Computer Awareness 2809
Computer Awareness 2809
Computer Awareness 2809
STUDENT
FARMAYISH
BANK|SSC|RAILWAY|INSURANCE
COMPUTER AWARENESS
copyright@studentfarmayishyoutube Page 1
STUDENT FARMAYISH
INTRODUCTION OF COMPUTER:
1.IC is made up of?
ANS: d
2. Integrated Chips or IC’s were started to be in use from which generation of Computers?
a) 1st Generation b) 2nd Generation c) 3rd Generation d) 4th Generation e) 5th Generatio
ANS: c
ANS: b
a)1st generation b)2nd generation c)3rd generation d)4th generation d)5th generation
ANS: b
5.AT&T designed its first commercial modem, specifically for converting digital computer data to analog signals for
transmission across its long distance network. What is the name of the modem?
(a) Telex (b) Memex (c) CompuServe (d) Bell 103 dataset (e) Dataphone
ANS: e
ANS: c
ANS: d
ANS: b
ANS: a
a) Charles Babbage b) Blasie Pascal c)John Nepier d) Lady Augusta Ada e) Howard Aiken
ANS: d
a) Charles Babbage b) Blasie Pascal c)John Nepier d) Lady Augusta Ada e) Alan Turing
ANS: e
ANS: c
ANS: e
14. Which among the following is the smallest unit in an image in a computer screen?
(a) Unit (b) Pixel (c) Array (d) Resolution (e) Clip
ANS: b
ANS: b
ANS: a
ANS: c
copyright@studentfarmayishyoutube Page 3
STUDENT FARMAYISH
18.Data or information used to turn to run the computer is called?
ANS: d
19. Which of the following is the smallest and fastest computer imitating brain working ?
ANS:b
ANS: a
21. A central computer that holds collections of data and programs for many PCs,workstations and other
computer is called ?
ANS: e
ANS: b
ANS: b
a)1st generation b)2nd generation c)3rd generation d)4th generation e)5th generation
ANS: a
a)1st generation b)2nd generation c)3rd generation d)4th generation e)5th generation
ANS: c
a)1st generation b)2nd generation c)3rd generation d)4th generation e)5th generation
ANS: e
copyright@studentfarmayishyoutube Page 4
STUDENT FARMAYISH
a)machine language b) high level language c)assembly language d)COBOL d)none of these
ANS: a
a)1st generation b)2nd generation c)3rd generation d)4th generation e)5th generation
ANS: b
ANS: c
ANS: a
a)1st generation b)2nd generation c)3rd generation d)4th generation e)5th generation
ANS: b
ANS: c
33.Which computer is used for weather forcasting,fluid dynamics and graphic design?
ANS: a
ANS: d
copyright@studentfarmayishyoutube Page 5
STUDENT FARMAYISH
a) supercomputer b)minicomputer c) micro computer d) main frame computer e)digital computer
ANS: c
ANS: e
ANS: e
38.A hybrid computer is the one having the combined properties of?
a)super and micro b)mini and micro c)analog and digital d)super and mini e)none of these
ANS: c
a)1st generation b)2nd generation c)3rd generation d)4th generation e)5th generation
ANS: a
40. Servers are computers that provide resources to other computers connected to a ?
ANS: a
a)1st generation b)2nd generation c)3rd generation d)4th generation e)5th generation
ANS: d
ANS: a
a) Electronic Delay Storage Automatic Calculator b) Electronic Data Storage Automatic Computer c) Electronic
Delay Strong Automatic Computer d) Electronic Delay Storage Automatic Computer e) none of these
ANS: a
copyright@studentfarmayishyoutube Page 6
STUDENT FARMAYISH
a) Electronic Discrete Variable Automatic Computer b) Electronic Discrete Value Automatic Computer
c) Electronic Device Variable Automatic Computer d) Electronic Discrete Variable Automatic Calculator
e)none of these
ANS: d
ANS: d
ANS: e
a)input,output and processing b)control unit,primary storage and secondary storage c)control unit,arithmetic
logic unit,memory unit d)all of the above e)none of the above
ANS: c
3.What are the special purpose and high speed temporary unit memory?
ANS: a
ANS: a
ANS: a
ANS: d
a)coordinates input and output devices b)is the container that houses electronic components
copyright@studentfarmayishyoutube Page 7
STUDENT FARMAYISH
c)is s combination of hardware and software d)control and manipulates data e)none of these
ANS: b
8.The main circuit board in the computer that connects the parts of computer is the
ANS: a
9.Arithmetic logic unit and control unit sections have special purpose locations called?
ANS: a
ANS: b
11.Which component is required to process data into information and consists of integrated circuit?
ANS: d
ANS: a
a)arithmetic and logic unit b)arithmetic logic unit c)arithmetic legal unit d)application and logic unit e)none
of these
ANS: b
14. Which among the following is an important circuitry in a computer system that directs the operation of the
processor?
ANS: e
(a) Program counter (b) Instruction registers (c) Instruction decoder (d) Parity generator (e) Accumulator
ANS: e
copyright@studentfarmayishyoutube Page 8
STUDENT FARMAYISH
16. Which of the following memory has stored data in large number?
(a) RAM (b) ROM (c) Cache memory (d) Hard Disk (e) None of these
ANS : D
a) ALU b) Control Unit c) Storage unit d) Control bus e) None of the above
ANS: a
ANS: b
19. ------------ controls the way in which the computer system functions and provides a means by which users can
interact with the computer.
a)The Platform b)The Operating System c) Application Software d)The Motherboard e)NOTA
ANS: b
a) RAM is a temporary storage area b) RAM is the same as hard disk storage c) RAM is volatile
d) Information stored in RAM is gone when you turn the computer off e) None of these
ANS: b
ANS: a
22.RAM is an example of
a) Secondary memory b) Primary memory c) Both (a) and (b) d) None of the above e)main memory
ANS: b
23. Each memory cell has a unique number, assigned to it is called as the ___ of the cell
ANS: a
a) Auxiliary Memory b) Attractive Memory c) Chip Memory d) None of the above e)both a and b
ANS: a
copyright@studentfarmayishyoutube Page 9
STUDENT FARMAYISH
25. What is the difference between a CD- ROM and a CD-RW ?
a) They are the same—just two different terms used by different manufacturers
b) A CD-ROM can be written to and a CD- RW cannot c) A CD-RW can be written to, but a CD- ROM can only be
read from d) A CD-ROM holds more information than a CD-RW e) None of these
ANS : c
b)CD-ROM disks retrieve data and information more quickly than magnetic disksdo
c)All of the above d)CD-ROMs make less errors than magnetic media e) None of these
ANS: a
ANS: e
c)the computer and all the devices connected to it that are used to input and output data
d)all devices involved processing information including the central processing unit, memory, and storage
e)None of these
ANS: c
ANS: a
30……is when the more power-hungry components,such as the monitor and the hard drive,are put in idle.
a)hibernation b)power down c)standby mode d)the standdown procedure e)none of these
ANS: c
ANS: a
32. Holding the mouse button down while moving an object or text is known as—
copyright@studentfarmayishyoutube Page 10
STUDENT FARMAYISH
a) Moving b) Dragging c) Dropping d) Highlighting e) None of these
ANS : b
Ans: c
ANS: d
a)add-on device b)peripherals c)extra hardware device d)PC expansion slot add-on e)none of these
ANS: b
ANS: d
a)magnetic ink character reader b) magnetic ink character register c) magnetic ink code reader
ANS: e
ANS: b
ANS: c
a)larger the pixel b)less cler the screen is c)further apart the pixel d)closer together the pixels
e)none of these
ANS: d
copyright@studentfarmayishyoutube Page 11
STUDENT FARMAYISH
a)It shows the position on a computer monitor b)It is an indicator c)All of the above
ANS: c
42. Which of the following is used to indicate the location on the computer monitor ?
a) Mouse b) Cursor c) Both (a) and (b) d) None of the above e)priter
ANS: b
ANS: d
44.If a disk drive fails but the computer application running and using it can continue processing, this application is
said to have been designed with this feature?
a) 100 per cent uptime b) fault tolerance c) high reliability d) All of these e) None of these
ANS : b
45……..devices convert human-understandable data and programs into a form that the computer can process?
ANS: e
a)laser printer b)dot matrix c)daisy wheel d)both a and b e)none of these
ANS: a
47.Which key is used in combination with another key to perform a specific task?
ANS: d
ANS: d
49.Which one of the following is an added set of one or more attributes taken collectively to uniquely identify a
record?
a) Alternate key b) Sub key c) Super key d) Foreign key e) None of these
ANS: c
copyright@studentfarmayishyoutube Page 12
STUDENT FARMAYISH
50.What is the function of control unit?
a) Providing resources to another node on a network b) Performing complex task of logical and arithmetic
functions c) Memory usage d) Directing the operation of the other units by providing timing and control
signals. e) Displaying output to the end-user
ANS: d
ANS: d
ANS: d
ANS: a
ANS: b
a)thermal printer b)drum printer c)laser printer d)line printer e)impact printer
ANS: c
ANS: b
a)move a cursor across the screen b)indent a paragraph c)move the cursor down the screen
ANS: b
59.Which key is used in combination with another key to perform a specific task?
copyright@studentfarmayishyoutube Page 13
STUDENT FARMAYISH
ANS: d
ANS: b
ANS: a
a)a storage device b)a processor c)a port type d)a serial bus standard e)none of these
ANS: c
ANS: d
64.Which among the given options does not have flash memory?
a) Pen Drive b) Hard Disk c) Car Radio d) Memory Cards e) Memory Stick
ANS: c
65.Which of the following is the high speed memory which compensates the gap in speeds of processor and main
memory?
ANS: d
66.Difference between memory and storage is that memory is……… and storage is……..
ANS: b
67.What is the temporary storage memory chips that form the computers primary work space,the contents are
lost if power is disrupted.
ANS: c
copyright@studentfarmayishyoutube Page 14
STUDENT FARMAYISH
ANS: b
69.The most frequently used instructions of a computer program are likely to be fetched from?
ANS: c
ANS: b
71.Which of the following is correct sequence of smallest to largest unit of storage size?
b) bit, byte, kilobyte, megabyte,gigabyte , terabyte ,exa byte, petabyte, yota byte, zetabyte
c) bit, byte, kilobyte, megabyte,gigabyte, yota byte, zetabyte, terabyte ,exa byte, petabyte
d) bit, byte, kilobyte, megabyte,gigabyte , terabyte , petabyte, ,exa byte, yota byte, zetabyte
e) bit, byte, kilobyte, megabyte,gigabyte , terabyte , petabyte, ,exa byte, zetabyte, yota byte
ANS: e
ANS: e
a)virtual memory b)flash memory c)cache memory d)hard disk e)none of these
ANS: b
74.Which of the following storage devices can be used for storing large backup data?
a)floppy disk b)hard disk c)magnetic tape d)all of these e)none of these
ANS: b
75………is a temporary physical storage used to hold data during execution or process from one place to another?
ANS: b
copyright@studentfarmayishyoutube Page 15
STUDENT FARMAYISH
ANS: c
a)character code b)binary code c)binary word d)parity bit e)none of these
ANS: b
a)slots b)peripheral devices c)CPU d)the back of the computer e)none of these
ANS: a
a)next to the printer b)plugged into the back of the computer c)underneath the monitor
ANS: e
80.Which among the given options does not have flash memory?
a) Pen Drive b) Hard Disk c) Car Radio d) Memory Cards e) Memory Stick
ANS: c
81.Which of the following is the high speed memory which compensates the gap in speeds of processor and main
memory?
ANS: d
82. A permanent memory, which halls data and instruction for start-up the computer and does not erase data
after power off.
a) Network interface card b)CPU c)RAM d)ROM e)None of these
ANS: d
83.Which of the following memories must be refreshed many times per second?
a) EPROM b)ROM c)Static RAM d)Dynamic RAM e)none of these
ANS: d
ANS: c
85. Which of the following places the common data elements in order from smallest to largest?
a) Character, File, Record, Field, Database, File b)Character, Record, Field, Database, File c)Character,
copyright@studentfarmayishyoutube Page 16
STUDENT FARMAYISH
Field, Record, File, Database d)Bit, Byte, Character, Record, Field, File, Database e)None of these
ANS: c
ANS: d
ANS: a
88. What is the permanent memory built into your computer called?
a) RAM b)ROM c)CPU d)CD-ROM e)None of these
ANS: b
ANS: c
90.Magnetic tape is not practical for applications where data must be quickly recalled because tape is
__________.
a) A random-access medium b)A sequential-access medium c)A read-only medium
ANS: b
91. What is the main advantage of magnetic core memory over semiconductor RAM memory?
a) More compact and smaller b)More economical c)A bit does not have to write after reading
ANS: d
92. Permanent instructions that the computer uses when it is turned on and that cannot be changed by other
instructions are contained in-
a) ROM b)RAM c)ALU d)CPU e)DRAM
ANS: a
93.Flash is ................
a) Software b)Hardware c)ROM d)EEPROM e)E REM
ANS: d
94. The faster, costlier and relatively small from of storage managed by computer system hardware is:
copyright@studentfarmayishyoutube Page 17
STUDENT FARMAYISH
ANS: c
95.Breaking logical memory into blocks of the same size is called as:
a) Frames b)Segments c)Packets d)Pages e)none of these
ANS: d
ANS: b
97.Which of the following memories must be refreshed many times per second?
a) Static RAM b)Dynamic RAM c) EPROM d)ROM e) None of these
ANS: b
98. A name or number used to identify a storage location devices?
a)Magnetic tape b)Magnetic disk c)Optical disk d)Hard disk e)None of these
ANS: e
100 The two kinds of main memory are:
a) Primary and secondary b) Random and sequential c) ROM and RAM d) All of above e)None of these
ANS: c
101.High density double sided floppy disks could store _____ of data
a) 1.40 MB b) 1.44 GB c) 1.40 GB d) 1.44 MB e) None of these
ANS: d
102.Fragmentation is –
a) dividing the secondary memory into equal sized fragments b) dividing the main memory into equal size
fragments c) f ragments of memory words used in a page d) f ragments of memory words unused in a page
e) None of these
ANS: a
a) Alternate key b) Sub key c) Super key d) Foreign key e) None of these
ANS: c
copyright@studentfarmayishyoutube Page 18
STUDENT FARMAYISH
a) Printer b)Scanner c)Joystick d)Window 10 e)Modem
ANS: e
106. ______ component is used for short - term data storage.
a)ROM b) DVD RAM c)Hard disc d)Both a and b e)RAM
ANS: e
107. Which key is pressed to move to the beginning of a line of text in a document?
a)Scrollbar b) Page up key c) Tab key d)Home Key e) Page down key
ANS: d
108. Which of the following function key is used to opens a search feature for many programs including Microsoft
windows when at the windows Desktop?
a) F1 b) F2 c) F3 d) F4 e) F5
ANS: c
109. Small application programs that run on a web page and may ensure a form is completed properly or provide
animation are known as
a) Cookies b) Cache c) Hyperlink d)Flash e)Spam
ANS: d
110. What does 'P' stand for in 'DPI'?
a) Protocol b) Page c) Per d)Pixel e) paper
ANS: c
111. _______ is a component of the motherboard, which is used to travel information.
a) ALU b) Chip c)Port d)CMOS e)Bus
ANS: e
ANS: c
ANS: d
ANS: d
copyright@studentfarmayishyoutube Page 19
STUDENT FARMAYISH
115. _______ is the combination of a scanner and special software which converts the printed or handwritten data
to ASC II.
a) OCR b) MICR c) OMR d)Kimball tag reader e)Other than the given options
ANS: a
116. Which of the following key (s) on the keyboard is/are called modifier keys?
a)Alt key b)Ctrl key c)Shift key d)All of these e) Other than the given options
ANS: d
ANS: a
ANS: b
119. Different components on the motherboard of a PC unit are linked together by se ts of parallel electrical
conducting lines. What are these lines called?
ANS: b
120. Which of the following places the common data elements in order from smallest to largest?
a) Character, file, record, field, database b) Character, record, field, file, database c) Character, field, record,
file, database d) Bit, byte, character, record, field, file, database e) None of these
ANS: d
ANS: b
a) Virtual Memory b) Secondary Memory c) Cache Memory d) All of the above e)none
ANS: c
ANS: d
copyright@studentfarmayishyoutube Page 20
STUDENT FARMAYISH
124. The main advantage of hexadecimal numbers is the case of conversion from hexadecimal to…….
ANS: b
125.Amemory that does not change its contents without external causes is known as…………..
ANS: b
copyright@studentfarmayishyoutube Page 21
STUDENT FARMAYISH
ANS: b
9. The structure or format of data is called ___________
a) Syntax b) Semantics c) Struct d) Formatting e)none of these
ANS: a
10. Communication between a computer and a keyboard involves ______________ transmission.
a) Automatic b) Half-duplex c) Full-duplex d) Simplex e)none of these
ANS: d
11.The first Network was called ________
a) CNNET b) NSFNET c) ASAPNET d) ARPANET e)none of these
ANS: d
12. Three or more devices share a link in ________ connection.
a) Unipoint b) Multipoint c) Point to point d) Simplex e)none of these
ANS: b
13. Two devices are in network if __________
a) a process in one device is able to exchange information with a process in another device
b) a process is running on both devices c) PIDs of the processes running of different devices are same
d) a process is active and another is inactive d)none of these
ANS: a
14. Bluetooth is an example of __________
a) personal area network b) local area network c) virtual private network d) wide area network
e)none of these
ANS: a
15. A __________ is a device that forwards packets between networks by processing the routing information
included in the packet.
a) bridge b) firewall c) router d) hub e)none of thee
ANS: c
16. Which of the following networks extends a private network across public networks?
a) local area network b) virtual private network c) enterprise private network
d) storage area network d) personal area network
ANS: b
17.How many layers are present in the Internet protocol stack (TCP/IP model)?
a) 5 b) 7 c) 6 d) 10 e)8
ANS: a
18.The number of layers in ISO OSI reference model is __________
a) 5 b) 7 c) 6 d) 10 e)8
ANS: b
19. Which of the following layers is an addition to OSI model when compared with TCP IP model?
a) Application layer b) Presentation layer c) Session layer d) Session and Presentation layer
copyright@studentfarmayishyoutube Page 22
STUDENT FARMAYISH
e)none of these
ANS: d
20. The functionalities of the presentation layer include ____________
a) Data compression b) Data encryption c) Data description d) All of the mentioned e)none of these
ANS: d
21. Bluetooth is an example of which of the following networks?
a) Personal area network b) Local area network c) Virtual private network
d) None of the above e) Wireless fidelity
ANS: a
22. Delimiting and synchronization of data exchange is provided by __________
a) Application layer b) Session layer c) Transport layer d) Link layer e)none of these
ANS: b
23. Which of the following statements can be associated with OSI model?
a) A structured way to discuss and easier update system components b) One layer may duplicate lower layer
functionality c) Functionality at one layer no way requires information from another layer
d) It is an application specific network model e)none of these
ANS: c
24. Which layer is responsible for process to process delivery in a general network model?
a) network layer b) transport layer c) session layer d) data link layer e)none of these
ANS: b
25. Which address is used to identify a process on a host by the transport layer?
a) physical address b) logical address c) port address d) specific address e)none of these
ANS: c
26.Which layer provides the services to user?
a) application layer b) session layer c) presentation layer d) physical layer e)none of these
ANS: a
27. Transmission data rate is decided by ____________
a) network layer b) physical layer c) data link layer d) transport layer e)none of these
ANS: b
28. Which layer is used to link the network support layers and user support layers?
a) session layer b) data link layer c) transport layer d) network layer e)none of these
ANS: c
29. TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer b) transport layer c) application layer d) network layer e)none of these
ANS: a
30. The physical layer is concerned with ___________
a) bit-by-bit delivery b) process to process delivery c) application to application delivery d) port to port delivery
copyright@studentfarmayishyoutube Page 23
STUDENT FARMAYISH
e)none of these
ANS: a
31. Which transmission media provides the highest transmission speed in a network?
a) coaxial cable b) twisted pair cable c) optical fiber d) electrical cable e)none of these
ANS: c
32. The physical layer provides __________
a) mechanical specifications of electrical connectors and cables b) electrical specification of transmission line
signal level c) specification for IR over optical fiber d) all of the mentioned e)none of these
ANS: d
33. The physical layer translates logical communication requests from the ______ into hardware specific
operations.
a) data link layer b) network layer c) trasnport layer d) application layer e)none of these
ANS: a
34. A single channel is shared by multiple signals by ____________
a) analog modulation b) digital modulation c) multiplexing d) phase modulation e)none of these
ANS: c
35. The data link layer takes the packets from _________ and encapsulates them into frames for transmission.
a) network layer b) physical layer c) transport layer d) application layer e)none of these
ANS: a
36. The network layer is concerned with __________ of data.
a) bits b) frames c) packets d) bytes e)none of these
ANS: c
37. A 4 byte IP address consists of __________
a) only network address b) only host address c) network address & host address
d) network address & MAC address e)none of these
ANS: c
38. A subset of a network that includes all the routers but contains no loops is called ________
a) spanning tree b) spider structure c) spider tree d) special tree e)none of these
ANS: a
39. The network layer protocol for internet is __________
a) Ethernet b) internet protocol c) hypertext transfer protocol d) file transfer protocol e)none of these
ANS: b
40. ICMP is primarily used for __________
a) error and diagnostic functions b) addressing c) forwarding d) routing e)none of these
ANS: a
41. Transport layer aggregates data from different applications into a single stream before passing it to……………..
a) network layer b) data link layer c) application layer d) physical layer e)none of these
ANS: a
copyright@studentfarmayishyoutube Page 24
STUDENT FARMAYISH
42. Which of the following are transport layer protocols used in networking?
a) TCP and FTP b) UDP and HTTP c) TCP and UDP d) HTTP and FTP e)none of these
ANS: c
43. Transmission protocol ___________
a) is a connection-oriented protocol b) uses a three way handshake to establish a connection
c) receives data from application as a single stream d) all of the mentioned e)none of these
ANS: d
44. An endpoint of an inter-process communication flow across a computer network is called __________
a) socket b) pipe c) port d) machine e)none of these
ANS: a
45. Transport layer protocols deals with ____________
a) application to application communication b) process to process communication
c) node to node communication d) man to man communication e)all of the above
ANS: b
46. Physical or logical arrangement of network is __________
a) Topology b) Routing c) Networking d) Control e)none of these
ANS: a
47. Data communication system spanning states, countries, or the whole world is ________
a) LAN b) WAN c) MAN d) PAN e)none of these
ANS: b
48. Data communication system within a building or campus is________
a) LAN b) WAN c) MAN d) PAN e)none of these
ANS: a
49. Which network topology requires a central controller or hub?
a) Star b) Mesh c) Ring d) Bus e)none of these
ANS: a
50._______ topology requires a multipoint connection.
a) Star b) Mesh c) Ring d) Bus e)none of these
ANS: d
51.The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing b) Multiplexing c) Micropleixng d) Duplexing e)none of these
ANS: b
52. Which of the following scrambles a message by applying a secret code?
a) Audits b) Encryption c) UPS d) Firewalls e) Encapsulation
ANS: b
53. If you are allowing a person on the network based on the credentials to maintain the security of your network,
then this act refers to the process of ______.
a) Authentication b) Automation c) Firewall d) Encryption e) Decryption
copyright@studentfarmayishyoutube Page 25
STUDENT FARMAYISH
ANS: a
54.There is a network that can connect networks ranging from small location or area to a bigger range including
public packet network and large corporate networks. That network's enterprise allows users to share access to
applications, services and other centrally located resources. Its ability for a huge geographical access has
transformed networking. Which among the following is that network?
a) SAN b) CAN c) LAN d) WAN e) MAN
ANS: d
55. Free-of-cost repair of software bug available at Internet is called
ANS: d
a) Cheap but slow b) More consumption of power and much costly c) Based on transistor-capacitor
combination d) Low consumption of power e)none of these
ANS: b
ANS: b
ANS: e
ANS: d
ANS: a
61. What is called the sharing of a medium and its path by 2 or more devices?
a)Multiplexing b)Multiprocessing c) Multi-operating d) Multitasking e) Multisharing
ANS: a
copyright@studentfarmayishyoutube Page 26
STUDENT FARMAYISH
a) Random Access of Inexpensive disks b)Redundant Array of Inexpensive data c)Random Array of
Inexpensive data d)Random Array of Internet data e)Redundant Array of Inexpensive disks
ANS: e
a)encryption and decryption b)converts data to voice and vice-versa c)converts analog signals to digitals and
vice versa d)server as ahardware anti virus e)none of these
ANS: c
a)flat cables b)co-axial cable c)optic fibre cable d)twisted fibre cable e)UTP cable
ANS: c
66.What do we call for the arrangement when two or more computers physically connected by cables to share
information or hardware?
a)URL b)server c)modem d)network e) internet
ANS: d
ANS: a
ANS: b
71……………….operates only on physical layer of OSI model.
a)hub b)gateway c)switch d)router e)repeater
ANS: e
copyright@studentfarmayishyoutube Page 27
STUDENT FARMAYISH
72. If you wish to extend the length of the network without having the signal degrade, you would use a
a) Gateway b) Router c) Modem d) Repeater e) Resonator
ANS: d
73.E-mail addresses separate the user name from the ISP using the…………….symbol.
a)$ b)@ c)% d)// e).
ANS: b
74.What is the standard protocol of the internet?
a)TCP/IP b)HTML c)flash d)java none of these
ANS: a
75.Junk email is also called……
a)crap b)spoof c)sniffer script d)spool e)spam
ANS: e
77.A cookie is
a)stores information about the user’s web activity b)stores software developed by the user
c)stores the password of the yesr d)none of these e)stores the commands used by the user
ANS: a
ANS: a
82. A software program that lets you to use the Internet is called __________
a) Search Engine b)Browser c) Domain d) None of these
copyright@studentfarmayishyoutube Page 28
STUDENT FARMAYISH
ANS: b
83. How can the user determine what programs are available on a computer ?
a) Checking the hard disk properties b) Viewing the installed programs during the booting process
c) Checking the operating system for a list of installed programs d) Checking the existing files saved on the
disk e) None of these
ANS: c
84. Which process checks to ensure the components of the computer are operating and connected properly?
ANS: a
ANS: c
ANS: e
ANS: d
88. ___________ is the file system used by the operating system to identify the physical locations of files on the
hard drive.
ANS: c
a) Utility program for peer-to-peer file sharing b) Real-time operating system c) Network operating
system d) PDA platform e) None of these
ANS: b
ANS: d
copyright@studentfarmayishyoutube Page 29
STUDENT FARMAYISH
91. At a time how many operating system can be at work on a computer ?
ANS: a
ANS: b
93. The _____ tells the computer how to use its components.
ANS: c
94. The operating system that is self-contained in a device and resident in the ROM is ______
a) Batch Operating System b) Real - time Operating System c) Embedded Operating System
d) Multi Operating System e) None of these
ANS: c
ANS: c
a) The operating system and system utilities b) Application software and system utilities c) Primary
memory and storage d) The operating system and applications software e) None of these
ANS: a
97. Which of the following may be necessary for you to do after you install new application software?
a) Turn the computer power switch off and then back on b) Do a cold boot c) Press Shift + Alt +
Del d) Do a warm boot e) None of these
ANS: d
ANS: c
99. The memory resident portion of the operating system is called the—
copyright@studentfarmayishyoutube Page 30
STUDENT FARMAYISH
ANS: d
ANS: d
101. A(n) ______ is a set of programs designed to manage the resources of a computer, including starting the
computer, managing programs, managing memory and coordinating tasks between input and output devices.
ANS: d
ANS: d
103. When your turn on the computer, the boot routine will perform this test
a) RAM test b) disk drive test c) memory test d) power on self test e) None of these
ANS: d
104. Which among the following is the reboot where the power to the system is physically turned off and back on
again, causing an initial boot of the machine?
ANS: b
105. Which process checks to ensure the components of the computer are operating and connected properly?
ANS: a
106.Grouping and processing all of a firm’s transactions at one time, is called?
a)a database management system b)batch processing c)a real time sharing
d)an on-time system e)none of these
ANS: b
107. “>” symbole in DOS commands is used to
a)compare two values b)redirect input c)redirect output d)filter data e)none of these
ANS: d
108. When more than one processes are running concurrently on a system-
a) batched system b) real-time system c) multi programming system
d) multiprocessing system e) None of these
copyright@studentfarmayishyoutube Page 31
STUDENT FARMAYISH
ANS: d
a)portions of the operating system are copied from disk into memory b) portions of the operating system
are copied from memory onto disk c) portions of the operating system are compiled d) portions
of the operating system are emulated e)the PC gets switched off
ANS: a
110.In MS-DOS,usually the primary hard disk drives has the drive letter…………..
ANS: c
a)hard disk b)cartridge tape c)CD ROM d)flopy disk e)none of these
ANS: a
ANS: a
113…………provides process and memory management services that allow two or more tasks,jobs or peograms to
run simultaneously.
ANS: a
ANS: c
ANS: b
116.The process of transferring data intended for a peripheral device into disk,so that it can be transferred to
peripheral at a more convenient time or in bulk,is known as
ANS: a
117. In computing, a _____ is a directive to a computer program order to perform a specific task.
copyright@studentfarmayishyoutube Page 32
STUDENT FARMAYISH
a) Hard boot b) Hibernation c) Command d) Warm boot e) Format
ANS: c
118. The commonly used UNIX commands like date, is, cat etc. are stored in_________
a) dev directory b) bin directory c) tmp directory d)unix directory e) None of these
ANS: b
119. ------------- controls the way in which the computer system functions and provides a means by which users can
interact with the computer.
a)The Platform b)The Operating System c)Application Software d)The Motherboard e)none
ANS: b
ANS: d
ANS: b
122. . In a…………….topology, if there are n devices in network, each device has n-1 ports for cables.
ANS: a
123. A ______ is a large-and expensive computer capable of simultaneously processing data for hundreds or
thousands of users.
ANS: b
INTERNET:
1.Which of the following is the first graphical web browser?
ANS: d
copyright@studentfarmayishyoutube Page 33
STUDENT FARMAYISH
a)R. Nesscl b)Charles Babbage c)Ray Tomlinson d)Tim Berners Lee e) Other than the given options
ANS: d
ANS: c
5. What is internet?
a) a single network b) a vast collection of different networks c) interconnection of local area networks
d) interconnection of wide area network e)none of these
ANS: b
a) internet exchange point b) subscriber end point c) isp end point d) internet end point e)none of
these
ANS: a
ANS: c
a) packet switching b) circuit switching c) both packet switching and circuit switching
d) data switching e)none of these
ANS: a
9. Which one of the following is not an application layer protocol used in internet?
a) remote procedure call b) internet relay chat c) resource reservation protocol d) local procedure call
e)none of these
ANS: c
10. Which protocol assigns IP address to the client connected in the internet?
copyright@studentfarmayishyoutube Page 34
STUDENT FARMAYISH
ANS: a
ANS: d
ANS: c
13. The process of transferring files from a computer on the Internet to your computer is called
ANS: d
ANS: c
ANS: c
a)Hyper Text Markup Language b)Hyper Text Manipulation Language c)Hyper Text Managing Links
d)Hyper Text Manipulating Links e)none of these
ANS: a
copyright@studentfarmayishyoutube Page 35
STUDENT FARMAYISH
a)e-mail address b)street address c)IP address d)None of these e)all of these
ANS: c
ANS: a
20. If you are allowing a person on the network based on the credentials to maintain the security of your network,
then this act refers to the process of ______.
ANS: a
21. Which among the following is a recently debated principle that Internet service providers and governments
regulating the Internet should treat all data on the Internet the same, not discriminating or charging differentially
by user, content, website, platform, application, type of attached equipment, or mode of communication?
ANS: b
22. Who among the following sent the first electronic mail?
a) Ray Tomlinson b) Charles Babbage e) J.Presper Eckert d) John W Mauchly e) Ana Lovelace
ANS: a
23.What are programs such as Microsoft Edge that serve as navigable windows into the Web called as?
ANS: b
24. In Access a __________ is the collection of data items of all the fields pertaining to one entity.
a) Integral Service Dynamic Network b) International Subscriber Dialup Network c) International Service
Digital Network d) Integrated Service Digital Network e) None of these
ANS: d
copyright@studentfarmayishyoutube Page 36
STUDENT FARMAYISH
ANS: c
ANS: c
28. A web address is a unique name at identifies a specific _______ on the internet.
ANS: d
29. What is e-commerce ?
a) Buying and selling international goods b) Buying and selling products and services over the Internet
c) Buying and selling products and services not found in stores d) Buying and selling products having to do with
computers e) Buying and selling of electronic goods
ANS : b
30. The process of transferring files from a computer on the Internet to your computer is called—
ANS : c
31. A(n)……is composed of several computers connected together to share resources and data.
ANS: b
32.The collection of links throughout the Internet creates an interconnected network called the—
a) WWW b) Web c) World Wide Web d) All of these e) Wide Area Web
ANS: d
a) To provide security against unauthorized users b) To process client requests for web pages
ANS: b
ANS: a
ANS: b
a) is the exchange of text messages and computer files transmitted via a communications network such as a local
area network or the Internet b) permits users to converse in real time with each other via the computer while
connected to the Internet c) functions much like an answering machine, allowing callers to leave a voice
message for the called party d) involves using video and computer technology to conduct a meeting between
participants at geographically separate locations e) None of these
ANS: c
39. 15. A communication processor that connects dissimilar networks by providing the translation from one set of
protocol to another is—
ANS: b
40. This.............tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.
ANS: a
41……………. Use the network protocol and the public telecommunication system to security share part of a
business information?
ANS: c
43. We can make use of the wild card entries such as ___ in Windows Explorer.
ANS: c
ANS: c
45. ……………………. argues that “artificial intelligence is the next stage in evolution.”
ANS: a
ANS: c
47. 32 Bit system was known as Internet protocol version…………. which is still in use today:
a) 4 b) 5 c) 3 d) None of these
ANS: a
48. Two versions of the internet protocol (IP) are in use such as IP version 4 and IP version 6 each version defines
as IP address…...
ANS: c
a)remote login b)connecting to television c)transferring files across net d)all of these e)none of these
ANS: a
ANS: c
51.IP4 address is ….
ANS: a
copyright@studentfarmayishyoutube Page 39
STUDENT FARMAYISH
52.With………..e-mails are accessible from anywhere in the world.
Ms Windows:
1.Which of the following is not a version of the windows operating system software for the pc?
ANS: d
ANS: b
ANS: b
ANS: b
ANS: d
6.Which of the following contained at the end of the file name and help to determine the type of file?
a)file property b)file name c)file subname d)file extension e)file nomenclature
ANS: d
ANS: c
ANS: a
copyright@studentfarmayishyoutube Page 40
STUDENT FARMAYISH
a).mili b).mil c).edu d).military e).biz
ANS: b
10.Which of the following key can be used as a shortcut to rename a floder in Microsoft Windows 8 and higher
versions?
ANS: a
ANS: b
ANS: d
13. Which of the following groups contains all graphical file extensions?
a) JPG, GIF, BMP b) GIF, TCF, WMF c) TCP, JPG, BMP d) ADP, GIF, PPT e) JPG, CPX, GC
ANS: a
ANS: b
a) Microsoft Windows defines the operating environment standard for computers with Linux processors
b) Microsoft Windows defines the operating environment standard for computers with UNIX processors
c) Mac OS defines the operating environment standard for computers with Intel processors
d) Microsoft Windows defines the operating environment standard for computers with Intel processors
e) None of these
ANS: d
ANS: d
copyright@studentfarmayishyoutube Page 41
STUDENT FARMAYISH
a) Esc b) Shift c) Windows d) Shortcut e) None of these
ANS: c
18. If you change Windows 98 to Windows XP, you are actually performing ...........
ANS: b
19. The free, open-source operating system that is becoming popular is:
ANS: d
20. . Using Windows Explorer, a plus (+) sign in front of a folder indicates—
a)an open folder b)the folder contains subfolders c)a text file d)a graphics file e) none of these
ANS: b
21.If you are performing windows 98 operating system to windows XP you are performing a(n).........
ANS: e
22.A………………….is an icon on the desktop that provides a user with immediate access to a program or file.
ANS: c
23. The unique signal, generated by a device that tells the operating system that it is in need of immediate
attention is called…………..
ANS: d
a)Restart the computer in safe mode b)Restart the computer in hibernate mode c)Shutdown
the computer terminating all running applications d)Shut down the computer without saving new
files e)Shut down the computer without closing the running applications
ANS: e
ANS: a
copyright@studentfarmayishyoutube Page 42
STUDENT FARMAYISH
a)Waste Bin b)Recycle Waste Bin c)None of these d)Recycle Bin e)Dust Bin
ANS: d
27. Which system conversion involves running the old and new system?
a)Pilot conversion b)Parallel conversion c)Direct conversion d)Phased conversion e)Convergent conversion
ANS: b
28. Graphical pictures that represent an object like file, folder etc. are
ANS: e
e)Software independent
ANS: d
30. Generally, you access the Recycle Bin through an icon located
a)On the desktop b) None of these c)In the properties dialog box d)On the shortcut menu e)On the hard drive
ANS: a
Ans: b
ANS: d
33. The rectangular area of the screen that displays a program, data and /or information is a
ANS: d
Computer Security:
1. 601 error code identifies a -
ANS: b
copyright@studentfarmayishyoutube Page 43
STUDENT FARMAYISH
2. To correct an error in any programme ______ is used.
ANS: b
3. If you are allowing a person on the network based on the credentials to maintain the security of your network,
then this act refers to the process of ______.
ANS: a
a) Boot Virus b) File infector Virus c) Resident Virus d) Hangout Virus (e) Macro Virus
ANS: d
ANS: a
6. A ________sometimes called a boot sector virus, executes when a computer boots up because it resides in the
boot sector of a floppy disk or the master boot record of a hard disk.
a)System virus b)Trojan horse virus c) File virus d) None of these e)both a and b
ANS: d
a)Disk Crash b)Mother Board Crash c) Corruption of program d) Deletion of files e)none of these
ANS: b
8. ………are often delivered to a PC through an e-mail attachment and are often designed to do harm.
ANS: a
a) They are viruses b) They can copy themselves and spread c) Both (a) and (b) d) None of these
ANS: b
a) An e-mail with attachment b) A plain text mail c) Downloading files over the web d) None of these
ANS: b
copyright@studentfarmayishyoutube Page 44
STUDENT FARMAYISH
11. There is a new anti-virus software update available, when it is downloaded to your computer
a) Everyday b) Only in the night c) When you next switch on your computer d) All of these e)none of these
ANS: c
a) Vital Information Recourse Under Siege b) Vital Information Reason Under Siege c) Vital Information
Recourse Under System d) Virus Information Recourse Under Siege e)none of these
ANS: a
ANS: d
14. ……are attempts by individuals to obtain confidential information from you by falsifying their identity.
ANS: e
a) modifies its program code each time it attaches itself to another program or file b) is a malicious-logic
program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains
c) a malicious-logic program that hides within or looks like a legitimate program d) infects a program file, but still
reports the size and creation date of the original, uninfected program e) None of these
ANS: a
16. All of the following are examples of real security and privacy risks Except ………
ANS: b
17. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
ANS: b
a) A worm has the ability to self- propagate from an infected user's computer to other computers b) A worm is
usually written by a cracker: Script bunnies do not have the skills to develop a worm program c) A virus is very
harmful to the computers it infects : a worm is not a serious a problem d) Anti-virus software is effective in
fighting viruses but not worms e) None of these
copyright@studentfarmayishyoutube Page 45
STUDENT FARMAYISH
ANS: a
19. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as
ANS: d
20. ____________ are viruses that are triggered by the passage of time or on a certain date.
ANS: c
ANS: c
22. A person who used his or her expertise to gain access to other people’s computers to get information illegally
or do damage is a—
ANS: b
a) To provide security against unauthorized users b) To process client requests for web pages
c) To process client requests for database access d) To provide TCP/IP e) None of these
ANS: b
ANS: c
ANS: b
16. ___________are 'attempts by individuals to obtain confidential information from you by falsifying their
identity.
ANS: a
copyright@studentfarmayishyoutube Page 46
STUDENT FARMAYISH
a) Remove any identified viruses b) Copy the name of the virus and send it to Microsoft for inspection
c) Notify a user if a virus is found d) Search for viruses e) None of these
ANS: b
18. ------------ Types of virus that stays permanently in the RAM memory .
ANS: a
19. ---- Is the Virus that overwrites the files or a few parts being replaced?
ANS: b
20. What term is used to describe software that monitors your online computer activities?
ANS: b
ANS: a
ANS: a
23. A computer checks the _____ of user names and passwords for a match before granting access.
ANS: d
ANS: e
25.Password is…………………….
a) Code by which a user gains access to a computer system b) Pass for viewing movie c) Entrance
without paying something d) All of the above e) None of these
ANS: a
copyright@studentfarmayishyoutube Page 47
STUDENT FARMAYISH
26.An error in computer program is called:
27. ______was the first technique that posed a serious threat to virus scanners:
a) Vulnerability Code b) Polymorphic Code c) Antimorphic Code d) None of These
ANS: b
28. A/an ______ is a system susceptibility or flaw:
ANS: b
29. _______vulnerability is one for which at least one working attack exists:
ANS: b
30._____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe
scan or test the vulnerability of a system, server or network or to breach security or authentication measures
without express authorization of the owner of the system, server or network:
ANS: a
31. ____is a computer program that is loaded into a computer without the owner's knowledge:
ANS: b
32. A ______is a harmful computer program that has been hidden inside of something benign, such as an email
attachment or even an innocent looking program:
ANS: a
a) Virus Attacks b) Fire Attacks c) Data Driven Attacks d) Unauthorized Attacks e)none of these
ANS: d
ANS: e
copyright@studentfarmayishyoutube Page 48
STUDENT FARMAYISH
35. Which one of the following is a key function of firewall?
ANS: b
36. Unauthorized copying of software to be used for personal gain of personal backups is called
a) Software piracy b) Program thievery c) Data snatching d) Program looting e)none of these
ANS: a
37. Like a virus , it is a self-replicating program it also propagates through computer network
ANS: b
38. The terminal device often used in checking charge cards that offers both a limited keyboard input and visual
output is the
a) Audio response unit b) Video display terminal c) Pas terminal d) Intelligent terminal e) none of these
ANS: b
ANS: c
ANS: b
41. The phrase ____ describe viruses, worms, Trojan horse attack applets and attack scripts.
ANS: b
42. A person who uses his or her expertise to gain access to other people’s computers to get information illegally
or do damage is a
ANS: d
43.Which of the following inputs a computer’s memory, but unlike a virus, it does not replicate itself?
a) Logic bomb b) Trojan Horse c) Firewall d)malware e) None of these
ANS: a
copyright@studentfarmayishyoutube Page 49
STUDENT FARMAYISH
ANS: b
ANS: a
46. A hacker installs malicious code on a personal computer or server. This code then redirects clicks you make on
a Web site to another fraudulent Web site without your consent or knowledge. It is known as ______
a)Phishing b)Smishing c)Pharming d)rootkit e) None of the Above
ANS: c
47. The act of using the telephone in an attempt to scam the user into surrendering private information that will
be used for identity theft.
a) Pharming b)Smishing c)rootkit d) Vishing e) None of these
ANS: d
48. A malware program that can be used by a black hat cracker to remotely take control of a system for further
attacks like spam emails or Denial of Service attacks, without a user’s knowledge is called ________
a) Spoofing b) Vishing c)Zombie d) hacking e) None of these
ANS: c
49.The creation of Internet Protocol (IP) packets with a forged source IP address, with the purpose of concealing
the identity of the sender or impersonating another computing system is called _________
ANS: b
50. An Internet service that translates domain names to the IP addresses is called ________
a)CMS b) ASP c) DNS d) None of these
ANS: c
ANS: c
52. Ethical hackers who use their skill to secure the integrity of computer systems of networks is called ________
a) Black Hat b) Red Hat c) Green Hat d)White Hat e)none of these
ANS: a
ANS: b
copyright@studentfarmayishyoutube Page 50
STUDENT FARMAYISH
54.If u are allowing a person on the network based on the credentials to maintain the security of your
network,then this act refers to the process of
ANS: b
a)An error message indicating server not found b)An error message indicating moved permanently
c) An error message indicating forbidden d)An error message indicating server found e)none of these
ANS: a
56. Software such as viruses, worms and Trojan horses that has a malicious content is known as
ANS: c
57. In case of a virus getting into computer. Which of the following will help?
ANS: b
58.What is a person called who uses a computer to cause harm to people or destroy critical systems ?
ANS: c
59.What is the most common way to get a virus in your computer's hard disk ?
a)By opening e-mails b)By installing games from their CDROMS c)By uploading pictures from mobile
phones to the computer d)By sending e-mails e)None of these
ANS: a
a)Virus infection b)Loss of confidentiality c)Loss of data d)Duplication of data e)None of these
ANS: c
a)Install a firewall b)Never connect computer to internet c)Install up-to-date anti-virus software
d)Take the help of computer vendor e)Always operate the computer at room temperature
ANS: c
62………..monitors all the traffic that flows between the two networks but blocks certain traffic completely which
may be intruder.
copyright@studentfarmayishyoutube Page 51
STUDENT FARMAYISH
ANS: d
a)Problems caused by insects getting inside the CPU b)A virus infection c)Problem in booting a
computer d)Mistake in a program or error in the working of a computer e)None of these
ANS: d
a)a security utility b)an operating system c)business software d)an office suite e)none of these
ANS: a
65. A computer virus normally attaches itself to another computer program known as a
ANS: b
ANS: e
Computer Software:
1.The use of combination of 1’s and 0’s is feature of which of the following type of Computer Language?
ANS: c
ANS: b
ANS: c
ANS: c
ANS: a
a) High level programming language b) Low level programming language c) Machine language
d) Assembly language e) None of these
ANS: a
ANS: a
8. A _______ contains specific rules and words that express the logical steps of an algorithm?
ANS: c
9. A computer program that converts an entire program into machine language at one time is called a/ an ____
ANS: c
10. Pascal is
ANS: d
11. Computer programs are written in a high-level programming language; however, the human readable version
of a program is called—
ANS: c
ANS: c
copyright@studentfarmayishyoutube Page 53
STUDENT FARMAYISH
a) Mnemonics are used to code operations b) Alphanumeric symbols are used for addresses
c) Language lies between high-level language and machine language d) All of these e) None of these
ANS: d
ANS: d
15. Which of the following is the advantage of Assembly language over Machine language?
a) Easy to use b) Easy to understand c) Easy to modify d) All of these e) None of these
ANS: d
16. Which of the following Computer languages is used for Artificial Intelligence?
ANS: b
ANS: c
18. A set of rules for telling the computer what operations to perform is called a
ANS: d
19. A(n) ____ language reflects the way people think mathematically.
ANS: d
ANS: a
21. A(n) _____ program is one that is ready to run and does not need to be altered in any way.
ANS: d
copyright@studentfarmayishyoutube Page 54
STUDENT FARMAYISH
22.Full from of BIOS…..
a)Basic Input/Output system b)Basic Internal Output system c) Basic Inner/Output system
ANS: a
ANS: c
ANS: b
25……………………detects computer files whose contents are broken across several location on hard disk and moves
the fragments to one location to increase efficiency.
ANS: c
26………….is a windows utility program that locates and eliminates unnecessary fragments and rearranges files
and unused to disk space to optimize operations?
ANS: e
ANS: a
28…………..is a kind of software,which is responsible for loading and relocating of the executable program in main
memoey?
ANS: a
29………..is a windows utility works automatically and increase the amount of information.
ANS: d
30. CAD……………
copyright@studentfarmayishyoutube Page 55
STUDENT FARMAYISH
a)computer aided design b) computer audio design c) computer add design
d) computer aided designer e)none of these
ANS: a
31. ____ software creates a mirror image of the entire hard disk, including the operating system, applications, files
and data.
a) Operating system b) Backup software c) Utility programs d) Driver imaging e) None of these
ANS: d
32. A(n) _______ is a program that makes the computer easier to use
ANS: a
33. System software is the set of programs that enables your computer's hardware devices and ______ software
to work together.
ANS: d
34. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the
computer system.
a) command - based user interface b) GUI c) system utility d) API e) None of these
ANS: b
ANS: a
ANS: b
37. A collection of program that controls how your computer system runs and processes information is called
ANS: d
a) A person who compiles source programs b) Key punch c) A program which translates source program
into object program d)the same thing as a programmer e) None of these
copyright@studentfarmayishyoutube Page 56
STUDENT FARMAYISH
ANS: c
ANS: b
ANS: c
a)used only for output b)a computer peripheral c)used for input d)a set of
instructions e)used only in operating systems
ANS: d
ANS: e
a) Is used to control the operating system b) Is designed to help programmers c) Performs specific
task for computer users d) Is used for making design only e) All of the above
ANS: c
ANS: c
45. In a computer file systems which among the following is top or first in hierarchy?
a) root directory b)parent directory c)home directory d)working directory e)none of these
ANS: a
ANS: b
a) To bring itself into desired state by its own action b) To perform logarithmic operations c)To describe
a set of procedure by given result is obtained d) As a high level language e) None of these
copyright@studentfarmayishyoutube Page 57
STUDENT FARMAYISH
ANS: c
ANS: a
49……………….is the process of locating and fixing or bypassing bugs in computer program code.
ANS: a
a)high level language b)low level language c)complex language d)hardware device driver e)none
ANS: a
a)Dennis Ritchie b)Charles Babbage c)Niklaus Wirth d)Bjarne Stroustroup e)John McCharthy
ANS: d
a)low level language b)high level language c)system programming d)computer e)none of these
ANS: b
53.In computer programming there is set of subroutine definitions,protocols and tools for building software and
applications.Which among the following is a term for sets of requirements that govern how one application can
talk to another?
ANS: b
Database concept:
1.Which of the following is not a type of Microsoft access database object?
ANS: b
ANS: c
3. In Access a __________ is the collection of data items of all the fields pertaining to one entity.
copyright@studentfarmayishyoutube Page 58
STUDENT FARMAYISH
a) field b) record c) form d) report e) None of these
ANS: b
4. _____________ is created when two tables are joined on attributes that are neither primary keys nor foreign
keys.
ANS: c
a) Flat database b) Network database c)Relational database d)Hierarchical database e)None of these
ANS: c
6. What is the newest type of database, which is well suited for multimedia applications, called?
ANS: a
7. Which of the following extends data across networks rather than store it in one central site?
a)PIM b)File manager c) Distributed database d) Data mining program e)None of these
ANS: c
a) Hardware system used to create, maintain and provide controlled access to a data- base b) hardware
system used to create, maintain, and provide uncontrolled access to a database. c) Software system used to
create, maintain, and provide uncontrolled access to a database. d) Software system used to create, maintain
and provide controlled access to a database. d) None of these
ANS: d
ANS: c
a) unlock the database b)provide a map of the data c)uniquely identify a record
d)establish constraints on database operations e) None of these
ANS: c
copyright@studentfarmayishyoutube Page 59
STUDENT FARMAYISH
a) Bit-byte-record-field-file-database b)Byte-bit-field-record-file-database c) Bit-byte-field-
record-file-database d) Byte-bit-record-file-field-database e)None of these
ANS: c
12. A………is a collection of data that is stored electronically as a series of records in a table.
ANS: c
ANS: b
ANS: b
ANS: d
ANS: b
ANS: b
ANS: a
ANS: a
copyright@studentfarmayishyoutube Page 60
STUDENT FARMAYISH
ANS: e
ANS: c
ANS: b
23.In files,there is a key associated with each record which is used to differentiate among different records. For
every file,there is atlest one set of keys that is unique.Such a key is called…………
a)unique key b)primary key c)index key d)null key e)foreign key
ANS: b
24.Which type of database,organized the data in the form of tree with nodes?
ANS: a
ANS: b
ANS: c
27.In which the database can be restored up to the last consistent state after the system failure?
ANS: a
28………….is a primary key of one file that also appears in another file.
ANS: c
a)structured primary key b)atomic primary key c)primary key d)composite primary key e)none
ANS: a
copyright@studentfarmayishyoutube Page 61
STUDENT FARMAYISH
30.Which of the following contains information about a single “entity”in database like a person,place,event or
thing?
ANS: c
31.A program that generally has more user-friendly interface than a DBMS is called a……………
ANS: b
32.In a relational database,a data structure that organizes the information about a single topic into rows and
columns is called……………
ANS: d
33.Data duplication wastes the space,but also promotes a more serious problem called………………
ANS: b
ANS: a
35………..contains data descriptions and defines the name,data tye and length of each field in the database.
a)data table b)data dictionary c)data field d)data table e)none of these
ANS: b
36.Oracle is a…………..
ANS: c
37………….tags,placed on animal’s body can be used to record and track in a database all of the animal’s
movements.
ANS: b
ANS: d
copyright@studentfarmayishyoutube Page 62
STUDENT FARMAYISH
39.The code that relational database management systems use to perform thesir database task is referred to
as……
ANS: b
ANS: a
a)two levels b)four levels c)three levels d)one level e)none of these
ANS: c
a)primary key b)secondary key c)foreign key d)composite key e)none of these
ANS: c
43………….are distinct items that don’t have much meaning to you in a given context.
ANS: a
ANS: a
45.A collection of conceptual tools for describing data,relationships,semantics and constrains is referred to as…..
ANS: c
ANS: c
47……..is a top-down approach in which one higher level entity can be divided into two lower level entities.
ANS: b
48………..is a bottom-up approach in which two lower level entities combine to form a higher level entity.
copyright@studentfarmayishyoutube Page 63
STUDENT FARMAYISH
a)aggregation b)specialization c)generalization d)none of these
ANS: c
ANS: d
ANS: c
ANS: a
ANS: d
ANS: b
54.Which SQL command delete all the records and does not remove the structure?
ANS: c
ANS: c
56.Which of the following refers to the ability of several servers to connect to a single database?
ANS: d
a)database instance b)data migration c)data abstraction d)data isolation e)database schema
copyright@studentfarmayishyoutube Page 64
STUDENT FARMAYISH
ANS: a
a)data isolation b)data migration c)database abstraction d)database instance e)database schema
ANS: e
59……………..is the reduction of a particular body of data to a simplified representation of the whole.
a)data isolation b)data migration c)database abstraction d)database instance e)database schema
ANS: c
60…………………is the process of transferring data between data storage systems,data formats or computer
systems.
a)data cleaning b)data migration c)database abstraction d)database instance e)database schema
ANS: b
ANS: a
62.An entity set does not have sufficient attributes to form a primary key,is a…………..
a)primary entity set b)weak entity set c)strong entity set d)none of these
ANS: b
a)data redundancy b)data integrity c)data reliability d)data consistency e)none of these
ANS: b
64. When data changes in multiple lists and all lists are not updated, this causes?
a)data redundancy b)information overload c)duplicate data d)data inconsistency e)None of these
ANS: d
65…………..is a condition created within a database or data storagetechnology in which the same piece of data is
held in two separate places.
a)Data dumping b)Data normalization c)Data hiding d)Data redundancy e)none of these
ANS: d
a)Data dumping b)Data redundancy c)Data normalization d)Data hiding e)none of these
copyright@studentfarmayishyoutube Page 65
STUDENT FARMAYISH
ANS: b
a) Cloud Storage b) Data System c) File Management System d) Cloud Computing e) None of these
ANS: c
68. Which one of the following is a set of one or more attributes taken collectively to uniquely identify a record?
a) Candidate key b) Sub key c) Super key d) Foreign key e) None of these
ANS: c
69. The feature in database language that allows us to access certain records in database is called __________.
ANS: a
a) Entity sets b) Relation between the entity set c) Attributes d) Link between the attributes
and entity set e)None of these
ANS: c
Ms Office:
1.Which of the following companies developed MS Office-2000?
ANS: d
ANS: d
ANS: b
4. What is MS Word?
ANS: c
5. What is the short cut key to open the Open dialog box in ms word?
copyright@studentfarmayishyoutube Page 66
STUDENT FARMAYISH
a) F12 b) Shift F12 c) Alt + F12 d) Ctrl + F12 e) None of these
ANS: d
ANS: a
7.Where can you find the horizontal split bar on MS Word screen?
a) On the left of horizontal scroll bar b) On the right of horizontal scroll bar c) On the top of vertical scroll
bar d) On the bottom of vertical scroll bar e) None of these
ANS: c
ANS: a
ANS: c
10.What is the keyboard shortcut for creating a chart from the selected cells?
ANS: d
11. In Excel, this is a prerecorded formula that provides a shortcut for complex calculations.........
ANS: c
12.Which of the following keyboard shortcuts is used to view the properties of a selected object?
a) Alt + Space b) Ctrl + Space c) Alt + Enter d) Ctrl + Enter e) None of these
ANS: c
13. What is the shortcut key to "Undo" the last action in a document?
ANS: c
14. Which is a feature included in Microsoft PowerPoint software that allows the user to see all the slides in a
presentation at one time?
copyright@studentfarmayishyoutube Page 67
STUDENT FARMAYISH
a) Slide Sorter b) Slide Master c) Handout Master d) Slide Header e) Reading View
ANS: a
15. Which of the following option may be used to change page-size and margins?
ANS: a
ANS: e
ANS: c
18. Which of the following option may be used to change page-size and margins?
ANS: a
19. In order to move from one worksheet to another in MS-Excel workbook. One should click ___________.
a) active cell b) scroll bar c) sheet tab d)tab button e) None of these
ANS: c
ANS: b
ANS: e
22. What is the maximum number of lines you can set for a drop cap?
a) 3 b) 10 c) 15 d) 20 e) 50
ANS: b
ANS: d
copyright@studentfarmayishyoutube Page 68
STUDENT FARMAYISH
24. What is the shortcut key you can press to create a copyright symbol?
ANS: a
25. Which PowerPoint view displays each slide of the presentation as a thumbnail and is useful for rearranging
slides?
a) Slide Sorter b) Slide Show c) Slide Master d) Notes Page e) Slide Desige
ANS: a
ANS: d
27. Which of the following is not a type of Microsoft access database object?
ANS: d
28. In Power Point, which of the following will not advance the slides in a slide show view?
a) The Enter key b) The spacebar c) Esc key d) The mouse button e) None of these
ANS: c
29. The shortcut key for paste selected text/picture in MS Word is __________.
ANS: a
30. In Excel, the contents of the active cell are displayed in the ________.
a) footer bar b) formula bar c)tool bar d) task bar e) menu bar
ANS: b
a) Insert – Chart b) Home – Chart c) Format – Chart d) Table – Chart e) None of these
ANS: a
32. In Microsoft PowerPoint, two kinds of sound effects files that can be added to the presentation are
a) wav files and .gif files b) wav files and .jpg files c) jpg files and .gif files d) .wav files and .mid files
e) None of these
ANS: d
copyright@studentfarmayishyoutube Page 69
STUDENT FARMAYISH
33. Which of the following is not a type of Microsoft access database object?
ANS: b
ANS: b
ANS: d
ANS: c
ANS: c
a) View, change and analyse data in different ways b) A source of records for forms and reports c) to
access internet d) Both a and b e) None of these
ANS: d
a) It indicates whether the external text is pasted on document or not b) It indicates whether extended add-
ons are installed on MS Word or not c) It indicates whether Extended Selection mode is turned on or off
ANS: c
40. What is the default number of lines to drop for drop cap?
a) 3 b) 10 c) 15 d) 20 e)7
ANS: a
copyright@studentfarmayishyoutube Page 70
STUDENT FARMAYISH
41. __________ appear at the bottom of the Excel Window.
a) Work sheet tabs b) Name box c) Formula bar d) Title bar e) None of these
ANS: a
42. How many columns can you insert in a word document in maximum?
a) 35 b)63 c) 55 d) 65 e) 60
ANS: b
ANS: d
44. What is the smallest and largest font size available in Font Size tool on formatting toolbar?
ANS: a
45. To indent the first paragraph of your report, you should use this key.
a) Space bar b) Return key c) Tab key d) Shift key e) None of these
ANS: c
ANS: b
a) colour the document b) save the document c) delete the document d) copy the document
ANS: e
48. In MS excel ________ are numbered from 1 to onwards and __________ are numbered from A to onwards.
a) Columns, rows b) Rows, slides c) Slides, rows d) Rows, columns e) None of these
ANS:d
ANS: d
copyright@studentfarmayishyoutube Page 71
STUDENT FARMAYISH
50. You cannot close MS Word application by
a) Choosing File menu then Exit submenu b) Press Alt+F4 c) Click X button on title bar
d) From File menu choose Close submenu e) None of these
ANS: d
51. To insert a new slide go to __________ tab, in the Slides group, click New Slide.
ANS: a
52. A bookmark is an item or location in document that you identify as a name for future reference. Which of the
following task is accomplished by using bookmarks?
a) To add anchors in web page b) To mark the ending of a paragraph of document c) To quickly
jump to specific location in document d) To add hyperlinks in webpage e) None of these
ANS: c
a) Save As dialog box b) Open dialog box c) Save dialog box d) Close dialog box e) Opens help menu
ANS: a
54. Times new Roman, Cambria, Arial are the example of __________.
ANS: a
55. In Access a __________ is the collection of data items of all the fields pertaining to one entity.
ANS: b
ANS: c
57. What is the short cut key to open the Open dialog box?
ANS: d
58. Suppose you wanted to create an AutoCorrect entry that would type the words ‘We regret to inform you that
your submission has been declined’ of the following choices, which would be the best name you could assign to
this entry?
a) Regret b) Subdual c) We regret to inform you that your submission has been declined
copyright@studentfarmayishyoutube Page 72
STUDENT FARMAYISH
d) 11 e) None of these
ANS: b
ANS: a
a) Spelling suggestions b) Grammar options c) All of the above d) Synonyms and Antonyms
words e) None of these
ANS: d
a) To drop all the capital letters b) To automatically begin each paragraph with capital letter c) To
begin a paragraph with a large dropped initial capital letter d)To drop the numbers e) None of
these
ANS: c
ANS: c
ANS: b
64. A table of how many columns can you insert in a word document in maximum.
a) 55 b) 42 c) 32 d) 63 e) none of these
ANS: d
65. Which control does access use to link data access page components to access data?
a) Microsoft Office Data Source Control b) Microsoft Dynamic Data Control c) Microsoft Data
Connection Control d) Microsoft Default Connection Control e) None of the above
ANS: a
a) Start recording b) Using your mouse or keyboard, perform the task you want to automate c) Assign
a keyboard shortcut to the macro d) Give the macro a name e) None of these
ANS: c
copyright@studentfarmayishyoutube Page 73
STUDENT FARMAYISH
67. In Word, the mailing list is known as the ____________.
ANS: c
68. In Microsoft Office Power-Point 2007, a _____ is a connection from one slide to another slide in the same
presentation or to a slide in another presentation, an e-mail address, a Web page, or a file.
ANS: d
69. AutoCorrect was originally designed to replace _________ words as you type.
a) Short, repetitive b) Grammatically incorrect c) Misspelled words d) Incorrect Image e) None of these
ANS: c
70. In slide layout panel, how many layouts are available for next layout by default?
a) 4 b) 7 c) 12 d) 15 e) None of these
ANS: a
71. In Access, this operation copies a backup file from the storage medium back onto the computer
ANS: a
72. If you will be displaying or printing your document on another computer, you’ll want to make sure and select
the _____________ option under the ‘Save’ tab.
a) Embed Fonts b) Embed True Type Fonts c) Save True Type Fonts d) Save Fonts e) Font Face
ANS: a
73. In the Form Wizard dialog box, the fields from the selected table are displayed in which list box?
a) All fields b) All Records c) Available Records d) Available Fields e) None of these
ANS: d
74. In PowerPoint, which of the following is the default page setup orientation for notes pages, outlines and
handouts?
ANS: c
75. The software that is used to create text-based documents are referred to as ______ .
ANS: d
copyright@studentfarmayishyoutube Page 74
STUDENT FARMAYISH
76. What is the overall term for creating editing, formatting, storing, retrieving and printing a text document?
a) Word processing b) Spreadsheet design c) Web design d) Database management e) None of these
ANS: a
77.The PC productivity tool that manipulates data organized in rows and coloumn is called a
ANS: a
78. When entering text within a document, the Enter key is normally pressed at the end of every
ANS: c
ANS: d
ANS: b
81. You can use.....to copy selected text; and .....to paste it in a document.
a) CTRL+C, CTRL+V b) CTRL+C, CTRL+P c) CTRL+S, CTRL+S d) SHIFT+C, ALT+P e) CTRL+D, CTRL+A
ANS: a
82.The letter and number the intersecting column and row is the-
a) Cell location b) Cell position c) Cell address d) Cell coordinates e) Cell continents
ANS: c
ANS: a
84. The PC productivity tool that manipulates data organized in rows and columns is called a.....
ANS: a
copyright@studentfarmayishyoutube Page 75
STUDENT FARMAYISH
85. When a file is saved for the first time.........
a) a copy is automatically printed b) file name and folder name must be the same c) it does not need
a name d) it only need a name if it is not going to be printed e) It must be given a name to identify it.
ANS: e
86. Forms that are used to organize business data into rows and columns are called........
ANS: e
ANS: a
ANS: b
a) It cannot be saved again b) The changes will automatically be saved in the file c) The file will only
have to be saved again if it is more than one page in length d) Its name must be changed
ANS: e
90. What is the overall term for creating, editing, formatting, storing retrieving and printing a text document ?
e) Presentation generation
ANS: a
ANS . a
92. In power point, the Header & Footer button can be found on the insert tab in what group?
a) Illustrations group b) Object group c) Text group d) Tables group e) None of these
ANS . e
copyright@studentfarmayishyoutube Page 76
STUDENT FARMAYISH
a) Table, paragraph and Indexes b) Paragraph, Indexes and Sections c) Characters, sections and
paragraphs d) Indexes, characters and Tables c) None of these
ANS . a
ANS . b
a) is always white b) is the colour you pre-set under the option menu c) is always the same for the
entire document d) Can have any colour you choose e) None of these
ANS . a
ANS . d
ANS . c
ANS . b
ANS : d
100. Which one of the following software applications would be the most appropriate for performing numerical
and statistical calculations?
ANS . d
a) Mini directory b) Junior directory c) Part directory d) Sub directory e) None of these
ANS . d
ANS . a
a) Automatically moves the text to next line when necessary b) Appears at the bottom of the document
c) Allows you to type over text d) Is the short horizontal line indicating the end of the document
ANS . a
104. Which power point view displays each slide of the presentation as a thumbnail and is useful for rearranging
slides ?
a) Slide Sorter b) Slide show c) Slide master d) Notes Page e) Slide Design
ANS . a
a) Select the Print command and then select ok b) Select the Ready Printer command and then select OK
ANS . a
ANS . c
ANS . d
ANS . d
ANS: d
ANS: a
copyright@studentfarmayishyoutube Page 78
STUDENT FARMAYISH
111.Which feature helps to search the text through reference material such as dictionaries, encyclopedias and
translation services?
a) Translation b) Research c) Find d) Font e) Table
ANS: b
112. Which among the following is the shortcut key combination to copy formatting from text?
a) Alt + Shift + C b) Tab + Shift + C c) Ctrl + Shift + C d) F1 + Shift + C e) None of these
ANS: c
113. In Power Point, the Header & Footer button can be found on the Insert tab in what group?
a) Illustrations group b) Object group c) Text group d) Tables group e) None of these
ANS: c
ANS: a
115. Which keystroke will take you at the beginning or the end of a long document?
a) Ctrl + PageUp and Ctrl + PageDown b) Shift + Home and Shift + End c) Ctrl + Home and Ctrl + End
d) The only way is by using the right scroll bar e) Alt+Home and Alt+End
ANS: c
ANS: e
117. Which PowerPoint view displays each slide of the presentation as a thumbnail and is useful for rearranging
slides?
a) Slide Sorter b) Slide Show c) Slide Master d) Notes Page e) Slide Design
ANS: a
118. If a word is typed that is not in MS Word’s dictionary, a wavy underline appears below the word. What is the
color of the underline that appears in this situation?
a) Blue b) Red c) Green d) Black e) Pink
ANS: b
ANS: c
120. Which of the following term describes explanatory text attached to a cell?
a) Context b) Callout c)Comment d) Dialog e)None of these
copyright@studentfarmayishyoutube Page 79
STUDENT FARMAYISH
ANS: c
121.Which of the following is the keyboard shortcut for creating a chart from the selected cells?
a) F3 b) F5 c) F7 d) F12 e) F11
ANS: e
122. Which of the following keyboard shortcut is used to edit existing Excel data?
a) F2 b)F3 c) F1 d) F4 e)F5
ANS: a
ANS: a
124. Which of the following is used to create a formula to sum all of the above cells?
a) Ctrl + = b) Alt + * c)Ctrl + * d) Alt + = e)Alt + ~
ANS: d
125. To save an existing file with a new name or to a new location, the user should use command.
ANS: e
126. A _____ colour underlines indicate grammar errors in Microsoft Word document.
ANS: b
ANS: b
ANS: a
ANS: a
130. To specify margins in Word, the user has to select Page Setup option from the ……….menu.
copyright@studentfarmayishyoutube Page 80
STUDENT FARMAYISH
ANS: d
a)Name box b)Row heading c)formula bar d) Task pan e)None of these
ANS: c
a)Pressing the key FL before the cursor has put at the proper place: b)Pressing control + Enter, before the
cursor has put at the proper place: c)Using the insert/section break d) Changing the font size of
documents e)None of these
ANS: b
133. How to select one hyperlink after another during a slide presentation?
ANS: d
134. Which power point view works best for adding slide transition?
a)Slide show view b) Slide sorter view c)Slide view d)Notes view e)none of these
ANS: b
c) Right clicking the chart object, then clicking edit MS-Organization Chart object. d) A and C both
ANS: d
ANS: a
a) F9 b) F7 c) F5 d) F3 e)F2
ANS: b
Miscellaneous
1.The address 198.10.10.0 belongs to________
ANS: c
copyright@studentfarmayishyoutube Page 81
STUDENT FARMAYISH
2.Which of the following technique is used to send more than one calls over a single line?
ANS: d
3.Word is a word processor developed by Microsoft. In MS Word spelling check is a feature available in which tab?
ANS: d
4.The blank white area near the edges of every page in a word document is known as a ________.
ANS: b
5.In which group can you find or replace text and select text or objects in a document?
ANS: c
ANS: b
a) Portions of the operating system are copied from disk into memory b) Portions of the operating system are
copied from memory onto disk c) Portions of the Operating system are complied d) Portions of
the operating system are emulated e) The PC gets switched off
ANS: a
8.The ______________ folder retains copies of messages that you have started but are not yet ready to send.
ANS: a
ANS: b
10.To protect your system from computer hackers you must turn on a(n) _______.
a) USP b) VLC c) Another system d) Script e) Firewall
copyright@studentfarmayishyoutube Page 82
STUDENT FARMAYISH
ANS: e
11.Which of the following groups contains graphical file extensions?
a) JPG, GIF, BMP b) GIF, TCF, WMF c) TCP, JPG, BMP d) ADP, GIF, PPT e) JPG, CPX, GCM
ANS: a
ANS: a
ANS: b
14.Which of the following is a process of translates the IP addresses of computers in a local network to a single IP
address?
a) Gateway b) NAT c) Packet filtering d) Spooling e) Translator
ANS: b
15.In which of the topology all the nodes are attached in a circular wiring arrangement?
a) Star topology b) Bus topology c) Network topology d) Ring topology e) Mesh topology
ANS: b
16.Which IEEE standard used to define the specification for a wireless LAN?
a) IEEE 802.5 b) IEEE 802.3 c) IEEE 802.11 d) IEEE 802.4 e) IEEE 802.6
ANS: c
17.A _________ typically connects personal computers within a very limited geographical area, usually within a
single building.
a) LAN b) FAN c) TAN d) WAN e) VPN
ANS: a
18. Which of the following menu types is also called a drop-down menu?
a) fly-list b) cascading c) pop-down d) pull-down e) go-up
ANS: d
19.What is the term used for measurement of how fast data moves from one place to another?
a) data per unit b) bits per second c) bits per hour d) ratio per bit e) None of the above
ANS: b
20.Which type of system has its own programming and does not receive input?
a)Embedded computer b)Supercomputer c)Microcomputer d)Both (b) and (c) e)None of these
ANS: a
copyright@studentfarmayishyoutube Page 83
STUDENT FARMAYISH
21.Which of the following is/are file extension(s) in DOS?
ANS: d
22. Multi-user systems provide cost savings for small businesses as they use a single processing unit to link several
______.
ANS: c
23.Which among the following options is the application that combines text, sound, graphics, motion video, and/
or animation?
ANS: a
24. Which among the following is the reboot where the power to the system is physically turned off and back on
again, causing an initial boot of the machine?
ANS: b
25.Which among the following carries signals that control the actions of the computer?
ANS: a
26.Which among the following is an important circuitry in a computer system that does the arithmetic and logical
processing?
ANS: b
a) cascade and tile b) drag and drop c) point and click d) minimize and maximize e) copy and paste
ANS: a
ANS: c
copyright@studentfarmayishyoutube Page 84
STUDENT FARMAYISH
ANS: c
30. The process of checking all the peripheral units by the OS during the time of booting is known as_____
ANS: b
31.A handheld device that allows you to control your computer without typing instructions from a keyboard is
known as_______.
ANS: c
32. Which of the following file system used by the operating system to identify the physical locations of a file on
the hard drive?
ANS: c
a) Settled Mode Power Supply b) Switch Mode Power Supply c) Switch Mode Packet Switch
ANS: b
34. When a computer is turned on, which of the following is run by BIOS in order to check whether all the
hardware components are working properly?
ANS: d
35. Which of the following hardware or software designed to guard against unauthorized access to a computer
network?
e) None of these
ANS: b
36. Which among the following is the first general-purpose electronic computer?
ANS: c
37. A device that not only provides surge protection but also furnishes the computer with battery backup power
during a power outage is ______
copyright@studentfarmayishyoutube Page 85
STUDENT FARMAYISH
ANS: b
ANS: d
39. Which part of the CPU coordinates all the activities of a computer system?
a) Motherboard b) Coordination board c) Control unit d) Arithmetic and logic unit e) None of these
ANS: c
40. The process of checking all the peripheral units by the OS during the time of booting is known as_____
ANS: b
41.A handheld device that allows you to control your computer without typing instructions from a keyboard is
known as_______.
ANS: c
42. Which of the following file system used by the operating system to identify the physical locations of a file on
the hard drive?
ANS: c
43. An online discussion group that allows direct “live” communication is known as……
ANS: b
ANS: c
45. Which of the following hardware or software designed to guard against unauthorized access to a computer
network?
ANS: b
copyright@studentfarmayishyoutube Page 86
STUDENT FARMAYISH
46. A device that not only provides surge protection but also furnishes the computer with battery backup power
during a power outage is ______
ANS: b
a) It is an interface between User and the Computer b) It manages all resources c) It does all process
management tasks d) All of the above e) None of these
ANS: d
48. Which process check to ensure the components of the computer are operating and connected properly?
ANS: a
49.The ability of an operating system to run more than one application at a time is called _________.
ANS: a
ANS: a
51.To move to the beginning of a line of text, press the __________ key.
ANS: d
52.Which among the following is a language used in a computer that is very similar to, the language of humans
and is easy to understand?
a) Source Code b) Machine Language c) High Level Language d) Object Code e) Assembly language
ANS: c
a) Electronic valves b) Neural Networks c) Fuzzy Logic d) Semiconductor memory e) None of these
ANS: a
54.What is the sequence of events that occurs in the computer when it is interpreting and executing an instruction
known as?
copyright@studentfarmayishyoutube Page 87
STUDENT FARMAYISH
a) Execution cycle b) Instruction cycle c) Working cycle d) Machine cycle e) None of these
ANS: b
55._____ is a Windows utility program that located and eliminates unnecessary fragments and rearranges filed
and unused to disk space to optimise operations.
ANS: c
ANS: c
57.A __________ is an electronic device that process data, converting it into information.
ANS: b
58.__________ computers represent data as variable points along a continuous spectrum of values.
ANS: a
ANS: d
60.A word in a web page that, when clicked, opens another document.
ANS: c
61. A network’s __________ is the central structure that connects other portions of the network.
ANS: b
ANS: c
copyright@studentfarmayishyoutube Page 88
STUDENT FARMAYISH
ANS: c
64.Computers use the __________ number system to store data and perform calculations.
ANS: c
65.Floppy drives, hard drives and tape drives all use a __________ to read data.
ANS: c
ANS: a
67.Word is a word processor developed by Microsoft. In MS Word spelling check is a feature available in which
tab?
ANS: d
68.The blank white area near the edges of every page in a word document is known as a ________.
ANS: b
ANS: d
70.In which group can you find or replace text and select text or objects in a document?
ANS: c
71. Servers are computers that provide resources to other computers connected to a ____.
ANS: a
copyright@studentfarmayishyoutube Page 89
STUDENT FARMAYISH
ANS: d
ANS: c
ANS: b
a)one bit b)four bits c)eight bits d)sixteen bits e)None of the above
ANS: c
a)fire Attacks b)data Driven Attacks c) virus Attacks d)unauthorized access e) None of these
ANS: d
77. Which key is used in combination with another key to perform a specific task?
ANS: b
a) home page b)browser page c)search page d)index page e)none of these
ANS a
79. The network in which every node is connected to two other nodes is called _____.
a)Bus Network Topology b)Star Network Topology c)Ring Network Topology dAll of the above
ANS: c
80. Underlined text, such as text and folder names is referred to as a __.
ANS: a
ANS: e
82. Which bar is usually located below the Title Bar that provides categorized options?
copyright@studentfarmayishyoutube Page 90
STUDENT FARMAYISH
a)Menu Bar b) Status Bar c)Toolbar d)Scroll Bat e)None of the above
ANS: a
a) Page Orientation b)Paper Size c)Page Layout d)Both C and D e)All of the above
ANS: a
ANS: b
85. This type of software works with end-users, application software, and Computer Hardware to handle the
majority of technical details:
a)Communications software b)Application software c)Utility software d)System software e)None of these
ANS: d
86. Which of the following keys is used to delete characters to the left of the cursor?
ANS: e
ANS: d
a)Integrity Test b)Power-On Self-Test c)Correct Functioning Test d)Reliability Test e)Shut-down
ANS: b
a)what the user sees on the screen and how they can interact with it b)how the operating system
responds to user commands c)the means by which the user interacts with the peripheral devices on the
computer d)the monitor that is available for the computer e)None of the above
ANS: a
ANS: c
copyright@studentfarmayishyoutube Page 91
STUDENT FARMAYISH
a)FTP b)SMTP c)TELNET d)SNMP e)None of these
ANS: b
a) Local Area Nodes b)Large Area Network c)Large Area Nodes d)Local Area Network
ANS: d
a)In the current document only b)in any document c)can be used only with other macros of the
global macro sheet d)None of the above e)All of the above
ANS: b
a) Bus topology b) Star topology c) Ring topology d) Mesh topology e)None of these
ANS: d
ANS: c
96. A computer on a network that access resources provided by another computer called _____.
a)A Server b)A computer c) A Brewers d)A Beta test and Beker call e)None of these
ANS: a
a) Hyper Text Transfer Protocol b)Hyper Text Transition Protocol c)Hyper Text Transfer Program
d) Hyper Text Transition Program e)Hyper Text Trivial Protocol
ANS: a
a)To enhance the overall appearance of the document b)To mark the starting and ending of a page
c)To make large document more readable d) To allow page headers and footers to appear on document when
it is printed e)None of these
ANS: d
ANS: c
copyright@studentfarmayishyoutube Page 92
STUDENT FARMAYISH
100. Which part of the system software always resides in main memory?
ANS: d
ANS: c
102. ________ is when the computer is turned on and the operating system is loading.
ANS: a
ANS: c
a) To enhance the overall appearance of the document b)To mark the starting and ending of a page
c)To make large document more readable d)To allow page headers and footers to appear on document
when it is printed e)None of these
ANS: d
a) Switched Mode Power Supply b)Start Mode Power Supply c)Store Mode Power Supply
ANS: a
a) From one place to another b) From one account to another c) From one bank to another
ANS: b
107. Programs designed specifically to address special purpose applications are called _______.
ANS: c
108. What is the most common tool used to restrict access to a computer system?
copyright@studentfarmayishyoutube Page 93
STUDENT FARMAYISH
a)User logins b)Passwords c)Computer keys d)Access-control software e)None of these
ANS: b
ANS: e
110. Which type of memory gets lost when you switch off?
ANS: b
a)A receipt sent by the recipient b)A separate document from another program sent along with an e-mail
message c)A malicious parasite that feeds off of your message and destroys the contents d)A list of CC
: or BCC : recipients e)None of these
ANS: b
ANS: a
113. The process of a computer receiving information from a server on the Internet is known as _____.
ANS: e
114. The web uses the ________ to request and serve web pages and programs.
a) Hyper Text Marketing Language b)Hyper Text Markup Language c)Hotmail Text Markup Language
d)Home Text Markup Language
ANS: b
115. _______is the science that attempts to produce machines that display the same type of intelligence that
humans do.
ANS: d
ANS: c
copyright@studentfarmayishyoutube Page 94
STUDENT FARMAYISH
117. The process of transferring files from a computer on the internet to your computer is called _______.
ANS: a
ANS: d
e) Once-a-week Processing
ANS: b
120. Word processing, spreadsheet and photo- editing and examples of _____.
a)A. application software b)system software c)operating system software d) platform software
e)None of these
ANS: a
a) Unary number system b)Binary number system c)Octal number system d)All of the above
e) None of these
ANS: b
122. A _________ is pre-designed document that already has coordinating fonts, a layout, and a background.
ANS: d
123. Which of the following is equal to 1,048,576 byte (approx one million byte)?
ANS: d
ANS: b
125. A Web site containing stories and articles relating to current events, life, money, sports and the weather is
considered a(n) _______ Web site.
copyright@studentfarmayishyoutube Page 95
STUDENT FARMAYISH
ANS: c
ANS: c
127. When sending an e-mail, the _____line describes the contents of the message.
ANS: a
a) Compiler b)Plotter c)Mac d)Both (1) and (2) e)All of the above
ANS: c
129. The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the
___command.
ANS: b
130. A _________ is a design tool that graphically shows the logic in a solution algorithm.
a)A. Flowchart b)Hierarchy chart c)Structure chart d)ontext diagram e)None of these
ANS: a
a) Monitor b)Keyboard c)Secondary storage devices d)Secondary storage media e)None of these
ANS: a
132. In Excel, the contents of the active cell are displayed in the _______.
a) footer bar b)tool bar c)task bar d)menu bar e)formula bar
ANS: e
a) for naming the file. b)to ascertain that file name is not lost c) to identify file d)to identify
file type e) to make items complex
ANS: d
134. E-mail addresses separate the user name from the ISP using the __ symbol.
ANS: b
copyright@studentfarmayishyoutube Page 96
STUDENT FARMAYISH
135.All of the following are examples of real security and privacy risks except ____.
ANS: b
136. _______ is a Windows utility program that locates and eliminates unnecessary fragments and rearranges files
and unused disk space to optimize operations.
ANS: c
ANS: b
138. A program designed to destroy data on your computer which can travel to "infect" other computers is called
a___.
ANS: d
ANS: d
140. ______ implies a combination of audio, video, text, animation and graphics.
ANS: e
ANS: c
ANS: c
copyright@studentfarmayishyoutube Page 97
STUDENT FARMAYISH
ANS: c
144. ________ is not a graphic file format that allows animation to be viewed on a computer.
ANS: c
a)A Tablet b)A Personal Computer c)a Laptop d)A mainframe e)None of these
ANS: a
ANS: e
ANS: b
a) Education domain b)organization domain c)Network domain d)Government domain e )None of these
ANS: b
ANS: b
150. Information that comes from an external source and fed into computer software is called ___.
ANS: b
151. Programs designed specifically to address general-purpose applications special purpose applications are
called _______.
ANS: c
152. What is the default file extension for all Word documents?
copyright@studentfarmayishyoutube Page 98
STUDENT FARMAYISH
ANS: c
153. The keyboard shortcut to centralise the selected text in Word is ____.
a)Ctrl + Esc b)Ctrl + C c)Alt + C d)There is no keyboard shortcut for this operation e)Ctrl + E
ANS: e
154. A _________contains buttons and menus that provide quick access to commonly used commands.
ANS: b
155. Which of the following types of memory improves processing by acting as a temporary high-speed holding
area between the memory and the CPU?
ANS: c
156. The wheel located between the two standard buttons on a mouse is used to ________ .
a)click in Web pages b)shut down c)click and select items d)jump to different WebPages e)scroll
ANS: e
157. ________ is responsible for overall control and co-ordination of instruction execution.
ANS: d
158. Which of the following identifies a specific web page and it computer on the web?
ANS: d
a) A. Small buffer storage b) Permanent storage c) Main memory d) All of the above e) None of these
ANS: a
ANS: a
ANS: a
copyright@studentfarmayishyoutube Page 99
STUDENT FARMAYISH
162. Data on a floppy disk is recorded in rings called ___.
ANS: d
ANS: a
164. A machine that connects two or more electronic mail systems (including dissimilar mail systems) and
transfers messages between them is called ____.
a) Mail gateway b)Mail exploder c)Message transfer agent d)Message handling system e)MILNET
ANS: a
165. Computer programs are written in a high-level programming language; however, the human- readable
version of a program is called ____.
ANS: c
166. Which type of memory holds only that program and data that CPU is presently processing?
ANS: c
167. A(n) ________ allows you to access your e- mail from anywhere.
ANS: b
168. Most mail programs automatically complete the following two parts in an e-mail ___.
a) From : and Body b)From : and Date: c)From : and To: d)From : and Subject: e)None of these
ANS: b
169. An input device that is able to interpret pencil marks on paper media is known as ____.
a)Magnetic disk b)Optical mark reader c)card puncher d)magnetic tape e)None of these
ANS: b
ANS: c
a)two mini dots b)five mini dots c)six mini dots d)three mini dots e)None of these
ANS: d (RED,GREEN,BLUE)
ANS: d
173. Which of the following application is used to prepare a presentation/ slide show?
a)A. Photoshop b)Power Point c)Outlook Express d)Internete xplorer e)All of the above
ANS: b
1 74. ____ allows wireless mobile devices to access the Internet and its services such as the Web and e-mail.
ANS: c
a)input data b)store data c)scan data d)view or print data e)None of these
ANS: d
a) Select the Print command and then select OK b)Select the Ready Printer command then select OK
c)Type print and then press Enter d)Close the document; select the Print command, then select OK
e)None of these
ANS: a
a)Explode if exposed to high temperatures b)Lose its contents if current is turned off c)Be used for
data storage only d)Be used to both read and write data e) None of these
ANS: b
178. The key combination of ‘Ctrl + Right Arrow’ is used to _______ in MS Word.
a)Move the cursor one word to the right b)Move to cursor to the end of the document c)Move the
cursor to the end of the line d)Move the cursor one paragraph down e)None of these
ANS: a
179.The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law
enforcement specialty called……………..
ANS: c
180. The _______states that a foreign key must either match a primary key value in another relation or it must be
null.
a)Entity integrity rule b)Referential integrity constraint c)Action assertion d)Composite attribute
ANS: b
181.A ________sometimes called a boot sector virus, executes when a computer boots up because it resides in the
boot sector of a floppy disk orthe master boot record of a hard disk.
a) System virus b)Trojan horse virus c)File virus d) worm e)None of these
ANS: d
182. The software tools that enable a user to interact with a computer for specific purposes are known as—
ANS: d
183. Computer programs are written in a high-level programming language; however, the humanreadable version
of a program is called—
ANS: c
a) RAM is a temporary storage area b) RAM is the same as hard disk storage c) RAM is volatile
d) Information stored in RAM is gone when you turn the computer off e) None of these
ANS: b
ANS: b
ANS: b
187. Which of the following storage media provides sequential access only ?
a) Floppy disk b) Magnetic disk c) Magnetic tape d) Optical disk e) None of these
ANS: b
ANS: a
ANS: a
190. When a file contains instructions that can be carried out by the computer, it is often called a(n) ……file.
ANS: c
191. If a user needs information instantly available to the CPU, it should be stored—
ANS: d
192. Straight and Uniform margins on both the sides indicate that there is …………in the document.
a) full justification b) full alignment c) left justification d) right justification e) None of these
ANS: a
193. The following are included in the world programme ………….Title Bar, Ribbon, Status Bar, Views, Document
workspace.
ANS: a
a) WinZip and Linux b) Shareware and file sharing c) Microsoft Word and the Google toolbar
d) Instant messaging and the Google toolbar e) Microsoft Power Point and Microsoft Excel
ANS: d
195. If a disk drive fails but the computer application running and using it can continue processing, this application
is said to have been designed with this feature—
a) 100 per cent uptime b) fault tolerance c) high reliability d) All of these e) None of these
ANS: b
196. Which media have the ability to have data/information stored (written) on them by users more than once ?
a) CD-R disks b) CD-RW disks c) Zip disks d) OptiDisks e) Both CD-RW disks and Zip disks
197. You can use the………bar to type a URL and display a Web page, or type a keyword to display a list of related
Web pages.
ANS: e
198. Cache and main memory will lose their contents when the power is off. They are—
ANS: c
a) operating system, a client system b) operating system; instruction sets c) application programs;
an operating system d) application programs; a client system e) operating system; application programs
ANS: a
a) the computer and its associated equipment b) the instructions that tell the computer what to do
c) computer components that act to accomplish a goal d) an interface between the computer and the
network e) the interaction between the computer and its database
ANS: b
201. Press………to move the insertion point to the Address box, or to highlight the URL in the Address box.
ANS: a
202. The altering of data so that it is not usable unless the changes are undone is—
ANS: c
ANS: b
ANS: c
ANS: b
206. When data changes in multiple lists and all lists are not updated, this causes:
a) data redundancy b) information overload c) duplicate data d) data inconsistency e) None of these
ANS: d
207.The ____________ contains data descriptions and defines the name, data type, and length of each field in the
database.
a) data dictionary b) data table c) data record d) data field e) None of these
ANS: a
a) Automatic Digital Subscriber Line b)Asymmetric Direct Subscriber Line c) Asymmetric Digital Subscriber
Line d)None of these
ANS: c
a) They are the same just two different terms used by different manufacturers b) A CD-ROM can be written to
and a CD-RW cannot c) A CD-RW can be written to, but a CD-ROM can only be read from d) A CD-ROM
holds more information than a CD-RW e) None of these
ANS: c
a) logical error b) syntax error c) procedural error d) compiler error e) None of these
ANS: b
211. _______ is a technique that is used to send more than one call over a single line.
ANS: d
212. The method of Internet access that requires a phone line, but offers faster access speeds than dial- up is the
_____ connection.
a) cable access b) satellite access c) fiber-optic service d) digital subscriber e) None of these
ANS: d
213. Which of the following software could assist someone who cannot use their hands for computer input?
214. Different components on the motherboard of a PC unit are linked together by se ts of parallel electrical
conducting lines. What are these lines called?
ANS: b
215. What is the name given to those applications that combine text, sound, graphics, motion video, and/or
animation?
ANS: d
216. _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every
port on the server using fake IP addresses.
a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these
ANS: c
217. ________ is a windows utility program that locates and eliminates unncessary fragments and rearranges filed
and unused disk space to optimize operations.
ANS: c
218. When some unidentified / unknown person / firm sends you mail in a trustworthy /lucrative way asking for
sensitive banks and online payment information, this is a case of __?
ANS: c
219. As a person working in internet banking environment, why you should be aware of the “Dictionary attack”?
ANS: b
220. In each of the computer parts, there are many trillions of electrical circuits which can be turned on or off with
the help of an electronic switch. How are these arranged?
a) Circuit Gates b)Circuit Bypass c)Logic Gates d)Data Knots e)none of these
ANS: c
221. Which of the following registers can hold both data and addresses?
a) General Purpose Register b)Data Register c)Address Register d)Status Register e)none of these
a) Switched-Mode Power Supply b) Switching Manual Power Supply c)Switched Maintenance Power
Supply d)None of the Above
ANS: a
223. Which of the following is a pointing device that uses light to determine mouse motion?
ANS: c
ANS: a
225. Which of the following is the ability of a system to jump directly to the requested data?
a) Sequential Access b)Random Access c)Quick Access d)All of the Above e)none of these
ANS: b
226. Which of the following models of processing has the master/slave architecture as a feature?
ANS: b
227. There are many types of plotters available. Which of the following is the type of a plotter?
a) Drum Plotter b)Flatbed Plotter c)Handheld plotter d)Both a and b e)none of these
ANS: d
228. What is the name given to the view of database that appears to an application program?
ANS: d
229. There is a situation in which resources are held by two or more connections that are each needed by the
other connections. What is the name given to such a situation?
ANS: a
230. System Area Network is used to provide high-speed connection in which of the following environments?
ANS: d
ANS: b
232. Which of the following transmission medium has categories named as RG-58, RG-59 and RG-11?
ANS: a
a) Prevent loss of signals b)Provide immunity against electromagnetic interference c) Both a and b d)None
ANS: c
234. Which of these waves is most commonly used by wireless mouse to communicate?
ANS: a
ANS: b
ANS: b
ANS: a
ANS: c
239. Which of these protocols is used by network components to find other devices in the same broadcast
domain?
ANS: d
ANS: b
241. Checking that a pin code number is valid before it is entered into the system in an example of
a)error correction b)data validation c)backup and recovery d)data preparation e)None of these
ANS: b
242. What is the name for the process that is used to convert a series of instructions, or program, written in a
high-level language into instructions (or a program) that can be run on a computer ?
ANS: a
e)Low–Scale Internet
ANS: a
244. Computer use the number system to store data and perform calculations.
ANS: d
Ans: c
a)Cable modem b)Dial-up Service c)T1 d)Leased Line e)Digital Subscriber Line
ANS: b
a)None of these b)Virtual over IP c)Video over IP d)Voice over IP e)Viruses over IP
ANS: d
ANS: b
ANS: d
250. Which of the following operating systems is not owned and licensed by a company ?
ANS: a
ANS: e
a)Publisher 2000 b)Windows 2000 c)Access 2000 d)Excel 2000 e)Word 2000
ANS: b
ANS: d
254.Which of the following shortcut keys is used to after opening a document, to the location you were working in
when the document was last closed?
a)Ctrl + F5 b)Ctrl + Left arrow c)Shift + F5 d) Ctrl + Shift + < e)Ctrl + Shift + >
ANS: c
255. The process of writing computer instructions in a programming language is known as…………..
ANS: e
256. Data and instructions are stored on special ROM (Readonly memory) chips on the board and are called the….
ANS: a
ANS: d
258. Which of the following function key is used to opens a search feature for many programs including Microsoft
windows when at the windows Desktop?
ANS: c
259. Small application programs that run on a web page and may ensure a form is completed properly or provide
animation are known as
ANS: d
ANS: e
a) input data b)store data c)scan data d)view or print data e)None of these
ANS: d
ANS: e
ANS: c
264. A(n) ________ is a program that makes the computer easier to use.
ANS: a
a)hard disk b)optical disc c) output device d)solid-state storage device e)None of these
ANS: b
a) tap box b) pop - up helper c)tab row d) address bar e)Esc key
ANS: a
d) None of these
ANS: b
268.One security method is encryption.But encryption does nothing to keep digital pests and hackers out.To
accomplish this goal, we need……………..
ANS: e
a)unlock the database b)provide a map of the data c)uniquely identify arecord d)establish constraints
on database operations e)none of these
ANS: b
270.When you visit certain web sites spyware may be automatically downloaded.This is called a…………
ANS: b
271.Which of these languages uses a two-step compilation process both interpreter and compiler?
ANS: c
ANS: c
ANS: b
275.The script which is designed to receive value from the web users is…………..
a)web script b)power C91 script c)Java script d)all of these e)none of these
ANS: c
a)number of signal changes per second b)number of bits per second c)number of bytes per second
ANS: a
ANS: c
278……………is the science and art of transforming messages to make them secure and immune to attacks.
ANS: a
a)CPU protection b)Memory protection c)file protection d)all of these e)none of these
ANS: b
a)connecting computer to a hub b)distributed networks c)having same operating system on different
d)sending e-mail e)receiving e-mails
ANS: a
ANS: a
282.What is the language used by most of the DBMS’s fo helping their users to access data?
ANS: b
ANS: d
284.The altering of data so that it is not usable unless the changes are undone is…………
ANS: c
285.EDI……………
ANS: c
286.To make a notebook act as a desktop model ,the notebook can be connected to a…………..which is connected
to a monitor and other devices.
ANS: b
287.Which of the following best describes a network in which a company’s data and applications are stored at
offsite dadta centers that are accessed over the internet?
a)local area network b)virtual private network c)cloud computing d)wide area network e)none
ANS: c
a)file transfer protocol b)DNS c)Network time protocol d)internet relay chat e)none of these
ANS: b
a)all stations can only transmit the data at a time b)all stations can only receive the data at a time c)all
the stations in the network may transmit or receive but at different times d)all the stations in the network
may transmit or receive at the same time e)none of these
ANS: c
ANS: d
292.Which among the following option specifies this action:Holding the mouse button down while moving on
object of text?
ANS: b
293.Which among the following is a type of device that is used for identifying people by their unique
characteristics?
ANS: a
294……………are used to quickly accept,atore and transfer data and instructions that are being used immediately
by the CPU.
ANS: c
a)left aligned b)centrally aligned c)text left aligned and numbers right aligned d)text right aligned and
numbers left aligned e)none of these
ANS: c
296.If you wished to limit what you would see onan excel worksheet,what data function would you use?
ANS: b
297.What type of web technology creates an online community where people can make statements and others
can read and respond to those statements?
ANS: d
FUNCTION KEYS:
F1 --Get help or visit Microsoft office Online.
2. Database: Database is the collection of information in which similar type of data is collected in same
set/class.
5. Cache : A small data-memory storage area that a computer can use to instant re-access the data
instead of re-reading it from the original source, such as a hard drive.
6. Firewall: It is a set of software that prevents unauthorized persons from accessing certain parts of a
program, database, or network.
7. Ethernet: Protocol in the TCP/IP stack, describing how networked devices can format data for
transmission to other network devices on the same network.
9. Intranet: A private network established by an organization for the exclusive use of its employees.
Firewalls prevent outsiders from gaining access to an organization's intranet.
10. Bus : It is an electronic pathway through which data is transmitted between components in a
computer.
11. Cookie: A packet of information that travels between a browser and the web server.
12. Fragmentation: It is process of breaking up of a file into many separate locations in memory or on a
disk.
13. Defragment: It is used to concatenate fragments of data into contiguous blocks in memory or on a
hard drive.
45. Repeaters is used to regenerate or replicate signals that are weakened or distorted by
transmission over long distances
46. Topology:The structure of the network including physical connection such as wiring schemes
and logical interactions between network devices.
47. Mesh topology :Mesh is a network topology in which devices are connected with many
redundant interconnections between network nodes.
48. Star topology : Star topology is a network topology where each individual piece of a network is
attached to a central node.
49. Ring topology: Ring topology refers to a specific kind of network setup in which devices are
connected in a ring and pass information to each other according to their adjacent in the ring
structure.
50. Bus topology :Bus topology is a specific kind of network topology in which all of the various
devices in the network are connected to a single cable or line.
51. Tree toplogy: It is a combination characteristics of linear bus and star topologies.
52. Computer Worm:A computer worm is a malicious, self-replicating software program (malware) which
affects the functions of software and hardware programs. Stuxnet is the most famous computer
worm.
53. Ransomware: Ransomware is a type of malware program that infects and takes control of a system.
It infects a computer with the intention of extorting money from its owner.
54. Adware: This program launches the advertisements in the form of pop ups. Usually the add words
are based on the internet behavior of the user.
55. Spyware: It is a software that secretly collects user information while on the internet. Spyware can
capture information like web browsing habits, email messages, usernames and passwords, and credit
card information.
56. Scareware: A common trick cyber criminals use to make users think that their computer has
become infected with malware to get them to purchase a fake application.
57. Rootkit : A rootkit is a secret computer program designed to provide continued access to a computer
while actively hiding its presence. Rootkits are associated with malware such as Trojans, worms,
viruses.
58. Mail Bomb: An excessively large email (typically many thousands of messages) or one large
message sent to a user’s email account. This is done to crash the system and prevent genuine
messages from being received.
59. Spam: These are unwanted emails. In other words we can call them as unsolicited promotional
mail.
60. Pharming: More advance method of Phishing in which the attackers create duplicate or similar
looking website of other companies, to attract the customers and steal the data.
61. Sniffers: A software program used to monitor the traffic in a network. The hackers may use the