1. The basic goal of computer process is to convert data into……

(1) information

(2) tables

(3)files

(4) graphs

(5) None of these

Answer : 1

2. ……… Software allows users to perform calculations on rows and columns ofdata.

(1)Word processing

(2) Presentation graphics

(3)DatabaseManagement Systems

(4) Electronic Spreadsheet

(5) None of these

Answer : 4

3. The memory resident portion of the operatingsystemis called the :

(1) registry

(2) API

(3) CMOS

(4) kernel

(5) None of these

Answer : 4

4. Which of the following is a transaction?

(1) A group of SQL statements consisting of one read and one write operation

(2) A group of SQL statements consisting only of ready operations.

(3) A group of SQL statements defining a user-oriented task

(4) A group of SQL statements consisting only of write operations.

(5) None of these

Answer : 3

5. In order for computers to communicate across a network, they must beconnected through a(n)………

(1) TCP/IP

(2) Topology

(3) Ethernet

(4) Thin client

(5) None of these

Answer : 2

6. “Buy Now – Pay Now” is commonly used for :

(1) Debit Cards

(2) Vault Cards

(3)Credit Cards

(4) E-purse

(5) None of these

Answer : 1

7. The ……… , stored on a ROM chip, is responsible for loading the operatingsystemfrom its permanentlocationon the hard drive into RAM.

(1) BIOS

(2) API

(3)device driver

(4) supervisor program

(5) display

Answer : 1

8. Choices in computers are referred to as :

(1) options

(2) exit

(3) boot

(4) folder

(5) None of these

Answer : 1

9. The ……… button on the quick access Toolbar allows you to cancel your recentcommands or actions.

(1) Search

(2) Cut

(3) Document

(4) Undo

(5) None of these

Answer : 4

10. During the boot process, the ……… looks for thesystemfiles.

(1) HDD

(2) BIOS

(3) CPU

(4) DVD

(5) CD

Answer : 2

11. Computers gather data, which means they allow users to…… data.

(1) present

(2) store

(3) output

(4) input

(5) None of these

Answer : 4

12. Which of the following is a transaction?

(1) A group of SQL statements consisting of one read and one write operation

(2) A group of SQL statements consisting only of ready operations.

(3) A group of SQL statements defining a user-oriented task

(4) A group of SQL statements consisting only of write operations.

(5) None of these

Answer : 3

13. What are the four basis connecting hardware devices?

(1) Repeater, bridge, router and gateway

(2) Repeater, bridge, router and dell

(3) Repeater, connector, router and gateway

(4) Amplifier, bridge, router and gateway

(5) None of these

Answer : 1

14. The ……… lists thelocationoffileson the disk

(1) FAT

(2) boot sector

(3) root folder

(4) data area

(5) None of these

Answer : 1

15. A device operating at the physical layer is called a :

(1) Bridge

(2) Router

(3) Repeater

(4) All of the above

(5) None of these

Answer : 3

16. Number of bits per symbol used in Baudot code is

(1) 5

(2) 6

(3) 7

(4) 8

(5) 9

Answer : 1

17. All of the following statements concerning windows are true EXCEPT :

(1) windows are an example of a command-driven environment.

(2) windows can be resized and repositioned onthe desktop.

(3) more than one window can be open at a time.

(4) toolbars and scrollbars are features of windows.

(5) None of these.

Answer : 1

18. A client / server network ……….

(1) has clients that provide functions such as application control and shared computation.

(2) uses client computers to provide copies of software to the server to allowserver processing.

(3) provides a company with the capability to downsize from lager computer systems and move away from legacy

systems.

(4) has server computers that perform all processing, clients are dumb’ input/ output devices only.

(5) None of these.

Answer : 2

19. To get to the ‘Symbol’ dialog box, click on the ……… menu and choose‘Symbol’.

(1) Insert

(2) Format

(3) Tools

(4) Table

(5) Help

Answer : 1

20. Which is not a data source component?

(1) mail merge toolbar

(2) header row

(3) data fields

(4)data records

(5) All of these

Answer : 1

21. Use this when you want to make all letters capital without having to use theshift key for each character………

(1) shifter

(2) upper case

(3) capslock key

(4) icon

(5) None of these

Answer: 3

22. When you quickly press and releaes the left mouse button twice, you are :

(1) Primary-clicking

(2) pointing

(3) Double-clicking

(4) Secondary-clicking

(5) None of these

Answer: 3

23. InWindows XP, if you want to seethe filesize and modified dates of all files ina folder, the best viewing option is the ……… view.

(1) List

(2) Thumbnails

(3) Details

(4) Icon

(5) None of these

Answer: 3

24. Programming language built into user programs such as Word andExcelareknown as ………

(1) 4GLs

(2) macro languages

(3) object-oriented languages

(4) visual programming languages

(5) None of these

Answer: 4

25. To move a copy of file from one computer to another over a communicationchannel is called?

(1)File transfer

(2)File encryption

(3) File modification

(4) File copying

(5) None of the above

Answer: 1

26. Which of the following is not a type of hub?

(1) Passive hub

(2) Inactive hub

(3) Switching hub

(4) Intelligent hub

(5) None of these

Answer: 2

27. …… allows you to print.

(1) ribbon

(2) monitor

(3) go now

(4) Control-P

(5) None of these

Answer: 4

28. Ina synchronous modem, the receive equilizer is known as

(1) adaptive equilizer

(2) imparimentequilizer

(3) statistical equalizer

(4) compromise equilizer

(5) None of these

Answer: 1

29. Which of the following is not the part of standard office suite?

(1) Word Processor

(2) Database

(3) Image Editor

(4) File manager

(5) None of these

Answer: 4

30. In a document what is the maximum number of columns that can be insertedinMS WordTable?

(1) 35

(2) 15

(3) 63

(4) 65

(5) 70

Answer: 3

31. Where does most data go first with in a computer memory hierarchy?

(1) RAM

(2) ROM

(3) BIOS

(4) CACHE

(5) None of these

Answer: 1

32. COBOL is an acronym for ………

(1) Common Business Oriented Language

(2)Computer BusinessOriented Language

(3) Common Business Operated Language

(4) Common Business Organized Language

(5) None of these

Answer: 1

33. Machine language sometimes also referred as :

(1) Binary language

(2) High level language

(3) Middle level language

(4) Low level language

(5) None of these

Answer: 1

34. When creating a computer program, the ……… designs the structure of theprogram

(1) End user

(2) System Analyst

(3) Programmer

(4) Architect

(5) All of the above

Answer: 2

35. Which is an another name for functional language

(1) Machine

(2) Application

(3) Low-level language

(4) High-level language

(5) None of these

Answer: 2

36. ……… is data that has been organized or presented in a meaningful fashion.

(1) A process

(2) Software

(3) Storage

(4) Information

(5) None of these

Answer: 4

37. Every computer connected to an intranet or extranet must have a distinct

(1) firewall

(2) proxy server

(3) IP address

(4) domain name

(5) None of these

Answer: 3

38. ……… translates the semantic instructions developed by programmers into themachine language

(1) Assembler

(2) Interpreter

(3) Loader

(4) Complier

(5) None of these

Answer: 1

39. ………is an artificial language designed to communicate instructions to acomputer.

(1) Programming language

(2) Machine language

(3) Software language

(4) Assembly language

(5) None of these

Answer: 1

40. This is a standard way for a Web server to pass a Web user’s request to anapplication program and to receive data back to forward to the user-

(1) Interrupt request

(2) Forward DNS lookup

(3) Data-Link layer

(4)File TransferProtocol

(5) Common gateway interface

Answer: 5

41.The capability of the operating system to enable two or more than twoprograms to execute simultaneously in asingle computersystem by using a singleprocessor is—

(1) Multiprocessing

(2) Multitasking

(3)Multiprogramming

(4) Multiexecution

(5) None of these

Answer: 2

42.Virtual memory is typically located:

(1) on a floppy disk

(2) in the CPU.

(3) in a flash card

(4) on the hard drive.

(5) None of these

Answer: 4

43.This type of software is designed for users who want to customize theprograms they use.

(1) Shareware

(2)Open-source software

(3) Freeware

(4) Macros

(5) None of these

Answer: 1

44.The effect of the ROLLBACK command in a transaction is the following —

(1) Undo all changes to the data- base resulting from the execution of the transaction

(2) Undo the effects of the last UPDATE command

(3) Restore the content of the database to its state at the end of the previous day

(4) Make sure that all changes to the database are in effect

(5) None of these

Answer: 1

45.A result of a computer virus cannot lead to :

(1) Disk Crash

(2) Mother Board Crash

(3) Corruption of program

(4) Deletion of files

(5) None of these

Answer: 2

46.The smallest item of useful information a computer can handle—

(1) bite

(2) byte

(3) bit

(4) bait

(5) None of these

Answer: 3

47.All of the following areTRUEof Safe Mode EXCEPT:

(1) Safe Mode is a special diagnostic mode.

(2) Safe Mode loads all nonessential icons.

(3) Safe Mode allows users to troubleshoot errors.

(4) Safe Mode loads only the most essential devices.

(5) None of these

Answer: 2

48.Superscript, subscript, outline, emboss, engrave are known as :

(1)font styles

(2) font effects

(3)word art

(4) text effects

(5) None of these

Answer: 2

49.Changing the appearance of a document is called

(1) Proofing

(2) Editing

(3) Formatting

(4) Correcting

(5) All of the above

Answer: 3

50.You can detectspelling and grammarerrors by :

(1) Press Shift + F7

(2) Press Ctrl + F7

(3) Press Alt+ F7

(4) Press F7

(5) None of these

Answer: 4

51.What kind of memory is both static and non-volatile?

(1) RAM

(2) ROM

(3) BIOS

(4) CACHE

(5) PROM

Answer: 2

52.A process known as — is used by large organization to study trends.

(1) data mining

(2) data selection

(3) POS

(4) data conversion

(5) None of these

Answer: 1

53.A(n) — system is a small,wireless handheld computerthat scans an item’s tagand pulls up the current price (and any special offers) as you shop.

(1) PSS

(2) POS

(3) inventory

(4) data mining

(5) None of these

Answer: 1

54.— cells involve creating a single cell by combining two or more selected cells.

(1) Formatting

(2) Merging

(3) Embedding

(4) Splitting

(5) None of these

Answer: 2

55.Single partydisk relying on the diskcontroller forfinding out which disk hasfailed is used by :

(1) RAID level 5

(2) RAID level 2

(3) RAID level 4

(4) RAID level 3

(5) RAIDlevel 1

Answer: 4

56.The sharing of a medium and its path by 2 or more devices is called —

(1) Modulation

(2) Encoxing

(3) Line discipline

(4) Multiplexing

(5) None of these

Answer: 4

57.What happens when you click on Insert > Picture > Clip Art

(1) It inserts a clipart picture into document

(2) It lets you choose clipart to insert into document

(3) It opens Clip Art taskbar

(4) It insets symbols

(5) None of these

Answer: 3

58.Which of the following doesNOToccur during the power-on self-test (POST)?

(1) The ScanDisk utility begins to run.

(2) The video card and video memory are tested.

(3) The BIOS identification process occurs.

(4) Memory chips are checked to ensure they are working properly.

(5) None of these

Answer: 1

59.OLE stands for :

(1) Online Link Embedding

(2) Object Link Export

(3) Object Linking and Embedding

(4) Online Link Emulation

(5) None of these

Answer: 3

60.Which of the following is not available in Font Spacing?

(1) Normal

(2) Loosely

(3) Condensed

(4) Expanded

(5) All are available

Answer: 2

61.The purpose of a swap (or page) file is to:

(1) maintain pages of documents that are being spooled to the printer.

(2) hold a program’s data or instructions in virtual memory when it can’t fit in RAM.

(3) prevent thrashing in a multitasking environment.

(4) allow multipleprint jobsto print their pages out simultaneously.

(5) None of these

Answer: 2

62.Software programs that allow you to legally copy files and give them away atno cost are called which of the

following :

(1) Time sharing

(2) Public domain

(3) Shareware

(4) Freeware

(5) None of these

Answer: 3

63.Which of the following isNOTa goal ofTransaction processing system?

(1) Capture, process and store transactions

(2) Produce a variety of documents related to Routine business activities

(3) Reduce manual effort associated with Processing business transactions

(4) Produce standard reports used forManagement decisionmaking

(5) None of the above

Answer: 2

64.The degree of detail that should be incorporated into a database depends onwhat?

(1) Data integrity

(2) The type of database

(3) The user’s perspective

(4) The business practices and policies

(5) None of these

Answer: 2

65.Superscript refers to —

(1) Characters displayed below the line of the normal text

(2) Characters displayed above the line of the normal text

(3) Characters displayed vertically centre

(4) Both (1) and (2)

(5) None of these

Answer: 2

66.A — is an additional set of commands that the computer displays after youmake a selection from the main menu :

(1) dialog box

(2) submenu

(3) menu selection

(4) All of the above

(5) None of these

Answer: 1

67.The difference between people with access to computers and the Internet andthose without this access is known as the :

(1) digital divide

(2) Internet divide

(3) Web divide

(4) broadband divide

(5) None of these

Answer: 1

68.How will you remove all formatting added to your documents (such as bold,italics, and underline etc.)

(1) Save

(2) Save as plaintext file

(3) Save as

(4) All of the above

(5) None of these

Answer: 2

69.With the object-oriented (OO) approach, an object encapsulates, or — aprogrammer.

(1) carries out,the detailsof an object for

(2) hides,the detailsof an object from

(3) reveals,the detailsof an object to

(4) extends,the detailsof an object beyond

(5) None of these

Answer: 2

70.The ability to recover and read deleted or damaged files from a criminal’scomputer is an example of a law enforcement specialty called :

(1) robotics

(2) simulation

(3) computer forensics

(4) animation

(5) None of these

Answer: 3

71.Granting an outside organisation access to Internet web pages is oftenimplemented using a (an) :

(1) Extranet

(2) Intranet

(3) Internet

(4) Hacker

(5) None of these

Answer: 1

72.The purpose of the primary key in a database is to :

(1) Unlock the database

(2) Provide a map of the data

(3) Uniquely identify a record

(4) Establish constraints on database operations

(5) None of the above

Answer: 3

73.The code thatrelational database management Systemsuse to perform theirdatabase task is referred to as :

(1) QBE

(2) SQL

(3) OLAP

(4) Sequel Server

(5) None of these

Answer: 2

74.VIRUS stands for :

(1)Vital InformationRecourse Under Siege

(2)Vital InformationReason Under Siege

(3)Vital InformationRecourse Under System

(4) Virus Information Recourse Under Siege

(5) None of these

Answer: 1

75.Data becomes ...... when it is presented in a format that people canunderstand and use.

(1) processed

(2) graphs

(3) information

(4) presentation

(5) None of these

Answer: 3

76.The term ...... designates equipment that might be added to a computersystem to enhance its functionality.

(1) digital device

(2) system add-on

(3) disk pack

(4) peripheral device

(5) None of these

Answer: 4

77.……… is the language that enable user to access or manipulate data asorganized by appropriate data model :

(1) DML

(2) SDL

(3) DDL

(4) All of the above

(5) None of these

Answer: 1

78.The user commands that are used to interact with a database is called as :

(1) Query

(2) Interaction

(3) Command

(4) Instruction

(5) None of these

Answer: 3

79.RAM can be thought of as the ...... for the computer’s processor :

(1) factory

(2) operating room

(3) waiting room

(4) planning room

(5) None of these

Answer: 3

80.……… is computer software designed to operate the computer hardware andto provide platform for runningapplicationsoftware :

(1)Applicationsoftware

(2) System software

(3) Software

(4) Operating system

(5) None of these

Answer: 2

81.An assembler is used to translatea programwritten in………

(1) a low level language

(2) machine language

(3) a high level language

(4) assembly language

(5) None of these

Answer:4

82.The operating system controls access to the processor by assigning a(n) ………to each task requiring the processor’s attention.

(1) CPU

(2) slice of time

(3) stack

(4) event

(5) None of these

Answer:2

83.Which of the following is the correct sequence of actions that takes placeduring the boot-up process?

(1) Load operating system - Activate BIOS-Perform POST-Check configuration settings

(2) Activate BIOS-Perform POST-Load operating system-Check configuration settings

(3) Perform POST - Load operating system - Activate BIOS - Check configuration settings

(4) Activate BIOS - Check configuration settings - Perform POST -Load operating system

(5) None of these

Answer:2

84.Using Windows Explorer, a plus (+) sign in front of a folder indicates :

(1) an open folder

(2) the folder contains subfolders

(3) atext file

(4) a graphics file

(5) None of these

Answer:2

85.Which of the following position is not available for fonts onMS Word?

(1) Normal

(2) Raised

(3) Lowered

(4) Centered

(5) All are available

Answer:4

86.“Buy Now – Pay Later” is commonly used for :

(1) Debit Cards

(2) Vault Cards

(3) Credit Cards

(4) E-purse

(5) None of these

Answer:3

87.The different styles ofletteringin a word processing program……

(1) font

(2) calligraphy

(3) writing

(4) manuscript

(5) None of these

Answer:1

88.To move down a page in a document……

(1) jump

(2) fly

(3) wriggle

(4) scroll

(5) None of these

Answer:4

89.Compilers can identify:

(1) syntax errors

(2) semantic errors

(3) logical errors

(4) mathematical errors

(5) None of these

Answer:1

90.Which was the first ScientificComputer Programming Language?

(1) COBOL

(2) LISP

(3) ADA

(4) FORTRAN

(5) JAVA

Answer: 4

91.A hard copy of a document is …

(1) stored in the hard disk

(2) stored on a floppy

(3) stored on a CD

(4) printed on the paper

(5) None of these

Answer:4

92.Flow control in TCP/IP is handled using:

(1) Urgent pointer

(2) Checksum

(3)Acknowledgementnumber

(4) Variable-size sliding window

(5) None of these

Answer:4

93.This component is required to process data into information and consists ofintegrated circuits .

(1) Hard disk

(2) RAM

(3) CPU

(4) ROM

(5) None of these

Answer:3

94.From which menu you can insert Header and Footer?

(1) Insert Menu

(2) View Menu

(3) Format menu

(4) Tools Menu

(5) Edit Menu

Answer:2

95.Moves the cursor one space to the right to puts spaces in between words……

(1)control key

(2) space bar

(3) printer

(4) mouse

(5) None of these

Answer:2

96.Shimmer, Sparkle text, Blinking Background etc. are known as :

(1)font styles

(2) font effects

(3)word art

(4) text effects

(5) None of these

Answer:4

97.The horizontal and vertical lines on a worksheet are called :

(1) cells

(2) sheets

(3) block lines

(4) gridlines

(5) None of these

Answer:4

98.The basic input/output system (BIOS) is stored in:

(1) RAM

(2) ROM

(3) the CPU

(4) the hard drive

(5) None of these

Answer:2

99.Which of the following features usually applies to data in a data warehouse?

(1) Data are often deleted

(2) Most applications consists of transactions

(3) Data are rarely deleted

(4) Relatively few records are processed by applications

(5) None of these

Answer:2

100.What type of program controls the various computer parts and allows theuser interact with the computer ?

(1) Utility software

(2) Operating system

(3) Word processing software

(4)Database program

(5) None of these

Answer:1

101.Which of the following is an example of connectivity?

(1) data

(2) hard disk

(3) Internet

(4)power cord

(5) None of these

Answer :3

102.The command used to remove text or graphics from a document. Theinformation is then stored on a clipboard so you can paste it.

(1) chop

(2) cut

(3) clip

(4) cart away

(5) None of these

Answer :2

103.People, procedures, software, hardware, and data are the five parts of a(n) :

(1) competency system

(2) computer system

(3) information system

(4) software system

(5) None of these

Answer :3

104.The feature of Word that automatically adjusts the amount of spacebetween certain combinations of characters so that an entire word looks moreevenly spaced. What is that feature called?

(1) Spacing

(2) Scaling

(3) Kerning

(4) Positioning

(5) None of these

Answer :3

105.Which of the following statement is wrong?

(1) Windows XP is an operating system

(2) Linux is owned and sold by Microsoft