COMPUTER SCIENCE AND APPLICATIONS- PAGE 6
1. Which is true? (A) The buttons in a radio button group always have same names (B) The buttons in a radio button group always have unique names (C) Names are optional (D) Both (A) and (C) are true
Ans: A
2. Which script is executed in response to the appearance of an event? (A) Event (B) Click (C) Event Handler (D) Event Document
Ans: C
3. The first style sheets was developed in: (A) 1995 (B) 1996 (C) 1998 (D) 2000
Ans: B
4. Which one is not a selector type in CSS? (A) Universal Selector (B) id Selector (C) Class Selector (D) Name Selector
Ans: D
5. ––––––––––Provides a centralized authentication server which authenticate users to servers and viceversa. (A) Kerberos (B) DES (C) AES (D) None of the above
Ans: A
6. In immediate addressing mode the operand is: (A) the contents of a register (B) given explicitly in the instruction (C) in memory location (D) address of operand is inside register/memory whose address appear in memory
Ans: B
7. The function of Memory Management Unit is: (A) to allocate memory for variables (B) to convert logical address to physical address (C) to convert pages into frames (D) to convert programs into segments
Ans: B
8. The process of selecting new bus master is called: (A) bus stealing (B) master selection (C) bus arbitration (D) bus strobing
Ans: C
9. In DRAM if refresh cycles are performed at regular intervals, scattered with memory accesses it is called: (A) Distributed Refresh (B) Burst Refresh (C) Concentrated Refresh (D) Hidden Refresh
Ans: A
10. DMA transfer completion is intimated to the processor by: (A) Interrupt Signal (B) DMA Function Complete (C) Memory Function Complete (D) None of the above
Ans: A
11. The DMA controller is given exclusive access to main memory to transfer of blocks of data without interruption is known as: (A) Memory transfer (B) Block mode transfer (C) Cycle stealing (D) Memory stealing
Ans: B
12. Information needed to decide the next microinstruction address is known as: (A) sequencing memory (B) control word (C) control table (D) sequencing word
Ans: D
13. The reference to memory at any given interval of time tends to be confined within a few localized area of memory. This property is called: (A) property of locality (B) locality of cell (C) spatial locality (D) locality of reference
Ans: D
14. –––––––––– is used to move the head arm of disk. (A) Spindle (B) Ribbon cable (C) Actuator (D) None of the above
Ans: C
15. Rambus is made up of: (A) RAM (B) Controller (C) Bus path (D) All of the above
Ans: D
16. The bit interleaved parity is in: (A) RAID-1 (B) RAID-2 (C) RAID-3 (D) RAID-4
Ans: C
17. In virtual memory technique the segment of data to be executed next is in: (A) cache memory (B) primary memory (C) secondary memory (D) TLB
Ans: C
18. Frame pointer is used to: (A) stores the address of a frame (B) to access parameters passed to subroutine (C) store the address of a page (D) store the address of a page and frame
Ans: B
19. Circuit used to connect two buses: (A) bridge (B) connector (C) bus connector (D) Hub
Ans: A
20. FRAME # data transfer signal on PCI bus: (A) Indicates the frame number (B) Indicate the duration of transaction (C) Indicate which frame is duplicated (D) Indicate the number of transaction
Ans: B
21. Individual word transfer within a transaction through bus are called: (A) DMA (B) Phases (C) Bus transfer (D) None of the above
Ans: B
22. Level 2 cache are implemented using: (A) SRAM (B) DRAM (C) ROM (D) All of the above
Ans: A
23. In write-through protocol: (A) First update cache location then update Main Memory (B) Cache location and memory location are updated simultaneously (C) First update main memory then update cache (D) First update secondary memory then main memory
Ans: B
24. The microcode generation for the control memory is called: (A) microcode generation (B) code generation (C) micro sequence programming (D) micro programming
Ans: D
25. An attempt to reduced the execution cycle by simplifying the instruction set: (A) CISC concept (B) DMA concept (C) Segmentation concept (D) RISC concept
Ans: D
26. RSA algorithm in cryptography is: (A) asymmetric algorithm (B) symmetric algorithm (C) private key cryptosystem (D) none of the above
Ans: A
27. In AES algorithm the length of input block is: (A) 32 bits (B) 64 bits (C) 128 bit (D) 256 bits
Ans: C
28. Name the network attack that floods it with useless traffic: (A) Phishing (B) Trojan horse (C) Denial of Service (D) Spyware
Ans: C
29. The algorithm performing encryption and decryption is called: (A) Cipher (B) Decipher (C) Cryptapher (D) None of the above
Ans: A
30. The private key is kept by –––––––––– in asymmetric key cryptography. (A) sender (B) receiver (C) both sender and receiver (D) crypt analyst
Ans: B
31. The point of connection of trusted internal network and untrusted external networks where a fire wall is installed is called : (A) Security point (B) Connection point (C) Chock point (D) Firewall point
Ans: C
32. Which method ensure a secure communication via E-mail? (A) SSL (B) Digital certificates (C) DKIM (D) All of the above
Ans: D
33. Use of online advertising to spread malware is called: (A) Phishing (B) Mal advertising (C) Malvertising (D) Soft advertising
Ans: C
34. Scheme in which an entity may enable another entity to access its own resource: (A) Discretionary access control (B) Mandatory access control (C) Temperory access control (D) None of the above
Ans: A
35. In Unix File Access Control system which is parts of file’s inode: (A) Owner Id (B) Group ID (C) Protection bits (D) All of the above
Ans: D
36. Another name for cold booting is: (A) Boot Loading (B) Boot strapping (C) Slow booting (D) Quick Booting
Ans: B
37. The complete path through which unauthorized users can enter and extract data in a system is: (A) Attack surface (B) Extract surface (C) Extract area (D) Attack area
Ans: A
38. Which shortcut keys is used to align a word, line, paragraph, or Whole content to the Centre in a document? (A) Ctrl+D (B) Ctrl+E (C) Ctrl+H (D) Ctrl+G
Ans: B
39. Thesaurus tool in MS Word is used for: (A) Spelling Check (B) Grammar Check (C) Synonyms and Antonyms word (D) None of the above
Ans: C
40. Landscape is a: (A) Page layout (B) Page style (C) Page Alignment (D) Page Orientation
Ans: D
41. Drop Caps are used in document for: (A) To begin a paragraph with a large drop capital letter (B) To drop all the letters (C) To automatically begin each paragraph with capital letter (D) All of the above
Ans: A
42. Header and footer can be inserted using which menu: (A) Format (B) Edit (C) Insert (D) View
Ans: C
43. PDF stands for: (A) Portable Data Format (B) Portable Document Format (C) Printable Digital Format (D) Printable Document Format
Ans: B
44. Which file is responsible to start MS Word? (A) Winword.exe (B) Word.exe (C) MSword.exe (D) MSWinword.exe
Ans: A
45. Father of Indian Animation: (A) Raj Mohan (B) Ram Mohan (C) Raj Mohandas (D) Ram Mohandas
Ans: B
46. In 3D Studio Max, What are the 4 main types of view? (A) Left, Right, Top, Bottom (B) Birds-eye, Left, Right, Top (C) Front, Back, Top (D) Top, Front, Right, Perspective
Ans: D
47. In MS Excel, –––––––––– sign will be displayed if a number is too long to fit in a cell. (A) * (B) $ (C) # (D) &
Ans: C
48. A pixel is a: (A) The smallest resolvable part of a memory (B) The smallest resolvable part of a picture (C) Graphics Software (D) None of the above
Ans: B
49. –––––––––– is a saved sequence of commands or keyboard strokes that can be stored and then recalled with a single command or keyboard stroke. (A) Stroke (B) Macro (C) Drag (D) Pixel
Ans: B
50. In Photoshop CS2 and above, it has a special layer known as: (A) Double Object Layer (B) Smart Image Layer (C) Single Object Layer (D) Smart Object Layer
Ans: D
Ans: A
2. Which script is executed in response to the appearance of an event? (A) Event (B) Click (C) Event Handler (D) Event Document
Ans: C
3. The first style sheets was developed in: (A) 1995 (B) 1996 (C) 1998 (D) 2000
Ans: B
4. Which one is not a selector type in CSS? (A) Universal Selector (B) id Selector (C) Class Selector (D) Name Selector
Ans: D
5. ––––––––––Provides a centralized authentication server which authenticate users to servers and viceversa. (A) Kerberos (B) DES (C) AES (D) None of the above
Ans: A
6. In immediate addressing mode the operand is: (A) the contents of a register (B) given explicitly in the instruction (C) in memory location (D) address of operand is inside register/memory whose address appear in memory
Ans: B
7. The function of Memory Management Unit is: (A) to allocate memory for variables (B) to convert logical address to physical address (C) to convert pages into frames (D) to convert programs into segments
Ans: B
8. The process of selecting new bus master is called: (A) bus stealing (B) master selection (C) bus arbitration (D) bus strobing
Ans: C
9. In DRAM if refresh cycles are performed at regular intervals, scattered with memory accesses it is called: (A) Distributed Refresh (B) Burst Refresh (C) Concentrated Refresh (D) Hidden Refresh
Ans: A
10. DMA transfer completion is intimated to the processor by: (A) Interrupt Signal (B) DMA Function Complete (C) Memory Function Complete (D) None of the above
Ans: A
11. The DMA controller is given exclusive access to main memory to transfer of blocks of data without interruption is known as: (A) Memory transfer (B) Block mode transfer (C) Cycle stealing (D) Memory stealing
Ans: B
12. Information needed to decide the next microinstruction address is known as: (A) sequencing memory (B) control word (C) control table (D) sequencing word
Ans: D
13. The reference to memory at any given interval of time tends to be confined within a few localized area of memory. This property is called: (A) property of locality (B) locality of cell (C) spatial locality (D) locality of reference
Ans: D
14. –––––––––– is used to move the head arm of disk. (A) Spindle (B) Ribbon cable (C) Actuator (D) None of the above
Ans: C
15. Rambus is made up of: (A) RAM (B) Controller (C) Bus path (D) All of the above
Ans: D
16. The bit interleaved parity is in: (A) RAID-1 (B) RAID-2 (C) RAID-3 (D) RAID-4
Ans: C
17. In virtual memory technique the segment of data to be executed next is in: (A) cache memory (B) primary memory (C) secondary memory (D) TLB
Ans: C
18. Frame pointer is used to: (A) stores the address of a frame (B) to access parameters passed to subroutine (C) store the address of a page (D) store the address of a page and frame
Ans: B
19. Circuit used to connect two buses: (A) bridge (B) connector (C) bus connector (D) Hub
Ans: A
20. FRAME # data transfer signal on PCI bus: (A) Indicates the frame number (B) Indicate the duration of transaction (C) Indicate which frame is duplicated (D) Indicate the number of transaction
Ans: B
21. Individual word transfer within a transaction through bus are called: (A) DMA (B) Phases (C) Bus transfer (D) None of the above
Ans: B
22. Level 2 cache are implemented using: (A) SRAM (B) DRAM (C) ROM (D) All of the above
Ans: A
23. In write-through protocol: (A) First update cache location then update Main Memory (B) Cache location and memory location are updated simultaneously (C) First update main memory then update cache (D) First update secondary memory then main memory
Ans: B
24. The microcode generation for the control memory is called: (A) microcode generation (B) code generation (C) micro sequence programming (D) micro programming
Ans: D
25. An attempt to reduced the execution cycle by simplifying the instruction set: (A) CISC concept (B) DMA concept (C) Segmentation concept (D) RISC concept
Ans: D
26. RSA algorithm in cryptography is: (A) asymmetric algorithm (B) symmetric algorithm (C) private key cryptosystem (D) none of the above
Ans: A
27. In AES algorithm the length of input block is: (A) 32 bits (B) 64 bits (C) 128 bit (D) 256 bits
Ans: C
28. Name the network attack that floods it with useless traffic: (A) Phishing (B) Trojan horse (C) Denial of Service (D) Spyware
Ans: C
29. The algorithm performing encryption and decryption is called: (A) Cipher (B) Decipher (C) Cryptapher (D) None of the above
Ans: A
30. The private key is kept by –––––––––– in asymmetric key cryptography. (A) sender (B) receiver (C) both sender and receiver (D) crypt analyst
Ans: B
31. The point of connection of trusted internal network and untrusted external networks where a fire wall is installed is called : (A) Security point (B) Connection point (C) Chock point (D) Firewall point
Ans: C
32. Which method ensure a secure communication via E-mail? (A) SSL (B) Digital certificates (C) DKIM (D) All of the above
Ans: D
33. Use of online advertising to spread malware is called: (A) Phishing (B) Mal advertising (C) Malvertising (D) Soft advertising
Ans: C
34. Scheme in which an entity may enable another entity to access its own resource: (A) Discretionary access control (B) Mandatory access control (C) Temperory access control (D) None of the above
Ans: A
35. In Unix File Access Control system which is parts of file’s inode: (A) Owner Id (B) Group ID (C) Protection bits (D) All of the above
Ans: D
36. Another name for cold booting is: (A) Boot Loading (B) Boot strapping (C) Slow booting (D) Quick Booting
Ans: B
37. The complete path through which unauthorized users can enter and extract data in a system is: (A) Attack surface (B) Extract surface (C) Extract area (D) Attack area
Ans: A
38. Which shortcut keys is used to align a word, line, paragraph, or Whole content to the Centre in a document? (A) Ctrl+D (B) Ctrl+E (C) Ctrl+H (D) Ctrl+G
Ans: B
39. Thesaurus tool in MS Word is used for: (A) Spelling Check (B) Grammar Check (C) Synonyms and Antonyms word (D) None of the above
Ans: C
40. Landscape is a: (A) Page layout (B) Page style (C) Page Alignment (D) Page Orientation
Ans: D
41. Drop Caps are used in document for: (A) To begin a paragraph with a large drop capital letter (B) To drop all the letters (C) To automatically begin each paragraph with capital letter (D) All of the above
Ans: A
42. Header and footer can be inserted using which menu: (A) Format (B) Edit (C) Insert (D) View
Ans: C
43. PDF stands for: (A) Portable Data Format (B) Portable Document Format (C) Printable Digital Format (D) Printable Document Format
Ans: B
44. Which file is responsible to start MS Word? (A) Winword.exe (B) Word.exe (C) MSword.exe (D) MSWinword.exe
Ans: A
45. Father of Indian Animation: (A) Raj Mohan (B) Ram Mohan (C) Raj Mohandas (D) Ram Mohandas
Ans: B
46. In 3D Studio Max, What are the 4 main types of view? (A) Left, Right, Top, Bottom (B) Birds-eye, Left, Right, Top (C) Front, Back, Top (D) Top, Front, Right, Perspective
Ans: D
47. In MS Excel, –––––––––– sign will be displayed if a number is too long to fit in a cell. (A) * (B) $ (C) # (D) &
Ans: C
48. A pixel is a: (A) The smallest resolvable part of a memory (B) The smallest resolvable part of a picture (C) Graphics Software (D) None of the above
Ans: B
49. –––––––––– is a saved sequence of commands or keyboard strokes that can be stored and then recalled with a single command or keyboard stroke. (A) Stroke (B) Macro (C) Drag (D) Pixel
Ans: B
50. In Photoshop CS2 and above, it has a special layer known as: (A) Double Object Layer (B) Smart Image Layer (C) Single Object Layer (D) Smart Object Layer
Ans: D
51. –––––––––– is used to correct imperfections like troubled skin, sensor dust etc. (A) Lasso tool (B) Heal tool (C) Artistic Border (D) Blur tool
Ans: B
52. In animation, a –––––––––– is a frame in which the artwork differs from that of the previous frame. (A) Key stroke (B) Frame lock (C) Key frame (D) Frame stroke
Ans: C
53. Before recording an animation, what option is important to select? (A) Auto key (B) Start key (C) Auto record key (D) Auto start key
Ans: A
54. JPEG stands for: (A) Joint Photographic Experts Group (B) Joint Picture Experts Group (C) Join Photo and Graphics Expert Group (D) Join Picture Graphics Expert Group
Ans: A
55. The painting option in Photoshop which determines the degree by which the tools lighten or darken an image is: (A) Scaling (B) Smudge (C) Dodge (D) Opacity
Ans: D
56. The feature in Corel Draw which gives objects a 3D look by creating the illusion of depth is: (A) Smudge (B) Dodge (C) Extrude (D) Sponge
Ans: C
57. What is gutter margin? (A) Margin that is added to right margin when printing (B) Margin that is added to the binding side of page when printing (C) Margin that is added to the left margin when printing (D) Margin that is added to the outside of the page when printing
Ans: B
58. What is the Name of popular software used for creating 2D animation? (A) Moho (B) Dragon Frame (C) Blender (D) Flash
Ans: D
59. Spelling and Grammar check can be easily checked by using the function key: (A) F2 (B) F3 (C) F5 (D) F7
Ans: D
60. A Broadcast/NTSC Video requires, how many FPS for it to play smoothly? (A) 30 (B) 60 (C) 10 (D) 50
Ans: A
61. Using illustrator or Corel Draw you can create mainly what type of graphics: (A) Vector (B) Scalar (C) Both (A) and (B) (D) None of the above
Ans: A
62. What method of animation creates the in-between frames when you create the start and end points of the animation? (A) Authering (B) Clipping (C) Tweening (D) Mapping
Ans: C
63. –––––––––– is shading and rendering method used in 3D computer graphics. (A) Ambient occlusion (B) Rigging (C) Squashing (D) Lighting
Ans: A
64. HDMI stands for: (A) Higher Digital Multimedia interface (B) High Definition Multimedia interface (C) High Definition Media interface (D) High Definition Multimedia interchange
Ans: B
65. What is the smallest and largest font size in MS Word? (A) 6 and 96 (B) 6 and 72 (C) 8 and 96 (D) 8 and 72
Ans: D
66. The first version of Word for Windows was released in which year? (A) 1990 (B) 1989 (C) 1991 (D) 1988
Ans: B
67. 1024 tera bytes is equal to one: (A) Zetta byte (B) Yotta byte (C) Exa byte (D) Peta byte
Ans: D
68. On an excel sheet the active cell is indicated by: (A) Dotted border (B) A dark wide border (C) A blinking border (D) By italic text
Ans: B
69. You can convert existing Excel worksheet data and charts to HTML document by using the (A) Internet Assistant Wizard (B) Import Wizard (C) Internet Wizard (D) Export Wizard
Ans: A
70. Which file format is for Coreldraw? (A) CRD (B) PSD (C) CDR (D) CDD
Ans: C
71. The technology developed by Microsoft that allows an object such as a graphic, video clip, spreadsheet, etc. to be embedded, into a document known as: (A) PSD (B) EXTD (C) OLE (D) DLINK
Ans: C
72. Which key is used to Insert a Hyperlink? (A) Ctrl+E (B) Ctrl+J (C) Ctrl+I (D) Ctrl+K
Ans: D
73. Which key is used to insert a Line Break? (A) Shift+Enter (B) Alt+Enter (C) Ctrl+Enter (D) Fn+Enter
Ans: A
74. For the implementation of C2C E- commerce the essential infrastructure are : (i) Communication network (ii) WWW (iii) EDI standards (iv) Payment system (A) (i) and (ii) (B) (ii) and (iii) (C) (iii) only (D) (iii) and (iv)
Ans: B
75. Which is the major categories of E-commerce? (A) Electronic market (B) EDI (C) Internet commerce (D) All of the above
Ans: D
76. Interstitials are : (A) ads appears as rectangular graphics near the top of the page (B) add on the web that appears between web pages that the user requests (C) ads that appear as banner (D) None of the above
Ans: B
77. A digital signature indicates: (A) Message was created by a known sender (B) Message was not altered in transit (C) Both (A) and (B) (D) None of the above
Ans: C
78. Which of the following is the components of supply chain management? (A) Plan (B) Source (C) Make (D) All of the above
Ans: D
79. Search Encrypt is: (A) Search engine (B) Encryption methodology (C) Searching Methodology (D) None of the above
Ans: A
80. Computer application which is used to publish, edit, order, delete and maintenance from a central interface: (A) Application Management System (B) Content Management System (C) E-management System (D) None of the above
Ans: B
81. The main target group that can be distinguished in governance concepts: (A) Government (B) Citizens (C) Business groups (D) All of the above
Ans: D
82. Patent is a way to protect: (A) Intellectual property (B) Royalty (C) Ethics (D) System quality
Ans: A
83. NORA is: (A) Non obvious Responsibility Analysis (B) Non obvious Reliability Analysis (C) Non obvious Relationship Analysis (D) None of the above
Ans: C
84. –––––––––– means mechanisms are in place to determine who took responsible action and who is responsible. (A) Responsibility (B) Accountability (C) Liability (D) Portability
Ans: B
85. Domain Names to IP address conversion is done by using: (A) Domain Name System (B) Proxy Servers (C) Name Servers (D) Internet
Ans: C
86. A pair of tag and their content together are called: (A) Container (B) Element (C) Attributes (D) Tags
Ans: B
87. Which tag is used in html to preserve white spaces? (A) <pre> (B) <br> (C) <p> (D) <em>
Ans: A
88. Who introduced the concept of www? (A) Steve Wozniak (B) Robert E Khan (C) James Hendler (D) Tim Berners Lee
Ans: D
89. Which is the first browser with GUI? (A) Internet Explorer (B) Mosaic (C) Safari (D) Mozilla Firefox
Ans: B
90. Which one among the following heading tag uses the default font size? (A) <h1> (B) <h3> (C) <h4> (D) <h5>
Ans: C
91. Identify the block tag: (A) <br> (B) <b> (C) <i> (D) <p>
Ans: D
92. The attribute of <img> tag used to display the text when the image is not possible to display: (A) alt (B) href (C) li (D) src
Ans: A
93. Html tag that is used to implement Hypertext Links in webpage is (A) <l> (B) <hyperlink> (C) <a> (D) <link>
Ans: C
94. The unit of information on the web is referred as: (A) Documents (B) Elements (C) Data (D) Sources
Ans: A
95. Which html tag is used for defining the rows and cols of browser window? (A) <frame> (B) <frameset> (C) <noframe> (D) <img>
Ans: B
96. To store intermediate results of a computation ALU uses: (A) Instruction Register (B) Program counter (C) General Register (D) Accumulator
Ans: D
97. Which is the technique used to extend the apparent size of physical memory? (A) Virtual Memory (B) Optical Disk (C) Cache Memory (D) Secondary Memory
Ans: A
98. While executing a program which is used to alter between the operations incrementing PC and ALU operations: (A) DMA (B) Conditional Flags (C) Multiplexer (D) None of the above
Ans: C
99. Scheme used to use the bus during idle period to serve another request is: (A) Split transaction protocol (B) Transport protocol (C) Sliding window protocol (D) Cross bar interconnection
Ans: A
Ans: B
52. In animation, a –––––––––– is a frame in which the artwork differs from that of the previous frame. (A) Key stroke (B) Frame lock (C) Key frame (D) Frame stroke
Ans: C
53. Before recording an animation, what option is important to select? (A) Auto key (B) Start key (C) Auto record key (D) Auto start key
Ans: A
54. JPEG stands for: (A) Joint Photographic Experts Group (B) Joint Picture Experts Group (C) Join Photo and Graphics Expert Group (D) Join Picture Graphics Expert Group
Ans: A
55. The painting option in Photoshop which determines the degree by which the tools lighten or darken an image is: (A) Scaling (B) Smudge (C) Dodge (D) Opacity
Ans: D
56. The feature in Corel Draw which gives objects a 3D look by creating the illusion of depth is: (A) Smudge (B) Dodge (C) Extrude (D) Sponge
Ans: C
57. What is gutter margin? (A) Margin that is added to right margin when printing (B) Margin that is added to the binding side of page when printing (C) Margin that is added to the left margin when printing (D) Margin that is added to the outside of the page when printing
Ans: B
58. What is the Name of popular software used for creating 2D animation? (A) Moho (B) Dragon Frame (C) Blender (D) Flash
Ans: D
59. Spelling and Grammar check can be easily checked by using the function key: (A) F2 (B) F3 (C) F5 (D) F7
Ans: D
60. A Broadcast/NTSC Video requires, how many FPS for it to play smoothly? (A) 30 (B) 60 (C) 10 (D) 50
Ans: A
61. Using illustrator or Corel Draw you can create mainly what type of graphics: (A) Vector (B) Scalar (C) Both (A) and (B) (D) None of the above
Ans: A
62. What method of animation creates the in-between frames when you create the start and end points of the animation? (A) Authering (B) Clipping (C) Tweening (D) Mapping
Ans: C
63. –––––––––– is shading and rendering method used in 3D computer graphics. (A) Ambient occlusion (B) Rigging (C) Squashing (D) Lighting
Ans: A
64. HDMI stands for: (A) Higher Digital Multimedia interface (B) High Definition Multimedia interface (C) High Definition Media interface (D) High Definition Multimedia interchange
Ans: B
65. What is the smallest and largest font size in MS Word? (A) 6 and 96 (B) 6 and 72 (C) 8 and 96 (D) 8 and 72
Ans: D
66. The first version of Word for Windows was released in which year? (A) 1990 (B) 1989 (C) 1991 (D) 1988
Ans: B
67. 1024 tera bytes is equal to one: (A) Zetta byte (B) Yotta byte (C) Exa byte (D) Peta byte
Ans: D
68. On an excel sheet the active cell is indicated by: (A) Dotted border (B) A dark wide border (C) A blinking border (D) By italic text
Ans: B
69. You can convert existing Excel worksheet data and charts to HTML document by using the (A) Internet Assistant Wizard (B) Import Wizard (C) Internet Wizard (D) Export Wizard
Ans: A
70. Which file format is for Coreldraw? (A) CRD (B) PSD (C) CDR (D) CDD
Ans: C
71. The technology developed by Microsoft that allows an object such as a graphic, video clip, spreadsheet, etc. to be embedded, into a document known as: (A) PSD (B) EXTD (C) OLE (D) DLINK
Ans: C
72. Which key is used to Insert a Hyperlink? (A) Ctrl+E (B) Ctrl+J (C) Ctrl+I (D) Ctrl+K
Ans: D
73. Which key is used to insert a Line Break? (A) Shift+Enter (B) Alt+Enter (C) Ctrl+Enter (D) Fn+Enter
Ans: A
74. For the implementation of C2C E- commerce the essential infrastructure are : (i) Communication network (ii) WWW (iii) EDI standards (iv) Payment system (A) (i) and (ii) (B) (ii) and (iii) (C) (iii) only (D) (iii) and (iv)
Ans: B
75. Which is the major categories of E-commerce? (A) Electronic market (B) EDI (C) Internet commerce (D) All of the above
Ans: D
76. Interstitials are : (A) ads appears as rectangular graphics near the top of the page (B) add on the web that appears between web pages that the user requests (C) ads that appear as banner (D) None of the above
Ans: B
77. A digital signature indicates: (A) Message was created by a known sender (B) Message was not altered in transit (C) Both (A) and (B) (D) None of the above
Ans: C
78. Which of the following is the components of supply chain management? (A) Plan (B) Source (C) Make (D) All of the above
Ans: D
79. Search Encrypt is: (A) Search engine (B) Encryption methodology (C) Searching Methodology (D) None of the above
Ans: A
80. Computer application which is used to publish, edit, order, delete and maintenance from a central interface: (A) Application Management System (B) Content Management System (C) E-management System (D) None of the above
Ans: B
81. The main target group that can be distinguished in governance concepts: (A) Government (B) Citizens (C) Business groups (D) All of the above
Ans: D
82. Patent is a way to protect: (A) Intellectual property (B) Royalty (C) Ethics (D) System quality
Ans: A
83. NORA is: (A) Non obvious Responsibility Analysis (B) Non obvious Reliability Analysis (C) Non obvious Relationship Analysis (D) None of the above
Ans: C
84. –––––––––– means mechanisms are in place to determine who took responsible action and who is responsible. (A) Responsibility (B) Accountability (C) Liability (D) Portability
Ans: B
85. Domain Names to IP address conversion is done by using: (A) Domain Name System (B) Proxy Servers (C) Name Servers (D) Internet
Ans: C
86. A pair of tag and their content together are called: (A) Container (B) Element (C) Attributes (D) Tags
Ans: B
87. Which tag is used in html to preserve white spaces? (A) <pre> (B) <br> (C) <p> (D) <em>
Ans: A
88. Who introduced the concept of www? (A) Steve Wozniak (B) Robert E Khan (C) James Hendler (D) Tim Berners Lee
Ans: D
89. Which is the first browser with GUI? (A) Internet Explorer (B) Mosaic (C) Safari (D) Mozilla Firefox
Ans: B
90. Which one among the following heading tag uses the default font size? (A) <h1> (B) <h3> (C) <h4> (D) <h5>
Ans: C
91. Identify the block tag: (A) <br> (B) <b> (C) <i> (D) <p>
Ans: D
92. The attribute of <img> tag used to display the text when the image is not possible to display: (A) alt (B) href (C) li (D) src
Ans: A
93. Html tag that is used to implement Hypertext Links in webpage is (A) <l> (B) <hyperlink> (C) <a> (D) <link>
Ans: C
94. The unit of information on the web is referred as: (A) Documents (B) Elements (C) Data (D) Sources
Ans: A
95. Which html tag is used for defining the rows and cols of browser window? (A) <frame> (B) <frameset> (C) <noframe> (D) <img>
Ans: B
96. To store intermediate results of a computation ALU uses: (A) Instruction Register (B) Program counter (C) General Register (D) Accumulator
Ans: D
97. Which is the technique used to extend the apparent size of physical memory? (A) Virtual Memory (B) Optical Disk (C) Cache Memory (D) Secondary Memory
Ans: A
98. While executing a program which is used to alter between the operations incrementing PC and ALU operations: (A) DMA (B) Conditional Flags (C) Multiplexer (D) None of the above
Ans: C
99. Scheme used to use the bus during idle period to serve another request is: (A) Split transaction protocol (B) Transport protocol (C) Sliding window protocol (D) Cross bar interconnection
Ans: A
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15