1. Mac
Operating System is developed by which company
a. Microsoft
b.
Apple
c. IBM
d. SONY
2. What
is the function of Recycle Bin?
a. Store temporary file
c. Store
Document file
d.
Store
deleted file
3. .jpeg
is an extension of
a. Word
file
b. Audio
file
c. Video
file
d.
Image
file
4. ___________is
known as unauthorized access to others system.
a.
Hacking
b. Decryption
c. Encryption
d. Breaking
5. What
is the symbol for inbox in mail?
a. BOX
b. Circle
c.
Envelope
d. Simley
6. Which
of the following is a function of UPS?
a. It
limits damage caused by fluctuating levels of electricity
b.
It
provides battery back up for limited time
c. It
delivers electronic messages via a bus
d. It
conducts a power-on self test or POST
7. Which
one is the first fully supported 64-bit operating system?
a. Windows
98
b. UNIX
c.
LINUX
d. Android
8. Which
is the oldest version of Windows OS Family
a. Windows
ME
b.
Windows
95
c. Windows
98
d. Windows
NT
9. Which
protocol is used to received e-mail
a. FTP
b. TCP/IP
c. SMTP
d.
POP3
10. Which
protocol is used to send an e-mail
a. HTTP
b. POP3
c. IP
d.
SMTP
11.
The code for a Web page
is written using _____
a. A fifth generation language
b. Win Zip
c. Peripherals
d. Hypertext
Markup Language
12.
What is the process of
copying software programs from secondary storage media to the hard disk called?
a. Configuration
b. Download
c. Storage
d. Installation
13.
Small application
programs that run on a web page and may ensure a form is completed properly or
provide animation are known as _____
a. Flash
b. Spiders
c. Cookies
d. Applets
14.
The first computers were
programmed using _____
a. Assembly language
b. Machine
language
c. Source code
d. Object code
15.
Which process checks to
ensure the components of the computer and operating are connected properly?
a. Booting
b. Processing
c. Saving
d. Editing
16.
In a relational database,
this is a data structure that organizes the information about a single topic
into rows and columns.
a. Block
b. Record
c. Tuple
d. Table
17.
How can the user
determine what programs are available on a computer?
a. Checking the hard disk properties
b. Viewing the installed programs during the
booting process
c. Checking the operating system for a list of
installed programs.
d. Checking
the existing files saved on the disk
18.
When we run a program in
HTML coding _____ is used as back-end and ____ works as front-end.
a. Notepad
- Internet-Explorer
b. Notepad - MSN-messenger
c. MS-Word - Internet Explorer
d. Both (1) and (2)
19.
What
is the ultimate purpose of Defragmentation ?
a.
Make the PC
faster
b.
Create More Free Space
c.
Delete temporary files
d.
Reduce Power consumption
20.
Computers
process data into information by working exclusively with :
a.
multimedia
b.
words
c.
characters
d.
numbers
No comments:
Post a Comment