Professional Documents
Culture Documents
All PDF
All PDF
4- _______Translate data from form that humans understand to one that the computer can work
with.
a) Input device.
b) Output device.
c) Software.
5- A_______ is brain of a computer.
a) Input device.
b) Output device.
c) Central Processing Unit (CPU).
6- The CPU is comprised of three main parts:.
a) Input device, ALU and CU.
b) Output device, CU, and Primary Memory.
c) Registers, ALU, and CU.
7- _________is controls and co-ordinates computer components.
a) ALU.
b) CU.
c) Primary Memory.
8- _________is Executes all arithmetic and logical operations.
a) ALU.
b) CU.
c) Primary Memory.
9- _________ stores the data that is to be executed next.
a) ALU.
b) CU.
c) Registers.
10- _________ read the code for the next instruction to be executed.
a) ALU.
b) CU.
c) Registers.
11- _________ Increment the program counter so it points to the next instruction.
a) ALU.
b) CU.
c) Registers.
12- _________ Read whatever data the instruction requires from cells in memory..
a) ALU.
b) CU.
c) Registers.
13- _________ Provide the necessary data to an ALU or register.
a) ALU.
b) CU.
c) Registers.
14- _________ If the instruction requires an ALU or specialized hardware to complete, instruct the hardware to
perform the requested operation.
a) ALU.
b) CU.
c) Registers.
15- RAM is a_______.
a) ALU.
b) CU.
c) Registers.
d) Primary Memory.
16- ______________it can be promptly accessed by the processor as and when needed..
a) ALU.
b) CU.
c) RAM.
d) ROM.
17- RAM is a_______.
a) Random Access Memory.
b) Arithmetic Logic Unit.
c) Control unite.
d) Read Only Memory.
18- ROM is a_______.
a) Random Access Memory.
b) Arithmetic Logic Unit.
c) Control unite.
d) Read Only Memory.
19- ROM is a_______.
a) ALU.
b) CU.
c) Registers.
d) Primary Memory.
20- ___________ a permanent form of storage.
a) ALU.
b) CU.
c) ROM.
d) RAM.
21- ___________ stays active regardless of whether power supply to it is turned on or off.
a) ALU.
b) CU.
c) ROM.
d) RAM.
22- ___________ devices do not allow data stored on them to be modified.
a) ALU.
b) CU.
c) ROM.
d) RAM.
23- ___________ is a memory scheme within the computer system responsible for storing data on
a temporary basis.
a) ALU.
b) CU.
c) ROM.
d) RAM.
24- In___________ data will be erased once supply to the storage device is turned off.
a) ALU.
b) CU.
c) ROM.
d) RAM.
25- ___________ stores data randomly and the processor accesses these data randomly.
a) ALU.
b) CU.
c) ROM.
d) RAM.
26- In___________ you can access any memory cell directly if you know the row and column that
intersect at that cell.
a) ALU.
b) CU.
c) ROM.
d) RAM.
27- __________ Stores data and programs permanently.
a) Secondary Memory.
b) Primary Memory.
c) ROM.
d) RAM.
32- __________ are common types of optical media which can be read and recorded by such
drives.
a) CD, DVDs, and Blu-ray discs.
b) Flash Disk, and Blu-ray discs.
c) ROM and DVD.
d) RAM and CD.
33- CDs can store up to __________________.
a) 700 megabytes (MB).
b) 700 Kbytes (KB).
c) 7000 bytes (B).
d) 70 megabytes (MB).
34- DVDs can store up to __________________.
a) 8.4 megabytes (MB).
b) 8.4 Kbytes (KB).
c) 84 bytes (B).
d) 7.4 megabytes (MB).
39- ____________ is any piece of computer hardware equipment used to communicate the results
of data processing carried out by an information processing system.
a) Output device .
b) Input device.
c) Main memory.
d) Secondary Memory.
40- ____________ is converts the electronically generated information into human readable form.
a) Output device .
b) Input device.
c) Main memory.
d) Secondary Memory.
41- ____________ is a generic term for organized collections of computer data and instructions.
a) Software .
b) Hardware.
c) Main memory.
d) Secondary Memory.
42- Software often broken into.
a) system and application software .
b) Hardware and Software.
c) Main and Secondary software.
d) CD and DVD Software.
43- ______________ is responsible for controlling, integrating, and managing the individual
hardware components of a computer system.
a) system software .
b) Hardware and Software.
c) application software.
d) DVD Software.
44- ______ a virus attaches itself directly to a .exe or .com file and enters the device while its
execution.
a) Polymorphic Virus.
b) Multipartite Virus
c) Non-Resident Virus.
d) File Infector Virus.
45- ______ If it gets installed in the memory, it keeps itself hidden.
a) Polymorphic Virus.
b) Multipartite Virus
c) Non-Resident Virus.
d) File Infector Virus.
46- ______ If it gets installed in the memory, it keeps itself hidden.
a) Overwrite Virus.
b) Boot Sector Virus
c) Direct Action Virus.
d) File Infector Virus.
47- ______ is a type of virus that infects the boot sector of floppy disks or the Master Boot
Record (MBR) of hard disks.
a) Overwrite Virus.
b) Boot Sector Virus
c) Macro Virus.
d) Spacefiller Virus.
48- ______ is either overwrites the existing program or copies itself to another part of the disk.
a) Overwrite Virus.
b) Boot Sector Virus
c) Macro Virus.
d) Spacefiller Virus.
49- ______ can attack both, the boot sector and the executable file of an already infected
computer.
a) Overwrite Virus.
b) Multipartite Virus
c) Macro Virus.
d) Spacefiller Virus.
50- System software consists of an _____________ and ___________.
a) Operating system and some fundamental utilities.
b) Operating system and Software.
c) Fundamental utilities and application software.
d) CD and DVD Software.
51- ______________ is used to accomplish specific tasks other than just running the computer
system.
a) System software .
b) Hardware and Software.
c) Application software.
d) DVD Software.
52- Application software may consist of a _____________ or ___________.
a) single program or small collection of programs.
b) Operating system program or Software program.
c) Fundamental utilities or application program.
d) CD or DVD program.
53- The basic unit used in computer data storage is called______.
a) Bite.
b) Byte.
c) KiloByte.
d) MB.
140- ______ a virus attaches itself directly to a .exe or .com file and enters the device while its
execution.
a) Overwrite Virus.
b) Boot Sector Virus
c) Direct Action Virus.
d) File Infector Virus.
141- ______ a virus attaches itself directly to a .exe or .com file and enters the device while its
execution.
a) Overwrite Virus.
b) Multipartite Virus
c) Program File Virus.
d) File Infector Virus.
143- If a ___________ attacks your system, you are at risk of cyber threat..
a) Overwrite Virus.
b) Multipartite Virus
c) Macro Virus.
d) Spacefiller Virus.
160- ___________is software that uses encryption to disable a target’s access to its data until a
ransom is paid.
a) Ransomware,
b) Macro Virus.
c) Fileless Malware
d) File Infector Virus.
161- ___________doesn’t install anything initially, instead, it makes changes to files that are
native to the operating system.
a) Ransomware,
b) Macro Virus.
c) Fileless Malware
d) File Infector Virus.
162- ___________tracks a user’s surfing activity to determine which ads to serve them.
a) Adware,
b) Macro Virus.
c) Spyware
d) File Infector Virus.
163- ___________does not install any software on a user’s computer, nor does it capture
keystrokes.
a) Adware,
b) Macro Virus.
c) Spyware
d) File Infector Virus.
164- ___________disguises itself as desirable code or software.
a) Adware,
b) Macro Virus.
c) Spyware
d) Trojans.
165- ___________can take control of victims’ systems for malicious purposes.
a) Spyware
b) Trojans.
c) Adware,
d) Macro Virus.
166- ___________may hide in games, apps, or even software patches.
a) Macro Virus.
b) Spyware
c) Trojans.
d) Adware,
167- ___________target vulnerabilities in operating systems to install themselves into
networks.
a) Macro Virus.
b) Worms
c) Trojans.
d) Adware,
168- ___________is software that gives malicious actors remote control of a victim’s computer
with full administrative privileges.
a) Macro Virus.
b) Worms
c) Trojans.
d) Rootkits,
169- ___________is a type of spyware that monitors user activity.
a) Keyloggers.
b) Worms
c) Spyware.
d) Rootkits,
170- ___________have legitimate uses; businesses can use them to monitor employee activity
and families may use them to keep track of children’s online behaviors.
a) Keyloggers.
b) Worms
c) Spyware.
d) Rootkits,
171- ___________is a software application that performs automated tasks on command.
a) Keyloggers.
b) Bots.
c) Spyware.
d) Rootkits,
172- ___________is a type of malware with a single purpose.
a) Wiper.
b) Bots.
c) Spyware.
d) Rootkits,
173- ___________is one of the major antivirus software which is most used.
a) Keyloggers.
b) Spyware.
c) Bots.
d) McAfee.
174- ________ helps to perform different operations on a vast set of data.
a) Home Tab.
b) Page layout
c) Insert Tab.
d) Data Tab.
175- ________ helps to access data(s) from different sources as well, such as from Ms-Access,
from web, etc.
a) Review.
b) Page layout
c) Insert Tab.
d) Data Tab.
176- ________ provides the facility of thesaurus, checking spellings, translating the text, and
helps to protect and share the worksheet and workbook.
a) Review.
b) Page layout.
c) Insert Tab.
d) Data Tab.
177- ________ contains the commands to manage the view of the workbook, show/hide ruler,
gridlines, etc, freezing panes, and adding macros.
a) View.
b) Review.
c) Insert Tab.
d) Data Tab.
178- In Excel ______ sheets are already opened by default.
a) 1.
b) 2.
c) 3.
d) 4.
179- On the lowermost pane in Excel, you can find the ______of the current sheet.
a) name.
b) size.
c) color.
d) row.
180- On the left side of this sheet, the __________ sheets.
a) name of previous.
b) current.
c) new.
d) old.
181- To open a new workbook______.
a) Ctrl+N.
b) Ctrl+O.
c) Ctrl+S.
d) Ctrl+C.
182- To open a saved workbook ______.
a) Ctrl+N.
b) Ctrl+O.
c) Ctrl+S.
d) Ctrl+C.
183- To save a workbook ______.
a) Ctrl+N.
b) Ctrl+O.
c) Ctrl+S.
d) Ctrl+C.
184- To copy the selected cells ______.
a) Ctrl+V.
b) Ctrl+X.
c) Ctrl+S.
d) Ctrl+C.
185- To paste the copied cells ______.
a) Ctrl+V.
b) Ctrl+X.
c) Ctrl+S.
d) Ctrl+C.
186- To cut the selected cells ______.
a) Ctrl+W.
b) Ctrl+X.
c) Ctrl+V.
d) Ctrl+C.
187- To close the workbook ______.
a) Ctrl+W.
b) Ctrl+X.
c) Ctrl+V.
d) Ctrl+D.
188- To remove all the contents from the cell ______.
a) Delete.
b) Ctrl+X.
c) Ctrl+V.
d) Ctrl+D.
189- To print the workbook ______.
a) Ctrl+P.
b) Ctrl+X.
c) Ctrl+V.
d) Ctrl+D.
191- The ______function basically returns the row number for a reference.
a) ROW(X, ).
b) ROW( ,X).
c) ROWS( ).
d) ROW( ).
192- The ______ function is used to return the number of rows in a cell range.
a) ROW(Y, X).
b) ROW( ,X).
c) ROW( ).
d) ROWS( ).
193- The ______function basically returns the column number for a reference.
a) COLUMN(X, ).
b) COLUMN( ,X).
c) COLUMNS( ).
d) COLUMN( ).
194- ______ returns the number of columns for a given cell range.
a) COLUMN(X, ).
b) COLUMN( ,X).
c) COLUMN( ).
d) COLUMNS( ).
195- ______ returns the smallest value for a given cell range.
a) LARGE().
b) SMALL().
c) ROWS( ).
d) COLUMNS( ).
196- ______ returns the largest value for a given cell range.
a) LARGE().
b) SMALL().
c) ROWS( ).
d) VLOOKUP( ).
197- A______ is a mathematical expression that computes the value of a cell.
a) formula.
b) function.
c) percentage.
d) division.
198- A______ is predefined formulas that are already in Excel.
a) formula.
b) function.
c) percentage.
d) division.
199- ______ carry out specific calculations in a specific order based on the values specified as
arguments or parameters.
a) formula.
b) function.
c) percentage.
d) division.
200- ______ is the function to count the number of characters in a specific cell.
a) LEN.
b) TRIM.
c) DATE.
d) percentage.