In email terminology, BCC stands for Blind Carbon Copy.
When you send an email with recipients listed in the BCC field, those recipients receive a copy of the email, but their email addresses are not visible to other recipients. This helps maintain the privacy of the recipients email addresses.
Correct Answered :
Wrong Answered :
2. Which of the following devices is used to transmit data over the telecommunication lines?
The device used to transmit data over telecommunication lines is a modem (modulator-demodulator).
A modem converts digital data from a computer or other digital device into analog signals suitable for transmission over telephone lines (or other communication channels), and it also converts incoming analog signals back into digital data that the receiving device can understand. Modems are essential for enabling communication between computers and networks over telephone lines or other wired communication channels.
A URL is a reference or address used to locate resources on the internet. It specifies the protocol used to access the resource (such as HTTP, HTTPS, FTP), the domain name or IP address where the resource is located, and the specific location or path within the server where the resource resides.
Correct Answered :
Wrong Answered :
4. The processor of dividing the disk into tracks and sectors is known as
The process of dividing a disk into tracks and sectors is known as formatting.
Formatting involves preparing a storage medium, such as a hard disk or a floppy disk, for reading and writing data by dividing it into specific tracks (concentric circles) and sectors (pie-shaped divisions within each track). This division allows the operating system and file system to organize and access data efficiently on the disk.
Correct Answered :
Wrong Answered :
5. The keyboard shortcut to switch between displaying Excel formulas or their values in a cell
In PowerPoint, the objects on the slide that hold text are called text boxes. Text boxes are used to contain and display text within a slide. They can be resized, moved, formatted, and styled according to the design and layout requirements of the presentation.
RTLinux, VxWorks, and QNX are all examples of real-time operating systems (RTOS):
RTLinux is a real-time Linux operating system.
VxWorks is a real-time operating system developed by Wind River Systems.
QNX is a real-time operating system primarily used in embedded systems.
Palm OS, on the other hand, was an operating system developed by Palm, Inc., primarily for personal digital assistants (PDAs) and later smartphones. It was not designed as a real-time operating system.
Correct Answered :
Wrong Answered :
9. Which technology is particularly used in barcode wand reader and barcode slot reader?
The technology particularly used in barcode wand readers and barcode slot readers is Laser Scanner.
Laser scanners are commonly used in barcode wands (also known as barcode wands or barcode wands) and slot readers. These scanners use a laser beam to read the barcode by detecting the reflected light from the barcode lines. This method allows for accurate and rapid scanning of barcodes, making it suitable for various applications in retail, logistics, and other industries where barcodes are used extensively
Correct Answered :
Wrong Answered :
10. Which of the following sections of the CPU is responsible for performing mathematical operations?
The section of the CPU responsible for performing mathematical operations is the **Arithmetic Logic Unit (ALU)**.
The ALU is a fundamental component of the CPU that executes arithmetic (addition, subtraction, multiplication, division) and logical (AND, OR, NOT) operations on data. It works in conjunction with the CPU`s control unit to process instructions and manipulate data according to the program`s requirements.
Correct Answered :
Wrong Answered :
11. Which of the following is not a programming language?
SQL (Structured Query Language) is a domain-specific language used for managing and manipulating databases.
Python is a high-level programming language known for its simplicity and readability, used for various purposes including web development, data analysis, and artificial intelligence.
Java is a widely used programming language known for its portability and versatility, used in building applications ranging from mobile apps to enterprise systems.
HTML (Hypertext Markup Language) is a markup language used for creating and structuring web pages, but it is not considered a programming language as it does not have the ability to perform computations or algorithms.
Correct Answered :
Wrong Answered :
12. Which of the following is the world`s first supercomputer?
The CRAY-I, developed by Cray Research, Inc., was introduced in 1976 and is widely recognized as the first supercomputer. It was designed by Seymour Cray and marked a significant advancement in computing power and speed during its time.
Correct Answered :
Wrong Answered :
13. Which of the following is an absolute cell reference?
An absolute reference in Excel refers to a reference that is `locked` so that the rows and columns do not change when they are copied. It is represented by adding a `$` sign before the row and column.
Correct Answered :
Wrong Answered :
14. In MS Excel, Comments put in cells are called _______.
Anti-spyware software is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed. Detection may be either rules-based or based on downloaded definition files that identify currently active spyware programs.
Correct Answered :
Wrong Answered :
16. _____ provides network backbone and e-governance support to government bodies in India.
Slide Sorter view Slide Sorter view gives you a view of your slides in thumbnail form. This view makes it easy for you to sort and organize the sequence of your slides as you create your presentation, and then also as you prepare your presentation for printing.
Correct Answered :
Wrong Answered :
19. The PowerPoint view that displays only text (title and bullets) is
Use Outline view to create an outline or story board for your presentation. It displays only the text on your slides, not pictures or other graphical items.
A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization`s previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.
Correct Answered :
Wrong Answered :
21. To select the current column in MS Excel, we press
By clicking on the header, the entire column will be highlighted, indicating that it is selected. Alternatively, you can use a keyboard shortcut to select a whole column in Excel: Click on any cell within the column. Press Ctrl + Spacebar together.
Correct Answered :
Wrong Answered :
22. ____ shows how the contents on printed page will appear with margin, header and footer.
When a microphone is
connected to a computer (via an audio interface or another
analog-to-digital converter), it sends/inputs information into the
computer. This means microphones are input devices.
Correct Answered :
Wrong Answered :
26. In order to check spelling of a text in Microsoft PowerPoint, we press ____
For the spell check feature, press F7.
If you`re on a laptop, you may also need to hold the Fn (Function) key
as you press F7 to activate the shortcut. For the thesaurus, just select
a word, then press Shift+F7.
Correct Answered :
Wrong Answered :
27. Shortcut for opening Help in Microsoft PowerPoint is
Laser printers use toner powder
instead of dye or pigment-based ink. Laser printers produce
electrostatically charged dots on a light-sensitive drum which attracts
toner powder.
A donut chart is almost identical to a pie chart, but the center is cut out (hence the name donut). Donut charts are also used to show proportions of categories that make up the whole, but the center can also be used to display data.
Correct Answered :
Wrong Answered :
36. ____ shortcut key in MS Paint is used to show image properties
Use the keyboard shortcut CTRL+E to show the image properties. This shortcut helps you to change the attributes of the image such as height, width, color etc.
Correct Answered :
Wrong Answered :
37. Images are basically a collection of spots, each of which is known as ____.
Encryption is the method by which information is converted into secret code that hides the information`s true meaning. The science of encrypting and decrypting information is called cryptography. In computing, unencrypted data is also known as plaintext, and encrypted data is called ciphertext.
Correct Answered :
Wrong Answered :
39. Choose the correct alternative to fill in the blanks
a. _____ is used to mean that the copy of the memo will go to the person mentioned.
b. _____ goes to a person, who may not be directly involved, but who should know what is going on.
Pressing PRINT SCREEN captures an image of your entire screen and copies it to the Clipboard in your computer`s memory. You can then paste (CTRL+V) the image into a document, email message, or other file.
Correct Answered :
Wrong Answered :
42. Which of the following is the full from of "WAN" ?
Dynamic HTML, or DHTML, is a term which was used by some browser vendors to describe the combination of HTML, style sheets and client-side scripts (JavaScript, VBScript, or any other supported scripts) that enabled creation of interactive and animated documents.
Correct Answered :
Wrong Answered :
49. What will happen to data in RAM when power goes off and computer shuts down?
A
Data is stored permanently in RAM and the data will not get erased from the memory
B
Data is retrieved from backup registers when power is restored and activity resumes normally
C
Data stored in RAM is lost when power goes off and it will have to be recreated
D
Data is recovered from Disaster Recovery Site and operation is continued with little disturbance
A forum is a place, situation, or group in which people exchange ideas and discuss issues, especially important public issues. Members of the council agreed that it still had an important role as a forum for discussion
Correct Answered :
Wrong Answered :
53. In formatting an e-mail, care should be taken that ____ .
A
the reference number is mentioned
B
the original message is attached
C
the entire message is not written in capital letters
An instruction is any task which is to be performed by the processor. Instructions are stored in the register. Instruction set is the set of machine instructions.
Correct Answered :
Wrong Answered :
61. The term shutdown on windows operating system refers to __________.
133. __________ is an information storage and retrieval system that works on the same
technologies as the Internet does, but is private inside a certain company.
151. ___________ is firmware used to perform hardware initialization during the booting process (power-on startup), and to provide runtime services for operating systems and programs.
153. _________ is any low-level programming language in which there is a very strong correspondence between the instructions in the language and the architecture`s machine code instructions.
An assembly (or assembler) language, often abbreviated asm, is a low-level programming language for a computer, or other programmable device, in which there is a very strong (generally one to one) correspondence between the language and the architecture`s machine code instructions.
Correct Answered :
Wrong Answered :
154. _______ feature in Microsoft Excel automatically adjusts the cell reference when the formula is copied and paste into the rest of the cell.
179. Rahul wants to insert a picture in his PowerPoint presentation. He has saved the picture in a folder. What is the next step that Rahul must do to insert the picture?
View >zoom > Zoom dialog box> Many pages option> select the no.of pages>click ok
Correct Answered :
Wrong Answered :
190. ________ is a system program in operating system designed to aid programmer in finding corresponding errors or bugs to identify the cause of the problem.
242. Prior to their transmission the information signal and the carrier signal are combined and the process of combining these two signals is called ___
An eavesdropping attack, also known as a sniffing or snooping attack, is a theft of information as it is transmitted over a network by a computer, smartphone, or another connected device.
The attack takes advantage of unsecured network communications to access data as it is being sent or received by its user.
Correct Answered :
Wrong Answered :
255. An ______ describe some property or characteristics of the entity.
295. In ______ transmission, a communication system groups characters into blocks and then adds a header trailer to each block to convert it into a frame
A laser printer uses a combination of the laser beam and electrophotographic techniques. Laser printing is an electrostatic digital printing process. It produces high-quality text and graphics by repeatedly passing a laser beam back and forth over a negatively charged cylinder called a "drum" to define a differentially charged image. The drum then selectively collects electrically charged powdered ink (toner), and transfers the image to paper, which is then heated in order to permanently fuse the text, imagery, or both. As with digital photocopiers, laser printers employ a xerographic printing process.
320. A magnetic tape has data recording density of 90000 bytes per inch. It has a tape speed of 200 inches per second. What is its data transfer rate (approximately)?
372. ______ in a computer system is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plain text and so on while attempting to remain undetected.
382. In context of computer devices, ______ is used to input data directly into the computer from the source document without copying and typing the data.
404. Which part of computer performs all major calculation and comparison and also activates and controls the operations of other units of the computer system?
In telecommunications, a repeater is an electronic device that receives a signal and retransmits it. Repeaters are used to extend transmissions so that the signal can cover longer distances or be received on the other side of an obstruction.
409. Leased line is a special conditioned telephone line connecting two computer or two line terminating equipment directly and permanently. It is also known as _____
431. A “URL” is a formatted text string used by web browsers, email clients and other software to identify a network resource on the Internet. It stands for:
Legacy Plug and Play. In 1995, Microsoft released Windows 95, which tried to automate device detection and configuration as much as possible, but could still fall back to manual settings if necessary.
Correct Answered :
Wrong Answered :
437. The default port number of web server process is _________.
By default, HTTP uses port 80 and HTTPS uses port 443, but a URL like http://www.example.com:8080/path/ specifies that the web browser connects instead to port 8080 of the HTTP server.
Correct Answered :
Wrong Answered :
438. Which tool in the Home tab aligns text to both left and right margins adding extra space between words?
An operating system that allows a single user to perform only one task at a time is called a Single-User Single-Tasking Operating System. Functions like printing a document, downloading images, etc., can be performed only one at a time. Examples include MS-DOS, Palm OS, windows 95etc.
Correct Answered :
Wrong Answered :
440. Which shortcut key is used to Insert Hyperlink in Excel?
DOS is a 16-bit, single-user operating system that does not support multi-tasking. It is far easier to administer than Unix, but less powerful. Compared to graphical interfaces such as Windows and Mac OS X
Correct Answered :
Wrong Answered :
445. ____________ is used for connecting the hard disk drives and network connectors
446. ___________ is an optical disk format developed to enable recording, rewriting, and playback of high definition video as well as storing huge amounts of data.
The Blu-Ray disc (BD)format was developed to enable recording, rewriting and playback of high-definition video (HD), as well as storing large amounts of data.
Correct Answered :
Wrong Answered :
447. When you start an email but don`t finish it, the message is stored in the ________ folder of the mail box.
Drafts If you start writing a message but don`t finish, it will automatically be saved to your Drafts folder. You can come back to the message later to continue editing it, and then send it. Sent Items By default, a copy of every message you send is put in your Sent Items folder.
Correct Answered :
Wrong Answered :
448. Which option from the data menu summarizes the data from one or more source areas and display it in a table?
In star topology , each communicating device is connected to a central node, which is a networking device like a hub or a switch. Star topology is considered very effective, efficient and fast as each device is directly connected with the central device.
Correct Answered :
Wrong Answered :
451. _____________ is an output device used by engineers and architects to draw designs of buildings or machines.
The “Undo” button appears in the Quick Access toolbar in Microsoft Word by default. It is one of the most useful functions ever created. It lets you reverse the last command, or last few commands, you performed. The drop-down arrow next to the “Undo” button contains a list of your last few previous actions.
Correct Answered :
Wrong Answered :
453. Each NIC has a ________ address, which helps in uniquely identifying the computer on the network.
Select the text that you want to return to its default formatting. On the Home tab, in the Font group, click Clear All Formatting. On the Home tab, in the Font group, click Clear All Formatting. On the Message tab, in the Basic Text group, click Clear All Formatting.
Correct Answered :
Wrong Answered :
456. _________ is an internet Service which is used for receiving electronic mail from an e-mail server.
The receiving server accepts the message so that it can be delivered to the recipient. The recipient`s email client retrieves the message using standards like the Post Office Protocol (POP) or Internet Message Access Protocol (IMAP) to download the message so it can be read.
Correct Answered :
Wrong Answered :
457. iOS mobile Operating System was invented in the year __________.
In Excel, move somewhere in a row you want to hide and press Ctrl+9. The entire current row is hidden (and you don`t need to select the entire row, just have your cursor somewhere in the row). ... Once you have cells from more than one row selected, all of those rows are hidden when you press Ctrl+9.
Correct Answered :
Wrong Answered :
459. Which protocol is used for remote login over a TCP/IP connection?
Telnet utility allows users to test connectivity to remote machines and issue commands through the use of a keyboard. Though most users opt to work with graphical interfaces, Telnet is one of the simplest ways to check connectivity on certain ports.
Correct Answered :
Wrong Answered :
460. __________ is an input device which uses light to carry signals to the device it controls, and requires no cables for communication.
Three kinds of What-If Analysis tools come with Excel: Scenarios, Goal Seek, and Data Tables. Scenarios and Data tables take sets of input values and determine possible results. A Data Table works with only one or two variables, but it can accept many different values for those variables.
Correct Answered :
Wrong Answered :
463. Hotmail is Web based email service developed by:
Hotmail is a free email account provided by Microsoft. It`s Web-based, which means you can access it from any Web browser. Hotmail comes with a free chatting account and can be used to send files of up to 10 Mb per message.
Correct Answered :
Wrong Answered :
464. In Decimal system, 1Terabyte is ___________ Gigabytes.
MS-DOS supports a single user process and a single thread. Some traditional UNIX systems are multiprogramming systems, thus support multiple user processes but only one execution path is allowed for each process. A Java Virtual Machine (JVM) is an example of a system of one process with multiple threads.
Correct Answered :
Wrong Answered :
467. Which of the following components of motherboard, coordinates the data transfer between various components of the computer, including the processor and memory?
The chipset allows the CPU to communicate and interact with the other components of the computer, and to exchange data with system memory, or RAM, hard disk drives, video cards, and other output devices.
Correct Answered :
Wrong Answered :
468. Statement A: Unix is an example for Simple Structure Operating System. Statement B: The First version of Windows NT is an example for 32 bit Operating
You can change the page background in Word to a color or apply a fill effect to it to make it more visually interesting. To change the page background in Word, click the “Design” tab in the Ribbon. Then click the “Page Color” drop-down button in the “Page Background” button group.
Correct Answered :
Wrong Answered :
470. What is another name of a client operating system?
In computing, multitasking is a method by which multiple tasks, also known as processes, share common processing resources such as a CPU. With a multitasking OS, you can simultaneously run multiple applications. Multitasking refers to the ability of the OS to quickly switch between each computing task to give the impression the different applications are executing multiple actions simultaneously.
Correct Answered :
Wrong Answered :
512. Which is responsible for communication between Memory and ALU?
The control unit is responsible for communication with Input and output devices for the transfer of data or results from memory. The control unit is not responsible for the processing of data or storing data. ALU (Arithmetic Logic Unit) ALU (Arithmetic Logic Unit) is responsible for performing arithmetic and logical functions or operations.
Correct Answered :
Wrong Answered :
574. Which of the following can be identified by the word "Pentium"?
Pentium is a brand used for a series of x86 architecture-compatible microprocessors produced by Intel since 1993. In their form as of November 2011 , Pentium processors are considered entry-level products that Intel rates as "two stars", meaning that they are above the low-end Atom and Celeron series, but below the faster Intel Core lineup, and workstation Xeon series.
The BIOS program, which is also present in the computer memory (ROM) is used by the microprocessor of the computer to start the computer during the booting process. It allows you to open the computer and connects the computer with the operating system
Correct Answered :
Wrong Answered :
576. The device used for conversion of AC into D.C is called as?
AC to DC converter is called rectifier, it uses semiconductor devices to convert Alternating current (AC) in to Direct current (DC) Like as Diode, Transistor etc. diode and transistor are semiconductor devices and some capacitor are used in rectifier circuit for filter the wave, filter are used to block the ac current.
Correct Answered :
Wrong Answered :
577. Which was the first widely-installed single-user operating system from Microsoft for the PC?o
Disk operating system is also used to describe several very similar command line disk operating systems. PC-DOS (Personal Computer Disk Operating System) was the first widely-installed disk operating system used in personal computers running on Intel 8086 16-bit processors.
Correct Answered :
Wrong Answered :
578. Which of the following is an Open Source Operating System?
Free and open-source software is software that can be classified as both free software and open-source software. That is, anyone is freely licensed to use, copy, study, and change the software in any way, and the source code is openly shared so that people are encouraged to voluntarily improve the design of the software
Correct Answered :
Wrong Answered :
579. The tool used to find a similar word in document is called:
An integrated development environment (IDE) is a software application that provides comprehensive facilities to computer programmers for software development.
Correct Answered :
Wrong Answered :
584. The Macintosh Computers and Laptops are manufactured by:
The Macintosh (mainly Mac since 1998) is a family of personal computers designed, manufactured, and sold by Apple Inc. (originally as Apple Computer, Inc.) since January 1984.
Correct Answered :
Wrong Answered :
585. Which operating system is used by most of the supercomputers in the world:
Although most modern supercomputers use the Linux operating system, each manufacturer has made its own specific changes to the Linux-derivative they use, and no industry standard exists, partly because the differences in hardware architectures require changes to optimize the operating system to each hardware design.
An integer is a whole number (not a fraction) that can be positive, negative, or zero. Therefore, the numbers 10, 0, -25, and 5,148 are all integers. Unlike floating point numbers, integers cannot have decimal places. Integers are a commonly used data type in computer programming.
Computer simulations are used to study the dynamic behaviour of objects or systems in response to conditions that cannot be easily or safely applied in real life.
Correct Answered :
Wrong Answered :
593. .....................is a device from where the information is sent:
The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network.
Correct Answered :
Wrong Answered :
598. Ability of an operating system to control activities of multiple programs at same time is called?
Multitasking is the concurrent execution of multiple tasks (also known as processes) over a certain period of time. New tasks can interrupt already started ones before they finish, instead of waiting for them to end.
File Allocation Table (FAT) is a file system developed for personal computers. Originally developed in 1977 for use on floppy disks, it was adapted for use on hard disks and other devices.
Correct Answered :
Wrong Answered :
600. Which of the following in defined by Handout Master in PowerPoint?
This is the view that lets you modify the Handout Master in PowerPoint. Handouts are documents you can print from within PowerPoint that include slide representations from your presentation. You can opt to include as many as 9 slides on each handout page, and then the slides look more like thumbnails.
Correct Answered :
Wrong Answered :
601. What are the computer devices which are automatically detected by Windows Called?
The Reverse Address Resolution Protocol (RARP) is an obsolete computer communication protocol used by a client computer to request its Internet Protocol (IPv4) address from a computer network, when all it has available is its link layer or hardware address, such as a MAC address.
Correct Answered :
Wrong Answered :
605. Joystick, scanners, bar code reader, touch screen and light pen are the example of which of the following?
For example, you can enter the following formula to count the numbers in the range A1:A20: =COUNT(A1:A20). If five of the cells in the range contain numbers, the result is 5.
Correct Answered :
Wrong Answered :
607. Which of the following is the correct form for an email address?
A valid email address consists of an email prefix and an email domain, both in acceptable formats. The prefix appears to the left of the @ symbol. The domain appears to the right of the @ symbol. For example, in the address example@mail.com, "example" is the email prefix, and "mail.com" is the email domain.
Correct Answered :
Wrong Answered :
608. How will you enable Word Art Toolbar in MS Word 2007?
ASCII, abbreviation of American Standard Code For Information Interchange, a standard data-transmission code that is used by smaller and less-powerful computers to represent both textual data (letters, numbers, and punctuation marks) and noninput-device commands (control characters).
Correct Answered :
Wrong Answered :
610. Which of the following service is used to log on to remote computer that is attached to internet?
SHARE became the standard OS for IBM computers in the late 1950s. The SHARE Operating System (SOS) was the first OS to manage buffers, provide program sharing, and allow execution of assembly language programs. "Managing Buffers" relate to a form of "Managing Memory".
Correct Answered :
Wrong Answered :
612. Track ball is a device generally used in place of
Trackballs designed for computers generally serve as mouse replacements and are primarily used to move the cursor on the screen. Like mice, computer trackball devices also include buttons, which can serve as left-click and right-click buttons, and may also be used to enter other commands.
Correct Answered :
Wrong Answered :
613. Which of the following characteristics of operating system is also called as I/O controller?
Parallel Port It is commonly called a printer port since most people use this port to hook up their printer. There are three types of parallel ports: standard, Extend Capabilities Port (ECP) and Enhanced Parallel Port (EPP).
Correct Answered :
Wrong Answered :
615. Which of the following is also known as page printer?
keyboard or computer mouse is an input device for a computer, while monitors and printers are output devices. Devices for communication between computers, such as modems and network cards, typically perform both input and output operations.
Correct Answered :
Wrong Answered :
617. Which of the following is magnetic and optical memory?
Secondary memory refers to storage devices, such as hard drives and solid state drives. It may also refer to removable storage media, such as USB flash drives, CDs, and DVDs. For example, a computer may have a one terabyte hard drive, but only 16 gigabytes of RAM
Correct Answered :
Wrong Answered :
618. In how many directions the joystick can be moved?
Registers are a type of computer memory used to quickly accept, store, and transfer data and instructions that are being used immediately by the CPU. The registers used by the CPU are often termed as Processor registers.
Correct Answered :
Wrong Answered :
621. Which of the following is a unidirectional bus?
Image result for Which of the following is a large printed circuit board? In a desktop computer, the motherboard is the largest circuit board that all other boards and devices connect to and communicate with each other
The operating system (OS) is the best-known example of system software. The OS manages all the other programs in a computer. According to some definitions, system software also includes system utilities, such as the disk defragmenter and System Restore, and development tools such as compilers and debuggers.
Correct Answered :
Wrong Answered :
624. What is called as the heart of the operating system, which provides the basic foundation, memory management, file systems, program execution?
In computing, multitasking is the concurrent execution of multiple tasks (also known as processes) over a certain period of time. New tasks can interrupt already started ones before they finish, instead of waiting for them to end. As a result, a computer executes segments of multiple tasks in an interleaved manner, while the tasks share common processing resources such as central processing units (CPUs) and main memory. Multitasking automatically interrupts the running program, saving its state (partial results, memory contents and computer register contents) and loading the saved state of another program and transferring control to it. This "context switch" may be initiated at fixed time intervals (pre-emptive multitasking), or the running program may be coded to signal to the supervisory software when it can be interrupted (cooperative multitasking).
Correct Answered :
Wrong Answered :
627. Operating system acts as an interface between
An operating system is a program that acts as an interface between the user and the computer hardware and controls the execution of all kinds of programs.
TXT is the most common file name extension used for plain text files, but many others are used as well. Jarte allows you to associate the RTF, DOC, DOCX, and TXT file format types to the Jarte program
Threads are sometimes called lightweight processes because they have their own stack but can access shared data. Because threads share the same address space as the process and other threads within the process, the operational cost of communication between the threads is low, which is an advantage
Correct Answered :
Wrong Answered :
632. Which of the following services are NOT provided by operating system?
Linux is a multi user operating system. Multi user operating system refers to the particular system which can be accessed by more than one person and by only one operating system on it.
Correct Answered :
Wrong Answered :
634. Which of the following is NOT an email cleint?
As programs and applications are stored in main memory, primary storage provides fast and efficient access to the CPU. On the contrary, secondary storage is more of a long-term storage solution with substantial data storage capacity which makes them relatively slower than their primary counterparts
Correct Answered :
Wrong Answered :
638. Which of the following is an example for logical operations?
To transfer (something, such as data or files) from a computer or other digital device to the memory of another device (such as a larger or remote computer) especially via the Internet.
A binary number is a number expressed in the base-2 numeral system or binary numeral system, a method of mathematical expression which uses only two symbols: typically "0" (zero) and "1" (one). The base-2 numeral system is a positional notation with a radix of 2.
The octal numeral system, or oct for short, is the base-8 number system, and uses the digits 0 to 7, that is to say 10 represents 8 in decimal and 100 represents 64 in decimal.
Correct Answered :
Wrong Answered :
645. Which of the following is an example of Application Software?
pagemaker or window xp or Ms word or photoshop. Application software is specific to the task it is designed for and can be as simple as a calculator application or as complex as a word processing application.
Correct Answered :
Wrong Answered :
646. Which of following output devices is used to draw picture on a paper using a pen?
Mainframe is very large in size and is an expensive computer capable of supporting hundreds or even thousands of users simultaneously. Mainframe executes many programs concurrently and supports many simultaneous execution of programs.
A mnemonic is a term, symbol or name used to define or specify a computing function. Mnemonics are used in computing to provide users with a means to quickly access a function, service or process, bypassing the actual more lengthy method used to perform or achieve it.
Correct Answered :
Wrong Answered :
649. Gutter margin in Microsoft Word is added to the
OCR is an input device used to read a printed text. OCR scans text optically character by character, converts them into a machine readable code and stores the text on the system memory.
n Microsoft PowerPoint, the Ctrl+J shortcut key aligns, or distributes, the text evenly across the slide. In Microsoft Word and other word processor programs, pressing Ctrl+J aligns the selected text or line to justify the screen.
An IPv6 address is 128 bits in length and consists of eight, 16-bit fields, with each field bounded by a colon. Each field must contain a hexadecimal number, in contrast to the dotted-decimal notation of IPv4 addresses.
Correct Answered :
Wrong Answered :
655. Which of the following is a reason for process suspension instead of termination?
A process is terminated when the system is unable to provide the memory required, as it is more than the memory that it is actually contained in the system
Correct Answered :
Wrong Answered :
656. The Header and Footer will appear by default on
By default header and footer is present on all pages of document. Header represents top margin and footer represents bottom margin. Both header and footer can be used to repeat same content through all the pages.
A scroll wheel is a wheel used for scrolling. The term usually refers to such wheels found on computer mice (where they can also be called a mouse wheel).
Correct Answered :
Wrong Answered :
658. Which generation of computers were VLSI microprocessor based in?
19, 2014 — Microsoft Corp. announced Wednesday the global availability of OneDrive, its free, personal cloud storage service. Formerly known as SkyDrive, OneDrive gives people one place to store important photos, videos and documents that is accessible on the devices they use every day.
DHCP. Dynamic Host Configuration Protocol (DHCP) is a protocol that will automatically assign TCP/IP addressing information to workstations over the network
An output device is any piece of computer hardware equipment which converts information into human readable form. It can be text, graphics, tactile, audio, and video. Some of the output devices are Visual Display Units (VDU) i.e. a Monitor, Printer graphic Output devices, Plotters, Speakers etc.
International Mobile Equipment Identity; a factory-installed unique serial number that identifies each unit or line of service under GSM (Global System for Mobile Communications) specifications.
Correct Answered :
Wrong Answered :
666. Drop Cap in the MS Word document is used to
A
Drop out all the capital letters from the documents
B
Begin each paragraph with Capital letter
C
Begin in paragraph with a large dropped initial capital letter
A drop cap (dropped capital) is a large capital letter used as a decorative element at the beginning of a paragraph or section. The size of a drop cap is usually two or more lines.
Correct Answered :
Wrong Answered :
667. Which field of computer allows the placement of applications and services on a distributed network using virtualized resources?
Clip art is a collection of pictures or images that can be imported into a document or another program. The images may be either raster graphics or vector graphics.
A magnetic ink character recognition line (MICR) is a line of characters on a check printed with a unique ink that allows the characters to be read by a reader-sorter machine.
Correct Answered :
Wrong Answered :
671. Name the technique used for freeing up the CPU while disk operations are in progress.
Multitasking - Multitasking is the ability of an operating system to execute more than one task simultaneously on single processor machine, these multiple tasks share common resources such as CPU and memory.
Advanced Audio Distribution Profile (A2DP) is a Bluetooth profile that enables multimedia audio communication, such as music, between a Jabra headset and a supported Bluetooth device.
Correct Answered :
Wrong Answered :
674. which of the following types of memory is costly in terms of cost per bit?
To get to the Symbol dialog box, click on the Insert menu and choose Symbol in Word 2007.
Correct Answered :
Wrong Answered :
676. A printed circuit board that acts as a foundation of a computer, and creates a communication channel between all the devices attached to it and located on the back side or at the bottom of the computer chassis is
The motherboard is nothing but a PCB (printed circuit board) and it is called the main circuit board as well. It connects and helps to communicate between various parts of an electronic device and also houses the majority of components, such as processor and memory.
Correct Answered :
Wrong Answered :
677. In MS word 2016 which of the following shortcut keys are used to create copyright symbol?
To add symbols, on the Insert tab, and then in the Symbols group, click Symbol, and then click the symbol that you want. Copyright and trademark symbols can be added by using a keyboard shortcut. For example: To insert the copyright symbol, press Ctrl+Alt+C.
Correct Answered :
Wrong Answered :
678. By default what is the minimum and maximum font size visible in the font tool bar of MS word 2016?
Encryption is the process of using an algorithm to transform information to make it unreadable for unauthorized users. This cryptographic method protects sensitive data such as credit card numbers by encoding and transforming information into unreadable cipher text.
682. Both M:M and Two level models require communication maintain the appropriate number of kernel threads allocated to the application. This can be achieved by using
Volatile memory, in contrast to non-volatile memory, is computer memory that requires power to maintain the stored information; it retains its contents while powered on but when the power is interrupted, the stored data is quickly lost. Volatile memory has several uses including as primary storage.
Correct Answered :
Wrong Answered :
686. To boot a computer means loading computer with
Joystick is also a pointing device, which is used to move the cursor position on a monitor screen. It is a stick having a spherical ball at its both lower and upper ends.
Correct Answered :
Wrong Answered :
689. Which of the following electronic components are NOT part of integrated Circuts?
A magnetic stripe reader, also called a magstripe reader, is a hardware device that reads the information encoded in the magnetic stripe located on the back of a plastic badge. ... The magnetic stripe on the back of a badge is composed of iron-based magnetic particles encased in plastic-like tape
Correct Answered :
Wrong Answered :
691. With respect to CPU, data stored in which among the following storage devices can be accessed quickly?
The dual mode of operation provides us with the means for protecting the operating system from errant users—and errant users from one another. ... Initial control is within the operating system, where instructions are executed in kernel mode. When control is given to a user application, the mode is set to user mode.
Correct Answered :
Wrong Answered :
693. A small piece of code which is used to initialize all devices as soon as power is switched on is known as
FCFS algorithm is non-preemptive in nature, that is, once CPU time has been allocated to a process, other processes can get CPU time only after the current process has finished. This property of FCFS scheduling leads to the situation called Convoy Effect.
Correct Answered :
Wrong Answered :
696. Which of the following options is used to request and display web pages from web server?
Web Browser is the software that is used to request and display Web Pages. It is a link between user and web page. A user is able to see a web page only when a web browser displays it
Correct Answered :
Wrong Answered :
697. Which of the following Ms Access objects allows to create a desktop database designed primarily for data input or display or for control of application execution?
Form is an object in a desktop database designed primarily for data input or display or for control of application execution. You use forms to customize the presentation of data that your application extracts from queries or tables. Forms are used for entering, modifying, and viewing records.
Correct Answered :
Wrong Answered :
698. In Ms Access 2013, the maximum number of characters that can fit in Short text data type is
In earlier versions of Access, we used the Memo data type to store large amounts of text, and the Text data type to store shorter strings (up to 255 characters). In Access 2013 and Access 2016, these two data types have been renamed as Long Text and as Short Text respectively, and they have different properties and size limits depending on whether you are using a desktop database or an Access web app.
Correct Answered :
Wrong Answered :
699. Which of the following storage devices operate using sequential access?
As per given question statement, we are given a formula for a cell A2; A2 is = B2 + C3 Now if we copy this A2 formula to a new cell C2, the new formula in C2 becomes as D2+E3 when we select the normal option of paste
Correct Answered :
Wrong Answered :
706. What will the function ROUND(1363.45 , -2) return in an Excel cell?
A font is a graphical representation of text that may include a different typeface, point size, weight, color, or design.
Correct Answered :
Wrong Answered :
709. What is the general computer term that refers to setting of margins, tab positions, text justification, vertical and horizontal centering and line spacing called?
Find and Replace is not just for finding and replacing a specific word with another word. it can also be used to change a format throughout your document.
n computing, multitasking is the concurrent execution of multiple tasks over a certain period of time. New tasks can interrupt already started ones before they finish, instead of waiting for them to end.
Correct Answered :
Wrong Answered :
721. Operating System can be installed from the following resources
A file allocation table (FAT) is a file system developed for hard drives that originally used 12 or 16 bits for each cluster entry into the file allocation table. It is used by the operating system (OS) to manage files on hard drives and other computer systems
A switched-mode power supply (switching-mode power supply, switch-mode power supply, switched power supply, SMPS, or switcher) is an electronic power supply that incorporates a switching regulator to convert electrical power efficiently.
Correct Answered :
Wrong Answered :
724. In which of the following memories does a computer store data and programmes, when the processor uses them?
Main memory holds data and processing instructions temporarily until the CPU needs it. This control center, called the central processing unit (CPU), is a highly complex, extensive set of electronic circuitry that executes stored program instructions. ... Recall that a computer`s memory holds data only temporarily, at the time the computer is executing a program. There are two main kinds of semiconductor memory, volatile and non-volatile. Examples of non-volatile memory are flash memory (used as secondary memory) and ROM, PROM, EPROM and EEPROM memory (used for storing firmware such as BIOS). ... Typical secondary storage devices are hard disk drives and solid-state drives. Primary storage, also known as main storage or memory, is the area in a computer in which data is stored for quick access by the computer`s processor. The terms random access memory (RAM) and memory are often as synonyms for primary or main storage.
Correct Answered :
Wrong Answered :
725. Who among the following has developed the basic architecture of computer?
The Von Neumann architecture, also known as the Princeton architecture, is a computer architecture based on that described in 1945 by the mathematician and physicist John Von Neumann
Hexadecimal, number base 16, or as it is mostly referred to, hex, is a numbering system with a base of 16. Numbers are usually written using the alphanumerical symbols 0–9 and A–F or a–f. As an example, the decimal number 20 is expressed as 14x, or h14 or H14.
Correct Answered :
Wrong Answered :
728. What are three main components of a digital computer system?
Components of a computer system are the primary elements which make the functioning of an electronic device smooth and faster. There are five basic components which include: 1) Input Unit 2) Output Unit 3) Memory Unit 4) Control Unit 5) Arithmetical and Logical Unit
The commonly used protocols are- IMAP, POP3, SMTP, and Exchange. POP3 stands for Post Office 3 protocol, and it is used for retrieving emails. POP simply reaches out to the mail server and brings back the mail contents. This is a simple yet standardized way that allows users to access mailboxes and quickly download messages to their devices. IMAP stands for Internet Message Access Protocol, and it is also used to retrieve emails. This again is a standard protocol for accessing emails and is a client/server protocol. Here the emails are received and held by the Internet server. Unlike POP, this does not move the emails. The biggest difference between POP3 and IMAP is the mail sync up. POP3 assumes that a user will be connected to a single device. However, IMAP is suitable for different devices simultaneously. SMTP stands for Simple Mail Transfer Protocol. This is a standard protocol for sending emails over the Internet. This is a protocol that is used by a Mail Transfer Agent to deliver emails
Correct Answered :
Wrong Answered :
730. In an email address abc@def.com, def is the :
Use the HANDOUT MASTER tab in Microsoft PowerPoint 2013 to edit the appearance and layout of presentation handouts. Changes made to the handout master appear on all the pages of the printed handout.
Correct Answered :
Wrong Answered :
735. Which of the following is not true?
A
Power Point presentation can be embedded with sound, video clips and animations
B
Power Point presentation can be used to teach students with the help of LCD projector
C
Page View is a view available in Power Point
D
Power Point presentation files have an extension PPT or PPTX
737. Which of the following is/are the main function(s) of an operating system? i) Manage the Processor and assign tasks which are to be performed. ii) Allocate memory and storage areas to the system and user programs and data. iii) Control , Co-ordinate various input and output devices. iv) Accessing world wide web without internet connectivity
Important functions of an operating System: Security Control over system performance Job accounting Error detecting aids Coordination between other software and users Memory Management Processor Management Device Management
Correct Answered :
Wrong Answered :
738. Convert the below Decimal value to its equivalent in Binary 12
Optical Mark Reader (OMR) is a special type of optical scanner used to recognize the type of mark made by pen or pencil. It is used where one out of a few alternatives is to be selected and marked. It is specially used for checking the answer sheets of examinations having multiple choice questions.
Correct Answered :
Wrong Answered :
740. Which of the following software is an email-client?
Microsoft Internet Explorer ----> Web Browser Windows 98 ----> Windows 98 is an operating system developed by Microsoft as part of its Windows 9x family of Microsoft Windows operating systems. Microsoft Power Point ----> Used for making power point presentations Microsoft Outlook ----> Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft Office suite. Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing.
Correct Answered :
Wrong Answered :
741. A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes is called as_____
A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves.
Correct Answered :
Wrong Answered :
742. Which of the following is referred as a process of training a computer system to make accurate predictions when fed data?
Option A,B,C are all antivirus softwares. A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to user`s systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.
Random Access Memory(Primary Memory) is example of a primary storage device. Primary storage`s key differences from the others are that it is directly accessible by the CPU, it is volatile, and it is non-removable.
Correct Answered :
Wrong Answered :
752. Which one of the following is NOT an open source operating system?
Worms. This is a computer program that replicates itself at a swift pace. Unlike a computer virus, it is self-contained and hence does not need to be part of another program to propagate itself.
Correct Answered :
Wrong Answered :
760. Which one of the following statements in NOT true about control unit of computer?
761. Which of the following is the cheap, secure and easiest way of storing huge volume of digital data and can be accessed form anywhere by using internet?