Q1. Which among the following option does DBMS helps to achieve?
(a) Data independence
(b) More redundancy
(c) Centralised manner to control of data
(d) Both (a) and (c)
(e) None of the above
Q2. Which among the following is a Super computer series developed by Indian scientists?
(a) Param
(b) Super30l
(c) Compaq Presario
(d) Cray YMP
(e) Blue Gene
Q3. DBMS ensures data integrity by managing transactions through ACID test. What does ACID stands for in computer science?
(a) Artistic, collaborative, inference, durability
(b) analytic, consistency, inference, duration
(c) Atomicity, consistency, isolation, durability
(d) Atomicity, collaborative, inference duration
(e) Adherence, consistency, isolation, durability
Q4. Table of contents can be prepared by using:
(a) macros
(b) headings as H1, H2, H3 and more in the document
(c) by table of contents in tools menu
(d) (b) and (c)
(e) By File menu
Q5. Who developed the basic architecture of Computers?
(a) Charles Babbage
(b) Blaise Pascal
(c) Steve Newton
(d) John Von Neumann
(e) Henery Johns
Q6. Which bar is usually located below the Title Bar that provides categorized options?
(a) Menu Bar
(b) Status bar
(c) Toolbar
(d) Scroll Bar
(e) None of the above
Q7. Inheritance is the ability of an object to pass on its characteristics to its ____________.
(a) subclasses
(b) off-spring
(c) super classes
(d) parents
(e) none of the above
Q8. What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?
(a) CMOS
(b) RAM
(c) DRAM
(d) CPU
(e) None of these
Q9. Which type of system can learn and adjust to new circumstances by themselves?
(a) Database management system
(b) Expert systems
(c) Geographical systems
(d) Neural networks
(e) File based systems
Q10. The default and maximum size of text filed in Access is ______.
(a) 266 characters & 6400 characters
(b) 288 characters & 6880 characters
(c) 299 characters & 6499 characters
(d) 50 and 255 characters
(e) None of these
Q11. Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
(a) program thievery
(b) data snatching
(c) software piracy
(d) program looting
(e) data looting
Q12. Type _______to start a numbered list, and then press SPACEBAR or the TAB key.
(a) 1#
(b) 1$
(c) 1.
(d) 1*
(e) None of these
Q13. A/(n) ___________ is an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content.
(a) email
(b) virus
(c) web beacon
(d) spam
(e) firewall
Q14. Non-physical components of the computer are referred to as _______.
(a) CPU
(b) Software
(c) Hardware
(d) Program
(e) None of these
Q15. How many rows are there in latest version of MS Excel?
(a) 65536
(b) 16,384
(c) 1,048,576
(d) 1,050,000
(e) 2,001,000