-
question_answer1) ______ refers to the unauthorized copying and distribution of software.
A)
Hacking
done
clear
B)
Software Piracy
done
clear
C)
Software literacy
done
clear
D)
Cracking
done
clear
E)
Copyright
done
clear
View Answer play_arrow
-
question_answer2) Which of the following is an operating system?
A)
Linux
done
clear
B)
Debugger
done
clear
C)
Mozilla
done
clear
D)
Google Chrome
done
clear
E)
Intel 8085
done
clear
View Answer play_arrow
-
question_answer3) A collection of programs that controls how your computer system runs and processes in-formation is called
A)
Operating System
done
clear
B)
Computer
done
clear
C)
Office
done
clear
D)
Compiler
done
clear
E)
Interpreter
done
clear
View Answer play_arrow
-
question_answer4) Which of the following statements is a false conceiving file names?
A)
Every file in the same folder must have a unique name
done
clear
B)
The file name comes before the dot
done
clear
C)
File extension is another name for the type
done
clear
D)
The file extension comes before the dot (.) followed by the file name
done
clear
E)
Files may share the same name or the same extension but not both at the same time.
done
clear
View Answer play_arrow
-
question_answer5) Which is not a storage device?
A)
Printer
done
clear
B)
CD
done
clear
C)
Hard Disk
done
clear
D)
Floppy Disk
done
clear
E)
DVD
done
clear
View Answer play_arrow
-
question_answer6) _____tags, placed on animal's body can be used to record and track in a database all of the animal's movements.
A)
POS
done
clear
B)
RFID
done
clear
C)
PPS
done
clear
D)
GPS
done
clear
E)
None of these
done
clear
View Answer play_arrow
-
question_answer7) Which of the following cables can transmit data at high speeds?
A)
Flat cables
done
clear
B)
Coaxial cable
done
clear
C)
Optic fibre cable
done
clear
D)
Twisted pair cable
done
clear
E)
UTP cable
done
clear
View Answer play_arrow
-
question_answer8) The hardware device or software program that sends messages between networks is known as a
A)
Bridge
done
clear
B)
Backbone
done
clear
C)
Router
done
clear
D)
Gateway
done
clear
E)
None of these
done
clear
View Answer play_arrow
-
question_answer9) If you are performing Windows 98 operating system to Windows XP you are performing a(n)
A)
Push up
done
clear
B)
China
done
clear
C)
Patch
done
clear
D)
Update
done
clear
E)
None of these
done
clear
View Answer play_arrow
-
question_answer10) ________technology enables you to carry a powerful navigational aid in websites.
A)
Convergence
done
clear
B)
Locator
done
clear
C)
Sampling Rate
done
clear
D)
Synchronization
done
clear
E)
Global Positioning System (GPS)
done
clear
View Answer play_arrow
-
question_answer11) Which of the following is not true about RAM?
A)
RAM is the same as ha disk storage
done
clear
B)
RAM is a temporary storage area
done
clear
C)
RAM is volatile
done
clear
D)
RAM stands for Random Access Memory
done
clear
E)
Information stored in RAM gone when you turn the computer off.
done
clear
View Answer play_arrow
-
question_answer12) All of the following are examples of real security and privacy risks EXCEPT
A)
Spyware
done
clear
B)
Spam
done
clear
C)
Hackers
done
clear
D)
Identity Theft
done
clear
E)
Viruses
done
clear
View Answer play_arrow
-
question_answer13) Which of the following commands in Office 2007. Can used to go to the first cell in the current row?
A)
TAB
done
clear
B)
SHIFT + TAB
done
clear
C)
ESC + HOME
done
clear
D)
SHIFT + HOME
done
clear
E)
HOME
done
clear
View Answer play_arrow
-
question_answer14) Software such as virus worms and Trojan horses has a malicious content known as
A)
Malicious Software
done
clear
B)
adware
done
clear
C)
scare ware
done
clear
D)
Spyware
done
clear
E)
fire wall
done
clear
View Answer play_arrow
-
question_answer15) Chip is a common nickname for a(n)
A)
Transistor
done
clear
B)
Resistor
done
clear
C)
Integrated Circuit
done
clear
D)
Semiconductor
done
clear
E)
None of these
done
clear
View Answer play_arrow
-
question_answer16) What is extension of Microsoft Word document?
A)
Doc
done
clear
B)
ppt
done
clear
C)
dec
done
clear
D)
bd
done
clear
E)
hml
done
clear
View Answer play_arrow
-
question_answer17) Which of the following enables to determine how often a user visited a website?
A)
Hackers
done
clear
B)
Spammers
done
clear
C)
Phish
done
clear
D)
identity thefts
done
clear
E)
Cookies
done
clear
View Answer play_arrow
-
question_answer18) To move to the bottom of a document while working on MS word. Which command is used?
A)
Home Key
done
clear
B)
End Key
done
clear
C)
Ctrl + Page Down
done
clear
D)
Insert Key
done
clear
E)
Ctrl Key + End Key
done
clear
View Answer play_arrow
-
question_answer19) What is a person called who uses a computer to cause harm to people or destroy critical systems?
A)
Cyber terrorist
done
clear
B)
Black-hat hacker
done
clear
C)
Cyber Cracker
done
clear
D)
Hacktivist
done
clear
E)
None of these
done
clear
View Answer play_arrow
-
question_answer20) ______can interpret voice data into words that can be understood by the computer.
A)
Speech Input Hardware
done
clear
B)
Speech Recognition Software
done
clear
C)
Word Recognition Software
done
clear
D)
Talking Software
done
clear
E)
None of these
done
clear
View Answer play_arrow
-
question_answer21) Oracle is a
A)
Hardware
done
clear
B)
High Level Language
done
clear
C)
Operating System
done
clear
D)
System Software
done
clear
E)
RDBMS
done
clear
View Answer play_arrow
-
question_answer22) Which of following company developed the microprocessor?
A)
Intel
done
clear
B)
IBM
done
clear
C)
Microsoft
done
clear
D)
Apple
done
clear
E)
Google
done
clear
View Answer play_arrow
-
question_answer23) What does ALU in computing denote?
A)
Application and Logic Unit
done
clear
B)
Algorithm Logic Unit
done
clear
C)
Arithmetic Layered Unit
done
clear
D)
Arithmetic legal Unit
done
clear
E)
Arithmetic Logic Unit
done
clear
View Answer play_arrow
-
question_answer24) Integrated Circuit (1C) chips used in computers are mad with
A)
Copper
done
clear
B)
Aluminium
done
clear
C)
Gold
done
clear
D)
Silicon
done
clear
E)
Silver
done
clear
View Answer play_arrow
-
question_answer25) What does the computer abbreviation MB used for?
A)
Mega Bit
done
clear
B)
Million Bytes
done
clear
C)
Mega Bytes
done
clear
D)
Million Bit
done
clear
E)
Micro Bytes
done
clear
View Answer play_arrow
-
question_answer26) What is the full form of HTTP'
A)
Hyper Text Transfer Pro to col
done
clear
B)
Hyper Text Transition Protocol
done
clear
C)
Hyper Text Transfer Program
done
clear
D)
Hyper Text Transition Program
done
clear
E)
Hyper Text Trivial Protocol
done
clear
View Answer play_arrow
-
question_answer27) Verification of a Login name and Password is known as_______
A)
Configuration
done
clear
B)
Accessibility
done
clear
C)
Authentication
done
clear
D)
logging in
done
clear
E)
None of these
done
clear
View Answer play_arrow
-
question_answer28) Which of the following is software?
A)
Keyboard
done
clear
B)
Internet Explorer
done
clear
C)
Scanner
done
clear
D)
Mouse
done
clear
E)
Printer
done
clear
View Answer play_arrow
-
question_answer29) The term Bit is short for-
A)
Binary Digit
done
clear
B)
Binary Number
done
clear
C)
Binary Language
done
clear
D)
Small digit
done
clear
E)
One byte
done
clear
View Answer play_arrow
-
question_answer30) What does MICR stand for?
A)
Magnetic Ink Character Register
done
clear
B)
Magnetic Ink Code Reader
done
clear
C)
Magnetic Ink Code Register
done
clear
D)
Magnetic Ink Character Recognition
done
clear
E)
Magnetic Ink Cases Reader
done
clear
View Answer play_arrow
-
question_answer31) RTGS stands for-
A)
Real Time Gross Settlement
done
clear
B)
Real Time General settlement
done
clear
C)
Run Time Gross Settlement
done
clear
D)
Regular Time General Settlement
done
clear
E)
Regular Time Gross Settlement
done
clear
View Answer play_arrow
-
question_answer32) A device that converts from decimal to binary number is known as
A)
Instructor
done
clear
B)
Decoder
done
clear
C)
AND Gate
done
clear
D)
Converter
done
clear
E)
None of these
done
clear
View Answer play_arrow
-
question_answer33) What does the acronym ASCI stands for?
A)
American Standard Code for Information Interchanger
done
clear
B)
American Standard Code for Information Interchange
done
clear
C)
American Standardized Code for Information Interchange
done
clear
D)
American Standardization Code for Information Interchange
done
clear
E)
American Standardization Code for Information Inter Changer
done
clear
View Answer play_arrow
-
question_answer34) Which of the following is not a valid formula in Microsoft Excel?
A)
=A2+A1
done
clear
B)
= A2 + 1
done
clear
C)
= 1 + A2
done
clear
D)
= 1A + 2
done
clear
E)
=A1+A2
done
clear
View Answer play_arrow
-
question_answer35) What does the acronym ISP stand for?
A)
Internal Service Provider
done
clear
B)
International Service Provider
done
clear
C)
Internet Service Provider
done
clear
D)
Internet Service Providing
done
clear
E)
Internet Service Provision
done
clear
View Answer play_arrow
-
question_answer36) What is the full form of WWW?
A)
Work Wide Web
done
clear
B)
World Wide Web
done
clear
C)
World With Web
done
clear
D)
World Wide Wet
done
clear
E)
World Weak Web
done
clear
View Answer play_arrow
-
question_answer37) Which of the following is hardware?
A)
Assembler
done
clear
B)
Server
done
clear
C)
Compiler
done
clear
D)
Interpreter
done
clear
E)
OS
done
clear
View Answer play_arrow
-
question_answer38) USB in data cables stands for?
A)
Unicode Smart Bus
done
clear
B)
Universal Structural Bus
done
clear
C)
Unicode serial Bus
done
clear
D)
Universal Smart Bus
done
clear
E)
Universal Serial Bus
done
clear
View Answer play_arrow
-
question_answer39) Which of the following is not a binary number?
A)
11101
done
clear
B)
110
done
clear
C)
233
done
clear
D)
1001
done
clear
E)
100110
done
clear
View Answer play_arrow
-
question_answer40) _____ is approximately one billion bytes.
A)
Megabyte
done
clear
B)
Kilobyte
done
clear
C)
Terabyte
done
clear
D)
Gigabyte
done
clear
E)
Bit
done
clear
View Answer play_arrow