Harikesh Yadav
1. For the purposes of defining data needs, a responsibility area is–
(A) marketing (B) personnel
(C) administration (D) finance
Check Answer:

2. The problem statement should include all of the following except–
(A) input (B) output
(C) processing (D) storage
Check Answer:

3. Gmail, a free web-based email service operated by which company–
(A) Apple (B) Google
(C) Microsoft (D) Yahoo
Check Answer:

4. A collection of 4 binary digits is known as–
(A) Half Bit (B) 1/2 KB
(C) Byte (D) Nibble
Check Answer:

5. Which of the following is not a part of the CPU?
(A) Arithmetic and Logic Unit (B) storage Unit
(C) program Unit (D) control Unit
Check Answer:

6. How many options does a binary choice offer?
(A) None (B) One
(C) Two (D) It depends on the amount of memory in the computer
Check Answer:

7. ………………… collection of web pages and ………………… the very first page that
we Check on opening of
a web-site.
(A) Home page, Web-page (B) Web-site, Home-page
(C) Web-page, Home-page (D) Web-page, Web-site
Check Answer:

8. When the pointer is positioned on a ………………… is shaped like a hand.
(A) Grammar error (B) Hyperlink
(C) Screen tip (D) Spelling error
Check Answer:

9. The…………………..of a system includes the programs or instructions.
(A) Hardware (B) Icon
(C) Information (D) Software
Check Answer:

10. ‘www’ stands for–
(A) world word web (B) world wide web
(C) world white web (D) world work web
Check Answer:

11. The internet is–
(A) a large network of networks
(B) an internal communication system for a business
(C) a communications system for the Indian government
(D) All of these
Check Answer:

12. Which of the following statements is FALSE concerning file names ?
(A) Files may share the same name or the same extension but not both
(B) Every file in the same folder must have a unique, name
(C) File extension is another name for file type
(D) The file extension comes before the dot (.) followed by the file name
Check Answer:
13. Which of the following would most likely NOT be a symptom of a virus ?
(A) Existing program files and icons disappear
(B) The CD-ROM stops functioning
(C) The Web browser opens to an un-usual home page
(D) Odd messages or images are displayed on the screen
Check Answer:

14. What is a back up ?
(A) Restoring the information backup
(B) An exact copy of a system’s information
(C) The ability to get a system u and running in the event of a system crash or
(D) All of these
Check Answer:

15. ………………….. are lists of commands that appear on the screen.
(A) GUIs (B) Icons
(C) Menus (D) Windows
Check Answer:

16. How many common file type are there–
(A) one (B) six
(C) five (D) two
Check Answer:

17. Punched cards use–
(A) alphanumeric code (B) Hollerith code
(C) EBCDIC code (D) ASCII code
Check Answer:

18. Trojan-horse programs–
(A) are legitimate programs that allow unauthorized access
(B) are hacker programs that do not show up on the system
(C) really do not usually work
(D) usually are immediately discovered
Check Answer:

19. Hydra–
(A) capability based protection system (B) provides considerable flexibility
(C) both ‘A’ and ‘B’ (D) not define
Check Answer:

20. Program threats are–
(A) Trojan horse (B) trap doors
(C) both ‘A’ and ‘B’ (D) worm
Check Answer:

Share this Article
Leave a comment