-->
1. A computer program consists of:
(a) System flowchart
(b) Algorithms written in computer’s language
(c) Program
(d) Discrete logical steps
2. Hard disc is logically organised as:
(a) Tracks
(b) Cylinders
(c) Cylinders& Sectors
(d) Both (1) and (2)
3. A special storage register associated with the Arithmetic Logic Unit is:
(a) CPU
(b) Accumulator
(c) Primary store
(d) Auxiliary store
4. Class members are ____ by default:
(a) private
(b) protected
(c) public
(d) None of these
5. Which of the following is not an advantage of Dynamic RAMs?
(a) High Density
(b) Low cost
(c) High speed
(d) No need for memory refresh
6. Computers use the ____ number system to store data and perform calculations:
(a) binary
(b) octal
(c) decimal
(d) hexadecimal
7. Which of the following is a program that uses a variety of different approaches to identify and eliminate spam?
(a)Directory search
(b) Anti spam program
(c) Web server
(d) Web storefront
8. A ‘D.V.D.’ is an example of:
(a)Hard disc
(b) Optical disc
(c) Input device
(d) Solid state storage device
9. The portion of a disc that contains no stored data, but may contain latent data is called:
(a) RAM Slack
(b) A Cluster
(c) Swap space
(d) Unallocated space
10. The name of the location of a particular piece of data is its____.
(a)Memory name
(b) Address
(c) Storage site
(d) Data location
11. A personal computer is designed to meet the computing needs of
(a) Individual
(b) Department
(c) Company
(d) City
12. Which of the following standards is followed in India?
(a) IFIP
(b) CCITT
(c) ISO
(d) ANSI
13. An association of several entities in an entryrelation model is called:
(a) Tuple
(b) Record
(c) Relationship
(d) Field
14. Which of the following is not a goal of computer network?
(a) Resource sharing
(b) Low reliability
(c) Load sharing
(d) To avoid physical movement
15. Hacker is a person:
(a)Who spends hours at a computer and enjoys doing so
(b) Who repairs a computer
(c) Who designs the software which are threat to the system
16. Help Menu is available at which button?
(a)End
(b) Start
(c) Turnoff
(d) Restart
17. The ____ tells the rest of the computer how to carry out a program’s instructions.
(a)ALU
(b) System Unit
(c) Control Unit
(d) Motherboard
18. The ____ folder retains copies of messages that you have started but are not yet ready to send:
(a) Drafts
(b) Outbox
(c) Address book
(d) Sent items
19. Connection or link to other documents or Web Pages that contains related information is called:
(a) Dial up
(b) E-commerce
(c) Hyperlink
(d) Domain name
20. The computer abbreviation KB usually means:
(a) Key Block
(b) Key Byte
(c) Kit Bit
(d) Kilo Byte
Answers: 1 (b) 2(c) 3 (d) 4 (a) 5(c)6(a) 7(b) 8(b) 9(a) 10(b)11(a) 12(b) 13(c) 14(b) 15(c) 16(b) 17(c) 18(a) 19(c) 20(d)
RELATED IT POSTS
< 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15... >
-->
1. A computer program consists of:
RAM modules is stated as "512 MB" on the label. (Photo credit: Wikipedia) |
(b) Algorithms written in computer’s language
(c) Program
(d) Discrete logical steps
2. Hard disc is logically organised as:
(a) Tracks
(b) Cylinders
(c) Cylinders& Sectors
(d) Both (1) and (2)
3. A special storage register associated with the Arithmetic Logic Unit is:
(a) CPU
(b) Accumulator
(c) Primary store
(d) Auxiliary store
4. Class members are ____ by default:
(a) private
(b) protected
(c) public
(d) None of these
5. Which of the following is not an advantage of Dynamic RAMs?
(a) High Density
(b) Low cost
(c) High speed
(d) No need for memory refresh
6. Computers use the ____ number system to store data and perform calculations:
(a) binary
(b) octal
(c) decimal
(d) hexadecimal
7. Which of the following is a program that uses a variety of different approaches to identify and eliminate spam?
(a)Directory search
(b) Anti spam program
(c) Web server
(d) Web storefront
8. A ‘D.V.D.’ is an example of:
(a)Hard disc
(b) Optical disc
(c) Input device
(d) Solid state storage device
9. The portion of a disc that contains no stored data, but may contain latent data is called:
(a) RAM Slack
(b) A Cluster
(c) Swap space
(d) Unallocated space
10. The name of the location of a particular piece of data is its____.
(a)Memory name
(b) Address
(c) Storage site
(d) Data location
11. A personal computer is designed to meet the computing needs of
(a) Individual
(b) Department
(c) Company
(d) City
12. Which of the following standards is followed in India?
(a) IFIP
(b) CCITT
(c) ISO
(d) ANSI
13. An association of several entities in an entryrelation model is called:
(a) Tuple
(b) Record
(c) Relationship
(d) Field
14. Which of the following is not a goal of computer network?
(a) Resource sharing
(b) Low reliability
(c) Load sharing
(d) To avoid physical movement
15. Hacker is a person:
(a)Who spends hours at a computer and enjoys doing so
(b) Who repairs a computer
(c) Who designs the software which are threat to the system
16. Help Menu is available at which button?
(a)End
(b) Start
(c) Turnoff
(d) Restart
17. The ____ tells the rest of the computer how to carry out a program’s instructions.
(a)ALU
(b) System Unit
(c) Control Unit
(d) Motherboard
18. The ____ folder retains copies of messages that you have started but are not yet ready to send:
(a) Drafts
(b) Outbox
(c) Address book
(d) Sent items
19. Connection or link to other documents or Web Pages that contains related information is called:
(a) Dial up
(b) E-commerce
(c) Hyperlink
(d) Domain name
20. The computer abbreviation KB usually means:
(a) Key Block
(b) Key Byte
(c) Kit Bit
(d) Kilo Byte
Answers: 1 (b) 2(c) 3 (d) 4 (a) 5(c)6(a) 7(b) 8(b) 9(a) 10(b)11(a) 12(b) 13(c) 14(b) 15(c) 16(b) 17(c) 18(a) 19(c) 20(d)
RELATED IT POSTS
< 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15... >
-->
Post A Comment:
0 comments: