comp2 Flashcards

1
Q

Q501. An error in a computer program is called a ______(a) bug(b) virus(c) crash(d) power failure(e) None of these

A

(a)Explanation: (a) A software bug is an error, flaw, failure or fault in computer program or system that produces an incorrect or unexpect result, or causes it to behave in unintended ways. Most bugs arise from mistakes and errors made by people in either a program’s source code or its design, or in framework and operating systems used by such programs, and a few are caused by compilers producing incorrect code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. The name of the computer’s brain(a) RAM(b) ROM(c) ALU(d) CPU(e) None of these
A

(d)Explanation: (d) The CPU (Central Processing Unit) is refered to as the brain of the computer as most of the processing of the computer takes place here. CPU performs arithmetic operations such as addition, multiplication, etc and logical comparisons such as greater than, less than, equal to, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Saving is the process of _____.(a) making changes to a document’s existing content(b) copying a document from memory to a storage medium(c) changing the appearance, or overall look, of a document & (d) developing a document by entering text using a keyboard(e) None of these
A

(b)Explanation: (b) Saving is the process of copying data from a temporary area to a more permanent storage medium. For example, when you edit a file with a word processor, the word processor copies the entire file, or portions of the file, into an area of main memory called a buffer. Any changes you make to the file are made to the copy in the buffer not to the real file on the disk. The buffer is temporary- as soon as you exit the program or turn off the computer, the buffer disappears. To record your modifications to the file on the disk, you must save the file. When you do this, the word processor copies the contents of the buffer to the file on the disk, replacing the previous version of the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. In a computer file system which among the following is top or first in hierarchy ?(a) parent directory(b) root directory(c) home directory(d) working directory(e) None of these
A

(b)Explanation: (b) In a computer file system that is organised as a hierarchy or tree, the root directory is the first or top most directory in a hierarchy. That is, it includes all other directories . for eg. the root directory (or folder) of the main partition on your computer is probably C:\

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. With a CD you can _____(a) Write(b) Read(c) Read and Write(d) Either Read or Write(e) None of these
A

(c)Explanation: (c) A compact disc (CD) is a small, portable, round medium made of molded polymer for electronically recording, storing, and playing back audio, video, text and other information in digital form. Different types of CD include CDROM, CD-R, CD-RW, DVD, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. When computer users ______ a document, they change its appearance.(a) create(b) edit(c) save(d) format(e) None of these
A

“(d)Explanation: (d) Formatting refers to the appearance or presentation of your document. It is also called layout. To ““format”” is to apply a look and feel to your document. It may include font, size, color, bold, italics, paragraph style, spacing, bullets and numbering, auto styles, background, highlighting, outline and special effects.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. A flat metallic disk that contains a large amount of permanently stored information read optically is called a ______(a) ALU(b) Monitor(c) CD-ROM(d) RAM(e) None of these
A

(c)Explanation: (c) CD-ROM (Compact Disc-Read Only Memory) is a compact disc on which a large amount of digitized data can be stored and accessed but it can not be altered by the user-that is, it contains permanently stored data which can not be changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What is a modem connected to ?(a) mother board(b) processor(c) phone line(d) printer(e) None of these
A

(c)Explanation: (c) A modem is a device or program that enables a computer to transmit data over telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone line is transmitted in the form of analog waves. A modem converts between these two form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. A ________ is an icon on the desktop that provides a user with immediate access to a program or file.(a) buffer(b) kernel(c) shortcut(d) spooler(e) None of these
A

(c)Explanation: (c) In general, a shortcut is a path that is shorter than the usual or formal path to something or a method of operation that saves time over the operation that saves time over the regular operation. In windows 95 and later operating systems, a short cut is a computer desktop icon that enables a user to easily see and select a particular program or data object. The operating system comes with some shortcuts already visible on the desktop. A user can remove these or add new ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. To select text by shading as you drag the mouse arrow over the text is referred to as _____(a) highlight(b) clip art(c) fetch(d) decode(e) None of these
A

(a)Explanation: (a) A highlight refers to an indication that text or other object has been selected with a mouse or keyboard. When highlighting text, the selected text colors reverse, show as blue, have dots around the selection, or have bold lines around the selected text. To highlight text using a mouse, position your cursor at the beginning of the text you want to highlight. Press and hold your primary mouse button (left button), while holding the button, move the cursor to the end of the text and let go of the button. This will highlight all text from the beginning to the end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. The restart of computer is called __, when computer is already on.(a) Warm Booting(b) Cold Booting(c) Shut Down(d) Logging off(e) None of these
A

(a)Explanation: (a) Warm boot refer to restarting a computer that is already turned on via the operating system. Restarting it reforms the computer to its initial state. A warm boot is sometimes necessary when a program encounters an error from which it cannot recover on PCs, you can perform a worm boot by pressing control, Alt and Delete keys simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

“512. A computer message is ““Do you really want to delete the selected files (s)?”” The user clicks ‘Yes’ key. It is called(a) User output(b) Program Response(c) User Response(d) Program output(e) None of these”

A

(c)Explanation: (c) User response is the user’s answer to the computer’s questions such as choosing ok, YES, or NO or typing in text, for example, the name of a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. To open disk, mouse pointer is placed on disk icon and then-(a) mouse is double-clicked(b) mouse is dragged pushing the button(c) mouse is rotated around(d) mouse is clicked after rotating it(e) None of these
A

(a)Explanation: (a) Double-clicking is most often used to open items on your desktop. For example, you can start a program or open a folder by double- clicking its icon on the desktop. To double-click an item, point to the item on the screen, and then click twice quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Files are organised after storing in_______(a) Folders(b) Archives(c) Indices(d) Lists(e) None of these
A

“(a)Explanation: (a) In graphical user interfaces such as windows and the Macintosh environment, a folder is an object . On computer’s hard drive to store files. These files can be documents, programs, scripts, libraries, etc. A folder can also store sub-folders. Folders allow people to organize their files in a way that makes sense to them. For eg. a college student might store all her photos in a folder name ““Pictures””, all her assignments in a folder named ““college work”” and all her financial information in a folder named ““Finance””.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. ______ are such distinct items, which do not have wide implication in the given situation.(a) Data(b) Field(c) Query(d) Property(e) None of these
A

(b)Explanation: (b) A field consists of grouping of characters. A data field represents an attribute (a characteristic or quality) of some entity (object/ person/place/event). They are distinct items that do not have wide implication in the given situation. Whereas a record represents a collection of attributes that describe a real world entity. A record consists of fields, with each field describing an attribute of the entity. For example, a tax form contains a number of fieldsone for your name, one for your social security number and one for your income, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Which of the following is appropriate method to shutdown computer ?(a) Click ‘Start’, then select ‘Restart the Computer’(b) Click ‘Start’, then select ‘Shut Down’ and finally select ‘Shut Down’.(c) Switch off the Power(d) Switch off Monitor and Printer(e) None of these
A

“(b)Explanation: (b) Never just switch off your computer-you may loose unsaved information and damage your computer’s hard disk drive. To shut down your computer properly, follow the steps: • Click the start button • Click shutdown • Select the ““shut down the computer”” option by clicking on it. • Click the Yes button to confirm your selection.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. The user generally applies ____ to access mainframe or super computer.(a) Node(b) Terminal(c) Desktop(d) Hand held(e) None of these
A

(b)Explanation: (b) Traditionally, user connect to a mainframe using a terminal which allowed them to input request to the mainframe. The mainframe would then handle all the computing before outputing a response. These terminals are called dumb terminals because they had no data-processing abilities of their own, they were simply windows through which users could access the mainframe. These days, terminal emulation software such as 3270 emulation is used in place of a terminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. Which of the following is called small single site network ?(a) DSL(b) LAN(c) RAM(d) USB(e) None of these
A

(b)Explanation: (b) A LAN (Local Area Network) is a single site network. A single site network exists when multiple pieces of computer equipment in one geographic location- such as a campus, office or home-are connected together for the purpose of sharing information. A network that connects multiple pieces of computer equipment in multiple geographic locations is a multi site area network, also known as WAN (Wide Area Network).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. Tape drive provides_____access to data.(a) Sporadic(b) Timely(c) Random(d) Sequential(e) None of these
A

(d)Explanation: (d) A tape drive is a data storage device that reads and writes data on a magnetic tape. A tape drive is a sequential access device because to get to point ‘q’ on the tape, the drive needs to pass through points ‘a’ through ‘p’. A disk drive, on the other hand, is a random-access device because the drive can access any point on the disk without passing through all intervening points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. The person who writes computer program and test, is known as-(a) Computer scientist(b) Programmer(c) Software engineer(d) Project developer(e) None of these
A

(b)Explanation: (b) A computer programmer write code or instructions to make the computer do specific tasks. These instructions are called programs. Before writing the code, the programmer gets the algorithm from a software engineer. To write those instructions, programmers use programming languages such as C, C++, Java, COBOL, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. What is the storage area for email messages called?(a) A mailbox(b) A folder(c) A directory(d) The hard disk(e) None of these
A

(a)Explanation: (a) A mailbox refers to an area in memory or a storage device where email is placed. In email system, each user has a private mailbox. when the user receives email, the email system automatically puts it in the mailbox.Q522. The Internet is ——(a) an internal communication system for a business(b) a large network of networks(c) a communication system for the Indian government(d) a communication system for some states of India(e) a communication system for some cities of India (b)Explanation: (b) The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. When data changes in multiple lists and all lists are not updated, this causes ——(a) information overload(b) data redundancy(c) duplicate data(d) data inconsistency(e) data repetition
A

(d)Explanation: (d) Data inconsistency exists when different and conflicting versions of the same data appear in different places. Data inconsistency creates unreliable information, because it will be different to determine which version of the information is correct. Data inconsistency is likely to occurs when there is data redundancy. Data redundancy occur when the data file/database file contains redundant-unnecessar i ly duplicated-data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. URL stands for ——(a) Universal Resource List(b) Universal Research List(c) Uniform Research List(d) Uniform Research Locator(e) Uniform Resource Locator
A

(e)Explanation: (e) URL stands for uniforms resources locator. It is the address of a world wide web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. If you wish to extend the length of the network without having the signal degrade, you would use a——(a) router(b) resonance(c) gateway(d) switch(e) repeater
A

(e)Explanation: (e) Network repeaters regenerate incoming signals. With physical medium like Ethernet, data transmissions can only span a l imited distance before the quality of the signal degrades. Repeaters attempt to preserve signal integrity and extend the distance over which data can safely travel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. An error in a computer program(a) Power Failure(b) Crash(c) Bug(d) Virus(e) Fatal error
A

(c)Explanation: (c) A software bug is an error, flaw, failure or fault in a computer program or system that produces an incorrect or unexpected result, or causes it to behave in unintended ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. A means of capturing an image (drawing or photo) so that it can be stored on a computer is —–(a) Software(b) Modem(c) Scanner(d) Keyboard(e) Mouse
A

(c)Explanation: 9.(c) A scanner is a device that reads or scans an image and converts it to a digital format. It captures images from photographic prints, posters, magazine pages, letters, forms, and other similar sources forcomputer editing and display.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  1. Which process checks to ensure the components of the computer are operating and connected properly?(a) Processing(b) Booting(c) Saving(d) Editing(e) Starting
A

(b)Explanation: (b) Booting is the process that starts operating systems when the user turns on a computer system. A boot sequence is the initial set of operations that the computer performs when power is switched on. The boot loader typically loads the main operating system for the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. What is the process of copying software programs from secondary storage media to the hard disk called?(a) download(b) configuration(c) storage(d) upload(e) installation
A

(e)Explanation: (e) Installation of system software onto your hard disk will provide you with direct access to hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  1. One advantage of dial-up Internet access is ——(a) it is Indian(b) it utilizes broadband technology(c) it uses a router for security(d) modem speeds are very fast(e) it utilizes existing telephone service
A

(e)Explanation: (e) Dial up internet access is a connection type that operates, through a standard telephone line. By running the telephone line to a modem device in the computer and configuring it to dial a specific phone number, the computer can connect to the internet. This connection type is usually inexpensive, but slow and may not be adequate for users who use the web for multimedia and other high bandwidth applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  1. The software that allows users to surf the Internet is called a/an —(a) Internet Service Provider (ISP)(b) Search engine(c) Multimedia application(d) Browser(e) Internet Surfing Provider
A

(d)Explanation: (d) Browser (or web browser) is a software application used to enable computer users to locate and access web pages. Browsers translate the basic HTML code that allows us to see images, text videos and listen to audios on website, along with hyperlinks that let us travel to different web pages. The browser gets in touch with a web server and request for information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  1. ERP is an acronym for ——(a) Enterprise Relationship Planning(b) Enterprise Retirement Planning(c) Enterprise Resource Planning(d) Enterprise Reorder Planning(e) Enterprise Retention Planning
A

(c)Explanation: (c) Enterprise Resource Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  1. The first page of a Web site is called the ——(a) Index(b) Homepage(c) Java Script(d) Book mark(e) Intro Page
A

(b)Explanation: (b) Home page is most often refers to the initial or main web page of a web site, sometimescalled the front page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  1. The computer’s capability of distinguishing spoken words is called ——(a) speech acknowledgement(b) voice analysis(c) voice recognition(d) speech interpretation(e) vocalisation
A

“(c)Explanation: (c) Speech recognition (also known as automatic speech recognition or computer speech recognition) converts spoken words to text. The term ““voice recognition”” is sometimes used to refer to recognition systems that must be trained to a particular speaker— as is the case for most desktop recognition software. Recognizing the speaker can simplify the task of translating speech.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  1. The patterns of printed lines on most products are called ——(a) striping(b) prices(c) scanners(d) OCR(e) barcodes
A

(e)Explanation: (e) A barcode is an optical machine- readable representation of data, which shows data about the object to which it attaches. Originally, barcodes represented data by varying the widths and spacings of parallel lines. Its uses on products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
  1. Unauthorized copying of software to be used for personal gain instead of for personal backups is called——(a) data snatching(b) program thievery(c) software piracy(d) program looting(e) data looting &
A

(c)Explanation: (c) The software piracy refers to several practices which involve the unauthorized copying of computer software. Copyright infringement of this kind is extremely common.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
  1. Hackers ——(a) are people who maintain computers(b) all have the same motive(c) may legally break into computers as long as they do not do any damage(d) are people who are allergic to computers(e) break into other people’s computers
A

(e)Explanation: (e) Hackers are very knowledgeable computer users who use their knowledge to invade other people’s computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
  1. Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with relation information are called ——(a) hypertext(b) hypermedia(c) HTML(d) URL(e) FTP
A

(a)Explanation: (a) Hypertext is text displayed on a computer or other electronic device with references (hyperlinks) to other text that the reader can immediately access, usually by a mouse click or keypress sequence. Apart from running text, hypertext may contain tables, images and other presentational devices. Hypertext is the underlying concept defining the structure of the World Wide Web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
  1. A term relating to sending data to a satellite is ——(a) modulate(b) downlink(c) demodulate(d) uplink(e) interrelate
A

(d)Explanation: (d) Uplink is a term relating to sending data to a satel l ite. An uplink is the portion of a communications link used for the transmission of signals from an Earth terminal to a satellite or to an airborne platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
  1. The issues that deal with the collection and use of data about individuals is ——(a) publicity(b) access(c) accuracy(d) property(e) privacy
A

(e)Explanation: (e) Privacy is the right to be left alone when you want to be, to have control over your own personal information, and not to be observed without your consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
  1. The _____ settings are automatic and standard.(a) CPU(b) default(c) peripheral(d) user friendly(e) defaulter
A

(b)Explanation: (b) Default setting refers to the controls of a computer hardware or software (or of a device, equipment or machine) as preset by its manufacturer. A default is a predesigned value or setting that is used by a computer program or system when a value or setting is not specified by the user. Default settings are also called presets, especially for electronic devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
  1. The life-span of a CD-ROM is —(a) approximately two years(b) approximately one year(c) approximately five years(d) approximately twenty-five years(e) almost unlimited
A

(c)Explanation: (c) The life span of a CD-ROM is approximately five years. Unlike pressed original CDs, burned CDs (such as CD-RW) have a relatively short life span of between two to five years, depend- ing on the quality of CD. Burned CDs have a recording surface consisting of a layer of dye that can be modified by heat to store data. The degradation process can result in data shifting on the surface and thus becoming unreadable to the laser beam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
  1. What is MP3 ?(a) A Printer(b) A mouse(c) A Sound format(d) AScanner(e) A Mobile Phone
A

(c)Explanation: (c) MP3 is a patented digital audio encoding format using a form of lossy data compression. It is a common audio format for consumer audio storage, as well as a de facto standard of digital audio compression for the transfer and playback of music on digital audio players.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
  1. What is usually used for displaying information at public places?(a) Overhead Projections(b) Monitors(c) Monitors and Overhead Projections(d) Touch Screen Kiosks(e) Loud Speakers
A

(a)Explanation: (a) An overhead projector is a variant of slide projector that is used to display images to an audience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q
  1. Junk e-mail is also called ——(a) Spoof(b) Spam(c) Cookie crumbs(d) Sniffer script (e) Spill
A

“(b)Explanation: (b) Junk email is unsolicited email that wants to sell you something. Junk email is often sent as a ““spam”” - a single email message broadcast to hundreds or thousands of unknowing recipients - and is also usually ““anonymous”” in that you can not write back to the address that is listed as the sender of the message.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q
  1. What is an embedded system?(a) A program that is permanent part of a computer(b) A program that comes wrapped in a box(c) A computer that is part of a larger computer(d) A computer and software system that controls a machine or appliance(e) None of these
A

(d)Explanation: (d) An embedded system is a computer system designed to perform one or few dedicated functions often with real - time computing constaints. It is embedded as a part of a complete device often including hardware and mechanical parts. Embedded system range from portable devices such as digital watches, MP3 players, etc. to large stationary installations like traffic lights, factory controller or the systems controlling nuclear power plants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q
  1. How is it possible that both programs and data can be stored on the same floppy disk?(a) A floppy disk has to be formatted for one or for the other(b) A floppy disk has two sides, one for data and one for programs(c) Programs and data are both software, and both can be stored on any memory device(d) Floppy disks can only store data, not programs(e) Floppy disks are better than CDs
A

(c)Explanation: (c) Both data files and computer programs can be stored on any memory device like hard disk, floppy disk, optical disks such as CD, DVD, etc. It preserves data or programs for retrieval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q
  1. Why should you delete unknown e-mail attachments?(a) the person could track you down and hurt you(b) You could go to jail(c) it is bad manners(d) it might contain a virus that could hurt your computer(e) None of these
A

(d)Explanation: (d) Most of the viruses that spread on your computer are delivered through attachments. These attachments are sent via email most often from people you know who are unaware of the virus or through spam mail that wants to advertise a messsage to you. Emails injected with a virus usually appears like a normal email in your inbox. When the unsuspected user open the email and the attachment the virus executes itself and begin to infect your computer system. So, you should delete unknown email attachments without opening them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q
  1. Participants can see and hear each other in a/an ——(a) message system(b) electronic mail system(c) teleconference(d) bulletin board(e) None of these
A

(c)Explanation: (c) A teleconference or teleseminar is the live exchange and mass articulation of information among several persons and machines remote from one another but linked by a telecommunications system. The telecommunications system may support the teleconference by providing one or more of the following: audio, video, and or data services by one or more means, such as telephone, computer, telegraph, teletype, radio, and television.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
  1. What are the two parts of an Email address ?(a) Legal name and phone number(b) User name and street address(c) User name and domain name(d) Initials and password(e) User Name and Recipient Name
A

(c)Explanation: (c) A email address such as abc @ example.com is made up of a local part, @ sign and then a domain part. The part before the @ sign is the local part of the address, often the user name of the recipient (abc) and the part after the @ sign is a domain name to which the email message will be sent (example.com).Q551. Executing more than one program concurrently by one user on one computer is known as —(a) multiprocessing(b) multiprogramming(c) time-sharing(d) multitasking(e) multiaction (d)Explanation: (d) Multitasking refers to running two or more programs at the same time on the same singleprocessor computer. This seemingly simultaneous processing is deceptive because the CPU is actually attending to only one program at any given moment. The currently running program is said to be in the ‘foreground’, all other programs are said to be running in the background.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q
  1. For viewing video CDs, you would use —(a) Windows Media Player(b) CD Player(c) Windows Video Player(d) Windows Movie Player(e) None of these
A

(a)Explanation: (a) Windows media player (WMP) is a software application from Microsoft used to play, store and organize digital audio, images and video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q
  1. This software allows the user to move from page to page on the Web by clicking on or selecting a hyperlink, or by typing in the address of the destination page(a) Web search engine(b) Web browser(c) Web home page(d) Web service(e) None of these
A

(b)Explanation: (b) A browser is a software that is used to access the internet. A browser lets you visit websites and do activities within them like login, view multimedia, link from one site to another, visit one page from another, print, send and receive email, and many other activities, eg. Microsoft Internet explorer, Mozilla firefox, Google’s chrome, etc. are commonly used browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q
  1. The signal that a computer is waiting for a command from the user ——(a) event(b) prompt(c) time slice(d) interrupt(e) None of these
A

“(b)Explanation: (b) A prompt is a sign to indicate that the computer is waiting for a command from the user. Type your command, then press ““Enter”” key to execute the command”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q
  1. Which of the following will you require to hear music on your computer?(a) Tape Recorder(b) Video Card(c) Mouse(d) Joy Stick(e) Sound Card
A

(e)Explanation: (e) A sound card (also known as an audio card) is an internal computer expansion card that facilitates the input and output of audio signals to and from a computer under control of computer programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q
  1. Collecting personal information and effectively posing as another individual is known as the crime of ——(a) spoofing(b) spooling(c) hacking(d) identity theft(e) None of these
A

(d)Explanation: (d) Identity theft is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resourcesor obtain credit and other benefits in that person’s name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q
  1. Three types of compact disks include CD-ROM, CD-R, and___(a) CD-RAM(b) CD-W(c) CD-DVD(d) CD-RW(e) None of these
A

(d)Explanation: (d) The Compact Disc (also known as a CD) is an optical disc used to store digital data. It was originally developed to store and playback sound recordings exclusively, but later expanded to encompass data storage (CD-ROM), write-once audio and data storage (CD-R), rewritable media (CDRW), Video Compact Discs (VCD), Super Video Compact Discs (SVCD), PhotoCD, PictureCD, CD-i, and Enhanced CD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q
  1. You can keep your personal files/ folders in ——(a) My Documents(b) My folder(c) My Files(d) My Text(e) My Collection
A

(a)Explanation: (a) On Microsoft windows operating system, My Documents is the name of a special folder on the computer’s hard drive that the system commonly uses to store a user’s documents, music, pictures, downloads and other files. My Documents folder is a user’s personal folder in which he can store his personal files. When there is more than one person using the computer, windows creates a My Document folder for each user on the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q
  1. Which of the following controls the manner of interaction between the user and the operating system?(a) platform(b) language translator(c) user interface(d) icon(e) None of these
A

(c)Explanation: (c) A User interface refers to a visual part of computer application or operating system through which a user interacts with a computer or a software. It determines how commands are given to the computer or the program and how information is displayed on the screen. Three main types of user interfaces are- command language, Menus and Graphical user interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

“561. A computer cannot ““boot”” if it does not have the(a) Loader(b) Compiler(c) Operating System(d) Assembler(e) None of these”

A

(c)Explanation: (c) Booting refers to loading the first piece of software that starts a computer. Because the operating system is essential for running all other programs, it is usually the first piece of software loaded during the boot process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q
  1. To make the number pad act as directional arrows, you press the _____ key.(a) caps lock(b) num lock(c) arrow lock(d) shift(e) None of these
A

(b)Explanation: (b) Num lock (or Number lock ) key is a toggle key which toggles the input of certain keys (Numeric keypad) depending whether Num lock is on or off. When it is on , the keypad only enters numbers. When it is off, the keys may provide different input like directional arrows (up, down, left, right), Delete, Insert, End, Home and clear.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q
  1. _____ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.(a) Multithreading(b) Multitasking(c) Multiprocessing(d) Multicomputing(e) None of these
A

(b)Explanation: (b) Multitasking refers to running two or more programs at the same time on the same single - processor computer. This seemingly simultaneous processing is deceptive because the CPU is actually attending to only one program at any given moment. The currently running program is said to be in the ‘foreground’, all other programs are said to be running in the background.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q
  1. If you open a menu and then decide you don’t want to select an option after all, click the menu title again or press the _____ key to close the menu.(a) Tab(b) Shift(c) F1(d) Esc(e) None of these
A

(d)Explanation: (d) To close the menu, without making any selection, press ESC (Escape) key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q
  1. Restarting a computer which is already running is referred to as __(a) starting(b) booting(c) rebooting(d) second-starting(e) None of these
A

(c)Explanation: (c) Rebooting is the process by which a running computer system is restarted, either intentionally or unintentionally. Rebooting is of two types- Warm booting and Cold booting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q
  1. The computer abbreviation KB usually means(a) Kernel Boot(b) Key Block(c) KiloByte(d) Kit Bit(e) None of these
A

(c)Explanation: (c) A KB (kilobyte) is a unit of memory or data which is equal to 1,024 (or 210) bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q
  1. Terminal is(a) a point at which data enters or leaves the computer(b) a device to give power supply to the computer(c) the last instruction in a program(d) any input / output device(e) None of these
A

(d)Explanation: (d) A computer terminal is an electronic or electro mechanical hardware device that is used for entering data into and displaying data from a computer or a computing system. Generally, a terminal is a combination of keyboard and display screen. It enables the user to communicate with a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q
  1. To keep files organised, related documents are often stored in _____ (also called directories) located on the storage medium.(a) labels(b) indexes(c) folders(d) programs(e) home pages
A

“(c)Explanation: (c) A folder (or directory) is a storage area that many files can be placed into to group them together and organize the computer. A folder may contain sub-folders. Folders allow people to organize their files in a way that makes sense to them. For eg. a college student might store all her photos in a folder named ““Pictures””, all her assignments in a folder names ““School Work”” and all her financial information in a folder named ““Finances””.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q
  1. The primary goal of a computer system is to turn data into __(a) suggestions(b) ideas(c) information(d) reports(e) pictures
A

(c)Explanation: (c) Computer is an advanced electronic device that takes raw data as input from the user and processes these data under the control of set of instructions called programs and give the result (output) and saves the output for the future use. The output is in the form of meaningful information which helps in decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q
  1. A key that will erase information from the computer’s memory and characters on the screen(a) delete key(b) edit(c) dummy out(d) trust key(e) esc key
A

“(a)Explanation: (a) When struck on a computer keyboard during text or command editing, the delete key (known less ambiguously as forward delete) discards the character ahead of the cursor’s position, moving all following characters one position ““back”” towards the freed letterspace.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q
  1. A device that connects to a network without the use of cables is said to be __(a) wireless(b) distributed(c) centralised(d) open source(e) scattered
A

(a)Explanation: (a) A wireless device can refer to any kind of communication equipment that doesn’t require a physical wire for relaying information to another device. eg. wireless headphones fitted with a receiver use either radio frequency or infrared technology to communicate with a transmitter that is connected to the sound source, say a television.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q
  1. _____ is the process of dividing the disk into tracks and sectors.(a) Formatting(b) Tracking(c) Crashing(d) Allotting(e) Dicing
A

(a)Explanation: (a) Formating is the process of organizing the disk surface into areas called tracks and sectors. The formatting process sets up a method of assigning addresses to these different areas. It also sets up an area for keeping the list of addresses without formatting, there would be no way to know what data went with what. By dividing the tracks into sectors, data can be packed uniformly throughout the disk surface and hence it is used more efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q
  1. A computer’s type, processor, and operating system define its(a) size(b) brand(c) platform(d) speed(e) format
A

(c)Explanation: (c) In computers, a plateform is an underlying computer system on which applicationprograms can run. It defines a standard around which a system can be developed. eg. On personal computers, windows 2000 and Mac OS X are examples of two different platforms. A platform consists of an operating system, the computer system’s co-ordinating program, which in turn is built on the instruction set for a processor (CPU), the hardware that performs logic operations and manages data movement in the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q
  1. Computers that are portable and convenient for users who travel are known as(a) laptops(b) supercomputers(c) minicomputers(d) file servers(e) None of these
A

(a)Explanation: (a) A laptop is a personal computer designed for mobile use (when person is travelling) and small and light enough to sit on a person’s lap while in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q
  1. A series of statements explaining how the data is to be processed is called(a) compiler(b) instruction(c) program(d) interpreter(e) None of these
A

(c)Explanation: (c) A computer program is a sequence of instructions, written to perform a specified task with a computer. A computer requires programs to function, typically executing the program’s instructions in a central processor. The series of instructions when executed, causes the computer to behave in a predetermined man ner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q
  1. A _____ is hardware used to read disks.(a) hardware(b) floppy disk(c) software(d) disk drive(e) CPU
A

(d)Explanation: (d) A disk drive is a device that allows a computer to read from and write to computer disks. There are different types of disk drives for different types of disks, eg. a hard disk drive reads and writes hard disks, floppy drive access floppy disks. A magnetic disk drive reads magnetic disks and an optical drive reads optical disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q
  1. A keyboard is this kind of device(a) black(b) scanning(c) output(d) input(e) word processing
A

(d)Explanation: (d) A keyboard is an input device that is used to enter letters, numbers, symbols, commands, etc. into the computer for processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q
  1. Which of the following is not true ?(a) Chatting can only be done with a single person(b) Chatting is like e-mail(c) Chatting can involve multiple persons(d) Chatting is an electronic dialogue(e) None of these
A

(b)Explanation: (b) Chat refers to real-time communication between two or more users via Computer & Internet. For eg. when talking to someone in chat, any typed text is received by other participants immediately. This is different from other text-based communication such as email where it could be couple of hours, days or weeks to receive a response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q
  1. Arithmetic operations(a) sort data items according to standard, predefined criteria in ascending order or descending order(b) involve matching one data item to another to determine if the first item is greater than, equal to, or less than the other item.(c) use conditions with operators such as AND, OR, and NOT(d) include addition, subtraction, multiplication, and division(e) None of these
A

(d)Explanation: (d) An arithmetic operation refers to a mathematical operation involving numbers. There are four primary arithmetic operations a computer program can perform. These are- addition, subtraction, multiplication and division. They form the basis for determining the outcome of calculated numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q
  1. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is __(a) write-only(b) memory-only(c) read-only(d) run-only(e) non-changeable
A

(c)Explanation: (c) A CD-ROM is a pre-pressed compact disc which contains data. Data on CD-ROM is ‘read only’ or cannot altered or erased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q
  1. The copy command saves to(a) the clipboard(b) the desktop(c) printer(d) Microsoft Word(e) paste
A

(a)Explanation: (a) A clipboard is a special file or memory area (buffer) where data is stored temporarily before being copied to another location. Many word processor, for example, use a clipboard for cutting and pasting. When you cut a block of text, the word processor copies the block of the text to the cl ipboard, when you paste the block, the word processor copies it from the clipboard to its final destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q
  1. A _____ is often used to select or highlight.(a) keyboard(b) icon(c) hard disk(d) floppy disk(e) mouse
A

(e)Explanation: (e) Many text-editors and programs allow you to highlight all or portions of text using the mouse, eg. place the cursor at the beginning of a paragraph in a text editor, hold down the shift key and click at the end of the paragraph to highlight the full paragraph. OR simply, click the mouse button three times on any text in the paragraph if you want to highlight the whole paragraph. Similarly, a word can be selected by double-clicking the word.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q
  1. What are the two parts of an Email address?(a) Legal name and phone number(b) User name and street address(c) Initials and password(d) User name and domain name(e) None of these
A

(d)Explanation: (d) An email address is an address composed of two parts- a username and a domain name seperated by a @ sign eg. abc @ example. com. The username (abc) is the name you choose to be identified with for email purposes and that you have provided to the email host to create your email account. The domain name is the internet destination for the email-host, which may be a private site, company, organization or government entity. The extension can be any of many options such as .com, .org, .gov, .int, .info, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q
  1. Files deleted from the hard disk are sent to the __(a) floppy disk(b) recycle Bin(c) clipboard(d) motherboard(e) None of these
A

(b)Explanation: (b) Recycle bin is a wastebasket icon on your computer desktop that works as a location or Directory for deleted files or folders. The recycle bin only stores files deleted from hard drives not fromremovable media such as memory cards, external USB connected hard drives or thumb drives and floppy disks. Nor does it stores files deleted from network drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q
  1. The ____ is the brain of the computer.(a) hard disk(b) hardware(c) CPU(d) floppy disk(e) keyboard &
A

(c)Explanation: (c) CPU is called as the brain of computer. It is here where most of the processing (i.e, calculations and comparison processes) of the computer occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q
  1. Sending an E-mail is similar to __(a) drawing a picture(b) writing a letter(c) talking on the phone(d) sending a package(e) None of these
A

(b)Explanation: (b) Although the means of communication may contrast between writing a letter versus sending an email, they both convey the same messages. A letter is a hand written or a printed mode of communication addressed to a person or organisation and usually send by post. An email, on the other hand, is a modern mode of communication, where digital messages are exchanged from an author to one or more than one person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q
  1. A _____ is the general term for hardware not necessary to the basic function of the computer, connected externally.(a) bit(b) icon(c) keyboard(d) printer(e) None of these
A

(d)Explanation: (d) Printer is a peripheral device that is connected to the main computer system (or system unit). It doesn’t form the part of the core computer architechture. It is connected externally. Printer is an output device that produces output in the form of hard copy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q
  1. Removable disks are often called what?(a) hard drives(b) floppies(c) RAM drives(d) expansion cards(e) None of these
A

(b)Explanation: (b) A removable storage device is a device that allows for transportation of information. There are different types of removable disks such as floppy disks, compact disks, optical disks; portable USB drives. Removable disk is so-called because it can be removed from a computer while the system is running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q
  1. Mr. X has no printer to print his report. He wants to take it to Mr. Y’s computer because Mr. Y has a printer. Mr. X could save his report on a __(a) piece of paper(b) hard drive(c) scanner(d) monitor(e) floppy disk
A

(e)Explanation: (e) Mr. X could save his report on a floppy disk which is a portable storage medium. Report saved on floppy disk can be copied on Mr. Y computer and a print out can be taken out from Mr. Y’s printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q
  1. Computer equipment itself is called __(a) byte(b) hardware(c) mouse(d) software(e) default
A

(b)Explanation: (b) A computer is an electronic device (or machine) which allows the user to store all sorts of information and then process that information or data. Computer is basically a hardware i.e, physical equipment that can be seen and touched computers can be classified by size and power, eg. mainframe, mini, personal, super, etc are also types of computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q
  1. This is a permanent storage device on computer(a) monitor(b) floppy disk(c) RAM(d) cache(e) hard disk
A

(e)Explanation: (e) Hard disk is the computer’s main storage media device that permanently stores all data on the computer. Most computer hard drives are in an internal drive bay at the front of the computer and connect to the motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q
  1. What does a Browser do ?(a) Reads material really fast(b) Looks through magazines and books in the library(c) It wastes your time(d) It provides help menus(e) It is software used to view web pages
A

(e)Explanation: (e) A web browser is a software application used to enable computer users to locate and access web pages. Browsers translate the basic HTML code that allows us to see images, text videos and listen to audios on websites, along with hyperlinks that let us travel to different web pages. The browser gets in contact with the web server and request for information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q
  1. The most frequently used piece of hardware for inputting data is the(a) floppy disk(b) keyboard(c) cursor(d) software(e) hardware
A

(b)Explanation: (b) Keyboard is the most commonly used hardware device for entering input (letters/symbols/ numbers/commands/etc) into the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q
  1. If you are going to a site you use often, instead of having to type in the address every time, you should(a) save it as a file(b) make a copy of it(c) memorise it(d) bookmark it(e) note it in your diary
A

(d)Explanation: (d) Instead of memorizing long web addresses, use browser bookmarks to easily save the web pages you’d like to revisit. It is a great way to save the URL of a website. The simple way to create a bookmark is to click the star icon in the address bar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q
  1. What part of the computer stores programs and files for later use?(a) hard drive(b) RAM memory(c) mother board(d) adapter board(e) None of these
A

(a)Explanation: (a) Hard drive is the storage area within the computer itself, where megabytes of space available to strore bits of information. Hard disk is non-volatile storage i.e, it stores information permanently for future use. The information doesn’t get lost when power is turned off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q
  1. Windows 95, Windows 98, and Windows NT are known as what?(a) domain names(b) processors(c) modems(d) operating systems(e) None of these
A

(d)Explanation: (d) An operating system is a collection of software that manages computer hardware resources and provide common services for computer programs. Examples of operating system include Windows, DOS, Linux, etc. The windows family of operating systems (eg. NT, 95, 98, XP professional, etc), includes a Graphical user interface (GUI) that makes the software user fiendly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q
  1. The __ of a system includes the programs or instructions.(a) software(b) peripheral(c) information(d) icon(e) hardware
A

(a)Explanation: (a) A computer software or a program is a set of computerised instructions that operate a computer, manipulate the data and execute particular functions or tasks. Computer software tells the hardware of a computer what to do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q
  1. The _____ settings are automatic and standard.(a) default(b) icon(c) CPU(d) peripheral(e) user friendly
A

“(a)Explanation: (a) Default settings refers to the controls of a computer hardware or software (or of a device, equipment or machine) as preset by its manufacturers. A default is a predesigned value or setting that is used by a computer program or system when a value or setting is not specified by the user. Default settings are also called ““presets””, especially for electronic devices.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q
  1. Something which has easily-understood instructions is said to be(a) icon(b) hyper(c) information(d) word processing(e) user friendly
A

(e)Explanation: (e) In computer, user-friendly refers to something which is easy to learn, understand and deal with eg. menu-driven programs are considered more user-friendly than command driven systems. Graphical user interfaces are also considered user friendly. They all make it easier for novices to use a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q
  1. The _____ may also be called the screen or monitor.(a) scanner(b) printer(c) hard disk(d) software(e) display
A

(e)Explanation: (e) A computer monitor or screen is an electronic visual display for computers. It displays the information to the user.Q601. To make a notebook act as a desktop model, the notebook can be connected to a _____ which is connected to a monitor and other devices.(a) docking station(b) bay(c) port(d) network(e) None of these (a)Explanation: (a) Docking station refers to a small cabinet to which a laptop or network computer can be attached for use as a desktop computer, usually having a connector for externally connected devices such as hard drives or scanners; and parts that can be linked to components such as keyboard, monitor and printer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q
  1. The ability to find an individual item in a file immediately ____ is used.(a) directory(b) file allocation table(c) sequential access(d) direct access(e) None of these
A

(d)Explanation: (d) Direct (Out of sequence or random) access by a computer (CPU) to any memory address of a data storage device, without starting from the first address every time the data needs to be read. A random access data file enables you to read or write information anywhere in the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q
  1. The primary purpose of software is to turn data into(a) information(b) Web sites(c) programs(d) objects(e) None of these
A

(a)Explanation: (a) The primary purpose of software is to turn raw data entered into the software into meaningful information after processing, For eg. The number of hours an employee worked in a month and his pay rate, when entered into a payroll software, gives salary of employee for that particular month.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q
  1. The most important or powerful computer in a typical network is(a) network client(b) desktop(c) network server(d) network station(e) None of these
A

(c)Explanation: (c) A network server is a computer designed to process requests and deliver data to other (clients) computers over a local network or the Internet. Server is the most powerful computer in the network. It manages network resources on the network. They are configured with additional processing, memory and storage capacity to handle the load of serving clients, eg. web servers, proxy servers, FTP servers, Online game servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q
  1. What menu is selected to cut, copy, and paste ?(a) Tools(b) File(c) Special(d) Edit(e) None of these
A

(d)Explanation: (d) The edit menu is a contextual menu that is displayed to offer commands that can be performed on a selection such as a word in a text view or an image. The edit menu is an integral part of copy, cut and paste operations, for which it display (potentially) the commands copy, cut, paste, select and select All. However, you can add custom menu items to the edit menu to perform other kinds of actions on selections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q
  1. _____ is the process of finding errors in software code.(a) Testing(b) Compiling(c) Running(d) Debugging(e) None of these
A

(d)Explanation: (d) Debugging is the process of detecting and rectifying bugs in a software code that can cause it to crash, behave erratically or be susceptible to hacker or cracker attack. Bugs can be in a variety of forms : coding errors, design errors, complex interaction, poor user interface design and system failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q
  1. Which of the following is an example of connectivity ?(a) floppy disk(b) Internet(c) power cord(d) data(e) None of these
A

(b)Explanation: (b) An Internet is a global network connecting millions of computers in order to exchange data and information among connected computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q
  1. Storage that retains its data after the power is turned off is referred to as(a) non-volatile storage(b) volatile storage(c) sequential storage(d) direct storage(e) None of these
A

(a)Explanation: (a) Non-volatile storage refers to a computer memory that is able to hold saved data even if there is no power and doesn’t require periodic refreshes of its memory data. Non-volatile storage is commonly useful for secondary storage or long-term consistent storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q
  1. A collection of related files is called a ( 1) character ( 2) field (c) database (d) record (e) None of these
A

(c)Explanation: (c) A database is an integrated collection of logically related records or files. A database consolidates records previously stored in seperate files into a common pool of data records that provide data for many applications. The data is managed by system software called data base management system (DBMS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q
  1. You can use the tab key to(a) indent a paragraph(b) move a cursor across the screen(c) move the cursor down the screen(d) Only (b) and (a)(e) None of these
A

(d)Explanation: (d) Tab key is a key on a computer keyboard that insects a tab character or moves the cursor to the next tab stop across the screen, eg. In spreadsheet, tab key moves the cursor to the next field or cell. Also, a tab is an identation at the beginning of a line to signify a new paragraph in a document. Usually about five spaces, tabs are primarily used to help create equal spacing between multiple lines and to start a new paragraph.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q
  1. The ____ key will launch the start buttons.(a) shift(b) esc(c) windows(d) shortcut(e) None of these
A

(c)Explanation: (c) To open the start menu, click the start button in the lower left corner of your screen or press the windows logo key on your keyboard. The windows logo key will launch the start button and the start menu appears.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q
  1. Computers use the _____ number system to store data and perform calculations.(a) hexadecimal(b) decimal(c) octal(d) binary(e) None of these
A

(d)Explanation: (d) Binary numbers are closely related to digital electronics. With digital electronics, a ‘1’ means that current is present and a ‘0’ means it is not present. The different parts of a computer communicate through pulses of current (1s and 0s) . Computers can calculate complex equations and perform complex calculations. Calculating using only 1s and 0 s is called Binary system. A computer can process only 1s and 0 s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q
  1. Virtual memory is(a) in RAM(b) memory on the hard disk that the CPU uses as an extended RAM(c) only necessary if you do not have any RAM in your computer(d) a back up device for floppy disks(e) None of these
A

(b)Explanation: (b) Virtual memory is storage space on computer’s hard disk that windows uses in conjunction with RAM. That is, if your computer lacks the RAM needed to run a program or operation, windows uses virtual memory to compensate. Virtual memory combines computer’s RAM with temporary space on hard disk when RAM runs slow, virtual memory moves data from RAM to a space called a paging file. Moving data to and from the paging file frees up RAM to complete its work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q
  1. Changing an existing document is called _____ the document.(a) editing(b) creating(c) modifying(d) adjusting(e) None of these
A

(a)Explanation: (a) Editing a document involves opening the existing document in the approximate editor application then saving the changes and checking the document back in . Document you edit are automatically checked out. For example: In MS-Word, depending on a document, its final format and its purpose, the editing can involve checking grammar and spelling, content, word choice and formatting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q
  1. A _____ contains specific rules and words that express the logical steps of an algorithm.(a) programming structure(b) syntax(c) programming language(d) logic chart(e) None of these
A

(c)Explanation: (c) A programming language is a formal language designed to communicate instructions to a machine,particularly a computer. It can be used to create programs that control the behaviour of a machine and/or express algorithms precisely. The description of a programming language is usually split into the two components of syntax (form) and semanties (meaning).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q
  1. The _____ tells the computer how to use its components.(a) network(b) utility(c) operating system(d) application program(e) None of these
A

(c)Explanation: (c) Operating system is a software that controls the operation of a computer, directs the input & output of data, keep track of files and controls the processing of computer programs. Its role include managing the functioning of the computer hardware, running the application programs, serving as an interface between the computer and the user and allocating computer resource to various functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q
  1. Which of the following is the largest unit of storage ?(a) KB(b) GB(c) MB(d) TB(e) None of these
A

(d)Explanation: (d) 1 KB = 1024 bytes 1 MB = 1024 KB 1 GB = 1024 MB 1 TB = 1024 GB So, Terabyte (TB) is largest of kilobyte (KB), Megabyte (MB) and Gigabyte (GB).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q
  1. Which groupings do you work with when formatting text in Word ?(a) Paragraphs, indexes and sections(b) Tables, paragraphs and indexes(c) Characters, sections and paragraphs(d) Indexes, characters and tables(e) None of these
A

(c)Explanation: (c) MS-Word helps you keep your documents, simple by organizing most formatting into 3 levels of related information: font, paragraph, and section. • Font formatting is any formatting that you can apply to as little as one characters, such as bold, underline, Time New Roman, etc. • Paragraph formatting is any formatting that you can apply to as little as one paragraph. Such as paragraph spacing before and after, line spacing, indents etc. • Section formatting can be thought of as page layout or document formatting, since this formatting applies to an entire document by default. Its named section because you insert a formatting mark called a section break in order to change settings for this type of formatting in only part of your document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q
  1. When sending an e-mail, the ____ line describes the contents of the message. COMPUTER LITERACY & MODEL PRACTICE(a) subject(b) to(c) contents(d) CC(e) None of these
A

(a)Explanation: (a) The subject in an email is a description of the topic of the message. The subject line is the deciding factor whether your message is read or deleted. It needs to be truthful and informative and tempt the reader into wanting to know more about the content of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q
  1. To move to the beginning of a line of text, press the _____ key.(a) a(b) home(c) page up(d) enter(e) None of these
A

(b)Explanation: (b) The home key moves the cursor to the top left corner of the screen (i.e, beginning of the document) or to the beginning of the line of a document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q
  1. A flat metallic disk that contains a large amount of permanently stored information read optically is called a —-(a) ALU(b) Monitor(c) CD-ROM(d) RAM(e) None of these
A

(c)Explanation: (c) A compact disc is a plastic fabricated, circular medium made of molded polymer for electronically recording storing and playing back audio,video, text and other information in degital form. It contains data permanently. i.e, data doesn’t get lost when there is no power. Also, compact disc is an optical device which uses reflecting surfaces and laser technology to read and write data on a disk. Different versions of compact disc are CD-ROM, CD-R, CD-RW, DVD, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q
  1. How do you save a presentation under a new file name?(a) When you close Power Point the file will automatically be saved(b) Select the file menu and choose Save As(c) Select the file menu and choose Save & (d) The file will automatically be saved under the new name if you change the title(e) None of these
A

(b)Explanation: (b) Save As allows you to save something with a new identify. Identify can be name, location or file type. Save As creates a copy of the oroginal. The original document will not have the changes your are saving with Save As; the changes will appear only in the new copy. Save as option is available under File Menu.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q
  1. The sequence of events that occurs in the computer when it is interpreting and executing an instruction is known as a(n).(a) Instruction cycle(b) Execution cycle(c) Working cycle(d) Machine cycle(e) None of these
A

(b)Explanation: (b) When a computer obeys the instructions in a computer program it is said to be running or executing the program. Before a computer can execute a computer program, the program must be resident in memory. Once the program is loaded into memory then the following sequence is carried out. Set instructions address to the address of the first instruction while program not finished { Fetch instruction from current instruction address, Update current instruction address execute the fetch instruction. } This sequence is called the execution cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q
  1. The part of a computer that coordinates all its functions is called its——-(a) System board(b) ROM program(c) Arithmetic logic unit(d) Control unit(e) None of these
A

“(d)Explanation: (d) The control unit is the component of the processor that directs and co-ordinates most of the operations in the computer. It is the circuitry that controls the flow of information through the processor and co-ordinates the activities of the other units within it. In a way, it is the ““brain within the brain””, as it controls what happens inside the processor (CPU), which in turn controls the rest of the PC.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q
  1. Periodically adding, changing and deleting file records is called file———(a) Upgrading(b) Updating(c) Restructuring(d) Renewing(e) None of these
A

(b)Explanation: (b) Updating alters the data (add, delete, etc) in one or more fields of any record contained in the file and writes that record back to the same file from which it is read.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q
  1. Digital Banking can be resorted through:(a) Internet(b) Mobile phones(c) Telephones(d) All of the above(e) None of these
A

(d)Explanation: (d) Digital banking refers to a system which allows individuals to perform banking activities using digital devices. eg. telephone (Telebanking or phone banking); mobile phone (mobile banking or SMS banking); computer (Internet or E-banking).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q
  1. Which of the following is appropriate method to shutdown computer?(a) Click ‘Start’ then select ‘Restart the computer’(b) Click ‘Start’ then select ‘Shutdown’ and finally select ‘Shut down’.(c) Switch off the Power(d) Switch off Monitor and Printer(e) None of these
A

“(b)Explanation: (b) Never just switch off your computer you may loose unsaved information and damage your computer’s hard disk drive. To shut down your computer properly, follow the steps : • Click the start button • Click shutdown • Select the ““Shut Down the Computer”” option by clicking on it. • Click the Yes button to confirm your selection.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q
  1. The user generally applies— to access mainframe or super computer.(a) Node(b) Terminal(c) Desktop(d) Hand held(e) None of these
A

(b)Explanation: (b) Traditionally, users connected to a mainframe using a terminal which allowed them to input request to the mainframe. The mainframe would then handle all the computing before outputing aresponse. These terminals are called dumb terminals because they had no data-processing abilities of their own; they were simply windows through which users could access the mainframe. These days, terminal emulation software such as 3270 emulation is used in place of a terminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

“629. A computer message is ““Do you really want to delete the selected files(s)?”” The user clicks ‘Yes’ key. It is called.(a) User output(b) Program response(c) User response(d) Program output(e) None of these”

A

(c)Explanation: (c) User response is the user’s answer to the computer’s question such as choosing OK, YES or NO or typing in text, for example, the name of a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q
  1. To open disk, mouse pointer is placed on disk icon and then(a) Mouse is double-clicked(b) Mouse is dragged pushing the button(c) Mouse is rotated around(d) Mouse is clicked after rotating it(e) None of these
A

(a)Explanation: (a) To double click an item, point to the item on the screen and then click twice quickly. A double click is used most often to open items (programs or files or folders) eg. to open a folder or start a program, placed on desktop, move the cursor over the icon of that folder or program and then click mouse twice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q
  1. Restarting a computer that is already on is referred to as(a) Cold booting(b) Shut down(c) Warm booting(d) Logging off(e) None of these
A

(c)Explanation: (c) Warm booting refers to restarting a computer that is already turned on via the operating system. Restarting it returns the computer to its initial state. It is necessary when a program encounters an error from which it cannot recover. On PCs, you can perform a warm boot by pressing the control, Alt and Delete keys simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q
  1. What is the purpose of Software Documenting?(a) To sell software to handsome price(b) Use and maintenance of software(c) To sell software to many customers(d) To show its importance(e) None of these
A

(b)Explanation: (b) Software documentation refers to a comprehensive information on the capabilities, design details, features and limitations of a system or application software. It may also include software licensing requirements, and comes usually as a printed document or as another piece of software on a disk or CD. It is also called software manual. It helps the user in guiding how to install, operate, maintain, etc system or software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q
  1. If you want to move an icon on your desktop, this is called—-(a) Highlighting(b) Double clicking(c) Dragging(d) Pointing(e) None of these
A

(c)Explanation: (c) You can move items around the screen by dragging them. To drag an object, point to the object on the screen, press and hold the primary button, move the object to a new location, and then release the primary button. Dragging is most often used to move files and folders to a different location and to move windows and icons around on your screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q
  1. A group of related records in a database is called a(n):(a) Object(b) Column(c) Key(d) Table(e) None of these
A

(d)Explanation: (d) A relational database consists of data & information organized into different tables. A table is used to define a specific, single group of information, like a table of customers for a business or a table of products that the business sells. Each record in that table should include a key field. A key field is a field or combination of fields that uniquely identify a row (or record) in a table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q
  1. RAM stands for:(a) Readily Accessible Memory.(b) Random Access Memory.(c) Randomly Accessible Memory.(d) Read Access and Memorize.(e) None of these
A

(b)Explanation: (b) RAM (Random Access Memory) is used in computers to store temporary instructions and data needed to complete tasks. It is the main memory or working memory of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q
  1. All of the following are examples of input devices except a :(a) Mouse(b) Scanner(c) Keyboard(d) Printer(e) None of these
A

(d)Explanation: (d) Printer is an output device that produces the output to the user in the form of hard copy. • Scanner, mouse, keyboard are input devices that allow data & instructions to enter a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q
  1. The name for the way that computers manipulate data into information is called:(a) Processing(b) Programming(c) Storing(d) Organizing(e) None of these
A

(a)Explanation: (a) The computer performs useful operations, manipulating the data in many ways. This manipulation is called processing. Examples of processing include performing calculations, sorting lists of words or numbers, modifying documents and pictures according to use instructions and drawing graphs. A computer processes data in the CPU. So, processing refers to a systematic series of actions a computer performs to manipulate data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q
  1. A (n) _______ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.(a) POS(b) PSS(c) inventory(d) data mining(e) None of these
A

(b)Explanation: (b) A PSS give a personal touch to each visit to a store, offering special discounts based on your purchases, videos of product into and co-ordinating with inventory and checkout system software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q
  1. ____ is data that has been organized or presented in a meaningful fashion.(a) Software(b) process(c) Storage(d) Information(e) None of these
A

(d)Explanation: (d) Data usually refers to raw or unprocessed figures. That is, it is the basic form of data, which has not been analyzed or processed in any manner. Once the data is processed, organized, structured or presented in a given context, it can become useful. That is, data becomes information (or knowledge). Information is a sequence of symbols that can be interpreted as a message. It provides knowledge or insightabout a certain matter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q
  1. All of the following are examples of real security and privacy risks EXCEPT:(a) Spam(b) Hackers(c) Viruses(d) Identity theft(e) None of these
A

(a)Explanation: (a) Spam or junk email is unsolicited email that wants to sell you something. Spams is not an example of real security and privacy risks. One may simply delete spam mails or use ficters to avoid receiving them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q
  1. In windows, by default the files when deleted are sent to_____(a) Recycle Bin(b) Dust Bin(c) Waste Bin(d) Recycle Waste Bin(e) None of these
A

(a)Explanation: (a) Recycle bin a wastebasket icon on desktop that works as a location or Directory for deleted files or folders. All the files, folders, programs that you discard gets stored in it by default and you must empty it to permanently delete them from your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q
  1. The network connecting several computers all over the world is______(a) Internet(b) Intranet(c) ARPnet(d) Network(e) LAN
A

(a)Explanation: (a) The Internet is a global network connecting millions of computer. It is a network of networks that consist of millions of private, public, academic, business and government networks of local to global scope, that are linked by a broad array of electronic and optical networking technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q
  1. Which type of software is similar to an accountant’s worksheet ?(a) Database(b) Word processing(c) Spreadsheets(d) Graphics(e) File Manager
A

(c)Explanation: (c) A speadsheet is a grid that organizes data into columns and rows. Spreadsheets make it easy to display information and people can insert formula to work with the data. It records such things as items in inventory, income & expenses, debits & credits, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q
  1. Which key should be pressed to start a new page in MS-Word ?(a) Enter Key(b) Down Cursor Key(c) Shift + Enter(d) Ctrl + New(e) Shift + Ctrl + Enter
A

(e)Explanation: (e) Ctrl + Enter is the keyboard shortcut in MS-Word that starts a new page. It inserts page break, you can click the page break option in the pages group on the insert tab. Shift + Ctrl + Enter is a column break. When you insert a column break in the last column on a page, the break also acts as a page break.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q
  1. Outlook Express is a______(a) Scheduler(b) E-Mail client(c) Address Book(d) All of the above(e) None of these
A

(d)Explanation: (d) Outlook express is an email account i.e, it can be used to receive, read, send and manage mail in mailbox. It is a scheduler. It helps in scheduling an appointment/event/meeting. Also, it is an addressbook which helps in creating and managing contacts. Address book is a directory of address lists. It is a list of names that you can address mail to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q
  1. In a spreadsheet, a cell is defined as the_____(a) intersection of a file and a database(b) intersection of a table and a tuplet(c) intersection of a row and column(d) intersection of a field and a record(e) None of these
A

(c)Explanation: (c) In any spreadsheet program such as Excel, each rectangular box in a worksheet is referred to as a cell. A cell is the intersection point of a column and a row. Data entered into Excel is always stored in a cell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q
  1. The most popular Internet activity is______ COMPUTER 17 SET(a) watching movie trailers(b) downloading music(c) shopping for books(d) e-mailing(e) None of these
A

(d)Explanation: (d) Sending and Receiving emails is the most popular activity on Internet. Almost 92% users of Internet send & receive emails. It is then followed by 89% of users who use search engines to find information on internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q
  1. The keys labelled 0-9 on the keyboard are called______(a) Numeric keys(b) Function keys(c) Typewriter keys(d) Special keys(e) Alpha keys
A

(a)Explanation: (a) A numeric keypad refers to a section of a computer keyboard with numbered keys from 0 to 9 (called numeric keys) like a calculator. It enables you to enter numbers quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q
  1. A terminal that cannot process any information is called______(a) Intelligent terminal(b) Direct access terminal(c) Smart terminal(d) Blind terminal(e) Dumb terminal
A

(e)Explanation: (e) Traditionally, users connect to a mainframe using a terminal which allowed them to input request to the mainframe. The mainframe would then handle all the computing before outputing a response. These terminals are called dumb-terminals because they had no data processing abilities of their own, they were simply windows through which users could access the mainframe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q
  1. Which of the following is an Operating System ?(a) Mac(b) MS Windows(c) MS DOS(d) Windows NT(e) All of the above
A

(e)Explanation: (e) Windows NT/MS DOS belong to the family of Microsoft (MS) windows operating systems. Microsoft windows is a series of of graphical user interface operating systems developed marketed and sold by Microsoft. Similarly, Mac operating system is developed, marketed and sold by Apple Macintosh.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q
  1. A______contains buttons and menus that provide quick access to commonly used commands.(a) menu bar(b) toolbar(c) window(d) find(e) None of these
A

(b)Explanation: (b) A toolbar is a graphical presentation of commands optimized for efficient access.Toolbars can be more efficient than menu bars because they are direct (always displayed instead of being displayed on mouse click); immediate (instead of requiring additional input) and contain the most frequently used commands (instead of comprehensive list). They are quick and convenient. For eg. a formatting toolbar in Microsoft Excel or word would give the user access to functions such as making text bold, aligning text or other commonly used formatting buttons,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q
  1. Programs designed specifically to address general-purpose applications and special-purpose applications are called_____.(a) system software(b) operating system(c) application software(d) management information systems(e) None of these
A

(c)Explanation: (c) Software can be divided into a categories- System software and application software. Application software refers to programs designed to make users more productive and/or assist them with personal taskes. They can further divided into- General purpose applications (basic applications which are widely used in nearly every discipline & occupation, eg. browsers, word processors, spreadsheets, DBMS, presentation graphics) and special purpose applications (advanced applications which narrowly focused on specific disciplines and occupations. eg. graphic programs, Audio/video editor, multimedia creator, virtual reality, etc).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q
  1. A file that contains definitions of the paragraph and character styles for your document and all things you customised like toolbars and menus is called a_____(a) pattern(b) guide(c) base document(d) template(e) None of these
A

(d)Explanation: (d) A template is a tool for enforcing a standard layout and look and feel across multiple pages or within content regions. When you change a template, any pages or regions that are based on that template are automatically changed as well. It is something which is pre-formatted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q
  1. A_______is a design tool that graphically shows the logic in a solution algorithm.(a) hierarchy chart(b) flowchart(c) structure chart(d) context diagram(e) None of these
A

(b)Explanation: (b) To help document a solution algorithm, programmers use design tools. Two structured design tools are program flowchart and psuedocode. A program flowchart (or simply flowchart) graphically shows the logic in a solution algorithm. ANSI published a set of standards for flowcharts in the early 1960s. These standards specify symbols for various operations in a Program’s logic eg. is a decision symbol. It signifies the condition that determines a specified path to follow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

“655. ““GUI”” stands for_____(a) Graphical User Interface(b) Gnutella Universal Interface(c) Graphic Uninstall/Install(d) General Utility Interface(e) None of these”

A

(a)Explanation: (a) GUI (Graphical User Interface) is a type of user interface that allows to interact with electronic devices through graphical icons and visual indicators such as secondary notation, as opposed to text based interfaces, typed command lables or text navigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q
  1. Example of non-numeric data is(a) Examination score(b) Employee address(c) Bank balance(d) All of the above(e) None of these
A

(b)Explanation: (b) Non-numeric data is any form of data that is measured in non-number (or word) form. It makes use of symbols and letters. Such data can only be identified in a word format. eg. Employee address, date of birth, name, etc. Numeric data comprises of numbers on which calculations can be performed eg. age, bank balance, Examination score, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q
  1. The ability of an OS to run more than one application at a time is called(a) object-oriented programming(b) multitasking(c) multi-user computing(d) time-sharing(e) None of these
A

(b)Explanation: (b) Multitasking refers to the ability to execute more than one task (or program) at the same time. In multitasking, only one CPU is involved, but it switches from one program to another so quickly that it gives the appearance of executing all of the programs at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q
  1. When you want to move some text from one page to a different page, the best method is______(a) cut and paste(b) drag and drop(c) delete and retype(d) find and replace(e) None of these
A

(a)Explanation: (a) In word processing, block of text are moved from one place to another by cutting and pasting. When you cut a block of text, the word processor removes the block from your file and place it in a temporary holding area (buffer) called as clipboard. You can then paste the block of text in the buffer to another file or part of document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

“659. A computer cannot ““boot”” if it does not have the_______(a) Loader(b) Compiler(c) Operating System(d) Assembler(e) None of these”

A

(c)Explanation: (c) Booting refers to loading the first piece of software that starts a computer. Because the operating system is essential for running all other programs, it is usually the first piece of software loaded during the boot process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q
  1. A CPU contains ________(a) an analytical engine and a control unit(b) a card reader and a printing device(c) a control unit and an arithmetic logic unit(d) an arithmetic logic unit and a card reader(e) None of these
A

(c)Explanation: (c) A CPU consists of 2 parts- Arithmetic Logic Unit (ALU) which performs arithmetic operations like addition, multiplication, division, subtraction and logical comparisons like greater than, less than, equal to, etc. and Control Unit (CU) which directs and co-ordinates most of the operations in the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q
  1. Which of the following peripheral devices displays information to a user ?(a) Keyboard(b) Monitor(c) Secondary storage devices(d) Secondary storage media(e) None of these
A

(b)Explanation: (b) A computer monitor is an output device that displays the result of the processing to the user on display or screen of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q
  1. ____ represents raw facts, whereas ____ is data made meaningful.(a) Data, information(b) Information, reporting(c) Information, bits(d) Records, bytes(e) Bits, bytes
A

(a)Explanation: (a) Data is raw, unorganized facts that needs to be processed. Data can be something simple or seemingly random and useless until it is organized. When data is processed, organized, structured or presented in a given context so as to make it useful, it is called information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q
  1. What is the name for the process that is used to convert a series of instructions, or program, written in a high-level language into instructions (or a program) that can be run on a computer ?(a) Compiling(b) Assembling(c) Translating(d) Uploading(e) None of these
A

(a)Explanation: (a) Compiling is the process of translating a source program written in some high-level programming language (such as C, C++, Java) into machine code for some computer architecture (such as Intel Pentium Architecture). The generated machine code can be executed later many times against different data each time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q
  1. What characteristic of read-only memory (ROM) makes it useful ?(a) Data in ROM is nonvolatile, that is, it remains there even without electrical power(b) ROM information can be easily updated(c) ROM provides very large amounts of inexpensive data storage(d) ROM chips are easily swapped between different brands of computers(e) None of these &
A

“(a)Explanation: (a) ROM (Read Only Memory) is a ““built-in”” memory that is capable of holding data and having that data or read from the chip, but not written to. Data is prepressed on ROM chip by manufacturer. Unlike RAM, ROM retains its contents even when the computer is turned off ROM is referred to as being non-volatile whereas RAM is volatile.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q
  1. Coded entries which are used to gain access to a computer system are called(a) Passwords(b) Entry codes(c) Security commands(d) Codewords(e) None of these
A

(a)Explanation: (a) A password is a secret word or string of characters used for user authentication to prove identify or access approval to gain access to a resource. (eg. a software; website on World Wide Web, etc); which should be kept secret from those not allowed access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q
  1. .bas, .doc. and . htm are examples of(a) Extension(b) Database(c) Domain(d) Protocol(e) None of these
A

(a)Explanation: (a) A filename extension is a suffix (separated from the base filename by a dot or space) to the name of a computer file applied to indicate the encoding (file format) of its contents or usage. eg, .bar, .doc, .htm, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q
  1. Which of the following displays the contents of active cell?(a) Menubar(b) Toolbar(c) Namebox(d) Formula bar(e) None of these
A

(d)Explanation: (d) The formula bar in Excel is located above the work area of the spreadsheet. It displays the data or formula stored in the active cell. The formula bar can be used to enter or edit a formula, a function, or data in a cell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q
  1. Which of the following terms is used to describe the movement of an item with the help ofmouse to a new position on screen ?(a) double clik(b) clik(c) drag and drop(d) point(e) right clik
A

(c)Explanation: (c) In computer graphical user interface, drag and drop is a pointing device gesture which allows you to drag objects to specific location on the screen to perform actions on them, eg. in Macintosh environment, you can drag a document to the trash can icon to delete it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q
  1. Which type of resource does have greater probability to become shared resource in a computer network ?(a) Speakers(b) Printers(c) Floppy Disc Drivers(d) Keyboards(e)None of these
A

(b)Explanation: (b) A shared resource typically refers to a hardware or software resource that can be accessed by one or more remote systems over a network. Hardware devices such as printers and scanners are often set up on a network for use by numerous users in an organization. Printer acts as a shared resource for a set number of computers, allowing users to send documents to the print queue, which would then send those documents to the printer. This allows multiple users to share a single or more printers on a network. This is cost-effective as printers are expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q
  1. When we move any row or column, the text of moved cells(a) remains at its place but formatting moves(b) moves with the cell(c) moves with cells and formatting is lost(d) moves with cells and some formatting are changed(e) None of these
A

(b)Explanation: (b) When you move or copy rows and columns, microsoft office Excel moves or copies all data that they contain, including formulas and their resulting values, comments, cell formats and hidden cells. You can use the cut command or copy command to move or copy selected rows and columns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q
  1. In shell programming, which of the following command is used for character translation?(a) dd(b) tr(c) grep(d) sed(e) None of these
A

(b)Explanation: (b) The tr command copies the given input to produce the output with substitution or deletion of selected characters. tr abbreviated as translate or transliterate. It takes as parameters two sets of characters, and replaces occurences of the characters in the first cell with the corresponding elements from the other set i.e, it is used to translate characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q
  1. In a computer network, a computer that can control a group of other computers for sharing information as well as hardware utilities is known as(a) Hub(b) Client(c) Switch(d) Server(e) Control Panel
A

(d)Explanation: (d) A network server is a computer designed to process requests and deliver data to other (clients) computers over a local network or the Internet. Server is the most powerful computer in the network. It manages network resources on the network. They are configured with additional processing, memory and storage capacity to handle the load of serving clients. eg. Web servers, Proxy servers, FTP servers, Online game servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q
  1. In order to move from one worksheet to another in excel workbook, one should clik(a) Scroll bar(b) Active cell(c) Sheet tab(d) Tab button(e) None of these
A

(c)Explanation: (c) A sheet tab appears at the bottom of the worksheet. It has the name of the worksheet on it. It is used for navigating between worksheets quickly. By default, in Excel there are three worksheets per file. Switching between worksheets is done by clicking on the sheet tab.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q
  1. _____, a printed information, exists in real sense and is more permanent from of out put than the output existing on display device.(a) Carbon copy(b) Soft copy(c) Hard copy(d) Desk copy(e) None of these
A

(c)Explanation: (c) A hard copy is a physical reproduction or representation of the data or information from a computer. Such as printed page or photograph. A hard copy is so-called because it exists as a physical object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q
  1. Saving is the process(a) To change the content of any document(b) To copy document from memory to storage medium(c) To change the display or entire document(d) To develop document by entering text using keyboard(e) None of these
A

(b)Explanation: (b) Saving is the process of copying data from a temporary area to a more permanent storage medium. For eg. when you edit a file with a word processor, the word processor copies the entire file, or portions of the file, into an area of main memory called a buffer. Any changes you make to the file are made to the copy in the buffer not to the real file on the disk. The buffer is temporary-as soon as you exit the program or turn off the computer, the buffer disappears. To record your modifications to the file on the disk, you must save the file. When you do this, the word processor copies the contents of the buffer to the file on the disk, replacing the previous version of the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q
  1. Which bar is usually located below that Title Bar that provides categorized options?(a) Status Bar(b) Menu bar(c) Tool bar(d) Scroll bar(e) None of these
A

“(b)Explanation: (b) A menu bar is a horizontal bar, typically located at the top of the browser or application window below the title bar, containing drop-down menus like File, Edit, Font, Tools, Help that allow the user to interact with the content or application in various ways. For eg. in microsoft word, ““file”” menu provides options to open a file, create a new one, save it, print, etc. ““Edit”” menu allows the user to Copy, Paste, Find and Replace text , etc.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q
  1. The program which takes user input, interprets it and takes necessary action is—(a) System calls(b) Kernel(c) Shell(d) Scheduler(e) None of these
A

(c)Explanation: (c) The shell is an interactive program that gets user input, interprets it and then takes necessary action accordingly. it acts like a command interpreter for the user. As soon as a command is received from a user, the shell looks for a matching intrinsic command and executes it. If it doesn’t find an instrinsic command, it searches for a disk file corresponding to the command and execute it. During this process it substitutes any variables and other commands listed in the command line. It also handles I/ O redirection and can execute batch files containing other UNIX commands and control structures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q
  1. Dialogue control is a function of the ____ layer.(a) Session(b) Transport(c) Presentation(d) Application(e) None of these
A

(a)Explanation: (a) Session establishment, maintenance & termination; Session support and dialog control are functions of a session layer of OSI model. Dialog control determines which device will communicate first and the amount of data that will be sent. The types of dialog control that can takes place include simplex, half duplex and full duplex.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q
  1. In a network with 25 computers, which topology would require the more extensive cabling ?(a) Star(b) Mesh(c) Bus(d) Ring(e) None of these
A

(b)Explanation: (b) In a mesh topology, each device is connected to another device in a network. It is a way of interconnecting devices on a network. eg. if there are N devices each devices will have (N-1) connections to get to every other devices. So, in a work this 25 computers, each computer will be connected other using 24 cables. Which will represent most extensive cabl ing structure when compared with other topologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q
  1. Which UNIX command would append a file called test to the end of a file called output ?(a) Append output&raquo_space; test(b) Cat output&raquo_space; test(c) Write output&raquo_space; text(d) Cat text&raquo_space; output(e) None of these
A

(d)Explanation: (d) The cat command reads one or more files and prints them to standard output. The operator > can be used to combine multiple files into one. The operator&raquo_space; can be used to append (add data) to an existing file. eg. Cat file 1» file 2 will append (add) the contents of file 1 to file 2 at the end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q
  1. A _______ is a microprocessorbased computing device.(a) mainframe(b) personal computer(c) workstation(d) server(e) None of these
A

(b)Explanation: (b) A personal computer (PC) is a microprocessor based computing device that enables manufacturers to put an entire CPU on one chip. It is designed to meet the computing needs of an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q
  1. An area of a computer that temporarily holds data waiting to be processed is __________.(a) Memory(b) CPU(c) Storage(d) File(e) None of these
A

(a)Explanation: (a) Memory refers to an area within a cmputer system that holds data writing to be processed by CPU. Example of processing include performing calculations, sorting lists of words or numbers, modifying documents and pictures according to user instructions and drawing graphs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q
  1. C, BASIC, COBOL, and Java are examples of _________languages.(a) Computer(b) low-level(c) System programming(d) High-level(e) None of these
A

(d)Explanation: (d) C, BASIC, COBOL are all high level languages which can easily by understood by humans. They use English like statements for programming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q
  1. RAM can be thought of as the ____ for the computer’s processor.(a) operating room(b) factory(c) waiting room(d) planning room(e) None of these
A

“(a)Explanation: (a) RAM (Random Access Memory) or computer’s main memory is called as ““Operating room”” or ““Working memory”” of the computer as it stores data and programs that CPU is currently running. RAM hold the programs and data on temporary basis i.e, as soon as the computer is switched off, this gets lost.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q
  1. The instructions that tell a computer how to carry out the processing tasks are referred to as computer __________.(a) processors(b) programs(c) input devices(d) memory modules(e) None of these
A

(b)Explanation: (b) A computer program is a sequence of instructions, written to perform a specified task with a computer. A computer requires programs to function, typically executing the program’s instructions in a central processor. The series of instructions when executed, causes the computer to behave in a predetermined manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q
  1. A set of computer programs that helps a computer monitor itself and function more efficiently is a/an __________.(a) System Software(b) Windows(c) DBMS(d) Application Software(e) None of these
A

(a)Explanation: (a) System software is a set of programs that control or maintain the operation of the computer and its device. System software saves as the interface between the user, the application software and the computer’s hardware. Two types of system software are the operating system and utility programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q
  1. Data becomes ______ when it is presented in a format that people can understand and use.(a) graphs(b) processed(c) information(d) presentation(e) None of these
A

(c)Explanation: (c) Data is raw, unorganized facts that needs to be processed. Data can be something simple or seemingly random and useless until it is organised. When data is processed, organised, structured or presented in a given context so as to make it useful, it is called information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q
  1. An email account includes a storage area, often called a (n) ____.(a) hyperlink(b) attachment(c) mailbox(d) IP address(e) None of these
A

(c)Explanation: (c) A mailbox refers to an area in memory or a storage device where email is placed. In email system, each user has a private mailbox, when the user receives email, the email system automatically puts it in the mail box.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q
  1. The term ___________ designates equipment that might be added to a computer system to enhance its functionality.(a) system add-on(b) digital device(c) disk pack(d) peripheral device(e) None of these
A

(d)Explanation: (d) A peripheral device (or auxiliary device) is a hardware device that allows a computer to perform an additional function, but it is not something the computer needs in order to work. It includes inputdevices such as keyboard, mouse, etc; Output devices such as monitor, printer, etc; and storage devices such as hard disk; floppy disk, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q
  1. You use a(n) _______, such as a keyboard or mouse, to input information.(a) input device(b) Output device(c) storage device(d) processing device (e) None of these
A

(a)Explanation: (a) Input devices refers to those peripheral devices that allow data and instructions to enter a computer. eg. keyboard, mouse, scanner. Input devices translate data from human understandable form into machine readable form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q
  1. A _______ is an additional set of commands that the computer displays after you make a selection from the main menu.(a) submenu(b) dialog box(c) menu selection(d) All of the above(e) None of these
A

(a)Explanation: (a) A sub menu is a secondary menu that appears which you are holding the cursor over an item on the primary menu. In other words, a sub menu is an additional list of options within a single menu selection. There can be many levels of sub menus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q
  1. One thousand bytes is a _____(a) megabyte(b) kilobyte(c) gigabyte(d) terabyte(e) None of these
A

(b)Explanation: (b) A KB (kilobyte) is a unit of memory or data which is equal to 210 bytes or 1,024 bytes which is approximately equal to 1,000 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q
  1. A_____converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file.(a) compiler(b) converter(c) interpreter(d) instruction(e) None of these
A

(a)Explanation: (a) A compiler is a piece of code that translates the high level language (source code) into machine language (object code). The compiler scans the entire program first and then translates it into machine code which will be executed by the computer processor and the corresponding tasks will be performed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q
  1. The ______ is the amount of data that a storage device can move from the storage medium to the computer per second. COMPUTER LITERACY & MODEL PRACTICE(a) data digitizing rate(b) data migration rate(c) data transfer rate(d) data access rate(e) None of these
A

(c)Explanation: (c) The speed of a secondary storage device is measured by its access time and data transfer rate. Data transfer rate is the amount of data that can be transferred between main memory and a storage device per second (units-bps). The higher the data transfer rate, the faster the reading/writing process is. Whereas, data access time is the average time taken for the device to search and read the required data on the storage medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

“695. ______ is the ability of a device to ““jump”” directly to the requested data.(a) Random access(b) Sequential access(c) Quick access(d) All of the above (e) None of these”

A

(a)Explanation: (a) Random (or Direct) access refers to the ability to access data at random. For eg. to go from point ‘A’ to point ‘Z’, you must pass through all intervening points (i.e, ‘A’ through ‘Y’) in a sequential access. Whereas, in a random access system, you can jump directly to point ‘Z’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q
  1. Computers manipulate data in many ways, and this manipulation is called ______.(a) processing(b) upgrading(c) batching(d) utilising(e) None of these
A

(a)Explanation: (a) The computer performs useful operations manipulating the data in many ways. This manipulation is called processing. examples of processing include performing calculations, sorting lists of words or numbers, modifying documents and pictures according to user instructions, and drawing graphs. A computer process data in the CPU which perform arithmetic and logic calculations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q
  1. A(n)______is software that helps a computer control itself to operate efficiently and keep track of data.(a) hardware system(b) application system(c) software system(d) operating system(e) None of these
A

(d)Explanation: (d) Operating system is a software that controls the operation of a computer, directs the input & output of data, keep track of files and controls the processing of computer programs. Its role include managing the functioning of the computer hardware, running the application programs, serving as an interface between the computer and the user and allocating computer resources to various functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q
  1. The ALU performs ______ operations.(a) ASCII(b) arithmetic(c) algorithm-based(d) logarithm-based(e) None of these
A

(b)Explanation: (b) An arithmetic operation refers to a mathematical operation involving numbers. There are four primary arithmetic operations a computer program can perform. These are addition, subtraction, multiplication division. They form the basis for determining the outcome of calculated numbers. All arithmetic operations are carried out in Arithmetic Logic Unit (ALU) of a computer’s processor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q
  1. ________ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.(a) Multithreading(b) Multitasking(c) Multiprocessing(d) Multicomputing(e) None of these &
A

(b)Explanation: (b) Multitasking refers to the ability to execute more than one task (or program) at the same time. In multitasking, only one CPU is involved, but it switches from one program to another so quickly that it gives the appearance of executing all of the programs at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q
  1. Information kept about a file includes ______.(a) deletion date(b) print settings(c) (b) & (a) only(d) Size(e) None of these
A

(d)Explanation: (d) To be useful, a file must be kept with some information on its contents : name, date, size, etc.Q701. A group of related records in a database is called a(n):(a) column.(b) table.(c) object.(d) key.(e) None of these (d)Explanation: (d) A record is a group of related fields, eg. in a database of doctor’s patient, each patient would be separate record (rows), with fields (columns) for ‘firstname’ ‘surname’, ‘date of birth’, ‘address’ ‘allergies’, etc.

197
Q
  1. A group of related fields in a database is called a(n):(a)memo.(b) object.(c) table.(d) record.(e) None of these
A

(d)Explanation: (d) A field consist of grouping of characters. A data field represents an attribute (a characteristic or quality) of some entity (object)/person/place/ event). They are distinct items that do not have wide implications in the given situation. Whereas a record represents a collection of attributes that describe a real world entity.

198
Q
  1. A telephone number would be stored in a____________ field in a database.(a) memo(b) text(c) computed(d) date(e) None of these
A

(d)Explanation: (d) A telephone number and address would be stored in text or alpha numeric field in a database. A field of this data type will accept both numbers and text. When you enter numbers into text fields, they get sorted as if they are words and could not be used for any calculations.

199
Q
  1. In a database, _____ fields store numbers used to perform calculations.(a) key(b) next(c) alphanumeric(d) numeric(e) None of these
A

(d)Explanation: (d) In a database, you data types to specify the type of data each field can capture. You can enter numbers into the number (numeric) field and then average, sum or perform other calculations with the numbers, eg. you can assign a Test score field a data type of number.

200
Q
  1. Each field in a database is identified by a:(a) field name.(b) key name.(c) field type.(d) field code.(e) None of these
A

(a)Explanation: (a) A table is a set of columns and rows. The columns are called as fields. Each column reads a heading to identify the data it contains. These headings are called as field names. No two columns (or fields) can have the same name. Field names are used to ensure that the data for each record is entered in the same sequence.

201
Q
  1. The physical layer is concerned with transmission of ____ over the physical medium.(a) Dialogs(b) Programs(c) Protocols(d) Bits(e) None of these
A

(d)Explanation: (d) The physical layer, lowest layer, in the OSI model is concerned with the transmission and reception of the unstructured raw bit stream (rather than logical data packets) over a physical medium. The bit stream may be grouped into code words or symbols and converted to a physical signal that is transmitted over a hardware transmission medium.

202
Q
  1. _____ is the concept of sending extra bits for use in error detection.(a) Redundancy(b) Check(c) Checksum fault(d) Detection(e) None of these
A

(a)Explanation: (a) Redundancy allows a receiver to check whether received data was corrupted during transmission. So that he can request a retransmission. Redundancy is the concept of using extra bits for use in error detection. The redundant bits are added by sender and removed by the receiver. Instead of repeating the entire data stream, a shorted group of bits may be appended to the end of each unit. This technique is called redundant because the extra bits are redundant to the data : they are discarded as soon as the accuracy of the transmission has been determined.

203
Q
  1. AM and FM are examples of ____ modulation.(a) digital to analog(b) digital-digital(c) analog to analog(d) analog to digital(e) None of these
A

(c)Explanation: (c) In analog modulation, the modulating signal and carrier both are analog signals. Analog-to-analog conversion is the representation of analog information by an analog signal. There are 3 types of analog-to-analog modulation :- Amplitude modulation (AM); Frequency modulation (FM); and these modulation (PM).

204
Q
  1. Which of the following is used to answer a question about a database ?(a)Module(b) Form(c) Query(d) Table(e) None of these
A

“(c)Explanation: (c) A database query is a piece of code (query) that is sent to a database in order to get information back from the database. It is used as a way of retrieving the information from database. A database query is basically a ““question”” that you ask the database. The result of the query is the information that is returned by DBMS. Queries are the written using SQL (Structured Query Language).”

205
Q
  1. Which of the following is not done by modem?(a) Data Accuracy(b) Transmission speed(c) Error detection and correction(d) Data compression(e) None of these
A

(a)Explanation: (a) A modem is a device used to allow a computer to communicate over a telephone line. A modem is characterized by - • Transmission speed : the speed at which data can be transmitted over a telephone line. This has increased steadily. Modern modems can operate at speeds upto 56.6 kbps. • Compression : Date can be transferred between two computers more quickly if it is compressed before it is transmitted. Modem compress data connected to sending computer and decompress data connected to receiving computer. • Error correction & Detection : When data is sent over a telephone line it often encounters noice. Noise is electrical interference which corrupts the data that is received. The modem receiving data, detects whether or not the data has been corrupted. If it has been corrupted the modem will attempt to correct it validation checks such as parity checks or CRC can be used to detect & correct errors

206
Q
  1. The primary key must be a(n) ____________ field.(a) object(b) numeric(c) related(d) unique(e) None of these
A

(d)Explanation: (d) The primary key of a relational table uniquely identifies each record or row in the table. For a table, it enables each record to be unique without ambiguity. That it, it doesn’t allow duplicates. eg.In a table CUSTOMERS, it is difficult to differentiate each on his name. Since homonyms may exist. Therefore it creates a field code-client where each code is unique in designating it as primary key to ensure that every client is different.

207
Q
  1. Program of a computer presented as a sequence of instructions in the form of binary numbers is called ________ language.(a) Assembly(b) Mathematical(c) High Level(d) Machine(e) None of these
A

(d)Explanation: (d) Machine language is a low level programming language that can be directly understood and obeyed by a machine (computer) with conversion (translation). It is the native binary language (comprised of only two characters 0 and 1) of the computer and is difficult to be read and understood by humans.

208
Q
  1. In addition to keying data directly into the database, data entry can be done from a(n):(a) table.(b) input form.(c) field.(d) data dictionary.(e) None of these
A

(b)Explanation: (b) You can enter data directly into the tables in a database. However, you can make the process of entering and working with data much easier and more accurate if you use forms. Three types of forms can be created :- Data entry (or input) forms ; switchboards and custom dialog boxes. You use data entry forms to add data to your database or view, edit and delete existing data.

209
Q
  1. The rectangular pattern of lines of varying width and spaces used for automatic product identification by computer(a) Cost analysis(b) Bar-code(c) Test-code(d) Sensor(e) None of these
A

(b)Explanation: (b) Bar code is a series of parallel vertical lines (bars and space) that can be read by bar code scanners. It is used world wide as part of product packages, as price tags, carton labels, on invoices even in credit card bills. It facilitates unique product identifications through using international symboligies/numbering systems. Promotes brand image and would enable timely and accurate capture of product information.

210
Q
  1. The number of input lines required for a 8 to 1 multiplexes is(a) 8(b) 1(c) 3(d) 256(e) None of these
A

(a)Explanation: (a) If there are ‘n’ selection lines, then the number of maximum possible input lines is 2n and the multiplexer is referred to as 2n - to - 1 multiplexer. So, for 8 to 1 multiplier or 23- to -1 multiplexer, there will be 3 selection lines and 23 = 8 input lines.

211
Q
  1. A generic term that refers to the combination of all commercial transactions executed over electronic media for the exchange of product and services(a) E-shopping(b) E-commerce(c) E-banking(d) EDI(e) None of these
A

(b)Explanation: (b) The buying and selling of products and services by businesses and consumers through an electronic medium, without using any paper documents. E-commerce is widely considered the buying and selling of products over the Internet, but any transaction that is completed solely through electronic measures can be considered ec o m m e r c e .

212
Q
  1. In C++ programming, the extension of program is(a) .cpt(b) .cpp(c) .c(d) .cplus(e) None of these
A

(b)Explanation: (b) File extension. CPP is a C++ Source code file.

213
Q
  1. A ____________ is a large-scale electronic repository of data that is time-variant.(a) knowledge-based system(b) data mine(c) data warehouse(d) decision support system(e) None of these
A

(c)Explanation: (c) A data warehouse is the main repository of the organization’s historical data, its corporates memory. The data warehouse optimized by reporting and analysis. Data in warehouse is time-variant. It means that the change to the data in database are track and recorded so that reports can be produced showing changes over times.

214
Q
  1. Which of the following views would you use to define a table and specify and fields it will contain ?(a) Datasheet view(b) Define view(c) Design view(d) Edit view(e) None of these
A

(c)Explanation: (c) Design view enables you to create your data base tables and specify the columns (fields) and their data types, etc. You can also open existing tables in design view and add, remove or change fields.

215
Q
  1. For locating any document on the WWW, there is a unique address known as(a) E-mail account(b) Domain name(c) Home-page(d) URL(e) None of these
A

(d)Explanation: (d) Every website has a unique address to identify it on World Wide Web. This address is called as website address or Uniform Resource Locator (URL). Like your home address, URL also contains different parts. Domain name in URL is the unique address that identifies the location of the website. eg. http:// www. example.com. Here, example.com is domain name ; http:// is the Protocol used to access this website and www is a sub domain.

216
Q
  1. Which of the following operating systems is not owned and licensed by a company ?(a) Linux(b) Unix(c) Windows 2000(d) Mac(e) Windows
A

(b)Explanation: (b) The UNIX trademark, previously owned by AT & T and then deeded to UNIX Systems Laboratories (USL), an AT & T subsidiary, passed to Novell when it acquired USL. After a brief period of negotiations with rival UNIX vendors, namely sun microsystems, Santa Cruz Operations, IBM, and HP, Novell granted exclusive licensing rights of the UNIX trade mark to X/Open co.ltd, an open systems industry standards branding agent based in the United kingdom.

217
Q
  1. _______are graphical objects used to represent commonly used application.(a) Drivers(b) GUI(c) Windows(d) Application(e) Icons
A

(e)Explanation: (e) A computer icon is a small picture that represents an object or program. When you click icon, the associated object or program will be opened. Icons help in quickly identifying a type of object or programs associated with the icon.

218
Q
  1. Most World Wide Web pages contain commands in the language(a) URL(b) NIH(c) HTML(d) IRC(e) FTP
A

(c)Explanation: (c) HTML (Hyper Text Markup Language) is the main mark up language for creating Web pages and other information that can be displayed in a web browser. HTML is written in the form of HTML elements consisting of tags enclosed in angle brackets (), with the web page content.

219
Q
  1. Computers send and receive data in the form of____ signals.(a) Digital(b) Analog(c) Modulated(d) Demodulated(e) All of these
A

(a)Explanation: (a) The transfer of data in the form of digit is called digital signal or digital data transmission. Digital signal consist of binary digits 0 and 1. Electrical pulses are used to represent binary digits. Data transmission between computers is in the form of digital signals.

220
Q
  1. Speical effect used to introduce slides in a presentation are called(a) Custom animation(b) Effect(c) Transition(d) Animation(e) Preset animation
A

(c)Explanation: (c) Slide transition are the animation- like effects that occur in slide show view when you move from one slide to the next during an on-screen presentation. You can control the speed of each slide transition effect, and you can also add sound. Some examples of slide transition include Boxin, Box out, Blinds horizontal, Blinds vertical, etc.

221
Q
  1. A compiler translates higherlevel programs into a machine language program, which is called(a) object code(b) source code(c) compiled code(d) beta code(e) None of these
A

(a)Explanation: (a) The object code is the output of a compiler after it processes source code. Source code is the version of a computer program as it is originally written (i.e typed into a computer) by a human in a high level programming language. A compiler is a program that converts source code into object code. The object code is usually a machine code, also called a machine language, which can be understood directly by a specific type of CPU.

222
Q
  1. Checking that a pin code number is valid before it is entered into the system in an example of(a) backup and recovery(b) error correction(c) data preparation(d) data validation(e) None of these
A

(d)Explanation: (d) When user enter data in an application, it is necessary to verify that the data is validbefore the application uses. This is called Data validation. Data validation may require that certain text fields not be zero length, that a field is formatted as a telephone number or other type of well-formed data, or that a string not contain any unsafe character that could be used to compromise the security of a database.

223
Q
  1. Every component of your computer is either(a) hardware or software(b) software of CPU/RAM(c) application software or system software(d) input devices or output devices(e) None of these
A

(a)Explanation: (a) The components of a computer system can be broadly classified into : • Hardware : the physical components that can be seen and touched, eg. Mouse, Monitor, Motherboard, etc. • Software : a set of instructions that tells the computer what to do.

224
Q
  1. Which is the slowest internet connection service?(a) T1(b) Digital Subscriber Line(c) Cable modem(d) Leased Line(e) Dial-up Service
A

(e)Explanation: (e) Dial up internet service is a service that allows connectivity to the internet through a standard telephone line. By connecting the telephone line to the modem in the computer and inserting the other end into the phone jack, and configuring the computer to dial a specific number provided by your ISP you are able to access the internet on your computer. Dial up internet service is cheapest internet service. Also, it is the slowest type of access you can get. Since the bandwidth is limited it will take some time for the modem to send & receive information.

225
Q
  1. In any window, the maximize button, the minimize button and the close buttons appear on(a) Menu bar(b) The title bar(c) Status bar(d) Ruler bar(e) Tool bar
A

(b)Explanation: (b) Title bar is located along the top of window or a dialog box that displays the name of the window or software program being used. On the right hand side of title bar, maximize, minimize and close button appears.

226
Q
  1. The two major categories of software include(a) personal productivity and system(b) operating system and utility(c) system and application(d) system and utility(e) None of these
A

(c)Explanation: (c) Softwares can broadly categorized into system software and application software. System software consists of programs that control or maintain the operations of the computer and its devices. Two types of system software are operating system and utility programs. Application software consist of programs designed to make users more productive and/ or assist them with personal tasks. These can be classified into general purpose and special purpose application softwares.

227
Q
  1. A CD-RW disk(a) is a form of optial disk, so it an only be written once(b) has a faster access than an internal disk(c) holds less data than a floppy disk(d) can be erased and rewritten(e) None of these
A

(d)Explanation: (d) CD-RW (Compact Disc, rewriteable) is a compact disc format that allows repeated recording on a disc. with CDRW drives and disks, you can treat the optical disks just like a floppy or hard disk, writing data on it multiple times.

228
Q
  1. Computers connected to a LAN (Local Area Network) can(a) go on line(b) run faster(c) share information and/or share peripheral equipment(d) E-mail(e) None of these
A

(c)Explanation: (c) A LAN (Local Area Network) is a group of computers that are connected in a localized area, usually in the same building (home/office/ building/campus) to communicate with one another and share resources such as printers, faxes, etc.

229
Q
  1. The ability to find an individual item in a file immediately(a) file allocation table(b) sequential access(c) direct access(d) directory(e) None of these
A

(c)Explanation: (c) Random (or Direct) access refers to the ability to access data at random. For eg. to go from point A to point Z, you must pass through all intervening points in a sequential access. Whereas, in a random access system, you can jump directly to point Z.

230
Q
  1. The keyboard shortcut to restart your computers is(a) Ctrl + F4(b) Alt + F4(c) Ctrl + Alt + Del(d) Alt + Del(e) None of these
A

“(c)Explanation: (c) In a personal computer with the windows operating system, Ctrl + Alt + Delete is the combination of keyboard keys that the computer user can press at the same time to terminate the ““hung”” application and, if that doesn’t work, to reboot the operating system (i.e, have it shutdown and restart itself). This is called as warm boot.”

231
Q
  1. Each box is a spreadsheet is called a(a) empty space(b) cell(c) record(d) field(e) None of these
A

(b)Explanation: (b) In a spreadsheet program such as Excel, each rectangular box in a worksheet is referred to as a cell. A cell is the intersection point of a column and a row. Data entered into Excel is always stored in a cell.

232
Q
  1. To take information from one source and bring it to your computer is referred to as(a) download(b) upload(c) transfer(d) de-link(e) None of these &
A

(a)Explanation: (a) To download means to receive data to a local system from a remote system or to initiate such a transfer, Examples of a remote system from which a download might be performed include a web server, FTP server, email server, etc. A download can mean either any file that is offered for downloading or that has been downloaded, or the process of receiving such a file.

233
Q
  1. A program that works like a calculator for keeping track of money and making budgets(a) scholastic(b) calculator(c) keyboard(d) spreadsheet(e) None of these
A

(d)Explanation: (d) Documenting incomes & expenses is one of the most important steps towards managing money. Spreadsheet programs like Microsoft Excel, iwork Numbers, open office .org Calc helps to prepare budget spreadsheets that are used to keep track of income & expenses.Q739. Information on a computer is stored as(a) digital data(b) analog data(c) modem data(d) watts data(e) None of these (a)Explanation: (a) Computer information is digital. This means that it is made up of discrete, countable units (digits) and can be subdivided as opposed to analog information, which continuously varies over a range of values. Computers store and process information in a digital format but human process and store only analog information. By reducing information to digits, it can be used more efficiently by computers.

234
Q
  1. Windows 95, Windows 98 and Windows NT are known as(a) domain names(b) processors(c) modems(d) operating systems(e) None of these
A

(d)Explanation: (d) Windows 95/98/NT belong to the family of microsoft windows operating system. Microsoft windows is a series of graphical interface operating systems developed, marketed and sold by Microsoft.

235
Q
  1. Which is the best definition of a software package ?(a) A set of computer programs used for a certain function such as word processing(b) An add-on for your computer such as additional memory(c) A protection you can buy for a computer(d) The box, manual and licence agreement that accompany commercial software(e) None of the above
A

(a)Explanation: (a) A software package is a set of computer programs for performing some specific function or calculation which is useful to more than one computer user and is sufficiently well documented to be used without modification on a defined cofiguration of some computer system.

236
Q
  1. An example of a telecommunictions device is a(a) mouse(b) keyboard(c) printer(d) modem(e) None of the above
A

(d)Explanation: (d) A modem is a hardware communication device that enables a computer to send or receive information over telephone lines by converting the digital data used by computer into an analog signal used on phone lines and then converting it back once received on the other end.

237
Q
  1. A Website address is a unique name that identifies a specific _______ on the web.(a) PDA(b) Web browser(c) Web site(d) link(e) None of these
A

(c)Explanation: (c) Every website has a unique address to identify it on World Wide Web. This address is called as website address or Uniform Resource Locator (URL). Like your home address, URL also contains different parts. Domain name in URL is the unique address that identifies the location of the website. eg. http:// www example.com. Here, example.com is domain name ; http:// is the protocol used to access this website and www is a subdomain.

238
Q
  1. ________ are distinct items that don’t have much meaning to you in a given context.(a) Data(b) Fields(c) Queries(d) Properties(e) None of these
A

(b)Explanation: (b) A field consists of grouping of characters. A data field represents an attribute (a characteristic or quality) of some entity (object/person/ place/event). They are distinct items that do not have wide implications in the given situation. Whereas a record represents a collection of attributes that describe a real world entity. A record consists of field, with each field describing an attribute of the entity.

239
Q
  1. To indent the first paragraph of your report, you should use this key(a) return key(b) space bar(c) tab key(d) shift key(e) None of these
A

(c)Explanation: (c) You can indent the first line in the first paragraph of an essay, report, book chapter or any other type of writing using a tab key. This set the paragraph apart visually, and signals that it is the first of a series of paragraphs. If you want to indent the entire paragraph, use the increase indent tool on the toolbar.

240
Q
  1. Data and Time are available on the desktop at(a) My Computer(b) Taskbar(c) Recycle Bin(d) Only (a) and (c)(e) None of these
A

(b)Explanation: (b) The notification area of the Toolbar is where you usually see the current time and date displayed. It also displays clock and calender.

241
Q
  1. Which of the following you could do to remove a paragraph from a report you had written ?(a) Highlight and delete(b) Delte and edit(c) Cut and paste(d) Undo typing(e) None of these
A

(a)Explanation: (a) To remove a paragraph from a word document, simply highlight the paragraph (using a mouse or keyboard) you want to remove and then press DELETE key.

242
Q
  1. A blinking symbol on the screen that shows where the next character will appear is a/an(a) arrow key(b) delete key(c) cursor(d) return key(e) None of these
A

(c)Explanation: (c) A cursor refers to a movable indicator on a computer screen idendifying the point that will be affected by input from the user.

243
Q
  1. You can start Microsoft Word by using_______ button.(a) Start(b) New(c) Program(d) Control Panel(e) None of these
A

(a)Explanation: (a) The start button in Microsoft windows launches the start menu, which is the main access point to both the user programs that are installed on the system and the system resources which control the behaviour of OS. Microsoft word can be started from the list of all program on start menu.

244
Q
  1. You cannot link Excel worksheet data to a Word document(a) with the hyperlink(b) with the right drag method(c)with the copy and paste special commands(d) with the copy and paste buttons on the standard commands(e) All of the above
A

(a)Explanation: (a) You can link excel worksheet data to a word document by inserting a link to an Excel Worksheet in Word document. To do this, open both Word document & Excel worksheet, copy the cells fromExcel, in Word document position your cursor where you want to insert table. On edit menu, select paste special, click paste link radio button. Under the label AS : select Microsoft Excel worksheet object, click Ok. Also, you can use drag and drop to embed excel worksheet data in a word document. This can be done using Ctrl key.

245
Q
  1. Microcomputer hardware consists of three basic categories of physical equipment(a) system unit, input/output, memory(b) keyboard, monitor, hard drive(c) system unit, input/output, secondary storage(d) system unit, primary storage, secondary storage(e) None of these
A

(c)Explanation: (c) The physical equipment (or hardware) of a microcomputer computer falls into 4 basic categories : • System unit : two important components are microprocessor and memory. • Input/Output : Input devices like keyboard, mouse, etc. and output devices like monitor, printer, etc. • Secondary storage - eg. hard disk, optical disk, floppy disk, etc. • Communication - eg. modem. Using it, makes the computer communicate with other computers around the world.

246
Q
  1. In Excel, Chart are created using which option ?(a) Pivot Table(b) Chart Wizard(c) Pie Chart(d) Bar Chart(e) None of these
A

“(b)Explanation: (b) A chart wizard found in the Microsoft Excel program takes users step-by-step through the process of creating a chart in Microsoft Excel. The chart wizard is accessible on the ““Insert”” menu, then you choose ““chart’.”

247
Q
  1. ________is the process of finding errors in software code.(a) Compiling(b) Debugging(c) Interpreting(d) Testing(e) None of these
A

(b)Explanation: (b) Debugging is the process of locating and fixing the errors (bugs) or defects in the software program. Bugs may include coding errors, design errors, complex interactions, poor user interface design and system failures.

248
Q
  1. You click at B to make the text(a) underlined(b) Italics(c) Italics and Underlined(d) Bold(e) None of these
A

“(d)Explanation: (d) Ctrl + ““B”” is the keyboard shortcut for making the entire text bold in a document.”

249
Q
  1. A directory within a directory is called(a) Junior Directory(b) Mini Directory(c) Part Directory(d) Sub Directory(e) None of these
A

(d)Explanation: (d) A subdirectory is a directory within another directory or a folder within a ALL directories can become a subdirectory except for the master directory, which is typically referred to as the root directory or the parent directory.

250
Q
  1. A_______ contains specific rules and words that express the logical steps of an algorithm.(a) programming structure(b) programming language(c) syntex(d) logic chart(e) None of these
A

(b)Explanation: (b) A programming language is a formal language designed to communicate instructions to a machine; particularly a computer. It can be used to create programs that control the behaviour of a machine and/or express algorithms precisely. The description of a programming language is usually split into the two components of syntax (form) and semantics (meaning). Understand How People Can Triumph In The Face Of Adversity Learn Where The Most Successful Find The Best Opportunities in Life Price : 195

251
Q
  1. What is equipment used to capture information and commands?(a) Input device(b) Output device(c) Storage device(d) Telecommunication device(e) None of these
A

(c)Explanation: (c) Input devices are peripheral devices that are used to enter data in the form of numbers, letters, symbols, image, commands into the computer for future processing. For. eg. keyboard, mouse, scanner, microphone, etc.

252
Q
  1. For creating a document, you use____________ command at File Menu.(a) Close(b) Open(c) New(d) Save(e) None of these
A

(c)Explanation: (c) • New command under File menu creates/opens a new, empty, text window (document) or spreadsheet. • The open command opens an existing file into a new window. • Close command closes the current window. • Save command saves the current window into a file. If the window is already associated with a file, the contents are saved to that file.

253
Q
  1. A______ contains buttons and menus that provide quick access to commonly used commands.(a) menu bar(b) tool bar(c) window(d) find(e) None of these
A

(b)Explanation: (b) A toolbar is a row of boxes, often at the top of an application window that controls various functions of the software. The boxes often contain images that correspond with the function key they control. It provides a quick access to functions that are commonly performed within the program. For eg. formatting toolbar provides quick access to bold, italics, align, font, etc. functions.

254
Q
  1. Which of the following is not a common feature of software applications ?(a) Windows(b) Menus(c) Help(d) Search(e) None of these
A

(a)Explanation: (a) Microsoft windows is a series of graphical user interface (GUI) operating systems produced by Microsoft.

255
Q
  1. Where is data saved permanently ?(a) Storage(b) Memory(c) CPU(d) Printer(e) None of these
A

(a)Explanation: (a) Secondary storage (also called external memory or auxilary storage) is a storage medium that holds data or information until it is deleted or overwritten regarders if the computer has power. That is, it stores data permanently for future use eg. hard disk, floppy disk, etc.

256
Q
  1. A MODEM is connected in between a telephone line and a____(a) Computer(b) Network(c) Communication Adapter(d) Serial Port(e) All of these
A

(a)Explanation: (a) Modem is an electronic device that allows computer to communicate over telephone wires or cable TV cable. One computer’s modem converts its digital signals into analog signals and the other computer’s modem reconverts the analog signals into digital signals.

257
Q
  1. Generally, you access the Recycle Bin through an icon located __________.(a) on the hard drive(b) on the desktop(c) on the shortcut menu(d) in the Properties dialog box(e) None of these
A

(b)Explanation: (b) Recycle bin a wastebasket icon on computer desktop that works as a location or directory for deleted files or folders.

258
Q
  1. Another word for software is(a) output(b) input(c) program(d) system(e) None of these
A

(c)Explanation: (c) A software is any set of machine readable instructions (most often in the form of a computer program) that directs a computer’s processor to perform specific operations.

259
Q
  1. The taskbar is located ____.(a) at the bottom of the screen(b) one the Start menu(c) on the Quick Launch toolbar(d) at the top of the screen(e) None of these
A

(a)Explanation: (a) A taskbar is a bar displayed at the bottom of a GUI desktop that is used to launch and monitor running applications.

260
Q
  1. A ___ is a collection of information saved as a unit.(a) file(b) folder(c) path(d) file extension(e) None of these
A

(a)Explanation: (a) A file is a collection of data or information. Every file has a unique name called filename. Almost all information stored in a computer must be in a file. There are many different types of files that store different types of information, eg. program files stores programs, text files stores text, etc.

261
Q
  1. The _____ is the box that houses the most important parts of a computer system.(a) hardware(b) software(c) input device(d) system unit(e) None of these
A

(d)Explanation: (d) A system unit is the part of a computer that houses the primary devices that perform operations and produce results for complex calculations. It includes the motherboard, CPU, RAM and other components, as well as the case in which these devices are housed. This unit is also known as chassis or tower.

262
Q
  1. Which is not a basic function of a computer ?(a) Accept input(b) Copy text(c) Process data(d) Store data(e) None of these
A

(b)Explanation: (b) Computer have four basic functions : they take in raw data (input) ; they store data (storage) ; they manipulate data (processing) and they provide the user with information (output).

263
Q
  1. The term bit is short for —-(a) Binary language(b) Megabyte(c) Binary digit(d) Binary number(e) None of these
A

(c)Explanation: (c) A bit (short for binary digit) is the smallestunit of data in a computer. A bit has a single binary value, either 0 or 1.

264
Q
  1. Changing an existing document is called _____ the document.(a) editing(b) creating(c) modifying(d) adjusting(e) None of these
A

(a)Explanation: (a) Making changes to the already existing document before finalizing it or taking print out is called as Editing. It is reading through the entire document and making changes to enhance the look and appearance of the document as well as fixing errors. Editing may include autocorrect feature, find & replace feature, Grammer and spelling check, formatting, etc.

265
Q
  1. A ____ shares hardware, software, and data among authorised users.(a) protocol(b) network(c) hyperlink(d) transmitter(e) None of these
A

(b)Explanation: (b) A computer network is a group of two or more computers that allow computers to share hardware such as printer, faxes, etc. and software such as programs files, documents, data, etc.

266
Q
  1. Which of the the following system components is the brain of the computer ?(a) CPU(b) Circuit board(c) Memory(d) Network card(e) None of these
A

“(a)Explanation: (a) CPU (Central Processing Unit) is regarded as the ““brain”” of the computer. This is because most of the processing of a computer is performed by CPU. It consists of ALU and CU which performs arithmetic operations like addition, multiplication, subtraction, division and logical comparisons such as equal to, greater than, less than, etc.”

267
Q
  1. Most Web sites have a main page, the ____, which acts as a doorway to the rest of the Web site pages.(a) home page(b) search engine(c) browser(d) URL(e) None of these
A

(a)Explanation: (a) Home page/main page/index page is the first page that the user sees on the website. It gives detailed information on its owner and provides links to its other parts.

268
Q
  1. Input, output, and processing devices grouped together represent a(n) ___.(a) information processing cycle(b) mobile device(c) circuit board(d) computer system(e) None of these
A

(d)Explanation: (d) The hardware equipment of a computer systems comprises of 3 basic elements. • System unit (or processing devices) : 2 important parts are CPU and memory. • Input/Output devices : It includes input devices which helps in entering data into the computer and output device that display output to the user. • Storage devices : Stores data permanently for future use. For eg. hard disk, etc.

269
Q
  1. Peripheral devices such as printers and monitors are considered to be ______.(a) software(b) hardware(c) data(d) information(e) None of these
A

(b)Explanation: (b) A peripheral device (or auxiliary device) is a hardware device that allows a computer to perform an additional function, but it is not something the computer needs in order to work. It includes input devices such as keyboard, mouse, etc ; Output devices such as monitor, printer, etc; and storage devices such as hard disk, floppy disk, etc.

270
Q
  1. Computer programs are written in a high-level programming language; however, the human-readable version of a program is called ____.(a) instruction set(b) cache(c) source code(d) word size(e) None of these
A

(c)Explanation: (c) Sorce code refers to a computer program written in a high level (human readable) language such as C, C++, Java which use English-like statements. It is converted into object code (or machine code) by a computer.

271
Q
  1. A(n) ____ backup contains a copy of every program, data, and system file on a computer.(a) bootstrap(b) restoration(c) differential(d) full(e) None of these
A

(d)Explanation: (d) Full backup is the starting point for all other backups and contains all the data in the folders and files that are selected to be backed up. Because the full backup stores all files and folders, frequent full backups result in faster and simpler restore operations. They are more comprehensive and self-contained.

272
Q
  1. The main system board of a computer is called the ____.(a) motherboard(b) integrated circuit(c) processor(d) microchip(e) None of these
A

(a)Explanation: (a) A motherboard is the main circuit board inside a computer that connects the different parts (hardware components) of a computer. It has sockets for CPU, RAM and expansion cards, eg. graphics cards, sound cards, storage cards, etc. and it also hooks up to hard drives, disc drives and front panel parts with cables & wires.

273
Q
  1. Antivirus software is an example of ____.(a) an operating system(b) business software(c) a security utility(d) an office suite(e) None of these
A

(c)Explanation: (c) Antivirus software is an example of security utility program. It is a program or set of programs that are designed to prevent, search for, detect and remove software viruses and other mali cious software like worms, trojans, adware, etc.

274
Q
  1. The main directory of a disk is called the ____ directory.(a) sub(b) root(c) folder(d) network(e) None of these
A

(b)Explanation: (b) In a computer file system that is organized as a hierarchy or tree, the root directory is the highest or top-most directory which includes all other directories. For eg. the root directory (or folder) of the C Drive C:.

275
Q
  1. Time during which a job is processed by the computer is(a) Real time(b) Delay time(c) Execution time(d) All of the above(e) None of these
A

(c)Explanation: (c) Execution time (or run time) is the time during which a program is running (executing).

276
Q
  1. What is the name of the software that allows us to browse through web pages called?(a) Mail Client(b) Browser(c) FTP Client(d) Messenger(e) None of these
A

(b)Explanation: (b) A web browser is a software application used to enable computer users to locate and access web pages. Browsers translate the basic HTML code that allows us to see images, text video and listen to audios on websites, along with hyperlinks that let us travel to different web pages.

277
Q
  1. When you purchase a product over a Mobile Phone, the transaction is called ___(a) e-Commerce(b) Web Commerce(c) m-Commerce(d) Mobile Purchases(e) None of these
A

(c)Explanation: (c) Mobile commerce (or m-commerce) is the ability to conduct commerce (buying & selling of goods & services) using a mobile device such as mobile phone, laptops, hand held computers, etc.

278
Q
  1. System software is the set of programs that enables your computer’s hardware devices and ____ software to work together. & KNOWLEDGE SET(a) Processing(b) Management(c) Utility(d) Application(e) None of these
A

(d)Explanation: (d) System software is a set of programs that control or maintain the operations of the computer and its devices. System software serves as the interface between the user, the application software and the computer’s hardware. Two types of system software are the operating system and utility programs.

279
Q
  1. DVD stands for?(a) Digital Video Disk(b) Digital Versatile Disk(c) Both (b) and (a)(d) Neither (b) nor (a)(e) None of these
A

(c)Explanation: (c) DVD stands for Digital versatile/ video disc. It is an optical disc storage format. It is high-density video disc that stores large amounts of data, especially, highresolution audio-visual material.

280
Q
  1. A dot-matrix printer(a) is an output device only(b) is an input-output device(c) is an input device only(d) All of the above(e) None of these
A

(a)Explanation: (a) A printer is an output devices that represents the result of processing (output) to the user in the form of printed paper. A dot matrix is a type of a printer that forms images of letters, numbers, etc from a number of tiny dots.

281
Q
  1. The term gigabyte refers to(a) 1024 kilobytes(b) 1024 bytes(c) 1024 megabytes(d) All of the above(e) None of these
A

(c)Explanation: (c) A gigabyte (GB) is a measure of computer data storage capacity which is equal to one billion (109) or 230 bytes. It is equal to 1024 MB.

282
Q
  1. The term ‘Operating System’ means(a) The way a user operates the computer system(b) A set of programs which control computer working(c) Conversion of high level language to machine language(d) The way computer operator works(e) All of the above
A

(b)Explanation: (b) An operating system is the system software that runs on computer. It manages the computer’s memory, processes, and all of its software and hardware.

283
Q
  1. The function of key F4 is(a) Undo the last action(b) To repeat the last action(c) Both of above(d) Both (b) and (a)(e) Neither (b) or (a)
A

(b)Explanation: (b) In programs like MS-Word. F4 repeat the last action performed. Shift + F4 repeat a find or Go to Action. Ctrl + F4 closes the window. Alt + F4 quits the word program.

284
Q
  1. Graphical pictures that represent an object like file, folder etc. are(a) Windows(b) Task bar(c) Desktop(d) Icons(e) None of these
A

(d)Explanation: (d) A computer icon is a small picture that represents an object or programs. When you click icon, the associated object or program will be opened. Icons help in quickly identifying a type of object or programs associated with the icon.

285
Q
  1. DSL is an example of a(n) ___________ connection.(a) wireless(b) network(c) slow(d) broadband(e) None of these
A

(d)Explanation: (d) DSL (Digital Subscriber Line) is a wireline transmission technology that transmits data transfer over traditional copper telephone lines already installed to homes and businesses. DSLbased broadband provides transmission speeds ranging from several hundred kbps to millions of bits for second (mbps). Broadband includes several high-speed transmission technologies such as Digital Subscriber Line (DSL), Cable, modem, Fiber, Wireless, Satellite and Broadband over powerlines (BPL)

286
Q
  1. Smaller and less expensive PCbased servers are replacing ________ in many businesses.(a) clients(b) supercomputers(c) laptops(d) mainframes(e) None of these
A

(d)Explanation: (d) Mainframes have become less common as servers have been cheaper (and more powerful) and as personal computers- desktops, laptops, the cloud and even tablets - have become more self-sufficient in terms of processing power & data storage. PC-Based servers or PC-Based mainframes do not require as much electricity or floor space when compared to traditional mainframes.

287
Q
  1. Servers are computers that provide resources to other computers connected to a:(a) mainframe.(b) network.(c) supercomputer.(d) client.(e) None of these
A

(b)Explanation: (b) A network server is a computer designed to process requests and deliver data to other (client) computers over a local network or the Internet. Network servers typically are configured with additional processing, memory and storage capacity to handle the load of servicing clients.

288
Q
  1. The PC (personal computer) and the Apple Macintosh are examples of two different:(a) applications.(b) platforms.(c) programs.(d) storage devices.(e) None of these
A

“(b)Explanation: (b) Apple Macintosh computers and PC computers running Microsoft Windows are examples of two different platforms. The term ““PC”” has been traditionally used to describe an ““IBM compatible”” personal computer, PC is one with an intel microprocessor architecture and windows operating system written to use that microprocessor. The Apple Macintosh uses a Motorola microprocessor architecture and a proprietary operating system.”

289
Q
  1. Which of the following statement best describes the batch method of input?(a) Data is input at the time it is collected(b) Data is processed as soon as it is input(c) Data is collected in the form of source documents, placed into groups, and then input to the computer(d) Source documents are not used(e) None of these
A

(c)Explanation: (c) Batch processing refers to processing transactions in a group or batch. No user interaction is required once batch processing is underway. While batch processing can be carried out at any time, it is particularly suited to end-ofcycle processing, such as for processing a bank’s reports at the end of a day, or generating monthly or bi-weekly payrolls.

290
Q
  1. _______ bits equal one byte.(a) Two(b) Eight(c) One thousand(d) One million(e) None of these
A

(b)

291
Q
  1. The operating system is the most common type of ____________ software.(a) application(b) communication(c) system(d) word-processing software(e) None of these
A

(c)Explanation: (c) An operating system is a system software that runs on a computer. It manages the computer’s memory, processes, and all of its software and hardware. 40 .(b) A byte is a group of eight adjacent binary digits (bits), each of which consist of either 0 or

292
Q
  1. What is the name for the process that is used to convert a series of instructions, or program, written in a high-level language into instructions (or a program) that can be run on a computer?(a) Compiling(b) Assembling(c) Translating(d) Uploading(e) None of these
A

(a)Explanation: (a) Compiling is the process of translating the source code written in high level language (human readable) such as C, C++, Java, etc. into an object code (or machine code) understandable by computers. The most common reason for wanting to transform source code is to create an executable program.

293
Q
  1. A string of eight 0s and 1s is called a:(a) byte(b) megabyte(c) kilobyte(d) gigabyte(e) None of these
A

“(a)Explanation: (a) A byte is a unit of data that is eight binary digits (bits) long. A byte is a unit most computers use to represent a character such as letter, number, or typographic symbol (eg. ““g””, “”s””, or “”?””).”

294
Q
  1. Coded entries which are used to gain access to a computer system are called—(a) Passwords(b) Entry codes(c) Security commands(d) Code words(e) None of these
A

(a)Explanation: (a) A password is a secret word or string of characters used for user authentication to prove identify or access approval to gain access to a resource (eg. an access code is a type of password); which should be kept secret from those not allowed access.Q801. The subsystem of the kernel and hardware that cooperates to translate virtual to physical addresses comprises(a) Memory Management Subsystem(b) Process Management Subsystem(c) Input/Output Management Subsystem(d) All of the above(e) None of these (a)Explanation: (a) The compiler generates addresses for a virtual address space with a given address range and the machine’s memory management unit translates the virtual address generated by the compiler into address locations in physical memory. The compiler does not have to know where in memory the kernal will load the program for execution. In fact, several copies of a program can co-exist in memory. All execute using the same virtual addresses but reference different physical addresses. The subsystem of kernels and the hardware that co-operate to translate virtual to physical address comprise the memory management subsystem.

295
Q

“802. In DOS, the ““Label”” command is used to(a) change the label of disk(b) display the label of disk(c) remove the label of disk(d) Both (b) and (a)(e) All of these”

A

(e)Explanation: (e) Label command; included with operating systems such as DOS, OS/2 and MS-Windows; is used to create, change or delete a volume label on a logical drive, such as hard disk partition or a floppy disk.

296
Q
  1. When we run a program in HTML coding, ____ is used as backend and ___ works as frontend.(a) Notepad - Msn-messenger(b) Notepad - Internet-Explorer(c) MS-word - Internet Explorer(d) Both (b) and (a)(e) None of these
A

(b)Explanation: (b) Web pages can be developed using HTML coding. This coding can be written in backend tools such as Notepad, HTML editors such as Netscape editor, front page 98, Adobe page mill, etc. Backend is used to design webpages. Front end is the nothing but a place where you can view. Web pages that you have coded using one of the backend tools. Internet Explorer, on client machine, is the most common front end tool to view web pages.

297
Q
  1. ______ is collection of web-pages and ______ is the very first page that we see on opening of a website.(a) Web-site, Home-page(b) Home-page, Web-page(c) Web-page-, Home-page(d) Web-page, Web-site(e) None of these
A

(a)Explanation: (a) A Website is a collection of web pages (documents that are accessed through the Internet). A website has its own unique web address. When you type in a web address, it generally takes you to the website’s home page, which introduces you to what that site offers in terms of information or other services.

298
Q
  1. DOS and windows 3.x support file names upto _____ characters in length.(a) Four(b) Two(c) Six(d) Eight(e) None of these
A

(d)Explanation: (d) In the beginning, Microsoft operating systems such as MSDOS or Windows 3.X did not support long file names like other operating systems such as UNIX, OS/2, and the Apple Macintosh MAC OS.The earlier versions of Microsofts operating system had a limitation of eight character file name or directory and a three character extension. This standard was more commonly known as 8.3 file naming convention.

299
Q
  1. Which of the following computer languages is a mathematically oriented languages used for scientific problems?(a) COBOL(b) FORTRAN(c) LISP(d) PROLOG(e) APPLE
A

(b)Explanation: (b) FORTRAN (Formulate Translation) is a third generation (3GL) programming language that was designed for use by engineers, mathematicians, and other creators and users of scientific algorithms. It was especially suited to numeric computation and scientific computing.

300
Q
  1. Encryption and decryption are functions of(a) Session layer(b) Transport layer(c) Presentation layer(d) All of the above(e) None of these
A

(c)Explanation: (c) The presentation layer presents data to application layer in format that can be procured by an end user. This is actually a translator that provides coding and conversion functions. Main tasks are data compression, decompression, encryption and decryption.

301
Q
  1. For separating channels in FDM, it is necessary to use(a) Bandpass filters(b) Time slots(c) Differentiation(d) All of the above(e) None of these
A

(a)Explanation: (a) In Frequency Division Multiplexing, at the receiving end, the signal is applied to a bank of band-pass filters, which separates individual frequency bands. The band pass filter outputs are then demodulated and distributed to different output channels.

302
Q
  1. A device operating at the physical layer is called a(a) Router(b) Bridge(c) Repeater(d) All of the above(e) None of these
A

(c)Explanation: (c) Devices that operate at the physical layer include repeaters, hubs, network interface cords (NICs), cables and connectors. Repeaters are used to regenerate electrical signals that have attenuated (i.e, weakend) as a result of distance. That is, it receives signal of one end, regenerate original bit patterns and send refreshed signal on the other end.

303
Q
  1. If the _____ bit in X.25 standard is set to 1, it means that there is more than one packet.(a) D(b) Q(c) M(d) P(e) None of these
A

(c)Explanation: (c) M (or more) data bit, contained within the X.25 data packet, which is sent by layers higher than layer 3 to inform the destination DTE that more data will follow in the next packet. Using the M bit, packets can be logically grouped together to convey a large block of related information.

304
Q
  1. A permanent virtual circuit involves(a) Data transfer(b) Connection establishment(c) Connection release(d) All of the above(e) None of these
A

(a)Explanation: (a) Permanent Virtual Circuits (PVC) are comparable to leased lines in circuit switching. In this method, the same virtual circuit is provided between two users on a continuous basis. The circuit is dedicated to the specific users. No one else can use it and because it is always in place it can be used without connection establishment and connection termination. Whereas two SVC users may get a different route every time they request a connection, two PVC users always get the same route.

305
Q
  1. In ____, each packet of a message follows the same path from sender to receiver.(a) Message switching(b) Circuit switching(c) The virtual approach to packet switching(d) The datagram approach to packet switching(e) None of these
A

(c)Explanation: (c) In a virtual circuit approach to packet switching, the relationship between all packets belonging to a message or session is preserved. A single route is chosen between sender and receiver at the beginning of the session. When the data are sent all packets of the transmission travel one after another along that route.

306
Q
  1. The ____ is a device that connects n inputs to m outputs.(a) Crossbar(b) Crossword(c) Modem(d) RAM(e) None of these
A

“(a)Explanation: (a) A crossbar switch is a switch connecting multiple inputs to multiple outputs in a matrix manner. If a crossbar switch has M inputs and N outputs, then a crossbar has a matrix with MXN cross-points or places where the ““bars”” cross. A each crosspoint is a switch; When closed, it connects one of M inputs to one of N outputs.”

307
Q
  1. Which type of switching uses the entire capacity of a dedicated link ?(a) Virtual Circuit Packet Switching(b) Circuit switching(c) Datagram Packet Switching(d) Message Switching(e) None of these
A

(b)Explanation: (b) In a circuit-switched network, a dedicated communications path is established between two stations through the nodes of the network. This dedicated path is called a circuit. A circuit occupies a fixed capacity of each link for the entire life time of the connection. Capacity unused by the circuit can not be used by other circuits.

308
Q
  1. Which of the following types of tables constraints will prevent the entry of duplicate rows ?(a) Unique(b) Primary key(c) Null(d) Foreign key(e) None of these
A

(b)Explanation: (b) The primary key of a relational table uniquely identifies each record or row in the table. For a table, it enables each record to be unique without ambiguity that is, it doesn’t allow duplicates. eg. In a table CUSTOMERS, it is difficult to differentiate each on his name. Since homonyms may exist. Therefore, it creates a field Code-Client where each code is unique in designating it as primary key to ensure that every client is different.

309
Q
  1. Array is —(a) non-linear data structure(b) linear data structure(c) complex data structure(d) simple data structure(e) None of these
A

(b)Explanation: (b) In a linear data structure, member elements form a sequence. Such linear structures can be represented in memory by using one of the two methods : • By having the linear relationship between theelements represented by means of sequential memory locations. These linear structures are called Arrays. • By having relationship between the elements represented by pointers. These structures are called linked lists.

310
Q
  1. X.21 protocol consists of(a) Frame and packet levels(b) Physical and frame levels(c) Physical, frame and packet levels(d) Only physical level(e) None of these
A

(d)Explanation: (d) X.21 is a physical layer protocol that defines the electrical and mechanical procedures for using the physical medium. It handles the activation and deactivation of the physical medium connecting DTE and DCE devices.

311
Q
  1. The search tool used to text that appears in gotherspace is(a) Archie(b) Gobler(c) Mikky(d) Veronica(e) None of these &
A

(d)Explanation: (d) Veronica is a search engine for Gopher sites. Veronica uses a spider create an index of the files on all Gopher servers. You can enter search keywords into the Veronica system to search all Gopher sites at once.

312
Q
  1. Which multiplexing technique transmits analog signals ?(a) Synchronous TDM(b) FDM(c) Asynchronous TDM(d) Both (a) and (c)(e) None of these
A

(b)Explanation: (b) FDM (Frequency Division Multiplexing) technique is suitable for analogue signalling. FDM mux accepts only analogue signals as its input so any digital signal would require conversion to analogue before multiplexing and this can be source of distortion and noise.

313
Q
  1. The sharing of a medium and its path by 2 or more devices is called ____.(a) Encoxing(b) Modulation(c) Line discipline(d) Multiplexing(e) None of these
A

(d)Explanation: (d) The multiplier (MUX) combines data from a input lines and transmits them over a higher capacity data link. The demultiplexer (DEMUX) accepts the multiplexed data stream, seperates the data according to the channel, then delivers the data to the appropriate lines. This allows two or more devices to share the same transmission line. If the devices is an organisation can efficiently share the communication link then this can drop the cost of the facility by allowing resources to be spread over many users.

314
Q
  1. Most mail programs automatically complete the following two parts in an e-mail(a) From : and date:(b) From: and Body:(c) From : and To:(d) From : and Subject:(e) None of these
A

(a)Explanation: (a) In an email, the body (context text) is always preceded by header lines that identify particular routing information of the message, including the sender, recipient, date and subject. Although FROM, TO and DATE headers are mandatory ; FROM and DATE headers are automatically completed by mail transfer agent (MTA). FROM : indicates sender’s name and email address and DATE ; indicates sent date/ time of the email.

315
Q
  1. A device that connects to a network without the use of cables is said to be(a) Centralised(b) Distributed(c) Open source(d) Wireless(e) None of these
A

(d)Explanation: (d) A wireless device can refer to any kind of communication equipment that doesn’t require a physical wire for relaying information to another devices. Wireless communication travel over the air via electromagnetic waves (radio frequencies, infrared, satellite, etc.)

316
Q
  1. An error is also known as(a) Debug(b) Bug(c) Cursor(d) Icon(e) None of these
A

(b)Explanation: (b) A software bug is an error, flaw, failure or fault in a computer program or system that produces an incorrect or unexpected result or causes it to behave in unintended ways.

317
Q
  1. A menu contains a list of(a) Data(b) Commands(c) Objects(d) Reports(e) None of these
A

(b)Explanation: (b) A menu is a set of commands or options presented to the user of a computer application to help the user final information or execute a program function. Menus are common in graphical user interface (GUI) such as windows or MAC OS.

318
Q
  1. Which of the following groups consist of only input devices?(a) Mouse, Keyboard, Printer(b) Mouse, Keyboard, Monitor(c) Mouse, Keyboard, Plotter(d) Mouse, Keyboard, Scanner(e) None of these
A

(d)Explanation: (d) Mouse, keyboard, scanner are input devices that helps the user to enter data (letters, symbols, numbers, images, commands) into the computer for further processing.

319
Q
  1. What would you do to highlight a word? You position the cursor next to the word, and then____(a) Click mouse once(b) Drag mouse while holding button down(c) Roll mouse around(d) Roll and then click mouse(e) None of these
A

(b)Explanation: (b) A highlight refers to an indication that text or other object has been selected with a mouse or keyboard. To highlight text using a mouse, position your cursor at the beginning of the text you want to highlight. Press and hold your primary mouse buttton (left button) while holding the button, move the cursor to the end of the text and let go of the button. This will highlight all text from the beginning to the end.

320
Q
  1. Back up of the data files will help to prevent ____(a) Duplication of data(b) Loss of confidentiality(c) Virus infection(d) Loss of data(e) None of these
A

(d)Explanation: (d) A back up refers to the copy and archive of computer data to a different location so that it may be used to restore the original data after a data loss event, eg. equipment failure or catastrope.

321
Q
  1. In addition to the basic typing keys, desktop and notebook computer keyboards include a(n) _____ keypad to efficiently move the screen-based insertion point or cursor(a) Number(b) Editing(c) Locked(d) Navigation(e) None of these
A

(d)Explanation: (d) Navigation keypad comprises of a variety of keys which move the cursor to different positions on the screen. They are used for moving around in documents or webpages and editing text. They include arrow keys, HOME, END, PAGE UP, PAGE DOWN, DELETE and INSERT. For eg. Arrow keys are programmed to move the cursor in a specified direction- left, right, up or down.

322
Q
  1. File ____shrinks the size of a file so it requires less storage space.(a) Synthesizing(b) Scanning(c) Defragmenting(d) Compression(e) None of these
A

(d)Explanation: (d) File compression is the reduction in size of date in order to save space on storage medium or transmission time. Compression software allows the user to take many files and compress them into one file, which is smaller than the combined size of the originals. The compressed files make downloading faster, easier and allows more data to be stored on a removable media. Common compressed file extensions are .ZIP, .RAR, .ARJ, etc.

323
Q
  1. An e-mail address typically consists of a user ID followed by the____ sign and the name of the e-mail server that manages the user’s electronic post office box.(a) #(b) @(c) &(d) *(e) None of these
A

(b)Explanation: (b) The general format of an email address is example @ computer.com. It consists of two parts : the parts before the @ sign is the local part of the address, often the username of the recipient (example) and the part after the @ sign is a domain name to which the email message will be sent (computer.com)

324
Q
  1. Processing information involves.(a) Communication with another computer.(b) Accepting information from the outside world.(c) Performing arithmetic or logical operations on information that is input.(d) All of these answers are forms of processing information.(e) None of these
A

(c)Explanation: (c) The computer performs useful operation manipulating the data in many ways. This manipulation is called processing. Examples of processing including performing calculations, sorting lists of words or numbers, modifying documents and pictures according to user instructions, and drawing graphs. A computer process data in the CPU which perform arithmetic and logic calculations.

325
Q
  1. A generic term that refers to the combination of all commercial transactions executed over electronic media for the exchange of product and services.(a) E-shopping(b) E-commerce(c) E-banking(d) EDI(e) None of these
A

(b)

326
Q
  1. For locating any document on the WWW, there is a unique address know as(a) E-mail account(b) Domain name(c) Home-page(d) URL(e) None of these
A

(d)Explanation: (d) A URL (Uniform Resource Locator) is the global address of document and other resources on the World Wide Web. The first part of the URL is called a protocol identifier and it indicates what protocol to use, and the second part is called a resource name and it specifies the IP address or the domain namewhere the resource is located. The Protocol identifier and the resource name are separated by a colon and two forward slashes.

327
Q
  1. The rectangular pattern of lines of varying width and spaces used for automatic product identification by computer(a) Cost analysis(b) Bar-code(c) Test-code(d) Sensor(e) None of these
A

(b)Explanation: (b) Bar code is a series of parallel verticle lines (bars and space), that can be read by bar code scanners. It is used world wide as part of product packages, as price tags, carton labels, on invoices even in credit card bills. It facilitates unique product identification through using international symboligies/numbering systems, promotes brand image and would enable timely and accurate capture of product information.

328
Q
  1. The protocol for sharing hypertext information on the World Wide Web is(a) HTML(b) HTTP(c) FTP(d) TCP(e) None of these
A

(b)Explanation: (b) HTTP (Hyper Text-Transfer Protocol) is the underlying Protocol used by World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions web servers and browsers should take in response to various commands, eg. When you enter a URL in your browser, this actually sends an HTTP command to the web sever directing it to fetch and transmit the requested web page.

329
Q
  1. Digital means that computer information is discrete and countable, subdivided into:(a) Analog units.(b) Digits.(c) Input.(d) Bytes.(e) None of these
A

(b)Explanation: (b) Computer information is digital. This means that it is made up of discrete, countable units (digits) and can be subdivided as opposed to analog information, which continuously varies over a range of values. Computer store and process information in a digital format, but human process and store analog information. By reducing information in to digits, it can be used more efficiently by computers.

330
Q
  1. If a user needs information instantly available to the CPU, it should be stored:(a) In RAM.(b) In the CPU.(c) In secondary storage.(d) On a CD.
A

“(a)Explanation: (a) A computer main memory (or random access memory) is called as ““working”” memory of the computers as it stores data and programs that CPU is currently processing. RAM holds the programs and data on temporary basis i.e, as soon as the computer is switched off, this gets lost.”

331
Q
  1. The CPU is also known as the:(a) Random access memory.(b) Microprocessor.(c) Primary storage.(d) Micro unit.
A

(b)Explanation: (b) A CPU (also known as micro processor) is a silicon integrated COMPANION : IDIOMS AND PHRASES STUDENT’S COMPANION : IDIOMS AND belief that it will be of immense value been designed with an attempt to into questions related to idioms and categorically been divided into 7 chapters phrases important for attempting who are appearing at or are preparing Bank PO, Bank Clerk, Railway, Staff Insurance, UPSC, NDA, CDS, Airforce, competitive exams. FEATURES OF THIS BOOK EXPRESSIONS (A TO Z LISTING) PHRASES SENTENCES WITH EXACT MEANINGS (WITH EXPLANATION/MEANINGS) circuit, sometimes called a computer chip. This is because it consists of a square piece of crystallized silicon that is very, very thin. It consists of millions of transistors connected by very thin wires. It carries out the instructions of a computer program by performing the basic arithmatical, logical and input/ output operations of the system thereby connecting data into information.Q839. The primary output device for computers is a:(a) Printer.(b) Video monitor.(c) Keyboard.(d) Mouse.(e) None of these (b)Explanation: (b) A monitor is primary electronic visual display for computers that presents the result of processing (output) to the user. The monitor displays the computer’s user interface and open programs, allowing the user to interact with the computer, typically using the keyboard and mouse.

332
Q
  1. Producing output involves:(a) Communication with another computer.(b) Accepting information from the outside world.(c) Moving and storing information.(d) Communicating information to the outside world.(e) None of these
A

(d)Explanation: (d) Any information that has been processed and comes from a computer or computer device and presented to the user for his/her use (eg. decision making) is considered an output. Some of the examples of computer output include reports, documents, music, graphs, pictures, etc.

333
Q
  1. Which of the following is NOT a computer programming language?(a) C++(b) C(c) Java(d) COBOL(e) Microsoft
A

(e)Explanation: (e) • C, C++, Java, COBOL are all examples of high level languages that use English-like statements for writing programming /coding. • Microsoft corporation is an American multinational software corporation headquarted in Redmond, Washington that develops, manufacturers, licenses and supports a wide range of products and services related to computing.

334
Q
  1. The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the ——- command.(a) Find(b) Replace(c) Lookup(d) Search(e) None of these
A

“(a)Explanation: (a) ““Find”” feature in MS-Word enables you to quickly search for every occurence of a specific word or phrase. On the edit menu, click find. In the ““Find what”” box, enter the text that you want to search for click find Next or Find All. To cancel a search in progress, press ESC.”

335
Q
  1. What is the full form of USB as used in computer related activities ?(a) Ultra Serial Block(b) Universal Security Block(c) United Service Block(d) Universal Serial Bus(e) None of these
A

(d)Explanation: (d) USB (Universal Serial Bus) is a standard cable connection interface on personal computer and consumer electronics. USB parts allows stand-alone electronic devices to be connected via cables to a computer (or to each other).

336
Q
  1. Most of the commonly used personal computers/laptops do not have a command key known as—(a) Shift(b) Turnover(c) Alter(d) Delete(e) Insert
A

(b)Explanation: (b) Shift, Delete, Alt, and Insert are the keys present in commonly used personal computers/ laptops.

337
Q
  1. Which of the following is a Web browser ?(a) Power Point(b) Paint(c) Fire fox(d) Word(e) All are Web browsers
A

(c)Explanation: (c) A browser is a software that is used to access the internet. A browser lets you visit websites and do activities within them like login. view multimedia, link from one site to another, visit one page from another, print, send and receive email and many other activities. eg. Microsoft Internet Explorer, Mozilla firefox, Google’s chrome, etc. are commonly used browsers.

338
Q
  1. Whenever we have to give space between the two words while typing on a PC we have to press a key known as—(a) Shift(b) Back space(c) Control(d) Escape(e) Space Bar
A

(e)Explanation: (e) A space key refers to the horizontal bar on the computer keyboard that moves the cursor one space to the right. Also, when the spacebar key is pressed it creates an empty space called space character which helps seperate words and other characters in a sentence.

339
Q
  1. Most of the commonly available personal computers/laptops have a keyboard popularly known as—(a) QOLTY(b) QWERTY(c) ALTER(d) UCLIF(e) None of these
A

(b)Explanation: (b) QWERTY is the most common modern day keyboard layout. The name comes from the first six keys appearing on the top left letter row of the keyboard and read from left to right Q-W-E-R-T-Y.

340
Q

“848. A Program designed to destroy data on your computer which can travel to ““infect”” other computers is called a — COMPUTER 22 SET(a) torpedo(b) disease(c) hurricane(d) virus(e) None of these”

A

(d)Explanation: (d) A computer virus is a selfreplicating program that can spread by email or by inserting copies of itself into other programs or documents. Most viruses are malicious programs designed to infect and gain control over a computer without the owner’s knowledge.

341
Q
  1. Which of the following is NOT a hardware of a computer ?(a) Key Board(b) Monitor(c) Windows(d) Central Processing Unit(e) Mouse
A

(c)Explanation: (c) Microsoft windows is a series of graphical interface operating systems developed, marketed and sold by Microsoft.

342
Q
  1. To prepare a presentation/slide show which application is commonly used ?(a) Powerpoint(b) Photoshop(c) Outlook Express(d) Internet Explorer(e) All correct
A

(a)Explanation: (a) Powerpoint is a presentation software program that is part of the Microsoft office package. Powerpoint uses a graphical approach to presentations in the form of slide shows that accompany the oral delivery of the topic. It is widely used in business and classrooms and is an effective tool when used for training purposes.

343
Q
  1. Text and graphics that have been cut or copied are stored in an area called the—(a) Copyboard(b) Pasteboard(c) Clipboard(d) Cuttingboard(e) None of these
A

(c)Explanation: (c) A clipboard is a special file or memory area (buffer) where data is stored temporarilly before being copied to another location. Many word processors, for example, use a clipboard for cutting and pasting. When you cut a block of text, the word processor copies the block of text to the clipboard; when you paste the block, the word processor copies it from the clipboard to its final destination.

344
Q
  1. What kind of software would you most likely use to keep track of a billing account ?(a) Electronic publishing(b) Word processing(c) Spreadsheet(d) Web authoring(e) None of these
A

(c)Explanation: (c) Documenting incomes & expenses is one of the most important steps towards managing money. Spreadsheet programs like Microsoft Excel, iwork numbers, open office .org calc helps to prepare budget spreadsheets that are used to keep track of income & expenses.

345
Q
  1. The Internet allows you to —(a) view Web pages(b) send electronic mail(c) connect to servers all around the world(d) All of the above(e) None of these
A

(d)Explanation: (d) The Internet is a global networking connecting millions of computers. It is a network of networks that consists of millions of private, public, academic, business and government network, of local to global, that are linked by a broad array of electronic and optional networking technologies with the help of Internet, user can view web pages on world wide web. Also, it facilitates communication around the globe via applications like chat, email, vedeo-conferencing, Internet telephony, etc.

346
Q
  1. Which is of the following is NOT a famous operating system ?(a) Mac OS X(b) Windows Vista(c) Linux(d) Sun OS(e) Virtual Box
A

(e)Explanation: (e) A virtual box is a software virtualisation package that installs on an operating system as an application. Virtual box allows additional operating system to be installed on it, as a Guest OS, and run in a virtual environment.

347
Q
  1. Editing a document consists of reading through the document you’ve created, then—(a) Printing it(b) Correcting your errors(c) Saving it(d) deleting it(e) None of these
A

(b)Explanation: (b) Editing a document involves opening the existing document in the appropriate editor application, than saving the changes and checking the document back in. Document you edit are automatically checked out. eg. in MS-Word, depending on a document, its final format and its purpose, the editing can involve checking grammar and spelling, content, word choice and formatting.

348
Q
  1. What are .bas, doc, and .htm examples of ?(a) Extensions(b) Databases(c) Domains(d) Protocols(e) None of these
A

(a)Explanation: (a) A filename extension is a suffix (seperated from the base filename by a dot or space) to the name of a computer file applied to indicate the encoding (file format) of its content or usage eg, .bar, .doc, .htm, etc.

349
Q
  1. What is the default file extension for all Word documents ?(a) TXT(b) WRD(c) DOC(d) FIL(e) None of these
A

(c)Explanation: (c) DOC is a document file format used by Microsoft word, also used in the most word processing software, including open office. DOC stands for Document file. A DOC file can contain formatted text, images, tables, graphs, charts, page formatting and print settings.

350
Q
  1. What is the most common way to get a virus in your computer’s hard disk ?(a) By uploading pictures from mobile phones to the computer(b) By installing games from their CDROMS(c) By opening e-mails(d) By sending e-mails(e) None of these
A

(c)Explanation: (c) Most of the viruses that spread on your computer are delivered through attachments. These attachments are sent via email most often from people you know who are unaware of the virus or through spam mail that wants to advertise a message to you. Emails infected with a virus usually appears like a normal email in your inbox. When the unsuspected user open the email and the attachment, the virus executes itself and begin to infect your computer system. So, you should delete unknown email attachments without opening them.

351
Q
  1. Junk e-mail is also called—(a) spoof(b) spam(c) sniffer script(d) spool(e) None of these
A

“(b)Explanation: (b) Junk email is unsolicited email that wants to sell you something. Junk email is often sent as a ““spam””- a single email message broad cast to hundreds or thousands of unknowing recipients and is also usually ““anonymous”” in that you can not write back to the address that is listed as the sender of the message.”

352
Q
  1. A device that connects to a network without the use of cables is said to be—(a) wireless(b) distributed(c) centralized(d) open source(e) None of these
A

(a)Explanation: (a) A wireless device can refers to any kind of communication equipment that doesn’t require a physical wire for relaying information to another device. Wireless network utilize radio waves and/or microwaves to maintain communication channels between computers and other network devices.

353
Q
  1. E-commerce allows companies to—(a) conduct business over the Internet(b) issue important business reports(c) support decision making processes(d) keep track of paper-based transactions(e) None of these
A

(a)Explanation: (a) The buying and selling of products and services by businesses and consumers through an electronic medium, without using any paper documents. Ecommerce is widely considered the buying and selling of products over the internet, but any transaction that is completed solely through electronic measures can be considered e-commerce.

354
Q
  1. Which of the following are all considered advantages of e-mail ?(a) Printable, global and expensive(b) Convenience, speed of delivery, generality and reliabiltity(c) Global, convenience and Microsoft owned(d) Slow delivery, reliable, global and inexpensive(e) None of these
A

(b)Explanation: (b) Advantages of email include :- • Speed of delivery : Emails are fast. They are delivered at once around the world. • Convenience : Emails are easy to use. You can organize your daily correspondence, send and receive electronic messages and save them on computer. Also, you can read emails at your own convenient time. • Reliability : Transmission is secure and reliable. Email is private, often telephone and fax messages are not. • Generality : Same message can be sent to many recipients. Also, you can send letters, notes, files, data or reports all using the same techniques.

355
Q
  1. What is an E-mail attachment?(a) A separate document from another program sent along with an E-mail message(b) A receipt sent by the recipient(c) A malicious parasite that feeds off of your messages and destroys the contents & (d) A list of CC: or BCC: recipients(e) None of these
A

(a)Explanation: (a) An email attachment is a file that is attached to an email message. For eg. you may attach a graphic, a spreadsheet, or a word processing document. One or files can be attached to any email message, and be sent along with it to the recipient.

356
Q
  1. A —— is a unique name that you give to a file of information(a) folder(b) device letter(c) filename(d) filename extension(e) None of these
A

(c)Explanation: (c) A filename is the name used to uniquely identify a computer file stored in a file system. The filename usually consist of an extension that indicates what type of a file it is.

357
Q
  1. Codes consisting of bars or lines of varying widths or lengths that are computer-readable are known as—(a) a magnetic tape(b) an ASCII code(c) an OCR scanner(d) a bar code(e) None of these
A

(d)Explanation: (d) Bar code is a series of parallel vertical lines (bards and space) that can be read by bar code scanners. It is used world wide as part of product packages, as price tags, carton labels, on invoices even in credit card bills. It facilitates unique product identifications through using international symboligies/ numbering systems promotes brand image and would enable timely and accurate capture of product information.

358
Q
  1. The environment provided to ASP is based on—(a) Network(b) Client/server(c) Centralized system(d) Operator(e) None of these
A

(b)Explanation: (b) An Active server page (ASP) is an HTML page that includes one or more scripts (small embedded programs) that are processed on a Microsoft web server before the page is sent to the user (client).

359
Q
  1. Which of the following in an objective of multiprogrammes operating system ?(a) To minimize turnaround time(b) To maximise CPU utilization(c) To minimize response time(d) Both (b) and (a)(e) None of these
A

(b)Explanation: (b) In a single-processor system only one process can run at a time ; any others must wait until the CPU is free and can be rescheduled. The objective of multiprogramming is to have some process running at all times, to maximize CPU utiliztion. CPU scheduling is important and it is determines which process run when there are multiple run-able processes.

360
Q
  1. Which one is not needed by server programme from an operating system ?(a) Task priority(b) Task pre-emption(c) Semaphores(d) All of the above(e) None of these
A

(d)Explanation: (d) Base OS services needed by a server program- task preemption, task priority, semaphores, Inter-process communication (IPC), Threads, Inter-task protection, Multi-user High performance file system, Efficient memory management, Dynamically linked run-time extensions.

361
Q
  1. Favourites are accessible from the ____ menu(a) title(b) start(c) stop(d) menu(e) None of these
A

“(b)Explanation: (b) Similar to the ““Programs”” menu, which is a directory of program shortcuts, the ““Favourites”” list is a directory of shortcuts which point to web addresses. The ““favourites”” list is accessible either through the windows start menu. or through the Internet explorer web browser.”

362
Q
  1. For optical fibre used in point to point transmission, the repeater spacing is(a) 2 - 10 km(b) 10 - 100 km(c) 1 - 10 km(d) 100 - 1000 km(e) None of these
A

(b)Explanation: (b) The repeater spacing in transmission medium is as follows :- • Twister pair - 2 to 10 km. • Co-axial cable- 1 to 10 km. • Optical fiber - 10 to 100 km.

363
Q
  1. Which encoding type always has a non-zero average amplitude ?(a) multi-polar(b) unipolar(c) bipolar(d) All of the above(e) None of these
A

(b)Explanation: (b) Average amplitude of a unipolar encoded signal is non-zero. It is called DC component i.e, a component with zero frequency. When a signal contains a DC component, it cannot travel through a Transmission. Medium that can’t handle DC components.

364
Q
  1. Frame Relay technique uses(a) connection oriented(b) circuit switching(c) message switching(d) hybrid switching(e) None of these
A

(a)Explanation: (a) Communications in a frame Relay network are connection oriented and a defined communications path must exist between each pair of DTE devices. Virtual circuits provide a bi-directional communication path from one DTE device to another and are uniquely identified by a Data link connection identifier (DLCI). The technology used in frame Relay allow it to multiplex several data flows over the same physical media.

365
Q
  1. Which of the following technique is used in high speed modem ?(a) FDM(b) PCM(c) TDM(d) QAM(e) None of these
A

(d)Explanation: (d) QAM (Quadrature Amplitude Modulation), is the modulation scheme used in cable plants. RAM is how the modem encodes digital information to be sent over the RF interface of the modem.

366
Q
  1. The UNIX, which command is used to display the message or value of any variable on the screen ?(a) echo(b) cat(c) display(d) char(e) None of these
A

(a)Explanation: (a) In computing, echo is a command in DOS, OS/2, MS-windows, UNIX that places a string on the computer terminal. It is typically used in shell scriptes and batches files to output status text to the screen or a file.

367
Q
  1. HUB is(a) central device(b) layer 1 device(c) dumb device(d) All of the above(e) None of these
A

“(d)Explanation: (d) • A hub is a central device that connects multiple computers on a single network. • Hubs classify as layer 1 devices in the OSI model. • A network hub is essentially a ““dumb”” device that no knowledge of what devices are plugged into it, where data is coming from or where it’s going. It simply retransmits or repeats, the data to each & every point in a process called a broadcast.”

368
Q
  1. Web site is a collection of—(a) Graphic files(b) HTML documents(c) Audio and video files(d) All of the above(e) None of these
A

(d)Explanation: (d) A website is a collection of related web pages containing images, videos or other digital assets. A website is hosted on at least one web server, accessible via a network suh as the Internet or a privat LAN through on Internet address (also called URL).

369
Q

“877. For multiple branching in ““C”” we use ____ statement.(a) Go to(b) Switch(c) Cout(d) Case(e) Cin”

A

(b)Explanation: (b) The switch-case statement is a multiway decision making statement. Unlike the multiple decision statement that can be created using if-else, the switch statement evaluates the conditional expression and tests it against the numerous constant values. During execution, the branch corresponding to the value that the expression matches is taken.

370
Q
  1. The server on the internet is also known as—(a) Host(b) Repeater(c) Gateway(d) AND Gate(e) None of these
A

(a)Explanation: (a) A host computer is a centralized workstations, server or mainframe computing device located within a networked environment that merges tasks, communicate instructions or delivers specific services to other networked computers known as clients.Q879. IBM stands for(a) Interconnected Business Machine(b) International Business Machine(c) Internal Business Machine(d) Interacting Business Machine(e) None of these (b)Explanation: (b) IBM (International Business Machines) is an American multinational technology and consulting corporation, with headquarters in Armonk, New York, United states of America.

371
Q
  1. In a SONET system, ____ can remove signals from a path.(a) a regenerator(b) An STS multiplier(c) an add/drop multipliers(d) a repeater(e) None of these
A

(c)Explanation: (c) An add/drop multiplexer can add signals coming from different sources into a given path or remove a desired signal from a path and redirect it without demultiplexing the entire signal. Instead of relying on timing and bit positions, add/drop multiplexers use header information such as addresses and pointer to identify individual streams.

372
Q
  1. Computations and logical operations are performed by the____.(a) ALU(b) RAM(c) Register(d) Control unit(e) None of these
A

(a)Explanation: (a) Arithmetic and Logic Unit (ALU) is the component of processor (CPU) which performs arithmetic operations such as addition, subtraction, division, multiplication and logical comparisons such as greater than, less than, equal to, etc.

373
Q
  1. Permanent instructions that the computer uses when it is turned on and that cannot be changed by other instructions are contained in ______(a) RAM(b) ROM(c) ALU(d) REM(e) None of these
A

“(b)Explanation: (b) ROM (Read Only Memory) is a ““built-in”” memory that is capable of holding data and having that data read from the chip, but not written to Data pre-pressed on ROM chip by manufacturer. Unlike random access memory, RAM retains its contents even when the computer is turned off. ROM is referred to as being non-volatile, whereas RAM is volatile.”

374
Q
  1. The ability of an OS to run more than one application at a time is called_____.(a) object-oriented programming(b) multitasking(c) multi-user computing(d) time sharing(e) None of these
A

(b)Explanation: (b) Multitasking refers to the ability to execute more than one task (or program) at the same time. In multitasking, only one CPU is involved, but it switches from one program to another so quickly that it gives the appearance of executing all of the programs at the same time.

375
Q
  1. A CPU contains_____.(a) an analytical engine and a control unit(b) a card reader and a printing device(c) a control unit and an arithmetic logic unit(d) an arithmetic logic unit and a card reader(e) None of these
A

(c)Explanation: (c) CPU (Central Processing Unit) is the brain of the computer that contains the circuitrynecessary to interpret & execute program instructions. It comprises of Arithmetic logic unit (to perform arithmetic calculations like addition, multiplication, division, subtraction and logical comparison like NOT, EQUAL TO, etc). and control unit (which co-ordinates the components of a computer system)

376
Q
  1. The most widely used input device is the_____.(a) keyboard(b) mouse(c) modem(d) monitor(e) None of these
A

(a)Explanation: (a) A computer keyboard is an input device that allows a person to enter numbers, letters, symbols, commands into a computer. It is the main input device for most computers.

377
Q
  1. The vast network of computers that connects millions of people all over the world is called____.(a) Web(b) LAN(c) Hypertext(d) Internet(e) None of these
A

(d)Explanation: (d) The Internet is a global network connecting millions of computers. It is a network of networks that consists of millions of private, public, academic, business and government networks, of local to global scope, that are linked by a broad array of electronic and optical networking technologies.

378
Q
  1. What type of resource is most likely to be a shared common resource in a computer network?(a) Speakers(b) Printers(c) Floppy disk drives(d) Keyboards(e) None of these
A

(b)Explanation: (b) A shared resource typically refers to a hardware or software resource that can be accessed by one or more remote systems over a network. Hardware devices such as printers and scanners are often set up on a netwok for use by numerous users in an organisation. Printer acts as a shared resource for a set number of computers, allowing users to send documents to the printer. This allows multiple users to share a single or more printers on a network. This is cost-effective as printers are expensive. This reduces overhead costs like new cartridges for separate printers.

379
Q
  1. The term used to define all input and output devices in a computer system is(a) Software(b) Monitor(c) Shared resources(d) Hardware(e) None of these
A

(d)Explanation: (d) The hardware, in computer, refers to the physical equipment required to create, use, manipulate and store electronic data. It comprises of the system unit (the core architecture of the computer system that house primary components of a computer like CPU, memory, motherboard, etc); Input devices (eg. keyboard, mouse, etc); and output devices (eg. printer, screen, etc); and storage devices (eg. hard disk, floppy disk, USB, etc).

380
Q
  1. Developing sets of instructions for the computer to follow and to do the task the same way as many times as needed is called__.(a) sequencing(b) listing(c) programming(d) directing(e) None of these
A

(c)Explanation: (c) The computer programming refers to the process of developing and implementing various sets of instructions to enable a computer to do a certain task. These instructions are considered computer programs and help the computer to operate smoothly.

381
Q
  1. The benefit of using computers is that____.(a) Computers provide accurate output even when input is incorrect(b) Computers are very fast and can store huge amounts of data(c) Computers are designed to be inflexible(d) All of these(e) None of these
A

(b)Explanation: (b) Computers are electronic devices that have the ability to process data or information very fastly. It can execute millions of instructions per second. They help speed up calculations & information retrieved which in turn speeds up business operations. eg. Processing payrolls, collecting consumer feed back, etc is made quicker through the use of computers. Also, they have the ability to store large amounts of data in a very small space. The storage capacity of a computer is virtually unlimited. This makes them convenient, inexpensive & also saves space.

382
Q
  1. _____is the process of carrying out commands.(a) Storing(b) Fetching(c) Decoding(d) Executing(e) None of these
A

(d)Explanation: (d) Execution is a part of the instruction cycle when data processing actually takes place. The instruction is carried out upon the data (executed). That is, when the command is executed, the CPU carried out the instructions in order by converting them into macrocodes. Also, the result of the processing is stored in memory by CPU.

383
Q
  1. The portion that shows all the choices you can make while working in a window is called the_____(a) table(b) options(c) menu bar(d) item bar(e) None of these
A

“(c)Explanation: (c) A menu bar is a horizontal bar, typically located at the top of the browser or application window below the title bar, containing drop-down menus like file, edit, font, Tools, Help that allow the user to interact with the content or application in various ways. For eg. in Microsoft word, ““File”” menu provides options to open a file, create a new one, save it, print, etc. ““Edit”” menu allows the user to copy, paste, find and replace text, etc.”

384
Q
  1. Computers connected to a LAN (local area network) can _____.(a) go on line(b) run faster(c) share information and/or share peripheral equipment(d) E-mail(e) None of these
A

(c)Explanation: (c) A Local Area Network (LAN) supplies networking capability to a group of computers in close proximity to each other such as in an office building, a school, or a home. A LAN is useful for sharing resources like files, printers, etc.

385
Q
  1. To shrink a window to an icon__(a) minimise a window(b) open a group window(c) maximise a window(d) restore a window(e) None of these
A

(a)Explanation: (a) Minimize is an active available in all GUI operating systems that allow a user to hide a window, but keep the application running and accessible. The minimize button is represented by an underscore in the top right corner of the window. When minimized, the program will remain on the taskbar, but not visible. When minimized, the program can be accessed by the icon behind the file manager.

386
Q
  1. Which is not an item of hardware?(a) A keyboard(b) An MP3 file(c) A disk drive(d) A monitor(e) None of these
A

(b)Explanation: (b) MP3 file is a compressed audio file, which allows it to bent easily over the Internet. • Keyboard, monitor, disk drive are referred to as hardware as these physical components can be seen & touched.

387
Q
  1. Another word for the CPU is ___(a) execute(b) microprocessor(c) micro chip(d) decode(e) None of these
A

(b)Explanation: (b) A CPU (also known as Microprocessor) is a silicon integrated circuit sometimes called a computer chip . This is because it consists of a square piece of crystallized silicon that is very, very thin. It consists of millions of transistors connected by very thin wires. It carries out the instructions of a computer program by performing the basic arithmetical, logical and input/ output operations of the system thereby converting data into information.

388
Q
  1. _____ is a set of computer programs that runs or controls computer hardware and acts as an interface with application programs and users.(a) A compiler(b) Object code(c) An operating system(d) The CPU(e) None of these
A

(c)Explanation: (c) An operating system is a collection of software that manages computer hardware resources and provide common services for computer programs. Examples of operating system include windows, DOS, Linux, etc. The windows family of operating systems (eg. NT, 95, 98, XP professional, etc) includes a graphical user interface (GUI) that makes the software user friendly.

389
Q
  1. A(n) —contains commands that can be selected.(a) menu(b) pointer(c) icon(d) button(e) None of these
A

“(a)Explanation: (a) A menu is a list of command or choices offered to user. Menus are commonly used in GUI and allow a user to access various options the program is capable of performing, eg. In Microsoft word, ““File”” menu provides options to open a file, create a new one. Save it, print it. ““Edit”” menu allows the user to copy, paste, find and replace the text, etc.”

390
Q
  1. Which of the following is not true about passwords ?(a) Password should be maximum 6 characters in length(b) A password should be a combination of mixed case alphanumeric characters(c) A password that can be memorized easily should be used, so that it need not be noted down(d) A password that can be typed quickly without much effort should be used(e) None of these
A

(a)Explanation: (a) Minimum/maximum password length specifies the required length of a password. For a password to be not easily cracked by hackers, it should be atleast 6 characters in length.

391
Q
  1. Which of the following is a common extension used in the file names for application programs?(a) DIR(b) EXE(c) TXT(d) DOC(e) None of these
A

(b)Explanation: (b) An executable file is a file in a format that the computer can directly execute. It causes a computer to perform indicated tasks according to encoded instructions as opposed to a data file that must be passed by a program to be meaningful.Q901. Where is the disk put to enable the computer to read it ?(a) Memory(b) Disk drive(c) CPU(d) ALU(e) None of these (b)Explanation: (b) A disk drive is a device that allows a computer to read from and write to computer disks. There are different types of disk drives for different types of disks. eg. a hard disk drive reads and writes hard disks. A magnetic disk drive reads magnetic disks and an optical drive reads optical disks.

392
Q
  1. To ____ a document means to make changes to its existing content.(a) save(b) format(c) edit(d) print(e) None of these
A

(c)Explanation: (c) Editing a document involves opening the existing document in the appropriate editor application, then saving the changes and checking the document back in. Document you edit are automatically checked out. eg. in MS-Word, depending on a documents, its final format and its purpose, the editing can involve checking grammar and spelling, content, word choice and formatting.

393
Q
  1. If you want to move an icon on your desktop, this is called_____.(a) highlighting(b) double clicking(c) dragging(d) pointing(e) None of these
A

(c)Explanation: (c) In a graphical user interface, dragging refers to moving an icon or other image on a display screen. To drag an object across a display screen, you select the object with a mouse button (graph it) and then move the mouse while keeping the mouse button pressed down.

394
Q
  1. Information on a computer is stored as -(a) digital data(b) analog data(c) modem data(d) watts data(e) None of these
A

(a)Explanation: (a) Computer information is digital. This means that it is made up of discrete, countable units (digits) and can be sub divided as opposed to analog information, which continuously varies over arrange of values. Computers store and process information in a digital format, but human process and store analog information. By reducing information to digits, It can be used more efficiently by computers.

395
Q
  1. Hardware devices that are not part of the main computer system and are often added later to the system are ____(a) highlight(b) clip art(c) execute(d) peripherals(e) None of these &
A

(d)Explanation: (d) A peripheral device (or auxilliary device) is a hardware device that allows a computer to perform an additional function, but is not something the computer needs in order to work. It includes Input devices such as Keyboard, Mouse, etc, Output devices such as Monitor, Printer, etc; and storage devices such as hard disk; floppy disk, etc.

396
Q
  1. What is the full form of KB related to computer?(a) Kernel Boot(b) Key Block(c) Kilo Byte(d) Kit Bit(e) None of these
A

(c)Explanation: (c) A KB (kilobyte) is a unit of memory or data which is equal to 1,024 (or 210) bytes.

397
Q
  1. Something which has easily-understood instructions is said to be_____.(a) information(b) user friendly(c) word processing(d) icon(e) None of these
A

(b)Explanation: (b) In computer, user-friendly refers to something which is easy to learn, understand and deal with. eg. menu-driven programs are considered more user friendly than command driven systems. Graphical user interfaces are also considered user friendly. They all make it easier for novices to use a computer.

398
Q
  1. IT stands for_____.(a) Integrated Technology(b) Information Technology(c) Intelligent Technology(d) Interesting Technology(e) None of these
A

(b)Explanation: (b) Information Technology (IT) is the application of computers and telecommunication equipment to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise. Several industries are associated with IT, such as computer hardware, software, electronics, semi-conductor, internet, telecom-equipment, e-commerce and computer services.

399
Q
  1. Which of the following is part of the System Unit ?(a) CPU(b) Monitor(c) CD-ROM(d) Floppy Disk(e) None of these
A

(a)Explanation: (a) System unit is part of a Micro computer that contains the CPU. Also known as the system cabit or chassis, it is the container that houses most of the primary electronic components that make up the computer system. It forms the core architecture of any computer system. Two main components of a system unit are CPU and Memory.

400
Q
  1. Which of the following is not an example of hardware ?(a) Printer(b) Mouse(c) Monitor(d) EXCEL(e) None of these
A

(d)Explanation: (d) • Mouse, printer, monitor are hardware devices which are physical components that can be seen & touched. • Microsoft Excel is an application software present in MS-Office suite of windows operating systems.

401
Q
  1. All the deleted files go to(a) Task bar(b) Recycle bin(c) Tool Bar(d) My Computer(e) None of these
A

(b)Explanation: (b) Recycle bin is a wastebasket that works as location or Directory for deleted files or folders. All the files, folders, programs that you discard gets stored in it and you must empty it to permanently delete files & folders from your computer.

402
Q
  1. When you save the following, the data would remain intact even after turning off computer?(a) Motherboard(b) RAM(c) Secondary Storage Device(d) Primary Storage Device(e) None of these
A

(c)Explanation: (c) Secondary storage devices (also called external or auxilliary storage) is a storage medium that holds the data and information until it is deleted by the user regardless if the computer has power. It is non-volatile in nature. eg. Floppy disk, hard disk, CD, DVD, etc.

403
Q
  1. What does happen in RAM when computer is turned off?(a) BIOS(b)Operating System(c) Software Application(d) Nothing(e) None of these
A

“(d)Explanation: (d) When you are working on a document on PC, the document is temporarily stored in computer’s main memory or RAM. RAM is the ““working”” memory of the computer that stores applications and programs that is actively used while the system on.”

404
Q
  1. Personal computers are connected to form ____(a) Super Computer(b) Server(c) Network(d) Enterprise(e) None of these
A

(c)Explanation: (c) A computer network is a group of computers and other hardware devices that are linked together through communication channels to facilitate communication and resource sharing among a wide range of users.

405
Q
  1. What is the purpose of Software Documenting?(a) to sell software at handsome price(b) use and maintenance of software(c) to sell software to many customers(d) to show its importance(e) None of these
A

(b)Explanation: (b) Software documentation refers to a comprehensive information on the capabilities, design details, features and limitations of a system or application software. It may also include software licencing requirements, and comes usually as a printed document or as another piece of software on a disk or CD. It is also called software mannual. It helps the user in guiding how to install, operate, maintain, etc system or software.

406
Q
  1. A small figure which depicts some application on the screen is called(a) Photo(b) Menu(c) Modem(d) Icon(e) None of these
A

(d)Explanation: (d) A computer icon is a small picture that represents an objects or program. When you click icon, the associated object or program will be opened. Icons help in quickly identifying a type of object or programs associated with the icon.

407
Q
  1. The blinking symbol which indicates the next character will appear at which place, is called(a) Control key(b) Delete key(c) Cursor(d) Return key(e) None of these
A

(c)Explanation: (c) A cursor refers to a movable indicator on a computer screen identifying the point that will be affected by input from the user.Q918. What is output?(a) User gives to processor(b) Processor takes from user(c) Processor gets from user(d) Processor gives to user(e) None of these (d)Explanation: (d) Any information that has been processed and comes from a computer or computer device and presented to the user for his/her use.(eg. decision making) is considered an output. Some of the examples of computer output includes reports, documents, music, graphs, pictures, etc.

408
Q
  1. The name given to a document by user is called(a) Program(b) Filename(c) Data(d) Record(e) None of these
A

(b)Explanation: (b) A filename is the name used to uniquely identify a computer file stored in a file system. The filename usually consist of an extension that indicates what type of file it is.

409
Q
  1. What is the shape of CDs?(a) Rectangular(b) Quadrilateral(c) Circular(d) Hexagonal(e) None of these
A

(c)Explanation: (c) A compact disc (CD) is a small, portable, round medium made of moulded polymer for electronically recording, storing, and playing back audio, video, text and other information in digital form. Different types of CD inclide CDROM, CD-R, CD-RW, DVD, etc.

410
Q
  1. In DOS, which of the following command is used to delete all the files as well as sub-directories of a directory?(a) Del(b) Delete(c) Deltree(d) Move(e) None of these
A

(c)Explanation: (c) Deltree, short for delete tree, is a command in DOS to delete a directory including all files and sub directories that are in it. All files and sub directories subordinate to the directory you are deleting will also be deleted regardless of any attributes. This means that even if a file has hidden, system, read only or other attributes, it will still be deleted : DELTREE [1Y] [drive :] path [[drive:] [path[…]]

411
Q
  1. The most common subtotal used Subtotals command is the ______ function, which causes Excel to display a sum each time the control field change.(a) SUM(b) ADD(c) TOTAL(d) LIST(e) None of these
A

(a)Explanation: (a) The SUM function in excel takes all of the values in each of the specified cells and totals their values. The syntax is = SUM (first value, second value, etc). You can enter constant, cell, range of cells in the above SUM formula.

412
Q
  1. A ______ is a collection of computers and device connected together.(a)memory card(b) protocol(c) network(d) central processing unit(e) None of these
A

(c)Explanation: (c) A computer network is a group of two or more computers that allow computers to sharehardware such as printer, faxes, etc. and exchange software such as program files, documents, data, etc.

413
Q
  1. A saved document is referred to as a ____.(a) word(b) file(c) folder(d) project(e) None of these
A

(b)Explanation: (b) A file is a collection of data or information. Every file has a unique name called filename. Almost all information stored/ saved in a computer must be in a file. There are many different types of files that store different types of information. eg. program files store programs, text files store text, etc.

414
Q
  1. Use the ______, to choose a slide layout.(a) Format gallery(b) Quick Styles gallery(c) Layout gallery(d) Layout collection(e) None of these
A

“(c)Explanation: (c) A layout gallery displays thumbnails of various slide layouts that are available in powerpoint. Layout gallery is available next to ““new slide”” in the ““slides”” group on the ““Home”” tab in MS-Powerpoint.”

415
Q
  1. A(n) _____ is text that you want to be printed at the bottom of the pages.(a) endnote(b) header(c) footnote(d) footer(e) None of these
A

(d)Explanation: (d) A footer refers to an area at the bottom of a document page; seperated from the main body of text; that holds data common to several pages. user can edit the footer to change one or all off the footer on each of the pages in a document. The footer may contain the page numbers, data created, copyrights or other information.

416
Q
  1. _____ is when the computer is turned on and the operating system is loading.(a) Flashing(b) Booting(c) Tracking(d) Taping(e) None of these
A

(b)Explanation: (b) Booting refers to loading the first piece of software that starts a computer-because the operating system is essential for running all other programs, it is usually the first piece of software loaded during the boot process.

417
Q
  1. Underlined text, such as text and folder names is referred to as a(a) hyperlink(b) icon(c) menu(d) source drive(e) None of these
A

(a)Explanation: (a) A hyperlink is a graphic or a piece of text in an Internet document that can connect user to another webpage or another portion of a document. A hyperlink shows up as a single word or group of words that will usually be marked as underlined, and are frequently blue in color.

418
Q
  1. Choose the web-browser among the following :(a) Yahoo messenger(b) MSN messenger(c) Rediffbal. net(d) Netscape Navigator(e) None of these
A

(d)Explanation: (d) Netscape Navigator is a popular web browser developed by Netscape communication.There are many versions of navigator and it runs on all the major platforms- Windows, Machintose and UNIX.

419
Q
  1. The _______, also called the Web, contains billions of documents.(a) HTTP(b) World Wide Web(c) Web Portal(d) Domain(e) None of these
A

(b)Explanation: (b) World Wide Web (WWW or W3 or simply Web) is a system of interlinked hypertext documents accessed via the Internet.

420
Q
  1. PCM is an example of(a) digital to analog(b) digital to digital(c) analog to analog(d) analog to digital(e) None of these
A

(d)Explanation: (d) PCM (Pulse Code Modulation) is a sampling technique for digitizing analog signals, especially audio signals. The signals in PCM are binary, that is, there are only two possible states, represented by logic 1 (high) and low 0 (low). Using PCM, it is possible to digitize all forms of analog data, including fullmotion video, voices, music, telemetry and virtual reality.

421
Q
  1. The_____ allows you to access object and start programme.(a) XP menu(b) Default menu(c) Start menu(d) Stop menu(e) None of these
A

(c)Explanation: (c) The start menu is divided into 3 parts : The large left pane shows a short list of programs on your computer. Clicking all programs displays a complete list of programs. By clicking you can start a program. In the lower left corner the search box, which allows you to look for programs and files on your computer by typing in search terms. The right pane provides access to commonly used folders, files, settings and features.

422
Q

“933. In UNIX, command “” $”” is used to(a) repeat entire last command line(b) repeat last word of last command line(c) count the number of arguments(d) match to unknown values(e) None of these”

A

(b)Explanation: (b) $ in unix repeats the last argument for the command last used. repeats the line last entered at the shell.

423
Q
  1. A computer program that will search its database to find items whose text contains all or at least one of the words given to it.(a) Internet-Explorer(b) Search engine(c) Searching techniques(d) Particular keywords(e) None of these
A

(b)Explanation: (b) A search engine is a set of programs used to search for information within a specific realm and collate that information in a database. It searches documents and files for keywords and returns the results of any files containing those keywords. People often use this term in reference to Internet search engine, which are typically designed to search the internet but they can also be devised for offline content, such as library catalog, the contents of a personal hard drive, catalog of museum collections , etc.

424
Q
  1. If the _____ bit in X.25 standard is set to 1, it means that there is more than one packet.(a) D(b) Q(c) M(d) P(e) None of these
A

(c)Explanation: (c) M (or more) data bit, contained within the X.25 data packet, which is sent by layers higher than layer 3 to inform the destination DTE that more data will follow in the next packet. Using the M bit, packets can be logically grouped together to convey a large block of related information.

425
Q
  1. Multiplexing involves____ path and ____ channel.(a) one, multiple(b) one, one(c) multiple, one(d) multiple, multiple(e) None of these
A

(a)Explanation: (a) In a multiplexed system, a ‘n’ devices share the capacity of one link, eg. in multiplexing, 4 devices direct their transmission streams to a multiplexer (MUX) which combines them into a single stream (many to one). So, there are 4 channels and one path. The word path refers to the physical link. The word ‘channel’ refers to the portion of a path that carries a transmission between a given pair of devices. One path can have multiple or many (n) channels.

426
Q
  1. To print a document, press ___, then press ENTER.(a) CTRL + P(b) SHIFT + P(c) ALT + P(d) ESC + P(e) None of these
A

(a)Explanation: (a) Ctrl + P is the keyboard shortcut to print a document. It opens a print dialog box where user can change settings for printing a document according to this choice.

427
Q
  1. To centre a paragraph using shortcut keys, press ______.(a) CTRL + E(b) CTRL + C(c) CTRL + L(d) CTRL + R(e) None of these
A

(a)Explanation: (a) Ctrl + E, in Microsoft word, is the keyboard short cut key to center-align paragraph. That is, it switches paragraph between centred and left-aligned.

428
Q
  1. By default, Excel positions text in a cell ______.(a) right - aligned(b) left - aligned(c) centered(d) justified(e) None of these
A

(b)Explanation: (b) In Excel, the horizontal and vertical alignment of all data can be changed, By default, text is left-aligned i.e, text runs horizontally form left to right. and values & dates are right-aligned.

429
Q
  1. The _______ becomes different shapes depending on the task you are performing.(a) insertion point(b) active tab(c) mouse pointer(d) ribbon(e) None of these
A

(c)Explanation: (c) Physically moving the mouse moves the graphic pointer (also reffered to as the cursor) on the screen. The pointer has a variety of shapes to indicate its current behaviour. eg. Arrow () is normal select which is used for most objects; Hand is link select which is used for text and graphics links. I is text select which is used for text to indicate a location characters.

430
Q
  1. How many 30-bit SIMMS are required to populate a bank on a 486 system that has a 32-bit data bus?(a) 3(b) 2(c) 4(d) 5(e) None of these
A

(c)Explanation: (c) Due to the differing data bus widths of the memory modules and some processors, sometimes several modules must be installed in identical pairs or in identical groups of four to fill a memory bank. The general rule of thumb is a 286, 386, Sx, 68000 or low-end 68020/68030 system (using a 16 bit wide data bus) would require two 30-pin SIMM for a memory bank. On 386 DX, 486, and full-spec 68020 through 68060 systems (32 bit data bus), either four 30- pin SIMMs or one 72-pin SIMM are required for one memory bank.

431
Q
  1. Which area in an Excel window allows entering values and formulas(a) Menu Bar(b) Title Bar(c) Formula Bar(d) Standard Tool Bar(e) None of these &
A

(c)Explanation: (c) The formula bar in Excel is located above the work area of the spreadsheet. The formula bar displays the data or formula stored in the active cell. It can be used to enter or edit a formula, a function or data in a cell.

432
Q
  1. ____ processes data which is also called brain of the computer.(a) Memory(b) Motherboard(c) RAM(d) Central Processing Unit (CPU)(e) None of these
A

(d)Explanation: (d) A CPU (Central Processing Unit) is referred to as brain of computer as most of the processing of computer system is performed by it. It executes instructions and provides the resultant output. It is responsible for all computational, arithmetic, logical and data processing tasks performed by the computer.

433
Q
  1. Which of the following are the versions of Excel?(a) Excel 2002(b) Excel 2000(c) Excel ME(d) Excel XP(e) All of the above
A

(e)Explanation: (e) Excel 2000, Excel 2002, Excel ME, Excell XP are all different versions of MS-Excel.

434
Q
  1. Which of the following are objects in an access database?(a) queries, reports(b) table, form(c) macros, modules(d) All of the above(e) None of these
A

(d)Explanation: (d) When you use Access to manage all of information in one file, then you can use objects within an access database file. These objects are ; • Tables to store data. • Queries to find and retrieve just the data you want. • Forms to view, add and update data in tables. • Reports to analyze or print data in a specific layout. • Macros can be thought of as a simplied programming language which you can use to add functionality to database. It contains actions that performs tasks such as opening a report, running a query, etc. • Module is a collection of declarations, statements & procedures that are stored together as a unit. Modules can be written in Visual Basic for Applications (VBA) programming language.

435
Q
  1. When SHADOWING is enabled in a computers BIOS :(a) Values are stored twice in the memory for redundancy(b) Instructions stored in various ROM chips are copied into(c) The conventional memory is re-mapped to the top of the(d) Data stored in RAM chips on adapter cards are shadowed(e) None of these
A

(b)Explanation: (b) BIOS shadowing is the process in which the contents of the ROM, are being copied to the RAM allowing the computer to access that information quicker. Some computer BIOs setups may allow theuser to enable and disable this feature.

436
Q
  1. Which of the following are valid Min. & Max. zoom sizes in MSOffice(a) 20, 250(b) 10, 100(c) 10, 500(d) 10, 1000(e) None of these
A

(c)Explanation: (c) MS Office supports minimum 10% Zoom and maximum 500% Zoom capacity. You can enter a custom percentage between minimum 10% and max. of 500%

437
Q
  1. A series 100 POST error code indicates a problem with the :(a) ram or rom(b) hard drive(c) system board(d) video adapter(e) None of these
A

“(c)Explanation: (c) A series of error codes from 100 to 199 indicates problem with system board. system board error code 100 means cannot create another system ““semaphore””. This error code may also display as ““ERRORTOO- MANY-SEMAPHORES”” or as the value OX64.”

438
Q
  1. Which one amongst them is not an inter network ?(a) WAN(b) MAN(c) LAN(d) All are internet works(e) None of these
A

(c)Explanation: (c) A LAN is not an inter network. It supplies networking capability to a group of computers in close proximity to each other such as in an office building, school or home. It is useful for sharing resources like files, printers, games, etc. A LAN in turn often connects to other LANs, and to the Internet or other WAN.

439
Q
  1. What contains the computer BIOS and maintains its data with the use of a battery for periods when the system is powered down?(a) RAM(b) CMOS(c) DRAM(d) CPU(e) None of these
A

(b)Explanation: (b) Non volatile BIOS memory refers to a small memory on PC motherboards that is used to store BIOS settings. It was traditionally called CMOS RAM because it used a volatile, low-power complementary metal-oxide semiconductor (cmos) SRAM powered by a small battery when system power was off.

440
Q
  1. Which of the following are mandatory parts of complete PC system ?(a) Input and output(b) Hardware and software(c) Keyboard and printer(d) All of the above(e) None of these
A

(b)Explanation: (b) The components of a computer can be broadly classified into : Hardware and software. Hardware refers to any physical component that can be seen or touched, eg. CPU, monitor, etc. Software refers to the programs which are required to operate the computer, eg. system software like operating system.

441
Q
  1. Jon Von Neumann developed :(a) First electronic chip flip flop(b) The first electronic computer(c) Stored-program concept(d) None of these(e) None of these
A

(c)Explanation: (c) Stored program concept refers to storage of instructions in computer memory to enable it to perform a variety of tasks in sequence or intermittendtly. The idea was introduced in the late 1940s by John Von Neumann, who proposed that a program be electronically stored in binarynumber format in a memory device, so that instructions could be modified by the computer as determined by intermediate computational results.

442
Q
  1. For electronic banking, we should ensure the existence and procedures with regard to(a) Corrective steps to be taken in case of any deficiencies in the system(b) Identification of customers who become members electronically(c) Steps for complying with the laws, rules and regulations(d) All of the above(e) None of these
A

(b)Explanation: (b) Identification of customers who become members electronically is important and proper procedure should be laid down to ascertain the identification of new customers in order to avoid any fraud or theft.

443
Q
  1. Which of the following is not a component of an e-wallet ?(a) Communication manager(b) Digital cash(c) User profile manager(d) All of the above(e) None of these
A

(b)Explanation: (b) E-Wallet (or digital wallet) was first conceived as a method of storing various forms of electronic money (e-cash or digital cash). It can store multiple monetory & identification implements. Monetary implements include cash, debit & credit cards & stored value cards while identification includes national or state identification includes national or state identification cards & driver’s licences. Components of digital wallet include- Instrument manager, protocol manager, wallet controller, User profile manager, communication manager. The client API and user interfaces.

444
Q
  1. Which of the following is most reliable and robust amongst following though does not have high processing power ?(a) Server(b) Supercomputer(c) Microcomputers(d) MACs(e) None of these
A

(c)Explanation: (c) Microcomputers are less powerful, yet reliable and robust. They are the most widely used and fastest growing. There are 4 types of micro computers- Desktop, Notebook, Tablet PC and Handheld computers.

445
Q
  1. Which of the following is to be done by the auditor while internet banking services audit ?(a) The user is not allowed to login after defined repeated failed attempts(b) Tour the server room(c) Contract clearly states the services that will be provided by the vendor(d) All of the above(e) None of these
A

(b)Explanation: (b) During internet banking services audit, inspection of server rooms is done by the auditor. Server room maintanence is necessary to maintain peak operation of a client IT netwok. Server room inspection is done to check both physical & logical security. Physical security may involves. proper surveillance system installed, locking up of server room, fire detecting & system, proper, backups, sprinkler system, etc. Logical security may involve user access methods, antivirus software installed on servers. Firewalls, on servers, regular review of software & data content on servers, etc.

446
Q
  1. In case of a virus getting into computer. Which of the following will help?(a) NORTON(b) Encryption(c) Police complaint(d) All of the above(e) None of these
A

(a)Explanation: (a) Antivirus software like NORTON is security utility program. It is a software that prevents, search for, detect and remove software viruses and other malicious software like worms, trojans,adware, etc. Installing anti-viruses software an your computer system protects your system from futuer infection.

447
Q
  1. The horizontal and vetical lines on a worksheet are called -(a) sheets(b) cells(c) blocklines(d) gridlines(e) None of these
A

(d)Explanation: (d) Gridlines are the faint horizontal & vertical lines on a worksheet that appear around cells in Excel. They are used to distinguish cells on the worksheet. Gridlines do not print by default. They are displayed on worksheet by default but user can hide them also.

448
Q
  1. Processing control procedures have(a) Access control for online data(b) Authorisation and authentication of users(c) Reporting of before and after images(d) All of the above(e) None of these
A

(d)Explanation: (d) Processing control (or access control) procedures answer appropriate access to information and information processing facilities- including main frames, servers, desktop and laptop clients, mobile devices, applications , operating systems and network services-and prevent inappropriate access to such resources. It is based on techniques of user authentication, validation, authorization, etc.

449
Q
  1. Firewall is used in PC for(a) Authentication(b) Security(c) Data transmission(d) All of the above(e) None of these
A

(b)Explanation: (b) A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analysing the data packets and determining whether they should be allowed through or not, based on a rule set.

450
Q
  1. The information you put into the computer is called(a) data(b) facts(c) files(d) directory(e) None of these
A

(a)Explanation: (a) Data are the quantities, characters or symbols on which operations are performed by a computer, being stored and transmitted in the form of digital signals and recorded on magnetic, optical or mechanical recording media. Data forms input to the computer which is processed into information.

451
Q
  1. The person who writes and tests computer programs is called a(a) computer scientist(b) programmer(c) software engineer(d) project developer(e) None of these
A

(b)Explanation: (b) A computer programmer write code or instructions to make the computer do specific tasks. These instructions are called programs. Before writing the code, the programmer gets the algorithm from a software engineer. To write those instructions, programmers use programming languages such as C, C++, Java, COBOL, etc.

452
Q
  1. E-mail (electronic mail) is(a) a real-time typed conversation that takes place on a computer(b) an Internet standard that allows users to upload and download files(c) an online area in which users conduct written discussions about a particular subject(d) the transmission of messages and files via a computer network(e) None of these
A

(d)Explanation: (d) An email is a system of World Wide electronic communication in which a computer user can compose a message at one terminal that can be regenerated at the recipient’s terminal when the recipient logs in . It is a method of exchanging digital messages from an author to one or recipients.

453
Q
  1. Restarting a computer that is already on is referred to as(a) cold booting(b) shut down(c) warm booting(d) logging off(e) None of these
A

(c)Explanation: (c) Warm boot refers to restarting a computer that is already turned on via the operating system. Restarting it returns the computer to its initial state. A worm boot is sometimes necessary when a program encounters an error from which it cannot recover on PCs, you can perform a warm boot by pressing Control, Alt and Delete keys simultaneously.

454
Q
  1. The name that the user gives to a document is referred to as(a) file-name(b) document-name(c) name-given(d) document-identity(e) None of these
A

(a)Explanation: (a) A file name is the name used to uniquely identify a computer file stored in a file system. The file name usually consist of an extension that indicates what type of a file it is.

455
Q
  1. Which of the following groups consist of only input devices?(a) Mouse, Keyboard, Printer(b) Mouse, Keyboard Monitor(c) Mouse, Keyboard, Plotter(d) Mouse, Keyboard, Scanner(e) None of these
A

(d)Explanation: (d) Mouse, Keyboard, Scanner all input devices that help the user in entering letters/symbols/ numbers/commands/functions/ digital image into one computer for further processing.

456
Q
  1. The most common method of entering text and numerical data into a computer system is through the use of a(a) scanner(b) keyboard(c) printer(d) plotter(e) None of these
A

(b)Explanation: (b) Input devices refer to those peripheral devices that allow data and instructions to enter a computer. They translate data from human understandable form into machine readable form. Keyboard is the primary input device of most of the computer systems which helps the user in entering letters/numbers/symbols/ commands into computer for further processing to turn them into meaningful information.

457
Q
  1. Hardware includes(a) sets of instructions that a computer runs or executes(b) all devices used to input data into a computer(c) the computer and all the devices connected to it that are used to input and output data(d) all devices involved processing information including the central processing unit, memory, and storage(e) None of these
A

(c)Explanation: (c) The hardware, in computer refers to the physical equipment required to create, use, manipulate and store electronic data. It consists of the system unit (core architecture of the computer system that houses primary components of a computer like CPU, Memory, Motherboard, etc); input devices (monitor, speaker, etc); and storage devices (optical disks, magnetic disks,etc).

458
Q
  1. A chat is(a) a typed conversation that takes place on a computer(b) an Internet standard that allows users to upload and download files (c) an online area in which users conduct written discussions about a particular subject (d) the transmission of messages and files via a computer network(e) None of these
A

(a)Explanation: (a) Chat refers to real time communication between two or more users via Computer & Internet. eg. When talking to someone in chat, any typed text is received by other participants immediately. This is different from other text-based communication such as email where it could be couple of hours, days or weeks to receive a response.

459
Q
  1. The output devices make it possible to(a) store data(b) view or print data(c) scan data(d) input data(e) None of these
A

(b)Explanation: (b) Output devices are the peripheral devices that allow information to be represented to the user after processing. This is called as output. Common output formats are printed paper, sound, video and on-screen documents. They let the user communicate with the user.

460
Q
  1. We are shifting towards computerisation because(a) Technologies help in meeting the business objectives.(b) Current technologies are available(c) Hire the employees that are expert in the latest technologies are available(d) All of the above(e) None of these
A

(a)Explanation: (a) Computer-based technologies is an integration of hardware and software technologies and human elements to produce timely, integrated, accurate and useful information for decision making purposes. Businesses are relying today on computerbased technologies because of their ability to meet business objectives, eg. use of data mining software to study market trends helps business to improve their revenue.

461
Q
  1. Which of the following has been created by research facility of Digital Equipment Corporation of USA ?(a) Alta Vista(b) Yahoo (c) Web Crawler(d) All of the above(e) None of these
A

(a)Explanation: (a) Alta vista is the name of a software firm associated with Digital Equipment Corporation. (DEC). Alta Vista offers software products you can use to locate & manage information on the internet or a private computer network that uses internet tools (or intranet). The best known product from this company is Alta Vista search system that anyone can use it to find information on World Wide Web.

462
Q
  1. ____ is an animated character that gives help in MSOffice?(a) Comic Assistant(b) Office Worker(c) Office Assistant(d) All of the above(e) None of these
A

(c)Explanation: (c) The Microsoft offfice Assistant was an office feature designed to assist users using an interactive animated character who retrieved information from office Help content. In MS-Office for Windows, it was included in versions 97 to 2003. Microsoft turned off this feature by default in office XP and removed it altogether in office 2007.

463
Q
  1. Which of the following is false about change in computer from one generation to the next ?(a) Speed of processing increases(b) Computer size is decreased(c) Memory/Storage capacities decreases(d) All of the above(e) None of these
A

(c)Explanation: (c) Each generation of a computer is characterized by a major technological development that fundamentally changed the way computers operate, resulting in increasingly smaller, cheaper, more powerful and more efficient and reliable computing devices. With every next generation, computer size decreased, speed of processing increased and memory or storage capacities increased.

464
Q
  1. The first generation computers had?(a) Magnetic tape and transistors(b) Vacuum tubes and magnetic drum(c) ICs(d) All of the above(e) None of these
A

(b)Explanation: (b) The first generation computers used vaccum tubes for circuitry and magnetic drums for memory and were often enormous, taking up entire rooms. They generated a lot of heat and used a great deal of electricity. So, they were difficult to operate. For eg. UNIVAC and ENIAC were first generation computers.

465
Q
  1. Artificial Intelligence can be used in every sphere of life because of its(a) Ability to think like human beings(b) Ability to work in hazardous places(c) Ability to work in artificial environments(d) All of the above(e) None of these &
A

(a)Explanation: (a) Artificial Intelligence (AI) is the branch of computer science concerned with making computers behave like humans. when it comes to making complex judgement, computer’s can’t replace humans. But with AI, computers can be trained to think like humans do. AI allows computers to learn from experience, recognize patterns in large amounts of complex data and make complex decision based on human knowledge and reasoning skills.

466
Q
  1. Which input device cannot be used to work in MS Office?(a) Light Pen(b) Scanner(c) Mouse(d) Joy Stick(e) None of these
A

(d)Explanation: (d) A joystick is a cursor control device used in computer games and assistive technology. It allows an individual to move an object in a game such as navigating a plane in a flight simulator. MS-Office is an office suite to do various type of official work such as making presentation, letter writing, data entry, etc.

467
Q
  1. MS Office provides help in many ways. Which of these are more closer to the answer?(a) Office Assistant(b) What’s This(c) Help Menu(d) All of the above(e) None of these
A

(d)Explanation: (d) There are different ways to get help in an office application. • Office assistant : You ask the office assistant a question, it supplies you with a list of possible answers that provide links to various Help topics. • Help menu : You can directly access the Help Window, select Help and then the help command for the application you are using, such as Microsoft Word Help or press F1. • What is this : Get help on a particular element you see onscreen with the what’s this? tool.

468
Q
  1. Which of the following makes a network insecure ?(a) Network Interface Card (NIC)(b) Encryption(c) Static keys(d) All of the above(e) None of these
A

(c)Explanation: (c) A static key is one you use more than once over a long period of time. It is often considered less secure than using an ephemeral key (that changes each time) because • An eavesdropper gets more material to work with. • If an attacker breaks the key, they can decrypt multiple messages. • It gives the attacker the possibility of arranging a known plain text attack.

469
Q
  1. Which of the following search engines continuously sends out that starts on a homepage of a server and pursue all links stepwise ?(a) Packets(b) Spiders(c) Cookies(d) Paddle(e) None of these
A

(b)Explanation: (b) A program that automatically fetches Web pages. Spiders are used to feed pages to search engines. It’s called a spider because it crawls over the web. Another term for these programs is Web Crawler.

470
Q
  1. DMA module can communicate with CPU through—(a) Cycle stealing(b) Interrupt(c) Branch instruction(d) Signal sensor(e) None of these
A

(a)Explanation: (a) Cycle stealing is a method of accessing RAM without interfering with the CPU. It is similar to DMA for allowing I/O controllers to read or write RAM without CPU intervention. It describes the stealing of a single CPU cycle to allow a DMA engine to perform a DMA operation.

471
Q
  1. Assembly language programs are written using(a) Mnemonics(b) Hex code(c) ASCII code(d) CTZ ALT(e) None of these
A

(a)Explanation: (a) Assembler programs are written with short abbreviations called MNEMONICS. In assembly language a mnemonic is a code, usually from 1 to 5 letters, that represents an opcode, a number, programming in machine code, by supplying the computer with the numbers of the operations it must perform, can be quite a burden, because for every operation the corresponding number must be looked up or remembered. Looking up all numbers takes a lot of time, and mis-remembering a number may introduce computer bugs. Therefore a set of mnemonics was devised. Each number was represented by an alphabetic code.

472
Q
  1. All of the following are examples of real security and privacy risks EXCEPT:(a) Viruses(b) Hackers(c) Spam(d) Identity theft(e) None of these
A

(c)Explanation: (c) Spam is the use of electronic messaging systems to send unsolicited bulk messages, especially advertising, indiscriminately, while the most widely recognized form of spam is email spam.

473
Q
  1. Electronic fund transfer is the exchange of money(a) From one account to another(b) From one place to another(c) From one bank to another(d) All of the above(e) None of these
A

(a)Explanation: (a) EFT (Electronic Fund Transfer) is the electronic exchange, transfer of money from one account to another, either within a single financial institution or across multiple institutions through computer based systems.

474
Q
  1. To avoid the wastage of memory, the instruction length should be(a) Of word size only(b) Multiple of character size only(c) Of file size only(d) Of word size which is multiple of character size(e) None of these
A

(d)Explanation: (d) Character size is one of the influence on a choice of word size. Before the mid 1960s,characters were most often stored in 6 bits; this allowed no more than 64 characters 80 alphabets were limited to upper case. Since it is efficient in time and space to have the word size be multiple of the character size, word sizes in this period were usually of 6 bits (in binary machines). A common choice then was the 36-bit word.

475
Q
  1. A process known as ____ is used by large retailers to study trends.(a) POS(b) data selection(c) data mining(d) data conversion(e) None of these
A

(c)Explanation: (c) Data mining is the process of studying trends, finding correlations and patterns among dozens of fields in large relational databases, eg. one grocery chain used the data mining software to analyze local buying patterns. They discovered that when men bought diapers on Thursday and Saturdays, they also tended to buy beer. Further analysis showed that these shopper typically did their weekly grocery shopping on Saturdays. On Thursdays, they only bought a few items. The retailer concluded that they purchased the beer to have it available for the upcoming weekend. The grocery chain could use this newly discovered information in various ways to increase revenue. eg. they could move the beer display closer to the diaper display. And they could make sure beer and diapers were sold at full price on Thursdays.

476
Q
  1. Which of the following is single user computer with many features and good processing power?(a) Minicomputer(b) Workstation(c) Microcomputer(d) All of the above(e) None of these
A

(b)Explanation: (b) Workstations are powerful, single-user computers. They have the capacity to store and process large quantities of data, but they are only used by one person at a time. It is similar to a personal computer but is more powerful and often comes with higher-quality monitor. They lie between personal computer and mini-computers.

477
Q
  1. Which of the following is not a standard MSOffice Edition?(a) Advanced(b) CE(c) Standard(d) Professional(e) None of these
A

(a)Explanation: (a) MS Office edition includes CE, Standard, Professional.

478
Q
  1. Which type of commerce is characterised by low volume and high value transactions in Banking ?(a) B2B(b) C2G(c) B2C(d) B2G(e) None of these
A

(c)Explanation: (c) B2B transactions are largevalue and recurring transactions. While B2C are low value, largevolume transactions. C2C transactions are low value and low volume transactions. B2C transactions are those transactions that occur between a business & its end consumer. eg. Online selling of products.

479
Q
  1. A stored link to a web page, in order to have a quick and easy access to it later, is called(a) Bookmark(b) WP-link(c) Field(d) All of the above(e) None of these
A

(a)Explanation: (a) Instead of memorising long web addresses, use browser bookmarks to easily save the web pages you’d like to revisit. It is a great way to save the URL of a website. The simple way to create a bookmark is to click the star icon in the address bar.

480
Q
  1. HTML is basically used to design(a) Web-site(b)Web-page(c) Graphics(d) Tables and Frames(e) None of these
A

(a)Explanation: (a) HTML (Hyper Text Mark up Language) is the main markup language for creating web pages and other information that can be displayed in a web browser. HTML elements form the building blocks of all websites.

481
Q
  1. Which of the following is not an operating system?(a) UNIX(b)DOS(c)MAC (OS)(d) DBMS(e)Windows XP
A

(d)Explanation: (d) DOS, UNIX, MAC(OS) and Windows XP these are the operating system but DBMS is a computer software program that is designed as the means of managing all databases that are currently installed on a system hard drive or network.

482
Q
  1. A _____ is a group of cells that form a rectangle on the screen.(a) Formula(b) Calculation(c) Range(d) Range address(e) None of these
A

(c)Explanation: (c) In excel, a rectangular group of cells is called a range. You can select a range of holding left mouse button down while moving across the range, or by clicking in the top-left corner, holding down the shift key and clicking in the bottom right corner of the range.

483
Q
  1. Which of the following is not a type of HTML pages?(a) Dynamic(b) Static(c) Directory listing(d) Normal(e) None of these
A

“(d)Explanation: 32.(d) Web pages can be either static or dynamic. ““Static”” means unchanged or constant. Standard HTML pages are static Web pages. Each time a HTML page is loaded, it looks the same. ““Dynamic”” means changing or lively, eg. PHP, ASP and JSP pages are dynamic Web pages. Their content can generated on-the-fly. Directory listing is a type of Web page which is displayed when the index page of a Website is requested by the browser and it doesn’t exist on server. So, either an error or directory listing is served to the browser.”

484
Q
  1. Router functions in the _____ layer.(a) Data link(b) Physical(c) Network(d) All of the above(e) None of these
A

“(d)Explanation: (d) A router is a device that forwards data packets across computer networks. Routers perform the data ““traffic directing”” functions on the Internet. A router is a microprocessor-controlled device that is connected to two or more data lines from different networks.”

485
Q
  1. How can you increase the font size of selected text by one point every time?(a) By pressing Ctrl + ](b) By pressing Ctrl + [(c) By pressing Ctrl + }(d) By pressing Ctrl + {(e) None of these
A

(a)Q997. What is the maximum length of a text file ?(a) 255 characters(b) There is not limit to how long a text file can be(c) 50 characters(d) 512 characters(e) None of these (a)Explanation: (a) Text file has a 255-character limit.

486
Q
  1. Which command is used to show file system disk usage in UNIX ?(a) ls(b) du(c) df(d) chkdsk(e) None of these
A

(b)Explanation: (b) du (abbreviated disk usage) is a standard UNIX program used to estimate file space usagespace used under a particular directory or files on a file system.

487
Q
  1. In DOS, primary name of a file can have a maximum of _____ characters.(a) 20(b) 10(c) 30(d) 40(e) None of these
A

(b)Explanation: (b) Every file in DOS, must have a unique name. The file name can be from 1 to 10 characters long. It can include upper, lower, or mixed case characters.

488
Q
  1. The basic objective of computer process is to convert data into(a) files(b) information(c) tables(d) graphs(e) None of these
A

(b)Explanation: (b) Computer is an advanced electronic device that takes raw data (unorganized facts & figures) as input from the user and process these data under the control of set of instructions called programs and give the result (output) and saves the output for the future use. The output is in the form of meaningful information (organized, structured and defined in reference to a context) which helps is decision-making.