Professional Documents
Culture Documents
Computer MCQ E-Book
Computer MCQ E-Book
Page |2
Web Browser
1. Documents in Microsoft One Drive can be edited using _____.
(a) online version of Microsoft office tools using browser
(b) installed version of Microsoft office tools
(c) both a & b
(d) none of them
Ans. c
6. A _____ is a document commonly written and is accessible through the internet or other
network using a browser?
a) Accounts
b) Data
c) Web page
d) Search engine
Ans. c
7. Which of the following is used to read HTML code and to render Webpage?
a) Web Server
b) Web Browser
c) Web Matrix
d) Web Heetson
Ans. b
10. A free open source software version of Netscape was the developed called ______.
a) Opera Mini
b) IE
c) Google Chrome
d) Mozilla
Ans. d
11. Internal name for the old Netscape browser was _____.
a) Mozilla
b) Google Chrome
c) Opera Mini
d) IE
Ans. a
15. Which of the following was the first web browser to handle all HTML 3 features?
a) Cello b) Erwise
c) UdiWWW d) Mosaic
Ans. c
17. Which of the following is the oldest web browser still in general use?
a) Lynx
b) Safari
c) Internet Explorer
d) Navigator
Ans. a
20. Which of the following browsers were/are available for the Macintosh?
a) Opera
b) Safari
c) Netscape
d) All of these
Ans. d
21. What is the name of the browser developed and released by Google?
a) Chrome
b) GooglyGoogle
c) Heetson
d) Titanium
Ans. a
Explanation: Google released its own www browser in late 2008. It‟s free and the version for
Windows XP and Vista was released first. It provides enhanced security features, it addition to a
speedy interface.
22. Which of the following are alternative names for mobile browsers?
a) microbrowser
b) wireless internet browser
c) minibrowser
d) All of these
Ans. d
23. Apple, Inc. joined the “browser wars” by developing its own browser. What is the name of this
browser?
a) Opera
b) NetSurf
c) Internet Explorer
d) Safari
Ans. d
Page |7
24. Some web browsers are intended for specific audiences. What is the target group of the ZAC
Browser?
a) disgruntled postal workers
b) autistic children
c) hardcore gamers
d) librarians
Ans. b
Explanation: The acronym “ZAC” stands for “Zone for Autistic Children”. It was developed by the
grandfather (John LeSieur) of an autistic child. The features are specifically designed to enhance
the web browsing experience of autistic children and adolescents. It is available on the PC
platform.
30. Which of the following browser has high speed browsing capacity ?
a) Chrome b) Opera
c) UC browser d) Lynx
Ans. b
Page |8
32. Software which allows user to view the webpage is called as ______.
a) Internet Browser b) Operating System
c) Website d) Interpreter
Ans. a
36. Which of these web browser has the largest market share presently, across all platforms?
a) Edge
b) Chrome
c) Safari
d) Firefox
Ans. b
Search Engine
1. We get list of sites after typing a word in search bar called _______.
a) Key Phrase
b) Single Word
c) Heetson
d) Sonu
Ans. a
2. The search results are generally presented in a line of results often referred to as _______
a) Category List
b) Tag list
c) search Engine Results Pages
d) Search Engine Pages
Ans. c
4. Web search engines stores information about many web pages by a ______.
a) Web indexer
b) Web Crawler
c) Web Organizer
d) Web Router
Ans. b
6. Search engine optimization is the process of _______ of a website or a web page in a search
engine‟s search results.
a) Affecting the visibility
b) None of these
c) Generating Cached files
d) Getting Meta Tags
Ans. a
8. SEO is to improve the volume and ______ to a web site from search engines.
a) Look and feel b) Advertisement
c) Quality of traffic d) None of these
Ans. c
P a g e | 11
14. If you have a rough idea of your search in terms of what type of category it might fall into, it is
best to use a:
a) meta search engine
b) search engines such a Google
c) Formula for the keywords you enter
d) subject directory
Ans. d
16. search engines also maintain _____information by running an algorithm on a web crawler.
a) real time b) Google c) www d) heetson
Ans. a
P a g e | 12
23. Google was originally developed in 1997 by ________, Sergey Brin, and Scott Hassan
a) Larry Page b) Mark jukerbarg
c) Mike Tyson d) Allen turing
Ans. a
27. Clicking on links from untrusted search engines might take an innocent user to ______.
(a) video sharing websites
(b) audio streaming web sites
(c) social media websites
(d) hackers web site which extracts login ID and password
Ans. d
29. The first tool used for searching content on the Internet was _____
a) Archie
b) Google
c) Yahoo
d) Bing
Ans. a
Microprocessor
Microprocessor is the chip that performs arithmetic and logical operations based on given
input data and instructions and sends out the results of such processing operation.
Microprocessor contains huge number of electronic devices like transistors, capacitors,
resistors and inductors embedded in neatly etched circuitry.
Microprocessor is the brain of computer since all other parts of computer simply coordinate
with this one chip.
Processor can complete one operation per clock cycle. The number of clock cycles per
second is called the speed of the processor, measured in kHz (1 kHz = thousand cyclesper
second) or FLOPS (FLoating Point OPerations per Second).
Registers in microprocessor hold the data required for processing.
Control unit of the microprocessor directs the work to be carried out by other parts of a
computer. It coordinates with the memory registers and Arithmetic and Logic Unit
tocomplete processing.
Arithmetic and Logic Unit (ALU) is the part of microprocessor circuitry which does the
number crunching and comparison works.
Parallel processing in microprocessors is made possible through multiple processor cores
cast in a single chip.
Multi-core processors gain higher speed if proper multi-processing algorithms are combined
with multi-core processors.
Small memory called cache memory is etched on board the micro-processor.
P a g e | 15
1. FPGA means
a) Field Programmable Gate Array
b) Forward Programmable Gate Array
c) Forward Parallel Gate Array
d) Field Parallel Gate Array
Ans. a
6. What is SIM?
a) Select interrupt mask b) Sorting interrupt mask
c) Set interrupt mask d) None of these
Ans. c
8. The length of bus cycle in 8086/8088 is four clock cycle, T 1, T2, T3, T4 and an indeterminate
number of wait clock cycles denoted by Tw. The wait states are always inserted between
a) T1& T2 b) T2& T3 c) T3& T4 d) T4& T5
Ans. c
9. Which one of the following circuits transmits two messages simultaneously in one direction
a) Duplex
b) Diplex
c) Simplex
d) Quadruplex
Ans. b
P a g e | 16
14. A good assembly language programmer should use general purpose registers rather than
memory in maximum possible ways for data processing. This is because:
a) Data processing with registers is easier than with memory
b) Data processing with memory requires more instructions in the program than that with registers
c) Of limited set of instructions for data processing with memory
d) Data processing with registers takes fewer cycles than that with memory
Ans. d
16. The processor status word of 8085 microprocessor has five flags namely:
a) S, Z, AC, P, CY
b) S, OV, AC, P, CY
c) S, Z, OV, P, CY
d) S, Z, AC, P, OV
Ans. a
17. What are the sets of commands in a program which are not translated into machine
instructions during assembly process, called?
a) Mnemonics b) Directives c) Identifiers d) Operands
Ans. b
P a g e | 17
19. Both the ALU and control section of CPU employ which special purpose storage location?
a) Buffers
b) Decoders
c) Accumulators
d) Registers
Ans. c
21. The register which holds the information about the nature of results of arithmetic and logic
operations is called as
a) Accumulator
b) Condition code register
c) Flag register
d) process status register
Ans. c
22. A bus connected between the CPU and main memory that permits transfer of information
between main memory and the CPU is known as
a) DMA bus
b) Memory bus
c) Address bus
d) control bus
Ans. b
24. The first microprocessor to include virtual memory in the intel microprocessor family is
a) 80286
b) 80386
c) 80486
d) Pentium
Ans. a
P a g e | 18
30. How many buses are connected as part of the 8085A microprocessor?
a) 2 b) 3 c) 5 d) 8
Ans. b
31. The microprocessor can read/write 16 bit data from or to ____
a) Memory
b) I/O device
c) Processor
d) Processor
Ans. a
45. Instruction providing both segment base and offset address are called _____
a) Below type
b) far type
c) low type
d) high type
Ans. b
46. The microprocessor determines whether the specified condition exists of not by testing the ___
a) Carry flag
b) conditional flag
c) common flag
d) sign flag
Ans. b
48. The pin of minimum mode AD0-AD15 has _____ data bus.
a) 4 bit b) 20 bit
c) 16 bit d) 32 bit
Ans. c
P a g e | 21
52. In max mode, control bus signal S0, S1 and S2 are sent out in ____ form
a) Decoded
b) encoded
c) shared
d) unshared
Ans. b
53. The ___ bus controller device decodes the signals to produce the control bus signal
a) Internal
b) Data
c) External
d) Address
Ans. c
54. Primary function of memory interfacing is that the ______ should be able to read from and
write into register
a) Multiprocessor
b) Microprocessor
c) dual processor
d) coprocessor
Ans. b
55. Memory is an integral part of a _____ system
a) Supercomputer b) Microcomputer
c) mini computer d) mainframe computer
Ans. b
56. _____ has certain signal requirements write into and read from its registers
a) Memory b) Register
c) Both A and B d) control
Ans. a
P a g e | 22
69. A microprocessor is a ____ chip integrating all the functions of a CPU of a computer
a) multiple
b) single
c) double
d) triple
Ans. b
Bluetooth
1. The technology which permits data transmission between devices like computers, mobile
phones, tablets, headsets, etc. is called _____ .
(a) bluetooth
(b) coaxial cable
(c) fibre optic cable
(d) twisted pair cable
Ans. a
3. Bluetooth is a ____ technology that connects devices (called gadgets) in a small area.
a) wired LAN
b) wireless LAN
c) VLAN
d) none of these
Ans. b
15. What is one of the feature that make Bluetooth difference from other wireless technologies?
a) long-distance wireless capabilities
b) inability to transfer voice and data between battery-operated mobile devices
c) high bandwidth wireless capabilities
d) low power consumption
Ans. d
16. Which of the following is NOT a device that is likely to use Bluetooth technology?
a) High-speed router b) PDA c) toy d) cell phone
Ans. a
P a g e | 26
19. Which of the following is NOT true connecting Bluetooth technology and digital cameras?
a) Concord EyeQ is an example of a digital camera with Bluetooth capabilities.
b) it works well for all sizes of image files-large and small
c) it allows wireless transfer between camera and cell phone
d) It is great for mobile professionals such as real estate agents and appraisers.
Ans. b
28. A wireless technology built in electronic gadgets used for exchanging data over short
distances is ?
a) Bluetooth
b) Wifi
c) Modem
d) USB
Ans. a
34. Unauthorised access of information from a wireless device through a Bluetooth connection is
called _____
a) bluemaking
b) bluesnarfing
c) bluestring
d) bluescoping
Ans. b
Keyboard
The keyboard of a computer is almost similar to a typewriter with a few differences. The
keyboard has all the alphabets and (0-9) numeric digits on upper line with some control
characters like @,#, $,% written above the numeric digits. On the right side of the keyboard
is a numeric keypad with all numeric digits and calculation symbols.
2. To close a selected drop-down list, cancel a command and close a dialog box, key used is
a) Esc key
b) End key
c) Enter key
d) Alt key
Ans. a
3. Which keys allows user to enter frequently used operations in a single key stroke?
a) Function keys
b) Cursor control keys
c) Trackball
d) Control keys
Ans. a
6. The ____ key and the ____ key can be used in combination with other keys to perform
shortcuts and special tasks.
a) Control, Alt
b) Function toggle
c) Delete, Insert
d) Caps Lock, Num Lock
Ans. a
7. Which key is used in combination with another key to perform a specific task?
a) Function
b) Control
c) Arrow
d) Space bar
Ans. b
P a g e | 31
10. To make the number pad act as directional arrows, you press the _____ key.
a) num lock
b) caps lock
c) arrow lock
d) alt
Ans. a
12. Which device of computer operation dispenses with the use of the keyboard?
a) joystick b) Light pen c) Mouse d) Touch
Ans. c
13. Which among the following is the most common device that accepts letters, numbers and
command from a user?
a) Optical Mouse
b) Sensitive Screen or touch screen
c) Keyboard
d) USB
Ans. c
14. What type of keyboard is used in fast food restaurants, offices and shops?
a) Numeric keypads
b) Numeric keyboard
c) Concept keyboard
d) Concise keyboard
Ans. c
16. There are different types of keys which cannot work independently. Which one of the following
keys cannot work independently?
a) Delete key b) Space bar key
c) Alt key d) Enter key
Ans. c
19. The ______ button moves the cursor to the next predetermined stop location.
(a) space bar (b) enter
(c) backspace (d) tab
Ans. b
21. The _____ button takes a screen shot and copies it to clipboard or saves it to a file.
(a) caps lock (b) print screen (c) scroll lock (d) pause/break
Ans. b
24. The group of number keys and basic arithmetic operators placed on the left side of a keyboard
is called ______.
(a) number pad
(b) note pad
(c) arrow keys
(d) cursor controls
Ans. a
P a g e | 33
26. The ______ keys can move the cursor up, down, left or right.
(a) num lock (b) arrow
(c) scroll lock (d) Esc
Ans. b
27. The _______ key moves out of current screen or terminates current operation.
(a) num lock (b) arrow
(c) scroll lock (d) Esc
Ans. d
28. The _______ key helps to access alternate character of each key (e.g. ! by pressing 1, @ by
pressing 2, etc.).
(a) num lock (b) arrow
(c) shift (d) Esc
Ans. c
30. The series of keys named F1 ... F12 are called _______ .
(a) function keys (b) scroll keys
(c) number keys (d) navigation keys
Ans. a
32. The Insert, Delete, Home, End, Page Up and Page Down keys are placed above _____.
(a) arrow keys
(b) number lock
(c) function keys
(d) scroll lock
Ans. a
34. Most of the shortcut keys are designed to use _____ key along with one or two characters.
(a) Ctrl (b) Alt (c) both a & b (d) none of them
Ans. c
Computer Software
1. Computer servers are used in applications.
(a) online reservation of tickets
(b) e-commerce
(c) tracking of consignments
(d) all of them
Ans. d
2. Your operating system will detect and install the appropriate device drivers for this type of
device:
a) Plug and play
b) Plug and go
c) Plug and continue
d) Plug and commence
Ans. a
3. The component which makes a computer to work through commands is called _____.
(a) software (b) hardware
(c) malware (d) junkware
Ans. a
4. Software ______.
(a) consumes power through hardware
(b) is inferred through the working of hardware
(c) controls the hardware
(d) all of them
Ans. d
5. The component of computer which is not physically accessible, but can be realized through its
working is called _______.
(a) hardware (b) software
(c) RAM (d) port
Ans. b
8. _______ schedules processor time in such a way as to allow the user to feel that may programs
are running at the same time.
(a) application software
(b) operating system
(c) virus
(d) malware
Ans. b
P a g e | 36
9. ______ schedules processor time and handles concurrency and parallel processing using
multiple processor cores.
(a) application software
(b) virus
(c) malware
(d) operating system
Ans. d
10. ______ allots memory for each program and frees memory when it is no longer needed for a
program.
(a) application software
(b) virus
(c) malware
(d) operating system
Ans. d
11. The core of the operating system which controls all hardware and application software, but
does not directly interact with the users is called _____ .
(a) kernel (b) shell
(c) sap (d) heetson
Ans. a
12. A layer of application software available for the user to interact with operating system kernel is
called ______ .
(a) kernel (b) shell
(c) sap (d) heart
Ans. b
13. After inserting the Windows installation media (like CD, DVD or pen drive), ________ message
is displayed.
(a) Press any key to boot from CD/ DVD ...
(b) Press Ctrl+Alt+Delete
(c) Press left button of mouse
(d) Press centre button of mouse
Ans. a
14. When Windows loads during installation, _____ are to be chosen first.
(a) keyboard layout
(b) language selection for installation
(c) both a & b
(d) neither a nor b
Ans. c
15. When the menu for managing hard disk partitions is displayed, _______ options help to create,
delete and format partitions.
(a) New
(b) Delete
(c) Format
(d) all of them
Ans. d
P a g e | 37
17. Durign installation of Windows, the computer ______ after copying files, installing features.
(a) reboots
(b) keeps on processing
(c) keeps on beeping
(d) plays music
Ans. a
18. During installation of Windows, user names and passwords are entered ______ the operating
system gets fully ready.
(a) before
(b) after
(c) only after
(d) subsequent to
Ans. a
19. After completing installation of Windows, _______ are to be installed for making the computer
safe and productive.
(a) anti-virus
(b) Office package
(c) Adobe Reader and other application software packages
(d) all of them
Ans. d
22. A term means that the application software is priced separately from the computer hardware is
called
a) Unbundled
b) Bundled
c) Utility
d) None of these
Ans. a
P a g e | 38
25. Load address for the first word of the program is called
a) Linker address origin
b) Load address origin
c) Phase library
d) Absolute library
Ans. b
26. A display listing of program options which users can select, is called
a) Icons
b) Options
c) Selection
d) Menu
Ans. d
29. What is the name of the software system which combines many independent functions into
one package?
a) Knowledge based system b) Multi adjustment
c) Integrated system d) Expert system
Ans. c
30. What is the name given to the ability of a word processing that fit whole words on any line?
a) Word wrap b) Clip art
c) Reformatting d) Micro spacing
Ans. a
P a g e | 39
31. Some software packages attempt to encode the knowledge and decision rules of human
specialist in order to use them for making their own decisions. By what name are such packages
known?
a) Artificial intelligence package b) Expert system
c) Expert system shell d) knowledge based
Ans. b
35. Specialized program that allows the user to utilize in specific application is classified as
a) relative program
b) application programs
c) relative programs
d) replicate programs
Ans. b
37. Program which is readily available for computer users as a part of software package is
classified as
a) library program b) program library
c) software library d) directory library
Ans. a
38. Process to exit from computer by giving correct instructions such as „EXIT‟ is classified as
a) log in b) process out
c) process in d) log out
Ans. d
P a g e | 40
41. If the program can cope the data errors, such programs can be termed as
a) robust
b) reliable
c) unreliable
d) stable functioning
Ans. a
42. Commercial organization specializing in the preparation and design of the software package is
classified as
a) library house
b) software houses
c) program houses
d) directory houses
Ans. b
43. Programs are fully tested and documented properly before including it into
a) library
b) directory
c) package
d) database
Ans. a
44. Program which is used to produce pictures, text and to organize it in newspaper is classified
as
a) text publishing package
b) desktop publishing package
c) experimental package
d) organizing publishing package
Ans. b
45. Several programs run at the same time and storage is shared especially in
a) microcomputers b) mainframe computers
c) inquiry computers d) dump computers
Ans. b
46. program which exactly perform the operations that its manual says is classified as
a) unreliable b) unstable functioning
c) robust d) reliable
Ans. d
P a g e | 41
47. Special set of characters that computer associates with specific user identification is classified
as
a) password b) identify code
c) inquiry code d) dump code
Ans. a
48. The system programs which performs one simple task are classified as
a) utility programs
b) function program
c) compiling program
d) inquiry program
Ans. a
50. Program packages that allows program users to design data files and select information are
called
a) file management
b) file inquiry
c) database package
d) all of these
Ans. d
51. Collection of useful working routines and programs that are only available to users with
authorization is classified as
A) directory library
b) library package
c) program library
d) software library
Ans. c
52. Program used to transfer contents onto a printer from VDU screen is classified as
a) utility dump
b) screen dump
c) function dump
d) inquiry dump
Ans. b
55. Slots in the spreadsheet that can be copied to other slots are classified as
a) relative slots b) replicate slots
c) complicate slots d) column slots
Ans. b
56. Typing of words by keyboard to drive program is done with the help of
a) menu
b) command
c) function words
d) editor
Ans. b
58. Program which produces experimental results for biologist research can be classified as
a) specialized program
b) systematic programs
c) organized programs
d) experimental programs
Ans. a
59. Number and name system which uses to identify the user is called
a) user identification
b) operating identification
c) system identification
d) temporary identification
Ans. a
60. Slots in the spreadsheet whose formula is not exactly copied are classified as
a) complicate slots
b) column slots
c) relative slots
d) replicate slots
Ans. c
61. Process of checking the software, suitability for any particular application is classified as
a) evaluation of software
b) checking of software
c) directory of software
d) database of software
Ans. a
P a g e | 43
63. ____ is a software whose programming code is owned by the original developer but it is made
available free to the general public, who is encouraged to experiment with the software, make
improvements, and share the improvements with the user community.
a) Freeware b) Shareware
c) Open Source d) None of these
Ans. c
64. ____ allows both professional and home users to work with graphics, videos, and audios.
a) Desktop Publishing Software
b) Project Management System
c) Presentation Graphics Software
d) Graphics and Multimedia Software
Ans. d
65. ______ is a software developed by software publisher or an individual who retains ownership
of the product and make it available for a small contribution fee.
a) Freeware
b) Shareware
c) Open source
d) Heetson
Ans. b
66. ______ enables users to perform different type of activities and work that computers were
designed for.
a) System software
b) Application software
c) Device software
d) None of these
Ans. b
68. _____ software allows users to create impressive documents that include text, drawings,
photographs and various graphics elements in full color.
a) Word Processing
b) Spreadsheet
c) Desktop Publishing
d) Presentation Graphics
Ans. c
P a g e | 44
69. An _____ allows a user to touch up, modify and enhance image quality by changing color,
cropping, resizing, eliminating red-eye effect from photographic.
a) video editing software b) Wordprocessing Software
c) Spreadsheet Software d) Image Editing Software
Ans. d
75. Which of the following system software resides in main memory always?
a) Loader
b) Linker
c) Text editor
d) Assembler
Ans. a
81. The operating system & driver software are categorized under ______ software.
(a) system (b) application
(c) malware (d) junkware
Ans. a
82. The software tools required for various types of productive works like preparation of
documents, spreadsheets, playing audio/video, browsing Internet, etc. are categorized under
_______ software.
(a) system
(b) application
(c) malware
(d) junkware
Ans. b
83. Operating system uses a special software called _______ to initialize, operate and control
hardware.
(a) conductor
(b) Ethernet controller
(c) driver
(d) SMPS
Ans. c
86. Process is
a) program in High-level language kept on disk
b) contents of main memory
c) a program in execution
d) a job in sencondary memory
Ans. c
87. program provide the users with the grid of rows and columns is classified as
a) spreadsheet
b) column grid
c) rows grid
d) reliability grid
Ans. a
88. Programs written by programmers to help users to solve there respective tasks are considered
as
a) software
b) software package
c) database packages
d) file packages
Ans. a
89. Process of gaining access to a computer by giving correct user identification is classified as
a) process in
b) log out
c) log in
d) process out
Ans. c
90. The software which controls the general operations of the computer system is classified as
a) dump programs
b) function system
c) operating system
d) inquiry system
Ans. c
P a g e | 47
Motherboard
7. In motherboard, ___ chipset takes care of data transfer to and from the processor.
(a) Southbridge (b) Eastbridge
(c) Northbridge (d) Westbridge
Ans. c
8. In motherboard, _______ chipset takes care of data transfer to and from the secondary storage
devices (like hard disk, CD/DVD drive, etc.).
(a) Southbridge (b) Eastbridge (c) Northbridge (d) Westbridge
Ans. a
11. Which type of system board is the MOST likely candidate for processor upgrading if you want
maximum performance and future compatibility?
a) ML
b) PCI
c) ISA
d) EISA
Ans. b
14. Which of the following handles the interconnection between most of the devices and the CPU?
a) Northbridge b) RAM c) ROM d) Southbridge
Ans. d
P a g e | 49
15. Where does the motherboard store the keyboard controller support program?
a) DRAM
b) hard drive
c) RAM
d) ROM chip
Ans. d
16. Which chip acts as a clock to keep the current date and the time?
a) CMOS
b) DVRAM
c) RAM
d) ROM
Ans. a
17. Which chip is used to store information that describes specific device parameters?
a) BIOS b) CMOS c) ROM d) System BIOS
Ans. b
18. How can you easily clear the CMOS, including clearing the password?
a) Unplug the PC
b) Unplug the PC and remove the CMOS battery
c) Issue a ClearCMOS command from the command line
d) This can‟t be done
Ans. b
20. Several lines at the end of POST are used to find the operating system. What is this called?
a) CMOS
b) Flash ROM
c) bootstrap loader
d) boot.ini
Ans. c
22. When seeking to upgrade for a particular motherboard what do you need to know?
a) memory b) hard drive
c) make & model d) dimm
Ans. c
24. The communication device that allows the computer to access a network is called a ____card.
a) modem
b) video
c) sound
d) network
Ans. d
25. A computer electronic circuit with transistors and other electronic components on a small
silicon chip is called a(n)…..
a) workstation b) CPU c) magnetic disk d) integrated circuit
Ans. d
27. A personal computer uses a number of chips mounted on a circuit board called
a) Microprocessor
b) System Board
c) Daughter Board
d) Mother Board
Ans. d
34. In a desktop computer, the board containing micro-processor, RAM and other components is
called _____board.
(a) graphics
(b) mother
(c) white
(d) None of these
Ans. b
39. Boards that are used to connect additional devices to the motherboard are called
a) Bay cards
b) Port cards
c) Expansion cards
d) Bus cards
Ans. c
P a g e | 52
Floppy Disk
Fixed Disk drive is equipped with a permanent disk or disk pack. Exchangeable disk drives provide
for easy interface of disk or packs. Disk made from synthetic plastic like material are flexible and
therefore called floppy disk or floppy diskettes. These are cheaper and more rugged and are
designed so that they can be portable. Each floppy is packed inside a protective envelope which
gives it rigidity and cleans as it rotates.
Disks come in varying sizes – rigid disks are made of four standard diameters. Large mainframes
and mini computers normally use 14 inches (365 mm) rigid disks in packs of upto 12, small
computers use 8”, 5.25” and 3.5” diameter fixed disks also known as Winchesters Disks.
The floppy disk gets its name from the facts that it is made of plastic material. This plastic base is
coated with iron-oxide recording substance. Data is recorded as tiny invisible magnetic stops on
this coating. This is covered with plastic jacket for safety purposes. The functioning of a floppy is
similar to a record player. If you take out actual media out of plastic jacket, you will find it similar to
audio record with number of tracks on it. You can get data randomly. Each floppy has one index.
You can see a hole in the floppy. This is the index where address of data is stored. A floppy is
divided into tracks and sectors, each sector can hold 512 bytes of information.
Questions
3. The magnetic recording technique used for storing data onto the disks (floppy disks) is called
a) return to zero
b) non-return to zero
c) return to zero and Non-return to zero
d) none of the mentioned
Ans. b
5. The Double Density Double sided disks on each side are organized with
P a g e | 54
a) 20 tracks
b) 30 tracks
c) 40 tracks
d) 50 tracks
Ans. c
11. In floppy disk, the small hole that enables the drive to identify the beginning of a track and its
first sector is
a) inner hole
b) key hole
c) index hole
d) heetson
Ans. c
b) 3.5”
c) 5.5”
d) 5.25”
Ans. c
13. Which of the following helps to protect floppy disks from data getting accidentally erased?
a) Access notch
b) Write-protect notch
c) Entry notch
d) Input heetson
Ans. b
CPU
1. ______is used by the CPU to communicate with devices that are contained within the computer,
through physical connections such as cable or printed circuits.
a) Bus b) Control Bus c) Program d) Stack pointer
Ans. b
10. The part of micro-processor which performs number crunching and logical comparisons is
called _______ .
(a) Arithmetic and Logic Unit (ALU)
(b) Register
(c) Cache
(d) timer
Ans. a
12. The part of micro-processor used for storing values needed for next cycle of processing is
called ______ .
(a) Arithmetic and Logic Unit (ALU)
(b) Register
(c) clock
(d) timer
Ans. b
P a g e | 57
13. The part of micro-processor holding data which is needed for forthcoming cycles of processing
is called ______ .
(a) Arithmetic and Logic Unit (ALU)
(b) Register
(c) Cache
(d) timer
Ans. c
14. The part of micro-processor which maintains a clock and induces each cycle of processing
through a pulse is called ______.
(a) Arithmetic and Logic Unit (ALU)
(b) Register
(c) Cache
(d) timer
Ans. d
15. The number of floating point operations carried out by a micro-processor in one second is
called ______.
(a) FLOPS (b) timer
(c) clock (d) frequency
Ans. a
16. The number of cycles of operations performed by a processor per second is called its _____.
(a) bus speed
(b) connection speed
(c) clock speed
(d) baud rate
Ans. c
17. Whereas clock speed is the gross number of operations performed by a processor per second,
FLOPS represents ________ of processor per second.
(a) wasted time
(b) effective out turn
(c) wasted cycles
(d) clock speed
Ans. b
18. A floating point operation may require ______ clock cycle to complete.
(a) just one
(b) less than one
(c) zero
(d) more than one
Ans. d
21. From the following which is known as the administrative section of the computer system?
a) Control Unit
b) Input Unit
c) RAM
d) Central Processing Unit
Ans. d
22. Component of CPU which is responsible for comparing the contents of two pieces of data is
a) ALU
b) CU
c) Memory
d) Register
Ans. a
23. When arithmetic, logic and control unit of a computer are combined into a single unit, it is
known as
a) Central processing unit
b) memory unit
c) I/O unit
d) Operating unit
Ans. a
27. The part of the CPU that access & decodes program instructions, & coordinates the flow of
data among various system components is the
a) Control unit b) ALU
c) Megahertz d) Motherboard
Ans. b
31. Part of CPU which coordinates all functions of computer & other components
a) Mother board
b) Coordination board
c) Control unit
d) ALU
Ans. c
33. This components is required to process data into information & consist of integrated circuits
a) CPU
b) Hard disk
c) RAM
d) ROM
Ans. a
37. The technology that stores only the essential instructions on a microprocessor chip and thus
enhances its speed is referred to as______
a) RISC b) ALU
c) Logo d) Command
Ans. a
42. In the CPU of a computer, _______ delivers power supply to all the components at appropriate
voltages.
(a) Hard Disk
(b) Mother Board
(c) Switch Mode Power Supply (SMPS)
(d) DVD drive
Ans. c
MS Publisher
1. Which menu item do I use to format my font styles and paragraph settings?
a) File
b) Home
c) Insert
d) View
Ans. b
6. How could you send out a colorful message about an upcoming company picnic?
a) create a flyer in Publisher b) create flyer in PowerPoint
c) create a trl fold brochure in Publisher d) create a flyer in Excel
Ans. a
7. You want an image to go behind the text on your brochure, which command do you use?
a) Align
b) Bring forward
c) Send backward
d) Rotate
Ans. c
9. MS Publisher has many procreated documents that you can edit. These are called…
a) edits
b) templates
c) slides
d) images
Ans. b
11. Heetson wants his neighborhood babysitting clients to remember his and have quick access to
his phone number whenever they are in need of a babysitter. Which publication should she use?
a) brochure
b) business card
c) newsletter
d) flyer
Ans. b
12. Heetson wants to advertise the upcoming blood drive at his school. Which publication should
she use?
a) brochure
b) business card
c) newsletter
d) flyer
Ans. d
14. SONU is the communications specialist for his Boy Scout troop. He wants to send monthly
updates to the members of his troop and their parents about recent activities, make
announcements about honors some of the members have received, and provide information about
upcoming events. Which publication should he use?
a) newsletter
b) business card
c) letterhead
d) flyer
Ans. a
15. The line spacing button is located in the ____ group on the Home tab/ menu item
a) Styles b) Paragraph
c) Font d) Clipboard
Ans. b
P a g e | 63
16. You can change the color schema of a publication file by selecting a schema from the ____
gallery.
a) Picture
b) Task
c) Customize
d) Color
Ans. c
17. If you want to remove a portion of the picture, you can use the ___ tool.
a) Cut
b) Copy
c) Crop
d) Delete
Ans. c
18. What arrow do you look for when you want to add a column or a row to a table
a) White arrow
b) Solid black arrow
c) Double sided arrow
d) Back arrow
Ans. b
20. What do you do if a text is in front of a picture and you want it behind?
a) Move it behind text
b) Delete it
c) Send backward
d) Move it away from the picture
Ans. c
23. A graphic may be ____ to remove a portion and customize for a publication.
a) Cropped
b) Cut
c) Purged
d) Trimmed
Ans. a
25. This Spelling command in Publisher will indicate possible misspellings by a _____ under the
word
a) Green dashed line
b) Blue outline
c) Yellow dotted line
d) Wavy red line
Ans. d
27. At the top of the window, you will see the name of the current publication you have open.
a) Quick Access Toolbar
b) Title bar
c) Status bar
d) Zooming Scale
Ans. b
P a g e | 65
Mouse
2. Hand-held device which is used to pick options that are displayed on a computer screen is
known as
a) keyboard
b) mouse
c) joystick
d) stylus pen
Ans. b
5. Which of the following type of mouse contain a ball on its underside and sensors to detect
direction of ball movement?
a) Mechanical mouse
b) Opto-mechanical mouse
c) Optical mouse
d) None of these
Ans. a
9. The ______ helps to move the cursor on screen and point at specific icons.
(a) scanner (b) mouse
(c) keyboard (d) printer
Ans. b
10. Normally, pressing the _______ button of mouse opens a context menu.
(a) left (b) right
(c) centre (d) bottom
Ans. b
12. The computer can be configured to open a program on ______ the icon using mouse.
(a) single clicking
(b) double clicking
(c) both a & b
(d) neither a nor b
Ans. b
14. Which device of computer operation dispenses with the use of keyboard?
a) Joystick
b) Light pen
c) Mouse
d) Touch
Ans. c
15. Optical mouse was developed by ______ in 1999. It uses a light beam to detect the
movement.
a) Apple b) Microsoft
c) IBM d) TATA
Ans. b
P a g e | 67
16. Identify the computer device which has resemblance with an animal.
a) Joystick b) CD
c) Mouse d) Keyboard
Ans. c
17. The word „Mouse‟ is very much popular in computer world. The word „Mouse‟ is originated at
the
a) Stanford Research Institute
b) American Research Institute
c) Spanish Research Institute
d) Cambridge Research
Ans. a
18. The mouse pointer moves erratically, what is the possible cause? The mouse
a) ball is dirty
b) is not connected
c) driver is not installed properly
d) has incorrect IRQ setting
Ans. a
25. The most common input device to control the movement of the cursor on the screen?
a) Arrow keys
b) Mouse
c) Joysticks
d) Plotter
Ans. b
26. Normally, pressing the _______ button of mouse once or twice on an icon opens the program
associated with that icon.
(a) left
(b) right
(c) centre
(d) bottom
Ans. a
27. The wheel located between the two standard buttons on a mouse is used to ____
a) Click on web pages
b) Shut down
c) Click and select item
d) Scroll
Ans. d
E-mail
1. How can you tell the email that you have read from the email that you have not read?
a) The unread mail will be on top
b) The unread mail will be on botton
c) The unread mail will be bold
d) The unread mail will be blue
Ans. c
8. Transmission and delivery of information containing text, image, video, documents etc. to
targeted recepient(s) over the Internet is called _______ .
(a) email
(b) world wide web
(c) e-commerce
(d) social media
Ans. a
12. The user name and email server parts of an email address are separated by _______ symbol.
(a) @ (b) # (c) $ (d) &
Ans. a
15. An image displayed on web page can be ________ to download the file.
(a) right click and choose save image as
(b) left click
(c) double click
(d) press delete button
Ans. a
16. Electronic communication between 2 persons having unique identifiers over the Internet is
called _______ .
(a) India post
(b) Speed post
(c) Registered post
(d) email
Ans. d
17. ______ is a technology that allows you to send and receive messages over the Internet
without the delay of traditional postal services.
(a) India post
(b) Speed post
(c) Registered post
(d) email
Ans. d
P a g e | 71
22. The email ID of the secondary recipient of email is entered in ______ field.
(a) To (b) CC
(c) BCC (d) Subject
Ans. b
23. The email ID of the anonymous recipient of email is entered in ______ field.
(a) To (b) CC (c) BCC (d) Subject
Ans. c
26. An email sent from unknown persons for improving the sale, image, appeal or other
characteristics of a product is called _____.
(a) Junk (b) Important (c) Virus (d) Trojan
Ans. a
27. ______ mail refers to e-mail messages sent by an unknown sender, usually for commercial
purposes.
(a) Junk (b) Important (c) Virus (d) Trojan
Ans. a
P a g e | 72
30. A half completed email may be saved for later editing and transmission to the receiver in
______ folder.
(a) spam bin (b) inbox (c) sent mails (d) draft
Ans. d
31. Before entering user ID and password, one should ensure that the browser displays ______
icon for safe communication with the server.
(a) print
(b) lock
(c) clock
(d) lens
Ans. b
32. Logging into an email server from a dedicated application (APP) installed on a smartphone
helps to _______ email messages.
(a) auto delete
(b) hide
(c) periodically check, retrieve and notify
(d) purge
Ans. c
33. It is a good practice to _______ email messages from unknown senders to avoid virus
infection of computer.
(a) avoid opening attachments in
(b) open message and all attachments of
(c) sit looking for
(d) invite more spammers to send
Ans. a
35. Opening a new email ID requires entry of _______ in the email opening form.
(a) name and address
(b) date of birth and father name
(c) alternate email ID if necessary
(d) all of them
Ans. d
P a g e | 73
37. In Email, We need two Vas and two pairs of MTAs, When sender is connected to mail server
via
a) MTA and VTA
b) LAN and WAN
c) IP and SMS
d) Email and IP
Ans. b
38. Mail access starts with client when user needs to download e-mail from the
a) Mail Box
b) Mail Server
c) IP server
d) Internet
Ans. a
39. When sender and receiver of an e-mail are on same system, we need only two
a) IP
b) Domain
c) Servers
d) User Agents
Ans. d
40. At beginning of Internet era, messages sent by electronic mail were short and consisted of
a) Words only
b) Line only
c) Text Only
d) Numbers Only
Ans. c
41. When the mail server sends mail to other mail servers it becomes _______
a) SMTP server
b) SMTP client
c) Peer
d) None of these
Ans. b
42. If you have to send multimedia data over SMTP it has to be encoded into ______
a) Binary b) Signal
c) ASCII d) None of these
Ans. c
43. In SMTP, the command to write receivers mail to write receivers mail address is written this
command
a) SEND TO b) RCPT TO c) MAIL TO d) None of these
Ans. b
P a g e | 74
50. When the sender and the receiver of an email are on different systems, we need only _____
a) One MTA
b) Two UAs
c) Two UAs and one pair of MTAs
d) Two UAs and Two pairs of MTAs
Ans. d
P a g e | 75
52. Simple mail transfer protocol (SMTP) utilizes _____ as the transport layer protocol for
electronic mail transfer.
a) TCP
b) UDP
c) DCCP
d) SCTP
Ans. a
54. Which one of the following protocol is used to receive mail messages?
a) SMTP
b) Post office protocol
c) internet message access protocol
d) All of these
Ans. d
55. An email client needs to know the ____ of its initial SMTP server.
a) IP address
b) MAC address
c) URL
d) None of these
Ans. a
58. Which one of the following is an SMTP server configured in such a way that anyone on the
internet can send e-mail through it?
a) open mail relay
b) wide mail reception
c) open mail reception
d) None of these
Ans. a
59. You‟d like each of the emails you sent to display your name and other details automatically at
the end of the message. Which feature helps you to set this up?
a) Footers b) Signatures c) Tables d) Frames
Ans. b
60. You want to send a lesson plan written using Microsoft Word that you have saved in Your
computer to another teacher. The best way to do this is ….
a) Send the file as an attachment to an email
b) Retype the lesson into an email
c) Copy and paste the lesson into an email
d) Print a hard copy of the lesson and bring it to the teacher
Ans. a
61. If you want to send an email you have received to another person, the best way to do so is…
a) Retype it into a new email message
b) Copy and paste it into a new email message
c) Forward the email
d) Ask the original sender to send it to the person for you
Ans. c
67. The email ID of the primary recipient of email is entered in ______ field.
(a) To
(b) CC
(c) BCC
(d) Subject
Ans. a
Keyboard Symbols
~ Tilde – टिल्डे
` Open Quote – ओपन कोट्स
! Exclamation mark – एक्स क्लेfमेशन माकक
$ Dollar - डॉलर साइन
% Percent – परसेंि
^ Caret - कै रे ि
( Open Round brackets. – ओपन राउं ड ब्रेकेि
) Close Round brackets – क्लोओज राउं ड ब्रेकेि
_ Underscore – अंडरस्को र
+ Plus – प्लtस
= Equal – इक्वअल
{ Open curly bracket – ओपन करली ब्रेकेि
} Close curly bracket – क्लो ज करली ब्रेकेि
[ Open bracket. – ओपन बाक्स् ब्रेकेि
] Closed bracket – क्लोबज बाक्से ब्रेकेि
| Vertical bar – विीकल बार
" Double quote – डबल कोि
' Single quote – ससगल कोि
? Question mark – क्वक्वकश्चान माकक
₩ won sign
€ Euro
° degree
《》 guillemets
⬆ Up Arrow
⬇ Down Arrow
¢ Cent sign
© Copyright sign
® Registered sign
F1 F2 F3 Function key
Wi-Fi
1. A wireless network uses ___ waves to transmit signals.
a) mechanical
b) radio
c) sound
d) None of these
Ans. b
3. ______ of the following networking standards, which is not used in Wi-Fi data transmisstions?
a) 802.11g
b) 802.11q
c) 802.11b
d) None of these
Ans. b
5. Which networking standard was the first to use orthogonal frequency division multiplexing
(OFDM) as a coding technique?
a) 802.11g
b) 802.11a
c) 802.11n
d) None of these
Ans. b
6. Which short range wireless standard is used for Wireless Personal Area Networks (WPANs)?
a) 802.16 b) 802.15
c) 802.13 d) None of these
Ans. b
7. You can change the settings on your wireless router through a Web interface. One option you
can change is channel. What channel do routers use by default?
a) 2
b) 7
c) 6 Questions By: www.youtube.com/c/GKEDITORIAL
d) None of these
Ans. c
P a g e | 81
8. Which Operates in the 2.4GHz Industrial, Scientific and Measurement (ISM) band (2.4 GHz to
2.4835 GHz) and provides signaling rates of up to 11 Mbit/sec.
a) 802.11a
b) 802.11b
c) 802.11e
d) 802.11g
Ans. b
10. What should you do to keep unauthorized users from changing your home router settings?
a) Change the firewall settings on your computer
b) Change the default administrator password and SSID
c) Change the MAC address of the router
d) Nothing, only the administrator can change router settings
Ans. b
13. Why is WEP security not as strong as WPA or WPA2 even though the code key is longer?
a) WPA uses tunneling protocols
b) WEP sends authentication codes with each packet
c) WEP lacks the ability to use special character
d) WEP is not compatible with Windows7 or MAC OS
Ans. b
19. What is the “acceptable” limit for the attenuation of a wifi signal (threshold before breaking
signal)
a) 75 dB b) 20 db
c) -75 DB d) -75 GHz
Ans. c
21. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) CSMA/CD
Ans. b
23. Which aspect of Wireless LAN security guards against eavesdropping of wireless LAN traffic?
a) Accounting
b) Authorization
c) Authentication
d) Encryption
Ans. d
P a g e | 83
27. Which Wireless LAN network component is responsible for centralized control & management
of a WLAN?
a) A network switch
b) An access point
c) A wireless LAN controller
d) A wireless client
Ans. c
28. A WLAN access point converts between 802.___ and 802.____ frames.
a) 802.11ac, 802.11n
b) 802.11, 802.3
c) 802.11i, 802.3
d) 802.1, 802.3
Ans. b
29. The infrastructure components of a wireless network are generally interconnected by:
a) Clients b) RF links
c) Switches d) All of these
Ans. c
31. IEEE 802.11 defines the basic service set as the building block of a wireless
a) LAN b) WAN protocol
c) MAN d) All of these
Ans. a
P a g e | 84
32. In wireless LAN, there are many hidden stations so we cannot detect the
a) Frames
b) Collision
c) Signal Questions By: www.youtube.com/c/GKEDITORIAL
d) Data
Ans. b
33. A set that makes stationary or mobile wireless station and also have optional central base
station is known as
a) Basic service set
b) Extended service set
c) Network point set
d) Access point
Ans. a
35. The WiFi standard which permits transmission distance of 50m with data rate of 54MBPS is
______ .
(a) IEEE 802.11a (b) IEEE 802.11b
(c) IEEE 802.11g (d) IEEE 802.11n
Ans. a
36. The WiFi standard which permits transmission distance of 100m with data rate of 11MBPS is
______.
(a) IEEE 802.11a (b) IEEE 802.11b
(c) IEEE 802.11g (d) IEEE 802.11n
Ans. b
37. The WiFi standard which permits transmission distance of 100m with data rate of 54MBPS is
______.
(a) IEEE 802.11a
(b) IEEE 802.11b
(c) IEEE 802.11g
(d) IEEE 802.11n
Ans. c
38. The WiFi standard which permits transmission distance of more than 100m with data rate of
100MBPS is ______ .
(a) IEEE 802.11a
(b) IEEE 802.11b
(c) IEEE 802.11g
(d) IEEE 802.11n
Ans. d
P a g e | 85
43. In the modern days, _______ is the best choice for wireless networking.
(a) WiFi (b) infrared
(c) radio waves (d) micro-wave
Ans. a
45. In terms of data safety, wireless networks are ______ wired networks.
(a) more secure than
(b) less secure than
(c) as safe as
(d) none of them
Ans. b
Internet
1. P3P stands for______.
Ans. Platform for Privacy Preferences
24. ____ Protocol assigns IP address to the client connected to the internet.
Ans. DHCP
27. Internet access by transmitting digital data over the wires of a local telephone network is
provided by _____
a) leased line
b) digital signal line
c) digital subscriber line
d) digital leased line
Ans. c
30. Which one of the following is not an application layer protocol used in internet?
a) remote procedure call
b) internet relay chat
c) resource reservation protocol
d) local procedure call
Ans. c
31. Which one of the following is not used in media access control?
a) Ethernet
b) digital subscriber line
c) fiber distributed data interface
d) packet switching
Ans. d
32. The Process of keeping addresses in memory for future use is called
a) Routing
b) Resolving
c) Caching
d) None of these
Ans. c
34. The first network that planted the seeds of internet was:
A) ARPANET
B) NSFnet
C) Vnet
D) Both A and B
Ans. a
37. Voice mail, E-mail, Online service, the internet and the WWW are all example of
a) Computer categories b) Connectivity
c) Telecommuting d) None of these
Ans. c
38. Internet is
a) Dynamic system
b) Complex system
c) Decentralized system
d) All of these
Ans. d
39. In Modems
a) Digital signal is amplified
b) Several digital signals are multiplexed
c) A digital signal changes some characteristic of a carrier wave
d) None of these
Ans. c
42. A small network making up the internet and also having a small numbers of computers within it
is called
a) Host
b) Address
c) Subdomain
d) None of these
Ans. c
43. Computers on the internet owned and operated by education institution form part of the
a) com domain b) edu domain c) mil domain d) none of these
Ans. b
44. Which of the following networking solution is suitable for networking in a building?
a) WAN b) MAN c) LAN d) All of these
Ans. c
46. For a small web site, one needs to buy space from the
a) ISP b) Telephone exchange
c) Network administrator d) None of these
Ans. a
48. World Wide Web pages can be described as multimedia pages. This means that the pages
may contain
a) Text, pictures, sound
b) Text and pictures only
c) Video clips, sound, text, pictures
d) None of these
Ans. c
53. The Telnet protocol assumes that each end of the connection – the client and the server is
a) NDDT b) HotDog
c) Network Virtual Terminal (NVT) d) None of these
Ans. c
P a g e | 91
54. To use Telnet and the host‟s resources, you will need to know
a) TCP/IP address b) Electronic address
c) The address of the Internet host d) None of these
Ans. c
58. The program supplied by VSNL when you ask for Internet connection for the e-mail access is
a) ISP
b) PINE
c) HotDog
d) None of these
Ans. b
63. A ____ shares hardware, software and data among authorized user.
a) IP
b) CPU
c) Network
d) DNS
Ans. c
64. Which of the following refers to dangerous programs that can be „caught‟ by opening E-mail
attachments and downloading software from the internet?
a) Spam
b) Utility
c) Honey pot
d) Virus
Ans. d
70. The collection of links throughout the internet creates an interconnected network called the
a) Slide Presentation b) Bookmarks
c) Pie chart d) Plotter
Ans. b
74. The software that allows users to surf the internet is called a ______
a) Search engine
b) Internet service provider
c) Multimedia application
d) Browser
Ans. d
76. ____ is a software application used to enable computers users to locate and access web
pages.
a) Website
b) Web browser
c) Search engine
d) Modem
Ans. b
80. A collection of computers used for online data storage through the Internet is ______ called .
(a) mainframe computer
(b) micro-computer
(c) cloud computer
(d) laptop
Ans. c
81. Computer networks in the form of LAN, WAN, MAN and the Internet help in _____.
(a) sharing of information
(b) transactions of e-commerce
(c) sharing of hardware (like printers)
(d) all of them
Ans. d
82. The process of Transferring files from a computer on the internet to your compute is
called____
a) Downloading
b) Forwarding
c) Uploading
d) FTP
Ans. a
92. _____ storage means storing important data and documents online for self and group viewing.
a) Primary
b) Cloud
c) Secondary
d) Auxilary
Ans. b
P a g e | 96
Website or Webpage
1. Website is a collection of
a) HTML documents
b) Graphic files
c) Audio and video files
d) All of these
Ans. d
2. A _____ is the simplest form of website, in which the site‟s content is delivered without the use
of server side processing.
a) Dynamic Website
b) E-Commerce Website
c) Static website
d) Social Networking Website
Ans. c
6. Website used to sell and buy something are categorized under _____.
a) Search engine b) Social Networking
c) E-Commerce Website d) Entertainment Sites
Ans. c
10. Which of the following language is used to write animation and games in browser?
a) HTML b) C Programming c) Java d) None of these
Ans. c
11. ______ programs automatically connects to web sites and download documents and save
them to local drive.
a) Web Downloading Utilities b) Offline Browsers
c) Web Servers d) None of these
Ans. a
24. Sites like facebook, twitter etc come under the scope of?
a) Email platform b) Chat rooms
c) Search engines d) Social networking
Ans. d
P a g e | 99
25. A _____ is a document commonly written and is accessible through the internet or other
network using a browser?
a) Accounts
b) Data
c) Web page
d) Search engine
Ans. c
26. The pages that could not be modified are called _____?
a) Static
b) Dynamic
c) Immovable
d) None of these
Ans. a
28. When visiting unprotected websites, the lock icon is shown with ______ .
(a) red X to denote unsafe connection
(b) Green tick to denote safe connection
(c) both a and b
(d) none of them
Ans. a
29. Clicking on links from untrusted search engines might take an innocent user to ______.
(a) video sharing websites
(b) audio streaming web sites
(c) social media websites
(d) hackers web site which extracts login ID and password
Ans. d
30. Most of the social media websites require ______ as user ID.
(a) Postal code
(b) PAN number
(c) email address
(d) Aadhar ID number
Ans. c
32. The First page that you normally view at a Website is its:
a) Home page b) Master page
c) First page d) None of these
Ans. a
P a g e | 100
37. Websites used for building network with friends and relatives is called as ______.
a) E-Commerce
b) Net Banking
c) Blogging
d) Social Networking
Ans. d
39. Software which allows user to view the webpage is called as ______.
a) Internet Browser b) Operating System
c) Website d) Interpreter
Ans. a
40. To make your website mobile friendly, you can make your website
a) Responsive
b) Reactive
c) Fast Loading
d) Light
Ans. a
P a g e | 101
Microsoft Outlook
1) Explain what is IMAP (Internet Message Access Protocol)?
IMAP means Internet Message Access Protocol; it is a standard protocol for using e-mail
service from your local server.
SMTP or Simple Mail Transfer Protocol allows you to send emails and not to receive them, it act
as Mail Transfer Agent (MTA) to deliver your e-mail to the recipient‟s mail server.
4. What is Outlook?
Ans. Microsoft Outlook is the name of a software program that combines your e-mail, calendar,
meetings/appointments, contacts, address book and tasks.
8. Outlook has many tools that can do many thing. Which one of the following tasks is Outlook
NOT designed to do?
a) send out a newsletter b) balance your checkbox
c) arrange an online meeting d) keep track of your contacts
Ans. b
9. The CEO of your company just sent mail to all 10,000 of your fellow employees. You want to
reply to her and say, “Thanks!”. Which button should you click?
a) Reply b) Reply all
c) Reply with meeting d) Forward
Ans. a
10. Which tool would you use to view the calendars of your entire team at the same time?
a) Daily task list b) Share calendar
c) Scheduling assistant d) Open calendar
Ans. c
P a g e | 103
11. There are 10 people on your team and you write them frequently. What is the easiest way to
write all 10 teammates without having to type their names into each email message?
a) create a Category for your team
b) create a Group for your team
c) create a Rule for your team
d) None of these
Ans. b
13. Your manager just sent you a detailed list of deliverables that she wants you to review and
then discuss in person. What is the most efficient way to do this?
a) reply to the email and then create a new appointment and copy in the deliverables
b) click the reply with meeting button
c) click the reply with IM button
d) right click the mail and click follow UP
Ans. b
14. We can show tasks by many different data periods – how do we change the work week for
employees that work from Tuesday to Saturday?
a) In calendar view use the arrange dialogue launcher button and choose the days we want
b) In week view drag the working days into the work week bar
c) In week calendar view, right click the days needed and choose „set as work day‟
d) Don‟t Know
Ans. a
15. You need to arrange a meeting for all employees in a particular department – do you
a) Call up the members contact detains in the address book, and send them an email with the date
and time of the meeting?
b) Click the send and receive button, in the group email section click on the group, then choose
meeting
c) Right click the calendar and choose new meeting request, then complete the form and choose
send
d) Don‟t know
Ans. c
16. You want to set up a button to automatically send an email you‟ve received on to your
manager, rather than have to manually choose their name every time. Would you
a) Click the forward button on the home tab then from the file tab choose save as button
b) Click the home tab and choose to manger from quick steps
c) Click the send/receive tab and choose forward to address book member
d) Don‟t know
Ans. b
P a g e | 104
17. What‟s an effective and efficient way to send the same email message to a group of people?
a) Create a distribution list
b) Use the Bcc field
c) Send the message over and over
d) List every person‟s email address in The “To” field
Ans. a
18. If Outlook shows only one day‟s schedule in the calendar, how can you make it show several
days?
a) Click one of the toolbar buttons preset for longer times
b) Drag to increase the column size for the area that shows the day
c) Make more room in the Calendar window by closing the Outlook Bar
d) None of these
Ans. a
19. The fastest way to place an email into a folder you have created is…..
a) Right click the email message and choose “Move to folder…”, then click on the folder and click
OK
b) click and drag the message into the folder
c) Go to the Edit menu and choose “Move to folder..”
d) None of these
Ans. b
21. We can set the reading pane under the email list by –
a) From the view tab click the reading pane button and choose bottom
b) From the home tab click tools, choose options and click the reading pane button for below list
c) Click the file tab, and choose PowerPoint preferences then click the button for pane under text
d) None of these
Ans. a
22. On the task list, to arrange tasks in date order, then in alphabetical order we
a) Click at the top of the date column, then on the top of the subject column
b) Use the file menu, and choose the date arrange command
c) Use the view tab and use the view settings button
d) None of these
Ans. c
24.Your boss sent you an important account code by mail two months ago. Unfortunately, you
haven‟t been sorting or deleting your mail and there are currently over 41,000 mails in your inbox.
You need that account code now. What is the quickest way to find it?
a) Look through the “Important mail from my boss” folder
b) Sort by “From” and then look at all other mail from your boss
c) Search on key words related to the account code and your boss‟s name
d) Sort by date and then look through mail from two months ago
Ans. c
26. There are three Outlook commands you personally use or toggle all day long: Work Offline,
High Priority, and Center Text. How can you keep these three commands visible at all times?
a) color code the three command buttons
b) add the three commands to Favorites
c) add the three commands to the Quick Access toolbar
d) None of these
Ans. c
P a g e | 106
Open Office
7. Colour difference between adjacent portions can be healed through proper gradient using ____
tool in GIMP.
(a) text (b) bucket fill
(c) blend (d) pencil
Ans. c
13. Text can be inserted into an image using ______ tool in GIMP.
(a) text (b) bucket fill
(c) blend (d) pencil
Ans. a
16. Any visible colour can be created using appropriate combination of ______ .
(a) Red
(b) Green
(c) Blue
(d) all of them
Ans. d
21. Selected portions may be distorted inside a cage using _____ tool in GIMP.
(a) shear
(b) perspective
(c) ip
(d) cage transform tool
Ans. d
26. Selected region or layer converted to 3D appearance using ______ tool in GIMP.
(a) shear
(b) perspective
(c) ip
(d) cage transform tool
Ans. b
29. Selected region or layer may be distorted using _____ tool in GIMP.
(a) shear
(b) perspective
(c) ip
(d) cage transform tool
Ans. a
30. TIFF is more suitable for ______ than for digital photography.
(a) digital printing
(b) digital drawing
(c) digital video
(d) digital audio
Ans. a
31. Selected portions or layers may be scaled using _______ tool in GIMP.
(a) crop tool (b) alignment tool
(c) rotate tool (d) scale tool
Ans. d
34. Google WebP aims to supersede ______ as a file format for digital cameras.
(a) JPG (b) PNG (c) GIF (d) TIFF
Ans. a
35. ICO is an image format containing one or more icons of ______ type.
(a) BMP
(b) PNG
(c) both a & b
(d) neither a nor b
Ans. c
41. The process of enhancing image quality by rotation, extraction, colour transformation, partial
relocation, morphing and conversion from/ to colour image to grayscale, etc. are categorized as
_______.
(a) image capture (b) image viewing
(c) image editing (d) none of them
Ans. c
P a g e | 111
42. Adobe Photoshop, Corel Paint Shop Pro, GIMP, etc. belong to the category of _____ software.
(a) image capture (b) image viewing
(c) image editing (d) none of them
Ans. c
43. _______ is a free and open source software for image editing.
(a) Adobe Photoshop (b) Corel Paint Shop Pro
(c) GIMP (d) none of them
Ans. c
45. GIMP toolbox contains rectangle, ellipse, freehand, fuzzy tool, colour select, scissor selection
tool, foreground select and path tools for ______.
(a) selecting portions of images
(b) deleting images
(c) creating images
(d) drawing on images
Ans. a
46. In GIMP, color in one part of image may be picked for painting another part using ______ tool.
(a) color picker (b) zoom
(c) measure (d) move
Ans. a
47. In GIMP, image size may be enlarged or reduced using ______ tool.
(a) color picker (b) zoom
(c) measure (d) move
Ans. b
48. In GIMP, distances and angles can be measured using _______ tool.
(a) color picker (b) zoom
(c) measure (d) move
Ans. c
50. Selected portions or layers may be rotated using ______ tool in GIMP.
(a) crop tool (b) alignment tool
(c) rotate tool (d) scale tool
Ans. c
UNIX
1. What is the interface between the user and operating system in UNIX.
Ans. Shell
18. The first line in any shell script begins with a ____
a) & b) ! c) $ d) #
Ans. d
19. To spawn a child of our own choice for running the script, we can use ____ command.
a) ps b) pr c) sh d) $$
Ans. c
22. A single read statement can be used with one or more variables.
a) True
b) False
Ans. a
P a g e | 114
24. The first argument is read by the shell into the parameter _____
a) 1$ b) $3 c) $$ d) $1
Ans. d
25. The complete set of positional parameters is stored in ____ as a single string.
a) $n b) $# c) $* d) $$
Ans. c
26. Which of the following is used for storing the number of positional parameters?
a) $n b) $# c) $* d) $2
Ans. b
27. Which symbol will be used with grep command to match the pattern pat at the beginning of a
line?
a) ^pat b) $pat c) pat$ d) pat^
Ans. a
28. Which command is used to sort the lines of data in a file in reverse order
a) sort b) sh c) st d) sort –r
Ans. d
30. Which command is used to copy all files having the string cha and any two characters after
that to the progs directory?
a) cp chap?? Progs
b) cp chap* progs
c) cp chap[12] /progs/*.*
d) cp chap?? /progs/*
Ans. a
31. Which command is used to change protection mode of files starting with the string emp and
ending with 1,2 or 3?
a) chmod u+x emp[1-3]
b) chmod u+r ??? emp
c) chmod 777 emp*
d) chmod 222 emp?
Ans. a
32. Which of the following keys is used to replace a single character with new text?
a) S b) s c) r d) C
Ans. b
P a g e | 115
33. Which command is used to extract specific columns from the file?
a) cat b) cut c) grep d) paste
Ans. b
34. Which command sends the word count of the file infile to the newfile.
a) wc infile >newfile b) wc <infile> newfile
c) wc infile – newfile d) wc infile | newfile
Ans. a
35. Which command is used to remove thee read permission on the file „note‟ from both the group
and others?
a) chmod go+r note
b) chmod go+rw note
c) chmod go-x note
d) chmod go-r note
Ans. d
36. Which of the following files will displayed by this command cat *ch*
a) patch b) catch c) .ch d) All of these
Ans. d
37. The Octal number to be given along with chmod command to make a file readable, writable
and executable to the owner, readable and executable to group and others is:
a) 000 b) 755 c) 744 d) 555
Ans. b
38. Which of the following keys is used to move the cursor to the end of the paragraph.
a) } b) { c) | d) $
Ans. a
39. Which command is used to concatenate all files beginning with the string „emp‟ and followed
by a non-numeric characters?
a) cat emp[!0-9] b) more [emp][!0-9]
c) cat emp[x-z] d) cat emp[a-z]
Ans. a
40. The agency that sits between the user and the UNIX system is called the
a) logic b) profile c) shell d) erxc
Ans. c
41. Which of the following commands is used to update access and modification times of a file?
a) grep b) wc c) touch d) cat
Ans. c
42. Which command is used to count just the number of character in a file?
a) wc – 1 b) wc – c c) wc –w d) wc –r
Ans. b
44. Which of the following command addresses all users who are currently hooked on?
a) write b) mail c) wall d) mesg
Ans. c
45. Which option is used with rm command to make the command prompt the user with each
filename and a ?, before acting on it
a) –r b) –x c) –i d) -1
Ans. c
46. Which of the following directories contain all Alias created by a user, including his login
directory?
a) /tmp b) /etc c) /usr d) /dev
Ans. c
47. Which of the following commands is used to obtain a list of all files by modification time?
a) Is - 1 b) Is –t c) Is –i d) Is –R
Ans. b
50. Which of the following commands is used to identify the type of file by context?
a) Is b) cat c) file d) more
Ans. c
51. Which option will be used with touch command to change the access time?
a) –a b) –b c) –t d) –h
Ans. a
53. Which of the following commands is used to display your working directory?
a) dir b) prompt $p$g c) pwd d) path
Ans. c
54. While working with mail command, which command is used to save mail in a separate file?
a) s b) r c) w d) d
Ans. a
P a g e | 117
58. Which set option is used with vi editor to display line numbers on screen?
a) nm b) nu c) ic d) li
Ans. b
59. Which of the following set option is used with vi editor to ignore case while searching for
patterns?
a) ic b) ai c) sm d) ts
Ans. a
60. Which command is used with vi editor to search a pattern in the forward direction?
a) / b) ? c) // d) ??
Ans. a
61. Which of the following commands is used to get directory one level up?
a) cd b) cd.. c) cd/ d) chdir
Ans. b
62. Which of the following commands is used to count the total number of lines, words, and
characters contained in a file.
a) count p b) wc c) wcount d) countw
Ans. b
63. Which of the following command is used to change the working directory?
a) cd b) changedir c) chdir d) cdir
Ans. a
65. In Bourne shell, which file sets the Unix environment for the user when the logs into his HOME
directory.
a) .exrc b) .profile c) lastlogin d) .mbox
Ans. b
66. Which of the following command is used to summarize the disk usage?
a) chkdsk b) fdisk
c) du d) disk
Ans. c
P a g e | 118
67. Which command is used to sort the lines of data in a file in alphabetical order?
a) sort b) sh c) st d) sort –r
Ans. a
68. If a file has read and write permissions for the owner, then the octal representation of the
permissions will be
a) 1 b) 6 c) 5 d) 3
Ans. b
69. Which is the earliest and most widely used shell that came with the UNIX system?
a) C shell b) Korn shell
c) Bourne shell d) Smith shell
Ans. c
71. Which command is used to display the device name of the terminal you are using?
a) who b) is c) tty d) stty
Ans. c
72. Which option will be used with disk free command to include the total amount of disk space in
the file system?
a) –t b) –tt c) -4 d) –i
Ans. a
73. Which command is used to set the three permissions for all the three categories of users of a
file?
a) chgrp b) chown c) chmod d) chusr
Ans. c
74. Which of the following command can be used to get information about yourself?
a) who am I b) I / 4 c) pwd d) which
Ans. a
75. Which of the following command can be used to get information about all users who are
currently logged into the system?
a) which b) who c) who am I d) 1 / u
Ans. b
77. Which command is used to save the standard output in a file, as well as display it on the
terminal?
a) more
b) cat
c) grep
d) tee
Ans. d
P a g e | 119
78. The command that can be used to restrict incoming messages to a user is
a) mesg b) grep c) halt d) sleep
Ans. a
79. Which of the following command is used to copy directory structures in and out
a) cp b) cpio c) co – p d) copy
Ans. b
80. Which of the following commands is used for an automatic reminder service?
a) write b) mesg c) calendar d) mail
Ans. c
81. Which command is used with vi editor to move cursor forward to first occurrence of character
„ch‟ in the current line?
a) tch b) fch c) rch d) ech
Ans. b
82. Which of the following keys is used to delete the character beneath the cursor?
a) x b) X c) dd d) D
Ans. a
83. Which command will be used with vi editor to append text at end of line?
a) A b) a c) i d) I
Ans. a
84. Which of the following shell‟s wildcards are used to match any number of character including
none?
a) [ijk] b) [!ijk] c) ? d) *
Ans. d
85. Which symbol will be used with grep command to match the pattern pat at the end of a line?
a) ^pat b) $pat c) pat$ d) pat^
Ans. c
91. Which command is used to terminate all processes in your own system except the login shell?
a) kill 1 b) kill 0 c) cancel all d) cancel 1
Ans. b
92. Which operator will be used with chmod command to assign absolute permission?
a) + b) - c) = d) %
Ans. c
94. Which of the following signs is used to backup over typing errors in vi?
a) @ b) # c) $ d) !
Ans. b
95. Which of the following internal command is used in mail to forward main to user in user-list?
a) r user-list b) m user-list c) d user-list d) e user-list
Ans. b
96. Which of the following option is used for checking if the file is writable or not?
a) –e b) –f c) –r d) –w
Ans. d
99. ______ was a member of the team that developed UNIX operating system.
(a) Ken Thompson (b) Dennis Ritchie (c) J.F. Ossanna (d) all of them
Ans. d
Hard disk
1. What is Cluster?
Ans. Group of two or more contiguous sectors is called a cluster.
13. Which of the following storage device can store maximum amount of data?
a) Floppy disk
b) Magneto Optic Disk
c) Hard disk
d) Compact disk
Ans. c
14.The Programs which are as permanent as hardware and storage in ROM is known as
a) Firmware b) ROM ware
c) Hard ware d) Software
Ans. a
17. HDDs are a type of _______ storage, retaining stored data even when powered off.
Ans. Non-volatile
P a g e | 124
20. What is the process of deleting all the data on the hard drive?
a) Delete b) Erase c) Formatting d) Uninstall
Ans. c
21. _____ is the Process of dividing the disk into tracks and sectors .
a) Formatting b) Arrangement
Ans. a
26. What is the name of the smaller divisions made in Hard disk?
a) Head b) Sectors c) Partitions d) Tracks
Ans. b
MS Paint
1. Which of the following software replace the MS Paint in Windows 10
a) Paint 3D b) New MS Paint c) Paint 3D d) Universal Paint
Ans. c
10. Which of the following tool is not available in the Ribbon Bar?
a) Clipboard b) Image c) Tool d) View
Ans. d
11. What we called the area where we can draw shapes and pictures ?
a) print area b) Drawing area c) color area d) empty area
Ans. b
14. Which bar is used for moving the page up and down in MS Paint?
a) Vertical Scroll bar b) Status bar c) Horizontal Scroll Bar d) Title bar
Ans. a
17. Which tool is used to draw free-form line with the selected line width?
a) Pencil b) text c) line d) curve
Ans. a
20. In MS Paint which bar contains option- select, crop, resize and rotate ?
a) image b) tool c) shape d) color
Ans. a
P a g e | 127
Word Pad
1. How many types of alignment available in word pad?
a) 1 b) 2 c) 3 d) 4
Ans. d
5. If you copy and cut the text in Word pad they temporary stored in ____
a) Clipboard b) Format Painter c) Hard Disk d) Footer
Ans. a
9. If you want to use another program inside the wordpad then which option will be use?
a) Insert Object b) Font c) Paragraph d) Replace
Ans. a
14. Which short cut key is used to select all text in Word pad?
a) Ctrl + A
b) Ctrl + S
c) Ctrl + N
d) Ctrl + D
Ans. a
Notepad
1. Which one of the following is the correct way to open a notepad application?
a) Click on office button > windows accessories > All apps > Notepad
b) Start > Notepad > All apps > windows accessories
c) Click on Windows button > All apps > Windows accessories > Notepad
d) None of these
Ans. c
2. Which one of the following should be clicked to save the existing Notepad window?
a) Edit b) save c) Format d) None of these
Ans. b
3. Which menu in Notepad has only two options, word wrap and font?
a) Format b) Insert c) Title d) Edit
Ans. a
4. What should be clicked to open a previous saved file while working with Notepad application?
a) Open b) New c) Exit d) Save as
Ans. a
12. If a sentence is flowing out of screen in notepad then which option is not active?
a) Wordwrap
b) Orientation
c) Alignment
d) All of these
Ans. a
14. Which shortcut key is used for “Find Next” function in Notepad?
a) F1
b) F2
c) F3
d) F5
Ans. c
18. Which short cut key is used to select all the document in Notepad?
a) Ctrl + A
b) Ctrl + B
c) Ctrl + C
d) Ctrl + d
Ans. a
19. Which short cut key is used to cut text from one place and paste them another place ?
a) Ctrl + A b) Ctrl + B c) Ctrl + C d) Ctrl + X
Ans. d
P a g e | 131
21. What will happen if word wrap in not enabled in notepad application?
a) Typing of letters will be not possible.
b) Making letters capital will be not possible.
c) The letters well be typed in a single line, till enter key is pressed.
d) All of these
Ans. c
22. What is the extension of file with which Notepad document is saved?
a) .txt
b) .pmd
c) .xml
d) .doc
Ans. a
25. which of the following application we use for website code writing.
a) Wordpad
b) Notepad
c) MS Word
d) Powerpoint
Ans. b
P a g e | 132
Computer Hardware
1. Processor, main memory (RAM), hard disk, CD/DVD drive, CMOS, BIOS chip, etc. are housed
inside _____.
(a) input unit (b) Central Processing Unit (CPU)
(c) output unit (d) all of them
Ans. b
2. ______ contains slots for fixing/ connecting processor, main memory (RAM), hard disk,
CD/DVD drive, CMOS, BIOS chip, etc.
(a) Mother board (b) bread board
(c) key board (d) dash board
Ans. a
6. Cathode Ray Tube (CRT) monitor has ______ level of power consumption amongst monitors.
(a) highest (b) lowest (c) zero (d) least
Ans. a
12. The type of printer which hits the paper to produce print is called _____.
(a) monitor
(b) scanner
(c) non-impact type printer
(d) impact type printer
Ans. d
13. The type of printer which does not hit the paper to produce print is called ______.
(a) monitor
(b) scanner
(c) non-impact type printer
(d) impact type printer
Ans. c
15. LASER printer, ink jet printer, thermal printer and plotter belong to ____ category.
(a) monitor (b) scanner
(c) non-impact type printer (d) impact type printer
Ans. c
16. Thermal printer uses ______ coated paper, which turns black when heat is applied.
(a) chromium (b) BisPhenol
(c) nickel (d) toner powder
Ans. b
17. The unit which splits power supply to various voltages required for their units of a computer is
called _____ .
(a) transformer
(b) Switch Mode Power Supply (SMPS)
(c) transistor
(d) transducer
Ans. b
P a g e | 134
19. The opening provided in the front panel or rear panel of a CPU for connecting peripherals is
called _____.
(a) socket (b) pin (c) port (d) part
Ans. c
20. External dialup MODEM can be connected to a computer using ______ port.
(a) RS232/ serial
(b) PS/2
(c) VGA
(d) LPT
Ans. a
21. Old style (SIMPLEX) printer (like dot matrix printer) may be connected to a computer using
_____ port.
(a) RS232/ serial
(b) PS/2
(c) VGA
(d) LPT
Ans. d
23. What is the first thing you could do to check for damage to a printer after receiving it?
a) Run MSD diagnostics b) Attach it to a PC and print something
c) Check the cables d) Unbox it and examine it for physical damage
Ans. d
24. External devices such as printers, keyboards and modems are known as
a) Add on devices b) PC expansion
c) peripherals d) special buys
Ans. c
32. On a dot matrix printer, you should never lubricate which part?
a) carriage rails b) printhead pins
c) paper advance bearings d) carriage bearings
Ans. b
35. High definition graphics output may be taken from port of a PC.
(a) 3.5mm jack (b) HDMI
(c) RJ45 (d) LPT
Ans. b
P a g e | 136
38. Dot-matrix, Deskjet, Inkjet and Laser are all types of which computer peripherals?
a) Printers b) Software
c) Monitors d) Keyboards
Ans. a
45. The term used to define all input and output devices in a computer system is ___
a) Monitor
b) Software
c) Shared resources
d) Hardware
Ans. d
46. A device used for video games, flight simulators, training simulators and for controlling
industrial robots.
a) Mouse b) Light pen
c) Joystick d) keyboard
Ans. c
48. You just installed a new IDE hard drive, but your system BIOS will not recognize the new drive,
what should you check first.
a) cable sequence
b) jumpers on the hard drive
c) drivers that need to be loaded
d) hard drive manufacturer web site information
Ans. b
52. Through what hardware does one person speak to the other person on a video conference?
a) Speaker b) Monitor c) Microphone d) Camera
Ans. c
55. The device that produces hard copies on paper is called ______.
(a) monitor
(b) scanner
(c) tablet
(d) printer
Ans. d
56. External devices/ peripherals like keyboard and mouse can be connected to a computer using
______ ports.
(a) PS/2
(b) USB
(c) both a & b
(d) neither a nor b
Ans. c
58. Audio input, microphone and speaker output can be connected to computer using ______.
(a) 3.5mm jack
(b) RJ11
(c) RJ45
(d) LPT
Ans. a
59. A light sensitive device that converts drawing, printed text or other images into digital form is
a) keyboard
b) Plotter
c) Scanner
d) OMR
Ans. c
P a g e | 139
60. You are installing an application in Windows 95, and the computer crashes, what do you do?
a) Press alt + Ctrl + delete, twice
b) press alt + Ctrl + delete, and end task
c) press the reset button on the computer
d) turn off computer and boot from a floppy disk
Ans. d
61. You get a CMOS checksum error during bootup. What is most likely the cause?
a) Power supply is bad b) BIOS needs updating
c) CMOS battery is nearing end of life d) None of these
Ans. c
62. You see the message “invalid media device” after installing a new hard drive. What do you do
next?
a) Format b) Fdisk c) Partition d) Add the OS
Ans. a
63. A hard disk is divided into tracks which are further subdivided into:
a) clusters b) sectors c) vectors d) heads
Ans. b
64. Which step should you perform first before discharging a CRT?
a) Remove the CRT from its housing b) Disconnect the CRT from the computer
c) Remove the video assembly d) Turn power off before removing power source
Ans. d
66. A 25-pin female connector on the back of your computer will typically be:
a) Serial port 1 b) A parallel port c) Docking d) COM2 port
Ans. b
67. Dust in a computer actually increase the size of the magnetic fields inside it. This is not good,
so you must occasionaly dust, I trust. What‟s the best way to do this?
a) reserve vaccum
b) any small vaccum device
c) blow real hard on the system board
d) use compressed air can
Ans. d
68. During the normal PC boot process, which of the following is active first?
a) RAM BIOS
b) CMOS
c) ROM BIOS
d) Hard disk information
Ans. c
P a g e | 140
71. How can you totally protect a PC from damage during an electrical storm?
a) Disconnect the AC power cable
b) Disconnect all external cables and power cords
c) Use a surge protector
d) Turn off the AC power
Ans. a
73. After you service a laser printer, you notice dirty print. Which of the following would correct the
problem?
a) Clean the developer tank
b) Reset the printer
c) Run several blank pages
d) Clean the laser diode
Ans. c
74. What is the best way to protect your hard drive data?
a) regular backups
b) periodically defrag it
c) run chkdsk at least once a week
d) run a regular diagnostic
Ans. a
75. Which peripheral port provide the FASTEST throughout to laser printers?
a) RS-232
b) SCSI
c) Parallel
d) Serial
Ans. c
P a g e | 141
76. Your customer tells you the print quality of their dot matrix printer is light then dark. Which of
the following could cause the problem.
a) Paper slippage
b) Improper ribbon advancement
c) Paper thickness
d) Head position
Ans. b
77. What beep codes could indicate a system board or power supply failure?
a) steady short beep
b) no beep
c) one long continuous beep tone
d) All of these
Ans. d
Computer History
17. How many vacuum tubes used in first generation computer ENIAC ?
a) 1800 b) 18000 c) 1024 d) 512
Ans. B
39. Arch rivals IBM and Apple computers Inc. decided to join hands_________.
a) 1984 b) 1991 c) 1980 d) 1970
Ans. b
45. India bought its first computer in rupees 10 lakh, called HEC-2M and was installed at Calcutta‟s indian
Statistical Institute in the ________Year.
a) 1956 b) 1971 c) 1801 d) 1991
Ans. a
68. John Mauchly and J. Presper Eckert are the inventors of _____ computer.
a)UNIVAC B) ENIAC C) EDSAC D) Ferranti Mark 1
Ans. b
73. A term in computer terminology is a change in technology a computer is/was being used.
a) Development b) Generation c) Advancement d) Growth
Ans. b
76. _______generation of computer started with using vacumm tubes as the basic components.
a) 1st b) 2nd c) 3rd d) 4th
Ans. a
81. Which of the following programming language started from second generation?
a) LISP b) C c) QBASIC d) FORTRAN
Ans. d
83. Operating system is used in which generation of computer for the first time?
a) First generation b) second generation c) third generation d) fourth generation
Ans. c
VBA
1. The programming environment which permits coding, compilation, running and debugging from
a single window is called
.(a) Integrated Development Environment (IDE)
(b) Editor
(c) Highlighter
(d) Compiler
Ans. a
2. The IDE of VBA supports since it permits drag and drop approach for design of user interface.
(a) Procedural Approach
(b) reverse approach
(c) Rapid Application Development (RAD)
(d) postfix approach
Ans. c
13. ______ is the shortcut to display information relating to selected component in VBA IDE.
(a) Ctrl+ I (b) Ctrl+ J (c) Ctrl+ R (d) Ctrl+ Shift+ I
Ans. a
14. ______is the shortcut to properties and methods of a component in VBA IDE.
(a) Ctrl+ I (b) Ctrl+ J (c) Ctrl+ R (d) Ctrl+ Shift+ I
Ans. b
16. ______is the shortcut to display parameter information for selected element in VBA IDE.
(a) Ctrl+ I (b) Ctrl+ J (c) Ctrl+ R (d) Ctrl+ Shift+ I
Ans. d
21. VBA has a coding, compilation, running and debugging environment called
(a) Integrated Development Environment (IDE)
(b) Editor
(c) Highlighter
(d) Compiler
Ans. a
22. In VBA, the function Asc converts given character value to numeric code in______ system.
(a) American Standard Code for Information Interchange (ASCII)
(b) Double Byte Character Set (DBCS)
(c) Unicode
(d) none of them
Ans. a
23. In VBA, the function AscB converts given character value to numeric code in ______system.
(a) American Standard Code for Information Interchange (ASCII)
(b) Double Byte Character Set (DBCS)
(c) Unicode
(d) none of them
Ans. b
24. In VBA, the function AscW converts given character value to numeric code in
________system.
(a) American Standard Code for Information Interchange (ASCII)
(b) Double Byte Character Set (DBCS)
(c) Unicode
(d) none of them
Ans. c
25. In VBA, the function Chr converts given numeric value to character value in _______system.
(a) American Standard Code for Information Interchange (ASCII)
(b) Double Byte Character Set (DBCS)
(c) Unicode
(d) none of them
Ans. a
26. In VBA, the function ChrB converts given numeric value to character value in ______system.
(a) American Standard Code for Information Interchange (ASCII)
(b) Double Byte Character Set (DBCS)
(c) Unicode
(d) none of them
Ans. b
P a g e | 153
27. In VBA, the function ChrW converts given numeric value to character value in _______system.
(a) American Standard Code for Information Interchange (ASCII)
(b) Double Byte Character Set (DBCS)
(c) Unicode System
(d) none of them
Ans. c
38. ________function in VBA formats a number according to given text strings containing 0, # and
comma (,).
(a) Format (b) CVErr (c) InputBox (d) MsgBox
Ans. a
P a g e | 154
43. Currency data type in VBA can store values in the range of ________
(a) 0 to 255
(b) -922,337,203,685,477.5808 to +- 922,337,203,685,477.5807
(c) 01-Jan-100 to 31-Dec-9999
(d) _79; 228; 162; 514; 264; 337; 593; 543; 950; 335 or _7:9228162514264337593543950335
Ans. b
45. Date data type in VBA can store values in the range of ________.
(a) 0 to 255
(b) -922,337,203,685,477.5808 to +- 922,337,203,685,477.5807
(c) 01-Jan-100 to 31-Dec-9999
(d) _79; 228; 162; 514; 264; 337; 593; 543; 950; 335 or _7:9228162514264337593543950335
Ans. c
47. Decimal data type in VBA can store values in the range of_________ .
(a) 0 to 255
(b) -922,337,203,685,477.5808 to +- 922,337,203,685,477.5807
(c) 01-Jan-100 to 31-Dec-9999
(d) _79; 228; 162; 514; 264; 337; 593; 543; 950; 335 or _7:9228162514264337593543950335
Ans. d
49. Double data type in VBA can store values in the range of_________ .
(a) _1:79769313486232E308 to _4:94065645841247E324
(b) -32,768 to +32,767
(c) -2,147,483,648 to +2,147,483,647
(d) _3:402823E38 to _1:401298E45
Ans. a
51. Integer data type in VBA can store values in the range of _______.
(a) _1:79769313486232E308 to _4:94065645841247E324
(b) -32,768 to +32,767
(c) -2,147,483,648 to +2,147,483,647
(d) _3:402823E38 to _1:401298E45
Ans. b
53. Long data type in VBA can store values in the range of________ .
(a) _1:79769313486232E308 to _4:94065645841247E324
(b) -32,768 to +32,767
(c) -2,147,483,648 to +2,147,483,647
(d) _3:402823E38 to _1:401298E45
Ans. c
55. Single data type in VBA can store values in the range of_______ .
(a) _1:79769313486232E308 to _4:94065645841247E324
(b) -32,768 to +32,767
(c) -2,147,483,648 to +2,147,483,647
(d) _3:402823E38 to _1:401298E45
Ans. d
63. The______ arithmetic operator in VBA has precedence after the ^ operator.
(a) % (b) + (c) - (d) /
Ans. a
64. The ______arithmetic operator in VBA has precedence after the % operator.
(a) * (b) + (c) - (d) /
Ans. d
65. The ______arithmetic operator in VBA has precedence after the / operator.
(a) * (b) + (c) - (d) none of them
Ans. a
67. ______operator in VBA returns true if the left and sides are equal.
(a) = (b) <> (c) < (d) >
Ans. a
P a g e | 157
68. _____operator in VBA returns true if the left and sides are not equal.
(a) = (b) <> (c) < (d) >
Ans. b
69. ______operator in VBA returns true if the left side is less than the right side.
(a) = (b) <> (c) < (d) >
Ans. c
70. ______operator in VBA returns true if the left side is greater than the right side.
(a) = (b) <> (c) < (d) >
Ans. d
71. ______operator in VBA returns true if the left side is less than or equal the right side.
(a) <= (b) >= (c) < (d) >
Ans. a
72. ______operator in VBA returns true if the left side is greater than or equal to the right side.
(a) <= (b) >= (c) < (d) >
Ans. b
80. In VBA, using__________ operator for concatenation results in addition if Strings have
numeric value and concatenation if Strings have alphanumeric value.
(a) & (b) $ (c) # (d) +
Ans. d
81. In VBA, using _______operator for concatenation results concatenation of Strings, irrespective
of numeric or alphanumeric value stored in the Strings.
(a) & (b) $ (c) # (d) +
Ans. a
82. The ____operator in VBA returns true if only one of the 2 comparisons is true.
(a) OR (b) AND (c) NOT (d) XOR
Ans. d
83. Choose the result of the following VBA expression: x = "20" & "32"
(a) 2032 (b) 52 (c) 3220 (d) ""
Ans. a
84. Choose the result of the following VBA expression: x = "Hi, " + "how are you?"
(a) "how are you, Hi?" (b) "Hi: how are you"
(c) "Hi, how are you?" (d) "Hi?"
Ans. c
85. Choose the result of the following VBA expression: x = "Hi, " & "how are you?"
(a) "how are you, Hi?" (b) "Hi: how are you"
(c) "Hi, how are you?" (d) "Hi?"
Ans. c
86. The operators in VBA which combine the results of several comparisons are called__
operators.
(a) logical (b) arithmetical (c) mathematical (d) concatenation
Ans. a
87. The _____operator in VBA returns true only if both sides of the operator are true.
(a) OR (b) AND (c) NOT (d) XOR
Ans. b
88. The______ operator in VBA returns true only if given comparison is false.
(a) OR (b) AND (c) NOT (d) XOR
Ans. c
P a g e | 159
93. _______operators in VBA compare the corresponding bits of numbers to arrive a result.
(a) logical (b) arithmetical (c) mathematical (d) bitwise
Ans. d
94. The _________ operator in VBA returns 1 only if both bits are 1.
(a) OR (b) AND (c) NOT (d) XOR
Ans. b
95. The ________operator returns 1 if given bit is 0 and returns 0 if given bit is 1.
(a) OR (b) AND (c) NOT (d) XOR
Ans. c
97. The ________operator returns 1 if only one of the two bits is 1 and the other one is 0.
(a) OR (b) AND (c) NOT (d) XOR
Ans. d
98. The expression in VBA 5 AND 3 (101 AND 11) results in______ .
(a) 1 (b) 3 (c) 5 (d) 7
Ans. a
99. The expression in VBA 5 XOR 3 (101 XOR 011) results in _______ .
(a) 1 (b) 3 (c) 6 (d) 7
Ans. c
100. _____function in VBA returns positive value of a number, irrespective of whether the input is
positive or negative.
(a) ABS
(b) ATN
(c) COS
(d) EXP
Ans. a
P a g e | 160
106. ______ function in VBA returns formatted version of given number (the format being specified
by 0 and #).
(a) FIX (b) FORMAT (c) INT (d) LOG
Ans. b
110. _______function in VBA rounds the given number to the nearest integer value.
(a) ROUND (b) SQR (c) TAN (d) SGN
Ans. a
113._______ function in VBA returns the numeric value of given character in the American
Standard Code of Information Interchange (ASCII) system.
(a) ASC (b) CHR (c) & (d) INSTR
Ans. a
114. ________function in VBA returns concatenated new string from given String values.
(a) ASC (b) CHR (c) & (d) INSTR
Ans. c
116.______ function in VBA returns location at which the second string occurs within the first
string.
(a) ASC (b) CHR (c) & (d) INSTR
Ans. d
117. ____function in VBA returns last location at which the second string occurs within the first
string.
(a) INSTRREV (b) LCASE (c) LEFT (d) RIGHT
Ans. a
120. ______ function in VBA returns given number of characters counted from the left of the
string.
(a) INSTRREV (b) LCASE (c) LEFT (d) RIGHT
Ans. c
121._____ function in VBA returns given number of characters counted from the right of the string.
(a) INSTRREV (b) LCASE (c) LEFT (d) RIGHT
Ans. d
123. ______function in VBA removes white spaces from the left end of given string.
(a) LEN (b) LTRIM (c) RTRIM (d) TRIM
Ans. b
124. ______function in VBA removes white spaces from the right end of given string.
(a) LEN (b) LTRIM (c) RTRIM (d) TRIM
Ans. c
P a g e | 162
125. _____function in VBA removes white spaces from both left and right ends of given string.
(a) LEN (b) LTRIM (c) RTRIM (d) TRIM
Ans. d
126. ______function in VBA extracts a substring from given start character for specified count of
characters.
(a) MID (b) REPLACE (c) SPACE (d) STR
Ans. a
127. _____function in VBA finds given string and replaces it with another.
(a) MID (b) REPLACE (c) SPACE (d) STR
Ans. b
130. ______function in VBA compares given strings, returns -1 if the first string is smaller than the
second string, 0 if both are equal and 1 if the first is greater than the second string.
(a) STRCOMP (b) STRCONV (c) STRREVERSE (d) VAL
Ans. a
131. _____function in VBA converts given string to uppercase, lowercase, propercase, or unicode.
(a) STRCOMP (b) STRCONV (c) STRREVERSE (d) VAL
Ans. b
134. ______function in VBA returns part of a date (YYYY for year, MM for month and DD for day
of month).
(a) Date (b) DATEADD (c) DATEDIFF (d) DATEPART
Ans. d
135. _______function in VBA returns difference between two dates in specified unit (YYYY for
years, MM for months and DD for days).
(a) Date (b) DATEADD (c) DATEDIFF (d) DATEPART
Ans. c
136. _______function in VBA adds given duration to the specified date (YYYY for years, MM for
months and DD for days).
(a) Date (b) DATEADD (c) DATEDIFF (d) DATEPART
Ans. b
P a g e | 163
137. _______ function in VBA converts given day of month, month and year values to date object.
(a) DATESERIAL (b) DATEVALUE (c) DAY (d) FORMAT
Ans. a
140.______ function in VBA returns formatted date object based on given string.
(a) DATESERIAL (b) DATEVALUE (c) DAY (d) FORMAT
Ans. d
144. ______ function in VBA returns minute of hour for given time.
(a) MONTH (b) MONTHNAME (c) HOUR (d) MINUTE
Ans. d
145. ______function in VBA returns year number from given date object.
(a) YEAR (b) MONTHNAME (c) HOUR (d) MINUTE
Ans. a
149. Variables which can be accessed using index values (from 0 to given number) are called
____ .
(a) Array (b) Integer (c) Double (d) Single
Ans. a
151. The following declaration creates an array having_____ number of elements. Dim a(3)
(a) 3 values indexed from 0 to 2 (b) 4 values indexed from 0 to 3
(c) 3 values indexed from 1 to 3 (d) 0 values indexed 0
Ans. b
152. From the following VBA code, select the correct statement from given choices:
Dim a(1)
a(0)=10
a(1)=20
REDIM PRESERVE a(2)
a(2)=30
(a) declares an array a with 2 elements
(b) assigns 10 and 20 at indices 0 and 1
(c) resizes the array to have 3 elements and assigns 30 to array index 2
(d) all of them
Ans. d
155. ______ keyword in VBA causes previous elements of array to be kept in the new array.
(a) NEW (b) DIM (c) PRESERVE (d) NEXT
Ans. c
156.______ function in VBA returns the smallest index for given array.
(a) LBOUND (b) UBOUND (c) SPLIT (d) JOIN
Ans. a
157. ______function in VBA returns the largest index for given array.
(a) LBOUND
(b) UBOUND
(c) SPLIT
(d) JOIN
Ans. b
P a g e | 165
159. _______function in VBA divides a string into an array at the occurrence of specified
substring.
(a) LBOUND (b) UBOUND (c) SPLIT (d) JOIN
Ans. c
160._____ function in VBA joins elements of an array and creates a string with specified
separator.
(a) LBOUND (b) UBOUND (c) SPLIT (d) JOIN
Ans. d
161. ______function in VBA returns elements which fulfill certain search criterion.
(a) ISARRAY (b) FILTER (c) ERASE (d) none of them
Ans. b
166. In case none of the conditions in an IF ladder is fulfilled, statements in____ block are
executed.
(a) ElseIf (b) End If (c) Else (d) Then
Ans. c
167. In the following VBA code, find out the possible bug/error:
Dim x as Integer
x=5
If x < 5
End If
(a) End If is missing
(b) Then keyword is missing at the end of If
(c) The condition in If statement is incorrect
(d) none of them
Ans. b
168. _____condition takes a value and compares it against several Case statements.
(a) Case (b) Select Case (c) End Select (d) Case Else
Ans. b
P a g e | 166
170. _____condition is matched if none of the Case conditions of Select Case is matched.
(a) Case (b) Select (c) End Select (d) Case Else
Ans. d
171. What would be the value of y after the execution of the following VBA code:
Dim x, y as Integer
x=5
Select Case x
Case 0
y = 10
Case 1
y=20
Case 2
y=30
Case Else
y=100
End Select
(a) 10 (b) 20 (c) 30 (d) 100
Ans. d
177. MsgBox function in VBA takes a______ as the first and mandatory parameter.
(a) String (b) Integer
(c) Double (d) Long
Ans. a
P a g e | 167
178. The second parameter of MsgBox in VBA is _____ to control the buttons of the dialog.
(a) Integer (b) Long (c) Single (d) Double
Ans. a
179. MsgBox may be provided the option ______to display only the OK button.
(a) vbYesNoCancel
(b) vbAbortRetryIgnore
(c) vbOKCancel
(d) vbOKOnly
Ans. d
180. MsgBox may be provided the option______ to display the OK and Cancel buttons.
(a) vbYesNoCancel
(b) vbAbortRetryIgnore
(c) vbOKCancel
(d) vbOKOnly
Ans. c
181. MsgBox may be provided the option_____ to display the Yes, No and Cancel buttons.
(a) vbYesNoCancel
(b) vbAbortRetryIgnore
(c) vbOKCancel
(d) vbOKOnly
Ans. a
182. MsgBox may be provided the option _______to display the Abort, Retry and Ignore buttons.
(a) vbYesNoCancel
(b) vbAbortRetryIgnore
(c) vbOKCancel
(d) vbOKOnly
Ans. b
183. MsgBox may be provided the option_____ to display the Yes and No buttons.
(a) vbYesNo
(b) vbRetryCancel
(c) vbCritical
(d) vbQuestion
Ans. a
184. MsgBox may be provided the option _____to display the Retry and Cancel buttons.
(a) vbYesNo
(b) vbRetryCancel
(c) vbCritical
(d) vbQuestion
Ans. b
185. MsgBox may be provided the option _______to display critical error message.
(a) vbYesNo
(b) vbRetryCancel
(c) vbCritical
(d) vbQuestion
Ans. c
P a g e | 168
187. MsgBox may be provided the option _______to display an exclamation message.
(a) vbExclamation
(b) vbInformation
(c) vbDefaultButton1
(d) vbDefaultButton2
Ans. a
189. MsgBox may be provided the option_______ to keep the first button as the default button.
(a) vbDefaultButton1 (b) vbDefaultButton2
(c) vbDefaultButton3 (d) vbDefaultButton4
Ans. a
190. MsgBox may be provided the option_______ to keep the second button as the default button.
(a) vbDefaultButton1
(b) vbDefaultButton2
(c) vbDefaultButton3
(d) vbDefaultButton4
Ans. b
191. MsgBox may be provided the option_____ to keep the third button as the default button.
(a) vbDefaultButton1
(b) vbDefaultButton2
(c) vbDefaultButton3
(d) vbDefaultButton4
Ans. c
192. MsgBox may be provided the option______ to keep the fourth button as the default button.
(a) vbDefaultButton1
(b) vbDefaultButton2
(c) vbDefaultButton3
(d) vbDefaultButton4
Ans. d
194. _____value in MsgBox function of VBA checks whether Cancel button was clicked.
(a) vbOK (b) VKCancel (c) vbAbort (d) vbRetry
Ans. b
195. _____value in MsgBox function of VBA checks whether Abort button was clicked.
(a) vbOK (b) VKCancel (c) vbAbort (d) vbRetry
Ans. c
196. ____value in MsgBox function of VBA checks whether Retry button was clicked.
(a) vbOK (b) VKCancel (c) vbAbort (d) vbRetry
Ans. d
215. The variable declared using a new class can be initialized using_____ keyword.
(a) Set
(b) Let
(c) Get
(d) none of them
Ans. a
P a g e | 171
216. Find the name of the property created using the following lines of VBA code:
Private s as Integer
Public Property Let Score(x as Integer)
s=x
End Property
Public Property Get Score() as Integer
Score = s
End Property
(a) s (b) Let (c) Get (d) Score
Ans. d
217. GUI supports visual components like CommandButton, Label, TexBox, ComboBox,
OptionBox, MultiPage, List, etc. which generate ______on user interaction.
(a) events (b) properties (c) functions (d) subroutines
Ans. a
219. Events fired from components are handled by______ linked to those events.
(a) functions (b) properties (c) variables (d) subroutines
Ans. d
220. A large window which supports placement of other components on its surface is called
_____.
(a) CommandButton (b) Label (c) UserForm (d) TextBox
Ans. c
221. The______ member supports Run from Run menu of VBA IDE.
(a) CommandButton (b) Label (c) UserForm (d) TextBox
Ans. c
223. ______ is suitable to start computation after collecting required input data for processing.
(a) CommandButton (b) Label (c) UserForm (d) TextBox
Ans. a
226. ______is creates a box with a circular dot, which can be receives tick only if all related boxes
become switched o_.
(a) CheckBox (b) OptionBox (c) List (d) ToggleButton
Ans. b
227.______ is creates a box with a triangular button, clicking which displays a number of input
values.
(a) ComboBox (b) OptionBox (c) List (d) ToggleButton
Ans. a
228. ______ is creates a box with a scrollable list containing a number of input values.
(a) ComboBox (b) OptionBox (c) List (d) ToggleButton
Ans. c
229. _____is creates a control which remains pressed or released after each click.
(a) ComboBox (b) OptionBox (c) List (d) ToggleButton
Ans. d
230.______ is creates controls help to create sets of components which can be brought to view by
clicking a button at top.
(a) TabStrip (b) MultiPage
(c) both a & b (d) neither a nor b
Ans. c
233. ______control can be used to select a range from the spreadsheet when the VBA program
runs.
(a) SpinBox (b) Image (c) RefEdit (d) Label
Ans. c
234. Properties window can be accessed by placing a_____ after the name of a variable.
(a) dot (.) (b) $ (c) # (d) ^
Ans. a
236. When content is about to be dragged over a VBA control, it gets____ event.
(a) Activate
(b) BeforeDragOver
(c) BeforeDropOrPaste
(d) Click
Ans. b
P a g e | 173
237. When some content is about to be droped or pasted on a VBA control, it gets ______event.
(a) Activate (b) BeforeDragOver (c) BeforeDropOrPaste (d) Click
Ans. c
243. When a key in the keyboard is pressed with focus on a VBA control, it generates _____event.
(a) Initialize (b) KeyDown` (c) KeyPress (d) KeyUp
Ans. c
244. When a key in the keyboard is pushed down with focus on a VBA control, it generates
_____ event.
(a) Initialize (b) KeyDown (c) KeyPress (d) KeyUp
Ans. b
245. When a key in the keyboard is released with focus on a VBA control, it generates
_____event.
(a) Initialize (b) KeyDown (c) KeyPress (d) KeyUp
Ans. d
246. When mouse button is pushed down on a VBA component, ______event is generated.
(a) MouseDown (b) MouseMove (c) MouseUp (d) QueryClose
Ans. a
248. When mouse button is released after clicking a VBA component, ______event is generated.
(a) MouseDown (b) MouseMove (c) MouseUp (d) QueryClose
Ans. c
250. A set of Windows components, each one created for specific works related to content
downloaded from the World Wide Web is called______ controls.
(a) ActiveX (b) X-Window (c) Visual (d) Spreadsheet
Ans. a
254. In a query performed on data contained in Excel spreadsheet (say Sheet1), table name
should be replaced by_______ name.
(a) [Sheet1&] (b) [Sheet1$] (c) [Sheet1#] (d) [Sheet1%]
Ans. b
257. When a runtime error occurs, choose ______from the dialog to correct the program.
(a) End (b) Debug (c) Stop (d) Continue
Ans. b
258. After program stops due to error or breakpoint, hovering mouse over a variable _______.
(a) ignores the variable
(b) deletes the variable
(c) displays the value of the variable
(d) resets the variable
Ans. c
259. Using a variable on the right side of computation expression without assigning any value to
the variable is may result in________.
(a) junk result
(b) crashing of program
(c) both a & b
(d) neither a nor b
Ans. c
260. After program stops due to error or breakpoint, trial code lines may be entered in______ to
see the result of changes on the program.
(a) Immediate Window (b) Properties Window
(c) Code Window (d) Project Explorer
Ans. a
261. Which VBA built in function returns location at the second string occurs within the first string?
A) Mid() B) Chr() C)ASC() D) Instr()
Ans. d
268.Which function returns true if the expression is a valid date, otherwise it returns false in VBA?
A CDate() B IsDate() C Day() D Dateadd()
Ans. b
269.Which function returns the day of the month (number from 1 to 31) given date value in VBA?
A Day() B Date() C Month() D Date part()
Ans. a
271.Which shortcut key is used to set the properties of form while designing?
A F4 B Ctrl + F4 C Alt + F4 D Shift + F4
Ans. a
279.Which worksheet method is used to copy a sheet to another location in the workbook?
A Activate B Copy C Save AS D Select
Ans. b
280.Which VBA worksheet property return or sets a string value that represents the object name?
A Name B Index C Range D Cells
Ans. a
281.Which method displays the data form associated with the worksheet in VBA?
A Copy B Printout C Show Data Form D Select
Ans. c
282.Which VBA property returns a range object that represents all the cells on the worksheet?
A Cells B Rows C Index D Name
Ans. a
285.Which workbook property returns the name of the object including its path on disk in VBA?
A Full name B Name C Path D Worksheets
Ans. a
286.Which type of list box enables one choice of adjacent choice in VBA?
A Drop down list B Single - selection list box
C Multiple - selection list box D Extended - selection list box
Ans. c
289.Which box groups related controls into one visual unit in a rectangle with an optional label?
A Label box B Group box C List box D Combo box
Ans. b
292.Which shortcut key is used to open VBA Editor from the Excel worksheet?
A Ctrl + F11 B Alt + F11 C Ctrl + V D Ctrl + F7
Ans. b
293.Which shortcut key is used to step into line - by - line execution in VBA?
A F2 B F4 C F5 D F8
Ans. d
294.What is called the set of commands bundled together under one name?
A Properties B Macros C Procedures D Events
Ans. b
295.What is called the set of statement that are executed under one name?
A Macros B Properties C Procedures D Events
Ans. c
300.Which type of variable can be accessed or used by subroutines outside the modules in VBA?
A Static B Private C Protect D Public
Ans. d
303.Which function is used to check whether the given input is numeric or Not in VBA?
A Numeric() B Isnumber() C Isnumeric() D Isnum()
Ans. c
306.Which is used to repeats the same steps in case of frequency needed actions in VBA?
A Class B Object C Functions D Macros
Ans. d
310.Which type of words cannot use for any other purpose in VBA?
A Literals B Keywords C Constants D Variables
Ans. b
311.Which is a series of items where all items share the same properties and methods in VBA?
A Arrays B Groups C Methods D Collections
Ans. d
314.Which window displays the entire list of local varibles and their current values in VBA?
A Locals window B Watch window C Immediate window D Debugging window
Ans. a
315.Which window is similar to the locals window, but it is used to tracing the variables in VBA?
A Call stack window B Watch window
C Immediate window D Debugging window
Ans. b
318.Which shortcut key allows debugger to run the current procedure and go line after line called
the procedure in VBA?
A Ctrl + Shift + F6 B Ctrl + Shift + F7
C Ctrl + Shift + F8 D Ctrl + Shift + F9
Ans. c
319.Which control is used to increase or decrease a value, such as a number time or date?
A Scroll Bar B Spin Button C Combo Box D Toggle Button
Ans. b
320.Which VBA function compares given strings and returns -1 if the first string is smaller than the
second string, returns 0 if both are equal and 1 if the first string is greater than second string?
A Strcmp B Strcomp C Compare D Scmp
Ans. a
321.Which scope does the variable declared with dim and remains in the existance only as long as
the procedure in which if is declared is running?
A Global scope B Local scope C Module scope D Project scope
Ans. b
327. The security warning bar does not open when you open a workbook with macros if you
choose:
a) open special b) Enable all macros c) edit anyway d) Trust this document
Ans. b
330. A single workbook is called an object while more than one workbooks are called:
a) a collection b) a gallery c) a code d) a volume.
Ans. a
331. In visual basic, each line preceded by an apostrophe and shown in green is a:
a) Macro b) Tag c) Sub d) Comment
Ans. d
332. You can tell when an excel template is macro- enabled by looking at its extension.
a) Extension b) Name c) Tabs d) Layout
Ans. a
333. To run a macro that was recorded with relative reference, you must first :
a) save it b) select it c) enable it d) activate a cell
Ans. d
334. When you create a workbook from an excel macro-enabled template, you must first click:
a) Open normally b) Enable content c) Edit anyway d) Open in safe mode
Ans. b
337. You can find a button which toggles between Record Macro and Stop Recording in the :
a) Backstage view
b) Macro view
c) Status bar
d) View menu
Ans. c
P a g e | 182
338. ______is used for finding out about objects, properties and methods.
a) Form layout window b) code editor window c) Object browse d) None of these
Ans. c
340. The variable that does not change the value during execution of program is______
a) Numeric b) String c) Constant d) None of these
Ans. c
341. ______is a method which moves the focus to the specified control or form.
a) Setfocus b) Lostfocus c) Gotfocus d) None of these
Ans. a
343. ______is a data type that can be used to declare a text of maximum 10 million characters.
a) Data b) Ulog c) Numeric d) String
Ans. d
344. Variable are named storage locations in memory, the value of which does not change during
program______
a) debug b) design c) execution d) All of the above
Ans. c
347. The method, which loads the form into memory and displays it on screen
a) Load b) Show c) Display d) All of these
Ans. b
348. The code in an application can be broken into logical components by_____ process.
a) Modular b) Procedural c) partitioning d) none of these
Ans. c
349. The window in which the individual documents are displayed is called_____ window.
a) main
b) child
c) parent
d) Root
Ans. b
P a g e | 183
351. ______ control executes the timer events at specified intervals of time.
a) clock B) frame c) timer d) digital
Ans. c
352. A _____ control in visual basic is used to create applications that present information in rows
and columns.
a) MSGridLine b) MSLineGrid c) MSGridFlex d) MSFlexGrid
Ans. d
357. The _____ allows direct exit from a For loop, Do loop, Sub procedure, or Function procedure.
a) Break b) Exit c) Exit for d) Exit Do
Ans. b
358. ______ displays current directory with any subdirectories and allows the used to change
directory.
a) FileListBox b) DirListBox c) DriveListBox d) All of these
Ans. b
362. Form_Mouse Down() procedure is executed when any mouse button is clicked in a free area
of the_____.
a) Form b) window c) screen d) none of these
Ans. a
364. The____ is a tool used for both the input and output purpose.
a) Label b) text box c) combo box d) command button
Ans. b
366. The _______ property is used in VB for maximum form at run time.
a) caption b) window resize c) window status d) none of these
Ans. c
367. ______ is property is used to hide the content in textbox with some symbols.
a) Name b) Caption c) Hidden d) Password char
Ans. d
368. ______ method is used to retrieve the stored text from the clipboard.
a) input b) Gettext c) Addtext d) Settext
Ans. b
369. _______ control displays current directory with any sub directories and allows the user to
change directly.
a) File list box b) Drive list box c) Directory list box d) All of these
Ans. c
372. Which symbol creates an access key in the text of a menu item?
a) @ b) & c) $ d) #
Ans. b
373. When the form Is first referenced in any manner by program, the triggered event is…
a) Load b) Activate
c) Initialize d) None of these
Ans. c
P a g e | 185
374. The properties window plays an important role in the development of visual basic
applications. It is mainly used
a) To change how objects look and feel
b) When opening programs stored on a hard drive
c) To allow the developer to graphically design program components
d) To set program related options like program Name, Program location, etc
Ans. a
377. One or more option button controls can be selected from _____ choices.
A. multiple. B. single. C. dual. D. parallel.
ANSWER: A
378. _____ bar contains a set of tools to provide controls in the Form.
A. Status. B. Tool C. Menu. D. Progress.
ANSWER: C
380. Code window consists of a ______ box and procedure list box.
A. object. B. event. C. tool. D. message.
ANSWER: A
381. The ____ statement checks in the module for usage of any undeclared variables and reports
an error to the user.
A. looping. B. iteration. C. dim. D. external.
ANSWER: C
382. Dynamic arrays can be declared when the user may not know the _____of the array at
design time.
A. exact column. B. exact variable. C. exact value. D. exact size.
ANSWER: D
383. Variables are named storage locations in memory, the value of which does not change during
program______.
A. design. B. execution. C. debug. D. modification.
ANSWER: B
P a g e | 186
384. Variables of different data types when combined as a single variable to hold several related
information is called as ______ data types.
A. numeric. B. user defined. C. string. D. byte.
ANSWER: B
386. All the controls in an array will have the same _____.
A. Value. B. properties. C. address. D. location
ANSWER: B
390. Form_Mouse Down ( ) procedure is executed when any mouse button is clicked in a free
area of the ______.
A. window. B. form. C. screen. D. property.
ANSWER: B
391. _____ is a tool used in visual basic to draw rectangle in the form.
A. Textbox. B. Option button. C. Command button. D. Shape.
ANSWER: D
395. The ______property of a form automatically sizes the picture loaded to it.
A. auto size.
B. default.
C. size.
D. height.
ANSWER: A
P a g e | 187
396. While entering a new project ______ option to be select from the dialog box.
A. open exe. B. standard exe. C. activex exe. D. activex dll .
ANSWER: B
398. The Line method can be used to draw ______ shape in VB.
A. rectangle. B. circle. C. ellipse D. oval
ANSWER: A
400. In Visual basic more than one child _____ is allowed to add in project.
A. form. B. window. C. property. D. codings.
ANSWER: A
403. A piece of code automatically generated by an MS Office program based on the actions of
user is called_____.
(a) function (b) subroutine (c) macro (d) micro
Ans. c
404. _______is suitable to collect text input from the user.
(a) CommandButton (b) Label (c) UserForm (d) TextBox
Ans. d
412. Visual basic is a tool that allows you to develop application in______
a) Real time b) Graphical user interface c) character user interface d) None
Ans. b
413. In visual basic, a variable name cannot be more than ______ characters.
a) 255 b) 300 c) 355 d) 400
Ans. a
415. In visual basic _____ types of scroll bars available in visual basic.
A. two. B. three. C. four. D. five.
ANSWER: A
419. Excel file having VBA code is saved using the extension .
(a) .xlsx (b) .xlsm (c) .xlst d) .xls
Ans. b
P a g e | 189
Tally
1. Company restore option is available in ________.
a) Company reset b) New company c) company information d) Edit company
Ans. c
2. To change current Date from Gateway of tally press the key ____.
a) F1 b) F2 c) F3 d) F4
Ans. b
4. Tally can maintain ________ for stock keeping, so that fresh inventory may arrive before the old
stock is exhausted.
(a) reorder level (b) profit (c) loss (d) cash
Ans. a
9. Payroll, budgeting and scenario management may be enabled through ______menu in Tally.
(a) Accounting Features (b) Inventory Features
(c) Statutory and Taxation (d) none of them
Ans. a
10. Account Groups, Ledgers, Budget and scenario are available under ______ in Tally.
(a) Payroll Info (b) Inventory Info (c) Accounts Info (d) none of them
Ans. c
11. Inventory groups, (categories, if needed), items, units of measure, reorder level, inventory
vouchers, etc. are available under _______in Tally.
(a) Payroll Info (b) Inventory Info
(c) Accounts Info (d) none of them
Ans. b
P a g e | 191
12. Employee groups, employee, attendance/ production types, pay heads, salary details, voucher
types, etc. are available under in Tally.
(a) Payroll Info (b) Inventory Info (c) Accounts Info (d) none of them
Ans. a
17. ______ is the shortcut to change the accounting period from Gateway of Tally.
(a) F1 (b) Alt+F1 (c) Alt+F2 (d) Alt+F3
Ans. c
20. _____is the shortcut to inventory buttons from Accounting Vouchers in Tally.
(a) Alt+F1 (b) Ctrl+F1 (c) F7 (d) F8
Ans. a
23. _____is the shortcut to sales voucher from Accounting Vouchers in Tally.
(a) Alt+F1 (b) Ctrl+F1 (c) F9 (d) F8
Ans. d
24. ______ is the shortcut to purchase voucher from Accounting Vouchers in Tally.
(a) Alt+F1 (b) Ctrl+F1 (c) F9 (d) F8
Ans. c
P a g e | 192
25. ______is the shortcut to credit note from Accounting Vouchers in Tally.
(a) Alt+F1 (b) Ctrl+F1 (c) Ctrl+F9 (d) Ctrl+F8
Ans. d
26. _____ is the shortcut to debit note from Accounting Vouchers in Tally.
(a) Alt+F1 (b) Ctrl+F1 (c) Ctrl+F9 (d) Ctrl+F8
Ans. c
30. _____ is the shortcut to Accounting Invoice from Accounting Vouchers in Tally.
(a) F10 (b) Ctrl+F10 (c) Alt +I (d) Alt +V
Ans. c
31. ______ is the shortcut to voucher as invoice from Accounting Vouchers in Tally.
(a) F10 (b) Ctrl+F10 (c) Alt +I (d) Ctrl +V
Ans. d
36. ______ is the shortcut to Payroll as Voucher from Payroll Vouchers in Tally.
(a) Alt+ A (b) Alt+ S (c) Ctrl+F5 (d) Ctrl+F4
Ans. b
37. _____ is the shortcut to Payroll Auto fill from Payroll Vouchers in Tally.
(a) Alt+ A (b) Alt+ S (c) Ctrl+F5 (d) Ctrl+F4
Ans. a
P a g e | 193
38. ______ is the shortcut to purchase order from Payroll Vouchers in Tally.
(a) Alt+F4 (b) Alt+F5 (c) Ctrl+F5 (d) Ctrl+F4
Ans. a
39. ______ is the shortcut to sales order from Payroll Vouchers in Tally.
(a) Alt+F4 (b) Alt+F5 (c) Ctrl+F5 (d) Ctrl+F4
Ans. b
40. _____ is the shortcut to physical stock verification from Inventory Vouchers in Tally.
(a) Alt+F4 (b) Alt+F5 (c) Alt+F7 (d) Alt+F10
Ans. d
41. ______ is the shortcut to stock journal from Inventory Vouchers in Tally.
(a) Alt+F4 (b) Alt+F5 (c) Alt+F7 (d) Alt+F10
Ans. c
45. _____ is the shortcut to delivery note from Inventory Vouchers in Tally.
(a) Alt+F6 (b) Ctrl+F7 (c) Alt+F8 (d) Alt+F9
Ans. c
46. ______ is the shortcut to receipt note from Inventory Vouchers in Tally.
(a) Alt+F6 (b) Ctrl+F7 (c) Alt+F8 (d) Alt+F9
Ans. d
48. Entering each transaction in debit and credit columns is called____ entry system of
accounting.
(a) single (b) double (c) triple (d) quadruple
Ans. b
49. Prior allocation of money for specific purposes using Tally is called_____ .
(a) budgeting
(b) scenario
(c) inventory
(d) voucher entry
Ans. a
P a g e | 194
50. Progress of expenses against budget allocation may be compared to the trial balance of
original company using ______menu in Trial Balance.
(a) Budget (Alt+ B) (b) Column (Alt+ C) (c) F6 (d) F7
Ans. a
53. Reversing journal entries made for scenario _____ the original account of company.
(a) do not affect (b) affect (c) change (d) permanently damage
Ans. a
54. Extra columns may be added to the original Trial Balance using _____menu in Trial Balance.
(a) Budget (Alt+ B) (b) Column (Alt+ C) (c) F6 (d) F7
Ans. b
55. Reversing journal entries may be made to scenario using ________shortcut under Accounting
Vouchers in Tally.
(a) F5 (b) F6 (c) F7 (d) F10
Ans. d
60. Cost centre can be created using______ menu in Features (F11) at Gateway of Tally.
(a) Accounting features (b) Inventory features (c) Statutory & taxation (d) none of them
Ans. a
61. A number ranging from 0 to 1 (or as a percentage) to measure the performance of company
against its potential is called_______.
(a) scenarios (b) budgets (c) ratio analysis (d) voucher
Ans. c
P a g e | 195
71. The tax collected by the employer towards income of an employee is called____.
(a) Tax Deducted at Source (TDS)
(b) Tax Collected at Source (TCS)
(c) Fringe Benefit Tax (FBT)
(d) Value Added Tax (VAT)
Ans. a
72. The tax collected by the seller from the buyer is generally called____.
(a) Tax Deducted at Source (TDS)
(b) Tax Collected at Source (TCS)
(c) Fringe Benefit Tax (FBT)
(d) Value Added Tax (VAT)
Ans. b
P a g e | 196
73. The tax payable towards to perks/small benefits offered by the employer to the employees
through extra means other than salary is called _____.
(a) Tax Deducted at Source (TDS) (b) Tax Collected at Source (TCS)
(c) Fringe Benefit Tax (FBT) (d) Value Added Tax (VAT)
Ans. c
75. Language of Tally user interface can be changed using in Tally Window.
(a) Languages (Alt+ G) (b) Delete (Alt+ D) (c) Print (Alt+ P) (d) Quit (Alt+ Q)
Ans. a
80.Which are the things and properties for resale that converts into cash?
A Current assets B Business Transaction
C Liabilities D Purchase
Ans. a
81.Which function key is used to record fund transfer between cash and bank account?
A F4 B F5 C F6 D F7
Ans. a
82.Which document is issued by the receiver of cash to the giver of cash acknowledging the cash
received voucher?
A Ledgers B Journals
C Receipts D Vouchers
Ans. c
P a g e | 197
83.What is termed as excess of credit side total amount over debit side total amount in profit and
loss account?
A Credit B Debit C Loss D Profit
Ans. d
86. Which activity in Tally is used to find out the financial position of the organisation?
A Balance sheet B Book-keeping C Trading D Profit and loss
Ans. a
88.What is a summarized record of all the transactions to every person, every property and every
type of service?
A Account B Journals C Ledgers D Vouchers
Ans. a
90.What is the shortcut key to export the report in ASCII, SDF, HTML or XML format?
A Alt + C B Alt + D C Alt + E D Alt + X
Ans. c
91.Who gives benefits without receiving money, but will claim in future?
A Creditor B Debtor C Owner D Worker
Ans. a
92. Which is the ledger grouping for bills receivable in Tally ERP9?
A Fixed asset B Current asset C Direct expenses D Indirect expenses
Ans. b
100.Where does the transactions are entered, before taken to the appropriate ledger account?
A Balance sheet B Journals C Receipts D Vouchers
Ans. b
101.Which term is used for the amount invested for starting a business by a person?
A Asset B Capital C Debit D Liabilities
Ans. b
104.Which term is used for all the amounts payable by a business concern to outsiders?
A Assets B Capitals C Debits D Liabilities
Ans. d
P a g e | 199
105.Which is a statement of all the ledger account balance prepared at the end of particular period
to verify the accuracy of the entries?
A Journals B Receipts C Trial Balance D Vouchers
Ans. c
108.Which combination of function key is used to open inventory voucher‟s entry menu?
A Alt + F1 B Alt + F3 C Alt + F5 D Alt + F7
Ans. a
110.Which shortcut key is used to shut a company from the gateway of Tally screen?
A Alt + F1 B Alt + F3 C Alt + F5 D Alt + F7
Ans. a
112.Which sequence of option is used to view the trial balance on the screen?
A Gateway of Tally →Trial balance
B Gateway of Tally → Display → Trial Balance
C Gateway of Tally → Accounts Info → Trial Balance
D Geteway of Tally → Display → Account Book → Trial balance
Ans. b
113.Which report displays the summary of all the cost centres under a cost category?
A Category summary B Cost centre Break-up
C Group Break-up D Ledger break-up
Ans. a
121.Which shortcut key is used to cancel a voucher in Day book / List of vouchers in Tally?
A Alt + D B Alt + I C Alt + S D Alt + X
Ans. d
122. Rs. 20,000 withdraw from state bank, in which voucher type this transaction will be recorded
a) Payment b) Receipt c) Contra d) Post-Dated
Ans. c
127. Which of the following shows daily balance for a selected voucher type?
a) Daybook b) Trial Balance c) Balance sheet d) None of these
Ans. a
P a g e | 201
128. Which option is used to move from one company to another when more than one companies
are open?
a) Company info b) Shut company c) Select company d) Company
Ans. c
137. Income tax number of the company will appear in which report ?
a) Cash/bank book b) Profit and loss a/c c) Reminder letter d) none of these
Ans. d
141. Which option is used to view Trial Balance from Gateway of Tally?
a) Gateway of tally> Report> Trial Balance
b) Gateway of Tally> Trial Balance
c) Gateway of Tally > Reports> Display> Trial Balance
d) None of these
Ans. c
142. Accounting principle are divided into two types. These are
a) Accounting concepts b) Accounting conventions
c) Accounting standard d) 1 and 3 both
Ans. d
143. …. Are the liabilities which are payable after a long period.
a) Fixed liabilities b) Miscellaneous expenditure
c) current liabilities d) contingent liabilities
Ans. a
150. Which of the following is compulsory to create while entry in accounts with inventory
a) Stock groups b) Stock items
c) Units of Measure d) All of these
Ans. d
P a g e | 203
158. A group company is…. Given to the merged accounts of member companies of the group.
a) a name b) an identity c) A and B d) none of these
Ans. c
167. We can show Bill wise details of Debtors and Creditors by activating.
a) Bill by bill b) Maintain Bill wise Details c) Maintain References d) None
of these
Ans. b
168. Which of the following is not compulsory to create while entry in Accounts with inventory
a) Stock Groups b) Stock items c) Stock Categories d) Units of Measure
Ans. c
188. Which option is used to place data taken in pen drive or CD to Appropriate place in Tally.
a) Backup b) Restore c) Split company Data d) None of these
Ans. b
189. Which option is selected from company info menu to divide company data into two financial
years
a) Change Tally vault b) Alter c) Split Company Date d) New Company
Ans. c
196. The profit & loss statement can be displayed in ….. format.
a) Horizontal b) Vertical c) A or B d) None of the above
Ans. c
197. ….is the expense which is unpaid at the end of the accounting period
a) Outstanding expenses b) prepaid expenses
c) proposed expenses d) working capital
Ans. a
P a g e | 207
198. To activate MRP feature from gateway of tally initially we need to press
a) F11 b) F12 c) F10 d) Alt + F1
Ans. b
202. Which menu appears after starting Tally for the first time
a) Gateway of Tally b) Company info c) Display d) None of these
Ans. b
204. How many options related to Company Features are there in F11:Features in Tally
a) 3 b) 2 c) 4 d) 5
Ans. a
205. … button helps to connect data from spread sheet or other application
a) E-mail b) Help c) Export d) Browser
Ans. c
206. Which unit is created for stock items like grains, pulse, sugar, oil, ghee etc.
a) Lts. b) Nos c) Kgs d) Box
Ans. c
207. Which of the following is not a disadvantage of introducing computerized accounting system
a) Possible demotivation through reundance
b) High expenditure of set up
c) Saving made on labour cost
d) Required staff training
Ans. c
209. ….. Allow components list details (Bill of Material)? Option is activated for
a) Ledger b) Cost category c) Stock items d) Budgets
Ans. c
211. Which shortcut key is pressed to display Part No. for automobile industries
a) F1 b) F2 c) F11 d) F12
Ans. d
219. Goods returning to a Creditor after challan but before bill we need to pass
a) Debit Note b) Receipt Note
c) Rejection Out d) Rejection in
Ans. c
229. The location of saving data of company can be altered by changing the
a) Tally.exe b) Tally.data c) Tally.ini d) Tally.sav
Ans. c
241. _____ feature helps the administrator to track changes in the accounts.
a) Tally Audit b) Tally Vault c) Tally Gold d) None of these
Ans. a
244. To pass the TDS transaction in the journal entry mode, we have to press
a) Alt + C b) Alt + S c) Alt + N d) Alt + F4
Ans. b
253. To activate MRP features from Gateway of Tally initially we need to press
a) F10 b) F11 c) F12 d) Alt + F1
Ans. c
255. To show the cheque number while reconciling Bank Account Press
a) Ctrl + F11 b) Ctrl + F12 c) F11 d) F12
Ans. d
CPU ports
Ports are located at the rear panel of CPU.
Ports help connection of various peripherals (like keyboard, mouse, printer, scanner,
camera, speaker, microphone, audio-input, monitor, serial modem, broadband line, etc.) to
thecomputer.
Some of the most common ports are: (i) PS/2 (Personal System 2) ports for keyboard and
mouse; (ii) RS-232 (Recommended Standard 232)/ Serial port for mouse, modem and
otherserial devices; (iii) VGA (Video Graphics Array) port for connecting monitor or
projector;(iv) Ethernet / RJ-45 (Registered Jack 45) for broadband connection; (v) USB
(UniversalSerial Bus) port for connecting printer, fax, pen drive, external hard disk, external
DVDwriter, web camera, etc.; (vi) LPT (Line Printer Terminal) port for connecting old style
dotmatrix/ line printers; (vii) 3.5mm audio jack for speaker output/ mic input; (viii) Gameport
- port for connecting joystick.
PS/2 Port : The PS/2 (Personal System/2) port, also referred to as the mouse port or keyboard
port, was developed by IBM. It is used to connect a computer mouse or keyboard to an IBM
compatible computer. The PS/2 port is a mini DIN plug that contains six pins and is still
sometimes found on all IBM compatible computers.
P a g e | 215
USB Port :Universal Serial Bus is an industry standard that establishes specifications for cables
and connectors and protocols for connection, communication and power supply between
computers, peripherals and other computers.
Ethernet Port :An Ethernet port (also called a jack or socket) is an opening on computer network
equipment that Ethernet cables plug into. Their purpose is to connect wired network hardware in
an Ethernet LAN, metropolitan area network (MAN), or wide area network (WAN).
Serial Port :In computing, a serial port is a serial communication physical interface through
which information transfers, either in or out, one bit at a time (in contrast with parallel port). During
most of the personal computers history, serial ports connected computers to devices such as
terminals and various peripherals.
Parallel Port :In computing, a parallel port is a type of interface found on computers (personal
and otherwise) for connecting peripherals. The name refers to the way the data is sent; parallel
ports send multiple bits of data at once (parallel communication), as opposed to serial
communication, in which bits are sent one at a time.
P a g e | 216
VGA Port :A Video Graphics Array connector is a three-row 15-pin DE-15 connector. The 15-pin
VGA connector was provided on many video cards, computer monitors, laptop computers,
projectors, and high definition television sets.
2. Transformation between the parallel and serial ports is done with the help of
a) Flip flops b) logic circuits
c) Shift registers d) peripherals
Ans. c
Explanation: Physical ports are connections that connect two systems for their interaction. LAN,
PS2 and DVI are example of physical ports
5. _______ are logical numbers assigned for logical connections.
a) Logical ports
b) Physical ports
c) Networking cables
d) IP address
Ans. a
Explanation: Logical ports are end-point to a logical connection. The numbers are pre-assigned
by IANA (Internet Assigned Numbers Authority) which ranges from 0-65536.
P a g e | 217
7. Virtual ports help software in sharing without interference all hardware resources.
a) True b) False
Ans. a
8. _____ needs some control for data flow on each and every logical port.
a) Antivirus
b) Network firewall
c) Intrusion Detection Systems (IDS)
d) Anti-malware
Ans. b
9. The logical port is associated with the type of protocol used along with the IP address of the
host.
a) True b) False
Ans. a
a) IBM
b) Intel
c) Heetson
d) Microsoft
Ans. a
23. A Video Graphics Array connector is a _____ row and _____ pin
a) 3, 15
b) 2, 25
c) 1, 10
d) 6, 12
Ans. a
P a g e | 220
Operating System
2. In a single unit of computer we can use more than _______OS But at a time we may run only
one OS.
Ans. 1
9. The computer and software system that control the machine is called _______
Ans. Embedded System
15. An operating system is said to be multiuser if more than______ user can work simultaneously.
a) one b) two c) three d) four
Ans. A
16. The computer and software system that control the machine is __________.
a) control system b) embedded system c) operating system d) firmware software
Ans. b
18. Computer Process data into info By working exclusively with _________
a) Codes b) Numbers c) Programming language d) Processing language
Ans. b
19. When creating a computer program, the_________ designs the structure of the program.
a) System Analyst b) Compute programmer c) Computer designer d) Programmer
Ans. a
20. ______is a computer program that directly executes instructions written in a programming or
scripting language, without requiring them previously to have been compiled into a machine
language program.
a) Compiler b) Assembler c) Language converter d) interpreter
Ans. d
21. _________is a computer program that translate and executes program at run time line by line.
a) Compiler b) Assembler c) Language converter d) interpreter
Ans. d
33. If the displayed system time and date is wrong, you can reset it using
Ans. Control Panel
36. A co-processor
a) is relatively easy to support in software
b) works with any application
Ans. a
39. The ____ Program compresses large files into a smaller file
Ans. WinZip
41. Which of the following operating system does not implement the multitasking truly?
a) Window 98 b) MS DOS
Ans. b
43. What program runs first after computer is booted and loading GUI?
a) Desktop manager b) Authentication
Ans. b
44. Which of the following operating system is better for implementing a client-server network
a) MS DOS
b) Windows 2000
Ans. b
P a g e | 224
47. Which of the following does not support more than one program at a time?
a) DOS b) Linux
Ans. a
50. Which operating system can you give smallest file name?
a) Windows b) DOS
Ans. b
54. The ____ displays the name of every computer user on the computer
a) Wish list screen b) Welcome screen
Ans. b
55. The category of software most appropriate for controlling the design and layout of complex
document like newsletters and brochure is:
a) Word Processing b) Computer aided design
Ans. a
57. The memory which allocated space for DOS and application is called
Ans. Conventional memory
P a g e | 225
58. The operating system creates ____ from the physical computer.
Ans. Virtual computers
59. Which mode loads minimal set of drivers when starting windows?
a) Safe mode
b) Normal mode
Ans. a
62. Which type of command requires additional files to perform specific operations?
Ans. External commands
66. The most recent version of MAC OS is based on the ____ operating system.
a) Windows b) Linux
c) UNIX d) CMOS
Ans. c
69. Once text has been cut to the clipboard, you can _____ that text into another document
Ans. Paste
P a g e | 226
70. Which of the following operating system reads and reacts in actual time?
a) Quick Response system
b) Real Time System
Ans. b
71. All of the following are True regarding virtual memory except
a) Any amount of RAM can be allocated to virtual memory
b) The setting for the amount of hard disk drive space to allocate virtual memory can be manually
change
c) This temporary storage is called the swap file or page
d) Virtual memory is the physical space of the hard drive
Ans. a
72. The essential difference between an operating system like linux and one like windows is that
Ans. Any programmer can modify linux code which is not permitted with windows
74. Which of the following does not occur during the Power-on-self-test (POST)?
a) The scan disk utility begins to run
b) The video card and video memory are tested
Ans. a
77. A small part of taskbar that has icons of background running application is
a) Task bar b) System tray
Ans. b
78. An operating system version designed for use with a media center PC is Microsoft WindowsXP
a) Home edition b) Media center edition
Ans. b
79. An operating system version designed for use with a tablet PC is Microsoft Windows XP
a) Home edition b) Tablet PC edition
Ans. b
80. ____ runs on a computer hardware and serves as a platform for other system to run on
Ans. Operating system
81. Which is the first program run on a computer when the computer boots up?
Ans. Operating system
82. The _____ contains commands associated with the my computer window
a) Start menu b) System menu
Ans. b
P a g e | 227
83. _____ is the layer of a computer system between the hardware and the user program
Ans. Operating system
84. When you start up the computer the boot up storage at which the BIOS version manufacturer
and data are displayed on the monitor is called
Ans. Power on self test (POST)
85. The operating system is the most common type of ____ software
Ans. System
86. Which of the following is not essential to shut down your computer?
a) Save all opened files b) Switch off monitor
Ans. b
87. You can move window to a different position on your screen by dragging it by its_____
Ans. Move handle
88. A bar that inform you that available options in your computer, opened applications, background
running applications and can be used to switch between applications quickly is ______
Ans. Task bar
92. When a peripheral device needs immediate attention from the operation system, it generates a
a) Spool b) Interrupt
Ans. b
93. Windows displays various options to shut down. Which is suitable at the end of day?
a) shut down b) Restart
Ans. a
95. _____ is most often done after fixing a problem, adding a new program or making
configuration change
Ans. Restart
96. _____is a compromise mode between shut down and sleep mode because it does not
consume power and remembers the current state of your desktop
Ans. Hibernate
P a g e | 228
97. You should choose this mode if you don‟t know how long you won‟t use your computer but
want to have the same desktop state when you resume
Ans. Hibernate
98. The category of operating system that you most likely have running on your PDA computer is a
_____ Operating system
Ans. Single user, single task
104. A utility that can be used to minimize the number of fragmented files and enhance the speed
a) Disk space b) Defrag
Ans. b
106. Recently used application file list appears in the Windows operating system
a) Setting menu b) Documents menu
Ans. b
114. A spooler is a
Ans. Program that coordinates the print job that are waiting to process
115. The problem with ____ file is that they slow your computer‟s operation
a) Fragmented b) Formatted
Ans. a
120. In Microsoft windows, the graphical pattern on the desktop used as background for windows
is______
Ans. Wall paper
121. All of the following are task performed by the operating system except
a) Managing hardware on the computer
b) Controlling the access that application program has to the CPU
c) Performing housekeeping task like file compression and disk defragmentation
d) Provide an interface for user to interact with computer
Ans. c
141. The ability of an operating system to control the activities of multiple program at the same
time is called _____
Ans. Multitasking
147. Press the ____ button to have the window fill the entire screen
Ans. Maximize
148. Which windows features can be accessed from the start menu?
a) Help b) Window Explorer c) Microsoft Network d) All of these
Ans. d
150. A real time operating system in most likely to be used for which of the following task
a) Controlling access to a shared printer in a network
b) Controlling the fuel injections system of an automobile engines
Ans. b
P a g e | 232
154. _____ is a new windows features that offers a number of methods for searching for a file or
folder?
Ans. Find
157. The Operating feature the integrates the file created in different application into WebPages
Ans. Web integration
163. Press ____ key while booting to display Advanced Boot Menu
Ans. F8
166. The operating system allows the user to organize the computer‟s contents in a hierarchical
structure of directories that include all of the following except:
a) Files b) Folders c) Drives d) System
Ans. d
167. Desktop is a
a) Provides work space b) Display program
Ans. a
169. The program that is responsible for loading the operating system into RAM is called
Ans. Bootstrap program
172. _____ interface consists of thing like program counter, register, interrupts and terminal
Ans. Hardware
174. Which of the following resources must be protected by the operating system?
a) I /O b) Memory
c) CPU d) All of these
Ans. d
177. Part of the POST process in to ensure that the test of essential peripheral device coincides
with the hardware configuration that stored in
Ans. CMOS
185. When a computer is first turned on or restarted, a special type of absolute loader called
Ans. Bootstrap loader
186. In which type of the OS, the response time is very crucial.
Ans. Real time Operating system
187. Which of the following is a correct association between a vendor and an operating system
a) Redhat Linux
b) Microsoft Unix
Ans. a
188. ______ controls the way in which the computer system functions and provides a means by
which users can interact with the computer
Ans. The Operating system
192. The windows feature is the ability of computer to automatically configure a new hardware
component is that
Ans. Plug and play
194. The _____ provides information about hardware installation, configuration and hardware
status
Ans. Device manager
198. The maximum length of any single path from the root directory
Ans. 63
199. The part of machine level instruction, which tells the central processor that has to be done, is
Ans. Operation code
200. A system program that combined modules of a program into a form suitable for execution
Ans. Linking loader
201. Process is
Ans. A program in execution
205. A system program that sets up an executable program in main memory ready for execution is
Ans. Loader
206. Which of the following are loaded into main memory when the computer is booted?
Ans. internal command instructions
P a g e | 236
207. What is the name given to the organized collection of software that controls the overall
operation of a computer?
Ans. Operating system
209. What is the name of the operating system for the laptop computer called MacLite?
Ans. OZ
211. What is the name given to all the programs inside the computer with makes it usable?
Ans. System software
214. What is the name of the operating system that reads and reacts in terms of actual time.
Ans. Real time system
215. The operating system of a computer serves as a software interface between the user and___
Ans. Hardware
216. When you rename a file five times then the number of file in the disk is
a) 1 b) 2 c) 3 d) 5
Ans. a
220. ________ is the first program run on a computer when the computer boots up.
a) Applications b) microsoft office
c) desktop d) operating system
Ans. d
P a g e | 237
221. ________ is the program that is used to find out possible faults and their causes.
a) system b) application c) diagnostic software d) ubantu
Ans. c
224.Which tool in control panel is used to adjust your computer setting to control computer with
voice command?
A System and security
B Appearance and personalization
C Hardware and sound
D Ease of access
Ans. d
3. The users must agree to the _____ terms and agreements when they use an open source
software.
a) System
b) License
c) Community
d) Programmer
Ans. b
9. GPL of GNU says that every copy of a program governed by GPL license, even if modified,
must be subject to GPL again.
a) True b) False
Ans. a
10. Richard Stallman from MIT, established a special license, the ____ license.
a) GNU b) Free c) Package d) Commercial
Ans. a
15. Open source software is software whose source code is available for modification or
enhancement by anyone. Which of the following is an example of open source software?
a) Adobe Photoshop
b) Microsoft Word
c) Libre Office
d) Skype
Ans. c
29. While both open and proprietary code can be reused in a wide range of circumstances, open
code enables ________.
a) software reuse b) code reuse
c) knowledge reuse d) source reuse
Ans. c
30. Microsoft uses and release code under a variety of licenses including _____
a) gpl b) apache c) ibm d) gnu project license
Ans. b
31. ______ site that distributes the source code of the software
a) SsourceForge.net
b) FreeSoftware.org
c) OpenSource.org
d) OpenSourceSoftware.net
Ans. a
32. Which was written by Larry Mavoy was chosen by Torvalds to use for version control for the
LINUX Kernal.
a) Configuration Directories
b) Source Safe
c) Bitkeeper
d) Multiple Repositories
Ans. c
33. ______ requires that any promise to contribute back any changes or addition to the software.
a) Reciprocal licenses b) Academic licenses
c) General Public license d) Software Licenses
Ans. a
34. Usually require just acknowledgement of the original owners work on the software
a) Reciprocal licenses b) Academic licenses
c) General Public license d) Software Licenses
Ans. b
36. Is computer software licensed under exclusive legal right of the copy right holder
a) open source software
b) Proprietary Software
c) Public Domain Software
d) Free Software
Ans. b
37. The open source method for creating software rely on developers who voluntarily revel code in
the expectation that other developers will reciprocate is called ______
a) open source property
b) intellectual property
c) software property
d) licensing property
Ans. b
38. ______ is a legal instrument governing the usage or redistribution of the software.
a) GNU Public License
b) Reciprocal License
c) Software License
d) Academic License
Ans. c
39. The hallmark of the proprietary software licenses is that the software publishers grant the use
of one or more copies of software under ______.
a) end user license agreement b) open source agreement
c) free software foundation d) free software distribution
Ans. a
Networking
1. What is Availability?
Ans. it ensure that system work promptly and service is not denied to authorized users.
17. The protocol used to automatically assign IP address to a newly connected host in a network
is called ______.
(a) Dynamic Host Configuration Protocol (DHCP) (b) Transmission Control Protocol (TCP)
(c) User Datagram Protocol (UDP) (d) File Transfer Protocol (FTP)
Ans. a
26. The identity management system binds logical addresses to ______for reputed servers.
(a) MAC address (b) specific programs (c) other computers (d) none of them
Ans. a
27. Exchange of data between two devices using some form of transmission media is called
_________.
a) technology b) data communication c) recording d) tracking
Ans. B
29. when data can transfer both side but at a time only one direction can send information is
called_______.
a) Half duplex b) simplex c) full duplex d) communication
Ans. A
30. when data can transfer both side same time data transmission is called _________.
a) Half duplex b) simplex c) full duplex d) communication
Ans. C
47. In _______ topology , all computers are connected in a loop or circle via cable.
a) tree b) hybrid c) ring d) bus
Ans. C
74. At the _____ layer the data unit is transformed into the corresponding electromagnetic signal.
a) application b) network c) physical d) data link
Ans. c
75. The ________ layer oversees the delivery of a data unit between two systems on different
networks.
a) application b) network c) physical d) data link
Ans. b
76. _________ layer provide a mechanism to route packets from network to network.
a) application b) network c) physical d) data link
Ans. b
77. ______ layer is responsible for removing the network layer header as the data unit moves to
the transport layer.
a) application b) network c) physical d) data link
Ans. b
78. _______layer may create a connection ( a single logical path between the source and
destination that is associated with all the packets of a message) between two end ports.
a) transport b) network
c) physical d) data link
Ans. a
81. The process of Transferring files from a computer on the internet to your computer is
called________.
a) Uploading b) Sending c) Downloading d) Sharing
Ans. c
84. Group of electrical wires used to send data between two or more components. Provide
transportation of data.
a) Data bus b) Topology
c) Wired board d)PCB
Ans. a
P a g e | 252
87. ______ are computers that provide resources to other computers to a : Mainframe computer
Ans. Servers
95. When the baud/bit rate is higher the character are transmitted _______.
Ans. Faster
100. Filtering connections and disallowing prohibited connections is carried out using ______.
(a) MODEM (b) router (c) firewall (d) bridge
Ans. c
101. What is the delay that occur during the Playback of a stream known as _____.
Ans. Jitter
102. To create the last end of fiber optical cable ______ is mostly used.
Ans. Glass
106. In twisted pair cable one wire interfering with another wire is called ______.
Ans. Cross talk
108. _____ Protocol supports both online and offline retrieval of email.
Ans. IMAP
109. A list of Protocols used by a system, one protocol per layer is called:
Ans. Protocol suit
114. IPV6 is an _____ address whose binary bits are separated by a colon.
Ans. Alphanumeric
116. Topology where every node is connected to two other nodes is ____ topology.
Ans. Ring
P a g e | 254
118.Which layer in OSI model performs network routing, flow control and error control function?
A Network layer
B Session layer
C Physical layer
D Data link layer
Ans. a
129.Which is a reference tool for understanding data communication between any two network
system?
A LAN B WAN C ISO model D OSI model
Ans. d
135.Which device is installed in a subscriber‟s telephone line to allow both ADSl and regular voice
(telephone) services to be used at the same time?
A Hub
B Switch
C MODEM
D Micro filter
Ans. d
137.Which device connects multiple network segments along with the data link layer?
A Hub
B Bridge
C Router
D Switch
Ans. b
138.Which device is used to amplify or regenerate digital signals received while sending them
from one port of a network into another?
A Hub
B Bridge
C Switch
D Repeater
Ans. d
139.Which device modulates analog signal to encode digital information and demodulates carrier
signal to decode the transmitted information over the telephone network?
A Hub B Bridge C Switch D MODEM
Ans. d
140.Which device is used to connect one network with another network that uses different
protocols?
A Hub B Router
C Switch D Gateway
Ans. d
145. Which is the standard connector for category-5, unshielded twisted pair cabling?
A RJ11 B RJ14 C RJ25 D RJ45
Ans. d
147.Which is an application layer of internet standard protocol used by local e-mail clients to
retrieve e-mail from a remote server over a TCP/IP connection?
A IP
B FTP
C UDP
D POP
Ans. d
148.Which layer in OSI model provides transfer the data between end users?
A Session layer
B Network layer
C Data link layer
D Transport layer
Ans. d
152.Which is a standard network protocol used to transfer files from one host or to another host
over a TCP based network, such as the internet?
A FTP B TCP C UDP D SMTP
Ans. a
153.Which is a network protocol used on the internet or LAN to provide a bi-directional interactive
text oriented communication facility using a virtual terminal connection?
A FTP B TCP C UDP D Telnet
Ans. d
154. Connecting several computers and devices using wired or wireless technology is called
_____.
(a) hard disk (b) RAM (c) pen drive (d) networking
Ans. d
156. Computers and devices can be connected using __________ technology to create a network.
(a) wired (b) wireless (c) both a & b (d) neither a nor b
Ans. c
157. The procedure used by computers connected in a network for data exchange is called
network .
(a) topology (b) protocol (c) firewall (d) antivirus
Ans. b
158. The computer which separates a local network from external Internet is called network
______ .
(a) topology (b) protocol (c) firewall (d) antivirus
Ans. c
159. The piece of software which prevents malicious software from entering a computer is called
network ______.
(a) topology (b) protocol (c) firewall (d) antivirus
Ans. d
161. The port for connecting broadband cable to a computer is called ______.
(a) ethernet port (b) Registered Jack 45 (RJ-45)
(c) both a & b (d) none of them
Ans. c
163. _______ are the hardware devices that help the computer to connect to a network.
(a) Routers (b) MODEMs (c) Wireless MODEMs (d) all of them
Ans. d
166. A network connection requires ________ important components to connect to each other.
(a) IP address (b) Port number (c) both a & b (d) none of them
Ans. c
169. A program which runs in the background and sends results requested by a client is called a .
(a) server (b) client (c) port (d) IP address
Ans. a
170. A program which runs in the foreground, communicates with server and displays results sent
by the server is called a ______.
(a) server (b) client (c) port (d) IP address
Ans. b
171. Computers connected to a network without any client or server system (all hosts are equally
equally important) are in _______ network.
(a) client server (b) peer to peer (c) firewall (d) proxy server
Ans. b
P a g e | 260
172. The intermediary host which communicates with the clients on behalf of a another server is
called ______.
(a) proxy server (b) firewall (c) ethernet (d) WiFi
Ans. a
173. The intermediary host which protects a network from any communication with prohibited
hosts outside the protected network is called ______.
(a) proxy server (b) firewall (c) ethernet (d) WiFi
Ans. b
175. A proxy server which simply forwards messages from one network to another network is
called ________ proxy.
(a) gateway/ tunneling (b) forward proxy (c) reverse proxy (d) all of them
Ans. a
176. A proxy server which communicates with the Internet and retrieves data from the Internet is
called _______ proxy.
(a) gateway/ tunneling (b) forward proxy
(c) reverse proxy (d) all of them
Ans. b
177. A proxy server which communicates with the servers in a local network (for services like
decryption, authentication, etc.) is called ______ proxy.
(a) gateway/ tunneling (b) forward proxy
(c) reverse proxy (d) all of them
Ans. c
179. The design adopted for connecting several hosts on a network is called______ .
(a) telephony (b) wiring (c) connection (d) topology
Ans. d
180. When 2 devices are connected through a dedicated line, it is _____ topology.
(a) point to point (b) bus (c) star (d) ring
Ans. a
181. When all nodes are connected to a central hub, it is_____ topology.
(a) point to point (b) bus (c) star (d) ring
Ans. c
182. When all nodes are connected in a circular form (the first node becomes the last node), it is
_______ topology.
(a) point to point (b) bus (c) star (d) ring
Ans. d
P a g e | 261
183. When each host has a dedicated line connected to any other host on the network, it is
_______ topology.
(a) fully connected (b) Daisy chain (c) tree (d) partly connected
Ans. a
184. When each host has a dedicated line connected to any other host on the network, it is
______ topology.
(a) fully connected (b) daisy chain (c) tree (d) partly connected
Ans. a
185. When computers are connected in chain (from one host to another) and data hops between
hosts till it reaches the intended host, it is______ topology.
(a) fully connected (b) daisy chain (c) tree (d) partly connected
Ans. b
186. When data travels in branching connections to reach intended host, the network topology is
called _______ .
(a) fully connected (b) daisy chain (c) tree (d) partly connected
Ans. c
187. When hosts are connected in a part fully connected manner (with many missing
connections), it is _______ topology.
(a) fully connected (b) daisy chain (c) tree (d) partly connected
Ans. d
188. Usually, the network connecting hosts inside a single building is called______.
(a) LAN (b) WAN (c) MAN (d) none of them
Ans. a
189. Usually, the network connecting hosts inside a city/ metropoliton limit is called______.
(a) LAN (b) WAN (c) MAN (d) none of them
Ans. c
190. Usually, the network connecting hosts located in several cities or nations is called ______.
(a) LAN (b) WAN (c) MAN (d) none of them
Ans. b
191. When network hosts are connected without wires,_______ protocol is used.
(a) LAN (b) WAN (c) MAN (d) WLAN
Ans. d
194. Hub is _______to switch/ bridge since it repeats data even to the unwanted connections.
(a) inferior (b) superior (c) equivalent (d) none of them
Ans. a
195. The networking device which receives a packet and repeats it to just the intended recipient
lines is called a ________.
(a) hub (b) switch (c) MODEM (d) none of them
Ans. b
197. The device used to transfer data from one network to another network on the Internet is
called
(a) hub (b) switch (c) MODEM (d) router
Ans. d
198. The device which connects one Local Area Network to another Local Area Network is called
(a) hub (b) switch
(c) MODEM (d) bridge
Ans. d
199 . The node which connects one large network (a WAN, MAN, etc.) to another large network is
called ______ .
(a) hub (b) switch
(c) gateway (d) MODEM
Ans. c
200. The cable containing 4 pairs of twisted wires without any shielding foil for data transmission is
called ______ .
(a) unshielded twisted cable (b) shielded twisted cable
(c) coaxial cable (d) fibre optic cable
Ans. a
201. The cable containing 4 pairs of twisted wires with shielding foil to control interference with
other electrical signals and used for data transmission is called______.
(a) unshielded twisted cable (b) shielded twisted cable
(c) coaxial cable (d) fibre optic cable
Ans. b
202. A cable with single copper core and braided metal shield is called_____ .
(a) unshielded twisted cable (b) shielded twisted cable
(c) coaxial cable (d) fibre optic cable
Ans. c
203. A cable with single fibre optic core line surrounded by several layers of protective materials is
called _____ .
(a) unshielded twisted cable (b) shielded twisted cable
(c) coaxial cable (d) fibre optic cable
Ans. d
P a g e | 263
204. Fibre optic cables are _______ interferences from electric cables and electromagnetic waves.
(a) prone to (b) unaffected by (c) susceptible to (d) affected by
Ans. b
205. Out of the several cable options, ________ cable provides high speed over long distances
without being affected by local interferences.
(a) fibre optic (b) unshielded twisted pair
(c) shielded twisted pair (d) none of them
Ans. a
207. In the modern days, _______ is the best choice for wireless networking.
(a) WiFi (b) infrared (c) radio waves (d) micro-wave
Ans. a
208. The WiFi standard which permits transmission distance of 50m with data rate of 54MBPS
is__
(a) IEEE 802.11a (b) IEEE 802.11b (c) IEEE 802.11g (d) IEEE 802.11n
Ans. a
209. The WiFi standard which permits transmission distance of 100m with data rate of 11MBPS
is_
(a) IEEE 802.11a (b) IEEE 802.11b (c) IEEE 802.11g (d) IEEE 802.11n
Ans. b
210. The WiFi standard which permits transmission distance of 100m with data rate of 54MBPS
is_
(a) IEEE 802.11a (b) IEEE 802.11b (c) IEEE 802.11g (d) IEEE 802.11n
Ans. c
211. The WiFi standard which permits transmission distance of more than 100m with data rate of
100MBPS is ______
(a) IEEE 802.11a (b) IEEE 802.11b (c) IEEE 802.11g (d) IEEE 802.11n
Ans. d
218. The technology which permits data transmission between devices like computers, mobile
phones, tablets, headsets, etc. is called ______
(a) Bluetooth (b) coaxial cable (c) fibre optic cable (d) twisted pair cable
Ans. a
221. The fifth layer of the OSI model is _____layer and it controls connection between 2 hosts (like
client and server) during data communication.
(a) session (b) presentation (c) application (d) transport
Ans. a
222. The sixth layer of the OSI model is _______ layer and it takes care of encryption, decryption,
compression, decompression and data encoding.
(a) session (b) presentation (c) application (d) transport
Ans. b
223. The seventh layer of the OSI model is _____layer and it deals with file sharing, video sharing,
audio sharing, browsing, etc. using specific programs.
(a) session
(b) presentation
(c) application
(d) transport
Ans. c
P a g e | 265
226. ______ is the version of Internet Protocol now being phased out.
(a) IP version 1 (IPV1) (b) IP version 2 (IPV2)
(c) IP version 4 (IPV4) (d) IP version 6 (IPV6)
Ans. c
227. _____is the version of Internet Protocol now being introduced to handle increased size of the
Internet.
(a) IP version 1 (IPV1) (b) IP version 2 (IPV2)
(c) IP version 4 (IPV4) (d) IP version 6 (IPV6)
Ans. d
230. In a client server network, the ports in the range of 0 to 1023 are called ______ ports.
(a) relational ports (b) general ports (c) well known ports (d) user ports
Ans. c
252. The FTP server which does not require login process is called______ .
(a) Hyper Text Transmission Protocol (b) Simple Mail Transfer Protocol
(c) Network Time Protocol (d) Anonymous File Transfer Protocol
Ans. d
253. Using FTP, a file can be copied from remote system to the local system using the command .
(a) get (b) put (c) cd (d) lcd
Ans. a
254. Using FTP, a file can be copied from local host to remote host using the command ______.
(a) get (b) put (c) cd (d) lcd
Ans. b
255. Using FTP, working directory on the remote host can be changed using the command_____ .
(a) pwd (b) put (c) cd (d) lcd
Ans. c
256. Using FTP, working directory on the local host can be changed using the command______ .
(a) pwd (b) bye (c) cd (d) lcd
Ans. d
257. Using FTP, list of files on the remote host can be viewed using the command______.
(a) pwd (b) bye (c) cd (d) lcd
Ans. a
258. Using FTP, a file on the remote host may be deleted using the command______.
(a) delete (b) bye (c) cd (d) lcd
Ans. a
259. Using FTP, connection to remote FTP server may be terminated using the command______ .
(a) delete (b) bye/ quit (c) cd (d) lcd
Ans. b
261. The network protocol which permits a person to login to a remote computer, access files,
execute commands on the remote computer, etc. is called ______
(a) FTP (b) HTTP (c) Telnet (d) SMTP
Ans. c
263. Usually, telnet connection is established using ______command followed by name of host.
(a) ftp (b) telnet (c) ping (d) ls
Ans. b
P a g e | 269
264. The address of the physical networking component (like ethernet, WiFi, etc.) is called ______
address.
(a) virtual (b) logical (c) physical (d) imaginary
Ans. c
265. The address assigned to a host on getting connected to a network (like the Internet) is called
______ address.
(a) virtual (b) logical (c) physical (d) imaginary
Ans. b
267. Logical address of a host connected to a network is otherwise called _____ address.
(a) IP address (b) IP version 4 address (c) IP version 6 address (d) all of them
Ans. d
278. The TCP/IP protocol which permits sharing of large files over the Internet is called ______ .
(a) File Transfer Protocol (FTP) (b) Hyper Text Transmission Protocol (HTTP)
(c) Simple Mail Transfer Protocol (SMTP) (d) Network Time Protocol (NTP)
Ans. a
283. You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server
connected to the switch running 10 Mbps half-duplex as well. How much bandwidth does each
host have to the server?
Ans. 10Mbps
292.Which of the following cable transmits messages in the form of light waves?
A STP cable B UTP cable C Co-axial cable D Optical fibre cable
Ans. d
293. The systematic design (like radial, ring, etc.) of connecting computers in a network is called
network _______.
(a) topology (b) protocol (c) firewall (d) antivirus
Ans. a
295. The device which repeats a signal on all lines except incoming one is called _______.
(a) hub (b) switch (c) MODEM (d) router
Ans. a
MS Word
1 Which command is used to store the active document permanently?
A Save
B Send
C Prepare
D Save as
Ans. a
2 Which shortcut key is used to high light the entire word document?
A ctrl + A
B ctrl + O
C ctrl + S
D ctrl + E
Ans. a
3. The print resolution (quality) and colour preferences may be set using ______option available in
print dialog.
(a) collate
(b) scale
(c) printer properties>Finishing->Print on both sides
(d) Properties>Paper/Quality
Ans. d
20.Which option is used to locate any specific character, symbols or formulas in a document?
A Find
B Searching text
C Replace
D Selecting text
Ans. a
24.Which sequence of operation is required to remove tab stop markers from ruler?
A Drag the tab stop makers out of the ruler
B Double click the tab marker and clear all
C Right click the tab stop marker and choose remove
D Left click the tab stop marker and choose remove
Ans. a
25.Which feature is used to adjust the amount of space between words for alignment in MS Word
A Spacing B Scaling
C Justifying D Positioning
Ans. c
P a g e | 275
34. which key is used to select all the text in the document?
a) ctrl + a b) ctrl + m c) ctrl + f d) ctrl + n
Ans. a
38. If you need to change the typeface of a document, which menu will you choose?
a) edit b) view c) format d) tools
Ans. c
39. What is the portion of a document in which you set certain page formatting options?
a) page b) document c) section d) page setup
Ans. c
41. Which of these toolbars allows changing of fonts and their sizes?
a) standard b) formatting c) print preview d) none of these
Ans. b
43. Which option are used for opening, saving, important files?
a) print b) file c) tool d) none
Ans. b
48. The collection of Microsoft tools for preparation of documents, spreadsheets, presentations,
database management, time scheduling and mailing is called _______.
(a) MS Office
(b) OpenOffice.org
(c) Star Office
(d) Libre Office
Ans. a
52. In Graphical User Interface (GUI) based programs, WYSWYG stands for ________.
(a) Whatever You See, Wherever You Get (b) What You See, What You Get
(c) Whichever You See, What You Get (d) Wherever You See, What You Get
Ans. b
54. ______ in MS Word serves as a standard typeset document for creating professional looking
documents.
(a) Macro (b) XML (c) Template (d) HTML
Ans. c
56. To create mail merged results, MS Word can take address input from ______.
(a) MS Excel (b) MS Access
(c) text files (d) all of them
Ans. d
P a g e | 278
59. The text or image which appears faintly in the background of a page is called _______.
(a) water mark (b) trade mark
(c) copy right (d) embossing
Ans. a
63. To access Save As item in Office menu of MS Word, use _____ shortcut.
(a) Alt + F + A (b) Ctrl + O (c) Ctrl + N (d) Ctrl + P
Ans. a
64. To select Open item in Office menu of MS Word, use _____ shortcut.
(a) Ctrl + O
(b) Alt + F + O
(c) both Ctrl + O &Alt + F + O
(d) Ctrl + S
Ans. c
66. The first menu, containing most common tools required for preparation of document in MS
Word, is called ______.
(a) Home (b) Insert (c) Page Layout (d) References
Ans. a
P a g e | 279
67. The tools for Clipboard, Font Style, Paragraph Formatting, Styles & Search are contained in
_______ menu.
(a) Home (b) Insert
(c) Page Layout (d) References
Ans. a
69. ______ menu permits insertion of tables, images, drawing objects and hyperlinks, headers and
footers in MS Word.
(a) Home (b) Insert (c) Page Layout (d) References
Ans. b
71. _______ menu contains tools to control theme, page setup, page background, paragraph &
text wrap.
(a) Home (b) Insert (c) Page Layout (d) References
Ans. c
73. ______ menu contains tools related to table of contents, foot notes, citation, bibliography,
caption, index & table of authorities.
(a) Home (b) Insert (c) Page Layout (d) References
Ans. d
75. _______ menu contains tools for creating mailings, merging mails, inserting merge fields,
preview of mail merged results, printing mail merged pages or saving the mail merge results in a
new file.
(a) Home (b) Mailings (c) Review (d) References
Ans. b
77. ______ menu contains tools for proofing, languages, comments, tracking, changes, compare
& protect.
(a) Home (b) Mailings
(c) Review (d) References
Ans. c
79. _____ menu contains tools for document views, showing/hiding ruler, zoom, managing
windows & macros.
(a) View (b) Mailings
(c) Review (d) References
Ans. a
81. ______ menu contains items required for mail merge functionality in MS Word.
(a) Home (b) Insert
(c) Mailings (d) Reference
Ans. c
82. A set of VBA instructions to assist in carrying out recurring activities in is called _____ .
(a) mail merge (b) macro
(c) thesaurus (d) spell check
Ans. b
83. On opening MS Word (without clicking on a target document), it displays _______ document.
(a) previous (b) formatted (c) completed (d) blank/ new
Ans. d
84. MS Word provides ______ to function as the starting point special new documents like report,
visiting card, brochure, etc.
(a) template (b) macro (c) image (d) table
Ans. a
85. After opening a new document in MS Word, one should _______ to create a comfortable
experience.
(a) set paper size
(b) set font size
(c) set paragraph spacing, line spacing
(d) all of them
Ans. d
P a g e | 281
86. ______ are the most important objects used in MS Word documents.
(a) tables & pictures
(b) shapes, flow charts & clip arts
(c) equations, lists, bullets & numbering
(d) all of them
Ans. d
87. MS Word has the ability to automate repeated tasks using _______ .
(a) tables (b) pictures
(c) equations (d) macros
Ans. d
90. In MS Word, it is better change macro security setting to ________ before starting record or
use macros.
(a) Enable all macros (b) Disable all macros
(c) Trust VBA Code (d) Do not trust VBA code
Ans. a
92. The feature in MS Word which helps to create customized correspondence targeting different
recipients is called _______.
(a) mail merge (b) charting
(c) clip art (d) equations
Ans. a
93. A mail merge document requires a_______ to fill the blank spaces.
(a) picture
(b) record source
(c) chart
(d) equation
Ans. b
P a g e | 282
94. In MS Word, data sources for mail merge may be prepared using _______.
(a) MS Excel
(b) MS Access
(c) Plain text file with tab for field separation & newline for record separation
(d) all of them
Ans. d
95. A standard standard document with proper formatting and layout may be saved as a _____ ,
which may be used as the base for new documents.
(a) template
(b) pdf file
(c) plain text file
(d) HTML file
Ans. a
96. A document may be saved as a template using File>Save As from the menu and choosing
___________ as the document type.
(a) Excel Template
(b) HTML file
(c) Word Template
(d) Open Document Format (ODF)
Ans. c
99. Magazines, journals and proceedings may publish______ for the help of authors in following
the right styles for publication.
(a) picture (b) screenshot
(c) template document (d) Excel spreadsheets
Ans. c
100. When the width of paper is smaller and height of paper is larger, the orientation is called____
(a) landscape (b) portrait (c) both a & b (d) neither a nor b
Ans. b
101. When the width of paper is larger and height of paper is smaller, the orientation is called ___.
(a) landscape
(b) portrait
(c) both a & b
(d) neither a nor b
Ans. a
P a g e | 283
104. MS Word document typeset on specific paper size may be printed on a different paper size
using _______ option available in print dialog.
(a) collate
(b) scale
(c) printer properties>Finishing->Print on both sides
(d) Properties>Paper/Quality
Ans. b
105. Multiple copies of a document may be printed in complete sets (divide by set) using_______
option available in print dialog.
(a) collate
(b) scale
(c) printer properties>Finishing->Print on both sides
(d) Properties>Paper/Quality
Ans. a
106. A document may be printed on both sides of paper using ____option available in print dialog.
(a) collate
(b) scale
(c) printer properties>Finishing >Print on both sides
(d) Properties>Paper/Quality
Ans. c
107. The ability to combine name and address with a standard document is called ______.
a) Document formatting b) Database management
c) Mail merge d) Form letters
Ans. c
109. Which of the following is not essential component to perform a mail merge operation?
a) Main document b) Data source c) Merge fields d) word fields
Ans. d
110. Auto correct was originally designed to replace _____ words as you type.
a) Short, repetitive b) Grammatically incorrect d) Misspelled d) None of these
Ans. c
P a g e | 284
117. Where can you find the horizontal split bar on MS Word screen?
a) On the left of horizontal scroll bar b) On the right of horizontal scroll bar
c) On the top of vertical scroll bar d) On the bottom of vertical scroll bar
Ans. c
118. When sharing data in Office, the ______ document is the document in which the data was
first entered.
a) Source b) Destination c) Original d) Primary
Ans. a
119. To verify that the note text is positioned correctly on the page, switch to ____ view or display
the document in print preview.
a) Normal b) Print layout c) Page layout d) Page edit
Ans. b
121. Which feature helps you to inserts the contents of the Clipboard as text without any
formatting?
a) Paste Special b) Format Painter c) Page Setup d) Styles
Ans. a
P a g e | 285
126. ______ formatting is the process of changing the way letters, numbers, punctuation marks,
and symbols appear on the screen and in print.
a) Document b) Character c) Paragraph d) Object
Ans. b
127. The word count command on the tools menu displays the number of words as well as the
number of ______ in the current document.
a) lines b) Characters c) Paragraph d) All of these
Ans. d
128. Which operation you will perform if you need to move a block of text?
a) Copy and Paste b) Cut and Paste c) Paste and Delete d) Paste and cut
Ans. b
129. To instruct word to stop bulleting paragraphs, do any of the following except______.
a) Press the enter key twice
b) click the undo button on the standard toolbar
c) Press the backspace key to remove the bullet
d) click the bullets button on the formatting toolbar
Ans. b
130. Which of these toolbars allows changing of fonts and their sizes?
a) Standard b) Formatting c) Print Preview d) None of these
Ans. b
133. Which of the following is not available on the Ruler of MS Word screen?
a) Tab stop box b) Left indent c) Right indent d) Center indent
Ans. d
135. If you will be displaying or printing your document on another computer, you‟ll want to make
sure and select the _____ option under the „save‟ Tab.
Ans. Embed Fonts
136. If you need to double underline a word, how will you do that?
Ans. Select the text then choose format > font and on font tab, open underline style ad choose
double underline
137. How can you apply exactly the same formatting you did to another text?
Ans. Select the text then click on Format Painter and select the new text
138. Which of the following is not one of the three „Mail Merge Helper‟ steps?
a) Merge the two files b) Create the main document
c) Set the mailing list parameter d) Create the data source
Ans. c
139. To select a block of text, click at the beginning of the selection, scroll to the end of the
selection, position the mouse pointer at the end of the selection, hold down the____ key, and then
click or drag through the text.
Ans. Shift
140. A word field may consist of an optional field instruction called a(n) _______
Ans. Switch
142. Word has Web authoring tools allows you to incorporate ____ on Web pages.
a) Bullets b) Hyperlinks c) Sounds d) All of these
Ans. d
143. Which of the following commands should you always use before submitting a document to
others?
a) Find command b) Replace command c) Spelling and Grammar d) Thesaurus
Ans. c
144. Insert Date, Format Page Number, and Insert Auto Text are buttons on the______ toolbar.
Ans. Header and Footer
146. A screen element of MS word that is usually located below the title bar that provides
categorized options is_____.
Ans. Menu Bar
148. The ____ is a short horizontal line indicating the conclusion of a document.
Ans. End mark
149. What is the valid Minimum and Maximum zoom sizes in MS word?
Ans. 10, 500
151. The following tool bars display in the Word application window by default
a) Forms tool bar b) Formatting tool bar c) Drawing tool bar d) All of these
Ans. b
152. A table______
Ans. Is a grid organized in columns and rows
157. When you want to view different parts of a document without moving the insertion point
a) Use the previous page or next page buttons
b) Use the keyboard
c) Use the vertical and horizontal scroll bars
d) Use the zoom button
Ans. c
160. The minimum number of rows and columns in MS Word document is______
Ans. 1 and 1
161. What is the smallest and largest font size available in font Size tool on formatting toolbar?
Ans. 8 and 72
162. A character that is raised and smaller above the baseline is known as_____.
Ans. Superscript
165. Which option in File pull down menu is used to close a file in MS Word?
Ans. Close
168. What is the default number of lines to drop for drop cap?
Ans. 3
169. A bookmark is an item or location in document that you identify a name for future Reference.
Which of the following task is accomplished by using bookmarks?
Ans. To quickly jump to a specific location in the document
170. What is the maximum number of lines you can set for a drop cap?
Ans. 10
171. How can you insert a sound file in your word document?
Ans. From insert > object menu option
175. What is the maximum font size you can apply for any character?
Ans. 1638
177. When inserting page number in footer it appeared 1 but you wish to show a. How you can do
that?
Ans. Click on Page Number Format tool and specify required setting
178. To get to the „Symbol‟ dialog box, click on the ____ menu and choose „Symbol‟.
Ans. Insert
180. What is the default font size of a new Word document based on Normal template?
Ans. 11 pt (Point)
181. Which indent marker controls all the lines except first line?
Ans. Hanging Indent Marker
182. Which of the following option is not available in Insert > Picture?
a) Chart b) Graph c) clip Art d) Word Art
Ans. b
183. How many different position can you set for drop cap
Ans. 2
189. You wished to justify text over the height of paper, which option will you choose______
Ans. Page Setup from File menu
P a g e | 290
190. Which of the following is not the part of standard office suite?
a) Database b) File manager c) Image Editor d) Word Processor
Ans. b
191. Where can you find the Draw Table tool button?
Ans. Tables and Formatting toolbar
193. Shimmer, Sparkle text, Blinking Background etc. are known as______
Ans. Text effects
194. The feature of Word that automatically adjusts the amount of space between certain
combination of characters so that an entire word looks more evenly spaced. What is that feature
called?
Ans. Kerning
195. A feature of MS Word that saves the document automatically after certain interval is available
on_______ .
Ans. Save tab on Options dialog box
196. When assigning a shortcut key to a symbol, you should always try to select a key or key
combination that is:
Ans. Unassigned
197. Suppose you wanted to create an AutoCorrect entry that would type the words „We regret to
inform you that your submission has been declined‟ Of the following choices, which would be the
best name you could assign to this entry?
Ans. Subdual
198. If you want to convert a symbol or several lines of text into an AutoCorrect entry, you should:
Ans. Insert the symbol or type the text in a Word document first. Then, select the text or symbol
and got to the AutoCorrect dialog box.
200. Blinking point which shows your position in the text is called ______.
Ans. Cursor
201. Which of the following position is not available for fonts of MS Word?
a) Normal b) Raised c) Lowered d) Centered
Ans. d
202. Uppercase on Change case dialog box and all Caps on Fonts dialog box both converts
selected text into Capital letters. What‟s the different between the two?
Ans. Change Case makes conversion permanent but all caps on font can always be reverted
206. In order to complete extract one piece of content to another place, we use?
Ans. Cut
211. Which tool in MS Word is used to keep the familiar and repeated options?
A title bar
B task bar
C scroll bar
D quick access tool bar
Ans. d
221. Where does the file name of the active document displays?
A title bar
B task bar
C menu bar
D status bar
Ans. a
Microsoft Access
1. Microsoft Access provides visual environment for design of _______.
(a) tables (b) reports (c) forms (d) all of them
Ans. d
4. An ordinary form for data entry in MS Access tables may be created using______ menu.
(a) Create>Form (b) Create>Split Form
(c) Create>Multiple Items (d) Create>Blank Form
Ans. a
5. In MS Access, a form with data records at one half and entry format at the other half may be
created using______ menu.
(a) Create>Form (b) Create>Split Form
(c) Create>Multiple Items (d) Create>Blank Form
Ans. b
11. In MS Access, form may be manually designed through available components (like textfield,
datapicker, combo-box, etc.) using ______menu.
(a) Create>More Forms>Form Wizard (b) Create>More Forms>Data Sheet
(c) Create>More Forms>Modal Dialog (d) Create>Form Design
Ans. d
15. In MS Access, report may be designed using components like combobox, text field, text area,
list, etc. using _______menu.
(a) Create>Report (b) Create>Blank Report
(c) Create>Report Wizard (d) Create>Report Design
Ans. d
16. In MS Access, macro may be recorded to carry out different actions using______ menu.
(a) Create>Report (b) Create>Blank Report
(c) Create>Report Wizard (d) Create>Macro
Ans. d
20.Which view is used to arrange table data in different graphical layouts to summarize data?
A Table view
B Design view
C Data sheet view
D Pivot chart view
Ans. d
23.Which key stoke moves the active cell towards left in Access table?
A F2
B F5
C Tab
D Shift + Tab
Ans. d
24.Which combination of key zooms the content of active cell in Access table?
A Ctrl + F2
B Ctrl + F5
C Shift + F2
D Shift + F5
Ans. c
26. Which validation rule accepts only a - z letters for fields in Access?
A Is null or NOT like “*[! a - z]*”
B Is null or NOT like “*[a - z ]*”
C Is null or NOT like “*![a - z]*”
D Is null or NOT like “[! a - z]”
Ans. a
28.Which validation rule allows only positive numbers for fields in?
A Is Null or > = 0
B Is Null or Positive
C Is Null or < 0
D Is Null or = “+”
Ans. a
30.Which validation rule allows exactly digits for number fields in Access?
A Is Null or Between 100000 and 99999
B Is Null or Like “????”
C Is Null or >= 0 AND< = 99999
D Is Null or < = 99999
Ans. c
31.What is the output when the data „1678.95‟ is set to the number format „###0.00‟ in Access?
A 1670.00
B 1670.95
C 1678.00
D 1678.95
Ans. d
33.Write the output when the data „Primary Key‟ is set to the text < in Access?
A Primary key
B primary key
C PRIMARY KEY
D Primary Key
Ans. b
34.What is the output when the data “FOREIGN key‟ is set to the text format > in Access?
A foreign key B FOREIGN KEY C Foreign Key D Foreign key
Ans. b
35. What is the reason for not accepting zero in the fields of Access tables?
A Fields is set with is Null or > 0
B Fields is set with is Null or < = 0
C Fields is set with is Null or! [0]
D Fields is set with is Null or like “?”
Ans. a
P a g e | 297
36. Which field type will you select when you need to enter long text in the field?
a) Text b) memo c) currency d) hyperlink
Ans. b
37. The expression builder is access tool that controls expression ____ for entering expression
a) Table b) Box c) Cell d) Palette
Ans. b
39. In which method we don‟t need to specify the field type and size while creating a new table?
a) Design view b) While using Wizard
c) Create Table by entering Data d) All of these
Ans. c
41. The size of a field with number data type can not be ____
a) 2 b) 4 c) 8 d) 16
Ans. d
42. What does the show check box in query design window indicate?
a) It indicates whether the field is to be used or not.
b) It indicates whether the field is to be displayed in query result or not
c) It indicates whether the field names to be displayed in query result or not.
d) It indicates whether the field is to be used for grouping result or not.
Ans. b
43. Which of the following option creates a Drop Down list of values ?
a) Ole Object b) Hyperlink c) Memo d) Lookup wizard
Ans. d
46. The ______ button on the tool box display data from a related table.
a) Sub form sub report b) Relationships c) select objects d) More controls
Ans. a
47. The command center of MS access file that appears when we create or open the MS Access
database file
a) Database window b) Query window c) Design view window d) switchboard
Ans. a
48. While creating relationship using mouse, how the mouse pointer looks like?
a) A thick plus sign b) A thin plus sign c) An outlined rectangle d) Arrow with plus sign
Ans. c
49. The columns is a Microsoft access table are also called ______.
a) Rows b) Records c) Field d) Columns
Ans. c
50. how can you define a field so that when entering data #### is displayed?
a) Input mask b) Validation rule c) Indexed d) Ime mode
Ans. a
51. In the context of Microsoft access, which of the following statement is true?
a) Reports are used to retrieve and calculate data from tables.
b) Queries can be printed and presented as the information
c) Queries can include calculated fields that do not exist in table
d) Reports and forms are similar but forms are use to print but reports to display on screen only
Ans. c
52. The upper part of the query design window in MS Access has two parts shows ______.
a) Fields name with field size
b) Field name with relationships
c) Fields and Criteria
d) Sorting Options
Ans. b
53. To define AND condition while entering criteria in a query design window we write ____
a) Criteria values vertically one in a row
b) Criteria values horizontally
c) Write criteria values separated by AND
d) Write criteria values using & (anchor and) sign
Ans. b
55. Which of the following is not a type of relationship that can be applied in Access database?
a) One to one b) One to many c) Many to many d) All of these
Ans. d
P a g e | 299
56. While creating relationship, what happens when you release mouse pointer after you drop the
primary key of a table into foreign key of another table?
a) A relationship is created b) Edit relationship dialog box appears
c) A connector symbol is created d) A connecting line is visible
Ans. b
60. If you write criteria values one in a row in query design window, that means you are specifying
a) Or Conditions b) AND Conditions c) NOT Conditions d) ALL conditions
Ans. a
62. Which option allows us to build a new table by entering data directly into a tabular grid?
a) Datasheet view b) Design view c) Linked Table d) Grid view
Ans. a
63. What is the shortcut key to switch between the field names and properties panels in table
design view?
a) F3 key b) F4 key c) F5 key d) F6 key
Ans. d
65. Which data type should we use if we are planning to store a couple of paragraph or detailed
description in a field ?
a) Text b) Para c) Memo d) Desc
Ans. c
P a g e | 300
67. When creating a new table which method can be used to choose fields from standard
databases and tables
a) create table in design view b) create table using wizard
c) Create table by entering d) none of these
Ans. b
68. Which one of these is the most common type of query that retrieves records from one or more
tables and then displays the result in tabular form?
a) Tabular Query b) Crosstab query c) Select query d) pivot query
Ans. c
71. The small button with three dots displayed at the right of field properties box is called :
a) Make button b) Expression Button c) Built Button d) None of these
Ans. c
72. Which of the following shows the final result in a presentable way ?
a) Forms b) Reports c) Queries d) Tables
Ans. b
73. In MS Access, how can we create relationship between two tables in the GUI?
a) Drag the foreign key of a table into the primary key of another table
b) Drag any field from parent table and drop on child table
c) Drag the primary key of a table into foreign key of another table
d) Any of these can be done to create relationship
Ans. c
74. Which of the following store command to gather data from database ?
a) Forms b) Reports c) Queries d) Tables
Ans. c
75. A search value in SQL query can be a specific value or it can be _____
a) Logical Operator b) Relationship
c) Wild card Character d) Comparison operation
Ans. c
76. What is the default and maximum size of text field in MS Access ?
a) 50 and 255 characters b) 8 and 1 Gb
c) 266 and 64000 characters d) 8KB and 1.5 MB
Ans. a
P a g e | 301
81. In MS Access to refresh the contents of a lookup field (Lookup field: A field, used on a form or
report in an Access database, that either displays a list of values retrieved from a table or query, or
stores a static set of values.) list box or combo box
a) F4 or Alt + Down Arrow b) Down Arrow c) Page down d) F9
Ans. d
82. Press the following keys in MS Access to cancel print preview or layout preview
a) Ctrl + p b) P or ctrl + P c) ctrl + s d) C or Esc
Ans. d
83. Press the following keys in MS Access to Print the current or selected object
a) Ctrl + P b) P or Ctrl + P c) ctrl + s d) C or Esc
Ans. a
86. How can you display Pivot table report summary data in a currency format ?
a) Use custom calculation b) Type in the currency symbol
c) Modify the field settings d) None of these
Ans. c
P a g e | 302
87. A query summarizes information in a grid, organized by regions and months. Which type of
query is this?
a) A cross tab query b) An update query
c) A parameter query d) An active query
Ans. a
89. How can you display sales grouped by country, region, and salesperson, all at the same time?
a) Use the sort descending command b) Use the pivot table view command
c) Use the fine command on specified group d) All of these
Ans. b
92. What is the purpose of the description column in Table Design view?
a) To define the data type applied to each field within the table
b) To describe the data that should be entered in each field
c) To enter lookup data that the field should refer to
d) None of these
Ans. b
94. You can keep the sum ([sales]) to calculate the totals for each month in
a) The report footer section b) the page footer section
c) the month group footer section d) the summary section
Ans. c
95. The type of query extract the data and put them into separate table
a) A parameter query b) A make-table query
c) An update query d) A crosstab query
Ans. b
P a g e | 303
97. The following database object can you import from one MS-Access database to another?
a) Queries b) Tables c) Forms d) All of these
Ans. d
99. Queries design window has two parts. The upper part shows
a) Name of fields, field type and size b) Sorting check boxes
c) Tables with fields and relationships between tables d) None of these
Ans. c
102. This is the stage in database design where one gathers and lists all the necessary fields for
the database project.
a) Data dictionary b) data refinement c) data definition d) none of these
Ans. c
106. A _____ enables you to view data from a table based on a specific criterion
a) Query b) Report c) Form d) All of these
Ans. a
P a g e | 304
107. Which of the following database object produces the final result to present ?
a) Table b) Reports c) Queries d) None of these
Ans. b
108. The database language that allows you to access or maintain data in a database
a) DML b) DCL c) DDL d) TCL
Ans. a
110. The ______ operator will cause a report to be selected only if two or more conditions are
satisfied
a) NOT b) XOR c) OR d) AND
Ans. d
113. Which of the following store command to retrieve data from database?
a) Queries b) Forms c) Records d) Reports
Ans. a
123. What do you call a primary key field included in another table ?
a) Child key b) Composite key c) Parent key d) Foreign key
Ans. d
124.Which data type is better to use for storing the price of an item?
a) Number b) Text c) Currency d) Hyperlink
Ans. c
126. Which of the following data type is used to store logical value in MS Access?
a) Yes/No b) On/ Off c) True/False d) All of these
Ans. a
133. Which of the following is the default join between two records?
a) Inner join b) Outer join c) Right outer join d) None of these
Ans. a
135. Using he keyword _____ will return records is which the field value equals a defined text.
a) Like b) Between c) Is Null d) Equal
Ans. a
136. In a query, using the keyword ______ will return records in which the field value is between
two numbers.
a) Like b) Between c) Is Null d) Equal
Ans. b
149. The rule that a value of a foreign key must appear as a value of some specific table is called
a) Referential constraint b) index c) Integrity constraint d) Functional dependency
Ans. a
150. ______ view permits selection of data types, default values and constraints for each column.
(a) Datasheet (b) Design (c) Report (d) Form
Ans. b
157. Which will display values in drop down box from another table while entering data….
a) Query wizard b) Look up wizard c) Form Wizard d) Report wizard
Ans. b
160. Which option allows you to build a new table by entering data directly into the datasheet.
a) Datasheet view b) design view c) link table d) None of these
Ans. a
161. Which key stoke is used to move the active cell towards right, in access table?
A Ctrl + Tab
B Alt + Tab
C Tab
D Shift + Tab
Ans. c
165. Which combination of key allows user to move to the first field in the first record in Access
table?
A Ctrl + Tab
B Shift +Tab
C Shift + Home
D Ctrl + Home
Ans. d
169. New database created in MS Access has got a default table named________ .
(a) Table1 (b) Database1 (c) Column1 (d) Row1
Ans. a
170. What can be created to help easy data entry in MS Access tables.
(a) Form (b) Report (c) database (d) spreadsheet
Ans. a
171. By default, first column of an MS Access table is named _______ and it has auto increment
property.
(a) NAME (b) DATE (c) NULL (d) ID
Ans. d
172. How can you edit a relationship already established between two tables?
a) Right click the relationship line and choose edit relationship
b) Double click the relationship line
c) Both the above
d) None of the above
Ans. c
Microsoft PowerPoint
1.Which contains miniature representation of slides?
A Slides
B Handout
C Template
D Slide master
Ans. b
2.Which button is used to add instant animation to the presentation and helps interactive
presentation?
A Add button
B Start button
C Insert button
D Action button
Ans. d
5.How many panes are these in backstage view in power point 2010?
A3
B5
C7
D9
Ans. a
7.Which menu is used to apply various visual effects to the slide in power point?
A Animation
B Design
C Slide show
D Transitions
Ans. d
P a g e | 311
9.Which template makes specify common design elements in all slides in the presentation?
A Fax template
B User template
C Data template
D Master template
Ans. d
10.Which shortcut key is used to invoke thesaurus dialog box in Power Point?
A Shift+F7
B Ctrl+F7
C Alt+F7
D Ctrl+Alt+F7
Ans. a
14.Which combination of key is used to select all slides from current slide to first slide?
A Alt + Home B Ctrl + Home
C Shift + Home D Tab + Home
Ans. c
15.Which option is used to display the selected slides only for presentation?
A From Beginning B From current slide
C Broadcast slide show D Custom slide show
Ans. d
P a g e | 312
17. Which combination of key is used to show the laser pointer during slide show?
A Alt + left mouse button
B Alt + right mouse button
C Ctrl + left mouse button
D Ctrl + right mouse button
Ans. c
18. The MS office tool used for preparation of presentations is called _______.
(a) MS Word (b) MS Excel (c) MS Access (d) MS Powerpoint
Ans. d
19. The command to invoke power point from command line is _____ .
(a) powerpnt (b) power
(c) point (d) msppt
Ans. a
20. The default extension for a presentation prepared in powerpoint contained in MS Office
version 2007 or later is ______.
(a) .accdb (b) .pptx
(c) .xlsx (d) .docx
Ans. b
21. The default extension for a presentation prepared in powerpoint contained in MS Office
version 2003 or earlier is ______.
(a) .doc (b) .xls (c) .ppt (d) .mdb
Ans. c
25. Creating a presentation in Powerpoint helps to share the information with those who _______
the direct session.
(a) who could attend
(b) who could not attend
(c) who become interested to know the information after completion of
(d) all of them
Ans. d
26. Powerpoint helps to create a mix of _______to make the presentation lively and interesting.
(a) audio/video
(b) text/ table/ lists
(c) images/ graphs
(d) all of them
Ans. d
31. In Powerpoint, font for presentation may be chosen from ______ menu.
(a) Design>Themes
(b) Home>Font
(c) Home>Slides
(d) Home>Paragraph
Ans. b
32. In Powerpoint, new slide, slide layout, slide reset and slide sectioning may be chosen from
______ menu.
(a) Design>Themes (b) Home>Font
(c) Home>Slides (d) Home>Paragraph
Ans. c
P a g e | 314
33. In Powerpoint, paragraph style for presentation may be chosen from ______ menu.
(a) Home>Drawing
(b) Home>Font
(c) Home>Slides
(d) Home>Paragraph
Ans. d
34. In Powerpoint, drawing for use in the presentation may be created using _______ menu.
(a) Home>Drawing
(b) Home>Font
(c) Home>Slides
(d) Home>Paragraph
Ans. a
36. In Powerpoint, images like picture from file, clipart and photo albums can be inserted using
________ menu.
(a) Insert>Tables
(b) Insert>Images
(c) Insert>Illustrations
(d) Insert>Links
Ans. b
37. In Powerpoint, geometric shapes, hyperlink and action link can be inserted using _____menu.
(a) Insert>Tables
(b) Insert>Images
(c) Insert>Illustrations
(d) Insert>Links
Ans. d
38. In Powerpoint, geometric shapes, smart art and chart can be inserted using ______ menu.
(a) Insert>Tables
(b) Insert>Images
(c) Insert>Illustrations
(d) Insert>Links
Ans. c
39. In Powerpoint, textbox, header & footer, word art, date & time, slide number and text objects
from other applications can be inserted using ______ menu.
(a) Insert>Tables
(b) Insert>Text
(c) Insert>Symbol
(d) Insert>Media
Ans. b
P a g e | 315
40. In Powerpoint, equations and mathematical symbols can be inserted using_____ menu.
(a) Insert>Tables
(b) Insert>Text
(c) Insert>Symbol
(d) Insert>Media
Ans. c
41. In Powerpoint, media objects like video and audio can can be inserted using ______ menu.
(a) Insert>Tables
(b) Insert>Text
(c) Insert>Symbol
(d) Insert>Media
Ans. d
42. In Powerpoint, page setup and slide orientation may be controlled using _______ menu.
(a) Design>Page Setup
(b) Design>Themes
(c) Insert>Colors
(d) Insert>Fonts
Ans. a
43. In Powerpoint, slide transition effects may be controlled using ______ menu.
(a) Design>Effects
(b) Design>Themes
(c) Insert>Colors
(d) Insert>Fonts
Ans. a
45. In Powerpoint, color themes (background, foreground, title color, etc.) can be controlled using
________ menu.
(a) Design>Background
(b) Design>Themes
(c) Insert>Colors
(d) Insert>Fonts
Ans. c
47. In Powerpoint, background fill colour, hide background graphics using ______ menu.
(a) Design>Background (b) Design>Themes
(c) Insert>Colors (d) Insert>Fonts
Ans. a
P a g e | 316
48. In Powerpoint, presentation preview can be started using using _______ menu.
(a) Transition>Preview (b) Transition>Transition to this slide
(c) Timing (d) none of them
Ans. a
49. In Powerpoint, slide transition effects can be applied using using _____ menu.
(a) Transition>Preview (b) Transition>Transition to this slide
(c) Timing (d) none of them
Ans. b
50. In Powerpoint, sound effects for slide transition, automatic-transition time, etc. can be applied
using ______ menu.
(a) Transition>Preview (b) Transition>Transition to this slide
(c) Timing (d) none of them
Ans. c
51. In Powerpoint, animated flow of text and images in presentation can be applied using _______
menu.
(a) Animations>Advanced Animation (b) Animations>Preview
(c) Animation>Timing (d) none of them
Ans. a
52. In Powerpoint, slide animation preview can be opened using _______ menu.
(a) Animations>Advanced Animation (b) Animations>Preview
(c) Animation>Timing (d) none of them
Ans. b
54. In Powerpoint, slide shows from beginning, slide show from current slide and custom slide
show can be started using ______ menu.
(a) Slide show>Start slide show (b) Slide show>Set up
(c) Slide show>Monitors (d) none of them
Ans. a
55. In Powerpoint, slide shows can be setup, slide can be hidden, timing can be rehearsed and
slide transition times can be recorded using _____menu.
(a) Slide show>Start slide show (b) Slide show>Set up
(c) Slide show>Monitors (d) none of them
Ans. b
56. In Powerpoint, proofing, language, comments and comparison of 2 slide shows can be
accomplished using ______ menu.
(a) Review (b) View (c) Slide show (d) Animations
Ans. a
P a g e | 317
57. In Powerpoint, presentation views, master views, ruler, grilines, guides, zoom, fit to window,
color, grayscale, black and white, new window, arrange all, cascade, move split, swich windows
and macros can be accessed using _____ menu.
(a) Review (b) View (c) Slide show (d) Animations
Ans. b
63. To make an effective presentation, one should _____ the text typed in the slides.
(a) simply keep reading
(b) add spice to the text through stories and fables
(c) keep reading (whether the audience listens or not)
(d) none of them
Ans. b
64. One should record the presentation in ______ and watch it again to find the mistakes done
during delivery.
(a) paper (b) video (c) text (d) transcript
Ans. b
66. One should have_________ to cater to the unexpected situations of projector failure, power
failure, computer failure, disk error, etc.
(a) a backup plan for alternate delivery (like through paper handouts)
(b) a style to say sorry
(c) a practice to weep in front of the audience over the failure
(d) guts to say good bye without making the presentation
Ans. a
68. The Powerpoint dialog box is useful to create a new presentation by using:
a) Installed tamplates b) Open c) Installed themes d) Both A and C
Ans. d
69. How many slide layouts are available in new slide dialog box?
a) 9 b) 7 c) 14 d) 16
Ans. a
75. Which tab is not available on left panel when you open a presentation?
a) Outline b) slides c) Notes d) All of these
Ans. c
77. Which of the following section does not exist in a slide layout?
a) Titles b) Lists c) Charts d) Animations
Ans. d
79. _______ controls are the main slide control tasks for your presentation.
a) Task pane b) Task Bar c) Control Panel d) None of these
Ans. a
81. In slide layout panel how many layouts are available for text layout by default
a) 4 b) 7 c) 12 d) None of these
Ans. a
83. What lets you create new presentation by selecting ready-made font color and graphics effects
a) Presentation Template b) Master slide
c) Design Template d) Animation Scheme
Ans. c
84. Which command will you use in powerpoint if you need to change the color of different objects
without changing content?
a) Design Template b) Color scheme c) Font color d) Object color
Ans. b
85. What PowerPoint feature will you use to apply motion effects to different objects of a slide?
a) Slide Transition b) Slide Design c) Animation Objects d) Animation Scheme
Ans. d
86. The different between slide design and Auto content wizard is
a) Auto content wizard is just the wizard version of slide design
b) Slide design does not provide sample content but auto content wizard provides sample content
tool
c) Slide design asks your choice in steps but auto content wizard does not let you make choice
d) All of these
Ans. b
P a g e | 320
87. In which menu can you find features like slide Design, Slide Layout etc.?
a) Insert menu b) Format menu c) Tools menu d) slide show menu
Ans. b
88. Which menu provides you options like Animation scheme, custom Animation, slide transition?
a) Insert menu b) Format menu
c) Tools menu d) slide show menu
Ans. d
89. What happens if you select fist and second slide and then click on New slide button on toolbar
a) A new slide is inserted as first slide in presentation
b) A new slide is inserted as second slide in presentation
c) A new slide is inserted as third slide in presentation
d) None of these
Ans. c
91. If you want to insert some slides from other presentation into current one choose
a) from insert menu choose slides from files
b) from insert menu choose slides from presentation
c) from inset menu choose slides
d) None of these
Ans. a
96. When you delete a text box object from a slide in PowerPoint Presentation
a) The object is deleted but text box and the text inside is left on the slide
b) The text box is deleted and the text is pasted on the slide
c) The text box and text both are deleted
d) None of these
Ans. c
97. Which of the following font effect is not available in PowerPoint Font dialog box?
a) Underline b) Shadow c) emboss d) Strikethrough
Ans. d
98. Which of the following should you use if you want all the slides in the presentation to have the
same „look‟?
a) The slide layout option
b) Add a slide option
c) Outline view
d) A presentation design template
Ans. d
100. You can create a new presentation by completing all of the following except
a) Clicking the new button on the standard toolbar
b) Clicking file new
c) Clicking file open
d) Pressing ctrl + N
Ans. c
102. To select one hyperlink after another during a slide presentation, what do you press?
a) Tab b) Ctrl K c) Ctrl + H d) All of these
Ans. a
P a g e | 322
104. What is the term used when you press and hold the left mouse key and move the mouse
around the slide?
a) Highlighting b) Dragging c) Selecting d) Moving
Ans. b
105. How can you create a uniform appearance by adding a background image to all slides?
a) Create a template b) Edit the slide master
c) Use the autocorrect wizard d) All of these
Ans. b
106. How do you create speaker note pages that show the slides, related notes, and your
company logo on each page?
a) Edit the notes master and add your company logo
b) Edit the slide master and insert your company logo and notes pane
Ans. a
107. The slide that is used to introduce a topic and set the tone for the presentation is called the
a) Table slide b) Graph slide c) bullet slide d) Title slide
Ans. d
108. Which of the following should be used when you want to add a slide to an existing
presentation?
a) File, add a new slide b) Insert, New slide c) File Open d) Fine New
Ans. b
110. Which of the following is the default page setup orientation of slide in PowerPoint
a) Vertical b) Landscape c) Portrait d) None of these
Ans. b
112. Which of the following tool enables you to add text to a slide without using the standard
placeholders?
a) Text tool box b) Line tool
c) Drawing tool d) Auto shapes tool
Ans. a
P a g e | 323
113. Want your logo in the same position on every slide, automatically insert it on the
a) Handout master b) Notes master c) Slide master d) All of these
Ans. c
114. Which of the following views is the best view to use when setting transition effects for all
slides in a presentation?
a) Slide sorter view b) Notes pages view c) Slide view d) Outline view
Ans. a
116. Which of the following provides a means of printing out feature notes with a miniature slide on
a printed page?
a) Slide with animation b) Outline view c) Notes page d) Audience handout
Ans. d
118. Which of the following can you use to add times to the slides in a presentation?
a) Slide show menu b) Rehearse timings button
c) Slide transition button d) All of these
Ans. b
119. You can show the shortcut menu during the slide show by
a) Clicking the shortcut button on the formatting toolbar
b) Right clicking the current slide
c) clicking an icon on the current slide
d) A and B
Ans. b
121. Which of the following allow you to select more than one slide in a presentation?
a) Alt + Click each slide b) Shift + drag each slide
c) Shift + click each slide d) Ctrl + Click each slide
Ans. c
122. The view that displays the slides on a presentation as miniature representations of the slides
is called
a) slide show b) slide sorter view c) notes page view d) outline view
Ans. b
P a g e | 324
123. The PowerPoint view that displays only text ( title and bullets) is
a) slide show b) slide sorter view c) notes page view d) outline view
Ans. d
124. Which of the following presentation elements can you modify using the slide master?
a) Slide comments b) Slide transitions c) Speaker note font and color d) All of these
Ans. b
126. Presentation designs regulate the formatting and layout for the slide and are commonly called
a) Design plates b) Templates c) Placeholders d) Blueprints
Ans. b
127.Which of the following bypass the print dialog box when printing individual slides or an entire
presentation?
a) File, print, preview b) The print button c) File, print d) Ctrl + P
Ans. b
128. Which of the following will not advance the slides in a slide show view?
a) Esc key b) The spacebar c) The enter key d) The mouse button
Ans. a
129. Comments on a presentation can record who wrote them and when they were added. What‟s
the automatic way in PowerPoint 2002?
a) Use online collaboration b) Use comments c) Use the notes page d) All of these
Ans. c
130. When using PowerPoint, to play a PowerPoint show for previewing the show, select
a) View, slide sorter b) View, slide
c) View, slide show d) View outline
Ans. c
131. In Microsoft PowerPoint in order to see all the slides on one screen use
a) View, slide sorter b) View, slide
c) View, slide show d) View outline
Ans. a
132.Which dialog box in Power Point allows to change slides automatically in a period of time?
A Action setting
B Slide transition
C Slide animation
D Custom animation
Ans. b
133. What‟s the best place to fine animated images for your powerpoint 2002 presentation?
a) Microsoft online b) Word clipart
c) PowerPoint tools d) All of these
Ans. b
P a g e | 325
134. What‟s the easy way to apply varied animations to test on slides
a) apply effects in the custom animation text pane
b) apply an animation scheme
c) customize bullets with animated clipart
d) All of these
Ans. b
135. Using a custom animation effect, how do you make text appear on a slide by letter
a) Apply the animation scheme fade in one by one
b) Apply an entrance effect, and then set it to by letter in the effect option dialog box
c) Apply the fly in entrance to the text, and then set its speed to very slow
d) All of these
Ans. b
136. You can create a new presentation by completing all of the following except:
a) Clicking the new button on the standard toolbar
b) Clicking file, new
c) Clicking file open
d) Pressing Ctrl + N
137. You have customized a design template in one presentation and you want to use it in another
presentation. What the best way to do this?
a) Use the browse feature in the slide design task pane to find the file that has your design
template and apply it to the current file
b) copy and paste the slide with the design template you want to include the new presentation,
inserted slide will inherit the design
c) Both A and B
d) None of these
Ans. a
138. Which of the following options in the printer dialog box would you select to print slides 5 and
12 in a presentation?
a) slides b) Custom shows c) Current slide d) All
Ans. a
139. What‟s the best way to design the layout for your slides?
a) Create layouts for slides, handouts and notes using the Master Layout dialog box in slide
master view
b) For each new slide, select a layout from the slide Layout task pane
c) Apply templates from the slide Design task pane
d) None of these
Ans. b
140. How do you print your slides in a handout that includes lines for notes?
a) In the print dialog box, select handouts and set the number of slides per page to 3
b) In the print dialog box, select handout and set the number of slides per page, then select the
include comment page option
c) In the print dialog box select note page instead of handout
d) All of these
Ans. a
P a g e | 326
141. Which item, contains text graphics, charts, sound, video, etc., in power point
A Slides
B Folder
C Handouts
D Desktop screen
Ans. a
145. Which shortcut key is used to create/Add a new slide in power point?
A Ctrl + C B Ctrl + N C Ctrl + M D Ctrl + S
Ans. c
146. Which one of the following is extension of power point 2010 presentation file?
A .docx B .pptx C .xlsx D .accdb
Ans. b
148. In Microsoft PowerPoint two kinds of sounds effects files that can be added to the
presentation are
a) .wav files and .mid files b) .wav files and .mod files
c) .wav files and .jpg files d) .jpg files and .gif files
Ans. a
149. If you have a PowerPoint show you created and want to send using email to another teacher
you can add the show to your email message as a (an)
a) Inclusion b) Attachment c) Reply d) Forward
Ans. b
P a g e | 327
4. _____ can be treated as the waiting room for the computers processor.
Ans. RAM
5. _______ store data or information temporarily and pass it on as directed by the control unit.
Ans. Register
7. _____ files contains permanent data and gets updated during the processing of Transactions.
Ans. Master
8. ______ helps to protect Floppy disks from data getting accidentally erased.
Ans. Write Protect notch
P a g e | 328
9. _____ memory is having more memory addresses than are physically available.
Ans. Virtual
14.Since main memory looses data after power off, it is called ______.
(a) data storage (b) volatile storage
(c) power storage (d) secondary storage
Ans. b
26.SD card, mini SD card and micro SD card use _____ for data storage and retrieval.
(a) LASER beam acting on light sensitive layer (b) magnetic disk mounted in spindle
(c) flash memory (d) plastic magnetic plate
Ans. c
P a g e | 330
42.1024 TB = 1 ______.
(a) Mega Byte (MB)
(b) Tera Byte (TB)
(c) Peta Byte (PB)
(d) Exa Byte (EB)
Ans. c
44.1024 PB = 1 ______.
(a) Mega Byte (MB)
(b) Tera Byte (TB)
(c) Peta Byte (PB)
(d) Exa Byte (EB)
Ans. d
P a g e | 332
46.The storage capacity of a Secure Digital (SD) card/ Mini SD card/ Micro SD card or pen drive
can be in the range of ______.
(a) 1 bit to 8 bits (b) 4 bits to 8 bits
(c) 2GB to 128GB (d) 1 MB to 1024MB
Ans. c
50. A permanent memory, which hold data and instructions for start-up the computer and does not
erase data after power off.
a) Network interface card
b) CPU
c) RAM
d) ROM
Ans. d
51. Which of the following memories must be refreshed many times per second?
a) EPROM
b) ROM
c) Static RAM
d) Dynamic RAM
Ans. d
53. Which of the following places the common data elements in order from smallest to largest?
a) Character, File, Record, Field, Database, File
b) Character, Record, Field, Database, File
c) Character, Field, Record, File, Database
d) Bit, Byte, Character, Record, Field, File, Database
Ans. c
56. What is the permanent memory built into your computer called?
a) RAM b) ROM
c) CPU d) CD-ROM
Ans. b
58. Magnetic tape is not practical for applications where data must be quickly recalled because
tape is ______
a) A random access medium
b) A sequential Access medium
c) A read only medium
d) An Expensive storage medium
Ans. b
59. What is the main advantage of magnetic core memory over semiconductor RAM memory?
a) More compact and smaller
b) More economical
c) A bit does not have to write after reading
d) Non-volatile
Ans. d
61. Permanent instructions that the computers uses when it is turned on and that cannot be
changed by other instructors are contained in –
a) ROM
b) RAM
c) ALU
d) CPU
Ans. a
64. Data gathering in computer means, they allow to use ____ data.
a) Present b) Input
c) Output d) Store
Ans. d
66. The faster, costlier and relatively small from of storage managed by computer system
hardware is:
a) Main memory
b) Flash memory
c) Cache
d) Disk
Ans. c
68. Breaking logical memory into blocks of the same size is called as:
a) Frames
b) Segments
c) Packets
d) Pages
Ans. d
P a g e | 335
69. Where data will remain intact even when the computer is turned of
a) RAM
b) Mother board
c) Secondary storage device
d) Primary storage device
Ans. c
72. A nonvolatile type of memory that can be programmed and erased in sectors, rather than one
byte at a time is:
a) Flash memory b) MPROM
c) EPROM d) EEPROM
Ans. a
73. Memory that loses its contents when power is lost is:
a) random
b) volatile
c) nonvolatile
d) static
Ans. b
74. When power is supplied to the system then to maintain data with the life of battery, computer
BIOS contains the following.
a) CMOS
b) RAM
c) DRAM
d) CPU
Ans. a
79. The work „computer‟ usually refers to the central processor unit plus
a) external memory b) internal memory
c) input device d) output device
Ans. b
80. What are the two basic types of memory that your computer uses?
a) RAM/ROM b) RW/RAM
c) ROM d) ERAM
Ans. a
81. Which of the following memories below is often used in typical computer operation?
a) DRAM
b) ROM
c) FDD
d) HDD
Ans. a
82. The storage that supplements the primary internal storage of a computer is known as
a) secondary storage
b) primary storage
c) back-end storage
d) background storage
Ans. c
83. ______ is a form of permanent memory that holds all the instructions the computer needs to
start up and does not get erased when the power is turned off.
a) The network interface card
b) The CPU
c) RAM
d) ROM
Ans. d
84. What is the name given to the memory which works on time sharing principle in order to create
an illusion of infinite memory space?
a) Cache memory b) Register
c) Virtual memory d) Primary memory
Ans. c
85. Which contents are lost when the computer turns off?
a) Storage b) Input
c) Output d) Memory
Ans. d
P a g e | 337
86. The following computer‟s memory is characterised by low cost per bit stored _______
a) Primary b) Secondary
c) Hard disk d) All of these
Ans. b
93. High density double sided floppy disks could store ____ of data
a) 1.40 MB
b) 1.44 GB
c) 1.44 MB
d) 1.40 GB
Ans. c
P a g e | 338
96. Before a disk drive can access any sector record, a computer program has to provide the
record‟s disk address. What information does this address specify?
a) Track number b) Sector number
c) Surface number d) All of these
Ans. d
97. A storage area used to store data to a compensate for the difference in speed at which the
different units can handle data is
a) Memory
b) Buffer
c) Accumulator
d) Address
Ans. b
99. Fragmentation is –
a) dividing the secondary memory into equal sized fragments
b) dividing the main memory into equal size fragments
c) fragments of memory words used in a page
d) fragments of memory words unused in a page
Ans. a
102. Copying computer program/ software without permission of its author is called –
a) High way robbery
b) Larcency heetson
c) Software piracy
d) Embezzlement
Ans. c
105. Size of the _____ Memory mainly depends on the size of the address bus.
a) Main
b) Virtual
c) Secondary
d) Cache
Ans. a
107. _______ storage is a system where a robotic arm will connect or disconnect off-line mass
storage media according to the computer operating system demands.
a) Secondary
b) Virtual
c) Tertiary
d) Magnetic
Ans. c
112. Data is written to and read from the disk via a magnetic _____ head mechanism in the floppy
drive.
a) cylinder b) read/write
c) cluster d) recordable
Ans. b
113. What is the difference between static RAM and dynamic RAM?
a) Static RAM must be refreshed, dynamic RAM does not.
b) Dynamic RAM must be refreshed, static RAM does not.
c) There is no difference
d) Both A and B
Ans. b
118. Which of the following medium is used between CPU & RAM to speed up the processing
power of a CPU?
a) Virtual memory
b) D RAM
c) Flash Memory
d) Cache Memory
Ans. d
120. Data and program stored in ______ memory when the Processor uses them.
a) Main
b) Secondary
c) Tertiary
d) Heetson
Ans. a
13.Write the Linux command to remove all the permission to the user and group on the directory
„software‟?
A chmod ug - rwx software
B chmod ug - a software
C chmod ug - A software
D chmod ug - Rwx software
Ans. a
14. Which Linux command is used to sort the text file „network‟ in descending order?
A Sort / r network B Sort - r network
C Sort + r network D Sort \ r network
Ans. b
15.Which Linux command to set the permission „x‟ to user, „rw‟ to others and „rwx‟ to group for the
file launcher
A chmod 176 launcher B chmod 671 launcher
C chmod 167 launcher D chmod 166 launcher
Ans. c
P a g e | 345
16. ______ helps capable users to improve and bug fix the software.
(a) open source software (b) closed source software
(c) virus software (d) hacked software
Ans. a
17. _______ model of software helps developers across the world to cooperate in development of
software.
(a) open source software (b) closed source software
(c) virus software (d) hacked software
Ans. a
21. GNU LGPL stands for _______ and it permits embedding open source libraries in closed
source projects.
(a) GNU General Public License
(b) GNU Lesser General Public License
(c) GNU Not Unix
(d) GNU Image Manipulation Programme
Ans. b
24. ______ founded the GNU project to create an alternative to UNIX operating system from
scratch.
(a) Richard Stallman
(b) Linus Torvalds
(c) Dennis Ritchie
(d) Brian Kernighan
Ans. a
25. The software which helps the user to communicate with the kernel of Linux operating system is
called_______ .
(a) kernel (b) shell (c) neither a nor b (d) both a and b
Ans. b
26. The Linux shell having features similar to the C-Programming language is called ______.
(a) Bourne Again Shell (b) C-Shell (c) Korn-shell (d) none of them
Ans. b
27. _______ shell was released by AT&T as an improvement to the Bourne shell
(a) Bourne Again SHell
(b) C-Shell
(c) Korn-shell
(d) none of them
Ans. c
30. Any shell script begins with the line ______to denote the name of the shell to be used for
interpretation.
(a) #!/bin/sh (b) #!/bin/csh
(c) #!/bin/ksh (d) any one of them
Ans. d
31. To display the list of files and directories, _____Linux command is used.
(a) ls (b) chmod (c) mkdir (d) rmdir
Ans. a
37. In Linux, a file having read and write permissions would have a numeric value of _____ as
argument to chmod.
(a) 6 (b) 7
(c) 4 (d) 5
Ans. a
38. In Linux, a file having read only permissions would have a numeric value of as _____
argument to chmod.
(a) 6 (b) 7
(c) 4 (d) 5
Ans. c
39. In Linux, a file having read, write and execute permissions would have a numeric value of
________ as argument to chmod.
(a) 6 (b) 7
(c) 4 (d) 5
Ans. b
40. In Linux, a file having read and execute permissions would have a numeric value of _____ as
argument to chmod.
(a) 6 (b) 7
(c) 4 (d) 5
Ans. d
42. In Linux, first value of permission provided to chmod command is meant for______.
(a) user (b) group (c) world (d) all of them
Ans. a
P a g e | 348
43. In Linux, second value of permission provided to chmod command is meant for_____.
(a) user (b) group
(c) world (d) all of them
Ans. b
44. In Linux, third value of permission provided to chmod command is meant for ______.
(a) user (b) group
(c) world (d) all of them
Ans. c
45. Any person unrelated to the current user or the group of the current user is treated with
________ permissions.
(a) user (b) group (c) world (d) all of them
Ans. c
47. Linux command creates a link to the current file (not a full copy of the file).
(a) cp (b) ln
(c) mv (d) cd
Ans. b
48. ______ Linux command deletes the source file and creates copy of the source file in a new
name.
(a) cp (b) ln
(c) mv (d) cd
Ans. c
49. _____ Linux command helps user to change current working directory.
(a) cp (b) ln
(c) mv (d) cd
Ans. d
50. ______ Linux command displays full path of the current directory.
(a) cp (b) pwd
(c) mv (d) cd
Ans. b
57. In Linux, ________command ejects removable media drive like CD/DVD drive.
(a) eject (b) mount
(c) umount (d) shutdown
Ans. a
58. In Linux, ______ command should be run as root user to shutdown the computer.
(a) eject (b) mount
(c) umount (d) shutdown
Ans. d
60. _____ Linux command makes the shell to stop processing for specified duration.
(a) reboots (b) halts (c) sleep (d) sort
Ans. c
61. ______ Linux command creates a single archive from specified files and directories.
(a) tar (b) zip
(c) gzip (d) ls –l
Ans. a
62. _____ Linux command creates zip file using given source file.
(a) tar (b) zip (c) gzip (d) ls –l
Ans. b
63. _____ Linux command creates gzip file using given source file.
(a) tar
(b) zip
(c) gzip
(d) ls –l
Ans. c
P a g e | 350
64. ______Linux command displays full information about files and directories.
(a) tar (b) zip (c) gzip (d) ls –l
Ans. d
68. ______ Linux command searches for a given file and optionally executes given command on
that file.
(a) banner (b) find
(c) rm (d) cat
Ans. b
70. ______ Linux command creates a large banner out of given text.
(a) banner (b) find
(c) rm (d) cat
Ans. a
72. In Linux, ______ command displays the current date and time.
(a) time (b) date
(c) cat (d) man
Ans. b
73. In Linux, ______ command displays help about given command (manual page).
(a) time
(b) date
(c) cat
(d) man
Ans. d
P a g e | 351
81. In Linux,______ command helps a normal user to execute given command with root
privileges.
(a) sudo (b) cal
(c) bc (d) cron
Ans. a
86. In Linux,________ command searches the path and displays location of a given file.
(a) which (b) file
(c) tr (d) chown
Ans. a
88. In Linux, _____command translates given input characters to specified equivalent characters.
(a) which (b) file (c) tr (d) chown
Ans. c
89. In Linux, ______ command changes ownership of a file to specified owner and group.
(a) which (b) file (c) tr (d) chown
Ans. d
90. In Linux,_______ command changes ownership of a file to specified owner and group.
(a) which (b) file
(c) tr (d) chown
Ans. d
93. In Linux,_______ command catches given string from the input lines or specified files.
(a) groupadd (b) groupdel
(c) grep (d) test
Ans. c
97. In Linux, ______ command displays tree structure of all files and directories.
(a) tree b) c++ (c) export (d) clear
Ans. a
99. In Linux, _______ command compiles C++ source file to binary executable file.
(a) tree (b) c++
(c) export (d) clear
Ans. b
101. In Linux, ______ command exports displays the list of currently running processes.
(a) tree (b) ps (c) kill (d) clear
Ans. b
110. The &character placed at the end of command line in Linux ______.
(a) stores exit status of previous command
(b) matches all characters
(c) sends to process to the background
(d) appends output to a file
Ans. c
116. Which of the following is not a part of default Red Hat Linux email system?
a) Pine b) The MTA c) The MUA d) procmail
Ans. a
117. LILO
a) stands for Linux loader
b) is the Linux boot loader
c) is a tool used to boot the Kernel on x86 hardware
d) All of the above
Ans. d
119. Which program is used to automatically install Red Mat Linux on identical hardware?
Ans. mkkickstart
121. What are the appropriate Hex codes for setting Linux swap and Linux native partition types in
fdisk?
Ans. 82 and 83
122. Any software (paid or free), for which source code is available is called_____.
(a) open source software
(b) free software
(c) virus software
(d) hacked software
Ans. a
Java Script
4. _______class provide an interface for invoking java script methods and examining java script
properties.
a) JSobject b) java script file c) jquary d) java wrapper
Ans. a
5. When a user views a page containing a java script program, which machine actually executes
the script?
a) The user‟s machine running offline b) The user‟s machine running a web browser
c) The user‟s machine running on a website d) The users cookies used by a website
Ans. b
8. Storing numbers, dates or other values are ______ used for in java script program.
a) String b) Codes c) Variables d) Functions
Ans. c
9. ______ side java script statements embedded in a HTML Page can respond to user events
such as mouse-clicks, forms input and page navigation.
a) client b) Server c) Website d) Live wire
Ans. a
10.When a java script object is sent to java, the runtime engine creates a java wrapper of
type_______.
a) JSobject b) java script file c) jquary d) java wrapper
Ans. a
13. In java script, A _____ is an object of the target language data type that enclose an object of
the source language.
a) variable b) string c) wrapper d) client
Ans. c
31. The system of notations used to effectively process string related operations is called ______ .
(a) impression
(b) parser
(c) regular expression
(d) concatenation
Ans. c
34. In JavaScript, keywords/ reserved words_____ be used as variables, labels or function names.
(a) may (b) should always (c) can (d) must not
Ans. d
37._____ event gets activated when an error occurs during execution of script.
(a) onfocus (b) onblur (c) onclick (d) onerror
Ans. d
43. _____event gets activated when mouse moves out from a component.
(a) onmousedown (b) onmouseout (c) onload (d) onmouseover
Ans. b
48. ______ is the Javascript data type to handle the results of logical comparisons (TRUE or
FALSE).
(a) Number (b) String (c) Boolean (d) null
Ans. c
52. _______denotes a value which is not a number (e.g., result of division by zero) in Javascript.
(a) NaN (b) infinity (c) -infinity (d) isNaN()
Ans. a
84. ______ function in Javascript returns the character found at specified location in a string.
(a) length() (b) charAt() (c) charCodeAt() (d) concat()
Ans. b
85. ______function in Javascript returns the unicode value of the character found at specified
location in a string.
(a) length() (b) charAt() (c) charCodeAt() (d) concat()
Ans. c
86. ______function in Javascript returns the first found location where given pattern occurs in the
target string.
(a) indexOf() (b) lastIndexOf() (c) substr() (d) substring()
Ans. a
87. _____function in Javascript returns the last found location where given pattern occurs in the
target string.
(a) indexOf() (b) lastIndexOf() (c) substr() (d) substring()
Ans. b
88. ______function in Javascript returns the substring from given index location to specified
length.
(a) indexOf() (b) lastIndexOf() (c) substr() (d) substring()
Ans. c
89. ______function in Javascript returns the substring from given index location to specified
ending index location.
(a) indexOf() (b) lastIndexOf() (c) substr() (d) substring()
Ans. d
91. ______function in Javascript returns the character equivalent of given unicode value.
(a) toLowerCase() (b) toUpperCase() (c) trim() (d) fromCharCode()
Ans. d
93. _______function in Javascript removes space, tab or other space holders from beginning and
end of a string.
(a) toLowerCase() (b) toUpperCase() (c) trim() (d) fromCharCode()
Ans. c
100. _____ operator in Javascript compares whether two expressions are EQUAL.
(a) == (b) != (c) === (d) !==
Ans. a
101. ______ operator in Javascript compares whether two expressions are EQUAL using strict
comparison rules.
(a) == (b) != (c) === (d) !==
Ans. c
102. ______ operator in Javascript compares whether two expressions are NOT EQUAL.
(a) = = (b) != (c) === (d) !==
Ans. b
103. ______ operator in Javascript compares whether two expressions are NOT EQUAL using
strict comparison rules.
(a) == (b) != (c) === (d) !==
Ans. d
104. _____ operator in Javascript compares whether the left side expression is LESS THAN the
right side one.
(a) < (b) > (c) <= (d) >=
Ans. a
P a g e | 365
105. ____ operator in Javascript compares whether the left side expression is GREATER THAN
the right side one.
(a) < (b) > (c) <= (d) >=
Ans. b
106. _______ operator in Javascript compares whether the left side expression is LESS THAN the
right side one.
(a) < (b) > (c) <= (d) >=
Ans. a
107. _______ operator in Javascript compares whether the left side expression is GREATER
THAN OR EQUAL TO the right side one.
(a) < (b) > (c) <= (d) >=
Ans. d
108. _______operator in Javascript compares whether the left side expression is LESS THAN OR
EQUAL TO the right side one.
(a) < (b) > (c) <= (d) >=
Ans. c
109. ____operator in Javascript tests whether the left side value is found in the right side
collection.
(a) < (b) > (c) in (d) instanceOf
Ans. c
111. ______ operator in Javascript increments the given variable x BEFORE evaluting the
expression.
(a) x + + (b) + + x (c) x - - (d) - -x
Ans. b
112. ______ operator in Javascript increments the given variable x AFTER evaluting the
expression
(a) x + + (b) + + x (c) x - - (d) - -x
Ans. a
113. ___ operator in Javascript decrements the given variable x BEFORE evaluting the
expression.
(a) x + + (b) + + x (c) x - - (d) - -x
Ans. d
114. _____ operator in Javascript decrements the given variable x AFTER evaluting the
expression.
(a) x + +
(b) + + x
(c) x - -
(d) - -x
Ans. c
P a g e | 366
115. _______operator in Javascript multiplies the left and right side number values and assigns
the result to the left side variable.
(a) * = (b) / = (c) + = (d) -=
Ans. a
116. _____operator in Javascript divides the left side value by the right side value and assigns the
result to the left side variable.
(a) * = (b) / = (c) + = (d) -=
Ans. b
117. _______operator in Javascript substracts the right side value from the left side value and
assigns the result to the left side variable.
(a) * = (b) = = (c) + = (d) -=
Ans. d
118. ______ operator in Javascript adds the left and right side number values and assigns the
result to the left side variable.
(a) * = (b) = = (c) + = (d) -=
Ans. c
119. _______ function in Javascript returns positive value of its argument, irrespective of whether
the input was positive or negative.
(a) Math.sin() (b) Math.cos() (c) Math.acos() (d) Math.abs()
Ans. d
123. _______ function in Javascript returns the higher integer value for given floating point number
(e.g., return value for 2.1 is 3).
(a) Math.random() (b) Math.ceil() (c) Math.oor() (d) Math.round()
Ans. b
124. ______function in Javascript returns the lower integer value for given floating point number
(e.g., return value for 2.8 is 2).
(a) Math.random() (b) Math.ceil() (c) Math.oor() (d) Math.round()
Ans. c
125. ______function in Javascript returns the nearest integer value for given floating point number
(e.g., return value for 2.1 is 2; that for 2.8 is 3).
(a) Math.random() (b) Math.ceil() (c) Math.oor() (d) Math.round()
Ans. d
P a g e | 367
126. ______ function in Javascript returns random number between 0 and 1 (0 included, 1
excluded).
(a) Math.random() (b) Math.ceil() (c) Math.oor() (d) Math.round()
Ans. a
129. _______function in Javascript returns the first number raised to the power of second number.
(a) Math.pow() (b) Math.max() (c) Math.min() (d) Math.sqrt()
Ans. a
130. _______function in Javascript returns the maximum of the given collection of numbers.
(a) Math.pow() (b) Math.max() (c) Math.min() (d) Math.sqrt()
Ans. b
131. ______function in Javascript returns the minimum of the given collection of numbers.
(a) Math.pow() (b) Math.max() (c) Math.min() (d) Math.sqrt()
Ans. c
132. ______function in Javascript returns the square root of the given collection of numbers.
(a) Math.pow() (b) Math.max() (c) Math.min() (d) Math.sqrt()
Ans. d
137. In Javascript, ______statement helps to skip the remaining statemets of the loop for next
cycle of execution.
(a) break
(b) initialization
(c) increment/ decrement
(d) continue
Ans. d
P a g e | 368
139. What would be the value of x, on completing the following for loop?
var i, x=10;
for(i = 10; i <= 12; i + +) {
s+=i;
}
(a) 43 (b) 45 (c) 55 (d) 66
Ans. a
140. In Javascript, the _____loop helps to process each element of an array in succession.
(a) for (b) for ... in (c) do ... while (d) while
Ans. b
141. In Javascript, the______ loop helps to the following block of statements only if the condition
is true.
(a) for (b) for ... in (c) do ... while (d) while
Ans. d
142. In Javascript, the______ loop helps to the following block atleast once even if the condition is
FALSE.
(a) for (b) for ... in (c) do ... while (d) while
Ans. c
145. Parameters/ arguments to be passed to a function are enclosed in______ after the name of
the function.
(a) ( ... ) (b) { ... } (c) [ ... ] (d) < ::: >
Ans. a
146. _____ is placed between function keyword and function parameters in Javascript.
(a) Function opening (b) Function end (c) Function name (d) Function code block
Ans. c
147. The result of a Javascript function may be passed back using ______keyword.
(a) function (b) return (c) break (d) continue
Ans. b
149. Any variable declared inside a function has validity within the_______ .
(a) block only (b) function only (c) global scope (d) constant
Ans. b
150. Any variable declared outside a function has validity within the______ .
(a) block only (b) function only (c) global scope (d) constant
Ans. c
151. Creating new data types through programming and adding new properties and methods to
the data type is called _______ programming.
(a) rapid (b) object oriented (c) procedural (d) functional
Ans. b
152. The domain created by a programmer for placing all items related to a specific object/solution
in Javascript is called ______.
(a) object (b) namespace (c) class (d) property
Ans. b
153. The keyword used in Javascript to create a new data type is _______.
(a) object (b) namespace (c) class (d) property
Ans. c
154. The variable placed inside a class definition to store values related to an object (such as
colour, size, location, etc.) is called________ .
(a) object (b) namespace (c) class (d) property
Ans. d
155. The special method placed inside a class having the name of the class itself as the function
name is_______ .
(a) constructor (b) encapsulation (c) abstraction (d) polymorphism
Ans. a
156. The ability of a class to derive the properties and methods of another class is called______.
(a) inheritance (b) encapsulation (c) abstraction (d) polymorphism
Ans. a
157. The ability to a method having the same name but different behaviour in different parent and
child classes is called ______.
(a) inheritance (b) encapsulation (c) abstraction (d) polymorphism
Ans. d
158. The ability of a class to bind properties and methods with different access levels is
called____ .
(a) inheritance (b) encapsulation (c) abstraction (d) polymorphism
Ans. b
159. The ability of a program object to reflect real world objects is called_____ .
(a) inheritance (b) encapsulation
(c) abstraction (d) polymorphism
Ans. c
P a g e | 370
168. The standard interfaces provided by a browser for interaction with program script is called
____.
(a) Browser Object Model (b) Browser Opening Model
(c) Brown Object Model (d) Browser Object Mission
Ans. a
173. Methods of BOM (Browser Object Model) are called on_____ object.
(a) document (b) window (c) button (d) text
Ans. b
174. The support provided for various components of a HTML document (like head, title, body, etc.
in a browser is called _______.
(a) Document Object Model (b) Dominant Object Model
(c) Document Office Model (d) Document Object Management
Ans. a
179. A text file used to save name, value pairs related to website visited by a browser is called
____ .
(a) memory (b) history (c) cookie (d) script
Ans. c
182. What would be the value of pass property in the following cookie?
document.cookie="id=vi;pass=ret;org=iti";
(a) vi (b) ret (c) iti (d) none of them
Ans. b
185. The statement document.cookie=\name=Gayathri;" sets a cookie with name property. Whatis
the value of the name property?
(a) name (b) ; (c) Gayathri (d) \"
Ans. c
187. What is the process of writing instruction to be get executed by the computer?
A Debugging B Executing C Presenting D Programming
Ans. d
190. Which web server provides good customer support if it had any issues?
A Apache B IIS C Lite speed D Nginx
Ans. b
192.Which is a variable seperator if more than one variable declared in one statement?
A, B: C- D/
Ans. a
P a g e | 373
200.How many different values can be returned by the error name property in javascript ?
A3 B4 C5 D6
Ans. d
201.Which object method is used to return the value rounded down to its nearest interger?
A abs() B ceil() C floor() D round()
Ans. c
205.Which allows developers to bundle all functionality under a unique application –specific
name?
A Class B Name space C Object D Property
Ans. b
217.Which keyword in switch case statement specifies the code to run if there is no case match?
A Break B Case C Default D End
Ans. c
222.Which error indicates that the numbers is outside the range of legal values?
A Range Error B Reference Error C Type Error D URI Error
Ans. a
224.Which error indicates that the value is outside the range of expected type?
A Eval Error B Range Error C Syntax Error D Type Error
Ans. d
227.Which method joins all array element into string with specified separator?
A Join() B Pop() C Push() D To string()
Ans. a
240.Which open source software is used to upload from client to server or download from server
to client?
A PHP B Perl C HTTP D FILEZILLA
Ans. d
241.How will javascript treat a number, when it is enclosed with double or single quotes?
A Error B Number C String D Zero
Ans. c
249. _____ JavaScript statements embedded in an HTML page can respond to user events
such as mouse-clicks, form input, and page navigation.
A. Client-side B. Server-side C. Local D. Native
Ans. a
256. Which of the following way can be used to indicate the LANGUAGE attribute?
A. <LANGUAGE="JavaScriptVersion">
B. <SCRIPT LANGUAGE="JavaScriptVersion">
C. <SCRIPT LANGUAGE="JavaScriptVersion"> JavaScript statements…</SCRIPT>
D. <SCRIPT LANGUAGE="JavaScriptVersion"!> JavaScript statements…</SCRIPT>
Ans. c
257. What is the correct syntax for referring to an external script called " abc.js"?
A. <script href=" abc.js"> B. <script name=" abc.js">
C. <script src=" abc.js"> D. None of the above
Ans. c
P a g e | 379
259. Which of the following navigator object properties is the same in both Netscape and
IE?
A. navigator.appCodeName B. navigator.appName
C. navigator.appVersion D. None of the above
Ans. a
262. If para1 is the DOM object for a paragraph, what is the correct syntax to change the
text
within the paragraph?
A. "New Text"?
B. para1.value="New Text";
C. para1.firstChild.nodeValue= "New Text";
D. para1.nodeValue="New Text";
Ans. b
267. Which of the following event fires when the form element loses the focus: <button>,
<input>, <label>, <select>, <textarea>?
A. onfocus B. onblur C. onclick D. ondblclick
Ans. b
271. The _______ method of an Array object adds and/or removes elements from an array.
A. Reverse B. Shift C. Slice D. Splice
Ans. d
272. To set up the window to capture all Click events, we use which of the following
statement?
A. window.captureEvents(Event.CLICK); B. window.handleEvents (Event.CLICK);
C. window.routeEvents(Event.CLICK ); D. window.raiseEvents(Event.CLICK );
Ans. a
274. To enable data tainting, the end user sets the _________ environment variable.
A. ENABLE_TAINT B. MS_ENABLE_TAINT
C. NS_ENABLE_TAINT D. ENABLE_TAINT_NS
Ans. c
275. In JavaScript, _________ is an object of the target language data type that encloses an
object of the source language.
A. a wrapper B. a link C. a cursor D. a form
Ans. a
P a g e | 381
276. When a JavaScript object is sent to Java, the runtime engine creates a Java wrapper of
type ___________
A. ScriptObject B. JSObject
C. JavaObject D. Jobject
Ans. b
277. _________ is a wrapped Java array, accessed from within JavaScript code.
A. JavaArray B. JavaClass
C. JavaObject D. JavaPackage
Ans. a
278. A ________ object is a reference to one of the classes in a Java package, such as
netscape.javascript .
A. JavaArray B. JavaClass C. JavaObject D. JavaPackage
Ans. b
279. The JavaScript exception is available to the Java code as an instance of __________
A. netscape.javascript.JSObject B. netscape.javascript.JSException
C. netscape.plugin.JSException D. None of the above
Ans. b
280. To automatically open the console when a JavaScript error occurs which of the
following is added to prefs.js?
A. user_pref(" javascript.console.open_on_error", false);
B. user_pref("javascript.console.open_error ", true);
C. user_pref("javascript.console.open_error ", false);
D. user_pref("javascript.console.open_on_error", true);
Ans. d
281. To open a dialog box each time an error occurs, which of the following is added to
prefs.js?
A. user_pref("javascript.classic.error_alerts", true);
B. user_pref("javascript.classic.error_alerts ", false);
C. user_pref("javascript.console.open_on_error ", true);
D. user_pref("javascript.console.open_on_error ", false);
Ans. a
283. The syntax of capture events method for document object is ______________
A. captureEvents()
B. captureEvents(args eventType)
C. captureEvents(eventType)
D. captureEvents(eventVal)
Ans. c
290. _________ tag is an extension to HTML that can enclose any number of java script.
a) <script> b) <html> c) <close> d) <java>
Ans. a
295. What will the following code return: Boolean (10 > 9)
a) False b) NaN c) True d) None of these
Ans. c
298. External javascript files should have ______ as file name extension.
(a) .asp (b) .html (c) .php (d) .js
Ans. d
300. Local Browser used for validations on the web pages uses______.
a) html b) css c) js d) java
Ans. c
302. Which of the following Attribute is used to include External Js code inside your HTML
Document?
a) src b) ext c) link d) script
Ans. a
303. Which attribute is used to specified that script is executed when the page has finished
parsing (only for external scripts)
a) async b) defer c) parse d) type
Ans. b
304. _____ attribute is used to specify the character encoding used in an external script file.
a) type b) character c) charset d) None of these
Ans. c
P a g e | 384
308. In March 1996, ____ was released, featured support for JavaScript.
a) Internet Explorer 1.0 b) Internet Explorer 2.0
c) Netscape Navigator 1.0 d) Netscape Navigator 2.0
Ans. d
316. Which javascript variable cannot be used as first character but can be use after first character
a) Underscore b) Astrisk c) Digit d) Dollar Sign
Ans. c
P a g e | 385
321. JavaScript contains a ______ that assigns a value to a variable based on some condition.
a) Conditional operator b) Logical Operator c) Assignment Operator d) Bitwise
Ans. a
326. What are the two basic groups of data types in javascript?
a) Primitive b) Reference types c) Both A and B d) None of these
Ans. c
328. Using _______ statement is how you test for a specific condition.
A. Select B. If
C. Switch D. For
Ans. b
P a g e | 386
333. Java script entities start with_____ and end with _________.
a) comma, colon
b) colon, semicolon
c) ampersand, semicolon
d) semicolon, ampersand
Ans. c
3. Joystick typically have a button on _____ that is used to select the option pointed by the cursor.
a) Bottom
b) Left
c) Right
d) Top
Ans. d
4. The joystick is a ___ stick that moves the graphic cursor in the direction the stick is moved.
a) Parallel
b) Horizontal
c) Straight
d) Vertical
Ans. d
5. A device for converting handwriting impression into coded characters & positional coordinates
for input to a computer is
a) Touch panel
b) Mouse
c) Wand
d) Writing tablet
Ans. d
8. Keyboard, mouse, scanner, light pen, etc. are classified under ______ unit.
(a) input (b) central processing (c) output (d) none of them
Ans. a
P a g e | 389
11. Information that comes from an external source and fed into computer software is called
______
a) Input
b) Output
c) Throughput
d) Reports
Ans. a
13. These devices provide a means of communication between a computer and outer world.
a) I/O
b) Storage
c) Compact
d) Drivers
Ans. a
14. The I/O devices are sometimes called the peripheral devices because theysurround the CPU
and memory of the computer system.
a) True b) False
Ans. a
19. A computer consists of input and output devices. Given below are the names of few devices.
Which one of the following is an input device?
a) Monitor
b) LCD
c) Printer
d) Keyboard
Ans. d
20. Heetson feeds the data and instructions into the computer with the help of certain devices.
What kind of device he uses for this action?
a) Input device b) Output device
c) Controller device d) Regulating device
Ans. a
22. Monitor (VDU), printer, plotter, speaker etc. are classified under _______ unit.
(a) input (b) central processing
(c) output (d) none of them
Ans. c
28. The most common method of entering text and numerical data into a computer system is
through the use of a ____
a) Plotter b) Scanner c) Printer d) Keyboard
Ans. b
P a g e | 391
HTML
1. In html _______ tag defines paragraph.
a) <p> b) <para> c) <table> d) <section>
Ans. a
10. Most of the HTML tags have a corresponding closing tag, which begins with _____symbol.
(a) <! - - (b) < / (c) < : (d) <
Ans. b
P a g e | 400
11. If a HTML tag does not have explicit closing tag, the tag may be closed with _____symbol
instead of a simple >symbol.
(a) > (b) : > (c) /> (d) @ >
Ans. c
12. The title to be displayed at the top of the browser window or browser tab is enclosed in_____ .
(a) < HTML > ::: < =HTML > (b) < HEAD > ::: < =HEAD >
(c) < TITLE > ::: < /T ITLE > (d) < BODY > ::: < =BODY >
Ans. c
14. Elements to be centre aligned in browser display are enclosed inside _______HTML tags.
(a) < p > ::: < =p >
(b) < center > ::: < =center >or < div align = “center" > ::: < /div >
(c) < div align = \left" > ::: < =div >
(d) < div align = \right" > ::: < =div >
Ans. b
15. Elements to be left aligned in browser display are enclosed inside ______HTML tags.
(a) < div align = \justified" > ::: < =div >
(b) < center > ::: < =center >or < div align =\center" > ::: < =div >
(c) < div align = “left" > ::: < /div >
(d) < div align = \right" > ::: < =div >
Ans. c
16. Elements to be right aligned in browser display are enclosed inside_____ HTML tags.
(a) < div align = \justified" > ::: < =div >
(b) < center > ::: < =center >or < div align =\center" > ::: < =div >
(c) < div align = \left" > ::: < =div >
(d) < div align = “right" > ::: < /div >
Ans. d
17. Elements to be justified (aligned use with left and right edges) in browser display are enclosed
inside_____ tags in HTML.
(a) < div align = “justified" > ::: < /div >
(b) < center > ::: < =center >or < div align =\center" > ::: < =div >
(c) < div align = \left" > ::: < =div >
(d) < div align = \right" > ::: < =div >
Ans. a
20. ______HTML tag creates a clickable hyper link for navigation inside the same page or
between different pages.
(a) < img src = \file:jpg" >
(b) < tableborder = 1 > ::: < =table >
(c) < tableborder = 0 > ::: < =table >
(d) <a href = “target.htm" > ::: < /a >
Ans. d
27. In HTML, text size ______ represents the normal size of text.
(a) -4 (b) 0 (c) +4 (d) +8
Ans. b
29. Colour can be specified using colour name (like red, gray, blue, cyan, magenta, etc.) or
numeric value in _______ colour order.
(a) Red-Green-Blue (b) Blue-Green-Red
(c) Green-Red-Blue (d) Blue-Green-Blue
Ans. a
35. In HTML, the two digit color code value ranges from 00 to_____ in hexadecimal.
(a) AA (b) 11 (c) FF (d) CC
Ans. c
36. ______tag is used to display different HTML pages in a single window (not recommended for
mobile viewing).
(a) font (b) frameset (c) table (d) img
Ans. b
37. Width of elements like image, table, etc. can be controlled using ______attribute.
(a) width (b) height (c) length (d) breadth
Ans. a
39. Height of elements like image, table, etc. can be controlled using ______attribute.
(a) width (b) height (c) length (d) breadth
Ans. b
42. ______HTML tag displays an image named globle.jpg at 80% of the total width available in the
browser.
(a) < center > ::: < =center >
(b) < table > ::: < =table >
(c) < img width = “80%" src = “globe.jpg" >
(d) < br= >
Ans. c
44. Text scrolling to left may be created using ______ tag in HTML.
(a) < marquee direction = “left" > ::: </marquee >
(b) < marquee direction = \right" > ::: <=marquee >
(c) < marquee direction = \up" > ::: <=marquee >
(d) < marquee direction = \down" > ::: <=marquee >
Ans. a
54. Among the following options, ______ HTML tag merges 3 columns to create a large column.
(a) < tr > ::: < =tr >
(b) < td > ::: < =td >
(c) < td colspan = 3 > ::: < /td >
(d) < td rowspan = 4 > ::: < =td >
Ans. c
55. Among the following options, ______HTML tag merges 4 rows to create a large row.
(a) < tr > ::: < =tr >
(b) < td > ::: < =td >
(c) < td colspan = 3 > ::: < =td >
(d) < td rowspan = 4 > ::: < /td >
Ans. d
58. ________ declares a list item which may be part of ordered list or unordered list.
(a) < ul > ::: < =ul > (b) < ol > ::: < =ol > (c) < li > ::: < /li > (d) none of them
Ans. c
59. HTML form controls commonly use_____ tag for taking form input.
(a) < input > (b) < table > ::: < =table >
(c) < img > (d) < form > ::: < =form >
Ans. a
62. To display a button in HTML form, _____attribute is used in the input tag.
(a) button (b) checkbox (c) color (d) date
Ans. a
63. To display a checkbox in HTML form, _______attribute is used in the input tag.
(a) button (b) checkbox (c) color (d) date
Ans. b
P a g e | 406
64. To display a colour selection input in HTML form, ______attribute is used in the input tag.
(a) button (b) checkbox (c) color (d) date
Ans. c
65. To display a date input in HTML form, ______attribute is used in the input tag.
(a) button (b) checkbox (c) color (d) date
Ans. d
66. To display a date and time input in HTML form, ______attribute is used in the input tag.
(a) button (b) checkbox (c) color (d) datetime
Ans. d
67. To display a field for email input in HTML form, ______attribute is used in the input tag.
(a) email (b) file (c) hidden (d) image
Ans. a
68. To display a file input dialog in HTML form, ______attribute is used in the input tag.
(a) email (b) file (c) hidden (d) image
Ans. b
69. To create a hidden field in HTML form, ______attribute is used in the input tag.
(a) email (b) file (c) hidden (d) image
Ans. c
70. To create an image selection tool in HTML form, _____attribute is used in the input tag.
(a) email (b) file (c) hidden (d) image
Ans. d
71. To create month selection field in HTML form, ______attribute is used in the input tag.
(a) month (b) number (c) password (d) radio
Ans. a
72. To create number input field in HTML form, _____ attribute is used in the input tag.
(a) month (b) number (c) password (d) radio
Ans. b
73. To create password input field in HTML form, ____attribute is used in the input tag.
(a) month (b) number (c) password (d) radio
Ans. c
74. To create radio button input field in HTML form, _____attribute is used in the input tag.
(a) month (b) number (c) password (d) radio
Ans. d
75. To create an input field to display numbers with specific start, end and step values in HTML
form, ______ attribute is used in the input tag.
(a) range (b) reset (c) search (d) tel
Ans. a
P a g e | 407
76. To create an input field to reset all input elements of a form in HTML form, _____ attribute is
used in the input tag.
(a) range (b) reset (c) search (d) tel
Ans. b
77. To create search field (behviour depends upon server implementation) in HTML form,
______attribute is used in the input tag.
(a) range (b) reset (c) search (d) tel
Ans. c
78. To create field for telephone number input in HTML form, _____ attribute is used in the input
tag.
(a) range (b) reset (c) search (d) tel
Ans. d
79. To create a field for submitting the contents of HTML form to the server, ______ attribute is
used in the input tag.
(a) submit (b) text (c) time (d) url
Ans. a
80. To create a text input field in HTML, _____ attribute is used in the input tag.
(a) submit (b) text (c) time (d) url
Ans. b
81. To create a time input in HTML, _____attribute is used in the input tag.
(a) submit (b) text (c) time (d) url
Ans. c
82. To create a field for taking a web address in HTML, _____ attribute is used in the input tag.
(a) submit (b) text (c) time (d) url
Ans. d
88.Which attribute is used with <td> tag to merge two cells horizontally?
A)Colspan = 2 B)Rowspan = 2
C)Mergerows D)mergecols
Ans. a
92.Which is the correct syntax for adding alternate text for image, if the image cannot be
displayed?
A <img src = “boat.gif” alt = “big boat”>
B <img src = “boat.gif” alt text = “big boat”/>
C <img src = “boat.gif” alternate = “big boat”/>
D <img src = “boat.gif” alternate text = “big boat”/>
Ans. a
97.How do you add a link which will allow the visitor to send an email from the page?
A <a href = “mailto : youradderss”> B <a href = “sendmailtoyour address”>
C <a=”mailto”> D <href = “mailto”>
Ans. a
98.What will happen, If the background image is smaller than the screen, what will happen?
A It will be stretched
B It will leave a blank space at the bottom of the page
C It will leave a blank space at the top of the page
D It will be repeated
Ans. d
99.which is the correct html tag for making a text input field?
A <text type = “Text”> B <input type = “text”>
C <input type = “textfield”> D <input type = “textbox”>
Ans. b
104. Which property of cells will how many rows a cell should span?
A Colspan = 5
B Rowspan = 5
C Cellspan = 5
D Span = 5
Ans. b
P a g e | 410
105.Which web language give more control over the HTML elements and allows them to change
at any time without returning to the Web server?
A BML B XML C HTML D DHTML
Ans. d
115. Which of the following attributes of text box control allow to limit the maximum character?
a) size b) len c) maxlength d) All of these
Ans. c
P a g e | 411
118. The attribute, which define the relationship between current document and HREF URL is
a) REL b) URL c) REV d) All of these
Ans. a
119. <DT> tag is designed to fit a single line of our web page but <DD> tag will accept a
a) line of text b) full paragraph c) word d) request
Ans. b
121. Correct HTML to left align the content inside a table cell is
a) <tdleft> b) <td raligh = “left”> c) <td align = “left”> d) <td leftalign>
Ans. c
122. The tag which allows you to rest other html tags within the description is
a) <th> b) <td> c) <tr> d) <caption>
Ans. d
127. The tag used to create hypertext relationship between current document and another URL is
a) <ISINDEX> b) <A> c) <LINK> d) None of these
Ans. c
128. The text inside the <text area> tag works like
a) <p> formatted text b) <T> formatted text
c) <PRE> formatted text d) None of these
Ans. c
137. Which html element is used to specify a footer for a document or section?
a) <footer> b) <section> c) <bottom> d) <head>
Ans. a
138. What is the correct html element for playing video files?
a) <video> b) <media> c) <movie> d) <mp4>
Ans. a
P a g e | 413
139. What is the correct HTML element for playing audio files?
a) <audio> b) <sound> c) <mp3> d)<music>
Ans. a
143. In HTML, which attribute is used to specify that an input field must be filled out?
a) formvalidate b) validate c) required d) placeholder
Ans. c
145. Which HTML element is used to display a scalar measurement within a rang?
a) <measure> b) <range> c) <gauge> d) <meter>
Ans. d
151. Apart from <b> tag, what other tag may text bold?
a) <fat> b) <strong> c) <black> d) <emp>
Ans. b
153. Tags and texts that are not directly displayed on the page are written in ______ section.
a) <head> b) <title> c) <body> d) <html>
Ans. a
158. Which HTML Tag is used to define a client-side script such as the javaScript?
a) <unscript> b) <script> c) Both A and B d) None of these
Ans. b
159. Which html attribute is used to provide an advisory text about an element or its contents.
a) Dir b) Title c) Tooltip d) None of these
Ans. c
161. Which are the Objects Used for storing Data on the client provided by The HTML Local
Storage?
a) Window.localStorage b) Windows.sessionStorage
c) Window.localSession d) Both A and B
Ans. d
164. If you want to change the text colour to Red which of the following Tags will you use?
a) <body text =Red> b) <body Bgcolor=Red>
c) <body Colour = Red> d) None of these
Ans. a
165. HTML links are Defined with <a> Tag Address Is Specified By Attribute
a) Href b) Hlink c) Src d) src-link
Ans. a
168. In HTML, tags that include both on and off tag are called
a) comment tag b) document tag
c) container tag d) None of these
Ans. c
170. Which tag can set the background color for your page?
a) <body> b) <font> c) <head> d) <title>
Ans. a
173. The tag which allows some web server search engines to search your web page
a) <search> b) <ISINDEX> c) <HEAD> d) <link>
Ans. b
175. Which of the following will not be found in the <head> section?
a) <table> b) <Metatags> c) <Title> d) None of these
Ans. a
177. What will be the added by using <td> and </td> tag?
a) rows b) steps c) cell d) columns
Ans. d
178. Which property tells how many rows a cell should span?
a) colspan=n b) rowspan=n c) Both A and B d) None of these
Ans. b
179. To set the font for a single link, where do you add the <font></font> tags?
a) In the <head> tag
b) Outside the <a> and </a> tags
c) Inside the <a> and </a> tags
d) None of these
Ans. c
182. The attribute used choose the type of font in HTML is?
a) Character b) Face c) Text-type d) All of these
Ans. b
P a g e | 417
190. When images are used as links they get a blue border.
a) Always b) Never c) Unless border is set to zero d) none of these
Ans. c
199. Why should you specify a background color if you are using an image for the actual
background of your page?
a) So the text shown up better
b) In case the image doesn‟t fit right
c) The background color will be shown until the image loads
d) None of these
Ans. c
202.The top portion of a HTML document containing many meta items and script functions is
called
(a) < HTML > ::: < /HTML > (b) < HEAD > ::: < /HEAD >
(c) < TITLE > ::: < /T ITLE > (d) < BODY > ::: < /BODY >
Ans. b
Flowchart (Algorithm)
Note:
The normal Flow in a Flow chart is From top to bottom and From left to right.
Flow chart is a type of diagram that represents a workflow or Process.
Process and Decision is most important symbols in a Flow chart
A Program is divided into modules because it gives the programmer greater flexibility.
Debugger helps a programmer to locate bugs an corrects them
Terminal
Start and stop
INPUT/OUTPU
T
Processing
Annotation / Comment
Flow Lines
Diamond
for
Decision
P a g e | 421
1. Sequence control structure:- This structure is known as Progress from one activity to another
activity sequentially statements executed in the same way.
2. Selection control structure/Conditional:- This control structure tells the program as to which
action it should take which is based on certain condition. When a condition is tested and if it is true
then an action is performed and if it is false another different action is performed.
3. The Repetition/Iteration or loop control structure :-A repetition situation means to “do such
and such until so and so condition is reached”
Data Flow diagrams shows relationship between input, processing and output.
Syntax error are found out by compilers.
Run time error is found during execution.
Incorrect Translation of Algorithm is logical errors
A Flow chart uses Predefined symbols is called system Flowchart
Object code is must be loaded before execution.
The Program is much easier to change the advantage of modular programming.
Questions
a) Decision
b) Initiation
c) Initialization
d) I/O
Ans. a
P a g e | 424
a) I/O
b) Flow
c) Terminal
d) Decision
Ans. c
14. The action performed by a ______ structure must eventually cause the loop to terminate.
a) sequence
b) case
c) repetition
d) process
Ans. c
a) Module
b) Terminal
c) Process
d) I/O operation
Ans. a
P a g e | 426
16. A _____ is a connector showing the relationship between the representative shapes.
a) Line
b) arrow
c) Process
d) box
Ans. b
Explanation: Arrows are the connectors that shows the relationship between different shapes.
They also show the flow of the program.
17. keep the statement language ____ while writing a pseudo code.
a) Dependent b) Independent
c) Case sensitive d) Capitalized
Ans. b
18. ______ symbol is used to represent input and output operation in flowchart.
a) circle
b) Rectangle
c) Diamond
d) Parallelogram
Ans. d
20. A _____ is a directed graph that describes the flow of execution control of the program.
a) Flowchart
b) Flow graph
c) Complexity curve
d) Algorithm
Ans. a
There are hundreds of different file extensions and file types used with computers. However, it
would be impossible for most people to memorize all the file extensions and their associated
programs. Below a list of the most common file extensions.
MS Excel
1. what is the extension file excel 2004 ?
a) .xls b) .excel c) .xcel d) .xcl
Ans. A
10.Which tab is used to include pivot table, charts, hyperlinks to a spread sheet?
A Insert B Page Layout C Data D Review
Ans. a
11.Which tab in Excel is used when importing, querying, outlining and subtotaling the data placed
into a worksheet‟s data list?
A Formula B Data C Review D Insert
Ans. b
12.Which tab in Excel is used for proofing, protecting, and marking up a spread sheet?
A Formula B Data C Review D View
Ans. c
P a g e | 432
13.Which tool in Ms office is best for organizing data and making lists?
A Access B Excel C Power Point D Word
Ans. b
17.Which type of key should combine with ctrl key to create a macro key in Excel?
A Numeric B Alphabetic C Alphanumeric D Special characters
Ans. b
18.Which bar is used to display the sheet information and insertion point location in MS Excel?
A Ruler B Scroll Bar C Status Bar D Title Bar
Ans. c
19.Which tab is used to change the display of worksheet area and the data it contains?
A Page Layout B Data C Review D View
Ans. d
20.Which view in Excel displays the pages exactly as they appear when printed?
A Custom View B Full screen View C Page Break View D Page Layout view
Ans. d
22.Which function is used to count the number of cells that contain numbers, in a range?
A Count () B Countif()
C Sum() D Sumif()
Ans. a
33.Which option in MS Excel is used to display the rows that meet certain conditions?
A Find B Filter C Format D Sort
Ans. b
34.Which option in Excel is used to rearrange the rows base on the content of a particular
column?
A Find B Filter
C Sort D Format
Ans. c
37.Which key is used to move the insertion point to the beginning of the current sheet?
A Pageup B Home C Ctrl + pageup D Ctrl + Home
Ans. d
38. To remove the content of selected cells you must issue ____ command
a) Delete b) Clear contents c) Clear all d) Clear Delete
Ans. b
39. By default Excel provide 3 worksheets. You need only two of them, how will you delete the
third one?
a) Right click on sheet tab of third sheet and choose delete from the context menu
b) click on sheet 3 and from edit menu choose delete
c) both A and B
d) None of these
Ans. a
42. The cell having and column number 3 and row number 6 is denoted by the name ______.
(a) F3 (b) C6 (c) C3 (d) F6
Ans. b
43. MS excel provide the default value for step in fill series dialog box
a) 0 b) 1 c) 5 d) 10
Ans. b
45. Which of the following you can paste selectively using paste special command?
a) validation b) Formats c) Formulas d) All of these
Ans. d
47. Excel supports recording of repeated actions with the help of ______.
(a) graph (b) chart (c) macro (d) other applications
Ans. c
P a g e | 435
52. Excel file without any macros has the default extension of ______.
(a) .xlsx (b) .xls (c) .xlsm (d) .xlst
Ans. a
53. Excel file containing macros has the default extension of______ .
(a) .xlsx (b) .xls (c) .xlsm (d) .xlst
Ans. c
55. In MS Excel, the common type of data applicable to any cell is called _____ data type.
(a) General (b) Number (c) Currency (d) Text
Ans. a
56. In MS Excel, the data type suitable for handling numbers is called _______data type.
(a) General (b) Number (c) Currency (d) Text
Ans. b
58. In MS Excel, numbers can be grouped and prefixed with a currency symbol using _____ data
type.
(a) Accounting (b) Currency (c) both a & b (d) neither a nor b
Ans. c
61. In MS Excel, _______ data type takes values between 0 and 1 and displays them in
percentage format.
(a) Date (b) Time (c) Percentage (d) Fraction
Ans. c
62. In MS Excel,_______ data type displays decimal fractions as vulgar or mixed fractions.
(a) Date (b) Time (c) Percentage (d) Fraction
Ans. d
64. In MS Excel, _____data type is suitable for names and other character sequences.
(a) Scientific (b) Text (c) Custom (d) Date
Ans. b
65. In MS Excel, _____data type supports formatting of numbers with suitable customization.
(a) Scientific (b) Text (c) Custom (d) Date
Ans. c
66. In MS Excel, for the number 45453453 to be displayed as 4,54,53,453.0, the custom format
could be________ .
(a) ##,##,##,##0.0 (b) ###,###,##0.0 (c) ########0.0 (d) ##,##,##,###.#
Ans. a
68. Long text can be broken down into many lines within a cell. You can do this through
a) wrap text in format >> cells
b) justify in edit >> cells
c) Text wrapping in format >> cells, layout tab
d) All of these
Ans. a
P a g e | 437
69. When copying and pasting an excel formula, the method which permits formula to
progressively update cell references is called ______ referencing system.
(a) static (b) semi-relative (c) relative (d) none of them
Ans. c
71. When copying and pasting an excel formula, the method which keeps references to a
particular cell address is called ______ referencing system.
(a) static (b) semi-relative (c) relative (d) none of them
Ans. a
73. The formula = A5 * 5, when copied to the next row of the same column, will become _______
system.
(a) = A4 * 5 (b) = B5 * 5 (c) = A7 * 5 (d) = A6 * 5
Ans. d
76. _______ functions help to access base conversion, logarithmic and other Engineering features
in MS Excel.
(a) Cube/ Database (b) Date/ Time (c) Engineering (d) Financial
Ans. c
77. In MS Excel, ______functions help to access interest calculation, accounting and currency
related calculations.
(a) Cube/ Database (b) Date/ Time (c) Engineering (d) Financial
Ans. d
78. In MS Excel, ______functions help to check the status of cells, as to whether the cell is blank,
contains a number, text, type of data, etc.
(a) Information
(b) Logical
(c) Lookup & reference
(d) Math & Trigonometric
Ans. a
79. In MS Excel, _______ functions help to make logical functions like AND, OR, NOT, etc.
(a) Information (b) Logical (c) Lookup & reference (d) Math & Trigonometric
Ans. b
P a g e | 438
80. In MS Excel, ______functions help to make lookup in other sheets and references.
(a) Information (b) Logical (c) Lookup & reference (d) Math & Trigonometric
Ans. c
81. In MS Excel, mathematical functions like round, absolute, ceiling, floor, etc. and trigonometric
functions like sin, cos, tan, asin, acos, atan, etc are containing the category of _______.
(a) Information (b) Logical (c) Lookup & reference (d) Math & Trigonometric
Ans. d
82. In MS Excel, statistical functions like average, standard deviation, median, mode, etc. can be
accessed under the category ________ .
(a) Logical (b) Lookup & reference (c) Math & Trigonometric (d) Statistical
Ans. d
83. In MS Excel, functions for length of text, text search, text concatenation, upper, lower and
proper, etc. can be accessed under the category _______ .
(a) Text (b) Logical (c) Lookup & reference (d) Math & Trigonometric
Ans. a
84. _______ function in MS Excel takes year, month and date values and displays given date.
(a) DATE (b) DATEDIF (c) DATEVALUE (d) DAY
Ans. a
85. _______ function in MS Excel takes a date value and returns the day of month.
(a) DATE (b) DATEDIF (c) DATEVALUE (d) DAY
Ans. d
86. _____function in MS Excel takes 2 date values and calculates the difference between the
dates in years ("Y"), months ("M") or days ("D").
(a) DATE (b) DATEDIF (c) DATEVALUE (d) DAY
Ans. b
87. _____ function in MS Excel takes a date string and returns parsed date value.
(a) DATE (b) DATEDIF (c) DATEVALUE (d) DAY
Ans. c
89. What happens when you press Ctrl + X after selecting some cells in Excel?
a) The cell content of selected cells disappear from cell and stored in clipboard
b) The cells selected are marked for cutting
c) The selected cells are deleted and the cells are shifted left
d) The selected cells are deleted and cells are shifted up
Ans. b
90. Which command will you choose to convert a column of data into row?
a) Cut and Paste b) Edit >> Paste Special>> Transpose
c) Both A and B d) None of these
Ans. b
P a g e | 439
91. _______ function in MS Excel returns the hour represented by the given time.
(a) DAYS/ DAYS360 (b) EDATE (c) EOMONTH (d) HOUR
Ans. d
97. _______ function in MS Excel returns the date after given number of working days.
(a) WEEKDAY (b) WORKDAY (c) YEAR (d) YEARFRAC
Ans. b
98. Where can you change automatic or manual calculation mode in Excel?
a) Double CAL indicator on status bar
b) Go to Tools >> Options >> Calculation and mark the corresponding radio button
c) Both of above
d) None of these
Ans. b
115. In MS Excel, ______function returns true if there is an error in the formula contained in given
cell.
(a) ISBLANK
(b) ISERR
(c) ISEVEN
(d) ISODD
Ans. b
P a g e | 441
116. In MS Excel, ______function returns true if the given cell contains an even number.
(a) ISBLANK (b) ISERR (c) ISEVEN (d) ISODD
Ans. c
117. In MS Excel, ________function returns true if the given cell contains an odd number.
(a) ISBLANK (b) ISERR (c) ISEVEN (d) ISODD
Ans. d
118. In MS Excel, ______function returns true if the given cell contains a formula.
(a) ISFORMULA (b) ISERR (c) ISEVEN (d) ISODD
Ans. a
119. In MS Excel, _______function returns true if the given cell a logical value (TRUE or FALSE).
(a) ISNUMBER (b) ISNONTEXT (c) ISNA (d) ISLOGICAL
Ans. d
120. In MS Excel, ______ function returns true if the given cell contains a number.
(a) ISNUMBER (b) ISNONTEXT (c) ISNA (d) ISLOGICAL
Ans. a
121. In MS Excel, ______ function returns true if the given cell contains Logical value (TRUE or
FALSE).
(a) ISNUMBER (b) ISNONTEXT (c) ISNA (d) ISLOGICAL
Ans. d
122. In MS Excel, _______function returns true if the given cell contains a value other than text
(number, logical, etc.).
(a) ISNUMBER (b) ISNONTEXT (c) ISNA (d) ISLOGICAL
Ans. b
126. In MS Excel, _______function returns a number corresponding to the data type of the cell.
(a) N (b) NA (c) TYPE (d) AND
Ans. c
127. In MS Excel, ________function returns true only if all the given conditions are true.
(a) OR (b) FALSE (c) TRUE (d) AND
Ans. d
128. In MS Excel, ________function returns true even if just one of the given conditions is true.
(a) OR (b) FALSE (c) TRUE (d) AND
Ans. a
P a g e | 442
129. In MS Excel, ______function tests the condition given in the first part, executes second part if
the condition is true or executes third part if the condition is false.
(a) OR (b) IF (c) TRUE (d) AND
Ans. b
130. In MS Excel, ________function returns positive value irrespective of whether the input is
positive or negative.
(a) ABS (b) ASIN (c) ACOS (d) ATAN
Ans. a
131. In MS Excel, ______ function returns aggregate value like count, sum, average, etc.
(a) ARABIC (b) ASINH (c) ATANH (d) AGGREGATE
Ans. d
135. In MS Excel, ________function returns the integer just above a fractional number.
(a) CEILING (b) FLOOR (c) ROUND (d) ROUNDDOWN
Ans. a
136. In MS Excel, ______function returns the integer just below a fractional number.
(a) CEILING (b) FLOOR (c) ROUND (d) ROUNDDOWN
Ans. b
137. In MS Excel, ______function returns the number rounded to the given digits.
(a) CEILING (b) FLOOR (c) ROUND (d) ROUNDDOWN
Ans. c
138. In MS Excel, _____function returns the number rounded DOWN to the given digits, simply
discarding the trailing value even if it is greater than or equal to 5.
(a) CEILING (b) FLOOR (c) ROUND (d) ROUNDDOWN
Ans. d
139. In MS Excel, ______function returns the number rounded UP to the given digits, simply
discarding the trailing value even if it is greater than or equal to 5.
(a) ROUNDUP (b) FLOOR
(c) ROUND (d) ROUNDDOWN
Ans. a
144. In MS Excel, _____function returns the exponential value for given number.
(a) EXP (b) LN (c) LOG/ LOG10 (d) FACT
Ans. a
145. In MS Excel, _______function returns the natural logarithm for given number.
(a) EXP (b) LN (c) LOG/ LOG10 (d) FACT
Ans. b
146. In MS Excel, _____function returns the common logarithm (to the base 10) for given number.
(a) EXP (b) LN (c) LOG/ LOG10 (d) FACT
Ans. c
147. In MS Excel, _______function returns the factorial of given number in integer format.
(a) FACTDOUBLE (b) LN (c) LOG/ LOG10 (d) FACT
Ans. d
148. In MS Excel, ______function returns the factorial of given number in double number format.
(a) FACTDOUBLE (b) LN (c) LOG/ LOG10 (d) FACT
Ans. a
149. In MS Excel, ______function returns the greatest common divisor for given numbers.
(a) FACTDOUBLE (b) GCD (c) LCM (d) INT
Ans. b
150. In MS Excel, _____ function returns the least common multiple for given numbers.
(a) FACTDOUBLE (b) GCD (c) LCM (d) INT
Ans. c
151. In MS Excel, ______function returns the integer equivalent of given number, after discarding
fractional parts.
(a) FACTDOUBLE
(b) GCD
(c) LCM
(d) INT
Ans. d
153. In MS Excel, ______function returns the module remainder for given number and divisor.
(a) QUOTIENT (b) MINVERSE (c) MMUL (d) MOD
Ans. d
154. In MS Excel, _______function returns the quotient for given number and divisor.
(a) QUOTIENT (b) MINVERSE (c) MMUL (d) MOD
Ans. a
155. In MS Excel, _____function returns the number rounded to the nearest multiple of the second
argument.
(a) PI (b) POWER (c) MROUND (d) RAND
Ans. c
156. In MS Excel, ______function returns the power of given number raised by second argument.
(a) PI (b) POWER (c) MROUND (d) RAND
Ans. b
158. In MS Excel, ___function returns a random number between given lower limit and upper limit.
(a) PI (b) POWER (c) MROUND (d) RANDBETWEEN
Ans. d
159. In MS Excel, ______function converts a number from Roman numeral to Arabic numeral.
(a) ROMAN (b) ARABIC (c) SIGN (d) SQRT
Ans. b
160. In MS Excel, _______function converts a number from Arabic numeral to Roman numeral.
(a) ROMAN (b) ARABIC (c) SIGN (d) SQRT
Ans. a
161. In MS Excel, ______ function returns the square root of the given number.
(a) ROMAN (b) ARABIC (c) SIGN (d) SQRT
Ans. d
165. In MS Excel, _____function returns the sum of those numbers that fulfill given condition.
(a) SUBTOTAL (b) SUM (c) SUMIF d) SUMSQ
Ans. c
P a g e | 445
166. In MS Excel, _____function truncates decimal digits of given real number to produce an
integer value.
(a) TRUNC (b) SUM (c) SUMIF (d) SUMSQ
Ans. a
167. In MS Excel, ______ function calculates the average absolute (unsigned) deviation.
(a) AVERAGE (b) AVEDEV (c) AVERAGEIFS (d) CORREL
Ans. b
169. In MS Excel, _______ function calculates the average of given numbers which fulfill the given
conditions.
(a) AVERAGE (b) AVEDEV (c) AVERAGEIFS (d) CORREL
Ans. c
176. In MS Excel, ______function provides a linear estimate of the result expected for given input.
(a) COUNT (b) DEVSQ (c) FORECAST (d) COUNTIFS
Ans. c
177. In MS Excel, _______function provides an exponential estimate of the result expected for
given input.
(a) GROWTH (b) GEOMEAN (c) LARGE (d) MEDIAN
Ans. a
P a g e | 446
183. In MS Excel, _______function returns the rank of given number when compared to a list of
numbers.
(a) MAX (b) MIN (c) PERMUT (d) RANK
Ans. d
184. In MS Excel, _______ function returns the nth smallest value from a sorted list.
(a) MAX (b) SMALL (c) PERMUT (d) RANK
Ans. b
186. In MS Excel, _______function returns the character equivalent of numeric ASCII value.
(a) CHAR (b) CODE (c) DOLLAR (d) CONCATENATE
Ans. a
187. In MS Excel, ______function returns the ASCII code for given character value.
(a) CHAR (b) CODE (c) DOLLAR (d) CONCATENATE
Ans. b
188. You want to set such that when you type Baishakh and drag the fill handle, Excel should
produce jestha, Aashadh and so on. What will you set to effect that?
a) custom list b) Auto fill Options c) Fill Across Worksheet d) Fill series
Ans. a
189. In MS Excel, ______function formats a number as currency and prefixes the currency symbol
of the locale.
(a) CHAR (b) CODE (c) DOLLAR (d) CONCATENATE
Ans. c
P a g e | 447
190. In MS Excel, ______function appends several strings one after the other.
(a) CHAR (b) CODE (c) DOLLAR (d) CONCATENATE
Ans. d
192. Each excel file is a workbook that contains different sheets. Which of the following can not be
a sheet in workbook?
a) worksheet b) chart sheet c) module sheet d) data sheet
Ans. d
193. In MS Excel, _______function formats given number based on rules provided using # and 0
characters.
(a) FORMAT (b) LEFT (c) EXACT (d) FIND
Ans. a
197. In MS Excel, ______function returns the lower case version of given string.
(a) LOWER (b) UPPER (c) PROPER (d) LEN
Ans. a
198. In MS Excel, ______function returns the upper case version of given string.
(a) LOWER (b) UPPER
(c) PROPER (d) LEN
Ans. b
199. In MS Excel, ______ function returns the first letter capitalized version of given string.
(a) LOWER (b) UPPER (c) PROPER (d) LEN
Ans. c
200. In MS Excel, ______function returns a string after replacing given characters of first string
using the last string.
(a) SEARCH (b) REPLACE (c) REPT (d) LOWER
Ans. b
P a g e | 448
202. In MS Excel, ______function returns the location of the first string occurring inside the second
string.
(a) SEARCH (b) REPLACE (c) REPT (d) LOWER
Ans. a
203. When all the numbers between 0 and 100 in a range should be displayed in Red Color, apply
a) Use =if() function to format the required numbers red
b) Apply conditional Formatting command on Format menu
c) Select the cells that contain number between 0 and 100 then click Red color on Text Color tool
d) All of these
Ans. b
204. Which tool you will use to join some cells and place the content at the middle of joined cell?
a) From Format Cells dialog box click on Merge Cells check box
b) From Format Cells dialog box select the Centered alignment
c) From Format Cells dialog box choose Merge and Centre check box
d) Click on Merge and center tool on formatting toolbar
Ans. d
205. In MS Excel, ______function substitutes new text in place of given old text.
(a) T (b) TEXT (c) SUBSTITTE (d) TRIM
Ans. c
209. To sort data in MS Excel, _______containing data for sorting should be selected.
(a) all the cells
(b) just the column
(c) just one row
(d) only one cell
Ans. a
P a g e | 449
210. The sort dialog in MS Excel contains a tick box named ______ to select whether the data
contains a header row or not.
(a) My data contains footers (b) My data contains errors
(c) My data contains pictures (d) My data contains headers
Ans. d
211. The sorting dialog in MS Excel contains ______boxes to choose sorting criteria.
(a) column name to be used for sorting (b) whether to sort by value, color or icon
(c) whether to sort ascending or descending (d) all of them
Ans. d
212. In MS Excel, if the sorting requires several levels of criteria, the same can be added using
________ button in sorting dialog.
(a) Add level (b) add row (c) add column (d) add filter
Ans. a
216. The triangular filter button at header row of data helps sorting of data using _____.
(a) ascending/descending order
(b) color
(c) search specific values or applying filter conditions for numbers
(d) all of them
Ans. d
217. After selecting the cells to be subjected to data validation, choose_____ from the menu to
validate data in MS Excel.
(a) Data>Filter (b) Data>Sort
(c) Data>Validation (d) Data>What if analysis>Pivot table
Ans. c
218. In MS Excel, permitting data values in specific range for entry in a cell is called _____of data.
(a) validation (b) sorting
(c) filtering (d) chart
Ans. a
P a g e | 450
219. The data validation dialog shows, allow criterion with______ conditions.
(a) between/ not between (b) equal to/ not equal to
(c) >; <;_;_ (d) all of them
Ans. d
220. In MS Excel, data violating the validation rule may be_______ using Data>Validation>Circle
invalid data.
(a) encircled (b) deleted (c) sorted (d) coloured
Ans. a
221. In MS Excel, to display a specific error message for invalid data entry, _____tab in validation
dialog can be opened to set a custom message.
(a) Error display (b) Input message (c) Output message (d) Result message
Ans. a
223. The data used for charting should have_____ to decide the graph parameters like axis name.
(a) header row (b) footer row (c) blank row (d) blank column
Ans. a
229. In MS Excel, charts may be customized by _______ on appropriate element of the graph.
(a) selecting
(b) right clicking
(c) both a & b
(d) none of them
Ans. c
P a g e | 451
230. Which of the following methods can not be used to enter data in a cell?
a. Pressing an arrow key
b. Pressing the tab key
c. Pressing the Esc key
d. Clicking the enter button to the formula bar
Correct Answer: c.
231. Which of the following methods cannot be used to edit the content of cell?
a. Pressing the Alt key
b. Clicking the formula bar
c. Pressing F2
d. Double clicking the cell
Correct Answer: a
232. What type of charts is useful for comparing values over categories?
a) Pie chart b) Column chart c) Line chart d) Dot chart
Ans. b
233. A Feature that displays only the data in column according to specified criteria
a) Formula b) Sorting c) Filtering d) Pivot
Ans. c
234. Statistical calculations and preparation of tables and graphs can be done using
a) Adobe Photoshop b) Excel c) Notepad d) Wordpad
Ans. b
235. In MS Excel, data meant for pivot table may be converted to a table using first.
(a) Insert>Table (b) Insert>Pie (c) Insert>Column (d) Insert>Scatter
Ans. a
238. After selecting the cells to be subjected to data validation, choose ______ from the menu to
apply goal seek in MS Excel.
(a) Data>Filter
(b) Data>What if analysis>Data table
(c) Data>What if analysis>Goal seek
(d) Data>What if analysis>Pivot table
Ans. c
P a g e | 452
239. In MS Excel, adjusting an input value to get specific result is called _______ .
(a) goal seek (b) charting (c) sorting (d) validation
Ans. a
240. In MS Excel, after choosing Data>What if analysis>Goal seek from the menu, a dialog
appears to take _______values.
(a) desired result (b) input cell in which values are to changed
(c) both a & b (d) none of them
Ans. c
241. After selecting the cells to be subjected to data validation, choose from the menu to apply
scenario in MS Excel.
(a) Data>Filter
(b) Data>What if analysis>Data table
(c) Data>What if analysis>Goal seek
(d) Data>What if analysis>Scenario
Ans. d
242. If you are working in English (US), Chinese or Japanese, Excel 2002 can speak data as you
enter it, to help you verify accuracy. How do you activate this feature?
a. Point to speech on the tools menu, and then click show text to speech toolbar.
b. Click validation on the data menu
c. Point to speech on the tools menu, and then click speech recognition
d. All of above
Correct Answer: a
244. How should you print a selected area of a worksheet, if you‟ll want to print a different area
next time?
a. On the file menu, point to print area, and then click set print area.
b. On the file menu, click print, and then click selection under print what
c. On the view menu, click custom views, then click add
d. All of above
Correct Answer: b
245. Except for the …… function, a formula with a logical function shows the word “TRUE” or
“FALSE” as a result
a. IF b. AND c. OR d. NOT
Ans: a
247. You can open the consolidate dialog box by choosing Consolidate from the ….. menu.
a. Insert b. Format c. Tools d. Data
Correct Answer: d
P a g e | 453
250. Gridlines
a. May be turned off for display but turned on for printing
b. May be turned on or off for printing
c. The be turned off for display and printing
d. a, b and c
Correct Answer: d
P a g e | 454
E-Commerce
1. B2B stands for________.
a) Business to Buyer b) Business to Builder
c) Business to Business d) Builder to Business
Ans. c
9. Information Technology Act, 2000 is based on which Model Law of E-Commerce adopted by
United Nation:
a. UNICITIRAL
b. UNCITRAL
c. UNICITRAL
d. UNCITIRAL
Ans. b
P a g e | 455
11. What is the percentage of customers who visit a website and actually buy something:
a. Affiliate Program
b. Click-through
c. Spam
d. Conversion rate
Ans. d
20.Which is the model in E - Commerce, if the seller is an individual and the buyer is a business
firm?
A Consumer to Business
B Business to Consumer
C Business to Business
D Consumer to Consumer
Ans. a
21.Which is the function of specifying access rights to resources related to information security?
A OTP
B Pin
C Authorization
D Passcode
Ans. c
22.Which refers to paying the money back to the buyer after the price has been deducted from the
account?
A Refund
B Return
C Deduction
D Charge base
Ans. a
24.Which is the process of ensuring the data, transactions, communication or documents are
genuine?
A Availability
B Integrity
C Authenticity
D Confidentiality
Ans. c
P a g e | 457
25.Which of the following authenticates and handles credit card payment for E-Commerce?
A Payment gateway
B E - Commerce gateway
C Software gateway
D E-Wallets
Ans. a
28. The geographical domain of business of an E-Commerce platform is called ____of the
platform.
(a) length (b) height (c) scope (d) sales
Ans. c
29. E-Commerce platforms like Snapdeal, Flipkart, Shopclues, etc. have _____scope of business.
(a) National (b) local (c) Global (d) none of them
Ans. a
31. Description of a product by the seller might _____, which will result in customer dissatisfaction.
(a) not match the product (b) be inadequate
(c) omit certain defects (d) all of them
Ans. d
32. During transit, a product might_____, which will result in customer dissatisfaction.
(a) get damaged (b) get broken
(c) be affected by excess light/ radiation (d) all of them
Ans. d
33. After ordering a product, the buyer might ______ the product, which will result in unnecessary
transport expense to the seller.
(a) fail to pay for (b) reject (c) find defects in (d) all of them
Ans. d
P a g e | 458
34. The delivery for the buyer of E-Commerce platform ______ , thus resulting in dissatisfaction to
the buyer.
(a) might not reach on promised date
(b) may reach as per schedule
(c) may reach in good condition
(d) may arrive earlier than the promised date
Ans. a
35. Items added to the cart of an Ecommerce platform are checked out after_______.
(a) payment (b) order on COD (c) both a & b (d) none of them
Ans. c
36. After placing an order, the buyer is provided ______for tracking the progress of shipment till
delivery.
(a) Waybill number (b) postal registration number
(c) consignment tracking ID (d) any one of a, b or c
Ans. d
37. After delivering a product and its acceptance by the buyer, the seller gets ______.
(a) payment for the transaction (b) delisted
(c) penalized for the transaction (d) scolded through email
Ans. a
38. After completing an E-Commerce transaction, the seller and buyer should be provided an
opportunity to_______ their transaction experience.
(a) undo (b) regret
(c) provide rating for (d) forget
Ans. c
39. The E-Commerce platform should provide facility for transaction for ______electronic
payment.
(a) unprotected (b) secure (c) unsafe (d) uncontrolled
Ans. b
40. To protect the customer from loss of money, the E-Commerce platform should maintain a list
of_______ and provide appropriate remidy to the customer.
(a) failed transaction (b) completed transactions
(c) partially completed transactions (d) all of them
Ans. d
43. Online catelogue should clearly describe_____ of a product sold through Ecommerce platform.
(a) salient internal features (b) physical detail
(c) defects, if any (d) all of them
Ans. d
48. _______ is the trading of goods and items through the Internet.
(a) E-Trade (b) E-Commerce (c) E-Network (d) none of them
Ans. b
49. The online portal for dissemination of information about products (without permission for online
transactions) is called________ E-Commerce site.
(a) transactional type (b) information delivery (c) e-marketplace (d) none of them
Ans. b
50. The online portal which permits sellers and buyers to register, sell/ buy products online is
called __________ E-Commerce site.
(a) transactional type (b) information delivery (c) e-marketplace (d) none of them
Ans. c
51. An online repository in which cash is recharged for spending online is called______.
(a) debit card (b) credit card (c) wallet (d) none of them
Ans. c
52. Most commonly used credit/ debit cards are issued by ______.
(a) VISA (b) Master/ Maestro (c) American Express (d) all of them
Ans. d
57. During a secure online transaction, a______ icon is shown next to the address bar.
(a) locked lock (b) green lock (c) either a or b (d) none of them
Ans. c
58. During a insecure online transaction, a_____ icon is shown next to the address bar.
(a) open lock/ lock with red X mark (b) closed lock (c) green lock (d) none of them
Ans. a
59. The intermediary responsible for processing the transfer of fund from payee to recipient in an
E-Commerce transaction is called_______.
(a) Payment gateway (b) credit card (c) debit card (d) wallet
Ans. a
61. The payment gateway________ the amount to the recipient after the payee completes
transaction.
(a) transfers (b) does not transfer (c) cheats (d) does not pay
Ans. a
64. During an online transaction, a 6 or 8 digit number called_______ is sent to the registered
mobile number/ email ID to complete the transaction.
(a) Card number (b) Card Verification Value (CVV)
(c) One Time Password (OTP) (d) Grid Value
Ans. c
P a g e | 461
65. To make online payment through Internet banking, _______is required to authorize the user to
access the bank account.
(a) user name (b) password (c) both a & b (d) none of them
Ans. c
66. Which of the ecommerce software is free of charge (no licensing fee)?
(a) OnPromise (b) SaaS (c) Open Source (d) none of them
Ans. c
67. What is the term given to e-commerce site where product and inventory information is
provided by multiple third parties?
(a) online marketplace (b) online e-commerce (c) e-marketplace (d) none of them
Ans. a
69. Which of the following ecommerce platforms allows consumers to buy goods directly from
seller over the Internet?
(a) e-webshop (b) e-shopping (c) e-webstore (d) all of them
Ans. d
70. Which software model allows accumulation of a list of items before making the online
purchase?
(a) online shopping (b) e-shopping (c) shopping cart (d) none of them
Ans. c
71. What is the name of front page of a web store accessed by visitors to the online shop?
(a) storefront (b) webfront (c) e-store (d) none of them
Ans. a
72. If a company sends bills over the Internet and consumers pay the bills online, it is called_____.
(a) Internet billing (b) web billing (c) electronic billing (d) none of them
Ans. c
79. Which system facilitates the adoption of electronic payment for online transactions?
(a) motivated electronic purchase system (b) electronic payment system
(c) online payment system (d) none of them
Ans. b
81. In _______system, payment gateway allows the consumer to specify the bank from which
payment should be made.
(a) e-pay banking (b) e-commerce banking (c) net banking (d) none of them
Ans. c
82. What can be used by a consumer and accepted by a merchant for making payments?
(a) merchant card (b) payment card (c) visiting card (d) none of them
Ans. b
84. The default period of loan for a credit card holder is ______days.
(a) 55 (b) 50 (c) 58 (d) none of them
Ans. a
86. In which card, a card holder is not required to make payments every month?
(a) charge (b) credit (c) debit (d) none of them
Ans. c
P a g e | 463
87. In which card, funds are directly withdrawn from his bank account for each payment made
through the card?
(a) debit (b) credit (c) ATM (d) none of them
Ans. a
89. Which cards have a monetary value store on the card itself?
(a) ATM (b) charge (c) stored-value (d) none of them
Ans. c
90. Which cards are commonly used to buy gasoline (petrol), diesel and other fuels?
(a) eet/fuel (b) ATM (c) credit (d) none of them
Ans. a
91. Which cards store card data that can be read by physical contact and swiping past a reading
head?
(a) magnetic strip (b) embossing (c) smart (d) none of them
Ans. a
92. Which card contains a chip having embedded integrated circuit which can process data?
(a) magnetic strip (b) embossing (c) smart (d) none of them
Ans. c
95. In a credit or debit card, a 3 digit number printed on the reverse to verify the card authenticity
is called_______.
(a) Card Verification Value (CVV) (b) PIN (c) PAN (d) Grid
Ans. a
96. To complete an E-Commerce transaction, ______details about a credit/ debit card are
required.
(a) Card number/ card expiry month/ year (b) card holder name
(c) Card Verification Value (CVV) (d) all of them
Ans. d
P a g e | 464
102. In electronic cheque payments developed, it is assumed that most of the transactions will be
a) customers to customers b) customers to business
c) business to business d) banks to banks
Ans. c
107. The bank has to have the public keys of all customers in set protocol as it has to
a) check the digital signature of customers
b) communicate with merchants
c) communicate with merchants credit card company
d) certify their keys
Ans. a
110. …….is essentially a business process that connects manufacturers, retailers, customers and
suppliers in the form of a chain to develop and deliver products.
a) SCM b) Networking c) E-commerce d) EDI
Ans. a
112. _____ is a set of standards developed in the 1960s to exchange business information and to
do electronic transactions
a) TCP/IP
b) Protocols
c) EDI
d) None of these
Ans. c
P a g e | 466
113.The dimension of e-commerce that enables commerce across national boundaries is called
_____.
a) interactivity b) global reach
c) richness d) uniquity
Ans. b
114. Which one of the following is not one of the major types of e-commerce?
a) C2B b) B2C c) B2B d) C2C
Ans. a
115. Which of the following is part of the four main types for e-commerce?
a) B2B b) B2C c) C2B d) All of these
Ans. d
116. In the e-commerce security environment, which of the following constitutes the inner-most
layer?
a) people b) data c) technology solutions d) organizational policies and procedures
Ans. b
118. The primary source of financing during the early years of e-commerce was ______.
a) bank loans b) large retail firms
c) venture capital funds d) initial public offerings
Ans. c
120. Which products are people most likely to be more uncomfortable buying on the internet?
a) Books
b) Furniture
c) Movies
d) All of the above
Ans. b
122. Which products are people most likely to be comfortable buying on the internet?
a) Books b) PCs
c) CDs d) All of the above
Ans. d
P a g e | 467
123. Digital products are best suited for B2C e-commerce because they:
a) Are commodity like products
b) Can be mass-customized and personalized
c) Can be delivered at the time of purchase
d) All of the above
Ans. d
124. All of the following are major B2C business models except_______.
a) content provider b) industry consortium
c) transaction broker d) service provider
Ans. b
126. Which form of e-marketplace brings together buyers and sellers from the same industry?
a) horizontal b) Vertical c) Integrated d) Inclined
Ans. b
127. All of the following are techniques B2C e-commerce companies use to attract customers,
except:
a) Registering with search engines b) viral marketing
c) online ads d) virtual marketing
Ans. d
128. Which term represents a count of the number of people who visit one site, click on an ad, and
are taken to the site of the advertiser?
a) Affiliate programs b) Click – through c) Spam d) All of these
Ans. b
129. What is the process in which a buyer posts its interest in buying a certain quantity of items,
and seller complete for the business by submitting successively lower bids until there is only one
seller left?
a) B2B marketplace b) intranet c) Reverse auction d) Internet
Ans. c
130. Which form of e-commerce currently accounts for about 97% of all e-commerce revenues?
a) B2B b) B2C c) C2B d) C2C
Ans. a
131. Which of the following are advantages normally associated with B2B e-commerce?
a) Shorter cycle times b) Reduction in costs
c) Reaches wider audiences d) all of these
Ans. d
133. which of the following is a useful security mechanism when considering business strategy
and IT?
a) encryption b) decryption c) firewall d) All of these
Ans. d
135. What is the name given to an interactive business providing a centralized market where many
buyers and suppliers can come together for e-commerce or commerce related activities?
a) Direct marketplace b) B2B c) B2C d) Electronic Marketplace
Ans. d
137. The underlying computing equipment that the system uses to achieve its e-commerce
functionality is called a_____.
a) hardware b) content platform c) transaction platform d) scalability platform
Ans. a
138. On which of the following gadgets we can trade through e-commerce using internet?
a) Mobile b) Laptop c) Tablet d) All of these
Ans. d
140. In which category of e-commerce a seller sell directly to a distributor or other business
house?
a) B2B b) B2C c) C2C d) None
Ans. a
141. Which one of the following has a wider reach among customers?
a) Shop b) Online Trader c) Traditional Trader d) None
Ans. b
1. DOS command maximum length is _____ character including command name and related
Parameters.
Ans. 127
29. The commands loaded to main memory along with MS DOS operating system are
called______ DOS commands.
(a) internal (b) external
(c) useless (d) unwanted
Ans. a
30. The commands stored in a disk and loaded to main memory only when first invoked are called
________ DOS commands.
(a) internal (b) external
(c) useless (d) unwanted
Ans. b
31. If a file has .BAT extension and contains a list of commands to be executed, the file is called a
________ file.
(a) database (b) temporary (c) batch (d) shell script
Ans. c
33. ______ command may also be used in place of the DOS command CD.
(a) CHDIR (b) MKDIR
(c) RMDIR (d) ERASE
Ans. a
P a g e | 472
34. ______MS DOS command creates a new copy of the file and deletes the source file.
(a) MOVE (b) MEM
(c) MIRROR (d) MORE
Ans. a
40. Recommended format for entering new date using DATE command (in Indian locale) is ____ .
(a) yyy-ddd-mmm (b) yy-dd-mm
(c) dd-mm-yy (d) yyy-mm-dd
Ans. c
41. ______command displays current date and gets new date for resetting.
(a) DATE
(b) TIME
(c) COPY
(d) COPY CON < file.txt >
Ans. a
42. _______command displays current time and gets new time for resetting.
(a) DATE
(b) TIME
(c) COPY
(d) COPY CON < file.txt >
Ans. b
P a g e | 473
44. Recommended format for entering new date using TIME command (in Indian locale) is _____.
(a) hh:mm:ss (b) mm:ss:hh
(c) ss:mm:hh (d) mm:hh:ss
Ans. a
45. ______command creates a text file (named file.txt) and saves keyboard input to that file.
(a) DATE
(b) TIME
(c) COPY
(d) COPY CON < file.txt >
Ans. d
47. To display the contents of a file (e.g., FILE.TXT) on the screen, issue the command _______.
(a) MKDIR FILE.TXT
(b) DEL FILE.TXT
(c) TYPE FILE.TXT
(d) MOVE FILE.TXT ..
Ans. c
48. To create copy of an existing file (F1.TXT) in a new name (F2.TXT), issue the command____ .
(a) COPY F1.TXT F2.TXT
(b) DEL F1.TXT F2.TXT
(c) REN F1.TXT F2.TXT
(d) ATTRIB +H F1.TXT F2.TXT
Ans. a
49. To create a copy of one file in a new name, _______ command is used.
(a) MOVE (b) REN (c) COPY (d) MKDIR
Ans. c
52. To change from one directory to another, _______ DOS command is used.
(a) CD (b) MD (c) RD (d) ATTRIB
Ans. a
53. ______command may also be used in place of the DOS command MD.
(a) CHDIR (b) MKDIR
(c) RMDIR (d) ERASE
Ans. b
54. ______command may also be used in place of the DOS command RD.
(a) CHDIR (b) MKDIR
(c) RMDIR (d) ERASE
Ans. c
55. ______ command may also be used in place of the DOS command DEL.
(a) CHDIR (b) MKDIR
(c) RMDIR (d) ERASE
Ans. d
60. To display the value of PATH environment variable, _____of the following commands is useful.
(a) SET %PATH%
(b) PAUSE %PATH%
(c) DEL %PATH%
(d) ECHO %PATH%
Ans. d
61. The ________ environment variable in DOS contains the list of folders in which commands
would be searched.
(a) PATH (b) CLASSPATH
(c) WINDIR (d) HOME
Ans. a
P a g e | 475
62. The ______environment variable in DOS contains the name of home directory for current user.
(a) PATH (b) CLASSPATH
(c) WINDIR (d) HOME
Ans. d
63. To rename a file (X.TXT) to a new name (Y.TXT), which of the following
commands would be suitable?
(a) COPY X.TXT Y.TXT
(b) REN X.TXT Y.TXT
(c) MKDIR X.TXT
(d) DEL X.TXT Y.TXT
Ans. b
64. To hold the processing of commands till any key is pressed, ______DOS command is used.
(a) SLEEP (b) PROMPT
(c) PAUSE (d) SET
Ans. c
67. To create a remarks line (which is ignored during processing) in MS DOS, ______ command is
used.
(a) REM (b) PROMPT
(c) PAUSE (d) SET
Ans. a
69. The _______ command (removed in the latest version of MS DOS) adds given string to the
end of PATH environment variable.
(a) SORT (b) APPEND (c) MOVE (d) ASSIGN
Ans. b
71. The ________command changes file attributes like archive, hidden or read-only.
(a) ATTRIB (b) APPEND (c) MOVE (d) ASSIGN
Ans. a
P a g e | 476
74. To set archive attribute to file (say FILE.TXT), _______DOS command is used.
(a) ATTRIB -A FILE.TXT
(b) ATTRIB +A FILE.TXT
(c) ATTRIB -H FILE.TXT
(d) ATTRIB +H FILE.TXT
Ans. b
75. To remove archive attribute from file (say FILE.TXT), ______DOS command is used.
(a) ATTRIB -A FILE.TXT
(b) ATTRIB +A FILE.TXT
(c) ATTRIB -H FILE.TXT
(d) ATTRIB +H FILE.TXT
Ans. a
76. To set a file (say FILE.TXT) to read-only mode, ________ DOS command is used.
(a) ATTRIB -A FILE.TXT
(b) ATTRIB +A FILE.TXT
(c) ATTRIB +R FILE.TXT
(d) ATTRIB -R FILE.TXT
Ans. c
77. To set a file (say FILE.TXT) to read write (i.e., to remove read-only attribute) mode, _____
DOS command is used.
(a) ATTRIB -A FILE.TXT
(b) ATTRIB +A FILE.TXT
(c) ATTRIB +R FILE.TXT
(d) ATTRIB -R FILE.TXT
Ans. d
78. _______ MS DOS command (removed from latest version of MS DOS) creates a backup of all
files having archive attribute.
(a) CHKDSK (b) BACKUP
(c) COMMAND.COM (d) COMP
Ans. b
P a g e | 477
79. ______ MS DOS command verifies file system in given drive and repairs the file system if
necessary.
(a) CHKDSK (b) BACKUP
(c) COMMAND.COM (d) COMP
Ans. a
81. _______MS DOS command compares two files and reports any differences.
(a) CHKDSK (b) BACKUP
(c) COMMAND.COM (d) COMP
Ans. d
82. ______MS DOS command helps to debug a program and inspect values stored in variables.
(a) DEBUG (b) DISKCOMP
(c) DISKCOPY (d) DOSKEY
Ans. a
83. ______MS DOS command keeps history of previous DOS commands and permits navigation
on pressing UP or DOWN arrows.
(a) DEBUG (b) DISKCOMP
(c) DISKCOPY (d) DOSKEY
Ans. d
84. ____ MS DOS command compares the contents of 2 disks and reports the differences, if any.
(a) DEBUG (b) DISKCOMP
(c) DISKCOPY (d) DOSKEY
Ans. b
86. _______MS DOS command displays a visual window for accessing files and folders.
(a) DOSSHEL (b) DISKCOMP
(c) DISKCOPY (d) DOSKEY
Ans. a
92. _____ MS DOS command helps to create and manage partitions in hard disk.
(a) FDISK (b) FORMAT
(c) EDLIN (d) EXPAND
Ans. a
93. _____MS DOS command formats (creates new file system on) given partition.
(a) FDISK (b) FORMAT
(c) EDLIN (d) EXPAND
Ans. b
94. ______MS DOS command displays help information about given command.
(a) FDISK (b) FORMAT
(c) HELP (d) LABEL
Ans. c
98. _____MS DOS command creates a backup file for restoration of data at a later date.
(a) MOVE (b) MEM
(c) MIRROR (d) MORE
Ans. c
101. ______ MS DOS command (removed in the latest version of MS DOS) checks and repairs
files in given drive.
(a) SCANDISK (b) SORT (c) PRINT (d) SYS
Ans. a
102. ______ MS DOS command sorts the contents of file in alphabetic or numerical order.
(a) SCANDISK (b) SORT
(c) PRINT (d) SYS
Ans. b
103. _______ MS DOS command copy system files and make a disk bootable.
(a) SCANDISK (b) SORT
(c) PRINT (d) SYS
Ans. d
104. ______MS DOS command displays files and folders in a tree structure.
(a) TREE (b) UNDELETE
(c) XCOPY (d) MOVE
Ans. a
106. ______redirector writes output of a program to a new file, deleting the old contents, if any.
(a) > (b) >>
(c) | (d) none of them
Ans. a
107. _______redirector appends output of a program to an existing file, creating the file if it does
not exist.
(a) > (b) >>
(c) | (d) none of them
Ans. b
109. ______ wild card matches any number of characters in the name.
(a) * (b) ? (c) & (d) $
Ans. a
112. Each time you turn on your computer, it will check on the control file
a) Command.com, io.sys
b) Command.com, date.com, dir.com
c) Command.com, io.sys, msdos.sys
d) Chkdsk.exe
Ans. c
113. If you need to duplicate the entire disk, which command will you use?
a) Copy b) Diskcopy c) Chkdsk d) Format
Ans. b
114. Only filenames and extensions are to be displayed in wide format, which command you‟ll
use?
a) Dir/w b) Dir a: c) Dir/s d) Dir/b
Ans. a
115. Which command displays all the files having the same name but different extensions?
a) Dir filename.* b) Dir filename.ext
c) Dir *.sys d) Dir *.ext
Ans. a
116. Which command displays only file and directory names without size, date and time
information?
a) dir/w b) Dir a: c) Dir /b d) Dir / s
Ans. c
117. Which command displays comma for thousand separating on file size while listing?
a) Dir/w b) Dir a: c) Dir/s d) Dir/c
Ans. d
118. Which command is used to display all the files having the (.exe) extension but different
filename?
a) Dir filename b) Dir filename.ext c) Dir *.sys d) Dir *.exe
Ans. d
119. Which command should be used to display all files within the specified subordinate directory
of the subdirectory?
a) Dir \ pathname
b) Dir \ pathname\pathname
c) Dir / ch
d) Dir \ pathname\filename
Ans. b
120. Which command displays the directory list including files in tree structure?
a) Dir/s/f b) Tree/f c) Tree/s/f d) Dir/f
Ans. b
P a g e | 481
121. Which command will be used to display a file within the specified directory of pathname?
a) Dir\pathname b) Dir\pathname\pathname
c) Dir/ch d) Dir\pathname\filename
Ans. d
123. Which command displays current directory name or change from one to another?
a) Chdir b) Cd c) Mkdir d) Both a and b
Ans. d
126. An entire path name, consisting of several subdirectory names can contain upto
a) 13 character b) 36 character c) 63 character d) 53 character
Ans. c
129. To copy the hidden system files of DOS to another disk you can use the command
a) Copy b) Ren c) Sys d) Diskcopy
Ans. c
130. ______ MS DOS command restores the latest file deleted from MS DOS file system.
(a) TREE (b) UNDELETE
(c) XCOPY (d) MOVE
Ans. b
Cyber Security
1. What is the full form of LDAP?
A Light Weight Directory Access Provider
B Light Weight Directory Access Protocol
C Light Weight Directory Access Program
D Light Weight Directory Access Protection
Ans. b
2. What is called the collective terms of malicious software, such as viruses, worms and trojans?
A Spam B Phishing C Malware D Harm
Ans. c
6. Which crime involves the use of computer networks to create, distribute or access materials tha
sexually expoit underage persons?
A Assault by Threat B Cyber squatting C Cyber vandalism D Child pornography
Ans. d
7. Which method go through all the files or network elements with an intention to detect
something unusual?
A Probing B Phishing C Infecting D Scanning
Ans. d
10. Script files sent mostly through email attachment to attack host computer are called ______.
(a) Worms
(b) Phishing attacks
(c) Trojans
(d) Computer Viruses
Ans. a
P a g e | 483
11. Attacking the victims through fake URL resembling that of a valid financial Institution
is called_____ .
(a) Worms
(b) Phishing attack
(c) Trojans
(d) Computer Viruses
Ans. b
12. A malicious program spreading through Internet and storage media and attacking the data in
victims computer is called_______.
(a) Worms
(b) Phishing attack
(c) Trojan
(d) Computer Virus
Ans. d
14. The person using vulnerability in operating system or application software or IT infrastructure
to intrude in to the computer of a victim is called ______ .
(a) hacker
(b) cracker
(c) maker
(d) taker
Ans. a
20. Protection from______ of source code means non-disclosure of the source code to outsiders.
(a) disclosure
(b) alteration
(c) destruction
(d) log of changes (whois making request)
Ans. a
21. _______of access rights in source code development means verification of role before
permitting access to source code.
(a) verification
(b) maintaining historical records
(c) error handling
(d) log of changes (whois making request)
Ans. a
22. _____in source code development means handling of configuration errors, session errors and
exceptions.
(a) verification
(b) maintaining historical records
(c) error handling
(d) log of changes (whois making request)
Ans. c
23. Protecting the data divulged by customers from unauthorized access is called____.
(a) privacy protection
(b) audit
(c) antinvirus
(d) vulnerability
Ans a
24. Information on criminal records of individuals, financial data of companies, genetic information,
address, mobile number, email ID, record of web surfing behaviour, record of credit card, record of
debit card, netbanking details, etc. are classified under ______.
(a) privacy protection
(b) audit
(c) antinvirus
(d) vulnerability
Ans. a
P a g e | 485
26. Any single employee ______hold all data needed for making a complete financial transaction.
(a) should not
(b) should
(c) may
(d) might
Ans. a
27. IT audit of the firm should be conducted periodically, which may be every______ .
(a) fortnight
(b) month
(c) quarter
(d) all of them
Ans. d
30. ______ servers provides a central storeroom for storing and managing information?
a) Clint
b) Directory
c) Post
d) Group
Ans. b
31. ______ generally refers to a system that can control, monitor and restrict the movement of
people, assets or vehicles, in, out and around a building or site?
a) Access control
b) Security Guard
c) Form Denial
d) None
Ans. a
P a g e | 486
32. Which chapter of the IT awareness Act talks about electronic governance?
a) 4
b) 3
c) 2
d) 1
Ans. b
34. Which chapter of the IT awareness act talks about penalities and adjudication?
a) 5
b) 7
c) 11
d) 9
Ans. d
41. Performing hacking activities with the intent of gaining visibility for an unfair situation is
called_______.
a) Cracking
b) Analysis
c) Hacktivism
d)Exploitation
Ans. c
46. _____ is a popular tool used for discovering networks as well as in security auditing.
a) Ettercap
b)Metasploit
c) Nmap
d) Burp Suit
Ans. c
47. Which of the below mentioned tool is used for Wi-Fi hacking?
a) Wireshark
b) Nessus
c) Aircrack-ng
d) Snort
Ans. c
49. All of the following are example of real security and privacy threats except:
a) Hackers
b) Virus
c) Spam
d) Worm
Ans. c
53. Which of the following is not an external threat to a computer or a computer network.
a) Ignorance
b) Trojan horses
c) Adware
d) Crackers
Ans. a
55. It allow a visited website to store its own information about a user on the user‟s computer.
a) Spam
b) Cookies
c) Malware
d) Adware
Ans. b
57. Exploring appropriate and ethical behaviours related to online environments and digital media.
a) Cyber ethics
b) Cyber security
c) Cyber safety
d) Cyber law
Ans. a
58. Which of the following principle is violated if computer system is not accessible?
a) Confidentiality
b) Availability
c) Access Control
d) Authentication
Ans. b
64. Unauthorized access and viruses are issues dealing with network______
a) Performance
b) Reliability
c) Security
d) none of the above
Ans. c
65. A company changes its network configuration so that only one router instead of two can
access the internet. The greatest impact will be on the _____ of the network.
a) Performance
b) Reliability
c) Security
d) none of the above
Ans. c
66. A company requires its users to change passwords every month. This improves the _____ of
the network.
a) Performance
b) Reliability
c) Security
d) none of the above
Ans. c
67. A company requires each employee to power off his computer at the end of the day. This rule
was implanted to make the network _______.
a) Perform better
b) more reliable
c) more secure
d) more error-free
Ans. c
P a g e | 491
68. A firewall is a
a) Wall build to prevent fires from damaging a corporate intranet
b) security device deployed at the boundary of a company to prevent unauthorized physical
access
c) security device deployed at the boundary of a corporate intranet to protect it from unauthorized
access
d) device to prevent all accesses from the internet to the corporate intranet
Ans. c
78. DES
(i) is a symmetric key encryption method
(ii) guarantees absolute security
(iii) is implemented as hardware VLSI chip
(iv) is a public key encryption method
a) i and ii
b) ii and iii
c) i and iii
d) iii and iv
Ans. c
83. The responsibility of a certification authority for digital signature is to authenticate the
a) hash function used
b) private keys of subscribers
c) public keys of subscribers
d) key used in DES
Ans. c
95. In which of the following protocols does a website (if accessed using the protocol) encrypt the
session with a digital certificate?
a) TCP
b) SHTTP
c) HTTPS
d) XHTTP
Ans. c
98. Which of the following refers to programs that surreptitiously monitor activity on a computer
system and report that information to others without the user‟s consent?
a) Malware
b) Botnet
c) Trojan horse
d) Spyware
Ans. d
102. Which of the following is a general term for malicious software that pretends to be harmless
so that a user willingly allows it to be download onto the computer?
a) Spyware
b) Virus
c) Trojan Horse
d) Botnets
Ans. c
103. Which of the following is the collective name for Trojan horses, spyware, and worms?
a) Spyware
b) Botnets
c) Virus
d) Malware
Ans. d
115. Which of the following techniques are used by spammers to find valid/existent email
addresses?
a) SMTP spoofing
b) SMTP poisioning
c) DNS poisioning
d) Directory Harvest Attack
Ans. d
116. Which of the following types of virus lives in the boot sector ?
a) Sector virus
b) Parasitic virus
c) Boot sector virus
d) Bootable virus
Ans. c
117. Suppose you got a mail from someone saying that you gave won a Rs. 100000/- and asking
you to give him/her Rs. 5000/- to claim your prize. Under Which category does this type of spam
mail file?
a) Phishing and Fraud
b) Spoofing mails
c) Hoaxes
d) Chain mails
Ans. a
120. Which of the following are the ways through which virus spreads?
a) Floppy Disk
b) CD
c) Email Attachment
d) All of the above
Ans. d
123. Suppose you got a mail from the HDFC bank asking you to give your online bank account
details. Under which of the spam mail categories does this mail?
a) Phishing and fraud
b) Chain mails
c) Hoaxes
d) Brand spoofing
Ans. a
127. Which of the following measures should be taken to tackle spam mails?
a) Blocking and accepting on the basis of MTA IP address
b) Limiting the number of outgoing e-mails per account
c) Authentication mechanisms
d) All of the above
Ans. d
129. What is the function of the Reverse DNS look up Technique in identifying spam mails?
a) To check the sender‟s email server attempting for spoofing
b) To check the receiver‟s email server attempting for spoofing
c) To check the DNS server validity
d) None of these
Ans. c
135. Which of the following are different types of spam filtering methods?
a) Blacklisting
b) Rule based filtering
c) Signature based filtering
d) All of these
Ans. d
P a g e | 501
138. Which of the following spam filtering techniques has the highest potential for generating false
positives?
a) Community Filtering
b) Bayesian Filtering
c) Challenge-Response Filtering
d) Keyword Filtering
Ans. d
139. Why shouldn‟t a user click unsubscribe links from spam messages?
a) clicking the link will prevent
b) unsubscribing makes finding the sender difficult
c) the click may validate the email address
d) None of these
Ans. c
142. What is a good method for a website owner to confirm a user is not using an account for a
spamming purpose?
a) Users must associate a phone to their account and confirm a number sent to them via text
b) Requiring users provide valid personal information during sign up
c) Users that register must click on a confirmation link to the email they specify in their profile
d) All of these
Ans. d
P a g e | 502
143. A virus is a program that attached itself to (or replace the content of) which of the following
file types?
a) Text files
b) Executables
c) Header files
d) Source files
Ans. b
148. In order to infect a system, clicking an email attachment must cause which of the following
conditions to occur?
a) The attachment is saved to the disk b) the attachment is decompressed
c) the attachment opens in a preview editor d) the attachment executes
Ans. d
149. If you cannot delete malware infected file, what is good method to try first?
a) Reformat then attempt to delete the file
b) Run windows Repair
c) Run windows Restore
d) Boot in Windows safe mode and attempt to delete the file
Ans. d
P a g e | 503
151. A client asks you to fix his computer because it has ransomware on it. He says he sees a
message as soon as he loads windows, and cannot do anything else. What is the best way to fix
this computer without losing any of his data?
a) Reinstall windows
b) Reformat the computer
c) Boot from a USB drive and run a program to remove the malware
d) Use windows restore
Ans. c
154. Virus infection via email attachment can be minimized using which of the following?
a) Opening attachment from external hard drives
b) Copying attachments to special directories before opening them
c) Right clicking attachments
d) Deleting mail containing attachments from unknown senders
Ans. d
155. In order to help prevent spam, a honeypot performs which of the following functions?
a) acts as a desirable mail server in order to lure spammers
b) delivers suspects spam messages more slowly
c) traps suspected spam messages
d) routes suspected spam to special enclaves in the system
Ans. a
158. Which of the following reduces spam by rejecting mail from a specific IP addresses?
a) URL Blacklisting
b) DNS Blacklisting
c) IMAP Blacklisting
d) POP3 Blacklisting
Ans. b
160. Which of the following is valid difference between a virus and a spyware?
a) Spyware damages data and also steals sensitive private information
b) Virus damaged data, spyware steals sensitive private information
c) Spyware damages data, virus steals sensitive private information
d) Virus damages data and also steals sensitive private information
Ans. b
161. What is called the protection of information and data from unauthorized Access?
A Physical security
B Link security
C Risk management
D Information security
Ans. d
164. Trojan horses are very similar to virus in the programs that replicate copies of themselves
a) True b) False
Ans. b
P a g e | 505
167. What is called protecting data from online attacks, deletions, malwares?
A) Physical security
B) Cyber security
C) Cyber attack
D) Virus
Ans. b
170. ______ monitors user activity on internet and transmit that information in the background to
someone else.
a) Malware b) Spyware
c) Adware d) None of these
Ans. b
Accounting
1. Accounting is the_______ of monetary transactions.
(a) recording (b) verification (c) tallying (d) all of them
Ans. d
11. The method of recording debit and credit sides separated by a line is nicknamed _________
accounting.
(a) T (b) U (c) V (d) W
Ans. a
12. Accounting system which considers assets, liabilities, revenue and expense is called______
method of accounting.
(a) British (b) American (c) Indian (d) none of them
Ans. b
P a g e | 507
13. Accounting system which considers personal account, real account and nominal account is
called _______ method of accounting.
(a) British (b) American (c) Indian (d) none of them
Ans. a
14. Recording of debits and credits of individuals, bank accounts or other business sources is
called ________ account.
(a) real (b) nominal (c) personal (d) none of them
Ans. c
15. Recording of debits and credits related to movable assets, immovable assets, inventory (stock
needed for production) is called _______account.
(a) real (b) nominal (c) personal (d) none of them
Ans. a
16. Recording of debits and credits related to income, expense, Inflow of money and outflow of
money is called _______ account.
(a) real (b) nominal (c) personal (d) none of them
Ans. b
17. _______ concept in accounting considers the business and its owner are different entities.
(a) Business entity (b) Money measurement (c) Going concern (d) Dual aspect
Ans. a
19. ______ concept in accounting considers that the business is a perpetual entity.
(a) Business entity (b) Money measurement
(c) Going concern (d) Dual aspect
Ans. c
20. ______concept in accounting considers that each debit has a corresponding credit.
(a) Business entity (b) Money measurement
(c) Going concern (d) Dual aspect
Ans. d
21. ______concept in accounting considers that only the actual cost of transaction should be
recorded (not the market value of the transaction).
(a) Cost (b) Accounting period
(c) Matching cost (d) Accrual
Ans. a
22._______ concept in accounting considers that cost of manufacture should be matched against
the proceeds of sales.
(a) Cost (b) Accounting period
(c) Matching cost (d) Accrual
Ans. c
P a g e | 508
23. _______ concept in accounting considers that an account should be closed on a periodic basis
and reopened .
(a) Cost (b) Accounting period
(c) Matching cost (d) Accrual
Ans. b
24. ______ concept in accounting considers that revenue is recorded on the date of transaction
itself but expenditure is recorded only on the date of outlow of money (not the date of transaction,
like encashing a cheque).
(a) Cost (b) Accounting period
(c) Matching cost (d) Accrual
Ans. d
25. ______ concept in accounting considers that each transaction should be supported by
evidence.
(a) Objective evidence (b) Accounting period
(c) Matching cost (d) Accrual
Ans. a
26. _______ account debits the receiver and credits the giver.
(a) personal (b) real (c) nominal (d) none of them
Ans. a
27. ______account debits the incoming asset and credits the outgoing asset.
(a) personal (b) real (c) nominal (d) none of them
Ans. b
30. _____ considers incoming money to be instantly available and reduction of cash to occur only
on the date of actual outflow of money (instead of the date of transaction).
(a) Accrual basis (b) Asset (c) Credit (d) Debit
Ans. a
40. ______ voucher transfers money from one deposit/loan account to another.
(a) Accounting (b) Inventory (c) Contra (d) none of them
Ans. c
43. Journal entries carry the name of ________ in which the transaction is to be posted.
(a) account (b) voucher (c) journal (d) ledger
Ans. d
46. A journal entry from the debit side is entered in______ side of ledger.
(a) debit (b) credit (c) centre (d) margin
Ans. a
P a g e | 510
47. A journal entry from the credit side is enteredin ______ side of ledger.
(a) debit (b) credit (c) centre (d) margin
Ans. b
48. The statement which shows the totaldebits and liabilities on the left side andcredits and assets
on the right side iscalled______ .
(a) balance sheet (b) trading account
(c) profit and loss account (d) cash account
Ans. a
49. To finalize a balance sheet _______ isprepared with the aim of making corrections.
(a) profit and loss account (b) Stock & Inventory
(c) trial balance (d) cash flow account
Ans. c
50. Balance sheet and profit & loss accountsare prepared according to schedule ________ of
Companies Act.
(a) I (b) III (c) IV (d) VI
Ans. d
51. Bank withdrawal, receipt of cash from investor, proceeds of sale, etc. are entered in_______
side of cash book.
(a) top (b) margin (c) debit (d) credit
Ans. c
52. Salary payment, rent payment, phone bill, electricity bill, etc. are entered in _______ side of
cash book.
(a) top (b) margin (c) debit (d) credit
Ans. d
55. The present cost of an asset after allowing for depreciation is called________ .
(a) asset value (b) book value (c) salvage value (d) lifespan
Ans. b
56. The amount of money obtainable through the disposal of an asset after useful lifespan is
called________.
(a) asset value (b) book value (c) salvage value (d) lifespan
Ans. c
58. At the end of every year, the book value of an asset is recorded after allowing reduction
for___.
(a) asset value (b) book value (c) salvage value (d) depreciation
Ans. d
59. The safe stock level at which placing fresh order will just allow fresh stock to reach before old
stock depletes is called______ level.
(a) stock (b) cash (c) account (d) reorder
Ans. d
60. Storing more stock than necessary for production/ sale, thus reducing cash availability is
called________ level.
(a) stock (b) overstocking (c) understocking (d) reorder
Ans. b
61. Storing very low reserve stock resulting in disruption of production/sale is called ______level.
(a) stock (b) overstocking (c) understocking (d) reorder
Ans. c
62. The difference between sales value and purchase value of a product is called______.
(a) value addition (b) rate (c) cost (d) sales
Ans. a
65. The two most common specialized fields of accounting in practice are?
a) Environmental accounting and financial accounting
b) Managerial accounting and financial accounting
c) Managerial accounting and tax accounting
d) Financial accounting and accounting systems
Ans. b
66. Which of the following user groups required the most detailed financial information?
a) Lenders
b) Investor and potential investors
c) Government agencies
d) The management
Ans. d
P a g e | 512
67. Which one of the following statement completely and correctly describes accounting?
a) Recording, classifying and summarizing economic activities in systematic way
b) Recording, classifying and summarizing all activities in useful manner
c) Accounting is the systematic process of recording social activities only
d) Recording, classifying and summarizing economic activities in informal manner
Ans. a
68. Which of the following provides information about the financial information‟s, obligations and
activities on the economic entity that is intended for use primarily by external decision makers?
a) Management accounting b) Financial accounting
c) Tax accounting d) Environmental accounting
Ans. b
72. To understand and use accounting information in making economic decisions, you must
understand?
a) The nature of economic activities that accounting information describes
b) The assumptions and measurement techniques involved in developing accounting information
c) Which information is relevant for a particular type of decision that is being made?
d) All of Above
Ans. d
73. The controller‟s responsibilities are primarily in nature, while the treasurer‟s responsibilities are
primarily related to?
a) Operational; Financial accounting
b) Accounting: Financial management
c) Financial management; Operations
d) Financial management; Accounting
Ans. b
75. Internal users of accounting information include all of the following except?
a) store manager b) Creditor c) Chief executive officer d) Chief financial officer
Ans. b
76. Accounting is an information and measurement system that does all of the following except?
a) Analyze transactions
b) Handle routine book –keeping tasks
c) Structure information
d) Recording social activities
Ans. d
77. External users of accounting information include all of the following except?
a) Investors b) Labor union c) Line manager d) General Public
Ans. c
79. Which of the following persons are most likely to use accounting information?
a) Business owners
b) Lending institutions
c) All of the above
d) None of the above
Ans. c
83. On January 1st, 2009 an entity‟s balance sheet showed total assets of Rs. 750 and liabilities of
Rs. 250. Owners‟ equity at January 1st was?
a) Rs. 750
b) Rs. 1,000
c) Rs. 500
d) Rs. 250
Ans. c
P a g e | 514
84. If the assets of a business are Rs. 100,000 and equity is Rs. 20,000, the value of liability will
be?
a) Rs. 100,000 b) Rs. 80,000 c) Rs. 120,000 d) Rs. 20,000
Ans. b
85. Which of the following is not a correct form of the Accounting Equation?
a) Assets = claims b) Assets = Liabilities + Owner Equity
c) Assets – Liabilities = Owner‟s Equity d) Assets + Owner‟s Equity = Liabilities
Ans. d
86. Find out value of receivable from following Cash Rs. 48,000 account payable Rs. 33,000 office
equipment Rs. 21,000 owner equity Rs. 77,000?
a) Rs. 21,000 b) Rs. 41,000 c) Rs. 110,000 d) Rs. 15,000
Ans. b
87. During a reporting period, a company‟s assets increase by Rs. 80,000,000. Liabilities decrease
by Rs. 20,000,000. Equity must therefore?
a) Decrease by Rs. 100,000,000
b) Increase by Rs. 100,000,000
c) Decrease by Rs. 60,00,000
d) Increase by Rs. 60,000,000
Ans. b
89. Which one of the following equations correctly expresses the relationship between assets
(A), liabilities
(L), revenues
(R), expenses
(E), and capital
(C), ?
a) A= L+ R+E + C b) A = C + L + (R-E)
c) A = C – (R-E) + L d) A = (L –C) + (R – E)
Ans. b
90. The liabilities of a business are Rs. 30,000; the capital of the proprietor is Rs. 70,000. The total
assets are?
a) Rs. 70,000 b) Rs. 30,000 c) Rs. 40,000 d) None
Ans. d
91. Which of the following account is affected from the drawings of cash in sole- proprietorship
business?
a) Shareholder b) Capital account c) Liability account d) Expense account
Ans. b
92. Mr. “A” borrowed money from bank; this transaction involves which one of the following
accounts?
a) Cash & Bank Loan
b) Bank & Debtors
c) Drawing & Cash
d) Cash & Bank
Ans. a
P a g e | 515
93. Which of the following accounts will be used in equation, if the goods are sold on credit to Mr.
Mahmood?
a) Cash account and Owner‟s equity b) Account Receivable and owner‟s equity
c) Cash and account receivable d) Account Payable and owner‟s Equity
Ans. b
96. The basic sequence in the accounting process can best be described as?
a) Transaction, journal entry, source document, ledger account, trial balance
b) Source document, transaction, ledger account, journal entry, trial balance
c) Transaction, source document, journal entry, ledger account, trial balance
d) Transaction, source document, trial balance, ledger account
Ans. c
97. Revenue is generally recognized being earned at the point of time when?
a) Cash is received b) Billed to customers
c) Production is completed d) Goods are delivered
Ans. b
99. The accounting system, in which accounting entries are made on the basis of amount having
become due for payment or receipt, is known as?
a) Cash system of accounting b) Current accounting period
c) Accrual system of accounting d) None of the given option
Ans. c
108. X sends back Rs. 80 of faulty goods to Y. In which book of prime entry would Y record this
transaction?
a) General journal b) Purchase Return journal c) Sales Journal d) Sales Return Journal
Ans. d
109. A bookkeeper discovers that an amount paid to a supplier has been wrongly entered in
another supplier‟s account. Which book of original entry will the bookkeeper use when correcting
this error?
a) Cash book b) General Journal c) Purchase day book d) Sales day book
Ans. b
111. Corrected the balance in the prepaid insurance at the end of the month in?
a) Cash payments journal
b) General journal
c) Cash Receipts journal
d) Purchases journal
Ans. b
P a g e | 517
113. If a company used special journals, purchase of supplies on account should be recorded in
which journal?
a) Cash receipts journal b) Purchases journal
c) cash disbursements journal d) General journal
114. Which of the following is the correct journal entry to record a credit note issued to a customer
for goods returned?
a) Debit sales returns and credit cash
b) Debit cash and credit sales returns
c) Debit Trade receivable and credit sales returns
d) Debit sales returns and credit trade receivables
Ans. d
116. Mr. Ali buys goods on credit from star Co. but finds that some of them are faulty. What
document would Mr. Ali return to star co. with the faulty goods?
a) Statement b) Debit note c) Sales Invoice d) Purchase invoice
Ans. b
118. If a company uses special journals, credit sales should be recorded in which journal?
a) General journal b) Purchases journal
c) Sales journal d) Cash receipts journal
Ans. c
119. If a company uses special journals, purchase of a building financed by a mortgage payable
should be recorded in which journal?
a) sales journal b) general journal c) Cash receipts journal d) purchases journal
Ans. b
#include<stdio.h>
main()
{
int x = 5;
if(x==5)
{
if(x==5) break;
printf("Hello");
}
printf("Hi");
}
A - Compile error
B - Hi
C - HelloHi
D – Hello
Ans. A
Explanation: compile error, keyword break can appear only within loop/switch statement.
printf("%d %d %d",var.x,p->x,(*p).x);
}
A-555 B - 5 5 garbage value
C-550 D - Compile error
Answer : A
Explanation: 5 5 5, the two possible ways of accessing structure elements using pointer is by
using -> (arrow operator) OR *.
Q 3 - Which of the following is used in mode string to open the file in binary mode?
A–a B–b C–B D - bin
Answer : B
Explanation: To perform unformatted data I/O a file is opened in binary mode and is represented
with the alphabet „b‟ in the mode string.
Q 5 - In C, what are the various types of real data type (floating point data type)?
A - Float, long double
B - long double, short int
C - float, double, long double
D - short int, double, long int, float
Answer : C
Explanation: There are three types of floating point data type
1) float with storage size 4 byte,
2) double with storage size 8 byte, and
3) long double with storage size 10 byte.
Q 6 - For a structure, if a variable behave as a pointer then from the given below operators which
operator can be used to access data of the structure via the variable pointer?
A-.
B-%
C - ->
D-#
Answer : C
Explanation: For a structure, Dot(.) operator can be used to access the data using normal
structure variable and arrow (->)can be used to access the data using pointer variable.
16. Which one of the following is a loop construct that will always be executed once?
a) for
b) while
c) switch
d) do while
Ans. D
20) Which of the following will copy the null-terminated string that is in array src into array dest?
a) dest = src;
b) dest == src;
c) strcpy(dest, src);
d) strcpy(src, dest);
Ans. C
P a g e | 522
23. What will the result of num variable after execution of the following statements?
int num = 58;
num % = 11;
a) 3
b) 5
c) 8
d) 11
Ans. A
Explanation: num % = 11
num = num % 11
num = 58 % 11
num = 3
25. Which of the following SLT template class is a container adaptor class?
a) Stack
b) List
c) Deque
d) Vector
Ans. A
27. The following statements are about EOF. Which of them is true?
a) Its value is defined within stdio.h
b) Its value is implementation dependent
c) Its value can be negative
d) Its value should not equal the integer equivalent of any character
d) All of these
Ans. D
28. For 16-bit compiler allowable range for integer constants is ______?
a) -3.4e38 to 3.4e38 b) -32767 to 32767
c) -32668 to 32668 d) -32768 to 32768
Ans. D
29. C programs are converted into machine language with the help of
a) An Editor
b) A compiler
c) An operating system
d) None of these
Ans. B
33. What is the correct value to return to the operating system upon the successful completion of a
program?
a) 1
b) -1
c) 0
d) Program do not return value
Ans. C
37. “My salary was increased by 15%” select the statement, which will EXACTLY reproduce the
line of text above.
a) printf(“My salary was increased by 15/%!”);
b) printf(“My salary was increased by 15%!”);
c) printf(“My salary was increased by 15‟%!”);
d) printf(“My salary was increased by 15%%!”);
Ans. D
42. If the two strings are identical, then strcmp() function returns
a) 1 b) 0 c) -1 d) true
Ans. B
P a g e | 525
43. The library function used to find the last occurrence of a character in a string is
a) laststr() b) strstr()
c) strnstr() d) strrchr()
Ans. D
44. Which of the following function is used to find the first occurrence of a given string in another
string?
a) strchr() b) strrchr()
c) strstr() d) strnset()
Ans. C
45. Which of the following function is more appropriate for reading in a multi-word string?
a) scanf()
b) gets()
c) printf()
d) puts()
Ans. B
46. Which of the following correctly accessed the seventh element stored in arr, an array with 100
elements?
a) arr[6]
b) arr[7]
c) arr{6}
d) arr{7}
Ans. A
47. What is the return value of the following statement if it is placed in C program?
Strcmp(“ABC”,”ABC”);
a) 33
b) -1
c) 1
d) 0
Ans. D
49. The function sprintf() works like printf(), but operates on ____
a) Data file
b) stderr
c) string
d) stdin
Ans. C
P a g e | 526
51. In C programming language, which of the following type of operators have the highest
precedence
a) Relational operators
b) Equality operators
c) Logical operators
d) Arithmetic operators
Ans. D
52. Which of the following comments about the ++ operator are correct?
a) It is a unary operator
b) The operand can come before or after the operator
c) It cannot be applied to an expression
d) It associates from the right
e) All of the above
Ans. D
54. Which operator from the following has the lowest priority ?
a) Assignment operator
b) Division operator
c) Comma operator
d) Conditional operator
Ans. C
55. Which command is used to skip the rest of a loop and carry on from the top of the loop again?
a) break
b) resume
c) continue
d) skip
Ans. C
56. The type of the controlling expression of a switch statement cannot be of the type ___
a) int
b) char
c) short
d) float
Ans. D
P a g e | 527
57. What will happen after compiling and running following code?
Main()
{
Printf( “%p”, main);
}
a) error b) will make an infinite loop
c) Some address will be printed d) None of these
Ans. C
67. When a function is recursively called all the automatic variables are stored in a ____
a) Stack
b) Queue
c) Array
d) Linked list
Ans. A
71. The operator > and < are meaningful when used with pointers, if
a) The pointers point to data of similar type
b) The pointers point to structure of similar data type
c) The pointers point to element of the same array.
d) None of these
Ans. C
P a g e | 529
74. Which of the following is the correct way of declaring a float pointer:
a) float ptr;
b) float *ptr;
c) *float ptr;
d) None of the above
Ans. B
75. What is the base data type of a pointer variable by which the memory would be allocated to it?
a) int
b) float
c) No data type
d) Depends upon the type of the variable to which it is pointing
e) unsigned int
Ans. E
76. C pre-processor
a) Takes care of conditional compilation
b) Takes care of macros
c) Takes care of include files
d) Acts before compilation
e) All of the above
Ans. E
78. In which stage the following code #include<stdio.h> gets replaced by the contents of the file
stdio.h
a) during Pre processing b) During execution
c) During linking d) During editing
Ans. A
P a g e | 530
84. What are the new features of C11 or ISO IEC 9899 2011 standard?
a) Type generic Macros, Static Assertions
b) Multi Threading, Anonymous Unions, quick exit
c) Bounds Checking Interfaces, Anonymous Structures
d) All of these
Ans. D
89. What is the number of characters used to distinguish identifier or names of functions and
global variables?
a) 31
b) 32
c) 33
d) 28
Ans. A
Explanation: First 31 characters in general. If first 31 characters are same for two different
identifiers, compiler gets confused.
90. What is length of an identifier that is unique for Non Global variables and Non Function
Names?
a) 32
b) 63
c) 64
d) 68
Ans. B
102. Sizes of short, int and long in a Turbo C C++ compiler in bytes are
a) 2, 2, 4 b) 2, 4, 4
c) 4, 8, 16 d) 8, 8, 16
Ans. A
103. Sizes of short, int and long in Visual Studio or GCC compiler in bytes are
a) 2, 2, 4
b) 2, 4, 4
c) 4, 4, 8
d) 4, 8, 8
Ans. B
Explanation: Yes, Even if you do not specify a storage class for a variable, AUTOMATIC storage
class is applied.
110. A register variable is stored in a Register. Where does a Register Present in a Computer?
a) RAM
b) ROM
c) CPU
d) DMA
Ans. C
111. Variables of type auto, static and extern are all stored in
a) ROM
b) RAM
c) CPU
d) Compiler
Ans. B
120. Output of an arithmetic expression with integers and real numbers is ___ by default.
a) Integer
b) Real number
c) Depends on the numbers used in the expression.
d) None of the above
Ans. B
P a g e | 536
Explanation: Any arithmetic operation with both integers and real numbers yield output as Real
number only.
5 + 10.56 = 15.560000 which is a real number
123. If both numerator and denominator of a division operation in C language are integers, then
we get
a) Expected algebraic real value b) Unexpected integer value
c) Compiler error d) None of the above
Ans. B
Explanation:
int a=5/2 stores only 2
130. What is the way to suddenly come out of or quit any loop in C language?
a) continue; statement
b) break; statement
c) leave; statement
d) quit; statement
Ans. B
141. What is the maximum number of statements that can present in a C function?
a) 64
b) 128
c) 256
d) None of the above
Ans. D
Explanation: There is no limit on the number of statements that can present in a C Function
146. What is the default return value of a C function if not specified explicitly?
a) -1 b) 0 c) 1 d) None of the above
Ans. C
147. What are the data type of variables that can be returned by a C Function?
a) int, float, double, char
b) struct, enum
c) Pointers to variables, arrays, functions, struct variables, enum variables etc
d) All the above
Ans. D
148. A recursive function without if and else condition will always lead to
a) Finite loop
b) Infinite loop
c) Incorrect result
d) Correct result
Ans. B
149. What is the C keyword that must be used to achieve expected result using Recursion?
a) printf
b) scanf
c) void
d) return
Ans. D
154. What happens when you try to access an array variable outside its size?
a) Compiler error is thrown
b) 0 value will be returned
c) 1 value will be returned
d) Some garbage value will be returned
Ans. D
156. If an integer array pointer is incremented, how many bytes will be skipped to reach next
element location?
a) 1
b) 2
c) 8
d) None of the above
Ans. B
157. What is the function used to allocate memory to an array at run time with zero initial value to
each?
a) calloc( )
b) malloc( )
c) palloc( )
d) kalloc( )
Ans. A
P a g e | 541
158. What is the function used to allocate memory to an array at run time without initializing array
elements?
a) calloc( )
b) malloc( )
c) palloc( )
d) kalloc( )
Ans. B
161. What is the format specifier used to print a string or character array in C printf or scanf
function?
a) %c
b) %C
c) %s
d) %w
Ans. C
182. How do you safeguard your .c file code from copying by outside developers or world?
a) Encrypt a C file and share
b) Obfuscate a C file and share
c) Scramble a C file and share
d) Convert to Exe and share
Ans. D
185. In Turbo C, Search path of directories for #include is mentioned under the option
a) Include Directories
b) Exclude Directories
c) Add Directories
d) Extra Directories
Ans. A
187. What is the C Pragma directive or command to execute a particular function at startup of
program?
a) #pragma start function1 b) #pragma statup function1
c) #pragma startnow function1 d) #pragma startup function1
Ans. B
197. Expanded source code is the output of which C Program building process?
a) Preprocessor
b) Assembler
c) Linker
d) Compiler
Ans. A
199. Where is a file temporarily stored before read or write operation in C language?
a) Notepad
b) RAM
c) Hard disk
d) Buffer
Ans. D
Explanation: Yes, A Buffer is like an empty Bucket that is filled with information so that direct read
write operation on hard disk is avoided for better performance.
205. What is the Bitwise operator used to set a particular bit value to 1 ?
a) & AND
b) | OR
c) ^ Exclusive OR
d) ~ Operator
Ans. B
206. What is the bitwise operator used to set a particular bit to zero 0 ?
a) & AND
b) | OR
c) ^ Exclusive OR
d) ~ Operator
Ans. A
210. What is the minimum and maximum value in Octal Number System?
a) 1 to 8
b) 0 to 7
c) 2 to 9
d) None of the above
Ans. b
224. Which compilation unit is responsible for adding header files content in the source code?
a) Linker
b) Compiler
c) Assembler
d) Preprocessor
Ans. D
228. Numbers are stored and transmitted inside a computer in which format?
a) binary form
b) ASCII code form
c) decimal form
d) alphanumeric form
Ans. A
CD MCQ
1. Which technology is used in Compact Disks?
a) Electro Magnetic
b) Laser
c) Mechanical
d) Electrical
Ans. b
2. What is CD means?
a) Compact disk
b) Common disk
c) Cassette disk
d) Compact drive
Ans. a
5. Standard CDs have a diameter of _______and can hold up to about 1 hour and 20 minutes of
uncompressed audio.
a) 120 millimetres (4.7 in)
b) 150 mm
c) 180 mm
d) 200 mm
Ans. a
Computer Architecture
2. The load instruction is mostly used to designate a transfer from memory to a processor register known as [IBPS PO
2012]
a) accumulator
b) instruction register
c) program counter
d) memory address register
Ans. A
4. Arithmetic logic unit and control sections have special purpose locations called [SBI Clerk 2012]
a) registers
b) RAM
c) BIOS
d) I/O
Ans. A
6.The word ‘computer’ usually refers to the central processing unit plus
a) external memory
b) internal memory
c) input devices
d) output devices
Ans. A
10. A group of bits that tells the computer to perform a specific operation is known as
a) instruction code
b) micro operation
c) accumulator
d) register
Ans. A
12. Memory unit that communicates directly with the CPU is called the
a) main memory
b) secondary memory
c) auxilary memory
d) register
Ans. D
15. When machine instrucitons are being executed by a computer the instruction phase followed by the execution
phase is referred to as
a) program cycle b) machine instruction
c) instruction cycle d) task cycle
Ans. C
P a g e | 555
16. Which computer memory is used for storing programs and data currently being processed by the CPU?
a) Mass memory
b) Internal memory
c) Non-Volatile memory
d) PROM
Ans. B
27. Pick the one that is used for logical operations or Comparisons such as less than, equal to or greater than.
a) ALU
b) CU
c) Input unit
d) MU
Ans. A
28. The ____ is responsible for performing calculations and contains decision-making mechanisms.
a) CPU b) MU c) ALU d) CU
Ans. C
30. Which of the following memory chips is programmed during the manufacturing process?
a) RAM
b) ROM
c) PROM
d) EEPROM
Ans. B
31. Which of the following components is the most essential for the computer system to work?
a) Input system
b) Output system
c) Storage system
d) Monitor
e) CPU
Ans. E
P a g e | 557
32. A(n) ___ device is any device that provides information, which is sent to the CPU.
a) Input
b) output
c) CPU
d) memory
Ans. A
36. ALU is
a) Access Logic unit
b) Array logic unit
c) Application logic unit
d) Arithmetic logic unit
Ans. D
P a g e | 558
Computer Awareness
1. Which Microsoft-based technology was built to link desktop applications to the World Wide Web?
[A] Active Channel
[B] Active Desktop
[C] ActiveX
[D] None of the above
Correct Answer: C [ActiveX]
Explanation: ActiveX is a software framework created by Microsoft that adapts its earlier Component
Object Model (COM) and Object Linking and Embedding (OLE) technologies for content downloaded from a
network, particularly from the World Wide Web. It is used till IE11 but not Microsoft Edge.
2. Which among the following is the most common source of Viruses to the hard disk of your computer?
[A] Incoming Email
[B] Outgoing Email
[C] CD ROMs
[D] Websites
Ans. a
3. Symantec is the maker of which among the following popular antivirus software?
[A] Norton
[B] BitDefender
[C] Avast
[D] McAfee VirusScan
Ans. a
Explanation: Symantec is an American consumer software company now known as NortonLifeLock. It is the
make of famous software Norton.
10. As a person working in internet banking environment, why you should be aware of the “Dictionary
attack”?
[A] It is used to inject worms or viruses in the system
[B] It is used to determine a password
*C+ It is used to access customer’s account by determining other details
[D] It is used for stealing info from the Credit Card
Ans. b
13. Which of the following is a single integrated circuit on which a CPUs are typically constructed?
[A] Microprocessor
[B] Memory
[C] Motherboard
[D] Hard Disk
Ans. a
16. Where are the instructions which are used to run a digital computer stored?
[A] Motherboard
[B] Hard Disk
[C] Memory
[D] All of the above
Ans. c
18. A device which is not connected to the CPU is known as which of the following?
[A] Land-line device
[B] On-line device
[C] Off-line device
[D] Device
Ans. c
20. Monitors, printers, disk drives, keyboard, mouse are included in which of the following categories?
[A] Storage Device
[B] Hardware
[C] Software
[D] All of the Above
Ans. b
21. What is the use of the wheel located between the two standard buttons on a mouse ?
[A] To click on web pages
[B] To click and select items
[C] To shutdown
[D] To scroll
Ans. d
22. Which type of failure occurs because of input device that does not read data correctly ?
[A] input error
[B] output error
[C] read error
[D] write error
Ans. c
23. Document reader and a light pen are classical examples of Which of the following?
[A] Reading devices
[B] Light devices
[C] Input devices
[D] Digital devices
Ans. c
25. Which of the following is the ability of a system to jump directly to the requested data?
[A] Sequential Access
[B] Random Access
[C] Quick Access
[D] All of the Above
Ans. b
26. The smallest unit in which data can be stored is known by which of the following names?
[A] Bit
[B] Byte
[C] Kilobyte
[D] Megabyte
Ans. a
27. Which of the following is the name given to the number of concentric circles on a diskette?
[A] Sectors
[B] Cylinders
[C] Tracks
[D] Clusters
Ans. c
29. Which of the following acts specifically exempts computer-maintenance activities, so copies of
copyright files may be made in the course of maintenance provided that they are destroyed afterwards?
[A] The infringement act
[B] The Digital Millennium Copyright Act
[C] Intellectual Property Rights Act
[D] All of the Above
Ans. b
Explanation: The Digital Millennium Copyright Act leaves computer-maintenance activities. The copies of
copyright files may be made in the course of maintenance provided and they are destroyed afterwards.
30. The copies of data or program files are always stored as a safety. Which of the following is the name
given to these copies?
[A] Backups [B] Programs [C] Extras [D] Stores
Ans. a
Explanation: Universal Disk Format (UDF) is a file system for computer data storage for a broad range of
media. UDF is developed and maintained by the Optical Storage Technology Association (OSTA).
32. Which of the following is the another name given to the LCD display?
[A] LED
[B] TFT
[C] CRT
[D] All of the Above
Ans. b
Explanation: A thin-film-transistor or TFT is a variant of a liquid-crystal display (LCD) that uses thin-film-
transistor (TFT) technology to improve image qualities such as addressability and contrast.
33. Which of the following are the hardware components of the computer system?
[A] Graphic Card
[B] CPU
[C] Keyboard
[D] All of the Above
Ans. d
34. Which of the following are the software analysis and design tools?
[A] Data Flow Diagrams
[B] ER Diagrams
[C] HIPO Diagrams
[D] All of the Above
Ans. d
35. Which of the following graphs tell us the correct and appropriate way to determine the deadlock
situation occurrence?
[A] Starvation Graph
[B] Resource Allocation Graph
[C] Inversion Graph
[D] All of the Above
Ans. b
37. What is the name given to any software that is included with a new computer, hardware, or other
software program?
[A] Bundled Software [B] Pre-installed Software
[C] Both a and b [D] Free Software
Ans. c
P a g e | 564
2. Identify the device through which data and instructions are entered into a computer?
a) Software
b) Output device
c) Input device
d) Heetson
Ans. c
12. In Power Point, the Header & Footer button can be found on the insert tab in what group?
a) Illustrations group
b) Object group
c) Text group
d) Tables group
Ans. c
15. Which of the following are components of central processing unit (CPU)?
a) Arithmetic Logic unit, Mouse
b) Arithmetic Logic unit, Control unit
c) Arithmetic logic unit, Integrated circuits
d) Control unit, Heetson
Ans. b
16. What is the name of a device that converts digital signals to analog signals?
a) Router b) Switch c) Modem d) None of these
Ans. c
P a g e | 567
22. Technology used to provide internet by transmitting data over wires of telephone network is?
a) Transmitter b) Diodes
c) Heetson ṇd) DSL
Ans. d
34. Which among the following is commonly used language in Android applications?
a) C
b) php
c) C ++
d) Java
Ans. d
40. Which program is run by BIOS to check hardware components are working properly while
computer is turned on?
a) DMOS b) POST
c) CMOS d) RIP
Ans. b
P a g e | 570
54. An electronic path, that sends signals form one part of computer to another is ?
a) Logic Gate
b) Modem
c) Bus
d) Serial Port
Ans. c
56. Which device among following is used for sending digital data over a phone line?
a) USB
b) Scanner
c) Printer
d) Modem
Ans. d
78. Which among following is responsible for specifying address of a memory location?
a) RAM
b) Address Bus
c) Control Bus
d) Hard Disk
Ans. b
79. Which among the following is responsible for finding and loading operating system into RAM?
a) Bootstrap loader b) CMOS
c) BIOS d) DMOS
Ans. a
11. We can only see and can‟t touch of computer parts are called _____
a) hardware b) software
c) both a and b d) none of these
Ans. B
P a g e | 577
49. An ________ is the translation of high level language into machine languge.
Ans. Object Program
105. _____ was originally designed to replace Grammatically incorrect words as you type.
Ans. Auto Correct
114. _____ is part of the laser printer should not be exposed to sunlight.
Ans. PC Drum
116. _________is designed to provide information needed for effective decision making by
managers.
a) mis b) information portel c) chart d) programming language
Ans. a
117. ________refers to the role people play in technology and the development of hardware or
software.
a) Firmware b) Peopleware c) company employee d) group of people
Ans. b
119. An error in softwareor hardware is called bug. What is the alternative computer jargon for it?
a) virus b) Glitch c) Bug d) Crash
Ans. b
121. The system unit of a Personal computer typically contains all of the following except:
a) microprocessor b)Disk controller c) Serial interface d) Modem
Ans. d
122. A program that convert instructions into a machine code or lower level form so that they can
be read and executed by a computer is called_________.
a) Compiler b) Assembler c) Language converter d) interpreter
Ans. a
123. ______is a computer program that directly executes instructions written in a programming or
scripting language, without requiring them previously to have been compiled into a machine
language program.
a) Compiler b) Assembler c) Language converter d) interpreter
Ans. d
128. The language translator which translate low level language into machine language is called
Ans. Assembler
129. The term __________device designates equipment that might be added to a computer
system to enhance its functionality.
a) input b) output c) peripheral d) external
Ans. c
133. _________store data or information temporarily and pass it on as directed by the control unit.
a) RAM b) ROM c) Register d) Cache
Ans. c
134. A ________is an additional set of commands that the computer displays after you make a
selection from the main menu.
a) Dialog box b) Command set c) Shortcut menu d) Quick access toolbar
Ans. a
135. Servers are computers that provide resources to other computers connected to a _______.
a) super computer b) mainframe computer c) mini computer d) client computer
Ans. b
136. When creating a computer program, the_________ designs the structure of the program.
a) System Analyst b) Compute programmer c) Computer designer d) Programmer
Ans. a
137. Computer Process data into info. By working exclusively with _________
a) Codes b) Numbers
c) Programming language d) Processing language
Ans. b
P a g e | 588
139. Computer manipulates data in many ways, and this manipulation is called ________.
a) working b) processing c) executing d) booting
Ans. c
140. Where does most data go first with in a computer memory hierarchy?
a) RAM b) ROM c) Hard Disk d) Disk drive
Ans. a
141. The ______ data mining technique derives rules from real- world case examples.
a) memory process b) neural nets c) neuro system d) memory hierarchy
Ans. b
142. The data burned on a ____ cannot be changed, but it can be erased.
a) CD-RW b) USB c) Hard disk d) ROM
Ans. a
145. _________ is the process of dividing the disk into tracks and sectors.
a) Burning b) Loading c) Filling d) Formatting
Ans. d
147. The technology that stores only the essential instructions on a microprocessor chip and thus
enhances its speed is referred to as_______.
a) Burning b) Loading c) RAID d) RISC
Ans. d
149. Which part of the computer is directly involved in executing the instructions of the computer
program.
a) hard disk b) Processor c) control unit d) memory unit
Ans. b
150. _______file contains permanent data and gets updated during the processing of transactions.
a) Master b) Reboot c) Main d) Boot
Ans. a
P a g e | 589
153. The common name for the crime of stealing password is ______.
a) Spooling b) Spoofing c) Phishing d) Vishing
Ans. b
156. _______is an Application Program that gathers user information and sends it to Someone
through the internet.
a) Spygot b) Spybot c) Spooler d) Boolean
Ans. b
164. A program that perform a useful task while simultaneously allowing destructive acts is a
______.
a) Trojan software b) Malware c) Utility software d) Verified application
Ans. a
168. Dark avenger, kilo fillip, c-brain, bloody, change mungu and desyare example of ______.
a) virus b) software c) device d) online software
Ans. a
170. _______is a program that converts assembly language into machine code
a) Assembler b) machine learning c) compiler d) interpreter
Ans. a
173. ________printer print image on area which selectively heating coated thermochromic paper
or thermal paper. The coating turns black in the area where it is heated, producing an image.
a) Daisy wheel b) Canon c) Thermal d) inkjet
Ans. c
181. Part number, description and number of parts ordered are example of.
a) arrangement b) processing c) controlling d) adjustment
Ans. b
195. _______device that can be either in one of the two possible states such as on or off, pulse or
no pulse, 0 or 1. example:- Transistor, Flip flop
a) Input device b) Bistable device c) output device d) flip device
Ans. b
198. _______ is located at the lower right corner of the ribbon in MS Word.
Ans. Dialog box launcher
199. Arch rivals IBM and Apple Computers Inc. Decided to join hands in ______.
Ans. 1991
213. A computer that is old and perhaps not satisfactory is referred to as a______ system.
Ans. Legacy
214. Large transaction Processing systems in automated organizations use ____ Processing.
Ans. Batch
226. A light sensitive device that converts drawing, printed text or other images into digital form is
a) keyboard b) Plotter c) Scanner d) OMR
Ans. c
229. In order to tell excel that we are entering a formula in cell, we must begin with an operator
such as
a) $ b) @ c) + d) =
Ans. d
Computer Operations
1. Which software is not an file compression utility?
a) 7-zip
b) Win Rar
c) Win Zip
d) Compres
Ans. d
3. How can we bring “My Computer” icon on the desktop if it is not there?
a) From Wallpaper
b) From Settings
c) From Display Properties
d) From Explorer
Ans. c
6. Which software can be used for giving presentation (e.g. product demo)?
a) MS word
b) MS Excel
c) MS PowerPoint
d) MS Access
Ans. c
12. Which one can be used for creating a document (e.g. Annual Report)?
a) MS Excel b) MS Word c) MS PowerPoint d) MS Windows
Ans. b
13. When you write html file and save in Notepad but the file did not get icon of any browser. What’s the
problem here
a) You shouldn’t write HTML in Notepad
b) You need to write html file in browser for the file to get browser’s icon
c) The file extension is set to .htm/.html while saving
d) None of above
Ans. c
Computer Organization
1. The ____ performs simple mathematics for the CPU.
(a) ALU (b) DIMM (c) BUS (d) Register (e) None of these
Ans. a
5. The first computer architecture was introduced in [Allahabad Bank Clerk 2010]
(a) 1970 (b) 1968 (c) 1971 (d) 1973 (e) 1972
Ans. a
8. The microprocessor is the brain of the computer and is also called a [Allahabad Bank PO 2011]
(a) microchip (b) macrochip (c) macroprocessor(d) calculator (e) None of these
Ans. a
9. A microprocessor with 12 address lines is capable of addressing [LIC Assistant Officer 2009]
(a) 1024 location (c) 4096 location (b) 2048 location (d) 64 location
Ans. c
10. The first microprocessor produced by Intel Corp and Texas instruments were used primarily to control
(a) calculators (b) cars (c) remotes (d) robotics (e) grinders
Ans. a
P a g e | 598
12. Which of the following is a small microprocessor-based computer designed to be used by one person at
a time. [SBI Clerk 2014]
(a) netbook (b) super computer (c) all-in-one (d) notebook (e) personal computer
Ans. e
13. The CPU, also called the ____ when talking about PCs does the vast majority of the processing for a
computer. [Corporation Bank PO 2011]
(a) Macroprocessor (b) RAM (c) Memory System (d) Microprocessor (e) None of the above
Ans. d
15. ____ is defined as the science of selecting and interconnecting hardware components to create
computers that meets functional, performance and cost goals. [Allahabad Bank Clerk 2008]
(a) Computer (b) Calculator (c) Calculating machine (d) Computer architecture (e) None of these
Ans. d
17. Which of the following(s) is/are the basic function(s) performed by computer?
(a) data control (b) data storage (c) data processing (d) data movement (e) All of these
Ans. e
18. Computers that control processes and accept data in a continuous [IBPS PO 2012]
(a) data traffic pattern (b) data highway (c) infinite loop (d) feedback loop (e) None of these
Ans. d
19. The system unit of a personal computer typically contains all of the following except ____.
(a) microprocessor (b) modem (c) motherboard (d) monitor (e) RAM
Ans. b
22. The CPU comprises of Control unit, Memory and ____ unit. [SBI PO 2013]
(a) Microprocessor (b) Arithmetic/Logic (c) Input (d) Output (e) None of the above
Ans. b
26. A computer cannot perform which of the following functions? [SBI Clerk 2012]
(a) Addition (b) Subtraction (c) Bake a cake (d) Division
Ans. c
27. Which are used to overcome the difference in data transfer speeds of various devices?
(a) Buffer registers (b) Speed enhancing circuitry (c) Bridge circuits (d) Multiple buses (e) None of the above
Ans. a
28. The hardware in which data may be stored for a computer system is called [IBPS PO 2012]
(a) registers (b) bus (c) control unit (d) memory (e) chip
Ans. d
29. Which of the following is the main circuit board of the system unit?
(a) graphics board (b) motherboard (c) sound board (d) control unit
Ans. b
32. ____ registers holds the information before it goes to the decoder.
(a) Control register (b) Bus register (c) Data register (d) Address register (e) None of these
Ans. c
34. Data processing cycle contains [BOB PO 2009, UCO Bank PO 2011]
(a) input cycle and output cycle
(b) input cycle, output cycle and processing cycle
(c) output cycle and processing cycle
(d) data mining and refining cycle
(e) None of the above
Ans. b
36. The CPU speed of a mini computer is approximately ____ kilo instructions per second (KIPS).
(a) 500 (b) 550 (c) 600 (d) 1250 (e) 1380
Ans. a
37. From which of the followings the performance of CPU can be measured?
(a) Clock Speed (b) IPC (c) DPI (d) Access Time (e) Video resolution
Ans. a
38. Transformation of input into output is performed by [SBI Associates Clerk 2008]
(a) peripherals
(b) memory
(c) storage
(d) input-output unit
(e) CPU
Ans. e
39. The clock rate of a processor is measured in [SBI PO 2011; Allahabad Bank Clerk 2010]
(a) Milliseconds
(b) Microhertz
(c) Megabytes or Gigabytes
(d) Nanoseconds
(e) Megahertz or Gigahertz
Ans. e
41. The central processing unit is an example of [SBI Associates Clerk 2012]
(a) peripheral
(b) an output unit
(c) software
(d) a program
(e) hardware
Ans. e
42. Fan housing is used for the purpose of [PNB Clerk 2008]
(a) cooling the CPU
(b) cooling the monitor
(c) cooling the UPS
(d) cooling the software
(e) None of the above
Ans. a
43. All the logic and mathematical calculations done by the computer happen in/on the
[Allahabad Bank PO 2011]
(a) system board (b) central control unit (c) central processing unit (d) motherboard (e) memory
Ans. c
44. ____ are used to quickly accept, store and transfer data and instructions that are being used
immediately by the CPU.
(a) Registers (b) Caches (c) RAMs (d) Graphics (e) None of these
Ans. a
45. The ALU of a computer responds to the commands coming from ____.
(a) control section (b) primary memory (c) external memory(d) internal memory (e) None of these
Ans. a
46. Which part of the computer is used for calculating and comparing? [IBPS PO 2012]
(a) ALU (b) Control unit (c) Disk unit (d) Modem (e) None of these
Ans. a
48. The comparison of data inside the arithmetic logic unit is referred to as a ____.
(a) logarithmic instruction (b) data flow (c) logical operation (d) combinational operation
Ans. c
49. ____ is/are the responsibility(is) of the logical unit in the CPU of a computer.
(a) To compare data (b) To predict output (c) To control information (d) To save work (e) All of the above
Ans. a
P a g e | 602
51. ____ is responsible for coordinating various operations using timing signals.
(a) Control unit (b) Arithmetic logic unit (c) Memory unit (d) Input/Output unit
Ans. a
52. Which of the following manages computer resources? [SBI Assistant and Stenographer Clerk 2012]
(a) ALU (b) BUS (c) Control unit (d) I/O unit (e) Secondary memory
Ans. c
53. A temporary storage area, attached to the CPU, for I/O operations is a ____.
(a) buffer (b) chip (c) register (d) core (e) cache
Ans. a
54. What is a set of information that defines the status of resources allocated to a process?
(a) arithmetic center (b) process control (c) register unit (d) processing unit (e) None of these
Ans. b
56. Front-end processor is a ____ designed specifically to handle the communication processing task.
[Allahabad Bank PO 2010]
(a) ALU (b) control unit (c) CPU (d) register (e) None of these
Ans. c
58. An uniform interval of CPU time allocated for use in performing a task is known as [SBI PO 2012]
(a) real time (b) seek time (c) down time (d) time slice (e) None of these
Ans. d
59. This component is required to process data into information and consists of integrated circuits
[SBI Clerk 2011]
(a) Hard disks (b) RAM (c) CPU (d) ROM (e) None of these
Ans. c
60. Different components on the motherboard of a PC unit are linked together by sets of parallel electrical
conducting lines. What are these line? [IBPS PO 2012]
(a) Conductors
(b) Buses
(c) Connectors
(d) Consecutives
Ans. b
P a g e | 603
62. The part of the CPU that access and decode program instructions and coordinates the flow of data
among various system components is the [Corporation Bank PO 2011]
(a) ALU (b) control unit (c) megahertz (d) motherboard (e) None of these
Ans. b
63. A group of wires running parallel to each other in between two connected computer parts and which
transfers information is called a [IBPS PO 2012; Allahabad Bank PO 2011]
(a) track (b) bus (c) cable (d) bundle (e) None of these
Ans. b
65. The ALU makes use of ____ to store the intermediate results. [SBI Clerk 2010]
(a) accumulators (b) heap (c) None of these (d) registers (e) stack
Ans. a
68. Which unit controls the movements of signals between CPU and I/O? [IBPS Clerk 2012]
(a) ALU (b) Control unit (c) Memory unit (d) Secondary storage (e) None of these
Ans. b
70. A group of signal lines used to transmit data in parallel from one element of a computer to another is
(a) control bus (b) data bus (c) address bus (d) network
Ans. b
71. The name of the location of a particular piece of data is its [SBI Clerk 2009]
(a) address (b) memory name (c) storage (d) data location (e) None of these
Ans. a
P a g e | 604
2. If you are allowing a person on the network based on the credentials to maintain the security of your network,
then this act refers to the process of [IBPS PO 2016]
(1) Authentication (2) Automation (3) Firewall (4) Encryption (5) None of these
Ans. 1
4. A malware is an
(1) program (2) hardware (3) a person (4) None of these
Ans. 1
5. It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable
code or documents.
(1) Keylogger (2) Worm (3) Virus (4) Cracker
Ans. 3
6. A computer virus is
(1) deliberately created (2) created accidently (3) produced as result of some program error (4) All of the above
Ans. 1
7. Which of the following refers to dangerous programs that can be ‘caught’ of opening E-mail attachments and
downloading software from the Internet? [SBI PO 2014]
(1) Utility (2) Virus (3) Honey Pot (4) Spam (5) App
Ans. 2
8. A program designed to destroy data on your computer which can travel to ‘infect’ other computers is called a
[RBI Grade B 2012]
(1) disease (2) torpedo (3) hurricane (4) virus (5) infector
Ans. 4
10. Which among the following is related to the internet and mail?
(1) Boot-UP (2) Magnetic Tapes (3) Applications Software (4) Paging (5) Virus
Ans. 5
13. Which of the following is the type of software that has self-replicating software that causes damage to files and
system? (1) Viruses (2) Trojan horses (3) Bots (4) Worms
Ans. 4
14. Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not
create copies of itself on one system it propagates through computer networks.
(1) Keylogger (2) Worm (3) Cracker (4) None of these
Ans. 2
15. A worm
(1) can automatically move in network (2) can only be transferred with human intervention (3) worms are harmless
(4) None of the above
Ans. 1
16. Worm is a program that infects computer and spreads by inserting copies of itself into other executable code or
documents.
(1) Self attach (2) Self-replicating (3) Non-self-replicating (4) Hacking
Ans. 2
17. A computer virus normally attaches itself to another computer program known as a [IBPS PO 2015]
(1) host program (2) target program (3) backdoor program (4) bluetooth (5) trojan horse
Ans. 5
18. These are program designed as to seem to being or be doing one thing, but actually being or doing another.
(1) Trojan horses (2) Keylogger (3) Worm (4) Cracker
Ans. 1
19. Viruses that fool a user into downloading and/or executing them by pretending to be useful applications are also
sometimes called
(1) Trojan horses (2) Keylogger (3) Worm (4) Cracker
Ans. 1
22. It is a situation in which one person or program successfully masquerades as another by falsifying data and
thereby gaining illegitimate access.
(1) Sspoofing attack (2) Vulnerability scanner (3) Packet sniffer (4) Rootkit
Ans. 1
23. Attempt to gain unauthorised access to a user’s system or information by pretending to be the user?
[IBPS RRB PO 2018]
(1) Spoofing (2) Hacker (3) Cracker (4) Phishing (5) None of these
Ans. 1
24. Which of the following enables to determine how often a user visited a Website? [IBPS Clerk 2014] (1) Hacker (2)
Spammer (3) Phish (4) Identify theft (5) Cookie
Ans. 1
P a g e | 606
25. A person who uses his or her expertise to gain access to other people computers to get information illegally or do
damage is a [Allahabad Bank PO 2011]
(1) spammer (2) hacker (3) instant messenger (4) All of these (5) None of these
Ans. 2
26. Hackers
(1) all have the same motive
(2) are another name of users
(3) many legally break into computer as long as they do not do any damage
(4) are people who are allergic to computers
(5) break into other people’s computer
Ans. 5
27. What is a person called who uses a computer to cause harm to people or destroy critical systems? [IBPS Clerk
2014] (1) Cyber Terrorist (2) Black-hat-Hacker (3) Cyber Cracker (4) Hacktivist (5) Other than those given as options
Ans. 3
28. An act of sending e-mails or creating webpages that are designed to collect and individual’s online bank, credit
card or other login information?
(1) Phishing (2) Spam (3) Hacking (4) Cracking
Ans. 1
29. ......... are attempts by individuals to obtain confidential information from you by falsifying their identity.
[IBPS PO 2011, IBPS Clerk 2013]
(1) Phishing trips (2) Computer viruses (3) Spyware scams (4) Viruses (5) Phishing scams
Ans. 1
30. Which of the following is a criminal activity attempting to acquire sensitive information such as passwords, credit
cards, debits by masquerading as a trustworthy person or business in an electronic communication? [IBPS Clerk
2010]
(1) Spoofing (2) Phishing (3) Stalking (4) Hacking (5) None of these
Ans. 2
31. All of the following are examples of real-security and privacy risks except [SBI PO 2011, IBPS Clerk 2014]
(1) hackers (2) spam (3) viruses (4) identify theft (5) None of these
Ans. 2
33. ……… is a type of electronic spam where unsolicited messages are sent by e-mail.
(1) Trash mail
(2) Cram mail
(3) Draft mail
(4) Spam mail
Ans. 4
35. It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a
set of programs which work to subvert control of an operating system from its legitimate (in accordance with
established rules) operators.
(1) Rootkit (2) Keylogger (3) Worm (4) Cracker
Ans. 1
37. It is a tool used to quickly check computers on a network for known weaknesses.
(1) Security exploit (2) Vulnerability scanner (3) Packet sniffer (4) Rootkit
Ans. 2
42. To protect yourself from computer hacker intrusions, you should install a [RBI Grade B 2012]
(1) firewall (2) mailer (3) macro (4) script (5) None of these
Ans. 1
43. Which one of the following is a key function of firewall? [SBI PO 2010]
(1) Monitoring
(2) Deleting
(3) Copying
(4) Moving
(5) None of these
Ans. 1
P a g e | 608
46. Coded entries which are used to gain access to a computer system are called
(1) Entry codes (2) Passwords (3) Securitycommands (4) Codewords
Ans. 2
48. Which of the following is the combination of numbers, alphabets along with username used to get access to user
account?
(1) Password
(2) Username
(3) Titlename
(4) Host-Id
Ans. 1
49. ……… refers to privileges that allow a user to read, write or execute a file.
(1) Authentication
(2) File access permission
(3) Password
(4) Firewall
Ans. 2
50. The unauthorised real-time interception of a private communication such as a phone call, instant message
known as (1) replay
(2) eavesdropping
(3) patches
(4) payloads
(5) None of these
Ans. 2
51. Vendor created program modifications are called [Allahabad Bank PO 2011]
(1) patches
(2) antiviruses
(3) hales
(4) fixes
(5) overlaps
Ans. 1
P a g e | 609
52. Which of the following a computer’s memory, but unlike a virus, it does not replicate itself ? [SBI PO 2011]
(1) Trojan horse
(2) Logic bomb
(3) Cracker
(4) Firewall
(5) None of these
Ans. 2
55. It hides the true network addresses and used to intercept all messages entering and leaving the network.
(1) Logic bomb (2) Firewall (3) Patches (4) Proxy server
Ans. 4
56. It is a software program designed to record (log) every keystroke on the machine on which it runs.
(1) Keylogger
(2) Worm
(3) Virus
(4) Cracker
Ans. 1
57. The legal right to use software based on specific restrictions is granted via a [RBI Grade B 2012]
(1) software privacy policy
(2) software license
(3) software password manager
(4) software log
(5) None of the above
Ans. 2
58. ……… refers to the unauthorised copying and distribution of software. *IBPS Clerk 2014] OR Illegal copying and
distribution of software is [IBPS RRB PO 2018]
(1) Hacking
(2) Software piracy
(3) Software literacy
(4) Cracking
(5) Copyright
Ans. 2
P a g e | 610
4. A given signal‟s second harmonic is twice the given signal‟s ____ frequency.
a) fourier
b) Foundation
c) Fundamental
d) Field
Ans. c
6. Once the active medium is excited, by which physical process is the first photons of light are
produced?
a) Blackbody radiation b) Spontaneous emission
c) Synchrotron radiation d) Planck‟s oscillation
Ans. b
7. Which process is responsible for amplification of the light after the first photons of light are
produced?
a) Blackbody radiation
b) Stimulated emission
c) Planck‟s radiation
d) Einstein oscillation
Ans. b
P a g e | 611
8. The active medium used in the first working laser ever constructed was?
a) A diamond block
b) Helium-neon gas
c) A ruby rod
d) Carbon dioxide gas
Ans. c
10. What would you use for immediate, real-time communication with a friend?
a) Instant messaging
b) E-mail
c) Usenet
d) A mailing list
Ans. a
20. Which among following are used for printing big charts drawing, maps and 3 dimensional illustrations
specially for architectural and designing purpose?
a) Plotters
b) Speakers
c) Mouse
d) Printers
Ans. a
25. Which consists if a numbers of processors can be accessed among various shared memory modules?
a) Distributed memory multiprocessor
b) Shared memory multiprocessor
c) Coupled memory multiprocessor
d) None of the above
Ans. b
DATA REPRESENTATION
Data representation refers those methods which are used internally to represent information stored in a
computer. Computers store lots of different types of information as numbers, text, graphics, sounds, etc.
Number System
It defines a set of values that is used to represent quantity. Digital computers internally use the binary
number system to represent data and perform arithmetic calculations.
■ UNICODE uses 16-bits to represent a symbol in the data. It represents any non-english character,
scientific symbol in any language like Chinese, Japanese.
1. To perform calculation on stored data computer, uses ……… number system. [SBI Clerk 2009]
(1) decimal (2) hexadecimal (3) octal (4) binary
Ans. 4
10. To convert binary number to decimal, multiply the all binary digits by power of
(1) 0 (2) 2 (3) 4 (4) 6
Ans. 2
11. Which of the following is a hexadecimal number equal to 3431 octal number?
(1) 197 (2) 917 (3) 791 (4) 971 (5) 719
Ans. 5
16. The most widely used code that represents each character as a unique 8-bit code is [IBPS Clerk 2011]
(1) ASCII (2) UNICODE (3) BCD (4) EBCDIC (5) None of these
Ans. 1
21. The coding system allows non-english characters and special characters to be represented
(1) ASCII (2) UNICODE (3) EBCDIC (4) All of these
Ans. 2
23. Gate having output 1 only when one of its input is 1 is called
(1) AND (2) NOT (3) OR (4) NOR
Ans. 3
27. Gate whose output is 0 only when inputs are different is called
(1) XOR (2) XNOR (3) NOR (4) NAND (5) None of these
Ans. 1
28. In the binary language, each letter of the alphabet, each number and each special character is made up
of a unique combination of [BOB Clerk 2010]
a) 8 bytes
b) 8 KB
c) 8 character
d) 8 bits
Ans. D
Database MCQ
6. What is Privacy?
Ans. It ensure that individual has the right to use the information and allow to use that information.
10. Defining the users, passwords and roles for users to control a database is called _______.
(a) data update (b) data retrieval
(c) data definition (d) database administration
Ans. d
11. Oracle, IBM DB2, SAP HANA, MySQL, PostgreSQL, Microsoft SQL server, Sybase,
MongoDB, MariaDB& SQLite are the most popular ______ tools.
(a) graphics& animation (b) image editing
(c) document typesetting (d) database management
Ans. d
P a g e | 620
12. Oracle, IBM DB2, SAP HANA & Microsoft SQL server are database management _____ tools.
(a) professional (paid)
(b) free/ open source
(c) outdated
(d) unsuitable
Ans. a
13. MySQL, PostgreSQL, MariaDB& SQLite are ______ database management tools.
(a) professional (paid)
(b) free/ open source
(c) outdated
(d) unsuitable
Ans. b
14. Among the professional (paid) databasemanagement systems, ____is themost popular.
(a) IBM DB2
(b) SAP HANA
(c) Oracle
(d) Microsoft SQL Server
Ans. c
15. ____is the most popular database management system in the embedded (mobile phones/
tablets) category.
(a) MySQL (b) SQLite
(c) Oracle (d) PostgreSQL
Ans. b
16. A database management system requires to fulfill ______ to be called a relational database
system.
(a) Codd's 12 Rules
(b) 10 commandments of Moses
(c) 3 laws of Isac Newton
(d) 2 laws of Kirchoff
Ans. a
17. Codd's Rule 0 defines a relational database system as the one which manages data through
________ capabilities.
(a) hierarchical database (b) network database
(c) relational database (d) none of them
Ans. c
18. Codd's Rule 1 is otherwise called _______rule and specifies that all information should be held
in tables.
(a) information (b) access
(c) null value (d) database description
Ans. a
19. Codd's Rule 2 is otherwise called ______rule and it guarantees that each and every
information stored in a database is accessible.
(a) information (b) access
(c) null value (d) database description
Ans. b
P a g e | 621
20. Codd's Rule 3 is otherwise called _______rule and it specifies that there should be unique
NULL value to denote missing information.
(a) information (b) access
(c) null value (d) database description
Ans. c
21. Codd's Rule 4 is otherwise called ______ rule and it states that metadata should also be
stored as normal data.
(a) information
(b) access
(c) null value
(d) database description
Ans. d
22. Codd's Rule 5 is otherwise called ______ rule and it permits commands for creating,
managing, rollingback and authorizing data access.
(a) data sublanguage
(b) view updating
(c) insert, update, delete
(d) independence from physical storage
Ans. a
23. Codd's Rule 6 is otherwise called ______rule and it specifies that every view which is
theoretically updateable should be updateable through thesystem.
(a) data sublanguage
(b) view updating
(c) insert, update, delete
(d) independence from physical storage
Ans. b
24. Codd's Rule 7 is otherwise called ________rule and it specifies that insertion, delete and
update of datashould also be based on relational principles.
(a) data sublanguage
(b) view updating
(c) insert, update, delete
(d) independence from physical storage
Ans. c
25. Codd's Rule 8 is otherwise called _______rule and it specifies that thetype of physical storage
media should not affect the access methods of datathrough the database management system.
(a) data sublanguage
(b) view updating
(c) insert, update, delete
(d) independence from physical storage
Ans. d
26. Codd's Rule 9 is otherwise called ______rule and application programs are una_ected by
changes to thedata unless it impairs the results of theapplication program.
(a) logical data independence (b) integrity independence
(c) distribution independence (d) non-subversion
Ans. a
P a g e | 622
27. Codd's Rule 10 is otherwise called ________rule and it specifies thatdata integrity conditions
should be defined in the database management system and not in the application program.
(a) logical data independence
(b) integrity independence
(c) distribution independence
(d) non-subversion
Ans. b
28. Codd's Rule 11 is otherwise called _____rule and it specifies that the end user should feel that
the data isstored at one place, although the storage may be distributed on several computers.
(a) logical data independence
(b) integrity independence
(c) distribution independence
(d) non-subversion
Ans. c
29. Codd's Rule 12 is otherwise called ______ rule and it specifies that data access should be
provided onlythrough the relational model, withoutexposing the low level storage APIs tothe end
user.
(a) logical data independence
(b) integrity independence
(c) distribution independence
(d) non-subversion
Ans. d
30. Object oriented databases are based onthe concept of ______ , similar to object oriented
programming.
(a) SQL (b) table
(c) objects (d) column
Ans. c
33. OODB with support for SQL (like relational database) is called_______.
(a) hybrid object relational database (b) programming
(c) pure relational database (d) NOSQL database
Ans. a
35. Object schema in OODB use data types ______ to object oriented programming languages.
(a) unrelated
(b) unconnected
(c) similar
(d) not connected
Ans. c
36. ODMG stands for _____, which isthe consortium in charge of the standardizing the
development of ObjectOriented Data Base.
(a) Object Data Management General
(b) Object Data Management Group
(c) Object Digital Management Group
(d) Object Data Maintenace Group
Ans. b
38. Object Oriented Data Base is suitablefor cases in which relational tables are ______to design
and manipulate.
(a) too complex (b) too easy
(c) too simple (d) too plain
Ans. a
39. The system of managing databases using models other than tables and retrieving data using
methods other than or related to SQL is called ______ datamanagement system.
(a) relational database
(b) table oriented
(c) Query oriented
(d) NOSQL
Ans. d
40. NOSQL databases permit updates which _______ and are prone to data loss.
(a) may be incomplete
(b) are complete
(c) which are immediately effected
(d) which are subject to strict rules of integrity
Ans. a
43. In a well defined database, names of database, table and column ______ contain space.
(a) do (b) may
(c) should not (d) should
Ans. c
44. As a good practice in design of database tables, it is advisable to have_______ for indexing.
(a) Integer ID column
(b) no column
(c) all columns
(d) none of them
Ans. a
45. As a good practice, select queries should have contain ______column names.
(a) * for
(b) blank for
(c) required field names
(d) none of them
Ans. c
46. In defining a database table, it is a good practice to define frequently searched columns with
_______.
(a) primary key
(b) foreign key
(c) either a or b
(d) neither a nor b
Ans. c
47. When a column value cannot be null, it is a good practice to include ______ declaration for
that column when creating the table.
(a) DEFAULT 0
(b) DEFAULT < SOME V ALUE >
(c) NULL
(d) NOT NULL
Ans. d
48. When a column value should be filled with a default of 0 or any other value, it is a good
practice to include _______ declaration for that column when creating the table.
(a) DEFAULT 0
(b) DEFAULT < SOME V ALUE >
(c) either a or b
(d) NOT NULL
Ans. c
49. The process of dividing the data in suitable tables to avoid repetition of data is called _____ .
(a) normalization
(b) data insertion
(c) data deletion
(d) data updation
Ans. a
P a g e | 625
50. The databaserule which permits inserting a row without any specific value for
a column is called ______.
(a) null rule (b) unique column rule
(c) primary key rule (d) referential integrity rule
Ans. a
51. _______in database management permits inserting a new value only if there is no previous
entry having the same value.
(a) null rule
(b) unique column rule
(c) primary key rule
(d) referential integrity rule
Ans. b
52. ______in database management permits unique values to be used for searching and indexing
of data.
(a) null rule
(b) unique column rule
(c) primary key rule
(d) referential integrity rule
Ans. c
53. ______in database management ensures that key values in one table are referenced in a
related table.
(a) null rule
(b) unique column rule
(c) primary key rule
(d) referential integrity rule
Ans. d
54. ______ in database management ensures that user defined constraints are enforced to restrict
deletion or updating of rows.
(a) Complex integrity checking rule
(b) unique column rule
(c) primary key rule
(d) referential integrity rule
Ans. a
55. _____ rule in data reference integrity ensures that referred data is not deleted or updated.
(a) restrict
(b) set to null
(c) set to default
(d) cascade
Ans. a
56. ______ rule in data reference integrity ensures that whenever data is deleted, all
dependencies to deleted data are set to null value.
(a) restrict
(b) set to null
(c) set to default
(d) cascade
Ans. b
P a g e | 626
57. ______ rule in data reference integrity ensures that whenever data isdeleted, all dependencies
are set to their default value.
(a) restrict (b) set to null
(c) set to default (d) cascade
Ans. c
58. _____ rule in data reference integrity ensures that whenever data is updated or deleted, all
dependency rows are correspondingly updated or deleted.
(a) restrict
(b) set to null
(c) set to default
(d) cascade
Ans. d
59. ______rule in data reference integrity ensures that no action is takenwhen attempt is made to
delete or update referenced data.
(a) No action
(b) Set to null
(c) Set to default
(d) Cascade
Ans. a
60. The practice of specifying only specified values are entered in particular column (like NOT
NULL, DEFAULT 0) is called ______.
(a) integrity rule
(b) integrity constraint
(c) updation rule
(d) relational rule
Ans. b
61. Creating relationship for data in one table with that in another table in database is called ____.
(a) integrity (b) constraint
(c) relationship (d) none of them
Ans. c
62. _______is used to relate data in one table to that in another table.
(a) key (b) column
(c) row (d) table
Ans. a
63. A key which helps to connect data in one secondary table to that in a primary table is called
(a) primary key (b) foreign key
(c) unique (d) none of them
Ans. b
64. A key which can be used as a prospective primary key (in the future) is called ______.
(a) primary key
(b) foreign key
(c) alternate key or candidate key
(d) none of them
Ans. c
P a g e | 627
65. A query which creates database, table, inserts rows, deletes rows & updates existing values is
called ______ .
(a) update query
(b) select query
(c) both a & b
(d) neither a nor b
Ans. a
66. A query which selects values based from a table is called ______.
(a) update query
(b) select query
(c) both a & b
(d) neither a nor b
Ans. b
67. The clause which specifies constraints for selecting or updating data is called _____clause.
(a) GROUP BY (b) HAVING
(c) ORDER BY (d) WHERE
Ans. d
68. The clause which specifies rule for data aggregation is called ______clause.
(a) GROUP BY (b) HAVING
(c) ORDER BY (d) WHERE
Ans. a
69. The clause which specifies rule for selecting data needed for aggregation is called ___clause.
(a) GROUP BY (b) HAVING
(c) ORDER BY (d) WHERE
Ans. b
70. The clause which specifies the rule for sorting of data is called _____ clause.
(a) GROUP BY (b) HAVING
(c) ORDER BY (d) WHERE
Ans. c
71. The clause which specifies that data should be sorted in descending order is called __ clause.
(a) DESC (b) HAVING
(c) ORDER BY (d) WHERE
Ans. a
72. Adding _____ keyword to an integer field permits automatic increment to the record number.
(a) primary key
(b) key
(c) auto increment
(d) automatic
Ans. c
79. An entity set that does not have sufficient attributes to form a primary key is a
a) Strong entity set b) weak entity set
c) simple entity set d) primary entity set
Ans. b
82. The language used in application programs to request data from the DMBS is referred to as
a) HLL b) DML c) DDL d) DCL
Ans. b
85. The database environment has all of the following components except:
a) users b) separate files c) database d) database administrator
Ans. a
86. The language which has recently become the defacto standard for interfacing application
programs with relational database system is
a) Oracle b) SQL c) Dbase d) 4GL
Ans. b
98. The statement in SQL which allows changing the definition of a table is
a) Alter b) Update c) Create d) select
Ans. a
101. The file organization that provides very fast access to any arbitrary record of a file is
a) Ordered file
b) Unordered file
c) Hashed file
d) B-tree
Ans. c
P a g e | 631
108. Which are the two ways in which entities can participate in a relationship?
a) Passive and active b) Total and partial
c) Simple and Complex d) All of these
Ans. b
110. Which of the following is another name for the weak entity?
a) Child
b) Owner
c) Dominant
d) All of these
Ans. a
DVD MCQ
1. DVD was invented and developed in year_____
a) 1985 b) 1995 c) 1975 d) 1998
Ans. b
Explanation: The Winchester disk is a type of hard disk. Others are all optical disks. WORM is
nothing but CD-R i.e., CD recordable. Stands for write once read many.
5. What is the maximum storage capacity of a DVD for a dual-layered, single-sided disc.
a) 1 GB
b) 4.7 GB
c) 10 GB
d) 8.5 GB
Ans. d
2. Select the name of the files that appear as entries in the directories.
(A) Ordinary files
(B) Duplicate files
(C) Special files
(D) Sub directories
Answer: (C) Special files
3. Select the Number of regions of the disk in a UNIX files management system.
(A) 1
(B) 4
(C) 3
(D) 2
Answer: (B) 4
Explanation: There are 4 regions in which the disk is divided. The first is for booting, second contains the
disk size, third includes the list of definitions and the remaining region contains the free blocks available.
9. QuickBooks is an ______.
a) Accounting software package
b) Children jungle books
c) Official Letters Books
d) Fast Reading Books
Ans. A
11. Microsoft Office, a family of client software, was first announced by Bill Gates on ____.
a) August 1, 1980
b) August 1, 1988
c) August 1, 1990
d) August 1, 1995
Ans. B
18. A ____ is usually used to show the change of information over a period of time.
a) Line graph
b) Pictograph
c) Pie chart
d) None of these
Ans. A
19. A bar Graph is a graphical display of data using bars of different _____.
a) Heights
b) widths
c) Heights and Widths
d) None of these
Ans. A
25. _____ is the process by which you track your goods throughout your entire supply chain, from
purchasing to production to end sales.
a) Inventory System
b) Database
c) Desktop Application
d) Booting
Ans. A
31. A _____ is a collection of information that is organized so that it can be easily accessed, managed and
updated.
a) Database
b) Peripheral
c) Compiler
d) None of these
Ans. A
33. A technology that allows us to access our files and/or services through the internet from anywhere in
the world.
a) Firewall
b) Cloud
c) Cookie
d) None of these
Ans. B
P a g e | 639
There are hundreds of different file extensions and file types used with computers. However, it
would be impossible for most people to memorize all the file extensions and their associated
programs. Below a list of the most common file extensions.
Access Time The time interval between the instance at which data is called from a storage device and the
instance when delivery begins.
Accumulator A local storage area called a register, in which the result of an arithmetic and logic operation
is formed.
Analog Computer A computer that operates on data which is in the form of continuous variable physical
quantities.
Active Window It is the currently focused window in the current window manager.
Animation It is the process of making the illusion of motion and change by means of the rapid display of a
sequence of static image that minimally differ from each other.
Antivirus It consists of computer programs that attempt to identify threat and eliminate computer viruses
and other malicious software (malware).
Application Software It is a subclass of computer software that employs the capabilities of a computer
directly to a task that the user wishes to perform.
Archive It provides backup storage.
Arithmetic Logic Unit (ALU) It is a part of the execution unit, a core component of all CPUs. ALUs are
capable of calculating the results of a wide variety of basic arithmetical and logical computations.
Artificial Intelligence Fifth generation computing devices, based on artificial intelligence, are still in
development, though there are some applications, such as voice recognition, that are being used today.
ASCII (American Standard Code for Information Interchange) It is a character set and a character encoding
based on the Roman alphabet as used in Modern English and other Western European languages.
Assembler A program that translates mnemonic statement into executable instruction.
Attribute The characteristics of an entity are called its attributes.
Authentication Any process by which a system varifies the identity of the user who wants to access it.
Auxiliary Memory It is also known as secondary memory that is not directly addressable by the CPU.
Alphanumeric A character set that contains letters, digits and other special characters such as @, $, +, *,
%, etc.
Backspace Key This key is used to delete the text. Backspace will delete the text to the left of the cursor.
Blog It is a discussion or informational site published on the world wide web.
Bluetooth It permits a wireless exchange of information between computers, cell phones and other
electronic devices.
Backspace Key This key is used to delete the text. Backspace will delete the text to the left of the cursor.
Backup A copy of a file or other item of data made in case the original is lost and damaged.
Bandwidth The maximum amount of data that can travel in a communication path in a given time,
measured in bits per second (bps).
Bar Code It is a machine-readable representation of information in a visual format on a surface.
Batch File It is a text file that contains a sequence of commands for a computer operating system.
Binary Coded Decimal (BCD) A coding system in which a 4 digit binary number represents each decimal
digit from 0 to 9.
Bit It is the most basic information unit used in computing and information theory.
Bomb A type of virus designed to activate at a specific date and time on your computer.
Buffering The process of storing data in a memory device, allowing the devices to change the data rates,
perform error checking and error retransmission.
P a g e | 644
Bug It is an error, flaw, failure, or fault in a computer program or system that produces an incorrect or
unexpected result.
Byte It is commonly used as a unit of storage measurement in computers, regardless of the type of data
being stored.
Database It is a collection of logically related information in an organised way so that it can be easily
accessed, managed and updated.
Data Entry Direct input of data in the appropriate data fields of a database known as data entry.
Database Management System (DBMS) It is a collection of various programs. It provides a systematic way
to create, retrieve, update and manage data.
Data Processing Converting data into information, is called data processing.
Data Redundancy It is a condition created within a database or data storage technology in which the same
piece of data is held in two separate places.
Debugging A methodical process of finding and reducing the number of bugs, or defects are known as
debugging.
Degree The number of fields associated with the database table or relation.
Desktop Publishing (DTP) It combines a personal computer, page layout software and a printer to create
publications on small economic scale.
P a g e | 645
Display Unit A device with a screen that displays characters or graphics representing data in a computer
memory.
Dial-up Line A line through which communication established.
Digital Computer A computer that operates with numbers expressed directly as digits.
Direct Access It is the capability of the computer equipment to obtain data from a storage device.
Directory In computing, a directory is an entity in a file system which contains a group of files and other
directories.
Domain Name A unique name that identifies a particular Website and represents the name of the server
where the Web pages reside.
Dots Per lnch (DPI) It is defined as the measure of the resolution of a printer, scanner or monitor. It refers
to the number of dots in one inch line.
Download It refers to the act of transmitting data from a remote computer on the Internet or other
network to one’s own computer.
Drag and Drop In computer graphical user interface, drag and drop is the action of clicking on a virtual
object and dragging it to a different location or onto another virtual object.
DVD It is an optical disc storage media format that can be used for data storage including movies with high
quality video and sound.
Dynamic RAM DRAM is a type of random access memory which stores each bit of data in a separate
capacitor.
EBCDIC (Extended Binary Coded Decimal Interchange Code) It is an 8-bit character encoding used on IBM
mainframe operating systems, like Z/OS, S/390, AS/400 and i5/OS.
E-Commerce Electronic commerce is a type of industry where buying and selling of products or services is
conducted over electronic systems such as the Intranet and other computer network.
Editing The process of changing information by inserting, deleting, replacing, rearranging and reformation.
Electronic Data Processing (EDP) A data processing through equipment that is predominantly electronic
such as digital computer.
Electronic mail E-mail is a method of composing, sending, storing and receiving messages over electronic
communication systems.
End User Any individual who uses the information generated by a computer based system.
Entity It is something that has certain attributes or properties which may be assigned values.
Error Message It is information displayed when an unexpected condition occurs usually on a computer or
other device.
Excel It allows users to create spreadsheets much like paper ledgers that can perform automatic
calculations.
Exe(.exe) It is a common file name extension denoting an executable file(a program)in the DOS,MS-
Windows.
Execution Time The total time required to execute a program on a particular system.
Expansion Slot It is a socket on the motherboard that is used to insert an expansion card which provides
additional features to a computer.
Extranet A technology that permits the users of one organisation’s Intranet to enter portions of another
organisation’s Intranet in order to conduct business transactions or collaborate on joint projects.
File Manager It is an operating system utility that provides a user interface to work with file systems.
Firewall A security system usually consisting of hardware and software that prevents unauthorised persons
from accessing certain parts of a program database or network.
Flowcharts These are the means of visually representing the flow of data through an information
processing system, the operations performed within the system and the sequence in which they are
performed.
Foreign Key A field in a database table, which links it to another related table.
Format To set margins, tabs, font or line spacing in layout of a document.
FORTRAN Its name stands for formula translating system. The language was designed at IBM for scientific
computing.
Freeware A form of software distribution where the author retains copyright of the software but makes
the program available to others at no cost.
Function Key A special key on a computer keyboard or a terminal devices keyboard that is used to perform
specific functions. Many keyboards have function keys labelled from F1 to F12.
Garbage In Garbage Out (GIGO) It pertains to the fact that most computer errors are not machine errors,
they are data errors caused by incorrect input data.
Gigabyte (GB) It is a unit of information or computer storage equal to approximately one billion bytes.
Gigahertz (GHz) A measurement used to identify the speed of the central processing unit. One gigahertz is
equal to 1 billion cycles per second.
Graphics Interchange Format (GIF) A simple file format for pictures and photographs, that are compressed
so they can be sent quickly.
Graphic Tablet It is an input device which is used to create images, etc.
Graphical User Interface (GUI) It is a method of interacting with a computer through a metaphor of direct
manipulating of graphical images and widgets in addition to text.
Hacker A computer criminal who penetrates and tempers with computer programs or systems.
Hang To crash in such a way that the computer does not respond to input from the keyboard or mouse.
Hard Disk It is a non-volatile data storage device that stores data on a magnetic surface layered onto disk
platters.
Hardware The mechanical, magnetic, electronic and electrical components that comprises a computer
system such as CPU, monitor, keyboard, mouse, etc.
High-Level Programming Language It is a programming language that is more user-friendly, to some extent
platform-independent and abstract from low-level computer processor operations such as memory
accesses.
Home Page A starting point or a doorway to the Website. It refers to the Web page that identifies a
Website and contains the hyperlink to other Web pages in the Website.
Host Computer A computer that provides information or a service to other computers on the Internet.
Every host computer has its own unique host name.
Hub A network device that connects multiple computers on a LAN, so that they can communicate with one
another.
Hybrid Computer These computers are made by taking the best features of the analog computer and
digital computer.
Hyperlink An image or portion of text on a Web page that is linked to another Web page
HyperText Markup Language It stands for HTML. It is mainly used for designing Websites.
HyperText Transfer Protocol (HTTP) It is an important protocol used on the world wide web for moving
hypertext files across the Internet.
P a g e | 647
Icon A symbol (such as picture or a folder) that represents a certain function on your computer. When the
user clicks on the icon, the appropriate function is executed.
Information It is the summarisation of data according to a certain pre-defined purpose.
Input In order to give instructions to a computer, the information has to be supplied to it.
Instant Messaging (IM) A chat program that lets people communicate over the Internet in real time.
Instruction A command or order given to a computer to perform a task.
Interface A device or program that helps a user to communicate with a computer.
Interpreter A program that converts and executes the source code into machine code line by line.
Internet A vast computer network linking smaller computer networks worldwide.
Internet Surfing To search something on Internet is called Internet surfing.
Internet Service Provider (ISP) It is a business organisation that offers users to access the Internet and
related services.
Integrated Circuits Multiple electronic components combined on a silicon chip.
Kernel It is the fundamental part of a program, such as an operating system, that resides in memory at all
times.
Keyboard This is the standard input device attached to all computers. The layout of keyboard is just like
the traditional typewriter of the type QWERTY. Key Stroke It is the process of pressing button in keyboard.
Kilobyte (KB) It is a unit of information or computer storage equal to 1024 bytes.
LAN (Local Area Network) In LAN, the connected computers are geographically close together. They are
either in the same building or within a smaller area.
Laptop It is a small, lightweight and portable battery powered computers that can fit onto your lap. They
each have a thin, flat and liquid crystal display screen.
Light Pen A light sensitive style for forming graphics by touching coordinates on a display screen, thereby
seeming to draw directly on the screen.
Link A communication path between two nodes or channels.
List Processing (LISP) A high level programming language suitable for handling logical operations and non-
numeric applications.
Log In It is the process by which an individual gains access to a computer system by identifying and
authenticating themselves.
Log Off It is a process of withdrawal from function after performing program.
Low Level Language It is a assembly language which is used in computer. It was mostly used in first
generation computers.
Machine Language The language of computer also called binary language. Instructions in this language are
written as a sequence of 0’s and 1’s.
Main Memory A volatile and speedy memory. It is divided into two parts RAM and ROM.
Malware It is a software that disrupts normal computers functions or sends a users personal data without
the user authorisation.
Mass Storage It is referred to storage where large volumes of backup/data is stored.
P a g e | 648
Megabyte (MB) 1 Megabyte is equal to 1048576 bytes, usually rounded off to one million bytes. It is also
called a ‘meg’.
Memory Temporary storage for information, including applications and documents.
Menu Bar The horizontal strip across the top of an application’s window. Each word on the strip has a
context sensitive drop-down menu containing features and actions that are available for the application in
use.
Merge Combining two or more files into a single file.
Microcomputer A microprocessor-based computer, consisting of an CPU, internal semiconductor memory,
input and output sections and a system bus, all on one, or several monolithic IC chips inserted into one or
several PC boards.
Microprocessor A complete Central Processing Unit (CPU) contained on a single silicon chip.
MIDI (Music Instrument Digital Interface) It allows a computer to store and replay a musical instrument’s
output.
Minicomputer Considered to be more capable than a microcomputer but less powerful than a mainframe.
Mnemonic A symbolic label or code remainder that assists the user in remembering a specific operation or
command in assembly language.
Modem (Modulator/Demodulator) It refers to specific equipment that provides a means of communication
between two computer systems over conventional telephone lines.
Monitor The visual readout device of a computer system. A monitor can be in several forms; a Cathode Ray
Tube (CRT), a Liquid Crystal Display (LCD), or a flat-panel, full-color display.
Multitasking It can simultaneously work with several programs or interrelated tasks that share memories,
codes, buffers and files.
Multithreading It is a facility available in an operating system that allows multiple functions from the same
application packages.
Multimedia Software programs that combine text and graphics with sound, video and animation. A
multimedia PC contains the hardware to support these capabilities.
Object Something that contains both the data and the application that operate on that data.
Offline It refers to the state in which a computer is temporarily or permanently unable to communicate
with another computer.
Online It refers to the state of being connected to the networked computer system or the Internet.
Operating System A set of instructions that tells a computer on how to operate when it is turned ON. It
sets up a filing system to store files and tells the computer how to display information on a video display.
Output Data that come out of a computer device.
Patch A small program that improves an existing piece of software or corrects an error in it.
Personal Computer (PC) A single-user computer containing a Central Processing Unit (CPU) and one or
more memory circuits.
P a g e | 649
Random Access Memory(RAM) A volatile, semiconductor storage structure that accesses temporary data
with a random or direct accessing method. Data in this memory can be read by the CPU directly.
Read Only Memory (ROM) A semiconductor memory whose data cannot be erased, or overwritten; it can
only be accessed (read) for use by the CPU.
Record A collection of all the information pertaining to a particular entity instance.
Register A temporary storage unit for quick, direct accessibility of a small amount of data for processing.
Remote Server A network computer that allows a user on the network from a distant location to access
information.
Router A network device that enables the network to reroute messages it receives that are intended for
other networks. The network with the router receives the message and sends it on its way exactly as
received.
Routing The process of choosing the best path throughout the LAN.
Scanner An electronic device that uses light-sensing equipment to scan paper images such as text, photos,
illustrations and translate the images into signals that the computer can then store, modify, or distribute.
Search Engine Software that makes it possible to look for and retrieve information on the Internet,
particularly the Web. Some popular search engines are AltaVista, Google, HotBot, Yahoo!, Web Crawler
and Lycos.
Sector A section of a recording track on a magnetic disk.
Sequential Access It is a class of data storage device that reads stored data in a sequence.
Server A computer that shares its resources and information with other computers on a network.
Shareware A software that is not free but is available for a free trial period.
Simplex Transmission of data in one direction only.
Software The set of computer programs, procedures and associated documentation related to the
effective operation.
Source Code (Source Program) A set of computer instructions in hard-copy or stored form.
Spam Irrelevant or unsolicited messages sent over Internet, typically to large numbers of users, for the
purpose of advertising, phishing, spreading malwares, etc.
Spreadsheet Software that allows one to calculate numbers in a format that is similar to pages in a
conventional ledger.
P a g e | 650
Static RAM It is a type of RAM, that contains its contents only whenever current supply is ON.
Sub Program A particular part of a program that complete the special work.
Supercomputer The largest mainframe computer featuring exceptionally high speed operation while
manipulating huge amounts of information.
TCP/IP (Transmission Control Protocol/Internet Protocol) This is a large grouping of programs and
standards that govern how information moves round the Internet.
Terabyte (TB) It is about a trillion bytes. Actually, it’s 240 or 10095111627776 bytes.
Terminal This is what you look at
when you are on the Internet. It’s your computer screen.
Time Sharing It refers to the allocation of computer resources in a time dependent fashion to run several
programs simultaneously.
Topology The structure of the network including physical connection such as wiring schemes and logical
interactions between network devices.
Trackball Input device that controls the position of the cursor on the screen.
Uniform Resource Locator (URL) The specific Internet address for a resource such as an individual or an
organisation.
Unix This is an operating system developed by AT & T. It is a big push that it allows one server to serve
many different end users at one time.
Upgrade The process of improve hardware and software functionality.
Upload The processes of transferring information from a computer to a Website (or other remote location
on a network).
UPS (Universal Power Supply or Uninterruptible Power Supply) An electrical power supply that includes a
battery to provide enough power to a computer during an outage to back-up data and properly shut down.
User A person who uses or operates something.
User-Friendly A software program that has been designed to easily direct the user through the operation
or application of a program.
Validation The process of making sure that the forms and documents from a particular transaction are
correct.
Video Teleconferencing A remote ‘face-to-face chat,’ when two or more people using a webcam and an
Internet telephone connection chat online. The webcam enables both live voice and video.
Virus A piece of computer code designed as a prank or malicious act to spread from one computer to
another by attaching itself to other programs.
Volatile Memory A memory whose contents are irretrievably lost when power is removed. If data in RAM
must be saved after power shutdown, back-up in non-volatile memory (magnetic disk, tape, or CD-R) is
essential.
Website A collection of web pages or hyperlinked webpages which onwned by an individual, company or
organisation.
Window A portion of a computer display used in a graphical interface that enables users to select
commands by pointing to illustrations or symbols with a mouse.
Wide Area Network (WAN) It is a telecommunication network or computer network that extends over a
large geographical distance.
Word Processor A computer system or program for setting, editing, revising, correcting, storing and
printing text.
P a g e | 651
World Wide Web (‘WWW’ or ‘The Web’) A network of servers on the Internet that use hypertext-linked
databases and files. It was developed in 1989 by Tim Berners-Lee, a British computer scientist and is now
the primary platform of the Internet.
Workgroup Persons sharing files and data between themselves.
Workstation The work area and/or equipment used for computer operations, including Computer-Aided
Design (CAD). The equipment generally consists of a monitor, keyboard, printer and/or plotter and other
output devices.
X-Y Plotter A computer-driven printing mechanism that draws coordinate points in graph form.
ZOOM The enlarging or reducing an image displayed on a computer process of proportionately monitor.
ZIP (Zone Information Protocol) This is an application that allows for the compression of application files.
P a g e | 652
2. Computer is a/an
a) battery
b) electronic machine
c) All of these
d) None of these
Ans. B
9. Computers that are portable and convenient to use for users who travel, are known as
a) supercomputers
b) minicomputers
c) mainframe computers
d) laptops
Ans. D
The Processing speed of computers in first generation was measured in Milliseconds. And, We might know
that Millisecond is very slow than today's processing speed measurements. Because of not having
transistors in computers, The speed of computers was not measured in Hz.
11. The word computer has been derived from which of the following language?
a) Greek
b) English
c) Hindi
d) Latin
Ans. D
12. The first computer which provide storage is [SSC CPO 2012]
a) EDSAC
b) EDBAC
c) Mark-1
d) ACE
Ans. A
31. A ___ is a large and expensive compter capable to performing scientific and business applications.
a) supercomputer
b) mainframe computer
c) minicomputer
d) handheld computer
ans. A
38. The period of the second generation computers was [SSC CGL 2008]
a) 1946-1958
b) 1940-1960
c) 1956-1963
d) 1957-1964
Ans. C
42. Which was the first electronic computer constructed at the Moore School of Engineering? [SSC CGL
2013]
a) EDVAC
b) ONIVAC
c) ENIAC
d) EDSAC
Ans. A
P a g e | 658
44. Desktop and personal computers are also known as [SBI Clerk 2012]
a) Supercomputers
b) Servers
c) Mainframes
d) Peripheral equipment
e) Microcomputers
Ans. E
P a g e | 659
1. Which of the following is NOT one of the four major data processing functions of a computer?
a) gathering data
b) processing data into information
c) analyzing the data or information
d) storing the data or information
Ans. c
2. Surgeons can perform delicate operations by manipulating device through computers instead of
manually. This technology is known as:
a) robotics
b) computer forensics
c) simulation
d) forecasting
Ans. a
3. In analog computer
a) Input is first converted to digital form
b) Input is never converted to digital form
c) Output is displayed in digital form
d) All of above
Ans. b
6. A computer which CPU speed around 100 million instruction per second and with the word length of
around 64 bits is known as
a) Super computer b) Mini computer
c) Micro computer d) Macro computer
Ans. a
7. The storage subsystem in a microcomputer consists mainly of ___ or ___ media with varying capacities.
a) Memory or video b) Magnetic or Optical
c) Optical or Memory d) Video or magnetic
Ans. b
P a g e | 660
22. Most of the inexpensive personal computer does not have any disk or diskette drive, What is the name
of such computers?
a) Home computers
b) Diskless computers
c) Dedicated computer
d) General computer
Ans. a
24. A term associated with the comparison of processing speeds of different computer system is:
a) EFTS
b) MPG
c) MIPS
d) CFPS
Ans. c
26. When was the world’s first laptop computer introduced in the market and by whom?
a) Hewlett-Peckard
b) Epson, 1981
c) Laplink traveling software inc. 1982
d) Tandy model-2000, 1985
Ans. b
27. The first microprocessor built by the Intel Corporation was called
a) 8008
b) 8080
c) 4004
d) 8800
Ans. c
28. Who built the world’s first electronic calculator using telephone relays, light bulbs and batteries.
a) Claude Shannon b) Konrard Zues
c) George Stibits d) Howard H. Aiken
Ans. c
P a g e | 663
31. A digital computer did not score over an analog computer in terms of
a) Speed
b) Accuracy
c) Reliability
d) Cost
Ans. b
43. The computer that process both analog and digital is called
a) Analog computer
b) Digital computer
c) Hybrid computer
d) Mainframe computer
Ans. c
46. The first machine to successfully perform a long series of arithmetic and logical operations was:
a) ENIAC
b) MARK-1
c) Analytic Engine
d) UNIVAC-1
Ans. b
P a g e | 666
13. Which of the following is likely to have a speed of millions of instructions per second ?
a) Humans
b) Cars
c) Computers
Ans. C
P a g e | 668
14. Which of the following is referred to Garbage in the usage, “Garbage in Garbage Out” ?
a) Dust
b) Diseases
c) Error in input to computer
Ans. C
15. Multiple passwords for single accounts or receipt of OTP on mobile has plans to secure the:
a) Gmail inbox
b) Yahoo inbox
c) Banking transactions
Ans. C
17. In order to entertain, how are various artificial effects added to a movie?
a) Using video effects software
b) By causing rain and thunder
c) None of these
Ans. A
22. Which of the following can cause the computer to stop its working?
a) System failure b) Power issues c) Both of these
Ans. C
P a g e | 669
24. Semiconductor memory device in which stored date will remain permanently stored as long as
power is supplied is
a) Dynamic memory device
b) Storage device
c) Flash device
d) Static memory device
Ans. D
27. Type of computer memory in which access time is not constant but varies depending on the
address location is known as
a) RAM
b) RWM
c) ROM
d) SAM (Sequential access memory)
Ans. D
28. As a Technical Support Executive, which of the following is the most appropriate way to
provide
confirmation after receiving query of a customer?
A. Give confirmation via email
B. Give confirmation via SMS
C. Give confirmation over call
D. Only give confirmation after the resolution of query
Correct Answer: A
29. You receive an email from a customer with a query. The query will be resolved but it is likely to
take more time than customer's expectation. What should you do in this situation?
A. Ask the customer to contact again after a while
B. Inform the customer about the delay in resolution and apologize for the same
C. Inform the customer that there will be a delay which is unavoidable
D. Ask the customer to contact a different representative
Correct Answer: B
P a g e | 670
30. A customer's computer screen freezes on the Windows startup screen during boot. Which of
the
following is the most likely cause of this problem?
A. Corrupt boot sector
B. Problem with a hardware device
C. Corrupt or missing NTLDR
D. Error in BOOT.INI
Correct Answer: D
31. A computer system can accept textual input with the help of
a) Mouse
b) Video Camera
c) Keyboard
d) Barcode Reader
Ans. c
32. We can enter the audio form of data into a computer system with the help of
a) Microphone
b) Scanner
c) Keyboard
d) Barcode Reader
Ans. a
39. Which of the following combination of keys are used for copying a particular file in a folder?
a) CTRL + V
b) Ctrl + X
c) Ctrl + C
d) Ctrl + A
Ans. C
42. When NASSCOM (National Association of Software and Services Companies) was
established
a) 1988
b) 1997
c) 1993
d) 1882
Ans. A
49. Who first developed QWERTY keyboard used in computers and phones
a) Raphael Finkel
b) Wim Ebbinkhuijsen
c) Shafi Goldwasser
d) Christopher Latham Sholes
Ans. D
54. Which of the following programming language is used to create programs like applets?
a) COBOL b) C Language
c) Java d) BASIC
Ans. C
55. Which one programming language is exclusively used for artificial intelligence
a) C
b) Java
c) J2EE
d) Prolog
Ans. D
63. Which one is the first fully supported 64-bit operating system
a) Windows Vista
b) Mac
c) Linux
d) Windows XP
Ans. C
69. A computer use which type of number system to calculate and to store data
a) Decimal
b) Octal
c) Binary
d) Hexadecimal
Ans. C
82) What should be done to successfully convert the format of an image from BMP to JPEG ?
a) Compress the file
b) Rename the image
c) Use the save as command
d) Change the image file extension
Answer =d
83) A company regularly updates a user reference guide. Some staff are confused about which of
the printed document is the most current. What feature should be included in the reference guide
to eliminate this confusion ?
a) Data printed
b) Version number
c) Authors name
d) Copyright information
Answer = B
85) The data from a spreadsheet needs to be imported into a database package. Which file format
would be the most appropriate when saving the spreadsheet file ?
a) CSV
b) HTML
c) PDF
d) RTF
Answer =A
87) Which of the following would indicate that the motherboard battery has failed ?
a) Operating system passwords are lost
b) Files on the hard disk are lost and corrupted
c) Hardware settings, including virtual memory reverts to default values
d) Hardware settings, including the current date and time reverts to default values
Answer = D
89) Which country created the most used networking software in 1980's ?
a) Sun
b) IBM
c) Novell
d) Microsoft
Answer =C
93) The IBM PC-XT was the first to include a hard drive. What was the capacity of this disk ?
a) 750 KB b) 10 KB
c) 20 KB d) 1.44 KB
Answer =B
94) In 1983, which person was the first to offer a definition of the term 'computer virus' ?
a) Smith
b) Cohen
c) Norton
d) Mcafee
Answer = B
99. Computer software which is required to match the sound uttered by user with a vocabulary of
sound signals stored in a computer is
a) speech-recognition b) solaris
c) NetWare d) sound tracker
Ans. A
P a g e | 679
101. Data entered into computer through keyboard and mouse is an example of
a) instruction
b) command
c) indirect input
d) direct input
Ans. C
103. Computer device which enable the user to input text and numerical data by hand writing on
the pressure sensitive surface using a special pen is called
a) stylus pen
b) character-recognition device
c) mouse
d) sensor
Ans. B
104. Colors that are contained by the color guns of computer screen are
a) red, green and blue
b) yellow, red and green
c) orange, red and green
d) black, blue and green
Ans. A
109. Group of bits in a memory which is used to represent information or data of some type is
known as
a) byte b) memory word
c) SRAM d) PROM
Ans. B
116. A part of a computer system that consists of data or computer instructions is called
a) software
b) chip
c) hardware
d) DOS
Ans. A
117. Output device used to produce high quality graphics in a variety of colors is called
a) plotter b) printer
c) typewriter d) scanner
Ans. A
124. Key of the keyboard which enable a user to escape from currently selected option or task on
a computer is termed as
a) ESC key b) Home key
c) F4 Key d) F7
Ans. A
130. Scanner with a resolution of 600 dots per inch can split image into
a) 600x600 areas
b) 600x100 areas
c) 600x1200 areas
d) 600x300 areas
Ans. A
133. Device which is used to produce hard copy of computer output is known as
a) typewriter b) printer
c) scanner d) plotter
Ans. B
134. Computer that uses microprocessor as its central processing unit is known as
a) personal computer
b) micro computer
c) mini computer
d) Both A and B
Ans. D
138. Control usage and allocation of different hardware components of computer is done by
a) address bus
b) system software
c) application software
d) data bus
Ans. B
140. Any thing or signal given to the computer by the user is termed as
a) input b) data
c) instructions d) command
Ans. A
141. Computer software which is designed only for the use of particular customer or organization
is called
a) program b) application
c) customized software d) system software
Ans. C
149. Computer memory in which each individual byte can be accessed directly is known as
a) ROM
b) RAM
c) DRAM
d) EPROM
Ans. B
151. Hand-held device which is used to pick options that are displayed on a computer screen is
known as
a) keyboard
b) mouse
c) joystick
d) stylus pen
Ans. B
152. In computer, amount of time required by the memory to perform read or write operation and
then return to its original state to ready for the next operation is termed as
a) access time
b) cycle time
c) store time
d) read and write time
Ans. B
155. Pins that are present in a computer dot matrix printer are
a) 9 or 24
b) 20 or 30
c) 8 or 13
d) 5 or 10
Ans. A
156. Computer process of training personnel to use the new system is accomplished during
a) analysis b) design
c) development d) implementation
Ans. D
157. Computer software designed for the use of sale to general public is called
a) package software b) application software
c) system software d) customized software
Ans. A
158. Device which is used to convert spoken words into digital signals is termed as
a) speaker
b) microphone
c) head phone
d) voice-recognition device
Ans. B
161. Colors that can be supported by extended graphic array with a resolution of 1024 by 768
pixels are
a) 102400
b) 7680
c) 10000
d) 65000
Ans. D
162. In computer system, key which is used to delete character on the screen is
a) DEL key
b) backspace key
c) Left arrow key
d) ESC key
Ans. B
P a g e | 687
165. Output device of a computer which is used by applications that include drawing graphics,
making maps, plotting civil engineering drawings and machine components is
a) printer b) display device
c) plotter d) monitor
Ans. C
169. Computer output which can be represent on screen and is not tangible is called
a) software
b) window
c) softcopy
d) desktop
Ans. C
170. In computer, set of instructions used to solve particular problems are termed as
a) program b) software
c) both A and B d) data
Ans. C
P a g e | 688
171. Semiconductor memory device in which stored data will not remain permanently stored even
when power is supplied is called
a) dynamic memory device
b) static memory device
c) flash device
d) storage device
Ans. A
175. In computer, device or electrical circuit which is used to store a single bit is known as
a) memory word
b) memory cell
c) byte
d) RAM
Ans. B
177. Computer device which is used for direct input purpose is termed as
a) transmitter
b) keyboard
c) microphone
d) source data input device
Ans. D
179. Instructions that prepares the computer for the particular use are present in
a) RAM
b) ROM
c) CMOS
d) SAM
Ans. B
186. In computer, number which is used to identifies the location of a word in memory is called
a) code b) address
c) binary number d) location
Ans. B
P a g e | 690
187. Characters that are printed by character printed at a single default time is
a) 1 character
b) 10 character
c) 50 character
d) 6 character
Ans. A
188. Computer operation in which binary word stored in a specific memory location is sensed then
transferred to another location is known as
a) write operation b) read and write operation
c) read operation d) access operation
Ans. C
193. Component of computer which is used to store instructions and data is called
a) storage device
b) memory
c) hard disk
d) USB
Ans. B
200. Key which are used to issue command to the computer are
a) ctrl and alt b) shift and caps lock
c) ctrl and backspace d) alt and shift
Ans. A
203. ____ includes all types of technology used to deal with information.
a) IT
b) MRI
c) Data entry operator
d) None of these
Ans. A
P a g e | 692
206. A channel for communicating across a boundary between two or more subsystem is known
as
(A) Data path (B) Walk through
(C) Act gram (D) Interface
Ans: D
Released in 1979 by Micropro International, WordStar was the first commercially successful word
processing software program produced for microcomputers. It became the best-selling software
program of the early 1980s. Its inventors were Seymour Rubenstein and Rob Barnaby.
MEMORY ORGANISATION
1. A collection of related information sorted and dealt with as a unit is a [SBI Clerk, 2009]
(a) disk (b) data (c) file (d) floppy (e) None of these
Ans. B
2. Reusable optical storage will typically have the acronym——— [SBI Clerk, 2009]
(a) CD (b) DVD (c) ROM (d) RW (e) None of these
Ans. C
3. The most common type of storage devices are— —— [SBI Clerk, 2009]
(a) persistent (b) optical (c) magnetic (d) flash (e) None of these
Ans. B
4. During the –– portion of the Information Processing Cycle, the computer acquires data from some
source. [SBI Clerk, 2009]
(a) storage and output (b) storage (c) input (d) output (e) None of these
Ans. C
5. The contents of ____ are lost when the computer turns off. [IBPS PO, 2011]
(a) storage (b) input (c) output (d) memory (e) None of these
Ans. D
7. Which of the following are advantages of CDROM as a storage media? [IBPS PO, 2011]
(a) CD-ROM is an inexpensive way to store large amount of data and information.
(b) CD-ROM disks retrieve data and information more quickly than magnetic disks do.
(c) CD-ROMs make less errors than magnetic media.
(d) All the above
(e) None of these
Ans. A
9. The time for the actual data transfer after receiving the request for data from secondary storage is
referred to as the disk’s *IBPS Clerk, 2011]
(a) transfer time (b) movement time (c) access time (d) data input time (e) None of these
Ans. C
10. The following computer’s memory is characterised by low cost per bit stored [IBPS Clerk, 2011]
(a) Primary (b) Secondary (c) Hard Disk (d) All of these (e) None of these
Ans. B
P a g e | 694
12. Which contents are lost when the computer turn off ? [IBPS Clerk, 2011]
(a) storage (b) input (c) output (d) memory (e) None of these
Ans. D
13. Which of the following is not an example of hardware? [IBPS Clerk, 2011]
(a) Scanner (b) Printer (c) Monitor (d) Mouse (e) Interpreter
Ans. E
14. ________ is the maximum amount of data that can be stored on a storage medium. [SBI Clerk, 2011]
(a) Magnetic storage (b) Optical storage (c) Solid-state storage (d) Storage capacity (e) None of these
Ans. D
16. ______ acts as temporary high-speed holding area between the memory and the CPU thereby
improving processing capabilities [IBPS Clerk, 2012]
(a) ROM (b) RAM (c) Temporary memory (d) Cache memory (e) Flash memory
Ans. D
17. What type of device is a 3½ inch floppy drive ? [SBI Clerk, 2012]
(a) Input
(b) Output
(c) Software
(d) Storage
(e) None of these
Ans. D
18. Which of the following memory chip is faster ? [SBI Clerk, 2012]
(a) There is no certainty
(b) DRAM
(c) SRAM
(d) DRAM is faster for larger chips
Ans. C
P a g e | 695
19. Which of the following is the second largest measurement of RAM ? [SBI Clerk, 2012]
(a) Terabyte
(b) Megabyte
(c) Byte
(d) Gigabyte
(e) Mega Hertz
Ans. D
22. ___________ a document means the file is transferred from another computer to your computer.
[IBPS PO, 2012]
(a) Uploading (b) Really Simple Syndication (RSS) (c) Accessing (d) Downloading (e) Upgrading
Ans. D
23. Which computer memory is used for storing programs and data currently being processed by the CPU ?
[IBPS PO, 2012]
(a) Mass memory (b) Internal memory (c) Non-volatile memory (d) PROM (e) None of these
Ans. E
24. Which computer was the first to use the magnetic drum for memory ? [SSC, CGL, 2013]
(a) IBM - 650 (b) IBM - 7090 (c) IBM - 701 (d) IBM - 360
Ans. A
31. Where are programs and data kept while the processor is using them?
(a) Main memory (b) Secondary memory (c) Disk memory (d) Program memory (e) None of these
Ans. A
36. Which of the following storage media provides sequential access only?
(a) Floppy disk (b) Magnetic disk (c) Magnetic tape (d) Optical disk (e) None of these
Ans. C
40. If a user needs information instantly available to the CPU, it should be stored –
(a) on a CD (b) in secondary storage (c) in the CPU (d) in RAM (e) None of these
Ans. B
41. To what temporary area can you store text and other data, and later paste them to another location?
(a) The clipboard (b) ROM (c) CD-ROM (d) The hard disk (e) None of these
Ans. A
43. When you make graph and picture in document, then your computer holds the data in __________.
(a) Restore file (b) Backup drive (c) Clipboard (d) Memory (e) None of these
Ans. D
47. __________ is the process of dividing the disk into tracks and sectors.
(a) Tracking (b) Formatting (c) Crashing (d) Allotting (e) None of these
Ans. b
48. The portion of the CPU that coordinates the activities of all the other computer components is the
______.
(a) motherboard (b) coordination board (c) control unit (d) arithmetic logic unit
Ans. C
P a g e | 698
50. A device that reads the information contained on a disk and transfers it to the computer’s memory.
(a) monitor (b) screen (c) keyboard (d) disk drive (e) None of these
Ans. D
54. Decreasing the amount of space required to store data and programs is accomplished by __________.
(a) pressing (b) disk caching (c) RAID (d) crashing (e) file compression
Ans. E
56. Which type of memory holds only that program and data the CPU is presently processing?
(a) CMOS (b) ROM (c) RAM (d) ASCII (e) CD
Ans. C
57. Storage that retains its data after the power is turned off is referred to as _________.
(a) volatile storage (b) sequential storage (c) direct storage (d) non-volatile storage (e) mobile storage
Ans. D
59. Which of the following is equal to 1,048,576 byte (approx one million byte)?
(a) Byte (b) Gigabyte
(c) Memory (d) Megabyte
Ans. D
P a g e | 699
62. Name of round shining portable disk which can store large amount of information and softwares.
(a) CD-ROM (b) Floppy disk (c) Scanner (d) Monitor (e) Laptop
Ans. A
67. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by
the user is
(a) read-only (b) memory-only (c) run-only (d) write-only (e) None of these
Ans. A
68. When you save to _________, your data will remain intact even when the computer is turned off.
(a) RAM (b) motherboard
(c) secondary storage device (d) primary storage device
Ans. C
76. Which of the following devices has a limitation that we can only read it but cannot erase or modify it?
(a) Tape Drive (b) Hard Disk
(c) Compact Disk (d) Floppy Disk
Ans. A
77. Which of the following is the storage area within the computer itself which holds data only temporarily
as the computer processes instructions?
(a) the hard disk
(b) main memory
(c) the control unit
(d) read-only memory
Ans. B
81. The smallest unit of information a computer can understand and process is known as a
(a) digit (b) kilobyte (c) bit (d) byte (e) None of the above
Ans. C
83. The __________ indicates how much data a particular storage medium can hold.
(a) access (b) capacity (c) memory (d) storage (e) None of the above
Ans. B
84. How is it possible that both programs and data can be stored on the same floppy disk?
(a) A floppy disk has two sides, one for data and one for programs.
(b) Programs and data are both software, and both can be stored on any memory device.
(c) A floppy disk has to be formatted for one for the other.
(d) Floppy disk can only store data, not programs.
(e) None of the above
Ans. B
86. The process of preparing a floppy diskette for use is called __________.
(a) assembling (b) translating (c) parsing (d) formatting (e) None of the above
Ans. D
P a g e | 702
87. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by
the user is __________.
(a) memory-only (b) write-only (c) read-only (d) run-only (e) None of these
Ans. C
89. Even if a disk drive fails, the computer application running and using it can continue processing. This
application is said to have been designed with this feature called
(a) 100 percent up-time (b) Fault tolerance (c) High reliability (d) All of these (e) None of these
Ans. B
90. Which media has the ability to have data/ information stored (written) on them by users more than
once? (a) CD-R disks (b) CD-RW disks (c) Zip disks (d) Opti-Disks (e) Both CD-RW disks and Zip disks
Ans. B
91. Storage media such as a CD read and write information using __________.
(a) a laser beam of red light (b) magnetic dots (c) magnetic strips (d) All of these (e) None of these
Ans. A
92. Cache and main memory will lose their contents when the power is off. They are __________.
(a) dynamic (b) static (c) volatile (d) non-volatile (e) faulty
Ans. C
94. Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store
data/information?
(a) floppy diskette (b) hard disk (c) permanent disk (d) optical disk (e) None of these
Ans. B
99. Magnetic tape is not practical for applications where data must be quickly recalled because tape is
(a) a random access medium
(b) expensive
(c) a read-only medium
(d) fragile and easily damaged
(e) a sequential access medium
Ans. E
100. How is it possible that both programs and data can be stored in the same floppy disk?
(a) A floppy disk has two sides, one for data and one for programs.
(b) A floppy disk has to be formatted for one or for the other
(c) Programs and data are both software and both can be stored in any memory device.
(d) Floppy disks can only store data, not programs.
(e) Floppy disks are better than CDs.
Ans. C
101. The signal which shows that a computer is waiting for a command from the user is
(a) prompt (b) event (c) time slice (d) interrupt (e) None of these
Ans. D
104. __________ increase the accuracy of a search by fine-tuning the keywords in the search.
(a) Indexes (b) Italics (c) Compounds (d) Links (e) Operators
Ans. A
P a g e | 704
109. _________ consists of volatile chips that temporarily store data or instructions.
(a) CPU (b) ROM (c) RMA (d) RAM (e) None of these
Ans. D
112. In a sequence of events that take place in an instruction cycle, the first cycle is called
(a) store cycle (b) execute cycle (c) fetch cycle (d) decode cycle (e) code cycle
Ans. C
114. A register that keeps track of the next instruction to be executed is called a/an
(a) Data Register (b) Instruction Register
(c) Action Register (d) Program Counter
Ans. B
119. Which of the following helps to protect floppy disks from data getting accidently erased?
(a) Access notch (b) Write-protect notch (c) Entry notch (d) Input notch (e) None of these
Ans. B
123. A place in the computer system where data and programs are temporarily stored.
(a) paste (b) open (c) memory (d) pocket (e) None of these
Ans. C
125. Which type of memory holds only the program and data that the CPU is presently processing?
(a) CMOS (b) ROM (c) RAM (d) ASCII (e) None of these
Ans. C
127. The part of a computer that coordinates all its functions is called its –
(a) ROM program (b) system board (c) arithmetic logic unit (d) control unit (e) None of these
Ans. D
129. To put information in a file on a magnetic disk, or in a computer’s memory, so it can be used later
__________.
(a) store (b) ship (c) shift (d) centre (e) None of these
Ans. A
132. Which of the following storage media provides sequential access only?
(a) Floppy disk (b) Magnetic disk (c) Magnetic tape (d) Optical disk (e) None of these
Ans. B
134. To what temporary area can you store text and other data, later paste them to another location?
(a) The clipboard (b) ROM
(c) CD-ROM (d) The hard disk
Ans. A
135. The amount of time required by a storage device to retrieve data and programs is its __________.
(a) retrieval speed
(b) capacity
(c) memory
(d) storage
Ans. A
P a g e | 707
138. The main memory of a computer must be large enough to contain the active parts of __________.
(a) the operating system
(b) the applications
(c) input/output storage & working storage
(d) All of these
(e) None of these
Ans. B
139. Which of the following types of memory improves processing by acting as a temporary high-speed
holding area between the memory and the CPU?
(a) RAM
(b) ROM
(c) Cache memory
(d) Flash memory
(e) EPROM
Ans. C
142. The most common storage device for the personal computer is
(a) Floppy disk (b) USB thumb drive (c) Zip disk (d) Hard disk (e) Pen drive
Ans. D
143. Thick, rigid metal platters that are capable of storing and retrieving information at a high rate of speed
are known as
(a) hard disks (b) soft disks (c) flash memory (d) SAN
Ans. A
Programming Concepts
1. Which of the following contains specific rules and words that express the logical steps of an algorithm?
[IBPS Clerk 2014]
(1) Programming language (2) Syntax (3) Programming structure (4) Logical chart (5) Flow chart
Ans. 3
7. ....... serves as the bridge between raw hardware and programming layer of a computer system.
(1) Medium level language (2) Low level language (3) High level language (4) Both ‘1’ and ‘2’
Ans. 1
9. Which of the following computer language is a mathematically oriented language used for scientific
problems?
(1) Fortran (2) Cobol (3) Lisp (4) Prolog
Ans. 1
12. Lisp is the second oldest high level programming language. Here, Lisp stands for
(1) Level Program (2) Level Process (3) List Processing (4) List Program
Ans. 3
19. Which of the following is a programming language for creating special programs like Applets?
[IBPS Clerk 2012]
(1) Java (2) Cable (3) Domain name (4) Net (5) COBOL
Ans. 1
20. Which among the following is/are interpreted language? [SBI PO 2011]
(1) C (2) C + + (3) Java (4) Visual Basic (5) Both ‘3’ and ‘4’
Ans. 5
22. Languages which can easily interact with the hardware are called
(1) High level languages (2) Low level languages (3) Middle level languages (4) All of the above
Ans. B
24. The ……… program is used to convert mnemonic code to machine code. [SBI Clerk 2011]
(1) Debug (2) C + + (3) FORTRAN (4) Assembler (5) None of these
Ans. 4
25. An assembler is a
(1) programming language dependent (2) syntax dependent (3) machine dependent (4) data dependent
Ans. 3
30. Error which occurs when program tried to read from file without opening it is classified as
(1) execution error messages
(2) built in messages
(3) user defined messages
(4) half messages
(5) None of the above
Ans. 1
31. ......... is a cross between human language and a programming language. [IBPS PO 2012]
(1) Pseudocode (2) Java (3) The Java virtual machine (4) The compiler (5) None of the above
Ans. 1
P a g e | 711
Software Concepts
1. Word processing, spreadsheet, and photo-editing are examples of:
a) application software
b) system software
c) operating software
d) platform software
Ans. a
3. System software is the set of programs that enables your computer’s hardware devices and ___
software to work together.
a) management
b) processing
c) utility
d) application
ans. d
5. Personnel who design, program, operate and maintain computer equipment refers to
a) Console-operator
b) Programmer
c) Peopleware
d) System Analyst
Ans. b
6. A computer program that convert an entire program into machine language is called a/an
a) Interpreter
b) Simulator
c) Compiler
d) Commander
Ans. c
7. A computer program the translates one program instructions at a time into machine language is called a
a) Interpreter b) CPU
c) Compiler d) Simulator
Ans. a
P a g e | 712
10. The language that the computer can understand and execute is called
a) Machine language
b) Application software
c) System program
d) All of the above
Ans. a
11. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are
called:
a) instructions
b) the operating system
c) application software
d) the system unit
Ans. a
15. Which language is directly understood by the computer without translation program?
a) Machine language
b) Assembly language
c) High level language
d) None of above
Ans. a
24. FORTRAN is
a) File Translation
b) Format Translation
c) Formula Translator
d) Floppy Translation
Ans. b
25. All of the following terms are associated with spreadsheet software except.
a) worksheet
b) cell
c) formula
d) Virus detection
Ans. d
26. A ____ contains specific rules and words that express the logical steps of an algorithm. (SBI Clerk, 2008)
a) Syntax
b) Programming structure
c) Programming language
d) Logic chart
Ans. a
27. A single application that combines the major features of several types of applications is called (SBI PO
Tier-1, 2008)
a) integrated software b) a suite
c) a combo package d) high-end
Ans. a
30. A set of instructions telling the computer what to do is called [SBI Clerk, 2008]
a) mentor
b) instructor
c) compiler
d) program
Ans. d
31. The first computer were programmed using ___ (SBI Clerk 2007)
a) assembly language
b) machine language
c) source code
d) object code
Ans. b
P a g e | 716
1. In which decade was the American Institute of Electrical Engineers (AIEE) founded?
a) 1850s
b) 1880s
c) 1930s
d) 1950s
Ans. b
5. Most modern TV’s draw power even if turned off. The power is used in does what function?
a) Sound
b) Remote Control
c) Color balance
d) High voltage
Ans. b
9. Who is largely responsible for breaking the German Enigma codes, created a test that provided a
foundation for artificial intelligence?
a) Anan Turing
b) Jeff Bezos
c) George Boole
d) Charles Babbage
Ans. a
10. Made from a variety of materials, such as carbon, which inhibits the flow of current ..?
a) Choke
b) Inductor
c) Resistor
d) Capacitor
Ans. c
11. The most common format for a home video recorder is VHS. VHS stands for …..?
a) Video Home system
b) Very High speed
c) Video Horizontal standard
d) Voltage house standard
Ans. a
14. The first step to getting output from a laser is to excite an active medium. What is this process called?
a) Pumping
b) Exciting
c) Priming
d) Raising
Ans. a
P a g e | 718
17. A given signal’s second harmonic is twice the given signal’s _____ frequency?
a) Fourier
b) Foundation
c) Fundamental
d) Field
Ans. c
20. When measuring the characteristics of a small-signal amplifier, say for a radio receiver, one might be
concerned with its “Noise…”?
a) Fundamental
b) Fall
c) Force
d) Figure
Ans. d
22. The sampling rate, (how many samples per second are stored) for a CD is …?
a) 48.4 kHz
b) 22,050 Hz
c) 44.1 kHz
d) 48 kHz
Ans. c
24. What do we call a network whose elements may be separated by some distance? It usually involves
two or more small networks and dedicated high-speed telephone lines.
a) URL
b) LAN ( Local Area Network)
c) WAN (Wide Area Network)
d) World Wide Web
Ans. c
25. After the first photons of light are produced, which process is responsible for amplification of the light?
a) Blackbody radiation
b) Stimulated emission
c) Planck’s radiation
d) Einstein oscillation
Ans. b
29. In a color television set using a picture tube a high voltage is used to accelerate electron beams to light
the screen. That voltage is about?
a) 500 volts
b) 5 thousand volts
c) 25 thousand volts
d) 100 thousand volts
Ans. b
30. The transformer that develops the high voltage in a home television is commonly called as?
a) Tesla coil
b) Flyback
c) Yoke
d) Van de Graaf
Ans. b
31. Which consists of two plates separated by a dielectric and can store a charge?
a) Inductor
b) Capacitor
c) Transistor
d) Relay
Ans. b
32. What do we call a collection of two or more computers that are located within a limited distance of
each other and that are connected to each other directly or indirectly?
a) Inernet
b) Interanet
c) Local Area network
d) Wide Area network
Ans. c
34. The NTSC (National Television Standards Committee) is also used in the country of ….?
a) Japan
b) France
c) Germany
d) England
Ans. a
35. “FET” is a type of transistor, its full name is ____ Effect Transistor?
a) Field b) Factor
c) Flash d) Force
Ans. a
P a g e | 721
38. Who built the world’s first binary digit computer: Z1?
a) Konrad Zuse
b) Ken Thompson
c) Alan Turing
d) George Boole
Ans. a
39. Compact discs, (according to the original CD specifications ) hold how many minutes of music?
a) 74 mins
b) 56 mins
c) 60 mins
d) 90 mins
Ans. a
2. A computer ________ is a malicious code which self-replicates by copying itself to other programs.
a) program
b) virus
c) application
d) worm
Ans. b
4. The virus hides itself from getting detected by ______ different ways.
a) 2
b) 3
c) 4
d) 5
Answer: b
Explanation: The virus hides itself from getting detected in three different ways. These are by encrypting
itself, by altering the disk directory with additional virus bytes or it uses stealth algorithm to redirect disk
data.
5. _______________ infects the master boot record and it is challenging and a complex task to remove this
virus.
a) Boot Sector Virus
b) Polymorphic
c) Multipartite
d) Trojans
Answer: a
Explanation: Boot Sector Virus infects the master boot record & it is a challenging & a complex task to
remove such virus. Mostly such virus spreads through removable devices.
P a g e | 723
6. ________________ gets installed & stays hidden in your computer’s memory. It stays involved to the
specific type of files which it infects.
a) Boot Sector Virus
b) Direct Action Virus
c) Polymorphic Virus
d) Multipartite Virus
Answer: b
Explanation: Direct Action Virus gets installed & stays hidden in your computer’s memory. Such type of
virus stays involved to the specific type of files which it infects.
8. ______________ are difficult to identify as they keep on changing their type and signature.
a) Non-resident virus
b) Boot Sector Virus
c) Polymorphic Virus
d) Multipartite Virus
Answer: c
Explanation: Polymorphic Virus is difficult to identify as they keep on changing their type and signature.
They’re not easily detectable by traditional antivirus. It usually changes the signature pattern whenever it
replicates itself.
9. Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?
a) Research purpose
b) Pranks
c) Identity theft
d) Protection
Answer: d
Explanation: Computer virus is not created for protection. Virus writers may have other reasons like for
research purpose, pranks, vandalism, financial gain, identity theft, and some other malicious purposes.
13. What kind of attempts is made by individuals to obtain confidential information from a person by
falsifying their identity?
1. Computer viruses
2. Spyware scams
3. Phishing scams
4. None of the above
Ans. 3
16. The difference between a virus and a self-replicating program which is like a virus is that rather than
creating copies of itself on only one system it propagate through computer network. What is the self
replicating program called?
1. Keylogger
2. Cracker
3. Worm
4. All of the above
Ans. 3
18. What is the software called that’s designed to exploit a computer user and is a broad term covering
computer viruses, worms, Trojan, adware, etc.?
A Malware B Spyware C Backdoors D Key-logger
Ans. a
P a g e | 725
19. Which of the following is a software that, once installed on your computer, tracks your internet
browsing habits and sends you popups containing advertisements related to the sites and topics you’ve
visited?
A Adware
B Spyware
C Malware
D Bots
Ans. a
20. Which of the following is a program capable of continually replicating with little or no user
intervention?
A Worms
B Trojan horses
C Virus
D none of these
Ans. c
21. Which of the following is the type of software that has self-replicating software that causes damage to
files and system?
A Worms
B Backdoors
C Viruses
D Trojan horses
Ans. a
23 ….are often delivered to a PC through an email attachment & are often designed to do harm
A E-mail messages B Portals
C Spam D Viruses
Ans. d
24 ….viruses are often transmitted by a floppy disk left in the floppy drive
A Boot sector B Logic bomb
C Trojan horse D Script
Ans. a
25. What is the most common way to get a virus in your computer ‘s hard disk
A By opening emails
B By uploading pictures from mobile phones to the computer
C By installing games from their CDROMS
D None of the above
Ans. a
P a g e | 726
26. _______ is the part of malware such as worms or viruses which performs the malicious action; deleting
data, sending spam or encrypting data.
A Payload
B Spamming
C Exploits
D Scams
Ans. a
27. _________ is the action of recording the keys struck on a keyboard, typically covertly, so that the
person using the keyboard is unaware that their actions are being monitored.
A Keylogging
B Spamming
C Denial of service
D Exploits
Ans. a
28. The attack that focuses on capturing small packets from the network transmitted by other computers
and reading the data content in search of any type of information is ____
A Eavesdropping
B Exploits
C Scams
D Denial of service
Ans. a
29. _________ are computer programs that are designed by attackers to gain root or administrative access
to your computer.
A Backdoors
B Rootkits
C Malware
D Antiware
Ans. b
30. What is the software called which when get downloaded on computer scans your hard drive for
personal information and your internet browsing habits?
A Spyware
B Antiware
C Backdoors
D Malware
Ans. a
31. Which of the following is a type of program that either pretends to have, or is described as having, a set
of useful or desirable features but actually contains damaging code.
A) Trojans
B) Viruses
C) Worm
D) Adware
E) Bots
Ans. a
P a g e | 727
40. What is a software program that has the ability to replicate itself and spread from one computer to
another called?
a) Computer virus
b) Computer memory
c) computer program
d) Computer file
Ans. a
41. Which of the following is the first PC virus detected on ARPANET in 1970s?
a) Michelangelo virus
b) Brain
c) Creeper
d) Carzy.A
Ans. c
44. If your file is infected by a virus and you are sending that infected file to your friend through e-mail,
what happens to your friend’s computer?
a) It will be infected by the virus
b) It will not get affected by the virus
c) My friend cannot receive the file through e-mail
d) You cannot send file through e-mail
Ans. a
47. The viruses that change their appearance to avoid detection are called ___.
a) MBR viruses
b) DBR viruses
c) Parasitic viruses
d) Polymorphic viruses
Ans. d
50. In which of the following files can viruses be sent as email attachments?
a) .exe, .corn
b) .pif, .scr
c) .vbs, .bat
d) All of these
Ans. d
51. Which of the following is used to detect and remove virus from a computer?
a) Virus software
b) Antivirus software
c) Application software
d) System software
Ans. b
53. Which of the following areas does an antivirus check for a virus?
a) boot records
b) Programs
c) All local hard drives
d) All of these
Ans. d
54. Which of the following is performed by an antivirus software on a virus infected file ?
a) Repairs the infected file
b) Deletes the infected file
c) Quarantines the infected file
d) All the above
Ans. d
2. Which of the following is true for testing and debugging? [DRDO CVRDE 2017]
a) Testing checks for logical errors in the programs, while debugging is a process of correcting those errors in the
program.
b) Testing and debugging indicate the same thing.
c) Testing detects the syntax errors in the program while debugging corrects those errors in the program.
d) All of the above
Ans. a
3. Computer systems that store instructions and data without any differences and data from the same memory unit
are based on _____ structure. [DRDO CVRDE 2017]
a) Harvard b) Babbage
c) Knuth d) Von-Neumann
Ans. d
4. In the screen is maximized, then the maximize button will be temporarily replaced by the _____ button. [DRDO
GTRE 2017]
a) Close b) Open
c) Re-store d) Minimize
Ans. c
5. Which of the following is not a ‘over write’ virus ? [RRB Ranchi Asst. Loco Pilot]
a) Trj. Reboot
b) Meve
c) Way
d) Trivial.88.D
Ans. b
6. Which of the following are machine level languages? [ISRO Satelite Centre Bengaluru]
a) C++
b) Java
c) Python
d) None of these
Ans. d
8. Which of the following function(s) is/are provided by operating system? [RRB Ranchi Asst. Loco Pilot]
a) Process management
b) Security Management
c) File management
d) All of these
Ans. d
9. ____ was the first computer language developed for electronic computer in 1949? [RRB Ajmer Asst. Loco Pilot]
a) Short code
b) FORTRAN
c) COBOL
d) Pascal
Ans. a
10. How many layers are there in TCP/IP Model? [Indian Ordnance Factory]
a) 2
b) 4
c) 5
d) 7
Ans. b
11. Program that duplicate the functionality of one system on another system is known as [RRB Chandigarh Asst.
Loco Pilot]
a) Emulators
b) Simulators
c) Evaluators
d) PCB
Ans. a
12. Which of the following is an application protocol? [RRB Ahamadabad Asst. Loco Pilot]
a) HTTP
b) TCP
c) IP
d) UDP
Ans. a
13. Which among them is not an example of mobile operating system? [RRB Chandigarh Asst. Loco Pilot]
a) Android b) Bada
c) Fedora d) Symbian
Ans. c
14. Which of the following is included in Paragraph Formatting in a word processor? [RRB Ahmadabad Asst. Loco
Pilot]
a) Subscript b) Font
c) Underline colour d) Line spacing
Ans. d
P a g e | 733
16. On which of the following storage media, storage of information is organized as a single continuous spiral
groove?
a) RAM
b) Floppy disk
c) Hard disk
d) CD-ROM
Ans. d
17. The addressing mode used in an instruction of the from ADD X,Y is:
a) Absolute
b) Indirect
c) Immediate
d) Index
Ans. d
24. Which of the following is the most appropriate format for graphics that are to be embedded within an internet
document?
a) BMP
b) GIF
c) TIFF
d) HTML
Ans. b
26. An analog signal carries 4 bits in each signal unit. If 1000 signal units are sent per second, then baud rate and bit
rate of the signal are ______ and ______.
a) 1000 bauds/ sec, 500 bps
b) 2000 bauds/sec, 1000 bps
c) 4000 bauds/sec, 1000 bps
d) 1000 bauds/sec, 4000 bps
Ans. d
27. Which of the following data structures is most suitable for evaluating postfix expressions?
a) Stacks b) Queue
c) Linked list d) Tree
Ans. a
28. The number of bits required to represent decimal number 4096 in binary form is _____.
a) 10 b) 13 c) 12 d) 16
Ans. b
P a g e | 735
29. In the context of visual basic, multiple controls of the same type can be grouped into an array, in the same
manner as a collection of data items. Such a grouping is known as:
a) Primary array b) An integer array
c) Secondary array d) Control array
Ans. d
30. Conceptual level, internal level and external level are three components of the three-level RDBMS architecture.
Which of the following is not of the conceptual level?
a) Entities, attributes, relationships
b) Semantic information
c) Constraints
d) Storage dependent details
Ans. d
31. Consider two database relations R and S having 3 tuples in R and 2 tuples in S. What is the maximum number of
tuples that could appear in the natural join of R and S?
a) 2
b) 5
c) 3
d) 6
Ans. d
32. When an ASP.NET file is placed on an IIS server and viewed through a browser, the resulting HTML Page
contains?
a) All ASP.NET code
b) As much ASP.NET code as is in the ASP.NET file
c) all HTML code
d) A mix of ASP.NET and HTML code
Ans. c
33. What result set is returned from the following SQL query? Select customer_name, telephone from customers
where city in (‘Jaipur’,’Delhi’,’Agra’)
a) The customer_name and telephone of all customers
b) The customer_name and telephone of all customers living in Jaipur, Delhi and Agra
c) The customer_name and telephone of all customer Living in either Jaipur, Delhi or Agra
d) The customer _name and telephone of all customers who are not living in Jaipur, Delhi or Agra
Ans. c
35. A condition that is caused by run-time error in a computer program is known as:
a) Syntax error b) Fault
c) Semantic error d) Exception
Ans. d
P a g e | 736
36. A register in the microprocessor that keeps track of the answer or result of any arithmetic or logic operation is
the _.
a) Stack pointer
b) Instruction pointer
c) Program counter
d) Accumulator
Ans. d
38. ______ is an intermediate storage are used for data processing during the extract, transform and load process of
data warehousing.
a) Buffer
b) Virtual memory
c) Staging area
d) inter-storage area
Ans. c
39. Which of the following Java statements declare and allocate a 2 dimensional array of integers with four rows and
five columns?
a) int array [4][5];
b) int array [][]==new int [4][5];
c) int array [5][4];
d) int array [][]=new int [5][4]
Ans. b
40. In ____ all the logic are implemented using registors and transistors.
Ans. Resistor and Transistor logic
41. _____ logic family implements the logic gates using MOSFET devices
Ans. MOS logic
42. For which logic gate, the output is “true” if either, but not both, of the inputs are “true”.
Ans. XOR
45. Contents of one disk to another disk can be done using the command ____
Ans. DISK COPY
P a g e | 737
46. The assembler takes as its source code in _____ language program.
Ans. Assembly
47. In computer graphics, digital differential analyzer is used for ______ of lines, triangles and polygons.
Ans. Rasterization
48. The language that doesn’t use user defined functions, pointers and used defined types is ______
Ans. COBOL
49. ______ is a channel access method used by various radio communication technologies.
Ans. CDMA
54. To make an algorithm in to a program which system can be used that defined by Turing Machine?
Ans. binary
56. What will be the outcome if the true function is contained by hypothesis?
Ans. Unrealizable
59. Electrical Energy can be converted into light using _____ device?
Ans. Emitters
60. Which body transformation will make the objects to move without deformation?
Ans. Translation
62. ______ interface transfer data to and from the memory through memory bus.
Ans. Direct Memory Access
63. Most common register, used to store data taken out from the memory is _____.
Ans. Accumulator
64. Unplanned interrupts which are produced during execution of program is called _____
Ans. Exception
65. ____ algorithm determines whether there is a path between any two nodes in the graph.
Ans. Warshall
66. The unformatted I/O command for reading a tape in FORTRAN is ______
Ans. READTAPE
68. An _____ is a collection of operators and operands that represent a specific value.
Ans. Expression
69. A Grammar which produces more than one parse tree for a sentence is called _____.
Ans. Ambiguous
74. The _____ will scan partition table located within sector, for an active partition.
Ans. Master Boot Record
75. _______ is a file system used to help user to hide different file system complexities.
Ans. Virtual File system
76. We can look up a directory object by supplying its name to the _______ service.
Ans. Directory
77. _____ is a description of sequences of events taken together, lead to a system doing something useful.
Ans. Usecase diagram
P a g e | 739
78. A ______ model is an abstract model that describes how data is represented and used.
Ans. Data model
79. A _____ typically simulates few aspects and may be completely different from final product.
Ans. Prototype
80. The _____ layer provides link between two directly connected nodes.
Ans. Data Link layer
83. A _____ is a general reusable solution to a commonly occurring problem in Software design.
Ans. Design Pattern
85. In, a physical contact is required to be established with the actuator of it, to make/break a connection.
a) proximity switch
b) limit switch
c) relay switch
d) all the above
Ans. b
87. Why is a trailer often added to the end of a frame in the data link layer?
a) Flow control b) Error Control
c) Addressing d) Access control
Ans. B
89. Elimination –Yield Non-Preemptive Multiple Access Mechanism (EY-NPMA) is associated with which of the
following technologies?
a) LAN
b) HIPERLAN
c) ATM
d) TOKEN Ring
Ans. b
90. Which modulation mechanism is used in Bluetooth technology to transform bits to a signal?
a) ASK
b) PSK
c) OPSK
d) GFS
Ans. d
91. SEAL (Simple and Efficient Adaptation Layer) is associated with which AAL sub layer of ATM technology?
a) AAL1
b) AAL2
c) AAL3/4
d) AAL5
Ans. d
95. Which signal received by an 8086 processor indicates that an external device had requested the use of System
bus?
a) HOLD b) INTR
c) TEST d) Ready
Ans. a
P a g e | 741
97. If a multiplexer has 16 input lines, how many selection lines would be necessaiy?
a) 16
b) 8
c) 4
d) 2
Ans. c
98. _____ is used to restore the contents of the cells in synchronous DRAM.
a) Sense amplifier
b) Refresh counter
c) Restorer
d) Restore counter
Ans. a
99. If a block can be placed in a limited set of places in the cache, the cache is said to be
a) Fully associative
b) Set associative
c) Direct mapped
d) Restricted mapped
Ans. b
101. In process Scheduling, which of the following does not belong to a scheduler?
a) Medium Term Scheduler b) Short Term Scheduler
c) Long Term Scheduler d) Average Term Scheduler
Ans. d
102. In Java, which of these keywords must be used to monitor for exceptions?
a) Throw
b) Finally
c) Try
d) Catch
Ans. c
P a g e | 742
103. In Java, if a class member is declared protected, then which type will this member become in a subclass?
a) private member
b) public member
c) protected member
d) static member
Ans. a
104. How many elements will be there in the adjacency matrix if there are 8 verticles?
a) 8
b) 16
c) 32
d) 64
Ans. d
105. In a binary search tree, which of the following traversals print the numbers in ascending order?
a) In-order traversal
b) Pre-order traversal
c) Post-order traversal
d) Level-order traversal
Ans. a
106. DBMS is a ______ that enables user to create and maintain one or more databases.
a) Key
b) File
c) Program
d) Dataset
Ans. c
107. The most efficient lock that allows concurrent transactions to access rows of the same table consistently is
known as
a) Database – level lock
b) Table – level lock
c) Page – level lock
d) Row – level lock
Ans. d
108. In order to maintain transactional integrity and database consistency, what technology does a DBMS deploy?
a) Triggers b) Pointers
c) Locks d) Cursors
Ans. c
109. What kind of the query that retrieves rows from more than one table or view?
a) Delete
b) Insert
c) Join
d) All of the above
Ans. c
P a g e | 743
110. Which of the following attribute of the text-box control allow to limit the maximum characters inside the text-
box-control?
a) size b) len
c) maxlength d) all of these
Ans. c
114. A user right that is assigned to a user and specifying allowable actions on the system such as shutting down a
system is called a
a) User Permission
b) User Account
c) Use Policy
d) User Privilege
Ans. d
116. Which of the following controls is used to duplicate the active layer in photoshop?
a) Ctrl + R b) Ctrl + T
c) Ctrl + J d) Ctrl + D
Ans. c
117. Which of the following methods destroys the session and all the objects stored in a Session object, releasing
their resources?
a) Session.Clear()
b) Session.Abandon()
c) Session.End()
d) Session.Destroy()
Ans. b
120. Which of the following is a 4G mobile telecommunication standard that uses OFDMA and SCFDMA?
a) UMTS b) GSM c) CDMA One d) LTE
Ans. d
121. Which of the following is a technical standard developed by Microsoft, that specifies a common type system
(CTS), Common language specification (CLS) and Virtual Execution System (VES), so that applications written in
multiple high level languages can be executed in different system environments?
a) Open software Foundation (OSF)
b) Common language infrastructure (CLI)
c) Common language Runtime (CLR)
d) Common Standards Revision Group (CSRG)
Ans. b
122. Which of the following elements in HTML5 configures the text that is no longer revelant?
a) <ir>
b) <irt>
c) <c>
d) <s>
Ans. d
P a g e | 745
123. Which of the following keeps state information about the use of I/O components?
a) Shell
b) Kernel
c) CPU
d) Hardware
Ans. b
124. Which of the following uses UDP and a logical connection to transfer files, and is used in bootstrapping diskless
workstations?
a) Network File system (NFS)
b) Trivial File Transfer Protocol (TFTP)
c) File Transfer Protocol (FTP)
d) Dynamic Host configuration Protocol (DHCP)
Ans. b
126. Whicn one of the following terms best describes the sequence of analysis, design, implementation and testing
of a product?
a) Debugging
b) Product Development Cycle
c) Maintenance
d) Flowchart
Ans. b
127. Which of the following status codes does a web API sends on successful execution?
a) 201
b) 500
c) 200
d) 404
Ans. c
128. The process of converting a non-pixel based image into a digital based image is called ______.
a) Raster b) Zip
d) Scale d) Render
Ans. a
129. The process of converting data into various specialized formats to be used on a different device or a system for
various other information processing needs is called _________.
a) Obfuscation b) Encoding
c) Hashing d) Encryption
Ans. b
P a g e | 746
130. During connection establishment phase in TCP, which of the following is vulnerable to serious security problem?
a) URG flooding attack
b) SYN flooding attack
c) ACK flooding attack
d) FIN flooding attack
Ans. b
131. In a network with 75 computers, a mesh topology would require ______ cables.
a) 5550
b) 1208
c) 2775
d) 75
Ans. c
132. In windows registry, which of the following is a registry hive subtree that stores configuration data for the
current hardware profile?
a) HKEY_CURRENT_USER
B) HKEY_CURRENT_CONFIG
C) HKEY_LOCAL_MACHINE
D) HKEY_CLASSES_ROOT
Ans. b
134. A _____ is a collection of key value pair where indexing is done via arbitrary keys of any object type and need
not be an integer index
a) Array b) Range
c) Set d) Hash
Ans. d
135. The block in a file system which contains the control information about individual files is:
a) ifiles block b) super block
c) data block d) inodes
Ans. d
136. A simple sorting algorithm that repeatedly steps through the list to be sorted comparing each pair of adjacent
items and swapping them if they are in the wrong order is called the ______.
a) Bubble sort
b) Quick sort
c) Selection sort
d) Insertion sort
Ans. a
P a g e | 747
139. ______ is the state of transaction when the normal execution of the transaction cannot proceed.
a) Aborted b) Failed
c) Inactive d) Terminated
Ans. b
140. The command which will check if the string begins with “Are” is:
a) ** $string == ‘Are*’ ++
b) ** $string == ‘*Are*’ ++
c) ** $string == “Are*” ++
d) [[ $string == Are* ]]
Ans. c
142. If all the columns in a table describe and depend upon primary key, then the table is said to satisfy ______.
a) 2 NF b) 3 NF
c) 4 NF d) 1 NF
Ans. b
145. The protocol jointly developed by Mastercard and VISA for secure financial transactions, which uses standard
Digital Certificates like X.509 Certificate is called _______.
a) Secure Electronic Transaction (SET)
b) Transmission Control Protocol/Internet Protocol (TCP/IP)
c) Hypertext Transfer Protocol Secure (HTTP-S)
d) File Transfer Protocol (FTP)
Ans. a
146. How much faster is binary search when compared to linear search?
a) exponentially faster b) twice as fast c) faster by a factor of log n d) n times faster
Ans. b
147. This sort does not used divide and conquer methodology –
a) Bubble sort b) Merge sort
c) Quick sort d) All of the above
Ans. b
148. A CPU has 32-bit address bus. How much memory can it address?
a) 4 GB b) 1 GB c) 2 GB d) 8 GB
Ans. b
150. Consider subnet mask of class B network on the internet is 255.255.240.0 What is the maximum number of
hosts per subnet?
a) 4096 b) 4098 c) 4092 d) 4094
Ans. b
155. Which of the following statements about search engine is true? [CBSE 2011]
a) Search engines distinguish between appropriate and inappropriate sites.
b) Search engines have fixed hours of use.
c) Search engines do not provide relevant information.
d) Search engine is a program designed to search for information on the web using keywords.
Ans. d
156. Which software browse the internet in a systematic manner? [CBSE 2013]
a) Web crawler b) Web browser
c) Indexing software d) Search algorithm
Ans. a
Explanation: Web crawlers, also called bots or spiders or agents are small programs that follow links from already
known pages to the new ones, that need to be discovered. Web search engine works by storing information about
web pages, retrieved by a web crawler.
158. Which of the following sites, would you prefer for shopping? [CBSE 2011]
a) www.yahoomail.com
b) www.hdfc.com
c) www.msn.com
d) www.amazon.com
Ans. d
159. A term used for determining the availability and booking of tickets online is:
a) E-booking b) E-shopping c) E-reservation d) E-book
Ans. c
Explanation: E-reservation includes the process of booking/reservation of tickets, hotel rooms, tourist packages etc.
through internet.
173. Which of the following is not a reason for the popularity of online shopping?
a) same day delivery not possible
b) Order and delivery status can be checked
c) Large variety of products to compare
d) All of the above
Ans. a
177. In the binary language each letter of the alphabet, each number and each special character is made up of a
unique combination of:
a) eight bytes b) eight characters c) eight bits d) eight kilobytes
Ans. c
181. The program which are as permanent as hardware and stored in ROM is known as
a) Hardware
b) Software
c) Firmware
d) ROM ware
Ans. c
182. What is a popular program for creating documents that can be read on both a PC and a Macintosh computer?
a) Microsoft word
b) Adobe in Design
c) Adobe Acrobat
d) QuarkXPress
Ans. c
183. What type of software creates a smaller file that is faster to transfer over the internet?
a) MPEG b) Unzipped
c) Fragmentation d) Compression
Ans. d
184. A unit of computer information that contains data as well as all the procedures or operations is called:
a) A method b) Encapsulation
c) An object d) An OOP
Ans. c
P a g e | 753
186. The most widely used type of database management system is the:
a) Flat database
b) Network database
c) Relational database
d) Hierarchical database
Ans. c
187. What is the newest type of database, which is well suited for multimedia applications, called?
a) Object-oriented database
b) Client/server database
c) Data warehouse
d) Multimedia database
Ans. a
189. The type of printer that prints by selectively unchanging static electricity from spots on a metal drum is a(n):
a) Plotter
b) Dot-matrix printer
c) Laser printer
d) Ink-jet printer
Ans. c
191. Setting fonts for the text in your document is an example of:
a) Formatting b) Formulas
c) Tracking changes d) Tools
Ans. b
P a g e | 754
192. Server uses _____ applications software to support its client computers.
a) back end
b) front end
c) programming
d) java
Ans. a
194. What type of software must be used to translate scanned text into a format that can be manipulated?
a) OCR
b) CRT
c) RGB
d) MIDI
Ans. a
198. Which of the following extends data across networks rather than store it in one central site?
a) PIM b) File manager
c) Distributed database d) Data mining program
Ans. c
P a g e | 755
206. Device on one network can communicate with devices on another network via______
a) File server
b) Utility server
c) Printer server
d) Gateway
Ans. d
209. When more than one window is open, to switch to the next window _____ is the key combination.
a) Ctrl + F5
b) Ctrl + F6
c) Ctrl + F7
d) Ctrl + F8
Ans. b
212. A set of rules for creating markup languages that enables programming to capture specific types of data by
creating their own elements is called ______
a) XML b) HTML
c) Ada d) XHTML
Ans. a
P a g e | 757
215. Which backup method only backs up files that have been modified since the last backup?
a) Incremental backup
b) Partial backup
c) Selective backup
d) Full backup
Ans. a
217. If you want to connect to your own computer through the internet from another location, you can use _____
a) e-mail
b) FTP
c) instant message
d) Telnet
Ans. d
218. Where does most data go first with in a computer memory hierarchy?
a) RAM
b) ROM
c) BIOS
d) Cache
Ans. a
220. Computer process data into information by working exclusively with ____
a) multimedia
b) words
c) characters
d) numbers
Ans. c
222. ______ store data temporarily and pass it on as directed by control unit.
a) Address
b) Register
c) Number
d) Memory
Ans. b
223. A device that is used to transmit data from one location to another location is known as ______
a) Storage
b) Memory
c) Carrier
d) All of the above
Ans. c
224. Program developed by an outside supplier and provided to the user in a machine readable form is known as
_____
a) Canned programs
b) Beta program
c) Alpha program
d) All of the above
Ans. a
225. Which of the following describe one or more characteristics of a modem computer?
a) An electronic device
b) A mechanical device
c) An electro-mechanical device
d) All of the above
Ans. a
228. The sharing of a medium and its path by 2 or more devices is called _____
a) Modulation
b) Encoding
c) Line discipline
d) Multiplexing
Ans. d
231. Programming language built into user programs such as Word and Excel are known as ______.
a) 4GLs
b) Macro language
c) object-oriented language
d) visual programming languages
Ans. d
234. Instructions and data that are processed by the CPU are located in _______
a) CD-ROM
b) RAM
c) The motherboard
d) The hard disk
Ans. b
235. The commonly used UNIX commands like date, is, cat etc. are stored in ______
a) dev directory
b) bin directory
c) tmp directory
d) unix directory
Ans. b
237. ______ is a method in which communication devices are connected to one another effieciently.
a) Switching
b) Redundancy
c) Capacity
d) Detecting
Ans. a
240. _____ is the combination of keys to switch between the last four places that you have edited.
a) Alt + Ctrl + Z b) Alt + Ctrl + Y
c) Alt + Tab + Z d) All of the above
Ans. a
P a g e | 761
241. The number of null links in a binary tree with n nodes is:
a) n-1
b) n
c) n+1
d) 2n
Ans. c
243. An equivalent decimal number of (234.55)8 is ____ [BSNL TTA J.E. 21.2.2016]
a) (106.703)10
b) (153.703)10
c) (146.703)10
d) (308.703)10
Ans. b
244. 0110 in binary form can be written as ______ in decimal form (UPPCL JE Electrical, 11.11.2016)
a) 4
b) 5
c) 6
d) 7
Ans. c
247. Number of bits needed to code 256 operations is: [RRB SSE (Shift-II), 03.09.2015)
a) 4 b) 6
c) 8 d) 16
Ans. c
P a g e | 762
248. The binary representation of the decimal number 45.25 is – [RRB JE (Shift-I), 29.08.2015]
a) (101101.01)2
b) (101101.10)2
c) (101010.01)2
d) (1010101.10)2
Ans. a
249. The 2’s complement of the binary number (11001100)2 is (RRB SSE (Shift-II), 01.09.2015)
a) (00110100)2
b) (00110011)2
c) (00110000)2
d) (11110100)2
Ans. a
250. Hexadecimal equivalent of binary number 1010 is: (RRB JE (Shift-III), 16.09.2015)
a) A
b) B
c) C
d) D
Ans. a
251. In Binary coded decimal (BCD) systems, the decimal number 81 is represented as – (RRB JE (Shift-III),
16.09.2015)
a) 10000001
b) 10100010
c) 01010001
d) 00011000
Ans. a
252. The value of the binary 11111 is: (RRB SSE Secunderabad Red Paper, 21.12.2014)
a) 24-1
b) 24
c) 25
d) 25-1
Ans. d
253. The 2’s complement of the Binary number (1101100)2 is – (RRB JE (Shift-II), 04.09.2015)
a) (00100011)2
b) (11110000)2
c) (00100100)2
d) (00001111)2
Ans. c
254. The octal equivalent of decimal number 66 is- (RRB JE (Shift-2), 29.8.2015)
a) 102 b) 104
c) 84 d) 82
Ans. a
P a g e | 763
255. The decimal representation of the binary number (101010.011)2 is (RRB JE (Shift-2), 29.8.2015)
a) 42.25 b) 24.25
c) 24.375 d) 42.375
Ans. d
256. The 2’s complement of the binary number (00111100)2 is: (RRB SSE (Shift-III), 01.09.2015)
a) (11000100)2
b) (11000011)2
c) (00110000)2
d) (11110100)2
Ans. a
257. Considering 1’s complement representation for negative numbers, -85 will be stored into an 8-bit memory
space as (RRB SSE Secundrabad (Shfit-I), 02.09.2015)
a) 10101010
b) 10111111
c) 10100110
d) 11101001
Ans. a
259. The 2’s complement of the binary number (00000000)2 is (RRB JE (Shift-III), 26.08.2015)
a) (11111111)2
b) (00000000)2
c) (10101010)2
d) (01010101)2
Ans. b
261. If 1 is added after 1’s complement of a binary number, then: (UPPCL JE Trainee-2014)
a) Finds 9’s complement of a binary number
b) Binary number remains same
c) Binary number will be negative
d) Finds 2’s true complement of binary number
Ans. d
P a g e | 764
262. The 2’s complement of the binary number 100100 is: (U.P.S.I. Computer Operator (Shift-I) -2016)
a) 011101 b) 011110
c) 111100 d) 011100
Ans. d
263. Decimal number -4 is represented in 2’s complement form as:- (Uttrakhand A.E. Paper-II, 2013)
a) 0100
b) 1011
c) 1100
d) 1010
Ans. c
264. What is the addition of (-64)10 and (80)16? (BSNL JE (TTA) Junior Engineer Exam 2015)
a) (-16)10
b) (16)10
c) (1100000)2
d) (01000000)2
Ans. d
265. The decimal equivalent of the hexadecimal number E5 is: (UPRVUNL JE Control and Instrumentation 2015)
a) 279
b) 229
c) 327
d) 227
Ans. b
266. Which of the following binary number is equal to octal number 66.3 (ISRO 2007)
a) 101101.100
b) 1101111.111
c) 111111.1111
d) 110110.011
Ans. d
268. The 2’s complement of the number 1101101 is: (Senior Assistant Electronics – 2016)
a) 0101110
b) 0111110
c) 0110010
d) 0010011
Ans. d
P a g e | 765
269. FG Hexadecimal can be written in Binary system as: (BSNL TTA J.E. 27.09.2016)
a) 11111100
b) 11110011
c) 11111111
d) Not a valid Hexadecimal Number
Ans. d
270. How many bytes are there in binary number 1001101000111010? [BSNL TTA J.E. 27.09.2016]
a) 1
b) 2
c) 3
d) 4
Ans. b
271. The binary equivalent of decimal number 17 is: (BSNL TTA J.E. 27.09.2016)
a) 10001
b) 0111
c) 100001
d) 11111
Ans. a
272. The resultant binary of the decimal problem 49+1 = is _____: (BSNL TTA J.E. 27.09.2016)
a) 00110101
b) 01010101
c) 00110010
d) 00110001
Ans. c
273. Binary numbers can be converted into hexadecimal numbers by grouping bits into group of _____ starting from
_____ and represented each group as Hexadecimal number. (BSNL TTA J.E. 21.2.2016)
a) Three bits, Right Most bit
b) Three bits, Left Most bit
c) Four bits, Right Most bit
d) Sixteen bits, Left Most bit
Ans. c
Explanation: बाइनरी से हेक्साडेससमल में पटरवर्कन करने के सलए LSB से चार-चार बाइनरी सबट्स के समूह बनाये जार्े है | उसके
पश्चार् प्रत्येक समूह को उसके हैक्स र्ुल्यांक से प्रसर्स्थासपर् क्वकया जार्ा है |
274. Convert 1000 of BCD code into Excess 3 code. [Delhi Metro Electronic JE 2017]
a) 1010
b) 1011
c) 1100
d) 0110
Ans. b
Explanation: BCD कोड से excess 3 कोड में पटरवर्कन के सलए BCD कोड में 0011 जोड़ कर देर्े है वही उनका Excess 3 code
होर्ा है |
P a g e | 766
275. The decimal equivalent of (101011)2 is: (LMRC SC/TO Shift-2 J.E. 2016)
a) 48
b) 54
c) 44
d) 43
Ans. d
276. Two’s complement of the binary number 10010100 is: (Noida Metro Electronic JE 2017)
a) 01101100
b) 11101100
c) 01101011
d) 10001011
Ans. a
288. (BABA)16 in hexadecimal is what in octal? (U.P. Police Computer Operator – 2013)
a) 134272
b) 132272
c) 135272
d) 135242
Ans. c
289. Binary equivalent of octal number 705 is: (U.P.S.I Computer operator (Shift-I) 2016)
a) 1110101
b) 1010111
c) 111000101
d) 101000111
Ans. c
290. Addition of binary number 11011 and 10111 is: (U.P.S.I. Computer Operator (Shift-1) 2016)
a) 10010
b) 11001
c) 110010
d) 010010
Ans. c
P a g e | 767
291. The value of substraction of (145)8 from (207)8 is: (U.P.S.I. Computer Operator (Shift-I) 2016)
a) (42)8 b) (602)8 c) (402)8 d) (62)8
Ans. a
292. Total different symbols used in hexadecimal number system are ______ (U.P.S.I. Computer Operator (Shift-1)
2016)
a) 8
b) 4
c) 16
d) 2
Ans. c
293. Addition of binary number 10011 and 11101 are: (U.P.S.I. Computer Operator (Shift-1) 2016)
a) 11000
b) 10000
c) 10001
d) 110000
Ans. d
294. In Octal number system, the different symbol are used is: (U.P.S.I. Computer Operator (Shift-II) 2016)
a) 8
b) 2
c) 16
d) 4
Ans. a
295. What is binary equivalent of decimal number 121? (U.P.S.I. Computer Operator (Shift-II) 2016)
a) 1111111
b) 1001111
c) 10000001
d) 1111001
Ans. d
296. The value of difference of (A0)16-(6A)16 is: (U.P.S.I. Computer Operator (Shift-II) 2016)
a) (30)16
b) (46)16
c) (36)16
d) (63)16
Ans. c
297. 8’s complement of octal number (6100)8: (U.P.S.I. Computer Operator (Shift-II) -2016)
a) (1677)8 b) (1700)8 c) (2700)8 d) (6100)8
Ans. b
हल: यहााँ पर पहले 7’s complement number सनकालेंगे | 7’s कॉम्पप्लीमेंि नंबर सनकालने के सलए डी गयी ऑक्िल संख्या के प्रत्येक
अक्षर को 7 में से घिाएंगे | जैसे: 7777-6100 = 1677
अब सनकालेंगे 8’s कॉम्पप्लीमेंि, 7’s कॉम्पप्लीमेंि में 1 जोड़ कर 1677+1=1678 Octal (लगभग)
P a g e | 768
298. 15th complement of hexadecimal number (A01)16 is: (U.P.S.I. Computer operator (Shift-II) 2016)
a) (5F0)16 b) (6EE)16 c) (6E0)16 d) (5FE)16
Ans. d
Solution: FFF-A01 = 5FE
299. Gray code of decimal 3 is: (U.P.S.I. Computer Operator (Shift-II) 2016)
a) 1001
b) 0010
c) 0110
d) 1100
Ans. b
300. Binary code of decimal number 27 would be: (UPRVNAL AE Electrical Instrumentation 2014)
a) 010110
b) 011011
c) 110110
d) 101010
Ans. b
301. The conversion of 10101111100.0112 to octal is: (KVS JE Electrical & Electronic 2016)
a) 2671.328
b) 2561.348
c) 2545.348
d) 2571.348
Ans. d
302. The decimal number represented by 110011.00101 is: (UPPCL Electronic & Telecom. (AE.) 2016)
a) 59.9864
b) 43.33225
c) 625.5115
d) 51.15625
Ans. d
303. 11001, 1001 and 111001 correspond to the 2’s complement representation of which one of the following sets
the number? (DMRC Electronic, 2014)
a) 25, 9 and 57 respectively
b) -6, -6 and -6 respectively
c) 7, 7 and 7 respectively
d) -25, -9 and -57 respectively
Ans. c
304. Given the decimal number 19, an eight bit 2’s complement representation is given by: (ISRO Electronic, 2006)
a) 11101110
b) 11101101
c) 11101100
d) None of these
Ans. b
P a g e | 769
305. BCD coding scheme uses _____ bits to code decimal digits. (RRB JE (Shift-III), 26.08.2015)
a) 4 b) 8 c) 16 d) 32
Ans. a
हल: BCD - इसमें सम्पपूर्क डेसीमल संख्या को बाइनरी में बदलने की बजाय डेसीमल संख्या के प्रत्येक अंक को उसके चार अंकीय
बाइनरी र्ुल्यांक से प्रसर्स्थासपर् कर क्वदया जार्ा है | इसे 4 सबि BCD कोड कहा जार्ा है | इसे 8421 कोड भी कहर्े है |
307. In a binary number, the leftmost bit is called: (RRB SSE (Shift-II), 03.09.2015)
a) Most significant bit/सबसे महत्वपूर्क सबि
b) Least significant bit/कम से कम महत्वपूर्क सबि
c) Carry bit
d) Extra bit
Ans. a
310. Among the following mentioned codes which one is capable of both error detection and correction? (UPRVUNL
JE Instrumentations Electronics 2014)
a) Hamming code b) Repetition code
c) Unicode d) Both A and B
Ans. d
311. The standard binary code for alphanumeric character is: (BSNL (JTO)-2009)
a) ASCII b) GRAY c) BCD d) Excess-3
Ans. a
P a g e | 770
313. The ‘radix’ of an octal system is: (Noida Metro Electronic JE 2017)
a) 8
b) 2
c) 16
d) 5
Ans. a
314. Gray code of decimal number 2 is _____ (U.P.S.I. Computer Operator (Shift-1) 2016)
a) 0010
b) 1000
c) 0011
d) 0101
Ans. c
315. Fastest memory cell is: (UPRVUNL JE Control & Instrumentation 2015)
a) Bubble memory
b) Semiconductor RAM
c) Semiconductor Memory
d) Superconductor Memory
Ans. c
316. The number of bits needed to address 4k memory is: (UPRVUNL JE Control & Instrumentation 2015)
a) 6
b) 8
c) 12
d) 16
Ans. c
317. The number of address lines in a 8 bit 4K ROM is: (BSNL (JTO) 2001)
a) 8
b) 10
c) 12
d) 16
Ans. c
318. The basic memory cell in a DRAM is a ____ (Uttarakhand JE Electrical (Paper-1) 2013)
a) MOSFET
b) Capacitor
c) Capacitor and a MOS switch
d) Flip-Flop
Ans. c
P a g e | 771
319. In microprocessor based system DMA refers to: (Noida Metro Electronic JE 2017)
a) Direct memory access for the user
b) Direct memory access for the microprocessor
c) Direct memory access for the microprocessor and user
d) Direct memory access for the i/o devices
Ans. d
320. What is the magnitude of data stored by a latch? (Noida Metro electronic JE 2017)
a) 8 bit of data
b) 1 bit of data
c) 4 bit of data
d) 16 bit of data
Ans. b
321. A microprocessor with 12-bit address bus will be able to access ______ kilobyte of memory. (ISRO 2011)
a) 0.4
b) 2
c) 10
d) 4
Ans. d
322. What is the name of the computer program that simulates the though process of human beings? [NCVT COPA
(D/S-2/2018)
a) Human logic
b) Expert reason
c) Expert system
d) Personal information
Ans. c
323. If the English Philosopher Thomas Hobbes could be called ‘grandfather; of artificial intelligence, then who could
be called its father? [Mumbai Post Trust 2015]
a) A.M Turning
b) John McCarthy
c) Allen Newell
d) Herbert Simon
Ans. b
324. How may ALU(s) is/are control by one control unit is SIMD (single instruction stream, multiple data stream)
architecture? (WRD 2014)
a) One or more ALU’s
b) One ALU
c) Only two ALU
d) Impossible to say
Ans. a
Explanation: natural language understanding (NLU) आर्टिफीससयल इं िेसलजेंस की एक शाखा है जो text या भाषर् प्रारूप में
वाक्यों के रूप में क्वदए गए इनपुि को समझने के सलए, कं प्यूिर का उपयोग करने के सलए काम करर्ी है | यह नेचुरल लैंग्वेज इं िरफ़े स
र्था नेचुरल लैंग्वेज फ्रंि एंड के रूप में उपयोग क्वकया जार्ा है |
P a g e | 772
325. What ability does a computer require in order to pass the standard Turing test? (HNL 2015)
a) vision b) manipulation of objects c) reasoning d) all of the above
Ans. c
Explanation: ट्यूटरग िेस्ि एलन ट्यूटरग द्वारा 1950 में सवकससर् एक मशीन की क्षमर्ा का परीक्षर् है, जो मानव के समान र्कक शसि
या बुसिमान व्यवहार प्रदर्शशर् करर्ा है |
326. In order to protect computer system from viruses, we use _____ software. (CSIR 2016)
a) Antivirus
b) Anti worm
c) Application
d) Firewall
Ans. a
331. The three dimensions of system integrity do not include [BHEL (Trade Apprentice 2019)]
a) accuracy
b) completeness
b) security
d) appropriateness
Ans. b
P a g e | 773
332. The component that use battery power to store the configuration information of a computer is known as the
(NMDC-Technician 15.06.2019)
a) BIOS b) RAM c) CMOS d) OS
Ans. c
333. Which of the following is not one of the characteristics of the first generation of computers? (NHPC Trade
Apprenticeship 2018)
a) Vacuum Tubes
b) Integrated circuits
c) Magnetic Drums
d) Punched cards
Ans. b
334. The person credited with designing the Harvard Mark I compute is: (HAL Trade Apprenticeship 2018)
a) Aiken
b) Atansoff
c) Eckert
d) Mauchly
Ans. a
335. Which computer pioneer was also a Rear Admiral of the U.S. Navy? (Indian Rare Erath Limited 2016)
a) Steve Jobs
b) John Backus
c) John von Neuman
d) Grace Hooper
Ans. d
337. The first fully transistorized computer ___ (UPSSC Instructor 2016)
a) EDSAC b) EDVAC
c) TRADIC d) TRANSIC
Ans. c
Explanation: TRADIC stands for Transistor Digital Computer या Transistorised Airbornic digital computer यह संयुि
राज्य अमेटरका का पहला ट्ांसजस्िटरजड कोम्पप्ज्िर था, सजसे 1954 में पूरा क्वकया गया था |
338. Hyper threaded P4 cable was introduced by: (THD Apprentices 2017)
a) Linux b) IBM c) Intel d) Cyrix
Ans. c
P a g e | 774
340. The method of painting each row of video frame from top to bottom is called _____ (ECILO 2018)
a) Progressive video
b) interlacing
c) deinterlacing
d) reducing
Ans. a
342. Most of the shortcut keys are designed to use ____ and ____ key along with one or two characters. (HMT 2016)
a) Ctrl
b) Alt
c) Both A & B
d) None of them
Ans. c
343. Processor, main memory (RAM), hard disk, CD/DVD drive, CMOS, BIOS chip, etc. are housed inside _____ (ITI
COPA D/S-1.2018)
a) Input unit
b) Central processing Unit (CPU)
c) output unit
d) all of them
Ans. b
347. Theoretical definition of a general purpose computer was provided by _____ (WCRJ Jabalpur 2012)
a) Allen Turing
b) John Napier
c) Blaise Pascal
d) Edmund Gunter
Ans. a (He is also called Father of Theoretical Compute Science)
348. Second generation computer was created in the year. (Indian Rare Earth Limited 2016)
a) 1945
b) 1959
c) 1965
d) 1971
Ans. b
(सद्वर्ीय पीढ़ी 1955-1964 ई. के मध्य का समय है | इस पीढ़ी में आंकड़ों को संग्रसहर् करने के सलए मैग्नेटिक सडस्क र्था िेप का उपयोग
क्वकया जार्ा था | इस पीढ़ी के कं प्यूिर है : IBM 1401, Honey well 200, CDC 1604)
349. _____ the meaning of the word is a collection of programs. (MMC Tradesman 2017)
a) Information
b) Hardware
c) Software
d) compact
Ans. c
350. In a computer, the system identifies a file by its ____ (ECIL 2018)
a) Name
b) Absolute Path
c) File owner
d) Inode number
Ans. a
351. In the 8085 microprocessor, which of the following is NOT a maskable interrupt? (HMT 2016)
a) TRAP b) INTR c) RST 7.5 c) RST 6.5
Ans. a
352. Which of the following is a 4th generation programming language? (FACT 2018)
a) C b) SQL c) BASIC d) Mercury
Ans. b
353. Which of the following are the components of CPU? (Rajasthan High Court 2013)
a) RAM and ROM b) ALU and Memory
c) ALU and Registers d) ALU and Control
Ans. d
P a g e | 776
354. Which of the following provides internal storage to the CPU? (ITI COPA 2016)
a) Register b) Register and RAM
c) RAM d) Hard Disk
Ans. a
355. The program instructions are represented in binary and stored in the _____ from which they are fetched,
decoded and executed by the CPU. (ITI COPA 2015)
a) Memory
b) Memory and Chip
c) Chip
d) Control Unit
Ans. a
356. A _____ shows how operational attributes are linked together and contributes towards realizing computer’s (ITI
COPA 2016)
a) component design
b) computer architecture
c) computer working
d) computer organization
Ans. d
359. Which of the following is used primarily for cache storage? (FMTTI 2013)
a) DVD b) DRAM
c) SRAM d) Blue-ray Disk
Ans. c
361. The data will remain in the process. (MP High Court 25.01.2019)
a) Secondary Storage Unit
b) Memory Unit
c) Read protected Unit
d) Control Unit
Ans. a
362. ENIAC, EDVAC are example of ______ generation of computers. (BSF HC Radio Mechanic)
a) Second
b) Third
c) Fourth
d) First
Ans. d
363. Which of the following can support many users at one time? (ECIL 2018)
a) Palm Top
b) PC
c) Micro Computer
d) Mini Computer
Ans. d
Explanation: समनी कं प्यूिर को समड रें ज कं प्यूिर भी कहा जार्ा है क्योंक्वक यह माइक्रो कं प्यूिर से बड़ा और मेनफ्रेम कं प्यूिर से छोिा
होर्ा है | समनी कं प्यूिर के उदाहरर् है IBM’s AS400e, Honey Well 200, TI-990
364. Mainframe computers are not more powerful than ______. (HMT 2016)
a) Super computer
b) Mini computer
c) Personal computer
d) Micro computer
Ans. a
365. The modernization of modern computers has been possible, using the following. [ITI COPA 2016]
a) Transister
b) Integrated Circuit Chip
c) Nano Material
d) Ultra Operator
Ans. b
367. Which of the following devices is used to print very large drawings or complex line art by mechanical movement
of a pen on a paper? [NHPC Trade Apprenticeship 2018]
a) Ink Jet Printer b) Scanner
c) Line Printer d) Plotter
Ans. d
P a g e | 778
368. Which output device draws pictures on a paper based on the commands given from a computer using a pen?
[NHPC Trade Apprenticeship 2018]
a) Scanner
b) Monitor
c) Inkjet Printer
d) Drum Plotter
Ans. d
369. Parallel ports usually are not used to connect ______ [BSF HC Radio mechanic)
a) Modem
b) Scanner
c) Printer
d) CD Writer
Ans. a
370. A Combination of the keyboard and the visual display unit is called a _____. [MMC Tradesman 2017]
a) mouse
b) port
c) terminal
d) cable
Ans. c
371. Which among the following input devices consists of a stick which pivots on a base and reports its angle or
direction of the CPU? [UPSSC Instructor 2016]
a) Microphone
b) Light pen
c) Keyboard
d) Joystick
Ans. d
372. What is the process of input output, processing and storage done under the supervision of the unit? [FACT
2018]
a) ALU
b) Output unit
c) Control Unit
d) Memory unit
Ans. c
373. Which of the following is not a valid category of “system bus” in a computer system? *Rajasthan High Court
2013]
a) Data bus b) Control Unit c) Address Bus d) Memory bus
Ans. d
374. Which of the following CPU registers stores the address of the next instruction to be executed? [ITI COPA 2015]
a) Program Counter Register b) Accumulator register
c) Instruction register d) Memory address register
Ans. a
P a g e | 779
375. Which of the following function as the central nervous system for other components of a compute system?
[Mumbai Port Trust 2015]
a) Registers
b) Primary memory
c) Arithmetic and logic unit
d) Control unit
Ans. d
377. A micro processor has 24 address lines and 32 data lines. If uses 10 bits of opcode, the size of Memory bugger
register is _____ [FMTTI 2013]
a) 22 bits
b) 24 bits
c) 32 bits
d) 14 bits
Ans. c
380. Which is the fastest type of printer? [NHPC (Trade Apprenticeship) 2018]
a) Laser b) DotMatrix
c) Inkjet Printer d) Plotter
Ans. a
381. In Laser printer, the Laser beam produces _____ charge on paper, which makes the toner powder to adhere to
the charged area. [Mumbai Port Trust 2015]
a) (-)ve b) (+)ve
c) Neutral d) None of them
Ans. a
P a g e | 780
382. Select the incompatible device from the following options. [Rajasthan High Court 2013]
a) Scanner
b) Keyboard
c) WebCam
d) Printer
Ans. d
383. Which of the following printers can use continuous paper instead of one sheet? [ITI COPA 2017]
a) Ink Jet Printer
b) Dot Matrix Printer
c) Ink Jet & Laser Printer Both
d) Laser Printer
Ans. b
384. Which type of printers uses light to produce the dots needed to form the characters to be printed on a page?
a) Line Printers
b) Chain Printers
c) Laser Printers
d) Dot Matrix Printers
Ans. c
386. Which of the following is a real-time operating system? [ITI COPA 2016]
a) MS-Windows
b) Linux
c) Windows CE
d) IOS
Ans. c
391. Which of the following checks cannot be carried out on the input data to a system? [ITI COPA 2016]
a) Range check
b) Syntax check
c) Consistency check
d) All of the above
Ans. b
392. Which of the following is not true about an interpreter? [ITI COPA 2016]
a) Interpreter generates an object program from the source program
b) Interpreter analysis each source statements every time it is to be executed
c) Interpreter is a kind of translator
d) All of the above
Ans. a
394. In a computer, Disk scheduling involves deciding. [Mumbai Port Trust 2015]
a) Which disk should be accessed next
b) the order in which disk access requests must be serviced
c) the physical location where files should be accessed in the disk
d) None of these
Ans. b [Disk scheduling is also called I/O Scheduling]
395. In windows 8, the screensaver setting include the _____ tab. [MP Vyapam 08.11.2016]
a) 2 b) 4 c) 3 d) 1
Ans. d
(सवडोज 8 माइक्रोसॉफ्ि द्वारा बनाया गया है और यह 26 अक्िू बर 2012 से मार्ककि में उपलब्ध है सवडोज 8 में स्क्रीन सेवर सेटिग में
एक िैब शासमल है)
P a g e | 782
396. Which of the following is not the option in the screensaver setting dialog box? [ITI COPA 2015]
a) Circles
b) 3D Texts
c) Ribbons
d) समस्िीफाई
Ans. a
397. Which of the following is not a process for windows setup? [ISRO IPRC 2017]
a) Offline configuration
b) Online configuration
c) Windows PE
d) Down-level
Ans. a
398. In windows 7, how many boxes are available under the ‘Taskbar’ Tab in ‘Taskbar and start Menu Properties’
dialog box? [HNL 2015]
a) 4
b) 2
c) 5
d) 3
Ans. a
399. After booting process, BIOS helps in ______. [ITI COPA 2017]
a) Data transfer
b) Processing
c) Graphics
d) Cloud storage
Ans. a
401. Which of the following memories is directly accessible by the CPU? [ITI COPA 2015]
a) RAM
b) Hard Disk
c) Magnetic Tape
d) DVD
Ans. a
402. Which of the following works on the principle of ‘locality of reference’? *NCVT COPA 2018+
a) RAM b) ROM
c) Cache Memory d) Associative memory
Ans. c
P a g e | 783
403. Which of the following statements about static RAM (SRAM) is not correct? [WRD 2014]
a) SRAM used flip-flops
b) SRAM is faster than DRAM
c) SRAM uses capacitors
d) SRAM is costlier than DRAM
Ans. c
404. How to run a process in the background? [Government of India Press 2015]
a) &
b) *
c) ?
d) |
Ans. a
405. Process information in the current shell can be obtained by using [Rajasthan High Court 2013]
a) kill
b) bg
c) fg
d) ps
Ans. d
406. Which of the following symbol is used to redirect standard output (STDOUT) in Linux? [ITI COPA 2017]
a) >
b) <
c) ?
d) $
Ans. a
407. Find the correct option that shows a file containing the Linux file system to be automatically installed at boot
time? [Mumbai Post Trust 2015]
a) /etc/anacrontab
b) /etc/crontab
c) /etc/fstab
d) /etc/mtab
Ans. c
410. Which command is used to record a user login session in a file? [FACT 2018]
a) macro
b) read
c) script
d) none of the mentioned
Ans. c
411. Which command is used to display to operating system name? [Government of India Press 2015]
a) os
b) unix
c) kernel
d) uname
Ans. d
413. Which of the following commands prints the file-creation permission using symbolic notation? [ITI COPA 2016]
a) unmask-S
b) umask
c) printfp
d) printfps
Ans. a
414. The actual machinery in a computer is known as _____ and the instructions and data are known as _____.
Ans. Hardware, Software
415. Electronic Discrete Variable Automatic Computer (EDVAC) was designed by _____
Ans. John Von Neumann
416. The Number of bits that a computer can process at a time in parallel is known as its _____
Ans. Word length
417. Remington Rand developed ______ which became one of the first commercially available computers.
Ans. UNIVAC-1
418. Two engineering advances that are coming together to enable the creation of fifth-generation computers are
_______ and superconductor technology.
Ans. Parallel processing
419. In the ______ generation computers, the use of operating systems in computer was introduced.
Ans. Third
P a g e | 785
420. ________ generation computers aim to solve highly complex problems, ones, which require reasoning,
intelligence, and expertise.
Ans. Fifth
421. In ______, IBM introduced its personal computer (PC) for use in the homes, offices and schools.
Ans. 1981
424. Which is the component that permits the computer to permanently retain large amount of data?
a) CPU
b) Mass storage device
c) Memory
d) None of these
Ans. b
425. A system that synchronizes hardware and software to produce electronic tones is a:
a) Synthesizer
b) MIDI
c) PlainTalk
d) None of these
Ans. b
426. The number of bits that a computer can process at a time in parallel is known as:
a) Word length
b) Accuracy
c) Speed
d) None of these
Ans. a
427. A monochrome VDU uses ______ color to display text on contrasting background whereas a colour display
presents ______ colours.
Ans. Only one, 256
428. Which of the following keys switches between numbers to arrow keys?
a) Shift key b) Alt key
c) Num lock key d) None of these
Ans. c
P a g e | 786
431. A person in called computer literate if he/she is just able to : [RRB NTPC, (Shift-2) Online, 19.03.2016]
a) Run need-based applications
b) Create anti-virus software
c) Write programs
d) Hack other computer
Ans. a
432. “For computer, world consists of zeros and ones only. To store the zeros and ones, ______ is places inside a
processor: [RRB Chandigarh Section Engineer (Civil), 26.06.2012]
a) I/O device
b) Instruction set
c) Transistor
d) Main Memory
Ans. c
433. High power micro processors are: [RRB Jammu Section Eng. 2013]
a) Pantium, Pantium pro
b) Pantium II and III
c) Pantium II
d) All of these
Ans. d
Explanation: पेंटियम एक X86-कोम्पपैटिबल माइक्रो प्रोसेसर है, जो इं िेल द्वारा 1993 में लाया गया | पेंटियम प्रोसेसर एिम और
सेलेरोन से ऊपर र्था Dual-core i3, i5, i7 से सनचे स्थान रखर्े है | इं िेल ने पेंटियम माइक्रो आर्ककिेक्वैरीएबल को डेवेलोप क्वकया र्था
उच्च क्षमर्ा वाले पेंटियम-प्रो को 1995 में बाजार में लाया, उसके बाद पेंटियम ii र्था पेंटियम iii को बाजार में उर्ारा |
434. Which of the following acts as the central nervous system for other components of the computer system? [RRB
JE (Shift-II) 29.08.2015]
a) Registers
b) Primary Memory
c) Arithmetic and logic unit
d) Control unit
Ans. d
P a g e | 787
435. Which of the following transmits different commands or control signals from one component to another
component of a computer system? [RRB Bangalore Material Superintendent, 21.11.2004]
a) Data bus
b) Address Bus
c) Both Data Bus and Address Bus
d) Control bus
Ans. d
437. Which of the following characteristics of the computer reflects its flexible behavior? [RRB Patna 30.01.2011]
a) Accuracy
b) Reliability
c) Versatility
d) Diligence
Ans. c
Explanation: बहुकोशल (versatility) कं प्यूिर के लचीले व्यवहार को दशाकर्ा है जबक्वक Accuracy, Reliability, Deligence कं प्यूिर
की सवशेषर्ाएं है |
438. Arithmometer was invented by [RRB Ranchi Signal Maintainer Group-III, 20.11.2005]
a) Evanglista Torricelli
b) Charles Xavier Thomas
c) Edward Teller
d) Gustav Tauschek
Ans. b
439. In which city is India’s first post office ATM opened? [RRB Bangalore Technical (Eng.) 22.04.2017]
a) Chennai
b) New Delhi
c) Hyderabad
d) Mumbai
Ans. a
Explanation: Country's first post office savings bank ATM is located at the Head Post Office in Thyagaraya Nagar,
Chennai. (27 Feb 2014)
441. Unit(s) used for measuring speed of printer is/are? A. CPM B. RMP C. PPM [RRB Banglore Asst. Loco Pilot
08.07.2007]
a) Only A
b) Only B
c) Only C
d) both A & C
Ans. d
442. A Semi conductor Read Only Memory basically is: [RRB J.E. 14.12.2014]
a) a set of flip-flop memory elements
b) a combination logic circuit
c) a sequential circuit with flip flops and gates
d) None of these
Ans. b
443. Which of these memories will be used to store variable data? [RRB J.E. 14.12.2014]
a) RAM
b) ROM
c) EPROM
d) PROM
Ans. c
444. Which of the installed magnetic disks to store data/information? [RRB J.E. 14.12.2014]
a) Floppy diskette
b) Hard disk
c) Permanent disk
d) None of these
Ans. a
445. Unicode uses _____ bits to code a large number of characters, including various special characters. [RRB SSC
(Shift-1) 03.09.2015]
a) 8
b) 16
c) 24
d) 32
Ans. b
446. UTF-8 (Unicode Transformation Format) is a(an) ______ [RRB JE (Shift-1) 28.08.2015]
a) 8-bit fixed width encoding b) 8-bit variable-width encoding
c) 16-bit variable-width encoding d) 16-bit fixed-width encoding
Ans. b
447. The _____ between the time at which a read/write command is given to the memory and the time when next
such instruction can be issued to the memory is called: [RRB SSE (Shift-II), 03.09.2015]
a) Access time b) Cycle time c) Write time d) Seek time
Ans. a
P a g e | 789
448. Static RAM (SRAM) is faster than Dynamic RAM (DRAM) because ______ [RRB JE (Shift-I), 28.08.2015]
a) SRAM uses capacitors
b) SRAM is costlier
c) SRAM does not require refreshing
d) SRAM is cheaper
Ans. c
Explanation: SRAM, DRAM की र्ुलना में र्ेज र्था कं प्यूिर में सामान्यर्: कै श मेमोरी के रूप में प्रयुि होने वाली मेमोरी है | इसको
बार-बार टरफ्रेश करने की आवश्यकर्ा नहीं होर्ी इससलए यह DRAM से काफी र्ेज होर्ी है |
449. In the word “EDO RAM” what is the full form of EDO? *RRB Chandigarh Asst. Loco Pilot 25.05.2003+
a) Expanded Data Origin
b) Extended Dynamic Output
c) Expanded Dynamic
d) Extended Data Output
Ans. d
450. Which of the following is not true abut PROM – [RRB JE (Shift-I) 27.08.2015]
a) Random Access Memory
b) Programmable Read Only Memory
c) Non-Volatile Memory
d) Sequential access memory
Ans. d
451. Which of the following is not true about EPROM? [RRB JE (Shift-III), 26.08.2015]
a) Random Access Memory
b) Erasable Programmable read only memory
c) Non-volatile memory
d) Sequential access memory
Ans. d
Explanation: EPROM प्राइमरी मेमोरी के अंर्गकर् आने वाली स्थायी मेमोरी का एक प्रकार है | इसे रैं डम एक्सेस क्वकया जा सकर्ा है |
इसे नॉन-वोलेिाइल मेमोरी भी कहर्े है | इसमें पराबैंगनी क्वकरर्ों की सहायर्ा से पुराने प्रोग्राम को नए प्रोग्राम में टरप्लेस क्वकया जा सकर्ा
है, जबक्वक सद्वर्ीय मेमोरी क्रमानुसार मेमोरी है, सजसका उदाहरर् मैग्नेटिक िेप है |
453. A variant of _____ is called flash memory. [RRB SSE (Shift-III), 03.09.2015]
a) Virtual memory b) Cache memory
c) EEPROM d) RAM
Ans. c
Explanation: Flash is technically a variant of EEPROM, but the industry reserves the term EEPROM for byte-level
erasable memory and applies the term flash memory to larger block-level erasable memory.
P a g e | 790
454. What is the name of memory buffer used to accommodate a speed differential? [RRB Gorakhpur Asst. Loco
Pilot 14.04.2002]
a) Cache b) Stack Pointer
c) Accumulator d) DISC
Ans. a
455. Which of the following is not true about Cache memory? [RRB JE (Shift-III) 27.08.2015]
a) Faster memory than RAM
b) Volatile memory
c) Smaller in size than RAM
d) Sequential access memory
Ans. d
456. In IT, the method for updating the main memory as soon as a word is removed from the cache is called ____
[RRB J&K Asst. Loco Pilot 06.06.2010]
a) Write-through
b) Write-back
c) Protected-write
d) Cache-write
Ans. b
457. Which among them is the slowest of memory in terms of data transfer and storage rate? [RRB Kolkata Asst.
Loco Pilot 16.07.2006]
a) Registers
b) Cache memory
c) Main Memory
d) Flash Memory
Ans. d
Explanation: डािा स्थानान्र्रर् एवं भण्डारर् दर के अनुसार सबसे मंद मेमोरी, flash memory होर्ी है | इसे फ़्लैश रै म भी कहा जार्ा
है | इसको समिाया र्था क्वफर से प्रोग्राम क्वकया जा सकर्ा है | इसका प्रयोग सेलुलर फोन, सडसजिल कै मरा, सेि िॉप बॉक्स आक्वद में क्वकया
जार्ा है |
458. A CD-RW (Compact disk-Re writable) disk: [RRB Kolkata Asst. Loco Pilot 2014]
a) Has a faster access than an internal disk
b) Is a form of optical disk, so it can only be written once
c) Can write once
d) Can be erased and rewritten
Ans. d
459. Density of internal track most outer track density is _____ of hard disk. [RRB Kolkata Asst. Loco Pilot
29.09.2002]
a) equal b) less than c) more than d) less than or equal
Ans. c
Explanation: हाडक सडस्क के आंर्टरक ट्ैक का घनत्व सबसे बाहरी ट्ैक के घनत्व से असधक होर्ा है, क्योंक्वक आंर्टरक ट्ैक की लम्पबाई बाह्य
ट्ैक की लम्पबाई से कम होर्ी है | लेक्वकन दोनों ट्ैक पर समान मात्रा में डािा संसचर् होर्ा है | अर्: क्षेत्रफल की दृसि से बाह्य ट्ैक का घनत्व
कम होर्ा है |
P a g e | 791
460. Which of the following is not a type of magnetic storage system? [RRB Mumbai Asst. Loco Pilot 03.06.2006]
a) Floppy disk
b) Compact disk
c) Hard disk
d) Magnetic tape
Ans. b
461. Strength of Magnetic disk depends on: [RRB Mumbai Asst. Loco Pilot 05.06.2016]
A. Number of sides
B. Recording density
C. Number of tracks
a) Only A
b) A & C
c) Only C
d) A, B & C
Ans. d
462. Which of the following is a weighted code? [RRB Mumbai Asst. Loco Pilot 16.07.2006]
a) Excell-3
b) Gray
c) Both BCD and Excell-3
d) BCD
Ans. d
463. One gigabyte is approximately – [RRB Patna Asst. Loco Pilot 2014]
a) 1x103 bytes
b) 1x106 bytes
c) 1x109 bytes
d) 1x105 bytes
Ans. c
Explanation:
1 Byte = 8 bit
1 Kilobyte = 1024 byte = 103 byte
1Megabyte = 1024 kilobyte = 106 byte
1 Gigabyte = 1024 megabyte = 109 byte
464. One Terabyte is equivalent to: [RRB Ranchi Asst. Loco Pilot 08.07.2007]
a) 220 Megabyte
b) 220 Kilobyte
c) 220 Gigabyte
d) 220 Byte
Ans. a
465. Which of the following option is a example of half-duplex communication device. [RRB Ranchi Asst. Loco Pilot
19.01.2003]
a) Radio b) Telephone c) Television d) Wacky-Tacky
Ans. d
P a g e | 792
466. Which of the following is essential for WAN hardware? [RRB Trivandrum Asst. Loco Pilot 2004]
a) Bridge
b) Switch
c) Router
d) Firewall
Ans. c
467. The network is overloaded with enormous data sent by many computers within the network. The inability of
the network to deliver the data is termed as ______ [RRB Chandigarh Section Engineer (Civil) 2012]
a) Access control
b) Congestion
c) Error propagation
d) Deadlock
Ans. b
468. The transfer of data from one application to another in a computer system is known as ____ [RRB Chandigarh
Section Engineer (Mech.) 2012]
a) Dynamic Data Exchange
b) Dodgy Data Exchange
c) Dogmatic Data Exchange
d) Dynamic Disk Exchange
Ans. a
Explanation: Dynamic Data Exchange क्वकसी कं प्यूिर में एक प्रोग्राम में उपलब्ध डािा को दुसरे प्रोग्राम र्क पहुचाने एवं उपयोग करने
का एक माध्यम है | डायनासमक डािा एक्सचेंज का पहली बार प्रयोग 1987 में सवडोज 2.0 में क्वकया गया था जो एक प्रोग्राम का दुसरे
प्रोग्राम पर कण्ट्ोल प्रदान करर्ा था |
470. Which of the following networks uses telephone lines? [RRB Allahabad Signal Maintainer 2006]
a) WAN
b) LAN
c) PAN
d) Wireless
Ans. a
471. In which of the following network topology, failure of one node can disbalance the whole network? [RRB
Bangalore Material Superintendent 2004]
a) Mesh b) Tree
c) Ring d) Bus
Ans. c
P a g e | 793
472. From connection of whole n node in mesh topology network, the number keys ____ is [RRB Kolkata Apprentice
supervisors 2001]
a) n b) n(n-1)/2 c) n(n+1)/2 d) n-1
Ans. b
475. What does audio file extension “AMR” stands for? *RRB Thiruvananthapuram Section Eng. (Mech.), 2009+
a) Adaptive Media-Rate
b) Audio Multi-Rate
c) Adaptive Multi-Rate
d) Audio Media-Rate
Ans. c
476. Alignment buttons are available on the: [RRB Chandigarh Section Eng. (Civil) 2012]
a) Status bar
b) Formatting toolbar
c) Standard toolbar
d) None of these
Ans. b
477. In MS-Word 2007, we can use undo/redo feature for up to _____ action: [RRB Chandigarh Section Eng. (Mech.)
2012]
a) 200 b) 300 c) 150 d) 100
Ans. d
478. Now …….. is the owner of Mobile operating system “Android” *RRB Chandigarh Asst. Loco Pilot 2008+
a) Android Inc. b) Samsung
c) Yahoo d) Google
Ans. d
P a g e | 794
479. The primary objective of a time-sharing operating system is to – [RRB JE (Shift-III) 30.08.2015]
a) Avoid thrashing
b) Provide fast response to each user of the computer
c) Provide fast execution of processes
d) Optimize computer memory usage
Ans. b
480. Which of the following is not a part of the office suite? [LMRC J.E. 2015]
a) Database b) Image editor
c) File manager d) Word Processor
Ans. c
482. Shortcut key “Shift+Tab” is used for _____ *RRB Ranchi Asst. Loco Pilot 2003+
a) Move forward through the tabs
b) Move backward through the tabs
c) Move forward through the options
d) Move backward through the options
Ans. d
483. _____ clicking on mouse selects the entire paragraph by default, while working with text document in MS word.
[RRB NTPC, (Shift-1) Online, 2016]
a) Alt + Single b) Triple c) Double d) Single
Ans. b
484. By default, how is text horizontally aligned inside a cell in Excel? [RRB Kolkata Jr. Engineer-II Electrical, 2006]
a) Left aligned b) Right aligned
c) Center aligned d) None of these
Ans. a
Explanation: Excel में सडफ़ॉल्ि सेल के अंदर text क्षैसर्ज रूप से लेफ्ि अलाइन र्था नंबर और र्ारीख राईि अलाइन होर्े है |
485. The entire worksheet in Excel can be selected by [RRB Secunderabad Section Engineer (Civil) 2008]
a) Ctrl + Spacebar b) Ctrl + Shift + Spacebar
c) Shift + Spacebar d) All of these
Ans. b
Explanation:
Ctrl + Spacebar = पुरे कॉलम को सेलेक्ि करना
Shift + Spacebar = पूरी पंसि को सेलेक्ि करना
Ctrl + Shift + Spacebar = पूरी वकक शीि को सेलेक्ि करना
P a g e | 795
486. What is the keyboard shortcut for creating a chart from the selected cell range in Excel? [RRB
Thiruvananthapuram Section Eng (Mech.) 2009]
a) F2
b) F4
c) F8
d) F11
Ans. d
Explanation:
F11 - एक्सेल में सेलेक्ि क्वकया गए रें ज से एक चािक बनाने के सलए
F2 – एसक्िव सेल को पटरवर्शर्र् करना और नए डािा को अंर् में जोड़ना
F4 – अंसर्म कमांड या एक्शन को दोहराना
F8 – एक्सिेंड कोड को ऑन/ऑफ़ करना
488. A central computer that holds collections programs for many PCs, workstations computers is a(n) [IBPS PO,
2011]
a) Supercomputer
b) Minicomputer
c) Laptop
d) Server
Ans. d
490. Which of the following is contained on chips connected to the system board and is a holding area for data
instructions and information? (Processed data awaiting to be output to secondary storage) [IBPS Clerk, 2014]
a) Program b) Mouse c) Internet d) Memory
Ans. d
491. Who among the following introduced the world’s first laptop computer in the market? *SSC CGL, 2014+
a) Hewlett-Packard b) Epson
c) Laplink travelling software Inc d) Microsoft
Ans. b
P a g e | 796
492. Different types of modern digital computers come under which generation. [IBPS clerk, 2015]
a) Fourth b) Third
c) Second d) Fifth
Ans. d
493. Which of the following is machine independent program? [SBI Clerk, 2015]
a) High level language
b) Low level language
c) Assembly level language
d) Machine language
Ans. a
495. Which among the given options is IBM’s Supercomputer? *IBPS PO Mains, 2016+
a) Tihane-2
b) Sunway Taihu Light
c) Watson
d) Shasra-T
Ans. c
496. Which of the following character set supports Japanese and Chinese font? [IBPS Clerk Mains, 2016]
a) EBCDIC
b) ASCII
c) BCD
d) UTF-8
Ans. d
497. Weibo is a micro-blogging site popular in ____ [IBPS Clerk Mains, 2016]
a) India
b) USA
c) South Korea
d) China
Ans. d
498. Why do you log off from your computer when going out from your office? [IBPS Clerk Mains, 2016]
a) Someone might steal your files, passwords etc.
b) In order to save electricity
c) Logging off is essential to increase performance
d) Logging off is mandatory you before go out
Ans. a
P a g e | 797
499. Which of the following system is a function of dedicated PCs? [IBPS Clerk Mains, 2016]
a) Meant for a single user
b) Meant for the single task
c) Deal with single software
d) Deal with only editing
Ans. b
501. What do we call an input/output device on a computer operator or maintenance engineer and the computer?
a) EDP Device
b) Console
c) Jokey
d) Link Device
Ans. b
502. Dynamic Ad-hoc Wireless Networks (DAWN) usually cones under ______?
a) 2G
b) 3G
c) 4G
d) 5G
Ans. c
503. A Portable, personal computer, small enough to fit on your lap, is called a _____
a) notebook computer
b) handheld computer
c) mainframe computer
d) desktop computer
Ans. a
504. Every computer has a(n) _____, many also have _____.
a) operating system; a client system
b) operating system; instruction sets
c) application programs; an operating system
d) application programs; a client system
Ans. b
505. The term _____ refers to any computer component that is required to perform work. [SBI Clerk, 2011]
a) Bootstrap
b) Kernel
c) Resource
d) Source code
Ans. c
P a g e | 798
507. Computer _____ is whatever is typed, submitted, or transmitted to a compute system. [SBI Clerk, 2011]
a) input
b) output
c) data
d) circuitry
Ans. c
508. All the characters that a device can use is called its? [SBI Clerk, 2012]
a) Skill set
b) Character Alphabet
c) Keyboard Characters
d) Character Set
Ans. c
509. Which of the following does not relate to Input Unit? [SBI Clerk, 2012]
a) If accepts data from the outside world
b) It converts data into binary code that is understandable by the computer
c) It converts binary data into the human readable form that in understandable to the users.
d) It sends data in binary form to the computer for further processing
Ans. c
510. Which printer cannot print more than one character at a time? [SSC CHSL, 2012]
a) Line
b) Daisy-wheel
c) Laser
d) Dot-matrix
Ans. b
512. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the
corresponding bits? [IBPS PO, 2013]
a) ANSI b) ASCII
c) EBCDIC d) ISO
Ans. b
P a g e | 799
513. The most widely used computer device is _____. [IBPS Clerk, 2015]
a) Solid state disks
b) External hard disk
c) Internal hard disk
d) Mouse
Ans. c
514. Which of the following houses the most important parts of a computer system? [IBPS RRB 2016]
a) Input Device
b) Client
c) Server
d) Hardware
Ans. d
516. A device that copies or reproduces text and images is also called a(n) ______.
a) optical scanner
b) bar code reader
c) character device
d) digital camera
Ans. a
521. When the mouse is moved, it causes a picture to move on the screen which is referred to as in a
a) menu b) icon
c) pointer d) tab
Ans. c
522. A collection of related information sorted and deal with as a unit is a [SBI Clerk, 2009]
a) disk
b) data
c) file
d) floppy
Ans. b
523. Reusable optical storage will typically have the acronym ____ [SBI Clerk, 2009]
a) CD
b) DVD
c) ROM
d) RW
Ans. d
524. During the ______ portion of the information processing cycle, the compute acquires data from some source.
[SBI Clerk, 2009]
a) Storage and output
b) Storage
c) input
d) output
Ans. c
525. Which of the following are advantages of CD-ROM as a storage media? [IBPS PO, 2011]
a) CD-ROM is an inexpensive way to store large amount of data and information.
b) CD-ROM disks retrieve data and information more quickly than magnetic disks do.
c) CD-ROM make less errors than magnetic media.
d) All of the above
Ans. a
527. The following Computer’s memory is characterised by low cost per bit stored [IBPS Clerk, 2011]
a) Primary
b) Secondary
c) Hard Disk
d) All of these
Ans. b
529. Which computer was the first to use the magnetic drum for memory?[SSE CGL, 2005]
a) IBM-650
b) IBM-7090
c) IBM-701
d) IBM – 360
Ans. a
531. Which among the following is a term representing unit of data storage in computer memory? [IBPS PO Mains,
2016]
a) Pixel
b) Decimal
c) Octet
d) Point
Ans. c
532. Which of the following error occurs when software tries to access protected memory? [IBPS PO Mains, 2016]
a) Segmentation Fault b) Display time error
c) IO Error d) Runtime Error
Ans. a
Explanation: In computing, a segmentation fault or access violation is a fault, or failure condition, raised by
hardware with memory protection, notifying an operating system the software has attempted to access a restricted
area of memory. On standard x86 computers, this is a form of general protection fault.
533. During the execution of instruction, a copy of instruction is placed in the [IBPS Clerk Mains, 2016]
a) Register b) RAM c) System heap d) Cache
Ans. d
P a g e | 802
537. The number of pixels per inch of monitor length is called ____ [Rajasthan High Court 2013]
a) LPI (Lines per inch)
b) DPI (Dots per inch)
c) SPI (Sides Per inch)
d) PPI (Pixels per inch)
Ans. d
538. Which of the following is not a device release device? [Indian Rare Earth Limited 2016]
a) Scanner
b) Printer
c) Flat Screen
d) Touch Screen
Ans. a
539. The wildcard character for matching any number of characters is – [BSF HC Radio Mechanic]
a) Hyphen sign
b) Ampersand Sign
c) Asterisk Sign
d) Dollar Sign
Ans. c
540. Shift key and Print Screen key in a computer keyboard are known as [MMC Tradesman 2017]
a) Special purpose keys b) Standard keys
c) Navigation keys d) Function keys
Ans. a
P a g e | 803
542. Plotters are two types, whose names are: [NCVT COPA 2018]
a) Spiral and flatbed
b) Flatbed and cone
c) Drum and flatbed
d) Drum and spiral
Ans. c
543. A.T.M. machines self check-in at airports, whose example is the panel used in hummingbu (loese-check-in kiosk)
etc.? [HNL 2015]
a) laser pens
b) Analog display unit
c) Touch panel
d) Projectors
Ans. c
545. Which company acquired Sun Microsystems on January 27, 2010? [MP High Court, 25.01.2019]
a) Oracle Corporation
b) IBM
c) Apple Inc
d) Microsoft
Ans. a
548. Which of the following is not an operating system? [HAL Trade Apprenticeship, 2018]
a) iOS b) Android
c) Mac OSX d) Hadoop
Ans. d
549. Which of the following takes one statement of a high-level language program at a time and translate it into
machine instruction, which is immediately executed – [Indian Rare Earth Limited 2016]
a) Assembler
b) Compiler
c) Interpreter
d) Loader
Ans. c
551. In windows XP, where is the recyclebin icon? [Mumbai Port Trust 2015]
a) Shortcut
b) Desktop
c) Status bar
d) Property Dialogue Box
Ans. b
552. The windows operating system has _____ standard icons. [WRD 2014]
a) 4 b) 5 c) 6 d) 7
Ans. a
Explanation: Windows operating system में चार स्िैण्डडक आइकॉन होर्े है, 1. My computer 2. Recycle bin 3. Internet
Explorer 4, My Document. जब हम कं प्यूिर में सवडो इनस्िॉल करर्े है र्ो ये सभी 4 आइकॉन डेस्किॉप स्क्रीन सडफ़ॉल्ि में क्वदखाई देर्े है
553. Which brand of computers first used the combination of GUI and mouse together? [HNL 2015]
a) IBM Computers b) Babbage Computers
c) Macintosh d) Microsoft windows
Ans. c
Explanation: In 1983, Apple released the Lisa computer. It was the first commercial computer with a graphical user
interface and a mouse, Wired reports, and it took $150 million to develop.
554. When a user delete file, empties the recycle bin, what happens to the file? [UPSSC Instructor 2016]
a) Sector of hard Drive are blanked/erased
b) Clusters are flushed
c) The file is moved to C:/windows/temp
d) Associated entries in the FAT are removed
Ans. d
P a g e | 805
555. The total time to prepare a drive mechanism for a block of data to be read from is equal to its – [Naval Shipyard
(Technical) 2016]
a) Latency time
b) Latency time + Seek time
c) Latency time + Transmission time
d) None of the above
Ans. b
556. ____ is the translator which perform macro expansion [IOCL 2013]
a) Micro pre-processor
b) Assembler
c) Macro Pre-processor
d) Macro Processor
Ans. c
Explanation: The C preprocessor is a macro preprocessor (allows you to define macros) that transforms your
program before it is compiled.
557. The translator for low level programming language is called – [SECR 2019]
a) Loader
b) Assembler
c) Compiler
d) Linker
Ans. b
558. When an attempt to divide by zero is made what interrupt is generated? [MP Vyapam 08.011.2016]
a) Supervisor call interrupt (SVC)
b) Program interrupt
c) I/O interrupt
d) Timer interrupt
Ans. c
561. In ____ Scheduling, CPU is allocated to the process with least CPU burst time. [ISRO IPRC 2017]
a) Shortest Job First b) Round Robin
c) Multilevel Queue d) Priority
Ans. a
563. Which of the following statements about Loader is true? [THD Apprentices 2017]
a) It brings executable files residing on disk into memory and starts execution
b) It takes source files and converts them into executable files
c) it takes source files and converts them into object files
d) It takes object files and converts them into executable files
Ans. a
565. An instruction consisting of an operation code and operand address(es) is called: [Government of India Press
2015]
a) Mnemonics b) Pseudo code
c) Assembly language instruction d) Machine language instruction
Ans. d
Explanation: एक इं स्ट्क्शन कोड में ऑपरे शन कोड और ऑपरें ड एड्रेस होर्ा है वह मशीन भाषा इं स्ट्क्शन कहलार्ा है |
568. The world wide web may be considered a universe of information available through: [NHPC Trade
Apprenticeship, 2018]
a) HTTP b) Telnet
c) SMTP d) FTP
Ans. a
Explanation: HTTP का अथक ‘Hyper Text Transfer Protocol’ है HTTP वल्डक वाइड वेब द्वारा उपयोग क्वकया जाने वाला अंडरलेइंग
(अंर्र्शनसहर्) प्रोिोकॉल है, यह एक एप्लीके शन लेयर का प्रोिोकॉल है |
569. Which of the following forms is in the IP address? [BSF HC Radio Mechanic]
a) <byte>.<byte>.<byte>.<byte>
b) <nibble>.<nibble>
c) <bit>.<bit>.<bit>.<bit>
d) <byte>.<byte>.<byte>
Ans. a
572. A unit of computer information that contains data as well as all the procedures or operations is called:
a) A method
b) Encapsulation
c) An object
d) An OOP
Ans. c
573. Which input device converts analog information into digital form and can be used for doing fine works of
drawing and image manipulation? [UPPCL JE 2019]
a) Microphone b) Bar Code Reader
c) Digitizer d) Graphic Plotter
Ans. c
574. Where does the operating system keep information about all processes? [UPSSC J2 2016]
a) Memory b) I/O c) CPU d) Process Table
Ans. d
P a g e | 808
575. In which of the following categories of the operating system the underlying hardware provides more than one
processor? [BSNL JE-2012]
a) Multitasking
b) Multiprocessing
c) Multiprogramming
d) Multithreading
Ans. b
576. Which of the following is a real time operating system? [RRB SSE (Shift-II), 01.09.2015]
a) MS-Windows
b) Linux
c) Unix
d) DNX
Ans. d
578. Which of these is a bootloader for windows 10? [UPPCL APS 18.02.2018]
a) NTLDR
b) BOOTMGR
c) BOOTX
d) GRUB2
Ans. b
579. The instant messaging application that comes in a Windows OS is called [UPPCL Asst. Accountant 09.02.2018]
a) Windows Messenger
b) Windows Chat
c) Talk
d) Microsoft Outlook
Ans. a
580. In MS Word, You can display the “Find and Replace” Dialog box by pressing which of the following Function
Keys? [UPP Computer Operator 21-12-2018]
a) F5 b) Ctrl + F5 c) Ctrl + F4 d) F4
Ans. a
Explanation: माइक्रोसॉफ्ि वडक में F5 या CTRL+F को दबाकर “फाइं ड एंड टरप्लेस” डायलॉग बॉक्स प्रदर्शशर् कर सकर्े है |
581. In MS Word, what is the function of Ctrl + Right? [UPPCL Stenographer Exam-18.02.2018]
a) Moves to next character b) Moves to next page
c) Move to next paragraph d) Moves to next word
Ans. d
P a g e | 809
582. In Microsoft word 2013, which of the following menus includes insert row/column in table? [UPPCL Office
Assistant 2018]
a) Design
b) Insert
c) Layout
d) Page Layout
Ans. c
583. In Microsoft Excel, the basic function of ____ is to join two or more text strings together. [H.C. Ald. (ARO) Exam-
2016]
a) CONCATENATE
b) VLOOKUP
c) SUMIF
d) DSUM
Ans. a
584. What is the shortcut key to enable filtering of selected cells in MS-Excel? [UPPCL ARO 2018]
a) Ctrl + Shift + L
b) Ctrl + F
c) Alt + Click + L
d) Shift + F
Ans. a
585. Which among the following is used to navigate through hypermedia structures? [UPPCL ARO 2018]
a) Nodes
b) Keys
c) Buttons
d) None of these
Ans. a
587. In Microsoft Excel 2013, a cell can contain a total amount of ______ characters. [UPPCL Office Assistant 2018]
a) 32767 b) 16384 c) 409 d) 255
Ans. a
Explanation: Excel 2013 allows you to enter up to 32,767 characters in each cell and displays only the first 1,024
characters in each cell.
588. “What-if Analysis” command is available under ______ section of menu bar in MS-Excel 2007. [UPPCL APS Exam
2018]
a) Review b) View c) Formulas d) Data
Ans. d
P a g e | 810
589. In Excel, you can select the entire row by pressing [UPPCL TG2 Re-exam 2016]
a) Ctrl + Spacebar
b) F8+arrow key
c) Shift + arrow key
d) Shift + Spacebar
Ans. d
590. What is the keyboard shortcut for creating a chart from the select cell range in Excel? [UPPCL TG-2 2016]
a) F2
b) F4
c) F8
d) F11
Ans. d
Explanation: F11 Creates a chart of the data in the current range in a separate Chart sheet. Shift+F11 inserts a new
worksheet. Alt+F11 opens the Microsoft Visual Basic For Applications Editor, in which you can create a macro by
using Visual Basic for Applications (VBA). F12 Displays the Save As dialog box.
591. Which of the following is NOT an application of Information Technology in railways? [UPPCL ARO 2018]
a) E-ticketing
b) SMS Gateway
c) Bullet Trains
d) National Train Enquiry System
Ans. c
592. Which shortcut key is used to invoke the File menu in the Internet Explorer 11? [UPPCL JE 2019]
a) Alt + F4
b) Shift + F
c) Alt + F
d) Ctrl + F
Ans. c
595. We press _____ to bookmark the current page in Google Chrome. [UPPCL APS 2018]
a) Ctrl + D b) Ctrl + B
c) Ctrl + Shift + B d) Ctrl + Shift + J
Ans. a
P a g e | 811
599. EDGE, UMTS FDD and TDD are _____ cellular networks. [UPPCL APS 2018]
a) 3G
b) 4G
c) 2G
d) 5G
Ans. a
600. Mobile App, “BARD” is meant for people with: *UGC NET 2020+
a) Visual impairment
b) Hearing Impairment
c) Speech and language disability
d) Mental Illness
Ans. a
601. A device that interconnects two or more networks and selectively interchanges packets of data between them
is known as [UGC NET 2020]
a) Switch b) Gateway
c) Hub d) Router
Ans. d
602. ____ is a suit of protocols that were developed by the Department of Defence to provide a highly reliable and
fault-tolerant network infrastructure. [UGC NET 2020]
a) DHCP b) VPN c) PPPOE d) TCP/IP
Ans. d
P a g e | 812
603. Lycos is a search engine which was originally started as a research project at - [UGC NET 2020]
a) Standford University
b) Carnegie Mellon University
c) Harvard University
d) Virginia Tech
Ans. b
605. The first virus recorded, the Creeper virus was written by [UGC NET 2020]
a) Bob Thomas
b) Whitman Diffie
c) Martin Hellman
d) Fred Cohen
Ans. a
Explanation: As noted by Discovery, the Creeper program, often regarded as the first virus, was created in 1971
by Bob Thomas of BBN. Creeper was actually designed as a security test to see if a self-replicating program was
possible.
606. The first US patent for an active RFID tag with rewritable memory was awarded to [JRF (Library & Infor.Scie.)
2020]
a) Kevin Ashton
b) Mario Cardullo
c) Sanjay Sharma
d) David Brock
Ans. b
607. The term “internet of things was first used by: [UGC 2021]
a) D.W. Lewis
b) Bob Thomas
c) Kevin Aston
d) Jian Qin
Ans. c
Explanation: The term 'Internet of Things' was coined in 1999 by the computer scientist Kevin Ashton. While working
at Procter & Gamble, Ashton proposed putting radio-frequency identification (RFID) chips on products to track
them through a supply chain.
608. Which one of the following is the IEEE standard for Wimax? [UGC/NET 2020]
a) IEEE 802.3 b) IEEE 802.11
c) IEEE 802.15 d) IEEE 802.16
Ans. d
P a g e | 813
609. In data transfer process, which of the following is used for strengthening the signals [UGC/NET 2020]
a) Firewalls
b) Hubs
c) Switching packets
d) Repeater
Ans. d
610. Which layer of the OSI Model is mostly concerned with the syntax of the data? [UGC/NET 2020]
a) Session layer
b) Presentation layer
c) Network layer
d) Data link layer
Ans. b
611. Which of the following devices is used to connect different network segments and manage the traffic between
them? [UGC/NET 2020]
a) Switch
b) Gateway
c) Bridge
d) Repeater
Ans. c
612. _____ command is used to remove a relation from an SQL database. [UGC NET Dec. 2018]
a) Remove table
b) Delete table
c) Update table
d) Drop table
Ans. d
Explanation: Drop table deletes the whole structure of the relation purge removes the table which cannot be
obtained again. The SQL UPDATE Query is used to modify the existing records in a table.
613. Dirty bit is used to show the [UGC NET Dec. 2018]
a) page with low frequency occurrence
b) wrong page
c) page that is modified after being loaded into cache memory
d) page with corrupted data
Ans. c
614. A process residing in Main Memory and Ready and waiting for execution, is kept on [UGC NET Dec. 2018]
a) Execution Queue b) Job Queue
c) Wait Queue d) Ready Queue
Ans. d
615. The software Requirement Specification (SRS) is said to be ____ if and only if no subnet of individual
requirements described in it conflict with each other. [UGC NET Dec. 2018]
a) Verifiable b) Correct c) Consistent d) Unambiguous
Ans. c
P a g e | 814
616. A clustering index is defined on the fields which are of type [UGC NET Dec. 2018]
a) non-key and non ordering
b) non-key and ordering
c) key and non-ordering
d) key and ordering
Ans. b
617. Which of the following statement/s is/are true? [UGC NET Dec. 2018]
(i) Firewalls can screen traffic going into or out of an organization
(ii) Virtual private networks can simulate an old leased network to provide certain desirable properties.
Choose the correct option:
a) (ii) only
b) Neither (i) nor (ii)
c) (i) only
d) Both (i) and (ii)
Ans. d
619. Software products need perfective maintenance for which of the following reasons? [UGC NET Dec. 2018]
a) To overcome wear and tear caused by the repeated use of the software.
b) When the customers need the product to run on new platforms
c) To support the new features that users want it to support
d) To rectify bugs observed while the system is in use
Ans. c
620. The four byte IP Address consists of [UGC NET Dec. 2018]
a) Network Address
b) Host address
c) Neither Network nor Host Address
d) Both Network and Host Addresses
Ans. d (An IP address which is 32 bit long, that means it is of 4 bytes, Example: 8:8:8:8]
621. Data warehouse contains _____ data that is never found in operational environment. [UGC NET Dec. 2018]
a) Summary b) Encrypted
c) Encoded d) Scripted
Ans. a
P a g e | 815
622. Consider ISO-OSI network architecture reference model. Session layer of this model offers dialog control, token
management and _____ as services. [UGC NET Dec. 2018]
a) Flow control b) Asynchronization
c) Errors d) Synchronization
Ans. d
623. Which of the following is not one of the principles of agile software development method? [UGC NET Dec. 2018]
a) Embrace change
b) Incremental delivery
c) Customer involvement
d) Following the plan
Ans. d
624. In Linux operating system environment _______ command is used to print a file. [UGC NET Dec. 2018]
a) print
b) lpr
c) pr
d) ptr
Ans. b
625. The Third Generation mobile phones are digital and based on [UGC NET 2018]
a) AMPS
b) Broadband CDMA
c) D-AMPS
d) CDMA
Ans. b
Explanation: Broadband code division multiple access (B-CDMA) is a CDMA based cellphone technology that uses
broadband transmission. The first generation (1G) began in the early 80’s with commercial deployment of Advanced
Mobile Phone Service(AMPS) cellular network.
626. The definition in an XML document are said to be _____ when the tagging system and definitions in the DTD are
all in compliance. [UGC NET 2018]
a) well-formed
b) reasonable
c) valid
d) logical
Ans. c
627. Which of the following is not typically provided by source code management software? [UGC NET 2018]
a) Synchronisation b) Versioning and Revision history
c) Syntax highlighting d) Project forking
Ans. c
628. A software design pattern often used to restrict access to an object: [UGC NET 2018]
a) Adapter b) Decorator c) Delegation d) Proxy
Ans. d
P a g e | 816
629. CMOS is a computer chip on the motherboard, which is: [UGC NET 2017]
a) RAM
b) EPROM
c) ROM
d) Auxillary storage
Ans. a
630. The Hexadecimal equivalent of the binary integer number 110101101 is: [UGC NET 2018]
a) D24
b) 1BD
c) 1AE
d) 1AD
Ans. d
631. Perform the following operation for the binary equivalent of the decimal numbers (-14)10 + (-15)10 The solution
in 8 bit representation is: [UGC NET 2018]
a) 11100011
b) 00011101
c) 10011101
d) 11110011
Ans. a
632. The Octal equivalent of the binary number 1011101011 is: [UGC NET 2017]
a) 7353
b) 1353
c) 5651
d) 5657
Ans. b
634. In RDBMS, different classes or relations are created using _____ technique to prevent modification anomalies.
[UGC NET 2017]
a) Functional dependencies
b) Data integrity
c) Referential integrity
d) Normal forms
Ans. d
635. ______ SQL command changes one or more fields in a record. [UGC NET 2017]
a) LOOK-UP b) INSERT c) MODIFY d) CHANGE
Ans. c
P a g e | 817
636. Which of the following device takes data sent from one network device and forwards it to the destination node
based on MAC address? [UGC NET 2017]
a) Hub
b) Modem
c) Switch
d) Gateway
Ans. c
Explanation: A switch is a multi port bridge with a buffer and a design that can boost its efficiency and performance.
Switch is data link layer device. It can perform error checking before forwarding data.
637. _____ do not take their decisions on measurements or estimates of the current traffic and topology. [UGC NET
2017]
a) Static algorithm
b) Adaptive algorithm
c) Non-adaptive algorithm
d) Recursive algorithm
Ans. c
638. Which of the following layer of OSI Reference model is also called end-to-end layer? [UGC NET 2017]
a) Network layer
b) Datalink layer
c) Session layer
d) Transport layer
Ans. d
639. The IP address _____ is used by hosts when they are being booted. [UGC NET 2017]
a) 0.0.0.0
b) 1.0.0.0
c) 1.1.1.1
d) 255.255.255.255
Ans. a (It is also called DHCP address)
640. In distributed system, the capacity of a system to adapt the increased service load is called ____ [UGC NET
2017]
a) Tolerance
b) Scalability
c) Capability
d) Loading
Ans. b
642. Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the
site of the advertiser?
a) affiliate programs
b) click-through
c) spam
d) all of the above
Ans. b
643. What are materials used in production in a manufacturing company or are placed on the shelf for sale in a retail
environment?
a) Direct materials
b) indirect materials
c) edi
d) none of the above
Ans. a
647. Which of the following refers to creating products tailored to individual customers? [B.Com 2nd sem. 2020]
a) customization b) aggregation
c) direct materials d) reverse auction
Ans. a
648. Materials used in the normal operation of a business but not related to primary business operations are called
what? [B.Com 2nd sem. 2020]
a) supplies b) direct materials c) indirect materials d) daily stuff
Ans. c
P a g e | 819
649. What is the name given to an interactive business providing a centralized market where many buyers and
suppliers can come together for e-commerce or commerce-related activities? [B.Com 2nd sem. 2020]
a) direct marketplace
b) b2b
c) b2c
d) electronic marketplace
Ans. d
650. Which form of e-marketplace brings together buyers and sellers from multiple industries, often for MRO
materials? [B.Com 2nd sem. 2020]
a) Horizontal
b) Vertical
c) Integrated
d) Inclined
Ans. a
651. Which form of e-marketplace brings together buyers and sellers from the same industry? [B.Com 2nd sem. 2020]
a) horizontal
b) vertical
c) integrated
d) inclined
Ans. b
655. What is the reason for avoiding the attributes property in the HTML DOM?
a) Found unnecessary b) Attributes don’t have attributes
c) Attributes have attributes d) Considered irrelevant
Ans. b
P a g e | 820
656. Which of the following life cycle model can be chosen if the development team has less experience on similar
projects?
a) Spiral b) Waterfall
c) RAD d) Iterative Enhancement Model
Ans. a
659. Peripheral Component Interconnect (PCI) is a local computer bus for attaching hardware devices in a computer
and is part of the PCI Local Bus standard.
The process of transferring data intended for a peripheral device into a disk (or intermediate store) so that it can be
transferred to peripheral at a more convenient time or in bulk, is known as:
a) Multi-programming
b) Spooling
c) Caching
d) Virtual programming
Ans. b
664. Complex networks today are made up of hundred and sometimes thousands of ____.
a) Documents
b) Components
c) Servers
d) Entities
Ans. b
666. ____ register connected to the processor bus is a single-way transfer capable.
a) PC
b) Temp
c) IR
d) Z
Ans. d
667. The data stored in a database must be independent of the applications that access the database. This rule is
called ____.
a) Logical Data Independence b) Physical Data Independence
c) Data Dependency d) None of these
Ans. b
668. Automatic variables use which data structure for space allocation in memory?
a) Stack b) Queue c) Priority queue d) List
Ans. a
P a g e | 822
669. Which of the following statements is/are correct regarding Http request methods?
a) The GET method requests information about a document from a resource
b) The post method sends some information to the server from the client.
c) The head method does not have a response body
d) All of these
Ans. d
670. _____ addressing mode is most suitable to change the normal sequence of execution of instructions.
a) Relative b) Indirect
c) Index with Offset d) Immediate
Ans. a
671. Binding of instructions and data to memory addresses can be done at _____.
a) Compile-time
b) Load time
c) Execution time
d) All of these
Ans. d
672. The bus used to connect the monitor to the CPU is _____.
a) PCI bus
b) SCSI bus
c) Memory bus
d) Rambus
Ans. b
Explanation: Small Computer System Interface is a set of standards for physically connecting and transferring data
between computers and peripheral devices. The SCSI standards define commands, protocols, electrical, optical and
logical interfaces.
673. Which of the following is the most common shared resource in a computer network?
a) Keyboard
b) Mouse
c) Combo drive
d) Printer
Ans. d
674. Name the system in which the end-user must not be able to see that the data is distributed over various
locations:
a) Distribution Independence b) Distribution Dependence
c) Logic Dependence d) Distribution logic
Ans. a
675. Name the data in a database that must be independent of its user’s view and any change in logical data must
not affect the applications using it:
a) Logical data independence b) Physical data independence
c) Data Redundancy d) Data logic
Ans. a
P a g e | 823
678. The Unified Modeling Lauguage (UML) has become an effective standard for software modelling. How many
different notations does it have?
a) Three
b) Four
c) Six
d) Nine
Ans. d
680. Most of the microcomputer’s operating systems like Apple DOS, MS-DOS and PC DOS etc. Are called disk
operating systems because:
a) They are memory resident
b) They are initially stored on disk
c) They are available on magnetic tapes
d) They are partly in primary memory and partly on disk.
Ans. b
684. Which of the following factor does not makes effective and efficient Network?
a) Performance
b) Reliability
c) Server load
d) Robustness
Ans. c
685. With reference to the hardware parts in computers, what is the full form of VRAM?
a) Video Random Access Media
b) Video Random Access Memory
c) Versatile Read Access Memory
d) Versatile Read Advanced Media
Ans. b
686. Networks that connects a group of computers in a small geographical area is called –
a) Local area network
b) Personal area network
c) Wide area network
d) Metropolitan area network
Ans. a
687. OS that permits multiples programs to run simultaneously using single processor is referred as
a) Multitasking
b) Multi-user
c) Multithreading
d) Multiprocessing
Ans. a
689. Which of the following computer language is used for artificial intelligence?
a) PROLOG b) FORTRAN c) C++ d) Java Core
Ans. a
P a g e | 825
Tip: Prolog is a logic programming language associated with artificial intelligence and computational linguistics.
690. The full form of CAD is-
a) Computer Automatic Design b) Computer Added Design
c) Computer Automatic decode d) Computer Aided Design
Ans. d
694. Which one of the following is not the jargon of the computers of the Fourth Generation?
a) simulation
b) Android-based hardware
c) visualization
d) Parallel computing
Ans. b
695. What do we call a network whose elements may be separated by some distance, it usually involves two or more
small networks and dedicated high speed telephone lines?
a) URL b) LAN
c) WAN d) WWW
Ans. c
P a g e | 826
700. DNS can obtain the _____ of host if its domain name is known and vice versa.
a) Station address b) IP address c) Port Address d) Checksum
Ans. b
701. Which Netware protocol works on layer-3 network layer of the OSI model?
a) IPX b) NCP c) SPX d) Net BIOS
Ans. a
Tip: Internetwork Packet Exchange is the network layer protocol in the IPX/SPX protocol suite. IPX is derived from
Xerox Network Systems' IDP. It also has the ability to act as a transport layer protocol.
P a g e | 827
703. A ____ is an electronic device that process data, converting it into information? [SBI Clerk, 2009]
a) computer
b) processor
c) case
d) stylus
Ans. b
705. Every computer has a(n) ____; many also have _____.
a) operating system; a client system
b) operating system; instruction sets
c) application programs; an operating system
d) operating system; application programs
Ans. d
713. The _____ indicates how much data a particular storage medium can hold.
a) access
b) capacity
c) memory
d) storage
Ans. b
716. The person who write and tests computer program is called a [SBI Clerk 2009]
a) programmer
b) computer scientist
c) software engineer
d) project developer
Ans. a
718. A mistake in an algorithm that causes incorrect results is called a ____. [IBPS PO, 2012]
a) Logical error
b) Syntax error
c) Procedural error
d) compiler error
Ans. a
719. ____ is a feature for scheduling and multiprogramming to provide an economical interactive system of two or
more users [IBPS Clerk, 2012]
a) Time sharing
b) Multitasking
c) Time tracing
d) Multiprocessing
Ans. a
720. A programming language having a ____ is slow in execution [IBPS Clerk, 2012]
a) Interpreter
b) Compiler
c) Assembler
d) Linker
Ans. a
721. System proposal is prepared in _____ phase of SDLC [IBPS Clerk, 2012]
a) Conception
b) Initiation
c) Analysis
d) Design
Ans. b
722. The errors that can be find out by a compiler are [IBPS Clerk, 2012]
a) Logical errors b) Internal errors
c) Semantic errors d) Syntax errors
Ans. d
P a g e | 830
723. The process that deals with the technical and management issues of software development is [IBPS Clerk, 2012]
a) Delivery process
b) Control process
c) Software process
d) Testing process
Ans. c
725. A _____ shares hardware, software, and data among authorized users.
a) Network
b) Protocol
c) Hyperlink
d) Transmitted
Ans. a
726. A repair for a known software bug, usually available at not charge on the internet, is called a(n) ___.
a) Version
b) Patch
c) Tutorial
d) FAQ
Ans. b
728. The software tools that enable a user to interact with a computer for specific purposes are known as ____.
a) Hardware
b) Network Software
c) Shareware
d) Applications
Ans. d
729. When a file contains instructions that can be carried out by the computer, it is often called a(n) ______ file.
a) data b) information
c) executable d) application
Ans. c
P a g e | 831
730. A _____ contains specific rules and words that express the logical steps of an algorithm.
a) Programming language
b) Syntax
c) Programming structure
d) Logic chart
Ans. c
731. Companies use which of the following vendors to provide access to software and services rather than
purchasing the applications and maintaining the applications themselves?
a) Open source vendors
b) Alliances
c) Application service providers
d) All of the above
Ans. c
732. The _____ tells the computer how to use its components.
a) Utility
b) Network
c) Operating system
d) Application program
Ans. c
733. A _____ contains specific rules and words that express the logical steps of an algorithm.
a) programming language
b) programming structure
c) syntax
d) logic chart
Ans. c
735. When machine instructions are being executed by a computer, the instruction phase followed by the execution
phase is referred to as ____.
a) program cycle b) machine instruction
c) execution cycle d) machine cycle
Ans. d
736. Which of the following is contained on chips connected to the system board and is a holding area for data
instructions and information? (Processed data waiting to be output to secondary storage) [SBI PO 2011]
a) program b) mouse
c) Internet d) memory
Ans. d
P a g e | 832
737. The box that contains the central electronic components of the computer is the
a) motherboard
b) system unit
c) peripheral
d) input device
Ans. b
739. _____ is used by public and private enterprises to publish and share financial information with each other and
industry analysts across all computer platforms and the Internet. [IBPS PO, 2012]
a) Extensible Markup Language
b) Extensible Business Reporting Language (XBRL)
c) Enterprise Application Integration (EAI)
d) Sales force automation (SFA) Software
Ans. b
741. ______ is one reason for problems of data integrity [IBPS Clerk 2012]
a) Data availability constraints
b) Data inconsistency
c) Security constraints
d) Data redundancy
Ans. d
743. A field that uniquely identifies which person, thing, or event the record describes is a _____.
a) file b) data
c) field d) key
Ans. d
P a g e | 833
750. A Relation (from the relational database model) consists of a set of tuples, which implies that
a) Relational model supports multi-valued attributes whose values can be represented in sets.
b) for any two tuples, the values associated with all of their attributes may be the same
c) for any two tuples, the value associated with one or more of their attributes must differ.
d) all tuples in particular relation may have different attributes.
Ans. c
P a g e | 834
751. The method of Internet access that requires a phone line, but offers faster access speeds than dial-up the _____
connection. [IBPS PO 2012]
a) Cable access
b) Satellite access
c) fiber-optic service
d) modem
Ans. d
752. _____ is a technique that is used to send more than one call over a single line. [IBPS PO 2012]
a) Digital transmission
b) Infrared transmission
c) Digitizing
d) Multiplexing
Ans. d
755. An alternate name for the completely interconnected network topology is [SSC CGL 2012]
a) Mesh
b) Star
c) Tree
d) Ring
Ans. a
757. Frames from one LAN can be transmitted to another LAN via the device
a) Router b) Bridge c) Repeater d) Modem
Ans. b
Tip: The bridge is used at the data link layer in the OSI model to connect a network to another one. Bridges can
connect multiple LAN networks and separate network segments.
758. The ____ enables you to simultaneously keep multiple web pages open in one browser window. [IBPS PO 2011]
a) Tab box b) Pop-up helper
c) Tab row d) address bar
Ans. c
759. The process of transferring files from a computer on the Internet to your computer is called [IBPS PO 2011]
a) Downloading
b) Uploading
c) FTP
d) JPEG
Ans. a
760. Which of the following is not true concering user Ids and passwords? [SBI Clerk 2011]
a) When you enter your user ID and password the computer knows it is you
b) If your computer asks for a user ID and password, you can create your own
c) Sometimes you are assigned a user ID and password, for security reasons
d) You should share your user ID and password with at least one other person
Ans. d
761. When a real-time telephone call between people is made over the internet using computers, it is called ____
[IBPS PO 2012]
a) A chat session
b) an e-mail
c) an instant message
d) Internet telephony
Ans. d
762. Your business has contracted with another company to have them host and run an application for your
company over the internet. The company providing this service to your business is called an ______ [IBPS PO 2012]
a) Internet service provider b) Internet access provider
c) Application service provider d) Outsource agency
Ans. d
764. _____ search engine sends request for information to several search engines simultaneously and compiles the
results [IBPS Clerk, 2012]
a) Meta
b) Individual
c) Directory
d) Subject directory
Ans. a
768. With ______, the computer’s modem uses a standard telephone line to connect to the Internet.
a) DSL
b) Dial-up access
c) ISDN
d) Cable Television Internet Services
Ans. b
769. The term “host” with respect to the internet, means _____.
a) A computer that is a stand along computer
b) A computer that is connected to the internet
c) A computer reserved for use by the host
d) A large collection of computers
Ans. b
771. You can keep your personal files/folders in [IBPS PO, 2011]
a) My folder b) My Documents
c) My files d) My text
Ans. b
773. ______ is a window utility program that locates and eliminates unnecessary fragments and rearranges files and
unused disk space to optimize operations. [SBI PO 2013]
a) Backup
b) Disk Cleanup
c) Disk Defragmenter
d) Restore
Ans. c
775. A _____ contains buttons and menus that provide quick access to commonly used commands.
a) menu bar
b) toolbar
c) window
d) action bar
Ans. b
778. Press _____ to move the insertion point to the Address box, or to highlight the URL in the Address box.
a) Alt + D
b) Alt + A
c) Shift + Tab
d) Tab + Ctrl
Ans. a
779. The _____ icon represents an e-mail message that has not been read.
a) Closed envelope
b) Red envelope
c) Highlighted envelope
d) Flashing letter
Ans. a
780. To start Internet Explorer, _____ on the Windows taskbar, point to all programs, and then point to Internet
Explorer.
a) double click the Internet Explorer button
b) click the start button
c) right click My computer
d) All of the above
Ans. b
783. What displays the contents of the active cell in Excel? [IBPS PO 2011]
a) Namebox
b) Row Headings
c) Formulabar
d) Taskpane
Ans. c
785. The letter and number of the intersecting column and row is the _____ [IBPS PO 2012]
a) cell location b) cell position
c) cell address d) cell coordinates
Ans. c
786. In Power Point, the Header and Footer button can be found on the Insert tab in what group? [IBPS PO, 2012]
a) Illustrations group
b) Object group
c) Text group
d) Tables group
Ans. c
787. Which PowerPoint view displays each slide of the presentation as a thumbnail and is useful for rearranging
slides? [IBPS PO 2012]
a) Slide Sorter
b) Slide Show
c) Slide Master
d) Notes Page
Ans. a
788. When entering text within a document, the Enter key is normally pressed at the end of every ____ [IBPS PO
2012]
a) Line
b) Sentence
c) Paragraph
d) Word
Ans. c
791. To allow someone else schedule your meetings and appointments, _____ feature of outlook is used [IBPS Clerk
2012]
a) Monthly calendar b) Event manager c) Appointments d) Delegate Access
Ans. d
P a g e | 840
792. How many types of cell references are available in Excel? [IBPS PO 2013]
a) 3
b) 4
c) 8
d) 10
Ans. A (1. Relative Cell References 2. Absolute Cell References 3. Mixed Cell Reference)
793. A _____ is a collection of data that is stored electronically as a series of records in a table.
a) spreadsheet
b) presentation
c) database
d) web page
Ans. c
795. What is the term for how words will appear on a page?
a) Text formatting
b) Character formatting
c) Point size
d) Typeface
Ans. a
799. _____ ‘are attempts by individuals to obtain confidential information from you by falsifying their identity. [IBPS
PO 2011]
a) Phishing trips
b) Computer viruses
c) Spyware scams
d) Viruses
Ans. a
800. ____ is a form of virus explicitly designed to hide itself from detection by anti-virus software.
a) Stealth
b) Polymorphic virus
c) Parasitic virus
d) Macro virus
Ans. a
Tip: A stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software.
803. WIMP –
a) Window icon menu pointer
b) Window icon mouse pointer
c) Window icon menu pull down menu
d) Window icon menu pen
Ans. a
804. Part Number, description and number of parts ordered are examples of [IBPS Clerk 2013]
a) Control
b) Output
c) Processing
d) Feedback
Ans. c
P a g e | 842
812. Time sharing became possible in ____ generation of computers. [SBI PO 2011]
a) first
b) second
c) third
d) fourth
Ans. b
Explanation: Time-sharing became possible with the second-generation computers. In today's era, a specialized
computer can serve multiple users at the same time. This concept was introduced in 1960 when computers were
very expansive even for corporates.
814. Which of the following is the India’s first multi-peteflops (PF) supercomputer?
a) Param
b) Pratyush
c) Param Ishan
d) Tianhe-2
Ans. b
Explanation: Pratyush is India's fastest and first multi-petaflops (PF) supercomputer unveiled at the Pune-
based Indian Institute of Tropical Meteorology (IITM). The meaning of the word 'Pratyush' is 'rising sun' and the
maximum speed of the supercomputer is 4.0 PetaFlops.
816. Which among the following is an important circuitry in a computer system that directs the operation of the
processor? [IBPS PO 2016]
a) Memory
b) Address Bus
c) Accumulator
d) ALU
e) Control Unit
Ans. e
817. The CPU and memory are located in which of the following devices? [IBPS Clerk Mains 2017]
a) Motherboard
b) Expansion board
c) Storage device
d) Output device
e) System unit
Ans. a
Explanation: The motherboard is the computer's main circuit board. It's a thin plate that holds the CPU, memory,
connectors for the hard drive and optical drives, expansion cards to control the video and audio, and connections to
your computer's ports (such as USB ports).
818. ____ connects components inside the motherboard like CPU and system memory.
a) Data bus
b) Address bus
c) Internal bus
d) External bus
Ans. c
Explanation: The internal bus, also known as internal data bus, memory bus, system bus or front-side bus, connects
all the internal components of a computer, such as CPU and memory, to the motherboard. Internal data buses are
also referred to as local buses, because they are intended to connect to local devices.
820. When machine instructions are being executed by a computer, the instruction phase followed by the execution
phase is referred to as
a) program cycle b) machine instruction
c) instruction cycle d) task cycle
Ans. c
821. ____ defines the parameters of the action and depends on the operation.
a) Op-code b) Operand c) instructions d) Data
Ans. b
P a g e | 845
824. After a picture has taken with a digital camera and processed appropriately, the actual print of the picture is
considered as
a) data
b) output
c) input
d) the process
Ans. b
828. In laser printers, printing is achieved by deflecting laser beam on to ____ surface of a drum. [SBI PO, IBPS Clerk
2011, 2013]
a) magnetised
b) photosensitive
c) magnetic
d) Either ‘1’ or ‘2’
Ans. b
831. C is a
a) High level language
b) low level language
c) high level language with some low level features
d) low level language with some high level features
Ans. c
837. Which of the following comments regarding the reading of a string, using scanf (with%s option) and gets, is
true?
a) Both can be used interchangeably
b) scanf is delimited by end of line, while gets is not
c) scanf is delimited by blank space, while gets is not.
d) none of the above
Ans. c
840. ____ is used to connect audio and video multiple devices like video camera.
a) Firewire b) Serial port c) Parallel port d) USB
Ans. a
Explanation: FireWire, also called IEEE 1394 or i. LINK, high-speed computer data-transfer interface that was used
to connect personal computers, audio and video devices, and other professional and consumer electronics. IEEE
1394 is an interface standard for a serial bus for high-speed communications and isochronous real-time data
transfer. It was developed in the late 1980s and early 1990s by Apple in cooperation with a number of companies,
primarily Sony and Panasonic. Apple called the interface FireWire.
P a g e | 848
841. Which one of the following input device is user-programmable? [IBPS Clerk 2015]
a) Dumb terminal b) Smart terminal
c) VDT d) Intelligent terminal
Ans. d
Explanation: A terminal with built-in processing capability, but no local disk or tape storage. It may use a general-
purpose CPU or may have specialized circuitry as part of a distributed intelligence system.
842. Where are programs and data to be used by the computer available? [SSC FCI 2012]
a) Processing Unit b) Output
c) Storage d) Input
Ans. c
844. Virtual Memory allocates hard disk space to supplement the immediate, functional memory capacity of [SBI PO
2014]
a) ROM b) EPROM
c) The registers d) RAM
Ans. d
845. _____ is having more memory addresses than are physically available. [SBI PO 2014]
a) Virtual memory b) System software c) Application software d) RAM
Ans. a
846. The storage device used to compensate for the difference in rates of flow of data from one device to another is
termed as [SBI PO 2011]
a) chip b) channel c) floppy d) call e) buffer
Ans. e
850. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called
a) instructions
b) the operating system
c) application software
d) the system unit
Ans. a
852. Which of the following system software resides in main memory always? [IBPS Clerk 2011]
a) Text editor
b) Assembler
c) Linker
d) Loader
Ans. d
855. Which type of software is used in organisations to keep track of products in stocks?
a) Enterprise Resource Planning (ERP) software
b) Payroll Software
c) Human resource planning software
d) Accounting software
e) Inventory management software
Ans. e
P a g e | 850
858. Every computer has a(n) ____ many also have _____ [RBI Grade B 2014]
a) Operating system, a client system
b) operating system, instruction sets
c) application programs, an operating system
d) operating system, application programs
Ans. d
859. When a file contains instructions that can be carried out by the computer, it is often called a(n) ____ file.
a) data
b) information
c) executable
d) application
Ans. c
860. Grouping and processing all of a firm’s transactions at one time, is called *IBPS Clerk 2011+
a) a database management
b) a real time system
c) batch processing
d) on-time system
Ans. c
861. ____ is a feature for scheduling and multi-programming to provide an economical interactive system of two or
more users. [IBPS Clerk 2012]
a) Time sharing b) Multisharing
c) Time tracing d) Multiprocessing
Ans. a
863. In 1973, Xerox PARC developed the Alto personal computer. It had a bitmapped screen, and was the first
computer to demonstrate the desktop metaphor and graphical user interface (GUI).
Restart of computer is called _____ when computer is already ON.
a) cold booting
b) warm booting
c) shut down
d) logging off
Ans. b
Explanation: On a computer running Microsoft Windows, a warm boot can be accomplished by pressing the Ctrl +
Alt + Del keys simultaneously or by selecting a restart option within Windows. A warm boot is faster than turning a
computer off, waiting, and then turning it back on again (cold boot).
868. Language which can easily interact with the hardware are called
a) High level languages b) Low level language
c) Middle level language d) All of the above
Ans. b
P a g e | 852
869. ____ Serves as the bridge between raw hardware and programming layer of a computer system.
a) Medium level language b) Low level language
c) High level language d) Both 1 and 2
Ans. a
Explanation: Medium-level language (MLL) is a computer programming language that interacts with the
abstraction layer of a computer system. Medium-level language serves as the bridge between the raw hardware
and programming layer of a computer system.
875. Translator program used in assembly language is called [SBI Clerk 2012]
a) Compiler
b) Interpreter
c) Translation
d) Assembler
Ans. d
877. In the split window mode, one title bar looks darker than the other, because [RBI Grade B 2012]
a) Darker title bar shows window not in use
b) Darker title bar shows active window
c) Darker title bar shows unavailable window
d) Both ‘1’ and ‘2’
Ans. b
878. Which of the following refers to the rectangular area for displaying information and running programs? [SBI PO
2013]
a) Desktop
b) Dialog box
c) Menu
d) Window
Ans. d
879. Which of the following are lists of commands that appear on the screen? [IBPS Clerk 2015]
a) GUIs b) Icons
c) Menus d) Windows
Ans. c
881. When embedding object into document, one of the following occurs [RBI Grade B 2014]
a) embedded object becomes a part of the document
b) embedded object remains outside object to the document, but loaded with document
c) Both becomes a zip file
d) Both ‘1’ and ‘2’
Ans. b
882. A ___ is an additional set of commands that the computer displays after you make a selection from main menu.
[SBI Clerk 2009]
a) dialog box
b) sub menu
c) menu selection
d) All of these
Ans. b
883. In order to choose the font for a sentence in a word document [IBPS Clerk 2011]
a) select font in the format menu
b) select font in the Edit menu
c) select font in the tools menu
d) select font in the view menu
Ans. a
885. Auto-text can be used to insert ____ in document. [RBI Grade B 2014]
a) Text b) Graphics c) Either 1 or 2 d) Both ‘1’ and ‘2’
Ans. d
887. Where you can find the horizontal split bar on MS-Word screen?
a) On the left of horizontal scroll bar
b) On the right of horizontal scroll bar
c) On the top of the vertical scroll bar
d) On the bottom of vertical scroll bar
Ans. c
P a g e | 855
888. Which of the following is not available on the ruler of MS-Word screen?
a) Left indent b) Right indent
c) Centre indent d) All of these
Ans. c
889. You specify the save details of your file in the [RBI Grade B 2013]
a) “Save as a file” dialog box
b) “Save the file as” dialog
c) “File save” dialog box
d) Any of ‘1’ and ‘2’
Ans. a
891. Which command is used to calculate total characters in a cell? [RBI Grade B 2014]
a) Len
b) Length
c) Mid
d) Sid
Ans. a
Explanation: LEN returns the number of characters in a text string. LENB returns the number of bytes used to
represent the characters in a text string.
892. The function TODAY( ) in Excel, enters the current [RBI Grade B 2014]
a) System time in a cell
b) System date and time in a cell
c) System date only
d) Time at which the current file was opened
Ans. d
893. =Sum(B1:B10) is an example of a
a) function
b) formula
c) cell address
d) value
Ans. b
896. In a worksheet in MS-Excel, what is short-cut key to hide entire row? [SBI PO 2014]
a) Ctrl + 2
b) Ctrl + 9
c) Ctrl + N
d) Ctrl –
Ans. b
898. Which of the following bypasses the print dialog box when printing individual slides or an entire presentation?
a) File, Print preview b) Print button c) File, Print d) Ctrl + P
Ans. d
900. What is the default size of the data type in MS-Access? [SBI Clerk 2010]
a) 50
b) 60
c) 70
d) 80
Ans. a
903. What is the overall term for creating, editing, formatting, storing, retrieving a text document? [IBPS PO 2012]
a) Word processing
b) Spreadsheet design
c) Web design
d) Database management
Ans. d
904. In which, the database can be restored up to the last consistent state after the system failure?
a) Backup
b) Recovery
c) Redundancy
d) Security
Ans. b
905. A collection of conceptual tools for describing data, relationships, semantics and constraints is referred to as
[IBPS Clerk 2012]
a) E-R model
b) Database
c) Data Model
d) DBMS
Ans. c
906. ____ means that the data contained in a database is accurate and reliable.
a) Data redundancy b) Data integrity
c) Date reliability d) Data consistency
Ans. b
907. Which of the following contains data descriptions and defines the name, data type and length of each field in
the database?
a) Data dictionary
b) Data table
c) Data record
d) Data field
Ans. a
912. _____ is the transmission of data between two or more computers over communication links.
a) Communication
b) Networking
c) Data communication
d) Data networking
Ans. c
915. What do we call a network whose elements may be separated by some distance? It usually involves two or
more network and dedicated high speed telephone lines. [SBI Clerk 2015]
a) LAN b) WAN
c) URL d) Server
Ans. a
P a g e | 859
916. Ethernet, token ring and token bus are types of [SBI Associates 2012]
a) WAN
b) LAN
c) Communication channels
d) Physical media
Ans. b
917. _____ allows LAN users to share computer programs and data.
a) Communication server
b) Print server
c) File server
d) All of the above
Ans. c
Tip: A file server is a computer containing files available to all users connected to a local-area network (LAN). In
some LANs, a microcomputer is designated as the file server, while in others it is a computer with a large disk drive
and specialized software.
918. Which of the following items is not used in Local Area Network (LANs)? [SSC CGL 2012]
a) Interface card
b) Cable
c) Computer
d) Modem
Ans. d
920. In OSI network architecture, the routing is performed by [IBPS Clerk 2012]
a) Network layer
b) Data link layer
c) Transport layer
d) Session layer
Ans. a
Explain: Routing is the process of selecting a path for traffic in a network or between or across multiple networks.
Broadly, routing is performed in many types of networks, including circuit-switched networks, such as the public
switched telephone network, and computer networks, such as the Internet.
921. How many bits are there in the Ethernet address? [SBI Clerk 2011]
a) 64 bits b) 48 bits c) 32 bits d) 16 bits
Ans. b
Explanation: The Ethernet address is 48 bits long and normally displayed as 12 hexadecimal digits. The MAC address
is often referred to as the Ethernet Address on an Ethernet network.
P a g e | 860
923. The ____ service allows a group of Internet users to exchange their views on some common topic.
a) nicnet
b) milnet
c) telnet
d) usenet
Ans. d
Explanation: Usenet is a worldwide distributed discussion system available on computers. It was developed from the
general-purpose Unix-to-Unix Copy (UUCP) dial-up network architecture. Tom Truscott and Jim Ellis conceived the
idea in 1979, and it was established in 1980.
924. The ____ uses an addressing schema known as URL indicate the location of files on the web. [SSC CGL 2017]
a) Java Script b) World Wide Web c) SQL d) String
Ans. b
925. Which of the following is most commonly used to identify returns visitors to a website?
a) logged-in visitors b) digital certificates
c) electronic time stamping d) cookies
Ans. d
929. What is a person called who uses a computer to cause harm to people or destroy critical systems? [IBPS Clerk
2014]
a) Cyber Terrorist
b) Black-hat-Hacker
c) Cyber Cracker
d) Hacktivist
Ans. c
Tip: computer cracker as "an individual who attempts to access computer systems without authorization. These
individuals are often malicious, as opposed to hackers, and have many means at their disposal for breaking into a
system."
931. Which of the following a computer’s memory, but unlike a virus, it does not replicate itself? *SBI PO 2011+
a) Trojan Horse b) Logic bomb c) Cracker d) Firewall
Ans. b
Explanation: A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious
function when specified conditions are met. For example, a programmer may hide a piece of code that starts
deleting files, should they ever be terminated from the company.
932. What will you insert, when you need to see all the information from two tables on one form?
a) A page break
b) A subform
c) A linked command button
d) All of the above
Ans. b
Explanation: A subform is a form within a form. It is generally used whenever you want to display data from
multiple tables where there is a one-to-many relationship. For example, you would use a subform if you wanted to
display an order with the order details.
933. To select several cells or ranges that are not touching each other, what would you do while selecting?
a) Hold down the Ctrl key
b) Hold down the Shift key
c) Hold down the Alt key
d) Hold down Ctrl + Shift key
Ans. a
935. A software used to convert convert source program instructions to object instruction is known as
a) compiler b) assembler
c) Interpreter d) Language processor
Ans. d
Explanation: The language processor is a special translator system that is used for turning a program written in a
high language into a machine code.
938. Press _____ to move the insertion point to the address box or to highlight the URL in the address.
a) Alt + D b) Alt + A c) Shift + Tab d) Tab + Ctrl
Ans. a
941. All the characters, that a device can use are called its
a) skill set b) character alphabet c) characters codes d) character set
Ans. d
946. Which of the following machines is called a smart machine? [Cyber Olympiad 2014]
a) Mobile phones b) Television
c) Computer d) Microwaves
Ans. c
947. Which of the following jumbled words can complete the sentence given below?
Computer is a _____ machine.
a) Digir
b) Budm
c) Lows
d) Marts
Ans. d
Tip: This is an character arranging question from reasoning. After arrange the word “Marts” we make “Smart”.
950. Helical-scan cartridge are type of magnetic tape that uses the same technology as –
a) VCR tapes
b) Audio tapes
c) Data tape
d) None of these
Ans. a
Tip: A type of magnetic tape that uses the same technology as VCR tapes. The term helical scan usually refers to
8mm tapes, although 4mm tapes (called DAT tapes)
951. It consists of low-level programs that interact with the computer at a very basic level-
a) System software b) Utility software
c) Application software d) None of these
Ans. a
952. It is a program that performs a very specific task, usually related to managing system resources. Operating
systems contain a number of them for managing disk drives, printers, and other devices –
a) System software b) Utility software
c) Application software d) None of these
Ans. b
954. The latest PC keyboards use a circuit that sense the movement by the change in its capacitance. These
keyboards are referred as –
a) Capacitance keyboards
b) Mechanical keyboards
c) Qwerty keyboards
d) Dvorak keyboards
Ans. a
957. Computer derives its name from the word _____ which means calculation. [Bank Clerk 2008]
a) Computare
b) Calcite
c) Calculator
d) Both (A) and (B)
Ans. a
Tip: The word 'compute' comes from the Latin word computare, meaning "arithmetic, accounting, reckoning".
958. Computer gathers data, which means that they allow users to ____ data. [Bank Clerk 2010]
a) present b) input c) output d) store
Ans. b
959. The word ‘Abacus’ was derived from the greek word _____, which means a table or a board covered with dust.
a) Abax b) Addition
c) Abqua d) Substraction
Ans. a
961. Rabdologia was the technology used for calculation purpose introduced in
a) 1917
b) 1901
c) 1617
d) 1801
Ans. c (Rabdology Book written by John Napier)
964. _____ was the first digital mechanical calculator, which was designed to perform addition, subtraction,
multiplication and division. It can also extract square root by a series of repeated addition.
a) Punch card system
b) Pascaline
c) Stepped reckoner
d) ABC Computer
Ans. c
Tip: The stepped reckoner or Leibniz calculator was a mechanical calculator invented by the German mathematician
Gottfried Wilhelm Leibniz around 1672 and completed in 1694. The name comes from the translation of the German
term for its operating mechanism, Staffelwalze, meaning "stepped drum".
968. Which of the following computer system introduced the idea of binary calculation?
a) ABC computer
b) Colossus
c) ENIAC
d) EDSAC
Ans. a
Tip: The Atanasoff–Berry computer was the first automatic electronic digital computer in 1937.
970. In second generation, which type of memory was used to store data? [IBPS RRB 2011]
a) Paper tapes b) Magnetic drum
c) Magnetic core d) Magnetic tape
Ans. c
Tip: Magnetic-core memory was the predominant form of random-access computer memory for 20 years between
about 1955 and 1975.
974. Which of the following is the smallest computer? [SBI Clerk 2011]
a) Notebook
b) Laptop
c) Desktop
d) Workstation
Ans. a
978. Which characteristic of computer distinguishes it from electronic calculators? [Allahabad Bank PO 2011]
a) Accuracy b) Storage c) Versatility d) Automatic
Ans. b
Tip: Computer can store data but calculator does not.
979. Which of the following does not describe one or more characteristic(s) of a computer?
a) Electronic b) External storage
c) Stored program d) Program modification at execution
Ans. d
982. Which of the following program is not a utility? [DRDO GTRE 2017]
a) Editor
b) Debugger
c) Spooler
d) None of these
Ans. c
Explanation: The Spooler is a special process that manages access to printers by multiple users. For most users, the
function of the Spooler is transparent. They generate a job for a printer and go to the printer to pick up the output. The
Spooler permits users to continue working without waiting for a print job to finish printing.
Utility Program: A program that performs a specific task related to the management of computer functions, resources, or
files, as password protection, memory management, virus protection, and file compression.
985. In the register indirect addressing mode of 8085 microprocessor, data is stored – [DRDO 2008]
a) At the address contained in the register pair
b) In the register pair
c) In the accumulator
d) In a fixed location of the memory
Ans. a
986. What is the keyboard shortcut for opening a new tab in the Google chrome web browser for windows? [DRDO
CVRDE 2017]
a) Alt + N
b) Ctrl + T
c) Alt + Ctrl + T
d) Alt + T
Ans. b
987. For which one of the following ultraviolet light is used to erase the stored contents? [DRDO 2008]
a) PROM
b) EPROM
c) EEPROM
d) PLA
Ans. b
989. Which of the following memory has highest access speed? [DRDO CVRDE 2017]
a) Hard Disk
b) RAM
c) ROM
d) Cache Memory
Ans. d
990. The multiple access communication scheme in which each user is allocated the full available channel spectrum
for a specific duration of time is known as – [DRDO 2008]
a) CDMA b) FDMA
c) TDMA d) MC-CDMA
Ans. a
P a g e | 870
991. Thermal printer uses _____ coated paper, which turns black when heat is applied. [DRDO CVRDE 2017]
a) Chromium b) Bisphenol-A
c) Nickel d) Toner powder
Ans. b
993. The device used in the third generation computers is _____ (DRDO GTRE 2017)
a) Vacuum tubes b) Transistors
c) Integrated Circuit d) VLSI
Ans. c
994. Which of the following GUI component user should choose one or more options from one set allow? [DRDO
CVRDE 2017]
a) Radio Button b) Dropdown list
c) Check box d) Text Box
Ans. c
996. Which of the following is an example of High speed microprocessor? (DRDO GTRE 2017)
a) Pentium b) C.D. Rom
c) Keyboard d) Printer
Ans. a
997. _____ gave stored program concept in which program and data to be processed are stored in the same
memory. [DRDO CVRDE 2017]
a) John Von Neumann b) Alan Turing
c) Charles Babbage d) Bill Gates
Ans. a
998. In a desktop computer the board containing micro-processor, RAM and other components is called ______
board. (DRDO GTRE 2017)
a) Graphics b) Motherboard c) White d) Black
Ans. b
P a g e | 871
999. Program counter (PC) register is an integral part of: [DRDO CVRDE 2017]
a) Hard Disk b) RAM c) Cache memory d) CPU
Ans. d
1000. The set of wires, connecting the microprocessor and the main memory, through which the data flows is called:
[DRDO GTRE 2017]
a) Memory
b) Data wire
c) Database
d) Databus
Ans. d
GK EDITORIAL
GK Tricks (Playlist)
Website www.bharatskills.in