
1. All of the following are examples of input devices except which one of the following? a. Printer. b. Keyboard c. Scanner d. Mouse 2. Windows Word is an example of a. System software. b. Platform software. c. Application software. d. Operating system software 3. How many bits are equal to 1 Byte a. 32 b. 1024 c. One million d. 8 4. Which of the following is/are example of storage devices? a. Hard disk b. CDROM c. Both a and b d. Monitor e. JoyStick 5. A binary number system contains 1 and 0 as its possible digits. a. True b. False 6. Which of the following is the expansion of ALU? a. All Loves UPS b. Arithmetic legal unit c. Additional Language Uninterpreted d. Arithmetic logic unit 7. Who is the father of computer? (Actually Father of Modern Computer) a. Writes brother b. Charles Babbage c. Denise Ritchie d. Steve Jobs 8. What is the full form of GUI? a. Geometrical Ultra Inputs b. Graph under influence c. Graphical User Interface d. Graphical User Interaction 9. File Transfer protocol allows user to transfer file from one computer to another on the internet? a. False b. True 10. Are all open source software come free? a. Yes b. No (Explanation: Not all open source software comes free. However the source code will be available. But software which is closed source may come free. ) 11. DOS is an Operating system originally designed to be operated by using which of the following device? a. Mouse b. Keyboard c. JoyStick d. Xbox 12. Which of the following is a part of the Central Processing Unit? a. Printer b. Arithmetic & Logic unit c. Mouse d. None of the above 13. "Homepage" is a word associated with which of the following a. Web pages b. Word processing c. Email clients d. Operating Systems 14. A Switch is a network device that has the responsibility is to a. Protect from virus attack b. turn of the power to network c. Connect Network devices d. Boot the network 15. Can the data in the ROM (Read Only Memory) be access randomly? a. Yes b. No c. None of the above 16. The Lowest possible value in binary system is a. 1 b. 0 c. c. FF d. -1 17. Intranet , is a network whose resources can only be accessible within the network ( organization) a. True b. False 18. Who is the inventor of C programming language a. Bill Gates b. Dennis Ritchie c. James Gosling d. d. Larry Wall 19. A diamond symbol in flow chart is used for which of the following? a. Start and end b. Arrows c. Input/Output d. Conditional or decision 20. Which of the following is not a logic gate? a. OR b. AND c. NAT d. NOR 21. Find the odd one out a. Spyware b. Malware c. Middleware d. Spamware 22. Who is inventor of Google? a. Bill Gates b. Mark Zuckerburg c. Larry Page d. Sergey Brin e. Both c & d 23. Junk e-mail is also called a. spoof b. spam c. spill d. sniffer script 24. The term "INTERPRETER" is associated which of the following? a. Programming Language b. Application translation c. Translation of document into another language d. Operating systems e. None of the above 25. DPI stands for a. Due Protocol Inspection b. Dit per it c. Dots Per Inch d. Do Per Instruction 26. WordStar is a software product ,that helps a. Document Processing b. Maintain inventory items c. Browse Internet d. d. Send mails 27. A computer virus may affect a human being? a. True b. False c. May be 28. Firewall is a a. Software b. Hardware c. Can be both software 29. Which of the following's absence the computer system can still be functional a. Operating system b. Hard Drive c. RAM d. Sound card 30. Computer uses the _____ number system to store data and perform calculations. a. Octal b. binary c. decimal d. hexadecimal 31. Hardware in computers are a. Mechanical or electrical devices b. Program code that executes c. Applications that runs d. Chemical particles 32. MBR stands for a. Many Bell Rings b. Master Book Record c. Master Boot Record d. Many Boot Run 33. Booting is the process that signifies which of the following? a. Loading the Operating system into main memory b. Shutdown the computer c. Diagnosis the problem with the computer d. Loads the anti-virus 34. xls is an extension for which of the application in windows a. Ms-excel spreadsheet b. wordprocessor c. Internet browser d. Excellent application 35. Which of the following language is used for database data operations natively? a. Java b. SQL c. Perl d. C 36. What does the term "Bug" means in Computer systems a. Virus in the system b. A flaw in the system c. Chips that flashes data d. None of the above 37. Internet speed is measured in which of the following? a. Ghz b. Kbps c. RPM d. None of the above 38. Algorithms is a. A programming language b. Application code c. step-by-step procedure for calculations d. None of the above 39. Which of the following are flavors of Linux? a. RedHat b. Fedora c. Suse Linux d. All of the above 40. What is the primary language used for static web page design? a. PHP b. HTML c. Java d. Perl 41. The Open-source alternative of Ms-Office is a. Sourcefree b. OpenDocument c. FreeDocument d. OpenOffice 42. MSI stands for a. Medium System Integrated Circuits b. Medium Scale Integrated Circuits c. Medium System Intelligent Circuit d. Medium Scale Intelligent Circuit 43. Which of the following is possible variety of ROM? a. PROM b. EEPROM c. EPROM d. All of the above 44. Giga hertz is measurement for speed, for which of the devices? a. CPU b. Mouse c. Keyboard d. Joystick 45. Which of the following is the responsibility of Operating system? a. Memory Management b. Process Management c. File Management d. All of the above 46. The basic input/output system (BIOS) is stored in a. CPU b. ROM c. RAM d. Hard Disk 47. Trackball is a kind of mouse helps navigate the controls on the screen a. TRUE b. FALSE 48. mpeg is an extension for which kind of files? a. Audio b. Video c. image d. None of the above 49. Information travels between components on the motherboard through a. Flash memory b. Bays c. Peripherals d. Buses 50. Which of the following are considered threats to Computers and information security? a. Virus b. Trojan c. Both a & b d. Email e. Java 51. URL stands for a. Uniform Research Lis b. Uniform Research Locator c. Uniform Resource Locator d. Universal Resource List 52. All computers must have a. Virus checking program b. word processing software c. an operating system d. Image Processing software 53. Speed of computer is calculated in the units of a. RPM b. Hertz c. kmh d. mth 54. Which of the following is a valid type of file system a. FAT16 b. FAT32 c. NTFS d. All of the above 55. What is the expansion of DBMS a. Database Management system b. Disk Management System c. DataBean management system d. Dead Bask Media System 56. Primary memory stores a. Data alone b. Programs alone c. Results alone d. All of these 57. Which of the following is/are a programming language? a. PHP b. Ruby c. Lisp d. a, b and c e. ENIAC 58. Word length of a Personal Computer is a. 4 bits b. 16 bits c. 8 bits d. 64 bits 59. RedHat Linux is an a. Application Program b. Operating system c. Malware d. Virus 60. Which of the following is executable in Windows operating system? a. exe b. bat c. com d. All of the above 61. Which of the below is not related to the Internet and web development? a. DOS b. HTML c. Internet explorer d. CSS 62. Which of the following is not a hardware device? a. HardDisk b. RAM c. Mouse d. Browser 63. The word compiler is closely associated with which of the following? a. OS b. Programming Language c. Database Systems d. Internet 64. DNS is the abbreviation of a. Domain Network Service b. Dynamic Network System c. Dynamic Name System d. Domain Name System 65. What is MP3? a. A Mouse b. A Sound format c. A Printer d. A Scanner 66. Who is the inventory of Java Programming language? a. James Gosling b. John Backus c. Grace Hopper d. Anders Hejlsberg 67. Which of the following is the buses available on computer system a. System Bus b. Address Bus c. Data Bus d. All of the above 68. Verification of a login name and password is known as a. authorization b. authentication c. logging in d. accessibility 69. "Inbox" in emails client means a. location where received mails are kept b. Location of sent mails c. Location of deleted mails d. location of Spams 70. The meaning "Dumb Terminal" is a. A Terminal that depends on the host computer for its processing power b. A computer which has no input devices c. A port which is not connected to any device d. A monitor which is not connected 71. Which of the following is called low level languages? a. Machine language b. Assembly language c. Both of the above d. None of above 72. Motherboard is a a. A circuit board which connects all the elements b. A Board which connects only CPU and keyboard c.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages9 Page
-
File Size-