0% found this document useful (0 votes)
58 views

RR B Comp Utrera We Rness MCQ

Uploaded by

minkunarah54321
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views

RR B Comp Utrera We Rness MCQ

Uploaded by

minkunarah54321
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

.

ASCII and EBCDIC are the popular character coding systems.


What does EBCDIC stand for?
a) Extended Binary Coded Decimal Interchange Code
b) Extended Bit Code Decimal Interchange Code
c) extended Bit Case Decimal Interchange Code
d) Extended Binary Case Decimal Interchange Code
The two kinds of main memory are:

a) Primary and secondary


b) Random and sequential
c) ROM and RAM
d) All of above
Which web browser is provided default with a window
machine?
a) Opera
b) IE
c) Chrome
d) Mosaic
Which company bought the popular video teleconferencing
software ‘Skype’?
a) Google
b) Accenture
c) Oracle
d) Microsoft
A common boundary between two computer systems is
known as
a. interdiction
b. Surface
c. Interface
d. None of the above
Unix operation system was developed in
a. Bell Lab
b. Microsoft lab
c. IBM lab
d. Intel lab
Which one is used for making presentation file from Microsoft
Office package?
a. Microsoft Office
b. MS Excel
c. MS Word
d. MS Power point
Which function key needs to be press during reboot to
enter in Safe Mode of a Windows Machine?
a. F8
b. F2
c. F1
d. F9
Which one is the latest release of Windows Client Operating
System?
a. Window XP
b. Window 7
c. Window 8
d. Window 10
Which key combination is used to close a open application in
Window machine?
a. Alt+F8
b. CTRL+X
c. Alt+F4
d. Shift
.
What is the maximum number of Primary Partitions that can
be created on a Hard-disk?
a. 1
b. 2
c. 3
d. 4
What is the maximum size of a word document created?
a. 1MB
b. 32 MB
c. 16 MB
d. 999 KB
A set of flip flops integrated together is called …..
a. .Counter
b. Adder
c. Register
d. None of these
People often call _____ as the brain of computer
system
a. Control Unit
b. Arithmetic Logic Unit
c. Central Processing Unit
d. Storage Unit
Magnetic disks are the most popular medium for

a. Direct access
b. Sequential access
c. Both of above
d. None of above
A set of flip flops integrated together is called …..
a. Counter
b. Adder
c. Register
d. None of these
People often call _____ as the brain of computer system
a. Control Unit
b. Arithmetic Logic Unit
c. Central Processing Unit
d. Storage Unit
Which of the following storage devices can store maximum
amount of data?
a. Floppy disk
b. Hard Disk
c. Compact Disc
d. Optical Disc
Chief component of first generation computer was
a. Transistors
b. Vacuum Tubes
c. Integrated Circuits
d. None of above
A dumb terminal has

a. An embedded microprocessor
b. Extensive memory
c. Independent processing capability
d. A key board and screen
One millisecond is

a. 1 second
b. 10th of a seconds
c. 1000th of a seconds
d. 10000th of a seconds
When you save to this, your data will remain intact even when the
computer is turned off-
a) RAM
b) Motherboard
c) Secondary storage device
d) Primary storage device
2. A central computer that holds collections of data and programs
for many PCs, workstations, and other computers is a (n)-
a) supercomputer
b) minicomputer
c) laptop
d) server
3. The____folder retains copies of messages that you have started
but are not yet ready to send.
a) Drafts
b) Outbox
c) Address Book
d) Sent Items
. Grouping and processing all of a firm’s transactions at one time
is called-
a) a database management system
b) Bach processing
c) a real-time system
d) an on-line system
The____ enables you to simultaneously keep multiple Web pages
open in one browser window.
a) tab box
b) pop-up-helper
c) tab row
d) address bar
. Which ports connect special types of music
instruments to sound cards?
a) BUS
b) CPU
c) USB
d) MIDI
You can___ a search by providing more
information the search engine can use to select a
smaller, more useful set of results.
a) refine
b) expand
c) load
d) query
What is the permanent memory built into your computer called?
a) RAM
b) Floppy
c) CPU
d) ROM
What displays the contents of the active cell in Excel?
a) Namebox
b) Row Headings
c) Formulabar
d) Taskpane
The piece of hardware that converts your computer’s digital signal
to an analog signal that can travel over telephone lines is called a-
a) red wire
b) blue cord
c) tower
d) modem
Computer uses the ____ number system to store data and
perform calculations.
a) binary
b) octal
c) decimal
d) hexadecimal
A disk’s content that is recorded at the time of manufacture and
that cannot be changed or erased by the user is-
a) Memory-only
b) Write-only
c) Once-only
d) Read-only
Which of the following can be used to select the entire document?
a) CTRL + A
b) ALT + F5
c) SHIFT + A
d) CTRL + K
______are attempts by individuals to obtain confidential
information from you by falsifying their identity.
a) Phishing
b) Computer viruses
c) Spyware scams
d) Viruses
_____Part number, part description and number of parts ordered
are examples of-
a) control
b) output
c) processing
d) input
A Web site’s main page is called its-
a) Home Page
b) Browser Page
c) Search Page
d) Bookmark
the simultaneous processing of two or more programs by
multiple processor is-
a) multiprogramming
b) multitasking
c) time-sharing
d) multiprocessing
Codes consisting of line of varying widths or lengths that are
computer-readable are known as-
a) an ASCII code
b) a magnetic tape
c) an OCR scanner
d) a bar code
To instruct Word to fit the width of a column to the contents of a
table automatically, click the _____button and then point to
AutoFit Contents.
a) Fit to Form
b) Format
c) Autosize
d) AutoFit
why is it unethical to share copyrighted files with your friends?
a) It is not unethical, because it is legal.
b) It is unethical because the files are being given for free.
c) Sharing copyrighted files without permission breaks copyright
laws.
d) It is not unethical because the files are being given for free.
Unauthorised copying of software to be used for personal gain
instead of for personal backup is called
a) program thievery
b) data snatching
c) software piracy
d) program looting
Junk e-mail is also called
a) spam
b) spoof
c) cookie crumb
d) sniffer script
What is usually used for displaying information at public places?
a) Monitors
b) Overhead Projections
c) Monitors and Overhead Projection
d) touch Screen Kiosks
What is MP3?
a) A Mouse
b) A Printer
c) A Sound format
d) A Scanner
What is the most popular hardware for multimedia
creations?
a) PCs
b) Minicomputers
c) Mainframe Computers
d) WANs
Which of the following is needed for sound
recording?
a) Speaker
b) Microphone
c) Talker
d) Mouse
the life span of a CD-ROM is
a) approximately one year
b) approximately two years
c) approximately five years
d) approximately twenty-five years
The____ setting are automatic and standard.
a) default
b) CPU
c) peripheral
d) user-friendly
What are the two parts of an –mail address?
a) User name and street address
b) Use name and domain name
c) Initials and password
d) User name and recipient name
If you wish to extend the length of the network without having the
signal degrade, you would use a
a) router
b) gateway
c) switch
d) repeater
A repair for a known software bug, usually available at no charge
on the internet, is called
a) version
b) patch
c) tutorial
d) FAQ
URL stands for
a) Universal Research List
b) Universal Resource List
c) Uniform Research Locator
d) Uniform Resource Locator
When data changes in multiple lists and all lists are not updated,
this causes
a) data redundancy
b) information overload
c) duplicate data
d) data inconsistency
What is a backup?
a) Restoring the information backup
b) An exact copy of a system’s information
c) The ability to get a system up and running in the event of a
system crash or failure
d) all of these
The Internet is
a) a large network of networks
b) an internal communication system for a business
c) a communication system for the Indian government
d) a communication system for some states of India
e) a communication system for some cities of India
Computers that are portable and convenient for users who travel are
known as
a) supercomputers
b) planners
c) minicomputers
d) laptops
What is the storage area for e-mail messages called?
a) A folder
b) A mail box
c) A directory
d) The hard disk
One advantage of dial-up Internet access is that
a) it utilizes broadband technology
b) it is Indian
c) it uses a router for security
d) it utilizes existing telephone service
what is the process of copying software programs from
secondary storage media to the hard disk called?
a) Configuration
b) Download
c) Storage
d) Installation
When the pointer is positioned on a ____, it is shaped like a
hand.
a) Grammar error
b) Screen Tip
c) Spelling error
d) hyperlink
Personal computers can be connected together to from a-
a) server
b) supercomputer
c) network
d) enterprise
A ____ is the term used when a search engine returns a Web
page that matches the search criteria.
a) blog
b) hit
c) link
d) success
_____are word that a programming language has set aside for its
own use.
a) Control words
b) Control structures
c) Reserved words
d) Reserved keys
Mobile Commerce is best described as-
a) The use of Kiosks in marketing
b) Transporting products
c) Buying and selling goods/ services through wireless hand- held
devices
d) Using notebook PC’s in marketing

You might also like