A group of eight bits is called
1.buzz
2.nibble
3.byte
4.word
A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a ________
1.spammer
2.hacker
3.instant messenger
4.programmer
A web page is located using a
1.Universal Record Locator
2.Universal Resource Locator
3.Uniform Record Linking
4.Universal Record Linking
Bold Italic Regular are known as
1.Text Effects
2. Font Styles
3.Font Effects
4.Word Art
Bootstrapping is also known as
1. hot boot
2.cold-hot boot
3.cold boot
4.quick boot
Chief component of first generation computer was
1.Vacuum tubes
2.integrated circuits
3.transisters
4.None of the above
Compatibility in regard to computers refers to ________
1.The software doing the right job for the user
2. It being versatile enough to handle the job
3.The software being able to run on the computer
4. Software running with other previously installed software
Computer programs are written in a high level programming language however the human readable version of a program is called _______
1.Cache
2.Instruction set
3.Source code
4.None of these
Digital computers use a ......... system to encode date and programs.
1.semiconductor
2.decimal
3.binary
4.RAM
EPROM can be used for
1.Erasing and reconstructing the contents of ROM
2.Duplicating ROM
3.Reconstructing the contents of ROM
4.Erasing the contents of ROM
Every component of your computer is either
1.Hardware or CPU
2.RAM/CPU or Hardware
3.Hardware or Software
4. System or Application software
Expansion cards are inserted into
1.Peripheral Devices
2.Pegs
3.Slots
4.The back of the computer
he term computer is derived from
1.Latin language
2.Sanskrit language
3.Greek language
4.German language
If a new device is attached to a computer such as printer or scanner its ______ must be installed before the device can be used
1.buffer
2.driver
3.pager
4.server
In HTML ______________ is a set of links designed as buttons.
1.Header area
2. Menu bar
3.Body of the page
4. Footer area
In HTML ______________ is at the bottom of the page and usually contains disclaimers copyright information etc.
1.Header area
2.Menu bar
3.Body of the page
4.Footer area
INI extension refers usually to what kind of file?
1.System file
2.Image Color Matching Profile file
3.Hypertext related file
4. Image file
Inventor of WWW is ______
1.Bill Gates
2. Lee.N.Feyong
3.N. Resscl
4.Tim Berners Lee
Main storage is also called
1.Memory
2.Control unit
3.Accumulator
4.Register unit
nternet Explorer falls under
1.an internet web browser
2.a compiler
3.an operating system
4.an IP address
Output devices make it possible to
1.View and print a data
2.Scan a data
3.Input a data
4.Sending a data
PARAM was developed by
1.C-DAC
2.IIT Kanpur
3.BARC
4.IIT Delhi
Programs stored in ROM are called
1.Hardware
2.Firmware
3.Freeware
4.Software
Properly arranged data is called
1.Information
2.File
3.Field
4.Words
Round robin scheduling falls under the category of
1.Preemptive scheduling
2.Non preemptive scheduling
3.Both A & B
4.None of the above
Secondary storage ________
1.does not require constant power
2.does not use magnetic media
3.consists of four main types of devices
4.does not store information for later retrieval
Software you can use to create a budget is called _______
1.word processing software
2.graphics software
3.utility software
4.spreadsheet software
The combination of operating system and processor in a computer is reffered to as a computers ________
1.firmware
2.specifications
3.minimum requirements
4.platform
The common name for the crime of stealing passwords is
1.Spoofing
2.Surfing
3.Identity Theft
4.Speeling
The function of BIOS is to
1.Initialize the system hardware components
2. Update the system
3.Ensure system performance
4.Save the system from crashing
The primary tool used in structured design is a
1.module
2.structure chart
3.program flowchart
4.data-flow diagram
The symbols used in an assembly language are called ?
1.Assembler
2.Mnemonics
3.Codes
4.All of the above
The two kinds of Main Memory are
1.Random and sequential
2. ROM and RAM
3. Primary and secondary
4.All the above
The ______ is a box that houses the most important parts of a computer system.
1.Software
2.Hardware
3. Input drive
4. System unit
To copy cell contents using drag and drop press the
1.Shift key
2.Alt key
3. End key
4.Ctrl key
What could cause a Fixed Disk Error?
1.Slow Processor Speed
2.RAM Space
3.Incorrect CMOS Settings
4.None
What is the most common way to get a virus in your computers hard disk?
1.By installing games from CD ROMs
2. By opening e-mails
3.By uploading pictures from mobile to the computers
4.By sending e-mails
Where does a computer add and compare data?
1.CPU chip
2.Hard disk drive
3.Memeory chip
4.Disc drive
Which of the following could be digital input devices for computers?
1.Digital camcorder
2.Microphone
3.Scanner
4.All of the above
Which of the following is NOT a Software?
1.Compiler
2.Adobe
3.Microsoft Office
4.Drivers
Which of the following is the largest unit of storage?
1.GB
2.KB
3.MB
4.TB
Which of the following menu types is also called a drop down menu?
1.fly-out
2.cascading
3.pop-up
4.pull-down
Which of these is not a means of personal communication on the internet ?
1.Instant messaging
2.Chat
3.Electronic mail
4.Instanotes
Which operation is not performed by computer?
1.Understanding
2.Controlling
3.Processing
4.Inputting
Which type of memory holds only the program and data that the CPU is presently processing?
1.CMOS
2.ROM
3.RAM
4.ASCII
Word length of a personal computer is
1.32 bit
2.16 bit
3.8 bit
4.4 bit
World Wide Web is being standard by
1.W3C
2.World Wide Web Standard
3.Worldwide corporation
4.World Wide Consortium
You organize files by storing them in
1.Lists
2.Archives
3.Folders
4.Indexes
______ is a process of searching bugs in software
1.Compiling
2.Testing
3.Runnung
4.Debugging
_______ hard drives are permanently located inside the system unit and are not designed to be removed unless they need to be repaired or replaced
1.Static
2.Internal
3.External
4.Remove