Computer GK, 1500 Questions answers, Part 2

Computer GK, 1500 Questions answers, Part 2


501  Which search engine's search robot is known as 'Scooter'?
(a) AltaVista (b) Google
(c) Yahoo! Search (d) Ask.com.
Answer-A

502  Which is the first ever search engine to be developed?
(a) Archie (b) Jughead
(c) Veronica (d) Lycos
Answer-A

503  Which search engine uses its proprietary PageRank algorithm to list web pages according to popularity?
(a) AltaVista (b) Google
(c) Yahoo (d) Ask.com.
Answer-B

504  This advanced search mechanism, included in Macintosh O/S, has the ability to search multiple Internet search engines simultaneously. By what name is it known as?
(a) Sherlock (b) Holmes
(c) Agatha (d) Bond
Answer-A

505  In 2002, which search engine manipulator filed a lawsuit against Google alleging that its tactics to prevent spamdexing constituted unfair business practice? The judgment ultimately went in Google's favor
(a) Search King (b) Googly.co
m(c) SearchGuild.com (d) DarkBlue.co
mAnswer-A


506  What is spider food?
(a) The algorithm used by search engines or spiders
(b) Embedded key words, usually invisible, in a web page
(c) A bait for a spammer
(d) Web pages left out inadvertently by a spider in response to a search request
Answer-B

507  This is a practice whereby some website owners deliberately and dishonestly manipulate search engines to increase the chance of their website or page being placed close to the beginning of search engine results or to influence the category to which the page is assigned. What is this practice called?
(a) Search engine fine-tuning
(b) Search engine warming
(c) Revving the search engine
(d) Spamdexing
Answer-D

508  In a marketing tactic, a search engine is tricked into listing a site by including some frequently used keywords such as sex. These key words of course do not have any connection with the website's actual content what is this trick called?
(a) Trick marketing (b) Bait and switch
(c) Carpet bombing (d) Carrot and stick
Answer-B

509  What does a 'spider' do on the Internet?
(a) It searches the Net for new web pages and indexes their addresses and content related information in a database, which is used by a search engine
(b) Tracks spammers and their mails
(c) Tracks encrypted communications and their sources
(d) Tracks child pornography
Answer-A

510  In which laboratory the original development of World Wide Web (WWW) took place in 1989?
(a) European Organization for Nuclear Research, Geneva
(b) National Centre for Super-computing Applications
(c) Palo Alto Research Centre
(d) Bell Labs
Answer-A


511  GOPHER is one of the many facilities available on the Net. How is it different from the WWW?
(a) GOPHER contains graphics whereas WWW does not
(b) GOPHER contains no graphics whereas WWW does
(c) Unlike WWW, it provides live conferencing facilities
(d) It helps to send voice mail
Answer-B

512  Name the protocol standard designed to condense WWW sites to fit into handheld, digital, wireless devices such as mobile phones and pagers
(a) WAP (b) HTTP
(c) TCP (d) FTP
Answer-A

513  Tim Berner Lee wanted to call World Wide Web or WWW TIM after his own name. What, according to him, did the acronym TIM stand for?
(a) Total Information Management
(b) The Internet Maze
(c) The Information Mesh
(d) Tim's Information Management
Answer-C

514  The inventor of World Wide Web Tim Berners-Lee feels that the Web should be made more intelligent and intuitive so that it can serve a user's needs better and the search engines can provide web pages that a user really wants. What does Tim call such a web?
(a) Semantic Web (b) Intelli Web
(c) Intuitive Web (d) Contextual Web
Answer-A

515  English is the most-used language on the World Wide Web. Which language comes second?
(a) Hindi (b) French
(c) Chinese (d) Japanese
Answer-C


516  The Organisation Europeenne pour la Recherche Nucleaire (CERN) in Switzerland, the birth place of WWW, is mainly involved in research in which area?
(a) Information Technology (b) Particle Physics (c) Cosmology (d) Planetary science
Answer-B

517  Which was the world's first web browser and WYSIWYG HTML editor?
(a) World Wide Web (b) Mozilla
(c) Netscape (d) Opera
Answer-A

518  Which browser has the distinction of being the first popular graphical WWW browser?
(a) Netscape Navigator (b) Internet Explorer (c) Lynx (d) Mosaic
Answer-D

519  Which web browser is also known by the nickname Mozilla?
(a) Netscape Navigator (b) Internet Explorer
(c) Lynx (d) Mosaic
Answer-A

520  What is Apache?
(a) The first search engine on the Net
(b) The world's second virtual newscaster
(c) A freely available Web server
(d) The world's first online auction site
Answer-C


521  What is a Wiki or Wiki-Wiki?
(a) A server program that allows users to collaborate in forming or editing the content of a Web site
(b) An online collaboration software that allows the employees of a company located at remote places to collaborate on a project
(c) A new generation web browser
(d) A web visitor who browses through the web pages and sites at the maximum speed allowed by the speed of the mode
mAnswer-A

522  On his first visit to Honolulu, Ward Cunningham was directed by the airport counter agent to take the shuttle buses at the airport. The word that describes the shuttle bus service there means 'fast' in Hawaiian language. That was the first Hawaiian word Cunningham learned. Cunningham gave this name to a concept he created later on. Name the concept
(a) Wiki Wiki or wiki (b) Extreme Programming
(c) Webopedia (d) Awiwi
Answer-A

523  Part of Microsoft's Net venture, this service proposes to provide space on the Web where users can store their personal information securely for a fee. They can decide who can use their information, for how long, and in what manner. What is the name of this service?
(a) Secure Space (b) Micro Space
(c) Net Space (d) Hail Stor
mAnswer-D

524  Established in 1996, these leading international Awards, dubbed the Oscars of the Internet by The New York Times, are presented honoring excellence in Web design, creativity, usability and functionality. Name it
(a) Wammy Awards (b) Grammy Awards
(c) Webby Awards - (d) Net Awards
Answer-C

525  Which body presents the Webby Awards?
(a) International Academy of Digital Arts and Sciences
(b) Internet Corporation for Assigned Names and Numbers (ICANN)
(c) Internet Assigned Numbers Authority (IANA)
(d) Association for Computing Machinery
Answer-A


526  What well-known term in web browsing was coined by Lou Montulli?
(a) Net surfing (b) Netizen
(c) Cookies (d) Blog
Answer-C

527  What is dub dub dub?
(a) A web address with three dots in between the domain names
(b) A deserted website
(c) A website which has not been updated even once
(d) Short for WWW
Answer-D

528  What is the main function of Internet Corporation for Assigned Names and Numbers (ICANN)?
(a) Managing the assignment of domain names and IP addresses
(b) Develop standards for communication over the Internet
(c) Oversee and safeguard user privacy issues
(d) Define Internet-related terms
Answer-A

529  This Internet music search application sparked heated debate over copyright and digital distribution issues when it started enabling users to search for and swap MP3 files over the Web. Name it
(a) MP3.com (b) Musiconline.co
m(c) Napster (d) Web Music
Answer-C

530  In Internet terminology what is URL?
(a) Uniform Resource Locator
(b) Universal Random Locator
(c) Ultimate Resource Locator
(d) Universal Real Language
Answer-A


531  Highest subdivision of the Internet, usually by country or type of organization, such as .edu for education, or.com for commercial, is called
(a) Ethernet (b) Backbone
(c) Gateway (d) Domain
Answer-D

532  The identifying portion of a domain name, for example, economictimes in www.economictimes.com , is called?
(a) Primary domain name (b) Secondary domain name (c) Website name (d) Organization name
Answer-B

533  In the above question, 'com' is an example of
(a) Primary domain name (b) Generic domain name (c) Website name (d) Organization name
Answer-A

534  What new top-level domain name was approved by Internet Corporation for Assigned Names and Numbers (ICANN) in 2000 for use with the Websites of nonprofit cooperatives?
(a) .np (b) .non
(c) coo (d) .coop
Answer-D

535  Which company / organization is the original registrar of .com, .net and .org domain names on the Internet?
(a) Networks Solutions
(b) BetterWhois.co
m(c) U.S. Department of Commerce
(d) Internet Corporation for Assigned Names and Numbers (ICANN)
Answer-A


536  From which of the following, one can get the information on whether a particular .com .net .org .info .biz domain name has been registered, and if so, then the party who has registered it?
(a) Better Whois (b) Internet Assigned Numbers Autnority
(c) Google • (d) Yahoo! Search
Answer-A

537  In the cyber world, who are 'cyber squatters'?
(a) People who grab a well-known trademark and register it as domain name for ulterior purpose, such as selling the domain name back to the rightful owners for a fancy price, or making the Internet users believe that they are associated with the famous trademark
(b) People who hack a computer network
(c) People who pirate software
(d) People who spread virus over Internet
Answer-A

538  Some cyber squatters take advantage of an Internet user mistyping a web address into a web browser by leading the user to an alternate web address owned by them. This type of cyber squatting is called
(a) Typosquatting (b) Missquatting
(c) Address squatting (d) URL squatting
Answer-A

539  To track usage over time and to store information about a user, a website stores a special text file on the user's hard disk. What are these text files called?
(a) Applets (b) Banners
(c) Cookies (d) Plug-ins
Answer-C

540  In the World Wide Web, what is a black hole?
(a) A web page that takes a very long time to download
(b) A hyperlink to a document that has been erased or removed
(c) A web page that pops up on the screen unsolicited
(d) A mysterious source of spa
mAnswer-B


541  What is the basic difference between browsing and surfing?
(a) Browsing for no particular reason is called surfing
(b) Surfing with no particular reason is called browsing
(c) Browsing with the help of search engines is called surfing
(d) Browsing requires registration with the website whereas surfing does not
Answer-A

542  What is an 'arachniography'?
(a) A new form of spyware
(b) A new application that helps in viral marketing
(c) A bibliography of Web pages
(d) An application program that enables non-programmers to create web pages
Answer-C

543  Surfers who browse the web at breakneck speed over Digital Subscriber Line or DSL Internet connection are called
(a) Net squirrels (b) Bandwidth Junkie
(c) Ego surfers (d) Vanity surfers
Answer-B

544  When one is said to be 'ego surfing'?
(a) When one surfs the Net for hours altogether and does not allow others to access the Net from the same system.
(b) When one surfs the Net at very high speed.
(c) When one browses the website of one's own organization.
(d) When one searches the Net for reference to oneself.
Answer-D

545  What are mirror websites?
(a) Different language versions of the same website.
(b) Websites using the same URL but with different contents.
(c) A standby website while the original has been shut down for maintenance.
(d) Multiple websites with the same contents but different URLs.
Answer-D


546  In Internet jargon, what is a 'sticky site'?
(a) A site where a user spends a large amount of time.
(b) A site, which provides a particular type of information.
(c) Sites with contents meant for adults only.
(d) Site visited by the most number of surfers.
Answer-A

547  On the Net, who or what is a zombie?
(a) An abandoned website that due to some reason has been moved to a different Web address.
(b) A website that provides information on whether a domain name has already been registered by somebody else.
(c) A company that offers domain name registration service.
(d) A sticky website to which most visitors get glued once they access it.
Answer-A

548  What is a "para-site'?
(a) A website that frames other websites or pages within it
(b) A website accessible only from another website
(c) A website that diverts traffic from another site to itself
(d) A website that copies layout and design from another site
Answer-A

549  What is an evergreen website?
(a) The website is very popular with the visitors
(b) The website deals with environmental issues
(c) The website is updated daily or frequently
(d) The website uses primarily green color in its content
Answer-C

550  In an online auction, what is Shill bidding?
(a) Deliberate use of secondary registrations, aliases, family members, friends, or associates to artificially drive up the bid price of an item.
(b) Bidding for the quantity of the items on sale.
(c) Winning a bid for an item but not purchasing the same subsequently.
(d) Ending up paying much more for an item than the item is actually worth.
Answer-A


551  Contrary to popular belief, it is difficult for users to find information located in banner ads. This phenomenon is called
(a) Banner phobia (b) Banner blindness
(c) Banner zapping (d) Banner overlooking
Answer-B

552  What fancy name is given to tall and narrow banner advertisements on a web page?
(a) Monuments (b) Tall boys
(c) Eiffel Towers (d) Skyscrapers
Answer-D

553  What term is used pejoratively for the practice of advertising using spam?
(a) Netvertize (b) Spambait
(c) Spamvertize (d) Adspamming
Answer-C

554  M-commerce involves access to the Net via....
(a) Cable mode
m(b) Standard mode
m(c) Mobile devices such as a cell phone or PDA
(d) Internet2 devices
Answer-C

555  The ratio between the number of times an advertisement is clicked upon and the number of times the advertisement is served to the site visitor is called
(a) Click-through rate (CTR) (b) Click stream (c) Hit (d) Qualified hit
Answer-A


556  What is click stream?
(a) The sequence of mouse clicks made by a user as she or he navigates a web page or the Net.
(b) The sequence of mouse clicks one has to make in order to reach a particular page in a website.
(c) The site map of a website.
(d) The sequence of mouse clicks made by a user as she or he navigates a text document.
Answer-A

557  In Internet jargon, what are interstitials?
(a) An advertisement diverted to one's email box with the consent of the recipient.
(b) An advertisement that appears between web pages.
(c) An advertisement format where the contents are not static but changes every few seconds.
(d) An interactive advertisement.
Answer-B

558  What distinction does the book Fluid Concepts and Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought by Douglas Richard Hofstadter enjoy in the world of IT?
(a) It was the first book to lay out the principles of e-commerce
(b) It was the first book to be exclusively published online
(c) It was the first eBook
(d) It was the first book sold by Amazon.co
mAnswer-D

559  Which marketing guru pioneered the concept of 'permission marketing' which has become more common in the Web-based businesses?
(a) Seth Godin (b) Jagdish Sheth
(c) Deepak Jain (d) Theodore Levitt
Answer-A

560  Atomicity, Consistency, Isolation and Durability (ACID) are four essential properties of what?
(a) Electronic transactions
(b) Microprocessor
(c) Ink/toner used in a computer printer.
(d) Magnetic coating on a recordable medium.
Answer-A


561  Which is the first temple in India to install terminals of online commodity exchanges to get commodities at market prices rather than through annual contracts involving fixed prices?
(a) Tirumala Tirupati Devasthana
m(b) Golden Temple, Amritsar
(c) Guruvayoor shrine in Kerala
(d) Jagannath Temple in Puri
Answer-A

562  What term is used to describe a person who spends plenty of time on line exploring the Internet?
(a) Netphile (b) Netizen
(c) Cybernaut (d) Cyberphile
Answer-C

563  You may also come across a term called "nethead"? What is it?
(a) A highly respected person in a Net community
(b) A person who is addicted to the Net
(c) The head of a Net community
(d) The Web Master
Answer-B

564  What is a person called who engages himself/herself in hacking activities with political or social agendas?
(a) Computerphile (b) Cracker
(c) Hacker (d) Hacktivist
Answer-D

565  When an attacker over the Net harasses a victim with threatening messages delivered through email or instant messaging or posted to a Web site or a discussion group, it is called
(a) Cyber squatting (b) Cyber terroris
m(c) Cyberwoozling (d) Cyber stalking
Answer-D


566  An employer would never like a cyber slacker. What does a cyber slacker do?
(a) She or he steals data from the organization's system and sells outside.
(b) She or he hates the IT tools and does everything manually or by old equipments.
(c) She or he uses organization's Internet connection during work hours to surf the Net, shop online, send personal emails, look for new jobs, etc.
(d) Uses company email to send anonymous messages to others.
Answer-C

567  Which netizen is called a 'lurker'?
(a) A person who restricts him-self/herself to receiving and reading articles or messages in a newsgroup or any other online discussion without contributing anything to the ongoing exchange.
(b) A person who tries to dominate an online discussion.
(c) A person who surfs the Net at breakneck speed.
(d) A netizen whose opinions are often offensive to other participants in an online discussion forum.
Answer-A

568  For the success of the initial public offering of a dot-corm, it is recommended that Net-wise individuals should combine with finance experts. The Net-wise individuals wear unconventional clothing and are not generally finance savvy. On the other hand, the finance people wear proper formal dresses and have the ability to convince the investors about the attractiveness of the offer. What expression describes this combination?
(a) Geeks and Suits (b) Fruits and Suits
(c) Fruits and Nuts (d) Digits and Numbers
Answer-B

569  Who is a blatherer in the cyber world?
(a) A user who types on-and-on while posting a message or chatting online.
(b) A heavy advertiser on the Net.
(c) A political propagandist on the Net.
(d) A user who uses SMS type languages even in formal emails,
Answer-A

570  What is the Chinese slang for a hacker?
(a) Rekcah (b) Cracker
(b) Honker (d) Recker
Answer-C


571  Which of the following would best describe the job of a cyber cop?
(a) A computer-savvy policeman.
(b) A security person who guards computer installations
(c) A person who is in charge of making systems safe from hackers
(d) A person who investigates criminal acts committed online, including fraud and harassment
Answer-D

572  When somebody has been 'dot-commed', what has happened to him/ her?
(a) Trapped by the promise of high salaries by a dot.com.
(b) Lost all investments made on a dot com.
(c) Lost hishe or her job due to the downsizing or failure of a dot com.
(d) Has made a killing on hishe or her investments made on a dotcom because of its success.
Answer-C

573  Who is a cyber tourist?
(a) A person who visits websites of tours and travel companies
(b) A person who stays in a website for few minutes only
(c) A person who goes online only on weekends and holidays
(d) A person who visits the websites of famous tourist destinations of the world
Answer-C

574  When somebody has been 'gatored' on the Net, she or he has become a victim of what?
(a) Cyber grapevine (b) Cyber warfare
(c) Hijackware program (d) Spyware
Answer-C

575  In Internet terminology, who is a troll?
(a) A person who posts inflammatory messages oil the Net. such as on online discussion forums, to disrupt the discussion or to upset its participants.
(b) A person who gets overwhelmed by the amount of information available on the Net.
(c) A person who makes a living by designing web sites for others.
(d) A user who opposes the pricing of any Internet content.
Answer-A


576  The term "cyberspace" refers to networked digital environments, especially advanced systems that produce an illusion of reality. Who coined this term in his book Neuromancer (1984)?
(a) Thomas Watson (b) Bill Gates
(c) William Gibson (d) Steven Spielberg
Answer-C

577  What term is used to describe the principles of courtesy to be used in sending electronic messages and other online postings?
(a) eEtiquette
(b) Netiquette
(c) Principles of Net Behavior
(d) Internet Best practices
Answer-B

578  In Internet etiquette, typing with all capital letters is considered rude. Why?
(a) It is stressful on the eyes.
(b) It looks ugly.
(c) It consumes more memory.
(d) It is the e-mail equivalent of shouting.
Answer-D

579  What is cyberpunk?
(a) A genre of near-future science fiction set in virtual-reality environments maintained on global computer networks.
(b) A Utopian land where everything is virtual
(c) A popular computer game
(d) Literature on computers and IT
Answer-A

580  Smiley and other characters used to express feelings in an e-mail communication are called
(a) Emoticons (b) Mailicons
(c) Digitrons (d) Neticons
Answer-A


581  What is 'turnip effect'?
(a) Rapid spread of Iiiternet
(b) Bottlenecks caused by heavy traffic over a communication system or network
(c) Increasing misuse of Internet by some people with its increasing popularity
(d) Availability of information to all at the fingertips due to the Net
Answer-B

582  All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B

583  A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A

584  ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B

585  A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A


586  The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C

587  Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C

588  ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B

589  Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A

590  Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A


591  ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A

592  ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D

593  ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D

594  The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B

595  Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B


596  After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B

597  Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C

598  Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D

599  In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D

600  The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C


601  A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B

602  A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C

603  A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C

604  ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A

605  The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C


606  All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D

607  Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A

608  All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B

609  The ____________, also called the “brains” of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RA
mD. central processing unit (CPU)
Answer: D

610  The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B


611  Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A

612  ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B

613  System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Answer: D

614  The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A

615  Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C


616  Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A

617  Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D

618  ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B

619  DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D

620  The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A


621  ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A

622  Which of the following is the correct order of the four major functions of a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Answer: D

623  ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Answer: A

624  The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Answer: B

625  A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C


626  ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The platfor
mB. The operating syste
mC. Application software
D. The motherboard
Answer: B

627  The operating system is the most common type of ____________ software.
A. communication
B. application
C. syste
mD. word-processing software
Answer: C

628  ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B

629  The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A

630  The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D


631  The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A
Fill in the Blank:

632  Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation.
Answer: Mac

633  The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input/output devices.
Answer: operating syste

m634  The type of operating system software you use depends on your computer’s ____________.
Answer: platfor

m635  ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet.
Answer: Application


636  ____________are the fastest and most expensive computers.
Answer: Supercomputers

637  A ____________ is approximately 1,000 bytes.
Answer: kilobyte

638  Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________.
Answer: instructions

639  A computer gathers data, processes it, outputs the data or information, and ____________ the data or information.
Answer: stores

640  The binary language consists of two digits: ____________ and ____________.
Answer: 0 and 1


641  A string of ____________ 0s and 1s is called a byte.
Answer: eight (8)

642  The devices you use to enter data into a computer system are known as ____________ devices.
Answer: input

643  The devices on a computer system that let you see the processed information are known as ____________ devices.
Answer: output

644  ____________ is the set of computer instructions or programs that enables the hardware to perform different tasks.
Answer: Software

645  When you connect to the ____________, your computer is communicating with a server at your Internet service provider (ISP).
Answer: Internet


646  ____________ are computers that excel at executing many different computer programs at the same time.
Answer: Mainframes

647  ____________is the application of computer systems and techniques to gather legal evidence.
Answer: Computer forensics

648  ____________ is the science that attempts to create machines that will emulate the human thought process.
Answer: Artificial intelligence (AI)

649  Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as an operating system.
Answer: Microsoft Windows

650  A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns.
Answer: data mining


651  Hard disk drives and CD drives are examples of ____________ devices.
Answer: storage

652  You would use ____________ software to create spreadsheets, type documents, and edit photos.
Answer: application

653  ____________ are computers that support hundreds or thousands of users simultaneously.
Answer: Mainframes

654  ____________ is the term given to the act of stealing someone’s identity and ruining their credit rating.
Answer: Identity theft

655  Surgeons are using ____________ to guide robots to perform delicate surgery.
Answer: computers


656  Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans.
Answer: simulators
True and False

657  Currently, the performance of tasks by robots is based on preprogrammed algorithms.
Answer: True

658  Data can be a number, a word, a picture, or a sound.
Answer: True

659  Strictly defined, a computer is a data processing device.
Answer: True

660  The discrepancy between the “haves” and “have-nots” with regard to computer technology is commonly referred to as the digital society.
Answer: False (digital divide)


661  One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to avoid viruses, the programs that pose threats to computer security.
Answer: True

662  Trend-spotting programs, developed for business, have been used to predict criminal activity.
Answer: True

663  Employers do not have the right to monitor e-mail and network traffic on employee systems used at work.
Answer: False

664  Clicking on an icon with the mouse is a form of giving an instruction to the computer.
Answer: True

665  Output devices store instructions or data that the CPU processes.
Answer: False (memory)


666  The CPU and memory are located on a special circuit board in the system unit called the motherboard.
Answer: True

667  Nanostructures represent the smallest human-made structures that can be built.
Answer: True

668  The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a few programs as quickly as possible, whereas mainframes are designed to handle many programs running at the same time (but at a slower pace).
Answer: True

669  Being computer fluent means that you should be able to build a computer yourself.
Answer: False

670  Embedded computers are self-contained computer devices that have their own programming and do not receive input.
Answer: True


671  A Web browser is a special device that is installed in your computer that allows it to communicate with other devices on a network.
Answer: False (network adapter)

672  With a wireless network, it is easier to relocate devices.
Answer: True

673  The most common type of memory that the computer uses to process data is ROM.
Answer: False (RAM)
Matching:

674  Match the following terms with their approximate size:
I. kilobyte A. one million bytes
II. byte B. eight bits
III. gigabyte C. one thousand bytes
IV. megabyte D. one billion bytes
V. terabyte E. one trillion bytes
Answer: C, B, D, A, E

675  Match the following terms with their meanings:
I. printer A. storage device
II. scanner B. output device
III. RAM C. input device
IV. CPU D. a type of memory
V. CD drive E. processor
Answer: B, C, D, E, A


676  Match the following terms with their meanings:
I. mainframe A. the most expensive computers that perform complex calculations extremely rapidly
II. supercomputer B. a computer that provides resources to other computers connected to a network
III. embedded computer C. a large, expensive computer that supports hundreds or thousands of users simultaneously
IV. PDA D. a self-contained computer device that usually performs preprogrammed functions such as temperature control
V. server E. a small mobile computing device
Answer: C, A, D, E, B

677  Match the following terms with their meanings:
I. software A. transforming data into information
II. hardware B. data that has been organized or presented in a meaningful fashion
III. operating system C. any part of the computer that you can physically touch
IV. processing D. a set of computer programs that enables hardware to perform different tasks
V. information E. the most common type of system software, it controls the way in which the computer system functions
Answer: D, C, E, A, B

678  Match the following terms with their meanings:
I. system software A. the set of programs that enables computer hardware devices and application software to work together
II. application software B. the kind of operating system software you will use depends on this
III. platform C. operating system software generally used on PCs
IV. Microsoft Windows D. a set of programs used to accomplish a specific task
V. Mac OS E. operating system software used on the Apple Macintosh
Answer: A, D, B, C, E

679  Match the following terms with their meanings:
I. data A. the main circuit board in the system unit
II. memory B. the representation of a fact or idea (unprocessed information)
III. output C. processed data or information
IV. storage D. holds instructions or data that the CPU processes
V. motherboard E. data or information that can be accessed again
Answer: B, D, C, E, A

680  Match the following terms with their meanings:
I. bit A. the science revolving around the use of nanostructures to build devices on an extremely small scale
II. binary language B. the case that contains the system components
III. instructions C. consists of 0s and 1s
IV. system unit D. short for binary digit
V. nanotechnology E. steps and tasks necessary to process data into usable information
Answer: D, C, E, B, A


681  Match the following fields to the related computer technology:
I. medicine A. Internet research and virtual tours
II. business B. data mining
III. law enforcement C. robotics and simulation
IV. education D. computer forensics
V. archeology E. digital recreations of ruins
Answer: C, B, D, A, E

682  If a word is typed that is not in Word’s dictionary, a____________wavy underline appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these
Ans : (A)

683  The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
Ans : (D)

684  In Excel, any set of characters containing a letter , hyphen, or space is considered—
(A) a formula
(B) text
(C) a name
(D) a title
(E) None of these
Ans : (B)

685  ____________Software allows users to perform calculations on rows and columns of data.
(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
(E) None of these
Ans : (C)


686  A ____________represent approximately one billion memory locations.
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (C)

687  ____________cells involves creating a single cell by combining two or more selected cells.
(A) Formatting
(B) Merging
(C) Embedding
(D) Splitting
(E) None of these
Ans : (B)

688  The operating system is the most common type of____________software.
(A) communication
(B) application
(C) syste
m(D) word-processing
(E) None of these
Ans : (C)

689  When you quickly press and releaes the left mouse button twice , you are—
(A) Primary-clicking
(B) pointing
(C) Double-clicking
(D) Secondary-clicking
(E) None of these
Ans : (C)

690  The horizontal and vertical lines on a worksheet are called—
(A) cells
(B) sheets
(C) block lines
(D) gridlines
(E) None of these
Ans : (D)


691  To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
(A) press the left mouse key
(B) double-click the right mouse key
(C) press the BACKSPACE key
(D) press the delete key
(E) None of these
Ans : (D)

692  The operating system does all of the following EXCEPT:
(A) provide a way for the user to interact with the computer.
(B) manage the central processing unit (CPU).
(C) manage memory and storage.
(D) enable users to perform a specific task such as document editing.
Ans : (D)

693  During the boot process, the____________looks for the system files.
(A) CD
B. BIOS
C. CPU
D. DVD
Ans : (B)

694  ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
Ans : (C)

695  ____________ is the ability of an operating system to control the activities of multiple programs at the same time.
(A) Multitasking
(B) Streamlining
(C) Multiuser
(D) Simulcasting
Ans : (A)


696  The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:
(A) action.
(B) event.
(C) interrupt.
(D) activity.
Ans : (C)

697  The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
(A) CPU
(B) slice of time
(C) stack
(D) event
Ans : (B)

698  The blocks of code, included in the operating system, that software applications interact with are known as:
(A) application programming interfaces (APIs).
(B) complimentary metal-oxide conductors (CMOS).
(C) device drivers.
(D) bootstrap loaders.
Ans : (A)

699  MS-DOS is a ____________ operating system.
(A) point-and-click
(B) user-friendly
(C) command-driven
(D) Mac
Ans : (C)

700  An interrupt handler is a(n):
(A) location in memory that keeps track of recently generated interrupts.
(B) peripheral device.
(C) utility program.
(D) special numeric code that indicates the priority of a request.
Ans : (D)


701  A spooler is a(n):
(A) location in memory that maintains the contents of a document until it prints out.
(B) print job.
(C) program that coordinates the print jobs that are waiting to print.
(D) message sent from the printer to the operating system when a print job is completed.
Ans : (C)

702  Virtual memory is typically located:
(A) on a floppy disk.
(B) in the CPU.
(C) in a flash card.
(D) on the hard drive.
Ans : (D)

703  The purpose of a swap (or page) file is to:
(A) maintain pages of documents that are being spooled to the printer.
(B) hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
(C) prevent thrashing in a multitasking environment.
(D) allow multiple print jobs to print their pages out simultaneously.
Ans : (B)

704  The definition of thrashing is:
(A) swapping data between virtual memory and RAM too frequently.
(B) insufficient hard disk space.
(C) too many processors being managed by the operating system.
(D) inaccurate information stored in the registry.
Ans : (A)

705  All of the following are TRUE of Safe Mode EXCEPT:
(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices.
Ans : (B)


706  Verification of a login name and password is known as:
(A) configuration.
(B) accessibility.
(C) authentication.
(D) logging in.
Ans : (C)

707  The combination of the operating system and the processor is referred to as the computer’s:
(A) CPU.
(B) platform.
(C) BIOS.
(D) CMOS.
Ans : (B)

708  The following message generally means:
(A) a nonsystem floppy has been left in the floppy disk drive.
(B) the CD drive is not functioning.
(C) the BIOS is corrupted.
(D) there is a problem loading a device.
Ans : (A)

709  Which of the following is the correct sequence of actions that takes place during the boot-up process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating syste
mAns : (B)

710  All of the following are steps involved in the boot process EXCEPT:
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs.
Ans : (D)


711  The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.
(A) BIOS
(B) API
(C) device driver
(D) supervisor progra
mAns : (A)

712  The basic input/output system (BIOS) is stored in:
(A) RAM.
(B) ROM.
(C) the CPU.
(D) the hard drive.
Ans : (B)

713  Ensuring that the essential peripheral devices are attached and operational is the ____________ process.
(A) configuration
(B) CMOS
(C) POST
(D) RO
mAns : (C)

714  The memory resident portion of the operating system is called the—
(A) registry.
(B) API.
(C) CMOS.
(D) kernel.
Ans : (D)

715  Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
Ans : (A)


716  All of the following are TRUE regarding virtual memory EXCEPT—
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive.
Ans : (A)

717  The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT:
(A) files.
(B) folders.
(C) drives.
(D) systems.
Ans : (D)

718  All of the following statements concerning windows are true EXCEPT—
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows.
Ans : (A)

719  All of the following statements concerning files are true EXCEPT—
(A) A file is a collection of related pieces of information stored together for easy reference.
(B) Files can be generated from an application.
(C) Files are stored in RAM.
(D) Files should be organized in folders.
Ans : (C)

720  Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(A) an open folder.
(B) the folder contains subfolders.
(C) a text file.
(D) a graphics file.
Ans : (B)


721  In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.
(A) List
(B) Thumbnails
(C) Details
(D) Icon
Ans : (C)

722  _________ is a powder used in laser printers to form the images on a paper.
Toner

723  Worms and Trojan Horses are examples of:
Malware

724  ___________ Printers work by selectively heating regions of special heat-sensitive paper.
Thermal

725 The ISI mark is given by:
BIS


726  The laser printer was invented at:
Xerox

727  A flaw in a system whereby the output is unexpectedly dependent on the sequence or timing of other events is called a:
Race condition

728  A 56k modem can transfer data at up to bits per second over the phone line.
56000

729  The original implementation of the C programming language was standardized by :
ANSI

730  ________Is a signaling method that handles a relatively wide range of frequencies.
Broadband


731  The port number used by SMTP is:
25

732  A packet filter is a type of
Firewall

733  Which among the following utilities can detect a bad sector?
CHKDSK and SCANDISK

734  In 100BASE-T, 'T' stands for:
Twisted pair

735  A head crash is said to occur when the read-write head of a hard disk drive:
Touches the magnetic media


736  Category 5 cable includes ---twisted pairs in a single cable jacket.
4

737  The port number used by the HTTP protocol is
80

738  In PowerPoint presentations, individual pages are called:
Slides

739  Power-on-self-test is built into the:
BIOS

740  PowerPoint can embed content from other applications through:
OLE


741  The latest release of Microsoft Windows is called:
Windows 7.0

742  GRUB is an:
Boot loader

743  __________Is a family of programmable interrupt controller chips.
8259

744 card allows television signals to be received by a computer.
TV tuner

745  ________Is an IEEE 1394 implementation.
Fire Wire


746  'Windows protection error' messages may result from:
Damage to the system registry

747  Sound Blaster line of audio cards were made by :
Creative Technology Ltd.

748  Indiscriminate sending of unsolicited bulk messages is known as :
Spamming

749  The 'blue screen of death' may occur due to:
All the above

750  FAT manages files in contiguous groups of sectors called:
Clusters


751  The utility which can be used to clean the windows registry is:
regedit

752  Ultra Wide SCSI had a throughput of: (A) 10 MB/s
40 MB/s

753  A dual-core processor has L1 cache.
2

754  Port 110 is used by _______
POP3

755  A file extension .ogg indicates an ______format
Audio codec


756  Kerberos is a__________protocol.
Network authentication

757  Athlon series of processors are made by:
AMD

758  Which among the following is a real-time operating system?
QNX

759  The internet top level domain .cn refers to :
China

760  _____________ Is a protocol used by networked computers (clients) to obtain IP addresses and other parameters from a server.
DHCP


761  is the brand name for 64-bit Intel microprocessors with IA-64 architecture.
Itaniu

m762  is an organization which develops internet standards through RFCs.
IETF

763  The ability to replace components of a computer, while it is operating, is called:
Hot swapping

764  IC chips used in computers are usually made of
(a) Lead
(b) Silicon
(c) Chromiu
m(d) Gold
The Correct option is – (b) Silicon

765  One kilobyte is equal to
(a) 1000 bytes
(b) 100 bytes
(c) 1024 bytes
(d) 1023 bytes
The Correct option is – (c) 1024 bytes


766  Which of the following is not an example of Operating System?
(a) Windows 98
(b) BSD Unix
(c) Microsoft Office XP
(d) Red Hat Linux
The Correct option is – (c) Microsoft Office XP

767  Which supercomputer is developed by the Indian Scientists?
(a) Para
m(b) Super 301
(c) Compaq Presario
(d) CRAY YMP
The Correct option is – (a) Para

m768  One Gigabyte is Approximately equal is
(a) 1000,000 bytes
(b) 1000,000,000 bytes
(c) 1000,000,000,000 bytes
(d) None of these
The Correct option is – (b) 1000,000,000 bytes

769  Check the odd term out
(a) Internet
(b) Linux
(c) Unix
(d) Windows
The Correct option is – (a) Internet

770  The errors that can be pointed out by the compiler are
(a) Syntax error
(b) Symantic error
(c) Logical error
(d) Internal error
The Correct option is-  (a) Syntax error


771  What is the control unit's function in the CPU
(a) To transfer data to primary storage .
(b) To store program instructions.
(c) To perform logic functions.
(d) To decode program instructions.
The Correct option is – (c) To perform logic functions.

772  What is the best way to have a data and the slide number appear on every slide?
(a) choose Tools, Header and Footer, click Slide tab, select the desired options, click Apply to All.
(b) choose Insert, Header and Footer, click Slide tab, select the desired options, click Apply to All.
(c) choose View, Header and Footer, click Slide tab, select the desired options, click Apply to All.
(d) choose File, Header and Footer, click Slide tab, select the desired options, click Apply to All.
The Correct option is – (b) choose Insert, Header and Footer, click Slide tab, select the desired options, click Apply to All.

773  What do you use to create a chart?
(a) Pie Wizard
(b) Excel Wizard
(c) Data Wizard
(d) Chart Wizard
The Correct option is – (d) Chart Wizard

774  A process known as ___________ is used by large retailers to study trends.
A. Data mining

775 The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. computer forensics


776  ____ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A : RFID

777  _______ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience

778  ______ is data that has been organized or presented in a meaningful fashion.
A. Information

779  The name for the way that computers manipulate data into information is called:
A. Processing.

780  _____ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Artificial intelligence (AI)


781  The term bit is short for:
A. binary digit.

782  A string of eight 0s and 1s is called a:
A. Byte.

783  ______ is any part of the computer that you can physically touch.
A. Hardware

784  The CPU and memory are located on the:
A. motherboard.

785  The ____, also called the “brain” of the computer, is responsible for processing
data.
A. CPU


786  _______ is a set of computer programs used on a computer to help perform tasks.
A.Software

787  System software is the set of programs that enables your computer’s hardware devices and ______ software to work together.
A. application

788  Servers are computers that provide resources to other computers connected to a:
A. network.

789 Who is credited with the creation of WWW
Answer : Tim Berners-Lee

790 Which of the following is not a web browser
Answer :HTML


791 MIME is associated with the following
Answer :E mail

792 The mode of communication in which transmission can be bidirectional. But in only one direction at a time is called
Answer :Half Duplex

793 Error detection at the data link layer is achieved using
Answer :CRC codes

794 In Serial communication, start and stop bits are used for
Answer :Synchronization

795 In a transmitter, the unmodulated signal is known as
Answer :Baseband signal


796 In a computer network, routing issues are handled in
Answer :Network Layer

797 In a computer network, functions of dialog management and synchronization are taken care of in the Answer :Session’s layer

798 Which of the following topologies has the highest reliability
Answer :Mesh

799 In data communications, bauds signify ———- rate
Answer :Signaling

800 ADSL is abbreviation for
Answer :Asymmetric Digital Subscriber Line


801 The topmost layer in the ISO model that needs to be implemented in an intermediate node is the ———–layer
Answer :Network

802 VPN denotes a
Answer :Virtual Private Network

803 Data rate of a ring network is 20Mbps and signal propagates at 200m/µsec. The number of bits that can be placed on the channel of length 200km is
Answer :20000bits

804 The frequency range over which coaxial cables are typically used is
Answer :106 to 108 Hz

805 In internet, the well known port 21 refers to the application
Answer :FTP


806 The maximum data rate possible through a noise free 4 kHz binary channel is
Answer :8000 bps

807 The transparency provided in a distributed system where users cannot tell how many copies of a resource exist is termed as
Answer :Replication transparency

808 Which of the following configurations can be said to be tightly coupled
Answer :Shared memory multiprocessors

809 In distributed systems, RPC stands for
Answer :Remote Procedure Call

810 Assume there are 4 file servers each with a 0.95 chance of being up at any instant. Probability of at least one being available is
Answer :1-(.05)4


811 Which of the following category of classification of multiple computer systems is not generally used in practice
Answer :MISD

812  In a distributed system, to ensure that concurrent transactions do not interfere with each other, the transactions must have the following specific property
Answer :Serializability

813 Translation Lookaside Buffer(TLB) is also called
Answer :Associative Memory

814 In Internet Standards Terminology, RFC refers to
Answer :Request For Comments

815  Which of the following denotes a network management protocol in an internet
Answer :SNMP


816 IEEE 802.11 is an IEEE standard for
Answer :Wireless LAN

817  Who takes the salute at the grand parade on Republic Day in New Delhi?
a) President
b) Prime Minister   
c) Governor   
d) Defence Minister
The correct answer is a) President

818  Who is popularly known as 'Father of Indian Constitution'?
a) Jawaharlal Nehru   
b) B.R. Ambedkar   
c) Mahatma Gandhi   
d) Bal Gangadhar Tilak
The correct answer is b) B.R. Ambedkar   

819  When did India adopt its Constitution?
a) 15th August 1947   
b) 20th February 1947   
c) 26th January 1950   
d) 9th December 1946
  
The correct answer is c) 26th January 1950

820  Which important human right is protected in Article 21 of the Constitution of India?
      
a) Right to Equality   
b) Right to Freedom of Religion   
c) Right to Freedom of Speech and Expression   
d) Right to life and liberty   
The correct answer is d) Right to life and liberty   


821  Who unfurls the National Flag in Republic Day ceremony in the state capitals?
      
a) Chief Minister   
b) Governor   
c) Deputy Chief Minister   
d) Finance Minister
The correct answer is b)  Governor

822  National Bravery Awards are given to children for their indispensable courage on .. ?
a) 26th January   
b) 15th August   
c) 14th November   
d) 2nd October   
The correct answer is a) 26th January

823 From which Constitution was the Concept of a Five Year Plan borrowed into the Indian Constitution?
a) USA   
b) USSR   
c) UK   
d) Ireland   
The correct answer is b) USSR

824  What is the provision of Article 155 of Indian Constitution?
a) Constitution of Supreme Court   
b) Right to Education   
c) Abolition of Untouchability   
d) Appointment of Governor   
The correct answer is d) Appointment of Governor

825  The Republic Day parade starts from …….
      
a) Red Fort   
b) India Gate   
c) Rashtrapati Bhavan   
d) Vijay Chowk
The correct answer is c) Rashtrapati Bhavan


826  The ceremony known as ‘Beating Retreat’ is held at…
a) Rashtrapati Bhavan   
b) Red Fort   
c) India Gate   
d) Vijay Chowk
The correct answer is d) Vijay Chowk

827  Census held on 2011 was the __________of Independent India?
(a) 11th
(b) 12th
(c) 15th
(d) 7th
The Correct option is –(c) 7th

828  The provisional figures of India’s largest Census 2011 were released in New Delhi on?
(a) 31st April 2011
(b) 4th August  2011
(c) 2nd May 2011
(d) 31st March 2011
The Correct option is – 31st March 2011

829  The provisional figures of India’s largest Census 2011 were released in New Delhi were released by?
(a) Union Home Secretary
(b) Prime Minister
(c) Ministry of health and family welfare
(d) None of the Above
The Correct option is – (a) Union Home Secretary

830  With President Pratibha Patil being the first citizen to be enumerated, followed by?
(a) Prime Minister Manmohan Singh
(b) Chief Justice of India S.H. Kapadia
(c) Vice President Hamid Ansari.
(d) None of the Above.
The correct option is – (c) Vice President Hamid Ansari


831  What was the estimated cost of Census 2011?
(a) 11 Billion Rupees
(b) 22 Billion Rupees
(c) 11 Million Rupees
(d) 1 Billion Rupees
The Correct option is – (b) 22 Billion Rupees

832  Number of total number States/Union territories recorded in Census 2011 was?
(a) 35
(b) 27
(c) 34
(d) 31
The Correct option is – (a) 35

833  Number of districts recorded in Census was?
(a) 640
(b) 740
(c) 840
(d) 550
The Correct option is – (a) 640

834  Which state according to the Census 2011 is most populous ?
(a) Uttar Pradesh
(b) Maharashtra
(c) Bihar
(d) West Bengal
The Correct option – (a) Uttar Pradesh

835  Which state/UT according to the Census 2011 is least populous?
(a) Daman and Diu
(b) Sikki
m(c) Lakshadweep
(d) A & N Islands
The Correct option is – (a) Daman and Diu


836  Which state has recorded the highest sex ratio in state?
(a) Kerala
(b) Mizora
m(c) Haryana
(d) Punjab
The Correct option is – (a) Kerala

837  India qualified for the Soccer World Cup in 1950 but were refused permission to take part; why?
(a) They didn’t have coach.
(b) They were not allowed to play on Political issues.
(c) The players were not permitted to play in bare feet.
(d) None of the Above
The Correct option is – (c) The players were not permitted to play in bare feet

838  The word 'anserine' relates to which type of birds?
(a) Geese
(b) Kingfisher
(c) Sparrow
(d) None of the Above
The Correct option is – (a) Geese

839  What year was Inheritance Tax introduced in the UK?
(a) 1988
(b) 1977
(c) 1986
(d) 1999
The Correct option is – (c) 1986

840  What is the art of Japanese flower arranging called?
(a) Feng Shui
(b) Ikebana
(c) Florabana
(d) None of the Above
The Correct option is – (b) Ikebana


841  Which artist sculpted the lions at the foot of London's Nelson's Column?
(a) Sir Edwin Henry
(b) Sir Leopold
(c) Lord Henry IIIrd
(d) None of the Above
The Correct option is – (a) Sir Edwin Henry

842  In 1983 which film did Barbra Streisand co-write, direct, produce and star in?
(a) Terminator
(b) Aliens
(c) Star Wars 6
(d) Yentl
The Correct option is – (d) Yentl

843  If an object is hastate what shape is it?
(a) Circular
(b) Square
(c) Rectangular
(d) Triangular
The Correct option is – (d) Triangular

844  Which country had the first Women's Institute, in 1897?
(a) Australia
(b) Canada
(c) Great Britain
(d) Japan
The Correct option is – (b) Canada

845  Haldi is the Indian name for which spice?
(a) Coriander
(b) Star anise
(c) Turmeric
(d) Asafoetida
The Correct option is – (a) Coriander


846  Which US organization’s headquarters is situated in Langley, Virginia?
(a) NIA
(b) Interpol
(c) CIA
(d) None of the Above
The Correct option is – (c) CIA

847  Which of the following is an absolute cell reference?
a. !A!1
b. $A$1
c. #a#1
d. A1
Correct Answer: b

848  What symbol is used before a number to make it a label?
a. “ (quote)
b. = (equal)
c. _ (underscore)
d. ‘ (apostrophe)
Correct Answer: b

849  Which symbol must all formula begin with?
a. =
b. +
c. (
d. @
Correct Answer: a

850  Which of the following formulas is not entered correctly?
a. =10+50
b. =B7*B1
c. =B7+14
d. 10+50
Correct Answer: d


851  Which of the following formulas will Excel Not be able to calculate?
a. =SUM(Sales)-A3
b. =SUM(A1:A5)*.5
c. =SUM(A1:A5)/(10-10)
d. =SUM(A1:A5)-10
Correct Answer: a

852  A typical worksheet has …. Number of columns
a. 128
b. 256
c. 512
d. 1024
Correct Answer: b

853  How many characters can be typed in a single cell in Excel?
a. 256
b. 1024
c. 32,000
d. 65,535
Correct Answer: d

854  A worksheet can have a maximum of …. Number of rows
a. 256
b. 1024
c. 32,000
d. 65,535
Correct Answer: d

855  Which of the following is not an example of a value?
a. 350
b. May 10, 2001
c. 57%
d. Serial Number 50771
Correct Answer: d


856  The chart wizard term data series refers to
a. A chart legend
b. A collection of chart data markers
c. A set of values you plot in a chart
d. A data label
Correct Answer: b

857  The Chart wizard term data categories refers to;
a. A chart plot area
b. A horizontal axis
c. The organization of individual values with a chart’s data series
d. The data range that supply chart data
Correct Answer: b

858  A worksheet range is a
a. A command used for data modeling
b. A range of values such as from 23 to 234
c. A group of cells
d. A group of worksheets
Correct Answer: c

859  Getting data from a cell located in a different sheet is called …
a. Accessing
b. Referencing
c. Updating
d. Functioning
Correct Answer: b

860  Tab scrolling button
a. Allow you to view a different worksheet
b. Allow you to view additional worksheet rows down
c. Allow you to view additional worksheet columns to the right
d. Allow you to view additional sheets tabs
Correct Answer: d


861  A numeric value can be treated as a label value if it proceeds with
a. Apostrophe (&lsquo
b. Exclamation (!)
c. Hash (#)
d. Ampersand (&
Correct Answer: a

862  Concatenation of text can be done using
a. Apostrophe (
b. Exclamation (!)
c. Hash (#)
d. Ampersand (&
Correct Answer: d

863  Data can be arranged in a worksheet in a easy to understand manner using
a. auto formatting
b. applying styles
c. changing fonts
d. all of above
Correct Answer: d

864  You can use drag-and-drop to embed excel worksheet data in a word document
a. By dragging a range of excel data to the word button on the taskbar while pressing the Ctrl key
b. By dragging a range of excel data to the word button on the taskbar while pressing Shift key
c. By dragging a range of excel data to the word button on the taskbar while pressing Alt key
d. None of above
Correct Answer: a

865  The auto calculate feature
a. Can only add values in a range of cells
b. Provides a quick way to view the result of an arithmetic operation on a range of cells
c. Automatically creates formulas and adds them to a worksheet
d. A and c
Correct Answer: b


866  Excel uniquely identifies cells within a worksheet with a cell name
a. Cell names
b. Column numbers and row letters
c. Column letters and row numbers
d. Cell locator coordinates
Correct Answer: c

867  to view a cell comment
a. click the edit comment command on the insert menu
b. click the display comment command on the window menu
c. position the mouse pointer over the cell
d. click the comment command on the view menu
Correct Answer: c

868  When you want to insert a blank imbedded excel object in a word document you can
a. Click the object command on the insert menu
b. Click the office links button on the standard toolbar
c. Click the create worksheet button on the formatting toolbar
d. Click the import excel command on the file menu
Correct Answer: a

869  To save a workbook, you:
a. Click the save button on the standard toolbar from the menu
b. Press Ctrl+F5
c. Click Save on the Windows Start button
d. Select Edit>Save
Correct Answer: a

870  You can edit a cell by
a. Clicking the formula button
b. Double clicking the cell to edit it in-place
c. Selecting Edit>Edit Cell from the menu
d. None of above
Correct Answer: b


871  You can select a single range of cells by
a. Clicking the upper-left cell in a group of cells and then pressing the Shift key while clicking the lower right cell in a group of cells
b. Pressing the Ctrl key while dragging over the desired cells
c. Pressing the Shift key and an arrow key
d. Dragging over the desired cells
Correct Answer: d

872  Which elements of worksheet can be protected from accidental modification
a. Contents
b. Objects
c. Scenarios
d. All of above
Correct Answer: d

873  You can use the drag and drop method to
a. Copy cell contents
b. Move cell contents
c. Add cell contents
d. a and b
Correct Answer: d

874  It is acceptable of let long text flow into adjacent cells on a worksheet when
a. Data will be entered in the adjacent cells
b. No data will be entered in the adjacent cells
c. There is nt suitable abbreviation of the text
d. Tehere is not time to format the next
Correct Answer: b

875  How can you delete a record?
a. Delete the column from the worksheet
b. Select Data > Form from the menu to open the Data Form dialog box, find the record andClick the Delete button
c. Select Data > Delete Record from the menu
d. Click the Delete button on the Standard toolbar
Correct Answer: b


876  Right clicking something in Excel:
a. Deletes the object
b. Nothing the right mouse button is there for left handed people
c. Opens a shortcut menu listing everything you can do to the object
d. Selects the object
Correct Answer: c

877  Documentation should include
a. Destination and users of the output data
b. Source of input data
c. Information on the purpose of the workbook
d. All of the above
Correct Answer: d

878  Files created with Lotus 1-2-3 have an extension
a. DOC
b. XLS
c. 123
d. WK1
Correct Answer: c

879  To delete an embedded objects, first
a. Double click the object
b. Select the object by clicking it
c. Press the Shift + Delete keys
d. Select it and then press the delete key
Correct Answer: d

880  Comments can be added to cells using
a. Edit > Comments
b. Insert > Comments
c. File > Comments
d. View > Comments
Correct Answer: b


881  Which of the following is not a worksheet design criterion?
a. Efficiency
b. Aditibility
c. Description
d. Clarity
Correct Answer: c

882  To copy cell contents using drag and drop press the
a. End key
b. Shift key
c. Ctrl key
d. Esc key
Correct Answer: d

883  Which of the following is the latest version of Excel
a. Excel 2000
b. Excel 2002
c. Excel ME
d. Excel XP
Correct Answer: d

884  When you copy a formula
a. Excel erases the original copy of the formula
b. Excel edits cell references in the newly copied formula
c. Excel adjusts absolute cell references
d. Excel doesn’t adjust relative cell references
Correct Answer: b

885  The autofill feature
a. extends a sequential series of data
b. automatically adds range of cell values
c. applies a boarder around the selected cells
d. none of the above
Correct Answer: d


886  Which menu option can be ued to split windows into two
a. Format > window
b. View > window > split
c. Window > split
d. View > split
Correct Answer: c

887  Which of the following methods cannot be used to enter data in a cell
a. Pressing an arrow key
b. Pressing the Tab key
c. Pressing the Esc key
d. Clicking on the formula bar
Correct Answer: c

888  Which of the following will not cut information?
a. Pressing Ctrl + C
b. Selecting Edit>Cut from the menu
c. Clicking the Cut button on the standard
d. Pressing Ctrl+X
Correct Answer: a

889  Which of the following is not a way to complete a cell entry?
a. Pressing enter
b. Pressing any arrow key on the keyboard
c. Clicking the Enter button on the Formula bar
d. Pressing spacebar
Correct Answer: d

890  You can activate a cell by
a. Pressing the Tab key
b. Clicking the cell
c. Pressing an arrow key
d. All of the above
Correct Answer: d


891  Text formulas:
a. Replace cell references
b. Return ASCII values of characters
c. Concatenate and manipulate text
d. Show formula error value
Correct Answer: c

892  How do you insert a row?
a. Right-click the row heading where you want to insert the new row and select Insert from the shortcut menu
b. Select the row heading where you want to insert the new row and select Edit >Row from the menu
c. Select the row heading where you want to insert the new row and click the Insert Row button on the standard toolbar
d. All of the above
Correct Answer: a

893  Which of the following is not a basic step in creating a worksheet?
a. Save workbook
b. Modifiy the worksheet
c. Enter text and data
d. Copy the worksheet
Correct Answer: d

894  How do you select an entire column?
a. Select Edit > Select > Column from the menu
b. Click the column heading letter
c. Hold down the shift key as you click anywhere in the column.
d. Hold down the Ctrl key as you click anywhere in the column
Correct Answer: b

895  How can you print three copies of a workbook?
a. Select File>Properties form the menu and type 3 in the Copies to print text box.
b. Select File >Print from the menu and type 3 in the Number of copies text box.
c. Click the Print button on the standard toolbar to print the document then take it to Kinko’s and have 2 more copies made
d. Press Ctrl+P+3
Correct Answer: b


896  To create a formula, you first:
a. Select the cell you want to place the formula into
b. Type the equals sign (=) to tell Excel that you’re about to enter a formula
c. Enter the formula using any input values and the appropriate mathematical operators that make up your formula
d. Choose the new command from the file menu
Correct Answer: a

897  To center worksheet titles across a range of cells, you must
a. Select the cells containing the title text plus the range over which the title text is to be centered
b. Widen the columns
c. Select the cells containing the title text plus the range over which the title text is to be enfettered
d. Format the cells with the comma style
Correct Answer: a

898  How do you delete a column?
a. Select the column heading you want to delete and select the Delete Row button on the standard toolbar
b. Select the column heading you want to delete and select Insert Delete from the menu
c. Select the row heading you want to delete and select Edit>Delete from the menu
d. Right click the column heading you want to delete and select delete from the shortcut menu
Correct Answer: d

899  How can you find specific information in a list?
a. Select Tools > Finder from the menu
b. Click the Find button on the standard toolbar
c. Select Insert > Find from the menu
d. Select Data > Form from the menu to open the Data Form dialog box and click the Criteria button
Correct Answer: d

900  When integrating word and excel, word is usually the
a. Server
b. Destination
c. Client
d. Both b and c
Correct Answer: d


901  When a label is too long to fit within a worksheet cell, you typically must
a. Shorten the label
b. Increase the column width
c. Decrease the column width
d. Adjust the row height
Correct Answer: b

902  The name box
a. Shows the location of the previously active cell
b. Appears to the left of the formula bar
c. Appears below the status bar
d. Appears below the menu bar
Correct Answer: b

903  Comments put in cells are called
a. Smart tip
b. Cell tip
c. Web tip
d. Soft tip
Correct Answer: b

904  Which is used to perform what if analysis?
a. Solver
b. Goal seek
c. Scenario Manager
d. All of above
Correct Answer: d

905  You can use the horizontal and vertical scroll bars to
a. Split a worksheet into two panes
b. View different rows and columns edit the contents of a cell
c. Edit the contents of a cell
d. view different worksheets
Correct Answer: b


906  Multiple calculations can be made in a single formula using
a. standard formulas
b. array formula
c. complex formulas
d. smart formula
Correct Answer: b

907  Hyperlinks can be
a. Text
b. Drawing objects
c. Pictures
d. All of above
Correct Answer: d

908  To activate the previous cell in a pre-selected range, press
a. The Alt key
b. The Tab key
c. The Enter key
d. None of the above
Correct Answer: d

909  Which button do you click to add up a series of numbers?
a. The auto sum button
b. The Formula button
c. The quicktotal button
d. The total button
Correct Answer: a

910  When the formula bar is active, you can see
a. The edit formula button
b. The cancel button
c. The enter button
d. All of the above
Correct Answer: d


911  To copy formatting from one area in a worksheet and apply it to another area you would use:
a. The Edit>Copy Format and Edit>Paste Format commands form the menu.
b. The Copy and Apply Formatting dialog box, located under the Format>Copy and Apply menu.
c. There is no way to copy and apply formatting in Excel – You have to do it manually
d. The Format Painter button on the standard toolbar
Correct Answer: d

912  In a worksheet you can select
a. The entire worksheet
b. Rows
c. Columns
d. All of the above
Correct Answer: b

913  When you link data maintained in an excel workbook to a word document
a. The word document can not be edit
b. The word document contains a reference to the original source application
c. The word document must contain a hyperlink
d. The word document contains a copy of the actual data
Correct Answer: b

914  Which area in an excel window allows entering values and formulas
a. Title bar
b. Menu bar
c. Formula bar
d. Standard toolbar
Correct Answer: c

915  To hold row and column titles in place so that they do not scroll when you scroll a worksheet click the
a. Unfreeze panes command on the window menu
b. Freeze panes command on the window menu
c. Hold titles command on the edit menu
d. Split command on the window menu
Correct Answer: b


916  To edit in an embedded excel worksheet object in a word document
a. Use the excel menu bar and toolbars inside the word application
b. Edit the hyperlink
c. Edit the data in a excel source application
d. Use the word menu bar and toolbars
Correct Answer: a

917  To create a formula, you can use:
a. Values but not cell references
b. C ell references but not values
c. Values or cell references although not both at the same time
d. Value and cell references
Correct Answer: d

918  Status indicators are located on the
a. Vertical scroll bar
b. Horizontal scroll bar
c. Formula bar
d. Standard toolbar
Correct Answer: c

919  Which of the following is the oldest spreadsheet package?
a. VisiCalc
b. Lotus 1-2-3
c. Excel
d. StarCalc
Correct Answer: a

920  Rounding errors can occur
a. When you use multiplication, division, or exponentiation in a formula
b. When you use addition and subtraction in a formula
c. Because excel uses hidden decimal places in computation
d. When you show the results of formulas with different decimal places that the calculated results
Correct Answer: a


921  You can copy data or formulas
a. With the copy, paste and cut commands on the edit menu
b. With commands on ta shortcut menu
c. With buttons on the standard toolbars
d. All of the above
Correct Answer: d

922  You can not link excel worksheet data to a word document
a. With the right drag method
b. With a hyperlink
c. With the copy and paste special commands
d. With the copy and paste buttons on the standard toolbar.
Correct Answer: d

923  Which of the following is a popular DOS based spreadsheet package?
a. Word
b. Smart cell
c. Excel
d. Lotus 1-2-3
Correct Answer: d

924  An excel workbook is a collection of
a. Workbooks
b. Worksheets
c. Charts
d. Worksheets and charts
Correct Answer: d

925  Excel files have a default extension of
a. Xls
b. Xlw
c. Wk1
d. 123
Correct Answer: a


926  You can use the format painter multiple times before you turn it off by
a. You can use the format painter button on ly one time when you click it
b. Double clicking the format painter button
c. Pressing the Ctrl key and clicking the format painter button
d. Pressing the Alt key and clicking the format painter button
Correct Answer: b

927     What function displays row data in a column or column data in a row?
a.   Hyperlink
b.   Index
c.   Transpose
d.   Rows
Correct Answer: c

928     When you insert an Excel file into a Word document, the data are
a.   Hyperlinked
b.   Placed in a word table
c.   Linked
d.   Embedded
Correct Answer: b. Placed in a word table

929     Except for the …… function, a formula with a logical function shows the word “TRUE” or “FALSE” as a result
a.   IF
b.   AND
c.   OR
d.   NOT
Correct Answer: a

930     Macros are “run” or executed from the ….. menu.
a.   Insert
b.   Frmat
c.   Tools
d.   Data
Correct Answer: c


931     You can open the consolidate dialog box by choosing Consolidate from the ….. menu.
a.   Insert
b.   Format
c.   Tools
d.   Data
Correct Answer: d

932     Each excel file is called a workbook because
a.   It can contain text and data
b.   It can be modified
c.   It can contain many sheets including worksheets and chart sheets
d.   You have to work hard to create it
Correct Answer: c

933     Which types of charts can excel produce?
a.   Line graphs and pie charts only
b.   Only line graphs
c.   Bar charts, line graphs and pie charts
d.   Bar charts and line graphs only
Correct Answer: c

934     How are data organized in a spreadsheet?
a.   Lines and spaces
b.   Layers and planes
c.   Rows and columns
d.   Height and width
Correct Answer: c

935     What does the VLOOKUP function do?
a.   Looks up text that contain ‘v’
b.   Checks whether text is the same in one cell as in the next
c.   Finds related records
d.   All of above
Correct Answer: c


936     Gridlines
a.   May be turned off for display but turned on for printing
b.   May be turned on or off for printing
c.   The be turned off for display and printing
d.   a, b and c
Correct Answer: d

937     You can activate a cell by
a.   Pressing the Tab key
b.   Clicking the cell
c.   Pressing an arrow key
d.   All of above
Correct Answer: d

938     Which of the following setup options can not be set in the page setup dialog box?
a.   Printer selection
b.   Vertical or horizontal placement
c.   Orientation
d.   Row and column titles
Correct Answer: a

939    What term refers to a specific set of values saved with the workbook?
a.   Range
b.   Scenario
c.   Trend line
d.   What-if analysis
Correct Answer: b

940     Got functions? No? You need the insert function dialog box. How do you get it?
e.   Right click a cell and then click insert
f.    Click the insert menu and then click function
g.   Type = in a cell
h.   All of the above
Correct Answer: b


941     Which of the following describes how to select all the cells in a single column?
a.   Right click on column and select Pick from list
b.   Use data – text to columns menu ite
mc.   Left click on the gray column title button
d.   Pressing Ctrl + A on the keyboard
Correct Answer: c

942     when you use the fill effects in the format data series dialog box, you can not
a.   rotate text on the chart
b.   select a fore ground color
c.   select a pattern
d.   select a background color
Correct Answer: a

943     Paper spreadsheets can have all the same advantages as an electronic spreadsheet except which of the following?
a.   Rows and columns
b.   Headings
c.   Speed
d.   None
Correct Answer: c

944     Which of the following is not a basic step in creating a worksheet?
a.   Save the workbook
b.   Modify the worksheet
c.   Enter text and data
d.   Copy the worksheet
Correct Answer: d

945     What’s a quick way to extend these numbers to a longer sequence, for instance 1 through 20?
a.   Select both cells, and then drag the fill handle over the range you want, for instance 18 more rows
b.   Select the range you want, include both cells, point to fill on the Edit menu, and then click down.
c.   Copy the second cell, click in the cell below it, on the standard toolbar click the down arrow on the Paste button, and then click Paste Special
d.   All of above
Correct Answer: a


946     To insert three columns between columns D and E you would
a.   Select column D
b.   Select column E
c.   Select columns E, F and G
d.   Select columns D, E, and F.
Correct Answer: b

947     To center worksheet titles across a range of cell, you must
a.   Select the cells containing the title text and use the fill handle to center the text across a range of cells
b.   Widen the columns
c.   Select the cells containing the title text and use the fill handle to center the text across a range of cells
d.   Widen the column
Correct Answer: a.

948     When integrating Ms-Word and Excel, Word is usually the
a.   Server
b.   Source
c.   Client
d.   None
Correct Answer: c. Client

949     Charts tips can
a.   Show the formatting of a data label
b.   Show the name of a data series
c.   Show the value of data point
d.   b and c
Correct Answer: d

950     The Name box
a.   Shows the location of the previously active cell
b.   Appears t the left of the formula bar
c.   Appears below the status bar
d.   Appears below the menu bar
Correct Answer: b


951     How do you change column width to fit the contents?
a.   Single-click the boundary to the left to the column heading
b.   Double click the boundary to the right of the column heading
c.   Press Alt and single click anywhere in the column
d.   All of above
Correct Answer: b

952     when you work with large worksheets, you may need to
a.   size the worksheet to fit on the specific number of pages
b.   add and remove page breaks
c.   specify only certain print areas
d.   all of above
Correct Answer: d

953     Hyperlinks cannot be
a.   Special shapes like stars and banners
b.   Drawing objects like rectangles ovals
c.   Pictures
d.   All can be hyperlinks
Correct Answer: d. All can be hyperlinks

954     You can use the horizontal and vertical scroll bars to
a.   Split a worksheet into two panes
b.   View different rows and columns
c.   Edit the contents of a cell
d.   View different worksheets
Correct Answer: b

955     What do we call a computer program that organizes data in rows and columns of cells? You might use this type of program to keep a record of the money you earned moving lawns over the summer.
a.   Spreadsheet progra
mb.   Database progra
mc.   Word processor progra
md.   Desktop publisher progra
mCorrect Answer: A


956     You can add an image to a template by clicking the Insert Picture From File button on the …. Toolbar.
a.   Standard
b.   Formatting
c.   Drawing
d.   Picture
Correct Answer: d

957     To drag a selected range of data to another worksheet in the same workbook, use the
a.   Tab key
b.   Alt key
c.   Shift key
d.   Ctrl key
Correct Answer: d

958     When creating a vertical page break
a.   The active cell must be A1
b.   The active cell can be anywhere in the worksheet
c.   The active cell must be in row 1
d.   The active cell must be in column A
Correct Answer: c

959     to activate the previous cell in a pre-selected range, press
a.   the Alt key
b.   the Tab key
c.   the Enter key
d.   none of above
Correct Answer: d

960     When the formula bar is activated, you can see
a.   The Edit Formula button
b.   The Cancel button
c.   The Enter button
d.   All of above
Correct Answer: d


961     In a worksheet you can select
a.   The entire worksheet
b.   Rows
c.   Columns
d.   a, b, and c
Correct Answer: d

962     when you print preview a worksheet
a.   the entire worksheet is displayed
b.   the selected range is displayed
c.   the active portion of the worksheet is displayed
d.   a, b and c
Correct Answer: d

963     You can group noncontiguous worksheets with
a.   The group button on the standard toolbar
b.   The shift key and the mouse
c.   The ctrl key and mouse
d.   The alt+enter key
Correct Answer: c

964     Weight refers to
a.   The print density of characters
b.   The height of the printed character
c.   Upright or slanted shape
d.   The design and appearance of characters
Correct Answer: a

965     When you link data maintained in Excel workbook to a Word document
a.   The Word document cannot be edited
b.   The Word document contains a reference to the original source application
c.   The word document must contain a hyperlink
d.   The word document contains a copy of the actual data
Correct Answer: b. The Word document contains a reference to the original source application


966     When you see a cell with a red triangle in the top right corner, what does this signify?
a.   There is an error in the cell
b.   There is a comment associated with the cell
c.   The font color for text in the cell is red
d.   A formula cannot be entered into the cell
Correct Answer: b

967     To hold row and column titles in places so that they do not scroll when you scroll a worksheet, click the
a.   Unfreeze panes command on the window menu
b.   Freeze panes command on the window menu
c.   Hold titles command on the edit menu
d.   Split command on the window menu
Correct Answer: b

968     Which of these is a quick way to copy formatting from a selected cell to two other cells on the same worksheet?
a.   Use Ctrl to select all three cells, then click the paste button on the standard toolbar
b.   Copy the selected cell, then select the other two cells, click style on the Format menu, then click Modify
c.   Click format painter on the Formatting toolbar twice then click in each cell you want to copy the formatting to
d.   All of above
Correct Answer: c

969     To edit data in an embedded Excel worksheet object in a Word document
a.   Use the Excel menu bar and toolbars inside the word application
b.   Edit the hyperlink
c.   Edit the data in a Excel source application
d.   Use the Word menu bar and toolbars
Correct Answer: a. Use the Excel menu bar and toolbars inside the word application

970     Status indicators are located on the
a.   Vertical scroll bar
b.   Horizontal scroll bar
c.   Formula bar
d.   Formatting toolbar
Correct Answer: c


971     You can open the scenario Manager dialog box by choosing scenarios from the ….. menu.
a.   View
b.   Insert
c.   Format
d.   Tools
Correct Answer: d

972     You can open the Sort dialog box by choosing Sort from the ….. menu
a.   View
b.   Format
c.   Tools
d.   Data
Correct Answer: d

973     when working in the page break preview, you can
a.   view exactly where each page break occurs
b.   add or remove page breaks
c.   change the print area
d.   all of above
Correct Answer: d

974     A data map is helpful
a.   When you have too much data to chart
b.   To show a geographic distribution of data
c.   To compare data points
d.   To show changes in data over time
Correct Answer: b

975     Rounding errors can occur
a.   When you use multiplication, division or exponentiation in a formula
b.   When you use addition and subtraction in a formula
c.   Because Excel uses hidden decimal places in computation
d.   When you show the results of formulas with different decimal places than the calculated results
Correct Answer: a


976     You can copy data or formulas
a.   With the copy, paste and cut commands on the edit menu
b.   With commands on a shortcut menu
c.   With buttons on the standard toolbar
d.   All of the above
Correct Answer: d

977     You can zoom a worksheet
a.   With the mouse pointer in Print Preview
b.   With the zoom button on the Print Preview toolbar
c.   With the Zoom command on the view menu
d.   All of the above
Correct Answer: d

978     You can not link Excel worksheet data to a Word document
a.   With the right drag method
b.   With a hyperlink
c.   With the copy and paste special commands
d.   With the copy and paste buttons on the standard toolbar
Correct Answer: d. With the copy and paste buttons on the standard toolbar

979     This type of software is similar to an accountant’s worksheet
a.   Word processing
b.   Database
c.   Spreadsheets
d.   Graphics
Correct Answer: c

980     which function will calculate the number of workdays between 6/9/2004 and 8/12/2004?
a.   Workday
b.   Date
c.   Networkdays
d.   All of the above
Correct Answer: d


981     Data marker on a chart are linked to data points in a worksheet, therefore,
a.   You can automatically apply formatting to a data series
b.   You can change the position of a data marker and automatically change the data point value in the worksheet
c.   You can change a data print value and automatically are draw the chart
d.   a and b
Correct Answer: b

982     When you group worksheets
a.   You can enter variable data on multiple worksheets at one time
b.   You can print more than one worksheet at a time
c.   You can enter common data, formats, and formulas on multiple worksheets at one time
d.   b, and c
Correct Answer: d

983     You can use the format painter multiple times before you turn it off by
a.   You can use the format painter button only one time when you click it
b.   Double clicking the format painter button
c.   Pressing the Ctrl key and clicking the format painter button
d.   Pressing Alt key and clicking the format painter button
Correct Answer: b

984     The default header for a worksheet is
a.   Your name
b.   The date and time
c.   None
d.   The sheet tab name
Correct Answer: c

985   
A parallel port is most often used by
(A) Mouse     (B) Monitor
(C) Printer     (D) Keyboard
Ans: C


986   
Blue tooth technology allows:
(A)
Landline phone to mobile phone communication
(B)
Wireless communication between equipments
(C)
Signal transmission on mobile phones only
(D)
Satellite television communication
Ans: B

987   
Which of the following is an example of an optical disk?
(A) Memory disk      (B) Magnetic disk
(C) Hard disk      (D
) Digital versatile disk
Ans: D

988   
Which of the following is(are) an example of storage devices?
(A) Tapes               (B) DVDs
(C) Magnetic disks      (D) All of these
Ans: D

989   
IC chips used in computers are made of
(A) Silicon      (B) Chromium
(C) Lead           (D) Silver
Ans: A

990   
Which of the following is not an example of Operating System?
(A) Microsoft Office     (B) Windows Vista
(C) Unix           (D) Ubuntu Linux
Ans: A


991   
Which supercomputer is developed by the Indian Scientists?
(A) Sequoia      (B) Param
(C) Mira      (D) Jaguar
Ans: B

992   
'OS' in computer system means ?
(A) Open System         (B) Open Software
(C) Operating System     (D) All of these
Ans: C

993   
'.MOV' extension refers to:
(A) Word file     (B) Text file
(C) Image file (D) Movie file
Ans: D

994   
'.MPG' extension refers to:
(A) Word file     (B) Text file
(C) Image file (D) Movie file
Ans: D

995   
'.INI' extension refers to:
(A) Image file (B) System file
(C) Movie file (D) Word file
Ans: B


996   
Select the odd term out?
(A) Windows        (B) Linux
(C) Unix      (D) Internet
Ans: D

997   
What is the full form of WWW in Internet?
(A) World Wide Web     (B) World Wide Word
(C) World Wide Wood     (D) None of these
Ans: A

998   
Which Command is used to reboot the computer?
(A) Ctrl+Shift+Del 
   (B) Ctrl+Del+End
(C) Ctrl+Alt+Del       (D) Both (A) and (C)
Ans: C

999   
The blinking symbol on the computer screen:
(A) Mouse          (B) Cursor
(C) Character     (D) Blinker
Ans: B

1000  
Which of the following refers to a small local network?
(A) LAN  (B) WAN
(C) MAN  (D) SLN
Ans: A
1 2 3
Computer GK, 1500 Questions answers, Part 2 Computer GK, 1500 Questions answers, Part 2 Reviewed by vishal on November 18, 2018 Rating: 5

1 comment:

  1. computermobile.info - We all use computers and smartphones in our work and personal lives. It becomes frustrating when the machines do not work as expected. Computermobile.info is an educational website helps us solve software, hardware, network, internet or security issues we may encounter while using these devices. The website provides a brief introduction to the software or hardware system before launching detailed solutions. The website provides step-by-step instructions with accompanying screenshots are easy to understand and follow. The website touches upon the vast
    field of computer science, giving us an excellent overview of various topics. For More Visit: Computer Mobile Info

    ReplyDelete

Recent Posts

recentposts
Powered by Blogger.