Logo
 

HTET Solved Question Paper haminpur.com


1. In Excel .. allows users to bring together copies of work-books that other users have worked on independently.
(A). Copying
(B). Merging
(C). Pasting
(D). Compiling
Right Answer: B

2. Which of the following are advantages of CD-ROM as a storage media?
(A). CD-ROM is an inexpensive way to store large, amount of data and information
(B). CD-ROM disks retrieve data and information more quickly than magnetic disks do
(C). CD-ROMs make less errors than magnetic media
(D). An of the above
Right Answer: D

3. Technology no longer protected by copy-right, available to everyone is considered to be
(A). proprietary
(B). open
(C). experimental
(D). in the public domain
Right Answer: A

4. A typical modem computer uses
(A). Magnetic cores
(B). LSI chips
(C). Magnetic tapes
(D). More then 1000 vacuum tubes
Right Answer:

5. ALU is called for .. of a computer
(A). Heart
(B). Master dispatcher
(C). Primary memory
(D). All of the above
Right Answer: C

6. EPROM consist of
(A). bipolar transistors
(B). MOSFETs
(C). UJTs
(D). diodes
Right Answer: D

7. Popular application of flip-flop are
(A). counters
(B). shift registers
(C). transfer registers
(D). all of these
Right Answer: C

8. Register is a
(A). set of capacitor used to register input instruction in a digital computer
(B). set to paper tapes and cards put in a file
(C). temporary storage unit within the CPU having dedicated or general purpose use
(D). part of the auxiliary memory
Right Answer: B

9. A simple flip-flop
(A). is 2 bit memory
(B). is 1 bit memory
(C). is a four state device
(D). has nothing to do with memory
Right Answer: B

10. A 4-bit shift register cab be made by using
(A). 3 JK flip-flop
(B). 4 JK flip-flop
(C). 5 JK flip-flop
(D). 8 JK flip-flop
Right Answer: C

11. After a picture has been taken with a digital camera and processed appropriately,the actual print of the picture is considered
(A). data
(B). output
(C). input
(D). the process
Right Answer: B

12. Computers use the ..language to process data.
(A). processing
(B). kilobyte
(C). binary
(D). representational
Right Answer: C

13. The term bit is short for
(A). megabyte
(B). binary language
(C). binary digit
(D). binary number
Right Answer: C

14. A string of eight 0s and 1s is called a
(A). megabyte
(B). byte
(C). kilobyte
(D). gigabyte
Right Answer: B

15. ..is any part of the computer that you can physically touch.
(A). Hardware
(B). A device
(C). A peripheral
(D). An application.
Right Answer: B

16. Trojan Horse
(A). a code segment that misuses its file is called Trojan horse
(B). good for filing accessing
(C). both A and B
(D). none of these
Right Answer:

17. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is
(A). Bridge
(B). Gateway
(C). Router
(D). Modem
Right Answer: B

18. Which of the following is a general-purpose programming language, designed by Sun Microsystems, and well suited for use on the Web?
(A). VB Script
(B). Java Script
(C). CSS
(D). Java
Right Answer: B

19. This ..tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.
(A). Client
(B). Applications/Web server
(C). Enterprise server
(D). DBA
Right Answer: A

20. RSA is
(A). Symmetric Cryptosystem
(B). Asymmetric Cryptosystem
(C). Block Cypher
(D). Digital Signature
Right Answer: D

21. .. are words that a programming language has set aside for its own use.
(A). Control words
(B). Control structures
(C). Reserved words
(D). Reserved keys
Right Answer: C

22. Mobile Commerce is best described as
(A). The use of Kiosks in marketing
(B). Transporting products
(C). Buying and selling goods/services through wireless handheld devices.
(D). Using notebook PC s in marketing
Right Answer: C

23. Which of, the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information
(A). floppy diskette
(B). hard disk
(C). permanent disk
(D). optical disk
Right Answer: B

24. The computer abbreviation KB usually means
(A). Key Block
(B). Kernel Boot
(C). Kilo Byte
(D). Kit Bit
Right Answer: C

25. What is the process of copying software programs from secondary storage media to the hard disk called?
(A). Configuration
(B). Download
(C). Storage
(D). Upload
Right Answer: D

26. To move to the beginning of a line of text, press the .. key.
(A). home
(B). a
(C). page up
(D). enter
Right Answer: A

27. When sending an e-mail, the .. line describes the contents of the message.
(A). to
(B). subject
(C). contents
(D). CC
Right Answer:

28. Which groupings do you work with when formatting text in Word
(A). Tables, paragraphs and indexes
(B). Paragraphs, indexes and sections
(C). Characters, sections and paragraphs
(D). Indexes, characters and tables
Right Answer: A

29. Which of the following is the largest unit of storage?
(A). GB
(B). KB
(C). MB
(D). TB
Right Answer: A

30. The .. tells the computer how to use its components.
(A). utility
(B). network
(C). operating system
(D). application program
Right Answer: C

31. COBOL is widely used in ..applications.
(A). Commercial
(B). Scientific
(C). Splice
(D). Mathematical
Right Answer: A

32. 1 Byte = ?
(A). 8 bits
(B). 4 bits
(C). 2 bits
(D). 9 bits
Right Answer: A

33. Which of the following is NOT one of the four major data processing functions of a computer?
(A). gathering data
(B). processing data into information
(C). analyzing the data or information
(D). storing the data or information
Right Answer: A

34. ..is data that has been organized or presented in a meaningful fashion.
(A). A process
(B). Software
(C). Storage
(D). Information
Right Answer: D

35. Computers gather data, which means that they allow users to ..data.
(A). present
(B). input
(C). output
(D). store
Right Answer: B

36. Worm was made up
(A). one program
(B). two programs
(C). three program
(D). all of the above
Right Answer: A

37. Trap door
(A). could be included in a compiler
(B). pose a difficult problem because, detect them
(C). both A and B
(D). none of these
Right Answer: B

38. Which is NOT a good Web security strategy?
(A). Restrict access to the Web server keep a minimum number of ports open
(B). Limit the users who can load software, edit or add files.
(C). Add demo programs, so users can test system without accessing production data.
(D). Remove unnecessary compilers and interpreters.
Right Answer: D

39. The altering of data so that it is not usable unless the changes are undone is
(A). Biometrics
(B). Compression
(C). Encryption
(D). Ergonomics
Right Answer: C

40. The word FIP stands for
(A). File Translate Protocol
(B). File Transit Protocol
(C). File Typing Protocol
(D). File-Transfer Protocol
Right Answer: C

41. This first step in the transaction processing cycle captures business data through various modes such as optical scanning or at an electronic commerce website
(A). Document and report generation
(B). Database maintenance
(C). Transaction processing startup
(D). Data Entry
Right Answer: D

42. A(n) .. is a special visual and audio effect applied in Power-point to text or content.
(A). animation
(B). flash
(C). wipe
(D). dissolve
Right Answer: A

43. When the pointer is positioned on a .. it is shaped like a hand.
(A). grammar error
(B). Formatting error
(C). Screen Tip
(D). hyperlink
Right Answer: D

44. Personal computers can be connected together to form a
(A). server
(B). supercomputer
(C). network
(D). enterprise
Right Answer: C

45. A .. is the term used when a search engine returns a Web page that matches the search criteria.
(A). blog
(B). hit
(C). link
(D). success
Right Answer: D

46. A .. contains specific rules and words that express the logical steps of an algorithm.
(A). syntax
(B). programming structure
(C). programming language
(D). logic chart
Right Answer: A

47. Changing an existing document is called .. the document.
(A). creating
(B). editing
(C). modifying
(D). adjusting
Right Answer: B

48. Virtual memory is
(A). memory on the hard disk that the CPU uses an extended RAM
(B). in RAM
(C). only necessary if you do not have any RAM in your computer
(D). aback up device for floppy disks
Right Answer: A

49. Computers use the number system to store data and perform calculations.
(A). decimal
(B). hexadecimal
(C). octal
(D). binary
Right Answer: D

50. The .. key will launch the start buttons.
(A). esc
(B). shift
(C). windows
(D). shortcut
Right Answer: C

51. Blinking symbol on the computer screen is called
(A). mouse
(B). logo
(C). cursor
(D). hand
Right Answer: C

52. Examples of output device
(A). screen
(B). printer
(C). speaker
(D). all of these
Right Answer: D

53. IBM stands for
(A). Internal Business Management
(B). International Business Management
(C). International Business Machine
(D). Internal Business Machine
Right Answer: C

54. BIOS stands for
(A). basic input output system
(B). binary input output system
(C). basic input off system
(D). all the above
Right Answer: A

55. DOS stands for
(A). Disk Operating System
(B). Disk operating session
(C). Digital Operating System
(D). Digital Open system
Right Answer: A

56. DOS floppy disk does not have
(A). A Boot Record
(B). A File Allocation Table
(C). A Root Directory
(D). Virtual Memory
Right Answer: D

57. MICR technology used for clearance of cheques by banks refers to
(A). Magnetic Ink Character Recognition
(B). Magnetic Intelligence Character Recognition
(C). Magnetic Information Cable Recognition
(D). Magnetic Insurance Cases Recognition
Right Answer: A

58. All the information collected during database development is stored in a
(A). repository
(B). data warehouse
(C). RAD
(D). CASE
Right Answer: B

59. The ..Component is used by the data analyst to create the queries that access the database.
(A). data extraction
(B). end-user query tool
(C). end-.user presentation tool
(D). data store
Right Answer: C

60. A(n) ..allows network users to share a single copy of software, which resides on the network server.
(A). single-user license agreement
(B). network site license
(C). end-user license agreement
(D). business software license
Right Answer: B

61. What displays the contents of the active cell in Excel ?
(A). Name box
(B). Row Headings
(C). Formula bar
(D). Task pane
Right Answer: A

62. The piece of hardware that converts your computer s digital signal to an analog signal that can travel over telephone lines is called a
(A). red wire
(B). blue cord
(C). tower
(D). modem
Right Answer: D

63. Video processors consist of ..and ..which store and process images.
(A). CPU and VGA
(B). CPU and memory
(C). VGA and memory
(D). VGI and DVI
Right Answer: C

64. If you want to connect to your own computer through the Internet from another location, you can use
(A). e-mail
(B). FTP
(C). instant message
(D). Telnet
Right Answer:

65. To reload a Web page, press the .. button.
(A). Redo
(B). Reload
(C). Restore
(D). Refresh
Right Answer: D

66. You can use the tab key to
(A). move cursor across the screen
(B). indent a paragraph
(C). move the cursor down the screen
(D). Only A and B


Right Answer: D

67. A collection of related files is called a
(A). character
(B). field
(C). database
(D). adjusting
Right Answer: C

68. Storage that retains its data after the power is turned off is referred to as
(A). volatile storage
(B). non-volatile storage
(C). sequential storage
(D). direct storage
Right Answer: B

69. Which of the following is an example of connectivity?
(A). Internet
(B). floppy disk
(C). power card
(D). data
Right Answer: A

70. .. is the process of finding errors in software code.
(A). Compiling
(B). Testing
(C). Running
(D). Debugging
Right Answer: B

71. Which of the following is a part of CPU
(A). ALU
(B). keyboard
(C). mouse
(D). printer
Right Answer: A

72. FTP stands for
(A). file transfer protocol
(B). file translate protocol
(C). file typing protocol
(D). file transit protocol
Right Answer: A

73. Data going into the computer called
(A). output
(B). algorithm
(C). input
(D). calculation
Right Answer: C

74. Microsoft is a
(A). shareware
(B). an application suit
(C). public domain software
(D). market application
Right Answer: B

75. Information travels between components on the mother board through
(A). flash memory
(B). CMOS
(C). cables
(D). buses
Right Answer:

76. This is a standard way for a Web server to pass a Web user s request to an application program and to receive data back to forward to the user
(A). Interrupt request
(B). Forward DNS lookup
(C). Data-Link layer
(D). Common gateway interface
Right Answer: D

77. Three SQL, DDL, CREATE commands are
(A). Schema, Base and Table
(B). Base, Table and Schema
(C). Key, Base and Table
(D). Schema, Table and View
Right Answer: D

78. A passive threat to computer security is
(A). Malicious Intent
(B). Sabotage
(C). Accident Errors
(D). Espionage Agents
Right Answer: A

79. Two program of worm are
(A). grappling hook program
(B). main program
(C). both A and B
(D). external memory
Right Answer: C

80. ..allows wireless mobile devices to access the Internet and its services such as the Web and e-mail.
(A). TCP/IP
(B). Ethernet
(C). WAP
(D). Token ring
Right Answer: C

81. Grouping and processing all of a firm s transactions at one time is called
(A). a database management system
(B). batch processing
(C). a real-time system
(D). an on-line system
Right Answer: B

82. The ..enables you to simultaneously keep multiple Web pages open in one browser window.
(A). tab box
(B). pop-up helper
(C). tab row
(D). address bar
Right Answer: C

83. Which ports connect special types of music instruments to sound cards ?
(A). BUS
(B). CPU
(C). USB
(D). MIDI
Right Answer: C

84. You can ..a search by providing more information the search engine can use to select a smaller, more useful set of results.
(A). refine
(B). expand
(C). load
(D). query
Right Answer: A

85. What is the permanent memory built into your computer called ?
(A). RAM
(B). Floppy
(C). CPU
(D). ROM
Right Answer: D

86. What menu is selected to cut, copy and paste?
(A). File
(B). Tools
(C). Special
(D). Edit
Right Answer: D

87. The most important or powerful computer in a typical network is
(A). desktop
(B). network client
(C). network server
(D). network station
Right Answer: C

88. The primary purpose of software is to turn data into
(A). Web sites
(B). information
(C). programs
(D). objects
Right Answer: B

89. The ability to find an individual item in a file immediately .. is used.
(A). file allocation table
(B). directory
(C). sequential access
(D). direct access
Right Answer: C

90. To make a notebook act as a desktop model, the notebook can be connected to a .. which is connected to a monitor-and other devices.
(A). bay
(B). docking station
(C). port
(D). network
Right Answer: B

91. What digit are representatives of all binary numbers
(A). 0
(B). 1
(C). Both A and B
(D). 3
Right Answer: D

92. Who is the father of computer?
(A). Douglas
(B). Abacus
(C). Charles Babbage
(D). John
Right Answer: C

93. The function of the key F5 in window is
(A). to repeat the last action
(B). open font box,
(C). refresh window
(D). minimize window
Right Answer: C

94. Shortcut key to print document is
(A). Ctrl+F2
(B). Ctrl+E
(C). Ctrl + P
(D). Ctrl+ Z
Right Answer: C

95. CD-ROM stands for
(A). compact disk read only memory
(B). compactable disk read only memory
(C). compactable read only memory
(D). compact data read only memory
Right Answer: A

96. The ..converts digital signals to analog signals for the purpose of transmitting data over telephone lines.
(A). Modem
(B). Router
(C). Gateway
(D). Bridge
Right Answer: A

97. Before a package can be used in a java program it must be
(A). executed
(B). referenced
(C). imported
(D). declared
Right Answer: C

98. Boot strap or vector is called
(A). grappling hook program
(B). main program
(C). secondary program
(D). primary storage
Right Answer: A

99. Programming language built into user programs such as Word and Excel are known as
(A). 4GLs
(B). macro languages
(C). object-oriented languages
(D). visual programming languages
Right Answer: D

100. Firewalls are used to protect against
(A). Unauthorized Attacks
(B). Virus Attacks
(C). Data Driven Attacks
(D). Fire Attacks
Right Answer: A

101. Help Menu is available at which button ?
(A). End
(B). Start
(C). Turnoff
(D). Restart
Right Answer: B

102. The contents of ..are lost when the computer turns off.
(A). storage
(B). input
(C). output
(D). memory
Right Answer: D

103. When you save to this, your data will remain intact even when the computer is turned off
(A). RAM
(B). Motherboard
(C). Secondary storage device
(D). Primary storage device
Right Answer: C

104. A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a(n)
(A). super computer
(B). minicomputer
(C). laptop
(D). server
Right Answer: D

105. The ..folder retains copies of messages that you have started but are not yet ready to send.
(A). Drafts
(B). Outbox
(C). Address Book
(D). Sent Items
Right Answer: B

106. Granting an outside organization access to internet web pages is often implemented using a(n)
(A). extranet
(B). intranet
(C). internet
(D). hacker
Right Answer: A

107. Which term identifies a specific computer on the web and the main page of the entire site?
(A). URL
(B). Web site address
(C). Hyperlink
(D). Domain name
Right Answer: A

108. The code that relational database management systems use to perform their database task is referred to as
(A). QBE
(B). SQL
(C). OLAP
(D). Sequel Server
Right Answer: B

109. Chip is a common nickname for a(n)
(A). transistor
(B). resistor
(C). integrated circuit
(D). semiconductor
Right Answer: C

110. Programs such as Internet Explorer that serve as navigable windows into the Web are called
(A). Hypertext
(B). Networks
(C). Internet
(D). Web browsers
Right Answer: D

111. The language that the computer can understand and execute is called
(A). machine language
(B). application software
(C). system program
(D). none of these
Right Answer: A

112. Which of the following is not hardware
(A). magnetic tape
(B). printer
(C). VDU terminal
(D). assembler
Right Answer: D

113. Pick out the wrong definition
(A). COBOL a language used for business data processing
(B). CPU is the brain of computer
(C). LAN is used in local areas
(D). FORTRAN is used for logical processing
Right Answer: D

114. Which of the following is not as language for computer programming
(A). Windows
(B). PASCAL
(C). BASIC
(D). COBOL
Right Answer: A

115. What are the basic types of memory that your computer uses
(A). RAM
(B). RW/RAM
(C). ROM
(D). both A and C
Right Answer: D

116. The total set of interlinked hypertext documents worldwide is
(A). HTTP
(B). Browser
(C). WWW
(D). B2B
Right Answer: A

117. With the object-oriented (OO) approach, an object encapsulates, or ..a programmer.
(A). carries out, the details of an object for
(B). hides, the details of an object from
(C). reveals, the details of an object to
(D). extends, the details of an object beyond
Right Answer: B

118. Every computer connected to an intranet or extranet must have a distinct
(A). firewall
(B). proxy server
(C). IP address
(D). domain name
Right Answer: C

119. A table of bits in which each row represents the distinct values of a key?
(A). Join index
(B). Bitmap index
(C). B + Tree
(D). Hierarchical index
Right Answer: B

120. The degree of detail that should be incorporated into a database depends on what?
(A). Data integrity
(B). The type of database
(C). The user s perspective
(D). The business practices and Policies
Right Answer: B

121. Lowest level of security system is
(A). A
(B). B
(C). C
(D). D
Right Answer: C

122. A DVD is an example of a(n)
(A). hard disk
(B). optical disc
(C). output device
(D). solid-state storage device
Right Answer: B

123. The default view in Excel is ..view.
(A). Work
(B). Auto
(C). Normal
(D). Roman
Right Answer: C

124. The process of transferring files from a computer on the Internet to your computer is called
(A). downloading
(B). uploading
(C). FTP
(D). JPEC
Right Answer: A

125. ..is the process of dividing the disk into tracks and sectors.
(A). Tracking
(B). Formatting
(C). Crashing
(D). Allotting
Right Answer: B

126. .. are words that a programming language has set aside for its own use
(A). Control words
(B). Reserved words
(C). Control structures
(D). Reserved keys
Right Answer: B

127. The most frequently used instructions of a computer program are likely to be fetched from
(A). the hard disk
(B). cache memory
(C). RAM
(D). registers
Right Answer: B

128. What is the shortcut key to Undo the last action in a document?
(A). Ctrl + X
(B). Ctrl + y
(C). Ctrl + Z
(D). Ctrl + U
Right Answer: C

129. You must install a(n) .. on a network if you want to share a broadband Internet connection.
(A). router
(B). modem
(C). node
(D). cable
Right Answer: A

130. The errors that can be pointed out by the compiler are
(A). Syntax errors
(B). Semantic errors
(C). Logic errors
(D). System errors
Right Answer: A

131. Modem stands for
(A). type of secondary memory
(B). modulator demodulator
(C). mainframe operating device memory
(D). none of these
Right Answer: B

132. Operating system is
(A). a collection of hardware components
(B). a collection of input-output devices
(C). a collection of software routines
(D). none of the above
Right Answer: C

133. Execution of two or more programs by a single CPU is know as
(A). multiprocessing
(B). time sharing
(C). multiprogramming
(D). none of these
Right Answer: C

134. Which of the following dose not represent on I/O device?
(A). speaker with beep
(B). joystick
(C). ALU
(D). scanner
Right Answer: C

135. Memories which can be read only are called ..memories.
(A). RAM
(B). ROM
(C). PROM
(D). EPROM
Right Answer: B

136. A result of a computer virus can NOT lead to
(A). Disk Crash
(B). Mother Board Crash
(C). Corruption of program
(D). Deletion of files
Right Answer: B

137. The network interface card of LAN is related to following layer of OSI Model
(A). Transport
(B). Network
(C). Data Link
(D). All of these
Right Answer: D

138. Which of the following does NOT describe a data warehouse?
(A). Subject-oriented
(B). Integrated
(C). Time-variant
(D). Updateable
Right Answer: D

139. Which of the following is TRUE ?
(A). Logical design is software-dependent
(B). In a distributed database, database is stored in one physical location
(C). Conceptual design translates the logical design into internal model
(D). Logical design is software independent
Right Answer: A

140. A range check
(A). ensures that only the correct data type is entered into a field
(B). verifies that all required data is present
(C). determines whether a number is within a specified limit
(D). tests if the data in two or more associated fields is logical
Right Answer: C

141. A person who used his or her expertise to gain access to other people s computers to get information illegally or do damage is a
(A). hacker
(B). analyst
(C). instant messenger
(D). programmer
Right Answer: A

142. To access properties, of an object, the mouse technique to use is
(A). dragging
(B). dropping
(C). right-clicking
(D). shift-clicking
Right Answer: C

143. To change selected text to all capital letters, click the change case button, then click
(A). UPPERCASE
(B). UPPER ALL
(C). CAPS LOCK
(D). Lock Upper
Right Answer: A

144. The basic unit of a worksheet into which you enter data in Excel is called a
(A). tab
(B). cell
(C). box
(D). range
Right Answer: B

145. You can keep your personal files / folders in
(A). My folder
(B). My Documents
(C). My Files
(D). My Text
Right Answer: B

146. URL stands for
(A). Universal Research List
(B). Universal Resource List
(C). Uniform Resource Locator
(D). Uniform Research Locator
Right Answer: C

147. NT classifies
(A). container objects
(B). non container objects
(C). both A and B
(D). display objects
Right Answer: A

148. The design of the network is called the network
(A). architecture
(B). server
(C). transmission
(D). type
Right Answer: A

149. A Proxy server is used for which of the following
(A). To provide security against unauthorized users
(B). To process client requests for web pages
(C). To provide TCP/IP
(D). To process client requests for database access
Right Answer: B

150. When data changes in multiple lists and all lists are not updated, this causes
(A). data redundancy
(B). information overload
(C). duplicate data
(D). data inconsistency


Right Answer: D



www.haminpur.com

Disclaimer : We try to provide free and accurate information.
However, we are not liable to any type of mistake that may arise due to the results provided by this portal.

Privacy : We do not share any submitted information to other purposes.