#everydayquiz #45Q
1. To change selected text to all capital letters, click the change case button, then click
1) Uppercase
2) Upper all
3) Capslock
4) Lock Upper
5) Large Size
2. A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a
1) hacker
2) analyst
3) instant messenger
4) programmer
5) spammer
3. A device that connects to a network without the use of cables is said to be
1) distributed
2) free
3) centralized
4) open source
5) None of these
4. Reusable optical storage will typically have the acronym
1) CD
2) DVD
3) ROM
4) RW
5) ROS
5. The most common type of storage devices are
1) persistent
2) optical
3) magnetic
4) flash
5) steel
6. Codes consisting of lines of varying widths or lengths that are computer readable are known as
1) an ASCII code
2) a magnetic tape
3) a bar code
4) an OCR scanner
5) None of these
7. A Web site’s main page is called its
1) Homepage
2) Browser page
3) Search Page
4) Bookmark
5) None of these
8. Part number, part description, and number of parts ordered are examples of
1) control
2) output
3) processing
4) feedback
5) input
9. To access properties of an object, the mouse technique to use is
1) dragging
2) dropping
3) right-clicking
4) shift-clicking
5) None of these
10. Computers use the ________ number system to store data and perform calculations.
1) binary
2) octal
3) decimal
4) hexadecimal
5) None of these
11. ________ are attempts by individuals to obtain confidential information from you by falsifying their identity.
1) Phishing trips
2) Computer viruses
3) Spyware scams
4) Viruses
5) Phishing scams
12. Why is it unethical to share copyrighted files with your friends?
1) It is not unethical, because it is legal.
2) It is unethical because the files are being given for free.
3) Sharing copyrighted files without permission breaks copyright laws.
4) It is not unethical because the files are being given for free.
5) It is not unethical - anyone can access a computer
13. Which of the following can be used to select the entire document?
1) CTRL + A
2) ALT + F5
3) SHIFT + A
4) CTRL + K
5) CTRL + H
14. To instruct Word to fit the width of a column to the contents of a table automatically, click the________ button and then point to AutoFit Contents.
1) Fit to Form
2) Format
3) Auto-size
4) Contents
5) Auto Fit
15. The simultaneous processing of two or more programs by multiple processors is
1) multiprogramming
2) multitasking
3) time-sharing
4) multiprocessing
5) None of these
Answers..
1. 1
2. 1
3. 5
4. 4
5. 3
6. 3
7. 1
8. 5
9. 3
10. 1
11. 1
12. 3
13. 1
14. 5
15. 4
1) Uppercase
2) Upper all
3) Capslock
4) Lock Upper
5) Large Size
2. A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a
1) hacker
2) analyst
3) instant messenger
4) programmer
5) spammer
3. A device that connects to a network without the use of cables is said to be
1) distributed
2) free
3) centralized
4) open source
5) None of these
4. Reusable optical storage will typically have the acronym
1) CD
2) DVD
3) ROM
4) RW
5) ROS
5. The most common type of storage devices are
1) persistent
2) optical
3) magnetic
4) flash
5) steel
6. Codes consisting of lines of varying widths or lengths that are computer readable are known as
1) an ASCII code
2) a magnetic tape
3) a bar code
4) an OCR scanner
5) None of these
7. A Web site’s main page is called its
1) Homepage
2) Browser page
3) Search Page
4) Bookmark
5) None of these
8. Part number, part description, and number of parts ordered are examples of
1) control
2) output
3) processing
4) feedback
5) input
9. To access properties of an object, the mouse technique to use is
1) dragging
2) dropping
3) right-clicking
4) shift-clicking
5) None of these
10. Computers use the ________ number system to store data and perform calculations.
1) binary
2) octal
3) decimal
4) hexadecimal
5) None of these
11. ________ are attempts by individuals to obtain confidential information from you by falsifying their identity.
1) Phishing trips
2) Computer viruses
3) Spyware scams
4) Viruses
5) Phishing scams
12. Why is it unethical to share copyrighted files with your friends?
1) It is not unethical, because it is legal.
2) It is unethical because the files are being given for free.
3) Sharing copyrighted files without permission breaks copyright laws.
4) It is not unethical because the files are being given for free.
5) It is not unethical - anyone can access a computer
13. Which of the following can be used to select the entire document?
1) CTRL + A
2) ALT + F5
3) SHIFT + A
4) CTRL + K
5) CTRL + H
14. To instruct Word to fit the width of a column to the contents of a table automatically, click the________ button and then point to AutoFit Contents.
1) Fit to Form
2) Format
3) Auto-size
4) Contents
5) Auto Fit
15. The simultaneous processing of two or more programs by multiple processors is
1) multiprogramming
2) multitasking
3) time-sharing
4) multiprocessing
5) None of these
Answers..
1. 1
2. 1
3. 5
4. 4
5. 3
6. 3
7. 1
8. 5
9. 3
10. 1
11. 1
12. 3
13. 1
14. 5
15. 4
1.What is the ultimate purpose of Defragmentation ?
1) Make the PC faster
2) Create More Free Space
3) Delete temporary files
4) Reduce Power consumption
2.Computers process data into information by working exclusively with :
1) multimedia
2) words
3) characters
4) numbers
5) None of these
3.You must install a (n) ......... on a network if you want to share a broadband Internet connection
1) router
2) modem
3) node
4) cable
5) None of these
4.The purpose of the primary key in a database is to :
1) unlock the database
2) provide a map of the data
3) uniquely identify a record
4) establish constraints on database operations
5) None of these
5.The design of the network is called the network
1) architecture
2) server
3) transmission
4) type
5) None of these
6.The most frequently used instructions of a computer program are likely to be fetched from:
1) the hard disk
2) cache memory
3) RAM
4) registers
5) None of these
7.Personal logs or journal entries posted on the Web are known as :
1) listservs
2) Webcasts
3) blogs
4) subject directories
5) None of these
8.Which of the following is NOT a type of broad band internet connection ?
1) Cable 2) DSL
3) Dial-up
4) Satellite
5) None of these
9.Linux is a(n) ........ operating system
1) open-source
2) Microsoft
3) Windows
4) Mac
5) None of these
10.Which of the following places the common data elements in order from smallest to largest
1) character, file, record, field, database
2) character, record, field, database, file
3) character, field, record, file, database
4) Bit, byte, character, record, field, file, database
5) None of these
11.The internet is ..........
1) a large network of networkds
2) an internal communication system for a business
3) a communications system for the Indian government
4) All of these
5) None of these
12.Which of the following statements is FALSE concenring file names ?
1) Files may share the same name or the same extension but not both
2) Every file in the same foldr must have a unique, name
3) File extension is another name for file type
4) The file extension comes before the dot (.) followed by the file name
5) None of these
13.Which of the following would most likely NOT be a symptom of a virus ?
1) Existing program files and icons disappear
2) The CD-ROM stops functioning
3) THe Web browser opens to an unusual home page
4) Odd messages or images are displayed on the screen
5) None of these
14.What is a back up ?
1) Restoring the information backup
2) An exact copy of a system's information
3) The ability to get a system u and runnign in the event of a system crash or failure
4) All of these
5) None of these
15. ............ are lists of commands that appear on the screen
1) GUIs
2) Icons
3) Menus
4) Windows
5) None of these
Answers
1) 2
2) 4
3) 1
4) 3
5) 1
6) 2
7) 3
8) 3
9) 1
10) 3
11) 1
12) 4
13) 2
14) 4
15) 3
1) 2
2) 4
3) 1
4) 3
5) 1
6) 2
7) 3
8) 3
9) 1
10) 3
11) 1
12) 4
13) 2
14) 4
15) 3
Q1. Who programmed the first computer game 'Spacewar!' in 1962?
(a) Steave Russell
(b) Konard Zuse
(c) Alan Emtage
(d) Tim Berners-Lee
(e) None of these
Q2. Who is known as the father of supercomputing?
(a) David J. Brown
(b) Gene Amdahl
(c) Adam Dunkels
(d) Seymour Cray
(e) None of these
Q3. Who created the C programming Language?
(a) Ken Thompson
(b) Dennis Ritchie
(c) Robin Milner
(d) Frieder Nake
(e) None of these
Q4. When NASSCOM (National Association of Software and Services Companies) was established?
(a) 1988
(b) 1997
(c) 1993
(d) 1882
(e) None of these
Q5. Who is known as the father of internet?
(a) Alan Perlis
(b) Jean E. Sammet
(c) Vint Cerf
(d) Steve Lawrence
(e) None of these
Q6. Which one is the first high level programming language?
(a) C
(b) COBOL
(c) FORTRAN
(d) C++
(e) None of these
Q7. Which one is the first word processor application?
(a) MS Word
(b) Apple i Work
(c) Sun StarOffice (
(d) WordStar
(e) None of these
Q8. Which one is the current fastest Supercomputer in India?
(a) PARAM Padma
(b) SAGA-220
(c) PARAM YUVA II
(d) EKA
(e) None of these
Q9. India's first Super Computer PARAM 8000 was installed in?
(a) 1988
(b) 1991
(c) 1995
(d) 1982
(e) None of these
Q10. Who developed Java Programming Language?
(a) James Gosling
(b) Douglas Engelbart
(c) Edmund M. Clarke
(d) James D. Foley
(e) None of these
Q11. Which one is volatile memory in a computer system?
(a) Hard Disk
(b) RAM
(c) ROM
(d) Optical Drive
(e) None of these
Q12. One Terabyte (1 TB) is equal to?
(a) 1028 GB
(b) 1012GB
(c) 1000 GB
(d) 1024 GB
(e) None of these
Q13. Who first developed QWERTY keyboard used in computers and phones?
(a) Raphael Finkel
(b) Wim Ebbinkhuijsen
(c) Shafi Goldwasser
(d) Christopher Latham Sholes
(e) None of these
Q14. Which operating system is developed and used by Apple Inc?
(a) Windows
(b) Android
(c) iOS
(d) UNIX
(e) None of these
Q15. Linus Torvalds develop which operating system?
(a) Windows
(b) Mac OS
(c) UNIX
(d) Linux
(e) None of these
Answers...
1. a
2. d
3. b
4. a
5. c
6. c
7. d
8. c
9. b
10. a
11. b
12. d
13. d
14. c
15. d
#SSC #IBPS #SBI #RBI #NABARD #NICL #NIACL #CAT #NMAT #everydayquiz
No comments:
Post a Comment