Time Left : 00:00

Question Numbers



  • CURRENT QUESTION
  • NOT VISITED
  • ATTEMPTED
  • NOT ATTEMPTED
Back To Main Page
1. To control operations of a computer which of the following software is designed?

A

Application

B

System

C

Utility

D

User

2. Which one of the following is a standard mail protocol used to receive emails from a remote server to a local email client?

A

SMI

B

POP3

C

SNMP

D

UDP

3. What is the term Soft indicates in Software?

A

All the computer languages are very soft in nature and product created using these languages are called as Software

B

Programs doesn`t create any noise during execution, unlike disk drives which is part of Hardware. So it is Software

C

Computer software can be changed easily by users as per their requirement and hence the term soft appearing in it

D

Most of the developers are soft in nature. Due to this reason the term soft is tagged in the product developed

4. Which of the following options is a web browser to access internet?

A

Microsoft Word

B

Google Chrome

C

Adobe Reader

D

Team Viewer

5. The complete syntax for TIME function in MS Excel is :

A

TIME(day, hour, min)

B

TIME(hour, min, sec)

C

TIME(hour, min, sec, ms)

D

TIME(hour, min, day)

6. Which of the following is the full from of "WAN" ?

A

World Area Network

B

Whole Arithmetic Number

C

Wrong Array Network

D

Wide Area Network

7. Which key is used to capture the entire screen of the computer?

A

Shift + Ctrl

B

Ctrl + V

C

Shift + Ctrl + W

D

Printscreen

8. Which of the following tools is not used for time management?

A

Calendars

B

To-Do Lists

C

Project tracking tools

D

Instagram

9. Choose the correct alternative to fill in the blanks
a. _____ is used to mean that the copy of the memo will go to the person mentioned.
b. _____ goes to a person, who may not be directly involved, but who should know what is going on.

A

Carbon Copy, Blind Carbon Copy

B

Blind Carbon Copy, Blind Copy

C

Blind Carbon Copy, Carbon Copy

D

Carbon Copy, Blind Carbon Copy

10. Which of the following is the process of converting message / data into a format (cipher text) that cannot be read by hacker?

A

Breaching

B

Encryption

C

Both Breaching and Encryption

D

None of these

11. Images are basically a collection of spots, each of which is known as ____.

A

cursor

B

pointer

C

pixel

D

count

12. ____ shortcut key in MS Paint is used to show image properties

A

Ctrl + P

B

Ctrl + E

C

Shift + P

D

Alt + A

13. A Doughnut chart in Excel is similar to :

A

Bar Char

B

Scatter chart

C

Area chart

D

Pie chart

14. Which of the following methods cannot be used to edit the content of cell?

A

Double clicking the cell

B

Pressing F2

C

Clicking the formula bar

D

Pressing the Esc key

15. What does the acronym stand for?
DPI

A

Dots Per Inch

B

Double Picture Interpretation

C

Dots Preview Interface

D

Data Pause Interval

16. Which of the following type of ink source is used in laser printer?

A

Ribbon ink

B

Toner

C

Ink Catridges

D

None of these

17. Which of these keys combination in Window Operating system is used as a shortcut for Save?

A

F1

B

Ctrl + Z

C

Ctrl + S

D

F12

18. What does CAD stand for?

A

Computer Animated Design

B

Complete Algorithm Debugger

C

Computer Aided Design

D

Complex Auxiliary Design

19. Microsoft PowerPoint is a ____

A

Word Processing Program

B

Spreadsheet Program

C

Presentation Program

D

All of these

20. Which of the following is not a hardware?

A

Monitor

B

Keyboard

C

Sound Card

D

Browser