Q1. Which among the following was the first network with which the idea of internet began?
(a) RAPANET
(b) PARANET
(c) ARPANET
(d) APARANET
(e) None of these
Sol. ARPANET was the first network in the history of Internet.
Q2. Which of the following is the coding language used to create documents for use on the Internet?
(a) HTML
(b) HSMT
(c) HLTM
(d) All of these
(e) None of these
Sol. HTML, Hyper Text Markup Language is used to create documents/pages for use on world wide web.
Q3. The main agenda for Encryption/decryption is to provide a network with strict ___________.
(a) Privacy
(b) Authenticity
(c) Integrity
(d) Non-repudiation
(e) Global Access
Sol. Encryption/decryption provides a network with Privacy.
Q4. Smart card is:
(a) Special purpose cards
(b) Microprocessor cards
(c) Processing unit contains memory for storing data
(d) Processing unit for software handling
(e) None of the above
Sol. Smart Card is a plastic card with a built-in microprocessor.
Q5. Which of the following option may be used to change page-size and margins?
(a) Page Layout
(b) View
(c) Tools
(d) Data
(e) None of these
Sol. Page Layout is used may be used to change page-size and margins.
Q6. To justify the selected text, the shortcut key is __________.
(a) Ctrl + 1
(b) Ctrl + J
(c) Ctrl + U
(d) Ctrl + Alt + K
(e) Ctrl + N
Sol. Ctrl + J is the shortcut key to justify text.
Q7. In www.yahoo.com, www stands for:
(a) Web World Wide
(b) World Wide Web
(c) Wide World Web
(d) Worlds Wide Weblinks
(e) None of these
Sol. WWW stands for World Wide Web.
Q8. __________ is the basic communication language or protocol of the Internet.
(a) TCTP/ITP
(b) TCDP/IEP
(c) TCP/IP
(d) TCMP/IKP
(e) RIP
Sol. TCP/IP is the basic communication protocol over the net.
Q9. Which of the following is related with 192.9.200.155?
(a) Hardware address
(b) Monitor address
(c) IP address
(d) All of these
(e) None of these
Sol. It is an IP Address.
Q10. Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
(a) program thievery
(b) data snatching
(c) software piracy
(d) program looting
(e) data looting
Sol. Software piracy is the illegal copying, distribution, or use of software.
Q11. In first generation of computers, they used ______.
(a) batch processing
(b) multithreading
(c) multiprogramming
(d) networking
(e) All of the above
Sol. In First Generation mainly batch processing operating system were used.
Q12. Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
(a) hacker
(b) analyst
(c) instant messenger
(d) programmer
(e) spammer
Sol. Hacker is someone who seeks and exploits weaknesses in a computer system.
Q13. A Bug can be called an error which generally comes in a software or a hardware. Which among the following is another name that may refer to bugs in computers?
(a) Leech
(b) Squid
(c) Slug
(d) Glitch
(e) Skim
Sol. Glitch is a term used to express temporary malfunctioning of software, whereas a bug refers to a problem inherent in the design or coding of the software.
Q14. Which of the following general purpose software allows you to do mathematical or financial calculation?
(a) Word processing program
(b) Spreadsheet program
(c) Presentation program
(d) Media Player
(e) DTP program
Sol. A spreadsheet program is general-purpose software that allows you to do mathematical or financial calculation. An example of a spreadsheet program is MS excel.
Q15. What are those programs collectively called which are created for performing particular tasks in the computer system?
(a) System software
(b) Application software
(c) Utility software
(d) Operating system
(e) None of these
Sol. Applications are software or computer programs that are built to execute or allow the execution of special tasks on a computer, such as a music application that enables users to play, learn or even create music.