Saturday, 27 December 2014

Computer Quiz

1. IP address contains ........... bits.
(1) 8 bits
(2)16 bits
(3) 32 bits
(4) 40 bits
(5) None of these


2. Which key is used to indent a paragraph in MS word ?
(1) Shift
(2) tab
(3) Ctrl
(4) Esc
(5) None of these

3. Which is the example of spread sheet ?
(1)  MS word
(2) MS excel
(3)  Power point
(4) MS Access
(5) None of these

4. Name of the executable file of MS word is-
(1) MS Word
(2) MS Word .exe
(3) Win Word
(4) Win Word.exe
(5) None of these

5. Which disk contains permanent magnetic disk ?
(1) CD
(2) DVD
(3) HDD
(4) BRD
(5) None of these

6._________ is the process of finding and removing errors in software code.
(1) Debugging
(2) Compiling
(3) Testing
(4) Running
(5) None of these

7. ____________ are viruses that are triggered by the passage of time or on a certain date.
(1) Boot-sector viruses
(2) Macro viruses
(3) Time bombs
(4) Worms
(5) None of these

8. Linux is a (n)______ ______ operating system.
(1) open-source
(2) Microsoft
(3) Windows
(4) Mac
(5) None of these

9. What is a backup?
(1) Restoring the information backup
(2) An exact copy of a system’s information
(3) The ability to get a system up and running in the event of a system crash or failure
(4) All of these
(5) None of these

10. Which of the following places the common data elements in order from smallest to largest
(1) character, file, record, field, database
(2) character, record, field, database, file
(3) character, field, record, file, database
(4) Bit, byte, character, record, field, file, database,
(5) None of these

11. What is the file extension of Ms-Word document?
1) Dot
2) Doc
3) Dom
4) Txt
5) None of these

12. The vast network of computers that connects millions of people all over the world is called—
1) LAN
2) Web
3) Hypertext
4) Internet
5) None of these

13.________ is a primary key that also appears in another file.
1) Physical key
2) Primary key
3) Foreign key
4) Logical key
5) None of these

14. The software component of an export system that draws conclusion is the
1) User interface
2) Database
3) Inference engine
4) I/O controller
5) Model Base

15.________ is an invalid type of database key.
1) Structured primary key
2) Atomic primary key
3) Primary key
4) Composite primary key
5) None of these

16. The OSI model is divided into_______ processes called layers.
(1) five
(2) six
(3) seven
(4) eight
(5) None of these

17. System software is the set of programs that enables your computer’s hardware devices and______ software to work together.
(1) management
(2) processing
(3) utility
(4) application
(5) None of these

18. ________ are specially designed computer chips which reside inside other devices, such as your car or your electronic thermostat.
(1) Servers
(2) Embedded computers
(3) Robotic computers
(4) Mainframes
(5) None of these

19. The following are all computing devices , except………
(1) notebook computers
(2) cellular telephones
(3) digital scanners
(4) personal digital assistants
(5) None of these

20. In a ring topology , the computer in possession of the______ can trasmit data
(1) packet
(2) data
(3) access method
(4) token
(5) None of these


ANSWERS
1. (3)
2. (2)
3. (2)
4. (4)
5. (3)
6. (1)
7. (3)
8. (1)
9. (4)
10. (3)
11. (2)
12. (4)
13. (3)
14. (3)
15. (1)
16. (3)
17. (4)
18. (2)
19. (3)
20. (4)






No comments:

Post a Comment