Time Left : 00:00

Question Numbers



  • CURRENT QUESTION
  • NOT VISITED
  • ATTEMPTED
  • NOT ATTEMPTED
Back To Main Page
1. Packet sniffing, E-mail hacking and password cracking are used to ______ access to the system

A

self

B

personal

C

authorized

D

unauthorized

2. Electronic systems that transfer data from one point to another are called ___

A

data collecting system

B

data communication system

C

data storage system

D

data controlling system

3. Which shortcut key is used to close the workbook in the MS-Excel?

A

Ctrl+O

B

Alt+W

C

Ctrl+W

D

Alt+C

4. ______ is a sequential access storage device

A

Magnetic disk

B

Optical disk

C

Floppy disk

D

Magnetic tape

5. What is the full form of RAM?

A

RANDOM ACCESS MEMORY

B

READ ACCESS MEMORY

C

REAL ACCESS MEMORY

D

RANDOM ALTERNATE MEMORY

6. Which of the following is an application software?

A

Utility programs

B

Operating system

C

Spread sheet software

D

Programming language translators

7. ______ is an example of guided data transmission media.

A

Twisted pair

B

Satellite transmission

C

Microwave transmission

D

Radio transmission

8. What is the full form of OMR?

A

OPTIC MARKS READER

B

OPTICAL MARK RECOGNITION

C

OPTICAL MASK RECOGNITION

D

OPTIC MASKS RECOGNIZER

9. Seek time is _____

A

time for data reading

B

time taken for desired sector of the track to come under read/write head

C

time taken to move the read/write head to desired track

D

time for data transfer

10. _____ is the diagrammatic representation of the logic for solving a task

A

Program

B

Pseudo code

C

Flowchart

D

Software

11. In MS PowerPoint 2019, which of the following shortcut key is used to open the replace dialog box?

A

Ctrl + H

B

Shift + H

C

Shift + R

D

Ctrl + R

12. Antivirus software :

A

Weebly

B

Avast

C

Creo

D

BugsBee

13. __ are used to identify coding errors at different stages of software development

A

Translator

B

Linker

C

Debugger

D

Loader

14. Keyboard device, Point-and-draw devices, Data Scanning devices etc., are the classification of which type of devices?

A

Output

B

Memory

C

Input

D

Printer

15. _____ is the process of storing data and instructions to make them readily available for initial or additional processing as and when required

A

Inputting

B

Arranging

C

Storing

D

Executing

16. Word-processing software, spread sheet software, database software are the example of _____

A

application software

B

operating system

C

system software

D

translator

17. RJ 45 is a ______ pin connector that is used exclusively with Ethernet cables for networking

A

10

B

6

C

8

D

4

18. ______ is a malware, that looks like a legitimate software and once it tricks a user into installing it

A

Trojan

B

Spyware

C

Ransomware

D

Adware

19. Which of the following is a file extension in MS PowerPoint 2019.

A

.ppa

B

.pja

C

.pna

D

.poa

20. A diagrammatic representation of the computer program is known as ___

A

Barchart

B

Flowchart

C

Pseudocode

D

Program