1. When creating a vertical page break _______.
A. The active cell must be A1
B. The active cell can be anywhere in the worksheet
C. The active cell must be in row 1
D. The active cell must be in column A
E. None of these
Answer C.The active cell must be in row 1
2. In Computer Operating Systems And Data Storage WYSIWYG Stands For:
a) We You See In We You Ground
b) We Yours In Window Your Gate
c) What You See Is What You Get
d) What You See Is What You Got
Answer c) What You See Is What You Get
3. Microsoft Office Written In Which Computer Language?
a) JAVA
b) C++
c) HTML
d) XML
Answer b) C++
4. Which is NOT a function of a microprocessor?
a) keeps the system unit hot
b) keeps system always cool
c) Keeps the system unit cool
d) dont keep the system unit cool
Answer c) Keeps the system unit cool
5. PC cards, flash memory cards, and smart cards are all examples of:
a) Solid state storage devices
b) hard disk
c) ram
d) rom
Answer a) Solid state storage devices
6. Which of the following is a graphical package?
a) CorelDraw
b) illustrator
c) paint
d) microsoft office
Answer a) CorelDraw
7. This is not a function category in Excel ________
a) Operational
b) Logical
c) Unlogical
d) Functional
Answer b) Logical
8. The operating system that is self-contained in a device and resident in the ROM is
a) Inside operating system
b) Outside operating system
c) Explore operating system
d) Embedded Operating System
Answer d) Embedded Operating System
9. On-line real time systems become popular in ___________ Generation
a) First generation
b) Fifth generation
c) Sixth generation
d) Third Generation
Answer d) Third Generation
10. ___________ is the ability of a device to “jump” directly to the requested data
a) Read only
b) Read write both
c) a and d are correct
d) Random access
Answer d) Random access
11. _______ is the combination of keys to switch between the last four places that you have edited.
a) ALT + CTRL + Z
b) ALT + CTRL + Y
c) ALT + TAB + Z
d) ALT + SHIFT + Z
Answer a) ALT + CTRL + Z
12. Superscript, subscript, outline, emboss, engrave are known as ______
a) Font effects
b) Size effects
c) Alignment effect
d) Numeric effect
Answer a) font effects
13. Similar to a hub in an Ethernet network, a _________ helps relay data between wireless network nodes.
a) Wireless access point
b) Portable access point
c) Internet access point
d) system access point
Answer a) Wireless access point
14. In CSMA/CD, the computer sends a fixed unit of data called a(n)_______
a) Racket
b) Joint
c) Packet
d) Point
Answer c) Packet
15. The uniform resource locator (URL) is case sensitive in the ______
a) Directory
b) Bibliography
c) Packet
d) Internet
Answer a) Directory
16. ASCII is a(n)________
a) Encoding standard used to represent point and characters.
b) Encoding standard used to represent letters and characters.
c) Encoding standard used to represent letters and algorithm.
d) Encoding standard used to represent logics and characters.
Answer b) Encoding standard used to represent letters and characters.
12. Who designed the first electronic computer -ENIAC?
a) Hal Abelson
b) Van Neuman
c) Abiteboul
d) Samson Abramsky
Answer b) Van Neuman
17. ________ is the process of carrying out commands
a) Executing
b) Relate
c) Rescued
d) Turn on
Answer a) Executing
18. In word, when you indent a paragraph, you _______
a) Push the text in with respect to the outline
b) Push the text in with respect to the trim
c) Push the text in with respect to the margin
d) Push the text in with respect to the bleed
Answer c) Push the text in with respect to the margin
19. What is a popular program for creating documents that can be read on both a PC and a Macintosh computer?
a) Adobe Acrobat
b) Adobe reader
c) Adobe photoshop
d) Adobe edit
Answer a) Adobe Acrobat
20. Which Of The Following Is Used For Close a Tab On a Browser?
a) Ctrl + T
b) Ctrl + W
c) Ctrl + A For Select All
d) Ctrl +Z
Answer b) Ctrl + W
21. When More Than One Window Is Open, To Switch To The Next Window — Is The Key Combination.
a) CTRL+F5
b) CTRL+F6
c) CTRL+F7
d) CTRL+F8
Answer b) CTRL+F6
22. What Is The Shortcut Key To Indent The Paragraph In Ms Word?
a) Ctrl + M
b) Ctrl + P
c) Shift + M
d) Ctrl + I
Answer a) Ctrl + M
23. The ______ is device which connects in inputs to outputs
a) RAM
b) Cross Point
c) Modem
d) Crossbar
Answer c) Modem
24. ___________ gathers user information and sends it to some one through Internet
a) Spybot
b) Logic Bomb
c) Security
d) Patch
e) Virus
Answer a) Spybot
25. Function of Router in a Network _________
a) forwards a packet to the next free outgoing links
b) determines on which outgoing link a packet is to be forwarded
c) forwards a packet to all outgoing links except the originated link
d) forwards a packet to all outgoing links
Answer b) determines on which outgoing link a packet is to be forwarded
26. Custom Software developed to address specific needs of a company is known as ___________
a) Proprietary
b) Developmental
c) Privately owned
d) Copyrighted
Answer a) Proprietary
27. ________ Values can be represented by a single Byte
a) 16
b) 4
c) 64
d) 256
Answer d) 256
28. _________ malware typically has a tendency to reside in/to get attach to a computer program
a) All the above
b) Worm
c) Computer Virus
d) Trojan Horse
Answer c) Computer Virus
29.The Advantage Of “Touch Screen” Is ___________
a) That It Is Natural To Touch Things
b) That It Uses A Little Screen Space For Each Choice
c) That It Is Not As Tiring As The Keyboard Input
d) All The Above
Answer a) That It Is Natural To Touch Things
30. Which One Of The Following Problem Causes Exception?
a) A Problem In Calling Function
b) A Run-Time Error
c) A Syntax Error
d) Missing Semicolon In Statement In Main
Answer b) A Run-Time Error
31. _______ Was A Search Engine System For The Gopher Protocol
a) Gobbler
b) Archie
c) Veronica
d) Mikky
Answer c) Veronica
32. Which Backup Method Only Backs Up Files That Have Been Modified Since The Last Backup?
a) Incremental Backup
b) Decreamental Backup
c) RAM Backup
d) ROM Backup
Answer a) Incremental Backup
33. In Word, You Can Change Page Margins By
a) Clicking The Right Mouse Button On The Ruler
b) Clicking The Left Mouse Button On The Ruler
c) Clicking The Middle Mouse Button On The Ruler
d) Clicking The Mouse Button On The Ruler
Answer a) Clicking The Right Mouse Button On The Ruler
34. Which Part Of The Computer Helps To Store Information?
a) Disk – Drive
b) Common-Drive
c) Rare-Drive
d) Reel Memory
Answer a) Disk – Drive
35. Perforated Paper Used As Input Or Output Media Is Known As _____
a) Paper Tape
b) Media
c) Desktop
d) Disk Drive
Answer a) Paper Tape
36. FPI stands for____
a.File pre insert
b.File per insert
c.Frames per insert
d.Frames per inch
Answer d.Frames per inch
37. Which is not the portable computer?
a.parallel computers
b.Series Computers
c.mainframe computers
d.mini computers
Answer b.Series Computers
38. A ………… is an additional set of commands that the computer displays after you make a selection from the main menu
a.Dialog box
b.Tool bar
c.Menu bar
d.On screen
Answer a.Dialog box
39. Which of the following is NOT one of the four major data processing functions of a computer?
a.Input of the data
b.Analyzing the data or information
c.Interpret data
d.output of the data
Answer b.Analyzing the data or information
40. Which of the following is not a term pertaining to the Internet?
a.Mouse
b.Keyboard
c.Joystick
d.Monitor
Answer b.Keyboard
41. __________are ‘attempts by individuals to obtain confidential information from you by falsifying their identity.
a.Phishing
b.Hacking
c.Hacker
d.Curuption
Answer a.Phishing
42. Which of the following helps describe the Windows .NET Server?
a. It is designed for different levels of network complexity
b. Phising
c. Windows key
d. RAM
Answer a. It is designed for different levels of network complexity
43. The process of analyzing large data sets in search of new, previously undiscovered relationships is known as:
a. Data mining
b. Data entry
c. Data storage
d. Data compiler
Answer a.Data mining
44. On a CD-RW you can
a.Read, write and rewrite information
b.Read, write and rewrite
c.Read and write
d.Read and rewrite information
Answer a. Read, write and rewrite information
45. What is the function of Recycle Bin?
a.Store deleted file
b.Do not store deleted file
c.Remove store files
d.All
Answer a.Store deleted file
46. Which type of network requires HPNA adapters for communication between network nodes?
a.Computer lane
b.Phone line
c.Phone Operator
d.Internet
Answer d. Internet
47. Which of the following may be necessary for you to do after you install new application software?
a.Cool boost
b.Do a warm boot
c.Hot boot
d.all
Answer a.Cool boost[/su_spoiler
48. Which of the following is NOT part of the motherboard?
a.Connector
b.Protactor
c.Translator
d.Compiler
Answer a.Connector
49. Information that comes from an external source and fed into computer software is called …………….
a.Output
b.Translator
c.Input
d.RAM
Answer c.Input
50. The basic unit of a worksheet
a.Cell
b.Bar
c.Table
d.Lines
Answer a.Cell
A. The active cell must be A1
B. The active cell can be anywhere in the worksheet
C. The active cell must be in row 1
D. The active cell must be in column A
E. None of these
Answer C.The active cell must be in row 1
2. In Computer Operating Systems And Data Storage WYSIWYG Stands For:
a) We You See In We You Ground
b) We Yours In Window Your Gate
c) What You See Is What You Get
d) What You See Is What You Got
Answer c) What You See Is What You Get
3. Microsoft Office Written In Which Computer Language?
a) JAVA
b) C++
c) HTML
d) XML
Answer b) C++
4. Which is NOT a function of a microprocessor?
a) keeps the system unit hot
b) keeps system always cool
c) Keeps the system unit cool
d) dont keep the system unit cool
Answer c) Keeps the system unit cool
5. PC cards, flash memory cards, and smart cards are all examples of:
a) Solid state storage devices
b) hard disk
c) ram
d) rom
Answer a) Solid state storage devices
6. Which of the following is a graphical package?
a) CorelDraw
b) illustrator
c) paint
d) microsoft office
Answer a) CorelDraw
7. This is not a function category in Excel ________
a) Operational
b) Logical
c) Unlogical
d) Functional
Answer b) Logical
8. The operating system that is self-contained in a device and resident in the ROM is
a) Inside operating system
b) Outside operating system
c) Explore operating system
d) Embedded Operating System
Answer d) Embedded Operating System
9. On-line real time systems become popular in ___________ Generation
a) First generation
b) Fifth generation
c) Sixth generation
d) Third Generation
Answer d) Third Generation
10. ___________ is the ability of a device to “jump” directly to the requested data
a) Read only
b) Read write both
c) a and d are correct
d) Random access
Answer d) Random access
11. _______ is the combination of keys to switch between the last four places that you have edited.
a) ALT + CTRL + Z
b) ALT + CTRL + Y
c) ALT + TAB + Z
d) ALT + SHIFT + Z
Answer a) ALT + CTRL + Z
12. Superscript, subscript, outline, emboss, engrave are known as ______
a) Font effects
b) Size effects
c) Alignment effect
d) Numeric effect
Answer a) font effects
13. Similar to a hub in an Ethernet network, a _________ helps relay data between wireless network nodes.
a) Wireless access point
b) Portable access point
c) Internet access point
d) system access point
Answer a) Wireless access point
14. In CSMA/CD, the computer sends a fixed unit of data called a(n)_______
a) Racket
b) Joint
c) Packet
d) Point
Answer c) Packet
15. The uniform resource locator (URL) is case sensitive in the ______
a) Directory
b) Bibliography
c) Packet
d) Internet
Answer a) Directory
16. ASCII is a(n)________
a) Encoding standard used to represent point and characters.
b) Encoding standard used to represent letters and characters.
c) Encoding standard used to represent letters and algorithm.
d) Encoding standard used to represent logics and characters.
Answer b) Encoding standard used to represent letters and characters.
12. Who designed the first electronic computer -ENIAC?
a) Hal Abelson
b) Van Neuman
c) Abiteboul
d) Samson Abramsky
Answer b) Van Neuman
17. ________ is the process of carrying out commands
a) Executing
b) Relate
c) Rescued
d) Turn on
Answer a) Executing
18. In word, when you indent a paragraph, you _______
a) Push the text in with respect to the outline
b) Push the text in with respect to the trim
c) Push the text in with respect to the margin
d) Push the text in with respect to the bleed
Answer c) Push the text in with respect to the margin
19. What is a popular program for creating documents that can be read on both a PC and a Macintosh computer?
a) Adobe Acrobat
b) Adobe reader
c) Adobe photoshop
d) Adobe edit
Answer a) Adobe Acrobat
20. Which Of The Following Is Used For Close a Tab On a Browser?
a) Ctrl + T
b) Ctrl + W
c) Ctrl + A For Select All
d) Ctrl +Z
Answer b) Ctrl + W
21. When More Than One Window Is Open, To Switch To The Next Window — Is The Key Combination.
a) CTRL+F5
b) CTRL+F6
c) CTRL+F7
d) CTRL+F8
Answer b) CTRL+F6
22. What Is The Shortcut Key To Indent The Paragraph In Ms Word?
a) Ctrl + M
b) Ctrl + P
c) Shift + M
d) Ctrl + I
Answer a) Ctrl + M
23. The ______ is device which connects in inputs to outputs
a) RAM
b) Cross Point
c) Modem
d) Crossbar
Answer c) Modem
24. ___________ gathers user information and sends it to some one through Internet
a) Spybot
b) Logic Bomb
c) Security
d) Patch
e) Virus
Answer a) Spybot
25. Function of Router in a Network _________
a) forwards a packet to the next free outgoing links
b) determines on which outgoing link a packet is to be forwarded
c) forwards a packet to all outgoing links except the originated link
d) forwards a packet to all outgoing links
Answer b) determines on which outgoing link a packet is to be forwarded
26. Custom Software developed to address specific needs of a company is known as ___________
a) Proprietary
b) Developmental
c) Privately owned
d) Copyrighted
Answer a) Proprietary
27. ________ Values can be represented by a single Byte
a) 16
b) 4
c) 64
d) 256
Answer d) 256
28. _________ malware typically has a tendency to reside in/to get attach to a computer program
a) All the above
b) Worm
c) Computer Virus
d) Trojan Horse
Answer c) Computer Virus
29.The Advantage Of “Touch Screen” Is ___________
a) That It Is Natural To Touch Things
b) That It Uses A Little Screen Space For Each Choice
c) That It Is Not As Tiring As The Keyboard Input
d) All The Above
Answer a) That It Is Natural To Touch Things
30. Which One Of The Following Problem Causes Exception?
a) A Problem In Calling Function
b) A Run-Time Error
c) A Syntax Error
d) Missing Semicolon In Statement In Main
Answer b) A Run-Time Error
31. _______ Was A Search Engine System For The Gopher Protocol
a) Gobbler
b) Archie
c) Veronica
d) Mikky
Answer c) Veronica
32. Which Backup Method Only Backs Up Files That Have Been Modified Since The Last Backup?
a) Incremental Backup
b) Decreamental Backup
c) RAM Backup
d) ROM Backup
Answer a) Incremental Backup
33. In Word, You Can Change Page Margins By
a) Clicking The Right Mouse Button On The Ruler
b) Clicking The Left Mouse Button On The Ruler
c) Clicking The Middle Mouse Button On The Ruler
d) Clicking The Mouse Button On The Ruler
Answer a) Clicking The Right Mouse Button On The Ruler
34. Which Part Of The Computer Helps To Store Information?
a) Disk – Drive
b) Common-Drive
c) Rare-Drive
d) Reel Memory
Answer a) Disk – Drive
35. Perforated Paper Used As Input Or Output Media Is Known As _____
a) Paper Tape
b) Media
c) Desktop
d) Disk Drive
Answer a) Paper Tape
36. FPI stands for____
a.File pre insert
b.File per insert
c.Frames per insert
d.Frames per inch
Answer d.Frames per inch
37. Which is not the portable computer?
a.parallel computers
b.Series Computers
c.mainframe computers
d.mini computers
Answer b.Series Computers
38. A ………… is an additional set of commands that the computer displays after you make a selection from the main menu
a.Dialog box
b.Tool bar
c.Menu bar
d.On screen
Answer a.Dialog box
39. Which of the following is NOT one of the four major data processing functions of a computer?
a.Input of the data
b.Analyzing the data or information
c.Interpret data
d.output of the data
Answer b.Analyzing the data or information
40. Which of the following is not a term pertaining to the Internet?
a.Mouse
b.Keyboard
c.Joystick
d.Monitor
Answer b.Keyboard
41. __________are ‘attempts by individuals to obtain confidential information from you by falsifying their identity.
a.Phishing
b.Hacking
c.Hacker
d.Curuption
Answer a.Phishing
42. Which of the following helps describe the Windows .NET Server?
a. It is designed for different levels of network complexity
b. Phising
c. Windows key
d. RAM
Answer a. It is designed for different levels of network complexity
43. The process of analyzing large data sets in search of new, previously undiscovered relationships is known as:
a. Data mining
b. Data entry
c. Data storage
d. Data compiler
Answer a.Data mining
44. On a CD-RW you can
a.Read, write and rewrite information
b.Read, write and rewrite
c.Read and write
d.Read and rewrite information
Answer a. Read, write and rewrite information
45. What is the function of Recycle Bin?
a.Store deleted file
b.Do not store deleted file
c.Remove store files
d.All
Answer a.Store deleted file
46. Which type of network requires HPNA adapters for communication between network nodes?
a.Computer lane
b.Phone line
c.Phone Operator
d.Internet
Answer d. Internet
47. Which of the following may be necessary for you to do after you install new application software?
a.Cool boost
b.Do a warm boot
c.Hot boot
d.all
Answer a.Cool boost[/su_spoiler
48. Which of the following is NOT part of the motherboard?
a.Connector
b.Protactor
c.Translator
d.Compiler
Answer a.Connector
49. Information that comes from an external source and fed into computer software is called …………….
a.Output
b.Translator
c.Input
d.RAM
Answer c.Input
50. The basic unit of a worksheet
a.Cell
b.Bar
c.Table
d.Lines
Answer a.Cell