[1] Which among the following is/are pointing device?
A.
Mouse
B.
Light Pen
C.
Joy Stick
D.
All of the above
Ans:
All of the above
Explanation :
All the given options are examples of pointing devices.
[2] Which of the following is a software used for Remote Connection?
A.
TeamViewer
B.
Picasa
C.
Prisma
D.
Safari
Ans:
TeamViewer
Explanation :
TeamViewer is a proprietary computer software package for remote connection, desktop sharing, online meetings, web conferencing and file transfer between computers.
[3]Which output device transfers processed information into a printed page?
A.
Scanner
B.
Printer
C.
Monitor
D.
CD-ROM
Ans:
Printer
Explanation :
Printers transfers processed information into printed page. Different types of printer are Ink Jet, Laser, drum etc.
[4] Pressing Windows logo key + E will open which of the following?
A.
My Computer
B.
My document
C.
Recycle Bin
D.
Control Panel
Ans:
My Computer
Explanation :
Pressing Windows logo key + E will open My Computer.
[5] Which among the following was the first network with which the idea of internet began?
A.
RAPANET
B.
PARANET
C.
ARPANET
D.
APARANET
Ans:
ARPANET
Explanation :
ARPANET was the first network in the history of Internet.
[6] Which of the following general purpose software allows you to do mathematical or financial calculation?
A.
Word processing program
B.
Spreadsheet program
C.
Presentation program
D.
Media Player
Ans:
Spreadsheet program
Explanation :
A spreadsheet program is general-purpose software that allows you to do mathematical or financial calculation. An example of a spreadsheet program is MS excel.
[7] Routing is done at the _.
A.
Data link layer
B.
Network layer
C.
Transport layer
D.
Session layer
Ans:
Network layer
Explanation :
Routing is the process of transmitting frames of data among networks. This service is provided by the network layer. The network layer is also responsible for controlling subnets.
[8] Which of the following is a loopback address?
A.
125.0.0.0
B.
127.0.0.1
C.
255.0.0.0
D.
255.0.0.1
Ans:
127.0.0.1
Explanation :
Loopback address is a special IP address that is 127.0.0.1 used for testing the connection on the same machine.
[9] A list of protocols used by a system, one protocol per layer, is called:
A.
protocol architecture
B.
protocol stack
C.
protocol suite
D.
protocol application
Ans:
protocol stack
Explanation :
A protocol stack refers to a group of protocols that are running concurrently that are employed for the implementation of network protocol suite.
[10] time is called _.
A.
Multi-tasking
B.
Object-oriented programming
C.
Multi-user computing
D.
Real-Time
Ans:
Multi-tasking
Explanation :
The ability of an operating system to run more than one application at a time is called Multi-tasking.
[11] Which one of the following(s) is/are real time operating system(s)?
A.
VxWorks
B.
Windows CE
C.
RTLinux
D.
All of these
Ans:
All of these
Explanation :
VxWorks, Windows CE, RTLinux are real time OS.
[12] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A.
Toggle
B.
Cold booting
C.
Warm booting
D.
Logging off
Ans:
Cold booting
Explanation :
Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
[13] Different icons of application software can be found in which bar in latest version of Microsoft Windows?
A.
Start Menu
B.
Browser
C.
Status
D.
Control Panel
Ans:
Start Menu
Explanation :
Microsoft re-introduced Start Menu bar and you can access various application software through it like paint or Word.
[14] Of the 5 words listed below, which is the odd one out?
A.
Applications
B.
Peripherals
C.
Programs
D.
Software
Ans:
Peripherals
Explanation :
Except for peripherals, all other options are examples of intangible instructions given to a computer to perform a specific type of task in on orderly manner.
[15] A program embedded in a semiconductor chip during manufacture is called .
A.
Humanware
B.
Firmware
C.
Liveware
D.
Hardware
Ans:
Firmware
Explanation :
Firmware is a collection of permanent instructions and codes stored in a read-only memory. The firmware is usually placed by the manufactures of computers to store vital information about how computer hardware devices will communicate with each other and how programs will run on hardware devices.
[16] A typically connects personal computers within a very limited geographical area, usually within a single building.
A.
LAN
B.
FAN
C.
TAN
D.
WAN
Ans:
LAN
Explanation :
A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings
[17] Who contributed to the idea of a stored program?
A.
John von Neumann
B.
Charles Babbage
C.
Howard Aiken
D.
Daniel Thomas
Ans:
John von Neumann
Explanation :
John von Neumann is the first person who proposed the idea of stored program.
[18] Who among the following is considered the father of modern computing?
A.
Joseph Marie Jacquard
B.
John Napier
C.
Blaise Pascal
D.
Charles Babbage
Ans:
Charles Babbage
Explanation :
Charles Babbage invented Difference Engine and Analytical Engine. Because of the immense contribution and impact that his inventions had on the history of computing, Babbage is regarded as the father of the modern computer.
[19] A cell range in Excel is represented by using which among the following sign?
A.
comma
B.
colon
C.
semicolon
D.
forward slash
Ans:
colon
Explanation :
A cell range refers to a group of cells within a row or column. For example, a cell range including the cells B1, B2, B3, B4 and B5 will be written as B1:B5.
[20] In MS Excel, both formulas and functions must be preceded by the which of the following, for Excel to understand them?
A.
hash sign
B.
equals sign
C.
percent sign
D.
asterisk sign
Ans:
equals sign
Explanation :
In MS Excel, the equals sign is used to start a formula or function.
[21] Which of the following gates is a complement of the X-OR gate?
A.
NOT gate
B.
NOR gate
C.
AND gate
D.
X-NOR gate
Ans:
X-NOR gate
Explanation :
X-NOR gate is a complement of the X-OR gate. The truth table of the X-NOR gate is the complement (opposite) to the X-OR gate.
[22] are the gates that can be used to implement any type of Boolean logic.
A.
OR gates
B.
Universal gates
C.
NAND gates
D.
Exclusive-NOR gates
Ans:
Universal gates
Explanation :
Universal gates are the gates that can be used to implement any type of Boolean logic or circuit. There are two universal gates, namely, NAND gate and NOR gate, which can be used to implement any of the basic logic gates.
[23] Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information?
A.
New Disk
B.
Hard disk
C.
Permanent disk
D.
Optical disk
Ans:
Hard disk
Explanation :
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.
[24] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[25] In first generation of computers, they used :
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
Explanation :
All the given options are examples of pointing devices.
[2] Which of the following is a software used for Remote Connection?
A.
TeamViewer
B.
Picasa
C.
Prisma
D.
Safari
Ans:
TeamViewer
Explanation :
TeamViewer is a proprietary computer software package for remote connection, desktop sharing, online meetings, web conferencing and file transfer between computers.
[3]Which output device transfers processed information into a printed page?
A.
Scanner
B.
Printer
C.
Monitor
D.
CD-ROM
Ans:
Printer
Explanation :
Printers transfers processed information into printed page. Different types of printer are Ink Jet, Laser, drum etc.
[4] Pressing Windows logo key + E will open which of the following?
A.
My Computer
B.
My document
C.
Recycle Bin
D.
Control Panel
Ans:
My Computer
Explanation :
Pressing Windows logo key + E will open My Computer.
[5] Which among the following was the first network with which the idea of internet began?
A.
RAPANET
B.
PARANET
C.
ARPANET
D.
APARANET
Ans:
ARPANET
Explanation :
ARPANET was the first network in the history of Internet.
[6] Which of the following general purpose software allows you to do mathematical or financial calculation?
A.
Word processing program
B.
Spreadsheet program
C.
Presentation program
D.
Media Player
Ans:
Spreadsheet program
Explanation :
A spreadsheet program is general-purpose software that allows you to do mathematical or financial calculation. An example of a spreadsheet program is MS excel.
[7] Routing is done at the _.
A.
Data link layer
B.
Network layer
C.
Transport layer
D.
Session layer
Ans:
Network layer
Explanation :
Routing is the process of transmitting frames of data among networks. This service is provided by the network layer. The network layer is also responsible for controlling subnets.
[8] Which of the following is a loopback address?
A.
125.0.0.0
B.
127.0.0.1
C.
255.0.0.0
D.
255.0.0.1
Ans:
127.0.0.1
Explanation :
Loopback address is a special IP address that is 127.0.0.1 used for testing the connection on the same machine.
[9] A list of protocols used by a system, one protocol per layer, is called:
A.
protocol architecture
B.
protocol stack
C.
protocol suite
D.
protocol application
Ans:
protocol stack
Explanation :
A protocol stack refers to a group of protocols that are running concurrently that are employed for the implementation of network protocol suite.
[10] time is called _.
A.
Multi-tasking
B.
Object-oriented programming
C.
Multi-user computing
D.
Real-Time
Ans:
Multi-tasking
Explanation :
The ability of an operating system to run more than one application at a time is called Multi-tasking.
[11] Which one of the following(s) is/are real time operating system(s)?
A.
VxWorks
B.
Windows CE
C.
RTLinux
D.
All of these
Ans:
All of these
Explanation :
VxWorks, Windows CE, RTLinux are real time OS.
[12] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A.
Toggle
B.
Cold booting
C.
Warm booting
D.
Logging off
Ans:
Cold booting
Explanation :
Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
[13] Different icons of application software can be found in which bar in latest version of Microsoft Windows?
A.
Start Menu
B.
Browser
C.
Status
D.
Control Panel
Ans:
Start Menu
Explanation :
Microsoft re-introduced Start Menu bar and you can access various application software through it like paint or Word.
[14] Of the 5 words listed below, which is the odd one out?
A.
Applications
B.
Peripherals
C.
Programs
D.
Software
Ans:
Peripherals
Explanation :
Except for peripherals, all other options are examples of intangible instructions given to a computer to perform a specific type of task in on orderly manner.
[15] A program embedded in a semiconductor chip during manufacture is called .
A.
Humanware
B.
Firmware
C.
Liveware
D.
Hardware
Ans:
Firmware
Explanation :
Firmware is a collection of permanent instructions and codes stored in a read-only memory. The firmware is usually placed by the manufactures of computers to store vital information about how computer hardware devices will communicate with each other and how programs will run on hardware devices.
[16] A typically connects personal computers within a very limited geographical area, usually within a single building.
A.
LAN
B.
FAN
C.
TAN
D.
WAN
Ans:
LAN
Explanation :
A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings
[17] Who contributed to the idea of a stored program?
A.
John von Neumann
B.
Charles Babbage
C.
Howard Aiken
D.
Daniel Thomas
Ans:
John von Neumann
Explanation :
John von Neumann is the first person who proposed the idea of stored program.
[18] Who among the following is considered the father of modern computing?
A.
Joseph Marie Jacquard
B.
John Napier
C.
Blaise Pascal
D.
Charles Babbage
Ans:
Charles Babbage
Explanation :
Charles Babbage invented Difference Engine and Analytical Engine. Because of the immense contribution and impact that his inventions had on the history of computing, Babbage is regarded as the father of the modern computer.
[19] A cell range in Excel is represented by using which among the following sign?
A.
comma
B.
colon
C.
semicolon
D.
forward slash
Ans:
colon
Explanation :
A cell range refers to a group of cells within a row or column. For example, a cell range including the cells B1, B2, B3, B4 and B5 will be written as B1:B5.
[20] In MS Excel, both formulas and functions must be preceded by the which of the following, for Excel to understand them?
A.
hash sign
B.
equals sign
C.
percent sign
D.
asterisk sign
Ans:
equals sign
Explanation :
In MS Excel, the equals sign is used to start a formula or function.
[21] Which of the following gates is a complement of the X-OR gate?
A.
NOT gate
B.
NOR gate
C.
AND gate
D.
X-NOR gate
Ans:
X-NOR gate
Explanation :
X-NOR gate is a complement of the X-OR gate. The truth table of the X-NOR gate is the complement (opposite) to the X-OR gate.
[22] are the gates that can be used to implement any type of Boolean logic.
A.
OR gates
B.
Universal gates
C.
NAND gates
D.
Exclusive-NOR gates
Ans:
Universal gates
Explanation :
Universal gates are the gates that can be used to implement any type of Boolean logic or circuit. There are two universal gates, namely, NAND gate and NOR gate, which can be used to implement any of the basic logic gates.
[23] Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information?
A.
New Disk
B.
Hard disk
C.
Permanent disk
D.
Optical disk
Ans:
Hard disk
Explanation :
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.
[24] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[25] In first generation of computers, they used :
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
Explanation :
Printers transfers processed information into printed page. Different types of printer are Ink Jet, Laser, drum etc.
[4] Pressing Windows logo key + E will open which of the following?
A.
My Computer
B.
My document
C.
Recycle Bin
D.
Control Panel
Ans:
My Computer
Explanation :
Pressing Windows logo key + E will open My Computer.
[5] Which among the following was the first network with which the idea of internet began?
A.
RAPANET
B.
PARANET
C.
ARPANET
D.
APARANET
Ans:
ARPANET
Explanation :
ARPANET was the first network in the history of Internet.
[6] Which of the following general purpose software allows you to do mathematical or financial calculation?
A.
Word processing program
B.
Spreadsheet program
C.
Presentation program
D.
Media Player
Ans:
Spreadsheet program
Explanation :
A spreadsheet program is general-purpose software that allows you to do mathematical or financial calculation. An example of a spreadsheet program is MS excel.
[7] Routing is done at the _.
A.
Data link layer
B.
Network layer
C.
Transport layer
D.
Session layer
Ans:
Network layer
Explanation :
Routing is the process of transmitting frames of data among networks. This service is provided by the network layer. The network layer is also responsible for controlling subnets.
[8] Which of the following is a loopback address?
A.
125.0.0.0
B.
127.0.0.1
C.
255.0.0.0
D.
255.0.0.1
Ans:
127.0.0.1
Explanation :
Loopback address is a special IP address that is 127.0.0.1 used for testing the connection on the same machine.
[9] A list of protocols used by a system, one protocol per layer, is called:
A.
protocol architecture
B.
protocol stack
C.
protocol suite
D.
protocol application
Ans:
protocol stack
Explanation :
A protocol stack refers to a group of protocols that are running concurrently that are employed for the implementation of network protocol suite.
[10] time is called _.
A.
Multi-tasking
B.
Object-oriented programming
C.
Multi-user computing
D.
Real-Time
Ans:
Multi-tasking
Explanation :
The ability of an operating system to run more than one application at a time is called Multi-tasking.
[11] Which one of the following(s) is/are real time operating system(s)?
A.
VxWorks
B.
Windows CE
C.
RTLinux
D.
All of these
Ans:
All of these
Explanation :
VxWorks, Windows CE, RTLinux are real time OS.
[12] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A.
Toggle
B.
Cold booting
C.
Warm booting
D.
Logging off
Ans:
Cold booting
Explanation :
Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
[13] Different icons of application software can be found in which bar in latest version of Microsoft Windows?
A.
Start Menu
B.
Browser
C.
Status
D.
Control Panel
Ans:
Start Menu
Explanation :
Microsoft re-introduced Start Menu bar and you can access various application software through it like paint or Word.
[14] Of the 5 words listed below, which is the odd one out?
A.
Applications
B.
Peripherals
C.
Programs
D.
Software
Ans:
Peripherals
Explanation :
Except for peripherals, all other options are examples of intangible instructions given to a computer to perform a specific type of task in on orderly manner.
[15] A program embedded in a semiconductor chip during manufacture is called .
A.
Humanware
B.
Firmware
C.
Liveware
D.
Hardware
Ans:
Firmware
Explanation :
Firmware is a collection of permanent instructions and codes stored in a read-only memory. The firmware is usually placed by the manufactures of computers to store vital information about how computer hardware devices will communicate with each other and how programs will run on hardware devices.
[16] A typically connects personal computers within a very limited geographical area, usually within a single building.
A.
LAN
B.
FAN
C.
TAN
D.
WAN
Ans:
LAN
Explanation :
A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings
[17] Who contributed to the idea of a stored program?
A.
John von Neumann
B.
Charles Babbage
C.
Howard Aiken
D.
Daniel Thomas
Ans:
John von Neumann
Explanation :
John von Neumann is the first person who proposed the idea of stored program.
[18] Who among the following is considered the father of modern computing?
A.
Joseph Marie Jacquard
B.
John Napier
C.
Blaise Pascal
D.
Charles Babbage
Ans:
Charles Babbage
Explanation :
Charles Babbage invented Difference Engine and Analytical Engine. Because of the immense contribution and impact that his inventions had on the history of computing, Babbage is regarded as the father of the modern computer.
[19] A cell range in Excel is represented by using which among the following sign?
A.
comma
B.
colon
C.
semicolon
D.
forward slash
Ans:
colon
Explanation :
A cell range refers to a group of cells within a row or column. For example, a cell range including the cells B1, B2, B3, B4 and B5 will be written as B1:B5.
[20] In MS Excel, both formulas and functions must be preceded by the which of the following, for Excel to understand them?
A.
hash sign
B.
equals sign
C.
percent sign
D.
asterisk sign
Ans:
equals sign
Explanation :
In MS Excel, the equals sign is used to start a formula or function.
[21] Which of the following gates is a complement of the X-OR gate?
A.
NOT gate
B.
NOR gate
C.
AND gate
D.
X-NOR gate
Ans:
X-NOR gate
Explanation :
X-NOR gate is a complement of the X-OR gate. The truth table of the X-NOR gate is the complement (opposite) to the X-OR gate.
[22] are the gates that can be used to implement any type of Boolean logic.
A.
OR gates
B.
Universal gates
C.
NAND gates
D.
Exclusive-NOR gates
Ans:
Universal gates
Explanation :
Universal gates are the gates that can be used to implement any type of Boolean logic or circuit. There are two universal gates, namely, NAND gate and NOR gate, which can be used to implement any of the basic logic gates.
[23] Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information?
A.
New Disk
B.
Hard disk
C.
Permanent disk
D.
Optical disk
Ans:
Hard disk
Explanation :
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.
[24] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[25] In first generation of computers, they used :
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
Explanation :
ARPANET was the first network in the history of Internet.
[6] Which of the following general purpose software allows you to do mathematical or financial calculation?
A.
Word processing program
B.
Spreadsheet program
C.
Presentation program
D.
Media Player
Ans:
Spreadsheet program
Explanation :
A spreadsheet program is general-purpose software that allows you to do mathematical or financial calculation. An example of a spreadsheet program is MS excel.
[7] Routing is done at the _.
A.
Data link layer
B.
Network layer
C.
Transport layer
D.
Session layer
Ans:
Network layer
Explanation :
Routing is the process of transmitting frames of data among networks. This service is provided by the network layer. The network layer is also responsible for controlling subnets.
[8] Which of the following is a loopback address?
A.
125.0.0.0
B.
127.0.0.1
C.
255.0.0.0
D.
255.0.0.1
Ans:
127.0.0.1
Explanation :
Loopback address is a special IP address that is 127.0.0.1 used for testing the connection on the same machine.
[9] A list of protocols used by a system, one protocol per layer, is called:
A.
protocol architecture
B.
protocol stack
C.
protocol suite
D.
protocol application
Ans:
protocol stack
Explanation :
A protocol stack refers to a group of protocols that are running concurrently that are employed for the implementation of network protocol suite.
[10] time is called _.
A.
Multi-tasking
B.
Object-oriented programming
C.
Multi-user computing
D.
Real-Time
Ans:
Multi-tasking
Explanation :
The ability of an operating system to run more than one application at a time is called Multi-tasking.
[11] Which one of the following(s) is/are real time operating system(s)?
A.
VxWorks
B.
Windows CE
C.
RTLinux
D.
All of these
Ans:
All of these
Explanation :
VxWorks, Windows CE, RTLinux are real time OS.
[12] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A.
Toggle
B.
Cold booting
C.
Warm booting
D.
Logging off
Ans:
Cold booting
Explanation :
Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
[13] Different icons of application software can be found in which bar in latest version of Microsoft Windows?
A.
Start Menu
B.
Browser
C.
Status
D.
Control Panel
Ans:
Start Menu
Explanation :
Microsoft re-introduced Start Menu bar and you can access various application software through it like paint or Word.
[14] Of the 5 words listed below, which is the odd one out?
A.
Applications
B.
Peripherals
C.
Programs
D.
Software
Ans:
Peripherals
Explanation :
Except for peripherals, all other options are examples of intangible instructions given to a computer to perform a specific type of task in on orderly manner.
[15] A program embedded in a semiconductor chip during manufacture is called .
A.
Humanware
B.
Firmware
C.
Liveware
D.
Hardware
Ans:
Firmware
Explanation :
Firmware is a collection of permanent instructions and codes stored in a read-only memory. The firmware is usually placed by the manufactures of computers to store vital information about how computer hardware devices will communicate with each other and how programs will run on hardware devices.
[16] A typically connects personal computers within a very limited geographical area, usually within a single building.
A.
LAN
B.
FAN
C.
TAN
D.
WAN
Ans:
LAN
Explanation :
A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings
[17] Who contributed to the idea of a stored program?
A.
John von Neumann
B.
Charles Babbage
C.
Howard Aiken
D.
Daniel Thomas
Ans:
John von Neumann
Explanation :
John von Neumann is the first person who proposed the idea of stored program.
[18] Who among the following is considered the father of modern computing?
A.
Joseph Marie Jacquard
B.
John Napier
C.
Blaise Pascal
D.
Charles Babbage
Ans:
Charles Babbage
Explanation :
Charles Babbage invented Difference Engine and Analytical Engine. Because of the immense contribution and impact that his inventions had on the history of computing, Babbage is regarded as the father of the modern computer.
[19] A cell range in Excel is represented by using which among the following sign?
A.
comma
B.
colon
C.
semicolon
D.
forward slash
Ans:
colon
Explanation :
A cell range refers to a group of cells within a row or column. For example, a cell range including the cells B1, B2, B3, B4 and B5 will be written as B1:B5.
[20] In MS Excel, both formulas and functions must be preceded by the which of the following, for Excel to understand them?
A.
hash sign
B.
equals sign
C.
percent sign
D.
asterisk sign
Ans:
equals sign
Explanation :
In MS Excel, the equals sign is used to start a formula or function.
[21] Which of the following gates is a complement of the X-OR gate?
A.
NOT gate
B.
NOR gate
C.
AND gate
D.
X-NOR gate
Ans:
X-NOR gate
Explanation :
X-NOR gate is a complement of the X-OR gate. The truth table of the X-NOR gate is the complement (opposite) to the X-OR gate.
[22] are the gates that can be used to implement any type of Boolean logic.
A.
OR gates
B.
Universal gates
C.
NAND gates
D.
Exclusive-NOR gates
Ans:
Universal gates
Explanation :
Universal gates are the gates that can be used to implement any type of Boolean logic or circuit. There are two universal gates, namely, NAND gate and NOR gate, which can be used to implement any of the basic logic gates.
[23] Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information?
A.
New Disk
B.
Hard disk
C.
Permanent disk
D.
Optical disk
Ans:
Hard disk
Explanation :
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.
[24] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[25] In first generation of computers, they used :
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
Explanation :
Routing is the process of transmitting frames of data among networks. This service is provided by the network layer. The network layer is also responsible for controlling subnets.
[8] Which of the following is a loopback address?
A.
125.0.0.0
B.
127.0.0.1
C.
255.0.0.0
D.
255.0.0.1
Ans:
127.0.0.1
Explanation :
Loopback address is a special IP address that is 127.0.0.1 used for testing the connection on the same machine.
[9] A list of protocols used by a system, one protocol per layer, is called:
A.
protocol architecture
B.
protocol stack
C.
protocol suite
D.
protocol application
Ans:
protocol stack
Explanation :
A protocol stack refers to a group of protocols that are running concurrently that are employed for the implementation of network protocol suite.
[10] time is called _.
A.
Multi-tasking
B.
Object-oriented programming
C.
Multi-user computing
D.
Real-Time
Ans:
Multi-tasking
Explanation :
The ability of an operating system to run more than one application at a time is called Multi-tasking.
[11] Which one of the following(s) is/are real time operating system(s)?
A.
VxWorks
B.
Windows CE
C.
RTLinux
D.
All of these
Ans:
All of these
Explanation :
VxWorks, Windows CE, RTLinux are real time OS.
[12] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A.
Toggle
B.
Cold booting
C.
Warm booting
D.
Logging off
Ans:
Cold booting
Explanation :
Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
[13] Different icons of application software can be found in which bar in latest version of Microsoft Windows?
A.
Start Menu
B.
Browser
C.
Status
D.
Control Panel
Ans:
Start Menu
Explanation :
Microsoft re-introduced Start Menu bar and you can access various application software through it like paint or Word.
[14] Of the 5 words listed below, which is the odd one out?
A.
Applications
B.
Peripherals
C.
Programs
D.
Software
Ans:
Peripherals
Explanation :
Except for peripherals, all other options are examples of intangible instructions given to a computer to perform a specific type of task in on orderly manner.
[15] A program embedded in a semiconductor chip during manufacture is called .
A.
Humanware
B.
Firmware
C.
Liveware
D.
Hardware
Ans:
Firmware
Explanation :
Firmware is a collection of permanent instructions and codes stored in a read-only memory. The firmware is usually placed by the manufactures of computers to store vital information about how computer hardware devices will communicate with each other and how programs will run on hardware devices.
[16] A typically connects personal computers within a very limited geographical area, usually within a single building.
A.
LAN
B.
FAN
C.
TAN
D.
WAN
Ans:
LAN
Explanation :
A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings
[17] Who contributed to the idea of a stored program?
A.
John von Neumann
B.
Charles Babbage
C.
Howard Aiken
D.
Daniel Thomas
Ans:
John von Neumann
Explanation :
John von Neumann is the first person who proposed the idea of stored program.
[18] Who among the following is considered the father of modern computing?
A.
Joseph Marie Jacquard
B.
John Napier
C.
Blaise Pascal
D.
Charles Babbage
Ans:
Charles Babbage
Explanation :
Charles Babbage invented Difference Engine and Analytical Engine. Because of the immense contribution and impact that his inventions had on the history of computing, Babbage is regarded as the father of the modern computer.
[19] A cell range in Excel is represented by using which among the following sign?
A.
comma
B.
colon
C.
semicolon
D.
forward slash
Ans:
colon
Explanation :
A cell range refers to a group of cells within a row or column. For example, a cell range including the cells B1, B2, B3, B4 and B5 will be written as B1:B5.
[20] In MS Excel, both formulas and functions must be preceded by the which of the following, for Excel to understand them?
A.
hash sign
B.
equals sign
C.
percent sign
D.
asterisk sign
Ans:
equals sign
Explanation :
In MS Excel, the equals sign is used to start a formula or function.
[21] Which of the following gates is a complement of the X-OR gate?
A.
NOT gate
B.
NOR gate
C.
AND gate
D.
X-NOR gate
Ans:
X-NOR gate
Explanation :
X-NOR gate is a complement of the X-OR gate. The truth table of the X-NOR gate is the complement (opposite) to the X-OR gate.
[22] are the gates that can be used to implement any type of Boolean logic.
A.
OR gates
B.
Universal gates
C.
NAND gates
D.
Exclusive-NOR gates
Ans:
Universal gates
Explanation :
Universal gates are the gates that can be used to implement any type of Boolean logic or circuit. There are two universal gates, namely, NAND gate and NOR gate, which can be used to implement any of the basic logic gates.
[23] Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information?
A.
New Disk
B.
Hard disk
C.
Permanent disk
D.
Optical disk
Ans:
Hard disk
Explanation :
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.
[24] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[25] In first generation of computers, they used :
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
Explanation :
A protocol stack refers to a group of protocols that are running concurrently that are employed for the implementation of network protocol suite.
[10] time is called _.
A.
Multi-tasking
B.
Object-oriented programming
C.
Multi-user computing
D.
Real-Time
Ans:
Multi-tasking
Explanation :
The ability of an operating system to run more than one application at a time is called Multi-tasking.
[11] Which one of the following(s) is/are real time operating system(s)?
A.
VxWorks
B.
Windows CE
C.
RTLinux
D.
All of these
Ans:
All of these
Explanation :
VxWorks, Windows CE, RTLinux are real time OS.
[12] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A.
Toggle
B.
Cold booting
C.
Warm booting
D.
Logging off
Ans:
Cold booting
Explanation :
Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
[13] Different icons of application software can be found in which bar in latest version of Microsoft Windows?
A.
Start Menu
B.
Browser
C.
Status
D.
Control Panel
Ans:
Start Menu
Explanation :
Microsoft re-introduced Start Menu bar and you can access various application software through it like paint or Word.
[14] Of the 5 words listed below, which is the odd one out?
A.
Applications
B.
Peripherals
C.
Programs
D.
Software
Ans:
Peripherals
Explanation :
Except for peripherals, all other options are examples of intangible instructions given to a computer to perform a specific type of task in on orderly manner.
[15] A program embedded in a semiconductor chip during manufacture is called .
A.
Humanware
B.
Firmware
C.
Liveware
D.
Hardware
Ans:
Firmware
Explanation :
Firmware is a collection of permanent instructions and codes stored in a read-only memory. The firmware is usually placed by the manufactures of computers to store vital information about how computer hardware devices will communicate with each other and how programs will run on hardware devices.
[16] A typically connects personal computers within a very limited geographical area, usually within a single building.
A.
LAN
B.
FAN
C.
TAN
D.
WAN
Ans:
LAN
Explanation :
A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings
[17] Who contributed to the idea of a stored program?
A.
John von Neumann
B.
Charles Babbage
C.
Howard Aiken
D.
Daniel Thomas
Ans:
John von Neumann
Explanation :
John von Neumann is the first person who proposed the idea of stored program.
[18] Who among the following is considered the father of modern computing?
A.
Joseph Marie Jacquard
B.
John Napier
C.
Blaise Pascal
D.
Charles Babbage
Ans:
Charles Babbage
Explanation :
Charles Babbage invented Difference Engine and Analytical Engine. Because of the immense contribution and impact that his inventions had on the history of computing, Babbage is regarded as the father of the modern computer.
[19] A cell range in Excel is represented by using which among the following sign?
A.
comma
B.
colon
C.
semicolon
D.
forward slash
Ans:
colon
Explanation :
A cell range refers to a group of cells within a row or column. For example, a cell range including the cells B1, B2, B3, B4 and B5 will be written as B1:B5.
[20] In MS Excel, both formulas and functions must be preceded by the which of the following, for Excel to understand them?
A.
hash sign
B.
equals sign
C.
percent sign
D.
asterisk sign
Ans:
equals sign
Explanation :
In MS Excel, the equals sign is used to start a formula or function.
[21] Which of the following gates is a complement of the X-OR gate?
A.
NOT gate
B.
NOR gate
C.
AND gate
D.
X-NOR gate
Ans:
X-NOR gate
Explanation :
X-NOR gate is a complement of the X-OR gate. The truth table of the X-NOR gate is the complement (opposite) to the X-OR gate.
[22] are the gates that can be used to implement any type of Boolean logic.
A.
OR gates
B.
Universal gates
C.
NAND gates
D.
Exclusive-NOR gates
Ans:
Universal gates
Explanation :
Universal gates are the gates that can be used to implement any type of Boolean logic or circuit. There are two universal gates, namely, NAND gate and NOR gate, which can be used to implement any of the basic logic gates.
[23] Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information?
A.
New Disk
B.
Hard disk
C.
Permanent disk
D.
Optical disk
Ans:
Hard disk
Explanation :
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.
[24] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[25] In first generation of computers, they used :
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
Explanation :
VxWorks, Windows CE, RTLinux are real time OS.
[12] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A.
Toggle
B.
Cold booting
C.
Warm booting
D.
Logging off
Ans:
Cold booting
Explanation :
Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
[13] Different icons of application software can be found in which bar in latest version of Microsoft Windows?
A.
Start Menu
B.
Browser
C.
Status
D.
Control Panel
Ans:
Start Menu
Explanation :
Microsoft re-introduced Start Menu bar and you can access various application software through it like paint or Word.
[14] Of the 5 words listed below, which is the odd one out?
A.
Applications
B.
Peripherals
C.
Programs
D.
Software
Ans:
Peripherals
Explanation :
Except for peripherals, all other options are examples of intangible instructions given to a computer to perform a specific type of task in on orderly manner.
[15] A program embedded in a semiconductor chip during manufacture is called .
A.
Humanware
B.
Firmware
C.
Liveware
D.
Hardware
Ans:
Firmware
Explanation :
Firmware is a collection of permanent instructions and codes stored in a read-only memory. The firmware is usually placed by the manufactures of computers to store vital information about how computer hardware devices will communicate with each other and how programs will run on hardware devices.
[16] A typically connects personal computers within a very limited geographical area, usually within a single building.
A.
LAN
B.
FAN
C.
TAN
D.
WAN
Ans:
LAN
Explanation :
A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings
[17] Who contributed to the idea of a stored program?
A.
John von Neumann
B.
Charles Babbage
C.
Howard Aiken
D.
Daniel Thomas
Ans:
John von Neumann
Explanation :
John von Neumann is the first person who proposed the idea of stored program.
[18] Who among the following is considered the father of modern computing?
A.
Joseph Marie Jacquard
B.
John Napier
C.
Blaise Pascal
D.
Charles Babbage
Ans:
Charles Babbage
Explanation :
Charles Babbage invented Difference Engine and Analytical Engine. Because of the immense contribution and impact that his inventions had on the history of computing, Babbage is regarded as the father of the modern computer.
[19] A cell range in Excel is represented by using which among the following sign?
A.
comma
B.
colon
C.
semicolon
D.
forward slash
Ans:
colon
Explanation :
A cell range refers to a group of cells within a row or column. For example, a cell range including the cells B1, B2, B3, B4 and B5 will be written as B1:B5.
[20] In MS Excel, both formulas and functions must be preceded by the which of the following, for Excel to understand them?
A.
hash sign
B.
equals sign
C.
percent sign
D.
asterisk sign
Ans:
equals sign
Explanation :
In MS Excel, the equals sign is used to start a formula or function.
[21] Which of the following gates is a complement of the X-OR gate?
A.
NOT gate
B.
NOR gate
C.
AND gate
D.
X-NOR gate
Ans:
X-NOR gate
Explanation :
X-NOR gate is a complement of the X-OR gate. The truth table of the X-NOR gate is the complement (opposite) to the X-OR gate.
[22] are the gates that can be used to implement any type of Boolean logic.
A.
OR gates
B.
Universal gates
C.
NAND gates
D.
Exclusive-NOR gates
Ans:
Universal gates
Explanation :
Universal gates are the gates that can be used to implement any type of Boolean logic or circuit. There are two universal gates, namely, NAND gate and NOR gate, which can be used to implement any of the basic logic gates.
[23] Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information?
A.
New Disk
B.
Hard disk
C.
Permanent disk
D.
Optical disk
Ans:
Hard disk
Explanation :
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.
[24] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[25] In first generation of computers, they used :
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
Explanation :
Microsoft re-introduced Start Menu bar and you can access various application software through it like paint or Word.
[14] Of the 5 words listed below, which is the odd one out?
A.
Applications
B.
Peripherals
C.
Programs
D.
Software
Ans:
Peripherals
Explanation :
Except for peripherals, all other options are examples of intangible instructions given to a computer to perform a specific type of task in on orderly manner.
[15] A program embedded in a semiconductor chip during manufacture is called .
A.
Humanware
B.
Firmware
C.
Liveware
D.
Hardware
Ans:
Firmware
Explanation :
Firmware is a collection of permanent instructions and codes stored in a read-only memory. The firmware is usually placed by the manufactures of computers to store vital information about how computer hardware devices will communicate with each other and how programs will run on hardware devices.
[16] A typically connects personal computers within a very limited geographical area, usually within a single building.
A.
LAN
B.
FAN
C.
TAN
D.
WAN
Ans:
LAN
Explanation :
A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings
[17] Who contributed to the idea of a stored program?
A.
John von Neumann
B.
Charles Babbage
C.
Howard Aiken
D.
Daniel Thomas
Ans:
John von Neumann
Explanation :
John von Neumann is the first person who proposed the idea of stored program.
[18] Who among the following is considered the father of modern computing?
A.
Joseph Marie Jacquard
B.
John Napier
C.
Blaise Pascal
D.
Charles Babbage
Ans:
Charles Babbage
Explanation :
Charles Babbage invented Difference Engine and Analytical Engine. Because of the immense contribution and impact that his inventions had on the history of computing, Babbage is regarded as the father of the modern computer.
[19] A cell range in Excel is represented by using which among the following sign?
A.
comma
B.
colon
C.
semicolon
D.
forward slash
Ans:
colon
Explanation :
A cell range refers to a group of cells within a row or column. For example, a cell range including the cells B1, B2, B3, B4 and B5 will be written as B1:B5.
[20] In MS Excel, both formulas and functions must be preceded by the which of the following, for Excel to understand them?
A.
hash sign
B.
equals sign
C.
percent sign
D.
asterisk sign
Ans:
equals sign
Explanation :
In MS Excel, the equals sign is used to start a formula or function.
[21] Which of the following gates is a complement of the X-OR gate?
A.
NOT gate
B.
NOR gate
C.
AND gate
D.
X-NOR gate
Ans:
X-NOR gate
Explanation :
X-NOR gate is a complement of the X-OR gate. The truth table of the X-NOR gate is the complement (opposite) to the X-OR gate.
[22] are the gates that can be used to implement any type of Boolean logic.
A.
OR gates
B.
Universal gates
C.
NAND gates
D.
Exclusive-NOR gates
Ans:
Universal gates
Explanation :
Universal gates are the gates that can be used to implement any type of Boolean logic or circuit. There are two universal gates, namely, NAND gate and NOR gate, which can be used to implement any of the basic logic gates.
[23] Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information?
A.
New Disk
B.
Hard disk
C.
Permanent disk
D.
Optical disk
Ans:
Hard disk
Explanation :
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.
[24] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[25] In first generation of computers, they used :
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
Explanation :
Firmware is a collection of permanent instructions and codes stored in a read-only memory. The firmware is usually placed by the manufactures of computers to store vital information about how computer hardware devices will communicate with each other and how programs will run on hardware devices.
[16] A typically connects personal computers within a very limited geographical area, usually within a single building.
A.
LAN
B.
FAN
C.
TAN
D.
WAN
Ans:
LAN
Explanation :
A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings
[17] Who contributed to the idea of a stored program?
A.
John von Neumann
B.
Charles Babbage
C.
Howard Aiken
D.
Daniel Thomas
Ans:
John von Neumann
Explanation :
John von Neumann is the first person who proposed the idea of stored program.
[18] Who among the following is considered the father of modern computing?
A.
Joseph Marie Jacquard
B.
John Napier
C.
Blaise Pascal
D.
Charles Babbage
Ans:
Charles Babbage
Explanation :
Charles Babbage invented Difference Engine and Analytical Engine. Because of the immense contribution and impact that his inventions had on the history of computing, Babbage is regarded as the father of the modern computer.
[19] A cell range in Excel is represented by using which among the following sign?
A.
comma
B.
colon
C.
semicolon
D.
forward slash
Ans:
colon
Explanation :
A cell range refers to a group of cells within a row or column. For example, a cell range including the cells B1, B2, B3, B4 and B5 will be written as B1:B5.
[20] In MS Excel, both formulas and functions must be preceded by the which of the following, for Excel to understand them?
A.
hash sign
B.
equals sign
C.
percent sign
D.
asterisk sign
Ans:
equals sign
Explanation :
In MS Excel, the equals sign is used to start a formula or function.
[21] Which of the following gates is a complement of the X-OR gate?
A.
NOT gate
B.
NOR gate
C.
AND gate
D.
X-NOR gate
Ans:
X-NOR gate
Explanation :
X-NOR gate is a complement of the X-OR gate. The truth table of the X-NOR gate is the complement (opposite) to the X-OR gate.
[22] are the gates that can be used to implement any type of Boolean logic.
A.
OR gates
B.
Universal gates
C.
NAND gates
D.
Exclusive-NOR gates
Ans:
Universal gates
Explanation :
Universal gates are the gates that can be used to implement any type of Boolean logic or circuit. There are two universal gates, namely, NAND gate and NOR gate, which can be used to implement any of the basic logic gates.
[23] Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information?
A.
New Disk
B.
Hard disk
C.
Permanent disk
D.
Optical disk
Ans:
Hard disk
Explanation :
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.
[24] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[25] In first generation of computers, they used :
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
Explanation :
John von Neumann is the first person who proposed the idea of stored program.
[18] Who among the following is considered the father of modern computing?
A.
Joseph Marie Jacquard
B.
John Napier
C.
Blaise Pascal
D.
Charles Babbage
Ans:
Charles Babbage
Explanation :
Charles Babbage invented Difference Engine and Analytical Engine. Because of the immense contribution and impact that his inventions had on the history of computing, Babbage is regarded as the father of the modern computer.
[19] A cell range in Excel is represented by using which among the following sign?
A.
comma
B.
colon
C.
semicolon
D.
forward slash
Ans:
colon
Explanation :
A cell range refers to a group of cells within a row or column. For example, a cell range including the cells B1, B2, B3, B4 and B5 will be written as B1:B5.
[20] In MS Excel, both formulas and functions must be preceded by the which of the following, for Excel to understand them?
A.
hash sign
B.
equals sign
C.
percent sign
D.
asterisk sign
Ans:
equals sign
Explanation :
In MS Excel, the equals sign is used to start a formula or function.
[21] Which of the following gates is a complement of the X-OR gate?
A.
NOT gate
B.
NOR gate
C.
AND gate
D.
X-NOR gate
Ans:
X-NOR gate
Explanation :
X-NOR gate is a complement of the X-OR gate. The truth table of the X-NOR gate is the complement (opposite) to the X-OR gate.
[22] are the gates that can be used to implement any type of Boolean logic.
A.
OR gates
B.
Universal gates
C.
NAND gates
D.
Exclusive-NOR gates
Ans:
Universal gates
Explanation :
Universal gates are the gates that can be used to implement any type of Boolean logic or circuit. There are two universal gates, namely, NAND gate and NOR gate, which can be used to implement any of the basic logic gates.
[23] Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information?
A.
New Disk
B.
Hard disk
C.
Permanent disk
D.
Optical disk
Ans:
Hard disk
Explanation :
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.
[24] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[25] In first generation of computers, they used :
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
Explanation :
A cell range refers to a group of cells within a row or column. For example, a cell range including the cells B1, B2, B3, B4 and B5 will be written as B1:B5.
[20] In MS Excel, both formulas and functions must be preceded by the which of the following, for Excel to understand them?
A.
hash sign
B.
equals sign
C.
percent sign
D.
asterisk sign
Ans:
equals sign
Explanation :
In MS Excel, the equals sign is used to start a formula or function.
[21] Which of the following gates is a complement of the X-OR gate?
A.
NOT gate
B.
NOR gate
C.
AND gate
D.
X-NOR gate
Ans:
X-NOR gate
Explanation :
X-NOR gate is a complement of the X-OR gate. The truth table of the X-NOR gate is the complement (opposite) to the X-OR gate.
[22] are the gates that can be used to implement any type of Boolean logic.
A.
OR gates
B.
Universal gates
C.
NAND gates
D.
Exclusive-NOR gates
Ans:
Universal gates
Explanation :
Universal gates are the gates that can be used to implement any type of Boolean logic or circuit. There are two universal gates, namely, NAND gate and NOR gate, which can be used to implement any of the basic logic gates.
[23] Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information?
A.
New Disk
B.
Hard disk
C.
Permanent disk
D.
Optical disk
Ans:
Hard disk
Explanation :
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.
[24] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[25] In first generation of computers, they used :
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
Explanation :
X-NOR gate is a complement of the X-OR gate. The truth table of the X-NOR gate is the complement (opposite) to the X-OR gate.
[22] are the gates that can be used to implement any type of Boolean logic.
A.
OR gates
B.
Universal gates
C.
NAND gates
D.
Exclusive-NOR gates
Ans:
Universal gates
Explanation :
Universal gates are the gates that can be used to implement any type of Boolean logic or circuit. There are two universal gates, namely, NAND gate and NOR gate, which can be used to implement any of the basic logic gates.
[23] Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information?
A.
New Disk
B.
Hard disk
C.
Permanent disk
D.
Optical disk
Ans:
Hard disk
Explanation :
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.
[24] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[25] In first generation of computers, they used :
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
Explanation :
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.
[24] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[25] In first generation of computers, they used :
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
Explanation :
In First Generation mainly batch processing operating system were used.
