Informatics Assistant 2018
Capsules -3
(Computer Fundamental )
Capsules -3
(Computer Fundamental )
Q.1 Free
of cost repair of software bug available at Internet is called …………….
(A)
Version (B) Ad-on
(C)
Tutorial (D) Patch
Q.2 Which
of the following is READ only disc ?
(A)
DVD-R (B) DVD-ROM
(C)
DVDRW (D) CD-RW
Q.3 Which of the following is not a computer
language?
(A) High
Level Language
(B)
Machine Language
(C) Low
Level Language
(D) Medium Level Language
Q.4 Which
one of the following is different from other members ?
(A) Google (B) Windows
(C)
Linux (D) Mac
Q.5 Where
does a computer add and compare its data ?
(A) CPU (B) Memory
(C) Hard
disk (D) Floppy disk
Q.6 The
set of computer programs that manage the hardware/software of a computer is
called
(A)
Compiler system (B) Operation system
(C) Operating system (D) None of these
Q.7 POP3 and IMAP are e-mail accounts in which
(A) One
automatically gets one’s mail everyday
(B) One
has to be connected to the server to read or write one’s mail
(C) One only has to be connected
to the server to send and receive email
(D) One
does not need any telephone lines
Q.8 By default, your document prints with:
(A) 1 inch top and bottom margins
(B) a
portrait orientation
(C) 1.25
inches left and right margins
(D) all
of the above
Q.9 Which
of the following is not available on the Ruler of MS Word screen?
(A) Tab
stop box (B) Left Indent
(C) Right
Indent (D) Center Indent
Q.10 Ctrl
+ W
(A) Save
and Print the Document
(B) Save
and Close Word Application
(C) Save and Close document
(D) Without
Save, Close Document
Q.11The
combination of row and column is called ______________
(A) Line (B) Colum (C) Cell D. Row
Q.12 The
steps and tasks needed to process data, such as responses to questions or
clicking an icon, are called: Correct!
(A)Instructions (B) Operating system
(C) application software (D) System
unit
Q.13 he
ability to recover and read deleted or damaged files from a criminals computer
is an example of a law enforcement specialty called: Correct!
(A) Simulation (B) animation
(C) Robotics (D) Computer forensics.
Q.14 Allocation
of resources in a time dependent manner to several program simultaneously
called Incorrect!
(A) Multi user (B) Multi-tasking
(C) Time sharing (D) None of these.
Q.15 Multiprocessing
supports more than one_____ at the same time Correct!
(A) User (B) Process (C) Hardware (D)None
Q.16 Which
of the following are true about firewalls? Correct!
(A) Follows a set of rules
(B) Can be either a hardware or software device
(C) Filters
network traffic
(D) All the above
Q.17 What
is the commonly used unit for measuring the sped of data transmission? Correct!
(A) Mega
Hertz (B) Characters per second
(C) Nano
seconds (D) Bits per second
Q.18 Blue
tooth' technology allows Incorrect!
(A) Satellite communication
(B) Wireless communication between
equipment's
(C) Signal transmission on mobile phones only
(D) Landline phone to mobile phone communication
Q.19 Verification
of a login name and password is known as: Correct!
(A) configuration (B) accessibility
(C) authentication (D) logging in
Q.20 What
item contains detailed information about something in the text ?
(A) Footer (B) Foot Note
(C) Header (D) Head Note
No comments:
Post a Comment