PREPARATORY QUESTIONS

COMPUTER KNOWLEDGE

PREPARATORY SET-13

Direction (Qs.1-15): Study the following questions carefully and choose your answer from the given five options.

 

Question No : 1

Which protocol does Ping use?

(1) TCP

(2) ARP

(3) ICMP

(4) BootP

(5) None of these

Question No : 2

A set of step-by-step procedures for accomplishing a task is known as a(n) _____.

(1) algorithm

(2) hardware program

(3) software bug

(4) firmware program

(5) None of these

Question No : 3

The operating system that is self-contained in a device and resident in the ROM is _____.

(1) Batch Operating System

(2) Real-time Operating System

(3) Embedded Operating System

(4) Multi-processor Operating System

(5) None of these

Question No : 4

What is the full form of CMOS?

(1) Content Metal Oxide Semiconductor

(2) Complementary Metal Oxide Semiconductor

(3) Complementary Metal Oxygen Semiconductor

(4) Complementary Metal Oscilator Semiconductor

(5) None of these

Question No : 5

What is an E-mail attachment?

(1) A receipt sent by the recipient

(2) A separate document from another program sent along with an E-mail message

(3) A malicious parasite that feeds off of your messages and destroys the contents

(4) A list of CC: or BCC: recipients

(5) None of these

Question No : 6

‘Handshaking’ in Networking parlance means _____

(1) connecting computer to a hub

(2) distributed networks

(3) having same operating system on different computers

(4) sending e-mail

(5) receiving e-mails

Question No : 7

Which of the following is suitable after you install new drivers?

(1) Shut Down

(2) Restart

(3) Sleep

(4) Hibernate

(5) None of these

Question No : 8

A collection of interrelated records is called a _____.

(1) utility file  

(2) management information system

(3) Database

(4) Spreadsheet

(5) None of these

Question No : 9

The hardware device commonly referred to as the “brain” of the computer is the _____.

(1) RAM chip

(2) data input

(3) CPU

(4) Secondary storage

(5) None of these

Question No : 10

Documents converted to _____ can be published to the Web.

(1) a doc file

(2) http

(3) machine language

(4) HTML

(5) None of these

Question No : 11

Verification of a login name and password is known as_____

(1) configuration

(2) accessibility

(3) authentication

(4) logging in

(5) None of these

Question No : 12

_____ is a device from where the information is sent.

(1) Transmitter

(2) Spreadsheet

(3) Simulation

(4) Modulation

(5) None of these

Question No : 13

Ctrl, shift and alt are called _____ keys

(1) adjustment

(2) function

(3) modifier

(4) alphanumeric

(5) None of these

Question No : 14

The _____ button on the Quick Access Toolbar allows you to cancel your recent commands or activities.

(1) Search

(2) Cut

(3) Undo

(4) Redo

(5) Document

Question No : 15

ISDN stands for ____.

(1) Integral Service Dynamic Network

(2) International Subscriber Dialup Network

(3) International Service Digital Network

(4) Integrated Services Digital Network

(5) None of these