Computer GK, 1500 Questions answers, Part 2
501 Which search engine's search robot is known as 'Scooter'?
(a) AltaVista (b) Google
(c) Yahoo! Search (d) Ask.com.
Answer-A
502 Which is the first ever search engine to be developed?
(a) Archie (b) Jughead
(c) Veronica (d) Lycos
Answer-A
503 Which search engine uses its proprietary PageRank algorithm to list web pages according to popularity?
(a) AltaVista (b) Google
(c) Yahoo (d) Ask.com.
Answer-B
504 This advanced search mechanism, included in Macintosh O/S, has the ability to search multiple Internet search engines simultaneously. By what name is it known as?
(a) Sherlock (b) Holmes
(c) Agatha (d) Bond
Answer-A
505 In 2002, which search engine manipulator filed a lawsuit against Google alleging that its tactics to prevent spamdexing constituted unfair business practice? The judgment ultimately went in Google's favor
(a) Search King (b) Googly.co
m(c) SearchGuild.com (d) DarkBlue.co
mAnswer-A
506 What is spider food?
(a) The algorithm used by search engines or spiders
(b) Embedded key words, usually invisible, in a web page
(c) A bait for a spammer
(d) Web pages left out inadvertently by a spider in response to a search request
Answer-B
507 This is a practice whereby some website owners deliberately and dishonestly manipulate search engines to increase the chance of their website or page being placed close to the beginning of search engine results or to influence the category to which the page is assigned. What is this practice called?
(a) Search engine fine-tuning
(b) Search engine warming
(c) Revving the search engine
(d) Spamdexing
Answer-D
508 In a marketing tactic, a search engine is tricked into listing a site by including some frequently used keywords such as sex. These key words of course do not have any connection with the website's actual content what is this trick called?
(a) Trick marketing (b) Bait and switch
(c) Carpet bombing (d) Carrot and stick
Answer-B
509 What does a 'spider' do on the Internet?
(a) It searches the Net for new web pages and indexes their addresses and content related information in a database, which is used by a search engine
(b) Tracks spammers and their mails
(c) Tracks encrypted communications and their sources
(d) Tracks child pornography
Answer-A
510 In which laboratory the original development of World Wide Web (WWW) took place in 1989?
(a) European Organization for Nuclear Research, Geneva
(b) National Centre for Super-computing Applications
(c) Palo Alto Research Centre
(d) Bell Labs
Answer-A
511 GOPHER is one of the many facilities available on the Net. How is it different from the WWW?
(a) GOPHER contains graphics whereas WWW does not
(b) GOPHER contains no graphics whereas WWW does
(c) Unlike WWW, it provides live conferencing facilities
(d) It helps to send voice mail
Answer-B
512 Name the protocol standard designed to condense WWW sites to fit into handheld, digital, wireless devices such as mobile phones and pagers
(a) WAP (b) HTTP
(c) TCP (d) FTP
Answer-A
513 Tim Berner Lee wanted to call World Wide Web or WWW TIM after his own name. What, according to him, did the acronym TIM stand for?
(a) Total Information Management
(b) The Internet Maze
(c) The Information Mesh
(d) Tim's Information Management
Answer-C
514 The inventor of World Wide Web Tim Berners-Lee feels that the Web should be made more intelligent and intuitive so that it can serve a user's needs better and the search engines can provide web pages that a user really wants. What does Tim call such a web?
(a) Semantic Web (b) Intelli Web
(c) Intuitive Web (d) Contextual Web
Answer-A
515 English is the most-used language on the World Wide Web. Which language comes second?
(a) Hindi (b) French
(c) Chinese (d) Japanese
Answer-C
516 The Organisation Europeenne pour la Recherche Nucleaire (CERN) in Switzerland, the birth place of WWW, is mainly involved in research in which area?
(a) Information Technology (b) Particle Physics (c) Cosmology (d) Planetary science
Answer-B
517 Which was the world's first web browser and WYSIWYG HTML editor?
(a) World Wide Web (b) Mozilla
(c) Netscape (d) Opera
Answer-A
518 Which browser has the distinction of being the first popular graphical WWW browser?
(a) Netscape Navigator (b) Internet Explorer (c) Lynx (d) Mosaic
Answer-D
519 Which web browser is also known by the nickname Mozilla?
(a) Netscape Navigator (b) Internet Explorer
(c) Lynx (d) Mosaic
Answer-A
520 What is Apache?
(a) The first search engine on the Net
(b) The world's second virtual newscaster
(c) A freely available Web server
(d) The world's first online auction site
Answer-C
521 What is a Wiki or Wiki-Wiki?
(a) A server program that allows users to collaborate in forming or editing the content of a Web site
(b) An online collaboration software that allows the employees of a company located at remote places to collaborate on a project
(c) A new generation web browser
(d) A web visitor who browses through the web pages and sites at the maximum speed allowed by the speed of the mode
mAnswer-A
522 On his first visit to Honolulu, Ward Cunningham was directed by the airport counter agent to take the shuttle buses at the airport. The word that describes the shuttle bus service there means 'fast' in Hawaiian language. That was the first Hawaiian word Cunningham learned. Cunningham gave this name to a concept he created later on. Name the concept
(a) Wiki Wiki or wiki (b) Extreme Programming
(c) Webopedia (d) Awiwi
Answer-A
523 Part of Microsoft's Net venture, this service proposes to provide space on the Web where users can store their personal information securely for a fee. They can decide who can use their information, for how long, and in what manner. What is the name of this service?
(a) Secure Space (b) Micro Space
(c) Net Space (d) Hail Stor
mAnswer-D
524 Established in 1996, these leading international Awards, dubbed the Oscars of the Internet by The New York Times, are presented honoring excellence in Web design, creativity, usability and functionality. Name it
(a) Wammy Awards (b) Grammy Awards
(c) Webby Awards - (d) Net Awards
Answer-C
525 Which body presents the Webby Awards?
(a) International Academy of Digital Arts and Sciences
(b) Internet Corporation for Assigned Names and Numbers (ICANN)
(c) Internet Assigned Numbers Authority (IANA)
(d) Association for Computing Machinery
Answer-A
526 What well-known term in web browsing was coined by Lou Montulli?
(a) Net surfing (b) Netizen
(c) Cookies (d) Blog
Answer-C
527 What is dub dub dub?
(a) A web address with three dots in between the domain names
(b) A deserted website
(c) A website which has not been updated even once
(d) Short for WWW
Answer-D
528 What is the main function of Internet Corporation for Assigned Names and Numbers (ICANN)?
(a) Managing the assignment of domain names and IP addresses
(b) Develop standards for communication over the Internet
(c) Oversee and safeguard user privacy issues
(d) Define Internet-related terms
Answer-A
529 This Internet music search application sparked heated debate over copyright and digital distribution issues when it started enabling users to search for and swap MP3 files over the Web. Name it
(a) MP3.com (b) Musiconline.co
m(c) Napster (d) Web Music
Answer-C
530 In Internet terminology what is URL?
(a) Uniform Resource Locator
(b) Universal Random Locator
(c) Ultimate Resource Locator
(d) Universal Real Language
Answer-A
531 Highest subdivision of the Internet, usually by country or type of organization, such as .edu for education, or.com for commercial, is called
(a) Ethernet (b) Backbone
(c) Gateway (d) Domain
Answer-D
532 The identifying portion of a domain name, for example, economictimes in www.economictimes.com , is called?
(a) Primary domain name (b) Secondary domain name (c) Website name (d) Organization name
Answer-B
533 In the above question, 'com' is an example of
(a) Primary domain name (b) Generic domain name (c) Website name (d) Organization name
Answer-A
534 What new top-level domain name was approved by Internet Corporation for Assigned Names and Numbers (ICANN) in 2000 for use with the Websites of nonprofit cooperatives?
(a) .np (b) .non
(c) coo (d) .coop
Answer-D
535 Which company / organization is the original registrar of .com, .net and .org domain names on the Internet?
(a) Networks Solutions
(b) BetterWhois.co
m(c) U.S. Department of Commerce
(d) Internet Corporation for Assigned Names and Numbers (ICANN)
Answer-A
536 From which of the following, one can get the information on whether a particular .com .net .org .info .biz domain name has been registered, and if so, then the party who has registered it?
(a) Better Whois (b) Internet Assigned Numbers Autnority
(c) Google • (d) Yahoo! Search
Answer-A
537 In the cyber world, who are 'cyber squatters'?
(a) People who grab a well-known trademark and register it as domain name for ulterior purpose, such as selling the domain name back to the rightful owners for a fancy price, or making the Internet users believe that they are associated with the famous trademark
(b) People who hack a computer network
(c) People who pirate software
(d) People who spread virus over Internet
Answer-A
538 Some cyber squatters take advantage of an Internet user mistyping a web address into a web browser by leading the user to an alternate web address owned by them. This type of cyber squatting is called
(a) Typosquatting (b) Missquatting
(c) Address squatting (d) URL squatting
Answer-A
539 To track usage over time and to store information about a user, a website stores a special text file on the user's hard disk. What are these text files called?
(a) Applets (b) Banners
(c) Cookies (d) Plug-ins
Answer-C
540 In the World Wide Web, what is a black hole?
(a) A web page that takes a very long time to download
(b) A hyperlink to a document that has been erased or removed
(c) A web page that pops up on the screen unsolicited
(d) A mysterious source of spa
mAnswer-B
541 What is the basic difference between browsing and surfing?
(a) Browsing for no particular reason is called surfing
(b) Surfing with no particular reason is called browsing
(c) Browsing with the help of search engines is called surfing
(d) Browsing requires registration with the website whereas surfing does not
Answer-A
542 What is an 'arachniography'?
(a) A new form of spyware
(b) A new application that helps in viral marketing
(c) A bibliography of Web pages
(d) An application program that enables non-programmers to create web pages
Answer-C
543 Surfers who browse the web at breakneck speed over Digital Subscriber Line or DSL Internet connection are called
(a) Net squirrels (b) Bandwidth Junkie
(c) Ego surfers (d) Vanity surfers
Answer-B
544 When one is said to be 'ego surfing'?
(a) When one surfs the Net for hours altogether and does not allow others to access the Net from the same system.
(b) When one surfs the Net at very high speed.
(c) When one browses the website of one's own organization.
(d) When one searches the Net for reference to oneself.
Answer-D
545 What are mirror websites?
(a) Different language versions of the same website.
(b) Websites using the same URL but with different contents.
(c) A standby website while the original has been shut down for maintenance.
(d) Multiple websites with the same contents but different URLs.
Answer-D
546 In Internet jargon, what is a 'sticky site'?
(a) A site where a user spends a large amount of time.
(b) A site, which provides a particular type of information.
(c) Sites with contents meant for adults only.
(d) Site visited by the most number of surfers.
Answer-A
547 On the Net, who or what is a zombie?
(a) An abandoned website that due to some reason has been moved to a different Web address.
(b) A website that provides information on whether a domain name has already been registered by somebody else.
(c) A company that offers domain name registration service.
(d) A sticky website to which most visitors get glued once they access it.
Answer-A
548 What is a "para-site'?
(a) A website that frames other websites or pages within it
(b) A website accessible only from another website
(c) A website that diverts traffic from another site to itself
(d) A website that copies layout and design from another site
Answer-A
549 What is an evergreen website?
(a) The website is very popular with the visitors
(b) The website deals with environmental issues
(c) The website is updated daily or frequently
(d) The website uses primarily green color in its content
Answer-C
550 In an online auction, what is Shill bidding?
(a) Deliberate use of secondary registrations, aliases, family members, friends, or associates to artificially drive up the bid price of an item.
(b) Bidding for the quantity of the items on sale.
(c) Winning a bid for an item but not purchasing the same subsequently.
(d) Ending up paying much more for an item than the item is actually worth.
Answer-A
551 Contrary to popular belief, it is difficult for users to find information located in banner ads. This phenomenon is called
(a) Banner phobia (b) Banner blindness
(c) Banner zapping (d) Banner overlooking
Answer-B
552 What fancy name is given to tall and narrow banner advertisements on a web page?
(a) Monuments (b) Tall boys
(c) Eiffel Towers (d) Skyscrapers
Answer-D
553 What term is used pejoratively for the practice of advertising using spam?
(a) Netvertize (b) Spambait
(c) Spamvertize (d) Adspamming
Answer-C
554 M-commerce involves access to the Net via....
(a) Cable mode
m(b) Standard mode
m(c) Mobile devices such as a cell phone or PDA
(d) Internet2 devices
Answer-C
555 The ratio between the number of times an advertisement is clicked upon and the number of times the advertisement is served to the site visitor is called
(a) Click-through rate (CTR) (b) Click stream (c) Hit (d) Qualified hit
Answer-A
556 What is click stream?
(a) The sequence of mouse clicks made by a user as she or he navigates a web page or the Net.
(b) The sequence of mouse clicks one has to make in order to reach a particular page in a website.
(c) The site map of a website.
(d) The sequence of mouse clicks made by a user as she or he navigates a text document.
Answer-A
557 In Internet jargon, what are interstitials?
(a) An advertisement diverted to one's email box with the consent of the recipient.
(b) An advertisement that appears between web pages.
(c) An advertisement format where the contents are not static but changes every few seconds.
(d) An interactive advertisement.
Answer-B
558 What distinction does the book Fluid Concepts and Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought by Douglas Richard Hofstadter enjoy in the world of IT?
(a) It was the first book to lay out the principles of e-commerce
(b) It was the first book to be exclusively published online
(c) It was the first eBook
(d) It was the first book sold by Amazon.co
mAnswer-D
559 Which marketing guru pioneered the concept of 'permission marketing' which has become more common in the Web-based businesses?
(a) Seth Godin (b) Jagdish Sheth
(c) Deepak Jain (d) Theodore Levitt
Answer-A
560 Atomicity, Consistency, Isolation and Durability (ACID) are four essential properties of what?
(a) Electronic transactions
(b) Microprocessor
(c) Ink/toner used in a computer printer.
(d) Magnetic coating on a recordable medium.
Answer-A
561 Which is the first temple in India to install terminals of online commodity exchanges to get commodities at market prices rather than through annual contracts involving fixed prices?
(a) Tirumala Tirupati Devasthana
m(b) Golden Temple, Amritsar
(c) Guruvayoor shrine in Kerala
(d) Jagannath Temple in Puri
Answer-A
562 What term is used to describe a person who spends plenty of time on line exploring the Internet?
(a) Netphile (b) Netizen
(c) Cybernaut (d) Cyberphile
Answer-C
563 You may also come across a term called "nethead"? What is it?
(a) A highly respected person in a Net community
(b) A person who is addicted to the Net
(c) The head of a Net community
(d) The Web Master
Answer-B
564 What is a person called who engages himself/herself in hacking activities with political or social agendas?
(a) Computerphile (b) Cracker
(c) Hacker (d) Hacktivist
Answer-D
565 When an attacker over the Net harasses a victim with threatening messages delivered through email or instant messaging or posted to a Web site or a discussion group, it is called
(a) Cyber squatting (b) Cyber terroris
m(c) Cyberwoozling (d) Cyber stalking
Answer-D
566 An employer would never like a cyber slacker. What does a cyber slacker do?
(a) She or he steals data from the organization's system and sells outside.
(b) She or he hates the IT tools and does everything manually or by old equipments.
(c) She or he uses organization's Internet connection during work hours to surf the Net, shop online, send personal emails, look for new jobs, etc.
(d) Uses company email to send anonymous messages to others.
Answer-C
567 Which netizen is called a 'lurker'?
(a) A person who restricts him-self/herself to receiving and reading articles or messages in a newsgroup or any other online discussion without contributing anything to the ongoing exchange.
(b) A person who tries to dominate an online discussion.
(c) A person who surfs the Net at breakneck speed.
(d) A netizen whose opinions are often offensive to other participants in an online discussion forum.
Answer-A
568 For the success of the initial public offering of a dot-corm, it is recommended that Net-wise individuals should combine with finance experts. The Net-wise individuals wear unconventional clothing and are not generally finance savvy. On the other hand, the finance people wear proper formal dresses and have the ability to convince the investors about the attractiveness of the offer. What expression describes this combination?
(a) Geeks and Suits (b) Fruits and Suits
(c) Fruits and Nuts (d) Digits and Numbers
Answer-B
569 Who is a blatherer in the cyber world?
(a) A user who types on-and-on while posting a message or chatting online.
(b) A heavy advertiser on the Net.
(c) A political propagandist on the Net.
(d) A user who uses SMS type languages even in formal emails,
Answer-A
570 What is the Chinese slang for a hacker?
(a) Rekcah (b) Cracker
(b) Honker (d) Recker
Answer-C
571 Which of the following would best describe the job of a cyber cop?
(a) A computer-savvy policeman.
(b) A security person who guards computer installations
(c) A person who is in charge of making systems safe from hackers
(d) A person who investigates criminal acts committed online, including fraud and harassment
Answer-D
572 When somebody has been 'dot-commed', what has happened to him/ her?
(a) Trapped by the promise of high salaries by a dot.com.
(b) Lost all investments made on a dot com.
(c) Lost hishe or her job due to the downsizing or failure of a dot com.
(d) Has made a killing on hishe or her investments made on a dotcom because of its success.
Answer-C
573 Who is a cyber tourist?
(a) A person who visits websites of tours and travel companies
(b) A person who stays in a website for few minutes only
(c) A person who goes online only on weekends and holidays
(d) A person who visits the websites of famous tourist destinations of the world
Answer-C
574 When somebody has been 'gatored' on the Net, she or he has become a victim of what?
(a) Cyber grapevine (b) Cyber warfare
(c) Hijackware program (d) Spyware
Answer-C
575 In Internet terminology, who is a troll?
(a) A person who posts inflammatory messages oil the Net. such as on online discussion forums, to disrupt the discussion or to upset its participants.
(b) A person who gets overwhelmed by the amount of information available on the Net.
(c) A person who makes a living by designing web sites for others.
(d) A user who opposes the pricing of any Internet content.
Answer-A
576 The term "cyberspace" refers to networked digital environments, especially advanced systems that produce an illusion of reality. Who coined this term in his book Neuromancer (1984)?
(a) Thomas Watson (b) Bill Gates
(c) William Gibson (d) Steven Spielberg
Answer-C
577 What term is used to describe the principles of courtesy to be used in sending electronic messages and other online postings?
(a) eEtiquette
(b) Netiquette
(c) Principles of Net Behavior
(d) Internet Best practices
Answer-B
578 In Internet etiquette, typing with all capital letters is considered rude. Why?
(a) It is stressful on the eyes.
(b) It looks ugly.
(c) It consumes more memory.
(d) It is the e-mail equivalent of shouting.
Answer-D
579 What is cyberpunk?
(a) A genre of near-future science fiction set in virtual-reality environments maintained on global computer networks.
(b) A Utopian land where everything is virtual
(c) A popular computer game
(d) Literature on computers and IT
Answer-A
580 Smiley and other characters used to express feelings in an e-mail communication are called
(a) Emoticons (b) Mailicons
(c) Digitrons (d) Neticons
Answer-A
581 What is 'turnip effect'?
(a) Rapid spread of Iiiternet
(b) Bottlenecks caused by heavy traffic over a communication system or network
(c) Increasing misuse of Internet by some people with its increasing popularity
(d) Availability of information to all at the fingertips due to the Net
Answer-B
582 All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
583 A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
584 ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
585 A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
586 The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
587 Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
588 ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
589 Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
590 Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A
591 ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
592 ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
593 ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
594 The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
595 Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B
596 After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B
597 Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
598 Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
599 In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
600 The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
601 A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
602 A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C
603 A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C
604 ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
605 The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C
606 All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
607 Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A
608 All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B
609 The ____________, also called the “brains†of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RA
mD. central processing unit (CPU)
Answer: D
610 The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B
611 Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A
612 ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B
613 System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Answer: D
614 The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A
615 Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C
616 Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A
617 Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D
618 ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B
619 DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D
620 The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A
621 ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A
622 Which of the following is the correct order of the four major functions of a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Answer: D
623 ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Answer: A
624 The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Answer: B
625 A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C
626 ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The platfor
mB. The operating syste
mC. Application software
D. The motherboard
Answer: B
627 The operating system is the most common type of ____________ software.
A. communication
B. application
C. syste
mD. word-processing software
Answer: C
628 ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B
629 The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A
630 The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D
631 The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A
Fill in the Blank:
632 Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation.
Answer: Mac
633 The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input/output devices.
Answer: operating syste
m634 The type of operating system software you use depends on your computer’s ____________.
Answer: platfor
m635 ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet.
Answer: Application
636 ____________are the fastest and most expensive computers.
Answer: Supercomputers
637 A ____________ is approximately 1,000 bytes.
Answer: kilobyte
638 Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________.
Answer: instructions
639 A computer gathers data, processes it, outputs the data or information, and ____________ the data or information.
Answer: stores
640 The binary language consists of two digits: ____________ and ____________.
Answer: 0 and 1
641 A string of ____________ 0s and 1s is called a byte.
Answer: eight (8)
642 The devices you use to enter data into a computer system are known as ____________ devices.
Answer: input
643 The devices on a computer system that let you see the processed information are known as ____________ devices.
Answer: output
644 ____________ is the set of computer instructions or programs that enables the hardware to perform different tasks.
Answer: Software
645 When you connect to the ____________, your computer is communicating with a server at your Internet service provider (ISP).
Answer: Internet
646 ____________ are computers that excel at executing many different computer programs at the same time.
Answer: Mainframes
647 ____________is the application of computer systems and techniques to gather legal evidence.
Answer: Computer forensics
648 ____________ is the science that attempts to create machines that will emulate the human thought process.
Answer: Artificial intelligence (AI)
649 Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as an operating system.
Answer: Microsoft Windows
650 A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns.
Answer: data mining
651 Hard disk drives and CD drives are examples of ____________ devices.
Answer: storage
652 You would use ____________ software to create spreadsheets, type documents, and edit photos.
Answer: application
653 ____________ are computers that support hundreds or thousands of users simultaneously.
Answer: Mainframes
654 ____________ is the term given to the act of stealing someone’s identity and ruining their credit rating.
Answer: Identity theft
655 Surgeons are using ____________ to guide robots to perform delicate surgery.
Answer: computers
656 Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans.
Answer: simulators
True and False
657 Currently, the performance of tasks by robots is based on preprogrammed algorithms.
Answer: True
658 Data can be a number, a word, a picture, or a sound.
Answer: True
659 Strictly defined, a computer is a data processing device.
Answer: True
660 The discrepancy between the “haves†and “have-nots†with regard to computer technology is commonly referred to as the digital society.
Answer: False (digital divide)
661 One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to avoid viruses, the programs that pose threats to computer security.
Answer: True
662 Trend-spotting programs, developed for business, have been used to predict criminal activity.
Answer: True
663 Employers do not have the right to monitor e-mail and network traffic on employee systems used at work.
Answer: False
664 Clicking on an icon with the mouse is a form of giving an instruction to the computer.
Answer: True
665 Output devices store instructions or data that the CPU processes.
Answer: False (memory)
666 The CPU and memory are located on a special circuit board in the system unit called the motherboard.
Answer: True
667 Nanostructures represent the smallest human-made structures that can be built.
Answer: True
668 The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a few programs as quickly as possible, whereas mainframes are designed to handle many programs running at the same time (but at a slower pace).
Answer: True
669 Being computer fluent means that you should be able to build a computer yourself.
Answer: False
670 Embedded computers are self-contained computer devices that have their own programming and do not receive input.
Answer: True
671 A Web browser is a special device that is installed in your computer that allows it to communicate with other devices on a network.
Answer: False (network adapter)
672 With a wireless network, it is easier to relocate devices.
Answer: True
673 The most common type of memory that the computer uses to process data is ROM.
Answer: False (RAM)
Matching:
674 Match the following terms with their approximate size:
I. kilobyte A. one million bytes
II. byte B. eight bits
III. gigabyte C. one thousand bytes
IV. megabyte D. one billion bytes
V. terabyte E. one trillion bytes
Answer: C, B, D, A, E
675 Match the following terms with their meanings:
I. printer A. storage device
II. scanner B. output device
III. RAM C. input device
IV. CPU D. a type of memory
V. CD drive E. processor
Answer: B, C, D, E, A
676 Match the following terms with their meanings:
I. mainframe A. the most expensive computers that perform complex calculations extremely rapidly
II. supercomputer B. a computer that provides resources to other computers connected to a network
III. embedded computer C. a large, expensive computer that supports hundreds or thousands of users simultaneously
IV. PDA D. a self-contained computer device that usually performs preprogrammed functions such as temperature control
V. server E. a small mobile computing device
Answer: C, A, D, E, B
677 Match the following terms with their meanings:
I. software A. transforming data into information
II. hardware B. data that has been organized or presented in a meaningful fashion
III. operating system C. any part of the computer that you can physically touch
IV. processing D. a set of computer programs that enables hardware to perform different tasks
V. information E. the most common type of system software, it controls the way in which the computer system functions
Answer: D, C, E, A, B
678 Match the following terms with their meanings:
I. system software A. the set of programs that enables computer hardware devices and application software to work together
II. application software B. the kind of operating system software you will use depends on this
III. platform C. operating system software generally used on PCs
IV. Microsoft Windows D. a set of programs used to accomplish a specific task
V. Mac OS E. operating system software used on the Apple Macintosh
Answer: A, D, B, C, E
679 Match the following terms with their meanings:
I. data A. the main circuit board in the system unit
II. memory B. the representation of a fact or idea (unprocessed information)
III. output C. processed data or information
IV. storage D. holds instructions or data that the CPU processes
V. motherboard E. data or information that can be accessed again
Answer: B, D, C, E, A
680 Match the following terms with their meanings:
I. bit A. the science revolving around the use of nanostructures to build devices on an extremely small scale
II. binary language B. the case that contains the system components
III. instructions C. consists of 0s and 1s
IV. system unit D. short for binary digit
V. nanotechnology E. steps and tasks necessary to process data into usable information
Answer: D, C, E, B, A
681 Match the following fields to the related computer technology:
I. medicine A. Internet research and virtual tours
II. business B. data mining
III. law enforcement C. robotics and simulation
IV. education D. computer forensics
V. archeology E. digital recreations of ruins
Answer: C, B, D, A, E
682 If a word is typed that is not in Word’s dictionary, a____________wavy underline appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these
Ans : (A)
683 The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
Ans : (D)
684 In Excel, any set of characters containing a letter , hyphen, or space is considered—
(A) a formula
(B) text
(C) a name
(D) a title
(E) None of these
Ans : (B)
685 ____________Software allows users to perform calculations on rows and columns of data.
(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
(E) None of these
Ans : (C)
686 A ____________represent approximately one billion memory locations.
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (C)
687 ____________cells involves creating a single cell by combining two or more selected cells.
(A) Formatting
(B) Merging
(C) Embedding
(D) Splitting
(E) None of these
Ans : (B)
688 The operating system is the most common type of____________software.
(A) communication
(B) application
(C) syste
m(D) word-processing
(E) None of these
Ans : (C)
689 When you quickly press and releaes the left mouse button twice , you are—
(A) Primary-clicking
(B) pointing
(C) Double-clicking
(D) Secondary-clicking
(E) None of these
Ans : (C)
690 The horizontal and vertical lines on a worksheet are called—
(A) cells
(B) sheets
(C) block lines
(D) gridlines
(E) None of these
Ans : (D)
691 To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
(A) press the left mouse key
(B) double-click the right mouse key
(C) press the BACKSPACE key
(D) press the delete key
(E) None of these
Ans : (D)
692 The operating system does all of the following EXCEPT:
(A) provide a way for the user to interact with the computer.
(B) manage the central processing unit (CPU).
(C) manage memory and storage.
(D) enable users to perform a specific task such as document editing.
Ans : (D)
693 During the boot process, the____________looks for the system files.
(A) CD
B. BIOS
C. CPU
D. DVD
Ans : (B)
694 ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
Ans : (C)
695 ____________ is the ability of an operating system to control the activities of multiple programs at the same time.
(A) Multitasking
(B) Streamlining
(C) Multiuser
(D) Simulcasting
Ans : (A)
696 The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:
(A) action.
(B) event.
(C) interrupt.
(D) activity.
Ans : (C)
697 The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
(A) CPU
(B) slice of time
(C) stack
(D) event
Ans : (B)
698 The blocks of code, included in the operating system, that software applications interact with are known as:
(A) application programming interfaces (APIs).
(B) complimentary metal-oxide conductors (CMOS).
(C) device drivers.
(D) bootstrap loaders.
Ans : (A)
699 MS-DOS is a ____________ operating system.
(A) point-and-click
(B) user-friendly
(C) command-driven
(D) Mac
Ans : (C)
700 An interrupt handler is a(n):
(A) location in memory that keeps track of recently generated interrupts.
(B) peripheral device.
(C) utility program.
(D) special numeric code that indicates the priority of a request.
Ans : (D)
701 A spooler is a(n):
(A) location in memory that maintains the contents of a document until it prints out.
(B) print job.
(C) program that coordinates the print jobs that are waiting to print.
(D) message sent from the printer to the operating system when a print job is completed.
Ans : (C)
702 Virtual memory is typically located:
(A) on a floppy disk.
(B) in the CPU.
(C) in a flash card.
(D) on the hard drive.
Ans : (D)
703 The purpose of a swap (or page) file is to:
(A) maintain pages of documents that are being spooled to the printer.
(B) hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
(C) prevent thrashing in a multitasking environment.
(D) allow multiple print jobs to print their pages out simultaneously.
Ans : (B)
704 The definition of thrashing is:
(A) swapping data between virtual memory and RAM too frequently.
(B) insufficient hard disk space.
(C) too many processors being managed by the operating system.
(D) inaccurate information stored in the registry.
Ans : (A)
705 All of the following are TRUE of Safe Mode EXCEPT:
(A) Safe Mode is a special diagnostic mode.
(B) Safe Mode loads all nonessential icons.
(C) Safe Mode allows users to troubleshoot errors.
(D) Safe Mode loads only the most essential devices.
Ans : (B)
706 Verification of a login name and password is known as:
(A) configuration.
(B) accessibility.
(C) authentication.
(D) logging in.
Ans : (C)
707 The combination of the operating system and the processor is referred to as the computer’s:
(A) CPU.
(B) platform.
(C) BIOS.
(D) CMOS.
Ans : (B)
708 The following message generally means:
(A) a nonsystem floppy has been left in the floppy disk drive.
(B) the CD drive is not functioning.
(C) the BIOS is corrupted.
(D) there is a problem loading a device.
Ans : (A)
709 Which of the following is the correct sequence of actions that takes place during the boot-up process?
(A) Load operating system ? Activate BIOS ? Perform POST ? Check configuration settings
(B) Activate BIOS ? Perform POST ? Load operating system ? Check configuration settings
(C) Perform POST ? Load operating system ? Activate BIOS ? Check configuration settings
(D) Activate BIOS ? Check configuration settings ? Perform POST ? Load operating syste
mAns : (B)
710 All of the following are steps involved in the boot process EXCEPT:
(A) load the operating system into RAM.
(B) the power-on self-test.
(C) activate the basic input/output system (BIOS).
(D) load application programs.
Ans : (D)
711 The ____________, stored on a ROM chip, is responsible for loading the operating system from its permanent location on the hard drive into RAM.
(A) BIOS
(B) API
(C) device driver
(D) supervisor progra
mAns : (A)
712 The basic input/output system (BIOS) is stored in:
(A) RAM.
(B) ROM.
(C) the CPU.
(D) the hard drive.
Ans : (B)
713 Ensuring that the essential peripheral devices are attached and operational is the ____________ process.
(A) configuration
(B) CMOS
(C) POST
(D) RO
mAns : (C)
714 The memory resident portion of the operating system is called the—
(A) registry.
(B) API.
(C) CMOS.
(D) kernel.
Ans : (D)
715 Which of the following does NOT occur during the power-on self-test (POST)?
(A) The ScanDisk utility begins to run.
(B) The video card and video memory are tested.
(C) The BIOS identification process occurs.
(D) Memory chips are checked to ensure they are working properly.
Ans : (A)
716 All of the following are TRUE regarding virtual memory EXCEPT—
(A) any amount of RAM can be allocated to virtual memory.
(B) the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
(C) this temporary storage is called the swap file (or page file).
(D) virtual memory is physical space on the hard drive.
Ans : (A)
717 The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT:
(A) files.
(B) folders.
(C) drives.
(D) systems.
Ans : (D)
718 All of the following statements concerning windows are true EXCEPT—
(A) windows are an example of a command-driven environment.
(B) windows can be resized and repositioned on the desktop.
(C) more than one window can be open at a time.
(D) toolbars and scrollbars are features of windows.
Ans : (A)
719 All of the following statements concerning files are true EXCEPT—
(A) A file is a collection of related pieces of information stored together for easy reference.
(B) Files can be generated from an application.
(C) Files are stored in RAM.
(D) Files should be organized in folders.
Ans : (C)
720 Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(A) an open folder.
(B) the folder contains subfolders.
(C) a text file.
(D) a graphics file.
Ans : (B)
721 In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.
(A) List
(B) Thumbnails
(C) Details
(D) Icon
Ans : (C)
722 _________ is a powder used in laser printers to form the images on a paper.
Toner
723 Worms and Trojan Horses are examples of:
Malware
724 ___________ Printers work by selectively heating regions of special heat-sensitive paper.
Thermal
725 The ISI mark is given by:
BIS
726 The laser printer was invented at:
Xerox
727 A flaw in a system whereby the output is unexpectedly dependent on the sequence or timing of other events is called a:
Race condition
728 A 56k modem can transfer data at up to bits per second over the phone line.
56000
729 The original implementation of the C programming language was standardized by :
ANSI
730 ________Is a signaling method that handles a relatively wide range of frequencies.
Broadband
731 The port number used by SMTP is:
25
732 A packet filter is a type of
Firewall
733 Which among the following utilities can detect a bad sector?
CHKDSK and SCANDISK
734 In 100BASE-T, 'T' stands for:
Twisted pair
735 A head crash is said to occur when the read-write head of a hard disk drive:
Touches the magnetic media
736 Category 5 cable includes ---twisted pairs in a single cable jacket.
4
737 The port number used by the HTTP protocol is
80
738 In PowerPoint presentations, individual pages are called:
Slides
739 Power-on-self-test is built into the:
BIOS
740 PowerPoint can embed content from other applications through:
OLE
741 The latest release of Microsoft Windows is called:
Windows 7.0
742 GRUB is an:
Boot loader
743 __________Is a family of programmable interrupt controller chips.
8259
744 card allows television signals to be received by a computer.
TV tuner
745 ________Is an IEEE 1394 implementation.
Fire Wire
746 'Windows protection error' messages may result from:
Damage to the system registry
747 Sound Blaster line of audio cards were made by :
Creative Technology Ltd.
748 Indiscriminate sending of unsolicited bulk messages is known as :
Spamming
749 The 'blue screen of death' may occur due to:
All the above
750 FAT manages files in contiguous groups of sectors called:
Clusters
751 The utility which can be used to clean the windows registry is:
regedit
752 Ultra Wide SCSI had a throughput of: (A) 10 MB/s
40 MB/s
753 A dual-core processor has L1 cache.
2
754 Port 110 is used by _______
POP3
755 A file extension .ogg indicates an ______format
Audio codec
756 Kerberos is a__________protocol.
Network authentication
757 Athlon series of processors are made by:
AMD
758 Which among the following is a real-time operating system?
QNX
759 The internet top level domain .cn refers to :
China
760 _____________ Is a protocol used by networked computers (clients) to obtain IP addresses and other parameters from a server.
DHCP
761 is the brand name for 64-bit Intel microprocessors with IA-64 architecture.
Itaniu
m762 is an organization which develops internet standards through RFCs.
IETF
763 The ability to replace components of a computer, while it is operating, is called:
Hot swapping
764 IC chips used in computers are usually made of
(a) Lead
(b) Silicon
(c) Chromiu
m(d) Gold
The Correct option is – (b) Silicon
765 One kilobyte is equal to
(a) 1000 bytes
(b) 100 bytes
(c) 1024 bytes
(d) 1023 bytes
The Correct option is – (c) 1024 bytes
766 Which of the following is not an example of Operating System?
(a) Windows 98
(b) BSD Unix
(c) Microsoft Office XP
(d) Red Hat Linux
The Correct option is – (c) Microsoft Office XP
767 Which supercomputer is developed by the Indian Scientists?
(a) Para
m(b) Super 301
(c) Compaq Presario
(d) CRAY YMP
The Correct option is – (a) Para
m768 One Gigabyte is Approximately equal is
(a) 1000,000 bytes
(b) 1000,000,000 bytes
(c) 1000,000,000,000 bytes
(d) None of these
The Correct option is – (b) 1000,000,000 bytes
769 Check the odd term out
(a) Internet
(b) Linux
(c) Unix
(d) Windows
The Correct option is – (a) Internet
770 The errors that can be pointed out by the compiler are
(a) Syntax error
(b) Symantic error
(c) Logical error
(d) Internal error
The Correct option is- (a) Syntax error
771 What is the control unit's function in the CPU
(a) To transfer data to primary storage .
(b) To store program instructions.
(c) To perform logic functions.
(d) To decode program instructions.
The Correct option is – (c) To perform logic functions.
772 What is the best way to have a data and the slide number appear on every slide?
(a) choose Tools, Header and Footer, click Slide tab, select the desired options, click Apply to All.
(b) choose Insert, Header and Footer, click Slide tab, select the desired options, click Apply to All.
(c) choose View, Header and Footer, click Slide tab, select the desired options, click Apply to All.
(d) choose File, Header and Footer, click Slide tab, select the desired options, click Apply to All.
The Correct option is – (b) choose Insert, Header and Footer, click Slide tab, select the desired options, click Apply to All.
773 What do you use to create a chart?
(a) Pie Wizard
(b) Excel Wizard
(c) Data Wizard
(d) Chart Wizard
The Correct option is – (d) Chart Wizard
774 A process known as ___________ is used by large retailers to study trends.
A. Data mining
775 The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. computer forensics
776 ____ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A : RFID
777 _______ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
778 ______ is data that has been organized or presented in a meaningful fashion.
A. Information
779 The name for the way that computers manipulate data into information is called:
A. Processing.
780 _____ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Artificial intelligence (AI)
781 The term bit is short for:
A. binary digit.
782 A string of eight 0s and 1s is called a:
A. Byte.
783 ______ is any part of the computer that you can physically touch.
A. Hardware
784 The CPU and memory are located on the:
A. motherboard.
785 The ____, also called the “brain” of the computer, is responsible for processing
data.
A. CPU
786 _______ is a set of computer programs used on a computer to help perform tasks.
A.Software
787 System software is the set of programs that enables your computer’s hardware devices and ______ software to work together.
A. application
788 Servers are computers that provide resources to other computers connected to a:
A. network.
789 Who is credited with the creation of WWW
Answer : Tim Berners-Lee
790 Which of the following is not a web browser
Answer :HTML
791 MIME is associated with the following
Answer :E mail
792 The mode of communication in which transmission can be bidirectional. But in only one direction at a time is called
Answer :Half Duplex
793 Error detection at the data link layer is achieved using
Answer :CRC codes
794 In Serial communication, start and stop bits are used for
Answer :Synchronization
795 In a transmitter, the unmodulated signal is known as
Answer :Baseband signal
796 In a computer network, routing issues are handled in
Answer :Network Layer
797 In a computer network, functions of dialog management and synchronization are taken care of in the Answer :Session’s layer
798 Which of the following topologies has the highest reliability
Answer :Mesh
799 In data communications, bauds signify ———- rate
Answer :Signaling
800 ADSL is abbreviation for
Answer :Asymmetric Digital Subscriber Line
801 The topmost layer in the ISO model that needs to be implemented in an intermediate node is the ———–layer
Answer :Network
802 VPN denotes a
Answer :Virtual Private Network
803 Data rate of a ring network is 20Mbps and signal propagates at 200m/µsec. The number of bits that can be placed on the channel of length 200km is
Answer :20000bits
804 The frequency range over which coaxial cables are typically used is
Answer :106 to 108 Hz
805 In internet, the well known port 21 refers to the application
Answer :FTP
806 The maximum data rate possible through a noise free 4 kHz binary channel is
Answer :8000 bps
807 The transparency provided in a distributed system where users cannot tell how many copies of a resource exist is termed as
Answer :Replication transparency
808 Which of the following configurations can be said to be tightly coupled
Answer :Shared memory multiprocessors
809 In distributed systems, RPC stands for
Answer :Remote Procedure Call
810 Assume there are 4 file servers each with a 0.95 chance of being up at any instant. Probability of at least one being available is
Answer :1-(.05)4
811 Which of the following category of classification of multiple computer systems is not generally used in practice
Answer :MISD
812 In a distributed system, to ensure that concurrent transactions do not interfere with each other, the transactions must have the following specific property
Answer :Serializability
813 Translation Lookaside Buffer(TLB) is also called
Answer :Associative Memory
814 In Internet Standards Terminology, RFC refers to
Answer :Request For Comments
815 Which of the following denotes a network management protocol in an internet
Answer :SNMP
816 IEEE 802.11 is an IEEE standard for
Answer :Wireless LAN
817 Who takes the salute at the grand parade on Republic Day in New Delhi?
a) President
b) Prime Minister
c) Governor
d) Defence Minister
The correct answer is a) President
818 Who is popularly known as 'Father of Indian Constitution'?
a) Jawaharlal Nehru
b) B.R. Ambedkar
c) Mahatma Gandhi
d) Bal Gangadhar Tilak
The correct answer is b) B.R. Ambedkar
819 When did India adopt its Constitution?
a) 15th August 1947
b) 20th February 1947
c) 26th January 1950
d) 9th December 1946
The correct answer is c) 26th January 1950
820 Which important human right is protected in Article 21 of the Constitution of India?
a) Right to Equality
b) Right to Freedom of Religion
c) Right to Freedom of Speech and Expression
d) Right to life and liberty
The correct answer is d) Right to life and liberty
821 Who unfurls the National Flag in Republic Day ceremony in the state capitals?
a) Chief Minister
b) Governor
c) Deputy Chief Minister
d) Finance Minister
The correct answer is b) Governor
822 National Bravery Awards are given to children for their indispensable courage on .. ?
a) 26th January
b) 15th August
c) 14th November
d) 2nd October
The correct answer is a) 26th January
823 From which Constitution was the Concept of a Five Year Plan borrowed into the Indian Constitution?
a) USA
b) USSR
c) UK
d) Ireland
The correct answer is b) USSR
824 What is the provision of Article 155 of Indian Constitution?
a) Constitution of Supreme Court
b) Right to Education
c) Abolition of Untouchability
d) Appointment of Governor
The correct answer is d) Appointment of Governor
825 The Republic Day parade starts from …….
a) Red Fort
b) India Gate
c) Rashtrapati Bhavan
d) Vijay Chowk
The correct answer is c) Rashtrapati Bhavan
826 The ceremony known as ‘Beating Retreat’ is held at…
a) Rashtrapati Bhavan
b) Red Fort
c) India Gate
d) Vijay Chowk
The correct answer is d) Vijay Chowk
827 Census held on 2011 was the __________of Independent India?
(a) 11th
(b) 12th
(c) 15th
(d) 7th
The Correct option is –(c) 7th
828 The provisional figures of India’s largest Census 2011 were released in New Delhi on?
(a) 31st April 2011
(b) 4th August 2011
(c) 2nd May 2011
(d) 31st March 2011
The Correct option is – 31st March 2011
829 The provisional figures of India’s largest Census 2011 were released in New Delhi were released by?
(a) Union Home Secretary
(b) Prime Minister
(c) Ministry of health and family welfare
(d) None of the Above
The Correct option is – (a) Union Home Secretary
830 With President Pratibha Patil being the first citizen to be enumerated, followed by?
(a) Prime Minister Manmohan Singh
(b) Chief Justice of India S.H. Kapadia
(c) Vice President Hamid Ansari.
(d) None of the Above.
The correct option is – (c) Vice President Hamid Ansari
831 What was the estimated cost of Census 2011?
(a) 11 Billion Rupees
(b) 22 Billion Rupees
(c) 11 Million Rupees
(d) 1 Billion Rupees
The Correct option is – (b) 22 Billion Rupees
832 Number of total number States/Union territories recorded in Census 2011 was?
(a) 35
(b) 27
(c) 34
(d) 31
The Correct option is – (a) 35
833 Number of districts recorded in Census was?
(a) 640
(b) 740
(c) 840
(d) 550
The Correct option is – (a) 640
834 Which state according to the Census 2011 is most populous ?
(a) Uttar Pradesh
(b) Maharashtra
(c) Bihar
(d) West Bengal
The Correct option – (a) Uttar Pradesh
835 Which state/UT according to the Census 2011 is least populous?
(a) Daman and Diu
(b) Sikki
m(c) Lakshadweep
(d) A & N Islands
The Correct option is – (a) Daman and Diu
836 Which state has recorded the highest sex ratio in state?
(a) Kerala
(b) Mizora
m(c) Haryana
(d) Punjab
The Correct option is – (a) Kerala
837 India qualified for the Soccer World Cup in 1950 but were refused permission to take part; why?
(a) They didn’t have coach.
(b) They were not allowed to play on Political issues.
(c) The players were not permitted to play in bare feet.
(d) None of the Above
The Correct option is – (c) The players were not permitted to play in bare feet
838 The word 'anserine' relates to which type of birds?
(a) Geese
(b) Kingfisher
(c) Sparrow
(d) None of the Above
The Correct option is – (a) Geese
839 What year was Inheritance Tax introduced in the UK?
(a) 1988
(b) 1977
(c) 1986
(d) 1999
The Correct option is – (c) 1986
840 What is the art of Japanese flower arranging called?
(a) Feng Shui
(b) Ikebana
(c) Florabana
(d) None of the Above
The Correct option is – (b) Ikebana
841 Which artist sculpted the lions at the foot of London's Nelson's Column?
(a) Sir Edwin Henry
(b) Sir Leopold
(c) Lord Henry IIIrd
(d) None of the Above
The Correct option is – (a) Sir Edwin Henry
842 In 1983 which film did Barbra Streisand co-write, direct, produce and star in?
(a) Terminator
(b) Aliens
(c) Star Wars 6
(d) Yentl
The Correct option is – (d) Yentl
843 If an object is hastate what shape is it?
(a) Circular
(b) Square
(c) Rectangular
(d) Triangular
The Correct option is – (d) Triangular
844 Which country had the first Women's Institute, in 1897?
(a) Australia
(b) Canada
(c) Great Britain
(d) Japan
The Correct option is – (b) Canada
845 Haldi is the Indian name for which spice?
(a) Coriander
(b) Star anise
(c) Turmeric
(d) Asafoetida
The Correct option is – (a) Coriander
846 Which US organization’s headquarters is situated in Langley, Virginia?
(a) NIA
(b) Interpol
(c) CIA
(d) None of the Above
The Correct option is – (c) CIA
847 Which of the following is an absolute cell reference?
a. !A!1
b. $A$1
c. #a#1
d. A1
Correct Answer: b
848 What symbol is used before a number to make it a label?
a. “ (quote)
b. = (equal)
c. _ (underscore)
d. ‘ (apostrophe)
Correct Answer: b
849 Which symbol must all formula begin with?
a. =
b. +
c. (
d. @
Correct Answer: a
850 Which of the following formulas is not entered correctly?
a. =10+50
b. =B7*B1
c. =B7+14
d. 10+50
Correct Answer: d
851 Which of the following formulas will Excel Not be able to calculate?
a. =SUM(Sales)-A3
b. =SUM(A1:A5)*.5
c. =SUM(A1:A5)/(10-10)
d. =SUM(A1:A5)-10
Correct Answer: a
852 A typical worksheet has …. Number of columns
a. 128
b. 256
c. 512
d. 1024
Correct Answer: b
853 How many characters can be typed in a single cell in Excel?
a. 256
b. 1024
c. 32,000
d. 65,535
Correct Answer: d
854 A worksheet can have a maximum of …. Number of rows
a. 256
b. 1024
c. 32,000
d. 65,535
Correct Answer: d
855 Which of the following is not an example of a value?
a. 350
b. May 10, 2001
c. 57%
d. Serial Number 50771
Correct Answer: d
856 The chart wizard term data series refers to
a. A chart legend
b. A collection of chart data markers
c. A set of values you plot in a chart
d. A data label
Correct Answer: b
857 The Chart wizard term data categories refers to;
a. A chart plot area
b. A horizontal axis
c. The organization of individual values with a chart’s data series
d. The data range that supply chart data
Correct Answer: b
858 A worksheet range is a
a. A command used for data modeling
b. A range of values such as from 23 to 234
c. A group of cells
d. A group of worksheets
Correct Answer: c
859 Getting data from a cell located in a different sheet is called …
a. Accessing
b. Referencing
c. Updating
d. Functioning
Correct Answer: b
860 Tab scrolling button
a. Allow you to view a different worksheet
b. Allow you to view additional worksheet rows down
c. Allow you to view additional worksheet columns to the right
d. Allow you to view additional sheets tabs
Correct Answer: d
861 A numeric value can be treated as a label value if it proceeds with
a. Apostrophe (&lsquo
b. Exclamation (!)
c. Hash (#)
d. Ampersand (&
Correct Answer: a
862 Concatenation of text can be done using
a. Apostrophe (
b. Exclamation (!)
c. Hash (#)
d. Ampersand (&
Correct Answer: d
863 Data can be arranged in a worksheet in a easy to understand manner using
a. auto formatting
b. applying styles
c. changing fonts
d. all of above
Correct Answer: d
864 You can use drag-and-drop to embed excel worksheet data in a word document
a. By dragging a range of excel data to the word button on the taskbar while pressing the Ctrl key
b. By dragging a range of excel data to the word button on the taskbar while pressing Shift key
c. By dragging a range of excel data to the word button on the taskbar while pressing Alt key
d. None of above
Correct Answer: a
865 The auto calculate feature
a. Can only add values in a range of cells
b. Provides a quick way to view the result of an arithmetic operation on a range of cells
c. Automatically creates formulas and adds them to a worksheet
d. A and c
Correct Answer: b
866 Excel uniquely identifies cells within a worksheet with a cell name
a. Cell names
b. Column numbers and row letters
c. Column letters and row numbers
d. Cell locator coordinates
Correct Answer: c
867 to view a cell comment
a. click the edit comment command on the insert menu
b. click the display comment command on the window menu
c. position the mouse pointer over the cell
d. click the comment command on the view menu
Correct Answer: c
868 When you want to insert a blank imbedded excel object in a word document you can
a. Click the object command on the insert menu
b. Click the office links button on the standard toolbar
c. Click the create worksheet button on the formatting toolbar
d. Click the import excel command on the file menu
Correct Answer: a
869 To save a workbook, you:
a. Click the save button on the standard toolbar from the menu
b. Press Ctrl+F5
c. Click Save on the Windows Start button
d. Select Edit>Save
Correct Answer: a
870 You can edit a cell by
a. Clicking the formula button
b. Double clicking the cell to edit it in-place
c. Selecting Edit>Edit Cell from the menu
d. None of above
Correct Answer: b
871 You can select a single range of cells by
a. Clicking the upper-left cell in a group of cells and then pressing the Shift key while clicking the lower right cell in a group of cells
b. Pressing the Ctrl key while dragging over the desired cells
c. Pressing the Shift key and an arrow key
d. Dragging over the desired cells
Correct Answer: d
872 Which elements of worksheet can be protected from accidental modification
a. Contents
b. Objects
c. Scenarios
d. All of above
Correct Answer: d
873 You can use the drag and drop method to
a. Copy cell contents
b. Move cell contents
c. Add cell contents
d. a and b
Correct Answer: d
874 It is acceptable of let long text flow into adjacent cells on a worksheet when
a. Data will be entered in the adjacent cells
b. No data will be entered in the adjacent cells
c. There is nt suitable abbreviation of the text
d. Tehere is not time to format the next
Correct Answer: b
875 How can you delete a record?
a. Delete the column from the worksheet
b. Select Data > Form from the menu to open the Data Form dialog box, find the record andClick the Delete button
c. Select Data > Delete Record from the menu
d. Click the Delete button on the Standard toolbar
Correct Answer: b
876 Right clicking something in Excel:
a. Deletes the object
b. Nothing the right mouse button is there for left handed people
c. Opens a shortcut menu listing everything you can do to the object
d. Selects the object
Correct Answer: c
877 Documentation should include
a. Destination and users of the output data
b. Source of input data
c. Information on the purpose of the workbook
d. All of the above
Correct Answer: d
878 Files created with Lotus 1-2-3 have an extension
a. DOC
b. XLS
c. 123
d. WK1
Correct Answer: c
879 To delete an embedded objects, first
a. Double click the object
b. Select the object by clicking it
c. Press the Shift + Delete keys
d. Select it and then press the delete key
Correct Answer: d
880 Comments can be added to cells using
a. Edit > Comments
b. Insert > Comments
c. File > Comments
d. View > Comments
Correct Answer: b
881 Which of the following is not a worksheet design criterion?
a. Efficiency
b. Aditibility
c. Description
d. Clarity
Correct Answer: c
882 To copy cell contents using drag and drop press the
a. End key
b. Shift key
c. Ctrl key
d. Esc key
Correct Answer: d
883 Which of the following is the latest version of Excel
a. Excel 2000
b. Excel 2002
c. Excel ME
d. Excel XP
Correct Answer: d
884 When you copy a formula
a. Excel erases the original copy of the formula
b. Excel edits cell references in the newly copied formula
c. Excel adjusts absolute cell references
d. Excel doesn’t adjust relative cell references
Correct Answer: b
885 The autofill feature
a. extends a sequential series of data
b. automatically adds range of cell values
c. applies a boarder around the selected cells
d. none of the above
Correct Answer: d
886 Which menu option can be ued to split windows into two
a. Format > window
b. View > window > split
c. Window > split
d. View > split
Correct Answer: c
887 Which of the following methods cannot be used to enter data in a cell
a. Pressing an arrow key
b. Pressing the Tab key
c. Pressing the Esc key
d. Clicking on the formula bar
Correct Answer: c
888 Which of the following will not cut information?
a. Pressing Ctrl + C
b. Selecting Edit>Cut from the menu
c. Clicking the Cut button on the standard
d. Pressing Ctrl+X
Correct Answer: a
889 Which of the following is not a way to complete a cell entry?
a. Pressing enter
b. Pressing any arrow key on the keyboard
c. Clicking the Enter button on the Formula bar
d. Pressing spacebar
Correct Answer: d
890 You can activate a cell by
a. Pressing the Tab key
b. Clicking the cell
c. Pressing an arrow key
d. All of the above
Correct Answer: d
891 Text formulas:
a. Replace cell references
b. Return ASCII values of characters
c. Concatenate and manipulate text
d. Show formula error value
Correct Answer: c
892 How do you insert a row?
a. Right-click the row heading where you want to insert the new row and select Insert from the shortcut menu
b. Select the row heading where you want to insert the new row and select Edit >Row from the menu
c. Select the row heading where you want to insert the new row and click the Insert Row button on the standard toolbar
d. All of the above
Correct Answer: a
893 Which of the following is not a basic step in creating a worksheet?
a. Save workbook
b. Modifiy the worksheet
c. Enter text and data
d. Copy the worksheet
Correct Answer: d
894 How do you select an entire column?
a. Select Edit > Select > Column from the menu
b. Click the column heading letter
c. Hold down the shift key as you click anywhere in the column.
d. Hold down the Ctrl key as you click anywhere in the column
Correct Answer: b
895 How can you print three copies of a workbook?
a. Select File>Properties form the menu and type 3 in the Copies to print text box.
b. Select File >Print from the menu and type 3 in the Number of copies text box.
c. Click the Print button on the standard toolbar to print the document then take it to Kinko’s and have 2 more copies made
d. Press Ctrl+P+3
Correct Answer: b
896 To create a formula, you first:
a. Select the cell you want to place the formula into
b. Type the equals sign (=) to tell Excel that you’re about to enter a formula
c. Enter the formula using any input values and the appropriate mathematical operators that make up your formula
d. Choose the new command from the file menu
Correct Answer: a
897 To center worksheet titles across a range of cells, you must
a. Select the cells containing the title text plus the range over which the title text is to be centered
b. Widen the columns
c. Select the cells containing the title text plus the range over which the title text is to be enfettered
d. Format the cells with the comma style
Correct Answer: a
898 How do you delete a column?
a. Select the column heading you want to delete and select the Delete Row button on the standard toolbar
b. Select the column heading you want to delete and select Insert Delete from the menu
c. Select the row heading you want to delete and select Edit>Delete from the menu
d. Right click the column heading you want to delete and select delete from the shortcut menu
Correct Answer: d
899 How can you find specific information in a list?
a. Select Tools > Finder from the menu
b. Click the Find button on the standard toolbar
c. Select Insert > Find from the menu
d. Select Data > Form from the menu to open the Data Form dialog box and click the Criteria button
Correct Answer: d
900 When integrating word and excel, word is usually the
a. Server
b. Destination
c. Client
d. Both b and c
Correct Answer: d
901 When a label is too long to fit within a worksheet cell, you typically must
a. Shorten the label
b. Increase the column width
c. Decrease the column width
d. Adjust the row height
Correct Answer: b
902 The name box
a. Shows the location of the previously active cell
b. Appears to the left of the formula bar
c. Appears below the status bar
d. Appears below the menu bar
Correct Answer: b
903 Comments put in cells are called
a. Smart tip
b. Cell tip
c. Web tip
d. Soft tip
Correct Answer: b
904 Which is used to perform what if analysis?
a. Solver
b. Goal seek
c. Scenario Manager
d. All of above
Correct Answer: d
905 You can use the horizontal and vertical scroll bars to
a. Split a worksheet into two panes
b. View different rows and columns edit the contents of a cell
c. Edit the contents of a cell
d. view different worksheets
Correct Answer: b
906 Multiple calculations can be made in a single formula using
a. standard formulas
b. array formula
c. complex formulas
d. smart formula
Correct Answer: b
907 Hyperlinks can be
a. Text
b. Drawing objects
c. Pictures
d. All of above
Correct Answer: d
908 To activate the previous cell in a pre-selected range, press
a. The Alt key
b. The Tab key
c. The Enter key
d. None of the above
Correct Answer: d
909 Which button do you click to add up a series of numbers?
a. The auto sum button
b. The Formula button
c. The quicktotal button
d. The total button
Correct Answer: a
910 When the formula bar is active, you can see
a. The edit formula button
b. The cancel button
c. The enter button
d. All of the above
Correct Answer: d
911 To copy formatting from one area in a worksheet and apply it to another area you would use:
a. The Edit>Copy Format and Edit>Paste Format commands form the menu.
b. The Copy and Apply Formatting dialog box, located under the Format>Copy and Apply menu.
c. There is no way to copy and apply formatting in Excel – You have to do it manually
d. The Format Painter button on the standard toolbar
Correct Answer: d
912 In a worksheet you can select
a. The entire worksheet
b. Rows
c. Columns
d. All of the above
Correct Answer: b
913 When you link data maintained in an excel workbook to a word document
a. The word document can not be edit
b. The word document contains a reference to the original source application
c. The word document must contain a hyperlink
d. The word document contains a copy of the actual data
Correct Answer: b
914 Which area in an excel window allows entering values and formulas
a. Title bar
b. Menu bar
c. Formula bar
d. Standard toolbar
Correct Answer: c
915 To hold row and column titles in place so that they do not scroll when you scroll a worksheet click the
a. Unfreeze panes command on the window menu
b. Freeze panes command on the window menu
c. Hold titles command on the edit menu
d. Split command on the window menu
Correct Answer: b
916 To edit in an embedded excel worksheet object in a word document
a. Use the excel menu bar and toolbars inside the word application
b. Edit the hyperlink
c. Edit the data in a excel source application
d. Use the word menu bar and toolbars
Correct Answer: a
917 To create a formula, you can use:
a. Values but not cell references
b. C ell references but not values
c. Values or cell references although not both at the same time
d. Value and cell references
Correct Answer: d
918 Status indicators are located on the
a. Vertical scroll bar
b. Horizontal scroll bar
c. Formula bar
d. Standard toolbar
Correct Answer: c
919 Which of the following is the oldest spreadsheet package?
a. VisiCalc
b. Lotus 1-2-3
c. Excel
d. StarCalc
Correct Answer: a
920 Rounding errors can occur
a. When you use multiplication, division, or exponentiation in a formula
b. When you use addition and subtraction in a formula
c. Because excel uses hidden decimal places in computation
d. When you show the results of formulas with different decimal places that the calculated results
Correct Answer: a
921 You can copy data or formulas
a. With the copy, paste and cut commands on the edit menu
b. With commands on ta shortcut menu
c. With buttons on the standard toolbars
d. All of the above
Correct Answer: d
922 You can not link excel worksheet data to a word document
a. With the right drag method
b. With a hyperlink
c. With the copy and paste special commands
d. With the copy and paste buttons on the standard toolbar.
Correct Answer: d
923 Which of the following is a popular DOS based spreadsheet package?
a. Word
b. Smart cell
c. Excel
d. Lotus 1-2-3
Correct Answer: d
924 An excel workbook is a collection of
a. Workbooks
b. Worksheets
c. Charts
d. Worksheets and charts
Correct Answer: d
925 Excel files have a default extension of
a. Xls
b. Xlw
c. Wk1
d. 123
Correct Answer: a
926 You can use the format painter multiple times before you turn it off by
a. You can use the format painter button on ly one time when you click it
b. Double clicking the format painter button
c. Pressing the Ctrl key and clicking the format painter button
d. Pressing the Alt key and clicking the format painter button
Correct Answer: b
927 What function displays row data in a column or column data in a row?
a. Hyperlink
b. Index
c. Transpose
d. Rows
Correct Answer: c
928 When you insert an Excel file into a Word document, the data are
a. Hyperlinked
b. Placed in a word table
c. Linked
d. Embedded
Correct Answer: b. Placed in a word table
929 Except for the …… function, a formula with a logical function shows the word “TRUE” or “FALSE” as a result
a. IF
b. AND
c. OR
d. NOT
Correct Answer: a
930 Macros are “run” or executed from the ….. menu.
a. Insert
b. Frmat
c. Tools
d. Data
Correct Answer: c
931 You can open the consolidate dialog box by choosing Consolidate from the ….. menu.
a. Insert
b. Format
c. Tools
d. Data
Correct Answer: d
932 Each excel file is called a workbook because
a. It can contain text and data
b. It can be modified
c. It can contain many sheets including worksheets and chart sheets
d. You have to work hard to create it
Correct Answer: c
933 Which types of charts can excel produce?
a. Line graphs and pie charts only
b. Only line graphs
c. Bar charts, line graphs and pie charts
d. Bar charts and line graphs only
Correct Answer: c
934 How are data organized in a spreadsheet?
a. Lines and spaces
b. Layers and planes
c. Rows and columns
d. Height and width
Correct Answer: c
935 What does the VLOOKUP function do?
a. Looks up text that contain ‘v’
b. Checks whether text is the same in one cell as in the next
c. Finds related records
d. All of above
Correct Answer: c
936 Gridlines
a. May be turned off for display but turned on for printing
b. May be turned on or off for printing
c. The be turned off for display and printing
d. a, b and c
Correct Answer: d
937 You can activate a cell by
a. Pressing the Tab key
b. Clicking the cell
c. Pressing an arrow key
d. All of above
Correct Answer: d
938 Which of the following setup options can not be set in the page setup dialog box?
a. Printer selection
b. Vertical or horizontal placement
c. Orientation
d. Row and column titles
Correct Answer: a
939 What term refers to a specific set of values saved with the workbook?
a. Range
b. Scenario
c. Trend line
d. What-if analysis
Correct Answer: b
940 Got functions? No? You need the insert function dialog box. How do you get it?
e. Right click a cell and then click insert
f. Click the insert menu and then click function
g. Type = in a cell
h. All of the above
Correct Answer: b
941 Which of the following describes how to select all the cells in a single column?
a. Right click on column and select Pick from list
b. Use data – text to columns menu ite
mc. Left click on the gray column title button
d. Pressing Ctrl + A on the keyboard
Correct Answer: c
942 when you use the fill effects in the format data series dialog box, you can not
a. rotate text on the chart
b. select a fore ground color
c. select a pattern
d. select a background color
Correct Answer: a
943 Paper spreadsheets can have all the same advantages as an electronic spreadsheet except which of the following?
a. Rows and columns
b. Headings
c. Speed
d. None
Correct Answer: c
944 Which of the following is not a basic step in creating a worksheet?
a. Save the workbook
b. Modify the worksheet
c. Enter text and data
d. Copy the worksheet
Correct Answer: d
945 What’s a quick way to extend these numbers to a longer sequence, for instance 1 through 20?
a. Select both cells, and then drag the fill handle over the range you want, for instance 18 more rows
b. Select the range you want, include both cells, point to fill on the Edit menu, and then click down.
c. Copy the second cell, click in the cell below it, on the standard toolbar click the down arrow on the Paste button, and then click Paste Special
d. All of above
Correct Answer: a
946 To insert three columns between columns D and E you would
a. Select column D
b. Select column E
c. Select columns E, F and G
d. Select columns D, E, and F.
Correct Answer: b
947 To center worksheet titles across a range of cell, you must
a. Select the cells containing the title text and use the fill handle to center the text across a range of cells
b. Widen the columns
c. Select the cells containing the title text and use the fill handle to center the text across a range of cells
d. Widen the column
Correct Answer: a.
948 When integrating Ms-Word and Excel, Word is usually the
a. Server
b. Source
c. Client
d. None
Correct Answer: c. Client
949 Charts tips can
a. Show the formatting of a data label
b. Show the name of a data series
c. Show the value of data point
d. b and c
Correct Answer: d
950 The Name box
a. Shows the location of the previously active cell
b. Appears t the left of the formula bar
c. Appears below the status bar
d. Appears below the menu bar
Correct Answer: b
951 How do you change column width to fit the contents?
a. Single-click the boundary to the left to the column heading
b. Double click the boundary to the right of the column heading
c. Press Alt and single click anywhere in the column
d. All of above
Correct Answer: b
952 when you work with large worksheets, you may need to
a. size the worksheet to fit on the specific number of pages
b. add and remove page breaks
c. specify only certain print areas
d. all of above
Correct Answer: d
953 Hyperlinks cannot be
a. Special shapes like stars and banners
b. Drawing objects like rectangles ovals
c. Pictures
d. All can be hyperlinks
Correct Answer: d. All can be hyperlinks
954 You can use the horizontal and vertical scroll bars to
a. Split a worksheet into two panes
b. View different rows and columns
c. Edit the contents of a cell
d. View different worksheets
Correct Answer: b
955 What do we call a computer program that organizes data in rows and columns of cells? You might use this type of program to keep a record of the money you earned moving lawns over the summer.
a. Spreadsheet progra
mb. Database progra
mc. Word processor progra
md. Desktop publisher progra
mCorrect Answer: A
956 You can add an image to a template by clicking the Insert Picture From File button on the …. Toolbar.
a. Standard
b. Formatting
c. Drawing
d. Picture
Correct Answer: d
957 To drag a selected range of data to another worksheet in the same workbook, use the
a. Tab key
b. Alt key
c. Shift key
d. Ctrl key
Correct Answer: d
958 When creating a vertical page break
a. The active cell must be A1
b. The active cell can be anywhere in the worksheet
c. The active cell must be in row 1
d. The active cell must be in column A
Correct Answer: c
959 to activate the previous cell in a pre-selected range, press
a. the Alt key
b. the Tab key
c. the Enter key
d. none of above
Correct Answer: d
960 When the formula bar is activated, you can see
a. The Edit Formula button
b. The Cancel button
c. The Enter button
d. All of above
Correct Answer: d
961 In a worksheet you can select
a. The entire worksheet
b. Rows
c. Columns
d. a, b, and c
Correct Answer: d
962 when you print preview a worksheet
a. the entire worksheet is displayed
b. the selected range is displayed
c. the active portion of the worksheet is displayed
d. a, b and c
Correct Answer: d
963 You can group noncontiguous worksheets with
a. The group button on the standard toolbar
b. The shift key and the mouse
c. The ctrl key and mouse
d. The alt+enter key
Correct Answer: c
964 Weight refers to
a. The print density of characters
b. The height of the printed character
c. Upright or slanted shape
d. The design and appearance of characters
Correct Answer: a
965 When you link data maintained in Excel workbook to a Word document
a. The Word document cannot be edited
b. The Word document contains a reference to the original source application
c. The word document must contain a hyperlink
d. The word document contains a copy of the actual data
Correct Answer: b. The Word document contains a reference to the original source application
966 When you see a cell with a red triangle in the top right corner, what does this signify?
a. There is an error in the cell
b. There is a comment associated with the cell
c. The font color for text in the cell is red
d. A formula cannot be entered into the cell
Correct Answer: b
967 To hold row and column titles in places so that they do not scroll when you scroll a worksheet, click the
a. Unfreeze panes command on the window menu
b. Freeze panes command on the window menu
c. Hold titles command on the edit menu
d. Split command on the window menu
Correct Answer: b
968 Which of these is a quick way to copy formatting from a selected cell to two other cells on the same worksheet?
a. Use Ctrl to select all three cells, then click the paste button on the standard toolbar
b. Copy the selected cell, then select the other two cells, click style on the Format menu, then click Modify
c. Click format painter on the Formatting toolbar twice then click in each cell you want to copy the formatting to
d. All of above
Correct Answer: c
969 To edit data in an embedded Excel worksheet object in a Word document
a. Use the Excel menu bar and toolbars inside the word application
b. Edit the hyperlink
c. Edit the data in a Excel source application
d. Use the Word menu bar and toolbars
Correct Answer: a. Use the Excel menu bar and toolbars inside the word application
970 Status indicators are located on the
a. Vertical scroll bar
b. Horizontal scroll bar
c. Formula bar
d. Formatting toolbar
Correct Answer: c
971 You can open the scenario Manager dialog box by choosing scenarios from the ….. menu.
a. View
b. Insert
c. Format
d. Tools
Correct Answer: d
972 You can open the Sort dialog box by choosing Sort from the ….. menu
a. View
b. Format
c. Tools
d. Data
Correct Answer: d
973 when working in the page break preview, you can
a. view exactly where each page break occurs
b. add or remove page breaks
c. change the print area
d. all of above
Correct Answer: d
974 A data map is helpful
a. When you have too much data to chart
b. To show a geographic distribution of data
c. To compare data points
d. To show changes in data over time
Correct Answer: b
975 Rounding errors can occur
a. When you use multiplication, division or exponentiation in a formula
b. When you use addition and subtraction in a formula
c. Because Excel uses hidden decimal places in computation
d. When you show the results of formulas with different decimal places than the calculated results
Correct Answer: a
976 You can copy data or formulas
a. With the copy, paste and cut commands on the edit menu
b. With commands on a shortcut menu
c. With buttons on the standard toolbar
d. All of the above
Correct Answer: d
977 You can zoom a worksheet
a. With the mouse pointer in Print Preview
b. With the zoom button on the Print Preview toolbar
c. With the Zoom command on the view menu
d. All of the above
Correct Answer: d
978 You can not link Excel worksheet data to a Word document
a. With the right drag method
b. With a hyperlink
c. With the copy and paste special commands
d. With the copy and paste buttons on the standard toolbar
Correct Answer: d. With the copy and paste buttons on the standard toolbar
979 This type of software is similar to an accountant’s worksheet
a. Word processing
b. Database
c. Spreadsheets
d. Graphics
Correct Answer: c
980 which function will calculate the number of workdays between 6/9/2004 and 8/12/2004?
a. Workday
b. Date
c. Networkdays
d. All of the above
Correct Answer: d
981 Data marker on a chart are linked to data points in a worksheet, therefore,
a. You can automatically apply formatting to a data series
b. You can change the position of a data marker and automatically change the data point value in the worksheet
c. You can change a data print value and automatically are draw the chart
d. a and b
Correct Answer: b
982 When you group worksheets
a. You can enter variable data on multiple worksheets at one time
b. You can print more than one worksheet at a time
c. You can enter common data, formats, and formulas on multiple worksheets at one time
d. b, and c
Correct Answer: d
983 You can use the format painter multiple times before you turn it off by
a. You can use the format painter button only one time when you click it
b. Double clicking the format painter button
c. Pressing the Ctrl key and clicking the format painter button
d. Pressing Alt key and clicking the format painter button
Correct Answer: b
984 The default header for a worksheet is
a. Your name
b. The date and time
c. None
d. The sheet tab name
Correct Answer: c
985
A parallel port is most often used by
(A) Mouse (B) Monitor
(C) Printer (D) Keyboard
Ans: C
986
Blue tooth technology allows:
(A)
Landline phone to mobile phone communication
(B)
Wireless communication between equipments
(C)
Signal transmission on mobile phones only
(D)
Satellite television communication
Ans: B
987
Which of the following is an example of an optical disk?
(A) Memory disk (B) Magnetic disk
(C) Hard disk (D
) Digital versatile disk
Ans: D
988
Which of the following is(are) an example of storage devices?
(A) Tapes (B) DVDs
(C) Magnetic disks (D) All of these
Ans: D
989
IC chips used in computers are made of
(A) Silicon (B) Chromium
(C) Lead (D) Silver
Ans: A
990
Which of the following is not an example of Operating System?
(A) Microsoft Office (B) Windows Vista
(C) Unix (D) Ubuntu Linux
Ans: A
991
Which supercomputer is developed by the Indian Scientists?
(A) Sequoia (B) Param
(C) Mira (D) Jaguar
Ans: B
992
'OS' in computer system means ?
(A) Open System (B) Open Software
(C) Operating System (D) All of these
Ans: C
993
'.MOV' extension refers to:
(A) Word file (B) Text file
(C) Image file (D) Movie file
Ans: D
994
'.MPG' extension refers to:
(A) Word file (B) Text file
(C) Image file (D) Movie file
Ans: D
995
'.INI' extension refers to:
(A) Image file (B) System file
(C) Movie file (D) Word file
Ans: B
996
Select the odd term out?
(A) Windows (B) Linux
(C) Unix (D) Internet
Ans: D
997
What is the full form of WWW in Internet?
(A) World Wide Web (B) World Wide Word
(C) World Wide Wood (D) None of these
Ans: A
998
Which Command is used to reboot the computer?
(A) Ctrl+Shift+Del
(B) Ctrl+Del+End
(C) Ctrl+Alt+Del (D) Both (A) and (C)
Ans: C
999
The blinking symbol on the computer screen:
(A) Mouse (B) Cursor
(C) Character (D) Blinker
Ans: B
1000
Which of the following refers to a small local network?
(A) LAN (B) WAN
(C) MAN (D) SLN
Ans: A
Computer GK, 1500 Questions answers, Part 2
Reviewed by vishal
on
November 18, 2018
Rating:
computermobile.info - We all use computers and smartphones in our work and personal lives. It becomes frustrating when the machines do not work as expected. Computermobile.info is an educational website helps us solve software, hardware, network, internet or security issues we may encounter while using these devices. The website provides a brief introduction to the software or hardware system before launching detailed solutions. The website provides step-by-step instructions with accompanying screenshots are easy to understand and follow. The website touches upon the vast
ReplyDeletefield of computer science, giving us an excellent overview of various topics. For More Visit: Computer Mobile Info