GNS 312 by Plato
GNS 312 by Plato
GNS 312 by Plato
O
(PLATO)
SECTION A
1. A power point presentation is a collection of electronic slides that can have
the following except _____ (a) graphics (b)tables (c)sound (d)graphs
2. The ____ is the top portion of the document (a)File menu tab (b)Ribbon
(c)Slide show (d)Transition
3. Ctrl+Z is used to _____ (a)Redo (b)Undo (c)Cut selected text (d)Indent
selected text in word processors
4. To create a new slide from office themes, you first _____ (a)click the slide
choice that fits your material (b)select the slide immediately before
where you want the new slide (c)click the new slide button on the home
tab (d)click blank presentation
5. When you delete a file or folder in windows, it is temporarily placed in the
____ (a)Dustbin (b)File Menu Bar (c)Recycle Bin (d)Cycled Bin
6. HTML means _____ (a)Hypertable Markup Language (b)Hypert Markup
Language (c)Hybertrial Makeup Language (d)Hypertext Markup
Language
7. ATM means _____ (a)Automation Teller Machine (b)Automated Teller
Machine (c)Automation Televised Machine (d)Automated Televised
Machine
8. All except one is not a database component (a)Tables (b)Queries (c)Forms
(d)Graphs
9. Which of the following is not an operating system (a)UNIX (b)LINUX
(c)FORTRAN (d)UBUNTU
10. All but one is not a database software (a)MS Access (b)FileMaker
(c)dBase (d)dRoot
11. ____ is the art and science of hiding the intent of a communication
from unintended recipients (a)secrecy (b)privacy (c)abstraction
(d)encryption
12._____ is a software intentionally designed to cause damage to a computer,
server or client (a)hacking (b)malware (c)worms (d)sniffer
13. A malicious attack where the user impersonates the client to extract data
from the server is called _____ (a)Man in the middle attack (b)sniffer attack
(c)computer hacker (d)replay attack
14.If you want to save a document on a Mac and then open it on a PC, You must
first ______ (a)direct the file (b)redirect the file (c)specify a file
extension (d)highlight the file
15. To use disc operating system, the following steps must be followed. (i)type
command (ii)click on window (iii)click on window start button (iv)press the
command key (a)i,ii,iii (b)iv,i,iii (c)iii,i,iv (d)ii,iii,i
16.1 Kilobytes is equal to _____ (a)1bytes (b)100bytes (c)1000bytes
(d)1024bytes
17. ____ generation of computers make use of transistors (a)first generation
(b)second generation (c)third generation (d)fourth generation
18. _____ is a read and write memory which implies that data can be read
and also written into the memory (a)Volatility (b)ROM (c)ROMM (d)RAM
19. The following are various types of memory except ____ (a)Main memory
(b)Auxiliary memory (c)Cache memory (d)All of the above (e)None of the
above
20. ____ are used to create diagram in micro-soft word (a)flow chart
(b)windows (c)word processor (d)pie chart
21.IPA means ______ (a)Internet Protocol Assistance (b)Internet
Programming Assistance (c)Internet Protocol Address (d)Internet
Protocol Alliance
22. The hardware comprises of the Central Processing Unit and the ____
(a)Arithmetic and Logical Unit (b)Input devices (c)Output devices
(d)Peripherals
23. All are examples of crime that can be committed on the internet except
____ (a)internet trafficking (b)internet banking (c)activity financial
crimes (d)pornography
24. All are counter-measures used to prevent sniffing attacks except ____
(a)improvement in physical access control (b)active monitoring for sniffing
signatures (c)using encrypted traffic over internal and external network
connections (d)patching the OS and Software
25. It is wise to consider antivirus filters in at least three key areas; (a)client
systems, peer systems, server systems (b)server systems, peer systems,
content systems (c)client systems, server systems, content filters
(d)peer systems, container systems, content filters
26. Cyber crimes could be prevented by __________ (a)use of original
and updated software should be discouraged (b)avoid sharing of
sensitive information (c)use of firewalls may not be beneficial (d)always
send credit cards to sites that are not secured
27. In a query design, the top half shows _____ (a)toolbar (b)data
sources (c)table (d)graph
28. To create a table within your document, you click insert tab, table box,
table button while to modify your table, a design and ____ tab will appear in
the toolbar (a)preview (b)mail (c)layout (d)zoom
29. All but one is not a category of the Peripherals (a)input devices
(b)output devices (c)storage devices (d)auxiliary storage devices
30. Computer can be classified in all of the following except ____ (a)size
(b)nature of data (c)speed (d)purpose
31. URLs means ____ (a)Unified Resuscitation Locations (b)Unified
Relocation Locators (c)Uniform Resource Locations (d)Uniform Resource
Locators
32. The two most important protocols that allow networks to cooperate
with one another and exchange information are ____ and ____ (a)HTTP
and IP (b)RTP and IP (c)RTP and HTTP (d)TCP and IP
33. WWW means ____ (a)World West Web (b)Word Wide Webcam
(c)WorldWideWebcam (d)WorldWideWeb
34. The web became available in Nigeria in ____ (a)1998 (c)1999 (c)1997
(d)1996
35. All but one is not a search engine (a)Dogpile (b)Google (c)Ask (d)Wow
Wow
36. The largest and fastest computer systems are called ____
(a)mainframe computer (b)major computer (c)micro computer (d)super
computer
37. All of the following are correct except ____ (a)Windows Vista
(b)Windows XP (c)Windows ME (d)Windows Trio
38. To execute a program, you ___ click the icon, when a program is
already opened, you ____ click on the commands (a)left, right (b)right, left
(c)single, double (d)double, single
39. When there is more content than a window can contain, the ____ bars
appear at the bottom and even more often on the right hand side of a window.
40. The best known form of spreadsheets are ___ and ____ (a)MS Word
and MS Excel (b)MS Xcel and MS Explorer (c)MS Access and MS Word
(d)MS Excel and Lotus
41. The following are File Transfer Utilities except ____ (a)Web based file
transfer (b)BitTorrent (c)Secure file transfer protocol (d)Swift based file
protocol
42. ____ is a network security system that monitors and controls the
incoming and outgoing network traffic based on predetermined rules
(a)Security (b)Internet (c)Connectivity (d)Firewall
43. All the following are filters except ____ (a)Cyber Patrol (b)Cybersitter
(c)NetNanny (d)Cyber Patrol
44. ENIAC means _____ (a)Electronic Numerator Integrator and
Calculator (b)Electronic Numerical Integrator and Calculator
(c)Electrical Numerator Integration and Calculator (d)Electronic Numerical
and Integration Calculation
45. Micro computers was first developed by ____ (a)IBM (b)Google
(c)ATLAS (d)Apple
46. ____ is the memory that serves as a buffer between the primary
memory, CPU and the Main memory (a)Auxiliary memory (b)Data memory
(c)Booth memory (d)Cache memory
47. All but one is not an output device (a)VDU (b)Graph Plotter
(c)Projector (d)MCR
48. All but one is not a step or solution to power button not starting
computer (a)begin by checking the power cord to confirm that it is plugged
securely into the back of the computer case and the power outlet (b)if it’s
plugged into an outlet, make sure it is not a working outlet. To check the
outlet, plug in another electrical device such as a lamp (c)if it’s plugged into
an outlet, make sure it’s a working outlet. To check the outlet, plug in another
electrical device such as a lamp (d)if the computer is plugged into a
surge protector, verify that it is turned on. You may have to reset
the surge protector by turning it off and then turn back on.
49. The internet is also referred to as _______?
(A)The Net (B) the Web (C) The Network (D) All of the above
50. Information that travels over the internet does so via a variety of
languages known as _____?
(A) Network (B) IP addressing (C) Net (D) Protocols
51. Any computer in the internet is identified by an ______?
(A)Protocols (B) Internet Protocol (IP) address (C) Option A and B (D)
None of the above
52. URLs stands for ____(A) Uniform Resource Locators (B)
University Resource Locators (C) Uniform Resource Locations (D) A & B
53. Which of the following protocols does the Web uses transmit data?
(A)File Transfer Protocol (FTP) (B) Transmission Control Protocol (TCP) (C)
Hyper Text Transfer Protocol (HTTP) (D) User Datagram Protocol
(UDP)
54. ______ is an organization that provides services for accessing, using
or participating in the internet?
(A)Internet Service Provider (ISP) (B) Internet Service Provision (C)
Protocols (D) World Wide Web (WWW)
55. ______ is the successful completion of necessary arrangements so that
two or more parties can communicate at a long distance?
(A)Network (B) Internet (C) Connections (D) GLOBACOM
56. The two most important protocols that allow networks to cooperate
with one another and exchange information are called _____?
(A)Transmission Control Protocol and Internet Protocol (TCP/IP)
(B)Transmission Control Protocol and File Transfer Protocol
(C)A & B
(D)None of the above
57. At the sender, data is broken into packets and sent to the nearest node
called ____ before it gets to the final destination
(A)Access points (B) Routers (C) Base station (D) None of the above
58. In the e-mail address [email protected] “.edu.ng” stands for
______?
(A)Top Level Domain
(B)Server name
(C)Username
(D)Password
59. _____ service allows you to log-on to a remote machine, on which you
have your account?
(A)Electronic mail (B) Remote Terminal (C) Newsgroup (D) File sharing
60. _____ is the buying and selling of goods and services, or the
transmitting of funds or data, over the internet.
(A)E-commerce (B) File Sharing (C) Newsgroup (D) All of the above
61._____ is the type of e-commerce between companies and consumers?
(A)Consumer-to-consumer-E-commerce (C2C)
(B)Business-to-consumer E commerce (B2C)
(C)Business-to-Business E-commerce (B2B)
(D)None of the above
62. ____ is simply defined as E-commerce between companies, that deals
with relationships between and among businesses?
(A)Consumer-to-consumer-E-commerce (C2C)
(B)Business-to-consumer E commerce (B2C)
(C)Business-to-Business E-commerce (B2B)
(D)None of the above
63. A ____ is a client program that request services from a web server?
(A)Web browser
(B)Search Tools
(C)Internet
(D)Networks
64. The full meaning of HTML is ____?
(A)Hyper Text Markup Language
(B)Hyper Link Markup Language
(C)Hyper Text Machine Language
(D)None of the above
65. Applets are typically written in what programming Language?
(A)C++ (B) JavaScript (C) HTML (D) Java
66. _____ is a computer program that is used to look for information on
the internet?
(A)Search Tools (B) Search Methods (C) Search Engine (D Option A & B
67. Bing is an example of ______ (A) Search Tools (B) Search Methods
(C) Search engine (D) None of the above
68. _____ uses categories to focus your search, and their sites are arranged
by categories, not just by keywords?
(A)Metasearch Engine
(B)Search Engine
(C)Subject Directories
(D)Web utilities
69. A metasearch engine is also known as _____?
(A)Clusty (B) Aggregator (C) Subject Directories (D) Blingo
70. ____ is a search tool that uses another search engine’s data to produce
their own results from the internet?
(A)Metasearch engine
(B)Subject Directories
(C)Web utilities
(D)None of the above
71. FTP stands for?
(A)File Transfer Protocol
(B)File Transmission Protocol
(C)Folder Transmission Protocol
(D)File Transfer Panel
72. ______ is a computer network that uses Internet Protocol technology
to share information, operation systems, or computing services within an
organization.
(A)Internet (B) Intranet (C) Extranet (D) Web space
73. ______ is a private network that uses Internet technology and the
public telecommunication system to securely share part of a business’s
information or operations with suppliers, vendors, partners, customers, or
other business
(A)Internet (B) Intranet (C) Extranet (D) Web space
74. _____ is a network security system that monitors and controls the
incoming and outgoing network traffic based on predetermined security
rules.
(A)Router (B) Intranet (C) Internet (D) Firewall
75. _____ is a word processing software supported by both Mac and PC
platforms used to create documents, brochure, leaflets, outlines, resumes,
lists and simple web pages?
(A)Word Processing
(B)Microsoft Office
(C)Office applications
(D)None of the above
76. The new Microsoft Word uses one main ____ to allow you to modify
your document?
(A)Toolbar (B) Tabs (C) Settings (D) Formatting
77. ______ tab is Microsoft Words standards view that is widely used and
allows you to format text by Font, Font Size, Bold, Italic, Underline,
Alignment etc
(A) Home Tab (B) Insert Tab (C) Design tab (D) Pager Layout Tab
78. _____ contains different styles of page formatting?
(A) Home Tab (B) Insert Tab (C) Design Tab (D) Page Layout Tab
79. The layout that contains icons for page setup and paragraph actions,
such as Margin, Orientation, Size and Columns is ___?
(A) Page Layout Tab (B) Design Tab (C) Insert Tab (D) Home Tab
80. ____ is where one can find spellings & Grammar, the built in
Thesaurus and Dictionary, you can Track Changes, Check Word Count, and
Show/Add Comments?
(A) Design Tab (B) All Tabs (C) The Review Tab (D) Insert Tab
81. The default page margins for Microsoft Word documents is____?
(A) 2 inches (B) 1 inch (C) 3 inches (D) All of the above
82. To apply changes to the entire document, select all by hitting ____?
(A) Ctrl + A (B) Ctrl + V (C) Ctrl + C (D) Ctrl + D
83. ____ allows you to choose how you want your paragraph to look (i.e.
justified right, center, or left)
(A) The alignment options
(B) The Line Spacing option
(C) Break option
(D) Paragraph Menu
84. ____ allows you to set the desired spacing, such as single or double?
(A) The alignment options
(B) The Line Spacing option
(C) Break option
(D) Paragraph Menu
85. ____ allows you to tab/push the line(s) in your paragraph either left or
right?
(A) The alignment options
(B) The Line Spacing option
(C) Break option
(D) Indentation Option
86. ____ allows you to split a paragraph or a page up into sections?
(A) Page Break
(B) Indentation
(C) Alignment
(D) All of the above
87. ____ will actually remove the selection from the original location and
allow it to be placed somewhere else?
(A)Cut (B) Copy (C) Paste (D) All of the above
88. ____ allows you to leave the original selection where it is and insert a
copy elsewhere?
(A)Cut (B) Copy (C) Paste (D) Option A and B
89. ____ are used to create diagrams to Microsoft Word?
(A) Flowcharts (B) Pseudocode (C) Drawing book (D) All of the above
90. Ctrl + Y is used to ____?
(A) Undo (B) Redo (C) Copy (D) Cut
91. Ctrl + K is used to ____?
(A) Undo (B) Redo (C) Create hyperlink (D) Preview a page
92. CTRL + U is used to ___?
(A) Create hyperlink (B) Preview a page (C) Underline (D)Create a New
Page
93. _____ is a type of application program which manipulates numerical
and string data in rows and column of cells?
(A) Flowchart (B) Table (C) Spreadsheet (D) Quitting
94. _____ hold all of the data that is being used to create the spreadsheet
or workbook?
(A) Column (B) Table (C) Cells (D) All of the above
95. _____ are cells that run vertically down the document?
(A) Column (B) Table (C) Vertical cells (D) All of the above
96. A collection of data and information that is to be delivered to a specific
audience is called ___?
(A) Presentation (B) Gift (C) PowerPoint (D) All of the above
97. ____ is a customizable toolbar that contains commands that you may
want to use?
(A) Quick Access Toolbar (B) Home Toobar (C) Design Toolbar (D)
None of the above
98. ____ displays an outline of the entire slides in the presentation?
(A) Navigation Menu(B) Slide views (C) Mini toolbar (D) All of the above
99. ____ are design templates that can be applied to an entire presentation
that allows for consistency throughout the presentation?
(A) Navigation Menu (B) Themes (C) Toolbar (D) Menu
100. ____ are predefined formatting options that are used to emphasize
text?
(A) Font Styles (B) Styling sheet (C) Spreadsheet (D) Toolbar
101. A feature that allows you to choose from a variety of graphics, including
flow charts, lists, cycles, and process is known as?
(A) Fine Art (B) Textual Art (C) A & B (D) SmartArt
102. ____ are effects that appear when you switch from one slide to the next
during the presentation of your slide show?
(A) Formatting (B) Transition (C) Presentation (D) None of the above
103.
SECTION B
1. What is internet?
a) a single network
b) a vast collection of different networks
c) interconnection of local area networks
d) none of the mentioned
18. Computer that requests the resources or data from other computer is called as
computer.
a) Server
b) Client
c) Filter
d) Pusher
22. Which of the following website will give you details of Local Shops?
a) www.c4learn.com
b) www.justdial.com
c) www.google.com
d) None of these
23. Google (www.google.com) is a
a) Number in Math
b) Search Engine
c) Chat service on the web
d) Directory of images
24. At which of the following sites would you most probably buy books?
a) www.amazon.com
b) www. hotmail.com
c) www.sun.com
d) www.msn.com
.
27. Applets are written in programming language.
a) C++
b) Java
c) C
d) C#
43. TCP/IP is a:
a) . Network Hardware
b) Network Software
c) Protocol
d) None of these
.
44. TCP/IP mainly used for:
a) File Transfer
b) Email
c) Remote Login Service
d) All of these
69. A provider enabling home or business users access and web hosting
services for the Internet is referred to as:
a) Internet solutions providers
b) Internet service providers
c) Application service providers
d) Online Solutions providers
77. A URL can specify the IP address of the web that houses a web page .
a) Server
b) Client
c) Page
d) e-mail recipient
81. A search tool that uses another search engine’s data to produce their
own results from the internet is referred to as
a) Meta-search engine
b) Search engine
c) Google
d) MyWebSearch
91. Specialized utility programs that make use of the internet and the web
easier and faster is known as:
a) Web Utilities
b) Program Utilities
c) Internet Utilities
d) File Transfer Utilities
93. Which file transfer services can make use of a Web browser to
upload and download files?
a) Web-based
b) Page-based
c) Browser
d) Program-based
95. The two most important protocols that allow networks to cooperate
with one another and exchange information are:
a) FTP/RTP
b) TCP/IP
c) TCP/UDP
d) PPP/HTTP
98. The nearest node is which data broken into pieces are sent to at the
sender side during mailing is known as
a Gateway
b) Router
c) Brouter
d) Bridge
107 ....................is simply the use of electronic means to transfer funds directly from
one account to another, rather than by cheque or cash.
a) M-Banking
b) O-Banking
c) E-Banking
d) D-Banking
118. When two companies are linked together by computers and they
send business transactions through these computers, they are probably
using .
a) Digital wallets
b) Electronic data interchange
c) B2C
d) Smart cards
119. E-commerce is often seen as simply buying and selling using the
internet but do the following perspectives also apply to e-commerce?
a) A communications perspective
b) A service perspective
c) A business process perspective
d) An online perspective
121. When you look at e-commerce and e-business, which is the most realistic
relationship between these two concepts?
a) E-commerce is broadly equivalent to e-business
b) E-commerce is a subset of e-business
c) E-commerce has some overlap with e-business
d) E-business is a subset of e-commerce
123. To the _____ , physical location does not matter because the Internet allows
anyone to link to any Web site no matter where in the world that site might be.
a) bricks-and-clicks retailer
b) e-tailer
c) bricks-and-mortar retailer
d) B-to-G business
132 Which of the following is not part of the three main segments of e-commerce?
a) C2B
b) B2B
c) G2B
d) B2C
133. Which products are people mostly to be comfortable buying on the internet?
a) books
b) PCs
c) CDs
d) All of the above
135. What is the process in which a buyer posts its interest in buying a
certain quantity of items, and sellers compete for the business by
submitting successively lower bids until there is only one seller left?
a) B2B market place
b) Intranet
c) Auction
d) internet
138. A(n) is an interconnected network, usually one that uses the TCP/IP
protocol set, and does not extend beyond the organization that created it.
a) internet
b) intranet
c) extranet
d) ARPANET
152. We get list of sites after typing a word in search bar called
a) Keyword
b) Single word
c) Single phrase
d) Reserved word
6 Memory stores:
a) the operating system
b) application programs
c) the data being processed by the application programs
d) all of the above
a) Cache memory
b) Virtual memory
c) Flash memory
d) All of the above
12. The nature of data that determines the hybrid type of computer is/are
a) Analogue
b) Digital
c) Synchronous
d) Analogue and digital
14. All of the following are examples of computer input units EXCEPT:
a) Scanner
b) Speaker
c) Bar code reader
d) Keyboard
16. Which of the following devices can be used to directly input printed text
a) OCR
b) OMR
c) MICR
d) None of the above
27. Where are data and programme stored when the processor uses them?
a) Main memory
b) Secondary memory
c) Disk memory
d) Programme memory
34. 1 Byte =?
a) 8 bits
b) 4 bits
c) 2 bits
d) 9 bits
35. Data becomes -------- when it is presented in a format that people can
understand
and use
a) Processed
b) Graphs
c) Information
d) Presentation
37. The task of performing operations like arithmetic and logical operations is
called
a) Processing
b) Storing
c) Editing
d) Sorting
45. Trackball is a
a) Input device
b) Output device
c) Programming language
d) Software
46. Light pen and joystick are
a) Algorithm
b) Input devices
c) Output devices
d) Portals
55. Which of the following is the most powerful type of the computer:
a) Mainframe
b) Super conductor
c) Microcomputer
d) Super computer
59. CD – R.O.M. is a:
a) Random Access Memory
b) Volatile memory
c) Optical memory
d) None of the above
66. If the storage unit can retain the data even after the power is
turned off or interrupted, it is termed as:
a) Volatile storage
b) Non-volatile storage
c) Temporary storage
d) None of the above
68. Identify the device through which data and instructions are
entered into a computer.
a) Software
b) Output device
c) Input device
d) Memory
69. Computer Monitor is also known as:
a) DVD
b) VDU
c) DVU
d) CCTV
70. Arrange in ascending order the units of memory TB, KB, GB, MB
a) TB>MB>GB>KB
b) MB>GB>TB>KB
c) TB>GB>MB>KB
d) GB>MB>KB>TB
74. Input, output and processing devices grouped together represent a/an
Mobile device
Information processing
cycle Computer
system
Circuit boards
75. Devices such as mercury, thermometer and kitchen scales are classified as
a) Digital devices
b) Analogue devices
c) Programmed devices
d) Signal-led devices
77. All devices that are controlled by CPU but are not part of it are called
a) Peripheral devices
b) Arithmetic Units
c) Control Unit Devices
d) Main store devices
86. When given input, the computer generates results commonly referred to as
a) Information
b) Data
c) Results
d) Signal
87. Plotters are used for
a) Inputting images
b) Outputting graphics
c) Inputting graphics
d) Outputting images
88. The advancement in the development of Computer from the first
generation to the fifth improves
a) Size
b) Speed
c) Cost
d) All of the above
89. Registers are memories in the
a) Input Unit
b) Output Unit
c) CPU
d) CU
90. Which of the following is not a fundamental part of a computer?
a) Software
b) Hardware
c) Humanware
d) Printer
91. Which of the following is related to fifth generation computers?
a) Knowledge information processing system
b)Very large scale integration (VLSI)
c) Both of above
d) None of the above
92. A/n Device is any device that provides information, which is
sent to the CPU
a) Input
b)Output
c) CPU
d) Memory
93. Which of the following is not a type of Software
a) System Software
b)Application Software
c) Utility Software
d)Entertainment Software
113. What is the main difference between a mainframe and a super computer?
a) Super computer is much larger than mainframe computers
b) Super computers are much smaller than mainframe computers
c) Supercomputers are focused to execute few programs as fast as
possible while mainframe uses its power to execute as many programs
concurrently
d) Supercomputers are focused to execute as many programs as
possible while mainframe uses its power to execute few programs as
fast as possible
114. A storage area used to store data to a compensate for the difference in
speed at which the different units can handle data is
a) Memory
b) Buffer
c) Accumulator
d) Address
115. Computer is free from committing error. This is called
a) Accuracy
b) Affordability
c) Diligence
d) Versatility
139. Which unit converts computer data into human readable form?
a) Input unit
b) Output unit
c) ALU
d) Control Unit
156. One of the popular mass storage device is CD ROM. What does CD
ROM stand for?
a) Compactable Read Only Memory
b) Compact Data Read Only Memory
c) Compactable Disk Read Only Memory
d) Compact Disk Read Only Memory
167. Which of the following terms is the most closely related to main memory?
a) Non volatile
b) Permanent
c) Control unit
d) Temporary
178. VDU is
a) Video Display Unit
b) Visual Graphics Array
c) Volatile Graphics Array
d) Visual Display Unit
180. The computer that can input analog signals and return result in digital form
a) Analog Computers
b) Digital Computers
c) Hybrid Computers
d) Mainframe Computers
183. Which of the following are the two main components of the CPU?
a) Control Unit and Registers
b) Registers and Main Memory
c) Control Unit and ALU
d) ALU and bus
185. What is the name of the computer terminal which gives paper printout?
a) Display screen
b) Soft copy terminal
c) Hard copy terminal
d) Plotter
186. The personnel who deals with the computer and its management put
together are called
a) Software
b) Human ware
c) Firmware
d) Hardware
188. MAN is a most used abbreviation in Networking, what is its full form?
a) MAP Area Network
b) Metropolitan Area Network
c) Man Array of Network
d) Manless Access Network
187. A song being played on computer speaker is
a) hard output
b) soft output
c) both hard and soft output
d) neither hard nor soft output
189. When we look at the cost, which of the following computer is most expensive?
a) Mainframe Computer
b) Mini Computers
c) Micro Computers
d) Super Computers
191. Pick the one that is used for logical operations or comparisons such as
less than equal to or greater than.
a) Arithmetic and Logic Unit
b) Control Unit
c) Both of above
d) None of above
Which statement is
198.
valid?
a) 1KB = 1024 bytes
b) 1 MB=2048 bytes
c) 1 MB = 1000 kilobytes
d) 1 KB = 1000 bytes
7. Which of the following methods can not be used to enter data in a cell?
a) Pressing an arrow key
b) Pressing the tab key
c) Pressing the Esc key
d) Clicking the enter button to the formula bar
8. Which of the following methods cannot be used to edit the content of cell?
a) Pressing the Alt key
b) Clicking the formula bar
c) Pressing F2
d) Double clicking the cell
9. The Software which contains rows and columns is called
a) Database
b) Drawing
c) Spreadsheet
d) Word processing
10. Which of the following methods cannot be used to enter data in a cell
a) Pressing an arrow key
b) Pressing the Tab key
c) Pressing the Esc key
d) Clicking on the formula bar
21. When a label is too long to fit within a worksheet cell, you typically must
a) Shorten the label
b) Increase the column width
c) Decrease the column width
d) Adjust the row height
22. You can use the horizontal and vertical scroll bars to
a) Split a worksheet into two panes
b) View different rows and columns edit the contents of a cell
c) Edit the contents of a cell
d) view different worksheets
22. What is the term used when you press and hold the left mouse key and
more the mouse
around the slide?
a) Highlighting
b) Dragging
c) Selecting
d) Moving
25. You can create a new presentation by completing all of the following except
a) Clicking the new button on the standard toolbar
b) Clicking file, new
c) Clicking file open
d) Pressing ctrl + N
27. In which menu can you find features like Slide Design, Slide Layout etc)?
a) Insert Menu
b) Format Menu
c) Tools Menu
d) Slide Show Menu
d) a and b
36. How can you delete a record?
41. To copy cell contents using drag and drop press the
a) End key
b) Shift key
c) Ctrl key
d) Esc key
46. You can enter which types of data into worksheet cells?
a) Labels, values, and formulas
b) Labels and values but not formulas
c) Values and formulas but not labels
d) Formulas only
49. Which of the following options is not located in the Page Setup dialog box?
a) Page Break Preview.
b) Page Orientation
c) Margins
50. Without using the mouse or the arrow keys, what is the fastest way of getting
to
cell A1 in a
spreadsheet?
51. Which of the following methods can not be used to edit the contents of a cell?
a) Press the Alt key
b) Clicking the formula bar
c) Pressing the F2 key
d) Double clicking the cell
56. When a label is too long to fit within a worksheet cell, you typically must
a) Shorten the label
b) Increase the column width
c) Decrease the column width
d) Adjust the row height
57. You can use the horizontal and vertical scroll bars to
a) Split a worksheet into two panes
b) View different rows and columns edit the contents of a cell
c) Edit the contents of a cell
d) view different worksheets
59. To copy formatting from one area in a worksheet and apply it to another
area you would use:
a) The Edit>Copy Format and Edit>Paste Format commands form the menu.
b) The Copy and Apply Formatting dialog box, located under the
Format>Copy and Apply
menu.
c) There is no way to copy and apply formatting in Excel – You
have to do it manually
d) The Format Painter button on the standard toolbar
60. Which area in an excel window allows entering values and formulas
a) Title bar
b) Menu bar
c) Formula bar
d) Standard toolbar
61. Which area in an excel window allows entering values and formulas
a) Title bar
b) Menu bar
c) Formula bar
d) Standard toolbar
Q20. The following key(s) may be described as components of the key board
except:
a. Alphanumeric keys
b. Tab key
c. Caps lock
d. All of the above
e. None of the above
Q21. Which of these applies to the position of the “scroll bar” in a Computer:
a. Located at the bottom left hand side of the window
b. Located at the left hand side boundary of the window
c. Located at the right hand side boundary of the window
d. All of the above
e. None of the above
Q41. Which of the following best describes the task bar in a computer:
harbours the power icon
harbours the date and calendar
display harbours the speaker
icon
all of the
above none
of the above
Electronic machine that accepts input (data), processes it and gives out results
(information)
Pointing the cursor to the object on the screen, then press and
hold the primary button, move the object to a new location and
then releasing the primary button. all of the above
none of the above
Q52. Which of these phrases is applicable to software in computer language?
DV
D
CP
U
Flash drive
all of the
above none
of the above
Q58. Small pictures that represent files, folders, programs, and other items on
desktop are called?
BIO
S
CM
OS
ENI
AC
all of the
above none
of the above
Q59. Which of these can be accomplished using the start menu in a computer?
Open a recent
document Turn off
the computer
Search for files, folders, and programs
all of the
above none
of the above
Q61. The long vertical bar at the right side of the computer
window is called? scrollbar
titlebar
taskbar
all of the
above none of
the above
Q72. The following are crontol keys on the key board of computers except?
Ctr
l
Alt
Quad core
all of the above
none of the above
Q75. Which of the following referred to “Close the active item, or exit the active
program”?
ALT + F4
End
Page
all of the
above none of
the above
Q76. Which of the following referred to “Display Windows Help and Support”?
ALT + TAB
Windows logo
key +F1 Page
all of the
above none of
the above
Q80. Printer that prints by placing small dots of ink on a page to reproduce
text or graphics are called?
Laser jet
Manual
jet
Inkjet
all of the
above none of
the above
_______________________________________
1. This data type allows alphanumeric characters and special symbols.
a) text
b) memo
c) auto number
d) None of the above
2. Query design window has two parts. The upper part shows
a) Name of fields, field type and size
b) Tables with fields and relationships between tables
c) Criteria
d) Sorting check boxes
4. To create a new table, in which method you don’t need to specify the
field type and size?
a) Create table in Design View
b) Create Table using wizard
c) Create Table by Entering data
d) All of above
6. The command center of access file that appears when you create or
open the MS Access
database file.
a) Database Window
b) Query Window
c) Design View Window
d) Switchboard
9. In table design view what are the first column of buttons used for
a) Indicate Primary Key
b) Indicate Current Row
c) Both of above
d) None of above
10. Which of the following is not a type of relationship that can be applied
in Access database
a) One to One
b) One to Many
c) Many to Many
d) All of above can be applied
11. This option allows you to build a new table by entering data directly
into the datasheet.
a) datasheet view
b) design view
c) link table
d) None of the above
13. Which of the following is NOT a type of Microsoft Access database object?
a) Table
b) Form
c) Worksheets
d) Modules
14. Which of the field has width 8 bytes?
a) Memo
b) Number
c) Date/Time
d) Hyperlink
15. Which is not a view to display a table in Access?
a) Datasheet View
b) Design View
c) Pivot Table & Pivot Chart View
d) None of above
16. Which of the following database object hold data?
a) Forms
b) Reports
c) Queries
d) Tables
17. A enables you to view data from a table based on a specific criterion
a) Form
b) Query
c) Macro
d) Report
18. Which of the following database object produces the final result to present?
a) Forms
b) Reports
c) Queries
d) Tables
26. Which of the following store command to retrieve data from database?
a) Forms
b) Reports
c) Queries
d) Tables
29. An Access database object that is used to enter, view or edit records
a) Table
b) Form
c) Query
d) Report
36. This is a type of program that lets one or more computer users create,
manage, and access data in a database
a) B2B
b) DBMS
c) multidimensional database
d) None
37. In a relational database, this is the data structure that holds a single piece
of data, such as first name or phone number
a) catalog
b) field
c) entity
d) object
38. The Command Center Of Access File That Appears When You
Create Or Open The Ms Access Database File.
a) Database Window
b) Query Window
c) Design View Window
d) Switchboard
42. Which Of The Following Is Not A Type Of Microsoft Access Database Object?
a) Table
b) Form
c) Worksheets
d) Modules
49. Two tables can be linked with relationship so that the data
integrity can be enforced) Where can you find Relationship command
a) File menu
b) View Menu
c) Database Menu
d) Tools Menu
50. Which of the following is not a type of relationship that can be applied
in Access database
a) One to One
b) One to Many
c) Many to Many
d) All of above can be applied
61. Which of the following is not a view for interacting with a form object?
a) Datasheet view
b) Design view
c) Form view
d) Layout view
2. MS-Word automatically moves the text to the next line when it reaches
the right edge of the screen
and is called?
a) Carriage Return
b) Enter
c) Word Wrap
d) Carriage Release
3. Using Find command in Word, we can search for the following except ……..
a) characters
b) formats
c) symbols
d) music
4. In MS-Word, ruler help for the following except……
a) to set tabs
b) to set indents
c) to change page margins
d) to review
6. Which menu in MSWord can be used to change character size and typeface?
a) View
b) Tools
c) Format
d) Data
9. Which bar is usually located below that Title Bar that provides
categorized options?
a) Menu bar
b) Status Bar
c) Tool bar
d) Scroll bar
10. Which option in File pull-down menu is used to close a file in MSWord?
a) New
b) Quit
c) Close
d) Exit
a) Page orientation
b) Page setup
c) Page margin
d) Page layout
19. Which shortcut key is used to Repeat Last Action performed in MS-Word
a) F1
b) F4
c) F7
d) F9
22. In MS Word, the command to move one word to the left is …….
a) CTRL+RIGHTARROW
b) CTRL+LEFT ARROW
c) CTRL+DOWN ARROW
d) CTRL+UP ARROW
51. In MS Windows, the command to move one cell to the left in a table is ……
a) SHIFT+TAB
b) CTRL+ [
c) CTRL+SHIFT+LESS THAN
d) ALT+CTRL
52. In MS Windows, the command to move one cell to the right in a table is ……
a) SHIFT
b) CTRL+ [
c) CTRL+SHIFT+LESS THAN
d) ALT+CTRL
63. When the Language bar is , it means that you do not see it on the
screen but it will be displayed the next time you start your computer.
a) restored
b) hidden
c) minimized
d) closed
64. The , or typeface, defines the appearance and shape of letters,
numbers, and special
characters.
a) font
b) font size
c) point
d) paragraph formatting
65. When Word flags a possible spelling or grammar error, it also changes
the mark on the Spelling
and Grammar Status icon to a .
a) green X
b) green check mark
c) red X
d) red check mark
66. The paragraph mark (¶) is a formatting mark that indicates where the
was pressed)
TAB key
SPACEBAR
ENTER key
SHIFT key
67. Press the ENTER key in all of the following circumstances except .
a) to insert a blank line into a document
b) when the insertion point reaches the right margin
c) to begin a new paragraph
d) in response to certain Word commands
78. To erase a character to the right of the insertion point, press the key.
a) Cancel
b) BACKSPACE
C) DELETE
d) either b or c
79. The on the right side of the menu bar lets users type free-form
questions, such as how do I
save, or terms, such as copy, and Word responds by displaying a list of
topics related to the word
or phrase entered)
a) Type a question for help box
b) Question Mark button
c) What’s this? command
d) Index sheet
80. To change margin settings, click on the menu bar and then point
to the Page Setup
a) File
b) Edit
c) Format
d) Tools
81. Headers and footers can include text and graphics, as well as the
following except .
a) current date
b) page number
c) current time
d) margin
82. Insert Date, Format Page Number, and Insert AutoText are buttons on the
toolbar.
a) Formatting
b) Header and Footer
c) Standard
d) Edit
83. The shortcut keys for the character formatting are CTRL+ SHIFT+ PLUS
SIGN.
a) Case of letters
b) Underline words, not spaces
c) Superscript
d) All capital letters
84. To increase a paragraph indent, use the shortcut keys.
a) CTRL+L
b) CTRL+E
c) CTRL+I
d) CTRL+M
85. Each time the key is pressed, the paragraph formatting in the
previous paragraph is carried
forward to the next paragraph.
a) Enter
b) Shift
c) Ctrl
d) Alt
86. Word has a list of predefined typing, spelling, capitalization, and
grammar errors that can
detect and correct errors known as ……….
a) AutoEntry
b) AutoCorrect
c) AutoAdd
d) AutoSpell
87. To set an exception to an AutoCorrect rule, click on the menu bar
and then click
AutoCorrect Options to display the AutoCorrect dialog box.
a) Format
b) Edit
c) Tools
d) View
88. The formats defined by include character formatting, such as the
font and font size;
paragraph formatting, such as line spacing and text alignment; table
formatting; and list formatting.
a) options
b) styles
c) toolbars
d) tabs
89. To verify that the note text is positioned correctly on the page, switch to
view or display the
document in print preview.
a) normal
b) print layout
c) page layout
d) page edit
90. To edit note text, use the at the bottom of the Word window.
a) sizing handle
b) footnote text window
c) ScreenTip
d) note pane
91. The Word Count command on the Tools menu displays the number
of words as well as the number
of the following in the current document except………..
a) lines
b) characters
c) paragraphs
d) Listings
92. In normal view, automatic page breaks .
a) do not display
b) display on the screen as a single dotted horizontal line
c) display on the screen above the header and beneath the footer
d) display on the screen as a line separated by the words Page Break
93. Although it is not shown in normal view, to view a header, click on the
menu bar and then
click Header and Footer.
a) View
b) Edit
c) Format
d) Tools
94. When a hyperlink is created, Word formats the Web address as .
a) italicized and colored red
b) italicized and colored blue
c) underlined and colored red
d) underlined and colored blue
95. To select a block of text, click at the beginning of the selection, scroll to
the end of the selection, position the mouse pointer at the end of the
selection, hold down the
key, and then click (or drag through the text).
a) CTRL
b) ALT
c) SHIFT
d) TAB
96. With the , Word notifies that a smart tag is available by displaying
a smart tag indicator on the screen.
a) AutoCorrect Options and Paste Options
b) Smart Tag Actions and Copy Actions
c) AutoCorrect Options and Smart Tag Actions
d) Paste Options and Copy Actions
97. When the same word is used in multiple locations or a word is used
that was not quite appropriate, a thesaurus can be used to look up a (n)
or a word similar in meaning.
a) synonym
b) homonym
c) antonym
d) metronym
98. To capitalize all character, the shortcut key(s) is used)
a) CTRL+L
b) CTRL+E
c) CTRL+SHIFT+A
d) CTRL+M
99. In MS-Word, ..... command is used for annotation(s).
a) CTRL + L
b) ALT + CTRL + E
c) ALT + CTRL + M
d) CTRL + M
100. In MS-Word, .. Command is used for Justifying paragraph.
a) CTRL + L
b) ALT + CTRL + E
c) CTRL + J
d) CTRL + M
In Microsoft PowerPoint two kind of sound effects files that can be added to
the presentation are ……….
a) .wav files and .mid files
b) .wav files and .gif files
c) .wav files and .jpg files
d) .jpg files and .gif files
a) A table slide
b) A bullet slide
c) A title slide
6. Which of the following should you use if you want all the slide in the
presentation to have the same “look”?
a) the slide layout option
b) add a slide option
c) outline view
d) a presentation design template
8. If you have a PowerPoint show you created and want to send using
email to another teacher you can add the show to your email message
as a(an)………………
a) Inclusion
b) Attachment
c) Reply
d) Forward
11. To preview a motion path effect using the custom animation task
pane, you should
a) click the play button
b) click the show effect button
c) double click the motion path
d) all of above
12. You can create a new presentation by completing all of the following except
a) Clicking the new button on the standard toolbar
b) Clicking file, new
c) Clicking file open
d) Pressing ctrl + N
15. Special effects used to introduce slides in a presentation are called …………
a) effects
b) custom animations
c) transitions
d) present animations
17. What is the term used when you press and hold the left mouse key and
more the mouse around the slide?
a) Highlighting
b) Dragging
c) Selecting
d) Moving
18. Which of the following toolbars provide different options in various master
views?
a) Common tasks toolbar
b) Drawing toolbar
c) Formatting toolbar
d) Standard toolbar
20. How do you create speaker note pages that show the slides, related
notes, and your company logo on each page?
a) Edit the notes master and add your company logo
b) Edit the slide master and insert your company logo and notes pane
c) Edit the handout master to include your company logo and one
slide per page with additional note space
d) All of the above
21. Which option on the custom animation task pane allows you to apply a
preset or custom motion path?
a) Add effect
b) Emphasis
c) Animate now
d) All of the above
22. What is the term used when a clip art image changes the direction of faces?
a) Group
b) Flip
c) Rotate
d) All of the above
23. the slide that is used to introduce a topic and set the tone for the
presentation is called the
a) table slide
b) graph slide
c) bullet slide
d) title slide
24. Which of the following features should you use when typing in the notes text
box?
a) Slide show
b) Insert
c) Slide maser
d) Zoom
25. Which option allows you to select line, curve, freeform or scribble tools?
a) Create effect
b) Insert motion path
c) Draw custom path
d) All of the above
26. Which of the following should be used when you want to add a
slide to an existing presentation?
a) File, add a new slide
b) Insert, New slide
c) File Open
d) File, New
28. which of the following is the default page setup orientation of slide in
PowerPoint
a) rVertical
b) Landscape
c) Portrait
d) None of above
30. Which of the following tool enables you to add text to a slide without
using the standard placeholders?
a) Text tool box
b) Line tool
c) Drawing tool
d) Auto shapes tool
31. Want your logo in the same position on every slide, automatically? Insert it on
the
a) Handout master
b) Notes master
c) Slide master
d) All of the above
32. Which of the following views is the best view to use when setting
transition effects for all slides in a presentation?
a) Slide sorter view
b) Notes pages view
c) Slide view
d) Outline view
33. Objects on the slide that hold text are called …………..
a) Placeholders
b) Object holders
c) Auto layouts
d) Text holders
34. Which command brings you to the first slide in your presentation?
a) Next slide button
b) Page up
c) Ctrl + Home
d) Ctrl + End
36. To edit the text within the boxes of an organization chart, you ………….
a) select the box and text, then make changes
b) select the box, then make the changes
c) highlight the text, them make the changes
d) a and b both
37. Which of the following allow you to select more than one slide in a
presentation?
a) Alt + Click each slide
b) Shift + drag each slide
c) Shift + Click each slide
d) Ctrl + Click each slide
38. The PowerPoint view that displays only text (title and bullets) is …….
a) Slide show
b) Slide sorter view
c) Notes page view
d) Outline view
39. In Microsoft PowerPoint the entry effect as one slide replaces another
in a show is called a(an)
a) animation
b) slide transition
c) custom animation
d) preset animation
40. Presentation designs regulate the formatting and layout for the
slide and are commonly called
a) Design plates
b) Templates
c) Placeholders
d) Blueprints
41. Which of the following bypasses the print dialog box when printing
individual slides or an entire presentation?
a) File, print, preview
b) The print button
c) File, print
d) Ctrl + p
42. Which of the following will not advance the slides in a slide show view?
a) Esc key
b) The spacebar
c) The Enter key
d) The mouse button
44. In Microsoft PowerPoint in order to see all the slides on one screen use
a) view, slide sorter
b) view, slide
c) view, master
d) view, slide show
45. What’s the best place to find animated images for your
PowerPoint 2002 presentation?
a) Microsoft online
b) Word clipart
c) PowerPoint tools and ins
d) All of the above
46. What’s the easy way to apply varied animations to test on slides ?
a) apply effects in the custom animation text pane
b) apply an animation scheme
c) customize bullets with animated clipart
d) all of above
46. Using a custom animation effect, how do you make text appear on
a slide by letter ?
a) Apply the animation scheme fade in one by one.
b) Apply an entrance effect, and then set it to by letter in the
effect option dialog box
c) Apply the fly in entrance to the text, and then set its speed to very slow.
d) All of above
48. You can create a new presentation by completing all of the following except:
a) Clicking the new button on the standard toolbar
b) Clicking file, new
c) Clicking file open
d) Pressing Ctrl + N
49. You have customized a design template in one presentation and you
want to use it in another presentation. What the best way to do this?
a) Use the browse feature in the slide design task pane to
find the file that has your design template and apply it to the
current file.
b) Copy and paste the slide with the design template you want to
include the new
presentation; inserted slide will inherit the design
c) Save the presentation that has the design template with a new
name, and then use a new file to your presentation
d) All of the above.
50. Which of the following options in the printer dialog box would you
select to print slides 5 and 12 in a presentation?
a) Slides
b) Custom shows
c) Current slide
d) All
53. The slide that is used to introduce a topic and set the tone for the
presentation is called the .
a) Table slide
b) Graph slide
c) Bullet slide
d) Title slide
54. Which of the following should be used when you want to add a
slide to an existing presentation?
a) File, add a new slide
b) Insert, new slide
c) File, open
d) File, new
55. Which of the following is the default page setup orientation for
notes pages, outlines and handouts?
a) Vertical
b) Landscape
c) Portrait
d) None of above
56. Which of the following is the default page setup orientation for
slides in PowerPoint?
a) Vertical
b) Landscape
c) Portrait
d) None of above
57. How can you get your photo album slide show to play continuously?
a) Use random slide transition
b) Launch an online broadcast
c) Loop continuously
d) All of above
59. The toolbars that are displayed by default in the PowerPoint window includes
61. You have got a bunch of digital holiday photo you want to put into a
slide show. What the quickest method?
a) Apply a multiple-picture layout to several slides, and use the
clipart icon on the slides to import your picture
b) On the insert menu, point to the picture, click from file, and select your
picture in a group for each slide
c) On the insert menu, point the picture and click new photo
album
d) All of the above
62. Which command brings you to the first slide in your presentation?
a) Next slide button
b) Page up
c) Ctrl + home
d) Ctrl + end
64. Which of the following should you use if you want all the
slides in the presentation to have the same look?
a) The slid layout option
b) The add a slide option
c) Outline view
d) A presentation design template
66. Which of the following uses the spelling and grammar feature to
indicate an incorrect spelling?
a) The incorrect word appears in all capital letters
b) The incorrect word has a wavy red line under it
c) The incorrect word appears italicized
d) The incorrect word appears bold
70. After moving a clip art image to a particular location on the slide,
you can immediately reverse the action using the
a) Click the not do move object command on the edit menu
b) Click on the undo button
c) Click on redo button
d) All of above
71. Which of the following should e used when you want to add a slide to
an existing presentation? a) File, add a new slide
b) Insert, new slide
c) File, open
d) File, new
72. What is the term used when a clip art image changes the direction it faces?
a) Group
b) Flip
c) Rotate
d) Group and Flip
73. What is the term used when you press and hold the left mouse key and
move the mouse around the slide?
a) Highlighting
b) Dragging
c) Selecting
d) Dragging and Selecting
74. Which of the following tools enable you to add text to a slide without
using the standard placeholders?
a) Text box tool
b) Line tool;
c) Fill color
d) Auto shapes tool
76. A file which contains readymade styles that can be used for a
presentations is called
a) Auto style
b) Template
c) Wizard
d) Pre-formatting
87. Which key on the keyboard can be used to view slide show ?
a) F1
b) F2
c) F5
d) F10
88. A chart can be put as a part of the presentation using .
a) Insert -> Chart
b) Insert -> Pictures -> Chart
c) Edit -> Chart
d) View -> Chart
89. The arrangement of elements such as Title and Subtitle text, pictures,
tables etc) is called
a) Layout
b) Presentation
c) Design
d) Scheme
90. The best way to insert a new slide in a presentation is to use the
a) Normal view
b) Special view
c) Slide show view
d) Slide sorter view
91. The boxes that are displayed to indicate that the text, pictures or
objects are placed in it is called
a) Placeholder
b) Auto text
c) Text box
d) Word art
92. Which option in PowerPoint allows to carry slides from one computer to
another?
a) Save As
b) Save and Go
c) Pack and Go
d) Web and Go
96. Which of the following will not advance the slides in a slide show view?
a) The esc key
b) The space bar
c) The enter key
d) The mouse button
97. Which menu provides you options like Animation Scheme, custom
Animation, Slide Transition?
a) Insert Menu
b) Format Menu
c) Tools Menu
d) Slide Show Menu
98. What feature will you use to apply motion effects in between a slide
exits and another enters?
a) Slide Transition
b) Slide Design
c) Animation Objects
d) Animation Scheme
100. If you select Insert >> Picture >> From File , which of the following is
correct?
a) You can insert pictures and clipArts
b) You can insert clipArts only
c) You can insert pictures only
d) You can insert videos only
1. Which of the following is not an operating system?
a) DOS
b) Linux
c) Windows
d) Oracle
10. Which command is used to display the contents of the text file of DOS?
a) Copy con
b) Copy
c) Type
d) Dir
14. Once text has been cut to the clipboard, you can that text into
another document
a) Paste
b) Copy
c) Transfer
d) Remove
19. A small part of taskbar that has icons of background running applications is
a) Start button
b) Quick launch
c) Task bar
d) System tray
23. Which is the first program run on a computer when the computer boots up?
a) Application software
b) Operating system
c) System operations
d) None
25. The command used to create logical drive for specific location of disk
a) Fdisk
b) Format
c) Subst
d) All of the above
26. The title bar always displays
on
a) Top of the open windows
b) Left side of the open window
c) Right side of the open window
d) All of above
27. Which of the following shutdown method is often called Warm Boot?
a) Shut Down
b) Restart
c) Sleep
d) Hibernate
30. You should choose this mode if you don’t know how long you won’t use your
computer but want to have the same desktop state when you resume
a) Shut Down
b) Restart
c) Sleep
d) Hibernate
39. Scandisk
a) Checks the disk
b) Give information about disk
c) Run from DOS mode
d) All of the above
40. Recently used application file list appears in the Windows operating system
a) Setting menu
b) Documents menu
c) Run dialog box
d) Programs menu
45. Which of the following is suitable after you install new drivers?
a) Shut Down
b) Restart
c) Sleep
d) Hibernate
49. Which of the following does not occur during the power-on-self-test (POST)?
a) The scandisk utility begins to run
b) The video card and video memory are tested
c) The BIOS identification process occurs
d) Memory chip are checked to ensure that they are working properly
57. A...................... is a flash memory storage device that plugins into a USB port
a) USB snapdrive
b) USB flashdrive
c) USB memory makerdrive
d) None of above
61. Which mode loads minimal set of drivers when starting Windows?
a) Safe Mode
b) Normal Mode
c) VGA Mode
d) Network Support Mode
62. Which menu bar selection would you access to open file?
a) Option
b) Help
c) View
d) file
64. The . . . . displays the name of every computer user on the computer
a) Wish list screen
b) Command screen
c) Welcome screen
d) None of the above
67. Which operating system can you give smallest file name?
a) Ps/2
b) DOS
c) Windows
d) Windows NT
70. Which of the following does not support more than one program at a time?
a) DOS
b) Linux
c) Windows
d) Unix
72. Which of the following operating system is use for a client server network?
a) MS DOS
b) Windows
c) Windows 98
d) Windows 2000
73. Which of the following Operating systems is better for implementing a Client-
Server network
a) MS DOS
b) Windows 95
c) Windows 98
d) Windows 2000
74. What program runs first after computer is booted and loading GUI?
a) Desktop Manager
b) File Manager
c) Windows Explorer
d) Authentication
75. The . . . . . program compresses large files into a smaller file
a) WinZip
b) WinShrink
c) WinStyle
d) None of above
76. Which is not application software?
a) Windows NT
b) Page Maker
c) WinWord XP
d) Photoshop
78. If the displayed system time and date is wrong, you can reset it using
a) Write
b) Calendar
c) Write file
d) Control panel
80. Which of the following command is used to close the active window?
a) Ctrl+F4
b) Ctrl+F5
c) Alt+F6
d) None of above
81. The shortcut key is used to open properties window of selected item is
a) Ctrl+Enter
b) Shift+Enter
c) Alt+Enter
d) None of above
94. The …. is a temporary storage area in memory where you can attach
text or graphics information
a) Clipboard
b) Copyboard
c) Both a and b
d) None of above
98. Usually, in MSDOS, the primary hard disk drives has the drive letter
a) A
b) B
c) C
d) D
101. Which of the following memory unit that processor can access more rapidly
a) Main Memory
b) Virtual Memory
c) Cache memory
d) Read Only Memory
105. Which among the following are the best tools for fixing the errors?
a) Fdisk
b) Scandisk
c) CHKDSK
d) Fixdisk
106. Which command is not an internal command?
a) Dir
b) Edit
c) CD
d) CLS
107. The command allows you to show the status of the disk is
a) Vol
b) Diskcomp
c) CHKDSK
d) Defrag
124. Which command will you use to transfer a specific file from one disk
to another disk?
a) Time
b) Diskcopy
c) Copy
d) Rename
125. To display the content of the disk we use
a) Format
b) Dir
c) Copy
d) WinZip
126. Which command is used to copy the file myfile. doc from floppy
disk to hard disk?
a) Copy a:\myfile. doc c:
b) Copy c:\myfile. doc a:
c) Copy a:\ c:\myfile. doc
d) None of the above
127. Which command is used to copy the contents of one disk to another
a) Diskcopy
b) Delete
c) Copy con
d) Ctrl + Alt
128. The command to display the contents of a file fast. it
a) TYPE it fast
b) COPY fast. it CON
c) COPY CON fast. it
d) None of above
129. Which command is used to combine F1 and F2 file into the file F3
a) Copy F1+F2 F3
b) Copy F3 F1+F2
c) Copy F1+F2+F3
d) Copy F1 F2+F3
130. What will be the command if you want to copy rdoc file that
resides in the floppy disk into
work sub-directory of hard disk while you are in C prompt
a) Copy c:\rdoc a:\work
b) Copy A:\rdoc c:\work
c) Copy rdoc c:\work
d) Copy c:>work a:\doc
133. During the boot process, the …. looks for the system file
a) CD
b) BIOS
c) CPU
d) DVD
134. To prevent the addition and deletion of files on a disk or tape we use
a) Format
b) Write protect
c) Create back up
d) None of above
138. Driver is
a) Hardware controller
b) Hardware and gain controller
c) Data controller
d) All of above
140. Which command used to delete all files from current directory?
a) Del
b) Deltree/y *
c) Del *. *
d) delete all
141. Which command is used to delete all the files from root directory of drive A?
a) Del a:\
b) Del *. *
c) Del A
d) Erase *
142. Which command will you use to display the system date?
a) Date
b) Ver
c) Dir
d) Format
143. The command used to display all files (. exe) from the system
a) Dir *. exe
b) Dir *. exe/s
c) Dir *. exe/all
d) None of above
144. The command refreshes the screen and places the cursor at the top
left corner of screen
a) CLS
b) Clear
c) Dir
d) CHKDSK
147. Which command will be used to display only the file name and
extensions in wide format?
a) Dir/b
b) Dir A:
c) Dir/s
d) Dir/w
154. Desktop is a
a) Provides workspace
b) Screen saver
c) Display program
d) Working with my document
155. It is the default folder for many Windows Applications to save your file
a) My Document
b) My Pictures
c) Documents and Settings
d) My Computer
157. The operating system allows the user to organize the computer’s
contents in a hierarchical structure of directories that include all of the
following except:
a) Files
b) Folders
c) Drives
d) System
160. When you press and release the secondary mouse button you are ….
a) Right clicking
b) Left clicking
c) Either a or b
d) None of above
161. Which one of the following key is used to refresh the active window?
a) F7
b) F8
c) F9
d) F5
162. To display system boot menu which of the following command you must
press?
a) F4
b) F7
c) F8
d) F5
164. Which of the following command is used to move the pointer from
one pane to next pane?
a) F3
b) F4
c) F5
d) F6
165. In a folder, which of the following command is used to rename the file or
folder
a) F3
b) F4
c) F2
d) F7
166. A character that represents one or more unknown character is
a) Wildcard character
b) All file name
c) Extensions
d) None of above
167. You can switch from one program to another by clicking within
the desired program’s icon from the
a) Application icon on desktop
b) Application icon from taskbar
c) Folder
d) None of above
169. You can switch from one program to another on the desktop by
clicking within the desired program’s window or by clicking on its ….
button
a) Icon
b) Taskbar button
c) Folder
d) None of above
1. Tayo needs ......software to block known virus, Trojans and other malicious
codes.
a) Antivirus
b) Firewall
c) Network monitor
d) Intrusion detection system
2 .................... is a term used in computer security used to describe a technique used
in deceiving users into clicking something they may not want to click.
a) Clickjacking
b) Hijaking
c) Jaking
d) Cursorjaking
6. A person who sneaks into a computer file with bad intentions is known as
………….
a) Hacker
b) System Admin
c) Nerd
d) Enthusiast
14. A typical network attack that put computers at risk are …………….
a) viruses, spoofing, spyware
b) spring worm, boot worm, viral
c) scanning, spoofing, phishing
d) spoofing, phishing, spy
a) A computer worm
b) A Trojan Horses
c) A bit defender
d) An intruder
20. For the restricted and internet security zones you should disable ……..
a) Firewall
b) internet access
c) active software
d) active scripting.
21. The process of connecting with a computer system by
entering your identification or authentication username and
password is called ………
a) logging on
b) unlocking
c) starting
d) entering
38. A computer program that can replicate itself and spread itself and
interfere with the normal use of a computer or program is
called…………
a) an antivirus
b) a worm
c) a trojan horse
d) an anti-worm
40. A program similar to worm but does not lie dormant not does it
need another program to run is called ……….
a) Worm
b) Trojan
c) Sniffers
d) Crackers
41. A program that does not lie dormant and needs another program to run is
called
……….
a) Virus
b) Trojan
c) Sniffers
d) Crackers
47 .............. is when data is kept from other users that should not have access to it
unless granted permission by the owner of the data)
a) Confidentiality of data
b) Open data
c) Privatization of data
d) Public data
48. the term ..... is a computer slang used to describe a secret or undocumented
means of getting into a computer system.
a) backdoor
b) Trapdoor
c) frontdoor
d) safe mode
49. What type of software can be used to check for malicious codes in a
computer system.
a) Windows defender
b) Mail sniffers
c) Antivirus software
d) Anti-trojan software
54. ………. Is a term used to describe an attack where a user or group of users
send a massive amount of emails to interrupt a user of business from
receiving email or responding in a timely fashion.
a) Email Bomb
b) Email Rackets
c) Email Missile
d) Email Collection
59. Computer facilities need to be protected for the following reasons except…….
a) To prevent theft of or damage to the hardware
b) To prevent theft or damage to the information
c) To prevent disruption of service
d) To prevent authorized user
60. All of the following are part of the CIA triads except ……..
a) Confidentiality
b) Authentication
c) Integrity
d) Identity
61. Integrity van be examined from the following perspective but ……….
a) Unauthorized subjects should be prevented from making modifications.
b) Authorized subjects should be prevented from making
unauthorized modifications.
c) Object should be internally and externally consistent so that
there data is correct.
d) ` Authorized subjects should be prevented
from making authorized modification
63. One of the following is not part of the numerous attacks attributed with
violation of integrity in computer security.
a) Malicious codes
b) Back door
c) Trap door
d) Errors in coding
64. Which of the following is not related to security issues in computer security?
a) Privacy
b) Identification
c) Repudiation
d) Auditing
80. Which one of the following is not a countermeasure for brute force attack?
a) Physical access to the computer system must be controlled)
b) Deployment of multiple-factor authentication
c) Encrypting password files
d) Not using logon prompts.
81. Which one of the following is not a countermeasure for dictionary attack?
a) Physical access to the computer system must be controlled)
b) Deployment of multiple-factor authentication
c) Encrypting password files
d) Not using logon prompts.
82. The act of sending bombarding a server with many packets more
than it can handle is used for ………..
a) Denial of service
b) Packet Missile
c) Packet Bomber
d) Packet Sniffer
83. Denial of service attack can result to the following except ………
a) System crash
b) System reboot
c) System lagging
d) data corruption
84. The act of pretending other than what you are, is regarded as ……………
a) Spoofing
b) Imposter
c) Impersonation
d) Flagging
93 .................... are malicious codes that infect a system and lie dormant until
triggered by some one or more condition.
a) Logic bomb
b) Crackers
c) Trojan Horse
d) Spoofer
97. When a user accidently deletes a system file, what kind of threat is this?
a) Human error
b) Phishing
c) Spoofing
d) Trojan Horse
110. A .......... is a program that can infect other programs by modifying them, the
modification includes a copy of the virus program, which can go on to
infect other programs.
a) Worm
b) Virus
c) Zombie
d) Trap doors
117. Which of the following is the primary cause of 'invisible' damage? (i.e
damage is of unknown extent)
a) viruses
b) computer misuse
c) computer fraud
d) theft
118. What type of signal is generally used, between the badge and sensor, in
an active badge system?
a) radio waves
b) ultrasonic
c) satellite communication
d) infra-red
119. What method is used to receive information, from the sensor to the
workstation, in an active badge system?
a) frequency division multiplexing
b) time division multiplexing
c) first-in first-out mechanism (FIFO)
d) random detection
120. Why will specific active badges NOT work with all active badge systems?
a) they operate at different frequencies
b) they use different coding mechanisms
c) they adopt different methods of transmission
d) they can only be used in certain environments