26. Which of the
following is a part of the Central Processing Unit?
a. Printer
b. Keyboard
c. Moused.
d.Arithmetic
& Logic unit
Ans:- d
27. CAD stands
for
a.
Computer-aided design
b. Computer
algorithm for design
c. Computer
application in design
d. Computer
analogue design
Ans:- a
28. Junk e-mail
is also called
a. spam
b. spoof
c. sniffer
script
d. spool
Ans:- a
29. Hackers
a. all have the
same motive
b. break into other people’s computers
c. may legally
break into computers as long as they do not do any damaged. are people who are
allergic to computers
Ans:- b
30. What type of
computers are client computers (most of the time) in a client-server system?
a. Mainframe
b. Mini-computer
c. Microcomputer
d. PDA
Ans:- c
31. A computer
cannot ‘boot’ if it does not have the
a. Compiler
b. Loader
c. Operating
System
d. Assembler
Ans:- c
32. The amount
of vertical space between lines of text in a document is called
a. double-space
b. line spacing
c. single-spaced.
d. vertical
spacing
Ans:- b
33. Example of
non-numeric data is
a. Employee
address
b. Examination score
c. Bank
balanced.
d.All of these
Ans:- a
34. What is
embedded system?
a. The programme
which arrives by being wrapped in box.
b. The programme
which is the permanent part of the computer
c. The computer
which is the part of a big computer
d. The computer
and software system that control the machine
Ans:- d
35. First page
of Website is termed as-
a. Homepage
b. Index
c. JAVA script
d. Bookmark
Ans:- a
36. . ………………… Is
the appearance of typed characters?
a. Size
b. Format
c. Point
d. Colour
Ans:- b
37. When a file
is saved for the first time
a copy is
automatically printed
b. it must be
given a name to identify it
c. it does not
need a named.
d.it only needs
a name if it is not going to be printed
Ans:- b
38. Office LANs,
which are scattered geographically on large scale, can be connected by the use
of corporate
a. CAN
b. LAN
c. DAN
d. WAN
Ans:- d
39. Where are
data and programme stored when the processor uses them?
a. Main memory
b. Secondary
memory
c. Disk memory
d. Programme
memory
Ans:- a
40. . ……………
represents raw facts, where-as…………….. is data made meaningful.
a. Information,
reporting
b. Data,
information
c. Information,
bits
d. Records, byte
Ans:- b
41. What
characteristic of read-only memory (ROM) makes it useful?
a. ROM
information can be easily updated.
b. Data in ROM
is non-volatile, that is, it remains there even without electrical power.
c. ROM provides
very large amounts of inexpensive data storage.
d. ROM chips are
easily swapped between different brands of computers.
Ans:- b
42. What do you
call the programs that are used to find out possible faults and their causes?
a. operating
system extensions
b. cookies
c. diagnostic
software
d. boot
diskettes
Ans:- c
43. Which
programming languages are classified as low level languages?
a. BASIC, COBOL,
Fortran
b. Prolog c. C, C++
d. Assembly languages
Ans:- d
44. Which of the
following is not anti-viruses’ software?
a. NAV
b. F-Prot
c. Oracle
d. McAfee
Ans:- c
45. Which device
is required for the Internet connection?
a. Joystick
b. Modem
c. CD Drive
d. NIC Card
Ans:- b
46. What does
DMA stand for?
a. Distinct
Memory Access
b. Direct Memory
Access
c. Direct Module
Access
d. Direct Memory
Allocation
Ans:- b
47. Which of the
following is a storage device?
a. Tape
b. Hard Disk
c. Floppy Disk
d. All of the
above
Ans:- d
48. When did
John Napier develop logarithm?
a. 1416
b. 1614
c. 1641
d. 1804
Ans:- b
49. A normal CD-
ROM usually can store up to _________ _data?
a. 680 KB
b. 680 Bytes
c. 680 MB
d. 680 GB
Ans:- c
50. MIS is
designed to provide information needed for effective decision making by?
a. Consumers
b. Workers
c. Foremen
d. Managers
Ans:- d
Coming soon next
series-03
Comments
Post a Comment