1. Verification of login name and password is known as–
(a) Alienation
(b) Authentication
(c)
Configuration
(d) Logging in
(e)
Certification
(Ans : b)
2. Which of
the following is not a computer . programming language?
(a) ALGOL
(b) Microsoft
(c) COBOL
(d) C++
(e) C#
( Ans : b)
3. Unwanted
repetitious messages such as bulk mails is known as–
(a) Calibri
(b) Post
(c) Thrash
(d) Spam
(e) Courier
( Ans : d)
4. URL is a
reference to a resource on the internet, URL stands for–
(a) Universal
Resource List
(b) Uniform
Resource Locator
(c) Uniform Resource List
(d) Uniform Resource Locator
(e) Universal
Resource Locator
( Ans : b)
5. Which
programming languages are classified as low level languages?
(a) C++
(b) ALGOL
(c) Assembly
Language
(d) COBOL
(e)Prolog2
(Ans : c)
6. In VLSI
integrated circuit VLSI stands for–
(a) Very Low Security Information
(b) Very Low
Scale Integration
(c) Very
Largely Secured Information
(d) Very Large Scale Immunity
(e) Very Large
Scale Integration
( Ans : e)
7. …..is known
as unauthorized access into others computer system.
(a) Editing
(b) Encryption
(c) Deletion
(d) Decryption
(e) Hacking
( Ans : e)
8. In a MS
Word document, Landscape is–
(a) age
orientation
(b) Paper size
(c) A font
style
(d) Page Layout
(e) A font
effect
( Ans : a)
9. A wireless
network uses….. waves to transmit signals.
(a)
Electro-magnetic
(b) Electrical
(c) Radio
(d) Magnetic
(e) Mechanical
(Ans : c)
10. Which of
the following is not a network topology?
(a) Tree
(b) Star
(c) Bus
(d) Car
(e) Ring
(Ans : d)
11. Which of
the following is correct statement?
(a) 1 MB = 100
KB
(b) 1 KB =
1024 bytes
(c) 1 MB =
2048 bytes
(d) 1 GB =
1024 KB
(e) 1 KB = 100
bytes
(Ans : b)
12. Secure
code/Verified by VISA is associated in which of the following transactions?
(a) E-commerce
(b) NEFT
(c) Cash
deposit
(d) Funds transfer
(e) Cash
withdrawal
(Ans : a)
13. Which type
of computer provides software and other components on a network?
(a) Server
(b) Work
Station
(c) Mainframe
(d) Super computer
(e) Terminal
(Ans : c)
14. MICR
technology is mainly used by banking industry. MICR denotes–
(a) Magnetic
Ink Computer Reading
(b) Magnetic
Ink Code Recognition
(c) Magnetic
Ink Character Recognition
(d) Management Ink Check Reading
(e) Magnetic
Ink Code Recognition
( Ans : c)
15. Which
files have .mpg extension?
(a) Spread
sheet
(b) Text
(c) Video
(d) Web
(e) Executable
(Ans : c)
16. A computer
network tool used to detect hosts or to test the reachability of a host on–
(a) Try
(b) Ping
(c) Check
(d) View
(e) Lookup
( Ans : b)
17. What is the full form of W3C ?
(a) World Wide
Web Centre
(b) World Wide
Web Consortium
(c) World Wide Web Company
(d) World Wide Web Command
(e) World Wide
Web Corporation
(Ans : b)
18. Numbers
are stored and transmitted inside a computer in–
(a) CISC form
(b)
Alpha-numeric form
(c) Binary
form
(d) ASCII code
(e) Alphabets
form
(Ans : c)
19. The speed
of computer clock is measured in which of the following?
(a) Gigahertz
(b) Gigabyte
(c) Bit
(d) Megahertz
(e)Megabyte
(Ans : c)
20. To move to
the bottom of a MS Word document, press–
(a) Auto
summarize
(b) Home
(c) Home key
(d) Ctrl + End
(e) Ctrl + Home
( Ans : d)
0 comments:
Post a Comment
[img]https://1.bp.blogspot.com/-aFPBR4LADew/V85_aRWKXkI/AAAAAAAAHAw/O_N9dmf5tMQu0kSfbC3NU2yCzkLVQV7eACLcB/s320/share.png[/img]