1. ________ is process of finding errors in software code
(1) Compiling
(2) Debugging
(3) Assembler
(4) All
(5) None of these
2. A (n) ________ uses pictures (called Icons) and menus displayed on the screen to send
(1) Compiling
(2) Debugging
(3) Assembler
(4) All
(5) None of these
2. A (n) ________ uses pictures (called Icons) and menus displayed on the screen to send
commands to the computer system.
(1) command — based user interface
(2) GUI
(3) System utility
(4) API
(5) None of these
3. Which of the following places the common data elements in order from smallest to largest ?
(1) character, file, record, field, database
(2) character, record, field, database, file
(3) character, field, record, file, database
(4) Bit, byte, character, record, field, file, database
(5) None of these
4. The internet is-
(1) a large network of networks
(2) an internal communication system for a business
(3) a communication system for the Indian government
(4) All of these
(5) None of these
5.__________ are lists of commands that appear on the screen.
(1) GUls
(2) Icons
(3) Menus
(4) Windows
(5) None of these
6. Which of the following statements is FALSE concerning file names?
(1) Files may share the same name or the same extension but not both
(2) Every file in the same folder must have a unique name
(3)File extension is another name for file type
(4) the file extension comes before the dot (.) followed by the file name
(5) None of these
7. Verification of a login name and password Is known as:
(1) configuration
(2) accessibility
(3) Authentication
(4) logging in
(5) None of these
8. Which of the following would most likely NOT be a symptom of a virus?
(1) Existing program files and icons disappear
(2) The CD-ROM stops functioning
(3) The Web browser opens to an unusual home page
(4) Odd messages or images are displayed on the screen
(5) None of these
9. ________ are words that a programming language has set aside for its own use.
(1) Control worlds
(2) Reserved words
(3) Control structures
(4) Reserved keys
(5) None of these
10. The standard computer keyboard is configured using the ________ layout.
(1) Dvorak
(2) QWERTY
(3) Control
(4) Dot-matrix
(5) None of these
11. Servers are computers that provide resources to other computers connected to a ____________
(1) mainframe
(2) network
(3) supercomputer
(4) Client
(5) None of these
Answers:
1. 5
2. 2
3. 3
4. 1
5. 3
6. 4
7. 3
8. 2
9. 2
10. 2
11. 2
(1) command — based user interface
(2) GUI
(3) System utility
(4) API
(5) None of these
3. Which of the following places the common data elements in order from smallest to largest ?
(1) character, file, record, field, database
(2) character, record, field, database, file
(3) character, field, record, file, database
(4) Bit, byte, character, record, field, file, database
(5) None of these
4. The internet is-
(1) a large network of networks
(2) an internal communication system for a business
(3) a communication system for the Indian government
(4) All of these
(5) None of these
5.__________ are lists of commands that appear on the screen.
(1) GUls
(2) Icons
(3) Menus
(4) Windows
(5) None of these
6. Which of the following statements is FALSE concerning file names?
(1) Files may share the same name or the same extension but not both
(2) Every file in the same folder must have a unique name
(3)File extension is another name for file type
(4) the file extension comes before the dot (.) followed by the file name
(5) None of these
7. Verification of a login name and password Is known as:
(1) configuration
(2) accessibility
(3) Authentication
(4) logging in
(5) None of these
8. Which of the following would most likely NOT be a symptom of a virus?
(1) Existing program files and icons disappear
(2) The CD-ROM stops functioning
(3) The Web browser opens to an unusual home page
(4) Odd messages or images are displayed on the screen
(5) None of these
9. ________ are words that a programming language has set aside for its own use.
(1) Control worlds
(2) Reserved words
(3) Control structures
(4) Reserved keys
(5) None of these
10. The standard computer keyboard is configured using the ________ layout.
(1) Dvorak
(2) QWERTY
(3) Control
(4) Dot-matrix
(5) None of these
11. Servers are computers that provide resources to other computers connected to a ____________
(1) mainframe
(2) network
(3) supercomputer
(4) Client
(5) None of these
Answers:
1. 5
2. 2
3. 3
4. 1
5. 3
6. 4
7. 3
8. 2
9. 2
10. 2
11. 2
No comments:
Post a Comment