[1] Which type of device is used by banking websites to enter the password and prevent keystroke legging?
A.
Scanner
B.
Reader
C.
Virtual keyboard
D.
Light Pen
Ans:
Virtual keyboard
Explanation :
A virtual keyboard is used for entering characters in a computer like a regular keyboard. However, unlike a regular keyboard, it is a software component.
[2] Artificial intelligence is used in which of the following generations of computers?
A.
Second
B.
Third
C.
Fourth
D.
Fifth
Ans:
Fifth
Explanation :
Artificial intelligence is used in fifth generation computers.
[3] Which of the following computers exhibits the features of both analog the digital computers?
A.
Hybrid computer
B.
Mini computer
C.
Laptop
D.
Mainframe computer
Ans:
Hybrid computer
Explanation :
The computer that exhibits the features of both digital and analog computers is known as a hybrid computer.
[4] HTTP is a/an protocol.
A.
application layer
B.
transport layer
C.
network layer
D.
Physical Layer
Ans:
application layer
Explanation :
The HyperText Transfer Protocol, or HTTP, is the most widely used Application layer protocol in the world today. It forms the basis of what most people understand the Internet to be—the World Wide Web.
[5] Routers operate at which layer of the OSI model?
A.
physical
B.
transport
C.
network
D.
MAC sublayer of the data link layer
Ans:
network
Explanation :
Router functions in the network layer.
[6] Bits are packaged into frames at which layer of the OSI model?
A.
Data link
B.
Transport
C.
Physical
D.
Presentation
Ans:
Data link
Explanation :
Bits are PDU of Layer-1 and Frames are PDU of Layer-2 Data Link Layer
[7] Which of the following are considered to be the upper layers in the OSI Model?
A.
presentation and session
B.
application and presentation
C.
application, presentation, and session
D.
application, presentation, data-link, and transport
Ans:
application, presentation, and session
Explanation :
The last three layers of the OSI model – Application, Presentation and Session layers are considered to be the upper layers.
[8] When a command is not available for selection until certain other conditions are met, it is called a(n):
A.
Dimmed command
B.
Unavailable command
C.
Dialog box
D.
All of these
Ans:
Dimmed command
Explanation :
Dimmed command is a command is not available for selection until certain other conditions are met.
[9] Which of the following is an option when shutting down your computer?
A.
Log Off
B.
Switch User
C.
Stand By
D.
All of these
Ans:
All of these
Explanation :
All among the given options are available while shutting down computer.
[10] Operating system is a:
A.
Application software
B.
System software
C.
Programmable software
D.
All of these
Ans:
System software
Explanation :
Operating System is a System Software.
[11] is the set of programs that enables your computer’s hardware devices and application software to work together.
A.
Word processing software
B.
Utility software
C.
Memory
D.
Programming software
Ans:
Utility software
Explanation :
Utility software is system software designed to help analyze, configure, optimize or maintain a computer.
[12] Which one of the following(s) is/are/ real time operating system?
A.
VxWorks
B.
Windows CE
C.
RTLinux
D.
All of these
Ans:
All of these
Explanation :
VxWorks, Windows CE, RTLinux are real-time OS.
[13] Which of the following is a correct set of hexadecimal digits?
A.
102n
B.
a19fk
C.
ZOLO12
D.
FACE
Ans:
FACE
Explanation :
Hexadecimal digits are written using symbols from 0-9 or A-F.
[14] The key F12 opens a .
A.
SaveAs dialog box
B.
Open dialog box
C.
Save dialog box
D.
Close dialog box
Ans:
SaveAs dialog box
Explanation :
The key F12 opens a SaveAs dialog box.
[15] Which of the following characteristics is used to compute dynamically the results from Excel data?
A.
Go to
B.
Table
C.
Chart
D.
Formula and Function
Ans:
Formula and Function
Explanation :
Functions are predefined formulas and are already available in Excel. They are used to compute dynamically the results from Excel data
[16] =Sum (S12 : S23) is an example of a -
A.
function
B.
formula
C.
cell address
D.
value
Ans:
formula
Explanation :
It is a formula to get sum of the data from cell number S12 to S23.
[17] Which among the following is a technology commonly used in mobile devices to recreate the sense of touch by applying forces, vibrations, or motions to the user?
A.
Tactile Haptics
B.
Biometrics
C.
Virtualization
D.
Data Mining
Ans:
Tactile Haptics
Explanation :
Tactile haptic feedback is common in cellular devices. Handset manufacturers have included different types of haptic technologies in their devices; in most cases, this takes the form of vibration response to touch.
[18] OSI model has how many layers?
A.
Two layers
B.
Five Layers
C.
Seven Layers
D.
Six Layers
Ans:
Seven Layers
Explanation :
OSI Model stands for Open Source Interconnection and it has seven layers: Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data link Layer, Physical Layer.
[19] Network is the arrangement of the various elements (links, nodes, etc.) of a computer network.
A.
memory
B.
topology
C.
mainframe
D.
protocol
Ans:
topology
Explanation :
Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. There are two basic categories of network topologies: Physical topologies and Logical topologies.
[20] Which of the following term is associated with Internet?
A.
Plotter
B.
Slide presentation
C.
Bookmark
D.
Pie Chart
Ans:
Bookmark
Explanation :
A bookmark is a saved shortcut that directs your browser to a specific webpage. It stores the title, URL, and favicon of the corresponding page.
[21] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the framebuffer in some graphics adapters.
[22] Type to start a numbered list, and then press SPACEBAR or the TAB key.
A.
1#
B.
1$
C.
1
D.
1*
Ans:
1
Explanation :
1. -> Spacebar -> enter, will start numbered list.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Which among the following is software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?
A.
Multimedia Player
B.
Backup software
C.
Utility programs
D.
Antivirus Software
Ans:
Antivirus Software
Explanation :
Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Explanation :
A virtual keyboard is used for entering characters in a computer like a regular keyboard. However, unlike a regular keyboard, it is a software component.
[2] Artificial intelligence is used in which of the following generations of computers?
A.
Second
B.
Third
C.
Fourth
D.
Fifth
Ans:
Fifth
Explanation :
Artificial intelligence is used in fifth generation computers.
[3] Which of the following computers exhibits the features of both analog the digital computers?
A.
Hybrid computer
B.
Mini computer
C.
Laptop
D.
Mainframe computer
Ans:
Hybrid computer
Explanation :
The computer that exhibits the features of both digital and analog computers is known as a hybrid computer.
[4] HTTP is a/an protocol.
A.
application layer
B.
transport layer
C.
network layer
D.
Physical Layer
Ans:
application layer
Explanation :
The HyperText Transfer Protocol, or HTTP, is the most widely used Application layer protocol in the world today. It forms the basis of what most people understand the Internet to be—the World Wide Web.
[5] Routers operate at which layer of the OSI model?
A.
physical
B.
transport
C.
network
D.
MAC sublayer of the data link layer
Ans:
network
Explanation :
Router functions in the network layer.
[6] Bits are packaged into frames at which layer of the OSI model?
A.
Data link
B.
Transport
C.
Physical
D.
Presentation
Ans:
Data link
Explanation :
Bits are PDU of Layer-1 and Frames are PDU of Layer-2 Data Link Layer
[7] Which of the following are considered to be the upper layers in the OSI Model?
A.
presentation and session
B.
application and presentation
C.
application, presentation, and session
D.
application, presentation, data-link, and transport
Ans:
application, presentation, and session
Explanation :
The last three layers of the OSI model – Application, Presentation and Session layers are considered to be the upper layers.
[8] When a command is not available for selection until certain other conditions are met, it is called a(n):
A.
Dimmed command
B.
Unavailable command
C.
Dialog box
D.
All of these
Ans:
Dimmed command
Explanation :
Dimmed command is a command is not available for selection until certain other conditions are met.
[9] Which of the following is an option when shutting down your computer?
A.
Log Off
B.
Switch User
C.
Stand By
D.
All of these
Ans:
All of these
Explanation :
All among the given options are available while shutting down computer.
[10] Operating system is a:
A.
Application software
B.
System software
C.
Programmable software
D.
All of these
Ans:
System software
Explanation :
Operating System is a System Software.
[11] is the set of programs that enables your computer’s hardware devices and application software to work together.
A.
Word processing software
B.
Utility software
C.
Memory
D.
Programming software
Ans:
Utility software
Explanation :
Utility software is system software designed to help analyze, configure, optimize or maintain a computer.
[12] Which one of the following(s) is/are/ real time operating system?
A.
VxWorks
B.
Windows CE
C.
RTLinux
D.
All of these
Ans:
All of these
Explanation :
VxWorks, Windows CE, RTLinux are real-time OS.
[13] Which of the following is a correct set of hexadecimal digits?
A.
102n
B.
a19fk
C.
ZOLO12
D.
FACE
Ans:
FACE
Explanation :
Hexadecimal digits are written using symbols from 0-9 or A-F.
[14] The key F12 opens a .
A.
SaveAs dialog box
B.
Open dialog box
C.
Save dialog box
D.
Close dialog box
Ans:
SaveAs dialog box
Explanation :
The key F12 opens a SaveAs dialog box.
[15] Which of the following characteristics is used to compute dynamically the results from Excel data?
A.
Go to
B.
Table
C.
Chart
D.
Formula and Function
Ans:
Formula and Function
Explanation :
Functions are predefined formulas and are already available in Excel. They are used to compute dynamically the results from Excel data
[16] =Sum (S12 : S23) is an example of a -
A.
function
B.
formula
C.
cell address
D.
value
Ans:
formula
Explanation :
It is a formula to get sum of the data from cell number S12 to S23.
[17] Which among the following is a technology commonly used in mobile devices to recreate the sense of touch by applying forces, vibrations, or motions to the user?
A.
Tactile Haptics
B.
Biometrics
C.
Virtualization
D.
Data Mining
Ans:
Tactile Haptics
Explanation :
Tactile haptic feedback is common in cellular devices. Handset manufacturers have included different types of haptic technologies in their devices; in most cases, this takes the form of vibration response to touch.
[18] OSI model has how many layers?
A.
Two layers
B.
Five Layers
C.
Seven Layers
D.
Six Layers
Ans:
Seven Layers
Explanation :
OSI Model stands for Open Source Interconnection and it has seven layers: Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data link Layer, Physical Layer.
[19] Network is the arrangement of the various elements (links, nodes, etc.) of a computer network.
A.
memory
B.
topology
C.
mainframe
D.
protocol
Ans:
topology
Explanation :
Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. There are two basic categories of network topologies: Physical topologies and Logical topologies.
[20] Which of the following term is associated with Internet?
A.
Plotter
B.
Slide presentation
C.
Bookmark
D.
Pie Chart
Ans:
Bookmark
Explanation :
A bookmark is a saved shortcut that directs your browser to a specific webpage. It stores the title, URL, and favicon of the corresponding page.
[21] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the framebuffer in some graphics adapters.
[22] Type to start a numbered list, and then press SPACEBAR or the TAB key.
A.
1#
B.
1$
C.
1
D.
1*
Ans:
1
Explanation :
1. -> Spacebar -> enter, will start numbered list.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Which among the following is software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?
A.
Multimedia Player
B.
Backup software
C.
Utility programs
D.
Antivirus Software
Ans:
Antivirus Software
Explanation :
Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Explanation :
The computer that exhibits the features of both digital and analog computers is known as a hybrid computer.
[4] HTTP is a/an protocol.
A.
application layer
B.
transport layer
C.
network layer
D.
Physical Layer
Ans:
application layer
Explanation :
The HyperText Transfer Protocol, or HTTP, is the most widely used Application layer protocol in the world today. It forms the basis of what most people understand the Internet to be—the World Wide Web.
[5] Routers operate at which layer of the OSI model?
A.
physical
B.
transport
C.
network
D.
MAC sublayer of the data link layer
Ans:
network
Explanation :
Router functions in the network layer.
[6] Bits are packaged into frames at which layer of the OSI model?
A.
Data link
B.
Transport
C.
Physical
D.
Presentation
Ans:
Data link
Explanation :
Bits are PDU of Layer-1 and Frames are PDU of Layer-2 Data Link Layer
[7] Which of the following are considered to be the upper layers in the OSI Model?
A.
presentation and session
B.
application and presentation
C.
application, presentation, and session
D.
application, presentation, data-link, and transport
Ans:
application, presentation, and session
Explanation :
The last three layers of the OSI model – Application, Presentation and Session layers are considered to be the upper layers.
[8] When a command is not available for selection until certain other conditions are met, it is called a(n):
A.
Dimmed command
B.
Unavailable command
C.
Dialog box
D.
All of these
Ans:
Dimmed command
Explanation :
Dimmed command is a command is not available for selection until certain other conditions are met.
[9] Which of the following is an option when shutting down your computer?
A.
Log Off
B.
Switch User
C.
Stand By
D.
All of these
Ans:
All of these
Explanation :
All among the given options are available while shutting down computer.
[10] Operating system is a:
A.
Application software
B.
System software
C.
Programmable software
D.
All of these
Ans:
System software
Explanation :
Operating System is a System Software.
[11] is the set of programs that enables your computer’s hardware devices and application software to work together.
A.
Word processing software
B.
Utility software
C.
Memory
D.
Programming software
Ans:
Utility software
Explanation :
Utility software is system software designed to help analyze, configure, optimize or maintain a computer.
[12] Which one of the following(s) is/are/ real time operating system?
A.
VxWorks
B.
Windows CE
C.
RTLinux
D.
All of these
Ans:
All of these
Explanation :
VxWorks, Windows CE, RTLinux are real-time OS.
[13] Which of the following is a correct set of hexadecimal digits?
A.
102n
B.
a19fk
C.
ZOLO12
D.
FACE
Ans:
FACE
Explanation :
Hexadecimal digits are written using symbols from 0-9 or A-F.
[14] The key F12 opens a .
A.
SaveAs dialog box
B.
Open dialog box
C.
Save dialog box
D.
Close dialog box
Ans:
SaveAs dialog box
Explanation :
The key F12 opens a SaveAs dialog box.
[15] Which of the following characteristics is used to compute dynamically the results from Excel data?
A.
Go to
B.
Table
C.
Chart
D.
Formula and Function
Ans:
Formula and Function
Explanation :
Functions are predefined formulas and are already available in Excel. They are used to compute dynamically the results from Excel data
[16] =Sum (S12 : S23) is an example of a -
A.
function
B.
formula
C.
cell address
D.
value
Ans:
formula
Explanation :
It is a formula to get sum of the data from cell number S12 to S23.
[17] Which among the following is a technology commonly used in mobile devices to recreate the sense of touch by applying forces, vibrations, or motions to the user?
A.
Tactile Haptics
B.
Biometrics
C.
Virtualization
D.
Data Mining
Ans:
Tactile Haptics
Explanation :
Tactile haptic feedback is common in cellular devices. Handset manufacturers have included different types of haptic technologies in their devices; in most cases, this takes the form of vibration response to touch.
[18] OSI model has how many layers?
A.
Two layers
B.
Five Layers
C.
Seven Layers
D.
Six Layers
Ans:
Seven Layers
Explanation :
OSI Model stands for Open Source Interconnection and it has seven layers: Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data link Layer, Physical Layer.
[19] Network is the arrangement of the various elements (links, nodes, etc.) of a computer network.
A.
memory
B.
topology
C.
mainframe
D.
protocol
Ans:
topology
Explanation :
Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. There are two basic categories of network topologies: Physical topologies and Logical topologies.
[20] Which of the following term is associated with Internet?
A.
Plotter
B.
Slide presentation
C.
Bookmark
D.
Pie Chart
Ans:
Bookmark
Explanation :
A bookmark is a saved shortcut that directs your browser to a specific webpage. It stores the title, URL, and favicon of the corresponding page.
[21] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the framebuffer in some graphics adapters.
[22] Type to start a numbered list, and then press SPACEBAR or the TAB key.
A.
1#
B.
1$
C.
1
D.
1*
Ans:
1
Explanation :
1. -> Spacebar -> enter, will start numbered list.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Which among the following is software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?
A.
Multimedia Player
B.
Backup software
C.
Utility programs
D.
Antivirus Software
Ans:
Antivirus Software
Explanation :
Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Explanation :
Router functions in the network layer.
[6] Bits are packaged into frames at which layer of the OSI model?
A.
Data link
B.
Transport
C.
Physical
D.
Presentation
Ans:
Data link
Explanation :
Bits are PDU of Layer-1 and Frames are PDU of Layer-2 Data Link Layer
[7] Which of the following are considered to be the upper layers in the OSI Model?
A.
presentation and session
B.
application and presentation
C.
application, presentation, and session
D.
application, presentation, data-link, and transport
Ans:
application, presentation, and session
Explanation :
The last three layers of the OSI model – Application, Presentation and Session layers are considered to be the upper layers.
[8] When a command is not available for selection until certain other conditions are met, it is called a(n):
A.
Dimmed command
B.
Unavailable command
C.
Dialog box
D.
All of these
Ans:
Dimmed command
Explanation :
Dimmed command is a command is not available for selection until certain other conditions are met.
[9] Which of the following is an option when shutting down your computer?
A.
Log Off
B.
Switch User
C.
Stand By
D.
All of these
Ans:
All of these
Explanation :
All among the given options are available while shutting down computer.
[10] Operating system is a:
A.
Application software
B.
System software
C.
Programmable software
D.
All of these
Ans:
System software
Explanation :
Operating System is a System Software.
[11] is the set of programs that enables your computer’s hardware devices and application software to work together.
A.
Word processing software
B.
Utility software
C.
Memory
D.
Programming software
Ans:
Utility software
Explanation :
Utility software is system software designed to help analyze, configure, optimize or maintain a computer.
[12] Which one of the following(s) is/are/ real time operating system?
A.
VxWorks
B.
Windows CE
C.
RTLinux
D.
All of these
Ans:
All of these
Explanation :
VxWorks, Windows CE, RTLinux are real-time OS.
[13] Which of the following is a correct set of hexadecimal digits?
A.
102n
B.
a19fk
C.
ZOLO12
D.
FACE
Ans:
FACE
Explanation :
Hexadecimal digits are written using symbols from 0-9 or A-F.
[14] The key F12 opens a .
A.
SaveAs dialog box
B.
Open dialog box
C.
Save dialog box
D.
Close dialog box
Ans:
SaveAs dialog box
Explanation :
The key F12 opens a SaveAs dialog box.
[15] Which of the following characteristics is used to compute dynamically the results from Excel data?
A.
Go to
B.
Table
C.
Chart
D.
Formula and Function
Ans:
Formula and Function
Explanation :
Functions are predefined formulas and are already available in Excel. They are used to compute dynamically the results from Excel data
[16] =Sum (S12 : S23) is an example of a -
A.
function
B.
formula
C.
cell address
D.
value
Ans:
formula
Explanation :
It is a formula to get sum of the data from cell number S12 to S23.
[17] Which among the following is a technology commonly used in mobile devices to recreate the sense of touch by applying forces, vibrations, or motions to the user?
A.
Tactile Haptics
B.
Biometrics
C.
Virtualization
D.
Data Mining
Ans:
Tactile Haptics
Explanation :
Tactile haptic feedback is common in cellular devices. Handset manufacturers have included different types of haptic technologies in their devices; in most cases, this takes the form of vibration response to touch.
[18] OSI model has how many layers?
A.
Two layers
B.
Five Layers
C.
Seven Layers
D.
Six Layers
Ans:
Seven Layers
Explanation :
OSI Model stands for Open Source Interconnection and it has seven layers: Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data link Layer, Physical Layer.
[19] Network is the arrangement of the various elements (links, nodes, etc.) of a computer network.
A.
memory
B.
topology
C.
mainframe
D.
protocol
Ans:
topology
Explanation :
Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. There are two basic categories of network topologies: Physical topologies and Logical topologies.
[20] Which of the following term is associated with Internet?
A.
Plotter
B.
Slide presentation
C.
Bookmark
D.
Pie Chart
Ans:
Bookmark
Explanation :
A bookmark is a saved shortcut that directs your browser to a specific webpage. It stores the title, URL, and favicon of the corresponding page.
[21] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the framebuffer in some graphics adapters.
[22] Type to start a numbered list, and then press SPACEBAR or the TAB key.
A.
1#
B.
1$
C.
1
D.
1*
Ans:
1
Explanation :
1. -> Spacebar -> enter, will start numbered list.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Which among the following is software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?
A.
Multimedia Player
B.
Backup software
C.
Utility programs
D.
Antivirus Software
Ans:
Antivirus Software
Explanation :
Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Explanation :
The last three layers of the OSI model – Application, Presentation and Session layers are considered to be the upper layers.
[8] When a command is not available for selection until certain other conditions are met, it is called a(n):
A.
Dimmed command
B.
Unavailable command
C.
Dialog box
D.
All of these
Ans:
Dimmed command
Explanation :
Dimmed command is a command is not available for selection until certain other conditions are met.
[9] Which of the following is an option when shutting down your computer?
A.
Log Off
B.
Switch User
C.
Stand By
D.
All of these
Ans:
All of these
Explanation :
All among the given options are available while shutting down computer.
[10] Operating system is a:
A.
Application software
B.
System software
C.
Programmable software
D.
All of these
Ans:
System software
Explanation :
Operating System is a System Software.
[11] is the set of programs that enables your computer’s hardware devices and application software to work together.
A.
Word processing software
B.
Utility software
C.
Memory
D.
Programming software
Ans:
Utility software
Explanation :
Utility software is system software designed to help analyze, configure, optimize or maintain a computer.
[12] Which one of the following(s) is/are/ real time operating system?
A.
VxWorks
B.
Windows CE
C.
RTLinux
D.
All of these
Ans:
All of these
Explanation :
VxWorks, Windows CE, RTLinux are real-time OS.
[13] Which of the following is a correct set of hexadecimal digits?
A.
102n
B.
a19fk
C.
ZOLO12
D.
FACE
Ans:
FACE
Explanation :
Hexadecimal digits are written using symbols from 0-9 or A-F.
[14] The key F12 opens a .
A.
SaveAs dialog box
B.
Open dialog box
C.
Save dialog box
D.
Close dialog box
Ans:
SaveAs dialog box
Explanation :
The key F12 opens a SaveAs dialog box.
[15] Which of the following characteristics is used to compute dynamically the results from Excel data?
A.
Go to
B.
Table
C.
Chart
D.
Formula and Function
Ans:
Formula and Function
Explanation :
Functions are predefined formulas and are already available in Excel. They are used to compute dynamically the results from Excel data
[16] =Sum (S12 : S23) is an example of a -
A.
function
B.
formula
C.
cell address
D.
value
Ans:
formula
Explanation :
It is a formula to get sum of the data from cell number S12 to S23.
[17] Which among the following is a technology commonly used in mobile devices to recreate the sense of touch by applying forces, vibrations, or motions to the user?
A.
Tactile Haptics
B.
Biometrics
C.
Virtualization
D.
Data Mining
Ans:
Tactile Haptics
Explanation :
Tactile haptic feedback is common in cellular devices. Handset manufacturers have included different types of haptic technologies in their devices; in most cases, this takes the form of vibration response to touch.
[18] OSI model has how many layers?
A.
Two layers
B.
Five Layers
C.
Seven Layers
D.
Six Layers
Ans:
Seven Layers
Explanation :
OSI Model stands for Open Source Interconnection and it has seven layers: Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data link Layer, Physical Layer.
[19] Network is the arrangement of the various elements (links, nodes, etc.) of a computer network.
A.
memory
B.
topology
C.
mainframe
D.
protocol
Ans:
topology
Explanation :
Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. There are two basic categories of network topologies: Physical topologies and Logical topologies.
[20] Which of the following term is associated with Internet?
A.
Plotter
B.
Slide presentation
C.
Bookmark
D.
Pie Chart
Ans:
Bookmark
Explanation :
A bookmark is a saved shortcut that directs your browser to a specific webpage. It stores the title, URL, and favicon of the corresponding page.
[21] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the framebuffer in some graphics adapters.
[22] Type to start a numbered list, and then press SPACEBAR or the TAB key.
A.
1#
B.
1$
C.
1
D.
1*
Ans:
1
Explanation :
1. -> Spacebar -> enter, will start numbered list.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Which among the following is software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?
A.
Multimedia Player
B.
Backup software
C.
Utility programs
D.
Antivirus Software
Ans:
Antivirus Software
Explanation :
Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Explanation :
All among the given options are available while shutting down computer.
[10] Operating system is a:
A.
Application software
B.
System software
C.
Programmable software
D.
All of these
Ans:
System software
Explanation :
Operating System is a System Software.
[11] is the set of programs that enables your computer’s hardware devices and application software to work together.
A.
Word processing software
B.
Utility software
C.
Memory
D.
Programming software
Ans:
Utility software
Explanation :
Utility software is system software designed to help analyze, configure, optimize or maintain a computer.
[12] Which one of the following(s) is/are/ real time operating system?
A.
VxWorks
B.
Windows CE
C.
RTLinux
D.
All of these
Ans:
All of these
Explanation :
VxWorks, Windows CE, RTLinux are real-time OS.
[13] Which of the following is a correct set of hexadecimal digits?
A.
102n
B.
a19fk
C.
ZOLO12
D.
FACE
Ans:
FACE
Explanation :
Hexadecimal digits are written using symbols from 0-9 or A-F.
[14] The key F12 opens a .
A.
SaveAs dialog box
B.
Open dialog box
C.
Save dialog box
D.
Close dialog box
Ans:
SaveAs dialog box
Explanation :
The key F12 opens a SaveAs dialog box.
[15] Which of the following characteristics is used to compute dynamically the results from Excel data?
A.
Go to
B.
Table
C.
Chart
D.
Formula and Function
Ans:
Formula and Function
Explanation :
Functions are predefined formulas and are already available in Excel. They are used to compute dynamically the results from Excel data
[16] =Sum (S12 : S23) is an example of a -
A.
function
B.
formula
C.
cell address
D.
value
Ans:
formula
Explanation :
It is a formula to get sum of the data from cell number S12 to S23.
[17] Which among the following is a technology commonly used in mobile devices to recreate the sense of touch by applying forces, vibrations, or motions to the user?
A.
Tactile Haptics
B.
Biometrics
C.
Virtualization
D.
Data Mining
Ans:
Tactile Haptics
Explanation :
Tactile haptic feedback is common in cellular devices. Handset manufacturers have included different types of haptic technologies in their devices; in most cases, this takes the form of vibration response to touch.
[18] OSI model has how many layers?
A.
Two layers
B.
Five Layers
C.
Seven Layers
D.
Six Layers
Ans:
Seven Layers
Explanation :
OSI Model stands for Open Source Interconnection and it has seven layers: Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data link Layer, Physical Layer.
[19] Network is the arrangement of the various elements (links, nodes, etc.) of a computer network.
A.
memory
B.
topology
C.
mainframe
D.
protocol
Ans:
topology
Explanation :
Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. There are two basic categories of network topologies: Physical topologies and Logical topologies.
[20] Which of the following term is associated with Internet?
A.
Plotter
B.
Slide presentation
C.
Bookmark
D.
Pie Chart
Ans:
Bookmark
Explanation :
A bookmark is a saved shortcut that directs your browser to a specific webpage. It stores the title, URL, and favicon of the corresponding page.
[21] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the framebuffer in some graphics adapters.
[22] Type to start a numbered list, and then press SPACEBAR or the TAB key.
A.
1#
B.
1$
C.
1
D.
1*
Ans:
1
Explanation :
1. -> Spacebar -> enter, will start numbered list.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Which among the following is software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?
A.
Multimedia Player
B.
Backup software
C.
Utility programs
D.
Antivirus Software
Ans:
Antivirus Software
Explanation :
Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Explanation :
Utility software is system software designed to help analyze, configure, optimize or maintain a computer.
[12] Which one of the following(s) is/are/ real time operating system?
A.
VxWorks
B.
Windows CE
C.
RTLinux
D.
All of these
Ans:
All of these
Explanation :
VxWorks, Windows CE, RTLinux are real-time OS.
[13] Which of the following is a correct set of hexadecimal digits?
A.
102n
B.
a19fk
C.
ZOLO12
D.
FACE
Ans:
FACE
Explanation :
Hexadecimal digits are written using symbols from 0-9 or A-F.
[14] The key F12 opens a .
A.
SaveAs dialog box
B.
Open dialog box
C.
Save dialog box
D.
Close dialog box
Ans:
SaveAs dialog box
Explanation :
The key F12 opens a SaveAs dialog box.
[15] Which of the following characteristics is used to compute dynamically the results from Excel data?
A.
Go to
B.
Table
C.
Chart
D.
Formula and Function
Ans:
Formula and Function
Explanation :
Functions are predefined formulas and are already available in Excel. They are used to compute dynamically the results from Excel data
[16] =Sum (S12 : S23) is an example of a -
A.
function
B.
formula
C.
cell address
D.
value
Ans:
formula
Explanation :
It is a formula to get sum of the data from cell number S12 to S23.
[17] Which among the following is a technology commonly used in mobile devices to recreate the sense of touch by applying forces, vibrations, or motions to the user?
A.
Tactile Haptics
B.
Biometrics
C.
Virtualization
D.
Data Mining
Ans:
Tactile Haptics
Explanation :
Tactile haptic feedback is common in cellular devices. Handset manufacturers have included different types of haptic technologies in their devices; in most cases, this takes the form of vibration response to touch.
[18] OSI model has how many layers?
A.
Two layers
B.
Five Layers
C.
Seven Layers
D.
Six Layers
Ans:
Seven Layers
Explanation :
OSI Model stands for Open Source Interconnection and it has seven layers: Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data link Layer, Physical Layer.
[19] Network is the arrangement of the various elements (links, nodes, etc.) of a computer network.
A.
memory
B.
topology
C.
mainframe
D.
protocol
Ans:
topology
Explanation :
Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. There are two basic categories of network topologies: Physical topologies and Logical topologies.
[20] Which of the following term is associated with Internet?
A.
Plotter
B.
Slide presentation
C.
Bookmark
D.
Pie Chart
Ans:
Bookmark
Explanation :
A bookmark is a saved shortcut that directs your browser to a specific webpage. It stores the title, URL, and favicon of the corresponding page.
[21] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the framebuffer in some graphics adapters.
[22] Type to start a numbered list, and then press SPACEBAR or the TAB key.
A.
1#
B.
1$
C.
1
D.
1*
Ans:
1
Explanation :
1. -> Spacebar -> enter, will start numbered list.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Which among the following is software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?
A.
Multimedia Player
B.
Backup software
C.
Utility programs
D.
Antivirus Software
Ans:
Antivirus Software
Explanation :
Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Explanation :
Hexadecimal digits are written using symbols from 0-9 or A-F.
[14] The key F12 opens a .
A.
SaveAs dialog box
B.
Open dialog box
C.
Save dialog box
D.
Close dialog box
Ans:
SaveAs dialog box
Explanation :
The key F12 opens a SaveAs dialog box.
[15] Which of the following characteristics is used to compute dynamically the results from Excel data?
A.
Go to
B.
Table
C.
Chart
D.
Formula and Function
Ans:
Formula and Function
Explanation :
Functions are predefined formulas and are already available in Excel. They are used to compute dynamically the results from Excel data
[16] =Sum (S12 : S23) is an example of a -
A.
function
B.
formula
C.
cell address
D.
value
Ans:
formula
Explanation :
It is a formula to get sum of the data from cell number S12 to S23.
[17] Which among the following is a technology commonly used in mobile devices to recreate the sense of touch by applying forces, vibrations, or motions to the user?
A.
Tactile Haptics
B.
Biometrics
C.
Virtualization
D.
Data Mining
Ans:
Tactile Haptics
Explanation :
Tactile haptic feedback is common in cellular devices. Handset manufacturers have included different types of haptic technologies in their devices; in most cases, this takes the form of vibration response to touch.
[18] OSI model has how many layers?
A.
Two layers
B.
Five Layers
C.
Seven Layers
D.
Six Layers
Ans:
Seven Layers
Explanation :
OSI Model stands for Open Source Interconnection and it has seven layers: Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data link Layer, Physical Layer.
[19] Network is the arrangement of the various elements (links, nodes, etc.) of a computer network.
A.
memory
B.
topology
C.
mainframe
D.
protocol
Ans:
topology
Explanation :
Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. There are two basic categories of network topologies: Physical topologies and Logical topologies.
[20] Which of the following term is associated with Internet?
A.
Plotter
B.
Slide presentation
C.
Bookmark
D.
Pie Chart
Ans:
Bookmark
Explanation :
A bookmark is a saved shortcut that directs your browser to a specific webpage. It stores the title, URL, and favicon of the corresponding page.
[21] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the framebuffer in some graphics adapters.
[22] Type to start a numbered list, and then press SPACEBAR or the TAB key.
A.
1#
B.
1$
C.
1
D.
1*
Ans:
1
Explanation :
1. -> Spacebar -> enter, will start numbered list.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Which among the following is software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?
A.
Multimedia Player
B.
Backup software
C.
Utility programs
D.
Antivirus Software
Ans:
Antivirus Software
Explanation :
Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Explanation :
Functions are predefined formulas and are already available in Excel. They are used to compute dynamically the results from Excel data
[16] =Sum (S12 : S23) is an example of a -
A.
function
B.
formula
C.
cell address
D.
value
Ans:
formula
Explanation :
It is a formula to get sum of the data from cell number S12 to S23.
[17] Which among the following is a technology commonly used in mobile devices to recreate the sense of touch by applying forces, vibrations, or motions to the user?
A.
Tactile Haptics
B.
Biometrics
C.
Virtualization
D.
Data Mining
Ans:
Tactile Haptics
Explanation :
Tactile haptic feedback is common in cellular devices. Handset manufacturers have included different types of haptic technologies in their devices; in most cases, this takes the form of vibration response to touch.
[18] OSI model has how many layers?
A.
Two layers
B.
Five Layers
C.
Seven Layers
D.
Six Layers
Ans:
Seven Layers
Explanation :
OSI Model stands for Open Source Interconnection and it has seven layers: Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data link Layer, Physical Layer.
[19] Network is the arrangement of the various elements (links, nodes, etc.) of a computer network.
A.
memory
B.
topology
C.
mainframe
D.
protocol
Ans:
topology
Explanation :
Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. There are two basic categories of network topologies: Physical topologies and Logical topologies.
[20] Which of the following term is associated with Internet?
A.
Plotter
B.
Slide presentation
C.
Bookmark
D.
Pie Chart
Ans:
Bookmark
Explanation :
A bookmark is a saved shortcut that directs your browser to a specific webpage. It stores the title, URL, and favicon of the corresponding page.
[21] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the framebuffer in some graphics adapters.
[22] Type to start a numbered list, and then press SPACEBAR or the TAB key.
A.
1#
B.
1$
C.
1
D.
1*
Ans:
1
Explanation :
1. -> Spacebar -> enter, will start numbered list.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Which among the following is software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?
A.
Multimedia Player
B.
Backup software
C.
Utility programs
D.
Antivirus Software
Ans:
Antivirus Software
Explanation :
Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Explanation :
Tactile haptic feedback is common in cellular devices. Handset manufacturers have included different types of haptic technologies in their devices; in most cases, this takes the form of vibration response to touch.
[18] OSI model has how many layers?
A.
Two layers
B.
Five Layers
C.
Seven Layers
D.
Six Layers
Ans:
Seven Layers
Explanation :
OSI Model stands for Open Source Interconnection and it has seven layers: Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data link Layer, Physical Layer.
[19] Network is the arrangement of the various elements (links, nodes, etc.) of a computer network.
A.
memory
B.
topology
C.
mainframe
D.
protocol
Ans:
topology
Explanation :
Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. There are two basic categories of network topologies: Physical topologies and Logical topologies.
[20] Which of the following term is associated with Internet?
A.
Plotter
B.
Slide presentation
C.
Bookmark
D.
Pie Chart
Ans:
Bookmark
Explanation :
A bookmark is a saved shortcut that directs your browser to a specific webpage. It stores the title, URL, and favicon of the corresponding page.
[21] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the framebuffer in some graphics adapters.
[22] Type to start a numbered list, and then press SPACEBAR or the TAB key.
A.
1#
B.
1$
C.
1
D.
1*
Ans:
1
Explanation :
1. -> Spacebar -> enter, will start numbered list.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Which among the following is software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?
A.
Multimedia Player
B.
Backup software
C.
Utility programs
D.
Antivirus Software
Ans:
Antivirus Software
Explanation :
Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Explanation :
Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. There are two basic categories of network topologies: Physical topologies and Logical topologies.
[20] Which of the following term is associated with Internet?
A.
Plotter
B.
Slide presentation
C.
Bookmark
D.
Pie Chart
Ans:
Bookmark
Explanation :
A bookmark is a saved shortcut that directs your browser to a specific webpage. It stores the title, URL, and favicon of the corresponding page.
[21] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the framebuffer in some graphics adapters.
[22] Type to start a numbered list, and then press SPACEBAR or the TAB key.
A.
1#
B.
1$
C.
1
D.
1*
Ans:
1
Explanation :
1. -> Spacebar -> enter, will start numbered list.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Which among the following is software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?
A.
Multimedia Player
B.
Backup software
C.
Utility programs
D.
Antivirus Software
Ans:
Antivirus Software
Explanation :
Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the framebuffer in some graphics adapters.
[22] Type to start a numbered list, and then press SPACEBAR or the TAB key.
A.
1#
B.
1$
C.
1
D.
1*
Ans:
1
Explanation :
1. -> Spacebar -> enter, will start numbered list.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Which among the following is software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?
A.
Multimedia Player
B.
Backup software
C.
Utility programs
D.
Antivirus Software
Ans:
Antivirus Software
Explanation :
Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Which among the following is software that uses a pattern-matching technique to examine all files on a disk looking for harmful code?
A.
Multimedia Player
B.
Backup software
C.
Utility programs
D.
Antivirus Software
Ans:
Antivirus Software
Explanation :
Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
Explanation :
Antivirus or anti-virus software, sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.
