Saturday, April 20, 2024

Computer Basics (MCQs)

 



1. A………typically connects personal computers within a very limited geographical area, usually within a single building.
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
Ans : (A)

2. Computers manipulate data in many ways, and this manipulation is called—
(A) utilizing
(B) batching
(C) upgrading
(D) processing
(E) None of these
Ans : (D)

3. An e-mail address typically consists of a user ID followed by the ……… sign and the name of the e-mail server that manages the user’s electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
Ans : (A)

4. Software applies……, also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
Ans : (A)

5. A file extension is separated from the main file name with a(n) ……, but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
Ans : (E)


6. An ad hoc query is a______________
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the-moment question
(D) question that will not return any results
(E) None of these
Ans : (B)

7. A Web ……… consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these
Ans : (B)

8. A computer ……… is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files.
(A) worm
(B) virus
(C) trojan horse
(D) phishing scam
(E) None of these
Ans : (B)

9. The desktop contains small graphics called—
(A) windows
(B) logos
(C) icons
(D) pictures
(E) None of these
Ans : (C)

10. C, BASIC, COBOL, and Java are examples of ……… languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
Ans : (D)

11. A(n)………camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software.
(A) digital
(B) analog
(C) classic
(D) film
(E) None of these
Ans : (A)

12. ……makes it possible for shoppers to make purchases using their computers.
(A) E-world
(B) E-commerce
(C) E-spend
(D) E-business
(E) None of these
Ans : (D)

13. Networks are monitored by security personnel and supervised by ………who set(s) up accounts and passwords for authorized network users.
(A) IT managers
(B) the government
(C) network administrators
(D) password administrators
(E) None of these
Ans : (C)

14. Application software is designed to accomplish—
(A) real-world tasks
(B) computer-centric tasks
(C) gaming tasks
(D) operating system tasks
(E) None of these
Ans : (D)

15. A telephone number, a birth date, and a customer name are all examples of—
(A) a record
(B) data
(C) a file
(D) a database
(E) None of these
Ans : (D)

16. The human-readable version of a program is called—
(A) source code
(B) program code
(C) human code
(D) system code
(E) None of these
Ans : (D)

17. A ……… computer (also referred to as a laptop), is a small, lightweight personal computer that incorporates the screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook
(B) journal
(C) diary
(D) briefcase
(E) None of these
Ans : (A)

18. ……… is the result produced by a computer.
(A) Data
(B) Memory
(C) Output
(D) Input
(E) None of these
Ans : (C)

19. Programs such as Internet Explorer that serve as navigable windows into the Web are called—
(A) Hypertext
(B) Networks
(C) Internet
(D) Web browsers
(E) None of these
Ans : (D)

20. A ……… is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
(A) surge strip
(B) USB
(C) UPS
(D) battery strip
(E) None of these
Ans : (C)

21. When you save to ………, your data will remain intact even when the computer is turned off.
(A) RAM
(B) motherboard
(C) secondary storage device
(D) primary storage device
(E) None of these
Ans : (C)

22. The motherboard is the_____________
(A) circuit board that houses peripheral devices
(B) same as the CPU chip
(C) the first chip that is accessed when the computer is turned on
(D) circuit board that contains a CPU and other chips
(E) None of these
Ans : (D)

23. A computer-intensive problemruns on a—
(A) server
(B) main frame
(C) supercomputer
(D) super PC
(E) None of these
Ans : (C)

24. A(n)……converts and executesone statement at a time.
(A) compiler
(B) interpreter
(C) converter
(D) instructions
(E) None of these
Ans : (B)

25. The term ……… designates equipment that might be added to a computer system to enhance its functionality.
(A) digital device
(B) system add-on
(C) disk pack
(D) peripheral device
(E) None of these
Ans : (D)

26. Approximately how many bytes make one megabyte ?
(A) One thousand
(B) Ten thousand
(C) One hundred
(D) One million
(E) None of these
Ans : (D)

27. What is MP3 ?
(A) A mouse
(B) A Printer
(C) A Sound format
(D) A Scanner
(E) None of these
Ans : (C)

28. All the deleted files go to_____________
(A) Recycle Bin
(B) Task Bar
(C) Tool Bar
(D) My Computer
(E) None of these
Ans : (A)

29. ……… this is the act of copying or downloading a program from a network and making multiple copies of it.
(A) Network piracy
(B) Plagiarism
(C) Software piracy
(D) Site-license piracy
(E) None of these
Ans : (C)

30. A directory within a directory is called—
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Ans : (D)

31. Which is the best definition of a software package ?
(A) An add-on for your computer such as additional memory
(B) A set of computer programs used for a certain function such as word processing
(C) A protection you can buy for a computer
(D) The box, manual and license agreement that accompany commercial software
(E) None of these
Ans : (B)

32. In MICR, C stands for ……….
(A) Code
(B) Colour
(C) Computer
(D) Character
(E) None of these
Ans : (D)

33. Fax machines and imaging systems are examples of—
(A) bar-code readers
(B) imaging systems
(C) scanning devices
(D) pen-based systems
(E) None of these
Ans : (B)

34. When writing a document, you can use the ……… feature to find an appropriate word or an alternative word if you find yourself stuck for the right word.
(A) dictionary
(B) word finder
(C) encyclopedia
(D) thesaurus
(E) None of these
Ans : (A)

35. Which key is used in combination with another key to perform a specific task ?
(A) Function
(B) Control
(C) Arrow
(D) Space bar
(E) None of these
Ans : (B)

36. A disk’s content that is recorded at the time of manufacture and that cannot be changed or erased by the user is—
(A) read-only
(B) memory-only
(C) run-only
(D) write-only
(E) None of these
Ans : (A)

37. In an information system, alphanumeric data normally takes the form of—
(A) Sentences and paragraphs
(B) Numbers and alphabetical characters
(C) Graphic shapes and figures
(D) Human voice and other sounds
(E) None of these
Ans : (B)

38. A Website’s main page is called its—
(A) home page
(B) browser page
(C) search place
(D) bookmark
(E) None of these
Ans : (A)

39. When installing ………, the user must copy and usually decompress program files from a CDROM or other medium to the hard disk.
(A) programming software
(B) system hardware
(C) applications hardware
(D) applications software
(E) None of these
Ans : (A)

40. A collection of interrelated files in a computer is a—
(A) file manager
(B) field
(C) record
(D) database
(E) None of these
Ans : (D)

41. A ……… computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.
(A) server
(B) mainframe
(C) desktop
(D) tablet
(E) None of these
Ans : (B)

42. The trend in computer systems is toward the use of graphical user interfaces (GUIs). In these operating systems, a trackball is described as____________
(A) a roller ball which moves the cursor
(B) a pen-shaped device which allows data to be entered through the CRT screen
(C) a figure which resembles a familiar office device
(D) an outdated input device
(E) None of these
Ans : (A)

43. Various applications and documents are represented on the Windows desktop by—
(A) Symbols
(B) Labels
(C) Graphs
(D) Icons
(E) None of these
Ans : (D)

44. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
(E) None of these
Ans : (D)

45. The real business and competitive value of information technology lies in—
(A) The software applications that are used by many companies
(B) The capabilities of the software and value of the information a business acquires and uses
(C) The infrastructure of hardware, networks, and other IT facilities that are commonly used by many companies
(D) The capabilities of the hardware and the speed at which it processes information
(E) None of these
Ans : (B)

46. Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves ?
(A) Open source vendors
(B) Alliances
(C) Application service providers
(D) All of the above
(E) None of these
Ans : (C)

47. Which one of the following would be considered as a way that a computer virus can enter a computer system ?
(A) Opening an application previously installed on the computer
(B) Borrowed copies of software
(C) Viewing a website without causing any additional transactions
(D) Running antivirus programs
(E) None of these
Ans : (B)

48. Collecting personal information and effectively posing as another individual is known as the crime of—
(A) spooling
(B) dentity theft
(C) spoofing
(D) hacking
(E) None of these
Ans : (B)

49. The first step in the transaction processing cycle is___________
(A) database operations
(B) audit
(C) data entry
(D) user inquiry
(E) None of these
Ans : (C)

50. In the information systems concept, the output function involves__________
(A) Capturing and assembling elements that enter the system to be processed
(B) Transformation processes that convert input into output
(C) Transferring elements that have been produced by a transformation process to their ultimate destination
(D) Monitoring and evaluating feedback to determine whether a system is moving toward the achievement of its goal
(E) None of these
Ans : (A)




1. A ……… is the term used when a search engine returns a Web page that matches the search criteria.
(A) blog
(B) hit
(C) link
(D) view
(E) success
Ans : (C)

2. Which of the following are advantages of CD-ROM as a storage media ?
(A) CD-ROM is an inexpensive way to store large amount of data and information
(B) CD-ROM disks retrieve data and information more quickly than magnetic disks do
(C) CD-ROMs make less errors than magnetic media
(D) All of these
(E) None of these
Ans : (D)


3. The ……… is the term used to describe the window that is currently being used.
(A) Web Window
(B) display area
(C) WordPad Window
(D) active window
(E) monitor
Ans : (D)


4. A microprocessor is the brain of the computer and is also called a(n)—
(A) microchip
(B) macrochip
(C) macroprocessor
(D) calculator
(E) software
Ans : (A)

5. CPU is an abbreviation for—
(A) central programming unit
(B) central processing unit
(C) computer processing unit
(D) computer protocol unit
(E) central protocol unit
Ans : (B)

6. What are two examples of freeware ?
(A) WinZip and Linux
(B) Shareware and file sharing
(C) Microsoft Word and the Google toolbar
(D) Instant messaging and the Google toolbar
(E) Microsoft Power Point and Microsoft Excel
Ans : (D)

7. Storage and memory differ with respect to which of the following characteristics ?
(A) Price
(B) Reliability
(C) Speed
(D) All of these
(E) None of these
Ans : (D)


8. If a disk drive fails but the computer application running and using it can continue processing, thisapplication is said to have been designed with this feature—
(A) 100 per cent uptime
(B) fault tolerance
(C) high reliability
(D) All of these
(E) None of these
Ans : (B)

9. What are the four things needed to connect to the Internet ?
(A) Telephone line, modem, computer, and an ISP
(B) Modem, computer, PDA and ISP
(C) Telephone line, PDA, modem and computer
(D) Computer, ISP, modem and communication software
(E) Monitor, keyboard, mouse, modem
Ans : (A)

10. What is e-commerce ?
(A) Buying and selling international goods
(B) Buying and selling products and services over the Internet
(C) Buying and selling products and services not found in stores
(D) Buying and selling products having to do with computers
(E) Buying and selling of electronic goods
Ans : (B)


11. Which media have the ability to have data/information stored (written) on them by users more than once ?
(A) CD-R disks
(B) CD-RW disks
(C) Zip disks
(D) OptiDisks
(E) Word processing

Ans : (E)

12. Which of the following functions are not performed by servers ?
(A) Email processing
(B) Database sharing
(C) Processing Web sites
(D) Storage
(E) Both CD-RW disks and Zip disks
Ans : (A)

13. The process of transferring files from a computer on the Internet to your computer is called—
(A) downloading
(B) uploading
(C) FTP
(D) JPEG
(E) downsizing
Ans : (C)

14. Which of the following could be digital input devices for computers ?
(A) Digital camcorder
(B) Microphone
(C) Scanner
(D) All of the above
(E) None of these
Ans : (D)

15. The………controls a client computer’s resources.
(A) application program
(B) instruction set
(C) operating system
(D) server application
(E) compiler
Ans : (D)

16. To reload a Web page, press the ……… button.
(A) Redo
(B) Reload
(C) Restore
(D) Ctrl
(E) Refresh
Ans : (E)


17. The………enables you to simultaneously keep multiple Web pages open in one browser window.

(A) tab box
(B) pop-up helper
(C) tab row
(D) address bar
(E) Esc key
Ans : (A)


18. Storage media such as a CD read and write information using—
(A) a laser beam of red light
(B) magnetic dots
(C) magnetic strips
(D) All of these
(E) None of these
Ans : (D)

19. You can use the………bar to type a URL and display a Web page, or type a keyword to display a list of related Web pages.
(A) menu
(B) Title
(C) Search
(D) Web
(E) Address
Ans : (E)

20. Every computer has a(n) ………; many also have.
(A) operating system, a client system
(B) operating system; instruction sets
(C) application programs; an operating system
(D) application programs; a client system
(E) operating system; application programs
Ans : (E)

21. Vendor-created program modifications are called.......
(A) patches
(B) antiviruses
(C) holes
(D) fixes
(E) overlaps
Ans : (D)

22. Cache and main memory will lose their contents when the power is off. They are—
(A) dynamic
(B) static
(C) volatile
(D) non-volatile
(E) faulty
Ans : (C)


23. Main memory works in conjunction with—
(A) special function cards
(B) RAM
(C) CPU
(D) Intel
(E) All of these
Ans : (C)

24. A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using—
(A) input automation
(B) item data automation
(C) scanning automation
(D) source data automation
(E) None of these
Ans : (C)

25. The collection of links throughout the Internet creates an interconnected network called the—
(A) WWW
(B) Web
(C) World Wide Web
(D) All of the above
(E) Wide Area Web
Ans : (D)



26. Which of the following is an example of storage devices ?
(A) Magnetic disks
(B) Tapes
(C) DVDs
(D) All of these
(E) None of these
Ans : (D)



27. A(n)……is composed of several computers connected together to share resources and data.
(A) Internet
(B) network
(C) backbone
(D) hyperlink
(E) protocol
Ans : (B)


28. A popular way to learn about computers without ever going to a classroom is called—
(A) i-learning
(B) isolated learning
(C) e-learning
(D) close learning
(E) Distance Learning
Ans : (C)

29. A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a—
(A) spammer
(B) hacker
(C) instant messenger
(D) programmer
(E) analyst
Ans : (B)

30. Microsoft Office is an example of a—
(A) closed-source software
(B) open-source software
(C) horizontal-market software
(D) vertical-market software
(E) compiler
Ans : (A)

31. The………folder retains copies of messages that you have started but are not yet ready to send.
(A) Inbox
(B) Outbox
(C) Drafts
(D) Sent Items
(E) Address Book
Ans : (C)


32. The main job of a CPU is to—
(A) carry out program instructions
(B) store data/information for future use
(C) process data and information
(D) Both (A) and (C)
(E) None of these
Ans : (D)

33. Video processors consist of ……… and ……, which store and process images.
(A) CPU and VGA
(B) CPU and memory
(C) VGA and memory
(D) VGI and DVI
(E) VGA and VGI
Ans : (C)

34. Which of the following is an example of an optical disk ?
(A) Digital versatile disks
(B) Magnetic disks
(C) Memory disks
(D) Data bus disks
(E) None of these
Ans : (A)


35. ……are attempts by individuals to obtain confidential information from you by falsifying their identity.
(A) Phishing trips
(B) Computer viruses
(C) Spyware scams
(D) Viruses
(E) Phishing scams
Ans : (E)

36. An example of a processing device would be—
(A) a magnetic ink reader
(B) a tablet PC
(C) special function cards
(D) scanners
(E) keyboards
Ans : (B)

37. Which of the following is not a type of computer software which can be bought ?
(A) Off-the-shelf
(B) Tailor-made
(C) Custom-developed
(D) Off-the-shelf with alterations
(E) All of these can be purchased
Ans : (D)

38. You can use………to copy selected text, and ……… to paste it in a document.
(A) CTRL + C, CTRL + V
(B) CTRL + C, CTRL + P
(C) CTRL + S, CTRL + S
(D) SHIFT + C, ALT + P
(E) CTRL + D, CTRL + A
Ans : (A)


39. The main memory of a computer can also be called—
(A) primary storage
(B) internal memory
(C) primary memory
(D) All of these
(E) None of these
Ans : (C)



40. When speaking of computer input and output, input refers to—
(A) any data processing that occurs from new data input into the computer
(B) retrieval of data or information that has been input into the computer
(C) data or information that has been entered into the computer
(D) the transmission of data that has been input into the computer
(E) Both (C) and (D) above
Ans : (E)

41. A ……… is a set of rules.
(A) resource locator
(B) domain
(C) hypertext
(D) URL
(E) protocol
Ans : (E)

42. The………file format is a method of encoding pictures on a computer.
(A) HTML
(B) JPEG
(C) FTP
(D) URL
(E) DOC
Ans : (B)

43. Computer software can be defined as—
(A) the computer and its associated equipment
(B) the instructions that tell the computer what to do
(C) computer components that act to accomplish a goal
(D) an interface between the computer and the network
(E) the interaction between the computer and its database
Ans : (B)

44. The connection between your computer at home and your local ISP is called—
(A) the last mile
(B) the home stretch
(C) the home page
(D) the backbone
(E) the vital mile
Ans : (C)


45. There are several primary categories of procedures. Which of the following is not a primary category of procedures ?
(A) Testing
(B) Backup and recovery
(C) Firewall development
(D) Design
(E) None of these
Ans : (C)

46. The operating system called UNIX is typically used for—
(A) desktop computers
(B) laptop computers
(C) supercomputers
(D) Web servers
(E) All of these
Ans : (E)

47. All of the logic and mathematical calculations done by the computer happen in/on the—
(A) system board
(B) central control unit
(C) central processing unit
(D) mother board
(E) memory
Ans : (C)


48. Computer systems are comprised of—
(A) hardware, programs, information, people and networks
(B) hardware, software, procedures, networks and people
(C) hardware, programs, information, people and procedures
(D) hardware, programs, processors, procedures, networks and people
(E) hardware, programs, processors, procedures and people
Ans : (A)



49. Press………to move the insertion point to the Address box, or to highlight the URL in the Address box.
(A) ALT + D
(B) ALT + A
(C) SHIFT + TAB
(D) TAB + CTRL
(E) CTRL + S
Ans : (A)



27. Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information—
(A) floppy diskette
(B) hard disk
(C) permanent disk
(D) optical disk
(E) None of these
Ans : (B)




1.The first generation of computers were based upon
(a) transistors
(b) lC’s
(c) valves
(d) conductor

Ans : c

2.Turbo switch on computer is in
(a) back panel
(b) is not there
(c) front panel
(d) All of these

Ans : c

3.The second generation computers were based upon
(a) transistors
(b) ICs
(c) valves
(d) chips

Ans : a

4.RAM stands for
(a) Random Allowed Memory
(b) Ready Access Memory
(c) Random Access Memory
(d) Random Added Memory

Ans : c

5.In programming, you use the following keys
(a) Arrow keys
(b) Function keys
(c) Alpha keys
(d) Num keys

Ans : b

6.Printer is a device which
(a) input
(b) output
(c) Both a and b
(d) None of these

Ans : b

7.Laser printer is device which
(a) input
(b) output
(c) Both a and b
(d) None of these

Ans : b

8.Track ball has a
(a) ball
(b) track
(c) football
(d) None of these

Ans : a

9.Dot matrix printer uses what for printing
(a) hammers
(b) slugs
(c) mouse
(d) nibs

Ans : a

10.A CD can hold approximately how much of data
(a) 200 MB
(b) 700 MB
(c) 1000 MB
(d) 2000 MB

Ans : b

11. Computer program which controls the operations of computer is called
(a) assembles
(b) operating System
(c) interpreter
(d) compiler

Ans : b

12. System software are of two types operating systems and
(a) applications
(b) word processing
(c) language trans
(d) None of these

Ans : c

13.Debugging tools are there to debug errors in
(a) printers
(b) keyboards
(c) programs
(d) language

Ans : c

14. There are two basic types of disks-floppy disk and
(a) low disk
(b) hard disk
(c) soft disk
(d) None of these

Ans : b

15. It is a collection of facts and figures
(a) data
(b) information
(c) processing
(d) file

Ans : a

16.It converts accepted instructions into machine language
(a) input unit
(b) output unit
(c) processing unit
(d) memory unit

Ans : a

17. To open a new file in MS-Word, the shortcut key is
(a) Ctrl + X
(b) Ctrl + N
(c) Ctrl + Y
(d) Ctrl + V

Ans : b

18. What is the term used for the word processing programs that show you directly on the PC screen the appearance of your final document as you might expect on the paper?
(a) Search & Replace
(b) Pagination
(c) Soft Copy
(d) WYSIWYG

Ans : d

19. Alignment buttons are available on which toolbar?
(a) Status
(b) Standard
(c) Formatting
(d) None of these

Ans : c

20. Which of the following is not an option of edit menu?
(a) Cut
(b) Copy
(c) Paste
(d) Page setup

Ans : d

21. By default the bottom margin in the word document is
(a) 2 inch
(b) 1 inch
(c) 3 inch
(d) 1.5 inch

Ans : b

22.A file name cannot contain in MS-Word database file
(a) a letter
(b) number
(c) underscore
(d) space

Ans : d

23.Selection of text involves only
(a) single word
(b) line or multiple lines
(c) paragraph or paragraphs and complete document
(d) All of the above

Ans : d

24.‘Replace’ option is available in
(a) Edit menu
(b) File menu
(c) Tools menu
(d) Insert menu

Ans : a

25.When you start spelling checker, it starts checking the spellings
(a) from the end of the document to upward
(b) from the beginning of the document and downward
(c) from the insertion point
(d) None of the above

Ans : c



1.What is the Permanent memory built into your Computer called?

(a) RAM
(b) ROM
(C) CPU
(d) CD-ROM
(e) None of these


ANSWER: (a)

2. The physical arrangement of elements on a page is referred to as a document’s…….
(1) Features
(2) Format
(3) Pagination
(4) Grid
(5) None of these


ANSWER. (2)

3. All the deleted files go to
(a) Recycles Bin
(b) Task Bar
(c) Tool Bar
(d) My computer
(e) None of these


ANSWER: (a)

4. Most Websites have a main page, the………Which acts as a doorway to the rest of the Website pages.
(1) Search engine
(2) Home page
(3) Browser
(4) URL
(5) None of these


ANSWER. (2)

7. What type of device is a computer printer?

(a) Input
(b) Output
(c) Software
(d) Storage
(e) None of these


ANSWER: (b)

8. Which is not a basic function of a computer?
(1) Copy text
(2) Accept input
(3) Process data
(4) Store data
(5) None of these


ANSWER. (1)

9. When you turn on the computer, the boot Routine will perform the test
(a) RAM test
(b) Disk drive test
(c) Memory test
(d) Power-on self
(e) None of these


ANSWER: (e)

10. Which of the following system components is the brain of the computer ?
(1) Circuit board
(2) CPU
(3) Memory
(4) Network card
(5) None of these


ANSWER. (2)

11. For creating a document, you use command at File Menu.
(a) Open
(b) Close
(c) New
(d) Save
(e) None of these


ANSWER: (c)

12. A …. ….. is a collection of information saved as a unit.
(1) Folder
(2) File
(3) Path
(4) File extension
(5) None of these


ANSWER. (1)

13. A data warehouse is which of the following?
(a) Can be updated by the end users
(b) Contains numerous naming conventions and formats
(c) Organized around important subject areas
(d) Contains only current data
(e) None of the above


ANSWER: (c)

14. All of the following are examples of real security and privacy risks except.
(a) Hackers
(b) Spam
(c) Viruses
(d) Identify theft
(e) None of these


ANSWER: (b)

15. Another word for software is ………
(1) Input
(2) Output
(3) Program
(4) System
(5) None of these


ANSWER. (3)

16. The OSI model is divided into how many Processes called layers?
(a) Five
(b) Six
(c) Seven
(d) Eight
(e) None of these


ANSWER: (c)

17. Generally, you access the Recycle Bin through an icon located……..
(1) On the desktop
(2) On the hard drive
(3) On the shortcut menu
(4) In the Properties dialog box
(5) None of the above


ANSWER. (1)

18. A ……… shares hardware, software, and data among authorized users.
(1) Network
(2) Protocol
(3) Hyperlink
(4) Transmitter
(5) None of these


ANSWER. (1)

19. The main system board of a computer is called the………
(1) Integrated circuit
(2) Motherboard
(3) Processor
(4) Microchip
(5) None of these


ANSWER. (2)

20. The main directory of a disk is called the ……directory.
(1) Root
(2) Sub
(3) Folder
(4) Network
(5) None of these


ANSWER. (1)

21. These are specially designed computer chips Reside inside other devices, such as your car or Your electronic thermostat
(a) Servers
(b) Embedded computers
(c) Robotic computers
(d) Mainframes
(e) None of the above


ANSWER: (b)

22. ln a ring topology, the computer in possession of The ______can transmit data
(a) Packet
(b) Data
(c) Access method
(d) Token
(e) None of these


ANSWER: (d)

23. Servers are computers that provide resources to Other computers connected to a
(a) Mainframe
(b) Network
(c) Supercomputer
(d) Client
(e) None of these


ANSWER: (b)

24. Computer programs are written in a high-level programming language; however, the human-readable version of a program is called…. …..
(1) Cache
(2) Instruction set
(3) Source code
(4) Word size
(5) None of these


ANSWER (1)

25. These type of Viruses are often transmitted by a Floppy disk left in the floppy drive
(a) Trojan horse
(b) Boot sector
(c) Script
(d) Logic bomb
(e) None of these

ANSWER (b)

No comments:

Does and don'ts while using internet

When using the internet, it's essential to follow certain guidelines to ensure safety, privacy, and a positive experience. Dos: Use Stro...