Question 91 :
What does storage unit provide?
- Place for typing data
- Storage for information and instruction
- Place for printing information
- All the above
Question 92 :
What is a firmware?
- A program started in RAM.
- A program started in a file.
- A program started in boot sector.
- A program started in ROM.
Question 93 :
What may happen if a worksheet is not protected?
- It cannot be opened.
- It cannot be saved.
- It cannot be edited.
- It can be edited.
Question 94 :
_________ is the time from the start of one storage device access to the time when the next access can be started
- Mode
- Access time
- capacity
- None of the Above
Question 95 :
How are data organized in a spreadsheet?
- Rows and Columns
- Boxes
- Tables
- None of the above
Question 96 :
Which of the following is non-emissive display?
- LED
- LCD
- Both (A) and (B)
- None of the Above
Question 97 :
Which of the following is true?
- A byte is a single digit in a binary number.
- A bit represents a group of digital numbers.
- Eight?digit binary number is called a byte.
- Eight?digit binary number is called a bit.
Question 98 :
Now a days Vishing has become a criminal practice of using social engineering over which of the following ?
- Social networking sites
- Mobile Phones
- Cyber cafes
Question 99 :
Which is a general term for all forms of solid state memory that do not need to have their memory contents periodically refreshed
- Volatile memory
- Non Volatile memory
- Both (A) and (B)
- None of the Above
Question 100 :
Which of the following is fourth generation computer?
- INTEL 4004
- IBM 360
- IBM 1401
- None of the Above
Question 101 :
Under virtual storage ________
- Two or more programs are stored in primary storage
- Only active pages of a program in primary storage
- Inter-program, interference may occur
- None of the Above
Question 102 :
_______ are used to identify a user who returns to a website.
- Cookies
- Plug?in
- Scripts
- ASPS
Question 103 :
What does a light pen contain?
- lead
- ink
- light sensing elements
- None of the Above
Question 104 :
This type of hardware consists of devices that translate data into a form the computer can process
- application
- input
- system
- All the above
Question 105 :
Which of the following was the first computer to use transisters instead of vacuum tubes?
- Intel?650
- Burroughs E?101
- Datametric?1000
- IBM 1401
Question 106 :
To get to the 'Symbol' dialog box, click on the ......... menu and choose 'Symbol'.
- Insert
- Format
- Tools
- Table
Question 107 :
The part of the computer that coordinates all its functions is called its
- ROM program
- system board
- Arithmetic Logic Unit
- Control Unit
Question 108 :
The home page of a website is
- the largest page
- the last page
- the first page
- the most colourful page
Question 109 :
A telephone number, a birth date, and a customer name are all examples of
- a record
- a query
- a file
- a database
Question 110 :
A _________ is approximately one billion bytes.
- kilobyte
- bit
- gigabyte
- megabyte
Question 111 :
Which type of resource does have greater probability to become shared resource in a computer network?
- Printers
- Speakers
- Floppy disk drivers
- Keyboards
Question 112 :
When the margins on both the sides are straight and equal, then there is ________in the document.
- full justification
- full alignment
- left justification
- right justification
Question 113 :
If you receive and e?mail from someone you don't know, what should you do?
- Forward it to the Police immediately
- Delete it without opening it
- Open it and respond to him/her
- Reply and seek their identity
Question 114 :
The most important or powerful computer in a typical network is _____
- Desktop
- Network client
- Network server
- Network station
Question 115 :
EDSAC stands for________
- Electronic Delay Storage Automatic Computer
- Electronic Discrete Storage Automatic Computer
- Electronic Delay Serial Automatic Computer
- Electronic Discrete Storage Automatic Computer
Question 116 :
__________ means sharing a program with someone who is not authorized by the license agreement to use it
- Softloading
- Hard Disk loading
- Internet Downloading
- Renting
Question 117 :
A proxy server is used for which of the following?
- To provide security against unauthorised users
- To process client requests for web pages.
- To process client requests for database access
- To provide TCP/IP
Question 118 :
A computer program that translates one program instructions at a time into machine language is called a / an
- Interpreter
- CPU
- Compiler
- Simulator
Question 119 :
_________ is an artificial neural network with multiple hidden layers between the input and output layers?
- Deep neural network
- Shallow neural network
- Both(A) - (B)
- None of the Above
Question 120 :
The ______ key will launch the Start button.
- Esc
- Shift
- Windows
- Tab