Time Left : 00:00

Question Numbers



  • CURRENT QUESTION
  • NOT VISITED
  • ATTEMPTED
  • NOT ATTEMPTED
Back To Main Page
1. Which register holds address of the active memory location?

A

Memory Buffer Register

B

Memory Backup Register

C

Memory Access Register

D

Memory Address Register

2. The gradual deterioration of signal strength across long distance is called ______.

A

noise

B

sampling

C

disturbance

D

attenuation

3. Machine language is written as a strings of ______ and ______.

A

2, 3

B

0, 1

C

3, 4

D

1, 2

4. Which inputs device is used to recognize a pre-specified type of mark made by pencil or pen?

A

Mouse

B

Magnetic-Ink Character Recognition

C

Optical Mark Reader

D

Bar Code Reader

5. ______ is processed, manipulated and interpreted data.

A

Facts

B

Information

C

Data

D

Knowledge

6. In context of computer devices, ______ is used to input data directly into the computer from the source document without copying and typing the data.

A

monitor

B

hard disk

C

joystick

D

scanner

7. Which of the following is a sequential access device?

A

CD–ROM

B

DVD

C

Magnetic tape

D

Memory card

8. What is the full form of CAM?

A

Computer Add Manufacturing

B

Computer Aided Mining

C

Computer Add Mining

D

Computer Aided Manufacturing

9. Notebook computer, desktop computer, handheld computer are the example of which type of computer?

A

Minicomputer

B

Microcomputer

C

Mainframe

D

Supercomputer

10. A ______ is a text file containing a string of information which stores browsing information on the hard disk of your computer.

A

cookies

B

node

C

add-on

D

plug-ins

11. Which of the following is a type of view in MS PowerPoint 2019?

A

Draft

B

Print Layout

C

Reading view

D

Web layout

12. In MS Excel 2019, which of the following shortcut keys is used to select an entire column in a worksheet?

A

Ctrl + Spacebar

B

Tab + Spacebar

C

Alt + Spacebar

D

Shift + Spacebar

13. Primary storage is also known as ______.

A

Main memory

B

Auxiliary storage

C

Secondary memory

D

Prime memory

14. ______ is used to define the structure of a database.

A

Report generator

B

Data manipulation language

C

Query language

D

Data definition language

15. Which software are used to make a copy of the information stored on a disk?

A

System manager

B

Registry manager

C

File manager

D

Backup utilities

16. ______ in a computer system is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plain text and so on while attempting to remain undetected.

A

Rootkits

B

Spyware

C

Botnets

D

Backdoors

17. In MS Access 2019, relationships can be found under which tab?

A

Database tools

B

External data

C

Create

D

Home

18. ______ is a software for hardware.

A

Firmware

B

Middleware

C

Adware

D

Spyware

19. A ______ is an electromechanical device which is used to input alphanumeric data into a computer.

A

Keyboard

B

Trackball

C

Mouse

D

Joystick

20. Which of the following is a property of a virus program?

A

It never spreads across any network

B

Virus doesn`t infect an executable file or program

C

It can never be attached to other healthy programs

D

It is difficult to trace a virus after it has spread across a network