1. To make the number pad act as directional arrows you press the _______ key.
(1) num lock
(2) caps lock
(3) arrow lock
(4) shift
(5) None of these
2. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of :
(1) eight bytes
(2) eight kilobytes
(3) eight characters
(4) eight bits
(5) None of these
3. To access a mainframe or supercomputer, users often use a :
(1) terminal
(2) node
(3) desktop
(4) handheld
(5) None of these
4. A(n) __________ is text that you want printed at the bottom of the page.
(1) header
(1) header
(2) endnote
(3) footnote
(4) footer
(5) Non of these
5. ____spreads on network.
(1) Worm
(1) Worm
(2) Virus
(3) Trojan Horse
(4) Computer virus
(5) None of these
6. ____ is the encompassing term that involves the use of electronic platforms - intranets, extranets and the Internet - to conduct a company's business.
(1) e-commerce
(1) e-commerce
(2) e-business
(3) e-governance
(4) e-payment
(5) None of these
7. Which Layer is not present in TCP/IP model?
(1) Application layer
(1) Application layer
(2) transport layer
(3) Network access layer
(4) session layer
(5) None of these
8. Portrait and Landscape are
(1) Page Orientation
(1) Page Orientation
(2) Paper Size
(3) Page Layout
(4) All of above
(5) None of these
9. If you need to change the typeface of a document, which menu will you choose?
(1) Edit
(1) Edit
(2) View
(3) Format
(4) Tools
(5) None of these
10. Which of the following is not a font style?
(1) Bold
(1) Bold
(2) Italics
(3) Regular
(4) Superscript
(5) None of these
11. Which term identifies a specific computer on the web and the main page of the entire site
(1) URL
(2) Web site address
(3) Hyperlink
(4) Domain name
(5) None of these
12. The code that relational database management systems use to perform their database task is referred to as.....
(1) QBE
(2) SQL
(3) OLAP
(4) Sequel Server
(5) None of these
13. Chip is a common nickname for a (n):
(1) transistor
(2) resistor
(3) integrated circuit
(4) semiconductor
(5) None of these
14. The purpose of the primary key in a database is to:
(1) unlock the database
(2) provide a map of the data
(3) uniquely identify a record
(4) establish constraints on database operations.
(5) None of these
15. GUI is used as an interface between-
(1) hardware and software
(2) man and machine
(3) Software and user
(4) All of the above
(5) None of these
ANSWERS :
1.
|
1
|
11.
|
1
|
2.
|
4
|
12.
|
2
|
3.
|
1
|
13.
|
3
|
4.
|
4
|
14.
|
3
|
5.
|
1
|
15.
|
3
|
6.
|
2
| ||
7.
|
4
| ||
8.
|
1
| ||
9.
|
3
| ||
10.
|
4
|
No comments:
Post a Comment