Slider[Style1]

Style2

Style3[OneLeft]

Style3[OneRight]

Style4

Style5[ImagesOnly]


1. Which of the following is not related to a computer monitor?
(a) VDU
(b) Plasma Display
(c) Pointing devices
(d) CRT
Answer: Pointing devices

2. ......... is an input device commonly available in laptops.
(a) Trackball
(b) Touchpad
(c) Touch screen
(d) Joystick
Answer: Touchpad

3. A temporary storage area attached to the CPU of the computer for input-output operations is a:
(a) Register
(b) Buffer
(c) Channel
(d) Core
Answer: Register

4. Product of the data processing is:
(a) Data
(b) A computer
(c) Software
(d) Information
Answer: Information

5. A collection of parallel lines that connects several devices in a computer is called:
(a) Bus
(b) Link
(c) Bidirectional wires
(d) Cables
Answer: Bus

6. Software installed to help prevent hacking is called:
(a) System software
(b) Antivirus software
(c) Firewall software
(d) Application software
Answer: Firewall software

7. Encryption of data means that:
(a) Data cannot be sent over the internet
(b) Data is encoded so it cannot be read without decoding software
(c) Data is kept locked in special room
(d) Data has been hacked into
Answer: Data is encoded so it cannot be read without decoding software

8. A person who gains unauthorized access to a computer network for profit, criminal mischief or personal pleasure is:
(a) Hacker
(b) Cracker
(c) Programmer
(d) None of these
Answer: Hacker

9. Linux is a .........
(a) Database program
(b) Application program
(c) Operating system
(d) None of these
Answer: Operating system

10. ......... is a legal monopoly granted for a limited time to the owner of an invention?
(a) Trade secrets
(b) Copyright
(c) Trademark
(d) Patent
Answer: Patent


11. This is based on individual who knows how to use information and communication technologies and those who do not?
(a) Access
(b) Usage
(c) Usage Quality
(d) None of the above
Answer: Usage

12. The kind of crime involves altering raw data just before a computer processes it and then changing it back after the processing is completed:
(a) Data diddling
(b) Data tampering
(c) Salami attacks
(d) None of the above
Answer: Data diddling

13. Information Technology Act in India was amended in:
(a) 2000
(b) 2004
(c) 2008
(d) 2010
Answer: 2008

14. This network is an autonomous Inter-University Centre of the University Grants Commission:
(a) NICENET
(b) BRNET
(c) INFLIBNET
(d) NICNET
Answer: INFLIBNET

15. Which of the following is not a wireless communication device?
(a) Blue tooth
(b) GPS
(c) Infra red communication
(d) None of these
Answer: None of these

16. Computer to computer exchange of business documents is done through?
(a) EDI
(b) ERP
(c) CAM
(d) CAD
Answer: EDI

17. Who started Free Software Foundation?
(a) Linus Torvald
(b) Richard Stallman
(c) Bill Gates
(d) GNU
Answer: Richard Stallman

18. Which of the following is not an e-governance project in India?
(a) PRAYAN
(b) FRIENDS
(c) Bhoomi
(d) CARD
Answer: PRAYAN

19. The resolution of a monitor is governed by the:
(a) Size of the screen
(b) Cost of the monitor
(c) Contrast of the pixels on the screen
(d) Number of pixels
Answer: Number of pixels

About VinAy KrishNan

iam Optimistic,Candid and a Responsible Boy I want to do my things succesfully.I love blogging and WebDesigning.help and support me.I love to write in Technology,Travel and more...
«
Next
Newer Post
»
Previous
Older Post

No comments:

Post a Comment

Google