Choose a topic to test your knowledge and improve your UPSC,PCS,CDS,NDA skills
The _____ manual tells you how to use a software program.
Which of the following is NOT a type of broadband Internet connection?
Software; such as viruses; worms and Trojan horses; that has a malicious intent; is known as:
Making a field ______ me Ans: that it cannot be left blank.
______ is the process of finding errors in software code.
______ are viruses that are triggered by the passage of time or on a certain date.
Linux is a (n) ____________ operating system.
What is a backup?
Which of the following places the common data elements in order from smallest to largest
The internet is ......
______ are lists of commands that appear on the screen.
Which of the following statements is FALSE concerning file names?
Verification of a login name and password is known as:
Which of the following would most likely NOT be a symptom of a virus?
If a word is typed that is not in Word’s dictionary; a ____________ wavy underline appears below the word
The ____________ button on the quick access Toolbar allows you to cancel your recent commands or actions.
In Excel; any set of characters containing a letter ; hyphen; or space is considered—
____Software allows users to perform calculations on rows and columns of data.
A ____________represent approximately one billion memory locations.
______cells involves creating a single cell by combining two or more selected cells.
The operating system is the most common type of ____________ software.
When you quickly press and release the left mouse button twice ; you are—
The horizontal and vertical lines on a worksheet are called—
To delete an incorrect character in a document; ____________ to erase to the right of the insertion point.
The operating system does all of the following EXCEPT:
During the boot process; the ____________ looks for the system files.
____ are lists of commands that appear on the screen.
____ is the ability of an operating system to control the activities of multiple programs at the same time.
The unique signal; generated by a device; that tells the operating system that it is in need of immediate attention is called an:
The operating system controls access to the processor by assigning a (n) ____________ to each task requiring the processor’s attention
The blocks of code; included in the operating system; that software applications interact with are known as:
MS-DOS is a ____________ operating system.
An interrupt handler is a (n):
A spooler is a (n):
Virtual memory is typically located:
The purpose of a swap (or page) file is to:
The definition of thrashing is:
All of the following are TRUE of Safe Mode EXCEPT:
The combination of the operating system and the processor is referred to as the computer’s:
The following message generally means:
Which of the following is the correct sequence of actions that takes place during the bootup process?
All of the following are steps involved in the boot process EXCEPT:
The ____________; stored on a ROM chip; is responsible for loading the operating system from its permanent location on the hard drive into RAM.
The basic input/output system (BIOS) is stored in:
Ensuring that the essential peripheral devices are attached and operational is the ____________ process.
The memory resident portion of the operating system is called the—
Which of the following does NOT occur during the power-on self-test (POST)?
All of the following are TRUE regarding virtual memory EXCEPT—
The operating system allows users to organize the computer’s contents in a hierarchical structure of directories that include all of the following EXCEPT: