101. Which of the following is an example of connectivity? (1) - TopicsExpress



          

101. Which of the following is an example of connectivity? (1) data (2) hard disk (3) Internet (4) power cord (5) None of these Answer :3 102. The command used to remove text or graphics from a document. The information is then stored on a clipboard so you can paste it. (1) chop (2) cut (3) clip (4) cart away (5) None of these Answer :2 103. People, procedures, software, hardware, and data are the five parts of a(n) : (1) competency system (2) computer system (3) information system (4) software system (5) None of these Answer :3 104. The feature of Word that automatically adjusts the amount of spacebetween certain combinations of characters so that an entire word looks more evenly spaced. What is that feature called? (1) Spacing (2) Scaling (3) Kerning (4) Positioning (5) None of these Answer :3 105. Which of the following statement is wrong? (1) Windows XP is an operating system (2) Linux is owned and sold by Microsoft (3) Photoshop is a graphical design tool by Adobe (4) Linux is free and open source software (5) None of the above Answer :2 106. A phenomenon in virtual memory schemes in which the processor spends most of the time swapping pages rather than executing instructions is : (1)loading (2) swapping (3) thrashing (4) aging (5) digging Answer :3 107. Give the name of the Linear list in which elements can be added at ends but not in the middle: (1) Array (2) Queue (3) Tree (4) Circular Queue (5) None of these Answer :2 108. Flip-flop is the basic structure of the device: (1) Hard disk (2) Memory (3) Cells (4) Speakers (5) None of these Answer :2 109. What is a specialized software program that allows input and output devices to communicate with the rest of the computer system? (1) Utility driver (2) Utility program (3) Data compression utility (4) Device driver (5) None of these Answer :4 110. When assigning a shortcut key to a symbol, you should always try to select a key or key combination that is: (1) unassigned (2) Located on the ten-key pad section of your keyboard. (3) Assigned to another task. (4) From the same font family as the symbol. (5) None of these Answer :1 111. Which American Computer Company is called big blue? (1) Microsoft (2) Compaq Corp (3) IBM (4) Tandy Sevenson (5) Hewlett Packard Answer :3 112. A dumb terminal has : (1) An embedded microprocessor (2) Extensive memory (3) Independent processing (4) A keyboard and screen (5) None of these Answer :2 113. Which of the following is a software selection criteria? (1) Appropriateness (2) Efficiency (3) Compatibility (4) All of the above (5) None of these Answer :2 114. Which of the following memories needs refresh? (1) SRAM (2) DRAM (3) ROM (4) All of above (5) None of these Answer :4 115. ……… is paperless document transfer between companies. (1) EFT (2) EDI (3) ETS (4) RTGS (5) None of these Answer :4 116. The switching devices used in First Generation computer’s were: (1) Transistors (2) SSI chips (3) VLSI chips (4) Vacuum Tubes (5) None of these Answer :4 117. The Virtual Memory is located logically : (1) in the CPU (2) in main memory (3) in between CPU and primary memory (4) in the Hard disk (5) None of these Answer :2 118. A software used to convert source program instructions to object instruction is known as : (1) Compiler (2) Assembler (3) Interpreter (4) Language processor (5) None of these Answer :4 119. The subject of cybernetics deals with the science of : (1) Genetics (2) Control and communications (3) Molecular biology (4) Biochemistry (5) None of these Answer :2 120. WAIS stands for : (1) Wide Area Intellectual Service (2) Web Access Information system (3) World wide Application of Intelligent System (4) Wide Area Information Service (5) None of these Answer :4 121. Correcting errors in a program is referred to as……… (1) debugging (2) bugging (3) rectifying (4) modifying (5) None of these Answer: 1 122. Which type of processing speed measurement is used primarily with supercomputers? (1) Flops (2) Fractions of second (3) Gigahertz (4) MIPS (5) None of these Answer: 1 123. What is the term associated with the second part of an e-mail address? (1) Local address (2) Eight characters long (3) User name (4) Domain name (5) None of these Answer: 4 124. Bold, Italic, Regular are known as : (1) font styles (2) font effects (3) word art (4) text effects (5) None of these Answer: 1 125. This is a group of servers that share work and may be able to back each other up if one server fails. (1) Channel bank (2) Cluster (3) Tiger team (4) Serverless backup (5) Logical unit Answer: 2 126. Smart Card is : (1) Special purpose Cards (2) Microprocessor Cards (3) Processing unit contains memory for storing data (4) Processing unit for software handling (5) None of these Answer: 2 127. A screen element of MS Word that is usually located below the title bar that provides categorized options is : (1) Menu mar (2) Tool Bar (3) Status Bar (4) All of the above (5) None of these Answer: 1 128. Which keys can be used together with other keys for special tasks ? (1) Insert, Delete (2) Ctrl, Shift (3) Left Arrow, Right Arrow (4) Page up, Page Down (5) None of these Answer: 2 129. Data related crime does not incorporate : (1) Data Didling (2) Data Spying (3) Data Leakage (4) Data Mining (5) None of these Answer: 4 130. ‘DOS’ floppy disk does not have : (1) A Boot Record (2) A File Allocation Table (3) A Root Directory (4) Virtual Memory (5) None of these Answer: 4 131. A disk on which you store information……… (1) plate (2) data disk (3) paper disk (4) TV disk (5) None of these Answer: 2 132. Lets you leave a screen or program…… (1) boot (2) programs (3) exit (4) text (5) None of these Answer: 3 133. The operating system does all of the following EXCEPT: (1) provide a way for the user to interact with the computer. (2) manage the central processing unit (CPU). (3) manage memory and storage. (4) enable users to perform a specific task such as document editing. (5) None of these Answer: 4 134. MS-DOS is a ……… operating system. (1) point-and-click (2) user-friendly (3) command-driven (4) Mac (5) None of these Answer: 3 135. Procedures are typically documented in manuals written by : (1) computer specialists (2) end users (3) Microsoft (4) service providers (5) None of these ] Answer: 1 136. What deletes the entire file except the file structure ? (1) ERASE (2) DELETE (3) ZAP (4) PACK (5) None of these Answer: 3 137. ……… takes one line, checks it for errors and then executes it. (1) Assembler (2) Interpreter (3) Loader (4) Complier (5) None of these Answer: 2 138. Artificial Intelligence is associated with which generation? (1) First Generation (2) Second Generation (3) Third Generation (4) Fifth Generation (5) Sixth Generation Answer: 4 139. Time during which a job is processed by the computer is : (1) Delay times (2) Real time (3) Execution time (4) Down time (5) None of these Answer: 3 140. Which of the following is not an input device? (1) OCR (2) Optical scanners (3) Voice recognition device (4) COM (Computer Output to Microfilm) (5) None of these Answer: 4 141. In latest generation computers, the instructions are executed : (1) Parallel only (2) Sequentially only (3) Both sequentially and parallel (4) All of above (5) None of these Answer: 3 142. A technique used by codes to convert an analog signal into a digital bit stream is known as : (1) Pulse code modulation (2) Pulse stretcher (3) Query processing (4) Queue management (5) None of these Answer: 1 143. The number of bits that can be transmitted over a network in a certain period of time: (1) Latency (2) Delay (3) Bandwidth (4) Baud (5) None of these Answer: 3 144. Linux partitions are created using the file system: (1) FAT (2) FAT32 (3) EXT3 (4) NTFS (5) None of these Answer: 3 145. Which of the following data structure is widely used in a network model RDBMS? (1) Arrays (2) trees (3) graphs (4) stacks (5) None of these Answer: 3 146. The scientist who developed the idea of the WWW is : (1) James Gosling (2) Tim Berns Lee (3) Andrew Tannenbaum (4) Linus Torvalds (5) Bill Gates Answer: 2 147. What was the data transmission method in which bi-directional data flow is allowed? (1) Simplex (2) Duplex (3) Analog (4) Single side mode (5) None of these Answer: 2 148. To check the presence of a computer in the network, use the command: (1) ping (2) cmd (3) check (4) ipconfig (5) connect Answer: 1 149. The word processing task associated with changing the appearance of a document is : (1) Editing (2) Writing (3) Formatting (4) All of above (5) None of these Answer: 3 150. Easy to use…… (1) user friendly (2) select (3) helpful (4) ever-ready (5) None of these Answer: 1 151. Commands at the top of a screen such as : FILE-EDIT-FONT-TOOLS to operate and change things within programs…… (1) menu bar (2) tool bar (3) user friendly (4) word processor (5) None of these Answer: 1 152. Anything written on the screen …… (1) cursor (2) text (3) folder (4) boot (5) None of these Answer: 2 153. Which of the following is not the major function of a computer ? (1) Processing data into information (2) Storing data or information (3) Gathering data (4) Analysing data or information (5) None of these Answer: 4 154. A method of executing two or more programs concurrently using the same computer describe: (1) multi processing (2) multiprogramming (3) virtual processing (4) time sharing (5) None of these Answer: 2 155. When you save to ……… your data will remain intact even when thecomputer is turned off. (1) RAM (2) motherboard (3) secondary storage device (4) primary storage device (5) None of these Answer: 3 156. A one-time password is : (1) one that changes every time it is used (2) one that is assigned once and not changed at all. (3) one that can be used only at a particular time of the day (4) one that is assigned for all session that starts at a particular time (5) None of these Answer: 1 157. A hardware interface that allows for the connection of several peripheral devices to a single PCI board. (1) SCSI (2) SATA (3) ATA (4) PCI (5) None of these Answer: 1 158. is a language, instead of using numbers; programmers began usingEnglish like abbreviations (Mnemonics) to represent the elementary operations. (1) Machine language (2) Mnemonics language (3) Assembly level language (4) High level language (5) None of the these Answer: 3 159. Encryption decryption are functions of : (1) Transport layer (2) Session layer (3) Presentation layer (4) All of the above (5) None of these Answer: 2 160. The process of building a model that demonstrate the features of a proposed product, service or system is called a : (1) JAD (2) RAD (3) templating (4) prototyping (5) TAD Answer: 4 161. Memory, also called random access memory, or RAM………. (1) contains the electronic circuits that cause processing to occur (2) makes the information resulting from processing available for use (3) allows data, programs, commands, and user responses to be entered into a computer (4) consists of electronic components that store data (5) None of these Answer: 4 162. A ……… represent approximately one billion memory locations. (1) kilobyte (2) megabyte (3) gigabyte (4) terabyte (5) None of these Answer: 3 163. An interrupt handler is a(n): (1) location in memory that keeps track of recently generated interrupts. (2) peripheral device. (3) utility program. (4) special numeric code that indicates the priority of a request (5) None of these Answer: 4 164. All of the following are steps involved in the boot process EXCEPT: (1) load the operating system into RAM. (2) the power-on self-test. (3) activate the basic input/output system (BIOS). (4) load application programs. (5) None of these Answer: 4 165. A port that allows 8 bits at a time to be transmitted simultaneously is a(n) ………. (1) dedicated port (2) parallel port (3) SCSI port (4) USB port (5) None of these Answer: 2 166. Which of these terms refers to the feature of an OS that allows a single computer to process the tasks of several users at different stations, in round-robin fashion? (1) Multiprocessing (2) Multiprogramming (3) Multitasking (4) Time processing (5) Time-sharing Answer: 5 167. A program which helps create written documents and lets you go back and make corrections as necessary…… (1) spreadsheet (2) personal writer (3) word printer (4) word processor (5) None of these Answer: 4 168. Screen that comes on when you turn on your computer that shows all the icons…… (1) desktop (2) face to face (3) viewer (4) view space (5) None of these Answer: 1 169. A place that a user can create to store files…… (1) cursor (2) text (3) folder (4) boot (5) None of these Answer: 3 170. Electronic pens are used with the mouse to write on a slide in which view? (1) Master (2) Slide Sorter (3) Slide Show (4) Normal (5) Print preview Answer: 3 171. When you insert a picture and adjust the height, Word automatically adjusts the ……… to maintain the correct proportion. (1) pixel size (2) resolution (3) screen size (4) width (5) None of these Answer: 4 172. Which of the following is NOT one of the steps in the machine cycle? (1) Execute (2) Store (3) Decode (4) Pipelining (5) None of these Answer: 4 173. How many peripheral devices can be connected to a single SCSI port? (1) 1 (2) 8 (3) 16 (4) 32 (5) 64 Answer: 2 174. The four-step process of fetch, decode, execute, and store is called a(n): (1) machine cycle (2) instruction cycle (3) arithmetic operation (4) logical operation (5) None of these Answer: 1 175. All of the following are TRUE regarding virtual memory EXCEPT : (1) any amount of RAM can be allocated to virtual memory. (2) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed. (3) this temporary storage is called the swap file or page file. (4) virtual memory is physical space on the hard drive. (5) None of these Answer: 1 176. The operating system is the most common type of ……… software. (1) communication (2) application (3) system (4) word-processing (5) None of these Answer: 3 177. The human-readable version of a program is called ……… (1) source code (2) program code (3) human code (4) system code (5) None of these Answer: 4 178. Data are ……… in client/server computing. (1) never sent to the client machine (2) sent in very large sections to save processing time (3) sent only upon the client’s request (4) sent in complete copies for the client to filter and sort (5) sent from the client to the server for processing Answer: 3 179. The total set of interlinked hypertext documents worldwide is : (1) HTT (2) Browser (3) WWW (4) B2B (5) None of these Answer: 1 180. Which of the following is not one of the three ‘Mail Merge Helper’ steps? (1) Merge the two files (2) Create the main document (3) Set the mailing list parameters (4) Create the data source (5) None of these Answer: 3 181. Which is the part of a computer that one can touch and feel ? (1) Programs (2) Software (3) Hardware (4) Output (5) None of these Answer: 3 182. A command to get a file you worked on from the memory where it was stored…… (1) close (2) delete (3) open (4) get it (5) None of these Answer: 3 183. There are several security devices used to stop individuals from exploiting your system. Which of the following is used in conjunction with a firewall? (1) Proxy server (2) Intrusion-detection system (3) Terminal server (4) Web server (5) None of these Answer: 1 184. Array is ……… (1) Linear data structure (2) non-linear data structure (3) simple data structure (4) complex data structure (5) None of these Answer: 1 185. A computer checks the ……… of user names and passwords for a match before granting access. (1) website (2) network (3) backup file (4) database (5) None of these Answer: 4 186. Which of the following is the latest version of MS Word? (1) Word 2000 (2) Word 2007 (3) Word 2010 (4) Word 2011 (5) Word 2012 Answer: 3 187. In the online world of electronic commerce, what do the initials CEM stands for ? (1) Costly E-Commerce Marketing (2) Customer Experience Management (3) Customer Experience Misleading (4) Cost Estimates are Mind Boggling (5) None of these Answer: 2 188. What type of program controls the various computer parts and allows the user interact with the computer ? (1) Utility software (2) Operating system (3) Word processing software (4) Database program (5) None of these Answer: 1 189. Which of the following transmission systems provide the highest data rate to in individual device? (1) computer bus (2) telephone lines (3) voice and mode (4) lease lines Answer: 1 190. The combination of the operating system and the processor is referred to as the computer’s: (1) CPU (2) platform (3) BIOS (4) CMOS (5) None of these Answer: 2 191. The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT: (1) files (2) folders (3) drives (4) systems (5) None of these Answer: 4 192. Leaves of which of the following trees are at the same level ? (1) Binary tree (2) B-tree (3) AVL-tree (4) Expression tree (5) None of these Answer: 2 193. The transformation of a message into an encoded form is known as : (1) Mnemonics (2) Encoding (3) Encryption (4) Decoding (5) None of these Answer: 2 194. Firewalls are used to protect against……… (1) Unauthorized Attacks (2) Virus Attacks (3) Data Driven Attacks (4) Fire Attacks (5) All of these Answer: 1 195. Auto correct was originally designed to replace ……… words as you type. (1) Short, repetitive (2) Grammatically incorrect (3) Misspelled (4) Half (5) None of these Answer: 3 196. Ensuring that the essential peripheral devices are attached and operational is the ……… process. (1) configuration (2) CMOS (3) POST (4) ROM (5) check Answer: 3 197. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an: (1) action (2) event. (3) interrupt (4) activity (5) None of these Answer: 3 198. Before a package can be used in a java program it must be ……… (1) executed (2) referenced (3) imported (4) declared (5) None of these Answer: 3 199. The definition of thrashing is: (1) swapping data between virtual memory and RAM too frequently. (2) insufficient hard disk space. (3) too many processors being managed by the operating system. (4) inaccurate information stored in the registry (5) None of these Answer: 1 200. The primary device that a computer uses to store information…… (1) register (2) storehouse (3) desk (4) hard drive (5) None of these Answer: 4
Posted on: Thu, 22 Aug 2013 04:01:06 +0000

Trending Topics



Recently Viewed Topics




© 2015