2016

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 48

2016 July

Q1. Of the Indian super computer listed below, which one is 4. Uses only system software
the fastest? Q9. Servers are computers that provide resources to other
1. PARAM 8000 computers connected to a:
2. PARAM 10000 1. mainframe computer
3. PARAM YUVA II 2. super computer
4. PARAM YUVA 3. network
Q2. Identify in the following list the first general purpose 4. client
electronic computer. Q10. A computer system comprises of one of the following
1. ENIAC combinations of units:
2. UNIVAC 1. input, output and control units
3. ANALYTICAL ENGINE 2. input, output and control units plus storage
4. EDSAC 3. input, output and storage
Q3. The second generation computers were based on: 4. input, output, CPU and storage
1. silicon chips Q11. Which one of the following is not true for primary
2. bio optics storage?
3. transistors 1. Information must be transferred to primary storage
4. vacuum tubes 2. It is a part of the processor
Q4. Which of the following are the two components of the 3. It allows fast access to data
CPU of a computer? 4. It is more expensive
1. ALU and Bus Q12. Which type of memory is not directly addressable by
2. Registers and Main memory CPU; it requires a piece of software called EMS:
3. Control unit and ALU 1. expanded memory
4. Control unit and Bus 2. extended memory
Q5. Computer instructions written in English letters are 3. 8 base memory
called: 4. conventional memory
1. symbolic codes Q13. A teletypewriter terminal is a/an:
2. mnemonics 1. input device
3. gray codes 2. output device
4. op codes 3. I/O device
Q6. The ALU of a computer contains a number of storage 4. storage device
elements called: Q14. Which of the following inputs printed text?
1. semiconductor memory 1. OCR
2. registers 2. MIC
3. hard disk 3. mouse
4. magnetic disk 4. Joystick
Q7. Which of the following houses the CPU? Q15. Which of the following is not an input device?
1. Motherboard 1. Wi Fi
2. PROM 2. Game pad
3. ALU 3. Trackball
4. Hard disk 4. MIDI keyboard
Q8. What is a dedicated computer? Q16. The results of arithmetic or logical operations are
1. One that is used by a single person stored in:
2. One that is assigned a single task 1. ROM
3. Uses only one kind of software 2. cache memory

Page | 1
2016 July

3. register Q25. In how many ways an MS Word document can be


4. accumulator saved?
Q17. Devices that receive data from the CPU are: 1. 5
1. ALU 2. 4
2. output devices 3. 3
3. signal devices 4. 2
4. digital devices Q26. Background colour effects applied on a Word
Q18. Control programs, supervisory programs, system aids, document is not visible in:
service programs, and utility programs together constitute:
1. assembler 1. Web layout view
2. application programs 2. Print layout view
3. multiprocessing program 3. Reading view
4. operating system 4. Print preview
Q19. Shell is an exclusive feature of: Q27. Which one is the graphic solution of MS Word?
1. application software 1. Word art
2. UNIX 2. Drop cap
3. system software 3. Clipboard
4. multiprocessing program 4. Clip art
Q20. Ubuntu, Mint and Fedora are versions of: Q28. How much minimum space should be provided in
1. MS DOS Word document between two columns?
2. Apple MAC OS X 1. 0.5
3. Windows 10 2. 1
4. Linux 3. 1.5
Q21. Memory protection is normally done by: 4. 0
1. the processor and associated hardware Q29. The maximum number of columns that can be inserted
2. operating system in a table in Word document is:
3. user program 1. 63
4. compiler 2. 65
Q22. Which of the following is at the centre of the OS 3. 15
providing basic services to other parts of OS? 4. 55
1. Register Q30. Pressing Ctrl+Z in a Word document means:
2. Kernel 1. redo the last action
3. CMOS 2. undo the last action
4. API 3. add a new page
Q23. MS Word is: 4. paste the content from Clipboard
1. an application program Q31. Which one of the following belongs to a different type
2. open source software of application software?
3. public domain software 1. Lotus_1-2-3
4. shareware 2. SPSS
Q24. Which file starts the word processor MS Word? 3. Visicalc
1. winword.exe 4. MS Excel
2. word.exe Q32. The correct way of writing a cell address in a
3. msword.exe spreadsheet:
4. word2000.exe 1. 155

Page | 2
2016 July

2. 1.55 1. IP address
3. 21A 2. E-mail address of the owner
4. A21 3. password
Q33. How many columns does a worksheet of Excel 2013. 4. cryptographic code
have? Q41. A web page is located using:
1. 1048576 1. uniform record locator
2. 1024 2. universal record locator
3. 512 3. uniform resource locator
4. 16384 4. uniformly reachable links
Q34. One characteristic of spreadsheet is that it has three Q42. What should be minimum requirement for RAM for
types of entries. Those are: Internet access?
1. numbers, formulas and labels 1. 16 MB
2. data, words and numbers 2. 32 MB
3. words, numbers and labels 3. 8 MB
4. equations, data and numbers 4. 64 MB
Q35. How is spreadsheet data organised? Q43. Which of the following addresses changes temporarily
1. Lines and Spaces as applications connect to the Internet?
2. Spaces and Layers 1. Static IP addresses
3. Height and Width 2. Dynamic IP addresses
4. Rows and Columns 3. Unique IP addresses
Q36. In a spreadsheet, one function inside another is called: 4. Common name and number
1. sum Q44. In the Internet parlance, DNS stands for:
2. text 1. Dynamic Name System
3. nested 2. Domain Name System
4. round 3. Distributed Name System
Q37. Which of the following keyboard shortcuts can be 4. Divided Name System
used for creating a chart from selected cells of MS Excel? Q45. A shared network within an organisation to provide
1. F11 connectivity to its staff is:
2. F10 1. internet
3. F4 2. intranet
4. F2 3. extranet
Q38. Which PowerPoint feature should be applied to create 4. delnet
motion effects to different objects of a slide? Q46. TCP/IP are:
1. Slide design 1. network hardware
2. Slide transition 2. network software
3. Animation objects 3. protocols
4. Animation scheme 4. file transfer programs
Q39. Two kinds of sound effects files can be added to a Q47. The user downloads e-mails from:
PPT Presentation. They are: 1. IP server
1. .wav files and .mid files 2. mail server
2. .wav files and .gif files 3. mail box
3. .wav files and .jpg files 4. Internet
4. .jpg files and .gif files Q48. Which one is the correct way of writing an e-mail
Q40. A computer on the Internet is identified by: address?

Page | 3
2016 July

1. dkmehta@deepsea.edu
2. dkmehta@deepsea@.edu
3. www.dkmehta.edu
4. dkmehta.deepsea.edu
Q49. In the e-mail address kfc@solu.edu, kfc is the:
1. password
2. server name
3. user name
4. domain name
Q50. Which protocol deals with e-mails?
1. FTP
2. SMTP
3. LPD
4. X-Window
Q51. Unsolicited commercial messages one discovers in the
e-mail box are called:
1. viruses
2. Worms
3. cookies
4. spam
Q52. What does JPEG stand for?
1. Joint Photo Experts Group
2. Joint Photographic Experts Group
3. Joint Photogenic Experts Group
4. Joint Photo Directed Experts Group

Page | 4
2016 July

Q1. India's first supercomputer was called: 2. SSD


1. Aryabhata 3. Flash memory card
2. Trishul 4. DVD
3. Agni Q10. One important characteristic of RAM is that it holds
4. Param only:
Q2. What does UNIVAC mean in computer terminology? 1. sequential storage
1. Universal automatic computer 2. direct storage
2. Universal array computer 3. volatile storage
3. Unique automatic computer 4. non-volatile storage
4. Unique automatic vacuum tube computer Q11. What is processed by Central Processing Unit?
Q3. Who invented differential engine? 1. Information
1. Ada Lovelace 2. Data
2. Charles Babbage 3. Hard disk
3. George Bool 4. Programs
4. Herman Hollerith Q12. The third generation computers were based on:
Q4. Which device facilitates the communication between 1. vacuum tube
the main components of a computer? 2. transistors
1. Buses 3. integrated circuit
2. Consecutives 4. magnetic drum
3. Connectors Q13. Which one of the following is an input and also an
4. Transistors output device?
Q5. In computer parlance, a byte is a group of: 1. Monitor
1. 200 bits 2. Printer
2. 1024 bits 3. Modem
3. 40 bits 4. OCR
4. 8 bits Q14. DVD is an example of:
Q6. One gigabyte of computer memory is equal to: 1. Hard disk
1. 1024 megabytes 2. Output device
2. 1024 kilobytes 3. Optical disk
3. 1024 terabyte 4. Solid-state storage device
4. 1024 bytes Q15. Which of the following input devices converts sound
Q7. Which of the following coordinates operations using into a form that can be processed by the system unit?
timing signals? 1. Audio
1. Control unit 2. Digitizer
2. Memory unit 3. Plotter
3. I/O unit 4. Web cam
4. ALU Q16. Which of the following is an Operating System?
Q8. ALU stands for: 1. Fire Fox
1. Array Logic Unit 2. Alta Vista
2. Arithmetic Logic Unit 3. Yahoo
3. Application Logic Unit 4. Linux
4. Alternative Logic Unit Q17. Which operating system reacts in the actual time?
Q9. Which one of the following is not a solid-state storage? 1. Quick response system
1. USB driver 2. Batch system

Page | 5
2016 July

3. Real time system Q25. Which indent marker in MS Word controls all the
4. Multi-tasking system lines except the first line?
Q18. What is Shell in the UNIX operating system? 1. Top indent marker
1. Hardware component 2. Left indent marker
2. Command interpreter 3. Hanging indent marker
3. Part of computer 4. Right indent marker
4. Tool in CPU scheduling Q26. Which one of the following is not a Hindi text
Q19. Which one of the following alternatives is applied processors?
after installing a new program or after making changes in 1. Lipikar
configuration? 2. Screen Craft
1. Shut down 3. Hindi Pad
2. Sleep 4. ILeap
3. Restart Q27. Which one is a shortcut to open the Open dialogue
4. Hibernate box in MS Word?
Q20. Process management, storage management, I/O 1. F12
management and security are some of the features of: 2. Shift+F12
1. Spreadsheet program 3. Alt+F12
2. Data processing program 4. Ctrl+F12
3. Browser Q28. Which tag is used to deploy a picture on a web page?
4. Operating system 1. picture
Q21. Which one of the following is a single user operating 2. image
system? 3. img
1. UNIX 4. Src
2. Linux Q29. The purpose of primary key in a database (MS
3. MS DOS Access) is to:
4. XENIX 1. unlock the database
Q22. Which of the following is not a part of the Office Suite 2. provide a map of the data
you are familiar with? 3. uniquely identify a record
1. Database 4. establish consistency in database operations
2. Spreadsheet Q30. The maximum length of a text field in MS Access can
3. File Manager be:
4. Word Processor 1. 120
Q23. From which menu one can insert Header and Footer 2. 255
into an MS Word document? 3. 265
1. Format 4. 75
2. Tools Q31. Which one is not a database object?
3. Insert 1. Table
4. View 2. Query
Q24. What is the collection of characters and paragraph 3. Relationship
formatting commands called? 4. Report
1. Defaults Q32. The part of a database that stores only one type of data
2. Style is:
3. Tools 1. report
4. Templates 2. field

Page | 6
2016 July

3. query 1. TCP
4. record 2. FTP
Q33. On spreadsheet MS Excel, the active cell is known by 3. ISP
a(n): 4. HTTP
1. Dotted border Q41. What is the minimum bandwidth required for a
2. Dark wide border broadband connection?
3. Blinking border 1. 128 kbps
4. Text inside is in italics 2. 512. kbps
Q34. Which of the following can MS Excel produce? 3. 256 kbps
1. Line graph and Pie chart 4. 2048 kbps
2. Only Line graph Q42. A node that shares resources with other nodes is
3. Bar chart, Line chart and Pie chart called:
4. Bar chart and Pie chart 1. Server
Q35. If an Excel file is inserted into a Word document, data 2. Host
is: 3. Client
1. hyperlinked 4. Data bus
2. placed in word table Q43. Which of the following is not a Web Browser?
3. linked 1. Fire Fox
4. embedded 2. Internet Explorer
Q36. Which button is to be chosen to create an Excel chart 3. Google Chrome
out of selected cells? 4. Alta Vista
1. F11 Q44. What is FTP program used for?
2. F7 1. Transfer files to and fro an Internet server
3. F5 2. Design website
4. F3 3. Connect to the Internet
Q37. Special effects to introduce slides in a PowerPoint 4. Serve as a Fast Traveling Protocol
(PPT) presentation are known as: Q45. Verification of log in name and password before one
1. Effects opens the e-mail box is called:
2. Custom Animation 1. Configuration
3. Transitions 2. Authentication
4. Annotation 3. Booting
Q38. Which key is pressed to check spelling in PPT 4. Accessibility
presentation? Q46. What is HTML?
1. F3 1. It is a scripting language.
2. F5 2. It is a modeling language.
3. F7 3. It is a DTP language.
4. F9 4. It is used for structuring documents for the Internet.
Q39. When using a Mac, how can you replace a font with Q47. Which one is not a domain name extension?
another on all slides? 1. .mil
1. Tools > Fonts 2. .img
2. Edit > Fonts 3. .com
3. Format > Replace Fonts 4. .org
4. Tools > Replace Fonts Q48. Web cookies are small pieces of data that are:
Q40. Who provides the Internet to its users? 1. sent from a website and stored in the user's browser

Page | 7
2016 July

2. sent from the user and stored in the server


3. sent from the root server to all other servers
4. Helpful in generating dynamic web pages during
subsequent use
Q49. Who owns the Internet?
1. Internet Engineering Task Force
2. DNS
3. No one owns the Internet
4. International Internet Board
Q50. When sender and receiver are on the same system, we
need only:
1. IP
2. Domain
3. Servers
4. User agents
Q51. What type of virus uses computer host to replicate
itself?
1. Time bomb
2. Mallissa virus
3. Worm
4. Macro virus
Q52. Malicious software is known as:
1. Malware
2. Maliciousware
3. Illegalware
4. Badware

Page | 8
2016 March

Q1. What is meant by BIOS? Q9. Which of the following memories requires to be
1. Basic Input/Output System refreshed?
2. Big Input/Output System 1. RAM
3. Bring In-Out system 2. DRAM
4. Broad Input/Output System 3. ROM
Q2. If you are using MS Windows and use Alt + Print 4. RAM and ROM
Screen, you would be: Q10. A computer virus that actively attacks an anti-virus
1. Printing a document program in an effort to prevent detection is:
2. Taking a screenshot 1. Worm
3. Closing a window 2. Retrovirus
4. Enlarging a window 3. Ghost
Q3. If you use Ctrl + Esc, you will be: 4. Trojan
1. Closing a tab Q11. Find the odd one out:
2. Enlarging a window 1. Hard Disk
3. Bringing up the Windows START menu 2. SRAM
4. Take a screenshot 3. RAM
Q4. MICR stands for: 4. DRAM
1. Magnetic Ink Character Recognition Q12. Which one of the following statements is false?
2. Magnetic Ink Code Recognition 1. Information stored in RAM can be changed by
3. Magnetic Ink Character Region overwriting it.
4. Meta Ink Character Recognition 2. Information stored in ROM cannot be changed by
Q5. A microprocessor is made up of millions of________. overwriting it.
1. Registers 3. Information can be stored in any location of RAM.
2. Microchips 4. Computer main memory can be accessed only
3. Program counters sequentially.
4. Transistors Q13. If you use Ctrl + W, you will be:
Q6. What is a motherboard? 1. Closing a window
1. 36 It is a large storage device 2. Opening a new file
2. It a place where the CPU, memory and other devices are 3. Bringing up the Windows START menu
connected with the computer 4. Take a screenshot
3. It is the name of the first super computer Q14. If you are warm booting, then you are:
4. It is a type of black board 1. Restarting the computer when it is already on
Q7. Which of the following groups comprises only input 2. Restarting the computer immediately after switching it
devices? off
1. Printer, Scanner and Mouse 3. Starting the computer after many days
2. Printer, Mouse and Monitor 4. Warming the computer in winter season
3. Keyboard, Scanner and Mouse Q15. The operating system software and data, that the
4. Printer, Mouse and Plotter computer is currently using, are stored in:
Q8. Which among the following is faster - SRAM and 1. ACP
DRAM? 2. USB
1. DRAM 3. Hard Drive
2. SRAM 4. RAM
3. They are equally fast Q16. The ability of an operating system to run more than
4. Can not be compared one application at a time is called:

Page | 1
2016 March

1. Multi user computing Q24. There are 10 files in a folder, which need to be
2. Object oriented programming selected together. Which of the combination of keys can be
3. Multi-tasking used?
4. Special tasks 1. Ctrl+Z
Q17. Linux is a: 2. Ctrl+A
1. single user, single tasking OS 3. Alt+A
2. single user, multi tasking OS 4. Shift+A
3. multi user, single tasking OS Q25. The software used for preparing text based documents
4. multi user, multi tasking OS is referred to as:
Q18. Which of the following is not a DOS command? 1. DBMS
1. COPY 2. PPTS
2. DATE 3. Spreadsheets
3. DEL 4. Word Processors
4. CUT Q26. MS Excel is ideal for:
Q19. An operating system that can do multi-tasking means 1. painting a picture
that: 2. drawing a graph
1. The operating system can divide work between several 3. editing a picture
CPUs 4. writing a story
2. Several Programs can be operated concurrently Q27. If in MS Excel, you are trying to make a graph using
3. Multiple people can use the computer concurrently the available data in the spreadsheet, you will click on:
4. Single person can use the computer concurrently 1. Home Tab
Q20. You just changed Windows 98 in your computer to 2. Insert Tab
Windows XP, you have just: 3. Data Tab
1. upstarted the operating system 4. Review Tab
2. upgraded the operating system Q28. If you have a spyware in your computer:
3. downgraded the operating system 1. your computer may take longer than usual to complete
4. patched certain tasks
Q21. Various applications and documents are represented 2. your computer may crash more frequently
on the windows desktop by 3. you may see pop-up advertisement even when not
1. Symbols connected on web
2. Labels. 4. all of the other options
3. Graphs Q29. Find the odd one out:
4. Icons 1. Creeper
Q22. Find the odd one out: 2. Blaster
1. Notepad 3. I love You
2. MS word 4. PPT
3. Wordpad Q30. IBM stands for:
4. Paint 1. Indian Business Machines
Q23. You are trying to restart the computer. Which 2. International Business Machines
combination of keys will you be using? 3. International Banking Machines
1. Del+Ctrl 4. International Business Models
2. Esc Q31. Servers are computers that provide resources to other
3. Ctrl+Alt+Del computers connected to a:
4. Insert Esc 1. Network

Page | 2
2016 March

2. Mainframe Q39. The keys in a keyboard are:


3. Super computer 1. Alphanumeric Keys
4. Client 2. Functional Keys
Q32. When sending an e-mail, a brief description of the 3. 8 Arrow Keys
mail content can be included in the ________ tab. 4. Alphanumeric Keys, Functional Keys and Arrow Keys
1. To Q40. OCR stands for:
2. Subject 1. Outsized Character Reader
3. Content 2. Optical Character Recognition
4. CC 3. Operational Character Reader
Q33. The design of the network is called the network 4. Only Character Reader
________. Q41. A pixel is:
1. Architecture 1. a computer program
2. Server 2. a picture stored in secondary memory
3. Transmission 3. the smallest resolvable part of a picture
4. Type 4. a programming language
Q34. Slide sorter option of power point is available on Q42. Which of the following is not an output device?
________ menu. 1. LCD
1. Insert 2. Printer
2. File 3. CRT
3. View 4. Touch Screen
4. Edit Q43. Which of the following is the fastest port for data
Q35. A ________ is defined as a collection of related data transfer?
in an organised way. 1. USB
1. Data 2. Serial
2. Database 3. Parallel
3. DBMS 4. Firewire
4. Information Q44. What does the domain code '.gov' represent?
Q36. Which of the following a short cut in MS Excel to 1. Government agencies
GOTO option? 2. Governor of India
1. F5 3. Indian agencies
2. F4 4. Spam
3. F7 Q45. An education institution would generally have the
4. F10 following in its domain name:
Q37. Which of the shortcut keys can be used to close the 1. .org
window of Excel? 2. .edu
1. Alt+F4 3. .com
2. Alt+F10 4. .eu
3. Alt+F1 Q46. Find the odd one out:
4. Alt+F7 1. Leased line
Q38. What is Google Chrome? 2. Dial-up
1. Web browser 3. DSL
2. Worm 4. USB
3. Search Engine Q47. Junk Emails are also known as:
4. Anti-virus 1. Spam

Page | 3
2016 March

2. Spoof
3. Crumbs
4. Inbox
Q48. What is an Email attachment?
1. A email receipt notification
2. A separate document from another program sent along
with an e-mail message
3. A virus
4. List of recipients in BCC and CC
Q49. Trend Micro is a:
1. Virus
2. Anti-virus
3. Worm
4. None of the other options
Q50. Background of screen of your PC is known as the:
1. Application
2. Window
3. Desktop
4. Frame
Q51. Which among the following has the shortest access
time?
1. RAM
2. ROM
3. Cache
4. Memory
Q52. Arrange in increasing order - Megabyte, Terabyte,
Kilobyte, Gigabyte
1. Kilobyte, Gigabyte, Megabyte, Terabyte
2. Megabyte, Terabyte, Gigabyte, Kilobyte
3. Kilobyte, Megabyte, Gigabyte, Terabyte
4. Kilobyte, Megabyte, Terabyte, Gigabyte

Page | 4
2016 March

Q1. Cache memory was introduced in the ________ Q9. When we are using DPI in context of a laser printer, we
generation computers. are referring to the printer's:
1. first 1. Speed
2. second 2. Spin
3. third 3. Address
4. fourth 4. Resolution
Q2. FORTRAN stands for: Q10. If you are using a plotter, you are using an:
1. Formula Translation 1. Input device
2. Forward Transact 2. Output device
3. Forward Translate 3. Input-output device
4. Forward Transfer 4. Ultra device
Q3. A desktop computer is also referred to as: Q11. If you are referring to Serial. Parallel, AGP Infra red,
1. Palm top you are making a reference about:
2. PC 1. Ports
3. DC 2. Bus
4. MC 3. Registers
Q4. The computer parts attached to the CPU are referred to 4. RAM
as: Q12. AI (Artificial Intelligence) is used in ________
1. Output devices generation computers.
2. Peripherals 1. second
3. Shard 2. third
4. Control units 3. fourth
Q5. Find the odd one out: 4. fifth
1. Arithmetic Logic Unit Q13. What in the operating system is responsible for
2. Control Unit processor management?
3. Registers 1. Traffic controller
4. Bins 2. Dispatcher
Q6. Mouse and ________ are also examples of input 3. Processor Scheduler
devices. 4. Job Scheduler
1. Printer Q14. What is responsible for selecting one job for the
2. Speakers processor from the many jobs submitted to the system?
3. Monitor 1. Traffic controller
4. Scanner 2. File system
Q7. What does TFT stand for? 3. Job Scheduler
1. Thin Film Tube 4. Dispatcher
2. Thin Film Track Q15. Which of the following tasks is not managed by the
3. Thin Film Transistor operating system directly?
4. Tin Film Transfer 1. Memory Management
Q8. Line, Daisy Wheel, Laser and Drum are types of: 2. Virus Management
1. Plotters 3. Application Management
2. Scanners 4. File management
3. Photocopiers Q16. An embedded operating system could be found:
4. Printers 1. On a desk top
2. On a Server

Page | 5
2016 March

3. On a PDA 3. My Pictures
4. On a networked PC 4. Help Menu
Q17. Unix, MS DOS, Linux are examples of: Q25. A collection of files which are interlinked/interrelated
1. Computers on a computer is referred to as:
2. Operating Systems 1. File
3. Printers 2. Documents
4. Brands of printers 3. Database
Q18. Find the odd one out: 4. Folder
1. Linux Q26. In case you were to display the files saved in folder,
2. Windows you will:
3. MAC OS 1. Rename it
4. IOS 2. Click on it
Q19. MS Windows is: 3. Double right click on the folder
1. An Operating System 4. Double left click on the folder
2. Office Suite Q27. If you are using Ctrl + Esc, you will:
3. Application 1. Be accessing the windows help
4. Monitor 2. Open my computer
Q20. In Windows ME, ME stands for: 3. Be accessing the Start Menu
1. Millennium Edition 4. Open control panel
2. Maximum Effect Q28. In a split window mode, if one of the two title bars is
3. Maximum Efficiency darker than the other, it indicates:
4. Minimum Energy 1. The darker title window is dormant
Q21. If you are using Ctrl + A keys in MS Word, what are 2. The darker title window is not in use
you trying to do? 3. The darker title window is closed
1. Select all text in the file 4. Darker title is active
2. Copy all text in the file Q29. Which of the following statements is not true?
3. Close the window 1. Files can be renamed
4. Paste text 2. Files can be deleted
Q22. If you are using Ctrl + Enter Keys, you are trying to: 3. Directories can be deleted
1. Create a line break 4. Directories cannot be renamed
2. Create a new file Q30. If you are using a Windows operating system and use
3. Open an existing file the keys: Windows key + D, you are trying to:
4. Close a file 1. Log out
Q23. If you are trying to access programs or start programs, 2. View the Desktop
you will access: 3. Delete a file
1. Default menu 4. Go to Windows Directory
2. Start menu Q31. Which of the following format reduces the audio file
3. File tab to about one tenth of its original size without losing the
4. Home tab sound quality by a large amount?
Q24. If you are trying to assess the free space available on 1. PDF
your computer (Assume you have MS Windows Operating 2. VMEG
System), you will access: 3. MP3
1. My Computer 4. GIF
2. My Documents

Page | 6
2016 March

Q32. If in MS Word you have to check the spelling and use 4. Inserting a video in the presentation
of grammar in a document, you will use: Q40. Expand DCL:
1. Ctrl+F 1. Disk Control Location
2. Ctrl+S 2. Data Control Language
3. F7 3. Disk Control Language
4. F3 4. Only Character Reader
Q33. MS Word is a/an: Q41. MS Access is:
1. Operating System 1. A CPU
2. Application Software 2. Used as a word processor
3. Programming Language 3. An example of a database
4. Virus 4. A computer
Q34. You have used ctrl + shift + P key in MS word, what Q42. Wi-Fi stands for:
are you trying to do? 1. Wireless Function
1. Change the font size 2. Wireless Final
2. Print the document 3. Wireless Fidelity
3. Preview the document 4. Windows Function
4. Edit the document Q43. If you are using Bluetooth on your computer, you are
Q35. If in MS Excel you would like to add a row, you will using which type of the network?
use: 1. LAN
1. The file menu 2. Wi-Fi
2. The insert menu 3. PAN
3. The edit menu 4. WAN
4. The view menu Q44. What is the domain code.mil' likely to be used by?
Q36. If you are using the RAND function in MS Excel, you 1. Military
are trying to: 2. Milk Cooperatives
1. Generate a Random Number 3. Mining Industry
2. Generate Ranks 4. Multinationals
3. Merge Rows Q45. MAN stands for:
4. Repeat the data in the cell 1. Metropolitan Area Network
Q37. Find the odd one out: 2. Market Area Network
1. Bubble 3. Main Area Network
2. Bar 4. Major Areas Network
3. Pie Q46. What does ISP stand for:
4. Row 1. Internet Service Protocol
Q38. If you are preparing a slide, you are: 2. Internet Service Provider
1. Working on MS Word 3. Internal Service Protocol
2. Working on MS Excel 4. Internet System Protocol
3. Working on MS Powerpoint Q47. The primary use of Firewalls is to:
4. Working on a Super computer 1. Prevent virus attacks
Q39. If you are working on MS Powerpoint and use the key 2. Prevent computer from fires
F5, you are: 3. Prevent unauthorised access
1. Starting a presentation from the beginning 4. Handle Data security
2. Starting the presentation from the current slide Q48. Find the odd one out:
3. Saving the presentation 1. Packet - Filtering Routers

Page | 7
2016 March

2. Application - Level gateways


3. Circuit - level gateways
4. Mobile - Gateways
Q49. Arrange the following languages from earliest to the
most recent year of development: FORTRAN, COBOL,
PASCAL, JAVA
1. COBOL, FORTRAN, PASCAL, JAVA
2. FORTRAN, COBOL, PASCAL, JAVA
3. PASCAL, FORTRAN, COBOL, JAVA
4. FORTRAN, COBOL, JAVA, PASCAL
Q50. Dreamweaver, Flash and Premier are examples of:
1. Database Management Programs
2. Web Browsers
3. Multimedia Applications
4. Word Processors
Q51. What does ASCII stand for?
1. American Standard Code for Internet Interface
2. American Standard Code for Information Interchange
3. American Standard Code for Internet Interchange
4. American Standard Code for Information Interface
Q52. Cache Memory acts:
1. Between RAM and ROM
2. Between CPU and RAM
3. Between CPU and ROM
4. Between CPU and hard disk

Page | 8
2016 May

Q1. The Arithmetic Logic Unit in a CPU responds to: 1. Common Business Operating Language
1. Commands from the primary memory 2. Common Business Oriented Logic
2. Commands from the control section 3. Common Business Operations Logic
3. Commands from External Memory 4. Common Business Oriented Language
4. Commands from Cache Q10. Find the odd one out.
Q2. ALU, Control Units and Registers are components of: 1. Android
1. Central Processing Unit 2. Blackberry OS
2. Hard Disk 3. Symbian
3. Memory 4. MS DOS
4. ROM Q11. If you are using Page Maker, you are using the
Q3. A set of instructions that guide the computer to following operating system.
undertake specific tasks is referred to as: 1. MS-DOS
1. Memory 2. Windows
2. Programme 3. Unix
3. Logic 4. JAVA
4. Storage Q12. Which one of the following is not a DOS internal
Q4. The monitor and CPU in a computer are connected command?
using: 1. CLS
1. A link 2. Copy
2. A PCI Bus 3. DEL
3. A SCSI Bus 4. EDIT.COM
4. ARAM Bus Q13. If you are going to print a document in MS office, you
Q5. ________ helps users communicate with the computer. will use the ________ menu.
1. Output devices only 1. File
2. Input devices only 2. Home
3. Both Input and Output devices 3. SMART
4. Using Micro waves 4. Insert
Q6. You are planning to organise an academic test, which Q14. Find the odd one out.
of the following are you most likely to use? 1. .ZIP
1. MICR 2. .arc
2. OMR 3. rar
3. PDF 4. .bak
4. ICR Q15. Which of the following is not an extension of the
Q7. A light pen is a ________. source code file?
1. Input device 1. .c
2. Output device 2. P
3. Input Out device 3. .a
4. Tin Film Transfer 4. .so
Q8. MP3 is a: Q16. If you use the key F1, you are trying to:
1. Programme 1. Reach out to help dialog box
2. Anti-virus 2. Activate the menu bar
3. Sound format 3. Open the search option
4. Data 4. Rename selected file
Q9. Expand COBOL:

Page | 1
2016 May

Q17. If you use Windows Key + E in MS Windows, you 4. It is a file


will: Q24. What does TLB stand for?
1. Open My Computer Tab 1. Table Lateral Bus
2. Open My Documents Tab 2. Translation Lookaside Buffer
3. Open Search 3. Transition Lookaside Buffer
4. Reach the Desktop 4. Translate Lookaside Buffer
Q18. Which of the following Is not a difference between Q25. When does the condition of rendezvous arise?
MS WORD 2003. and MS WORD 2007? 1. When in the process of passing messages, the sender is
1. MS Word 2003 uses DOC file format for saving text blocked till the message is delivered
documents while MS Word 2007 saves Text Files in DOCX 2. When in the process of passing messages, both the sender
format and DOC format and receiver are blocked till the message is delivered
2. MS Office 2003 has ribbon, but MS Office 2007 doesn't 3. It is a situation when messages are being send by two
have exclusive entities to each other at the same time
3. MS Office 2003 used GUI interface and MS Office 2007 4. When two programmes are being used simultaneously
used GUI Q26. If a file is deleted, you may find it in the:
4. To save in MS Office 2003 we use Ctrl + S, In MS 1. My computer folder
OFFICE 2007 to save we use Ctrl F 2. File folder
Q19. You are using MS EXCEL and use the function 3. My Pictures folder
DCOUNT, what will happen? 4. Recycle Bin
1. Counts the cells that contains numbers in database Q27. In Windows XP. XP stands for:
2. Returns the maximum value from selected database 1. Extra Processor
3. Adds the numbers in the fields 2. Extra Performance
4. Get the interest rate for selected fields 3. Extra Potent
Q20. dBASE, FoxPro, Oracle and Sybase are: 4. Experience
1. DBMS software Q28. If you are using MS Word and use Ctrl + R, you are:
2. Operating Systems 1. Aligning the text to the right
3. Type of RAM 2. Redoing the last command
4. Ports 3. Sending the file to recycle bin
Q21. If you are using MS Access and use Ctrl +N, you are: 4. Sending the file as attachment
1. Creating a new database Q29. bak is a ________ file.
2. Opening an existing database 1. Extension for a backup file
3. Create a new database object 2. Extension for batch File
4. Print the current object 3. Extension for compressed file
Q22. Which among the following devices shares network in 4. Extension for object file
relatively shorter area? Q30. Which among the following comes at the top of the
1. Wifi hierarchy?
2. Bluetooth 1. Parent Directory
3. LAN 2. Root Directory
4. WAN 3. Working Directory
Q23. What is meant by Protocol? 4. Home Directory
1. It is a set of rules that govern all aspects of information Q31. If you are using MS Windows and click Windows +
communication R, what is expected to happen?
2. It defines the hardware required for a network 1. You will reach the Desktop
3. It defines the security required 2. You will reach Windows help dialogue box

Page | 2
2016 May

3. You will open the run dialogue box Q40. If you are using MS Access, then you are using a:
4. You will minimize all windows 1. Distributed database management system
Q32. What is the standard protocol for internet? 2. Relational database management system
1. JAVA 3. Object oriented database management system
2. C++ 4. Rotational database management system
3. TCP/IP Q41. While making a MS PowerPoint Presentation you
4. Flash need to go back to a slide, what would you do to do so
Q33. .org domain is usually used by: conveniently
1. Government agencies 1. Ctrl then slide number
2. Indian Organisations 2. Enter then slide number
3. Organisations (Non Profit) 3. Slide number and then enter
4. Commercial business 4. Slide number then Ctrl
Q34. In MS Excel, Charts are: Q42. What will happen if you hold both the right and left
1. Graphical Representation of information keys of the mouse for two seconds while in Slide show
2. Tools used for writing mathematical formula mode of a presentation?
3. Tool for Inserting a hyperlink 1. You will come out of Slide Show Mode
4. Tool for linking data sheets 2. You will reach the first slide of the presentation
Q35. A Pie Chart can represent: 3. The window will close
1. Only a single data points/ series 4. You will reach the last slide of the presentation
2. Multiple data points/series Q43. C3 1.1 E4 in MS EXCEL will mean:
3. Two data points/ series 1. That Cell C3 is equal to Cell E4
4. Three data points/series 2. That Cell C3 is 1.1% of Cell E4
Q36. If a chart has to be drawn, comparing the production 3. That value of Cell C3 is 10% more than Cell E4
of different food grain in the last 10 years, you would use: 4. That value of Cell E4 is 10% less than Cell C3
1. A pie Chart Q44. The ABS function in Excel, helps in:
2. A doughnut Chart 1. Absolute Sum of a series of cell
3. A radar Chart 2. Gives the absolute value of a number
4. A bar Chart 3. Provides the maximum value in the list
Q37. If we are establishing an ATM, we will require to 4. Arranges a series in ascending order
establish a ________ Network. Q45. If in MS WORD, you use F4. key, what is expected to
1. PAN happen?
2. WAN 1. Move text or graphics
3. LAN 2. Repeat the last action
4. TAN 3. Extend a selection
Q38. What does RIP stand for in networking parlance? 4. Choose the go to command
1. Routing Information Protocol Q46. The default extension of MS Word File is:
2. Rest in Peace 1. .text
3. Reassured Information Protocol 2. .pdf
4. Rainbow Information Panel 3. .doc
Q39. Spoofing, Masquerade and phishing attacks are: 4. Int
1. Instances of network threats Q47. How is 64 bit Windows operating system better than
2. Instances of failure of network 32 bit Windows Operating System?
3. Instances of losing network connectivity 1. Supports more memory
4. Names of anti-viruses 2. Supports more output devices

Page | 3
2016 May

3. Fewer lock-ups
4. Does not heat up
Q48. Find the odd one out of PROMPT, ERASE. DEL and
FIND EXE.
1. PROMPT
2. ERASE
3. DEL
4. FIND.EXE
Q49. Out of the following, which is the primary job of the
Operating System?
1. Command Resources
2. Manage Resource
3. Map Utilities
4. Map Users
Q50. Which among the following will ideally have the
fastest Speed, WAN, MAN, PAN, LAN?
1. PAN
2. MAN
3. WAN
4. LAN
Q51. TV Remotes, Garage doors, wireless computer
speakers. All operate using:
1. Infra-red waves
2. Radio waves
3. Micro waves
4. Sound waves
Q52. Which of the following is not a modifier key?
1. Alt
2. Ctrl
3. Shift
4. F1, F2.....

Page | 4
2016 May

Q1. Which of the following is used for modulation and 1. highlighting the selected section
demodulation? 2. inserting link
1. modem 3. pasting the copied object
2. protocols 4. indentating the paragraph
3. gateways Q10. For moving the cursor to different Windows Explorer
4. multiplexers pane, we use ________ key.
Q2. Requests made by the web browsers are responded by: 1. F1
1. URL 2. F3
2. Web Server 3. F6
3. HTTP 4. F8
4. Web Page Q11. Shift + F7:
Q3. Online textual talk, in real time, is called: 1. refreshes the page
1. Downloading 2. display the print preview
2. Surfing 3. runs a thesaurus check on the word highlighted
3. Chatting 4. saves the document
4. Conferencing Q12. .co is a domain ID used for:
Q4. The e-mail system that supports audio is known as: 1. commercial firms
1. Sound mail 2. listed companies
2. Voicemail 3. NGO's
3. Conversation 4. government organizations
4. Messaging Q13. To redo the last action performed, we press ________.
Q5. SIM is an abbreviation used for: 1. Shift+L
1. Subscriber Identity for Mobiles 2. Shift+Y
2. System Information for Mobiles 3. Ctrl+Y
3. Subscriber Identity Module 4. Ctrl+Y+R
4. System Identity Module Q14. The protocol which provides information about text
Q6. Which of the following subgroups contain "Paint"? and binary files that are organised in a menu structure is:
1. Accessories 1. HTTP
2. MS-Office 2. FTP
3. Entertainment 3. POP
4. Games 4. TCP/IP
Q7. Which of the following statements is CORRECT Q15. Alt + Enter:
regarding Freeware? 1. opens the control menu for current window
1. It is also known as Free Software 2. opens properties window of selected program
2. It does not permits redistribution 3. opens advanced find window
3. It does not permits modification 4. opens the run window
4. It is distributed with a minimum licensing fee Q16. In Excel, the simplest way of moving data from one
Q8. For selecting all the contents of a page, we press location to another is by:
________. 1. menu commands
1. Ctrl+A 2. drag and drop method
2. Alt+A 3. mouse
3. Shift+Z 4. shortcut menu
4. Alt+Z Q17. By ________ text can be made more attractive in
Q9. Ctrl + M provides: different colours, size and shape.

Page | 5
2016 May

1. WordArt 1. downloading
2. Picture 2. sequencing
3. WordArt text box 3. accessing
4. Mail Merge 4. uploading
Q18. You organize files by storing them in ________. Q26. A device which links two networks together is a
1. Archives ________.
2. Folders 1. bridge
3. Indexes 2. rectifier
4. Lists 3. hub
Q19. Just below the formatting bar, there is: 4. switch
1. Task bar Q27. A spam is a ________.
2. Tool bar 1. corrosion in motherboard
3. Formula bar 2. an electronic junk mail
4. Scroll bar 3. a list of rules
Q20. The quickest and easiest way in MS-Word, to locate a 4. a malicious program
particular word or phrase in a document is to use the Q28. In an office, for connecting different computers, which
________ command. one device must be used?
1. Replace 1. Modem
2. Find 2. Hub
3. Look up 3. Telephone
4. Search 4. Amplifier
Q21. Ethernet, LAN, Token Bus are types of: Q29. A router acts like a ________.
1. WAN 1. hub
2. Communication Channels 2. switch
3. LAN 3. bridge
4. Physical medium 4. repeater
Q22. One can use any SIM in a GSM mobile phone. This is Q30. What is the name of the program or the service that let
due to the fact that it is a ________ system for mobiles. you view e-mail messages?
1. global 1. web browser
2. local 2. e-mail clients
3. code division 3. e-mail ID
4. multimedia 4. Internet
Q23. Which protocol provides e-mail facility among Q31. The server on the Internet is also known as:
different hosts? 1. Repeater
1. SMTP 2. Host
2. FTP 3. Gateway
3. TELNET 4. AND gate
4. SNMP Q32. A word in a webpage that, when clicked, opens
Q24. Internet uses: another document is called:
1. packet switching 1. Anchor
2. circuit switching 2. Hyperlink
3. telephone switching 3. Reference
4. telex switching 4. URL
Q25. Transfer of files from user's computer onto server is:

Page | 6
2016 May

Q33. A two way videophone conversation can be carried Q41. Which of the following contains files as well as
out by: subfolders?
1. Telephonic Conference 1. File
2. Chatting 2. Group
3. Video Conferencing 3. Software
4. Video Player 4. Folder
Q34. A technology that divides a radio frequency into time Q42. USB is categorized under Ports. It is used:
slots is: 1. to connect internal devices of computer
1. TDMA 2. for storing data
2. 8 CDMA 3. to connect external devices to the computer
3. WLL 4. for image editing
4. Switching Q43. In Word, replace option is available on:
Q35. While sending an e-mail, the ________ line lets you 1. File menu
add recipients for a message. 2. View menu
1. CC 3. Edit menu
2. Subject 4. Format menu
3. Contents Q44. Which of the following is not a non impact printer?
4. To 1. Dot Matrix
Q36. The Central Processing Unit: 2. Laser
1. is operated from control panel. 3. Inkjet
2. is controlled by input data. 4. Thermal
3. controls only the storage. Q45. Multimedia Software incorporates images,texts,
4. controls all input, output and processing. sound, animations etc. whereas Graphics Software
Q37. Which of the following utilities speeds up the disk by incorporates only:
rearranging the files and free space on the system? 1. images
1. Anti-Virus 2. sound
2. Text Editor 3. animations
3. Disk Defragmentator 4. video sequences
4. Compression utility Q46. To shrink a window to an icon:
Q38. All the logical operations are carried out by: 1. open a group window
1. ALU 2. minimise a window
2. CU 3. maximise a window
3. Monitor 4. restore a window
4. Plotter Q47. For a mic to work on your computer, it must possess:
Q39. ________ server stores and manage files for network. 1. ethernet
1. Authentication 2. NIC
2. Main 3. sound card
3. Web 4. graphic card
4. File Q48. Consider the following statements and select the
Q40. Files when deleted are moved to: correct alternative which are given below.
1. Trashes a. Both read and write operations can be performed in
2. Outbox RAM.
3. My documents b. RAM is a volatile memory.
4. Recycle Bin 1. Both a and b are correct

Page | 7
2016 May

2. Only a is correct
3. Only b is correct
4. Neither a. nor b are correct
Q49. To contact people using internet, you most often use
their:
1. domain names
2. e-mail address
3. usernames
4. passwords
Q50. Which of the following is not a pointing device?
1. Mouse
2. Joystick
3. Light pen
4. Keyboard
Q51. ________ are the devices to transmit data over
telecommunication lines.
1. drives
2. drive bays
3. modems
4. platforms
Q52. What type of network connection is not a way of
connecting to the Internet?
1. TCP/IP
2. Dial-up
3. ISDN
4. T1

Page | 8
2016 November

Q1. The term EDVAC stands for: and USB Mass Storage devices to transfer Images, Audio
1. Electronic Distinct Variable Automatic Computer and Video Files?
2. Electronic Discrete Variable Automatic Computer 1. Media Transfer Protocol
3. Electronic Disk Variable Automatic Computer 2. File Transfer Protocol
4. Electronic Data Variable Automatic Computer 3. Voice Over Internet Protocol
Q2. Which of the following is used to store intermediate 4. Simple Mail Transfer Protocol
arithmetic and logic results in a CPU? Q9. A 2-Dimensional patterned array used to represent
1. Accumulators characters, symbols and images is known as:
2. Buffers 1. Line Work
3. Virtual Memory 2. Resolution
4. Secondary Storage 3. Dot Matrix
Q3. A device or computer program capable of Coding and 4. Vector
Decoding audio data stream is known as: Q10. Which of the following has the fastest access time in
1. Audio Signal terms of data retrieval?
2. Audio Throughput 1. SSD
3. Audio Stream 2. HDD
4. Audio Codec 3. Magnetic Tape
Q4. A computer device used to draw images and create 4. CD
graphics and animation is known as: Q11. A self-contained step by step set of operations that
1. Scanner only models the actual working of a computer program but
2. Graphics Tablet cannot be executed directly is known as:
3. Copier 1. Algorithm
4. PDA 2. Batch File
Q5. The term OLED in Video Display stands for: 3. Executable
1. Organic Light Enhancing Diode 4. Shell Script
2. Oxidized Light Emitting Diode Q12. Which of the following is NOT a flavour of UNIX?
3. Organic Light Emitting Diode 1. Linux
4. Oxidized Light Enhancing Diode 2. FreeBSD
Q6. Which of the following is employed in Physical 3. Python
Security Systems to read personnel credentials to allow 4. Darwin
passage through a locked door? Q13. Flight Simulator usually belongs to which of the
1. Access Control Card Readers following categories?
2. Security Scanners 1. Open Source Software
3. VR Sets 2. Embedded Software
4. Memory Card Readers 3. System Software
Q7. Which of the following is NOT used with regards to 4. Application Software
Integrated Circuits? Q14. Assembly language is converted into executable
1. SSI machine code by utility program referred to as:
2. PSI 1. Assembler
3. MSI 2. Debugger
4. VLSI 3. Macro
Q8. Which of the following protocols was designed by Q15. A software program that operates or controls a
Microsoft to facilitate communication between Computers particular type of device that is attached to a computer is
known as:

Page | 1
2016 November

1. Interrupt 1. Decryption
2. Device Driver 2. Encryption
3. Trap 3. Privacy
4. Micro Controller 4. Message Secrecy
Q16. Which of the following files is a default operating Q23. In securing websites, which of the following methods
system Shell for DOS O.S.? identifies a user as a Human and not an automated program
1. Autoexect.bat feeding in the data?
2. Command.com 1. SPAM Locker
3. Kernel32.dll 2. Firewall
4. Run32.dll 3. Honeypot
Q17. The process of booting a computer from a network 4. CAPTCHA
rather than a local drive is known as: Q24. Which of the following options is the measure of the
1. Scheduled Booting effectiveness of a password in restricting password
2. Network Booting guessing?
3. Attended Booting 1. Password Code
4. Silent Booting 2. Password Length
Q18. Which of the following devices is responsible for 3. Password Strength
forwarding data packets between computer networks? 4. Password Scope
1. Repeater Q25. Which of the following terms describes an error in
2. Hub computer program that causes it to produce undesired
3. Modem results?
4. Routers 1. Software Boot
Q19. The digital image that is used as a decorative 2. Software Crash
background on the screen of a computer is known as: 3. Software Malfunction
1. Desktop 4. Software Bug
2. Screen Saver Q26. Which of the following options is used to prevent,
3. Wallpaper detect and remove malicious software from the computer
4. Image system?
Q20. Which of the following components of Windows acts 1. Anti-Virus
as a safety net for mistakenly deleted files or folders from 2. Antigen
the hard disk? 3. Anti-SPAM
1. My Documents 4. Antibody
2. Internet Explorer Q27. The file extension .PNG is a short for:
3. Task Bar 1. Partitioned Network Graphics
4. Recycle Bin 2. Portable Network Graphics
Q21. Which of the following options is used for powering 3. Presentation Natural Graphics
down a computer while retaining its current state and saving 4. Portable Natural Graphics
electrical power? Q28. Which of the following is NOT a file / folder attribute
1. Hibernate in traditional DOS and Windows systems?
2. Sleep 1. Archive
3. Restart 2. Hidden
4. Shutdown 3. Read Only
Q22. The process of encoding messages in such a way that 4. Write Only
only authorised users can read it is referred to as:

Page | 2
2016 November

Q29. In file management, a permanent reproduction of file Q36. In MS-Word, to reduce font size which of the
data in the form of printed document is known as: following shortcuts is used?
1. Soft Copy 1. CTRL + SHIFT + C
2. Document Backup 2. CTRL+Return
3. Hard Copy 3. CTRL + {
4. Blueprint 4. ALT+=
Q30. In Windows O.S. the key combination of "CTRL + Q37. Which of the following keyboard shortcuts is used to
SHIFT + ESC" would open: navigate from one worksheet to the next in the increasing
1. Control Panel order of worksheet numbers?
2. Windows Device Manager 1. CTRL+PgDn
3. Programs Menu 2. CTRL+F9
4. Windows Task Manager 3. CTRL + PgUp
Q31. The process of using a computer to create, edit and 4. CTRL+F10
print documents is commonly known as: Q38. Which of the following shortcuts is used to insert a
1. Word Art new worksheet in a workbook?
2. Word Processing 1. SHIFT+F9
3. Word Formatting 2. SHIFT+F10
4. Word Definition 3. SHIFT+F11
Q32. Which of the following is NOT a Find and Replace 4. SHIFT+F12
option in MS Word? Q39. To copy cell formats from one cell to another which of
1. Find Whole Words Only the following utilities can be used?
2. Match Case 1. Conditional Format
3. Find By Document Date 2. Format Painter
4. Match Prefix 3. Format Cells
Q33. In MS Word, the file extension XPS stands for: 4. Cell Styles
1. XSLT Paper Styling Q40. Tying a range of cells together so that they can be
2. XSL Page Style collapsed or expanded together is known as:
3. XML Page Specification 1. Sort
4. XML Paper Specification 2. Consolidate
Q34. A word document containing Standard Laboratory 3. Subtotal
results has multiple copies distributed to a number of site 4. Group
supervisors for data feeding. How to view and/or retain the Q41. The expression = MOD (558, 10) would return which
original as well as the revised values? of the following value?
1. Cross-Reference 1.8
2. Combine 2.55.8
3. Find and Replace 3.8 1
4. Split Window 4. 558
Q35. To write a mathematical expression Z2 = X2 + Y2 Q42. Which of the following Chart types would be useful
which of the following features must be used? for comparing values over categories?
1. Superscript 1. Dot Graph
2. Subscript 2. Column Chart
3. Paragraph Spacing 3. Line Chart
4. Drop Cap 4. Pie Chart

Page | 3
2016 November

Q43. Which of the following is NOT a function in MS 3. Simple Mail Translate Protocol
Excel? 4. Simple Message Type Protocol
1. MAX Q50. Which of the following protocols is used for
2. SUM delivering audio and video over IP networks?
3. AVG 1. UDP
4. MIN 2. RTP
Q44. Which of the following series type is NOT valid for 3. SMTP
Fill Series option? 4. BGP
1. AutoFill Q51. In webpage designing, the term CSS is a short for:
2. Growth 1. Content Style Sheets
3. Linear 2. Category Style Sheets
4. Time 3. Cascading Style Sheets
Q45. An enterprise needs to maintain expenses on 4. Content Storage Sheets
Stationary. Transportation, Snacks. Telephone and Mobile Q52. The process of moving or copying the data between
Bills etc. for every month. The same needs to be analysed in the two storage devices is known as:
order to cut down the unnecessary expenses. What would be 1. Downloading
the best Analytical tool from the following options? 2. Data Transfer
1. Pivot Table 3. Uploading
2. Macro 4. Computing
3. What-if Analysis
4. Filter
Q46. Which of the following chart types is similar to a
Scatter Chart but unlike the Scatter Chart compares the set
of three values instead of two?
1. Pie Chart
2. Bubble Chart
3. Area Chart
4. Radar Chart
Q47. The process of receiving the data from the internet is
known as:
1. Downloading
2. Uploading
3. Forwarding
4. Encoding
Q48. Which of the following options is used to set visual
appearance of the web page besides HTML?
1. TCP
2. CTML
3. XML
4. CSS
Q49. Which of the following options is an internet standard
for electronic mail transmission?
1. Simple Message Transfer Protocol
2. Simple Mail Transfer Protocol

Page | 4
2016 November

Q1. The term SATA is an abbreviation for: 1. Palm Pilot


1. Serial Advanced Technology Attachment 2. Stylus
2. Serial Asynchronous Technology Advancement 3. Pointer
3. Serial Advanced Thunderbolt Arrangement 4. Pantograph
4. Serial Articulated Technology Attachment Q9. The technique of comparing selected facial features
Q2. An electronic circuit or software that Compresses or from the image and facial database is known as:
Decompresses videos is known as: 1. Fingerprint Scanning
1. Video Patch 2. Voice Recognition System
2. Video Signal 3. Facial Reconnaissance System
3. Video Codec 4. Facial Recognition System
4. Video Stream Q10. Based on the Storage Capacity, which of the following
Q3. Graphic Tablet belongs to which of the following is the smallest?
categories? 1. Blu-ray Disk
1. Gaming Devices 2. Hard Disk
2. Output Devices 3. Floppy Disk
3. Storage Devices 4. Compact Disk
4. Input Devices Q11. Which of the following is NOT a UNIX Shell?
Q4. A piece of stiff paper containing digital information 1. C Shell
represented by the presence or absence of holes in 2. Korn Shell
predefined positions is called: 3. Bourne Shell
1. Memory Card 4. Bomb Shell
2. Punch Card Q12. Which of the following directly executes instructions
3. Identity Card without previously compiling them into a machine
4. Smart Card language?
Q5. Which of the following terms correctly describes 1. Interpreter
BINAC? 2. Compiler
1. Binary Asymmetric Computer 3. Parser
2. Binary Asynchronous Circuit 4. Runtime Library
3. Binary Automatic Calculator Q13. In operating systems, which of the following
4. Binary Automatic Computer terminologies describes the state in which each member of a
Q6. Which of the following directs flow of data between group is waiting for some other member to release a
CPU and other devices? resource?
1. Math Coprocessor 1. Threading
2. Control Unit (CU) 2. Dead Lock
3. Arithmetic Logic Unit (ALU) 3. Thrashing
4. Cache Memory 4. Synchronization
Q7. Which of the following provides Input and Output of Q14. To create a file in Linux, which of the following
Audio Signals to and from a Computer? commands is used?
1. Sound Card 1. Chown
2. Graphics Card 2. Create
3. PCI-E 3. CopyCon
4. Network Card 4. Cat
Q8. An instrument used to input commands to a Graphics Q15. A computer program designed to be run by the UNIX
Tablet, Computer Screen or Mobile Device is known as: Shell is known as:

Page | 5
2016 November

1. System Diagnostics Q22. Which of the following terms correctly defines the
2. Shell Script study of techniques for secure communication by
3. Command Interpreter constructing and analysing protocols to prevent the public
4. Batch File from reading private messages?
Q16. In DOS and like operating systems, the term CLI 1. Spamming
generally refers to: 2. Hashing
1. Command Logic Interpreter 3. Checksum
2. Command Lateral Interaction 4. Cryptography
3. Command Lexical Interface Q23. In Computer Security, the process of recovering the
4. Command Line Interface passwords from the data that have been stored in computer
Q17. Which of the following options is used to change system is described by:
computer's background by right-clicking anywhere on the 1. Password Cracking
desktop? 2. Password Hacking
1. Personalize 3. Password Breaking
2. Settings 4. Password Guessing
3. Appearance Q24. In Windows O.S., which of the following utilities is
4. Screen Resolution used to manage settings and driver software for system
Q18. While starting Windows operating system, which of hardware including peripheral devices?
the following modes is used for diagnostics and 1. Troubleshooting
troubleshooting problems? 2. Programs and Features
1. Safe Mode 3. Device Manager
2. Normal Mode 4. Windows Mobility Center
3. Command Prompt Mode Q25. In Windows O.S. the built-in software product that
4. Troubleshoot Mode attempts to detect and remove malware is commonly known
Q19. In Windows systems, a small window that as:
communicates information to the users and prompts them 1. Recovery
for a response is known as: 2. Security and Maintenance
1. Windows Explorer 3. Windows Defender
2. Administrative Tools 4. Windows Firewall
3. Dialog Box Q26. Which of the following options allows user to view
4. Control Panel and manipulate basic system settings?
Q20. Which of the following is NOT an option in window 1. Recycle Bin
menu of Windows O.S.? 2. My Documents
1. Maximize 3. Control Panel
2. Minimize 4. My Network
3. Close Q27. The method of keeping the files up to date that are
4. Dock stored in several different physical locations is known as:
Q21. Which of the following devices allows a computer to 1. File Maintenance
keep running when the primary power source is lost? 2. File Synchronization
1. Router 3. File Recording
2. Rectifier 4. File Tracking
3. UPS Q28. To undo an action while writing into a file, which of
4. Inverter the following shortcuts can be used?
1. CTRL+Z

Page | 6
2016 November

2. CTRL+C 3. DOCM
3. CTRL+V 4. DOTM
4. CTRL+U Q36. To create a Superscript which of the following
Q29. Which of the following is the Microsoft Help browser shortcuts is used?
to view the Windows Help Documents? 1. SHIFT+F7
1. Win32.exe 2. CTRL+S
2. Winhlp32.exe 3. CTRL + SHIFT ++
3. Synaptics.log 4. CTRL+U
4. Win.ini Q37. Which of the following keyboard shortcuts is used to
Q30. Which of the following is a library of official technical navigate from one worksheet to the next in the decreasing
documentation intended for developers developing order of worksheet numbers?
Microsoft Windows? 1. CTRL+F1
1. WSDL 2. CTRL+PgUp
2. UDDI 3. CTRL+F10
3. MSDN 4. CTRL+PgDn
4. JSDK Q38. What does SUMIF() function do?
Q31. The process of creation of documents using page 1. Adds all numbers in a range of cells
layout skills and produce typographical quality text for 2. Returns a subtotal of numbers
printing on a desktop computer is usually known as: 3. Adds all numbers based on conditional formatting
1. Desktop Editing 4. Adds up cell values based on a condition
2. Desktop Printing Q39. What does the VLOOKUP() function do?
3. Desktop Formatting 1. Checks vertical alignment of the text
4. Desktop Publishing 2. Finds records beginning with letter "V"
Q32. In MS Office, the term ODF stands for: 3. Finds related records
1. Object Document Format 4. Checks data validation
2. Open Document Format Q40. The expression = FACT(5) would return which of the
3. Object Data Format following value?
4. Open Data Format 1. 60
Q33. Which of the following options is used to setup 2. 120
document margins in MS Word? 3. 5*4*3*2*1
1. Page Setup 4. True
2. View Q41. Which of the following CANNOT be pasted
3. Review selectively using Paste Special?
4. Home 1. Formulas
Q34. A word document with predefined page layouts, fonts, 2. Values
margins and styles is known as: 3. Formats
1. Template 4. Subtotals
2. Page Setup Q42. Which of the following statements is FALSE about
3. Print Layout Importing Data into Excel?
4. Macro 1. Data can be imported from HTML file
Q35. Which of the following is NOT a featured Word 2. Data can be imported from XML file
Extension? 3. Data can be imported from Text file
1. DOCX 4. Data can be imported from SQL Server
2. DOSX Q43. Which of the following is a valid Excel file extension?

Page | 7
2016 November

1. .XSLT 1. Uploading
2. .XLSB 2. Downloading
3. .PPSX 3. Linking
4. .ASPX 4. Embedding
Q44. A health survey conducted in schools, gathered Q51. The data that provides information about other data is
students' heights and weights. Which of the following chart known as:
types would be more suitable in order to show correlation 1. Meta Information
between the heights and the weights measured? 2. Meta Links
1. Bar Chart 3. Metadata
2. Line Chart 4. Meta-Search Engine
3. Scatter Chart Q52. Which of the following options is NOT a Video
4. Column Chart Conferencing application?
Q45. The expression = UPPER("excel") would return which 1. Skype
of the following value? 2. VLC
1. LECXE 3. Yahoo! Messenger
2. excel 4. AOL Instant Messenger
3. Excel
4. EXCEL
Q46. Which of the following combinations opens Format
Cells option?
1. CTRL+9
2. CTRL +0
3. CTRL+1
4. CTRL+6
Q47. Which of the following is a standard network protocol
used to transfer the files between client and a server?
1. SMTP
2. FTP
3. IP
4. STTP
Q48. The term XML is an abbreviation of:
1. Expressive Markup Language
2. Expandable Markup Language
3. Extensive Markup Language
4. Extensible Markup Language
Q49. In World Wide Web terminologies, a collection of
web sites by Category and Sub Category is often referred to
as:
1. Web Site
2. Web Page
3. Web Directory
4. Web Portal
Q50. The Process of sending the data to the web server on
the internet from a local computer is known as:

Page | 8
2016 October

Q1. To manage and increase the performance of graphics, 2. Sound Card


which of the following is used along with CPU? 3. Graphics Card
1. ALU 4. Network Interface Card
2. Math Coprocessor Q9. The software that is owned by an individual or a
3. GPU company is known as:
4. Sound Card 1. Open Source Software
Q2. Which of the following devices cannot be shared on a 2. Proprietary Software
computer network? 3. Firmware
1. Hard Drive 4. Third-Party Software
2. Keyboard Q10. Which of the following is an open source operating
3. CD Drive system?
4. Printer 1. LINUX
Q3. In which generation of computers, Integrated Circuit 2. Microsoft Windows
(IC) was developed? 3. iOS
1. First Generation 4. OS X
2. Second Generation Q11. In computers and digital technology 1 GB is:
3. Third Generation 1. 1024 MB
4. Fourth Generation 2. 1024 KB
Q4. MICR stands for: 3. 1024 TB
1. Magnetic Ink Character Repetition Code 4. 1024 B
2. Magnetic Ink Character Reduction Code Q12. Which of the following software utilities detects and
3. Magnetic Ink Character Recognition Code removes harmful threats to a computer and its data?
4. Magnetic Input Character Recognition Code 1. Anti-Virus
Q5. Which one of the following is not classified as 2. Disk Defragmenter
Biometrics? 3. Compiler
1. Voice Scan 4. Assembler
2. Retina Scan Q13. Which of the following operating systems is NOT a
3. Fingerprint Unix Flavour?
4. Digital Signature 1. Red Hat
Q6. Which of the following is NOT an example of an 2. Marshmallow
Impact Printer? 3. Fedora
1. Laser Printer 4. Ubuntu
2. Drum Printer Q14. GUI is a short form for:
3. Chain Printer 1. Graphics Utility Interchange
4. Daisy Wheel Printer 2. Graphical Utility Interface
Q7. The term LCD in Digital Display Technology stands 3. Graphical User Interface
for: 4. Graphics User Internet
1. Light Circuit Display Q15. What type of software Oracle is?
2. Light Crystal Display 1. Firmware
3. Liquid Circuit Display 2. Database
4. Liquid Crystal Display 3. Graphic Designing
Q8. Which of the following is essential to process sound in 4. Browser
a computer? Q16. Which of the following Windows commands is used
1. Data Card to partition a hard drive?

Page | 1
2016 October

1. DISKPART 2. Closes all applications of the current user and Shuts


2. FORMAT Down the computer
3. DISKCOPY 3. Closes all applications of the current user and Restarts the
4. DEFRAG computer
Q17. In which of the following formats data is stored in a 4. Closes all applications of the current user and Hibernates
computer? the computer
1. Hexadecimal Q24. A person who gains an illegal access to a computer
2. Binary with the intention of stealing computer's data is known as:
3. Decimal 1. Administrator
4. Octal 2. Analyst
Q18. Which of the following methods cannot be used for 3. Hacker
Data Transfer between two computers? 4. Programmer
1. Hi-Fi Q25. Which of the following terms is used when a
2. Wi-Fi Computer is started from a Powered-Down or OFF State?
3. LAN Cable 1. Warm Boot
4. Memory Stick 2. Cold Boot
Q19. In Windows OS which of the following Shortcuts is 3. Formatting
used to close the currently active application window? 4. Boot Sequence
1. SPACE + F4 Q26. Which of the following tables is used by the Windows
2. CTRL+F4 Operating System to store information about Files?
3. SHIFT+F4 1. File Allocation Table
4. ALT+F4 2. File and Folder Table
Q20. Which of the following cannot be used in establishing 3. BIOS
Internet connection? 4. Directory Index Table
1. Switch Q27. The abbreviation IP in the term IP Address refers to:
2. Router 1. Internet Procedure
3. HDMI 2. Internal Processing
4. Modem 3. Internet Provider
Q21. Which of the following options performs Power On 4. Internet Protocol
Self Test when a computer is switched on? Q28. The term W3C in the internet terminology resolves to:
1. CPU 1. World Wide Web Consolidation
2. Hard Drive 2. World Wide Web Configuration
3. SMPS 3. World Wide Web Consortium
4. BIOS 4. World Wide Web Corporation
Q22. The term UPS in Computer Power Backup Q29. The Acronym DOS stands for?
Terminologies stands for: 1. Digital Operating System
1. Undivided Power Supply 2. Disk Operating System
2. Uninterruptible Power Supply 3. Desktop Operating System
3. Universal Power Supply 4. Decimal Operating System
4. Unified Power Supply Q30. Which of the following is a standard security
Q23. Which of the following is True about "Log Off" technology for an encrypted connection between Web
option in Windows OS? Server and Web Browser?
1. Closes all applications of the current user and keeps the 1. Secure Sockets Layer (SSL)
computer running 2. Hypertext Markup Language (HTML)

Page | 2
2016 October

3. Data Definition Language (DDL) Q37. In MS Word, the process to create personalized letters
4. Application Delivery Controller (ADC) and pre-addressed envelopes or mailing labels for mass
Q31. Which of the following is the basic unit of a Computer mailing is referred to as:
Display Resolution? 1. Table of Contents
1. JPEG 2. Indexing
2. Bitmap 3. Cross-Reference
3. Pixel 4. Mail Merge
4. GIF Q38. Which of the following options is used in MS Word to
Q32. Which of the following is NOT a Malware? mark a specific place in a document for later reading or
1. Adware retrieval?
2. Spyware 1. Page Break
3. Firmware 2. Bullet
4. Trojan Horse 3. Bookmark
Q33. In Windows OS which of the following commands 4. Hyperlink
opens the Registry to Search. Add and Edit Registry entries Q39. In MS Word, a line of text that describes a diagram or
of Applications? an object and placed right below it is known as:
1. inetmgr 1. Comment
2. rundll32 2. Endnote
3. regedit 3. Footnote
4. registerfile 4. Caption
Q34. In Windows OS to "Prohibit a User to change the Q40. The additional margin added to a page layout to
System Date and Time", necessary privileges can be set compensate for the part of the paper made unusable by the
using: binding process is known as:
1. Event Viewer 1. Paragraph
2. Local Security Policy 2. Gutter Margin
3. User Accounts 3. Tab Space
4. Date and Time 4. Orientation
Q35. Which of the following is True about the Document Q41. In MS Excel, which of the following keyboard
Outline in MS Word? shortcuts can be used to create a chart from the selected
1. A structural view of a document with headings in Web cells?
Browser 1. F11
2. A structural view of a document with headings at various 2. F1
levels and associated text 3. F5
3. A structural view of a document with headings in Full 4. FS
Screen Q42. Which of the following is a correct representation of
4. A structural view of a document with headings as Hyper cells selection, starting at D1. and ending at F5?
Links 1. D-1: F-5
Q36. The Word 2010 template has an extension: 2. ID: 5F
1. .DOTX 3. D1: F5
2. .ODT 4. D1: 5F
3. .RTF Q43. The command Ctrl + K in MS-Word is used to:
4. .XPS 1. Copy the Selected Contents
2. Create a Hyperlink
3. Redo the Last Action

Page | 3
2016 October

4. Paste the Selected Contents 1. Hyper Text Transfer Protocol Secure


Q44. Which of the following option in MS-Word copies the 2. Secure File Transfer Protocol
formatting from one place and apply it to another? 3. Post Office Protocol
1. Format Painter 4. Media Transfer Protocol
2. Copy Format Q52. An unsolicited and unwanted Email sent in large
3. Clear Format quantities is often termed as:
4. Clip Art 1. SCAM
Q45. Which of the following inserts a decorative text in 2. SPAM
MS-Word document? 3. HAM
1. ClipArt 4. Trash
2. SmartArt
3. WordArt
4. SmartText
Q46. In Excel, a file that memorizes the current layout of all
open windows and workbooks is known as:
1. Workspace
2. Macro
3. Web Page
4. XML
Q47. A cell with a Formula is copied, Which of the
following will let us paste Only the Formula and Not the
values of the cell?
1. Functions
2. Conditional Formatting
3. Paste Special
4. Format Cell
Q48. Which of the following is referred to as an Absolute
Cell Reference?
1. SD!8
2. SDS8
3. D8
4. DS8
Q49. A Formula must be preceded by:
1. Equal To (=) Sign
2. Dollar (S) Sign
3. Exclamation (!) Mark
4. Colon (:) Sign
Q50. Which of the following is NOT a Search Engine?
1. Google
2. Bing
3. GoDaddy
4. Yahoo
Q51. For secured transactions and browsing over the
internet, the protocol used is:

Page | 4
2016 October

Q1. Which of the following was used during First Q8. A Magnetic Tape is a:
Generation of computers? 1. Random Access Medium
1. Vacuum Tubes 2. Parallel Access Medium
2. Transistors 3. Serial Access Medium
3. Mechanical Gears 4. Synchronized Access Medium
4. Microprocessor Q9. Upon switching off the power, the type of memory that
Q2. In which of the following methods special pre-printed readily loses data is classified as:
forms are designed with Boxes that can be marked with a 1. Volatile Memory
Dark Pencil or Ink? 2. Impact Storage
1. OCR 3. Non-Volatile Memory
2. MICR 4. Non-Impact Storage
3. OMR Q10. Which of the following streams or feeds images on the
4. Bar Coding internet in real time?
Q3. For faster processing, which of the following is used as 1. Photo Copy Machine
an intermediate buffer between Main Memory and the 2. Webcam
Processor? 3. DSLR
1. Secondary Storage 4. Graphics Card
2. Flash Memory Q11. Which of the following is NOT a Desktop Operating
3. Cache Memory System?
4. Virtual Memory 1. Windows Vista
Q4. Which of the following is the correct expansion of the 2. Redhat Linux
term VLSI? 3. Apple Macintosh
1. Very Large System Integrator 4. Google Android
2. Very Large Storage Integration Q12. In computers and digital technology a Nibble is:
3. Very Large Scale Internet 1. One Bit
4. Very Large Scale Integration 2. Eight Bits
Q5. DVD is short form for: 3. Two Bits
1. Digital Versatile Disc 4. Four Bits
2. Digital Volatile Disc Q13. A program written in any high-level language is
3. Digital Visible Disc known as:
4. Digital Valid Disc 1. Byte Code
Q6. An Impact Printer prints characters by using one of the 2. Source Code
following: 3. Target Code
1. An Ink Spray 4. Machine Code
2. Electrically Charged Ink Q14. One Terabyte (1 TB) is equal to how many Gigabytes
3. An Ink Pen (GB)?
4. An Inked Ribbon and Print Head 1. 1000
Q7. ASCII stands for: 2. 256
1. Asian Standard Code for Information Interchange 3. 512
2. American Standard Code for Information Interchange 4. 1024
3. American Standard Configuration for Information Q15. Which of the following provides basic services to all
Interchange parts of the operating system?
4. Asian Standard Configuration for Information 1. Interpreter
Interchange 2. Kernel

Page | 5
2016 October

3. Shell 4. New Technology File System


4. Linker Q24. The extension ".PDF" is a short form for:
Q16. The concept of "Paging" is implemented by: 1. Printable Document Format
1. Hardware 2. Portable Document Format
2. Embedded Software 3. Privileged Document Format
3. Firmware 4. Portable Data File
4. Operating System Q25. In broadband communications technology, the term
Q17. What is False about a "Computer Firewall"? ADSL stands for:
1. Firewall prevents unauthorized access to computer data 1. Assorted Digital Subscriber Line
2. Firewall can be implemented as Software 2. Astute Digital Subscriber Line
3. Firewall can be implemented as Hardware 3. Asymmetric Digital Subscriber Line
4. Firewall is a Virus Program 4. Arial Digital Subscriber Line
Q18. "Retina Scan" is a part of: Q26. To check the availability of a computer terminal on a
1. Biometrics network, which of the following commands is used from
2. Biodegradation another terminal in the same network?
3. Biology 1. cmd
4. Biogas 2. ring
Q19. A mathematical way for demonstrating the 3. ipconfig
authenticity of a digital message or documents is known as: 4. ping
1. Internet Protocol Q27. When a computer is Shut Down, the Calendar and the
2. Remote Procedure Call Clock in the operating system continue to work because of
3. Digital Signature one of the following?
4. Masquerading 1. Uninterrupted Power Supply (UPS)
Q20. A criminal activity done by using computers and 2. An On Board Battery Supply
internet is generally classified as: 3. Switched-Mode Power Supply (SMPS)
1. Social Networking 4. Read Only Memory (ROM)
2. Cybercrime Q28. Ink Jet Printers are classified under the category of:
3. Blogging 1. Line Printers
4. Spamming 2. Character Printer
Q21. ".BMP" is an extension to which type of files? 3. Word Printer
1. Audio Files 4. Band Printer
2. Image Files Q29. The process of locating non-contiguous data files and
3. Video Files rearranging them for faster data access is known as:
4. Binary Files 1. Partitioning
Q22. Which of the following options is NOT a Memory 2. Formatting
Management Technique? 3. Defragmentation
1. Swapping 4. Drive Ghosting
2. Segmentation Q30. In Windows operating system which keyboard
3. Blocking shortcut deletes the file or folder permanently?
4. Paging 1. Ctrl+X
Q23. In Windows OS terminologies NTFS refers to: 2. Shift+F7
1. Nested Technology File System 3. Alt+F4
2. Numeric Technology File System 4. Shift + Del
3. Net Technology File System

Page | 6
2016 October

Q31. Which of the following is the Unit of Measurement for 1. Bound Function
a Dot Matrix Printer? 2. Associated Function
1. Lines Per Second 3. Nested Function
2. Characters Per Second 4. Linked Function
3. Dots Per Second Q39. Which of the following functions of MS Excel would
4. Characters Per Inch return the "Remainder of a Division"?
Q32. Which of the following options saves open documents 1. MRound()
and running applications to Hard Disk and shuts down a 2. Mod()
computer to consume zero power? 3. Median(
1. Log Off 4. Match()
2. Sleep Q40. The term "CAPTCHA" used in the internet technology
3. Hibernate is a short for:
4. Lock Screen 1. Completely Automated Public Terminal test to tell
Q33. The length of an IPv6 Address is: Computers and Humans Apart
1. 16 Bits 2. Completely Automated Private Terminal test to tell
2. 32 Bits Computers and Humans Apart
3. 64 Bits 3. Completely Automated Public Turing test to tell
4. 128 Bits Computers and Humans Apart
Q34. In Windows OS which of the following options cannot 4. Completely Automated Private Turing test to tell
be set through the "Region and Language" settings? Computers and Humans Apart
1. Currency Q41. A conference between two or more participants at
2. Font different locations using computer network to transmit
3. Location audio and video data is known as:
4. Date and Time Formats 1. Wi-Fi
Q35. In MS Excel, which function displays row data in a 2. Ethernet Audio/Video Bridging
column or column data in a row? 3. Video Encoding
1. Trend() 4. Video Conferencing
2. Transpose() Q42. A computer on the internet is identified by its:
3. Trim() 1. Serial Number
4. Trunc() 2. MAC Number
Q36. Which of the following is NOT a logical function? 3. Email Address
1. OR() 4. IP Address
2. AND() Q43. In MS-Word, which of the following options suggests
3. NOT() the other words with similar meaning to the word you have
4. CODE() selected?
Q37. Which of the following functions should be used when 1. Meaning
the comparison values are located in a row across the top of 2. Language
a table of data? 3. Research
1. HLOOKUP() 4. Thesaurus
2. VLOOKUP() Q44. MS-Word "Macros" are written in which
3. Find and Replace programming language?
4. Filter 1. Visual Basic
Q38. In MS Excel, calling one function within another is 2. C
known as: 3. C++

Page | 7
2016 October

4. Java 1. Browser
Q45. In MS-Word, Alt+= command is used for inserting a: 2. Interpreter
1. Page Break 3. Word Processing
2. Symbol 4. Multimedia
3. Mathematical Equation
4. Shape
Q46. Which of the following Excel functions returns a
Maximum of Value from a collection?
1. Mod
2. Mid
3. Max
4. Min
Q47. Which of the following will hold row and column
titles in place so that they do not scroll while scrolling the
worksheet?
1. Margins
2. Rulers
3. Page Break Preview
4. Freeze Panes
Q48. Which of the following would result in an absolute
whole number 57?
1. =ROUND(56.743537,6)
2. =ROUND(56.743537,3)
3. =ROUND(56.743537,1)
4.=ROUND(56.743537,0)
Q49. Which of the following shortcuts hides the entire
column?
1. CTRL+2
2. CTRL+0
3. CTRL+1
4. CTRL+9
Q50. Which of the following functions would return
Current System Date and Time?
1. Date()
2. Today()
3. Now()
4. Time()
Q51. The process of verifying Login Name and Password to
gain access to an Email Account is known as:
1. Configuration
2. Identification
3. Authentication
4. Authorization
Q52. Internet Explorer is a:

Page | 8
2016 September

Q1. Which memory provides high-speed data access to a Q9. The acronym UPS stands for:
processor and stores frequently used computer programs, 1. Unique Power System
applications and data? 2. Universal Power System
1. Cache memory 3. Universal Power Source
2. Hard Disk 4. Uninterruptible Power Supply
3. ALU Q10. Which of the following is not an optical media?
4. Secondary memory 1. CD
Q2. Third Generation Computers were developed in: 2. DVD
1. 1960's 3. Floppy
2. Late 1950's 4. DVD RAM
3. 1970's Q11. By default, programs are installed in:
4. 1990's 1. C drive
Q3. Who is known as father of computer? 2. D drive
1. Tim Berners-Lee 3. E drive
2. Brent Hoberman 4. Flash drive
3. Steve Shirley Q12. Which of the following is a set of computer programs
4. Charles Babbage designed to permit the user to perform a group of
Q4. Which of the following is not an input device? coordinated functions, tasks or activities?
1. Printers 1. Proprietary Software
2. Mouse 2. System Software
3. Keyboard 3. Application Software
4. Microphone 4. Embedded software
Q5. Which one of the following is a single user operating Q13. Which of the following is not an open source
system? software?
1. MS DOS 1. Firefox (web browser)
2. Linux 2. Thunderbird (Mail services)
3. Unix 3. Microsoft office (Spreadsheets, Database, Word etc.)
4. Windows 4. Gimp (image manipulation program)
Q6. Which of the following is a non-impact printer? Q14. Which of the following is a computer software with its
1. Dot-matrix Printers source code made available with a license in which the
2. Laser Printers copyright holder provides the rights to study, change and
3. Daisy-Wheel Printers distribute the software to anyone and for any purpose?
4. Line Printers 1. Operating System
Q7. Which of the following is not an USB type? 2. Proprietary System
1. Type E 3. Embedded Software
2. Type B 5 pin 4. Open-source Software
3. Type A Q15. Select proper hierarchy of Computer Languages from
4. Type C Low to High.
Q8. Which of the following memory uses capacitors and 11. Machine Language
hence they need periodic refreshing? 2. Assembly Language
1. DRAM 3. High-Level Language
2. Cache memory 21. High-Level Language
3. ROM 2. Assembly Language
4. Hard Disk 3. Machine Language

Page | 1
2016 September

31. High-Level Language 2. Windows XP


2. Machine Language 3. Windows 95
3. Assembly Language 4. Windows 97
41. Machine Language Q23. Security hardware and software that control access to
2. High-Level Language a company's intranet and other internal networks is called:
3. Assembly Language 1. Client
Q16. What translates source code into some efficient 2. Firewall
intermediate representation and immediately executes? 3. NIC
1. Assembly Language 4. Proxity
2. Machine Language Q24. Attempts to slow down or stop a computer system or
3. Programming Language network by flooding it with requests for information and
4. Interpreter data is called:
Q17. NTFS stands for: 1. Cracker
1. Novel Technology File System 2. Denial of service
2. New Technology File System 3. Hacker
3. Networking File System 4. Trojan horse
4. Network Technology File System Q25. Allowing user to perform more than one computer
Q18. Which process checks, and ensures that all task such as the operation of an application program at a
components of the computer are operating and connected time is commonly referred to as:
properly? 1. Multitasking
1. Booting 2. Multi-processing
2. Processing 3. Multi-operating
3. Saving 4. Multi-paging
4. Editing Q26. What is known as unauthorized access into others
Q19. The term VPN stands for: system?
1. Vital Public Network 1. Hacking
2. Vital Private Network 2. Encryption
3. Virtual Public Network 3. Scanning
4. Virtual Private Network 4. Decryption
Q20. Act of making a program ready for execution on a Q27. All soft deleted files and folders are automatically
computer by doing a setup of a computer program including moved to:
device drivers and plugins is called as: 1. Control Panel
1. Configuration 2. Spam Folder
2. Storage 3. Recycle Bin
3. Upload 4. My Computer
4. Installation Q28. A task bar, by default, does not contain:
Q21. A bar that indicates the opened applications and can 1. Start Button
be used to switch between applications quickly is: 2. Scroll Bar
1. Menu bar 3. Quick Launch Bar
2. Tool bar 4. System Tray
3. Status bar Q29. CPU and memory usage used can be viewed from:
4. Task bar 1. Task Manager
Q22. Which of the following is not an operating system? 2. My Computer
1. Windows 7 3. Windows Explorer

Page | 2
2016 September

4. Internet Explorer 3. Portrait


Q30. In Windows Explorer, detailed view of the file does 4. Vertical
not display: Q38. Inserting a digital signature in Word documents
1. Name requires _______, such as one from a certified Microsoft
2. Password partner.
3. Type 1. Digital ID
4. Size 2. Digital camera
Q31. How are two files which are not in sequence selected? 3. License
1. Hold Shift key and click on desired files 4. Certification
2. Hold Alt key and click on desired files Q39. The shortcut function key to open 'Save as' dialog box
3. Hold Tab key and click on desired files in MS Word is:
4. Hold Ctrl key and click on desired files 1. F10
Q32. Which of the following is a file archiver and 2. F6
compressor? 3. F12
1. WinZip 4. F11
2. Magnifier Q40. Short cut key to move to the next sheet in Excel is:
3. Narrator 1. CTRL + Tab
4. Squeeze 2. CTRL+Page Down
Q33. Which of the following is not a file format for images? 3. CTRL + Page Up
1. .bmp 4. CTRL + Right Arrow key
2. .jpg Q41. _______ is used to find the number of words,
3. .tif characters, paragraphs, and lines in a Word document.
4. .xlm 1. Thesaurus
Q34. Which of the following is the shortcut key to open 2. Spelling & Grammar
Windows Explorer? 3. Paragraph
1. Ctrl+E 4. Word Count
2. Windows + E Q42. Number of rows in Excel 2010 are:
3. Alt+E 1. 1048576
4. Shift+E 2. 65536
Q35. To move the cursor one word right, which key is 3. 1024
used? 4. 2148576
1. ALT + Right Arrow Q43. Pre-defined and built-in formulas in Excel are known
2. CTRL + Right Arrow as:
3. SHIFT + Right Arrow 1. Auto sheets
4. Fn + Right Arrow 2. Diagrams
Q36. Which of the following is used to insert a 'Hanging 3. Charts
Tab' in MS Word? 4. Functions
1. CTRL+T Q44. In the formula =SAS3*K7. $ symbol is used for
2. CTRL+H making cell reference as:
3. CTRL+L 1. Absolute address
4. CTRL+R 2. Constant
Q37. Which of the below is a type of page orientation? 3. Alignment
1. Horizontal 4. Relative cell address
2. Flipped

Page | 3
2016 September

Q45. Which function adds the cells specified by a given


condition or criteria?
1. Sum()
2. Sumif()
3. Sumifs()
4. Autosum()
Q46. The most widely used social networking site is:
1. CERN
2. LinkedIn
3. Twitter
4. Facebook
Q47. Which line describes the contents of the message
when sending an e-mail?
1. to
2. subject
3. cc
4. bcc
Q48. The code for a Web page is written using:
1. A fifth generation language
2. URL
3. Win Zip
4. Hypertext Markup Language
Q49. The value of the Excel expression = ABS (2+9/3-3) is:
1. 2
2. 3
3. 4
4. 1
Q50. Google is a:
1. Web search engine
2. Web browser
3. Operating system
4. Protocol
Q51. Default number of sheets in an Excel 2007 Workbook
is:
1. 1
2. 3
3. 5
4. 7
Q52. A _______creates a standardized document that can
be sent to many recipients.
1. Template
2. Macro
3. Mail Merge
4. Hyperlink

Page | 4
2016 September

Q1. Serial access memories are useful in applications: 2. Optical Co-music Recognition, which is the recognition
1. Where we have all data ready before start of execution of text characters by a computer
2. Where the data is in number form 3. Optical Character Recognition, which is the recognition
3. Where output is in serial form of text characters by a Music player
4. Where data naturally flows in and out in serial form 4. Optical Co-music Recognition, which is the recognition
Q2. Fourth Generation Computers were developed in: of text characters by a Music player
1. 1960's Q10. Which was an early mainframe computer?
2. Late 1950's 1. UNIC
3. 1970's 2. MINIAC
4. 1990's 3. ENIAC
Q3. ALU stands for: 4. BINIAC
1. Arithmetic Login Unit Q11. Which of the following programming languages does
2. Arithmetic Logic Unit not require any program translator or interpreter?
3. Anti Logic Units 1. Machine language
4. Anti Login Units 2. Assembly language
Q4. USB Stands for: 3. High-level language
1. Universal Set Bus 4. Visual language
2. Universal Series Bus Q12. Which of the following memories has the fastest
3. Universal Serial Bus access speed?
4. Universal Section Bus 1. SRAM
Q5. Which protocol provides e-mail facility among 2. DRAM
different hosts? 3. ROM
1. FTP 4. DVD
2. SMTP Q13. _______ is a type of computer program that is
3. Telnet designed to run a computer's hardware and application
4. SNMP programs.
Q6. Standard single-sided, single-layer DVD holds up to: 1. Operating System
1. 4.8 GB 2. System Software
2. 4.6 GB 3. Proprietary Software
3. 4.7 GB 4. Application Software
4. 4.3 GB Q14. Computer program that takes an executable file as
Q7. A list of instructions used by a computer is called: input, and attempts to create a high level source file which
1. Program can be recompiled successfully is called as:
2. Data 1. Anticompiler
3. Text 2. Decompiler
4. Input 3. Co-Compiler
Q8. A sound card is also known as: 4. Reverse Compiler
1. Audio Card Q15. The memory resident portion of an operating system is
2. Cable Card called:
3. Graphics Card 1. Folder
4. CD ROM 2. CMOS
Q9. OCR is: 3. Hard disk
1. Optical Character Recognition, which is the recognition 4. Kernel
of text characters by a computer

Page | 5
2016 September

Q16. Which of these is not a High Level Computer 2. Create temporary files into disk drive
Language? 3. Format disk drive
1. Machine Language 4. Format flash drive
2. COBOL Q24. Which of the following Commands is required to
3. C & C++ reboot the computer?
4. FORTRAN 1. CTRL + ALT + DEL
Q17. A group of 4 bits is called: 2. CTRL+ALT+TAB
1. KB 3. CTRL + ALT + SHIFT
2. Byte 4. CTRL + SHIFT + DEL
3. Nibble Q25. Special type of virus, which fills a computer system
4. MB with self-replicating information, clogging the system so
Q18. A common boundary between two systems is called: that its operations are slowed or stopped, is called as:
1. Interdiction 1. Firewall
2. Interaction 2. Keystroke
3. Interface 3. Worm
4. Interdependency 4. Zombie
Q19. Windows 7 _______ edition contains the same Q26. VIRUS stands for:
features as Windows 7 Enterprise, but unlike the Enterprise 1. Vital Information Reason Under Siege
edition, it is available to home users on an individual license 2. Vital Information Resource Under Siege
basis. 3. Vital Information Resource Under System
1. Professional 4. Virus Information Resource Under Siege
2. Home Basic Q27. Which type of attack uses software to try thousands of
3. Ultimate common words sequentially in an attempt to gain
4. Home Premium unauthorized access to a user's account?
Q20. Every computer connected to an intranet must have a 1. Denial of service
distinct: 2. Password
1. Firewall 3. Dictionary
2. Proxy Server 4. Virus
3. Domain Name Q28. Which of the following is a class-A IP address?
4. IP address 1. 130.100.5.1
Q21. Which of the following is the default file system of 2. 120.255.10.1
Windows NT family, starting with Windows NT 3.1? 3. 220.150.10.10
1. FAT 4. 223.5.10.1
2. NTFS Q29. The process of removing unwanted part of an image is
3. exFAT called:
4. HFS 1. Removing
Q22. A computer program that converts an entire program 2. Clipping
into machine language is called: 3. Bordering
1. Commander 4. Cropping
2. Simulator Q30. Programs such as Internet Explorer that serve as
3. Compiler navigable windows into the Web are called:
4. Interpreter 1. Hypertext
Q23. "Disk Cleanup" utility is used to: 2. Networks
1. Erase unnecessary files from disk drive 3. Internet

Page | 6
2016 September

4. Web browsers 2. Spams


Q31. The value of the Excel expression =SUM(3*6/3+0-4) 3. Protocols
is: 4. Utilities
1. 2 Q39. Which suite can be used to maintain your security and
2. 3 privacy while you are on the Web?
3. 1 1. Browser security
4. 0 2. Filter
Q32. Which of the following keyboard shortcuts can be 3. Plug-in
used to permanently delete files from the computer? 4. Internet security
1. CTRL+DELETE Q40. Dangerous program that can be infused in a variety of
2. DELETE ways including opening e-mail attachments and
3. ALT+DELETE downloading software from the Internet, is called
4. SHIFT + DELETE 1. App
Q33. When a computer is left idle for a specified period of 2. Spam
time, _______ gets activated. 3. Utility
1. Screen Saver 4. Virus
2. Wallpaper Q41. Which of the following is the shortcut key to cut and
3. Banner paste a file from one location to another?
4. Theme 1. Ctrl+X. Ctrl + P
Q34. The most common extension of a compressed file is: 2. Ctrl+X, Ctrl + V
1. .zip 3. Ctrl+C, Ctrl + V
2. .xls 4. Ctrl+C, Ctrl + P
3. .doc Q42. Which of the following is the shortcut key to close an
4. .bmp active application window?
Q35. To start MS Word using "Run" option from start 1. Alt+F10
menu, which command is used? 2. Alt+F11
1. Ms Word 3. Alt+F1
2. Winword 4. Alt+F4
3. Word2003 Q43. The shortcut key for Spell check and Grammar check
4. Word is:
Q36. How to select a group of files that are continuous in 1. SHIFT+F7
the file list? 2. CTRL+F7
1. Click first file, hold Ctrl, and click on last file 3. F7
2. Click first file, hold Shift, and click on last file 4. Alt+CTRL + F7
3. Click on the first file and drag it to the last file Q44. Background effects applied on a document are not
4. Right-Click on folder and choose Select file visible in:
Q37. Margin added for binding a side of the page while 1. Print Layout view
printing is called: 2. Web layout view
1. Gutter margin 3. Reading View
2. Footer 4. Print Preview
3. Header Q45. Which function key is used to update results of a
4. External left margin formula in excel if it is not auto calculated?
Q38. _______ use a URL to connect to Web sites. 1. F8
1. Browsers 2. F12

Page | 7
2016 September

3. F11
4. F9
Q46. Which option will you use to prevent the flow of data
from one cell to adjoining cells?
1. Align Left
2. Word Wrap
3. Merge Cells
4. Wrap Text
Q47. What can be the best alternative to overcome the lack
of physical appearance in business meeting?
1. Video conferencing
2. Email
3. Telephone
4. Biometrics
Q48. In Excel, to prevent the first row and first column
from hiding while you scroll, you can use:
1. Split window option
2. Unfreeze panes option
3. Hold split option
4. Freeze Panes option
Q49. The default view in excel is:
1. Page Layout
2. Page Break
3. Auto
4. Normal
Q50. When you enter text in a cell in Excel, it also appears
in:
1. Status bar
2. Formula Bar
3. Row Heading
4. Name Box
Q51. CTRL + Enter will add a:
1. Section break
2. Manual Page break
3. Line Break
4. New line
Q52. Which of the following functions is used to find the
positive square root of a number?
1. SQRT
2. ABS
3. ROOT
4. SQUAREROOT

Page | 8

You might also like