Nff]s
;]jf cfof]u
cf}Bf]lus
If]q Joj:yfkg lnld6]8, k|fljlws, kfFrf}, ;"rgf k|ljlw÷;j–OlGhlgo/ kbsf]
k|ltof]lutfTds
lnlvt k/LIff
@)&%÷)@÷@(
KEY [B]
;do M ! 306f k"0f{fÍ M %)
ljifo M sDKo'6/ ;DaGwL
pQ/k'l:tsfdf k|Zgkqsf] KEY clgjfo{
?kn] pNn]v ug{'k5{ . pNn]v gu/]df pQ/k'l:tsf /2 x'g]5 . k/LIffdf calculator, mobile k|of]u
ug{ kfOg]5}g .
Multiple choice
1 which feature is
used for monitoring all document changes?
A) Edit
document B) Monitor change C) Track change D) Track all
2 which language is
used to create macros in excel?
A) Visual
Basic B) C C) visual C++ D) Java
3. What does the VLOOKUP function do ?
A) find related
records
B) Check whether
text is the same in one cell as in the text
C) Looks up text
that contain 'V'
D) All of the
above
4. Where can you find the Draw table tool button?
A) Formatting
toolbar B)Drawing toolbar
C) Standard
toolbar D) Tables and formatting toolbar
5. What does WWW stands for?
A) World Wide Webster B)
World With Web
C) World Wide Web D)
World Without Web
6. Which of the following tag is used to mark a beginning of
paragraph?
A) <TD> B) <br> C) <P> D) <TR>
7. A webpage displays a picture . What tag is used to display
that picture?
A) picture B) image C) img D) src
8. Text within <EM></EM> tag is displayed as
A) bold B) italic C) list D) indented
9. As per the Electronic Transaction Act , which of the
following is not the provision
Relating to
electronic record and digital signature?
A) Authenticity
of electronic record B)
Legal recognition of electronic record
C) Secured
digital signature D)
Appointment of the controller
10. Which of the following is
/are the DDL statement/s?
A) create B)
drop C)
alter D) all of the
above
11. What are the columns in a
Microsoft Access table called?
A) Rows B)
fields C)
cells D) records
12. Cascade deletes option
A) is used to delete all the records of
all tables in a database
B) will repeat the recent delete operate
to all the records of current table
C) is available in edit relationship
dialog box which makes sure that all the related records Will be delete automatically when the
record from parent table is delete
D) none of the above
13. How will you write query
parameter to retrieve records having item ID less than 100, Greater than 50 ?
A) <100 and>50 B) <100 or>500 C) Both A and B D) none of the
above
14.
Authentication refers to
A) methods of restricting user access to
system
B) controlling access to portions of data
C) controlling the operation on the data
D) all of the above
15. To control
access to the database, SQL statement/s is /are used
A) Grant B)
Revoke C) Both
A and B D) Deny
16. Which of
the following memory needs refreshing?
A) SRAM B)
DRAM C) ROM D)
all of the above
17. The
instructions that tell a computer how to carry out the processing takes are
referred as
A) programs B)
processors C) input devices D) memory modules
18. In computer
security, ........... means that computer system assets can be modified only by
authorized parties.
A) confidentially B) integrity C) availability D) authenticity
19. A computer
program that converts an entire program into machine language is called a/ an
A) interpreter B) simulator C) compiler D)
commander
20. Which of
the following controls the process of interaction between the user and the operating system?
A) User interface B) Language translator C)
platform D) screen saver
21. A program
that copies itself over network connection moving from one computer to
another computer is usually called
A) Worm B)
Virus C)
Trojan horse D) Trap door
22. Which of
the following technology was used in 3rd generation computer?
A)
transistor B) vacuum tube C) magnetic tape D) IC
23. What is
compiler?
A) A compiler does a conversion line by
line as the program is run
B) A compiler converts the whole of a
higher level program code into machine code in one Step
C) A compiler is a general purpose language
providing very efficient execution
D) None of the above
24. From what
location are that 1st computer instructions available on boot up?
A) ROM BIOS B) CPU C)
boot.ini D)
CONFIG.SYS
25. Which of
the following device can be used to directly input printed text?
A) OC B)
OMR C) MICR D) None of the
above
26. Which of
the following have the fastest access time?
A) Semiconductor
memories B) magnetic disks C) magnetic tapes D) compact disks
27. What is/are
the essential element/s that protect computer and computer room?
A) Door lock B) password C) air conditioner D) all of the above
28. Personal
computers can be connected together to form a
A)
server B)
supercomputer C)
network D) enterprise
29. the command
allows you to create logical drive
A)
sort B)
path C)
subst D) bath
30. A hard disk
is divide into tracks which are further subdivided into
A) clusters B) sectors C)
vectors D) heads
31. Which
statement is false?
A) you can find deleted files in recycle
bin
B) you can restore any files in recycle bin
if you ever need
C) you can increase free space of disk by
sending files in recycle bin
D) you can right click and choose empty
recycle bin to clean it at once
32. What could
cause a fixed disk error?
A) No-CD installed B) bad ram C) slow processor D) incorrect CMOS setting
33. What to
make the computer boot from CD drive?
A) configure in setup at the start of the computer B)
configure in window's registry
C) configure in window's control panel D) all of the
above
34. Which of
the following is a private IP address?
A) 190.168.1.1 B) 191.168.l.1 C)
192.168.1.1 D)
193.168.1.1
35.
Multiprocessor system have advantage of
A) increased throughput B)
expensive hardware
C) operating system D) both A and B
36. CPU fetches
the instruction from memory according to the value of
A) program counter B) status register
C) instruction register D) program
status word
37. Only file
names and extensions are to be displayed in wide format, which command you'll
use?
A) Dir/w B) Dir a: C) Dir/s D) Dir/b
38. Which of
the following is a program group ?
A) Accessories B) paint C)
word D) all of the
above
39. which of
the following method is used to speed up the computer performance?
A) Disk scanning B) Disk formatting C) Disk fragmentation D) all of the above
40. The
networking topology with highest reliability is ........ topology
A) bus B)
star C) ring D) mesh
41. IPv6
has....... bit address.
A) 32 B)
64 C) 128 D) variable
42. Which one
of the following extends a private network across public networks?
A) local area network B) virtual
private network
C) enterprise private network D) storage area network
43. Which of
the following is used to convert computer's binary digits to signals suitable
for
transmission over the telephone lines?
A) Direct cable B) LAN C)
CPU D) Modem
44. The maximum
number of IP address that can be assigned to hosts on a local subnet that uses
the 255.255.255.224 subnet mask is
A) 14 B)
15 C) 16 D) 30
45. How do you
change column width to fit the contents in Ms-Excel?
A) Single click the boundary to the left
to the column heading
B) Double click the boundary to the left
to the column heading
C) Press Alt and single click anywhere in
the column
D) all of the above
46. What does
mail merge means:
A) same content to different address B) different content to
different address
B) different content to same address D) same
content to same address
47. Where is footnote
located?
A) top of the page B) bottom of the document
C) bottom of the page D) none of the
above
48. In Microsoft
PowerPoint in order to see all the slides on one screen use
A) view,slide sorter B) view,slide C)
view,master D)
view,slide show
49. In the
formula, which symbol specifies the fixed columns or rows?
A) $ B)
* C) % D) &
50. Which
function do you use to return the remainder after a number is divided by a
divisor ?
A) ROUND( ) B) FACT( ) C)
MOD( ) D) DIV( )
Answer sheet
1. C
|
2. A
|
3. A
|
4. D
|
5. C
|
6. C
|
7. C
|
8. B
|
9. D
|
10. D
|
11. B
|
12. C
|
13. B
|
14. D
|
15. C
|
16. B
|
17. A
|
18. B
|
19. C
|
20. A
|
21. B
|
22. D
|
23. B
|
24. A
|
25. A
|
26. A
|
27. D
|
28. C
|
29. C
|
30. B
|
31. C
|
32. D
|
33. C
|
34. C
|
35. A
|
36. A
|
37. A
|
38. A
|
39. D
|
40. D
|
41. C
|
42. B
|
43. D
|
44. D
|
45. B
?
|
46. A
|
47. C
|
48. A
|
49. A
|
50. C
|
No comments:
Post a Comment