1. When sending an e-mail, the ____ line describes the contents of the message.
Answer : Option A |
Explanation : |
Subject in an email is a description of the topic of the message. The subject line must be informative and tempt the reader into wanting to know more about the content. |
2. Which of the following packages is used for composition in printing press?
Answer : Option D |
Explanation : |
Adobe PageMaker is page laying or page composition (Desktop publishing) software that automates all the steps developing a printed document. Composition is the process of laying out text and graphics typography, line boxes pictures, drawing and colors on a page. |
3. Which of the following technique is used in high speed modem ?
Answer : Option C |
Explanation : |
QAM (Quadrature Amplitude Modulation), is the modulation scheme used in cable plants. RAM is how the modem encodes digital information to be sent over the RF interface of the modem. |
4. Which groupings do you work with when formatting text in Word ?
Answer : Option B |
Explanation : |
MS-Word helps you keep your documents, simple by organizing most formatting into 3 levels of related information: font, paragraph, and section. • Font formatting is any formatting that you can apply to as little as one characters, such as bold, underline, Time New Roman, etc. • Paragraph formatting is any formatting that you can apply to as little as one paragraph. Such as paragraph spacing before and after, line spacing, indents etc. • Section formatting can be thought of as page layout or document formatting, since this formatting applies to an entire document by default. Its named section because you insert a formatting mark called a section break in order to change settings for this type of formatting in only part of your document. |
5. ________ is system software designed to help analyze, configure, optimize or maintain a computer.
Answer : Option D |
Explanation : |
Utility software usually focuses on how the computer infrastructure (including the computer hardware, operating system, software and data storage) operates. Examples of utility program are Antivirus, Achievers, Backup software, Clipboard managers, and data compression. |
6. The main directory of a disk is called the ____ directory.
Answer : Option E |
Explanation : |
An operating system maintains a list of files called a directory for each disk. The main directory of the disk is called the root directory. The root directory is provided by the operating system and has a special name; for example, in DOS systems the root directory is called. The root directory is sometimes referred to simply as the root. |
7. _____ is the concept of sending extra bits for use in error detection.
Answer : Option A |
Explanation : |
Redundancy allows a receiver to check whether received data was corrupted during transmission. So that he can request a retransmission. Redundancy is the concept of using extra bits for use in error detection. The redundant bits are added by sender and removed by the receiver. Instead of repeating the entire data stream, a shorted group of bits may be appended to the end of each unit. This technique is called redundant because the extra bits are redundant to the data : they are discarded as soon as the accuracy of the transmission has been determined. |
8. The term 'Bit' is short form for
Answer : Option A |
Explanation : |
The term bit is a portmanteau of binary digit. It is the basic unit of information in computing and digital communications. A bit can have only one of two values, and may therefore be physically implemented with a two-state device. These values are most commonly represented as either a 0 or |
9. Different applications and documents of windows desktop are represented by
Answer : Option A |
Explanation : |
A computer icon refers to a small picture on a computer screen that represents a specific file, directory, window, option, program or application. Clicking on an item will start the associated application, program or open the associated file, directory or window. |
10. Which of the following is not a part of storage in the computer?
Answer : Option A |
Explanation : |
The plotter is a computer printer for printing vector graphics. A plotter gives a hard copy of the output. It draws pictures on paper using a pen. Plotters are used to print designs of ships and machines, plans for buildings and so on. |
11. Passwords enable users to __________.
Answer : Option D |
Explanation : |
Password is a set of secret characters or words utilized to gain access to a computer, web page, network resource or files. Password help ensure that computers or files can be accessed only by those who have been granted the right to view or access them. In this way, passwords provide confidentiality of computers or files from authorized access. |
12. ctrl, shift and alt are called ....... keys.
Answer : Option D |
Explanation : |
A modifier key is a special key on computer keyboard that temporarily modifies the normal action of another key when pressed together. Alt, Shift, Ctrl are modifier keys. • Shift- gives capital letters or to access the punctuation and other symbols on the number keys and other keys. eg. Shift + A gives output capital letter A. • Ctrl- Used in combination with other keys as shortcuts for menu commands, eg. Ctrl + S activates the save command. • Alt- Works as menu - command shortcuts. eg. Alt + F4 closes the active window on the desktop. |
13. Which one of the following would not be considered as a form of secondary storage ?
Answer : Option E |
Explanation : |
Secondary storage, sometimes called auxiliary or external storage, is non-volatile storage that is not under the direct control of a computer's central processing unit (CPU) or does not directly interact with an application. External hard drives, portable USB flash drives, CDs, DVDs and cloud backup are often used for secondary storage. |
14. Firewalls are used to protect against
Answer : Option C |
Explanation : |
A firewall is a system designed to prevent unauthorised access to or from a private computer network. It acts as a barrier between a trusted network and an untrusted network. A firewall controls access to the resources of a network through a positive control model. |
15. Storage that retains its data after the power is turned off is referred to as
Answer : Option A |
Explanation : |
Nonvolatile storage refers to a storage device whose contents are preserved when its power is off. Storage using magnetic media (e.g. magnetic disks, magnetic tape or bubble memory ) is normally nonvolatile. Other examples of non-volatile storage are EEPROM, CD-ROM,paper tape and punched cards. |