003) Computer - Sumram
003) Computer - Sumram
AWARENESS
For All Government Job Exams, Especially
designed for Odisha Govt. Job Exams
IDEAL FOR
SSC-CGL, SSC-CHSL, CPO-SI, SSC-MTS SSC-GD, DSSSB, SIBANAND PATTNAIK
RRB-NTPC, RRC-Group D and all other government job exams
Sibanand Pattnaik
All Copyright Reserved
Mail: sibanand99.pattnaik@gmail.com
Disclaimer
This book is meant for educational and learning purposes. The author(s) of the book has/have
taken all reasonable care to ensure that the contents of the book do not violate any existing
copyright or other intellectual property rights of any person in any manner whatsoever. In the
event the author(s) has/have been unable to track any source and if any copyright has been
inadvertently infringed, please notify the publisher in writing for corrective action.
Every effort has been made to avoid errors or omissions in this publication. In spite of this,
errors may creep in. Any mistake, error or discrepancy noted may be brought to our notice
which shall be taken care of in the next edition. It is notified that neither the publisher nor the
author or seller will be responsible for any damage or loss of action to any one, of any kind, in
any manner, therefrom. It is suggested that to avoid any doubt the reader should cross-check
all the facts, law and contents of the publication with original Government publication or
notifications.
For binding mistake, misprints or for missing pages, etc., the publisher's liability is limited to
replacement within seven days of purchase by similar edition. All expenses in this connection
are to be borne by the purchaser.
Sibanand Pattnaik
COMPUTER
AWARENESS
For All Government Job Exams, Especially
designed for Odisha Govt. Job Exams
~ Contents ~
1 Hardware 2
2 Software 5
3 History and Generation 11
4 Programming Language 14
5 Number System & Logic Gate 16
6 Memory & Memory Unit 18
7 Internet 20
8 DBMS 25
9 Security, Virus, Anti-Virus 28
10 Abbreviations and File Ext. 29
11 Networking 31
12 Microsoft Office 35
13 Practice Sets 41
14 Mock Tests 161
Hardware
Hardware 01
WHAT IS COMPUTER?
Computer cannot do anything without a Program. It can
Computer is an electronic device that is designed to
store, retrieve, and process data.
work with Information.
MICR (Magnetic Ink Character Recognition) Web Camera: A webcam is a video camera that feeds
It is a technology which allows machines to read and or streams its image in real time to or through a
process cheque enabling thousands of cheque computer to a computer network.
transactions in a short time. MICR code is usually a
nine-digit code comprising of some important QR (Quick Response)
information about the transaction and the bank. A machine-readable code consisting of an array of
black and white squares,
Processing Unit, Output, Storage (LCD) that uses thin-film transistor (TFT) technology
Microprocessor to improve image qualities such as addressability and
A microprocessor is a computer processor which contrast.
incorporates the functions of a computer's central LED: An LED display is a flat panel display, which
processing unit (CPU) on a single integrated circuit uses an array of light-emitting diodes as pixels for a
(IC), or at most a few integrated circuits. video display.
CPU - (Central Processing Unit)
CPU have three Units Printer
I. Memory Unit A printer is a device that accepts text and graphic
II. Control Unit output from a computer and transfers the information
III. Arithmetic Logic Unit to paper, usually to standard size sheets of paper.
First Microprocessor = 4004 (intel)
A processor register (CPU register) is one of a small Types of Printers
set of data holding places that are part of the computer Impact Printer Non-Impact
processor. Impact printer refers to a Non-impact printers are
class of printers that quieter than impact
Motherboard work by banging a head printers, that prints
A motherboard is the main printed circuit board (PCB) or needle against an ink without striking the
found in general purpose microcomputers and other ribbon to make a mark paper
expandable systems. on the paper.
➢ Dot-matrix Printer ➢ Laser Printer,
Components of Motherboard ➢ Daisy-Wheel ➢ Ink-jet Printer,
• Microprocessor Printers, ➢ LED Page Printer
• RAM/ROM ➢ Line Printers.
• BIOS (Basic Input Output System)
• Expansion slot Plotter
• Interconnecting Circuit The plotter is a computer printer for printing vector
graphics. In the past, plotters were used in applications
Output Devices such as computer-aided design, though they have
• Monitor generally been replaced with wide-format
• Printer conventional printers.
• Plotter Speaker
• Speaker Computer speakers, or multimedia speakers, are
speakers sold for use with computers, although usually
• Projector etc.
capable of other audio uses,
Types of Monitors
Projector
• CRT
A projector or image projector is an optical device that
• LCD/TFT projects an image (or moving images) onto a surface,
• LED commonly a projection screen.
CRT: The Cathode Ray Tube (CRT) is a vacuum tube Storage Devices
that contains one or more electron guns and a • Hard Disk Drive
phosphorescent screen and is used to display images.
• Floppy Disk
• Magnetic Tape
LCD: A flat panel screen that uses the Liquid Crystal
Display (LCD) technology and connects to a • Compact Disc
computer. • Digital Versatile Disc
• Blu Ray Disc
TFT: A Thin-Film-Transistor Liquid-Crystal Display • Pen Drive
(TFT LCD) is a variant of a liquid-crystal display • Memory Card
Software
Software 02
It is a set of programs and procedures. Software tells software serves as the interface between hardware and
the hardware what to do and how to accomplish a the end users. Examples: Operating System,
task. Ex. Operating System (Windows, Unix, Linus, Compilers, Interpreter, Assembler etc.
Mac OS, Web browsers, MS Office etc.
2. Application Software
Types of Software Application software is the set of programs necessary
1. System Software to carry out operations for a specified application.
The system software is collection of programs Application software’s are designed and developed to
designed to operate, control, and extend the processing solve a specific problem in business or scientific area.
capabilities of the computer itself. System software are Examples: Word processors, Data Base System,
generally prepared by computer manufactures. System Accounting Packages, DTP Packages. Graphics
Packages, etc.
because of clicking on
icons and sub- icons, etc
icons that the Flexibility It is a little It is highly
GUI has flexible to use flexible
inbuilt on the especially for because a
window or the advanced users graphical
user interface. since the only interface is
Memory The memory The memory command is to provided for
requirement requirement is requirement is be written for executing a
low because high since it executing a task. task.
there is nothing needs to be
to be installed. installed on Some More types of Operating System
the computer.
Interaction The user can The user
1. Batch OS
In this system, the OS does not forward the jobs/tasks
with user interact with a interacts with
directly to the CPU. It works by grouping together
computer by the computer
similar types of jobs under one category. Further, we
using by using
name this group as a ‘batch’. Hence, the name batch
commands like graphical
OS.
text formats like
Examples are the payroll system, bank statement, etc.
icons and
images, etc
Speed It has high speed It has low 2. Time-Shared OS
since commands speed since When more than one task takes place on the system it
are typed and the user needs is called time-shared OS. As multiple tasks can run at
executed. to click an the system at a time as per requirement. Hence, they all
icon which share the CPU time one by one. Therefore, we also
will then load name it multitasking. The time that each task gets is
the necessary called quantum.
output. A fixed interval of time is decided for each task. When
Customizable It is not It is the first task executes for that period of time, the second
feature customizable customizable task executes, and so on. Examples are UNIX etc.
because it is since the
strictly based on graphical 3. Distributed OS
commands. interface has In this system, there is more than one CPU present. The
many options OS distributes the tasks among all the processors. The
for UI. processors do not share any memory or clock time. OS
Navigation It is not easy to Navigation is handles all communication between them through
navigate in CUI easy in GUI various communication lines.
OS since it with the help Examples are LOCUS etc.
executes tasks of the
based on the keyboard or
command mouse of the
4. Network OS
In these OS various systems are connected to a server.
provided. computer.
It allows the system to share resources such as files,
Use of The interaction The user
printers, applications, etc. Moreover, it gives the
peripherals between the interacts with
capability to serve to manage these resources.
user and the the computer
Examples are UNIX, LINUX, Microsoft Windows
computer system by
Server 2008, etc.
system is done using the
by using the mouse of the
keyboard computer,
5. Real-Time OS (RTOS)
In these systems, the time interval for processing and a) Hard Real-Time Systems
responding to inputs is very small. Therefore, due to In this, the time constraint is very short and strict. Even
this quality, these are used in real-time situations. For seconds of delay is not acceptable.
example in missile systems, robots, etc.
They have two categories as follows: b) Soft Real-Time Systems
In this, the time constraint is not so short and strict.
Programming Language
Programming Language 04
A translator is a program that converts source code into
Computer Programming Language Generations
object code. Generally, there are three types of
translators:
First Generation Language:
This language is called Machine Language or first- • Compilers: - A compiler takes the source code as
generation language. A computer was able to a whole and translates it into object code all in one
understand it directly without any conversion. This go. Once converted, the object code can be run at
language is also known as Machine Language or any time. This process is called compilation.
Binary language. Binary language because only two • Interpreters: - An interpreter translates source
symbols 1 and 0. code into object code one instruction at a time. It
is like a human translator translating what a person
Second Generation Language: says into another language, sentence by sentence.
Machine Language was just 1’s and 0’s, in which error The resulting object code is then executed
finding and correcting were very difficult. So, must immediately. The process is called interpretation.
develop a second-generation language. Also called an • Assemblers: - Assemblers are a third type of
Assembly Language. translator. The purpose of an assembler is to
In this language, instructions were replaced with some translate assembly language into object code.
coded terms called mnemonic. So that it becomes a Whereas compilers and interpreters generate many
little easier to read, understand, and correct. machine code instructions for each high-level
A computer can understand and work on machine code instruction, assemblers create one machine code
only. So, assembly language needed a special software instruction for each assembly instruction.
called Assembler that converts mnemonic into
machine language.
SYMBOLS
Types of Memory
1. Volatile: - Memory that loses its contents when
the power is turned off. Volatile memory requires
electricity or current to store information. Ex.-
RAM (RANDOM ACCESS MEMORY)
Cache Memory: - It is a very high-speed Byte:- A group of 8 bits is called byte. A byte is the
semiconductor memory which can speed up CPU. It smallest unit which can represent a data item or a
acts as a buffer between the CPU and main memory. character. (1 byte = 8 bits)
SECONDARY MEMORY Bit 0 or 1
This type of memory is also known as external 4 Bits 1 Nibble
memory or non-volatile memory. It is slower than 8 Bits 1 Byte
main memory. Secondary memory is used for storing 1024 Byte 1 Kilo Byte (KB)
data/Information permanently. 1024 KB 1 Mega Byte (MB)
Floppy disk, hard disk, magnetic tapes, and optical 1024 MB 1 Giga Byte (GB)
disks come under the category of external storage 1024 GB 1 Tera Byte (TB)
devices or auxiliary storage devices. These devices are 1024 TB 1 Peta Byte (PB)
very sensitive to environmental conditions (humidity 1024 PB 1 Exa Byte (EB)
and temperature) as well as to external magnetic fields 1024 EB 1 Zeta Byte (ZB)
and need to be stored carefully. 1024 ZB 1 Yotta Byte (YB)
Floppy Disk
Floppy disks are primarily used on PCs. Information
on a floppy disk is recorded in the magnetized states of
particles of iron oxides evenly placed upon concentric
circles which are known as tracks.
Internet
Internet 07
The Internet is a large network of networks, a An Internet service provider (ISP) is an organization
networking infrastructure. It connects millions of that provides services for accessing and using the
computers together globally, forming a network in Internet. Internet service providers may be organized
which any computer can communicate with any other in various forms, such as commercial, community-
computer as long as they are both connected to the owned, non-profit, or otherwise privately owned.
Internet. Examples: - BSNL, VI, Airtel, Jio etc.
History of Internet
• The history of the Internet begins with the
development of electronic computers in the 1950s.
• The US Department of Defense awarded contracts
as early as the 1960s for packet network systems,
including the development of the ARPANET.
• ARPANET - Advanced Research Projects Agency
Network, 1969: ARPANET successfully
completed and carries its first packets.
• WWW-World Wide Web: - Sir Tim Berners-Lee
invented the World Wide Web in 1989. Sir Tim
Berners-Lee is a British computer scientist.
• First graphical web browser, Mosaic was preceded
by World Wide Web. Mosaic was developed at the
National Center for Supercomputing Applications
(NCSA)
ISP: - Internet service provider • Multilink dial-up: - Multilink dial-up provides
increased bandwidth by channel bonding multiple
dial-up connections and accessing them as a single
data channel. It requires two or more modems,
phone lines, and dial-up accounts, as well as an
ISP that supports multilinking – and of course any
line and data charges are also doubled.
• Integrated Services Digital Network: - voice and digital data, is one of the oldest Internet
Integrated Services Digital Network (ISDN) is a access methods. ISDN has been used for voice,
switched telephone service capable of transporting video conferencing, and broadband data
applications.
• Digital subscriber line (DSL, ADSL, SDSL, Web. An information resource is identified by a
VDSL): - Digital Subscriber Line (DSL) service Uniform Resource Identifier (URI/URL) that may be a
provides a connection to the Internet through the web page, image, video, or other piece of content.
telephone network. Unlike dial-up, DSL can
operate using a single phone line without Web Browsers and releasing Years
preventing normal use of the telephone line for World Wide Web February 25, 1990
voice phone calls. Mosaic April 22, 1993
I. ADSL-Asymmetric Digital Subscriber Line Netscape Navigator and October 13, 1994
II. SDSL-symmetric digital subscriber line Netscape Communicator
III. VDSL-Very-high-bit-rate digital subscriber Internet Explorer August 16, 1995
line Opera web browser 1996
Mozilla Navigator June 5, 2002
• Satellite Internet access provides fixed, portable, Safari January 7, 2003
and mobile Internet access. Satellite antenna dish Mozilla Firefox November 9, 2004
requires a clear line of sight to the southern sky, Google Chrome September 2, 2008
due to the equatorial position of all geostationary Microsoft Edge July 9, 2015
satellites.
Web Address
Web Browser An internet address of a website, file, or document in
A Web Browser (commonly referred to as a browser) the general format. Every computer connected to the
is a software application for retrieving, presenting, and internet has its unique web address, without which it
traversing information resources on the World Wide
cannot be reached by other computers. Also called terminal connection or Remote Access.
universal resource locator or Uniform Resource Default Port no. 23
Locator (URL).
Domain
https://www.xyz.com/studymaterial A domain name is an identification string that defines
a realm of administrative autonomy, authority or
https :- Its Protocol. control within the Internet.
www. :- Its Server
xyz: - Its Domain Name Type of Domain
com: - Type of Domain .edu education
studymaterial :- Resource Path .org organization
.nic Network Information Center
HTTPS - Hyper Text Transfer Protocol Secure, .info information
Default Port No. of HTTP – 80. This protocol is .int international organizations
Request Response Protocol .gov U.S. national and state government
agencies
.com commercial
FTP - File Transfer Protocol .net network
File Transfer Protocol (FTP) is a standard network .mil U.S. military
protocol used for the transfer of computer files from a
server to a client using the Client–server model on a Intranet
computer network. An intranet is a private network accessible only to an
Default port no. of FTP – 21 organization's staff. Generally a wide range of
information and services from the organization's
Telnet internal systems are available that would not be
Telnet is a protocol used on the Internet or local area available to the public from the Internet.
networks to provide a bidirectional interactive text-
oriented communication facility using a virtual
Google Gmail
Google Search Engine is the best search engine in the Gmail is a free, advertising-supported email service
world, and it is also one of most popular products from developed by Google.
Google. Almost 70 percent of Search Engine market Launched: April 1, 2004, Owner: Google, Created
has been acquired by Google. by: Paul Buchheit
Bing
Bing is Microsoft’s answer to Google, and it was
Hotmail
Sabeer Bhatia is an Indian businessman who co-
founded the webmail company Hotmail.com, Sabeer
Bhatia arrived in the United States from Bangalore at
19; now he's a Web gazillionaire. With friend and co-
worker Jack Smith, Bhatia founded Hotmail, the first
free Web-based e-mail service.
Two years later, they sell it to Microsoft for $400
million.
DBMS
DBMS 08
DATABASE
Database as an electronic filing system. Traditional
databases are organized by fields, records, and files.
DBMS
Database Management System is a computer software
application that interacts with the user, other
applications, and the database itself to capture and
analyze data. A general-purpose DBMS is designed to
allow the definition, creation, query, update, and
administration of databases.
Run Time Database Manager define integrity constraints, views, and tables.
Sometimes referred to as the database control system, II. A physical database schema lays out how data is
this is the central software component of the DBMS stored physically on a storage system in terms of
that interfaces with user-submitted application files and indices.
programs and queries, and handles database access at
run time. Types of Relationship
There are 4 types of Relationships
Data Manager I. ONE TO ONE
Also called the cache manger, this is responsible for II. ONE TO MANY
handling of data in the database, providing a recovery III. MANY TO ONE
to the system that allows it to recover the data after a IV. MANY TO MANY
failure.
Data Dictionary Types of Keys
A data dictionary is a set of read-only table and views, Primary Key -A Primary Key designated to uniquely
containing the different information about the data identify all table records. It must contain a unique
used in the enterprise to ensure that database value for each row of data. It cannot contain null
representation of the data follow one standard as values.
defined in the dictionary.
Superkey - A Superkey is a combination of columns
Report Writer that uniquely identifies any row within a RDBMS
It is a program that extracts information from one or table.
more files and presents the information in a specified
format. Candidate Key - A candidate key is a column, or set
of columns, in a table that can uniquely identify any
Metadata database record without referring to any other data.
Metadata is data that describes other data.
Foreign Key - A foreign key is a field (or collection
Three distinct types of Metadata exist: of fields) in one table that uniquely identifies a row of
I. Descriptive Metadata another table or the same table.
II. Structural Metadata
III. Administrative metadata. Some Important Terms in DBMS
Attributes - It may refer to a database field. Attributes
TYPES OF DATABASE SYSTEMS describe the instances in the row of a database.
• PC DATABASE
• CENTRALIZED DATABASE Instance - A database instance is a set of memory
• DISTRIBUTED DATABASE structures that manage database files.
• In-MEMORY DATABASE
Tuple - A single row of a table, which contains a single
INSTANCES AND SCHEMA record for that relation is called a tuple.
A database instance (Server) is a set of memory
Consistency - Consistency in database systems refers
structure and background processes that access a set of
to the requirement that any given database transaction
database files.
must change affected data only in allowed ways
SCHEMA
Normalization
Schema is the structure of the database that defines the
Database Normalization is the process of organizing
objects in the database.
the columns (attributes) and tables (relations) of a
relational database to reduce data redundancy and
There are two main kinds of database schema:
improve data integrity.
I. A logical database schema conveys the logical
constraints that apply to the stored data. It may
RDBMS
A Relational Database Management System
(RDBMS) is a database management system (DBMS)
that is based on the relational model.
SQL
Structured Query Language is a domain-specific
language used in programming and designed for
managing data held in a Relational Database
Management System (RDBMS).
Phishing
Phishing is the attempt to obtain sensitive information
such as username, password, and bank card details
(indirectly money), often for malicious reasons by
disguising as a trustworthy entity in an electronic
communication.
ABBREVIATIONS
Networking
Networking 11
What is a Network There are three types of transmission mode. They
The word Network “means,” two computers are are:
connected using a transmission media and able to share ➢ Simplex Mode
their resources. The transmission media for the term ➢ Half duplex Mode
network is either cable media or wireless media. ➢ Full duplex Mode
LAN Features
• Standard PC Hardware
Coaxial Cable • Resource sharing
Coaxial is called by this name because it contains two • Common applications
conductors that are parallel to each other. Copper is • File sharing
used in this as Centre conductor which can be a solid
wire or a standard one.
Hardware devices are used in Networking:
Optical Fiber
An optical fiber cable is a cable containing one or Repeater
more optical fibers that are used to carry light. The A repeater connects two segments of your
optical fiber elements are typically individually coated network cable. It retimes and regenerates the signals to
with plastic layers and contained in a protective tube proper amplitudes and sends them to the other
suitable for the environment where the cable will be segments.
deployed.
Connectors
• Bus Topology
• Hybrid Network
Network Topologies
• Topology of a network refers to the way in which
the network’s nodes (computer or other devices
that need to communicate) are linked together.
• It determines the various data paths available
between any pair of nodes in the network.
• Choice of a topology for a computer network
depends on a combination of factors, such as:
Desired Performance of the system
• Reliability of the system
• Size (Numbers of nodes and their geographical
distribution) of the system)
• Cost of components and services required to
implement network Availability of
communication lines
Types of Topologies
• Star Topology
• Ring Topology
Microsoft Office
Microsoft Office 12
Microsoft Office was developed by Microsoft Inc in August 24, Office 95 Word, Excel,
1988. It is a collection of software, based on specific 1995 (7.0) PowerPoint,
purpose and mainly used in office work. You can start Schedule+,
any software of MS-Office by using the Start button. Binder, Access,
There are five packages of MS-Office Bookshelf
1. MS-Word (Word Processing) November Office 97 Word 97, Word
2. MS-Excel (Spreadsheet) 19, 1996 (8.0) 98, Excel,
3. MS-PowerPoint (Presentation) June 20, Office 97 PowerPoint,
4. MS-Access (Database Management) 1997 Powered by Access,
5. MS-Outlook (E-mail Client) Word 98 Publisher 97,
6. One Note (Text) (8.5) Publisher 98,
Outlook 97,
Release Title Components Outlook 98,
date BookShelf
October 1, The Word 1.1, Excel Basics, Small
1990 Microsoft 2.0, PowerPoint Business
Office for 2.0 Financial
Windows June 7, Office 2000 Word, Excel,
March 4, Office 1.5 Word 1.1, Excel 1999 (9.0) Outlook,
1991 3.0, PowerPoint PowerPoint,
2.0 Access,
July 8, Office 1.6 Word 1.1, Excel Publisher, Small
1991 3.0, PowerPoint Business Tools,
2.0, Mail 2.1 FrontPage,
Early 1992 Office 2.5 Word 2.0a, PhotoDraw
Excel 4.0, May 31, Office XP Word, Excel,
PowerPoint 2001 (10.0) Outlook,
2.0e, Mail 2.1 PowerPoint,
August 30, Office 3.0 Word 2.0c, Access,
1992 Excel 4.0, FrontPage,
PowerPoint 3.0, Publisher, Small
Mail 3.0 Business Tools
January 17, Office 4.0 Word 6.0, Excel August 19, Office 2003 Word, Excel,
1994 4.0, PowerPoint 2003 (11.0) Outlook,
3.0, Mail 3.1 PowerPoint,
June 2, Office 4.3 Word 6.0, Excel Access,
1994 5.0, PowerPoint Publisher,
4.0, Mail 3.2, OneNote,
Access 2.0 InfoPath
July 3, Office for Word 6.0, Excel January 30, Office 2007 Word, Excel,
1994 NT 4.2 5.0, PowerPoint 2007 (12.0) PowerPoint,
4.0, Office Outlook,
Manager Publisher,
Center align cell Alt+H, A, C Open the View tab and Alt+W
contents. preview page breaks and
Go to the Page Alt+P layouts, show and hide
Layout tab. gridlines and headings, set
Go to the Data tab. Alt+A zoom magnification,
Go to the View tab. Alt+W manage windows and
Open the context menu. Shift+F10 or panes, and view macros.
Windows Menu key
Add borders. Alt+H, B MS-POWERPOINT
• The application software that can create
Delete column. Alt+H, D, C
professional looking visual aids is called
Go to the Formula tab. Alt+M
Presentation Graphics Software.
Hide the selected rows. Ctrl+9 MS-PowerPoint can be started by clicking at
•
Hide the selected Ctrl+0 Start—Program---Microsoft PowerPoint.
columns. • A slide can contain one or more of these
components: Titles, Graphs, Drawing objects,
To go directly to a tab on the ribbon, press one of ClipArt, and Pictures.
the following access keys. Additional tabs might • The slide components that are used for reference
appear depending on your selection in the are: Handouts, Notes, Outlines.
worksheet. • A new presentation can be created through one of
Function Shortcut Key these methods:
Move to the Tell Alt+Q, then enter the ▪ Auto content Wizard
me or Search field on the search term. ▪ Design Templates
ribbon and type a search ▪ Sample Presentation
term for assistance or Help ▪ Blank Presentation
content. • A new slide can be added by either clicking at
Open the File menu. Alt+F Common Tasks options of Formatting toolbar and
Open the Home tab and Alt+H then selecting New Slide option, by clicking at
format text and numbers Insert menu’s New Slide option.
and use the Find tool. • A presentation in PowerPoint can viewed in any of
Open the Insert tab and Alt+N these views: Normal, Outline, Slide, Slide Sorter,
insert PivotTables, charts, Slide Show, and Notes Page View.
add-ins, Sparklines, • To apply new design to slides, click either at Apply
pictures, shapes, headers, or Design Template option of Common Tasks
text boxes. options of Formatting toolbar, or at Format menu’s
Open the Page Layout tab Alt+P Apply Design Template option or ever from the
and work with themes, page shortcut menu.
setup, scale, and alignment. • A color scheme is a combination of various colors
Open the Formulas tab and Alt+M used for text and other presentation elements.
insert, trace, and customize • A color scheme can be changed by clicking at
functions and calculations. Slide Color Scheme option of Format menu.
Open the Data tab and Alt+A • Background color can be changed by clicking at
connect to, sort, filter, Format----Background command or even through
analyze, and work with slide’s shortcut menu.
data. • You can change text font and style by using
Open the Review tab and Alt+R Format---Font command.
check spelling, add notes • Header and Footer information can be viewed and
and threaded comments, changed by clicking at View---Header and Footer
and protect sheets and option.
workbooks.
• The slide ---shorter view in useful for viewing the variety of users.
slides in miniature forms and for rearranging them.
• Movies (Videos) and Sound can be inserted by New item alerts
using Insert—Movies & Sounds command. Incoming messages overlay on the user's display,
While creating slide shows you can add transitions to notifying them of new emails.
slides by using Slide Show --- Slide Transition
command Ignore messages
• To add animation, you can use Slide Show----- All messages in a conversation can be set to bypass a
Custom Animation commands. user's inbox and go to the deleted items folder.
Quick Parts
This function enables users to copy the text of one
email and insert it into future messages. This feature is
useful for users that have to send similar emails to a
Practice Sets - 13
COMPUTER AWARENESS
42
Practice Set – 01
1. Which is not the portable computer? 10. The overall design, construction, organization
(A) Micro-processor and interconnecting of the various components of
(B) Calculator a computer system is referred as–
(C) Series Computes (A) Computer Architecture
(D) Parallel Computers (B) Computer Flowchart
2. The ROM chip which can be rewritten several (C) Computer Algorithm
times and requires the action of ultraviolet (D) All of the above
radiations to erase its contents is________. 11. BIOS are responsible for-
(A) Flash memory (B) PROM (A) Handling the particulars of input/output
(C) EEPROM (D) EPROM operations.
3. FPI stands for____. (B) Output operations
(A) Faults per inch (B) Frames per inch (C) Input operations
(C) Figure per inch (D) Film per inch (D) All of the above
4. A terabyte comprises 12. BISYNC is an abbreviation for–
(A) 1024 gigabyte (B) 1024 kilobyte (A) Binary Input/Binary Output
(C) 1024 megabyte (D) 1024 byte (B) Binary synchronous
5. The memory which is utmost accessible to the (C) Binary digit
processor is ______. (D) All of the above
(A) Cache memory (B) RAM 13. A process of trying out a new product by
(C) Hard disk (D) Flash memory independent users before it is finally
6. In which kind of disk does the read/write head manufactured/developed–
physically touches the surface? (A) Alpha test (B) Beta Test
(A) Hard Disk (B) Compact Disk (C) Gamma test (D) All of the above
(C) Floppy Disk (D) all of the above 14. An E-mail protocol for storage, management and
7. What is the correct syntax for typing a function change, especially in corporate offices –
into a cell? (A) Message handling service
(A) Equal sign, Function Name, Matching (B) Postal service’s
brackets (C) Data storage
(B) Function Name, Equal sign, Matching (D) All of the above
brackets 15. Password is–
(C) Equal sign, Matching brackets, Function (A) Code by which a user gains access to a
Name computer system
(D) None of the above (B) Pass for viewing movie
8. If you see a small red triangle in the top right (C) Entrance without paying something
corner of a cell, it means there is something (D) All of the above
attached to the call. What is it? 16. The technique where digital signals are
(A) A comment (B) An attachment converted to its analog form for transmission
(C) An error (D) None of these over an analog facility is called.
9. Cache memory is– (A) Modulation (B) Digitization
(A) Smaller and faster than main storage (C) Multiprocessing (D) All of the above
(B) Bigger and slower than main storage 17. Narrowband channel is a communication
(C) Smaller but slower than main memory channels.
(D) Bigger and faster than main memory
(A) That handles low volumes of data (B) It manages all resources
(B) Used mainly for telegraph lines and low (C) It does all Memory management and Process
speed terminals management tasks
(C) Both (A) and (B) (D) All are true
(D) All of the above 22. All formula in Excel start with
18. MIME is an acronym for .... (A) % (B) +
(A) Multiprogramming Internet Mail Extension (C) = (D) –
(B) Multicasting Internet Mail Extension 23. Which of the following displays the contents of
(C) Multiple Internet Mail Extension the active cell?
(D) Multipurpose Internet Mail Extension (A) Active cell (B) Formula bar
19. The ______ Settings are automatic and standard. (C) Menu bar (D) Name box
(A) Default (B) CPU 24. Tab scrolling buttons -
(C) Peripheral (D) User-friendly (A) Allow you to view a different worksheet
20. Pop-ups are a form of ________on the World (B) Allow you to view additional worksheet row
Wide Web? down
(A) Instant Messaging (C) Allow you to view additional worksheet
(B) Search Engines columns to the right
(C) Browsers (D) Allow you to view additional sheet tabs
(D) Online Advertising 25. What is the keyboard shortcut for creating a chart
21. Which of the following is true about Operating from the selected cells?
System? (A) F3 (B) F5
(A) It is an interface between user and the (C) F7 (D) F11
computer.
Solution
1.(C) Series Calculator computes sum of a defined as 1,024 gigabytes (GB), while a
series over the given interval. It is capable petabyte consists of 1,024 TB.
of computing sums over finite, infinite 5.(A) Cache memory is an extremely fast
(inf) and parametrized sequencies (n). In memory type that acts as a buffer between
the cases where series cannot be reduced RAM and the CPU. It holds frequently
to a closed form expression an requested data and instructions so that
approximate answer could be obtained they are immediately available to the CPU
using definite integral calculator. when needed. Cache memory is used to
2.(D) EPROM (erasable programmable read- reduce the average time to access data
only memory) is programmable read-only from the Main memory.
memory (programmable ROM) that can 6.(C) Floppy disk is read and written using a
be erased and re-used. Erasure is caused floppy disk drive (FDD). Floppy disks
by shining an intense ultraviolet light were an almost universal data format from
through a window that is designed into the the late 1970s into the 1990s, used for
memory chip. primary data storage as well as for backup
3.(B) FPI is used to measure display device's and data transfers between computers.
performance. FPI stands for Frames per 7.(A) Equal sign, Function Name, Matching
inch. brackets
4.(A) A Terabyte (TB) is a measure of computer 8.(A) A comment is a note or annotation that an
storage capacity that is approximately 2 to author or reviewer can add to a document.
the 40th power, or 10 to the 12th power, Microsoft Word displays the comment in
which equals approximately a trillion the Reviewing pane or in a balloon in the
bytes. A Terabyte is more precisely margin of the document.
9.(A) In order to be close to the processor, cache modulating signal that typically contains
memory needs to be much smaller than information to be transmitted.
main memory. Consequently, it has less 17.(A) In radio communications, a narrowband
storage space. Cache memory operates channel is a channel in which the
between 10 to 100 times faster than RAM, bandwidth of the message does not
requiring only a few nanoseconds to significantly exceed the channel's
respond to a CPU request. coherence bandwidth. In telephony,
10.(A) In computer engineering, computer narrowband is usually considered to cover
architecture is a set of rules and methods frequencies 300–3400 Hz.
that describe the functionality, 18.(D) Multipurpose Internet Mail Extensions is
organization, and implementation of an Internet standard that extends the
computer systems. Some definitions of format of email messages to support text
architecture define it as describing the in character sets other than ASCII, as well
capabilities and programming model of a as attachments of audio, video, images,
computer but not a particular and application programs.
implementation. 19.(A) In computer technology, a default (noun,
11.(A) BIOS (basic input/output system) is the pronounced dee-FAWLT) is a
program a personal computer's predesigned value or setting that is used
microprocessor uses to get the computer by a computer program when a value or
system started after you turn it on. It also setting is not specified by the program
manages data flow between the user. The program is said to default when
computer's operating system and attached it uses a default value or setting.
devices such as the hard disk, video 20.(D) A type of window that appears on top of
adapter, keyboard, mouse and printer. (over) the browser window of a Web site
12.(B) Binary Synchronous Communications that a user has visited. Pop-ups ads are
(BSC) is a half-duplex, character-oriented used extensively in advertising on the
data communications protocol originated Web, though advertising is not the only
by IBM in 1964. It includes control application for pop-up windows. A pop-
characters and procedures for controlling up ad is also referred to as a pop-up.
the establishment of a valid connection Pop-ups are a form of Online Advertising
and the transfer of data. Also called on the World Wide Web.
Bisync. 21.(D) An Operating system -
13.(B) A field test of the beta version of a product It is an interface between user and the
(such as software) especially by testers computer.
outside the company developing it that is It manages all resources
conducted prior to commercial release. It does all Memory management and
14.(A) Process management tasks
15.(A) A password, sometimes called a passcode, 22.(C) All Excel formulas begin with the equals
is a memorized secret, typically a string of sign, =, followed by a specific text tag
characters, usually used to confirm the denoting the formula you'd like Excel to
identity of a user. A Password is a word, perform. The SUM formula in Excel is
phrase, or string of characters intended to one of the most basic formulas you can
differentiate an authorized user or process enter into a spreadsheet, allowing you to
from an unauthorized user, or put another find the sum (or total) of two or more
way a password is used to prove one's values.
identity, or authorize access to a resource. 23.(B) The Formula Bar is where data or
16.(A) In electronics and telecommunications, formulas you enter into a worksheet
modulation is the process of varying one appear for the active cell. The Formula
or more properties of a periodic Bar can also be used to edit data or
waveform, called the carrier signal, with a formula in the active cell. The active cell
displays the results of its formula while we 25.(D) Excel allowed you to create a chart by
see the formula itself in the Formula Bar. selecting the data and pressing the F11
24.(D) The Sheet Tab Scroll Buttons are another key. In response, Excel created a default
means of navigating between sheets of the chart on a new sheet. You can also use the
workbook other than selecting a tab. The Alt+F1 shortcut, which creates a default
value of this functionality will become chart as a chart object embedded in the
more evident with the use of multiple current worksheet.
worksheets.
Practice Set – 02
(A) A top-secret project 21. The process of analyzing large data sets in search
(B) A highly classified project of new, previously undiscovered relationships is
(C) An individual employee project known as:
(D) A team project (A) Data Mining (B) Data Marting
17. Software used for database management can (C) Data maintenance (D) data warehousing
store data, update it, __________ it, retrieve it, 22. The focus of the first phase of the systems
report it, and print it. development life cycle is to:
(A) Manipulate (B) download (A) Design what the new system should do
(C) See (D) All of the above (B) Analyze and document the existing system
18. Which of the following is NOT a function of an (C) Identify problems and opportunities
operating system? (D) Implement the new system
(A) Executing and providing services for 23. Which of the following is a network in which
applications software computers are located physically close together,
(B) Managing the computer’s resources often in the same building?
(C) Establishing a user interface (A) WAN (B) PAN
(D) Formatting a word document (C) MAN (D) LAN
19. Which of the following helps describe the 24. What kind of server converts IP addresses to
Windows .NET Server? domain names?
(A) It is designed for different levels of network (A) File (B) DNS
complexity. (C) Email (D) P2P
(B) It is a direct upgrade from Windows NT. 25. Which of the following is NOT true about laptop
(C) It is designed to replace Novell’s Netware. computers?
(D) It has limited complexity. (A) They are typically more expensive than
20. In the OSI model, the actual transmission of data desktops.
is handled in the ____________ layer. (B) They are typically more expensive than
(A) Data link (B) Physical desktops.
(C) Network (D) Transport (C) They often have fewer components than PCs.
(D) They cannot be connected to a PC.
Solution
1.(A) Winword.exe is the executable file name 4.(C) On the top of vertical scroll bar we can
for Microsoft Word which is used when find the horizontal split bar on MS Word
Word is launched. screen.
2.(A) Real-time computing, or reactive 5.(B) A word is a fixed-sized piece of data
computing is the computer science term handled as a unit by the instruction set or
for hardware and software systems subject the hardware of the processor. The
to a "real-time constraint", for example number of bits in a word (the word size,
from event to system response. Real-time word width, or word length) is an
programs must guarantee response within important characteristic of any specific
specified time constraints, often referred processor design or computer architecture.
to as "deadlines". 6.(B) Optical character recognition or optical
3.(A) The arithmetic logical unit (ALU) carries character reader is the electronic or
out the logical operations such as mechanical conversion of images of
comparisons and arithmetic operations typed, handwritten or printed text into
such as addition and multiplication, machine-encoded text, whether from a
required during the program execution. scanned document, a photo of a document,
The ALU knows which operations to a scene-photo or from subtitle text
perform because it is controlled by signals superimposed on an image.
from the control unit.
7.(C) Written, printed, or online document that deleting, and requesting information from
presents or communicates narrative or databases. SQL is an ANSI and ISO
tabulated data in the form of an article, standard, and is the de facto standard
letter, memorandum, memo, report, etc. database query language.
8.(A) Speech recognition is the capability of an 15.(B) The characteristics of computers that have
electronic device to understand spoken made them so powerful and universally
words. A microphone records a person's useful are speed, accuracy, diligence,
voice and the hardware converts the signal versatility and storage capacity. Let us
from analog sound waves to digital audio. discuss them briefly. Computers work at
The audio data is then processed by an incredible speed. A powerful computer
software, which interprets the sound as is capable of performing about 3-4 million
individual words. simple instructions per second.
9.(A) Transaction processing is information 16.(D) The project team is responsible for
processing in computer science that is contributing to the overall project
divided into individual, indivisible objectives and specific team deliverables,
operations called transactions. Each by contributing towards the planning of
transaction must succeed or fail as a project activities and executing assigned
complete unit; it can never be only tasks/work within the expected quality
partially complete. standards, to ensure the project is a
10.(C) A disk cache is a mechanism for success.
improving the time it takes to read from or 17.(A) Software used for database management
write to a hard disk. Today, the disk cache can store data, update it, manipulate it,
is usually included as part of the hard disk. retrieve it, report it, and print it.
A disk cache can also be a specified 18.(D) An Operating System (OS) is an interface
portion of random access memory between a computer user and computer
(RAM). hardware. An operating system is a
11.(C) An antistatic device is any device that software which performs all the basic
reduces, dampens, or otherwise inhibits tasks like file management, memory
electrostatic discharge; the buildup or management, process management,
discharge of static electricity, which can handling input and output, and controlling
damage electrical components such as peripheral devices such as disk drives and
computer hard drives, and even ignite printers. Others are-
flammable liquids and gases. Executing and providing services for
12.(C) Desktop publishers use publishing applications software
software to create various documents and Managing the computer’s resources
products, including financial reports, Establishing a user interface
business proposals, books, newspapers, 19.(A) Windows Server 2003 is a server
newsletters, packaging, tickets, and operating system produced by Microsoft
business cards. They format and combine and released on April 24, 2003, about 18
text, numerical data, photographs, months after the launch of the Windows
illustrations, charts, and other visual XP operating system. It is the successor to
elements. Windows 2000 Server and the predecessor
13.(D) A cell reference, or cell address, is an to Windows Server 2008. NET Enterprise
alphanumeric value used to identify a Server is a family of server products from
specific cell in a spreadsheet. Each cell Microsoft designed to build, integrate,
reference contains one or more letters manage and execute Web-based
followed by a number. The letter or letters enterprise applications in a faster and
identify the column and the number simpler way.
represents the row. 20.(B) The lowest layer of the OSI reference
14.(C) Structured Query Language (SQL) is a model is the physical layer. It is
specialized language for updating, responsible for the actual physical
connection between the devices. The one user to an enterprise network with
physical layer contains information in the thousands of users and devices in an office
form of bits. It is responsible for or school.
transmitting individual bits from one node 24.(B) DNS translates domain names to IP
to the next. addresses so browsers can load Internet
21.(A) Text analysis, often used synonymously resources. Each device connected to the
with text mining, is the process of Internet has a unique IP address which
analyzing chunk of unstructured data to other machines use to find the device.
find out previously undiscovered DNS servers eliminate the need for
information and insights that can be humans to memorize IP addresses such as
leveraged for informed decision making 192.168.
and other processes. 25.(D) A laptop is a computer designed for
22.(C) This first phase of the systems portability. Laptops are usually less than 3
development lifecycle, begins by inches thick, weigh less than 5 pounds and
identifying what the organization is trying can be powered by a battery. As such
to do and how they currently achieve it. laptops are designed for low power
This is generally a high level overview of consumption and are most often used
the entire system and its functional areas. when space is limited, such as on an
23.(D) A local area network (LAN) is a collection airplane. They are typically more
of devices connected together in one expensive than desktops. They are
physical location, such as a building, typically more expensive than desktops.
office, or home. A LAN can be small or They often have fewer components than
large, ranging from a home network with PCs.
Practice Set – 03
(A) A battery keeps current available for RAM (B) PSTN is comprised of a variety of physical
(B) The memory contents are synchronized with media, including twisted pair and fiber optic
a desktop cable
(C) The memory contents are copied to flash (C) PSTN is exclusively a digital network system
cards (D) PSTN is only used for voice transmissions,
(D) The memory contents are stored in ROM while the Internet is used for data transmissions
18. A network of geographically distant computers 23. Which of the following best describes the
and terminals is called a- difference between the Internet and the World
(A) Integrated Services Digital Network (ISDN) Wide Web?
(B) Metropolitan area network (MAN). (A) The Internet is the collection of computers,
(C) Wide area network (WAN) while the World Wide Web is the wiring and
(D) Local area network (LAN) transmission protocols that connect them
19. One byte represents: (B) The Internet carries traffic for schools,
(A) Eight characters government offices, and other public
(B) Eight bits organizations, while the World Wide Web
(C) A single digit with two possible states carries commercial traffic
(D) A word (C) The Internet consists of software programs
20. Saving files in HTML format: such as e-mail and IRC, while the World Wide
(A) Makes it possible for anyone to view the file Web is a collection of Web pages
in a Web browser (D) The Internet is the physical network of global
(B) Increases file conversion costs computers, while the World Wide Web is many
(C) Decreases software compatibility hypertext documents distributed globally over
(D) All of the above many computers
21. Which of the following would NOT be 24. Which of the following runs on a user's local
performed with application software? computer and is used to request and display Web
(A) Financial report sent to investors pages?
(B) Hard disk cleanup (A) FTP (B) Web browser
(C) Charts for a sales meeting presentation (C) Web server (D) HTML
(D) Customer list used for mailing invoices 25. Which of the following computer types is most
22. Which of the following statements is TRUE powerful?
about the public switched telephone network (A) Professional workstation
(PSTN)? (B) Internet appliance
(A) PSTN is a packet-switching network (C) Desktop computer
(D) Network computer
Solution
1.(D) Because of this high reflectivity, CD-R and printing), output data can again be
discs can be read or played back in most perceived as information.
CD players and CD-ROM drives. 3.(C) After a picture has been taken with a
Compact Disc Rewriteable (CD-RW) is a digital camera and processed
fully rewriteable media, meaning that any appropriately, the actual print of the
spot on a CD-RW disc can be rewritten up picture is considered Output. For example,
to 1,000 times (based on the current the image shows an inkjet printer, an
standard). output device that can make a hard copy
2.(B) Information is stimuli that has meaning in of any information shown on your
some context for its receiver. When monitor, which is another example of an
information is entered into and stored in a output device. Monitors and printers are
computer, it is generally referred to as two of the most common output devices
data. After processing (such as formatting used with a computer. Types of output
separate folders, notably the inbox, computer's hard drive. The utility first
outbox, sent items, and deleted items. searches and analyzes the hard drive for
16.(B) A bus is a high-speed internal connection. files that are no longer of any use, and then
Buses are used to send control signals and removes the unnecessary files.
data between the processor and other 22.(B) PSTN (public switched telephone
components. Three types of bus are used. network) is the world's collection of
Address bus - carries memory addresses interconnected voice-oriented public
from the processor to other components telephone networks. PSTN stands for
such as primary storage and input/output public switched telephone network, or the
devices. traditional circuit-switched telephone
17.(A) A personal digital assistant (PDA), also network. PSTN is comprised of a variety
known as a handheld PC, is a variety of physical media, including twisted pair
mobile device which functions as a and fiber optic cable.
personal information manager. Nearly all 23.(D) The Internet is a global network of
modern PDAs have the ability to connect networks while the Web, also referred
to the Internet. A PDA has an electronic formally as World Wide Web (www) is
visual display, letting it include a web collection of information which is
browser. accessed via the Internet. Another way to
18.(C) A network of geographically distant look at this difference is; the Internet is
computers and terminals is called a: wide infrastructure while the Web is service on
area network (WAN). top of that infrastructure. The Internet is
19.(B) The byte is a unit of digital information the physical network of global computers,
that most commonly consists of eight bits. while the World Wide Web is many
Historically, the byte was the number of hypertext documents distributed globally
bits used to encode a single character of over many computers.
text in a computer and for this reason it is 24.(B) A web browser (commonly referred to as
the smallest addressable unit of memory a browser) is a software application for
in many computer architectures. accessing information on the World Wide
20.(A) Hypertext Markup Language is the Web. When a user requests a web page
standard markup language for documents from a particular website, the web browser
designed to be displayed in a web retrieves the necessary content from a web
browser. It can be assisted by technologies server and then displays the page on the
such as Cascading Style Sheets and user's device.
scripting languages such as JavaScript. 25.(A) A workstation is a special computer
Saving files in HTML format makes it designed for technical or scientific
possible for anyone to view the file in a applications. Intended primarily to be
Web browser. used by one person at a time, they are
21.(B) Disk Clean-up is a computer maintenance commonly connected to a local area
utility included in Microsoft Windows network and run multi-user operating
designed to free up disk space on a systems.
Practice Set – 04
(D) Communication 21. All of the following are examples of real security
16. Which of the following is NOT part of the and privacy risks EXCEPT.
motherboard? (A) Hackers (B) Viruses
(A) System clock (B) Connector (C) Spam (D) Identity theft
(C) CPU (D) Chipset 22. Which of the following is not an example of
17. An example of a wireless medium that sends data hardware?
through the air or space is: (A) Scanner (B) Printer
(A) Fiber-Optic Cable. (B) Coaxial cable. (C) Monitor (D) Interpreter
(C) Twisted pair. (D) Microwaves. 23. In Excel, this is a prerecorded formula that
18. To reverse the effect of your last action in word- provides a shortcut for complex calculations.
(A) Use the cut command ...............
(B) Use the Undo command (A) Value (B) Data Series
(C) Press the delete key (C) Function (D) Field
(D) Use the Redo command 24. The process of trading goods over the Internet is
19. Information that comes from an external source known as ……….………
and fed into computer software is called……. (A) e-selling-n-buying (B) e-trading
(A) Output (B) Input (C) e-finance (D) e-commerce
(C) Throughput (D) Reports 25. A device that connects to a network without the
20. The basic unit of a worksheet into which you use of cables is said to be–
enter data in Excel is called a– (A) Distributed (B) Free
(A) Tab (B) Box (C) Centralized (D) Open source
(C) Range (D) Cell
Solution
1.(C) A touch screen is a computer display would normally be stored or repro- cessed
screen that is also an input device. The in a country other than the originating
screens are sensitive to pressure; a user country. The essence of trans- border data
interacts with the computer by touching flows is that information is transferred in
pictures or words on the screen. a machine-readable form.
2.(C) A modem – a portmanteau of "modulator- 5.(B) Antivirus software is a program or set of
demodulator" – is a hardware device that programs that are designed to prevent,
converts data from a digital format, search for, detect, and remove software
intended for communication directly viruses, and other malicious software like
between devices with specialized wiring, worms, trojans, adware, and more.
into one suitable for a transmission 6.(A) The h1 is an HTML tag that indicates a
medium such as telephone lines or radio. heading on a website. Most websites use
A modem is necessary if you want to this language to create web pages. Tag —
Connect to other computers or to the An HTML tag is a snippet of code that
Internet using phone line, cable, or tells your web browser how to display the
wireless connections. content. Heading — HTML has six
3.(B) MS Excel is a software program created different heading tags — h1, h2, and so
by Microsoft that uses spreadsheets to on.
organize numbers and data with formulas 7.(A) Ethernet is a family of computer
and functions. Excel analysis is ubiquitous networking technologies commonly used
around the world and used by businesses in local area networks, metropolitan area
of all sizes to perform financial analysis. networks and wide area networks. It was
4.(D) A trans-border data flow (TDF) is the commercially introduced in 1980 and first
transfer of data across a national border by standardized in 1983 as IEEE 802.3.
anyone of a variety of media. Such data
8.(C) Mainframes (also called "big iron") are processing, (C) storage and (D) output.
powerful computers used for large The input stage can be further broken
information processing jobs. They are down into acquisition, data entry and
mainly used by government institutions validation.
and large companies for tasks such as 16.(B) A simple device that physically links,
census, industry and consumer statistics, couples, or connects, two things together.
enterprise resource planning, and financial A male connector has pins that fit into the
transaction processing. sockets, or receptacles, of a female
9.(D) Linux is the best-known and most-used connector, as the connectors mate. A male
open source operating system. As an connector sometimes is referred to as a
operating system, Linux is software that plug, and a female connector as a jack.
sits underneath all of the other software on 17.(D) Microwaves are widely used in modern
a computer, receiving requests from those technology, for example in point-to-point
programs and relaying these requests to communication links, wireless networks,
the computer's hardware. microwave radio relay networks, radar,
10.(B) Spyware describes software with satellite and spacecraft communication,
malicious behavior that aims to gather medical diathermy and cancer treatment,
information about a person or remote sensing, radio astronomy, particle
organization and send such information to accelerators, spectroscopy, industrial.
another entity in a way that harms the user; 18.(B) In most Microsoft Windows applications,
for example by violating their privacy or the keyboard shortcut for the Undo
endangering their device's security. command is Ctrl+Z or Alt+Backspace,
11.(D) A computer can address more memory and the shortcut for Redo is Ctrl+Y or
than the amount physically installed on Ctrl+Shift+Z. In most Apple Macintosh
the system. This extra memory is actually applications, the shortcut for the Undo
called virtual memory and it is a section of command is Command-Z, and the
a hard disk that's set up to emulate the shortcut for Redo is Command-Shift-Z or
computer's RAM. First, it allows us to Command-Y.
extend the use of physical memory by 19.(B) In computer science, the general meaning
using disk. of input is to provide or give something to
12.(A) Your system has three basic types of the computer, in other words, when a
software: application programs, device computer or device is receiving a
drivers, and operating systems. Each type command or signal from outer sources, the
of software performs a completely event is referred to as input to the device.
different job, but all three work closely 20.(D) In Microsoft Excel, a cell is a rectangular
together to perform useful work. box that occurs at the intersection of a
13.(D) A warm boot is sometimes necessary vertical column and a horizontal row in a
when a program encounters an error from worksheet. A cell can only store 1 piece of
which it cannot recover. On PCs, you can data at a time. You can store data in a cell
perform a warm boot by pressing the such as a formula, text value, numeric
Control, Alt, and Delete keys value, or date value.
simultaneously. On Macs, you can 21.(C) Spam is any kind of unwanted, unsolicited
perform a warm boot by pressing the digital communication, often an email,
Restart button. that gets sent out in bulk. Spam can also
14.(B) This is done to make sure that other parts be found on Internet forums, text
of computer are working properly or not. messages, blog comments, and social
It then checks if Rebooting is necessary or media.
not, if not it does a Read/write test for 22.(D) Interpreter is a program that executes
RAM. instructions written in a high-level
15.(B) The sequence of events in processing language. There are two ways to run
information, which includes (A) input, (B) programs written in a high-level language.
The most common is to compile the 24.(D) E-commerce (electronic commerce) is the
program; the other method is to pass the buying and selling of goods and services,
program through an interpreter. or the transmitting of funds or data, over
23.(C) A formula is an expression which an electronic network, primarily the
calculates the value of a cell. Functions internet. These business transactions
are predefined formulas and are already occur either as business-to-business
available in Excel. For example, cell A3 (B2B), business-to-consumer (B2C),
below contains a formula which adds the consumer-to-consumer or consumer-to-
value of cell A2 to the value of cell A1. business.
25.(B)
Practice Set – 05
1. Which of the following is a circuit that issue 11. When you insert an Excel file into a Word
signals at regular intervals...? document, the data are
(A) Circuit board (B) Clock (A) Hyperlinked
(C) Circuit card (D) Gates (B) Placed in a word table
2. A set of related programs are known as - (C) Linked
(A) File (B) Arrays (D) Embedded
(C) Package (D) Subscripts 12. A function inside another function is called a
3. The 0 and 1 in the binary number system are ________ Function.
called binary digits or .... (A) Nested (B) Round
(A) Bytes (B) Kilobytes (C) Sum (D) Text
(C) Decimal bytes (D) Bits 13. Selects the entire Row press –
4. The 7-bit ASCII code widely used (A) Shift + Space (B) Shift + ctrl
(A) For data communication work (C) Shift + alt (D) Space + enter
(B) In IBM mainframe models 14. In Assembly language _________.
(C) For coding external memory (A) Mnemonics are used to code operations
(D) In large machines produced by non-IBM (B) Alphanumeric symbols are used for
vendors addresses
5. A hard copy would be prepared on a- (C) Language lies between high-level language
(A) Line printer (B) Dot matrix printer and machine language
(C) Type writer terminal (D) Plotter (D) All of the above
6. Which of the following animations cannot be 15. CPU capacity can be measured in__.
done in PowerPoint? (A) BPS (B) MIPS
(A) Bullet list, revealed one bullet point at a time (C) MHz (D) MPI
(B) Clip art - Fly in from the bottom 16. "Zipping" a file means-
(C) Table, revealed row by row (A) Encrypting the message
(D) Chart, revealed by series (B) Compressing the message
7. Several views are available in MS Front Page. (C) Transfer the message
Which one of the following is NOT a valid view? (D) All of these
(A) Design View (B) Folders View 17. A __________ shares hardware, software, and
(C) Navigation View (D) Web Server View data among authorized users.
8. One of the components of central processing unit (A) Network (B) Protocol
(CPU) of the computer that performs (C) Hyperlink (D) Transmitter
mathematical and logical operations is ... 18. To produce a high - quality graphics (hardcopy)
(A) ALU (arithmetic logical unit) in color, you would want to use a….
(B) Address register (A) Virtual Printer (B) Laser Printer
(C) Analog (C) Ink - jet Printer (D) Plotter
(D) All of the above 19. Thesaurus tool in MS Word is used for-
9. ________is the key we use to run the selected (A) Spelling suggestions (B) Grammar options
command (C) Synonyms and Antonyms words
(A) SHIFT (B) TAB (D) All of above
(C) ENTER (D) CTRL 20. What is the smallest and largest font size
10. To name a constant, you use the __dialog box. available in Font Size tool on formatting toolbar?
(A) Create names (B) Define name (A) 8 and 72 (B) 8 and 64
(C) Paste name (D) Format cells (C) 12 and 72 (D) None of above
21. Aligns the selected text or line to justify the (C) Duplicate data
screen press------- (D) Data inconsistency
(A) Ctrl + c (B) Ctrl + I 24. Granting an outside organization access to
(C) Ctrl + J (D) Ctrl + k internet web pages is often implemented using
22. Which of the following is different from other? a(n)?
(A) Internet (B) Windows (A) Extranet (B) Intranet
(C) Unix (D) Linux (C) Internet (D) Hacker
23. When data changes in multiple lists and all lists 25. Loading Operating System onto RAM is called?
are not updated, this causes? (A) Printing (B) Saving
(A) Data redundancy (C) Booting (D) Staring
(B) Information overload
Solution
1.(B) A clock generator is an electronic Draft view
oscillator (circuit) that produces a clock Web layout
signal for use in synchronizing a circuit's 8.(A) An arithmetic logic unit (ALU) is a digital
operation. The clock generator in a circuit used to perform arithmetic and
motherboard is often changed by logic operations. It represents the
computer enthusiasts to control the speed fundamental building block of the central
of their CPU, FSB, GPU and RAM. processing unit (CPU) of a computer.
2.(C) Computer software, or simply software, or 9.(C) Also called the "Return key," it is the
package is a collection of data or computer keyboard key that is pressed to signal the
instructions that tell the computer how to computer to input the line of data or the
work. This is in contrast to physical command that has just been typed. The
hardware, from which the system is built Enter key was originally the "Return key"
and actually performs the work. on a typewriter, which caused the carriage
3.(D) The bit is a basic unit of information in to return to the beginning of the next line
computing and digital communications. on the paper.
The name is a portmanteau of binary digit. 10.(B) To name a constant, you use the Define
The bit represents a logical state with one name dialog box. On the Formulas tab, in
of two possible values. A single binary the Defined Names group, click Define
digit (like "0" or "1") is called a "bit". Name. In the New Name dialog box, in the
4.(A) Because digital computers use eight-bit Name box, type the name that you want to
bytes, the ASCII code is commonly use for your reference. Note: Names can
embedded in an eight-bit field consisting be up to 255 characters in length.
of the seven information bits and a parity 11.(B) When we insert an excel file into a word
bit that is used for error-checking document and keep the source file linkage
purposes or to represent special symbols. when data is updated in source file update
5.(D) A hard copy would be prepared on each data in liked file also. When you insert an
type of printer- Line printer Excel file into a Word document, the data
Dot matrix printer are placed in a word table.
Typewriter terminal 12.(A) Nested functions are used in many
Plotter approaches to structured programming,
6.(C) PowerPoint can't use animation including early ones, such as ALGOL,
animations in table to revealed it row by Simula 67 and Pascal, and also in many
row. modern dynamic languages and functional
7.(D) In Word, you can view a document in a languages. However, they are traditionally
variety of ways: Print Layout view not supported in the (originally simple) C-
Full Screen Reading view family of languages.
Web Layout view
13.(A) click on any cell in the column and then hard copy of the output. It draws pictures
press Ctrl + Space. Select the row number on a paper using a pen.
to select the entire row. Or click on any 19.(C)
cell in the row and then press Shift + 20.(A) Using the thesaurus, we can find
Space. synonyms (different words with the same
14.(D) In computer programming, assembly meaning) and antonyms (words with the
language (or assembler language), often opposite meaning). In Microsoft Office
abbreviated asm, is any low-level Word you can look up a word quickly if
programming language in which there is a we right-click anywhere in our document,
very strong correspondence between the and then click Synonym on the shortcut
instructions in the language and the menu.
architecture's machine code instructions. 21.(C) To make text justified, select and highlight
15.(C) CPU processing capacity is typically the text first, then hold down Ctrl (the
referred to in terms of Megahertz (MHz) control key) on the keyboard and then
or Gigahertz (GHz). Professionals talk press J. To make the text left aligned
about clock speed, which is the standard again, press and hold down Ctrl on the
ability of the CPU to cycle through its keyboard and press L.
operations over time. 22.(A) The Internet (or internet) is the global
16.(B) "Zipping" one or more files creates a system of interconnected computer
compressed archive that takes up less disk networks that uses the Internet protocol
space than the uncompressed version. It is suite (TCP/IP) to communicate between
useful for backing up files and reducing networks and devices. While, Microsoft
the size of data transferred over the Windows, commonly referred to as
Internet. An archive compressed with Windows, is a group of several proprietary
standard Zip compression has a. ZIP file graphical operating system families, all of
extension — for example, Archive. which are developed and marketed by
17.(A) A Network shares hardware, software, and Microsoft. Each family caters to a certain
data among authorized users. A network sector of the computing industry.
consists of two or more computers that are 23.(D) Data inconsistency is different and
linked in order to share resources (such as conflicting version of same data occurs at
printers and CDs), exchange files, or different place.it occurs between file when
allow electronic communications. The similar data is kept in different format in
computers on a network may be linked two different files or when matching of
through cables, telephone lines, radio data must be done between files.
waves, satellites, or infrared light beams. 24.(A) Much like the intranet, it allows for
18.(D) To produce high quality graphics private communication, document and
(hardcopy) in color, you would want to knowledge sharing, and transfers between
use an Plotter. The plotter is a computer crucial external partners and an
printer for printing vector graphics. In the organization. A good example of an
past, plotters were used in applications extranet network would be Sharepoint.
such as computer-aided design, though Extranets act as a system of engagement
they have generally been replaced with for your business's prospective clients.
wide-format conventional printers. A 25.(C) In computing, booting is the process of
plotter gives a hard copy of the output. It starting a computer. It can be initiated by
draws pictures on a paper using a pen. The hardware such as a button press, or by a
plotter is a computer printer for printing software command. After it is switched
vector graphics. In the past, plotters were on, a computer's central processing unit
used in applications such as computer- (CPU) has no software in its main
aided design, though they have generally memory, so some process must load
been replaced with wide-format software into memory before it can be
conventional printers. A plotter gives a executed.
Practice Set – 06
1. The purpose of the primary key in a database is (A) Function (B) Control
to: - (C) Arrow (D) Space bar
(A) Unlock the database 10. What is MP3?
(B) Provide a map of the data (A) A mouse (B) A Printer
(C) Uniquely identify a record (C) A Sound format (D) A Scanner
(D) Establish constraints on database operations 11. ____________ is a process that permits multiple
2. Using Windows Explorer, a plus (+) sign in front computers to use the same IP address and hide
of a folder indicates— their actual IP addresses from the Internet.
(A) An open folder (A) Routing
(B) The folder contains subfolders. (B) Network address translation (NAT)
(C) A text file. (C) Signature referencing
(D) a graphics file (D) Packet filtering
3. All of the following statements concerning 12. What characteristic of (ROM) makes it useful?
windows are true EXCEPT— (A) ROM information can be easily updated.
(A) Windows are an example of a command- (B) Data in ROM is nonvolatile, that is, it
driven environment. remains there even without electrical power.
(B) Windows can be resized and repositioned on (C) ROM provides very large amounts of
the desktop. inexpensive data storage.
(C) More than one window can be open at a time. (D) ROM chips are easily swapped between
(D) Toolbars and scrollbars are features of different brands of computers.
windows. 13. Data representation is based on the ______
4. The memory resident portion of the operating number system, which uses two numbers to
system is called the— represent all data.
(A) Registry (B) API (A) Binary (B) Biometric
(C) CMOS (D) Kernel (C) Bicentennial (D) Byte
5. The BIOS is stored in: 14. To what temporary area can you store text and
(A) RAM (B) ROM other data, and later paste them to another
(C) The CPU (D) The hard drive location?
6. Which of the following is not a tower? (A) The clipboard (B) ROM
(A) CPU (B) Motherboard (C) CD-ROM (D) The hard disk
(C) Peripheral (D) All of the above 15. Classes, instances, and methods are
7. The horizontal and vertical lines on a worksheet characteristics of:
are called— (A) Testing plan construction
(A) Cells (B) Sheets (B) Artificial intelligence techniques
(C) Block lines (D) Gridlines (C) Object-oriented design
8. What is usually used for displaying information (D) Flowcharts and pseudo code
at public places? 16. Which of the following correctly describes the
(A) Monitors CD-R and DVD-R discs?
(B) Overhead Projections (A) You may record data to the disc surface
(C) Monitors and Overhead Projections multiple times and can read the current contents
(D) Touch Screen Kiosks at any time.
9. Which key is used in combination with another (B) You may read data from the disc but may not
key to perform a specific task? alter its contents.
(C) You may record data to the disc surface (A) SDRAM (B) PROM
multiple times but have no direct reading (C) ROM (D) EEPROM
capability. 22. _____ is the basic language of web page writing.
(D) You may record data to the disc surface once (A) Generalized markup language
and then may only read its contents (B) Standard generalized markup language
17. To move down a page in a document _________ (C) Nonstandard generalized markup language
(A) Jump (B) Fly (D) Hypertext markup language
(C) Wriggle (D) Scroll 23. The topology where all the nodes are attached in
18. CD-ROM stands for____ a circular wiring arrangement is called a:
(A) Central Processing Unit (A) Star topology. (B) Bus topology.
(B) CD-remote open mouse (C) Network topology. (D) Ring topology
(C) CD-resize or minimize 24. Hard disk performance can be improved by using
(D) CD-read only memory a(n):
19. Use this when you want to make all letters capital (A) Optimal storage device
without having to use the shift key for each (B) Disk cache.
character. (C) Solid-state storage device.
(A) Shifter (B) Upper case (D) Flash memory reader
(C) Caps lock key (D) Icon 25. Which is NOT a characteristic of a system unit?
20. _________ is a program that has been physically (A) Provides a sturdy frame for mounting
etched onto a chip. internal components
(A) Firmware (B) Software (B) Provides room for system upgrades
(C) Compiler (D) Interpreter (C) Represents data as binary numbers
21. The type of memory that must have a constant (D) Houses the connectors for input and output
power supply is: devices
Solution
1.(B) A primary key is a field in a table which can be rewritten without removing the
uniquely identifies each row/record in a chip from the motherboard.
database table. Primary keys must contain 6.(C) A computer case, also known as a
unique values. A table can have only one computer chassis, tower, system unit, or
primary key, which may consist of single cabinet, is the enclosure that contains most
or multiple fields. When multiple fields of the components of a personal computer
are used as a primary key, they are called (usually excluding the display, keyboard,
a composite key. and mouse).
2.(B) In left pane of the Windows Explorer, plus 7.(D) Alternatively referred to as a column
(+) symbol indicates that there are separator or row separator, Grid lines or
additional sub folders in the folder. gridlines are the light gray lines that divide
3.(A) each of the cells, rows, and columns in a
4.(D) A kernel is the foundational layer of an spreadsheet.
operating system (OS). It functions at a 8.(D) A touch screen information kiosk is
basic level, communicating with hardware fundamentally an input device housed in a
and managing resources, such as RAM special container that functions through
and the CPU. Since a kernel handles many physical touch upon the touch screen. By
fundamental processes, it must be loaded simply touching the display screen, users
at the beginning of the boot sequence can perform various functions.
when a computer starts up. 9.(B) Control key is used in combination with
5.(B) In modern computer systems, the BIOS another key to perform a specific task.
contents are stored on flash memory so it These keys are used alone or in
combination with other keys to perform
certain actions. The most frequently used a computer (words, pictures, movies,
control keys are CTRL, ALT, the sound) is stored and transmitted as
Windows logo key, and ESC. Function sequences of bits, or binary digits. Data
keys. A modifier key modifies the action representation is based on the number
of another key when the keys are pressed system, which uses two numbers to
at the same time. Common modifier keys represent all data.
include Shift, Function, Control, Alt, 14.(A) The clipboard is a data buffer used for
Command, and Option. The Shift key is short-term data storage and/or data
found on all keyboards, while the other transfer between documents
keys may be exclusive to laptops or or applications used by cut, copy and paste
Windows or Macintosh computers. In operations and provided by the operating
computing, a Control key is a modifier system.
key which, when pressed in conjunction 15.(C) Object-oriented design is the process of
with another key, performs a special planning a system of interacting objects
operation (for example, Ctrl + C); similar for the purpose of solving a software
to the Shift key, the Control key rarely problem. It is one approach to software
performs any function when pressed by design.
itself. A command issued by pressing a 16.(D) Stands for "Digital Versatile Disc
keyboard character in conjunction with Recordable." A DVD-R looks the same as
the Control key. Manuals usually a regular DVD, but like a CD-R, it can be
represent control key commands with the used to record data. Once a DVD-R has
prefix CTRL- or CNTL-. For example, been "burned," or written to, it cannot be
CTRL-N means the Control key and N written to again. Most DVD players and
pressed at the same time. DVD-ROM drives can read DVD-R discs.
10.(C) MP3 stands for Moving Pictures Experts 17.(D) To move down a page in a document
Group, Standard One, Audio Layer 3; it Scroll. In computer displays, filmmaking,
was developed to compress audio for television production, and other kinetic
storage and playback on digital devices. It displays, scrolling is sliding text, images
essentially works by stripping out or or video across a monitor or display,
hiding recorded sounds that are near, or vertically or horizontally.
beyond, the threshold of human hearing. 18.(D) A CD-ROM is a pre-pressed optical
11.(B) Network address translation (NAT) is a compact disc that contains data.
method of remapping an IP address space Computers can read—but not write to or
into another by modifying network erase—CD-ROMs, i.e. it is a type of read-
address information in the IP header of only memory.
packets while they are in transit across a 19.(C) Caps Lock is a button on a computer
traffic routing device. keyboard that causes all letters of Latin
12.(B) Read only memory that is ROM has some and Cyrillic based scripts to be generated
characteristics which make it useful. in capital letters. It is a toggle key: each
Those characteristics are data in ROM is press reverses its action. Some keyboards
nonvolatile, that is it remains there even also implement a light, to give visual
without electrical power. it can store data feedback about whether it is on or off.
for a long period of time. Once data is 20.(A) Firmware is a software program or set of
stored it cannot be edited but only be instructions programmed on a hardware
retrieved which is good for security device. It provides the necessary
purpose and if you want to edit the data instructions for how the device
then it should be special type of ROM. communicates with the other computer
hardware.
13.(A) The binary number system is a base-2 21.(A) SDRAM (synchronous DRAM) is a
number system. This means it only has generic name for various kinds of
two numbers: 0 and 1. All information in dynamic random access memory
(DRAM) that are synchronized with the closed path to create Ring network. In the
clock speed that the microprocessor is coming sections, definition, examples,
optimized for. This tends to increase the advantages and disadvantages of Ring
number of instructions that the processor Network Topology will be discussed.
can perform in a given time. 24.(B) The following tips can help in boosting the
22.(D) Hyper Text Markup Language (HTML) is speed of your hard drive. Scan and clean
the set of markup symbols or codes your hard disk on a regular basis.
inserted into a file intended for display on Defragment your hard disk from time to
the Internet. The markup tells web time. Reinstall your Windows Operating
browsers how to display a web page's System after every few months.
words and images. 25.(C)
23.(D) Ring topology is a type of network
topology where nodes are connected in
Practice Set – 07
1. Where are the Editing group and the Replace (C) Hard Disk
command found? (D) Half-inch Tape Cartridge
(A) On the Insert tab (B) On the Review tab 11. _________ Types of virus that stays permanently
(C) On the View tab (D) On the Home tab in the RAM memory
2. What function displays row data in a column or (A) Resident (B) File infectors
column data in a row? (C) Boot virus (D) Macro virus
(A) Hyperlink (B) Index 12. Which of the following groups contains
(C) Transpose (D) Rows graphical file extensions?
3. This type of software contains rows and columns. (A) JPG, CPX, GCM (B) GIF, TCF, WMF
(A) Drawing (B) Spreadsheet (C) TCP, JPG, BMP (D) JPG, GIF, BMP
(C) Database (D) Word processing 13. A number system with a base of two is referred
4. Software for organizing storage and retrieval of as-
information is a(n)— (A) Unary number system
(A) Operating system (B) Database (B) Binary number system
(C) Database program (D) Data warehouse (C) Octal number system
5. To insert a word into the middle of a sentence- (D) All of the above
(A) Move the cursor to the desired location in the 14. Which of the following is not true for primary
sentence and type the new word storage?
(B) Move the cursor to the desired location in the (A) It is a part of the CPU
sentence, press Enter key, and type the new word (B) It allows very fast access of data
(C) Move the cursor to the beginning of the (C) It is relatively more expensive than other
sentence and start typing storage devices.
(D) Retype the whole sentence (D) Can be removed and transported.
6. A DVD is an example of a(n) – 15. Which of the following is the advantage of
(A) Hard disk Assembly language over Machine language?
(B) Optical disc (A) Easy to use (B) Easy to understand
(C) Output device (C) Easy to modify (D) All the above
(D) Solid-state storage device 16. VPN stands for_______.
7. Grouping and processing all of a firm's (A) Virtual Personal Network
transactions at one time is called– (B) Very Private Network
(A) A database management system (C) Virtual Private Network
(B) Batch processing (D) Vicious Personal Network
(C) A real-time system 17. Which of the following is true about Dial-up
(D) An on-line system internet access?
8. Semi-Conductor Memory is known as? (A) It utilizes the existing telephone services
(A) RAM (B) ROM (B) It uses a router for security
(C) PROM (D) EPROM (C) It utilizes the broadband technology
9. Every computer on the Internet is known as? (D) Modem speeds are very fast
(A) Host (B) Client 18. Which of the following memories can be read
(C) Modem (D) Server directly by the computer processor?
10. A spiral shape track formatting is present in (A) Hard Disk (B) Main Memory
(A) Floppy Disk (C) CD (D) DVD
(B) Optical Disk
19. The communication between a processor and (A) Controls the rest of the computer's
other devices inside the computer is done components
through? (B) Keeps the system unit cool
(A) Bus (B) Channel (C) Processes data
(C) Network Cable (D) Chip (D) Interprets instructions given by software
20. Who is/are the founders of Microsoft? 23. To connect to a WAN, you must have:
(A) Bill Gates (A) CSMA/CD (B) Wi-Fi
(B) Bill Gates and Allen Paul (C) TCP/IP (D) POP
(C) Steve Jobs 24. During the ____ operation, the control unit
(D) Bill Gates and Steve Jobs determines what the program is telling the
21. If a memory chip is volatile, it will....... computer to do.
(A) Explode if exposed to high temperatures (A) Fetch (B) Execute
(B) Lose its contents if current is turned off (C) Decode (D) Arithmetic
(C) Be used for data storage only 25. __________ has a large storage capacity, up to
(D) Be used to both read and write data 17 GB if both layers and both sides are used.
22. Which is NOT a function of a microprocessor? (A) DVD-ROM (B) CD-ROM
(C) Floppy (D) RAM
Solution
1.(D) Go to the "Home" tab menu on the Ribbon location in the sentence and type the new
of Microsoft Word 2007/2010/2013, at the word.
furthest right of the group is the "Editing" 6.(B) The definition of a DVD, which stands for
options. Click the Editing item, a popup digital video disc, is an optical disc that
menu will appear and now you can see the can store large quantities of digital
"Find" and "Replace" items at the top of material such as sound, images and data.
the box. An example of a DVD is the disc that
2.(C) The TRANSPOSE function returns a contains prerecorded movies that people
vertical range of cells as a horizontal watch in their homes. "DVD."
range, or vice versa. The TRANSPOSE 7.(B) The OS defines a job which has
function must be entered as an array predefined sequence of commands,
formula in a range that has the same programs and data as a single unit. The OS
number of rows and columns, keeps a number a jobs in memory and
respectively, as the source range has executes them without any manual
columns and rows. information. Jobs are processed in the
3.(B) A spreadsheet is a file that exists of cells order of submission, i.e., first come first
in rows and columns and can help arrange, served fashion.
calculate and sort data. Data in a 8.(A) Semiconductor memory is a digital
spreadsheet can be numeric values, as well electronic semiconductor device used for
as text, formulas, references and digital data storage, such as computer
functions. memory. Non-volatile memory (such as
4.(C) A database program is the heart of a EPROM, EEPROM and flash memory)
business information system and provides uses floating-gate memory cells, which
file creation, data entry, update, query and consist of a single transistor per cell.
reporting functions. The traditional term 9.(A) Every computer on the internet needs a
for database software is "database string called Internet Protocol (IP address)
management system" (see DBMS). to perform its work. So Every computer
5.(A) To insert a word into the middle of a on the internet is known as Host.
sentence move the cursor to the desired 10.(B) An optical disk is any computer disk that
uses optical storage techniques and
technology to read and write data. It is a 18.(B) The main memory is defined as the central
computer storage disk that stores data storage in a computer. An example of the
digitally and uses laser beams (transmitted main memory is where programs and data
from a laser head mounted on an optical are kept. In computing, memory refers to
disk drive) to read and write data. a device that is used to store information
11.(A) A resident virus is a computer virus that for immediate use in a computer or related
stores itself within memory, allowing it to computer hardware device. It typically
infect other files even when the originally refers to semiconductor memory,
infected program is no longer running. specifically metal–oxide–semiconductor
Being stored in memory allows the virus memory, where data is stored within MOS
to spread easier because it has more access memory cells on a silicon integrated
to other parts of the computer. circuit chip.
12.(D) Graphic images are stored digitally using 19.(A) In computer architecture, a bus (a
a small number of standardized graphic contraction of the Latin omnibus) is a
file formats, including bit map, TIFF, communication system that transfers data
JPEG, GIF, PNG; they can also be stored between components inside a computer,
as raw, unprocessed data. or between computers.
13.(B) In mathematics and digital electronics, a 20.(B) Microsoft Corporation is an American
binary number is a number expressed in multinational technology company with
the base-2 numeral system or binary headquarters in Redmond, Washington. It
numeral system, which uses only two develops, manufactures, licenses,
symbols: typically, "0" and "1". supports, and sells computer software,
14.(A) Primary storage (also known as main consumer electronics, personal
memory) is the component of the computers, and related services.
computer that holds data, programs and 21.(B) Volatile memory, in contrast to non-
instructions that are currently in use. volatile memory, is computer memory
Primary storage is located on the that requires power to maintain the stored
motherboard. random access memory information; it retains its contents while
(RAM) flash memory. powered on but when the power is
15.(D) The symbolic programming of Assembly interrupted, the stored data is quickly lost.
Language is easier to understand and Volatile memory has several uses
saves a lot of time and effort of the including as primary storage.
programmer. It is easier to correct errors 22.(B) A microprocessor is an integrated circuit
and modify program instructions. designed to function as the CPU of a
Assembly Language has the same microcomputer. Functions of
efficiency of execution as the machine Microprocessor
level language. Controlling all other parts of the machine
16.(C) A virtual private network (VPN) extends and sending timing signals.
a private network across a public network Transferring data between memory and
and enables users to send and receive data I/O devices.
across shared or public networks as if their Fetching data and instructions from
computing devices were directly memory.
connected to the private network. Decoding instruction.
17.(A) Dial-up Internet access is a form of Performing arithmetical and logical
Internet access that uses the facilities of operations.
the public switched telephone network to Executing programs stored in memory.
establish a connection to an Internet Performing communication among the
service provider by dialing a telephone I/O devices etc.
number on a conventional telephone line. 23.(D) A point of presence (PoP) is a demarcation
Dial-up internet access utilizes the point, access point, or physical location at
existing telephone services. which two or more networks or
Practice Set – 08
Solution
Ans.1(B) LISP is another language used for Ans.10(B) Graphical User interface (GUI) is a
artificial intelligence development. It is a computer program that enables a person to
family of computer programming communicate with a computer through the
language and is the second oldest use of symbols, visual metaphors and
programming language after Fortran. pointing device.
Ans.2(A) FORTRAN derived from Formula Ans.11(C) Stealth virus take up residence in the
Translation is a general-purpose, Computer memory, making them hard to
compiled imperative programming detect.
language that is especially suited to Ans.12(A) An operating System provides an interface
numeric computation and scientific between the computer user and the
computing. hardware is known as User interface.
Ans.3(B) To enter the current date -> Ctrl +; Ans.13(C) Fork is a system call of operating system
Ans.4(A) A compiler takes entire program and and it is used to create a new process.
converts it into object code which is Ans.14(D) A process which is not executing due to
typically stored in a file. The object code any waiting event is called as Deadlock.
is also refereed as binary code and can be Ans.15(C) Character User interface (CUI) is a
directly executed by the machine after mechanism of interacting with a computer
linking. Examples of compiled system or software by typing commands
programming languages are C and C++. to perform specific tasks.
Ans.5(D) Java language is used to developing a Ans.16(C) Multi processing is the capability of a
games. computer under which two or more
Ans.6(C) Application software is used to Performs programs can be simultaneously
specific task for computer users. processed.
Application software also called as “The Ans.17(C) Active window refers to the object that is
End-user Programs”. These programs do being currently used or displayed on the
the real work for user. desktop.
Ans.7(D) The relationships between cells are called Ans.18(D) Log off provide a password to protect
as Formulas. from unauthorized access.
Ans.8(D) In Spreadsheet, the names of the cells are Ans.19(A) Notepad is a text editor. It is most
called as Labels. commonly used for the edit or view text
Ans.9(C) Chart wizard brings you through the files. The file format notepad file .txt (text
process of creating a chart by displaying a document).
series of dialog boxes. Ans.20(D) Ctrl+K is used to insert a link.
Ans.21(C) ZIP stands for Zone information protocol. Ans.24(D) Bluetooth is a wireless technology, used
This is an application that allows for the for exchanging data over short distances
compression of application files. to create a personal area network.
Ans.22(C) Data communication is the exchange of Ans.25(B) Baud rate is used to measure the speed of
data between two devices using some signaling and data transfer.
form of transmission media.
Ans.23(C) Full duplex channel, both stations can
transmit and receive information
simultaneously.
Practice Set – 09
1. Modem is a device that converts digital to analog (A) Authentication (B) Integrity
signal at _____ side and converts back analog to (C) Access control (D) Non-Repudiation
digital signal at ___ Side 12. ____ converts plain text to cipher text and ____
(A) Receiver, sender (B) Receiver, client converts cipher text to plain text
(C) Client, Sender (D) Sender, Receiver (A) Analog, Digital
2. Which one prints the active documents? (B) Digital, Analog
(A) Ctrl + D (B) Ctrl + S (C) Encryption, Decryption
(C) Ctrl + Shift + F12 (D) Ctrl +F2 (D) Decryption, Encryption
3. Which one is a piece of software designed to fix 13. _____term is sometimes used to refer the
problems with a computer program or its software that displays unwanted advertisements?
supporting data? (A) Cracking (B) Phishing
(A) Patches (B) Buffer (C) Masquerade (D) Adware
(C) Gateway (D) Proxy server 14. Which one aligns the paragraph at both right and
4. Which one is a piece of software, that is used to left indent?
the explodes at a particular time? (A) Ctrl+R (B) Ctrl+L
(A) Proxy server (B) Time bomb (C) Ctrl+J (D) Ctrl+E
(C) Logic bomb (D) Hack bot 15. Which one is used to insert the current time?
5. _______ type of malware that is designed to gain (A) Alt + Shift + S (B) Alt + Shift + D
administrative level control over a computer (C) Alt + Shift + T (D) Alt + Shift + F
system without being detected 16. While studying about networking system, we
(A) Payloads (B) Freeware may came to know about ‘GPRS’. What does R
(C) Root kits (D) Update represents?
6. Which one is used to insert the current date? (A) Ratio (B) Radio
(A) Alt + Shift + S (B) Alt + Shift + D (C) Random (D) Refer
(C) Alt + Shift + T (D) Alt + Shift + F 17. In Windows operating system after you double-
7. _______ is the act of breaking in to computers click a character on the grid of characters,
(A) Cracking (B) Phishing keyboard shortcut SPACEBAR is used for _____
(C) Hacking (D) Spam (A) Move to the first character
8. Which is a piece of code intentionally inserted in (B) Move to the last character
to a computer’s memory that will set off a (C) Switch between Enlarged and Normal mode
malicious function when specified conditions are when a character is selected*
met? (D) Delete the character
(A) Proxy server (B) Time bomb 18. Which of the following is a Note-taking software
(C) Logic bomb (D) Hack bot for use with tablet PCs or regular PCs?
9. ________ is the technique to access the (A) Microsoft OneNote
unauthorised data without concerning to the (B) Microsoft PowerPoint
authorised user (C) Microsoft Word
(A) Cracking (B) Phishing (D) Microsoft Access
(C) Masquerade (D) Adware 19. What is the minimum number of rows and
10. Which one hide information or secret form? columns that a word table can have?
(A) Steganography (B) Cipher Text (A) Zero
(C) Cryptography (D) Plain Text (B) 2 rows and 1 column
11. ____ ensures that originators of messages cannot (C) 2 rows and 2 column
refuse they are not sender of the message? (D) 1 row and 1 column
20. What is shortcut key to open the dialog box? (A) it allows cache domain to contain redundant
(A) Ctrl + Q (B) Ctrl + O data
(C) Ctrl + P (D) Ctrl + R (B) it does not allow writes to be cached
21. Which of the following can you use to add times (C) its access time is greater than that ofpaged
to the slides in a presentation? caching
(A) Slide show menu (D) read ahead cache domain blocks are
(B) Rehearse timings button necessarily fixed in size
(C) Slide transition button 24. Which types of file organization are supported by
(D) All the above magnetic tape?
22. Which of the following statement is definitely (A) Random files
true based Virtual memory? (B) Contiguous sequential file
(A) simple to implement (C) Indexed sequential file
(B) used on all major commercial operating (D) All of the above
systems 25. What is the total time taken to prepare a disk
(C) less efficient in utilization of memory drive mechanism for a block of data to be
(D) useful when fast I/O devices are notavailable readfrom it?
23. An unpaged cache associates disk domainswith (A) Seek time
the address of the read and continues for a (B) Latency time
specific length. The major disadvantageof (C) Latency plus seek time
unpaged cache is that (D) Transmission time
Solution
Ans.1(D) Modem is a device that converts digital to Ans.9(C) Masquerade is the technique to access the
analog signal (Modulator) at Sender side unauthorized data without concerning to
and converts back analog to digital signal the authorized user. It accesses the
(Demodulator) at Receiver Side. A resources over the network and it is also
modem always placed between a known as Spoofing.
telephone line and computer. Ans.10(C) Cryptography is the science of writing
Ans.2(C) Ctrl + Shift + F12 à Prints the active information in a hidden or secret form and
documents It protects the data in transmit and also the
Ans.3(A) Patches one is a piece of software data stored on the disk.
designed to fix problems with a computer Ans.11(D) Non-Repudiation ensures that originators
program or its supporting data. of messages cannot refuse they are not
Ans.4(B) Time bomb is a piece of software, that is sender of the message.
used to the explodes at a particular time. Ans.12(C) Encryption converts plain text to cipher
Ans.5(C) Root kits is a type of malware that is text and Decryption converts cipher text to
designed to gain administrative level plain text.
control over a computer system without Ans.13(D) Adware term is sometimes used to refer
being detected. the software that displays unwanted
Ans.6(B) Alt + Shift + D is used to insert the current advertisements.
date. Ans.14(C) Ctrl+J aligns the paragraph at both right
Ans.7(A) Cracking is the act of breaking in to and left indent.
computers and it is a popular, growing Ans.15(C) Alt + Shift + T is used to insert the current
subject on the internet. Cracking tools are Time.
widely distributed on the internet. Ans.16(B) GPRS -->General Packet Radio Service
Ans.8(C) bomb is a piece of code intentionally Ans.17(C) In Windows operating system after you
inserted in to a computer’s memory that double- click a character on the grid of
will set off a malicious function when characters, keyboard shortcut
specified conditions are met. SPACEBAR is used for Switch between
Practice Set – 10
1. The system failure due to power failure is (A) Linear (B) Parallel
considered under, which of the following? (C) Sequential (D) Both 2 and 3
(A) Hardware reliability 9. To access a mainframe or super computer, user
(B) Software reliability often use _____
(C) System reliability (A) Server (B) Client
(D) Operation reliability (C) Terminal (D) Node
2. Which of the following is responsible for 10. Which of the following term is not associated
deciding when the system can be released to with the Spread sheet software?
customers, managing the process of creating (A) Formula (B) Cell
there lease and distribution media and (C) Column (D) Slide
documenting the release? 11. The subsystem of the kernel and hardware that
(A) System procurement cooperates to translate virtual to physical address
(B) System quality assessment comprises _____
(C) System release management (A) Process management subsystem
(D) System reliability (B) Memory management subsystem
3. These objects can be realized as parallel process (C) Input / Output management subsystem
with method corresponding to defined object (D) All the above
operations. 12. Which of the following controls the way in which
(A) Self-descriptiveness (B) Servers the computer system function and provide a
(C) Simplicity (D) All of these means by which user can be interacted with the
4. Transforming of logic and data from design computer?
specifications (design descriptions) into a (A) Keyboard (B) Mouse
programming language is called _______-. (C) Microphone (D) Operating system
(A) Compatibility (B) Compactness 13. The building block of the database that contains
(C) Coding (D) Communication related records are called ____
5. When you save an Access project, what file (A) Query (B) Information
extension do you use? (C) Report (D) Data
(A) .adp (B) .xm 14. Arranging the data in a logical sequence is
(C) .php (D) .mdb known as______.
6. You can switch back and forth between design (A) Searching (B) Screening
and datasheet view by clicking _______. (C) Arranging (D) Sorting
(A) switch command on the view menu 15. Which of the following is a large scale electronic
(B) View button repository of data, that is time variant?
(C) queries object tab (A) Data mining (B) Data storing
(D) select query title bar (C) Data Sorting (D) Data warehousing
7. Which of the following terminals are often 16. The software that is used to create text-based
connected to complex inventory and sales documents is referred as _______.
computer systems? (A) DBMS (B) Suites
(A) Data (C) Spread sheet (D) Word processors
(B) Query 17. Telnet is a ______ based computer protocol
(C) Point of sale (A) Voice (B) Text
(D) Acknowledgement (C) Digital coding (D) Image
8. In the latest generation computers, The 18. Which of the following search method is
Instructions are executed in which format? conducted for a specific title, domain, URL, or
host?
Solution
Ans.1(A) The system failure due to power failure is Ans.8(D) In the latest generation computers, The
considered under Hardware reliability. Instructions are executed in both parallel
Ans.2(C) System release management is and sequential format
responsible for deciding when the system Ans.9(C) To access a mainframe or super computer,
can be released to customers, managing user often use the Terminal
the process of creating the release and Ans.10(D) Slide is not associated with the spread
distribution media and documenting the sheet.
release Ans.11(B) The subsystem of the kernel and hardware
Ans.3(B) These objects can be realized as parallel that cooperates to translate virtual to
process with method corresponding to physical address comprises Memory
defined object operations known as management subsystem
Server. Ans.12(5) Operating system will controls the way in
Ans.4(C) Transforming of logic and data from which the computer system function and
design specifications (design provide a means by which user can be
descriptions) into a programming interacted with the computer
language is called Coding. Ans.13(C) The building block of the database that
Ans.5(A) We have to save Access project in .adp contains related records are called Report.
format. Ans.14(D) Arranging the data in a logical sequence is
Ans.6(B) You can switch back and forth between known as Sorting.
design and data sheet view by clicking Ans.15(D) Data warehousing is a large-scale
View button. electronic repository of data that is time
Ans.7(C) Point of sale are often connected to variant.
complex inventory and sales computer Ans.16(D) The software that is used to create text-
systems based documents is referred as Word
processors.
Ans.17(B) Telnet is a text-based computer protocol. Ans.23(D) System software works with end-user,
Ans.18(B) Field search method is conducted for a application software, and computer
specific title, domain, URL, or host hardware to handle majority of technical
Ans.19(A) Meta search engine sends request for details.
information to several search engines Ans.24(A) Computer-aided manufacturing
simultaneous and Compiles the result. information system focused on making
Ans.20(D) AM -->Frequency Amplitude Modulation manufacturing processes more efficient
Ans.21(C) Free hard-disk space is used to extend the and of higher quality.
capacity of RAM is termed as Virtual Ans.25(A) A detailed written description of the
memory. programming cycle and the program,
Ans.22(B) Graphical user interface is the major along with the results and a printout of the
feature of the world wide web, that make program is called Documentation.
it simple to learn and use.
Practice Set – 11
1. The term used to describe the intangible 10. __________ computers represent data as
instructions that tell the computer, what to do is variable points along a continuous spectrum of
___. values.
(A) Hardware (B) Software (A) Analog (B) Digital
(C) Storage (D) Input/ Output (C) Precise (D) Mainframe
2. Which keys enable the input of numbers quickly? 11. Personal computers can be connected together to
(A) Ctrl, Shift and alt (B) functional keys form a __________.
(C) numerical keys (D) arrow keys (A) Server (B) supercomputer
3. The operating system that is self contained in a (C) network (D) Enterprise
device and resident in the ROM is _____. 12. The main component of a desktop PC is the
(A) Batch Operating system ________ which houses the computer’s critical
(B) Real time Operating system parts.
(C) Embedded Operating system (A) Processor (B) memory
(D) Multi processor Operating system (C) keyboard (D) system case
4. Which of the following is used by the browser to 13. To make a notebook act as a desktop model, the
connect to the location of the Internet resources? notebook can be connected to a ______ which is
(A) Linker (B) Protocol connected to a monitor and other devices.
(C) Cable (D) URL (A) Bay (B) docking station
5. Which of the following contains permanent data (C) port (D) Network
and get updated during the processing of 14. Minicomputers are also called_________
transactions? computers.
(A) Operating System files (A) Midrange (B) laptop
(B) Transaction files (C) handheld (D) Smart
(C) Software file 15. The most important or powerful computer in a
(D) Master file typical network is __________.
6. A(n) __________ is software that you purchase (A) Desktop (B) network client
that solves one task. (C) network server (D) network station
(A) Suite 16. The __________ is used by the tablet PC to write
(B) stand-alone program on the screen.
(C) open-source program (A) Finger (B) mouse
(D) freeware program (C) digitizer (D) Stylus
7. Which of the following is not a programming 17. To access a mainframe or supercomputer, users
language? often use a __________.
(A) Lisp (B) See (A) Terminal (B) node
(C) Java (D) Perl (C) desktop (D) Handheld
8. Which of the following is not related to e-mail? 18. If you magnify a __________ you can see its
(A) BCC (B) SPAM individual pixels.
(C) Pen (D) Pine (A) vector graphic (B) bitmap
9. A __________ is an electronic device that (C) DXF (D) EMF
process data, converting it into information. 19. Paint programs keep track of every __________
(A) Processor (B) computer placed on the screen.
(C) case (D) Stylus (A) Image (B) object
(C) Pixel (D) color
20. The term __________ originated with large (A) Title (B) Header
books of reproducible images. (C) Footer (D) Sidebar
(A) clip art (B) scanned images 24. Which of the following statements best describes
(C) digital photo (D) bitmap a leaderboard?
21. In a photo editor, you can repair scratches using (A) It is the top section of a webpage.
the __________ tool. (B) It contains the head section of the HTML.
(A) Mask (B) airbrush (C) It displays a website’s site map.
(C) stamper (D) Eraser (D) It is a common ad size used in online
22. Which of the following is most similar to a word advertising.
processor? 25. Which of the following is a type of URI?
(A) Dictionary (B) Thesaurus (A) URL (B) USB
(C) Text Editor (D) Code Inspector (C) UDDI (D) UML
23. Where is the copyright information located on
most webpages?
Solution
Ans.1(B) The term used to describe the intangible Ans.13(B) To make a notebook act as a desktop
instructions that tell the computer, what to model, the notebook can be connected to
do is Software. a docking station.
Ans.2(C) The numerical keys enable the input of Ans.14(A) Minicomputers are also called midrange
numbers quickly. computers.
Ans.3(C) The operating system that is self- Ans.15(C) The most important or powerful computer
contained in a device and resident in the is network server in a typical network.
ROM is called Embedded operating Ans.16(D) The stylus is used by the tablet PC to write
system. on the screen.
Ans.4(D) URL can be used by the browser to Ans.17(A) To access a mainframe or supercomputer,
connect to the location of the Internet users often use a terminal.
resources. Ans.18(B) If you magnify a bitmap you can see its
Ans.5(D) Master file contains permanent data and individual pixels.
get updated during the processing of Ans.19(C) Paint programs keep track of every Pixel
transactions. placed on the screen
Ans.6(B) standalone program is software that you Ans.20(A) The term clip art originated with large
purchase that solves one task. books of reproducible images.
Ans.7(B) See is not a programming language. Ans.21(B) In a photo editor, you can repair scratches
Ans.8(D) Pine is not related to e-mail. using the airbrush tool.
Ans.9(B) Computer is an electronic device that Ans.22(C) A word processor processes words, it is
process data, converting it into similar to Text Editor.
information. Ans.23(C) Footer is often used to display company
Ans.10(A) Analog computers represent data as data or copyright information.
variable points along a continuous Ans.24(D) Leader boards can contain text, images, or
spectrum of values. even animations.
Ans.11(C) Personal computers can be connected Ans.25(A) URIs are similar to URLs in that they
together to form a network. specify the location of a file.
Ans.12(D) The main component of a desktop PC is
the system case, which houses the
computer’s critical parts.
Practice Set – 12
1. Mechanism developed to enforce users to enter 13. What SQL command will allow you to change
data in required format is _______. the table STUDENT to add the constraint named
(A) Data validation (B) Input mask Grade Check that states that the values of the
(C) Criteria (D) Data verification Grade column must be greater than 0?
2. The raw facts and figures are ________. (A) ALTER TABLE STUDENT ALTER
(A) Data (B) Information CONSTRAINT Grade Check (Grade > 0) ;
(C) Snapshot (D) Reports (B) ALTER TABLE STUDENT ADD
3. The feature that database allows to access only CONSTRAINT Grade Check (Grade > ‘O) ;
certain records in database is ________. (C) ALTER TABLE STUDENT ADD
(A) Forms (B) Reports CONSTRAINT Grade Check CHECK (Grade>
(C) Queries (D) Tables O) ;
4. Which filter method lets you filter the records (D) ALTER TABLE STUDENT ADD
that match the selected field? CONSTRAINT Grade Check (Grade> O) ;
(A) Filter by form (B) Filter by selection 14. Input, output and processing devices grouped
(C) Auto filter (D) Advanced filter together represent a (n) ………
5. Which filter method lets you filter records based (A) Mobile device
on criterion you specify? (B) Information processing cycle
(A) Filter by form (B) Filter by selection (C) Circuit board
(C) Auto filter (D) Advanced filter (D) Computer system
6. To place a sound into a Word document, you 15. Which part of the computer helps to store
would use the _____ feature of Windows. information?
(A) OLE (B) Clipboard (A) Disk drive (B) CPU
(C) Paste (D) task switching (C) Monitor (D) Keyboard
7. The program that allows the OS to work with a 16. Various applications and documents are
printer or a video card is a(n) _______. represented on the Windows desktop by ______.
(A) Utility (B) driver (A) Symbols (B) Labels
(C) applet (D) system call (C) Graphs (D) Icons
8. The ____ protects your system from hackers. 17. To see the document before the printout is taken,
(A) Snort (B) backup use .......
(C) anti-virus (D) firewall (A) Insert Table (B) Paste
9. A program currently loaded in the system but not (C) Format Painter (D) Print Preview
active is said to be running in the _______. 18. ..... helps create, manipulate and analyze data
(A) user session (B) kernel arranged in rows and columns?
(C) background (D) foreground (A) Application Package
10. Data that is copied from an application is stored (B) Word Processing Package
in the______. (C) Outlining Package
(A) Driver (B) Clipboard (D) Spreadsheet Package
(C) terminal (D) prompt 19. A register that keeps track of the next instruction
11. What is the shortcut key to Update Formula in a to be executed is called a(n) _______.
table? (A) Data Register
(A) Shift + F9 (B) F9 (B) Instruction Register
(C) Ctrl + F9 (D) Alt + F9 (C) Action Register
12. What is the shortcut key for “Font” dialog box? (D) Program Counter
(A) Ctrl + G (B) Ctrl + F 20. You can use the tab key to ________.
(C) Ctrl + D (D) Ctrl + H (A) Move a cursor across the screen
(B) Indent a paragraph 23. Which of the following is not a Modifier Key?
(C) Move the cursor down the screen (A) Insert (B) Shift
(D) (A) and (B) (C) Alt (D) Ctrl
21. Which of following is basic data type? 24. In RDBMS, Data is presented as a collection
(A) Array (B) Character of.............
(C) Structure (D) Union (A) Table (B) Attributes
22. Which of the following part will hold many of (C) Relations (D) Entities
the crucial components of a computer, including 25. SMPS stands for?
the central processing unit (CPU), memory and (A) Start mode power supply
connectors for input and output devices? (B) Store mode power supply
(A) Holders (B) Mother Board (C) Switched mode power supply
(C) Main Board (D) System Board (D) Single mode power supply
Solution
Ans.1(B) Mechanism developed to enforce users to Ans.16(D) Various applications and documents are
enter data in required format is input represented on the Windows desktop by
mask. icons.
Ans.2(A) The raw facts and figures are Data. Ans.17(D) We use Print preview to see the document
Ans.3(C) The feature that database allows to access before the printout is taken.
only certain records in database is Queries Ans.18(D) Spreadsheet Package helps create,
Ans.4(B) Filter by selection method lets you filter manipulate and analyze data arranged in
the records that match the selected field. rows and columns.
Ans.5(A) Filter by form method lets you filter Ans.19(B) Instruction register is the part of control
records based on criterion you specify. unit that keeps track of the next instruction
Ans.6(A) To place a sound into a Word document, to be executed.
you would use the OLE feature of Ans.20(B) You can use the tab key to indent a
Windows. paragraph.
Ans.7(B) The program that allows the OS to work Ans.21(B) Character is basic data type.
with a printer or a video card is a driver. Ans.22(B) A motherboard is one of the most essential
Ans.8(D) The firewall protects your system from parts of a computer system. It holds
hackers. together many of the crucial components
Ans.9(C) A program currently loaded in the system of a computer, including the central
but not active is said to be running in the processing unit (CPU), memory and
background. connectors for input and output devices.
Ans.10(B) Data that is copied from an application is Ans.23(A) Shift, Alt, Ctrl and Fn are the Modifier
stored in the clipboard. Key.
Ans.11(B) F9 is the shortcut key to Update Formula Ans.24(C) Relation is sometimes used to refer to a
in a table. table in a relational database.
Ans.12(C) Ctrl + D is the shortcut key for “Font” Ans.25(C) A switched-mode power supply
dialog box. (switching-mode power supply, SMPS, or
Ans.13(C) ALTER TABLE STUDENT ADD switcher) is an electronic power supply
CONSTRAINT Grade Check CHECK that incorporates a switching regulator to
(Grade> O) ; convert electrical power efficiently.
Ans.14(D) Input, output and processing devices Like other power supplies, an SMPS
grouped together represent a computer transfers power from a source, like mains
system. power, to a load, such as a personal
Ans.15(A) Disk drive helps to store information in computer, while converting voltage and
computer system. current characteristics.
Practice Set – 13
1. Who among the following is the chief executive (A) Decoding (B) Encoding
officer of Infosys? (C) Encrypting (D) Decrypting
(A) Salil Parekh (B) Bill Gates 11. What is the name of the portal in computer,
(C) Ginni Rometty (D) Satya Nadella which allow additional devices to connect?
2. Which of the following will translate higher level (A) Primary (B) Secondary
language to lower level language? (C) Peripheral (D) Optional
(A) Translator (B) Linker 12. What is the short cut key to close currently
(C) Converter (D) Compiler opened document in Microsoft word?
3. 1024 TB is called as ____. (A) Ctrl + W (B) Ctrl + D
(A) 1 KB (B) 1 PB (C) Ctrl + T (D) Ctrl + B
(C) 1EB (D) 1 GB 13. In the C coding ‘<stdio.h>’ is used as a _______
4. SRAM retains data as long as power is provided file.
to the memory chip and need not be refreshed (A) Subroutines (B) Footer
periodically. What does ‘S’ represents? (C) Header (D) Increment
(A) Stagnant (B) Storage 14. Which among following organization is
(C) Simple (D) Static concerned with databases?
5. What do you mean by Output in computer (A) Oracle (B) Asus
terminology? (C) Intel (D) Motorola
(A) What the processor takes from the user 15. What does Web Server Error Message 500
(B) What the user gives to the processor mean?
(C) What the processor gets from the user (A) Bad file error/syntax error
(D) What the processor gives to the user (B) Site not found
6. Network components are connected to the same (C) Internet Error/server-configuration problems
cable in which among the following topology? (D) Access forbidden/Password Protected
(A) Star (B) Ring 16. Which of the following is not related with
(C) Bus (D) Mesh ‘Programming’?
7. What is the Short cut key for line break in MS (A) Programmer (B) Language
Word? (C) Operating System (D) Flow Chart
(A) Ctrl + Enter (B) Alt + Enter 17. Raw, unprocessed facts, including text, numbers,
(C) Shift + Enter (D) Space + Enter images, and sounds, are called ______
8. What is the full form of ‘MAN’? (A) applets (B) data
(A) Man Area Network (C) met aware (D) product
(B) Meter Area Network 18. Which of the following is necessary to track
(C) Metropolitan Area Network computer, while connecting to Internet?
(D) Manage Area Network (A) System Number (B) Memory
9. Which of the following is not a network (C) IP (D) VP
protocol? 19. Which of following is not an example for
(A) HTTP (B) FTP simplex?
(C) SMTP (D) HTML (A) Radio broadcasting
10. The data are modified to specific code and (B) Television broadcasting
protected in the sender side while transferring, (C) Speaker
and the special key is used to retrieve the original (D) Walkie talkie
data in the receiver side What is the process used 20. Which of the following layer is responsible for
in receiver side to retrieve the original data? converting electrical impulse to bit streams?
(A) Presentation (B) Physical 23. Deleted mails from the Inbox can be found
(C) Data link (D) Network in______
(5) None of these (A) Trash (B) Spam
21. The computer’s capability of distinguishing (C) Promotions (D) All Mail
spoken words is called _________ 24. Expand “MODEM”?
(A) Voice analysis (A) Modern development
(B) Speech acknowledgment (B) Medium Development
(C) Speech interpretation (C) Modulation and Demolition
(D) Voice recognition (D) Modulation and Demodulation
22. While working in mail we may came under the 25. What is the short cut to justify the paragraph?
‘BCC’, what does B represents? (A) Ctrl + R (B) Ctrl + J
(A) Blink (B) Black (C) Ctrl + U (D) Ctrl + E
(C) Blind (D) Broad
Solution
Ans.1(A) Salil Parekh is the current Chief Executive repeatedly hit Enter to add a page. Instead,
Officer and Managing Director (CEO & use this handy shortcut to quickly insert a
MD) of Infosys. clean page break.
Ans.2(D) Compiler translates the program from Ans.8(C) A MAN (metropolitan area network) is a
high level language to machine language. larger network that usually covers certain
It is very fast because it converts the whole area, village or several building.
program into machine language. Ans.9(D) HTML (Hypertext Markup Language) is
Ans.3(B) 1024 TB = 1PB (PB --> Petabyte) the programming language.
Ans.4(D) SRAM retains data as long as power is Ans.10(D) Decryption is the process of transforming
provided to the memory chip and need not data that has been rendered unreadable
be refreshed periodically. SRAM stands through encryption back to its
for Static Random Access Memory. unencrypted form. In decryption, the
Ans.5(D) Any information that has been processed system extracts and converts the garbled
by and sent out from a computer or similar data and transforms it to texts and images
device is considered output. that are easily understandable not only by
Ans.6(C) the reader but also by the system.
Decryption may be accomplished
manually or automatically. It may also be
performed with a set of keys or passwords.
Ans.11(C) A peripheral device connects to a
computer system to add functionality.
Examples are a mouse, keyboard,
monitor, printer and scanner.
Ans.12(A) To close currently opened document in
Bus Topology is the simplest of network Microsoft word à Ctrl + W
topologies. In this type of topology, all the Ans.13(C) ‘<stdio.h>’ and ‘<conio.h>’ are used as a
nodes (computers as well as servers) are header file in C program
connected to the single cable (called bus), Ans.14(A) Oracle Corporation is an American
by the help of interface connectors. This multinational computer technology
central cable is the backbone of the corporation headquartered in Redwood
network and is known as Bus (thus the City, California, United States.
name). Every workstation communicates Ans.15(C) The 500 Internal Server Error is a very
with the other device through this Bus. general HTTP status code that means
Ans.7(C) If you want to start some text on a new something has gone wrong on the
page in your Word document, don’t website's server, but the server could not
be more specific on what the exact Ans.20(B) OSI Model, Layer 1 conveys the bit
problem is. stream - electrical impulse, light or radio
Ans.16(C) Computer programming is the process of signal — through the network at the
writing instructions that get executed by electrical and mechanical level. It
computers. The instructions, also known provides the hardware means of sending
as code, are written in a programming and receiving data on a carrier, including
language which the computer can defining cables, cards and physical
understand and use to perform a task or aspects. Fast Ethernet, RS232, and ATM
solve a problem. are protocols with physical layer
Ans.17(B) Raw, unprocessed facts, including text, components.
numbers, images, and sounds, are called Ans.21(D) The computer’s capability of
Data. distinguishing spoken words is called
Ans.18(C) Internet Protocol (IP) is required to track Voice recognition
computer while assessing Internet. Ans.22(C) BCC --> Blind Carbon copy
Ans.19(D) Simplex communication is a Ans.23(A) Trash will contain all the deleted mails for
communication channel that sends 30 days from deleting the documents.
information in one direction only. Walkie Ans.24(D) MODEM--> Modulation and
talkie is example for Half Duplex, in Demodulation
which transmission is possible in both Ans.25(B) Ctrl + J --> to justify the paragraph.
direction. But only one direction
transmission is possible in One time.
Practice Set – 14
1. Which of the following is a non-volatile 10. While searching the information in Internet, we
memory? may came to notice ‘HTTPS’ what does ‘S’
(A) RAM (B) ROM represents?
(C) Cache (D) Primary (A) Secure (B) Storage
2. Expand DVD? (C) System (D) Secrete
(A) Digital Video Disc 11. Science Novel by John Bruner titled ‘Shockwave
(B) Decoded Versatile Disc Rider’ first time coined the term _________?
(C) Digital Virtual Disc (A) Bug (B) Vice
(D) Dimensional Video Disc (C) Lice (D) Worm
3. Virtual memory is – 12. Microsoft Office is?
(A) An extremely large main memory (A) Shareware
(B) A secondary memory acting as main memory (B) Public domain software
(C) An illusion of an extremely large memory (C) Open-source software
(D) A type of memory used in super computers (D) An application suite
4. Refresh Rate of monitor is measured in____. 13. Who is the founder of ‘WWW’?
(A) Hz (B) Meter (A) Ajay V. Bhatt (B) Tim Berners-Lee
(C) Volts (D) Amp. (C) Ericsson (D) DARPA
5. Hardware includes which among the following? 14. ___________ is a sequence of instructions
(A) All devices used to input data into a compute designed to direct the computer to perform
(B) Sets of instructions that a computer runs or certain functions.
executes (A) Data (B) Program
(C) The computer and all the devices connected (C) Software (D) Subroutines
to it that are used to input and output data 15. Which of the following is not an Operating
(D) All devices involved in processing system?
information including the central processing unit, (A) Windows Vista (B) Ubuntu
memory and storage (C) ARM (D) BeOS
6. OSI is an ISO standard for worldwide 16. Which process should be used to recall a
communications that defines a networking document saved previously?
framework for implementing protocols. What (A) Copy (B) Save
does ‘O’ stands for? (C) Retrieve (D) Enter
(A) Operation (B) Open 17. What does “Zipping" a file mean?
(C) Organization (D) Optical (A) Encrypting the message
7. What does dots per inch (DPI) measure? (B) Compressing the message
(A) number of bits (C) Transferring the message
(B) density of the pixels on a computer screen (D) Decoding the message
(C) the density of bits on a disk 18. …………… defines rules regarding the values
(D) density of graphic files stored on a hard disk allowed in columns and is the standard
8. Which among the following is not an Object mechanism for enforcing database integrity.
Oriented Programming Language? (A) Column (B) Constraint
(A) Python (B) C++ (C) Index (D) Trigger
(C) Java (D) PASCAL 19. A peer-to-peer LAN is an appropriate network
9. What are the components that are used in second architecture for?
generation computers? (A) The Internet
(A) Vacuum tube (B) LSI (B) Home network
(C) Punch cards (D) Transistors
(C) Network requiring a server with shared (A) Copper (B) Steel
resources (C) Silicon (D) Iron
(D) wide area network 23. What is the term used to denote the repetition of
20. ASCII is a/an ________. data in DBMS?
(A) Numbering system for representing numbers (A) Repeating (B) Restrict
with decimals. (C) Reappear (D) Redundancy
(B) Character representation standard common 24. ____ is the most important/powerful computer in
in older mainframe computers. a typical network.
(C) Encoding standard used to represent letters (A) Network client (B) Desktop
and characters. (C) Network station (D) Network server
(D) Symbolic programming language that 25. The Artificial satellite which revolves around the
directly represents machine instructions. earth and provide transmit information from
21. What is the maximum allowed field size for earth is basically called _____
Boolean (Yes/No) fields? (A) Geo satellites
(A) 1 (B) 8 (B) Geostationary satellites
(C) 50 (D) 255 (C) Low Earth Orbits
22. Which element is used to make computer chips? (D) Sun-Synchronous orbits
Solution
Ans.1(B) ROM is the volatile memory. the input resolution of a photograph or
Ans.2(A) DVD (an abbreviation of "digital video image.
disc" or "digital versatile disc") is a digital Ans.8(D) Pascal is an imperative and procedural
optical disc storage format invented and programming language, which Niklaus
developed by Philips and Sony in 1995. Wirth designed in 1968–69 and published
The medium can store any kind of digital in 1970.
data and is widely used for software and Ans.9(D) Transistors are used in second generation
other computer files as well as video computers.
programs watched using DVD players. Ans.10(A) HTTPS --> Hypertext Transfer Protocol
Ans.3(B) memory that appears to exist as main (HTTP) Secure for secure communication
storage although most of it is over a computer network.
supported by data held in secondary Ans.11(D) The Shockwave Rider is a science fiction
storage, transfer between the two being novel by John Brunner, originally
made automatically as required. published in 1975. It is notable for its
Ans.4(A) Refresh rate of monitor is measured in hero's use of computer hacking skills to
Hertz (Hz) that indicates how many times escape pursuit in a dystopian future, and
per second a monitor screen image is for the coining of the word "worm" to
renewed. For example, a monitor with a describe a program that propagates itself
refresh rate to 75 Hz means the screen is through a computer network.
going to redraw 75 times per second. Ans.12(D) Microsoft Office is a set of interrelated
Ans.5(D) In information technology, hardware is desktop applications, servers and services,
the physical aspect of computers, collectively referred to as an office
telecommunications, and other devices. Application suite.
Ans.6(B) OSI - Open Systems Interconnection. Ans.13(B) English Scientist Tim Berners-Lee
The Open System Interconnection (OSI) invented the World Wide Web in 1989
model defines a networking framework to Ans.14(C) Software is a sequence of instructions
implement protocols in seven layers. designed to direct the computer to perform
Ans.7(B) In printing, DPI (dots per inch) refers to certain functions.
the output resolution of a printer or image
setter, and PPI (pixels per inch) refers to
Ans.15(C) Windows Vista, Ubuntu, BeOS and Unix characters into 7-bit binary integers as
are the Operating system. ARM is the shown by the ASCII chart on the right.
processor. Ans.21(A) Field Size sets the maximum space
Ans.16(C) Retrieve is defined as to find and bring or available for any one value. In computer
to bring back or restore. An example of science, the Boolean data type is a data
retrieve is to recover lost files on a type that has one of two possible values
computer. (usually denoted true and false).
Ans.17(B) Zipping is the act of packaging a set of Ans.22(C) Computer chips are made of silicon,
files into a single file or archive that is which is a semiconductor, and in order to
called a zip file. make the most efficient use of it, chip
Ans.18(B) Constraints are the rules that we can apply manufacturers use sand that contains as
on the type of data in a table. That is, we much silicon as possible.
can specify the limit on the type of data Ans.23(D) Repetition of data in the DBMS was called
that can be stored in a particular column as Data Redundancy.
in a table using constraints. Ans.24(D) Network server is the most important/
Ans.19(B) In its simplest form, a peer-to-peer (P2P) Powerful computer in a typical network.
network is created when two or more PCs Ans.25(B) The majority of communications satellites
are connected and share resources without are in fact geostationary satellites.
going through a separate server computer. Geostationary satellites like
Ans.20(C) ASCII abbreviated from American geosynchronous satellites take 24 hours
Standard Code for Information to complete a rotation. However,
Interchange, is a character- encoding geostationary satellites are positioned
scheme. Originally based on the English directly over the equator and their path
alphabet, it encodes 128 specified follows the equatorial arth.
Practice Set – 15
1. ULSI microprocessor is used in which among the (A) Mother Board (B) Expansion Board
following generation of computers? (C) Monitor (D) UPS
(A) Second generation (B) Third generation 12. Getting data from a cell located in a different
(C) Fourth generation (D) Fifth generation worksheet in MS Excel is known as?
2. A monitor's _______ is the distance between the (A) Accessing (B) Referencing
holes in the mask behind the screen. This helps (C) Updating (D) Functioning
determine how sharp the dots appear. 13. Which among the following key combination is
(A) Refresh rate (B) Dot pitch used for deleting the selected item permanently
(C) Resolution (D) Colour depth without moving the item to the Recycle Bin?
3. Which among following is not an input device? (A) Shift + Delete (B) Delete
(A) Mouse (B) Scanner (C) Ctrl + Delete (D) Alt + Delete
(C) Keyboard (D) Printer 14. Which among the following is a large-sized,
4. Which of following is not an Application powerful multi-user computer that can support
Software? concurrent programs?
(A) Photoshop (B) SAGE (A) Mainframe Computers
(C) Dreamweaver (D) WinRAR (B) Mini-Computers
5. Print server uses ________ which is a buffer that (C) Workstations
holds data before it is send to the printer. (D) Computer Networks
(A) Queue (B) Spool 15. In Computer terminology ‘CAD’ is stands for?
(C) Node (D) Matrix (A) Computer and Design
6. The______ portion of LAN management (B) Computer Algorithm in Design
software restricts access, records user activities (C) Compact Adding Device
and audit data etc. (D) Computer Aided Design
(A) Configuration Management 16. System files are a set of critical computer file
(B) Security Management without which a computer system may not
(C) Performance Management operate correctly. These files are created and
(D) Action Management maintained by?
7. Which of the following are the sub protocols of (A) User of the operating system
E-Cash system? (B) Administrator
(A) Withdrawal (B) Payment (C) Operating System
(C) Deposit (D) All of the above (D) Database Manager
8. What is the maximum number, that each of the 17. In an ER model, ______ is described in the
four parts of an IP Address can have? database by objects.
(A) 345 (B) 255 (A) Entity (B) Attribute
(C) 197 (D) 301 (C) Relationship (D) Notation
9. Which of the following extension is used to save 18. Excel files are also called by the name of _____.
image in the computer? (A) Workbook (B) Worksheet
(A) .cmd (B) .xls (C) Spreadsheet (D) Spread book
(C) .vlc (D) .jpeg 19. How was multiplication process occurring in
10. ‘Chrome’ is a ______ software ALU?
(A) Operating System (B) Application (A) Repeated Addition
(C) System (D) Utility (B) Repeated Squaring
11. The RAM is located in which part of the (C) Repeated Subtraction
computer system? (D) Repeated Division
20. What is the name of the first invented digital (B) Binary Input Output System
computer? (C) Basic Input of System
(A) EDVAC (B) ENIAC (D) Binary Integrated Original System
(C) Super Computer (D) Calculator 24. In Microsoft Word while writing a document,
21. Which of the following is the Universal gate? you can use the _____ feature to find an
(A) NOT (B) AND appropriate word or an alternative word?
(C) OR (D) NOR (A) Dictionary (B) Translate
22. To find a saved document in the (C) Encyclopedia (D) Thesaurus
computer’s memory and bring it up on the screen 25. FOXPRO is a?
to view _______. (A) Application Software
(A) Reverse (B) Return (B) Anti-Virus
(C) Retrieve (D) Return (C) Programming Language
23. BIOS stand for? (D) Both (A) and (D)
(A) Basic Input Output System
Solution
Ans.1(D) ULSI (Ultra Large Scale Integration) as finish printing before continuing on to
CPU components and AI (Artificial your next task.
Intelligence) are main features of the fifth Ans.6(B) Security Management is one of the critical
generation. ULSI has more than million portions in network security that ensures
components integrated in single chip. safety of network, data and systems.
The capability of thinking and self- Ans.7(D) E-cash is a payment system designed and
decision making is equipped with implemented for making purchases over
computer. Fifth generation language open networks such as the Internet. All are
(After 1990) is an advance high level or sub protocols of it.
very high level language is used in this Ans.8(B) All IP addresses are made up of four parts
generation. (quadrants) separated by dots, like this:
Ans.2(B) Dot pitch, or "pixel pitch," is a XXX.XXX.XXX.XXX Where each XXX
measurement that defines the sharpness can be any number between 0 and 255.
of a display. It measures the distance Each of these numbers are stored in 8 bits
between the dots used to display the image (binary digits), and the number of
on the screen. This distance is very small possibilities you can have is 2 raised to the
and is typically measured in fractions of power of 8, which is 256 (0-255).
millimeters. Smaller the dot pitch, sharper Ans.9(D) The images in the computer are saved with
the picture. the extension .jpeg
Ans.3(D) Printer is a peripheral device which is used Ans.10(B) Chrome is the Application software. That
to show processed data. are used to perform specific task
Ans.4(D) WinRAR is a Utility Software. WinRAR Ans.11(A) The Motherboard is the main circuit board
is a Windows data compression tool that for the computer, containing both
focuses on the RAR and ZIP data soldered, non-removable components
compression formats for all Windows along with sockets or slots for components
users. that can be removed. The motherboard
Ans.5(B) Printers have a limited amount of holds the CPU, RAM and ROM chips, etc.
memory, often times much smaller than Ans.12(B) A cell reference refers to a cell or a range
the size of a document that we want to of cells on a worksheet and can be used
print. Printer spooling allows us to send in a formula so that Microsoft Office
large documents, or multiple documents, Excel can find the values or data that you
to a printer and not have to wait for it to want that formula to calculate.
Ans.13(A) To permanently delete a file; Select the Ans.18(A) A workbook is another word for Excel
item you want to delete. Press and hold the file. When we start Excel, we click Blank
Shift key, then press the Delete key on workbook to create an Excel workbook
your keyboard. Because you cannot undo from scratch.
this, you will be asked to confirm that you Ans.19(A) Multiplication is the repeated Addition.
want to delete the file or folder. Ans.20(B) ENIAC was the first digital computer and
Ans.14(A) Mainframe computers are generally it was invented by J. Presper Eckert and
known for their large size, amount of John Mauchly at the University of
storage, processing power and high level Pennsylvania and began construction in
of reliability. They are primarily used by 1943.
large organizations for mission-critical Ans.21(D) NAND and NOR gates are the universal
applications requiring high volumes of gates, since it is the combination of all
data processing. three major gates AND, OR and NOT.
Ans.15(D) Computer-aided design (CAD) is the use Ans.22(C) A term used to describe the process of
of computer systems to assist in the searching for, locating, and returning data.
creation, modification, analysis, or For example, a user may retrieve a
optimization of a design. CAD software is document on a computer to be viewed or
used to increase the productivity of the modified.
designer, improve the quality of design, Ans.23(A) BIOS (basic input/output system) is the
improve communications through program a personal computer's
documentation, and to create a database microprocessor uses to get the computer
for manufacturing. system started after you turn it on. It also
Ans.16(C) System files are created and maintained manages data flow between the
by the operating system and are necessary computer's operating system and attached
for the system to perform its many devices such as the hard disk, video
functions. System files are used by many adapter, keyboard, mouse and printer.
commands and subroutines to perform Ans.24(D) A thesaurus is a software tool included
operations. These files can only be with some word processors that provides
changed by a user with root authority. synonyms for selected words on
Ans.17(A) An entity relationship model, also called command. Users using Microsoft Word
an entity-relationship (ER) diagram, is a can open a Thesaurus by highlighting the
graphical representation of entities and word they want to look up and pressing
their relationships to each other. An the shortcut key Shift+F7.
entity can be a real-world object that can Ans.25(D) FoxPro is a text-based procedurally
be easily identifiable. For example, in a oriented programming language and
school database, students, teachers, DBMS, originally published by Fox
classes, and courses offered can be Software and later by Microsoft, for MS-
considered as entities. DOS, Windows, Macintosh, and UNIX.
Practice Set – 16
1. Which of the following is the collection of 10. Which of the following document means the file
related records? is transferred from another computer to your
(A) Data (B) File computer?
(C) Multiple record (D) Table (A) Uploading
2. A typical university or corporate LAN that (B) Downloading
includes one or more servers and clients is called (C) Accessing
a____ (D) Really Simple Syndication
(A) Master slave network (B) Peer-to-peer 11. While going through the 4G network, we may
(C) Client server network (D) LAN come across the term ‘LTE’. What does E
3. Which of these is not a means of personal represent?
communication in Internet? (A) Evolution (B) Improved
(A) Chat (B) Hangout (C) Envelop (D) Enabled
(C) Instant messaging (D) Instanotes 12. To access a mainframe or supercomputer, users
4. A detailed written description of the often use a ___
programming cycle and the program, along with (A) Desktop (B) Terminal
the test results and a printout of the program is (C) Node (D) HUB
called_______ 13. If you wanted to tell the database management
(A) Reporting (B) Documentation system that a specific attribute contained
(C) Output (D) Special sheet numbers only, what would you need to set?
5. To navigate to a new web page for which you (A) Data category
know the URL, type that URL in the browser's (B) Data Manipulating
_______ and press Enter (C) Data Integrity
(A) Name button (B) Home (D) Data type
(C) Address bar (D) Domain bar 14. What type of graphical model is used to define a
6. Computers use the ________ number system to database?
store data and perform calculations (A) Flow chart
(A) Binary (B) Hexadecimal (B) Bar chart
(C) Octal (D) Decimal (C) E-R diagram
7. A directory within a directory is called ________ (D) Programming model
(A) Small directory (B) Sub directory 15. Which of the following will converts all the
(C) Grand directory (D) Junior directory source code into machine code, creating an
8. _________ are specially designed computer executable file?
chips that reside inside other devices, such as (A) Linker (B) Compiler
your car or your electronic thermostat (C) Assembler (D) Interrupter
(A) Server 16. To read the system messages and warnings,
(B) Embedded system access in Windows, Which of the following files
(C) Client system should be checked?
(D) Robotic application (A) System manager (B) Even viewer
9. A(n) _____ allows you to access your e-mail (C) Control panel (D) System message
from anywhere 17. A hacker that changes or forges information in an
(A) forum (B) weblog electronic resource is known as ________
(C) webmail interface (D) message board (A) Terrorism (B) Data diddling
(C) Sniffing (D) Coping
18. A message with replies on a newsgroup is often 22. What type of monitoring file is commonly used
called a __________. on and accepted from Internet sites?
(A) Post (B) Reply (A) Cookies (B) Blogs
(C) Threads (D) Command (C) Website (D) Links
19. The program, which is used to gain 23. When one computer provides services to another
administrative rights to someone’s computer is computer, the environment is a(n) _____
known as ______. infrastructure.
(A) Boot (B) Rootkit (A) Master slave (B) Client /server
(C) Virus (D) Executive (C) Domain (D) Independent
20. What type of technology allows you to verbally 24. What type of technology scrambles the contents
speak with someone over the Internet? of files sent via the Internet?
(A) Wiki (B) Social Media (A) Encryption (B) Encoding
(C) VoIP (D) Blog (C) Cryptography (D) Security code
21. In the mail transferring process, we may come 25. What term is used to identify people coming
across the term ‘SMTP’. What does S represent? together from various geographical locations to
(A) System (B) Smart complete some task?
(C) Simple (D) Symmetric (A) Distributed team (B) Internet
(C) Virtual team (D) Similar team
Solution
Ans.1(D) Table is the collection of related record. Partnership Project (3GPP) that's designed
Ans.2(C) A typical university or corporate LAN that to provide up to 10x the speeds of 3G
includes one or more servers and clients is networks for mobile devices such as
called a Client server network. smartphones, tablets, netbooks, notebooks
Ans.3(D) Instanote is not a means of personal and wireless hotspots.
communication in Internet. Ans.12(B) The user can assess the Mainframe or
Ans.4(B) A detailed written description of the supercomputer from the Terminal.
programming cycle and the program, Ans.13(D) The specific attribute contained numbers
along with the test results and a printout of only are called Data type.
the program is called Documentation. Ans.14(C) E-R diagram is used to define a database
Ans.5(C) To navigate to a new web page for which Ans.15(B) Compiler will converts all the source code
you know the URL, type that URL in the into machine code, creating an executable
browser's Address bar and press Enter file
Ans.6(A) Computers use the Binary number system Ans.16(B) In Even viewer, the user can read the
to store data and perform calculations system messages and warnings, access in
Ans.7(B) A directory within a directory is called Windows.
Sub directory. Ans.17(B) A hacker will change or forge information
Ans.8(B) Embedded system are specially designed in an electronic resource is known as Data
computer chips that reside inside other diddling.
devices, such as your car or your Ans.18(C) A message with replies on a newsgroup is
electronic thermostat often called as Threads
Ans.9(C) A(n) webmail interface allows you to Ans.19(B) The program, which is used to gain
access your e-mail from anywhere administrative rights to someone’s
Ans.10(D) Really Simple Syndication means the file computer is known as Rootkit.
is transferred from another computer to Ans.20(C) VoIP is short for Voice over Internet
your computer Protocol. Voice over Internet Protocol is a
Ans.11(A) ‘LTE’ à Long Term Evolution(LTE) is a category of hardware and software that
4G wireless communications standard enables people to use the
developed by the 3rd Generation
Internet as the transmission medium for Ans.24(A) The contents of files will be sent via
telephone calls by sending voice data in internet after the files are encrypted by the
packets using IP process encryption.
rather than by traditional circuit Ans.25(C) A virtual team (also known as a
transmissions of the PSTN. geographically dispersed team, distributed
Ans.21(C) SMTP is known as Simple Mail Transfer team, or remote team) usually refers to a
Protocol. Simple Mail Transfer Protocol group of individuals who work together
(SMTP) is an Internet standard for from different geographic locations and
electronic mail (email) transmission. rely on communication technology such
Ans.22(A) The type of monitoring file is commonly as email, FAX, and video or voice
used on and accepted from Internet sites is conferencing services in order to
known as Cookies. collaborate.
Ans.23(B) If one computer provides services to
another computer, the environment is a(n)
Client /server infrastructure
Practice Set – 17
1. The computer cannot perform, without which of 11. If you wish to extend the length of the network
the following? without having the signal degrade, you would use
(A) Processor (B) Monitor _______.
(C) Key board (D) Storage (A) Switch (B) Transmitter
2. Which of the following is a hoc query? (C) Gateway (D) Repeater
(A) pre-planned question 12. Optimized for dial-up connections over noisy
(B) spur-of-the moment question telephone lines, the oldest packet-switching
(C) pre-scheduled question protocol for WAN usage, called ____________,
(D) question that will not return any results is still widely used.
3. Which bus carries information between (A) Cat – 5 (B) Cat- 6
processors and peripherals? (C) X.25 (D) Ethernet
(A) Address bus (B) Control bus 13. ADSL, SDSL, HDSL, and VDSL are examples
(C) Data bus (D) All of these of different types of _____________.
4. Which parts of the computer perform arithmetic (A) Ethernet
calculations? (B) Digital subscriber link
(A) ALU (B) Monitor (C) Modem
(C) Register (D) Bus (D) Subscription
5. Which of the following is example for embedded 14. A(n) ___________ is a system that includes the
system? collection of people, hardware, software, data
(A) ROM (B) RAM records, and activities that process the data and
(C) ATM (D) Machine information in an organization.
6. Formatting a disk results in _______ (A) traditional organization structure
(A) Saved to the disk (B) information system
(B) Copied from the disk (C) data mart
(C) Deleted from the disk (D) information functional unit
(D) Arranging the data in the disk 15. Which of the following is a general-purpose
7. What does the company name 'AMD' stand for? application?
(A) Always Making Dough (A) application features.
(B) Advanced Micro Devices (B) Productivity programs
(C) Alternating Micron Deficiencies (C) Multimedia programming
(D) A Mac Device (D) Internet application
8. A computer cannot "boot" if it does not have the 16. Disk is associated with _____
(A) Compiler (B) Loader (A) Internal storage (B) Main storage
(C) Assembler (D) Operating system (C) Secondary storage (D) All of these
9. Which of the following is used to convert one 17. A hybrid computer uses a ________ to convert
type of number system in to the other form? digital signals from a computer into analog
(A) Modifier (B) Translator signals.
(C) Decoder (D) Adder (A) Encryption (B) Decoder
10. The utilized by the computer to process input and (C) Modem (D) Modulator
provide output is known as ______. 18. A(n)________ is a register or main memory
(A) Delay time (B) Execution time location which contains the effective address of
(C) Real time (D) Down time the operand.
(A) Special location (B) Pointer (C) To process client requests for database access
(C) Pen drive (D) Floppy (D) To provide TCP/IP
19. Computers gather data, which means that they 23. Storage that loses its data after the power is
allow users to ________ data. turned off is referred to as ______
(A) Input (B) Output (A) non-volatile (B) volatile storage
(C) Storage (D) All of these (C) sequential storage (D) random memory
20. To print an individual item in a file immediately 24. What type of memory is not directly addressable
click ____ by the CPU and required special software to
(A) Shift + P (B) Ctrl + P access it?
(C) Alt + P (D) Window + P (A) Main (B) Conventional
21. All the logical and mathematical calculations (C) Inbuilt (D) Expanded
done by the computer happen in/on the ______ 25. Signals can be analog or digital and a computer
(A) System board (B) CPU that processes the both type of signals is known
(C) Mother board (D) Memory as _______
22. A proxy server is used for which of the (A) Micro Computer
following? (B) Mainframe computer
(A) To provide security against unauthorized (C) Analog computer
users (D) Hybrid Computer
(B) To process client requests for Web pages
Solution
Ans.1(A) The computer cannot perform without Ans.13(B) ADSL, SDSL, HDSL, and VDSL are
Processor. examples of different types of Digital
Ans.2(B) Spur-of-the moment question is a hoc subscriber link.
query. Ans.14(B) A(n) information system is a system that
Ans.3(A) Address bus will carries information includes the collection of people,
between processor and peripheral devices. hardware, software, data records, and
Ans.4(A) Arithmetic and Logical Unit will perform activities that process the data and
the arithmetic calculation in the computer. information in an organization.
Ans.5(C) ATM (Automatic Teller Machine) is Ans.15(B) Productivity program is a general-purpose
example for embedded system. application.
Ans.6(C) Formatting the disk results in deleting the Ans.16(C) Disk is associated with Secondary storage.
information from disk. Ans.17(D) A hybrid computer uses a Modem to
Ans.7(B) AMD à Advanced Micro Devices is the convert digital signals from a computer
multinational semiconductor company. into analog signals
Ans.8(D) The computer cannot boot the system, if it Ans.18(A) A(n) Special location is a register or main
do not have Operating system. memory location which contains the
Ans.9(C) Decoder will convert one type of number effective address of the operand
system into another form of numbers Ans.19(A) Computers gather data, which means that
Ans.10(B) The utilized by the computer to process they allow users to Input data.
input and provide output is known as Ans.20(B) To print an individual item in a file
Execution time. immediately click Ctrl + P
Ans.11(D) You wish to extend the length of the Ans.21(B) All the logical and mathematical
network without having the signal calculations done by the computer happen
degrade, you would use Repeater. in/on the CPU.
Ans.12(C) Optimized for dial-up connections over Ans.22(A) A proxy server is used for to provide
noisy telephone lines, the oldest packet- security against unauthorized users
switching protocol for WAN usage, called
X.25 is still widely used
Ans.23(A) Storage that loses its data after the power Ans.25(D) Signals can be analog or digital and a
is turned off is referred to as non-volatile computer that processes the both type of
storage. signals is known as Hybrid Computer.
Ans.24(D) Expanded type of memory is not directly
addressable by the CPU and required
special software to access the memory.
Practice Set – 18
1. Which of the following people probably has the 10. A program that generally has more user-friendly
least amount of technical knowledge? interface than a DBMS is called a ______
(A) Programmer (A) front end (B) back end
(B) Computer Operator (C) tool bar (D) form
(C) System analyst 11. Multi user systems provided cost savings for
(D) User small business because they use a single
2. What key distinctly identifies a record in a processing unit to link several ______
database table? (A) Personal Computer (B) Workstation
(A) Main Key (B) Major Key (C) Mainframes (D) Dumb terminals
(C) Principal Key (D) Primary Key 12. Which is a device designed to absorb and
3. Which of the following refers to a terminal disperse heat away from a microprocessor?
attached to a minicomputer or mainframe and (A) Heat sink (B) Compiler
used to monitor the status of the system? (C) Motherboard (D) PCI
(A) Monitor (B) Mouse 13. A computer that can be accessed by users across
(C) Console (D) Controller a network mainly or exclusively for storing and
4. Unauthorized access to restricted systems or supplying data files is known as ______
resources is referred as __________ (A) application server (B) data server
(A) Pharming (B) Penetrating (C) distributed server (D) file server
(C) Phishing (D) Publishing 14. The __________ is a special database that holds
5. Which is a special type of stored procedure that information about the computer’s user, installed
is automatically invoked whenever the data in the programs and hardware devices.
table is modified? (A) dynamic link library (B) initialization file
(A) Tripped (B) Trigger (C) windows registry (D) complier
(C) Procedure (D) Cursor 15. Software, such as Explorer and Firefox, are
6. A system call of OS which is used to create a new referred to as _____.
process is known as __________. (A) System software (B) Utility software
(A) Kernel (B) Shell (C) Application Software (D) Operating system
(C) Fork (D) None of these 16. Which IT area is well-established in Accounting?
7. Which of the following is the seventh layer of (A) Multimedia system
OSI layer? (B) Web development
(A) Physical Layer (B) Data link Layer (C) Statistical analysis
(C) Application Layer (D) Session Layer (D) Accounting Information Systems
8. The technique that extends storage capacities of 17. What type of web technology allows its
main memory beyond the actual size of the main community members to continuously change the
memory is called _______ contents on a website?
(A) Additional storage (B) Extra storage (A) Intelligent bots (B) Wiki
(C) Virtual storage (D) Stimulated storage (C) Social network (D) Blogs
9. A key that is used to alternate the input mode of 18. What term refers to living life through
a group of keys on a keyboard is known as _____ technology?
(A) Alpha Keys (B) Toggle keys (A) Fake living (B) False living
(C) Numerical key (D) Special key (C) E-livin (D) Social Living
Solution
Ans.1(D) User will has least amount technical single processing unit to link several
knowledge. Dumb terminals
Ans.2(D) Primary key distinctly identifies a record Ans.12(A) Heat sink is a device designed to absorb
in a database table and disperse heat away from a
Ans.3(C) Console is refers to a terminal attached to microprocessor
a minicomputer or mainframe and used to Ans.13(D) A computer that can be accessed by users
monitor the status of the system across a network mainly or exclusively for
Ans.4(B) Unauthorized access to restricted systems storing and supplying data files is known
or resources is referred as Penetrating as file server
Ans.5(B) Special type of stored procedure that is Ans.14(C) The windows registry is a special database
automatically invoked whenever the data that holds information about the
in the table is modified is known as computer’s user, installed program sand
Trigger. hardware devices.
Ans.6(C) A system call of OS which is used to Ans.15(C) Software, such as Explorer and Firefox,
create a new process is known as Fork. are referred to as Application Software
Ans.7(C) Application Layer is the seventh layer of Ans.16(D) Accounting Information Systems is the IT
OSI layer area, which is well established in
Ans.8(C) The technique that extends storage Accounting.
capacities of main memory beyond the Ans.17(B) Wiki is the type of web technology allows
actual size of the main memory is called its community members to continuously
Virtual storage. change the contents on a website
Ans.9(B) A key that is used to alternate the input Ans.18(C) E-living is the term refers to living life
mode of a group of keys on a keyboard is through technology
known as Toggle Key. Ans.19(D) Spyware is the software secretly collects
Ans.10(D) A program that generally has more user- information about you and your internet
friendly interface than a DBMS is called a habits
form. Ans.20(C) Windows + e is the shortcut key to open
Ans.11(D) Multi user systems provided cost savings the Document
for small business because they use a Ans.21(D) The extension to save Database is .mdb
Ans.22(A) MIPS -->Million Instructions Per Second Ans.24(D) A simple automated program that scans
Ans.23(B) The ability of an OS to run more than one the web for specific data and insert into a
application at a time is called Multi- designated database Web crawler
tasking Ans.25(D) A computer user obsessed with gaining
entry into highly secured computer system
is called a(n) Cracker.
Practice Set – 19
1. Which of the following printers is used in (B) A CD-ROM can be written to and a CDRW
conjunction with computers and uses dry ink cannot
powder? (C) A CD-RW can be written to but a CDROM
(A) Daisy wheel (B) Laser printer can only be read from
(C) Thermal printer (D) Band printer (D) A CD-ROM holds more information than a
2. A specialized network device that determines the CD-RW
next network point to which it can forward a data 11. The scanner can scan a document or image by
packet towards the destination of the packet is ______.
commonly known as __________ (A) Document by Document
(A) bridge (B) router (B) Line by line
(C) switch (D) hub (C) Pixel by Pixel
3. The operation of a digital computer is based on (D) Paragraph by Paragraph
_______ principle 12. If each and every system in the networks are
(A) electronically (B) computer connected together then such a topology are
(C) operational (D) measuring kwon as _______.
4. Which of the following programs is not a utility? (A) Star (B) Bus
(A) Spooler (B) Debugger (C) Ring (D) Mesh
(C) Edition (D) Both A or B 13. In excel, chats are created using which option
5. RAM chip was invented by which of the (A) chart wizard (B) pie chart
following company? (C) pivot table (D) bar chart
(A) Intel (B) Toshiba 14. Rules for exchanging data between computers
(C) IBM (D) Cisco are called __________
6. Find out who is not the inventor of transistors (A) Procedures (B) Protocols
among following names (C) Hyperlink (D) Programs
(A) John Burdeen (B) William Shockley 15. The Software tools that enable a user to interact
(C) Walter Brattain (D) Lee de Forest with a computer for specific purposes are known
7. Which of the following order is definitely true, as ______________.
based on the distance coverage of the network? (A) Hardware
(A) MAN > LAN > WAN (B) Networked Software
(B) MAN > WAN > LAN (C) Shareware
(C) WAN > LAN > MAN (D) Applications
(D) WAN > MAN > LAN 16. A program which helps create written documents
8. Tape speed can be measured in __________ and lets you go back and make necessary
(A) Feet per second (B) Inch per second corrections is _________.
(C) Meter per second (D) Bits per second (A) Spreadsheet (B) Personal writer
9. Accessing the information in once computer, (C) Word printer (D) Word processor
without their knowledge is known as _____ 17. When a file contains instructions that can be
(A) Tracking (B) Hacking carried out by the computer, it is often called a(n)
(C) Routing (D) Coping ______ file.
10. What is the difference between a CD-ROM and (A) data (B) information
a CD-RW? (C) executable (D) application
(A) They are the same –just two different terms 18. Firewall is used in communication network
used by different manufactures system to save ______.
(A) Unauthorized attack (B) Virus attack
(C) Data driven attack (D) Fire attack
19. The ___________ folder retains copies of (C) Enterprise Resource Planning
messages that you have started but are not yet (D) Enterprise Reorder Planning
ready to send. 23. Which of the following gate will person addition
(A) Inbox (B) Send mail operation?
(C) Trash (D) Outbox (A) AND (B) OR
20. Which of the following layer is the third layer of (C) NOR (D) NOT
OSI layer? 24. While studying networking we may come across
(A) Physical (B) Application the term ‘TCP’. What does T represent?
(C) Presentation (D) Network (A) Transistor (B) Transfer
21. Which ports connect special types of music (C) Transmission (D) Travel
instruments to sound cards? 25. A ________ computer is a large and expensive
(A) BUS (B) UPS computer capable of simultaneously processing
(C) USB (D) MIDI data for hundreds or thousands for users.
22. Expand ERP? (A) server (B) mainframe
(A) Enterprise Retirement Planning (C) desktop (D) tablet
(B) Enterprise Relationship Planning
Solution
Ans.1(B) Laser printer is used in conjunction with Ans.16(D) A program which helps create written
computers and uses dry ink powder documents and lets you go back and make
Ans.2(B) A specialized network device that necessary corrections is Word processor
determines the next network point to Ans.17(C) When a file contains instructions that can
which it can forward a data packet towards be carried out by the computer, it is often
the destination of the packet is commonly called a(n) executable file
known as Router. Ans.18(A) Firewall is used to protect system from
Ans.3(D) The operation of a digital computer is unauthorized attack.
based on measuring principle Ans.19(D) The Outbox folder retains copies of
Ans.4(A) Spooler is not a utility program. messages, which are not sent
Ans.5(A) RAM chip was invented by Intel company Ans.20(D) Network layer is the third layer of OSI
Ans.6(D) Lee de Forest is the father of Radio. layer.
Ans.7(D) WAN (Country) > MAN (City) > Ans.21(D) MIDI (Musical Instrument Digital
LAN(100m) Interface) is a protocol designed for
Ans.8(B) The Speed of the Tape can be measured in recording and playing back music on
Inch per second digital synthesizers that is supported by
Ans.9(B) Accessing the information in once many makes of personal computer sound
computer, without their knowledge is cards
known as Hacking. Ans.22(C) Enterprise resource planning (ERP) is
Ans.10(C) CD-ROM --> Can only read business process management software
CD – RW --> can read and write. that allows an organization to use a system
Ans.11(C) The scanner can scan a document or image of integrated applications to manage the
by Pixels by Pixels. business and automate many back office
Ans.12(A) In Star topology every system are functions related to technology, services
connected together. and human resources.
Ans.13(A) The Chat can be created in the excel by Ans.23(B) OR operation will perform Addition
using chart wizard operation.
Ans.14(B) Protocols are the rules for exchanging data Ans.24(C) TCP --> Transmission control protocol.
between computers. Ans.25(B) A mainframe computer is a large and
Ans.15(D) The Software tools that enable a user to expensive computer capable of
interact with a computer for specific simultaneously processing data for
purposes are known as Application. hundreds or thousands for users.
Practice Set – 20
1. A program designed to destroy data on your 10. Which of the following is not a error in C
computer which can transfer to other computers programming?
and infect data is called a ______ (A) Syntax error (B) Runtime error
(A) virus (B) infector (C) Logic error (D) Server error
(C) file (D) App 11. Extensible Markup Language (XML) is a simple,
2. Which of the part of a computer that co-ordinates very flexible text format, Which is derived from
all its functions is called ____________. _______.
(A) ALU (B) Mother Board (A) HTML (B) ETML
(C) Storage (D) Control Unit (C) STML (D) SGML
3. The second generation computer which was built 12. ________ is software which has its source code
by transistors was built by ________________. freely available for use, viewing, modification,
(A) Oxford University and redistribution.
(B) Stanford University (A) Source code (B) Free code
(C) ETH Zurich (C) Open source (D) Free Software
(D) University of Manchester 13. Which of the following was the world's first
4. ASCII is the character encoding standard for electronic programmable computing device?
electronic communication. What does ‘II’ (A) EDVAC (B) ENIAC
represents? (C) PC (D) Colossus
(A) International Internship 14. Coded entries which are used to access to a
(B) International Information system are called _____________.
(C) Information Interchange (A) Decrypt Key (B) Password
(D) Input International (C) Source code (D) Folder name
5. The UNIX, which command is used to display 15. The processing speed of the computer is depends
the message or value of any variable on the on_____
screen. (A) Power supply (B) Clock pulse
(A) Char (B) Info (C) Peripheral interfaces (D) Transmission size
(C) Ping (D) Echo 16. Instruction in computer languages consists of
6. Each boxes in the spread sheet are named as ______.
_____ (A) OPCODE (B) OPERAND
(A) Row (B) Column (C) Source code (D) Either A or B
(C) Sheet (D) Cell 17. If in a computer, 16 bits are used to specify
7. Each page in the Microsoft power point are address in a RAM, the number of addresses will
named as ________ be _____ bits
(A) Document (B) Page (A) 216 (B) 64K
(C) Sheet (D) Slide (C) 65536 (D) 1028
8. Which are the following keys are used to runs a 18. FORTRAN programming language is more
Thesaurus check on the selected word? suitable for ____
(A) Shift + A (B) Shift + Y (A) Business Application
(C) Shift + F7 (D) Shift + F3 (B) Marketing Application
9. A computer cannot "boot" if it does not have the (C) Scientific Application
_____________. (D) Social Application
(A) Output device (B) Input device 19. EEPROM stands for ______________
(C) Operating system (D) Application (A) Electrically Erasable Programmable Read
Only Memory
(B) Electronic Erasable Programmable Read 22. ________ is an early packet switching network
Only Memory and the first network to implement the protocol
(C) Easily Erasable Programmable Read Only suite
Memory (A) CNNET (B) ARPANET
(D) Ever Non Erasable Programmable Read (C) ASAPNET (D) NSFNET
Only Memory 23. Which is most common language used in web
20. The speed of the data transmission in the designing?
networks is calculated by ________. (A) C (B) C++
(A) Bits/Sec (B) GB/hr (C) PHP (D) HTML
(C) Nipple/Sec (D) MB/sec 24. Specialized program that allows user to utilize in
21. Presentation of a series of still images on a specific application is classified as ______
projection screen or electronic display device is (A) Application program (B) Utility program
called as _____ (C) System program (D) Logical program
(A) Video (B) Slide show 25. Which of the following is not a browser?
(C) Slide runner (D) Movie clip (A) Mozilla (B) Internet explore
(C) Google (D) Chrome
Solution
Ans.1(A) A computer virus is a type of malicious Ans.13(D) Colossus was the world's first electronic
software that, when executed, replicates digital programmable computer. It used a
itself by modifying other computer large number of valves (vacuum tubes). It
programs and inserting its own code. had paper-tape input and was capable of
Ans.2(D) Control unit can process and control all being configured to perform a variety of
the data. Boolean logical operations on its data,
Ans.3(D) Second generation computer was built at but it was not Turing-complete.
university of Manchester. Ans.14(B) The coded entries are Password which
Ans.4(C) ASCII --> American Standard Code for was used to access system
Information Interchange Ans.15(B) The clock pulse producing inside the
Ans.5(D) ECHO is a command typically used in computer is the major responsible for the
shell scripts and batch files to output status speed of the computer.
text to the screen or a file, or as a source Ans.16(5) Instruction in computer languages
part of a pipeline consists of OPCODE and OPERAND
Ans.6(5) Each boxes in the spread sheets are named Ans.17(C) If in a computer, 16 bits are used to specify
as Cell address in a RAM, the number of
Ans.7(D) Each page in power point is named as addresses will be 65536 bits
slide Ans.18(C) FORTRAN programming language is
Ans.8(C) Shift + F7 is the key to run a thesaurus more suitable for Scientific Application.
check on the selected word. Ans.19(A) EEPROM --> Electrically Erasable
Ans.9(C) The computer cannot boot without Programmable Read Only Memory
Operating system Ans.20(A) The speed of the data transmission are
Ans.10(5) Sever error is not in C programming mainly calculated by Bits/sec
Ans.11(D) Extensible Markup Language (XML) is a Ans.21(B) Presentation of a series of still images on
simple, very flexible text format derived a projection screen or electronic display
from SGML (Standard Generalized device is called as Slide show
Markup Language). Ans.22(B) The Advanced Research Projects Agency
Ans.12(C) Open Source is software which has its Network (ARPANET) was an early
source code freely available for use, packet switching network and the first
viewing, modification, and redistribution. network to implement the protocol suite
TCP/IP. Both technologies became the Ans.24(A) Specialized program that allows user to
technical foundation of the Internet. utilize in specific application is classified
Ans.23(D) HTML (Hypertext Markup Language) is as Application program.
the standard markup language for creating Ans.25(C) Google is the search engine it is not a
web pages and web applications. browser.
Practice Set – 21
1. What is the shortcut key for spell check in (A) Batching (B) Processing
Microsoft word? (C) Utilizing (D) Upgrading
(A) F4 (B) F7 11. In which part of the computer, does the data is
(C) F2 (D) F5 stored before entering in to CPU from the Main
2. Large transaction processing systems in memory?
automated organizations use ________. (A) External hard disk
(A) Online processing (B) Secondary memory
(B) Batch processing (C) Cache memory
(C) Once-a-day processing (D) In CPU
(D) End-of-day processing 12. The electronic path, that connect one part of
3. Abacus was the first _________ computer to another is _____
(A) Electronic computer (A) Serial Port (B) Parallel Port
(B) Mechanical computer (C) Logical gate (D) Bus
(C) Electronic calculator 13. In the data flow diagram we may came across the
(D) Mechanical calculator symbol. What does the symbol represents?
4. Which of the following letter is the wild card, (A) Process (B) Decision
that stands in the place of a series of letters? (C) Terminal (D) Start
(A) # (B) * 14. While studying DBMS, we many came across
(C) % (D) + the term SQL, What does ‘S’ represents?
5. Specialized program that assist users in locating (A) Study (B) Sequence
information of the web are called ____ (C) Steady (D) Structured
(A) Search engine (B) Brower 15. ‘COBOL’ is one of the high-level programming
(C) Resource locater (D) Antivirus languages, what does B represents?
(5) None of these (A) Business (B) Buyer
6. What is the short cut key to go to the file menu (C) Backend (D) Busy
option in current program? 16. Which of the following gates is called as Inverse
(A) Alt + W (B) Ctrl + F gate?
(C) Alt + F (D) Ctrl + W (A) EXOR (B) EXNOR
7. What is the extension used in executable file? (C) NOR (D) NOT
(A) .txt (B) .ppl 17. Arranging the data in sequence is known as
(C) .pdf (D) .exe _____
8. What is the full form for MODEM? (A) Processing (B) Sorting
(A) Modern determination (C) Lining (D) Ordering
(B) Module demolition 18. In the 4g connection we may study about the term
(C) Modulation demodulation ‘LTE’ what does T represents?
(D) Model design (A) Transmission (B) Transfer
9. While studying about networking we may came (C) Term (D) Trans
across the term UDP. What does D stands for? 19. ______ type of program controls the various
(A) data (B) description computer parts and allows the user to interact
(C) datagram (D) development with the computer
10. The computer is manipulating data in many (A) Application Software (B) Utility software
ways, and this manipulating is called ________ (C) Middleware (D) System software
20. The process is to check and ensure the 23. ______ refers to the unauthorized copying and
components of the computer are operating and distribution of software.
connected properly is known as ______ (A) Hacking (B) Manipulating
(A) Repairing (B) Checking (C) Software Integrity (D) Software Piracy
(C) Paring (D) Booting 24. The process of transferring documents, graphics,
21. Which of the following operating system is not and other objects from your computer to a server
licensed by any company? on the Internet is called _________
(A) Windows (B) Apple (A) Downloading (B) Buffering
(C) UNIX (D) LINUX (C) Streaming (D) Uploading
22. Underlined text, such as text and folder names is 25. The most Powerful keys that let you exit a
referred to as a program when pushed
(A) Icon (B) Storage (A) Ctrl (B) Alt
(C) Source (D) Hyperlink (C) Esc (D) Caps lock
Solution
Ans.1(D) Spell Check in Microsoft word can be Ans.15(A) COBOL --> Common Business Oriented
done by F5. Language. It is the primary domain in
Ans.2(B) In computing, batch processing refers to a business, finance and administration.
computer working through a queue or Ans.16(D) NOT gate is also called as Inverse gate.
batch of separate jobs (programs) without Ans.17(B) The Arranging the data in sequence is
manual intervention (non-interactive). known as sorting
Ans.3(D) The abacus is a counting frame, is a Ans.18(C) LTE --> Long term evolution
calculating tool that was in use in Europe, Ans.19(B) Utility software is type of program
China and Russia, centuries before the controls the various computer parts and
adoption of the written Hindu–Arabic allows the user to interact with the
numeral system computer
Ans.4(B) ‘*’ is the wild card letter in the program Ans.20(D) Booting is the process to check and ensure
Ans.5(A) Specialized program that assist users in the components of the computer are
locating information of the web are called operating and connected properly
Search engine. Ans.21(C) UNIX is not owned and licensed by a
Ans.6(C) Alt + F is the short cut key to go to the file company
menu option in current program Ans.22(D) Underlined text, such as text and folder
Ans.7(D) The executable files can be scored in the names is referred to as a Hyperlink
format .exe. Ans.23(D) Software piracy is the stealing of legally
Ans.8(C) Modulation demodulation is the protected software. Under copyright law,
abbreviation for MODEM. software piracy occurs when copyright
Ans.9(D) UDP --> User Datagram Protocol protected software is copied, distributed,
Ans.10(B) The computer is manipulating data in modified or sold. Software piracy is
many ways, and this manipulating is considered direct copyright infringement
called processing. when it denies copyright holders due
Ans.11(C) The data is stored in Cache memory, compensation for use of their creative
before entering in to CPU from the Main works.
memory. Ans.24(D) The process of transferring documents,
Ans.12(D) The electronic path, that connect one part graphics, and other objects from your
of computer to another is called Bus computer to a server on the Internet is
Ans.13(B) It represents the decision-making symbol. called uploading
Ans.14(D) SQL --> Structured Query Language Ans.25(C) The Escape Key is the most powerful key,
which will exit a program.
Practice Set – 22
1. Which one of the following error will not be (C) Produce a set of programs
handle by the operating system? (D) Produce user-understandable programs
(A) Power failure 9. How can a user determine what programs are
(B) Lack of paper in Printer available on a computer?
(C) Failure of Network (A) By checking the hard-disk properties
(D) The Virus attack (B) By viewing the installed programs during the
2. ___________ is a malicious act in which a large booting process
number of email messages are sent to a single (C) By checking the operating system for a list of
email address in a short period of time. installed programs
(A) Sending (B) Copying (D) By checking the existing files saved on the
(C) E-Mail bomb (D) Hacking disk
3. Which button is called as middle button used as 10. The processing speed of the computer are
third mouse button by pressing on it. depends upon _____
(A) Right button (B) Scroll wheel (A) Input power
(C) Select (D) Cursor (B) Network connection
4. ICANN is the nonprofit corporation, which is (C) Number of Peripherals
responsible for allocation of IP address and (D) Clock pulse generating in the system
managing the domain name. What does A 11. Which of the following registers is used to keep
represent? track of the address of the memory location
(A) Assigned (B) Assisted where the next instruction is located?
(C) Aided (D) Adopted (A) Memory address register
5. __________is a type of denial of service (DoS) (B) Memory data register
attack that sends a series of “SYN” messages to (C) Instruction registers
a computer, such as a web server. (D) Program counter
(A) SYN source (B) TCP RST 12. In Hexadecimal numbers, how was F represents?
(C) TCP SYN (D) SYN flood (A) 11 (B) 12
6. To find a saved document in the computer’s (C) 15 (D) 14
memory and bring it up on the screen to view 13. What resides on the motherboard and connects
_______. the CPU to other components on the
(A) Reverse (B) Return Motherboard?
(C) Retrieve (D) Return (A) System Bus (B) Monitor
7. Two different files can have the same name if (C) ALU (D) CPU
_____ 14. In power point the header and footer can be found
(A) They are in different folders on the insert table in what group?
(B) They have same content (A) Illustration group (B) Text group
(C) They have different content (C) Table group (D) Object group
(D) Never 15. Which of the following represents user identity
8. Application software enables the computer to describes a situation in which one person or
______. program successfully masquerades as another by
(A) Produce some specific output for the users falsifying data?
(B) Can access whole system without the (A) Authentication (B) Spoofing
knowledge of user. (C) Altering (D) Malpractice
16. Which of the following is the corrupted data of 21. ______ is a program that visits web sites and
hard disk? reads their pages and other information in order
(A) Spoofing (B) Ripper to create entries for a search engine index
(C) Corrupt (D) Hang (A) Web hacker (B) Web crawler
17. Telephone is the example for which of the (C) Web source (D) Blogger
following? 22. _______ is a computer that offers a computer
(A) Simplex (B) Half Duplex network service to allow clients to make indirect
(C) Full Duplex (D) Multiplex network connections to other network services.
18. What is the extension to save PowerPoint (A) Server (B) Proxy server
document? (C) Client (D) Back page
(A) .doc (B) .com 23. FAT maintained by OS on a hard disk that
(C) .pdf (D) .ppt provides a map of clusters (logical units of
19. The peripheral nodes are connected to a central storage) that a file has been stored. What does A
node, which rebroadcasts all transmissions represent?
received from any peripheral node to all (A) Allotment (B) Allocation
peripheral nodes on the network, including the (C) Amount (D) Adopt
originating node is known as ____. 24. _____ is the specialized OS for use in computers
(A) Star (B) Bus which are built into larger systems.
(C) Mesh (D) Ring (A) Embedded OS (B) Real time OS
20. Which of the following layer is responsible for (C) Mobile OS (D) Network OS
transmission and reception of the unstructured 25. A(n) ______ allows you to access your e-mail
raw bit stream over a medium? from any-where.
(A) Application layer (A) Interconnector
(B) Physical layer (B) Webmail interface
(C) Data link layer (C) Mother board
(D) Transmission layer (D) Web blog
Solution
Ans.1(D) The error happened by the Virus attack Ans.6(C) To find a saved document in the
cannot be handled by the operating computer’s memory and bring it up on the
system. screen to view is know as Retrive.
Ans.2(C) An email bomb or "mail bomb" is a Ans.7(A) The two different files can be saved in the
malicious act in which a large number of same name, if they are saved in different
email messages are sent to a single email folders.
address in a short period of time. The Ans.8(A) The application software has used to
purpose of an email bomb is typically to produce some specific output.
overflow a user's inbox. Ans.9(C) The user can check the installed programs
Ans.3(B) Scroll wheel is called as middle button in the operation system.
used as third mouse button by pressing on Ans.10(D) The clock pulse generating in the system
it. will determined the processing speed of
Ans.4(A) ICANN --> Internet Corporation for the computer.
Assigned Names and Numbers Ans.11(D) The program counter is used to keep track
Ans.5(D) A SYN flood is a form of denial-of- of the address of the memory location
service attack in which an attacker sends a where the next instruction is located.
succession of SYN requests to a target's Ans.12(C) F ⇒ 15
system in an attempt to consume enough Ans.13(A) System Bus resides on the motherboard
server resources to make the system and connects the CPU to other
unresponsive to legitimate traffic. components on the Motherboard
Ans.14(B) In power point the header and footer can Ans.20(B) The Physical layers responsible for
be found on the insert table in Text group. transmission and reception of the
Ans.15(B) Spoofing represents user identity unstructured raw bit stream over a
describes a situation in which one person medium
or program successfully masquerades as Ans.21(B) Web crawler is a program that visits web
another by falsifying data. sites and reads their pages and other
Ans.16(B) The corrupted data of hard disk is called information in order to create entries for a
Ripper. search engine index
Ans.17(C) Telephone is the example for Full Duplex Ans.22(B) The proxy server is a computer that offers
Ans.18(D) The extension to save power point a computer network service to allow
document as .ppt clients to make indirect network
Ans.19(A) The peripheral nodes are connected to a connections to other network services.
central node, which rebroadcasts Ans.23(B) FAT ⇒ File Allocation table
originating node received from any Ans.24(A) Embedded OS is the specialized OS for
peripheral node to all peripheral nodes on use in computers which are built into
the network, including the originating larger systems.
node is known as Star topology. Ans.25(B) A Web interface allows you to access your
e-mail from anywhere.
Practice Set – 23
1. ______ is the software creates a mirror image of 11. A(n) ____________ query displays a subset of
the entire hard disk, including operating system, data from one table based on specified criteria.
application, files and data. (A) Select (B) Variable
(A) Operating system (B) Backup software (C) Operational (D) Joint
(C) Drive imaging (D) Utility software 12. What is the name of the interrupt which can be
2. The computer to which a user’s computer minimized?
connects in order to access the internet is called (A) Time interrupt
________. (B) Makeable interrupt
(A) Client (B) Server (C) Maskable interrupt
(C) PDA (D) Super computer (D) Nonpackable interrupt
3. ROLLBACK of the database is called____ 13. A disk scheduling algorithm in an operating
statement. system causes the disk arm to seek back and forth
(A) TCL (B) DCL across the disk surface servicing all requests in
(C) DDL (D) SDL its path, based on ____.
4. ____is the ability of a device to "jump" directly (A) First come first served
to the requested data. (B) Shortest Seek Time First
(A) Sequential access (B) Random access (C) Scan
(C) Quick access (D) All the above (D) Latency time
5. The programs which are as permanent as 14. In an absolute loading scheme, which loader
hardware and stored in ROM is known as _____. function is accomplished by assembler?
(A) Hardware (B) Hard disk (A) Reallocation (B) Allocation
(C) Software (D) Firmware (C) Linking (D) Loading
6. Which of the following is the communications 15. The file structure that redefines its first record at
protocol that sets the standard used by every a base of zero uses the term ______.
computer that accesses Web - based information? (A) Relative organization
(A) XML (B) DML (B) Key fielding
(C) HTTP (D) HTML (C) Dynamic reallocation
7. Hardware devices that are not part of the main (D) Hashing
computer system and are often added later to the 16. Which of the following in not a input device?
system. They are called _____. (A) Touch screen (B) Keyboard
(A) Peripheral (B) Clip art (C) Joystick (D) Printer
(C) Highlight (D) Executive 17. A technique for searching special databases,
8. ________ is when the computer is turned on and called data warehouses, looking for related
the operating system is loading. information and patterns is called _____.
(A) Flashing (B) Tracking (A) Data redundancy
(C) Tapping (D) booting (B) Data mining
9. The name for the way that computers manipulate (C) Data integrity
data into information is called ____. (D) Data programming
(A) Programming (B) Processing 18. While studying about computer, we may came to
(C) Sorting (D) Organizing know about the term QDR. Expand QDR?
10. UTP and STP are example for ____. (A) Quad data rate
(A) CATV Cable (B) Quad decryption region
(B) Thicket coaxial cable (C) Quad degree region
(C) Fiber optical cable (D) Quad deficit rate
(D) Twisted pair cable
19. Imagine that a user has a WORD document open (A) Online updating (B) Batching
at a workstation and that workstation is (C) Sorting (D) Offline Updating
unexpectedly disconnected from the school 23. While studying about networking, we may came
network and from the Internet. Where should the to know about the term SACK. What does SACK
user BEST save her work? represents?
(A) USB key (B) P drive (A) Selection Acknowledgement
(C) H drive (D) S drive (B) Selective Acknowledgement
20. _____ cells involve creating a single cell by (C) Supreme request
combining two or more selected cells. (D) Suppress Data
(A) Splitting (B) Uniting 24. What is the shortcut key to centre alignment of
(C) Together (D) Merging the paragraph?
21. Multiple choice examination answer sheets can (A) Ctrl + T (B) Ctrl + J
be evaluated automatically by _______ (C) Ctrl + E (D) Ctrl + W
(A) Optical character recognitions 25. Which of the following memories has the
(B) Optical character reader shortest access time?
(C) Optical Mark reader (A) Main memory
(D) Magnetic tape reader (B) Secondary memory
22. A file is corrected immediately after the input of (C) Cache memory
a transaction. This is an example of _____. (D) Virtual memory
Solution
Ans.1(C) Drive imaging is the software creates a Ans.10(D) UTP and STP are example for twisted pair
mirror image of the entire hard disk, cable.
including operating system, application, Ans.11(A) The select query displays a subset of data
files and data. from one table based on specified criteria.
Ans.2(B) The computer to which a user’s computer Ans.12(C) The interrupt, which can be minimized are
connects in order to access the internet is Maskable interrupt
called Server Ans.13(C) A disk scheduling algorithm in an
Ans.3(A) ROLLBACK of the database is called operating system causes the disk arm to
TCL (Transaction control language) seek back and forth across the disk surface
statement servicing all requests in its path, based on
Ans.4(B) Random access is the ability of a device to Scan
"jump" directly to the requested data. Ans.14(A) In an absolute loading scheme,
Ans.5(D) The programs which are as permanent as Reallocation loader function is
hardware and stored in ROM is known as accomplished by an assembler.
Firmware. Ans.15(A) The file structure that redefines its first
Ans.6(C) HTTPis the communications protocol that record at a base of zero uses the term
sets the standard used by every computer relative organization.
that accesses Web - based information Ans.16(5) Printer is an output device
Ans.7(A) Hardware devices that are not part of the Ans.17(B) A technique for searching special
main computer system and are often databases, called data warehouses,
added later to the system. They are called looking for related information and
peripheral. patterns is called Data mining.
Ans.8(D) Booting is when the computer is turned on Ans.18(A) QDR ⇒Quad data rate
and the operating system is loading. Ans.19(C) The data which are opened in the
Ans.9(B) The name for the way that computers workstation, which is disconnected will be
manipulate data into information is called stored in H drive.
Processing
Ans.20(D) Merging cells involves creating a single Ans.22(A) A file is corrected immediately after the
cell by combining two or more selected input of a transaction. This is an example
cells. of Online updating.
Ans.21(C) Multiple choice examination answer Ans.23(B) SACK ⇒ Selective Acknowledgement
sheets can be evaluated automatically by Ans.24(C) The shortcut key to center alignment of
Optical Mark Reader. the paragraph is Ctrl + E
Ans.25(C) Cache memory will take shortest access
time.
Practice Set – 24
19. The programs which are as permanent as (A) Push the text in with respect to the margin
hardware and stored in ROM is known as. (B) change the margins on the page
(A) Hardware (B) Software (C) move the text up by one line
(C) Firmware (D) ROM ware (D) move the text down by one line
20. For creating a document, you use........ Command 24. ASCII stands for.........
at File Menu. (A) American Special Computer for Information
(A) Open (B) Close Interaction.
(C) New (D) Save (B) American Standard Computer for
21. Computer uses the _________ number system to Information Interchange.
store data and perform calculations. (C) American Special Code for Information
(A) Binary (B) octal Interchange.
(C) Decimal (D) Hexadecimal (D) American Standard Code for Information
22. ________ is the process of carrying out Interchange.
commands? 25. Which of the following is used by the browser to
(A) Fetching (B) Storing connect to the location of the Internet resources?
(C) Decoding (D) Executing (A) Linkers (B) Protocol
23. In word, when you indent a paragraph, you… (C) Cable (D) URL
Solution
1.(B) Maxframe is not any type of computer. devices “sense” that the wire is clear and
There are 7 types of computer- send packets at the same time, a collision
Supercomputer can occur. If the collision occurs, packets
Mainframe have to be resend after a random period
Server Computer of time.
Workstation Computer 5.(C) In computing, a directory is a file system
Personal Computer or PC cataloging structure which contains
Micro controller references to other computer files, and
Smartphone possibly other directories. On many
2.(D) Understanding is not performed by any computers, directories are known as
computer. Understanding is a folders, or drawers, analogous to a
psychological process related to an workbench or the traditional office filing
abstract or physical object, such as a cabinet.
person, situation, or message whereby one 6.(C) It stands for "American Standard Code for
is able to think about it and use concepts Information Interchange." ASCII is a
to deal adequately with that object. character encoding that uses numeric
Understanding is a relation between the codes to represent characters. These
knower and an object of understanding. include upper and lowercase English
3.(C) Cell phones use a notation system to letters, numbers, and punctuation
access the Internet. A cellular network or symbols.
mobile network is a communication 7.(B) The Internet is a global wide area network
network where the last link is wireless. that connects computer systems across the
The network is distributed over land areas world. It includes several high-bandwidth
called "cells", each served by at least one data lines that comprise the Internet
fixed-location transceiver, but more "backbone. "These lines are connected to
normally, three cell sites or base major Internet hubs that distribute data to
transceiver stations. other locations, such as web servers and
4.(B) CSMA/CD enables devices to “sense” the ISPs.
wire to ensure that no other device is 8.(B) Provide the word processing system is not
currently transmitting packets. But, if two a basic function of operating system. word
(one). The base-2 numeral system is a 24.(D) ASCII (American Standard Code for
positional notation with a radix of 2. Each Information Interchange) is the most
digit is referred to as a bit. common format for text files in computers
22.(D) Executing is the process of carrying out and on the Internet. In an ASCII file, each
commands. Execution in computer and alphabetic, numeric, or special character is
software engineering is the process by represented with a 7-bit binary number (a
which a computer or virtual machine string of seven 0s or 1s). 128 possible
executes the instructions of a computer characters are defined.
program. 25.(D) With Hypertext and HTTP, URL is one of
23.(A) To indent the first line of a paragraph, put the key concepts of the Web. It is the
your cursor at the beginning of the mechanism used by browsers to retrieve
paragraph and press the tab key. When any published resource on the web.
you press Enter to start the next paragraph,
its first line will be indented.
Practice Set – 25
1. ________ is the process of dividing the disk into 10. A unit of computer information that contains data
tracks and sectors? as well as all the procedures or operations is
(A) Tracking (B) Formatting called:
(C) Crashing (D) Allotting (A) method (B) Encapsulation
2. What is the permanent memory built into your (C) An object (D) An OOP
computer called? 11. The world's first truly cross-platform
(A) RAM (B) Floppy programming language is called:
(C) CPU (D) ROM (A) C++. (B) Java.
3. Which computer memory is used for storing (C) Visual Basic.NET (D) Smalltalk
programs and data currently being processed by 12. The most widely used type of database
the CPU? management system is the:
(A) Mass memory (B) Internal memory (A) Flat database.
(C) Non-volatile memory (D) PROM (B) Network database.
4. Changing an existing document is called _____ (C) Relational database.
the document. (D) Hierarchical database.
(A) Creating (B) Editing 13. What is the newest type of database, which is
(C) Modifying (D) Adjusting well suited for multimedia applications, called?
5. What is backup? (A) Object-oriented database
(A) Adding more components to your network (B) Client/server database
(B) Protecting data by copying it from the (C) Data warehouse
original source to a different destination (D) Multimedia database
(C) Filtering old data from the new data 14. What do the circles on a data flow diagram
(D) Accessing data on tape represent?
6. What is a popular program for creating (A) Data sources and destinations
documents that can be read on both a PC and a (B) Data flows
Macintosh computer? (C) Transformation processes
(A) Microsoft Word (B) Adobe in Design (D) Data stores
(C) Adobe Acrobat (D) QuarkXPress 15. The type of printer that prints by selectively
7. An image on a computer screen is made up of a unchanging static electricity from spots on a
matrix of what? metal drum is a/n:
(A) Byte (B) Pixels (A) Plotter (B) Dot-matrix printer
(C) Bit (D) Palette (C) Laser printer (D) Ink-jet printer
8. What does dots per inch (DPI) measure? 16. A warm boot in older versions of Windows is
(A) number of bits it takes to represent each color caused by:
(B) density of the pixels on a computer screen (A) Typing the Alt+ Tab key combination
(C) the density of bits on a disk (B) Selecting Hibernate or Standby when
(D) density of graphic files stored on a hard disk shutting down
9. What type of software creates a smaller file that (C) Typing the Ctrl+ Alt+ Delete key
is faster to transfer over the Internet? combination
(A) MPEG (B) Unzipped (D) Pressing the power switch
(C) Fragmentation (D) Compression 17. Setting fonts for the text in your document is an
example of:
(A) Formatting. (B) Formulas. 22. Which of the following is NOT a source of
(C) Tracking changes. (D) Tools. viruses?
18. _____ is the file system used by the operating (A) Diskettes (B) The Internet
system to identify the physical locations of files (C) E-mail messages
on the hard drive. (D) Computer networks
(A) RTOS (B) GIF 23. Which of the following activities is NOT a
(C) FAT (D) POST component of e-business?
19. ________ software allows the user to speak into (A) Collaboration with business partners
the computer rather than type in text. (B) Cash flow management
(A) Speech recognition (B) CHAT (C) Customer service
(C) Message (D) All of the above (D) Sealing
20. A server uses _________applications software to 24. Retail employees typically use _________
support its client computers. terminals to process sales transactions.
(A) back-end (B) front end (A) sales processing (B) transaction point
(C) programming (D) java (C) automatic teller (D) point of sale
21. Which symbol is used in Excel to denote 25. The primary purpose of a computer is to process
exponential numbers? _____________ and convert it into information.
(A) * (B) ^ (A) electricity (B) data
(C) & (D) $ (C) raw material (D) a bit
Solution
1.(B) The process of dividing the disk into operation users perform in word
tracks and sectors is called as formatting. processors, which typically also handle
To format a drive means to prepare the graphics and other multimedia files.
chosen partition on the drive to be used by 5.(B) In information technology, a backup, or
an operating system by deleting all of the data backup is a copy of computer data
data and setting up a file system. In taken and stored elsewhere so that it may
Windows, formatting a partition is usually be used to restore the original after a data
done from the Disk Management tool. loss event. The verb form, referring to
2.(D) The permanent memory that is built in the process of doing so, is "back up",
your computer. This is read only. The whereas the noun and adjective form is
computer's working memory, sometimes "backup".
called random-access memory. 6.(C) Adobe InDesign is the industry-leading
3.(B) Computer memory is used for storing layout and page design software for print
program and data currently being and digital media. Easily manage
processed by the CPU is internal memory. production with Adobe Experience
Internal memory is used to store data that Manager. InDesign has everything you
is used by the system at start-up and to run need to create and publish books, digital
various types of programs such as the magazines, eBooks, posters, interactive
operating system. Internal memory is PDFs and more.
mostly contained on small microchips that 7.(B) The term "pixel" is actually short for
are either attached or connected to the "Picture Element." These small little dots
computer's motherboard. are what make up the images on computer
4.(B) Changing an existing document is called displays, whether they are flat-screen
editing the document. The ability to (LCD) or tube (CRT) monitors. The
change text by adding, deleting and screen is divided up into a matrix of
rearranging letters, words, sentences and thousands or even millions of pixels.
paragraphs. Text editing is the main
8.(B) Print resolution is measured in dots per 15.(C) The printers laser beams your print onto a
inch (or “DPI”), which means the number metal cylinder called a drum. Using static
of dots of ink per square inch that a electricity, the drum attracts powdered
printer deposits on a piece of paper. So, toner from its cartridge to the drum. The
300 DPI means that a printer will output drum rolls the toner onto the paper in the
300 tiny dots of ink to fill every square form of your print. The toner is melted
inch of the print. onto the paper by heat from a fuser as it
9.(D) The type of software which makes a larger passes underneath.
file into "smaller file" that is "faster to 16.(C) A warm boot (also called a "soft boot") is
transfer" over the "internet" is the process of restarting a computer. It
Compression. Compression is used to may be used in contrast to a cold boot,
"create" the files in smaller size that which refers to starting up a computer that
makes it easier to transfer the files over has been turned off. Warm boots are
the internet. typically initiated by a "Restart" command
10.(C) An object is the unit of computer in the operating system. It can be by
information that contains data as well as pressing Ctrl+Alt+Del.
all the procedures for operations. In 17.(A) The process of formatting a document
object-oriented programming (OOP), involves specifying how the document
encapsulation refers to the bundling of will look in its final form on the screen and
data with the methods that operate on that when printed. Common formatting
data, or the restricting of direct access to options include the font, font size, color,
some of an object's components. alignment, spacing, margins and other
11.(B) The world's first truly cross-platform properties.
programming language is Java. It is a 18.(C) A file allocation table (FAT) is a file
general-purpose programming language system developed for hard drives that
that is class-based, object- oriented, and originally used 12 or 16 bits for each
designed to have as few implementation cluster entry into the file allocation table.
dependencies as possible. It is used by the operating system (OS) to
12.(C) Relational databases are the most popular manage files on hard drives and other
and widely used databases. Some of the computer systems.
popular DDBMS are Oracle, SQL Server, 19.(A) Speech recognition software allows the
MySQL, SQLite, and IBM DB2. A user to speak into the computer rather than
relational database is a digital database type in text. Speech Recognition software
based on the relational model of data, as allows computers to interpret human
proposed by E. F. Codd in 1970. A speech and transcribe it to text, or to
software system used to maintain translate text to speech. Speech
relational databases is a relational Recognition software allows computers to
database management system (RDBMS). interpret human speech and transcribe it to
13.(A) An object database is a database text, or to translate text to speech.
management system in which information 20.(A) A server uses backend application
is represented in the form of objects as software to support its client computers.
used in object-oriented programming. The back end refers to parts of a computer
Object databases are different from application or a program's code that allow
relational databases which are table- it to operate and that cannot be accessed
oriented. Object-relational databases are by a user.
a hybrid of both approaches. 21.(B) In Excel, the caret symbol (also known as
14.(B) The external entities relate to the main "œthe little hat," or "œthe symbol when
process of the system. basically they give you press Shift 6" ) is used to indicate
the inputs of the system. A process is exponents. Here's how you use it to find
represented by a circle in basic Data Flow the volume of your room: In cell B2, enter
notation. 10. In cell B3, enter the formula =B2^3.
22.(C) A computer virus is a type of computer 25.(B) The primary purpose of a computer is to
program that, when executed, replicates process electricity and convert it into
itself by modifying other computer information. The purpose of the
programs and inserting its own code. computer is to perform calculations, store
When this replication succeeds, the information, retrieve data and process
affected areas are then said to be information. A computer has programmed
"infected" with a computer virus. Internet data or computer language that tells the
is not a good source of viruses. computer how to fulfil its purpose. The
23.(B) computer will only do what it is
24.(D) programmed to do.
Practice Set – 26
1. The simultaneous processing of two or more (D) Microsoft Windows defines the operating
programs by multiple processors is _____. environment standard for computers with Intel
(A) multiprogramming (B) multitasking processors.
(C) time-sharing (D) multiprocessing 9. The ________ records the name and exact
2. Help Menu is available in which button? location of every file on a disk.
(A) End (B) Start (A) partition master
(C) Turnoff (D) Restart (B) file allocation table
3. The ________folder retains copies of messages (C) disk controller
that you have started but are not yet ready to (D) boot sector
send. 10. Inheritance is the ability of an object to pass on
(A) Drafts (B) Outbox its characteristics to its ____________.
(C) Address Book (D) Sent Items (A) subclasses (B) off-spring
4. What type of software must to be used to (C) super classes (D) parents
translate scanned text into a format that can be 11. Which of the following extends data across
manipulated? networks rather than store it in one central site?
(A) OCR (B) CRT (A) PIM
(C) RGB (D) MIDI (B) File manager
5. Which printer type is an impact printer? (C) Distributed database
(A) Page printers (D) Data mining program
(B) Laser printers 12. What is a serial port that adds a direct connection
(C) Ink-jet printers to a network?
(D) Dot-matrix printers (A) FireWire (B) NIC
6. High Resolution‖ computer monitors will have (C) USB (D) Internal modem
_________. 13. Which of the following is saved to
(A) High dpi noncontiguous clusters on a hard disk?
(B) Low dpi (A) Clustered file (B) Defragmented file
(C) 256 colors (C) Sectored file (D) Fragmented file
(D) Resolution is not measured in dpi 14. What should be used if a company wants to
7. Word processing, spreadsheet, and photo-editing include its company name and logo at the bottom
are examples of________ of every page of a brochure?
(A) application software (A) Header (B) Macro
(B) system software (C) Footer (D) Footnote
(C) operating system software 15. ________ is an event-driven programming
(D) platform soft. language developed in the early 1990.
8. Which of the following statements is true? (A) C (B) VB
(A) Microsoft Windows defines the operating (C) C++ (D) Pascal
environment standard for computers with Linux 16. Linux is a_____
processors. (A) Utility program for peer-to-peer file sharing
(B) Microsoft Windows defines the operating (B) Real-time operating system
environment standard for computers with UNIX (C) Network operating system
processors. (D) PDA platform
(C) Mac OS defines the operating environment 17. The_________ runs the front-end applications
standard for computers with Intel processors. software in a network.
Solution
1.(D) The simultaneous processing of two or 5.(D) Impact printers are printers which works
more programs by multiple processors is by creating a direct contact between ink
multiprocessing. Multiprocessing is the ribbon and paper. These printers are noisy
use of two or more central processing yet popular. Impact printers have
units (CPUs) within a single computer mechanical moving parts to conduct
system. The term also refers to the ability printing. Examples: Dot-matrix printers,
of a system to support more than one Daisy-wheel printers, and line printers.
processor or the ability to allocate tasks 6.(A) The higher the resolution, the more
between them. information can be displayed on the
2.(B) Help Menu is available in which button. It screen. These days, many monitors in
is a part of a computer program that gives the 22-to-27-inch range have a native
instructions and information about how to resolution of 1,920 by 1,080 pixels and are
use the program. referred to as full HD or 1080p monitors.
3.(A) The drafts folder retains copies of 7.(A) Application software (app for short) is a
messages that you have started but are program or group of programs designed
not yet ready to send. In Mailbox, look for end users. Examples of an application
for a folder called Drafts, and then double- include a word processor, a spreadsheet,
click the message that was saved in that an accounting application, a web browser,
folder. Outlook automatically saves all an email client, a media player, a file
unfinished messages for you. By default, viewer, simulators, a console game or a
unfinished messages are saved to your photo editor. Word processing,
Drafts folder every three minutes. You spreadsheet, and photo-editing are
can, however, change this time. examples of application software.
4.(A) If authors do not have access to the source 8.(D) Microsoft Windows defines the operating
file and authoring tool, scanned images of environment standard for computers with
text can be converted to PDF using optical Intel processors. Microsoft Windows,
character recognition (OCR). Adobe commonly referred to as Windows, is a
Acrobat Pro can then be used to create group of several proprietary graphical
accessible text. operating system families, all of which are
developed and marketed by Microsoft. 13.(D) File fragmentation is a term that describes
Each family caters to a certain sector of a group of files that are scattered
the computing industry. throughout a hard drive platter instead of
9.(B) The file allocation table records the name one continuous location. Fragmentation is
and exact location of every file on a disk. caused when information is deleted from
A file allocation table (FAT) is a file a hard drive and small gaps are left behind
system developed for hard drives that to be filled by new data.
originally used 12 or 16 bits for each 14.(C) A header is the top margin of each page,
cluster entry into the file allocation table. and a footer is the bottom margin of each
It is used by the operating system (OS) to page. Headers and footers are useful for
manage files on hard drives and other including material that you want to appear
computer systems. on every page of a document such as your
10.(A) Inheritance is the ability of an object to name, the title of the document, or page
pass on its characteristic to its subclasses. numbers.
In the Java language, classes can be 15.(B) In computer programming, event-driven
derived from other classes, thereby programming is a programming paradigm
inheriting fields and methods from those in which the flow of the program is
classes. Definitions: A class that is derived determined by events such as user actions,
from another class is called a subclass sensor outputs, or messages from other
(also a derived class, extended class, or programs or threads.
child class). 16.(B) RTLinux is a hard realtime real-time
11.(C) A file manager or file browser is a operating system (RTOS) microkernel
computer program that provides a user that runs the entire Linux operating
interface to manage files and folders. The system as a fully preemptive process.
most common operations performed on Even with a similar name it is not related
files or groups of files include creating, the Real-Time Linux project of the Linux
opening (e.g. viewing, playing, editing or Foundation.
printing), renaming, moving or copying, 17.(A) The client is the machine (workstation or
deleting and searching for files, as well as PC) running the front-end applications. It
modifying file attributes, properties and interacts with a user through the keyboard,
file permissions. Folders and files may be display, and pointing device such as a
displayed in a hierarchical tree based on mouse. The client also refers to the client
their directory structure. Some file process that runs on the client machine.
managers contain features inspired by The client has no direct data access
web browsers, including forward and back responsibilities.
navigational buttons. 18.(B) Ctrl+W, Ctrl+F4 – Closes the current tab.
12.(B) FireWire is an I/O interface developed by 19.(C) RISC, or Reduced Instruction Set
Apple Computer. It is also known as IEEE Computer. is a type of microprocessor
1394, which is the technical name architecture that utilizes a small, highly-
standardized by the IEEE. FireWire is optimized set of instructions, rather than
considered a high-speed interface, and a more specialized set of instructions often
therefore can be used for connecting found in other types of architectures.
peripheral devices that require fast data 20.(B) Norton AntiVirus is an anti-virus or anti-
transfer speeds. A direct serial cable malware software product, developed and
connection uses the communication ports distributed by Symantec Corporation
of your computers. Most computers have since 1991 as part of its Norton family of
at least two communication, or COM, computer security products. It uses
ports: COM1 and COM2. Serial port signatures and heuristics to identify
pinouts are less complex than parallel port viruses.
pinouts, but the speed is also a lot slower 21.(C) In computing, a compiler is a computer
-- between 12 Kbps and 14 Kbps. program that translates computer code
written in one programming language into systems then you can run multiple
another language. The name "compiler" is operating systems at a time. But those
primarily used for programs that translate virtualized operating systems can't not
source code from a high-level have the full hardware support.
programming language to a lower level 24.(B) Optical Mark reading (OMR) is a method
language to create an executable program. of entering data into a computer system.
22.(B) ZIP is an archive file format that supports Optical Mark Readers reads pencil or pen
lossless data compression. A ZIP file may marks made in pre-defined positions on
contain one or more files or directories paper forms as responses to questions or
that may have been compressed. The ZIP tick list prompts.
file format permits a number of 25.(B) Image can be sent over telephone lines by
compression algorithms, though using Fax. Fax sometimes called
DEFLATE is the most common. telecopying or telefax, is the telephonic
23.(A) You can run only one operating system at transmission of scanned printed material,
a time on a Computer natively. If you are normally to a telephone number connected
talking about virtualized operating to a printer or other output device.
Practice Set – 27
1. Which among the following is a Scientific (A) Write Once Read Memory
Computer Language? (B) Wanted Once Read Memory
(A) BASIC (B) COBOL (C) Wanted Original Read Memory
(C) FORTRAN (D) PASCAL (D) Write Original Read Memory
2. What is ―Oracle? 13. Memory unit is a part of ______
(A) Co-ordination System (A) Input Device
(B) Word Software (B) Control Unit
(C) Database Software (C) Output Device
(D) All of the above (D) Central Processing Unit
3. IC Chip is made of ___. 14. Which of the following companies developed
(A) Silicon (B) Nickel MS Office-2000?
(C) Iron (D) Copper (A) Novell (B) Corel
4. At which place is India’s Silicon Valley situated? (C) Lotus (D) Microsoft
(A) Bangalore (B) Hyderabad 15. What is the meaning of “MICR”?
(C) Chennai (D) Kolkata (A) Magnetic Ink Character Recognition
5. A connection from one HTML document to (B) Magnetic Intelligence Character Recognition
another HTML document is called ____. (C) Magnetic Information Cable Recognition
(A) Hyper Link (B) Connecting Link (D) Magnetic Insurance Cases Recognition
(C) Icon (D) All of these 16. VIRUS stands for________.
6. This device is used to connect your computer (A) Very Important Record User Searched
with a telephone line, so that can access (B) Verify Interchanged Result Until Source
information from other servers and ordinary (C) Vital Information Resource Under Seize
users too, said device is called _______. (D) Very Important Resource Under Search
(A) Modem (B) Set Top Box 17. The technique that extends storage capacities of
(C) LAN Card (D) UPS main memory beyond the actual size of the main
7. Device on one network can communicate with memory is called _______.
devices on another network via_______. (A) Multitasking
(A) File Server (B) Utility Server (B) Virtual storage
(C) Printer Server (D) Gateway (C) Multiprocessing
8. The screen background is known as the____. (D) Multiprogramming
(A) Application (B) Window 18. __________ Command we can use to close the
(C) Desktop (D) Frames windows.
9. Which of the following is not an input device? (A) Alt+ F1 (B) Alt+ S
(A) Mouse (B) Keyboard (C) Alt+ End (D) Alt+F4
(C) Light pen (D) VDU 19. Algorithm is used____.
10. What are the units used to count the speed of a (A) To bring itself into desired state by its own
printer? action
(A) CPM (B) DPI (B) To perform logarithmic operations
(C) PPM (D) BIT (C) To describe a set of procedure by given result
11. A computer that combines the characteristic of is obtained
analog and digital computers________. (D) As a high level language
(A) Hybrid Computer (B) Digital Computer 20. FOXPRO is a______.
(C) Analog Computer (D) Super Computer (A) RDMBS (B) DBMS
12. WORM stands for? (C) Language (D) All of the above
21. Who is considered to the father of computers? (C) A modem (D) Your computer
(A) John Bardeen (B) Charles Babbage 24. When more than one window is open, to switch
(C) John Backus (D) William Shockley to the next window — is the key combination.
22. Which of the following will connect you to the (A) CTRL+F5 (B) CTRL+F6
Internet? (C) CTRL+F7 (D) CTRL+F8
(A) An Commercial online service 25. Where are data and program stored when the
(B) An Internet service provider processor uses them?
(C) A network connection (A) Main memory
(D) All of the above (B) Secondary memory
23. What software allows you to view internet sites? (C) Disk memory
(A) A cyber cafe (B) A browser (D) Program memory
Solution
1.(C) COBOL (Common Business-Oriented hyperlink, it is usually underlined and
Language) is a high-level programming appears as a different color.
language for business applications. It was 6.(A) A digital subscriber line (DSL) modem is
the first popular language designed to be a device used to connect a computer or
operating system-agnostic and is still in router to a telephone line which provides
use in many financial and business the digital subscriber line service for
applications today. COBOL is a compiled connection to the Internet, which is often
English-like computer programming called DSL broadband. A modem is a
language designed for business use. It is small box that connects your devices to
imperative, procedural and, since 2002, the Internet using cables. Unlike a router,
object-oriented. COBOL is primarily used a modem doesn't provide your home with
in business, finance, and administrative Wi-Fi connectivity. A modem acts as a
systems for companies and governments. digital translator, taking an information
2.(C) Oracle Database (commonly referred to as signal from your cable, fiber or phone
Oracle DBMS or simply as Oracle) is a lines and making it accessible to your
multi-model database management computer.
system produced and marketed by Oracle 7.(D) A gateway is a node (router) in a computer
Corporation. It is a database commonly network, a key stopping point for data on
used for running online transaction its way to or from other networks. Thanks
processing (OLTP), data warehousing to gateways, we are able to communicate
(DW) and mixed (OLTP & DW) and send data back and forth. The Internet
database workloads. wouldn't be any use to us without
3.(A) Robert Noyce invented the first gateways (as well as a lot of other
monolithic integrated circuit chip at hardware and software).
Fairchild Semiconductor in 1959. It was 8.(C) A wallpaper or background (also known
made from silicon, and was fabricated as a desktop wallpaper, desktop
using Jean Hoerni's planar process and background, desktop picture or desktop
Mohamed Atalla's surface passivation image on computers) is a digital image.
process. On a computer, wallpapers are generally
4.(A) used on the desktop, while on a mobile
5.(A) Hyperlinks are the primary method used phone they serve as the background for the
to navigate between pages and Web sites. home screen.
Links can point to other web pages, web 9.(D) Short for video display unit, VDU is a
sites, graphics, files, sounds, e-mail computing device that allows for input by
addresses, and other locations on the same a user and output to a display, like a
web page. When text is used as a computer monitor. A VDU consists of a
display device and a keyboard, and could 15.(A) Magnetic Ink Character Recognition is a
also include a mouse. In the United States, character recognition system that uses
it is sometimes referred to as a video special ink and characters. When a
display terminal, or VDT. document that contains this ink needs to
10.(B) DPI stands for Dots Per Inch which be read, it passes through a machine,
technically means printer dots per inch. which magnetizes the ink and then
Today it is a term often misused, usually translates the magnetic information into
to mean PPI, which stands for Pixels Per characters. MICR technology is used by
Inch. So, when someone says they want a banks.
photo that is 300 dpi they really mean that 16.(C) In more technical terms, a computer virus
they want 300 ppi. is a type of malicious code or program
11.(A) Hybrid computers are computers that written to alter the way a computer
exhibit features of analog computers and operates and is designed to spread from
digital computers. The digital component one computer to another. A virus operates
normally serves as the controller and by inserting or attaching itself to a
provides logical and numerical operations, legitimate program or document that
while the analog component often serves supports macros in order to execute its
as a solver of differential equations and code. It stands for Vital Information
other mathematically complex equations. Resource Under Seize.
12.(A) Write once read many (WORM) describes 17.(B) Virtual storage is the pooling of physical
a data storage device in which storage from multiple network storage
information, once written, cannot be devices into what appears to be a single
modified. This write protection affords the storage device that is managed
assurance that the data cannot be tampered from a central console. The benefit of
with once it is written to the device. On virtualization is that commodity hardware
ordinary (non-WORM) data storage or less-expensive storage can be used to
devices, the number of times data can be provide enterprise-class functionality.
modified is limited only by the lifespan of 18.(D) Just about everyone knows that
the device, as modification involves Alt+Ctrl+Del interrupts the operating
physical changes that may cause wear to system, but most people don't know that
the device. The "read many" aspect is Alt+F4 closes the current window. So, if
unremarkable, as modern storage devices you had pressed Alt+F4 while playing a
permit unlimited reading of data once game, the game window would have
writte. closed. It turns out there are several other
13.(D) Memory or Storage Unit. This unit handy keystrokes like that built into
supplies information to other units of the Windows.
computer when needed. It is also known 19.(C) An algorithm (pronounced AL-go-rith-
as internal storage unit or the main um) is a procedure or formula for solving
memory or the primary storage or a problem, based on conducting a
Random Access Memory (RAM). It stores sequence of specified actions. In
all the data and the instructions required mathematics and computer science, an
for processing. algorithm usually means a small
14.(D) Microsoft Office 2000 is a release of procedure that solves a recurrent problem.
Microsoft Office, an office suite 20.(C) FoxPro is a text-based procedurally
developed and distributed by Microsoft oriented programming language and
for the Windows family of operating database management system (DBMS),
systems. Office 2000 was released to and it is also an object-oriented
manufacturing on March 29, 1999, and programming language, originally
was made available to retail on June 7, published by Fox Software and later by
1999. Microsoft, for MS-DOS, Windows,
Macintosh, and UNIX.
21.(B) Charles Babbage, who was born in 1791, 24.(B) F6 is used to go to the next pane or frame
is regarded as the father of computing in your Word window. You can use this to
because of his research into machines that navigate the window without using your
could calculate. Babbage's Difference mouse. Shift+F6 is used to go to the
Engine Number 1 was the first device ever previous pane or frame. Ctrl+F6 is used to
devised that could calculate and print go to the next open document window.
mathematical tables. 25.(A) At the core of the computer is the central
22.(B) processing unit or CPU, the source of
23.(B) A web browser (commonly referred to as control that runs all programs and
a browser) is a software application for instructions. In order to function,
accessing information on the World Wide computers use two types of memory:
Web. When a user requests a web page primary and secondary. The main storage
from a particular website, the web browser is the primary memory, and data and
retrieves the necessary content from a web programs are stored in secondary
server and then displays the page on the memory.
user's device.
Practice Set – 28
1. ______ Represents raw facts, where- as (C) Network requiring a server with shared
_________ is a meaningful data. resources.
(A) Information, reporting (D) wide area network
(B) Data, information 10. Similar to a hub in an Ethernet network, a __
(C) Information, bits helps relay data between wireless network nodes.
(D) Records, bytes (A) Wireless port
2. Saving is a process- (B) Wireless access point
(A) To copy the document from memory to (C) wireless adapter
storage medium. (D) wireless transceiver
(B) To bring change in present status of the 11. A set of rules for creating markup languages that
document enables programming to capture specific types of
(C) To change entire form data by creating their own elements is called___.
(D) All of the above (A) XML (B) HTML
3. PNG stands for________. (C) Ada (D) XHTML
(A) Portable Name Generator 12. Small plain text files that are written to your
(B) Portable Network Generator computer's hard disk by many of the Web sites
(C) Printed Name Graphics you visit are called______.
(D) Portable Network Graphics (A) RFIDs (B) Web beacons
4. The maximum Zoom percentage in MS Power (C) GUIDs (D) Cookies
Point is ________. 13. MBR stands for_____.
(A) 100% (B) 200% (A) Management Box Register
(C) 400% (D) 300% (B) Memory Buffer Register
5. The word FTP stands for________. (C) Memory Box Registers
(A) File Translate Protocol (D) Memory Building Register
(B) File Transit Protocol 14. The following software is coming under graphics
(C) File Typing Protocol use.
(D) File Transfer Protocol (A) Adobe reader (B) MS power point
6. Compiler in computer system is a_________. (C) Adobe photo shop (D) MS-DOS
(A) Package 15. Which of the following is the proper way to
(B) System Software denote a cell in a spreadsheet?
(C) Process (A) 5C (B) C5
(D) Application Software (C) 2-15 (D) C
7. What is an intersection of a row and column in a 16. Which broadband service is the most available?
spreadsheet? (A) C-able (B) POTS
(A) Formula (B) Worksheet (C) Satellite (D) DSL
(C) Address (D) Cell 17. _____ is a set of rules computers use to talk to
8. What is the process of creating movement from each other.
still images? (A) Protocol (B) Syntax
(A) Transition (B) Twining (C) DOS command (D) HTML
(C) Bit-mapped graphic (D) Animation 18. Which backup method only backs up files that
9. A peer-to-peer LAN is an appropriate network have been modified since the last backup?
architecture for _______. (A) Incremental backup (B) Partial backup
(A) The Internet (C) Selective backup (D) Full backup
(B) Home network
19. Which type of transmission media is known as (B) Deleting the margin boundaries on the Ruler
regular telephone wire? (C) Dragging the margin boundaries on the Ruler
(A) Wi-Fi (B) Twisted-pair wire (D) Clicking the right mouse button on the Ruler
(C) Fiber optic cable (D) Coaxial cable 23. Which part of the computer helps to store
20. What is the purpose of a firewall on a computer? information?
(A) To protect a computer from unauthorized (A) Monitor (B) Keyboard
access (C) Disk – drive (D) Printer
(B) To protect a computer in case of fire 24. Which key is used to delete one character to the
(C) To protect a computer from spam left of the current position of the cursor?
(D) All of the above (A) Backspace (B) Delete
21. A disk's content that is recorded at the time of (C) Insert (D) Esc
manufacture and that cannot be changed or 25. If you want to connect to your own computer
erased by the user is____________. through the Internet from another location, you
(A) Memory-only (B) Write-only can use–
(C) Once-only (D) Read-only (A) e-mail (B) FTP
22. In word, you can change Page Margins by ___ (C) instant message (D) Telnet
(A) Dragging the scroll box on the scroll bars
Solution
1.(B) The Raw Facts and Figures are Called a file, and a local or remote server will
Data. The word raw means that the facts provide it.
have not yet been processed to get their 6.(B) A compiler is a special program that
exact meaning. Data is collected from processes statements written in a
different sources. particular programming language and
2.(A) Saving, process of setting aside a portion turns them into machine language or
of current income for future use, or the "code" that a computer's processor uses.
flow of resources accumulated in this Typically, a programmer writes language
way over a given period of time. Saving statements in a language such as Pascal or
may take the form of increases in bank C one line at a time using an editor.
deposits, purchases of securities, or 7.(D) The intersection of rows and columns is
increased cash holdings. called cell. Cell is identified with
3.(D) Portable Network Graphics is a raster- Combination of column header and row
graphics file format that supports lossless number.
data compression. PNG was developed as 8.(D) Animation is simply combining drawings,
an improved, non-patented replacement photographs, text, or computer graphics to
for Graphics Interchange Format (GIF). make them move. You don't need to talk
4.(C) Power Point allows users to zoom in and in front of a camera. Short animations can
zoom out of the slides to help focus on also be a way to develop your audience.
specific sections or look at the entire slide 9.(B) A home network or home area network is
as a whole. The minimum zoom supported a type of computer network that
by PowerPoint is 10% and the maximum facilitates communication among devices
is 400%. The zoom bar is located in the within the close vicinity of a home. A
bottom right corner of the PowerPoint home network is a group of devices – such
window. as computers, game systems, printers,
5.(D) File Transfer Protocol (FTP) is a standard and mobile devices – that connect to the
Internet protocol for transmitting files Internet and each other. A wired network,
between computers on the Internet over which connects devices like printers and
TCP/IP connections. FTP is a client- scanners with cables. A wireless network,
server protocol where a client will ask for
which connects devices like tablets and e- while rows are normally represented by
readers without cables. numbers, 1, 2, 3, etc.
10.(B) Wireless access point is a hardware device 16.(C) Satellite broadband is an option available
or access point (AP) that allows other Wi- for those who live in rural areas where
Fi devices connectivity to a wired network traditional fixed-line based broadband
(Local Access Network). It assists with services aren't available. It uses a satellite
the connectivity between devices and the dish to provide two-way access to
internet. An access point is a device that broadband services but speeds which
creates a wireless local area network, or used to be lower have improved with
WLAN, usually in an office or large download speeds of up to 30 Mbps
building. An access point connects to a available.
wired router, switch, or hub via an 17.(A) A protocol is a set of rules that governs the
Ethernet cable, and projects a Wi-Fi signal communications between computers on a
to a designated area. network. In order for two computers to
11.(A) Extensible Markup Language (XML) is a talk to each other, they must be speaking
markup language that defines a set of rules the same language.
for encoding documents in a format that is 18.(A) Incremental backups: Because an
both human-readable and machine- incremental backup will only copy data
readable. An XML file is an extensible since the last backup of any type, an
markup language file, and it is used to organization may run it as often as
structure data for storage and transport. In desired, with only the most recent changes
an XML file, there are both tags and text. stored. The benefit of an incremental
The tags provide the structure to the data. backup is that it copies a smaller amount
12.(D) Cookies are most commonly used to track of data than a full.
website activity. When you visit some 19.(B) Twisted-pair cable is a type of cabling that
sites, the server gives you a cookie that is used for telephone communications and
acts as your identification card. Upon each most modern Ethernet networks. A pair of
return visit to that site, your browser wires forms a circuit that can transmit
passes that cookie back to the server. data.
Servers can use cookies to provide 20.(A) A firewall is a network security device
personalized web pages. that monitors incoming and outgoing
13.(B) A register is a temporary storage area built network traffic and decides whether to
into a CPU. The instruction register allow or block specific traffic based on a
fetches instructions from the program defined set of security rules. Firewalls
counter (PC) and holds each instruction as have been a first line of defense in network
it is executed by the processor. The security for over 25 years.
memory registers are used to pass data 21.(D) ROM is called read only memory because,
from memory to the processor. historically, it could only be read but not
14.(C) Microsoft PowerPoint is a presentation written. These names are confusing,
program, created by Robert Gaskins and because ROMs are randomly accessed
Dennis Austin at a software company too. Worse yet, most modern ROMs can
named Forethought, Inc. It was released be written as well as read! The important
on April 20, 1987, initially for Macintosh distinction to remember is that RAMs are
computers only. Microsoft acquired volatile and ROMs are nonvolatile.
PowerPoint for $14 million three months 22.(D) Go to Layout > Margins, select Margins,
after it appeared. and then select Custom Margins. In the
15.(B) A spreadsheet consists of a table of cells Top, Bottom, Left, and Right boxes, set
arranged into rows and columns and the margins that you want, and then select
referred to by the X and Y locations. X Default. When you are prompted, select
locations, the columns, are normally Yes to change the default settings for
represented by letters, "A", "B", "C", etc., document layout.
23.(C) A disk drive is a technology that enables deletes the character at that position, and
the reading, writing, deleting and shifts back the text after that position by
modifying of data on a computer storage one position.
disk. It is either a built-in or external 25.(D) Telnet is a network protocol used to
component of a disk that manages the virtually access a computer and to provide
disk's input/output (I/O) operations. a two-way, collaborative and text-based
24.(A) Backspace ← Backspace is the keyboard communication channel between two
key that originally pushed the typewriter machines. It follows a user command
carriage one position backwards and in Transmission Control Protocol/Internet
modern computer systems moves the Protocol (TCP/IP) networking protocol
display cursor one position backwards, for creating remote sessions.
Practice Set – 29
1. A (n) ……….is a special visual and audio effect (C) Common Business Operated Language
applied in Power-point to text or content. (D) Common Business Organized Language
(A) Animation (B) Flash 12. What is the other name for programmed chip?
(C) Wipe (D) Dissolve (A) RAM (B) ROM
2. Where does most data go first with in a computer (C) LSIC (D) PROM
memory hierarchy? 13. __________ Store data temporarily and pass it
(A) RAM (B) ROM on as directed by the control unit.
(C) BIOS (D) CACHE (A) Address (B) Register
3. All of the following are examples of storage (C) Number (D) Memory
devices EXCEPT _______. 14. RAID stands for________.
(A) hard disk drives (B) printers (A) Reproduce Array of Intelligent Disks
(C) floppy disk drives (D) CD drives (B) Reproduce Array of Inexpensive Disks
4. Select the Odd one_____. (C) Redundant Array of Inexpensive Drives
(A) Operating system (B) Interpreter (D) Redundant Array of Inexpensive Disks
(C) Compiler (D) Assembler 15. In most Microsoft programs, what does 'alt+f4'
5. Which of the following is not an advantage of do?
magnetic disk storage? (A) Ends the program
(A) The access time of magnetic disk is much (B) Opens the program
less than that of magnetic tape (C) Run the program
(B) Disk storage is longer lasting than magnetic (D) Modify the program
tape 16. A device that is used to transmit data from one
(C) Disk storage is less expensive than tape location to another is known as ________.
storage (A) Storage (B) Memory
6. Perforated paper used as input or output media is (C) Carrier (D) All of the above
known as_____. 17. Programs developed by an outside supplier and
(A) Paper tape (B) Magnetic tape provided to the user in a machine-readable form
(C) Punched paper tape (D) Card punch is known as ___________.
7. The first-generation computer system used __ (A) Canned programs (B) Beta program
(A) Vacuum tubes (B) Transistors (C) Alpha program (D) All of the above
(C) Registers (D) Magnetic cores 18. Buffer is device/storage area–
8. To access properties of an object, the mouse (A) Where data are temporarily stored
technique to use is _______. (B) Where data is permanently stored
(A) dragging (B) dropping (C) Where data error occurs
(C) right-clicking (D) shift+clicking (D) All of the above
9. The ALU and Control Unit jointly known as___. 19. Cache memory is–
(A) RAM (B) ROM (A) Smaller and faster than main storage
(C) CPU (D) PC (B) Bigger and slower than main storage
10. Computers process data into information by (C) Smaller but slower than main memory
working exclusively with ______. (D) Bigger and faster than main memory
(A) Multimedia (B) Words 20. Which of the following describe one or more
(C) Characters (D) Numbers characteristics of a modem computer?
11. COBOL stands for _______. (A) An electronic device
(A) Common Business Oriented Language (B) A mechanical device
(B) Computer Business Oriented Language (C) An electro-mechanical device
(D) All of the above (A) Vertical Market soft (B) Open Source
21. Octal number system has a base ______. (C) Horizontal Market (D) Shareware
(A) Two (B) Four 24. You can use the tab key to___________.
(C) Eight (D) Ten (A) Move a cursor across the screen
22. Which of the following is a disadvantage of (B) Indent a paragraph
machine language? (C) Move the cursor down the screen
(A) Machine Dependent (D) Only (A) and (B)
(B) Slower Execution 25. Which process checks to ensure the components
(C) Machine Independent of the computer and operating are connected
(D) All of the above properly?
23. Android Operating system is an example of (A) Booting (B) Processing
which kind of Source Model? (C) Saving (D) Editing
Solution
1.(A) Computer animation is the process used some environment in which it will run and
for digitally generating animated images. perform its task.
The more general term computer- 5.(D) A magnetic disk primarily consists of a
generated imagery (CGI) encompasses rotating magnetic surface and a
both static scenes and dynamic images, mechanical arm that moves over it. The
while computer animation only refers to mechanical arm is used to read from and
moving images. Modern computer write to the disk. The data on a magnetic
animation usually uses 3D computer disk is read and written using a
graphics to generate a two-dimensional magnetization process. Tracks are further
picture, although 2D computer graphics divided into sectors that contain blocks of
are still used for stylistic, low bandwidth, data.
and faster real-time renderings. 6.(A) A slow, low-capacity, sequential storage
Sometimes, the target of the animation is medium used on earlier computing and
the computer itself, but sometimes film as communications devices. Paper tape holds
well. data as patterns of punched holes. A paper
2.(A) Whether it comes from permanent storage roll printed by a calculator or cash
(the hard drive) or input (the keyboard), register. Paper Tape. Paper tape was
most data goes in random access memory widely used in the early years of
(RAM) first. The CPU then stores pieces computing as a storage medium.
of data it will need to access, often in a 7.(A) First generation computers relied on
cache, and maintains certain special 'machine language' (which is the most
instructions in the register. basic programming language that can be
3.(B) In computing, a printer is a peripheral understood by computers). These
device which makes a persistent computers were limited to solving one
representation of graphics or text, usually problem at a time. Input was based on
on paper. While most output is human- punched cards and paper tape.
readable, bar code printers are an example 8.(C) In general, properties are the settings of an
of an expanded use for printers. object on a computer. For example, you
4.(A) An Operating system (OS) is a software could right-click highlighted text and view
which acts as an interface between the the properties of that text. The properties
end user and computer hardware. Every of a font or text could be the font size, font
computer must have at least one OS to run type, and color of the text.
other programs. An application like 9.(C) It stands for "Central Processing Unit."
Chrome, MS Word, Games, etc. needs The CPU is the primary component of a
computer that processes instructions. The
CPU contains at least one processor, “carrier” is short for wireless carrier.
which is the actual chip inside the CPU Other terms used that refer to the same
that performs calculations. thing include mobile network operator,
10.(C) Between receiving input and providing mobile phone operator, mobile operator,
output, your computer processes. In other cellular company, and wireless service
words, the computer processes input and provider.
produces output. With a computer, you 17.(A) A software package that provides a fixed
have the added element of processing, solution to a problem. Canned industry-
which means doing something to the input oriented business applications must be
so that you get something else as output. analyzed carefully to determine their
Computers process data into information flexibility. See canned routine.
by working exclusively with characters. 18.(A) In computer science, a data buffer (or just
11.(A) Acronym for common business-oriented buffer) is a region of a physical memory
language. Developed in the late 1950s storage used to temporarily store data
and early 1960s, COBOL is the second- while it is being moved from one place to
oldest high-level programming language another.
(FORTRAN is the oldest). It is 19.(A) Cache memory is an extremely fast
particularly popular for business memory type that acts as a buffer
applications that run on large computers. between RAM and the CPU. It holds
12.(D) Unlike main memory (RAM), ROM frequently requested data and instructions
retains its contents even when the so that they are immediately available to
computer is turned off. ROM is referred to the CPU when needed. Cache memory is
as being nonvolatile, whereas RAM is used to reduce the average time to access
volatile. data from the Main memory.
13.(B) Data storage is the recording (storing) of 20.(A) A modem is a device or program that
information (data) in a storage medium. enables a computer to transmit data
DNA and RNA, handwriting, over, for example, telephone or cable
phonographic recording, magnetic tape, lines. Computer information is stored
and optical discs are all examples of digitally, whereas information transmitted
storage media. Electronic data storage over telephone lines is transmitted in the
requires electrical power to store and form of analog waves.
retrieve data. 21.(C) Octal numbers therefore have a range of
14.(D) RAID ("Redundant Array of Inexpensive just “8” digits, (0, 1, 2, 3, 4, 5, 6, 7)
Disks" or "Redundant Array of making them a Base-8 numbering system
Independent Disks") is a data storage and therefore, q is equal to “8”.
virtualization technology that combines 22.(A) Machine dependent means the program
multiple physical disk drive components can only work on the type of computer
into one or more logical units for the it was designed for while Machine
purposes of data redundancy, performance independent means the program can work
improvement, or both. on any computer system. Machine
15.(A) While running any program in Microsoft language is a first-generation language
Windows, if Alt+F4 is pressed, it closes written using 1s and 0s.
the currently active program. If no 23.(B) Open-source software (OSS) is a type of
programs are open or you are at the computer software in which source code
desktop, pressing Alt+F4 opens the is released under a license in which the
Shutdown window. copyright holder grants users the rights to
16.(C) A carrier is a signal used to communicate use, study, change, and distribute the
with other modems, networks, or other software to anyone and for any purpose.
devices. A carrier, in the context of Open-source software may be developed
cellular technology is a company that in a collaborative public manner.
provides mobile services. The term
24.(B) Pressing the Tab key can either add a tab by hardware such as a button press, or by
or create a first-line indent, depending on a software command. After it is switched
where the insertion point is. Generally, if on, a computer's central processing unit
the insertion point is at the beginning of (CPU) has no software in its main
an existing paragraph, it will create a first- memory, so some process must load
line indent; otherwise, it will create a tab. software into memory before it can be
25.(A) In computing, booting is the process of executed.
starting a computer. It can be initiated
Practice Set – 30
21. One megabyte equals approximately ______. (C) Mini computers (D) File servers
(A) 1,000 bits (B) 1,000 bytes 24. What is the term for unsolicited e-mail?
(C) 1 million bytes (D) 1 million bits (A) News group (B) Use net
22. A computer checks the _____ of user names and (C) Backbone (D) Spam
passwords for a match before granting access. 25. The _____ tells the computer how to use its
(A) Website (B) Network components.
(C) Backup file (D) Data base (A) Utility
23. Computers that are portable and convenient for (B) Network
users who travel are known as _____. (C) Operating system
(A) Super computers (B) Laptops (D) Application program
Solution
1.(B) A computer mouse is an input device that connection to connect to the Internet. An
is used with a computer. Moving a mouse Internet Service Provider (ISP) connects
along a flat surface can move the cursor to the home user to other computers. Files
different items on the screen. Items can be that are transferred over the Internet are
moved or selected by pressing the mouse called Web pages.
buttons (called clicking). 6.(D) Through the Edit menu and right-click
2.(D) In telecommunications and computer menu. It has cut, copy, and paste items.
networks, multiplexing (sometimes The menu makes it easy to perform one of
contracted to muxing) is a method by these functions on the selection of text
which multiple analog or digital signals because it appears next to it. The cut item
are combined into one signal over a shared is also available through the Edit menu
medium. The aim is to share a scarce and when you click the right-mouse
resource. The multiplexed signal is button.
transmitted over a communication 7.(B) Save a copy as a new file (Save As)
channel such as a cable. Press F12 or click File > Save a Copy.
3.(B) A host is a computer that is accessible By default, Office will save the copy in the
over a network. It can be a client, server, same location as the original. If you want
or any other type of computer. Each host to save the new copy in a different
has a unique identifier called a hostname location, choose it at this point.
that allows other computers to access it. Give your new copy a name and click
For example, the hostname of a computer Save.
on a local network might be Tech-Terms. 8.(D) In computing, a visual programming
4.(D) A DBMS is a collection of programs that language (VPL) is any programming
enable users to create and maintain a language that lets users create programs
database. The DBMS is a general purpose by manipulating program elements
software system that facilitates the graphically rather than by specifying them
processes of defining, constructing, textually.
manipulating and sharing databases 9.(D) A barcode essentially is a way to encode
among various users and applications. information in a visual pattern that a
5.(A) The Internet (or internet) is the global machine can read. The combination of
system of interconnected computer black and white bars (elements) represents
networks that uses the Internet protocol different text characters which follows a
suite (TCP/IP) to communicate between set algorithm for that barcode type. The
networks and devices. The Internet is a first six numbers of the barcode is the
collection of computers that share manufacturer's identification number. The
information. Home users commonly use a next five digits represent the item's
phone modem, cable modem, or DSL number. The last number is called a check
digit which enables the scanner to can be accessed quickly. The more
determine if the barcode was scanned programs your system is running; the
correctly. more memory you'll need.
10.(D) Pressing the F5 function key can refresh 18.(B) CPU Stands for "Central Processing
the Windows desktop screen. Unit." The CPU is the primary component
11.(C) A computer network is a set of computers of a computer that processes instructions.
connected together for the purpose of The CPU contains at least one processor,
sharing resources. The most common which is the actual chip inside the CPU
resource shared today is connection to the that performs calculations.
Internet. Other shared resources can 19.(B) The bin directory is found on Linux
include a printer or a file server. The computers and stores all binary
Internet itself can be considered a executables. This directory includes all
computer network. the command line commands and other
12.(C) In computer parlance, one binary digit is binary executables. Bin is also an
called a bit, two digits are called a crumb, abbreviation sometimes used for the
four digits are called a nibble, and eight Windows Recycle Bin.
digits are called a byte. 20.(B) A circuit with about 100 transistors
13.(A) Alternatively known as Control A and C- fabricated on a single chip is called MSI.
a, Ctrl+A is a shortcut key most often used Medium-scale integration is an integrated
to select all text, or other objects while in circuit that contains between 30 and 1,000
a graphical user environment. Tip. On electronic components on a single chip.
Apple computers, the shortcut to select all Electronics terms, Large scale integration.
is the Command key+A keys. 21.(C) One megabyte is about 1 million bytes (or
14.(B) The tracks are concentric circles around about 1000 kilobytes). One megabyte is
the disk and the sectors are segments about 1 million bytes (or about 1000
within each circle. For example, a kilobytes). An MP3 audio file of a few
formatted disk might have 40 tracks, with minutes or a 10-million-pixel image from
each track divided into 10 sectors. A a digital camera would typically take up
sector that cannot be used due to a few megabytes.
physical flaw on the disk is called a bad 22.(D) A computer checks the data base of
sector. usernames and passwords for a match
15.(D) DSL is defined as an abbreviation that before granting access. Database, also
stands for digital subscriber line which is called electronic database, any collection
defined as the way a computer connects to of data, or information, that is specially
the Internet at high speeds using telephone organized for rapid search and retrieval by
lines. An example of DSL is the phone a computer. Databases are structured to
service that might be down when your facilitate the storage, retrieval,
Internet connection isn't working. modification, and deletion of data in
16.(A) In computer engineering, computer conjunction with various data-processing
architecture is a set of rules and methods operations.
that describe the functionality, 23.(B) Laptop computers, also known as
organization, and implementation of notebooks, are portable computers that
computer systems. Some definitions of you can take with you and use in different
architecture define it as describing the environments. They include a screen,
capabilities and programming model of a keyboard, and a trackpad or trackball,
computer but not a particular which serves as the mouse.
implementation. 24.(D) The word "Spam" as applied to Email
17.(B) Computer memory or random-access means "Unsolicited Bulk Email". Email
memory (RAM) is your system's short- spam, also known as junk email, is
term data storage; it stores the information unsolicited bulk messages sent through
your computer is actively using so that it email. Recipients of spam often have had
their email addresses obtained by end user and computer hardware. Every
spambots, which are automated programs computer must have at least one OS to run
that crawl the internet looking for email other programs. An application like
addresses. Spammers use spambots to Chrome, MS Word, Games, etc. needs
create email distribution lists. some environment in which it will run and
25.(C) An Operating system (OS) is a software perform its task.
which acts as an interface between the
Practice Set – 31
1. When sending an e-mail, the _____ line (A) Syntax errors (B) Semantic errors
describes the contents of the message. (C) Logic errors (D) System errors
(A) To (B) Subject 11. A _______ contains specific rules and words that
(C) Contents (D) CC express the logical steps of an algorithm?
2. The _____ key will launch the start buttons. (A) Syntax
(A) Esc (B) Shift (B) Programming structure
(C) Windows (D) Shortcut (C) Programming language
3. What is the ultimate purpose of (D) logic chart
Defragmentation? 12. A Proxy server is used for which of the
(A) Make the PC faster following?
(B) Create More Free Space (A) To provide security against unauthorized
(C) Delete temporary files users
(D) Reduce Power consumption (B) To process client requests for web pages
4. Which input device cannot be used to work in (C) To provide TCP/IP
MS Office? (D) To process client requests for database access
(A) Scanner (B) Mouse 13. Storage that retains its data after the power is
(C) Keyboard (D) Joy stick turned off is referred to as?
5. ________ is a method in which multiple (A) Volatile storage
communication devices are connected to one (B) Non-volatile storage
another efficiently. (C) Sequential storage
(A) Switching (B) Redundancy (D) Direct storage
(C) Capacity (D) Detecting 14. Which term identifies main page of the entire
6. _______ is a collection of web - pages and site?
______ is the very first page that we see on (A) URL (B) Web site address
opening of a website. (C) Hyperlink (D) Domain name
(A) Home page, Web page 15. A hard copy of a document is_______.
(B) Website, Home page (A) Stored in HDD
(C) Web page, Home page (B) Stored on a floppy
(D) Web page, Website (C) Stored on a CD
7. What's considered the 'backbone' of the World (D) Printed on the printer
Wide Web? 16. Which is the part of a computer that one can
(A) URL (B) HTML touch and feel?
(C) HTTP (D) FTP (A) Programs (B) Software
8. SMTP stands for _________. (C) Hardware (D) Output
(A) Simple Mail Transfer Protocol 17. CPU stands for ________.
(B) Serve Message Text Process (A) CD-run on memory
(C) Short Messaging Text Process (B) Central processing unit
(D) Short Messaging Transfer Protocol (C) Call powers up
9. Small application programs that run on a Web (D) Create programs user
page and provide animation are known as 18. Start or restart the computer known as _____.
______. (A) Exit (B) Kick
(A) flash (B) spiders (C) Boot (D) Kick-Start
(C) cookies (D) applets 19. This is not a function category in Excel _____.
10. The errors that can be pointed out by the compiler (A) Logical (B) Data Series
known as ______. (C) Financial (D) Text
Solution
1.(B) When sending an e-mail, the Subject line port or goes out it is called egress. A
describes the contents of the message. An communication system may include
email subject line is the first text recipients number of switches and nodes.
see after your sender name when an email 6.(B) Website is a collection of web - pages and
reaches their inbox. It is important to keep Home page is the very first page that we
an email subject line informative, catchy, see on opening of a website. A home
and brief. page also refers to the first page that
2.(D) The Shortcut key will launch the start appears upon opening a web browser,
button. The Start menu may be launched sometimes called the start page, although
either by pressing ⊞ Win (the Windows the home page of a website can be used as
key) on a keyboard or its equivalent on a a start page.
tablet device, pressing CTRL+ESC on a 7.(C) Hypertext Markup Language is the
keyboard, or by clicking on the visual standard markup language for documents
Start button. designed to be displayed in a web
3.(B) Defragmentation, also known as “defrag” browser. It can be assisted by technologies
or “defragging” is the process of such as Cascading Style Sheets and
reorganizing the data stored on the hard scripting languages such as JavaScript.
drive so that related pieces of data are 8.(A) The Simple Mail Transfer Protocol
put back together, all lined up in a (SMTP) is a communication protocol for
continuous fashion. electronic mail transmission. User-level
4.(D) A joystick is an input device consisting of email clients typically use SMTP only
a stick that pivots on a base and reports its for sending messages to a mail server for
angle or direction to the device it is relaying, and typically submit outgoing
controlling. Joysticks are often used to email to the mail server on port 587 or 465
control video games, and usually have one as per RFC 8314.
or more push-buttons whose state can also 9.(A) Flash displays text, vector graphics and
be read by the computer. raster graphics to provide animations,
5.(A) Switching is a method in which multiple video games and applications. It allows
communication devices are connected to streaming of audio and video, and can
one another efficiently. Switching is capture mouse, keyboard, microphone,
process to forward packets coming in and camera input. Related development
from one port to a port leading towards the platform Adobe AIR continues to be
destination. When data comes on a port it supported.
is called ingress, and when data leaves a
10.(A) A syntax error is an error in the source display or sent as an e-mail attachment, is
code of a program. For example, a sometimes referred to as a soft copy.
missing semicolon at the end of a line 16.(C) Computer hardware includes the physical
or an extra bracket at the end of a function parts of a computer, such as the case,
may produce a syntax error. In the PHP central processing unit, monitor, mouse,
code below, the second closed bracket keyboard, computer data storage, graphics
would result in a syntax error since there card, sound card, speakers and
is only one open bracket in the function. motherboard. By contrast, software is the
11.(A) A syntax contains specific rules and words set of instructions that can be stored and
that express the logical steps of an run by hardware. There are five parts of
algorithm. Generally a syntax contains computer hardware that can be found in
specific rules and words that express the most computer systems, from smart
logical steps in an algorithm. Syntax is the phones to desktop computers: processor,
grammar, structure or order of elements in primary storage, secondary storage, input
a language statement. Syntax is also devices and output devices.
used to refer to the study of principles 17.(B) A central processing unit, also called a
and processes. central processor, main processor or just
12.(B) A proxy server acts as a gateway between processor, is the electronic circuitry
you and the internet. It's an intermediary within a computer that executes
server separating end users from the instructions that make up a computer
websites they browse. Proxy servers program.
provide varying levels of functionality, 18.(C)
security, and privacy depending on your 19.(A) Booting is a startup sequence that starts
use case, needs, or company policy. the operating system of a computer when
13.(B) Non-volatile memory or non-volatile it is turned on. A boot sequence is the
storage is a type of computer memory that initial set of operations that the computer
can retrieve stored information even after performs when it is switched on. Excel
having been power cycled. In contrast, groups functions into 12 categories:
volatile memory needs constant power in Compatibility, Cube, Database, Date and
order to retain data. Examples of non- Time, Engineering, Financial,
volatile memory include flash memory, Information, Logical, Lookup &
read-only memory (ROM), ferroelectric Reference, Math & Trigonometry,
RAM, most types of magnetic computer Statistical and Text. There is an additional
storage devices (e.g. hard disk drives, category for user-defined functions
floppy disks, and magnetic tape), optical installed with add-ins, Logical is not a
discs, and early computer storage methods function category in Excel.
such as paper tape and punched cards. 20.(C) An embedded operating system (OS) is a
14.(A) URL stands for Uniform Resource specialized operating system designed to
Locator, and is used to specify addresses perform a specific task for a device that is
on the World Wide Web. A URL is the not a computer. An embedded operating
fundamental network identification for system's main job is to run the code that
any resource connected to the web (e.g., allows the device to do its job.
hypertext pages, images, and sound 21.(C) To be able to 'boot', the computer must
files). have an Operating System. A modern PC
15.(D) A hard copy of a document is printed on BIOS (Basic Input/Output System)
the printer. A hard copy (or "hardcopy") is supports booting from various devices.
a printed copy of information from a These include the local hard disk drive,
computer. Sometimes referred to as a optical drive, floppy drive, a network
printout, a hard copy is so-called because interface card, and a USB device.
it exists as a physical object. The same Typically, the BIOS will allow the user to
information, viewed on a computer configure a boot order.
22.(C) Online real time systems become popular 23.(B) Random access is the ability of a device to
in Third Generation. The period of third "jump" directly to the requested data.
generation was from 1965-1971. The 24.(A) ALT + CTRL + Z is the combination of
computers of third generation used keys to switch between the last four places
Integrated Circuits (ICs) in place of that you have edited.
transistors. A single IC has many 25.(D) Open the Save as a window in the
transistors, resistors, and capacitors along Microsoft Word. Ctrl+F12 opens a
with the associated circuitry. This document in the Word. Shift+F12 saves
development made computers smaller in the Microsoft Word document (like
size, reliable, and efficient. Ctrl+S). Ctrl+Shift+F12 prints a
document in the Microsoft Word.
Practice Set – 32
1. Accessing data on tapes is much ___________ (D) The files get deleted and cannot be restored
than that accessing data on disks. again
(A) Slower (B) Faster 9. An educational institution would generally have
(C) Same (D) All of the above the following in its domain name____.
2. If you begin typing an entry into a cell and then (A) .org (B) .edu
realize that you don't want your entry placed into (C) .inst (D) .com
a cell, you _______. 10. POST stands for ___________
(A) Press Erase key (A) Power on Self-Test
(B) Press esc (B) Program on Self-Test
(C) Press Enter button (C) Power on System Test
(D) Press Edit Formula button (D) Program on System Test
3. Superscript, subscript, outline, emboss, engrave 11. Which of the following can input graphical
are known as _____. images and pictures for a computer?
(A) Font styles (B) Font effects (A) Plotter (B) Scanner
(C) Word art (D) Text effects (C) Mouse (D) Printer
4. What is object of UPS? 12. Which of the following categories would include
(A) Using for storage a keyboard?
(B) To increase the speed of a computer (A) Printing Device (B) Output Device
(C) Provides backup power (C) Input Device (D) Storage Device
(D) All of these 13. In Word you can force a page break–
5. Documents converted to _____ can be published (A) By positioning your cursor at the appropriate
to the Web. place and pressing the F1 key
(A) .doc file (B) Http (B) By positioning your cursor at the appropriate
(C) Machine language (D) HTML place and pressing Ctrl +Enter
6. Holding the mouse button down while moving an (C) By using the Insert/Section Break
object or text is known as ___. (D) By changing the font size of your document
(A) Moving (B) Dragging 14. LSTs (Large Integration) used in?
(C) Dropping (D) Highlighting (A) First generation (B) Second generation
7. What is the difference between a CD-ROM and (C) Third generation (D) Fourth generation
a CD-RW? 15. The purpose of an application program is to?
(A) They are the same; just two different terms (A) Meet specific user needs
used by different manufacturers (B) Make equivalent run better
(B) A D-ROM can be written to and a CD-RW (C) Allow the operating system to control
cannot resources better
(C) A CD-RW can be written to, but a CD-ROM (D) Convert program written in high-level
can only be read from language to machine level language
(D) A CD-ROM holds more information than a 16. Hypertext is a _________.
CD-RW (A) Text stored in the memory of the computer
8. What happens when we try to delete the fries on (B) Text displayed on the screen of the computer
the floppy? (C) Special text used in developing Internet
(A) The files get moved to the Recycle Bin developing package
(B) Files on a floppy cannot be deleted (D) A system of managing textual Information
(C) The files get deleted and can be restored by creating associations between different
again from Recycle Bin documents
17. For running WINDOW minimum disk free space (C) Frederick Cohen (D) Norton
required is? 22. To minimize all open windows and display the
(A) 8 MB (B) 10 MB desktop?
(C) 16 MB (D) 32 MB (A) Windows logo +D (B) Windows logo + E
18. Which of the following printers generates (C) Windows logo + F (D) Windows logo + G
character from a grid? 23. In MS-Word 'alt + shift + d' does what?
(A) Inkjet (B) Laser (A) Automatically inserts the date
(C) Daisy wheel (D) Dot matrix (B) Inserts the time
19. Accumulator is a _______. (C) Inserts the day
(A) Hardwired unit (B) Sequential circuit (D) All of the above
(C) Finite state machine (D) Register 24. _________ deletes an item immediately without
20. ___________ Function key refreshes the current placing it in the recycle bin.
window. (A) Shift +enter (B) Shift +delete
(A) F5 (B) F6 (C) Shift +right arrow (D) Shift +left arrow
(C) F7 (D) F8 25. Which of the following is not a network
21. In 1983, this person was the first to offer a topology?
definition of the term 'computer virus'? (A) Star (B) Bus
(A) MC Fee (B) Smiths (C) Linear (D) Ring
Solution
1.(A) Accessing data on tapes is much slower 4.(C) An uninterruptible power supply (UPS) is
than that accessing data on disks. a device that allows a computer to keep
Magnetic tape data storage is a system for running for at least a short time when the
storing digital information on magnetic primary power source is lost. It also
tape using digital recording. The device provides protection from power surges.
that performs the writing or reading of 5.(D) An HTML file contains Hypertext
data is called a tape drive, and autoloaders Markup Language (HTML), which is
and tape libraries are often used to used to format the structure of a webpage.
automate cartridge handling. Data is It is stored in a standard text format and
stored on the hard disk in the form of 0 and contains tags that define the page layout
1. Hard disk stores information in the form and content of the webpage, including the
of magnetic fields. Data is stored digitally text, tables, images, and hyperlinks
in the form of tiny magnetized regions displayed on the webpage.
on the platter where each region 6.(B) Dragging the mouse refers to moving its
represents a bit. position while holding the mouse button
2.(B) Pressing the Esc key while editing a cell depressed. Dragging is used in the Plot
aborts the operation and leaves the cell in window to move text items and to move
it's original state. It is a key (frequently the plot itself within the Plot window.
labeled Esc) found on most computer 7.(C) A Compact Disc Read Only Memory
keyboards and used for any of various (CD-ROM) is a read-only disc. ... A
functions, as to interrupt or cancel the Compact Disc Re-Writable (CD-RW) is
current process or running program, or to an erasable disc that can be reused. The
close a pop-up window. data on a CD-RW disc can be erased and
3.(B) On the Home tab, in the Font group, click recorded over numerous times. CD-RW
Text Effect. Click the effect that you want. media may not be readable outside of
For more choices, point to Outline, the drive it was created in.
Shadow, Reflection, or Glow, and then 8.(D) When we try to delete the fries on the
click the effect that you want to add. floppy the files get deleted and cannot be
restored again.
23.(A) You can insert today's date by pressing selected files and folders will be
Shift+Alt+D. This shortcut always inserts removed at once and will no longer be
a DATE field, the same as if you had used available.
the Date and Time dialog box and selected 25.(C) There are five types of topology in
the Update Automatically check box. computer networks:
24.(B) In advanced technology for deleting files Mesh Topology
directly from the disk without placing Star Topology
them into the Recycle Bin and it works Bus Topology
when you press the key shortcut Shift + Ring Topology
Delete. When you use this command, Hybrid Topology
Practice Set – 33
1. A list of rules for transferring data over a network 10. Most cash registers are now computers that are
is called? known as ____________ terminals.
(A) Protocol (B) Program code (A) POS (B) DS
(C) Rules (D) Flowchart (C) UDC (D) UPC
2. A table consists of_________. 11. Which of the following is NOT an example of
(A) Fields and columns (B) Rows and columns system maintenance?
(C) Rows and cells (D) All of the above (A) Replacing user interfaces
3. What does 'ctrl +esc' do? (B) Making backup copies of files
(A) Shows the start menu (C) Adding, deleting, adjusting records
(B) Shows the format menu (D) Providing system security
(C) Shows the tools menu 12. Which of the following is the primary task of a
(D) Shows the insert menu NAS server?
4. A proxy server is used as the computer? (A) Login authentication (B) File sharing
(A) With external access (C) Internet access (D) E-mail processing
(B) Acting as a backup 13. If you change Windows 98 to Windows XP, you
(C) Performing file handling are actually performing ____.
(D) Access user permissions (A) Upstart (B) Upgrade
5. Which of the following best defines embedded (C) Update (D) Patch
system? 14. To make a copy of the current document to
(A) A program that comes wrapped in a box disk____.
(B) A program that is permanent part of a (A) Use the 'Save' command
computer (B) This cannot be done
(C) A computer that is a part of a larger computer (C) Use the 'duplicate' command
(D) A computer and software system that (D) Use the 'save as' command
controls a machine 15. The main system board of a computer is called
6. To see the document before the printout is taken, the _______.
use ______. (A) Integrated circuit (B) Motherboard
(A) Insert Table (B) Paste (C) Processor (D) Microchip
(C) Format Painter (D) Print Preview 16. Your position in the text is shown by a _____.
7. Digital video consists of a series of_____. (A) Blinker (B) Insertion Point
(A) Media clips (B) Captures (C) Causer (D) Pointer
(C) Frames (D) Pictures 17. How many megabytes make a gigabyte?
8. The _______ is the smallest meaningful unit of (A) 1024 (B) 128
data. (C) 256 (D) 512
(A) Cell (B) Field 18. Using output devices one can ________.
(C) Application (D) All of the above (A) Input data (B) Store data
9. What are the four main aspects of data handling (C) Scan data (D) View or print data
with a computer? 19. Which contents are lost when the computer turns
(A) Input, processing, output, and storage off?
(B) Comparing, dividing, sorting, and organizing (A) Storage (B) Input
(C) Decision making, sorting, correcting, and (C) Output (D) Memory
mapping 20. When you save to this, your data will remain
(D) Adding, subtracting, multiplying, and intact even when the computer is turned off–
dividing
Solution
1.(A) A network protocol is an established set of preview, you can discover any errors that
rules that determine how data is may exist in the document or fix the layout
transmitted between different devices in before printing, which can save ink/toner
the same network. Essentially, it allows and paper.
connected devices to communicate with 7.(C) Digital video consists of a series of
each other, regardless of any differences frames. In filmmaking, video production,
in their internal processes, structure or animation, and related fields, a frame is
design. one of the many still images which
2.(B) A table consists of an ordered compose the complete moving picture.
arrangement of rows and columns. A The term may also be used more generally
column name can consist of a word, as a noun or verb to refer to the edges of
phrase or a numerical index; the the image as seen in a camera viewfinder
intersection of a row and a column is or projected on a screen.
called a cell. 8.(B) The Field is the smallest meaningful unit
3.(A) Alternatively referred to as Control Esc of data. A database field is the smallest
and C-Esc, Ctrl+Esc is a shortcut key that unit of storage in a database. Fields are
opens the Start menu in Microsoft needed for every different piece of
Windows. information you wish to store. Database
4.(D) A proxy server, also known as a "proxy" fields are often thought of as the
or "application-level gateway", is a columns within a database table.
computer that acts as a gateway between 9.(A) To function, a computer system requires
a local network (for example, all the four main aspects of data handling: input,
computers at one company or in one processing, output, and storage. The
building) and a larger-scale network hardware responsible for these four areas
such as the internet. Proxy servers provide operates as follows: Input devices accept
increased performance and security. data in a form that the computer can use;
5.(D) An embedded system is a combination of they then send the data to the processing
computer hardware and software designed unit.
for a specific function or functions within 10.(A) In general terms, a POS or Point Of Sale
a larger system. The systems can be machine is a terminal or part of the
programmable or with fixed functionality. checkout process that processes credit or
6.(D) Print Preview option is used to view the debit cards and finalizes the transaction.
page or make adjustments before any Sometimes it can be a whole terminal with
document gets printed. By using print a cash register, printing uni, display
monitor, etc. or sometimes it can be as 17.(A) One thousand megabytes (1000 MB) is
small as a mobile. equal to one gigabyte (1 GB), where 1 GB
11.(A) Replacing user interfaces is not an is one billion bytes. 1 MB = 1048576
example of system maintenance. System bytes is the definition used by Microsoft
maintenance is an ongoing activity, which Windows in reference to computer
covers a wide variety of activities, memory, such as RAM.
including removing program and design 18.(D) Using output devices one can view or print
errors, updating documentation and test data. A printer is an output device that
data and updating user support. prints paper documents. This includes text
12.(B) Network-Attached Storage (NAS) is a documents, images, or a combination of
computer data storage connected to a both. The two most common types of
network, providing data access to various printers are inkjet and laser printers.
group of clients. NAS not only operates as A computer monitor is a display adapter
a file server, but it is also specialized for that displays information processed by the
this task either by its hardware, software, computer's video card. When a video card
or configuration of those elements. or graphics card converts binary
13.(B) If you change Windows 98 to Windows information from 1s and 0s into images,
XP, you are actually performing upgrade. these images are displayed onto the
Upgrading is the process of replacing a directly connected monitor.
product with a newer version of the same 19.(D) When you abruptly turn off the system,
product. In computing and consumer the files that the system has been writing
electronics an upgrade is generally a may be incomplete resulting in loss of
replacement of hardware, software or data. All those unsaved data and programs
firmware with a newer or better version, can lead to data corruption.
in order to bring the system up to date or 20.(C) If you save data in secondary storage
to improve its characteristics. device your data will remain intact even
14.(D) To make a copy of the current document when the computer is turned off or
to disk use the 'save as' command. A switched off. Secondary storage device is
command in the File menu of most where programs are kept for a long period
applications that causes a copy of the of time.
current document or image to be created. 21.(D) A server is a computer that provides data
"Save As" lets the user make a copy of to other computers. It may serve data to
the file in a different folder or make a copy systems on a local area network (LAN)
with a different name. or a wide area network (WAN) over the
15.(B) The main system board of a computer is Internet. For example, a computer
called the Motherboard. The motherboard connected to a home network can be
is a printed circuit board and foundation designated as a file server, print server,
of a computer that is the biggest board in or both.
a computer chassis. It allocates power and 22.(D) The word "modem" is a contraction of the
allows communication to and between the words modulator-demodulator. A modem
CPU, RAM, and all other computer is typically used to send digital data
hardware components. over a phone line. The sending modem
16.(B) The insertion point is the blinking vertical modulates the data into a signal that is
line in your document. It indicates where compatible with the phone line, and the
you can enter text on the page. You can receiving modem demodulates the signal
use the insertion point in a variety of back into digital data.
ways: Blank document: When a new 23.(D) When the pointer hovers over a hyperlink,
blank document opens, the insertion point a mouse over event changes the pointer
is located in the top-left corner of the page. into a hand with an outstretched index
finger. Often some informative text about
the link may pop up in a tooltip, which
disappears when the user moves the 25.(B) A hard disk drive (HDD), hard disk, hard
pointer away. drive, or fixed disk is an electro-
24.(C) The core element of a web page is one or mechanical data storage device that uses
more text files written in the Hypertext magnetic storage to store and retrieve
Markup Language (HTML). Many web digital data using one or more rigid rapidly
pages also make use of JavaScript code for rotating platters coated with magnetic
dynamic behavior and Cascading Style material.
Sheets (CSS) code for presentation
semantics
Practice Set – 34
17. An adder where all the bits of the two operands (A) Thermal printer (B) Ink-jet printer
are added simultaneously– (C) Laser printer (D) Dot-matrix printer
(A) Parallel adder (B) Half adder 22. EDVAC stands for______.
(C) Full adder (D) All of the above (A) Electronic Discrete Variable Automatic
18. The point at which the flow of text in a document Computer
moves to the top of a new page– (B) Electronic Discrete Value Automatic
(A) Page insert (B) Page break Computer
(C) Page format (D) All of the above (C) Electronic Device Variable Automatic
19. Multiprocessor is a computer system– Computer
(A) Where many CPU under a common control (D) Electronic Discrete Variable Advanced
(B) Consisting of more than one input devices Computer
under common control 23. When a file is saved for the first time-_______.
(C) Where many output devices under (A) A copy is automatically printed
(D) All of the above (B) It must be given a name to identify it
20. Non-document files are– (C) It does not need a name
(A) Pure ASCII files that can be listed for any (D) It only needs a name if it is not going to be
word processing software printed
(B) Non-ASCII files that can be listed for any 24. The computers which are relatively rare because
word processing software of their cost and size are:
(C) Pure ASCII files that can be listed for (A) Mini Computers (B) Micro Computers
specific word processing software (C) Super Computers (D) Laptops
(D) Non-ASCII files that can be listed for 25. A mistake in an algorithm that causes incorrect
specific word processing software results is called a ______.
21. Which of the Following is not a non-impact (A) Logical error (B) Syntax error
printer? (C) Machine Error (D) Compiler error
Solution
1.(D) The major advantages of the CD-ROM 4.(C) Microsoft Word or MS-WORD (often
technology are: high-capacity data called Word) is a graphical word
storage; data security and integrity; processing program that users can type
stability of the optical medium, especially with. It is made by the computer company
compared to magnetic media; the ability Microsoft. Its purpose is to allow users to
to store digital, audio, and video data, a type and save documents. Similar to other
direct result of storage capacity and laser word processors, it has helpful tools to
technology. make documents.
2.(C) When a computer or other device is not 5.(B) FORTRAN is a general-purpose,
turned on or connected to other devices, it compiled imperative programming
is said to be "offline." This is the opposite language that is especially suited to
of being "online," when a device can numeric computation and scientific
readily communicate with other devices. computing. FORTRAN was designed for
3.(C) A compiler is a special program that scientists and engineers, and has
processes statements written in a dominated this field. For the past 30 years
particular programming language and FORTRAN has been used for such
turns them into machine language or projects as the design of bridges and
"code" that a computer's processor uses. aeroplane structures, it is used for
Typically, a programmer writes language factory automation control, for storm
statements in a language such as Pascal or drainage design, analysis of scientific data
C one line at a time using an editor. and so on.
6.(C) TCP (Transmission Control Protocol) is a (OTP NVM) is a form of digital memory
standard that defines how to establish and where the setting of each bit is locked
maintain a network conversation through by a fuse or antifuse.
which application programs can exchange 14.(D) In a P2P network, the "peers" are
data. TCP works with the Internet computer systems which are connected
Protocol (IP), which defines how to each other via the Internet. Files can be
computers send packets of data to each shared directly between systems on the
other. network without the need of a central
7.(D) NCSA Mosaic, or simply Mosaic, was the server. In other words, each computer on
web browser that popularized the World a P2P network becomes a file server as
Wide Web and the Internet. It was also a well as a client.
client for earlier internet protocols such as 15.(D) Pascal is an imperative and procedural
File Transfer Protocol, Network News programming language, designed by
Transfer Protocol, and Gopher. The Niklaus Wirth as a small, efficient
browser was named for its support of language intended to encourage good
multiple internet protocols. programming practices using structured
8.(B) MEM commands displays the amount of programming and data structuring. It is
used and free memory in your system. named in honour of the French
Classifies programs by memory usage. mathematician, philosopher and physicist
Lists the size of programs, provides a Blaise Pascal.
summary of memory in use, and lists the 16.(A) Technique to implement virtual memory
largest memory block available. Displays where memory is divided into units of
the status of all modules in memory, fixed size memory is Paging. In Operating
internal drivers, and other information. Systems, Paging is a storage mechanism
9.(A) A double-click is the act of pressing a used to retrieve processes from the
computer mouse button twice quickly secondary storage into the main memory
without moving the mouse. Often, single- in the form of pages. The main idea behind
clicking selects (or highlights) an object, the paging is to divide each process in the
while a double-click executes the function form of pages. The main memory will also
associated with that object. be divided in the form of frames.
10.(A) In computing, an overflow error can occur 17.(A) A single full adder performs the addition
when a calculation is run but the computer of two one bit numbers and an input carry.
is unable to store the answer correctly. All But a Parallel Adder is a digital circuit
computers have a predefined range of capable of finding the arithmetic sum of
values they can represent or store. two binary numbers that is greater than
Overflow errors occur when the execution one bit in length by operating on
of a set of instructions return a value corresponding pairs of bits in parallel.
outside of this range. 18.(B) The page breaks partition only the body
11.(A) Access time is the time delay or latency text of the document, whereas the section
between a request to an electronic system, breaks partition both the body text of the
and the access being completed or the document, as well as partition page
requested data returned. margins, headers and footers, page
12.(C) Latency is measured in milliseconds, and numbers, and the like.
indicates the quality of your connection Go to Layout > Page Setup, select Break,
within your network. Anything at 100ms and then choose Page.
or less is considered acceptable for Click or tap in the document where you
gaming. However, 20-40ms is optimal. want a page break.
13.(D) A programmable read-only memory Go to Insert > Page Break.
(PROM) or field programmable read-only 19.(A) Multiprocessing, in computing, a mode of
memory (FPROM) or one-time operation in which two or more processors
programmable non-volatile memory in a computer simultaneously process two
or more different portions of the same 23.(B) Save as a different, or older, format
program (set of instructions). On a Click the File tab.
multiprocessor machine, each processor Click Save As.
and RAM is connected through the system Choose a file location, such as OneDrive
bus. Hence the system bus is the hardware or This PC to store your file.
path used by the processors to access the In the File name box, enter a new name for
system memory as well as to access each the file.
other. But going through the slow system In the Save as type list, click the file
bus will slow down the processing. format that you want to save the file in.
20.(B) Non-document-mode definition: Click Save
A word processing mode used for creating 24.(C) A supercomputer is a computer that
source language programs, batch files and performs at or near the currently highest
other text files that contain only text and operational rate for computers.
no proprietary headers and format codes. Traditionally, supercomputers have been
21.(C) A laser printer is a printer that uses a used for scientific and engineering
focused beam or light to transfer text and applications that must handle very large
images onto paper. The result is a clean databases or do a great amount of
copy of the image written on the paper. computation (or both).
Because laser printers do not use ink, they 25.(A) A logic error (or logical error) is a mistake
have less image smearing problems than in a program's source code that results in
inkjet printers and are able to print pages incorrect or unexpected behavior. It is a
faster. type of runtime error that may simply
22.(A) EDVAC (Electronic Discrete Variable produce the wrong output or may cause a
Automatic Computer) was one of the program to crash while running. Many
earliest electronic computers. Unlike its different types of programming mistakes
predecessor the ENIAC, it was binary can cause logic errors.
rather than decimal, and was designed to
be a stored-program computer.
Practice Set – 35
1. A(n) _____ program is one that is ready to run 11. What is the short cut key to open the Open dialog
and does not need to be altered in any way. box in MS word?
(A) Interpreter (B) High-level (A) F12 (B) Shift F12
(C) Compiler (D) Executable (C) Alt + F12 (D) Ctrl + F12
2. A set of step-by-step procedures for 12. How can you disable extended selection mode?
accomplishing a task is known as a(n)— (A) Press F8 again to disable
(A) Algorithm (B) Hardware program (B) Press Del to disable
(C) Software bug (D) Firmware program (C) Press Esc to disable
3. The main directory of a disk is called the (D) Press Enter to disable
_______ directory. 13. Auto Calculate will quickly add selected cells if
(A) Root (B) Sub you _________.
(C) Folder (D) Network (A) Right click on the status bar and select Sum
4. A ________ is a collection of data that is stored (B) Click the Auto Calculate button on the
electronically as a series of records in a table. toolbar
(A) Spreadsheet (B) Presentation (C) Use the key combination Ctrl+$
(C) Database (D) Web page (D) Double click the selection
5. As you create documents, graphs and pictures 14. You can add a hyperlink to your worksheet by
your computer holds the data in—. pressing.
(A) Restore file (B) Backup drive (A) Alt + K (B) Ctrl + H
(C) Clip board (D) Memory (C) Ctrl + K (D) Ctrl + Shift + K
6. All are included in removable media except the 15. ___________ are 'attempts by individuals to
following— obtain confidential information from you by
(A) CD-ROMs (B) Diskette falsifying their identity.
(C) DVDs (D) Hard disk drive (A) Phishing (B) Computer viruses
7. ________ processing is used when a large mail- (C) Spyware scams (D) Viruses
order company accumulates orders and processes 16. Which of the following is the fastest type of
them together in one large set. computer?
(A) Batch (B) Online (A) Laptop (B) Notebook
(C) Real-time (D) Group (C) Personal computer (D) Super computer
8. Computer programs are written in a high-level 17. Which of the following is not a term pertaining
programming language; however, the human to the Internet?
readable version of a program is called— (A) Keyboard (B) Link
(A) Cache (B) Instruction set (C) Browser (D) Search Engine
(C) Source code (D) Word size 18. The operating system that is self-contained in a
9. What happens if you press Ctrl + Shift + F8? device and resident in the ROM is ______.
(A) It activates extended selection. (A) Batch Operating System
(B) It activates the rectangular selection (B) Real - time Operating System
(C) It selects the paragraph on which the (C) Embedded Operating System
insertion line is. (D) Multi Operating System
(D) None of above 19. The computer abbreviation KB usually means–
10. Which of the following is not valid version of MS (A) Key Block (B) Kernel Boot
Office? (C) Key Byte (D) Kilo Byte
(A) Office XP (B) Office Vista
(C) Office 2007 (D) All of the above
20. _______ is the key to close a selected drop - (C) Storage device (D) Output device
down list; cancel a command and close a dialog 23. A __________ is an additional set of commands
box. that the computer displays after you make a
(A) TAB (B) SHIFT selection from the main menu.
(C) ESC (D) F10 (A) dialog box (B) Submenu
21. Which of the following is NOT one of the four (C) Menu selection (D) All of the above
major data processing functions of a computer? 24. A letter, memo, proposal or other file that is
(A) Gathering data created using Microsoft Word is called as?
(B) Processing data into information (A) Master (B) Slide
(C) Analyzing the data or information (C) Document (D) Worksheet
(D) Storing the data or information 25. Which of the following are parts of the CPU?
22. The CPU and memory are located on the: (A) Secondary Memory (B) Control unit
(A) Expansion board (B) Motherboard (C) Input device (D) Printer
Solution
1.(D) An executable is a file that contains a operating systems, software, and
program - that is, a particular kind of file hardware.
that is capable of being executed or run as 6.(D) A hard drive is the hardware component
a program in the computer. In a Disk that stores all of your digital content.
Operating System or Windows operating Your documents, pictures, music, videos,
system, an executable file usually has a programs, application preferences, and
file name extension of .bat, .com, or .exe. operating system represent digital content
2.(A) An algorithm is a step-by-step stored on a hard drive. Hard drives can be
demonstration of data processing or external or internal.
problem-solving. An algorithm can be 7.(A) Batch processing is a technique in which
described as a procedure or formula for an Operating System collects the
problem-solving. Algorithms can be programs and data together in a batch
widely used in various areas, computer before processing starts. An operating
programming, mathematics, and daily system does the following activities
lives. related to batch processing − The OS
3.(A) In a computer file system, and primarily defines a job which has predefined
used in the Unix and Unix-like operating sequence of commands, programs and
systems, the root directory is the first or data as a single unit.
top-most directory in a hierarchy. It can be 8.(C) Computer programs are written in a high-
likened to the trunk of a tree, as the level programming language; however,
starting point where all branches originate the human- readable version of a program
from. is called source code. Source code is the
4.(C) A database is an organized collection of language or string of words, numbers,
structured information, or data, typically letters and symbols that a computer
stored electronically in a computer programmer uses. An example of source
system. A database is usually controlled code is someone using HTML code to
by a database management system create a screen. "Source code."
(DBMS). 9.(B) To create a rectangular outline, the
5.(D) Computer memory is any physical device simplest and most
capable of storing information flexible approach is to create a rectangular
temporarily, like RAM (random access selection and then stroke it. The
memory), or permanently, like ROM shortcut is Ctrl + Shift + F8.
(read-only memory). Memory devices 10.(B) With the release of Word 2003, the
utilize integrated circuits and are used by numbering was again year-based. Since
then, Windows versions include Word have been the main input method for
2007, Word 2010, Word 2013, Word computers since the 1970s, supplemented
2016, and most recently, Word for Office by the computer mouse since the 1980s.
365. In 1986, an agreement between Atari 18.(C) The operating system that is self-
and Microsoft brought Word to the Atari contained in a device and resident in the
ST. ROM is Embedded Operating System. An
11.(D) Open an application and then press Ctrl- embedded operating system is a
O, or click the Open icon, to display the specialized OS for use in the computers
Open dialog box. Right-click any of the built into larger systems.
files or folders displayed in that dialog and 19.(D) The kilobyte is a multiple of the unit byte
you'll see a context menu pop open. This for digital information. The International
is the same context menu you'll find in System of Units defines the prefix kilo as
Explorer windows. 1000; per this definition, one kilobyte is
12.(C) If you press the F8 key, you enable what 1000 bytes. The internationally
Word refers to as extend mode. This is the recommended unit symbol for the kilobyte
keyboard method of anchoring the cursor is kB.
in preparation for making a selection. 20.(C) ESC is the key to close a selected drop -
When you move the cursor using the down list; cancel a command and close a
cursor control keys, the size of the text dialog box. The Escape key is located in
selection changes and the letters EXT the upper-left corner of a computer
appear on the status bar. keyboard. It typically resides to the left of
13.(B) Auto Calculate will quickly add selected the Function keys (F1, F2, F3, etc.) and
cells if you click the Auto Calculate button above the tilde (~) key. Most often, is is
on the toolbar. labeled with the abbreviation "esc."
14.(C) The hyperlink is used to add a link from 21.(C) Input, Process, Output, Storage is the
your worksheet to another location. The correct order of the four major functions
shortcut used for inserting a hyperlink is a of a computer.
combination of the CTRL key and letter There are five main hardware components
'K'. Click on the cell where you want to in a computer system: Input, Processing,
include the hyperlink, type an anchor text, Storage, Output and Communication
and then press the ENTER key. devices. A computer is a machine that can
15.(A) Phishing scams are attempts by be programmed to accept data (input),
individuals to obtain confidential process it into useful information (output),
information from you by falsifying their and store it away (in a secondary storage
identity. it is a kind of computer virus. device) for safekeeping or later reuse. The
phishing scams are used to obtain processing of input to output is directed by
sensitive information like user name, the software but performed by the
passwords-band credit card details. hardware. “Computer is a data processing
16.(D) A supercomputer is a computer with a device that performs four major functions:
high level of performance as compared to input, process, output, and storage” 2.
a general-purpose computer. The There are basically for basic functions of
performance of a supercomputer is computers - input, storage, processing and
commonly measured in floating-point output. These are described below: Input:
operations per second (FLOPS) instead of Receiving or accepting information from
million instructions per second (MIPS). outside sources. The most common way of
17.(A) A computer keyboard is a typewriter-style performing this function is through the
device which uses an arrangement of information entered through the keyboard
buttons or keys to act as mechanical levers and the click of mouse.
or electronic switches. Replacing early 22.(B) The motherboard is a printed circuit board
punched cards and paper tape technology, and foundation of a computer that is the
interaction via tele printer-style keyboards biggest board in a computer chassis. It
Mock Tests - 14
COMPUTER AWARENESS
162
Mock Test - 01
1. All of the logic and mathematical calculations 11. The first computer was programmed using
done by the computer happen in/on the ______. ______.
(A) system board (A) Assembly language (B) Machine language
(B) central control unit (C) Spaghetti code (D) Source code
(C) central processing unit 12. An integrated circuit is ______.
(D) mother board (A) a complicated circuit
2. A microprocessor is the brain of the computer (B) an integrated device
and is also called a(n) ______. (C) much costlier that a Dingle transistor
(A) microchip (B) macrochip (D) fabricated on a tiny silicon chip
(C) macroprocessor (D) calculator 13. The two types of output devices are ______.
3. The main job of CPU is to ______. (A) Monitor and Printer
(A) carry out program instructions (B) Floppy disk and CD
(B) store data/information for future use (C) Keyboard and Mouse
(C) process data and information (D) Windows 2000 and Windows NT
(D) Both (A) and (C) 14. A scanner scans ______.
4. Computer ______ is whatever is typed, (A) pictures
submitted, or transmitted to a computer system. (B) text
(A) input (B) output (C) both picture and text
(C) data (D) circuity (D) neither picture nor text
5. Main memory works in conjunction with 15. Which of the following groups have only input
______. devices?
(A) Special function cards (B) RAM (A) Mouse, Keyboard, Monitor
(C) CPU (D) Intel (B) Mouse, Keyboard, Printer
6. Which part of the computer is used for (C) Mouse, keyboard, Plotter
calculating and comparing? (D) Mouse, Keyboard, Scanner
(A) Disk Unit (B) Control Unit 16. The most common input devices are ______.
(C) Modem (D) ALU (A) Microphone, printer
7. Once information is input into a computer it (B) Scanner, monitor
becomes ______. (C) Digital camera, speaker
(A) objects (B) data (D) Keyboard, mouse
(C) ideas (D) facts 17. In MICR, 'C' stands for ______.
8. ______ is any part of the computer that you can (A) Code (B) Colour
physically touch. (C) Computer (D) Character
(A) Hardware (B) A Software 18. Which part of a computer displays the work
(C) Compiler (D) An application done?
9. The complete form of ‘IC’ in electronics is (A) RAM (B) Printer
______. (C) Monitor (D) ROM
(A) Internal circuit 19. Which of these keys is not on the number
(B) Independent circuit keyboard?
(C) Integrated circuit (A) Ctrl (B) Del
(D) Inbuilt circuit (C) Enter (D) Num lock
10. PARAM was developed by ______. 20. Which of the following is an example of storage
(A) C-DAC (B) IIT Kanpur devices?
(C) BARC (D) IIT Delhi
(A) Magnetic disks (B) Tapes (C) consists of four main types of devices
(C) DVDs (D) All of these (D) does not store information for later retrieval
21. Hard disk drives are considered ______ storage. 24. Which of the following is an example of an
(A) flash (B) non-volatile optical disk?
(C) temporary (D) non-permanent (A) Digital versatile disk
22. Memory that cannot be processed directly by (B) Memory disk
CPU is ______. (C) Magnetic disk
(A) Internal memory (B) External memory (D) No option is correct
(C) Cache memory (D) System memory 25. What part of the computer provides only
23. Secondary storage ______. temporary storage of files?
(A) does not require constant power (A) ROM memory (B) RAM memory
(B) does not use magnetic media (C) Hard drive (D) Mother board
Solution
1. (C) 2. (A) 3. (D) 4. (A) 13. (A) 14. (C) 15. (D) 16. (D)
5. (C) 6. (D) 7. (B) 8. (A) 17. (D) 18. (C) 19. (A) 20. (D)
9. (C) 10. (A) 11. (B) 12. (D) 21. (B) 22. (B) 23. (A) 24. (A)
25. (B)
Mock Test - 02
1. Which type of memory holds only the program 11. Printed information is existing physically and is
and data that the CPU is presently processing? a more permanent form of output than that
(A) CMOS (B) ROM presented on a display device is called ______.
(C) RAM (D) ASCII (A) Soft copy (B) Carbon copy
2. Where is data saved permanently? (C) Hard copy (D) Desk copy
(A) Memory (B) Storage 12. Mr. X has no printer to print his report. He wants
(C) CPU (D) Printer to take it to Mr. Y’s computer because Mr. Y has
3. The two kinds of main memory are ______. printer. Mr. X could save his report on a ______.
(A) ROM and RAM (A) Hard drive (B) Piece of paper
(B) Floppy Disk and DVD (C) Scanner (D) Mouse
(C) Primary and Secondary 13. A device that connects to a network without the
(D) Random and Sequential use of cables is said to be ______.
4. Which of the following devices have a limitation (A) distributed (B) wireless
that we can only read information from it but (C) centralized (D) open source
can't erase or modify it? 14. The ______ folder retains copies of messages
(A) Tape drive (B) Hard disk that you have started but are not yet ready to
(C) CD - Rom (D) Floppy disk send.
5. A DVD is an example of ______. (A) Inbox (B) Outbox
(A) hard disk (C) Drafts (D) Sent Items
(B) input device 15. A person who used his or her expertise to gain
(C) solid-state storage device access to other people’s computers to get
(D) optical disc information illegally or do damage is a ______.
6. Which device can understand the difference (A) spammer (B) hacker
between data and programs? (C) instant messenger (D) programmer
(A) Input device (B) Output device 16. Junk e-mail is also called ______.
(C) Memory (D) Microprocessor (A) spam (B) spoof
7. Storage device found inside the computer is (C) sniffer script (D) spool
______. 17. Antivirus software is an example of ______.
(A) CD ROM (B) Zip Disk (A) Business software
(C) Super Disk (D) Hard Disk (B) An operating system
8. The computer that process both analog and (C) A security utility
digital is called ______. (D) None of these
(A) Analog computer 18. Which one of the following is the reusable
(B) Hybrid computer optical storage device?
(C) Digital computer (A) CD (B) DVD
(D) Mainframe computer (C) RPM (D) CD-RW
9. Which of following refers to the fastest, biggest 19. Restarting of computer that is already on is
and most expensive computer? referred to as ______.
(A) Personal computer (B) Super computer (A) shut down (B) cold booting
(C) Laptop (D) Notebook (C) warm booting (D) logging off
10. The smallest unit of information a computer can 20. Ctrl, Shift and Alt keys are known as ______.
understand and process is known as a ______. (A) Function keys (B) Adjustment keys
(A) Digit (B) Kilobyte (C) Alphanumeric keys (D) Modifier keys
(C) Bit (D) Byte
21. What are the four things needed to connect to the (D) Video Card (VC)
Internet? 23. A computer works on a ______ number system.
(A) Floppy disk, modem, computer and an ISP (A) binary (B) octal
(B) Telephone line, PDA, computer and an ISP (C) decimal (D) hexadecimal
(C) Computer, an ISP modem and 24. Which of the following is the largest unit of
communication software storage?
(D) Computer, an ISP, modem and PDA (A) GB (B) KB
22. Which one of the following enables your (C) MB (D) TB
computer to connect to other computers? 25. Information on a computer is stored as ______.
(A) Graphic User Interface (GUII) (A) analog data (B) digital data
(B) Network Interface Card (NIC) (C) modem data (D) outbox data
(C) Controller Card (CnC)
Solution
1. (C) 2. (B) 3. (A) 4. (C) 13. (B) 14. (C) 15. (B) 16. (A)
5. (D) 6. (D) 7. (D) 8. (B) 17. (C) 18. (D) 19. (C) 20. (D)
9. (B) 10. (C) 11. (C) 12. (A) 21. (C) 22. (B) 23. (A) 24. (D)
25. (B)
Mock Test - 03
(A) Sever (B) Super Computer (D) All options are correct
(C) Enterprise (D) Network 23. To view information on the web you must have a
20. A popular way to learn about computers without ______.
ever going to a classroom is called ______. (A) cable modem (B) web browser
(A) i-learning (B) isolated learning (C) domain name server (D) hypertext viewer
(C) e-Iearning (D) close learning 24. ______ allows voice conversations to travel over
21. The standard protocol of the internet is ______. the Internet.
(A) TCP/IP (B) Java (A) Internet telephony (B) Instant messaging
(C) HTML (D) Flash (C) E-mail (D) E-commerce
22. The Internet allows you to ______. 25. The ______ also called the web, contains billions
(A) send electronic mail of documents.
(B) view Web pages (A) World Wide Web (B) HTTP
(C) connect to servers all around the world (C) Web portal (D) Domain
Solution
1. (A) 2. (B) 3. (B) 4. (C) 17. (C) 18. (A) 19. (D) 20. (C)
5. (A) 6. (B) 7. (C) 8. (A) 21. (A) 22. (D) 23. (B) 24. (A)
9. (A) 10. (A) 11. (D) 12. (D) 25. (A)
13. (C) 14. (A) 15. (D) 16. (A)
Mock Test - 04
1. Teach Text is a text editor in which of the (A) File information packet
following operating systems? (B) File button
(A) Windows (B) Google Chrome (C) File directory
(C) Mozilla Firefox (D) Macintosh (D) File specification
2. A _______ is an agreement between the 11. The name which a user assigns to a document is
communicating parties on how communication is called a(n) ______ .
to proceed. (A) filename (B) program
(A) Path (B) SLA (C) record (D) data
(C) Bond (D) Protocol 12. .Dos, Doc and Html are example of ______.
3. "GUI" Stands for ______. (A) Data bases (B) Extensions
(A) Gnutella Universal Interface (C) Domains (D) Protocols
(B) Graphics User Interface 13. Which of the following command allows you to
(C) Graphic Uninstall/Install bold the select text?
(D) General Utility Interface (A) Shift + P (B) ESC + P
4. Each ______ on a menu performs a specific (C) Alt + P (D) Ctrl + B
action. 14. In a database, ______ fields store numbers used
(A) client (B) server to perform calculation.
(C) node (D) command (A) Next (B) Key
5. The side bar in a window or word processor that (C) Alphanumeric (D) Numeric
has an arrow on both ends and a box in the middle 15. Numbers in table columns are usually ______.
that you use your mouse to move the pages up\or (A) right-aligned (B) left-aligned
down is ______. (C) justified (D) centered
(A) Scroll bar (B) Roll bar 16. In a spreadsheet program, the ______ contains
(C) Page bar (D) Box bar related worksheet and documents.
6. Deleted data remains on a disk until ______. (A) workbook (B) column
(A) the data is overwritten (C) cell (D) formula
(B) the recycle bin is emptied 17. To go to the beginning of a text line, press
(C) a file compression utility is used ______ key.
(D) the disk is scanned (A) Home
7. In Microsoft Word, ______ allows us to move (B) Page up
selected paragraphs to the left. (C) Enter
(A) decrease Indent (B) increase Indent (D) No option is correct
(C) double Indent (D) single Indent 18. Mouse technique used to access properties of an
8. For creating a document, we use which of the object is ______.
following button at file menu? (A) dragging (B) dropping
(A) Open (B) Close (C) right clicking (D) shift clicking
(C) New (D) Save 19. Moves the cursor one space to the right or puts
9. Meaningful filename helps in easy file ______. spaces in between words by using ______.
(A) storing (A) Control key (B) Spacebar
(B) accessing (C) Printer (D) Mouse
(C) printing 20. MS-Word is an example of ______.
(D) No option is correct (A) Operating system
10. A ______ includes the file name and possibly a (B) Application software
directory of folder. (C) Processing device
Solution
1. (D) 2. (D) 3. (B) 4. (D) 17. (A) 18. (C) 19. (B) 20. (B)
5. (A) 6. (B) 7. (D) 8. (C) 21. (A) 22. (D) 23. (C) 24. (C)
9. (B) 10. (C) 11. (A) 12. (B) 25. (B)
13. (D) 14. (D) 15. (B) 16. (A)
Mock Test - 05
1. Which of the following shortcut is used to cut 9. In MS–Excel, what does 'SUMIF' function do?
something in MS–Word. (A) Adds up cell values based on a condition
(A) Ctrl + C (B) Adds all the numbers in a range of cells
(B) Ctrl + X (C) Returns a subtotal in a list or database
(C) Ctrl + V (D) No option is correct
(D) No option is correct 10. In MS–Excel, you can use the drag and drop
2. What type of software is used for creating letters, method to ______.
papers and other documents? (A) copy cell contents
(A) Database (B) Word processor (B) delete cells contents
(C) Spreadsheet (D)Operating program (C) add cell contents
3. In Microsoft Word, shortcut key Ctrl + P is used (D) All options are correct
to ______. 11. In MS–Excel, to access the 'Go To' Special
(A) open the Print dialog box feature, you can press ______.
(B) update the current Web page (A) Ctrl + G (B) Ctrl + O
(C) close the current window (C) Ctrl + Shift + G (D) Ctrl + 1
(D) No option is correct 12. In MS–Excel, Status indicators are located on the
4. In MS–Word, which of the following shortcut ______.
key is used to copy something? (A) Vertical scroll bar
(A) Ctrl + C (B) Horizontal scroll bar
(B) Ctrl + X (C) Formula bar
(C) Ctrl + V (D) Standard toolbar
(D) No option is correct 13. In MS–Excel workbook is a collection of
5. In Microsoft Word, shortcut 'Shift + Delete' is ______.
used to ______. (A) Workbooks
(A) delete the selected item permanently without (B) Worksheets
placing the item in the Recycle Bin (C) charts
(B) copy the selected item (D) Worksheets and charts
(C) rename the selected item 14. Excel files have a default extension of ______.
(D) create a shortcut to the selected item (A) Xls (B) Xlw
6. In Microsoft Word, shortcut key 'Ctrl + O' is used (C) Wk1 (D) 123
to ______. 15. In MS–Excel, Hyperlinks can be ______.
(A) open the favorites bar (A) Text
(B) open the Open dialog (B) Drawing objects
(C) start another instance of the browser with the (C) Pictures
same web address (D) All options are correct
(D) No options is correct 16. In MS–PowerPoint, to add a header or footer to
7. In MS–Excel, multiple calculations can be made your handout, you can use ______.
in a single formula using ______. (A) The title master
(A) standard formulas (B) array formula (B) The slide master
(C) complex formulas (D) smart formula (C) The handout master
8. In which of the following form data is stored in (D) All options are correct
computer? 17. Which of the following fill effects can you use
(A) Binary (B) Octal for slide background in MS–PowerPoint?
(C) Hexadecimal (D) Decimal (A) Gradient
Mock Test - 06
1. Who created the first mechanical computer, 10. In IT, associative memory is called as ______.
which proved to be the prototype for future (A) Virtual memory
computers? (B) Cache memory
(A) Archimedes (B) John Harrison (C) Content addressable memory
(C) Cai Lun (D) Charles Babbage (D) Main memory
2. ______ software are freely available and can be 11. ALU is a part of computer ______.
edited and customised by anyone. (A) Application (B) ROM
(A) Free Source (B) Open Source (C) RAM (D) Processor
(C) Easy Source (D) Unpaid Source 12. ______ is not a storage device.
3. Which of the following is used to protect objects (A) iPod (B) Pen drives
in computer system, in the absence of more (C) Linux (D) Flash Disks
complete protect schemes? 13. Which among the following is not an input
(A) Digital certificate (B) Digital Signature device?
(C) Passwords (D) Tokens (A) Plotter
4. ______ is a global system of interconnected (B) Magnetic Ink Character Recognition (MICR)
governmental, academic, corporate, public, and (C) Optical Mark Recognition (OMR)
private computers? (D) Barcode Reader
(A) Intranet (B) Internet 14. Which of the following is also known as the brain
(C) Extranet (D) Darknet of the computer?
5. An absolute ______ contains the complete (A) CPU (B) ALU
address of a file on the Internet. (C) Motherboard (D) Keyboard
(A) Java Script (B) URL 15. What is the name of the First Supercomputer of
(C) SQL (D) String the world?
6. C.P.U. consists of ______. (A) CDC 6660 (B) USENET
(A) Arithmetic and Logical unit and Register (C) COMODOR VIC/20 (D) PARAM-10000
(B) Arithmetic and Logical unit, Register and 16. Which of the following are the two versions of
Control unit the Internet Protocol (IP)?
(C) System unit and Memory (A) IP Version 4 & IP Version 6
(D) Hard disk and Control unit (B) IP Version 2 & IP Version 3
7. Which of the following is a volatile memory of a (C) IP Version 4 & IP Version 8
computer? (D) IP Version 2 & IP Version 4
(A) Secondary Memory (B) Cache memory 17. In IT, the method for updating the main memory
(C) RAM (D) ROM as soon as a word is removed from the cache is
8. Cache memory works on the principle of ______. called ______.
(A) Locality of data (A) Write-through (B) Write-back
(B) Locality of reference (C) Protected-write (D) Cache-write
(C) Locality of Memory 18. Protocol used for receiving an email is ______.
(D) Locality of Memory & reference (A) HTTP (B) FTP
9. ______ is telecommunications network or (C) POP (D) SSH
computer network that extends over a large 19. A set of instructions executed directly by a
geographical distance. computer’s central processing unit is ______.
(A) Uniform Resource Locator (A) Command Language
(B) Simple Mail Transfer Protocol (B) Machine Language
(C) Wide Area Network (C) Markup Language
(D) Java Script (D) Style Sheet Language
20. Which mechanism is used by the computer virus (D) File Transfer Protocol
‘worm’ to duplicate itself? 23. In IT terminology, failure in the Kernel is called
(A) Swap (B) Increment as ______.
(C) Spawn (D) Swarm (A) Crash (B) Crash dump
21. Which of the following errors are identified by (C) Dump (D) Kernel error
the compiler? 24. Which among the following is a light sensitive
(A) Logical Errors (B) Hardware Errors device used for converting images to their digital
(C) Language Errors (D) Syntax Errors form?
22. In computer terminology, what is the full form of (A) Printer (B) Monitor
FTP? (C) Scanner (D) RAM
(A) Final Transfer Position 25. Which is not an external storage device?
(B) File Transfer Position (A) CD-ROM (B) DVD-ROM
(C) File Transfer Packet (C) Pen Drive (D) RAM
Solution
1. (D) 2. (B) 3. (C) 4. (B) 17. (B) 18. (C) 19. (B) 20. (C)
5. (B) 6. (B) 7. (C) 8. (B) 21. (D) 22. (D) 23. (A) 24. (C)
9. (C) 10. (C) 11. (D) 12. (C) 25. (D)
13. (A) 14. (A) 15. (A) 16. (A)
Mock Test - 07
1. Which of the following is/are Correct? 11. The limit for ASDL service is ______.
I. GUI - Graphical User Interface (A) 6,000 feet (B) 12,000 feet
II. VDU – Visual Display Unit (C) 18,000 feet (D) 9,000 feet
III. ALU – All Logical Unit 12. COBOL is an example of ______ language.
(A) I and II (A) low level
(B) I and III (B) computer
(C) Only II (C) high level
(D) All options are correct (D) system programming
2. Syntax Errors are determined by ______. 13. Which of the following is first commercial
A) Interpreter (B) ALU computer?
(C) Logic Unit (D) Control Unit (A) ENIAC (B) EDSAC
3. Which among the following is a ‘Modifier key’? (C) UNIVAC (D) EDVAC
(A) Control 14. Which of the following can input graphical
(B) Shift images and pictures for a computer?
(C) Alt (A) Plotter (B) Scanner
(D) All options are correct (C) Mouse (D) Keyboard
4. What is the name of a memory buffer used to 15. Cache memory works on the principle of ______.
accommodate a speed differential? (A) locality of reference
(A) Cache (B) Stack Pointer (B) locality of memory
(C) Accumulator (D) DISC (C) locality of data
5. Which among the following has largest storing (D) locality of memory and reference
space? 16. Which is the best definition of a software
(A) Giga byte (B) Mega byte package?
(C) Tera byte (D) Kilo byte (A) An add-on for your computer such as
6. Web pages are created by using which of the additional memory.
following? (B) A set of computer programs used for a certain
(A) HTTP (B) SMTP function such as word processing.
(C) HTML (D) SGML (C) A protection you can buy for a computer.
7. What is a bug in computer terminology? (D) The box, manual and license agreement that
(A) A virus accompany commercial software.
(B) A program 17. A ______ is hardware used to read disks.
(C) An error in program (A) Floppy disk (B) Hardware
(D) Magnetic disk storage device (C) Software (D) Disk drive
8. Dot- Matrix is an example of which of the 18. The programs which are as permanent as
following? hardware and stored in ROM is known as
(A) A software (B) Scanner ______.
(C) Printer (D) Keyboard (A) hardware (B) software
9. Group of 4 bits forms a ______. (C) firmware (D) ROM ware
(A) Byte (B) Nibble 19. ______ is the process of carrying out commands.
(C) Gigabyte (D) Terabyte (A) Fetching (B) Storing
10. In IT, ______ means that the data available in the (C) Decoding (D) Executing
database is both accurate and consistent. 20. Changing an existing document is called ______
(A) Data Security (B) Data Availability the document.
(C) Data Binding (D) Data Integrity (A) creating (B) editing
(C) adjusting (D) coding
21. Help Menu is available at which button? (A) HTML (B) XML
(A) End (B) Start (C) XHTML (D) None of these
(C) Restart (D) Reboot 24. The first-generation computer system used
22. A program that converts high level language to ______.
machine language is ______. (A) vacuum tubes (B) transistors
(A) linker (B) assembler (C) registers (D) magnetic cores
(C) compiler (D) interpreter 25. Android operating system is an example of
23. A set of rules for creating markup languages that which kind of source model?
enables programming to capture specific types of (A) Vertical Market Software
data by creating their own elements is called (B) Open Source
______. (C) Shareware
(D) Horizontal Market Software
Solution
1. (A) 14.(B)
2. (D) 15.(A)
3. (D) 16.(B)
4. (A) 17.(D)
5. (C) 18.(C)
6. (C) 19.(D)
7. (C) 20.(B)
8. (C) 21.(B)
9. (B) 22.(C)
10. (D) 23.(B)
11.(C) 24.(A)
12.(C) 25.(B)
13.(C)
Mock Test - 08
20. _________ Is the Virus that overwrites the files (A) C (B) Java
or a few parts being replaced? (C) C++ (D) Both B and C
(A) Resident (B) File infectors 23. MICR is exclusively used in__________
(C) Boot virus (D) Macro virus (A) Libraries (B) Super markets
21. Which of the following is an advantage of stored (C) Stock markets (D) Banking Industry
programs? 24. Which of the following is an audio input device?
(A) Reliability (A) Microphone (B) Webcam
(B) Reduction in operation costs (C) MIDI keyboard (D) Only A & C
(C) The computers becoming general-purpose 25. Digital Camera is an?
(D) All of the above (A) Input Device (B) Output Device
22. Which of the following is an Object-Oriented (C) Storage Device (D) Controller Device
Programming Language?
Solution
1.(A) 2.(D) 3.(B) 4.(A) 5.(D)
6.(C) 7.(A) 8.(A) 9.(C) 10.(A)
11.(A) 12.(B) 13.(A) 14.(D) 15.(A)
16.(B) 17.(D) 18.(B) 19.(B) 20.(B)
21.(A) 22.(D) 23.(D) 24.(D) 25.(A)
Mock Test - 09
1. ______ is any part of the computer that you can 10. A collection of unprocessed items is called
physically touch. ______.
(A) Hardware (B) Software (A) Information (B) Reports
(C) Application (D) None of these (C) Memory (D) Data
2. Computer gathers data, which means that it 11. What are the speakers attached to your computer
allows users to ______ data. used for?
(A) present (B) output (A) Displaying images
(C) input (D) None of these (B) Sending messages
3. The brain of any computer system is ______. (C) Storing messages
(A) ALV (B) Memory (D) Handling sound and music
(C) Control unit (D) CPU 12. The main job of CPU is to ______.
4. The output quality of a printer is measured by (A) carry out program instructions
______. (B) store data/information for future use
(A) dots printed per unit time (C) process data and information
(B) dot per sq. inch (D) both (A) and (C)
(C) dot per inch 13. Portrait and landscape are ______.
(D) All of the above (A) page size (B) page view
5. Which is used for manufacturing chips? (C) page orientation (D) page layout
(A) Semiconductors (B) Control units 14. Which among the following is used to create
(C) Bus (D) None of these webpage?
6. ASCII stands for ______. (A) HTML (B) SMTP
(A) American stable code for international (C) Internet (D) Usenet
interchange 15. Which of the following supports 32-bit
(B) American standard code for interchange processor?
information (A) Window 2000 (B) Window 7
(C) American standard code for information (C) Window 8.1 (D) All of the above
interchange 16. What is the number of function keys on a
(D) American stable code for interchange keyboard?
information (A) 10 (B) 12
7. The main webpage of a website is also known as (C) 15 (D) 16
______. 17. Which among the following was the first
(A) Home page (B) First page network with which the idea of internet began?
(C) Introduction page (D) Contents page (A) ARPANET (B) APRANET
8. Different icons of application software can be (C) PARANET (D) USENET
found in which bar in the latest version of 18. Which of the following key is the example of
Microsoft windows? Toggle key?
(A) Control panel (B) Browser (A) Ctrl (B) Shift
(C) Start menu (D) Status (C) Caps lock (D) Alt
9. Coded entries which are used to gain access to a 19. Each box in a spread sheet is called a ______.
computer system are called ______. (A) Block (B) Cell
(A) Entry code (C) Table (D) Field
(B) Security commands 20. Which among the following port is used to
(C) Passwords connect special types of music instruments to
(D) Code words sound cards?
Solution
1.(A) 14.(A)
2.(C) 15.(D)
3.(D) 16.(B)
4.(C) 17.(A)
5.(A) 18.(C)
6.(C) 19.(B)
7.(A) 20.(C)
8.(C) 21.(A)
9.(C) 22.(B)
10.(D) 23.(A)
11.(D) 24.(D)
12.(D) 25.(A)
13.(C)
Mock Test - 10
1. What is the other name of Junk Email? (A) command (B) program
(A) Draft (B) Spam (C) user response (D) processor
(C) Compose (D) Inbox 13. A ______ can make it easier to play games.
2. Who invented the WWW? (A) mouse (B) keyboard
(A) Charles Babbage (B) Tim Berners Lee (C) digital pen (D) joystick
(C) Guido Van Rossum (D) Sergey Brin 14. Which of the following can input graphical
3. How many layers are present in OSI model? images and pictures for a computer?
(A) Six (B) Seven (A) Plotter (B) Scanner
(C) Eight (D) Nine (C) Printer (D) Mouse
4. In computer terminology, failure in the kernel is 15. For seeing the output, you use ______.
called. (A) monitor (B) mouse
(A) Spam (B) Virus (C) printer (D) scanner
(C) Antivirus (D) Crash 16. ______ is a permanent storage device.
5. Which memory is called Non-volatile memory in (A) Compact disk (B) Printer
computer? (C) RAM (D) Scanner
(A) ROM (B) RAM 17. Which of following refers to the fastest, biggest
(C) Both (A) and (B) (D) None of the above and most expensive computer?
6. Any data and instruction entered in the memory (A) Personal computer (B) Super computer
of a computer is: (C) Laptop (D) Notebook
(A) Storage (B) Output 18. What kind of device is a printer?
(C) Input (D) Information (A) Input (B) Output
7. In computer whatever is typed, submitted, or (C) Word processor (D) Processing
transmitted to a computer system is ______. 19. A scanner scans ______.
(A) input (B) output (A) Text
(C) data (D) circuitry (B) Picture
8. Who is the father of computer science? (C) Both picture and text
(A) Allen Turing (B) Charles Babbage (D) Neither picture nor text
(C) Tim-Berners Lee (D) Henry Edward 20. Universal product code has been adopted for
Roberts whom?
9. To access properties of an object, the mouse (A) Earthquake resistant building
technique to use is ______. (B) Barcode
(A) Shift-Click (B) Right-Click (C) Fire protection in building
(C) Dragging (D) Dropping (D) Prevention of adulteration of food
10. What type of keys are ‘Ctrl’ and ‘Shift’? 21. DPI indicates ______.
(A) Function (B) Modifier (A) units of the digits (B) inches in diagram
(C) Adjustment (D) Alphanumeric (C) dot per inches (D) inches in the dot
11. All the characters that a device can use is called 22. Which printer is commonly used in desktop
______. printing?
(A) skill set (A) Laser pointer (B)Daisywheel printer
(B) keyboard characters (C) Dot matrix printer (D) None of these
(C) character alphabet 23. UNIVAC is ______.
(D) character set (A) Universal Array Computer
12. A series of instruction that tells a computer what (B) Universal Automatic Computer
to do and how to do it is called a ______. (C) Unique Automatic Computer
Solution
1.(B) 14.(B)
2.(B) 15.(A)
3.(B) 16.(A)
4.(D) 17.(B)
5.(A) 18.(B)
6.(C) 19.(C)
7.(A) 20.(B)
8.(A) 21.(C)
9.(B) 22.(A)
10.(B) 23.(B)
11.(B) 24.(C)
12.(B) 25.(D)
13.(D)
Mock Test - 11
1. Which of the following is an example of an 10. A readymade format which is used commonly in
optical disk? all pages of website is ______.
(A) Digital versatile disks (B) Magnetic disks (A) Template (B) Theme
(C) Memory disks (D) Data bus disks (C) Data (D) Program
2. Which of the following are the examples of 11. Where is data saved permanently?
output device? (A) Memory (B) Storage
(A) Monitor and Printer (C) CPU (D) Printer
(B) Floppy disk and CD 12. In MICR, C stands for ______.
(C) Keyboard and Mouse (A) Code (B) Colour
(D) Windows 2000 and Windows NT (C) Computer (D) Character
3. Which of the following IC was used in third 13. An encrypted format, in which product
generation of computers? information stored is used on packing of mostly
(A) SSI (B) MSI products?
(C) LSI (D) Both (A) and (B) (A) Bar code (B) QR code
4. Which of the following storage devices can store (C) Binary code (D) All of the above
maximum amount of data? 14. Which is an auto functioning MALWARE?
(A) Magnets optic disk (B) Hard disk (A) Virus (B) Trojan horse
(C) Floppy disk (D) Compact disk (C) Worm (D) All of the Above
5. A modern electronic computer is a machine that 15. Database is a ______.
is meant for ______. (A) collection of rows
(A) Performing repetitive task accurately (B) collection of columns
(B) Electronic data processing (C) collection of table
(C) Doing quick mathematical calculations (D) collection of data
(D) Input, Storage, Manipulation and Outputting 16. Unique data column of a table is known as ____.
data (A) primary key (B) secondary key
6. Which of the following products the best quality (C) public key (D) foreign key
graphics reproduction? 17. Railway track is an example of which kind of
(A) Laser printer (B) Platter printer transmission?
(C) Ink jet printer (D) Dot matrix printer (A) Simplex (B) Half-duplex
7. Software in computer ______. (C) Full-duplex (D) None of these
(A) Enhance the capabilities of the hardware 18. Set of instruction is known as ______.
machine (A) data (B) program
(B) Increase the speed of CPU (C) data base (D) None of these
(C) Both (A) and (B) 19. What is the extension of android executable file?
(D) None of these (A) .apk (B) .asp
8. The arranging of data in a logical sequence is (C) .exe (D) .dll
called ______. 20. “WWW. Facebook.Com” is an example of
(A) Sorting (B) Reproducing ______.
(C) Summarizing (D) Classifying (A) website (B) source code
9. Which of the following is the first-generation (C) domain (D) URL
computer? 21. Which of the following device has a limitation
(A) CDC – 1004 (B) ICL – 2900 that we can only read it but cannot erase or
(C) IBM – 1401 (D) UNIVAC modify it?
(A) Tape drive (B) Hard disk (C) Application software (D) All of the above
(C) Compact disk (D) Floppy disk 24. Which one is an example of ISP?
22. Ctrl, Shift and Alt are called ______ keys. (A) Yahoo (B) Twitter
(A) Modifier (B) Function (C) Whatsapp (D) Airtel
(C) Alphanumeric (D) Adjustment 25. Share it, Paytm, Whatsapp etc. applications are
23. A kind of software which is used to direct help to based on which kind of data sharing system?
user ______. (A) QR Code (B) Bar Code
(A) Firmware (B) System software (C) MICR (D) Response Code
Solution
1.(A) 14.(D)
2.(A) 15.(C)
3.(D) 16.(A)
4.(B) 17.(B)
5.(D) 18.(B)
6.(B) 19.(A)
7.(A) 20.(D)
8.(A) 21.(C)
9.(D) 22.(A)
10.(A) 23.(C)
11.(B) 24.(D)
12.(D) 25.(A)
13.(A)
Mock Test - 12
1. What is the storage capacity of the DVD? 12. Which of the following is not a logical gate?
(A) 750 MB (B) 4.7 GB (A) AND (B) OR
(C) 520 MB (D) 1.2 GB (C) NAT (D) None of these
2. Which one is an example of Impact Printer? 13. Which of the following is 3rd layer of OSI model?
(A) Ink Jet Printer (B) Laser Printer (A) Physical Layer (B) Application Layer
(C) Dot Matrix Printer (D) Plotter Printer (C) Network Layer (D) Session Layer
3. The basic design of computer was developed by 14. Which of the following is not a type of bus?
______. (A) Software Bus (B) Data Bus
(A) John Von Neumann (B) Charles Babbage (C) Control Bus (D) Address Bus
(C) Blaire Pascal (D) Gordon Moore 15. Analytical Engine was made by ______.
4. Which of the following are valid minimum and (A) Charles Babbage
maximum zoom, sizes in MS-Office? (B) John Von Neumann
(A) 10% - 100% (B) 10% - 1000% (C) John McCarthy
(C) 20% - 250% (D) 10% – 500% (D) Alan Border
5. What program is used in MS-Word to check the 16. What type of program controls the various
spelling? computer parts and allows the user to internet
(A) Spell check (B) Spell pro with the computer?
(C) Outlook express (D) All of the above (A) Utility software
6. To run a CD in a computer, we need ______. (B) Operating system
(A) FD drive (B) CD drive (C) Word processing software
(C) Zip drive (D) Pen drive (D) Database software
7. Which is considered a direct entry input device? 17. A printer is which kind of device?
(A) Optical Scanner (A) Input (B) Word Processing
(B) Mouse and digitizer (C) Processing (D) Output
(C) Light Pen 18. In Excel, each sheet in a workbook is displayer
(D) All of the above as ______.
8. Ctrl + Page up will take you to ______. (A) Marker
(A) last cell in the column (B) Down printing arrow
(B) first cell in the column (C) Tab
(C) previous sheet (D) None of these
(D) None of these 19. Which of the following is a connecting device for
9. 192.161.121.100 is an example of which class? Network?
(A) Class A (B) Class B (A) Switch (B) Hub
(C) Class C (D) Class D (C) Router (D) All of the Above
10. Which command is used to close datasheet view 20. In a computer ______ is capable to store single
of the table? binary bit.
(A) Alt + F4 (B) Ctrl + O (A) Flip-Flop (B) Register
(C) Ctrl + W (D) Ctrl + Z (C) Capacitor (D) Conductor
11. Which of the following are the cheapest memory 21. A process known as ______ is used by large
devices in term of cost/bit? retailers to study trends.
(A) Magnetic Disk (A) POS (B) Data mining
(B) Magnetic Tape (C) Data conversion (D) Data selection
(C) Semi-Conductor Memories 22. Computer process data into information by
(D) Compact Disk working exclusively with ______.
Mock Test - 13
(C) Instant messaging (A) Switch off mode (B) Hibernate mode
(D) All of the above (C) Access mode (D) Destroy mode
21. Which of the following is the largest unit of 24. Which of the following appropriately relates with
storage? starting up an operating system?
(A) GB (B) KB (A) Starting (B) Booting
(C) TB (D) MB (C) Formatting (D) None of these
22. Which part of a computer displays the work 25. Networking such as LAN, MAN started from
done? which generation of computer?
(A) RAM (B) Printer (A) First Generation
(C) Monitor (D) ROM (B) Second Generation
23. If you want your computer to start at the stage in (C) Third Generation
which it was turned off, you have to put it in (D) Fourth Generation
______.
Solution
1.(A) 14.(B)
2.(A) 15.(D)
3.(D) 16.(A)
4.(B) 17.(C)
5.(C) 18.(B)
6.(B) 19.(A)
7.(B) 20.(D)
8.(B) 21.(C)
9.(D) 22.(C)
10.(D) 23.(B)
11.(B) 24.(B)
12.(D) 25.(D)
13.(C)
Mock Test - 14
1. Which among the following device performs 11. The designers of the Internet Protocol defined on
modulation and demodulation? IP address as a ______ number.
(A) Fiber optics (B) Satellite (A) 31 bit (B) 32 bit
(C) Switch (D) Modem (C) 34 bit (D) 62 bit
2. A barcode is a/an ______ code that represents 12. When the information is reverted back into a
data with bars of varying widths or heights. useful form it is called ______.
(A) magnetic (B) laser (A) Standard encryption
(C) optical (D) printed (B) Plain text encryption
3. Which among the following carries signals that (C) Both (A) and (B)
control the actions of the computer? (D) Decryption
(A) Control Bus (B) Address Bus 13. The term ‘Artificial Intelligence’ was first coined
(C) Data Bus (D) NIC in ____.
4. A file which has not been altered, compressed or (A) 1955 (B) 1972
manipulated in any way by the computer is called (C) 1956 (D) 1982
______. 14. Which among the following is used to access the
(A) temp file (B) permanent file network?
(C) raw file (D) directory file (A) Session layer (B) Application layer
5. What is the another name for Android 10.0 (C) Presentation layer (D) Transport layer
developed by Google? 15. In OSI Model, OSI stands for ______.
(A) Pie (B) Android (A) Occur System Interconnection
(C) Nought (D) Jelly bean (B) Operational System Interconnection
6. Computers use the system to process data (C) Open Systems Interconnection
______. (D) None of these
(A) Processing (B) Kilobyte 16. The physical components of a computer system
(C) Binary (D) Representational is ______.
7. Which of following groups are only output (A) software (B) hardware
devices? (C) ALU (D) control unit
(A) Scanner, Printer, Monitor 17. Which of the following is an example of storage
(B) Keyboard, Printer, Monitor devices?
(C) Mouse, Printer, Monitor (A) Magnetic disks (B) Tapes
(D) Plotter, Printer, Monitor (C) DVDs (D) All of these
8. The second-generation computer was based on 18. BIOS stands for ______.
_____. (A) Basic Input Output Software
(A) Vaccum chips (B) Silicon chips (B) Basic Input Output System
(C) Transistor (D) Bio chips (C) Basic Input Output Standard
9. Which of the following is not an internet (D) Basic Input Output Systematic
browser? 19. Who among the following is the father of ‘C’
(A) Netscape Navigator (B) Drupal language?
(C) Chrome (D) Opera (A) Ericsson (B) Dennis Ritchie
10. TCP stands for ______. (C) A.S. Douglas (D) James Gosling
(A) Tools Control Protocol 20. A computer does not suffer from tiredness and
(B) Interior Control Protocol lack of concentration. It is known as ______.
(C) Transmission Control Protocol (A) GIGO (B) Versatility
(D) Transfer Control Protocol (C) Diligence (D) Reliability
21. Which language is used for Artificial Intelligence (D) Program Counter
(AI)? 24. Computers programs are written in a high-level
(A) FORTRAN (B) COBOL programming language, however, the human
(C) C (D) PROLOG readable version of a program is called ______.
22. Fourth Generation computers were based on (A) Cache (B) Word size +
______. (C) Source code (D) Instruction set
(A) Microprocessors (B) Transistor 25. Which of the following is not a function of the
(C) Vacuum Tube (D) IC control unit?
23. Which registers can interact with secondary (A) Direct operations
memory? (B) Execute instruction
(A) Instruction Register (IR) (C) Read instructions
(B) Memory Address Register (MAR) (D) Interpret instructions
(C) General Purpose Registers
Solution
1.(D) 14.(B)
2.(C) 15.(C)
3.(A) 16.(B)
4.(C) 17.(D)
5.(B) 18.(B)
6.(C) 19.(B)
7.(D) 20.(C)
8.(C) 21.(D)
9.(B) 22.(A)
10.(C) 23.(B)
11.(B) 24.(C)
12.(D) 25.(A)
13.(A)
Mock Test - 15
(A) Universal Serial Band (D) Conducts a power-on self test, or POST
(B) Unique Serial Bus 23. A mistake is an algorithm that causes incorrect
(C) Universal Serial Bus results is called a ______.
(D) None of these (A) logical error (B) procedural error
21. Hardware devices that are NOT a part ‘Of the (C) syntax error (D) compiler error
main computer system and are ‘Often added later 24. Computer programs are written in a high-level
to the system are ______. programming language, however the human
(A) clip art (B) highlight readable version of a program is called ______.
(C) execute (D) peripherals (A) cache (B) instruction code
22. A UPS ______. (C) source code (D) word size
(A) Limits damage caused by fluctuating levels 25. Which key is used to open the start menu?
of electricity (A) F5 (B) Esc
(B) Provides battery backup for a limited time (C) Ctrl + Esc (D) Ctrl + Shift + Z
(C) Delivers electronic messages via a bus
Solution
1.(B) 14.(D)
2.(D) 15.(C)
3.(C) 16.(C)
4.(D) 17.(B)
5.(A) 18.(C)
6.(B) 19.(C)
7.(C) 20.(C)
8.(C) 21.(D)
9.(B) 22.(B)
10.(B) 23.(C)
11.(C) 24.(C)
12.(C) 25.(C)
13.(A)
sibanand99.pattnaik@gmail.com