0% found this document useful (0 votes)
14 views

Computer Set - 3

The document consists of a series of multiple-choice questions related to computer terminology and concepts. It covers topics such as computer operations, software types, hardware components, and networking principles. Each question provides four options, testing knowledge on fundamental aspects of computing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Computer Set - 3

The document consists of a series of multiple-choice questions related to computer terminology and concepts. It covers topics such as computer operations, software types, hardware components, and networking principles. Each question provides four options, testing knowledge on fundamental aspects of computing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

1.___ means to enlarge a window to its maximum area so that it will fill entire desktop.

1) Maximize
2) Zoom
3) Enlarge
4) Extend

2. This is the process of getting access to the computer.


1) Sign in
2) Log in
3) Log off
4) enter

3. The full step wise process of closing a computer is called


1) Shutting
2) Closing
3) Log off
4) Shut down

4. A connection form one HTML document to another HTML document is called.


1) Hyper link
2) Connecting link
3) Icon
4) All of these

5. Capability of computer to perform more than one tasks at the same times is
1) Batch processing
2) Real time processing
3) Multitasking
4) Scheduled processing
6. It is the smallest dot that can be uniquely drawn on a computer screen. This is _
1) Boxel
2) Computer dot
3) Cursor
4) Pixel

7. A picture map or graphics or image that can be used in a document is known as.
1) Clip
2) Object
3) Clip board
4) Drag drop

8. Display bar that list all the open folders and active application is _____
1) Menu bar
2) Toolbar
3) Taskbar
4) Window list

9. A large space common in most of the windows which is for users’ work with that
application
is _____
1) Application view
2) Work area
3) Project view
4) Toolbar

10. A photograph, image or any other visual file which is displayed a the back ground of the
windows main icon screen is called as __
1) Wall paper
2) Screen saver
3) Window theme
4) Active desktop

11. All window settings are stored in this file


1) Window.INI
2) Goups.INI
3) Win.IMI
4) Tem.INI

12. CPU can directly understand this language


1) C
2) C++
3) Assembly
4) Java

13. What is the expanded for of CPU?


1) Central Power Unit
2) Cooer Processing Unit
3) Central Processing Unit
4) Core Point Unit

14. A normal compiler takes source code as input and produces this as output ____
1) Assembly code
2) Object code
3) Machine code
4) All of the these

15. Languages which can easily interact with the hardware are called.
1) High Level Language
2) Low Level Language
3) Middle Level Language
4) They are not normally used computer lines

16. To detect, locate and remove errors in program and/or malfunctions in equipment is -
_____
1) Compile
2) Debug
3) Interpret
4) DSS

17. A program written in high-level language is a


1) Complied Program
2) Source Program
3) Objective Program
4) All of the above

18. Which of the following is the most powerful type of computer


1) Super computer
2) Micro computer
3) Main frame computer
4) Mini computer

19. Compliers are


1) Both OS and Hardware dependent
2) Only OS dependent
3) Only Hardware dependent
4) Cannot be generalized for all compilers.

20. Which among the following is/are interpreted language


1) C
2) Visual basic
3) Java
4) Both 2 and 3

21. Hardware that are easily attached to computer and can be played instantly are called as
1) Multimedia
2) Plug and play
3) Digital
4) Point to point

22. Format for musical data communication between two devices such s computer and
synthesizer, is called
1) HTML
2) MP3
3) MPEG
4) MIDI

23. Which of the following is not a web browser?


1) Opera
2) Netscape
3) Microsoft outlook
4) Internet explorer

24. It is a secrets word which is used to prevent access for system or network. It is called
___
1) Loin
2) Password
3) Account No.
4) Net ID
25. All the deleted items are stored in this place until they are permanently deleted. This
place is
1) mailbox
2) temporary folders
3) virtual hard drive
4) recycle bin

26. all the following are examples in input devices except a


1) scanner
2) mouse
3) keyboard
4) printer

27. all of the following are example of output devices EXCEPT a


1) scanner
2) speaker
3) CD
4) Printer

28. The CPU and memory are located on the


1) Expansion board
2) Motherboard
3) Storage device 4)None

29. Output device ____ is a set of computer program used in a computer to help perform
tasks.
1) An instruction
2) Software
3) Memory
4) A processor
30. A __ is approximately a million bytes.
1) Gigabyte
2) Kilobyte
3) Megabyte
4) Terabyte

31. In the URL. http ://www.Sunil.com, the portion labelled http is the
1) Host
2) Domain name
3) Protocol
4) Top-level domain

32. In a database, a field is a


1) Label
2) Table of information
3) Group of related records
4) Category of information

33. The number of pixels displayed on a screen is known as the screen


1) Resolution
2) Colour depth
3) Refresh rate
4) Viewing size

34. A repair for a known software bug, usually available at no charge on the internet, is called
a(n)—
1) Version
2) Patch
3) Tutorial
4) FAQ

35. The time it takes a device to locate data and instructions and make them available to CPU
is
known as ___
1) Clock speed
2) A processing cycle
3) CPU speed access time
4) Access time

36. Which of the following is the correct order of the four major function of a computer?
1) Process, output, input, storage
2) Input, output, proves, storage
3) Process, storage, input, output
4) Input, process, output, storage

37. A byte can hold one _____ of data.


1) Bit
2) Binary digit
3) Character
4) Kilobyte

38. The O/S is the most common type of ____ software.


1) Communication
2) Application
3) System
4) Word-processing software

39. ___ are specially designed computers that perform complex calculation extremely
rapidly.
1) Servers
2) Supercomputers
3) Laptops
4) Mainframes

40. The two broad categories of software are:


1) Word processing and spreadsheet
2) Transaction and application
3) Windows and Mac OS.
4) System an application

41. __ is the result produced by a computer.


1) Data
2) Memory
3) Output
4) Input

42. The human-readable version of a program is called _____


1) Source code
2) Program code
3) Human code
4) System code

43. A ___ is approximately a thousand bytes.


1) Gigabyte
2) Kilobyte
3) Megabyte
4) Terabyte

44. The dies kop contains small graphic called


1) Windows
2) Logos
3) Icons
4) Pictures

45. Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar

46. With is NOT a good web security strategy?


1) Restrict access to the web server; keep a minimum number of ports open
2) Limit the users who can load software, edit or add files.
3) Add demon programs, so users can test system without accessing perdition data.
4) Remove unnecessary compliers and interpreters.

47. ___ Tags when placed on an animal, can be used to record and track in a database all of
the animals movements.
1) POS
2) RFID
3) PPS
4) GPS

48. Smaller and less expensive PC-based servers are replacing ___ in many businesses.
1) Supercomputers
2) Clients
3) Laptops
4) Mainframes
49. The binary system language consists of ___ digit(s).
1) 8
2) 2
3) 1,000
4) 1

50. All of the following are basic principles of networks, except


1) Each computer must have a network card
2) There must be communication media connecting the network and hardware devices
3) There must be at least one connecting device
4) Each computer must have software that supports the movement of information.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy