1. Computer audit involves review of ____
a) Established policies
b) Efficiency of operations
c) Checking of data integrity
d) a, b, c
e) None of these
2. Which of the following is not available in Font Spacing?
a) Normal
b) Loosely
c) Condensed
d) Expanded
e) None of these
3. Dynamic Adhoc Wireless Networks (DAWN) usually come under?
a) 2G
b) 3G
c) 4G
d) 5G
e) None of these
4. Which of the following is Not a characteristic of e-mail?
a) Low cost
b) Record maintenance in data base
c) High speed
d) Waste reduction
e) None of these
5. Which of the following is not an example of hard ware?
a) Scanner
b) Printer
c) Mouse
d) Monitor
e) Interpreter
6. A magnetic strip is fixed on the back of the cards, which holds information about the
customer such as his account number etc also contains his:
a) Personal Identification Number
b) Address
c) Age
d) Occupation
e) None
7. What is used in most programs that is a part of program and guides the user through
certain steps?
a) Wizard
b) Software
c) Wiki
d) Hardware
e) None of these
8. Which one of the following input device is user-programmable?
a) Dumb terminal
b) Smart terminal
c) VDT
d) Intelligent terminal
e) None of these
9. The most frequently used instructions of a computer program are likely to be fetched from?
a) The hard disk
b) Cache memory
c) RAM
d) Registers
e) None
10. In Excel, this is a prerecorded formula that provides a shortcut for complex calculations?
a) Value
b) Data Series
c) Function
d) Field
e) None of these
11. The secondary storage devices can only store data but they cannot perform?
a) Arithmetic Operation
b) Logic operation
c) Fetch operations
d) All of the above
e) None of the above
12. The One-time password (OTPs) can be obtained by a customer, via which among the following?
a) Approaching the nearest Bank Branch
b) e-mail by applying for OTP online
c) SMS on Mobile
d) All of the above
e) None of these
13. The ____ component is used by the data analyst to create the queries that access the database?
a) Data extraction
b) End User Presentation Tool
c) Data store
d) End User Query Tool
e) None Of These
14. Which of the following is used To access a mainframe or supercomputer?
a) PDA
b) Terminal
c) Modem
d) Node
e) None of these
15. “Bitmap” is a ?
a) Format which windows use for desktop wall paper
b) Graphic file format made up of small dots
c) Specific kind of bitmap files with the BMP extension
d) All of the above
e) None of these
16. ADSL stands for ?
a) Automatic Digital Subscriber Line
b) Asymmetric Direct Subscriber Line
c) Asymmetric Digital Subscriber Line
d) Automatic Direct Subscriber Line
e) None of these
17. The most common method of signing digitally is with the help of______cryptography, as contemplated by the Information Technology Act 2000:
a) Public Key
b) Biometrics
c) Firewall
d) b and c
e) None of these
18. Objects on the slide which holds text are called ______
a) Object holders
b) Text holders
c) Auto layout
d) Data holders
e) Place holders
19. What is the shortcut key to “Undo” the last action in a document?
a) Ctrl + U
b) Ctrl + Y
c) Ctrl + X
d) Ctrl + Z
e) None of these
20. End-to-end connectivity is provided from Host-to-Host in?
a) Network layer
b) Session layer
c) Data link layer
d) Transport layer
e) None
21. “www” is based on which of the following modes?
a) Local Server
b) 2-tier
c) Client server
d) 3- tier
e) None of these
22. Which command will be used to duplicate the entire disk?
a) Copy
b) Undo
c) Format
d) Disk copy
e) None
23. To select the entire column in a worksheet, which of the following options can be used?
a) Shift + Space
b) Alt + Space
c) Shift + Alt
d) Ctrl + Space
e) None of these
24. The errors that can be pointed out by the compiler are?
a) Semantic errors
b) Logic errors
c) System errors
d) Syntax errors
e) None of these

25. To access properties of an object, the mouse technique to use is ………
a) right-clicking
b) shift-clicking
c) dragging
d) dropping

e) None of these

Add a Comment

Your email address will not be published. Required fields are marked *