advertisements

1 .When sending an e-mail, the ____ line describes the contents of the message.
A.  subject
B.  to
C.  None of these
D.  contents
E.  cc
View Answer Discuss in Forum

2 .Which of the following packages is used for composition in printing press?
A.  Lotus
B.  Dbase
C.  Fortran
D.  PageMaker
E.  Word Perfect
View Answer Discuss in Forum

3 .Which of the following technique is used in high speed modem ?
A.  TDM
B.  PCM
C.  QAM
D.  FDM
E.  None of these
View Answer Discuss in Forum

4 .Which groupings do you work with when formatting text in Word ?
A.  None of these
B.  Characters, sections and paragraphs
C.  Indexes, characters and tables
D.  Paragraphs, indexes and sections
E.  Tables, paragraphs and indexes
View Answer Discuss in Forum

5 .________ is system software designed to help analyze, configure, optimize or maintain a computer.
A.  Data Compression
B.  File synchronization
C.  Hard disk
D.  Utility Program
E.  None of these
View Answer Discuss in Forum

6 .The main directory of a disk is called the ____ directory.
A.  network
B.  Home
C.  Other than those given as options
D.  folder
E.  root
View Answer Discuss in Forum

7 ._____ is the concept of sending extra bits for use in error detection.
A.  Redundancy
B.  Check
C.  None of these
D.  Detection
E.  Checksum fault
View Answer Discuss in Forum

8 .The term 'Bit' is short form for
A.  Binary Digit
B.  Binary Information Unit
C.  Binary Language
D.  Binary Number
E.  Megabyte
View Answer Discuss in Forum

9 .Different applications and documents of windows desktop are represented by
A.  Icons
B.  None of these
C.  Lebels
D.  Symbols
E.  Graph
View Answer Discuss in Forum

10 .Which of the following is not a part of storage in the computer?
A.  Plotter
B.  Hard Disk
C.  ROM
D.  RAM
E.  Floppy Disk
View Answer Discuss in Forum

11 .Passwords enable users to __________.
A.  make efficient use of time
B.  simplify file structures
C.  None of these
D.  retain confidentiality of files
E.  get into the system quickly
View Answer Discuss in Forum

12 .ctrl, shift and alt are called ....... keys.
A.  function
B.  adjustment
C.  alphanumeric
D.  modifier
E.  None of these
View Answer Discuss in Forum

13 .Which one of the following would not be considered as a form of secondary storage ?
A.  optical disk
B.  floppy disk
C.  RAM
D.  hard disk
E.  flash drive
View Answer Discuss in Forum

14 .Firewalls are used to protect against
A.  Phishing
B.  Vishing
C.  Unauthorized Attacks
D.  Data Driven Attacks
E.  External resources
View Answer Discuss in Forum

15 .Storage that retains its data after the power is turned off is referred to as
A.  Non-volatile storage
B.  Sequential storage
C.  Cache storage
D.  Volatile storage
E.  Direct storage
View Answer Discuss in Forum

Sponsored Links



Sponsored Links