Computer Knowledge 2016 For Banking

Download as pdf or txt
Download as pdf or txt
You are on page 1of 52

COMPUTER KNOWLEDGE

MCQ
1.

2.

3.

Which is not an operating system?


(1) MS-DOS
(2) Windows 98
(4) Windows 95
(5) None of these3

(3) Windows 2000

A function inside another function in Excel is called_________.


(1) Double function
(2) Nested function3
(4) Round function
(5) Text function

(3) Sum function

A website is__________.
(1) An author of a Web page
(3) A collection of contributors

(2) The location from which a Web page originates


(4) A collection of related Web pages3(5) None of these

4.

WAN is a network covering a broad area using leased telecommunication lines. What does the
acronym WAN stand for?
(1) Wider Area Network
(2) Wide Area Network3
(3) Wild Area Network
(4) Wide Area Networking
(5) Widest Area Network

5.

The process of writing computer instructions in a programming language is known as________.


(1) Testing
(2) Folder
(3) File
(4) Coding3
(5) Processing

6.

What is a portion of memory that serves as a temporary repository for data as it waits for a given
action?
(1) Processor
(2) Memory pool (3) Processor pool (4) Data pool
(5) Cache3

7.

VIRUS stands for_______.


(1) Virus Information Recourse under Siege
(2) Vital Information Resource Under Seizure
(3) Vital Information Recourse Under System
(4) Vital Information Resource Under Siege3
(5) Vital Information Reason Under Siege

8.

ALU is part of CPU in many computers. What does the acronym ALC stand for?
(1) Algorithm Logic Unit
(2) Arithmetic Logical Unit
(3) Auxiliary Logic Unit
(4) Algorithmic Logical Unit
(5) Arithmetic Logic Unit3

9.

BIT stands for________.


(1) Built In tasks
(4) Before Interpreting Task

(2) Before Instructed Task


(5) Before Initial Task

Java is a__________.
(1) Hardware Digit
(4) low-level language

(2) High-level language3


(3) complier
(5) programming mid-level language

10.

(3) Binary Digit3

11.

The right click options of the mouse is NOT used in which of the following?
(2) To rename file
(1) To copy selected text into the clipboard
(3) To cut the selected text
(4) To access properties of an object (5) None of these3

12.

___________is the process of dividing the disk into tracks and sectors?
(1) Tracking
(2) Formatting3 (3) Crashing
(4) Allotting

CSB, Ch-17, Ph: 044-24333346

(5) None of these.

Ck/Page-1

13.

A Place in a computer system where data and program are temporarily stored is called?
(1) Paste
(2) Open
(3) Memory3
(4) Pocket
(5) None of these

14.

Correcting errors in a program is referred to as?


(1) Debugging3(2) Bugging
(3) Rectifying

(4) Modifying

(5) None of these

15.

Graphic diagrams are used to represent multiple perspectives of a system which includes
(1) Use-case, class and state diagrams.3
(2) State, interaction and derivative diagrams.
(3) Interaction, relationship and class diagrams.
(4) Deployment, relationship and use-case diagrams.
(5) None of these.

16.

Which is the best view for representing your thoughts as presentation on a computer?
(1) Outline view3
(2) Notes page view
(3) Slide sorter view
(4) Slide view
(5) None of these

17.

What does SMPS stands for?


(1) Switched mode power supply3 (2) Single mode power supply
(3) Simple mode power supply
(4) Synchronous mode power supply (5) None of these

18.

RSA is
(1) Symmetric cryptosystem
(3) Asymmetric cryptosystem

(2) Digital signature3


(4) Block Cypher

(5) None of these

19.

__________hardware technology was used by fifth generation computers?


(1) Transistors (2) Valves
(3) ICS
(4) ULSI3
(5) VLSI

20.

For each instruction in program memory the CPU goes through a(1) Decode-fetch-execute sequence
(2) Fetch-decode-execute sequence3
(3) Fetch-execute-decode sequence
(4) Execute-store-decode sequence
(5) Fetch-store-decode sequence

21.

What is the blinking symbol on the computer called as?


(1) Palm
(2) Mouse
(3) Hand
(4) Logo

22.

23.

How does the speed was measured in second generation computers?


(1) Micro seconds3
(2) Nano seconds
(4) Pico seconds
(5) None of these
Which key used to move the line at the top of the text?
(1) Home3
(2) Page up
(3) Tab
(4) End

(5) Cursor3

(3) Milli seconds

(5) Enter

24.

Among the following layers, where does the translation from one character code to other occur?
(1) Transport
(2) Presentation3 (3) Physical
(4) Application
(5) Session

25.

The set of protocols and a layer is called?


(1) Layered architecture
(2) Layered network
(4) Network Architecture3
(5) None of these

CSB, Ch-17, Ph: 044-24333346

(3) Internet Work

Ck/Page-2

26.

What is the name of the device used to read information encoded into a small plastic card?
(1) Punched card
(2) Light pen
(3) Badge reader3
(4) Magnetic disk
(5) Magnetic tape

27.

Flash is a (n)?
(1) Processor

(2) EEPROM3

(3) Game

(4) Hardware

(5) None of these

28.

Maximum number of characters that can be typed in a single cell in Excel sheet?
(1) 32767
(2) 75565
(3) 655353
(4) 256
(5) None of These

29.

The red wavy line in MS Word document indicates?


(1) Grammar errors
(2) Spelling errors3
(4) All the above
(5) None of these

(3) Address block

30.

The idea of machine-independence programming language, which led to the development of


COBI, was popularized by?
(1) Steve Jobs (2) Dennis Ritchie (3) Steve Hopper (4) Grace Hopper3
(5) None of these

31.

The right click option of the mouse is NOT used in which of the following?
(1) To copy selected text into the clipboard
(2) To rename the file
(3) To cut the selected text
(4) To access properties of an object
(5) None of these3

32.

_________is the process of dividing the disk into tracks and sectors?
(1) Tracking
(2) Formatting3 (3) Crashing
(4) Allotting

(5) None of these

33.

A place in the computer system where data and programs are temporarily stored is called?
(1) Paste
(2) open
(3) Memory3
(4) pocket
(5) None of these

34.

Correcting errors in a program is referred to as?


(1) Debugging3 (2) Bugging
(3) Rectifying

(4) Modifying

(5) None of these

35.

Graphical Diagrams are used to represent multiple perspectives of a system which include
(1) Use-case, class and state diagrams.3
(2) State, interaction and derivation diagrams
(3) Interaction, relationship and class diagrams
(4) Deployment, relationship and use-case diagrams
(5) None of these

36.

Which of the following is the best view for representing your thoughts as a presentation on a
computer?
(1) Outline view3
(2) Notes page view
(3) Slider sorter view
(4) Slider view
(5) None of these

37.

SMPS stands for?


(1) Switch Mode Power Supply3
(2) Single Mode Power Supply
(3) Simple Mode Power Supply
(4) Synchronous Mode Power Supply
(5) None of these

CSB, Ch-17, Ph: 044-24333346

Ck/Page-3

38.

RSA is a?
(1) Symmetric Cryptosystem
(3) Asymmetric Cryptosystem

(2) Digital Signature3


(4) Block Cypher

(5) None of These

39.

________ hardware technology was used by fifth-generation computers.


(1) Transistors (2) Valves
(3) ICS
(4) ULSI3
(5) VLSI

40.

For each instruction in program memory the CPU goes through a___?
(1) Decode-fetch-execute sequence
(2) Fetch-decode-execute sequence3
(3) Fetch-execute-decode sequence
(4) Execute-store-decode sequence
(5) Fetch-store-decode sequence

41.

A proxy server is used for which of the following?


(1) To provide security against unauthorized users3
(2) To process client requests for web pages
(3) To process client requests for database access
(4) To provide TCP/IP
(5) None of these

42.

A repair for a known software bug, usually available at no charge on the internet, is called as?
(1) Version
(2) Patch3
(3) Tutorials
(4) FAQ
(5) None of these

43.

A modem Performs?
(1) Modulation
(4) All of these3

(2) Demodulation
(5) None of these

(3) Data Compression

44.

Which access method is used for obtained a record from a cassette tape?
(1) Direct
(2) Sequential3 (3) Random
(4) All of these
(5) None of these

45.

A type of failure that occurs in an Oracle program when there is a logical failure in handling of a
statement is called?
(1) Instance failure
(2) Media failure
(3) Process failure
(4) Statement failure3
(5) User error

46.

What is the size of a floppy?


(1) 3.5 inches
(2) 5.25 inches

47.

(3) 8.0 inches

(4) All the above3 (5) None of these

What is the shortcut to format a number in date format?


(1) Ctrl+Shift+@ (2) Ctrl+Shift+#3 (3) Ctrl+Shift+% (4) Ctrl+Shift+$

(5) Ctrl+Shift+*

48.

Among the following device which uses an embossed steel band to form the letters printed on the
paper?
(1) Laser Printer
(2) Dot-matrix Printer
(3) Daisy wheel Printer
(4) Band Printer3
(5) Ink-jet Printer

49.

OR, XOR and AND are the functions of the?


(1) Memory
(2) CU
(3) Register

50.

(4) ALU3

Internet provides?
(1) Online communication
(2) Customer support services
(4) Online journals and magazine (5) All of the above3

CSB, Ch-17, Ph: 044-24333346

(5) Processor

(3) Software sharing

Ck/Page-4

51.

52.

53.

54.

How many bytes are equal to one kilobyte?


(1) 1000
(2) 1035
(3) 100

(4) 1008

Which is the example of Central Processing Unit?


(1) Peripheral device
(2) An output unit
(4) a program
(5) hardware3
IT stands for?
(1) Information Technology3
(3) Intelligent Technology

(2) Integrated Technology


(4) Interesting Technology

Which of the following is similar to sending an e-mail?


(1) Picturing an event
(2) Narrating a story
(4) Creating a drawing
(5) None of these

(5) 10243

(3) software

(5) None of these

(3) Writing a letter3

55.

Which command is used to save an existing file with a new name or to a new location?
(1) Save
(2) Save and Replace
(3) Save As3
(4) New File
(5) None of these

56.

What type of software manages the computers processes, functioning as an interface, connecting
user, the application software, and the hardware?
(1) Integrated software
(2) Utility program
(3) Translated program
(4) Operating system3
(5) None of these

57.

What type of the program that makes the computer easier to use?
(1) Operating system
(2) application
(4) network
(5) None of these

(3) utility3

58.

What is name of the internet connections which done using Phone line and a modem?
(1) digital
(2) dial-up3
(3) broadband
(4) dish
(5) None of these

59.

Which is the fastest data transmission speed given below?


(1) bandwidth (2) bps
(3) gbps3
(4) kbps

(5) mbps

60.

Which is the major feature of the World Wide Web which makes it simple to
Learn and use ?
(1) Database interface3
(2) Graphical text interface
(3) Graphical user interface
(4) Point-to-point protocol
(5) None of these

61.

Where taskbar is located?


(1) On the Start menu
(3) On the quick Launch toolbar

62.

(2) At the bottom of the screen3


(4) At the top of the screen

What is the another word of software?


(1) Input
(2) output
(3) program3

63. Computer printer is the?


(1) Input
(2) Input/Output (3) software
64.

What is the biggest number in 8 bits?


(1) 256
(2) 128
(3) 1000

CSB, Ch-17, Ph: 044-24333346

(5) None of these

(4) system

(5) None of these

(4) Storage

(5) Output3

(4) 2553

(5) 1&24

Ck/Page-5

65.

Two are more computers connected to each other for the purpose of sharing information forms
a?
(1) network3 (2) router
(3) server
(4) tunnel
(5) pipeline

66.

A computer checks the_____ of user names and passwords for a match before granting access?
(1) website
(2) network
(3) backup file
(4) database3
(5) None of these

67.

Text in a column is generally aligned?


(1) justified3
(2) right
(3) center

(4) left

(5) None of these

68.

The background of any Word document?


(1) Is always white color
(2) Is the color you preset under the Options menu
(3) Is always the same for the entire document
(4) Can have any color you choose3
(5) None of these

69.

What is example of connectivity?


(1) Internet3
(2) Floppy disk
(3) Power cord

(4) Data

(5) None of these

Process of finding errors in software code is?


(1) Compiling (2) Testing
(3) Running

(4) Debugging3

(5) None of these

70.

71.

72.

What is Outlook Express?


(1) It is a E-Mail Client3
(4) All of these

(2) It is a Scheduler
(5) None of these

What is the shortcut key to open new page in MS-Word?


(1) Down Cursor Key
(2) Enter Key
(4) Ctrl+Enter3
(5) Shift+Ctrl+Enter

(3) It is an Address Book

(3) Shift+Enter

73.

The ability of an OS to run more than one application at a same time is called as?
(1) Multitasking3
(2) Object-Oriented Programming (3) Multi-user computing
(4) Time-sharing
(5) None of these

74.

What is the name of the permanent instructions that a computer uses when it turned on and
which cannot be changed by other instructions?
(1) ROM3
(2) RAM
(3) ALU
(4) REM
(5) None of these

75.

Device drivers are?


(1) Tiny power cords for external storage devices
(2) Experts who know to maximize the performance of devices
(3) Small, special-purpose programs3
(4) The innermost part of the operating systems
(5) Substitutes for operating systems

76.

What is the name of the collection of programs that controls how your computer system runs and
processes information?
(1) Operating Systems3
(2) Component
(3) Office
(4) Compiler
(5) Interpreter

77.

What is the name of the device operating at the physical layer?


(1) Bridge
(2) Router
(3) Repeater3
(4) All of the above

CSB, Ch-17, Ph: 044-24333346

(5) None of these


Ck/Page-6

78.

79.

For separating channels in FDM, it is necessary to use?


(1) Time slots
(2) Bandpass filters3
(4) All the above
(5) None of these
Name the element in Word document that can be displayed in color?
(1) Only Graphics
(2) Only Text
(4) All elements, but if you have a color printer

(3) Differentiation

(3) All Elements3


(5) None of these

80.

A Complete electronic circuit with transistors and other electronic components on a small silicon
chip is called a(n)?
(1) Workstation
(2) CPU
(3) Magnetic Disk
(4) Integrated circuit3
(5) None of these

81.

What will happen when a text was selected and copied?


(1) Text would copied from the documents and placed in the clipboard3
(2) Text would be removed from the document and placed in the clipboard
(3) Text from the clipboard would be placed in the documents at the place where the cursor is
blinking
(4) Only (2) and (3)
(5) None of these

82.

What is the name of the blinking point that shows your position in the text?
(1) Blinker
(2) Cursor3
(3) Causer
(4) Pointer
(5) Mouse

83.

What is the common name for the physical components that make up your computer?
(1) Operating System
(2) Software
(3) Hardware3
(4) Web Browsers
(5) Mother Components

84.

Which of the below key is used in combination with another key to perform a specific task?
(1) Function
(2) Space bar
(3) Arrow
(4) Control3
(5) Num Lock

85.

Which type of memory holds the program to start up the computer?


(1) ROM3
(2) RAM
(3) Cache
(4) Static

86.

87.

88.

89.

90.

91.

What is the name of the program that used to view web pages?
(1) Word Processor
(2) Spreadsheet
(4) Browser3
(5) Database

(5) Dynamic

(3) Protocol

Un solicited commercial email is commonly known as?


(1) Spam3
(2) Junk
(3) Hoaxes
(4) Hypertext

(5) Archived

________ is processed by the computer into information?


(1) Numbers
(2) Processor
(3) Input
(4) Data3

(5) Output

Which of the following is an operation that cannot be carried out on objects in graphic program?
(1) Spell Check3
(2) Change Size
(3) Rotate
(4) Change Colour
(5) None of these
What is the name of the hardware device that converts data into useful information?
(1) Protector
(2) Output Device (3) Input Device (4) Programme
(5) Processor3
System software is the set of programs that enables your computers hardware devices and which
software to work together?
(1) Management
(2) processing
(3) Utility
(4) Application3
(5) None of these

CSB, Ch-17, Ph: 044-24333346

Ck/Page-7

92.

______ are specially designed computer chips that reside inside other devices, such as your car or
your electronic thermostat?
(1) Servers
(2) Embedded computers3
(3) Robotic computer
(4) Mainframes
(5) None of these

93.

Which layer is used in the following applications SMPT, FTP and DNS?
(1) Data link
(2) Network
(3) transport
(4) Application3 (5) None of these

94.

According to which of the following, in a database, should information be organized and


accessed?
(1) Physical position
(2) Logical structure3
(3) Data dictionary
(4) Physical structure
(5) None of these

95.

What is WORM?
(1) Wanted One Read Memory
(3) Write Original Read Many

(2) Write Once Read Many3


(4) All the above

(5) None of these

96.

Which of the following is a separate software layer that acts as glue between the client and the
server parts of an application and provides a programming abstraction?
(1) Freeware
(2) Firmware
(3) Shareware
(4) User-supported software
(5) Middleware3

97.

Which of the following is important for a computer?


(1) Chip
(2) Data
(3) Mouse
(4) Processor3

98.

99.

Disk can be used to store?


(1) Random files
(4) Horizontal files

(2) Sequential files


(5) None of these

(5) None of these

(3) Both 1) and 2)3

Which generation computer has the speed was measured in nanoseconds?


(1) First
(2) Second
(3) Third3
(4) Fourth
(5) None of these

100. A derived class may also be called as?


(1) Sub-class3 (2) Super class
(3) Parent class

(4) Deprived class (5) None of these

101. What is the capacity of program counter?


(1) 8 bits
(2) 14 bits
(3) 16 bits3

(4) 12 bits

(5) 32 bits

102. The process of transferring of files from your computer to the computer on the internet is called?
(1) Downloading
(2) Uploading3
(3) FTP
(4) JPEG
(5) downsizing
103. Timing and control unit is a part of an?
(1) ALU
(2) Processor3
(3) Memory

(4) CMOS

(5) BIOS

104. Which is the common name of chip?


(1) transistor
(2) resistor
(3) integrated circuit3
(4) semiconductor
(5) None of these
105. Which is developed specifically for a distinct industry?
(1) Personal productivity
(2) Application software
(3) Decision support system
(4) Vertical market software3

CSB, Ch-17, Ph: 044-24333346

(5) System software

Ck/Page-8

106. Which of the following services is not provided by internet service provider?
(1) Internet transit
(2) Domain name registration
(3) Hosting
(4) Dial-up access
(5) None of these3
107. Which language is used to write a source program?
(1) High-level3 (2) Low-level
(3) binary
(4) All the above

(5) None of these

108. The standard USB 2.0 Device transfer rate is?


(1) 100 M bit/s (2) 250 M bit/s
(3) 480 M bit/s3 (4) 500 M bit/s

(5) 1 G bit/s

109. The control part of a disk is known as?


(1) surface
(2) hub3
(3) cylinder

(5) None of these

(4) cluster

110. Which of the following languages is used for process control?


(1) ADA3
(2) COBO
(3) BASIC
(4) PASCAL

(5) LISP

111. Computer Process the data into information by working with_____?


(1) Multimedia (2) Characters
(3) Words
(4) Numbers3

(5) None of these

112. What is the name of the memory that was programmed during the manufacturing?
(1) EEPROM
(2) ROM3
(3) PROM
(4) RAM
(5) None of these
113. The Output is?
(1) What the processor takes from the user
(2) What the processor gets from the user
(3) What the user gives to the processor
(4) What the processor gives to the user3
(5) None of these
114. An error is also called as?
(1) bug3
(2) icon

(3) cursor

(4) debug

(5) None of these

115. Processing of two or more programs simultaneously by multiple processors is called as?
(1) Multitasking
(2) Multi gaming
(3) Multiprogramming
(4) Multiprocessing3
(5) None of these
116. What is the device the used to communicate with computer?
(1) Input device3
(2) Storage device
(4) Software programming
(5) None of these

(3) Output device

117. Which of the following acts as a temporary high speed holding area between the memory and the
CPU thereby improving processing capabilities?
(1) Temporary memory
(2) ROM
(3) RAM
(4) Cache memory3
(5) None of these
118. What is the name of the documents that explains how to use a software program?
(1) User manual3
(2) Software manual
(3) Program manual
(4) System manual
(5) None of these
120. A page in the word document consists of how many margins?
(1) One (right)
(2) Four (top, bottom, right, left)3
(3) Three (top, bottom, right)
(4) Two (top, bottom)

CSB, Ch-17, Ph: 044-24333346

(5) None of these

Ck/Page-9

119. Which key is used to move the insertion point to the first cell in a row in Excel?
(1) Esc
(2) Page down
(3) Home3
(4) Page up
(5) None of these
121. A (n) _______ device is any hardware component that allows you to enter data instructions into a
computer?
(1) Interaction
(2) Input3
(3) Communication
(4) Output
(5) terminal
122. What does the acronym BIOS stand for?
(1) Basic Input/Outer System
(2) Basic Internal/Output System
(3) Basic Inner/Output System
(4) Basic Input/ Output Systemization
(5) Basic Input/ Output System3
123. The OS, software and data the computer is currently using are stored in_______?
(1) PCI
(2) AGP
(3) USB
(4) RAM3
(5) Scanner
124. Which of the following is a binary number?
(1) 34
(2) 113
(3) 45

(4) 20

(5) 12

125. The process of making changes to an existing document is referred to as?


(1) Editing3
(2) Changing
(3) Modifying
(4) Creating
(5) Adjusting
126. Which of the following refers to container used to store related documents located on the
computer?
(1) Labels
(2) Indexes
(3) Programs
(4) Folders3
(5) Sections
127. Which of the following refers to the means by which an OS or any other program interacts with
the user?
(1) Program front-end
(2) Programming interface
(3) User login
(4) User interface3
(5) User compatibility
128. The____ format reduces an audio file to about one-tenth of its original size, while preserving
much of the original quality of the sound?
(1) DOC
(2) PNG
(3) GIF
(4) MP33
(5) VMEG
129. The _________, which contains billions of documents called Web pages, is one of the most
popular services on the internet?
(1) Web server (2) Tebet
(3) Web3
(4) Collection
(5) Newsnet
130. Which of the following terms is associated with Internet/ Email?
(1) Plotter
(2) Slide Presentation
(4) Pie-chart
(5) Microsoft Excel

(3) Bookmark3

131. Which is the earliest calculating devices?


(1) Clock
(2) Difference Engine
(4) Calculator
(5) None of these

(3) Abacus3

132. What are the basic operations that performed by a computer?


(1) Arithmetic Operations
(2) Logical Operations
(4) All of the above3
(5) None of these

(3) Storage and relative

133. Who built the 1st Mechanical Calculator?


(1) Joseph Marie Jacquard
(2) John Mauchly
(4) Harward Ailken
(5) None of these

(3) Blaise Pascal3

CSB, Ch-17, Ph: 044-24333346

Ck/Page-10

134. Who introduced the Punched cards?


(1) Powers
(2) Pascal
(3) Jacquard

(4) Herman Hollerith3

(5) None of these

135. DOS stands for?


(1) Disk Originating System
(3) Disk Operating System3

(2) Dynamic Operating System


(4) Default Operating System

(5) None of these

136. What is MS word?


(1) A game
(3) Word Processing Software3

(2) An Operating System


(4) Typing tutor software

(5) None of these

137. What is MS Excel?


(1) Window based word processor package
(2) Window based spread sheet package3
(3) DOS based spread sheet package
(4) Window based accounting package
(5) None of these
138. Power Point can display from which of the following add-in software of MS-Office:
(1) Equation Editor
(2) Organization Chart
(3) Photo Album
(4) All of these3
(5) None of these
139. How do you create a stock item?
(1) From Gateway to TALLY choose Inventory Info>Stock Item > Single Create3
(2) From Gateway totally choose Accounts Info > Voucher Type > Create
(3) From Gateway to TALLY choose Voucher Entry > Purchase
(4) Any of the above
(5) None of these
140. The 1st net work that planted the seeds of internet was:
(1) ARPANET3 (2) NSF net
(3) V net
(4) I net
141. Which hardware device acts as both a switching and connecting unit?
(1) RS-232 C Port
(2) Concentrator
(4) Communication processor
(5) None of these

(5) None of these

(3) Multiplexer3

142. Which device is assembles groups of characters into complete messages prior to their entering the
CPU?
(1) An interpreter
(2) A complier
(3) A communications processor3 (4) An editor
(5) A translator
143. What is means by CD-ROM?
(1) Compactable Read Only Memory
(2) Compact Data Read Only Memory
(3) Compactable Disk Read Only Memory
(4) Compact Disk Read Only Memory3
(5) Connected Disk Read Only Memory
144. Which of the following terms refers to the ability of a computer to automatically configure a new
hardware component that is added to it?
(1) Formatting
(2) Multiprocessing
(3) Multiprogramming
(4) Multitasking
(5) Plug and play3

CSB, Ch-17, Ph: 044-24333346

Ck/Page-11

145. Which part of computer can touch and feel?


(1) Hardware3 (2) Software
(3) Programs

(4) Output

(5) None of these

146. A series of instructions that tells a computer what to do and how to do it is called a
(1) Program3 (2) Command
(3) User response (4) Processor
(5) None of these
147. The portion of the CPU that coordinates the activities of all the other computer computer
components is the
(1) Motherboard
(2) Coordination board
(3) Control unit3
(4) Arithmetic logic unit
(5) None of these
148. Something which has easily-understood instructions is said to be
(1) User-friendly3
(2) Information
(4) Icon
(5) None of these
149. To access a mainframe or supercomputer, user often use a
(1) Terminal3 (2) Node
(3) Desktop
(4) Handheld

(3) Word processing

(5) None of these

150. A flaw in a program that causes it to produce incorrect or in appropriate results is called a_____
(1) Bug3
(2) Byte
(3) Attribute
(4) Unit problem (5) None of these
151. When you switch of your computer which memory gets lost?
(1) ROM
(2) RAM3
(3) Cache
(4) Dynamic
152. Name the program that controls the computer?
(1) Operating System3
(2) Application Program
(4) File Manager
(5) Compiler

(5) Static

(3) Browser

153. What is meant by Output?


(1) what the processor takes from the user
(2) what the user gives to the processor
(3) what the processer gets from the user
(4) what the processor gives to the user3
(5) None of these
154. An error is also called as______.
(1) bug3
(2) debug

(3) cursor

(4) icon

(5) None of these

155. Data or information used to run the computer is called


(1) Software3 (2) Hardware
(3) Peripheral
(4) CPU

(5) None of these

156. Name the device that allows you to communicate with the computer?
(1) input device3
(2) output device
(4) storage device
(5) None of these

(3) software device

157. What is meant by Firmware?


(1) The physical component used in a computer system.
(2) A set of instructions through which a computer does one or more work.
(3) People involved in the computing process.
(4) A set of programs that are pre installed in read only memory of computer during
manufacturing.3
(5) None of these

CSB, Ch-17, Ph: 044-24333346

Ck/Page-12

158. What is Super computer?


(1) Is smaller than mainframe computer in size and processing capability
(2) Is common in all houses.
(3) Contains only a thousand microprocessors.
(4) Is often used by researchers due to its computing capability3
(5) Is same as the size of laptop.
159. Where is disk put in a computer?
(1) In the modem
(2) In the hard drive
(4) In the disk drive3
(5) None of these

(3) Into the CPU

160. Hard copy of a document________.


(1) Printed by the printer3
(2) Stored on a floppy
(4) Stored in the hard disk
(5) None of these

(3) Stored on a CD

161. Which among the following is an input device which moved by the user on a flat surface to
causes a pointer on the screen to move accordingly?
(1) keyboard
(2) mouse3
(3) barcode reader
(4) wand reader
(5) scanner
162. A barcode reader is an example of a (n) ___________.
(1) Storage device
(2) Output device
(4) Printer
(5) Processing device

(3) Input device3

163. From where, you can access the Recycle Bin icon?
(1) On the desktop3
(2) In the properties dialog box
(4) On the hard drive
(5) None of these

(3) On the shortcut menu

164. The physical arrangement of elements on a page is referred to as a documents


(1) pagination (2) format3
(3) features
(4) grid
(5) None of these
165. Digital camera is a ___________ device.
(1) Software
(2) Input
(3) Storage

(4) Output

(5) Input/output3

166. What is meant by Mailing Kst?


(1) Collection of email addresses3 (2) Collection of folders
(4) Collection of events
(5) Collections of files

(3) Collections of dates

167. In travelling, which computers are portable and convenient for users?
(1) minicomputers
(2) laptops3
(4) supercomputers
(5) None of these

(3) file serves

168. Unsolicited email is also called as___________.


(1) Usenet
(2) Newsgroup
(3) Flaming

(4) Backbone

(5) Spam3

169. To save an existing document with a different name, we have to_________.


(1) Copy and paste the original document to a new document and save
(2) Use the Save As command3
(3) Retype the document with a different name
(4) Use Windows Explorer to copy the document to a different location and then rename it
(5) None of these

CSB, Ch-17, Ph: 044-24333346

Ck/Page-13

170. Which among the following software applications is used for performing numerical and
statistical calculations?
(1) Document processor
(2) Database
(3) Graphics package
(4) Spreadsheet3
(5) None of these
171. Laptop means?
(1) A computer having voice recognition system
(2) Computers used in Clinical Laboratories
(3) A computer manufactured by Compaq
(4) Lightweight Computers, small enough to fit in a small suitcase3
(5) None of these
172. Who developed the basic architecture of computer?
(1) John Von Neumann3
(2) Blaise Pascal
(4) Charles Babbage
(5) None of these
173. Expansion of CPU is?
(1) Central Processing Unit3
(3) Central Peripheral Unit

(3) Gorden Moore

(2) Central Printing Unit


(4) Central Process Unit

(5) None of these

174. Which among the following statements is incorrect on MS-DOS?


(1) MS-DOS is made up of external and internal commands
(2) MS-DOS is a windows driven operating system3
(3) MS-DOS is a command driven operating system
(4) MS-DOS exhibits a system prompt which is normally represented asC:/>
(5) None of these
175. Which of the following is not a usual file extension in DOS?
(1) .class
(2) .BAT
(3) .O3
(4) .EXE
176. Which among the following is not a part of a standard office suit?
(1) File Manager3
(2) Word Processor
(4) Database
(5) None of these

(5) None of these

(3) Image Editor

177. Which word is used to describe the act of correcting something?


(1) Correcting (2) Erase
(3) Edit3
(4) Whiteout

(5) None of these

178. The formulas in Excel are made up of?


(1) Arithmetical operators and functions3
(3) Only functions
(4) Only arithmetic operators

(2) Only symbols


(5) None of these

179. How many action button are there in PowerPoint?


(1) 16
(2) 153
(3) 12

(5) None of these

(4) 18

180. __________ voucher is used to make the entry of sales return?


(1) Credit Note3
(2) Credit and Debit
(4) Payment Voucher
(5) None of these

(3) Debit Note

181. Which application used to prepare presentation/slide show?


(1) Internet Explorer
(2) Power Point3
(4) Photoshop
(5) All these

(3) Outlook Express

182. Which is NOT hardware of a computer?


(1) Central Processing Unit
(2) Key board
(4) Monitor
(5) Mouse

(3) Windows3

CSB, Ch-17, Ph: 044-24333346

Ck/Page-14

183. Assembly language is designed to_______.


(1) Make a better programming environment
(2) Replace machine code with an understandable
(3) Replace machine code3
(4) Provide easy understanding
(5) Produce easy machine code
184. The FILES command of DOS is used to know?
(1) The maximum number of directories which can be opened at a time
(2) The maximum number of directories
(3) The maximum number of files which can be opened at a time3
(4) The maximum number of the along with directories
(5) The maximum number of files
185. What we call the blinking symbol on the computer screen?
(1) logo
(2) hand
(3) mouse
(4) cursor3

(5) None of these

186. What will be the background of any Word document?


(1) Can have any colour your choose
(2) Is the colour your present under the Options menu3
(3) Is always white colour
(4) Can have any colour you choose
(5) None of these
187. Connectivity for a new computer means
(1) Connecting a mouse, a keyboard and printer all essential hardware pieces for the average
user
(2) Having a modern and/or network connection to communicate with other computers3
(3) Connecting the software to the hardware of the system
(4) Connecting a Mouse to the hardware system
(5) Software permanently Available in the computer
188. Which is used to read handwritten or printed text to make a digital image that is stored in
memory?
(1) Keyboard
(2) touchpad
(3) scanner3
(4) laser beam
(5) printer
189. __________part of the computer is directly invoked in executing the instructions of the computer
program?
(1) The printer
(2) The secondary storage
(3) The main storage
(4) The scanner
(5) The processor3
190. What we have to do to insert columns in Word?
(1) Press the space bar until your cursor reaches the desired place
(2) Use Excel
(3) Set tabs or use the Table menu
(4) Tab consecutively until your cursor reaches the desired place
(5) None of these3
191. Error in a computer program is also called as_______.
(1) bugs3
(2) blunders
(3) mistake
(4) item overlooked
192. A compiler is used to translate a program written in ___________?
(1) Assembly language
(2) A high-level language3
(4) A low-level language
(5) None of these
CSB, Ch-17, Ph: 044-24333346

(5) None of these

(3) Machine language


Ck/Page-15

193. A program designed to destroy data on your computer which can travel to infect other
computers is called a ________.
(1) hurricane
(2) torpedo
(3) disease
(4) virus3
(5) None of these
194. The commonly available computers/laptops have a keyboard popularly known as ____________.
(1) QWERTY3 (2) ALTER
(3) UCLIF
(4) QOLTY
(5) None of these
195. At which of the storage placement strategies a program is placed in the largest available hole in
the main memory?
(1) Best fit
(2) First fit
(3) buddy
(4) worst fit3
(5) None of these
196. The shut down feature is available at ____.
(1) START menu3
(2) START >> Find
(4) Recycle bin
(5) Internet explorer

(3) START >> Run

197. What do you press to enter the current date in a cell?


(1) CTRL +; (semicolon)3
(2) CTRL + F11
(4) CTRL + SHIFT +: (colon)
(5) None of these

(3) CTRL + F10

198. Which describes a relational database?


(1) It retrieves data related to its queries.
(2) It consists of separate tables of related data.3
(3) It provides a relationship between integers.
(4) It provides a relationship between floats
(5) None of these
199. What is the use of Ctrl + F shortcut key in Word?
(1) To save the file
(2) To open the Find and Replace dialog box3
(3) To view document in full view (4) To open the Formula dialog box (5) None of these
200. Every cell in a Microsoft Office Excel document is referred to by its cell address, which is
the________.
(1) Cells row label
(2) Cells column label and worksheets tab name
(3) Cells column label
(4) Cells row and column labels3 (5) Cells contents
201. The primary purpose of software is to turn data into _________.
(1) Websites
(2) objects
(3) programs
(4) information3 (5) None of these
202. Expand CPU____
(1) Central Protection Unit
(3) Central Processing Upload

(2) Central Processing Unit3


(4) Computer Protection Unit

(5) None of these

203. Which among the following capabilities is required for a system program to execute more than
one program at a time?
(1) Compiling
(2) Virtual memory
(3) Multi-tasking
(4) Word processing
(5) None of these3
204. For the purpose of finding of an individual item in a file immediately,_________ is used.
(1) File allocation table3
(2) Sequential access
(3) directory
(4) direct access
(5) None of these
205. Which contains specific rules and words that express the logical steps of an algorithm?
(1) Programming language
(2) syntax3
(3) programming structure
(4) graph
(5) logic chart
CSB, Ch-17, Ph: 044-24333346

Ck/Page-16

206. What is the process of finding errors in software code?


(1) Debugging (2) Running
(3) Testing3
(4) Compiling

(5) Hacking

207. ___________ part is called as the brain of the computer?


(1) CPU3
(2) RAM
(3) ROM
(4) Monitor

(5) None of these

208. Something which has easily understable instructions is called as


(1) icon
(2) word processing
(4) information
(5) None of these

(3) user-friendly3

209. The printers and monitors are the peripheral devices, which are considered to be ______.
(1) hardware3 (2) data
(3) information (4) software
(5) source code
210. In a computer, most of the processing takes place in______.
(1) RAM
(2) ALU
(3) CPU3
(4) Memory

(5) Motherboard

211. Computer and communication technology, such as communication links to the Internet, that
provide help and understanding to the end user are known as _______.
(1) program
(2) information technology3
(3) worksheet file
(4) FTP
(5) Presentation file
212. Which among the following is contained on chips connected to the system board and is a holding
area for data instructions and information? (processed data waiting to be output to secondary
storage)
(1) mode
(2) internet
(3) mouse
(4) memory3
(5) program
213. Conference (Netscape) / NetMetting (Internet Explorer) enables (choose the option that best
describes)?
(1) Live audio conferencing
(2) Sharing voice on the net
(3) Live textual conferencing
(4) Live real time conference3
(5) None of these
214. Web casting is defined as_____
(1) Playing of music on the internet
(2) Transmitting the video and audio on the internet3
(3) Searching on the web
(4) Casting a movie/TV star in a role on the www
(5) None of these
215. FTP stands for_______.
(1) File Typing Protocol
(3) File Translate Protocol

(2) File Transit Protocol


(4) File Transfer Protocol3

216. Compiler in a computer system is a __________.


(1) Process
(2) System Software3
(4) Application Software
(5) None of these

(5) None of these

(3) Package

217. HTML stands for______.


(1) Hypermedia Markup Language
(2) High Transfer Machine Language
(3) Hypertext Markup Language3
(4) High Transmission Markup Language
(5) None of these

CSB, Ch-17, Ph: 044-24333346

Ck/Page-17

218. Computers connected to a LAN can_____.


(1) E-mail
(2) Share information and/or share peripheral equipment3
(3) Go online
(4) Run faster
(5) None of these
219. Correcting errors in a program is called as_______.
(1) Compiling (2) Translating
(3) Debugging3 (4) Interpreting
220. Among the following which is similar to E-mail______.
(1) Writing a letter3
(2) Sending a package
(4) Drawing a picture
(5) None of these
221. Which is the most widely used input device?
(1) modern
(2) keyboard3
(3) monitor

(5) None of these

(3) Talking on the phone

(4) mouse

(5) None of these

(4) 2563

(5) 512

222. What does CPU contains?


(1) An analytical engine and a control unit
(2) A card reader and a printing device
(3) A control unit and an arithmetic logic unit3
(4) An arithmetic logic unit and a card reader
(5) None of these
223. A single byte represents __________ values.
(1) 64
(2) 16
(3) 4

224. Transformation of input into output is performed by____


(1) Input Output
(2) Peripherals
(4) Storage
(5) CPU3

(3) Memory

225. The subsystem of the Kernel and hardware that cooperates to translate virtual to physical
addresses comprises_______.
(1) Input /Output Management Subsystem
(2) Memory Management Subsystem3
(3) Process Management Subsystem
(4) All the above
(5) None of these
226. If the _______bit in X. 25 standard is set to 1, it means that there is more than one packet.
(1) P
(2) D
(3) M3
(4) Q
(5) None of these
227. A pre designed document that already has coordinating fonts, a layout, and a background is
called as______.
(1) ruler
(2) model
(3) guide
(4) template3
(5) None of these
228. A personal computers connect together to form a ______.
(1) Enterprise
(2) Supercomputer
(4) Network3
(5) None of these
229. Computer language used on the Internet is______.
(1) COBOL
(2) BASIC
(3) Java3
230. You click at B to make the text
(1) Italics and Underlined
(4) Bold3
CSB, Ch-17, Ph: 044-24333346

(2) Underlined
(5) None of these

(4) Pascal

(3) Server

(5) None of these

(3) Italics

Ck/Page-18

231. When you save to_______, your data will remain intact even when the computer is turned off?
(1) Primary storage device
(2) RAM
(3) Secondary storage device3
(4) Motherboard
(5) None of these
232. Define Mother Board?
(1) circuit board that house peripheral device
(2) the first chip that is accessed when the computer is turned on
(3) same as the CPU chip
(4) circuit board that contains a CPU and other chips3
(5) None of these
233. Which of the following program enables you to perform calculations involving rows and columns
of numbers?
(1) Spreadsheet program3
(2) Graphics package
(3) Word processor
(4) Window
(5) None of these
234. A record is related to a file as a statement is related to a _______?
(1) data
(2) file
(3) program3
(4) procedure

(5) None of these

235. Which is the most common type of storage device?


(1) flash
(2) steel
(3) magnetic3

(5) persistent

(4) optical

236. The codes consisting of lines of varying widths or lengths that are computer-readable are known
as __________.
(1) an OCR scanner
(2) a magnetic tape
(3) a bar code3
(4) an ASC II code
(5) None of these
237. The magnetic tape is not practical for applications where data must be quickly recalled because
tape is _________.
(1) a random access medium
(2) a read-only medium
(3) expensive
(4) fragile and easily damaged
(5) a sequential access medium3
238. What is the reason for deleting unknown e-mail attachments?
(1) It is a bad manners
(2) The person could track you down and hurt you
(3) It can land you in jail
(4) It might contain a virus that could hurt your computer.3
(5) None of these
239. Which of the following is used to read and write information in the storage media such as CD?
(1) a laser beam of red light3
(2) magnetic strips
(3) magnetic dots
(4) All of these
(5) None of these
240. Vendor-created program modifications are called as________.
(1) patches3
(2) overlaps
(3) holes
(4) antiviruses

(5) fixes

241. Programs that automatically submits your search request to several search engines
simultaneously is called __________.
(1) Metasearch engines3
(2) Hits
(3) Spiders
(4) Webcrawlers
(5) None of these
242. You are planning on using a single network that supports 208 users. Which IP address class
would you choose to be the most efficient?
(1) Class D
(2) Class E
(3) Class C3
(4) Class B
(5) Class A
CSB, Ch-17, Ph: 044-24333346

Ck/Page-19

243. Compiling creates _______.


(1) subroutine
(4) program specification

(2) algorithm
(5) None of these

(3) executable program3

244. A CD-RW disk _________.


(1) Holds less data than a floppy disk
(2) Is a form of optical disk, so it can only be written once
(3) Has a faster access than an internal disk
(4) Can be erased and rewritten3
(5) None of these
245. Which among the following places the common date elements in order from smallest to largest?
(1) Character, record, field, file, database
(2) Character, file, record, field, database
(3) Character, field, record, file, database3
(4) Bit, byte, character, record, field, file, database
(5) None of these
246. Which statements is a false with respect to file names?
(1) File extension is another name for file type.
(2) Every file in the same folder must have a unique name.
(3) Files may share the same name or the same extension but not both.
(4) The file extension comes before the dot (.) followed by the file name.3
(5) None of these
247. The method of Internet access that requires a phone line, but offers faster access speeds than dialup is the _______ connection
(1) fibre-optic service
(2) satellite access
(3) cable access
(4) digital subscriber line (DSL)3 (5) modem
248. Name the software which creates a mirror image of the entire hard disk, including the operating
system, applications, files, and data?
(1) Utility programs
(2) Operating system
(3) Backup software
(4) Driver imagining3
(5) None of these
249. What displays the content of the active cell in Excel?
(1) Task Pane (2) Row Headings (3) Formula Bar3 (4) Name Title

(5) Name Box

250. In Word you can force a page break?


(1) by positioning your cursor at the appropriate place and pressing the F1 key
(2) by positioning your cursor at the appropriate place and pressing Ctrl + Enter3
(3) by changing the font size of your document
(4) by using the Insert/Section Break
(5) None of these
251. To send another station a message, the main thing a user has to know is ______.
(1) Whether this is a voice or data network
(2) The other stations address3
(3) How the network works
(4) Whether the network is packet-switched or circuit-switched
(5) None of these

CSB, Ch-17, Ph: 044-24333346

Ck/Page-20

252. Among the following which statement is NOT true?


(1) Batch processing is still used today in older systems or in some systems with massive
volumes of transactions.
(2) In online processing, the user enters transactions
(3) Online systems continually update the master file.
(4) Information in batch systems will always be up-to-date.3
(5) None of these
253. What is the main folder on a storage device called_______.
(1) Device driver
(2) Interface
(4) Platform
(5) None of these
254. Manipulating data to create information is known as_________.
(1) analysis
(2) programming (3) processing3 (4) feedback

(3) Root directory3

(5) None of these

255. Which of the following contains buttons and menus that provide quick access to commonly used
commands?
(1) toolbar3
(2) window
(3) menubar
(4) find
(5) None of these
256. For selecting or highlighting, which of the following is generally used?
(1) Floppy Disk (2) Icon
(3) Mouse3
(4) Keyboard
(5) None of these
257. Which of these is a point-and-draw device?
(1) mouse3
(2) printer
(3) scanner

(4) keyboard

(5) CD-ROM

258. The letter and number of the intersecting column and row is the______.
(1) Cell contents
(2) Cell coordinates
(3) Cell address3
(4) Cell position
(5) Cell location
259. Which among the following used a handheld operating system?
(1) A mainframe
(2) A laptop
(4) A supercomputer
(5) A PDA3

(3) A personal computer

260. To display the contents of a folder in Windows Explorer you should________.


(1) Click on it3
(2) Rename it
(3) Give it a password
(4) Name it
(5) Collapse it
261. Among the following which is the faster communication channel?
(1) Optical fiber
(2) Micro wave
(4) All are operating at nearly the same propagation speed3

(3) Radio wave


(5) None of these

262. A cursor is________.


(1) Pressing and holding the main mouse button.
(2) A symbol that designates the position on the screen where text or codes will be inserted or
deleted.3
(3) To make a selection from the document and duplicate it on the clipboard
(4) A button in a dialog box
(5) None of these
263. What is mean by Cut______.
(1) To take a selection from the document and move it to the Clipboard.3
(2) To cut a document in two equal parts.
(3) To cut a document in two unequal parts
(4) Only b and c above are correct.
(5) None of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-21

264. ___________ means to enlarge a window to its maximum area so that it will full entire desktop
(1) Maximize3 (2) Extend
(3) Enlarge
(4) Zoom
(5) None of these
265. What is HTML_______.
(1) It is developed for world wide web (www)3
(2) To make formatted web documents with links, those can be viewed in Web Browser.
(3) Used for all the formatted documents.
(4) All of the above
(5) None of these
266. Define icon?
(1) It is small graphical image which is used to represent an application, command, or a tool.
(2) It is some action performed when something like menu or button is clicked
(3) Both a and b3
(4) A folder
(5) None of these
267. ___________ is an area of memory assigned to store any e-mail message for the user
(1) Post Box
(2) Outlook Express
(3) Yahoo.com
(4) Mailbox3
(5) None of these
268. A software to convert a complete HLL Program to machine language in one go _____.
(1) compiler3 (2) loader
(3) assembler
(4) interpreter
(5) None of these
269. Gopher displays a set of resources on the Internet in the form of _______.
(1) Lists and menus3
(2) Icons
(3) Options
(4) Both (2) and (3)
(5) None of these
270. When a language has the capability to produce new data types, it is said to be ___________.
(1) Reprehensible3
(2) Encapsulated
(3) Extensible
(4) Overloaded
(5) None of these
271. Which of the following menu has to be selected to print a document?
(1) Tools
(2) Edit
(3) File3
(4) Special

(5) None of these

272. The user which assigns to a document is called as_________.


(1) Filename3 (2) data
(3) record
(4) program

(5) None of These

273. If you need to send letters to the people regularly, which type of program would you use to
create the letters?
(1) Utility software
(2) Hardware
(3) System Software
(4) Application Software3
(5) None of these
274. In a computer mouse and keyboard are used to give ________.
(1) Instructions (2) Insert
(3) Guidance
(4) Input3

(5) None of these

275. Which of the following is used to save the data permanently?


(1) CPU
(2) ROM3
(3) RAM
(4) Printer

(5) None of these

276. Among the following statement which is not true about computer files?
(1) Every file has a filename
(2) Files usually contain data
(3) A file extension is established by the user to indicate the files contents3
(4) They are collections of data saved to a storage medium
(5) None of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-22

277. Which among the following is optional memory to run the computer system?
(1) ROM
(2) RAM
(3) Cache3
(4) Secondary Memory
(5) RAM and ROM
278. __________ is a translator program which was used in Assembly Language.
(1) Interpreter (2) Compiler
(3) Translator
(4) Translation
(5) Assembler3
279. Which program is used to controls the various computer parts and allows the user to interact
with the computer?
(1) Database program
(2) Operating system3
(3) Database program
(4) Word processing software
(5) None of these
280. In Microsoft office Excel document, each cell is referred to by its cell address, which is called
as__________.
(1) Cells column label and worksheet tab name
(2) Cells row and column labels
(3) Cells column label
(4) Cells row and column labels3
(5) None of these
281. What is the Shortcut Key to hide the entire row in the MS Excel?
(1) Ctrl + X
(2) Ctrl + 93
(3) Ctrl + (4) Ctrl + 2

(5) Ctrl + R

282. Which of the following component is used to make Third Generation Computers?
(1) Bio Chips
(2) Vacuum Tubes
(3) Integrated Circuits3
(4) Transistors
(5) Discrete Components
283. Unsolicited email is also called as___________.
(1) Usenet
(2) Spam3
(3) Newsgroup

(4) Backbone

(5) Flaming

284. Which among the following software applications is used for performing numerical and statistical
calculations?
(1) Graphic Package
(2) Document Processor
(3) Data Base
(4) Spread Sheet3
(5) None of these
285. A ________ is approximately a million bytes
(1) Tera byte
(2) Giga byte
(3) Mega byte3

(4) Kilo byte

(5) None of these

286. DOS floppy disk does not have__________.


(1) A root directory
(2) A file allocation table
(4) Virtual Memory3
(5) None of these

(3) A boot record

287. Which of the following terms is associated with Internet/ Email?


(1) Pie- chart
(2) Slide Presentation
(4) Plotter
(5) None of these

(3) Bookmark3

288. The OS, software and data the computer is currently using are stored in_______?
(1) Scanner
(2) PCI
(3) RAM3
(4) AGP
(5) None of these
289. What is the shortcut key to go to last line in the document?
(1) Ctrl + L
(2) Ctrl + Last
(3) Ctrl + End3 (4) Ctrl + Down Arrow
290. Among the following which is not a computer language?
(1) FORTRAN (2) COBOL
(3) LOTUS3
(4) BASIC
CSB, Ch-17, Ph: 044-24333346

(5) None of these

(5) None of these


Ck/Page-23

291. In the term ALU, L stands for________.


(1) Logic3
(2) List
(3) Locator

(4) Login

(5) Lock

292. Among the following which is the global address of documents and other resources on the World
Wide Web?
(1) Hyperlink (2) URL3
(3) Anchor
(4) Reference
(5) Header
293. A power management mode in which the current state of the system is saved to the hard drive,
and the system power downs is known as________.
(1) Lock
(2) Log off
(3) Hibernate3 (4) Switch
(5) Green Button
294. Name the malicious computer program that is capable of creating a backdoor on your computer?
(1) Firewall
(2) Worm
(3) Virus
(4) Trojan Horse3 (5) Bug
295. A combination of software and hardware, in which data or programmes are pre-recorded on
them is called______.
(1) Firmware3
(2) Malware
(3) Directory
(4) Anti-spam programme
(5) Webcrawler
296. Where was the icons of the currently running programmes are displayed?
(1) Menu Bar
(2) Title Bar3
(3) Status Bar
(4) Tools Bar
(5) None of these
297. Which of the following command is used to save an existing document with a new name?
(1) Use Rename command
(2) Retype the content and save in the new name
(3) Use Save as command3
(4) Use Convert command
(5) None of these
298. A special, high-speed storage area within the CPU in which all data must be represented before it
can be processed is called?
(1) BIOS
(2) Cache
(3) RAM
(4) Register3
(5) None of these
299. In the windows operating system, the delete command_______.
(1) Transfers the files to a specified folder
(2) Puts the files to the recycle bin3
(3) Deletes the files permanently
(4) Transfers the files from the drive to the removable drive
(5) None of these
300. All the stored information in a computer must be in_______.
(1) A file3
(2) A programme (3) On hard disk (4) On RAM

(5) None of these

301. Superscript, subscript, outline, emboss, engrave are known as________.


(1) Word art
(2) Font effects3 (3) Font styles
(4) Text effects
(5) None of these
302. Among the following which is not available in Font Spacing?
(1) Expanded (2) Normal
(3) Loosely3
(4) Condensed

(5) None of these

303. Shimmer, Sparkle text, blinking background are known as________.


(1) Word art
(2) Font style
(3) Font effects
(4) Text effects3

(5) None of these

304. If you begin typing an entry into a cell and then realize that you dont want your entry placed
into a call, you have to _______.
(1) Press Esc3
(2) Press erase key
(3) Press the edit formula button (4) Press enter button
(5) None of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-24

305. What is Bold, Italic and Regular?


(1) Word art
(2) Font style3

(3) Font effect

(4) Text effect

(5) None of these

306. Among the following which will not cut the information?
(1) Selecting edit>cut from the menu
(2) Clicking the cut button on the standard
(3) Pressing Ctrl+c3
(4) Pressing Ctrl+x
(5) None of these
307. Computer connected to the LAN can________.
(1) Run faster
(2) Go online
(4) Share information and / or share peripheral equipment3

(3) Email
(5) None of these

308. A self replicating program, similar to a virus which was taken from a 1970s science fiction novel
by John Bruner entitle the shockwave Rider is_______.
(1) Bug
(2) Vice
(3) Worm3
(4) Lice
(5) None of these
309. Unwanted repetitious messages, such as unsolicited bulk email is known as______.
(1) Spam3
(2) Trash
(3) Courier
(4) Bulk email
(5) None of these
310. COBOL is widely used in_______ applications.
(1) Mathematical
(2) Commercial3
(4) Space
(5) None of these
311. VDU is also called as______
(1) Monitor
(2) Screen

(3) Printer

(3) Scientific

(4) Both (1) and (2)3

(5) None of these

312. Which of the following software is used to track the billing accounts?
(1) Web Authoring
(2) Word Processing
(4) Electronic Publishing
(5) None of these

(3) Spreadsheet3

313. Which of the following statement is correct?


(1) 1 kb= 1024 bytes3
(2) 1 kb= 1000 bytes
(4) 1 kb= 1092 bytes
(5) None of these

(3) 1 kb= 1078 bytes

314. Which among the following is not a computer language?


(1) C
(2) BASIC
(3) JAVA
(4) C++

(5) Microsoft3

315. Which of the following is correct definition for Digital Divide?


(1) Gap between people having access to broadband and narrowband internet
(2) Gap between people having access to internet / IT and no internet /IT3
(3) Gap between people having access to mobile and internet access
(4) Gap between the people having an email account and no email account
(5) None of these
316. Now a days Vishing has become a criminal practice of using social engineering over which of the
following?
(1) Cyber cafes
(2) Mobile Phones3
(3) Social Networking Sites
(4) E-mails
(5) None of these
317. W3C stands for_______
(1) World Wide Web Consortium3 (2) World Wide Web Center
(3) World Wide Web Community (4) World Wide Web Company

(5) None of these

318. In MICR Code Line Structure, what does the first three digits represents among the nine digits?
(1) City3
(2) Account Type (3) Branch
(4) Bank
(5) None of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-25

319. Most of the internet banking sites provides which among the following features to reduce the risk
of keystroke logging for the password entry?
(1) Virtual Keyboard3
(2) Dasher
(3) Touch screen
(4) Finger Touching
(5) None of these
320. For the process of fast data transmission, ADSL data communications technology uses which of
the following features?
(1) Wireless Modem
(2) Sockets
(3) Copper Telephone Lines3
(4) Voice Band Modem
(5) None of these
321. Reusable optical storage will typically have the acronym _________.
(1) DVD
(2) ROM
(3) CD
(4) RW3

(5) None of these

322. Which is processed by the computer into information?


(1) Data3
(2) Pictures
(3) Alphabets
(4) Numbers

(5) None of these

323. __________ is not a means of personal communication on the Internet?


(1) Electronic mail
(2) Chat
(3) Instanotes3
(4) Instant messaging
(5) None of these
324. What is the overall term for creating, editing, formatting, storing, retrieving and printing a text
document?
(1) Word processing3
(2) Web design
(3) Spreadsheet design
(4) Presentation generation
(5) Database management
325. ___________ is a Window utility program that locates and eliminates unnecessary fragments and
rearrange and eliminates unnecessary fragments and rearranges files and unused disk space to
optimize operations.
(1) Restore
(2) Backup
(3) Disk Defragmenter3
(4) Disk Cleanup
(5) Disk Restorer
326. Which among the following refers to too much electricity and may cause a voltage surge?
(1) Splash
(2) Virus
(3) Spike3
(4) Shock
(5) Anomaly
327. A Web ________ consists of one or more Web pages located on a Web server?
(1) story
(2) site3
(3) template
(4) hub
(5) None of these
328. A set of program instructions that can attach itself to a file, reproduce it and spread to other files
is called computer _________
(1) Trojan horse (2) virus3
(3) phishing scam (4) worm
(5) None of these
329. How is it possible that both programs and data can be stored in the same floppy disk?
(1) Floppy disks are better than CDs
(2) Floppy disks can only store date, not programs
(3) Programs and data are both software and both can be stored in any memory device3
(4) A floppy disk has to be formatted for one of for the other
(5) A floppy disk has two sides, one for data and one for programs.
330. Embedded system means ___________
(1) A computer that is part of a large computer
(2) A program that is permanent part of a computer3
(3) A program that comes wrapped in a box
(4) A computer system with a dedicated function within a large mechanical or electrical system
(5) None of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-26

331. Every device on the Internet has a unique ___________ address (also called an Internet address)
that identifies it in the same way that a street address identifies the location of a house.
(1) IA
(2) DA
(3) IP3
(4) DH
(5) None of these
332. Storing same date in many places is known as__________.
(1) enumeration (2) concurrency (3) redundancy3 (4) iteration
333. Which among the following is the main folder on a storage device?
(1) Device driver
(2) Interface
(4) Platform
(5) None of these
334. Manipulating data to create information is known as________.
(1) analysis
(2) programming (3) processing3 (4) feedback

(5) None of these

(3) Root directory3

(5) None of these

335. What is the main circuit board of the system unit id the________.
(1) RAM
(2) control unit
(3) motherboard3(4) computer program

(5) None of these

336. Which of the following is billionth of a second?


(1) Terasecond (2) Microsecond (3) Nanosecond3 (4) Terabyte

(5) Gigabyte

337. Which of the following is a key function of a firewall?


(1) Monitoring3 (2) Moving
(3) Copying
(4) Deleting

(5) None of these

338. _____________ are a type of inexpensive digital camera that remains tethered to a computer and
are used for videoconferencing, video chatting, and live Web broadcast.
(1) Webcams3 (2) Browserpics (3) Browsercams (4) Webpics
(5) None of these
339. A ________ is an organized collection of data about a single entity?
(1) file3
(2) dictionary
(3) database
(4) library

(5) None of these

330. Something which has easily understood instruction is said to be________.


(1) User - friendly3
(2) icon
(3) word processing
(4) information
(5) None of these
331. The right click options of the mouse is NOT used in which of the following?
(1) To rename file
(2) To copy selected text into the clipboard.
(3) To cut the selected text
(4) To access properties of an object (5) None of these.3
332. ___________is the process of dividing the disk into tracks and sectors?
(1) Tracking
(2) Formatting3 (3) Crashing
(4) Allotting
(5) None of these.
333. A Place in a computer system where data and program are temporarily stored is called?
(1) Paste
(2) Open
(3) Memory3
(4) Pocket
(5) None of these
334. Correcting errors in a program is referred to as?
(1) Debugging3 (2) Bugging
(3) Rectifying

(4) Modifying

(5) None of these

335. Graphic diagrams are used to represent multiple perspectives of a system which includes
(1) Use-case, class and state diagrams.3
(2) State, interaction and derivative diagrams.
(3) Interaction, relationship and class diagrams.
(4) Deployment, relationship and use-case diagrams.
(5) None of these.
CSB, Ch-17, Ph: 044-24333346

Ck/Page-27

336. Which is the best view for representing your thoughts as presentation on a computer?
(1) Outline view3
(2) Notes page view
(3) Slide sorter view
(4) Slide view
(5) None of these
337. What does SMPS stands for?
(1) Single mode power supply
(3) Simple mode power supply

(2) Synchronous mode power supply


(4) Switched mode power supply3 (5) None of these

338. RSA is
(1) Symmetric cryptosystem
(3) Asymmetric cryptosystem

(2) Digital signature3


(4) Block Cypher

(5) None of these

339. __________ hardware technology was used by fifth generation computers?


(1) Transistors (2) Valves
(3) ICS
4) ULSI3
5) VLSI
340. For each instruction in program memory the CPU goes through a(1) Decode-fetch-execute sequence
(2) Fetch-decode-execute sequence3
(3) Fetch-execute-decode sequence
(4) Execute-store-decode sequence
(5) Fetch-store-decode sequence
341. A Byte is_________.
(1) A group of 8 bits code3
(2) The part that moves on the desk drive
(3) Found in the upper-left corner of a window screen
(4) The capacity of a sound card
(5) None of these
342. What is the personal computer operating system that organizes and uses a graphic desktop
environment?
(1) CPU
(2) RAM
(3) Windows3
(4) DOS
(5) None of these
343. When you click on SAVE on the monitor, and there is no Flash drive or Floppy disk/diskette in a
drive, the document or application you are using is stored_________.
(1) In ROM memory
(2) On the CD-ROM Drive
(3) On a tape
(4) On the Hard Drive3
(5) None of these
344. Temporary memory is called as_________.
(1) RAM3
(2) ROM
(3) CAD

(4) PROM

345. The printer produces output on paper, often called _______ copy.
(1) Readable
(2) Hard3
(3) Soft
(4) Real

(5) None of these

(5) None of these

346. To perform a computing task, software uses hardware for four basic functions:
(1) Input, storage, alteration and output
(2) Input, processing, storage and analysis
(3) Input, processing, storage and output3
(4) Output, input, analysis and viewing
(5) None of these
347. To boot a computer means to________.
(1) Turn on the sounds
(2) Add extra drives
(4) Turn it on3
(5) None of these
CSB, Ch-17, Ph: 044-24333346

(3) Keep it working


Ck/Page-28

348. A (an) _______ is a set of rules and standards that any two entities use for communication.
(1) Interface
(2) Interaction
(3) Protocol3
(4) Parameter
(5) None of these
349. Windows XP is an example of _________ component of an information system.
(1) Procedure (2) Software3
(3) Hardware
(4) Data
(5) None of these
350. Storage device that can be plugged directly into a computers USB port is________.
(1) Floppy
(2) Plug-in
(3) DVD
(4) Flash drive3 (5) None of these
351. Which of the below mouse technique is used to access the properties of an object?
(1) Shift-clicking
(2) Pulling
(3) Right-clicking3
(4) Dragging
(5) None of these
352. Which of the following displays the contents of the active cell in Excel?
(1) Name box (2) Row Headings (3) Formula bar3 (4) Task pane
(5) None of these
353. ____________ enables you to simultaneously keep multiple Web pages open in one browser
window.
(1) Esc key
(2) Pop-up helper (3) Tab box
(4) Tab row3
(5) Address bar
354. Any letter, number of symbol found on the keyboard that you can type into the computer is
a/an_____
(1) nimble
(2) character3
(3) type
(4) font
(5) output
355. Which of the following lets you leave a screen or program?
(1) Option
(2) Text
(3) Exit3
(4) Boot

(5) None of these

356. To change the written work which is already done, _______ options is used.
(1) File
(2) Cut
(3) Edit3
(4) Close
(5) None of these
357. ______________ is a key that will erase information from the computers memory and characters
on the screen.
(1) Enter
(2) Shift
(3) Esc
(4) Backspace3
(5) Spacebar
358. ____________ is used to insert the clipboard content into a document.
(1) Save
(2) Sticky key
(3) Paste3
(4) View

(5) None of these

359. Which of the following is a command to get a file you worked on from the memory where it was
stored?
(1) Edit
(2) Save as
(3) Format
(4) Open3
(5) None of these
360. _____________ is used to translate a program written assembly language to machine language.
(1) Firewall
(2) Compiler
(3) Assembler3 (4) Interpreter
(5) None of these
361. Computer Software can be defined as__________.
(1) The interaction between the computer and its database
(2) The instructions that tell the computer what to do.3
(3) An interface between the computer and the network.
(4) The computer and its associated equipment
(5) Computer components that act to accomplish a goal
362. Network routing information distributed among routers is stored in which of the following?
(1) NVRAM
(2) Route table
(3) Metric table (4) Flash memory (5) Route memory3

CSB, Ch-17, Ph: 044-24333346

Ck/Page-29

363. When speaking of computer input and output, input refers to ___________.
(1) Retrieval of data of information than has been entered into the computer
(2) Any data processing that occurs from new data input into computer
(3) Data or information that has been entered into the computer3
(4) The transmission of data that has been entered into the computer
(5) Both (3) and (4)
364. If the destination did not receive a segment, how will the TCP host to resend the information?
(1) The destination host will send a YACK message back to the sending host
(2) The ACK received will include the segment number that was not received3
(3) The ACK received will not include the segment number that was not received
(4) The sending host will send a PACK to verify segment receipt
(5) None of these
365. The process of writing out computer instructions is known as___________.
(1) executing
(2) compiling
(3) assembling
(4) coding3
(5) None of these
366. A Web site address is a unique name that identifies a specific ________on Web.
(1) Web Site
(2) Web browser (3) PDA
(4) Link3
(5) None of these
367. You can __________ a search by providing more information the search engine can use to select a
smaller, more useful set of results.
(1) refine3
(2) slowdown
(3) load
(4) query
(5) expand
368. The contents of ________ are lost when the computer turns off.
(1) output
(2) input
(3) storage
(4) volatile memory3

(5) None of these

369. The process of computer receiving information from a server on the Internet is known as ______.
(1) pushing
(2) transferring
(3) downloading3
(4) pulling
(5) None of these
370. When sending an e-mail, the ________line describes the contents of the message.
(1) subject3
(2) cc
(3) contents
(4) to
(5) None of these
371. Forms that are used to organize business data into rows and columns are ___________.
(1) registers
2) sheet-spreads
(3) transaction sheets
(4) business forms
(5) spreadsheets3
372. In PowerPoint, the Header & Footer button can be found on the Insert tab in __________
group.
(1) Object group
(2) Illustrations group
(3) Text group3
(4) Tables group
(5) None of these
373. Word processing, spreadsheet and photo-editing are examples of _________
(1) Application software3
(2) Platform software
(3) Operating system
(4) Operating system software
(5) None of these
374. If you wish to extend the length of the network without having the signal degrade, you would
use a __________
(1) repeater3 (2) gateway
(3) router
(4) switch
(5) None of these
375. The _______ shows all the Web sites and pages that you have visited over a period of time.
(1) toolbar
(2) taskbar
(3) history list3 (4) status bar
(5) None of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-30

376. Which of the following step is taken first in designing a programme?


(1) Input design
(2) Task analysis
(4) Problem identification3
(5) None of these

(3) Data validation

377. The word-processing task associated with changing the appearance of documents is ________.
(1) Editing
(2) Formatting3 (3) Storing
(4) Writing
(5) None of these
378. In order to save an existing document with a different name you need to________.
(1) Copy and paste the original document to a new document and then save
(2) Use the Save As command3
(3) Retype the document and give it a different name
(4) Use Windows Explorer to copy the document to a different location and then rename it
(5) None of these
379. A Field is a related group of________.
(1) Files
(2) Cables
(3) Characters3

(4) Records

380. To restart the computer _____________ key button is used.


(1) Ctrl+Alt+Del
(2) Del+Ctrl
(4) Reset3
(5) None of these

(5) None of these

(3) Backspaca+Ctrl

381. Editing a document consists of reading through the document youve created, then____________.
(1) Correcting your errors3
(2) Printing it
(3) Saving it
(4) Deleting it
(5) None of these
382. The Internet allows you to________.
(1) Send electronic mail
(3) Connect to servers all around the world

(2) View web pages


(4) All of these3 (5) None of these

383. What type of device is a computer printer?


(1) Input
(2) Output/Input (3) Software

(4) Storage

384. What is the biggest number you can get with 8 bits?
(1) 256
(2) 128
(3) 1000
(4) 2553
385. The disks store information in___________.
(1) Tables
(2) Rows and Columns
(4) Tracks and sectors3
(5) All of these
386. Which file(s) can be executed without mentioning its extension name?
(1) .exe
(2) .bat
(3) .com
(4) .app

(5) Output3

(5) 1024

(3) Blocks

(5) All of these3

387. In order to create column data in World you need to ____________.


(1) Tab consecutively until your cursor reaches the desired place
(2) Set tabs or use the Table menu3
(3) Use Excel
(4) Press the space bar until your cursor reaches the desired place
(5) None of these
388. When the computer is switched on, the booting process performs the _________.
(1) Integrity Test
(2) Power-On-Self-Test3
(3) Correct Functioning Test
(4) Reliability Test
(5) Shut-down

CSB, Ch-17, Ph: 044-24333346

Ck/Page-31

389. Specialized programs that assist users in locating information on the Web are called ____.
(1) Information engines
(2) Locator engines
(3) Web browsers
(4) Resource locators
(5) Search engines3
390. Compiling creates a (n) ___________.
(1) Error-free program
(2) Program specification
(4) algorithm
(5) executable program3

(3) subroutine

391. To insert a copy of the clipboard contents, _____________ whatever was last cut or copied at the
insertion point.
(1) paste3
(2) stick in
(3) fit in
(4) push in
(5) None of these
392. The command used to remove text or graphics from a documents. (The information is then stored
on a clipboard so you can paste it):
(1) chop
(2) cut3
(3) clip
(4) cart away
(5) None of these
393. A group of 8 bits is known as a _________.
(1) byte3
(2) kilobyte
(3) binary digit

(4) megabit

(5) None of these

394. The hardware device commonly referred to as the brain of the computer is___________.
(1) RAM chip (2) Data input
(3) CPU3
(4) Secondary storage
(5) None of these
395. A computer cannot boot if it does not have the______.
(1) Compiler
(2) Loader
(4) Assemble
(5) None of these

(3) Operating System3

396. A computer that takes what has been typed into the computer and can be seen on the screen and
sends it to the printer for output on paper is called ___________.
(1) print3
(2) return
(3) jump
(4) attention
(5) None of these
397. The most common storage device for the personal computer is __________.
(1) Floppy disk
(2) USB thumb drive
(3) Zip disk
(4) Hard disk drive3
(5) Pen drive
398. Which device uses a hand-held operating system?
(1) A PDA3
(2) A personal computer
(4) A mainframe
(5) None of these
399. To print an individual item in a file immediately use __________.
(1) SHIFT+P
(2) CTRL+P3
(3) ALT+P
(4) ESC+P

(3) A laptop

(5) None of these

400. The ability to find an individual item in a file immediately is called ___________.
(1) File allocation table
(2) directory
(3) sequential access
(4) direct access3
(5) None of these
401. Use the _______________ to choose a slide layout.
(1) Quick Styles gallery
(2) Format gallery
(4) Layout collection
(5) None of these
402. A saved document is referred to as a _________.
(1) file3
(2) word
(3) folder

(3) Layout gallery3

(4) project

(5) None of these

403. Computers connected to a LAN (Local Area Network) can ___________


(1) Run faster (2) Go online
(3) Share information and or share peripheral equipment3
(4) E-mail
(5) None of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-32

404. A CD-RW disk


(1) Has a faster access than an internal disk
(2) Is a form of optical disk, so it can only be written once
(3) holds less data than a floppy disk
(4) Can be erased and rewritten3
(5) None of these
405. _______________, a printed information, exists in real sense and is a more permanent form of out
put than the output existing on display device.
(1) Soft copy
(2) Carbon copy (3) Hard copy3 (4) Desk copy
(5) None of these
406. Excel stores its document in the form of files which are called__________.
(1) Worksheets (2) Workbooks3 (3) Notebooks
(4) Excel sheets
(5) None of these
407. Which of the following is not true about passwords?
(1) A Password should be a combination of mixed case of alphanumeric characters.
(2) Password should be a maximum 6 characters in length.3
(3) A password that can be memorized easily should be used, so that it need not be noted down.
(4) A password that can be typed quickly without much effort should be used.
(5) None of these
408. A (n) _____________ contains commands that can be selected.
(1) pointer
(2) menu3
(3) icon
(4) button

(5) None of these

409. The blinking symbol on the computer screen is called ____________.


(1) mouse
(2) logo
(3) hand
(4) palm

(5) cursor3

410. When cutting and pasting, the item cut is temporarily stored in _________.
(1) ROM
(2) Had drive
(3) Diskette
(4) Dashboard
(5) Clipboard3
411. Passwords enables users to_________.
(1) Get into the system quickly
(2) Make efficient use of time
(3) Retain confidentiality of files3 (4) Simplify file structures

(5) None of these

412. When sending an e-mail, the ________ line describes the contents of the message.
(1) subject3
(2) to
(3) contents
(4) cc
(5) None of these
413. When we run a program in HTML coding,___________ is used as back end and _________ works
as front-end.
(1) Notepad, Internet, Explorer3 (2) Notepad, MSN, Messenger
(3) MS-Word, Internet Explorer
(4) Both 1 and 2
(5) None of these
414. In DOS, the Label command is used to ____________.
(1) Display the label of disk
(2) Change the label of disk3
(3) Remove the label of disk
(4) Both (1) and (2)

(5) None of these

415. A central computer that holds collections of data and programs for many PCs, workstations, and
other computer is a ____________.
(1) Supercomputer
(2) minicomputer
(3) laptop
(4) server3
(5) None of these
416. A Websites main page is called its___________.
(1) Home page3(2) Browser page (3) Search Page
CSB, Ch-17, Ph: 044-24333346

(4) Bookmark

(5) None of these


Ck/Page-33

417. For creating a document, you use____________ command at File Menu.


(1) Open
(2) Close
(3) New3
(4) Save
(5) None of these
418. With a CD you can___________.
(1) Read
(4) Either Read or Write

(2) Write
(5) None of these

(3) Read and Write3

419. The speed of clock frequency of a micro-processor is measured in ________


(1) Hertz3
(2) baud rate
(3) CPS
(4) bits
(5) bytes
420. Which of the following is the costliest?
(1) Server
(2) Notebook computer
(4) Laptop computer
(5) Main frame computer3

(3) Personal computer

421. When you insert an Excel file into a Word document, the data are_______.
(1) Linked
(2) Placed in a word table3
(3) Embedded
(4) Hyperlinked
(5) None of these
422. Which of the following structures involves repeating a sequence until a certain condition remains
true?
(1) Loop3
(2) Sequence
(3) Conditional (4) Selection
(5) None of these
423. Eliminating errors in a program is also called________.
(1) Debugging3 (2) Modifying
(3) Coding
(4) Clarifying

(5) None of these

424. In which of the following topologies, one main cable is used to which all nodes are directly
connected?
(1) Bus3
(2) Star
(3) Mesh
(4) Ring
(5) None of these
425. A ________ is a program that visits Web sites and reads their pages and other information in
order to create entries for a search engine index.
(1) Filter
(2) Cookie
(3) Extensions
(4) Spider3
(5) None of these
426. You can copy files to your computer from specially configured servers on the Internet using file
transfer utility software. This process is called__________.
(1) Downloading3
(2) Browsing
(3) Surfing
(4) Downsizing
(5) None of these
427. Tim Berners-Lee celebrated his birthday on 8th June. He is associated with which of the following
important discoveries in the field of computer?
(1) Mouse
(2) USD
(3) World Wide Web3
(4) Browser
(5) None of these
428. A Search Tool that uses another search engines data to produce their own results from the
Internet is called __________.
(1) Microsearch engine
(2) Metasearch engine3
(3) Betasearch engine
(4) Mastersearch engine
(5) None of these
429. What will happen if you right-click on the desktop itself?
(1) All the open application will be closed
(2) All the open application will be minimized
(3) The control panel will open
(4) Display properties dialogue box will open3
(5) None of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-34

430. Any data or instruction entered into the memory of a computer is called________.
(1) Output
(2) Input3
(3) Storage
(4) Process
(5) None of these
431. Which key combination will you opt for to align the line or selected text to the centre of the screen
in MS Word?
(1) Ctrl +E3
(2) Ctrl +P
(3) Ctrl +S
(4) Ctrl +H
(5) None of these
432. All formulas in Excel start with
(1) %
(2) #

(3) =3

(4) &

433. Which of the following is not a valid version of MS Office?


(1) Office XP
(2) Office Vista3 (3) Office 2007
(4) Office 2010

(5) None of these

(5) None of these

434. What happens when you press F12 key in MS Word?


(1) Save As dialog box opens3
(2) Find and Replace dialog box opens
(3) A new file opens
(4) Close dialog box opens
(5) None of these
435. Which of the following are the components of the central processing unit (CPU) of a computer?
(1) Control Unit, IC, USB
(2) Arithmetic Logic Unit, Control Unit3
(3) Control Unit, BIOS, IC
(4) Arithmetic Logic Unit, IC, BIOS (5) None of these
436. RAM is the most common type of memory found in computers. It is located on
(1) External memory
(2) Motherboard3
(3) CPU
(4) Hard disk
(5) None of these
437. The acronym URL stands for
(1) Uniform Resource Link
(3) Uniform Registered Link

(2) Universal Resource Locator


(4) Uniform Resource Locator3

(5) None of these

438. Which of the following is correct about assembly language?


(1) It is a high-level language.
(2) It is a low-level language.3
(3) It is a machine language.
(4) It is a third-generation language. (5) None of these
439. Which of the following is a family of wide-area technologies that are used to transmit digital data
over telephone lines?
(1) Digital subscriber line3
(2) Optical fibre
(3) TI
(4) ICS
(5) None of these
440. Bluetooth is a wireless technology standard for exchanging data over short distances. It was
invented in 1994 by telecom vendor
(1) Ericsson3 (2) IBM
(3) Sony
(4) HP
(5) None of these
441. In which year was the worlds first SMS sent?
(1) 19923
(2) 1974
(3) 1965

(4) 1985

(5) None of these

442. Data stored in a computer is often stored in which form?


(1) Bits3
(2) Decimals
(3) Alphabets
(4) Hexadecimal

(5) None of these

443. What values can a bit have?


(1) 0
(2) 1

(5) None of these

(3) 0 or 13

(4) All of these

444. Word processing, Spread sheet and Photo editing are examples of_______
(1) Application software3
(2) System software
(3) Operating system software
(4) Platform software
(5) None of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-35

445. Which of the following is not a connecting device?


(1) Router
(2) Hub
(3) Switch
446. FTP stands for_______
(1) File Translate Protocol
(4) File Transfer Protocol3

(4) All of these3

(2) File Transit Protocol


(5) None of these

(5) None of these

(3) File Typing Protocol

447. Firewall is used in Communication Network/system for protection?


(1) Unauthorized attack
(2) Data driven attack3
(4) Virus attack
(5) None of these

(3) Fire attack

448. Slowest internet connection service is________


(1) Digital Subscribe Line
(2) Dial-up Service3
(4) Cable Modem
(5) None of these

(3) Leased Line

449. Which of the following categories does a mouse belong to?


(1) Output Devices
(2) Word Processing Devices
(3) Presentation Devices3
(4) Input Devices

(5) None of these

450. A program used to perform tasks on a computer is called________


(1) Software3 (2) Mouse
(3) Keyboard
(4) Hardware

(5) None of these

451. Specialized programs that assist user in location information on the web are called
(1) Data engines
(2) Information engines
(3) Web browsers
(4) Resource locators
(5) Search engines3
452. Which one of the following is NOT a computer programming language?
(1) BASIC
(2) C++
(3) JAVA
(4) COBOL
(5) MS-Excel3
453. Workbook in MS-Excel is a collection of
(1) Page Setup (2) Charts
(3) Buttons

(4) Documents

(5) Worksheets3

454. Single-word reference to viruses, worms etc is


(1) harmware (2) virus
(3) phish

(4) malware3

(5) killer ware

455. Computer program that converts assembly language into machine language is
(1) Complicate (2) Computer
(3) Intersection (4) Converter
(5) Assembler3
456. While editing an MS Word document you accidentally losts text. You should then use
(1) Copy
(2) Undo3
(3) Insert
(4) Replace
(5) Add
457. HTTP refers to __________.
(1) Hyper Text Transmission Protocol
(2) Hyper Text Transfer Protocol3
(3) Home Text Transmission Protocol
(4) Hyper Text Tie Protocol
(5) Home Text Transmission Protocol
458. To move to the bottom of a document, press __________.
(1) Home Key (2) Insert Key
(3) Ctrl + End3 (4) End Key

(5) Shift Key

459. Which of the following uniquely identifies a website?


(1) ERL
(2) Domain name (3) Computer
(4) Network

(5) URL3

CSB, Ch-17, Ph: 044-24333346

Ck/Page-36

460. A directory within a directory is called


(1) Mini Directory
(2) Junior Directory
(4) Sub Directory3
(5) None of these
461. How many bytes are equal to one kilobyte?
(1) 1000
(2) 1035
(3) 100

(4) 1008

462. Which is the example of Central Processing Unit?


(1) Peripheral device
(2) An output unit
(4) a program
(5) hardware3
463. IT stands for?
(1) Information Technology3
(3) Intelligent Technology

(2) Integrated Technology


(4) Interesting Technology

464. which of the following is similar to sending an e-mail?


(1) Picturing an event
(2) Narrating a story
(4) Creating a drawing
(5) None of these

(3) Part Directory

(5) 10243

(3) software

(5) None of these

(3) Writing a letter3

465. Which command is used to save an existing file with a new name or to a new location?
(1) Save
(2) Save and Replace
(3) Save As3
(4) New File
(5) None of these
466. What type of software manages the computers processes, functioning as an interface, connecting
user, the application software, and the hardware?
(1) Integrated software
(2) Utility program
(3) Translated program
(4) Operating system3
(5) None of these
467. What type of the program that makes the computer easier to use?
(1) Operating system
(2) application
(4) network
(5) None of these

(3) utility3

468. What is name of the internet connections which done using Phone line and a modem?
(1) digital
(2) dial-up3
(3) broadband
(4) dish
(5) None of these
469. Which is the fastest data transmission speed given below?
(1) bandwidth (2) bps
(3) gbps3
(4) kbps

(5) mbps

470. Which is the major feature of the World Wide Web which makes it simple to
Learn and use ?
(1) Database interface3
(2) Graphical text interface
(3) Graphical user interface
(4) Point-to-point protocol
(5) None of these
471. A(n) ________ camera is a peripheral device used to capture still images in a digital format that
can be easily transferred into a computer and manipulated using graphics software.
(1) digital3
(2) analog
(3) classic
(4) film
(5) None of these
472. Compatibility in regard to computer refers to
(1) The software doing the right job for the user
(2) Their being versatile enough to handle the job
(3) The software being able to run on the computer
(4) Software running with other previously installed software3
(5) None of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-37

473. _____ makes it possible for shoppers to make purchases using their computers.
(1) E-world
(2) E-commerce3 (3) E-spend
(4) E-business
(5) None of these
474. How is it possible that both programs and data can be stored on the same floppy disk?
(1) A floppy disk has two sides one for data and one for programs.
(2) Programs and data are both software, and both can be stored on any memory device.3
(3) A floppy disk has to be formatted for one or the other.
(4) Floppy disks can only store data, not programs.
(5) None of these
475. Physical security is concerned with protecting computer hardware from human tampering and
natural disasters and _______ security is concerned with protecting software from unauthorized
tampering or damage.
(1) Data
(2) Cyber3
(3) Internet
(4) Metaphysical (5) Publicity
476. Hackers
(1) All have the same motive
(2) Are people who maintain computers
(3) May legally break into computers as long as they do not do any damage
(4) Are people who are allergic to computers
(5) Break into other peoples computers3
477. Which of the following is a storage device that uses rigid, permanently installed magnetic disks to
store data/ information?
(1) Floppy diskette
(2) Hard disk3
(3) Permanent disk
(4) Optical disk
(5) None of these
478. Microsoft Office is an example of a
(1) Closed-source software
(2) Open- source software
(3) Horizontal- market software3 (4) Vertical- market software

(5) compiler

479. How is power supplied to a low- power USB device?


(1) Through a power cable
(2) Directly from the computers power supply
(3) From an external power supply (4) Through the USB cable3
(5) None of these
480. When you are selecting a mouse for a particular computer system, what is the most important
consideration?
(1) The type of drivers that come with the mouse
(2) The length of the mouse cord
(3) The type of connector the mouse is equipped with3
(4) The number of buttons the mouse has
(5) None of these
481. Which among the following is an input device which moved by the user on a flat surface to
causes a pointer on the screen to move accordingly?
(1) keyboard
(2) mouse3
(3) wand reader (4) barcode reader (5) scanner
482. A barcode reader is an example of a (n) ___________.
(1) Storage device
(2) Output device
(4) Printer
(5) Processing device

(3) Input device3

483. From where, you can access the Recycle Bin icon?
(1) On the desktop3
(2) In the properties dialog box
(4) On the hard drive
(5) None of these

(3) On the shortcut menu

CSB, Ch-17, Ph: 044-24333346

Ck/Page-38

484. CD-ROM Stands for _________.


(1) Compactable Data Read Only Memory
(2) Compact Data Read Only Memory
(3) Compactable Disk Read Only Memory
(4) Compact Disk Read Only Memory3
(5) Connected Disk Read Only Memory
485. Digital camera is a ___________ device.
(1) Software
(2) Input
(3) Storage

(4) Output

(5) Input/output3

486. What is meant by Mailing Kst?


(1) Collection of email addresses3 (2) Collection of folders
(4) Collection of events
(5) Collections of files

(3) Collections of dates

487. In travelling, which computers are portable and convenient for users?
(1) minicomputers
(2) laptops3
(4) supercomputers
(5) None of these

(3) file serves

488. Unsolicited email is also called as___________.


(1) Usenet
(2) Newsgroup
(3) Flaming

(4) Backbone

(5) Spam3

489. To save an existing document with a different name, we have to_________.


(1) Copy and paste the original document to a new document and save
(2) Use the Save As command3
(3) Retype the document with a different name
(4) Use Windows Explorer to copy the document to a different location and then rename it
(5) None of these
490. Which among the following software applications is used for performing numerical and
statistical calculations?
(1) Document processor
(2) Database
(3) Graphics package
(4) Spreadsheet3
(5) None of these
491. Another name for a program is_________.
(1) software3 (2) procedure
(3) typology

(4) utilities

(5) userware

492. _________ is a communication technology used by some incoming mail servers.


(1) Telnet
(2) TCP
(3) FTP
(4) GIF
(5) POP33
493. The two basis parts of URLs are________
(1) TCP and IP
(2) TCP/IP and ISP
(3) TCP and ftp
(4) Destination and device
(5) The protocol and the domain name3
494. The primary purpose of software is to turn data into __________.
(1) information3(2) programs
(3) objects
(4) charts

(5) websites

495. Mail from unwanted sender can be blocked by ___________.


(1) not buying anything online so that junk mail sender will not having anything to benefit by
(2) sending them nasty replies when they send any mail
(3) using mail filters3
(4) clicking the Unsubscribe link
(5) e-mailing them and asking to be removed from the list

CSB, Ch-17, Ph: 044-24333346

Ck/Page-39

496. The _______ database is the most widely used database structure.
(1) hierarchical (2) general
(3) standard
(4) table

(5) relational3

497. POP denotes?


(1) Post Office Progra
(3) Popular Office Program

(5) None of these

(2) Post Office Protocol3


(4) Protocol on Protocol

498. How many gigabytes are there in a petabyte?


(1) 1000
(2) .001
(3) 100

(4) 10000003

(5) 5000000

499. For a browser to connect to other resources, the location or address of the resources must be
specified. These addresses are called ___________.
(1) MSN
(2) E-mail forms (3) packets
(4) Ids
(5) URLs3
500. The extensions .gov, .edu, .mil, and .net are called ________.
(1) Mail to addresses
(2) Add-ons
(4) DNSs3
(5) E-mail targets

(3) Domain codes

501. Computers process data into information by working exclusively with _______
(1) multimedia (2) words
(3) characters
(4) numbers3
(5) None of these
502. Which of the following memory chip is programmed during the manufacturing process?
(1) RAM
(2) ROM3
(3) PROM
(4) EEPROM
(5) None of these
503. The output is _____
(1) What the processor takes from the user
(2) What the user gives to the processor
(3) What the processor gets from the user
(4) What the processor gives to the user3
(5) None of these
504. An error is also known as ________.
(1) bug3
(2) debug
(3) cursor

(4) icon

(5) None of these

505. The simultaneous processing of two or more programs by multiple processors is called
_________.
(1) multiprogramming
(2) multitasking
(3) time-sharing
(4) multiprocessing3
(5) None of these
506. The device which helps you communicate with computer is called _______.
(1) Input device3
(2) Output device
(3) Software device
(4) Storage device
(5) None of these
507. ______ acts as temporary high speed holding area between the memory and the CPU thereby
improving processing capabilities.
(1) ROM
(2) RAM
(3) Temporary memory
(4) Cache memory3
(5) Flash memory
508. A document that explains how to use a software program is called ____ manual.
(1) user3
(2) system
(3) software
(4) program
(5) technical
509. Press the ____ key to move the insertion point to the first cell in a row in Excel.
(1) Page Up
(2) Page Down
(3) Home3
(4) Tab
(5) None of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-40

510. How many margins are there on a page?


(1) Two (header and footer)
(2) Four (top, bottom, right, left)3
(3) Two (landscape and portrait) (4) Two(top and bottom)

(5) None of these

511. What is Web Casting?


(1) Casting a Mobile TV Star in a role on the web
(2) Transmitting the video and audio on the Internet3
(3) Playing of Music on the Internet
(4) Searching on the Web
(5) None of these
512. The data command at the DOS prompt enables you to ________.
(1) View the data and time3
(2) Change the data
(3) Change the data and time
(4) Change the day only

(5) None of these

513. What are batch files in relation to computer?


(1) They begin with the letter BAT
(2) They help you to keep files in batches
(3) They help you to keep directories in batches
(4) They help you to club a group of statements and run them one after together3
(5) None of these
514. When you delete files in windows operating system, they are _________.
(1) Deleted permanently
(2) Put in recycle bin3
(3) Wiped thoroughly so that nobody is able to recover the file back
(4) Delete permanently and also wiped clean
(5) None of these
515. The part of Computer system containing the circuitry that does the addition, subtraction,
multiplication, division and comparison is called _______.
(1) Arithmetic and Logical Unit3 (2) Memory
(3) CPU
(4) Control Unit
(5) None of these
516. The vast network of computers that connects millions of people all over the world is called ____.
(1) Hypertext (2) LAN
(3) Web
(4) Internet3
(5) None of these
517. The Property that, when classes are arranged in a hierarchy, each class assumes the attributes and
methods of its ancestors is ________.
(1) Encapsulation
(2) Inheritance3
(3) Generalization
(4) Information hiding
(5) None of these
518. The software component of an expert system that draws conclusions is the ________.
(1) Model base (2) User Interface (3) Inference engine3(4) Data base (5) None of these
519. The attributes and methods for each object are stored in __________.
(1) An object instance
(2) An assembly structure
(4) An object repository3
(5) None of these

(3) An object connection

520. An E-R diagram is a graphic method of presenting __________.


(1) Entity classes and their relationships to primary keys
(2) Primary keys and their relationships to instances
(3) Entity classes and their relationships3
(4) Primary keys and their relationships to the system
(5) None of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-41

521. Which of the following is correct about output?


(1) It is what user gives to processor.
(2) It is what input devices give to processor.
(3) It is what processor gives to user.3
(4) It is what processor takes from memory.
(5) None of these
522. A computer in the network which holds collection of data and programmes for many PCs, is
called ___________.
(1) Server3
(2) Supercomputer
(3) Minicomputer
(4) Laptop
(5) None of these
523. Which of the following is a key that will erase information from the computers screen?
(1) Space
(2) Caps Lock
(3) Shi
(4) Backspace3
(5) Alt
524. Which of the following is a part of central processing unit of a computer system?
(1) Control Unit
(2) Arithmetic Logic Unit
(3) Registers
(4) All the above3
(5) Only 1) and 2)
525. Which of the following occurs naturally when you use a disk frequently, creating, deleting, and
modifying files on a computer system?
(1) Encryption
(2) Fragmentation3
(3) Bad sector
(4) Buffer
(5) Bug
526. To locate a word or phrase in a document easily and quickly in MS Word application, use
________ command.
(1) Enter
(2) Home
(3) End
(4) Find3
(5) Replace
527. Which of the following is NOT a hardware component of a computer system?
(1) compiler3 (2) Switch
(3) Router
(4) Modem
(5) Repeater
528. In order to secure that your data remain intact even when the computer is turned off, you need to
save it to
(1) Motherboard
(2) RAM
(3) Secondary memory3
(4) BIOS
(5) None of these
529. Which of the following is the most common shared resource in a computer network?
(1) Keyboard
(2) Mouse
(3) Combo drive (4) Speaker
(5) Printer3
530. Which of the following Separates a file extension from the filename?
(1) Asterisk
(2) Dot3
(4) Exclamation mark
(5) Dash

(3) Question mark

531. The simultaneous execution of two or more instructions is called


(1) Sequential access
(2) Reduced instruction set computing
(3) multiprocessing3
(4) disk mirroring
(5) None of these
532. Multiprogramming systems ________
(1) are easier to develop than single-programming systems.
(2) Execute each job faster.
(3) Execute more jobs in the same time period.3
(4) Use only one jobs large mainframe computer.
(5) None of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-42

533. A Website address is a unique name that identifies a specific ________ on the Web.
(1) Web browser
(2) Web site
(3) PDA
(4) Link3
(5) None of these
534. ______ are specially designed computer chips that reside inside other devices, such as your car or
your electronic thermostat.
(1) Servers
(2) Embedded computers3
(3) Robotic computers
(4) Mainframes
(5) None of these
535. A USB communication device that supports data encryption for secure wireless communication
for notebook users is called a ______.
(1) USB wireless network adapter3 (2) Wireless switch
(3) Wireless hub
(4) Router
(5) None of these
536. A(n) _____ language reflects the way people think mathematically.
(1) Cross- platform programming (2) 3GL business programming
(3) Event-driven programming
(4) Functional3

(5) None of these

537. What is the permanent memory built into your computer called?
(1) RAM
(2) Floppy
(3) CPU
(4) CD-ROM

(5) ROM3

538. The default view in Excel is ________ view.


(1) Work
(2) Auto
(3) Normal3

(5) None of these

(4) Roman

539. Which method is used most by the Indian banks to send amount from one city to the other?
(1) Internet
(2) EDI3
(3) TT
(4) Fax
(5) None of these
540. Following is not included in bio-metric identification:
(1) Finger print and palm print
(2 Geometry of hand and typing style3
(3 Height and weight
(4 Voice print and retina of the eye (5) All the above
541. Outlook Express is a (n) __________.
(1) E-Mail Client3
(2) Address Book
(4) All of these
(5) None of these

(3) Scheduler

542. Which shortcut key is used to start a new page in MS-Word?


(1) Shift + Alt + Enter
(2) Enter Key
(4) Ctrl + Enter3
(5) Shift + Enter

(3) Down Arrow Key

543. The ability of an OS to run more than one application at a time is known as _______.
(1) multitasking3
(2) time-sharing
(3) multi-user computing
(4) object oriented programming (5) None of these
544. Permanent instructions that a computer uses when it is turned on and that cannot be changed by
other instructions are contained in _________.
(1) ROM3
(2) RAM
(3) ALU
(4) REM
(5) None of these
545. Device drivers are _________.
(1) Experts who know to maximize the performance of devices3
(2) The innermost part of the operating system
(3) Small, special-purpose programs
(4) Tiny power cords for external storage devices
(5) Substitutes for operating systems
CSB, Ch-17, Ph: 044-24333346

Ck/Page-43

546. A collection of programs that controls how your computer system runs and processes
information is called ________.
(1) Operating system3
(2) compiler
(3) computing
(4) office
(5) interpreter
547. A device operating at the physical layer is called a _________.
(1) Router
(2) Bridge
(3) Repeater3
(4) All of these
548. For separating channels in FDM, it is necessary to use _________.
(1) Differentiation
(2) Bandpass filters3
(4) All the above
(5) None of these

(5) None of these

(3) Time slots

549. Which of the following elements in the word document can be displayed in colour?
(1) All elements, but only if you have a colour printer
(2) Only graphics
(3) All elements3
(4) Only text
(5) None of these
550. A complete electronic circuit with transistors and other electronic components on a small silicon
chip is called ________.
(1) CPU
(2) Magnetic disk (3) Workstation (4) Integrated circuit3
(5) None of these
551. Which hardware device acts as both a switching and connecting unit?
(1) RS-232 C Port
(2) Concentrator
(4) Communication processor
(5) None of these

(3) Multiplexer3

552. Which device is assembles groups of characters into complete messages prior to their entering the
CPU?
(1) An interpreter
(2) A complier
(3) A communications processor3 (4) An editor
(5) A translator
553. What is means by CD-ROM?
(1) Compactable Read Only Memory
(2) Compact Data Read Only Memory
(3) Compactable Disk Read Only Memory
(4) Compact Disk Read Only Memory3
(5) Connected Disk Read Only Memory
554. Which of the following terms refers to the ability of a computer to automatically configure a new
hardware component that is added to it?
(1) Formatting
(2) Multiprocessing
(3) Multiprogramming
(4) Multitasking
(5) Plug and play3
555. Which part of computer can touch and feel?
(1) Hardware3 (2) Software
(3) Programs

(4) Output

(5) None of these

556. A series of instructions that tells a computer what to do and how to do it is called a
(1) Program3 (2) Command
(3) User response (4) Processor
(5) None of these
557. The portion of the CPU that coordinates the activities of all the other computer computer
components is the
(1) Motherboard
(2) Coordination board
(3) Control unit3
(4) Arithmetic logic unit
(5) None of these
558 To access a mainframe or supercomputer, user often use a
(1) Terminal3 (2) Node
(3) Desktop
(4) Handheld
CSB, Ch-17, Ph: 044-24333346

(5) None of these


Ck/Page-44

559 Something which has easily-understood instructions is said to be


(1) User-friendly3
(2) Information
(4) Icon
(5) None of these

(3) Word processing

560. A flaw in a program that causes it to produce incorrect or in appropriate results is called a_____
(1) Bug3
(2) Byte
(3) Attribute
(4) Unit problem (5) None of these
561. Acronym- WWW stands for __________.
(1) World Web is Widening
(2) World Wide Web3
(3) Wonderful World Web
(4) World Word in Wonder

(5) None of these

562. What is Active Desktop?


(1) A feature to customize your desktop to display information you can update from the internet
(2) A term that is synonymous with viewing your desktop as a webpage
(3) Both (1) and (2) above mentioned3
(4) A Software
(5) None of these
563. Active window means ______
(1) The window that is currently open
(2) The active window is designed by a different color toolbar than other open windows
(3) Both (1) and (2) above mentioned3
(4) The window that is last used
(5) None of these
564. A bitmap is _______
(1) Is a format which windows use for desktop wall paper
(2) A graphic file format made up of small dots
(3) A specific kind of bitmap file with BMP extension
(4) All the above3
(5) None of these
565. Which of the following printers generates character from a grid?
(1) Inkjet
(2) Laser
(3) Daisy Wheel (4) Dot matrix3

(5) None of these

566. Close Button


(1) When clicked will close the dialog box, document or program displayed in the window
(2) Is located as the right end of the title bar of most windows
(3) Implies for the small button with an X on it
(4) All of the above3
(5) None of these
567. A dialog box is a one _______.
(1) Which is a sort of on-screen from where you can fill in the blanks, make selection from list
and choose various combinations of options and settings3
(2) In which you can connect to another Internet user and establish a audio and video contact
using Microsoft Word
(3) In which you can give verbal commands to Microsoft word menu
(4) All of the above
(5) None of these
568. A letter, memo, proposal or other file that is created using Microsoft Word is called as _________.
(1) slide
(2) master
(3) document3 (4) worksheet
(5) None of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-45

569. The meaning of double click is _______


(1) Pushing and releasing the main mouse button twice in rapid succession when the on-tree
mouse pointed is positioned over the desired item.3
(2) Appearance of a icon
(3) To take a selection from the document and move it to the clipboard
(4) All of the above
(5) None of these
570. A folder _________
I. is an organizational tool used to store files.
II. is synonymous with directory, but folder is the newer preferred term
III. contains data
(1) I only
(2) II only
(3) III only
(4) I & II only
(5) None of these3
571. Ethernet, LAN, Token Ring and Token Bus are the types of ________.
(1) WAN
(2) Communication Channels
(4) Physical Medium
(5) None of these
572. Which protocol provides E-mail facility among different hosts?
(1) SMTP3
(2) FTP
(3) TELNET
(4) SNMP
573. 192.9.200.153 is an ________
(1) Ethernet Address
(4) Software Coding

(2) IP Address3
(5) None of these

(3) LAN3

(5) None of these

(3) Computer Address

574. The Storage that supplements that primary internal storage of a computer is known as _________.
(1) Secondary storage 3
(2) Primary storage
(3) Back-end storage
(4) Back ground storage
(5) None of these
575. A browser is a ________
(1) Line that delineates the edge of a program window
(2) Software program especially designed for viewing web pages on the internet3
(3) Tool for resizing the window
(4) Device used for modifying the window
(5) All of these
576. A folder _______
I. is an organizational tool used to store files
II. is synonymous with directory, but folder is the newer preferred term
III. Contains data
(1) I only
(2) II only
(3) III only
(4) I & III only
(5) None of these3
577. The part of a computer system containing the circuitry that does the adding, subtracting,
multiplying, dividing and comparing, is called as _______
(1) Arithmetic-logic unit3
(2) Control
(3) Memory
(4) CPU
(5) None of these
578. A browser is a ________
(1) Line that delineates the edge of a program window
(2) Software program especially designed for viewing web pages on the internet3
(3) Tool for resizing the window
(4) Device used for modifying the window
(5) All of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-46

579. The storage that supplements the primary internal storage of a computer is known as _______
(1) Secondary storage3
(2) Primary storage
(3) Back-end storage
(4) Background storage
(5) None of these
580. The storage device used to compensate for the difference in rates of flow of data from one device
to another is termed as ________
(1) Chip
(2) Channel
(3) Floppy
(4) Call
(5) Buffer3
581. ALU stands for ________
(1) Arithmetic Long Unit
(4) Around Logical Unit

(2) Arithmetic and Logical Unit3


(5) None of these

582. Which of the following is not an input device?


(1) Mouse
(2) Keyboard
(3) Light Pen

(4) VDU3

(3) All Longer Unit

(5) None of these

583. A light-sensitive device that converts drawings, printed text or other images into digital from is__
(1) Keyboard
(2) Plotter
(3) Scanner3
(4) OMR
(5) None of these
584. What are the units used to count the speed of a printer?
(1) PPM
(2) CPM
(3) DPI
(4) BIT3

(5) None of these

585. MICR stands for ________


(1) Magnetic Ink Character Recognition3
(2) Magnetic Ink Computer Record
(3) Magnetic Industries Corporation Region
(4) Microphone Recording
(5) None of these
586. What do you understand by the term booting?
(1) The process of starting the computer from the power-off position3
(2) Connecting the computer to the electric switch
(3) Increasing the memory of the computer
(4) The process of shut down the computer
(5) None of these
587. Outlook express is a __________.
(1) E-mail Client
(4) All of these3

(2) Scheduler
(5) None of these

588. What program is used in MS-Word to Check the Spelling?


(1) Spellpro
(2) Spell check3
(4) All of these
(5) None of these
589. How many types of drawing objects are available in drawing toolbar?
(1) 4
(2) 5
(3) 103
(4) 12

(3) Address Book

(3) Outlook Express

(5) None of these

590. What will happen when a text was selected and copied?
(1) Text would copied from the documents and placed in the clipboard3
(2) Text would be removed from the document and placed in the clipboard
(3) Text from the clipboard would be placed in the documents at the place where the cursor is
blinking
(4) Only (2) and (3)
(5) None of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-47

591. Group of letters, numbers, and symbols with a common typeface is called as ________.
(1) File
(2) Font3
(3) Style
(4) GUI
(5) None of these
592. What is the name of the blinking point that shows your position in the text?
(1) Blinker
(2) Cursor3
(3) Causer
(4) Pointer
(5) Mouse
593. What is the common name for the physical components that make up your computer?
(1) Operating System
(2) Software
(3) Hardware3
(4) Web Browsers
(5) Mother Components
594. Which of the below key is used in combination with another key to perform a specific task?
(1) Function
(2) Space bar
(3) Arrow
(4) Control3
(5) Num Lock
595. Which type of memory holds the program to start up the computer?
(1) ROM3
(2) RAM
(3) Cache
(4) Static
596. What is the name of the program that used to view web pages?
(1) Word Processor
(2) Spreadsheet
(4) Browser3
(5) Database

(5) Dynamic

(3) Protocol

597. Un solicited commercial email is commonly known as?


(1) Spam3
(2) Junk
(3) Hoaxes
(4) Hypertext

(5) Archived

598. ________ is processed by the computer into information?


(1) Numbers
(2) Processor
(3) Input
(4) Data3

(5) Output

599. Which of the following is an operation that cannot be carried out on objects in graphic program?
(1) Spell Check3
(2) Change Size
(3) Rotate
(4) Change Colour
(5) None of these
600. What is the name of the hardware device that converts data into useful information?
(1) Protector
(2) Output Device (3) Input Device (4) Programme
(5) Processor3
601. The SCANDISK program _______.
(1) is a disk analysis and repair tool3
(3) scans disk and eliminate .BAK files

(2) scans disk and eliminate viruses


(4) all the above
(5) None of these

602. Soft page breaks _______.


(1) are induced by the user
(2) are inserted by word automatically at the end of the page3
(3) can be deleted
(4) are the one to show end of the paragraph
(5) None of these
603. When excel copies a formula from one cell to another, it identifies the number it needs by ______
(1) position3
(2) cell address
(3) cell values
(4) any of the above
(5) None of the above
604. What is a database?
(1) It is a collection of data arranged in rows
(2) It is a collection of data arranged in columns
(3) It is a collection of data arranged in rows and columns3
(4) All of these
(5) None of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-48

605. Which option in Power Point allows carrying slides from one computer to another?
(1) Save as
(2) Save and Go (3) Pack and Go3 (4) Web and Go (5) None of these
606. The ground station in VSAT communication is called ___________.
(1) HTTP
(2) Multiplexer3 (3) Hub
(4) Repeater
607. For a small website, one needs to buy space from the __________.
(1) Network administrator
(2) Telephone exchange
(4) Internet Society
(5) None of these

(5) None of these

(3) ISP3

608. The Web server can be addressed by either its domain name or by the address in numerical _____.
(1) Network Host3
(2) IRC Network
(3) Archie
(4) Gopher
(5) None of these
609. Capability of computer to perform more than one tasks at the same time is ________.
(1) Real Time Processing
(2) Batch Processing
(3) Multitasking3
(4) Scheduled Processing
(5) None of these
610. ____________ computer applications are those which involve some other media, together with
ordinary text and images and computer capabilities. Common other media types are audio and
video.
(1) Visual
(2) Multimedia3 (3) MP3 Songs
(4) Computer Game
(5) None of these
611. Magnifier button is available on
(1) Print Preview toolbar3
(4) Both on a arid c

(2) Standard toolbar


(5) None of the above

(3) Formatting toolbar

612. How many type of database objects are there in MS-Access ?


(1) 5
(2) 6
(3) 73
(4) 8

(5) None of these

613. Why we use the input mask in MS-Access?


(1) For formatting of text
(2) For alignment of text
(3) For formatting of numbers3
(4) Ole

(5) None of these

614. Name an advanced language with which you can create new report and screens
(1) VATL
(2) TDL
(3) DLR3
(4) Any of the above
(5) None of the above
615. Name the accounts related with intangible and invisible things which do not have a specified
shape
(1) Personal Accounts
(2) Nominal Accounts3
(3) Real Accounts
(4) Any of the above
(5) None of the above
616. We often use ____________ for World Wide Web.
(1) Network
(2) Server
(3) Web3

(4) E-Resources

(5) None of these

617. Which of the following is not a network device


(1) Router
(2) Switch
(3) Modem3

(4) Bridge

(5) None of these

618. The communication protocol used by internet is:


(1) HTTP
(2) WWW
(3) TCO/IP3

(4) All of the above (5) None of these

619. The first page that you normally view at a Web site is its:
(1) Home page3(2) Master page (3) First page
(4) Banner page
CSB, Ch-17, Ph: 044-24333346

(5) None of these


Ck/Page-49

620. Which is the most important part of an operating system?


(1) Shell
(2) Kemel3
(3) Device drivers (4) Extra services (5) None of these
621. Which of the following statements is/are true?
(1) Cache Memories are bigger than RAM
(2) Cache Memories are smaller than RAM3
(3) ROM are faster than RAM
(4) Information in ROM can be written by users
(5) None of these
622. MOS stands for _______.
(1) Most Often Stored
(3) Method Organized Stack

(2) Metal Oxide Semiconductor3


(4) All of the above

(5) None of the above

623. Size of the Primary memory of a PC ranges between _________.


(1) 2KB to 8KB (2) 64KB to 256KB (3) 20KB to 40KB (4) 256KB to 640KB3
624. Read only memory is permanently ________ in computer.
(1) Input3
(2) Tapped
(4) Manufactured and control
(5) None of these

(5) None of these

(3) Sealed

625. Which of the following companies is a leader in manufacturing of Hard Disk Drives?
(1) Samsung
(2) Seagate3
(3) Fujitsu
(4) IBM
(5) Panasonic
626. A Browser is a ________.
(1) Tool for creating a database
(2) Software program to view web pages on the internet3
(3) Printing device
(4) Software program to delete a folder
(5) None of the above
627. The first UNIX operating system was written in the _________.
(1) Assembly Language3
(2) C Language
(4) B Language
(5) None of these

(3) Java

628. VIRUS stands for ________.


(1) Very Important Record User Searched
(2) Verify Interchanged Result Until Source
(3) Virtual Information Resource Under Seize3
(4) Very Important Resource Under Search
(5) None of these
629. Which one of the following is not an Internal DOS command?
(1) PATH
(2) COPY
(3) XCOPY3
(4) VER

(5) None of these

630. The server on the Internet is also known as a _________.


(1) Repeater
(2) Host3
(3) Gateway
(4) ISP

(5) None of these

631. What menu is selected to print?


(1) File3
(2) Tools

(5) None of these

(3) Social

(4) Edit

632. Programs or a set of electronic instructions that tell a computer what to do are called
(1) Menu
(2) Monitor
(3) Hardware
(4) Software3
(5) None of these
CSB, Ch-17, Ph: 044-24333346

Ck/Page-50

633. A(n) ________ contains commands that can be selected.


(1) Pointer
(2) Menu3
(3) Icon
(4) Button
634. A software which you can use to create a budget is called
(1) Word processing software
(2) Graphics Software
(4) Spreadsheet software3
(5) None of these
635. The mouse __________ usually appears in the shape of an arrow.
(1) Indicator
(2) Marker
(3) Meter
(4) Pointer3

(5) None of these

(3) Utility software

(5) None of these

636. If a processer has a word size of 32 bits, compared to a processor with a word size of 16 bits, it can
process _______ at a time.
(1) Thrice as much
(2) Half as much
(3) A fourth as much
(4) The same amount
(5) Twice as much3
637. To access the properties of an object, the mouse technique used is called
(1) Dragging
(2) Dropping
(3) Right-clicking3
(4) Shift-clicking
(5) None of these
638. The ________ becomes of different shapes depending on the task you are performing.
(1) Active tab
(2) Insertion point
(3) Mouse pointer3
(4) Ribbon
(5) None of these
639. To print a document, press _______, then press ENTER.
(1) SHIFT+P
(2) CTRL+P3
(3) ALT+P
(4) ESC+P

(5) None of these

640. Multiplexing involves _______ path(s) and _______ channel(s).


(1) One, One
(2) One, Multiple3
(4) Multiple, Multiple
(5) None of these

(3) Multiple, One

641. Which of the following are objects in an access database?


(1) Table, form
(2) Queries, reports
(4) All the above3
(5) None of these

(3) Macros, modules

642. __________ are distinct items that dont have much meaning to you in a given context.
(1) fields
(2) Data3
(3) Queries
(4) Properties
(5) None of these
643. A Website address is a unique name that identifies a specific_________ on the web.
(1) Web Browser
(2) PDA
(3) PDF
(4) Link3
(5) None of these
644. An Example of a telecommunications device is a _________.
(1) Keyboard
(2) mouse
(3) printer
(4) modern3

(5) None of these

645. A ________ contains buttons and menus that provide quick access to commonly used commands.
(1) toolbar3
(2) menu bar
(3) window
(4) Find
(5) None of these
646. The particular field of a record that uniquely identifies each record is called the_____.
(1) Key field
(2) Primary field3 (3) Master field (4) Order field
(5) None of these
647. A ___________ is an example of an input device.
(1) Keyboard3
(2) Monitor
(4) Central Processing Unit
(5) None of these
CSB, Ch-17, Ph: 044-24333346

(3) plotter

Ck/Page-51

648. What is Output?


(1) What Processor takes from user
(2) What user gives to processor
(3) What processor gets from user
(4) What processor gives to user3
(5) None of these
649. The blink symbol which indicates the next character will appear at which place, is called?
(1) Delete key (2) Control Key (3) Cursor3
(4) Return Key
(5) None of these
650. A small figure which depicts some application on the screen is called?
(1) Menu
(2) Photo
(3) Modern
(4) Icon3

(5) None of these

651. Data moves through the network in a structure is called _______


(1) Packets3
(2) Payload
(3) Data grams
(4) Tokens

(5) None of these

652. The operation of subnet is controlled by _______


(1) Network layer3
(2) Data link Layer
(4) Transport Layer
(5) None of these
653. The binary system users powers of ________
(1) 23
(2) 10
(3) 8

(4) 16

(3) Data Layer

(5) None of these

654. Which access method is used for obtaining a record from a cassette tape?
(1) Direct
(2) Sequential3 (3) Random
(4) All of the above

(5) None of these

655. A common boundary between two systems is called __________


(1) Interdiction (2) Interface3
(3) Surface
(4) All of the above

(5) None of these

656. Which is non standard version of a computing language?


(1) PROLOG
(2) APL
(3) Army3
(4) PL / 1

(5) None of these

657. Which of the following is still useful for adding numbers?


(1) EDSAC
(2) ENIAC
(3) Abacus3
(4) UNIVAC

(5) None of these

658. An optical input device that interprets pencil marks on paper media is
(1) OMR3
(2) Punch card reader
(3) Optical Scanner
(4) Magnetic tape
(5) None of these
659. Who is known as the father of supercomputing?
(1) Charles Babbage
(2) Bill Gates
(4) Ada Augusta
(5) None of these

(3) Seymour Cray3

660. The complete picture of data stored in database is known as


(1) Record
(2) Schema3
(4) DBMS
(5) None of these

(3) System flowchart

------

CSB, Ch-17, Ph: 044-24333346

Ck/Page-52

You might also like