Harikesh Yadav
1. A temporary storage are, used generally for cut/copied of text or graphics–
(A) buffer (B) clip board
(C) window (D) none of these
Check Answer:

2. The term ‘operating system’ refers to–
(A) a set of programs which controls computer working
(B) the way a computer operator works
(C) conversion of high level language into machine language
(D) the way a floppy disk drive operates
Check Answer:

3. The term used to refer to horizontal page orientation–
(A) portrait (B) alignment
(C) table (D) landscape
Check Answer:

4. The ascending order of a data hierarchy is–
(A) bit, byte, field ,record, file, database
(B) bite, byte, record, field, file, database
(C) byte, bit ,field, record, file, database
(D) byte, bit, record, field, file, database
Check Answer:

5. What are symbol used to identify items in a list?
(A) icons (B) markers
(C) bullets (D) graphics
Check Answer:

6. How are data organized in a spread-sheet?
(A) Lines & spaces (B) Layers & Planes
(C) Height & Width (D) Rows & Columns
Check Answer:

7. The blinking symbol on the computer screen is called the–
(A) mouse (B) logo
(C) hand (D) cursor
Check Answer:

8. One megabyte equals approximately–
(A) 1,000 bits (B) 1,000 bytes
(C) 1 million bytes (D) 1 million bits
Check Answer:

9. Data going into the computer is called?
(A) Output (B) Algorithm
(C) Input (D) Calculations
Check Answer:

10. Which of the following refers to the memory in your computer?
Check Answer:

11. What is the ultimate purpose of Defragmentation ?
(A) Make the PC faster (B) Create more free space
(C) Delete temporary files (D) Reduce power consumption
Check Answer:

12. Computers process data into information by working exclusively with–
(A) multimedia (B) words
(C) characters (D) numbers
Check Answer:

13. You must install a/an ………………….. on a network if you want to share a
broadband Internet connection.
(A) router (B) modem
(C) node (D) cable
Check Answer:

14. The purpose of the primary key in a database is to–
(A) unlock the database (B) provide a map of the data
(C) uniquely identify a record (D) establish constraints on database operations

Check Answer:

15. The design of the network is called the network–
(A) architecture (B) server
(C) transmission (D) type
Check Answer:

16. Which of the following language support garbage collection–
(A) java (B) C++
(C) C (D) small talk
Check Answer:

17. Procedural programming language is–
(C) C++ (D) PASCAL
Check Answer:

18. PASCAL is–
(A) structured programming language (B) procedural programming
(C) monolithic programming (D) object oriented
Check Answer:

19. Class is–
(A) a template which associates code and data
(B) data-abstraction
(C) implementation of abstract data type
(D) object oriented
Check Answer:

20. The most common system security method is–
(A) password (B) encryption
(C) fire wall (D) all of the above
Check Answer:

Share this Article
Leave a comment