1. Which of the following are the 5 generic software engineering framework activities?
a) Communication, Planning, Modeling, Construction, Deployment
b) Communication, Risk management, Measurement, Production, Reviewing
c) Analysis, Designing, Programming, Debugging, Maintenance
d) Analysis, Planning, Designing, Programming, Testing
e) None of these
2. The principal electronic payment system for electronic commerce is ____.
a) Credit Card
b) Digital Wallet
c) Electronic Cheque
d) All of the above
e) None of these
3. First super computer of India:
a) Saga 220
b) PARAM 8000
d) PARAM 6000
e) None of these
4. The machine readable form of a program is called as ___
a) Source code
b) Object code
c) Compiler
d) Executable File
e) All of the above
5. AVI format was developed by:
a) IBM
b) Apple
c) Microsoft
d) Macromedia
e) Sun Microsoft
6. Which of the following IP address class is a multicast address?
a) Class A
b) Class B
c) Class C
d) Class D
e) Class F
7. Each character on the keyboard of computer has an ASCII value which stands for:
a) African Standard Code for Information Interchange
b) American Standard Code for Information Interchange
c) American Stock Code for Information Interchange
d) American Standard Code for Information Interfere
e) None of these
8. Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)?
a) Network layer
b) Data link layer
c) Transport layer
d) Application layer
e) Mac layer
9. What is the meaning of ‘Hibernate’ in Windows XP/ Windows 7?
a) Restart the computers in safe mode
b) Restart the computers in normal mode
c) Shutdown the computer terminating all the running applications
d) Shutdown the computer without closing the running applications
e) None of these
10. The basic unit of a worksheet into which you enter data in Excel is called a ___
a) Cell
b) Table
c) Box
d) Column
e) None of these
11. Which of the following is a correct format of e-mail address?
a) sales@website; info
e) All of the above
12. What is the shortcut key of printing a document for computer having windows?
a) Shift + P
b) Alt + P
c) Ctrl + P
d) Ctrl+Shift+P
e) None of these
13. The operating system does all of the following EXCEPT:
a) Provide a way for the user to interact with the computer
b) Manage the Central Processing Unit (CPU)
c) Manage memory and storage
d) Enable users to perform a specific task such as document editing
e) All of the above
14. ____ is the ability of an operating system to control the activities of multiple programs at the same time.
a) Streamlining
b) Multiuser
c) Multitasking
d) Simulating
e) None of these
15. Verification of a login name and password is known as:
a) Configuration
b) Accessibility
c) Authentication
d) Logging in
e) Logging off
16. All of the following statements concerning windows are true EXCEPT:
a) Windows are an example of a command-driven environment
b) Windows can be resized and repositioned on the desktop
c) More than one window can be open at a time
d) Toolbars and scrollbars are features of windows
e) None of these
17. All of the following statements concerning files are true EXCEPT:
a) A file is a collection of related pieces of information stored together for easy reference
b) Files can be generated from an application
c) Files are stored in RAM
d) Files should be organized in folders
e) None of these
18. What are the four things needed to connect to the Internet?
a) Monitor, Keyboard, Mouse and Modem
b) Telephone line, PDA, Modem and Computer
c) Telephone line, Modem, Computer and an ISP
d) Modem, Computer, PDA and ISP
e) None of the above
19. Which of the following is true about firewalls?
a) Follows a set of rules
b) Can be either a hardware or software device
c) Filters network traffic
d) All of the above
e) None of these
20. Data that are accumulated and processed in group called:
a) Group processing
b) Batch Processing
c) Time sharing
d) All of the above
e) None of the above
21. Allocation of resources in a time dependent manner to several program simultaneously called as:
a) Multi user
b) Multi tasking
c) Time sharing
d) All of the above
e) None of the above
22. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
a) Simulation
b) Animation
c) Robotics
d) Computer forensics
e) None of these
23. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
a) Eight bytes
b) Eight characters
c) Eight bits
d) Eight kilobytes
e) None of the above
24. Servers are computers that provide resources to other computers connected to a:
a) Mainframe
b) Supercomputer
c) Network
d) Client
e) User
25. The difference between people with access to computers and the Internet and those without this access is known as the:
a) Digital divide
b) Internet divide
c) Web divide
d) Cyber way divide
e) All of the above

Add a Comment

Your email address will not be published. Required fields are marked *