PREPARATORY QUESTIONS

COMPUTER KNOWLEDGE

PREPARATORY SET-22

Direction (Qs.1-15): Study the following questions carefully and choose your answer from the given five options.

 

Question No : 1

VIRUS stands for

(1) Very Important Resource Under Search

(2) Vital Information Resources Under Sieze

(3) Verify Interchange Result Until Source

(4) Very Important Record User Searched

(5) None of these   

Question No : 2

When a computer is switched on, the booting process performs _____

(1) Integrity Test

(2) Power-On Self-Test

(3) Correct Functioning Test

(4) Reliability Test

(5) None of these

Question No : 3

_____ operations is safe if an e-mail from an unknown sender is received?

(1) Open it to know about the sender and answer it

(2) Delete it after opening it

(3) Delete is without opening it

(4) Open it and try to find who the sender is

(5) None of these

Question No : 4

Which of the following allows to make copies of the database periodically to help in the cases of crashes and disaster?

(1) Recovery Utility

(2) Monitoring Utility 

(3) Backup Utility

(4) Data loading Utility

(5) None of these

Question No : 5

Which of the following is the maximum limit of the height of a row in an Excel Sheet?

(1) 209 points

(2) 309 points

(3) 509 points

(4) 409 points  

(5) 609 points

Question No : 6

Which of the following symbols are used to represent numbers in Hexadecimal base system?

(1) 1-9 and A, B, C, D, E, F, G

(2) 1-9 and A, B, C, D, E, F

(3) 0-9 and A, B, C, D, E, F, G

(4) 0-9 and A, B, C, D, E, F

(5) None of these   

Question No : 7

In Microsoft Excel, which of the following functions is used for finding the total of a sequence of cells?

(1) TOTAL

(2) SUM

(3) ADD

(4) MERGE

(5) None of these   

Question No : 8

The computers used by banks for transactions processing and analyzing bulk data are called.

(1) Desktop Computers

(2) Personal Computers

(3) Mainframe computers

(4) Laptop Computers

(5) Notebook Computers

Question No : 9

Which of the following printers is the fastest?

(1) Dot Matrix Printer

(2) Drum Printers

(3) Chain Printer

(4) Ink Jet Printers

(5) Line Printers

Question No : 10

Unsolicited emails which are usually sent by corporates as marketing materials are called?

(1) Trash

(2) Spam

(3) Business messages

(4) Corporate emails

(5) Promotions

Question No : 11

In an IP address, how many periods or full stops () are there?

(1) 0

(2) 1

(3) 2

(4) 3

(5) 4

Question No : 12

_____ is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law

(1) Robotics

(2) Animation

(3) Simulation 

(4) Computer Forensics

(5) None of these

Question No : 13

_____ is a part of computer network that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks.

(1) Server

(2) Client

(3) Protocol

(4) Backbone

(5) None of these

Question No : 14

What is the shortcut key to “Update Formula” in a table?

(1) F9

(2) Alt + F9

(3) Ctrl + F9

(4) Shift + F9

(5) None of these   

Question No : 15

The two most common types of page orientation are _____.

(1) Header and footer

(2) Top, bottom, right, left 

(3) Landscape and portrait

(4) Top and bottom

(5) None of these