PREPARATORY QUESTIONS

COMPUTER KNOWLEDGE

PREPARATORY SET-25

Direction (Qs.1-15): Study the following questions carefully and choose your answer from the given five options.

 

Question No : 1

Firewalls are generally used to protect against _____.

(1) Fire Attacks

(2) Data Driven Attacks

(3) Virus Attacks

(4) Unauthorized access

(5) None of these

Question No : 2

The Third Generation Computer was made with _____

(1) Vacuum Tube

(2) Discrete Components

(3) Integrated circuits

(4) Bio Chips

(5) None of these

Question No : 3

The power-saving mode that allows the computer to be restarted by simply pressing a key on the keyboard is called:

(1) Standby

(2) Warm boot

(3) Power management.

(4) Cold boot

(5) None of these

Question No : 4

Every device on the internet has a unique ____ address that identifies it in the same way that a street address identifies the location of a house.

(1) DH

(2) DA

(3) IP   

(4) IA  

(5) None of these   

Question No : 5

What is the full form of RTF?

(1) Richer Text Formatting

(2) Rich Text Format

(3) Right Text Fishing

(4) Right Text Font

(5) None of these

Question No : 6

_____ are often delivered to a PC through an email attachment and are often designed to do harm.

(1) Viruses

(2) Spam

(3) Portals

(4) SMS messages

(5) None of these

Question No : 7

Software for organizing storage and retrieval of information is a(n) _____.

(1) Operating system  

(2) CPU

(3) Database program

(4) Data warehouse

(5) None of these

Question No : 8

During the boot process, the _____ looks for the system files

(1) CD 

(2) BIOS

(3) CPU

(4) DVD

(5) None of these

Question No : 9

Operating system and utility programs are in a class of software known as_____.

(1)  application software

(2) sequential software

(3) software suites

(4) BIOS software

(5) System software

Question No : 10

Main circuit board of computer is called _____.

(1) Father Board

(2) Mother Board

(3) Keyboard

(4) All of these

(5) None of these

Question No : 11

Switch is a network device whose responsibility is to _____.

(1) Protect from virus attack  

(2) Turn of the power to network

(3) Connect Network devices

(4) Boot the network

(5) None of these

Question No : 12

The quickest and easiest way in Word, to locate a particular word or phrase in a document is to use the _____ command.

(1) Replace

(2) Find

(3) Lookup

(4) Search 

(5) None of these   

Question No : 13

DHTML stands for _____.

(1) Dynamic hypertext markup language

(2) Dynamic hypertext main language

(3) Digital hypertext main language

(4) Digital hypertext markup language

(5) None of these   

Question No : 14

A(n) _____is a small group of computers and peripherals linked together in a small geographic area.

(1) MAN

(2) PAN

(3) CAN

(4) LAN

(5) None of these   

Question No : 15

Who among the following is also known as father of JQuery?

(1) Vint cerf    

(2) John Resig 

(3) Larry Page

(4) Martin Cooper

(5) None of these