[1] are the gates that can be used to implement any type of Boolean logic.
A.
OR gates
B.
Universal gates
C.
NAND gates
D.
Exclusive-NOR gates
Ans:
Universal gates
Explanation :
Universal gates are the gates that can be used to implement any type of Boolean logic or circuit. There are two universal gates, namely, NAND gate and NOR gate, which can be used to implement any of the basic logic gates.
[2] In number system, LSD stands for _.
A.
Left Significant Digit
B.
Low Significant Digit
C.
Lower Significant Digit
D.
Least Significant Digit
Ans:
Least Significant Digit
Explanation :
In number system, LSD stands for Least Significant Digit. It refers to those digits that carry least weight.
[3] Which among the following is the smallest unit of storage:
A.
Byte
B.
Bit
C.
Bug
D.
Nibble
Ans:
Bit
Explanation :
Bit is smallest unit of storage, Nibble= 4Bits, Byte= 8Bits.
[4] Row in an Access table is also known as .
A.
field
B.
record
C.
data
D.
type
Ans:
record
Explanation :
Row in an Access table is also known as Record.
[5] The SubSeven is an example of:
A.
antivirus
B.
Spyware
C.
Spam
D.
Trojan horse
Ans:
Trojan horse
Explanation :
SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
[6] Which among the following is the most suitable type of network that phone lines would use?
A.
WAN
B.
LAN
C.
WWAN
D.
CAN
Ans:
WAN
Explanation :
Wide Area Network (WAN) usually uses telephone lines for connectivity, as WAN is spread over a large area and offers Internet-related services such as browsing, email, chatting, etc.
[7] Changing desktop wallpaper is a simple task which can be accessed through section of all control panel items.
A.
Graphics
B.
Image
C.
Personalize
D.
Windows
Ans:
Personalize
Explanation :
Wallpapers can be changed by the personalize section of all control panel items.
[8] The valid format of MS Word is:
A.
.jpeg
B.
.png
C.
.doc
D.
.exe
Ans:
.doc
Explanation :
“.doc” is valid file format for a Word Document.
[9] Which of the following option may be used to change page-size and margins?
A.
Layout
B.
View
C.
Tools
D.
Data
Ans:
Layout
Explanation :
Page size and Margins can be changed with commands available under the Layout Tab on the ribbon.
[10] To justify the selected text, the shortcut key is:
A.
Ctrl + 1
B.
Ctrl + J
C.
Ctrl + U
D.
Ctrl + Alt + K
Ans:
Ctrl + J
Explanation :
Ctrl + J is used to justify tex.
[11]A function inside another function is called a function.
A.
Nested
B.
Round
C.
Sum
D.
Text
Ans:
Nested
Explanation :
A function inside another function is called a nested function.
[12] Choose the odd one out:
A.
Brute force attack
B.
Virtual Reality
C.
Unethical Phreaker
D.
Keystroke logging
Ans:
Virtual Reality
Explanation :
Except Virtual Reality all other are obvious security threats to computers and data.
[13] A virus that migrates freely within a large population of unauthorized email user is called a _.
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[14] The first Computer Virus is:
A.
Creeper
B.
Sasser
C.
Blaster
D.
All of the above
Ans:
Creeper
Explanation :
Creeper virus is a computer virus that is most commonly recognized as the first computer virus.
[15] Which of the following heading elements displays text with the same size as the normal text written in an HTML document?
A.
B.
C.
D.
Ans:
Explanation :
The text written within the H4 element has the same size as the normal plain text, whereas the text written within the H1, H2 and H3 elements are larger than the normal text.
[16] Which of the following HTML tags is a logical style tag?
A.
B.
C.
D.
Ans:
Explanation :
In HTML, logical style tags specify that the enclosed text has a specific meaning, context, or usage. The is a logical style tag, which conveys to the Web browser that the text enclosed within this tag is an abbreviation.
[17] Which of the following statements is false in the context of client/server network?
A.
It is expensive to set up.
B.
It requires a specialized server.
C.
It is a slow network.
D.
It is highly secure.
Ans:
It is a slow network.
Explanation :
The client/server network contains a centralized server that manages and controls all the other nodes of the network. It is expensive as it requires NOS and a specialized server system.
[18] Which of the following key combination should we use to apply center alignment to a paragraph in MS Word?
A.
Ctrl + S
B.
Ctrl + C
C.
Ctrl + C + A
D.
Ctrl + E
Ans:
Ctrl + E
Explanation :
Ctrl+E is the short cut key for centre alignment of text.
[19] Which one of the following is not a search engine?
A.
Bing
B.
Google
C.
Yahoo
D.
Windows
Ans:
Windows
Explanation :
Windows is not a search engine.
[20] Macros are available in Excel 2016 under which Tab?
A.
Insert
B.
Format
C.
View
D.
Data
Ans:
View
Explanation :
Macros are available in Excel 2016 under View Tab.
[21] Workbook is a collection of in MS Excel?
A.
page set-up
B.
buttons
C.
diagrams
D.
worksheets
Ans:
worksheets
Explanation :
A workbook is a collection of worksheets.
[22] The Internet began with the development of:
A.
USENET
B.
ARPANET
C.
Ethernet
D.
Intranet
Ans:
ARPANET
Explanation :
The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet.
[23] What type of software creates a smaller file that is faster to transfer over the Internet?
A.
Compression
B.
AVG
C.
Fragmentation
D.
MPEG
Ans:
Compression
Explanation :
Compression is the process of reducing the size of a file by encoding its data information more efficiently. By doing this, the result is a reduction in the number of bits and bytes used to store the information.
[24] What is a Pixel?
A.
A computer program that draws picture
B.
A picture stored in secondary memory
C.
The smallest resolvable part of a picture
D.
All of the above
Ans:
The smallest resolvable part of a picture
Explanation :
A pixel is the smallest portion of an image or display that a computer is capable of printing or displaying.
[25] Which tracking program records every keystroke you make on the computer?
A.
ITrack/ULead
B.
eFollow
C.
Key logger
D.
Stalking software
Ans:
Key logger
Explanation :
Keystroke logging, often referred to as key logger or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Explanation :
Universal gates are the gates that can be used to implement any type of Boolean logic or circuit. There are two universal gates, namely, NAND gate and NOR gate, which can be used to implement any of the basic logic gates.
[2] In number system, LSD stands for _.
A.
Left Significant Digit
B.
Low Significant Digit
C.
Lower Significant Digit
D.
Least Significant Digit
Ans:
Least Significant Digit
Explanation :
In number system, LSD stands for Least Significant Digit. It refers to those digits that carry least weight.
[3] Which among the following is the smallest unit of storage:
A.
Byte
B.
Bit
C.
Bug
D.
Nibble
Ans:
Bit
Explanation :
Bit is smallest unit of storage, Nibble= 4Bits, Byte= 8Bits.
[4] Row in an Access table is also known as .
A.
field
B.
record
C.
data
D.
type
Ans:
record
Explanation :
Row in an Access table is also known as Record.
[5] The SubSeven is an example of:
A.
antivirus
B.
Spyware
C.
Spam
D.
Trojan horse
Ans:
Trojan horse
Explanation :
SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
[6] Which among the following is the most suitable type of network that phone lines would use?
A.
WAN
B.
LAN
C.
WWAN
D.
CAN
Ans:
WAN
Explanation :
Wide Area Network (WAN) usually uses telephone lines for connectivity, as WAN is spread over a large area and offers Internet-related services such as browsing, email, chatting, etc.
[7] Changing desktop wallpaper is a simple task which can be accessed through section of all control panel items.
A.
Graphics
B.
Image
C.
Personalize
D.
Windows
Ans:
Personalize
Explanation :
Wallpapers can be changed by the personalize section of all control panel items.
[8] The valid format of MS Word is:
A.
.jpeg
B.
.png
C.
.doc
D.
.exe
Ans:
.doc
Explanation :
“.doc” is valid file format for a Word Document.
[9] Which of the following option may be used to change page-size and margins?
A.
Layout
B.
View
C.
Tools
D.
Data
Ans:
Layout
Explanation :
Page size and Margins can be changed with commands available under the Layout Tab on the ribbon.
[10] To justify the selected text, the shortcut key is:
A.
Ctrl + 1
B.
Ctrl + J
C.
Ctrl + U
D.
Ctrl + Alt + K
Ans:
Ctrl + J
Explanation :
Ctrl + J is used to justify tex.
[11]A function inside another function is called a function.
A.
Nested
B.
Round
C.
Sum
D.
Text
Ans:
Nested
Explanation :
A function inside another function is called a nested function.
[12] Choose the odd one out:
A.
Brute force attack
B.
Virtual Reality
C.
Unethical Phreaker
D.
Keystroke logging
Ans:
Virtual Reality
Explanation :
Except Virtual Reality all other are obvious security threats to computers and data.
[13] A virus that migrates freely within a large population of unauthorized email user is called a _.
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[14] The first Computer Virus is:
A.
Creeper
B.
Sasser
C.
Blaster
D.
All of the above
Ans:
Creeper
Explanation :
Creeper virus is a computer virus that is most commonly recognized as the first computer virus.
[15] Which of the following heading elements displays text with the same size as the normal text written in an HTML document?
A.
B.
C.
D.
Ans:
Explanation :
The text written within the H4 element has the same size as the normal plain text, whereas the text written within the H1, H2 and H3 elements are larger than the normal text.
[16] Which of the following HTML tags is a logical style tag?
A.
B.
C.
D.
Ans:
Explanation :
In HTML, logical style tags specify that the enclosed text has a specific meaning, context, or usage. The is a logical style tag, which conveys to the Web browser that the text enclosed within this tag is an abbreviation.
[17] Which of the following statements is false in the context of client/server network?
A.
It is expensive to set up.
B.
It requires a specialized server.
C.
It is a slow network.
D.
It is highly secure.
Ans:
It is a slow network.
Explanation :
The client/server network contains a centralized server that manages and controls all the other nodes of the network. It is expensive as it requires NOS and a specialized server system.
[18] Which of the following key combination should we use to apply center alignment to a paragraph in MS Word?
A.
Ctrl + S
B.
Ctrl + C
C.
Ctrl + C + A
D.
Ctrl + E
Ans:
Ctrl + E
Explanation :
Ctrl+E is the short cut key for centre alignment of text.
[19] Which one of the following is not a search engine?
A.
Bing
B.
Google
C.
Yahoo
D.
Windows
Ans:
Windows
Explanation :
Windows is not a search engine.
[20] Macros are available in Excel 2016 under which Tab?
A.
Insert
B.
Format
C.
View
D.
Data
Ans:
View
Explanation :
Macros are available in Excel 2016 under View Tab.
[21] Workbook is a collection of in MS Excel?
A.
page set-up
B.
buttons
C.
diagrams
D.
worksheets
Ans:
worksheets
Explanation :
A workbook is a collection of worksheets.
[22] The Internet began with the development of:
A.
USENET
B.
ARPANET
C.
Ethernet
D.
Intranet
Ans:
ARPANET
Explanation :
The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet.
[23] What type of software creates a smaller file that is faster to transfer over the Internet?
A.
Compression
B.
AVG
C.
Fragmentation
D.
MPEG
Ans:
Compression
Explanation :
Compression is the process of reducing the size of a file by encoding its data information more efficiently. By doing this, the result is a reduction in the number of bits and bytes used to store the information.
[24] What is a Pixel?
A.
A computer program that draws picture
B.
A picture stored in secondary memory
C.
The smallest resolvable part of a picture
D.
All of the above
Ans:
The smallest resolvable part of a picture
Explanation :
A pixel is the smallest portion of an image or display that a computer is capable of printing or displaying.
[25] Which tracking program records every keystroke you make on the computer?
A.
ITrack/ULead
B.
eFollow
C.
Key logger
D.
Stalking software
Ans:
Key logger
Explanation :
Keystroke logging, often referred to as key logger or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Explanation :
Bit is smallest unit of storage, Nibble= 4Bits, Byte= 8Bits.
[4] Row in an Access table is also known as .
A.
field
B.
record
C.
data
D.
type
Ans:
record
Explanation :
Row in an Access table is also known as Record.
[5] The SubSeven is an example of:
A.
antivirus
B.
Spyware
C.
Spam
D.
Trojan horse
Ans:
Trojan horse
Explanation :
SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
[6] Which among the following is the most suitable type of network that phone lines would use?
A.
WAN
B.
LAN
C.
WWAN
D.
CAN
Ans:
WAN
Explanation :
Wide Area Network (WAN) usually uses telephone lines for connectivity, as WAN is spread over a large area and offers Internet-related services such as browsing, email, chatting, etc.
[7] Changing desktop wallpaper is a simple task which can be accessed through section of all control panel items.
A.
Graphics
B.
Image
C.
Personalize
D.
Windows
Ans:
Personalize
Explanation :
Wallpapers can be changed by the personalize section of all control panel items.
[8] The valid format of MS Word is:
A.
.jpeg
B.
.png
C.
.doc
D.
.exe
Ans:
.doc
Explanation :
“.doc” is valid file format for a Word Document.
[9] Which of the following option may be used to change page-size and margins?
A.
Layout
B.
View
C.
Tools
D.
Data
Ans:
Layout
Explanation :
Page size and Margins can be changed with commands available under the Layout Tab on the ribbon.
[10] To justify the selected text, the shortcut key is:
A.
Ctrl + 1
B.
Ctrl + J
C.
Ctrl + U
D.
Ctrl + Alt + K
Ans:
Ctrl + J
Explanation :
Ctrl + J is used to justify tex.
[11]A function inside another function is called a function.
A.
Nested
B.
Round
C.
Sum
D.
Text
Ans:
Nested
Explanation :
A function inside another function is called a nested function.
[12] Choose the odd one out:
A.
Brute force attack
B.
Virtual Reality
C.
Unethical Phreaker
D.
Keystroke logging
Ans:
Virtual Reality
Explanation :
Except Virtual Reality all other are obvious security threats to computers and data.
[13] A virus that migrates freely within a large population of unauthorized email user is called a _.
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[14] The first Computer Virus is:
A.
Creeper
B.
Sasser
C.
Blaster
D.
All of the above
Ans:
Creeper
Explanation :
Creeper virus is a computer virus that is most commonly recognized as the first computer virus.
[15] Which of the following heading elements displays text with the same size as the normal text written in an HTML document?
A.
B.
C.
D.
Ans:
Explanation :
The text written within the H4 element has the same size as the normal plain text, whereas the text written within the H1, H2 and H3 elements are larger than the normal text.
[16] Which of the following HTML tags is a logical style tag?
A.
B.
C.
D.
Ans:
Explanation :
In HTML, logical style tags specify that the enclosed text has a specific meaning, context, or usage. The is a logical style tag, which conveys to the Web browser that the text enclosed within this tag is an abbreviation.
[17] Which of the following statements is false in the context of client/server network?
A.
It is expensive to set up.
B.
It requires a specialized server.
C.
It is a slow network.
D.
It is highly secure.
Ans:
It is a slow network.
Explanation :
The client/server network contains a centralized server that manages and controls all the other nodes of the network. It is expensive as it requires NOS and a specialized server system.
[18] Which of the following key combination should we use to apply center alignment to a paragraph in MS Word?
A.
Ctrl + S
B.
Ctrl + C
C.
Ctrl + C + A
D.
Ctrl + E
Ans:
Ctrl + E
Explanation :
Ctrl+E is the short cut key for centre alignment of text.
[19] Which one of the following is not a search engine?
A.
Bing
B.
Google
C.
Yahoo
D.
Windows
Ans:
Windows
Explanation :
Windows is not a search engine.
[20] Macros are available in Excel 2016 under which Tab?
A.
Insert
B.
Format
C.
View
D.
Data
Ans:
View
Explanation :
Macros are available in Excel 2016 under View Tab.
[21] Workbook is a collection of in MS Excel?
A.
page set-up
B.
buttons
C.
diagrams
D.
worksheets
Ans:
worksheets
Explanation :
A workbook is a collection of worksheets.
[22] The Internet began with the development of:
A.
USENET
B.
ARPANET
C.
Ethernet
D.
Intranet
Ans:
ARPANET
Explanation :
The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet.
[23] What type of software creates a smaller file that is faster to transfer over the Internet?
A.
Compression
B.
AVG
C.
Fragmentation
D.
MPEG
Ans:
Compression
Explanation :
Compression is the process of reducing the size of a file by encoding its data information more efficiently. By doing this, the result is a reduction in the number of bits and bytes used to store the information.
[24] What is a Pixel?
A.
A computer program that draws picture
B.
A picture stored in secondary memory
C.
The smallest resolvable part of a picture
D.
All of the above
Ans:
The smallest resolvable part of a picture
Explanation :
A pixel is the smallest portion of an image or display that a computer is capable of printing or displaying.
[25] Which tracking program records every keystroke you make on the computer?
A.
ITrack/ULead
B.
eFollow
C.
Key logger
D.
Stalking software
Ans:
Key logger
Explanation :
Keystroke logging, often referred to as key logger or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Explanation :
SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
[6] Which among the following is the most suitable type of network that phone lines would use?
A.
WAN
B.
LAN
C.
WWAN
D.
CAN
Ans:
WAN
Explanation :
Wide Area Network (WAN) usually uses telephone lines for connectivity, as WAN is spread over a large area and offers Internet-related services such as browsing, email, chatting, etc.
[7] Changing desktop wallpaper is a simple task which can be accessed through section of all control panel items.
A.
Graphics
B.
Image
C.
Personalize
D.
Windows
Ans:
Personalize
Explanation :
Wallpapers can be changed by the personalize section of all control panel items.
[8] The valid format of MS Word is:
A.
.jpeg
B.
.png
C.
.doc
D.
.exe
Ans:
.doc
Explanation :
“.doc” is valid file format for a Word Document.
[9] Which of the following option may be used to change page-size and margins?
A.
Layout
B.
View
C.
Tools
D.
Data
Ans:
Layout
Explanation :
Page size and Margins can be changed with commands available under the Layout Tab on the ribbon.
[10] To justify the selected text, the shortcut key is:
A.
Ctrl + 1
B.
Ctrl + J
C.
Ctrl + U
D.
Ctrl + Alt + K
Ans:
Ctrl + J
Explanation :
Ctrl + J is used to justify tex.
[11]A function inside another function is called a function.
A.
Nested
B.
Round
C.
Sum
D.
Text
Ans:
Nested
Explanation :
A function inside another function is called a nested function.
[12] Choose the odd one out:
A.
Brute force attack
B.
Virtual Reality
C.
Unethical Phreaker
D.
Keystroke logging
Ans:
Virtual Reality
Explanation :
Except Virtual Reality all other are obvious security threats to computers and data.
[13] A virus that migrates freely within a large population of unauthorized email user is called a _.
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[14] The first Computer Virus is:
A.
Creeper
B.
Sasser
C.
Blaster
D.
All of the above
Ans:
Creeper
Explanation :
Creeper virus is a computer virus that is most commonly recognized as the first computer virus.
[15] Which of the following heading elements displays text with the same size as the normal text written in an HTML document?
A.
B.
C.
D.
Ans:
Explanation :
The text written within the H4 element has the same size as the normal plain text, whereas the text written within the H1, H2 and H3 elements are larger than the normal text.
[16] Which of the following HTML tags is a logical style tag?
A.
B.
C.
D.
Ans:
Explanation :
In HTML, logical style tags specify that the enclosed text has a specific meaning, context, or usage. The is a logical style tag, which conveys to the Web browser that the text enclosed within this tag is an abbreviation.
[17] Which of the following statements is false in the context of client/server network?
A.
It is expensive to set up.
B.
It requires a specialized server.
C.
It is a slow network.
D.
It is highly secure.
Ans:
It is a slow network.
Explanation :
The client/server network contains a centralized server that manages and controls all the other nodes of the network. It is expensive as it requires NOS and a specialized server system.
[18] Which of the following key combination should we use to apply center alignment to a paragraph in MS Word?
A.
Ctrl + S
B.
Ctrl + C
C.
Ctrl + C + A
D.
Ctrl + E
Ans:
Ctrl + E
Explanation :
Ctrl+E is the short cut key for centre alignment of text.
[19] Which one of the following is not a search engine?
A.
Bing
B.
Google
C.
Yahoo
D.
Windows
Ans:
Windows
Explanation :
Windows is not a search engine.
[20] Macros are available in Excel 2016 under which Tab?
A.
Insert
B.
Format
C.
View
D.
Data
Ans:
View
Explanation :
Macros are available in Excel 2016 under View Tab.
[21] Workbook is a collection of in MS Excel?
A.
page set-up
B.
buttons
C.
diagrams
D.
worksheets
Ans:
worksheets
Explanation :
A workbook is a collection of worksheets.
[22] The Internet began with the development of:
A.
USENET
B.
ARPANET
C.
Ethernet
D.
Intranet
Ans:
ARPANET
Explanation :
The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet.
[23] What type of software creates a smaller file that is faster to transfer over the Internet?
A.
Compression
B.
AVG
C.
Fragmentation
D.
MPEG
Ans:
Compression
Explanation :
Compression is the process of reducing the size of a file by encoding its data information more efficiently. By doing this, the result is a reduction in the number of bits and bytes used to store the information.
[24] What is a Pixel?
A.
A computer program that draws picture
B.
A picture stored in secondary memory
C.
The smallest resolvable part of a picture
D.
All of the above
Ans:
The smallest resolvable part of a picture
Explanation :
A pixel is the smallest portion of an image or display that a computer is capable of printing or displaying.
[25] Which tracking program records every keystroke you make on the computer?
A.
ITrack/ULead
B.
eFollow
C.
Key logger
D.
Stalking software
Ans:
Key logger
Explanation :
Keystroke logging, often referred to as key logger or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Explanation :
Wallpapers can be changed by the personalize section of all control panel items.
[8] The valid format of MS Word is:
A.
.jpeg
B.
.png
C.
.doc
D.
.exe
Ans:
.doc
Explanation :
“.doc” is valid file format for a Word Document.
[9] Which of the following option may be used to change page-size and margins?
A.
Layout
B.
View
C.
Tools
D.
Data
Ans:
Layout
Explanation :
Page size and Margins can be changed with commands available under the Layout Tab on the ribbon.
[10] To justify the selected text, the shortcut key is:
A.
Ctrl + 1
B.
Ctrl + J
C.
Ctrl + U
D.
Ctrl + Alt + K
Ans:
Ctrl + J
Explanation :
Ctrl + J is used to justify tex.
[11]A function inside another function is called a function.
A.
Nested
B.
Round
C.
Sum
D.
Text
Ans:
Nested
Explanation :
A function inside another function is called a nested function.
[12] Choose the odd one out:
A.
Brute force attack
B.
Virtual Reality
C.
Unethical Phreaker
D.
Keystroke logging
Ans:
Virtual Reality
Explanation :
Except Virtual Reality all other are obvious security threats to computers and data.
[13] A virus that migrates freely within a large population of unauthorized email user is called a _.
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[14] The first Computer Virus is:
A.
Creeper
B.
Sasser
C.
Blaster
D.
All of the above
Ans:
Creeper
Explanation :
Creeper virus is a computer virus that is most commonly recognized as the first computer virus.
[15] Which of the following heading elements displays text with the same size as the normal text written in an HTML document?
A.
B.
C.
D.
Ans:
Explanation :
The text written within the H4 element has the same size as the normal plain text, whereas the text written within the H1, H2 and H3 elements are larger than the normal text.
[16] Which of the following HTML tags is a logical style tag?
A.
B.
C.
D.
Ans:
Explanation :
In HTML, logical style tags specify that the enclosed text has a specific meaning, context, or usage. The is a logical style tag, which conveys to the Web browser that the text enclosed within this tag is an abbreviation.
[17] Which of the following statements is false in the context of client/server network?
A.
It is expensive to set up.
B.
It requires a specialized server.
C.
It is a slow network.
D.
It is highly secure.
Ans:
It is a slow network.
Explanation :
The client/server network contains a centralized server that manages and controls all the other nodes of the network. It is expensive as it requires NOS and a specialized server system.
[18] Which of the following key combination should we use to apply center alignment to a paragraph in MS Word?
A.
Ctrl + S
B.
Ctrl + C
C.
Ctrl + C + A
D.
Ctrl + E
Ans:
Ctrl + E
Explanation :
Ctrl+E is the short cut key for centre alignment of text.
[19] Which one of the following is not a search engine?
A.
Bing
B.
Google
C.
Yahoo
D.
Windows
Ans:
Windows
Explanation :
Windows is not a search engine.
[20] Macros are available in Excel 2016 under which Tab?
A.
Insert
B.
Format
C.
View
D.
Data
Ans:
View
Explanation :
Macros are available in Excel 2016 under View Tab.
[21] Workbook is a collection of in MS Excel?
A.
page set-up
B.
buttons
C.
diagrams
D.
worksheets
Ans:
worksheets
Explanation :
A workbook is a collection of worksheets.
[22] The Internet began with the development of:
A.
USENET
B.
ARPANET
C.
Ethernet
D.
Intranet
Ans:
ARPANET
Explanation :
The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet.
[23] What type of software creates a smaller file that is faster to transfer over the Internet?
A.
Compression
B.
AVG
C.
Fragmentation
D.
MPEG
Ans:
Compression
Explanation :
Compression is the process of reducing the size of a file by encoding its data information more efficiently. By doing this, the result is a reduction in the number of bits and bytes used to store the information.
[24] What is a Pixel?
A.
A computer program that draws picture
B.
A picture stored in secondary memory
C.
The smallest resolvable part of a picture
D.
All of the above
Ans:
The smallest resolvable part of a picture
Explanation :
A pixel is the smallest portion of an image or display that a computer is capable of printing or displaying.
[25] Which tracking program records every keystroke you make on the computer?
A.
ITrack/ULead
B.
eFollow
C.
Key logger
D.
Stalking software
Ans:
Key logger
Explanation :
Keystroke logging, often referred to as key logger or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Explanation :
Page size and Margins can be changed with commands available under the Layout Tab on the ribbon.
[10] To justify the selected text, the shortcut key is:
A.
Ctrl + 1
B.
Ctrl + J
C.
Ctrl + U
D.
Ctrl + Alt + K
Ans:
Ctrl + J
Explanation :
Ctrl + J is used to justify tex.
[11]A function inside another function is called a function.
A.
Nested
B.
Round
C.
Sum
D.
Text
Ans:
Nested
Explanation :
A function inside another function is called a nested function.
[12] Choose the odd one out:
A.
Brute force attack
B.
Virtual Reality
C.
Unethical Phreaker
D.
Keystroke logging
Ans:
Virtual Reality
Explanation :
Except Virtual Reality all other are obvious security threats to computers and data.
[13] A virus that migrates freely within a large population of unauthorized email user is called a _.
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[14] The first Computer Virus is:
A.
Creeper
B.
Sasser
C.
Blaster
D.
All of the above
Ans:
Creeper
Explanation :
Creeper virus is a computer virus that is most commonly recognized as the first computer virus.
[15] Which of the following heading elements displays text with the same size as the normal text written in an HTML document?
A.
B.
C.
D.
Ans:
Explanation :
The text written within the H4 element has the same size as the normal plain text, whereas the text written within the H1, H2 and H3 elements are larger than the normal text.
[16] Which of the following HTML tags is a logical style tag?
A.
B.
C.
D.
Ans:
Explanation :
In HTML, logical style tags specify that the enclosed text has a specific meaning, context, or usage. The is a logical style tag, which conveys to the Web browser that the text enclosed within this tag is an abbreviation.
[17] Which of the following statements is false in the context of client/server network?
A.
It is expensive to set up.
B.
It requires a specialized server.
C.
It is a slow network.
D.
It is highly secure.
Ans:
It is a slow network.
Explanation :
The client/server network contains a centralized server that manages and controls all the other nodes of the network. It is expensive as it requires NOS and a specialized server system.
[18] Which of the following key combination should we use to apply center alignment to a paragraph in MS Word?
A.
Ctrl + S
B.
Ctrl + C
C.
Ctrl + C + A
D.
Ctrl + E
Ans:
Ctrl + E
Explanation :
Ctrl+E is the short cut key for centre alignment of text.
[19] Which one of the following is not a search engine?
A.
Bing
B.
Google
C.
Yahoo
D.
Windows
Ans:
Windows
Explanation :
Windows is not a search engine.
[20] Macros are available in Excel 2016 under which Tab?
A.
Insert
B.
Format
C.
View
D.
Data
Ans:
View
Explanation :
Macros are available in Excel 2016 under View Tab.
[21] Workbook is a collection of in MS Excel?
A.
page set-up
B.
buttons
C.
diagrams
D.
worksheets
Ans:
worksheets
Explanation :
A workbook is a collection of worksheets.
[22] The Internet began with the development of:
A.
USENET
B.
ARPANET
C.
Ethernet
D.
Intranet
Ans:
ARPANET
Explanation :
The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet.
[23] What type of software creates a smaller file that is faster to transfer over the Internet?
A.
Compression
B.
AVG
C.
Fragmentation
D.
MPEG
Ans:
Compression
Explanation :
Compression is the process of reducing the size of a file by encoding its data information more efficiently. By doing this, the result is a reduction in the number of bits and bytes used to store the information.
[24] What is a Pixel?
A.
A computer program that draws picture
B.
A picture stored in secondary memory
C.
The smallest resolvable part of a picture
D.
All of the above
Ans:
The smallest resolvable part of a picture
Explanation :
A pixel is the smallest portion of an image or display that a computer is capable of printing or displaying.
[25] Which tracking program records every keystroke you make on the computer?
A.
ITrack/ULead
B.
eFollow
C.
Key logger
D.
Stalking software
Ans:
Key logger
Explanation :
Keystroke logging, often referred to as key logger or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Explanation :
A function inside another function is called a nested function.
[12] Choose the odd one out:
A.
Brute force attack
B.
Virtual Reality
C.
Unethical Phreaker
D.
Keystroke logging
Ans:
Virtual Reality
Explanation :
Except Virtual Reality all other are obvious security threats to computers and data.
[13] A virus that migrates freely within a large population of unauthorized email user is called a _.
A.
worm
B.
flame war
C.
macro
D.
plagiarism
Ans:
macro
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[14] The first Computer Virus is:
A.
Creeper
B.
Sasser
C.
Blaster
D.
All of the above
Ans:
Creeper
Explanation :
Creeper virus is a computer virus that is most commonly recognized as the first computer virus.
[15] Which of the following heading elements displays text with the same size as the normal text written in an HTML document?
A.
B.
C.
D.
Ans:
Explanation :
The text written within the H4 element has the same size as the normal plain text, whereas the text written within the H1, H2 and H3 elements are larger than the normal text.
[16] Which of the following HTML tags is a logical style tag?
A.
B.
C.
D.
Ans:
Explanation :
In HTML, logical style tags specify that the enclosed text has a specific meaning, context, or usage. The is a logical style tag, which conveys to the Web browser that the text enclosed within this tag is an abbreviation.
[17] Which of the following statements is false in the context of client/server network?
A.
It is expensive to set up.
B.
It requires a specialized server.
C.
It is a slow network.
D.
It is highly secure.
Ans:
It is a slow network.
Explanation :
The client/server network contains a centralized server that manages and controls all the other nodes of the network. It is expensive as it requires NOS and a specialized server system.
[18] Which of the following key combination should we use to apply center alignment to a paragraph in MS Word?
A.
Ctrl + S
B.
Ctrl + C
C.
Ctrl + C + A
D.
Ctrl + E
Ans:
Ctrl + E
Explanation :
Ctrl+E is the short cut key for centre alignment of text.
[19] Which one of the following is not a search engine?
A.
Bing
B.
Google
C.
Yahoo
D.
Windows
Ans:
Windows
Explanation :
Windows is not a search engine.
[20] Macros are available in Excel 2016 under which Tab?
A.
Insert
B.
Format
C.
View
D.
Data
Ans:
View
Explanation :
Macros are available in Excel 2016 under View Tab.
[21] Workbook is a collection of in MS Excel?
A.
page set-up
B.
buttons
C.
diagrams
D.
worksheets
Ans:
worksheets
Explanation :
A workbook is a collection of worksheets.
[22] The Internet began with the development of:
A.
USENET
B.
ARPANET
C.
Ethernet
D.
Intranet
Ans:
ARPANET
Explanation :
The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet.
[23] What type of software creates a smaller file that is faster to transfer over the Internet?
A.
Compression
B.
AVG
C.
Fragmentation
D.
MPEG
Ans:
Compression
Explanation :
Compression is the process of reducing the size of a file by encoding its data information more efficiently. By doing this, the result is a reduction in the number of bits and bytes used to store the information.
[24] What is a Pixel?
A.
A computer program that draws picture
B.
A picture stored in secondary memory
C.
The smallest resolvable part of a picture
D.
All of the above
Ans:
The smallest resolvable part of a picture
Explanation :
A pixel is the smallest portion of an image or display that a computer is capable of printing or displaying.
[25] Which tracking program records every keystroke you make on the computer?
A.
ITrack/ULead
B.
eFollow
C.
Key logger
D.
Stalking software
Ans:
Key logger
Explanation :
Keystroke logging, often referred to as key logger or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Explanation :
A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)
[14] The first Computer Virus is:
A.
Creeper
B.
Sasser
C.
Blaster
D.
All of the above
Ans:
Creeper
Explanation :
Creeper virus is a computer virus that is most commonly recognized as the first computer virus.
[15] Which of the following heading elements displays text with the same size as the normal text written in an HTML document?
A.
B.
C.
D.
Ans:
Explanation :
The text written within the H4 element has the same size as the normal plain text, whereas the text written within the H1, H2 and H3 elements are larger than the normal text.
[16] Which of the following HTML tags is a logical style tag?
A.
B.
C.
D.
Ans:
Explanation :
In HTML, logical style tags specify that the enclosed text has a specific meaning, context, or usage. The is a logical style tag, which conveys to the Web browser that the text enclosed within this tag is an abbreviation.
[17] Which of the following statements is false in the context of client/server network?
A.
It is expensive to set up.
B.
It requires a specialized server.
C.
It is a slow network.
D.
It is highly secure.
Ans:
It is a slow network.
Explanation :
The client/server network contains a centralized server that manages and controls all the other nodes of the network. It is expensive as it requires NOS and a specialized server system.
[18] Which of the following key combination should we use to apply center alignment to a paragraph in MS Word?
A.
Ctrl + S
B.
Ctrl + C
C.
Ctrl + C + A
D.
Ctrl + E
Ans:
Ctrl + E
Explanation :
Ctrl+E is the short cut key for centre alignment of text.
[19] Which one of the following is not a search engine?
A.
Bing
B.
Google
C.
Yahoo
D.
Windows
Ans:
Windows
Explanation :
Windows is not a search engine.
[20] Macros are available in Excel 2016 under which Tab?
A.
Insert
B.
Format
C.
View
D.
Data
Ans:
View
Explanation :
Macros are available in Excel 2016 under View Tab.
[21] Workbook is a collection of in MS Excel?
A.
page set-up
B.
buttons
C.
diagrams
D.
worksheets
Ans:
worksheets
Explanation :
A workbook is a collection of worksheets.
[22] The Internet began with the development of:
A.
USENET
B.
ARPANET
C.
Ethernet
D.
Intranet
Ans:
ARPANET
Explanation :
The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet.
[23] What type of software creates a smaller file that is faster to transfer over the Internet?
A.
Compression
B.
AVG
C.
Fragmentation
D.
MPEG
Ans:
Compression
Explanation :
Compression is the process of reducing the size of a file by encoding its data information more efficiently. By doing this, the result is a reduction in the number of bits and bytes used to store the information.
[24] What is a Pixel?
A.
A computer program that draws picture
B.
A picture stored in secondary memory
C.
The smallest resolvable part of a picture
D.
All of the above
Ans:
The smallest resolvable part of a picture
Explanation :
A pixel is the smallest portion of an image or display that a computer is capable of printing or displaying.
[25] Which tracking program records every keystroke you make on the computer?
A.
ITrack/ULead
B.
eFollow
C.
Key logger
D.
Stalking software
Ans:
Key logger
Explanation :
Keystroke logging, often referred to as key logger or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Explanation :
The text written within the H4 element has the same size as the normal plain text, whereas the text written within the H1, H2 and H3 elements are larger than the normal text.
[16] Which of the following HTML tags is a logical style tag?
A.
B.
C.
D.
Ans:
Explanation :
In HTML, logical style tags specify that the enclosed text has a specific meaning, context, or usage. The is a logical style tag, which conveys to the Web browser that the text enclosed within this tag is an abbreviation.
[17] Which of the following statements is false in the context of client/server network?
A.
It is expensive to set up.
B.
It requires a specialized server.
C.
It is a slow network.
D.
It is highly secure.
Ans:
It is a slow network.
Explanation :
The client/server network contains a centralized server that manages and controls all the other nodes of the network. It is expensive as it requires NOS and a specialized server system.
[18] Which of the following key combination should we use to apply center alignment to a paragraph in MS Word?
A.
Ctrl + S
B.
Ctrl + C
C.
Ctrl + C + A
D.
Ctrl + E
Ans:
Ctrl + E
Explanation :
Ctrl+E is the short cut key for centre alignment of text.
[19] Which one of the following is not a search engine?
A.
Bing
B.
Google
C.
Yahoo
D.
Windows
Ans:
Windows
Explanation :
Windows is not a search engine.
[20] Macros are available in Excel 2016 under which Tab?
A.
Insert
B.
Format
C.
View
D.
Data
Ans:
View
Explanation :
Macros are available in Excel 2016 under View Tab.
[21] Workbook is a collection of in MS Excel?
A.
page set-up
B.
buttons
C.
diagrams
D.
worksheets
Ans:
worksheets
Explanation :
A workbook is a collection of worksheets.
[22] The Internet began with the development of:
A.
USENET
B.
ARPANET
C.
Ethernet
D.
Intranet
Ans:
ARPANET
Explanation :
The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet.
[23] What type of software creates a smaller file that is faster to transfer over the Internet?
A.
Compression
B.
AVG
C.
Fragmentation
D.
MPEG
Ans:
Compression
Explanation :
Compression is the process of reducing the size of a file by encoding its data information more efficiently. By doing this, the result is a reduction in the number of bits and bytes used to store the information.
[24] What is a Pixel?
A.
A computer program that draws picture
B.
A picture stored in secondary memory
C.
The smallest resolvable part of a picture
D.
All of the above
Ans:
The smallest resolvable part of a picture
Explanation :
A pixel is the smallest portion of an image or display that a computer is capable of printing or displaying.
[25] Which tracking program records every keystroke you make on the computer?
A.
ITrack/ULead
B.
eFollow
C.
Key logger
D.
Stalking software
Ans:
Key logger
Explanation :
Keystroke logging, often referred to as key logger or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Explanation :
The client/server network contains a centralized server that manages and controls all the other nodes of the network. It is expensive as it requires NOS and a specialized server system.
[18] Which of the following key combination should we use to apply center alignment to a paragraph in MS Word?
A.
Ctrl + S
B.
Ctrl + C
C.
Ctrl + C + A
D.
Ctrl + E
Ans:
Ctrl + E
Explanation :
Ctrl+E is the short cut key for centre alignment of text.
[19] Which one of the following is not a search engine?
A.
Bing
B.
Google
C.
Yahoo
D.
Windows
Ans:
Windows
Explanation :
Windows is not a search engine.
[20] Macros are available in Excel 2016 under which Tab?
A.
Insert
B.
Format
C.
View
D.
Data
Ans:
View
Explanation :
Macros are available in Excel 2016 under View Tab.
[21] Workbook is a collection of in MS Excel?
A.
page set-up
B.
buttons
C.
diagrams
D.
worksheets
Ans:
worksheets
Explanation :
A workbook is a collection of worksheets.
[22] The Internet began with the development of:
A.
USENET
B.
ARPANET
C.
Ethernet
D.
Intranet
Ans:
ARPANET
Explanation :
The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet.
[23] What type of software creates a smaller file that is faster to transfer over the Internet?
A.
Compression
B.
AVG
C.
Fragmentation
D.
MPEG
Ans:
Compression
Explanation :
Compression is the process of reducing the size of a file by encoding its data information more efficiently. By doing this, the result is a reduction in the number of bits and bytes used to store the information.
[24] What is a Pixel?
A.
A computer program that draws picture
B.
A picture stored in secondary memory
C.
The smallest resolvable part of a picture
D.
All of the above
Ans:
The smallest resolvable part of a picture
Explanation :
A pixel is the smallest portion of an image or display that a computer is capable of printing or displaying.
[25] Which tracking program records every keystroke you make on the computer?
A.
ITrack/ULead
B.
eFollow
C.
Key logger
D.
Stalking software
Ans:
Key logger
Explanation :
Keystroke logging, often referred to as key logger or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Explanation :
Windows is not a search engine.
[20] Macros are available in Excel 2016 under which Tab?
A.
Insert
B.
Format
C.
View
D.
Data
Ans:
View
Explanation :
Macros are available in Excel 2016 under View Tab.
[21] Workbook is a collection of in MS Excel?
A.
page set-up
B.
buttons
C.
diagrams
D.
worksheets
Ans:
worksheets
Explanation :
A workbook is a collection of worksheets.
[22] The Internet began with the development of:
A.
USENET
B.
ARPANET
C.
Ethernet
D.
Intranet
Ans:
ARPANET
Explanation :
The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet.
[23] What type of software creates a smaller file that is faster to transfer over the Internet?
A.
Compression
B.
AVG
C.
Fragmentation
D.
MPEG
Ans:
Compression
Explanation :
Compression is the process of reducing the size of a file by encoding its data information more efficiently. By doing this, the result is a reduction in the number of bits and bytes used to store the information.
[24] What is a Pixel?
A.
A computer program that draws picture
B.
A picture stored in secondary memory
C.
The smallest resolvable part of a picture
D.
All of the above
Ans:
The smallest resolvable part of a picture
Explanation :
A pixel is the smallest portion of an image or display that a computer is capable of printing or displaying.
[25] Which tracking program records every keystroke you make on the computer?
A.
ITrack/ULead
B.
eFollow
C.
Key logger
D.
Stalking software
Ans:
Key logger
Explanation :
Keystroke logging, often referred to as key logger or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Explanation :
A workbook is a collection of worksheets.
[22] The Internet began with the development of:
A.
USENET
B.
ARPANET
C.
Ethernet
D.
Intranet
Ans:
ARPANET
Explanation :
The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet.
[23] What type of software creates a smaller file that is faster to transfer over the Internet?
A.
Compression
B.
AVG
C.
Fragmentation
D.
MPEG
Ans:
Compression
Explanation :
Compression is the process of reducing the size of a file by encoding its data information more efficiently. By doing this, the result is a reduction in the number of bits and bytes used to store the information.
[24] What is a Pixel?
A.
A computer program that draws picture
B.
A picture stored in secondary memory
C.
The smallest resolvable part of a picture
D.
All of the above
Ans:
The smallest resolvable part of a picture
Explanation :
A pixel is the smallest portion of an image or display that a computer is capable of printing or displaying.
[25] Which tracking program records every keystroke you make on the computer?
A.
ITrack/ULead
B.
eFollow
C.
Key logger
D.
Stalking software
Ans:
Key logger
Explanation :
Keystroke logging, often referred to as key logger or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Explanation :
Compression is the process of reducing the size of a file by encoding its data information more efficiently. By doing this, the result is a reduction in the number of bits and bytes used to store the information.
[24] What is a Pixel?
A.
A computer program that draws picture
B.
A picture stored in secondary memory
C.
The smallest resolvable part of a picture
D.
All of the above
Ans:
The smallest resolvable part of a picture
Explanation :
A pixel is the smallest portion of an image or display that a computer is capable of printing or displaying.
[25] Which tracking program records every keystroke you make on the computer?
A.
ITrack/ULead
B.
eFollow
C.
Key logger
D.
Stalking software
Ans:
Key logger
Explanation :
Keystroke logging, often referred to as key logger or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Explanation :
Keystroke logging, often referred to as key logger or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
