Q1. Which bar is usually located below the Title Bar that provides categorized options?
(a) Menu Bar
(c) Toolbar
(b) Status bar
(d) Scroll Bar
(e) None of the above
Q2. Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
(a) program thievery
(b) data snatching
(c) software piracy
(d) program looting
(e) data looting
Q3. In first generation of computers, they used ______.
(a) batch processing
(b) multithreading
(c) multiprogramming
(d) networking
(e) All of the above
Q4. A/(n) ___________ is an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content.
(a) email
(b) virus
(c) web beacon
(d) spam
(e) firewall
Q5. Which of the following terms is related to Internet connectivity?
(a) IP
(b) TCP
(c) Gopher
(d) Both (a) and (b)
(e) All of the above
Q6. Which of the following is not example of Utility Software?
(a) Backup software
(b) Antivirus software
(c) Disk tools
(d) Media Players
(e) None of the above
Q7. Example of telecommunication device is a ________ .
(a) modem
(b) printer
(c) keyboard
(d) scanner
(e) mouse
Q8. What is ‘Trend Micro’?
(a) virus program
(b) anti-virus software
(c) just a program
(d) All of these
(e) None of the above
Q9. Storage of instructions in computer memory to enables it to perform a variety of tasks in sequence or intermittently. Who introduced the idea of stored program concepts?
(a) Charles Babbage
(b) Dennis Ritchie
(c) Howard Aiken
(d) John Neumann
(e) Anna Lovelace
Q10. Table of contents can be prepared by using :
(a) macros
(b) headings as H1, H2, H3 and more in the document
(c) by table of contents in tools menu
(d) (b) and (c)
(e) By File menu
Q11. Which of the following is the feature that keeps track of the right margin?
(a) Find and replace
(b) Word-wrap
(c) Right justified
(d) Left justified
(e) Ragged right
Q12. To move data from one part of the document to another, which of the following is used?
(a) Cut and Insert
(b) Copy and Paste
(c) Copy and Delete
(d) Copy and Undo
(e) Cut and Paste
Q13. Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
(a) hacker
(b) analyst
(c) instant messenger
(d) programmer
(e) spammer
Q14. To allow someone else schedule your meetings and appointments, ______ feature of Outlook is used.
(a) Monthly calendar
(b) Event manager
(c) Appointments
(d) Delegate Access
(e) None of these
Q15. Which of the following is the valid subnet mask for class B IP Address?
(a) 251.254.25.5
(b) 255.255.0.0
(c) 155.151.12.9
(d) 255.0.0.0
(e) 255.255.255.0