0% found this document useful (0 votes)
15 views

LM Computer

Computer questions

Uploaded by

ajay saini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
15 views

LM Computer

Computer questions

Uploaded by

ajay saini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 21
Time Status ° Q. 131 1150 31s Correct t © Which of the following is the extension for Microsoft Excel File? Jets Fie Ten D. .xel - .xls is the extension for Microsoft Excel File. - Microsoft Excel enables users to format, organize and calculate data in a spreadsheet. - By organizing data using software like Excel, data analysts and other users can make information easier to view as data is added or changed. - Excel contains a large number of boxes called cells that are ordered in rows and columns. Time Status ° Q.132/150 145 ~~ Correct. I © Which of the following hardware was not used in the fourth generation of computers? Status | Time Taken | You Correct | 14s | Topper | Correct 15s Integrated Circuits with VLSI technology B. Semiconductor memory C. Vacuum Tubes D. Magnetic tapes and Floppy The Hardware used in the fourth generation of computers were — - Integrated Circuits with Very Large-Scale Integration (VLSI) technology - Semiconductor memory - Magnetic tapes and Floppy Vacuum tubes, on the other hand, were primarily used in the first and second generations of computers (1940s to early 1960s). They were replaced by transistors and then MOSFETs (Metal-Oxide- Semiconductor Field-Effect Transistors) in subsequent generations due to their large size, heat generation, and power consumption. Therefore, vacuum tubes were not used in the fourth generation of computers, making option C the correct answer. Time Status : Q. 133/150 48s Wrong ' o Which of the following is the first boot sector virus? | | Status | Time Taken 48s Topper | Correct 9s A. Creeper B. Brain ~ C. Code Red D. Computed It has been 26 years to the day when the computing world was introduced to its first virus: The Brain. The Brain was a boot sector virus that was written on and for floppy disks and spread by the exchange of disks between users. Time Status ; Q.134/150 38, Correct @ is a shortcut key used to open windows task manager. | | status | Time Taken Correct 385s Topper | Correct 16s A. Ctrl + Esc B. Ctrl+K C. Ctrl + Shift + Esc D. Alt+F4 ¢ Ctrl + Shift + Esc is used as a shortcut key used to open windows task manager. « Ctrl + K is used to insert hyperlinks for the selected text. « Alt + F4 is close the program that is currently active. Time Status . Q.135/150 415 Correct \! @ Which of the following feature in MS Word is useful for automatically fixing misspelled words and correcting capitalization of words? | | Status | Time Taken A. Auto Change B. Spell Checker C. Auto Correct D. Thesaurus In Microsoft Word, the AutoCorrect feature is useful for automatically fixing misspelled words and correcting capitalization of words. However, if you do not want some of the corrections to be done automatically, you can turn off some or all AutoCorrect features. You can also add new automatic corrections on words you commonly mistype or remove words you do not want automatically corrected. Time Status . Q. 136 /150 21s Wrong \! @ What is the shortcut key to select an entire row in MS Excel? Status | Time Taken You Wrong 21s Topper | Correct 15s A. Ctrl + Spacebar B. Shift + Spacebar g C. Ctri+ Alt D. Ctrl+End The shortcut key to select an entire row in Microsoft Excel is Shift + Spacebar. When we press Shift + Spacebar, it highlights the entire row where the active cell is located. This selection makes it easy to perform actions on the entire row, such as copying, formatting, or deleting it. It is a useful shortcut when working with large datasets in Excel. Time Status . Q. 137/150, 195 ~~ Correct. @ Which of the following view makes it easy to sort and organize the sequence of your slides as you prepare to print your slides? Status | Time Taken You Correct 10s Topper | Correct 16s A. — File Manager view B. Slide Master view C. Slide Sorter view D. File Sorter view PowerPoint Slide Sorter is one of the views available in Microsoft PowerPoint that lets you view all your slides in the form of thumbnails sorted horizontally. Slide Sorter view gives you a view of your slides in thumbnail form. This view makes it easy for you to sort and organize the sequence of your slides as you prepare to print your slides. Time Status 7 Q.138/150 555 ~~ Correct \! @ Which of the following acts as the temporary data storage area between a peripheral device and CPU to compensate for the difference between their speeds? Status | Time Taken You Correct 55s Topper | Correct 16s A. Compiler B. Buffer a C. Spool D. Linker - Buffer is the temporary data storage area between a peripheral device and the CPU which compensates for the difference between their speeds. - A buffer is a region of a physical memory storage used to temporarily store data while it is being moved from one place to another. - Typically, the data is stored in a buffer as it is retrieved from an input device (such as a microphone) or just before it is sent to an output device (such as speakers). - However, a buffer may be used when moving data between processes within a computer. This is comparable to buffers in telecommunication. Time Status ; Q. 139/150 265 Correct \! @ What is called for the unsolicited bulk messages sent through email? Status | Time Taken “vee A. Mail Clutter B. Default Mail C. Trash Data D. Email Spam Email spam, also Known as junk email, is unsolicited bulk messages sent through email.Spam email is a form of commercial advertising which is economically viable because email is a very cost-effective medium for the sender. If just a fraction of the recipients of a spam message purchase the advertised product, the spammers are making money and the spam problem is perpetuated. Cc” Time Status 7 Q. 140/150 32s Wrong \! @ Which of the following is a collection of rules implemented for searching, retrieving as well as displaying documents from isolated sites? sei ir an A. Telnet B. Gopher Oy Cc. IMAP D. ARP Gopher is a collection of rules implemented for searching, retrieving as well as displaying documents from isolated sites. Gopher also works on the client/server principle. Time Status ° Q. 141/150 13s Wrong ! @ Which of the following is a hyperlink that direct readers to specific place within a document? Status | Time Taken You Wrong 13s Topper | Correct 235 A. Cross reference B. Bookmark C. Placeholder D. Objects A bookmark is a kind of hyperlink that directs readers to a specific place within a document. Bookmarks are commonly used within tables of contents to enable readers to go straight to a particular document section. Time Status Q. 142/150 5s Correct i @ is the smallest and fastest memory in a computer located in the CPU. Status | Time Taken A. Virtual memory B. Cache memory C. Register memory D. Semi-volatile memory Register memory is the smallest and fastest memory in a computer. It is in the CPU in the form of registers. A register temporarily holds frequently used data, instructions and memory address that can be quickly accessed by the CPU. Time Status . Q.143/150 3gs Correct \! @ The Open Systems Interconnection (OSI) Model has layers to transmit data from one to another system. Status Time Taken You Correct 38s Topper | Unattempted 8s A. 5 B. 7 Sv Cc 9 D. 10 Open System Interconnection is a reference model that describes how information from a software application in one computer moves through a physical medium to the software application in another computer. OSI consists of seven layers, and each layer performs a particular network function. Here are the seven layers of the OSI model: 1) Physical Layer 2) Data Link Layer 3) Network Layer 4) Transport Layer 5) Session Layer 6) Presentation Layer 7) Application Layer Time Status : Q.144/150 325 Correct \! © What is the process of copying software programs from secondary storage media to the hard disk called? Status | Time Taken You Correct 32s Topper | Wrong 22s A. Configuration B. Download C. Installation 2 D. Upload - Installation is the process of making hardware and/or software ready for use. - It is the process of copying software programs from secondary storage media to the hard disk. - Also called a "setup program" or "installer," it is software that prepares an application (software package) to run in the computer. - Unless the application is a single function utility program, it is made up of many individual files that are often stored in several levels of folders in the user's computer. - In some cases, hundreds and even thousands of files are part of an application. Time Status . Q. 145/150 8s Wrong ! © Which of the following is not one of the Control keys in a keyboard? Status | Time Taken You Wrong 8s Topper | Correct 19s A. Home B. End C. Delete D. — Shift mA Control keys, often referred to as Ctrl keys, are a set of special keys on a computer keyboard that are used in combination with other keys to perform various functions and keyboard shortcuts in software applications and operating systems. These keys provide cursor and screen control. It includes four directional arrow keys. Control keys also include Home, End, Insert, Delete, Page Up, Page Down, Control (Ctrl), Alternate (Alt), Escape (Esc). Time Status 2 Q.146/150 3, Correct \! @ Which of the following function is used to update or refresh the window while using? [se [Fine Ten A. F3 B. FS v Cc. F8 D. F9 In all modern Internet browsers, pressing F5 refreshes or reloads the page or document window. When pressing Ctrl + F5 , it forces a complete refresh of the web page, clearing the cache and downloading all contents of the page again. Time Status : Q.147;150 36s corect U@® Which of the following is not an output device used in a computer? [satire Ten fou careet| 708 You A. — Digitizer B. Graphic Plotter C. Printer D. Projector Digitizer is a computer input device that has a flat surface and usually comes with a stylus. It enables the user to draw images and graphics using the stylus as we draw on paper with a pencil. Time Status ° Q. 148 / 150 18s Correct \! © There are 3 types of Data Transmission modes. Which of the following is not one of them? [sa [rine Ten A. Complex Mode o B. Simplex Mode C. Half Duplex Mode D. Full Duplex Mode Data Transmission modes refer to the way of transferring the information or data between two connected devices. Three types of transmission modes are: - Simplex Mode - Half Duplex Mode - Full Duplex Mode Time Status ° Q. 149 1150 6s Correct ! @ Which of the following is not an example of web browser? Status | Time Taken You Correct 6s Topper | Correct 12s A. Yahoo Ei B. Chrome C. Opera D. Firefox - Aweb browser is software that allows a computer user to find and view information on the Internet. - Web browsers interpret the HTML tags in downloaded documents and format the displayed data according to a set of standard style rules. - Microsoft's Internet Explorer, Mozilla Firefox, Google Chrome, Apple's Safari, and Opera are examples of web browsers. - Yahoo is not a web browser but a search engine. Time Status . Q. 150/150 29s Wrong ' @ Which of the following is NOT an example Utility Programme? Status | Time Taken You Wrong 295s Topper | Correct 9s A. WinZip B. Linux i C. Avast D. All the above are Utility Programmes A utility program is a type of system software that assists users with controlling or maintaining the operation of a computer, its devices, or its software. Utility programs typically offer features that provide an environment conducive to successful use of application software. Examples: WinZip, Avast, etc., Linux is an Operating System which is a system Software.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy