Q.1.If you wish to extend the length of the network without
having the signal degrade, you would use a ………………
- resonance
- router
- gateway
- switch
- repeater
Q.2.A repair for a known software bug, usually available at no charge on the
Internet, is called a ………………
- version
- patch
- tutorial
- FAQ
- rectifier
Q.3.URL stands for ………………
- Universal Research List
- Universal Resource List
- Uniform Research List
- Uniform Research Locator
- Uniform Resource Locator
Q.4.When data changes in multiple lists and all lists are not updated, this
causes ………………
- data redundancy
- information overload
- duplicate data
- data inconsistency
- data repetition
Q.5.What is a backup ?
- Restoring the information backup
- An exact copy of a system's information
- The ability to get a system up and running in the event of a system crash or failure
- All of these
- None of these
Q.6.The Internet is ………………
- a large network of networks
- an internal communication system for a business
- a communication system for the Indian government
- a communication system for some states of India
- a communication system for some cities of India
Q.7.What is the storage area for e-mail messages called ?
- A folder
- A mailbox
- A directory
- The hard disk
- None of these
Q.8.Computers that are portable and convenient for users
who travel are known as..................
- supercomputers
- planners
- minicomputers
- file servers
- laptops
Q.9.What is the process of copying software programs from
secondary storage media to the hard disk called ?
- configuration
- download
- storage
- upload
- installation
Q.10.One advantage of dial-up Internet access is
- it utilises broadband technology
- it is Indian
- it uses a router for security
- modem speeds are very fast
- it utilises existing telephone service
Q.11.Which process checks to ensure that the components of
the computer are operating and connected properly ?
- Booting
- Processing
- Saving
- Editing
- Starting
Q.12.An error in a computer program………………
- Crash
- Power Failure
- Bug
- Virus
- Fatal error
Q.13.A means of capturing an image (drawing or photo) so
that it can be stored on a computer is………………
- Modem
- Software
- Scanner
- Keyboard
- Mouse
Q.14.Access-control based on a person's fingerprints is .an
example of………………
- biometric identification
- characteristic identification
- characteristic security
- fingerprint security
- logistics
Q.15.Most mail programs automatically complete the
following two parts in an e-mail..........
- From: and Body :
- From: and Date :
- From: and To :
- From: and Subject :
- None of these
Q.16.The patterns of printed lines on most products are
called………………
- prices
- striping
- scanners
- OCR
- barcodes
Q.17.Physical security is concerned with protecting
computer hardware from human tampering and natural disasters and ………………security
is concerned with protecting software from unauthorized tampering or damage.
- data
- cyber
- Internet
- metaphysical
- publicity
Q.18.The computer's capability of distinguishing spoken
words is called ………………
- voice analysis
- speech acknowledgement
- voice recognition
- speech interpretation
- vocalisation
Q.19.The software that allows users to surf the Internet is
called a/an ………………
- Search Engine
- Internet Service Provider (ISP)
- Multimedia Application
- Browser
- Internet Surfing Provider
Q.20.The first page of a Website is called the ………………
- Homepage
- Index
- Java Script
- Bookmark
- Intro Page
Q.21.Which of the following is an advantage of mounting an
application on the Web ?
- The possibility of 24-houraccess for users
- Creating a system that can extend globally
- Standardising the design of the interface
- All of these
- None of these
Q.22.ERP is an acronym for ………………
- Enterprise Retirement Planning
- Enterprise Relationship Planning
- Enterprise Resource' Planning
- Enterprise Reorder Planning
- Enterprise Retention Planning
Q.23.What is usually used for displaying information at
public places ?
- Monitors
- Overhead Projections
- Monitors and Overhead Projections
- Touch Screen Kiosks
- Loud Speakers
Q.24.Unauthorised copying of software to be used for
personal gain instead of for personal backups is called ………………
- program thievery
- data snatching
- software piracy
- program looting
- data looting
Q.23.The issues that deal with the collection and use of
data about individuals is ………………
- access
- publicity
- accuracy
- property
- privacy
Q.24.Hackers ………………
- all have the same motive
- are people who maintain computers
- may legally break into computers as long as they do not do any damage
- are people who are allergic to computers
- break into other people's computers
Q.25.A term related to sending data to a satellite is
………………
- downlink
- modulate
- demodulate
- uplink
- interrelate
Q.26.Online documents containing underlined phrases or
icons that a user can click in order to move immediately to related parts of
the current document or to other documents with related information is called
………………
- hypermedia
- hypertext
- HTML
- URL
- FTP
Q.27.Junk e-mail is also called ………………
- spam
- spoof
- cookie crumbs
- sniffer script
- spill
Q.28.What is MP3 ?
- A Mouse
- A Printer
- A Sound Format
- A Scanner
- A Mobile Phone
Q.29.Magnetic tape is not practical for applications where
data must be quickly recalled because tape is ………………
- a random-access medium
- expensive
- a read-only medium
- fragile and easily damaged
- a sequential-access medium
Q.30.What is the most popular hardware for multimedia
creations ?
- PCs
- Minicompiiters
- Mainframe Computers
- WANs
- Super Computers
Q.31.For sound recording, what is necessary ?
- Speaker
- Microphone
- Talker
- Mouse
- Telephone
Q.32.The life-span of a CD-ROM is………………
- approximately one year
- approximately two years
- approximately five years
- approximately twenty-five years
- almost unlimited
Q.33.What are the two parts of an E-mail address ?
- User name and street address
- Legal name and phone number
- User name and domain name
- Initials and password
- User name and Recipient name
Q.34.How is it possible that both programs and data can be
stored on the same floppy disk ?
- A floppy disk has two sides, one for data and one for programs
- A floppy disk has to be formatted for one or for the other
- Programs & data are both software & both can be stored on any memory device
- Floppy disks can only store data, not programs
- Floppy disks are better than CDs
- default
- CPU
- peripheral
- user frien9ly
- defaulter
Q.36.What is an embedded system ?
- A program that comes wrapped in a box
- A program that is permanently part of a computer
- A computer that is part of a larger computer
- A computer and software system that controls a machine or appliance
- None of these
Q.37.For viewing video CDs, you would use………………
- CD Player
- Windows Media Player
- Windows Video Player
- Windows Movie Player
- None of these
- electronic mail system
- message system
- tele-conference
- bulletin board
- None of these
Q.39.Why should you delete unknown e-mail attachments ?
- You could go to jail
- The person could track you down and hurt you
- It is bad manners
- It might contain a virus that could hurt your computer
- None of these
Q.40.Which of the following will you require to hear music
on your computer ?
- Video Card
- Tape Recorder
- Mouse
- Joy Stick
- Sound Card
Q.41.The signal that a computer is waiting for a command
from the user is ………………
- prompt
- event
- time slice
- interrupt
- None of these
Q.42.This software allows the user to move from page to
page on the Web by clicking on or selecting a hyperlink, or by typing in the
address of the destination page ………………
- Web browser
- Web search engine
- Web homepage
- Web service
- None of these
- Ans : (A)
Q.43.Which of the following controls the manner of
interaction between the user & the operating system ?
- language translator
- platform
- user interface
- icon
- None of these
Q.44.Executing more than one program concurrently by one
user on one computer is known as ………………
- multi-programming
- multi-processing
- time-sharing
- multi-tasking
- multi-action
Q.45.You can keep your personal flies / folders in ………………
- My Folder
- My Documents
- My Files
- My Text
- My Collection
Q.46.All computers must have ………………
- Word processing software
- An operating system
- A printer attached
- A virus checking program
- None of these
- CD-W
- CD-RAM
- CD-DVD
- CD-RW
- None of these
Q.48.Collecting personal information and effectively posing
as another individual is known as the crime of ………………
- spooling
- spoofing
- hacking
- identity theft
- None of these
Q.49.The metal or plastic case that holds all the physical parts of the computer is the:
- System Unit.
- CPU.
- Mainframe.
- Platform.
- The Platform
- The Operating System
- Application Software
- The Motherboard