COMPUTER SCIENCE - PAGE 3
1. Among these, which are printed at the bottom of each page?
(a). Letters
(b). Pictures
(c). Numbers
(d). Footers
Answer: Option-D
2. Which of the following is the Topmost Bar of any Window?
(a). Task bar
(b). Title bar
(c). Standard tool bar
(d). Menu bar
Answer: Option-B
3. Pressing the space bar makes the carriage moves towards left
(a). By half letter space
(b). By one letter space
(c). By one and a half letter space
(d). By two letter space
Answer: Option-A
4. When you click on Draw Table option,the mouse pointer changes to a
(a). Table
(b). Tab
(c). Rows
(d). Pencil
Answer: Option-D
5. A Word Processing tool to create Professional looking documents is
(a). MS Office
(b). MS Word
(c). MS Excel
(d). MS Power point
Answer: Option-B
6. An option from File pull down menu used to close a MS word document is
(a). Exit
(b). Quit
(c). Close
(d). Open
Answer: Option-C
7. Which among the following is unavailable for fonts in MS Word?
(a). Centered
(b). Normal
(c). Raised
(d). Lowered
Answer: Option-A
8. Which is the shortcut key for changing the selected text in Italics?
(a). Ctrl+B
(b). Ctrl+I
(c). Ctrl+U
(d). Ctrl+J
Answer: Option-B
9. A picture or a graphic image that can be inserted in an MS Word Document is
(a). Clip Art
(b). Crop
(c). Word Art
(d). None of these
Answer: Option-A
10. Which feature automatically corrects mis-spelled words that are in its dictionary?
(a). Browse
(b). Auto correct
(c). Edit
(d). Paste
Answer: Option-B
11. Formatting of letters in a regular line with even space between them is called
(a). Margin
(b). Jerky motion
(c). Key tension
(d). Alignment
Answer: Option-D
12. What is the name of the bar which helps us to know the size of the letter, paragraph, table etc.
(a). Ruler bar
(b). Status bar
(c). Horizontal scroll bar
(d). Task bar
Answer: Option-A
13. Drop Caps are used in documents in order to
(a). Drop all the capital letters
(b). Automatically begin each paragraph with capital letter
(c). To begin a paragraph with a large dropped initial capital letter
(d). None of these
Answer: Option-C
14. The short-cut key to paste data is
(a). Ctrl+S
(b). Ctrl+C
(c). Ctrl+A
(d). Ctrl+V
Answer: Option-D
15. F12 key opens what?
(a). Save dialog box
(b). Open dialog box
(c). Save As dialog box
(d). Close dialog box
Answer: Option-C
16. Which among the following is not a type of page margin?
(a). Top
(b). Left
(c). Center
(d). Right
Answer: Option-C
17:-An on-line commercial site such as Flipkart.com is an example of a/an
A:-Single-user database application
B:-Multiuser database application
C:-Data mining database application
D:-E-commerce database application
Ans: D
18:-A foreign key
A:-Has nothing to do with the primary key
B:-Has different values than the primary key
C:-Is related to the primary key of a different table
D:-Is found in tables that don't have a primary key
Ans: C
19:-Group of instructions that directs a computer is called
A:-Storage
B:-Memory
C:-Program
D:-Logic
Ans: C
20:-Which of the following statement is not correct for PHP?
A:-It is a server side scripting language
B:-A PHP file may contain text, html tags or scripts
C:-It is compatible with most of the common servers used today
D:-It can run on windows and Linux systems only
Ans: D
(a). Letters
(b). Pictures
(c). Numbers
(d). Footers
Answer: Option-D
2. Which of the following is the Topmost Bar of any Window?
(a). Task bar
(b). Title bar
(c). Standard tool bar
(d). Menu bar
Answer: Option-B
3. Pressing the space bar makes the carriage moves towards left
(a). By half letter space
(b). By one letter space
(c). By one and a half letter space
(d). By two letter space
Answer: Option-A
4. When you click on Draw Table option,the mouse pointer changes to a
(a). Table
(b). Tab
(c). Rows
(d). Pencil
Answer: Option-D
5. A Word Processing tool to create Professional looking documents is
(a). MS Office
(b). MS Word
(c). MS Excel
(d). MS Power point
Answer: Option-B
6. An option from File pull down menu used to close a MS word document is
(a). Exit
(b). Quit
(c). Close
(d). Open
Answer: Option-C
7. Which among the following is unavailable for fonts in MS Word?
(a). Centered
(b). Normal
(c). Raised
(d). Lowered
Answer: Option-A
8. Which is the shortcut key for changing the selected text in Italics?
(a). Ctrl+B
(b). Ctrl+I
(c). Ctrl+U
(d). Ctrl+J
Answer: Option-B
9. A picture or a graphic image that can be inserted in an MS Word Document is
(a). Clip Art
(b). Crop
(c). Word Art
(d). None of these
Answer: Option-A
10. Which feature automatically corrects mis-spelled words that are in its dictionary?
(a). Browse
(b). Auto correct
(c). Edit
(d). Paste
Answer: Option-B
11. Formatting of letters in a regular line with even space between them is called
(a). Margin
(b). Jerky motion
(c). Key tension
(d). Alignment
Answer: Option-D
12. What is the name of the bar which helps us to know the size of the letter, paragraph, table etc.
(a). Ruler bar
(b). Status bar
(c). Horizontal scroll bar
(d). Task bar
Answer: Option-A
13. Drop Caps are used in documents in order to
(a). Drop all the capital letters
(b). Automatically begin each paragraph with capital letter
(c). To begin a paragraph with a large dropped initial capital letter
(d). None of these
Answer: Option-C
14. The short-cut key to paste data is
(a). Ctrl+S
(b). Ctrl+C
(c). Ctrl+A
(d). Ctrl+V
Answer: Option-D
15. F12 key opens what?
(a). Save dialog box
(b). Open dialog box
(c). Save As dialog box
(d). Close dialog box
Answer: Option-C
16. Which among the following is not a type of page margin?
(a). Top
(b). Left
(c). Center
(d). Right
Answer: Option-C
17:-An on-line commercial site such as Flipkart.com is an example of a/an
A:-Single-user database application
B:-Multiuser database application
C:-Data mining database application
D:-E-commerce database application
Ans: D
18:-A foreign key
A:-Has nothing to do with the primary key
B:-Has different values than the primary key
C:-Is related to the primary key of a different table
D:-Is found in tables that don't have a primary key
Ans: C
19:-Group of instructions that directs a computer is called
A:-Storage
B:-Memory
C:-Program
D:-Logic
Ans: C
20:-Which of the following statement is not correct for PHP?
A:-It is a server side scripting language
B:-A PHP file may contain text, html tags or scripts
C:-It is compatible with most of the common servers used today
D:-It can run on windows and Linux systems only
Ans: D
21:-The tracks on a disk which can be accessed without repositioning the R/W heads is
A:-Cylinder
B:-Surface
C:-Cluster
D:-All of these
Ans: A
22:-Which of the following is the 1's complement of 10?
A:-110
B:-01
C:-11
D:-10
Ans: B
23:-Which unit interprets program instructions and initiate control opertaions?
A:-Input unit
B:-Storage unit
C:-Control unit
D:-ALU
Ans: C
24:-The first microprocessor built by the Intel Corporation
A:-8008
B:-8080
C:-8085
D:-4004
Ans: D
25:-SSI stands for
A:-Script Side Includes
B:-Server Script Includes
C:-Server Side Includes
D:-None of these
Ans: C
26:-The Machine that are connected to the Server
A:-Workstations
B:-Clients
C:-Nodes
D:-All of these
Ans: D
27:-Which statement is used in conjunction with the aggregate functions to group the result-set by one or more columns?
A:-Order By
B:-Group By
C:-LIKE
D:-WHERE
Ans: B
28:-Which Do....Loop statement should be used to process test scores where a test score over 10 is a signal to stop the processing?
A:-Do Until Score > 10
B:-Do While Score > 10
C:-Loop Until Score > 10
D:-Loop While Score > 10
Ans: A
29:-The person contributing the idea of the stored program concept
A:-Charles Babbage
B:-John von Neumann
C:-Howard Aiken
D:-Basic Pascal
Ans: B
30:-The ASCII code for the character A
A:-0110 0000
B:-0110 0001
C:-0100 0001
D:-0100 0000
Ans: C
31:-Number of rows in a relation
A:-Cardinality
B:-Degree
C:-Attribute
D:-Tuple
Ans: A
32:-An advantage of overlapped processing activity
A:-More effective use of the CPU
B:-Increased processing activities for the entire system
C:-Better coordination of I/O activities
D:-All of the above
Ans: D
33:-Which is not a type of Select Case test construct?
A:-Complex value
B:-Simple value
C:-Relational value with Is
D:-Range of values with To
Ans: A
34:-Convert binary number 1011101001010111 to hexadecimal number
A:-`(C8F9)_(16)`
B:-`(B857)_(16)`
C:-`(BA57)_(16)`
D:-`(C9F8)_(16)`
Ans: C
35:-ASCII stands for
A:-American security code for information interchange
B:-American standard code for information interchange
C:-American Scientific code for information interchange
D:-American standard code for interchange information
Ans: B
36:-The symbols used in an assembly language
A:-Mnemonics
B:-Codes
C:-Assembler
D:-All of these
Ans: A
37:-Which computer has been designed to be as compact as possible?
A:-Mini
B:-Super computer
C:-Mainframe
D:-Micro computer
Ans: D
38:-Which HTML tag does not use an end tag?
A:-<B>
B:-<Center>
C:-<HR>
D:-<U>
Ans: C
39:-Which of the following can store information in the form of microscopic pits on metal disks?
A:-Tape cassettes
B:-Laser disks
C:-RAM cartridge
D:-Punched cards
Ans: B
40:-Which VB property determines whether a control is displayed to the user?
A:-Hide
B:-Show
C:-Enabled
D:-Visible
Ans: D
41:-Batch files contain a group of MS-DOS commands that are run in successive order. What filename extension identifies batch files
A:-BAT
B:-COM
C:-EXE
D:-SYS
Ans: A
42:-A computer has a 1024 K memory. What does the letter K stands for
A:-512
B:-1000
C:-2048
D:-1024
Ans: D
43:-An optical input device that interprets pencil marks on paper media is
A:-Punch card reader
B:-O.M.R.
C:-Optical scanners
D:-MICR
Ans: B
44:-In magnetic disks, data is organized on the platter in a concentric sets of rings called
A:-Track
B:-Sector
C:-Head
D:-Block
Ans: A
45:-With A = False and B= True, which statement evaluates as True
A:-A AND A
B:-A AND B
C:-B AND B
D:-B AND A
Ans: C
46:-Which is true about the primary key?
A:-Every table should have a primary key
B:-A primary key exclusively identifies each row in a table
C:-A primary key can be made of multiple fields
D:-All of the above
Ans: D
47:-The binary equivalent of the Octal number 12.64
A:-1010.1011
B:-1101.1010
C:-1010.1101
D:-1101.1110
Ans: C
48:-The following are functions of a DBMS except
A:-Creating databases
B:-Creating and processing forms
C:-Processing data
D:-Administrating databases
Ans: B
49:-Which selection process is an example of multiple branches from a single expression?
A:-Select Case
B:-If...Then
C:-Do...Loop
D:-For...Next
Ans: A
50:-A CPU's processing power is measured in
A:-IPS
B:-CIPS
C:-Nano-Seconds
D:-MIPS
Ans: D
51:-SQL stands for
A:-Sequential Query Language
B:-Structured Query Language
C:-Structured Language
D:-Sequential Language
Ans: B
52:-What is the byte capacity of a drum which is 5 inch high, 10 inch diameter, and which has 40 tracks per inch and bit density of 600 bits per inch?
A:-471000 bytes
B:-942000 bytes
C:-3768000 bytes
D:-58875 bytes
Ans: A
53:-Which of the following is non-impact printer?
A:-Drum printer
B:-Line printer
C:-Laser printer
D:-Chain printer
Ans: C
54:-A networking device used to connect similar types of LANs
A:-Repeater
B:-Hub
C:-Bridge
D:-Modem
Ans: C
55:-What was the name of the first stored program electronic computer which was built in 1949 at Cambridge University in England?
A:-EDSAC
B:-EDVAC
C:-UNIVAC
D:-MARK-I
Ans: A
56:-When an input electrical signal A = 10100 is applied to a NOT gate, its output signal
A:-11100
B:-01011
C:-10101
D:-10100
Ans: B
57:-The institution set up by the Government of India to provide computer based information services to Government departments
A:-CDAC
B:-C-DIT
C:-DOEACC
D:-NIC
Ans: D
58:-Which of the following memory needs refreshing?
A:-DRAM
B:-SRAM
C:-ROM
D:-All of these
Ans: A
59:-A billionth of a second is defined as a
A:-Millisecond
B:-Microsecond
C:-Picosecond
D:-Nanosecond
Ans: D
60:-Kishor was asked to prepare a multimedia presentation as part of NSS project. Which of the following software can be made use of
A:-Notepad
B:-Excel
C:-Power point
D:-Access
Ans: C
61:-A tuple in relational algebra refers to
A:-Column
B:-Row
C:-Table
D:-Relation
Ans: B
62:-Which DOS command is used to delete the directory and all its contents in one step?
A:-DEL*.*
B:-RD
C:-CD
D:-DELTREE
Ans: D
63:-Which of the following is volatile?
A:-RAM
B:-ROM
C:-DVD
D:-Magnetic disk
Ans: A
64:-The SQL ALTER statement can be used to
A:-Change the table data
B:-Change the table structure
C:-Add rows to the table
D:-Delete rows from the table
Ans: B
65:-One byte can be used to encode any integer between 0 and
A:-16
B:-256
C:-255
D:-128
Ans: C
66:-Which of the following is not an Anti-virus software?
A:-McAfee
B:-Norton
C:-Trojan
D:-AVG
Ans: C
67:-A temporary storage area attached to the CPU for I/O operations
A:-Buffer
B:-Chip
C:-Register
D:-Core
Ans: A
68:-Which is a secondary memory device?
A:-Cache
B:-ALU
C:-RAM
D:-Magnetic Disk
Ans: D
69:-What is the HTML tag for creating a hyper link?
A:-A name
B:-A href
C:-A ref
D:-A url
Ans: B
70:-A multi programming system is one that can
A:-Share hardware resources with many programs simultaneously
B:-Run very fast
C:-Compute many programs simultaneously
D:-Use many operating systems
Ans: A
71:-Each site hosted on internet has a specific address called
A:-WWW
B:-URL
C:-HTTP
D:-WAIS
Ans: B
A:-Cylinder
B:-Surface
C:-Cluster
D:-All of these
Ans: A
22:-Which of the following is the 1's complement of 10?
A:-110
B:-01
C:-11
D:-10
Ans: B
23:-Which unit interprets program instructions and initiate control opertaions?
A:-Input unit
B:-Storage unit
C:-Control unit
D:-ALU
Ans: C
24:-The first microprocessor built by the Intel Corporation
A:-8008
B:-8080
C:-8085
D:-4004
Ans: D
25:-SSI stands for
A:-Script Side Includes
B:-Server Script Includes
C:-Server Side Includes
D:-None of these
Ans: C
26:-The Machine that are connected to the Server
A:-Workstations
B:-Clients
C:-Nodes
D:-All of these
Ans: D
27:-Which statement is used in conjunction with the aggregate functions to group the result-set by one or more columns?
A:-Order By
B:-Group By
C:-LIKE
D:-WHERE
Ans: B
28:-Which Do....Loop statement should be used to process test scores where a test score over 10 is a signal to stop the processing?
A:-Do Until Score > 10
B:-Do While Score > 10
C:-Loop Until Score > 10
D:-Loop While Score > 10
Ans: A
29:-The person contributing the idea of the stored program concept
A:-Charles Babbage
B:-John von Neumann
C:-Howard Aiken
D:-Basic Pascal
Ans: B
30:-The ASCII code for the character A
A:-0110 0000
B:-0110 0001
C:-0100 0001
D:-0100 0000
Ans: C
31:-Number of rows in a relation
A:-Cardinality
B:-Degree
C:-Attribute
D:-Tuple
Ans: A
32:-An advantage of overlapped processing activity
A:-More effective use of the CPU
B:-Increased processing activities for the entire system
C:-Better coordination of I/O activities
D:-All of the above
Ans: D
33:-Which is not a type of Select Case test construct?
A:-Complex value
B:-Simple value
C:-Relational value with Is
D:-Range of values with To
Ans: A
34:-Convert binary number 1011101001010111 to hexadecimal number
A:-`(C8F9)_(16)`
B:-`(B857)_(16)`
C:-`(BA57)_(16)`
D:-`(C9F8)_(16)`
Ans: C
35:-ASCII stands for
A:-American security code for information interchange
B:-American standard code for information interchange
C:-American Scientific code for information interchange
D:-American standard code for interchange information
Ans: B
36:-The symbols used in an assembly language
A:-Mnemonics
B:-Codes
C:-Assembler
D:-All of these
Ans: A
37:-Which computer has been designed to be as compact as possible?
A:-Mini
B:-Super computer
C:-Mainframe
D:-Micro computer
Ans: D
38:-Which HTML tag does not use an end tag?
A:-<B>
B:-<Center>
C:-<HR>
D:-<U>
Ans: C
39:-Which of the following can store information in the form of microscopic pits on metal disks?
A:-Tape cassettes
B:-Laser disks
C:-RAM cartridge
D:-Punched cards
Ans: B
40:-Which VB property determines whether a control is displayed to the user?
A:-Hide
B:-Show
C:-Enabled
D:-Visible
Ans: D
41:-Batch files contain a group of MS-DOS commands that are run in successive order. What filename extension identifies batch files
A:-BAT
B:-COM
C:-EXE
D:-SYS
Ans: A
42:-A computer has a 1024 K memory. What does the letter K stands for
A:-512
B:-1000
C:-2048
D:-1024
Ans: D
43:-An optical input device that interprets pencil marks on paper media is
A:-Punch card reader
B:-O.M.R.
C:-Optical scanners
D:-MICR
Ans: B
44:-In magnetic disks, data is organized on the platter in a concentric sets of rings called
A:-Track
B:-Sector
C:-Head
D:-Block
Ans: A
45:-With A = False and B= True, which statement evaluates as True
A:-A AND A
B:-A AND B
C:-B AND B
D:-B AND A
Ans: C
46:-Which is true about the primary key?
A:-Every table should have a primary key
B:-A primary key exclusively identifies each row in a table
C:-A primary key can be made of multiple fields
D:-All of the above
Ans: D
47:-The binary equivalent of the Octal number 12.64
A:-1010.1011
B:-1101.1010
C:-1010.1101
D:-1101.1110
Ans: C
48:-The following are functions of a DBMS except
A:-Creating databases
B:-Creating and processing forms
C:-Processing data
D:-Administrating databases
Ans: B
49:-Which selection process is an example of multiple branches from a single expression?
A:-Select Case
B:-If...Then
C:-Do...Loop
D:-For...Next
Ans: A
50:-A CPU's processing power is measured in
A:-IPS
B:-CIPS
C:-Nano-Seconds
D:-MIPS
Ans: D
51:-SQL stands for
A:-Sequential Query Language
B:-Structured Query Language
C:-Structured Language
D:-Sequential Language
Ans: B
52:-What is the byte capacity of a drum which is 5 inch high, 10 inch diameter, and which has 40 tracks per inch and bit density of 600 bits per inch?
A:-471000 bytes
B:-942000 bytes
C:-3768000 bytes
D:-58875 bytes
Ans: A
53:-Which of the following is non-impact printer?
A:-Drum printer
B:-Line printer
C:-Laser printer
D:-Chain printer
Ans: C
54:-A networking device used to connect similar types of LANs
A:-Repeater
B:-Hub
C:-Bridge
D:-Modem
Ans: C
55:-What was the name of the first stored program electronic computer which was built in 1949 at Cambridge University in England?
A:-EDSAC
B:-EDVAC
C:-UNIVAC
D:-MARK-I
Ans: A
56:-When an input electrical signal A = 10100 is applied to a NOT gate, its output signal
A:-11100
B:-01011
C:-10101
D:-10100
Ans: B
57:-The institution set up by the Government of India to provide computer based information services to Government departments
A:-CDAC
B:-C-DIT
C:-DOEACC
D:-NIC
Ans: D
58:-Which of the following memory needs refreshing?
A:-DRAM
B:-SRAM
C:-ROM
D:-All of these
Ans: A
59:-A billionth of a second is defined as a
A:-Millisecond
B:-Microsecond
C:-Picosecond
D:-Nanosecond
Ans: D
60:-Kishor was asked to prepare a multimedia presentation as part of NSS project. Which of the following software can be made use of
A:-Notepad
B:-Excel
C:-Power point
D:-Access
Ans: C
61:-A tuple in relational algebra refers to
A:-Column
B:-Row
C:-Table
D:-Relation
Ans: B
62:-Which DOS command is used to delete the directory and all its contents in one step?
A:-DEL*.*
B:-RD
C:-CD
D:-DELTREE
Ans: D
63:-Which of the following is volatile?
A:-RAM
B:-ROM
C:-DVD
D:-Magnetic disk
Ans: A
64:-The SQL ALTER statement can be used to
A:-Change the table data
B:-Change the table structure
C:-Add rows to the table
D:-Delete rows from the table
Ans: B
65:-One byte can be used to encode any integer between 0 and
A:-16
B:-256
C:-255
D:-128
Ans: C
66:-Which of the following is not an Anti-virus software?
A:-McAfee
B:-Norton
C:-Trojan
D:-AVG
Ans: C
67:-A temporary storage area attached to the CPU for I/O operations
A:-Buffer
B:-Chip
C:-Register
D:-Core
Ans: A
68:-Which is a secondary memory device?
A:-Cache
B:-ALU
C:-RAM
D:-Magnetic Disk
Ans: D
69:-What is the HTML tag for creating a hyper link?
A:-A name
B:-A href
C:-A ref
D:-A url
Ans: B
70:-A multi programming system is one that can
A:-Share hardware resources with many programs simultaneously
B:-Run very fast
C:-Compute many programs simultaneously
D:-Use many operating systems
Ans: A
71:-Each site hosted on internet has a specific address called
A:-WWW
B:-URL
C:-HTTP
D:-WAIS
Ans: B
72. Access to a computer program that bypasses security mechanism is called
A) Backdoor B) Trojan horse
C) Strom worm D) None of these
Ans: A
73. The keystrokes Ctrl + I in MS Word is used to
A) Increase font size
B) Inserts a line break
C) Indicate the text should be bold
D) Applies italic format to selected text
Ans: D
74. Sniffing is a technique used for
A) Attack computer hardware B) Attack computer software
C) Attack operating system D) Attack wireless network
Ans: D
75. In Microsoft PowerPoint two kind of sound effects files that can be added to the presentation are
A) .wav files and .mid files B) .wav files and .gif files
C) .wav files and .jpg files D) .jpg files and .gif files
Ans: A
76. Which key deletes text before, or the left of, the insertion point ?
A) Backspace B) Page up
C) Delete D) Page down
Ans: A
77. Which of the following is India’s first Cyber Law ?
A) ITA 1998 B) ITA 1999
C) ITA 2000 D) ITA 2001
Ans: C
78. Which of the following is a cyber crime ?
A) Hacking B) Worm attack
C) Virus attack D) All of these
Ans: D
79. What feature will you use to apply motion effects in between a slide exits and another enters ?
A) Slide transition B) Slide design
C) Animation objects D) Animation scheme
Ans: A
80. This is a program in which malicious or harmful code is contained inside apparently harmless programming or data.
A) War dialler B) Spam trap
C) Trojan horse D) E-mail
Ans: C
81. ODBC stands for
A) Object Database Connectivity
B) Oral Database Connectivity
C) Oracle Database Connectivity
D) Open Database Connectivity
Ans: D
82. A storage device that is connected directly to a network is an example of
A) Network attached storage B) Storage area network
C) Direct attached storage D) RAID
Ans: A
83. Programs that multiply like viruses but spread from computer to computer are called as
A) Worms B) Honeypot
C) Boot D) None of these
Ans: A
84. To start slide show of a presentation
A) Hit F5 key
B) From Slide Show menu choose View Show option
C) From Slide Show menu choose Rehearse timing
D) Both A) and B)
Ans: A
A) Backdoor B) Trojan horse
C) Strom worm D) None of these
Ans: A
73. The keystrokes Ctrl + I in MS Word is used to
A) Increase font size
B) Inserts a line break
C) Indicate the text should be bold
D) Applies italic format to selected text
Ans: D
74. Sniffing is a technique used for
A) Attack computer hardware B) Attack computer software
C) Attack operating system D) Attack wireless network
Ans: D
75. In Microsoft PowerPoint two kind of sound effects files that can be added to the presentation are
A) .wav files and .mid files B) .wav files and .gif files
C) .wav files and .jpg files D) .jpg files and .gif files
Ans: A
76. Which key deletes text before, or the left of, the insertion point ?
A) Backspace B) Page up
C) Delete D) Page down
Ans: A
77. Which of the following is India’s first Cyber Law ?
A) ITA 1998 B) ITA 1999
C) ITA 2000 D) ITA 2001
Ans: C
78. Which of the following is a cyber crime ?
A) Hacking B) Worm attack
C) Virus attack D) All of these
Ans: D
79. What feature will you use to apply motion effects in between a slide exits and another enters ?
A) Slide transition B) Slide design
C) Animation objects D) Animation scheme
Ans: A
80. This is a program in which malicious or harmful code is contained inside apparently harmless programming or data.
A) War dialler B) Spam trap
C) Trojan horse D) E-mail
Ans: C
81. ODBC stands for
A) Object Database Connectivity
B) Oral Database Connectivity
C) Oracle Database Connectivity
D) Open Database Connectivity
Ans: D
82. A storage device that is connected directly to a network is an example of
A) Network attached storage B) Storage area network
C) Direct attached storage D) RAID
Ans: A
83. Programs that multiply like viruses but spread from computer to computer are called as
A) Worms B) Honeypot
C) Boot D) None of these
Ans: A
84. To start slide show of a presentation
A) Hit F5 key
B) From Slide Show menu choose View Show option
C) From Slide Show menu choose Rehearse timing
D) Both A) and B)
Ans: A
85. MTBF means
A) Mean Time Between Failure B) Master Time Buffer Feature
C) Most Treated Buffer Time D) Master Test Board Feature
Ans: A
86. A computer in a network is identified by
A) IP Address
B) Place where it is kept
C) Log in ID and Password of the user
D) All the above
Ans: A
87. USB port in a computer is used to connect
A) Pen Drive B) Mouse
C) Keyboard D) All the above
Ans: D
88. SCSI is a term related with
A) Storage B) Network Data Transfer
C) Keystroke Rate D) Picture Resolution
Ans: A
89. Direct X is a
A) Computer part
B) Software that drives Graphic hardware
C) A user interface
D) None of these
Ans: B
90. FAT stands for
A) File Accommodation Table
B) File Access Tape
C) File Allocation Table
D) File Activity Table
Ans: C
91. Which of the following are true about firewalls ?
A) Filters network traffic
B) Can be either a hardware or software device
C) Follows a set of rules
D) All the above
Ans: D
92. A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is known as
A) Hacker B) Spammer
C) Analyst D) Programmer
Ans: A
A) Mean Time Between Failure B) Master Time Buffer Feature
C) Most Treated Buffer Time D) Master Test Board Feature
Ans: A
86. A computer in a network is identified by
A) IP Address
B) Place where it is kept
C) Log in ID and Password of the user
D) All the above
Ans: A
87. USB port in a computer is used to connect
A) Pen Drive B) Mouse
C) Keyboard D) All the above
Ans: D
88. SCSI is a term related with
A) Storage B) Network Data Transfer
C) Keystroke Rate D) Picture Resolution
Ans: A
89. Direct X is a
A) Computer part
B) Software that drives Graphic hardware
C) A user interface
D) None of these
Ans: B
90. FAT stands for
A) File Accommodation Table
B) File Access Tape
C) File Allocation Table
D) File Activity Table
Ans: C
91. Which of the following are true about firewalls ?
A) Filters network traffic
B) Can be either a hardware or software device
C) Follows a set of rules
D) All the above
Ans: D
92. A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is known as
A) Hacker B) Spammer
C) Analyst D) Programmer
Ans: A
93. Which of the following uses a handheld operating system ?
A) Supercomputer B) Personal computer
C) Laptop D) PDA
Ans: D
94. International encoding standard to use with different languages and scripts is known as
A) ASCII B) Unicode
C) ISM D) IELTS
Ans: B
95. Which of the following software could assist someone who cannot use their hands for computer input ?
A) Video conferencing B) Speech recognition
C) Audio digitizer D) Synthesizer
Ans: B
96. The standard network utility to send ICMP packet to a target host
A) Dsniff B) Hmap
C) Ping D) All the above
Ans: C
A) Supercomputer B) Personal computer
C) Laptop D) PDA
Ans: D
94. International encoding standard to use with different languages and scripts is known as
A) ASCII B) Unicode
C) ISM D) IELTS
Ans: B
95. Which of the following software could assist someone who cannot use their hands for computer input ?
A) Video conferencing B) Speech recognition
C) Audio digitizer D) Synthesizer
Ans: B
96. The standard network utility to send ICMP packet to a target host
A) Dsniff B) Hmap
C) Ping D) All the above
Ans: C
97. A path by which communication is achieved between a central processor and other devices is called
A) Audit trail B) Network
C) Bus D) Channel
Ans: C
98. Which of the following is the coding of data so that it can’t be easily understood if intercepted ?
A) Barcode B) Decoder
C) Encryption D) Mnemonics
Ans: C
99. Section 66C of IT Act deals with
A) Cyber stalking B) E-mail bombing
C) Child pornography D) Punishment for identity theft
Ans: D
100. The 2’s compliment of a binary no. is obtained by adding ___________ to its 1’s compliment.
A) 0 B) 1
C) 10 D) 12
Ans: B
A) Audit trail B) Network
C) Bus D) Channel
Ans: C
98. Which of the following is the coding of data so that it can’t be easily understood if intercepted ?
A) Barcode B) Decoder
C) Encryption D) Mnemonics
Ans: C
99. Section 66C of IT Act deals with
A) Cyber stalking B) E-mail bombing
C) Child pornography D) Punishment for identity theft
Ans: D
100. The 2’s compliment of a binary no. is obtained by adding ___________ to its 1’s compliment.
A) 0 B) 1
C) 10 D) 12
Ans: B
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15