Download as pdf or txt
Download as pdf or txt
You are on page 1of 226

Objective Computer Fundamentals

(Fully Solved)

For Competitive Examinations


(IBPS PO/Clerk, SBI PO/Clerk, RRB PO/Clerk, SSC, MCA)

FIRST EDITION

Authored By: Gopal Chandra Nayak

For more E-books & Study materials stay in touch with


http://www.gcnayak.blogspot.com

Objective Computer Fundamentals


Objective Computer Fundamentals

(Fully Solved)

For Competitive Examinations


(IBPS PO/Clerk, SBI PO/Clerk, RRB PO/Clerk, SSC, MCA)

F I R S T E D I T I O N

Authored By
Gopal Chandra Nayak
(B.TECH in Electronics & Communication Engineering)
www.gcnayak.blogspot.com gopalnayak123@gmail.com
COPYRIGHT PAGE INTENTIONALLY REMOVED

For free distribution on internet as E-book (Strictly for learning


purposes)

Author
CONTENTS

1. Author‘s Note

2. Dedication

3. Basics ……………………………………………………………………………… 01

 Introduction………………………………………………………………… 01
 Generation of computer…………………………………………………….. 02
 Computer Organization………………………………………………………..03
 Input & Output Devices…………………………………………………...…..03
 Hardware & Software Basics…………………………………………...……..05
 Internet…………………………………………………………………...……07
 Network Topologies…………………………………………………………...08
 Information Security…………………………………………………………..12
 The OSI Reference Model…………………………………………………….13

4. 1500+ Key Points ……………………………………………………………………. 22

5. 1000+ Multiple Choice Questions (MCQs) ………………………………………….. 58

 Additional 550 MCQs………………………………………………………..109

6. Shortcut Keys……………………………………………………………………… 193

 General Keyboard Shortcut Keys…………………………………………….193


 Windows Logo Key Keyboard Shortcut Keys……………………………….194
 MS-Word Shortcut Keys…………………………………………………..…195
 MS-Excel Shortcut Keys……………………………………………………..198
 MS-PowerPoint Shortcut Keys…………………………………………..…..201
 Miscellaneous Shortcut Keys ………………………………………………..202

7. Abbreviations……………………………………………………………………….. 203

8. Computer Glossary…………………………………………………………………. 209

9. References…………………………………………………………………………... 220
AUTHOR’S NOTE

Computer Section in banking examinations has more importance because it consumes


less time & helps students to score more. With a view to the cut throat competition in Competitive
Examinations like Banking I have prepared this Book. I Hope this book will be very useful for Quick
Preparation/Revision even if 10 days before the Examination. More Importance has been given to
Error free & Precise Solutions. Selected questions from previous competitive exams along with
answers have been incorporated & almost every question is unique. The book is Fully Solved.

Utmost care has been taken to provide error free solutions, if any error found,
kindly bring to my notice at gopalnayak123@gmail.com. Your constructive suggestions for
improvement of this book will be highly appreciated.

Gopal Chandra Nayak

More E-Resources By the same Author


 Objective Computer Fundamentals for Banking
 Aptitude Skill Test For Banking
 Banking Awareness Hand Book

Download these books at : - http://www.gcnayak.blogspot.com


DEDICATION

To two precious diamonds of my life, my beloved Mother Snehalata Nayak and to my friend,
philosopher & Guide my Father Manmatha Nayak

SAVE TREE ıı SAVE NATURE ıı FOR A BETTER FUTURE


0
Page
BASICS

INTRODUCTION

 A Computer is a general purpose device that can be programmed to carry out a set of
arithmetic or logical operations automatically. Since a sequence of operations can be
readily changed, the computer can solve more than one kind of problem.
 A general purpose computer has four main components →the arithmetic logic unit
(ALU), the control unit, the memory, and the input and output devices (collectively
termed I/O).
 The data that is fed into a computer processor received into the computer by a keyboard
or other sources is called Input.
 A computer is an electronic device that accepts data from the user (input), processes the
data by performing calculations and operations on it and generates the desired Output.
 The device which is used with a computer to display or store data is called Peripherals.
 The mechanical, magnetic, electronic and electrical components that comprises a
computer system such as the Central Processing Unit (CPU), monitor, keyboard, etc. is
known as Hardware.
 A set of instructions that tells the computer about the tasks to be performed and how
these tasks are to performed, is known as Software.
 An unprocessed collection or representation of raw facts represented in a manner suitable
for communication, interpretation or processing by humans or by automatic means, is
known as Data.
 The result of processing, manipulating and organizing data in a way that adds to the
knowledge of the person receiving it, is known as Information.
 The smallest unit of information, a computer can understand and process, is known as
Bit.
 The primary goal of computer is to process information that it receives and output the
results. The process of control and alter information is known as. Processing.
 The number system computer used to store data and perform calculation is Binary
Number System.
 Computer Speed, Accuracy, Diligence, Storage Capability, Automation, Remembrance
Power and Versatility are the main Characteristics of Computer.
 Self-Intelligence, Decision-Making power, Learning power, Self-care, Feelings are the
Limitations of Computer.
 A Mainframe computer is a much larger computer that typically fills a room and may
cost many hundreds or thousands of times as much as a personal computer. They are
designed to perform large numbers of calculations for governments and large enterprises.
 Read-only memory (ROM) is a storage medium used in computers and other electronic
devices. Data stored in ROM can only be modified slowly or with difficulty, or not at all.
ROM is non-volatile and the contents are retained even after the power is switched off. It
only allows reading. The types of ROM include PROM, EPROM and EEPROM.
 Random Access Memory (RAM), allows the computer to store data for immediate for
1

immediate manipulation and to keep track of what is currently being processed. RAM is
Page
referred to as volatile memory and is lost when the power is turned off. It allows reading
and writing. The two main types of RAM are static RAM and Dynamic RAM.
 SRAM retains data as long as power is provided to the memory chip and need not be
refreshed periodically. SRAM stands for Static Random Access Memory.
 The data on DRAM continues to move in and out of the memory as long as power is
available and must be continually refreshed to maintain the data. DRAM stands for
Dynamic Random Access Memory.
 Primary memory is computer memory that a processor or computer accesses first or
directly. For example: RAM, and Cache Memory.
 Secondary memory (or secondary storage) is the slowest and cheapest form of
memory. It cannot be processed directly by the CPU. Secondary memory devices include
magnetic disks like hard drives and floppy disks, optical disks such as CDs and
CDROMs, and magnetic tapes, which were the first forms of secondary memory.
 Virtual memory is memory on the hard disk that the CPU uses as an extended RAM.
 Installation is the process of copying software programs from secondary storage media
to the hard disk.
 A central computer that holds collections of data and programs for many PCs,
workstations and other computers is a Server.

GENERATIONS OF COMPUTER

 The first general purpose computer, designed to handle both numeric and textual
information is Universal Automatic Computer (UNIVAC) (1951)

First Generation (1940-1956 →Vacuum Tubes:

 The first computers used vacuum tubes for circuitry and magnetic drums for memory,
and were often enormous, taking up entire rooms.
 The UNIVAC and ENIAC computers are examples of first-generation computing
devices.
 In first generation of computer, this operating system allowed only one program to run at
a time and a number of input jobs are grouped for processing. It is known as Batch
Processing.

Second Generation (1956-1963) →Transistors:

 Transistors replaced vacuum tubes and ushered in the second generation of computers.

Third Generation (1964-1971) →Integrated Circuits:

 The development of the integrated circuit was the hallmark of the third generation of
computers. Transistors were miniaturized and placed on silicon chips, called
semiconductors, which drastically increased the speed and efficiency of computers.

Fourth Generation (1971-Present) →Microprocessors:


2
Page
 The microprocessor brought the fourth generation of computers, as thousands of
integrated circuits were built onto a single silicon chip.
 What in the first generation filled an entire room could now fit in the palm of the hand
Fourth generation computers also saw the development of GUIs, the mouse and handheld
devices

Fifth Generation (Present and Beyond) →Artificial Intelligence:

 Fifth generation computing devices, based on artificial intelligence, are still in


development, though there are some applications, such as voice recognition, that are
being used today.
 In 1981 IBM introduced its first computer for the home user, and in 1984 Apple
introduced the Macintosh.

COMPUTER ORGANISATION

 An Arithmetic Logic Unit (ALU) is a digital circuit that performs integer arithmetic and
logical operations. The ALU is a fundamental building block of the central processing
unit of a computer.
 Control Unit is responsible for controlling the overall operations of computer. It
coordinates the sequence of execution of instructions and controls the overall functioning
of the computer.
 The first computer architecture was introduced by John Von Neumann (1970)
 Personal computers use a number of chips mounted on a main circuit board called
Motherboard.
 The CPU is fabricated as a single Integrated Circuit (IC) chip. It is also known as the
Microprocessor.
 Multiprocessing is the use of two or more central processing units (CPUs) within a
single computer system. The term also refers to the ability of a system to support more
than one processor and/or the ability to allocate tasks between them.
 The organization and interconnection of the various components of a computer system is
known as Computer Architecture.
 A CPU can directly understand the Machine Language (0, 1 format).

INPUT & OUTPUT DEVICES

 An input device is any peripheral (piece of computer hardware equipment) used to


provide data and control signals to a computer. They are the devices that feed data into a
computer. Examples of input devices include keyboards, mouse, scanners, digital
cameras and joysticks.
 The keys include the letter keys (0, 1, 2..... 9; A, B…..Z), which are generally laid out in
the same style as in typewriters are known as Alphanumeric Keys.
 'Caps lock' and 'Num lock' keys are called as Toggle Keys because when pressed, they
change their status from one state to another.
 Numeric Keypad is a keypad located on the right hand side of the keyboard. It consists
3
Page

of digits and mathematical operators.


 A Modifier key is a special key (or combination) on a computer keyboard that
temporarily modifies the normal action of another key when pressed together. By
themselves, modifier keys usually do nothing; that is, pressing any of the Shift, Alt, or
Ctrl keys alone does not (generally) trigger any action from the computer.
 A Mouse is the most popular input device which is used today for interactive processing
and for the one line entry of data for batch processing.
 Drag and Drop refers to the action of clicking and holding down the mouse button,
while moving the mouse and then releasing the mouse button.
 The first computer mouse was invented by Douglas Engelbart.
 Joystick is the device that moves in all directions and controls the movement of a
pointer.
 A Touch Screen is a type of display screen device that is placed on the computer monitor
to allow direct selection or activation of the computer when the user touches the screen.
 Light Pen is the pen shaped device, which can sense light and is used to point at spots on
a video screen.
 A technology enables a high-speed reading of large quantities of data and transferring
these data to the computer without using a keyboard. It is referred as Optical Mark
Reader (OMR). It uses a beam of light that is reflected on the paper with marks, to
capture presence and absence of marks.
 MICR reads the characters by examining their shapes in a matrix form and the
information is then passed on to the computer. MICR stands for Magnetic Ink
Character Reader. MICR code consist of 9 numeric digits (First 3 digit represent City,
next 3 digit represent Bank, Last 3 digit represent Branch). It provides a high level of
security and is therefore used by the banking industry for faster processing of the cheques
 Bar Code is a machine readable code, which is represented by parallel vertical lines with
varying widths. For reading these bar-coded data, a device is used, which is known as a
Bar Code Reader (BCR)
 Optical Character Recognition (OCR) is used to scan the document containing text. It
is the mechanical or electronic conversion of scanned or photographed images of
typewritten or printed text into machine-encoded/computer-readable text.
 A keyboard is a typewriter-style device, which uses an arrangement of buttons or keys,
to act as mechanical levers or electronic switches. Most of the commonly available
personal computers have a keyboard, popularly known as QWERTY. The keys labelled
Fl to F12 on the keyboard are called Function Keys.
 An Output device is any piece of computer hardware equipment used to communicate
the results of data processing carried out by an information processing system (such as a
computer) which converts the electronically generated information into human-readable
form
 The printed form of output is referred as Hard Copy.
 The form of output displayed on the screen is referred as Soft Copy.
 The device that prints information from the computer onto the paper is Printer.
 Pages Per Minute (PPM) is the unit used to count the speed of the printer.
 On the basis of technology, printers are categorized into Impact and Non- Impact
Printers.
 Impact printers create an image by using some mechanism to physically press an inked
4
Page

ribbon against the page, causing the ink to be deposited on the page in the shape desired.
Examples of Impact Printers are Character Printers and Dot Matrix Printers.
 Non–Impact Printers do not touch the paper when creating an image. Examples of Non
- Impact Printers are Inkjet printers, Laser printers, Solid ink printers, Dye-sublimation,
Thermal wax printers, Thermal auto chrome printers.
 A pen based output device, attached to a computer for making vector graphics, that is,
images created by a series of many straight lines is known as Plotters.
 The number of pixels displayed on a screen is known as Resolution.
 A Monitor is a TV-like display attached to the computer on which the output can be
displayed and viewed. It can either be a monochrome display or a color display.

HARDWARE AND SOFTWARE BASICS

 The set of instructions, which control the sequence of operations, are known as Program.
It is a sequence of instructions, written to perform a specified task with a computer.
 A Software instructs the computer what to do and how to do it. It is a set of instructions
that tells the computer about the tasks to be performed and how these tasks are to
performed.
 One or more defects or problems that prevent the software from working as intended of
working at all is a Bug.
 Software that contributes to the control and performance of the computer system and
permits the user to use the system more conveniently is termed as System Software.
 Antivirus Software is used to scan the hard disk to remove the virus from them.
 The assembly language program is translated into machine code by a separate program
known as an Assembler.
 A Backup, or the process of backing up, refers to the copying and archiving of computer
data so it may be used to restore the original after a data loss event. It contains a copy of
every program data and system file on a computer.
 An Operating System controls the way in which the computer system functions and
provides a means by which users can interact with the computer.
 Loading of the Operating System is known as Booting. Restarting a computer that is
already on, is referred to as Warm Booting.
 Basic Input – Output System (BIOS) is the part of operating system that manages the
essential peripherals such as the keyboard, screen, disk drives and parallel and serial
ports.
 An Integrated Software is a single application that combines major features of several
types of application.
 An Application Software is the program that makes the computer useful to the users.
 Computer hardware is the collection of physical elements that constitutes a computer
system.
 Computer hardware refers to the physical parts or components of a computer such as
the monitor, mouse, keyboard, computer data storage, hard drive disk (HDD), system unit
(graphic cards, sound cards, memory, motherboard and chips), etc. all of which are
physical objects that can be touched.
 The Motherboard is the main component of computer. It is a large rectangular board
with integrated circuitry that connects the other parts of the computer including the CPU,
5
Page
the RAM, the disk drives (CD, DVD, hard disk, or any others) as well as any peripherals
connected via the ports or the expansion slots.
 Here are some common individual computer hardware components that you'll often find
inside a modern computer case:
 Motherboard
 Central Processing Unit (CPU)
 Random Access Memory (RAM)
 Power Supply
 Video Card
 Hard Drive (HDD)
 Solid-State Drive (SSD)
 Optical Drive (e.g. BD/DVD/CD drive)
 Card Reader (SD/SDHC, CF, etc.)
 Here are some common hardware that you might find connected to the outside of a
computer:
 Monitor
 Keyboard
 Mouse
 Battery Backup-UPS
 Printer
 Speaker
 Here are some less common computer hardware, (either because these pieces are now
usually integrated into other devices or because they've been replaced with newer
technology):
 Sound Card (e.g. MIDI)
 Network Interface Card (NIC)
 Expansion Card (Firewire, USB, Thunderbolt, etc.)
 Hard Drive Controller Card
 Analog Modem
 Scanner
 Floppy Disk Drive
 Joystick
 Webcam
 Microphone
 Tape Drive
 Zip Drive
 The following hardwires are referred to as network hardware and various pieces are often
part of a home or business network:
 Digital Modem (e.g. Cable Modem, DSL Modem, etc.)
 Router
 Network Switch
 Access Point
 Repeater
 Bridge
 Print Server
6

 Firewall
Page
INTERNET

 The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to link several billion devices worldwide.
 It is a network of networks that consists of millions of private, public, academic,
business, and government networks, of local to global scope, that are linked by a broad
array of electronic, wireless, and optical networking technologies.
 The World Wide Web (abbreviated as WWW or W3, commonly known as the Web) is a
system of interlinked hypertext documents that are accessed via the Internet.
 A Website, is a set of related web pages served from a single web domain.
 A Home page, index page, or main page is a page on a website. A home page usually
refers to:
 The initial or main web page of a website, sometimes called the "front
page" (by analogy with newspapers).
 The first page that appears upon opening a web browser program, which is
also sometimes called the start page. This 'start page' can be a website or it
can be a page with various browser functions such as the visual display of
websites that are often visited in the web browser.
 The web page or local file that automatically loads when a web browser
starts or when the browser's "home" button is pressed; this is also called a
"home page". The user can specify the URL of the page to be loaded, or
alternatively choose e.g. to re-load the most recent web page browsed.
 A personal web page, for example at a web hosting service or a university
web site that typically is stored in the home directory of the user.
 A Hyperlink is a reference to data that the reader can directly follow either by clicking or
by hovering or that is followed automatically
 A web browser (commonly referred to as a browser) is a software application for
retrieving, presenting and traversing information resources on the World Wide Web.
 The Uniform Resource Locator, abbreviated as URL is a specific character string that
constitutes a reference to a resource. In most web browsers, the URL of a web page is
displayed on top inside an address bar.
 Downloading means to receive data to a local system from a remote system, or to initiate
such a data transfer
 Uploading refers to the sending of data from a local system to a remote system such as a
server or another client with the intent that the remote system should store a copy of the
data being transferred
 An Internet Protocol address (also known as an IP address) is a numerical label
assigned to each device (e.g., computer, printer) participating in a computer network. It
acts as an identifier for a computer. It is a unique address for every computer.
 An email attachment is a computer file sent along with an email message. One or more
files can be attached to any email message, and be sent along with it to the recipient.
 Hotmail was co - founded by an Indian American entrepreneur Sabeer Bhatia along with
Jack Smith in July of 1996
7
Page
 CC (Carbon Copy) in e – mail indicates those who are to receive a copy of a message
addressed primarily to another. The list of CCed recipients is visible to all other
recipients of the message.
 An additional BCC (blind carbon copy) field is available for hidden notification;
recipients listed in the BCC field receive a copy of the message, but are not shown on any
other recipient's copy (including other BCC recipients)
 The Drafts folder retains copies of messages that you have started but are not yet ready
to send.
 The first email was sent by Ray Tomlinson to himself in 1971.

DOMAIN TYPES DESCRIPTION


COM For Commercial and Profit
oriented organizations
EDU Education provider, College,
Universities etc.
GOV Federal Government Agencies
MIL US Military Sites
NET Internet infrastructure and
service provider
ORG Miscellaneous & Non-profit
Organizations

NETWORK TOPOLOGIES

 Network topologies describe the ways in which the elements of a network are
mapped. They describe the physical and logical arrangement of the network nodes.
The physical topology of a network refers to the configuration of Cables, computers,
and other peripherals.

 Different Types of Topologies are

 Bus Topology
 Star Topology
 Ring Topology
 Mesh Topology
 Tree Topology
 Hybrid Topology
8
Page
Bus Topology:

 All the nodes (file server, workstations, and peripherals) on a bus topology are connected
by one single cable.
 A bus topology consists of a main run of cable with a terminator at each end. All nodes
(file server, workstations, and peripherals) are connected to the linear cable. Popular on
LANs because they are inexpensive and easy to install.
 Advantages of Bus Topology
• It is Cheap, easy to handle and implement.
• Require less cable
• It is best suited for small networks.
 Disadvantages of Bus Topology
• The cable length is limited. This limits the number of stations that can be
connected.
• A break in the cable will prevent all systems from accessing the network.
• This network topology can perform well only for a limited number of
nodes.
• Network disruption when computers are added or removed

Star Topology:

 All computers/devices connect to a central device called hub or switch.


 Each device requires a single cable
 Point-to-point connection between the device and hub.
9


Page

Most widely implemented


 Hub is the single point of failure

 Advantages of Star Topology


• Easy to manage
• Easy to locate problems (cable/workstations)
• Easier to expand than a bus or ring topology.
• Easy to install and wire.
• Easy to detect faults and to remove parts.
 Disadvantages of Star Topology
• Requires more cable length than a linear topology.
• If the hub or concentrator fails, nodes attached are disabled.
• More expensive because of the cost of the concentrators

Ring Topology:

 In a ring network, every device has exactly two neighbors for communication purposes.
 All messages travel through a ring in the same direction.
 A failure in any cable or device breaks the loop and can take down the entire network.
 To implement a ring network we use the Token Ring technology
 A token, or small data packet, is continuously passed around the network. When a device
needs to transmit, it reserves the token for the next trip around, then attaches its data
packet to it.
 Advantage of Ring Topology
• Very orderly network where every device has access to the token and the
opportunity to transmit.
• Easier to Manage than a Bus Network
• Good Communication over long distances
• Handles high volume of traffic
 Disadvantages of Ring Topology
• The failure of a single node of the network can cause the entire network to
fail.
• The movement or changes made to network nodes affects the performance
of the entire network.
10

• Expansion to the network can cause network disruption


Page
Mesh Topology

 In this topology, each node is connected to every other node in the network.
 Implementing the mesh topology is expensive and difficult.
 In this type of network, each node may send message to destination through multiple
paths.
 While the data is travelling on the Mesh Network it is automatically configured to reach
the destination by taking the shortest route which means the least number of hops.
 Advantage of Mesh Topology
• No traffic problem as there are dedicated links.
• It has multiple links, so if one route is blocked then other routes can be used
for data communication.
• Points to point links make fault identification easy.
 Disadvantage of Mesh Topology
• There is mesh of wiring which can be difficult to manage.
• Installation is complex as each node is connected to every node.
• Cabling cost is high as a network of n nodes requires n(n-1)/2 cables.

Tree Topology

 A tree topology (Hierarchical Topology) can be viewed as a collection of star networks


11

arranged in a hierarchy.
 This tree has individual peripheral nodes which are required to transmit to and receive
Page

from one other only and are not required to act as repeaters or regenerators.
 The tree topology arranges links and nodes into distinct hierarchies in order to allow
greater control and easier troubleshooting.
 This is particularly helpful for colleges, universities and schools so that each of the
connect to the big network in some way.
 Advantages of a Tree Topology
• Point-to-point wiring for individual segments.
• Supported by several hardware and software vendors.
• All the computers have access to the larger and their immediate networks.
 Disadvantages of a Tree Topology
• Overall length of each segment is limited by the type of cabling used.
• If the backbone line breaks, the entire segment goes down.
• More difficult to configure and wire than other topologies.

Hybrid Topology

 A combination of any two or more network topologies.


 A hybrid topology always accrues when two different basic network topologies are
connected.
 It is a mixture of above mentioned topologies. Usually, a central computer is attached
with sub-controllers which in turn participate in a variety of topologies.
 Advantages of Hybrid Topology
• It is extremely flexible.
• It is very reliable.
 Disadvantages of Hybrid Topology
• Expensive

INFORMATION SECURITY
12

 A Computer Virus is a computer program or code that can replicate itself and spread
from one computer system to another system.
Page

 A computer virus has the capacity to corrupt or to delete data on your computer and it can
utilize an e-mail program to spread the virus to other computer systems. In the worst case
scenario, it can even delete everything on your hard disk. The purpose of it to disrupt the
operation of the computer or the program. Some examples of Computer Virus are Trojan
viruses. Stealth viruses, worms, malware (malicious software), Disk Killer, Stone virus,
Sunday, Cascade, Nuclear, Word Concept, etc.
 Malware, short for malicious software, is any software used to disrupt computer
operation, gather sensitive information, or gain access to private computer systems. It can
appear in the form of executable code, scripts, active content, and other software.
 Antivirus Software is used to scan the hard disk to remove the virus from them. Some of
the famous antivirus software available are Avast!, Norton, Avira, Kaspersky, AVG,
Quick Heal etc.
 The Creeper virus was the first virus detected on ARPANET, in the early 1970s.
 A person who uses his or her expertise to gain access to other people‘s computers to get
information illegally or do damage is a Hacker.
 Authorization is the function of specifying access rights to resources related to
information security and computer security in general and to access control in particular.
More formally, "to authorize" is to define an access policy.
 Authentication is the act of confirming the truth of an attribute of a single piece of data
or entity. It might involve confirming the identity of a person by validating their identity
documents, verifying the validity of a website with a digital certificate, tracing the age of
an artifact by carbon dating, or ensuring that a product is what its packaging and labeling
claim to be. In other words, Authentication often involves verifying the validity of at least
one form of identification.
 Phishing is the attempt to acquire sensitive information such as usernames, passwords,
and credit card details (and sometimes, indirectly, money) by masquerading as a
trustworthy entity in an electronic communication.
 A Spoofing attack is a situation in which one person or program successfully represents
oneself as another by falsifying data and thereby gaining an illegitimate advantage.
 Browser Sniffing is a set of techniques used in websites and web applications in order to
determine the web browser that a visitor is using, and to serve browser-appropriate
content to the visitor.

THE OSI REFERENCE MODEL

The Open Systems Interconnection (OSI) model was developed by the


International Organization for Standardization (ISO). It provided the first framework
governing how information should be sent across a network. The OSI model itself is now
somewhat deprecated – modern protocol suites, such as the TCP/IP suite, are difficult to fit
cleanly within the OSI model‘s seven layers. The OSI model consists of seven layers, each
corresponding to a specific network functions:-
13
Page
Short Cut to memorize layers- All People Seems To Need Data Processing

OSI Model - The Upper Layers:

The top three layers of the OSI model are often referred to as the upper layers:
• Layer-7 - Application layer
• Layer-6 - Presentation layer
• Layer-5 - Session layer

OSI Model - The Lower Layers

The bottom four layers of the OSI model are often referred to as the lower layers:
• Layer-4 – Transport Layer
• Layer-3 – Network Layer
• Layer-2 –Data-link Layer
• Layer-1 –Physical Layer

Protocols that operate at these layers control the end-to-end transport of data
between devices, and are implemented in both software and hardware. The function of the
upper layers of the OSI model can be difficult to visualize. Upper layer protocols do not
always fit perfectly within a layer, and often function across multiple layers. The bottom
(or lower) four layers are more clearly defined, and terminology from those layers is still
prevalently used. Many protocols and devices are described by which lower layer they operate
at.
14
Page
Physical Layer:

It is the bottom layer of OSI Model. It is concerned with transmitting bits over a
communication channel. It is responsible for the actual physical connection between the
devices. Such physical connection may be made by using twisted pair cable or wireless. Some
of its functions are

 Transforming bits into signals


 Provides synchronization of bits by a clock.
 Physical layer manages the way a device connects to network media.
 It defines the transmission rate.
 It defines the way in which the devices are connected to the medium.
 It provides physical topologies
 It can use different techniques of multiplexing.
 The Physical layer provides specifications for a variety of hardware: Cabling,
Connectors and transceivers, Network interface cards (NICs), Wireless radios, Hubs.

Data-Link Layer:

 It is responsible for node-to-node delivery of data. The Data-link layer packages the
higher- layer data into frames, so that the data can be put onto the physical wire.
This packaging process is referred to as framing or encapsulation. The Data-Link
layer consists of two sub layers:
(i) Logical Link Control (LLC) sub layer-It serves as the intermediary between the
physical link and all higher layer protocols. It ensures that protocols like IP can
function regardless of what type of physical technology is being used
additionally, the LLC sub layer can perform flow-control and error checking,
though such functions are often provided by Transport layer protocols, such as
TCP.
(ii) Media Access Control (MAC) sub layer-It Controls access to the physical
medium, serving as mediator if multiple devices are competing for the same
physical link. Data link layer technologies have various methods of
accomplishing this -Ethernet uses Carrier Sense Multiple Access with Collision
Detection (CSMA/CD), and Token Ring utilizes a token.
15
Page
 Common Data-link layer technologies include following:
• Ethernet – the most common LAN data-link technology
• Token Ring – almost entirely deprecated
• FDDI (Fiber Distributed Data Interface)
• 802.11 Wireless
• Frame-Relay
• ATM (Asynchronous Transfer Mode)

 The data-link frame contains the source and destination hardware (or physical) address.
The most common hardware address is the Ethernet MAC address.
 Framing: DLL divides the bits received from N/W layer into frames. (Frame contains all
the
Addressing information necessary to travel from Source to Destination).
 Physical addressing: After creating frames, DLL adds physical address of
sender/receiver (MAC address) in the header of each frame.
 Flow Control: DLL prevents the fast sender from drowning the slow receiver using Buffer.
 Access Control: When single communication Channel is shared by multiple devices,
MAC layer of DLL provides help to determine which device has control over the channel.

 Error Control: It provides the mechanism of error control in which it detects &
retransmits damaged or lost frames.

Network Layer:

 It is responsible for the source to destination delivery of a packet across multiple networks.
 If two systems are attached to different networks with devices like routers, then N/W
layer is used.
 Thus DLL overseas the delivery of the packet between the two systems on same network
and the network layer ensures that the packet gets its point of origin to its final destination.
 Internetworking: It Controls internetwork communication
 Logical Addressing: When packet is sent outside the network, N/W layer adds
Logical (network) address of the sender & receiver to each packet. Network addresses are
assigned to local devices by n/w administrator and assigned dynamically by special
server called DHCP (Dynamic Host Configuration Protocol)
 Routing: When independent n/w are connected to create internetwork several routes
16

are available to send the data from S to D. These n/w are interconnected by routers &
gateways that route the packet to final destination.
Page
 Two of the most common Network layer protocols are:
• Internet Protocol (IP)- IP version 4 (IPv4) and IP version 6 (IPv6)
• Novell‘s Internetwork Packet Exchange (IPX)-It Is Outdated Now.
Transport Layer:

 The Transport layer (Layer-4) does not actually send data, despite its name.
Instead, this layer is responsible for the reliable transfer of data, by ensuring that
data arrives at its destination error-free and in order. Transport layer communication
falls under two categories:
• Connection-oriented – r e q u i r e s that a connection with specific
agreed-upon parameters be established before data is sent.
• Connectionless – requires no connection before data
is sent.
 Connection-oriented protocols provide several important services:
• Segmentation and sequencing – data is segmented into smaller pieces for
transport. Each segment is assigned a sequence number, so that the receiving
device can reassemble the data on arrival.
• Connection establishment – connections are established, maintained, and
ultimately terminated between devices.
• Acknowledgments – receipt of data is confirmed through the
use of acknowledgment. Otherwise, data is retransmitted, guaranteeing
delivery.
• Flow control (or windowing) – data transfer rate is negotiated to
prevent congestion.
 The TCP/IP protocol suite incorporates two Transport layer protocols:
• Transmission Control Protocol (TCP) – connection
oriented
• User Datagram Protocol (UDP) –
connectionless

Session Layer:

 Session layer is the fifth layer of OSI Model


 It has the responsibility of beginning, maintaining and ending the communication
between two devices, called session. If a session is broken, this layer can attempt
to recover the
Session.
17

 Sessions communication falls under one of three categories:


Page

• Full-Duplex – simultaneous two-way communication


• Half-Duplex – two-way communication, but not simultaneous
• Simplex – one-way communication
 Flow Control: It also provides for orderly communication between devices by
regulating the flow of data.
 Establishing, Maintaining and ending a session: When sending device first
contact with receiving device, it sends syn (synchronization) packet to establish a
connection & determines
the order in which information will be sent. Receiver sends ack (acknowledgement).
So the session can be set & end.
 Dialog Control: This function determines that which device will communicate first
and the amount of data that will be sent.
 Dialog separation: Process of adding checkpoints & markers to the stream of data is
called dialog separation.
Presentation Layer:

 Presentation layer is the sixth layer of OSI Model.


 It is concerned with the syntax (Refers to the structure or format of data, meaning the
order in which they are presented) & semantics (Refers to the meaning of each
section of bits) of the information exchanged between the two devices.
 Standards have been developed for the formatting of data types, such as text, images,
audio, and video. Examples of Presentation layer formats include:
• Text - RTF, ASCII, EBCDIC
• Images - GIF, JPG, TIF
• Audio - MIDI, MP3, WAV
• Movies - MPEG, AVI, MOV
 Data Presentation or Translation: Because different computers use different
encoding systems. It ensures that the data being sent is in the format that the recipient
can process.
 Data Encryption: PL provides this facility by which hides the information from
everyone except the person who originally sent the information & the intended
recipient. When encrypted data arrives at destination, PL decrypts the message.
 Data Compression: PL shrinks large amount of data into smaller pieces i.e. it
reduces the size of data.

Application Layer:
18

 It is the topmost i.e. seventh layer of OSI Model.


 It enables the user to access the network.
Page
 It provides user interface & supports for services such as e-mail, file transfer, access
to the World Wide Web.
 So it provides services to different user applications.
 Mail Services: This application provides various e-mail services.
 File transfer & Access: It allows users to access files in a remote host, to retrieve
files from remote computer for use etc.
 Remote log-in: A user can log into a remote computer and access the resources
of that computer.
 Accessing the World Wide Web: Most common application today is the access of the
World Wide Web.
 Examples of Application layer protocols include:
• FTP, via an FTP client
• HTTP, via a web browser
• POP3 and SMTP, via an email client
• Telnet

NOTE:
1. As data is passed from the user application down the virtual layers of the OSI
model, each layer adds a header (and sometimes a trailer) containing protocol
information specific to that layer. These headers are called Protocol Data Units
(PDUs), and the process of adding these headers is called Encapsulation. Note that in
the TCP/IP protocol suite only the lower layers perform encapsulation. The PDU of
each layer is identified with a different term:

Layer PDU Name


Application Xxx
Presentation Xxx
Session Xxx
Transport Xxx
Network Segments
Data-link Packets
Physical Frames

2. Switches are generally identified as Layer-2 devices, as switches process information


stored in the Data-Link header of a frame, such as Ethernet MAC addresses.
3. Routers are identified as Layer-3 devices, as routers process logical addressing
19

information in the Network header of a packet, such as IP addresses.


Page
OSI Reference Model Example:

A web browser serves as a good practical illustration of the OSI model and the TCP/IP protocol
suite:
• The web browser serves as the user interface for accessing a website. The
browser itself does not function at the Application layer. Instead, the web browser
invokes the Hyper Text Transfer Protocol (HTTP) to interface with the remote
web server, which is why http:// precedes every web address.
• The Internet can provide data in a wide variety of formats, a function of the
Presentation layer. Common formats on the Internet include HTML, XML, PHP,
GIF, and JPEG. Any encryption or compression mechanisms used on a website are
also considered a Presentation layer function.
• The Session layer is responsible for establishing, maintaining, and terminating the
session between devices, and determining whether the communication is half-duplex
or full-duplex. However, the TCP/IP stack generally does not include session-layer
protocols, and is reliant on lower-layer protocols to perform these functions.
• HTTP utilizes the TCP Transport layer protocol to ensure the reliable delivery of
data.TCP establishes and maintains a connection from the client to the web server,
and packages the higher-layer data into segments. A sequence number is assigned to
each segment so that data Can be reassembled upon arrival.
• The best path to route the data between the client and the web server is determined
by IP, a Network layer protocol. IP is also responsible for the assigned logical
addresses on the client and server, and for encapsulating segments into packets.
• Data cannot be sent directly to a logical address. As packets travel from network to
network, IP addresses are translated to hardware addresses, which are a function of
the Data-Link layer. The packets are encapsulated into frames to be placed onto the
physical medium.
• The data is finally transferred onto the network medium at the Physical layer, in the
form of raw bits. Signaling and encoding mechanisms are defined at this layer, as is
the hardware that forms the physical connection between the client and the web server.

IP and Vs DoD
Model:

 The Internet Protocol (IP) was originally developed by the Department of


Defense (DoD), and was a cornerstone for a group of protocols that
became known as the
20
Page
TCP/IP protocol suite. The DoD developed their own networking
model, which became known as the DoD or TCP/IP Model. It consists of
four layers:

DoD Model OSI Model


7.Application
4.Application 6.Presentation
5.Session
3.Host-to-Host 4.Transport
2.Internet 3.Network
1.Network Access 2.Data-Link
1.Physical

 The consolidated DoD model is generally regarded as more practical than


the OSI model. Upper layer protocols often provide services that span the
top three layers. A converged Data-link and Physical layer is also sensible, as
many technologies provide specifications for both layers, such as Ethernet.
The following chart illustrates where common protocols fit into the DoD
model-

Layers Example Protocol


Application FTP, HTTP, SMTP
Host-to-Host TCP, UDP
Internet IP
Network Access Ethernet

 Despite the practicality of the DoD model, the OSI model is still the basis
for most network terminology.
21

For more E-Books & Study material visit www.gcnayak.blogspot.com


Page
KEY POINTS

 The code for a Web page is written using →Hypertext Markup language
(HTML).But Modern web page design are going with CSS (Cascading Style Sheets) &
JAVA SCRIPT.
 Operating Systems (OS), Drivers, Viruses are examples of →System software.
 MS Office, Payroll System, Inventory System are examples of →Application Software.
 WinZip, FrontPage, Notepad, Web Browsers are examples of →Utility Software.
 The first computers were programmed using →Machine language (0-1 Format)/Object
Code. The language user write the program is Assembly language (Instruction Alphabet-
Numeric format)/Source Code. The source code translated into object code by an
Assembler/interpreter/compiler.
 A Filename is a unique name that you give to a file of information.
 Web surfing means exploring the internet
 ―Write‖ is a Text Editor.
 The keyboard shortcut to turn on Sticky Keys is to press the SHIFT key 5 times. Sticky
keys let you use the SHIFT, CTRL, ALT, OR Windows logo keys by pressing one key at a
time.
 The speed of supercomputer measured in →FLOP (Floating point operation per second)
 Any data or instruction entered into the memory of a computer is considered as →Storage
 The part of the computer displays the work done is →Monitor
 A series of instructions that tells a computer what to do and how to do it is called a
→Program
 The part of a computer that one can touch and feel is →Hardware
 BIOS (Basic Input/output System) is a built in software that determines what a computer
can do without accessing programs from a disk.it also contains all the codes required to
control the keyboard, display screen, disk drives, serial comm. etc. BIOS is typically
placed on a ROM Chip, so called ROM BIOS. It helps computer in Booting (It
initiates operation of a computer & its function is to set up I/O Devices & load OS from
a disk, cassette or built in ROM. Cold Boot →Restarting computer after having turned
off power. Warm Boot →Restarting computer without having turned off the power).
 Supercomputers (e.g. IBM Roadrunner, IBM Blue gene, Intel ASCI red, PRAM Padma
by C- DAC) refers to the fastest, biggest and most expensive computers
 Executing is the process of carrying out commands
 The rectangular area of the screen that displays a program, data & information is a
22

→Window.
Page

 The process of a computer receiving information from a server on the internet


→Downloading.
 Disk drive is a section of the computer that can accept & operate a compatible floppy
(1.44 MB)/hard disk.
 A Program, either talk or music that is made available in digital format for
automatic download over the internet is called a Podcast.
 DUAL CORE →The difference between single core and dual core is that a dual core
system has two CPUs that are electronically wired together. These two CPUs wired
together in parallel gives twice the performance than that of its single core counterpart.
 An error is known as Bug.
 A collection of related information sorted and dealt with as a unit is a File
 PROTOCOL →Set of rules that governs the entire communication system. TCP/IP
(Transmission control protocol/Internet Protocol) →Governs how information moves
round the internet. HTTP (Hypertext transfer protocol) →Used by the computers to
transfer HYPERTEXT (text in a document that contain a hidden link to other text)
documents over internet. FTP (File transfer protocol) →Governs file transfer
(upload/download) between remote & host computer. SMTP (Simple Mail transfer
Protocol) →Governs mail transfer over internet. POP (Post Office Protocol) →Enables
single user to read e-mail from a mail server. POP 3 →Used for fetching an e-mail
from a mailbox. IMAP (Internet message access protocol) →Takes care of E-mail at
client side. TELNET →Let you connect your computer as a remote workstation to a host
computer anywhere in the world & to use that computer as if you were logged on locally.
 Image Files (JPG, TIF, PNG, for MS-Paint BMP-Bit Map), Audio files (MP3,
WMV), Video files (MP4, AVI, FLV, MPEG), Notepad (TXT), WordPad (RTF-Rich
Text Format), Word (.DOC), Excel (.XLS), PowerPoint (.PPT), Adobe Reader (.PDF-
Portable Document Format) are File Extensions.
 Files with VXD Extension represent Device Drivers.
 Microsoft‘s format for encoding sound files is .WAV(WAVeform)
 A Menu contains commands that can be selected
 Plotter, Printer (generates hard copy using Dot matrix/Inkjet/Laser/Line/Drum/Impact
printer. Laser printer is the best printer), Monitor, Speaker are Called Output
Devices. Track ball, Touchpad, Joysticks, Scanners, voice recognition, optical
Recognition (MICR/OMR.BARCODE) Devices are Input Devices.
 PUCK is an input device like mouse.it has a magnifying glass with crosshairs on the front
of it that allows the operator to position it precisely when tracing a drawing for use with
CAD- CAM Software.
 Edit Menu is selected to cut (CTRL+X), copy (CTRL+C) and paste (CTRL+V)
 The most important or powerful computer in a typical network is Network Server.
23

 Java compiler is an OS Independent compiler.


Page

 The primary purpose of software is to turn data into information


 The ability to find an individual item in a file immediately direct access is used.
 To make a notebook act as a desktop model, the notebook can be connected to a
docking station which is connected to a monitor and other devices
 You can use the Tab key to move a cursor across the screen, to Indent a paragraph.
 A collection of related Files is called Record. A list of files stored in a computer-
Directory. A directory within a directory is called Sub Directory.
 A Record is related to a file as a Statement is related to a program.
 Storage that retains its data after the power is turned off-Non-volatile storage (e.g. Hard
disk)
 Internet is an example of Connectivity.
 Testing is the process of finding errors in software code.
 DNS (Domain Name System) →it is the system used on the internet for mapping names to
the actual numerical addresses of machines on the Internet. Getting a DNS error means
that the address you are attempting to reach is not recognized by the internet community.
 A Syntax contains specific rules and words that express the logical steps of an Algorithm.
 Changing an existing document is called the Editing documentation
 Virtual memory is the memory on the hard disk that the CPU uses as an Extended RAM.
 Computers use the Binary number system to store data and perform calculations.
 The Windows key or (Ctrl + Esc) will launch the Start buttons.
 PDA (Personal Digital Assistant) is a hand held computer that can store daily
appointments, phone numbers, addresses, and other important informations.
 PALM is a hand held computer
 To move to the beginning of a line of text, press the Home key.
 Tables, paragraphs and indexes work with when formatting text in MS-Word.
 The feature to customize your desktop to display information that you can update from
the internet is Active Desktop
 TB (Tera Byte) is the largest unit of storage. A MB (Mega Byte) ~ A Million Byte.
 The Operating system (OS) tells the computer how to use its components (HW/SW).
The OS is also the first program that is loaded into computer when computer is
switched on. Multi-Processing OS-More than one processor accomplish one or more
than one task at a time, each processor will be given a particular time for its task
completion. Time Sharing OS-A single processor accomplish more than one task
providing a particular time to each task. Multi Programming OS-Single processor
accomplish more than one task at a time. Multi-Threading OS-A big task is divided
into sub tasks called Modules & the OS accomplish each module individually. Real
time OS-Every execution will wait for a particular time once that time elapse the
24

execution will occur automatically e.g. Screen Saver, Missile Launch.


 When cutting and pasting, the item cut is temporarily stored in Clipboard.
Page
 The blinking symbol on the computer screen is called the Cursor. It changes its shape
from an Arrow mark to a Hand mark when points to a Hyperlink (Linked
text/image from a different location of a document or webpage)
 Magnetic tape is not practical for applications where data must be quickly recalled
because tape is a Sequential/Serial access medium.
 Rows and columns are used to organize data in a Spread sheet/Excel. A collection of
Work sheets (By default Excel contain 3 work sheets) is called Workbook. The
intersection point of row & column called a Cell (can contain Minimum 1 & Maximum
32767 character including blank spaces). For various calculation we enter formulas &
each formula starts with = (Equal) sign, it is also called the comparison operator. Error
messages of Excel starts with # (Hash) sign. Cell range specified by: (Colon) sign. A
Numeric value treated as Label value if it precedes with ‘(Apostrophe) sign.
Concatenation of text done using & (Ampersand) sign.
 Up to Excel 2003, the standard amount of Columns has been 256 and 65,536 Rows.
 Excel 2007 onwards, the maximum number of rows per worksheet increased to 1,048,576
and the number of columns increased to 16,384.
 When you are working on documentation on PC, the document temporarily stored in
Flash memory. RAM (its volatile) & ROM (its non-volatile) are primary or Main
memory.
 Cache Memory lies in the path between processor & main memory.it has lesser access
time so faster. It‘s very expensive & has limited capacity. The need for cache memory is
due to the mismatch between the speeds of main memory (very slow) & CPU (very
fast). Hence no matter how fast the processor is, the processing speed depends on the
speed of main memory (as the strength of a chain is the strength of its weakest link).it is
the reason the speed of cache memory is close to the processor speed. The cache
memory stores temporary data that the CPU may frequently require for manipulation.
 Information travels between components on the motherboard through Buses.
 Computer connected to a LAN can share information and or share peripheral equipment
 Microsoft office is an application suite. It is a Closed-Source Software.
 Utilities can handle most system functions that aren‘t handled directly by the operating
system
 If you receive an e-mail from someone you don‘t know then you should delete it
without opening it, it may be a Virus.
 The unwanted messages from in genuine authority/website usually over mail called
Spam.
 A set of instructions telling the computer what to do is called Program & a set of
computer programs used for a certain function such as word processing is the best
25

definition of a Software package.


Page

 To instruct Word to fit the width of a column to the contents of a table automatically, click
the Auto size button and then point to Auto fit contents
 In PowerPoint, the header & footer button can be found on the insert tab in Text Group.
 LAN (Local area n/w) is usually privately owned & links devices in a single office,
building or campus. MAN (Metropolitan area n/w) is designed to extend over an entire
city e.g. Cable TV network. WAN (Wide area n/w) provides long distance transmission
of data over a large geographical area that may comprise a country/continent/world.
PAN (Personal area n/w) provides data transmission within 10m radius by following
principle of wireless connectivity e.g. Bluetooth.
 A collection of programs that controls how your computer system runs and processes
information is called operating system (OS).
 Device drivers are small, special-purpose programs
 Transformation of input into output is performed by the CPU
 A Character of information is represented by One byte.
 Data is/are distinct item that don‘t have much meaning to you in a given context
 A website address is a unique name that identifies a specific Link on the web
 Modem (Modulator-Demodulator) is an example of a Telecommunications device. It
establish a connection of a computer with other computer or with the internet.
 Highlight and delete is used to remove a paragraph from a report you had written.
 Data and time are available on the desktop at Taskbar.
 Phishing Trips are attempts by individual to obtain confidential information from you
by falsifying their identity.
 In Excel, charts are created using chart wizard option
 Microcomputer hardware consists of three basic categories of physical equipment system
unit, input/output, memory.
 A tool bar contains buttons and menus that provide quick access to commonly
used commands
 For creating a document, you use new command at File menu.
 Input device is equipment used to capture information and commands.
 A programming language contains specific rules and words that express the logical steps of
an Algorithm.
 One advantage of Dial-up internet access is it utilizes existing Telephone security
 Protecting data by copying it from the original source is Backup.
 Network components are connected to the same cable in the Star topology
 Two or more computers connected to each other for sharing information form a network.
 A compute checks the database of Username and Passwords for a match before
granting access.
26

 Computers that are portable and convenient for users who travel are known as Laptops.
Page

 Spam is the term for unsolicited e-mail.


 Utility software type of program controls the various computer parts and allows the
user to interact with the computer
 One Byte is 8-bits. One Nibble is 4-bits. One Word is 16-bits.
 Storage is the process of copying software programs from secondary storage media to
the hard disk
 Small application programs that run on a Web page and may ensure a form is
completed properly or provide animation are known as Flash.
 In a relational database, table is a data structure that organizes the information about a
single topic into rows and columns
 The first computers were programmed using Assembly Language
 Booting process checks to ensure the components of the computer are operating
and connected properly
 Checking the existing files saved on the disk the user determine what programs are
available on a computer
 Special effect used to introduce slides in a presentation are called Animation
 Computers send and receive data in the form of Digital signals
 Icons are graphical objects used to represent commonly used application
 UNIX is not owned and licensed by a company
 In any window, the maximize button, the minimize button and the close buttons appear on
the Title bar.
 Checking that a pin code number is valid before it is entered into the system is an example
of Data validation
 A Compiler translates higher level language (BASIC, FORTRAN, PASCAL, C,
ALGOL, & ADA) programs into a machine language program, which is called object code
 The ability to find an individual item in a file immediately direct access
 Computers connected to a LAN can share information and/or share peripheral equipment
 A CD-RW disk can be Erased and rewritten.
 Two major categories of software include System and Application. The 3rd is Utility s/w.
 Sequentially Developed PC-DOS by IBM, MS-DOS, Windows 3.1, Windows 95,
Windows 98, Windows 2000, Windows ME (Millennium Edition), Windows NT (New
Technology), Windows 2003, Windows XP (Extreme Programming), Windows Vista,
Windows XP Black, Windows SE (Server Edition), Windows 7 , 8 , 8.1 , 10 are known as
operating systems.
 A spread sheet that works like a calculator for keeping track of money and making budgets
 To take information from one source & bring it to your computer is Called Downloading.
 Direct X is a software that drives graphic Hardware.
27

 Network components are connected to the same cable in the Bus topology
Page

 Download is the process of copying software programs from secondary storage media to
the hard disk.
 Control key is used in combination with another key to perform a specific task
 Scanner will translate images of text, drawings and photos into digital form
 CPU is the brain of the computer
 Something which has easily understood instructions is said to be User friendly
 Information on a computer is stored as Digital data.
 Previously answer sheets in bank PO‘s/Clerk‘s examinations are checked by using
Optical Mark Reader (OMR)
 Electronic data exchange provides strategic and operational business opportunity
 Digital signals used in ISDN (Integrated Service Digital N/W) have whole number values.
 Assembler is language translation software.
 Manual data can be put into computer by Scanner
 In a bank, after computerization cheques (Are example of Near Money) are taken care of
by MICR (Magnetic Ink Character Recognition).
 Microchip elements are unique to a smart card.
 MS-DOS is a single-user & Character User Interface (CUI) based operating system but
MS- Windows is a multi-user & Graphical User Interface (GUI) based operating system.
 Programs stored in ROM is Permanent & can‘t be erased so called Non-volatile Memory.
 Ethernet is used for high speed telecommunications.
 IP address (It is a unique set of numbers in 32-bit format used to locate a computer
on a network. within a closed n/w IP Address may be assigned at random, however IP
Address of web servers must be registered to avoid duplicates) can change even if the
Domain name remains same.
 Each Directory entry can be of 32 bytes
 In computer the length of a word can be measured by Byte
 Byte is the unit of storage medium
 Oracle is a database software. Lars Ellison is founder of Oracle Corporation.
 Sequential circuit is Full adder.
 Screen display is called by windows in Lotus Software.
 Expanded form of IBM is International business machine.
 IC (Integrated Circuits) chips are made of Silicon
 India’s Silicon Valley situated at Bangalore.
 LOTUS 1-2-3 is a Software.
 Tables holds actual data in the database
 Virus (Virtual Information Resource Under Seize)-(Is a program which alter the way
28

of a computers functioning.it is called virus because it can replicate itself. PC Viruses are
Page

3 types 1.Program Viruses-Infects program files & has extensions like .exe, .com,
.dll, .bat etc. 2.Boot sector virus-Infects the system area of disk i.e. boot record of
floppy or hard disk. These viruses attach themselves to the part of disks & activate when
the user attempts to start up from infected disk.3.Multipartite Viruses-Infects both
program files & boot records)e.g. Trojan Horses
 Static keys make WEB insecure
 Video signal needs highest Bandwidth.
 Hardware that adds two numbers is arithmetic logical unit (ALU).
 A data communication system requires terminal device, communication channel, protocols
 Most common channel used by networks today is Satellite
 Run Time is not a type of error
 A five-digit card attribute used for postal ZIP codes it will be restored as a numeric data
 Computer viruses can be attached to an Executable programs.
 The smallest space where information on a hard disk is kept-Cluster
 Intelligence is not a characteristic of a computer
 Private key is used to spend a digital signature
 Negative numbers can be represented in binary
 VDU (Visual Display Unit) is not an essential part of a computer
 Speed of clock of CPU is measured in Megahertz (MHz).
 Cache is not a secondary storage device
 Disk can be used to store sequential files and random files
 Windows is not an application
 When taking the output information is produced in hardcopy (print out) & softcopy form.
 Control unit’s function is to decode program instructions
 GOTO statement is used in C, C++, basic language
 File menu is selected to print
 The name a user assigns to a document is called a Filename.
 A Processor is an electronic device that processes data, converting it into information
 Control words are words that a programming language has set aside for its own use
 To access properties of an object, the mouse technique to use is Right-clicking
 Connections to the internet using a phone line and a modem are called Dial-up connections
 Dial-in is an internet account that can connect any stand-alone computer directly to
the internet. The account is used by having a computer based software application dial-
in to an ISP. The software connects with the ISP and establishes a TCP/IP link to the
internet that enables your software to access internet information.
 To access a mainframe or supercomputer, users often use a Terminal
29

 To make the number pad act as directional arrows, you press the Num lock key.
Page

 A Chat is a typed conversation that takes place on a computer


 A hardware/software problem that causes information to be lost or the computer
to malfunction is called Crash.
 Cracker is a person who breaks into a computer through a network, without authorization
 Hardware includes the computer and all the devices connected to it that are used to input
and output data
 256 values can be represented by a single byte
 The process by which people make duplicate CDs of original software and sells them at
low price is called Counterfeiting
 Transformation of input into output is performed by the CPU
 Vertical-market applications can handle most system functions that aren‘t handled
directly by the operating system
 Device drivers are small, special-purpose programs
 A Cluster represents a group of sectors
 Bandwidth means Channel capacity amount of data following via cables and
measure of speed
 Debugging is the process of finding errors in software code
 Time Bomb are viruses that are triggered by the passage of time or on a certain data
 Linux is an open source operating system. Windows is a closed source Operating system
 Boot sector viruses are often transmitted by a floppy disk left in the floppy drive
 Servers are computers that provide resources to other computers connected to a network
 Field names describe what a database field is
 You must install Router on a network if you want to share a broadband internet connection
 A goal of Normalization is to minimize the number of Redundancy
 Programs from the same developer, sold, bundled, together, that are provide better
integration and share common features, tool box and menus are known as software suits
 A data ware house is one that organizes important subject areas
 URL (Unique Resource Locator) term identifies a specific computer on the web and the
main page of the entire site.
 Personal logs or journal entries posted on the Web are known as: Blogs.
 A Proxy server act as an intermediary between a workstation user and the internet so that
the enterprise can ensure security, administrative control, and caching service. A Proxy
server is associated with, or part of, a gateway server that separates the enterprise
network from the outside network and a firewall server that protects the enterprise
network from the outside station.
 When data changes in multiple list and list are not updated, this causes data inconsistency
 Granting an outside organization access to internet web pages is often implemented using
30

an Extranet
 The code that relational database management systems use to perform their database
Page
task is refer to as SQL (Structured Query Language).
 A data base management system is a software system used to create, maintain and
provide controlled access to a database
 The metal or plastic case that holds all the physical parts of the computer is known as
system unit not CPU.
 Data integrity means that the data contained in the database is accurate and reliable
 A characteristic of a file server is manages files operations and is shared on a network
 The role of Blaze Pascal in the development of computer is addition and subtraction
of numbers
 The inventor of computer is Charles Babbage.
 The personal computer invented in 1981
 1 Kilobyte is equal to 1024 bytes
 LCD means liquid crystal display
 UPS (Uninterruptable/Universal Power Supply) converts DC voltage into AC voltage
 The word ZIP means Zone Information Protocol used for the compression of application
file.
 With the help of Pal switch we can increase or decrease the speed of computer‘s processing.
 SWIFT (Society for Worldwide Inter-bank Financial Telecommunication) networks
are used between banks.
 Panda is a virus
 USENET is a another name for internet Newsgroup
 ULTRA-BOOK is a higher end type of sub note book defined by Intel
 Boot sector is hardware
 Low Level Languages can easily interact with Hardware.
 Debug searches the fault of any software
 The total printout of a program is called Listing
 With the help of ZIP we can decrease the size of any programs
 We can format the hard disk with the help of Booting
 CANNED is called as readymade software
 The process of creating third file by mixing two files is called as Mail merging
 The figures and lines etc. made by computer is called as graphics
 Each line represents 65 letters in a WordStar
 Magnetic tape can store Large amount of data e.g. in Bank Cheque, Payroll Processing.
 The first mechanical computer of Charles Babbage is known as punch card machine
 TV broadcast and Keyboards-Monitor are the example of simplex transmission
31

(Unidirectional).Walkie-talkies, and FAX are example of half- duplex transmission.


Telephone network is the example of Full Duplex/Duplex transmission.
Page

 Optical, Mechanical are the kinds of mouse


 Control panel is used for increasing and decreasing the speed of the cursor of mouse
 The capacity of modern main frame digital computer is 10(to the power of -12) mbps
 With the help of My computer we can know about the usage and availability of space
in computer
 We use both MS-Word and page maker for making resume
 FLAG indicates specific condition of a program.
 FLAMES are insulting, enraged internet messages.
 Earliest computers that would work with FORTRAN was second generation
 Back Ups in database are maintained for to restore the lost data
 IDEA is an Encryption technique
 EMOTION is a text based expression created from ASCII characters that mimics a
facial expression when viewed with your head tilted to left. Example -smiling [:-) ]
 DBRM(Data base resource management) takes care of storage of data in a database
 The job of DBMS is to Decrease Redundancy
 Digital signatures use Encryption for authenticating
 Firewire is Apple computers high speed data transfer.
 FIREWALL is a combination of hardware and software that protects a LAN from
internet hackers and maintain security.
 OS acts as intermediary agency between user and hardware
 Plotters gives the highest quality output
 ROM is built in memory in computer
 FLASH is a RAM. PRAM is not a RAM
 FLASH device is used in cell phones
 Internal storage is same as the primary storage
 IMAC is name of a machine
 First generation computers could do Batch processing
 The analytic engine was created by Charles Babbage
 Voicemail of GSM service provider has the personal security code for its subscribers
 Senior manager decided about the division of work with respect to IT security
 Encrypting file system of window XP professional operating system protects the data
of a user, even if the computer is shared between users
 The .mpeg (Motion Picture Expert Group) is the format of a movie file
32
Page
 Taking packets of information (sound or visual) from the internet and storing it in
temporary files to allow it to play in continuous flow is called Streaming
 Controlling is NOT required for high level language program before it is executed
 80286 is a hardware part of microprocessor
 Top-bottom approach cannot be the measure of Network Traffic
 A switching mode power supply (SMPS) is used for converting raw input power to
stabilize DC power.
 Spooler can manage the whole printing process
 Validity routines control procedures can be used to ensure Completeness of Data.
 Less expensive than leased line networks is not a characteristic of Virtual Private
Networks (VPN)
 Program policy framework provides strategic direction to an organization
 Cross bar switches have common control
 Row-level security is the most basic part for database security
 Voice recognition software cannot be used for converting text into voice
 The user account can only be created by the Network Administrator
 IBM-700 belongs to Second generation
 Allocating adequate bandwidth would help her in speeding up the data transfer over net
 ASCII ( American standard code for information interchange). Keyboard uses the 7-bit
ASCII code.
 Extended system configuration data is same as BIOS
 Digitizer is an input device
 Caramel is the latest platform of Intel Centrio microprocessor
 RISC is known as storage device
 NORTON, QUICK HEAL, KASPERSKY are anti-virus.
 The system file of an operating system is COM
 ‘.txt’ files can be made in notepad, MS word, DOS editor
 .Zip is a compressed file
 Internet is a WAN
 MP3 technology compresses a sound sequence to one-twelfth of its original size
 At a time only one operating system can be at work on a computer
 If multiple programs can be executed at the same time, it is distributed operating system
 If the operating system provides quick attention, it is real time operating system
 Distributed operating system uses network facility
33

 FORMAT command in MS-DOS is used for recreating disk information


Page

 COPY command in MS-DOS is used to copy one or more files in disk drive to another,
copy from one directory to another directory
 REN command is Internal command
 Tom Burners-Li propounded the concept of ―World wide web(WWW)‖
 The memory address sent from the CPU to the main memory over a set of wires is
called Address bus
 MODEM is an electronic device required the computer to connect to the INTERNET
 DOS floppy disk does not have a boot record
 The CPU in a computer comprises of Store, arithmetic and logical unit and control unit
 In computer parlor a mouse is a screen saver
 UNIVA is the name of the computer which was first used for programming and playing
Of Music.
 Database management systems are comprised of tables that made up of rows called
records and columns called fields
 Nano is equal to 10(to the power of -9)
 Disk and tape drives are commonly used as hard copy
 When computer is connected to LAN and data is sent across it for storage/processing is
Online processing
 Data are raw facts and figures
 Holding of all data and instructions to be processed is one of the functions of Storage unit.
 To select the entire row in Excel, click mouse at Row heading
 Database is known as Structured data
 Normal view and outline view notes pane appears in power point
 The user protection feature of an operating system is required in multi-user system only
 In word, Ctrl + Del combination of keys press to delete an entire word
 In MS-Word Double clicking a word selects the Word
 Word document can be navigated in web layout view.
 In Excel, addressing mode(s) that can be used in a formula is/are only absolute and relative
 Note page views can you use to show just the slide and its content.
 Plotters are very useful in applications such as computer aided design(CAD)
 Corel DRAW is a graphic package
 The print to file option creates .prn file.
 The enhanced keyboard contains 101 keys.
 Data processing cycle consists of input cycle, output cycle and processing cycle
 Page Setup is not an option of Edit menu.
 Radar chart is used to show a correlation between two data series
34

 A typical computerized business application system will have both master and
Page

transaction file
 Problem identification is taken first in designing a program
 The purpose of the EXIT command is to get out of a condition loop
 Employees details is a master file for the pay roll system
 A slow memory can be connected to 8085 by using READY
 A processor needs software interrupt to obtain system services which need execution
of privileged instructions
 A CPU has two modes- privileged and non-privileged. In order to change the mode from
the privileged to the non-privileged, a software interrupt is needed.
 Swap space resides at disk
 The process of assigning load addressed to the various parts of the program and adjusting
the code and data in the program to reflect the assigned address is called relocation
 1 Sector= 4096 bytes
 Two stacks of size required to implement a queue of size n
 1 Floppy = 6, 30,784 bytes or 308 KB
 Consider a machine with 64 MB physical memory and a 32-bit virtual address space. If
the page size is 4 KB, then size of the page table is 2 MB
 Consider a virtual memory system with FIFO page replacement policy. For an arbitrary
page access pattern, increasing the number of page frames in main memory will always
decrease the number of page faults
 Consider a scheme R (A, B, C, D) and functional dependencies A->B and C-> D. Then
the decomposition of R into R1 (AB) and R2 (CD) is dependency preserving and lossless
join
 Main memory requires a device driver
 Two friends suitably arrange 4 blocks of different colors to exchange coded
information between them. 4 bits of information is one exchanging each time
 The number 43 in 2‘s complement representation is 01010101
 The 8085 microprocessor responds to the presence of an interrupt by checking the TRAP
pin for ‗high‘ status at the end of each instruction fetch`
 System design specifications do not include blueprint showing the layout of hardware
 The results of arithmetic and logical operations are stored in an Accumulator
 The input device that is closely related to touch screen is the light pen
 F2 keys of control center specified below displays data, toggles browse/edit
 A compiler breaks the source code into a uniform stream of tokens by lexical analysis
 LET.BAS files are related to Microsoft word utility
 A command in UNIX can have one or more arguments
 A hard disk is logically organized according to cylinders and sectors
35

 A frame can include text & graphics, tables & graphics, graphics
Page

 All the formatting data for the paragraph is stored in the paragraph mark
 We can define hypertext definition in notebooks using Macsyma 2.0
 The addressing mode(s) that can be used in a formula is/are- absolute, relative and mixed
 WINDOWS can work in Enhanced, Normal, Safe and Standard modes.
 The part of a machine level instruction which tells the central processor what has to be
done is an operation code(OP-Code)
 O-Matrix software packages do not have animation capabilities
 Faster execution of programs is not an advantage of a subroutine
 A small computer program embedded within an HTML document when a user retrieves
the web page from a web server is called an Applet.
 Another name for systems implementation is transformation
 The central host computer or file server in a star network maintains control with
its connecting devices through polling.
 C++ does not check whether the index value is within scope
 The browser uses uniform resource locator to connect to the location or address of
internet resources
 Three types of compact disc include CD-ROM, CD-R, and CD-RW.
 In the centralized computing architecture, the entire file is downloaded from the
host computer to the user‘s computer in response to a request for data
 Popping or removing an element from an empty stack is called underflow
 The ability to combine data and operations on that data in a single unit is known
as Polymorphism
 A Router is a device that sites between your internal network and the internet and
limits access into and out of your network based on your organization‘s access policy
 In C++, Private, Protected, and Public are reserved words and are called Member
Access Specifiers.
 The integration of all kinds of media such as audio, video, voice, graphics and text into
one Coherent presentation combined is called Multimedia.
 The Derived class can redefine the public member functions of the Base class
 A technique for searching special databases, called Data warehouses, looking for
related information and patterns is called Data mining
 Like the Quick sort the Merge sort uses the Divide and Conquer technique to sort a list
 The use of Expert systems technology can greatly reduce the number of calls routed
to a customer service department
 Building a list in the backward manner, a new node is always inserted at the beginning of
the list
 Creating a web site is also called web authoring
36

 Using the optimization analysis approach, the Expert system starts with a conclusion and
tries to verify that the rules, facts, and conclusion all match. If not, the expert system
Page

chooses another conclusion


 Both the application program and operating system program only describes the software
 Root is one of the items given below is not an item of the menu bar
 BACKUP is not an internal command
 In a Disk, each block of data is written into one sector
 A Boot strap is a small utilization computer program to start up in inactive computer
 Icons are Picture commands
 IBM company for the first time launched pocket computers
 Algorithms can handle most system functions that aren‘t handled directly by the
operating system
 When we are working on a document on a PC the document is Temporarily stored in
RAM.
 In Late 1988 computer viruses land in India for the first time
 ALU is a part of the CPU
 American computer company IBM is called Big blue
 The first IBM PC did not have any ROM.
 The digital computer was developed primarily in UK
 Programs which protect a disk from catching an infection are called Antidotes
 The first movie with terrific computer animation and graphics was released in 1982 is Tron.
 Daisy-wheel printer cannot print graphics
 In the IBM PC-AT, the word AT stands for advanced terminology
 Linker is a Utility software that can combine object modules from multiple files.
 Dedicated computer means which is assigned one and only one task
 Real time programming type of computers programming is used for aero plane
ticket reservation system
 RAM means memory which can be both read and written to
 Laser printer uses light beam and electro statically sensitive black powder
 The Santa Clara Valley, California is popularly known a Silicon Valley of
America
Because many silicon chip manufacturing firms are located there.
 PARAM is a parallel Supercomputer
 For communications, wide area networks use special purpose telephone wires and fiber
optic cables and microwaves
 Data transfer rate in modems is measured in bits per second
 The connection between your computer at home and your local ISP is called The Last Mile
 A compiler cannot detect logical errors in source programs
37

 Compilers are both OS & Hardware Dependent.


Page

 Throughput, turnaround time, response time, accuracy are measures of system performance
 The binary equivalent of (40.125) suffix 10 is 101000.001
 Kernel is the only art of an operating system that a user cannot replace or modify
 COBOL programming language was initially developed for consumer electronics goods
 Running, blocked, ready, terminated are different states of a process
 Rational rose is an example of a modeling language
 A WORM (Write-Once, Read-Many) is an example of optical devices. It is a high
density optical disk that can be programmed once, permanently saving a user‘s data
 A RAID is a disk array
 Compiling creates a Executable program
 The ability of a program to divide a display screen into smaller sub-units which
permit portions of different sections of a program to be displayed on the screen, edited,
& copied independently is called Windowing
 Winchester Drive is a HARD-DISK Drive
 The first private internet service provider in India was Satyam Infoway
 The maximum and minimum unsigned number which can be stored in a 8 bit word is 0
and 255
 Stack is a part of memory
 HIT RATIO is associated with cache(web browsers store accessed information in a
folder on your hard drive called cache. this saves time when a user goes to another page
on a site with the same graphics and make browsing faster) performance
 Laser printer is a page printer
 Storage capacity of a disk system depends upon number of recording surfaces and
number of sectors per track
 Abstraction is associated with object oriented technology and database technology
 The terms Opcode and Operand are associated with any high level
language/Assembly language instructions.
 Dynamic binding is associated with object oriented programming(C++)
 The term CHIP, JEWELLARY means a processor with high capacity
 A watch point is associated with debugger
 The concepts used for realization of virtual memory are swapping, demand paging and In-
line secondary storage
 Oracle 8i is an example of OORDBMS
 ALPHA, RIOS, SPARC are examples of RISC (Reduced Instruction Set
Computing) Processors.
 Hierarchy is not a component of relational database
 A two-way selection in C++ is the if…else
38

 A recursive function executes more efficiently than its iterative counterpart


Page

 A Function within a function called Nested Function.


 The body of the recursive function contains a statement that causes the same function
to execute before completing the last call
 Variables that are created during program execution are called dynamic variables
 When destroying a list, we need a delete pointer to de-allocate the memory
 The 1st character in the ASCII character set is the null character, which is nonprintable
 A variable for which memory is allocated at block entry and de-allocated at block
exit is called a static variable
 Signal to noise ratio (SNR) compares signal strength to noise level
 The ability to create new objects from existing objects is known as inheritance
 Software tools that provide automated support for the systems development process
are OLAP tools
 A language used to describe the syntax rules is known as meta language
 Competitive intelligence is the process of gathering enough of the right information
in a timely manner and usable form and analyzing it so that it can have a positive impact
 Tracing values through a sequence is called a play out
 The term used as a measurement of a communication channel‘s data capacity is bandwidth
 An E-R data model solves the problem of presenting huge information system data
models is to users and developers
 The standard protocol (communication rules for exchange of data) of the internet is TCP/IP.
 DBMS is a simple, fourth generation language used for data retrieval
 An occurrence of an undesirable situation that can be detected during program
execution is known a exception
 A photo of the company headquarters would be an example of the use of a static web page.
 The Pentium processor contains thousands of transistors
 SOI technology has been successful with reference to SRAM
 Secondary storage device is needed to print output results
 Static random access memory does not fall under the category of secondary storage devices
 Floppy disk is universal, portable and inexpensive but has its own limitation in terms
of storage capacity and speed
 A floppy disk rotates at 100rpm and have a size 3.5‖ square.
 A hard disk has 500 to 1000 tracks or more
 The storage capacity of a cartridge tape is 400 MB
 Single density recording is also known as frequency modulation
 The liquid crystal display (LCD) works on the basis of the relation between polarization
and Electric field. LED (Light Emitting Diode).
39

 A COBOL program in source code is not considered to be system software


 Firmware(A Combination of a software program in hardware, such as a ROM, or a disk
Page

that has files or programs written on its surface) stored in a hard disk
 Floppy disk does not generate a hardware interrupt
 ADA language is a mathematically oriented high level language development by
the Department of Defense (DoD) & is associated with real time processing
 MS DOS is usually supplied on a cartridge tape
 Kernel of MS-DOS software resides in ROM
 The UNIX operating system (available commercially) has been written in C language
 MS-DOS has better file security system as compared to UNIX
 UNIX is only a multiprogramming system
 In UNIX, end-of-file is indicated by typing CTRL D
 Abacus is said to be invented by Chinese
 FAST drivers scientific software packages was developed under contract with NASA
 FIF editor is a windows based application
 Graphics is inserted in frame
 A language translator is best described as a system software
 The specification of a floppy is identified by TPI
 In opening menu of word star C OPTION should be selected for protecting a file
 The most advanced form of ROM is electronically erasable programmable
ROM(EEPROM)
 Secondary storage device is needed to store large volumes of data and programs that
exceed the capacity of the main memory
 MORE sends contents of the screen to an output device
 NFS stands for N/W file system
 We can create a simple web page by using front page express
 The first line/bar on the word window where the name of the document is displayed is
called Title bar
 The clock frequency of a Pentium processor is 50 MHz
 The input device that is most likely to be used to play computer games is the Joystick
 BIOS of MS-DOS resides in ROM
 The sector size of a floppy disk varies from 128 bytes to 1024 bytes
 A program type of errors is flagged by compilers
 A floppy diskette is organized according to tracks and sectors
 In word star, the maximum permissible length of search string is 65
 C is a third generation high level language
 A CPU has a 16-bit program counter. This means that the CPU can address 64 K
memory locations
40

 STR () is used for converting a numeric into a character string


Page

 BASIC language is normally used along with an interpreter


 Default .pif file is used for loading DOS based applications. Default .pif is located in
Windows Directory.
 In spite of the extra power needed for Refreshing. DRAMs are widely used in
computers because of its lower cost relatives to SRAMs
 PIF editor belongs to Main group
 SUM () is not a financial function
 Windows is popular because of its being expensive
 All Windows settings are stored in Win.INI File
 Personal computers currently sold in India have main memories at an entry level in the
range of megabytes
 A small amount of memory included in the processor for high speed access is called Cache
 A co-processor is used to improve the speed of mathematical calculations
 Intel 80286 belongs to third generation microprocessors
 A Hex digit can be represented by eight binary bits
 Root is not an item of the Menu bar
 While starting the Lotus 1-2-3, the current cell reference is shown at top left hand corner
of the screen
 Bill gates is the chief of Microsoft
 Bill Joy is the founder of BSD Unix
 Nortel is a company that manufactures Network Equipment.
 The term Briefcase is used for a special folder on windows Desktop used to keep
documents up to date when shared between computers.
 Excel office assistant can be made to appear by using F1 key and help menu
 9 per page is the max no of showing positioning of per page handouts
 To find the Paste Special option, you use the Clipboard group on the Home Tab
of Word/PPT.
 Usually downloaded into folders that hold temporary internet files, Cookies are
written to your computer‘s hard disk by some of the web sites you visit.
 Cookie is a text file sent by a web server that is stored on the hard drive of a computer
and relays back to the web server things about the user/ his computer/his computer
activities.
 Alignment buttons are available on formatting toolbar
 Pico second is 10(to the power of-9)
 Logo refers to a computer language
 The most appropriate command to permanently remove all records from the current table
41

is Zap.
 The efficient and well-designed computerized payroll system would be on-line real
Page

time system
 The scripts which are designed to receive value from Web users is CGI script
 WAIS stands for - Wide Area Information Services. It searches large indexes of
information on the internet.
 Token bus is the most popular LAN protocol for bus topology
 Manipulating data to create information is known as analysis
 A separate document form another program sent along with an E-mail message is known
as E-mail attachment
 When you boot up a PC — portions of the operating system are copied from disk
into memory
 A word processor would most likely be used to type a biography
 A Database is an organized collection of data about a single entity
 Mozilla Fire fox, Google Chrome, Internet explorer, Opera, Netscape navigator are
Web browsers
 MOSAIC is the first web browser used for Macintosh, windows, UNIX.
 The list of URLs saved within the Mosaic Web Browser is called HOTLIST
 Most of the commonly used personal computers/laptops do not have a command key
known as Turnover
 Full form of USB is known as Universal serial bus
 The process by which two devices initiate communication is called Handshaking
 The quickest and easiest way in Word to locate a particular word or phrase in a document
is to use the Find command
 Checking that a pin code number is valid before it is entered into the system in an example
of Data validation
 A program that works like a calculator for keeping track of money and making budgets
is spreadsheet
 A Toolbar contains buttons and menus that provide quick access to commonly
used commands
 Most of the commonly available personal computers/laptops have a keyboard
popularly known as QWERTY
 Junk e-mail is also called Spam
 Codes consisting of bars or lines of varying widths or lengths that are computer readable
are known as a Bar code
42
Page
 E-commerce allows companies to conduct business over the internet.
 M-commerce allows buying & selling goods/services through wireless handheld devices.
 The most important or powerful computer in a typical network is Network server.
 Data link layer of OSI reference model provides the service of Error detection and
Error control to the highest layer.
 File Manager is not a part of a standard office suite
 A Topology of computer network means cabling between PCs
 In UNIX command ―Ctrl + Z‖ is used to suspend current process or command
 Network layer of an OSI reference model is for Networking support
 Telnet helps in remote login.
 In case of MS-access, the rows of a Table correspond to records
 In a SONET system, an add/drop multipliers removes noise from a signal and can
also add/remove headers.
 The WWW standard allows programmers on many different computer platforms to show
the information on a server. Such programmers are called Web Browsers.
 One of the oldest calculating device was Abacus
 MS-Outlook Express is a e-mail client, scheduler, address book
 The OS, Such as windows, Unix, Macintosh on which a computer is based called Platform
 The first generation computers had vacuum tubes and magnetic drum
 Office Assistant is an animated character that gives help in MSOffice
 Spiders search engines continuously send out that starts on a homepage of a server
and pursue all links stepwise. Google, Ask, Bing are search engines
 Artificial intelligence can be used in every sphere of life because of its ability to think
like human beings.
 To avoid the wastage of memory, the instruction length should be of word size
which is multiple of character size
 Electronic fund transfer is the exchange of money from one account to another
 Format menu in MS Word can be used to change page size and type.
 Assembly language programs are written using Mnemonics/Instructions.
 DMA(Direct memory access) module can communicate with CPU through cycle stealing
 A stored link to a web page, in order to have a quick and easy access to it later, is
called Bookmark
 B2B type of commerce is characterized by low volume and high value transactions in
banking
43

 Workstation is single user computer with many features and good processing power
 History list is the name of list that stores the URL‘s of web pages and links visited in
Page

past few days


 FDDI access mechanism is similar to that of IEEE 802.5
 MS Office 2000 included a full-fledged web designing software are called Front Page 2000
 Macintosh is IBM‘s microcomputer
 X.21 is physical level standard for X.25
 Enter key should be pressed to start a new paragraph in MS Word.
 Main frame is most reliable, robust and has a very high processing power.
 Formatting toolbar allows changing of Fonts and their sizes
 The program supplied by VSNL when you ask for internet connection for the e-mail access
is Pine
 The convenient place to store contact information for quick, retrieval is Address book
 Digital cash is not a component of an E-wallet
 Firewall is used in PC for Security
 Tour the server room is to be done by the auditor while internet banking services audit
 Documentation while developing a software for a Bank is required for auditing
 Concurrency control in distributed database supports multi-user access
 Fifth generation computers are knowledge processors
 Transistors were first used in 2nd generation computers
 A camera is an processing machine
 To protect organization from virus or attacks all mails sent and received should be
monitored, all messages should be encrypted, E- mails should be used only for official
purpose
 The time between program input and outputs is called execution time
 Third generations of computers have On-line real time systems
 MIME is a compressor that packages different formats into SMTP compatible type
 The earliest software was developed using the waterfall model
 EDI (Electronic Data Interchange) E- commerce system can handle Transferring of funds.
 The process of dividing the disk into tracks & sectors is called Formatting.
 The process of preparing a floppy diskette for use is called Formatting
 Multiplexing combines signals from different sources into one and sends on a faster channel
 Message switcher chooses correct data path for an incoming message and forwards it
to relevant line
 Transmitting audio & video over internet is called Web Casting.
 Trojan horse Virus are self-replicating malicious code independent of the action of the
user, but slow down the processor on entering a network.
 Generation of PIN in bank ATM would require PIN entered is encrypted
44

 A character that changes its value throughout the program is called variables
Page

 When an organization gives contract for development of a software, it has to give data to
the service provider. In such cases, the ownership of data should be with the
client/organization that outsource services
 For optical fiber used in point to point transmission, the repeater (these are the devices
used to extend the length of the network without degrading the signal strength) spacing is
10-100 km
 Favorites are accessible from the start menu
 Task pre-emption, task priority and semaphores are not needed by server program from
an operation system
 The objective of multiprogramming operating system is to maximize CPU utilization
 The environment provided to ASP(Active server pages) is based on Client/server
 HUB is layer1 device, central device, dumb device
 QAM(Quadrature Amplitude Modulation ) is used in high speed modem
 Frame Relay technique uses connection oriented
 Bipolar always has a non-zero average amplitude
 In a SONET system, an add/drop multipliers can remove signals from a path
 The server on the internet is also known as Host
 For multiple branching in ‗C‘ we use switch statement
 Web site is a collection of HTML documents, graphic files, audio and video files
 The first network that initiated the internet was ARPANET
 In MODEMS a digital signal changes some characteristic of a carrier wave
 The binary values are represented by two different frequencies in frequency shift keying
 Messenger mailbox is present in Netscape communicator
 Switching is a method in which multiple communication devices are connected to
one another efficiently
 A bridge recognizes addresses of layer 3
 ―.TIF‖ extension name stands for tagged image format.
 PICT is an image format
 In programming languages the key word ―Void‖ means it does not return any value
when finished
 The keyboard shortcut to restart your computer is Ctrl + Alt + Del i.e. Task Manager
 MS-Excel is also known as spread sheet
 Manchester encoding is used in Ethernet technology
 The instruction of a program which is currently being executed are stored in main memory
 In DOS environment, the command used to save the file is ^Z
 In html coding <p> …… </p> tag is used to display a paragraph
45

 In HTML coding, the following attributes color, size, face used in font tag

Page

DHTML stands for dynamic hypertext markup language


 Fiber optics cable supports data rate up to 100 mbps to 2 gbps
 Most common channel used by networks today is telephone lines
 In programming language, Null point is used to tell end of linked list
 A technique which collects all deleted space onto free storage list is called garbage
collection
 Node to node delivery of the data unit is the responsibility of the data link layer
 Insulating material is the major factor that makes co axial cable less susceptible to noise
than twisted pair cable
 The basic circuit of ECL supports the OR-NOR logic
 Console-It is the term refers to a combination of a DISPLAY & KEYBOARD
 COM stands for Component Object Module
 CODEC stands for Compressor/Decompressor.
 Micro instructions are kept in control store
 In HTML coding no shade attribute of HR tag suppresses the shading effect and fields a
solid line
 The ―Nyquist theorem‖ specifies the minimum sampling rate to be twice the bandwidth
of a signal
 Memory allocation at the routine is known as Dynamic Memory Allocation
 In HTML loading, <BR> tag is used for displaying a new line
 The script which is designed to receive value from the web users is Java script
 The former name of Java Script was Live Script
 A toll used to find a synonym or antonym for a particular word is Thesaurus
 In this processing, a number of jobs are put together and executed as a group
Batch processing
 HTML code is always starts with <html> </html>
 If there are 5 routers and b networks in an internet work using link state routing, there will
be 5 routing tables
 A scripting language similar to HTML and which runs only on a browser is Java script
 By RAID technique, data is stored in several disk units by breaking them into smaller
pieces and storing each piece in separate disk
 Analog-digital conversion type needs Sampling of a signal
 In an Optical fiber, the inner Core is less dense than the Cladding
 Six types of heading are available in HTML
 RDBMS is an acronym for relational database management system
 In MS-Word, page layout view (see Desktop Publishing) is also known as true
46

WYSIWYG(what you see is what you get) as the page layout, page designs, words &
images will be displayed on the monitor as they will look on the printed page.
Page

 In HTML coding, <UL> (Unordered list) is used to give bullets in your document
 Transmission media are usually categorized as guided or unguided
 A virtual circuit is the physical connection between an end point and a switch or between
two switches
 Passing of the frame to next station can happen at a token ring station
 In HTML coding <LI> tag is used for denoting items in a list of type <UL>
 In MS-Word the keyboard shortcut F7 used for spelling and grammar check
 In Dos, primary name of a file can have a maximum of 10 characters
 du command is used to show file system disk usage in UNIX
 Maximum length of a text file is 255 characters.
 Frame format of CSMA/CD and Ethernet protocol differ in the block error control
 On an Ethernet LAN implementation with 10 base 5 the maximum number of segments
can be five.
 Overflow condition in linked list may occur when attempting to create a node when
linked list is empty
 Web-site is collection of web-pages and Home-page is the very first page that we see
on opening of a web-site.
 The subsystem of the kernel and hardware that cooperates to translate virtual to
physical addresses comprises memory management subsystem
 A device operating at the Physical layer is called a Repeater
 FORTRAN is a mathematically oriented languages used for scientific problems
 If we want to convert the text which is in small letters to capital letters then select the
required text and press Shift +F3
 Datagram packet switching uses the entire capacity of a dedicated link
 In the datagram approach to packet switching, each packet of a message follows the
same path from sender to receiver
 SKYPE is a peer-to-peer (workstations with equivalent capabilities and responsibilities)
voice over internet protocol (VoIP) helps to make free internet phone calls.
 Phishing-it is a form of criminal activity using social engineering techniques,
characterized by attempts to fraudulently acquire sensitive information, such as
passwords and credit cards details, by masquerading as a trustworthy person in an
apparently official electronic communication, such as E-mail or instant message.
 Spoofing- It means to Fool. In networking the term is used to describe a variety of
ways in which hardware and software can be fooled. It is the creation if TCP/IP packets
using somebody else‘s IP address. Or in the context of network security, it is a situation
in which one person or program successfully masquerades as another by falsifying data
and thereby gaining an illegitimate advantage. Example E-mail spoofing involves
47

trickery that make a message appear as if it came from a legitimate business e-mail
address.
Page

 Polling- It is a process in which a number of peripheral devices, remote stations, or nodes


in a computer network are interrogated, one at a time , to determine if service is required.
 Phreaking-it is a slang term coined to describe the activity of a culture of people who
study, experiment with, or explore telecommunication system/telephone network.
 Hacking-it is the practice of modifying the features of a system, in order to accomplish a
goal outside of the creator‘s original purpose.
 Spooling- The process of storing a device (e.g. Printer) output signal in a queue, while
the device can take on other actions. When the device is ready to take on other actions,
it will draw from the queue. The term spooling is derived from the acronym SPOOL-
Simultaneous Peripheral Operation On Line
 A process search engines use to investigate new pages on a web site and collect the
information that needs to be put in their indices is called Spider
 FDM(Frequency Division Multiplexing) technique transmits analog signals
 X.21 protocol consists of on Physical level
 In a start topology, if there are n devices in network, no of link required is n-1.For
Mesh topology, if there are n devices in the network , no of link required is n(n-1)/2.
 Modems is necessary for Multiplexing.
 In time- division circuit switching, delivery of data is delayed because data must be stored
and retrieved from RAM
 Subnet usually comprises layers 1 & 2, layer 1 through 3 of OSI model
 RFC stands for request for comment
 Packet filtering firewall and proxy firewall is not a type of firewall
 Most news reader‘s presents news groups articles in Threads
 The sharing of a medium and its path by two or more devices is called Multiplexing
 Sending messages, voice, and video and graphics files over digital communication link
is done by the method E-mail
 In a computer network, a computer that can control a group of other computers for
sharing information as well as hardware utilities is known as Server
 Dialog control is a function of the Presentation layer
 The program which takes user input, interprets it and takes necessary action is shell
 You save your computer files on disc and in Folders
 when the text automatically goes onto the next line this is called Word Wrap
 Left justify is the same as Align left
 To put text on the right of the page use the align right button
 Lotus 1-2-3 is a popular DOS based spreadsheet package
 Comments put in cells are called cell tip
 Getting data from a cell located in a different sheet is called referencing
48

 A numeric value can be treated as a label value if it precedes with apostrophe



Page

Data can be arranged in a worksheet in an easy to understand manner using auto


formatting, applying styles, changing fonts
 An excel workbook is a collection of worksheets and charts.
 Device drivers loaded in the config.sys file is loaded into the following memory
area: Conventional memory
 In CMOS setup, if you enable Shadowing ROM is copied to RAM
 Static variables are local to the block in which they are declared.
 During the normal PC boot process, ROM BIOS is active first
 During boot-up, the memory test checks and verifies that contiguous memory is installed
 601 error code identifies a Floppy drive problem
 You are looking at a memory module thought to be a DIMM module. 168 pins would be
on a DIMM module
 The system BIOS and ROM chips are called Firmware
 WRAM type of RAM is normally the fastest
 RAM provides quickest access to data.
 Steganography is hiding the data but not necessarily making it invisible and not
easily detectable.
 Gateways allows two items to communicate & share resources with each other
 EDI means Electronic Data Interface
 Mainframes network where a huge computer does all computing and front end PCs
are dumb terminals.
 A device that receives data from slow speed devices, and transmits it to different
locations is called remote concentrator
 Network that uses two OSI protocol layers as against three used in X.25 is a ―frame relay‖
 System flowcharts show relationship that link the input processing and output of the system
 To identify the system to be tested the penetration testing is done
 Platform in computer world means computer hardware and operating systems
 There is a central file in Windows OS that is used to keep track of information about
installed hardware and software and their preferences on that specific computer, This file is
Registry
 A character that retains its value during program execution is constants
 The term remote with respect to network means machine located far off
 In two-tier client server architecture the client is usually fat client
 The senior management provides the go-ahead approval for the development of projects
 E-mail address has two parts Username & Domain name (e.g. In
gopalnayak123@gmail.com Username-gopalnayak123 & Domain name- gmail.com)
 The shortcut key for Undo is Ctrl + Z & The shortcut key for Redo is Ctrl + Y
49

 X.25 LAPP uses a specific subset of HDLC protocol


Page

 Presentation layer of the OSI reference model is concerned with the syntax of
data exchanged between application entities.
 Programs that extend the capabilities of a server are C41 scripts
 The primary goal of ISDN (Integrated service digital n/w) is the integration of voice
services and non-voice services.
 Flow control in OSI model is done by Transport layer.
 The optical links between any two SONET devices is called a section.
 The key fields which are tested by a packet filtering firewall are source IP
address, TCP/UDP source port, destination IP address.
 The server on the internet is also known as Gateway
 VBScript can perform calculation of data
 In MS-Word, ‗Mail merge’ can be defined writing a letter once and dispatching it
to a number of recipients
 Coaxial cables are good for digital transmission and long distance transmission
 LRU is a page replacement policy used for memory management
 Commercial TV is an example of distributive services with user control
 The exact format of frame in case of synchronous transmission depends on
whether transmission scheme is either character oriented or bit oriented
 Ring topology is mostly affected by addition/remove of a node or node failure.
 To interconnect two homogenous WAN‘s we need a Router.
 Co-axial cables provides data rates over 50 mbps
 ISDN’s basic rate interface (BRI) is also known as 2D + B
 The mode of data transmission of unshielded twisted pair cable is full duplex
 Query is used to answer a question about a database
 AM and FM are examples of analog to analog modulation
 Redundancy is the concept of sending extra bits for use in Error Detection
 The physical layer is concerned with transmission of bits over the physical medium
 Stack is a LIFO structure
 Program of a computer presented as a sequence of instructions in the form of binary
numbers is called machine language
 Possible problems with java script can be security or limited graphics and
multimedia capabilities.
 Design view would use to define a table and specify fields
 In C++ programming, the extension of program is .cpp
 In DOS, the command used to create a new file is called Copy con
 In justified type of alignment, text gets aligned along both left and right margin
50

 The inner core of an optical fiber is glass and plastic in composition


 In MS-Access, a table can have one primary key/keys
Page
 In DOS, Deltree command is used to delete all the files as well as sub-directories
of a directory.
 Table, form, queries, reports, macros, modules are objects in an access Database
 The Clown command in UNIX changes home directory of a user
 When we run a program in HTML coding, notepad is used as back-end to write the code
and any Browser works as front-end to display the output.
 If the M bit in X.25 standard is set to 1, it means that there is more than one packet
 Array is linear data structure
 In UNIX, command ―! $‖ is used to repeat entire less command line
 PCM (Pulse code modulation) is an example of analog to digital conversion.
 For a small web site, one needs to buy space from the ISP (Internet Service Provider).
 In Half duplex Comm. data flows in both directions, but any one direction at the time
 The OSI model consists of seven layers.
 The main job of scheduler is to allocate CPU to processes.
 10,500 valid Min & Max zoom sizes in MS office
 Before printing a document you should always use Print preview
 Excel XP is the latest version of excel
 Character is not a valid data type in Excel
 Formula bar in an Excel window allows entering values and formulas
 Direct memory access(DMA) is a technique for transferring data from main memory
to a device without passing it through the CPU
 Cycle-stealing type of DMA transfer will operate when a CPU is operating
 A series 100 POST error code indicates a problem with the system board
 When SHADOWING is enabled in computers BIOS Instructions stored in various
ROM chips are copied into RAM.
 POST stands for power on self-test
 Checking the hard disk while running Windows 3.1, you discover a very large file
called 396SPART.PAR. That file is windows permanent swap file
 TSR stands for
 Memory is temporary and storage is permanent
 Computer of computer communication for business transactions is called EDI
 Client-server computing is used in Network multi-media
 Private key is used to append a digital signature
 The CPU has control unit, arithmetic-logic unit and primary storage
 E-R diagram represents relationship between entities of system
51

 Internet was started as network for defense forces of America


Page

 A program permanently stored in hardware is called firmware


 Taking back-up of a file against crash is a curative measure
 Simplex transmission technique permits data flow in only one direction
 Front end processor relieves the host computer from tedious jobs and does them itself
 All decisions for LAN are taken by the IT steering committee
 File transfer is the function of the application layer
 A modem performs modulation, demodulation, data compression
 MP3 files cannot be navigated using ClipArt browser
 When entering in a lot of text in capitals you should use the caps lock key
 Files created with Lotus 1-2-3 have an extension .123
 Device drivers that are loaded in windows 3.X are loaded into the sytem.ini file
 30 pin SIMM‘s, 72 pin SIMM‘s, 168 pin DIMM‘s types of RAM sockets can be seen
on mother boards
 Virtual memory refers to using a file on the hard disk to simulate RAM
 BIOS (ROM) is considered firmware
 A population application of computer networking is the WWW of newsgroup called
Netnews
 The Vi program available under UNIX can be created to open a virtual terminal
 The standard defined for fiber optics is 802.8
 Digitizers can be converted from ―dumb‖ to ―smart‖ through the addition of a
microprocessor
 The extension of database file is given by .dbf
 VRML code is based on Unicode (16-Bit character set standard designed to
include characters appearing in most languages including Chinese, Japanese etc.)
 VRML (Virtual Reality Modelling Language) is an application that gives a 3D effect
to pictures sometimes allowing you to move through them
 VR (Virtual Reality) is a technology that allows one to experience and interact with
images in a simulated 3D environment.
 Protocol conversion can be handled by gateway
 The term server refers to any device that offers a service to network users
 Using HTML, Front page, DHTML we can make web-site
 Usually security in a network is achieved by cryptography
 PSTN stands for public switched telephone network
 In C++ programming, the command to save the program file is F3
 The OSI model shows how the network functions of computer to be organized
 A 8 bit microprocessor must have 8 data lines
52

 A data structure, in which an element is added and removed only from one end is known
Page

as Stack
 In OSI model reference, layer 2 lies in between the physical layer and the network layer
 CompuServe is a widely used online service that offers access to the internet as well
as proprietary content and information.
 Mouse and joystick are graphic input devices
 Netiquette is network etiquette which specifies internet rules of courtesy for writing e-
mails and participating in newsgroups.
 A Directory in DOS Environment is equivalent to A Folder in Windows Environment.
 Gateway uses the greatest number of layers in the OSI model
 A set of standards by which servers communicate with external programs is called
common gateway interface
 API allows a client/server relationship to be developed between an existing host
application and a PC client
 Internet is network of networks
 A set of devices or combination of hardware and software that protects the systems on
one side from system on the other side is Firewall
 When bandwidth of medium exceeds the required bandwidth of signals to be transmitted
we use Frequency division multiplexing
 In Word, Ctrl + Del combination of keys is pressed to delete an entire word
 UNIX is both time sharing and multiprogramming system
 Mother board holds the ROM, CPU, RAM and expansion cards
 CD-ROM is as a Magnetic memory. It is an inexpensive way to store large amount of
data.
 DBRM takes care of storage of data in a data base
 Various input and output devices have a standard way of connecting to the CPU and
Memory. These are called Interface standards
 The place where the standard interfaces are provided to connect to the CPU and
Memory is known as Port
 Display capabilities of monitor are determined by Adapter card
 1 MB is equivalent to 2 (to the power of 20 bytes)
 Magnetic surface recording devices used in computers such as hard disks, floppy disks,
CD- ROMs are called secondary / auxiliary storage devices
 Assembler is a translator which translates assembly language program into a machine
language program. Interpreter is a translator which translates high level language
program into a machine language program
53
Page
 Most electronic devices today use some form of integrated circuits placed on printed
circuit boards thin pieces of Bakelite or fiberglass that have electrical connections etched
onto them is called Mother board
 Fifth generation computing is based on Artificial intelligence
 Assembly language is low-level language
 In assembly language mnemonics are used to code operations, alphanumeric symbols are
used for address, language lies between high-level language and machine language
 The computer‘s secondary memory is characterized by low cost per bit stored
 Acoustic coupler is a communications device which allows an ordinary telephone to be
used with a computer device for data transmission
 PC/AT is an example of Bi-directional keyboard interface
 DIMM is not an I/O bus
 PCI bus is often called as mezzanine bus.
 A mother board should contain at least 4 memory sockets
 A single zero bit is called starting bit
 PnP stands for plug and play.it is a Hardware that are easily attached to computer and
can be played instantly.
 Plug-in-This is a program that your browser uses to manipulate a download file. It
differs from a helper application in that the plug-in works inside the browser window`
 Maximum RAM of XT type is 1 M
 Mainly memories are divided into two types they are logical memories and physical
memories
 Full form of EMS memory is excluded memory specification
 Data on a floppy disk is recorded in rings called tracks
 Peer to peer means computer to computer i.e. Computer in same hierarchical level
 RLL refers to run length limits
 A scanner is attached to LPT or SCSI host adapter port
 Processor bus is the fastest speed bus in system
 Resolution is the amount of detail that a monitor can render
 Sound blaster is a family of sound cards sold by creative labs
 MIDI is a family of sound cards sold by creative labs
 MIDI is a standard for connecting musical instruments to PC‘s
 The display technology used by monitor is CRT(Cathode Ray Tube)
 It is best to use the game adaptor interface on the sound card and disable any other on
54

system
 The number of sectors per track in 1.44 MB floppy disk is 18
Page
 Pentium II system can address 62 G memory
 The mouse was invented by Englebart
 Latency is the average time that it takes for a sector to be a available after the heads
 Each sector is having 512 bytes
 DDD means digital diagnostic disk
 The last 128k of reserved memory is used by mother board
 There are 80 cylinders are there for an 1.44 m floppy
 The storage capacity of a CDROM is 650 MB
 XGB has 2048 K graphic memory.
 Most sound boards generate sounds by using FM synthesis
 Microscope helps you trouble shoot PS/2 system
 General purpose of diagnostic program run in Batch mode
 Operating system often called as kernel
 IPC stands for Inter process communication
 Buffering attempts to keep both CPU and I/O device busy all the time
 Buffering in Printers is necessary because Computer is fast generating data for printing
then printer can print & there is not enough memory is provided with printer.
 The most important aspect of job scheduling is the ability to Multiprogramming
 ―FIFO‖ stands for first in first out
 In the two-level directory structure, each user has its own user file directory
 The first implementation of UNIX was developed at Bell Telephone Laboratories in the
early 1970
 A Connection less protocol is more dynamic
 The Throughput is a measure of work for processor
 FOXPRO is a package and programming language
 Mostly used date format in computer is DD-MM-YY
 Reservation of train ticket uses real time mode of processing
 A floppy disk is a thin plastic disc coated with magnetic oxide
 In binary addition 1+1 = 10
 In COBOL programming characters length per line is 64
 In FOXPRO, the maximum fields in a record are 128
 QUIT command is used to come out of FOXPRO
 Count Command is used to count the specified records in a file with or without condition
 F1 key is pressed for help in FOXPRO
55

 One Giga byte (GB) = 1024 Mega bytes (MB)


 EDO stands for external data organizer
Page
 The number of wires in IDE Hard Disk cable are 16
 A Domain is a computer, website or network that is connected to internet. A typical
domain looks like this: www.gcnayak.blogspot.com.
 If the data transfer rate is 150 k/sec then it is called single speed
 A typical buffer for a CD-ROM drives 156 K
 The 2.88 M floppy drives have 36 no of sectors
 The Dos Prompt is mainly C:\>
 C:\>ver is used for displaying current version name
 Intel 440x ―Natoma‖ is an example for mother board chipset
 DIMM’s are 168 pin modules
 Parallel interface is not the interfaces that can be used to connect the mouse to the
computer
 The mouse interrupts usually occurs if the system uses a mouse port
 The video adapter BIOS handles communication between the Video Chipset & Video Ram
 Pentium pro CPU‘s have full of 323, they can track of 44 G of memory in address lines
 The processor bus is the communications path way between CPU and immediate
support chip
 A Modem attached to system on COM ports
 RGB monitor display 80 column text
 Animation means to make still picture, move and talk like in cartoon pictures.
Animation: A simulation of movement created by displaying a series of pictures or frames
 Application means a piece of software designed to meet a specific purpose
 Active X is a model for writing programs. Active X technology is used to make
interactive Web pages that look and behave like computer programs, rather than
static pages. With Active X, users can ask or answer questions, use push buttons, and
interact in other ways with the web page.
 BIS: Bureau of Indian Standards. It is a national organization of India to define standards
 Browser is a link between the computer and the internet. It‘s actually a program that
provides a way to look in the hand interact with all information on the internet. A
browser is a client program that uses the Hypertext Transfer Protocol (http) to make
requests of Web servers throughout the Internet on behalf of the browser user.
 CIO (Chief information officer) : The senior executive in a company responsible for
information management and for delivering IT services
 Client/server architecture: A type of network in which computer processing is
distributed among many individual PCs and a more powerful, central computer clients can
share files and retrieve data stored on the server
56

 Collaborative software: Groupware, such as Lotus Notes or Microsoft Exchange


Page

 Cyber Crime: The act of stealing, cheating or otherwise defrauding an organization with
the use of a computer
 Cryptography: Method used to protect privacy and security on the internet
 Disk Mirroring: The data is written on two or more hard disks simultaneously over the
same channel
 Disk Duple Xing: The data is written on two or more hard disks simultaneously over
the different channel
 Dumb Terminals: Hardware configuration consisting of a keyboard and monitor
that is capable of sending and receiving information but has no memory or processing
capabilities.
 Enterprise resource planning(ERP): An integrated system of operation application
combining logistics, production, contract and order management, sales forecasting and
financial and HR management.
 In 802.4 token bus CO-AXIAL Cable is used.
 The NEURAL NETS Data mining technique derives rules from real-world case examples.
 The Operating System UNIX is typically used for web server
 GDI stands for GRAPHICS DEVICE INTERFACE.
 EOD Code is written into a serially accessed memory.
 KERNING-The feature of Word that automatically adjusts the amount of space between
certain combination of characters so that an entire word looks more evenly spaced.
 SCSI Is a set of standards for DATA TRANSFER. It is commonly used for hard disks
and tape drives.it can connect scanners, CD Drives etc.
 KIOSK is a TOUCH SCREEN Based computer terminal which provides access to
information application for communication, E-Commerce, Entertainment & Education

57

For more E-Books & Study Material visit www.gcnayak.blogspot.com


Page
MULTIPLE CHOICE QUESTIONS (MCQ)

 All of the following are examples of real security and privacy risks EXCEPT:
A. Hackers.
B. Spam.
C. Viruses.
D. Identity theft.

 A process known as is used by large retailers to study trends.


A. Data mining
B. Data selection
C. POS
D. Data conversion

 Terminals (formerly known as cash registers) are often connected to


complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query

 A (n) system is a small, wireless handheld computer that scans an items


tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. Inventory
D. Data mining

 The ability to recover and read deleted or damaged files from a criminal computer is
an example of a law enforcement specialty called:
A. Robotics.
B. Simulation.
58

C. Computer forensics.
D. Animation.
Page
 Which of the following is NOT one of the four major data processing functions
of a computer?
A. Gathering data
B. Processing data into information
C. Analyzing the data or information
D. Storing the data or information
 Tags, when placed on an animal, can be used to record and track in a
database all of the animal movements.
A. POS
B. RFID
C. PPS
D. GPS
 Surgeons can perform delicate operations by manipulating devices through computers
instead of manually. This technology is known as:
A. Robotics.
B. Computer forensics.
C. Simulation.
D. Forecasting.

 Technology no longer protected by copyright, available to everyone, is considered to be:


A. Proprietary.
B. Open.
C. Experimental.
D. In the public domain.

 Press to move the insertion point to the Address box, or to highlight the URL in
the Address box.

A. Alt + D B. Alt+ A C. Shift + Tab D. Tab + Ctrl E. Ctrl +S

 Is the science that attempts to produce machines that display the same type
of intelligence that humans do?
A. Nanoscience
B. Nanotechnology
59

C. Simulation
Page

D. Artificial intelligence (AI)


 __________Is data that has been organized or presented in a meaningful fashion?
A. A process
B. Software
C. Storage
D. Information

 The name for the way that computers manipulate data into information is called:
A. Programming.
B. Processing.
C. Storing.
D. Organizing.

 Computers gather data, which means that they allow users to data.
A. Present
B. Input
C. Output
D. Store

 After a picture has been taken with a digital camera and processed appropriately, the
actual print of the picture is considered
A. Data.
B. Output.
C. Input.
D. The process.

 Computers use the language to process data.


A. Processing
B. Kilobyte
C. Binary
D. Representational

 Computers process data into information by working exclusively with:


A. Multimedia.
B. Words.
60

C. Characters.
Page

D. Numbers.
 In the binary language each letter of the alphabet, each number and each special
character is made up of a unique combination of:
A. Eight bytes.
B. Eight kilobytes.
C. Eight characters.
D. Eight bits.

 The term bit is short for


A. Megabyte.
B. Binary language.
C. Binary digit.
D. Binary number.

 A string of eight 0s and 1s is called a:


A. Megabyte.
B. Byte.
C. Kilobyte.
D. Gigabyte.

 A is approximately one billion bytes.


A. Kilobyte
B. Bit
C. Gigabyte
D. Megabyte

 A is approximately one million bytes.


A. Gigabyte
B. Kilobyte
C. Megabyte
D. Terabyte

 Is any part of the computer that you can physically touch?


A. Hardware
61

B. A device
Page

C. A peripheral
D. An application

 The components that process data are located in the:


A. Input devices.
B. Output devices.
C. System unit.
D. Storage component.

 All of the following are examples of input devices EXCEPT a:


A. Scanner.
B. Mouse.
C. Keyboard.
D. Printer.

 Which of the following is an example of an input device?


A. scanner
B. speaker
C. CD
D. Printer

 All of the following are examples of storage devices EXCEPT:


A. Hard disk drives.
B. Printers.
C. Floppy disk drives.
D. CD drives.

 The , also called the Brain of the computer, is responsible for processing data.
A. Motherboard
B. Memory
C. RAM
D. Central processing unit (CPU)

 The CPU and memory are located on the:


A. Expansion board.
62

B. Motherboard.
Page

C. Storage device.
D. Output device.

 Word processing, spreadsheet, and photo-editing are examples of:


A. Application software.
B. System software.
C. Operating system software.
D. Platform software.

 Is a set of computer programs used on a computer to help perform tasks?


A. An instruction
B. Software
C. Memory
D. A processor

 System software is the set of programs that enables your computer‘s hardware devices
and
Software to work together.
A. Management
B. Processing
C. Utility
D. Application

 The PC (personal computer) and the Apple Macintosh (Mac) are examples of two different:
A. Platforms.
B. Applications.
C. Programs.
D. Storage devices.

 Apple Macintoshes (Macs) and PCs use different to process data and
different operating systems.
A. Languages
B. Methods
C. CPUs
D. Storage devices
63

 Servers are computers that provide resources to other computers connected to a:


Page
A. Network.
B. Mainframe.
C. Supercomputer.
D. Client.

 Smaller and less expensive PC-based servers are replacing ___________ in


many businesses.
A. Supercomputers
B. Clients
C. Laptops
D. Mainframes

 DSL (Digital Subscriber Line) is an example of a (n) __________connection.


A. Network
B. Wireless
C. Slow
D. Broadband

 Are specially designed computers that perform complex


calculations extremely rapidly?
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes

 The difference between people with access to computers and the Internet
and those without this access is known as the:
A. Digital divide.
B. Internet divide.
C. Web divide.
D. Broadband divide.

 The binary language consists of digit(s).


A. 8
B. 2
64

C. 1,000
Page

D. 1
 Which of the following is the correct order of the four major functions of a computer?
A. Process →Output →Input →Storage
B. Input →Output →Process →Storage
C. Process →Storage →Input →Output
D. Input →Process →Output →Storage

 A byte can hold one of data.


A. Bit
B. Binary digit
C. Character
D. Kilobyte

 Controls the way in which the computer system functions and provides
a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard

 The operating system is the most common type of software.


A. Communication
B. Application
C. System
D. Word-processing software

 Are specially designed computer chips that reside inside other devices,
such as your car or your electronic thermostat?
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes

 The steps and tasks needed to process data, such as responses to questions or clicking an
65

icon, are called:


A. Instructions.
Page

B. The operating system.


C. Application software.
D. The system unit.

 The two broad categories of software are:


A. Word processing and spreadsheet.
B. Transaction and application.
C. Windows and Mac OS.
D. System and application.

 The metal or plastic case that holds all the physical parts of the computer is the:
A. System unit.
B. CPU.
C. Mainframe.
D. Platform.

 Which of the following layer is not present in TCP/ IP model?


A. Application layer
B. Session layer
C. Transport layer
D. Internet layer
E. None of these

 A is a “plug in” to the browser that allows you to view interactive web pages
that contains games, movies, ads etc.
A. Quick time
B. Wizard
C. Shockwave
D. Flash Player
E. Terminal

 Which of the following was the 1st search engine?


A. Lycos
B. Yahoo
C. Google
D. Bing
E. Ask
66
Page

 Ctrl + F10 is shortcut key for?


A. Maximize currently selected window
B. Minimize currently selected window
C. Move between two or more excel files
D. Move between two or more excel sheets
E. None of these

 192 . 112. 252. 121 belongs to which class?


A. Class A
B. Class B
C. Class C
D. Class D
E. Class E

 Which of the following is not an SQL language?


A. DDL
B. DCL
C. TQL
D. DML
E. None of these

 Binary value of 45 is .
A. 11001
B. 101101
C. 100101
D. 101100
E. None of these

 Which of the following was developed in 2nd Generation of computer?


A. I.C
B. Vacuum Tube
C. Microprocessor
D. Transistor
E. None of these

 A work sheet is an excel 2003 file contains columns and rows.


A. 256, 64336
B. 256, 65536
67

C. 254, 65536
D. 254, 64336
Page

E. None of these
 Which of the following is not a language processor?
A. Compiler
B. Interpreter
C. Processor
D. Assembler
E. None of these

 LCD stands for :


A. Liquid Crystal Display
B. Laser Crystal Display
C. Light Crystal Display
D. All of these
E. None of these

 Memory in a PC is addressable through :


A. Bits
B. Byte
C. Nibble
D. All of these
E. None of these

 One Kilo Byte represents :


(A) 1024 bytes
(B) 1000 bytes
(C) 100 bytes
(D) 1064 bytes
(E) None of these

 RAM in its commercial forms are available as :


(A) SIMM
(B) DIMM
(C) Both (A) & (B)
(D) CPSB
(E) None of these

 Refresh Rate of monitor is measured in :


(A) Hz
(B) Meter
68

(C) Volts
Page

(D) Amp.
(E) None of these

 Such types of printers, in which the printing head contacts with the paper in printing
process, are called as :

(A) Impact Printer


(B) Non-Impact Printer
(C) Laser Printer
(D) All of these
(E) None of these

 Which of the following meaning is used between CPU & RAM to speed up the
processing power of a CPU?

(A) Virtual Memory


(B) DRAM
(C) Flash Memory
(D) Cache Memory
(E) None of these

 Which of the following is Lowest in memory hierarchy?


(A) Cache memory
(B) Secondary memory
(C) Registers
(D) RAM
(E) None of these

 Basic building block for a digital circuit is :


(A) Word
(B) Logic Gate
(C) Processor
(D) BUS
(E) None of these

 Which of the following is a logic gate?


(A) AND
(B) OR
(C) CPU
69

(D) Both (A) & (B)


Page

(E) None of these


 ASCII stands for
(A) American Standard Code for Institute Interchange
(B) American Standard Code for Information Interchange
(C) American Standard Code for Information Institute
(D) All of these
(E) None of These

 Which of the following requires Refreshing during retaining the data?


(A) DRAM
(B) SRAM
(C) Virtual Memory
(D) FDD
(E) None of these

 The base of binary number is :


(A) 2
(B) 16
(C) 8
(D) 10
(E) None of these

 CRT stands for


(A) Character Ray Tube
(B) Cathode Ray Tube
(C) Color Ray Tube
(D) All of the above
(E) None of these

 Which of the following is a GUI device:


(A) Keyboard
(B) Mouse
(C) OMR
(D) All of these
(E) None of these

 Which of the following is a type of optical media?


(A) FDD
(B) HDD
70

(C) CD
Page

(D) Magnetic Tap


(E) None of these

 DVD stands for :


(A) Digital Video Disk
(B) Digital Versatile Disk-is an optical storage media
(C) Both (A) & (B)
(D) All of these
(E) None of these

 Which of the following is an input device?


(A) VDU (Visual Display Unit)
(B) Printer
(C) Plotter
(D) MICR
(E) None of these

 Identify the odd one


(A) Storage tape memory
(B) Magnetic disc memory
(C) Optical disc memory
(D) Read only memory
(E) None of these

 Nibble describes a bits combination of :


(A) 5 bits
(B) 6 bits
(C) 7 bits
(D) 4 bits
(E) None of these

 Data in RAM are


(A) Volatile in nature
(B) Non-volatile in nature
(C) Both (A) & (B)
(D) All of these
(E) None of these

 BIOS stands for


71

(A) Basic Input Output System


Page

(B) Basic Instruction Output System


(C) Basic Interface Output System
(D) All of these
(E) None of these

 Hackers
(A) All have the same motive
(B) Is another name for users
(C) May legally break into computers as long as they do not do any damage
(D) Are people who are allergic to computers
(E) Break into other people’s computers

 Microcomputer hardware consists of three basic categories of physical equipment .


(A)Keyboard, monitor, hard drive
(B) System unit, input/output, memory
(C)System unit, input/output, secondary storage
(D) System unit, primary storage, secondary storage
(E) DC, Floppy, Pen Drive

 Are distinct items that don‘t have much meaning to you in a given context?
(A) Fields
(B) Data
(C) Queries
(D) Properties
(E) Users

 Storage that retains its data after the power is turned off is refereed as to -
(A) Volatile storage
(B) Sequential storage
(C) Direct storage
(D) Nonvolatile storage
(E) Mobile storage

 An essential ingredient for effective multimedia presentations incorporates user


participation of.
(A) Links
(B) Buttons
(C) Interactivity
72

(D) Integration
Page

(E) Speed
 Which is considered a direct entry input device?
(A) Optical scanner
(B) Mouse
(C) Light pen
(D) Digitizer
(E) All of the above.

 Which is a unit of measurement used with computer systems?


(A) Byte
(B) Kilobyte
(C) Megabyte
(D) Gigabyte
(E) All of the above

 A character is represented in EBCDIC(Extended Binary Coded Decimal For


Information Interchange) by
(A) One bit
(B) Four bits
(C) Eight bits
(D) Sixteen bits
(E) None of the above

 Which is a secondary memory device?


(A) CPU
(B) ALU
(C) Floppy disk
(D) Mouse
(E) None of the above

 MS- DOS is a ?
(A) Single – user operating system
(B) Multi – user operating system
(C) Multi – tasking operating system
(D) All of the above
(E) None of these

 Which among the following is responsible for allocating IP addresses and managing
73

the domain name system (DNS)?


Page

(A) Domain name warehousing


(B) Internet Corporation For Assigned Names and Numbers
(C) Internet Assigned Numbers Authority
(D) None of these

 The performance of a hard drive or other storage device, meaning how long it takes to
locate a file is called?
(A) Response Time
(B) Access Time
(C) Quick Time
(D) None of these

 Alerts are mostly appear in ?


(A) Check Box
(B) Combo Box
(C) Dialog Box
(D) None

 Which of the following was used in first generation computers?


(A) Machine Language
(B) High Language
(C) Assembly Language
(D) None of These

 A unit of data storage that equals 2 to the 70th power is called?


(A) Zebibyte
(B) Yottabyte
(C) Yobibyte
(D) None

 What is used in most programs that is a part of a program and guides the user through
certain steps?
(A) Software
(B) Wizard
(C) Wiki
(D) None
74

 A generic name for Intel processors released after the original 8086 processor is ?
(A) Pentium
Page

(B) x86
(C) Pentium 286
(D) None of these

 A network that is connected to the Internet, but uses encrypt ion to scramble all the data
sent through the Internet is called?
(A) My network
(B) Virtual private Network
(C) Social Network
(D) None of these

 V-RAM is used f or access of the following?


(A) Video & Graphics
(B) Text & Images
(C) Programs
(D) None of these

 Panther (10.3), Jaguar (10.2), Puma (10.1), and Cheetah (10.0) are examples of ?
(A) Windows OS
(B) Mac OS
(C) Open Operating Systems
(D) None of these

 Structured Query Language (SQL) is used in the


following
(A) Create Databases
(B) Create & Modify Databases
(C) Create, Modify & Query Databases
(D) None of these

 A file which has not been altered, compressed, or manipulated in any way by the
computer is called?
(A) Temp File
(B) Raw file
(C) Permanent file
(D) None of these

 The word bandwidth is also used to mean ?


75

(A) Width of the data cable


(B) Amount of data transferred
Page

(C) Number of computer on a particular network


(D) None

 Net BIOS was introduced in 1983 by which company as an improvement to the


standard BIOS used by Windows-based computers?
(A) Dell
(B) IBM
(C) Compaq
(D) None

 Which among the following is not a payment card technology?


(A) Magnetic Stripe Card
(B) Smart card
(C) Fleet card
(D) All of them are payment card technologies

 Which among the following can be called an Electronic cheque?


(A) Debit card
(B) Smart Card
(C) Credit Card
(D) None

 Which of the following was used in programming the first computers?


(A) Object code
(B) Source Code
(C) Machine Language
(D) Assembly Language

 Any piece of data can be returned in a constant time, regardless of its physical location
and whet her or not it is related to the previous piece of data using which of the following ?
[A]CPU
[B]RAM
[C]ROM
[D]Network Interface Card (NIC)

 Which Microsoft -based technology was built to link desktop applications to the World
Wide Web?
(A) Active channel
(B) Active desktop
76

(C) ActiveX
Page

(D) None
 Which among the following key is used for checking grammar &
spelling?
[A]F3
[B]F5
[C]F7
[D]None of these

 An Auto responder is a on mail server that automatically replies to e-


mails?
[A]command
[B]software
[C]program
[D]None

 RUP Stands for "Rational Unified Process." RUP is a software development process
from Rational, a division of ?
[A]Microsoft

[B]IBM

[C]Compaq

[D]None

 Which among the following defines web2.0 most precisely?


[A]A New version of Internet

[B]A Series of technological improvements in World Wide Web

[C]A New labeling of old Software improved

[D]None of these

 Microsoft first introduced an operating environment named Windows in which

year?

[A] 1977

[B] 1985

[C] 1988
77

[D]None of these
Page
 32 bit operations were introduced for the first time by Microsoft in ?

[A]windows 95

[B]Windows 3.0

[C]Windows 3.11

[D]None of these

 A GUID is a 128-bit (16 by e) number used by software programs to uniquely identify


the location of a data object. What is correct full form?

[A]Graphical User Identifier

[B]Globally Unique Identifier

[C]Globally Unique Internet

[D]None of these

 Which among the following are not objects in Access Database?


(A) Table

(B) Form

(C) Query

(D) Pivot Table

 Which of the following Key is not found in normal computers / laptops?


(A) Turn key
(B) Alt key
(C) Del key
(D) Shift key

 A hybrid computer exhibits the features of ?

[A]analog computer

[B]digital computer

[C]both analog and digital computer


78

[D]mainframe computer
Page
 Structured programming languages such as C, COBOL and FORTRAN were used in
which of the following computers?

[A]First Generation Computers

[B]Second Generation Computers

[C]Third Generation Computers

[D]Fourth Generation Computers

 Which among the following statement is correct? (More than one options are correct )

[A]Machine Language was developed prior to Assembly Language

[B]Assembly Language was developed prior to Machine Language

[C]Both Assembly and machine languages were developed together

[D]First generation computers used machine language and second generation


computers used assembly language

 Which of the following are called knowledge information processing systems?


(A) Fourth Generation Computers
(B) Fifth Generation Computers
(C) Laptops
(D) Servers

 The sixth-generation era (sometimes referred to as the 128-bit era) refers to which of
the following?

[A]Sixth generation Computers

[B]Laptops

[C]Super computers

[D]Video game Consoles

 BSNL, Reliance, Shaw cable, AOL, Tata Indicium all can be kept in which one of
the following groups?

[A]ISDN
79

[B]IRC
Page
[C]ISP

[D]Icons

 Which among the following is correct about 4GL


[A]A computer brand

[B]A software brand

[C]A software progm.

[D]A Procedural 4th Generation Programming language

 First microprocessors were used in which of the

following?

[A]Computers

[B]Calculators

[C]Telephones

[D]Printers

  is a process of sending documents to a storage where they are temporarily


stored and remain there until printer prints them.

[A] Printing [B] Queuing [C] Waiting Queue [D] Print Spooling [E] None of these

 Which of the following transforms input data into output

data? [A]Peripherals

[B]RAM

[C]ROM

[D]CPU

 In a computer file systems which among the following is top or first in hierarchy?

[A]root directory

[B]parent directory
80

[C]home directory
Page
[D]working directory

 What is HTTP 404?

[A]An error message indicating server not found

[B]An error message indicating moved permanently

[C]An error message indicating forbidden

[D]An error message indicating server found

 Core Banking Solutions (CBS) are developed to perform

[A]Recording of transactions

[B] Passbook maintenance

[C]Interest calculations

[D]All of the above

 Now a days Vishing has become a criminal practice of using social engineering over
which of the following?

[A]Social networking sites

[B]Mobile

Phones

[C]E-mails

[D]Cyber cafés

 When some unidentified / unknown person / firm sends you mail in a trust worthy
/lucrative way asking for sensitive banks and online payment information, this is a case of

[A]spam

[B]hacking

[C]Phishing

[D]Vishing
81

 Which among the following is a correct definition of "Digital


Page
Divide"?

[A]gap between people having access to mobile and internet access

[B]gap between people having access to internet /IT and no internet /IT

[C]gap between people having access to broadband and narrowband internet

[D]gap between people having access to internet banking and normal banking

 Which among the following is the most common source of Viruses to the hard disk of
your computer?
[A]Incoming Email

[B]Outgoing Email

[C]CD ROMs

[D]Websites

 What is the full form of W3C?

[A]WWW Consortium

[B]World Wide Web Company

[C]World Wide Web Center

[D]World Wide Web Command

 Which among the following is used for removing a software bug / defect which is
available for free of cost from the software provider?

[A]Version

[B]Update

[C]Help

[D]Patch

 What is the name of the proposed software application that would allow users of
automated teller machines (ATMs) to alert the police of a forced cash withdrawal by
entering their personal identification number (PIN) in reverse order?
82

[A]ATM Safety PIN


Page
[B]ATM Safety Pro

[C]ATM Safety Code

[D]ATM Safety Sign

 In the MICR Code Line Structure what do represent the first three digits of Sort field
number consisting of nine digits?

[A]City

[B]Bank

[C]Branch

[D]Account Type

 Most of the internet banking sites provide which of the following feature to reduce the
risk of keystroke logging for the password entry?

[A]Virtual keyboard

[B]Finger Touching

[C]Touchscreen

[D]Shape Writer

 ADSL data communications technology uses which of the following for faster data
transmission?

[A]Voice band modem

[B]Wireless Modem

[C]Copper telephone

Lines [D]Sockets

 While browsing the internet, which of the following key is used for full screen

view?

[A]F3
83

[B]F5
Page

[C]F11
[D]F9

 Which of the following is a suitable term for any programmable content of a hardware
device configurations and data for application-specific integrated circuits (ASICs),
programmable logic devices, etc.?

[A]Hardware

[B]Software

[C]Firmware (A Combination of a software program in hardware, such as a ROM, or a


disk that has files or programs written on its surface)

[D]Malware (Software, such as viruses, worms and Trojan horses that has a malicious
intent)

 Most of the internet sites now a days use CSS primarily to enable the separation of
document content (written in HTML or a similar markup language) from document
presentation, including elements such as the layout, colors, and font s. What is full form?

[A]Cascading Style Software

[B]Clear Style Sheet

[C]Cascading Style Sheet

[D]Common Style Sheet

 What is the purpose of keeping electronic devices such as computers, televisions, and
remote controlled devices on Sleep mode?

[A]Reduce Power consumption

[B]Back Up

[C]To write contents of RAM to hard disc

[D]To improve download speed

 Which of the following company owns/ uses the Virtual Hard Disk (.vhd) format for
Virtual PC?

[A]IBM
84

[B]Microsoft
Page
[C]Intel

[D]Google

 What is Office Open XML?

[A]A file format

[B]A software

[C]An electronic device

[D]An international std.

 What is the ultimate purpose of

Defragmentation?

[A]Make the PC faster

[B]Make the PC faster

[C]Delete temporary files

[D]Reduce Power

consumption

[E]Create More Free Space is the main purpose however performance is also
improved in most cases.

 Which among the following is a device that is used in computers to add external

components?

[A]Storage Device such as USB

[B]Keyboard

[C]Ports / System Boards

[D]RAM

 The term Round-trip delay time, used in telecommunication is replaced in computers


with which among the following?
85

[A]Access time
Page
[B]Response time

[C]Entrance time

[D]Ping Time

 The One-time password (OTPs) can be obtained by a customer, via which among
the following?

[A]Approaching the nearest Bank Branch

[B]SMS on Mobile

[C]E-mail by applying for OTP online

[D]All of above

 The terms "push and pull services" in context with the Banking are used in which among
the following generally?

[A]Rural Banking

[B] Unit Banking

[C]Online Banking

[D]Mobile Banking

 Consider the following in context with the CVV (Card Verification Code) of an ATM
or Credit Card:

1. Magnetic Stripe

2. Front of the in embossed or printed digits

3. Back of the card as a separate group of 3 digits to the right of the signature strip

At which among the above locations CVV of an ATM is found?

[A]1 & 2

[B]2 & 3

[C]1 & 3
86

[D]1, 2 & 3
Page

 What do we call the process of collecting, organizing, storing and otherwise


maintaining a complete historical record of programs and other documents used or
prepared during the different phases of the system?

[A]Segmentation

[B]Documentation

[C]Data Management

[D]Data History

 Which among the following is an example of "Card not present Transaction" in context
with the Credit / Debit Cards?

[A]A person paying a restaurant bill by using his credit card

[B]A person making an online purchase using his / her credit card

[C]A person making a purchase using mobile banking

[D]Both [B] & [C]

 Consider the following: 1. Application software 2. Hardware 3. Operating systems. The


PDF documents are dependent upon which among the above to display the text, font s,
graphics, and other information contained by them?

[A] Only 1

[B] 1 & 2

[C] 1, 2 & 3

[D]None of them

 As a person working in internet banking environment, why you should be aware of


the "Dictionary attack"?

[A]It is used to inject worms or viruses in the system

[B]It is used to determine a password

[C]It is used to access customer's account by finding other details

[D]It is used for stealing info from the Credit Card


87

 Consider the following:


Page

1. Software
2. Hardware

3. Internet Programs

The terms Bug and Debugging are generally used in which among the above?

[A] 1 & 2

[B] 2 & 3

[C] 1 & 3

[D] 1, 2 & 3

 What is ISO 9362 is related to in context with Banking

Technology?

[A]RTGS Transfers

[B]NEFT Transfers

[C]SWIFT Transfers

[D]All of t hem

 The Clearing House Interbank Payment s System (CHIPS) is a clearing system for large
value transactions in which among the following countries /regions?

[A]United States

[B]United Kingdom

[C]Entire Europe

[D]Australia

 The terms Goodput, Throughput and Maximum throughput are most closely associated
with which among the following in computers?

[A]Bit Rate

[B]Response Time
88

[C]Command Line Interface


Page

[D]Random memory
 Which among the following is the time period during which a computer is
malfunctioning or not operating correctly due to machine failures?

[A]Downtime

[B]Uptime

[C]Response time

[D]Runtime

 Housing all hardware, software, storage and processing in one site location is called
A. Time-sharing
B. A Distributed system
C. Centralized Processing
D. A host Computer
E. None of these

 A _______ Is a term used when a search engine returns a web page that matches the search?
(A) Blog
(B) Hit
(C) Link
(D) View
(E) Success

 Which of the following could be digital input devices for computers?


A. Digital camcorder
B. Microphone
C. Scanner
D. All of the above
E. None of the above

 A sales clerk at a checkout counter scanning a tag on an item rather than keying it into
the system, is using
A. Input automation
B. Scanning automation
C. Source data automation
D. Item data automation
E. None of these
89

 Main memory works in conjunction with


Page

A. RAM
B. CPU
C. INTEL
D. Special function cards
E. All of these

 Vendor-created program modification are called


A. Patches
B. Antivirus
C. Holes
D. Fixes
E. Overlaps

 Even if a disk drive fails, the computer application running and using it can
continue processing. This application is said to have been designed with a feature called
A. 100 percent up-time
B. Fault tolerance
C. High reliability
D. All of these
E. None of these

 What would be the number of bytes, transferred at the rate of 1 Kilobit per

second?

[A] 100

[B] 108

[C] 125

[D] 140

 What do we call the automatic execution of high-priority computer programs that have
been designed to pre-empt the use of computer resources?

[A]Foreground

processing.

[B]Background

processing.
90
Page

[C]Black processing.
[D]White processing.

 What is the use of Digitizer as an input device?

[A]To convert graphic and pictorial data into binary inputs

[B]To convert graphic and pictorial data into analog inputs

[C]Debugging

[D]None of the above Uses

 What do we call a storage device where the access time is effectively independent of
the location of the data?

[A]Direct Access Storage Device

[B]Secondary Storage Device

[C]Primary Storage Device

[D]Gateway Device

 What do we call the pictorial representation that uses predefined symbols to describe
either the logic of a computer program or the data flow and processing steps of a system?
(A) Algorithm
(B) Flowchart
(C) Block Diagram
(D) Loop

 The peak cell rate (PCR), sustainable cell rate (SCR), and maximum burst size (MBS)
are used for measurement of?

(A) Bandwidth

(B) Channel Capacity

(C) Freq. Modulation

(D) Amp. Distortion

 What do we call a CPU that is designed specifically to handle the communications


processing task with main purpose is to off –load communications processing task from
the host computer so that the host computer can be dedicated for applications and data
91

processing jobs?
Page

(A) Backend processor


(B) Front -end processor
(C) Node processor
(D) File Server

 Which among the following can be done via Internet Banking?

1. Payments to third parties, including bill payment s and telegraphic/wire transfers

2. Funds transfers between a customer's own transactional account and savings accounts

3. Investment purchase or sale

4. Loan applications and transactions, such as repayments of

enrollments. Choose correct option:

[A] 1, 2 & 3

[B] 2, 3 & 4

[C] 1, 3 & 4

[D] 1, 2, 3 & 4

 Dynamic Adhoc Wireless Networks (DAWN) usually come under ?

[A] 2 G

[B] 3 G

[C] 4 G

[D] 5G

 Which among the following has been standardized in the IEEE 802.3

specification?

[A]Bluetooth

[B]Ethernet

[C]WiMAX
92

[D]All of t hem
Page

 While browsing internet, what do we call the area of storage that compensates for the
different speeds of data flow or timings of events by temporarily holding a block of data
that is waiting to be processed?

[A]Cache

[B]Buffer

[C]Flash

[D]T rash

 Which among the following is a high-level language used to develop software


applications in compact, efficient code that can be run on different types of computers with
minimal change?

A.FORTRN

B.C

C.COBOL

D.ALGOL

 What do we call an input /output device on a computer, reserved for communication


between the computer operator or maintenance engineer and the computer?
[A]EDP Device

[B]Console-it is a combination of a DISPLAY &

KEYBOARD

[C]Jokey

[D]Link Device

 Arrange in the Ascending order of data hierarchy

[A]bit - byte - record - field - data base - file

[B]bit - byte - field - record - file -

database

[C]bit - byte - file - field - record - database


93

[D]bit - record - byte - field - file - database


Page
 A Digital Certificate can identify

1. An individual

2. A server

3. A company

Choose the correct

option:

[A]Only 1

[B] 1 & 2

[C] 2 & 3

[D] 1, 2 & 3

 Which among the following is NOT a search

engine?

[A]Google

[B]Baidu

[C]Wolf ram Alfa

[D]Yahoo

Comment-Wolf ram Alpha is an answer engine.

 Consider the following: 1. C 2. C++ 3. COBOL which among the above is/are high-
level languages (HLL)?

[A]Only 1

[B] 1 & 2

[C] 2 & 3

[D] 1, 2 & 3
 Which of the following is the product of data processing
94

a. information b. data c. software program d. system


Page
 The process of putting data into a storage location is called
a. reading b. writing c. controlling d. hand shaking

 The process of copying data from a memory location is called


a. reading b. writing c. controlling d. booting

 A list of instructions used by a computer is called


a. program b. CPU c. text d. output

 The CPU consists of


a. input, output and processing
b. control unit, primary storage and secondary storage
c. Control unit; arithmetic logic unit and primary storage
d. input, processing and storage

 Which of the following is true about primary storage


a. it is a part of the CPU b. It allows very fast access to data c. It is relatively more expensive
d. all of the above

 Software instruction intended to satisfy a user's specific processing needs are called
a. system software b. process software c. documentation d. application software

 The computer device primarily used to provide hardcopy is the


a. CRT b. line printer c. computer console d. card reader

 Which one of the following can produce the final product of machine processing in a
form usable by humans
a. storage b. control c. input device d. output device

 The term 'memory' applies to which one of the following


a. logic b. storage c. input device d. output device

 A program written in machine language is called........ Program


a. object b. computer c. assembler d. high level

 A source program is the program written in.......... Language.


a. English b. symbolic c. high level d. object

 A typical modern computer uses


a. magnetic cores for secondary storage b. LSI chips c. magnetic tape for primary memory
d. more than 10,00 vacuum tubes

 General purpose computers are those that can be adopted to countless uses simply
95

by changing its
a. output device b. input device c. processor d. program
Page
 The current generation of computers
a. Second b. fifth c. fourth d. third

 To implement all functions of the basic logic functions, it needs


a. OR gate b. NOT gate c. AND & NOT gates d. None of these

 In the binary number 110.101, the fractional part has the


value a. 0.625 b. 0.125 c. 0.875 d. 0.5

 The value of binary 1111 is


a. 23 -1 b. 24 c. 24 - 1 d. None of these

 The value of 25 in octal system is


a. 20 b. 40 c. 400 d. None of these

 A hexa decimal number 'AO' has the decimal


value a. 80 b. 256 c. 100 d. 160

 The binary representation of hexadecimal 'C3'


is a. 1111 b. 110011 c. 110001 d. 11000011

 The ASCII code is for information interchange by a binary code for


a. numbers only b. alphabets only c. alphanumeric and other common symbols d. None
of these

 A four bit number is given as 1001. Its 1's complement


is a. 1001 b. 11001 c. 0110 d. 0101

 2's complement representation of a decimal number -4


is a. 0100 b. 1100 c. 1011 d. 1010

 BCD numbers are obtained


a. by converting decimal number to binary
b. by converting decimal to octal
c. when each decimal digit is represented by four bit binary
d. by converting binary to decimal.

 Which of the following performs modulation and demodulation


a. Satellite b. modem c. fiber optic d. amplifier

 Transmission of computerized data from one location to another is called


a. data transfer b. data flow c. data communication d. data management

 Which of the following items is not used in LAN


96

a. computers b. modem c. printer d. cable


Page
 Which is the device that converts computer output into a form that can be transmitted
over a telephone line
a. teleport b. multiplexer c. concentrator d. modem

 Which of the following is not used as secondary storage


a. Semiconductor memory b. magnetic disks c. magnetic drums d. magnetic tapes

 A collection of wires that connects several device is called


a. link b. bus c. cable d. port

 A offline device is
a. a device which is not connected to CPU
b. a device which is connected to CPU
c. a device which is in breakdown stage
d. None of these

 Memories in which any location can be reached in a fixed and short amount of time
after specifying its address is called
a. sequential access memory b. random access memory c. secondary memory d. mass
storage

 The register which contains the data to be written into or read out of the addressed
location is known as
a. index register b. memory address register c. Memory Data Register d. program counter

 The register which keeps track of the execution of a program and which contains the
memory address of the next instruction to be executed is known as
a. index register b. instruction register c. memory address register d. program counter

 Which of the following is used as storage locations both in the ALU and in the control
section of a computer
a. accumulator b. register c. adder d. decoder

 Accumulator is a
a. hardwired unit b. sequential circuit c. finite state machine d. register

 Non volatility is an important advantage of


a. CCDs b. magnetic tapes and disks c. magnetic bubbles d. both b and c

 The memory which is programmed at the time it is manufactured is


a. ROM b. RAM c. PROM d. EPROM

 Which memory is nonvolatile and may be written only once.


97

a. RAM b. EE-PROM c. EPROM d. PROM


Page

 Which of the following statements is wrong


a. magnetic core memory, RAMs and ROMs have constant access time
b. magnetic tape is non volatile
c. semiconductor memories are used as mass memory medium
d. An EPROM can be programmed, erased and reprogrammed by the user with an
EPROM programming instrument

 The fastest type of memory is


a. tape b. semiconductor memory c. disk d. bubble memory

 In magnetic disks data is organized on the platter in a concentric sets or rings called
a. sector b. track c. head d. block

 When we move from the outer most track to the innermost track in a magnetic disk,
the density
a. increases b. decreases c. remains the same d. either remains constant or decreases

 Which of the following device can be used to directly input printed text
a. OCR b. Mouse c. MIC d. Joystick

 Which device can draw continuous lines?


a. daisy wheel b. plotter c. chain printer d. impact printer

 In which storage device, recording is done by burning tiny pits on a circular disk
a. punched cards b. floppy disk c. magnetic tape d. optical disk

 Which of the following printers uses light beam and electrostatically sensitive black powder
a. dot matrix printer b. daisy wheel printer c. chain printer d. laser printer

 Scheduling is
a. allowing job to use the processor
b. unrelated performance considerations
c. quiet simple to implement, even on large main frames
d. the same regardless of the purpose of the system

 Multiprogramming systems
a. are easier to develop than single programming systems
b. execute each job faster
c. execute more jobs in the same time period
d. use only one large mainframe computer

 What device is used for entering x – y coordinates


a. card reader b. joystick c. keyboard d. all of the above

 Impact printers
98

a. strike a ribbon against the paper to produce character images.


Page

b. include ink-jet and thermal devices


c. are more expensive than laser printers
d. use optical technology

 Bar codes stores information using


a. punched holes b. dots c. thick and thin tines d. all of the above

 How many types of storage loops exist in magnetic bubble


memory? a. 8 b. 4 c. 3 d. 2

 In comparison to the internal (main) memory, tape or disk memory is


a. slower and more expensive b. slower and less expensive c. faster and more expensive d.
faster and less expensive

 One of the main features that distinguish microprocessor from microcomputers is


a. words are usually larger in microprocessors
b. words are shorter in microprocessors
c. microprocessor does not contain I/O devices
d. computers are not fully integrated

 Which technique is preferable for transferring a large amount of data to and from a
memory in a short time
a. DMA b. Interrupt driven I/O c. programmed I/O d. None of these

 The binary representation 100110 is numerically equivalent to


a. the decimal representation 46 b. the octal representation 46 c. the
hexadecimal representation 46
d. the binary representation 26

 The greatest negative number which can be stored in a computer that has 8-bit word
length and uses 2's complement arithmetic is
a. -256 b. -255 c. -128 d. -127

 By taking 2's complement again of the 2'scomplement of a binary, one gets


a. the 1's complement b. the 2's complement c. the original number d. the sign magnitude
form of the numbers

 In the sign magnitude representation, the leading bit


a. is a part of the number itself b. is unit for positive numbers c. is always unit d. stands for
the sign

 The OSI reference model defines the function for seven layers of protocols
a. including the user and communication medium.
b. not including the user or communication medium
c. including the communication medium but not the user
99

d. including the user but not the communication medium


Page
 A data packet is a packet header together with
a. a network layer b. an administrative layer c. user data d. a packet switch

 Which of the following technique provides dedicated communication channel between


two stations.
a. switch network b. circuit switching c. packet switching d. none of these

 End-to-end connectivity is provided from host-to-host in


a. network layer b. session layer c. data link layer d. transport layer

 Base band is
a. transmission of signals without modulation
b. a signal all of whose energy is contained within a finite frequency range.
c. the simultaneous transmission of data to a number of stations
d. all of the above

 The simultaneous transmission of data to a number of stations is known as


a. broad cast b. bandwidth c. Aloha d. analog transmission

 A distributed network configuration in which all data/information pass through a


central computer is
a. bus network b. star network c. duplex d. multiplex

 To connect a computer with a device in the same room, you might be likely to use
a. a coaxial cable b. a dedicated time c. a ground station d. all of the above

 Administrative supervision of database activities is the responsibility of the


a. data base administrator b. DP Manager c. DB Manager d. VP-DP administrator

 Which of the following component of a computer system is the most important to a data
base management system
a. mouse b. high resolution video display c. printer d. high speed, large capacity disk

 What is the serious problem(s) of file management systems?


a. data redundancy b. difficult to update c. program dependence d. All of the above

 Which of the following contains complete record of all activity that affected the contents of
a database during a certain period of time
a. master file b. transaction file c. report d. query file

 In a database, related fields are grouped to form


a. record b. file c. bank d. field group
100

 The purpose of an index is to provide........... To the file it is indexing


a. storage area b. access path c. name d. number
Page
 The database environment has all of the following components except
a. users b. separate files c. database d. database administrator

 Which of the following is an advantage of the database approach


a. elimination of data redundancy b. ability to associate related data c. increased security
d. All of the above

 When changes occur in a data item, if every file which contains that field are not be
updated then, it leads to
a. data redundancy b. data inconsistency c. data security d. data loss

 When the same data field is stored more than once in a file, then it leads to
a. data redundancy b. data inconsistency c. data dependency d. data independency

 Data security threats include


a. privacy invasion b. hardware failure c. fraudulent manipulation of data d. all of the above

 Updating a database means


a. revising a file structure b. reorganizing the database c. modifying or adding
records d. all of the above

 Firmware means
a. software b. hardware c. software available on hardware d. none of these

 For each instructions of program in memory the CPU goes through a


a. decode - fetch - execute sequence
b. execute - store - decode sequence
c. fetch - decode - execute sequence
d. fetch - execute - decode sequence

 Magnetic tape can serve as


a. input media b. output media c. secondary storage media d. all of the above

 Supercomputers are mainly useful for


a. mathematical intensive scientific applications
b. data-retrieval operations
c. input-output intensive processing
d. all of the above

 . ………………is the process of carrying out commands


(A) Fetching (B) Storing (C) Executing (D) Decoding (E) None of these

 The process of writing out computer instruction is known as


101

A. Assembling B. Compiling C. Debugging D. Executing E. Coding

 Which of the following controls the manner of interaction between the user and the
Page
operating system?
(A) User interface (B) Language translator(C) Platform (D) Screen saver(E) None of these

 The blocks of code, included in the operating system, that software applications interact
with are known as:
(A) Application programming interfaces (APIs). (B) Complimentary metal-
oxide conductors (CMOS) (C) Device drivers. (D) Bootstrap loaders

 A Spooler is a
(A) Location in memory that maintains the contents of a document until it prints out.
(B) Print job.
(C) Program that coordinates the print jobs that are waiting to print.
(D) Message sent from the printer to the operating system when a print job is completed

 Which of the following menu is called Drop-down Menu


A. Fly-but
B. Pop-up
C. Pull-down (more correct)
D. Cascading

 The issues that deal with the collection and use of data about individual is
A. Access
B. Publicity
C. Accuracy
D. Property
E. Privacy

 By default your document print in mode


A. Portrait
B. Landscape
C. Page Setup
D. Print View

 Numbers in table column are usually


A. Left aligned
B. Right aligned
C. Justified
D. Centered

 What disk is used to cold-boot a PC


A. Setup Disk
B. System Disk
102

C. Diagnostic Disk
D. Program Disk
E. None of these
Page
 The purpose of a swap (or page) file is to:
(A) Maintain pages of documents that are being spooled to the printer.
(B) Hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
(C) Prevent thrashing in a multitasking environment.
(D) Allow multiple print jobs to print their pages out simultaneously.

 The definition of thrashing is:


(A) Swapping data between virtual memory and RAM too frequently.
(B) Insufficient hard disk space.
(C) Too many processors being managed by the operating system.
(D) Inaccurate information stored in the registry

 Which of the following is the correct sequence of actions that takes place during the boot-
up process?
(A) Load operating system? Activate BIOS? Perform POST? Check configuration settings
(B) Activate BIOS? Perform POST? Load operating system? Check configuration
settings
(C) Perform POST? Load operating system? Activate BIOS? Check configuration settings
(D) Activate BIOS? Check configuration settings? Perform POST? Load operating system.

 Using Windows Explorer, a plus (+) sign in front of a folder indicates-


(A) An open folder.
(B) The folder contains subfolders.
(C) A text file.
(D) A graphics file

 All of the following are steps involved in the boot process EXCEPT:
(A) Load the operating system into RAM.
(B) The power-on self-test.
(C) Activate the basic input/output system (BIOS).
(D) Load application programs.

 The , stored on a ROM chip, is responsible for loading the operating


system from its permanent location on the hard drive into RAM.

(A) BIOS (B) API (C) device driver (D) supervisor program
103
Page
 Ensuring that the essential peripheral devices are attached and operational
is the process.

(A) configuration (B) CMOS (C) POST (power-on self-test) (D) ROM

 The memory resident portion of the operating system is called the


(A) Registry. (B) API. (C) CMOS. (D) Kernel.

 Which of the following does NOT occur during the power-on self-test (POST)?
(A) The Scandisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.

 All of the following are TRUE regarding virtual memory EXCEPT-


(A) Any amount of RAM can be allocated to virtual memory.
(B) The setting for the amount of hard drive space to allocate to virtual memory can
be manually changed.
(C) This temporary storage is called the swap file (or page file).
(D) Virtual memory is physical space on the hard drive

 The contains data descriptions and defines the name, data type, and length
of each field in the database.
(A) data dictionary (B) data table(C) data record (D) data field(E) None of these

 Granting an outside organization access to internet web pages is often implemented using
a(n)

(A) Extranet (B) intranet(C) internet (D) hacker (E) None of these

 Which term identifies a specific computer on the web and the main page of the entire site
(A) URL (B) Web site address(C) Hyperlink (D) Domain name (E) None of these

 Which of the following is NOT a type of broadband Internet connection?


(A) Cable (B) DSL(C) Dial-up (D) Satellite (E) None of these

 How many values can be represented by a single


byte? (A) 4 (B) 16(C) 64 (D) 256(E) 512

 Which of the following is the correct order of the four major functions of a computer?
A. Process Output Input Storage
104

B. Input Output Process Storage


C. Process Storage Input Output
D. Input Process Output Storage
Page
 Which of the following is used between CPU & RAM to speed up the processing power
of a CPU?
(A) Virtual Memory (B) DRAM(C) Flash Memory (D) Cache Memory (E) None of
these

  are specially designed computer chips that reside inside other devices, such
as your car or your electronic thermostat.
A. Servers B. Embedded computers C. Robotic computers D. Mainframes

 Memory in a PC is addressable through :


(A) Bits (B) Byte (C) Nibble (D) All of these (E) None of these

 In any computer installation, how many elements consists?


(A) 2 (B) 4 (C) 3 (D) 1 (E) None of these

 ENIAC stands for :


(A) Electrical Numerical Integrator and Calculator
(B) Electronic Numerical Integrator and Computer
(C) Electronic Numerical Integrator and Calculator
(D) Electronic Number Integrator and Calculator
(E) None of these

 The process of copying software programs from secondary storage media to the hard disk
is called
A. Configuration
B. Downloading
C. Storage
D. Uploading
E. Installation

 The time taken by CPU to retrieve and interpret the instruction to be executed is called as :
(A) Instruction cycle (B) Fetch cycle
(C) Both (A) & (B) (D) All of these
(E) None of these

 Which of the following tools is not normally used during systems analysis?
(A) Program Flow Chart (B) Grid Chart (C) System Flow Chart (D) Question Check-list
(E) none of these

 Internal memory in a CPU is nothing but :


(A) A set of registers (B) A set of ALU(C) Microprocessor (D) BUS (E) none of these

 Memory is made up of
105

(A) Set of wires (B) Set of circuits (C) Large number of cells (D) All of these

 When a key is pressed on the keyboard, which standard is used for converting the
Page
keystroke into the corresponding bits
(A)ANSI (B) ASCII (C) EBCDIC (D) ISOA

 Pixel is-
(A) A computer program that draws picture
(B) A picture stored in secondary memory
(C) The smallest resolvable part of a picture, also called Picture Element
(D) None of these

 Which of the following is not a valid size of a Floppy


Disk? (A) 8" (B) 5 1/4" (C) 3 1/2" (D) 5 1/2"

 Which technology is used in Compact disks (CD)?


(A) Mechanical (B) Electrical (C) Electro Magnetic (D) Laser (E) None of these

 The memory location address are limited to


(A) 00000 to 9ffff (16) (B) 00001 to 9ffff (16) (C) 00010 to 9ffff (16) (D) 10000 to 9ffff
(16)

 The unit KIPS is used to measure the speed of


A. Processor B. Disk drive C. Printer D. Tap Drive
 A term associated with the comparison of processing speed of different computer system is
A. EFTS B. MPG C. NIPS D. CPS E. None of these

 DTP (Desk Top Publishing) packages cannot do this


A. Graphic/Picture related utility B. Internet Connectivity C. Word Processing D.
Provide Print Utility

 Video Processors consists of & , which store and process image.


A. CPU, VGA B. CPU, Memory C. VGA, Memory D. VGI, DVI E. VGA, VGI

 To reload a web page, press the button.


A. Redo B. Reload C. Restore D. Ctrl E. Refresh

 When entering text within a document, the Enter Key is normally pressed at the end
of every
A. Line B. Sentence C. Paragraph D. Word E. File

 What refers to a set of characters of a particular design?


(A) Keyface (B). Formation (C) Calligraph (D). Stencil (E). Typeface
106

  is used by public & private enterprises to publish and share financial


information with each other and industry analysts across all computer platforms and the
Page

internet.
A. Extensible Markup Language (XML)
B. Extensible Business Reporting Language (XBRL)
C. Enterprise Application Integration (EAI)
D. Sales Force Automation (SFA)

 Your business has contracted with another company to have thorn host and run an
application for your company over the internet. The company providing this service to
your business is called an
A. Internet Service Provider
B. Internet Access Provider
C. Application Service Provider
D. Application Access Provider
E. Outsource Agency

 Companies use which of the following vendors to provide access to software and
services rather than purchasing the applications and maintaining the applications
themselves?
A. Open source vendors
B. Alliances
C. Application Service Provider
D. All of the above
E. None of the above

 Collecting personal information and effectively posing as another individual is known as


the crime of `
A. Spooling
B. Spoofing
C. Hacking
D. Phishing
E. Vishing

 Which of the following devices has a limitation that we can only read it but cannot erase
or modify it?
A. Tap Drive
B. Hard Disk
C. Compact Disk
D. Floppy Disk
E. None of these
107

 If an Excel Worksheet is to be linked for use in a PowerPoint Presentation, then


Page

which following should be clicked


A. Edit, Paste Special
B. Edit, Paste
C. Edit, Copy
D. File, Copy

 A uses pressure as a user press it with a stylus (a input device) to send signals.
A. Touchpad B. TrackPoint C. TrackPad D. Keyboard E. Graphics
Tablet

 The permanently etched program in ROM that automatically begins executing the
computers instructions is the
A. BIOS B. ROM C. CMOS D. RAM E. None of these

 Which type of software is distributed free (free version) but requires the user to pay
some amount for further use (full version by providing key)?
A. Freeware B. Malware C. Shareware D. Abandonware E. Public domain software

 Which of the following is not a type of computer software can be bought?


A. Off-the-shelf
B. Tailor-made
C. Custom-developed
D. Off-the-shelf with alteration
E. All of the above can be purchased

 A Tuple is a
A. Column of table
B. Two dimensional table
C. Row of table
D. Key of table
E. None of these

 A unit of hardware used to monitor computer processing is called


A. Terminal B. Console C. CPU D. Server E. Client

 Which of the following key is not on the number keypad?


A. Ctrl B. Del C. Enter D. Num Lock E. None of these

  is the act of unauthorized copying or downloading a program from a network


108

and making multiple copies of it to use for personal gain


A. Network Piracy
Page

B. Plagiarism
C. Software Piracy
D. Site-license Piracy
E. None of these

 The life span of a CD-ROM is Approx. year(s)


A. 1 B. 2 C. 3 D. 4 E.5

 What is an Embedded System?


A. A program that comes wrapped in a box
B. A program that is permanent part of a computer
C. A computer that is a part of a larger computer
D. A computer and software system that controls a machine or appliance
E. None of these

 Reusable optical storage will typically have acronym


A. CD B. DVD C. ROM D. RW E. ROS

ADDITIONAL 550 MCQs

1. A peer-to-peer LAN is an appropriate network architecture for____


(1) The Internet.
(2) Home network.
(3) Network requiring a server with shared resources.
(4) Wide area network
(5) None of these

2. Similar to a hub in an Ethernet network, a ____________ helps relay data between wireless
network nodes.
(1) Wireless port
(2) Wireless access point
(3) Wireless adapter
(4) Wireless transceiver
(5) None of these

3. Cell phones use ____________ to access the Internet.


(1) MMS technology
(2) A notation system
(3) Micro browser software
109

(4) HTML language


(5) None of these
Page
4. In CSMA/CD, the computer sends a fixed unit of data called a(n)_______
(1) Node.
(2) Packet.
(3) Override.
(4) Token.
(5) None of these

5. The uniform resource locator (URL) is case sensitive in the ____.


(1) Protocol
(2) Authority
(3) Directory
(4) Type
(5) None of these

6. ASCII is a(n)________
(1) Numbering system for representing numbers with decimals.
(2) Character representation standard common in older mainframe computers.
(3) Encoding standard used to represent letters and characters.
(4) Symbolic programming language that directly represents machine instructions.
(5) None of these

7. A global network made up of thousands of privately owned computers and networks is called
the:
(1) World Wide Web.
(2) Internet.
(3) Specialized search engine.
(4) Internet2.
(5) None of these

8. Which of the following is NOT a basic function of the operating system?


(1) Manage memory
(2) Provide the word processing system
(3) Start the computer
(4) Provide the user interface
(5) None of these

9. Which of the following scrambles a message by applying a secret code?


(1) Encryption
(2) Audits
(3) UPS
(4) Firewalls
(5) None of these
110

10. The Internet began with the development of


1) USENET
Page

2) ARPANET
3) Ethernet
4) Intranet
5) None of these

11. Website is a collection of ________


1) HTML documents
2) Graphic files
3) Audio and Video files
4) All of the above
5) None of these

12. Who designed the first electronic computer - ENIAC?


1) Van Neuman
2) Joseph M Jacquard
3) J presper Eckert
4) Both 1 and 2
5) None of these

13. Which of the following is not a network?


1) Local Area Network
2) Wide Area Network
3) Optical Fiber
4) All are networks
5) None of these

14. In MICR, C stands for?


1) Code
2) Color
3) Computer
4) Character
5) None of these

15. Which of the following is the largest unit of storage?


1) GB
2) KB
3) MB
4) TB
5) None of these

16. Virtual memory is?


1) Memory on the hard disk that the CPU uses an extended RAM
2) In RAM
3) Only necessary if you do not have any RAM in your computer
111

4) A backup device for floppy disks


5) None of these
Page
17. _______ is the process of finding errors in software code?
1) Compiling
2) Testing
3) Running
4) Debugging
5) None of these

18. What is the shortcut key to "Undo" the last action in a document?
1) Ctrl + X
2) Ctrl + Y
3) Ctrl + Z
4) Ctrl + U
5) None of these

19. The programs which are as permanent as hardware and stored in ROM is known as
1) Hardware
2) Software
3) Firmware
4) ROM ware
5) None of these

20. For creating a document, you use........ Command at File Menu.


1) Open
2) Close
3) New
4) Save
5) None of these

21. Computer uses the_________number system to store data and perform calculations.
1) Binary
2) Octal
3) Decimal
4) Hexadecimal
5) None of these

22............... is the process of carrying out commands


1) Fetching
2) Storing
3) Decoding
4) Executing
5) None of these

23. In word, when you indent a paragraph, you.............


112

1) Push the text in with respect to the margin


2) Change the margins on the page
Page

3) Move the text up by one line


4) Move the text down by one line
5) None of these

24. ASCII stands for.........


1) American Special Computer for Information Interaction
2) American Standard Computer for Information Interchange
3) American Special Code for Information Interchange
4) American Special Computer for Information Interchange
5) American Standard Code for Information Interchange

25. Which of the following is used by the browser to connect to the location of the Internet
resources?
1) Linkers
2) Protocol
3) Cable
4) URL
5) None of these

26. ……….is the process of dividing the disk into tracks and sectors.
(1) Tracking
(2) Formatting
(3) Crashing
(4) Allotting
(5) None of these

27. What is the permanent memory built into your computer called?
(1) RAM
(2) Floppy
(3) CPU
(4) CO-ROM
(5) ROM

28. Which computer memory is used for storing programs and data currently being processed by
the CPU?
(1) Mass memory
(2) Internal memory
(3) Non-volatile memory
(4) PROM
(5) None of these

29. Changing an existing document is called _____ the document.


1) Creating
2) Editing
113

3) Modifying
4) Adjusting
Page

5) None of these
30. What is backup?
1) Adding more components to your network
2) Protecting data by copying it from the original source to a different destination
3) Filtering old data from the new data
4) Accessing data on tape
5) None of these

31. What is a popular program for creating documents that can be read on both a PC and a
Macintosh computer?
(1) Microsoft Word
(2) Adobe In Design
(3) Adobe Acrobat
(4) QuarkXPress
(5) None of these

32. An image on a computer screen is made up of a matrix of what?


(1) Byte
(2) Pixels
(3) Bit
(4) Palette
(5) None of these

33. What does dots per inch (DPI) measure?


(1) Number of bits it takes to represent each color
(2) Density of the pixels on a computer screen
(3) The density of bits on a disk
(4) Density of graphic files stored on a hard disk
(5) None of these

34. What type of software creates a smaller file that is faster to transfer over the Internet?
(1) MPEG
(2) Unzipped
(3) Fragmentation
(4) Compression
(5) None of these

35. A unit of computer information that contains data as well as all the procedures or operations
is called:
(1) A method.
(2) Encapsulation.
(3) An object.
(4) An OOP
114

(5) None of these


Page

36. The world's first truly cross-platform programming language is called:


(1) C++.
(2) Java.
(3) Visual Basic.NET.
(4) Smalltalk.
(5) None of these

37. The most widely used type of database management system is the:
(1) Flat database.
(2) Network database.
(3) Relational database.
(4) Hierarchical database.
(5) None of these

38. What is the newest type of database, which is well suited for multimedia applications, called?
(1) Object-oriented database
(2) Client/server database
(3) Data warehouse
(4) Multimedia database
(5) None of these

39. What do the circles on a data flow diagram represent?


(1) Data sources and destinations
(2) Data flows
(3) Transformation processes
(4) Data stores
(5) None of these

40. The type of printer that prints by selectively unchanging static electricity from spots on a
metal drum is a(n):
(1) Plotter
(2) Dot-matrix printer
(3) Laser printer
(4) Ink-jet printer
(5) None of these

41. A warm boot in older versions of Windows is caused by:


(1) Typing the Alt+ Tab key combination
(2) Selecting Hibernate or Standby when shutting down
(3) Typing the Ctrl+ Alt+ Delete key combination
(4) Pressing the power switch
(5) None of these

42. Setting fonts for the text in your document is an example of:
115

(1) Formatting.
(2) Formulas.
Page

(3) Tracking changes.


(4) Tools.
(5) None of these

43. ____________ is the file system used by the operating system to identify the physical
locations of files on the hard drive.
(1) RTOS
(2) GIF
(3) FAT
(4) POST
(5) None of these

44. ___________software allows the user to speak into the computer rather than type in text.
(1) Speech recognition
(2) CHAT
(3) Message
(4) All of the above
(5) None of these

45. A server uses _________applications software to support its client computers.


(1) Back-end
(2) Front end
(3) Programming
(4) Java
(5) None of these

46. What does the XP stand for in Windows XP?


(1) Exponential
(2) Experience
(3) Expertise
(4) Exchange
(5) None of these

47. Which symbol is used in Excel to denote exponential numbers?


(1) *
(2) ^ (Correct Answer)
(3) &
(4) $
(5) None of these

48. Which of the following is NOT a source of viruses?


(1) Diskettes
(2) The Internet
(3) E-mail messages
116

(4) Computer networks


(5) None of these
Page
49. Which printer type is an impact printer?
(1) Page printers
(2) Laser printers
(3) Ink-jet printers
(4) Dot-matrix printers
(5) None of these

50. What type of software must to be used to translate scanned text into a format that can be
manipulated?
(1) OCR
(2) CRT
(3) RGB
(4) MIDI
(5) None of these

51. ―High Resolution‖ computer monitors will have_____


(1) High dpi
(2) Low dpi
(3) 256 colors
(4) Resolution is not measured in dpi
(5) None of these

52. A world wide web contains web pages ______


(1) Residing in many computers
(2) Created using HTML
(3) With links to other web pages
(4) Residing in many computers linked together using HTML
(5) None of these

53. Word processing, spreadsheet, and photo-editing are examples of________


(1) Application software
(2) System software
(3) Operating system software
(4) Platform software
(5) None of these

54. Retail employees typically use ____________ terminals to process sales transactions.
(1) Sales processing
(2) Transaction point
(3) Automatic teller
(4) Point of sale
(5) None of these
117

55. The primary purpose of a computer is to process _____________ and convert it into
information.
Page

(1) Electricity
(2) Data
(3) Raw material
(4) A bit
(5) None of these

56. The simultaneous processing of two or more programs by multiple processors is _____
(1) Multiprogramming
(2) Multitasking
(3) Time-sharing
(4) Multiprocessing
(5) None of these

57. Help Menu is available at which button?


(1) End
(2) Start
(3) Turnoff
(4) Restart
(5) Reboot

58. The……….folder retains copies of messages that you have started but are not yet ready to
send.
(1) Drafts
(2) Outbox
(3) Address Book
(4) Sent Items
(5) None of these

59. Which of the following statements is true?


(1) Microsoft Windows defines the operating environment standard for computers with Linux
processors
(2) Microsoft Windows defines the operating environment standard for computers with UNIX
processors
(3) Mac OS defines the operating environment standard for computers with Intel processors
(4) Microsoft Windows defines the operating environment standard for computers with
Intel processors
(5) None of these

60. The ___________ records the name and exact location of every file on a disk.
(1) Partition master
(2) File allocation table
(3) Disk controller
(4) Boot sector
(5) None of these
118

61. Inheritance is the ability of an object to pass on its characteristics to its ____________.
Page

(1) Subclasses
(2) off-spring
(3) Super classes
(4) Parents
(5) None of these

62. Which of the following activities is NOT a component of e-business?


(1) Collaboration with business partners
(2) Cash flow management
(3) Customer service
(4) Selling
(5) None of these

63. Which of the following extends data across networks rather than store it in one central site?.
(1) PIM
(2) File manager
(3) Distributed database
(4) Data mining program
(5) None of these

64. What is a serial port that adds a direct connection to a network?


(1) FireWire
(2) NIC
(3) USB
(4) Internal modem
(5) None of these

65. Which of the following is saved to noncontiguous clusters on a hard disk?


(1) Clustered file
(2) Defragmented file
(3) Sectored file
(4) Fragmented file
(5) None of these

66. What should be used if a company wants to include its company name and logo at the bottom
of every page of a brochure?
(1) Header
(2) Macro
(3) Footer
(4) Footnote
(5) None of these

67. ___________ is an event-driven programming language developed in the early 1990.


(1) C
119

(2) VB
(3) C++
Page

(4) Pascal
(5) None of these

68. Linux is a_____


(1) Utility program for peer-to-peer file sharing
(2) Real-time operating system
(3) Network operating system
(4) PDA platform
(5) None of these

69. The_________ runs the front-end applications software in a network.


(1) Client
(2) Database
(3) Server
(4) CPU
(5) None of these

70. Which of the following is used for close a tab on a browser?


(1) Ctrl + T
(2) Ctrl + W
(3) Ctrl + A
(4) Ctrl + Y
(5) None of these

71. What is RISC?


(1) Storage Device
(2) Computer Network
(3) Microprocessor
(4) Operating System
(5) None of these

72. NORTON is a ____


(1) Software
(2) Anti-Virus Program
(3) Network
(4) Program
(5) None of these

73. A program that converts high level language to machine Language is _______
(1) Linker
(2) Assembler
(3) Compiler
(4) All of the above
(5) None of these
120

74. Zip is a -----file.


Page

(1) Executable File


(2) Compressed File
(3) System File
(4) Combo
(5) None of these

75. At a time how many operating system can be at work on a computer?


(1) Only one (But we can install more than one OS in a system)
(2) Two
(3) Three
(4) Four
(5) None of these

76. Answer Sheets in bank PO‗s/Clerk‗s examinations are checked by using –


(1) Optical Character Reader
(2) Optical Mark Reader
(3) Magnetic ink Character Reader
(4) All of the above
(5) None of these

77. Image can be sent over telephone lines by using ------


(1) Larger bandwidth
(2) Fax
(3) Scanner
(4) Cable
(5) None of these

78. Which among the following is a Scientific Computer Language?


(1) BASIC
(2) COBOL
(3) FORTRAN
(4) PASCAL
(5) None of these

79. What is ―Oracle‖?


(1) A Co-ordination System
(2) Word Software
(3) Database Software
(4) All of the above
(5) None of these

80. IC Chip is made of -----.


(1) Silicon
(2) Nickel
121

(3) Iron
(4) Copper
Page

(5) None of these


81. At which place is India‗s Silicon Valley situated?
(1) Bangalore
(2) Hyderabad
(3) Chennai
(4) Kolkata
(5) None of these

82. A connection from one HTML document to another HTML document is called………...
(1) Hyper Link
(2) Connecting Link
(3) Icon
(4) All of these
(5) None of these

83. This device is used to connect your computer with a telephone line, so that can access
information from other servers and ordinary users too, said device is called ___________
(1) Modem
(2) Set Top Box
(3) LAN Card
(4) UPS
(5) None of these

84. Device on one network can communicate with devices on another network via_______
(1) File Server
(2) Utility Server
(3) Printer Server
(4) Gateway
(5) None of these

85. The screen background is known as the________


(1) Application
(2) Window
(3) Desktop
(4) Frames
(5) None of these

86. Which of the following is not an input device?


(1) Mouse
(2) Keyboard
(3) Light pen
(4) VDU (Note that Camera is a both Input and Output device)
(5) None of these
122

87. What are the units used to count the speed of a printer?
Page

(1) CPM
(2) DPI
(3) PPM
(4) BIT
(5) None of these

88. A computer that combines the characteristic of analog and digital computers_________
(1) Hybrid Computer
(2) Digital Computer
(3) Analog Computer
(4) Super Computer
(5) None of these

89. WORM stands for?


(1) Write Once Read Memory
(2) Wanted Once Read Memory
(3) Wanted Original Read Memory
(4) Write Original Read Memory
(5) None of these

90. Memory unit is a part of ______


(1) Input Device
(2) Control Unit
(3) Output Device
(4) Central Processing Unit
(5) None of these

91. Which of the following companies developed MS Office-2000?


(1) Novell
(2) Corel
(3) Lotus
(4) Microsoft
(5) None of these

92. What is the meaning of MICR‗?


(1) Magnetic Ink Character Recognition
(2) Magnetic Intelligence Character Recognition
(3) Magnetic Information Cable Recognition
(4) Magnetic Insurance Cases Recognition
(5) None of these

93. VIRUS stands for________


(1) Very Important Record User Searched
(2) Verify Interchanged Result Until Source
123

(3) Vital Information Resource Under Seize


(4) Very Important Resource Under Search
Page

(5) None of these


94. The technique that extends storage capacities of main memory beyond the actual size of the
main memory is called _______
(1) Multitasking
(2) Virtual storage
(3) Multiprocessing
(4) Multiprogramming
(5) Switching

95. ____________Command we can use to close the windows.


(1) Alt+ F1
(2) Alt+ S
(3) Alt+ End
(4) Alt+F4
(5) None of these

96. Algorithm is used -------


(1) To bring itself into desired state by its own action
(2) To perform logarithmic operations
(3) To describe a set of procedure by given result is obtained
(4) As a high level language
(5) None of these

97. FOXPRO is a ---------


(1) RDMBS
(2) DBMS
(3) Language
(4) All of the above
(5) None of these

98. Who is considered to the father of computers?


(1) John Bardeen
(2) Charles Babbage
(3) John Backus
(4) William Shockley
(5) None of these

99. Which of the following will connect you to the Internet?


(1) A Commercial online service
(2) An Internet service provider
(3) A network connection
(4) All of the above
(5) None of these
124

100. What software allows you to view internet sites?


Page

(1) A cyber café


(2) A browser
(3) A modem
(4) Your computer
(5) None of these

101. When more than one window is open, to switch to the next window — is the key
combination.
(1) CTRL+F5
(2) CTRL+F6
(3) CTRL+F7
(4) CTRL+F8
(5) None of these

102. Where are data and program stored when the processor uses them?
(1) Main memory
(2) Secondary memory
(3) Disk memory
(4) Program memory
(5) None of these

103. _______Represents raw facts, where- as.................is a meaningful data.


(1) Information, reporting
(2) Data, information
(3) Information, bits
(4) Records, bytes
(5) Bits, bytes

104. Saving is a process---


(1) To copy the document from memory to storage medium
(2) To bring change in present status of the document
(3) To change entire form
(4) All of the above
(5) None of these

105. PNG stands for________


(1) Potable Name Generator
(2) Portable Network Generator
(3) Printed Name Graphics
(4) Portable Network Graphics
(5) None of these

106. The maximum Zoom percentage in MS PowerPoint is________


(1) 100%
125

(2) 200%
(3) 400%
Page

(4) 500%
(5) None of these

107. The word FTP stands for________


(1) File Translate Protocol
(2) File Transit Protocol
(3) File Typing Protocol
(4) File Transfer Protocol
(5) None of these

108. Compiler in computer system is a_________


(1) Package
(2) System Software
(3) Process
(4) Application Software
(5) None of these

109. What is an intersection of a row and column in a spreadsheet?


(1) Formula
(2) Worksheet
(3) Address
(4) Cell
(5) None of these

110. What is the process of creating movement from still images?


(1) Transition
(2) Twining
(3) Bit-mapped graphic
(4) Animation
(5) None of these

111. A set of rules for creating markup languages that enables programming to capture specific
types of data by creating their own elements is called______
(1) XML
(2) HTML
(3) Ada
(4) XHTML
(5) None of these

112. Small plain text files that are written to your computer's hard disk by many of the Web sites
you visit are called_______
(1) RFIDs
(2) Web beacons
(3) GUIDs
126

(4) Cookies
(5) None of these
Page
113. Which of the following is the proper way to denote a cell in a spreadsheet?
(1) 5C
(2) C5
(3) 2-15
(3) C
(4) None of these

114. Which broadband service is the most available?


(1) C-able
(2) POTS
(3) Satellite
(4) DSL
(5) None of these

115. _________ is a set of rules computers use to talk to each other.


(1) Protocol
(2) Syntax
(3) DOS command
(4) HTML
(5) None of these

116. Which backup method only backs up files that have been modified since the last backup?
(1) Incremental backup
(2) Partial backup
(3) Selective backup
(4) Full backup
(5) None of these

117. Which type of transmission media is known as regular telephone wire?


(1) Wi-Fi
(2) Twisted-pair wire
(3) Fiber optic cable
(4) Coaxial cable
(5) None of these

118. What is the purpose of a firewall on a computer?


(1) To protect a computer from unauthorized access
(2) To protect a computer in case of fire
(3) To protect a computer from spam
(4) All of the above
(5) None of these

119. A disk's content that is recorded at the time of manufacture and that cannot be changed or
127

erased by the user is_______________


(1) Memory-only
Page

(2) Write-only
(3) Once-only
(4) Run-only
(5) Read-only

120. In word, you can change Page Margins by...........


(1) Dragging the scroll box on the scroll bars
(2) Deleting the margin boundaries on the Ruler
(3) Dragging the margin boundaries on the Ruler
(4) Clicking the right mouse button on the Ruler
(5) None of these

121. Which part of the computer helps to store information?


(1) Monitor
(2) Keyboard
(3) Disk - drive
(4) Printer
(5) Plotter

122. Which key is used to delete one character to the left of the current position of the cursor?
(1) Backspace
(2) Delete
(3) Insert
(4) Esc
(5) Ctrl

123. If you want to connect to your own computer through the Internet from another location,
you can use………………
(1) E-mail
(2) FTP
(3) Instant message
(4) Telnet
(5) None of these

124. A(n) ……….is a special visual and audio effect applied in Power-point to text or content.
(1) Animation
(2) Flash
(3) Wipe
(4) Dissolve
(5) None of these

125. Where does most data go first with in a computer memory hierarchy?
(1) RAM
(2) ROM
128

(3) BIOS
(4) CACHE
Page

(5) None of these


126. All of the following are examples of storage devices EXCEPT _______
(1) Hard disk drives
(2) Printers
(3) Floppy disk drives
(4) CD drives
(5) Pen drives

127. Select the Odd one_____


(1) Operating system
(2) Interpreter
(3) Compiler
(4) Assembler
(5) None of these

128. Which of the following is not an advantage of magnetic disk storage?


(1) The access time of magnetic disk is much less than that of magnetic tape
(2) Disk storage is longer lasting than magnetic tape
(3) Disk storage is less expensive than tape storage
(4) All of the above
(5) None of these

129. Perforated paper used as input or output media is known as_____


(1) Paper tape
(2) Magnetic tape
(3) Punched paper tape
(4) Card punch
(5) None of these

130. The first generation computer system used________


(1) Vacuum tubes
(2) Transistors
(3) Registers
(4) Magnetic cores
(5) Silicon chip

131. To access properties of an object, the mouse technique to use is _______


(1) Dragging
(2) Dropping
(3) Right-clicking
(4) Shift-clicking
(5) None of these
129

132. The ALU and Control Unit jointly known as_______


(1) RAM
Page

(2) ROM
(3) CPU
(4) PC
(5) None of these

133. Computers process data into information by working exclusively with ______
(1) Multimedia
(2) Words
(3) Characters
(4) Numbers
(5) None of these

134. COBOL stands for _______


(1) Common Business Oriented Language
(2) Computer Business Oriented Language
(3) Common Business Operated Language
(4) Common Business Organized Language
(5) None of these

135. What is the other name for programmed chip?


(1) RAM
(2) ROM
(3) LSIC
(4) PROM
(5) None of these

136. ___________ Store data temporarily and pass it on as directed by the control unit.
(1) Address
(2) Register
(3) Number
(4) Memory
(5) None of these

137. RAID stands for________


(1) Reproduce Array of Intelligent Disks
(2) Reproduce Array of Inexpensive Disks
(3) Redundant Array of Inexpensive Drives
(4) Redundant Array of Inexpensive Disks

138. Select the smallest memory size:-


(1) Terabyte
(2) Gigabyte
(3) Kilobyte
(4) Megabyte
130

(5) None of these


Page

139. In most Microsoft programs, what does 'Alt+F4' do?


(1) Ends the program
(2) Opens the program
(3) Run the program
(4) Modify the program
(1) None of these

140. A device that is used to transmit data from one location to another is known as ________
(1) Storage
(2) Memory
(3) Carrier
(4) All of the above
(5) None of these

141. Programs developed by an outside supplier and provided to the user in a machine readable
form is known as___________.
(1) Canned programs
(2) Beta program
(3) Alpha program
(4) All of the above
(5) None of these

142. Which of the following describe one or more characteristics of a modem computer?
(1) An electronic device
(2) A mechanical device
(3) An electro-mechanical device
(4) All of the above
(5) None of these

143. Octal number system has a base ______.


(1) Two
(2) Four
(3) Eight
(4) Ten
(5) None of these

144. PL 1 (Programming Language One) Is __________.


(1) High level programming language
(2) Low level programming language
(3) Machine language
(4) Assembly language
(5) None of these

145. Which of the following is a disadvantage of machine language?


131

(1) Machine Dependent


(2) Slower Execution
Page

(3) Machine Independent


(4) All of the above
(5) None of these

146. Android Operating system is an example of which kind of Source Model?


(1) Vertical Market Software
(2) Open Source
(3) Horizontal Market Software
(4) Shareware
(5) None of these

147. You can use the tab key to___________.


(1) Move a cursor across the screen
(2) Indent a paragraph
(3) Move the cursor down the screen
(4) Only ((1) and (2)
(5) None of these

148. Which process checks to ensure the components of the computer and operating are
connected properly?
(1) Booting
(2) Processing
(3) Saving
(4) Editing
(5) None of these

149. What is the correct association between a hardware component and a computer function?
(1) Monitor > input
(2) Mouse > input
(3) CPU > storage
(4) Hard disk > processing
(5) None of these

150. The sharing of a medium and its path by 2 or more devices is called ________.
(1) Modulation
(2) Encoding
(3) Line discipline
(4) Multiplexing
(5) None of these

151. The server on the internet is also known as ___________.


(1) Repeater
(2) Host
(3) Gateway
132

(4) AND Gate


(5) None of these
Page
152. A database management system (DBMS) is a__________.
(1) Hardware system used to create, maintain and provide controlled access to a data- base
(2) Hardware system used to create, maintain, and provide uncontrolled access to a database.
(3) Software system used to create, maintain, and provide uncontrolled access to a database.
(4) Software system used to create, maintain and provide controlled access to a database.
(5) None of these

153. Which of the following is an example of connectivity?


(1) Internet
(2) Floppy disk
(3) Power card
(4) Data
(5) None of these

154. What menu is selected to cut, copy and paste?


(1) File
(2) Tools
(3) Special
(4) Edit
(5) None of these

155. To save a document in different location use ______.


(1) Save
(2) Save as
(3) Save as web page
(4) All of above
(5) None of these

156. Programming language built into user programs such as Word and Excel are known as
_______.
(1) 4GLs
(2) Macro languages
(3) Object-oriented languages
(4) Visual programming languages
(5) None of these

157. Codes consisting of lines of varying widths or lengths that are computer-readable are known
as______.
(1) An ASCII code
(2) A magnetic tape
(3) An OCR scanner
(4) A bar code
(5) None of these
133

158. To reload a Web page, press the __________ button.


Page

(1) Redo
(2) Reload
(3) Restore
(4) Ctrl
(5) Refresh

159. Personal computers can be connected together to form a_______.


(1) Server
(2) Supercomputer
(3) Network
(4) Enterprise
(5) None of these

160. Which of the following is true?


(1) Byte is a single digit in a binary number
(2) Bit represents a grouping of digital numbers
(3) Eight-digit binary number is called a byte
(4) Eight-digit binary number is called a bit
(5) None of these

161. Which of the following can be used to select the entire document?
(1) CTRL+A
(2) ALT+F5
(3) SHIFT+A
(4) CTRL+K
(5) CTRL+H

162. A concentric circle on a disk is called a________


(1) Cylinder
(2) Track
(3) Head
(4) Sector
(5) None of these

163. DSL is an example of a(n) ____________ connection.


(1) Network
(2) Wireless
(3) Slow
(4) Broadband
(5) None of these

164. Instructions and data that are processed by the CPU are located in________
(1) CD-ROM
(2) RAM
134

(3) The hard disk


(4) The motherboard
Page

(5) None of these


165. All of the following are considered to be storage devices EXCEPT_______
(1) Floppy disk
(2) CPU
(3) CD
(4) Hard disk drive
(5) None of these

166. The commonly used UNIX commands like date, ls, cat etc. are stored in_________
(1) dev directory
(2) bin directory
(3) tmp directory
(4) unix directory
(5) None of these

167. A circuit with about 100 transistors fabricated on a single chip is called _____
(1) MCR
(2) MSI
(3) MIS
(4) RJE
(5) None of these

168. One megabyte equals approximately ___________


1) 1,000 bits
2) 1,000 bytes
3) 1 million bytes
4) 1 million bits
5) 2,000 bytes
169. A computer checks the _____ of user names and passwords for a match before granting
access.
(1) Website
(2) Network
(3) Backup file
(4) Data base
(5) None of these

170. Computers that are portable and convenient for users who travel are known as _____
(1) Super computers
(2) Lap tops
(3) Mini computers
(4) File servers
(5) None of these
135

171. What is the term for unsolicited e-mail?


(1) News group
Page

(2) Use net


(3) Backbone
(4) Flaming
(5) Spam

172. The _____ tells the computer how to use its components.
(1) Utility
(2) Network
(3) Operating system
(4) Application program
(5) None of these

173. When sending an e-mail, the _____ line describes the contents of the message.
(1) To
(2) Subject
(3) Contents
(4) CC
(5) None of these

174. The _____ key will launch the start buttons.


(1) Esc
(2) Shift
(3) Windows Or Ctrl + Esc
(4) Shortcut
(5) None of these

175. What is the ultimate purpose of Defragmentation?


(1) Make the PC faster
(2) Create More Free Space
(3) Delete temporary files
(4) Reduce Power consumption
(5) None of these

176. Which input device cannot be used to work in MS Office?


(1) Scanner
(2) Mouse
(3) Keyboard
(4) Joy stick
(5) Light pen

177............ Is a method in which multiple communication devices are connected to one another
efficiently.
(1) Switching
(2) Redundancy
136

(3) Capacity
(4) Detecting
Page

(5) None of these


178. ............. is a collection of web - pages and .......... is the very first page that we see on
opening of a website.
(1) Home page, Web page
(2) Website, Home page
(3) Web page, Home page
(4) Web page, Website
(5) None of these

179. What's considered the 'backbone' of the World Wide Web?


(1) URL
(2) HTML
(3) HTTP
(4) FTP
(5) None of these

180. SMTP stands for _________


(1) Simple Mail Transfer Protocol
(2) Serve Message Text Process
(3) Short Messaging Text Process
(4) Short Messaging Transfer Protocol
(5) None of these

181. Small application programs that run on a Web page and provide animation are known as
_________
(1) Flash
(2) Spiders
(3) Cookies
(4) Applets
(5) None of these

182. The errors that can be pointed out by the compiler known as ______.
(1) Syntax errors
(2) Semantic errors
(3) Logic errors
(4) System errors
(5) None of these

183. A _______ contains specific rules and words that express the logical steps of an algorithm?
(1) Syntax
(2) Programming structure
(3) Programming language
(4) Logic chart
137

(5) None of these


Page

184. A Proxy server is used for which of the following?


1) To provide security against unauthorized users
(2) To process client requests for web pages
(3) To provide TCP/IP
(4) To process client requests for database access
(5) None of these

185. Storage that retains its data after the power is turned off is referred to as?
(1) Volatile storage
(2) Non-volatile storage
(3) Sequential storage
(4) Direct storage
(5) None of these

186. Which term identifies main page of the entire site?


(1) URL
(2) Web site address
(3) Hyperlink
(4) Domain name
(5) None of these

187. A hard copy of a document is_________


(1) Stored in the hard disk
(2) Stored on a floppy
(3) Stored on a CD
(4) Printed on the printer
(5) None of these

188. Which is the part of a computer that one can touch and feel?
(1) Programs
(2) Software
(3) Hardware
(4) Output
(5) None of these

189. CPU stands for _________


(1) CD-run on memory
(2) Central processing unit
(3) Call powers up
(4) Create programs user
(5) None of these

190. Start or restart the computer known as _____________


(1) Exit
138

(2) Kick
(3) Boot
Page

(4) Kick-start
(5) None of these

191. This is not a function category in Excel ________


(1) Logical
(2) Data Series
(3) Financial
(4) Text
(5) None of these

192. The operating system that is self-contained in a device and resident in the ROM is ______
(1) Batch Operating System
(2) Real - time Operating System
(3) Embedded Operating System
(4) Multi Operating System
(5) None of these

193. To be able to 'boot', the computer must have a(n) ..........


(1) Compiler
(2) Loader
(3) Operating System
(4) Assembler
(5) None of these

194. On-line real time systems become popular in..........Generation.


(1) First Generation
(2) Second Generation
(3) Third Generation
(4) Fourth Generation
(5) None of these

195. ___________is the ability of a device to "jump" directly to the requested data.
(1) Sequential access
(2) Random access
(3) Quick access
(4) All of the above
(5) None of these

196............. is the combination of keys to switch between the last four places that you have
edited.
(1) ALT + CTRL + Z
(2) ALT + CTRL + Y
(3) ALT + TAB + Z
(4) ALT + SHIFT + Z
139

(5) None of these


Page

197. ............ is the functional key to display save-as box?


(1) F5
(2) F6
(3) F9
(4) F12
(5) None of these

198. Accessing data on tapes is much ....... than that accessing data on disks?
(1) Slower
(2) Faster
(3) Same
(4) All of the above
(5) None of these

199. Who amongst the following is called the father of modern computing?
(1) Charles Babbage
(2) Hollerith
(3) Gottfried von Leibnitz
(4) Joseph M. jacquard
(5) None of these

200. If you begin typing an entry into a cell and then realize that you don't want your entry
placed into a cell, you_________
(1) Press the Erase key
(2) Press Esc key
(3) Press the Enter button
(4) Press the Edit Formula button
(5) None of these

201. Superscript, subscript, outline, emboss, engrave are known as ______


(1) Font styles
(2) Font effects
(3) Word art
(4) Text effects
(5) None of these

202. What is object of UPS?


(1) Using for storage
(2) To increase the speed of a computer
(3) Provides backup power
(4) All of these
(5) None of these

203. Documents converted to .......... can be published to the Web.


140

(1) .Doc file


(2) Http
Page

(3) Machine language


(4) HTML
(5) None of these

204. Holding the mouse button down while moving an object or text is known as ___
(1) Moving
(2) Dragging
(3) Dropping
(4) Highlighting
(5) None of these

205. When was the first Windows operating system launched?


(1) 1984
(2) 1985
(3) 1988
(4) 1989
(5) 1990

206. What is the difference between a CD-ROM and a CD-RW?


(1) They are the same; just two different terms used by different manufacturers
(2) A D-ROM can be written to and a CD-RW cannot
(3) A CD-RW can be written to, but a CD-ROM can only be read from
(4) A CD-ROM holds more information than a CD-RW
(5) None of these

207. What happens when we try to delete the fries on the floppy?
(1) The files get moved to the Recycle Bin
(2) Files on a floppy cannot be deleted
(3) The files get deleted and can be restored again from Recycle Bin
(4) The files get deleted and cannot be restored again
(5) The file gets copied on the Hard disk

208. An educational institution would generally have the following in its domain name......
(1) .org
(2) .edu
(3) .inst
(4) .com
(5) .sch

209. POST stands for...........


(1) Power on Self Test
(2) Program on Self Test
(3) Power on System Test
(4) Program on System Test
141

(5) Power Off System Test


Page

210. Which of the following can input graphical images and pictures for a computer?
(1) Plotter
(2) Scanner
(3) Mouse
(4) Printer
(5) Keyboard

211. Which of the following categories would include a keyboard?


(1) Printing Device
(2) Output Device
(3) Pointing Device
(4) Storage Device
(5) Input Device

212. In Word you can force a page break…..


(1) By positioning your cursor at the appropriate place and pressing the F1 key
(2) By positioning your cursor at the appropriate place and pressing Ctrl +Enter
(3) By using the Insert/Section Break
(4) By changing the font size of your document
(5) None of these

213. LSTs (Large Integration) used in?


(1) First generation
(2) Second generation
(3) Third generation
(4) Fourth generation
(5) None of these

214. The purpose of an application program is to?


(1) Meet specific user needs
(2) Make equivalent run better
(3) Allow the operating system to control resources better
(4) Convert program written in high-level language to machine level language
(5) None of these

215. Hypertext is a _________


(1) Text stored in the memory of the computer
(2) Text displayed on the screen of the computer
(3) Special text used in developing Internet developing package
(4) A system of managing textual Information by creating associations between different
documents
(5) None of these

216. For running WINDOW minimum disk free space required is?
142

(1) 8 MB
(2) 10 MB
Page

(3) 16 MB
(4) 32 MB
(5) None of these

217. Which of the following printers generates character from a grid?


(1) Inkjet
(2) Laser
(3) Daisy wheel
(4) Dot matrix
(5) None of these

218. Accumulator is a _______


(1) Hardwired unit
(2) Sequential circuit
(3) Finite state machine
(4) Register
(5) None of these

219. _______Function key refreshes the current window.


(1) F5
(2) F6
(3) F7
(4) F8
(5) None of these

220. In 1983, this person was the first to offer a definition of the term 'computer virus'?
(1) MC Fee
(2) Smiths
(3) Frederick Cohen
(4) Norton
(5) None of these

221. To minimize all open windows and display the desktop?


(1) Windows logo +D
(2) Windows logo + E
(3) Windows logo + F
(4) Windows logo + G
(5) None of these

222. In MS-Word 'Alt + Shift + d' does what?


(1) Automatically inserts the date
(2) Inserts the time
(3) Inserts the day
(4) All of the above
143

(5) None of these


Page

223. ________ deletes an item immediately without placing it in the recycle bin.
(1) Shift +enter
(2) Shift +delete
(3) Shift +right arrow
(4) Shift +left arrow
(5) None of these

224. Which of the following is not a network topology?


(1) Star
(2) Bus
(3) Linear
(4) Ring
(5) None of these

225. A list of rules for transferring data over a network is called?


(1) Protocol
(2) Program code
(3) Rules
(4) Flowchart
(5) None of these

226. A table consists of_________


(1) Fields and columns
(2) Rows and columns
(3) Rows and cells
(4) All of the above
(5) None of these

227. What does 'Ctrl +Esc' do?


(1) Shows the start menu
(2) Shows the format menu
(3) Shows the tools menu
(4) Shows the insert menu
(5) None of these

228. A proxy server is used as the computer?


(1) With external access
(2) Acting as a backup
(3) Performing file handling
(4) Access user permissions
(5) None of these

229. Which of the following best defines embedded system?


(1) A program that comes wrapped in a box
144

(2) A program that is permanent part of a computer


(3) A computer that is a part of a larger computer
Page

(4) A computer and software system that controls a machine


(5) None of these

230. To see the document before the printout is taken, use.......


(1) Insert Table
(2) Paste
(3) Format Painter
(4) Cut
(5) Print Preview

231. Digital video consists of a series of_____


(1) Media clips
(2) Captures
(3) Frames
(4) Pictures
(5) None of these

232. The __________ is the smallest meaningful unit of data.


(1) Cell
(2) Field
(3) Application
(4) All of the above
(5) None of these

233. What are the four main aspects of data handling with a computer?
(1) Input, processing, output, and storage
(2) Comparing, dividing, sorting, and organizing
(3) Decision making, sorting, correcting, and mapping
(4) Adding, subtracting, multiplying, and dividing
(5) None of these

234. Most cash registers are now computers that are known as ____________ terminals.
(1) POS
(2) DS
(3) UDC
(4) UPC
(5) None of these

235. Which of the following is NOT an example of system maintenance?


(1) Replacing user interfaces
(2) Making backup copies of files
(3) Adding, deleting, adjusting records
(4) Providing system security
(5) None of these
145

236. Which of the following is the primary task of a NAS server?


Page

(1) Login authentication


(2) File sharing
(3) Internet access
(4) E-mail processing
(5) None of these

237. If you change Windows 98 to Windows XP, you are actually performing...........
(1) Upstart
(2) Upgrade
(3) Update
(4) Patch
(5) None of these

238. To make a copy of the current document to disk........


(1) Use the 'Save' command
(2) This cannot be done
(3) Use the 'duplicate' command
(4) Copy the document
(5) Use the 'save as' command

239. The main system board of a computer is called the..........


(1) Integrated circuit
(2) Motherboard
(3) Processor
(4) Microchip
(5) None of these

240. Your position in the text is shown by a..........


(1) Blinker
(2) Cursor
(3) Causer
(4) Pointer
(5) None of these

241. How many megabytes make a gigabyte?


(1) 1024
(2) 128
(3) 256
(4) 512
(5) 64

242. Using output devices one can............


(1) Input data
(2) Store data
146

(3) Scan data


(4) View or print data
Page

(5) None of these


243. Which contents are lost when the computer turns off?
(1) Storage
(2) Input
(3) Output
(4) Memory
(5) None of these

244. When you save to this, your data will remain intact even when the computer is turned off–
(1) RAM
(2) Motherboard
(3) Secondary storage device
(4) Primary storage device
(5) None of these

245. A central computer that holds collections of data and programs for many PCs, workstations,
and other computers is a(n) –
(1) Supercomputer
(2) Minicomputer
(3) Laptop
(4) Server
(5) None of these

246. The piece of hardware that converts your computer's digital signal to an analog signal that
can travel over telephone lines is called a–
(1) Red wire
(2) Blue cord
(3) Tower
(4) Modem
(5) None of these

247. When the pointer is positioned on a……….it is shaped like a hand.


(1) Grammar error
(2) Formatting error
(3) Screen Tip
(4) Spelling error
(5) Hyperlink

248. Mobile Commerce is best described as–


(1) The use of Kiosks in marketing
(2) Transporting products
(3) Buying and selling goods/services through wireless handheld devices
(4) Using notebook PC's in marketing
147

(5) None of the above


Page

249. Which of the following is a storage device that uses rigid, permanently installed magnetic
disks to store data/information–
(1) Floppy diskette
(2) Hard disk
(3) Permanent disk
(4) Optical disk
(5) None of these

250. Which of the following are advantages of CD-ROM as a storage media?


(1) CD-ROM is an inexpensive way to store large, amount of data and information
(2) CD-ROM disks retrieve data and information more quickly than magnetic disks do
(3) CD-ROMs make less errors than magnetic media
(4) All of the above
(5) None of these

251. A device, which is not connected to CPU, is called as.......


(1) Land-line device
(2) On-line device
(3) Off-line device
(4) Device
(5) None of the above

252. A computer program that converts an entire program into machine language at one time is
called a/ an ____
(1) Interpreter
(2) Simulator
(3) Compiler
(4) Numbers
(5) None of these

253. What is MS Word?


(1) A game
(2) An Operating System
(3)Word Processing Software
(4) Typing tutor software
(5) None of these

254. For Scientific work the most popular language is?


(1) PASCAL
(2) FORTRON
(3) COBOL
(4) PROLOG
(5)None of these
148

255. TCP stands for _______


(1) Transfer control protocol
Page

(2) Transfer control process


(3) Transmission control protocol
(4) Transmission control process
(5)None of these

256. The first graphical web browser are?


(1) Gopher
(2) WAIS
(3) CERN
(4) Mosaic
(5)None of these

257. Total memory of system can be known using?


(1) DIR commands
(2) MEM commands
(3) Warm boot
(4) TOT MEM commands
(5)None of these

258. The meaning of double-click is?


(1) Pushing and releasing the main mouse button twice in rapid succession when the on-
tree mouse pointer is positioned over the desired item
(2) Appearance of an icon
(3) To take a selection from the document and move it to the clipboard
(4) All of the above
(5) None of these

259. The term overflow means?


(1) An excess of Internal storage
(2) An excess of external storage
(3) A situation where record cannot fit in to its right place
(4) A device, which controls the level of humidity in the computer room
(5) None of these

260. The access time refers to


(1) Time required locating and retrieving stored data
(2) Time required locating the lost data
(3) Time required deleting specific data on a certain memory location
(4) All of the above
(5) None of these

261. Rotational delay time is also known as


(1) Seek time
(2) Shift time
149

(3) Latency
(4) Access time
Page

(5) None of these


262. Which memory is non-volatile and may be written only once?
(1) RAM
(2) EPROM
(3) EEPROM
(4) PROM
(5) None of these

263. Peer-to-peer is a description–


(1) Of communications between two dissimilar devices
(2) Of communications between two equal devices
(3) Of communications between two different devices
(4) All of the above
(5) None of these

264. Pascal is
(1) A high-level programming language
(2) Named after Blaise Pascal
(3) Named after mathematician that facilitates structured programming techniques
(4) All of the above
(5) None of these

265. Technique to implement virtual memory where memory is divided into units of fixed size
memory is–
(1) Paging
(2) De-fragments
(3) Segmentation
(4) All of the above
(5) None of these
266. An adder where all the bits of the two operands are added simultaneously–
(1) Parallel adder
(2) Half adder
(3) Full adder
(4) All of the above
(5) None of these

267. The point at which the flow of text in a document moves to the top of a new page–
(1) Page insert
(2) Page break
(3) Page format
(4) All of the above
(5) None of these
150

268. Multiprocessor is a computer system–


(1) Where many CPU under a common control
Page

(2) Consisting of more than one input devices under common control
(3) Where many output devices under
(4) All of the above
(5) None of these

269. Non-document files are–


(1) Pure ASCII files that can be listed for any word processing software
(2) Non ASCII files that can be listed for any word processing software
(3) Pure ASCII files that can be listed for specific word processing software
(4) Non ASCII files that can be listed for specific word processing software
(5) All of the above

270. Which of the Following is not a non-impact printer?


(1) Thermal printer
(2) Ink-jet printer
(3) Laser printer
(4) Dot-matrix printer
(5) All of the above

271. EDVAC stands for_______


(1) Electronic Discrete Variable Automatic Computer
(2) Electronic Discrete Value Automatic Computer
(3) Electronic Device Variable Automatic Computer
(4) Electronic Discrete Variable Advanced Computer
(5) None of these

272. When a file is saved for the first time-_______


(1) A copy is automatically printed
(2) It must be given a name to identify it
(3) It does not need a name
(4) It only needs a name if it is not going to be printed
(5) None of these

273. The computers which are relatively rare because of their cost and size are:
(1) Mini Computers
(2) Micro Computers
(3) Super Computers
(4) Laptops
(5) Mainframe Computer

274. A mistake in an algorithm that causes incorrect results is called a.......


(1) Logical error
(2) Syntax error
(3) Machine Error
151

(4) Compiler error


(5) None of these
Page
275. A(n) .... Program is one that is ready to run and does not need to be altered in any way.
(1) Interpreter
(2) High-level
(3) Compiler
(4) COBOL
(5) Executable

276. A set of step-by-step procedures for accomplishing a task is known as a(n)—


(1) Algorithm
(2) Hardware program
(3) Software bug
(4) Firmware program
(5) None of these

277. The main directory of a disk is called the………directory.


(1) Root
(2) Sub
(3) Folder
(4) Network
(5) None of these

278. A………is a collection of data that is stored electronically as a series of records in a table.
(1) Spreadsheet
(2) Presentation
(3) Database
(4) Web page
(5) None of these

279. As you create documents, graphs and pictures your computer holds the data in—
(1) Restore file
(2) Backup drive
(3) Clip board
(4) Memory
(5) None of these

280. All are included in removable media except the following—


(1) CD-ROMs
(2) Diskette
(3) DVDs
(4) High disk drive
(5) None of these

281. ………processing is used when a large mail-order company accumulates orders and
152

processes them together in one large set.


(1) Batch
Page

(2) Online
(3) Real-time
(4) Group
(5) None of these

282. Computer programs are written in a high-level programming language; however, the human
readable version of a program is called—
(1) Cache
(2) Instruction set
(3) Source code
(4) Word size
(5) None of these

283. What happens if you press Ctrl + Shift + F8?


(1) It activates extended selection
(2) It activates the rectangular selection
(3) It selects the paragraph on which the insertion line is.
(4) None of above
(5) All the above

284. Which of the following is not valid version of MS Office?


(1) Office XP
(2) Office Vista
(3) Office 2007
(4) None of above
(5) None of these

285. What is the short cut key to open the Open dialog box in Ms word?
(1) F12
(2) Shift F12
(3) Alt + F12
(4) Ctrl + F12
(5) None of these

286. How can you disable extended selection mode?


(1) Press F8 again to disable
(2) Press Del to disable
(3) Press Esc to disable
(4) Press Enter to disable
(5) None of these

287. Auto Calculate will quickly add selected cells if you…..


(1) Right click on the status bar and select Sum
(2) Click the Auto Calculate button on the toolbar
153

(3) Use the key combination Ctrl+$


(4) Double click the selection
Page

(5) None of the above


288. You can add a hyperlink to your worksheet by pressing
(1) Alt + K
(2) Ctrl + H
(3) Ctrl + K
(4) Ctrl + Shift + K
(5) None of the above

289. __________are 'attempts by individuals to obtain confidential information from you by


falsifying their identity.
(1) Phishing
(2) Computer viruses
(3) Spyware scams
(4) Viruses
(5) None of the above

290. Which of the following is the fastest type of computer?


(1) Laptop
(2) Notebook
(3) Personal computer
(4) Workstation
(5) Supercomputer

291. Which of the following is not a term pertaining to the Internet?


(1) Keyboard
(2) Link
(3) Browser
(4) Search Engine
(5) Hyperlink

292. The operating system that is self-contained in a device and resident in the ROM is.......
(1) Batch Operating System
(2) Real - time Operating System
(3) Embedded Operating System
(4) Multi Operating System
(5) None of these

293. The computer abbreviation KB usually means–


(1) Key Block
(2) Kernel Boot
(3) Key Byte
(4) Kit Bit
(5) Kilo Byte
154

294. .......... is the key to close a selected drop - down list; cancel a command and close a dialog
Page

box.
(1) TAB
(2) SHIFT
(3) ESC
(4) F10
(5) None of these

295. Which of the following is NOT one of the four major data processing functions of a
computer?
(1) Gathering data
(2) Processing data into information
(3) Analyzing the data or information
(4) Storing the data or information
(5) None of these

296. The CPU and memory are located on the:


(1) Expansion board
(2) Motherboard
(3) Storage device
(4) Output device
(5) Display board

297. A ............ is an additional set of commands that the computer displays after you make a
selection from the main menu
(1) Dialog box
(2) Submenu
(3) Menu selection
(4) All of the above
(5) None of these

298. A letter, memo, proposal or other file that is created using Microsoft Word is called as?
(1) Master
(2) Slide
(3) Document
(4) Worksheet
(5) None of these

299. Which of the following are parts of the CPU?


(1) Secondary Memory
(2) Control unit
(3) Input device
(4) Printer
(5) None of these
155

300. Which is not the portable computer?


(1) Micro-processor
Page

(2) Calculator
(3) Series Computes
(4) Parallel Computers
(5) None of these

301. The ROM chip which can be rewritten several times and requires the action of ultraviolet
radiations to erase its contents is________
(1) Flash memory
(2) PROM
(3) EEPROM
(4) EPROM
(5) None of these

302. FPI stands for____


(1) Faults per inch
(2) Frames per inch
(3) Figure per inch
(4) Film per inch
(5) None of these

303. A terabyte comprises


(1) 1024 gigabyte
(2) 1024 kilobyte
(3) 1024 megabyte
(4) 1024 byte
(5) None of these

304. The memory which is utmost accessible to the processor is_____


(1) Cache memory
(2) RAM
(3) Hard disk
(4) Flash memory
(5) None of these

305. In which kind of disk does the read/write head physically touches the surface?
(1) Hard Disk
(2) Compact Disk
(3) Floppy Disk
(4) All of the above
(5) None of these

306. What is the correct syntax for typing a function into a cell?
(1) Equal sign, Function Name, Matching brackets
(2) Function Name, Equal sign, Matching brackets
156

(3) Equal sign, Matching brackets, Function Name


(4) None of the above
Page

(5) None of these


307. If you see a small red triangle in the top right corner of a cell, it means there is something
attached to the call. What is it?
(1) A comment
(2) An attachment
(3) An error
(4) None of the above
(5) None of these

308. Cache memory is–


(1) Smaller and faster than main storage
(2) Bigger and slower than main storage
(3) Smaller but slower than main memory
(4) Bigger and faster than main memory
(5) None of these

309. The overall design, construction, organization and interconnecting of the various
components of a computer system is referred as–
(1) Computer Architecture
(2) Computer Flowchart
(3) Computer Algorithm
(4) All of the above
(5) None of these

310. BIOS are responsible for


(1) Handling the particulars of input/output operations
(2) Output operations
(3) Input operations
(4) All of the above
(5) None of these

311. BISYNC is an abbreviation for–


(1) Binary Input/Binary Output
(2) Binary synchronous
(3) Binary digit
(4) All of the above
(5) None of these

312. A process of trying out a new product by independent users before it is finally
manufactured/developed–
(1) Alpha test
(2) Beta Test
(3) Gamma test
157

(4) All of the above


(5) None of these
Page
313. An E-mail protocol for storage, management and change, especially in corporate offices–
(1) Message handling service
(2) Postal service‗s
(3) Data storage
(4) All of the above
(5) None of these

314. Password is–


(1) Code by which a user gains access to a computer system
(2) Pass for viewing movie
(3) Entrance without paying something
(4) All of the above
(5) None of these

315. The technique where digital signals are converted to its analog form for transmission over
an analog facility is called–
(1) Modulation
(2) Digitization
(3) Multiprocessing
(4) All of the above
(5) None of these

316. Narrowband channel is a communication channels–


(1) That handles low volumes of data
(2) Used mainly for telegraph lines and low speed terminals
(3) Both (1) and (2)
(4) All of the above
(5) None of these

317. MIME is an acronym for....


(1) Multiprogramming Internet Mail Extension
(2) Multicasting Internet Mail Extension
(3) Multiple Internet Mail Extension
(4) Multipurpose Internet Mail Extension
(5) None of these

318. The........... Settings are automatic and standard.


(1) Default
(2) CPU
(3) Peripheral
(4) User-friendly
(5) None of these
158

319. Pop-ups are a form of ________on the World Wide Web?


(1) Instant Messaging
Page

(2) Search Engines


(3) Browsers
(4) Mark-up Languages
(5) Online Advertising

320. Which of the following is true about Operating System?


(1) It is an interface between user and the computer.
(2) It manages all resources
(3) It does all Memory management and Process management tasks
(4) All are true
(5) None of these

321. All formula in Excel start with


(1) %
(2) +
(3) = (Equal sign)
(4) –
(5) None of the above

322. Which of the following displays the contents of the active cell?
(1) Active cell
(2) Formula bar
(3) Menu bar
(4) Name box
(5) None of the above

323. Tab scrolling buttons


(1) Allow you to view a different worksheet
(2) Allow you to view additional worksheet row down
(3) Allow you to view additional worksheet columns to the right
(4) Allow you to view additional sheet tabs
(5) None of the above

324. What is the keyboard shortcut for creating a chart from the selected cells?
(1) F3
(2) F5
(3) F7
(4) F11
(5) None of the above

325. You cannot close MS Word application by


(1) Choosing File menu then Exit submenu
(2) Press Alt+F4
(3) Click X button on title bar
159

(4) From File menu choose Close submenu


(5) None of these
Page
326. Which file starts MS Word?
(1) Winword.exe
(2) Word.exe
(3) Msword.exe
(4) Word2003.exe
(5) None of these

327. Where can you find the horizontal split bar on MS Word screen?
(1) On the left of horizontal scroll bar
(2) On the right of horizontal scroll bar
(3) On the top of vertical scroll bar
(4) On the bottom of vertical scroll bar
(5) None of these

328. One of the functions of the arithmetic logic unit is to:


(1) Receive data from the registers
(2) Convert negative numbers to hexadecimal code
(3) Send logical operations, such as AND or NOT, to the alphabetic unit
(4) Retrieve data from virtual memory
(5) None of these

329. What is defined as the number of bits that the CPU processes as a unit?
(1) A computer sentence
(2) A computer word
(3) A computer phrase
(4) A computer term
(5) None of these

330. _________ Systems use a light beam to scan input data and convert it into electrical signals,
which are sent to the computer for processing.
(1) Image recognition
(2) Optical recognition
(3) PDF
(4) Application
(5) None of these

331. _________ Devices accept the spoken word through a microphone and convert it into
binary code that can be understood by the computer.
(1) Speech recognition
(2) Handwriting recognition
(3) Peripheral
(4) All of the above
(5) None of these
160

332. Name the technique of processing transactions in random order.


Page

(1) Transaction processing


(2) Batch processing
(3) Offline processing
(4) Sequential file processing
(5) None of these

333. _________ Means that a transaction is processed fast enough for the result to come back
and be acted upon right away.
(1) Real-time processing
(2) Records processing
(3) Batch processing
(4) All of the above
(5) None of these

334. _________ uses an area of memory to temporarily store data from disk that the program
might need soon.
(1) Data transferring
(2) DVD
(3) Disk caching
(4) All of the above
(5) None of these

335. What is a device that prevents electrical problems from affecting computer data files?
(1) An incremental backup
(2) A full backup
(3) A surge protector
(4) A differential backup
(5) None of these

336. What is any text that can be keyed in, such as a memo?
(1) A database
(2) A spreadsheet
(3) A text document
(4) A business presentation
(5) None of these

337. What type of program lets you produce professional-looking documents containing both
text and graphics?
(1) A page composer
(2) A thesaurus
(3) A desktop publisher
(4) A speller checker
(5) None of these
161

338. The letter and number of the intersecting column and row is the:
(1) Cell coordinates
Page

(2) Cell location


(3) Cell position
(4) Cell address
(5) None of these

339. What is the standard query language supported by most DBMSs?


(1) Object-oriented language
(2) Report generator language
(3) Structured Query Language (SQL)
(4) Query-by-example (QBE)
(5) None of these

340. Which of the following are three fundamental characteristics that make a computer useful?
(1) Lightweight, inexpensive, and sturdy
(2) Speed, reliability, and storage capability
(3) Durable, connectible, and renewable
(4) All of the above
(5) None of these

341. Which of the following is an appropriate use of groupware?


(1) A top-secret project
(2) A highly classified project
(3) An individual employee project
(4) A team project
(5) None of these

342. Software used for database management can store data, update it, __________ it, retrieve it,
report it, and print it.
(1) Manipulate
(2) Download
(3) See
(4) All of the above
(5) None of these

343. Which of the following is NOT a function of an operating system?


(1) Executing and providing services for applications software
(2) Managing the computer‗s resources
(3) Establishing a user interface
(4) Formatting a word document
(5) None of these

344. Which of the following helps describe the Windows .NET Server?
(1) It is designed for different levels of network complexity.
(2) It is a direct upgrade from Windows NT.
162

(3) It is designed to replace Novell‗s Netware.


(4) It has limited complexity.
Page

(5) None of these


345. The process of analyzing large data sets in search of new, previously undiscovered
relationships is known as:
(1) Data mining
(2) Data marting
(3) Data maintenance
(4) Data warehousing
(5) None of these

346. The focus of the first phase of the systems development life cycle is to:
(1) Design what the new system should do
(2) Analyze and document the existing system
(3) Identify problems and opportunities
(4) Implement the new system
(5) None of these

347. Which of the following is a network in which computers are located physically close
together, often in the same building?
(1) WAN
(2) PAN
(3) MAN
(4) LAN
(5) None of these

348. What is a modulator/demodulator that is connected to a circuit board or motherboard?


(1) Fax modem
(2) Network Interface Card (NIC)
(3) Internal modem
(4) External modem
(5) None of these

349. What kind of server converts IP addresses to domain names?


(1) File
(2) DNS
(3) Email
(4) P2P
(5) None of these

350. In the OSI model, the actual transmission of data is handled in the ____________ layer.
(1) Data link
(2) Physical
(3) Network
(4) Transport
163

(5) None of these


Page

351. Which of the following is NOT true about laptop computers?


(1) They are typically more expensive than desktops.
(2) They are typically more expensive than desktops.
(3) They often have fewer components than PCs.
(4) They cannot be connected to a PC.
(5) None of these

352. On a CD-RW you can


(1) Read and write information
(2) Only read information
(3) Only write information
(4) Read, write and rewrite information
(5) None of these

353. In computer terminology, information means


(1) Raw data
(2) Data in more useful
(3) Alphanumeric data
(4) Program
(5) None of these

354. After a picture has been taken with a digital camera and processed appropriately, the actual
print of the picture is considered
(1) Data
(2) Input
(3) Output
(4) The process
(5) None of these

355. What is output?


(1) What the processor takes from the user
(2) What the user gives to the processor
(3) What the processor gets from the user
(4) What the processor gives to the user
(5) None of these

356. What is the main difference between a mainframe and a super computer?
(1) Super computer is much larger than mainframe computers
(2) Super computers are much smaller than mainframe computers
(3) Supercomputers are focused to execute few programs as fast as possible while
mainframe uses its power to execute as many programs concurrently
(4) Supercomputers are focused to execute as many programs as possible while mainframe uses
its power to execute few programs as fast as possible
(5) None of these
164

357. Programs such as Mozilla Firefox that serve as navigable windows into the Web are
Page

called..........
(1) Hypertext
(2) Networks
(3) Internet
(4) Web browsers
(5) None of these

358. What is the function of Recycle Bin?


(1) Store deleted file
(2) Store temporary file
(3) Store corrupted file
(4) Store Document file
(5) None of these

359. Which device cannot be shared in network?


(1) Floppy
(2) Keyword
(3) Computer
(4) Printer
(5) None of these

360. A right click on the desktop itself will........


(1) Open the Display Properties dialog box
(2) Show a context - sensitive menu
(3) Open the Control Panel
(4) Minimize all open applications
(5) None of these

361. The advantage of using a spreadsheet is:


(1) Calculations can be done automatically.
(2) Changing data automatically updates calculations
(3) More flexibility
(4) All of the above
(5) None of the above

362. Documentations should include


(1) Destination and users of the output data
(2) Source of input data
(3) Information on the purpose of the workbook
(4) All of above
(5) None of the above

363. To edit the selected cell in ms excel-


(1) Press F1
165

(2) Press F2
(3) Press F4
Page

(4) Press F5
(5) None of these

364. You can convert existing Excel worksheet data and charts to HTML document by using the
(1) FTP Wizard
(2) Internet Assistant Wizard
(3) Intranet Wizard
(4) Import Wizard
(5) None of the above

365. Which of the following is graphics solution for Word Processors?


(1) Clipart
(2) WordArt
(3) Drop Cap
(4) All of above
(5) None of the Above

366. You can detect spelling and grammar errors by-


(1) Press Shift + F7
(2) Press Ctrl + F7
(3) Press Alt+ F7
(4) Press F7
(5) None of the Above

367. What is the shortcut key to Indent the paragraph in MS word?


(1) Ctrl + M
(2) Ctrl + P
(3) Shift + M
(4) Ctrl + I
(5) None of these

368. Which of the following storage media provides sequential access only?
(1) Floppy disk
(2) Magnetic disk
(3) Magnetic tape
(4) Optical disk
(5) None of these

369. What is the storage area for e-mail messages called?


(1) A folder
(2) A directory
(3) A mailbox
(4) The hard disk
(5) None of these
166

370. The set of parallel electrical conducting lines through which different components on the
Page

mother board of a PC unit are linked together are called:


(1) Conductors
(2) Buses
(3) Slide Master
(4) Consecutives
(5) None of these

371. A PDA's memory contents remain intact when it is turned off because:
(1) A battery keeps current available for RAM
(2) The memory contents are synchronized with a desktop
(3) The memory contents are copied to flash cards
(4) The memory contents are stored in ROM
(5) None of these

372. A network of geographically distant computers and terminals is called a-


(1) Integrated Services Digital Network (ISDN)
(2) Metropolitan area network (MAN).
(3) Wide area network (WAN)
(4) Local area network (LAN)
(5) None of these

373. One byte represents:


(1) Eight characters
(2) Eight bits
(3) A single digit with two possible states
(4) A word
(5) None of these

374. Saving files in HTML format:


(1) Makes it possible for anyone to view the file in a Web browser
(2) Increases file conversion costs
(3) Decreases software compatibility
(4) All of the above
(5) None of these

375. Which of the following would NOT be performed with application software?
(1) Financial report sent to investors
(2) Hard disk cleanup
(3) Charts for a sales meeting presentation
(4) Customer list used for mailing invoices
(5) None of these

376. Which of the following statements is TRUE about the public switched telephone network
(PSTN)?
167

(1) PSTN is a packet-switching network


(2) PSTN is comprised of a variety of physical media, including twisted pair and fiber optic
Page

cable
(3) PSTN is exclusively a digital network system
(4) PSTN is only used for voice transmissions, while the Internet is used for data transmissions
(5) None of these

377. Which of the following best describes the difference between the Internet and the World
Wide Web?
(1) The Internet is the collection of computers, while the World Wide Web is the wiring and
transmission protocols that connect them
(2) The Internet carries traffic for schools, government offices, and other public organizations,
while the World Wide Web carries commercial traffic
(3) The Internet consists of software programs such as e-mail and IRC, while the World Wide
Web is a collection of Web pages
(4) The Internet is the physical network of global computers, while the World Wide Web is
many hypertext documents distributed globally over many computers
(5) None of these

378. Which of the following runs on a user's local computer and is used to request and display
Web pages?
(1) FTP
(2) Web browser
(3) Web server
(4) HTML
(5) None of these

379. Which of the following computer types is most powerful?


(1) Professional workstation
(2) Internet appliance
(3) Desktop computer
(4) Network computer
(5) None of these

380. Which of the following is the most frequently used input device?
(1) Microphone
(2) Scanner
(3) Touch screen
(4) Mouse
(5) None of these

381. A modem is necessary if you want to-


(1) Add a scanner to your computer system
(2) Have voice mail added to your regular telephone service
(3) Connect to other computers or to the Internet using phone line, cable, or wireless
connections.
168

(4) Display digital camera photographs on your computer screen


(5) None of these
Page
382. MS Excel is a?
(1) Window based word processor package
(2) Window based spreadsheet package
(3) DOS based spreadsheet package
(4) Window based accounting package
(5) None of these

383. What is the flow of data between countries commonly called?


(1) International information system
(2) EDI
(3) Outsourcing
(4) Trans border data flow
(5) None of these

384. Which of the following is NOT a purpose of antivirus programs?


(1) Remove any identified viruses
(2) Copy the name of the virus and send it to Microsoft for inspection
(3) Notify a user if a virus is found
(4) Search for viruses
(5) None of these

385. <H1> is an example of _____.


(1) HTML
(2) GML
(3) SGML
(4) NSGML
(5) None of these

386. Which type of network requires HPNA adapters for communication between network
nodes?
(1) Phone line
(2) Wireless
(3) Power line
(4) Ethernet
(5) None of these

387. To analyze vast quantities of scientific data and display underlying patterns, you would use
a:
(1) Mainframe
(2) Server
(3) Supercomputer
(4) Minicomputer
(5) None of these
169

388. The free, open-source operating system that is becoming popular is:
Page

(1) Mac OS X
(2) Microsoft Windows XP
(3) UNIX
(4) Linux
(5) None of these

389. What term is used to describe software that monitors your online computer activities?
(1) Snooper ware
(2) Spyware
(3) Tracker ware
(4) Travel ware
(5) None of these

390. Which of the following is a memory management technique that makes the random access
memory appear larger than it is?
(1) Byte mapping
(2) Preemptive multitasking
(3) Read-only memory
(4) Virtual memory
(5) None of these

391. The two major components of system software are:


(1) The operating system and system utilities
(2) Application software and system utilities
(3) Primary memory and storage
(4) The operating system and applications software
(5) None of these

392. Which of the following may be necessary for you to do after you install new application
software?
(1) Turn the computer power switch off and then back on
(2) Do a cold boot
(3) Press Shift + Alt + Del
(4) Do a warm boot
(5) None of these

393. The power-on self-test (POST)----------------


(1) Checks for upgrades to the application software
(2) Verifies that the computer hardware is working properly
(3) Is able to provide easy-to-follow on-screen instructions to correct hardware problems
(4) Is conducted after the BIOS instructions are placed in memory
(5) None of these

394. Input, processing, output, and storage are collectively referred to as:
170

(1) The systems cycle


(2) The information processing cycle
Page

(3) The system unit


(4) Communication
(5) None of these

395. Which of the following is NOT part of the motherboard?


(1) System clock
(2) Connector
(3) CPU
(4) Chipset
(5) None of these

396. An example of a wireless medium that sends data through the air or space is:
(1) Fiber-optic cable.
(2) Coaxial cable.
(3) Twisted pair.
(4) Microwaves.
(5) None of these

397. To reverse the effect of your last action in word ------------


(1) Use the cut command
(2) Use the Undo command
(3) Press the delete key
(4) Use the Redo command
(5) None of these

398. Information that comes from an external source and fed into computer software is
called................
(1) Output
(2) Input
(3) Throughput
(4) Reports
(5) None of these

399. The basic unit of a worksheet into which you enter data in Excel is called a–
(1) Tab
(2) Box
(3) Range
(4) Cell
(5) None of these

400. All of the following are examples of real security and privacy risks EXCEPT
(1) Hackers
(2) Viruses
(3) Spam
171

(4) Identity theft


(5) None of these
Page
401. Which of the following is not an example of hardware?
(1) Scanner
(2) Printer
(3) Monitor
(4) Mouse
(5) Interpreter

402. In Excel, this is a prerecorded formula that provides a shortcut for complex
calculations.........
(1) Value
(2) Data Series
(3) Function
(4) Field
(5) None of these

403. The process of trading goods over the Internet is known as..............
(1) e-selling-n-buying
(2) e-trading
(3) e-finance
(4) e-salesmanship
(5) e-commerce

404. A device that connects to a network without the use of cables is said to be–
(1) Distributed
(2) Free
(3) Centralized
(4) Open source
(5) None of these

405. Which of the following is a circuit that issue signals at regular intervals..........?
(1) Circuit board
(2) Clock
(3) Circuit card
(4) Gates
(5) None of these

406. A set of related programs are known as-------------


(1) File
(2) Arrays
(3) Package
(4) Subscripts
(5) None of these
172

407. The 0 and 1 in the binary numbering system are called binary digits or……....
(1) Bytes
Page

(2) Kilobytes
(3) Decimal bytes
(4) Bits
(5) Nibbles

408. The 7-bit ASCII code widely used


(1) For data communication work
(2) In IBM mainframe models
(3) For coding external memory
(4) In large machines produced by non-IBM vendors
(5) None of the above

409. A hard copy would be prepared on a


(1) Line printer
(2) Dot matrix printer
(3) Type writer terminal
(4) Plotter
(5) All of the above

410. Which of the following animations cannot be done in PowerPoint?


(1) Bullet list, revealed one bullet point at a time
(2) Clip art - Fly in from the bottom
(3) Table, revealed row by row
(4) Chart, revealed by series
(5) None of these

411. Several views are available in MS Front Page. Which one of the following is NOT a valid
view?
(1) Design View
(2) Folders View
(3) Navigation View
(4) Web Server View
(5) None of these

412. One of the components of central processing unit (CPU) of the computer that performs
mathematical and logical operations is..........
(1) ALU (arithmetic logical unit)
(2) Address register
(3) Analog
(4) All of the above
(5) None of these

413. ......... is the key we use to run the selected command.


(1) SHIFT
173

(2) TAB
(3) ENTER
Page

(4) CTRL
(5) None of these

414. To name a constant, you use the _____________dialog box.


(1) Create names
(2) Define name
(3) Paste name
(4) Format cells
(5) None of the Above

415. When you insert an Excel file into a Word document, the data are
(1) Hyperlinked
(2) Placed in a word table
(3) Linked
(4) Embedded
(5) None of the above

416. A function inside another function is called a ….. Function.


(1) Nested
(2) Round
(3) Sum
(4) Text
(5) None of the above

417. Selects the entire Row press-------


(1) Shift + Space
(2) Shift + ctrl
(3) Shift + alt
(4) Space + enter
(5) None of these

418. In Assembly language....


(1) Mnemonics are used to code operations
(2) Alphanumeric symbols are used for addresses
(3) Language lies between high-level language and machine language
(4) All of the above
(5) None of these

419. CPU capacity can be measured in


(1) BPS
(2) MIPS
(3) MHz
(4) MPI
(5) KHz
174

420. "Zipping" a fie means


Page

(1) Encrypting the message


(2) Compressing the message
(3) Transfer the message
(4) All of these
(5) None of these

421. A .......... shares hardware, software, and data among authorized users.
(1) Network
(2) Protocol
(3) Hyperlink
(4) Transmitter
(5) None of these

422. To produce a high - quality graphics (hardcopy) in color, you would want to use a
(1) Virtual Printer
(2) Laser Printer
(3) Ink - jet Printer
(4) Plotter
(5) RGB Monitor

423. When was the first Windows operating system launched?


(1) 1984
(2) 1985
(3) 1988
(4) 1989
(5) 1990

424. Thesaurus tool in MS Word is used for-


(1) Spelling suggestions
(2) Grammar options
(3) Synonyms and Antonyms words
(4) All of above
(5) None of the Above

425. What is the smallest and largest font size available in Font Size tool on formatting toolbar?
(1) 8 and 72
(2) 8 and 64
(3) 12 and 72
(4) None of above
(5) None of the Above

426. Aligns the selected text or line to justify the screen press-------
(1) Ctrl + c
(2) Ctrl + I
175

(3) Ctrl + J
(4) Ctrl + k
Page

(5) None of these


427. Which of the following is different from other?
(1) Internet
(2) Windows
(3) Unix
(4) Linux
(5) None of these

428. When data changes in multiple lists and all lists are not updated, this causes?
(1) Data redundancy
(2) Information overload
(3) Duplicate data
(4) Data inconsistency
(5) None of these

429. Granting an outside organization access to internet web pages is often implemented using
a(n)?
(1) Extranet
(2) Intranet
(3) Internet
(4) Hacker
(5) None of these

430. Loading Operating System onto RAM is called?


(1) Printing
(2) Saving
(3) Booting
(4) Staring
(5) None of these

431. The purpose of the primary key in a database is to:


(1) Unlock the database
(2) Provide a map of the data
(3) Uniquely identify a record
(4) Establish constraints on database operations
(5) None of these

432. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(1) An open folder.
(2) The folder contains subfolders.
(3) A text file.
(4) A graphics file
(5) None of these
176

433. All of the following statements concerning windows are true EXCEPT—
Page

(1) Windows are an example of a command-driven environment.


(2) Windows can be resized and repositioned on the desktop.
(3) More than one window can be open at a time.
(4) Toolbars and scrollbars are features of windows.
(5) None of these

434. The memory resident portion of the operating system is called the—
(1) Registry.
(2) API.
(3) CMOS.
(4) Kernel.
(5) None of these

435. The basic input/output system (BIOS) is stored in:


(1) RAM.
(2) ROM.
(3) The CPU.
(4) The hard drive
(5) None of these

436. Which of the following is not a tower?


(1) CPU
(2) Motherboard
(3) Peripheral
(4) All of the above
(5) None of these

437. The horizontal and vertical lines on a worksheet are called—


(1) Cells
(2) Sheets
(3) Block lines
(4) Gridlines
(5) None of these

438. What is usually used for displaying information at public places ?


(1) Monitors
(2) Overhead Projections
(3) Monitors and Overhead Projections
(4) Touch Screen Kiosks
(5) None of these

439. Which key is used in combination with another key to perform a specific task?
(1) Function
(2) Control
177

(3) Arrow
(4) Space bar
Page

(5) None of these


440. Fax machines and imaging systems are examples of—
(1) Bar-code readers
(2) Imaging systems
(3) Scanning devices
(4) Pen-based systems
(5) None of these

441. What is MP3?


(1) A mouse
(2) A Printer
(3) A Sound format
(4) A Scanner
(5) None of these

442. ___________ is a process that permits multiple computers to use the same IP address and
hide their actual IP addresses from the Internet.
(1) Routing
(2) Network address translation (NAT)
(3) Signature referencing
(4) Packet filtering
(5) None of these

443. What characteristic of read-only memory (ROM) makes it useful?


(1) ROM information can be easily updated.
(2) Data in ROM is nonvolatile, that is, it remains there even without electrical power.
(3) ROM provides very large amounts of inexpensive data storage.
(4) ROM chips are easily swapped between different brands of computers.
(5) None of these

444. Data representation is based on the………number system, which uses two numbers to
represent all data.
(1) Binary
(2) Biometric
(3) Bicentennial
(4) Byte
(5) None of these

445. To what temporary area can you store text and other data, and later paste them to another
location?
(1) The clipboard
(2) ROM
(3) CD-ROM
178

(4) The hard disk


(5) None of these
Page
446. Classes, instances, and methods are characteristics of:
(1) Testing plan construction
(2) Artificial intelligence techniques
(3) Object-oriented design
(4) Flowcharts and pseudo code
(5) None of these

447. Which of the following correctly describes the CD-R and DVD-R discs?
(1) You may record data to the disc surface multiple times and can read the current contents at
any time.
(2) You may read data from the disc but may not alter its contents.
(3) You may record data to the disc surface multiple times but have no direct reading capability.
(4) You may record data to the disc surface once and then may only read its contents
(5) None of these

448. To move down a page in a document ……


(1) Jump
(2) Fly
(3) Wriggle
(4) Scroll
(5) None of these

449. CD-ROM stands for……


(1) Central processing unit
(2) CD-remote open mouse
(3) CD-resize or minimize
(4) CD-read only memory
(5) None of these

450. Use this when you want to make all letters capital without having to use the shift key for
each character………
(1) Shifter
(2) Upper case
(3) Caps lock key
(4) Icon
(5) None of these

451. -------------------is a program that has been physically etched onto a chip.
(1) Firmware
(2) Software
(3) Compiler
(4) Interpreter
(5) None of these
179

452. The type of memory that must have a constant power supply is:
Page

(1) SDRAM.
(2) PROM.
(3) ROM.
(4) EEPROM.
(5) None of these

453. What type of e-commerce is being used when a student buys a computer from Dell.com?
(1) B2B
(2) C2C
(3) B2E
(4) B2C
(5) None of these

454. __ is the basic language of web page writing.


(1) Generalized markup language
(2) Standard generalized markup language
(3) Nonstandard generalized markup language
(4) Hypertext markup language
(5) None of these

455. The topology where all the nodes are attached in a circular wiring arrangement is called a:
(1) Star topology.
(2) Bus topology.
(3) Network topology.
(4) Ring topology
(5) None of these

456. Hard disk performance can be improved by using a(n):


(1) Optimal storage device.
(2) Disk cache.
(3) Solid-state storage device.
(4) Flash memory reader
(5) None of these

457. Which is NOT a characteristic of a system unit?


(1) Provides a sturdy frame for mounting internal components
(2) Provides room for system upgrades
(3) Represents data as binary numbers
(4) Houses the connectors for input and output devices
(5) None of these

458. Where are the Editing group and the Replace command found?
(1) On the Insert tab
(2) On the Review tab
180

(3) On the View tab


(4) On the Home tab
Page

(5) None of these


459. What function displays row data in a column or column data in a row?
(1) Hyperlink
(2) Index
(3) Transpose
(4) Rows
(5) None of the above

460. This type of software contains rows and columns.


(1) Drawing
(2) Spreadsheet
(3) Database
(4) Word processing
(5) None of the above

461. Software for organizing storage and retrieval of information is a(n)—


(1) Operating system
(2) Database
(3) Database program
(4) Data warehouse
(5) None of these

462. To insert a word into the middle of a sentence-


(1) Move the cursor to the desired location in the sentence and type the new word
(2) Move the cursor to the desired location in the sentence, press Enter key, and type the new
word
(3) Move the cursor to the beginning of the sentence and start typing
(4) Retype the whole sentence
(5) None of these

463. A high-speed transmission line that carries WAN traffic is called a:


(1) X.25 line
(2) P2PN.
(3) Backbone
(4) POP
(5) None of these

464. A DVD is an example of a(n) –


(1) Hard disk
(2) Optical disc
(3) Output device
(4) Solid-state storage device
(5) None of these
181

465. Grouping and processing all of a firm's transactions at one time is called–
Page

(1) A database management system


(2) Batch processing
(3) A real-time system
(4) An on-line system
(5) None of these

466. Semi-Conductor Memory is known as?


(1) RAM
(2) ROM
(3) PROM
(4) EPROM
(5) None of these

467. Every computer on the Internet is known as?


(1) Host
(2) Client
(3) Modem
(4) Server
(5) None of these

468. A spiral shape track formatting is present in


(1) Floppy Disk
(2) Optical Disk
(3) Hard Disk
(4) Half-inch Tape Cartridge
(5) None of these

469. -------------- Types of virus that stays permanently in the RAM memory
(1) Resident
(2) File infectors
(3) Boot virus
(4) Macro virus
(5) None of these

470. Which of the following groups contains graphical file extensions?


(1) JPG, CPX, GCM
(2) GIF, TCF, WMF
(3) TCP, JPG, BMP
(4) JPG, GIF, BMP
(5) None of these

471. A number system with a base of two is referred as–


(1) Unary number system
(2) Binary number system
182

(3) Octal number system


(4) All of the above
Page

(5) None of these


472. Which of the following is not true for primary storage?
(1) It is a part of the CPU
(2) It allows very fast access of data
(3) It is relatively more expensive than other storage devices.
(4) Can be removed and transported.
(5) All of the above

473. Which of the following is the advantage of Assembly language over Machine language?
(1) Easy to use
(2) Easy to understand
(3) Easy to modify
(4) All the above
(5) None of these

474. VPN stands for-------


(1) Virtual Personal Network
(2) Very Private Network
(3) Virtual Private Network
(4) Vicious Personal Network
(5) None of these

475. Which of the following is true about Dial-up internet access?


(1) It utilizes the existing telephone services
(2) It uses a router for security
(3) It utilizes the broadband technology
(4) Modem speeds are very fast
(5) All of the above

476. Which of the following memories can be read directly by the computer processor?
(1) Hard Disk
(2) Main Memory
(3) CD
(4) DVD
(5) None of these

477. The communication between a processor and other devices inside the computer is done
through?
(1) Bus
(2) Channel
(3) Network Cable
(4) Chip
(5) None of these
183

478. Who is/are the founders of Microsoft?


Page

(1) Bill Gates


(2) Bill Gates and Allen Paul
(3) Steve Jobs
(4) Bill Gates and Steve Jobs
(5) None of these

479. What is the difference between a check box and Radio button?
(1) No difference
(2) In radio buttons multiple options can be selected whereas in check boxes only single option
can be selected
(3) In check boxes as well as radio buttons multiple options can be selected, but radio buttons
can be used only twice
(4) In check boxes multiple options can be selected whereas in radio buttons only single
option can be selected
(5) None of these

480. If a memory chip is volatile, it will.......


(1) Explode if exposed to high temperatures
(2) Lose its contents if current is turned off
(3) Be used for data storage only
(4) Be used to both read and write data
(5) None of these

481. Which is NOT a function of a microprocessor?


(1) Controls the rest of the computer's components
(2) Keeps the system unit cool
(3) Processes data
(4) Interprets instructions given by software
(5) None of these

482. To connect to a WAN, you must have:


(1) CSMA/CD
(2) Wi-Fi
(3) TCP/IP
(4) POP
(5) None of these

483. During the ____________ operation, the control unit determines what the program is telling
the computer to do.
(1) Fetch
(2) Execute
(3) Decode
(4) Arithmetic
(5) None of these
184

484. _________ has a large storage capacity, up to 17 GB if both layers and both sides are used.
Page

(1) DVD-ROM
(2) CD-ROM
(3) Floppy
(4) RAM
(5) None of these

485. A __________ card connects each computer to the wiring in the network.
(1) Network interface
(2) PC interface
(3) Memory
(4) All of the above
(5) None of these

486. What is the initial page of the Web site?


(1) The start page
(2) The hyperlink page
(3) The link page
(4) The home page
(5) None of these

487. What is the term for a set of step-by-step instructions that direct a computer to perform its
tasks?
(1) Setup
(2) Program
(3) System
(4) Instruction manual
(5) None of these

488. To execute a given DOS program, you must type a(n) __________.
(1) Command
(2) Order
(3) Syntax
(4) All of the above
(5) None of these

489. PC cards, flash memory cards, and smart cards are all examples of:
(1) Removable hard disks.
(2) Digital video discs.
(3) Volatile memory devices.
(4) Solid state storage devices.

490. A ____________ is a unique identification number generated by a computer hardware


component or a program.
(1) Cookie
185

(2) .NET Passport


(3) GUID
Page

(4) Private Key


(5) None of these

491. RAM is an example of volatile storage and serves as the computer's-----------


(1) Short-term memory
(2) Hard drive
(3) Permanent storage unit
(4) Auxiliary CPU

492. When a computer prints a report, this output is called_____.


(1) Hard copy
(2) Soft copy
(3) COM
(4) All of the above
(5) None of these

493. The ascending order of a data hierarchy is-----------


(1) Bit-byte-record-field-file-database
(2) Byte-bit-field-record-file-database
(3) Bit-byte-field-record-file-database
(4) Byte-bit-record-file-field-database

494. In computer terminology, information means----------


(1) Raw data
(2) Data
(3) Data in more useful or intelligible form
(4) Alphanumeric data program
(5) None of these

495. A floppy disk contains------------


(1) Circular tracks only
(2) Sectors only
(3) Both circular tracks and sectors
(4) All of the above
(5) None of these

496. A plotter is---------


(1) An input device to produce good quality graphics
(2) An output device to produce drawings and graphics
(3) A fast output device using camera lenses
(4) None of these
(5) None of these

497. Which of the following is a graphical package?


186

(1)CorelDraw (2) MS-Excel (3) MS-Word (4) all of the above (5) None of these
Page

498. A mouse, trackball, and joystick are examples of _____."


(1) Pointing devices
(2) Pen input devices
(3) Data collection devices
(4) Multimedia devices
(5) None of these

499. The Internet uses-----------------


(1)Circuit switching (2) Packet switching (3) Hybrid switching (4) all of the above
(5) None of these

500. What would you use for immediate, real-time communication with a friend?
(1) Instant Messaging (2) E-Mail (3) Usenet (4) Blog (5) None of these

501. Which of the following is used to create newspaper style columns?


(1) Format Tabs
(2) Table Insert Table
(3) Insert Textbox
(4) Format Columns
(5) None of the Above

502. How much space in minimum must be provided between columns?


(1)0" (2)0.5" (3)1" (4)1.5" (5) None of the Above

503. Which operation you will perform if you need to move a block of text?
(1) Copy and Paste
(2) Cut and Paste
(3) Paste and Delete
(4) Paste and Cut
(5) None of the Above

504. The electronic switches in the ENIAC were:


(1) Integrated circuits
(2) Transistors
(3) Electro-mechanical switches
(4) Vacuum tubes
(5) None of these

505. Help Menu is available at which button?


(1) End (2) Start (3) Turnoff (4) Restart (5) Reboot

506. A……….is the term used when a search engine returns a Web page that matches the search
criteria.
(1) Blog (2) Hit (3) Link (4) View (5) Success
187

507. In Excel……….allows users to bring together copies of work-books that other user have
Page

worked on independently.
(1) Copying (2) Merging (3) Pasting (4) Compiling (5) None of these

508. What kind of memory is static and non - volatile?


(1) RAM (2) ROM (3) BIOS (4) CACHE (5) None of these

509. ---- Is the Virus that overwrites the files or a few parts being replaced?
(1) Resident (2) File infectors (3) Boot virus (4) Macro virus (5) None of these

510. Which of the following is an advantage of stored programs?


(1) Reliability
(2) Reduction in operation costs
(3) The computers becoming general-purpose
(4) All of the above
(5) None of these

511. Which of the following is an Object Oriented Programming Language?


(1) C (2) Java (3) C++ (4) Both 2 and (5) none of these

512. MICR is exclusively used in-------------


(1) Libraries (2) Super markets (3) Stock markets (4) Banking Industry (5)None of these

513. Which of the following is an audio input device?


(1) Microphone
(2) Webcam
(3) MIDI keyboard
(4) Only 1 & 3
(5) None of these

514. Digital Camera is an?


(1) Input Device
(2) Output Device
(3) Storage Device
(4) Controller Device
(5) None of these

515. The internet service that provides a multimedia interface to available resources is called-----
----------
(1) FTP
(2) World Wide Web
(3) Telnet
(4) VPN
(5) None of these
188

516. What is the short-cut key to display save -as dialog box in MS-Word?
(1) F1 (2) Alt + F1 (3) F12 (4) F5 (5) None of these
Page
517. Which of the following is not a web browser?
(1) Mozilla (2) IE (3) CE (4) Opera (5) Safari

518. The backspace key is most often used to?


(1) Delete a character to the right of the cursor
(2) Delete a character to the left of the cursor
(3) Delete a character above the cursor
(4) Delete a character below the cursor
(5) None of these

519. Which of the following keyboard shortcuts is used to view the properties of a selected
object?
(1) Alt + Space
(2) Ctrl + Space
(3) Alt + Enter
(4) Ctrl + Enter
(5) None of these

520. What is the function of a Drop Cap in MS - Word?


(1) It does not allow capital letters to be used in the documents.
(2) It turns the first letter of each word into Upper Case
(3) It lets you begin a paragraph with a large dropped Initial capital letter
(4) It automatically starts all paragraphs and sentences with capital letters
(5) None of these

521. Which of the following is a data - entry device?


(1) Barcode Reader (2) MICR (3) OMR (4) OCR (5) All of the above

522. Which of the following is true about CPU?


(1) It contains electronic circuits that cause processing to occur
(2) It makes the information resulting from processing available for use
(3) It allows data, programs, and commands to be entered into a computer
(4) It is comprised of electronic components that store data
(5) None of these

523. Adwords is an-------------


(1) Advertising Service by Microsoft
(2) Advertising Service by Google
(3) Advanced Search Engine
(4) Automatic words Search Engine by Yahoo
(5) Advertising Service by Yahoo

524. Which of the following is the largest storage?


189

(1) Mega Byte (2) Kilo Byte (3) Giga Byte (4) Byte (5) Terabyte
Page

525. System Software includes which of the following?


(1) Linkers
(2) Debuggers
(3) Loaders
(4) Compilers
(5) All the above

526. Which of the following is / are the functions of operating system?


(1) Memory Management
(2) Access to I/O devices
(3) Controlled Access to files
(4) All the above
(5) None of these

527. Which of the following is fastest?


(1) Cache Memory
(2) Main Memory
(3) Secondary Memory
(4) Compact Disk
(5) Digital Versatile Disk

528. Each Web address is actually a series of numbers, which is usually called as------------
(1) Domain Name
(2) URL
(3) Http
(4) HTML
(5) IP address

529. Which of the following is used to connect a personal computer to a network?


(1) Modem (2) NIC (3) PIC (4) CPU (5) None of these

530. Which of the following is the short-cut key to close an active tab of a browser?
(1) Alt + F4 (2) Ctrl + C (3) Ctrl + F4 (4) Shift + C (5) Ctrl + W

531. Which of the following is true about URL?


(1) It is a web browser
(2) It is a messenger
(3) It is a mail service
(4) It is a global address of documents and other resources on World Wide Web
(5) It is same as internet

532. Which of the following keyboard short-cut is used to center the paragraph?
(1) Ctrl + C (2) Ctrl + E (3) Ctrl + L (4) Ctrl + R (5) None of these
190

533. Which of the following functions is not performed by servers?


(1) Processing Websites
Page

(2) Database Sharing


(3) Storage
(4) Word Processing
(5) Email Processing

534. Which of the following is true about Secondary Storage?


(1) Does not require constant power
(2) Does not use magnetic media
(3) Consists of four main types of devices
(4) Does not store information for later retrieval
(5) None of these

535. Which of the following is the full form of LSI?


(1) Low Scale Information
(2) Large Scale Information
(3) Low Scale Integration
(4) Large Scale Integration
(5) Local Scale Integration

536. Which of the following Computer languages is used for Artificial Intelligence?
(1) FORTRAN (2) PROLOG (3) C (4) COBOL (5) None of these

537. Which of the following is the slowest Internet connection?


(1) Digital Subscriber Line (2) T1 (3) Cable Modem (4) Leased Line (5) Dial-Up

538. What is the full form of USB?


(1) Universal Security Block
(2) Universal Security Bus
(3) Under Security Block
(4) Universal Serial Block
(5) Universal Serial Bus

539. 'FIND' option is available under which of the following menu?


(1) Tools
(2) View
(3) File
(4) Edit
(5) None

540. Compilers and interpreters are themselves-----


(1) High-level language
(2) Codes
(3) Programs
(4) Mnemonics
191

(5) None of these


Page
541. ……….uses viruses to destroy computer Hardware?
(1) Spoofing (2) Tunneling (3) Sabotage (4) Phishing (5) Flooding

542. A series 100 POST Error code indicates a problem with which of the following?
(1) Hard drive (2) RAM & ROM (3) System board (4) Video adaptor (5) None of these

543. Which type of protocol is used for accessing internet on Mobile phones?
(1) PPP (2) HTTP (3) FTP (4) WAP (5) SMTP

544. How many types of data can be entered in a worksheet?


(1) Two (2) Three (3) Four (4) Five (5) Six

545. Base 2 type Ethernet uses …………… Topology?


(1) Ring (2) Bus (3) Star (4) Mesh (5) Tree
(Note that Base F type Ethernet uses Star topology).
546. The local antenna for satellite connection is called a…….
(1) VSAT (2) Modem (3) Terminal (4) DTA (5) MSAT

547. What is the default font size of cell content in MS EXCEL?


(1) 8 (2) 9 (3) 10 (4) 11 (5) 12

548. Binary numbers need more places for counting because…….


(1) They are always big numbers
(2) Any number of 0‘s can be added in front of them
(3) Binary base is small
(4) 0‘s & 1‘s have to be properly spaced apart
(5) None of these

549. Which of the following types of SMPS Shuts down automatically?


(1) AT (2) ATX (3) ATY (4) ATW (5) None of these

550. The basic unit of main memory is………..


(1) CPU (2) ALU (3) Buffer (4) Accumulator (5) None

192

For more E-Books & Study material visit www.gcnayak.blogspot.com


Page
SHORTCUT KEYS
(A) GENERAL KEYBOARD SHORTCUT KEYS

KEY FUNCTION
F1 Display HELP
F2 Rename the selected item
F3 Search for file folder
F4 Display address bar list/show item path
F5 Refresh the active window
F6 Cycle through screen element in a windows/Desktop
F10 Active the menu bar in active program
Ctrl + Esc Launch start menu
Ctrl + ( A/B/C/S/V/X/Y/Z ) Select all/Bold/Copy/Save/Paste/Cut/Redo/Undo
Ctrl + Shift + Esc launch Task manager
Alt + Ctrl + Del Launch Task Manager, Log off, Lock, Change password
Del Delete the selected item & move it to Recycle bin
Shift + Del Delete Permanently without moving to Recycle bin
Alt + Tab Switch among open items
Alt + Esc Cycle through items in the order they are opened in taskbar
Shift + F10 Equivalent to mouse right click on a selected item to view the
short Menu
Alt + F4 Close/Exit the active item
Ctrl + F4 Close the active document/program
Alt + Enter Key Display properties of the selected item
Alt + up arrow View the folder one level up in windows explorer ~ Back arrow

Shift + any arrow key Select more than one item in a window or select text within
a document
Ctrl + Shift + any arrow Select a block of text in a document /items in a desktop/window
Key ~ Ctrl + select(left click) &Drag using mouse
193

Ctrl + Any arrow key + Select multiple individual item in a window or the desktop ~
Spacebar Ctrl + select (left click) using mouse.
Page
(B) WINDOWS LOGO KEY KEYBOARD SHORTCUT KEYS

KEY FUNCTION
W(Windows Key) Launch start menu

W + pause/break Display system properties

W+D Display desktop

W+M Minimize all windows

W + Shift + M Restore the minimized window

W+E Open My Computer

W+F Search for file/folder

W+L Lock your computer

W+R Open Run Dialog Box

W+T Cycle through program taskbar

W + Up Arrow Maximize the window

W + Down Arrow Minimize the window

W+P Choose presentation display mode

W+U Open ease access center

W+X Open windows mobility center

W + Spacebar Preview the desktop

Ctrl + W + Tab Use arrow key to cycle through programs on the


taskbar by using Aero Flip-3D

W + number Launch the program pinned to the taskbar in the position


indicated by the number

W+G Cycle through Gadgets


194
Page
(C) MS-WORD SHORTCUT KEYS

KEYS FUNCTION
F1 For HELP

F2 Move text or Graphics

F4 Repeat the last action

F5 Launch GO TO Dialog box (Home Tab)

F7 Launch SPELLING Command box (Review Tab)

F8 Extend a Selection

F12 Launch Save As Dialog box

Ctrl + A Select whole document

Ctrl + B To make selected text Bold

Ctrl + C To copy the selected text

Ctrl + Shift + D To double underline the selected text

Ctrl + E Center alignment of text

Ctrl + F Open Find Dialog Box

Ctrl + G or F5 Open GOTO Dialog box

Ctrl + H Open REPLACE Dialog box

Ctrl + I To make selected text italic

Ctrl + J Justify alignment of text

Ctrl + K Insert Hyperlink

Ctrl + L Left alignment of text

Ctrl + M Indent a paragraph from left (to remove left indent use
195

Ctrl + Shift + M)
Ctrl + N To create new blank document
Page
Ctrl + O To display OPEN Dialog Box

Ctrl + P To display PRINT Dialog Box

Ctrl + Q Remove paragraph Formatting

Ctrl + R Right alignment of text

Ctrl + S or Shift +F12 To SAVE the document (F12—Save As)


Ctrl + T Create a hanging Indent (To reduce hanging indent
use Ctrl + Shift + T)
Ctrl + U To underline the selected text

Ctrl + V To PASTE the copied data

Ctrl + W or Ctrl +F4 To close the active document file

Ctrl + X To CUT the selected text

Ctrl + Y Redo

Ctrl + Z Undo

Ctrl + Enter Key New Page or Page Break

Ctrl + Shift + > To increase the font size of selected text

Ctrl + Shift + < To decrease the font size of selected text

Ctrl + [ To increase the font size by one point

Ctrl + ] To decrease the font size by one point

Ctrl + = SUBSCRIPT
Ctrl + Shift + = SUPERSCRIPT
Ctrl + Right Arrow To move the cursor to the beginning of the next word

Ctrl + Left Arrow To move the cursor to the beginning of the previous word

Shift + Right arrow To select a character towards right from current curser

Shift + Left arrow To select a character towards left from current curser
196

Ctrl + Shift + Right arrow To select a word towards right from current cursor

Ctrl + Shift + Left arrow To select a word towards left from current curser
Page
Shift + End (Ctrl + End) To select the character up to the end of current line
from the current cursor position (for Text Box)
Shift + Home (Ctrl+ Home) To select the character up to the beginning of current
line from the current cursor position (for Text Box)
Shift + F3 To switch between the UPPERCASE, lowercase &
Sentence Case format of the selected text
Shift + F7 Open THESAURUS Dialog box which shows the
List of synonyms of the selected text.
Home To move cursor to the beginning of current line

End To move cursor to the end of current line

Double Click on a Word To select the Word


Triple click on a Paragraph To select the paragraph
Ctrl + Shift + C Copy formatting only (format painter)
Ctrl + shift + V Paste formatting only (format painter)
Ctrl + Alt + V Paste Special
Ctrl + Shift + ( F or P) To open FONT Dialog box to change font
Ctrl + Spacebar Remove manual character formatting such as
subscript, superscript, bold, italic etc.
Alt + Ctrl +Z Switch among the last four places that you have edited
Alt + Ctrl + Y Repeat find(After closing FIND&REPLACE window)
Alt + Ctrl + P Switch to print layout view

Alt + Ctrl + O Switch to outline view

Alt + Ctrl + N Switch to Draft view

For more E-Books & Study Material visit www.gcnayak.blogspot.com


197
Page
(D) MS-EXCEL SHORTCUT KEYS

KEY FUNCTION
Ctrl + shift + ( Unhide any hidden rows within the selection

Ctrl + shift + ) Unhide any hidden column within the selection

Ctrl + shift + & Applies the outline border to the selected cells

Ctrl + shift + _ Removes outline border from the selected cells

Ctrl + shift + ~ Applies the general number format

Ctrl + shift + $ Applies the currency format with two decimal places
(negative numbers in parenthesis)
Ctrl + shift + % Applies the percentage format with no decimal places

Ctrl + shift + ^ Applies the exponential number format with two decimal
Places
Ctrl + shift + # Applies the date format with day, month, year
Ctrl + shift + @ Applies the time format with hour, minute ,AM,PM
Ctrl + shift +! Applies the number format with two decimal places ,
thousands separator, and minus sign for –ve numbers
Ctrl + shift + * Select the current region around the active cell (the data
area enclosed by blank rows and blank columns).In
a pivot table it selects the entire pivot table report
Ctrl + shift + ; Enters the current time
Ctrl + shift + “ Copies the value from the cell above the active cell into
the cell or Formula bar
Ctrl + shift + Plus(+) Display the INSERT dialog box to insert blank cells
Ctrl + Minus(-) Display the DELETE dialog box to delete selected cells
Ctrl + ; Enters the current date
Ctrl + ‘ Copies a formula from the cell above the active
cell into the cell or the formula bar
Ctrl + 1 Display the FORMAT CELLS dialog box
Ctrl + 2 Applies or removes BOLD Formatting
198

Ctrl + 3 Applies or removes ITALIC Formatting


Ctrl + 4 Applies or removes UNDERLINING
Page

Ctrl + 5 Applies or removes STRIKRTHROUGH


Ctrl + 6 Alternates between hiding objects, displaying objects,
and displaying placeholders for objects
Ctrl + 8 Display or hide the outline symbols
Ctrl + 9 Hides the selected row
Ctrl + 0 Hides the selected columns
Ctrl + D Uses the FILL DOWN command to copy the contents
and format of the topmost cell of a selected range into
the cells below
Ctrl + R Uses the FILL RIGHT command to copy the contents
and format of the leftmost cell of a selected range into
the cells to the right
Ctrl + T Display the TABLE dialog box

Ctrl + W Close the selected workbook window

Ctrl + Page UP Move between excel worksheets in the same


Excel Document
Ctrl + Page Down Move between excel worksheets in the same
Excel Document
Ctrl + Tab Move between two or more open Excel files

Alt + = Create a formula to sum all of the above cells

Ctrl + F1 Display/hides Ribbon

Alt + F1 Creates a chat of the data in the current page

Alt + Shift + F1 Insert a new worksheet

F2 Edit the selected cell

Shift + F2 Edit a cell comment

Ctrl + F2 Displays the print preview window

F3 Display the PASTE NAME Dialog box

Shift + F3 Open Excel Formula window

F4 Repeats the last command or action, if possible


199

Ctrl + F4 Close the selected workbook window


Page
F5 Display GO TO Dialog box

Ctrl + F5 Restores the window size of the selected workbook


Shift + F5 Bring up search Box
F6 Switches between the worksheet, Ribbon, Task pane, and
Zoom controls. In a Worksheet that has been split (View
menu, Manage this window, Freeze Pane, and Split
Window), F6 includes the split panes when switching
between panes & the Ribbon.
Shift + F6 Switches between the worksheets, zoom controls, task
pane, and Ribbons

Ctrl + F6 Switches between the workbook window when more


than one workbook windows are open
F7 Display the SPELLING Dialog box
F8 Enables EXTENDED SELECTION
Shift + F8 Enables you to add a non-adjacent cell or range to a
selection of cells by using arrow key
Ctrl +F8 Perform SIZE Command
Alt + F8 Display a MACRO dialog box to create, run, edit, or
delete a Macro
F9 Calculates all worksheets in all open workbooks
Shift + F9 Calculate the active worksheets
Ctrl + Alt + F9 Calculates all worksheets in all open workbooks,
regardless of whether they have changed since last
calculation
Ctrl + Alt + Shift + F9 Rechecks dependent formulas, and then calculates all
Cells in all open workbooks, including cells not
marked as needing to be calculated.
Ctrl + F9 Minimizes a workbook window to an icon
F10 Turn key tips on/off
Shift + F10 Display shortcut menu for a selected item
Alt + shift + F10 Display menu for a smart tag
Ctrl + F10 Maximize/restore the selected workbook window
200

F11 Create a chat of the data in the current page


Shift + F11 Inserts a new worksheet
Page

Alt + F11 Open Microsoft visual basic editor to create Macro


Shift + Spacebar Select entire Row
Ctrl + Spacebar Select entire Column

(E) MS POWERPOINT SHORTCUT KEYS

KEY FUNCTION
Ctrl + A Select all object on slide Tab/Select all slides in Slide
Sorter View/Select all text on Outline Tab

F5 Start a presentation from beginning

Number + Enter Key Go to slide number

B or PERIOD Display a blank black slide

W or COMMA Display a blank white slide

S Stop or restart an automatic presentation

Esc or Hyphen End a presentation

E Erase on screen annotations

H Go to the next slide, if next slide is hidden

T Set new timings while rehearsing

O Use original timings while rehearsing

M Use a mouse click to advance while rehearsing

1 + Enter Return to the 1st slide


Ctrl + P Redisplay hidden pointer or change the pointer to a pen

Ctrl + A Redisplay hidden pointer or change the pointer to an arrow

Ctrl + H Hide the pointer & navigation button immediately

Ctrl +U Hide pointer & navigation button in 15 seconds

Shift + F10 Display the shortcut menu


201

TAB Go to the first or next hyperlink on a slide


Page
Shift + TAB Go to the last or previous hyperlink on a slide

Shift + F4 Move to repeat the last Find Action

(F) MISCELLANEOUS SHORTCUT KEYS

KEY FUNCTION
Alt + D To move the insertion point to the Address box, or to highlight
the URL in the Address box of a Browser./Select the Address
Bar
Ctrl + Tab Move forward through Tab

Ctrl + shift + Tab Move backward through Tab

1Ctrl + Shift + N Create a new folder

NumLock + * Display all sub folders under the selected folder

NumLock + Plus(+) Display the content of the selected folder

NumLock + Minus(-) Collapse the selected folder

Alt + E Select the Search Box

F11 Maximize/Minimize the given Browser

202

For more E-Books & Study material visit www.gcnayak.blogspot.com


Page
ABBREVIATIONS
A

ADSL- Asymmetric Direct Subscriber Line


AI – Artificial Intelligence
ALGOL – Algorithmic Language
ARP – Address Resolution Protocol
ASCII – American Standard Code for Information Interchange
ANSI- American National Standards Institute

BINAC - Binary Automatic Computer


BCC – Blind Carbon Copy
Bin – Binary
BASIC - Beginner‘s All-purpose Symbolic Instruction Code
BIOS – Basic Input Output System
Bit – Binary Digit
BMP-Bit Map
BSNL – Bharat Sanchar Nigam Limited

CC – Carbon Copy
CAD – Computer Aided Design
CORBA - Common Object Request Broker Architecture
CBT - Computer Based Training
COBOL – Common Business Oriented Language
CD – Compact Disc
CGA - Color Graphics Adapter.
CRT – Cathode Ray Tube
CSS-Cascading Style Sheet
CDR – Compact Disc Recordable
CDROM – Compact Disc Read Only Memory
203

CDRW – Compact Disc Rewritable


CDR/W – Compact Disk Read/Write
Page
D

DBA – Data Base Administrator


DDL-Data Definition Language
DDR - Double Data Rate.
DBMS – Data Base Management System
DSLAM- Digital Subscriber Line Access Multiplexer
DNS – Domain Name System
DPI – Dots Per Inch
DLL: Dynamic Link Library
DRAM – Dynamic Random Access Memory
DVD – Digital Video Disc/Digital Versatile Disc
DVDR – DVD Recordable
DVDROM – DVD Read Only Memory
DVDRW – DVD Rewritable
DVR – Digital Video Recorder
DOS – Disk Operating System

EBCDIC–Extended Binary Coded Decimal Interchange Code


E-Commerce – Electronic Commerce
EDP – Electronic Data Processing
ERP- Enterprise Resource Planning
EEPROM – Electronically Erasable Programmable Read Only Memory
E-Mail – Electronic Mail
ENIAC-Electronic Numerical Integrator and Computer
EOF - End Of File
EPROM - Erasable Programmable Read Only Memory
EXE - Executable

FAX - Far Away Xerox/ facsimile


FDC - Floppy Disk Controller
204

FDD - Floppy Disk Drive


FORTRAN - Formula Translation
FS - File System
Page

FTP - File Transfer Protocol


G

Gb - Gigabit
GB – Gigabyte
GDI-Graphics Device Interface
GIF - Graphics Interchange Format
GUI- Graphic User Interface
GSM - Global System for Mobile Communication

HDD - Hard Disk Drive


HP - Hewlett Packard
HTML - Hyper Text Markup Language
HTTP - Hyper Text Transfer Protocol

IBM - International Business Machine


IM - Instant Message
IMAP - Internet Message Access Protocol
ISP - Internet Service Provider
ISDN: Integrated Services Digital Network

JPEG - Joint Photographic Experts Group

Kb - Kilobit
KB - Kilobyte
KHz - Kilohertz
205

Kbps - Kilobit Per Second

L
Page
LCD – Liquid Crystal Display
LED – Light Emitting Diode
LPI – Lines Per Inch
LAN-Local Area Network
LIS – Large Scale Integration

Mb – Megabit
MB – Megabyte
MAN-Metropolitan Area Network
MPEG – Moving Picture Experts Group
MMS – Multimedia Message Service
MICR – Magnetic Ink Character Recognition
MIPS – Million Instructions Per Second

NIC – Network Interface Card


NOS – Network Operating System

OMR – Optical Mark Reader


OCR-Optical Character Recognition
OOP – Object Oriented Programming
OSS – Open Source Software

PAN – Personal Area Network


PC – Personal Computer
PDA - Personal Digital Assistant
PDF – Portable Document Format
POS – Point Of Sale
206

PNG - Portable Network Graphics


PPM – Pages Per Minute
PPP – Point-to-Point Protocol
Page

PROM – Programmable Read Only Memory


PSTN – Public Switched Telephone Network
POST – Power On Self Test
PING – Packet Internet Gopher

QAM - Quadrature Amplitude Modulation

RAM – Random Access Memory


RDBMS – Relational Data Base Management System
RIP – Routing Information Protocol
RTF – Rich Text Format

SMTP – Simple Mail Transfer Protocol


SMPS-Switching Mode Power Supply
SQL – Structured Query Language
SRAM – Synchronous Random Access Memory
SNMP – Simple Network Management Protocol
SIM – Subscriber Identification Module

TCP – Transmission Control Protocol


TB – Tera Bytes

UPS – Uninterrupted Power Supply


URI – Uniform Resource Identifier
URL – Uniform Resource Locator
USB - Uniform Serial Bus
207

ULSI - Ultra Large Scale Integration


UNIVAC - Universal Automatic Computer
Page
V

VAR – Variable
VGA – Video Graphics Array
VSNL – Videsh Sanchar Nigam Limited
VDU – Visual Display Unit
VDD - Virtual Device Driver
VIRUS - Virtual Information Resource Under Seize

Wi-Fi – Wireless Fidelity


WAN-Wide Area Network
WWW-World Wide Web
WLAN – Wireless Local Area Network
WPA – Wi-Fi Protected Access
WAP - Wireless Application Protocol
WWW – World Wide Web
WORM – Write Once Read Memory

XHTML – Extensible Hypertext Markup Language


XML - Extensible Markup language
XBRL-Extensible Business Reporting Language

ZB – Zeta Byte
ZIP- Zone Information Protocol
208

For more E-Books & Study material visit www.gcnayak.blogspot.com


Page
COMPUTER GLOSSARY
A

 Access time - The amount of time it takes for requested information to be delivered from disks and
memory.
 Access – To store or retrieve data
 Add-on: Circuits, systems, or hardware devices that can be attached to a computer to increase its
memory or improve its performance
 Application: A system, such as a payroll, that has been defined to be suitable for electronic data
processing techniques
 Archived file: A file that has been transferred to a lower level in the memory hierarchy, usually
from magnetic disc to magnetic tape, may be as a result of operations of appropriate resource
management
 Array: A group of two or more logically related elements identified by a single name; generally
stored in consecutive storage locations in main memory
 Audit trail: A permanent record of every transaction taken by a computer system, indicating for
example, when users log in and out, what transaction they perform, when files are accessed and the
type of access. Examination of this record provides a way of observing patterns of security
violation and/or serves as a deterrent to violations
 Availability: The ratio of time a device is operating correctly to the total scheduled time for
operating
 Antivirus software - A program designed to look for and destroy viruses that may infect the
memory of a computer or files stored on a computer.
 Artificial intelligence (AI) - Computer systems that attempt to imitate human processes for
analyzing and solving problems.
 Accumulator - A local storage area called a Register, in which the result of an arithmetic or logic
operation is formed.

 Bit - It is basic unit of computers .It has two values 1 & 0 only.
 Byte - Combination of 8 Bits.
 Back office operations: Operation that does not involve direct interaction with customers
 Back up: A resource that is, or can be used as a substitute when a primary resource fails or when a
file has been corrupted
209

 Bar code: A printed machine readable code that consists of parallel bars of varied width and
spacing. The application most commonly observed is the coding on food and goods that is read at
Page

the checkout and translated into a line of print on the bill showing product and cost
 Batch processing: A method of organizing work for a computer system, designed to reduce
overheads by grouping together similar jobs
 Bug: An error or mistake in a program
 Bandwidth: How much stuff you can send through a connection. Usually measured in bits per
second
 Beta: Preliminary or testing stage of a software or hardware product: ―a beta version‖; ―beta
software‖
 Basic Input Output System (BIOS) - Also known as ROM BIOS. It provides an abstraction layer
for the hardware, i.e., a consistent way for application programs and operating system to interact
with input/output devices.
 Binary: This is a basic system of numbering using ones and zeroes.
 Blue tooth: Radio technology that connects electronic devices without using a cable. Data and
voice can be exchanged at ranges of up to 10 meters without the need for devices to be lined up
together
 Boot disk: A diskette from which you can boot your computer
 Buffer: A place, especially in RAM, for the temporary storage of data for the purpose of speeding
up an operation such as printing or disk access
 Browser: It is a software used for viewing pages on the web
 Bus: A collection of wires through which data is transmitted from one part of a computer to
another.

 Cookie - A packet of information that travels between a browser and the web server.
 Crash - Your computer or application no longer works correctly and so you ―loose‖ all the work
you‘ve done since the last time you saved.
 Character: An alphabetic letter, a digit or a special symbol. It is of 1 Byte.
 CD-ROM: Compact Disc Read Only Memory – an optical storage medium that can hold about
700 MB of data and is accessed with lasers
 CGA: Stands for Color Graphics Adapter. CGA allowed a maximum of four colors at a resolution
of 320 x 200 or two colors at 640 x 200.
 Clock Speed: The clock speed is the frequency which determines how fast devices that are
connected to the system bus operate. The speed is measured in millions of cycles per second
 Clustering: A technique in which two or more servers are interconnected and can access a
common storage pool
 CMOS: Abbreviation of complementary metal oxide semiconductor. Pronounced seemoss; CMOS
210

is widely used type of semiconductor


 CPU: Central Processing Unit – It interprets and carries out instructions, performs numeric
Page

computations, and controls the peripherals connected to it


 Chip: A small section of a single crystal of semiconductor usually silicon, that forms the substrate
upon which is fabricated a single semiconductor device or all the individual devices comprising an
integrated circuit
 Configuration: The particular hardware elements and their interconnection in a computer system
for a particular period of operation
 Command - An instruction that causes a program or computer to perform a function.
 Cache - It is a memory storage area that keeps frequent use data readily available to the computer
so that the computer does not retrieve them from slow storage devices.
 Clock Speed - The speed of computer is measured in clock speed. High clock speed is
synonymous with high processing capability. It is measured in Megahertz (MHz).

 Delete - To remove an item of data from a file or to remove a file from the disk.
 Debugging - Locating and eliminating defects in a program.
 Downtime: The period of time during which a computer is not functioning.
 Dongle: it is a device that attaches to a computer to control access to a particular application.
 Dummy: An artificial instruction, address etc. used only to fulfill specification in a program but
not actually performing a function
 Duplex channel: A communication channel that allows data to be transmitted in both
directions simultaneously
 Data bus: A group of parallel conductors found on the motherboard that is used by the CPU to
send and receive data from all the devices in the computer.
 Data mining: Sorting through data to identify patterns and establish relationships
 Decoder: A circuit or device that restores a coded signal to its original form based on knowledge
of the process used to code the signal
 Decryption: It is the process of converting encrypted data back into its original form, so that it can
be understood
 Dedicated line: It is a phone line meant specifically for one thing, like being attached to a
computer
 Demodulation: It is the process of converting analog information into digital information
 Domain name: A name that identifies one or more IP addresses
 Driver: A program that controls a device. Every device, whether it can be a printer, disk drive, or
keyboard must have one driver program
 Desktop - The electronic work area on a display screen.
 Dots Per Inch (DPI) - It is defined as the measure of the resolution of a printer and scanner, or
211

monitor.
 Domain Name - A unique name that identifies a particular website and represents the name of the
Page

server where the web pages reside


.
E

 Edit - To make certain changes in existing data.


 Ethernet Card - A network adapter that enables a computer to connect to an Ethernet.
 Encoder: A small table-top electronic machine which is a combination of electronic typewriter and
calculator – functions: encode numeric data in the MICR in desired font; print a listing of amounts
of all instructions with batch/grand totals; zero-proofing place clearing endorsement, stamp on the
reverse of instruments
 Email: Stands for electronic mail. It is a system of relaying messages across the Internet from one
internet user to another
 Encryption: It is the process of converting data into ―unreadable code‖ so that unauthorized
people cannot understand the contents
 Ethernet: A networking system that enables high speed data communication over coaxial cables
 Executable file: A file in a format that the computer can directly execute

 Fax - A shortened form of the word facsimile. A copy of a document transmitted electronically
from one machine to another. It is an example of half-duplex communication.
 File transfer protocol (FTP) - A set of guidelines or standards that establish the format in which
files can be transmitted from one computer to another.
 Firewall - A security system usually consisting of hardware and software that prevents
unauthorized persons from accessing certain parts of a program, database, or network.
 Flash Memory - It is a type of non-volatile computer storage chip that can be electrically erased
and reprogrammed. It was developed by EEPROM.

 Gateway - A machine that links two networks using different protocols.


 Gigabyte - A measurement of the storage capacity of a device. One gigabyte represents 1024
megabytes.
 Google – search engine on the web. Similarly others are Ask, Being, Yahoo etc.
 Gopher - A protocol used for locating and transferring information on the internet. It is an internet
search tool that allows users to access textual information.
 GUI - Graphical User Interface uses icons and menus to carry out commands such as opening files,
212

delete files, move files etc.


 Graphic Interchange Format (GIF) - A simple file format for pictures and photographs that are
Page

compressed so that they can be sent quickly.


H

 Hard copy - Text or graphics printed on paper; also called a printout.


 Hard disk - A rigid type of magnetic medium that can store large amounts of information.
 Hyperlink - An image or portion of text on a webpage which is linked to another webpage.
 Hub - A network device that connects multiple computers on a LAN so that they can communicate
with another network and the internet.
 Header - Repetitive information that appears at the top (the head) of every page of a document.
 Hypertext transfer protocol (HTTP) - The protocol used on the World Wide Web that permits
Web clients (Web browsers) to communicate with Web servers

 Icons - In a graphical user interface (GUI), a small, pictorial, on screen representation of an object,
such as a document, program, folder or disk drive that acts as an activation link when clicked on
 Instant messaging (IM) - A chat program that lets people communicate over the Internet in real
time.
 Internet protocol (IP) address - A unique set of numbers that identifies a computer over a
network.
 Internet service provider (ISP) - An organization that provides access to the Internet for a fee.
 Intranet - A private network established by an organization for the exclusive use of its employees.
 Image: A copy in memory of data that exists elsewhere
 Interface: A common boundary between two systems, devices or program

 JPEG - Joint Photographic Experts Group. A format for storing complex graphics in compressed
form.
 Justification - Aligning lines of text at the left margin, the right margin, both margins, or the
center. Text aligned at both margins is considered fully justified.
 Java: A high level programming language developed by Sun Microsystems

 Keyboard - The device used to enter information into a computer.


213

 Kilobyte - A measurement of the storage capacity of a device. One kilobyte represents 1024 bytes.
Page

L
 LAN - A local area network (LAN) is a computer network that interconnects computers within a
limited area such as a home, school, computer laboratory, or office building, using network media.
 Laptop computer - A portable computer. Also known as a notebook computer.
 Landscape Orientation – The positioning of the page so that the information is printed across the
long dimension of the page.
 Liveware - It is a term to describe the human system, opposed to hardware or software in a
computer.
 Lock: A key or other group of characters that allows access to specified storage locations or
software systems
 Log-in: To enter the necessary information like personal identification number – PIN and/or
password to begin a session on a terminal.

 LCD: Abbreviation of liquid crystal display, a type of display used in digital watches and many
portable computers
 Linux: A version of UNIX that runs on a variety of hardware platforms. It is open source software,
which is freely available

 Macro virus - A type of virus that attaches itself to documents or word processing templates.
 Malware - Software that disrupts normal computer functions or sends a user‘s personal data
without the user‘s authorization.
 Memory - The part of a computer that stores information.
 Memory Cell - A circuit in memory that represents a single bit of information.
 Mass Storage - Storage systems that provide access to hundreds of billions of bytes of stored data.
They are often referred to as Archival Storage because of the very large volumes of historical or
backup data they can store.
 MIPS - An acronym derived from Millions of Instructions Per Second. Used to measure the speed
of a processor.
 Morphing - The transformation of one image into another image.
 M-Commerce - A form of e-commerce that has the ability to conduct monetary transactions via a
mobile device such as a cell phone.
 Mozilla - a web browser and successor to Netscape Communicator.
 Multitasking - The ability of a computer to execute more than one program at a time.
214

 MPEG: Motion Picture Experts Group. It is a video file format.


 Menu: The list of options may be displayed with a sign code opposite each. The selection may
Page

then be made by keying the single code. The method provides simple way of guiding a user
through a complex situation by presenting a sequence of simpler decisions
 Main memory: Storage located in the computer for program, along with their data, while they are
being executed
 MICR: Abbreviation for Magnetic Ink Character Recognition. A process in which data printed in
ink containing ferromagnetic particles is read by magnetic read heads
 Modem: Acronym for modulator demodulator – a device that converts digital data output from
another device into analog data that can be transmitted over communication lines or vice versa.

 NIBBLE - Combination of four bits.


 Network - A system of interconnected computers. They are of three types i. e. LAN, MAN, WAN.
 Network Interface Card (NIC) - This is a part of the computer that allows it to talk to other
computers via a network protocol like TCP/IP.
 Node - A computer which is attached to the network. Each node has its own address on the
network so that it can be uniquely identified and can communicate with other nodes on the same or
different network.

 Offline - Refers to the state in which a computer is temporarily or permanently unable to


communicate with another computer.
 Online - Refers to the state in which a computer is ready to communicate with other computers.
Open source software - Software that makes the underlying source code available to all users at no
charge.
 Operating system (OS) - Software that manages the internal functions and controls the operations
of a computer.

 Palmtop computer - A portable computer smaller than a notebook (or laptop) computer that fits
on the palm of your hand. Also called a handheld computer.
 Password - A user‘s secret identification code, required to access stored material. A procedure
intended to prevent information from being accessed by unauthorized persons.
 Piracy - The illegal copying of software or other creative works.
 Peripherals - A connectable device that has an auxiliary function outside the permanent system
215

configuration such as plotters, printers and graphic displays.


 Phishing - A type of computer fraud that tries to trick users into revealing their passwords and
Page

other confidential information.


 Pixel - A smallest picture element of a digital image. The smaller the pixels, the higher the
resolution.
 Port - An electrical connection on the computer into which a cable can be plugged so that the
computer can communicate with other devices such as printer or modem.
 Protocol - A set of rules and regulations that coordinates the exchange of information over the
network.
 Portrait orientation - Positioning paper so that information is printed across the short dimension
of the paper.
 Peer to Peer: A type of network in which each workstation has equivalent capabilities and
responsibilities
 Pen drive: A small device that can be used to easily transfer files between USB-compatible
systems
 Processor: A processor is a device that processes programmed instructions and performs tasks

 Query - An alternate pipe form of operating system, which handles data in the form of messages
rather than bytes.
 Qwerty - It is one of the standard computer keyboard, with the character Q, W, E, R, T, Y on the
top row of letters on the keyboard.

 Response time - The time a computer takes to execute a command.


 Real Time: The time that passes on an ordinary clock
 Retrieve - To call up information from memory or storage so that it can be processed in some way.
 Record - A collection of all the information pertaining to a particular subject.
 Resolution - Measurement of the degree of sharpness of a displayed image. It is defined as number
of pixels per square inch on a computer generated display.
 Register - A temporary storage unit for quick, direct accessibility of a small amount of data for
processing.

 Save As – Give the file a name and/or store the file in a certain place.
 Save - Tell the computer to create a file on disk that has the information you‘ve put into the
216

document.
 Serial Port: A port or interface that can be used for serial communication, in which only 1 bit is
Page

transmitted at a time
 SMPS- Stands for switching mode power supply is used for converting raw input power to
stabilize DC power.
 Scan: To examine sequentially all the records in a file in order to find those whose keys meet a
specified criterion
 Spam: This is to transmit unwanted messages, usually over email, to a great many people
 Spooling- The process of storing a device (e.g. Printer) output signal in a queue, while the device
can take on other actions. When the device is ready to take on other actions, it will draw from the
queue. The term spooling is derived from the acronym SPOOL-Simultaneous Peripheral Operation
On Line
 Spoofing- Collecting personal information and effectively posing as another individual
 SLIP: Serial Line Interface Protocol
 Soft Copy: Output that is displayed on the screen of a video display unit
 SWIFT: Society for Worldwide Inter-bank Financial Telecommunication
 Switch: In networks, a device that filters and forwards packets between LAN segments. LANs that
use switches to join segments are called switched LANs or, in the case of Ethernet networks,
switched Ethernet LANs.
 Scroll bar - Allows you to move around through your document.
 Shut down - To quit all applications and turn off the computer.
 Spam - unwanted repetitious messages, such as unsolicited bulk e-mail.
 Scanner - An input device that can copy a printed page into a computer‘s memory, thus doing
away with the need to type the copy.
 Screen saver - A program that changes the screen display while the user is away from the
computer.
 Server - A computer that manages a shared resources and provides a set of shared user services to
the clients.
 Search Engine - Software that searches, gathers and identifies information from a database based
on an index, keywords or titles.
 Sort - To arrange fields, records, or files in a predetermined sequence.
Surfing the Net - Browsing through various Web sites on the Internet in search of interesting things

 Trash - Place where you put files and folders that you want to delete or get rid of.
 Topology - The structure of the network, including physical connections such as wiring schemes
and logical interactions between network devices.
 Track - A ring on a disk where data can be written.
217

 Telnet - A protocol for remote computing on the internet that allows a computer to act as a remote
terminal on another machine, anywhere on the internet.
Page

 Touchpad - The device on a laptop computer that takes the place of a mouse.
 Touch screen technology - The technology that permits a user to perform a function simply by
touching the screen on an appropriate spot.
 TRACTOR-FEED-a pin-fed device for advancing continuous form paper through a Printer t
 Track ball-input device that controls the position of the cursor on the screen & is mounted near
the keyboard, the movement controlled by moving a ball.

 Uninterrupted Power Supply (UPS) - A Battery powered backup system that provides enough
electricity to a computer during a power outage so that a user can save files before shutting down
the computer.
 Universal Serial Bus (USB) - A common standard for connecting multiple peripherals to a
computer as needed.
 Upload - To transfer information from a client computer to a host computer.

 Virus - A piece of computer code designed as a prank or malicious act to spread from one
computer to another by attaching itself to other programs.

 WAP - Wireless Application Protocol is a specification for a set of communication protocol used
to allow wireless devices to access the internet and other utilities.
 Web browser - Software that permits a user with a click of a mouse to locate, display, and
download text, video, audio, and graphics stored in a host computer on the Web. The most
common Web browsers now in use are Internet Explorer, Google Chrome and Mozilla Firefox.
 Web site - One or more related pages created by an individual or an organization and posted on the
World Wide Web.
 Wi-Fi (Wireless fidelity) - A process that permits high-speed wireless transmission of data.
 Word processing - The electronic process of creating, formatting, editing, proofreading, and
printing documents.
 Workstation - A desktop computer that runs applications and serves as an access point in a local
area network.
 Weblog: This is publicly accessible personal journal for an individual. Similar to a personal diary,
but shared over the web. The activity of updating a blog is ―blogging‖ and someone who keeps a
218

blog is called as a ―blogger‖


Page
Z

 Zombie - A computer that has been hijacked by a cracker without the owner‘s knowledge and used
to perform malicious tasks on the Internet.
ZIP: Stands for Zone Information Protocol. This is an application that allows for the compression
of application file.

219

For more E-Books & Study material visit www.gcnayak.blogspot.com


Page
REFERENCES

 www.google.com

 www.wikipedia.com

 www.gktoday.in

 www.bankersadda.com

 www.mahendras.org

 www.bscacademy.com

 www.careerpower.com

 www.gcnayak.blogspot.com

 www.nptel.com

 Previous Competitive Exam Papers

 Data Communication & Computer Networking By Forouzen

 Objective Computer Awareness by BSC Publication

 Objective Computer Awareness by Arihant Publication

 Microsoft Shortcut Keys

For more E-books & Study materials stay in touch with


220

http://www.gcnayak.blogspot.com
Copyright 2015©Gopal Chandra Nayak
Page

You might also like