Question 991 :
Objects on the slide that hold text are called
- object holders
- text holders
- auto layout
- place holders
Question 992 :
A ________ is a unique name that you give to a file of information.
- device letter
- folder
- filename
- filename extension
Question 993 :
Non-Impact Printers use ________ technologies
- electrostatic and chemical
- thermal
- inkjet
- All of the Above
Question 994 :
What is backup?
- Adding more components to your network
- Protecting data by copying it from the original source to a different destination
- Filtering old data from the new data
- Accessing data on tape
Question 995 :
The _____ of a system includes the programs or instructions.
- Hardware
- Icon
- Information
- Software
Question 996 :
Electronic Delay Storage Automatic Computer(EDSAC) was invented by _________
- Herman Hollerith
- JW Mauchy
- John Von Neumann
- None of the Above
Question 997 :
What is output ?
- What the processor takes from the user
- What the user gives to the processor
- What the processor gets from the user
- What the processor gives to the user
Question 998 :
_______ provides electronic data interchange facility.
- ISDN
- LAN
- VAN
- CAN
Question 999 :
Which key is used in combination with another key to perform a specific task?
- Esc
- Control
- Arrow
- Space bar
Question 1000 :
When we run progra in HTML coding, ......... is used as back-end and ........... works as front-end
- Notepad, Internet Explorer
- Notepad, MSN messenger
- MS Word, Internet Explorer
- Both 1 and 3
Question 1001 :
Graphical terminals are divided into two types
- text and dumb
- dumb and intelligent
- vector mode and raster mode
- None of the Above
Question 1002 :
Where is the disk put to enable computer to read it?
- Disk drive
- Memory
- CPU
- ALU
Question 1003 :
The OSI model is divided into how many processes called layers
- Five
- Six
- Seven
- Eight
Question 1004 :
An example of a telecommunication device is a
- Keyboard
- mouse
- printer
- modem
Question 1005 :
What is a back up ?
- Restoring the information backup
- An exact copy of a system's information
- The ability to get a system u and runnign in the event of a system crash or failure
- All of these
Question 1006 :
Virtual memory is
- memory on the hard disk that the CPU uses as extended RAM
- in RAM
- only necessary if you do not have any RAM in your computer
- a backup device for floppy disks
Question 1007 :
A unit for measuring data trasmission speed is called
- cache
- broadbank channel
- byte
- baud
Question 1008 :
A group of bits that tell the computer to perform a specific operation is known as_______
- Instruction code
- Micro-operation
- Accumulator
- Register
Question 1009 :
What menu is selected to cut, copy and paste?
- File
- Tools
- Special
- Edit
Question 1010 :
Laser printers and Ink-jet printers are an example of _______
- Impact
- Non Impact
- Both (A) and (B)
- None of the Above
Question 1011 :
What is meant by a dedicated computer ?
- Which is used by one person only
- Which is assigned one and only one task
- Which uses one kind of software
- Which is meant for application software
Question 1012 :
Which was the first computer to use transisters instead of vacuum tubes?
- Intel?650
- Burroughs E?101
- Datametric?1000
- IBM 1401
Question 1013 :
Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider ?
- Version
- Update
- Help
- Patch
Question 1014 :
What happens when a worksheet is not protected?
- It cannot be opened.
- It cannot be saved.
- It cannot be edited.
- It can be edited.
Question 1015 :
_________ is a computational model based on the structure of biological neural networks?
- Artificial Neural Network (ANN)
- Biological Network
- Both(A) - (B)
- None of the Above
Question 1016 :
The term ________ refers to data storage systems that make it possible for a computer or electronic device to store and retrieve data
- input technology
- output technology
- storage technology
- None of the Above
Question 1017 :
All of the following are examples of real security and privacy risks except
- Hackers
- Spam
- Viruses
- Identity theft
Question 1018 :
The code that relational database management systems use to perform their database task is referred to as?
- QBE
- SQL
- OLAP
- Sequel Server
Question 1019 :
A ________ shares hardware, software and data among authorised users.
- network
- protocol
- hypertext
- transmitter
Question 1020 :
IEEE _______ standard is used for wirless LAN.
- 802.12
- 802.13
- 802.15
- 802.11