1) The main webpage of a website is also known as -
Answer
Home Page
2) Portrait and Landscape are:
Answer
Page Orientation
3) What is full form of PDF?
Answer
Portable Document Format
4) A browser extension is a that extends the functionality of a web browser.
Answer
plug-in
5) EDBIC code can support how many different representations of characters?
Answer
256
6) Internet access by transmitting digital data over the wires of a local telephone network is provided by:
Answer
digital subscriber line
7) What type of web technology creates an online community where people can make statements and others can read and respond to those statements?
Answer
Blog
8) How many pins are there in a VGA Connector?
Answer
15
9) An example of a telecommunications device is a .
Answer
modem
10) An application where only one user accesses the database at a given time is an example of a(n) .
Answer
single-user database application
11) A nibble is equal to bits.
Answer
4
12) What is a named area on a disk that is used to store related subfolders and files called?
Answer
folder
13) The two ways to arrange multiple windows on the desktop are:
Answer
cascade and tile
14) is a service that allows organizations to make their own website.
Answer
Web hosting
15) WORM stands for?
Answer
Write Once Read Many
16) A search engine is a search tool that uses another search engine's data to produce their own results from the Internet.
Answer
Meta
17) In MS Word, is a predefined decorative text that you can add to a document.
Answer
WordArt
18) In Excel, a new workbook contains worksheets by default.
Answer
Three
19) In a Windows-based application, when you click the Maximize button, it changes to the
Answer
Restore Down button
20) You cannot save an Excel file in a/an format.
Answer
PSD
21) A is a computer network that usually spans a city or a large campus.
Answer
MAN
22) What does MAN stands for?
Answer
Metropolitan area network
23) 1 Zebibyte is equal to -
Answer
270 bytes
24) The amount of memory (RAM or ROM) is measured in .
Answer
gigabytes
25) Windows Explorer is also known as _.
Answer
File manager
26) Which key should you use to indent the first paragraph of your report?
Answer
tab key
27) Changing desktop wallpaper is a simple task which can be accessed through section of all control panel items.
Answer
Personalize
28) Different icons of application software can be found in which bar in latest version of Microsoft Windows?
Answer
Start Menu
29) What is the current version of IMAP?
Answer
IMAP version 4
30) The program that is used by search engines to search the Internet for documents using their Web addresses is known as:
Answer
Spider
31) The main agenda for Encryption/decryption is to provide a network with strict .
Answer
Privacy
32) Smart card is:
Answer
Microprocessor cards
33) To justify the selected text, the shortcut key is _.
Answer
Ctrl + J
34) In www.yahoo.com, www stands for:
Answer
World Wide Web
35) is the basic communication language or protocol of the Internet.
Answer
TCP/IP
36) In first generation of computers, they used _.
Answer
batch processing
37) Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
Answer
hacker
38) What are those programs collectively called which are created for performing particular tasks in the computer system?
Answer
Application software
39) By what name are two or more fields of a database table called when they are collectively used to specify the primary key?
Answer
Composite key
40) In PowerPoint, view displays all slides of the presentation as a thumbnail and is helpful for repositioning slides?
Answer
Slide Sorter
41) The operation performs a set union of two ‘similarly structured’ tables.
Answer
Union
42) The software that is used to create text based documents is referred as :
Answer
Word processor
43) is a superset of keywords, symbols and a system of rules for constructing statements by which human can communicate the instructions to be executed by a computer.
Answer
A programming language
44) A vacuum tube (also called a VT, electron tube, a valve) is a device sometimes used to amplify electronic signals. Vacuum Tubes were used in which generation of Computers?
Answer
1st Generation
45) The SubSeven is an example of :
Answer
Trojan horse
46) What does JAR stand for?
Answer
Java Archive
47) The dual-port version of DRAM formerly used in graphics adaptors is :
Answer
VRAM
48) To justify the selected text, the shortcut key is __.
Answer
Ctrl+J
49) Trackball is an example of a/an _.
Answer
Pointing device
50) BIOS stands for:
Answer
Basic Input Output System
51) Who was the inventor of Tabulating Machine?
Answer
Herman Hollerith
52) is an essential program which makes it easy to use a computer for end-user.
Answer
Operating system
53) Which disk is used to cold boot a PC?
Answer
System disk
54) In second generation, which type of memory was used to store data?
Answer
Magnetic core
55) The first electronic digital computer contained:
Answer
Electronic valves
56) What is the blinking symbol on the screen that shows where the next character will appear?
Answer
Cursor
57) Which type of device is used by banking websites to enter the password and prevent keystroke legging?
Answer
Virtual keyboard
58) A _’s main purpose is to prohibit unauthorized access to your computer via the Internet.
Answer
Firewall
59) =Sum (S3 : S10) is an example of a -
Answer
formula
60) What is the blinking symbol on the screen that shows where the next character will appear?
Answer
Cursor
61) BIOS stands for .
Answer
Better Input Output Service
62) Choose the odd one out:
Answer
Virtual Reality
63) Changing desktop wallpaper is a simple task which can be accessed through section of all control panel items.
Answer
Personalize
64) Different icons of application software can be found in which bar in latest version of Microsoft Windows?
Answer
Start Menu
65) What does DBMS stand for?
Answer
Database Management System
66) The shows a brief description and, optionally, keyboard shortcuts of commands of dialog box launchers.
Answer
Screen Tip
67) Software that is actively utilised by end-users (like word or PowerPoint) is called
Answer
Application software
68) Mozilla Firefox is a:
Answer
Web browser
69) In MS-DOS 6.22, which part identifies that product uniquely?
Answer
6.22
70) DOS stands for .
Answer
Disk Operating System
71) What converts high-level languages into machine language?
Answer
Complier
72) The shows a brief description and, optionally, keyboard shortcuts of commands of dialog box launchers.
Answer
Screen Tip
73) are used to identify a user who returns to a Website.
Answer
Cookies
74) Reusable optical storage will typically have the acronym-
Answer
RW
75) Bits are packaged into frames at which layer of the OSI model?
Answer
Data link
76) Which key should you use to indent the first paragraph of your report?
Answer
tab key
77) An error in software or hardware is called a bug. What is the alternative computer jargon for it?
Answer
Glitch
78) Personal computers use many chips mounted on the main circuit board. What is the common name for such board containing the principal components?
Answer
Motherboard
79) Who invented the QWERTY keyboard?
Answer
Christopher Latham Sholes
80) What is Windows Vista?
Answer
Operating System
81) Constraints are applied on:
Answer
columns
82) In a database, a column in the table is also called _.
Answer
attribute
83) An image that is displayed on the monitor includes thousands of small coloured dots known as .
Answer
Pixels
84) What is the full form of EDI?
Answer
Electric Data Interchange
85) In which topology requires each node to be connected to exactly two other nodes, forming a single continuous pathway for signals?
Answer
Ring
86) A virus that migrates freely within a large population of unauthorized email user is called a .
Answer
macro
87) Which protocol is used to convert IP addresses to MAC addresses?
Answer
ARP
88) Which IEEE Standards is used for Wi-Fi system?
Answer
802.11
89) The abbreviation ISP stands for -
Answer
Internet service provider
90) Which operation performs a set union of two ‘similarly structured’ tables?
Answer
Union
91) DBMS is a set of programs, which allows a DBA to:
Answer
maintain a database
92) In second generation, which type of primary memory was used to store data?
Answer
Magnetic core
93) What is the IEEE Standard for Wireless LAN?
Answer
802.11
94) What is a spooler?
Answer
Program
95) What is the diagnostic testing sequence of a computer called that determines if all input and output devices are properly working?
Answer
POST
96) What does DBMS stand for?
Answer
Database Management System
97) In first generation of computers, they used:
Answer
batch processing
98) Who invented the QWERTY keyboard?
Answer
Christopher Latham Sholes
99) What is Windows Vista?
Answer
Operating System
100) A is a computer network that usually spans a city or a large campus.
Answer
MAN
101) What does MAN stands for?
Answer
Metropolitan area network
102) Which command is used to set a name to a disk in DOS?
Answer
LABEL
103) Which communication mode allows both the sender and the receiver to transmit data at the same time over a single communication channel?
Answer
Full-duplex mode
104) In which types of network are all the computers considered equal?
Answer
Peer-to-peer
105) In MS-DOS 6.22, which part identifies that product uniquely?
Answer
6.22
106) Which type of system can learn and adjust to new circumstances by themselves?
Answer
Neural networks
107) In 2014, Apple decided to invent a programming language. What is the name of that programming language?
Answer
Swift
108) The operation of combining two cells into a single cell in Excel is referred to as .
Answer
merge cells
109) =Sum (S3 : S10) is an example of a -
Answer
formula
110) To switch the slide orientation between portrait and landscape – Click and select Portrait or Landscape as your requirement.
Answer
Slide Orientation
111) In network topology, all devices on a network are connected to a single continuous cable called:
Answer
Bus
112) A term for retrieving software or other files on your computer from a computer network or Internet.
Answer
Download
113) Coded entries which are used to gain access to a computer system are called .
Answer
Passwords
114) Linux is an OS based on _.
Answer
UNIX
115) To allow someone else to schedule your meetings and appointments, feature of Outlook is used.
Answer
Delegate Access
116) A is a component of motherboard which absorbs the heat produced by the processor and other components of a computer.
Answer
Heat sink
117) The records the name and exact location of every file on a disk.
Answer
file allocation table
118) What should be used if a company wants to include its company name and logo at the bottom of every page of a brochure?
Answer
Footer
119) What acts as master software that works as a mediator between a computer user and hardware of a computer?
Answer
Operating System
120) An input device that utillses a light-sensitive detector to select objects on a display screen is known as _.
Answer
Light Pen
121) Name the type of memory which clears everything when the power of a computer gets switched off.
Answer
Volatile
122) Who is the inventor of Tabulating Machine?
Answer
Herman Hollerith
123) is an essential program which makes it easy to use a computer for end-user.
Answer
Operating system
124) Which disk is used to cold boot a PC?
Answer
System disk
125) ports connect special types of music instruments to sound cards.
Answer
MIDI
126) Which program, installed on the user’s computer help him to communicate or send request on the network?
Answer
Browser
127) A collection of unprocessed items is .
Answer
reports
128) Which type of system can learn and adjust to new circumstances by themselves?
Answer
Neural networks
129) WORM stands for?
Answer
Write Once Read Many
130) The smallest unit of information, a computer can understand and process is known as .
Answer
Bit
131) In PowerPoint, view displays all slides of the presentation as a thumbnail and is helpful for repositioning slides?
Answer
Slide Sorter
132) What is the default file extension for all Word documents?
Answer
DOC
133) The key F12 opens a _.
Answer
SaveAs dialog box
134) What type of computers are client computers (most of the time) in a client-server system?
Answer
Microcomputer
135) The amount of vertical space between lines of text in a document is called:
Answer
single space
136) What do you call the programs that are used to find out possible faults and their causes?
Answer
Diagnostic software
137) Which operating system is defined as self-contained in device and resident in ROM?
Answer
Embedded OS
138) Main memory works in conjunction with .
Answer
CPU
139) ports connect special types of music instruments to sound cards.
Answer
MIDI
140) Which program, installed on the user’s computer help him to communicate or send request on the network?
Answer
Browser
141) Antikythera mechanism was mainly used to perform which computation?
Answer
Astronomical calculation
142) The first electro-mechanical computer MARK-1 invented was by _.
Answer
Howard Aiken
143) What was the first electronic computer in the world?
Answer
ENIAC
144) What type of monitoring file is commonly used on and accepted from Internet sites?
Answer
Cookies
145) What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
Answer
Biometrics
146) What does the SMTP in an SMTP server stand for?
Answer
Simple Mail Transfer Protocol
147) Which communication mode allows both the sender and the receiver to transmit data at the same time over a single communication channel?
Answer
Full-duplex mode
148) The first computer was programmed using _.
Answer
Machine language
149) A/(n) is an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content.
Answer
web beacon
150) Non-physical components of the computer are referred to as _.
Answer
Software
151) How many rows are there in latest version of MS Excel?
Answer
1048576
152) Virtual memory allocates hard disk space to supplement the immediate, functional memory capacity of what?
Answer
The registers
153) Decryption & Encryption of data are the responsibility of which layer.
Answer
Presentation
154) What is the term that refers to an ad hidden inside software that you downloaded from an internet site?
Answer
Adware
155) Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
Answer
hacker
156) Computer language COBOL is appropriate for -
Answer
Commercial purpose
157) The blank white area near the edges of every page in a word document is known as a _.
Answer
margin
158) In MS PowerPoint, what are visual movements referred to as when one slide changes to another?
Answer
Slide transformation
159) Verizon Communications on July 2016, announced plans to acquire Yahoo for $4.8 billion in cash. Yahoo (www.yahoo.com) is a _.
Answer
Web Portal
160) A _’s main purpose is to prohibit unauthorized access to your computer via the Internet.
Answer
Firewall
161) =Sum (S3 : S10) is an example of a -
Answer
formula
162) To switch the slide orientation between portrait and landscape – Click and select Portrait or Landscape as your requirement.
Answer
Slide Orientation
163) An error in a computer program is called a .
Answer
bug
164) What is Windows Vista?
Answer
Operating System
165) To ‘maximize’ a window means to :
Answer
Expand it to fit the desktop
166) Trackball is an example of a/an:
Answer
Pointing device
167) micro-computer is a small, relatively inexpensive computer with a microprocessor. Which is the first micro-computer?
Answer
Altair
168) Who invented the QWERTY keyboard?
Answer
Christopher Latham Sholes
169) These printers do not establish any mechanical contact between the print head and the paper. The examples of such type of printers are
Answer
inkjet and laser printers
170) is a service that allows organizations to make their own website.
Answer
Web hosting
171) What is the maximum number of lines you can set for a Drop Cap?
Answer
10
172) If you wish to extend the length of the network without having the signal degrade, you would use a .
Answer
Repeater
173) is a program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
Answer
Trojan horse
174) If you wish to extend the length of the network without having the signal degrade, you would use a _.
Answer
Repeater
175) Which disk is used to cold boot a PC?
Answer
System disk
176) A(n) allows you to access your e-mail from anywhere.
Answer
Webmail interface
177) Which icon represents an e-mail message that has not been read?
Answer
Closed envelope
178) Which among the given options is computer peripheral that is tangible?
Answer
Hardware
179) A collection of unprocessed items is _.
Answer
data
180) Which type of system can learn and adjust to new circumstances by themselves?
Answer
Neural networks
181) WORM stands for?
Answer
Write Once Read Many
182) Each time you turn on your computer, it will check on the control file
Answer
Cammand.com, io.sys, msdos.sys
183) Name the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
Answer
BIOS
184) A barcode is code that represents data with bars of varying widths or heights.
Answer
optical
185) In MS Word, is a predefined decorative text that you can add to a document.
Answer
WordArt
186) has the shortest access time.
Answer
Cache Memory
187) EPROM is generally erased by using _.
Answer
ultraviolet rays
188) In Excel, a new workbook contains worksheets by default.
Answer
Three
189) In a Windows-based application, when you click the Maximize button, it changes to the -
Answer
Restore Down button
190) You cannot save an Excel file in a/an format.
Answer
PSD
191) The shows a brief description and, optionally, keyboard shortcuts of commands of dialog box launchers.
Answer
Screen Tip
192) Bits are packaged into frames at which layer of the OSI model?
Answer
Data link
193) To delete the selected item permanently, press _.
Answer
Shift + Delete
194) Commands at the top of a screen such as File-Edit, Format and Tools to operate and change things are incorporated in:
Answer
Menu bar
195) The simultaneous processing of executing two or more programs by multiple processors is-
Answer
Multiprocessing
196) The folder retains copies of messages that you have started but are not yet ready to send.
Answer
Drafts
197) 10BaseT uses cables to connect network devices.
Answer
twisted-pair
198) A computer stores data in the format.
Answer
Binary
199) E-R modelling technique uses which approach?
Answer
top-down approach
200) Microsoft Office is a _.
Answer
An application suite
201) Which term is not related with font?
Answer
Font grammar
202) The valid format of MS Word is:
Answer
.doc
203) Communication channel is shared by all the machines on the network in:
Answer
broadcast network
204) Bluetooth is an example of:
Answer
personal area network
205) What type of Internet Company provides pay-per-use software?
Answer
Software developers
206) is a protocol-based communication system between a server and its clients.
Answer
Web worker
207) Routing is done at the _.
Answer
Network layer
208) What should be used if a company wants to include its company name and logo at the bottom of every page of a brochure?
Answer
Footer
209) Different icons of application software can be found in which bar in latest version of Microsoft Windows?
Answer
Start Menu
210) How many rows are there in latest version of MS Excel?
Answer
1048576
211) What is Direct X?
Answer
Software that drives graphics hardware to enable game and multimedia to your system
212) Which type of device is used by banking websites to enter the password and prevent keystroke legging?
Answer
Virtual keyboard
213) HTTP is a/an protocol.
Answer
application layer
214) Routers operate at which layer of the OSI model?
Answer
network
215) Bits are packaged into frames at which layer of the OSI model?
Answer
Data link
216) When a command is not available for selection until certain other conditions are met, it is called a(n):
Answer
Dimmed command
217) Operating system is a:
Answer
System software
218) is the set of programs that enables your computer’s hardware devices and application software to work together.
Answer
Utility software
219) The key F12 opens a .
Answer
SaveAs dialog box
220) =Sum (S12 : S23) is an example of a -
Answer
formula
221) OSI model has how many layers?
Answer
Seven Layers
222) Network is the arrangement of the various elements (links, nodes, etc.) of a computer network.
Answer
topology
223) The dual-port version of DRAM formerly used in graphics adaptors is :
Answer
VRAM
224) Type to start a numbered list, and then press SPACEBAR or the TAB key.
Answer
1
225) The software that is used to create text based documents is referred as :
Answer
Word processor
226) What is the number of function keys on a keyboard?
Answer
12
227) What is the smallest and largest font size available in Font Size tool of MS World on formatting toolbar?
Answer
8 and 72
228) A character that is raised and smaller above the baseline is known as .
Answer
Superscript
229) Which key should be pressed to start a new paragraph in MS-Word?
Answer
Enter Key
230) Which bar is usually located below that Title Bar that provides categorized options?
Answer
Menu bar
231) What is the maximum zoom percentage in Microsoft PowerPoint?
Answer
4
232) What is Telnet?
Answer
Remote Login
233) What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?
Answer
CMOS
234) Which organization developed MS DOS?
Answer
Microsoft
235) Bridge is a device.
Answer
layer 2
236) A commonly used graphic format for the Web is .
Answer
GIF
237) The first electronic digital computer contained _.
Answer
Electronic valves
238) The menu contains the options to add symbols in a Word document.
Answer
Insert
239) is the time taken by the switch in the identification of bit-level errors in the data packet.
Answer
Processing delay
240) Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
Answer
hacker
241) How long is an IPv6 address?
Answer
128 bits
242) What does P2P stands for?
Answer
Peer To Peer
243) Non-physical components of the computer are referred to as _.
Answer
Software
244) Encryption takes place at which layer?
Answer
presentation
245) means that the data contained in a database is accurate, consistent and reliable.
Answer
Data integrity
246) The feature in database language that allows us to access certain records in database is called _.
Answer
Query
247) The layer that is the closest to transmission medium.
Answer
physical
248) What does MAN stands for?
Answer
Metropolitan area network
249) How long is an IPv6 address?
Answer
128 bits
250) Of the 5 words listed below, which is the odd one out?
Answer
Peripherals
251) A program embedded in a semiconductor chip during manufacture is called _.
Answer
Firmware
252) The two ways to arrange multiple windows on the desktop are:
Answer
cascade and tile
253) Extensible Markup Language (XML) is a simple, very flexible text format derived from _.
Answer
SGML
254) is software which has its source code freely available for use, viewing, odification, and redistribution.
Answer
Open Source
255) ports connect special types of music instruments to sound cards.
Answer
MIDI
256) Choose the odd one out:
Answer
Virtual Reality
257) VIRUS stands for _.
Answer
Vital Information Resources Under Siege
258) Changing desktop wallpaper is a simple task which can be accessed through section of all control panel items.
Answer
Personalize
259) Different icons of application software can be found in which bar in latest version of Microsoft Windows?
Answer
Start Menu
260) Which output device transfers processed information into a printed page?
Answer
Printer
261) Routing is done at the _.
Answer
Network layer
262) A list of protocols used by a system, one protocol per layer, is called:
Answer
protocol stack
263) time is called _.
Answer
Multi-tasking
264) Different icons of application software can be found in which bar in latest version of Microsoft Windows?
Answer
Start Menu
265) Of the 5 words listed below, which is the odd one out?
Answer
Peripherals
266) A program embedded in a semiconductor chip during manufacture is called .
Answer
Firmware
267) A typically connects personal computers within a very limited geographical area, usually within a single building.
Answer
LAN
268) Who contributed to the idea of a stored program?
Answer
John von Neumann
269) are the gates that can be used to implement any type of Boolean logic.
Answer
Universal gates
270) In first generation of computers, they used :
Answer
batch processing
271) For each attribute of a relation, there is a set of permitted values, called the of that attribute.
Answer
Domain
272) The operation performs a set union of two ‘similarly structured’ tables.
Answer
Union
273) In relational database, a field is a:
Answer
category of information
274) UDP and TCP are categorised under the layer of the OSI model.
Answer
transport
275) Which layer of the OSI model defines the language and syntax for programs?
Answer
Application layer
276) ODBC stands for _.
Answer
Open Database Connectivity
277) Who invented the machine to add numbers quickly and accurately?
Answer
Blaise Pascal
278) From which version Microsoft introduced Backstage View for Access Interface?
Answer
Access 2007
279) What is the maximum font size you can apply for any character?
Answer
1638
280) If you change Windows 98 to Windows XP, which action will you be performing?
Answer
Upgrade
281) Microsoft Office is a _.
Answer
An application suite
282) Which term is not related with font?
Answer
Font grammar
283) key is the example of Toggle key.
Answer
Caps Lock
284) Which among the given options has the smallest storage capacity?
Answer
Floppy disc
285) How many types of digits do a binary number comprises of?
Answer
Two
286) What is JDBC?
Answer
Application Programming Interface (API)
287) What is the term used for measurement of how fast data moves from one place to another?
Answer
bits per second
288) When a command is not available for selection until certain other conditions are met, it is called a(n):
Answer
Dimmed command
289) What is included in an e-mail address?
Answer
User’s name followed by domain name
290) Personal computers used a number of chips mounted on a main circuit board. What is the common name for such boards?
Answer
Motherboard
291) The amount of vertical space between lines of text in a document is called:
Answer
single space
292) Which among the given options in Microsoft PowerPoint will allow you to select more than one slide in a presentation?
Answer
Shift + Click each slide
293) In first generation of computers, they used _.
Answer
batch processing
294) Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
Answer
hacker
295) A nibble refers to:
Answer
4 bits
296) What does BASIC stands for?
Answer
Beginner’s All-purpose symbolic Instruction code
297) A commonly used graphic format for the Web is _.
Answer
GIF
298) Which type of device is used by banking websites to enter the password and prevent keystroke legging?
Answer
Virtual keyboard
299) ports connect special types of music instruments to sound cards.
Answer
MIDI
300) What does a computer system includes?
Answer
All of these
301) What is Direct X?
Answer
Software that drives graphics hardware to enable game and multimedia to your system
302) In number system, LSD stands for .
Answer
Least Significant Digit
303) FORTRAN is a programming language. It is more suitable for _.
Answer
scientific applications
304) Each excel file is called a workbook because:
Answer
It can contain many sheets including worksheets and chart sheets
305) A function inside another function is called a function.
Answer
Nested
306) The most widely used type of database management system is the:
Answer
Relational database
307) Encryption and Decryption are the functions of layer.
Answer
presentation
308) A is a property of the entire relation, rather than of the individual tuples in which each tuple is unique.
Answer
Key
309) A is an abstract model that describes, how the data are organized and represented.
Answer
data model
310) SMTP, FTP and DNS are applications/protocols of the layer.
Answer
Application
311) What is the new default font used in MS Word document?
Answer
Calibri
312) C was developed by:
Answer
Dennis Ritchie
313) device is any hardware component that allows you to enter data and instructions into a computer.
Answer
Input
314) Which part of the hardware compensates the difference between the speeds of CPU and peripherals?
Answer
Motherboard
315) Computers designed for specialized scientific work and specific instructions are called _.
Answer
Super computers
316) Which part of the CPU coordinates all the activities of a computer system?
Answer
Motherboard
317) The process of connecting/ accessing to an account is called as:
Answer
Login
318) Which type of system can learn and adjust to new circumstances by themselves?
Answer
Neural networks
319) In 2014, Apple decided to invent a programming language. What is the name of that programming language?
Answer
Swift
320) The first electro-mechanical computer MARK-1 was invented by _.
Answer
Howard Aiken
321) What was the first electronic computer in the world?
Answer
ENIAC
322) Communication channel is shared by all the machines on the network in:
Answer
broadcast network
323) Bluetooth is an example of:
Answer
personal area network
324) A list of protocols used by a system, one protocol per layer, is called:
Answer
protocol stack
325) A is a computer network that usually spans a city or a large campus.
Answer
MAN
326) What does MAN stands for?
Answer
Metropolitan area network
327) How long is an IPv6 address?
Answer
128 bits
328) Which key should you use to indent the first paragraph of your report?
Answer
tab key
329) What is the keyboard shortcut to centralize the selected text in Word?
Answer
Ctrl + E
330) What is a spooler?
Answer
Program
331) What is the diagnostic testing sequence of a computer called that determines if all input and output devices are properly working?
Answer
POST
332) A CD player can access data/information using which method?
Answer
All of these
333) Each box in a spreadsheet is called a _.
Answer
Cell
334) What does P2P stands for?
Answer
Peer To Peer
335) Who is the chief of Microsoft?
Answer
Bill Gates
336) ODBC stands for .
Answer
Open Database Connectivity
337) From which version Microsoft introduced Backstage View for Access Interface?
Answer
Access 2007
338) The process of connecting/ accessing to an account is called as:
Answer
Login
339) In the relational model, a cardinality is termed as _.
Answer
Number of tuples
340) Name the type of memory which clears everything when the power of a computer gets switched off.
Answer
Volatile
341) A handheld device that allows you to control your computer without typing instructions from a keyboard is known as _.
Answer
Mouse
342) What does DOS stands for?
Answer
Disk Operating System
343) What acts as master software that works as a mediator between a computer user and the hardware of a computer?
Answer
Operating System
344) The hexadecimal number system represents symbols and _.
Answer
0-9, A-F
345) The conversion of the binary number 10100111011 into its decimal form is _.
Answer
133910
346) are the gates that can be used to implement any type of Boolean logic.
Answer
Universal gates
347) In number system, LSD stands for _.
Answer
Least Significant Digit
348) Row in an Access table is also known as .
Answer
record
349) The SubSeven is an example of:
Answer
Trojan horse
350) Changing desktop wallpaper is a simple task which can be accessed through section of all control panel items.
Answer
Personalize
351) The valid format of MS Word is:
Answer
.doc
352) To justify the selected text, the shortcut key is:
Answer
Ctrl + J
353) A function inside another function is called a function.
Answer
Nested
354) Choose the odd one out:
Answer
Virtual Reality
355) A virus that migrates freely within a large population of unauthorized email user is called a _.
Answer
macro
356) The first Computer Virus is:
Answer
Creeper
357) Macros are available in Excel 2016 under which Tab?
Answer
View
358) Workbook is a collection of in MS Excel?
Answer
worksheets
359) The Internet began with the development of:
Answer
ARPANET
360) What type of software creates a smaller file that is faster to transfer over the Internet?
Answer
Compression
361) What is a Pixel?
Answer
The smallest resolvable part of a picture
362) Which tracking program records every keystroke you make on the computer?
Answer
Key logger
363) An address is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network.
Answer
IP
364) Hybrid computer used the combined feature of and machine.
Answer
analog, digital
365) If you change Windows 98 to Windows XP, you are actually performing _.
Answer
Upgrade
366) How are data organized in a spreadsheet?
Answer
Rows and columns
367) The icons on the are organized according to function and according to the most commonly used commands in MSWord.
Answer
toolbars
368) If you wish to extend the length of the network without having the signal degrade, you would use a _.
Answer
Repeater
369) The data to be encrypted at the sender site is called and the data to be decrypted at the receiver end is called .
Answer
Plain text, cipher text
370) Name the input device from the given options that cannot be used to work in MS Office?
Answer
Joy stick
371) When your computer stops working suddenly, it is referred to as a _.
Answer
crash
372) The most widely used type of database management system is the:
Answer
Relational database
373) What type of Internet Company provides pay-per-use software?
Answer
Application service provider (ASP)
374) is a protocol-based communication system between a server and its clients.
Answer
Web socket
375) What is the maximum zoom percentage in Microsoft PowerPoint?
Answer
4
376) Non-physical components of the computer are referred to as _.
Answer
Software
377) How many rows are there in latest version of MS Excel?
Answer
1048576
378) is also known as inkless printer.
Answer
Thermal printer
379) Computer mouse is also known as _.
Answer
Pointing Device
380) Setting fonts for the text in your document is an example of:
Answer
Formatting
381) What is Window Explorer?
Answer
File Manager
382) is a service that allows organizations to make their own website.
Answer
Web hosting
383) What is the maximum number of lines you can set for a Drop Cap?
Answer
10
384) A/An displays a surface that joins a group of data points.
Answer
Line chart
385) Which key should you use to indent the first paragraph of your report?
Answer
tab key
386) Changing desktop wallpaper is a simple task which can be accessed through section of all control panel items.
Answer
Personalize
387) In order to move from one worksheet to another in MS-Excel workbook. One should click _.
Answer
sheet tab
388) A pathway inside a computer that carries data between hardware components is called .
Answer
data bus
389) Which organization developed MS DOS?
Answer
Microsoft
390) Which action is performed to change written work already done?
Answer
edit
391) E-R modeling technique uses which approach?
Answer
top-down approach
392) A nibble refers to:
Answer
4 bits
393) The software that is used to create text based documents is referred as :
Answer
Word processor
394) What is the number of function keys on a keyboard?
Answer
12
395) What does DOS stands for?
Answer
Disk Operating System
396) What acts as master software that works as a mediator between a computer user and the hardware of a computer?
Answer
Operating System
397) Antikythera mechanism was mainly used to perform which computation?
Answer
Astronomical calculation
398) What is the term used for measurement of how fast data moves from one place to another?
Answer
bits per second
399) What type of software must to be used to transform scanned text into a format that can be manipulated?
Answer
OCR
400) Word processing, spreadsheet and photo-editing are examples of _.
Answer
application software
401) The primary purpose of a computer is to process and convert it into information.
Answer
data
402) The simultaneous processing of executing two or more programs by multiple processors is-
Answer
multiprocessing
403) The first electro-mechanical computer MARK-1 was invented by _.
Answer
Howard Aiken
404) What was the first electronic computer in the world?
Answer
ENIAC
405) The first computer was programmed using _.
Answer
Machine language
406) In which generation did multi-programming start?
Answer
Third generation
407) What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
Answer
Biometrics
408) The full form of DDL is:
Answer
Data Definition Language
409) In relational database, a field is a:
Answer
category of information
410) A is a property of the entire relation, rather than of the individual tuples in which each tuple is unique.
Answer
Key
411) A is an abstract model that describes, how the data are organized and represented.
Answer
data model
412) Before use of DBMS information was stored using:
Answer
File Management System
413) is an interface between low level database and application program.
Answer
Database or Store Manager
414) A relational database consists of a collection of:
Answer
Tables
415) The term attribute refers to a of a table.
Answer
Column
416) For each attribute of a relation, there is a set of permitted values, called the of that attribute.
Answer
Domain
417) In the architecture of a database system external level is the:
Answer
view level
418) The language used in application programs to request or select data from the DBMS is referred to as the:
Answer
DML
419) Routing is done on which layer?
Answer
Network Layer
420) Name the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
Answer
BIOS
421) Microsoft Office is a .
Answer
An application suite
422) What is the shortcut key combination for deleting the selected item without moving it to the Recycle Bin first?
Answer
Shift+Delete
423) A prescribed set of well-defined instructions for solving mathematical problems is called .
Answer
an algorithm
424) Copying a process from memory to disk to allow space for other processes is called:
Answer
Swapping
425) A function inside another function is called a function.
Answer
Nested
426) Which term is not related with font?
Answer
Font grammar
427) The valid format of MS Word is _.
Answer
.doc
428) To justify the selected text, the shortcut key is .
Answer
Ctrl + J
429) What is a popular program for view, create, manipulate, print and manage text document that can be read on both the OS – Windows and Macintosh?
Answer
Adobe Acrobat
430) What is the Function key that can be used to refresh the current window?
Answer
F5
431) Who is called the father of modern computing?
Answer
Charles Babbage
432) Who coined the term computer virus?
Answer
Frederick Cohen
433) 'Ctrl +Esc' is the shortcut key combination for?
Answer
Shows the start menu
434) Website can be a collection of .
Answer
All of the above
435) The image shows which logic gate?
Answer
Exclusive OR
436) What will be the 1’s complement for 10110111?
Answer
1001000
437) How many megabytes make a gigabyte?
Answer
1024
438) 4010 TB is approximately equivalent to how many PB?
Answer
3.9
439) The basic input/output system (BIOS) is stored in:
Answer
EEPROM
440) What does URL stand for?
Answer
Uniform Resource Locator
441) What was the first machine to successfully perform long services of arithmetic and logical operations?
Answer
MARK-I
442) What is a motion path?
Answer
A method of moving items on a slide
443) A is a component of motherboard which absorbs the heat produced by the processor and other components of a computer.
Answer
Heat sink
444) What acts as master software that works as a mediator between a computer user and hardware of a computer?
Answer
Operating System
445) An input device that utillses a light-sensitive detector to select objects on a display screen is known as _.
Answer
Light Pen
446) Using output devices one can .
Answer
View or Print Data
447) Select the odd one out:
Answer
448) What is the full form of DTP in Computers?
Answer
Desktop Publishing
449) What should be used if a company wants to include its company name and logo at the bottom of every page of a brochure?
Answer
Footer
450) How many types of digits do a binary number comprises of?
Answer
Two
451) Select the odd one out:
Answer
XML
452) Microsoft Word is a word processor developed by Microsoft. In MS Word 2016 Spelling Check is a feature available in which tab?
Answer
Review
453) Operating system is a(n) _.
Answer
Application software
454) Mozilla Firefox is a :
Answer
Web browser
455) Which command is used to set a name to a disk in DOS?
Answer
LABEL
456) What is the meaning of .EXE?
Answer
Executable Files
457) CUI stands for:
Answer
Character User Interface
458) To ‘maximize’ a window means to:
Answer
Expand it to fit the desktop
459) To ‘maximize’ a window means to :
Answer
Expand it to fit the desktop
460) Trackball is an example of a/an:
Answer
Pointing device
461) A micro-computer is a small, relatively inexpensive computer with a microprocessor. Which is the first micro-computer?
Answer
Altair
462) The word “Computer” comes from the word “compute”, which means _.
Answer
To calculate
463) Who is the father of computers?
Answer
Charles Babbage
464) In Microsoft PowerPoint, two kinds of sound effects files that can be added to the presentation are:
Answer
.wav files and .mid files
465) Computer gathers data, which means that they allow users to data.
Answer
Input
466) The smallest unit of information, a computer can understand and process is known as .
Answer
Bit
467) What does JAR stand for?
Answer
Java Archive
468) Bridge is a device.
Answer
layer 2
469) 10BaseT uses which type of cables to connect network devices?
Answer
twisted-pair
470) Which layer provides electrical and mechanical requirements to maintain a physical link between the end points?
Answer
Physical
471) The operating system acts as a device management that keeps track of devices. Channels and control units is called as _.
Answer
I/O traffic controller
472) How can you access the font size tool on font dialog box in MS Word?
Answer
Ctrl + Shift + P
473) Inheritance is the ability of an object to pass on its characteristics to its :
Answer
subclasses
474) What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?
Answer
CMOS
475) Which type of system can learn and adjust to new circumstances by themselves?
Answer
Neural networks
476) What is the maximum size of text field in Access?
Answer
255 characters
477) Type to start a numbered list, and then press SPACEBAR or the TAB key.
Answer
1
478) What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
Answer
Biometrics
479) Which command should be used to display all files within the specified subordinate directory of the subdirectory?
Answer
Dir/pathname/filename
480) If you wish to extend the length of the network without having the signal degrade, you would use a _.
Answer
Repeater
481) Smart Art is the feature of .
Answer
MS Word 2007
482) Portrait and Landscape are type of .
Answer
Page orientation
483) The hexadecimal number system represents symbols and _.
Answer
0-9, A-F
484) A is used to direct and dispatch data packets between different networks.
Answer
Router
485) Dr. E.F. Codd represented rules that a database must obey if it has to be considered truly relational.
Answer
12
486) OSI model has how many layers?
Answer
Seven Layers
487) Network is the arrangement of the various elements (links, nodes, etc.) of a computer network.
Answer
topology
488) Where are the files deleted from the hard disk sent to?
Answer
recycle bin
489) Which number system is used by computers to store data and perform calculations?
Answer
binary
490) What is JDBC?
Answer
Application Programming Interface (API)
491) Which communication mode allows both the sender and the receiver to transmit data at the same time over a single communication channel?
Answer
Full-duplex mode
492) Which operation performs a set union of two ‘similarly structured’ tables?
Answer
Union
493) What is a tuple?
Answer
Row
494) In relational database, a field is a:
Answer
category of information
495) In order to move from one worksheet to another in MS-Excel workbook, user should click:
Answer
sheet tab
496) When your computer stops working suddenly, it is referred to as a .
Answer
crash
497) A string of eight 0s and 1s is called a:
Answer
Byte
498) In MS-DOS 6.22, which part identifies that product uniquely?
Answer
6.22
499) means that the data contained in a database is accurate, consistent and reliable.
Answer
Data integrity
500) The Sub Seven is an example of:
Answer
Trojan horse
501) What is a simulated experience generated by computer called; like visiting the outer space or stepping on Moon?
Answer
Virtual Reality
502) What is the technology used to read pencil or pen marks on a multiple choice answer sheet called?
Answer
OMR
503) Microsoft Office is a/an _.
Answer
An application suite
504) Which term is not related to font?
Answer
Font grammar
505) The valid format of MS Word is _.
Answer
.doc
506) To justify the selected text, the shortcut key is .
Answer
Ctrl + J
507) Workbook is a collection of in MS Excel?
Answer
worksheets
508) What is the short cut key to open Font dialog box in MS Word?
Answer
Ctrl + D
509) The button on the Quick Access Toolbar allows you to cancel your recent commands or activities.
Answer
Undo
510) In which types of network are all the computers considered equal?
Answer
Peer-to-peer
511) Mozilla Firefox is a _.
Answer
Web browser
512) What does JAR stand for?
Answer
Java Archive
513) Digital computers use a system to encode data and programs.
Answer
Binary
514) Something which has easily-understood instructions is said to be:
Answer
User friendly
515) Information that comes from external source and fed into computer software is called _.
Answer
Input
516) The control unit initiates a series of sequential steps of :
Answer
micro operations
517) Which type of system can learn and adjust to new circumstances by themselves?
Answer
Neural networks
518) In PROM, P stands for?
Answer
Programmable
519) The ‘Slides’ category/group of commands is available under which tab in MS PowerPoint 2016?
Answer
Home
520) Choose the Odd one out:
Answer
Layout
521) Which output device transfers processed information into a printed page?
Answer
Printer
522) Which type of system can learn and adjust to new circumstances by themselves?
Answer
Neural networks
523) Pascaline is among which of the type of machine?
Answer
Arithmetic machine
524) By what name are two or more fields of a database table called when they are collectively used to specify the primary key?
Answer
Composite key
525) If you change Windows 98 to Windows XP, which action will you be performing?
Answer
Upgrade
526) A symbol on the screen that represents a disk, document or program that you can select _.
Answer
icon
527) means that the data contained in a database is accurate, consistent and reliable.
Answer
Data integrity
528) The feature in database language that allows us to access certain records in database is called .
Answer
Query
529) For each attribute of a relation, there is a set of permitted values, called the of that attribute.
Answer
Domain
530) The operation performs a set union of two ‘similarly structured’ tables.
Answer
Union
531) In MS-DOS 6.22, which part identifies that product uniquely?
Answer
6.22
532) Who is the father of computers?
Answer
Charles Babbage
533) Who invented the machine to add numbers quickly and accurately?
Answer
Blaise Pascal
534) Except for the function, a formula with a logical function shows the word “TRUE” or “FALSE” as a result
Answer
IF
535) Macros are available in Excel 2016 under which Tab?
Answer
View
536) How are data organized in a spreadsheet?
Answer
Rows and columns
537) Palmtop computer is also known as:
Answer
Handled computer
538) The first computer was programmed using .
Answer
Machine language
539) In which generation did multi-programming start?
Answer
Third generation
540) Today’s RAM’s common form is built with:
Answer
Semiconductor’s ICs
541) What is included in an e-mail address?
Answer
User’s name followed by domain name
542) Personal computers used a number of chips mounted on a main circuit board. What is the common name for such boards?
Answer
Motherboard
543) What is Visual FOXPRO?
Answer
Programming Language
544) Inheritance is the ability of an object to pass on its characteristics to its _.
Answer
sub classes
545) Deleted data remains on a disk until _.
Answer
the recycle bin is emptied
546) The most widely used type of database management system is the:
Answer
Relational database
547) is a self-contained step-by-step set of operations to be performed.
Answer
Algorithm
548) ports connect special types of music instruments to sound cards.
Answer
MIDI
549) What is/are different view(s) to display a table in MS Access?
Answer
All of the above
550) The term refers to data storage systems that make it possible for a computer or electronic device to store and retrieve data.
Answer
storage technology
551) Which is not an item of hardware?
Answer
An MP3 file
552) HTTP is a/an protocol.
Answer
application layer
553) Routers operate at which layer of the OSI model?
Answer
network
554) Bits are packaged into frames at which layer of the OSI model?
Answer
Data link
555) Encryption takes place at which layer?
Answer
presentation
556) Packets are found at which layer?
Answer
network
557) Which layer in the OSI Model provides error-free delivery of data?
Answer
Transport Layer
558) If you wish to extend the length of the network without having the signal degrade, you would use a _.
Answer
repeater
559) LANs can be connected by devices called which operate on the data link layer.
Answer
bridges
560) What does P2P stands for?
Answer
Peer To Peer
561) IP addresses are converted to _.
Answer
a hierarchy of domain names
562) The layer is the layer closest to transmission medium.
Answer
physical
563) Who invented the QWERTY keyboard?
Answer
Christopher Latham Sholes
564) What is Windows Vista?
Answer
Operating System
565) What is the new default font used in MS Word 2016 document?
Answer
Calibri
566) What is the maximum font size you can apply for any character?
Answer
1638
567) OSI model has how many layers?
Answer
Seven Layers
568) Network is the arrangement of the various elements (links, nodes, etc.) of a computer network.
Answer
topology
569) How can you access the font size tool on font dialog box in MS Word?
Answer
Ctrl + Shift + P
570) In second generation, which type of memory was used to store data?
Answer
Magnetic core
571) The first electronic digital computer contained _.
Answer
Electronic valves
572) What is the blinking symbol on the screen that shows where the next character will appear?
Answer
Cursor
573) The dual-port version of DRAM formerly used in graphics adaptors is :
Answer
VRAM
574) Type to start a numbered list, and then press SPACEBAR or the TAB key.
Answer
1
575) Internet access by transmitting digital data over the wires of a local telephone network is provided by:
Answer
digital subscriber line
576) The Internet was originally a project of which agency?
Answer
ARPA
577) Verification of a login name and password is known as:
Answer
authentication
578) What is the space left between the margin and the start of a paragraph called?
Answer
Indentation
579) Which layer provides electrical and mechanical requirements to maintain a physical link between the end points?
Answer
Physical
580) Which layer of the OSI model defines the language and syntax for programs?
Answer
Application layer
581) Which type of operation in the given options can be performed by a CD-RW?
Answer
read, write and rewrite information
582) Name the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
Answer
BIOS
583) Dr. E.F. Codd represented rules that a database must obey if it has to be considered truly relational.
Answer
12
584) In first generation of computers, they used _.
Answer
batch processing
585) Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
Answer
hacker
586) To justify the selected text, the shortcut key is _.
Answer
Ctrl + J
587) The ability of an operating system to run more than one application at a time is called .
Answer
Multi-tasking
588) What is/are different view(s) to display a table in MS Access?
Answer
All of the above
589) A is a computer network that usually spans a city or a large campus.
Answer
MAN
590) What does MAN stands for?
Answer
Metropolitan area network
591) How long is an IPv6 address?
Answer
128 bits
592) What does P2P stands for?
Answer
Peer To Peer
593) Different icons of application software can be found in which bar in latest version of Microsoft Windows?
Answer
Start Menu
594) Choose the odd one out:
Answer
Virtual Reality
595) The first Computer Virus is .
Answer
Creeper
596) Trackball is an example of a/an :
Answer
Pointing device
597) The program that is used by search engines to search the Internet for documents using their Web addresses is known as:
Answer
Spider
598) What is the current version of IMAP?
Answer
IMAP version 4
599) A virus that migrates freely within a large population of unauthorized email user is called a _.
Answer
macro
600) The dual-port version of DRAM formerly used in graphics adaptors is :
Answer
VRAM
601) Selling and buying products and services in electronic mode is called _.
Answer
e-commerce
602) To justify the selected text, the shortcut key is .
Answer
Ctrl+J
