1. Which
operating system is developed and used by Apple Inc.
a. Windows
b.
Macintosh
c. Apple
d. Andriod
2. Which
of the following programming language is used to create programs like applets?
a. COBOL
b.
Java
d. Flash
3. Which
one programming language is exclusively used for artificial intelligence
a.
Prolog
b. Analog
c. C
d. Fortran
4. A
dual layer Blue-ray Disc can store data upto
a. 700
MB
b. 1GB
c. 4.7GB
d.
50GB
5. Which
of the following is not an operating system
a. Windows
b. LINUX
c. MAC
d.
J2EE
6. Which
of the following can hold maximum data?
a. Optical
disk
b. Floppy
disk
c. Compact
Disk
d.
Magnetic
tape
7. A
connection from one HTML document to another HTML document is called:
a. Joint
b.
Hyper
Link
c. Connector
d. All
of these
8. Which
of the following is not a computer language?
a. BASIC
b. FORTRAN
c. COBOL
d.
MICROSOFT
9. Which
of the following storage media provides sequential access only?
a. Floppy
disk
b. Magnetic
disk
c.
Magnetic
tape
d. Optical
disk
10. Which
of the following is not a database management software
a. SQL
b.
COBOL
c. ORACLE
d. Sybase
11.
Which grouping do you
work with when formatting text in word?
a. Tables,
paragraphs and indexes
b. Paragraphs, indexes and sections
c. Characters, sections and paragraphs
d. Indexes, characters and tables
12.
What is backup?
a. Adding more components to your network
b. Protecting
data by copying it from the original source to a different destination
c. Filtering old data from the new data
d. Accessing data on tape
13.
Network components are
connected to the same cable in the _____ topology.
a. Star
b. Ring
c. Bus
d. Mesh
14.
This component is
required to process data into information and consists of integrated circuits.
a. Hard disk
b. RAM
c. CPU
d. ROM
15.
One advantage of
dial-up-internet access is ___
a. It utilises broadband technology
b. It
utilizes existing telephone service
c. It uses a router for security
d. Modem speeds are very fast
16.
What is the term for
unsolicited e-mail?
a. News group
b. Use net
c. Backbone
d. Spam
17.
Two or more computers
connected to each other of sharing information form a _____
a. Network
b. Router
c. Server
d. Tunnel
18.
Computers that are
portable and convenient for users who travel are known as _____
a. Super computers
b. Lap
tops
c. Mini computers
d. File servers
19.
A computer checks the _____ of user names and
passwords for a match before granting access.
a. Website
b. Network
c. Backup file
d. Data
base
20.
Office LANs that are
spread geographically apart on a large scale can be connected using a corporate
_____
a. CAN
b. LAN
c. DAN
d. WAN
No comments:
Post a Comment