[1] To justify the selected text, the shortcut key is _.
A.
Ctrl + 1
B.
Ctrl + J
C.
Ctrl + U
D.
Ctrl + Alt + K
Ans:
Ctrl + J
Explanation :
Ctrl + J is the shortcut key to justify text.
[2] The ability of an operating system to run more than one application at a time is called .
A.
Multi-tasking
B.
Object-oriented programming
C.
Multi-user computing
D.
Real-Time
Ans:
Multi-tasking
Explanation :
The ability of an operating system to run more than one application at a time is called Multi-tasking.
[3] Which one of the following(s) is/are/ real time operating system?
A.
VxWorks
B.
Windows CE
C.
RTLinux
D.
All of these
Ans:
All of these
Explanation :
VxWorks, Windows CE, RTLinux are real time OS.
[4] What is/are different view(s) to display a table in MS Access?
A.
Pivot Table & Pivot Chart View
B.
Design View
C.
Datasheet View
D.
All of the above
Ans:
All of the above
Explanation :
All are views to display a table in MS Access
[5] A is a computer network that usually spans a city or a large campus.
A.
LAN
B.
DAN
C.
MAN
D.
WAN
Ans:
MAN
Explanation :
MAN is abbreviation for Metropolitan Area Network and is a computer network that usually spans a city or a large campus.
[6] What does MAN stands for?
A.
Micro area network
B.
Metropolitan area network
C.
Macro area network
D.
Mix area network
Ans:
Metropolitan area network
Explanation :
MAN is abbreviation for Metropolitan Area Network.
[7] How long is an IPv6 address?
A.
32 bits
B.
128 bytes
C.
64 bits
D.
128 bits
Ans:
128 bits
Explanation :
IPv6 address is 128 bits long.
[8] What does P2P stands for?
A.
Peer To Peer
B.
Peek to peek
C.
Past to past
D.
Pair to pair
Ans:
Peer To Peer
Explanation :
P2P stands for Peer To Peer.
[9] Different icons of application software can be found in which bar in latest version of Microsoft Windows?
A.
Start Menu
B.
Browser
C.
Status
D.
Control Panel
Ans:
Start Menu
Explanation :
Microsoft re-introduced Start Menu bar and you can access various application software through it like paint or Word.
[10] Which among the following technology can be used for an effective online backup of data?
A.
Space
B.
Sun
C.
Rain
D.
Cloud
Ans:
Cloud
Explanation :
In cloud computing, the word cloud is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing.
[11] Which of the following supports 32-bit processor?
A.
Windows 2000
B.
Windows 7
C.
Windows 8.1
D.
All of the above
Ans:
All of the above
Explanation :
All of the given options support 32-bit processor
[12] Choose the odd one out:
A.
Brute force attack
B.
Virtual Reality
C.
Unethical Phreaker
D.
Keystroke logging
Ans:
Virtual Reality
Explanation :
Except Virtual Reality all other are obvious security threats to computers and data.
[13] The first Computer Virus is .
A.
Creeper
B.
Sasser
C.
Blaster
D.
All of the above
Ans:
Creeper
Explanation :
Creeper virus is a computer virus that is most commonly recognized as the first computer virus.
[14] Trackball is an example of a/an :
A.
Programming device
B.
Pointing device
C.
Output device
D.
Software device
Ans:
Pointing device
Explanation :
Trackball is an example of a pointing device (mouse).
[15] The program that is used by search engines to search the Internet for documents using their Web addresses is known as:
A.
Bing
B.
MSN
C.
Spider
D.
Google
Ans:
Spider
Explanation :
Spider is an important element of a search engine that browses the Internet in a systematic manner.
[16] Which of the following software posts unwanted advertisements on client’s computer?
A.
Virus
B.
Malware
C.
Worm
D.
Adware
Ans:
Adware
Explanation :
Adware is a software that is used to post unwanted advertisements. Generally, these advertisements are posted as popups.
[17] What is the current version of IMAP?
A.
IMAP version 2
B.
IMAP version 3
C.
IMAP version 4
D.
IMAP version 5
Ans:
IMAP version 4
Explanation :
IMAP is an application layer protocol that allows an e-mail client to access an e-mail on a remote mail server. The current version, IMAP version 4, is defined by RFC 3501.
[18] A virus that migrates freely within a large population of unauthorized email user is called a _.
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[19] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the frame buffer in some graphics adapters.
[20] Selling and buying products and services in electronic mode is called _.
A.
e-commerce
B.
e-banking
C.
e-learning
D.
online Shopping
Ans:
e-commerce
Explanation :
E-commerce refers to the electronic mode of selling and buying products and services.
[21] To justify the selected text, the shortcut key is .
A.
Ctrl+1
B.
Ctrl+J
C.
Ctrl+U
D.
Ctrl+Alt+K
Ans:
Ctrl+J
Explanation :
Ctrl+J is used to justify the selected text.
[22] Which of the following is a term related with monitor?
A.
DVD
B.
Cartridge
C.
Hard-disk
D.
TFT
Ans:
TFT
Explanation :
TFT is a type of screen.
[23] Which among the following is a language directly understood by CPU?
A.
Machine
B.
C
C.
C++
D.
Java
Ans:
C++
Explanation :
CPU doesn’t understand the C++ language (or any high level programming language). All the High level language statements must be translated into machine code before they can be executed.
[24] Which among the following is the smallest unit of storage
A.
Byte
B.
Bit
C.
Bug
D.
Nibble
Ans:
Byte
Explanation :
Bit is smallest unit of storage, Nibble= 4Bits, Byte= 8Bits.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
Ctrl + J is the shortcut key to justify text.
[2] The ability of an operating system to run more than one application at a time is called .
A.
Multi-tasking
B.
Object-oriented programming
C.
Multi-user computing
D.
Real-Time
Ans:
Multi-tasking
Explanation :
The ability of an operating system to run more than one application at a time is called Multi-tasking.
[3] Which one of the following(s) is/are/ real time operating system?
A.
VxWorks
B.
Windows CE
C.
RTLinux
D.
All of these
Ans:
All of these
Explanation :
VxWorks, Windows CE, RTLinux are real time OS.
[4] What is/are different view(s) to display a table in MS Access?
A.
Pivot Table & Pivot Chart View
B.
Design View
C.
Datasheet View
D.
All of the above
Ans:
All of the above
Explanation :
All are views to display a table in MS Access
[5] A is a computer network that usually spans a city or a large campus.
A.
LAN
B.
DAN
C.
MAN
D.
WAN
Ans:
MAN
Explanation :
MAN is abbreviation for Metropolitan Area Network and is a computer network that usually spans a city or a large campus.
[6] What does MAN stands for?
A.
Micro area network
B.
Metropolitan area network
C.
Macro area network
D.
Mix area network
Ans:
Metropolitan area network
Explanation :
MAN is abbreviation for Metropolitan Area Network.
[7] How long is an IPv6 address?
A.
32 bits
B.
128 bytes
C.
64 bits
D.
128 bits
Ans:
128 bits
Explanation :
IPv6 address is 128 bits long.
[8] What does P2P stands for?
A.
Peer To Peer
B.
Peek to peek
C.
Past to past
D.
Pair to pair
Ans:
Peer To Peer
Explanation :
P2P stands for Peer To Peer.
[9] Different icons of application software can be found in which bar in latest version of Microsoft Windows?
A.
Start Menu
B.
Browser
C.
Status
D.
Control Panel
Ans:
Start Menu
Explanation :
Microsoft re-introduced Start Menu bar and you can access various application software through it like paint or Word.
[10] Which among the following technology can be used for an effective online backup of data?
A.
Space
B.
Sun
C.
Rain
D.
Cloud
Ans:
Cloud
Explanation :
In cloud computing, the word cloud is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing.
[11] Which of the following supports 32-bit processor?
A.
Windows 2000
B.
Windows 7
C.
Windows 8.1
D.
All of the above
Ans:
All of the above
Explanation :
All of the given options support 32-bit processor
[12] Choose the odd one out:
A.
Brute force attack
B.
Virtual Reality
C.
Unethical Phreaker
D.
Keystroke logging
Ans:
Virtual Reality
Explanation :
Except Virtual Reality all other are obvious security threats to computers and data.
[13] The first Computer Virus is .
A.
Creeper
B.
Sasser
C.
Blaster
D.
All of the above
Ans:
Creeper
Explanation :
Creeper virus is a computer virus that is most commonly recognized as the first computer virus.
[14] Trackball is an example of a/an :
A.
Programming device
B.
Pointing device
C.
Output device
D.
Software device
Ans:
Pointing device
Explanation :
Trackball is an example of a pointing device (mouse).
[15] The program that is used by search engines to search the Internet for documents using their Web addresses is known as:
A.
Bing
B.
MSN
C.
Spider
D.
Google
Ans:
Spider
Explanation :
Spider is an important element of a search engine that browses the Internet in a systematic manner.
[16] Which of the following software posts unwanted advertisements on client’s computer?
A.
Virus
B.
Malware
C.
Worm
D.
Adware
Ans:
Adware
Explanation :
Adware is a software that is used to post unwanted advertisements. Generally, these advertisements are posted as popups.
[17] What is the current version of IMAP?
A.
IMAP version 2
B.
IMAP version 3
C.
IMAP version 4
D.
IMAP version 5
Ans:
IMAP version 4
Explanation :
IMAP is an application layer protocol that allows an e-mail client to access an e-mail on a remote mail server. The current version, IMAP version 4, is defined by RFC 3501.
[18] A virus that migrates freely within a large population of unauthorized email user is called a _.
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[19] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the frame buffer in some graphics adapters.
[20] Selling and buying products and services in electronic mode is called _.
A.
e-commerce
B.
e-banking
C.
e-learning
D.
online Shopping
Ans:
e-commerce
Explanation :
E-commerce refers to the electronic mode of selling and buying products and services.
[21] To justify the selected text, the shortcut key is .
A.
Ctrl+1
B.
Ctrl+J
C.
Ctrl+U
D.
Ctrl+Alt+K
Ans:
Ctrl+J
Explanation :
Ctrl+J is used to justify the selected text.
[22] Which of the following is a term related with monitor?
A.
DVD
B.
Cartridge
C.
Hard-disk
D.
TFT
Ans:
TFT
Explanation :
TFT is a type of screen.
[23] Which among the following is a language directly understood by CPU?
A.
Machine
B.
C
C.
C++
D.
Java
Ans:
C++
Explanation :
CPU doesn’t understand the C++ language (or any high level programming language). All the High level language statements must be translated into machine code before they can be executed.
[24] Which among the following is the smallest unit of storage
A.
Byte
B.
Bit
C.
Bug
D.
Nibble
Ans:
Byte
Explanation :
Bit is smallest unit of storage, Nibble= 4Bits, Byte= 8Bits.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
VxWorks, Windows CE, RTLinux are real time OS.
[4] What is/are different view(s) to display a table in MS Access?
A.
Pivot Table & Pivot Chart View
B.
Design View
C.
Datasheet View
D.
All of the above
Ans:
All of the above
Explanation :
All are views to display a table in MS Access
[5] A is a computer network that usually spans a city or a large campus.
A.
LAN
B.
DAN
C.
MAN
D.
WAN
Ans:
MAN
Explanation :
MAN is abbreviation for Metropolitan Area Network and is a computer network that usually spans a city or a large campus.
[6] What does MAN stands for?
A.
Micro area network
B.
Metropolitan area network
C.
Macro area network
D.
Mix area network
Ans:
Metropolitan area network
Explanation :
MAN is abbreviation for Metropolitan Area Network.
[7] How long is an IPv6 address?
A.
32 bits
B.
128 bytes
C.
64 bits
D.
128 bits
Ans:
128 bits
Explanation :
IPv6 address is 128 bits long.
[8] What does P2P stands for?
A.
Peer To Peer
B.
Peek to peek
C.
Past to past
D.
Pair to pair
Ans:
Peer To Peer
Explanation :
P2P stands for Peer To Peer.
[9] Different icons of application software can be found in which bar in latest version of Microsoft Windows?
A.
Start Menu
B.
Browser
C.
Status
D.
Control Panel
Ans:
Start Menu
Explanation :
Microsoft re-introduced Start Menu bar and you can access various application software through it like paint or Word.
[10] Which among the following technology can be used for an effective online backup of data?
A.
Space
B.
Sun
C.
Rain
D.
Cloud
Ans:
Cloud
Explanation :
In cloud computing, the word cloud is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing.
[11] Which of the following supports 32-bit processor?
A.
Windows 2000
B.
Windows 7
C.
Windows 8.1
D.
All of the above
Ans:
All of the above
Explanation :
All of the given options support 32-bit processor
[12] Choose the odd one out:
A.
Brute force attack
B.
Virtual Reality
C.
Unethical Phreaker
D.
Keystroke logging
Ans:
Virtual Reality
Explanation :
Except Virtual Reality all other are obvious security threats to computers and data.
[13] The first Computer Virus is .
A.
Creeper
B.
Sasser
C.
Blaster
D.
All of the above
Ans:
Creeper
Explanation :
Creeper virus is a computer virus that is most commonly recognized as the first computer virus.
[14] Trackball is an example of a/an :
A.
Programming device
B.
Pointing device
C.
Output device
D.
Software device
Ans:
Pointing device
Explanation :
Trackball is an example of a pointing device (mouse).
[15] The program that is used by search engines to search the Internet for documents using their Web addresses is known as:
A.
Bing
B.
MSN
C.
Spider
D.
Google
Ans:
Spider
Explanation :
Spider is an important element of a search engine that browses the Internet in a systematic manner.
[16] Which of the following software posts unwanted advertisements on client’s computer?
A.
Virus
B.
Malware
C.
Worm
D.
Adware
Ans:
Adware
Explanation :
Adware is a software that is used to post unwanted advertisements. Generally, these advertisements are posted as popups.
[17] What is the current version of IMAP?
A.
IMAP version 2
B.
IMAP version 3
C.
IMAP version 4
D.
IMAP version 5
Ans:
IMAP version 4
Explanation :
IMAP is an application layer protocol that allows an e-mail client to access an e-mail on a remote mail server. The current version, IMAP version 4, is defined by RFC 3501.
[18] A virus that migrates freely within a large population of unauthorized email user is called a _.
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[19] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the frame buffer in some graphics adapters.
[20] Selling and buying products and services in electronic mode is called _.
A.
e-commerce
B.
e-banking
C.
e-learning
D.
online Shopping
Ans:
e-commerce
Explanation :
E-commerce refers to the electronic mode of selling and buying products and services.
[21] To justify the selected text, the shortcut key is .
A.
Ctrl+1
B.
Ctrl+J
C.
Ctrl+U
D.
Ctrl+Alt+K
Ans:
Ctrl+J
Explanation :
Ctrl+J is used to justify the selected text.
[22] Which of the following is a term related with monitor?
A.
DVD
B.
Cartridge
C.
Hard-disk
D.
TFT
Ans:
TFT
Explanation :
TFT is a type of screen.
[23] Which among the following is a language directly understood by CPU?
A.
Machine
B.
C
C.
C++
D.
Java
Ans:
C++
Explanation :
CPU doesn’t understand the C++ language (or any high level programming language). All the High level language statements must be translated into machine code before they can be executed.
[24] Which among the following is the smallest unit of storage
A.
Byte
B.
Bit
C.
Bug
D.
Nibble
Ans:
Byte
Explanation :
Bit is smallest unit of storage, Nibble= 4Bits, Byte= 8Bits.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
MAN is abbreviation for Metropolitan Area Network and is a computer network that usually spans a city or a large campus.
[6] What does MAN stands for?
A.
Micro area network
B.
Metropolitan area network
C.
Macro area network
D.
Mix area network
Ans:
Metropolitan area network
Explanation :
MAN is abbreviation for Metropolitan Area Network.
[7] How long is an IPv6 address?
A.
32 bits
B.
128 bytes
C.
64 bits
D.
128 bits
Ans:
128 bits
Explanation :
IPv6 address is 128 bits long.
[8] What does P2P stands for?
A.
Peer To Peer
B.
Peek to peek
C.
Past to past
D.
Pair to pair
Ans:
Peer To Peer
Explanation :
P2P stands for Peer To Peer.
[9] Different icons of application software can be found in which bar in latest version of Microsoft Windows?
A.
Start Menu
B.
Browser
C.
Status
D.
Control Panel
Ans:
Start Menu
Explanation :
Microsoft re-introduced Start Menu bar and you can access various application software through it like paint or Word.
[10] Which among the following technology can be used for an effective online backup of data?
A.
Space
B.
Sun
C.
Rain
D.
Cloud
Ans:
Cloud
Explanation :
In cloud computing, the word cloud is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing.
[11] Which of the following supports 32-bit processor?
A.
Windows 2000
B.
Windows 7
C.
Windows 8.1
D.
All of the above
Ans:
All of the above
Explanation :
All of the given options support 32-bit processor
[12] Choose the odd one out:
A.
Brute force attack
B.
Virtual Reality
C.
Unethical Phreaker
D.
Keystroke logging
Ans:
Virtual Reality
Explanation :
Except Virtual Reality all other are obvious security threats to computers and data.
[13] The first Computer Virus is .
A.
Creeper
B.
Sasser
C.
Blaster
D.
All of the above
Ans:
Creeper
Explanation :
Creeper virus is a computer virus that is most commonly recognized as the first computer virus.
[14] Trackball is an example of a/an :
A.
Programming device
B.
Pointing device
C.
Output device
D.
Software device
Ans:
Pointing device
Explanation :
Trackball is an example of a pointing device (mouse).
[15] The program that is used by search engines to search the Internet for documents using their Web addresses is known as:
A.
Bing
B.
MSN
C.
Spider
D.
Google
Ans:
Spider
Explanation :
Spider is an important element of a search engine that browses the Internet in a systematic manner.
[16] Which of the following software posts unwanted advertisements on client’s computer?
A.
Virus
B.
Malware
C.
Worm
D.
Adware
Ans:
Adware
Explanation :
Adware is a software that is used to post unwanted advertisements. Generally, these advertisements are posted as popups.
[17] What is the current version of IMAP?
A.
IMAP version 2
B.
IMAP version 3
C.
IMAP version 4
D.
IMAP version 5
Ans:
IMAP version 4
Explanation :
IMAP is an application layer protocol that allows an e-mail client to access an e-mail on a remote mail server. The current version, IMAP version 4, is defined by RFC 3501.
[18] A virus that migrates freely within a large population of unauthorized email user is called a _.
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[19] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the frame buffer in some graphics adapters.
[20] Selling and buying products and services in electronic mode is called _.
A.
e-commerce
B.
e-banking
C.
e-learning
D.
online Shopping
Ans:
e-commerce
Explanation :
E-commerce refers to the electronic mode of selling and buying products and services.
[21] To justify the selected text, the shortcut key is .
A.
Ctrl+1
B.
Ctrl+J
C.
Ctrl+U
D.
Ctrl+Alt+K
Ans:
Ctrl+J
Explanation :
Ctrl+J is used to justify the selected text.
[22] Which of the following is a term related with monitor?
A.
DVD
B.
Cartridge
C.
Hard-disk
D.
TFT
Ans:
TFT
Explanation :
TFT is a type of screen.
[23] Which among the following is a language directly understood by CPU?
A.
Machine
B.
C
C.
C++
D.
Java
Ans:
C++
Explanation :
CPU doesn’t understand the C++ language (or any high level programming language). All the High level language statements must be translated into machine code before they can be executed.
[24] Which among the following is the smallest unit of storage
A.
Byte
B.
Bit
C.
Bug
D.
Nibble
Ans:
Byte
Explanation :
Bit is smallest unit of storage, Nibble= 4Bits, Byte= 8Bits.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
IPv6 address is 128 bits long.
[8] What does P2P stands for?
A.
Peer To Peer
B.
Peek to peek
C.
Past to past
D.
Pair to pair
Ans:
Peer To Peer
Explanation :
P2P stands for Peer To Peer.
[9] Different icons of application software can be found in which bar in latest version of Microsoft Windows?
A.
Start Menu
B.
Browser
C.
Status
D.
Control Panel
Ans:
Start Menu
Explanation :
Microsoft re-introduced Start Menu bar and you can access various application software through it like paint or Word.
[10] Which among the following technology can be used for an effective online backup of data?
A.
Space
B.
Sun
C.
Rain
D.
Cloud
Ans:
Cloud
Explanation :
In cloud computing, the word cloud is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing.
[11] Which of the following supports 32-bit processor?
A.
Windows 2000
B.
Windows 7
C.
Windows 8.1
D.
All of the above
Ans:
All of the above
Explanation :
All of the given options support 32-bit processor
[12] Choose the odd one out:
A.
Brute force attack
B.
Virtual Reality
C.
Unethical Phreaker
D.
Keystroke logging
Ans:
Virtual Reality
Explanation :
Except Virtual Reality all other are obvious security threats to computers and data.
[13] The first Computer Virus is .
A.
Creeper
B.
Sasser
C.
Blaster
D.
All of the above
Ans:
Creeper
Explanation :
Creeper virus is a computer virus that is most commonly recognized as the first computer virus.
[14] Trackball is an example of a/an :
A.
Programming device
B.
Pointing device
C.
Output device
D.
Software device
Ans:
Pointing device
Explanation :
Trackball is an example of a pointing device (mouse).
[15] The program that is used by search engines to search the Internet for documents using their Web addresses is known as:
A.
Bing
B.
MSN
C.
Spider
D.
Google
Ans:
Spider
Explanation :
Spider is an important element of a search engine that browses the Internet in a systematic manner.
[16] Which of the following software posts unwanted advertisements on client’s computer?
A.
Virus
B.
Malware
C.
Worm
D.
Adware
Ans:
Adware
Explanation :
Adware is a software that is used to post unwanted advertisements. Generally, these advertisements are posted as popups.
[17] What is the current version of IMAP?
A.
IMAP version 2
B.
IMAP version 3
C.
IMAP version 4
D.
IMAP version 5
Ans:
IMAP version 4
Explanation :
IMAP is an application layer protocol that allows an e-mail client to access an e-mail on a remote mail server. The current version, IMAP version 4, is defined by RFC 3501.
[18] A virus that migrates freely within a large population of unauthorized email user is called a _.
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[19] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the frame buffer in some graphics adapters.
[20] Selling and buying products and services in electronic mode is called _.
A.
e-commerce
B.
e-banking
C.
e-learning
D.
online Shopping
Ans:
e-commerce
Explanation :
E-commerce refers to the electronic mode of selling and buying products and services.
[21] To justify the selected text, the shortcut key is .
A.
Ctrl+1
B.
Ctrl+J
C.
Ctrl+U
D.
Ctrl+Alt+K
Ans:
Ctrl+J
Explanation :
Ctrl+J is used to justify the selected text.
[22] Which of the following is a term related with monitor?
A.
DVD
B.
Cartridge
C.
Hard-disk
D.
TFT
Ans:
TFT
Explanation :
TFT is a type of screen.
[23] Which among the following is a language directly understood by CPU?
A.
Machine
B.
C
C.
C++
D.
Java
Ans:
C++
Explanation :
CPU doesn’t understand the C++ language (or any high level programming language). All the High level language statements must be translated into machine code before they can be executed.
[24] Which among the following is the smallest unit of storage
A.
Byte
B.
Bit
C.
Bug
D.
Nibble
Ans:
Byte
Explanation :
Bit is smallest unit of storage, Nibble= 4Bits, Byte= 8Bits.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
Microsoft re-introduced Start Menu bar and you can access various application software through it like paint or Word.
[10] Which among the following technology can be used for an effective online backup of data?
A.
Space
B.
Sun
C.
Rain
D.
Cloud
Ans:
Cloud
Explanation :
In cloud computing, the word cloud is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing.
[11] Which of the following supports 32-bit processor?
A.
Windows 2000
B.
Windows 7
C.
Windows 8.1
D.
All of the above
Ans:
All of the above
Explanation :
All of the given options support 32-bit processor
[12] Choose the odd one out:
A.
Brute force attack
B.
Virtual Reality
C.
Unethical Phreaker
D.
Keystroke logging
Ans:
Virtual Reality
Explanation :
Except Virtual Reality all other are obvious security threats to computers and data.
[13] The first Computer Virus is .
A.
Creeper
B.
Sasser
C.
Blaster
D.
All of the above
Ans:
Creeper
Explanation :
Creeper virus is a computer virus that is most commonly recognized as the first computer virus.
[14] Trackball is an example of a/an :
A.
Programming device
B.
Pointing device
C.
Output device
D.
Software device
Ans:
Pointing device
Explanation :
Trackball is an example of a pointing device (mouse).
[15] The program that is used by search engines to search the Internet for documents using their Web addresses is known as:
A.
Bing
B.
MSN
C.
Spider
D.
Google
Ans:
Spider
Explanation :
Spider is an important element of a search engine that browses the Internet in a systematic manner.
[16] Which of the following software posts unwanted advertisements on client’s computer?
A.
Virus
B.
Malware
C.
Worm
D.
Adware
Ans:
Adware
Explanation :
Adware is a software that is used to post unwanted advertisements. Generally, these advertisements are posted as popups.
[17] What is the current version of IMAP?
A.
IMAP version 2
B.
IMAP version 3
C.
IMAP version 4
D.
IMAP version 5
Ans:
IMAP version 4
Explanation :
IMAP is an application layer protocol that allows an e-mail client to access an e-mail on a remote mail server. The current version, IMAP version 4, is defined by RFC 3501.
[18] A virus that migrates freely within a large population of unauthorized email user is called a _.
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[19] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the frame buffer in some graphics adapters.
[20] Selling and buying products and services in electronic mode is called _.
A.
e-commerce
B.
e-banking
C.
e-learning
D.
online Shopping
Ans:
e-commerce
Explanation :
E-commerce refers to the electronic mode of selling and buying products and services.
[21] To justify the selected text, the shortcut key is .
A.
Ctrl+1
B.
Ctrl+J
C.
Ctrl+U
D.
Ctrl+Alt+K
Ans:
Ctrl+J
Explanation :
Ctrl+J is used to justify the selected text.
[22] Which of the following is a term related with monitor?
A.
DVD
B.
Cartridge
C.
Hard-disk
D.
TFT
Ans:
TFT
Explanation :
TFT is a type of screen.
[23] Which among the following is a language directly understood by CPU?
A.
Machine
B.
C
C.
C++
D.
Java
Ans:
C++
Explanation :
CPU doesn’t understand the C++ language (or any high level programming language). All the High level language statements must be translated into machine code before they can be executed.
[24] Which among the following is the smallest unit of storage
A.
Byte
B.
Bit
C.
Bug
D.
Nibble
Ans:
Byte
Explanation :
Bit is smallest unit of storage, Nibble= 4Bits, Byte= 8Bits.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
All of the given options support 32-bit processor
[12] Choose the odd one out:
A.
Brute force attack
B.
Virtual Reality
C.
Unethical Phreaker
D.
Keystroke logging
Ans:
Virtual Reality
Explanation :
Except Virtual Reality all other are obvious security threats to computers and data.
[13] The first Computer Virus is .
A.
Creeper
B.
Sasser
C.
Blaster
D.
All of the above
Ans:
Creeper
Explanation :
Creeper virus is a computer virus that is most commonly recognized as the first computer virus.
[14] Trackball is an example of a/an :
A.
Programming device
B.
Pointing device
C.
Output device
D.
Software device
Ans:
Pointing device
Explanation :
Trackball is an example of a pointing device (mouse).
[15] The program that is used by search engines to search the Internet for documents using their Web addresses is known as:
A.
Bing
B.
MSN
C.
Spider
D.
Google
Ans:
Spider
Explanation :
Spider is an important element of a search engine that browses the Internet in a systematic manner.
[16] Which of the following software posts unwanted advertisements on client’s computer?
A.
Virus
B.
Malware
C.
Worm
D.
Adware
Ans:
Adware
Explanation :
Adware is a software that is used to post unwanted advertisements. Generally, these advertisements are posted as popups.
[17] What is the current version of IMAP?
A.
IMAP version 2
B.
IMAP version 3
C.
IMAP version 4
D.
IMAP version 5
Ans:
IMAP version 4
Explanation :
IMAP is an application layer protocol that allows an e-mail client to access an e-mail on a remote mail server. The current version, IMAP version 4, is defined by RFC 3501.
[18] A virus that migrates freely within a large population of unauthorized email user is called a _.
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[19] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the frame buffer in some graphics adapters.
[20] Selling and buying products and services in electronic mode is called _.
A.
e-commerce
B.
e-banking
C.
e-learning
D.
online Shopping
Ans:
e-commerce
Explanation :
E-commerce refers to the electronic mode of selling and buying products and services.
[21] To justify the selected text, the shortcut key is .
A.
Ctrl+1
B.
Ctrl+J
C.
Ctrl+U
D.
Ctrl+Alt+K
Ans:
Ctrl+J
Explanation :
Ctrl+J is used to justify the selected text.
[22] Which of the following is a term related with monitor?
A.
DVD
B.
Cartridge
C.
Hard-disk
D.
TFT
Ans:
TFT
Explanation :
TFT is a type of screen.
[23] Which among the following is a language directly understood by CPU?
A.
Machine
B.
C
C.
C++
D.
Java
Ans:
C++
Explanation :
CPU doesn’t understand the C++ language (or any high level programming language). All the High level language statements must be translated into machine code before they can be executed.
[24] Which among the following is the smallest unit of storage
A.
Byte
B.
Bit
C.
Bug
D.
Nibble
Ans:
Byte
Explanation :
Bit is smallest unit of storage, Nibble= 4Bits, Byte= 8Bits.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
Creeper virus is a computer virus that is most commonly recognized as the first computer virus.
[14] Trackball is an example of a/an :
A.
Programming device
B.
Pointing device
C.
Output device
D.
Software device
Ans:
Pointing device
Explanation :
Trackball is an example of a pointing device (mouse).
[15] The program that is used by search engines to search the Internet for documents using their Web addresses is known as:
A.
Bing
B.
MSN
C.
Spider
D.
Google
Ans:
Spider
Explanation :
Spider is an important element of a search engine that browses the Internet in a systematic manner.
[16] Which of the following software posts unwanted advertisements on client’s computer?
A.
Virus
B.
Malware
C.
Worm
D.
Adware
Ans:
Adware
Explanation :
Adware is a software that is used to post unwanted advertisements. Generally, these advertisements are posted as popups.
[17] What is the current version of IMAP?
A.
IMAP version 2
B.
IMAP version 3
C.
IMAP version 4
D.
IMAP version 5
Ans:
IMAP version 4
Explanation :
IMAP is an application layer protocol that allows an e-mail client to access an e-mail on a remote mail server. The current version, IMAP version 4, is defined by RFC 3501.
[18] A virus that migrates freely within a large population of unauthorized email user is called a _.
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[19] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the frame buffer in some graphics adapters.
[20] Selling and buying products and services in electronic mode is called _.
A.
e-commerce
B.
e-banking
C.
e-learning
D.
online Shopping
Ans:
e-commerce
Explanation :
E-commerce refers to the electronic mode of selling and buying products and services.
[21] To justify the selected text, the shortcut key is .
A.
Ctrl+1
B.
Ctrl+J
C.
Ctrl+U
D.
Ctrl+Alt+K
Ans:
Ctrl+J
Explanation :
Ctrl+J is used to justify the selected text.
[22] Which of the following is a term related with monitor?
A.
DVD
B.
Cartridge
C.
Hard-disk
D.
TFT
Ans:
TFT
Explanation :
TFT is a type of screen.
[23] Which among the following is a language directly understood by CPU?
A.
Machine
B.
C
C.
C++
D.
Java
Ans:
C++
Explanation :
CPU doesn’t understand the C++ language (or any high level programming language). All the High level language statements must be translated into machine code before they can be executed.
[24] Which among the following is the smallest unit of storage
A.
Byte
B.
Bit
C.
Bug
D.
Nibble
Ans:
Byte
Explanation :
Bit is smallest unit of storage, Nibble= 4Bits, Byte= 8Bits.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
Spider is an important element of a search engine that browses the Internet in a systematic manner.
[16] Which of the following software posts unwanted advertisements on client’s computer?
A.
Virus
B.
Malware
C.
Worm
D.
Adware
Ans:
Adware
Explanation :
Adware is a software that is used to post unwanted advertisements. Generally, these advertisements are posted as popups.
[17] What is the current version of IMAP?
A.
IMAP version 2
B.
IMAP version 3
C.
IMAP version 4
D.
IMAP version 5
Ans:
IMAP version 4
Explanation :
IMAP is an application layer protocol that allows an e-mail client to access an e-mail on a remote mail server. The current version, IMAP version 4, is defined by RFC 3501.
[18] A virus that migrates freely within a large population of unauthorized email user is called a _.
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[19] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the frame buffer in some graphics adapters.
[20] Selling and buying products and services in electronic mode is called _.
A.
e-commerce
B.
e-banking
C.
e-learning
D.
online Shopping
Ans:
e-commerce
Explanation :
E-commerce refers to the electronic mode of selling and buying products and services.
[21] To justify the selected text, the shortcut key is .
A.
Ctrl+1
B.
Ctrl+J
C.
Ctrl+U
D.
Ctrl+Alt+K
Ans:
Ctrl+J
Explanation :
Ctrl+J is used to justify the selected text.
[22] Which of the following is a term related with monitor?
A.
DVD
B.
Cartridge
C.
Hard-disk
D.
TFT
Ans:
TFT
Explanation :
TFT is a type of screen.
[23] Which among the following is a language directly understood by CPU?
A.
Machine
B.
C
C.
C++
D.
Java
Ans:
C++
Explanation :
CPU doesn’t understand the C++ language (or any high level programming language). All the High level language statements must be translated into machine code before they can be executed.
[24] Which among the following is the smallest unit of storage
A.
Byte
B.
Bit
C.
Bug
D.
Nibble
Ans:
Byte
Explanation :
Bit is smallest unit of storage, Nibble= 4Bits, Byte= 8Bits.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
IMAP is an application layer protocol that allows an e-mail client to access an e-mail on a remote mail server. The current version, IMAP version 4, is defined by RFC 3501.
[18] A virus that migrates freely within a large population of unauthorized email user is called a _.
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[19] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the frame buffer in some graphics adapters.
[20] Selling and buying products and services in electronic mode is called _.
A.
e-commerce
B.
e-banking
C.
e-learning
D.
online Shopping
Ans:
e-commerce
Explanation :
E-commerce refers to the electronic mode of selling and buying products and services.
[21] To justify the selected text, the shortcut key is .
A.
Ctrl+1
B.
Ctrl+J
C.
Ctrl+U
D.
Ctrl+Alt+K
Ans:
Ctrl+J
Explanation :
Ctrl+J is used to justify the selected text.
[22] Which of the following is a term related with monitor?
A.
DVD
B.
Cartridge
C.
Hard-disk
D.
TFT
Ans:
TFT
Explanation :
TFT is a type of screen.
[23] Which among the following is a language directly understood by CPU?
A.
Machine
B.
C
C.
C++
D.
Java
Ans:
C++
Explanation :
CPU doesn’t understand the C++ language (or any high level programming language). All the High level language statements must be translated into machine code before they can be executed.
[24] Which among the following is the smallest unit of storage
A.
Byte
B.
Bit
C.
Bug
D.
Nibble
Ans:
Byte
Explanation :
Bit is smallest unit of storage, Nibble= 4Bits, Byte= 8Bits.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the frame buffer in some graphics adapters.
[20] Selling and buying products and services in electronic mode is called _.
A.
e-commerce
B.
e-banking
C.
e-learning
D.
online Shopping
Ans:
e-commerce
Explanation :
E-commerce refers to the electronic mode of selling and buying products and services.
[21] To justify the selected text, the shortcut key is .
A.
Ctrl+1
B.
Ctrl+J
C.
Ctrl+U
D.
Ctrl+Alt+K
Ans:
Ctrl+J
Explanation :
Ctrl+J is used to justify the selected text.
[22] Which of the following is a term related with monitor?
A.
DVD
B.
Cartridge
C.
Hard-disk
D.
TFT
Ans:
TFT
Explanation :
TFT is a type of screen.
[23] Which among the following is a language directly understood by CPU?
A.
Machine
B.
C
C.
C++
D.
Java
Ans:
C++
Explanation :
CPU doesn’t understand the C++ language (or any high level programming language). All the High level language statements must be translated into machine code before they can be executed.
[24] Which among the following is the smallest unit of storage
A.
Byte
B.
Bit
C.
Bug
D.
Nibble
Ans:
Byte
Explanation :
Bit is smallest unit of storage, Nibble= 4Bits, Byte= 8Bits.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
Ctrl+J is used to justify the selected text.
[22] Which of the following is a term related with monitor?
A.
DVD
B.
Cartridge
C.
Hard-disk
D.
TFT
Ans:
TFT
Explanation :
TFT is a type of screen.
[23] Which among the following is a language directly understood by CPU?
A.
Machine
B.
C
C.
C++
D.
Java
Ans:
C++
Explanation :
CPU doesn’t understand the C++ language (or any high level programming language). All the High level language statements must be translated into machine code before they can be executed.
[24] Which among the following is the smallest unit of storage
A.
Byte
B.
Bit
C.
Bug
D.
Nibble
Ans:
Byte
Explanation :
Bit is smallest unit of storage, Nibble= 4Bits, Byte= 8Bits.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
CPU doesn’t understand the C++ language (or any high level programming language). All the High level language statements must be translated into machine code before they can be executed.
[24] Which among the following is the smallest unit of storage
A.
Byte
B.
Bit
C.
Bug
D.
Nibble
Ans:
Byte
Explanation :
Bit is smallest unit of storage, Nibble= 4Bits, Byte= 8Bits.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
Page Layout is used may be used to change page-size and margins.
