Escolar Documentos
Profissional Documentos
Cultura Documentos
7. Which of the following refers to the rectangular area for displaying information and running
programs?
a) Desktop b) Dialog box c) Menu
d) Window e) None of these
8. is a windows utility program that locates and eliminates unncessary fragments and
rearranges filed and unused disk space to optimize operations
a) Backup b) Disk cleanup c) Disk defragmenter
d) Restore e) None of these
9. Which of the following refers to too much electricity and may cause a voltage surge?
a) Anomaly b) Shock c) Spike
d) Virus e) None of these
10. The software that is used to create text-based documents are referred to as
a) DBMS b) Suites c) Spreadsheets
d) Word processors e) None of these
11. devices convert human understandable data and programs into a form that the
computer can process.
a) Printing b) Output c) Solid state
d) Input e) None of these
12. Allows users to upload files to an online site so they can be viewed and edited from another
location
a) General purpose applications
b) Microsoft Outlook
c) Web-hosted technology
d) Office live
e) None of these
13. What feature adjusts the top and bottom margins so that the text is centered vertically on the
printed page?
a) Vertical justifying
b) Vertical adjusting
c) Dual centering
d) Horizontal centering
e) None of these
15. What is the overall term for creating editing, formatting, storing, retrieving and printing a text
document?
a) Word processing b) Spreadsheet design c) Web design
d) Database management e) None of these
16. Fourth generation mobile technology provides enhanced capabilities allowing the transfer of both
data, including full-motion video, high-speed internet access, and video conferencing.
a) video data and information
b) voice and non-voice
c) music and video
d) video and audio
e) None of these
17. is a form of denial of service attack in which a hostile client repeatedly sends SYN
packets to every port on the server using fake IP addresses.
a) Cybergaming crime
b) Memory shaving
c) Syn flooding
d) Software piracy
e) None of these
19. A set of rules for telling the computer what operations to perform is called a
a) procedural language
b) structures
c) natural language
d) programming language
e) None of these
20. A detailed written description of the programming cycle and the program, along with the test
results and a printout of the program is called
a) documentation
b) output
c) reporting
d) spec sheets
e) None of these
21. Forms that are used to organize business data into rows and coloumns are called
a) transaction sheets
b) registers
c) business forms
d) spread sheets
e) None of these
22. In power point, the header and footre button can be found on the insert tab in what group?
a) Illustrations group
b) Object group
c) Text group
d) Tables group
e) None of these
23. A(n) is a set of programs designed to manage the resources of a computer, including
starting the computer, managing programs, managing memory and coordinating tasks between
input and output devices.
a) application suite
b) compiler
c) input/output system
d) operating system
e) None of these
25. The PC productivity tool that manipulates data organized in rows and coloumn is called a
a) spreadhsheet
b) word processing document
c) presentation mechanism
d) database record manager
e) None of these
28. A(n) program is one that is ready to run and does not need to be altered in any way.
a) Interpreter b) High level c) Compiler
d) Executable e) None of these
29. Usually downloaded into folders that hold temporary internet files, are written to your
computer's hard disk by some of the websites you visit.
a) anonymous files
b) behaviour files
c) banner ads
d) cookies
e) None of these
30. What is the easiest way to change the phrase, revenues, profits, gross margin, to read revenues,
profits, and gross margin?
a) Use the insert mode, position the cursor before the g in the gross, then type the word and
followed by a space
b) Use the insert mode, position the cursor after the g in gross, then type the word and followed
by a space
c) Use the overtype mode, position the cursor before the g in gross, then type the word and
followed by a space
d) None of these
31. A program either talk or music, that is made available in digital format for automatic download
over the internet is called a
a) Wiki b) Broadcast c) Vodcast
d) Blog e) None of these
32. Which power point view displays each slide of the presentation as a thumbnail and is useful for
rearranging slides?
a) Slide sorter b) Slide show c) Slide master
d) Notes page e) None of these
33. Different components on the motherboard of a PC unit are linked together by se ts of parallel
electrical conducting lines. What are these lines called?
a) Conductors b) Buses c) Connectors
d) Consecutives e) None of these
34. What is the name given to those applications that combine text, sound, graphics, motion video,
and/or animation?
a) Motionware b) Anigraphics c) Videoscapes
d) Multimedia e) None of these
35. A USB communication device that supports data encryption for secure wireless communication
for notebook users is called a
a) USB wireless network adapter
b) wireless switch
c) wireless hub
d) router
e) None of these
37. When entering text within a document, the Enter key is normally pressed at the end of every
a) Line b) Sentence c) Paragraph
d) Word e) None of these
38. When a real time telephone call between people is made over the Internet using computers, it is
called
a) a chat session
b) an e-mail
c) an instant message
d) internet telephony
e) None of these
40. Which of the following software could assist someone who cannot use their hands for computer
input?
a) Video conferencing
b) Speech recognition
c) Audio digitizer
d) Synthesizer
e) None of these
41. a document means the file is transferred from another computer to your computer
a) Uploading
b) Really Simple Syndication
c) Accessing
d) Downloading
e) None of these
42. Which computer memory is used for storing programs and data currently being processed by the
CPU?
a) Mass memory
b) Internal memory
c) Non-volatile memory
d) PROM
e) None of these
45. is used by public and private enterprises to publish and share financial information with
each other and industry analysis across all computer platforms and the Internet.
a) Extensible Markup Language
b) Extensible Business Reporting Language
c) Enterprise Application Integration
d) Sales Force Automation Software
e) None of these
46. Which part of the computer is used for calculating and comparing?
a) ALU b) Control unit c) Disk unit
d) Modem e) None of these
47. The method of Internet access that requires a phone line, but offers faster access speeds than dial-
up is the connection.
a) cable access
b) satellite access
c) fiber-optic service
d) modem
e) None of these
48. software creates a mirror image of the entire hard disk, including the operating system,
applications, files and data.
a) Operating system
b) Backup software
c) Utility programs
d) Driver imaging
e) None of these
51. Your business has contracted with another company to have them host and run an application for
your company over the Internet. The company providing this service to your business is called an
a) Internet service provider
b) Internet access provider
c) Application service provider
d) Outsource agency
e) None of these
54. is a technique that is used to send more than one call over a single line.
a) Digital transmission
b) Infrared transmission
c) Digitizing
d) Multiplexing
e) None of these
58. Which of the following information systems focuses on making manufacturing processes more
efficient and of higher quality?
a) Computer aided manufacturing
b) Computer integrated manufacturing
c) Computer aided software engineering d)
Computer aided system engineering
e) None of these
61. To navigate to a new web page for which you know the URL, type that URL in the browser's …
and press Enter a)
Address bar
b) Domain bar
c) Address button d)
Name button
e) None of these
62. The CPU also called the … when talking about PCs, does the vast majority of the processing for a
computer.
a) Macroprocessor b)
RAM
c) Memory system d)
microprocessors
e) None of these
64. A kiosk
a) is data organised and presented in a manner that has additional value beyond t he value of the data
itself
b) combines microscopic electronic components on a single integrated circuit that processes bits
according to software instructions
c) is a computer station that provides the public with specific and useful information and
service
d) describes a computer's type, processor, and operating system e)
None of these
65. The part of the CPU that accesses and decodes programme instructions, and coordinates the flow of
data among various system components is the
a) ALU b) Control unit c) Megabertz
d) Motherboard e) None of these
66. Computer programs are written in a high level programming language, however, the
human readable version of a program is called
a) cache
b) instruction
set c) source
code
d) word size
e) None of these
68. What is the term for how words will appear on a page?
a) Text formatting
b) Character
formatting c) Point
size
d) Typeface
e) None of these
69. The process of a computer receiving information form a server on the Internet is known as
a) Pulling b) Pushing c) Downloading
d) Transfering e) None of these
70. When sending an e-mail, the … line describe the contents of the message
a) Subject b) To c) Contents
d) CC e) None of these
73. A website address is a unique name that identifies a specific on the web
a) Web browser b) Website c) PDA
d) Link e) None of these
74. are specially designed computer chips that reside inside o ther devices, such as
your car or your electronic thermostat
a) Servers
b) Embedded computers
c) Robotic
computers d)
Mainframes
e) None of these
75. Which of the following places the common data elements in order from smallest to largest?
a) Character, file, record, field, database
b) Character, record, field, file, database
c) Character, field, record, file, database
d) Bit, byte, character, record, field, file, database
e) None of these
77. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased
by the user is
a) Memory only b) Write only c) Read only
d) Run only e) None of these
79. The operating system determines the manner in which all of the following occurs except
a) user creation of a document
b) user interaction with the processor
c) printer output
d) data displayed on the monitor
e) None of these
80. Office LANs that are spread geographically apart on a large scale can be connected using a
corporate
a) CAN b) LAN c) DAN
d) WAN e) None of these
Page
1010
83. A directory within a directory is called
a) Mini Directory
b) Junior Directory
c) Part Directory
d) Sub Directory
e) None of these
85. When your turn on the computer, the boot routine will perform this test
a) RAM test
b) disk drive test
c) memory test
d) power on self test
e) None of these
88. A contains specific rules and words t hat express the logical steps of an algorithm
a) Programming language b) Syntax error c) Programming structure
d) Logic chart e) None of these
91. Computers use the number system to store data and perform calculations.
a) Binary b) Octal c) Decimal
d) Hexadecimal e) None of these
Page
1111
92. The main function of the ALU is to
a) perform arithmetic and logical operations
b) store data and information for future use
c) control computer output, such as printing
d) monitor all computer activities
e) None of these
96. A complete electronic circuit with transistors and other electronic components on a small silicon
chip is called a(n)
a) workstation
b) CPU
c) magnetic disk
d) integrated circuit
e) None of these
Page
1212
100. The person who writes and tests computer programs is called a
a) programmer
b) computer scientist
c) software engineer
d) project developer
e) None of these
Page
1313
FUNDAMENTALS OF COMPUTERS
6. A CPU contains
a. a card reader and a printing device b. an analytical engine and a control unit
c. a control unit and an arithmetic logic unit d. an arithmetic logic unit and a card reader
7. Which of the following controls the process of interaction between the user and the operating
system?
10. Coded entries which are used to gain access to a computer system are called
d. The speeds of both these computers cannot be compared with the speed of advanced
13. What type of resource is most likely to be a shared common resource in a computer
Network?
16. UNIVAC is
18. ALU is
19. VGA is
a. spam b. spoof
29. Hackers
c. may legally break into computers as long as they do not do any damage
30. What type of computers are client computers (most of the time) in a client-server system?
a. Mainframe b. Mini-computer
c. Microcomputer d. PDA
a. Compiler b. Loader
35. First page of Website is termed as- a. Homepage b. Index c. JAVA script d. Bookmark
38. Office LANS, which are scattered geographically on large scale, can be connected by the use
of corporate
39. Where are data and programme stored when the processor uses them?
b. Data in ROM is non-volatile, that is, it remains there even without electrical power.
42. What do you call the programs that are used to find out possible faults and their causes?
a. NAV b. F-Prot
c. Oracle d. McAfee
a. Joystick b. Modem
a. 1416 b. 1614
c. 1641 d. 1804
c. 680 MB d. 680 GB
50. MIS is designed to provide information needed for effective decision making by?
a. Consumers b. Workers
c. Foremen d. Managers
52. BCD is
56. FORTRAN is
61. Which of the following devices can be sued to directly image printed text?
a. OCR b. OMR
a. Input is first converted to digital form b. Input is never converted to digital form
67. Personnel who design, program, operate and maintain computer equipment refers to
a. Console-operator b. Programmer
68. When did arch rivals IBM and Apple Computers Inc. decide to join hands?
a. 1978 b. 1984
c. 1990 d. 1991
69. Human beings are referred to as Homosapinens, which device is called Sillico Sapiens?
a. Monitor b. Hardware
c. Robot d. Computer
70. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
a. Leech b. Squid
c. Slug d. Glitch
71. Modern Computer are very reliable but they are not
a. Fast b. Powerful
c. Infallible d. Cheap
72. What is the name of the display feature that highlights are of the screen which requires
operator attention?
73. Personal computers use a number of chips mounted on a main circuit board. What is the
74. In most IBM PCs, the CPU, the device drives, memory expansion slots and active components
a. Motherboard b. Breadboard
a. Which is used by one person only b. Which is assigned one and only one task
c. Which uses one kind of software d. Which is meant for application software
76. The system unit of a personal computer typically contains all of the following except:
77. A computer program that converts an entire program into machine language is called a/an
a. Interpreter b. Simulator c. Compiler d. Commander
78. A computer program that translates one program instructions at a time into machine language
is called a/an
80. A fault in a computer program which prevents it from working correctly is known as
81. A self replicating program, similar to a virus which was taken from a 1970s science fiction
90. ............ translates and executes program at run time line by line
a. Compiler b. Interpreter
c. Linker d. Loader
c. Inheritance d. Linking
94. 1 Byte =?
96. The device used to carry digital data on analogue lines is called as
a. Modem b. Multiplexer
c. Modulator d. Demodulator
100. The instructions that tell a computer how to carry out the processing tasks are referred
to as computer.........
101. An area of a computer that temporarily holds data waiting to be processed is..........
102. ........... is the key to close a selected drop -down list; cancel a command and close a
dialog box.
a. F5 b. F6 c. F9 d. F12
105. Data becomes ................ when it is presented in a format that people can understand
and use
a. processed b. graphs c. information d. presentation
106. The term ............. designates equipment that might be added to a computer system to
108. RAM can be treated as the ......... for the computer's processor
110. To move a copy of file from one computer to another over a communication channel is
called?
111. The primary function of the ............ is to set up the hardware and load and start an
operating system
c. CP d. Memory
113. .......... is computer software designed to operate the computer hardware and to provide
118. You use a(n) ....., such as a keyboard or mouse, to input information
119. ............. is the ability of a device to "jump" directly to the requested data
120. ............. provides process and memory management services that allow two or more
a. Multitasking b. Multithreading
c. Multiprocessing d. Multicomputing
121. The task of performing operations like arithmetic and logical operations is called......
a. Processing b. Storing
c. Editing d. Sorting
a. MS-Excel b. BASIC
c. COBOL d. C++
127. ............ Store data or information temporarily and pass it on as directed by the control
unit
a. Address b. Register
c. Number d. Memory
c. Compiler d. Assembler
129. A ............ is an additional set of commands that the computer displays after you make a
131. All of the following are examples of real security and privacy risks EXCEPT
a. hackers b. Spam
132. Which of the following is NOT one of the four major data processing functions of a
computer?
135. ............... is the science that attempts to produce machines that display the same type of
a. Nanoscience b. Nanotechnology
136. Servers are computers that provide resources to other computers connected to a :
a. networked b. mainframe
c. supercomputer d. client
137. When creating a computer program, the ......... designs the structure of the program
138. A computer program that converts an entire program into machine language at one time
is called a/ an
140. The difference between people with access to computers and the Internet and those
141. Computers manipulate data in many ways, and this manipulation is called......
142. The ability to recover and read deleted or damaged files from a criminal's computer is
143. Where does most data go first with in a computer memory hierarchy ?
144. The………….data mining technique derives rules from real-world case examples.
a. Cookies b. Plug-ins
c. Scripts d. ASPs
146. Codes consisting of lines of varying widths or lengths that are computer-readable are
d. It is not unethical because the files are being given for free.
148. Reusable optical storage will typically have the acronym- a. CD b. DVD c. ROM d. RW
149. The most common type of storage devices are- a. Steel b. optical c. magnetic d. flash
150. A device that connects to a network without the use of cables is said to be- a. Distributed b. free c.
centralized d. none of these
151. A person who used his or her expertise to gain access to other people's computers to get
152. To access properties of an object, the mouse technique to use is- a. Dragging b. dropping c. right-
clicking d. shift-clicking
154. . The process of transferring files from a computer on the Internet to your computer is
called
a. Downloading b. uploading
c. FTP d. JPEG
155. . .......... is the process of dividing the disk into tracks and sectors.
a. Tracking b. Formatting
c. Crashing d. Allotting
a. End b. Start
c. Turnoff d. Restart
157. The technology that stores only the essential instructions on a microprocessor chip and
a. CISC b. RISC
c. CD-ROM d. Wi-Fi
160. Which part of the computer is directly involved in executing the instructions of the
computer program?
162. A computer system that is old and perhaps not satisfactory is referred to as a(n)
a. Ancient system b. Historical system
166. Which of the following contains permanent data and gets updated during the
processing of transactions?
167. Which of the following helps to protect floppy disks from data getting accidentally
erased?
c. a printer d. a monitor
c. motherboard d. CPU
a. Young hacker.
174. The common name for the crime of stealing passwords is:
c. Spoofing. d. Hacking.
175. Collecting personal information and effectively posing as another individual is known
a. Badware. b. Malware. c. Maliciousware. d. Illegalware. 177. A program that performs a useful task
while simultaneously allowing destructive acts is
a:
178. An intentionally disruptive program that spreads from program to program or from disk
to disk is known as a:
181. The thing that eventually terminates a worm virus is a lack of:
183. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:
184. What is the name of an application program that gathers user information and sends it
a. A virus b. Spybot
185. ------ is the measurement of things such as fingerprints and retinal scans used for
security access.
186. What is the most common tool used to restrict access to a computer system?
a. User logins b. Passwords
a. Encryption. b. a firewall.
189. To prevent the loss of data during power failures, use a(n):
c. Firewall. d. UPS.
190. ------Is defined as any crime completed through the use of computer technology.
c. Hacking d. Cracking
a. Cracking b. Jacking
c. Spoofing d. Smarming
194. Switching device of fifth generation computer is-------- a. Vacuum tubes b. Transistors
c. IC d. VLSI
196. ---------- computer is small general purpose micro computer, but larger than portable
computer
201. Note book, laptop,palm,hand-held computers are coming under the category of.........
computer
a. Inkjet b. Laser
a. Inkjet b. Laser
a. Inkjet b. Laser
207. ......... are used for plotting graphs and design on papers
a. Trackball b. Joystick
208. Daisy wheel, Drum, chain etc are the ............. a. Flow chart b. Mouse
c. Assemblers d. Compilers
a. Windows b. Unix
c. OS/2 d. All of these
a. LAN b. WAN
c. MAN d. BUS
a. Mosaic b. Netscape
218. .......... are set of rules and procedures to control the data transmission over the internet
a. IP address b. Domains
c. Protocol d. Gateway
220. ............... are system software to facilitate editing of text and data
a. MS Word b. Editors
c. PowerPoint d. MS publisher
a. Mainframe b. Microcomputer
a. Super computer b. PC
c. Laptop d. PDA
ANSWER KEY
11 a 65 c 119 b 173 b
12 b 66 a 120 a 174 c
13 a 67 c 121 a 175 b
14 b 68 d 122 c 176 b
15 b 69 d 123 b 177 b
16 a 70 d 124 a 178 b
17 a 71 c 125 a 179 a
18 a 72 b 126 a 180 b
19 a 73 b 127 b 181 a
20 b 74 a 128 a 182 c
21 a 75 b 129 a 183 c
22 d 76 d 130 a 184 b
23 b 77 c 131 b 185 a
24 a 78 a 132 c 186 b
25 a 79 d 133 b 187 b
26 d 80 b 134 b 188 a
27 a 81 d 135 d 189 d
28 a 82 b 136 b 190 b
29 b 83 a 137 b 191 a
30 c 84 a 138 c 192 a
31 c 85 b 139 c 193 b
32 b 86 d 140 a 194 d
33 a 87 d 141 b 195 d
34 d 88 b 142 c 196 c
35 a 89 c 143 a 197 c
36 b 90 b 144 c 198 a
37 b 91 c 145 a 199 d
38 d 92 a 146 d 200 b
39 a 93 d 147 c 201 c
40 b 94 a 148 d 202 b
41 b 95 a 149 b 203 c
42 c 96 a 150 d 204 d
43 d 97 c 151 a 205 a
44 c 98 a 152 c 206 b
45 b 99 a 153 b 207 d
(1) Average
(2)Count
(3)Minimum
(4)Maximum
(5)None of these
Ans: (4)
(1)Pie Wizard
(2)Excel Wizard
(3)Data Wizard
(4)Chart Wizard
(5)None of these
Ans: (4)
(1)Name box
(2)Row Headings
(3)Formula bar
(4)Task pane
(5)None of these
Ans: (3)
(2)Portrait
(3)Page Setup
(4)Print View
(5)None of these
Ans: (2)
5. What is the best way to have a data and the slide number appear on every slide ?
(1) choose Tools, Header and Footer, click Slide tab, select the desired options, click Apply to
All
(2) choose Insert, Header and Footer, click Slide tab, select the desired options, click Apply to
All
(3) chouse View, Header and Footer, click Slide tab, select the desired options, click Apply to
All
(4) choose File, Header and Footer, click Slide tab, select the desired options, click Apply to
All
Ans: (2)
(1)Application
(2)Peripheral
(3)Programme
(4)Software
(5)None of these
Ans: (2)
(1) Monitor, Central Processing Unit (CPU), Keyboard, Mouse, Software and Network
(2) Monitor, Central Processing Unit (CPU), Keyboard, Mouse Programme and Network
(3) Monitor, Central Processing Unit (CPU), Keyboard, Mouse, Printer and Modem
(4) Monitor, Central Processing Unit (CPU), Keyboard, Mouse, Application and Network
Ans: (3)
(2)You can only see the page you are currently working
(5)None of these
Ans: (1)
Ans: (3)
11. Which of the following controls the process of interaction between the user and the
operating system?
(3) Platform
Ans: (1)
12.You will work on which groupings, while formatting the text in word?
Ans: (2)
13.When you want to move some text from one page to a different page, the best method is-
(1) drag and drop (2) cut and paste (3) delete and retype (4) find and replace (5) None of
these
Ans: (2)
14.The first computers were programmed using-
Ans: (2)
Ans: (2)
16. An is a combination of hardware and software that facilitates the sharing of information
(1) network
(2) peripheral
Ans: (1)
(1) icon
(2) default
(3) CPU
(4) peripheral
Ans: (2)
18. Coded entries which are used to gain access to a computer system are called-
(2) Passwords
Ans: (2)
Ans: (2)
2) Ctrl + Shift + ?
Ans: (1)
1) Landscape
2) Portrait
3) Page Setup
4) Print View
5) None of these
Ans: (2)
5) None of these
Ans: (4)
1) Average
2) Count
3) Minimum
4) Maximum
5) None of these
Ans: (4)
4) The speeds of both these computers cannot be compared with the speed of advanced
computer
5) None of these
Ans: (1)
UNIT 2
1. Selection of command-
Ans: (C)
(A) archives
(B) folders
(C) indexes
(D) lists
Ans: (B)
3. How many different documents can you have open at any one time ?
Ans: (C)
network?
(A) Printers
(B) Speakers
(D) Keyboards
Ans: (A)
(D) Sub-directory
Ans: (D)
6. Such a pre-made document, which has coordinating font, layout and background, is-
(A) Guide
(B) Model
(C) Ruler
(D) Template
(A) Tab consecutively until your cursor reaches the desired place
(D) Press the space bar until your cursor reaches the desired place
Ans: (E)
8. Saving is a process-
(D) To develop the document by recording the text with the use of keyboard
Ans: (A)
(A) move the cursor to the desired location in the sentence and type the new word
(B) move the cursor to the desired location in the sentence, press Enter key, and type the new
word
(C) move the cursor to the beginning of the sentence and start typing
Ans: (A)
10. A(n) .............. is a combination of hardware and software that facilitates the sharing of
(A) network
(B) peripheral
Ans: (A)
(A) By positioning your cursor at the appropriate place and pressing the F1 key
(C) By positioning your cursor at the appropriate place and pressing Ctrl + Enter
Ans: (C)
(A) spam
(B) spoof
(D) spool
Ans: (A)
13. Hackers-
(C) may legally break into computers as long as they do not do any damage
Ans: (B)
14. What type of computers are client computers (most of the time) in a client-server system?
(A) Mainframe
(B) Mini-computer
(C) Microcomputer
(D) PDA
Ans: (C)
(A) Compiler
(B) Loader
(D) Assembler
Ans (C)
16. The amount of vertical space between lines of text in a document is called-
(A) double-space
Ans: (B)
Ans: (A)
(D) The computer and software system that control the machine
Ans: (D)
(B) Index
(D) Bookmark
(A) Size
(B) Format
(C) Point
(D) Colour
Ans: (B)
Ans: (B)
22. Office LANS, which are scattered geographically on large scale, can be connected by the use of
corporate-
(A) CAN
(B) LAN
(C) DAN
(D)WAN
(E) TAN
Ans: (D)
23. Where are data and programme stored when the processor uses them?
Ans: (A)
24. ............... represents raw facts, where- as ................. is data made meaningful.
Ans: (B)
25. Which keystroke will take you at the beginning or the end of a long document?
Ans: (C)
(B) Data in ROM is nonvolatile, that is, it remains there even without electrical power.
(D) ROM chips are easily swapped between different brands of computers.
(E) None of these
Ans:(B)
(B) You can only see the page you are currently working
(C) You can only see pages that do not contain graphics
(D) You can only see the title page of your document
Ans: (A)
(C) If the length is more than a page, the file will be needed to be saved
Ans: (A)
29. When creating a word-processed document, this step involves the user changing how words on the
page
Ans: (C)
(B) Right
(C) Centre
(D) Left
Ans: (A)
a. Printer
e. None of these
e. None of these
a. Ink-jet
d. Dot-matrix
e. None of these
4. A program written in machine language is called?
a. Assembler
b. Object
c. Computer
d. Machine
e. None of these
a. Charles Babbage
b. Von-nuumann
c. Danies Ritchel
d. Blaise Pascal
e. None of these
e. None of these
a. BASIC
b. FORTRAN
c. Machine Language
d. COBOL
e. None of these
a. Dot Matix
b. Laser Printer
c. Inkjet Printer
d. Plotter
e. None of these
9. Memory which forgets everything when you switch off the power is known as
a. Corrupted
b. Volatile
c. Non-Volatile
d. Non-Corrupted
e.None of these
a. Networking
b. Pairing
c. Interlocking
d. Assembling
e. Sharing
a. 16 address lines
b. 16 Buses
c. 16 Data lines
d. 16 routes
e. None of these
12. Data going into the computer is called
a. Output
b. algorithm
c. Input
d. Calculations
e. flow chart
a. LAN
b. DSL
c. RAM
d. USB
e. CPU
a. Shareware
c. Open-sourse software
e. An application suite
a. None of these
b. One
c. Two
16. A collection of program that controls how your computer system runs and
a. Operating System
b. Computer
c. Office
d. Compiler
e. Interpreter
a. run faster
b. go on line
d. E-mail
e. None of these
a. Flash memory
b. CMOS
c. Bays
d. Buses
e. Peripherals
a. mouse
b. logo
c. hand
d. palm
e. cursor
known as
a.B oot
b Bug
c Biff
22. A self replicating program, similar to a virus which was taken from a 1970s
a. Bug
b. Vice
c. Lice
d. Worm
e. None of these
a. Multivibrator
b. Flip-flop
c. Logic gates
d. laten
e. None of these
as
a. Spam
b. Trash
c. Calibri
d. Courier
e. None of these
e. None of these
a. Babbage
b. Bill Gates
e. None of these
a. Keyboard b. Mouse
e. All of these
28. Examples of output devices are
a. Screen
b. Printer
c. Speaker
d. All of these
e. None of these
a. Control unit
d. Monitor
e. None of these
a. Compiler
b. Interpreter c. Linker
d. Loader
e. None of these
b. Procedural programming
c. Inheritance
d. Linking
e. None of these
a. Commercial
b. Scientific
c. Space
d. Mathematical
e. None of these
e. None of these
35. 1 Byte = ?
a. 8 bits
b. 4 bits
c. 2 bits
d. 9 bits
e. None of these
37. The device used to carry digital data on analog lines is called as
a. Modem
b. Multiplexer
c. Modulator
d. Demodulator
e. None of these
a. Screen
b. Monitor
c. Both 1 & 2
d. printer
e. None of these
e. None of these
d. Bill Gates
e. None of these
ANSWERS
------------------------------------------------------------------------------------------------------------
9. (b) 10. (a)11. (c) 12. (c) 13. (a) 14. (e) 15. (c)
16. (a) 17. (c) 18. (c) 19. (d) 20. (e)21. (b) 22. (d)
23. (b) 24. (a) 25. (a) 26. (b) 27. (e) 28. (d) 29. (b)
30. (c) 31. (b) 32. (c) 33. (a) 34. (d) 35. (a)
36. (a) 37. (a) 38. (c) 39. (a) 40. (a)
1. Which command divides the surface of the blank disk into sectors and assign a unique
1) Ver
2) Format
3) Fat
4) Check disk
5) None of these
2. If you need to duplicate the entire disk, which command will you use?
1) Copy
2) Disk copy
3) Chkdsk
4) Format
5) None of these
3. A............. sometimes called a boot sector virus, executes when a computer boots up
because it resides in the boot sector of a floppy disk or the master boot record of a hard disk
1) System virus
3) File virus
4) Macro virus
5) None of these
1) Disk Crash
3) Corruption o f program
4) Deletion of files
5) None of these
1) Firewall
2) Proxy server
3) IP address
4) Domain name
5) None of these
6. Programming language built into user programs such as Word and Excel are known as...
1) 4GLs
2) Macro languages
3) object-oriented languages
5) None of these
1) Unauthorized Attacks
2) Virus Attacks
4) Fire Attacks
5) None of these
8. Which of the following extensions suggest that the file is a backup copy?
1) Bak
2) Bas
3) Com
4) Txt
5) None of these
9. Computer programs are written in a high - level programming language; however, the
1) Cache
2) Instruction set
3) Source code
4) Word size
5) None of these
10. The software tools that enable a user to interact with a computer for specific purposes are
known as...
1) Hardware
2) Networked Software
3) Shareware
4) Applications
5) None of these
1) Batch
2) Online
3) Real-time
4) Group
5) None of these
12. When a file contains instructions that can be carried out by the computer, it is often
1) Data
2) Information
3) Executable
4) Application
5) None of these
14. A set of step - by - step procedures for accomplishing a task is known as a (n)...
1) Algorithm
2) Hardware program
3) Software bug
4) Firmware program
5) None of these
15. A complete electronic circuit with transistors and other electronic components on a small
1) Workstation
2) CPU
3) Magnetic disk
4) Integrated circuit
5) None of these
1) File
2) Word
3) Folder
4) Project
5) None of these
5) None of these
18. When you turn on the computer, the boot routine will perform this test...
1) RAM test
3) Memory test
4) Power - on self-test
5) None of these
19. Which of the following storage media provides sequential access only?
1) Floppy disk
2) Magnetic disk
3) Magnetic tape
4) Optical disk
5) None of these
20. In word processing, an efficient way to move the 3rd paragraph to place it after
5) None of these
3) The computer and all the devices connected to it that are used to input and output data
4) All devices involved in processing information including the central processing unit, memory
and storage
5) None of these
22. The quickest and easiest way in Word, to locate a particular word or phrase in a document
1) Replace
2) Find
3) Lookup
4) Search
5) None of these
1) What the user sees on the screen and how they can interact with it
3) The means by which the user interacts with the peripheral devices on the computer
5) None of these
1) Open
2) Close
3) New
4) Save
5) None of these
25. The.............. Becomes different shapes depending on the task you are performing
1) Active tab
2) Insertion point
3) Mouse pointer
4) Ribbon
5) None of these
26. Specilizd programs that assist users in locating information on the Web are called....
1) Information engines
2) Search engines
3) Web browsers
4) Resource locators
5) None of these
1) Debugging
2) Bugging
3) Rectifying
4) Modifying
5) None of these
29.Any letter, number, or symbol found on the keyboard that you could type into the computer
..........
1) Output
2) Character
3) Type
4) Print
5) Font
30.A symbol or question on the screen that prompts you to take action and tell the computer
1) Scanner
2) Questionnaire
4) Information seeker
5) None of these
1) Menu bar
2) Tool bar
3) User friendly
4) Word processor
5) None of these
1) Monitor
2) Memory
3) Disk
4) Hard drive
5) None of these
33.A file extension is separated from the main file name with a(n)..., but no spaces
1) Question nark
2) Exclamation mark
3) Underscore
4) Period
5) None of these
2) computer-centric tasks
3) Gaming tasks
5) None of these
35.A ... is a device that not only provides surge protection, but also furnishes your computer
1) Surge strip
2) USB
3) UPS
4) Battery strip
5) None of these
36.The term ............. designates equipment that might be added to a computer system to
1) Digital device
2) System add-on
3) Disk pack
4) Peripheral device
5) None of these
37........... this is the act of copying or downloading a program from a network and making
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-license piracy
5) None of these
38.When installing ..., the user must copy and usually decompress program files from a CDROM
1) Programming software
2) System hardware
3) Applications hardware
4) Applications software
5) None of these
39.Which one of the following would be considered as a way that a computer virus can enter a
computer system ?
5) None of these
..........
1) Hypertext
2) Networks
3) Internet
4) Web browsers
5) None of these
3) Supercomputers are focused to execute few programs as fast as possible while mainframe
4) Supercomputers are focused to execute as many programs as possible while mainframe uses
5) None of these
5) None of these
1) Office XP
2) Windows XP
3) Office 2007
4) Office 2010
5) None of these
1) Floppy
2) Keyword
3) Computer
4) Printer
5) None of these
1) Input data
2) Output data
4) All of above
5) None of these
1) USB 2) Parallel
1) Workbook
2) Worksheet
3) Spreadsheet
4) Spread book
5) None of these
48.Workgroup means
1) Computers in network
2) Individual user
3) Individual computer
5) None of these
2) Thesaurus
3) Both
4) Synonym viewer
5) None of these
50. Which command allows you to reduce fragments of file and optimize the performance of
disk ?
1) Scandisk
2) Diskcomp
3) Chkdsak
4) Defrag
5) None of these
Answers
1 2 11 1 21 4 31 1 41 3
2 2 12 3 22 2 32 4 42 1
3 5 13 1 23 1 33 5 43 4
4 2 14 1 24 3 34 4 44 2
5 2 15 4 25 3 35 3 45 4
6 4 16 1 26 2 36 4 46 4
7 1 17 4 27 4 37 3 47 1
8 1 18 2 28 1 38 1 48 1
9 3 19 2 29 2 39 2 49 2
10 4 20 4 30 3 40 4 50 4
(C) Hollirth
(A) Univac
(B) Mark-I
(C) Eniac
(A) 4
(B) 5
(C) 3
(D) 6
(A) Transistors
(C) LSI
(D) VLSI
(B) Transistors
(C) LSI
(D) VLSI
(A) LSI
(D) Transistors
(A) Analog
(B) Digital
(C) Hybrid
(A) Digital
(B) Hybrid
(C) Analog
(D) Complex
(A) 2
(B) 4
(C) 3
(D) 1
(A) Software
(B) Hardware
(C) Human ware
(A) Computation
(B) Communication
(C) Processing
(C) both
(A) Mainframe
(B) Microcomputer
(C) Minicomputer
(B) PC
(C) Laptop
(D) PDA
(C) Shannon
(D) IBM
(A) Transistor
(C) LSI
(D) VLSI
22. The time taken by CPU to retrieve and interpret the instruction to be executed is called
as:
(A) ALU
(C) Registers
(D) BUS
(C) Microprocessor
(D) BUS
(A) SRAM
Answers
1 A 11 B 21 A
2 B 12 D 22 A
3 B 13 B 23 A
4 B 14 B 24 A
5 B 15 B 25 C
6 A 16 A
7 A 17 B
8 C 18 B
9 A 19 B
10 C 20 B
1. In a survey of more than 500 companies and government agencies, percent detected
A. 20
B. 75
C. 85
D. 99
Answer: C
2. The survey showed that these businesses lost more than due to security breaches.
A. $100,000 each
B. $377 million
D. $1 million
Answer: B
A. young hacker.
Answer: B
A. hackers.
B. insiders.
C. overseas criminals.
Answer: B
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
6. Collecting personal information and effectively posing as another individual is known as the crime
of:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: B
A. badware.
B. malware.
C. maliciousware.
D. illegalware.
Answer: B
8. A program that performs a useful task while simultaneously allowing destructive acts is a:
A. worm.
B. Trojan horse.
C. virus.
D. macro virus.
Answer: B Moderate
9. An intentionally disruptive program that spreads from program to program or from disk to disk is
known as a:
A. Trojan horse.
B. virus.
C. time bomb.
Answer: B
A. e-mail virus.
B. macro virus.
C. Trojan horse.
D. Time bomb.
Answer: A
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
Answer: B
12. The thing that eventually terminates a worm virus is a lack of:
A. memory or disk space.
B. time.
C. CD drive space.
D. CD-RW.
Answer: A
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C
14. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C
15. What is the name of an application program that gathers user information and sends it to
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
Answer: B
16. Standardization of Microsoft programs and the Windows operating system has made the spread of
viruses:
A. more complicated.
B. more difficult.
C. easier.
D. slower.
Answer: C
A. your computer.
D. No
Answer: B
18. Software programs that close potential security breaches in an operating system are known as:
B. refresh patches.
C. security repairs.
D. security patches.
Answer: D
19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is
known as:
A. a virus.
B. a Trojan horse.
C. cracking.
D. a denial of service attack.
Answer: D
20. is the measurement of things such as fingerprints and retinal scans used for security
access.
A. Biometrics B. Biomeasurement
Answer: A
21. What is the most common tool used to restrict access to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Answer: B
22. The most common passwords in the U.S. or Britain include all EXCEPT:
A. love.
B. Fred.
C. God.
D. 123.
Answer: D
23. Hardware or software designed to guard against unauthorized access to a computer network is
known as a(n):
A. hacker-proof program.
B. firewall.
C. hacker-resistant server.
Answer: B
A. encryption.
B. a firewall.
C. scrambling.
D. password proofing.
Answer: A
A. cryptology source.
B. encryption key.
D. cryptosystem.
26. To prevent the loss of data during power failures, use a(n):
A. encryption program.
B. surge protector.
C. firewall.
D. UPS.
Answer: D
A. encryption program
B. surge protector
C. firewall
D. UPS
Answer: B
Answer: B
A. encryption
B. firewall software
C. PGP
Answer: C
30. is defined as any crime completed through the use of computer technology.
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
Answer: B
A. logins
B. passwords
C. encryption
Answer: B
32. Creating strong computer security to prevent computer crime usually simultaneously helps
protect :
A. privacy rights.
B. personal ethics.
D. personal space.
Answer: A
33. Over was spent by businesses and government to repair problems in regard to Y2K.
A. 20 million dollars
C. 1 billion dollars
Answer: D
34. What is a complex system that takes on nearly complete responsibility for a task eliminating the
A. Autonomous system
C. Smart weapon
D. Independent system
Answer: D
35. Security procedures can:
Answer: B
36. The field of computer uses special software to scan hard drives of potential criminal
suspects.
37. Computer often goes unreported because businesses fear negative publicity.
Answer: crime
38. connections are the most frequent point of attack for Internet commerce.
Answer: Internet
Answer: Theft
40. A survey by eMarketer.com found that are the most often cited online fraud cases.
Answer: notebook
42. When you use a disk in several different computers within the same day, you are taking the
43. A(n) attaches itself to documents that contain embedded programs that automate
tasks.
Answer: macro virus
Answer: worms
46. A security patch is a software program that closes possible security breaches in the operating
47. was once the word used for malicious computer wizardry.
Answer: Cracking
Answer: Webjackers
Answer: Audit-control
53. Each individual who uses a public key cryptosystem has keys.
56. It should now be common knowledge that users should not open from e-mail recipients that
Answer: attachments
1) Compiler
2) Interpreter
3) Linker
4) Loader
5) None
2. _ _ _ _ _ _ _ _ is an OOP principle
1) Structured programming
2) Procedural programming
3) Inheritance
4) Linking
5) None
1) Commercial
2) Scientific
3) Space
4) Mathematical
5) None
5) None
5. 1 Byte = ?
1) 8 bits
2) 4 bits
3) 2 bits
4) 9 bits
5) None
5) None
1) Modem
2) Multiplexer
3) Modulator
4) Demodulator 5) None
1) Screen
2) Monitor
3) Both 1 & 2
4) printer
5) None
5) None
1) Dennis Ritchie
5) None
1) 16 address lines
2) 16 Buses
3) 16 Data lines
4) 16 routes
5) None
1) Output
2) algorithm
3) Input
4) Calculations
5) flow chart
1) LAN
2) DSL
3) RAM
4) USB
5) CPU
1) Shareware
3) Open-source software
5) An application suite
1) None
2) One
3) Two
16. A collection of program that controls how your computer system runs and processes
information is called
4) E-mail 5) None
Ans:-
consideration?
Ans: (3)
Ans: (4)
(2) there must be communications media connecting the network hardware devices
(4) each computer must have software that supports the movement of information
Ans: (2)
Ans: (3)
(1) Cookies
(2) Plug-ins
(3) Scripts
(4) ASPs
Ans: (1)
UNIT 11
1. Computer uses the .......... number system to store data and perform calculations.
(1) binary
(2) octal
(3) decimal
(4) hexadecimal
ANSWER: 1
2. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased
(1) Memory-only
(2) Write-only
(3) Once-only
(4) Run-only
(5) Read-only
ANSWER: 5
(1) CTRL + A
(2) ALT + F5
(3) SHIFT + A
(4) CTRL + K
(5) CTRL + H
ANSWER: 1
4. .......... are attempts by individuals to obtain confidential information from you by falsifying their
identity.
(1) Phishing
(4) Viruses
ANSWER: 1
5. Port number, port description, and number of ports ordered are examples of
(1) control
(2) output
(3) processing
(4) feedback
(5) input
ANSWER: 5
(4) Bookmark
ANSWER: 1
(1) multiprogramming
(2) multitasking
(3) time-sharing
ANSWER: 1
8. Codes consisting of lines of varying widths or lengths that are computer-readable are known as-
ANSWER: 4
9. To instruct Word to fit the width of a column to the contents of a table automatically, click the
(2) Format
(3) Autosize
(4) Contents
(5) AutoFit
ANSWER: 5
(2) It is unethical because the files are being given for free.
(4) It is not unethical because the files are being given for free.
ANSWER: 3
(1) CD
(2) DVD
(3) ROM
(4) RW
(5) ROS
ANSWER: 4
(1) persistent
(2) optical
(3) magnetic
(4) flash
(5) steel
ANSWER: 2
13. A device that connects to a network without the use of cables is said to be-
(1) distributed
(2) free
(3) centralized
ANSWER:5
14. A person who used his or her expertise to gain access to other people's computers to get
(1) hacker
(2) analyst
(4) programmer
(5) spammer
ANSWER: 1
(1) dragging
(2) dropping
(3) right-clicking
(4) shift-clicking
16. To change selected text to all capital letters, click the change case button, then click- (1)
UPPERCASE
ANSWER: 1
17. The basic unit of a worksheet into which you enter data in Excel is called a-
(1) tab
(2) cell
(3) box
(4) range
ANSWER: 2
(1) My folder
(2) My Documents
(3) My Files
(4) My Text
ANSWER: 2
(2) By positioning your cursor at the appropriate place and pressing Ctrl + Enter
ANSWER: 2
ANSWER:2
(1) Work
(2) Auto
(3) Normal
(4) Roman
ANSWER:3
22. The process of transferring files from a computer on the Internet to your computer is called
(1) downloading
(2) uploading
(3) FTP
(4) JPEG
(5) downsizing
ANSWER: 1
23. .......... is the process of dividing the disk into tracks and sectors.
(1) Tracking
(2) Formatting
(3) Crashing
(4) Allotting
ANSWER:2
(1) End
(2) Start
(3) Turnoff
(4) Restart
(5) Reboot
ANSWER:2
25. The contents of .......... are lost when the computer turns off.
(1) storage
(2) input
(3) output
(4) memory
ANSWER: 5
26. When you enter text in a cell in Excel, it also appears in which of the following?
ANSWER:2
(2) Buttons
(3) Diagrams
(4) Charts
(5) Worksheets
ANSWER:5
ANSWER: 1
31. The technology that stores only the essential instructions on a microprocessor chip and thus
(1) CISC
(2) RISC
3) CD-ROM
(4) Wi-Fi
(5) MISC
ANSWER: 2
(2)Accept input
(3)Process data
ANSWER: 4
33. ASCII is a coding system that provides
ANSWER: 4
34. Which part of the computer is directly invoked in executing the instructions of the computer
program?
ANSWER: 5
(1) tab consecutively until your cursor reaches the desired place
(4) press the space bar until your cursor reaches the desired place
ANSWER: 5
(2) databases
(3) folders
(4) graphs
(5) diagrams
ANSWER:3
(5) Shut-down
ANSWER: 2
38. In Word, the feature that automatically detects common errors is called
(1) Autocorrect
(2) Autograph
(4) Go to
(5) Thesaurus
ANSWER:1
39. A computer system that is old and perhaps not satisfactory is referred to as a(n)
ANSWER: 4
(1) 001
(2) 101
(3) 202
(4) 110
(5) 011
ANSWER:3
(1) ROM
(2) RAM
ANSWER:2
(1) Megabyte
(2) Gigabyte
(3) Kilobyte
(4) Terabyte
ANSWER:5
43. Which menu enables the user to choose toolbars?
(1) View
(2) Format
(3) Insert
(4) Edit
(5) Help
ANSWER: 1
44. By viewing the properties of the local hard disk of a computer, the user can find out
(1) the amount of space that has been used up and the remaining free space on the disk.
(2) the name of the user viewing the properties of the disk.
ANSWER: 1
(1) Autosheets
(2) Diagrams
(3) Charts
(4) Tables
(5) Functions
ANSWER:5
46. Which of the following contains permanent data and gets updated during the processing of
transactions?
ANSWER:4
(2) Ctrl + C
(3) Alt + C
(5) Ctrl + E
ANSWER: 5
48. Which of the following helps to protect floppy disks from data getting accidentally erased?
ANSWER:2
(2) a keyboard
(3) a printer
(4) a monitor
(5) a scanner
ANSWER:1
ANSWER:2
51. The operation of combining two cells into a single cell in Excel is referred to as
ANSWER:2
52. Which of the following can be used to store a large number of files in a small amount of storage
space?
ANSWER:5
(2) RAM
(3) motherboard
(4) CPU
ANSWER:4
(4) graphs
ANSWER:2
(1) 6AH1
(2) 100101
(3) 005
(4) ABCD
(5) 23456
ANSWER:2
ANSWER:5
(3) DVD
(4) CD
(5) Keyboard
ANSWER:5
58. In Excel, when the contents and attributes of a cell or range of cells have to be erased using the
(1) select the Cells. choose Edit. and select Clear, then All
(3) select the Cells. choose Tools. and select Clear. then Formats
(4) select the Cells. choose Tools. and select Formula Audit. then Delete
ANSWER:1
60. If an Excel Worksheet is to be linked for use in a PowerPoint presentation, the following should
be clicked
ANSWER: 2
ANSWER: 1
62. Which of the following is the hardware and not the software? .
(1) Excel
(4) Powerpoint
ANSWER:5
63. In Word, which menu would the user select to print a document?
(1) Tools
(2) File
(3) View
(4) Wind0Vob
ANSWER: 2
(3) A file extension is established by the user to indicate the date it was created
ANSWER:5
(1) modem
(2) joiner
(3) networker
(4) connector
(5) demod
ANSWER: 1
66. What do you see when you click the right mouse button?
(3) No effect
ANSWER:2
ANSWER:1
(1) logarithm-based
(2) ASCII
(3) algorithm-based
(4) arithmetic
ANSWER:4
(1) Database
(3) Spreadsheet
70. .......... consists of volatile chips that temporarily store data or instructions.
(1) CPU
(2) ROM
(3)RMA
(4) RAM
Ans: C Postscript
Ans: D Java
Q.5 A computer system that permits multiple users to run programs at same time
Ans: A LAN
Q.8. A device that forwards data packet from one network to another is called a
Ans: B Switch
Internet
Ans: C TCP
Q.11 HTML is a
Q.14 SMTP is a
(B) Protocol used for transferring message between end user &
Mail Server
Q.16 Telnet is a
Q.18 An e-business that allows consumer to name their own price for products
Ans: D C2B
Q.20 DNS is
Q.21 A firewall is
(B) Software or hardware used to isolate a private network from a public network.
(D) A predefined encryption key used to encrypt and decrypt data transmissions.
Ans: B Software or hardware used to isolate a private network from a public network.
Q.22 A router
Ans: B B2C
(A) to diagnose line failures, measure and manage traffic flow and simplify re
configuring of LANs.
(C)Screening packets to/from the Network and provide controllable filtering of network
traffic.
Ans: C Screening packets to/from the Network and provide controllable filtering of
network traffic.
Ans: A
Ans: B
Ans: A
Ans: D
Ans: C
Ans:c
Ans: C
Q.11 In the architecture of a database system external level is the
Ans: D
Q.12 An entity set that does not have sufficient attributes to form a primary key is a
Ans: B
Ans: D
Ans: C
Ans: A
to as the
Ans: A
Ans: A
Ans: B Related data fields in a database are grouped to form a data record.
Q.20 The database environment has all of the following components except:
Ans: A
Q.21 The language which has recently become the defacto standard for interfacing application
Ans: B
Q.22 The way a particular application views the data from the database that the application
uses is a
Ans: D
Ans: A
Ans: B
(C) Data stored in a database is independent of the application programs using it.
Ans: D
Ans: B
Q.27 A relational database developer refers to a record as
Ans: C
(B) is much more data independence than some other database models.
Ans: B
(B) needs data volume and processing frequencies to determine the size of the database.
Ans:C
Q.30 The method in which records are physically stored in a specified order according to a key
Ans: A A method in which records are physically stored in a specified order according
(In hash method, a hash function is performed on the key value to determine the
(Count function counts all the not null values in the specific column. If we want to
count only distinct values than the DISTINCT keyword is also to be used)
administrator.
(B) Data elements in the database can be modified by changing the data dictionary.
(C) The data dictionary contains the name and description of each data element.
(D) The data dictionary is a tool used exclusively by the database administrator.
Ans: B
Ans: C
Ans: D
Ans: C
Ans: B
Ans: B
Q.40 The statement in SQL which allows to change the definition of a table is
(A) Alter. (B) Update.
Ans: A
Q.41 E-R model uses this symbol to represent weak entity set ?
(B) Diamond
Ans: C
Ans: A
Ans: C
Ans: C
Q.45 _______ produces the relation that has attributes of R1 and R2
Ans: A
Q.46 The file organization that provides very fast access to any arbitrary record of a file is
Ans: C
(C) Neither (A) nor (B) (D) both (A) and (B)
Ans: D
Ans: C
Q.49 In a relation
Ans: C
Ans: D
Ans: B
Ans: D
Ans: B
Q.54 Which of the following operation is used if we are interested in only certain columns of a
table?
Ans: A
Ans: D
Ans: A
Q.57 Which of the following operations need the participating relations to be union compatible?
Ans: D
Ans: C
Ans: D
Ans: B
Q.61 The users who use easy-to-use menu are called
Ans: B
Ans: A
Q.63 Which are the two ways in which entities can participate in a relationship?
Ans: B
Q.64 The result of the UNION operation between R1 and R2 is a relation that includes
Ans: D
Ans: D
Q.67 Which of the operations constitute a basic set of operations for manipulating relational
data?
Ans:C
Ans: A
Q.69 Which of the following database object does not physically exist?
(C) view
Ans: C
Q.70 NULL is
Ans: D
Ans: A
Q.72 A data dictionary is a special file that contains:
Ans: D
Q.73 A file manipulation command that extracts some of the records from a file is called
Ans: A
Q.74 The physical location of a record is determined by a mathematical formula that trAnsforms
Ans: B
Q.75 Using Relational Algebra the query that finds customers, who have a balance of over
1000 is
Ans: A
(A) Parent-Child relation ship between the tables that connect them.
(B) Many to many relationship between the tables that connect them.
(C) Network model between the tables that connect them.
Ans: A
Ans B
Ans: C
Q.79 An instance of relational schema R (A, B, C) has distinct values of A including NULL
Ans: B
Q.80 Consider the join of a relation R with relation S. If R has m tuples and S has n tuples,
Ans: A
Ans: D
Ans: C
(B) Many to many relationship between the tables that connect them.
Ans: A
Ans: D
Ans: A
Q.87 The ______ operator is used to compare a value to a list of literals values that have been
specified.
Ans: A
D) none of these
Ans: D
Ans: A
Q.90 _____________ function divides one numeric expression by another and returns the
remainder.
Ans: B
Q.91 A data manipulation command the combines the records from one or more tables is called
Ans: C
Q.92 In E-R diagram generalization is represented by
Ans: D
Q.93 _________ is a virtual table that draws its data from the result of an SQL
SELECT statement.
Ans: A
Ans: B
Ans: B
Ans: A