1. A hybrid computer exhibits the
features of ____.
(A) Analog computer
(B) Digital computer
(C) Both analog and digital computer
(D) Mainframe computer
(E) None of these
ANS:-C
2. A DSLAM is a device used by Internet Service Providers (ISPs) to route incoming DSL connections to the Internet. What is its correct full form?
(A) Digital Subscriber Line Access Multiplexer
(B) Digital Subscriber Line Access Multiplier
(C) Digital Service Line Access Multiplexer
(D) Dual Subscriber Line Access Multiplexer
(E) None of these
ANS:-A
3. Which among the following has been standardized in the IEEE 803 specifications?
(A) Bluetooth
(B) Ethernet
(C) WiMAX
(D) All of the above
(E) None of the above
ANS:-B
4. State the correct external command?
(A) Chkdsk.exe
(B) Attrib.exe
(C) Restore.exe
(D) Backup.exe
(E) All of the above
ANS:-A
5. Which of the following is a Web browser?
(A) Word
(B) Paint
(C) Power Point
(D) Firefox
(E) None of these
ANS:-D
6. Which of the following shortcut key is used to move backward through the tabs?
(A) SHIFT+TAB
(B) CTRL+SHIFT+TAB
(C) CTRL+TAB
(D) CTRL+ALT+TAB
(E) None of the above
ANS:-B
7. Alerts are mostly appear in ___.
(A) Check Box
(B) Combo Box
(C) Dialog Box
(D) All of the above
(E) None of the above
ANS:-C
8. Which of the following is the impact printer?
(A) Laser printer
(B) Ink jet printers
(C) Chain Printers
(D) All of the above
(E) None of the above
ANS:-C
9. The use of parity bit is for:
(A) Error detection
(B) Indexing
(C) Coding
(D) All of the above
(E) None of the above
ANS:-A
10. Symbolic constants can be defined using ___
(A) extern
(B) const
(C) define
(D) All of the above
(E) None of the above
ANS:-B
11. Stand alone programs refer to:
(A) Executable programs
(B) Source programs
(C) Object programs
(D) Direct programs
(E) Indirect programs
ANS:-A
12. The primary purpose of software is to turn data into ____.
(A) websites
(B) information
(C) programs
(D) objects
(E) None of these
ANS:-B
13. Back up of the data files will help toprevent ____.
(A) loss of confidentiality
(B) duplication of data
(C) virus infection
(D) loss of data
(E) None of these
ANS:-D
14. ____ is processed by the computer into information.
(A) Data
(B) Numbers
(C) Alphabets
(D) Pictures
(E) All of the above
ANS:- A
15. A ___ can make easier to play games.
(A) Mouse
(B) Joystick
(C) Keyboard
(D) Pen
(E) All of the above
ANS:-B
16. If you want to make the number pad act as directional arrows, you press the ____ key.
(A) Shift
(B) Arrow lock
(C) Num lock
(D) Caps lock
(E) Tab
ANS:-C
17. Software applies ____ also called algorithms, to process data.
(A) Arithmetic
(B) Procedures
(C) Objects
(D) Rules
(E) None of these
ANS:-B
18. The human readable version of a program is called ___
(A) Source code
(B) Program code
(C) Human code
(D) System code
(E) Readable code
ANS:-A
19. A computer – intensive problem runs on a ____
(A) Server
(B) Main frame
(C) Super computer
(D) Super PC
(E) None of these
ANS:-C
UPDATED BY manoj kushwaha .
Share with us at siva840@gmail.com
features of ____.
(A) Analog computer
(B) Digital computer
(C) Both analog and digital computer
(D) Mainframe computer
(E) None of these
ANS:-C
2. A DSLAM is a device used by Internet Service Providers (ISPs) to route incoming DSL connections to the Internet. What is its correct full form?
(A) Digital Subscriber Line Access Multiplexer
(B) Digital Subscriber Line Access Multiplier
(C) Digital Service Line Access Multiplexer
(D) Dual Subscriber Line Access Multiplexer
(E) None of these
ANS:-A
3. Which among the following has been standardized in the IEEE 803 specifications?
(A) Bluetooth
(B) Ethernet
(C) WiMAX
(D) All of the above
(E) None of the above
ANS:-B
4. State the correct external command?
(A) Chkdsk.exe
(B) Attrib.exe
(C) Restore.exe
(D) Backup.exe
(E) All of the above
ANS:-A
5. Which of the following is a Web browser?
(A) Word
(B) Paint
(C) Power Point
(D) Firefox
(E) None of these
ANS:-D
6. Which of the following shortcut key is used to move backward through the tabs?
(A) SHIFT+TAB
(B) CTRL+SHIFT+TAB
(C) CTRL+TAB
(D) CTRL+ALT+TAB
(E) None of the above
ANS:-B
7. Alerts are mostly appear in ___.
(A) Check Box
(B) Combo Box
(C) Dialog Box
(D) All of the above
(E) None of the above
ANS:-C
8. Which of the following is the impact printer?
(A) Laser printer
(B) Ink jet printers
(C) Chain Printers
(D) All of the above
(E) None of the above
ANS:-C
9. The use of parity bit is for:
(A) Error detection
(B) Indexing
(C) Coding
(D) All of the above
(E) None of the above
ANS:-A
10. Symbolic constants can be defined using ___
(A) extern
(B) const
(C) define
(D) All of the above
(E) None of the above
ANS:-B
11. Stand alone programs refer to:
(A) Executable programs
(B) Source programs
(C) Object programs
(D) Direct programs
(E) Indirect programs
ANS:-A
12. The primary purpose of software is to turn data into ____.
(A) websites
(B) information
(C) programs
(D) objects
(E) None of these
ANS:-B
13. Back up of the data files will help toprevent ____.
(A) loss of confidentiality
(B) duplication of data
(C) virus infection
(D) loss of data
(E) None of these
ANS:-D
14. ____ is processed by the computer into information.
(A) Data
(B) Numbers
(C) Alphabets
(D) Pictures
(E) All of the above
ANS:- A
15. A ___ can make easier to play games.
(A) Mouse
(B) Joystick
(C) Keyboard
(D) Pen
(E) All of the above
ANS:-B
16. If you want to make the number pad act as directional arrows, you press the ____ key.
(A) Shift
(B) Arrow lock
(C) Num lock
(D) Caps lock
(E) Tab
ANS:-C
17. Software applies ____ also called algorithms, to process data.
(A) Arithmetic
(B) Procedures
(C) Objects
(D) Rules
(E) None of these
ANS:-B
18. The human readable version of a program is called ___
(A) Source code
(B) Program code
(C) Human code
(D) System code
(E) Readable code
ANS:-A
19. A computer – intensive problem runs on a ____
(A) Server
(B) Main frame
(C) Super computer
(D) Super PC
(E) None of these
ANS:-C
UPDATED BY manoj kushwaha .
Share with us at siva840@gmail.com
EmoticonEmoticon