(B) batch processing
(C) a real-time system
(D) an on-line system
(E) None of these

Ans : (B)

494. The___________enables you to simultaneously keep multiple Web pages open in one browser window.
(A) tab box
(B) pop-up helper
(C) tab row
(D) address bar
(E) Esc key

Ans : (C)

495. Which ports connect special types of music instruments to sound cards ?
(A) BUS
(B) CPU
(C) USB
(D) MIDI
(E) MINI

Ans : (C)

496. You can__________a search by providing more information the search engine can use to select a smaller, more useful set of results.
(A) refine
(B) expand
(C) load
(D) query
(E) slowdown

Ans : (A)

497. What is the permanent memory built into your computer called ?
(A) RAM
(B) Floppy
(C) CPU
(D) CO-ROM
(E) ROM

Ans : (E)


498. What displays the contents of the active cell in Excel ?
(A) Name box
(B) Row Headings
(C) Formula bar
(D) Task pane
(E) None of these

Ans : (A)

499. The piece of hardware that converts your computer's digital signal to an analog signal that can travel over telephone lines is called a_______
(A) red wire
(B) blue cord
(C) tower
(D) modem
(E) None of these

Ans : (D)

500. Video processors consist of________and________, which store and process images.
(A) CPU and VGA
(B) CPU and memory
(C) VGA and memory
(D) VGI and DVI
(E) None of these

Ans : (C)

501. If you want to connect to your own computer through the Internet from another location, you can use_________
(A) e-mail
(B) FTP
(C) instant message
(D) Telnet
(E) None of these

Ans : (D)

502. To reload a Web page, press the___________.button.
(A) Redo
(B) Reload
(C) Restore
(D) Ctrl
(E) Refresh

Ans : (E)

503. This first step in the transaction processing cycle captures business data through various modes such as optical scanning or at an electronic commerce website__________
(A) Document and report generation
(B) Database maintenance
(C) Transaction processing startup
(D) Data Entry
(E) None of these

Ans : (D)

504. A(n)_____________is a special visual and audio effect applied in Power-point to text or content.
(A) animation
(B) flash
(C) wipe
(D) dissolve
(E) None of these

Ans : (A)

505. When the pointer is positioned on a__________it is shaped like a hand.
(A) grammar error
(B) Formatting error
(C) Screen Tip
(D) Spelling error
(E) hyperlink

Ans : (E)

506. A______________is the term used when a search engine returns a Web page that matches the search criteria.
(A) blog
(B) hit
(C) link
(D) view
(E) success

Ans : (E)

507. ___________are words that a programming language has set aside for its own use.
(A) Control words
(B) Control structures
(C) Reserved words
(D) Reserved keys
(E) None of these

Ans : (C)


508. Mobile Commerce is best described as___________
(A) The use of Kiosks in marketing
(B) Transporting products
(C) Buying and selling goods/services through wireless handheld devices
(D) Using notebook PC's in marketing
(E) None of the above

Ans : (C)

509. Which of, the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information__________
(A) floppy diskette
(B) hard disk
(C) permanent disk
(D) optical disk
(E) None of these

Ans : (B)

510. The computer abbreviation KB usually means___________
(A) Key Block
(B) Kernel Boot
(C) Key Byte
(D) Kit Bit
(E) Kilo Byte

Ans : (E)

511. What is the process of copying software programs from secondary storage media to the hard disk called?
(A) Configuration
(B) Download
(C) Storage
(D) Upload
(E) Installation

Ans : (D)

512. In Excel____________allows users to bring together copies of work-books that other users have worked on independently.
(A) Copying
(B) Merging
(C) Pasting
(D) Compiling
(E) None of these

Ans : (B)

513. Which of the following are advantages of CD-ROM as a storage media?
(A) CD-ROM is an inexpensive way to store large, amount of data and information
(B) CD-ROM disks retrieve data and information more quickly thanmagnetic disks do
(C) CD-ROMs make less errors than magnetic media
(D) An of the above
(E) None of these

Ans : (D)

514. A DVD is an example of a(n) ______________
(A) hard disk
(B) optical disc
(C) output device
(D) solid-state storage device
(E) None of these
Ans : (B)



back to top