In email terminology, BCC stands for Blind Carbon Copy.
When you send an email with recipients listed in the BCC field, those recipients receive a copy of the email, but their email addresses are not visible to other recipients. This helps maintain the privacy of the recipients email addresses.
Correct Answered :
Wrong Answered :
2. Which of the following devices is used to transmit data over the telecommunication lines?
The device used to transmit data over telecommunication lines is a modem (modulator-demodulator).
A modem converts digital data from a computer or other digital device into analog signals suitable for transmission over telephone lines (or other communication channels), and it also converts incoming analog signals back into digital data that the receiving device can understand. Modems are essential for enabling communication between computers and networks over telephone lines or other wired communication channels.
A URL is a reference or address used to locate resources on the internet. It specifies the protocol used to access the resource (such as HTTP, HTTPS, FTP), the domain name or IP address where the resource is located, and the specific location or path within the server where the resource resides.
Correct Answered :
Wrong Answered :
4. The processor of dividing the disk into tracks and sectors is known as
The process of dividing a disk into tracks and sectors is known as formatting.
Formatting involves preparing a storage medium, such as a hard disk or a floppy disk, for reading and writing data by dividing it into specific tracks (concentric circles) and sectors (pie-shaped divisions within each track). This division allows the operating system and file system to organize and access data efficiently on the disk.
Correct Answered :
Wrong Answered :
5. The keyboard shortcut to switch between displaying Excel formulas or their values in a cell
In PowerPoint, the objects on the slide that hold text are called text boxes. Text boxes are used to contain and display text within a slide. They can be resized, moved, formatted, and styled according to the design and layout requirements of the presentation.
RTLinux, VxWorks, and QNX are all examples of real-time operating systems (RTOS):
RTLinux is a real-time Linux operating system.
VxWorks is a real-time operating system developed by Wind River Systems.
QNX is a real-time operating system primarily used in embedded systems.
Palm OS, on the other hand, was an operating system developed by Palm, Inc., primarily for personal digital assistants (PDAs) and later smartphones. It was not designed as a real-time operating system.
Correct Answered :
Wrong Answered :
9. Which technology is particularly used in barcode wand reader and barcode slot reader?
The technology particularly used in barcode wand readers and barcode slot readers is Laser Scanner.
Laser scanners are commonly used in barcode wands (also known as barcode wands or barcode wands) and slot readers. These scanners use a laser beam to read the barcode by detecting the reflected light from the barcode lines. This method allows for accurate and rapid scanning of barcodes, making it suitable for various applications in retail, logistics, and other industries where barcodes are used extensively
Correct Answered :
Wrong Answered :
10. Which of the following sections of the CPU is responsible for performing mathematical operations?
The section of the CPU responsible for performing mathematical operations is the **Arithmetic Logic Unit (ALU)**.
The ALU is a fundamental component of the CPU that executes arithmetic (addition, subtraction, multiplication, division) and logical (AND, OR, NOT) operations on data. It works in conjunction with the CPU`s control unit to process instructions and manipulate data according to the program`s requirements.
Correct Answered :
Wrong Answered :
11. Which of the following is not a programming language?
SQL (Structured Query Language) is a domain-specific language used for managing and manipulating databases.
Python is a high-level programming language known for its simplicity and readability, used for various purposes including web development, data analysis, and artificial intelligence.
Java is a widely used programming language known for its portability and versatility, used in building applications ranging from mobile apps to enterprise systems.
HTML (Hypertext Markup Language) is a markup language used for creating and structuring web pages, but it is not considered a programming language as it does not have the ability to perform computations or algorithms.
Correct Answered :
Wrong Answered :
12. Which of the following is the world`s first supercomputer?
The CRAY-I, developed by Cray Research, Inc., was introduced in 1976 and is widely recognized as the first supercomputer. It was designed by Seymour Cray and marked a significant advancement in computing power and speed during its time.
Correct Answered :
Wrong Answered :
13. Which of the following is an absolute cell reference?
An absolute reference in Excel refers to a reference that is `locked` so that the rows and columns do not change when they are copied. It is represented by adding a `$` sign before the row and column.
Correct Answered :
Wrong Answered :
14. In MS Excel, Comments put in cells are called _______.
Anti-spyware software is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed. Detection may be either rules-based or based on downloaded definition files that identify currently active spyware programs.
Correct Answered :
Wrong Answered :
16. _____ provides network backbone and e-governance support to government bodies in India.
Slide Sorter view Slide Sorter view gives you a view of your slides in thumbnail form. This view makes it easy for you to sort and organize the sequence of your slides as you create your presentation, and then also as you prepare your presentation for printing.
Correct Answered :
Wrong Answered :
19. The PowerPoint view that displays only text (title and bullets) is
Use Outline view to create an outline or story board for your presentation. It displays only the text on your slides, not pictures or other graphical items.
A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization`s previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.
Correct Answered :
Wrong Answered :
21. To select the current column in MS Excel, we press
By clicking on the header, the entire column will be highlighted, indicating that it is selected. Alternatively, you can use a keyboard shortcut to select a whole column in Excel: Click on any cell within the column. Press Ctrl + Spacebar together.
Correct Answered :
Wrong Answered :
22. ____ shows how the contents on printed page will appear with margin, header and footer.
When a microphone is
connected to a computer (via an audio interface or another
analog-to-digital converter), it sends/inputs information into the
computer. This means microphones are input devices.
Correct Answered :
Wrong Answered :
26. In order to check spelling of a text in Microsoft PowerPoint, we press ____
For the spell check feature, press F7.
If you`re on a laptop, you may also need to hold the Fn (Function) key
as you press F7 to activate the shortcut. For the thesaurus, just select
a word, then press Shift+F7.
Correct Answered :
Wrong Answered :
27. Shortcut for opening Help in Microsoft PowerPoint is
Laser printers use toner powder
instead of dye or pigment-based ink. Laser printers produce
electrostatically charged dots on a light-sensitive drum which attracts
toner powder.
A donut chart is almost identical to a pie chart, but the center is cut out (hence the name donut). Donut charts are also used to show proportions of categories that make up the whole, but the center can also be used to display data.
Correct Answered :
Wrong Answered :
36. ____ shortcut key in MS Paint is used to show image properties
Use the keyboard shortcut CTRL+E to show the image properties. This shortcut helps you to change the attributes of the image such as height, width, color etc.
Correct Answered :
Wrong Answered :
37. Images are basically a collection of spots, each of which is known as ____.
Encryption is the method by which information is converted into secret code that hides the information`s true meaning. The science of encrypting and decrypting information is called cryptography. In computing, unencrypted data is also known as plaintext, and encrypted data is called ciphertext.
Correct Answered :
Wrong Answered :
39. Choose the correct alternative to fill in the blanks
a. _____ is used to mean that the copy of the memo will go to the person mentioned.
b. _____ goes to a person, who may not be directly involved, but who should know what is going on.
Pressing PRINT SCREEN captures an image of your entire screen and copies it to the Clipboard in your computer`s memory. You can then paste (CTRL+V) the image into a document, email message, or other file.
Correct Answered :
Wrong Answered :
42. Which of the following is the full from of "WAN" ?
Dynamic HTML, or DHTML, is a term which was used by some browser vendors to describe the combination of HTML, style sheets and client-side scripts (JavaScript, VBScript, or any other supported scripts) that enabled creation of interactive and animated documents.
Correct Answered :
Wrong Answered :
49. What will happen to data in RAM when power goes off and computer shuts down?
A
Data is stored permanently in RAM and the data will not get erased from the memory
B
Data is retrieved from backup registers when power is restored and activity resumes normally
C
Data stored in RAM is lost when power goes off and it will have to be recreated
D
Data is recovered from Disaster Recovery Site and operation is continued with little disturbance
A forum is a place, situation, or group in which people exchange ideas and discuss issues, especially important public issues. Members of the council agreed that it still had an important role as a forum for discussion
Correct Answered :
Wrong Answered :
53. In formatting an e-mail, care should be taken that ____ .
A
the reference number is mentioned
B
the original message is attached
C
the entire message is not written in capital letters
An instruction is any task which is to be performed by the processor. Instructions are stored in the register. Instruction set is the set of machine instructions.
Correct Answered :
Wrong Answered :
61. The term shutdown on windows operating system refers to __________.
133. __________ is an information storage and retrieval system that works on the same
technologies as the Internet does, but is private inside a certain company.
151. ___________ is firmware used to perform hardware initialization during the booting process (power-on startup), and to provide runtime services for operating systems and programs.
153. _________ is any low-level programming language in which there is a very strong correspondence between the instructions in the language and the architecture`s machine code instructions.
An assembly (or assembler) language, often abbreviated asm, is a low-level programming language for a computer, or other programmable device, in which there is a very strong (generally one to one) correspondence between the language and the architecture`s machine code instructions.
Correct Answered :
Wrong Answered :
154. _______ feature in Microsoft Excel automatically adjusts the cell reference when the formula is copied and paste into the rest of the cell.
179. Rahul wants to insert a picture in his PowerPoint presentation. He has saved the picture in a folder. What is the next step that Rahul must do to insert the picture?
View >zoom > Zoom dialog box> Many pages option> select the no.of pages>click ok
Correct Answered :
Wrong Answered :
190. ________ is a system program in operating system designed to aid programmer in finding corresponding errors or bugs to identify the cause of the problem.
242. Prior to their transmission the information signal and the carrier signal are combined and the process of combining these two signals is called ___
An eavesdropping attack, also known as a sniffing or snooping attack, is a theft of information as it is transmitted over a network by a computer, smartphone, or another connected device.
The attack takes advantage of unsecured network communications to access data as it is being sent or received by its user.
Correct Answered :
Wrong Answered :
255. An ______ describe some property or characteristics of the entity.
295. In ______ transmission, a communication system groups characters into blocks and then adds a header trailer to each block to convert it into a frame
A laser printer uses a combination of the laser beam and electrophotographic techniques. Laser printing is an electrostatic digital printing process. It produces high-quality text and graphics by repeatedly passing a laser beam back and forth over a negatively charged cylinder called a "drum" to define a differentially charged image. The drum then selectively collects electrically charged powdered ink (toner), and transfers the image to paper, which is then heated in order to permanently fuse the text, imagery, or both. As with digital photocopiers, laser printers employ a xerographic printing process.
320. A magnetic tape has data recording density of 90000 bytes per inch. It has a tape speed of 200 inches per second. What is its data transfer rate (approximately)?