1. IP address contains ........... bits.
(1) 8 bits
(2)16 bits
(3) 32 bits
(4) 40 bits
(5) None of these
2. Which key is used to indent a paragraph in MS word ?
(1) Shift
(2) tab
(3) Ctrl
(4) Esc
(5) None of these
3. Which is the example of spread sheet ?
(1) MS word
(2) MS excel
(3) Power point
(4) MS Access
(5) None of these
4. Name of the executable file of MS word is-
(1) MS Word
(2) MS Word .exe
(3) Win Word
(4) Win Word.exe
(5) None of these
5. Which disk contains permanent magnetic disk ?
(1) CD
(2) DVD
(3) HDD
(4) BRD
(5) None of these
6._________ is the process of finding and removing errors in software code.
(1) Debugging
(2) Compiling
(3) Testing
(4) Running
(5) None of these
7. ____________ are viruses that are triggered by the passage of time or on a certain date.
(1) Boot-sector viruses
(2) Macro viruses
(3) Time bombs
(4) Worms
(5) None of these
8. Linux is a (n)______ ______ operating system.
(1) open-source
(2) Microsoft
(3) Windows
(4) Mac
(5) None of these
9. What is a backup?
(1) Restoring the information backup
(2) An exact copy of a system’s information
(3) The ability to get a system up and running in the event of a system crash or failure
(4) All of these
(5) None of these
10. Which of the following places the common data elements in order from smallest to largest
(1) character, file, record, field, database
(2) character, record, field, database, file
(3) character, field, record, file, database
(4) Bit, byte, character, record, field, file, database,
(5) None of these
11. What is the file extension of Ms-Word document?
1) Dot
2) Doc
3) Dom
4) Txt
5) None of these
12. The vast network of computers that connects millions of people all over the world is called—
1) LAN
2) Web
3) Hypertext
4) Internet
5) None of these
13.________ is a primary key that also appears in another file.
1) Physical key
2) Primary key
3) Foreign key
4) Logical key
5) None of these
14. The software component of an export system that draws conclusion is the
1) User interface
2) Database
3) Inference engine
4) I/O controller
5) Model Base
15.________ is an invalid type of database key.
1) Structured primary key
2) Atomic primary key
3) Primary key
4) Composite primary key
5) None of these
16. The OSI model is divided into_______ processes called layers.
(1) five
(2) six
(3) seven
(4) eight
(5) None of these
17. System software is the set of programs that enables your computer’s hardware devices and______ software to work together.
(1) management
(2) processing
(3) utility
(4) application
(5) None of these
18. ________ are specially designed computer chips which reside inside other devices, such as your car or your electronic thermostat.
(1) Servers
(2) Embedded computers
(3) Robotic computers
(4) Mainframes
(5) None of these
19. The following are all computing devices , except………
(1) notebook computers
(2) cellular telephones
(3) digital scanners
(4) personal digital assistants
(5) None of these
20. In a ring topology , the computer in possession of the______ can trasmit data
(1) packet
(2) data
(3) access method
(4) token
(5) None of these
ANSWERS
1. (3)
2. (2)
3. (2)
4. (4)
5. (3)
6. (1)
7. (3)
8. (1)
9. (4)
10. (3)
11. (2)
12. (4)
13. (3)
14. (3)
15. (1)
16. (3)
17. (4)
18. (2)
19. (3)
20. (4)
(1) 8 bits
(2)16 bits
(3) 32 bits
(4) 40 bits
(5) None of these
2. Which key is used to indent a paragraph in MS word ?
(1) Shift
(2) tab
(3) Ctrl
(4) Esc
(5) None of these
3. Which is the example of spread sheet ?
(1) MS word
(2) MS excel
(3) Power point
(4) MS Access
(5) None of these
4. Name of the executable file of MS word is-
(1) MS Word
(2) MS Word .exe
(3) Win Word
(4) Win Word.exe
(5) None of these
5. Which disk contains permanent magnetic disk ?
(1) CD
(2) DVD
(3) HDD
(4) BRD
(5) None of these
6._________ is the process of finding and removing errors in software code.
(1) Debugging
(2) Compiling
(3) Testing
(4) Running
(5) None of these
7. ____________ are viruses that are triggered by the passage of time or on a certain date.
(1) Boot-sector viruses
(2) Macro viruses
(3) Time bombs
(4) Worms
(5) None of these
8. Linux is a (n)______ ______ operating system.
(1) open-source
(2) Microsoft
(3) Windows
(4) Mac
(5) None of these
9. What is a backup?
(1) Restoring the information backup
(2) An exact copy of a system’s information
(3) The ability to get a system up and running in the event of a system crash or failure
(4) All of these
(5) None of these
10. Which of the following places the common data elements in order from smallest to largest
(1) character, file, record, field, database
(2) character, record, field, database, file
(3) character, field, record, file, database
(4) Bit, byte, character, record, field, file, database,
(5) None of these
11. What is the file extension of Ms-Word document?
1) Dot
2) Doc
3) Dom
4) Txt
5) None of these
12. The vast network of computers that connects millions of people all over the world is called—
1) LAN
2) Web
3) Hypertext
4) Internet
5) None of these
13.________ is a primary key that also appears in another file.
1) Physical key
2) Primary key
3) Foreign key
4) Logical key
5) None of these
14. The software component of an export system that draws conclusion is the
1) User interface
2) Database
3) Inference engine
4) I/O controller
5) Model Base
15.________ is an invalid type of database key.
1) Structured primary key
2) Atomic primary key
3) Primary key
4) Composite primary key
5) None of these
16. The OSI model is divided into_______ processes called layers.
(1) five
(2) six
(3) seven
(4) eight
(5) None of these
17. System software is the set of programs that enables your computer’s hardware devices and______ software to work together.
(1) management
(2) processing
(3) utility
(4) application
(5) None of these
18. ________ are specially designed computer chips which reside inside other devices, such as your car or your electronic thermostat.
(1) Servers
(2) Embedded computers
(3) Robotic computers
(4) Mainframes
(5) None of these
19. The following are all computing devices , except………
(1) notebook computers
(2) cellular telephones
(3) digital scanners
(4) personal digital assistants
(5) None of these
20. In a ring topology , the computer in possession of the______ can trasmit data
(1) packet
(2) data
(3) access method
(4) token
(5) None of these
ANSWERS
1. (3)
2. (2)
3. (2)
4. (4)
5. (3)
6. (1)
7. (3)
8. (1)
9. (4)
10. (3)
11. (2)
12. (4)
13. (3)
14. (3)
15. (1)
16. (3)
17. (4)
18. (2)
19. (3)
20. (4)
0 comments:
Post a Comment