Sunday 13 December 2020

13 Dec 2020 MS Office Test Result

 


13 Dec 2020 MS Office Test Result
S P SHARMA CLASSES

S. No.

Name

Marks

1

Pooja Chauhan

42

2

Preet Kaur

40

3

Swati

40

4

Yogesh

40

5

Garima Batra

39

6

Kavita Chahar (JP)

39

7

Kaushal

38

8

Venuka Khanna

38

9

Bharti Goel

37

10

Poonam Yadav

36

11

Himanshu

36

12

Mukesh

35

13

Priyanka Arora

35

14

Neha Gupta

35

15

Vikram Sharma

35

16

Lovely

34

17

Shahib

34

18

Manasi Adhikary

34

19

Bhavyansh

34

20

Amar

33

21

Bhavna

33

22

Prabhjot Kaur

33

23

Priyanka Yadav

32

24

Khushbu

32

25

Shubham

32

26

Kulshum

32

27

Shefali Mavi

32

28

Devansh Maurya

32

29

Surya

31

30

Yugalkishore Tiwari

31

31

Lalit

31

32

Vibhakar

31

33

Hitesh Kumar

31

34

Rajneesh Pratap Singh

31

35

Ambika Sharma

31

36

Vansh Tyagi

30

37

Manoj Kumar

30

38

Sagar Yadav

30

39

Neety Yadav

30

40

Ajit Kumar

30

41

Ansh

30

42

Meerayadav

30

43

Sunaina Bizenia

30

44

Nisha

30

45

Rahul Singhal

29

46

Priyanka Soni

29

47

Rajkumar Mathuriya

29

48

Anupam Singh

29

49

Rakesh

28

50

Divya

28

51

Bhagwan Ram

28

52

Deepti

28

53

Gaurav Gahlot

27

54

Sonika

27

55

Amita

27

56

Hemant Kr Singh

26

57

Aksh Gupta

26

58

Sagar Upadhyay

26

59

Deepanshu

26

60

Sachin Kumar Chaudhary

26

61

Shivam Sharma

26

62

Meenakshi Lochab

26

63

Anuj

26

64

Rajesh

26

65

Puneet Dabas

25

66

Bharti Jha

24

67

Alka Sharma

24

68

Rahul

24

69

Jyoti Sharma

24

70

Vipin

23

71

Pratibha

23

72

Sony Jha

23

73

Rohit

23

74

Annu

22

75

Renu Gahlot

22

76

Tushar Chandila

21

77

Shlau

21

78

Navneet Kumar

21

79

Priya Chaurasia

21

80

Akanksha Sharma

20

81

Aakash Gupta

20

82

Geetika

20

83

Harshit Joshi

19

84

Rekha

19

85

Shashi Bhushan

19

86

Charu

19

87

Anushka

19

88

Pooja Rana

19

89

Kundan Kumar Rana

18

90

Sachin Kumar Tehlan

18

91

Shehbaz

18

92

Paras Kumar

17

93

Krishan Pal

17

94

Akib Zaved

17

95

Atul

16

96

Jitender

16

97

Surbhi

16

98

Nancy Aggrawal

16

99

Jaya Rathore

16

100

Anurag

15

101

Seema

15

102

Deepak Kumar Yadav

12

103

Ritik Bansal

12

104

Gaurav

12

105

Amit Sharma

11

106

Ritesh

10

107

Gourav Kashyap

9



General Computer Test - 146

 

1. In a survey of more than 500 companies and government agencies, percent detected computer security breaches.

A. 20

B. 75

C. 85

D. 99

Answer: C

2. The survey showed that these businesses lost more than due to security breaches.

A. $100,000 each

B. $377 million

C. five employees each

D. $1 million

Answer: B

3. The typical computer criminal is a(n):

A. young hacker.

B. trusted employee with no criminal record.

C. trusted employee with a long, but unknown criminal record.

D. overseas young cracker.

Answer: B

4. The majority of computer crimes are committed by:

A. hackers.

B. insiders.

C. overseas criminals.

D. young teenage computer geniuses.

Answer: B

5. The common name for the crime of stealing passwords is:

A. spooling.

B. identity theft.

C. spoofing.

D. hacking.

Answer: C Reference: Theft by Computer

6. Collecting personal information and effectively posing as another individual is known as the crime of:

A. spooling.

B. identity theft.

C. spoofing.

D. hacking.

Answer: B

7. Malicious software is known as:

A. badware.

B. malware.

C. maliciousware.

D. illegalware.

Answer: B

8. A program that performs a useful task while simultaneously allowing destructive acts is a:

 

A. worm.

B. Trojan horse.

C. virus.

D. macro virus.

Answer: B Moderate

9. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

A. Trojan horse.

B. virus.

C. time bomb.

D. time-related bomb sequence.

Answer: B

10. In 1999, the Melissa virus was a widely publicized:

A. e-mail virus.

B. macro virus.

C. Trojan horse.

D. Time bomb.

Answer: A

11. What type of virus uses computer hosts to reproduce itself?

A. Time bomb

B. Worm

C. Melissa virus

D. Macro virus

Answer: B

12. The thing that eventually terminates a worm virus is a lack of:

 

A. memory or disk space.

B. time.

C. CD drive space.

D. CD-RW.

Answer: A

13. When a logic bomb is activated by a time-related event, it is known as a:

A. time-related bomb sequence.

B. virus.

C. time bomb.

D. Trojan horse.

Answer: C

14. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:

A. time-related bomb sequence.

B. virus.

C. time bomb.

D. Trojan horse.

Answer: C

15. What is the name of an application program that gathers user information and sends it to someone through the Internet?

A. A virus

B. Spybot

C. Logic bomb

D. Security patch

 

Answer: B

16. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:

A. more complicated.

B. more difficult.

C. easier.

D. slower.

Answer: C

17. HTML viruses infect:

A. your computer.

B. a Web page in the HTML code.

C. both a Web page and the computer that is viewing it.

D. No

Answer: B

18. Software programs that close potential security breaches in an operating system are known as:

A. security breach fixes.

B. refresh patches.

C. security repairs.

D. security patches.

Answer: D

19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

A. a virus.

B. a Trojan horse.

C. cracking.

 

D. a denial of service attack.

Answer: D

20. is the measurement of things such as fingerprints and retinal scans used for security access.

A. Biometrics

 B. Biomeasurement

C. Computer security

 D. Smart weapon machinery

Answer: A

21. What is the most common tool used to restrict access to a computer system?

A. User logins

B. Passwords

C. Computer keys

D. Access-control software

Answer: B

22. The most common passwords in the U.S. or Britain include all EXCEPT:

A. love.

B. Fred.

C. God.

D. 123.

Answer: D

23. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):

A. hacker-proof program.

B. firewall.

C. hacker-resistant server.

D. encryption safe wall.

Answer: B

24. The scrambling of code is known as:

A. encryption.

B. a firewall.

C. scrambling.

D. password proofing.

Answer: A

25. If you want to secure a message, use a(n):

A. cryptology source.

B. encryption key.

C. encryption software package.

D. cryptosystem.

Answer: D Reference: How It Works: 10.2 Cryptography

General Computer Test - 145

 

1. The term ‘Computer’ is derived from..........

a. Latin

b. German

c. Frenc         

 d. Arabic

1. A

2. Who is the inventor of “Difference Engine”?

a. Allen Turing

b. Charles Babbage

c. Simur Cray

d. Augusta Adaming

2.B

3. Who is the father of Computer?

a. Allen Turing

b. Charles Babbag

 c. Simur Cray

d. Augusta Adaming

3. B

4. Who is the father of Computer science?

a. Allen Turing

b. Charles Babbage

c. Simur Cray

 d. Augusta Adaming

4. A

5. Who is the father of personal computer?

a. Edward Robert

b. Allen Turing

c. Charles Babbage

d. None of these

5. A

6. A CPU contains

a. a card reader and a printing devic

 b. an analytical engine and a control unit

c. a control unit and an arithmetic logic unit

d. an arithmetic logic unit and a card reader

6. C

7. Which of the following controls the process of interaction between the user and the operating system?

a. User interface

 b. Language translator

c. Platform

d. Screen saver

7. A

8. The first computers were programmed using

a. assembly languag

 b. machine language

c. source code

 d. object code

8. B

9. ..........is a combination of hardware and software that facilitates the sharing of information between computing devices.

a. network

 b. periphera

 c. expansion boar

 d. digital device

9.A

10. Coded entries which are used to gain access to a computer system are called

a. Entry code

 b. Passwords

c. Security commands

d. Code words

10.B

11. Which of the following statements is true ?

a. Minicomputer works faster than Microcomputer

b. Microcomputer works faster than Minicomputer

c. Speed of both the computers is the same

d. The speeds of both these computers cannot be compared with the speed of advanced

11.A

12. You organize files by storing them in

a. archive

 b. folder

 c. indexe

 d. lists

12.B

13. What type of resource is most likely to be a shared common resource in a computer Network?

a. Printers

b. Speaker

 c. Floppy disk drive

 d. Keyboards

13.A

14. Which device is required for the Internet connection?

a. Joystic

 b. Mode

 c. CD Drive

d. NIC Card

14.B

15. What is a light pen?

a. A Mechanical Input device

 b. Optical input device

c. Electronic input device

d. Optical output device

15.B

16. UNIVAC is

a. Universal Automatic Computer

 b. Universal Array Computer

c. Unique Automatic Computer

 d. Unvalued Automatic Computer

16.A

17. CD-ROM stands for

a. Compactable Read Only Memory

b. Compact Data Read Only Memory

c. Compactable Disk Read Only Memory

 d. Compact Disk Read Only Memory

17.A

18. ALU is

a. Arithmetic Logic Unit

b. Array Logic Unit

c. Application Logic Unit

d. None of above

18.A

19. VGA is

a. Video Graphics Array

 b. Visual Graphics Array

c. Volatile Graphics Array

d. Video Graphics Adapter

19.A

20. IBM 1401 is

a. First Generation Computer

 b. Second Generation Computer

c. Third Generation Computer

d . Fourth Generation Computer

20.B

21. MSI stands for

a. Medium Scale Integrated Circuits

 b. Medium System Integrated Circuits

c. Medium Scale Intelligent Circuit

 d. Medium System Intelligent Circuit

21.A

22. The capacity of 3.5 inch floppy disk is

a. 1.40 MB

b. 1.44 GB

 c. 1.40 GB

 d. 1.44 MB

22.D

23. WAN stands for

a. Wap Area Network

b. Wide Area Network

c. Wide Array Net

d. Wireless Area Network

23.B

24. MICR stands for

a. Magnetic Ink Character Reader

b. Magnetic Ink Code Reader

c. Magnetic Ink Cases Reader

d. None of  these

24.A

25. EBCDIC stands for

a. Extended Binary Coded Decimal Interchange Code

b. Extended Bit Code Decimal Interchange Code

c. Extended Bit Case Decimal Interchange Code

d. Extended Binary Case Decimal Interchange Code

25. A

General Computer Test - 144


Q.1 A computer communication technology that provides a way to interconnect multiple computer across short distance is

(A) LAN

(B) MAN

(C) WAN

 (D) Wireless network

Ans: A LAN

Q.2 Telnet is a service that runs

(A) Television on net

 (B) Remote program

(C) Cable TV network

(D) Telenext

Ans: B Remote program

Q.3. A device that forwards data packet from one network to another is called a

(A) Bridge

(B) Switch

(C) Hub

(D) Gateway

Ans: B Switch

Q.4 Which of the following is the fastest media of data transfer

(A) Co-axial Cable

(B) Untwisted Wire

(C) Telephone Lines

(D) Fibre Optic

Ans: D Fiber Optic.

Q.5 Tool that is used to transfer data/files among computers on the Internet

(A) FTP

 (B) Archie

(C) TCP

(D) Gopher

Ans: C TCP

Q.6 HTML is a

(A) Programming Language

 (B) Scripting Language

(C) Web Browser

 (D) Network Protocol

Ans: B Scripting Language

Q.7 Secret-key encryption is also known as

(A) Asymmetric encryption

(B) Symmetric encryption

(C) Secret-encryption

(D) Private encryption

Ans: D Private encryption

Q.8 The concept of electronic cash is to execute payment by

(A) Credit Card

(B) ATM Card

(C) Using computers over network

(D) Cheque

Ans: C Using computers over network.

Q.9 SMTP is a

(A) Networking Protocol

(B) Protocol used for transferring message between end user & Mail Server

(C) Protocol used for smart card message interchange

(D) Encryption Standard

Ans: B Protocol used for transferring message between end user & Mail Server.

Q.10 Digital Signature is

(A)Scanned Signature on Computer

(B) Code number of the sender.

(C)Public Key Encryption.

(D)Software to recognize signature.

Ans: D Software to recognize signature

Q.11 Telnet is a

(A) Network of Telephones

(B) Television Network

(C) Remote Login

(D) Remote Login.

Ans: C Remote Login.

Q.12 The internet is

(A) Network of networks

(B) Web site.

(C) Host

(D) Server

Ans: A Network of networks

Q.13 An e-business that allows consumer to name their own price for products and services is following which e-business model?

(A) B2B

(B) B2G

(C) C2C

(D) C2B

Ans: D C2B

Q.14 Kerberos is an encryption-based system that uses

(A) Secret key encryption

 (B) Public key encryption

(C) Private key encryption

 (D) Data key encryption

Ans: A Secret key encryption.

Q.15 The method(s) of payment for online consumers are

(A) Electronic cash

(B) Credit/debit

(C) Electronic checks

(D) All of the above

Ans: D All of the Above.

Q.16 DNS is

(A) The distributed hierarchical naming system

(B) The vertical naming system

(C) The horizontal naming system

(D) The client server system

Ans: C The horizontal naming system.

Q.17 A firewall is

(A) An established network performance reference point.

(B) Software or hardware used to isolate a private network from a public network.

(C) A virus that infects macros.

(D) A predefined encryption key used to encrypt and decrypt data transmissions.

Ans: B Software or hardware used to isolate a private network from a public network.

Q.18 A router

(A) Screens incoming information.

(B) Distributes information between networks

(C) Clears all viruses from a computer system

(D) Is a work virus.

Ans: B Distributes information between networks

Q.19 LDAP stands for

(A) Light weight Data Access Protocol.

(B) Light weight Directory Access Protocol.

(C) Large Data Access Protocol.

(D) Large Directory Access Protocol.

Ans: B -> Light weight Directory Access Protocol.

Q.20 E-Commerce is not suitable for

(A) Sale/Purchase of expensive jewellery and antiques.

(B) Sale/Purchase of mobile phones.

(C) Sale/Purchase of branded clothes.

(D) Online job searching.

Ans: D Online job searching

Q.21 Amazon.com comes under the following model

(A) B2B

 (B) B2C

(C) C2C

 (D) C2B

Ans: B B2C

Q.22 Hubs are present in the network

(A) to diagnose line failures, measure and manage traffic flow and simplify re configuring of LANs.

(B) to interconnect the LAN with WANs.

(C) to interconnect the WANs with WANs.

(D) to interconnect the WANs with LANs.

Ans: B to interconnect the LAN with WANs.

Q.23 Firewalls operate by

(A)The pre-purchase phase.

(B) isolating Intranet from Extranet.

(C)Screening packets to/from the Network and provide controllable filtering of network traffic.

(D)None of the above.

Ans: C Screening packets to/from the Network and provide controllable filtering of network traffic.

Q.24 The mercantile process model consists of the following pahase(s):

(A) The pre-purchase phase.

(B) Purchase consummation phase.

(C) Post-purchase Interaction phase.

(D) All of the above.

Ans: D All of the Above.

25. To access a mainframe or supercomputer, users often use a __________.

A) terminal

B) node

C) desktop

D) handheld

Answers: A  Terminal

General Computer Test - 143

 

1. The operation of combining two cells into a single cell in Excel is referred to as

(1) join cells

(2) merge cells

(3) merge table

(4) join table

(5) None of these

ANSWER:2

2. Which of the following can be used to store a large number of files in a small amount of storage space?

(1) File adjustment

(2) File copying

(3) File reading

(4) File compatibility

(5) File compression

ANSWER:5

3. In a computer, most processing takes place in

(1) memory

(2) RAM

(3) motherboard

(4) CPU

(5) None of these

ANSWER:4

4. Data is organized in a worksheet as

(1) charts and diagrams

(2) rows and columns

(3) tables and boxes

(4) graphs

(5) None of the above

ANSWER:2

5. Which of the following is an example of a binary number?

(1) 6AH1

(2) 100101

(3) 005

(4) ABCD

(5) 23456

ANSWER:2

6. Spell Check will find errors in which of the following?

(1) Today is a rainy day

(2) Today is a rainy a day

(3) Is a rainy

(4) Rainy today a day

(5) None of the above

ANSWER:5

7. Which of the following is not a storage medium?

(1) Hard disk

(2) Flash drive

(3) DVD

(4) CD

(5) Keyboard

ANSWER:5

8. In Excel, when the contents and attributes of a cell or range of cells have to be erased using the menu, the user must

(1) select the Cells. choose Edit. and select Clear, then All

(2) select the Cells. and click Delete on the keyboard

(3) select the Cells. choose Tools. and select Clear. then Formats

(4) select the Cells. choose Tools. and select Formula Audit. then Delete

(5) None of the above

ANSWER:1

9. The computer abbreviation KB usually means

(1) Key Block

(2) Kernel Boot

(3) Kilo Byte

(4) Kit Bit

(5) None of these

ANSWER: 3

10. If an Excel Worksheet is to be linked for use in a PowerPoint presentation, the following should be clicked

(1) Edit, Paste Special

(2) Edit, Paste

(3) Edit, Copy

(4) File, Copy

(5) None of the above

ANSWER: 2

11. RAM stands for

(1) Random Access Memory

(2) Ready Application Module

(3) Read Access Memory

(4) Remote Access Machine

(5) None of the above

ANSWER: 1

12. Which of the following is the hardware and not the software? .

(1) Excel

(2) Printer driver

(3) Operating system

(4) Powerpoint

(5) Control Unit

ANSWER:5

13. In Word, which menu would the user select to print a document?

(1) Tools

(2) File

(3) View

(4) Wind0Vob

(5) None of these

ANSWER: 2

14. Which of the following is not true about computer files?

(1) They are collections of data saved to a Storage medium

(2) Every file has a filename

(3) A file extension is established by the user to indicate the date it was created

(4) Usually files contain data

(5) None of the above

ANSWER:5

15. The common name for a modulator-demodulator is

(1) modem

(2) joiner

(3) networker

(4) connector

(5) demod

ANSWER: 1

16. What do you see when you click the right mouse button?

(1) The same effect as the left click

(2) A special menu

(3) No effect

(4) A mouse cannot be right clicked

(5) Computer goes to sleep mode

ANSWER:2

17. In order to choose the font for a sentence in a Word document,

(1) select Font in the Format menu

(2) select Font in the Edit menu

(3) select Font in the Tools menu

(4) select Font in the Insert menu

(5) None of the above

ANSWER:1

18. The ALU performs .......... operations.

(1) logarithm-based

(2) ASCII

(3) algorithm-based

(4) arithmetic

(5) None of the above

ANSWER:4

19. Excel is a program that is used to prepare a

(1) Database

(2) Text Document

(3) Spreadsheet

(4) Slide Presentation

(5) None of the above

ANSWER:3

20. .......... consists of volatile chips that temporarily store data or instructions.

(1) CPU

(2) ROM

(3)RMA

(4) RAM

(5) None of these

Q.21 Which of the following is not an scripting language ?

(A) HTML

(B) XML

(C) Postscript

(D) Javascript

Ans: C Postscript

Q.22 Which of the following is a platform free language

(A) Fortran

 (B) Assembly

(C) C

(D) Java

Ans: D Java

Q.23 A digital signature is

(A) scanned signature

 (B) signature in binary form

(C) encrypting information

 (D) handwritten signature

Ans: C encrypting information

Q.24 Mechanism to protect private networks from outside attack is

(A) Firewall

 (B) Antivirus

(C) Digital signature

(D) Formatting

Ans: A Firewall

Q.25 A computer system that permits multiple users to run programs at same time

(A) Real time system

(B) Multi programming system

(C) Time sharing system

 (D) Multi tasking system

Ans: D Multi tasking system

General Computer Test - 142

 

1. When you enter text in a cell in Excel, it also appears in which of the following?

(1) Status bar

(2) Formula bar

(3) Row heading

(4) Name box

(5) None of these

ANSWER:2

2. Which elements of a Word document can be displayed in colour?

(1) Only graphics

(2) Only text

(3) Only the first word of each line

(4) All elements, but only if you have a colour printer

(5) All elements

3. A workbook is a collection of

(1) Page Setup

(2) Buttons

(3) Diagrams

(4) Charts

(5) Worksheets

ANSWER:5

4. appear at the bottom of the Excel Window.

(1) Sheet tabs

(2) Name Box

(3) Formula bar

(4) Title bar

(5) None of these

5. EPROM stands for

(1) Erasable Programmable Read-Only Memory

(2) Electronic Programmable Read-Only Memory

(3) Enterprise Programmable Read-Only Memory

(4) Extended Programmable Read-Only Memory

(5) Electrical Programmable Read-Only Memory

ANSWER: 1

6. The technology that stores only the essential instructions on a microprocessor chip and thus enhances its speed is referred to as

(1) CISC

(2) RISC

3) CD-ROM

(4) Wi-Fi

(5) MISC

ANSWER: 2

7. Which is not a basic function of a computer?

(1) Store data

(2)Accept input

(3)Process data

(4) Copy text

(5) Accept and process data

ANSWER: 4

8. ASCII is a coding system that provides

(1) 256 different characters

(2) 512 different characters

(3) 1024 different characters

(4) 128 different characters

(5) 1000 different characters

ANSWER: 4

9. Which part of the computer is directly invoked in executing the instructions of the computer program?

(1) The scanner

(2) The main storage

(3) The secondary storage

(4) The printer

(5) The processor

ANSWER: 5

10. In order to create column data in Word, you need to

(1) tab consecutively until your cursor reaches the desired place

(2) set tabs or use the Table menu

(3) use Excel

(4) press the space bar until your cursor reaches the desired place

(5) None of these

ANSWER: 5

11. Files are organised by storing them in

(1) tables

(2) databases

(3) folders

(4) graphs

(5) diagrams

ANSWER:3

12. When a computer is switched on, the booting process performs

(1) Integrity Test

(2) Power-On Self-Test

(3) Correct Functioning Test

(4) Reliability Test

(5) Shut-down

ANSWER: 2

13. In Word, the feature that automatically detects common errors is called

(1) Autocorrect

(2) Autograph

(3) Spelling and Grammar

(4) Go to

(5) Thesaurus

ANSWER:1

14. A computer system that is old and perhaps not satisfactory is referred to as a(n)

(1) Ancient system

(2) Historical system

(3) Age old system

(4) Legacy system

(5) Legal System

ANSWER: 4

15. Which of the following is not a binary number?

(1) 001

(2) 101

(3) 202

(4) 110

(5) 011

ANSWER:3

16. Which of the following does not store data permanently?

(1) ROM

(2) RAM

(3) Floppy Disk

(4) Hard Disk

(5) None of these

ANSWER:2

17. Which of the following is the smallest storage?

(1) Megabyte

(2) Gigabyte

(3) Kilobyte

(4) Terabyte

(5) None of these

ANSWER:5

18. Which menu enables the user to choose toolbars?

(1) View

(2) Format

(3) Insert

(4) Edit

(5) Help

ANSWER: 1

19. By viewing the properties of the local hard disk of a computer, the user can find out

(1) the amount of space that has been used up and the remaining free space on the disk.

(2) the name of the user viewing the properties of the disk.

(3) nothing useful to the user.

(4) the number of programs available in the computer,

(5) None of these

ANSWER: 1

20. Pre-defined and built-in formulas in Excel are known as

(1) Autosheets

(2) Diagrams

(3) Charts

(4) Tables

(5) Functions

ANSWER:5

21. Which of the following contains permanent data and gets updated during the processing of transactions?

(1) Operating System File

(2) Transaction file

(3) Software File

(4) Master file

(5) Any File

ANSWER:4

22. The keyboard shortcut to centralise the selected text in Word is

(1) Ctrl + Esc

(2) Ctrl + C

(3) Alt + C

(4) There is no keyboard shortcut for this operation

(5) Ctrl + E

ANSWER: 5

23. Which of the following helps to protect floppy disks from data getting accidentally erased?

(1) Access notch

(2) Write-protect notch

(3) Entry notch

(4) Input notch

(5) None of these

ANSWER:2

24. A modem is connected to

(1) a telephone line

(2) a keyboard

(3) a printer

(4) a monitor

(5) a scanner

ANSWER:1

25. Large transaction processing systems in automated organisations use

(1) Online processing

(2) Batch Processing

(3) Once-a-day Processing

(4) End-of-day processing

(5) Once-a-week processing

ANSWER:2

General Computer Test - 141

 

1. Computer uses the .......... number system to store data and perform calculations.

(1) binary

(2) octal

(3) decimal

(4) hexadecimal

(5) None of these

ANSWER: 1

2. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is-

(1) Memory-only

(2) Write-only

(3) Once-only

(4) Run-only

(5) Read-only

ANSWER: 5

3. Which of the following can be used to select the entire document?

(1) CTRL + A

(2) ALT + F5

(3) SHIFT + A

(4) CTRL + K

(5) CTRL + H

ANSWER: 1

4. .......... are attempts by individuals to obtain confidential information from you by falsifying their identity.

(1) Phishing

(2) Computer viruses

(3) Spyware scams

(4) Viruses

(5) None of the above

ANSWER: 1

5. Port number, port description, and number of ports ordered are examples of

(1) control

(2) output

(3) processing

(4) feedback

(5) input

ANSWER: 5

6. A Web site's main page is called its-

(1) Home Page

(2) Browser Page

(3) Search Page

(4) Bookmark

(5) None of these

ANSWER: 1

7. The simultaneous processing of two or more programs by multiple processors is-

(1) multiprogramming

(2) multitasking

(3) time-sharing

(4) multiprocessing

 (5) None of these

ANSWER: 1

8. Codes consisting of lines of varying widths or lengths that are computer-readable are known as-

(1) an ASCII code

(2) a magnetic tape

(3) an OCR scanner

(4) a bar code

(5) None of these

ANSWER: 4

9. To instruct Word to fit the width of a column to the contents of a table automatically, click the ..... button and then point to AutoFit Contents.

(1) Fit to Form

(2) Format

(3) Autosize

(4) Contents

(5) AutoFit

ANSWER: 5

10. Why is it unethical to share copyrighted files with your friends?

(1) It is not unethical, because it is legal.

(2) It is unethical because the files are being given for free.

(3) Sharing copyrighted files without permission breaks copyright laws.

(4) It is not unethical because the files are being given for free.

(5) It is not unethical-anyone can access a computer

ANSWER: 3

11. Reusable optical storage will typically have the acronym-

(1) CD

(2) DVD

(3) ROM

(4) RW

(5) ROS

ANSWER: 4

12. The most common type of storage devices are-

(1) persistent

(2) optical

(3) magnetic

(4) flash

(5) steel

ANSWER: 2

13. A device that connects to a network without the use of cables is said to be-

(1) distributed

(2) free

(3) centralized

(4) open source

(5) None of these

ANSWER:5

14. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a-

(1) hacker

(2) analyst

(3) instant messenger

(4) programmer

(5) spammer

ANSWER: 1

15. To access properties of an object, the mouse technique to use is-

(1) dragging

(2) dropping

(3) right-clicking

(4) shift-clicking

(5) None of these

ANSWER:3

16. To change selected text to all capital letters, click the change case button, then click-

(1) UPPERCASE

(2) UPPER ALL

(3) CAPS LOCK

(4) Lock Upper

(5) Large Size

ANSWER: 1

17. The basic unit of a worksheet into which you enter data in Excel is called a-

(1) tab

(2) cell

(3) box

(4) range

(5) None of these

ANSWER: 2

18. You can keep your personal files / folders in-

(1) My folder

(2) My Documents

(3) My Files

(4) My Text

(5) None of these

ANSWER: 2

19. In Word you can force a page break-

(1) By positioning your cursor at the appropriate place and pressing the F1 key

(2) By positioning your cursor at the appropriate place and pressing Ctrl + Enter

(3) By using the Insert/Section Break

(4) By changing the font size of your document

(5) None of these

ANSWER: 2

20. A DVD is an example of a(n)-

(1) hard disk

(2) optical disc

(3) output device

(4) solid-state storage device

(5) None of these

ANSWER:2

21. The default view in Excel is ......... view.

(1) Work

(2) Auto

(3) Normal

(4) Roman

(5) None of these

ANSWER:3

22. The process of transferring files from a computer on the Internet to your computer is called

(1) downloading

(2) uploading

(3) FTP

(4) JPEG

(5) downsizing

ANSWER: 1

23. .......... is the process of dividing the disk into tracks and sectors.

(1) Tracking

(2) Formatting

(3) Crashing

(4) Allotting

(5) None of these

ANSWER:2

24. Help Menu is available at which button?

(1) End

(2) Start

(3) Turnoff

(4) Restart

(5) Reboot

ANSWER:2

25. The contents of .......... are lost when the computer turns off.

(1) storage

(2) input

(3) output

(4) memory

(5) None of these

ANSWER: 5