-
1 MCQs Papers
Shakthii Academy
Important MCQs
1. Which of the following does not affect the resolution of a
video display image?
(a) Bandwidth (b) Raster scan rage (c) Vertical and horizontal
lines of resolution (d) Screen Size (e) None of these Ans : (a) 2.
Latency time is
(a) Time to spin the needed data under head (b) Time to spin the
needed data under track (c) Time to spin data under sector (d) All
of these (e) None of these Ans : (a) 3. DPI stands for
(a) Desktop projection Ink (b) Dot per inch (c) Dot-matrix
printer ink (d) Desktop pixel Inch (e) None of these Ans : (b) 4.
Databases software may be divided into
(a) five distinct categories (b) four distinct categories (c)
three distinct categories (d) two distinct categories (e) None of
these Ans : (c)
5. File record length
(a) Should always be fixed (b) Should always be variable (c)
Depends upon the size of file (d) Should be chosen to match the
data characteristics.
(e) None of these Ans : (d) 6. .is the time required by a sector
to reach below read/write heat
(a) Seek Time (b) Latency Time (c) Access Time (d) None (e) None
of these Ans : (b) 7. .is a technique of improving the priority of
process waiting in Queue for CPU allocation
(a) Starvation (b) Ageing (c) Revocation (d) Relocation (e) None
of these Ans : (b) 8. A grammar for a programming language is a
formal description of
(a) Syntax (b) Semantics (c) Structure (d) Code (e) None of
these Ans : (c) 9. is a technique of temporarily removing inactive
programs from the memory of computer system
(a) Swapping (b) Spooling
-
2 MCQs Papers
Shakthii Academy
(c) Semaphore (d) Scheduler (e) None of these Ans : (a) 10. The
memory allocation scheme subject to external fragmentation is
(a) segmentation (b) swapping
(c) pure demand paging (d) multiple fixed contiguous partitions
(e) None of these Ans : (a)
11. Virtual memory is
(a) simple to implement (b) used in all major commercial
operating
systems
(c) less efficient in utilization of memory (d) useful when fast
I/O devices are not
available
(e) None of these Ans : (b)
12. Before proceeding with its execution, each process must
acquire all the resources it needs is called
(a) hold and wait (b) No pre-emption (c) circular wait (d)
starvation (e) None of these Ans : (a)
13. The main reason to encrypt a file is to
(a) Reduce its size (b) Secure it for transmission
(c) Prepare it for backup (d) Include it in the start-up
sequence (e) None of these Ans : (b)
14. LRU page replacement policy is
(a) Last Replaced Unit (b) Last Restored Unit (c) Least Recently
Used (d) Least Required Unit (e) None of these Ans : (c)
15. Which of the following is not a fundamental process
state
(a) ready (b) terminated (c) executing (d) blocked (e) None of
these Ans : (d)
16. ODBC stands for
(a) Object Database Connectivity (b) Oral Database Connectivity
(c) Oracle Database Connectivity (d) Open Database Connectivity (e)
None of these
Ans : (d) 17. Which two files are used during operations of the
DBMS
(a) Query languages and utilities (b) DML and query language (c)
Data dictionary and transaction log (d) Data dictionary and query
language
-
3 MCQs Papers
Shakthii Academy
(e) None of these Ans : (c) 18. A protocol is a set of rules
governing a time sequence of events that must take place
(a) between peers (b) between an interface (c) between modems
(d) across an interface (e) None of these Ans : (a) 19. In
communication satellite, multiple repeaters are known as
(a) detector (b) modulator (c) stations (d) transponders (e)
None of these Ans : (d) 20. Which of the following is required to
communicate between two computers?
(a) communications software (b) protocol (c) communication
hardware (d) all of above including access to transmission
medium
(e) None of these Ans : (d) 21. Which of the following is an
advantage to using fiber optics data transmission?
(a) resistance to data theft (b) fast data transmission rate (c)
low noise level (d) All of these (e) None of these
Ans : (d)
22. Which of the following is not a transmission medium?
(a) telephone lines (b) coaxial cables (c) modem (d) microwave
systems (e) None of these
Ans : (c) 23. A technique for direct search is
(a) Binary Search (b) Linear Search (c) Tree Search (d) Hashing
(e) None of these Ans : (d) 24. Two main measures for the
efficiency of an algorithm are
(a) Processor and memory (b) Complexity and capacity (c) Time
and Space (d) Data and Space (e) None of these Ans : (c) 25. The
space factor when determining the efficiency of algorithm is
measured by
(a) Counting the maximum memory needed by the algorithm
(b) Counting the minimum memory needed by the algorithm
(c) Counting the average memory needed by the algorithm
(d) Counting the maximum disk space needed by the algorithm
(e) None of these Ans : (a)
-
4 MCQs Papers
Shakthii Academy
26. The memory address of the first element of an array is
called
(a) floor address (b) foundation address (c) first address (d)
base address (e) None of these Ans : (d) 27. The term push and pop
is related to the
(a) array (b) lists (c) stacks (d) all of these (e) None of
these Ans : (c) 28. What does Router do in a network?
(a) Forwards a packet to all outgoing links (b) Forwards a
packet to the next free outgoing link
(c) Determines on which outing link a packet is to be
forwarded
(d) Forwards a packet to all outgoing links except the original
link
(e) None of these Ans : (c) 29. Repeater operates in which layer
of the OSI model?
(a) Physical layer (b) Data link layer (c) Network layer (d)
Transport layer (e) None of these Ans : (a) 30.GIF images can have
only upto . colors
(a) 128 (b) 256 (c) 512 (d) 1024 (e) None of these Ans : (b) 31.
is stored on a client and contains state information of the website
visited
(a) Cookies (b) Servelet (c) History (d) Resident Page (e) None
of these Ans : (a) 32...are small applications that are accessed on
an internet server, transported over the internet, automatically
installed and run as part of a web document.
(a) Applets (b) Java Bean (c) Sockets (d) Java Component (e)
None of these Ans : (a) 33. Encryption is the conversion of data in
some
intelligible format into an unintelligible format called.to
prevent the data from being understood if read by an unauthorized
party.
(a) Clear Text (b) Encrypted Text (c) Cipher Text (d) Coded Text
(e) None of these Ans : (c) 34. The method for storing data
temporarily such
that the input-output of the same job is overlapped with its own
processing, is known as :
(a) Spooling (b) Contention (c) I/O wait (d) Buffering (e) None
of these Ans : (d)
-
5 MCQs Papers
Shakthii Academy
35. Each cell in Microsoft Office Excel documents is referred to
by its cell address, which is the..
(a) cells column label (b) cells column label and worksheet
tab
name
(c) cells row and column labels (d) cells row label (e) None of
these Ans : (c) 36. The lowest form of computer language is
called
(a) BASIC (b) FORTRAN (c) Machine Language (d) COBOL (e) None of
these Ans : (c) 37. The portion of the application that you
work
with in an application software package is the
(a) user interface (b) utility interface (c) processing
interface (d) analytical interface (e) None of these Ans : (a) 38.
Aprovides access to features of
the program.
(a) menu bar (b) browser (c) Office Assistant (d) feature
presentation (e) None of these Ans : (a) 39. Menus are a part of
the
(a) hardware (b) monitor (c) Status Bar (d) user interface (e)
None of these Ans : (d) 40. Which of the following is the term for
a
request for specific data contained in a database?
(a) question (b) query (c) inquiry (d) quiz (e) None of these
Ans : (b) 41. Windows 7 is an example of a(n) (a) application
software (b) browser (c) Operating system (d) shareware (e) None of
these Ans : (c) 42. The most powerful type of computer.
(a) mainframe computers (b) microcomputers (c) minicomputers (d)
supercomputers (e) None of these Ans : (d) 43.The system component
that controls and manipulates data in order to produce information
is called the
(a) keyboard (b) microprocessor (c) monitor (d) mouse (e) None
of these Ans : (b)
-
6 MCQs Papers
Shakthii Academy
44. Which of the following is not an operating system for mobile
phones?
(a) Android (b) Symbian (c) iOS (d) Bada (e) All of these are OS
for mobile phones Ans : (e) 45. This type of file is created by
word processors.
(a) worksheet (b) document (c) database (d) presentation (e)
None of these Ans : (b) 46. Many experts are predicting that this
revolution is expected to dramatically affect the way we
communicate and use computer technology.
(a) graphics (b) input (c) memory (d) wireless (e) None of these
Ans : (d) 47. The Internet was launched in 1969 when the United
States funded a project that developed a national computer network
called
(a) Web (b) ISP (c) CERN (d) ARPANET (e) None of these Ans : (d)
48. A(n)..program provides access to Web resources.
(a) Web (b) ISP (c) browser (d) URL (e) None of these Ans :
(c)
49. Rules for exchanging data between computers are called
(a) programs (b) procedures (c) protocols (d) hyperlinks (e)
None of these Ans : (c) 50. The last part of the domain name
following the dot(.) is the top.domain (a) Level (b) link (c)
locator (d) language (e) None of these Ans : (a) 51.Many
individuals create their own personal sites called Web logs,
or.
(a) social networks (b) blogs (c) wikis (d) search engines (e)
None of these Ans : (b) 52. Programs that automatically submit your
search request to several search engines simultaneously are
called
(a) metasearch engines (b) inclusive search engines (c) spiders
(d) hits (e) None of these Ans : (a) 53. ..cash is the Internets
equivalent to traditional cash.
(a) Universal (b) Web (c) Premium (d) Digital
-
7 MCQs Papers
Shakthii Academy
(e) None of these Ans : (d) 54. These programs allow parents as
well as organizations to block out selected sites and set time
limits on Internet access.
(a) plug-ins (b) filters (c) FTP (d) DSL (e) None of these Ans :
(b) 55. This type of software works with end users, application
software, and computer hardware to handle the majority of technical
details. (a) application software (b) communications software (c)
system software (d) Web software (e) None of these Ans : (c) 56.
.are narrowly focused on specific disciplines and occupations.
(a) Basic applications (b) Business suites (c) Specialized
applications (d) Utility programs (e) None of these Ans : (c) 57.
The primary purpose of this type of software is to create
text-based documents.
(a) spreadsheet (b) presentation (c) word processing (d) web
development (e) None of these
Ans : (c) 58. Letters, memos, term papers, reports, and
contracts are all examples of
(a) models (b) spreadsheets (c) documents (d) menus (e) None of
these Ans : (c) 59. The acronym DBMS stands for what?
(a) double-blind management setup (b) document binder management
system (c) data binding and marketing structure (d) database
management system (e) None of these Ans : (d) 60. Database..are
primarily used to enter new records and to make changes to existing
records.
(a) reports (b) tables (c) forms (d) queries (e) None of these
Ans : (c) 61. A file that includes predefined settings that
can be used to create many common types of presentations is
called a
(a) pattern (b) model (c) template (d) blueprint (e) None of
these Ans : (c) 62. A(n)....is a single program that provides
the functionality of a word processor, spreadsheet, database
manager, and more.
(a) specialized application (b) integrated package (c) basic
application
-
8 MCQs Papers
Shakthii Academy
(d) software suite (e) None of these Ans : (b) 63. A Computer
that is on the Network is a
.
(a) Node (b) Terminal (c) Client (d) Online (e) None of these
Ans : (a) 64. Network operating systems from Novell is
...
(a) NOS (b) UNIX (c) NetWare (d) Solaris
(e) None of these Ans : (c)
65. NIC Stands for
(a) Network Interface Card (b) Network Internal Card (c) Network
Internet Client (d) Network Input Card (e) None of these Ans : (a)
66. Older network often use another type of cable, called..
(a) Twisted-pair cable (b) Unshielded twisted-pair cable (c)
Coaxial cable (d) Optical Fiber (e) None of these Ans : (c) 67.
Magnetic Media is an Example oflayer
(a) Physical Layer (b) Data Link Layer
(c) Network Layer (d) Application Layer (e) None of these Ans :
(a) 68. This power protection device includes a battery that
provides a few minutes of power.
(a) surge suppressor (b) line conditioner (c) generator (d) UPS
(e) None of these Ans : (d) 69. Which layer defines the
mechanical,
electrical, and timing interfaces to the network?
(a) Physical Layer (b) Data Link Layer (c) Network Layer (d)
Application Layer (e) None of these Ans : (a) 70. SCSI port
(pronounced skuzzy) stands for (a) System Computer Scanning
Interface (b) Small Computer System Interface (c) Small Computer
System Internet (d) System Computer, System Interfaced (e) None of
these Ans : (b) 71. LPT stands for
(a) Laser Printer (b) Link Port (c) Line Printer (d) Line Port
(e) None of these Ans : (c) 72. Spool stands for________
(a) Serial Printer Object Oriented Language
-
9 MCQs Papers
Shakthii Academy
(b) Simultaneous Peripheral Output On-Line (c) System Protocol
Optimization Outliner (d) Single Program Operating System
Operation
(e) None of these Ans : (b) 73. Which of the following field is
not a part of
Frame?
(a) kind (b) seq (c) header (d) info (e) None of these Ans : (c)
74. The technique of temporarily delaying
outgoing acknowledgments so that they can be hooked onto the
next outgoing data frame is known as
(a) Correcting (b) Piggybacking (c) Sliding (d) None of these
(e) None of these Ans : (b) 75. The data link layer is used
for_____
(a) Providing a well-defined service interface to the network
layer.
(b) Dealing with transmission errors (c) Regulating the flow of
data so that slow
receivers are not swamped by fast senders
(d) All of these (e) None of these Ans : (d) 76.What does SDLC
mean in Networking protocol?
(a) Software Data Link Control (b) Synchronous Data Link Control
(c) Software Development Life Cycle
(d) Synchronous Data Development Cycle (e) None of these Ans :
(b) 77. ADCCP means
(a) Analog Data Code Check Procedure (b) Active Database
Communication Control Program
(c) Application Data Cache Call Procedure (d) Advanced Data
Communication Control Procedure
(e) None of these Ans : (d) 78. According to ISO, HDLC means
(a) High-Level Data Link Control (b) High-Level Data Language
Control (c) Hardware Data Link Control (d) High Definition Link
Control (e) None of these Ans : (a) 79. ..act as a central
transmitter and receiver in wireless local area network
(a) Access Nodes (b) Access Points (c) Access Hubs (d) Access
Switch (e) None of these Ans : (b) 80. IP address means
(a) Internet Protocol (b) Internal Power (c) Intranet Protocol
(d) Internal Protocol (e) None of these Ans : (a)
-
10 MCQs Papers
Shakthii Academy
81. Which technology is used in a CDROM Drive?
(a) Mechanical (b) Electromechanical (c) Optical (d) Fiber
Optical (e) None of these Ans : (c) 82. Which of the following
device can store large amounts of data?
(a) Floppy Disk (b) Hard Disk (c) CDROM (d) Zip Disk (e) None of
these Ans : (b) 83. Which of the following is handy to carry yet
can store large amounts of data?
(a) Floppy Disk (b) Hard Disk (c) CDROM (d) Zip Disk (e) None of
these Ans : (d) 84. Data (information) is stored in computers as?
(a) Files (b) Directories (c) Floppies (d) Maer
(e) None of these Ans : (a)
85. IP Addresses has..bytes
(a) 2 (b) 4 (c) 8 (d) 16 (e) None of these Ans : (b)
86. Which of the following statements is/are true?
(a) Cache Memories are bigger than RAM (b) Cache Memories are
smaller than RAM (c) ROM are faster than RAM (d) Information in ROM
can be written by users
(e) None of these Ans : (b) 87. A server that can perform to
other task besides network services is called
(a) Uno server (b) Dedicated server (c) Committed server (d)
Service server (e) None of these Ans : (b) 88. Name a network
operating system that is specially designed to handle networking
functions efficiently.
(a) Windows Server 2008 (b) Windows NT (c) NOS (d) UNIX (e) None
of these Ans : (b) 89. MOS stands for?
(a) Metal Oxide Semiconductor (b) Most Often Store (c) Method
Organised Stack (d) Microsoft Office Suite (e) None of these Ans :
(a)
-
11 MCQs Papers
Shakthii Academy
90. Which of the following is not a logic gate?
(a) AND (b) NOR (c) NAND (d) NAT (e) None of these Ans : (d) 91.
Which of the following RAM times have to be refreshed often in
order to retain its contents?
(a) SIMM (b) DIMM (c) SDMM (d) Western Digital (e) None of these
Ans : (b) 92. Which of the following companies is a leader in
manufacture of Hard Disk Drives?
(a) Samsung (b) IBM (c) Fujitsu (d) Western Digital (e) None of
these Ans : (d) 93. Usually, in MSDOS, the primary hard disk drives
has the drive letter?
(a) A (b) B (c) C (d) D (e) None of these Ans : (c) 94. Which of
the memories below is often used in a typical computer
operation?
(a) RAM (b) ROM (c) FDD (d) HDD (e) None of these Ans : (a) 95.
Which storage device is mounted on reels?
(a) Floppy Disk (b) Hard Disk (c) Magnetic Tapes (d) CDROM
(e) None of these Ans : (c) 96. MTBF means
(a) Mean Time Before Failure (b) Master Time Buffer Feature (c)
Most Treated Buffer Time (d) Master Test Board Feature (e) None of
these Ans : (a) 97. How many write cycles are allowed to a RAM?
(a) 1 (b) 10 (c) 100 (d) 1000 (e) None of these Ans : (a) 98.
How many write cycles are allowed to a EEPROM?
(a) 1 (b) 10 (c) 100 (d) 1000 (e) None of these Ans : (d) 99.
The Analytical Engine developed during First Generation of
computers usedas a memory unit
(a) RAM (b) Floppies (c) Cards (d) Counter Wheels (e) None of
these Ans : (d) 100. Ais anything that can cause harm.
(a) vulnerability (b) phish (c) threat (d) spoof (e) None of
these Ans : (c)
-
12 MCQs Papers
Shakthii Academy
101.In the right setting a thief will steal your information by
simply watching what you type.
(a) snagging (b) spying (c) social engineering (d) shoulder
surfing (e) None of these Ans : (d) 102.A..is a small program
embedded inside of a GIF image.
(a) web bug (b) cookie (c) spyware application (d) spam (e) None
of these Ans : (a) 103.A hacker contacts you my phone or email and
attempts to acquire your password
(a) spoofing (b) phishing (c) spamming (d) bugging (e) None of
these Ans : (b) 104.A hacker that changes or forges information in
an electronic resource, is engaging in
(a) denial of service (b) sniffing (c) terrorism (d) data
diddling (e) None of these Ans : (d) 105.Hackers often gain entry
to a network be pretending to be at a legitimate computer.
(a) Spoofing (b) forging (c) IP spoofing (d) ID theft (e) None
of these Ans : (c)
106.The..of a threat measures its potential impact on a
system.
(a) vulnerabilities (b) countermeasures (c) degree of harm (d)
susceptibility (e) None of these Ans : (c) 107. The power level
drops below 120V.
(a) brownout (b) spike (c) blackout (d) surge (e) None of these
Ans : (b) 108.Which of the following is NOT a Microsoft Internet
tool or technology?
(a) Dreamweaver (b) Silverlight (c) Internet Explorer (d)
Expression Web (e) None of these Ans : (a) 109.A protocol used to
control the secure sending
of data on the internet is :
(a) SMTP (b) HTTPS (c) TCP/IP (d) HTTP (e) None of these Ans :
(b) 110.Programs from the same developer sold bundled together,
that provide better integration and share common features, toolbars
and menus are known as ..
(a) software suites (b) integrated software packages (c)
software processing packages (d) personal information managers
-
13 MCQs Papers
Shakthii Academy
(e) None of these Ans : (a) 111. terminals (formerly known as
cash registers) are often connected to complex inventory and sales
computer systems.
(a) Data (b) Sales (c) Query (d) Point-of-Sale (POS) (e) None of
these Ans : (a) 112.The OSI model is divided into processes called
layers.
(a) five (b) six (c) seven (d) eight (e) None of these Ans : (c)
113...are specially designed computer chips reside inside other
devices, such as your car or your electronic thermostat.
(a) Servers (b) Embedded computers
(c) Robotic computers (d) Mainframes (e) None of these Ans : (b)
114.In a ring topology, the computer in possession of thecan
transmit data
(a) packet (b) data (c) access method (d) token (e) None of
these Ans : (d) 115. Viruses are often transmitted by a floppy disk
left in the floppy drive
(a) Trojan horse (b) Boot sector (c) Script (d) Logic bomb
(e) None of these Ans : (b) 116.A database management system
(DBMS) is a..
(a) hardware system used to create, maintain and provide
controlled access to a database
(b) hardware system used to create, maintain, and provide
uncontrolled access to a database.
(c) software system used to create, maintain, and provide
uncontrolled access to a database.
(d) software system used to create, maintain, and provide
controlled access to a database.
(e) None of these Ans : (d) 117.A Proxy server is used for which
of the following?
(a) To provide security against unauthorized users
(b) To process client requests for web pages (c) To process
client requests for database access
(d) To provide TCP/IP (e) None of these Ans : (b) 118..are words
that a programming language has set aside for its own use.
(a) Control words (b) Reserved words (c) Control structures (d)
Reserved keys (e) None of these Ans : (b)
-
14 MCQs Papers
Shakthii Academy
119.What is the primary difference between a virus and a
worm?
(a) A worm has the ability to self-propagate from an infected
users computer to other computers
(b) A worm is usually written by a cracker : Script bunnies do
not have the skills to develop worm program
(c) A virus is very harmful to the computers it infects; a worm
is not a serious a problem
(d) Anti-virus software is effective in fighting viruses but not
worms
(e) None of these Ans : (c) 120. ..describe what is database
fields.
(a) Structures (b) Field markers (c) Field definition (d) Field
names (e) None of these Ans : (d) 121. A goal of normalization is
to.
(a) minimize the number of relationships (b) minimize the number
of entities (c) minimize the number of tables (d) minimize the
number of redundancy (e) None of these Ans : (d) 122.A(n).uses
pictures (called icons) and menus displayed on the screen to send
commands to the computer system.
(a) command-based user interface (b) GUI (c) system utility (d)
API (e) None of these
Ans : (b) 123. Communication using a modulated carrier to apply
a data signal to a transmission medium in analog form is
(a) Local area network (b) Modem (c) Base band networking (d)
Broad band networking (e) None of these Ans : (d) 124. ITS stands
for
(a) Intelligent Teaching Systems (b) International Tutoring
Systems (c) Intelligent Tutoring Systems (d) All of these (e) None
of these Ans : (c) 125.Any piece of equipment forming an interface
to a data communication system is
(a) DTE (b) DTA (c) CSA (d) DCA (e) None of these Ans : (b)
126.In the language of the computer profession, one thousand
position of main storage is represented with the letter
(a) K (b) L (c) M (d) C (e) None of these Ans : (a) 127.The
control of the jobs running within a system is
(a) Job monitoring (b) Job stream
-
15 MCQs Papers
Shakthii Academy
(c) Job min (d) Job step (e) None of these Ans : (a) 128.The
total number of messages handled by a computerized telephone system
on a daily basis is an example of :
(a) Frequency (b) Updating (c) Volume (d) All of these (e) None
of these Ans : (d) 129.A device mounted on a communication
satellite which receives, amplifies and re- transmits signals from
earth station is
(a) Track (b) Transponder (c) Transistor (d) Terminal (e) None
of these Ans : (b) 130.What is the acronym for Single In-Line
Memory Module?
(a) SIMM (b) SILMM (c) SM (d) SMM (e) None of these Ans : (a)
131.Which type of processing that produces output results
immediately after input data are entered into a computer system
(a) Time-sharing (b) Interactive
(c) Batch Processing (d) Real-time processing (e) None of these
Ans : (b)
132.A computer program that instructs other programs to perform
a particular type of operation is
(a) System software (b) Application program (c) Compiler (d)
Interpreter (e) None of these Ans : (a) 133. The______provides a
path between the CPU and peripheral devices, which are connected
via interface cards
(a) computer (b) expansion bus (c) memory (d) CPU (e) None of
these Ans : (b) 134. Programs prepared by an outside supplier &
provided to a user in a machine readable form is known as
(a) Utility program (b) Canned program
(c) Application program (d) Application software (e) None of
these Ans : (b)
135. Pictures or drawings, typically displayed on a VDU to allow
users to select program options is called
(a) HIPO charts (b) Icons (c) Graphics (d) Network (e) None of
these Ans : (b) 136. The pieces of equipment which are attached to
the CPU of a computer and which it can access are called
-
16 MCQs Papers
Shakthii Academy
(a) output devices (b) control units (c) hardware (d) disk drive
(e) peripherals Ans : (e) 137.A factor which might cause an
individual to consider using a computer in criminal activities is
:
(a) The computers access to large sums of money
(b) The speed with which the crime can be accomplished
(c) EFTS (Electronic Funds Transfer System) (d) All the these
(e) None of these Ans : (d) 138.The Secure Electronic Transaction
(SET) specification
(a) is a notice, issued and verified by a certificate authority,
that guarantees a user or Web site is legitimate
(b) provides private-key encryption of all data that passes
between a client and a server
(c) allows users to choose an encryption scheme for the data
that passes between a client and a server
(d) uses a public-key encryption to secure credit-card
transaction systems
(e) None of these Ans : (d) 139. DOS floppy disk does not
have________
(a) A Boot Record (b) A File Allocation Table (c) A Root
Directory (d) Virtual Memory (e) BIOS
Ans : (e) 140.All the information collected during database
development is stored in a_________
(a) repository (b) data warehouse (c) RAD (d) CASE (e) None of
these Ans : (b) 141.Thecomponent is used by the data analyst to
create the queries that access the database.
(a) data extraction (b) end-user query tool (c) end-user
presentation tool (d) data store (e) None of these Ans : (b) 142. A
polymorphic virus_______
(a) modifies its program code each time it attaches itself to
another program or file
(b) is a malicious-logic program that copies itself repeatedly
in memory or on a disk drive until no memory or disk space
remains.
(c) a malicious-logic program that hides within or looks like a
legitimate program
(d) infects a program file, but still reports the size and
creation date of the original uninfected program
(e) None of these Ans : (a) 143.Microwave transmission is used
in environments where installing physical transmission media
is_________
(a) difficult or impossible and where line-of- sight
transmission is unavailable
-
17 MCQs Papers
Shakthii Academy
(b) easy or promising and where line-of-sight transmission is
unavailable
(c) difficult or impossible and where line-of- sight
transmission is available
(d) easy or promising and where line-of-sight transmission is
available
(e) None of these Ans : (d) 144.Which is NOT a good Web security
strategy?
(a) Restrict access to the Web server; keep a minimum number of
ports open
(b) Limit the users who can load software, edit or add
files.
(c) Add demo programs, so users can test system without
accessing production data.
(d) Remove unnecessary compilers and interpreters
(e) None of these Ans : (d) 145. The word FTP stands
for__________
(a) File Translate Protocol (b) File Transit Protocol (c) File
Typing Protocol (d) File Transfer Protocol (e) None of these Ans :
(a) 146. Thistier processes HTTP protocol, scripting tasks,
performs calculations, and provides access to data.
(a) Client (b) Applications/Web server (c) Enterprise Server (d)
DBA (e) None of these
Ans : (a) 147. RSA is__________
(a) Symmetric Cryptosystem (b) Asymmetric Cryptosystem (c) Block
Cypher (d) Digital Signature (e) None of these Ans : (d) 148.A
DVD-RAM is similar to a except it has storage capacities upto 5.2
GB.
(a) CD-R (b) floppy disk (c) CD-RW (d) hard disk (e) None of
these Ans : (c) 149. How is power supplied to a low-power USB
device?
(a) Through a power cable (b) From an external power supply (c)
Directly from the computers power supply (d) Through the USB cable
(e) None of these Ans : (d) 150.Thedata mining techniques derives
rules from real-world case examples.
(a) Rule discover (b) Signal processing
(c) Neural nets (d) Case-based reasoning (e) None of these Ans :
(c)
-
18 MCQs Papers
Shakthii Academy
151. Which of the following objects is passed to a JavaBean when
one of its properties is set via a JSP action?
(a) Servlet Request (b) Http Servlet Request (c) Servlet
Response (d) Http Servlet Response (e) None of these Ans : (c)
152.Graphical diagrams used to represent different multiple
perspectives of a system include_________
(a) use-case, class, and state diagrams (b) state, interaction,
derivative diagrams (c) interaction, relationship, and class
diagrams
(d) deployment, relationship, and use-case diagrams
(e) None of these Ans : (a) 153. Database redesign is not
terribly difficult if the_________
(a) database is structured (b) database is well-designed (c)
database has no data (d) database is relatively small (e) database
is relatively large Ans : (e) 154.Which of the following are
normally used to initialize a computer systems hardware?
(a) Bootstrap memory (b) Volatile memory (c) External mass
memory (d) Static memory
(e) Random access memory Ans : (e) 155. If you wanted to locate
the hardware address of a local device, which protocol would you
use?
(a) ARP (b) RARP (c) ICMP (d) PING (e) PONG Ans : (a) 156.What
is Internet 2?
(a) A new type of cabling system for Wide Area Networks
(b) A second local area network that can connect with another
online LAN to share access
(c) A new standard for Internet browsers (d) An association to
develop advanced Internet technology
(e) None of these Ans : (d) 157.While searching a website, you
have been unable to find information that was on the site several
months ago. What might you do to attempt to locate that
information?
(a) Visit Googles cached page to view the older copy.
(b) Forget about it, as there is no way to find this
information
(c) Visit a partner site of the organization to see if it is
there.
(d) Use the wayback machine. (e) None of these Ans : (c)
158.Which kind of lock includes a keypad that can be used to
control access into areas?
(a) Cipher (b) Warded
-
19 MCQs Papers
Shakthii Academy
(c) Device (d) Tumbler (e) Typelock Ans : (d) 159.Which is not a
factor when categorizing a computer?
(a) Speed of the output device (b) Amount of main memory the CPU
can use (c) Cost of the system (d) Capacity of the hard disk (e)
Where it was purchased Ans : (e) 160.Which of the following terms
is the most closely related to main memory?
(a) nonvolatile (b) permanent (c) control unit (d) temporary (e)
None of these Ans : (d) 161.Which of the following is not a factor
affecting the processing capability or performance of a PC
system?
(a) The clock speed of the microprocessor (b) The revolutions
per minute of the printer disk
(c) The primary storage capacity of the processor
(d) The built-in instruction set available to the
microprocessor
(e) None of these Ans : (b) 162. What is the standard code the
computer industry created to represent characters?
(a) DASI (b) ASSH (c) ASCII (d) BASCII (e) EPROM
Ans : (c) 163.Primary storage is..as compared to secondary
storage :
(a) Slow and inexpensive (b) Fast and inexpensive (c) Fast and
expensive (d) Slow and expensive (e) None of these Ans : (c) 164.
Offline device is :
(a) a device which is not connected to CPU (b) a device which is
connected to CPU (c) a direct access storage device (d) an I/O
device (e) None of these Ans : (a) 165.The most popular language
used with microcomputers and time-shared mini computers, is an
easy-to-use high level language :
(a) COBOL (b) ADA (c) PASCAL (d) BASIC (e) None of these Ans :
(d) 166.Which of the following is a communication network that is
devoted to carrying computer information :
(a) Data Point (b) Data Module (c) Data network (d) Data Pack
(e) None of these Ans : (c) 167. A half byte is known as :
(a) Data (b) Bit
-
20 MCQs Papers
Shakthii Academy
(c) Half byte (d) Nibble (e) None of these Ans : (d) 168. With
respect to a network interface card the term 10/100 refers to:
(a) protocol speed (b) a fiber speed (c) megabits per seconds
(d) minimum and maximum server speed (e) None of these Ans : (c)
169.A hard disk is divided into tracks which are further subdivided
into :
(a) clusters (b) sectors (c) vectors (d) heads (e) None of these
Ans : (b) 170.Which standard govern parallel communications?
(a) RS232 (b) RS-232a (c) CAT 5 (d) IEEE 1284 (e) None of these
Ans : (d) 171.Which peripheral port provides the FASTEST throughput
to laser printers?
(a) RS-232 (b) SCSI (c) Parallel (d) Serial (e) None of these
Ans : (c) 172.Resistance is measured in?
(a) Volts (b) Amps (c) Watts (d) Ohms (e) None of these
Ans : (d) 173.In Inkjet technology the droplets of ink are
deflected by?
(a) multi directional nozzles (b) electronically charged plates
(c) high pressure plates (d) electro static absorbtion (e) None of
these Ans : (a) 174.Which provides the fastest access to large
video files?
(a) Optical drives (b) IDE hard drives (c) SCSI hard drives (d)
EIDE hard drives (e) None of these Ans : (c) 175. Primary memory
stores :
(a) Data alone (b) Programs alone (c) Results alone (d) All of
these (e) None of these Ans : (d) 176. You just installed a new IDE
hard drive, but your system BIOS will not recognize the new drive,
what should you check first :
(a) cable sequence (b) jumpers on the hard drive (c) drivers
that need to be loaded (d) hard drive manufacturer web site
information
(e) None of these Ans : (b) 177.Whats the best way to protect
your hard drive data?
(a) regular backups
-
21 MCQs Papers
Shakthii Academy
(b) periodically defrag it (c) run chkdsk at least once a week
(d) run scandisk at least once a week (e) run a regular diagnostic
Ans : (a) 178.Laser Jet printer speeds are measured in pages per
minute (ppm) what do we use to measure dot-matrix printers?
(a) lines per inch (b) lines per sheet (c) characters per inch
(d) characters per second (e) None of these Ans : (d) 179. A modem
could be attached to which port?
(a) Parallel port (b) ASYNC port (c) Keyboard connector (d)
Video port (e) None of these Ans : (a) 180.You get a CMOS checksum
error during bootup. What is most likely the cause?
(a) power supply is bad (b) BIOS needs updating (c) CMOS battery
is nearing end of life (d) hard drive types are incorrectly defined
(e) None of these Ans : (c) 181.What are the four key functions of
a computer system?
(a) input, processing, output, and storage (b) keyboard,
display, memory, and disk drive
(c) word processing, spreadsheets, database, calculations
(d) bits, bytes, words, and OSI (e) None of these Ans : (a) 182.
Parity is :
(a) a byte stored in the FAT to indicated remaining slots
(b) the optimal transmission speed of data over a CAT 5
cable
(c) an extra bit stored with data in RAM that is used to check
for errors when the data is read back
(d) the optimal transmission speed of data over a CAT 5
cable
(e) None of these Ans : (c) 183. What is different between AT
and ATX power supplies?
(a) They are identical except for their shape. (b) AT supplies
use a single P1 power connector while ATX uses P8 and P9
(c) AT supplies use P8 and P9 power connectors while ATX uses a
single P1 connector.
(d) AT power supplies run on 120V AC current while ATX uses 220V
AC
(e) None of these Ans : (c) 184.What type of connector is used
to plug a telephone line into a modem?
(a) COM1 (b) RJ-11 (c) RJ-45 (d) RJ-10 (e) None of these Ans :
(b)
-
22 MCQs Papers
Shakthii Academy
185.Which of the following is NOT a type of computer hard
drive?
(a) IDE (b) FDD (c) SCSI (d) EIDE (e) SATA Ans : (b) 186. What
does FDISK do?
(a) performs low-level formatting of the hard drive
(b) fixes bad sectors on the hard drive (c) recovers lost
clusters on the hard drive (d) creates partitions on the hard drive
(e) None of these Ans : (d) 187.Which of the following is NOT a
type of motherboard expansion slot?
(a) ISA (b) PCI (c) AGP (d) ATX (e) None of these Ans : (d) 188.
Copying a process from memory to disk to allow space for other
processes is called :
(a) Swapping (b) Deadlock (c) Demand Paging (d) Page Fault (e)
None of these Ans : (a) 189.Which of the following memory unit that
processor can access more rapidly :
(a) Main Memory (b) Virtual Memory
(c) Cache Memory (d) Read Only Memory (e) None of these
Ans : (c) 190.Which one of the following is not the function of
Operating System?
(a) Resource Management (b) File Management (c) Networking (d)
Processor Management (e) None of these Ans : (c) 191.What is the
meaning of Hibernate in Windows XP/Windows7?
(a) Restart the Computer is safe mode (b) Restart the Computer
in hibernate mode (c) Shutdown the Computer terminating all the
running applications
(d) Shutdown the Computer without closing the running
applications
(e) None of these Ans : (d) 192. Unix Operating System is an
:
(a) Multi User Operating System (b) Time Sharing Operating
System (c) Multi Tasking Operating System (d) All of these (e) None
of these Ans : (d) 193.What should be the extension to execute
files?
(a) EXE (b) BAT (c) COM (d) All of these (e) None of these Ans :
(d)
-
23 MCQs Papers
Shakthii Academy
194.Which of the following memories need refresh?
(a) SRAM (b) DRAM (c) COM (d) All of these (e) None of these Ans
: (b) 195. RJ45 UTP cable hasCable :
(a) 2 pair (b) 3 pair (c) 4 pair (d) 5 pair (e) None of these
Ans : (c) 196. Basic is.language :
(a) a procedural (b) an object oriented (c) user friendly (d)
both A and B (e) None of these Ans : (a)
197. The file system NTFS stands for :
(a) New Type File System (b) Never Terminated File System (c)
New Technology File System (d) Non Terminated File System (e) None
of these Ans : (c) 198.Which Operating System doesnt support
networking between computers?
(a) Windows 3.1 (b) Windows 95 (c) Windows 2000 (d) Windows NT
(e) Windows XP
Ans : (a) 199.In which type of the following OS, the response
time is very crucial :
(a) Network Operating System (b) Real Time Operating System (c)
Batch Operating System (d) Unix Operating System (e) None of these
Ans : (b) 200.Which of the following languages is more suited to
structured program?
(a) PL/1 (b) FORTRAN (c) BASIC (d) PASCAL (e) None of these Ans
: (d) 201.A computer assisted method for the recording and
analyzing of existing or hypothetical systems is
(a) Data transmission (b) Data flow (c) Data capture (d) Data
Processing (e) None of these Ans : (b) 202.What difference does the
5th generation computer have from other generation computers?
(a) Technological advancement (b) Scientific code (c) Object
Oriented Programming (d) All of these (e) None of these Ans :
(a)
-
24 MCQs Papers
Shakthii Academy
203.Which of the following computer language is used for
artificial intelligence?
(a) FORTRAN (b) PROLOG (c) C (d) COBOL (e) None of these Ans :
(b) 204.The tracks on a disk which can be accused without
repositioning the R/W heads is
(a) Surface (b) Cylinder (c) Cluster (d) All of these (e) None
of these Ans : (b) 205.Which part interprets program instructions
and initiate control operations.
(a) Input (b) Storage Unit (c) Logic Unit (d) Control Unit (e)
None of these Ans : (d) 206.The binary system uses powers of
(a) 2 (b) 10 (c) 8 (d) 16 (e) None of these Ans : (b) 207.A
computer program that converts assembly language to machine
language is
(a) Compiler (b) Interpreter (c) Assembler (d) Comparator (e)
None of these Ans : (c) 208.The time required for the fetching and
execution of one simple machine instruction is
(a) Delay Time (b) CPU cycle (c) Real Time (d) Seek time
(e) None of these Ans : (b) 209.The time for which a piece of
equipment operates is called
(a) Seek time (b) Effective time (c) Access time (d) Real time
(e) None of these Ans : (b) 210.Binary numbers need more places for
counting because
(a) They are always big numbers (b) Any no. of 0s can be added
in front of them
(c) Binary base is small (d) 0s and 1s have to be properly
spaced apart
(e) None of these Ans : (c) 211. Which access method is used for
obtaining a record from a cassette tape?
(a) Direct (b) Sequential (c) Random (d) All of these (e) None
of these Ans : (b) 212.Any type of storage that is used for holding
information between steps in its processing is
(a) CPU (b) Primary storage (c) Intermediate storage (d)
Internal storage (e) None of these Ans : (c) 213.A name applied by
Intel corp. to high speed MOS technology is called
-
25 MCQs Papers
Shakthii Academy
(a) HDLC (b) LAP (c) HMOS (d) SDLC (e) None of these Ans : (c)
214.A program component that allows structuring of a program in an
unusual way is known as
(a) Correlation (b) Coroutine (c) Diagonalization (d) Quene (e)
None of these Ans : (b) 215. The radian of a number system
(a) Is variable (b) Has nothing to do with digit position value
(c) Equals the number of its distinct counting digits
(d) Is always an even number (e) None of these Ans : (c) 216.The
section of the CPU that selects, interprets and sees to the
execution of program instructions
(a) Memory (b) Register Unit (c) Control Unit (d) ALU (e) None
of these Ans : (c) 217.Which type of system puts the user into
direct conversation with the computer through a keyboard?
(a) Real time processing (b) Interactive computer (c) Batch
Processing (d) Time Sharing (e) None of these
Ans : (b) 218.The term referring to evacuating the content of
some part of the machine is known as
(a) Dump (b) Enhancement (c) Down (d) Compiler (e) None of these
Ans : (a) 219.The process of communicating with a file from a
terminal is
(a) Interactive (b) Interrogation (c) Heuristic (d) All of these
(e) None of these Ans : (b) 220.A common boundary between two
systems is called
(a) Interdiction (b) Interface (c) Surface (d) Median (e) None
of these Ans : (b) 221.Which computer has been designed to be as
compact as possible?
(a) Mini (b) Super computer (c) Micro computer (d) Mainframe (e)
None of these Ans : (c) 222.A general purpose single-user micro-
computer designed to be operated by one person at a time is (a)
Special-purpose computer (b) KIPS (c) M (d) PC (e) None of these
Ans : (d)
-
26 MCQs Papers
Shakthii Academy
223.Which device of computer operation dispenses with the use of
the keyboard?
(a) Joystick (b) Light pen (c) Mouse (d) Touch (e) None of these
Ans : (c) 224.A program that is employed in the development, repair
or enhancement of other programs is known as
(a) System software (b) Software tool (c) Applications program
(d) Utility program (e) None of these Ans : (b) 225. Which output
device is used for translating information from a computer into
pictorial form on paper.
(a) Mouse (b) Plotter (c) Touch Panel (d) Card punch (e) None of
these Ans : (b) 226.The list of coded instruction is called
(a) Computer program (b) Algorithm (c) Flow chart (d) Utility
programs (e) None of these Ans : (a) 227.An optical input device
that interprets pencil marks on paper media is
(a) O.M.R (b) Punch card reader (c) Optical scanners (d)
Magnetic tape
(e) None of these Ans : (a)
228.Data divisions the third division of a ______program.
(a) COBOL (b) BASIC (c) PASCAL (d) FORTH (e) None of these Ans :
(a) 229.A program that converts computer data into some code system
other than the normal one is known as
(a) Encoder (b) simulation (c) Emulator (d) Decoder (e) None of
these Ans : (a) 230.A hybrid computer uses a.to convert digital
signals from a computer into analog signals.
(a) Modulator (b) Demodulator (c) Modem (d) Decoder (e) None of
these Ans : (c) 231. Any device that performs signal conversion
is
(a) Modulator (b) Modem (c) Keyboard (d) Plotter (e) None of
these Ans : (a) 232.A type of channel used to connect a central
processor and peripherals which uses multiplying is known as
(a) Modem (b) Network (c) Multiplexer (d) All of these (e) None
of these
-
27 MCQs Papers
Shakthii Academy
Ans : (c) 233.The complete picture of data stored in database is
known as
(a) Record (b) Schema (c) System flowchart (d) DBMS (e) None of
these Ans : (b) 234.A language which is close to that used within
the computer is
(a) High-level language (b) Assembly language (c) Low-level
language (d) All of these (e) None of these Ans : (c) 235.Which is
a unit representing the no bits of discrete
(a) Baud (b) Byte (c) Bit (d) All of these (e) None of these Ans
: (a) 236.The device that can both feed data into and accept data
from a computer is
(a) ALU (b) CPU (c) Input-Output device (d) All of these (e)
None of these Ans : (c) 237. A modern digital computer has
(a) Extremely high speed (b) Large memory (c) Almost unlimited
array (d) All of these (e) None of these
Ans : (d) 238.Which of the following can store information in
the form of microscopic pits on metal disks.
(a) Laser disks (b) Tape cassettes (c) RAM cartridge (d) Punched
cards (e) None of these Ans : (a) 239.A storage system for small
amounts of data is
(a) Magnetic card (b) Magnetic tape (c) Punched card (d) Optical
mark reader (e) None of these Ans : (d) 240.Compilers and
interpreters are themselves
(a) High-level language (b) Codes (c) Programs (d) Mnemonics (e)
None of these Ans : (c) 241.A compiler means
(a) A person who compiles source programs (b) The same thing as
a programmer (c) Keypunch operator (d) A program which translates
source program into object program (e) None of these Ans : (d)
242.Compression of digital data for efficient storage is
(a) Buffer (b) CPU
-
28 MCQs Papers
Shakthii Academy
(c) Packing (d) Field (e) None of these Ans : (c) 243.Which
programming language is based on Algol 60.
(a) PILOT (b) SNOBOL (c) ADA (d) SIMULA (e) None of these Ans :
(d) 244.A path by which communication is achieved between a central
processor and other devices is called.
(a) Audit trail (b) Network (c) Bus (d) Channel (e) None of
these Ans : (c) 245.A stand-alone system which produces one page of
printed output at a time is
(a) Page printer (b) Line printer (c) Laser printer (d) Dot
matrix printer (e) None of these Ans : (a) 246.A memory that does
not change its contents without external causes is known as
(a) Dynamic memory (b) Static memory (c) RAM (d) EEPROM (e) None
of these Ans : (b) 247.A memory that holds micro programs is
(a) Core memory (b) ROM (c) RAM (d) Control memory
(e) None of these Ans : (b) 248.Buffering is
(a) the process of temporarily storing the data to allow for
small variation in device speeds
(b) a method to reduce cross talks (c) storage of data within
transmitting medium until the receiver is ready to receive.
(d) a method to reduce routing overhead (e) None of these Ans :
(a) 249. Memory allocation of variables declared in a program
is
(a) allocated in RAM. (b) allocated in ROM (c) allocated on
stack (d) assigned to registers (e) None of these Ans : (c) 250. A
software that allows a personal computer to pretend as a computer
terminal is
(a) terminal adapter (b) bulletin board (c) modem (d) terminal
emulation (e) None of these Ans : (d) 251.What is part of a
database that holds only one type of information?
(a) Report (b) Field (c) Record (d) File (e) None of these Ans :
(b)
-
29 MCQs Papers
Shakthii Academy
252.Most modern TVs draw power even if turned off. The circuit
the power is used in does what function?
(a) Sound (b) Remote control (c) Color balance (d) High voltage
(e) None of these Ans : (b) 253. MPG extension refers usually to
what kind of file?
(a) WordPerfect Document File (b) MS Office document (c)
Animation/movie file (d) Image file (e) None of these Ans : (c)
254.The most common format for a home video recorder is VHS. VHS
stands for.?
(a) Video Home System (b) Very high speed (c) Video horizontal
standard (d) Voltage house standard (e) None of these Ans : (a)
255.What do we call a network whose elements may be separated by
some distance? It usually involves two or more small networks and
dedicated high-speed telephone lines.
(a) URL (Universal Resource Locator) (b) LAN (Local Area
Network) (c) WAN (Wide Area Network) (d) World Wide Web (e) None of
these Ans : (c) 256.If you want to secure a message, use a(n) :
(a) cryptology source (b) encryption key (c) encryption software
package (d) cryptosystem (e) None of these Ans : (d) 257.Circuits
that provide a communication path between two or more devices of a
digital computer system is :
(a) Car (b) Bus (c) Track (d) Cable (e) None of these Ans : (b)
258.A coding structure in which characters are represented by means
of series of parallel bars is :
(a) Bar code (b) Menu Bar (c) Numeric Bar (d) Bar Graph (e) None
of these Ans : (a) 259.Which of the following best describes a
computer-based information system?
(a) Data input for processing (b) Output in produced in the form
of Hard copy
(c) Processing data (d) System where computer is used to turn
data into information
(e) None of these Ans : (d) 260.Voice recognition is :
(a) Ability to input data directly into a computer system by
speaking to it
-
30 MCQs Papers
Shakthii Academy
(b) Ability to output data directly from a computer system by
speaking
(c) Processing of voice in computer system (d) Both (a) and (b)
(e) None of these Ans : (a) 261.Which one of the following is the
right shortcut for closing document in MS Office?
(a) Shift + W (b) Ctrl + W (c) Shift + Ctrl + W (d) Shift + Alt
+ W (e) None of these Ans : (b) 262.The cell reference for cell
range of G2 to M12 is.
(a) G2.M12 (b) G2;M12 (c) G2:M12 (d) G2-M12 (e) None of these
Ans : (c) 263.Which of the following is not an option of the
spelling dialog box?
(a) Ignore (b) Ignore all (c) Edit (d) Change (e) None of these
Ans : (c) 264.Which language is used to create macros in Excel?
(a) Visual Basic (b) C (c) Visual C + + (d) Java (e) None of
these Ans : (a) 265.Which key do you press to check spelling?
(a) F3 (b) F5 (c) F7 (d) F9
(e) None of these Ans : (c) 266.What does COUNTA ( ) function
do? (a) counts cells having alphabets (b) counts empty cells (c)
counts cells having number (d) counts non-empty cells (e) None of
these Ans : (d) 267.Which area in an Excel window allows entering
values and formulas?
(a) Title Bar (b) Menu Bar (c) Formula Bar (d) Standard Tool Bar
(e) None of these Ans : (c) 268.Which of the following helps to
reduce spelling error in the document?
(a) Auto Format (b) Auto Correct (c) Smart Tags (d) Auto Text
(e) None of these Ans : (b) 269.Which of the following enables you
to paste data multiple times?
(a) window clipboard (b) office clipboard (c) Memory (d) Both
(a) and (b) (e) None of these Ans : (b) 270.Which of the following
enables you to paste data multiple times?
(a) windows clipboard (b) office clipboard
-
31 MCQs Papers
Shakthii Academy
(c) Memory (d) Both (a) and (b) (e) None of these Ans : (d)
271.Which of the following is valid IP address?
(a) 984.12.787.76 (b) 192.168.321.10 (c) 1.888.234.3456 (d)
192.168.56.115 (e) None of these Ans : (d) 272.What is FTP program
used for?
(a) Transfer files to and from an Internet Server
(b) Designing a website (c) Connecting to the Internet (d)
Sending mails in bulk (e) None of these Ans : (a) 273.Which of the
following are commonly found on web pages?
(a) internet (b) hyperlinks (c) intranet (d) all of these (e)
None of these Ans : (b) 274.The ability to combine name and
addresses with a standard document is called.
(a) document formatting (b) database management (c) mail merge
(d) form letters (e) None of these
Ans : (c) 275. What is the full form of TCP/IP?
(a) Transmission control protocol/internet protocol
(b) telephone call protocol/international protocol
(c) transport control protocol/internet protocol (d) Tele caller
protocol institutional protocol (e) None of these Ans : (a)
276.HTML document start and end with which tag pairs?
(a)
-
32 MCQs Papers
Shakthii Academy
279.The Internet banking facility provide by banks is known
as
(a) online banking (b) net banking (c) e-connect (d) epay (e)
None of these Ans : (b) 280.The code for a web page is written
using ..
(a) machine language (b) winzip (c) perl (d) HTML (e) None of
these Ans : (d) 281.A collection of related fields in data
organization is called
(a) group (b) file (c) information (d) register (e) None of
these Ans : (d) 282.The worksheet contains..rows.
(a) 65536 (b) 256 (c) 536 (d) 400 (e) None of these Ans : (a)
283. A menu contains a list of :
(a) commands (b) data (c) objects (d) reports (e) None of these
Ans : (a)
284. To create a formulae, you can use :
(a) values but not cell references (b) cell references but not
values (c) values or cell references although not both at the same
time
(d) value and cell references (e) None of these Ans : (d)
285.The cell labeled F5 refers to :
(a) row 5 column F (b) column 5 row F (c) function available in
cells (d) function key F5 (e) None of these Ans : (a) 286.In a
worksheet you can select
(a) rows (b) coloumns (c) entire worksheet (d) All of these (e)
None of these Ans : (d) 287. ..view shows hot the contents on
printed page will appear with margin, header and footer.
(a) draft (b) full screen reading (c) outline (d) page layout
(e) None of these Ans : (d) 288.A commonly used graphic format for
the web is :
(a) GIF (b) cmp (c) text (d) TIF
-
33 MCQs Papers
Shakthii Academy
(e) None of these Ans : (a) 289.Which of the following is a
disadvantage of machine language?
(a) Machine Dependent (b) Slower Execution (c) Machine
Independent (d) It requires Translation (e) None of these Ans : (a)
290.Android Operating System is an example of which kind of Source
Model?
(a) Open Source (b) Vertical Market Software (c) Horizontal
Market Software (d) Shareware (e) None of these Ans : (a) 291.Which
of the following is true about Operating System?
(a) It is an interface between user and the computer.
(b) It manages all resources (c) It does all Memory management
and Process management tasks
(d) All are true (e) None of these Ans : (d) 292.A software that
is not protected by copyright or trademark is
(a) Vertical Market Software (b) Public Domain Software (c)
Shareware Software
(d) Trialware (e) Adware Ans : (b) 293.Which of the following
programming languages is associated with Artificial
Intelligence?
(a) C (b) B (c) C++ (d) JAVA (e) PROLOG Ans : (e) 294.Expand
RDBMS
(a) Relative Database Management System (b) Rational Database
Minimize System (c) Relational Database Management System (d)
Relational Database Maximize System (e) None of these Ans : (c)
295. ..is the storage area for e-mails.
(a) Folder (b) Mail box (c) Directory (d) Hard Disk (e) None of
these Ans : (b) 296.Display bar that lists all the open folders and
active application is
(a) Menubar (b) Toolbar (c) Task bar (d) Window list (e) None of
these Ans : (d) 297.Which of the following is the keyboard
short-cut for permanent deletion of a file/folder in windows?
(a) Del (b) Shift + Del (c) Ctrl + Del (d) Alt + Enter
-
34 MCQs Papers
Shakthii Academy
(e) None of these Ans : (b) 298.Which of the following operating
systems does not exist?
(a) Windows 7 (b) Mac OS X (c) Windows CE (d) Windows 12 (e)
Ubuntu Ans : (d) 299.To protect the computer from hacker
intrusions, ..must be installed.
(a) Firewall (b) Mailer (c) Script (d) Yahoo Messenger (e) None
of these Ans : (a) 300.Which of the following is known as non
volatile memory?
(a) Hard Disk (b) Floppy Disk (c) CD-ROM (d) DVD-ROM (e) All of
these Ans : (e) 301.To see the document before the printout is
taken, use.
(a) Insert Table (b) Paste (c) Format Painter (d) Cut (e) Print
Preview Ans : (e) 302.The CPU of a computer?
(a) understands only assembly language (b) understands machine
language and high- level languages
(c) understands only machine language (d) understands only
high-level language (e) does not understand machine language
Ans : (c) 303.Which of the following is not a term related to
the World Wide Web?
(a) Hyperlink (b) Hypertext (c) Website (d) Homepage (e)
Keyboard Ans : (e) 304.Which of the following is another name for
pre-programmed formula in Excel?
(a) Range (b) Graph (c) Function (d) Cell (e) None of these Ans
: (c) 305.ALU works on the instructions held in
(a) Notebook (b) Registers (c) Notepad (d) Clipboard (e) I/O
Devices Ans : (b) 306. ..is a computer software designated to help
people involved in a common task to achieve goals.
(a) Shareware (b) Software (c) Freeware (d) Collaborative
Software (e) None of these Ans : (d) 307. .is the process of
getting access to the computer.
(a) Switch on (b) Login (c) Logoff (d) Enter (e) None of these
Ans : (b)
-
35 MCQs Papers
Shakthii Academy
308.A collection of programmes which determines and controls how
your computer system works and process information is called
(a) Interpreter (b) Computer (c) Office (d) Compiler (e)
Operating system Ans : (c) 309.The Title and Page number of a
document can be displayed using which of the following options?
(a) Insert table (b) Spelling and Grammar (c) Header and Footer
(d) Thesaurus (e) File Ans : (c) 310.Data redundancy can be
eliminated by using:
(a) Networking (b) DBMS
(c) Operating System (d) Processing the data manually (e) None
of these Ans : (a)
311.Which of the following uses computers and data communication
to transmit data electronically between computers?
(a) EDI (b) Physical Media (c) Printing a paper (d) DTE (e) None
of these Ans : (a) 312. is a combination of text, audio, still
images, animation, video.
(a) Multiplexer (b) Multiplier
(c) Multimedia (d) Multiuser (e) None of these Ans : (c) 313.
MICR is exclusively used in :
(a) Libraries (b) Super Markets (c) Stock markets (d) Banking
Industry (e) None of these Ans : (d) 314.In order to change page
margins in a word document
(a) Drag the scroll box on the scroll bars. (b) Delete the
margin boundaries on the ruler (c) Right Click on the ruler (d)
Drag the margin boundaries on the ruler (e) None of these Ans : (d)
315.Pop-ups are a form of..on the World Wide Web?
(a) Instant Messaging (b) Search Engines
(c) Browsers (d) Mark-up Languages (e) Online Advertising Ans :
(e)
316.Thesaurus option is available in menu.
(a) Page layout (b) References (c) Review (d) View (e) Layout
Ans : (c) 317.Which of the following refers to the process of
trading goods over the internet?
(a) E-seva (b) E-trading
-
36 MCQs Papers
Shakthii Academy
(c) E-Finance (d) E-Sales (e) E-Commerce Ans : (e) 318.Which of
the following is not used to align text in a document?
(a) Left (b) Right (c) Center (d) Diagonal (e) Justify Ans : (d)
319.Which of the following generation computers is referred to an
expert system?
(a) 2nd (b) 1st (c) 4th (d) 3rd (e) 5th Ans : (e) 320. is a
setoff instructions.
(a) Hardware (b) Code (c) Language (d) Program (e) All of these
Ans : (d) 321.Which printer is very commonly used for desktop
publishing?
(a) Laser Printer (b) Inkjet Printer
(c) Daisywheel printer (d) Dot matrix printer (e) None of these
Ans : (a)
322.An output device that uses words or messages recorded on a
magnetic medium to produce audio response is
(a) Magnetic tape (b) Voice response unit
(c) Voice recognition unit (d) Voice band (e) None of these Ans
: (c) 323. VPN means
(a) Vital Private Network (b) Virtual Private Network (c) Visual
Projection Node (d) Very Private Network (e) None of these Ans :
(b) 324.The technique and process of searching, recovering, and
interpreting information from large amounts of stored data is
called
(a) Browsing (b) Chatting (c) Retrieval (d) Desktop publishing
(e) None of these Ans : (c) 325.is the internal network of an
organization?
(a) Internet (b) Intranet (c) Extranet (d) Organet (e) None of
these Ans : (b) 326.In network terminology, MAN stands for
(a) Multi-Area Network (b) Main Area Network (c) Multi
Application Network (d) Metropolitan Area Network (e) None of these
Ans : (d) 327.A character that is raised and smaller above the
baseline is known as
-
37 MCQs Papers
Shakthii Academy
(a) Outlined (b) Raised (c) Superscript (d) Subscript (e) None
of these Ans : (c) 328. A.is a series of commands that is recorded
so it can be played back, or executed, later
(a) Mail merge (b) Merge printing (c) Goal seek (d) Macro (e)
None of these Ans : (d) 329.Long text can be broken down into many
lines within a cell. You can do this through
(a) Wrap Text in Format > Cells (b) Justify in Edit >
Cells (c) Text Wrapping in Format > Cells, Layout tab
(d) All of these (e) None of these Ans : (c) 330.By default
there are..worksheets in an Excel file
(a) 2 (b) 3 (c) 4 (d) 5 (e) None of these Ans : (b) 331.Total
number of rows in Excel 756
(a) 65536 (b) 256 (c) 1024 (d) None of these (e) None of these
Ans : (a) 332.Database management systems are intended to
(a) Eliminate data redundancy (b) Manage file access (c)
Maintain data integrity (d) All of these (e) None of these Ans :
(d) 333.A top-to-bottom relationship among the items in a database
is established by a
(a) Hierarchical schema (b) Network schema (c) Relational schema
(d) All of these (e) None of these Ans : (a) 334.Which of the
following is not a database object? (a) Tables (b) Queries (c)
Relationships (d) Reports (e) None of these Ans : (c) 335.What are
the columns in a Microsoft access table called?
(a) Rows (b) Records (c) Fields (d) Columns (e) None of these
Ans : (c) 336.In.there is no direct contact with the end users
(a) B2B (b) B2C (c) C2C (d) All these (e) None of these Ans :
(a)
-
38 MCQs Papers
Shakthii Academy
337.The spacing between character pairs is called :
(a) Kerning (b) x-height (c) intercap (d) serif (e) None of
these Ans : (a) 338.We cannot delete the.icon but we can made it
invisible.
(a) Recycle (b) My Computer (c) Internet Explorer (d) My Network
Place (e) None of these Ans : (a) 339.In case of Bus/Tree topology
signal balancing issue is overcome by
(a) Modulation (b) Polling (c) Segmentation (d) Strong
transmitter (e) None of these Ans : (c) 340.BCC in the internet
refers to
(a) Black carbon copy (b) Blind carbon copy (c) Blank carbon
copy (d) Beautiful carbon copy (e) None of these Ans : (b)
341.Education combined with entertainment is called
(a) Simulation (b) CAI (c) Edutainment (d) Synchronization (e)
None of these Ans : (c) 342.Which of the following transport layer
protocols is used to support electronic mail?
(a) SMTP (b) IP (c) TCP (d) UDP (e) None of these Ans : (c)
343.The process of converting analog signals into digital signals
so they can be processed by a receiving computer is referred to as
:
(a) modulation (b) demodulation (c) synchronizing (d) digitizing
(e) None of these Ans : (d) 344.Which of the following is
considered a broad band communication channel?
(a) coaxial cable (b) fiber optics cable (c) microwave circuits
(d) All of these (e) None of these Ans : (d) 345.In a synchronous
modem, the digital-to- analog converter transmits signal to the
(a) equalizer (b) modulator (c) demodulator (d) terminal (e)
None of these Ans : (a) 346.The loss in signal power as light
travels down the fiber is called
(a) attenuation (b) progragation (c) scattering (d) interruption
(e) None of these Ans : (a) 347.Number of bits per symbol used in
Baudot code is
(a) 7 (b) 5 (c) 8 (d) 9
-
39 MCQs Papers
Shakthii Academy
(e) None of these Ans : (b) 348.To get the Symbol dialog box,
click on the menu and choose Symbol.
(a) Insert (b) Format (c) Tools (d) Table (e) None of these Ans
: (a) 349.What is the short cut key to open Font dialog box?
(a) Ctrl + F (b) Alt + Ctrl + F (c) Ctrl + D (d) Ctrl + Shift +
D (e) None of these Ans : (c) 350.Which of the following line
spacing is invalid?
(a) Single (b) Double (c) Triple (d) Multiple (e) None of these
Ans : (c) 351.Which of the following option in File pull down menu
is used to close a MS Word document?
(a) Quit (b) Close (c) Exit (d) New (e) None of these Ans : (b)
352.CLASS is the acronym for
(a) Computer, Language and School Studies (b) Computer, Literacy
and Studies in Schools (c) Computer, Language and Secondary
Schools
(d) Computer, Learning and School Studies
(e) None of these Ans : (b) 353.SITE stands for
(a) Satellite Instructional Technology and Engineering
(b) State Institute of Teacher Education (c) Satellite
Instructional Television
Experiment
(d) State Institute of Technology and Engineering
(e) None of these Ans : (c) 354.Cloud computing means
(a) Computing using the satellite (b) Computing using cloud
chamber
technology
(c) Computing which results in errors (d) Shifting computing
power from offline
PCs and Laptops onto the Web
(e) None of these Ans : (d) 355.The C language is
(a) Context free language (b) Context sensitive language (c)
Regular language (d) Assembly language (e) None of these Ans : (a)
356.What is the size of the Unicode character in
Windows Operating System?
(a) 8-bits (b) 16-bits (c) 32-bits (d) 64-bits (e) None of these
Ans : (c)
-
40 MCQs Papers
Shakthii Academy
357. Data Encryption Techniques are particularly used
for_________
(a) protecting data in Data Communication System.
(b) reduce Storage Space Requirement (c) enhances Data
Integrity. (d) decreases Data Integrity (e) None of these Ans : (a)
358. ________is an umbrella activity that is
applied throughout the software engineering process.
(a) Debugging (b) Testing (c) Designing
(d) Software Quality Assurance (e) None of these Ans : (d)
359.Use of icons and windows are characteristic of
a________interface
(a) command-driven (b) windows-oriented (c) graphical-user (d)
menu-driven (e) None of these Ans : (c) 360.The essential
difference between an operating system like Linux and one like
Windows is that
(a) Windows can run with an Intel processor, whereas Linux
cannot
(b) Linux is proprietary, whereas Windows is not
(c) Any programmer can modify Linux code, which is not permitted
with Windows
(d) there are multiple versions of Linux, but only one version
of Windows
(e) None of these Ans : (c) 361.The category of operating system
that you most likely have running on your PDA computer is a
..operating system
(a) real-time (b) single-user, single-task (c) single-user,
multi-task (d) multi-user, multi-task (e) None of these Ans : (b)
362.The barcode which is used on all types of items, is ready by a
scanning device directly into the computer. What is the name of
this scanning device?
(a) Laser Scanner (b) Wand (c) OCR (d) MICR (e) None of these
Ans : (a) 363.Which of the following is not a method to preserve
the security and integrity of information?
(a) Antivirus software (b) Firewall (c) Phishing (d) Disk
Encryption (e) Backup Ans : (c) 364.In computer science, by
information we mean
(a) Any output coming out from computer (b) Processed data put
in an intelligent form (c) A report printed by the computer (d)
Plural of data
-
41 MCQs Papers
Shakthii Academy
(e) None of these Ans : (b) 365.Which of the following features
distinguishes a database file from a mere collection of data
(a) Database enables data to be organized for effective use much
faster
(b) It organizes data in rows and columns (c) It gives reference
name to each file created (d) It provides search facility (e) None
of these Ans : (a) 366.Who coordinates the sequencing of events
within the central processor of a computer?
(a) Logic unit (b) Arithmetic unit (c) Register (d) Control Unit
(e) None of these Ans : (d) 367.The microprocessor of a computer
cannot operate on any information if that information is not in
its
(a) secondary storage (b) main storage (c) ALU (d) Logic unit
(e) None of these Ans : (b) 368.Where have the program and data to
be located before the ALU and control unit of a computer can
operate on it?
(a) Internal memory (b) Secondary memory (c) Microprocessor (d)
Magnetic tapes (e) None of these Ans : (a) 369.The only things
moving around inside a computer are
(a) Is and Os (b) electrons
(c) bytes (d) proton (e) None of these Ans : (b) 370.The data
between the computer and peripherals always passes via in
input/output
(a) port (b) A/D converter (c) D/A converter (d) buffer memory
(e) None of these Ans : (a) 371.Preparing a magnetic disk for data
storage is called
(a) booting (b) formatting (c) debugging (d) commissioning (e)
None of these Ans : (b) 372.How many full adders are needed to add
two 4-bit numbers with a parallel adder?
(a) 8 (b) 4 (c) 2 (d) 16 (e) None of these Ans : (b) 373.If you
see a diskette with a piece of foil covering its notch, it is said
to be
(a) write-protected (b) copy-protected (c) write-enabled (d)
foil-covered (e) None of these Ans : (a) 374.What is the name of
the screen symbol that shows the placement of the next
character?
(a) Mouse (b) Cursor (c) Track ball (d) Graphic tablet (e) None
of these Ans : (b)
-
42 MCQs Papers
Shakthii Academy
375.Point out the odd item amongst the following
(a) computer mouse (b) touchpad (c) light pen (d) printer (e)
None of these Ans : (d) 376.The very small and cheap computer built
into many home devices is called computer.
(a) Main frame (b) Mini (c) Micro (d) Super (e) None of these
Ans : (c) 377.In comparison to the internal (main) memory, tape or
disk memory is
(a) slower and more expensive (b) slower and less expensive (c)
faster and more expensive (d) faster and less expensive (e) None of
these Ans : (b) 378.What is the main advantage of magnetic core
memory over semiconductor RAM memory?
(a) More compact and smaller (b) More economical (c) A bit does
not have to write after reading (d) Non-volatile (e) None of these
Ans : (d) 379.Which of the following memories contains a thin film
of magnetic material sandwitched between two permanent bias
magnets?
(a) ROM (b) Magnetic disk (c) Core memory (d) Bubble memory (e)
None of these Ans : (c) 380.The minimum time delay required between
the initiation of two successive memory operations is known as
(a) memory cycle time (b) memory access time (c) transmission
time (d) waiting time (e) None of these Ans : (a) 381.When the time
to establish link is large and the size of data is small, the
preferred mode of data transfer is
(a) circuit switching (b) packet switching (c) time division
multiplexing (d) All of these (e) None of these Ans : (b) 382.In
circuit switching
(a) data is stored at intermediate nodes (b) transmission path
is set before data transfer (c) dedicated communication link is not
required
(d) All of these (e) None of these Ans : (b) 383.A device used
in some magnetic tape data entry system is
(a) key-to-disk station (b) light pen
-
43 MCQs Papers
Shakthii Academy
(c) touch Panel (d) card punch (e) None of these Ans : (a)
384.Which of the following PC user must have a special hardware
device that is to linkup with a bulletin board system?
(a) ALU (b) Control Unit (c) Modem (d) Light Pen (e) None of
these Ans : (c) 385.A single primary storage location in the
processor unit
(a) can hold several different data items at the same time
(b) can hold data items but not program instructions
(c) is identified by a built-in and unique number called an
address
(d) is identified by a number that varies with the contents in
the location.
(e) None of these Ans : (c) 386.A large computer designed to
handle complex scientific calculations
(a) may use only a firmed word-length storage approach
(b) will likely require a character addressable storage unit
(c) must use fixed length words of four character each
(d) will not use numbered address locations (e) None of these
Ans : (a) 387.Methods used to organize and physically store disk
data are cylinder and
(a) sector (b) surface (c) track (d) hib (e) None of these Ans :
(a) 388.Magnetic storage chips have no moving parts, and they
provide nonvolatile direct- access storage of data.
(a) Tape (b) Disk (c) Ink character (d) Bus (e) None of these
Ans : (a) 389.A class of random access memory that requires
periodic servicing in order for, the contents to remain valid
is
(a) Static RAM (b) Dynamic RAM (c) PROM (d) EPROM (e) None of
these Ans : (b) 390.A sequence of microinstruction is
(a) machine code (b) microcode (c) mnemonics (d) gray code (e)
None of these Ans : (b) 391.A specific part of an arithmetic and
logic unit that is used to perform the operation of multiplication
is
(a) multiplier (b) multiplener (c) multivibrator (d)
quantization (e) None of these Ans : (a) 392.Which of the following
belongs to the first generation of computer?
(a) HNIAC (b) IBM 1401 (c) IBM 8090 (d) UNI VAC
-
44 MCQs Papers
Shakthii Academy
(e) N