Computer Awareness 2809

Download as pdf or txt
Download as pdf or txt
You are on page 1of 127

STUDENT FARMAYISH

STUDENT
FARMAYISH
BANK|SSC|RAILWAY|INSURANCE

COMPUTER AWARENESS

copyright@studentfarmayishyoutube Page 1
STUDENT FARMAYISH
INTRODUCTION OF COMPUTER:
1.IC is made up of?

a) transistors b)microprocessors c)vacuume tube d) silicon e)both a and b

ANS: d

2. Integrated Chips or IC’s were started to be in use from which generation of Computers?

a) 1st Generation b) 2nd Generation c) 3rd Generation d) 4th Generation e) 5th Generatio

ANS: c

3. Chief component of first generation computer was ____________.

a) Transistors b) Vacuum Tubes and Valves c) Integrated Circuits d) VLSI e) ULSI

ANS: b

4.Time sharing is possible in which generation of computre?

a)1st generation b)2nd generation c)3rd generation d)4th generation d)5th generation

ANS: b

5.AT&T designed its first commercial modem, specifically for converting digital computer data to analog signals for
transmission across its long distance network. What is the name of the modem?

(a) Telex (b) Memex (c) CompuServe (d) Bell 103 dataset (e) Dataphone

ANS: e

6.What is the 1st general purpose electronic computer?

a)ADVAC b)ADSAC c)UNIVAC d)EDVAC e)None of these

ANS: c

7.What is the 1st calculating machine?

a)PARAM b)Pascaline c)EDVAC d)Abacus e)UNIVAC

ANS: d

NOTE:Abacus is developed by China.(simple addition and subtraction)

8.What is the 1st mechanical calculator?

a)PARAM b)Pascaline c)EDVAC d)Abacus e)UNIVAC

ANS: b

NOTE:Pascaline/pascal calculator invented by BLASIE PASCAL

9.What is machine invented by Charles Babbage?


copyright@studentfarmayishyoutube Page 2
STUDENT FARMAYISH
a)Analytical engine b)Abacus c)ENIAC d)MARK-1 e)Tabulating machine

ANS: a

NOTE: Charles Babbage-father of computer.Analytical engine invented in 1837.

10.Who is the 1st programmer?

a) Charles Babbage b) Blasie Pascal c)John Nepier d) Lady Augusta Ada e) Howard Aiken

ANS: d

11.Who is the father of modern computer?

a) Charles Babbage b) Blasie Pascal c)John Nepier d) Lady Augusta Ada e) Alan Turing

ANS: e

12.What is the 1st electromechanical computer?

a)Analytical engine b)Abacus c)ENIAC d)MARK-1 e)Tabulating machine

ANS: c

NOTE: MAKR-1 invented by Howard Aiken.(1944)

13.What is the first commercial computer?

a)PARAM b)Pascaline c)EDVAC d)Abacus e)UNIVAC

ANS: e

14. Which among the following is the smallest unit in an image in a computer screen?

(a) Unit (b) Pixel (c) Array (d) Resolution (e) Clip

ANS: b

15.What is the world’s 1st supercomputer?

a)PARAM b)CRAY-1 c)TIANHE-2 d)ABACUS e) MARK-1

ANS: b

NOTE: it is introduced by Seymour R CRAY in 1976.

16.What is the 1st supercomputer developed by India?

a)PARAM b)CRAY-1 c)TIANHE-2 d)ABACUS e) MARK-1

ANS: a

17.What is the world’s fastest super computer?

a)PARAM b)CRAY-1 c)TIANHE-2 d)ABACUS e) MARK-1

ANS: c

copyright@studentfarmayishyoutube Page 3
STUDENT FARMAYISH
18.Data or information used to turn to run the computer is called?

a)hardware b)CPU c)peripheral d)software e)None of these

ANS: d

19. Which of the following is the smallest and fastest computer imitating brain working ?

a)super computer b)quantum computer c)param-1000 d)IBM chips e)none of these

ANS:b

20.Collecting the data and converting it into information is called?

a)processing b)compiling c)importimg d)exporting e)none of these

ANS: a

21. A central computer that holds collections of data and programs for many PCs,workstations and other
computer is called ?

a)supercomputer b)minicomputer c)laptop d)digital computer e)server

ANS: e

22.what is the Collection of unprocessed items?

a)information b)data c)memory d)reports e)none of these

ANS: b

23.Which of the following is IBM’s supercomputer?

a)Tihane-2 b)Watson c)Sunway Taihu Light d)Shasra-T e)none of these

ANS: b

24.BATCH processing is used in which generation of computer?

a)1st generation b)2nd generation c)3rd generation d)4th generation e)5th generation

ANS: a

25. Real time operating system is used in which generation of computer?

a)1st generation b)2nd generation c)3rd generation d)4th generation e)5th generation

ANS: c

26.AI is an application of which generation of computer?

a)1st generation b)2nd generation c)3rd generation d)4th generation e)5th generation

ANS: e

27.Which language is used in 1st generation of computer?

copyright@studentfarmayishyoutube Page 4
STUDENT FARMAYISH
a)machine language b) high level language c)assembly language d)COBOL d)none of these

ANS: a

28.Transistor is used in which generation of computer?

a)1st generation b)2nd generation c)3rd generation d)4th generation e)5th generation

ANS: b

29.High level language is used in which generation of computer?

a)1st generation b)2nd generation c)3rd generation d)4th generation e) b and c

ANS: c

30.Which computer is used to calculate voltage,pressure,temperature etc?

a)analog computer b)digital computer c)hybrid computer d)supercomputer e)micro computer

ANS: a

31.Time sharing become possible in which generation of computer?

a)1st generation b)2nd generation c)3rd generation d)4th generation e)5th generation

ANS: b

32.which computer is the fastest,biggest and most expensive computer?

a)micro computer b)minicomputer c)supercomputer d) digital computer e)none of these

ANS: c

33.Which computer is used for weather forcasting,fluid dynamics and graphic design?

a) supercomputer b)minicomputer c) micro computer d) digital computer e)none of these

ANS: a

NOTE: MIHIR is the weather forcasting supercomputer in INDIA.

1st super computer in India: Param-8000

Fastest super computer in India-Pratyush

1st super computer in the world-Cray CDC 6600

Fastest super computer in the world-Summit by the USA

34.Which computer is used in specific large scale application?

a) supercomputer b)minicomputer c) micro computer d) main frame computer e)digital computer

ANS: d

35.Which computer is used for personal used?

copyright@studentfarmayishyoutube Page 5
STUDENT FARMAYISH
a) supercomputer b)minicomputer c) micro computer d) main frame computer e)digital computer

ANS: c

36.Electronic pen is used which computer to give input?

a)PC b)laptop computer c)super computer d)digital computer e)palmtop computer

ANS: e

37.Which of the following generally costlier?

a)server b)notebook computer c)PC d)laptop computer e)mainframe computer

ANS: e

38.A hybrid computer is the one having the combined properties of?

a)super and micro b)mini and micro c)analog and digital d)super and mini e)none of these

ANS: c

39.Punch card is used in which generation of computer?

a)1st generation b)2nd generation c)3rd generation d)4th generation e)5th generation

ANS: a

40. Servers are computers that provide resources to other computers connected to a ?

a)Network b)Mainframe c)Super Computer d) Client e)none of these

ANS: a

41.Microprocessor is used in which of the following generation of computer?

a)1st generation b)2nd generation c)3rd generation d)4th generation e)5th generation

ANS: d

42. What is the full form of UNIVAC?

a) Universal Automatic Computer b) Universal Array Computer c) Unique Automatic Computer

d) Unvalued Automatic Computer e) None of these

ANS: a

43.EDSAC stands for

a) Electronic Delay Storage Automatic Calculator b) Electronic Data Storage Automatic Computer c) Electronic
Delay Strong Automatic Computer d) Electronic Delay Storage Automatic Computer e) none of these

ANS: a

44.EDVAC stands for

copyright@studentfarmayishyoutube Page 6
STUDENT FARMAYISH
a) Electronic Discrete Variable Automatic Computer b) Electronic Discrete Value Automatic Computer

c) Electronic Device Variable Automatic Computer d) Electronic Discrete Variable Automatic Calculator

e)none of these

ANS: d

45. A mainframe computer works on a ____ number system.

a)decimal b) octal c)hexadecimal d)binary Both c and d

ANS: d

Computer Hardware and Memory


1.The central processing is an example of ?

a)peripheral b)output unit c)software d)programme e)hardware

ANS: e

2.The central processing unit (CPU)in a computer consists of?

a)input,output and processing b)control unit,primary storage and secondary storage c)control unit,arithmetic
logic unit,memory unit d)all of the above e)none of the above

ANS: c

3.What are the special purpose and high speed temporary unit memory?

a)registers b)ALU c)CU d)CPU e)none of the above

ANS: a

4.Which memory unit communicates directly with the CPU ?

a)main memory b)secondary memory c)auxiliary memory d)register e)none of these

ANS: a

5……..selects,interprets and executes instructions in a CPU?

a)control unit b)ALU c)memory d)storage e)input unit

ANS: a

6.The process of carrying out commands is called?

a)fetching b)storing c)decoding d)executing e)none of these

ANS: d

7.The system unit?

a)coordinates input and output devices b)is the container that houses electronic components
copyright@studentfarmayishyoutube Page 7
STUDENT FARMAYISH
c)is s combination of hardware and software d)control and manipulates data e)none of these

ANS: b

8.The main circuit board in the computer that connects the parts of computer is the

a)mother board b)fatherboard c)match board d)hard drive e)none of these

ANS: a

9.Arithmetic logic unit and control unit sections have special purpose locations called?

a)registers b)RAM c)BIOS d)I/O e)ROM

ANS: a

10.CPU stands for?

a)computer processing unit b)central processing unit c)computer protection unit

d)central processing upload e)none of these

ANS: b

11.Which component is required to process data into information and consists of integrated circuit?

a)hard disk b)RAM c)ROM d)CPU e)none of the above

ANS: d

12.The communication line between CPU,memory and peripherals is called a

a)bus b)line c)media d)all of these e)none of these

ANS: a

13.ALU stands for?

a)arithmetic and logic unit b)arithmetic logic unit c)arithmetic legal unit d)application and logic unit e)none
of these

ANS: b

14. Which among the following is an important circuitry in a computer system that directs the operation of the
processor?

a) Memory b) Address Bus c) Accumulator d) ALU e) Control Unit

ANS: e

15. Which register is used as a working area in CPU ?

(a) Program counter (b) Instruction registers (c) Instruction decoder (d) Parity generator (e) Accumulator

ANS: e

copyright@studentfarmayishyoutube Page 8
STUDENT FARMAYISH
16. Which of the following memory has stored data in large number?

(a) RAM (b) ROM (c) Cache memory (d) Hard Disk (e) None of these

ANS : D

17. Actual execution of instructions in a computer takes place in?

a) ALU b) Control Unit c) Storage unit d) Control bus e) None of the above

ANS: a

18. Manipulation of data in computer is called

a) Boot b) Processing c) Simplification d) Format e) Clean disk

ANS: b

19. ------------ controls the way in which the computer system functions and provides a means by which users can
interact with the computer.

a)The Platform b)The Operating System c) Application Software d)The Motherboard e)NOTA

ANS: b

20.Which of the following is not true about RAM ?

a) RAM is a temporary storage area b) RAM is the same as hard disk storage c) RAM is volatile
d) Information stored in RAM is gone when you turn the computer off e) None of these

ANS: b

21. A set of step-by-step procedures for accomplishing a task is known as

a) algorithm b) hardware program c) software bug d) firmware program e) None of these

ANS: a

22.RAM is an example of

a) Secondary memory b) Primary memory c) Both (a) and (b) d) None of the above e)main memory

ANS: b

23. Each memory cell has a unique number, assigned to it is called as the ___ of the cell

a) Address b) Register c)bus d)number e)none of these

ANS: a

24. The secondary storage memory is also called as

a) Auxiliary Memory b) Attractive Memory c) Chip Memory d) None of the above e)both a and b

ANS: a

copyright@studentfarmayishyoutube Page 9
STUDENT FARMAYISH
25. What is the difference between a CD- ROM and a CD-RW ?

a) They are the same—just two different terms used by different manufacturers

b) A CD-ROM can be written to and a CD- RW cannot c) A CD-RW can be written to, but a CD- ROM can only be
read from d) A CD-ROM holds more information than a CD-RW e) None of these

ANS : c

26. Which of the following are advantages of CD-ROM as a storage media?


a)CD-ROM is an inexpensive way to store large amount of data and information

b)CD-ROM disks retrieve data and information more quickly than magnetic disksdo

c)All of the above d)CD-ROMs make less errors than magnetic media e) None of these

ANS: a

27. What is the full form of ROM ?


a)Random Opaque Modulator b)Red Orange Magenta c)Relative Overlay Module d)Read Opitcal Media

e)Read Only Memory

ANS: e

28. Hardware includes?


a)all devices used to input data into a computer b)sets of instructions that a computer runs or executes

c)the computer and all the devices connected to it that are used to input and output data

d)all devices involved processing information including the central processing unit, memory, and storage

e)None of these

ANS: c

29.In which storage register holds data for further execution?

a)buffer b)UPS c)mother board d)hard disk e)none of these

ANS: a

30……is when the more power-hungry components,such as the monitor and the hard drive,are put in idle.

a)hibernation b)power down c)standby mode d)the standdown procedure e)none of these

ANS: c

31.Which is an example of non-volatile memory?

a)ROM b)RAM c)LSI d)VLSI e)none of these

ANS: a

32. Holding the mouse button down while moving an object or text is known as—

copyright@studentfarmayishyoutube Page 10
STUDENT FARMAYISH
a) Moving b) Dragging c) Dropping d) Highlighting e) None of these

ANS : b

33.…….is a small picture on screen that depicts program, file or folder.

a)Chip b)Virus c)Icon d)Memory e)Pixel

Ans: c

34.Which one of the following input device is user-programmable?

a)dumb terminal b)smart terminal c)VDT d)intelligent terminal e)none of these

ANS: d

35.External device such as printers,keyboards and modems are known as?

a)add-on device b)peripherals c)extra hardware device d)PC expansion slot add-on e)none of these

ANS: b

36. All are included in removable media except the following

a) CD-ROMs b) Diskette c) DVDs d) High disk drive e) None of these

ANS: d

37.MICR stand for?

a)magnetic ink character reader b) magnetic ink character register c) magnetic ink code reader

d) magnetic ink cases reader e) magnetic ink character recognition

ANS: e

38.What type of device is a computer monitor?

a)input b)output c)software d)hardware e)storage

ANS: b

39.A parallel port is used by which of following?

a)mouse b)monitor c)printer d)both a and b e)none of these

ANS: c

40.The higher the resolution of a monitor, the

a)larger the pixel b)less cler the screen is c)further apart the pixel d)closer together the pixels

e)none of these

ANS: d

41. What is a cursor?

copyright@studentfarmayishyoutube Page 11
STUDENT FARMAYISH
a)It shows the position on a computer monitor b)It is an indicator c)All of the above

d)Cursor is Latin for 'runner. E)Both a and b

ANS: c

42. Which of the following is used to indicate the location on the computer monitor ?

a) Mouse b) Cursor c) Both (a) and (b) d) None of the above e)priter

ANS: b

43. Choosing a program instruction or data item from memory is called

a)encoding b)decoding c)storing d)fetching e)detaching

ANS: d

44.If a disk drive fails but the computer application running and using it can continue processing, this application is
said to have been designed with this feature?

a) 100 per cent uptime b) fault tolerance c) high reliability d) All of these e) None of these

ANS : b

45……..devices convert human-understandable data and programs into a form that the computer can process?

a)printing b)output c)solid state d)monitor e)input

ANS: e

46.Which is not an impact printer?

a)laser printer b)dot matrix c)daisy wheel d)both a and b e)none of these

ANS: a

47.Which key is used in combination with another key to perform a specific task?

a)function b)space bar c)arrow d)control e)none of these

ANS: d

48. Which memory is non-volatile and may be written only once?

a) RAM b) EPROM c) EEPROM d) PROM e) None of the above

ANS: d

49.Which one of the following is an added set of one or more attributes taken collectively to uniquely identify a
record?

a) Alternate key b) Sub key c) Super key d) Foreign key e) None of these

ANS: c

copyright@studentfarmayishyoutube Page 12
STUDENT FARMAYISH
50.What is the function of control unit?

a) Providing resources to another node on a network b) Performing complex task of logical and arithmetic
functions c) Memory usage d) Directing the operation of the other units by providing timing and control
signals. e) Displaying output to the end-user

ANS: d

51.Serial port is used in which of the following?

a)external modem b)plotters c)barcode reader d)all of these e)none of these

ANS: d

52.Which device makes copies and reproduces text and images?

a)CPU b)memory c)printer d)scanner e)joystick

ANS: d

53.Which ports provide slow speed data transmission?

a)serial b)parallel c)firewire d)USB e)external

ANS: a

54.Which ouput device is used to produce large drawings or images?

a)printer b)plotter c)monitor d)scanner e)none of these

ANS: b

55.which printer use laser beam?

a)thermal printer b)drum printer c)laser printer d)line printer e)impact printer

ANS: c

57.Which of the following produces high quality output?

a)impact printer b)non-impact printer c)plotter d)both a and b e)non-plotter

ANS: b

58.Tab key is used to

a)move a cursor across the screen b)indent a paragraph c)move the cursor down the screen

d)both a and b e)none of these

ANS: b

59.Which key is used in combination with another key to perform a specific task?

a)function b)space bar c)arrow d)control e)none of these

copyright@studentfarmayishyoutube Page 13
STUDENT FARMAYISH
ANS: d

60.In laser printer,printing is achieved by deflecting laser bean on to…….surface of a drum.

a)magnetized b)photosensitive c)magnetic d)either a or b e)none of these

ANS: b

61.Which of these is a pointing device?

a)mouse b)scanner c)printer d)CD-ROM e)keyboard

ANS: a

62.USB refers to?

a)a storage device b)a processor c)a port type d)a serial bus standard e)none of these

ANS: c

63.Which unit is used to count the speed of a printer?

a)CPM b)DPI c)PPM d)BIT e)none of these

ANS: d

64.Which among the given options does not have flash memory?

a) Pen Drive b) Hard Disk c) Car Radio d) Memory Cards e) Memory Stick

ANS: c

65.Which of the following is the high speed memory which compensates the gap in speeds of processor and main
memory?

a)PROM b)EPROM c)SRAM d)cache e)none of these

ANS: d

66.Difference between memory and storage is that memory is……… and storage is……..

a)permanent,temporary b)temporary,permanent c)slow,fast d)non-volatile,volatile e)none of these

ANS: b

67.What is the temporary storage memory chips that form the computers primary work space,the contents are
lost if power is disrupted.

a)output b)input c)RAM d)hard drive e)ROM

ANS: c

68.The main directory of a disk is called ?

a)network b)root c)program d)data e)folder

copyright@studentfarmayishyoutube Page 14
STUDENT FARMAYISH
ANS: b

69.The most frequently used instructions of a computer program are likely to be fetched from?

a)RAM b)ROM c)cache memory d)PROM e)register

ANS: c

70.The process of dividing the disk into tracks and sectors is ?

a)crashing b)formatting c)tracking d)allotting e)dividing

ANS: b

71.Which of the following is correct sequence of smallest to largest unit of storage size?

a)petabyte,kilobyte,megabyte,gigabyte,terabyte,bit,byte,exa byte,zetabyte,yota byte

b) bit, byte, kilobyte, megabyte,gigabyte , terabyte ,exa byte, petabyte, yota byte, zetabyte

c) bit, byte, kilobyte, megabyte,gigabyte, yota byte, zetabyte, terabyte ,exa byte, petabyte

d) bit, byte, kilobyte, megabyte,gigabyte , terabyte , petabyte, ,exa byte, yota byte, zetabyte

e) bit, byte, kilobyte, megabyte,gigabyte , terabyte , petabyte, ,exa byte, zetabyte, yota byte

ANS: e

72……can be erased by using ultraviolet light?

a)PROM b)EPROM c)UVEPROM d)either a or b e)either b or c

ANS: e

73.Which memory is used in digiatal camera,mobile phone,printer?

a)virtual memory b)flash memory c)cache memory d)hard disk e)none of these

ANS: b

NOTE: flash memory non-volatile rewritable memory

74.Which of the following storage devices can be used for storing large backup data?

a)floppy disk b)hard disk c)magnetic tape d)all of these e)none of these

ANS: b

75………is a temporary physical storage used to hold data during execution or process from one place to another?

a)cache memory b)buffer c)flash memory d)virtual memory e)none of these

ANS: b

76.Which is not a magnetic storage?

a)HDD b)floppy disk c)DVD d)all of these e)none of these

copyright@studentfarmayishyoutube Page 15
STUDENT FARMAYISH
ANS: c

77.Instructions and memory address are represented by?

a)character code b)binary code c)binary word d)parity bit e)none of these

ANS: b

78.Expansion cards are inserted into

a)slots b)peripheral devices c)CPU d)the back of the computer e)none of these

ANS: a

79.Hard drive is normally located

a)next to the printer b)plugged into the back of the computer c)underneath the monitor

d)on top of the CD-ROM e)inside the system base unit

ANS: e

80.Which among the given options does not have flash memory?

a) Pen Drive b) Hard Disk c) Car Radio d) Memory Cards e) Memory Stick

ANS: c

81.Which of the following is the high speed memory which compensates the gap in speeds of processor and main
memory?

a)PROM b)EPROM c)SRAM d)cache e)none of these

ANS: d

82. A permanent memory, which halls data and instruction for start-up the computer and does not erase data
after power off.
a) Network interface card b)CPU c)RAM d)ROM e)None of these

ANS: d

83.Which of the following memories must be refreshed many times per second?
a) EPROM b)ROM c)Static RAM d)Dynamic RAM e)none of these

ANS: d

84.USB-type storage device is -


a) Secondary b)Axillary c)Tertiary d)Primary e)none of these

ANS: c

85. Which of the following places the common data elements in order from smallest to largest?

a) Character, File, Record, Field, Database, File b)Character, Record, Field, Database, File c)Character,

copyright@studentfarmayishyoutube Page 16
STUDENT FARMAYISH
Field, Record, File, Database d)Bit, Byte, Character, Record, Field, File, Database e)None of these

ANS: c

86. Which device is used to back up the data?


a) Floppy Disk b)Tape c)Network Drive. d)All of the above e)None of these

ANS: d

87. Main memory of computer is -


a) Internal b)External c)a and b both d)Auxiliary e)None of these

ANS: a

88. What is the permanent memory built into your computer called?
a) RAM b)ROM c)CPU d)CD-ROM e)None of these

ANS: b

89. With a CD you can...........


a) read b)write c)read and write d)either read or write e)None of these

ANS: c

90.Magnetic tape is not practical for applications where data must be quickly recalled because tape is
__________.
a) A random-access medium b)A sequential-access medium c)A read-only medium

d)An expensive storage medium e)None of these

ANS: b

91. What is the main advantage of magnetic core memory over semiconductor RAM memory?
a) More compact and smaller b)More economical c)A bit does not have to write after reading

d)Non-volatile e)None of these

ANS: d

92. Permanent instructions that the computer uses when it is turned on and that cannot be changed by other
instructions are contained in-
a) ROM b)RAM c)ALU d)CPU e)DRAM

ANS: a

93.Flash is ................
a) Software b)Hardware c)ROM d)EEPROM e)E REM

ANS: d
94. The faster, costlier and relatively small from of storage managed by computer system hardware is:

copyright@studentfarmayishyoutube Page 17
STUDENT FARMAYISH

a) Main Memory b)Flash Memory c)Cache d)Disk e)virtual memory

ANS: c

95.Breaking logical memory into blocks of the same size is called as:
a) Frames b)Segments c)Packets d)Pages e)none of these

ANS: d

96.What is the capacity of super computers floppy disc?


a) 400 M b)500 M c)600 M d)700 M e)None of these

ANS: b

97.Which of the following memories must be refreshed many times per second?
a) Static RAM b)Dynamic RAM c) EPROM d)ROM e) None of these
ANS: b
98. A name or number used to identify a storage location devices?

a) A byte b)A record c)An address d)All of above e)None of these


ANS: c
99. Which of the following is a primary storage device?

a)Magnetic tape b)Magnetic disk c)Optical disk d)Hard disk e)None of these
ANS: e
100 The two kinds of main memory are:

a) Primary and secondary b) Random and sequential c) ROM and RAM d) All of above e)None of these
ANS: c

101.High density double sided floppy disks could store _____ of data
a) 1.40 MB b) 1.44 GB c) 1.40 GB d) 1.44 MB e) None of these
ANS: d

102.Fragmentation is –

a) dividing the secondary memory into equal sized fragments b) dividing the main memory into equal size
fragments c) f ragments of memory words used in a page d) f ragments of memory words unused in a page
e) None of these
ANS: a

103. Which memory unit has lowest access time?


a) Cache b) Registers c) Magnetic Disk c) Main Memory c) Pen drive
ANS: b
104. Which one of the following is an added set of one or more attributes taken collectively to uniquely identify a
record?

a) Alternate key b) Sub key c) Super key d) Foreign key e) None of these

ANS: c

105. Which of the following is an example of telecommunications device?

copyright@studentfarmayishyoutube Page 18
STUDENT FARMAYISH
a) Printer b)Scanner c)Joystick d)Window 10 e)Modem
ANS: e
106. ______ component is used for short - term data storage.
a)ROM b) DVD RAM c)Hard disc d)Both a and b e)RAM

ANS: e

107. Which key is pressed to move to the beginning of a line of text in a document?
a)Scrollbar b) Page up key c) Tab key d)Home Key e) Page down key

ANS: d

108. Which of the following function key is used to opens a search feature for many programs including Microsoft
windows when at the windows Desktop?
a) F1 b) F2 c) F3 d) F4 e) F5

ANS: c

109. Small application programs that run on a web page and may ensure a form is completed properly or provide
animation are known as
a) Cookies b) Cache c) Hyperlink d)Flash e)Spam
ANS: d
110. What does 'P' stand for in 'DPI'?
a) Protocol b) Page c) Per d)Pixel e) paper

ANS: c
111. _______ is a component of the motherboard, which is used to travel information.
a) ALU b) Chip c)Port d)CMOS e)Bus

ANS: e

112. Bit stands for


a) binary system b) digital byte c) binary digit d) binary unit e)none of these

ANS: c

113. Computers process binary numbers, which are composed of _________.


a) 1s and 2s b) 2s and 4s c) 1s and 10s d) 0s and 1s e)0s and 10s

ANS: d

114. What is Cache RAM?


a) Extra memory used for overflow from your Hard Disk b) A place to store secret information like passwords
c) It's the same as your Hard Disk Drive d) Fast memory used for data that is accessed often e)none of these

ANS: d

copyright@studentfarmayishyoutube Page 19
STUDENT FARMAYISH
115. _______ is the combination of a scanner and special software which converts the printed or handwritten data
to ASC II.
a) OCR b) MICR c) OMR d)Kimball tag reader e)Other than the given options

ANS: a

116. Which of the following key (s) on the keyboard is/are called modifier keys?
a)Alt key b)Ctrl key c)Shift key d)All of these e) Other than the given options

ANS: d

117. Which key launched the start button?


a) Windows b) Esc c) Shift d) Function key e) Num lock

ANS: a

118. Which function key is used to refresh the current window?


a) F1 b)F5 c)F3 d)F6 e)F4

ANS: b

119. Different components on the motherboard of a PC unit are linked together by se ts of parallel electrical
conducting lines. What are these lines called?

a) Conductors b) Buses c) Connectors d) Consecutives e) None of these

ANS: b

120. Which of the following places the common data elements in order from smallest to largest?
a) Character, file, record, field, database b) Character, record, field, file, database c) Character, field, record,
file, database d) Bit, byte, character, record, field, file, database e) None of these
ANS: d

121. Which of the following is billionth of a second?

a) Microsecond b) Nanosecond c) Terabyte d) Gigabyte e)none of these

ANS: b

122. _____ has the shortest access times.

a) Virtual Memory b) Secondary Memory c) Cache Memory d) All of the above e)none

ANS: c

123. Programs stored in ROM are called as………..

a) Fireware b) Formware c) Farmware d) Firmware e)none of these

ANS: d

copyright@studentfarmayishyoutube Page 20
STUDENT FARMAYISH
124. The main advantage of hexadecimal numbers is the case of conversion from hexadecimal to…….

a) decimal b) Binary c) ASCII d) BCD e)none

ANS: b

125.Amemory that does not change its contents without external causes is known as…………..

a)dynamic memory b)static memory c)RAM d)EEPROM e)none of these

ANS: b

Computer Network,Operating System:


1.Communication between walkie-talkies involves which of the following types of transmission?
a) Simplex b) Full –Duplex c) Half-Duplex d) Online e) None of these
ANS: c
2.Who among the following sent the first electronic mail?
a) Ray Tomlinson b) Charles Babbage c) J.Presper Eckert d) John W Mauchly e) Ana Lovelace
ANS: a
3. Bluetooth is an example of which of the following networks?
a) Personal area network b) Local area network c) Virtual private network d) None of the above
e) Wireless fidelity
ANS: a
4. What is a Firewall in Computer Network?
a) The physical boundary of Network b) An operating System of Computer Network c) A system designed
to prevent unauthorized access d) A web browsing Software e) None of these
ANS: c
5. What is a common medium used for thieves to steal others' identities?
a) Telephone b) Pick pocketing c) Burglary d) Email e) None of the above
ANS: d
6.What type of web technology creates an online community where people can make statements and others can
read and respond to those statements?
a) I-Journal b) Podcast c) ASP d) Blog e) None of these
ANS: d
7.In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ___________
a) Added b) Removed c) Rearranged d) Modified e)none of these
ANS: a
8.A _______ is the physical path over which a message travels.
a) Path b) Medium c) Protocol d) Route e)none of these

copyright@studentfarmayishyoutube Page 21
STUDENT FARMAYISH
ANS: b
9. The structure or format of data is called ___________
a) Syntax b) Semantics c) Struct d) Formatting e)none of these
ANS: a
10. Communication between a computer and a keyboard involves ______________ transmission.
a) Automatic b) Half-duplex c) Full-duplex d) Simplex e)none of these
ANS: d
11.The first Network was called ________
a) CNNET b) NSFNET c) ASAPNET d) ARPANET e)none of these
ANS: d
12. Three or more devices share a link in ________ connection.
a) Unipoint b) Multipoint c) Point to point d) Simplex e)none of these
ANS: b
13. Two devices are in network if __________
a) a process in one device is able to exchange information with a process in another device
b) a process is running on both devices c) PIDs of the processes running of different devices are same
d) a process is active and another is inactive d)none of these
ANS: a
14. Bluetooth is an example of __________
a) personal area network b) local area network c) virtual private network d) wide area network
e)none of these
ANS: a
15. A __________ is a device that forwards packets between networks by processing the routing information
included in the packet.
a) bridge b) firewall c) router d) hub e)none of thee
ANS: c
16. Which of the following networks extends a private network across public networks?
a) local area network b) virtual private network c) enterprise private network
d) storage area network d) personal area network
ANS: b
17.How many layers are present in the Internet protocol stack (TCP/IP model)?
a) 5 b) 7 c) 6 d) 10 e)8
ANS: a
18.The number of layers in ISO OSI reference model is __________
a) 5 b) 7 c) 6 d) 10 e)8
ANS: b
19. Which of the following layers is an addition to OSI model when compared with TCP IP model?
a) Application layer b) Presentation layer c) Session layer d) Session and Presentation layer

copyright@studentfarmayishyoutube Page 22
STUDENT FARMAYISH
e)none of these
ANS: d
20. The functionalities of the presentation layer include ____________
a) Data compression b) Data encryption c) Data description d) All of the mentioned e)none of these
ANS: d
21. Bluetooth is an example of which of the following networks?
a) Personal area network b) Local area network c) Virtual private network
d) None of the above e) Wireless fidelity
ANS: a
22. Delimiting and synchronization of data exchange is provided by __________
a) Application layer b) Session layer c) Transport layer d) Link layer e)none of these
ANS: b
23. Which of the following statements can be associated with OSI model?
a) A structured way to discuss and easier update system components b) One layer may duplicate lower layer
functionality c) Functionality at one layer no way requires information from another layer
d) It is an application specific network model e)none of these
ANS: c
24. Which layer is responsible for process to process delivery in a general network model?
a) network layer b) transport layer c) session layer d) data link layer e)none of these
ANS: b
25. Which address is used to identify a process on a host by the transport layer?
a) physical address b) logical address c) port address d) specific address e)none of these
ANS: c
26.Which layer provides the services to user?
a) application layer b) session layer c) presentation layer d) physical layer e)none of these
ANS: a
27. Transmission data rate is decided by ____________
a) network layer b) physical layer c) data link layer d) transport layer e)none of these
ANS: b
28. Which layer is used to link the network support layers and user support layers?
a) session layer b) data link layer c) transport layer d) network layer e)none of these
ANS: c
29. TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer b) transport layer c) application layer d) network layer e)none of these
ANS: a
30. The physical layer is concerned with ___________
a) bit-by-bit delivery b) process to process delivery c) application to application delivery d) port to port delivery

copyright@studentfarmayishyoutube Page 23
STUDENT FARMAYISH
e)none of these
ANS: a
31. Which transmission media provides the highest transmission speed in a network?
a) coaxial cable b) twisted pair cable c) optical fiber d) electrical cable e)none of these
ANS: c
32. The physical layer provides __________
a) mechanical specifications of electrical connectors and cables b) electrical specification of transmission line
signal level c) specification for IR over optical fiber d) all of the mentioned e)none of these
ANS: d
33. The physical layer translates logical communication requests from the ______ into hardware specific
operations.
a) data link layer b) network layer c) trasnport layer d) application layer e)none of these
ANS: a
34. A single channel is shared by multiple signals by ____________
a) analog modulation b) digital modulation c) multiplexing d) phase modulation e)none of these
ANS: c
35. The data link layer takes the packets from _________ and encapsulates them into frames for transmission.
a) network layer b) physical layer c) transport layer d) application layer e)none of these
ANS: a
36. The network layer is concerned with __________ of data.
a) bits b) frames c) packets d) bytes e)none of these
ANS: c
37. A 4 byte IP address consists of __________
a) only network address b) only host address c) network address & host address
d) network address & MAC address e)none of these
ANS: c
38. A subset of a network that includes all the routers but contains no loops is called ________
a) spanning tree b) spider structure c) spider tree d) special tree e)none of these
ANS: a
39. The network layer protocol for internet is __________
a) Ethernet b) internet protocol c) hypertext transfer protocol d) file transfer protocol e)none of these
ANS: b
40. ICMP is primarily used for __________
a) error and diagnostic functions b) addressing c) forwarding d) routing e)none of these
ANS: a
41. Transport layer aggregates data from different applications into a single stream before passing it to……………..
a) network layer b) data link layer c) application layer d) physical layer e)none of these
ANS: a

copyright@studentfarmayishyoutube Page 24
STUDENT FARMAYISH
42. Which of the following are transport layer protocols used in networking?
a) TCP and FTP b) UDP and HTTP c) TCP and UDP d) HTTP and FTP e)none of these
ANS: c
43. Transmission protocol ___________
a) is a connection-oriented protocol b) uses a three way handshake to establish a connection
c) receives data from application as a single stream d) all of the mentioned e)none of these
ANS: d
44. An endpoint of an inter-process communication flow across a computer network is called __________
a) socket b) pipe c) port d) machine e)none of these
ANS: a
45. Transport layer protocols deals with ____________
a) application to application communication b) process to process communication
c) node to node communication d) man to man communication e)all of the above
ANS: b
46. Physical or logical arrangement of network is __________
a) Topology b) Routing c) Networking d) Control e)none of these
ANS: a
47. Data communication system spanning states, countries, or the whole world is ________
a) LAN b) WAN c) MAN d) PAN e)none of these
ANS: b
48. Data communication system within a building or campus is________
a) LAN b) WAN c) MAN d) PAN e)none of these
ANS: a
49. Which network topology requires a central controller or hub?
a) Star b) Mesh c) Ring d) Bus e)none of these
ANS: a
50._______ topology requires a multipoint connection.
a) Star b) Mesh c) Ring d) Bus e)none of these
ANS: d
51.The sharing of a medium and its link by two or more devices is called _________
a) Fully duplexing b) Multiplexing c) Micropleixng d) Duplexing e)none of these
ANS: b
52. Which of the following scrambles a message by applying a secret code?
a) Audits b) Encryption c) UPS d) Firewalls e) Encapsulation
ANS: b
53. If you are allowing a person on the network based on the credentials to maintain the security of your network,
then this act refers to the process of ______.
a) Authentication b) Automation c) Firewall d) Encryption e) Decryption
copyright@studentfarmayishyoutube Page 25
STUDENT FARMAYISH
ANS: a
54.There is a network that can connect networks ranging from small location or area to a bigger range including
public packet network and large corporate networks. That network's enterprise allows users to share access to
applications, services and other centrally located resources. Its ability for a huge geographical access has
transformed networking. Which among the following is that network?
a) SAN b) CAN c) LAN d) WAN e) MAN
ANS: d
55. Free-of-cost repair of software bug available at Internet is called

a) Version b) Add-on c) Tutorial d) Patch e)none of these

ANS: d

56. Which of the following describes the characteristic features of SRAM?

a) Cheap but slow b) More consumption of power and much costly c) Based on transistor-capacitor
combination d) Low consumption of power e)none of these

ANS: b

57. Rules for exchanging data between computers are called

a) procedures b) protocol c) hyperlink d) programs e) hyper-actions

ANS: b

58. ________ is the most important/powerful computer in a typical network.


a) Network client b) Desktop c) Network switch d) Network station e) Network server

ANS: e

59. ________ is a network point that acts as an entrance to another network.


a)Phishing b) Server c)FTP d)Gateway e) Domain

ANS: d

60. What is the full form of NIC?


a)Network Interface Card b)Network Internet Card c) National Internet Card
d) New Interface Card e)Net Internet Channel

ANS: a

61. What is called the sharing of a medium and its path by 2 or more devices?
a)Multiplexing b)Multiprocessing c) Multi-operating d) Multitasking e) Multisharing

ANS: a

62. What is the full form of 'RAID'?

copyright@studentfarmayishyoutube Page 26
STUDENT FARMAYISH
a) Random Access of Inexpensive disks b)Redundant Array of Inexpensive data c)Random Array of
Inexpensive data d)Random Array of Internet data e)Redundant Array of Inexpensive disks

ANS: e

63.What is the function of a modem?

a)encryption and decryption b)converts data to voice and vice-versa c)converts analog signals to digitals and
vice versa d)server as ahardware anti virus e)none of these

ANS: c

64.Which of the following cables can transmit data at high speeds?

a)flat cables b)co-axial cable c)optic fibre cable d)twisted fibre cable e)UTP cable

ANS: c

65.In OSI network architecture,the routing is performed by?


a)network layer b)data link layer c)transport layer d)session layer e)none of these
ANS: a

66.What do we call for the arrangement when two or more computers physically connected by cables to share
information or hardware?
a)URL b)server c)modem d)network e) internet
ANS: d

67. Which typre of network would use phone lines?


a)WAN b)LAN c)WWAN d)Wireless e)none of these

ANS: a

68.Name the 4th layer of OSI model?


a)application layer b)data link layer c)transport layer d)session layer e)none of these
ANS: c

69. P2P is a………………..application architecture.


a)clint b)server c)distributed d)1-tier e)both a and b
ANS: c

70…………..joins two different network protocols together.


a)hub b)gateway c)switch d)router e)bridge

ANS: b
71……………….operates only on physical layer of OSI model.
a)hub b)gateway c)switch d)router e)repeater
ANS: e

copyright@studentfarmayishyoutube Page 27
STUDENT FARMAYISH

72. If you wish to extend the length of the network without having the signal degrade, you would use a
a) Gateway b) Router c) Modem d) Repeater e) Resonator
ANS: d

73.E-mail addresses separate the user name from the ISP using the…………….symbol.
a)$ b)@ c)% d)// e).

ANS: b
74.What is the standard protocol of the internet?
a)TCP/IP b)HTML c)flash d)java none of these

ANS: a
75.Junk email is also called……
a)crap b)spoof c)sniffer script d)spool e)spam
ANS: e

76.Talnet is a…………….based computer protocol.


a)sound b)animation c)image d)text e)digits
ANS: d

77.A cookie is
a)stores information about the user’s web activity b)stores software developed by the user
c)stores the password of the yesr d)none of these e)stores the commands used by the user
ANS: a

78.Documents converted to…………..can be pertaining to e-mail?


a)a doc file b)http c)machine language d)HTML e)none of these
ANS: d
79. Granting an outside organization access to internet web pages is often implemented using a ____
a) extranet b) intranet c) internet d) hacker e) None of these
ANS: a
80. <H1> is an example of _____.
a) HTML b) GML c) SGML d) NSGML e) None of these
ANS: a
81. An application that locates information about Web pages and then stores this information in searchable
databases that you can access from your browsers is called ________
a) Search Engine b)Browser c) Domain d) None of these

ANS: a

82. A software program that lets you to use the Internet is called __________
a) Search Engine b)Browser c) Domain d) None of these

copyright@studentfarmayishyoutube Page 28
STUDENT FARMAYISH
ANS: b

83. How can the user determine what programs are available on a computer ?

a) Checking the hard disk properties b) Viewing the installed programs during the booting process
c) Checking the operating system for a list of installed programs d) Checking the existing files saved on the
disk e) None of these

ANS: c

84. Which process checks to ensure the components of the computer are operating and connected properly?

a) Booting b) Processing c) Saving d) Editing e) None of these

ANS: a

85. Which of the following is an operating system?

a) Compiler b) Plotter c) Mac d) Both 1 and 2 e) All of the above

ANS: c

86. What is Loading Operating System into main memory called?

a) Printing b) Saving c) Storing d) Staring e) Booting

ANS: e

87. Which of the following is a recent version of operating systems?

a) Windows XP b) Windows 7 Basic c) Windows 8 d) Windows 10 e) Windows 2013

ANS: d

88. ___________ is the file system used by the operating system to identify the physical locations of files on the
hard drive.

a) RTOS b) GIF c) FAT d) POST e) None of these

ANS: c

89. Linux is a_____

a) Utility program for peer-to-peer file sharing b) Real-time operating system c) Network operating
system d) PDA platform e) None of these

ANS: b

90. What is RISC?

a) Storage Device b) Computer Network c) Microprocessor d) Operating System


e) None of these

ANS: d

copyright@studentfarmayishyoutube Page 29
STUDENT FARMAYISH
91. At a time how many operating system can be at work on a computer ?

a) Only one b) Two c) Three d) Four e) None of these

ANS: a

92.Android Operating system is an example of which kind of Source Model?

a) Vertical Market Software b) Open Source c) Horizontal Market Software


d) Shareware e) None of these

ANS: b

93. The _____ tells the computer how to use its components.

a) Utility b) Network c) Operating system d) Application program e) None of these

ANS: c

94. The operating system that is self-contained in a device and resident in the ROM is ______

a) Batch Operating System b) Real - time Operating System c) Embedded Operating System
d) Multi Operating System e) None of these

ANS: c

95. To be able to 'boot', the computer must have a(n) ..........

a) Compiler b) Loader c) Operating System d) Assembler e) None of these

ANS: c

96. The two major components of system software are:

a) The operating system and system utilities b) Application software and system utilities c) Primary
memory and storage d) The operating system and applications software e) None of these

ANS: a

97. Which of the following may be necessary for you to do after you install new application software?

a) Turn the computer power switch off and then back on b) Do a cold boot c) Press Shift + Alt +
Del d) Do a warm boot e) None of these

ANS: d

98. Loading Operating System onto RAM is called?

a) Printing b) Saving c) Booting d) Staring e) None of these

ANS: c

99. The memory resident portion of the operating system is called the—

a) Registry b) API c) CMOS d) Kernel e) None of these

copyright@studentfarmayishyoutube Page 30
STUDENT FARMAYISH
ANS: d

100. Which of the following is / are the functions of operating system?

a) Memory Management b) Access to I/O devices c) Controlled Access to files


d) All of these e) None of these

ANS: d

101. A(n) ______ is a set of programs designed to manage the resources of a computer, including starting the
computer, managing programs, managing memory and coordinating tasks between input and output devices.

a) application suite b) compiler c) input/output system d) operating system e) None of these

ANS: d

102. A computer's type, processor and operating system define its …

a) Brand b) Size c) Platform d) Speed e) None of these

ANS: d

103. When your turn on the computer, the boot routine will perform this test

a) RAM test b) disk drive test c) memory test d) power on self test e) None of these

ANS: d

104. Which among the following is the reboot where the power to the system is physically turned off and back on
again, causing an initial boot of the machine?

a) Toggle b) Cold booting c) Warm booting d) Logging off e) None of these

ANS: b

105. Which process checks to ensure the components of the computer are operating and connected properly?

a) Booting b) Processing c) Saving d) Editing e) None of these

ANS: a
106.Grouping and processing all of a firm’s transactions at one time, is called?
a)a database management system b)batch processing c)a real time sharing
d)an on-time system e)none of these
ANS: b
107. “>” symbole in DOS commands is used to
a)compare two values b)redirect input c)redirect output d)filter data e)none of these
ANS: d
108. When more than one processes are running concurrently on a system-
a) batched system b) real-time system c) multi programming system
d) multiprocessing system e) None of these

copyright@studentfarmayishyoutube Page 31
STUDENT FARMAYISH
ANS: d

109.What happen when you boot up a PC?

a)portions of the operating system are copied from disk into memory b) portions of the operating system
are copied from memory onto disk c) portions of the operating system are compiled d) portions
of the operating system are emulated e)the PC gets switched off

ANS: a

110.In MS-DOS,usually the primary hard disk drives has the drive letter…………..

a)A b)B c)C d)E e)D

ANS: c

111.MS-DOS is usually supplied on a

a)hard disk b)cartridge tape c)CD ROM d)flopy disk e)none of these

ANS: a

112.The kernel is……user threads.

a)pre-emptive kernals b)non-pre-emptive kernals c)both a and b d)none of these

ANS: a

113…………provides process and memory management services that allow two or more tasks,jobs or peograms to
run simultaneously.

a)multitasking b)multithreading c)multiprocessing d)multicomputing e)none

ANS: a

114.The simultaneous processing of two or more programs by multiple processors is…………

a)multitasking b)multithreading c)multiprocessing d)multicomputing e)none

ANS: c

115.Which command is used to delete file from a directory in DOS?

a)REN b)DEL c)CD d)MD e)none of these

ANS: b

116.The process of transferring data intended for a peripheral device into disk,so that it can be transferred to
peripheral at a more convenient time or in bulk,is known as

a)spooling b)multiprogramming c)caching d)virtual programming e)none of these

ANS: a

117. In computing, a _____ is a directive to a computer program order to perform a specific task.

copyright@studentfarmayishyoutube Page 32
STUDENT FARMAYISH
a) Hard boot b) Hibernation c) Command d) Warm boot e) Format

ANS: c

118. The commonly used UNIX commands like date, is, cat etc. are stored in_________

a) dev directory b) bin directory c) tmp directory d)unix directory e) None of these

ANS: b

119. ------------- controls the way in which the computer system functions and provides a means by which users can
interact with the computer.

a)The Platform b)The Operating System c)Application Software d)The Motherboard e)none

ANS: b

120. What is the full form of OSI?

a)Open System Interrelation b)Open Software Interconnection c)None of these

d)Open System Interconnection e)Open Software Interrelation

ANS: d

121. MS-DOS is based operating system.

a)Remote b)Command c)Programming d)None of these e)Web

ANS: b

122. . In a…………….topology, if there are n devices in network, each device has n-1 ports for cables.

a)Mesh b)Ring c)Star d)Bus e)None of these

ANS: a

123. A ______ is a large-and expensive computer capable of simultaneously processing data for hundreds or
thousands of users.

a) handheld computer b)mainframe computer c)personal computer d)tablet computer e)None

ANS: b

INTERNET:
1.Which of the following is the first graphical web browser?

a) MSN b) Mozilla c)Chrome d) Mosaic e) Internet explorer

ANS: d

2. Who among the following is the inventor of WWW?

copyright@studentfarmayishyoutube Page 33
STUDENT FARMAYISH
a)R. Nesscl b)Charles Babbage c)Ray Tomlinson d)Tim Berners Lee e) Other than the given options

ANS: d

3. What is the full form of WWW?


a) World Wide Web b) World With Web c) Work Wide Web d) World Wide Wet e)none of these
ANS: a
4.The process of keeping addresses in memory for further use is called?

a)routing b)resolving c)caching d)processing e)none of these

ANS: c

5. What is internet?

a) a single network b) a vast collection of different networks c) interconnection of local area networks
d) interconnection of wide area network e)none of these

ANS: b

6. ISP exchanges internet traffic between their networks by __________

a) internet exchange point b) subscriber end point c) isp end point d) internet end point e)none of
these

ANS: a

7. The size of an IP address in IPv6 is _________

a) 32 bits b) 64 bits c) 128 bits d) 265 bits e)none of these

ANS: c

8. Internet works on _______

a) packet switching b) circuit switching c) both packet switching and circuit switching
d) data switching e)none of these
ANS: a

9. Which one of the following is not an application layer protocol used in internet?

a) remote procedure call b) internet relay chat c) resource reservation protocol d) local procedure call
e)none of these

ANS: c

10. Which protocol assigns IP address to the client connected in the internet?

copyright@studentfarmayishyoutube Page 34
STUDENT FARMAYISH

a) DHCP b) IP c) RPC d) RSVP e)none of these

ANS: a

11. Free of cost repair of software bug available at Internet is called ….


a) Version b)Ad-on c)Tutorial dPatch e)none of these

ANS: d

12. HTML is used to create


a)machine language program b)high level program c)web page e)web server e)none of these

ANS: c
13. The process of transferring files from a computer on the Internet to your computer is called

a)Uploading b)Forwarding c)FTP d)Downloading e)none of these

ANS: d

14. Verification of a login name and password is known as:

a)configuration b)accessibility c)authentication d)logging in e)none of these

ANS: c

15. A Web site's front page /main page is called

a)Browser Page b)Search Page c)Home Page d)Bookmark e)none of these

ANS: c

16. In internet terminology IP means

a)Internet Provider b)Internet Protocol c)Internet Procedure d)Internet Processor


ANS: b

17. Full form of HTML is:

a)Hyper Text Markup Language b)Hyper Text Manipulation Language c)Hyper Text Managing Links
d)Hyper Text Manipulating Links e)none of these

ANS: a

18. A computer on internet are identified by :

copyright@studentfarmayishyoutube Page 35
STUDENT FARMAYISH

a)e-mail address b)street address c)IP address d)None of these e)all of these

ANS: c

19.An HTTP………used to send requests and retrieve their responses.

a)clint b)browser c)server d)agent e)none of these

ANS: a

20. If you are allowing a person on the network based on the credentials to maintain the security of your network,
then this act refers to the process of ______.

a) Authentication b) Automation c) Firewall d) Encryption e) Decryption

ANS: a

21. Which among the following is a recently debated principle that Internet service providers and governments
regulating the Internet should treat all data on the Internet the same, not discriminating or charging differentially
by user, content, website, platform, application, type of attached equipment, or mode of communication?

a) Comcast b) Net Neutrality c) Oblique-net d) Net Fraternity e) Fair Web

ANS: b

22. Who among the following sent the first electronic mail?

a) Ray Tomlinson b) Charles Babbage e) J.Presper Eckert d) John W Mauchly e) Ana Lovelace

ANS: a

23.What are programs such as Microsoft Edge that serve as navigable windows into the Web called as?

a) Hypertext b) Web browsers c) Internet d) Networks e) Windows Navigator

ANS: b

24. In Access a __________ is the collection of data items of all the fields pertaining to one entity.

a) field b) record c) form d) report e) None of these


ANS: b

25. ISDN stands for

a) Integral Service Dynamic Network b) International Subscriber Dialup Network c) International Service
Digital Network d) Integrated Service Digital Network e) None of these
ANS: d

26. What is ICMP (Internet Control Message Protocol)?


a) a protocol that manages memory b) a protocol used to monitor computers c) a protocol that handles
error and control messages d) both (a) and (b) e) None of these

copyright@studentfarmayishyoutube Page 36
STUDENT FARMAYISH
ANS: c

27. Generally, web address is located by

a) Hyperlink b) HTTP c) URL d) Locator e) Browser

ANS: c

28. A web address is a unique name at identifies a specific _______ on the internet.

a) URL b) HTML c) CSS d) Website e) None of these

ANS: d
29. What is e-commerce ?

a) Buying and selling international goods b) Buying and selling products and services over the Internet
c) Buying and selling products and services not found in stores d) Buying and selling products having to do with
computers e) Buying and selling of electronic goods

ANS : b

30. The process of transferring files from a computer on the Internet to your computer is called—

a) downloading b) uploading c) FTP d) JPEG d) downsizing

ANS : c

31. A(n)……is composed of several computers connected together to share resources and data.

a) Internet b) network c) backbone d) hyperlink e) protocol

ANS: b

32.The collection of links throughout the Internet creates an interconnected network called the—

a) WWW b) Web c) World Wide Web d) All of these e) Wide Area Web

ANS: d

33. Verification of a login name and password is known as:

a) configuration b) accessibility c) authentication d) logging in e) None of these


copyright@studentfarmayishyoutube Page 37
STUDENT FARMAYISH
ANS: c

34. A Proxy server is used for which of the following?

a) To provide security against unauthorized users b) To process client requests for web pages

c) To process client requests for databaseaccess d) To provide TCP/IP e) None of these

ANS: b

35. …………….are used to identify a user who returns to a Website.

a) Cookies b) Plug-ins c) Scripts d) ASPs e) None of these

ANS: a

37.Talnet is a ……….basted computer protocol?

a)sound b)text c)image d)animation e)digits

ANS: b

38. Voice mail—

a) is the exchange of text messages and computer files transmitted via a communications network such as a local
area network or the Internet b) permits users to converse in real time with each other via the computer while
connected to the Internet c) functions much like an answering machine, allowing callers to leave a voice
message for the called party d) involves using video and computer technology to conduct a meeting between
participants at geographically separate locations e) None of these

ANS: c

39. 15. A communication processor that connects dissimilar networks by providing the translation from one set of
protocol to another is—

a) Bridge b) Gateway c) Router d) Modem e) All of these

ANS: b

40. This.............tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.

a) Client b) Applications/Web server c) Enterprise server d) DBA e) None of these

ANS: a

41……………. Use the network protocol and the public telecommunication system to security share part of a
business information?

a)internet b)talnet c)extranet d)modem d)none of these

ANS: c

42.Protocol is a set of rules that consists of

a)TCD/IT b) TCP/IT c) TCP/IP d) TCT/IP e)none of these


copyright@studentfarmayishyoutube Page 38
STUDENT FARMAYISH
ANS: c

43. We can make use of the wild card entries such as ___ in Windows Explorer.

a) #,@ b) ^,* c)) ?,* d)) ?,# e)?,@

ANS: c

44. Cryptography is the study of information…….

a) Hiding b) Verification c) Both of Above d) None of These

ANS: c

45. ……………………. argues that “artificial intelligence is the next stage in evolution.”

a) Edward Fredkin b) George Dyson c) Nikeal Dyano d) None of these

ANS: a

46. Artificial Intelligence consists of:

a) Theoretical Side b) Experimental Side c) Both of above d) None of these

ANS: c

47. 32 Bit system was known as Internet protocol version…………. which is still in use today:

a) 4 b) 5 c) 3 d) None of these

ANS: a

48. Two versions of the internet protocol (IP) are in use such as IP version 4 and IP version 6 each version defines
as IP address…...

a) Same b) Unique c) Different d) None of these

ANS: c

49.Telnet helps in………..

a)remote login b)connecting to television c)transferring files across net d)all of these e)none of these

ANS: a

50. The size of an IP address in IPv6 is _________


a) 32 bits b) 64 bits c) 128 bits d) 265 bits e)259 bits

ANS: c

51.IP4 address is ….

a) 32 bits b) 64 bits c) 8 bits d) 16 bits e)24 bits

ANS: a

copyright@studentfarmayishyoutube Page 39
STUDENT FARMAYISH
52.With………..e-mails are accessible from anywhere in the world.

ANS: Webmail interface

Ms Windows:
1.Which of the following is not a version of the windows operating system software for the pc?

a)ME b)98 c)XP d)Linux e)95

ANS: d

2.Menus are part of the…………….

a)hardware b)user interface c)status bar d)monitor e)none of these

ANS: b

3.When you cut or copy information it gets palce in the……….

a)clipart b)clipboard c)motherboard d)both a and b e)none of these

ANS: b

4.A file is often referred to as a……………..

a)wizard b)document c)device d)folders e)none of these

ANS: b

5.Organise files by storing them in…………

a)archives b)lists c)indexes d)folder e)none of these

ANS: d

6.Which of the following contained at the end of the file name and help to determine the type of file?

a)file property b)file name c)file subname d)file extension e)file nomenclature

ANS: d

7.What is windows explorer?

a)personal computer b)network c)file manager d)drive e)web browser

ANS: c

8.What are .bas, .doc, .htm examples of in computing?

a)extensions b)protocols c)batabase d)domains e)none of these

ANS: a

9. Which domain name does belong to Military or Defence organisation?

copyright@studentfarmayishyoutube Page 40
STUDENT FARMAYISH
a).mili b).mil c).edu d).military e).biz

ANS: b

10.Which of the following key can be used as a shortcut to rename a floder in Microsoft Windows 8 and higher
versions?

a)F2 b)F4 c)F6 d)F9 e)F11

ANS: a

11.The process of replacing Windows 8 with Windows 8.1 is called ________.

a) Upgrading b) Updating c) Installing d) Downgrading e) Replacement

ANS: b

12. Which of the following is a recent version of operating systems?

a) Windows XP b) Windows 7 Basic c) Windows 8 d) Windows 10 e) Windows 2013

ANS: d

13. Which of the following groups contains all graphical file extensions?

a) JPG, GIF, BMP b) GIF, TCF, WMF c) TCP, JPG, BMP d) ADP, GIF, PPT e) JPG, CPX, GC

ANS: a

14. What does the XP stand for in Windows XP?

a) Exponential b) Experience c) Expertise d) Exchange e) None of these

ANS: b

15.Which of the following statements is true?

a) Microsoft Windows defines the operating environment standard for computers with Linux processors

b) Microsoft Windows defines the operating environment standard for computers with UNIX processors

c) Mac OS defines the operating environment standard for computers with Intel processors
d) Microsoft Windows defines the operating environment standard for computers with Intel processors

e) None of these

ANS: d

16.___________Command we can use to close the windows.

a) Alt+ F1 b) Alt+ S c) Alt+ End d) Alt+F4 e) None of these

ANS: d

17. The _____ key will launch the start buttons.

copyright@studentfarmayishyoutube Page 41
STUDENT FARMAYISH
a) Esc b) Shift c) Windows d) Shortcut e) None of these

ANS: c

18. If you change Windows 98 to Windows XP, you are actually performing ...........

a) Upstart b) upgrade c) update d) patch e) None of these

ANS: b

19. The free, open-source operating system that is becoming popular is:

a) Mac OS X b) Microsoft Windows XP c) UNIX d) Linux e) None of these

ANS: d

20. . Using Windows Explorer, a plus (+) sign in front of a folder indicates—

a)an open folder b)the folder contains subfolders c)a text file d)a graphics file e) none of these

ANS: b

21.If you are performing windows 98 operating system to windows XP you are performing a(n).........

a)push up b)China c)patch d)pull down e)update

ANS: e

22.A………………….is an icon on the desktop that provides a user with immediate access to a program or file.

a) kernel b)buffer c)shortcut d)spooler e)none of these

ANS: c

23. The unique signal, generated by a device that tells the operating system that it is in need of immediate
attention is called…………..

a)Stall b)Action c)Hibernate d)Interrupt e)Event

ANS: d

24. What is the meaning of 'Hibernate' in Windows XP/Windows 7?

a)Restart the computer in safe mode b)Restart the computer in hibernate mode c)Shutdown
the computer terminating all running applications d)Shut down the computer without saving new
files e)Shut down the computer without closing the running applications

ANS: e

25. .bas, .doc. and . htm are examples of

a)Extension b)None of these c)Domain d)Protocol e)Database

ANS: a

26. In windows, by default the files when deleted are sent to

copyright@studentfarmayishyoutube Page 42
STUDENT FARMAYISH
a)Waste Bin b)Recycle Waste Bin c)None of these d)Recycle Bin e)Dust Bin

ANS: d

27. Which system conversion involves running the old and new system?

a)Pilot conversion b)Parallel conversion c)Direct conversion d)Phased conversion e)Convergent conversion

ANS: b

28. Graphical pictures that represent an object like file, folder etc. are

a)Task bar b)None of these c)Desktop d)Windows e)Icons

ANS: e

29. Which of the following are properties of USB?

a)Platform dependent b)Software dependent c)Source dependent d)Platform independent

e)Software independent

ANS: d

30. Generally, you access the Recycle Bin through an icon located

a)On the desktop b) None of these c)In the properties dialog box d)On the shortcut menu e)On the hard drive

ANS: a

31. A menu contains a list of

a)data b)commands c)objects d)reports e)None of these

Ans: b

32. UNIX is a(n) ……………..operating system.

a)parallel user b)single user c)sequential user d)multi user e)outdated

ANS: d

33. The rectangular area of the screen that displays a program, data and /or information is a

a)title bar b)button c)dialog box d)window e)None of these

ANS: d

Computer Security:
1. 601 error code identifies a -

a)Motherboard problem b) Floppy drive problem c)ALU problem


d)Hard disc problem e) Other than the given options

ANS: b
copyright@studentfarmayishyoutube Page 43
STUDENT FARMAYISH
2. To correct an error in any programme ______ is used.

a) Computer b) debugger c) interpreter d)assembler e) Other than the given options

ANS: b

3. If you are allowing a person on the network based on the credentials to maintain the security of your network,
then this act refers to the process of ______.

a) Authentication b) Automation c) Firewall d) Encryption e) Decryption

ANS: a

4. Which among the following is not legitimate type of computer virus?

a) Boot Virus b) File infector Virus c) Resident Virus d) Hangout Virus (e) Macro Virus

ANS: d

5. Name the first widespread computer virus for MS- DOS?

a) Brain b) Handshake c) Code Red d) Melissa e) Sasser

ANS: a

6. A ________sometimes called a boot sector virus, executes when a computer boots up because it resides in the
boot sector of a floppy disk or the master boot record of a hard disk.

a)System virus b)Trojan horse virus c) File virus d) None of these e)both a and b

ANS: d

7. A result of a computer virus can NOT lead to ________ .

a)Disk Crash b)Mother Board Crash c) Corruption of program d) Deletion of files e)none of these

ANS: b

8. ………are often delivered to a PC through an e-mail attachment and are often designed to do harm.

a) Viruses b) Spam c) Portals d)email massage e) None of these

ANS: a

9.Viruses are called that because

a) They are viruses b) They can copy themselves and spread c) Both (a) and (b) d) None of these

ANS: b

10. Which of the can't spread virus

a) An e-mail with attachment b) A plain text mail c) Downloading files over the web d) None of these

ANS: b

copyright@studentfarmayishyoutube Page 44
STUDENT FARMAYISH

11. There is a new anti-virus software update available, when it is downloaded to your computer

a) Everyday b) Only in the night c) When you next switch on your computer d) All of these e)none of these

ANS: c

12.VIRUS stands for

a) Vital Information Recourse Under Siege b) Vital Information Reason Under Siege c) Vital Information
Recourse Under System d) Virus Information Recourse Under Siege e)none of these

ANS: a

13.Vendor-created program modifications are called—

a) patches b) antiviruses c) holes d) fixes e) overlaps

ANS: d

14. ……are attempts by individuals to obtain confidential information from you by falsifying their identity.

a) Phishing trips b) Computer viruses c) Spyware scams d) Viruses e) Phishing scams

ANS: e

15. A polymorphic virus……….

a) modifies its program code each time it attaches itself to another program or file b) is a malicious-logic
program that copies itself repeatedly in memory or on a disk drive until no memory or disk space remains

c) a malicious-logic program that hides within or looks like a legitimate program d) infects a program file, but still
reports the size and creation date of the original, uninfected program e) None of these

ANS: a

16. All of the following are examples of real security and privacy risks Except ………

a) hackers b) spam c) viruses d) identify theft e) None of these

ANS: b

17. ________ Viruses are often transmitted by a floppy disk left in the floppy drive

a) Trojan horse b) Boot sector c) Script d) Logic bomb e) None of these

ANS: b

18. What is the primary difference between a virus and a worm?

a) A worm has the ability to self- propagate from an infected user's computer to other computers b) A worm is
usually written by a cracker: Script bunnies do not have the skills to develop a worm program c) A virus is very
harmful to the computers it infects : a worm is not a serious a problem d) Anti-virus software is effective in
fighting viruses but not worms e) None of these

copyright@studentfarmayishyoutube Page 45
STUDENT FARMAYISH
ANS: a

19. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as

a) spyware b) adware c) spam d) malware e) None of these

ANS: d

20. ____________ are viruses that are triggered by the passage of time or on a certain date.

a) Boot-sector viruses b) Macro viruses c) Time bombs d) Worms e) None of these

ANS: c

21. Verification of a login name and password is known as

a) configuration b) accessibility c) authentication d) logging in e) None of these

ANS: c

22. A person who used his or her expertise to gain access to other people’s computers to get information illegally
or do damage is a—

a) spammer b) hacker c) instant messenger d) programmer e) analyst

ANS: b

23. A Proxy server is used for which of the following?

a) To provide security against unauthorized users b) To process client requests for web pages
c) To process client requests for database access d) To provide TCP/IP e) None of these

ANS: b

24. Which of the following is NOT a source of viruses?

a) Diskettes b) The Internet c) E-mail messages d) Computer networks e) None of these

ANS: c

25. NORTON‘ is a/an ____

a) Software b) Anti-Virus Program c) Network d) Program e) None of these

ANS: b

16. ___________are 'attempts by individuals to obtain confidential information from you by falsifying their
identity.

a) Phishing b) Computer viruses c) Spyware scams d) Viruses e) None of the above

ANS: a

17. Which of the following is NOT a purpose of antivirus programs?

copyright@studentfarmayishyoutube Page 46
STUDENT FARMAYISH
a) Remove any identified viruses b) Copy the name of the virus and send it to Microsoft for inspection
c) Notify a user if a virus is found d) Search for viruses e) None of these

ANS: b

18. ------------ Types of virus that stays permanently in the RAM memory .

a) Resident b) File infectors c) Boot virus d) Macro virus e) None of these

ANS: a

19. ---- Is the Virus that overwrites the files or a few parts being replaced?

a) Resident b) File infectors c) Boot virus d) Macro virus e) None of these

ANS: b

20. What term is used to describe software that monitors your online computer activities?

a) Snooper ware b) Spyware c) Tracker ware d) Travel ware e) None of these

ANS: b

21. Which of the following scrambles a message by applying a secret code?

a) Encryption b) Audits c) UPS d) Firewalls e) None of these

ANS: a

22. What is the purpose of a firewall on a computer?

a) To protect a computer from unauthorized access b) To protect a computer in case of fire

c) To protect a computer from spam d) All of these e) None of these

ANS: a

23. A computer checks the _____ of user names and passwords for a match before granting access.

a) Website b) Network c) Backup file d) Data base e) None of these

ANS: d

24. What is the term for unsolicited e-mail?

a) News group b) Use net c) Backbone d) Flaming e) Spam

ANS: e

25.Password is…………………….

a) Code by which a user gains access to a computer system b) Pass for viewing movie c) Entrance
without paying something d) All of the above e) None of these

ANS: a

copyright@studentfarmayishyoutube Page 47
STUDENT FARMAYISH
26.An error in computer program is called:

a) Hacking b) Virus c) Bug d) None of These e)all


ANS: c

27. ______was the first technique that posed a serious threat to virus scanners:
a) Vulnerability Code b) Polymorphic Code c) Antimorphic Code d) None of These
ANS: b
28. A/an ______ is a system susceptibility or flaw:

a) Error b) Vulnerability c) Virus d)hacking e) None of These

ANS: b

29. _______vulnerability is one for which at least one working attack exists:

a) Democratic b) Exploitable c) Dominative d) None of These e) Cracking

ANS: b

30._____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe
scan or test the vulnerability of a system, server or network or to breach security or authentication measures
without express authorization of the owner of the system, server or network:

a) Hacking b) Cracking c) Viruses d) Error e) None of These

ANS: a

31. ____is a computer program that is loaded into a computer without the owner's knowledge:

a) Hack Material b) Viruses c) cracking d) None of These e)all

ANS: b

32. A ______is a harmful computer program that has been hidden inside of something benign, such as an email
attachment or even an innocent looking program:

a) Trojan Horses b) Worms c) Macro Viruses d)malware e) None of These

ANS: a

33. Firewalls are to protect against

a) Virus Attacks b) Fire Attacks c) Data Driven Attacks d) Unauthorized Attacks e)none of these

ANS: d

34. The first computer virus is

a) The famous b) HARLIE c) PARAM d) none of these e) Creeper

ANS: e

copyright@studentfarmayishyoutube Page 48
STUDENT FARMAYISH
35. Which one of the following is a key function of firewall?

a) Copying b) Monitoring c) Deleting d) Moving e)none of these

ANS: b

36. Unauthorized copying of software to be used for personal gain of personal backups is called

a) Software piracy b) Program thievery c) Data snatching d) Program looting e)none of these

ANS: a

37. Like a virus , it is a self-replicating program it also propagates through computer network

a) Phishing scam b) Worm c) Spyware e) Cracker d)none of these

ANS: b

38. The terminal device often used in checking charge cards that offers both a limited keyboard input and visual
output is the

a) Audio response unit b) Video display terminal c) Pas terminal d) Intelligent terminal e) none of these

ANS: b

39. First boot sector virus is

a) Computed b) Mind c) Brain d) Elk cloner e)none of these

ANS: c

40.The ________ of a Threat measures its potential impact on a System


a) vulnerabilities b) degree of harm c)susceptibility e)None of these

ANS: b

41. The phrase ____ describe viruses, worms, Trojan horse attack applets and attack scripts.

a) Spam b) Malware c) Phishing d) Virus e)none of these

ANS: b

42. A person who uses his or her expertise to gain access to other people’s computers to get information illegally
or do damage is a

a) Analyst b) Spammer c) Programmer d) Hacker e)none of these

ANS: d

43.Which of the following inputs a computer’s memory, but unlike a virus, it does not replicate itself?
a) Logic bomb b) Trojan Horse c) Firewall d)malware e) None of these

ANS: a

44. A digital signature is _______


a) scanned signature b)encrypting information c) signature in binary form d) None of these

copyright@studentfarmayishyoutube Page 49
STUDENT FARMAYISH
ANS: b

45. If your computer rebooting itself then it is likely that _________


a) It has a virus b) It does not have enough memory c) There has been a power surge d) None of these

ANS: a

46. A hacker installs malicious code on a personal computer or server. This code then redirects clicks you make on
a Web site to another fraudulent Web site without your consent or knowledge. It is known as ______
a)Phishing b)Smishing c)Pharming d)rootkit e) None of the Above

ANS: c

47. The act of using the telephone in an attempt to scam the user into surrendering private information that will
be used for identity theft.
a) Pharming b)Smishing c)rootkit d) Vishing e) None of these

ANS: d

48. A malware program that can be used by a black hat cracker to remotely take control of a system for further
attacks like spam emails or Denial of Service attacks, without a user’s knowledge is called ________
a) Spoofing b) Vishing c)Zombie d) hacking e) None of these

ANS: c

49.The creation of Internet Protocol (IP) packets with a forged source IP address, with the purpose of concealing
the identity of the sender or impersonating another computing system is called _________

a) Pharming b)Spoofing c) Vishing d)Smishing e) None of these

ANS: b

50. An Internet service that translates domain names to the IP addresses is called ________
a)CMS b) ASP c) DNS d) None of these

ANS: c

51. The unauthorized activities of malicious software is called __________


a)Pharming b) Phishing c)Payload d)creeper e) None of these

ANS: c

52. Ethical hackers who use their skill to secure the integrity of computer systems of networks is called ________

a) Black Hat b) Red Hat c) Green Hat d)White Hat e)none of these

ANS: a

53.Verification of a login name and password is known as…..

a)configuration b)authentication c)logging in d)accessibility e)none of these

ANS: b

copyright@studentfarmayishyoutube Page 50
STUDENT FARMAYISH
54.If u are allowing a person on the network based on the credentials to maintain the security of your
network,then this act refers to the process of

a)encryption b)authentication c)logging in d)accessibility e)decryption

ANS: b

55. What is HTTP 404?

a)An error message indicating server not found b)An error message indicating moved permanently
c) An error message indicating forbidden d)An error message indicating server found e)none of these

ANS: a

56. Software such as viruses, worms and Trojan horses that has a malicious content is known as

a)Spyware b)adware c)Malicious Software (Malware) d)firewall e)scareware

ANS: c

57. In case of a virus getting into computer. Which of the following will help?

a)None of these b)NORTON c)Police complaint d)Encryption e)All of the above

ANS: b

58.What is a person called who uses a computer to cause harm to people or destroy critical systems ?

a)None of these b)Hacktivist c)Cyberterrorist d)Black-hat hacker e)Cyber Cracker

ANS: c

59.What is the most common way to get a virus in your computer's hard disk ?

a)By opening e-mails b)By installing games from their CDROMS c)By uploading pictures from mobile
phones to the computer d)By sending e-mails e)None of these

ANS: a

60. Back up of the data files will help to prevent

a)Virus infection b)Loss of confidentiality c)Loss of data d)Duplication of data e)None of these
ANS: c

61. What is the best way to protect a computer from viruses?

a)Install a firewall b)Never connect computer to internet c)Install up-to-date anti-virus software

d)Take the help of computer vendor e)Always operate the computer at room temperature

ANS: c

62………..monitors all the traffic that flows between the two networks but blocks certain traffic completely which
may be intruder.

a)Control Panel b)Hardware c)Anti-virus d)Firewall e)Software

copyright@studentfarmayishyoutube Page 51
STUDENT FARMAYISH
ANS: d

63. A bug means

a)Problems caused by insects getting inside the CPU b)A virus infection c)Problem in booting a
computer d)Mistake in a program or error in the working of a computer e)None of these

ANS: d

64.Antivirus software is an example of .

a)a security utility b)an operating system c)business software d)an office suite e)none of these

ANS: a

65. A computer virus normally attaches itself to another computer program known as a

a)Trojan horse b)host program c)Bluetooth d)target program

e)backdoor program BANK PO/MT CWE - MODEL SOLVED PAPER

ANS: b

66.Pop-ups are a form of ________on the World Wide Web?

a) Instant Messaging b) Search Engines c) Browsers d) Mark-up Languages e) Online Advertising

ANS: e

Computer Software:
1.The use of combination of 1’s and 0’s is feature of which of the following type of Computer Language?

a) High Level Language b) PASCAL c) Machine Language d) C e) COBOL

ANS: c

2. The world's first truly cross-platform programming language is called:

a) C++ b) Java c) Visual Basic.NET d) Smalltalk. e) None of these

ANS: b

3. A program that converts high level language to machine Language is _______

a) Linker b) Assembler c) Compiler d) All of these e) None of these

ANS: c

4. Which among the following is a Scientific Computer Language?

a) BASIC b) COBOL c) FORTRAN d) PASCAL e) None of these

ANS: c

5. COBOL stands for _______


copyright@studentfarmayishyoutube Page 52
STUDENT FARMAYISH
a) Common Business Oriented Language b) Computer Business Oriented Language c) Common
Business Operated Language d) Common Business Organized Language e) None of these

ANS: a

6. PL 1 (Programming Language One) Is __________.

a) High level programming language b) Low level programming language c) Machine language
d) Assembly language e) None of these

ANS: a

7. Which of the following is a disadvantage of machine language?

a) Machine Dependent b) Slower Execution c) Machine Independent


e) all of the above e) None of these

ANS: a

8. A _______ contains specific rules and words that express the logical steps of an algorithm?

a) syntax b) programming structure c) programming language d) logic chart e) None of these

ANS: c

9. A computer program that converts an entire program into machine language at one time is called a/ an ____

a) interpreter b) simulator c) compiler d) numbers e) None of these

ANS: c

10. Pascal is

a) A high-level programming language b) Named after Blaise Pascal c) Named after


mathematician that facilitates structured programming techniques d) All of these e) None of these

ANS: d

11. Computer programs are written in a high-level programming language; however, the human readable version
of a program is called—

a) cache b) instruction set c) source code d) word size e) None of these

ANS: c

12. What is the standard query language supported by most DBMSs?

a) Object-oriented language b) Report generator language c) Structured Query Language (SQL)


d) Query-by-example (QBE) e) None of these

ANS: c

13. In Assembly language....

copyright@studentfarmayishyoutube Page 53
STUDENT FARMAYISH
a) Mnemonics are used to code operations b) Alphanumeric symbols are used for addresses
c) Language lies between high-level language and machine language d) All of these e) None of these

ANS: d

14. ___ is the basic language of web page writing.

a) Generalized markup language b) Standard generalized markup language c) Nonstandard


generalized markup language d) Hypertext markup language e) None of these

ANS: d

15. Which of the following is the advantage of Assembly language over Machine language?

a) Easy to use b) Easy to understand c) Easy to modify d) All of these e) None of these

ANS: d

16. Which of the following Computer languages is used for Artificial Intelligence?

a) FORTRAN b) PROLOG c) C d) COBOL e) None of these

ANS: b

17. Compilers and interpreters are themselves-----

a) High-level language b) Codes c) Programs d) Mnemonics e) None of these

ANS: c

18. A set of rules for telling the computer what operations to perform is called a

a) procedural language b) structures c) natural language d) programming


language e) None of these

ANS: d

19. A(n) ____ language reflects the way people think mathematically.

a) cross-platform programming b) 3GL business programming c) event driven programming


d) functional e) None of these

ANS: d

20. A compiler translates a program written in a high-level language into

a) Machine language b) An algorithm c) A debugged program d) Java e) None of these

ANS: a

21. A(n) _____ program is one that is ready to run and does not need to be altered in any way.

a) Interpreter b) High level c) Compiler d) Executable e) None of these

ANS: d

copyright@studentfarmayishyoutube Page 54
STUDENT FARMAYISH
22.Full from of BIOS…..

a)Basic Input/Output system b)Basic Internal Output system c) Basic Inner/Output system

d) Basic Input/Output systemization e) Basic Input/Outer system

ANS: a

23.The main purpose of ………………is to resolve references among files?

a)text editor b)loader c)linker d)antivirus e)assembler

ANS: c

24.Which of the following system software resides in main memory always?

a)linker b)loader c)assembler d)compiler e)none of these

ANS: b

25……………………detects computer files whose contents are broken across several location on hard disk and moves
the fragments to one location to increase efficiency.

a)anti-virus b)disk cleaners c)disk fragmenter d)disk compression e)none of these

ANS: c

26………….is a windows utility program that locates and eliminates unnecessary fragments and rearranges files
and unused to disk space to optimize operations?

a)anti-virus b)disk cleaners c)restore d)disk compression e) disk fragmenter

ANS: e

27…………….manual tells you how to use a software program.

a)documentation b)programming c)user d)technical e) designer

ANS: a

28…………..is a kind of software,which is responsible for loading and relocating of the executable program in main
memoey?

a)loader b)linker c)translator d)compiler e)none of these

ANS: a

29………..is a windows utility works automatically and increase the amount of information.

a)anti-virus b)disk cleaners c)restore d)disk compression e) disk fragmenter

ANS: d

30. CAD……………

copyright@studentfarmayishyoutube Page 55
STUDENT FARMAYISH
a)computer aided design b) computer audio design c) computer add design
d) computer aided designer e)none of these

ANS: a

31. ____ software creates a mirror image of the entire hard disk, including the operating system, applications, files
and data.

a) Operating system b) Backup software c) Utility programs d) Driver imaging e) None of these

ANS: d

32. A(n) _______ is a program that makes the computer easier to use

a) utility b) application c) operating system d) network e) None of these

ANS: a

33. System software is the set of programs that enables your computer's hardware devices and ______ software
to work together.

a) management b) processing c) utility d) application e) None of these

ANS: d

34. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the
computer system.

a) command - based user interface b) GUI c) system utility d) API e) None of these

ANS: b

35. Microsoft Office is an example of a—

a) closed-source software b) open-source software c) horizontal-market software d) vertical-market


software e) compiler

ANS: a

36. _ _ _ _ _ _ _ _ _ translates and executes program at run time line by line

a) Compiler b) Interpreter c) Linker d) Loader e) None

ANS: b

37. A collection of program that controls how your computer system runs and processes information is called

a) Operating System b) Computer c) Office d) Compiler d) Interpreter

ANS: d

38. A compiler means

a) A person who compiles source programs b) Key punch c) A program which translates source program
into object program d)the same thing as a programmer e) None of these

copyright@studentfarmayishyoutube Page 56
STUDENT FARMAYISH
ANS: c

39…………..is a combination of software and hardware.

a)freeware b)firmware c)software d)program e)none

ANS: b

40………includes boot firmware and power management.

a)CD-ROM b)internal buses c)BIOS d)Clip set e)RAM

ANS: c

41.Computer software is…………..

a)used only for output b)a computer peripheral c)used for input d)a set of
instructions e)used only in operating systems

ANS: d

42.The primary purpose of software is to turn data into………

a)programs b)charts c)objects d)websites e)informations

ANS: e

43. Application software?

a) Is used to control the operating system b) Is designed to help programmers c) Performs specific
task for computer users d) Is used for making design only e) All of the above

ANS: c

44. The pictorial representation of a program or the algorithm is known as -

a)Coding b)Pseudo code c)Flowchart d)Structured query language e)Command language

ANS: c

45. In a computer file systems which among the following is top or first in hierarchy?

a) root directory b)parent directory c)home directory d)working directory e)none of these

ANS: a

46. The server on the internet is also known as ___________.

a) Repeater b) Host c) Gateway d) AND Gate e) None of these

ANS: b

47. Algorithm is used -------

a) To bring itself into desired state by its own action b) To perform logarithmic operations c)To describe
a set of procedure by given result is obtained d) As a high level language e) None of these

copyright@studentfarmayishyoutube Page 57
STUDENT FARMAYISH
ANS: c

48. _________ is the process of finding errors in software code.

a) Debugging b) Compiling c) Testing d) Running e) None pf these

ANS: a

49……………….is the process of locating and fixing or bypassing bugs in computer program code.

a) Debugging b) Compiling c) Testing d) Running e) None pf these

ANS: a

50. Java is referred to as……………

a)high level language b)low level language c)complex language d)hardware device driver e)none

ANS: a

51.C++ language developed by……………

a)Dennis Ritchie b)Charles Babbage c)Niklaus Wirth d)Bjarne Stroustroup e)John McCharthy

ANS: d

52.C,COBOL,BASIC and Java are examples of ………………language.

a)low level language b)high level language c)system programming d)computer e)none of these

ANS: b

53.In computer programming there is set of subroutine definitions,protocols and tools for building software and
applications.Which among the following is a term for sets of requirements that govern how one application can
talk to another?

a)UPS b)API c)CGI d)J2EE e)OLE

ANS: b

Database concept:
1.Which of the following is not a type of Microsoft access database object?

a) Table b) Worksheets c) Modules d) Macros e) None of these

ANS: b

2. In MS Access a __________ name must be unique within a database.

a) Field b) Record c) Table d) Character e) None of these

ANS: c

3. In Access a __________ is the collection of data items of all the fields pertaining to one entity.

copyright@studentfarmayishyoutube Page 58
STUDENT FARMAYISH
a) field b) record c) form d) report e) None of these

ANS: b

4. _____________ is created when two tables are joined on attributes that are neither primary keys nor foreign
keys.

a) Relation b) Cardinality c) Spurious tuple d) Candidate Key e) None of these

ANS: c

5. The most widely used type of database management system is………

a) Flat database b) Network database c)Relational database d)Hierarchical database e)None of these

ANS: c

6. What is the newest type of database, which is well suited for multimedia applications, called?

a) Object-oriented database b)Client/server database c)Data warehouse


d)Multimedia database e)None of these

ANS: a

7. Which of the following extends data across networks rather than store it in one central site?

a)PIM b)File manager c) Distributed database d) Data mining program e)None of these

ANS: c

8. A database management system (DBMS) is a__________.

a) Hardware system used to create, maintain and provide controlled access to a data- base b) hardware
system used to create, maintain, and provide uncontrolled access to a database. c) Software system used to
create, maintain, and provide uncontrolled access to a database. d) Software system used to create, maintain
and provide controlled access to a database. d) None of these

ANS: d

9. A………is a collection of data that is stored electronically as a series of records in a table.

a) spreadsheet b) presentation c) database d) web page e) None of these

ANS: c

10. The purpose of the primary key in a database is to :

a) unlock the database b)provide a map of the data c)uniquely identify a record
d)establish constraints on database operations e) None of these

ANS: c

11. The ascending order of a data hierarchy is-----------

copyright@studentfarmayishyoutube Page 59
STUDENT FARMAYISH
a) Bit-byte-record-field-file-database b)Byte-bit-field-record-file-database c) Bit-byte-field-
record-file-database d) Byte-bit-record-file-field-database e)None of these

ANS: c

12. A………is a collection of data that is stored electronically as a series of records in a table.

a) spreadsheet b)presentation c)database d)web page e)None of these

ANS: c

13. What term applies to a collection of related records in a database?

a) Field b) File c) Both (a) and (b) d) None

ANS: b

14. All the information collected during database development is stored in a—

a) repository b) data warehouse c) RAD d) CASE e) None of these

ANS: b

15. ______ describe what is database fields.

a) Structures b) Field markers c) Field definition d) Field names e) None of these

ANS: d

16.DBMS is comprised of tables that made up of rows called…………and columns called……………

a)fields,records b)records,fields c)address,records d)ranges,records e)sheet,fields

ANS: b

17.Items such as names and addresses are considered as…………..

a) output b)data c)input d)records e)information

ANS: b

18.Rows of a relation are called………….

a)tuples b)relation c)data structure d)entity e)none

ANS: a

19……………..will prevent the entry of duplicate rows.

a)primary key b)unique c)null d)foreign key e)none of these

ANS: a

20.ER-diagram,attributes are represented by………….

a)circule b)square c)recetangle d)triangle e)ellipse

copyright@studentfarmayishyoutube Page 60
STUDENT FARMAYISH
ANS: e

21.In ER-diagram,an entity set is represented by……………

a)circule b)square c)recetangle d)triangle e)ellipse

ANS: c

22. ER-diagram,relationship type are represented by………….

a)circule b)diamond c)recetangle d)triangle e)ellipse

ANS: b

23.In files,there is a key associated with each record which is used to differentiate among different records. For
every file,there is atlest one set of keys that is unique.Such a key is called…………

a)unique key b)primary key c)index key d)null key e)foreign key

ANS: b

24.Which type of database,organized the data in the form of tree with nodes?

a)Hierachical database b)Network database c)Relational database d)Multiple database e)none

ANS: a

25.A collection of interrelated records is called a…………

a)utility file b)database c)spreadsheet d)datasheet e)management information system

ANS: b

26.A collection of related files is called…………….

a)field b)file c)record d)database e)character

ANS: c

27.In which the database can be restored up to the last consistent state after the system failure?

a)recovery b)backup c)security d)redundancy e)none of these

ANS: a

28………….is a primary key of one file that also appears in another file.

a)physical key b)primary key c)foreign key d)logical key e)none

ANS: c

29………….is an invalid type of database key.

a)structured primary key b)atomic primary key c)primary key d)composite primary key e)none

ANS: a

copyright@studentfarmayishyoutube Page 61
STUDENT FARMAYISH
30.Which of the following contains information about a single “entity”in database like a person,place,event or
thing?

a)table b)form c)record d)query e)none

ANS: c

31.A program that generally has more user-friendly interface than a DBMS is called a……………

a)backend b)form c)front end d)repository e)none of these

ANS: b

32.In a relational database,a data structure that organizes the information about a single topic into rows and
columns is called……………

a)block b)record c)tuple d)table e)none of these

ANS: d

33.Data duplication wastes the space,but also promotes a more serious problem called………………

a)isolated called b)data inconsistency c)program dependency d)separated data e)none

ANS: b

34.In the relational modes,cardinality is termed as……..

a)number of tuples b)number of attributes c)number of tables d)number of constaints e)none

ANS: a

35………..contains data descriptions and defines the name,data tye and length of each field in the database.

a)data table b)data dictionary c)data field d)data table e)none of these

ANS: b

36.Oracle is a…………..

a)hardware b)high level language c)RDBMS d)operating system e)system software

ANS: c

37………….tags,placed on animal’s body can be used to record and track in a database all of the animal’s
movements.

a)POS b)RFID c)PPS d)GPS e)none of these

ANS: b

38.A set of possible data values is called…………….

a)attribute b)degree c)tuple d)domain e)none of these

ANS: d

copyright@studentfarmayishyoutube Page 62
STUDENT FARMAYISH
39.The code that relational database management systems use to perform thesir database task is referred to
as……

a)QBE b)SQL c)OLAP d)Sequal server e)None of these

ANS: b

40.The primary key must be………..

a)unique b)numeric c)multiple d)related e)object

ANS: a

41.Architecture of database can be viewed as………….

a)two levels b)four levels c)three levels d)one level e)none of these

ANS: c

42.Key to represent relationship between tables is called……..

a)primary key b)secondary key c)foreign key d)composite key e)none of these

ANS: c

43………….are distinct items that don’t have much meaning to you in a given context.

a)fields b)data c)queries d)properties e)none of these

ANS: a

44.To locate a data item for storage is…….

a)fetch b)field c)file d)feed e)database

ANS: a

45.A collection of conceptual tools for describing data,relationships,semantics and constrains is referred to as…..

a)ER model b)database c)data model d)DBMS e)none of these

ANS: c

46.In SQL,which of the following is a Data Manipulation Language (DML) command?

a)create b)alter c)merge d)drop e)none

ANS: c

47……..is a top-down approach in which one higher level entity can be divided into two lower level entities.

a)aggregation b)specialization c)generalization d)none of these

ANS: b

48………..is a bottom-up approach in which two lower level entities combine to form a higher level entity.

copyright@studentfarmayishyoutube Page 63
STUDENT FARMAYISH
a)aggregation b)specialization c)generalization d)none of these

ANS: c

49.In SQL,TCl stands for………….

a)Transmission control language b)Transmission central language c)Tranary control language

d)Transaction control language e)none of these

ANS: d

50.Which of the following is used with database?

a)ATM b)payment gateway c)Data mining d)none of these

ANS: c

51.The number of tuples in a relation is termed as……………..

a)cardinality b)entity c)column d)none

ANS: a

52.In ER-diagram,weak entity is represented by………….

a)rectangle b)square c)dimond d)double rectangle e)circle

ANS: d

53.An entity is related with itself is known as………….

a)binary relationship b)recursive relationship c)ternary relationship d)none

ANS: b

54.Which SQL command delete all the records and does not remove the structure?

a)drop b)insert c)truncate d)none of these

ANS: c

55.Which of the following is a data definition language (DDL) command?

a)delete b)insert c)view d)merge e)none

ANS: c

56.Which of the following refers to the ability of several servers to connect to a single database?

a)table b)object c)index d)cluster e)none of these

ANS: d

57……………is a set of memory structures that manage database files.

a)database instance b)data migration c)data abstraction d)data isolation e)database schema

copyright@studentfarmayishyoutube Page 64
STUDENT FARMAYISH
ANS: a

58………………..represents the logical view of the entire database.

a)data isolation b)data migration c)database abstraction d)database instance e)database schema

ANS: e

59……………..is the reduction of a particular body of data to a simplified representation of the whole.

a)data isolation b)data migration c)database abstraction d)database instance e)database schema

ANS: c

60…………………is the process of transferring data between data storage systems,data formats or computer
systems.

a)data cleaning b)data migration c)database abstraction d)database instance e)database schema

ANS: b

61.A………….backup is one where the database has been shut down.

a)consistent b)migration c)abstraction d)schema e)none of these

ANS: a

62.An entity set does not have sufficient attributes to form a primary key,is a…………..

a)primary entity set b)weak entity set c)strong entity set d)none of these

ANS: b

63………..means that the data contained in a database is accurate and reliable.

a)data redundancy b)data integrity c)data reliability d)data consistency e)none of these

ANS: b

64. When data changes in multiple lists and all lists are not updated, this causes?

a)data redundancy b)information overload c)duplicate data d)data inconsistency e)None of these

ANS: d

65…………..is a condition created within a database or data storagetechnology in which the same piece of data is
held in two separate places.

a)Data dumping b)Data normalization c)Data hiding d)Data redundancy e)none of these

ANS: d

66………….occur when the data file/database file contains redundant-unnecessarily duplicated-data.

a)Data dumping b)Data redundancy c)Data normalization d)Data hiding e)none of these

copyright@studentfarmayishyoutube Page 65
STUDENT FARMAYISH
ANS: b

67.Before use of DBMS information was stored using:

a) Cloud Storage b) Data System c) File Management System d) Cloud Computing e) None of these

ANS: c

68. Which one of the following is a set of one or more attributes taken collectively to uniquely identify a record?

a) Candidate key b) Sub key c) Super key d) Foreign key e) None of these

ANS: c

69. The feature in database language that allows us to access certain records in database is called __________.

a) Query b) Forms c) Reports d) Tables e) Node

ANS: a

70. In the ER diagram, what does an ellipse represent?

a) Entity sets b) Relation between the entity set c) Attributes d) Link between the attributes
and entity set e)None of these

ANS: c

Ms Office:
1.Which of the following companies developed MS Office-2000?

a)Novell b) Corel c) Lotus d) Microsoft e)None of these

ANS: d

2. Which input device cannot be used to work in MS Office?

a) Scanner b) Mouse c) Keyboard d) Joy stick e) Light pen

ANS: d

3. Which of the following is not valid version of MS Office?

a) Office XP b)Office Vista c)Office 2007 d)office 2016 e) None of these

ANS: b

4. What is MS Word?

a) A game b) An Operating System c)Word Processing Software

d) Typing tutor software e) None of these

ANS: c

5. What is the short cut key to open the Open dialog box in ms word?

copyright@studentfarmayishyoutube Page 66
STUDENT FARMAYISH
a) F12 b) Shift F12 c) Alt + F12 d) Ctrl + F12 e) None of these

ANS: d

6.Which file starts MS Word?

a) Winword.exe b) Word.exe c) Msword.exe d) Word2003.exe e) None of these

ANS: a

7.Where can you find the horizontal split bar on MS Word screen?

a) On the left of horizontal scroll bar b) On the right of horizontal scroll bar c) On the top of vertical scroll
bar d) On the bottom of vertical scroll bar e) None of these

ANS: c

8. What is the shortcut key to Indent the paragraph in ms word?

a) Ctrl + M b) Ctrl + P c) Shift + M d) Ctrl + I e) None of these

ANS: a

9. Thesaurus tool in MS Word is used for-

a) Spelling suggestions b) Grammar options c) Synonyms and Antonyms words


d) All of above e) None of the Above

ANS: c

10.What is the keyboard shortcut for creating a chart from the selected cells?

a) F3 b) F5 c) F7 d) F11 e) None of the above

ANS: d

11. In Excel, this is a prerecorded formula that provides a shortcut for complex calculations.........

a) Value b) Data Series c) Function d) Field e) None of these

ANS: c

12.Which of the following keyboard shortcuts is used to view the properties of a selected object?

a) Alt + Space b) Ctrl + Space c) Alt + Enter d) Ctrl + Enter e) None of these

ANS: c

13. What is the shortcut key to "Undo" the last action in a document?

a) Ctrl + X b) Ctrl + Y c) Ctrl + Z d) Ctrl + U d) None of these

ANS: c

14. Which is a feature included in Microsoft PowerPoint software that allows the user to see all the slides in a
presentation at one time?

copyright@studentfarmayishyoutube Page 67
STUDENT FARMAYISH
a) Slide Sorter b) Slide Master c) Handout Master d) Slide Header e) Reading View

ANS: a

15. Which of the following option may be used to change page-size and margins?

a) Page Layout b) View c) Home d) Data e) Review

ANS: a

16.What is the new default font used in MS Word document?

a) Times New Roman b) Arial c) Algerian d) Preeti e) Calibri

ANS: e

17. The valid format of MS Word is __________.

a) .jpeg b) .png c) .doc d) .exe e) None of these

ANS: c

18. Which of the following option may be used to change page-size and margins?

a) Page Layout b) View c) Tools d) Data e) None of these

ANS: a

19. In order to move from one worksheet to another in MS-Excel workbook. One should click ___________.

a) active cell b) scroll bar c) sheet tab d)tab button e) None of these

ANS: c

20. To justify the selected text, the shortcut key is __________.

a) Ctrl + 1 b) Ctrl + J c) Ctrl + U c) Ctrl + Alt + K e) None of these

ANS: b

21. Workbook is a collection of __________ in MS Excel?

a) page set-up b) buttons c) diagrams d) charts e) worksheets

ANS: e

22. What is the maximum number of lines you can set for a drop cap?

a) 3 b) 10 c) 15 d) 20 e) 50

ANS: b

23. In a spreadsheet, a __________ is a number you will use in a calculation.

a) label b) cell c) field d) value e) None of these

ANS: d

copyright@studentfarmayishyoutube Page 68
STUDENT FARMAYISH
24. What is the shortcut key you can press to create a copyright symbol?

a) Alt+Ctrl+C b) Alt + C c) Ctrl + C d) Ctrl + Shift + C e)None of these

ANS: a

25. Which PowerPoint view displays each slide of the presentation as a thumbnail and is useful for rearranging
slides?

a) Slide Sorter b) Slide Show c) Slide Master d) Notes Page e) Slide Desige

ANS: a

26. Select all the text in MS Word document by?

a) Ctrl + S b) Ctrl + 1 c) Shift + A d) Ctrl + A e) None of these

ANS: d

27. Which of the following is not a type of Microsoft access database object?

a) Table b) Modules c) Macros d)Worksheets e) None of these

ANS: d

28. In Power Point, which of the following will not advance the slides in a slide show view?

a) The Enter key b) The spacebar c) Esc key d) The mouse button e) None of these

ANS: c

29. The shortcut key for paste selected text/picture in MS Word is __________.

a) Ctrl + V) b)Ctrl + X c)) Ctrl + C d) Ctrl + Z e) None of these

ANS: a

30. In Excel, the contents of the active cell are displayed in the ________.

a) footer bar b) formula bar c)tool bar d) task bar e) menu bar

ANS: b

31.. If you want to insert a chart to your slide then go to __________.

a) Insert – Chart b) Home – Chart c) Format – Chart d) Table – Chart e) None of these

ANS: a

32. In Microsoft PowerPoint, two kinds of sound effects files that can be added to the presentation are

a) wav files and .gif files b) wav files and .jpg files c) jpg files and .gif files d) .wav files and .mid files
e) None of these

ANS: d

copyright@studentfarmayishyoutube Page 69
STUDENT FARMAYISH
33. Which of the following is not a type of Microsoft access database object?

a) Table b) Worksheets c) Modules d) Macros e) None of these

ANS: b

34. What happens if you press Ctrl + Shift + F8?

a) It activates extended selection b) It activates the rectangular selection c) It selects the


paragraph on which the insertion line is. d) Both a and c e) None of these

ANS: b

35. Row in an Access table is also known as __________.

a) field b) type c) data d) record e) None of these

ANS: d

36. Pressing F8 key for three times selects

a) A word b) A sentence c) A paragraph d)Entire document e) None of these

ANS: c

37. How can you disable extended selection mode?

a) Press F8 again to disable b) Press Del to disable c) Press Esc to disable

d) Press Enter to disable e) It cannot be disables

ANS: c

38. Queries in Access can be used as __________.

a) View, change and analyse data in different ways b) A source of records for forms and reports c) to
access internet d) Both a and b e) None of these

ANS: d

39.What does EXT indicator on status bar of MS Word indicate?

a) It indicates whether the external text is pasted on document or not b) It indicates whether extended add-

ons are installed on MS Word or not c) It indicates whether Extended Selection mode is turned on or off

d) Both a and b e) None of these

ANS: c

40. What is the default number of lines to drop for drop cap?

a) 3 b) 10 c) 15 d) 20 e)7

ANS: a

copyright@studentfarmayishyoutube Page 70
STUDENT FARMAYISH
41. __________ appear at the bottom of the Excel Window.

a) Work sheet tabs b) Name box c) Formula bar d) Title bar e) None of these

ANS: a

42. How many columns can you insert in a word document in maximum?

a) 35 b)63 c) 55 d) 65 e) 60

ANS: b

43. Select all the text in MS Word document by:

a) Ctrl + S b) Ctrl + 1 c) Shift + A d) Ctrl + A e) None of these

ANS: d

44. What is the smallest and largest font size available in Font Size tool on formatting toolbar?

a) 8 and 72 b) 8 and 64 c) 12 and 72 d) 10 and 40 e) None of these

ANS: a

45. To indent the first paragraph of your report, you should use this key.

a) Space bar b) Return key c) Tab key d) Shift key e) None of these

ANS: c

46. MS Word is __________ software.

a) System b) Application c) Programming d) Compiler e) None of these

ANS: b

47. Using Print Preview is useful. When you want to

a) colour the document b) save the document c) delete the document d) copy the document

e) view how the document will appear when printed

ANS: e

48. In MS excel ________ are numbered from 1 to onwards and __________ are numbered from A to onwards.

a) Columns, rows b) Rows, slides c) Slides, rows d) Rows, columns e) None of these

ANS:d

49. A word processor would most likely be used to do

a) Keep an account of money spent b) Do a computer search in media center c) Maintain an


inventory d) Type a biography e) Maintain records of database

ANS: d

copyright@studentfarmayishyoutube Page 71
STUDENT FARMAYISH
50. You cannot close MS Word application by

a) Choosing File menu then Exit submenu b) Press Alt+F4 c) Click X button on title bar
d) From File menu choose Close submenu e) None of these

ANS: d

51. To insert a new slide go to __________ tab, in the Slides group, click New Slide.

a) Home b) View c) Animations d) Slide show e) None of these

ANS: a

52. A bookmark is an item or location in document that you identify as a name for future reference. Which of the
following task is accomplished by using bookmarks?

a) To add anchors in web page b) To mark the ending of a paragraph of document c) To quickly
jump to specific location in document d) To add hyperlinks in webpage e) None of these

ANS: c

53.The key F12 in MS Word opens a

a) Save As dialog box b) Open dialog box c) Save dialog box d) Close dialog box e) Opens help menu

ANS: a

54. Times new Roman, Cambria, Arial are the example of __________.

a) Font b) Themes c) SmartArt d) Clipart e) None of these

ANS: a

55. In Access a __________ is the collection of data items of all the fields pertaining to one entity.

A) field b) record c) form d) report e) None of these

ANS: b

56. In MS Access a __________ name must be unique within a database.

a) Field b) Record c) Table d) Character e) None of these

ANS: c

57. What is the short cut key to open the Open dialog box?

a) F12 b) Shift F12 c) Alt + F1 d) Ctrl + F12 e) None of these

ANS: d

58. Suppose you wanted to create an AutoCorrect entry that would type the words ‘We regret to inform you that
your submission has been declined’ of the following choices, which would be the best name you could assign to
this entry?

a) Regret b) Subdual c) We regret to inform you that your submission has been declined

copyright@studentfarmayishyoutube Page 72
STUDENT FARMAYISH
d) 11 e) None of these

ANS: b

59. The minimum number of rows and columns in MS Word document is

a) 1 and 1 b) 2 and 1 c) 2 and 2 d) 3 and 3 e) None of these

ANS: a

60. Thesaurus tool in MS Word is used for

a) Spelling suggestions b) Grammar options c) All of the above d) Synonyms and Antonyms
words e) None of these

ANS: d

61. Why Drop Caps are used in document?

a) To drop all the capital letters b) To automatically begin each paragraph with capital letter c) To
begin a paragraph with a large dropped initial capital letter d)To drop the numbers e) None of
these

ANS: c

62. What is the default column width of MS Excel?

a) 5.5 b) 2.98 c) 8.43 d) 6.49 e) None of these

ANS: c

63. Which of the following is not valid version of MS Office?

a) Office XP b) Office Vista c) Office 2007 d) Office 2010 e) None of these

ANS: b

64. A table of how many columns can you insert in a word document in maximum.

a) 55 b) 42 c) 32 d) 63 e) none of these

ANS: d

65. Which control does access use to link data access page components to access data?

a) Microsoft Office Data Source Control b) Microsoft Dynamic Data Control c) Microsoft Data
Connection Control d) Microsoft Default Connection Control e) None of the above

ANS: a

66. Which of the following is the second step in creating a macro?

a) Start recording b) Using your mouse or keyboard, perform the task you want to automate c) Assign
a keyboard shortcut to the macro d) Give the macro a name e) None of these

ANS: c

copyright@studentfarmayishyoutube Page 73
STUDENT FARMAYISH
67. In Word, the mailing list is known as the ____________.

a) Data sheet b) Source c) Data source d) Sheet e) Hyperlink

ANS: c

68. In Microsoft Office Power-Point 2007, a _____ is a connection from one slide to another slide in the same
presentation or to a slide in another presentation, an e-mail address, a Web page, or a file.

a) Hyphenation b) Header c) Footer d) Hyperlink e) None of these

ANS: d

69. AutoCorrect was originally designed to replace _________ words as you type.

a) Short, repetitive b) Grammatically incorrect c) Misspelled words d) Incorrect Image e) None of these

ANS: c

70. In slide layout panel, how many layouts are available for next layout by default?

a) 4 b) 7 c) 12 d) 15 e) None of these

ANS: a

71. In Access, this operation copies a backup file from the storage medium back onto the computer

a) Restore b) Recreate c) Copy d) Structure e) None of these

ANS: a

72. If you will be displaying or printing your document on another computer, you’ll want to make sure and select
the _____________ option under the ‘Save’ tab.

a) Embed Fonts b) Embed True Type Fonts c) Save True Type Fonts d) Save Fonts e) Font Face

ANS: a

73. In the Form Wizard dialog box, the fields from the selected table are displayed in which list box?

a) All fields b) All Records c) Available Records d) Available Fields e) None of these

ANS: d

74. In PowerPoint, which of the following is the default page setup orientation for notes pages, outlines and
handouts?

a) Vertical b) Landscape c) Portrait d) All of these e) None of these

ANS: c

75. The software that is used to create text-based documents are referred to as ______ .

a) DBMS b) Suites c) Spreadsheets d) Word processors e) None of these

ANS: d

copyright@studentfarmayishyoutube Page 74
STUDENT FARMAYISH
76. What is the overall term for creating editing, formatting, storing, retrieving and printing a text document?

a) Word processing b) Spreadsheet design c) Web design d) Database management e) None of these

ANS: a

77.The PC productivity tool that manipulates data organized in rows and coloumn is called a

a) spreadhsheet b) word processing document c) presentation mechanism


d) database record manager e) None of these

ANS: a

78. When entering text within a document, the Enter key is normally pressed at the end of every

a) Line b) Sentence c) Paragraph d) Word e) None of these

ANS: c

79.The maximum zoom percentage in MS-powerpoint?

a)100% b)300% c)200% d)400% e)500%

ANS: d

80.What is default size of the data type in MS-access?

a)60 b)50 c)70 d)40 e)80

ANS: b

81. You can use.....to copy selected text; and .....to paste it in a document.

a) CTRL+C, CTRL+V b) CTRL+C, CTRL+P c) CTRL+S, CTRL+S d) SHIFT+C, ALT+P e) CTRL+D, CTRL+A

ANS: a

82.The letter and number the intersecting column and row is the-

a) Cell location b) Cell position c) Cell address d) Cell coordinates e) Cell continents

ANS: c

83. Each box in a spreadsheet is called is called a......

a) cell b) empty space c) record d) field e) None of these

ANS: a

84. The PC productivity tool that manipulates data organized in rows and columns is called a.....

a) Spreadsheet b) Word processing document c) Presentation mechanism d) Database


record manager e) EDI creator

ANS: a

copyright@studentfarmayishyoutube Page 75
STUDENT FARMAYISH
85. When a file is saved for the first time.........

a) a copy is automatically printed b) file name and folder name must be the same c) it does not need
a name d) it only need a name if it is not going to be printed e) It must be given a name to identify it.

ANS: e

86. Forms that are used to organize business data into rows and columns are called........

a) TrANSaction sheets b) Registers c) Business forms d) Sheep-spreads e) Spreadsheets

ANS: e

87. A............is a collection of information saved as unit.

a) folder b) File c) path d) file extension e) None of these

ANS: a

88. A file is often referred to as a (n)..........

a) Wizard b) Document c) Pane d) Device e) Documentation

ANS: b

89. If a previously saved file is edited

a) It cannot be saved again b) The changes will automatically be saved in the file c) The file will only
have to be saved again if it is more than one page in length d) Its name must be changed

e) The file must be saved again to store the changes

ANS: e

90. What is the overall term for creating, editing, formatting, storing retrieving and printing a text document ?

a) Word processing b) Spreadsheet design c) Web design d) Database management

e) Presentation generation

ANS: a

91. Microsoft office is an example of a...........

a) closed source software b) open source software c) horizontal market software


d) vertical market software e) compiler

ANS . a

92. In power point, the Header & Footer button can be found on the insert tab in what group?

a) Illustrations group b) Object group c) Text group d) Tables group e) None of these

ANS . e

93. In which group do we work at the time of text formatting in word ?

copyright@studentfarmayishyoutube Page 76
STUDENT FARMAYISH
a) Table, paragraph and Indexes b) Paragraph, Indexes and Sections c) Characters, sections and
paragraphs d) Indexes, characters and Tables c) None of these

ANS . a

94. To correct the spelling in Ms-Word we use......

a) Spellpro b) Spellcheck c) outlook Express d) All of These e) None of these

ANS . b

95. The background of any word document......

a) is always white b) is the colour you pre-set under the option menu c) is always the same for the
entire document d) Can have any colour you choose e) None of these

ANS . a

96. A collection of related files is called.........

a) Character b) Field c) Date base d) Record e) None of these

ANS . d

97. To save an existing file with new location we should........command.

a) save b) save and replace c) save as d) New file e) None of these

ANS . c

98. Numbers in table columns are usual....

a) right-aligned b) left-aligned c) justified d) cantered e) None of these

ANS . b

99. Text in a column is generally aligned.....

a) Justified b) Right c) Centre d) Left e) None of these

ANS : d

100. Which one of the following software applications would be the most appropriate for performing numerical
and statistical calculations?

a) Data base b) Document processor c) Graphics package d) Spreadsheet e) None of these

ANS . d

101. A directory within a directory is called.....

a) Mini directory b) Junior directory c) Part directory d) Sub directory e) None of these

ANS . d

102. In a spreadsheet program the.......contains related worksheets and document.


copyright@studentfarmayishyoutube Page 77
STUDENT FARMAYISH
a) Workbook b) Column c) Call d) Formula e) None of these

ANS . a

103. The word wrap feature -

a) Automatically moves the text to next line when necessary b) Appears at the bottom of the document

c) Allows you to type over text d) Is the short horizontal line indicating the end of the document

ANS . a

104. Which power point view displays each slide of the presentation as a thumbnail and is useful for rearranging
slides ?

a) Slide Sorter b) Slide show c) Slide master d) Notes Page e) Slide Design

ANS . a

105. To print a document.....

a) Select the Print command and then select ok b) Select the Ready Printer command and then select OK

c) type Print and then press Enter d) None of these

ANS . a

106.Excel workbook is a collection of........

a) Chart b) Word book c) Worksheet d) a and c e) None of these

ANS . c

107. Which of the following is not related to text formatting?

a) Line spacing b) Text spacing c) Margin change d) Searching e) None of these

ANS . d

108. What is a default file extension for all word documents?

a) TXT b) WRD c) FIL d) DOC e) None of these

ANS . d

109. What action is performed by pressing Ctrl + E in MS Word?


a) Exit Application b) Select All c) Clear All d) Align Center e) None of these

ANS: d

110.Setting fonts for the text in your document is an example of:

a) Formatting b) Formulas c) Tracking changes d) Tools e) None of the above

ANS: a

copyright@studentfarmayishyoutube Page 78
STUDENT FARMAYISH
111.Which feature helps to search the text through reference material such as dictionaries, encyclopedias and
translation services?
a) Translation b) Research c) Find d) Font e) Table

ANS: b

112. Which among the following is the shortcut key combination to copy formatting from text?
a) Alt + Shift + C b) Tab + Shift + C c) Ctrl + Shift + C d) F1 + Shift + C e) None of these

ANS: c

113. In Power Point, the Header & Footer button can be found on the Insert tab in what group?
a) Illustrations group b) Object group c) Text group d) Tables group e) None of these

ANS: c

114. Which of the following is a saving process?


a) To copy the document from memory to storage medium b) To bring change in present status of the
document c) To change the face or entire form d) To develop the document by recording the text with
the use of keyboard e) None of these

ANS: a

115. Which keystroke will take you at the beginning or the end of a long document?
a) Ctrl + PageUp and Ctrl + PageDown b) Shift + Home and Shift + End c) Ctrl + Home and Ctrl + End
d) The only way is by using the right scroll bar e) Alt+Home and Alt+End

ANS: c

116. Workbook is a collection of __________ in MS Excel?


a) page set-up b) buttons c) diagrams d) charts e) worksheets

ANS: e

117. Which PowerPoint view displays each slide of the presentation as a thumbnail and is useful for rearranging
slides?
a) Slide Sorter b) Slide Show c) Slide Master d) Notes Page e) Slide Design

ANS: a

118. If a word is typed that is not in MS Word’s dictionary, a wavy underline appears below the word. What is the
color of the underline that appears in this situation?
a) Blue b) Red c) Green d) Black e) Pink

ANS: b

119. In Excel, a typical worksheet has _____ number of columns.


a) 12,384 Columns b) 15,684 Columns c) 16,384 Columns d) 13,484 Columns e) None of these

ANS: c

120. Which of the following term describes explanatory text attached to a cell?
a) Context b) Callout c)Comment d) Dialog e)None of these

copyright@studentfarmayishyoutube Page 79
STUDENT FARMAYISH
ANS: c

121.Which of the following is the keyboard shortcut for creating a chart from the selected cells?
a) F3 b) F5 c) F7 d) F12 e) F11

ANS: e

122. Which of the following keyboard shortcut is used to edit existing Excel data?
a) F2 b)F3 c) F1 d) F4 e)F5

ANS: a

123. Which is used to delete the selected row or column?


a) Ctrl + – b) Ctrl + / c)Ctrl + * d) Ctrl + + e)Ctrl + %

ANS: a

124. Which of the following is used to create a formula to sum all of the above cells?
a) Ctrl + = b) Alt + * c)Ctrl + * d) Alt + = e)Alt + ~

ANS: d

125. To save an existing file with a new name or to a new location, the user should use command.

a)save b)copy c)save and replace d)new file e)save as

ANS: e

126. A _____ colour underlines indicate grammar errors in Microsoft Word document.

a) Red b) Green c) Blue d)Yellow e) Pink

ANS: b

127. Your position in the text is shown by a………….

a)Blinker b)Cursor c)Causer d)Pointer e) None of these

ANS: b

128. A word gets selected by clicking it to select a word in word

a)Once b)Twice c)Three times d)Four times e)None of these

ANS: a

129. The extension of Ms-excel worksheet is

a)XLS b) XLSX c)XL d)XLXS e)None of these

ANS: a

130. To specify margins in Word, the user has to select Page Setup option from the ……….menu.

a)Edit b)Table c)Autocorrect d)File e)Format

copyright@studentfarmayishyoutube Page 80
STUDENT FARMAYISH
ANS: d

131. What shows the contents of active cell.

a)Name box b)Row heading c)formula bar d) Task pan e)None of these

ANS: c

132. How can be done the page break in word?

a)Pressing the key FL before the cursor has put at the proper place: b)Pressing control + Enter, before the
cursor has put at the proper place: c)Using the insert/section break d) Changing the font size of
documents e)None of these

ANS: b

133. How to select one hyperlink after another during a slide presentation?

a) Ctrl+K b) Ctrl+D c) Ctrl+H d) Tab e)Ctrl+N

ANS: d

134. Which power point view works best for adding slide transition?

a)Slide show view b) Slide sorter view c)Slide view d)Notes view e)none of these

ANS: b

135. You can edit an embedded organization chart object by ?

a) Double clicking the organization chart object. b) Clicking edit object

c) Right clicking the chart object, then clicking edit MS-Organization Chart object. d) A and C both

ANS: d

136. Slide sorter can be accessed from which menu?

a) View b) Edit c) File d) Insert e)none

ANS: a

137. Which key do you press to check spelling?

a) F9 b) F7 c) F5 d) F3 e)F2

ANS: b

Miscellaneous
1.The address 198.10.10.0 belongs to________

a) Class A b) Class B c) Class C d) Class D e) None of these

ANS: c

copyright@studentfarmayishyoutube Page 81
STUDENT FARMAYISH
2.Which of the following technique is used to send more than one calls over a single line?

a) Digital transmission b) Infrared transmission c) Digitizing d) Multiplexing e) None of these

ANS: d

3.Word is a word processor developed by Microsoft. In MS Word spelling check is a feature available in which tab?

a) Page Layout b) Home c) Insert d) Review e) References

ANS: d

4.The blank white area near the edges of every page in a word document is known as a ________.

a) cut mark b) margins c) new area d) gutter e) indent

ANS: b

5.In which group can you find or replace text and select text or objects in a document?

a) Proofing b) Paragraph c) Editing d) Font e) None of these

ANS: c

6.Walkie-talkie is an example of which of the following?

a) simplex communication b) half-duplex communication c) full-duplex communication

d) semi-duplex communication e) None of these

ANS: b

7.What happens when you boot up a PC?

a) Portions of the operating system are copied from disk into memory b) Portions of the operating system are
copied from memory onto disk c) Portions of the Operating system are complied d) Portions of
the operating system are emulated e) The PC gets switched off

ANS: a

8.The ______________ folder retains copies of messages that you have started but are not yet ready to send.

a) Drafts b) Outbox c) Address Book d) Sent Items e) Inbox

ANS: a

9.Linux is an OS based on_____

a) DBMS b) UNIX c) Network node d) J2EEE e) Python

ANS: b

10.To protect your system from computer hackers you must turn on a(n) _______.
a) USP b) VLC c) Another system d) Script e) Firewall

copyright@studentfarmayishyoutube Page 82
STUDENT FARMAYISH
ANS: e
11.Which of the following groups contains graphical file extensions?
a) JPG, GIF, BMP b) GIF, TCF, WMF c) TCP, JPG, BMP d) ADP, GIF, PPT e) JPG, CPX, GCM

ANS: a

12.Which of the following number systems is considered as a base-10 number system?


a) Decimal number system b) Binary number system c) Octal number system
d) Hexadecimal number system e) None of these

ANS: a

13.Which of the following does not exist in taskbar?


a) Quick Launch b) Start Menu c) My Documents d) Address bar e) None of these

ANS: b

14.Which of the following is a process of translates the IP addresses of computers in a local network to a single IP
address?
a) Gateway b) NAT c) Packet filtering d) Spooling e) Translator

ANS: b

15.In which of the topology all the nodes are attached in a circular wiring arrangement?
a) Star topology b) Bus topology c) Network topology d) Ring topology e) Mesh topology

ANS: b
16.Which IEEE standard used to define the specification for a wireless LAN?
a) IEEE 802.5 b) IEEE 802.3 c) IEEE 802.11 d) IEEE 802.4 e) IEEE 802.6

ANS: c

17.A _________ typically connects personal computers within a very limited geographical area, usually within a
single building.
a) LAN b) FAN c) TAN d) WAN e) VPN

ANS: a

18. Which of the following menu types is also called a drop-down menu?
a) fly-list b) cascading c) pop-down d) pull-down e) go-up

ANS: d

19.What is the term used for measurement of how fast data moves from one place to another?
a) data per unit b) bits per second c) bits per hour d) ratio per bit e) None of the above

ANS: b

20.Which type of system has its own programming and does not receive input?

a)Embedded computer b)Supercomputer c)Microcomputer d)Both (b) and (c) e)None of these

ANS: a

copyright@studentfarmayishyoutube Page 83
STUDENT FARMAYISH
21.Which of the following is/are file extension(s) in DOS?

a) EXE b) BATCH c) COM d) All of these e) None of these

ANS: d

22. Multi-user systems provide cost savings for small businesses as they use a single processing unit to link several
______.

a) Personal computers b) Workstations c) Dumb terminals d) Mainframe e) Laptop

ANS: c

23.Which among the following options is the application that combines text, sound, graphics, motion video, and/
or animation?

a) Multimedia b) Minimedias c) Video scopes d) Motionware e) Macromedia

ANS: a

24. Which among the following is the reboot where the power to the system is physically turned off and back on
again, causing an initial boot of the machine?

a) Toggle b) Cold booting c) Warm booting d) Logging off e) None of these

ANS: b

25.Which among the following carries signals that control the actions of the computer?

a) Control Bus b) Data Bus c) Memory Unit d) NIC e) Address Bus

ANS: a

26.Which among the following is an important circuitry in a computer system that does the arithmetic and logical
processing?

a) Memory b) ALU c) Flag Register d) CU e) Calculator

ANS: b

27.The two ways to arrange multiple windows on the desktop are:

a) cascade and tile b) drag and drop c) point and click d) minimize and maximize e) copy and paste

ANS: a

28.To delete the selected item permanently, press __________.

a) Alt + Delete b) Shift + D c) Shift + Delete d) Alt + D e) None of these

ANS: c

29.Which of the following is a requisite to ‘boot’, the system?

a) Complier b) Mouse c) Operating system d) Assembler e) MS Office

copyright@studentfarmayishyoutube Page 84
STUDENT FARMAYISH
ANS: c

30. The process of checking all the peripheral units by the OS during the time of booting is known as_____

a) BIOS b) POST c) BUS d) Chkdsk e) None of these

ANS: b

31.A handheld device that allows you to control your computer without typing instructions from a keyboard is
known as_______.

a) Tablet b) PDA c) Mouse d) Mike e) None of these

ANS: c

32. Which of the following file system used by the operating system to identify the physical locations of a file on
the hard drive?

a)RTOS b)GIF c)FAT d)FTP e)SMTP

ANS: c

33. What is SMPS?

a) Settled Mode Power Supply b) Switch Mode Power Supply c) Switch Mode Packet Switch

d) Supply Mode Packet Switch e) Settled Mode Packet Switch

ANS: b

34. When a computer is turned on, which of the following is run by BIOS in order to check whether all the
hardware components are working properly?

a) Booting b) Warm Booting c) Cold Booting d) Power on Self-Test e) Register

ANS: d
35. Which of the following hardware or software designed to guard against unauthorized access to a computer
network?

a) Hacker-proof program. b) Firewall. c) Hacker-resistant server. d) Encryption safe wall.

e) None of these

ANS: b

36. Which among the following is the first general-purpose electronic computer?

a) EDVAC b) ADVAC c) ENIAC d) IBM-PC e) UNIVAC

ANS: c

37. A device that not only provides surge protection but also furnishes the computer with battery backup power
during a power outage is ______

a) Battery strip b) UPS c) Surge strip d) USB e) Memory

copyright@studentfarmayishyoutube Page 85
STUDENT FARMAYISH
ANS: b

38. What is a bootstrap?

a) A memory device b) A device to support the computer c) An error correction technique

d) A small initialization program to start up a computer e) None of the above

ANS: d

39. Which part of the CPU coordinates all the activities of a computer system?

a) Motherboard b) Coordination board c) Control unit d) Arithmetic and logic unit e) None of these

ANS: c

40. The process of checking all the peripheral units by the OS during the time of booting is known as_____

a) BIOS b) POST c) BUS d) Chkdsk e) None of these

ANS: b

41.A handheld device that allows you to control your computer without typing instructions from a keyboard is
known as_______.

a) Tablet b) PDA c) Mouse d) Mike e) None of these

ANS: c

42. Which of the following file system used by the operating system to identify the physical locations of a file on
the hard drive?

a)RTOS b)GIF c)FAT d)FTP e)SMTP

ANS: c

43. An online discussion group that allows direct “live” communication is known as……

a)web crawler b)chat group c) regional service provider d)hyperlink e)e-mail

ANS: b

44. If a computer provides database services to other, then it will be known as ?

a)Web server b)Application server c)Database server d)FTP server

ANS: c

45. Which of the following hardware or software designed to guard against unauthorized access to a computer
network?

a) Hacker-proof program. b) Firewall. c) Hacker-resistant server. d) Encryption safe wall. e) None

ANS: b

copyright@studentfarmayishyoutube Page 86
STUDENT FARMAYISH
46. A device that not only provides surge protection but also furnishes the computer with battery backup power
during a power outage is ______

a) Battery strip b) UPS c) Surge strip d) USB e) Memory

ANS: b

47. What is an Operating system?

a) It is an interface between User and the Computer b) It manages all resources c) It does all process
management tasks d) All of the above e) None of these

ANS: d

48. Which process check to ensure the components of the computer are operating and connected properly?

a) Booting b) Processing c) Saving d) Editing e) None of these

ANS: a

49.The ability of an operating system to run more than one application at a time is called _________.

a) Multi-tasking b) Object-oriented programming c) Multi-user computing

d) Real-Time e) None of the above

ANS: a

50. Which of the following is used to switch between open programs?

a) Alt+tab b) Ctrl+tab c) Shift+tab d) Ctrl+Alt e) Alt+Shift

ANS: a

51.To move to the beginning of a line of text, press the __________ key.

a) a b) pageup c) enter d) home e) None of these

ANS: d

52.Which among the following is a language used in a computer that is very similar to, the language of humans
and is easy to understand?

a) Source Code b) Machine Language c) High Level Language d) Object Code e) Assembly language

ANS: c

53.The first electronic digital computer contained _________?

a) Electronic valves b) Neural Networks c) Fuzzy Logic d) Semiconductor memory e) None of these

ANS: a

54.What is the sequence of events that occurs in the computer when it is interpreting and executing an instruction
known as?

copyright@studentfarmayishyoutube Page 87
STUDENT FARMAYISH
a) Execution cycle b) Instruction cycle c) Working cycle d) Machine cycle e) None of these

ANS: b

55._____ is a Windows utility program that located and eliminates unnecessary fragments and rearranges filed
and unused to disk space to optimise operations.

a) Backup b) Disk cleanup c) Disk defragmenter d) Restore e) Disk restorer

ANS: c

56. Which command is used to set a name to a disk in DOS?

a) VOLUME b) VOL c) LABEL d) DISKLABEL e) None of these

ANS: c

57.A __________ is an electronic device that process data, converting it into information.

a) processor b) computer c) case d) stylus e) None of these

ANS: b

58.__________ computers represent data as variable points along a continuous spectrum of values.

a) Analog b) Digital c) Precise d) Mainframe e) None of these

ANS: a

59.Which of the following is used by the tablet PC to write on the screen.

a) finger b) mouse c) digitalizer d) stylus pen e) None of these

ANS: d

60.A word in a web page that, when clicked, opens another document.

a) anchor b) URL c) hyperlink d) reference e) None of these

ANS: c
61. A network’s __________ is the central structure that connects other portions of the network.

a) trunk b) backbone c) protocol d) server e) None of these

ANS: b

62.You can organize your bookmarks using __________.

a) structures b) containers c) folders d) menus e) Chart

ANS: c

63.Which key will launch the Start button.

a) esc b) shift c) Windows d) Shortcut e) None of these

copyright@studentfarmayishyoutube Page 88
STUDENT FARMAYISH
ANS: c

64.Computers use the __________ number system to store data and perform calculations.

a) decimal b) hexadecimal c) binary d) octal e) None of these

ANS: c

65.Floppy drives, hard drives and tape drives all use a __________ to read data.

a) laser b) sensor c) magnet d) pen e) None of these

ANS: c

66.The number of pixels displayed on a screen is known as the screen ………… .

a) resolution b) colour depth c) refresh rate d) viewing size e) None of these

ANS: a

67.Word is a word processor developed by Microsoft. In MS Word spelling check is a feature available in which
tab?

a) Page Layout b) Home c) Insert d) Review e) References

ANS: d

68.The blank white area near the edges of every page in a word document is known as a ________.

a) cut mark b) margin c) new area d) gutter e) indent

ANS: b

69.Which of the following software posts unwanted advertisements on client’s computer?

a) Virus b) Malware c) Worm d) Adware e) Logic bombs

ANS: d

70.In which group can you find or replace text and select text or objects in a document?

a) Proofing b) Paragraph c) Editing d) Font e) None of these

ANS: c

71. Servers are computers that provide resources to other computers connected to a ____.

a)Network b)Mainframe c)Supercomputer d)Client e)Port

ANS: a

72. What is EDI?

a)Electronic distant interface b)Electronic development interface c)Electronic data interface


d)Electronic data interchange e)None of these

copyright@studentfarmayishyoutube Page 89
STUDENT FARMAYISH
ANS: d

73. In MS-Excel, all formula starts with the sign of______.

a) # b)@ c) = d)+ e)None of these

ANS: c

74. By which port the printer attached?

a) serial port b) parallel port c)SCSI d)Interface port e)None of these

ANS: b

75. A character is represented in EBCDIC by___________.

a)one bit b)four bits c)eight bits d)sixteen bits e)None of the above

ANS: c

76. Firewalls are generally used to protect against___.

a)fire Attacks b)data Driven Attacks c) virus Attacks d)unauthorized access e) None of these
ANS: d

77. Which key is used in combination with another key to perform a specific task?

a) Function b)Control c)Arrow d)Space Bar e)None of these

ANS: b

78. A website's main page is called it's _______.

a) home page b)browser page c)search page d)index page e)none of these

ANS a

79. The network in which every node is connected to two other nodes is called _____.

a)Bus Network Topology b)Star Network Topology c)Ring Network Topology dAll of the above

ANS: c

80. Underlined text, such as text and folder names is referred to as a __.

a) Hyperlink b)Menu c)Source drive d)Resource locator e)None of these

ANS: a

81. The smallest unit in a digital system is _____.

a) byte b)kilobyte c)word d)character e)bit

ANS: e

82. Which bar is usually located below the Title Bar that provides categorized options?

copyright@studentfarmayishyoutube Page 90
STUDENT FARMAYISH
a)Menu Bar b) Status Bar c)Toolbar d)Scroll Bat e)None of the above

ANS: a

83. Portrait and Landscape are

a) Page Orientation b)Paper Size c)Page Layout d)Both C and D e)All of the above

ANS: a

84. __________refers to the unauthorized copying and distribution of software.

a) Hacking b) Software Piracy c) Software literacy d)Cracking e)Copyright

ANS: b

85. This type of software works with end-users, application software, and Computer Hardware to handle the
majority of technical details:

a)Communications software b)Application software c)Utility software d)System software e)None of these

ANS: d

86. Which of the following keys is used to delete characters to the left of the cursor?

a)Alt + Delete b)Shift c)Esc D d)Delete e)Backspace

ANS: e

87. A web site is a collection of_______.

a) graphics b)programs c)algorithms d)web pages e)charts

ANS: d

88. When a computer is switched on, the booting process performs

a)Integrity Test b)Power-On Self-Test c)Correct Functioning Test d)Reliability Test e)Shut-down

ANS: b

89. The term ‘user interface’ refers to ______.

a)what the user sees on the screen and how they can interact with it b)how the operating system
responds to user commands c)the means by which the user interacts with the peripheral devices on the
computer d)the monitor that is available for the computer e)None of the above

ANS: a

90. The keyword shortcut to launch task manager___.

a)Alt+ F4 b)Ctrl+ F4 c)Ctrl+ Alt+ Del d)Alt+ Del e)None of these

ANS: c

91. Which protocol provides e-mail facility among different hosts?

copyright@studentfarmayishyoutube Page 91
STUDENT FARMAYISH
a)FTP b)SMTP c)TELNET d)SNMP e)None of these

ANS: b

92. LAN stands for

a) Local Area Nodes b)Large Area Network c)Large Area Nodes d)Local Area Network

ANS: d

93. Macros stored In the global macro sheet can be used

a)In the current document only b)in any document c)can be used only with other macros of the
global macro sheet d)None of the above e)All of the above

ANS: b

94. The topology with highest reliability is_______.

a) Bus topology b) Star topology c) Ring topology d) Mesh topology e)None of these

ANS: d

95. Which of the following is NOT a type of broadband internet connection?

a)Cable b)DSL c)Dial-up d)Satellite e)None of these

ANS: c

96. A computer on a network that access resources provided by another computer called _____.

a)A Server b)A computer c) A Brewers d)A Beta test and Beker call e)None of these

ANS: a

97. What is the full form of HTTP?

a) Hyper Text Transfer Protocol b)Hyper Text Transition Protocol c)Hyper Text Transfer Program
d) Hyper Text Transition Program e)Hyper Text Trivial Protocol

ANS: a

98. Why are headers and footers used in document?

a)To enhance the overall appearance of the document b)To mark the starting and ending of a page

c)To make large document more readable d) To allow page headers and footers to appear on document when
it is printed e)None of these

ANS: d

99. Which is the following shortcut key is used to checking spelling?

a) F1 b)F2 c)F7 d)F9 e)None of these

ANS: c

copyright@studentfarmayishyoutube Page 92
STUDENT FARMAYISH
100. Which part of the system software always resides in main memory?

a)Text editor b)asembler c)Linker d)Loader e)None of these

ANS: d

101. Which of the following is not a web browser?

a) MOSAIC b)Chrome c)Facebook d) Netscape navigator e)None of these

ANS: c

102. ________ is when the computer is turned on and the operating system is loading.

a) Booting b)Spoofing c)Formatting d)Initiating e)Loading

ANS: a

103. A (n)__________ allows sharing of a broadband Internet connection.

a)hub b)adapter c)router d)switch e)plug

ANS: c

104. Why are headers and footers used in document?

a) To enhance the overall appearance of the document b)To mark the starting and ending of a page
c)To make large document more readable d)To allow page headers and footers to appear on document
when it is printed e)None of these

ANS: d

105. SMPS stands for________.

a) Switched Mode Power Supply b)Start Mode Power Supply c)Store Mode Power Supply

d)Single Mode Power Supply e)None of these

ANS: a

106. Electronic funds transfer is the exchange of money______.

a) From one place to another b) From one account to another c) From one bank to another

d)All of above e) None of these

ANS: b

107. Programs designed specifically to address special purpose applications are called _______.

a) operating system b) system software c) application software d) management information


systems e) None of these

ANS: c

108. What is the most common tool used to restrict access to a computer system?

copyright@studentfarmayishyoutube Page 93
STUDENT FARMAYISH
a)User logins b)Passwords c)Computer keys d)Access-control software e)None of these
ANS: b

109. Pressing CTRL + 9 in Excel _____.

a) Prints 9 b) Prints c)Prints 9 followed by spaces d)Inserts 9 cells at the


current location e) Hides the current row

ANS: e

110. Which type of memory gets lost when you switch off?

a)ROM b)RAM c)Cache d)Dynamic e)Static

ANS: b

111. What is an email attachment?

a)A receipt sent by the recipient b)A separate document from another program sent along with an e-mail
message c)A malicious parasite that feeds off of your message and destroys the contents d)A list of CC
: or BCC : recipients e)None of these

ANS: b

112. In Windows ME. What does ME stand for?

a)Millennium edition b)Micro-Expert c)Macro-Expert d)Multi-Expert e)My-Expert

ANS: a

113. The process of a computer receiving information from a server on the Internet is known as _____.

a)Acquisition b)Pulling c)Transferring d)Pushing e)Downloading

ANS: e

114. The web uses the ________ to request and serve web pages and programs.

a) Hyper Text Marketing Language b)Hyper Text Markup Language c)Hotmail Text Markup Language
d)Home Text Markup Language

ANS: b

115. _______is the science that attempts to produce machines that display the same type of intelligence that
humans do.

a) Nanoscience b)Nanotechnology c)Simulation d)Artificial intelligence (AI) e)None of these

ANS: d

116. Which one is not an input device?

a) Keyboard b)Mouse c)Speaker d)Scanner e)None of these

ANS: c

copyright@studentfarmayishyoutube Page 94
STUDENT FARMAYISH
117. The process of transferring files from a computer on the internet to your computer is called _______.

a) Downloading b)uploading c)FTP d)JPEG e)Downsizing

ANS: a

118. Which of the following is a function key of the computer?

a) Control b)Edit c)Shift d)F11 e)Tab

ANS: d

119. Large transaction processing systems in automated organisations use _____.

a)Online Processing b)Batch Processing c)Once-a-day Processing d)End-of-day Processing

e) Once-a-week Processing

ANS: b

120. Word processing, spreadsheet and photo- editing and examples of _____.

a)A. application software b)system software c)operating system software d) platform software
e)None of these

ANS: a

121. A number system with a base of two is referred as ______.

a) Unary number system b)Binary number system c)Octal number system d)All of the above
e) None of these

ANS: b

122. A _________ is pre-designed document that already has coordinating fonts, a layout, and a background.

a) guide b)model c)ruler d)template e) design-plate

ANS: d

123. Which of the following is equal to 1,048,576 byte (approx one million byte)?

a)Byte b)Gigabyte c)Memory d)Megabyte e)Kilobyte

ANS: d

124. Micro instruction are kept in _____.

a)Main memory b)Control store c)Cache d)Either A or B e)None of these

ANS: b

125. A Web site containing stories and articles relating to current events, life, money, sports and the weather is
considered a(n) _______ Web site.

a) Business/marketing b)Portal c)Informational d)News e)Retailing

copyright@studentfarmayishyoutube Page 95
STUDENT FARMAYISH
ANS: c

126. Which is the following shortcut key is used to checking spelling?

a)F1 b)F2 c)F7 d)F9 e)None of these

ANS: c

127. When sending an e-mail, the _____line describes the contents of the message.

a)Subject b)To c)Contents d)CC e)None of these

ANS: a

128. Which of the following is an operating system?

a) Compiler b)Plotter c)Mac d)Both (1) and (2) e)All of the above

ANS: c

129. The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the
___command.

a) Replace b)Find c)Lookup d)Search e)None of these

ANS: b

130. A _________ is a design tool that graphically shows the logic in a solution algorithm.

a)A. Flowchart b)Hierarchy chart c)Structure chart d)ontext diagram e)None of these

ANS: a

131. Which of the following peripheral devices displays information to a user?

a) Monitor b)Keyboard c)Secondary storage devices d)Secondary storage media e)None of these
ANS: a

132. In Excel, the contents of the active cell are displayed in the _______.

a) footer bar b)tool bar c)task bar d)menu bar e)formula bar

ANS: e

133. File extension is used ____.

a) for naming the file. b)to ascertain that file name is not lost c) to identify file d)to identify
file type e) to make items complex

ANS: d

134. E-mail addresses separate the user name from the ISP using the __ symbol.

a)& b)@ c)% d)* e)None of these

ANS: b

copyright@studentfarmayishyoutube Page 96
STUDENT FARMAYISH
135.All of the following are examples of real security and privacy risks except ____.

a) Spyware b)Spam c)Hackers d)Identity Theft e)Viruses

ANS: b

136. _______ is a Windows utility program that locates and eliminates unnecessary fragments and rearranges files
and unused disk space to optimize operations.

a) Backup b)Disk cleanup c)Disk defragmenter d)Restore e)Disk restorer

ANS: c

137. Which of the following is an example of a binary number?

a)6AH1 b)100101 c)005 d)ABCD e)23456

ANS: b

138. A program designed to destroy data on your computer which can travel to "infect" other computers is called
a___.

a)disease b) torpedo c)hurricane d)virus e)infector

ANS: d

139. What does an electronic spreadsheet consists of?

a)Rows b)Columns c)Cells d)All the above e)None of these

ANS: d

140. ______ implies a combination of audio, video, text, animation and graphics.

a)Special media b)Multiplexer c)Multiplier d)Message-media e)Multimedia

ANS: e

141. What is the base of hexadecimal number system?

a)2 b)8 c)16 d)10 e)None of these

ANS: c

142. Soft copy refers to______.

a)Printout of a document b)Hardware c)Unprinted digital document file d)All of these


e)None of these

ANS: c

143. What is the full form of USB in terms of computer?

a) Universal Security Block b)Ultra Serial Bus c)Universal Serial Bus

d)United Service Block e)None of these

copyright@studentfarmayishyoutube Page 97
STUDENT FARMAYISH
ANS: c

144. ________ is not a graphic file format that allows animation to be viewed on a computer.

a)GIF b)PNG c)MP8 d)WMF e)EMF

ANS: c

145. Which device uses a handheld operating system?

a)A Tablet b)A Personal Computer c)a Laptop d)A mainframe e)None of these

ANS: a

146. A program that is used to view Web sites is called a ______.

a) word processor b)Web viewer c)spreadsheet d)search engine e)browser

ANS: e

147. Which protocol is used to received e-mail?

a)SMTP b)POP3 c)HTTP d)FTP e)None of these

ANS: b

148. What does the .org domain represents?

a) Education domain b)organization domain c)Network domain d)Government domain e )None of these

ANS: b

149. Which of the following is not provided as a service in cloud computing?

a)A. Infrastructure as a service b)Architecture as a service c)Software as a service


d)Platform as a service e)None of these

ANS: b

150. Information that comes from an external source and fed into computer software is called ___.

a) Output b)Input c)Throughput d)Reports e)None of these

ANS: b

151. Programs designed specifically to address general-purpose applications special purpose applications are
called _______.

a) operating system b)system software c) application software d)management


information systems e)None of these

ANS: c

152. What is the default file extension for all Word documents?

a)WRD b)TXT c)DOC d)FIL e)None of these

copyright@studentfarmayishyoutube Page 98
STUDENT FARMAYISH
ANS: c

153. The keyboard shortcut to centralise the selected text in Word is ____.

a)Ctrl + Esc b)Ctrl + C c)Alt + C d)There is no keyboard shortcut for this operation e)Ctrl + E

ANS: e

154. A _________contains buttons and menus that provide quick access to commonly used commands.

a) Menu bar b)Toolbar c)Window d)Action bar e)None of these

ANS: b

155. Which of the following types of memory improves processing by acting as a temporary high-speed holding
area between the memory and the CPU?

a)RAM b) ROM c)Cache memory d)Flash memory e)EPROM

ANS: c

156. The wheel located between the two standard buttons on a mouse is used to ________ .

a)click in Web pages b)shut down c)click and select items d)jump to different WebPages e)scroll

ANS: e

157. ________ is responsible for overall control and co-ordination of instruction execution.

a) CPU b)ALU c)RAM d)Control Unit e)None of these

ANS: d

158. Which of the following identifies a specific web page and it computer on the web?

a) Website b) Web Site address c)URL d)Domain name e)None of these

ANS: d

159. Cache memory is a_____.

a) A. Small buffer storage b) Permanent storage c) Main memory d) All of the above e) None of these

ANS: a

160. Ctrl, Shift and Alt are called __ keys.

a) modifier b)function c)alphanumeric d)adjustment e)None of these

ANS: a

161. _______ is also known as junk email or unsolicited bulk mail.

a) Spam b)Trash c)Draft d)Spoof e)None of these

ANS: a

copyright@studentfarmayishyoutube Page 99
STUDENT FARMAYISH
162. Data on a floppy disk is recorded in rings called ___.

a) sectors b)ringers c)roundels d)tracks e)segments

ANS: d

163. _____ are used to identify a user who returns to a Website.

a) Cookies b)Plug-ins c)Scripts d)ASPs e)None of these

ANS: a

164. A machine that connects two or more electronic mail systems (including dissimilar mail systems) and
transfers messages between them is called ____.

a) Mail gateway b)Mail exploder c)Message transfer agent d)Message handling system e)MILNET

ANS: a

165. Computer programs are written in a high-level programming language; however, the human- readable
version of a program is called ____.

a) cache b)instruction set c)source code d)word size e)None of these

ANS: c

166. Which type of memory holds only that program and data that CPU is presently processing?

a) CMOS b)ROM c)RAM d)ASCII e)CD

ANS: c

167. A(n) ________ allows you to access your e- mail from anywhere.

a)Forum b)Webmail interface c)Message Board d)Weblog e)none of these

ANS: b

168. Most mail programs automatically complete the following two parts in an e-mail ___.

a) From : and Body b)From : and Date: c)From : and To: d)From : and Subject: e)None of these

ANS: b

169. An input device that is able to interpret pencil marks on paper media is known as ____.

a)Magnetic disk b)Optical mark reader c)card puncher d)magnetic tape e)None of these

ANS: b

170. What is the file extension of MS-Powerpoint?

a) .exe b).xlsx c).pptx d).pst e)None of these

ANS: c

copyright@studentfarmayishyoutube Page 100


STUDENT FARMAYISH
171. On color monitor each pixel is composed of _____.

a)two mini dots b)five mini dots c)six mini dots d)three mini dots e)None of these

ANS: d (RED,GREEN,BLUE)

172. ________ is a software program used to view Web pages.

a) Site b)Host c) Link d)Browser e)None of these

ANS: d

173. Which of the following application is used to prepare a presentation/ slide show?

a)A. Photoshop b)Power Point c)Outlook Express d)Internete xplorer e)All of the above

ANS: b

1 74. ____ allows wireless mobile devices to access the Internet and its services such as the Web and e-mail.

a) TCP/IP b)Ethernet c)WAP d)Token ring e)None of these

ANS: c

175. Using output devices one can ______.

a)input data b)store data c)scan data d)view or print data e)None of these

ANS: d

176. To print a document ____.

a) Select the Print command and then select OK b)Select the Ready Printer command then select OK

c)Type print and then press Enter d)Close the document; select the Print command, then select OK

e)None of these

ANS: a

177. If a memory chip is volatile, it will _______.

a)Explode if exposed to high temperatures b)Lose its contents if current is turned off c)Be used for
data storage only d)Be used to both read and write data e) None of these

ANS: b

178. The key combination of ‘Ctrl + Right Arrow’ is used to _______ in MS Word.

a)Move the cursor one word to the right b)Move to cursor to the end of the document c)Move the
cursor to the end of the line d)Move the cursor one paragraph down e)None of these

ANS: a

179.The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law
enforcement specialty called……………..

copyright@studentfarmayishyoutube Page 101


STUDENT FARMAYISH
a)Robotics. B)Simulation. c)Computer forensics d)Animation. e)none of these

ANS: c

180. The _______states that a foreign key must either match a primary key value in another relation or it must be
null.

a)Entity integrity rule b)Referential integrity constraint c)Action assertion d)Composite attribute

ANS: b

181.A ________sometimes called a boot sector virus, executes when a computer boots up because it resides in the
boot sector of a floppy disk orthe master boot record of a hard disk.

a) System virus b)Trojan horse virus c)File virus d) worm e)None of these

ANS: d

182. The software tools that enable a user to interact with a computer for specific purposes are known as—

a) Hardware b) Networked Software c) Shareware d) Applications d) None of these

ANS: d

183. Computer programs are written in a high-level programming language; however, the humanreadable version
of a program is called—

a) cache b) instruction set c) source code d) word size e) None of these

ANS: c

184. Which of the following is not true about RAM ?

a) RAM is a temporary storage area b) RAM is the same as hard disk storage c) RAM is volatile
d) Information stored in RAM is gone when you turn the computer off e) None of these

ANS: b

185. The physical arrangement of elements on a page is referred to as a document’s……

a) features b) format c) pagination d) grid e) None of these

ANS: b

186. =SUM (B1 : B8) is an example of a—

a) function b) formula c) cell address d) value e) None of these

ANS: b

187. Which of the following storage media provides sequential access only ?

a) Floppy disk b) Magnetic disk c) Magnetic tape d) Optical disk e) None of these

ANS: b

copyright@studentfarmayishyoutube Page 102


STUDENT FARMAYISH
188. ………processing is used when a large mail-order company accumulates orders and processes them together in
one large set.

a) Batch b) Online c) Real-time d) Group e) None of these

ANS: a

189. A group of 8 bits is known as a—

a) Byte b) Kilobyte c) Binary digit d) Megabit e) None of these

ANS: a

190. When a file contains instructions that can be carried out by the computer, it is often called a(n) ……file.

a) data b) information c) executable d) application e) None of these

ANS: c

191. If a user needs information instantly available to the CPU, it should be stored—

a) on a CD b) in secondary storage c) in the CPU d) in RAM e) None of these

ANS: d

192. Straight and Uniform margins on both the sides indicate that there is …………in the document.

a) full justification b) full alignment c) left justification d) right justification e) None of these

ANS: a

193. The following are included in the world programme ………….Title Bar, Ribbon, Status Bar, Views, Document
workspace.

a) Windows b) Browser c) Explorer d) Website e) None of these

ANS: a

194. What are two examples of freeware ?

a) WinZip and Linux b) Shareware and file sharing c) Microsoft Word and the Google toolbar
d) Instant messaging and the Google toolbar e) Microsoft Power Point and Microsoft Excel

ANS: d

195. If a disk drive fails but the computer application running and using it can continue processing, this application
is said to have been designed with this feature—

a) 100 per cent uptime b) fault tolerance c) high reliability d) All of these e) None of these

ANS: b

196. Which media have the ability to have data/information stored (written) on them by users more than once ?

a) CD-R disks b) CD-RW disks c) Zip disks d) OptiDisks e) Both CD-RW disks and Zip disks

copyright@studentfarmayishyoutube Page 103


STUDENT FARMAYISH
ANS: b

197. You can use the………bar to type a URL and display a Web page, or type a keyword to display a list of related
Web pages.

a) menu b) Title c) Search d) Web e) Address

ANS: e

198. Cache and main memory will lose their contents when the power is off. They are—

a) dynamic b) static c) volatile d) non-volatile e) faulty

ANS: c

199. Every computer has a(n) ………; many also have.

a) operating system, a client system b) operating system; instruction sets c) application programs;
an operating system d) application programs; a client system e) operating system; application programs

ANS: a

200. Computer software can be defined as—

a) the computer and its associated equipment b) the instructions that tell the computer what to do
c) computer components that act to accomplish a goal d) an interface between the computer and the
network e) the interaction between the computer and its database

ANS: b

201. Press………to move the insertion point to the Address box, or to highlight the URL in the Address box.

a) ALT + D b) ALT + A c) SHIFT + TAB d) TAB + CTRL e) CTRL + S

ANS: a

202. The altering of data so that it is not usable unless the changes are undone is—

a) Biometrics b) Compression c) Encryption d) Ergonomics e) None of these

ANS: c

203. Which of the following statement is wrong ?

a) Windows XP is an operating system b) Linux is owned and sold by Microsoft c) Photoshop is a


graphical design tool by Adobe d) Linux is free and open source software e) None of these

ANS: b

204. Which of the following performs modulation and demodulation

a) Coaxial cable b) Satellite c) Modem d) Optical fibre e) None of these

ANS: c

205. A Proxy server is used for which of the following?

copyright@studentfarmayishyoutube Page 104


STUDENT FARMAYISH
a) To provide security against unauthorized users b) To process client requests for web pages c) To
process client requests for database access d) To provide TCP/IP e) None of these

ANS: b

206. When data changes in multiple lists and all lists are not updated, this causes:

a) data redundancy b) information overload c) duplicate data d) data inconsistency e) None of these

ANS: d

207.The ____________ contains data descriptions and defines the name, data type, and length of each field in the
database.

a) data dictionary b) data table c) data record d) data field e) None of these

ANS: a

208. What is the full form of ADSL?

a) Automatic Digital Subscriber Line b)Asymmetric Direct Subscriber Line c) Asymmetric Digital Subscriber
Line d)None of these

ANS: c

209. What is the difference between a CD-ROM and a CD-RW?

a) They are the same just two different terms used by different manufacturers b) A CD-ROM can be written to
and a CD-RW cannot c) A CD-RW can be written to, but a CD-ROM can only be read from d) A CD-ROM
holds more information than a CD-RW e) None of these

ANS: c

210. A mistake in an algorithm that causes incorrect results is called a……………..

a) logical error b) syntax error c) procedural error d) compiler error e) None of these

ANS: b

211. _______ is a technique that is used to send more than one call over a single line.

a) Digital transmission b) Infrared transmission c) Digitizing d) Multiplexing e) None of these

ANS: d

212. The method of Internet access that requires a phone line, but offers faster access speeds than dial- up is the
_____ connection.

a) cable access b) satellite access c) fiber-optic service d) digital subscriber e) None of these

ANS: d

213. Which of the following software could assist someone who cannot use their hands for computer input?

a) Video conferencing b) Speech recognition c) Audio digitizer d) Synthesizer e) None of these

copyright@studentfarmayishyoutube Page 105


STUDENT FARMAYISH
ANS: b

214. Different components on the motherboard of a PC unit are linked together by se ts of parallel electrical
conducting lines. What are these lines called?

a) Conductors b) Buses c) Connectors d) Consecutives e) None of these

ANS: b

215. What is the name given to those applications that combine text, sound, graphics, motion video, and/or
animation?

a) Motionware b) Anigraphics c) Videoscapes d) Multimedia e) None of these

ANS: d

216. _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every
port on the server using fake IP addresses.

a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these

ANS: c

217. ________ is a windows utility program that locates and eliminates unncessary fragments and rearranges filed
and unused disk space to optimize operations.

a) Backup b) Disk cleanup c) Disk defragmenter d) Restore e) None of these

ANS: c

218. When some unidentified / unknown person / firm sends you mail in a trustworthy /lucrative way asking for
sensitive banks and online payment information, this is a case of __?

a) Spam b)Hacking c)Phishing d)Vishing e)none of these

ANS: c

219. As a person working in internet banking environment, why you should be aware of the “Dictionary attack”?

a) It is used to inject worms or viruses in the system b) It is used to determine a password


c) It is used to access customer’s account by determining other details d)It is used for stealing info from the
Credit Card e)none of these

ANS: b

220. In each of the computer parts, there are many trillions of electrical circuits which can be turned on or off with
the help of an electronic switch. How are these arranged?

a) Circuit Gates b)Circuit Bypass c)Logic Gates d)Data Knots e)none of these

ANS: c

221. Which of the following registers can hold both data and addresses?

a) General Purpose Register b)Data Register c)Address Register d)Status Register e)none of these

copyright@studentfarmayishyoutube Page 106


STUDENT FARMAYISH
ANS: a

222. What is the full form of SMPS?

a) Switched-Mode Power Supply b) Switching Manual Power Supply c)Switched Maintenance Power
Supply d)None of the Above

ANS: a

223. Which of the following is a pointing device that uses light to determine mouse motion?

a) Trackball b) Touch screen c) Optical Mouse d)None of the Above

ANS: c

224. Which of the following clearly define the Trackball ?

a) It is a two-dimensional positioning device. b) It is a three- dimensional positioning device. c)It is a


pointing device. d)None of the Above

ANS: a

225. Which of the following is the ability of a system to jump directly to the requested data?

a) Sequential Access b)Random Access c)Quick Access d)All of the Above e)none of these

ANS: b

226. Which of the following models of processing has the master/slave architecture as a feature?

a) Distributed memory processing b)Shared memory processing c)Symmetric multi processing


d) None of the Above

ANS: b

227. There are many types of plotters available. Which of the following is the type of a plotter?

a) Drum Plotter b)Flatbed Plotter c)Handheld plotter d)Both a and b e)none of these

ANS: d

228. What is the name given to the view of database that appears to an application program?

a) Schema b)Metadata c)Front end d)Subschema e)none of these

ANS: d

229. There is a situation in which resources are held by two or more connections that are each needed by the
other connections. What is the name given to such a situation?

a) Deadlock b)Debugging c)Instance d)Remote Procedure Call e)none of these

ANS: a

230. System Area Network is used to provide high-speed connection in which of the following environments?

copyright@studentfarmayishyoutube Page 107


STUDENT FARMAYISH
a) Server-to-server application b) Storage Area Network c)Processor-to-Processor application
d)All of the Above e)none of these

ANS: d

231. Which of these standards is used to define Fiber Optic connections?

a) IEEE 802.1 b) IEEE 802.8 c) IEEE 802.11 d) IEEE 802 e)IEEE802.01

ANS: b

232. Which of the following transmission medium has categories named as RG-58, RG-59 and RG-11?

a) Coaxial cables b)Twisted pair cables c)Fiber Optics d)None of these

ANS: a

233. What role does fibers play in Optical Fiber cables?

a) Prevent loss of signals b)Provide immunity against electromagnetic interference c) Both a and b d)None

ANS: c

234. Which of these waves is most commonly used by wireless mouse to communicate?

a) Infrared b)Microwaves c)Radio waves d)None of these

ANS: a

235. What does the COMAL stands for?

a) Common Algebraic Language b) Common Algorithmic Language c)Common Algebraic Language


d) Computer Algebraic Language e)none of these

ANS: b

236. What is the name given to the technique of connecting computers?

a) Node b)Topology c)Architecture d)Ring e)none of these

ANS: b

237. Which country has a search engine called as Baidu?

a) China b)Russia c)Japan d)Cuba e)none of these

ANS: a

238. When was the first version of Windows released?

a) 1981 b)1998 c)1985 d)1987 e)1991

ANS: c

239. Which of these protocols is used by network components to find other devices in the same broadcast
domain?

copyright@studentfarmayishyoutube Page 108


STUDENT FARMAYISH
a) LPR b)LADP c)NTP d)ARP e)none of these

ANS: d

240. Who invented the first email program?

a) Tim Berners-Lee b)Ray Tomlinson c)Ajay Bhatt d)Dav Moron

ANS: b

241. Checking that a pin code number is valid before it is entered into the system in an example of

a)error correction b)data validation c)backup and recovery d)data preparation e)None of these

ANS: b

242. What is the name for the process that is used to convert a series of instructions, or program, written in a
high-level language into instructions (or a program) that can be run on a computer ?

a)Compiling b)Uploading c)None of these d)Assembling e)Translating

ANS: a

243. LSI in chip technology stands for

a)Large–Scale Integration b)Local–Scale Integration c)Low–Scale Intergration d)Large–Scale Internet

e)Low–Scale Internet

ANS: a

244. Computer use the number system to store data and perform calculations.

a)hexadecimal b)decimal c)octal d) Binary e)None of these

ANS: d

245. Most news readers presents newsgroups articles in :

a)mail b)column c)threads d)Row e)None of these

Ans: c

246. Which is the slowest internet connection service?

a)Cable modem b)Dial-up Service c)T1 d)Leased Line e)Digital Subscriber Line

ANS: b

247. What does VOIP stand for?

a)None of these b)Virtual over IP c)Video over IP d)Voice over IP e)Viruses over IP

ANS: d

copyright@studentfarmayishyoutube Page 109


STUDENT FARMAYISH
248. If you open a menu and then decide you don't want to select an option after all, click the menu title again or
press the………….key to close the menu.

a) Tab b)Esc c)Shift d)F1 e)none of these

ANS: b

249. If you want to move an icon on your desktop, this is called--

a)Pointing b)Highlighting c)Double clicking d)Dragging e)none of these

ANS: d

250. Which of the following operating systems is not owned and licensed by a company ?

a)Unix b)Mac c)Windows d)Windows 2000 e)Linux

ANS: a

251. Favourites are accessible from the……………menu

a)stop b)title c)None of these d)menu e)start

ANS: e

252. Which one of the following is OS software ?

a)Publisher 2000 b)Windows 2000 c)Access 2000 d)Excel 2000 e)Word 2000

ANS: b

253. The primary job of an operating system is to manage…………….

a) Commands b) Users c) Programmes d) Resources e) Process

ANS: d

254.Which of the following shortcut keys is used to after opening a document, to the location you were working in
when the document was last closed?

a)Ctrl + F5 b)Ctrl + Left arrow c)Shift + F5 d) Ctrl + Shift + < e)Ctrl + Shift + >

ANS: c

255. The process of writing computer instructions in a programming language is known as…………..

a)Processing b)Folder c)File d)Testing e)Coding

ANS: e

256. Data and instructions are stored on special ROM (Readonly memory) chips on the board and are called the….

a)BIOS b)microcode c)execute code d)Flash e)Symbols

ANS: a

copyright@studentfarmayishyoutube Page 110


STUDENT FARMAYISH
257. ______ is a function to return system files and settings to an earlier point in time when the system was
running properly.

a) re – access b)Segmenting c) Retrieve d) Restore e) Other than the given options

ANS: d

258. Which of the following function key is used to opens a search feature for many programs including Microsoft
windows when at the windows Desktop?

a) F1 b) F2 c)F3 d)F4 e)F5

ANS: c

259. Small application programs that run on a web page and may ensure a form is completed properly or provide
animation are known as

a) Cookies b) Cache c) Hyperlink d) applets e) Spam

ANS: d

260. _______ is a component of the motherboard, which is used to travel information.

a)ALU b)Chip c)Port d)CMOS e)Bus

ANS: e

261. Using output devices one can……….

a) input data b)store data c)scan data d)view or print data e)None of these

ANS: d

262. In a Windows- based application the shortcut key for Help is

a)F5. b)F4. c)F3. D) F2. E)F1.

ANS: e

263. Ted is a word processor in which operating system?

a)Macintosh b)Windows c)Linux d )Torch e)none of these

ANS: c

264. A(n) ________ is a program that makes the computer easier to use.

a) utility b)application c)operating system d)network e)None of these

ANS: a

265. A DVD is an example of a(n)

a)hard disk b)optical disc c) output device d)solid-state storage device e)None of these

ANS: b

copyright@studentfarmayishyoutube Page 111


STUDENT FARMAYISH
266. The enables you to simultaneously keep multiple Web pages open in one browser window.

a) tap box b) pop - up helper c)tab row d) address bar e)Esc key

ANS: a

267. .net domain is used for:

a) educational institution b) internet infrastructure and Service Providers c) International Organizations

d) None of these

ANS: b

268.One security method is encryption.But encryption does nothing to keep digital pests and hackers out.To
accomplish this goal, we need……………..

a)router b)bridges c)hubs d)anti-virus e)firewalls

ANS: e

269.The purpose of the primary key in a database is to…………..

a)unlock the database b)provide a map of the data c)uniquely identify arecord d)establish constraints
on database operations e)none of these

ANS: b

270.When you visit certain web sites spyware may be automatically downloaded.This is called a…………

a)logic bomb b)drive by download c)virus d)drive in download e)spybot

ANS: b

271.Which of these languages uses a two-step compilation process both interpreter and compiler?

a)COBOL b)BASIC c)Java d)C++ e)all of these

ANS: c

272.Which protocol is used to send e-mail?

a)HTTP b)POP3 c)SMTP d)SSH e)none of these

ANS: c

273.What is the meaning of Bandwidth in Network?

a)connected computers in the network b)transmission capacity of a communication channels c)class of IP


used in network d)compiler e)none of these

ANS: b

274.The circuit board that contains RAM chips is known as a…………..

a)CMOS b)SIMM c)ROM d)RAM board e)none of these

copyright@studentfarmayishyoutube Page 112


STUDENT FARMAYISH
ANS: b

275.The script which is designed to receive value from the web users is…………..

a)web script b)power C91 script c)Java script d)all of these e)none of these

ANS: c

276.Baud rate is………………….

a)number of signal changes per second b)number of bits per second c)number of bytes per second

d)number of ASCII characters per second e)none of these

ANS: a

277.What kind of protocol is used to provide internetaccess from mobile?

a)TCP/IP b)ISD c)WAP d)HTTP e)none of these

ANS: c

278……………is the science and art of transforming messages to make them secure and immune to attacks.

a)cryptography b)cryptonalysis c)cryptology d)cryptoanarchy e)cryptoanalytics

ANS: a

279.Fence register is used for……………

a)CPU protection b)Memory protection c)file protection d)all of these e)none of these

ANS: b

280. “Handshaking” in networking parlance means……………

a)connecting computer to a hub b)distributed networks c)having same operating system on different
d)sending e-mail e)receiving e-mails

ANS: a

281.The scrambling of code is known as…………..

a)encrypton b)a firewall c)scrambling d)password-proofing e)none of these

ANS: a

282.What is the language used by most of the DBMS’s fo helping their users to access data?

a)high level language b)query language c)fortran d)4GL e)none of these

ANS: b

283.A goal of normalization is to……….

copyright@studentfarmayishyoutube Page 113


STUDENT FARMAYISH
a)minimize the number of relationships b)minimize the number of entities c)minimize the number of
tables d)minimize the number of redundancy e)none of these

ANS: d

284.The altering of data so that it is not usable unless the changes are undone is…………

a)biometrics b)compression c)encryption d)ergonomics e)none of these

ANS: c

285.EDI……………

a)electronic distant interface b)electronic development interface c)electronic data interchange


d)electronic data interface e)none of these

ANS: c

286.To make a notebook act as a desktop model ,the notebook can be connected to a…………..which is connected
to a monitor and other devices.

a)bay b)docking station c)port d)network e)none of these

ANS: b

287.Which of the following best describes a network in which a company’s data and applications are stored at
offsite dadta centers that are accessed over the internet?

a)local area network b)virtual private network c)cloud computing d)wide area network e)none

ANS: c

288.The……………translates internet domain and host names to IP address.

a)file transfer protocol b)DNS c)Network time protocol d)internet relay chat e)none of these

ANS: b

289.In half duplex mode…………..

a)all stations can only transmit the data at a time b)all stations can only receive the data at a time c)all
the stations in the network may transmit or receive but at different times d)all the stations in the network
may transmit or receive at the same time e)none of these

ANS: c

290.DSL is an example of a…………………connection.

a)network b)wireless c)slow d)broadband e)none of these

ANS: d

291.A…………circuit is an interconnection of flip-flops and gates.

a)combinational b)sequential c)digital d)all of these e)none of these

copyright@studentfarmayishyoutube Page 114


STUDENT FARMAYISH
ANS: b

292.Which among the following option specifies this action:Holding the mouse button down while moving on
object of text?

a)moving b)dragging c)saving d)highlighting e)none of these

ANS: b

293.Which among the following is a type of device that is used for identifying people by their unique
characteristics?

a)biometric device b)web camera c)joystick d)scanner e)none of these

ANS: a

294……………are used to quickly accept,atore and transfer data and instructions that are being used immediately
by the CPU.

a)RAM b)Caches c)register d)graphics e)none of these

ANS: c

295.What is the cell content alignment in excel?

a)left aligned b)centrally aligned c)text left aligned and numbers right aligned d)text right aligned and
numbers left aligned e)none of these

ANS: c

296.If you wished to limit what you would see onan excel worksheet,what data function would you use?

a)sort b)filter c)conditional format d)data analysis e)none of these

ANS: b

297.What type of web technology creates an online community where people can make statements and others
can read and respond to those statements?

a)I-Journal b)podcast c)ASP d)Blog e)none of these

ANS: d

copyright@studentfarmayishyoutube Page 115


STUDENT FARMAYISH
SOME IMPORTANT SHORTCUT KEYS:
CONTROL KEYS+FUNCTION KEYS:
 Ctrl+F2 – Choose the print preview command (Microsoft office Button)
 Ctrl+F3 – Cut on the spike
 Ctrl+F4 – Close the window
 Ctrl+F6 – Go to the next window
 Ctrl+F9 – Insert an empty field
 Ctrl+F10 – Maximise the document window
 Ctrl+F11 – Lock a field
 Ctrl+F12 – Choose the Open command (Microsoft Office Button)

SHORTCUT KEY USING CTRL KEY:


 Ctrl + B – Used to bold the selected text.
 Ctrl + I – Used to italicize the selected text.
 Ctrl + U – Used to underline the selected text.
 Ctrl + E – Align the line or selected text to the centre of the screen.
 Ctrl +Shift + F12 – Prints the document.
 Ctrl + Shift + F6 – Switches to another open Microsoft Word document.
 Ctrl + Shift + F – Will activate the Font option and you can select the required font.
 Ctrl + Shift + – Decrease the font size one value.
 Ctrl + Shift + > – Increase the font size one value.
 Ctrl + Enter – Insert Page break.
 Ctrl + K – To insert a hyperlink.
 Ctrl + ‘=’ – for subscript. (First select a text, then press Ctrl + ‘=’)
 Ctrl + Shift + ‘+’ – for superscript. (First select a text, then press Ctrl + Shift + ‘+’)

MICROSOFT WORD SHORTCUT KEYS:


 Ctrl + A – Select all contents of the page
 Ctrl + B – Bold highlighted selection
 Ctrl + C – Copy selected text
 Ctrl + X – Cut selected text
 Ctrl + N – Open new/blank document
 Ctrl + O – Open options
 Ctrl + P – Open the print window
 Ctrl + F – Open find box
 Ctrl + I – Italicize highlighted selection
 Ctrl + K – Insert link
 Ctrl + U – Underline highlighted selection
 Ctrl + V – Paste
 Ctrl + Y – Redo the last action performed
 Ctrl + Z – Undo last action
 Ctrl + G – Find and replace options
 Ctrl + H – Find and replace options
 Ctrl + J – Justify paragraph alignment
 Ctrl + L – Align selected text or line to the left
 Ctrl + E – Align selected text or line to the center
copyright@studentfarmayishyoutube Page 116
STUDENT FARMAYISH
 Ctrl + R – Align selected text or line to the right
 Ctrl + M – Indent the paragraph
 Ctrl + T – Hanging indent
 Ctrl + D – Font options
 Ctrl + Shift + F – Change the font
 Ctrl + Del – Delete word to right of cursor
 Ctrl + Backspace – Delete word to left of cursor
 Ctrl + End – Move cursor to end of document
 Ctrl + Home – Move cursor to beginning of document
 Ctrl + 1 – Single-space lines
 Ctrl + 2 – Double-space lines
 Ctrl + 5 – 1.5-line spacing
 Ctrl + Alt + 1 – Change text to heading 1
 Ctrl + Alt + 2 – Change text to heading 2
 Ctrl + Alt + 3 – Change text to heading 3
 F1 – Open help
 Shift + F3 – Change case of selected text
 Shift + Insert – Paste
 F7 – Spell check selected text
 F12 – Save as
 Ctrl + S – Save
 Shift + F12 – Save
 Alt + Shift + D – Insert the current date
 Alt + Shift + T – Insert the current time
 Ctrl + W – Close document

MICROSOFT EXCEL SHORTCUT KEYS


 F2 – Edit the selected cell
 F5 – Go to a specific cell
 F7 – Spell check selected text or document
 F11 – Create chart
 Ctrl + Shift + ; – Enter the current time
 Ctrl + ; – Enter the current date
 Alt + Shift + F1 – Insert new worksheet
 Shift + F3 – Open the Excel® formula window
 Shift + F5 – Bring up search box
 Ctrl + A – Select all contents of worksheet
 Ctrl + B – Bold highlighted selection
 Ctrl + I – Italicize highlighted selection
 Ctrl + C – Copy selected text
 Ctrl + V – Paste
 Ctrl + D – Fill
 Ctrl + K – Insert link
 Ctrl + F – Open find and replace options
 Ctrl + G – Open go-to options
 Ctrl + H – Open find and replace options
 Ctrl + U – Underline highlighted selection
 Ctrl + O – Open options
 Ctrl + N – Open new document
copyright@studentfarmayishyoutube Page 117
STUDENT FARMAYISH
 Ctrl + P – Open print dialog box
 Ctrl + S – Save
 Ctrl + Z – Undo last action
 Ctrl + F9 – Minimize current window
 Ctrl + F10 – Maximize currently selected window
 Ctrl + Page up & Page Down – Move between Excel® worksheets in the same document
 Ctrl + Tab – Move between two or more open Excel® files
 Alt + = – Create formula to sum all of above cells
 Ctrl + Space – Select entire column
 Shift + Space – Select entire row
 Ctrl + W – Close document

MS POWERPOINT SHORTCUT KEYS:


 SHIFT + TAB --Go to the last or previous hyperlink on a slide
 TAB--Go to the first or next hyperlink on a slide
 CTRL + A-- Redisplay hidden pointer or change the pointer to an arrow
 CTRL + P --Redisplay hidden pointer or change the pointer to a pen
 1 + ENTER-- Return to the first slide
 ESC or HYPHEN-- End a presentation
 number + ENTER-- Go to slider number
 F5--Start the presentation form the beginning
 Alt + R-- Review Tab
 Alt + G-- Design Tab
 Alt + Q—Search
 Alt + F10-- Maximize window
 Ctrl + D-- Duplicate Slide
 Alt + S, B-- Start Slideshow
 Alt + F, X-- Close PowerPoint
 Alt + T-- Transitions Tab
 Alt + A-- Animations Tab
 Alt + W-- View Tab
 Alt + G-- Design Tab
 Alt + N-- Insert Tab

MS WINDOWS SHORTCUT KEYS:


 Alt + Tab -- Switch between open applications.
 Alt + Shift + Tab -- Switch backward between open applications.
 Alt + Print Screen -- Create screenshot for the current program.
 Ctrl + Alt + Del -- Reboot/Windows task manager.
 Ctrl + Esc -- Bring up the start menu.
 Alt + Esc -- Switch between applications on the taskbar.
 F2 -- Rename selected icon.
 F3 -- Start find from the desktop.
 F4 -- Open the drive selection when browsing.
 F5 -- Refresh contents.
 Alt + F4 -- Close current open program.
 Ctrl + F4 -- Close window in program.
 Ctrl + Plus Key-- Automatically adjust widths of all columns in Windows Explorer.

copyright@studentfarmayishyoutube Page 118


STUDENT FARMAYISH
 Alt + Enter -- Open properties window of selected icon or program.
 Shift + F10 -- Simulate right-click on selected item.
 Shift + Del -- Delete programs/files permanently.
 Holding Shift During Boot up -- Boot safe mode or bypass system files.
 Holding Shift During Boot up -- When putting in an audio CD, will prevent CD Player from playing.

OUTLOOK SHORTCUT KEYS:


 Alt + S -- Send the email.
 Ctrl + C -- Copy selected text.
 Ctrl + X -- Cut selected text.
 Ctrl + P -- Open print dialog box.
 Ctrl + K -- Complete name/email typed in address bar.
 Ctrl + B -- Bold highlighted selection.
 Ctrl + I -- Italicize highlighted selection.
 Ctrl + U -- Underline highlighted selection.
 Ctrl + R -- Reply to an email.
 Ctrl + F -- Forward an email.
 Ctrl + N -- Create a new email.
 Ctrl + Shift + A -- Create a new appointment to your calendar.
 Ctrl + Shift + O -- Open the outbox.
 Ctrl + Shift + I -- Open the inbox.
 Ctrl + Shift + K -- Add a new task.
 Ctrl + Shift + C -- Create a new contact.
 Ctrl + Shift+ J -- Create a new journal entry.

SOME BASICE SHORTCUT KEYS:


 Alt + F--File menu options in the current program.
 Alt + E--Edits options in the current program.
 F1--Universal help (for any sort of program).
 Ctrl + A--Selects all text.
 Ctrl + X--Cuts the selected item.
 Ctrl + Del--Cut selected item.
 Ctrl + C--Copy the selected item.
 Ctrl + Ins-- Copy the selected item.
 Ctrl + V--Paste the selected item.
 Shift + Ins -- Paste the selected item.
 Home -- Takes the user to the beginning of the current line.
 Ctrl + Home--Go to the beginning of the document.
 End -- Go to the end of the current line.
 Ctrl + End -- Go to the end of a document.
 Shift + Home -- Highlight from current position to beginning of the line.
 Shift + End -- Highlight from current position to end of the line.
 Ctrl + (Left arrow) -- Move one word to the left at a time.
 Ctrl + (Right arrow) -- Move one word to the right at a time.

FUNCTION KEYS:
 F1 --Get help or visit Microsoft office Online.

copyright@studentfarmayishyoutube Page 119


STUDENT FARMAYISH
 F2--Move text or graphic.
 F4 --Repeat the last action
 F5 --Choose the Go To command (Home tab).
 F6 --Go to the nest pane or frame. F7 Choose the spelling command (Review tab)
 F8 --Extend a selection
 F9-- Update the selected fields
 F10 --Show key tips
 F11-- Go to the nest field
 F12 --Choose the Save As command (Microsoft Office Button).

HOME AND END KEY:


 Home – Moves the cursor position to the first character.
 End – Moves the cursor position to the last character.

SOME IMPORTANT ABBRIVATION:

1 TCP Transmission Control Protocol


2 FTP File Transfer Protocol
3 ASCII American Standard Code for Information Interchange
4 DBMS Data Base Management System
5 MODEM Modulator Demodulator
6 RAM Random Access Memory
7 ROM Read Only Memory
8 MICR Magnetic Ink Character Reader / Recognition
9 USB Universal Serial Bus
10 SQL Structured Query Languag
11 VIRUS Vital Information Resource Under Siege
12 ISDN Integrated Servers Digital Network
13 OMR Optical Mark Reader / Recognition
14 OCR Optical Character Reader / Recognition
15 EEPROM Electrically Erasable PROM
16 EPROM Electrically PROM
17 PROM Programmable ROM
18 SRAM Static RAM
19 DRAM Dynamic RAM
20 HDD Hard Disc Drive
21 ARPANET Advanced Research Projects Agen Network
22 VIRUS Vital Information Resource Under Siege
23 WIFI Wireless fidelity
24 API Application Program Interface
25 DPI Dots Per Inch
26 ADSL Asymmetric Digital Subscriber Line
27 DSL Digital Subscriber Line
28 BASIC Beginners All Purpose Symbolic Instruction Code

copyright@studentfarmayishyoutube Page 120


STUDENT FARMAYISH
29 HTTP Hyper Text Transfer Protocol
30 SMTP Simple Mail Transfer Protocol
31 ATM Asynchronous Transfer Mode
32 BPS bit Per Second
33 DNS Domain Name Server
34 GIF Graphics Interchange Format
35 URL Uniform Resource Locator
36 GUI Graphical User Interface
37 SNMP Simple Network Management Protocol
38 HTTPS Hyper Text Transfer Protocol Secure
39 ISDN Integrated Servers Digital Network
40 BIOS Basic Input Output System
41 IPV4 Internet Protocol Version 4
42 IPV6 Internet Protocol Version 6
43 Al Artificial intelligence
44 ALGOL Algorithmic Language
45 BCC Blind Carbon Copy
46 CC Carbon Copy
47 P2P Peer to peer
48 CAD Computer Aided Design
49 COBOL Common Business Oriented Language
50 CD Compact Disc
51 CRT Cathode Ray Tube
52 CDR Compact Disc Recordable
53 CDROM Compact Disc Read Only Memory
54 CDRW Compact Disc Rewritable
55 CDR/W Compact Disk Read/Write
56 DBMS Data Base Management System
57 DNS Domain Name System
58 DRAM Dynamic Random Access Memory
59 DVD Digital Video Disc/Digital Versatile Disc
60 e-Commerce Electronic Commerce
61 FDD Floppy Disk Drive
62 SRAM Static Random Access Memory
63 SIM Subscriber Identification Module
64 ULSI Ultra Large Scale Integration
65 UNIVAC Universal Automatic Computer
66 WLAN Wireless Local Area Network
67 ENIAC Electronic Numerical Integrator and Computer
68 UPS Uninterrupted Power Supply
69 URI Uniform Resource Identifier
70 JPEG Joint Photographic Experts Group
71 ELM/e-Mail Electronic Mail
72 ISP Internet Service Provider
73 XHTML Extensible Hyper Text Mark-up Language
74 POS Point Of Sale
75 PPP Point-to-Point Protocol
76 SDRAM Synchronous Dynamic Random Access Memory
77 ESDI Enhanced Small Device Interface

copyright@studentfarmayishyoutube Page 121


STUDENT FARMAYISH
78 FORTRAN Formula Translation
79 DHTML Dynamics Hyper Text Mark-up Language
80 CPU Central Processing Unit
81 CPI Clock / Cycle Per Instruction
82 CD – WO Compact Disk - Write Once
83 ATM Asynchronous Transfer Mode
84 BPS Bits Per Second
85 XML Extensible Mark-up Language
86 XMF Extensible Music File
87 CADD Computer Aided Design and Drafting
88 CAN Campus Area Network
89 VOIP Voice Over Internet Protocol
90 TBPS Tera Bytes Per Second
91 TIPS Trillion Instruction Per Second
92 FAT File Allocation Table
93 FAX Far Away Xerox/ facsimile
94 SMPS Switch Mode Power Supply
95 SMS Short Message Service
96 WAN Wide Area Network
97 PSU Power Supply Unit
98 WAP Wireless Application Protocol
99 MIPS Million Instructions Per Second
100 BCR Bar Code Reader

SOME IMPORTANT COMPUTER FILE EXTENSION:


 doc – Microsoft Word Document.
 .docx – Microsoft Word Open XML Document.
 .tex – LaTeX Source Document.
 .mp3 – MP3 Audio File.
 .wps – Microsoft Works Word Processor Document.
 .txt – Plain Text File.
 .odt – OpenDocument Text Document.
 .dat – Data File.
 .pps – PowerPoint Slide Show.
 .ppt – PowerPoint Presentation.
 .pptx – PowerPoint Open XML Presentation.
 .flv – Flash Video File.
 .xml – XML File.
 .gif – Graphics Interchange Format File.
 .xls – Excel Spreadsheet.
 .dbf – Database File.
 .sql – Structured Query Language Data File.
 .exe – Windows Executable File.
 .html – Hypertext Markup Language File
 .tmp – Temporary File.
 .bak – Backup File.
 .jpg—JPEG image

copyright@studentfarmayishyoutube Page 122


STUDENT FARMAYISH
SOME IMPORTANT DOMAIN NAME:
 .info—Informational organization
 .com – commercial
 .gov---government
 .edu—educational
 .mil—military
 .net—network resources
 .org—non-profit organisation
 .int—international treaties

SOME IMPORTANT TERMS:

1. Data: It is a form of collective information in computer.

2. Database: Database is the collection of information in which similar type of data is collected in same
set/class.

3. Bug: It is a programming error which prevents computer from working correctly.

4. Debugging: Locating and eliminating defects in a program.

5. Cache : A small data-memory storage area that a computer can use to instant re-access the data
instead of re-reading it from the original source, such as a hard drive.

6. Firewall: It is a set of software that prevents unauthorized persons from accessing certain parts of a
program, database, or network.

7. Ethernet: Protocol in the TCP/IP stack, describing how networked devices can format data for
transmission to other network devices on the same network.

8. Intranet: Intranet is a private network which is accessible by the particular organization.

9. Intranet: A private network established by an organization for the exclusive use of its employees.
Firewalls prevent outsiders from gaining access to an organization's intranet.
10. Bus : It is an electronic pathway through which data is transmitted between components in a
computer.
11. Cookie: A packet of information that travels between a browser and the web server.
12. Fragmentation: It is process of breaking up of a file into many separate locations in memory or on a
disk.

13. Defragment: It is used to concatenate fragments of data into contiguous blocks in memory or on a
hard drive.

copyright@studentfarmayishyoutube Page 123


STUDENT FARMAYISH
14. Root Directory: Main folder of a storage is called root directory.

15. Command: It is the act of giving an instruction to the computer.


16. Crash: It is system malfunction that causes your computer or application no longer works correctly
and so you "loose" all the work you've done since the last time you saved.
17. Cracker: The preferred term to refer to a computer criminal that penetrates a computer program to
steal information or damage the program in some way.
18. Glitch: A hardware problem that causes a computer to malfunction or crash.
19. Assembler: A program that translates mnemonic statement into executable instruction.
20. Compiler: It is a set of programmes that converts programming code into a form that can be used by
computer.
21. Interpreter: It converts the programs in a high-level language to low-level language. It translates line
by line and reports the error once after completing the translation process. It gives better error
diagnostics than a compiler. Python, BASIC, and Ruby use interpreters.
22. Bandwidth:The maximum amount of data that can travel in a communication path in a given time,
measured in bits per second (bps).
23. Botnet:It is a collection of internet connected programs communicating with other similar programs
in order to perform tasks.
24. Bitmap:A method of storing a graphic image as a set of bits in a computer memory. To display the
image on the screen, the computer converts the bits into pixels.
25. Boot :The boot process is the name for the various steps the computer takes after you turn it on, all
the way until the operating system is loaded.
26. Booting: is a bootstrapping process which starts the operating system when a computer is switched
on
27. Cold Boot: Turn ON the computer from an OFF position is called Cold Booting.
28. Warm Boot : A computer system starts up/reset from a complete powerless state is called Warm
Booting.
29. Simplex Mode :In this type, the data can be transferred in only one direction. The only one can
transmit and the other can receive the data.
30. Half Duplex Mode: In this type, the data can be transferred in both directions, but not at the same
time.
31. Full Duplex Mode :In this type, the data can be transferred in both direction on the same
transmission path. Two lines are used for sending and receiving the data.
32. Firmware: Firmware is a technology which has the combination of both hardware and software
33. Middleware :Middleware is a software layer situated between applications and operating systems. It
enables communication and data management for distributed applications.
34. Spooling: Spooling is a process in which data is temporarily held to be used and executed by a
device, program or the system. Data is saved in storage until the program requests it for execution.
35. Super Key: It is a set of one or more attributes whose values uniquely determine each entity in the
database table. It is a subset of a candidate key.
36. Candidate Key: It is a set of columns in the table from which primary key can be selected to identify
each record. Every database table may have one or more candidate keys.
37. Primary Key: It is a special key that uniquely identifies each record in the table. It has a unique
value for each row of data and it cannot contain null values.
38. Composite Key: It is a combination of more than one column in the table that can be used to
uniquely identify each record. It is also known as a Compound key.
39. Alternate Key :All keys except primary key are known as Alternate. Alternate keys are also called
Secondary Keys.

copyright@studentfarmayishyoutube Page 124


STUDENT FARMAYISH
40. Foreign Key : Foreign key points to the primary key of another table. It acts as a reference between
tables. It can accept the null and duplicate value.
41. Bridge: Bridge is a network device that connects a local area network to another local area network
that uses the same protocol.
42. Gateway:A gateway is a network node that connects two dissimilar networks using different
protocols together.
43. Hub:is a device that splits a network connection into multiple computers
44. Switch:is a telecommunication device grouped as one of computer network components

45. Repeaters is used to regenerate or replicate signals that are weakened or distorted by
transmission over long distances

46. Topology:The structure of the network including physical connection such as wiring schemes
and logical interactions between network devices.

47. Mesh topology :Mesh is a network topology in which devices are connected with many
redundant interconnections between network nodes.
48. Star topology : Star topology is a network topology where each individual piece of a network is
attached to a central node.
49. Ring topology: Ring topology refers to a specific kind of network setup in which devices are
connected in a ring and pass information to each other according to their adjacent in the ring
structure.
50. Bus topology :Bus topology is a specific kind of network topology in which all of the various
devices in the network are connected to a single cable or line.
51. Tree toplogy: It is a combination characteristics of linear bus and star topologies.
52. Computer Worm:A computer worm is a malicious, self-replicating software program (malware) which
affects the functions of software and hardware programs. Stuxnet is the most famous computer
worm.
53. Ransomware: Ransomware is a type of malware program that infects and takes control of a system.
It infects a computer with the intention of extorting money from its owner.
54. Adware: This program launches the advertisements in the form of pop ups. Usually the add words
are based on the internet behavior of the user.
55. Spyware: It is a software that secretly collects user information while on the internet. Spyware can
capture information like web browsing habits, email messages, usernames and passwords, and credit
card information.
56. Scareware: A common trick cyber criminals use to make users think that their computer has
become infected with malware to get them to purchase a fake application.
57. Rootkit : A rootkit is a secret computer program designed to provide continued access to a computer
while actively hiding its presence. Rootkits are associated with malware such as Trojans, worms,
viruses.
58. Mail Bomb: An excessively large email (typically many thousands of messages) or one large
message sent to a user’s email account. This is done to crash the system and prevent genuine
messages from being received.
59. Spam: These are unwanted emails. In other words we can call them as unsolicited promotional
mail.
60. Pharming: More advance method of Phishing in which the attackers create duplicate or similar
looking website of other companies, to attract the customers and steal the data.
61. Sniffers: A software program used to monitor the traffic in a network. The hackers may use the

copyright@studentfarmayishyoutube Page 125


STUDENT FARMAYISH
sniffed data to access important confidential data.
62. Phishing: This is acquiring the personal and sensitive information of a person through official
looking emails. Users of online banking and e-commerce websites are more prone to this attack.
63. Spoofing : It is a type of scam where an intruder attempts to gain unauthorized access to a
user's system or information by pretending to be the user.
64. Zombie: A computer that has been hijacked by a cracker without the owner's knowledge and
used to perform malicious tasks on the Internet.
65. Trojan horse: A trojan horse is a malicious program which infects a system by masquerading as
an innocuous program. It introduces the virus to a system. They do not replicate themselves but
are very destructive.
66. Keylogger :A keylogger is a type of malware that stores all keystrokes of a computer. It can
record all sorts of personal information, such as usernames, passwords, credit card numbers,
and personal documents such as emails and reports.
67. Register: A temporary storage unit for quick, direct accessibility of a small amount of data for
processing. Most computers include a set of internal registers that can be accessed more
quickly than the system's main memory
68. Multitasking: Multitasking can simultaneously work with several programs or interrelated tasks
that share memories, codes, buffers and files.
69. Multiplexer: It is a device that combines multiple input signals into an aggregate signal for transmission.
70. Buffering:The process of storing data in a memory device, allowing the devices to change the
data rates , perform error checking and error retransmission.
71. File Allocation Table (FAT):It is the name of a computer file system architecture. The FAT file
system is a legacy file system which is simple and robust.
72. Cryptography:It is the science of writing information is a hidden or secret form and is an
ancient art.It protects the data in transt and also the data stored on the disk.
73. Encryption: It is the process of converting plain text to cipher text using an encryption
algorithm.
74. Decryption: Reverse of encryption i.e. converts cipher text to plain text.
75. Patch: A small program that improves an existing piece of software or corrects an error in it.
76. Flash Memory : It is a type of non-volatile computer storage chip that can be electrically erased and
reprogrammed. It was developed by EEPROM.
77. Virtual memory: permits software to use additional memory by utilizing the hard disk drive (HDD) as
temporary storage.
78. Peripherals:A connectable device that has an auxiliary function outside the permanent system
configuration such as plotters, printers and graphic displays.
79. Telnet :A protocol for remote computing on the internet that allows a computer to act as a
remote terminal on another machine, anywhere on the internet.
80. Plotter: It is an output device used to produce hard copies of large graphics and design on

copyright@studentfarmayishyoutube Page 126


STUDENT FARMAYISH
paper.
81. Flowcharts: Flowcharts are the means of visually representing the flow of data through an
information processing system, the operations an performed within the system and the
sequence in which they arc performed.
82. Hyperlink: An image or portion of text on a web page that is linked to another web page.
83. Loop: A sequence of instructions that is executed repeatedly until a terminal condition occurs.
84. Label: One or more characters used to Identify a statement and instruction or a data field in a
computer program.
85. Record: A collection of all the information pertaining to a particular entity instance.
86. Attribute: The characteristics of an entity are called its attributes.
87. Pseudocode:Pseudocode is an artificial and informal language that helps programmers develop
algorithms.
88. CMOS: A type of computer chip which is able to operate with a very small amount of electricity
from a battery. CMOS refers as complementary metal oxide semiconductor.
89. Terminal :Any device that can transmit or receive electronic information.
90. Object code:Machine language code produced by a translator program, such as an assembler,
interpreter, or compiler.
91. Source Code :A set of computer instructions in hard-copy or stored form. When written in a
language other than machine language, the source code requires translation by an assembler
(or macroassembler), interpreter, or compiler into object code.
92. Kernel: It is the fundamental part of a program, such as an operating system, that resides in
memory at all times.
93. Schema: It is a logical structure of the database.
94. Instances: These are the actual data contained in the database at a particular point of time.
95. Data mining: It combines efficient implementation techniques that enable them to be used in
extremely large database.
96. Synchronisation:This method ensures that the receiving end can recognise characters in order,
in which the transmitting end sends them in a serial data transmission.
97. User-Friendly:Program A software program that has been designed to easily direct the user
through the operation or application of a program. A menu-driven program is considered to be
'user-friendly'.
98. Utility:A software program designed to perform a computer system's routine housekeeping functions, like
copying, deleting files and/or providing techniques to simplify the execution of a program.
99. Encapsulation: It is a mechanism that associates the code and the data it manipulates into a
single unit and keeps them safe from external interference.
100. Shareware: A software that is not free but is available for a free trial period.

copyright@studentfarmayishyoutube Page 127

You might also like