Computer Knowledge
Computer Knowledge
1. The term ___________ refers to data storage systems that 12. One who designs, writes, tests and maintains computer
make it possible for a computer or electronic device to programmes is called a
store and retrieve data. (1)User (2) Programmer
(1) Retrieval technology (2) Input technology (3)Designer (4) Operator
(3) Output technology (4) Storage technology (5) None of these
(5) None of these 13. Items such as names and addresses are considered
2. The term ____________ refers to any computer component (1) information (2) input
that is required to perform work. (3) records (4) data
(1) bootstrap (2) kernel (5)None of these
(3) resource (4) source code 14. Sending an E-mail is similar to
(5) None of these (1) writing a letter (2) drawing a picture
3. A computer system (3) talking on the phone (4) sending a package
(1) hardware (2) software (5) None of these
(3) peripheral devices (4) All of these 15. Which of the following can only have sequential access?
(5) None of these (1) Disk (2) Tape
4. A is a software program used to view Web pages. (3) CD-ROM (4) DVD-ROM
(1) site (2) host (5) None of these
(3) link (4) browser 16. Secondary storage
(5) None of these (1) does not require constant power
5. ______________ is the maximum amount of data that can be (2) does not use magnetic media
stored on a storage medium. (3) consists of four main types of devices
(1) Magnetic storage (2) Optical storage (4) does not store information for later retrieval
(3) Solid-state storage (4) Storage capacity (5) None of these
(5) None of these 17. Where is a modem connected to?
6. The _________ is responsible for performing calculations (1) processor (2) motherboard
and contains decision-making mechanisms. (3) printer (4) phone line
(1) Central Processing Unit (5) None of these
(2) Memory Unit 18. Which is the smallest of the following computers?
(3) Arithmetic and Logic Unit (1) Notebook (2) Laptop
(4) Output Unit (3) Desktop (4) Workstation
(5) None of these (5) None of these
7. A ___________ is a large and expensive computer capable 19. Computers connected to a LAN can
of simultaneously processing data for hundreds or (1) run faster (2) go on line
thousands of users. (3) share information and/or share peripheral equipment
(1) handheld computer (2) mainframe computer (4) E-mail (5) None of these
(3) personal computer (4) tablet computer
(5) None of these 20. This component is required to process data into
8. Which of the following is not true about computer files? information and consists of integrated circuits
(1) They are collections of data saved to a storage (1) Hard disk (2) RAM
medium (3) CPU (4) ROM
(2) Every file has a filename (5) None of these
(3) A file extension is established by the user to 21. Which of the following groups consist of only input
indicate the file’s content devices?
(4) All files contain data (1) Mouse. Keyboard. Monitor
(5) None of these (2) Mouse. Keyboard. Printer
9. __________ allows voice conversations to travel over the (3) Mouse. Keyboard. Plotter
Internet. (4) Mouse. Keyboard. Scanner
(1) Internet telephony (2) Instant messaging (5) None of these
(3) E-mail (4) E-commerce 22. A menu contains a list of
(5) None of these (1) commands (2) data
10. You use a (n) __________, such as a keyboard or mouse, to (3) objects (4) reports
input information. (5) None of these
(1) storage device (2) processing device 23. What is output?
(3) input device (4) output device (1) What the processor takes from the user
(5) None of these (2) What the user gives to the processor
11. Which of the following is not true concerning user IDs (3) What the processor gets from the user
and passwords? (4) What the processor gives to the user
(1) When you enter your user ID and password the (5) None of these
computer knows it is you 24. An error is also known as
(2) If your computer asks for a user ID and password, (1) bug (2) debug (3) cursor
you can create your own (4) icon (5) None of these
(3) Sometimes you are assigned a user ID and password, 25. Computer _____________ is whatever is typed, submitted,
for security reasons or transmitted to a computer system
(4) You should share your user ID and password (1) input (2) output
with at least one other person (3) data (4) circuitry
(5) None of these (5) None of these
Computer Knowledge
26. Which process checks to ensure the components of the 40. In addition to the basic typing keys, desktop and
computer are operating and connected properly? notebook computer keyboards include a(n) ____________
(1) Booting (2) Processing keypad to efficiently move the screen-based insertion
(3) Saving (4) Editing point.
(5) None of these (1) editing (2) number
27. Unsolicited commercial email is commonly known as (3) locked (4) docked
(1) spam (2) junk (5) None of these
(3) hoaxes (4) hypertext 41. The operation of combining two cells into a single cell in
(5) None of these Excel is referred to as
28. _____________is processed by the computer into (1) Join Cells (2) Merge Cells
information (3) Merge Table (4) Join Table
(1) numbers (2) processor (5) None of these
(3) input (4) data 42. Which of the following can be used to store a large
(5) None of these number of files in a small amount of storage space?
29. A web site address is a unique name that identifies a (1) file adjustment (2) file copying
specific ____________ on the web. (3) file reading (4) file compatibility
(1) web browser (2) web site (5) file compression
(3) PDA (4) link 43. In a computer most processing takes place in_________.
(5) None of these (1) Memory (2) RAM
30. A device that connect to a network without the use of (3) Motherboard (4) CPU
cables is said to be (5) None of these
(1) distributed (2) centralised 44. Data is organized in work sheet as_____________
(3) open source (4) wireless (1) charts and diagrams (2) rows and columns
(5) None of these (3) tables and boxes (4) graphs
31. Editing a documents consists of reading through the (5) None of these
document you’ve created, then 45. Which of the following is an example of a binary
(1) correcting your errors (2) printing it number?
(3) saving it (4) deleting it (1) 6AH1 (2) 100101
(5) None of these (3) 005 (4) ABCD
32. The Internet allows you to (5) 23456
(1) send electronic mail 46. Spell Check will, find errors in which of the following?
(2) view web pages (1) Today is a rainy day
(3)connect to servers all around the world (2) Today is a rainy a day
(4) All of these (3) is a rainy
(5) None of these (4) Rainy today a day
33. Most mail programs automatically complete the (5) None of these
following two parts in an e-mail 47. Which of the following is not a storage medium?
(1) From : and Body : (2) From : and Date : (1) hard disk (2) flash drive
(3) From : and To : (4) From : and Subject : (3) DVD (4) CD
(5) None of these (5) keyboard
34. Where is the disk put in a computer? 48. In Excel, when the contents and attributes of a cell or
(1) in the modem (2) in the hard drive range of cells have to be erased using the menu, the user
(3) into the CPU (4) in the disk drive must___________
(5) None of these (1) Select the cells, choose Edit and select Clear, then
35. The name a user assigns to a document is called a(n) All
(1) filename (2) program (3) record (2) Select the cells, and click delete on the keyboard
(4) data (5) None of these (3) Select the cells, choose Tools, and select Clear, then
36. An e-mail address typically consists of a user ID Formats
followed by the __________ sign and the name of the e-mail (4) Select the cells, choose Tools, and select Formula
server that manages the user’s electronic post office Audit, then Delete
box. (5) None of these
(1) @ (2) # (3) & 49. The computer-abbreviation KB usually means__________
(4) * (5) None of these (1) Key Block (2) Kernel Boot (3) Kilo Byte
37. A personal computer is designed to meet the computing (4) Kit Bit (5) None of these
needs of a(n) 50. If an Excel Worksheet is to be linked for use in a Power
(1) individual (2) department Point presentation, the following should be
(3) company (4) city clicked_____________
(5) None of these (1) Edit, Paste Special (2) Edit, Paste
38. Ctrl, shift and alt are called ____________ keys. (3) Edit, Copy (4) File, Copy
(1) adjustment (2) function (3) modifier (5) None of these
(4) alphanumeric (5) None of these 51. RAM stands for___________
39. File ____________ shrinks the size of a file so it requires (1) Random Access Memory
less storage space. (2) Ready Application Module
(1) scanning (2) synthesizing (3) Read Access Memory
(3) defragmenting (4) compression (4) Remote Access Machine
(5) None of these (5) None of these
Computer Knowledge
52. Which of the following is hardware and not software? 65. Which of the following is not true about a compiler?
(1) Excel (2) Printer driver (1) ranslates instruction of a high level language into
(3) Operating System (4) Power Point machine language
(5) Control Unit (2) Translates entire source program into machine
53. In Word, which menu would the user select to print a language program
document? (3) It is involved in program’s execution
(1) Tools (2) File (4) Is a translating program
(3) View (4) Window (5) Is useful to run programs
(5) None of these 66. Keyboards, scanners, and microphones are examples of
54. Which of the following is not true about computer files? (1) software programs (2) input devices
(1) They are collections of data saved to a storage (3) output devices (4) utilities
medium (5) None of these
(2) Every file has a filename 67. In Excel, the contents of the active cell are displayed in
(3) A file extension is established by the user to the____________
indicate the date it was created (1) footer bar (2) tool bar
(4) Usually files contain data (3) task bar (4) menu bar
(5) None of these (5) formula bar
55. The common name for a modulator-demodulator 68. When machine instructions are being executed by a
is______________ computer, the instruction phase followed by the
(1) modem (2) joiner execution phase is referred to as_______________
(3) networker (4) connector (1) program cycle (2) machine instruction
(5) demod (3) execution cycle (4) task cycle
56. What do you see when you click the right mouse button? (5) machine cycle
(1) The same effect as the left click 69. In Windows ME. What does ME stand for?
(2) A special menu (1) Millennium (2) Micro-Expert
(3) No effect (3) Macro-Expert (4) Multi-Expert
(4) A mouse cannot be right clicked (5) My-Expert
(5) Computer goes to sleep mode 70. Which of the following refers to the fastest, biggest and
57. In order to choose the font for a sentence in a WORD most, expensive computers?
document_____________ (1) Notebooks (2) Personal Computers
(1) select Font in the Format menu (3) Laptops (4) Supercomputers
(2) select Font in the Edit menu (5) PDAs
(3) select Font in the Tool menu 71. Which is not a basic function of a computer?
(4) select Font in the Insert menu (1) Accept and process data (2) Accept input
(5) None of these (3) Process data (4) Store data
58. The ALU performs (5) Scan text
(1) logarithm-based (2) ASCII 72. Which of the following is not a term pertaining to Email?
(3) algorithm-based (4) arithmetic (1) power point (2) inbox
(5) None of these (3) sender (4) receiver
59. Excel is a program that is used to prepare a ___________ (5) None of these
(1) Database (2) Text Document 73. Peripheral devices such as printers and monitors are
(3) Spreadsheet (4) Slide Presentation considered to be_____________
(5) None of these (1) data (2) software (3) hardware
60. ______________ consists of volatile chips that temporarily (4) information (5) None of these
store data or instructions. 74. Which of the following is required to create an HTML
(1) CPU (2) ROM document?
(3) RMA (4) RAM (1) browser (2) internet (3) text editor
(5) None of these (4) search engine (5) None of these
61. How many kilobytes make a megabyte? 75. Which language is directly understood by the computer
(1) 128 (2) 1024 without translation program?
(3) 256 (4) 512 (1) BASIC language (2) Assembly language
(5) 64 (3) High level language (4) C language
62. In order to delete a sentence from a document you (5) Machine language
would use___________ 76. To insert a page break in a WORD document, the
(1) highlight and copy (2) cut and paste following options are used____________
(3) copy and paste (4) highlight and delete (1) Insert and Copy (2) Insert and Enter
(5) select and paste (3) Insert and Delete (4) Insert and Page Layout
63. Editing a document that has been created (5) Insert and Break
means____________ 77. Which of the following identifies a cell in Excel?
(1) saving it (2) printing it (1) formula (2) name (3) label
(3) scanning it (4) correcting it (4) address (5) None of these
(5) None of these 78. This is the part of the computer system that one cannot
64. In a computer, how many bits does a nibble signify? touch
(1) 4 (2) 8 (1) Hardware (2) Printer (3) Mouse
(3) 16 (4) 32 (4) Scanner (5) Software
(5) 64
Computer Knowledge
79. A computer’s ROM is ____________ (2) Every file has a filename
(1) ALU (2) computer software (3) A file extension is established by the user to
(3) operating system (4) computer hardware indicate the computer on which it was created
(5) CPU (4) All files contain data
80. While selecting multiple work sheets in Excel, the (5) None of these
following key must also be used when clicking the sheet 92. Which of the following is not an example of hardware?
tab______________ (1) WORD (2) Printer
(1) Shift (2) Alt (3) Monitor (4) Mouse
(3) Ctrl (4) Insert (5) Scanner
(5) Esc 93. Which of the following is a secondary memory device?
81. Which of the following is part of the System Unit? (1) Keyboard (2) Disk
(1) Monitor (2) CPU (3) ALU (4) Mouse
(3) CD-ROM (4) Floppy Disk (5) Printer
(5) Printer 94. The result of a formula in a cell is called
82. Restarting a computer that is already on is referred to as (1) label (2) value
_______________ (3) range (4) displayed value
(1) lagging off (2) Cold hooting (5) None of these
(3) Shut down (4) Warm booting 95. Which of the following is not a storage medium?
(5) Shutting off (1) Hard disk (2) Flash drive
83. A word processor would be used best to______________ (3) DVD (4) CD
(1) paint a picture (5) Monitor
(2) draw a diagram 96. Choose the odd one out.
(3) type a story (1) Micro Computer (2) Mini Computer
(4) work out income and expenses (3) Super Computer (4) Notebook Computer
(5) None of these (5) Digital Computer
84. The file that is linked with an e-mail and sent to the 97. The ALU performs _____________ operations.
receiver of the e-mail is referred to as ______________ (1) logic (2) ASCII
(1) annexure (2) appendage (3) algorithm-based (4) logarithm-based
(3) add-on (4) attachment (5) final
(5) article 98. ______________ is the part of the computer that does the
85. Which of the following refers to the process of a arithmetical calculations.
computer receiving information from a server on the (1) OS (2) ALU
Internet? (3) CPU (4) Memory
(1) gathering (2) uploading (5) Printer
(3) inputting (4) outputting 99. In a sequence of events that takes place in an instruction
(5) downloading cycle, the first cycle is called
86. A ____________ is an example of an input device. (1) store cycle (2) execute cycle
(1) printer (2) monitor (3) fetch cycle (4) decode cycle
(3) scanner (4) central processing unit (5) code cycle
(5) None of these 100. Peripheral devices such as printers and plotters are
87. A hard copy of a document is _______________ considered to be
(1) printed on the printer (1) hardware (2) software
(2) stored on a floppy (3) data (4) information
(3) stored on a CD (5) None of these
(4) stored in the hard disk 101. Which of the following Excel charts represents only one
(5) scanned value for each variable?
88. The term “host” with respect to the internet, (1) Function (2) Line (3) pie
means____________ (4) Bar (5) None of these
(1) A computer that is a standalone computer 102. To see the document before the printout is taken, use
(2) A computer that is connected to the Internet (1) Insert Table (2) Paste
(3) A computer reserved for use by the host (3) Format Painter (4) Cut
(4) A large collection of computers (5) Print Preview
(5) Hyperlink 103. ALU works on the instructions and data held in the
89. The translator program used in assembly language is (1) Notebook (2) Registers
called______________ (3) Copy pad (4) I/O devices
(1) Compiler (2) Assembler (5) None of these
(3) Interpreter (4) Translator 104. To move data from one part of the document to another,
(5) Operating System which of the following is used?
90. A set of instructions telling the computer what to do is (1) Cut and Paste (2) Copy and Paste
called____________. (3) Cut and Delete (4) Copy and Undo
(1) mentor (2) instructor (5) Cut and Insert
(3) compiler (4) program 105. Which of the following is the another name for a pre-
(5) None of these programmed formula in Excel?
91. Which of the following is not true about computer files? (1) Range (2) Graph
(1) They are a collections of data saved to a storage (3) Function (4) Cell
medium. (5) None of these
Computer Knowledge
106. To save a document for the first time, ____________ option 117. ROM is an example of which of the following?
is used. (1) Volatile memory (2) Cache memory
(1) Save as (2) Save first (3) Non volatile memory (4) Virtual memory
(3) Save on (4) Copy (5) None of these
(5) Paste 118. Which of the following options is used to display
107. What is a device that can change images into codes for information such as a title, page number of the
the computer? document?
(1) Mouse (2) Printer (1) Insert Table (2) Autocorrect
(3) Joystick (4) Keyboard (3) Thesaurus (4) Spelling and Grammar
(5) Scanner (5) Header and Footer
108. Which of the following are the two basic types of 119. Which part of the computer can display the user’s work?
graphics used in Word 2000? (1) Mouse (2) Keyboard
(1) Auto shapes and ClipArt (3) Disk Drive (4) Monitor
(2) Header and Footer (5) None of these
(3) Drawing Objects and Pictures 120. When a computer prints a report, this output is called
(4) Spelling and Grammar (1) Program (2) Soft copy
(5) Word Count (3) Hard copy (4) Execution
109. The user can use ______________ commands to search for (5) None of these
and correct words in a document. 121. The processor is a ___________ chip plugged onto the
(1) Print and Print Preview motherboard in a computer system.
(2) Header and Footer (1) LSI (2) VLSI
(3) Find and Replace (3) ULSI (4) XLSI
(4) Spelling and Grammar (5) WLSI
(5) Copy and Paste 122. A register that keeps track of the next instruction to be
110. What is the advantage of using basic HTML to create a executed is called a/an
document? (1) Data Register (2) Instruction Register
(1) HTML is very easy to use (3) Action Register (4) Program Counter
(2) The document can be displayed by all word (5) Accumulator
processors 123. The microprocessor of a computer
(3) The document can be displayed by all programs (1) does not understand machine language.
(4) The document can be displayed by all browsers (2) understands machine language and high-level
(5) None of these languages.
111. Which of the following functions is not performed by the (3) understands only machine language.
CPU? (4) understands only high level language.
(1) Graphical display of Data (5) understands only assembly language.
(2) Arithmetic calculations 124. A set of choices on the screen is called a(n)
(3) Managing memory (1) menu (2) reverse video
(4) Managing input and output (3) action plan (4) editor
(5) None of these (5) template
112. Which of the following is the feature that keeps track of 125. What is the full form of PROM?
the right margin? (1) Programmable Read Only Memory
(1) Find and replace (2) Word-wrap (2) Progressive Read Only Memory
(3) Right justified (4) Left justified (3) Periodic Read Only Memory
(5) Ragged right (4) Perfect Read Only Memory
113. Keyboard shortcuts are used to move the (5) Program Read Only Memory
(1) I-beam (2) insertion point 126. Which of the following will be used if the sender of an e-
(3) scroll bar (4) mouse mail wants to bold, italicise etc the text message?
(5) None of these (1) Rich signature (2) Rich text
114. To specify margins in Word, the user has to select Page (3) Rich format (4) Plain format
Setup option from the _______________ menu. (5) Plain Text
(1) Edit (2) Table 127. Which of the following terms is not related to Internet?
(3) Autocorrect (4) File (1) Link (2) Function key
(5) Format (3) Browser (4) Search engine
115. What is the package called which helps create, (5) Hyperlink
manipulate and analyse data arranged in rows and 128. Which of the following justifications align the text on
columns? both the sides-left and right-of the margin?
(1) Application package (1) Right (2) Justify
(2) Word processing package (3) Both Sides (4) Balanced
(3) Outlining package (5) None of these
(4) Outline processors 129. What is the full form of LSI?
(5) Spreadsheet package (1) Low Scale Internet
116. What does an electronic spreadsheet consist of? (2) Large Scale Internet
(1) Rows (2) Columns (3) Low Scale integration
(3) Cells (4) All of these (4) Large Scale integration
(5) None of these (5) Local Scale integration
Computer Knowledge
130. To move the text from its original position to another 143. A workbook is a collection of
position without deleting it is called (1) Page Setup (2) Buttons
(1) Scrolling (2) Searching (3) Diagrams (4) Charts
(3) Moving (4) Copying (5) Worksheets
(5) Halting 144. ______________ appear at the bottom of the Excel Window.
131. Which of the following is an active cell in Excel? (1) Sheet tabs (2) Name Box
(1) Current Cell (2) Formula (3) Formula bar (4) Title bar
(3) Range (4) Cell address (5) None of these
(5) None of these 145. EPROM stands for
132. What is included in e-mail address? (1) Erasable Programmable Read-Only Memory
(1) Domain name followed by user’s name (2) Electronic Programmable Read-Only Memory
(2) User’s name followed by Domain name (3)Enterprise Programmable Read-Only Memory
(3) User’s name followed by postal address (4) Extended Programmable Read-Only Memory
(4) User’s name followed by street address (5) Electrical Programmable Read-Only Memory
(5) None of these 146. The technology that stores only the essential
133. What is called the secret code which prohibits entry into instructions on a microprocessor chip and thus
some programmes? enhances its speed is referred to as
(1) Access code (2) Passport (1) CISC (2) RISC
(3) Entry code (4) Password (3) CD-ROM (4) Wi-Fi
(5) Keyword (5) MISC
134. Which of the following type of menu shows further sub- 147. Which is not a basic function of a computer?
choices? (1) Store data (2) Accept input
(1) Reverse (2) Template (3) Process data (4) Copy text
(3) Scrolled (4) wrapped (5) Accept and process data
(5) Pull-Down 148. ASCII is a coding system that provides
135. Which of the following operations is safe if an e-mail (1) 256 different characters
from an unknown sender is received? (2) 512 different characters
(1) Open it to know about the sender and answer it. (3) 1024 different characters
(2) Delete it after opening it. (4) 128 different characters
(3) Delete it without opening it. (5) 1000 different characters
(4) Open it and try to find who the sender is. 149. Which part of the computer is directly invoked in
(5) None of these executing the instructions of the computer program?
136. The other name of a motherboard is (1) The scanner
(1) Mouse (2) Computer Board (2) The main storage
(3) System Device (4) Central Board (3) The secondary storage
(5) System Board (4) The printer
137. By which of the following operations can any part of a (5) The processor
document be seen on the screen? 150. In order to create column data in Word, you need to
(1) Searching (2) Pasting (1) tab consecutively until your cursor reaches the
(3) Scrolling (4) Editing desired place
(5) Copying (2) set tabs or use the Table menu
138. Which of the following characteristics is used to (3) use Excel
compute the results from Excel data? (4) press the space bar until your cursor reaches the
(1) Go to (2) Table desired place
(3) Chart (4) Diagram (5) None of these
(5) Formula and Function 151. Files are organised by storing them in
139. Which type of storage is a hard disc? (1) tables (2) databases
(1) Non-Permanent (2) Volatile (3) folders (4) graphs
(3) Temporary (4) Non-Volatile (5) diagrams
(5) None of these 152. When a computer is switched on, the booting process
140. Which of the following is not a software? performs
(1) Excel (2) Printer-Driver (1) Integrity Test
(3) Operating System (4) PowerPoint (2) Power-On Self-Test
(5) Mouse (3) Correct Functioning Test
141. When you enter text in a cell in Excel, it also appears in (4) Reliability Test
which of the following? (5) Shut-down
(1) Status bar (2) Formula bar 153. In Word, the feature that automatically detects common
(3) Row heading (4) Name box errors is called
(5) None of these (1) Autocorrect (2) Autograph
142. Which elements of a Word document can be displayed (3) Spelling and Grammar (4) Go to
in colour? (5) Thesaurus
(1) Only graphics 154. A computer system that is old and perhaps not
(2) Only text satisfactory is referred to as a(n)
(3) Only the first word of each line (1) Ancient system (2) Historical system
(4) All elements, but only if you have a colour printer (3) Age old system (4) Legacy system
(5) All elements (5) Legal system
Computer Knowledge
155. Which of the following is not a binary number? 167. Where is the disk placed in a computer?
(1) 001 (2) 101 (1) In the modem (2) In the hard drive
(3) 202 (4) 110 (3) Into the CPU (4) In the disk drive
(5) 011 (5) In the scanner
156. Which of the following does not store data 168. The name that the user gives to a document is referred
permanently? to as
(1) ROM (2) RAM (1) document name (2) filename
(3) Floppy Disk (4) Hard Disk (3) name given (4) document identity
(5) None of these (5) file id
157. Which of the following is the smallest storage? 169. Which Excel feature enables pre-defined layouts to
(1) Megabyte (2) Gigabyte selected tables in the worksheet?
(3) Kilobyte (4) Terabyte (1) Auto format (2) Header and Footers
(5) Nanobyte (3) Undo and Redo (4) Spelling and Grammar
158. Which menu enables the user to choose toolbars? (5) Autograph
(1) View (2) Format 170. Which of the following is a hardware and not a
(3) Insert (4) Edit software?
(5) Help (1) PowerPoint (2) Printer driver
159. By viewing the properties of the local hard disk of a (3) Operating System (4) ALU
computer, the user can find out (5) Excel
(1) the amount of space that has been used up and 171. What is the default file extension for all Word
the remaining free space on the disk. documents?
(2) the name of the user viewing the properties of the (1) TXT (2) WRD
disk. (3) FIL (4) DOC
(3) nothing useful to the user. (5) None of these
(4) the number of programs available in the computer. 172. Which of the following is true for the octal system?
(5) None of these (1) It needs less digits to represent a number than in the
160. Pre-defined and built-in formulas in Excel are known as binary system.
(1) Auto sheets (2) Diagrams (2) It needs more digits to represent a number than
(3) Charts (4) Tables in the binary system.
(5) Functions (3) It needs the same number of digits to represent a
161. Which of the following contains permanent data and number as in the binary system.
gets updated during the processing of transactions? (4) It needs the same number of digits to represent a
(1) Operating System File (2) Transaction File number as in the decimal system.
(3) Software File (4) Master File (5) None of these
(5) Any File 173. When you scroll through a document, the ____________
162. The keyboard shortcut to centralise the selected text in does not move.
Word is (1) I-beam (2) scroll bar
(1) Ctrl+Esc (2) Ctrl+C (3) Alti+C (3) page (4) insertion point
(4) There is no keyboard shortcut for this operation (5) None of these
(5) Ctrl+E 174. Which of the following is not a term pertaining to the
163. Which of the following helps to protect floppy disks Internet?
from data getting accidentally erased? (1) Link (2) Hyperlink
(1) Access notch (2) Write-protect notch (3) Browser (4) Search Engine
(3) Entry notch (4) Input notch (5) Mouse
(5) None of these 175. A set of formats that has a name and can be quickly
164. A modem is connected to applied to selected text is called a(n)
(1) a telephone line (2) a keyboard (1) font (2) style (3) feature
(3) a printer (4) a monitor (4) finish (5) None of these
(5) a scanner 176. You can show an entire page or multiple pages at the
165. Large transaction processing systems in automated same time using ___________options.
organisations use (1) Word (2) Draft (3) Zoom
(1) Online processing (4) Show/Hide (5) Hide page
(2) Batch processing 177. The basic goal of a computer process is to convert data
(3) Once-a-day Processing into
(4) End-of-day processing (1) graphs (2) tables
(5) Once-a-week processing (3) files (4) information
166. Which of the following is done to force a page break in (5) diagrams
Word? 178. When browsing the World Wide Web. the browser is a
(1) Position the cursor at the appropriate place and (1) feeder (2) server program
press F1 (3) application program (4) system program
(2) Use the Insert/Section Break. (5) client program
(3) Position the cursor at the appropriate place and 179. Where is the newly received e-mail stored?
press Ctrl+Enter. (1) In your website (2) In Address-box
(4) Change the font size and colour of the document. (3) In Inbox (4) In your personal laptop
(5) None of these (5) None of these
Computer Knowledge
180. ______________ implies a combination of audio, video, text, 192. Compatibility with regard to computers; refers to
animation and graphics. (1) the software doing the right job for the user
(1) Special media (2) Multiplexer (2) it being versatile enough to handle the job
(3) Multiplier (4) Message-media (3) the software being able to run on the computer
(5) Multimedia (4) software running with only other previously
181. CD stands for installed software
(1) Computer Disk (2) Contact Disk (5) software permanently available in the computer
(3) Circular Disk (4) Cold Disk 193. A ______________ uses pressure as a user presses it with a
(5) Compact Disk stylus to send signals.
182. In Excel, a ______________ is identified by the cell in the (1) touch pad (2) Track Point
upper-left comer and the cell in the lower-right comer, (3) graphics tablet (4) track pad
separated by a colon. (5) keyboard
(1) worksheet (2) value 194. The justification that aligns text on both margins of a
(3) cell reference (4) range document in Word is
(5) None of these (1) Justify (2) Bold
183. Which of the following is a secondary device? (3) Center (4) Right
(1) Keyboard (2) CD (5) Balanced
(3) ALU (4) Mouse 195. A partially completed workbook that contains formulas
(5) Printer and formatting, but no data is called a
184. A document in portrait prints (1) prototype (2) template
(1) the same characters per line with the same (3) model (4) function
document in landscape. (5) None of these
(2) more characters per line than the same document in 196. A byte can represent any number between 0 and
landscape (1) 2 (2) 255 (3) 256
(3) less characters per line than the same document (4) 1024 (5) 1025
in landscape. 197. Connectivity for a new computer means
(4) smaller fonts in order to fit the same amount of (1) allowing a printer to be connected to it
characters per line with landscape. (2) having a modem and or network connection to
(5) None of these communicate with other computers
185. When the mouse is moved, it causes a picture to move (3) connecting the software to the hardware of the
on the screen which is referred to as in a system
(1) menu (2) icon (4) connecting a mouse a keyboard and a printer all
(3) pointer (4) tab essential hardware pieces for the average user
(5) None of these (5) software permanently available in the computer
186. Press the _______________ key to move the insertion point 198. A ____________ is used to read handwritten or printed text
to the first cell in a row in Excel to make a digital image that is stored in memory.
(1) Page Up (2) Page Down (1) printer (2) laser beam
(3) Home (4) Tab (3) scanner (4) touchpad
(5) None of these (5) keyboard
187. Small programs that act on data received by the user’s 199. The shortcut key Ctrl+F in Word is used for
computer as part of a Web page are called (1) To view document in full view
(1) search engines (2) servelets (2) To open the Formula dialog box
(3) browsers (4) applets (3) To save the file
(5) feedback (4) To open the Find and Replace dialog box
188. How many margins are there on a page? (5) None of these
(1) Two (header and footer) 200. Each cell in a Microsoft Office Excel document is
(2) Four (top, bottom, right, left) referred to by its cell address, which is the
(3) Two (landscape and portrait) (1) cell’s column label
(4) Two (top and bottom) (2) cell’s column label and worksheet tab name
(5) None of these (3) cell’s row label
189. CD and DVD drives are the examples of (4) cell’s row and column labels
(1) coding media (2) solid stage storage (5) cell’s contents
(3) Zip drives (4) printers 201. The most widely used code that represents each
(5) storage devices character as a unique 8-bit code is
190. The language used in a computer that is similar to the (1) ASCII (2) Unicode
language of humans and is easy to understand is (3) Binary numbering system
referred to as (4) EBCDIC (5) ACSII
(1) Source Code (2) Machine Language 202. Which of the following are components of Central
(3) High Level Language (4) Object code Processing Unit (CPU)?
(5) Assembly Language (1) Arithmetic logic unit, Mouse
191. The smallest unit of information a computer can (2) Arithmetic logic unit, Control unit
understand and process is known as a (3) Arithmetic logic unit, Integrated Circuits
(1) digit (2) byte (4) Control Unit, Monitor
(3) megabyte (4) kilobyte (5) None of these
(5) bit
Computer Knowledge
203. Where is RAM located? 214. What is the use of Digitizer as an input device?
(1) Expansion Board (2) External Drive (1) To convert graphic and pictorial data into binary
(3) Mother Board (4) All of above inputs
(5) None of these (2) To convert graphic and pictorial data into anolog
204. If a computer has more than one processor then it is inputs
known as ? (3) Debugging
(1) Uniprocess (2) Multiprocessor (4) All of above
(3) Multithreaded (4) Multiprogramming (5) None of these
(5) None of these 215. What do we call the automatic execution of high-priority
205. In which of the following form, data is stored in computer programs that have been designed to pre-
computer? empt the use of computer resources?
(1) Decimal (2) Binary (1) Foreground processing
(3) Hexa Decimal (4) Octal (2) Background processing
(5) None of these (3) Black processing
206. Technology used to provide internet by transmitting (4) White processing
data over wires of telephone network is? (5) None of these
(1) Transmitter (2) Diodes 216. What would be the number of bytes, transferred at the
(3) HHL (4) DSL rate of 1 kilobit per second?
(5) None of these (1) 100 (2) 108
207. While browsing internet, what do we call the area of (3) 125 (4) 140
storage that compensates for the different speeds of (5) None of these
data flow or timings of events by temporarily holding a 217. Which among the following is the time period during
block of data that is waiting to be processed? which a computer is malfunctioning or not operating
(1) Cache (2) Buffer correctly due to machine failures?
(3) Flash (4) Trash (1) Downtime (2) Uptime
(5) None of these (3) Response time (4) Runtime Hide
208. Which among the following has been standardized in (5) None of these
the IEEE 802.3 specification? 218. The terms Good put, Throughput and Maximum
(1) Bluetooth (2) Ethernet throughput are most closely associated with which
(3) WiMAX (4) All of them among the following in computers?
(5) None of these (1) Bit Rate (2) Response Time
209. Dynamic Adhoc Wireless Networks (DAWN) usually (3) Command Line Interface
come under___________? (4) Random memory (5) None of these
(1) 2G (2) 3G 219. The Clearing House Interbank Payments System or
(3) 4G (4) 5G CHIPS is a clearing system for large value transactions
(5) None of these in which among the following countries / regions?
210. What do we call a CPU that is designed specifically to (1) United States (2) United Kingdom
handle the communications processing task with main (3) Entire Europe (4) Australia
purpose is to off-load communications processing task (5) None of these
from the host computer so that the host computer can 220. What is ISO 9362 is related to in context with Banking
be dedicated for applications and data processing jobs? Technology?
(1) Backend processor (2) Front-end processor (1) RTGS Transfers (2)NEFT Transfers
(3) Node processor (4) File Server (3) SWIFT Transfers (4) All of them
(5) None of these (5) None of these
211. The peak cell rate (PCR), sustainable cell rate (SCR), and 221. What is Office Open XML?
maximum burst size (MBS) are used for measurement (1) A file format (2) A software
of? (3) A electronic device
(1) Bandwidth (2) Channel Capacity (4) An international standard
(3) Frequency Modulation (4) Amplitude distortion (5) None of these
(5) None of these 222. Which of the following company owns/ uses the virtual
212. What do we call the pictorial representation that uses Hard Disk (.vhd) format for Virtual PC?
predefined symbols to describe either the logic of a (1) IBM (2) Microsoft (3) Intel
computer program or the data flow and processing (4) Google (5) None of these
steps of a system? 223. Which of the following device is a volatile storage?
(1) Algorithm (2) Flowchart (1) RAM (2) Hard Disc
(3) Block diagram (4) Loop (3) Magnetic Tape (4) Floppy Disc
(5) None of these (5) None of these
213. What do we call a storage device where the access time 224. What is the purpose of keeping electronic devices such
is effectively independent of the location of the data? as computers, televisions, and remote controlled
(1) Direct Access Storage Device devices on Sleep mode?
(2) Secondary Storage Device (1) Reduce Power consumption
(3) Primary Storage Device (2) Back Up
(4) Gateway Device (3) To write contents of RAM to hard disc
(5) None of these (4) To improve download speed
(5) None of these
Computer Knowledge
225. Most of the internet sites now a days use CSS primarily 236. NetBIOS was introduced in 1983 by which company as
to enable the separation of document content (written an improvement to the standard BIOS used by
in HTML or a similar mark-up language) from document Windows-based computers?
presentation, including elements such as the layout, (1) Dell (2) IBM
colours, and fonts. What is full form? (3) Compaq (4) All of them
(1) Cascading Style Software (5) None of these
(2) Clear Style Sheet 237. The word bandwidth is also used to mean ______________?
(3) Cascading Style Sheet (1) width of the data cable
(4) Common Style Sheet (2) amount of data transferred
(5) None of these (3) number of the computers on a particular network
226. Which of the following is a suitable term for any (4) All of above
programmable content of a hardware device (5) None of these
configurations and data for application-specific 238. A file which has not been altered, compressed, or
integrated circuits (ASICs), programmable logic devices, manipulated in any way by the computer is called?
etc.? (1) temp file (2) raw file
(1) Hardware (2) Software (3) permanent file (4) All of them
(3) Firmware (4) Malware (5) None of these
(5) None of these 239. Which keys enable the input of numbers quickly?
227. While browsing the internet, which of the following key (1) ctrl, shift and alt (2) function keys
is used for full screen view? (3) the numeric keypad (4) arrow keys
(1) F3 (2) F5 (5) None of these
(3) F11 (4) F9 240. In word, when you indent a paragraph, you
(5) None of these (1) push the text in with respect to the margin
228. While working on Microsoft Word, which among the (2) change the margins on the page
following is the command for “Undo”? (3) move the text up by one line
(1) Cntrl+A (2) Cntrl+Z (4) move the text down by one line
(3) Cntrl+Y (4) Cntrl+C (5) None of these
(5) None of these 241. ASCII stands for
229. ADSL data communications technology uses which of (1) American Special Computer for Information
the following for faster data transmission? Interaction
(1) Voice band modem (2) American Standard Computer for Information
(2) Wireless modem Interchange
(3) Copper telephone lines (3) American Special Code for Information Interchange
(4) Sockets (4) American Special Computer for Information
(5) None of these Interchange
230. A generic name for Intel processors released after the (5) American Standard Code for Information
original 8086 processor is ____________? Interchange
(1) Pentium (2) x86 242. To restart the computer the following combination of
(3) Pentium 286 (4) All of above keys is used
(5) None of these (1) Del+Ctrl (2) Backspace+Ctrl
231. What is used in most programs that is a part of a (3) Esc+Ctrl (4) Insert+Esc
program and guides the user through certain steps? (5) Ctrl+Alt+Del
(1) Software (2) Wizard 243. Which part of the computer helps to store information?
(3) Wiki (4) All of them (1) Monitor (2) Keyboard (3) Disk drive
(5) None of these (4) Printer (5) Plotter
232. A unit of data storage that equals 2 to the 70th power is 244. Which key is used to delete one character to the left of
called? the current position of the cursor?
(1) Zebibyte (2) Yottabite (1) Backspace (2) Delete (3) Insert
(3) Yobibite (4) All of them (4) Esc (5) Ctrl
(5) None of these 245. In a web site, the ‘home’ page refers to-
233. Which of the following was used in first generation (1) the best page (2) the last page
computers? (3) the first page (4) the most recent page
(1) Machine Language (2) High Language (5) the oldest page
(3) Assembly Language (4) All of them 246. Linux is a type of _____________ software.
(5) None of these (1) Shareware (2) Commercial
234. Alerts are mostly appear in _______________? (3) Proprietary (4) Open Source
(1) Check Box (2) Combo Box (5) Hidden type
(3) Dialog Box (4) All of them 247. Which of the following is the fastest type of computer?
(5) None of these (1) Laptop (2) Notebook
235. The performance of a hard drive or other storage (3) Personal computer (4) Workstation
device, meaning how long it takes to locate a file is (5) Supercomputer
called? 248. Excel would evaluate the formula, =20* 10/4 *8 and
(1) Response Time (2) Access Time return the answer
(3) Quick Time (4) All of them (1) 400 (2) 40 (3) 6.25
(5) None of these (4) 232 (5) 600
Computer Knowledge
249. Which of the following is used by the browser to 261. The main system board of a computer is called the
connect to the location of the Internet resources? (1) integrated circuit (2) motherboard
(1) Linkers (2) Protocol (3) processor (4) microchip
(3) Cable (4) URL (5) None of these
(5) None of these 262. Information that comes from an external source and fed
250. Which of the following is not a term pertaining to the into computer software is called
Internet? (1) Output (2) Input
(1) Keyboard (2) Link (3) Throughput (4) Reports
(3) Browser (4) Search Engine (5) None of these
(5) Hyperlink 263. When a chart is placed on this, it is much larger and
251. An educational institution would generally have the there is no other data on it
following in its domain name (1) Chart sheet (2) Exclusive sheet
(1) .org (2) .edu (3) Primary sheet (4) Reference sheet
(3) .inst (4) .com (5) None of these
(5) .sch 264. Which of the following can input graphical images and
252. How many megabytes make a gigabyte? pictures for a computer?
(1) 1024 (2) 128 (3) 256 (1) Plotter (2) Scanner
(4) 512 (5) 64 (3) Mouse (4) Printer
253. In word, you can use Style to (5) Keyboard
(1) Make copies of documents 265. Using Print Preview is useful when you want to-
(2) Save changes to documents (1) Colour the document
(3) Delete text in documents (2) Save the document
(4) Format your documents (3) Delete the document
(5) None of these (4) Copy the document
254. POST stands for (5) View how trip document will appear when
(1) Power on Self Test printed
(2) Program on Self Test 266. Why is the Caps Lock key referred to as a toggle key?
(3) Power on System Test (1) Because its function goes back and forth every
(4) Program on System Test time it is pressed
(5) Power Off System Test (2) Because it cannot be used for entering numbers
255. In the formula, =B1/B2+B3, which of the following is the (3) Because it cannot be used to delete
correct precedence? (4) Because it cannot be used to insert
(1) Addition higher precedence than division (5) None of these
(2) Equal precedence among the two operators: 267. Using output devices one can
proceed right to left (1) input data (2) store data
(3) Equal precedence among the two operators proceed (3) scan data (4) view or print data
left to right (5) None of these
(4) Division higher precedence than addition 268. Which of the following categories would include a
(5) None of these keyboard?
256. _______________is the process of carrying out commands. (1) Printing Device (2) Output Device
(1) Fetching (2) Storing (3) Pointing Device (4) Storage Device
(3) Decoding (4) Executing (5) Input Device
(5) None of these 269. The time for the actual data transfer after receiving the
257. To make a copy of the current document to disk request for data from secondary storage is referred to as
(1) Use the “save” command the disk’s
(2) This cannot be done (1) transfer time (2) movement time
(3) Use the “duplicate” command (3) access time (4) data input time
(4) Copy the document (5) None of these
(5) Use the “save as” command 270. Your position in the text is shown by a
258. The operating system, that is self –contained in a device (1) Blinker (2) Cursor (3) Causer
and resident in the ROM is (4) Pointer (5) None of these
(1) Batch Operating System 271. To reverse the effect of your last action in word
(2) Real-time Operating System (1) Use the cut command
(3) Embedded Operating System (2) Use the Undo command
(4) Multi-Processor Operating System (3) Press the delete key
(5) None of these (4) Use the Redo command
259. If you change Windows 98 to Windows XP, you are (5) None of these
actually performing 272. A word gets selected by clicking it to select a word, in
(1) upstart (2) upgrade Word
(3) update (4) patch (1) once (2) twice
(5) None of these (3) three times (4) four times
260. This dialog box specifies or modifies the worksheet cell (5) None of these
range containing data to be charted 273. What type of keys are ‘ctrl’ and ‘shift’?
(1) Chart Location (2) Chart Style (1) adjustment (2) function
(3) Chart Options (4) Chart Source Data (3) modifier (4) alphanumeric
(5) None of these (5) None of these
Computer Knowledge
274. In word, you can change Page Margins by 287. Assembly language is
(1) Dragging the scroll box on the scroll bars (1) Machine Language
(2) Deleting the margin boundaries on the Ruler (2) High-level programming language
(3) Dragging the margin boundaries on the Ruler (3) A low-level programming language
(4) Clicking the right mouse button on the Ruler (4) Language for assembling computers
(5) None of these (5) None of these
275. In word, replace option is available on 288. ______________key is the example of Toggle key
(1) File Menu (2) View Menu (1) Alt (2) Shift
(3) Edit Menu (4) Format Menu (3) Control (4) Escape
(5) None of these (5) Caps lock
276. What happens when we try to delete the files on the 289. ______________is a feature for scheduling and
floppy? multiprogramming to provide an economical interactive
(1) The files get moved to the Recycle bin system of two or more users
(2) Files on a floppy cannot be deleted (1) Time sharing (2) Multitasking
(3) The files get deleted and can be restored again from (3) Time tracing (4) Multiprocessing
Recycle Bin (5) None of these
(4) The files get deleted and cannot be restored 290. ROLLBACK in a database is ______________ statement
again (1) TCL (2) DCL (3) DML
(5) The file gets copied on the Hard disk (4) DDL (5) SDL
277. The following computer’s memory is characterised by 291. Video controller
low cost per bit stored (1) Controls the resolution of images on screen
(1) Primary (2) Secondary (2) Controls the signals to be sent and received from
(3) Hard Disk (4) All of these processor for display
(5) None of these (3) Handles the entire electronic work behind the
278. In Excel, this is a pre-recorded formula that provides a formation of images on the screen
shortcut for complex calculations (4) Is responsible for allocating pixels for formation of
(1) Value (2) Data Series images
(3) Function (4) Field (5) Is responsible for the refresh rate of the
(5) None of these screen/monitor
279. This is not a function category in Excel 292. The disks stores information in
(1) Logical (2) Data Series (1) Tables (2) Rows and columns
(3) Financial (4) Text (3) Blocks (4) Tracks and sectors
(5) None of these (5) All of these
280. To be able to “boot”, the computer must have a(n) 293. Which file (s) can be executed without mentioning its
(1) Compiler (2) Loader extension name
(3) Operating System (4) Assembler (1) .exe (2) .bat (3) .com
(5) None of these (4) .app (5) All of these
281. On a CD-RW you can 294. A programming language having a _____________ is slow in
(1) read and write information execution
(2) only read information (1) Interpreter (2) Compiler
(3) only write information (3) Assembler (4) Linker
(4) read, write and rewrite information (5) None of these
(5) None of these 295. The word processor used by DOS to write the programs
282. Which of the following is hardware and not software? or instructions
(1) Excel (2) Printer driver (1) WordStar (2) WordPad
(3) Operating System (4) Power Point (3) Notepad (4) MS-Word
(5) CPU (5) EDIT
283. Which contents are lost when the computer turn off? 296. _________________provides total solutions to reduce data
(1) storage (2) input redundancy, inconsistency, dependence and
(3) output (4) memory unauthorized access of data
(5) None of these (1) DBMS (2) Tables (3) Database
284. Which of the following is not an example of hardware? (4) Protection passwords (5) Centralization of data
(1) Scanner (2) Printer 297. Codec refers to
(3) Monitor (4) Mouse (1) Coder-decoder (2) Co-declaration
(5) Interpreter (3) Command declaration (4) Command decoding
285. The binary system is a number system to the base (5) None of these
(1) 2 (2) 4 298. Origin of internet can be tracked from
(3) 8 (4) 10 (1) ARPA net (2) Radio networks
(5) 16 (3) Satellite networks (4) Indian army networks
286. Which of the following is not one of the syntax rules? (5) Air Force networks
(1) The order in which you list the function’s arguments 299. To connect networks of similar protocols _____________are
(2) The precedence of the arguments used
(3) Whether or not the function has arguments (1) Routers (2) Bridges
(4) Properly spelling the function’s name (3) Gateways (4) Dial-up routers
(5) None of these (5) None of these
Computer Knowledge
300. Decimal equivalent of (1111)2 312. To change the name of an Excel worksheet
(1) 11 (2) 10 (3) 1 (1) Click on the worksheet tab by holing CTRL key and
(4) 15 (5) 13 type a new name
301. _______________ is one reason for problems of data (2) Choose Save, AS option from file menu
integrity (3) Add a (?) at the end of filename while saving the
(1) Data availability constraints workbook
(2) Data inconsistency (4) Press CTRL+SHIFT keys and new name
(3) Security constraints (5) Double click at the worksheet tab and type a new
(4) Unauthorized access of data name
(5) Data redundancy 313. A computer used at supermarkets, departmental stores
302. Dr. E. F. Codd represented ____________ rules that a and restaurant etc is called ___________ terminal
database must obey if it has to be considered truly (1) P-O-S (2) Dumb
relational (3) Intelligent (4) Smart
(1) 10 (2) 8 (3) 12 (5) calculating
(4) 6 (5) 5 314. _______________ acts as temporary high-speed holding area
303. “>” symbol in DOS commands is use to between the memory and the CPU thereby improving
(1) Compare two values (2) Redirect input processing capabilities
(3) Redirect output (4) Filter Data (1) ROM (2) RAM
(5) None of these (3) Temporary memory (4) Cache memory
304. System proposal is prepared in _____________ phase of (5) Flash memory
SDLC 315. A document that explains how to use a software
(1) Conception (2) Initiation program is called ______________ manual
(3) Analysis (4) Design (1) User (2) System
(5) Construction (3) Software (4) Program
305. A data warehouse (5) Technical
(1) Contains numerous naming conventions and 316. The process that deals with the technical and
formats management issues of software development is _________.
(2) Is organized around important subject areas (1) Delivery process (2) Control process
(3) Contains only current data (3) Software process (4) Testing process
(4) Can be updated by end users (5) Monitoring process
(5) Explains some observed event or condition 317. A collection of conceptual tools for describing data,
306. Which of these is considered intelligent CASE tool relationships, semantics and constraints is referred to
(1) Toolkit as
(2) Methodology companion (1) ER model (2) Data base
(3) Workbench (3) Data model (4) DBMS
(4) Upper CASE (5) None of these
(5) Lower CASE 318. You can protect sensitive data from prying eyes using
307. Super computer developed by Indian scientists ____________.
(1) Param (2) Super301 (1) Encryption (2) Passwords
(3) Compaq Presario (4) Cray YMP (3) File locks (4) File permissions
(5) Blue Gene (5) None of these
308. The errors that can be find out by a compiler are 319. Android is _______________
(1) Logical errors (2) Internal errors (1) Operating system (2) Application
(3) Semantic errors (4) Syntax errors (3) Interface (4) Software
(5) Execution errors (5) A collection of all these
309. ______________ is used to add or put into your document 320. ______________ search engine sends request for
such as a picture or text. information to several search engines simultaneously
(1) TV (2) Squeeze in and compiles the results
(3) Push in (4) Insert (1) Meta (2) Individual
(5) None of these (3) Directory (4) Subject directory
310. Office Assistant is (5) None of these
(1) An application that allows you to take notes and 321. _______________ search method is conducted for a specific
save them in file title, domain, URL, or host
(2) A button on the standard toolbar that executes the (1) Keyword (2) Field
Save command (3) Boolean (4) Miscellaneous
(3) A collection of Autocorrect options in Word (5) Logical
(4) An animated character that offers help and 322. To access a website or web content from a web server,
suggestions the client sends a(n)_____________.
(5) None of these (1) Information (2) Message
311. Pressing CTRL+9 in Excel (3) Request (4) Response
(1) Prints 9 (5) Interrupt
(2) Prints 323. An http request contains _______________ parts
(3) Prints 9 followed by spaces (1) 2 (2) 5 (3) 3
(4) Inserts 9 cells at the current location (4) 4 (5) 1
(5) Hides the current row
Computer Knowledge
324. Through ________________ an administrator or another 336. To protect yourself from computer hacker intrusions
user can access someone else’s computer remotely you should install a _____________
(1) Administrator (2) Web server (1) Firewall (2) Mailer (3) Macro
(3) Web application (4) HTTP (4) Script (5) None of these
(5) Telnet 337. What type of computers are client computers (most of
325. Telnet is a ______________ based computer protocol the time) in a client-server system?
(1) Sound (2) Text (3) Image (1) Mainframe (2) Mini-computer
(4) Animation (5) Digits (3) Microcomputer (4) PDA
326. To allow someone else schedule your meetings and (5) None of these
appointments , ______________ feature of Outlook is used 338. What happens when you boot up a PC?
(1) Monthly calendar (2) Event manager (1) Portions of the operation system are copied from
(3) Appointments (4) Delegate Access disk into memory
(5) None of these (2) Portions of the operating system are copied from
327. P2P is a _________________ application architecture memory onto disk
(1) Client/server (2) Distributed (3) Portions of the operating system are compiled
(3) Centralized (4) 1- tier (5) None of these (4) Portions of the operating system are emulated
328. What is backup? (5) The PC gets switched off
(1) Adding more components to your network 339. Linux is an example of ____________
(2) Protecting data by copying it from the original (1) Freeware (2) Open source software
source to a different destination (3) Shareware (4) Complimentary
(3) Filtering old data from the new data (5) None of these
(4) Accessing data on tape 340. Which one of the following software applications would
(5) Using earlier data be the most appropriate for performing numerical and
329. The legal right to use software based on specific statistical calculations?
restrictions is granted via a ______________ (1) Database (2) Document processor
(1) software privacy policy (3) Graphics package (4) Spreadsheet
(2) software license (5) Power Point
(3) software password manager 341. A _____________ is used to read handwritten or printed text
(4) software log to make a digital image that is stored in memory.
(5) None of these (1) Printer (2) Laser beam
330. What is an E-mail attachment? (3) Scanner (4) Touchpad
(1) A receipt sent by the recipient (5) None of these
(2) A separate document from another program 342. You organize files by storing them in_____________
sent along with an E-mail message (1) Archives (2) Lists
(3) A malicious parasite that feeds off of your messages (3) Indexes (4) Folders
and destroys the contents (5) None of these
(4) A list of CC: or BCC: recipients 343. A ______________ pre-designed document that already has
(5) A friend to whom E-mail is sent regularly coordinating fonts, a layout, and a background.
331. The type of software that controls the internal (1) Guide (2) Model
operations in the computer, and controls how the (3) Ruler (4) Template
computer works with all its parts is which of the (5) Design-plate
following? 344. What is the default file extension for all Word
(1) Shareware documents?
(2) Public domain software (1) WRD (2) TXT
(3) Application software (3) DOC (4) FIL
(4) Operating system software (5) WD
(5) None of these 345. Removing and replacing devices without turning off
332. When data changes in multiple lists and all lists are not your computer is referred to as ______________
updated, this causes______________ (1) Hot swapping (2) Plug-N-Play
(1) Data redundancy (2) Information overload (3) Bay swap (4) USB swapping
(3) Duplicate data (4) Data consistency (5) None of these
(5) Data inconsistency 346. Specialized programs that assist users in locating
333. What is the main folder on a storage device called? information on the web are called_______________
(1) Root directory (2) Interface (1) Information engines (2) Locator engines
(3) Device driver (4) Platform (3) Web browsers (4) Resource locators
(5) Main directory (5) Search engines
334. To view information on the web you must have a ________ 347. Compiling creates a(n) ________________
(1) Cable modem (1) Error-free program (2) Program specification
(2) Web browser (3) Subroutine (4) Algorithm
(3) Domain Name Server (5) Executable program
(4) Hypertext viewer 348. Expansion cards are inserted into _______________
(5) None of these (1) Slots (2) Peripheral devices
335. A file is often referred to as a(n)_______________ (3) The CPU
(1) Wizard (2) Document (3) Pane (4) The back of the computer
(4) Device (5) Documentation (5) None of these
Computer Knowledge
349. A device that connects to a network without the use of 360. In page preview mode
cables is said to be ______________ (1) You can see all the pages of your document
(1) Distributed (2) Non-Wired (2) You can see only that page on which your are
(3) Centralized (4) Open source currently working
(5) Wireless (3) You can see only that page which have no graphics
350. A complete electronic circuit with transistors and other (4) You can see only title page of your document
electronic components on a small silicon chip is called (5) You can see only the last page of your document
a(n)_______________ 361. When you will start, your computer Boot routine will
(1) Workstation (2) CPU perform
(3) Magnetic disk (4) Integrated circuit (1) RAM Test (2) Disk drive test
(5) Complex circuit (3) Memory Test (4) Power-on-self Test
351. Junk e-mail is also called________________ (5) Whether power supply is on or off
(1) Crap (2) Spoof 362. Machine language uses
(3) Sniffer script (4) Spool (1) Numeric code (2) English Language code
(5) Spam (3) Java Language (4) CPU Processing code
352. A program designed to destroy data on your computer (5) None of these
which can travel to ‘infect’ other computers is called 363. What is the keyboard short-cut for new slide?
a_____________ (1) Ctrl+M (2) Ctrl+N
(1) Disease (2) Torpedo (3) Ctrl+Shift+N (4) Ctrl+S
(3) Hurricane (4) Virus (5) None of these
(5) Infector 364. Vertical space between lines of text in document is
353. ______________shows the files, folders, and drives on your called
computer, making it easy to navigate from one location (1) Double space (2) Line gap
to another within the file hierarchy. (3) Single space (4) Vertical spacing
(1) Microsoft Internet Explorer (5) Line spacing
(2) Windows Explorer 365. Full form of CD-RW is
(3) My Computer (1) Compact Drum, Read, Write
(4) Folders Manager (2) Compact Diskette, Read, Write
(5) Windows Locator (3) Compact Disc, Read-only then Write
354. The____________ manual tells you how to use a software (4) Compact Diskette with Random Write Capability
program. (5) Compact Disc-Rewritable
(1) Documentation (2) Programming 366. Password makes users capable
(3) User (4) Technical (1) To enter into system quickly
(5) Designer (2) To use time efficiently
355. A collection of interrelated records is called a____________ (3) To retain the secrecy of files
(1) Utility file (4) To make file structure simple
(2) Management information system (5) To feel special
(3) Database 367. Files deleted from hard disc are sent to
(4) Spreadsheet (1) Dustbin (2) Floppy Disc
(5) Datasheet (3) Clip board (4) Mother board
356. File extension is used (5) Recycle bin
(1) For naming the file 368. Devices that enter information and let you communicate
(2) To ascertain that file name is not lost with the computer are called____________.
(3) To identify file (1) Software (2) Output devices
(4) To identify file type (3) Hardware (4) Input devices
(5) To make items complex (5) Input / Output devices
357. What is Gutter margin? 369. In electronic device, operating under the control of
(1) Margin added to left margin while printing information, that can accept data, process the data,
(2) Margin added to right margin while printing produce output and store the results for future
(3) Margin added to binding side of the page while use_______________
printing (1) Input (2) Computer
(4) Margin added to outside of page while printing (3) Software (4) Hardware
(5) None of these (5) None of these
358. ALU of CPU has 370. What is the function of the Central Processing Unit of a
(1) RAM space Computer?
(2) Register (1) Creates invoices
(3) Byte space (2) Performs calculations and processing
(4) Secondary storage space (3) Deletes Data
(5) None of these (4) Corrupts the data
359. What happens when operating system is located in (5) None of these
RAM? 371. All the characters that a device can use is called it’s?
(1) Copying (2) Device driving (1) Skill Set (2) Character Alphabet
(3) Booting (4) Multitasking (3) Character Codes (4) Keyboard Characters
(5) None of these (5) Character Set
Computer Knowledge
372. If your computer keeps rebooting itself, then it is likely 384. By firmware we understand _____________
that _____________. (1) physical equipment used in a computer system
(1) It has a virus (2) a set of instructions that causes a computer to
(2) It does not have enough memory perform one or more tasks.
(3) There is no printer (3) the people involved in the computing process.
(4) There has been a power surge (4) a set of programs that is pre-installed into the
(5) It needs a CD-ROM read only memory of a computer during the time of
373. What does RAM stand for? manufacturing
(1) Read Access Memory (5) None of these
(2) Read Anywhere Memory 385. Supercomputers________________
(3) Random Anything Memory (1) are smaller in size and processing capability than
(4) Random Access Module mainframe computers
(5) Random Access Memory (2) are common in majority of households
374. What type of device is a 3½ inch floppy drive? (3) contain thousands of microprocessors
(1) Input (2) Output (4) are rarely used by researchers due to their lack of
(3) Software (4) storage computing capacity
(5) None of these (5) are of the same size as laptops
375. What utility to you use to transfer files and exchange 386. The cost of a given amount of computing power has
messages? _____________ dramatically with the progress of computer
(1) Web browsers (2) WWW technology.
(3) Email (4) Hypertext (1) stayed the same
(5) search engines (2) changed proportionally with the economy
376. Which unit controls the movement of signals between (3) increased
CPU and I/O? (4) fluctuated
(1) ALU (2) Control Unit (5) decreased
(3) Memory Unit (4) Secondary Storage 387. The basic computer processing cycle consists of _________
(5) None of these (1) input, processing and output
377. The three main parts of the processor are_____________ (2) systems and application
(1) ALU, Control Unit and Registers (3) data, information and application
(2) ALU, Control Unit and RAM (4) hardware, software and storage
(3) Cache, Control Unit and Registers (5) None of these
(4) Control Unit, Registers and RAM 388. Kilobyte equals to how many bytes?
(5) RAM, ROM and CD-ROM (1) 1000 (2) 1035
378. Which of the following memory chip is faster? (3) 100 (4) 1008
(1) There is no certainty (5) 1024
(2) DRAM 389. The central processing unit is an example of :
(3) SRAM (1) peripheral (2) an output unit
(4) DRAM is faster for larger chips (3) software (4) a program
(5) None of these (5) hardware
379. Which of the following does not relate to Input Unit? 390. CD-ROM stands for:
(1) If accepts data from the outside world. (1) Compactable Read Only Memory
(2) It converts data into binary code that is (2) Compact Data Read Only Memory
understandable by the computer. (3) Compactable Disk Read Only Memory
(3) It converts binary data into the human readable (4) Compact Disk Read Only Memory
form that is understandable to the users. (5) Connected Disk Read Only Memory
(4) It sends data in binary form to the computer for 391. Which of the following terms refers to the ability of a
further processing computer to automatically configure a new hardware
(5) None of these component that is added to it?
380. Which of the following terms is just the connection of (1) Formatting (2) Multiprocessing
networks that can be joined together? (3) Multiprogramming (4) Multitasking
(1) virtual private network (2) LAN (5) Plug and Play
(3) intranet (4) extranet (5) internet 392. Free hard-disk space used to extend the capacity of RAM
381. Tangible, physical computer equipment that can be seen is termed:
and touched is called____________ (1) Cache (2) Flash memory
(1) hardware (2) software (3) ROM (4) Virtual memory
(3) storage (4) input/output (5) Volatile
(5) None of these 393. Making illegal copies of copyrighted software is called:
382. Which of the following is the second largest (1) collaboration (2) software piracy
measurement of RAM? (3) electronic distribution (4) browsing
(1) Terabyte (2) Megabyte (3) Byte (5) software legacy
(4) Gigabyte (5) Mega Hertz 394. What is loading the operating system into a personal
383. What resides on the motherboard and connects the CPU computer called?
to other components on the motherboard? (1) Booting (2) Prompting
(1) Input Unit (2) System Bus (3) Paging (4) Interrupting
(3) ALU (4) Primary Memory (5) Readying
(5) None of these
Computer Knowledge
395. Which of the following is not an example of application 407. The computer monitor is which type of device?
software? (1) Input (2) Output
(1) Database software (3) Software (4) (1) and (2)
(2) Graphics software (5) None of these
(3) Operating system software 408. Which is not an item of hardware?
(4) Spreadsheet software (1) An MP3 file (2) A keyboard
(5) Word processing software (3) A mouse (4) (1) and (2)
396. Pie-charts are typically created by using which of the (5) None of these
following? 409. A directory within a directory is called _____________
(1) Browser software (1) mini directory (2) junior directory
(2) Database software (3) sub directory (4) part directory
(3) Desktop publishing software (5) None of these
(4) Word-processing software 410. When you cut or copy information it gets place in
(5) Spreadsheet software the_______________
397. The computer to which a user’s computer connects in (1) clipart (2) clipboard
order to access the internet is called a (3) motherboard (4) (1) and (2)
(1) notebook (2) PDA (5) None of these
(3) supercomputer (4) server 411. The name of the location of a particular piece of data is
(5) laptop its _____________
398. WAN stands for (1) address (2) memory name
(1) Wired Area Network (3) data location (4) storage site
(2) Wide Area Network (5) None of these
(3) Wide Array Net 412. Soft copy refers to____________
(4) Wireless Area Network (1) printed output (2) digitizing
(5) Wanted Area Network (3) music sounds (4) screen output
399. What are lists of programs waiting to be run called? (5) None of these
(1) Shells (2) The background 413. www stands for____________
(3) Queues (4) Page frames (1) World Work Web (2) Wide Work Web
(5) Lists (3) World Web (4) World Wide Web
400. An example of peripheral equipment is the: (5) None of these
(1) printer (2) CPU (3) spreadsheet 414. A field is a related group of
(4) microcomputer (5) ALU (1) cables (2) records (3) files
401. Which of the following commercial software products (4) characters (5) None of these
are examples of operating system software and 415. To find the paste special option, or use the clipboard
application software, respectively? group _____________on the tab of Power Point.
(1) Microsoft Windows XP and Microsoft Word (1) design (2) slide show (3) page layout
(2) Microsoft Office XP and Microsoft Window XP (4) insert (5) None of these
(3) MS DOS and Microsoft Windows XP 416. A(n) ______________ programme is one that is ready to run
(4) UNIX and LINUX and does not need to be altered in any way.
(5) UNIX and Java (1) interpreter (2) high level
402. Ms Excel is used for? (3) compiler (4) COBOL
(1) Letter writing (5) executable
(2) Spread sheet calculation 417. A programme, either talk numeric that is made available
(3) Presentation (4) Painting (5) None of these in digital format for automatic download over the
403. Computer users who are not computer professionals are internet is called _____________
sometimes called: (1) vodcast (2) blog (3) prodcast
(1) peripheral users (2) programmers (4) wiki (5) broadcast
(3) librarians (4) information officers 418. A USB communication device that supports data
(5) end-users encryption for secure wireless communication for
404. Desktop and personal computers are also known as: notebook users is called
(1) Supercomputers (2) servers (1) wireless switch
(3) mainframes (4) peripheral equipment (2) router
(5) microcomputers (3) wireless hub
405. The ability to exchange information through the use of (4) USB wireless is not work adaptor
computer equipment and software is: (5) None of the above
(1) Data entry 419. When entering text within a document, the Enter key is
(2) The Internet normally pressed at the end of every
(3) Data retrieval (1) line (2) sentence
(4) Electronic communication (3) paragraph (4) word
(5) None of these (5) file
406. A computer professional who writes and tests software 420. In power point, the header and footer button can be
is called a(n): found on the insert tab in what group?
(1) hardware consultant (2) librarian (1) Illustration group (2) Object group
(3) programmer (4) computer operator (3) Tables group (4) Text group
(5) data entry operator (5) None of these
Computer Knowledge
421. Which of these is a point and draw device? 433. Which computer memory is used for storing programs
(1) Mouse (2) Scanner and data currently being processed by the CPU?
(3) Printer (4) CD-ROM (1) Mass memory (2) Internal memory
(5) Keyboard (3) Non-volatile memory (4) PROM
422. Which of these is not a means of personal (5) None of these
communication on the Internet? 434. ______________ allows users to upload files to an online site
(1) Electronic mail (2) Chat so they can be viewed and edited from another location.
(3) Instant messaging (4) Insta Notes (1) General-purpose application
(5) None of these (2) Microsoft Outlook
423. Which part of the computer is used for calculating and (3) Web-hosted technology
comparing? (4) Office Live
(1) ALU (2) Control unit (5) None of these
(3) Disk unit (4) Modem 435. What feature adjusts the top and bottom margins so
(5) None of these that the text is cantered vertically on the printed page?
424. What refers to a set of characters of a particular design? (1) Vertical justifying (2) Vertical adjusting
(1) Keyboard (2) Calligraph (3) Dual cantering (4) Horizontal centring
(3) Stencil (4) Type base (5) Vertical cantering
(5) Formation 436. Which of these is not a means of personal
425. Computer that control processes accept data in a communication on the Internet?
continuous. (1) chat (2) instant messaging
(1) Slot (2) Data highway (3) Insta Notes (4) electronic mail
(3) Infinite loop (4) Data traffic-pattern (5) None of these
(5) Feedback loop 437. The input device to be used to get printed diagram into
426. Which Power Point view displays each slide of the a computer is the _____________
presentation as a thumbnail and is useful for (1) keyboard (2) scanner
rearranging slides? (3) touch pad (4) mouse
(1) Slide soater (2) Notes page (5) printer
(3) Slide design (4) Slide show 438. What type of device is a computer mouse?
(5) Slide sorter (1) Storage (2) Output
427. Computers manipulate data in many ways and this (3) Input (4) Input/output
manipulation is called (5) Software
(1) upgrading (2) batching 439. DATA or information used to run the computer is
(3) utilizing (4) downloading called__________
(5) processing (1) hardware (2) CPU
428. Peripheral devices such as printers and monitors are (3) peripheral (4) software
considered to be (5) None of these
(1) hardware (2) software 440. Computer connected to a LAN can ____________
(3) data (4) information (1) run faster
(5) source code (2) share information and/or share peripheral
429. When a real- time telephone call between people is equipment
made over the Internet using computers, it is (3) go online
called___________ (4) e-mail
(1) a chat session (2) an e-mail (5) None of the above
(3) an instant message (4) Internet telephony 441. The _______________ indicates how much data a particular
(5) None of these storage medium can hold.
430. Which of the following is the first step in sizing a (1) storage (2) access
window? (3) capacity (4) memory
(1) Point to the title bar (5) None of these
(2) Pull down the View menu to display the toolbar 442. Computers use the _____________ number system to store
(3) Point to any corner or border data and perform calculations.
(4) Pull down the View menu and change to large icons (1) binary (2) octal
(5) None of these (3) decimal (4) hexadecimal
431. Which of the following software could assist someone (5) None of these
who cannot use their hands for computer input? 443. A disk’s content that is recorded at the time of
(1) Video conferencing (2) Speech recognition manufacture and that cannot be changed or erased by
(3) Audio digitizer (4) Synthesizer the user is
(5) None of these (1) memory-only (2) write-only
432. _______________ a document means the file is transferred (3) once-only (4) run-only
from another computer to your computer. (5) read-only
(1) Uploading 444. Which of the following can be used to select the entire
(2) Realty Simple Syndication (ASS) document?
(3) Accessing (1) CTRL+A (2) ALT+F5
(4) Downloading (3) SHIFT+A (4) CTRL+K
(5) Upgrading (5) CTRL+H
Computer Knowledge
445. ______________ are attempts by individuals to obtain 456. When you save to this, your data will remain intact even
confidential information from you by falsifying their when the computer is turned off.
identify. (1) RAM
(1) Phishing trips (2) Computer viruses (2) motherboard
(3) Spyware scams (4) Viruses (3) secondary storage device
(5) Phishing scams (4) primary storage device
446. Part number, part description and number of parts (5) None of these
ordered are examples of 457. The main circuit-board of the system unit is the _________.
(1) control (2) output (1) computer program (2) control unit
(3) processing (4) feedback (3) motherboard (4) RAM
(5) input (5) None of these
447. To change selected text to all capital letters, click the 458. Computers use the ____________ number system to store
change case button, then click data and perform calculations.
(1) UPPERCASE (2) UPPER ALL (1) binary (2) octal
(3) CAPS LOCK (4) Lock Upper (3) decimal (4) hexadecimal
(5) Large Size (5) None of these
448. Why is it unethical to share copyrighted files with your 459. In Word you can force a page break_____________.
friends? (1) By positioning your cursor at the appropriate place
(1) It is not unethical, because it is legal. and pressing the F1 key
(2) It is unethical because the files are being given for (2) By positioning your cursor at the appropriate
free. place and pressing Ctrl+Enter
(3) Sharing copyrighted files without permission (3) By using the insert/section break
breaks copyright laws. (4) By changing the font size of your document
(4) It is not unethical because the files are being given (5) None of these
for free. 460. _____________ is the process of dividing the disk into tracks
(5) It is not unethical – anyone can access a computer and sectors.
449. The simultaneous processing of two or more programs (1) Tracking (2) Formatting
by multiple processors is_____________. (3) Crashing (4) Allotting
(1) multi-programming (2) multi-tasking (5) None of these
(3) time-sharing (4) multi-processing 461. Grouping and processing all of a firm’s transactions at
(5) None of these one time is called______________
450. To access properties of an object, the mouse technique (1) a database management system
to use is _____________. (2) batch processing
(1) dragging (2) dropping (3) a real-time system
(3) right-clicking (4) shift-clicking (4) an online system
(5) None of these (5) None of these
451. Where you are likely to find an embedded operating 462. An online discussion group that allows direct “live”
system? communication is known as
(1) on a desktop operating system (1) WebCrawler
(2) on a networked PC (2) chat group
(3) on a network server (3) regional service provider
(4) on a PDA (4) hyperlink
(5) on a mainframe (5) e-mail
452. Which of the following is contained on chips connected 463. A Web site’s main page is called its______________
to the system board and is a holding area for data (1) Home Page (2) Browser page
instructions and information? (processed data waiting (3) Search Page (4) Bookmark
to be output to secondary storage) (5) None of these
(1) program (2) mouse 464. The process of transferring files from a computer on the
(3) Internet (4) memory Internet to your computer is called
(5) modem (1) downloading (2) uploading
453. The contents of ______________ are lost when the computer (3) FTP (4) JPEG
turns off. (5) downsizing
(1) storage (2) input 465. You can ______________ a search by providing more
(3) output (4) memory information the search engine can use to select a
(5) None of these smaller, more useful set of results.
454. System software- (1) refine (2) expand
(1) allows the user to diagnose and troubleshoot the (3) load (4) query
device (5) slowdown
(2) is a programming language 466. Which of the following is a program that uses a variety
(3) is a part of a productivity suite of different approaches to identify and eliminate spam?
(4) is an optional form of software (1) Directory search
(5) helps the computer manage internal resources (2) Anti-spam program
455. You can keep your personal files/folders in___________ (3) Web server
(1) My folder (2) My Documents (4) Web storefront creation package
(3) My Files (4) My Text (5) Virus
(5) None of these
Computer Knowledge
467. A disk’s content that is recorded at the time of 480. Computer and communication technologies, such as
manufacture and that cannot be changed or erased by communication links to the Internet that provide help
the user is ______________ and understanding to the end user is known as_
(1) memory-only (2) write-only (1) presentation file (2) information technology
(3) once-only (4) run-only (3) program (4) worksheet file
(5) read-only (5) FTP
468. Video processors consist of ____________ and ____________, 481. The _____________ folder retains copies of messages that
which store and process images. you have started but are not yet ready to send.
(1) CPU and VGA (2) CPU and memory (1) Drafts (2) Outbox
(3) VGA and memory (4) VGI and DVI (3) Address Book (4) Sent Items
(5) None of these (5) Inbox
469. A person who used his or her expertise to gain access to 482. A central computer that holds collections of data and
other people’s computers to get information illegally or programs for many PCs, workstations, and other
do damage is a_____________. computers is a(n)___________
(1) hacker (2) analyst (1) supercomputer (2) minicomputer
(3) instant messenger (4) programmer (3) laptop (4) server
(5) spammer (5) None of these
470. ______________ are attempts by individuals to obtain 483. The basic unit of a worksheet into which you enter data
confidential information from you by falsifying their in Excel is called a _____________
identity. (1) tab (2) cell (3) box
(1) Phishing trips (2) Computer viruses (4) range (5) None of these
(3) Spyware scams (4) Viruses 484. To reload a Web page, press the ____________ button.
(5) Phishing scams (1) Redo (2) Reload
471. The default view in Excel is ___________view. (3) Restore (4) Ctrl
(1) Work (2) Auto (5) Refresh
(3) Normal (4) Roman 485. What characteristic of read-only memory (ROM) makes
(5) None of these it useful?
472. The _____________ enables you to simultaneously keep (1) ROM information can be easily updated.
multiple Web pages open in one browser window. (2) ROM provides very large amounts of inexpensive
(1) tab box (2) pop-up helper data storage.
(3) tab row (4) address bar (3) Data in ROM is non-volatile, that is, it remains
(5) Esc key there even without electrical power.
473. Which ports connect special types of music instruments (4) ROM chips are easily swapped between different
to sound cards? brands of computer.
(1) BUS (2) CPU (5) None of these
(3) USB (4) MIDI 486. Which of the following is true?
(5) MINI (1) Byte is a single digit in a binary number.
474. Reusable optical storage will typically have the acronym (2) Bit represents a grouping of digital numbers
(1) CD (2) DVD (3) An eight-digit binary number is called a byte.
(3) ROM (4) RW (4) An eight-digit binary number is called a bit.
(5) ROS (5) None of these
475. The system unit- 487. A device that connects to a network without the use of
(1) coordinates input and output devices cables is said to be
(2) is the container that houses electronic (1) distributer (2) wireless (3) centralized
components (4) open source (5) None of these
(3) is a combination of hardware and software 488. The _______________, also called the Web, contains billions
(4) controls and manipulates data of documents.
(5) does the arithmetic operations (1) World Wide Web (2) HTTP
476. Codes consisting of lines of varying widths and lengths (3) Web Portal (4) Domain
that are computer-readable are known as _____________ (5) None of these
(1) an ASCII code (2) a magnetic tape 489. In database, a field is a
(3) an OCR scanner (4) a bar code (1) label
(5) None of these (2) table of information
477. What is the permanent memory built into your (3) group of related records
computer called? (4) category of information
(1) RAM (2) Floppy (3) CPU (5) None of these
(4) CD-ROM (5) ROM 490. Computers send and receive data in the form
478. Help Menu is available at which button? of_____________ signals
(1) End (2) Start (3) Turnoff (1) analog (2) digital (3) modulated
(4) Restart (5) Reboot (4) demodulated (5) All of these
479. A DVD is an example of a(n)__ 491. Where are programs and data kept while the processor
(1) hard disk (2) optical disc is using them?
(3) output device (1) Main memory (2) Secondary memory
(4) solid-state storage device (3) Disk memory (4) Program memory
(5) None of these (5) None of these
Computer Knowledge
492. In order to Save an existing document with a different (2) Text would be removed from the document and
name you need to placed in the clipboard.
(1) Retype the document and give it a different name (3) Text from the clipboard would be placed in the
(2) Use the Save as .. command document at the place where the cursor is blinking.
(3) Copy and paste the original document to a new (4) All of the above
document and then-save (5) None of these
(4) Use Windows Explorer to copy the document to a 505. The term “User Interface” refers to____________
different location and-then rename it (1) the monitor that is available for the computer
(5) None of these (2) how the Operating System responds to user
493. Are lists of commands that appear on the screen. commands
(1) GUIs (2) Icons (3) Error! Not a valid embedded object. the means by
(3) Menus (4) Windows which the user interacts with the peripheral devices on
(5) None of these the computer.
494. The feature in Word automatically corrects certain (4) What the user sees on the screen and how they
spelling, typing, capitalization, or grammars errors. can interact with it
(1) Auto Fix (2) Auto Spell (5) None of these
(3) Auto Mark (4) Auto Correct 506. Accessing an unsecured Wi-Fi network from your
(5) None of these current location without authorization is called __________
495. What is the main folder on a storage device called? (1) Hacking (2) War Driving
(1) platform (2) interface (3) Wi-Fi Piggybacking (4) All of the above
(3) root directory (4) device driver (5) None of these
(5) None of these 507. A collection of hardware and/or software intended to
496. In a spreadsheet, a cell is defined as the protect a computer or computer network from
(1) intersection of a table and tuplet unauthorized access is called ______________
(2) intersection of a file and a database (1) Malware (2) Bitnet
(3) intersection of a row and column (3) Worm (4) Motherboard
(4) intersection of a field and a record (5) Firewall
(5) None of these 508. An unique digital code that can be attached to a file or
497. The particular field of a record that uniquely identifies an e-mail message to verify the identity of the sender
each record is called the and guarantee the file or message has not been changed
(1) key field (2) primary field since it was signed is known as ______________
(3) master field (4) order field (1) Digital Certificate
(5) None of these (2) Hacking
498. ____________ represents raw facts, whereas ____________ is (3) Pharming
data made meaningful. (4) Error! Not a valid embedded object. Dot Con
(1) Information, reporting (2) Data, information (5) Digital Signature
(3) Information, bits (4) Records, bytes 509. SAN, Google Docs, and Network drive are all examples of
(5) Bits, bytes ____________ Storage
499. Information on a computer is stored as (1) Primary (2) RAM
(1) analog data (2) digital data (3) Remote (4) Volatile
(3) modern data (4) watts data (5) None of these
(5) None of these 510. When a _____________ is deleted, the original application,
500. A megabyte is actually equal to ___________ kilobytes. folder, or file is not deleted.
(1) 100 (2) 1000 (1) Option (2) Task (3) Shortcut
(3) 1024 (4) 1024 x 1024 (4) Suite (5) None of these
(5) None of these 511. Every device on the Internet has an unique address that
501. Underlined text, such as text and folder names is identifies it in the same way that a street address
referred to as a identifies the location of a house.
(1) icon (2) hyperlink (1) DH (2) DA (3) IP
(3) menu (4) source drive (4) IA (5) None of these
(5) None of these 512. If a new device is attached to a computer, such as a
502. _____________ computers are specifically designed printer or scanner, its _____________ must be installed
computer chips that reside inside other devices such as before the device can be used.
your car or the electronic thermostat in your home. (1) Error! Not a valid embedded object. Server
(1) Mainframe (2) Embedded (2) Driver
(3) Robotic (4) Super (3) Buffer
(5) None of these (4) All of the above
503. ______________ plug into slots on the motherboard and (5) None of these
provide additional functionality for your computer. 513. The software that allows users to surf the Internet is
(1) Network Interface Card (2) USB called a/an ______________
(3) Expansion Card (4) UPS (1) Error! Not a valid embedded object. Browser
(5) None of these (2) Internet Service Provider
504. If text was highlighted and “Copy” was clicked, what (3) Multimedia application
would happen? (4) Search Engine
(1) Text would be copied from the document and (5) None of these
placed in the clipboard.
Computer Knowledge
514. Which of the following computer language is used for 527. When you install a new program on your computer, it is
Artificial Intelligence (AI)? typically added to the _____________ menu.
(1) FORTRAN (2) C (1) all programs (2) select programs
(3) COBOL (4) PROLOG (3) start programs (4) desktop programs
(5) None of these (5) None of these
515. What is the main folder on a storage device called? 528. Which of the following contains information about
(1) Home page (2) Platform single “entity” in the database – like a person, place,
(3) Interface (4) Root Directory event, or thing?
(5) None of these (1) query (2) form
516. The _______________ file format is a method of encoding (3) record (4) table
pictures on computer. (5) None of these
(1) DOC (2) HTML (3) FTP 529. Which of the following is a key function of a firewall?
(4) URL (5) JPEG (1) Monitoring (2) Deleting
517. To navigate a new Web page for which you know the (3) Copying (4) Moving
URL in the browser’s _______________ and press enter (5) None of these
(1) Address button (2) Address bar 530. ____________ are a type of inexpensive digital camera that
(3) Name button (4) Domain bar remains tethered to a computer and used for video
(5) None of these conferencing, video chatting and live Web broadcast.
518. A ______________ is the term used when a search engine (1) Webcams (2) Webpics
returns a web page that matches the search criteria. (3) Browser cams (4) Browserpics
(1) blog (2) link (3) view (5) None of these
(4) hit (5) None of these 531. The acronym HTML stands for______________.
519. The shortcut key to insert the current date? (1) High Transfer Machine Language
(1) Alt + Shift + D (2) Alt +Shift + v (2) High Transmission Mark-up Language
(3) Alt +Shift + C (4) Alt + Shift + B (3) Hypertext Mark-up Language
(5) None of these (4) Hypermedia Mark-up Language
520. The standard protocol of the Internet is __________. (5) None of these
(1) TCP/IP (2) Java (3) HTML 532. Computers connected to a LAN can _____________.
(4) Flash (5) None of these (1) run faster
521. Digital photos and scanned images are typically stored (2) share information and/or share peripheral
as ____________ graphics with extension such as .bmp, equipment
.png, .jpg, .tif or .gif. (3) e-mail
(1) vector (2) bitmap (4) go online
(3) either vector or bitmap (5) None of these
(4) neither vector nor bitmap 533. A device which make use of pen for drawing pictures or
(5) None of these writing information to interact with a computer is called
522. A ____________ is a computer attached to the Internet that ___________.
runs a special Web server software and can send Web (1) Printer (2) Scanner
pages out to other Computers over the Internet (3) Touch-Pen writer (4) Plotter
(1) web client (2) web system (5) Stylus
(3) web page (4) web server 534. A mouse and printer make use of _____________.
(5) None of these (1) infrared technology (2) network resources
523. After a user has saved and deleted many files, many (3) device drivers (4) web protocols
scattered areas of stored data remain that are too small (5) None of these
to be used efficiency, causing _____________. 535. A service which provides user interface to access the
(1) disorder (2) turmoil available multimedia resources over a network is called
(3) disarray (4) fragmentation __________.
(5) None of these (1) UseNet (2) URL (3) Web
524. Which of the following is the communication protocol (4) Internet Relay Chat (IRC)
that sets the standard used by every computer that (5) None of these
accesses Web-based information? 536. To communicate with each other, computers make use
(1) XML (2) DML of _____________ over a network.
(3) HTTP (4) HTML (1) File Server (2) URL (3) Domain
(5) None of these (4) Website (5) Protocols
525. Which of the following converts all the statements in a 537. A _____________ is when you turn the computer on from an
program in a single batch and the resulting collection of off position.
instructions is placed in a new file? (1) cold boot (2) warm boot
(1) compiler (2) interpreter (3) floppy boot (4) boot failure
(3) converter (4) instruction (5) None of these
(5) None of these 538. Unsolicited or undesired electronic messages which are
526. A program that generally has more user-friendly designed to trick recipients into giving up personal and
interface than a DBMS is called a _____________. financial information is called ______________.
(1) front end (2) repository (1) web-bug (2) spyware
(3) back end (4) form (3) malware (4) Trojan horse
(5) None of these (5) spam
Computer Knowledge
539. A common tool used to limit access to certain material 550. The system unit
on the World Wide Web or protecting the Childs from (1) coordinates input and output devices
questionable sites on the Internet is called_____________. (2) is the container that houses electronic
(1) web root (2) spybot components
(3) web utility (4) key logger (3) is a combination of hardware and software
(5) filter (4) controls and manipulates data
540. The administrator in a organization consider a (5) does the arithmetic operations
microcomputer as 551. System software
(1) a simple electronic machine (1) allows the user to diagnose and troubleshoot the
(2) an important component of information system device
(3) a powerful tool of productivity (2) is a programming language
(4) a calculating machine (3) is part of a productivity suite
(5) None of these (4) is an optional form of software
541. The disk-caching feature improves the (5) helps the computer manage internal resources
(1) performance of hard disk 552. Computer and communication technology, such as
(2) speed of processor communication links to the Internet, that provide help
(3) performance of monitor and understanding to the end user is known as
(4) performance of CD drive (1) presentation file (2) information technology
(5) None of these (3) program (4) worksheet file
542. ‘Boost’ is a product of which company? (5) FTP
(1) Cadbury (2) Vicco 553. Which of the following is contained on chips connected
(3) Wipro (4) Dabur to the system board and is a holding area for data
(5) None of these instructions and information? (processed data waiting
543. Oracle and i2 Technologies are connected with to be output to secondary storage)
(1) Computer hardware (2) Networking (1) program (2) mouse
(3) Education (4) Operation systems (3) Internet (4) memory
(5) None of these (5) modem
544. Which from the following wireless networks has a range 554. Microsoft’s Messenger allows users to
of 50 kilometres? (1) bypass a browser to surf the web
(1) Macintosh (2) Wi-Max (2) create a blog
(3) Wi-Fi (4) Blue Tooth (3) communicate via direct live communication
(5) None of these (4) identify and eliminate spam
545. Where are you likely to find an embedded operating (5) make graphic presentations
system? 555. Portable computer, also known as laptop computer,
(1) on a desktop operating system. weighing between 4 and 10 pounds is called
(2) on a networked PC (1) general-purpose application
(3) on a network server (2) Internet
(4) on a PDA (3) scanner
(5) on a mainframe (4) printer
546. An online discussion group that allows direct “live”, (5) notebook computer
communication is known as. 556. The main circuit-board of the system unit is the
(1) WebCrawler (1) computer program (2) control unit
(2) chat group (3) motherboard (4) RAM
(3) regional service provider (5) None of these
(4) hyperlink 557. Which of the following is billionth of a second?
(5) e-mail (1) Gigabyte (2) Terabyte
547. Which of the following is a program that uses a variety (3) Nanosecond (4) Microsecond
of different approaches to identify and eliminate spam? (5) Terasecond
(1) Directory search 558. ‘C’ in CPU denotes ______________.
(2) Anti-spam program (1) Central (2) Common (3) Convenient
(3) Web server (4) Computer (5) Circuitry
(4) Web storefront creation package 559. A joystick is primarily used to/for ____________.
(5) Virus (1) Control sound on the screen
548. Connection or link to other documents or Web Pages (2) Computer gaming
that contain related information is called (3) Enter text (4) Draw pictures
(1) dial-up (2) electronic commerce (5) Print text
(3) hyperlink (4) e-cash 560. Which is not a storage device?
(5) domain name (1) A CD (2) A DVD
549. Which of the following is a programming language for (3) A floppy disk (4) A printer
creating special programs like applets? (5) A Hard disk
(1) Java (2) cable 561. Which of the following uses a handheld operating
(3) domain name (4) Net system?
(5) COBOL (1) A supercomputer (2) A personal computer
(3) A laptop (4) A mainframe
(5) A PDA
Computer Knowledge
562. To display the contents of a folder in Windows Explorer 574. What is the process of copying software programs from
you should _____________. secondary storage media to the hard disk called?
(1) click on it (2) collapse it (1) Configuration (2) Download
(3) name it (4) give a password (3) Storage (4) Upload
(5) rename it (5) Installation
563. The CPU comprises of Control, Memory, and _____________ 575. We regularly come across some lines marked on the
units. back of products. What are they called?
(1) Microprocessor (2) Arithmetic/Logic (1) Bar-code (2) Spooler
(3) Output (4) ROM (3) Scanner (4) Output reader
(5) Input (5) Price tag
564. _____________ is the most important/powerful computer in 576. In the field of computers, which of the following
a typical network. converts input into output?
(1) Desktop (2) Network client (1) Mouse (2) Trackball (3) Keyboard
(3) Network server (4) Network station (4) Bar Code Reader (5) Light Pen
(5) Network switch
565. A(n) _______________ appearing on a web page opens 577. Which application is used for the purposes of basic
another document when clicked. accounting?
(1) anchor (2) URL (1) Worksheet (2) Spreadsheet
(3) hyperlink (4) reference (3) info graphic (4) Data sheet
(5) heading (5) Document
566. Which of the following refers to the rectangular area for 578. How can one see the content of a file?
displaying information and running programs? (1) By left clicking with the mouse once
(1) Desktop (2) Dialog box (2) By left clicking with the mouse twice
(3) Menu (4) Window (3) By holding the mouse down
(5) Icon (4) From the keyboard shortcuts
567. _____________ is a Window utility program that locates and (5) All of the above
eliminates unnecessary fragments and rearranges files 579. What is it called when computer connects to other
and unused disk space to optimize operations. computer and sends information?
(1) Backup (2) Disk Cleanup (1) LAN (2) Remote Desktop
(3) Disk Defragmenter (4) Restore (3) Boot (4) Network (5) Internet Protocol
(5) Disk Restorer 580. How can a file be saved in a computer with other name?
568. Which of the following refers to too much electricity and (1) Save command (2) Save as command
may cause a voltage surge? (3) Place command (4) Duplicate command
(1) Anomaly (2) Shock (5) Export command
(3) Spike (4) Virus 581. What is Full Form of BIOS?
(5) Splash (1) Basic Investment / Output System
569. The software that is used to create test-based (2) Basic In / Out System
documents are referred to as _____________. (3) Basic Input / Output System
(1) DBMS (2) suites (4) Basic Input / Output Service
(3) spreadsheets (4) presentation software (5) None of these
(5) word processors 582. A person who used his or her expertise to gain access to
570. ______________ devices convert human-understandable other peoples computers to get information illegally or
data and programs into a form that the computer can do damage is
process. (1) Hacker (2) Analyst
(1) Printing (2) Output (3) Instant messenger (4) Programmer
(3) Solid State (4) Monitor (5) Spammer
(5) Input 583. To access properties of an object, the mouse technique
571. Through which of the following ways can devices be to use is __________
connected to a computer? (1) dragging (2) dropping
(1) USB (2) Bluetooth (3) right-clicking (4) shift-clicking
(3) CD/DVD Drive (4) RAM (5) None of these
(5) Only (1) and (2) 584. Computers used the ___________ number systems to store
572. Which of the following is the correct sequence of data and perform calculations
compilation? (1) binary (2) octal (3) decimal
(1) Compilation, Assembly, Linking (4) hexadecimal (5) None of these
(2) Assembly, Linking, Compilation 585. The default view in Excel is ______________ View.
(3) Linking, Assembly, Compilation (1) Work (2) Auto (3) Normal
(4) Assembly, Compilation, Linking (4) Roman (5) None of these
(5) Compilation, Linking, Assembly 586. In word you can force a page break ___________
573. Which of the following is the proper removal of any (1) by positioning your cursor at the appropriate place
malicious program from a computer system? and pressing the F1 key
(1) Reconfiguration (2) Reboot (2) by positioning your cursor at the appropriate
(3) Restart (4) Uninstallation place and pressing Ctrl+Enter
(5) Only (2) and (4) (3) by using the insert /section break
(4) by changing the font size of your documents
(5) None of these
Computer Knowledge
587. Specialized programs that assist users in locating 598. Computer and communication technologies, such as
information on the Web are called communication links to the internet that provide help
(1) Information engines (2) locator engines and understanding to the end user is known as
(3) web browsers (4) resource locators ____________.
(5) search engines (1) presentation file
588. Compiling creates a(n) (2) information technology
(1) error-free program (2) program specification (3) program
(3) subroutine (4) algorithm (4) worksheet file
(5) executable program (5) FTP
589. What is the name given to those applications that 599. What is an ‘internet’?
combine text, sound, graphics, motion video, and/or (1) International network used to transfer information
animation? internally.
(1) motion ware (2) anigraphics (2) Internal internet used to transfer information to the
(3) videos capes (4) multimedia outside company.
(5) maxomedia (3) Internet network designed to serve the internet
590. How are the World Wide Web (www) and the internet informational needs of a single organisation.
different? (4) Internal network designed to transfer the
(1) They aren’t different; they are two different names information between two organisations.
for the same thing. (5) None of the above
(2) The internet is text only, the www incorporates 600. Each of the following is a true statement except _________.
multimedia. (1) online systems continually update the master file
(3) The internet is primarily used by businesses; the (2) in online processing, the user enters transactions
www can be used by home users. into a device that is directly connected to the computer
(4) The www is faster than the more archaic internet. system
(5) None of these (3) batch processing is still used today in older systems
591. Which ports connects special types of music or in some systems with massive volumes of
instruments to sound cards? transactions
(1) BUS (2) CPU (4) information in batch systems will always be up-
(3) USB (4) MIDI to-date
(5) MINI (5) None of the above
592. Which Bank has partnered with Flipkart to launch ‘Buzz 601. Digital photos and scanned images are typically stored
Credit Card’ for its for online shoppers? as ____________ graphics with extensions such as .bmp,
(1) Bank of Baroda (2) SBI .png, .jpg, .tif, or .gif.
(3) ICICI Bank (4) Axis Bank (1) vector (2) bitmap
(5) South Indian Bank (3) Either (1) or (2) (4) Neither (1) nor (2)
593. A joystick is primarily used for ____________. (5) None of the above
(1) control sound on the screen 602. Which one of the following is a key function of a
(2) computer gaming firewall?
(3) enter text (1) Monitoring (2) Deleting
(4) draw pictures (3) Copying (4) Moving
(5) print text (5) None of these
594. To display the contents of a folder in Windows Explorer, 603. Arranging of data in a logical sequence is known is
you should __________.
(1) click on it (2) collapse it (1) classifying (2) searching
(3) name it (4) give it a password (3) sorting (4) reproducing
(5) rename it (5) None of these
595. _____________ is a windows utility program that locates 604. VIRUS stands for
and eliminates unnecessary fragments and rearranges (1) Very Important Record User Searched
files and unused disk space to optimize operations. (2) Verify Interchanged Result Until Source
(1) Backup (2) Disk cleanup (3) Virtual Information Resource Under Seize
(3) Disk defragmenter (4) Restore (4) Very Important Resource Under Search
(5) Disk restorer (5) None of the above
596. Which of the following is a program that uses a variety 605. Excel would evaluate the formula, =20*10/4*8 and
of different approaches to identify and eliminate spam? return the answer
(1) Directory search (1) 400 (2) 40
(2) Anti-spam program (3) 6.25 (4) 232
(3) Web server (5) 600
(4) Web storefront creation package 606. Why is the Caps Lock key referred to as a toggle key?
(5) Virus (1) Because its change its status on pressing the key
597. Which of the following is a programming language for (2) Because it cannot be used for entering numbers
creating special programs like applets? (3) Because it cannot be used to delete
(1) Java (2) Cable (4) Because it cannot be used to insert
(3) Domain name (4) Net (5) None of the above
(5) COBOL
Computer Knowledge
607. This dialog box specifies or modifies the worksheet cell 620. Background image or text in a document is known as
range containing data to be charted ____________.
(1) Chart location (2) Chart style (1) Background (2) Wallpaper
(3) Chart option (4) Chart source data (3) Watermark (4) All
(5) None of the above (5) None of these
608. An operating system that can do multitasking means 621. Example of primary memory is ___________.
that _____________. (1) HDD (2) PROM
(1) the operating system can divide up work between (3) FDD (4) BRD
several CPUs (5) None of these
(2) several programs can be operated concurrently 622. POST performs in a ___________.
(3) multiple people can use the computer concurrently (1) HOT booting (2) WARM booting
(4) All of the above (3) Cold booting (4) All
(5) None of the above (5) None of these
609. A program, either talk or music that is made available in 623. Modifier keys are ___________.
digital format for automatic download over the internet (1) Ctrl (2) Alt
is called _____________. (3) Esc (4) Both 1 and 2
(1) vodcast (2) blog (3) podcast (5) None of these
(4) wiki (5) broadcast 624. “Structure of database” is known as _____________.
610. _____________ is used for capturing raw data and entering (1) Attribute (2) Entity
into the system. (3) Schema (4) All
(1) Keyboard (2) Scanner (5) None of these
(3) CPU (4) Both 1 and 2 625. Degree refers ____________.
(5) None of these (1) Number of tuples (2) Number of attributes
611. The intersection of row and column is known as ________. (3) Schema (4) All
(1) Column (2) Value (3) Address (5) None of these
(4) Cell (5) None of these 626. Which is graphical presentation?
612. Which of the following is not a type of Microsoft Access (1) Folder (2) Icon (3) File
Database Object? (4) Text (5) None of these
(1) Queries (2) Workbooks 627. Which is not related with control panel?
(3) Forms (4) Table (1) Printer (2) Run application
(5) None of these (3) Font (4) Keyboard
613. Which of the following is type of Data Transmission (5) None of these
Modes? 628. Which bar is usually located below the title bar that
(1) Simplex (2) Half Duplex provides categorized options?
(3) Full Duplex (4) All (1) Scroll bar (2) Menu bar
(5) None of these (3) Tool bar (4) Status bar
614. SGML stand for___________. (5) None of these
(1) Standard Generalized Mark-up Language 629. The very top of the page in a document is known as
(2) Structured General Mark-up Language __________.
(3) Standard Graphics Mapping Language (1) Footer (2) Header (3) Tab stop
(4) Standard General Mark-up Link (4) Navigation (5) None of these
(5) None of these 630. A feature that automatically corrects common spelling
615. Data is represented in a DBMS as __________. errors is called ____________.
(1) File (2) Binary (1) Auto Fit (2) Auto Format
(3) Record (4) Table (3) Auto Correct (4) Auto Lock
(5) None of these (5) None of these
616. ____________ is the empty document which can be changed 631. ______________ is used to move a document up and down
according to user. or left and right on the screen.
(1) file (2) guide (1) Title Bar (2) Status Bar
(3) template (4) user guide file (3) Formula Bar (4) Scroll Bar
(5) None of these (5) None of these
617. ____________ aims at the boot sector of a hard drive by 632. The Zoom control slider located in _______________.
infecting a very crucial component of the boot process. (1) Title Bar (2) Status Bar
(1) File infection virus (2) Boot virus (3) Formula Bar (4) Scroll Bar
(3) Network virus (4) E-mail virus (5) None of these
(5) None of these 633. The space between the margin and the text is called
618. Stylus is a/an ___________. _____________.
(1) Output device (2) Storage device (1) Line spacing (2) Paragraph Spacing
(3) Input device (4) Software (3) Indent (4) Index
(5) None of these (5) None of these
619. _____________ is used to align text in centre in word 634. Which of the following tells you the page you are on and
document. the total page count?
(1) Ctrl+D (2) Ctrl+E (1) Title Bar (2) Status Bar
(3) Ctrl+M (4) Ctrl+C (3) Formula Bar (4) Scroll Bar
(5) None of these (5) None of these
Computer Knowledge
635. The amount of space between lines of text is called 648. What type of software creates a smaller file that is faster
___________. to transfer over the Internet?
(1) Line Spacing (2) Paragraph Spacing (1) Compression (2) Fragmentation
(3) Indent (4) Index (3) Encapsulation (4) Unzipped
(5) None of these (5) None of these
636. ______________ is a feature supported by many word 649. Which of the following is used for close a tab on a
processors that enables you to surround a picture or browser?
diagram with text. (1) Ctrl + Y (2) Ctrl + A
(1) Image Wrap (2) Text Wrap (3) Ctrl + W (4) Ctrl + T
(3) Picture Wrap (4) All of the above (5) None of these
(5) None of these 650. Which of the following is NOT a component of the
637. Which command on the Ribbon enables the document Central Processing Unit of the computer?
to be viewed as it would appear on a webpage? (1) Universal Serial Bus
(1) Page Layout (2) Internet Layout (2) Uninterrupted Power Supply
(3) Web Layout (4) All of the above (3) Cu
(5) None of these (4) Both 1 and 2
638. Which feature allows you to type words in a paragraph (5) None of these
continually without pressing the enter key at the end of 651. When cutting and pasting, cutting section is temporarily
each line? stored in
(1) Image Wrap (2) Word Wrap (1) Dashboard (2) Clipboard
(3) Picture Wrap (4) All of the above (3) Hard drive (4) Diskette
(5) None of these (5) None of these
639. The most widely used computer device is ___________. 652. You can move between two or more Excel files opened
(1) Solid state disks (2) External hard disk by using the
(3) Internal hard disk (4) Mouse (1) ctrl + tab (2) ctrl + page up
(5) None of these (3) ctrl + page down (4) ctrl + F9
640. ______________ are software which is used to do particular (5) None of these
task. 653. To open find window.
(1) Operating system (2) Program (1) F1 (2) F2
(3) Data (4) Software (3) F3 (4) F5
(5) None of these (5) None of these
641. Who is father of modern computers? 654. ________________ is the execution of at least two different
(1) Abraham Lincoln (2) James Gosling programs simultaneously.
(3) Charles Babbage (4) Gordon E. Moore (1) Multiprocessing (2) Multi programming
(5) None of these (3) Recovery (4) Integrity
642. How many generations of computers we have? (5) None of these
(1) 6 (2) 7 655. _________________ is a mechanism by which all the content
(3) 5 (4) 4 in a specified storage areas are written as output.
(5) None of these (1) Scheduling (2) Logging
643. ______________ controls the way in which the computer (3) Chumping (4) Dumping
system functions and provides a means by which users (5) None of these
can interact with the computer. 656. The first generation computers used ____________ for
(1) The operating system (2) The motherboard circuitry.
(3) The platform (4) Application software (1) Vacuum tube (2) Transistors
(5) None of these (3) Integrated Circuits (4) Large Scale Integration
644. The difference between people with access to (5) None of these
computers and the Internet and those without this 657. VLSI technology is used in ________________ generation
access is known as the: computers.
(1) digital divide (2) Internet divide (1) First (2) Second
(3) cyber way divide (4) Web divide (3) Third (4) Fourth
(5) None of these (5) None of these
645. All of the following are examples of real security and 658. Different types of modern digital computers come under
privacy risks EXCEPT: which generation.
(1) Viruses (2) Hackers (1) Fourth (2) Third
(3) Spam (4) Identity theft (3) Second (4) Fifth
(5) None of these (5) None of these
646. _____________ is the process of dividing the disk into tracks 659. What computers are used for fastest type of computer
and sectors. that can perform complex operations at very high
(1) Allotting (2) Crashing speed?
(3) Formatting (4) Tracking (1) Micro (2) Mini (3) Mainframe
(5) None of these (4) Super (5) None of these
647. Which computer memory is used for storing programs 660. One of the Input device in computer are
and data currently being processed by the CPU? (1) Keyboard (2) Os
(1) Internal memory (2) Mass memory (3) Pen drive (4) Cable
(3) Non-volatile memory (4) PROM (5) None of these
(5) None of these
Computer Knowledge
661. The main working memory used by the computer are 673. DVD is an example of
(1) RAM (2) ROM (3) DVD (1) Hard disk
(4) CD (5) None of these (2) optical disk
662. ‘Blue tooth’ technology allows (3) Output device
(1) Satellite communication (4) Solid-state storage devices
(2) Signal transmission on mobile phones only (5) None of these
(3) Wireless communication between equipments 674. The ____________ enables you to simultaneously keep
(4) Landline phone to mobile phone communication multiple web pages open in one browser window
(5) None of these (1) tab bar (2) pop-up helper
663. All of the following statements concerning files are true (3) tab row (4) address bar
EXCEPT: (5) None of these
(1) Files should be organized in folders 675. The ____________ folder remains copies of messages that
(2) Files are stored in RAM you have started but are not yet ready to send.
(3) Files can be generated from an application (1) drafts (2) outbox
(4) A file is a collection of related pieces of information (3) address (4) sent items
stored together for easy reference (5) None of these
(5) None of these 676. A central computer that holds collections of data and
664. The operating system does all of the following EXCEPT: program for many PCs, work station and other
(1) provide a way for the user to interact with the computer is a(n) ____________
computer. (1) Super computer (2) Mini computer
(2) enable users to perform a specific task such as (3) Laptop (4) Server
document editing. (5) None of these
(3) manage memory and storage 677. What is the process of copying software programs from
(4) manage the central processing unit (CPU) secondary storage media to the hard disk is called
(5) None of these (1) Configuration (2) download
665. Verification of a login name and password is known as : (3) storage (4) upload
(1) configuration (2) authentication (5) installation
(3) accessibility (4) logging in 678. When the pointer is positioned on a ____________, it is
(5) None of these shaped like a hand.
666. All of the following statements concerning windows are (1) grammar error (2) formatting error
true EXCEPT: (3) screen tip (4) hyperlink
(1) toolbars and scrollbars are features of windows. (5) spelling error
(2) windows are an example of a command-driven 679. When you save your data to _____________, it will remain
environment. intact even when the computer is turned off.
(3) windows can be resized and repositioned on the (1) RAM (2) Mother board
desktop. (3) Secondary storage (4) Primary storage device
(4) more than one window can be open at a time. (5) None of these
(5) None of these 680. The _______________ allows you to access object and start
667. Finite number of sequential instructions are called programme.
(1) Flow chart (2) Control flow (1) Default menu (2) XP menu
(3) Program flow (4) Algorithm (3) Start menu (4) Stop menu
(5) None of these (5) None of these
668. What is the commonly used unit for measuring the 681. Which of the following is an operating system?
speed of data transmission? (1) MS Windows (2) Mac
(1) Mega Hertz (2) Characters per second (3) MS DOS (4) Windows NT
(3) Nano seconds (4) Bits per second (5) All of the above
(5) None of these 682. What is correcting errors in a program called?
669. A person who uses his expertise to gain access to other (1) Interpreting (2) Translating (3) Debugging
computers to get information illegally or do damages is (4) Compiling (5) None of these
(1) Hacker (2) Analyst 683. What is the other name of LAN card?
(3) Instant messenger (4) Programmer (1) Modem (2) Network connector
(5) Spammer (3) Internet care (4) NIC (5) None of these
670. A device that connects to a network without the use of 684. The standard protocol of the internet is ____________?
cables is said to be ____________ (1) TCP/IP (2) Java (3) HTML
(1) distributed (2) free (3) centralized (4) Flash (5) None of these
(4) open source (5) None of these 685. Windows 10 is in an example of a ____________?
671. The most common type of storage devices are (1) Application software (2) Browser
(1) Persistence (2) Optical (3) Operating system (4) Shareware
(3) Magnetic (4) Flash (5) None of these
(5) None of these 686. Which of the following is machine independent
672. Compilers used the _____________ number system to store program?
data and perform calculations (1) High level language (2) Low level language
(1) binary (2) octal (3) Assembly level language
(3) decimal (4) hexadecimal (4) Machine language
(5) None of these (5) None of these
Computer Knowledge
687. Transformation of input into output is performed by 700. _____________ is the process of carrying out commands.
____________? (1) Fetching (2) Storing
(1) Peripherals (2) Memory (3) Executing (4) Decoding
(3) Storage (4) CPU (5) None of these
(5) None of these 701. Softcopy is the intangible output. So then what is
688. A ____________ is a non-impact printer that can produce hardcopy
very high-quality letter-perfect printing. (1) The physical parts of the computer
(1) daisy wheel printer (2) laser printer (2) The printed parts of the computer
(3) dot-matrix printer (4) thermal printer (3) The printed output
(5) drum printer (4) The physical output devices
689. The primary purpose of software is to turn data into- (5) None of these
(1) Web sites (2) Information 702. A(n) ___________ is a program that makes the Computer
(3) programs (4) objects easier to use
(5) None of these (1) utility (2) application
690. A directory within a directory is called? (3) operating system (4) network
(1) Mini Directory (2) Junior Directory (5) None of these
(3) Part Directory (4) Sub Directory 703. A complete electronic circuit with transistors and other
(5) None of these electronic components on a small silicon chip is called
691. A compiler translates a program written in a high-level a(n)
language into? (1) workstation (2) CPU
(1) Machine language (2) An algorithm (3) magnetic disk (4) integrated circuit
(3) A debugged program (4) Java (5) None of these
(5) None of these 704. Computer systems are comprised of-
692. When you turn on the computer the boot routine will (1) hardware, programs, processors, procedures, and
perform this test people
(1) RAM test (2) disk drive test (2) hardware, programs, information, people and
(3) memory test (4) power-on self-test procedures
(5) None of these (3) hardware, programs, information, people and
693. A ___________ is a unique name that you give to a file of networks
Information (4) hardware, software, procedures, data and people
(1) device letter (2) folder (5) None of these
(3) filename (4) file name extension 705. An error in a computer programme-
(5) None of these (1) Crash (2) Power Failure
694. Hardware includes (3) Bug (4) Virus
(1) all devices used to input data into a computer (5) None of these
(2) sets of instructions that a computer runs or executes 706. What is output
(3) the computer and all the devices connected to it (1) What the processor takes from the user
that are used to input and output data (2) What the user gives to the processor
(4) all devices involved In processing information (3) What the processor gets from the user
Including the central processing unit, memory, and (4) What the processor gives to the user
storage (5) None of these
(5) None of these 707. The person who writes and tests computer programs is
695. A ___________ contains specific rules and words that called a
express the logical steps of an algorithm (1) programmer (2) computer scientist
(1) programming language (2) syntax (3) software engineer (4) project developer
(3) programming structure (4) logic chart (5) None of these
(5) None of these 708. A set of instructions telling the computer what to do is
696. All the deleted files go to called
(1) Recycle Bin (2) Task Bar (1) mentor
(3) Tool Bar (4) My Computer (2) instructor
(5) None of these (3) compiler
697. The simultaneous processing of two or more programs (4) program
by multiple processors is (5) None of these
(1) multiprogramming (2) multitasking 709. What is backup?
(3) time-sharing (4) multiprocessing (1) Adding more components to your network
(5) None of these (2) Protecting data by copying it from the original
698. The secret code that restricts entry to some programs source to a different destination
(1) password (2) passport (3) Filtering old data from the new data
(3) entry-code (4) access-code (4) Accessing data on tape
(5) None of these (5) None of these
699. Computers use the number system to store data and 710. Specialised programs that assist users in locating
perform calculations. information on the Web are called
(1) binary (2) octal (1) Information engines (2) search engines
(3) decimal (4) hexadecimal (3) web browsers (4) resource locators
(5) None of these (5) None of these
Computer Knowledge
711. An application program has which one of the following 721. A printer is this kind of device
functions? (1) input (2) word processing
(1) It specifies the Information- processing procedures (3) processing (4) output
required by a particular information processing job. (5) None of these
(2) It controls the Input/output and storage functions of 722. Text in a column is generally aligned-
the computer system (1) justified (2) right
(3) It provides various support services for the (3) centre (4) left
computer system (5) None of these
(4) It supervises the operations of the CPU 723. What type of device is a computer mouse?
(5) None of these (1) Input (2) Output
712. In page preview mode- (3) Software (4) Storage
(1) You can see all pages of your document (5) None of these
(2) You can only see the page you are currently working 724. In Excel, Charts are created using which option?
(3) You can only see pages that do not contain graphics (1) Chart Wizard (2) Pivot Table
(4) You can only see the title page of your document (3) Pie Chart (4) Bar Chart
(5) None of these (5) None of these
713. An operating system that can do multitasking means 725. If text was highlighted and “Edit” “Copy” was clicked,
that what would happen?
(1) the operating system can divide up work between (1) Text would be copied from the document and
several CPUs placed in the clipboard
(2) several programs can be operated concurrently (2) Text would be removed from the document and
(3) multiple people can use the computer concurrently placed in the clipboard
(4) All of the above (3) Text from the clipboard would be placed in the
(5) None of these document at the place where the cursor is blinking
714. The quickest and easiest way in Word, to locate (4) 2 and 3 above
particular word or phrase in a document is to use the (5) None of these
________ command. 726. You can start Microsoft Word by using ___________ button.
(1) Replace (2) Find (1) New (2) Start
(3) Lookup (4) Search (3) Program (4) Control Panel
(5) None of these (5) None of these
715. With a CD you can- 727. You click at B to make the text-
(1) Read (2) Write (1) Italics (2) Underlined
(3) Read and Write (4) Either Read or Write (3) Italics and Underlined (4) Bold
(5) None of these (5) None of these
716. A collection of Interrelated records is called a- 728. MICR code is used mainly by the banking industry to
(1) utility file ease the processing and clearance of cheques and other
(2) management Information system documents. What is the full form of MICR?
(3) database (1) Magnetic Indian Character Recognition
(4) spreadsheet (2) Management Ink Character Recognition
(5) None of these (3) Magnetic Ink Common Recognition
717. To move to the beginning of a line of text, press the (4) Magnetic Ink Character Resource
__________ key. (5) Magnetic Ink Character Recognition
(1) Page Up (2) A
(3) Home (4) Enter
(5) None of these
718. The term-user interface refers to-
(1) what the user sees on the screen and how they
can interact with it
(2) how the operating system responds to user
commands
(3) the means by which the user interacts with the
peripheral devices on the computer
(4) the monitor that is available for the computer
(5) None of these
719. The background of any Word document-
(1) Is always white colour
(2) Is the colour you preset under the options menu
(3) Is always the same for the entire document
(4) Can have any colour you choose
(5) None of these
720. Reusable optical storage will typically have the
acronym-
(1) CD (2) DVD
(3) ROM (4) RW
(5) None of these