700+ Computer Questions Answers
700+ Computer Questions Answers
Ques. : 1 Connection or link to other documents or Web pages that contain related information is called
1) dialup 2) electronic commerce
3) hyperlink 4) ecash
5) domain name Ans.) 3
Ques. : 3 Portable computer, also known as laptop computer, weighing between 4 and 10 pounds is called
1) generalpurpose application 2) Internet
3) scanner 4) notebook computer
5) None of these Ans.) 4
Ques. : 7 A compiler translates higherlevel programs into a machine language program, which is called
1) source code 2) object code
3) compiled code 4) beta code
5) None of these Ans.) 1
Ques. : 8 What contains the computer BIOS and maintains its data with the use of a battery for periods when the system is
powered down?
1) CMOS 2) RAM
3) DRAM 4) CPU
5) None of these Ans.) 1
Ques. : 13 Only ________program(s) remain(s) active even though we can open many programs at a time.
1) one 2) two
3) three 4) four
5) None of these Ans.) 1
Ques. : 14 When the margins on both the sides are straight and equal, then there is ________in the document.
1) full justification 2) full alignment
3) left justification 4) right justification
5) None of these Ans.) 1
Ques. : 17 If you receive and email from someone you don't know, what should you do?
1) Forward it to the Police immediately 2) Delete it without opening it
3) Open it and respond to him/her 4) Reply and seek their identity
5) None of these Ans.) 2
Ques. : 20 Computers send and receive data in the form of ________ signals.
1) analog 2) digital
3) modulated 4) demodulated
5) All the above Ans.) 2
Ques. : 21 Most World Wide Web pages contain commands in the language
1) NIH 2) URL
3) HTML 4) IRC
5) None of these Ans.) 3
Ques. : 24 Whenever you have to give space between the two words while typing on a PC we have to press a key known
as
1) Backspace 2) Shift
3) Control 4) Escape
5) Space bar Ans.) 5
Ques. : 30 What kind of software would you most likely use to keep track of a billing account?
1) Word processing 2) Electronic publishing
3) Spreadsheet 4) Web authoring
5) None of these Ans.) 3
Ques. : 31 Text and graphics that have been cut or copied are stored in an area called the
1) Pasterboard 2) Copyboard
3) Clipboard 4) Cuttingboard
5) None of these Ans.) 3
Ques. : 34 What is the process of copying software programs from secondary storage media to the hard disk called?
1) configuration 2) download
3) storage 4) upload
5) istallation Ans.) 5
Ques. : 35 The property that, when classes are arranged in a hierarchy, each class assumes the attributes and methods
of its ancestores is
1) Inheritance 2) generalisation
3) encapsulation 4) information hiding
5) None of these Ans.) 1
Ques. : 36 The software component of an expert system that draws conclusions is the ___________.
1) user interface 2) database
3) inference engine 4) I/O controller
5) None of these Ans.) 3
Ques. : 37 The attributes and methods for each object are stored in
1) an object instance 2) an object connection
3) an assembly structure 4) an object repository
5) None of these Ans.) 4
Ques. : 41 Hardware devices that are not part of the main computer system and are often added later to the system are
1) clip art 2) highlights
3) execute 4) peripherals
5) None of these Ans.) 4
Ques. : 42 All of the following are examples of real security and privacy risks except
1) hackers 2) spam
3) viruses 4) Identity theft
5) None of these Ans.) 2
Ques. : 45 The blinking symbol which indicates the next character will appear at which place, is called
1) Delete key 2) Control key
3) Cursor 4) Return key
5) None of these Ans.) 3
Ques. : 46 The display bar that lists all the open folders and active applications is
1) Menu bar 2) Tool bar
3) Task bar 4) Window list
5) None of these Ans.) 3
Ques. : 47 A large space common in most of the Windows which is displayed at the background of the Windows main
icon screen, is called
1) Application view 2) Work area
3) Project view 4) Toolbar
5) None of these Ans.) 2
Ques. : 48 A photograph, image or any other visual file which is displayed at the back ground of the windows main icon
screen, is called
1) Wall Paper 2) Screen Saver
3) Windows Theme 4) Active Desktop
5) None of these Ans.) 1
Ques. : 56 _________is a procedure that requires users to enter an identification code and a matching password.
1) Paging 2) Logging on
3) Timesharing 4) Multitasking
5) None of these Ans.) 2
Ques. : 57 Which device is used as the standard pointing device in a Graphical User Environment?
1) Keyboard 2) Mouse
3) Joystick 4) Track ball
5) None of these Ans.) 2
Ques. : 59 The ability of an OS to run more than one application at a time is called
1) multitasking 2) objectoriented programming
3) multiuser computing 4) timesharing
5) None of these Ans.) 1
Ques. : 60 Permanent instructions that the computer uses when it is turned on and that cannot be changed by other
instructions are contained in
1) ROM 2) RAM
3) ALU 4) REM
5) None of these Ans.) 1
Ques. : 62 The portion of the CPU that coordinates the activities of all the other computer components is the
1) motherboard 2) coordination board
3) control unit 4) arithmetic and logical unit
5) None of these Ans.) 3
Ques. : 65 A program that works like a calculator for keeping track of money and making budgets
1) calculator 2) spreadsheet
3) budgeter 4) financier
5) None of these Ans.) 2
Ques. : 69 A word in a web page that, when clicked, opens another document.
1) anchor 2) hyperlink
3) reference 4) URL
5) None of these Ans.) 2
Ques. : 72 Which of the following storage media provides sequential access only?
1) Floppy disk 2) Magnetic disk
3) Magnetic tape 4) Optical disk
5) None of these Ans.) 3
Ques. : 75 _________cells involves creating a single cell by combining two or more selected cells.
1) Formatting 2) Merging
Ques. : 78 When you save in the following, the data would remain intact even after turning off computer?
1) RAM 2) Motherboard
3) Secondary storage device 4) Primary storage device
5) None of these Ans.) 3
Ques. : 79 SMPT, FTP and DNS are applications of the ________ layer.
1) Data link 2) Network
3) Transport 4) Application
5) None of these Ans.) 4
Ques. : 82 A __________ computer is a large and expensive computer capable of simultaneously processing data for
hundreds or thousands of users.
1) server 2) mainframe
3) desktop 4) tablet
5) None of these Ans.) 2
Ques. : 83 The ______ folder retains compies of messages that you have started but are not yet ready to send.
1) Inbox 2) Outbox
3) Drafts 4) Sent Items
5) None of these Ans.) 3
Ques. : 84 The ability of an OS to run more than one application at a time is called
1) multitasking 2) objectoriented programming
3) multiuser computing 4) timesharing
5) None of these Ans.) 1
Ques. : 86 Coded entries which are used to gain access to a computer system are called
Ques. : 89 Storage and memory differ with respect to which of the following characteristics?
1) Price 2) Reliability
3) Speed 4) All the above
5) None of these Ans.) 4
Ques. : 90 The ______ tells the computer how to use its components.
1) utility 2) network
3) operating system 4) application software
5) None of these Ans.) 3
Ques. : 91 Screen that comes on when you turn on your computer that shows all the icons is
1) desktop 2) face to face
3) viewer 4) view space
5) None of these Ans.) 1
Ques. : 92 A file that contains definitions of the paragraph and character styles for your document and all things you
customised like toolbars and menus is called a
1) guide 2) pattern
3) base document 4) template
5) None of these Ans.) 4
Ques. : 93 A _______contains buttons and menus that provide quick access to commonly used commands.
1) toolbar 2) status bar
3) window 4) find
5) None of these Ans.) 1
Ques. : 94 The blinking point which shows your position in the text is called
1) blinker 2) cursor
3) causer 4) pointer
5) None of these Ans.) 2
Ques. : 95 What is the name of the process that is used to convert a series of instructions, or program, written in a high
level language into instructions (or a program) that can be run on a computer?
1) Assembling 2) Compiling
3) Translating 4) Uploading
5) None of these Ans.) 2
Ques. : 96 A processor that collects the transmissions from several communications media and sends them over a single
line that operates at a higher capacity is called
1) multiplexor 2) bridge
3) Hub 4) router
Ques. : 98 When you make graph and picture in document, then your computer holds the data in
1) resotore file 2) backup file
3) clipboard 4) memory
5) None of these Ans.) 4
Ques. : 100 Which key is used in combination with another key to perform a specific task?
1) Esc 2) Control
3) Arrow 4) Space bar
5) None of these Ans.) 2
Ques. : 101 In the binary language each letter of the alphabet, each number and each special character is made up of a
unique combination of
1) eight bytes 2) eight kilobytes
3) eight characters 4) eight bits
5) None of these Ans.) 4
Ques. : 103 Which function calculates the largest value in a set of numbers?
1) Average 2) Count
3) Minimum 4) Maximum
5) None of these Ans.) 4
Ques. : 106 What is the name of the protocol used to eliminate loops?
1) ISL 2) Switching
3) Frame tagging 4) Spanning Tree Protocol
5) Scanning Ans.) 4
Ques. : 107 Digital photos and scanned images are typically stored as __________graphics with extensions such as
bmp, png, jpg, tif and gif.
Ques. : 109 A ______ is a design tool that graphically shows the logic in a solution algorithm.
1) flowchart 2) hierarchy chart
3) structure chart 4) context diagram
5) None of these Ans.) 1
Ques. : 116 A series of tobeviewed specially designed documents, which are all linked on Internet, is called:
1) World Wide Web 2) Web Server
3) Search Engine 4) Both 2) and 3)
5) None of these Ans.) 1
Ques. : 120 A storage device used to compensate for the differences in rates of flow of data form one device to another is
1) buffer 2) channel
3) call 4) chip
5) None of these Ans.) 1
Ques. : 121 A device that generates the periodic signals used to control the timing of all CPU operations is
1) COM 2) Collate
3) Chip 4) Clock
5) None of these Ans.) 4
Ques. : 122 A comprehensive software system that builds, maintains and provides access to a database
1) CPU 2) DASD
3) CAI 4) DBMS
5) None of these Ans.) 4
Ques. : 123 The components that process data are located in the
1) imput devices 2) output devices
3) system unit 4) storage component
5) None of these Ans.) 3
Ques. : 125 The OSI model is divided into how many processes called layers
1) Five 2) Six
3) Seven 4) Eight
5) Nine Ans.) 3
Ques. : 126 _________ are specially designed computer chips that reside inside other devices, such as your car or your
electronic thermostat.
1) Servers 2) Embedded computers
3) Robotic computers 4) Mainframes
5) None of these Ans.) 2
Ques. : 127 The following are all mobile computing devices, except
1) notebook computers 2) Cellular phone
3) digital scanners 4) Personal Digital Assistant
5) None of these Ans.) 3
Ques. : 128 How many different documents can you have open at any one time?
1) Not more than three 2) Only one
3) As many as your computer memory will hold 4) No more than your task bar can display
5) None of these Ans.) 3
Ques. : 132 Permanent instructions that the computer uses when it is turned on and that cannot be changed by other
instructions are contained in
1) ROM 2) RAM
3) ALU 4) REM
5) None of these Ans.) 1
Ques. : 134 To find and load a file that has been saved
1) select the Close command 2) select the New command
3) select the Save command 4) select the Open command
5) None of these Ans.) 4
Ques. : 136 Which of the following storage media provides sequential access only?
1) Floppy disk 2) Magnetic disk
3) Magnetic tape 4) Optical disk
5) None of these Ans.) 3
Ques. : 138 All the following are included in removable media except
1) CDROMs 2) Diskette
3) DVDs 4) Hard Disk Drive
5) None of these Ans.) 4
Ques. : 139 ________ of cells involves creating a single cell by combining tow or more selected cells.
1) Formatting 2) Merging
Ques. : 142 All the following terms are associated with spreadsheet software except
1) worksheet 2) cell
3) formula 4) virus detection
5) None of these Ans.) 4
Ques. : 143 ________are devices used to transmit data over telecommunication lines.
1) Drives 2) Drive bays
3) Modems 4) Platforms
5) None of these Ans.) 3
Ques. : 145 The first step in the transaction processing cycle is ________.
1) database operations 2) audit
3) data entry 4) user inquiry
5) None of these Ans.) 3
Ques. : 146 Where is the disk put to enable computer to read it?
1) In the hard drive 2) In the disk drive
3) Into the CPU 4) In the modern
5) None of these Ans.) 2
Ques. : 147 The most common method of entering text and numerical data into a computer system is through the use of a
1) plotter 2) scanner
3) printer 4) keyboard
5) None of these Ans.) 4
Ques. : 149 Information that comes from an external source and is fed into computer software is called
1) input 2) output
3) throughput 4) reports
5) None of these Ans.) 1
Ques. : 151 Which process checks to ensure the components of the computer are operating and connected properly?
1) Booting 2) Processing
3) Saving 4) Editing
5) None of these Ans.) 1
Ques. : 153 A Website address is a unique name that identifies a specific ______ on the Web.
1) Web browser 2) Website
3) PDA 4) Hyperling
5) None of these Ans.) 2
Ques. : 154 A device that connects to a network without the use of cables is said to be
1) distributed 2) centralised
3) open source 4) wireless
5) None of these Ans.) 4
Ques. : 157 To make a notebook act as a desktop model, the notebook can be connected to a __________ which is
connected to a monitor and other devices.
1) bay 2) docking station
3) port 4) network
5) None of these Ans.) 2
Ques. : 160 A telephone number, a birth date, and a customer name are all examples of
1) a record 2) a query
3) a file 4) a database
5) None of these Ans.) 1
Ques. : 162 The _________ performs smple mathematics for the CPU.
1) ALU 2) DIMM
3) BUS 4) Register
5) None of these Ans.) 1
Ques. : 163 A prescribed set of welldefined instructions for solving mathematical problems is called
1) a compiler 2) a code
3) a description 4) an algorithm
5) None of these Ans.) 4
Ques. : 164 The part of the computer that coordinates all its functions is called its
1) ROM program 2) system board
3) Arithmetic Logic Unit 4) Control Unit
5) None of these Ans.) 4
Ques. : 165 The most common input devices are the ________ and ___________.
1) microphone, printer 2) scanner, board
3) digital camera, speakers 4) keyboard, mouse
5) None of these Ans.) 4
Ques. : 166 To save an existing file with a new name or a new location, you should use _________command.
1) Save 2) Save As
3) Save and replace 4) New File
5) None of these Ans.) 2
Ques. : 167 Which of the following is a common extension used in the file name for application programs?
1) EXE 2) DIR
3) TXT 4) DOC
5) None of these Ans.) 1
Ques. : 169 A program that converts a highlevel language source file into a machinelanguage file is called a
1) translator 2) assembler
3) compiler 4) linker
5) None of these Ans.) 3
Ques. : 170 Which keys can be used together with other keys for special tasks?
1) Insert, Delete 2) Ctrl, Shift
3) Left Arrow, Right arrow 4) Page Up, Page Down
5) None of these Ans.) 2
Ques. : 171 The _________ command on the Quick Access Toolbar allows you to cancel your recent commands or
actions.
1) Search 2) Cut
3) Document 4) Undo
5) None of these Ans.) 4
Ques. : 173 __________ software allows users to perform calculations on rows and columns of data.
1) World Processing 2) Presentation
3) Graphics designing 4) Electronic spreadsheet
5) None of these Ans.) 4
Ques. : 175 What is the storage area for email messages called?
1) Storage folder 2) Dictionary
3) Mailbox 4) Hard Disk
5) None of these Ans.) 3
Ques. : 176 The altering of data so that it is not usable unless the changes are undone is called
1) biometrics 2) compression
3) encryption 4) ergonomics
5) None of these Ans.) 3
Ques. : 177 A DVDRAM is similar to a ____________ except it has storage capacities up to 5.2 GB,
1) CDR 2) Floppy disk
3) CDRW 4) Harddisk
5) None of these Ans.) 3
Ques. : 179 A file extension is separated from the main file name with a(n) ________, but no spaces.
1) question mark 2) exclamation mark
3) underscore 4) period
5) None of these Ans.) 4
Ques. : 181 SMTP, FTP and DNS are applications of the _________ layer.
1) data link 2) network
3) transport 4) application
5) None of these Ans.) 4
Ques. : 184 For selecting and highlighting, which of the following is generally used?
1) Icon 2) Mouse
3) Plotter 4) Floppy disk
5) None of these Ans.) 2
Ques. : 185 Which device is used to access your computer by other computer or for talk over phone?
1) RAM 2) CD ROM Drive
3) Modem 4) Hard Drive
5) None of these Ans.) 3
Ques. : 187 ________ is the primay key of one file which also appears in another file.
1) Physical key 2) Primary key
3) Foreign key 4) Logical key
5) None of these Ans.) 3
Ques. : 188 The technique that extends storage capacities of main memory beyond the actual size of the main memory is
called
1) multitasking 2) virtual memory
3) multiprocessing 4) multiprogramming
5) None of these Ans.) 2
Ques. : 190 A world processor would most likely be used to do which of the following?
1) keep an account of money spent 2) maintain an inventory
3) type a biography 4) do a computer search in the media centre
5) None of these Ans.) 3
Ques. : 191 Which of the following commands is used to select the whole document?
1) Ctrl+A 2) Alt+F5
3) Shift+S 4) Can't be done
5) None of these Ans.) 1
Ques. : 192 Where are programs and data kept while the processor is using them?
1) Main memory 2) Secondary memory
3) Disk memory 4) Program memory
5) None of these Ans.) 1
Ques. : 194 While sending an email, _____________ hints about the matter of the mail.
1) subject 2) to
3) contents 4) cc
5) None of these Ans.) 1
Ques. : 198 A blinking symbol on the screen that shows where the next character will appear is a/an
1) delete key 2) arrow key
3) cursor 4) return key
5) None of these Ans.) 3
Ques. : 201 Network conponents are connected to the same cable in the ___________ topology.
1) star 2) ring
3) bus 4) mesh
5) None of these Ans.) 3
Ques. : 202 A symbol on the screen that represents a disk, document or program that you can select
1) keys 2) caps
3) icon 4) monitor
5) None of these Ans.) 3
Ques. : 203 This component is required to process data into information and consists of integrated circuits.
1) Hard disk 2) RAM
3) CPU 4) ROM
5) None of these Ans.) 3
Ques. : 207 The ________ , also called the Web, contains billions of documents.
1) Web portal 2) HTTP
3) World Wide Web 4) Domain
5) None of these Ans.) 3
Ques. : 211 The storage that retains its data after the power is turned off is referred to as
1) volatile storage 2) nonvolatile storage
3) sequential storage 4) direct storage
5) None of these Ans.) 2
Ques. : 219 A(n) _________ is composed of several computers connected together to share resources and data.
1) backup 2) network
3) backbone 4) hyperlink
5) None of these Ans.) 2
Ques. : 221 The process of writing computer instructions in a programming language is known as
1) processing 2) coding
3) testing 4) filing
5) None of these Ans.) 2
Ques. : 222 What is a portion of memory that serves as a temporary repository for data as it waits for a given action?
1) BIOS 2) Cache
3) Motherboard 4) USB
5) None of these Ans.) 2
Ques. : 224 These are specialised programs that assist users in locating information on the Web.
1) Search Engine 2) Resource Locator
3) Information Management System 4) DBMS
5) None of these Ans.) 1
Ques. : 225 Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store
data/information?
1) Floppy diskette 2) Hard disk
Ques. : 226 _________ helps in capturing row data and entering into computer system.
1) CPU 2) Integrated circuit
3) Input device 4) Motherboard
5) None of these Ans.) 3
Ques. : 227 Which of the following converts all the statements in a program in a single batch and the resulting collection
of instruction is placed in a new file?
1) compiler 2) interpreter
3) converter 4) instruction
5) None of these Ans.) 1
Ques. : 228 Which of the folloiwng contains information about a single entity in the database like a person, place, event
or thing?
1) Query 2) Form
3) Record 4) Table
5) None of these Ans.) 3
Ques. : 229 Which of the following is NOT a function of the control unit?
1) Read instructions 2) Execute instructions
3) Interpret instructions 4) Direct operations
5) None of these Ans.) 4
Ques. : 230 The time it takes a device to locate data and instructions and make them available to the CPU is known as
1) clock speed 2) a processing cycle
3) CPU speed 4) access time
5) None of these Ans.) 4
Ques. : 231 __________ controls the way in which the computer system functions and provides a means by which users
can interact with the computer.
1) The platform 2) The operating system
3) Application software 4) The motherboard
5) None of these Ans.) 2
Ques. : 232 _________ is the process of dividing the disk into tracks and sectors.
1) Tracking 2) Formatting
3) Crashing 4) Allotting
5) None of these Ans.) 2
Ques. : 235 A _______ is a professionally designed empty document that can be adapted to the user's need.
1) file 2) guide
3) template 4) user guide file
5) None of these Ans.) 3
Ques. : 237 Microcomputer hardware consists of three basic categories of physical equipment:
1) keyboard, monitor, hard drive 2) system unit, input/output, memory
3) system unit, input/output, secondary storage 4) system unit, primary storage, secondary storage
5) None of these Ans.) 2
Ques. : 238 A piece of hardware that is used to enter information into the computer by usning keys is
1) keyboard 2) monitor
3) hard disk 4) icon
5) None of these Ans.) 1
Ques. : 240 __________ processing is used when a large mailorder company accumulates orders and processes them
together in one large set.
1) Batch 2) Online
3) Realtime 4) Group
5) None of these Ans.) 1
Ques. : 241 Which of the following is NOT the major function of a computer?
1) Processing data into information 2) Storing data or information
3) Modifying data 4) Analysing data or information
5) None of these Ans.) 4
Ques. : 242 A repair for a known software bug, usually available at no charge on the Internet, is called a(n)
1) version 2) patch
3) tutorial 4) FAQ
5) None of these Ans.) 2
Ques. : 243 Which type of memory holds only the program and data that the CPU is presently processing?
1) CMOS 2) ROM
3) RAM 4) ASCII
5) None of these Ans.) 3
Ques. : 244 When you cut or copy information it gets place in the
1) clipart 2) clipboard
3) Internet 4) motherboard
5) None of these Ans.) 2
Ques. : 245 If you want to locate the hardware address of a local device, which protocol would you use?
1) ARP 2) RARP
3) RAM 4) PING
5) PONG Ans.) 4
Ques. : 246 The name of the location of a particular piece of data is its
1) address 2) memory name
3) storage site 4) data location
5) None of these Ans.) 1
Visit www.copaguide.com for Computer Notes, Online Test, Video Tutorials
Ques. : 247 Which of the following operating systems is not owned and licensed by a company?
1) Unix 2) Linux
3) Windows 2000 4) Mac
5) Windows Ans.) 2
Ques. : 248 The MS Excel stores its documents in the form of files which are called
1) worksheets 2) workbooks
3) notebooks 4) excel sheets
5) None of these Ans.) 1
Ques. : 249 ________ view shows how the contents on printed page will appear with margin, header and footer.
1) Draft 2) Full screen reading
3) Outline 4) Page layout
5) None of these Ans.) 4
Ques. : 252 What does remain in RAM when computer is turned off?
1) Operating System 2) BICS
3) Software Application 4) Nothing
5) None of these Ans.) 4
Ques. : 254 In a relational database, this is a data structure that organises the information about a single topic into rows
and columns.
1) block 2) record
3) tuple 4) table
5) None of these Ans.) 4
Ques. : 255 For seeing the output, which of the following is used?
1) Scanner 2) Keyboard
3) Mouse 4) Monitor
5) None of these Ans.) 4
Ques. : 258 Which device can understand the difference between data and program?
1) Input device 2) Output device
3) Memory 4) Microprocessor
5) None of these Ans.) 4
Ques. : 259 Which of the following devices has a limitation that we can only read it but cannot erase or modify it?
1) Magnetic tape 2) Hard disk
3) Compact disk 4) Floppy disk
5) None of these Ans.) 3
Ques. : 262 What type of error does a memory parity error create?
1) A fatal exception error 2) An NMI error
3) A corrupt Windows operating system file 4) A GPF error
5) A GPA error Ans.) 2
Ques. : 263 Which of the following cannot be used as the scope when using a JavaBean with JSP?
1) Page 2) Request
3) Session 4) Application
5) Response Ans.) 5
Ques. : 264 Devices that let the computer communicate with you are _________ devices.
1) input 2) output
3) processing 4) storage
5) None of these Ans.) 2
Ques. : 266 The secret code that gives you access to some programs:
1) clue 2) cue
3) password 4) help
5) None of these Ans.) 3
Ques. : 275 The _______ becomes different shaped depending on the task you are performing.
1) active tab 2) insertion point
3) mouse pointer 4) ribbon
5) None of these Ans.) 3
Ques. : 277 To access the properties of an object, the mouse technique to use is
1) dragging 2) dropping
3) rightclicking 4) shiftclicking
5) None of these Ans.) 3
Ques. : 278 A(n) __________ is a program that makes the computer easier to use.
1) operating system 2) application
3) utility 4) network
5) None of these Ans.) 1
Ques. : 279 Connection to the Internet using a phone line and a modem is called ___________ connection.
1) digital 2) dialup
Ques. : 281 Which of the following is a part of the computer that one can touch and feel?
1) Hardware 2) Software
3) Programs 4) Output
5) None of these Ans.) 1
Ques. : 282 This component is required to process data into information and consists of integrated circuits.
1) Hard disk 2) RAM
3) CPU 4) ROM
5) None of these Ans.) 3
Ques. : 283 Which part of the computer displays the work done?
1) RAM 2) Scanner
3) Monitor 4) ROM
5) None of these Ans.) 3
Ques. : 285 _________ are attempts by individuals to obtain confidential information from you by falsifying their identity?
1) Phising trips 2) Computer viruses
3) Special function cards 4) Scanners
5) Keyboards Ans.) 1
Ques. : 286 All of the following are examples of real security and privacy risks except
1) Hackers 2) Spam
3) Viruses 4) Identity theft
5) None of these Ans.) 2
Ques. : 287 A(n) ___________ is a small, wirless handheld computer that scans items, tags and pulls up the current
price (and any special offer) as you shop.
1) PSS 2) PoS
3) Inventary 4) Data mining
5) None of these Ans.) 1
Ques. : 288 Which of the following is NOT one of the four major data processing functions of a computer?
1) Gathering data 2) Processing data into information
3) Analysing the data or information 4) Storing the data or information
5) None of these Ans.) 3
Ques. : 290 Computers process data into information working exclusively with
Ques. : 293 SMTP, FTP and DNS are applications of the _________ layer.
1) Data link 2) Network
3) Transport 4) Application
5) None of these Ans.) 4
Ques. : 298 Which of the following memories is often used in a typical computer operation?
1) RAM 2) ROM
3) FDD 4) HDD
5) None of these Ans.) 1
Ques. : 300 The difference between people with access to computers and the Internet and those without this access is
known as the
1) digital divide 2) Internet divide
3) Web divide 4) broadband divide
5) None of these Ans.) 1
Ques. : 302 __________ is the study of molecules and strctures whose size ranges from 1 to 100 Nanometers?
1) Nanoscience 2) Microelectrodes
3) Computer Forensics 4) Artificial intelligence
5) None of these Ans.) 1
Ques. : 303 The name for the way with which computers manipulate data into information is called
1) programming 2) processing
3) storing 4) organising
5) None of these Ans.) 2
Ques. : 304 After a picture has been taken with a digital camera and processed appropriately, the actual print of the
picture is considered a(n)
1) data 2) output
3) input 4) process
5) None of these Ans.) 2
Ques. : 305 A command that takes what has been typed into the computer and can be seen on the screen and sends it to
the printer for output on paper
1) print 2) return
3) jump 4) attention
5) None of these Ans.) 1
Ques. : 306 The key which lets you exit a program when pushed
1) arrow key 2) spacebar
3) escape key 4) return key
5) None of these Ans.) 3
Ques. : 307 The ability of an OS to run more than one application at a time is called
1) multitasking 2) objectoriented programming
3) multiuser computing 4) timesharing
5) None of these Ans.) 1
Ques. : 308 Which of the following statements best describes the batch method of input?
1) Data is processed as soon as it is input. 2) Data is input at the time it is collected.
3) Data is collected in the form of source
documents, placed into groups, and then input to 4) Source documents are not used.
the computer.
5) None of these Ans.) 3
Ques. : 313 Which of the following peripheral devices displays information to a user?
1) Monitor 2) Keyboard
3) Secondary storage device 4) Scanner
5) None of these Ans.) 1
Ques. : 318 The process of putting information in a file on a magnetic disk, or in a computer's memory, so it cab be used
later
1) store 2) ship
3) shift 4) centre
5) None of these Ans.) 1
Ques. : 320 Printed information, called _________ exists physically and is a more permanent form of output than that
presented on a display device.
1) soft copy 2) hard copy
3) carbon copy 4) desk copy
5) None of these Ans.) 2
Visit www.copaguide.com for Computer Notes, Online Test, Video Tutorials
Ques. : 321 To find a saved document in the computer's memory and bring it up on the screen to view is called
1) reversing 2) rerunning
3) retrieving 4) returning
5) None of these Ans.) 3
Ques. : 323 Code consisting of bars and lines of varying widths or lengths that is computerreadable is known as
1) an ASCII code 2) a magnetic tape
3) an OCR scanner 4) a bar code
5) None of these Ans.) 4
Ques. : 324 A ________ is a unique name that you give to a file of information.
1) device letter 2) folder
3) filename 4) filename extension
5) None of these Ans.) 3
Ques. : 326 Which of the following are all considered advantages of email?
1) Convenience, speed of delivery, generality and
2) Printable, global and expensive
reliability
3) Global, convenience and Microsoft owned 4) Slow delivery, reliable, global and inexpensive
5) None of these Ans.) 1
Ques. : 329 Computers manipulate data in many ways, and this manipulation is called ________.
1) utilizing 2) batching
3) upgrading 4) processing
5) None of these Ans.) 4
Ques. : 333 A command to get a file you worked on from the memory where it was stored
1) close 2) delete
3) open 4) get it
5) None of these Ans.) 3
Ques. : 334 A _________ is a collection of data that is stored electronically as a series of records in a table.
1) spreadsheet 2) presentation
3) database 4) web page
5) None of these Ans.) 3
Ques. : 335 The software tools that enable a user to interact with a computer for specific purposes are known as
1) hardware 2) networked softwares
3) sharewares 4) applications
5) None of these Ans.) 4
Ques. : 338 A ________ contains buttons and menus that provide quick access to commonly used commands.
1) toolbar 2) menu bar
3) window 4) find
5) None of these Ans.) 1
Ques. : 339 The _________ enables you to simultaneously keep multiple pages open in one browser window.
1) tab box 2) popup helper
3) tab row 4) address bar
5) Esc key Ans.) 3
Ques. : 341 A(n) ________ is the text you want to be printed at the bottom of the pages.
1) header 2) endnote
3) footnote 4) footer
5) None of these Ans.) 4
Ques. : 342 A(n) ________ is the combination of software and hardware that facilitates the sharing of information
Ques. : 343 The ________ tells the computer how to use its components.
1) utility 2) network
3) operating system 4) application program
5) None of these Ans.) 3
Ques. : 344 Which of the following functions is NOT performed by the TCP?
1) Addressing 2) Connection establishment
3) Data transfer 4) Flow control
5) None of these Ans.) 5
Ques. : 345 In addition to keying data directly into a database, data entry can be done from a(n)
1) input form 2) table
3) field 4) data dictionary
5) None of these Ans.) 1
Ques. : 346 The term ________ designates equipment that might be added to a computer system to enhance its
functionality.
1) digital device 2) system addon
3) disk pack 4) peripheral device
5) None of these Ans.) 4
Ques. : 348 The process of changing a written work already done is called
1) filing 2) editing
3) cutting 4) closing
5) None of these Ans.) 2
Ques. : 349 To make a notebook act as a desktop model, the notebook can be connected to a __________ which is
connected to a monitor and other devices.
1) bay 2) docking station
3) port 4) network
5) None of these Ans.) 2
Ques. : 350 What is the name of the process that is used to convert a series of instructions, or program, written in a high
level language into instructions (or a program) that can be run on a computer?
1) Assembling 2) Compiling
3) Translating 4) Uploading
5) None of these Ans.) 2
Ques. : 353 Which of the following is the newest version of Excel among the following?
1) Excel 2000 2) Excel 2002
3) Excel ME 4) Excel XP
5) None of these Ans.) 4
Ques. : 354 __________ processes the data and is also called the brain of the computer.
1) Motherboard 2) Memory
3) RAM 4) CPU
5) None of these Ans.) 4
Ques. : 356 Which area in an Excel window allows entering values and formulas?
1) Title bar 2) Menu bar
3) Formula bar 4) Standard Tool Bar
5) None of these Ans.) 3
Ques. : 362 When writing a document, you can use the ________ feature to find an appropriate word or an alternative
word if you find yourself stuck for the right word.
1) dictionary 2) word finder
3) encyclopedia 4) Wikipedia
Ques. : 363 Various applications and documents are represented on the Windows desktop by
1) Symbols 2) Labels
3) Graphs 4) Icons
5) None of these Ans.) 4
Ques. : 364 Which of the following could be digital input devices for computers?
1) Digital camcoder 2) Microphone
3) Scanner 4) All the above
5) None of these Ans.) 4
Ques. : 365 The box that contains the central electronic components of the computer is the
1) motherboard 2) system unit
3) peripheral 4) input device
5) None of these Ans.) 2
Ques. : 366 You can use the _____________bar to type a URL and display a Web page, or type a keyword to display a
list of related Web pages.
1) menu 2) title
3) search 4) web
5) address Ans.) 5
Ques. : 367 A(n) _________ is a private corporate network, used exclusively by company employees.
1) Internet 2) local area network
3) peertopeer 4) intranet
5) None of these Ans.) 4
Ques. : 369 Codes consisting of bars and lines of varying widths or lengths that are computerreadable are known as
1) a bar code 2) an ASCII code
3) a magnetic tape 4) a light pen
5) None of these Ans.) 1
Ques. : 370 When cutting and pasting, the item cut is temporarily stored in
1) ROM 2) Hard drive
3) Diskette 4) Dashboard
5) Clipboard Ans.) 5
Ques. : 372 ________ are type of inexpensive digital camera that remains tethered to a computer and are used for
videoconferencing, video chatting, and live Web broadcast.
1) Webcams 2) Webpics
3) Browsercams 4) Browserpics
5) None of these Ans.) 1
Ques. : 377 To ________a document menas to make changes to its existing content.
1) format 2) save
3) edit 4) print
5) None of these Ans.) 3
Ques. : 378 Where is the disk put to enable computer to read it?
1) Disk drive 2) Memory
3) CPU 4) ALU
5) None of these Ans.) 1
Ques. : 381 To change hardware components into more powerful or rectified version is called
1) expansion 2) plug and play
3) upgrading 4) upsizing
5) None of these Ans.) 3
Ques. : 383 In order to move from one worksheet to another in excel workbook, one should click
1) active cell 2) scroll bar
3) sheet tab 4) tab button
5) None of these Ans.) 3
Ques. : 384 To access properties of an object, the mouse technique to use is __________.
Ques. : 385 Every device on the Internet has a unique ________ address that identifies it in the same way that a street
address identifies the location of a house.
1) DH 2) DA
3) IP 4) IA
5) None of these Ans.) 3
Ques. : 386 This type of hardware consists of devices that translate data into a form the computer can process
1) application 2) input
3) system 4) All the above
5) None of these Ans.) 2
Ques. : 387 Which key is used in combination with another key to perform a specific task?
1) Function 2) Arrow
3) Space bar 4) Control
5) None of these Ans.) 4
Ques. : 390 The hardware device commonly referred to as the 'brain' of the computer is the
1) RAM chip 2) data input
3) CPU 4) secondary storage
5) None of these Ans.) 3
Ques. : 391 What is the intersection of a column and a row called on an Excel worksheet?
1) Column 2) Value
3) Address 4) Cell
5) None of these Ans.) 4
Ques. : 392 The process of a computer of receiving information from a server on the Internet is called
1) pulling 2) pushing
3) downloading 4) transferring
5) None of these Ans.) 3
Ques. : 393 Which of the following would you do to remove a paragraph from a report you had written?
1) Delete and edit 2) Highlight and delete
3) Cut and paste 4) Undo typing
5) None of these Ans.) 2
Ques. : 394 All the following media have read and write capability except
1) flash memory cards 2) CDROMs
3) hard disk drives 4) floppy disks
5) None of these Ans.) 2
Ques. : 396 To what temporary area can you store text and other data, and later paste them to another location?
1) The clipboard 2) ROM
3) CDROM 4) The hard disk
5) None of these Ans.) 1
Ques. : 397 The operating system called UNIX is typically used for
1) desktop computers 2) laptop computers
3) super computers 4) web servers
5) All the above Ans.) 5
Ques. : 398 Press __________ to move the insertion point to the address box, or to highlight the URL in the address box.
1) Alt+D 2) Alt+A
3) Shift+Tab 4) Tab+Ctrl
5) None of these Ans.) 1
Ques. : 400 The portion of the CPU that coordinates the activities of all the other computer components is the
1) motherboard 2) coordination board
3) control unit 4) airthmetic logic unit
5) None of these Ans.) 3
Ques. : 405 Which of the following refers to the fastest, biggest and most expensive computers?
1) Personal Computers 2) Supercomputers
3) Laptops 4) Notebooks
5) None of these Ans.) 2
Ques. : 408 If you do not want to select any option after opening a menu then click menu title again or press key
________ to close the menu.
1) Shift 2) Tab
3) Escape 4) F1
5) None of these Ans.) 3
Ques. : 409 It is easy to change the name of file using _____________ process.
1) transforming 2) christening
3) renaming 4) retagging
5) None of these Ans.) 3
Ques. : 410 What is the minimum and maximum zoom sizes in MS Office?
1) 10, 100 2) 20, 250
3) 10, 500 4) 10, 1000
5) None of these Ans.) 3
Ques. : 412 Which of the following is a popular programming language for developing multimedia web pages, websites
and webbased applications?
1) COBOL 2) Java
3) BASIC 4) Assembler
5) None of these Ans.) 2
Ques. : 414 Computers use the ___________number system to store data and perform calculations.
1) decimal 2) hexadecimal
3) octal 4) binary
5) None of these Ans.) 1
Ques. : 415 The ______ key will launch the Start button.
1) esc 2) shift
3) Windows 4) Shortcut
5) None of these Ans.) 3
Ques. : 421 MICR technology used for clearance of cheques by banks refers to
1) Magnetic Ink Character Recognition 2) Magnetic Intelligence Character Recognition
3) Magnetic Information Cable Recognition 4) Magnetic Insurance Cases Recognition
5) None of these Ans.) 1
Ques. : 422 Modern computers represent characters and numbers internally using one of the following number systems:
1) Penta 2) Octal
3) Hexa 4) Septa
5) Binary Ans.) 5
Ques. : 424 If you want to extend the length of the network without having the signal degrade, you would use a
1) repeater 2) router
3) gateway 4) switch
5) None of these Ans.) 1
Ques. : 426 What type of resource does have greater probability to become shared resource in a computer network?
1) Printers 2) Speakers
3) Floppy disk drivers 4) Keyboards
5) None of these Ans.) 1
Ques. : 427 Which of the following terms is used to describe the movement of an item with the help of mouse to a new
position on screen?
Ques. : 429 _________ are distinct items that don't have much meaning to you in a given countext.
1) Fields 2) Data
3) Queries 4) Properties
5) None of these Ans.) 2
Ques. : 431 Two or more computers connected to each other for sharing information form a
1) network 2) router
3) server 4) tunnel
5) pipeline Ans.) 1
Ques. : 432 The _____ becomes different shapes depending on the task you are performing.
1) active tab 2) insertion point
3) mouse pointer 4) ribbon
5) None of these Ans.) 3
Ques. : 433 The capability of the operating system to enable two or more than two instructions to execute simultaneously
in a single computer system by using multiple CPUs is
1) Multitasking 2) Multiprogramming
3) multiprocessing 4) Multiexecution
5) None of these Ans.) 3
Ques. : 434 A collection of related information sorted and dealt with as a unit is a
1) disk 2) data
3) file 4) floppy
5) None of these Ans.) 3
Ques. : 435 An output device that lets you see what the computer is doing
1) a disk drive 2) monitorscreen
3) shift key 4) printer
5) None of these Ans.) 2
Ques. : 441 ________ may be included in other folder while making heirarchical structure folder.
1) Minifolder 2) Tiered folder
3) Subfolder 4) Object
5) None of these Ans.) 3
Ques. : 442 To access properties of an object, the mouse technique to use is __________.
1) rightclicking 2) shiftclicking
3) dragging 4) dropping
5) None of these Ans.) 1
Ques. : 443 A ________ shares hardware, software and data among authorised users.
1) network 2) protocol
3) hypertext 4) transmitter
5) None of these Ans.) 1
Ques. : 444 Computer programs are written in a highlevel programming language; however, the humanreadable
version of a program is called
1) cache 2) instruction set
3) source code 4) world size
5) None of these Ans.) 3
Ques. : 445 In world processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is
1) copy and paste 2) copy, cut and paste
3) cut, copy and paste 4) cut and paste
5) None of these Ans.) 4
Ques. : 450 A person who uses his/her expertise to gain access to other people's computers to get information illegally or
do damage is a
1) spammer 2) hacker
3) instant messanger 4) All of the above
5) None of these Ans.) 2
Ques. : 451 Binary coded decimal (BCD) numbers express each decimal digit as a
1) bit 2) byte
3) nibble 4) binary digit
5) word Ans.) 3
Ques. : 461 A paint program keeps track of every _________ placed on the screen.
1) Image 2) object
3) pixel 4) color
5) symbol Ans.) 3
Ques. : 464 Which shortcut key is used to open a new file in MS Word?
1) Ctrl+N 2) Ctrl+M
3) Ctrl+Y 4) Ctrl+X
5) Ctrl+Z Ans.) 1
Ques. : 471 Which is the most popular medium for direct access to secondary storage of a computer?
1) Magnetic tape 2) ROM
3) RAM 4) Magnetic disk
5) None of these Ans.) 4
Ques. : 473 Which of the following produces the bestquality graphics reproduction?
1) Laser printer 2) Inkjet printer
3) Plotter 4) Dot matrix printer
5) CAD Ans.) 3
Ques. : 475 A computer virus is a software program which has the essential ability to
1) repeat data 2) clone itself
3) hide itself 4) reduce itself
5) None of these Ans.) 2
Ques. : 477 The interface of data from a CPU to peripheral devices of a computer is achieved through
1) interface 2) commands
3) buffer 4) parts of computer
5) All the above Ans.) 4
Ques. : 478 DOS cannot retrieve any data from a disk if a computer virus corrupts the ________ of the computer.
1) directory area 2) data area
3) BAT files 4) file allocation table
5) root directory area Ans.) 4
Ques. : 480 Which of the following is NOT a part of the operating system?
1) Supervisor 2) Jobcontrol program
3) I/O control program 4) Performance monitor
5) None of these Ans.) 4
Ques. : 482 To select an entire row in the Excelsheet, the shortcut key that is used is
1) ctrl+space 2) ctrl+arrow key
3) shift+arrow key 4) ctrl+tab
5) shift+space Ans.) 5
Ques. : 483 What is the number of maximum columns that can be inserted in a Word (2003) document?
1) 35 2) 42
3) 45 4) 55
5) 52 Ans.) 3
Ques. : 484 ________ are the summarised version of slides that display only titles and main text.
1) Handouts 2) Outlines
3) Speaker notes 4) Slide sorter
5) None of these Ans.) 2
Ques. : 485 In _______, the cells are referred by their fixed position in the worksheet.
1) cell referencing 2) relative referencing
3) absolute referencing 4) mixed referencing
5) fixed referencing Ans.) 3
Ques. : 487 Which type of protocol is used for accessing Internet/web on mobile phones?
1) PPP 2) HTTP
3) FTP 4) WAP
5) SMTP Ans.) 4
Ques. : 488 The device which is used to connect the computer to the network media is called
1) cable 2) hub
3) switch 4) NIC
5) All the above Ans.) 4
Ques. : 491 To change the selected text to all capital letters, click the change case button, then click
1) Uppercase 2) Upper all
3) Capslock 4) Lock Upper
5) Large Size Ans.) 1
Ques. : 492 A person who uses his/her expertise to gain access to other people's computers to get information illegally or
do damage is a
Ques. : 493 A device that connects to a network without the use of cables is said to be
1) distributed 2) free
3) centralised 4) open source
5) wireless Ans.) 5
Ques. : 494 Reusable optical storage will typically have the acronym
1) CD 2) DVD
3) ROM 4) RW
5) ROS Ans.) 4
Ques. : 496 Which of the following was the first widely used OS with graphical interface?
1) OS12 2) MVS
3) Mac OS 4) DOS
5) VMS Ans.) 3
Ques. : 497 Which of the following was the first widely used OS with graphical interface?
1) OS12 2) MVS
3) Mac OS 4) DOS
5) VMS Ans.) 3
Ques. : 501 Which hole is used to mark the location of the first sector in a softsectored disk?
1) Address 2) Location
3) Label 4) Primary
5) Index Ans.) 5
Ques. : 502 The process of a computer receiving information from a server on the Internet is known as
1) pulling 2) downloading
3) pushing 4) uploading
5) transferring Ans.) 2
Ques. : 503 The part of the CPU which coordinates the activities of all other components of the computer is called
Visit www.copaguide.com for Computer Notes, Online Test, Video Tutorials
1) motherboard 2) coordination board
3) Arithmetic Logic Unit 4) control unit
5) None of these Ans.) 1
Ques. : 504 Repair which is usually available on Internet without any charge, for a known software bug is called
1) patch 2) version
3) help 4) FAQ
5) tutorial Ans.) 1
Ques. : 505 Which of the following was the first computer to use transisters instead of vacuum tubes?
1) Intel650 2) Burroughs E101
3) Datametric1000 4) IBM 1401
5) ENIAC Ans.) 4
Ques. : 506 The two basic types of record access methods are _________ and _________.
1) sequential, random 2) direct, immediate
3) sequential, indexed 4) online, realtime
5) None of these Ans.) 1
Ques. : 507 To save an existing file with a new name or a new location, you should use _________command.
1) save 2) save and replace
3) new file 4) save as
5) All the above Ans.) 4
Ques. : 509 _______ fields store the numbers used for calculation in database.
1) Next 2) Key
3) Numeric 4) Alphanumeric
5) Varchar Ans.) 3
Ques. : 510 When sending an email, ________line describes the content of the message.
1) to 2) CC
3) Contents 4) BCC
5) Subject Ans.) 5
Ques. : 512 ________ are type of inexpensive digital camera that remains tethered to a computer and are used for
videoconferencing, video chatting, and live Web broadcast.
1) Webcams 2) Webpics
3) Browsercams 4) Browserpics
5) None of these Ans.) 1
Ques. : 517 To _________ a document means to make changes to its existing content.
1) format 2) save
3) edit 4) print
5) None of these Ans.) 3
Ques. : 518 Where is the disk put to enable computer to read it?
1) Disk drive 2) Memory
3) CPU 4) ALU
5) None of these Ans.) 1
Ques. : 521 To change hardware components into more powerful or rectified version is called
1) expansion 2) plug and play
3) upgrading 4) upsizing
5) None of these Ans.) 3
Ques. : 523 In order to move from one worksheet to another in excel workbook, one should click
1) active cell 2) scroll bar
3) sheet tab 4) tab button
5) None of these Ans.) 3
Ques. : 524 Every device on the Internet has a unique ________ address that identifies it in the same way that a street
address identifies the location of a house.
1) DH 2) DA
3) IP 4) IA
Ques. : 525 This type of hardware consists of devices that translate data into a form the computer can process
1) application 2) input
3) system 4) All of these
5) None of these Ans.) 2
Ques. : 526 Which key is used in combination with another key to perform a specific task?
1) Home 2) Arrow
3) Space bar 4) Ctrl
5) None of these Ans.) 4
Ques. : 527 A set of stepbystep procedures for accomplishing a task is known as a(n)
1) algorithm 2) hardware program
3) software bug 4) firmware program
5) None of these Ans.) 1
Ques. : 529 The hardware device commonly referred to as the 'brain' of the computer is the
1) RAM chip 2) data input
3) CPU 4) secondary storage
5) None of these Ans.) 3
Ques. : 530 What is the intersection of a column and a row called on an Excel worksheet?
1) Column 2) Value
3) Address 4) Cell
5) None of these Ans.) 4
Ques. : 531 The process of a computer of receiving information from a server on the Internet is called
1) pulling 2) pushing
3) downloading 4) transferring
5) None of these Ans.) 3
Ques. : 532 You can start Microsoft Word by using __________ button.
1) New 2) Program
3) Control Panel 4) My Computer
5) None of these Ans.) 2
Ques. : 534 Which of the following could you do to remove a paragraph from a report you had written?
1) Delete and edit 2) Highlight and delete
3) Cut and paste 4) Undo typing
5) None of these Ans.) 2
Ques. : 535 All of the following storage media have Read and Write capabilities except
1) flash memory cards 2) CDROMs
Ques. : 536 To what temporary area can you store text and other data, and later paste them to another location?
1) Clipboard 2) ROM
3) CDROM 4) Hard disk
5) None of these Ans.) 1
Ques. : 537 If a user needs information instantly available to the CPU, it should be stored
1) on a CD 2) in secondary storage
3) in the CPU 4) in BIOS
5) None of these Ans.) 2
Ques. : 538 The operating system called UNIX is typically used for
1) desktop computers 2) laptop computers
3) super computers 4) web servers
5) All the above Ans.) 5
Ques. : 539 Press __________ to move the insertion point to the address box, or to highlight the URL in the address box.
1) Alt+D 2) Alt+A
3) Shift+Tab 4) Tab+Ctrl
5) Ctrl+S Ans.) 1
Ques. : 543 Which of the following refers to the fastest, biggest and most expensive computers?
1) Personal Computers 2) Supercomputers
3) Laptops 4) Notebooks
5) None of these Ans.) 2
Ques. : 545 If you do not want to select any option after opening a menu then click menu title again or press key
________ to close the menu.
1) Shift 2) Tab
3) Escape 4) F1
5) None of these Ans.) 3
Ques. : 546 It is easier to change the name of file using ________ process.
Ques. : 547 A series 100 POST error code indicates a problem with the
1) hard drive 2) RAM or ROM
3) system board 4) video adapter
5) None of these Ans.) 3
Ques. : 548 Which of the following are valid Min. and Max. zoom sizes in MS Office?
1) 10, 100 2) 20, 250
3) 10, 500 4) 10, 1000
5) None of these Ans.) 3
Ques. : 551 Computers use the ___________ number system to store data and perform calculations.
1) decimal 2) hexadecimal
3) octal 4) binary
5) None of these Ans.) 4
Ques. : 552 The ______ key will launch the Start button.
1) Esc 2) Shift
3) Windows 4) Tab
5) None of these Ans.) 3
Ques. : 558 'MICR' technology used for clearance of cheques by banks refers to
1) Magnetic Ink Character Recognition 2) Magnetic Ink Character Reading
3) Magnetic Information Cable Recognition 4) Magnetic Insurance Cases Recognition
5) None of these Ans.) 1
Ques. : 559 Modern computers represents characters and numbers internally using one of the following number
systems?
1) Penta 2) Octal
3) Hexa 4) Septa
5) Binary Ans.) 5
Ques. : 561 If you wish to extend the length of the network without having the signal degrade, you would use a
1) repeater 2) router
3) gateway 4) switch
5) None of these Ans.) 1
Ques. : 564 Which type of resource does have greater probability to become shared resource in a computer network?
1) Printers 2) Speakers
3) Floppy disk drivers 4) Keyboards
5) None of these Ans.) 1
Ques. : 565 Which of the following terms is used to describe the movement of an item with the help of mouse to a new
position on screen?
1) Click 2) Double click
3) Drag and drop 4) Point
5) Right click Ans.) 3
Ques. : 567 ________ are dintinct items that don't have much meaning to you in a given context.
1) Fields 2) Data
3) Queries 4) Properties
Ques. : 569 Two or more computers connected to each other for sharing information form a
1) network 2) router
3) server 4) tunnel
5) pipeline Ans.) 1
Ques. : 571 The ________ becomes different shapes depending on the task you are performing.
1) active tab 2) insertion point
3) mouse pointer 4) ribbon
5) None of these Ans.) 3
Ques. : 572 A collection of related information sorted and dealt with as a unit is a
1) disk 2) data
3) file 4) floppy
5) None of these Ans.) 3
Ques. : 573 An output device that lets you see what the computer is doing
1) a disk drive 2) monitorscreen
3) shift key 4) printer
5) None of these Ans.) 2
Ques. : 579 You can enter and edit the text efficiently using
1) spreadsheet 2) typewriter
3) Word Processing Program 4) Desktop Publishing Program
5) None of these Ans.) 3
Ques. : 580 ______ may be included in other folder while making heirarchical structure folder.
1) Minifolder 2) Tiered folder
3) Subfolder 4) Object
5) None of these Ans.) 3
Ques. : 581 A _____ shares hardware, software and data among authorised users.
1) network 2) protocol
3) hyperlink 4) transmitter
5) None of these Ans.) 1
Ques. : 582 Computer programs are written in a highlevel programming language; however, the humanreadable
version of a program is called
1) cache 2) instruction set
3) source code 4) word size
5) None of these Ans.) 3
Ques. : 583 In world processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is
1) copy and paste 2) copy, cut and paste
3) cut, copy and paste 4) cut and paste
5) None of these Ans.) 4
Ques. : 588 A popular way to learn about computers without ever going to a classroom is called
1) clearning 2) isolated learning
3) elearning 4) close learning
5) distance learning Ans.) 3
Ques. : 589 A person who uses his/her expertise to gain access to other people's ciomputers to get information illegally
Ques. : 590 Binary coded decimal (BCD) numbers express each decimal digit as a
1) bit 2) byte
3) nibble 4) binary digits
5) word Ans.) 3
Ques. : 599 A paint program keeps track of every _________ placed on the screen.
1) image 2) object
3) pixel 4) colour
5) symbol Ans.) 3
Ques. : 602 Which of the following is used to open a new file in MS Word?
1) Ctrl + X 2) Ctrl + Y
3) Ctrl + Z 4) Ctrl + F
5) Ctrl+N Ans.) 5
Ques. : 610 Which is the most popular medium for direct access to secondary storage of a computer?
1) Magnetic tape 2) ROM
3) RAM 4) Magnetic disk
5) PROM Ans.) 4
Visit www.copaguide.com for Computer Notes, Online Test, Video Tutorials
Ques. : 611 Ethernet uses _________ topology.
1) bus 2) ring
3) star 4) tree
5) mesh Ans.) 1
Ques. : 612 Which of the following produces the best quality graphics reproduction?
1) Laser printer 2) Inkjet printer
3) Plotter 4) Dot matrix printer
5) CAD Ans.) 3
Ques. : 614 A computer virus is a software program which has the essential ability to
1) damage data 2) clone itself
3) hide itself 4) damage program
5) None of these Ans.) 2
Ques. : 615 The interface of data from a CPU to peripheral devices of a computer is achieved through
1) interface 2) commands
3) buffer 4) parts of computer
5) All the above Ans.) 4
Ques. : 616 DOS cannot retrieve any data from a disk if a computer virus corrupts the ________ of the computer.
1) directory area 2) data area
3) BAT files 4) file allocation table
5) root directory area Ans.) 4
Ques. : 618 Which of the following is NOT a part of the operating system?
1) Supervisor 2) Joncontrol program
3) I/O control program 4) Performance monitor
5) None of these Ans.) 4
Ques. : 620 To select an entire row in the Excelsheet, the shortcut key that is used is
1) Ctrl+Space 2) Ctrl+Arrow
3) Shift+Arrow 4) Ctrl+Tab
5) Shift+Space Ans.) 5
Ques. : 621 What is the number of maximum columns that can be inserted in a Word (2003) document?
1) 35 2) 42
3) 45 4) 55
5) 52 Ans.) 3
Visit www.copaguide.com for Computer Notes, Online Test, Video Tutorials
Ques. : 622 _________ are the summarised version of slides that display only titles.
1) Handouts 2) Outlines
3) Speaker notes 4) Slide sorter
5) None of these Ans.) 2
Ques. : 623 In _____, the cell are referred by their fixed position in the worksheet.
1) cell referencing 2) relative referencing
3) absolute referencing 4) mixed referencing
5) fixed referencing Ans.) 3
Ques. : 625 Which type of protocol is used for accessing Internet/web on mobile phones?
1) PPP 2) HTTP
3) FTP 4) WAP
5) SMTP Ans.) 4
Ques. : 626 The device which is used to connect the computer to the network media is called
1) cable 2) hub
3) switch 4) NIC
5) All the above Ans.) 4
Ques. : 628 DNS is extremely important for the correct functioning of the Internet as it
2) maps symbolic names for machines onto their
1) encrypts data
IP address
3) translates message into machine language 4) All the above
5) None of these Ans.) 2
Ques. : 629 Which of the following was the first widely used OS with graphical interface?
1) OS12 2) MVS
3) Mac OS 4) DOS
5) VMS Ans.) 3
Ques. : 632 Which hole is used to mark the location of the first sector in a softsectored disk?
1) Address 2) Location
3) Label 4) Primary
Ques. : 633 The process of a computer receiving information from a server on the Internet is known as
1) pulling 2) downloading
3) pushing 4) uploading
5) transferring Ans.) 2
Ques. : 634 The part of CPU which coordinated the activities of all other components of the computer is
1) motherboard 2) coordination board
3) Arithmetic Logic Unit 4) Control Unit
5) None of these Ans.) 1
Ques. : 635 Repair which is usually available on Internet without any charge, for a known software bug is called
1) patch 2) version
3) help 4) FAQ
5) tutorial Ans.) 1
Ques. : 636 Which was the first computer to use transisters instead of vacuum tubes?
1) Intel650 2) Burroughs E101
3) Datametric1000 4) IBM 1401
5) ENIAC Ans.) 4
Ques. : 637 The two basic types of record access methods are _________ and _________.
1) sequential, random 2) direct, immediate
3) sequential, indexed 4) online, realtime
5) None of these Ans.) 1
Ques. : 638 To save an existing file with a new name or a new location, you should use _________command.
1) save 2) save and replace
3) new file 4) save as
5) All the above Ans.) 4
Ques. : 640 ________ fields store the numbers used for calculation in database.
1) Next 2) Key
3) Numeric 4) Alphanumeric
5) Valchar Ans.) 3
Ques. : 641 When sending an email, ________line describes the content of the message.
1) to 2) CC
3) contents 4) BCC
5) Subject Ans.) 5
Ques. : 642 What is the keyboard shortcut for creating chart from the selected cell range?
1) F2 2) F4
3) F8 4) F10
5) F11 Ans.) 5
Ques. : 643 Which of the following methods will not enter data into a cell?
1) Pressing an errow key 2) Pressing the Esc key
3) Pressing the tab key 4) Clicking the enter button to the formula bar
Ques. : 651 Band, the unit for measuring data transmission speed, is equal to
1) one bit per second 2) one byte per second
3) two bytes per second 4) two bits per second
5) None of these Ans.) 1
Ques. : 652 What type of computer can support hundreds of people at any time?
1) Desktop 2) Laptop
3) Microcomputer 4) Minicomputer
5) Mainframe Computer Ans.) 5
Ques. : 653 ________ uses viruses to destroy computer hardware and software.
1) Spoofing 2) Tunneling
3) Sabotage 4) Phishing
5) Flooding Ans.) 3
Ques. : 654 Which of the following is NOT a Microsoft Internet tool technology?
Ques. : 660 How many layers are there in the TCP/IP model?
1) four 2) five
3) six 4) seven
5) three Ans.) 2
Ques. : 663 _______ provides a connectionoriented reliable service for sending message.
1) IP 2) TCP
3) UDP 4) HTTP
5) None of these Ans.) 2
Ques. : 665 _______ layer of the OSI model is also called an endtolayer.
Ques. : 669 How many types of storage loops exst in magnetic bubble memory?
1) 8 2) 4
3) 16 4) 2
5) 32 Ans.) 4
Ques. : 677 Which piece of hardware protects the resource of a private network from other networks?
1) Cache server 2) Proxy server
3) Firewall 4) Router
5) Bridge Ans.) 3
Ques. : 678 What is the shortcut key for 'Find and Replace' dialogue box?
1) Ctrl+A 2) Ctrl+R
3) Ctrl+H 4) Ctrl+M
5) Ctrl+N Ans.) 3
Ques. : 679 _______ are used to identify a user who returns to a website.
1) Cookies 2) Plugin
3) Scripts 4) ASPS
5) Browser Ans.) 1
Ques. : 680 All the information collected during database development is stored in a
1) repository 2) dataware house
3) RAD 4) CASE
5) None of these Ans.) 2
Ques. : 682 The altering of data so that it is not usable unless the changes are undone is called
1) Biometrics 2) Compression
3) Encryption 4) Ergonomics
5) None of these Ans.) 3
Ques. : 684 The ______ key will launch the Start button.
1) Esc 2) Shift
3) Windows 4) Ctrl
5) Tab Ans.) 3
Ques. : 686 Which of the following displays the address and name of the selected cell?
1) Name box 2) Row heading
3) Formula bar 4) Task pane
5) None of these Ans.) 1
Ques. : 689 Which of the following can be used to select the entire column in a worksheet?
1) shift+space 2) ctrl+space
3) alt+space 4) ctrl+space+1
5) shift+space+1 Ans.) 2
Ques. : 691 Objects on the slide that hold text are called
1) object holders 2) text holders
3) auto layout 4) place holders
5) data holders Ans.) 4
Ques. : 694 What is the number of bit pattern provided by a 7bit code?
1) 256 2) 128
3) 64 4) 512
5) 32 Ans.) 2