Computer Set - 7
Computer Set - 7
Computer Set - 7
1) Programming language
2) Programming structure
3) Syntax
4) Logic chart
2. ____ is a set of key words, symbols, and a system of rules for constructing statements
by which humans can communicate the instructions to be executed by a computer.
1) A computer program
2) A programming language
3) An assembler
4) Syntax
7. What is MP3?
1) A mouse
2) A printer
3) A sound format
4) A scanner
9. ___ is the act of copying or downloading a program form network and making multiple
copies of it.
1) Network piracy
2) Plagiarisms
3) Software piracy
4) Site-license piracy
11. Instructions that tell the computer what to do. Another name for software.
1) Programs
2) CPU
3) Options
4) Folder
12. A program which helps create written document and lets you go back and make
corrections
as necessary.
1) Spread sheet
2) Personal writer
3) Word printer
4) Word processor
15. A blinking indicator that shows you where your next action will happen.
1) CPU
2) Cursor
3) Tool bar
4) Boot
16. The __ key and the ___ key can be used in combination with other keys to perform
shortcuts and special tasks.
1) Control, Alt
2) Function, toggle
3) Delete, Insert
4) Caps Lock, Num Lock
18. For creating a document, you use ___ command at File Menu.
1) Open
2) Close
3) New
4) Save
22. A ___ is the term used when a search engine returns a Web page that matches the
search criteria.
1) Blog
2) Hit
3) Link
4) View
23. The __ is the term used to describe the window that is currently being used.
1) Web Window
2) Display Area
3) WordPad Window
4) active window
26. An E-mail address typically consists of a user ID followed by the __ sign and the name of
the e-mail server that manages the user’s electronic post office box.
1) @
2) #
3) &
4) *
27. A personal computer is designed to meet the computing needs of a(n) ___
1) Individual
2) Department
3) Company
4) City
28.Kilobyte is equal to -
(A) 8000 Bits
(B) Compiler
(C) Linker
(D) Interpreter
(B) F12
(C) F1
(D) F10
32.The performance of a hard drive or other storage devices, meaning how long it takes to
locate a file is called?
(A) Access Time
(B) Quick Time
33.In the terminology of information technology, what is the colonel breach called?
(A) Crash
(C) Dump
(D) RAM
(B) Measurement
(C) Electric
(D) Logical
(B) COBOL
(C) PASCAL
(B) Tokyo
(C) California
(D) Praqackfurt
40.Which among the following key is used for checking grammar and spelling?
(A) F3
(B) F5
(C) F7
(D) F9
41.What do we call a storage device where the access time is effectively independent of the
location of the data?
(A) Direct Access Storage Device
(C) Intel
(D) Google
(B) Memory
(B) ROM
(C) RAM
(D) Processor
(B) ENIAC
(C) UNIVAC
(D) IDSAC
(B) Dialup
(C) Diagnostic
(B) Buffering
(C) Decoding
(D) Amplifying
49.Bridge works in _____ of the OSI model.
(A) Transport layer