COMPUTER SCIENCE - PAGE 17
1. Application layer provides basis for :
(A) Email services (B) Frame Division (C) File Making (D) None of the above
Ans: A
2. UDP is — protocol.
(A) Connection oriented (B) Connectionless (C) Neither (D) Both
Ans: B
3. Layer that are used to deal with mechanical and electrical specifications are :
(A) Data Link Layer (B) Network Layer (C) Transport Layer (D) Physical Layer
Ans: D
4. If a hub fails in this type of network, the whole system will shout down :
(A) Tree (B) Star (C) Mesh (D) Bus
Ans: B
5. Which of the following cloud concept is related to pooling and sharing of resources?
(A) Polymorphism (B) Abstraction
(D) Virtualization (D) None of Above
Ans: C
6. _____________is used for cache memory.
(A) DRAM (B) SRAM (C) EPROM (D) Flash Memory
Ans: B
7. The highest data availability in which RAID level :
(A) RAID 1 (B) RAID 2 (C) RAID 4 (D) RAID 6
Ans: D
8. ___________to transmit information on the World Wide Web.
(A) TPPH (B) HTTP
(C) HTML (D) HTPT
Ans: B
9. In DMA transfers, the required signals and addresses are given by the :
(A) Processor (B) Device Drivers (C) DMA Controllers (D) The Program itself
Ans: C
10. The — unit is capable of mimicking the processor and indeed of taking over control of the system from the processor.
(A) Programmed I/O (B) Interrupt driven I/O (C) Direct Memory Access (D) Virtual Memory Access
Ans: C
11. When displaying a web page, the application layer uses :
(A) HTTP Protocol (B) FTP Protocol (C) SMTP Protocol (D) None of the Above
Ans: A
12. The transmission data rate is decided by which layer :
(A) Network layer (B) Physical layer (C) Data link layer (D) Transport layer
Ans: B
13. IPv6 addressed have a size of :
(A) 32 bits (B) 64 bits
(C) 128 bits (D) 256 bits
Ans: C
14. Control and Status Registers are used by the Processor to control :
(A) Design of the Processor (B) Execution of the Processor
(C) Speed of the Processor (D) Operation of the Processor
Ans: D
15. Which of the architecture is power efficient?
(A) ISA (B) RISC (C) CISC (D) IANA
Ans: B
16. Which feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs?
(A) Scalability (B) Virtualization
(C) Security (D) Cost savings
Ans: A
17. Which Register is used to store values of arithmetic and logical operations?
(A) Arithmetic Register (B) Accumulator (C) Logical Register (D) Controller
Ans: B
18. ____________is not a true member of RAID family, because it does not include redundancy to improve performance.
(A) RAID Level 0 (B) RAID Level 1 (C) RAID Level 2 (D) RAID Level 3
Ans: A
19. End to end connectivity is provided from host to host in —1ayer.
(A) Physical layer (B) Data Link layer
(C) Transport layer (D) Network layer
Ans: C
20. Transport layer protocol deals with :
(A) Application to application communication
(B) Process to process communication
(C) Node to node communication
(D) None of the above
Ans: B
21. Which type of e-commerce focuses on consumers dealing with each other?
(A) B2B (B) B2C (0) C2B (D) C2C
Ans: D
22. Which of the following was the first commercial Web browser?
(A) Mosaic (B) Netscape Navigator (C) Mozilla (D) Internet Explorer
Ans: B
23. KYC means :
(A) Know your customer (B) Know your character
(D) Know your chance (D) None of the above
Ans: A
24. What is meant by Aadhaar seeding?
(A) Linking of Aadhaar With Bank Account (B) Duplicate issuance of Aadhaar
(C) Transfer of Aadhaar (D) None of the above
Ans: A
25. Intellectual Property Rights (IPR) protect the use of information and ideas that are of :
(A) Ethical Value (B) Moral Value
(C) Social Value (D) Commercial Value
Ans: D
26. Hall Mark is :
(A) Trademark (B) Certification Mark (C) Collective Mark (D) Both (A) and (B)
Ans: B
27. Which type of firewall includes in a router to direct the flow of network traffic?
(A) Packet Filtering (B) IP Spoofing (C) Circuit Level (D) Application Level
Ans: A
28. A firewall is used in a system connected to Wide area network to :
(A) Prevent spread of fire in the network (B) Prevent unauthorized access by hackers
(C) To scan for viruses in files (D) To extinguish fire spreading via network cables
Ans: B
29. An encryption algorithm transforms plaintext into :
(A) Cipher text (B) Simple text
(C) Plain text (D) Empty text
Ans: A
30. The code segment that misuses its environment is called a :
(A) Internal thief (B) Code stacker
(C) Trojan horse (D) None of the above
Ans: C
31. Certification mark can be registered in :
(A) Trademark Registry (B) Certification Board
(C) Quality Control Board (D) MHRD
Ans: A
32. How many types of permissions a file has in UNIX?
(A) 1 (B) 2 (C) 3 (D) 4
Ans: C
33. Unique identification Authority of India (UIDAI) scheme was launched in the year :
(A) 2009 (B) 2011 (C) 2013 (D) 2015
Ans: A
34. UJALA scheme is related to :
(A) Solar Panel distribution (B) LED Bulbs distribution (C) LPG Cylinder distribution (D) None of the above
Ans: B
35. Which one of the following is not an attack, but a search for vulnerabilities to attack? (
A) Denial of service (B) Dumpster diving
(C) Memory access Violation (D) Port scanning
Ans: D
36. What is a trap door in a program?
(A) A security hole inserted at programming time in the system for later use
(B) A type of antivirus
(C) Security hole in a network
(D) None of the above
Ans: A
37. The DMA controller is connected to the :
(A) Processor bus (B) System bus
(C) External bus (D) None of the above
Ans: B
38. Which mechanism is used by worm process?
(A) Trap process (B) Fake process
(C) VAX process (D) Spawn process
Ans: D
39. Which of the following is used to provide a baseline measure for comparison of IDSS?
(A) Crossover error rate
(B) False negative rate
(C) False positive rate
(D) Bit error rate
Ans: A
40. A method used by an IDS that involves checking for a pattern to identify unauthorized activity:
(A) Session Splicing
(B) Protocol Decoding
(C) Pattern Matching
(D) State Table
Ans: C
41. The bar which displays information about the current page number is :
(A) Title bar (B) Status bar
(C) Standard bar (D) Formatting bar
Ans: B
42. Home key uses for :
(A) Moves the cursor beginning of the document (B) Moves the cursor beginning of the paragraph
(C) Moves the cursor beginning of the screen (D) Moves the cursor beginning of the line
Ans: D
43. Portrait and Landscape are :
(A) Page Orientation (B) Page Size (C) Page Layout (D) All of the above
Ans: A
44. Background color or effects applied on a document is not visible in :
(A) Web Layout View (B) Print Layout View
(C) Print Preview (D) Reading View
Ans: C
45. Statistical calculations and preparation of tables and graphs can be done using :
(A) Adobe Photoshop (B) Excel (C) Notepad (D) Power Point
Ans: B
46. Verification and Validation uses :
(A) Internal and External resources respectively
(B) Internal resources only
(C) External resources only
(D) External and Internal resources respectively
Ans: A
47. The SQL ALTER statement can be used to :
(A) Change the table structure (B) Change the table data
(C) Add rows to the table (D) Delete rows from the table
Ans: A
48. What is the keyboard shortcut for creating a chart from the selected cell range?
(A) F2 (B) F4 (C) F8 (D) F11
Ans: D
49. What shortcut key to enter current date in cell in excel?
(A) Ctrl +; (B) Alt +; (C) Home +; (D) Shift +;
Ans: A
50. Which Function is used to calculate Remainder in MS Excel?
(A) INT () (B) FACT () (C) MOD () (D) DIV ()
Ans: C
(A) Email services (B) Frame Division (C) File Making (D) None of the above
Ans: A
2. UDP is — protocol.
(A) Connection oriented (B) Connectionless (C) Neither (D) Both
Ans: B
3. Layer that are used to deal with mechanical and electrical specifications are :
(A) Data Link Layer (B) Network Layer (C) Transport Layer (D) Physical Layer
Ans: D
4. If a hub fails in this type of network, the whole system will shout down :
(A) Tree (B) Star (C) Mesh (D) Bus
Ans: B
5. Which of the following cloud concept is related to pooling and sharing of resources?
(A) Polymorphism (B) Abstraction
(D) Virtualization (D) None of Above
Ans: C
6. _____________is used for cache memory.
(A) DRAM (B) SRAM (C) EPROM (D) Flash Memory
Ans: B
7. The highest data availability in which RAID level :
(A) RAID 1 (B) RAID 2 (C) RAID 4 (D) RAID 6
Ans: D
8. ___________to transmit information on the World Wide Web.
(A) TPPH (B) HTTP
(C) HTML (D) HTPT
Ans: B
9. In DMA transfers, the required signals and addresses are given by the :
(A) Processor (B) Device Drivers (C) DMA Controllers (D) The Program itself
Ans: C
10. The — unit is capable of mimicking the processor and indeed of taking over control of the system from the processor.
(A) Programmed I/O (B) Interrupt driven I/O (C) Direct Memory Access (D) Virtual Memory Access
Ans: C
11. When displaying a web page, the application layer uses :
(A) HTTP Protocol (B) FTP Protocol (C) SMTP Protocol (D) None of the Above
Ans: A
12. The transmission data rate is decided by which layer :
(A) Network layer (B) Physical layer (C) Data link layer (D) Transport layer
Ans: B
13. IPv6 addressed have a size of :
(A) 32 bits (B) 64 bits
(C) 128 bits (D) 256 bits
Ans: C
14. Control and Status Registers are used by the Processor to control :
(A) Design of the Processor (B) Execution of the Processor
(C) Speed of the Processor (D) Operation of the Processor
Ans: D
15. Which of the architecture is power efficient?
(A) ISA (B) RISC (C) CISC (D) IANA
Ans: B
16. Which feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs?
(A) Scalability (B) Virtualization
(C) Security (D) Cost savings
Ans: A
17. Which Register is used to store values of arithmetic and logical operations?
(A) Arithmetic Register (B) Accumulator (C) Logical Register (D) Controller
Ans: B
18. ____________is not a true member of RAID family, because it does not include redundancy to improve performance.
(A) RAID Level 0 (B) RAID Level 1 (C) RAID Level 2 (D) RAID Level 3
Ans: A
19. End to end connectivity is provided from host to host in —1ayer.
(A) Physical layer (B) Data Link layer
(C) Transport layer (D) Network layer
Ans: C
20. Transport layer protocol deals with :
(A) Application to application communication
(B) Process to process communication
(C) Node to node communication
(D) None of the above
Ans: B
21. Which type of e-commerce focuses on consumers dealing with each other?
(A) B2B (B) B2C (0) C2B (D) C2C
Ans: D
22. Which of the following was the first commercial Web browser?
(A) Mosaic (B) Netscape Navigator (C) Mozilla (D) Internet Explorer
Ans: B
23. KYC means :
(A) Know your customer (B) Know your character
(D) Know your chance (D) None of the above
Ans: A
24. What is meant by Aadhaar seeding?
(A) Linking of Aadhaar With Bank Account (B) Duplicate issuance of Aadhaar
(C) Transfer of Aadhaar (D) None of the above
Ans: A
25. Intellectual Property Rights (IPR) protect the use of information and ideas that are of :
(A) Ethical Value (B) Moral Value
(C) Social Value (D) Commercial Value
Ans: D
26. Hall Mark is :
(A) Trademark (B) Certification Mark (C) Collective Mark (D) Both (A) and (B)
Ans: B
27. Which type of firewall includes in a router to direct the flow of network traffic?
(A) Packet Filtering (B) IP Spoofing (C) Circuit Level (D) Application Level
Ans: A
28. A firewall is used in a system connected to Wide area network to :
(A) Prevent spread of fire in the network (B) Prevent unauthorized access by hackers
(C) To scan for viruses in files (D) To extinguish fire spreading via network cables
Ans: B
29. An encryption algorithm transforms plaintext into :
(A) Cipher text (B) Simple text
(C) Plain text (D) Empty text
Ans: A
30. The code segment that misuses its environment is called a :
(A) Internal thief (B) Code stacker
(C) Trojan horse (D) None of the above
Ans: C
31. Certification mark can be registered in :
(A) Trademark Registry (B) Certification Board
(C) Quality Control Board (D) MHRD
Ans: A
32. How many types of permissions a file has in UNIX?
(A) 1 (B) 2 (C) 3 (D) 4
Ans: C
33. Unique identification Authority of India (UIDAI) scheme was launched in the year :
(A) 2009 (B) 2011 (C) 2013 (D) 2015
Ans: A
34. UJALA scheme is related to :
(A) Solar Panel distribution (B) LED Bulbs distribution (C) LPG Cylinder distribution (D) None of the above
Ans: B
35. Which one of the following is not an attack, but a search for vulnerabilities to attack? (
A) Denial of service (B) Dumpster diving
(C) Memory access Violation (D) Port scanning
Ans: D
36. What is a trap door in a program?
(A) A security hole inserted at programming time in the system for later use
(B) A type of antivirus
(C) Security hole in a network
(D) None of the above
Ans: A
37. The DMA controller is connected to the :
(A) Processor bus (B) System bus
(C) External bus (D) None of the above
Ans: B
38. Which mechanism is used by worm process?
(A) Trap process (B) Fake process
(C) VAX process (D) Spawn process
Ans: D
39. Which of the following is used to provide a baseline measure for comparison of IDSS?
(A) Crossover error rate
(B) False negative rate
(C) False positive rate
(D) Bit error rate
Ans: A
40. A method used by an IDS that involves checking for a pattern to identify unauthorized activity:
(A) Session Splicing
(B) Protocol Decoding
(C) Pattern Matching
(D) State Table
Ans: C
41. The bar which displays information about the current page number is :
(A) Title bar (B) Status bar
(C) Standard bar (D) Formatting bar
Ans: B
42. Home key uses for :
(A) Moves the cursor beginning of the document (B) Moves the cursor beginning of the paragraph
(C) Moves the cursor beginning of the screen (D) Moves the cursor beginning of the line
Ans: D
43. Portrait and Landscape are :
(A) Page Orientation (B) Page Size (C) Page Layout (D) All of the above
Ans: A
44. Background color or effects applied on a document is not visible in :
(A) Web Layout View (B) Print Layout View
(C) Print Preview (D) Reading View
Ans: C
45. Statistical calculations and preparation of tables and graphs can be done using :
(A) Adobe Photoshop (B) Excel (C) Notepad (D) Power Point
Ans: B
46. Verification and Validation uses :
(A) Internal and External resources respectively
(B) Internal resources only
(C) External resources only
(D) External and Internal resources respectively
Ans: A
47. The SQL ALTER statement can be used to :
(A) Change the table structure (B) Change the table data
(C) Add rows to the table (D) Delete rows from the table
Ans: A
48. What is the keyboard shortcut for creating a chart from the selected cell range?
(A) F2 (B) F4 (C) F8 (D) F11
Ans: D
49. What shortcut key to enter current date in cell in excel?
(A) Ctrl +; (B) Alt +; (C) Home +; (D) Shift +;
Ans: A
50. Which Function is used to calculate Remainder in MS Excel?
(A) INT () (B) FACT () (C) MOD () (D) DIV ()
Ans: C
51. Which SELECT statement will the result ‘ello world’ from the string ‘Hello World"?
(A) SELECT INITCAP (TRIM (‘Hello World’,1,1) FROM dual;
(B) SELECT LOWER (SUBSTR (‘Hello World’,1,1) FROM dual;
(C) SELECT LOWER (SUBSTR (‘Hello World’,2,1) FROM dual;
(D) SELECT LOWER (TRIM (‘H’ FROM ‘Hello World’)) FROM dual;
Ans: D
52. The DROP TABLE statement :
(A) Deletes the table structure only
(B) Deletes the table structure along with the table data
(C) Works whether or not referential Integrity constraints would be violated
(D) Is not an SQL statement
Ans: B
53. “Ctrl + W” is used to :
(A) Save and Close Document (B) Save and Print the Document
(C) Save and Close Word Application (D) Without Save, Close Document
Ans: A
54. Which of the following is the first web browser?
(A) Netscape Navigator (B) Nexus (C) Internet Explorer (D) Mosaic
Ans: B
55. Who created the first web browser?
(A) Tim Berners Lee (B) Jacobs Lan (C) Marc Andreessen (D) Mozilla foundation
Ans: A
56. The delay that occur during the playback of a stream is called :
(A) Stream delay (B) Playback delay
(C) Jitter (D) Event delay
(B) Ans: C
57. An applet is a program written in Java on the :
(A) Web (B) Server (C) Domain (D) Client
Ans: B
58. The — tag defines an Image in an HTML page.
(A) <image> (B) <pic> (C) <imge> (D) <img>
Ans: D
59. Each IP packet must contain :
(A) Source and destination address (B) Source or destination address
(C) Only destination address (D) Only source address
Ans: A
60. Short cut “Ctrl + R” is used to :
(A) Re-Open the last closed document
(B) Re-Print the last printed page
(C) Re-Apply the paragraph formatting
(D) Right align the selected paragraph
Ans: D
61. Which one of the following sorts rows in SQL?
(A) SORT BY (B) ORDER BY
(C) ALIGN BY (D) GROUP BY
Ans: B
62. Tables in second normal form (2NF) :
(A) Eliminate all hidden dependencies
(B) Eliminate the possibility of a insertion anomalies
(C) Have a composite key
(D) Have all non key fields depend on the whole primary key
Ans: A
63. How to select all data from student table starting the name with letter ‘R’?
(A) SELECT * FROM student WHERE name LIKE ‘R%’;
(B) SELECT * FROM student WHERE name LIKE ‘%R’;
(C) SELECT * FROM student WHERE name LIKE ‘R%_’;
(D) SELECT * FROM student WHERE name LIKE ‘_R%’;
Ans: A
64. You can detect spelling and grammar errors by :
(A) Press Shift + F7 (B) Press F7
(C) Press Ctrl + F7 (D) Press Alt + F7
Ans: B
65. Functional Dependencies are the types of constraints that are based on :
(A) Superset key (B) Key revisited
(C) Key (D) None of the above
Ans: C
66. The full form of OLAP is :
(A) Online Analytical Processing (B) Online Advanced Processing
(C) Online Advanced Preparation (D) Online Analytical Performance
Ans: A
67. Cyclomatic Complexity method comes under which testing method :
(A) Yellow box (B) White box (C) Gray box (D) Black box
(B) Ans: B
68. MIME stands for :
(A) Multipurpose Internet Mail Extra
(B) Multipurpose Internet Mail End
(C) Multipurpose Internet Mail Email
(D) Multipurpose Internet Mail Extensions
Ans: D
69. Validation is the responsibility of :
(A) Developer (B) Designer
(C) Tester (D) QA Team
Ans: C
70. Choose the correct HTML tag to make the text bold :
(A) <B> (B) <BOLD>
(C) <STRONG> (D) Both (A) and (C)
Ans: D
71. For using subscription web documents which tag is used?
(A) <sup></sup>
(B) <sub></sub>
(C) <subscript><l subscript>
(D) <superscript></superscript >
Ans: B
72. A web address is also called a :
(A) URL (B) ULR
(C) RLU (D) LUR
Ans: A
73. Internet uses :
(A) Circuit switching (B) Telephone switching
(C) Telex switching (D) Packet switching
Ans: D
74. Which of the following is used to read a HTML page and render it?
(A) Web matrix (B) Web server
(C) Web browser (D) None of the mentioned
Ans: C
75. Which of the following is / are not a verification activity?
(A) Inspection (B) Technical Review (C) Walkthrough (D) Testing
Ans: D
76. The initial term of registration of a trademark in India is
(A) 10 years (B) 15 years (C) 20 years (D) 25 years
Ans: A
77. Which among the following statements are true about registers inside a CPU ?
(i) Registers are part ofprimary memory. (ii) Registers are volatile.
(A) Only (1) is true. (B) Only (ii) is true. (C) Both (i) and (ii) are true. (D) Both (i) and (ii) are false.
Ans: B
78. The exclusive rights granted for an invention is called
(A) Copyright (B) Patent (C) Trademark (D) Industrial design
Ans: B
79. An Amendment to the Indian IT Act was passed by Parliament in
(A) 2006 (B) 2007 (C) 2008 (D) 2009
Ans: C
80. Which Section of Indian IT Act was invalidated by Supreme Court of India ?
(A) Section - 66A (B) Section - 66B (C) Section - 66C (D) Section - 66D
Ans: A
81. Attempting to acquire username, passwords, etc. by claiming as the original website of a popular website is called :
(A) Hacking (B) Trojan Horse (C) Denial of Service attack (D) Phishing
Ans: D
82. Who is considered as the Father of Internet ?
(A) Tim Berners Lee (B) Douglas Engelbart (C) Vinton Gray Cerf (D) Marc L. Andreessen
Ans: C
83. Which among the following is not an operating system ?
(A) Windows (B) Linux (C) macOS (D) Safari
Ans: D
84. TCP/IP stands for
(A) Transfer Control Protocol/Internal Protocol
(B) Transfer Control Protocol/Internet Protocol
(C) Transmission Control Protocol/Internal Protocol
(D) Transmission Control Protocol/Internet Protocol
Ans: D
85. The speed of data transmission in internet is measured in
(A) bits per minute (B) bytes per minute
(C) bits per second (D) bytes per second
Ans: C
86. Which one of the following is an example of primary memory of a computer ?
(A) RAM
(B) Floppy Disk
(C) Hard Disk
(D) Pen drive
Ans: A
87. The extension of word document is
(A) .xlsx
(B) .pptx
(C) .jpeg
(D) .docx
Ans: D
88. Malayalam typing software 'ISM' stands for
(A) Institute for Supply Management
(B) Implicit Shape Model
(C) International Safety Management
(D) Intelligent Script Manager
Ans: D
89. Shortcut used for 'paste'
(A) ctrl+C (C) ctrl+N
(B) ctrl+V (D) ctrl+P
Ans: B
90. What is the default font size of a word document based on normal computer ?
(A) 14 pt
(B) 10 pt
(C) 12 pt
(D) 8 pt
Ans: C
91. 1 KB is
(A) 1024 X 1024 bytes
(B) 1024 bytes
(C) 1024 MB
(D) 1024 bits
Ans: B
92. A large capital letter at the beginning of a text block that has the depth of two or more regular lines.
(A) Superscript
(B) Subscript
(C) Drop cap
(D) Capitalize
Ans: C
93. Send a similar letter or document to multiple recipients
(A) Document
(B) Personal letter
(C) Template
(D) Mail merge
Ans: D
94. A network of computers and other devices that is confined to a relatively small space is called
(A) LAN
(B) Global network
(C) WAN
(D) Peer to Peer network
Ans: A
95. The brain of any computer system is
(A) ALU
(B) Memory
(C) CPU
(D) Control Unit
Ans: C
96. Which of the following is a free software for image editing ?
(A) GIMP (B) Photo Line (C) Microsoft Paint (D) Adobe Photoshop
Ans: A
97. Who is known as the father of E—mail ?
(A) Bill Gates (B) Linus Torvalds (C) Ray Tomlinson (D) Dennis Ritchie
Ans: C
98. Which is an image format ?
(A) jpeg (B) mp3 (C) doc (D) xls
Ans: A
99. Expand PDF :
(A) Portable Document Format
(B) Public Document File
(C) Portable Data File
(D) Program Data Format
Ans: A
100. Which among the following is not a High Level Programming Language ?
(A) C++
(B) JAVA
(C) PHP
(D) UNIX
Ans: D
(A) SELECT INITCAP (TRIM (‘Hello World’,1,1) FROM dual;
(B) SELECT LOWER (SUBSTR (‘Hello World’,1,1) FROM dual;
(C) SELECT LOWER (SUBSTR (‘Hello World’,2,1) FROM dual;
(D) SELECT LOWER (TRIM (‘H’ FROM ‘Hello World’)) FROM dual;
Ans: D
52. The DROP TABLE statement :
(A) Deletes the table structure only
(B) Deletes the table structure along with the table data
(C) Works whether or not referential Integrity constraints would be violated
(D) Is not an SQL statement
Ans: B
53. “Ctrl + W” is used to :
(A) Save and Close Document (B) Save and Print the Document
(C) Save and Close Word Application (D) Without Save, Close Document
Ans: A
54. Which of the following is the first web browser?
(A) Netscape Navigator (B) Nexus (C) Internet Explorer (D) Mosaic
Ans: B
55. Who created the first web browser?
(A) Tim Berners Lee (B) Jacobs Lan (C) Marc Andreessen (D) Mozilla foundation
Ans: A
56. The delay that occur during the playback of a stream is called :
(A) Stream delay (B) Playback delay
(C) Jitter (D) Event delay
(B) Ans: C
57. An applet is a program written in Java on the :
(A) Web (B) Server (C) Domain (D) Client
Ans: B
58. The — tag defines an Image in an HTML page.
(A) <image> (B) <pic> (C) <imge> (D) <img>
Ans: D
59. Each IP packet must contain :
(A) Source and destination address (B) Source or destination address
(C) Only destination address (D) Only source address
Ans: A
60. Short cut “Ctrl + R” is used to :
(A) Re-Open the last closed document
(B) Re-Print the last printed page
(C) Re-Apply the paragraph formatting
(D) Right align the selected paragraph
Ans: D
61. Which one of the following sorts rows in SQL?
(A) SORT BY (B) ORDER BY
(C) ALIGN BY (D) GROUP BY
Ans: B
62. Tables in second normal form (2NF) :
(A) Eliminate all hidden dependencies
(B) Eliminate the possibility of a insertion anomalies
(C) Have a composite key
(D) Have all non key fields depend on the whole primary key
Ans: A
63. How to select all data from student table starting the name with letter ‘R’?
(A) SELECT * FROM student WHERE name LIKE ‘R%’;
(B) SELECT * FROM student WHERE name LIKE ‘%R’;
(C) SELECT * FROM student WHERE name LIKE ‘R%_’;
(D) SELECT * FROM student WHERE name LIKE ‘_R%’;
Ans: A
64. You can detect spelling and grammar errors by :
(A) Press Shift + F7 (B) Press F7
(C) Press Ctrl + F7 (D) Press Alt + F7
Ans: B
65. Functional Dependencies are the types of constraints that are based on :
(A) Superset key (B) Key revisited
(C) Key (D) None of the above
Ans: C
66. The full form of OLAP is :
(A) Online Analytical Processing (B) Online Advanced Processing
(C) Online Advanced Preparation (D) Online Analytical Performance
Ans: A
67. Cyclomatic Complexity method comes under which testing method :
(A) Yellow box (B) White box (C) Gray box (D) Black box
(B) Ans: B
68. MIME stands for :
(A) Multipurpose Internet Mail Extra
(B) Multipurpose Internet Mail End
(C) Multipurpose Internet Mail Email
(D) Multipurpose Internet Mail Extensions
Ans: D
69. Validation is the responsibility of :
(A) Developer (B) Designer
(C) Tester (D) QA Team
Ans: C
70. Choose the correct HTML tag to make the text bold :
(A) <B> (B) <BOLD>
(C) <STRONG> (D) Both (A) and (C)
Ans: D
71. For using subscription web documents which tag is used?
(A) <sup></sup>
(B) <sub></sub>
(C) <subscript><l subscript>
(D) <superscript></superscript >
Ans: B
72. A web address is also called a :
(A) URL (B) ULR
(C) RLU (D) LUR
Ans: A
73. Internet uses :
(A) Circuit switching (B) Telephone switching
(C) Telex switching (D) Packet switching
Ans: D
74. Which of the following is used to read a HTML page and render it?
(A) Web matrix (B) Web server
(C) Web browser (D) None of the mentioned
Ans: C
75. Which of the following is / are not a verification activity?
(A) Inspection (B) Technical Review (C) Walkthrough (D) Testing
Ans: D
76. The initial term of registration of a trademark in India is
(A) 10 years (B) 15 years (C) 20 years (D) 25 years
Ans: A
77. Which among the following statements are true about registers inside a CPU ?
(i) Registers are part ofprimary memory. (ii) Registers are volatile.
(A) Only (1) is true. (B) Only (ii) is true. (C) Both (i) and (ii) are true. (D) Both (i) and (ii) are false.
Ans: B
78. The exclusive rights granted for an invention is called
(A) Copyright (B) Patent (C) Trademark (D) Industrial design
Ans: B
79. An Amendment to the Indian IT Act was passed by Parliament in
(A) 2006 (B) 2007 (C) 2008 (D) 2009
Ans: C
80. Which Section of Indian IT Act was invalidated by Supreme Court of India ?
(A) Section - 66A (B) Section - 66B (C) Section - 66C (D) Section - 66D
Ans: A
81. Attempting to acquire username, passwords, etc. by claiming as the original website of a popular website is called :
(A) Hacking (B) Trojan Horse (C) Denial of Service attack (D) Phishing
Ans: D
82. Who is considered as the Father of Internet ?
(A) Tim Berners Lee (B) Douglas Engelbart (C) Vinton Gray Cerf (D) Marc L. Andreessen
Ans: C
83. Which among the following is not an operating system ?
(A) Windows (B) Linux (C) macOS (D) Safari
Ans: D
84. TCP/IP stands for
(A) Transfer Control Protocol/Internal Protocol
(B) Transfer Control Protocol/Internet Protocol
(C) Transmission Control Protocol/Internal Protocol
(D) Transmission Control Protocol/Internet Protocol
Ans: D
85. The speed of data transmission in internet is measured in
(A) bits per minute (B) bytes per minute
(C) bits per second (D) bytes per second
Ans: C
86. Which one of the following is an example of primary memory of a computer ?
(A) RAM
(B) Floppy Disk
(C) Hard Disk
(D) Pen drive
Ans: A
87. The extension of word document is
(A) .xlsx
(B) .pptx
(C) .jpeg
(D) .docx
Ans: D
88. Malayalam typing software 'ISM' stands for
(A) Institute for Supply Management
(B) Implicit Shape Model
(C) International Safety Management
(D) Intelligent Script Manager
Ans: D
89. Shortcut used for 'paste'
(A) ctrl+C (C) ctrl+N
(B) ctrl+V (D) ctrl+P
Ans: B
90. What is the default font size of a word document based on normal computer ?
(A) 14 pt
(B) 10 pt
(C) 12 pt
(D) 8 pt
Ans: C
91. 1 KB is
(A) 1024 X 1024 bytes
(B) 1024 bytes
(C) 1024 MB
(D) 1024 bits
Ans: B
92. A large capital letter at the beginning of a text block that has the depth of two or more regular lines.
(A) Superscript
(B) Subscript
(C) Drop cap
(D) Capitalize
Ans: C
93. Send a similar letter or document to multiple recipients
(A) Document
(B) Personal letter
(C) Template
(D) Mail merge
Ans: D
94. A network of computers and other devices that is confined to a relatively small space is called
(A) LAN
(B) Global network
(C) WAN
(D) Peer to Peer network
Ans: A
95. The brain of any computer system is
(A) ALU
(B) Memory
(C) CPU
(D) Control Unit
Ans: C
96. Which of the following is a free software for image editing ?
(A) GIMP (B) Photo Line (C) Microsoft Paint (D) Adobe Photoshop
Ans: A
97. Who is known as the father of E—mail ?
(A) Bill Gates (B) Linus Torvalds (C) Ray Tomlinson (D) Dennis Ritchie
Ans: C
98. Which is an image format ?
(A) jpeg (B) mp3 (C) doc (D) xls
Ans: A
99. Expand PDF :
(A) Portable Document Format
(B) Public Document File
(C) Portable Data File
(D) Program Data Format
Ans: A
100. Which among the following is not a High Level Programming Language ?
(A) C++
(B) JAVA
(C) PHP
(D) UNIX
Ans: D
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15