Q1. Which of the following is true about Assembly language?
(a) It is a Machine Language
(b) It is a High-level programming language
(c) It is a low-level programming language
(d) It is a language for assembling computers
(e) None of the above
Q2. Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
(a) Toggle
(b) Cold booting
(c) Warm booting
(d) Logging off
(e) None of the above
Q3. Main memory works in conjunction with _________.
(a) special function cards
(b) RAM
(c) CPU
(d) Intel
(e) All of the above
Q4. Which of the following options is used to display information such as title, page number of the document?
(a) Insert Table
(b) Header and Footer
(c) Thesaurus
(d) Spelling and Grammar
(e) Auto correct
Q5. Functions of keys F1, F2 and F3 are _____________ respectively.
(a) activating menu bar, search and renaming selected icon
(b) search, reboot and activating menu bar
(c) activating help, renaming selected icon and search
(d) reboot, activating help and refresh
(e) activating help, reboot, renaming selected icon
Q6. What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
(a) Haptics
(b) Caves
(c) Biometrics
(d) RFID
(e) All of the above
Q7. What does the SMTP in an SMTP server stand for?
(a) Simple Mail Transfer Protocol
(b) Serve Message Text Process
(c) Short Messaging Text Process
(d) Short Messaging Transfer Protocol
(e) Simple Messaging Text Process
Q8. What is JDBC?
(a) Utility Software
(b) Application Software
(c) Application Programming Interface (API)
(d) Programming Language
(e) None of the above
Q9. Which of the following is any malicious computer program which is used to hack into a computer by misleading users of its true intent?
(a) Worm
(b) Spyware
(C) Trojan horse
(d) Keylogger
(e) VGA file
Q10. In E-R diagram, relationship is represented by _________.
(a) diamond shaped
(b) circular shaped
(c) ellipse shaped
(d) square shaped
(e) None of the above
Q11. What is the short cut key to open Font dialog box in MS Word?
(a) Ctrl + F
(b) Alt + Ctrl + F
(c) Ctrl + D
(d) Ctrl + Shift + D
(e) Alt + F4
Q12. Codec refers to _____?
(a) Coder-decoder
(b) Co-declaration
(c) Command declaration
(d) Command decoding
(e) None of the above
Q13. Palmtop computer is also known as _______.
(a) Personal computer
(b) Notebook computer
(c) Tablet PC
(d) Handled computer
(e) None of the above
Q14. What is the function of an operating system?
(a) Manages computer’s resources very efficiently
(b) Takes care of scheduling jobs for execution
(c) Manages the flow of data and instructions
(d) All of the above
(e) None of the above
Q15. Which among the following is an architecture followed by P2P?
(a) Client/ server
(b) Distributed
(c) Centralized
(d) 1- tier
(e) None of the above
Solutions
S1. Ans (c)
Sol. An assembly (or assembler) language, is a low-level programming language for a computer, or other programmable device .
S2. Ans (b)
Sol. Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
S3.Ans (c)
Sol. Main memory works in conjunction with CPU
S4. Ans (b)
Sol. The header is a section of the document that appears in the top margin, while the footer is a section of the document that appears in the bottom margin. Headers and footers generally contain information such as the page number, date, and document name.
S5. Ans. (c)
Sol. Functions of keys F1, F2 and F3 are activating help, renaming selected icon and search respectively.
S6. Ans. (c)
Sol. Biometrics is the measurement and statistical analysis of people’s physical and behavioral characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.
S7. Ans(a)
Sol. SMTP stands for Simple Mail Transfer Protocol
S8. Ans. (c)
Sol. Java Database Connectivity (JDB(C) is an application programming interface (API) for the programming language Java, which defines how a client may access a database. It is part of the Java Standard Edition platform, from Oracle Corporation.
S9. Ans. (c)
Sol. In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack intoa computer by misleading users of its true intent.
S10. Ans (a)
Sol. Diamond shaped figure is used to represent relationship in E-R diagram.
S11. Ans (c)
Sol. Ctrl+D key to open font dialog box.
S12. Ans (a)
Sol. A codec is a device or computer program for encoding or decoding a digital data stream or signal.
S13. Ans (d)
Sol. A Palmtop PC was an about pocket calculator-sized, battery-powered PC in a horizontal clamshell design with integrated keyboard and display. It could be used like a subnotebook, but was light enough to be comfortably used handheld as well. That is the reason they were also known as handheld devices.
S14. Ans (d)
Sol. All the given options are functions of operating system.
S15. Ans (b)
Sol. Peer-to- peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers.

No comments:
Post a Comment