0% found this document useful (0 votes)
3 views54 pages

Cpmputerr Practice

The document contains a series of multiple-choice questions and answers related to computer science and information technology topics, structured into four sets. Each set includes questions on various subjects such as data entry, email attachments, programming languages, and computer hardware. The document is intended for educational purposes, likely to aid in the study and understanding of IT concepts.

Uploaded by

ashi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views54 pages

Cpmputerr Practice

The document contains a series of multiple-choice questions and answers related to computer science and information technology topics, structured into four sets. Each set includes questions on various subjects such as data entry, email attachments, programming languages, and computer hardware. The document is intended for educational purposes, likely to aid in the study and understanding of IT concepts.

Uploaded by

ashi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

GROUP CLICK HERE


SUBSCRIBE OUR CHANNEL

1 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

Gillz Mentor Set-1


1. In addition to keying data directly into a database, data entry can be done from a(n)
1) input form
2) table
3) field
4) data dictionary
5) None of these

2. What is an e-mail attachment?


1) A receipt sent by the recipient
2) A separate document from another program sent along with an e-mail message
3) A malicious parasite that feeds off your messages and destroys the contents
4) A list of CC or BCC recipients
5) None of these

3. SMTP, FTP and DNS are applications of the ____ layer.


1) data link
2) network
3) transport
4) application
5) None of these
4. In a database, information should be organised and accessed according to which of the
following?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these

5. A _______ is a computer connected to two networks.


1) link
2) server
3) gateway
4) bridge way
5) None of these

6. A file extension is separated from the main file name with a(n) _______, but no spaces.
1) question mark
2) exclamation mark
3) underscore
4) period
5) None of these

2 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

7. A telephone number, a birth date, and a customer name are all examples of
1) a record
2) data
3) a file
4) a database
5) None of these

8. The term _______ designates equipment that might be added to a computer system to
enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these

9. Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None of these

10. The real business and competitive value of information technology lies in
1) The software applications that are used by many companies
2) The capabilities of the software and value of the information, a business acquires and
uses
3) The infrastructure of hardware, networks, and other IT facilities that are commonly used
by many companies
4) The capabilities of the hardware and the speed at which it processes information
5) None of these

11. OCR stands for _____


(1) Optical Character Recognition
(2) Optical CPU Recognition
(3) Optimal Character Rendering
(4) Other Character Restoration
(5) None of these

12. If a new device is attached to a computer, such as a printer or scanner, its ______ must be
installed before the device can be used.
1) buffer
2) driver
3) pager
4) server
5) None of these

13. The software that allows users to surf the Internet is called a/an

3 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

(1) Search engine


(2) Internet Service Provider (ISP)
(3) Multimedia application
(4) Browser
(5) None of these

14. A tuple is a
1) column of a table
2) two-dimensional table
3) row of a table
4) key of a table
5) None of these

15. The method of file organization in which data records in a file are arranged in a specified
order according to a key field is known as the
1) Direct access method
2) Queuing method
3) Predetermined method
4) Sequential access method
5) None of these

16. In Excel,_____ contains one or more worksheets.


1) Template
2) Workbook
3) Active cell
4) Label
5) None of these

17. Which of the following is a popular programming language for developing multimedia web
pages, websites, and web-based applications?
1) COBOL
2) Java
3) BASIC
4) Assembler
5) None of these

18. Compiling creates a(n) _____ .


1) program specification
2) algorithm
3) executable program
4) subroutine
5) None of these

19. A CD-RW disk


(1) has a faster access than an internal disk
(2) is a form of optical disk, so it can only be written once
(3) holds less data than a floppy disk
(4) can be erased and rewritten

4 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

(5) None of these

20. The first page of a Web site is called the


1) Home page
2) Index
3) Java Script
4) Book mark
5) None of these

Answers:

1 1 11 1
2 2 12 2
3 4 13 4
4 2 14 3
5 4 15 4
6 4 16 2
7 1 17 2
8 4 18 3
9 2 19 4
10 2 20 1

Set-2
1. Full form of TCP is:
(1) Transmission Control Protocol
(2) Total Control Protocol
(3) Transmission Control Program
(4) Totaling Control Program
(5) None of these

2. __ provides a common address space and routes the packets of data across the entire
internet?
(1) IP
(2) TCP
(3) UDP
(4) ALU
(5) None of these

5 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

3. Cyberspace is being governed by a system of law and regulation called?


(1) Civil Law
(2) Criminal Law
(3) Electronic Law
(4) Cyber Law
(5) Cyber Authority
4. To move to the beginning of a line of text, press __key?
(1) Home
(2) Ctrl
(3) Space
(4) Enter
(5) None of these

5. What menu is selected to change the font and style?


(1) Tools
(2) File
(3) Format
(4) Edit
(5) None of these

6. The process of starting the computer and loading of operating system programs for
execution is known as
(1) initialization
(2) retrieving
(3) loading
(4) searching
(5) booting

7. Primary memory is used by the:


(1) user
(2) input device
(3) CPU
(4) all of these
(5) None of these

8. In a disk, each block of data is written into -


(1) one sector
(2) three sector
(3) Two sectors
(4) Two or more sectors
(5) either two or three sectors:

9. The Pentium processor contains-


(1) tens of thousands of transistors
(2) hundred thousands of transistors
(3) thousands of transistors
(4) several millions of transistors
(5) hundred transistors

6 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

10. __ was the precursor to internet as we know it today?


(1) ARPANET
(2) USENET
(3) TELNET
(4) DBMS
(5) None of these

11. Which of the following is not an operating system?


(1) DOS
(2) Oracle
(3) Linux
(4) Windows
(5) None of these

12. In word, what combination of keys do you press to delete an entire word?
(1) Ctrl + del
(2) Alt + del
(3) Shift + Backspace
(4) Shift + Alt + del
(5) None of these

13. Hardware that adds two numbers is:


(1) the control unit
(2) an internal CPU register
(3) arithmetic Logic Unit
(4) Browser
(5) None of these

14. A small amount of memory included in the processor for high speed access id called-
(1) Register
(2) Cache
(3) RAM
(4) ROM
(5) None of these

15. A byte represents a group of:


(1) 10 bits (2) 40 bits
(3) 16 bits (4) 18 bits
(5) 8 bits

Answers:
1 1 6 5 11 2
2 1 7 3 12 5

7 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

3 2 8 4 13 3
4 1 9 4 14 2
5 3 10 1 15 5

Set-3
1. Which of the following is part of the system unit?
(1) Keyboard
(2) Floppy disks
(3) Monitor
(4) Memory
(5) CD

2. Specialized programs that allow particular input or output devices to


communicate with the rest of the computer system are called ____.
(1) operating systems
(2) utilities
(3) device drivers
(4) language translators
(5) Connectors

3. The primary purpose of software is to turn data into:


(1) Websites
(2) graphs
(3) programs
(4) objects
(5) information

4. The _____________ enables you to simultaneously keep multiple web pages


open in one browser window.
(1) Tab bar
(2) pop-up helper
(3) Tab row
(4) Address bar
(5) None of these

5. Information is?
(1) Summarization process of data
(2) Data Information

8 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

(3) Textual form of data


(4) Facts and figures
(5) None of these

6. Total memory of system can be known using?


(1) DIR commands
(2) MEM commands
(3) Warm boot
(4) TOT MEM commands
(5) None of these

7. The first graphical web browser are?


(1) Gopher
(2) WAIS
(3) CERN
(4) Mosaic
(5) None of these

8. Which of the following is correct?


(1) POWER(2^3)
(2) POWER(2,3
(3) POWER(2#3)
(4) POWER(2*3)
(5) None of these

9. What what is the default font in MS Word?


(1) Gothic Bold
(2) MV Biol
(3) Times new roman
(4) Arial
(5) None of these

10. ………………is the process of carrying out commands.


(1) Fetching
(2) Storing
(3) Executing
(4) Decoding
(5) None of these

11. Latest Entry Level Desktop PC have at least more than ------ of RAM.
(1) 100bit
(2) 100Byte
(3) 100KB
(4) 100 MB
(5) None of these

9 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

12. ---------- Bar is located at top of WordPad / Notepad /MS Word window.
(1) Title
(2) Menu
(3) Tool
(4) Format
(5) None of these

13. What is the decimal from of 3b4?


(1) 846
(2) 848
(3) 946
(4) 948
(5) None of these

14. The ---------- button on the quick access toolbar allow you to cancel your
recent commands or action.
(1) Search
(2) Cut
(3) Document
(4) Undo
(5) None of these

15. What type of virus use computer hosts to reproduces it?


(1) Time bomb
(2) worm
(3) Melissa virus
(4) Macro virus
(5) None of these

16. ---------- is a signaling method that handles a relatively wide range of


frequencies.
(1) Broadband
(2) DLF
(3) Dial-up
(4) both 1& 3
(5) None of these

17. Block on buffer caches are used:


(1) to handle interrupts
(2) to increase capacity of main memory
(3) to improve disk performance
(4)to speed up main memory read operation
(5) None of these

18. The term --- designate equipment that might be added to a computer
system to enhance. Its functionality.

10 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

(1) Digital device


(2) system add
(3) Disk pack
(4) Peripheral device
(5) None of these

19. A disk content that is recorded at the time of manufacture and that cannot
be changed or erased by the user.
(1) READ ONLY
(2) Memory only
(3) Run only
(4) WRITES ONLY
(5) None of these

20. A device designed to read information encoded onto a small plastic card is .
(1) light pen
(2) pun chard card
(3) magnetic tape
(4) magnetic
(5) badge reader

ANSWERS
1. 4
2. 3
3. 5
4. 3
5. 1
6. 2
7. 4
8. 2
9. 5
10. 3
11. 4
12. 1
13. 4
14. 4
15. 2
16. 1
17. 3
18. 4
19. 1
20. 5

11 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

Set-4
1. The vast network of computers that connects millions of people all over the
world is called.
(1)LAN
(2)web
(3)hypertext
(4)internet
(5)None of these

2. The property that, when classes are arranged in a hierarchy, each class
assumes the attributes and methods of its ancestors is
(1) generalization
(2) inheritance
(3) encapsulation
(4) information hiding
(5) None of these

3. The software component of an expert system that draws conclusions is the.


(1)user interface
(2)database
(3)inference engine
(4)1/0 controller
(5)model base

4. The attributes and methods for each object are stored in.
(1) an object instance
(2) an object connection
(3) an assembly structure
(4) an object repository
(5) None of these

5. An E-R diagram is a graphic method of presenting


(1) primary keys and their relationships
(2) primary keys and their relationships to instances
(3) entity classes and their relationships

12 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

(4) entity classes and their relationships to primary keys


(5) None of the above

6. The OCR is used for the preparation of


(1) electricity bills
(2) insurance premium
(3) telephone bills
(4) All of these
(5) None of these

7. Speed of line printer is limited by the speed of


(1) paper movements
(2) cartridge used
(3) length of paper
(4) All of these
(5) None of these

8. In laser printers, printing is achieved by deflecting laser beam on to surface


of a drum
(1) magnetized
(2) photosensitive
(3) magnetic
(4) Either (1)or (2)
(5) None of these

9. Resolution of laser printer is specified in terms of


(1) DPI
(2) LPM
(3) CPM
(4) PPM
(5) None of these

10. What are the units used to count the speed of a printer?
(1) CPM
(2) DPI
(3) PPM
(4) BIT
(5) None of these

11. The binary equivalent of decimal number 98 is

13 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

(1) 1110001
(2) 1110100
(3) 1100010
(4) 1111001
(5) None of these

12. The product of two binary numbers (1011) and (1001) is


(1) 1100011
(2) 1010100
(3) 1011001
(4) 100110
(5) None of these

13. A byte represents a group of


(1) 10 bits
(2) 40 bits
(3) 8 bits.
(4) 22 bits
(5) None of these

14. A hexadigit can be represented by


(1) three binary (consecutive) bits
(2) four binary (consecutive) bits
(3) eight binary (consecutive) bits
(4) sixteen binary (consecutive) bits
(5) None of the above

15. When a key is pressed on the keyboard, which standard is used for
converting the keystroke into the corresponding bits?
(1) ANSI
(2) ASCII
(3) EBCDIC
(4) ISO
(5) None of these

16. Which of the following statements in regard to directories is false?


(1) Directories with files can be deleted
(2) Directories cannot be renamed
(3) The root directory is always at the highest level
(4) Directories can exist inside directories

14 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

(5) None of the above

17. This part of operating system manages the essential peripherals, such as
the keyboard, screen , disk drives, and parallel and serial ports_____
(1) basic input/output system
(2) secondary input/output system
(3) peripheral input/output system
(4) marginal input/output system
(5) None of these

18. MS-DOS is usually supplied on a


(1) hard disk
(2) cartridge tape
(3) CD ROM
(4) floppy disk or diskettes
(5) None of these

19. Which one of the following is not a DOS prompt ?


(1) C >
(2) B >
(3) A >
(4) ENTER
(5) None of these.

20. Which one of the following is not an internal DOS command?


(1) BACKUP
(2) COPY
(3) CLS
(4) BREAK
(5) None of these

ANSWERS
1. 4
2. 2
3. 3
4. 4
5. 3
6. 4

15 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

7. 1
8. 2
9. 1
10. 4
11. 3
12. 1
13. 3
14. 2
15. 1
16. 2
17. 1
18. 4
19. 4
20. 1

Set-6
1. Extension name of flash file is ___.
1) .pdf
2) .swf
3) .pmd
4) .prd
5) None of these

2. Who invented world wide web?


1) Mosaic corporation
2) Opera corporation
3) Tim berner lee
4) Vint cert
5) None of these

3. URL stands for ____.


1) Uniform Resource Locator
2) Universal resource locator

16 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

3) Address bar
4) All 1, 2 & 3 are correct
5) None of these

4. A thing present in real world in physical form is called____.


1) DBMS
2) Entity
3) Modulation
4) Keywords
5) None of these

5. BUG is -
1) To find error in any software testing
2) To find error in any software code
3) logical error of any program
4) both 1 & 2
5) None of these

6. Which of the following is not a type of key?


1) Alphabetic Keys
2) Numeric keys
3) Function keys
4) Toggle keys
5) None of these

7. If a previously saved file is edited ___?


(1) it cannot be saved again
(2) the changes will automatically be saved in the file
(3) the file will only have to be saved again if it is more than one page in length
(4) its name must be changed
(5) the file must be saved again to store the changes

8. Which of the following converts all the statements in a program in a single


batch and the resulting collection of instructions is placed in a new file?
(1) Compiler
(2) Interpreter
(3) Converter
(4) Instruction
(5) None of these

17 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

9.A program that generally has more user-friendly interface than a DBMS is
called a ____?
(1) front end
(2) repository
(3) back end
(4) form
(5) None of these

10.When you install new programs on your computer, it is typically added to the
___?
(1) All programs
(2) Select programs
(3) Start programs
(4) Desktop programs
(5) None of these

11. Which of the following statements is FALSE concerning file names?


(1) Files may share the same name or the same extension but not both
(2) Every file in the same folder must have a unique name
(3) File extension is another name for file type
(4) The file extension comes before the dot (.) followed by the file name
(5) None of these

12. Which of the following is the key function of a firewall?


(1) Monitoring
(2) Deleting
(3) Record
(4) Copying
(5) Moving

13. Programming language built into user programs such as Word and Excel are
known as____?
(1) 4GLs
(2) macro languages
(3) object-oriented languages
(4) visual programming languages
(5) None of these

14. In MS Word Key F12 opens ____?


(1) Save dialog box

18 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

(2) print dialog box


(3) New dialog box
(4) Save as dialog
(5) none

15. What is gutter margin?


(1) Margin that is added to the left margin when printing
(2) Margin that is added to right margin when printing
(3) Margin that is added to the binding side of page when printing
(4) Margin that is added to the outside of the page when printing
(5) None of these

ANSWERS
1. 2
2. 3
3. 1
4. 2
5. 3
6. 5
7. 5
8. 1
9. 1
10. 1
11. 4
12. 1
13. 4
14. 4
15. 3

SET-7
1. When you save to _______, your data will remain intact even when
the computer is turned off.
a. RAM
b. motherboard
c. secondary storage device
d. primary storage device
e. None of these

19 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

2. The motherboard is the


a. circuit board that houses peripheral devices
b. same as the CPU chip
c. the first chip that is accessed when the computer is turned on
d. circuit board that contains a CPU and other chips
e. None of these

3. A computer-intensive problem runs on a _______.


1) server
2) mainframe
3) supercomputer
4) super PC
5) None of these

4. A(n) _______ converts and executes one statement at a time.


1) compiler
2) interpreter
3) converter
4) instructions
5) None of these

5. The term _______ designates equipment that might be added to a


computer system to enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these

6. Approximately how many bytes make one Megabyte?


1) One Thousand
2) Ten Thousand
3) One Hundred
4) One Million
5) None of these

7. What is MP3?
1) A mouse
2) A printer
3) A sound format

20 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

4) A scanner
5) None of these

8. All the deleted files go to


1) Recycle Bin
2) Task Bar
3) Tool Bar
4) My Computer
5) None of these

9. _______ is the act of copying or downloading a program from a


network and making multiple copies of it.
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-license piracy
5) None of these

10. A directory within a directory is called a _______.


1) Mini Directory
2) Junior Directory
3) Part Directory
4) Sub Directory
5) None of these

11. Which is the best definition of a software package?


a. An add-on for your computer such as additional memory
b. A set of computer programs used for a certain function such as word
processing
c. A protection you can buy for a computer
d. The box, manual and licence agreement that accompany commercial
software
e. None of these

12. In MICR, C stands for


1) Code
2) Colour
3) Computer
4) Character
5) None of these

21 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

13. Fax machines and imaging systems are examples of


1) bar-code readers
2) imaging systems
3) scanning devices
4) pen-based systems
5) None of these

14. When writing a document, you can use the _______ feature to find
an appropriate word or an alternative word if you find yourself stuck for
the right word.
1) dictionary
2) word finder
3) encyclopedia
4) thesaurus
5) None of these

15. Which key is used in combination with another key to perform a


specific task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None of these

16. A disk’s content that is recorded at the time of manufacture and


that cannot be changed or erased by the user is
1) read-only
2) memory-only
3) run-only
4) write-only
5) None of these

17. In an information system, alphanumeric data normally takes the


form of
a. Sentences and paragraphs
b. Numbers and alphabetical characters
c. Graphic shapes and figures
d. Human voice and other sounds
e. None of these

22 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

18. A Web site’s main page is called its _______


1) home page
2) browser page
3) search place
4) bookmark
5) None of these

19. When installing _______, the user must copy and usually
decompress program files from a CD-ROM or other medium to the hard
disk.
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these

20. A collection of interrelated files in a computer is a _______.


1) file manager
2) field
3) record
4) database
5) None of these

ANSWERS
1. c
2. d
3. 3
4. 2
5. 4
6. 4
7. 3
8. 1
9. 3
10. 4
11. b
12. 4
13. 3
14. 4

23 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

15. 2
16. 1
17. b
18. 1
19. 4
20. 4

CLICK HERE TO JION


TELEGRAM GROUP TO FREE
STUDY NOTES
SET-8
1. A device operating at the physical layer is called a
1) Bridge
2) Router
3) Repeater
4) All of the above
5) None of these

2. For separating channels in FDM, it is necessary to use


1) Time slots
2) Bandpass filters
3) Differentiation
4) All of the above
5) None of these

3. Encryption and decryption are functions of


1) Transport layer
2) Session layer
3) Presentation layer
4) All of the above
5) None of these

24 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

4. Which of the following computer language is a mathematically oriented languages


used for scientific problems?
1) FORTRAN
2) COBOL
3) LISP
4) PROLOG
5) APPLE

5. ________ is when the more power-hungry components, such as the monitor and the
hard drive, are put in idle.
1) Hibernation
2) Power down
3) Standby mode
4) The shutdown procedure
5) None of these

6. Hard disk drives are considered ________ storage.


1) flash
2) non-volatile
3) temporary
4) nonpermanent
5) None of these

7. The ________ key and the ________ key can be used in combination with other keys
to perform shortcuts and special tasks.
1) Control, Alt
2) Function, toggle
3) Delete, Insert
4) Caps Lock, Num Lock
5) None of these

8. The most common input devices are the ________ and the ________.
1) microphone, printer
2) scanner, monitor
3) digital camera, speakers
4) keyboard, mouse
5) None of these

25 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

9. To save an existing file with a new name or to a new location, you should use the
________ command.
1) Save
2) Save and Replace
3) Save As
4) New File
5) None of these

10. A(n) ________ is a combination of hardware and software that facilitates the
sharing of information between computing devices.
1) network
2) peripheral
3) expansion board
4) digital device
5) None of these

11. The term bit is short for ________


1) megabyte
2) binary language
3) binary digit
4) binary number
5) None of these

12. Computers gather data, which means that they allow users to ________ data.
1) present
2) input
3) output
4) store
5) None of these

13. Which of the following terms is just the connection of networks that can be joined
together ?
1) virtual private network
2) internet
3) intranet
4) extranet
5) None of these

26 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

14. ________ is a form of permanent memory that holds all the instructions the
computer needs to start up and does not get erased when the power is turned off.
1) The Network Interface Card (NIC)
2) The CPU
3) RAM
4) ROM
5) None of these

15. Servers are computers that provide resources to other computers connected to a
________
1) network
2) mainframe
3) supercomputer
4) client
5) None of these

1. 3
2. 2
3. 3
4. 1
5. 3
6. 2
7. 1
8. 4
9. 3
10. 1
11. 3
12. 2
13. 2
14. 4
15. 1

SET-9 MARKFED PAPER


1. What is the responsibility of the logical unit in the CPU of a computer?
a) Producing result

27 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

b) Comparing numbers
c) Controlling flow of information
d) Performing mathematical operations
e) Controlling flow of data

2. Abacus was the first ___


a) Electronic computer
b) Mechanical computer
c) Electronic calculator
d) Mechanical calculator
e) Electronic chip

3. If in a computer, 16 bits are used to specify address in a RAM, the number of


addresses will be ___
a) 216
b) 65,536
c) 64K
d) 128K
e) 135K

4. Instructions and memory address are represented by ___


a) Character code
b) Binary code
c) Binary word
d) Parity bit
e) Bite code

5. The terminal device that functions as a cash register, computer terminal and
OCR reader is:
a) Data collection terminal
b) OCR register terminal
c) Video Display terminal
d) POS terminal
e) None of the above

6. A set of flip flops integrated together is called ____


a) Counter
b) Adder
c) Register
d) Flip flop
e) All of the above

7. People often call ______ as the brain of computer system.


a) Control Unit
b) Arithmetic Logic Unit

28 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

c) Central Processing Unit


d) Storage Unit
e) Store data

8. Which of the following is used for manufacturing chips?


a) Bus
b) Control unit
c) Semiconductors
d) a and b only
e) None of the above

9. The value of each bead in heaven is ___


a) 1
b) 3
c) 5
d) 7
e) 8

10. The first computer introduced in Nepal was ___


a) IBM 1400
b) IBM 1401
c) IBM 1402
d) IBM 1406
e) IBM 1405

11. Bluetooth is a type of radio wave information transmission system that is


good for about:
a) 30 feet
b) 30 yards
c) 30 miles
d) 300 miles
e) 3000 miles

12. The telephone is an example of a(n)____ signal.


a) analog
b) digital
c) modulated
d) demodulated
e) compiler

13. Acredit card-sized expansion board that is inserted into portable computers
that connects the modem
to the telephone wall jack is:
a) Internal modem
b) External modem
c) PC Card modem

29 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

d) Wireless modem
e) Wired modem

14. A modem that is contained within the system unit is called:


a) External
b) Internal
c) Wireless
d) Wi-Fi
e) Bluetooth

15. A modem that doesn't need to be connected to a telephone line is the ___
modem.
a) external
b) internal
c) wireless
d) DSL
e) NSL

16. Aspecial high-speed line used by large corporations to support digital


communications is known as:
a) satellite/air connection service lines
b) cable modems
c) digital subscriber lines
d) T1, T2, T3 and T4 lines
e) None of the above

17. An affordable technology that uses existing telephone lines to provide high-
speed connections
is called ________.
a) ISDN
b) microwave
c) cable modem
d) DSL
e) ALU

18. The capacity of a communication channel is measured in ___


a) Bandwidth
b) Bit capacity
c) Baud rate
d) Data flow
e) Store data

19. A relatively new technology that allows wireless connectivity:


a) Bluetooth
b) Black tooth
c) Blue band

30 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

d) Broadband
e) Wi- fi

20. In MS-DOS 5.0, which is the number that acts as a code to uniquely identify
the software product?
a) MS
b) DOS
c) MS DOS
d) 5.0
e) 4.2.0

1) b;
2) d;
3) b;
4) b;
5) d;
6) c;
7) c;
8) c;
9) c;
10) b
11) a;
12) a;
13) c;
14) b;
15) c;
16) d;
17) d;
18) a;
19) a;
20) d;

SET-10

31 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

1.Which of the following controls the way in which the computer system functions and provides
a means by which users can interact with the computer?
(a) O/S
(b) Motherboard
(c) Platform
(d) I/O gateway
(e) None of these

2.Which of the following is the process of transferring software programme from a secondary
storage media into the hard disc?
(a) Storage
(b) Updating
(c) Upload
(d) installation
(e) None of these

3.For large network which topology is used?


(a) Star
(b) Ring
(c) Bus
(d) Mesh
(e) None of these

4. The time consumed by a piece of equipment’s operation is called


(a) Access time
(b) Real time
(c) Live time
(d) Effective tim
(e) None of these

5. The operating system is the most common type of ____________ software.


(a) Communication
(b) System software
(c) Word-processing software
(d) Spreadsheet software
(e) None of these
6. A VDU is used as
(a) Input device only
(b) Output device only
(c) Both (a) & (b)
(d) Neither (a) nor (b)
(e) Voice data translation device only

32 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

7. Which of the following is specially designed computer chips that reside inside other devices,
such as your car or your electronic thermostat etc.?
(a) Robotic computers
(b) Mainframe computers
(c) Embedded computers
(d) Peripheral computers
(e) None of these

8. The steps and tasks needed to process data, such as responses to questions or clicking an
icon, are called __________.
(a) The O/S
(b) Instructions
(c) Data flow
(d) Application software
(e) None of these

9. Which of the following storage medium stores instructions or data temporarily during
processing?
(a) Cache
(b) ROM
(c) EPROM
(d) RAM
(e) None of these

10.Which of the following is not a database object?


(a) Table
(b) Queries
(c) Reports
(d) Relationship
(e) All of the above

11. The type of input includes


(a) Programme
(b) Data
(c) Commands
(d) User response
(e) All of the above

12. The first layer in OSI reference model is


(a) Network
(b) Physical
(c) Application
(d) Data link
(e) None of these

33 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

13.The two broad categories of software are generally


(a) Word processing and spreadsheet
(b) Transaction and application
(c) Windows and Mac OS
(d) System and application
(e) None of these

14.Which of the following is not a language of DBMS?


(a) PASCAL
(b) PLI
(c) DML
(d) DDL
(e) All of the above

15. The case that holds all the physical parts of the computer is called
(a) System unit
(b) Platform
(c) Integrated platform
(d) Mainframe
(e) None of these

Answers
1. A
2. D
3. D
4. D
5. B
6. B
7. B
7. C
8. B
9. A
10.D
11. E
12. B
13. D
14. A
15. A

SET-11 COMPUTER EXAMS


1. __________________ applications refers to those applications in
which text, sound, graphics, motion video and animation are all

34 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

combined.
a.) Animation
b.) Multimedia
c.) Maxmedia
d.) Flash
e.) None of these

2. A language that refers to the way people think mathematically is


called as __________
a.) Functional language
b.) Cross-platform language
c.) Event driven programming language
d.) None of these

3. When you are typing the text in a document, you would need to hit
the enter key at the end of every ____________.
a.) Line
b.) Sentence
c.) Paragraph
d.) Word
e.) File

4. ___________________ is a set of rules that tell the computer what


to do.
a.) Procedural language
b.) Natural language
c.) Command language
d.) Programming language
e.) Instructions

5. The programs and data processed by the CPU are stored in


_______________
a.) Internal Memory
b.) External Memory
c.) Mass Memory
d.) Non-volatile memory
e.) None of these

6. _____________ refers to a set of characters of a particular design.

35 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

a.) Calligraph
b.) Typeface
c.) Keyface
d.) Formation
e.) None of these

7. ___________ is the detailed written description of the programming


cycle and the program accompanied by the test results and a printout of
the program.
a.) Output
b.) Spec Sheets
c.) Documentation
d.) Report
e.) Detail sheet

8. In a slide presentation, a typical slide does not have ___________


a.) Photo images, charts, graphs
b.) Clip arts
c.) Audio Clips
d.) Content
e.) Full motion video

9. In ____________, a file is transferred from another computer to


your computer.
a.) Copy
b.) Upload
c.) Download
d.) Upgrade
e.) RSS

10. ____________ in a computer is used for calculation and


comparison.
a.) ALU
b.) ROM
c.) CPU
d.) Control Unit
e.) None of these

11. _____________ is a talk that can be automatically downloaded


over the Internet and is available in Digital Format.

36 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

a.) Wiki
b.) Show
c.) Podcast
d.) Blog
e.) Movie

12. _____________ displays each slide of the PPT as a thumbnail and


is used to re-arrange them.
a.) Slide Show
b.) Slide Display
c.) Slide Design
d.) Slide Layout
e.) Slide Sorter

13. _____________ are the parallel electrical conducting lines that link
different components on the mother board.
a.) Buses
b.) Conductors
c.) Assemblies
d.) Connectors
e.) None of these

14. The mirror image of the whole hard disk including the OS,
applications, files and data is created by a ______________________.
a.) Utility program
b.) Driver
c.) Backup software
d.) OS
e.) None of these.

15. _______________ is a point and draw device.


a.) Scanner
b.) Printer
c.) Mouse
d.) Keyboard
e.) CD- ROM

16. Which of the following deals with data organised in rows and
columns?
a.) Matrix

37 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

b.) Spreadsheet
c.) Word document
d.) PPT
e.) MS Paint

17. If you want to find the Paste Special option, you would use the
Clipboard group on the tab of PowerPoint _____________.
a.) Home
b.) Slideshow
c.) Page Layout
d.) Design
e.) Insert

18. _________ are usually downloaded into the folder carrying


Temporary Internet Files and are written into the computer by the
websites you visit.
a.) Anonymous Files
b.) Cookies
c.) Banner Ads
d.) Images
e.) History

19. _______________ refers to the letter and number of the


intersecting column and row.
a.) Cell address
b.) Cell location
c.) Cell position
d.) Cell column
e.) Cell row

20. In a pull down menu if you see that a command appears faded, it
means that ____________
a.) the command is not applicable to this document.
b.) the command is not accessible at the moment.
c.) there are no keystrokes equivalent to those commands.
d.) None of these
e.) All of these

Answers
1.B

38 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

2.A
3. C
4. D
5. D
6.B
7. B
8.E
9.C
10. A
11.C
12.E
13.A
14. C
15.C
16. B
17. B
18.B
19.A
20B

SET-12
1. The vast network of computers that connects millions of people all over the
world is called _____.
1) LAN
2) Web
3) Hypertext
4) Internet
5) None of these

2. The property that, when classes are arranged in a hierarchy, each class
assumes the attributes and methods of its ancestors is _______.
1) generalization

39 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

2) inheritance
3) encapsulation
4) information hiding
5) None of these

3. The software component of an expert system that draws conclusions is the


_____.
1) user interface
2) database
3) inference engine
4) I/O controller
5) model base
4. The attributes and methods for each object are stored in _______.
1) an object instance
2) an object connection
3) an assembly structure
4) an object repository
5) None of these

5. An E-R diagram is a graphic method of presenting ____.


1) primary keys and their relationships
2) primary keys and their relationships to instances
3) entity classes and their relationships
4) entity classes and their relationships to primary keys
5) None of these

6. ________ is an invalid type of database key.


1) Structured primary key
2) Atomic primary key
3) Primary key
4) Composite primary key
5) None of these

7. A processor that collects the transmissions from several communications


media and sends them over a single line that operates at a higher capacity is
called ______.
1) multiplexor
2) bridge
3) hub
4) router
5) None of these

8. Bandwidth refers to _______.


1) the cost of the cable required to implement a WAN
2) the cost of the cable required to implement a LAN
3) the amount of information a peer-to-peer network can store

40 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

4) the amount of information a communications medium can transfer in a given


amount of time
5) None of these

9. _________ is a primary key of one file that also appears in another file.
1) Physical key
2) Primary key
3) Foreign key
4) Logical key
5) None of these

10. The technique that extends storage capacities of main memory beyond the
actual size of the main memory is called _______.
1) multitasking
2) virtual storage
3) multiprocessing
4) multiprogramming
5) switching

11. Customers, facilities, knowledge workers, business information,


communication infrastructure and computer equipment are all considerations in
a good _______ plan.
1) Hacker
2) Disaster recovery
3) Security
4) Risk management
5) None of these

12. Which of the following correctly defines the term E-Banking?


A) It is the short form of Efficient Banking which means providing all banking
related services to the customers in minimum required time during their visit to
the branch.
B) E-Banking is providing banking facilities to all the customers through ATMs
only which restricts their visits to a bank branch to a bare minimum.
C) E-Banking implies provisions of banking products and services through
electronic delivery channels like ATMs, Phone, internet, mobile phones etc.

1) Only A
2) Only B
3) Only C
4) Only A&B
5) Only A&C

13. SMTP, FTP and DNS are applications of the ____ layer.
1) data link
2) network

41 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

3) transport
4) application
5) None of these

14. In a database, information should be organised and accessed according to


which of the following?
1) Physical position
2) Logical structure
3) Data dictionary
4) Physical structure
5) None of these

15. Traffic in a VPN is not ______.


1) invisible from public networks
2) logically separated from other traffic
3) accessible from unauthorised public networks
4) restricted to a single protocol in IP Sec
5) None of these

16. A ________ is not a form of Biometrics.


1) fingerprint
2) password
3) retina scan
4) breath scan
5) None of these

17. A compiler ______.


1) translates machine language into a high level language
2) translates one statement at a time as the program executes
3) translates two statements at a time as the program executes
4) produces object code
5) is less sophisticated than an assembler

18. References to each file on a disk are stored in a ______.


1) file allocation table
2) root allocation table
3) linking directory
4) root directory
5) directory allocation table

19. A sender must not be able to deny that he sent a specific message when he
in fact did. This is an aspect of security called ______.
1) privacy
2) authentication
3) integrity
4) non-repudiation

42 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

5) None of these

20. _______ is an access method in which collisions are entirely avoided.


1) CSMA
2) CSMA/CD
3) CSMA/CA
4) All of these
5) None of these

1. 4 2. 2 3. 3 4. 4 5. 3
6. 1 7. 1 8. 4 9. 3 10. 2
11. 4 12. 3 13. 4 14. 2 15. 2

16. 2 17. 4 18. 1 19. 4 20. 5

SET-13
1.Which of the following memories is an optical memory?
A. Floppy Disk
B. Bubble Memories
C. CD–ROM
D. Core Memories
E. None of these

2. DNS refers to
A. Data Number Sequence
B. Digital Network Service
C. Domain Name System
D. Disk Numbering System
E. None of these

3.Java was originally invented by


A. Oracle
B. Microsoft
C. Novell
D. Sun
E. None of these

4.The unit of speed used for super computer is

43 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

A. KELOPS
B. GELOPS
C. MELOPS
D. All of these
E. None of these

5.Whose trademark is the operating system UNIX?


A. Motorola
B. Microsoft
C. BELL Laboratories
D. AshtonTate
E. None of these

6.The first mechanical computer designed by Charles Babbage was


called
A. Abacus
B. Analytical Engine
C. Calculator
D. Processor
E. None of these

7.Which of the following is the most powerful type of computer?


A. Super–micro
B. Super conductor
C. Super computer
D. Megaframe
E. None of these

8.Which gate is a single integrated circuit?


A. Gate
B. Mother Board
C. Chip
D. CPU
E. None of these

9. C is
A. A third generation high level language
B. A machine language
C. An assembly language
D. All of the above

44 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

E. None of these

10.Web pages are written using


A. FTP
B. HTTP
C. HTML
D. URL
E. None of these

11.Find the odd man out.


A. Coaxial cable
B. Microwaves
C. Optical fibre
D. Twisted pair wire
E. None of these

12.The parity bit is added for the purpose of


A. Coding
B. Error detection
C. Controlling
D. Indexing
E. None of these

13.India’s first super computer is


A. Agni
B. Flow solver
C. Param
D. Trisul
E. None of these

14.Which of the following is NOT operating system?


A. Dos
B. Unix
C. Window NT
D. Java
E. None of these

15.The computer that is not considered as a portable computer is


A. Laptop computer
B. Mini computer

45 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

C. Notebook computer
D. All of these
E. None of these

ANSWERS
1. c
2. b
3. d
4. b
5. c
6. b
7. c
8. a
9. a
10. c
11. b
12. b
13. c
14. d
15. B

SET-14
1. A hybrid computer exhibits the features of ____.
(A) Analog computer
(B) Digital computer
(C) Both analog and digital computer
(D) Mainframe computer
(E) None of these

46 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

2. A DSLAM is a device used by Internet Service Providers (ISPs) to


route incoming DSL connections to the Internet. What is its correct full
form?
(A) Digital Subscriber Line Access Multiplexer
(B) Digital Subscriber Line Access Multiplier
(C) Digital Service Line Access Multiplexer
(D) Dual Subscriber Line Access Multiplexer
(E) None of these

3.Which among the following has been standardized in the IEEE 803
specifications?
(A) Bluetooth
(B) Ethernet
(C) WiMAX
(D) All of the above
(E) None of the above

4. State the correct external command?


(A) Chkdsk.exe
(B) Attrib.exe
(C) Restore.exe
(D) Backup.exe
(E) All of the above

5 Which of the following is a Web browser?


(A) Word
(B) Paint
(C) Power Point
(D) Firefox
(E) None of these

6 Which of the following shortcut key is used to move backward


through the tabs?
(A) SHIFT+TAB
(B) CTRL+SHIFT+TAB
(C) CTRL+TAB
(D) CTRL+ALT+TAB
(E) None of the above

47 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

7 Alerts are mostly appear in ___.


(A) Check Box
(B) Combo Box
(C) Dialog Box
(D) All of the above
(E) None of the above

8 Which of the following is the impact printer?


(A) Laser printer
(B) Ink jet printers
(C) Chain Printers
(D) All of the above
(E) None of the above

9 The use of parity bit is for:


(A) Error detection
(B) Indexing
(C) Coding
(D) All of the above
(E) None of the above

10 Symbolic constants can be defined using ___


(A) extern
(B) const
(C) define
(D) All of the above
(E) None of the above

11 Stand alone programs refer to:


(A) Executable programs
(B) Source programs
(C) Object programs
(D) Direct programs
(E) Indirect programs

12 The primary purpose of software is to turn data into ____.


(A) websites
(B) information
(C) programs
(D) objects

48 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

(E) None of these

13 Back up of the data files will help to prevent ____.


(A) loss of confidentiality
(B) duplication of data
(C) virus infection
(D) loss of data
(E) None of these

14 ____ is processed by the computer into information.


(A) Data
(B) Numbers
(C) Alphabets
(D) Pictures
(E) All of the above

15 A ___ can make easier to play games.


(A) Mouse
(B) Joystick
(C) Keyboard
(D) Pen
(E) All of the above

ANSWERS
1. C
2. A
3. B
4. A
5. D
6. B
7. C
8. C
9. A
10. B
11. A
12. B
13. D
14. A
15. B

49 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

SET-15
1. An input device that converts data punched into paper lape into a
binary format is
A. Page reader
B. Paper tape punch
C. Paper tape reader
D. Card punch
E. None of the above

2. A computer will function only if it


A. has a control unit
B. is given input data
C. has a program in its memory
D. has software package
E. None of the above

3. A memory in which the information is stored last is on top & is


retrieved first is known as
A. PROM
B. Buffer
C. Stack
D. RAM
E. None of the above

4. Regarding a VDU, which statement is more correct?


A. It is an output device
B. It is an input device
C. It is a peripheral device
D. It is a hardware item
E. None of the above

5. Plotter accuracy is measured in terms of repeatability and


A. buffer size
B. resolution

50 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

C. vertical dimension
D. intelligence
E. None of the above

6. The minimum time delay required between the initiation of two


successive memory operations is known as
A. memory cycle time
B. memory access time
C. transmission time
D. waiting time
E. None of the above

7. Which of the following terms describe 1024 kilobytes?


A. Kilobyte
B. Megabyte
C. Gigabyte
D. Terabyte
E. None of the above

8. The flow and timing to data to and from the microprocessor is


regulated by
A. control pins
B. address pins
C. data pins
D. power pins
E. None of the above

9. The total number of messages handled by a computerized telephone


system on a daily basis is an example of:
A. Frequency
B. Updating
C. Volume
D. All of the above
E. None of the above

10. An internal storage consisting of arrays of small rings of magnetic


material called ferrite is
A. Magnetic tape
B. Magnetic core
C. Magnetic disk

51 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

D. Optical mark reader


E. None of the above

11. In the language of the computer profession, one thousand position


of main storage is represented with the letter
A. K
B. L
C. M
D. C
E. None of the above

12. Which of the following processor is software that accepts user


ideas, manipulates and reorganises them in user-specified ways and
then produces a refined model of those thoughts.
A. Distribute
B. Out-line
C. Multi
D. On-line
E. None of the above
13. The word 'Computer' usually refers to the Central Processor Unit
plus
A. External memory
B. Internal memory
C. Input devices
D. Output devices
E. None of the above

14. The control of the jobs running within a system is


A. Job monitoring
B. Job stream
C. Job min
D. Job step
E. None of the above

15. Communication using a modulated carrier to apply a data signal to a


transmission medium in analog form is
A. Local area network
B. Modem
C. Base band networking
D. Broad band networking

52 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

E. None of the above

Answers
1.C
2.C
3.C
4.C
5.B
6.A
7.B
8.A
9.C
10.B
11.A
12.B
13.B
14.A
15.D

53 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT
FREE STUDY NOTES CLICK HERE TO JOIN TELEGRAM GROUP

54 PUNJAB’S BEST E-LEARNING CHANNEL KEEP SUPPORT CLICK HERE AND SUBSCRIBE IT

You might also like