Q1. What does the SMTP in an SMTP server stand for?
(a) Simple Mail Transfer Protocol
(b) Serve Message Text Process
(c) Short Messaging Text Process
(d) Short Messaging Transfer Protocol
(e) Simple Messaging Text Process
Q2. Which among the following was the first graphical web browser?
(a) Mosaic
(b) WAIS
(c) CERN
(d) Gopher
(e) None of the above
Q3. Inheritance is the ability of an object to pass on its characteristics to its :
(a) subclasses
(b) off-spring
(c) super classes
(d) parents
(e) none of the above
Q4. What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?
(a) DRAM
(b) RAM
(c) CMOS
(d) CPU
(e) None of these
Q5. Which type of system can learn and adjust to new circumstances by themselves?
(a) Database management system
(b) Expert systems
(c) Geographical systems
(d) Neural networks
(e) File based systems
Q6. What is the maximum size of text field in Access?
(a) 6400 characters
(b) 6880 characters
(c) 6499 characters
(d) 255 characters
(e) None of these
Q7. Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
(a) program thievery
(b) data snatching
(c) software piracy
(d) program looting
(e) data looting
Q8. Type _______to start a numbered list, and then press SPACEBAR or the TAB key.
(a) 1#
(b) 1$
(c) 1.
(d) 1*
(e) None of these
Q9. A/(n) ___________ is an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content.
(a) email
(b) virus
(c) web beacon
(d) spam
(e) firewall
Q10. What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
(a) Haptics
(b) Caves
(c) Biometrics
(d) RFID
(e) All of above
Q11. What is Disk operating system referred for?
(a) Memory management system
(b) Operating system which contains the disk-oriented commands and uses disk devices for permanent storage
(c) DOS
(d) Both (b) and (c)
(e) None of these
Q12. What is included in an e-mail address?
(a) Domain name followed by user’s name
(b) User’s name followed by domain name
(c) User’s name followed by postal address
(d) User’s name followed by street address
(e) None of these
Q13. Which of the following communications modes support two-way traffic but in only one direction of a time?
(a) simplex
(b) half-duplex
(c) three-quarters duplex
(d) All of the above
(e) None of these
Q14. Where are the files deleted from the hard disk sent to?
(a) recycle bin
(b) floppy disk
(c) clipboard
(d) clipart
(e) dekstop
Q15. Which number system is used by computers to store data and perform calculations?
(a) binary
(b) octal
(c) decimal
(d) hexadecimal
(e) None of these
Solutions
1.A
2.A
3.A
4.C
5.D
6.D
7.C
8.C
9.C
10.C
11.D
12.B
13.B
14.A
15.A
(a) Simple Mail Transfer Protocol
(b) Serve Message Text Process
(c) Short Messaging Text Process
(d) Short Messaging Transfer Protocol
(e) Simple Messaging Text Process
Q2. Which among the following was the first graphical web browser?
(a) Mosaic
(b) WAIS
(c) CERN
(d) Gopher
(e) None of the above
Q3. Inheritance is the ability of an object to pass on its characteristics to its :
(a) subclasses
(b) off-spring
(c) super classes
(d) parents
(e) none of the above
Q4. What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?
(a) DRAM
(b) RAM
(c) CMOS
(d) CPU
(e) None of these
Q5. Which type of system can learn and adjust to new circumstances by themselves?
(a) Database management system
(b) Expert systems
(c) Geographical systems
(d) Neural networks
(e) File based systems
Q6. What is the maximum size of text field in Access?
(a) 6400 characters
(b) 6880 characters
(c) 6499 characters
(d) 255 characters
(e) None of these
Q7. Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
(a) program thievery
(b) data snatching
(c) software piracy
(d) program looting
(e) data looting
Q8. Type _______to start a numbered list, and then press SPACEBAR or the TAB key.
(a) 1#
(b) 1$
(c) 1.
(d) 1*
(e) None of these
Q9. A/(n) ___________ is an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content.
(a) email
(b) virus
(c) web beacon
(d) spam
(e) firewall
Q10. What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
(a) Haptics
(b) Caves
(c) Biometrics
(d) RFID
(e) All of above
Q11. What is Disk operating system referred for?
(a) Memory management system
(b) Operating system which contains the disk-oriented commands and uses disk devices for permanent storage
(c) DOS
(d) Both (b) and (c)
(e) None of these
Q12. What is included in an e-mail address?
(a) Domain name followed by user’s name
(b) User’s name followed by domain name
(c) User’s name followed by postal address
(d) User’s name followed by street address
(e) None of these
Q13. Which of the following communications modes support two-way traffic but in only one direction of a time?
(a) simplex
(b) half-duplex
(c) three-quarters duplex
(d) All of the above
(e) None of these
Q14. Where are the files deleted from the hard disk sent to?
(a) recycle bin
(b) floppy disk
(c) clipboard
(d) clipart
(e) dekstop
Q15. Which number system is used by computers to store data and perform calculations?
(a) binary
(b) octal
(c) decimal
(d) hexadecimal
(e) None of these
Solutions
1.A
2.A
3.A
4.C
5.D
6.D
7.C
8.C
9.C
10.C
11.D
12.B
13.B
14.A
15.A
No comments:
Post a Comment