[1] What is the blinking symbol on the screen that shows where the next character will appear?
A.
Cursor
B.
Delete key
C.
Arrow key
D.
Return key
Ans:
Cursor
Explanation :
In computer user interfaces, a cursor is an indicator used to show the current position for user interaction on a computer monitor or other display device that will respond to input from a text input or pointing device.
[2] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the framebuffer in some graphics adapters.
[3] Type to start a numbered list, and then press SPACEBAR or the TAB key.
A.
1#
B.
1$
C.
1
D.
1*
Ans:
1
Explanation :
1. -> Spacebar -> enter, will start numbered list.
[4] Internet access by transmitting digital data over the wires of a local telephone network is provided by:
A.
leased line
B.
digital subscriber line
C.
digital signal line
D.
MODEM
Ans:
digital subscriber line
Explanation :
Digital subscriber line (DSL or digital subscriber loop) is a family of technologies that are used to transmit digital data over telephone lines.
[5] The Internet was originally a project of which agency?
A.
ARPA
B.
NSF
C.
NSA
D.
RIP
Ans:
ARPA
Explanation :
Advanced Research Projects Agency (ARPA), was funding organization in the United States that developed one of the precursors of the Internet (ARPANET), it now stands for Address and Routing Parameter Area.
[6] Verification of a login name and password is known as:
A.
configuration
B.
accessibility
C.
authentication
D.
logging off
Ans:
authentication
Explanation :
Authentication is the process of recognizing a user's identity.
[7] What is the space left between the margin and the start of a paragraph called?
A.
Spacing
B.
Gutter
C.
Indentation
D.
Alignment
Ans:
Indentation
Explanation :
The space left between the margin and the start of a paragraph is called Indentation.
[8] We can insert a page number at:
A.
Header
B.
Footer
C.
Gutter Margin
D.
Both (1) and (2)
Ans:
Both (1) and (2)
Explanation :
Page number can be inserted in either the header or the footer of a document.
[9] Which of the following mouse can work on any surface from a granite countertop to a carpet?
A.
Mechanical mouse
B.
Optical mouse
C.
Laser mouse
D.
Blue Track mouse
Ans:
Blue Track mouse
Explanation :
BlueTrack mouse is a type of mouse that is based on the Blue Track Technology and can work on any surface from granite countertop to the carpet.
[10] Which of the following devices is mainly used to draw objects in CAD?
A.
Keyboard
B.
Printer
C.
Joystick
D.
Scanner
Ans:
Joystick
Explanation :
Joystick is used to draw objects in Computer-Aided Design (CAD).
[11]Which of the following topologies does not use switches?
A.
Bus
B.
Star
C.
Ring
D.
Mesh
Ans:
Bus
Explanation :
In the Bus topology, all the nodes and peripherals are connected to a single cable that acts as the backbone of the network. Therefore, there is no need for a hub, switch or router for connecting nodes in this topology.
[12] Which layer provides electrical and mechanical requirements to maintain a physical link between the end points?
A.
Network
B.
Physical
C.
Application
D.
Data Link
Ans:
Physical
Explanation :
The Physical layer handles voltage, electrical pulses, connectors and, switches so that data can be transmitted over transmission media.
[13] Which of the following protocols is available on the network layer of the OSI model?
A.
IPX
B.
TCP
C.
Ethernet
D.
SNMP
Ans:
IPX
Explanation :
Internetwork Packet Exchange (IPX) is a connectionless protocol on the network layer used for interconnecting networks using Novell’s Netware clients and servers. TCP and SPX (Sequenced Packet Exchange) are available on the Transport layer.
[14] Which layer of the OSI model defines the language and syntax for programs?
A.
Data link layer
B.
Presentation layer
C.
Application layer
D.
Session layer
Ans:
Application layer
Explanation :
The application layer of the OSI model provides a framework to run application programs. It defines the language and syntax used by programs to communicate with supplementary programs.
[15] Which of the following is a type of margin at the time of printing and binding printouts?
A.
Portrait
B.
Gutter
C.
A4
D.
Next Page
Ans:
Gutter
Explanation :
A gutter margin adds an extra space to the binding sides. Thus, it ensures that the text does not hide at the time of binding or folding papers.
[16] Which among the following options is the line that describes the contents of the message while sending an e-mail?
A.
BCC
B.
to
C.
subject
D.
cc
Ans:
subject
Explanation :
Subject line in short describes content of an e-mail.
[17] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[18] Which type of operation in the given options can be performed by a CD-RW?
A.
read and write information
B.
read, write and rewrite information
C.
only write information
D.
only read information
Ans:
read, write and rewrite information
Explanation :
CD-RW (Compact Disc-Rewritable) is a digital optical disc storage format. A CD-RW disc is a compact disc that can be written, read arbitrarily many times, erased, and written again.
[19] Which among the following is fastest among other systems of its generation?
A.
Mainframe
B.
Notebook
C.
PC
D.
Supercomputer
Ans:
Supercomputer
Explanation :
Supercomputers are fastest among all other types of computer in any generation.
[20] Which among the following option specifies this action: Holding the mouse button down while moving an object of text?
A.
moving
B.
dragging
C.
saving
D.
highlighting
Ans:
dragging
Explanation :
Dragging is the gesture of Holding the mouse button down while moving an object of text or image or any file or its part.
[21] Name the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
A.
BIOS
B.
VAIO
C.
I/O
D.
AVG
Ans:
BIOS
Explanation :
BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
[22] Dr. E.F. Codd represented rules that a database must obey if it has to be considered truly relational.
A.
10
B.
8
C.
12
D.
6
Ans:
12
Explanation :
Dr Edgar F. Codd, after his extensive research on the Relational Model of database systems, came up with twelve rules of his own, which according to him, a database must obey in order to be regarded as a true relational database.
[23] In first generation of computers, they used _.
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
[24] Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
A.
hacker
B.
analyst
C.
instant messenger
D.
programmer
Ans:
hacker
Explanation :
Hacker is someone who seeks and exploits weaknesses in a computer system.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
In computer user interfaces, a cursor is an indicator used to show the current position for user interaction on a computer monitor or other display device that will respond to input from a text input or pointing device.
[2] The dual-port version of DRAM formerly used in graphics adaptors is :
A.
FPM DRAM
B.
EDORAM
C.
VRAM
D.
DDRSDRAM
Ans:
VRAM
Explanation :
Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the framebuffer in some graphics adapters.
[3] Type to start a numbered list, and then press SPACEBAR or the TAB key.
A.
1#
B.
1$
C.
1
D.
1*
Ans:
1
Explanation :
1. -> Spacebar -> enter, will start numbered list.
[4] Internet access by transmitting digital data over the wires of a local telephone network is provided by:
A.
leased line
B.
digital subscriber line
C.
digital signal line
D.
MODEM
Ans:
digital subscriber line
Explanation :
Digital subscriber line (DSL or digital subscriber loop) is a family of technologies that are used to transmit digital data over telephone lines.
[5] The Internet was originally a project of which agency?
A.
ARPA
B.
NSF
C.
NSA
D.
RIP
Ans:
ARPA
Explanation :
Advanced Research Projects Agency (ARPA), was funding organization in the United States that developed one of the precursors of the Internet (ARPANET), it now stands for Address and Routing Parameter Area.
[6] Verification of a login name and password is known as:
A.
configuration
B.
accessibility
C.
authentication
D.
logging off
Ans:
authentication
Explanation :
Authentication is the process of recognizing a user's identity.
[7] What is the space left between the margin and the start of a paragraph called?
A.
Spacing
B.
Gutter
C.
Indentation
D.
Alignment
Ans:
Indentation
Explanation :
The space left between the margin and the start of a paragraph is called Indentation.
[8] We can insert a page number at:
A.
Header
B.
Footer
C.
Gutter Margin
D.
Both (1) and (2)
Ans:
Both (1) and (2)
Explanation :
Page number can be inserted in either the header or the footer of a document.
[9] Which of the following mouse can work on any surface from a granite countertop to a carpet?
A.
Mechanical mouse
B.
Optical mouse
C.
Laser mouse
D.
Blue Track mouse
Ans:
Blue Track mouse
Explanation :
BlueTrack mouse is a type of mouse that is based on the Blue Track Technology and can work on any surface from granite countertop to the carpet.
[10] Which of the following devices is mainly used to draw objects in CAD?
A.
Keyboard
B.
Printer
C.
Joystick
D.
Scanner
Ans:
Joystick
Explanation :
Joystick is used to draw objects in Computer-Aided Design (CAD).
[11]Which of the following topologies does not use switches?
A.
Bus
B.
Star
C.
Ring
D.
Mesh
Ans:
Bus
Explanation :
In the Bus topology, all the nodes and peripherals are connected to a single cable that acts as the backbone of the network. Therefore, there is no need for a hub, switch or router for connecting nodes in this topology.
[12] Which layer provides electrical and mechanical requirements to maintain a physical link between the end points?
A.
Network
B.
Physical
C.
Application
D.
Data Link
Ans:
Physical
Explanation :
The Physical layer handles voltage, electrical pulses, connectors and, switches so that data can be transmitted over transmission media.
[13] Which of the following protocols is available on the network layer of the OSI model?
A.
IPX
B.
TCP
C.
Ethernet
D.
SNMP
Ans:
IPX
Explanation :
Internetwork Packet Exchange (IPX) is a connectionless protocol on the network layer used for interconnecting networks using Novell’s Netware clients and servers. TCP and SPX (Sequenced Packet Exchange) are available on the Transport layer.
[14] Which layer of the OSI model defines the language and syntax for programs?
A.
Data link layer
B.
Presentation layer
C.
Application layer
D.
Session layer
Ans:
Application layer
Explanation :
The application layer of the OSI model provides a framework to run application programs. It defines the language and syntax used by programs to communicate with supplementary programs.
[15] Which of the following is a type of margin at the time of printing and binding printouts?
A.
Portrait
B.
Gutter
C.
A4
D.
Next Page
Ans:
Gutter
Explanation :
A gutter margin adds an extra space to the binding sides. Thus, it ensures that the text does not hide at the time of binding or folding papers.
[16] Which among the following options is the line that describes the contents of the message while sending an e-mail?
A.
BCC
B.
to
C.
subject
D.
cc
Ans:
subject
Explanation :
Subject line in short describes content of an e-mail.
[17] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[18] Which type of operation in the given options can be performed by a CD-RW?
A.
read and write information
B.
read, write and rewrite information
C.
only write information
D.
only read information
Ans:
read, write and rewrite information
Explanation :
CD-RW (Compact Disc-Rewritable) is a digital optical disc storage format. A CD-RW disc is a compact disc that can be written, read arbitrarily many times, erased, and written again.
[19] Which among the following is fastest among other systems of its generation?
A.
Mainframe
B.
Notebook
C.
PC
D.
Supercomputer
Ans:
Supercomputer
Explanation :
Supercomputers are fastest among all other types of computer in any generation.
[20] Which among the following option specifies this action: Holding the mouse button down while moving an object of text?
A.
moving
B.
dragging
C.
saving
D.
highlighting
Ans:
dragging
Explanation :
Dragging is the gesture of Holding the mouse button down while moving an object of text or image or any file or its part.
[21] Name the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
A.
BIOS
B.
VAIO
C.
I/O
D.
AVG
Ans:
BIOS
Explanation :
BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
[22] Dr. E.F. Codd represented rules that a database must obey if it has to be considered truly relational.
A.
10
B.
8
C.
12
D.
6
Ans:
12
Explanation :
Dr Edgar F. Codd, after his extensive research on the Relational Model of database systems, came up with twelve rules of his own, which according to him, a database must obey in order to be regarded as a true relational database.
[23] In first generation of computers, they used _.
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
[24] Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
A.
hacker
B.
analyst
C.
instant messenger
D.
programmer
Ans:
hacker
Explanation :
Hacker is someone who seeks and exploits weaknesses in a computer system.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
1. -> Spacebar -> enter, will start numbered list.
[4] Internet access by transmitting digital data over the wires of a local telephone network is provided by:
A.
leased line
B.
digital subscriber line
C.
digital signal line
D.
MODEM
Ans:
digital subscriber line
Explanation :
Digital subscriber line (DSL or digital subscriber loop) is a family of technologies that are used to transmit digital data over telephone lines.
[5] The Internet was originally a project of which agency?
A.
ARPA
B.
NSF
C.
NSA
D.
RIP
Ans:
ARPA
Explanation :
Advanced Research Projects Agency (ARPA), was funding organization in the United States that developed one of the precursors of the Internet (ARPANET), it now stands for Address and Routing Parameter Area.
[6] Verification of a login name and password is known as:
A.
configuration
B.
accessibility
C.
authentication
D.
logging off
Ans:
authentication
Explanation :
Authentication is the process of recognizing a user's identity.
[7] What is the space left between the margin and the start of a paragraph called?
A.
Spacing
B.
Gutter
C.
Indentation
D.
Alignment
Ans:
Indentation
Explanation :
The space left between the margin and the start of a paragraph is called Indentation.
[8] We can insert a page number at:
A.
Header
B.
Footer
C.
Gutter Margin
D.
Both (1) and (2)
Ans:
Both (1) and (2)
Explanation :
Page number can be inserted in either the header or the footer of a document.
[9] Which of the following mouse can work on any surface from a granite countertop to a carpet?
A.
Mechanical mouse
B.
Optical mouse
C.
Laser mouse
D.
Blue Track mouse
Ans:
Blue Track mouse
Explanation :
BlueTrack mouse is a type of mouse that is based on the Blue Track Technology and can work on any surface from granite countertop to the carpet.
[10] Which of the following devices is mainly used to draw objects in CAD?
A.
Keyboard
B.
Printer
C.
Joystick
D.
Scanner
Ans:
Joystick
Explanation :
Joystick is used to draw objects in Computer-Aided Design (CAD).
[11]Which of the following topologies does not use switches?
A.
Bus
B.
Star
C.
Ring
D.
Mesh
Ans:
Bus
Explanation :
In the Bus topology, all the nodes and peripherals are connected to a single cable that acts as the backbone of the network. Therefore, there is no need for a hub, switch or router for connecting nodes in this topology.
[12] Which layer provides electrical and mechanical requirements to maintain a physical link between the end points?
A.
Network
B.
Physical
C.
Application
D.
Data Link
Ans:
Physical
Explanation :
The Physical layer handles voltage, electrical pulses, connectors and, switches so that data can be transmitted over transmission media.
[13] Which of the following protocols is available on the network layer of the OSI model?
A.
IPX
B.
TCP
C.
Ethernet
D.
SNMP
Ans:
IPX
Explanation :
Internetwork Packet Exchange (IPX) is a connectionless protocol on the network layer used for interconnecting networks using Novell’s Netware clients and servers. TCP and SPX (Sequenced Packet Exchange) are available on the Transport layer.
[14] Which layer of the OSI model defines the language and syntax for programs?
A.
Data link layer
B.
Presentation layer
C.
Application layer
D.
Session layer
Ans:
Application layer
Explanation :
The application layer of the OSI model provides a framework to run application programs. It defines the language and syntax used by programs to communicate with supplementary programs.
[15] Which of the following is a type of margin at the time of printing and binding printouts?
A.
Portrait
B.
Gutter
C.
A4
D.
Next Page
Ans:
Gutter
Explanation :
A gutter margin adds an extra space to the binding sides. Thus, it ensures that the text does not hide at the time of binding or folding papers.
[16] Which among the following options is the line that describes the contents of the message while sending an e-mail?
A.
BCC
B.
to
C.
subject
D.
cc
Ans:
subject
Explanation :
Subject line in short describes content of an e-mail.
[17] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[18] Which type of operation in the given options can be performed by a CD-RW?
A.
read and write information
B.
read, write and rewrite information
C.
only write information
D.
only read information
Ans:
read, write and rewrite information
Explanation :
CD-RW (Compact Disc-Rewritable) is a digital optical disc storage format. A CD-RW disc is a compact disc that can be written, read arbitrarily many times, erased, and written again.
[19] Which among the following is fastest among other systems of its generation?
A.
Mainframe
B.
Notebook
C.
PC
D.
Supercomputer
Ans:
Supercomputer
Explanation :
Supercomputers are fastest among all other types of computer in any generation.
[20] Which among the following option specifies this action: Holding the mouse button down while moving an object of text?
A.
moving
B.
dragging
C.
saving
D.
highlighting
Ans:
dragging
Explanation :
Dragging is the gesture of Holding the mouse button down while moving an object of text or image or any file or its part.
[21] Name the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
A.
BIOS
B.
VAIO
C.
I/O
D.
AVG
Ans:
BIOS
Explanation :
BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
[22] Dr. E.F. Codd represented rules that a database must obey if it has to be considered truly relational.
A.
10
B.
8
C.
12
D.
6
Ans:
12
Explanation :
Dr Edgar F. Codd, after his extensive research on the Relational Model of database systems, came up with twelve rules of his own, which according to him, a database must obey in order to be regarded as a true relational database.
[23] In first generation of computers, they used _.
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
[24] Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
A.
hacker
B.
analyst
C.
instant messenger
D.
programmer
Ans:
hacker
Explanation :
Hacker is someone who seeks and exploits weaknesses in a computer system.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
Advanced Research Projects Agency (ARPA), was funding organization in the United States that developed one of the precursors of the Internet (ARPANET), it now stands for Address and Routing Parameter Area.
[6] Verification of a login name and password is known as:
A.
configuration
B.
accessibility
C.
authentication
D.
logging off
Ans:
authentication
Explanation :
Authentication is the process of recognizing a user's identity.
[7] What is the space left between the margin and the start of a paragraph called?
A.
Spacing
B.
Gutter
C.
Indentation
D.
Alignment
Ans:
Indentation
Explanation :
The space left between the margin and the start of a paragraph is called Indentation.
[8] We can insert a page number at:
A.
Header
B.
Footer
C.
Gutter Margin
D.
Both (1) and (2)
Ans:
Both (1) and (2)
Explanation :
Page number can be inserted in either the header or the footer of a document.
[9] Which of the following mouse can work on any surface from a granite countertop to a carpet?
A.
Mechanical mouse
B.
Optical mouse
C.
Laser mouse
D.
Blue Track mouse
Ans:
Blue Track mouse
Explanation :
BlueTrack mouse is a type of mouse that is based on the Blue Track Technology and can work on any surface from granite countertop to the carpet.
[10] Which of the following devices is mainly used to draw objects in CAD?
A.
Keyboard
B.
Printer
C.
Joystick
D.
Scanner
Ans:
Joystick
Explanation :
Joystick is used to draw objects in Computer-Aided Design (CAD).
[11]Which of the following topologies does not use switches?
A.
Bus
B.
Star
C.
Ring
D.
Mesh
Ans:
Bus
Explanation :
In the Bus topology, all the nodes and peripherals are connected to a single cable that acts as the backbone of the network. Therefore, there is no need for a hub, switch or router for connecting nodes in this topology.
[12] Which layer provides electrical and mechanical requirements to maintain a physical link between the end points?
A.
Network
B.
Physical
C.
Application
D.
Data Link
Ans:
Physical
Explanation :
The Physical layer handles voltage, electrical pulses, connectors and, switches so that data can be transmitted over transmission media.
[13] Which of the following protocols is available on the network layer of the OSI model?
A.
IPX
B.
TCP
C.
Ethernet
D.
SNMP
Ans:
IPX
Explanation :
Internetwork Packet Exchange (IPX) is a connectionless protocol on the network layer used for interconnecting networks using Novell’s Netware clients and servers. TCP and SPX (Sequenced Packet Exchange) are available on the Transport layer.
[14] Which layer of the OSI model defines the language and syntax for programs?
A.
Data link layer
B.
Presentation layer
C.
Application layer
D.
Session layer
Ans:
Application layer
Explanation :
The application layer of the OSI model provides a framework to run application programs. It defines the language and syntax used by programs to communicate with supplementary programs.
[15] Which of the following is a type of margin at the time of printing and binding printouts?
A.
Portrait
B.
Gutter
C.
A4
D.
Next Page
Ans:
Gutter
Explanation :
A gutter margin adds an extra space to the binding sides. Thus, it ensures that the text does not hide at the time of binding or folding papers.
[16] Which among the following options is the line that describes the contents of the message while sending an e-mail?
A.
BCC
B.
to
C.
subject
D.
cc
Ans:
subject
Explanation :
Subject line in short describes content of an e-mail.
[17] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[18] Which type of operation in the given options can be performed by a CD-RW?
A.
read and write information
B.
read, write and rewrite information
C.
only write information
D.
only read information
Ans:
read, write and rewrite information
Explanation :
CD-RW (Compact Disc-Rewritable) is a digital optical disc storage format. A CD-RW disc is a compact disc that can be written, read arbitrarily many times, erased, and written again.
[19] Which among the following is fastest among other systems of its generation?
A.
Mainframe
B.
Notebook
C.
PC
D.
Supercomputer
Ans:
Supercomputer
Explanation :
Supercomputers are fastest among all other types of computer in any generation.
[20] Which among the following option specifies this action: Holding the mouse button down while moving an object of text?
A.
moving
B.
dragging
C.
saving
D.
highlighting
Ans:
dragging
Explanation :
Dragging is the gesture of Holding the mouse button down while moving an object of text or image or any file or its part.
[21] Name the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
A.
BIOS
B.
VAIO
C.
I/O
D.
AVG
Ans:
BIOS
Explanation :
BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
[22] Dr. E.F. Codd represented rules that a database must obey if it has to be considered truly relational.
A.
10
B.
8
C.
12
D.
6
Ans:
12
Explanation :
Dr Edgar F. Codd, after his extensive research on the Relational Model of database systems, came up with twelve rules of his own, which according to him, a database must obey in order to be regarded as a true relational database.
[23] In first generation of computers, they used _.
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
[24] Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
A.
hacker
B.
analyst
C.
instant messenger
D.
programmer
Ans:
hacker
Explanation :
Hacker is someone who seeks and exploits weaknesses in a computer system.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
The space left between the margin and the start of a paragraph is called Indentation.
[8] We can insert a page number at:
A.
Header
B.
Footer
C.
Gutter Margin
D.
Both (1) and (2)
Ans:
Both (1) and (2)
Explanation :
Page number can be inserted in either the header or the footer of a document.
[9] Which of the following mouse can work on any surface from a granite countertop to a carpet?
A.
Mechanical mouse
B.
Optical mouse
C.
Laser mouse
D.
Blue Track mouse
Ans:
Blue Track mouse
Explanation :
BlueTrack mouse is a type of mouse that is based on the Blue Track Technology and can work on any surface from granite countertop to the carpet.
[10] Which of the following devices is mainly used to draw objects in CAD?
A.
Keyboard
B.
Printer
C.
Joystick
D.
Scanner
Ans:
Joystick
Explanation :
Joystick is used to draw objects in Computer-Aided Design (CAD).
[11]Which of the following topologies does not use switches?
A.
Bus
B.
Star
C.
Ring
D.
Mesh
Ans:
Bus
Explanation :
In the Bus topology, all the nodes and peripherals are connected to a single cable that acts as the backbone of the network. Therefore, there is no need for a hub, switch or router for connecting nodes in this topology.
[12] Which layer provides electrical and mechanical requirements to maintain a physical link between the end points?
A.
Network
B.
Physical
C.
Application
D.
Data Link
Ans:
Physical
Explanation :
The Physical layer handles voltage, electrical pulses, connectors and, switches so that data can be transmitted over transmission media.
[13] Which of the following protocols is available on the network layer of the OSI model?
A.
IPX
B.
TCP
C.
Ethernet
D.
SNMP
Ans:
IPX
Explanation :
Internetwork Packet Exchange (IPX) is a connectionless protocol on the network layer used for interconnecting networks using Novell’s Netware clients and servers. TCP and SPX (Sequenced Packet Exchange) are available on the Transport layer.
[14] Which layer of the OSI model defines the language and syntax for programs?
A.
Data link layer
B.
Presentation layer
C.
Application layer
D.
Session layer
Ans:
Application layer
Explanation :
The application layer of the OSI model provides a framework to run application programs. It defines the language and syntax used by programs to communicate with supplementary programs.
[15] Which of the following is a type of margin at the time of printing and binding printouts?
A.
Portrait
B.
Gutter
C.
A4
D.
Next Page
Ans:
Gutter
Explanation :
A gutter margin adds an extra space to the binding sides. Thus, it ensures that the text does not hide at the time of binding or folding papers.
[16] Which among the following options is the line that describes the contents of the message while sending an e-mail?
A.
BCC
B.
to
C.
subject
D.
cc
Ans:
subject
Explanation :
Subject line in short describes content of an e-mail.
[17] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[18] Which type of operation in the given options can be performed by a CD-RW?
A.
read and write information
B.
read, write and rewrite information
C.
only write information
D.
only read information
Ans:
read, write and rewrite information
Explanation :
CD-RW (Compact Disc-Rewritable) is a digital optical disc storage format. A CD-RW disc is a compact disc that can be written, read arbitrarily many times, erased, and written again.
[19] Which among the following is fastest among other systems of its generation?
A.
Mainframe
B.
Notebook
C.
PC
D.
Supercomputer
Ans:
Supercomputer
Explanation :
Supercomputers are fastest among all other types of computer in any generation.
[20] Which among the following option specifies this action: Holding the mouse button down while moving an object of text?
A.
moving
B.
dragging
C.
saving
D.
highlighting
Ans:
dragging
Explanation :
Dragging is the gesture of Holding the mouse button down while moving an object of text or image or any file or its part.
[21] Name the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
A.
BIOS
B.
VAIO
C.
I/O
D.
AVG
Ans:
BIOS
Explanation :
BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
[22] Dr. E.F. Codd represented rules that a database must obey if it has to be considered truly relational.
A.
10
B.
8
C.
12
D.
6
Ans:
12
Explanation :
Dr Edgar F. Codd, after his extensive research on the Relational Model of database systems, came up with twelve rules of his own, which according to him, a database must obey in order to be regarded as a true relational database.
[23] In first generation of computers, they used _.
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
[24] Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
A.
hacker
B.
analyst
C.
instant messenger
D.
programmer
Ans:
hacker
Explanation :
Hacker is someone who seeks and exploits weaknesses in a computer system.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
BlueTrack mouse is a type of mouse that is based on the Blue Track Technology and can work on any surface from granite countertop to the carpet.
[10] Which of the following devices is mainly used to draw objects in CAD?
A.
Keyboard
B.
Printer
C.
Joystick
D.
Scanner
Ans:
Joystick
Explanation :
Joystick is used to draw objects in Computer-Aided Design (CAD).
[11]Which of the following topologies does not use switches?
A.
Bus
B.
Star
C.
Ring
D.
Mesh
Ans:
Bus
Explanation :
In the Bus topology, all the nodes and peripherals are connected to a single cable that acts as the backbone of the network. Therefore, there is no need for a hub, switch or router for connecting nodes in this topology.
[12] Which layer provides electrical and mechanical requirements to maintain a physical link between the end points?
A.
Network
B.
Physical
C.
Application
D.
Data Link
Ans:
Physical
Explanation :
The Physical layer handles voltage, electrical pulses, connectors and, switches so that data can be transmitted over transmission media.
[13] Which of the following protocols is available on the network layer of the OSI model?
A.
IPX
B.
TCP
C.
Ethernet
D.
SNMP
Ans:
IPX
Explanation :
Internetwork Packet Exchange (IPX) is a connectionless protocol on the network layer used for interconnecting networks using Novell’s Netware clients and servers. TCP and SPX (Sequenced Packet Exchange) are available on the Transport layer.
[14] Which layer of the OSI model defines the language and syntax for programs?
A.
Data link layer
B.
Presentation layer
C.
Application layer
D.
Session layer
Ans:
Application layer
Explanation :
The application layer of the OSI model provides a framework to run application programs. It defines the language and syntax used by programs to communicate with supplementary programs.
[15] Which of the following is a type of margin at the time of printing and binding printouts?
A.
Portrait
B.
Gutter
C.
A4
D.
Next Page
Ans:
Gutter
Explanation :
A gutter margin adds an extra space to the binding sides. Thus, it ensures that the text does not hide at the time of binding or folding papers.
[16] Which among the following options is the line that describes the contents of the message while sending an e-mail?
A.
BCC
B.
to
C.
subject
D.
cc
Ans:
subject
Explanation :
Subject line in short describes content of an e-mail.
[17] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[18] Which type of operation in the given options can be performed by a CD-RW?
A.
read and write information
B.
read, write and rewrite information
C.
only write information
D.
only read information
Ans:
read, write and rewrite information
Explanation :
CD-RW (Compact Disc-Rewritable) is a digital optical disc storage format. A CD-RW disc is a compact disc that can be written, read arbitrarily many times, erased, and written again.
[19] Which among the following is fastest among other systems of its generation?
A.
Mainframe
B.
Notebook
C.
PC
D.
Supercomputer
Ans:
Supercomputer
Explanation :
Supercomputers are fastest among all other types of computer in any generation.
[20] Which among the following option specifies this action: Holding the mouse button down while moving an object of text?
A.
moving
B.
dragging
C.
saving
D.
highlighting
Ans:
dragging
Explanation :
Dragging is the gesture of Holding the mouse button down while moving an object of text or image or any file or its part.
[21] Name the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
A.
BIOS
B.
VAIO
C.
I/O
D.
AVG
Ans:
BIOS
Explanation :
BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
[22] Dr. E.F. Codd represented rules that a database must obey if it has to be considered truly relational.
A.
10
B.
8
C.
12
D.
6
Ans:
12
Explanation :
Dr Edgar F. Codd, after his extensive research on the Relational Model of database systems, came up with twelve rules of his own, which according to him, a database must obey in order to be regarded as a true relational database.
[23] In first generation of computers, they used _.
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
[24] Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
A.
hacker
B.
analyst
C.
instant messenger
D.
programmer
Ans:
hacker
Explanation :
Hacker is someone who seeks and exploits weaknesses in a computer system.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
In the Bus topology, all the nodes and peripherals are connected to a single cable that acts as the backbone of the network. Therefore, there is no need for a hub, switch or router for connecting nodes in this topology.
[12] Which layer provides electrical and mechanical requirements to maintain a physical link between the end points?
A.
Network
B.
Physical
C.
Application
D.
Data Link
Ans:
Physical
Explanation :
The Physical layer handles voltage, electrical pulses, connectors and, switches so that data can be transmitted over transmission media.
[13] Which of the following protocols is available on the network layer of the OSI model?
A.
IPX
B.
TCP
C.
Ethernet
D.
SNMP
Ans:
IPX
Explanation :
Internetwork Packet Exchange (IPX) is a connectionless protocol on the network layer used for interconnecting networks using Novell’s Netware clients and servers. TCP and SPX (Sequenced Packet Exchange) are available on the Transport layer.
[14] Which layer of the OSI model defines the language and syntax for programs?
A.
Data link layer
B.
Presentation layer
C.
Application layer
D.
Session layer
Ans:
Application layer
Explanation :
The application layer of the OSI model provides a framework to run application programs. It defines the language and syntax used by programs to communicate with supplementary programs.
[15] Which of the following is a type of margin at the time of printing and binding printouts?
A.
Portrait
B.
Gutter
C.
A4
D.
Next Page
Ans:
Gutter
Explanation :
A gutter margin adds an extra space to the binding sides. Thus, it ensures that the text does not hide at the time of binding or folding papers.
[16] Which among the following options is the line that describes the contents of the message while sending an e-mail?
A.
BCC
B.
to
C.
subject
D.
cc
Ans:
subject
Explanation :
Subject line in short describes content of an e-mail.
[17] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[18] Which type of operation in the given options can be performed by a CD-RW?
A.
read and write information
B.
read, write and rewrite information
C.
only write information
D.
only read information
Ans:
read, write and rewrite information
Explanation :
CD-RW (Compact Disc-Rewritable) is a digital optical disc storage format. A CD-RW disc is a compact disc that can be written, read arbitrarily many times, erased, and written again.
[19] Which among the following is fastest among other systems of its generation?
A.
Mainframe
B.
Notebook
C.
PC
D.
Supercomputer
Ans:
Supercomputer
Explanation :
Supercomputers are fastest among all other types of computer in any generation.
[20] Which among the following option specifies this action: Holding the mouse button down while moving an object of text?
A.
moving
B.
dragging
C.
saving
D.
highlighting
Ans:
dragging
Explanation :
Dragging is the gesture of Holding the mouse button down while moving an object of text or image or any file or its part.
[21] Name the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
A.
BIOS
B.
VAIO
C.
I/O
D.
AVG
Ans:
BIOS
Explanation :
BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
[22] Dr. E.F. Codd represented rules that a database must obey if it has to be considered truly relational.
A.
10
B.
8
C.
12
D.
6
Ans:
12
Explanation :
Dr Edgar F. Codd, after his extensive research on the Relational Model of database systems, came up with twelve rules of his own, which according to him, a database must obey in order to be regarded as a true relational database.
[23] In first generation of computers, they used _.
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
[24] Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
A.
hacker
B.
analyst
C.
instant messenger
D.
programmer
Ans:
hacker
Explanation :
Hacker is someone who seeks and exploits weaknesses in a computer system.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
Internetwork Packet Exchange (IPX) is a connectionless protocol on the network layer used for interconnecting networks using Novell’s Netware clients and servers. TCP and SPX (Sequenced Packet Exchange) are available on the Transport layer.
[14] Which layer of the OSI model defines the language and syntax for programs?
A.
Data link layer
B.
Presentation layer
C.
Application layer
D.
Session layer
Ans:
Application layer
Explanation :
The application layer of the OSI model provides a framework to run application programs. It defines the language and syntax used by programs to communicate with supplementary programs.
[15] Which of the following is a type of margin at the time of printing and binding printouts?
A.
Portrait
B.
Gutter
C.
A4
D.
Next Page
Ans:
Gutter
Explanation :
A gutter margin adds an extra space to the binding sides. Thus, it ensures that the text does not hide at the time of binding or folding papers.
[16] Which among the following options is the line that describes the contents of the message while sending an e-mail?
A.
BCC
B.
to
C.
subject
D.
cc
Ans:
subject
Explanation :
Subject line in short describes content of an e-mail.
[17] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[18] Which type of operation in the given options can be performed by a CD-RW?
A.
read and write information
B.
read, write and rewrite information
C.
only write information
D.
only read information
Ans:
read, write and rewrite information
Explanation :
CD-RW (Compact Disc-Rewritable) is a digital optical disc storage format. A CD-RW disc is a compact disc that can be written, read arbitrarily many times, erased, and written again.
[19] Which among the following is fastest among other systems of its generation?
A.
Mainframe
B.
Notebook
C.
PC
D.
Supercomputer
Ans:
Supercomputer
Explanation :
Supercomputers are fastest among all other types of computer in any generation.
[20] Which among the following option specifies this action: Holding the mouse button down while moving an object of text?
A.
moving
B.
dragging
C.
saving
D.
highlighting
Ans:
dragging
Explanation :
Dragging is the gesture of Holding the mouse button down while moving an object of text or image or any file or its part.
[21] Name the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
A.
BIOS
B.
VAIO
C.
I/O
D.
AVG
Ans:
BIOS
Explanation :
BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
[22] Dr. E.F. Codd represented rules that a database must obey if it has to be considered truly relational.
A.
10
B.
8
C.
12
D.
6
Ans:
12
Explanation :
Dr Edgar F. Codd, after his extensive research on the Relational Model of database systems, came up with twelve rules of his own, which according to him, a database must obey in order to be regarded as a true relational database.
[23] In first generation of computers, they used _.
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
[24] Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
A.
hacker
B.
analyst
C.
instant messenger
D.
programmer
Ans:
hacker
Explanation :
Hacker is someone who seeks and exploits weaknesses in a computer system.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
A gutter margin adds an extra space to the binding sides. Thus, it ensures that the text does not hide at the time of binding or folding papers.
[16] Which among the following options is the line that describes the contents of the message while sending an e-mail?
A.
BCC
B.
to
C.
subject
D.
cc
Ans:
subject
Explanation :
Subject line in short describes content of an e-mail.
[17] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A.
program thievery
B.
data snatching
C.
software piracy
D.
program looting
Ans:
software piracy
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[18] Which type of operation in the given options can be performed by a CD-RW?
A.
read and write information
B.
read, write and rewrite information
C.
only write information
D.
only read information
Ans:
read, write and rewrite information
Explanation :
CD-RW (Compact Disc-Rewritable) is a digital optical disc storage format. A CD-RW disc is a compact disc that can be written, read arbitrarily many times, erased, and written again.
[19] Which among the following is fastest among other systems of its generation?
A.
Mainframe
B.
Notebook
C.
PC
D.
Supercomputer
Ans:
Supercomputer
Explanation :
Supercomputers are fastest among all other types of computer in any generation.
[20] Which among the following option specifies this action: Holding the mouse button down while moving an object of text?
A.
moving
B.
dragging
C.
saving
D.
highlighting
Ans:
dragging
Explanation :
Dragging is the gesture of Holding the mouse button down while moving an object of text or image or any file or its part.
[21] Name the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
A.
BIOS
B.
VAIO
C.
I/O
D.
AVG
Ans:
BIOS
Explanation :
BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
[22] Dr. E.F. Codd represented rules that a database must obey if it has to be considered truly relational.
A.
10
B.
8
C.
12
D.
6
Ans:
12
Explanation :
Dr Edgar F. Codd, after his extensive research on the Relational Model of database systems, came up with twelve rules of his own, which according to him, a database must obey in order to be regarded as a true relational database.
[23] In first generation of computers, they used _.
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
[24] Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
A.
hacker
B.
analyst
C.
instant messenger
D.
programmer
Ans:
hacker
Explanation :
Hacker is someone who seeks and exploits weaknesses in a computer system.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
Software piracy is the illegal copying, distribution, or use of software.
[18] Which type of operation in the given options can be performed by a CD-RW?
A.
read and write information
B.
read, write and rewrite information
C.
only write information
D.
only read information
Ans:
read, write and rewrite information
Explanation :
CD-RW (Compact Disc-Rewritable) is a digital optical disc storage format. A CD-RW disc is a compact disc that can be written, read arbitrarily many times, erased, and written again.
[19] Which among the following is fastest among other systems of its generation?
A.
Mainframe
B.
Notebook
C.
PC
D.
Supercomputer
Ans:
Supercomputer
Explanation :
Supercomputers are fastest among all other types of computer in any generation.
[20] Which among the following option specifies this action: Holding the mouse button down while moving an object of text?
A.
moving
B.
dragging
C.
saving
D.
highlighting
Ans:
dragging
Explanation :
Dragging is the gesture of Holding the mouse button down while moving an object of text or image or any file or its part.
[21] Name the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
A.
BIOS
B.
VAIO
C.
I/O
D.
AVG
Ans:
BIOS
Explanation :
BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
[22] Dr. E.F. Codd represented rules that a database must obey if it has to be considered truly relational.
A.
10
B.
8
C.
12
D.
6
Ans:
12
Explanation :
Dr Edgar F. Codd, after his extensive research on the Relational Model of database systems, came up with twelve rules of his own, which according to him, a database must obey in order to be regarded as a true relational database.
[23] In first generation of computers, they used _.
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
[24] Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
A.
hacker
B.
analyst
C.
instant messenger
D.
programmer
Ans:
hacker
Explanation :
Hacker is someone who seeks and exploits weaknesses in a computer system.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
Supercomputers are fastest among all other types of computer in any generation.
[20] Which among the following option specifies this action: Holding the mouse button down while moving an object of text?
A.
moving
B.
dragging
C.
saving
D.
highlighting
Ans:
dragging
Explanation :
Dragging is the gesture of Holding the mouse button down while moving an object of text or image or any file or its part.
[21] Name the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
A.
BIOS
B.
VAIO
C.
I/O
D.
AVG
Ans:
BIOS
Explanation :
BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
[22] Dr. E.F. Codd represented rules that a database must obey if it has to be considered truly relational.
A.
10
B.
8
C.
12
D.
6
Ans:
12
Explanation :
Dr Edgar F. Codd, after his extensive research on the Relational Model of database systems, came up with twelve rules of his own, which according to him, a database must obey in order to be regarded as a true relational database.
[23] In first generation of computers, they used _.
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
[24] Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
A.
hacker
B.
analyst
C.
instant messenger
D.
programmer
Ans:
hacker
Explanation :
Hacker is someone who seeks and exploits weaknesses in a computer system.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
[22] Dr. E.F. Codd represented rules that a database must obey if it has to be considered truly relational.
A.
10
B.
8
C.
12
D.
6
Ans:
12
Explanation :
Dr Edgar F. Codd, after his extensive research on the Relational Model of database systems, came up with twelve rules of his own, which according to him, a database must obey in order to be regarded as a true relational database.
[23] In first generation of computers, they used _.
A.
batch processing
B.
multithreading
C.
multiprogramming
D.
networking
Ans:
batch processing
Explanation :
In First Generation mainly batch processing operating system were used.
[24] Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
A.
hacker
B.
analyst
C.
instant messenger
D.
programmer
Ans:
hacker
Explanation :
Hacker is someone who seeks and exploits weaknesses in a computer system.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
In First Generation mainly batch processing operating system were used.
[24] Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
A.
hacker
B.
analyst
C.
instant messenger
D.
programmer
Ans:
hacker
Explanation :
Hacker is someone who seeks and exploits weaknesses in a computer system.
[25] Which of the following option may be used to change page-size and margins?
A.
Page Layout
B.
View
C.
Tools
D.
Data
Ans:
Page Layout
Explanation :
Page Layout is used may be used to change page-size and margins.
Explanation :
Page Layout is used may be used to change page-size and margins.
