0% found this document useful (0 votes)
23 views6 pages

Computer PDF Set 1

Computer 1

Uploaded by

ecidealtips
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views6 pages

Computer PDF Set 1

Computer 1

Uploaded by

ecidealtips
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

www.smartkeeda.com | testzone.smartkeeda.

com
h ttps :// /#

SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | CLAT | RJS Join us
Testzone presents

Computer
MockDrill
PDF No. 1
(PDF in English)

Test Launch Date: 4th Nov 2020


Attempt Test No 1 Now!

www.smartkeeda.com | testzone.smartkeeda.com
h ttps :// /#

SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | CLAT | RJS Join us
1. The first computers were programmed using ___________.
A. Machine language B. Assembly language C. Source code
D. Object code E. None of these

2. ___________ shortcut key is used to create a new folder in MS Windows.


A. Ctrl + N B. Right Click Button + Q + Enter
C. Ctrl + Shift + N D. Ctrl + W + Shift E. Right Click Button + F + Enter

3. Which of the following topology have a central controller or hub?


A. Ring B. Mesh C. Bus
D. Star E. None of these

4. ___________ is a set of rules computers use to talk to each other.


A. DOS command B. Protocol C. Antina
D. HTML E. None of these

5. Which of the following is an intersection of a row and column in a spreadsheet?


A. Worksheet B. Address C. Formula
D. Cell E. None of these

6. ___________is a self-contained step-by- step set of operations to be performed.


A. Network topology B. Algorithm C. Utility software
D. System Software E. Application software

7. What are programs such as Microsoft Edge that serve as navigable windows into the Web called as?
A. Windows Navigator B. Seach Engine C. Networks
D. Internet E. Web browsers

8. ___________shortcut key use to close the current window.


A. Alt + F7 B. Shift + F4 C. CRLT + F6
D. Alt + F3 E. None of these

9. What is the use of "," symbol in Ms EXCEL?


A. it is an intersection operator
B.allows you to make one reference for multiple cells located between 2 cells
C. is used to separate arguments in Excel spreadsheet formulas
D. For Sum of two cells
E. None of these

10. In computer, EDI stands for what?


A. Explore Data Image B. E-mail Data Interchange C. Exchange digital image
D. Electronic Data Interchange E. Electronic digital Interchange

www.smartkeeda.com | testzone.smartkeeda.com
h ttps :// /#

SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | CLAT | RJS Join us
11. What type of web technology creates an online community where people can make statements and
others can read and respond to those statements?
A. ASP B. I-Journal C. Podcast
D. Blog E. Cell

12. ___________network devices are also called a concentrator.


A. Wi-fi B. Router C. Social
D. Antina E. Hub

13. Internet access by transmitting digital data over the wires of a local telephone network is provided
by:
A. MODEM B. digital subscriber line C. digital signal line
D. leased line E. Router

14. Portrait and Landscape are ___________.


A. Page Orientation B. page layout C. page design
D. page size E. page view

15. ___________is a technique used to gain unauthorized access to computers, whereby the intruder
sends messages to a computer with an address indicating that the message is coming from a trusted
host?
A. Identity Theft B. Phishing C. IPPodcast
D. IP Spoofing E. Pharming

16. Hyperlink is a/an ___________.


A. collection or directory of web pages. B. input type for multimedia files.
C.text or image that you can click on to jump to a new document/page.
D. home page of a site. E. None of these

17. The main webpage of a website is also known as -


A. Icebreaker Page B. Home Page C. First Page
D. Contents Page E. Introduction Page

18. EBCDIC code can support ___________different representation of characters.


A. 149 B. 1024 C. 256
D. 32 E. 16

19. ___________ is used for Unauthorized copying of software to be used for personal gain instead of
personal backups.
A. program looting B. software piracy C. program thievery
D. data snatching E. data looting

20. Which of the following topologies has the highest reliability?


A. Bus topology B. Ring topology C. Star topology
D. Square topology E. Mesh topology

www.smartkeeda.com | testzone.smartkeeda.com
h ttps :// /#

SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | CLAT | RJS Join us
Correct answer:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
A C D B D B E E C D D E B A D C B C B E

www.smartkeeda.com | testzone.smartkeeda.com
h ttps :// /#

SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | CLAT | RJS Join us
www.smartkeeda.com | testzone.smartkeeda.com
h ttps :// /#

SBI | RBI | IBPS |RRB | SSC | NIACL | EPFO | UGC NET | LIC | Railways | CLAT | RJS Join us

You might also like