Right Answer: D
67. A collection of related files is called a
(A). character
(B). field
(C). database
(D). adjusting
Right Answer: C
68. Storage that retains its data after the power is turned off is referred to as
(A). volatile storage
(B). non-volatile storage
(C). sequential storage
(D). direct storage
Right Answer: B
69. Which of the following is an example of connectivity?
(A). Internet
(B). floppy disk
(C). power card
(D). data
Right Answer: A
70. .. is the process of finding errors in software code.
(A). Compiling
(B). Testing
(C). Running
(D). Debugging
Right Answer: B
71. Which of the following is a part of CPU
(A). ALU
(B). keyboard
(C). mouse
(D). printer
Right Answer: A
72. FTP stands for
(A). file transfer protocol
(B). file translate protocol
(C). file typing protocol
(D). file transit protocol
Right Answer: A
73. Data going into the computer called
(A). output
(B). algorithm
(C). input
(D). calculation
Right Answer: C
74. Microsoft is a
(A). shareware
(B). an application suit
(C). public domain software
(D). market application
Right Answer: B
75. Information travels between components on the mother board through
(A). flash memory
(B). CMOS
(C). cables
(D). buses
Right Answer:
76. This is a standard way for a Web server to pass a Web user s request to an application program and to receive data back to forward to the user
(A). Interrupt request
(B). Forward DNS lookup
(C). Data-Link layer
(D). Common gateway interface
Right Answer: D
77. Three SQL, DDL, CREATE commands are
(A). Schema, Base and Table
(B). Base, Table and Schema
(C). Key, Base and Table
(D). Schema, Table and View
Right Answer: D
78. A passive threat to computer security is
(A). Malicious Intent
(B). Sabotage
(C). Accident Errors
(D). Espionage Agents
Right Answer: A
79. Two program of worm are
(A). grappling hook program
(B). main program
(C). both A and B
(D). external memory
Right Answer: C
80. ..allows wireless mobile devices to access the Internet and its services such as the Web and e-mail.
(A). TCP/IP
(B). Ethernet
(C). WAP
(D). Token ring
Right Answer: C
81. Grouping and processing all of a firm s transactions at one time is called
(A). a database management system
(B). batch processing
(C). a real-time system
(D). an on-line system
Right Answer: B
82. The ..enables you to simultaneously keep multiple Web pages open in one browser window.
(A). tab box
(B). pop-up helper
(C). tab row
(D). address bar
Right Answer: C
83. Which ports connect special types of music instruments to sound cards ?
(A). BUS
(B). CPU
(C). USB
(D). MIDI
Right Answer: C
84. You can ..a search by providing more information the search engine can use to select a smaller, more useful set of results.
(A). refine
(B). expand
(C). load
(D). query
Right Answer: A
85. What is the permanent memory built into your computer called ?
(A). RAM
(B). Floppy
(C). CPU
(D). ROM
Right Answer: D
86. What menu is selected to cut, copy and paste?
(A). File
(B). Tools
(C). Special
(D). Edit
Right Answer: D
87. The most important or powerful computer in a typical network is
(A). desktop
(B). network client
(C). network server
(D). network station
Right Answer: C
88. The primary purpose of software is to turn data into
(A). Web sites
(B). information
(C). programs
(D). objects
Right Answer: B
89. The ability to find an individual item in a file immediately .. is used.
(A). file allocation table
(B). directory
(C). sequential access
(D). direct access
Right Answer: C
90. To make a notebook act as a desktop model, the notebook can be connected to a .. which is connected to a monitor-and other devices.
(A). bay
(B). docking station
(C). port
(D). network
Right Answer: B
91. What digit are representatives of all binary numbers
(A). 0
(B). 1
(C). Both A and B
(D). 3
Right Answer: D
92. Who is the father of computer?
(A). Douglas
(B). Abacus
(C). Charles Babbage
(D). John
Right Answer: C
93. The function of the key F5 in window is
(A). to repeat the last action
(B). open font box,
(C). refresh window
(D). minimize window
Right Answer: C
94. Shortcut key to print document is
(A). Ctrl+F2
(B). Ctrl+E
(C). Ctrl + P
(D). Ctrl+ Z
Right Answer: C
95. CD-ROM stands for
(A). compact disk read only memory
(B). compactable disk read only memory
(C). compactable read only memory
(D). compact data read only memory
Right Answer: A
96. The ..converts digital signals to analog signals for the purpose of transmitting data over telephone lines.
(A). Modem
(B). Router
(C). Gateway
(D). Bridge
Right Answer: A
97. Before a package can be used in a java program it must be
(A). executed
(B). referenced
(C). imported
(D). declared
Right Answer: C
98. Boot strap or vector is called
(A). grappling hook program
(B). main program
(C). secondary program
(D). primary storage
Right Answer: A
99. Programming language built into user programs such as Word and Excel are known as
(A). 4GLs
(B). macro languages
(C). object-oriented languages
(D). visual programming languages
Right Answer: D
100. Firewalls are used to protect against
(A). Unauthorized Attacks
(B). Virus Attacks
(C). Data Driven Attacks
(D). Fire Attacks
Right Answer: A
101. Help Menu is available at which button ?
(A). End
(B). Start
(C). Turnoff
(D). Restart
Right Answer: B
102. The contents of ..are lost when the computer turns off.
(A). storage
(B). input
(C). output
(D). memory
Right Answer: D
103. When you save to this, your data will remain intact even when the computer is turned off
(A). RAM
(B). Motherboard
(C). Secondary storage device
(D). Primary storage device
Right Answer: C
104. A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a(n)
(A). super computer
(B). minicomputer
(C). laptop
(D). server
Right Answer: D
105. The ..folder retains copies of messages that you have started but are not yet ready to send.
(A). Drafts
(B). Outbox
(C). Address Book
(D). Sent Items
Right Answer: B
106. Granting an outside organization access to internet web pages is often implemented using a(n)
(A). extranet
(B). intranet
(C). internet
(D). hacker
Right Answer: A
107. Which term identifies a specific computer on the web and the main page of the entire site?
(A). URL
(B). Web site address
(C). Hyperlink
(D). Domain name
Right Answer: A
108. The code that relational database management systems use to perform their database task is referred to as
(A). QBE
(B). SQL
(C). OLAP
(D). Sequel Server
Right Answer: B
109. Chip is a common nickname for a(n)
(A). transistor
(B). resistor
(C). integrated circuit
(D). semiconductor
Right Answer: C
110. Programs such as Internet Explorer that serve as navigable windows into the Web are called
(A). Hypertext
(B). Networks
(C). Internet
(D). Web browsers
Right Answer: D
111. The language that the computer can understand and execute is called
(A). machine language
(B). application software
(C). system program
(D). none of these
Right Answer: A
112. Which of the following is not hardware
(A). magnetic tape
(B). printer
(C). VDU terminal
(D). assembler
Right Answer: D
113. Pick out the wrong definition
(A). COBOL a language used for business data processing
(B). CPU is the brain of computer
(C). LAN is used in local areas
(D). FORTRAN is used for logical processing
Right Answer: D
114. Which of the following is not as language for computer programming
(A). Windows
(B). PASCAL
(C). BASIC
(D). COBOL
Right Answer: A
115. What are the basic types of memory that your computer uses
(A). RAM
(B). RW/RAM
(C). ROM
(D). both A and C
Right Answer: D
116. The total set of interlinked hypertext documents worldwide is
(A). HTTP
(B). Browser
(C). WWW
(D). B2B
Right Answer: A
117. With the object-oriented (OO) approach, an object encapsulates, or ..a programmer.
(A). carries out, the details of an object for
(B). hides, the details of an object from
(C). reveals, the details of an object to
(D). extends, the details of an object beyond
Right Answer: B
118. Every computer connected to an intranet or extranet must have a distinct
(A). firewall
(B). proxy server
(C). IP address
(D). domain name
Right Answer: C
119. A table of bits in which each row represents the distinct values of a key?
(A). Join index
(B). Bitmap index
(C). B + Tree
(D). Hierarchical index
Right Answer: B
120. The degree of detail that should be incorporated into a database depends on what?
(A). Data integrity
(B). The type of database
(C). The user s perspective
(D). The business practices and Policies
Right Answer: B
121. Lowest level of security system is
(A). A
(B). B
(C). C
(D). D
Right Answer: C
122. A DVD is an example of a(n)
(A). hard disk
(B). optical disc
(C). output device
(D). solid-state storage device
Right Answer: B
123. The default view in Excel is ..view.
(A). Work
(B). Auto
(C). Normal
(D). Roman
Right Answer: C
124. The process of transferring files from a computer on the Internet to your computer is called
(A). downloading
(B). uploading
(C). FTP
(D). JPEC
Right Answer: A
125. ..is the process of dividing the disk into tracks and sectors.
(A). Tracking
(B). Formatting
(C). Crashing
(D). Allotting
Right Answer: B
126. .. are words that a programming language has set aside for its own use
(A). Control words
(B). Reserved words
(C). Control structures
(D). Reserved keys
Right Answer: B
127. The most frequently used instructions of a computer program are likely to be fetched from
(A). the hard disk
(B). cache memory
(C). RAM
(D). registers
Right Answer: B
128. What is the shortcut key to Undo the last action in a document?
(A). Ctrl + X
(B). Ctrl + y
(C). Ctrl + Z
(D). Ctrl + U
Right Answer: C
129. You must install a(n) .. on a network if you want to share a broadband Internet connection.
(A). router
(B). modem
(C). node
(D). cable
Right Answer: A
130. The errors that can be pointed out by the compiler are
(A). Syntax errors
(B). Semantic errors
(C). Logic errors
(D). System errors
Right Answer: A
131. Modem stands for
(A). type of secondary memory
(B). modulator demodulator
(C). mainframe operating device memory
(D). none of these
Right Answer: B
132. Operating system is
(A). a collection of hardware components
(B). a collection of input-output devices
(C). a collection of software routines
(D). none of the above
Right Answer: C
133. Execution of two or more programs by a single CPU is know as
(A). multiprocessing
(B). time sharing
(C). multiprogramming
(D). none of these
Right Answer: C
134. Which of the following dose not represent on I/O device?
(A). speaker with beep
(B). joystick
(C). ALU
(D). scanner
Right Answer: C
135. Memories which can be read only are called ..memories.
(A). RAM
(B). ROM
(C). PROM
(D). EPROM
Right Answer: B
136. A result of a computer virus can NOT lead to
(A). Disk Crash
(B). Mother Board Crash
(C). Corruption of program
(D). Deletion of files
Right Answer: B
137. The network interface card of LAN is related to following layer of OSI Model
(A). Transport
(B). Network
(C). Data Link
(D). All of these
Right Answer: D
138. Which of the following does NOT describe a data warehouse?
(A). Subject-oriented
(B). Integrated
(C). Time-variant
(D). Updateable
Right Answer: D
139. Which of the following is TRUE ?
(A). Logical design is software-dependent
(B). In a distributed database, database is stored in one physical location
(C). Conceptual design translates the logical design into internal model
(D). Logical design is software independent
Right Answer: A
140. A range check
(A). ensures that only the correct data type is entered into a field
(B). verifies that all required data is present
(C). determines whether a number is within a specified limit
(D). tests if the data in two or more associated fields is logical
Right Answer: C
141. A person who used his or her expertise to gain access to other people s computers to get information illegally or do damage is a
(A). hacker
(B). analyst
(C). instant messenger
(D). programmer
Right Answer: A
142. To access properties, of an object, the mouse technique to use is
(A). dragging
(B). dropping
(C). right-clicking
(D). shift-clicking
Right Answer: C
143. To change selected text to all capital letters, click the change case button, then click
(A). UPPERCASE
(B). UPPER ALL
(C). CAPS LOCK
(D). Lock Upper
Right Answer: A
144. The basic unit of a worksheet into which you enter data in Excel is called a
(A). tab
(B). cell
(C). box
(D). range
Right Answer: B
145. You can keep your personal files / folders in
(A). My folder
(B). My Documents
(C). My Files
(D). My Text
Right Answer: B
146. URL stands for
(A). Universal Research List
(B). Universal Resource List
(C). Uniform Resource Locator
(D). Uniform Research Locator
Right Answer: C
147. NT classifies
(A). container objects
(B). non container objects
(C). both A and B
(D). display objects
Right Answer: A
148. The design of the network is called the network
(A). architecture
(B). server
(C). transmission
(D). type
Right Answer: A
149. A Proxy server is used for which of the following
(A). To provide security against unauthorized users
(B). To process client requests for web pages
(C). To provide TCP/IP
(D). To process client requests for database access
Right Answer: B
150. When data changes in multiple lists and all lists are not updated, this causes
(A). data redundancy
(B). information overload
(C). duplicate data
(D). data inconsistency
Right Answer: D
www.haminpur.com
Disclaimer : We try to provide free and accurate information.
However, we are not liable to any type of mistake that may arise due to the results provided by this portal.
Privacy : We do not share any submitted information to other purposes.