Q. : 1 When the mouse pointer is positioned on _____________, it is shaped like a hand.
1) grammar error
2) formatting error
3) screen tips
4) spelling error
5) hyperlink
Q. : 2___________of a computer program is the act of making the program ready for execution.
1) Installation
2) Compression
3) Indexing
4) Downloading
5) None of these
Q. : 3 The abbreviation KB usually means
1) Key Block
2) Kilo Byte
3) Kernel Boot
4) Key Byte
5) Kit Bit
Q. : 4 A(n) ________ is a special visual and audio effect applied in Powerpoint to text or content.
1) animation
2) flash
3) wipe
4) dissolve
5) None of these
Q. : 5 Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information?
1) floppy diskette
2) hard disk
3) permanent disk
4) optical disk
5) None of these
Q. : 6 Allocation is the process of assigning computer memory to certain programs for their use.
1.Resource
2.Concurrent
Q. : 7 Which of the following types of files is NOT identified as a potential virus carrier?
(1) A game
(2) A word-processing document
(3) An image file
(4) A spreadsheet file
Q. : 8 A destructive program that disguises itself as a useful utility or game is called a:
(1) Worm
(2) Time bomb
(3) Trojan horse
(4) Web bug
Q. : 9 All of the following terms refer to people who search for security loopholes in a computer system EXCEPT:
(1) Crackers
(2) Hackers
(3) Spammers
(4) White hats.
Q. : 10 When the bidding price at an online auction is artificially pumped by a secret bidder, the perpetrator is known as a:
(1) Bogus bidder
(2) Shill.
(3) Cyber stalker
(4) Pumper and dumper
Answer :-
- (5) : hyperlink
- (1) : Installation
- (2) : Kilo Byte
- (1) : animation
- (2) : hard disk
- (1) : Resource
- (3) : An image file
- (3) : Trojan horse
- (3) : Spammers
- (2) : Shill.
0 comments:
Post a Comment