1. What is backup?
1) Adding more components to your network
2) Protecting data by copying it from the original souse to a different destination
3) Filtering old data from the new data Accessing data on tape
5) Using earlier data
2. The legal right to use software based on specific restrictions is granted via a
1) software privacy policy
2) software license
3) software password manager
4) software log
5) None of these
3. What lose e-mail attachment?
1) A receipt sent by the recipient
2) A separate document from another program sent along with an email
3) A malicious parasite that teeth on your messages and destroys the contents
4) A list of CC or BCC recipients
5) A friend to whom e-mail ff salt regularly
4. Which of the following M the type of software that controls the internal operations in the computer and controls how the computer works with all its parts?
1) Shareware
2) Public domain software
3) Application software
4) Operating system software
5) None of these
5. When data changes in multiple lists and all lists are not updated, this causes
1) data redundancy 2) information overload
3) duplicate data 4) data consistency 5) data inconsistency
6. What lathe main folder on a storage device called?
1) Root directory 2) Interface 3) Device driver
4) Platform 5) Main directory
7. To view information on the Web you must have a
1) cable modem 2) Web browser
3) domain name server 4) hypertext viewer
5) None of these
8. A file is often referred toast
1) wizard 2) document 3) pane
4) device 5) documentation
9. To protect yourself from computer hacker intrusions you should install a
1) firewall 2) trailer 3)macro
4) script 5) None of these
10. What type of computers are client computers (most of the time) tea client-server system?
1) Mainframe 2) Mini-computer
3) Microcomputer 4)PDA
5) None of these
11.What happens when you boot up a PC?
1) Portions of the operating system are copied from disk into memory.
2) Portions of the operating system are copied from memory onto disk,
3) Portions-of the operating system are compiled.
4) Portions of the operating system are emulated.
5) The PC gets switched off.
12. Linux Ban example of
1) freeware 2) open source software
3) shareware 4) complimentary
5) None of these
13. Which of the following software applications would be the most appropriate for performing numerical and statistical calculations?
1) Database 2) Document processor
3) Graphics package 4) Spreadsheet
5) PowerPoint
14. A ____ is used to read handwritten or printed text to make a digital image that is stored in memory.
1) printer 2) laser beam 3) scanner
4) touchpad 5) None of these
15. You organise files by storing them in
1) archives 2)lists 3) indexes
4) folders 5) None of these
16. A ______ is a pre-designed document that already has coordinating fonts, a layout, and a background.
1) guide 2)model 3)ruler
4) template 5) design-plate
17. What is the default file extension for all Word documents?
1)WRD 2)TXT 3) DOC 4)FIL 5) WD
18. Removing and replacing devices without turning off your computer is referred to as
1) Hot swapping 2) Plug-n-Nay 3) Bay swap 4) USB swapping 5) None of these
19. Specialized programs that assist users in locating information on the Web are called
1) information engines 2) locator engines
3) web browsers 4) resource locators
5) search engines
20. Compiling creates a(n)
1) error-free program 2) program specification
3) subroutine 4) algorithm
5) executable program
21. Expansion cards are inserted into
1) slots 2) peripheral devices
3) the CPU 4) the back of the computer 5) None of these
22. A device that connects to a network without the use of cable is said to be
1) distributed 2) non-wired 3) centralised
4) open source 5) wireless
23. A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n)
1) workstation 2)CPU
3) magnetic disk 4) integrated circuit
5) complex circuit
24. Junk e-mail is also called
1) crap 2) spoof 3) sniffer script
4) spool 5) spent
25. A program designed to destroy data on your computer which can travel to "infect' other computers is called a
1) disease 2) torpedo 3) hurricane
4) virus 5) infector
26. ______ shows the files, folders, and drives on your computer, making it easy to navigate from one location to another within the file hierarchy.
1) Microsoft Internet Explorer
2) Windows Explorer
3) My Computer
4) Folders Manager
5) Windows Locator
27. The __________ manual tells you how to use a software program.
1) documentation 2) programming
3) user 4) technical 5) designer
28. A collection of interrelated records is called a
1) utility file 2)management information system
3) database 4) spreadsheet 5) datasheet
Answers :
1 (2) 2 (2) 3 (2) 4 (4) 5 (5) 6 (1) 7 (2) 8 (2) 9 (1) 10 (1)
11 (1) 12 (2) 13 (4) 14 (3) 15 (4) 16 (4) 17 (3) 18 (2) 19 (5) 20 (5)
21 (1) 22 (5) 23 (4) 24 (5) 25 (4) 26 (7) 27 (3) 28 (3)
1) Adding more components to your network
2) Protecting data by copying it from the original souse to a different destination
3) Filtering old data from the new data Accessing data on tape
5) Using earlier data
2. The legal right to use software based on specific restrictions is granted via a
1) software privacy policy
2) software license
3) software password manager
4) software log
5) None of these
3. What lose e-mail attachment?
1) A receipt sent by the recipient
2) A separate document from another program sent along with an email
3) A malicious parasite that teeth on your messages and destroys the contents
4) A list of CC or BCC recipients
5) A friend to whom e-mail ff salt regularly
4. Which of the following M the type of software that controls the internal operations in the computer and controls how the computer works with all its parts?
1) Shareware
2) Public domain software
3) Application software
4) Operating system software
5) None of these
5. When data changes in multiple lists and all lists are not updated, this causes
1) data redundancy 2) information overload
3) duplicate data 4) data consistency 5) data inconsistency
6. What lathe main folder on a storage device called?
1) Root directory 2) Interface 3) Device driver
4) Platform 5) Main directory
7. To view information on the Web you must have a
1) cable modem 2) Web browser
3) domain name server 4) hypertext viewer
5) None of these
8. A file is often referred toast
1) wizard 2) document 3) pane
4) device 5) documentation
9. To protect yourself from computer hacker intrusions you should install a
1) firewall 2) trailer 3)macro
4) script 5) None of these
10. What type of computers are client computers (most of the time) tea client-server system?
1) Mainframe 2) Mini-computer
3) Microcomputer 4)PDA
5) None of these
11.What happens when you boot up a PC?
1) Portions of the operating system are copied from disk into memory.
2) Portions of the operating system are copied from memory onto disk,
3) Portions-of the operating system are compiled.
4) Portions of the operating system are emulated.
5) The PC gets switched off.
12. Linux Ban example of
1) freeware 2) open source software
3) shareware 4) complimentary
5) None of these
13. Which of the following software applications would be the most appropriate for performing numerical and statistical calculations?
1) Database 2) Document processor
3) Graphics package 4) Spreadsheet
5) PowerPoint
14. A ____ is used to read handwritten or printed text to make a digital image that is stored in memory.
1) printer 2) laser beam 3) scanner
4) touchpad 5) None of these
15. You organise files by storing them in
1) archives 2)lists 3) indexes
4) folders 5) None of these
16. A ______ is a pre-designed document that already has coordinating fonts, a layout, and a background.
1) guide 2)model 3)ruler
4) template 5) design-plate
17. What is the default file extension for all Word documents?
1)WRD 2)TXT 3) DOC 4)FIL 5) WD
18. Removing and replacing devices without turning off your computer is referred to as
1) Hot swapping 2) Plug-n-Nay 3) Bay swap 4) USB swapping 5) None of these
19. Specialized programs that assist users in locating information on the Web are called
1) information engines 2) locator engines
3) web browsers 4) resource locators
5) search engines
20. Compiling creates a(n)
1) error-free program 2) program specification
3) subroutine 4) algorithm
5) executable program
21. Expansion cards are inserted into
1) slots 2) peripheral devices
3) the CPU 4) the back of the computer 5) None of these
22. A device that connects to a network without the use of cable is said to be
1) distributed 2) non-wired 3) centralised
4) open source 5) wireless
23. A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n)
1) workstation 2)CPU
3) magnetic disk 4) integrated circuit
5) complex circuit
24. Junk e-mail is also called
1) crap 2) spoof 3) sniffer script
4) spool 5) spent
25. A program designed to destroy data on your computer which can travel to "infect' other computers is called a
1) disease 2) torpedo 3) hurricane
4) virus 5) infector
26. ______ shows the files, folders, and drives on your computer, making it easy to navigate from one location to another within the file hierarchy.
1) Microsoft Internet Explorer
2) Windows Explorer
3) My Computer
4) Folders Manager
5) Windows Locator
27. The __________ manual tells you how to use a software program.
1) documentation 2) programming
3) user 4) technical 5) designer
28. A collection of interrelated records is called a
1) utility file 2)management information system
3) database 4) spreadsheet 5) datasheet
Answers :
1 (2) 2 (2) 3 (2) 4 (4) 5 (5) 6 (1) 7 (2) 8 (2) 9 (1) 10 (1)
11 (1) 12 (2) 13 (4) 14 (3) 15 (4) 16 (4) 17 (3) 18 (2) 19 (5) 20 (5)
21 (1) 22 (5) 23 (4) 24 (5) 25 (4) 26 (7) 27 (3) 28 (3)
sbi mark 8
ReplyDelete