question_answer 1) The scrambling of code is known as:
A)
Encryption
done
clear
B)
Firewalling
done
clear
C)
Scrambling
done
clear
D)
Deception
done
clear
E)
Permuting
done
clear
View Answer play_arrow
question_answer 2) What is the full form of VoIP?
A)
Voice of Internet Power
done
clear
B)
Voice over Internet Protocol
done
clear
C)
Voice on Internet Protocol
done
clear
D)
Very Optimized Internet Protocol
done
clear
E)
Very Official Internet Protocol
done
clear
View Answer play_arrow
question_answer 3) Why do you log off from your computer when going out from your office?
A)
Someone might steal tour files, passwords etc.
done
clear
B)
In order to save electricity.
done
clear
C)
logging off is essential to increase performance.
done
clear
D)
logging off is mandatory you before go out
done
clear
E)
logging off is a good exercise to perform regularly.
done
clear
View Answer play_arrow
question_answer 4) Which of the following is not responsible for the performance of the computer?
A)
no. of keys in the keyboard.
done
clear
B)
name of the video/ graphics word.
done
clear
C)
memory in the video/graphics word.
done
clear
D)
the clock speed of the processor.
done
clear
E)
no. of cores available in the processor.
done
clear
View Answer play_arrow
question_answer 5) Which of the following is used to access a file from the computer store?
A)
insert
done
clear
B)
retrieve
done
clear
C)
file
done
clear
D)
print
done
clear
E)
find
done
clear
View Answer play_arrow
question_answer 6) Hard drive is used to store
A)
volatile data
done
clear
B)
non-volatile data
done
clear
C)
permanent data
done
clear
D)
temporary data
done
clear
E)
intermediate data
done
clear
View Answer play_arrow
question_answer 7) Which of the following is the combination of numbers, alphabets along with username used to get access to user account?
A)
Password
done
clear
B)
user-name
done
clear
C)
Title name
done
clear
D)
host-id
done
clear
E)
screen name
done
clear
View Answer play_arrow
question_answer 8) Which of the following is the type of software that has self-replicating software that causes damage to files and system?
A)
Viruses
done
clear
B)
Trojan horses
done
clear
C)
Bots
done
clear
D)
Worms
done
clear
E)
Backdoors
done
clear
View Answer play_arrow
question_answer 9) ______ is used for very large files or where a fast response time is not critical. The files to be transmitted are gathered over a period and then send together as a batch.
A)
Batch processing
done
clear
B)
Online processing
done
clear
C)
File processing
done
clear
D)
Data processing
done
clear
E)
Text processing
done
clear
View Answer play_arrow
question_answer 10) Which of the following system is a function of dedicated PCs?
A)
meant for a single user
done
clear
B)
meant for the single task
done
clear
C)
deal with single software
done
clear
D)
deal with only editing
done
clear
E)
deal for music purpose
done
clear
View Answer play_arrow
question_answer 11) What can possibly be the drawback of e-mails?
A)
requires being physically delivered to the user.
done
clear
B)
emails infects computer.
done
clear
C)
emails are very expensive to transmit.
done
clear
D)
emails are slow to load.
done
clear
E)
people don t check emails regularly.
done
clear
View Answer play_arrow
question_answer 12) Which of the following is a valid email address?
A)
done
clear
B)
done
clear
C)
done
clear
D)
done
clear
E)
done
clear
View Answer play_arrow
question_answer 13) Which of the following character set supports Japanese and Chinese font?
A)
EBCDIC
done
clear
B)
ASCII
done
clear
C)
BC
done
clear
D)
ECBI
done
clear
E)
Unicode
done
clear
View Answer play_arrow
question_answer 14) What is the full form of RTF?
A)
Richer Text Formatting
done
clear
B)
Rich Text Format
done
clear
C)
Right Text Fishing
done
clear
D)
Right Text Font
done
clear
E)
Rich Text Font
done
clear
View Answer play_arrow
question_answer 15) Which of the following is the text alignment available in word processing software that adjusts the left margin while keeping the right margin in anyway?
A)
Justify
done
clear
B)
Left justify
done
clear
C)
Right justify
done
clear
D)
Centre
done
clear
E)
Orientation
done
clear
View Answer play_arrow
question_answer 16) Which of the following is false about the clock of the system?
A)
It is the property of the toolbar
done
clear
B)
The system can periodically refresh the time by synchronizing with a time source
done
clear
C)
System time is the current date and time of day.
done
clear
D)
The system keeps time so that your applications have ready access to accurate time.
done
clear
E)
The system bases system time on coordinated universal time (UT.
done
clear
View Answer play_arrow
question_answer 17) Which of the following are properties of USB?
A)
Platform independent
done
clear
B)
Platform dependent
done
clear
C)
Source dependent
done
clear
D)
Software dependent
done
clear
E)
Software independent
done
clear
View Answer play_arrow
question_answer 18) An act of sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information?
A)
Phishing
done
clear
B)
Spam
done
clear
C)
hacking
done
clear
D)
cracking
done
clear
E)
Malware
done
clear
View Answer play_arrow
question_answer 19) Which of the following is the organized collection of large amount of interrelated data stored In a meaningfully way used for manipulation and updating?
A)
Database
done
clear
B)
File
done
clear
C)
Folder
done
clear
D)
Data-mining
done
clear
E)
Data source
done
clear
View Answer play_arrow
question_answer 20) Which among the following cycle consists of an Input, processing, output and storage as its constituents?
A)
Processing
done
clear
B)
Output
done
clear
C)
Input
done
clear
D)
Storage
done
clear
E)
Data
done
clear
View Answer play_arrow
question_answer 21) The part of a computer that coordinates all its functions is called its.
A)
ROM program
done
clear
B)
System board
done
clear
C)
Arithmetic logic unit
done
clear
D)
Control unit
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 22) Oracle is a :
A)
RDBMS
done
clear
B)
Hardware
done
clear
C)
System software
done
clear
D)
High level language
done
clear
E)
None of the above
done
clear
View Answer play_arrow
question_answer 23) Which of the following computer languages is a mathematically oriented language used for scientific problems?
A)
FORTRAN
done
clear
B)
COBOL
done
clear
C)
LISP
done
clear
D)
PROLOG
done
clear
E)
ANDROID
done
clear
View Answer play_arrow
question_answer 24) Coded entries which are used to gain access to a computer system are called
A)
Entry codes
done
clear
B)
Passwords
done
clear
C)
Security commands
done
clear
D)
Code words
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 25) Communication between a computer and a keyboard involves ____ transmission
A)
Automatic
done
clear
B)
Half-duplex
done
clear
C)
Full-duplex
done
clear
D)
Simplex
done
clear
E)
none of the above
done
clear
View Answer play_arrow
question_answer 26) In which of the following level of OSI model, data encryption is done?
A)
Application layer
done
clear
B)
Session layer
done
clear
C)
Transport layer
done
clear
D)
Network layer
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 27) _____ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A)
The operating system
done
clear
B)
The motherboard
done
clear
C)
The platform
done
clear
D)
Application software
done
clear
E)
Hardware
done
clear
View Answer play_arrow
question_answer 28) Which of the following is not a property of fiber optic cabling?
A)
Transmits at faster speeds than copper cabling
done
clear
B)
Easier to capture a signal from than copper cabling
done
clear
C)
Very resistant to interference
done
clear
D)
Carries signals as light waves
done
clear
E)
les attenuation
done
clear
View Answer play_arrow
question_answer 29) DEL command is used to
A)
delete files
done
clear
B)
delete directory
done
clear
C)
delete labels
done
clear
D)
delete contents of file
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 30) _____ are software which
A)
used to do particular task.
done
clear
B)
Operating system
done
clear
C)
Program
done
clear
D)
Data software Data
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 31) _____ is the process of a viding the disk into tasks sectors.
A)
Alloting
done
clear
B)
Crashing
done
clear
C)
Formatting
done
clear
D)
Tracking
done
clear
E)
Decrypting
done
clear
View Answer play_arrow
question_answer 32) What type of software creates a smaller file that is faster to transfer over the internet?
A)
Compression
done
clear
B)
Fragmentation
done
clear
C)
Encapsulation
done
clear
D)
Unzipped
done
clear
E)
Abstraction
done
clear
View Answer play_arrow
question_answer 33) A process known as ____ is used by large retailers to study trends.
A)
data mining
done
clear
B)
data selection
done
clear
C)
POS
done
clear
D)
data conversion
done
clear
E)
data inversion
done
clear
View Answer play_arrow
question_answer 34) The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty is called ______.
A)
robotics
done
clear
B)
simulation
done
clear
C)
computer forensics
done
clear
D)
animation
done
clear
E)
encapsulation
done
clear
View Answer play_arrow
question_answer 35) _____ is data that has been organised and presented in a meaningful fashion.
A)
A process
done
clear
B)
Software
done
clear
C)
Storage
done
clear
D)
Information
done
clear
E)
Data
done
clear
View Answer play_arrow
question_answer 36) The components that process data are located in which of the following?
A)
input devices
done
clear
B)
output devices
done
clear
C)
system unit
done
clear
D)
storage component
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 37) The CPU and memory are located in which of the following devices?
A)
motherboard
done
clear
B)
expansion board
done
clear
C)
storage device
done
clear
D)
output device
done
clear
E)
System unit
done
clear
View Answer play_arrow
question_answer 38) ______ is the revolving around the use of nano structures to build devices on an extremely small scale.
A)
Nanotechnology
done
clear
B)
Micro-technology
done
clear
C)
Computer forensics
done
clear
D)
Artificial Intelligence
done
clear
E)
Very small scale technology
done
clear
View Answer play_arrow
question_answer 39) The steps and tasks needed to process data, such as responses to questions or clicking an Icon, are called ____.
A)
instructions
done
clear
B)
the orpating system
done
clear
C)
application software
done
clear
D)
the system unit
done
clear
E)
the hardware unit
done
clear
View Answer play_arrow
question_answer 40) Which of the metal or plastic case that holds all the physical parts of the computer?
A)
system unit
done
clear
B)
CPU
done
clear
C)
main frame
done
clear
D)
platform
done
clear
E)
micro processor
done
clear
View Answer play_arrow