HTML tutorial

09:21
0




1. Verification of login name and password is known as–         


(a) Alienation
(b) Authentication
(c) Configuration
(d) Logging in
(e) Certification

(Ans : b)

2. Which of the following is not a computer . programming language?

(a) ALGOL
(b) Microsoft
(c) COBOL
(d) C++
(e) C#

( Ans : b)

3. Unwanted repetitious messages such as bulk mails is known as–

(a) Calibri
(b) Post
(c) Thrash
(d) Spam
(e) Courier

( Ans : d)

4. URL is a reference to a resource on the internet, URL stands for–

(a) Universal Resource List
(b) Uniform Resource Locator
(c) Uniform Resource List
(d) Uniform Resource Locator
(e) Universal Resource Locator

( Ans : b)

5. Which programming languages are classified as low level languages?

(a) C++
(b) ALGOL
(c) Assembly Language
(d) COBOL
(e)Prolog2

(Ans : c)

6. In VLSI integrated circuit VLSI stands for–
(a) Very Low Security Information
(b) Very Low Scale Integration
(c) Very Largely Secured Information
(d) Very Large Scale Immunity
(e) Very Large Scale Integration

( Ans : e)

7. …..is known as unauthorized access into others computer system.

(a) Editing
(b) Encryption
(c) Deletion
(d) Decryption
(e) Hacking

( Ans : e)

8. In a MS Word document, Landscape is–

(a) age orientation
(b) Paper size
(c) A font style
(d) Page Layout
(e) A font effect

( Ans : a)

9. A wireless network uses….. waves to transmit signals.

(a) Electro-magnetic
(b) Electrical
(c) Radio
(d) Magnetic
(e) Mechanical

(Ans : c)

10. Which of the following is not a network topology?

(a) Tree
(b) Star
(c) Bus
(d) Car
(e) Ring

(Ans : d)

11. Which of the following is correct statement?

(a) 1 MB = 100 KB
(b) 1 KB = 1024 bytes
(c) 1 MB = 2048 bytes
(d) 1 GB = 1024 KB
(e) 1 KB = 100 bytes

(Ans : b)

12. Secure code/Verified by VISA is associated in which of the following transactions?
(a) E-commerce
(b) NEFT
(c) Cash deposit
(d) Funds transfer
(e) Cash withdrawal

(Ans : a)

13. Which type of computer provides software and other components on a network?

(a) Server
(b) Work Station
(c) Mainframe
(d) Super computer
(e) Terminal

(Ans : c)

14. MICR technology is mainly used by banking industry. MICR denotes–

(a) Magnetic Ink Computer Reading
(b) Magnetic Ink Code Recognition
(c) Magnetic Ink Character Recognition
(d) Management Ink Check Reading
(e) Magnetic Ink Code Recognition

( Ans : c)

15. Which files have .mpg extension?

(a) Spread sheet
(b) Text
(c) Video
(d) Web
(e) Executable

(Ans : c)

16. A computer network tool used to detect hosts or to test the reachability of a host on–

(a) Try
(b) Ping
(c) Check
(d) View
(e) Lookup

( Ans : b)
17. What is the full form of W3C ?

(a) World Wide Web Centre
(b) World Wide Web Consortium
(c) World Wide Web Company
(d) World Wide Web Command
(e) World Wide Web Corporation

(Ans : b)

18. Numbers are stored and transmitted inside a computer in–

(a) CISC form
(b) Alpha-numeric form
(c) Binary form
(d) ASCII code
(e) Alphabets form

(Ans : c)

19. The speed of computer clock is measured in which of the following?

(a) Gigahertz
(b) Gigabyte
(c) Bit
(d) Megahertz
(e)Megabyte

(Ans : c)

20. To move to the bottom of a MS Word document, press–

(a) Auto summarize
(b) Home
(c) Home key
(d) Ctrl + End
(e) Ctrl + Home

( Ans : d)


0 comments:

Post a Comment

[img]https://1.bp.blogspot.com/-aFPBR4LADew/V85_aRWKXkI/AAAAAAAAHAw/O_N9dmf5tMQu0kSfbC3NU2yCzkLVQV7eACLcB/s320/share.png[/img]