Q1. Which key should you use to indent the first paragraph of your report?
(a) tab key
(b) return key
(c) space bar
(d) shift key
(e) None of these
Q2. Which of the following is true about Assembly language?
(a) It is a Machine Language
(b) It is a High-level programming language
(c) It is a low-level programming language
(d) It is a language for assembling computers
(e) None of these
Q3. Which operating system is defined as self-contained in device and resident in ROM?
(a) Multiprocessing OS
(b) Batch Processing OS
(c) Multi-threading OS
(d) Embedded OS
(e) Real Time OS
Q4. Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
(a) Toggle
(b) Cold booting
(c) Warm booting
(d) Logging off
(e) None of these
Q5. Main memory works in conjunction with _________.
(a) special function cards
(b) RAM
(c) CPU
(d) Intel
(e) All of the above
Q6. A(n) ________ allows you to access your e-mail from anywhere.
(a) Forum
(b) Webmail interface
(c) Message Board
(d) Weblog
(e) EEPROM
Q7. Which of the following options is used to display information such as title, page number of the document?
(a) Insert Table
(b) Header and Footer
(c) Thesaurus
(d) Spelling and Grammar
(e) Auto correct
Q8. Which icon represents an e-mail message that has not been read?
(a) Question Mark
(b) Red envelope
(c) Highlighted envelope
(d) Flashing letter
(e) Closed envelope
Q9. Which among the given options is computer peripheral that is tangible?
(a) menu
(b) Print
(c) Software
(d) Hardware
(e) None of these
Q10. Through ______ an administrator or another user can access someone else’s computer remotely.
(a) Administrator
(b) Web server
(c) Web application
(d) HTTP
(e) Telnet
Q11. Which among the following is a language used in a computer that is very similar to, the language of humans and is easy to understand?
(a) Source Code
(b) Machine Language
(c) High Level Language
(d) Object Code
(e) Assembly language
Q12. The Internet allows you to:
(a) send electronic mail
(b) view web pages
(c) connect to servers all around the world
(d) All of the above
(e) None of these
Q13. Which of the following can be used to protect sensitive data from prying eyes?
(a) Encryption
(b) Passwords
(c) File locks
(d) File permissions
(e) None of these
Q14.A _________ typically connects personal computers within a very limited geographical area, usually within a single building.
(a) LAN
(b) FAN
(c) TAN
(d) WAN
(e) WWW
Q15. Oracle is an example of __________ application software.
(a) database
(b) word processing
(c) project management
(d) presentation graphics
(e) desktop