Computer Mcqs
Computer Mcqs
MCQ
SET-1
1. Which is considered a direct entry input 3) eight bits/vkB fcV~l
device? 4) sixteen bits/lksyg fcV~l
çR;{k ços'k buiqV fMokbl fdls ekuk tkrk gS\ 5) None of the above/mijksDr esa ls dksbZ ugha
1) Optical scanner/vkWfIVdy LdSuj Ans. (3)
2) Mouse/ekml 5. Which is a secondary memory device?
PP
3) Light pen/ykbV isu
4) Digitizer/fMftVkb”kj
Ekkè;fed eseksjh fMokbl dkSu lk gS\
1) CPU/lhih;w
A
5) All of the above/mijksDr lHkh 2) ALU/,-,y-;w
3) Floppy disk/ÝykWih fMLd
L
Ans. (5)
4) Mouse/ekml
L
2. The daily processing of corrections to
WI
customer accounts best exemplifies the
processing mode of: Ans. (3)
5) None of the above/mijksDr esa ls dksbZ ugha
ER
çlaLdj.k eksM dk mnkgj.k nsrk gS%
1) Batch processing/cSp çlaLdj.k
not forget?
daI;wVj eseksjh dkSu&lh gS tks Hkwyrh ugha gS\
E
2) Real-time processing
okLrfod le; çlaLdj.k
R
3) Interactive processing/baVj,fDVo çlaLdj.k
1) ROM
2) RAM/jSe
A
3) PROM
4) Multi processing/cgq çlaLdj.k 4) All of the above/mijksDr lHkh
Ans.
3.
(1)
C
5) All of the above/mijksDr lHkh
Ans.
Which is a unit of measurement used with 7.
computer systems?
5) None of the above/mijksDr esa ls dksbZ ugha
(1)
The most common binary code in use today
is the 8 bit ASCII code. What do the letters
daI;wVj flLVe ds lkFk fdl eki dh bdkbZ dk mi;ksx fd;k ASCII stand for?
tkrk gS\ vkt dk lcls vke ckbujh dksMASCII
8 fcV dksM gSA
1) Byte/ckbV ASCII ds fy, dkSu ls v{kj [kM+s gSa\
2) Kilobyte/fdyksckbV 1) American Standard Code for
3) Megabyte/esxkckbV International Interchange
4) Gigabyte/xhxkckbV varjkZ"Vªh; baVjpsat ds fy, vesfjdh ekud dksM
5) All of the above/mijksDr lHkh 2) American Standard Code for
Ans. (5) Information Interchange
4. A character is represented in EBCDIC by lwpuk ekud ds fy, vesfjdh ekud dksM
EBCDIC esa ,d pfj=k dk çfrfu/Ro fd;k tkrk gS 3) American Standard Code for
1) one bit/,d fcV Intelligence interchange
2) four bits/pkj fcV~l BaVsfytsal baVjpsat ds fy, vesfjdu LVSaMMZ dksM
P
A collection of eight bits is called
P
vkB fcV~l dk ,d laxzg dgk tkrk gS
4) Super computer/lqij daI;wVj
5) Mega frame/esxk çQse
A
1) Byte/ckbV Ans. (4)
2) Word/'kCn
L
14. Which of the following people probably has
3) Record/fjdkWMZ
L
the least amount of technical knowledge?
Ans. (1)
WI
4) file/i+Qkby
5) None of the above/mijksDr esa ls dksbZ ugha
fuEufyf[kr esa ls fdl O;fDr ds ikl laHkor% de ls de
rduhdh Kku gS\
1) Programmer/çksxzkej
10.
R
A BIT represents a
E
,d BIT ,d dk çfrfuf/Ro djrk gS
2) User/mi;ksxdrkZ
3) System analyst/flLVe fo'ys"kd
RE
1) Decimal digit/n'keyo vad
2) Octal digit/v"Vk/kjh vad
3) Binary digit/ckbujh vad
4) Computer operator/daI;wVj vkWijsVj
5) Computer professional/daI;wVj is'ksoj
Ans.
A
4) Hexadecimal digit/gsDlkMsfley vad
C
5) none of these/buesa ls dksbZ ugha
(3)
Ans.
15.
(2)
The Central Processing Unit (CPU)
consists of:
dsaæh; çlaLdj.k bdkbZ (lhih;w) eas fuEufyf[kr 'kkfey gSa
11. Which can read data and convert them to
a form that a computer can use? 1) Input, output and processing
dkSu lk MsVk i<+ ldrk gS vkSj mUgsa ,d ,sls :i esa ifjofrZr buiqV] vkmViqV vkSj çkslsflax
dj ldrk gS ftls daI;wVj mi;ksx dj ldrk gS\ 2) Control unit, primary storage &
1) Logic/rdZ secondary storage
2) Storage/HkaMkj.k fu;a=k.k bdkbZ] çkFkfed HkaMkj.k vkSj ekè;fed HkaM
3) Control/fu;a=k.k 3) Control unit, arithmetic-logic unit,
4) Input device/buiqV fMokbl primary storage
5) Output device/vkmViqV fMokbl fu;a=k.k bdkbZ] vadxf.kr&rdZ bdkbZ] çkFkfed HkaM
Ans. (4) 4) Control unit, processing, and primary
12. Software instruction intended to satisfy a storage
user’s specific processing needs are called fu;a=k.k bdkbZ] çlaLdj.k vkSj çkFkfed HkaMkj.k
mi;ksxdrkZ ds fof'k"V çlaLdj.k vko';drkvksa dks larq"V
5) None of the above/mijksDr esa ls dksbZ ugha
djus ds mí'; ls lkWÝVos;j baLVªD'ku dks dgk tkrk gS
Ans. (3)
Ans.
3)
5)
(2)
PP
DVD/MhohMh 4) ROM/jkse
None of these/buesa ls dksbZ ugha
1) terminal/VfeZuy
2) node/uksM
18. The
use
A
__________ tells the computer how to
L
its components.
3) desktop/MsLdVkWi
4) handheld/gkFk esa
IL
----------------------daI;wVj dks mlds ?kVdksa dk mi;ksx5)
rjhdk crkrk gSA
1) utility/mi;ksfxrk
Ans. (1)
djus None
dk of these/buesa ls dksbZ ugha
RW
2) network/usVodZ
3) operating system/vkWijsfVax flLVe
23. What data base function allows you to
define the data your database is storing?
D;k MsVk csl i+QaD'ku vkidks ml MsVk dks ifjHkkf"kr dj
EE
4) application program/vkosnu dk;ZØe
5) None of these/buesa ls dksbZ ugha vuqefr nsrk gS ftls vkidk MsVkcsl LVksj dj jgk gS\
1) Definition wizard/ifjHkk"kk tknwxj
R
Ans. (3)
19. A(n)__________is a program that makes the 2) Query Function/Dosjh lekjksg
A
computer easier to use.
C
3) Design view/fM”kkbu ns[ksa
(n)_______,d ,slk çksxzke gS tks daI;wVj dk mi;ksx djuk 4) Data dictionary/MsVk 'kCndks'k
vklku cukrk gSA
1) application/vkosnu
Ans. (4)
5) None of these/bueas ls dksbZ ugha
2) utility/mi;ksfxrk
24. If you wanted to tell the database
3) network/usVodZ
4) operating system/vkWijsfVax flLVe management system that a specific
5) None of these/buesa ls dksbZ ugha attribute contained numbers only, what
Ans. (2) would you need to set?
20. The ‘Difference Analyzer’ was created in ;fn vki MsVkcsl çca/u ç.kkyh dks crkuk pkgrs gSa fd ,d
the early 1920s by __ fof'k"V fo'ks"krk esa dsoy la[;k,¡ gSa] rks vkidks D;k lsV dju
^varj fo'ys"kd* 1920 ds n'kd esa -------------------------}kjk dh
cuk;k
vko';drk gksxh\
x;k FkkA 1) Data category/MsVk Js.kh
1) Peter Norton/ihVj ukWVZu 2) Data type/MsVk çdkj
2) Douglas Knuth/Mxyl uFk
3) Data dictionary/MsVk 'kCndks'k
3) Vannevar Bush/ouusoj cq'k
4) Data definition/MsVk ifjHkk"kk
4) Alan Kay/,yu ds
5) None of these/buesa ls dksbZ ugha 5) None of these/buesa ls dksbZ ugha
Ans. (3) Ans. (2)
PP
fjdkWMZ djus ds fy, D;k egRoiw.kZ fyad fjdkWMZ djrs
1) Primary key/çkFkfed dqath
2) Principal key/ç/ku daqth
gSa\
categories
Excel
of information we collect in an
worksheet, what type of table are
A
we creating?
3) Foreign key/fons'kh daqth tc ge o.kZu djrs gSa] ;k ifjHkkf"kr djrs gSa] rks gekjs }kjk
Ans. (3)
I L
4) Link key/fyad daqth
L
5) None of these/buesa ls dksbZ ugha
,Dlsy odZ'khV esa ,df=kr dh tkus okyh lwpuk dh Jsf.k;ksa]
ge fdl çdkj dh rkfydk cuk jgs gSa\
1) Categorization/oxhZdj.k
27.
W
When you link one database table to
R
another database table, what are you
2) Classification/oxhZdj.k
3) Explanation/Li”Vhdj.k
E
creating? 4) List definition/lwph ifjHkk"kk
tc vki ,d MsVkcsl rkfydk dks nwljh MsVkcsl rkfydk ls 5) None of these/buesa ls dksbZ ugha
E
tksM+rs gSa] rks vki D;k cuk jgs gSa\
R
1) Primary link/çkFkfed fyad
Ans. (4)
31. If you wished to limit what you would see
CA
2) Connectivity/dusfDVfoVh
3) Relationships/fj'rs
4) Referential integrity/çklafxd v[kaMrk
5) None of these/buesa ls dksbZ ugha
on an Excel worksheet, what data function
would you use?
;fn vki ,d ,Dlsy odZ'khV ij D;k ns[kuk pkgrs gSa] bls
lhfer djuk pkgrs gSa] rks vki fdl MsVk iQaD'ku dk mi;ksx
Ans. (3) djsaxs\
28. What would you need to establish if you 1) Sort/Øec¼ djsa
wanted to insure that the key in one 2) Filter/fi+QYVj djsa
database table was the same as a key in 3) Conditional format/l'krZ çk:i
another database table? 4) Data analysis/MsVk fo'ys"k.k
;fn vkidks ;g lqfuf'pr djus dh vko';drk gS fd vki 5) None of these/buesa ls dksbZ ugha
D;k lqfuf'pr djuk pkgrs gSa fd ,d MsVkcsl rkfydk esa dqath(2)
Ans.
vU; MsVkcsl rkfydk esa dqath ds leku gS\ 32. If you wished to highlight, not hide, some
1) Top-level grouping/'kh"kZ&Lrjh; lewgu information in a worksheet because it met
2) Connectivity/dusfDVfoVh some criteria, what Excel tool would you
3) Referential integrity/çklafxd v[kaMrk use?
4) Field properties/iQhYM xq.k ;fn vki fdlh dk;Zi=kd esa dqN lwpukvksa dks mtkxj djuk]
5) None of these/bueas ls dksbZ ugha fNikuk ugha pkgrs gSa] D;ksafd ;g dqN ekunaMksa dks iw
Ans. (3) gS] rks vki ,Dlsy Vwy dk D;k mi;ksx djsaxs\
PP
4) Field lists/iQhYM lwph
5) None of these/buesa ls dksbZ ugha
37. Microsoft’s Access and Corel’s Paradox are
both examples of which type of software?
ekbØkslkWÝV dk ,Dlsl vkSj dksjy dk fojks/kHkkl nksuks
Ans.
34.
(3)
L A
When creating a custom filer in Excel,
çdkj ds lkWÝVos;j ds mnkgj.k gSa\
1) Network database systems
L
which of the following would not be
I
usVodZ MsVkcsl flLVe
considered a Boolean operator?
2) Relational database systems
,Dlsy es ,d dLVe iQkbyj cukrs le;] fuEufyf[kr esa ls
1) If/;fn W
fdls cqfy;u vkWijsVj ugha ekuk tk,xk\
R 2) And/vkSj
3)
fjys'kuy MsVkcsl flLVe
Flat-file database systems
3) Or/;k
EE 4) Not/ugha
5) None of these/buesa ls dksbZ ugha 4)
ÝySV&iQkby MsVkcsl flLVe
Hierarchical database systems
inkuqØfer MsVkcsl flLVe
Ans.
35.
(1)
AR
Which of the following is a good habit to
get into when creating a worksheet? Ans. (2)
5) None of these/buesa ls dksbZ ugha
gS\
C
odZ'khV cukrs le; fuEufyf[kr esa ls dkSu lh vPNh
PP
Data warehouse/MsVk os;jgkml
None of these/buesa ls dksbZ ugha
3) XML 4) PHP
5) None of these/buesa ls dksbZ ugha
A
Ans. (2) Ans. (3)
41. The rules of a language are called its 45. JavaScript was developed by __________
__________.
RW
2) code/dksM
3) syntax/okD; jpuk
1) Microsoft/ekbØkslkWÝV
2) Sun/lw;Z
E
4) rigidity/dBksjrk 3) Oracle/vksjsdy
4) Netscape/usVLdsi
Ans. (3)
RE
5) None of these/buesa ls dksbZ ugha
Ans.
5) None of these/buesa ls dksbZ ugha
(4)
A
42. A language that can be written on one
platform and executed on another platform 46. This technology is used to convert XML
C
is said to be __________.
,d Hkk”kk ftls ,d eap ij fy[kk tk ldrk gS vkSj nwljs eap
tkrk gSA
into HTML.
XML dksHTML esa cnyus ds fy, bl rduhd dk
mi;ksx fd;k tkrk gSA
ij fu"ikfnr fd;k tk ldrk gS] mls----------------------------dgk
1) CSS 2) XHTML
1) portable/iksVsZcy 3) PHP 4) XSL
2) robust/etcwt 5) None of these/buesa ls dksbZ ugha
3) third generation/rhljh ih<+h Ans. (4)
4) dynamic/xfr'khy 47. The __________ is a special database that
5) None of these/buesa ls dksbZ ugha holds information about the computer’s
Ans. (1) user, installed programs and hardware
43. __________ is Microsoft’s latest entry into devices.
the programming arena. ---------------------,d fo'ks"k MsVkcsl gS tks daI;wVj ds mi;k
LFkkfir
------------------------çksxzfeax {ks=k esa ekbØkslkWÝV dh uohuredk;ZØeksa
çfof"V vkSj gkMZos;j midj.kksa ds ckjs esa tk
gSA j[krk gSA
1) Java/tkok 1) dynamic link library
2) NET/usV xfr'khy fyad iqLrdky;
3) Visual Basic/fotqvy csfld 2) initialization file/vkjaHkhdj.k i+Qkby
Ans.
5)
(2)
PP
None of these/buesa ls dksbZ ugha
1) Initialization files/çkjafHkd iQkbysa
2) Batch files/cSp i+Qkbysa
3) Executable files/fu"iknu ;ksX; i+Qkbysa
49.
L A
A series of steps that always results in
an answer is the definition of __________. 4) Help files/i+Qkbyksa dh enn djsa
pj.kksa dh ,d J‘a[kyk tks ges’kk ,d mÙkj esa ifj.kke nsrh5) None of these/buesa ls dksbZ ugha
IL
gS]———————dh ifjHkk”kk gSA
1) heuristic/gs;wfjfLVd
Ans. (2)
W
54. The __________ prevents unlawful access
2) flowchart/ÝykspkVZ to voice communications by wire.
ER
3) algorithm/,YxksfjFe
4) pseudo code/Nn~e dksM
————————ok;j }kjk èofu lapkj ds fy, xSjdkuwu
igqap dks jksdrk gSA
Ans. (3)
RE
5) None of these/buesa ls dksbZ ugha 1) Electronic Communications Privacy
Act
A
50. The color of an object is an example of
bysDVªkWfud lapkj xksiuh;rk vf/fu;e
a(n) __________.
C
fdlh oLrq dk jax
a(n)_______dk mnkgj.k gSA
1) attribute/fo'ks"krk
2) detail/foLrkj
3) listing/fyfLVax
2) Freedom of Information Act
lwpuk vf/fu;e dh Lora=krk
3) USA Patriot Act/;w,l, iSfVª;V ,DV
4) Privacy Act of 1974
4) specification/fofunsZ'ku 1974 dk xksiuh;rk vf/fu;e
5) None of these/buesa ls dksbZ ugha 5) None of these/buesa ls dksbZ ugha
Ans. (1) Ans. (1)
51. A(n) __________ file contains information 55. Which of the following will not protect you
in an indexed and cross-linked format.
from spam?
A(n)_________ i+Qkby esa vuqØfer vkSj ØkWl&fyaDM
fuEufyf[kr esa ls dkSu vkidks LiSe ls cpk,xk\
çk:i esa tkudkjh gSA
1) spam blockers/LiSe CykWdlZ
1) executable/fu"iknu ;ksX;
2) initialization/vkajHkhdj.k 2) e-mail rules/bZ&esy fu;e
3) help/enn 3) popup blocker/ikWivi vojks/d
4) library/iqLrdky; 4) filters/fiQYVj
5) None of these/buesa ls dksbZ ugha 5) None of these/buesa ls dksbZ ugha
Ans. (3) Ans. (3)
PP
----------------igqapsaA
,d--------------------dqN Hkh gS tks uqdlku igqapk ldrk gSA
1) vulnerability/Hks|rk
flLVe lans'k vkSj psrkouh i<+us ds fy,] foaMkst esa---------------
2) phish/fiQ'k
L A
1) system manager/flLVe eSustj
2) control panel/fu;a=k.k d{k
3) Threat/[krjk
4) spoof/LrwiQ
IL
3) event viewer/bZosaV n'kZd
4) message screen/lans'k LØhu
5) All of the above/mijksDr lHkh
W
Ans. (3)
5) None of these/bueas ls dksbZ ugha
62. In the right setting a thief will steal your
Ans.
58.
(3)
ER
To create a copy of files in the event of
information by simply watching what you
type.
E
system failure, you create a __________.
lgh lsfVax esa ,d pksj vkidh tkudkjh dks pqjkdj ns[ksxk fd
flLVe foiQyrk dh fLFkfr esa i+Qkbyksa dh çfrfyfi cukus ds
AR
fy,] vki ,d---------------------------cukrs gSaA
1) restore file/i+Qkbyksa dks iquLFkkZfir djsa
vki D;k Vkbi djrs gSaA
1) snagging/LuSfxax
C
2) backup/cSdvi
3) firewall/i+Qk;jokWy
4) redundancy/vfrjsd
5) None of these/bueas ls dksbZ ugha
2) spying/tklwlh djuk
3) social engineering/lk'ky bathfu;fjax
4) shoulder surfing/da/s lfiQZax
5) None of these/buesa ls dksbZ ugha
Ans. (2) Ans. (4)
59. If configured correctly, the __________ will 63. __________A hacker contacts you my phone
prevent interaction with your computer or email and attempts to acquire your
after a specified time period. password
;fn lgh rjhds ls dkWfUi+Qxj fd;k x;k gS] rks------------------------
___________A gSdj vkils esjs iQksu ;k bZesy ij laidZ
,d fufnZ"V le; vof/ ds ckn vkids daI;wVj ds lkFk djrk gS vkSj vkidk ikloMZ gkfly djus dk ç;kl djrk gSA
ckrphr dks jksd nsxkA 1) spoofing/LiwfiQax
1) firewall/i+Qk;jokWy
2) phishing/fi+Qf'kax
2) filter/fi+QYVj
3) spamming/LiSfeax
3) screen saver/LØhu lsoj
4) bugging/cfxax
4) popup blocker/ikWivi vojks/d
5) virus/ok;jl 5) None of these/buesa ls dksbZ ugha
Ans. (3) Ans. (2)
P
engaging in __________.
P
1)
,d gSdj tks bysDVªkWfud lalk/u esa tkudkjh cnyrk gS ;k2) AOL/,vks,y
CompuServe/dEI;wVl
L A
cukrk gS] ------------------ esa layxz gksrk gSA
1) denial of service/lsok ls oafpr djuk
3) NetZero/usVtsjks
4) MSN/,e,l,u
IL
2) sniffing/lw¡?kuk
3) terrorism/vkradokn
5) None of these/bueasa ls dksbZ ugha
Ans. (3)
W
4) data diddling/MsVk MhMhfyax
5) None of these/bueas ls dksbZ ugha
R
70. When internet data leaves your campus,
it normally goes to a(n) ______ before
E
Ans. (4)
moving toward its destination.
E
66. The __________ of a threat measures its
tc baVjusV MsVk vkids ifjlj dks NksM+ nsrk gS] rks ;g viu
potential impact on a system
AR
ekirk gSA
xarO; dh vksj c<+us ls igys lkekU;%
[krjs dk-------------------,d flLVe ij blds laHkkfor çHkko dks
tkrk gSA
(n)________ij
C
1) vulnerabilities/Hks|rk
2) countermeasures/çfrokn
3) degree of harm/uqdlku dh fMxzh
4) susceptibility/laosnu'khyrk
2) Network access point/usVodZ ,Dlsl IokbaV
3) Base station/csl LVs'ku
4) Communication system/lapkj ç.kkyh
5) none of these/buesa ls dksbZ ugha 5) None of these/buesa ls dksbZ ugha
Ans. (3) Ans. (2)
67. Which of the following identifies a specific 71. MCI and AT&T are examples of which of
web page and its computer on the Web? the following?
fuEufyf[kr esa ls dkSu osc ij ,d fof'k"V osc ist vkSj mlds MCI vkSjAT & T fuEufyf[kr esa ls fdlds mnkgj.k gSa\
daI;wVj dh igpku djrk gS\ 1) Social networks/lkekftd usVodZ
1) Web site/osc lkbV 2) Communications systems/lapkj ç.kkyh
2) Web site address/osc lkbV dk irk 3) Internet service providers
3) URL/;wvkj,y
baVjusV lsok çnkrk
4) Domain Name/Mksesy uke
4) Mobisodes/eksfclksM
5) All of above/mijksDr lHkh
5) None of these/bueas ls dksbZ ugha
Ans. (4)
Ans. (3)
PP 2) @
4) *
2) sysop/fllksi
3) narrator/dFkkokpd
Ans. (2)
L A
5) None of these/buesa ls dksbZ ugha 4) censor/lsalj
5) None of these/buesa ls dksbZ ugha
L
74. The mail server as defined in the text uses Ans. (2)
djrk gSA
WI
the __________ protocol 79. A message with replies on a newsgroup is
ikB esa ifjHkkf"kr esy loZj----------------------çksVksdkWy dk mi;ksx
often called a __________.
,d lekpkj lewg ds mÙkj okys lans'k dks vDlj----------------dgk
1) HTTP
3) POP
ER 2) FTP
4) SMTP
5) All of above/mijksDr lHkh
tkrk gSA
1) post/iksLV 2) list/lwph
Ans.
75.
(3)
RE
When sending an e-mail, the __________
3) thread//kxk
4) comment/fVIi.kh djsa
5) All of above/mijksDr lHkh
CA
line describes the contents of the message.
djrh gSA
1) to/dks
Ans.
bZ&esy Hkstrs le;]-----------------ykbu lans'k dh lkexzh
80.
(3)
dkThe
o.kZu
Internet was originally a project for
this government agency.
baVjusV ewy :i ls bl ljdkjh ,tsalh ds fy, ,d ifj;kstuk
2) subject/fo"k;
FkhA
3) contents/lkexzh
1) ARPA 2) NSF
4) CC/lh-lh-
3) NSA 4) FCC
5) All of above/mijksDr lHkh
5) None of these/buesa ls dksbZ ugha
Ans. (2)
Ans. (1)
76. Unsolicited commercial email is commonly
81. A word in a web page that, when clicked,
known as __________.
opens another document.
vokafNr okf.kfT;d bZesy dks vkerkSj ij--------------------ds :i esa
,d osc ist esa ,d 'kCn] ftl ij fDyd fd;k tkrk gS] ,d
tkuk tkrk gSA
vkSj nLrkos”k [ksyrk gSA
1) junk/dckM+
1) anchor/yaxj 2) URL
2) hoaxes/>kals
3) Hyperlink/gkbijfyad
3) spam/LiSe
4) reference/ lanHkZ
4) hypertext/gkbijVsDLV
5) All of above/mijksDr lHkh
5) All of above/mijksDr lHkh
Ans. (3)
Ans. (3)
PP
fyad djus dk leFkZu djrk gSA
----------------------vkWijsVj dk mi;ksx fd;k tkuk pkfg,A
---------------------og çksVksdkWy gS tks ,d osc ist ls nwljs ist dks
1) and/vkSj
2) or/;k
1) HTML
2) IP
L A 3) xor/,Dlj
4) both/nksuksa
3) HTTP
4) FTP
IL Ans.
5) All of above/mijksDr lHkh
(1)
Ans. (3)
RW
5) All of above/mijksDr lHkh
88. What type of accountants may recommend
controls for an organization’s computer
E
84. You can organize your bookmarks using systems?
AR
ldrs gSaA
1) structures/lajpuk,a
1) Environment accountant
i;kZoj.k ys[kkdkj
C
2) containers/daVsuj
3) folders/i+QksYMj
4) menus/esuw
5) None of these/buesa ls dksbZ ugha
2) Internal accountant/vkarfjd ys[kkdkj
3) Government accountant
ljdkjh ys[kkdkj
4) Public accountant/lkoZtfud ys[kkdkj
Ans. (3) 5) All of above/mijksDr lHkh
85. The browser’s __________ keeps a list of Ans. (2)
web pages you have visited during the 89. Which IT area is well-established in
current session. Accounting?
czkm”kj dk----------------orZeku l=k ds nkSjku vkids }kjkys[kkadu
ns[ks x, esa dkSu lk vkbZVh {ks=k vPNh rjg ls LFkkfir
osc istksa dh ,d lwph j[krk gSA 1) Multimedia systems/eYVhehfM;k flLVe
1) history/bfrgkl 2) Web development/osc fodkl
2) cache/dS'k 3) Statistical analysis/lkaf[;dh; fo'ys"k.k
3) favorites/ilanhnk 4) Accounting Information Systems
4) trail/fu'kku ys[kk lwpuk ç.kkyh
5) All of the above/mijksDr lHkh 5) None of these/buesa ls dksbZ ugha
Ans. (1) Ans. (4)
PP
laxBukRed usVodZ ç.kkfy;ksa ds ekè;e ls
5) All of above/mijksDr lHkh Ans.
95.
(2)
What part of object-oriented technology
A
Ans. (2)
defines superclass and subclass
91. Which computer virus records every
I L
movement you make on your computer?
L
dkSu lk daI;wVj ok;jl vkids daI;wVj ij vkids }kjk fd,
x, gj vkanksyu dks fjdkWMZ djrk gS\
relationships?
oLrq&mUeq[k çks|ksfxdh dk dkSu&lk fgLlk lqijDykl vk
mioxZ fj'rksa dks ifjHkkf"kr djrk gS\
1) Inheritance/oa'kkuqØe
RW
1) Malware Android/eSyos;j ,aMªkWbM
2) Key logger/daqth ydM+gkjk
2) Scalability/LdsysfcfyVh
3) Encapsulation/,ydSIlqys'ku
3) DoS
EE
4) Trapper/Vªsij
5) None of these/buesa ls dksbZ ugha
4) Polymorphism/cgq:irk
5) All of above/mijksDr lHkh
Ans.
92.
(2)
AR
What program would you use to gain
Ans.
96.
(1)
When an object has many forms, it has
_____.
C
administrative rights to someone’s
computer?
fdlh daI;wVj ij ç'kklfud vf/dkj çkIr djus ds fy, vki
fdl dk;ZØe dk mi;ksx djsaxs\
tc fdlh oLrq ds dbZ :i gksrs gSa] rks mlesa---------------------
-----------gksrk gSA
1) Inheritance/oa'kkuqØe
2) Scalability/LdsysfcfyVh
1) Bot 3) Encapsulation/,ydSIlqys'ku
2) Executive Android/dk;Zdkjh ,uMªksbZV 4) Polymorphism/cgq:irk
3) Rootkit/:VfdV 5) All of above/mijksDr lHkh
4) Trojan horse/Vªkstu gkWlZ Ans. (4)
5) none of these/buesa ls dksbZ ugha 97. What programming language model is
Ans. (3) organized around “objects” rather than
93. A remote control that is used to turn on “actions”?
or off some machine is also called a(n) ^^fØ;kvksa** ds ctk; ^^vkWCtsDV~l** ds vklikl fdl çksxzk
_____. ySaXost ekWMy dk vk;kstu fd;k tkrk gS\
fdlh e'khu dks pkyw ;k can djus ds fy, mi;ksx fd, tkus 1) Java/tkok 2) OOB
okys fjeksV daVªksy dks
a (n)__________ Hkh dgk tkrk gSA 3) Perl/iyZ 4) C++
1) class/oxZ 5) All of above/mijksDr lHkh
2) interface/baVji+Qsl Ans. (2)
PP
What common technique attempts to save
2) Relational programming language
laca/ijd çksxzkfeax Hkk"kk
A
time and energy by reducing redundant 3) Sixth-generation programming
work in object-oriented programming? language
L
le; vkSj ÅtkZ cpkus ds fy, dkSu&lh lkekU; rduhd dk
ç;kl gS\
4)
NBh ih<+h dh çksxzkfeax Hkk"kk
vkWCtsDV&vksfj,aVsM çksxzkfeax esa vuko';d dk;Z dks de djds
IL Database
Language
management programming
W
1) Reduce lines of programming
R
çksxzkfeax dh ykbuksa dks de djsa 5)
MsVkcsl çca/u çksxzkfeax Hkk"kk
None of these/bueas ls dksbZ ugha
E
2) Reuse of code/dksM dk iqu% mi;ksx
E
Ans. (1)
AR
C