Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
5) Design Ans.) 4
Ques. : 13 The container that houses most of the electronic
components that make up a computer system is known as the
1) arithmetic logic unit 2) primary storage unit
3) central processing unit 4) system cabinet
5) None of these Ans.) 4
Ques. : 14 Which of the following are often termed as
notebook computers?
1) Desktop systems 2) Personal Digital Assistants
3) Palm computers 4) Laptop computers
5) None of these Ans.) 4
Ques. : 15 Which of the following is the smallest regarding
physical appearance?
1) Desktop 2) Notebook
3) PDA 4) Tablet
5) None of these Ans.) 3
Ques. : 16 The smallest unit in a digital system is a
1) character 2) byte
3) bit 4) word
5) None of these Ans.) 3
Ques. : 17 The binary system has __________ digits.
1) 6 2) 8
3) 2 4) 4
5) None of these Ans.) 3
Ques. : 18 This coding system is designed to support
international languages like Chinese and Japanese.
1) ASCII 2) ANSI
3) EBCDIC 4) Unicode
5) None of these Ans.) 4
Ques. : 19 The communications medium for the entire
computer system is the
1) secondary processor 2) arithmetic logic unit
3) semiconductor 4) motherboard
5) None of these Ans.) 4
Ques. : 20 Tiny circuitboards
etched onto squares of sandlike material called silicon are
called
1) ports 2) slots
3) bays 4) chips
5) None of these Ans.) 4
Ques. : 21 This unit tells the rest of the computer how to carry
out a programs instructions.
1) Motherboard 2) ALU
3) Contro unit 4) System unit
5) None of these Ans.) 3
Ques. : 22 __________ and logical operations are performed
by the ALU.
1) Alphabetical 2) Arithmetic
3) Advanced 4) Additional
5) None of these Ans.) 2
Ques. : 23 Which of the following is not an arithmetic
operator?
1) + 2) 3)
/ 4) *
5) None of these Ans.) 5
Ques. : 24 This is the number of bits that can be accessed at
one time by the CPU.
1) Bit 2) Byte
3) Character 4) Word
5) None of these Ans.) 4
Ques. : 25 Most personal computers uses a CISC architecture.
Expand the term CISC.
1) microprocessor 2) motherboard
3) BIOS 4) extension board
5) None of these Ans.) 1
Ques. : 36 An easily expandable computer system is said to
have a(n)
1) ultra architecture 2) open architecture
3) locked architecture 4) round architecture
5) None of these Ans.) 2
Ques. : 37 Users can easily expand their computer systems by
inserting optional devices into the slots on the system
board. These devices are known as
1) expansion cards 2) expansion bus
3) smart cards 4) output devices
5) None of these Ans.) 1
Ques. : 38 To communicate with another computer over
telephone lines, you need a
1) NIC 2) PC card
3) video card 4) modem
5) None of these Ans.) 4
Ques. : 39 This type of expansion bus is designed to support
several external devices without using expansion cards or
slots.
1) PCI 2) USB
3) BIOS 4) AGP
5) None of these Ans.) 2
Ques. : 40 What does USB mean in computers?
1) Universal Segrigation Bus 2) Universal Section Bus
3) Universal Serial Bus 4) Universal Scheduling Bus
5) None of these Ans.) 3
Ques. : 41 What is the full form of NIC in computers?
1) Network Interconnection Card 2) Network Interchange
Card
3) Network Identification Card 4) Network Interface Card
5) None of these Ans.) 4
Ques. : 42 What is the full form of AGP in computers?
1) Attached Graphics Port 2) Additional Graphics Port
3) Accelerated Graphics Port 4) Advanced Graphics Port
5) None of these Ans.) 3
Ques. : 43 What is the full form of PCI in computers?
1) Private Component Interconnect 2) Peripheral Connection
Interface
3) Peripheral Compartment Interconnection 4) Peripheral
Component Interconnect
5) None of these Ans.) 4
Ques. : 44 What is the full form of PIN used with smart cards?
1) Personal Identification Number 2) Personal Index Number
3) Provisional Identification Number 4) Permanent
Identification Number
5) None of these Ans.) 1
Ques. : 45 What is the full form of SMPS in computers?
1) Schedule Mode Power Supply 2) Switched Mode Power
Supply
3) Segregated Mode Power Supply 4) Simple Mode Power
Supply
5) None of these Ans.) 2
Ques. : 46 There are ____________ layers in the Open
Systems Interconnection (OSI) Model.
1) four 2) five
3) six 4) seven
5) nine Ans.) 4
Ques. : 47 Internet is also called
1) network of cables 2) network of peripherals
5) repeater Ans.) 5
Ques. : 107 A repair for a known software bug, usually
available at no charge on the Internet, is called a(n)
1) version 2) patch
3) tutorial 4) FAQ
5) rectifier Ans.) 2
Ques. : 108 URL stands for
1) Universal Research List 2) Universal Resource List
3) Uniform Registered Link 4) Unified Resource Locator
5) None of these Ans.) 4
Ques. : 109 When data changes in multiple lists and all lists
are not updated, this causes
1) data redundancy 2) information overload
3) duplicate data 4) data inconsistency
5) None of these Ans.) 4
Ques. : 110 What is a backup?
1) Restoring the information backup 2) An exact copy of a
system's information
3) The ability to get a system up and running in the
event of a system crash or failure 4) All of these
5) None of these Ans.) 4
Ques. : 111 The Internet is
1) a large network of networks 2) an internal communication
system for a
business
3) a communication system for the India govt 4) a
communication system for some states in
India
5) a communication system for some cities of India Ans.) 1
Ques. : 112 Computers that are portable and convenient for
users who travel are known as
1) super computers 2) planners
3) minicomputers 4) file servers
5) laptops Ans.) 5
Ques. : 113 What is the storage area for email
messages called?
1) A folder 2) A mail box
3) A directory 4) The hard disk
5) None of these Ans.) 2
Ques. : 114 One advantage of dialup
Internet access is that
1) it utilises broadband technology 2) it is India
3) it uses a router for security 4) modern speeds are very fast
5) it utilises existing telephone services Ans.) 5
Ques. : 115 What is the process of copying software programs
from secondary storage media to the hard disk called?
1) Configuration 2) Download
3) Storage 4) Upload
5) Istallation Ans.) 5
Ques. : 116 Which process checks to ensure the components of
the computer are operating and connected properly?
1) Booting 2) Processing
3) Saving 4) Editing
5) None of these Ans.) 1
Ques. : 117 A means of capturing an image (drawing or photo)
so that it cab be stored on a computer is
1) Modem 2) Software
3) Scanner 4) Keyboard
5) Mouse Ans.) 3
Ques. : 118 An error in a computer program is called a
1) crash 2) power failure
3) bug 4) virus
5) DOC Ans.) 2
Ques. : 214 What is the process of copying software programs
from secondary storage media to the hard disk called?
1) configuration 2) download
3) storage 4) upload
5) istallation Ans.) 5
Ques. : 215 The property that, when classes are arranged in a
hierarchy, each class assumes the attributes and methods
of its ancestores is
1) Inheritance 2) generalisation
3) encapsulation 4) information hiding
5) None of these Ans.) 1
Ques. : 216 The software component of an expert system that
draws conclusions is the ___________.
1) user interface 2) database
3) inference engine 4) I/O controller
5) None of these Ans.) 3
Ques. : 217 The attributes and methods for each object are
stored in
1) an object instance 2) an object connection
3) an assembly structure 4) an object repository
5) None of these Ans.) 4
Ques. : 218 What is backup?
1) Adding more components to your network 2) Protecting
data by copying it from the original
source to a different destination
3) Filtering old data from the new data 4) Accessing data on
tape
5) None of these Ans.) 2
Ques. : 219 Which of the following is true?
1) A byte is a single digit in a binary number. 2) A bit
represents a group of digital numbers.
3) Eightdigit
binary number is called a byte. 4) Eightdigit
binary number is called a bit.
5) None of these Ans.) 3
Ques. : 220 A _______is an organised collection of data about
a single entity.
1) file 2) library
3) database 4) dictionary
5) None of these Ans.) 1
Ques. : 221 Hardware devices that are not part of the main
computer system and are often added later to the system are
1) clip art 2) highlights
3) execute 4) peripherals
5) None of these Ans.) 4
Ques. : 222 All of the following are examples of real security
and privacy risks except
1) hackers 2) spam
3) viruses 4) Identity theft
5) None of these Ans.) 2
Ques. : 223 Moving an icon on the desktop is termed as
1) double clicking 2) highlighting
3) dragging 4) pointing
5) None of these Ans.) 3
Ques. : 224 A MODEM is connected in between a telephone
line and a
1) Computer 2) Printer
3) Speaker 4) Microphone
5) Network Ans.) 1
Ques. : 225 The blinking symbol which indicates the next
1) Delete key 2) Control key
1) Average 2) Count
3) Minimum 4) Maximum
5) None of these Ans.) 4
Ques. : 284 The humanreadable
version of a program is called ________.
1) source code 2) program code
3) human code 4) system code
5) None of these Ans.) 1
Ques. : 285 The number of pixels displayed on a screen is
known as screen
1) resolution 2) colour depth
3) refresh rate 4) viewing size
5) None of these Ans.) 1
Ques. : 286 What is the name of the protocol used to eliminate
loops?
1) ISL 2) Switching
3) Frame tagging 4) Spanning Tree Protocol
5) Scanning Ans.) 4
Ques. : 287 Digital photos and scanned images are typically
stored as __________graphics with extensions such as
bmp, png, jpg, tif and gif.
1) vector 2) bitmap
3) either vector or bitmap 4) neither vector nor bitmap
5) None of these Ans.) 2
Ques. : 288 Select the odd man out.
1) Interpreter 2) Operating system
3) Compiler 4) Assembler
5) None of these Ans.) 2
Ques. : 289 A ______ is a design tool that graphically shows
the logic in a solution algorithm.
1) flowchart 2) hierarchy chart
3) structure chart 4) context diagram
5) None of these Ans.) 1
Ques. : 290 A multipurpose
window which opens nearly for everything is
1) Main desktop 2) Explorer Window
3) Browser Window 4) Error Window
5) None of these Ans.) 2
Ques. : 291 Active Desktop was a feature of
1) Mozilla Firefox 2) Chrome
3) Microsoft Internet Explorer 4.0 4) Safari
5) None of these Ans.) 3
Ques. : 292 Computer Virus is a
1) hardware 2) Windows tool
3) computer program 4) Both 2) and 3)
5) None of these Ans.) 3
Ques. : 293 'Write!' is a`
1) Text editor 2) Word processor
3) Line editor 4) All the above
5) None of these Ans.) 1
Ques. : 294 What is an operating system?
1) It is an interface between user and the
computer. 2) It manages all resources.
3) It does all process management tasks. 4) All the above
5) None of these Ans.) 4
Ques. : 295 The Factor which makes Windows popular is its
1) multitasking
capacity 2) desktop features
3) user freiendly GUI features 4) being inexpensive
5) None of these Ans.) 3
Ques. : 296 A series of tobeviewed
1) pointer 2) menu
3) icon 4) button
5) None of these Ans.) 2
Ques. : 417 Microcomputer hardware consists of three basic
categories of physical equipment:
1) keyboard, monitor, hard drive 2) system unit, input/output,
memory
3) system unit, input/output, secondary storage 4) system unit,
primary storage, secondary storage
5) None of these Ans.) 2
Ques. : 418 A piece of hardware that is used to enter
information into the computer by usning keys is
1) keyboard 2) monitor
3) hard disk 4) icon
5) None of these Ans.) 1
Ques. : 419 What does WWW mean?
1) World Wide Wizard 2) World Wireless Web
3) World Wide Web 4) Wide Wireless Web
5) None of these Ans.) 3
Ques. : 420 __________ processing is used when a large
mailorder
company accumulates orders and processes them
together in one large set.
1) Batch 2) Online
3) Realtime
4) Group
5) None of these Ans.) 1
Ques. : 421 Which of the following is NOT the major function
of a computer?
1) Processing data into information 2) Storing data or
information
3) Modifying data 4) Analysing data or information
5) None of these Ans.) 4
Ques. : 422 A repair for a known software bug, usually
available at no charge on the Internet, is called a(n)
1) version 2) patch
3) tutorial 4) FAQ
5) None of these Ans.) 2
Ques. : 423 Which type of memory holds only the program
and data that the CPU is presently processing?
1) CMOS 2) ROM
3) RAM 4) ASCII
5) None of these Ans.) 3
Ques. : 424 When you cut or copy information it gets place in
the
1) clipart 2) clipboard
3) Internet 4) motherboard
5) None of these Ans.) 2
Ques. : 425 If you want to locate the hardware address of a
local device, which protocol would you use?
1) ARP 2) RARP
3) RAM 4) PING
5) PONG Ans.) 4
Ques. : 426 The name of the location of a particular piece of
data is its
1) address 2) memory name
3) storage site 4) data location
5) None of these Ans.) 1
Ques. : 427 Which of the following operating systems is not
owned and licensed by a company?
1) Unix 2) Linux
3) Windows 2000 4) Mac
5) Windows Ans.) 2
Ques. : 428 The MS Excel stores its documents in the form of
files which are called
1) worksheets 2) workbooks
3) notebooks 4) excel sheets
5) None of these Ans.) 1
Ques. : 429 ________ view shows how the contents on printed
page will appear with margin, header and footer.
1) Draft 2) Full screen reading
3) Outline 4) Page layout
5) None of these Ans.) 4
Ques. : 430 What menu is selected to cut, copy and paste?
1) File 2) Edit
3) Tools 4) Table
5) None of these Ans.) 1
Ques. : 431 Personal computers are connected to form
1) Super computer 2) Mainframe computers
3) Enterprise 4) Network
5) Server Ans.) 4
Ques. : 432 What does remain in RAM when computer is
turned off?
1) Operating System 2) BICS
3) Software Application 4) Nothing
5) None of these Ans.) 4
Ques. : 433 Information travels between components on the
motherboard through
1) flash memory 2) CMOS
3) bays 4) buses
5) None of these Ans.) 4
Ques. : 434 In a relational database, this is a data structure that
organises the information about a single topic into rows
and columns.
1) block 2) record
3) tuple 4) table
5) None of these Ans.) 4
Ques. : 435 For seeing the output, which of the following is
used?
1) Scanner 2) Keyboard
3) Mouse 4) Monitor
5) None of these Ans.) 4
Ques. : 436 The simultaneous execution of two or more
instructions is called
1) sequential access 2) reduced instruction set computing
3) multiprocessing 4) disk mirroring
5) None of these Ans.) 3
Ques. : 437 Multiprogramming systems
1) are easier to develop than single programming
systems 2) execute each job faster
3) execute more jobs in the same time period 4) use only one
large mainframe computer
5) None of these Ans.) 3
Ques. : 438 Which device can understand the difference
between data and program?
1) Input device 2) Output device
3) Memory 4) Microprocessor
5) None of these Ans.) 4
Ques. : 439 Which of the following devices has a limitation
that we can only read it but cannot erase or modify it?
1) Magnetic tape 2) Hard disk
3) Compact disk 4) Floppy disk
5) None of these Ans.) 3
Ques. : 440 Which of the following is not an output device?
1) Plotter 2) Printer
3) Monitor 4) Joystick
5) None of these Ans.) 4
Ques. : 441 What kind of scheme is the HTTP protocol?
1) get/put 2) store/forward
3) queuing 4) search/return
5) request/response Ans.) 5
Ques. : 442 What type of error does a memory parity error
create?
1) A fatal exception error 2) An NMI error
3) A corrupt Windows operating system file 4) A GPF error
5) A GPA error Ans.) 2
Ques. : 443 Which of the following cannot be used as the
scope when using a JavaBean with JSP?
1) Page 2) Request
3) Session 4) Application
5) Response Ans.) 5
Ques. : 444 Devices that let the computer communicate with
you are _________ devices.
1) input 2) output
3) processing 4) storage
5) None of these Ans.) 2
Ques. : 445 Eight bits of data is called
1) octabit 2) word
3) sentence 4) byte
5) None of these Ans.) 4
Ques. : 446 The secret code that gives you access to some
programs:
1) clue 2) cue
3) password 4) help
5) None of these Ans.) 3
Ques. : 447 The different styles of lettering in a word
processing program.
1) font 2) calligraphy
3) writing 4) manuscript
5) None of these Ans.) 1
Ques. : 448 An example of a processings device would be
1) a magnetic ink reader 2) a tablet PC
3) Special function cards 4) scanners
5) None of these Ans.) 2
Ques. : 449 The main memory of a computer can also be
called
1) Secondary storage 2) Internal storage
3) Random Access Memory 4) All the above
5) None of these Ans.) 3
Ques. : 450 A saved document is referred to as a
1) file 2) word
3) folder 4) project
5) None of these Ans.) 1
Ques. : 451 By default, Excel positions text in a cell
1) leftaligned
2) rightaligned
3) centered 4) justified
5) None of these Ans.) 1
Ques. : 452 Errors in computer programs are referred to as
1) bugs 2) mistakes
3) item overlooked 4) blunders
5) None of these Ans.) 1
Ques. : 453 A compiler is used to translate a program written
in
1) a low level language 2) a highlevel
language
1) RAM 2) ROM
3) FDD 4) HDD
5) None of these Ans.) 1
Ques. : 479 Which of the following is NOT a logic gate?
1) AND 2) OR
3) NAND 4) NOR
5) None of these Ans.) 5
Ques. : 480 The difference between people with access to
computers and the Internet and those without this access is
known as the
1) digital divide 2) Internet divide
3) Web divide 4) broadband divide
5) None of these Ans.) 1
Ques. : 481 DSL is example of a(n) _____________
connection.
1) network 2) wireless
3) slow 4) broadband
5) None of these Ans.) 4
Ques. : 482 __________ is the study of molecules and
strctures whose size ranges from 1 to 100 Nanometers?
1) Nanoscience 2) Microelectrodes
3) Computer Forensics 4) Artificial intelligence
5) None of these Ans.) 1
Ques. : 483 The name for the way with which computers
manipulate data into information is called
1) programming 2) processing
3) storing 4) organising
5) None of these Ans.) 2
Ques. : 484 After a picture has been taken with a digital
camera and processed appropriately, the actual print of the
picture is considered a(n)
1) data 2) output
3) input 4) process
5) None of these Ans.) 2
Ques. : 485 A command that takes what has been typed into
the computer and can be seen on the screen and sends it to
the printer for output on paper
1) print 2) return
3) jump 4) attention
5) None of these Ans.) 1
Ques. : 486 The key which lets you exit a program when
pushed
1) arrow key 2) spacebar
3) escape key 4) return key
5) None of these Ans.) 3
Ques. : 487 The ability of an OS to run more than one
application at a time is called
1) multitasking 2) objectoriented
programming
3) multiuser
computing 4) timesharing
5) None of these Ans.) 1
Ques. : 488 Which of the following statements best describes
the batch method of input?
1) Data is processed as soon as it is input. 2) Data is input at
the time it is collected.
3) Data is collected in the form of source
documents, placed into groups, and then input to
the computer.
4) Source documents are not used.
5) None of these Ans.) 3
Ques. : 489 The benefit of using computers is that
document
4) developing a document by entering text using a
keyboard
5) None of these Ans.) 1
Ques. : 500 Printed information, called _________ exists
physically and is a more permanent form of output than that
presented on a display device.
1) soft copy 2) hard copy
3) carbon copy 4) desk copy
5) None of these Ans.) 2
Ques. : 501 To find a saved document in the computer's
memory and bring it up on the screen to view is called
1) reversing 2) rerunning
3) retrieving 4) returning
5) None of these Ans.) 3
Ques. : 502 The Internet is a system of
1) software bundles 2) Web pages
3) Website 4) Interconnected networks
5) None of these Ans.) 4
Ques. : 503 Code consisting of bars and lines of varying
widths or lengths that is computerreadable
is known as
1) an ASCII code 2) a magnetic tape
3) an OCR scanner 4) a bar code
5) None of these Ans.) 4
Ques. : 504 A ________ is a unique name that you give to a
file of information.
1) device letter 2) folder
3) filename 4) filename extension
5) None of these Ans.) 3
Ques. : 505 What is an email attachment?
1) A receipt sent by the recpient. 2) A separate document from
another program
sent along with an email message.
3) A malicious parasite that feeds off your
messages and destroys the contents. 4) A list of CC or BCC
recipients.
5) None of these Ans.) 2
Ques. : 506 Which of the following are all considered
advantages of email?
1) Convenience, speed of delivery, generality and
reliability 2) Printable, global and expensive
3) Global, convenience and Microsoft owned 4) Slow
delivery, reliable, global and inexpensive
5) None of these Ans.) 1
Ques. : 507 Ecommerce
allows companies to
1) issue important business reports 2) conduct business over
the Internet
3) support decision making processes 4) keep track of
paperbased
transactions
5) None of these Ans.) 2
Ques. : 508 In a client/server model, a client program
1) asks for information 2) provides information and files
3) serves software files to other computers 4) distributes data
files to other computers
5) None of these Ans.) 1
Ques. : 509 Computers manipulate data in many ways, and
this manipulation is called ________.
1) utilizing 2) batching
3) upgrading 4) processing
3) gigabyte 4) megabyte
5) None of these Ans.) 3
Ques. : 582 The _________ directory is mandatory for every
disk.
1) Root 2) Base
3) Sub 4) Case
5) None of these Ans.) 1
Ques. : 583 To prepare a presentation/slide show, which
application is commonly used?
1) Photoshop 2) Power Point
3) Outlook Express 4) Internet Explorer
5) All the above Ans.) 2
Ques. : 584 _________ is the process of carrying out
commands.
1) Fetching 2) Storing
3) Executing 4) Decoding
5) None of these Ans.) 3
Ques. : 585 Which of the following refers to the fastest,
biggest and most expensive computers?
1) Personal Computers 2) Supercomputers
3) Laptops 4) Notebooks
5) None of these Ans.) 2
Ques. : 586 Microsoft is an example of
1) an operating system 2) a processing device
3) application software 4) an input device
5) None of these Ans.) 3
Ques. : 587 ________ is the process of carrying out
commands.
1) Fetching 2) Storing
3) Decoding 4) Executing
5) None of these Ans.) 4
Ques. : 588 If you do not want to select any option after
opening a menu then click menu title again or press key
________ to close the menu.
1) Shift 2) Tab
3) Escape 4) F1
5) None of these Ans.) 3
Ques. : 589 It is easy to change the name of file using
_____________ process.
1) transforming 2) christening
3) renaming 4) retagging
5) None of these Ans.) 3
Ques. : 590 What is the minimum and maximum zoom sizes in
MS Office?
1) 10, 100 2) 20, 250
3) 10, 500 4) 10, 1000
5) None of these Ans.) 3
Ques. : 591 In Excel, _________contains one or more
worksheets.
1) Template 2) Workbook
3) Active cell 4) Label
5) None of these Ans.) 2
Ques. : 592 Which of the following is a popular programming
language for developing multimedia web pages, websites
and webbased
applications?
1) COBOL 2) Java
3) BASIC 4) Assembler
5) None of these Ans.) 2
Ques. : 593 Compiling creates a(n)
1) program specification 2) algorithm
3) executable program 4) subroutine
1) Nonsequential
writing 2) Hypermedia
3) Blinking text 4) Text with heavy formatting
5) None of these Ans.) 2
Ques. : 620 We can enter and edit text efficiently using
1) spreadsheet 2) typewriter
3) Word Processing Program 4) Desktop Publishing Program
5) None of these Ans.) 3
Ques. : 621 ________ may be included in other folder while
making heirarchical structure folder.
1) Minifolder 2) Tiered folder
3) Subfolder
4) Object
5) None of these Ans.) 3
Ques. : 622 To access properties of an object, the mouse
technique to use is __________.
1) rightclicking
2) shiftclicking
3) dragging 4) dropping
5) None of these Ans.) 1
Ques. : 623 A ________ shares hardware, software and data
among authorised users.
1) network 2) protocol
3) hypertext 4) transmitter
5) None of these Ans.) 1
Ques. : 624 Computer programs are written in a highlevel
programming language however, the humanreadable
version of a program is called
1) cache 2) instruction set
3) source code 4) world size
5) None of these Ans.) 3
Ques. : 625 In world processing, an efficient way to move the
3rd paragraph to place it after the 5th paragraph is
1) copy and paste 2) copy, cut and paste
3) cut, copy and paste 4) cut and paste
5) None of these Ans.) 4
Ques. : 626 Which of the following is an example of
connectivity?
1) Internet 2) Floppy disk
3) paper disk 4) TV disk
5) None of these Ans.) 1
Ques. : 627 ________ allows you to print.
1) Ribbon 2) Monitor
3) Go now 4) Ctrl+P
5) None of these Ans.) 4
Ques. : 628 Microsoft Office is an example of a
1) closedsource
software 2) opensource
software
3) horizontalmarket
software 4) verticalmarket
software
5) None of these Ans.) 1
Ques. : 629 A popular way to learn about computers without
ever going to a classroom is called
1) ilerning
2) isolated learning
3) elearning
4) close learning
5) None of these Ans.) 3
Ques. : 630 A person who uses his/her expertise to gain access
to other people's computers to get information illegally or
do damage is a
8/18/2015 IBPS PO Coaching | IBPS PO/Clerk coaching |
Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi |
SSC coaching in Delhi | IBPS online Test | B
http://bscacademy.com/BscStudent/BscStuPrintQuestionOfDa
y.aspx 60/61
1) spammer 2) hacker
3) instant messanger 4) All of the above
5) None of these Ans.) 2
Ques. : 631 Binary coded decimal (BCD) numbers express
each decimal digit as a
1) bit 2) byte
3) nibble 4) binary digit
5) word Ans.) 3
Ques. : 632 One nibble is equal to
1) 2 bits 2) 4 bits
3) 6 bits 4) 8 bits
5) None of these Ans.) 2
Ques. : 633 What may happen if a worksheet is not protected?
1) It cannot be opened. 2) It cannot be saved.
3) It cannot be edited. 4) It can be edited.
5) All cells get locked Ans.) 4
Ques. : 634 What is a firmware?
1) A program started in RAM. 2) A program started in a file.
3) A program started in boot sector. 4) A program started in
ROM.
5) None of these Ans.) 4
Ques. : 635 'TWAIN' is related to which of the following?
1) Printer 2) Keyboard
3) Mouse 4) Monitor
5) Scanner Ans.) 5
Ques. : 636 The Internet is an example of __________
network.
1) star 2) bus
3) hybrid 4) mesh
5) ring Ans.) 4
Ques. : 637 Blueprints are usually created using
____________software.
1) CGI 2) Paint
3) Draw 4) CAD
5) API Ans.) 4
Ques. : 638 The power of a spreadsheet lies in its
1) cells 2) formulas
3) labels 4) worksheets
5) row and columns Ans.) 2
Ques. : 639 IP address consists of how many bits?
1) 16 bits 2) 8 bits
3) 30 bits 4) 32 bits
5) 36 bits Ans.) 4
Ques. : 640 Which storage decive is mounted on 'reels'?
1) Floppy disk 2) CDROM
3) Magnetic disk 4) Magnetic tape
5) Hard disk Ans.) 4
Ques. : 641 A paint program keeps track of every _________
placed on the screen.
8/18/2015 IBPS PO Coaching | IBPS PO/Clerk coaching |
Bank Clerk Coaching in Delhi | Bank PO Coaching in Delhi |
SSC coaching in Delhi | IBPS online Test | B
http://bscacademy.com/BscStudent/BscStuPrintQuestionOfDa
y.aspx 61/61
1) Image 2) object
3) pixel 4) color
5) symbol Ans.) 3
Ques. : 642 Rules of a programming language are called
1) procedures 2) calls
3) methods 4) login
5) syntax Ans.) 5
Ques. : 643 A primary key can also be called a
1) super key 2) candidate key
3) alternate key 4) secondary key
5) foreign key Ans.) 2