Logo
 

HTET Solved Question Paper haminpur.com


1. A………typically connects personal computers within a very limited geographical area, usually within a single building.
(A). LAN
(B). BAN
(C). TAN
(D). NAN
Right Answer: A

2. Computers manipulate data in many ways, and this manipulation is called—
(A). utilizing
(B). batching
(C). upgrading
(D). processing
Right Answer: D

3. An e-mail address typically consists of a user ID followed by the ……… sign and the name of the e-mail server that manages the user’s electronic post office box
(A). @
(B). #
(C). &
(D).
Right Answer: A

4. Software applies……, also called algorithms, to process data.
(A). arithmetic
(B). procedures
(C). objects
(D). rules
Right Answer: A

5. A file extension is separated from the main file name with a(n) ……, but no spaces.
(A). question mark
(B). exclamation mark
(C). underscore
(D). period
Right Answer: E

6. An ad hoc query is a—
(A). pre-planned question
(B). pre-scheduled question
(C). spur-of-the-moment question
(D). question that will not return any results
Right Answer: B

7. A Web ……… consists of one or more Web pages located on a Web server.
(A). hub
(B). site
(C). story
(D). template
Right Answer: B

8. A computer ……… is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files.
(A). worm
(B). virus
(C). trojan horse
(D). phishing scam
Right Answer: B

9. The desktop contains small graphics called—
(A). windows
(B). logos
(C). icons
(D). pictures
Right Answer: C

10. C, BASIC, COBOL, and Java are examples of ……… languages.
(A). low-level
(B). computer
(C). system programming
(D). high-level
Right Answer: D

11. A(n)……… camera is a peripheral device used to capture still images in adigital format that can be easily transferred into a computer and manipulated using graphics software.
(A). digital
(B). analog
(C). classic
(D). film
Right Answer: A

12. ……… makes it possible for shoppers to make purchases using their computers.
(A). E-world
(B). E-commerce
(C). E-spend
(D). E-business
Right Answer: D

13. Networks are monitored by security personnel and supervised by ……… who set(s) up accounts and passwords for authorized network users.
(A). IT managers
(B). the government
(C). network administrators
(D). password administrators
Right Answer: C

14. Application software is designed to accomplish—
(A). real-world tasks
(B). computer-centric tasks
(C). gaming tasks
(D). operating system tasks
Right Answer: D

15. A telephone number, a birth date, and a customer name are all examples of—
(A). a record
(B). data
(C). a file
(D). a database
Right Answer: D

16. The human-readable version of a program is called—
(A). source code
(B). program code
(C). human code
(D). system code
Right Answer: D

17. A ……… computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the screen, the keyboard, storage, and processing components into a single portable unit.
(A). notebook
(B). journal
(C). diary
(D). briefcase
Right Answer: A

18. ………  is the result produced by a computer.
(A). Data
(B). Memory
(C). Output
(D). Input
Right Answer: C

19. Programs such as Internet Explorer that serve as navigable windows into the Web are called—
(A). Hypertext
(B). Networks
(C). Internet
(D). Web browsers
Right Answer: D

20. A ……… is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
(A). surge strip
(B). USB
(C). UPS
(D). battery strip
Right Answer: C

21. When you save to  ………, your data will remain intact even whenthe computer is turned off.
(A). RAM
(B). motherboard
(C). secondary storage device
(D). primary storage device
Right Answer: C

22. The motherboard is the—
(A). circuit board that houses peripheral devices
(B). same as the CPU chip
(C). the first chip that is accessed when the computer is turned on
(D). circuit board that contains a CPU and other chips
Right Answer: D

23. A computer-intensive problemruns on a—
(A). server
(B). main frame
(C). supercomputer
(D). super PC
Right Answer: C

24. A(n)……converts and executesone statement at a time.
(A). compiler
(B). interpreter
(C). converter
(D). instructions
Right Answer: B

25. The term ……designates equipment that might be added to a computer system to enhance its functionality.
(A). digital device
(B). system add-on
(C). disk pack
(D). peripheral device
Right Answer: D

26. Approximately how many bytes make one megabyte ?
(A). One thousand
(B). Ten thousand
(C). One hundred
(D). One million
Right Answer: D

27. What is MP3 ?
(A). A mouse
(B). A Printer
(C). A Sound format
(D). A Scanner
Right Answer: C

28. All the deleted files go to—
(A). Recycle Bin
(B). Task Bar
(C). Tool Bar
(D). My Computer
Right Answer: A

29. ………  this is the act of copying or downloading a program from a network and making multiple copies of it.
(A). Network piracy
(B). Plagiarism
(C). Software piracy
(D). Site-license piracy
Right Answer: C

30. A directory within a directory is called—
(A). Mini Directory
(B). Junior Directory
(C). Part Directory
(D). Sub Directory
Right Answer: D

31. Which is the best definition of a software package ?
(A). An add-on for your computer such as additional memory
(B). A set of computer programs used for a certain function such as word processing
(C). A protection you can buy for a computer
(D). The box, manual and license agreement that accompany commercial software
Right Answer: B

32. In MICR, C stands for ……….
(A). Code
(B). Colour
(C). Computer
(D). Character
Right Answer: D

33. Fax machines and imaging systems are examples of—
(A). bar-code readers
(B). imaging systems
(C). scanning devices
(D). pen-based systems
Right Answer: B

34. When writing a document, you can use the ……… feature to find an appropriate word or an alternative word if you find yourself stuck for the right word.
(A). dictionary
(B). word finder
(C). encyclopedia
(D). thesaurus
Right Answer: A

35. Which key is used in combination with another key to perform a specific task ?
(A). Function
(B). Control
(C). Arrow
(D). Space bar
Right Answer: B

36. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is—
(A). read-only
(B). memory-only
(C). run-only
(D). write-only
Right Answer: A

37. In an information system, alphanumeric data normally takes the form of—
(A). Sentences and paragraphs
(B). Numbers and alphabetical characters
(C). Graphic shapes and figures
(D). Human voice and other sounds
Right Answer: B

38. A Website’s main page is called its—
(A). home page
(B). browser page
(C). search place
(D). bookmark
Right Answer: A

39. When installing ………, , the user must copy and usually decompress program files from a CDROM or other medium to the hard disk.
(A). programming software
(B). system hardware
(C). applications hardware
(D). applications software
Right Answer: A

40. A collection of interrelated files in a computer is a—
(A). file manager
(B). field
(C). record
(D). database
Right Answer: D

41. A ……… computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.
(A). server
(B). mainframe
(C). desktop
(D). tablet
Right Answer: B

42. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these operating systems, a trackball is described as—
(A). a roller ball which moves the cursor
(B). a pen-shaped device which allows data to be entered through the CRT screen
(C). a figure which resembles a familiar office device
(D). an outdated input device
Right Answer: A

43. Various applications and documents are represented on the Windows desktop by—
(A). Symbols
(B). Labels
(C). Graphs
(D). Icons
Right Answer: D

44. What is usually used for displaying information at public places ?
(A). Monitors
(B). Overhead Projections
(C). Monitors and Overhead Projections
(D). Touch Screen Kiosks
Right Answer: D

45. The real business and competitive value of information technology lies in—
(A). The software applications that are used by many companies
(B). The capabilities of the software and value of the information a business acquires and uses
(C). The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
(D). The capabilities of the hardware and the speed at which it processes information
Right Answer: B

46. Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves ?
(A). Open source vendors
(B). Alliances
(C). Application service providers
(D). All of the above
Right Answer: C

47. Which one of the following would be considered as a way that a computer virus can enter a computer system ?
(A). Opening an application previously installed on the computer
(B). Borrowed copies of software
(C). Viewing a website without causing any additional transactions
(D). Running antivirus programs
Right Answer: B

48. Collecting personal information and effectively posing as another individual is known as the crime of—
(A). spooling
(B). dentity theft
(C). spoofing
(D). hacking
Right Answer: B

49. The first step in the transaction processing cycle is—
(A). database operations
(B). audit
(C). data entry
(D). user inquiry
Right Answer: C

50. In the information systems concept, the output function involves—
(A). Capturing and assembling elements that enter the system to be processed
(B). Transformation processes that convert input into output
(C). Transferring elements that have been produced by a transformation process to their ultimate destination
(D). Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal
Right Answer: A

51. All of the following are examples of real security and privacy risks EXCEPT:
(A). hackers.
(B). spam.
(C). viruses.
(D). identity theft.
Right Answer: B

52. A process known as ____________ is used by large retailers to study trends.
(A). data mining
(B). data selection
(C). POS
(D). data conversion
Right Answer: A

53. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
(A). Data
(B). Point-of-sale (POS)
(C). Sales
(D). Query
Right Answer: B

54. A(n) ____________ system is a small, wirelesshandheld computer that scans an item�s tag and pulls up the current price (and any special offers) as you shop.
(A). PSS
(B). POS
(C). inventory
(D). data mining
Right Answer: A

55. The ability to recover and read deleted or damaged files from a criminal�s computer is an example of a law enforcement specialty called:
(A). robotics.
(B). simulation.
(C). computer forensics.
(D). animation.
Right Answer: C

56. Which of the following is NOT one of the four major data processing functions of a computer?
(A). gathering data
(B). processing data into information
(C). analyzing the data or information
(D). storing the data or information
Right Answer: C

57. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal�s movements.
(A). POS
(B). RFID
(C). PPS
(D). GPS
Right Answer: B

58. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
(A). robotics.
(B). computer forensics.
(C). simulation.
(D). forecasting.
Right Answer: A

59. Technology no longer protected by copyright, available to everyone, is considered to be:
(A). proprietary.
(B). open.
(C). experimental.
(D). in the public domain.
Right Answer: A

60. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
(A). Nanoscience
(B). Microelectrodes
(C). Computer forensics
(D). Artificial intelligence
Right Answer: A

61. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
(A). Nanoscience
(B). Nanotechnology
(C). Simulation
(D). Artificial intelligence (AI)
Right Answer: D

62. ____________ is data that has been organized or presented in a meaningful fashion.
(A). A process
(B). Software
(C). Storage
(D). Information
Right Answer: D

63. The name for the way that computers manipulate data into information is called:
(A). programming.
(B). processing.
(C). storing.
(D). organizing.
Right Answer: B

64. Computers gather data, which means that they allow users to ____________ data.
(A). present
(B). input
(C). output
(D). store
Right Answer: B

65. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
(A). data.
(B). output.
(C). input.
(D). the process.
Right Answer: B

66. Computers use the ____________ language to process data.
(A). processing
(B). kilobyte
(C). binary
(D). representational
Right Answer: C

67. Computers process data into information by working exclusively with:
(A). multimedia.
(B). words.
(C). characters.
(D). numbers.
Right Answer: D

68. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
(A). eight bytes.
(B). eight kilobytes.
(C). eight characters.
(D). eight bits.
Right Answer: D

69. The term bit is short for:
(A). megabyte.
(B). binary language.
(C). binary digit.
(D). binary number.
Right Answer: C

70. A string of eight 0s and 1s is called a:
(A). megabyte.
(B). byte.
(C). kilobyte.
(D). gigabyte.
Right Answer: B

71. A ____________ is approximately one billion bytes.
(A). kilobyte
(B). bit
(C). gigabyte
(D). megabyte
Right Answer: C

72. A ____________ is approximately a million bytes.
(A). gigabyte
(B). kilobyte
(C). megabyte
(D). terabyte
Right Answer: C

73. ____________ is any part of the computer that you can physically touch.
(A). Hardware
(B). A device
(C). A peripheral
(D). An application
Right Answer: A

74. The components that process data are located in the:
(A). input devices.
(B). output devices.
(C). system unit.
(D). storage component.
Right Answer: C

75. All of the following are examples of input devices EXCEPT a:
(A). scanner.
(B). mouse.
(C). keyboard.
(D). printer.
Right Answer: D

76. Which of the following is an example of an input device?
(A). scanner
(B). speaker
(C). CD
(D). printer
Right Answer: A

77. All of the following are examples of storage devices EXCEPT:
(A). hard disk drives.
(B). printers.
(C). floppy disk drives.
(D). CD drives.
Right Answer: B

78. The ____________, also called the �brains� of the computer, is responsible for processing data.
(A). motherboard
(B). memory
(C). RAM
(D). central processing unit (CPU)
Right Answer: D

79. The CPU and memory are located on the:
(A). expansion board.
(B). motherboard.
(C). storage device.
(D). output device.
Right Answer: B

80. Word processing, spreadsheet, and photo-editing are examples of:
(A). application software.
(B). system software.
(C). operating system software.
(D). platform software.
Right Answer: A

81. ____________ is a set of computer programs used on a computer to help perform tasks.
(A). An instruction
(B). Software
(C). Memory
(D). A processor
Right Answer: B

82. System software is the set of programs that enables your computer�s hardware devices and ____________ software to work together.
(A). management
(B). processing
(C). utility
(D). application
Right Answer: D

83. The PC (personal computer) and the Apple Macintosh are examples of two different:
(A). platforms.
(B). applications.
(C). programs.
(D). storage devices.
Right Answer: A

84. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
(A). languages
(B). methods
(C). CPUs
(D). storage devices
Right Answer: C

85. Servers are computers that provide resources to other computers connected to a:
(A). network.
(B). mainframe.
(C). supercomputer.
(D). client.
Right Answer: A

86. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
(A). supercomputers
(B). clients
(C). laptops
(D). mainframes
Right Answer: D

87. ____________ are specially designed computers that perform complex calculations extremely rapidly.
(A). Servers
(B). Supercomputers
(C). Laptops
(D). Mainframes
Right Answer: B

88. DSL is an example of a(n) ____________ connection.
(A). network
(B). wireless
(C). slow
(D). broadband
Right Answer: D

89. The difference between people with access to computers and the Internet and those without this access is known as the:
(A). digital divide.
(B). Internet divide.
(C). Web divide.
(D). broadband divide.
Right Answer: A

90. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
(A). Nanotechnology
(B). Micro-technology
(C). Computer forensics
(D). Artificial intelligence
Right Answer: A

91. Which of the following is the correct order of the four major functions of a computer?
(A). Process � Output � Input � Storage
(B). Input � Output� Process � Storage
(C). Process � Storage � Input � Output
(D). Input � Process � Output � Storage
Right Answer: D

92. ____________ bits equal one byte.
(A). Eight
(B). Two
(C). One thousand
(D). One million
Right Answer: A

93. The binary language consists of ____________ digit(s).
(A). 8
(B). 2
(C). 1,000
(D). 1
Right Answer: B

94. A byte can hold one ____________ of data.
(A). bit
(B). binary digit
(C). character
(D). kilobyte
Right Answer: C

95. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
(A). The platform
(B). The operating system
(C). Application software
(D). The motherboard
Right Answer: B

96. The operating system is the most common type of ____________ software.
(A). communication
(B). application
(C). system
(D). word-processing software
Right Answer: C

97. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
(A). Servers
(B). Embedded computers
(C). Robotic computers
(D). Mainframes
Right Answer: B

98. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
(A). instructions.
(B). the operating system.
(C). application software.
(D). the system unit.
Right Answer: A

99. The two broad categories of software are:
(A). word processing and spreadsheet.
(B). transaction and application.
(C). Windows and Mac OS.
(D). system and application.
Right Answer: D

100. The metal or plastic case that holds all the physical parts of the computer is the:
(A). system unit.
(B). CPU.
(C). mainframe.
(D). platform. 
Right Answer: A

101. Programs from the same developer , sold bundled together , that provide better integration and share common features , toolbars and menus are known as ….
(A). software suites
(B). integrated software packages
(C). software processing packages
(D). personal information managers
Right Answer: A

102. A data warehouse is which of the following ?
(A). Can be updated by the end users
(B). Contains numerous naming conventions and formats
(C). Organized around important subject areas
(D). Contains only current data
Right Answer: C

103. ______________ servers store and manages files for network users.
(A). Authentication
(B). Main
(C). Web
(D). File
Right Answer: D

104. All of the following are examples of real security and privacy risks Except _____
(A). hackers
(B). spam
(C). viruses
(D). identify theft
Right Answer: B

105. ___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems .
(A). Data
(B). Sales
(C). Query
(D). (Point-of-sale (POS)
Right Answer: B

106. The OSI model is divided into _______ processes called layers.
(A). five
(B). six
(C). seven
(D). eight
Right Answer: C

107. System software is the set of programs that enables your computer�s hardware devices and ______ software to work together.
(A). management
(B). processing
(C). utility
(D). application
Right Answer: D

108. ________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.
(A). Servers
(B). Embedded computers
(C). Robotic computers
(D). Mainframes
Right Answer: B

109. The following are all computing devices , except………
(A). notebook computers
(B). cellular telephones
(C). digital scanners
(D). personal digital assistants
Right Answer: C

110. in a ring topology , the the computer in possession of the ______ can trasmit data
(A). packet
(B). data
(C). access method
(D). token
Right Answer: D

111. This part of operating system manages the essential peripherals, such as the keyboard, screen , disk drives, and parallel and serial ports ____
(A). basic input/output system
(B). secondary input/output system
(C). peripheral input/output system
(D). marginal input/output system
Right Answer: A

112. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A). Trojan horse
(B). Boot sector
(C). Script
(D). Logic bomb
Right Answer: B

113. ________ controls the way in which the computer system functions and provides a meAns : by which users can interact with the computer
(A). The platform
(B). Application software
(C). Operating system
(D). The motherboard
Right Answer: C

114. Servers are computers that provide resources to other computers connected to a ___________
(A). mainframe
(B). network
(C). supercomputer
(D). client
Right Answer: B

115. A goal of data mining includes which of the following?
(A). To explain some observed event or condition
(B). To confirm that data exists
(C). To analyze data for expected relationships
(D). To create a new data warehouse
Right Answer: A

116. URL stands for……..
(A). Universal Research List
(B). Universal Resource List
(C). Uniform Resource Locator
(D). Uniform Research Locator
Right Answer: C

117. A database management system (DBMS) is a …………
(A). hardware system used to create , maintain and provide controlled access to a database
(B). hardware system used to create, maintain, and provide uncontrolled access to a database.
(C). software system used to create, maintain, and provide uncontrolled access to a database.
(D). software system used to create, maintain, and provide controlled access to a database.
Right Answer: D

118. Which of the following is NOT a goal of transaction processing system ?
(A). Capture , process and store transactions
(B). Produce a variety of documents related to routine business activities
(C). Reduce manual effort associated with processing business transactions
(D). Produce standard reports used for management decision making
Right Answer:

119. A Proxy server is used for which of the following?
(A). To provide security against unauthorized users
(B). To process client requests for web pages
(C). To process client requests for database access
(D). To provide TCP/IP
Right Answer: B

120. When data changes in multiple lists and all lists are not updated, this causes:
(A). data redundancy
(B). information overload
(C). duplicate data
(D). data inconsistency
Right Answer: D

121. _____________ are words that a programming language has set aside for its own use.
(A). Control worlds
(B). Reserved words
(C). Control structures
(D). Reserved keys
Right Answer: B

122. What is the primary difference between a virus and a worm?
(A). A worm has the ability to self-propagate from an infected user�s computer to other computers
(B). A worm is usually written by a cracker: Script bunnies do not have the skills to develop a worm program
(C). A virus is very harmful to the computers it infects : a worm is not a serious a problem
(D). Anti-virus software is effective in fighting viruses but not worms
Right Answer:

123. ______ describe what is database fields.
(A). Structures
(B). Field markers
(C). Field definition
(D). Field names
Right Answer: D

124. You must install a (n) ____________ on a network if you want to share a broadband Internet connection.
(A). router
(B). modem
(C). node
(D). cable
Right Answer: A

125. A goal of normalization is to __________
(A). minimize the number of relationships
(B). minimize the number of entities
(C). minimize the number of tables
(D). minimize the number of redundancy
Right Answer: D

126. Granting an outside organization access to internet web pages is often implemented using a (n) ____
(A). extranet
(B). intranet
(C). internet
(D). hacker
Right Answer: A

127. Which term identifies a specific computer on the web and the main page of the entire site
(A). URL
(B). Web site address
(C). Hyperlink
(D). Domain name
Right Answer: A

128. The code that relational database management systems use to perform their database task is referred to as …
(A). QBE
(B). SQL
(C). OLAP
(D). Sequel Server
Right Answer: B

129. Chip is a common nickname for a (n):
(A). transistor
(B). resistor
(C). integrated circuit
(D). semiconductor
Right Answer: C

130. The purpose of the primary key in a database is to:
(A). unlock the database
(B). provide a map of the data
(C). uniquely identify a record
(D). establish constraints on database operations.
Right Answer: B

131. A _________ contains specific rules and words that express the logical steps of an algorithm.
(A). programming language
(B). syntax
(C). programming structure
(D). logic chart
Right Answer:

132. The design of the network is called the network:
(A). architecture
(B). server
(C). transmission
(D). type
Right Answer: A

133. The most frequently used instructions of a computer program are likely to be fetched from:
(A). the hard disk
(B). cache memory
(C). RAM
(D). registers
Right Answer: B

134. The ____________ contains data descriptions and defines the name, data type, and length of each field in the database.
(A). data dictionary
(B). data table
(C). data record
(D). data field
Right Answer: A

135. Personal logs or journal entries posted on the Web are known as:
(A). listservs
(B). Webcasts
(C). blogs
(D). subject directories
Right Answer: C

136. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.
(A). command � based user interface
(B). GUI
(C). system utility
(D). API
Right Answer: B

137. The _____ manual tells you how to use a software program.
(A). documentation
(B). programming
(C). technical
(D). user
Right Answer:

138. Which of the following is NOT a type of broadband Internet connection?
(A). Cable
(B). DSL
(C). Dial-up
(D). Satellite
Right Answer: C

139. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
(A). spyware
(B). adware
(C). spam
(D). malware
Right Answer: D

140. Making a field ______ meAns : that it cannot be left blank.
(A). numeric
(B). required
(C). calculated
(D). validated
Right Answer: B

141. _________ is the process of finding errors in software code.
(A). Debugging
(B). Compiling
(C). Testing
(D). Running
Right Answer:

142. ____________ are viruses that are triggered by the passage of time or on a certain date.
(A). Boot-sector viruses
(B). Macro viruses
(C). Time bombs
(D). Worms
Right Answer: C

143. Linux is a (n) ____________ operating system.
(A). open-source
(B). Microsoft
(C). Windows
(D). Mac
Right Answer: A

144. What is a backup?
(A). Restoring the information backup
(B). An exact copy of a system�s information
(C). The ability to get a system up and running in the event of a system crash or failure
(D). All of these
Right Answer: D

145. Which of the following places the common data elements in order from smallest to largest
(A). character, file, record, field, database
(B). character, record, field, database, file
(C). character, field, record, file, database
(D). Bit, byte, character, record, field, file, database,
Right Answer: C

146. The internet is ��
(A). a large network of networks
(B). an internal communication system for a business
(C). a communication system for the Indian government
(D). All of these
Right Answer: D

147. ____________ are lists of commands that appear on the screen.
(A). GUIs
(B). Icons
(C). Menus
(D). Windows
Right Answer: C

148. Which of the following statements is FALSE concerning file names?
(A). Files may share the same name or the same extension but not both
(B). Every file in the same folder must have a unique name
(C). File extension is another name for file type
(D). The file extension comes before the dot (.) followed by the file name
Right Answer: D

149. Verification of a login name and password is known as:
(A). configuration
(B). accessibility
(C). authentication
(D). logging in
Right Answer: C

150. Which of the following would most likely NOT be a symptom of a virus?
(A). Existing program files and icons disappear.
(B). The CD-ROM stops functioning.
(C). The Web browser opens to an unusual home page.
(D). Odd messages or images are displayed on the screen.
Right Answer: B



www.haminpur.com

Disclaimer : We try to provide free and accurate information.
However, we are not liable to any type of mistake that may arise due to the results provided by this portal.

Privacy : We do not share any submitted information to other purposes.