Monday, 20 April 2020

INFORMATION COMMUNICATION & TECHNOLOGY


Information & Communication Technology
Computer: A computer is a truly amazing machine that performs a specified sequence of operations as per the set
of instructions (known as programs) given on a set of data (input) to generate desired information (output ).
A complete computer system consists of fourparts:
✓ Hardware: Hardware represents the
physical and tangible components of the
computer.
✓ Software: Software is a set of electronic
instructions consisting of complex codes
(Programs) that make the computer perform
tasks.
✓ User: The computer operators are known asusers.
✓ Data: Consists of raw facts, which the
computer stores and reads in the form of
numbers.
Functionalities of a computer
Any digital computer carries out five functions in gross terms:
✓ Takes data as input.
✓ Stores the data/instructions in its memory and use them when required.
✓ Processes the data and converts it into useful information.
✓ Generates the output
✓ Controls all the above four steps.
The following features characterize this electronicmachine:
✓Speed ✓ Flexibility
✓Accuracy ✓ Low cost
✓Storage and Retrieval
✓Reliability
✓ Repeated ProcessingCapabilities
Applications of Computer
Following list are various applications of computers in today's arena.
✓ Business ✓ Health Care
✓ Banking ✓ Engineering Design
✓ Insurance ✓ Military
✓ Education ✓ Communication
✓ Marketing ✓ Government
Following are the main five generations ofcomputers:
S. No. Generation & Description
1 First Generation (1946-1959) - Vacuum tubebased
2 Second Generation (1959-1965) - Transistorbased
3 Third Generation (1965-1971) - Integrated Circuitbased
4 Fourth Generation (1971-1980) - VLSI microprocessorbased
5 Fifth Generation (1980-onwards) - ULSI microprocessorbased
Computer hardware consists of the followingcomponents:
1. CPU (Central Processing Unit): CPU is considered as the brain of the computer. It performs all types of
data processing operations, stores data, intermediate results and instructions (program).It controls the
operation of all parts of computer.
Components [A] CPU itself has following three components:
✓ ALU (Arithmetic Logic Unit): When the control unit encounters an instruction that involves
mathematical calculation or decision/logic, it passes the control to the second component, i.e., the
arithmetic logic unit (ALU). The ALU includes a group of registers - memory locations built directly
into the CPU - that are used to hold data that are being processed by the current instruction.
✓ Registers: The register is the smallest high-speed storage area in the CPU. All data must be
represented in a register before it can be processed.
✓ Control Unit: This unit controls the operations of all parts of computer but does not carry out any
actual data processing operations
[B] Primary memory consists of mainly two types ofmemories:
1. Random Access Memory (RAM): RAM is the internal memory of the CPU for storing data,
program and program result. It is read/write memory which stores data until the machine is
working. As soon as the machine is switched off, data is erased.
RAM is volatile, i.e. data stored in it is lost when we switch off the computer or if there is a power
failure. Hence a backup uninterruptible power system (UPS) is often used with computers. RAM is small,
both in terms of its physical size and in the amount of data it can hold.
There are mainly three types of RAMavailable:
I. Dynamic Random Access Memory (DRAM): A type of physical memory used in most personal
computers. The term dynamic indicates that the memory must be constantly refreshed2 (reenergized) or
it loses its contents. This type of memory is more economical.
II. Static Random Access Memory (SRAM): A type of memory that is faster and less volatile than
DRAM, but requires more power and is more expensive. The term static is derived from the fact that
it does not need to be refreshed like DRAM.
III. Synchronous Dynamic Random Access Memory (SDRAM): A type of DRAM that can run at much
higher clock speeds.
2. Read Only Memory (ROM): The memory from which we can only read but can not write on it . This
type of memory is non-volatile. The information is stored permanently in such memories during
manufacture. A ROM, stores such instructions that are required to start a computer. This operation is
referred to as bootstrap.
There are mainly three types of ROMavailable:
a. MROM (Masked ROM): The very first ROMs were hard-wired devices that contained a pre-
programmed set of data or instructions. These kinds of ROMs are known as masked ROMs which are
inexpensive.
b. EPROM (Erasable and Programmable Read Only Memory): The EPROM can be erased by exposing
it to ultra-violet light for a duration of up to 40 minutes. Usually, an EPROM eraser achieves this
function.
c. EEPROM (Electrically Erasable and Programmable Read Only Memory): The EEPROM is
programmed and erased electrically. It can be erased and reprogrammed about ten thousand times.
Both erasing and programming take about 4 to 10 ms (milli second).
Memory
A memory is just like a human brain. It is used to store data and instructions. Computer memory is the storage
space in computer where data is to be processed and instructions required for processing are stored. The
memory is divided into large number of small parts called cells. Each location or cell has a unique address which
varies from zero to memory size minus one.
Memory is primarily of three types
✓ Cache Memory: It is a very high speed semiconductor memory which can speed up CPU. It acts as a buffer
between the CPU and main memory.
✓ Primary Memory/Main Memory: Primary memory holds only those data and instructions on which
computer is currently working. It has limited capacity and data is lost when power is switched off.
✓ Secondary Memory: This type of memory is also known as external memory or non-volatile. It is slower
than main memory. These are used for storing data/Informationpermanently.
1. Secondary Storage (External Storage Devices) : Floppy diskettes, hard disk, tapes and optical disks come
under the category of external storage devices or ancillary storage devices. These devices are very sensitive to
environmental conditions (humidity and temperature) as well as to external magnetic fields and need to be
stored carefully.
a. Floppy Disk : Floppy disks are primarily used on PCs. Information on a floppy disk is recorded in the
magnetized states of particles of iron oxides evenly placed upon concentric circles known as tracks.
b. Hard Disk: It is a non-removable enclosed magnetic disk included in most PCs. It contains a stack of metal
platters, each coated with iron oxide, that spin on a spindle and the entire unit is encased in a sealed
chamber.
c. Magnetic Tape: This is plastic tape, usually made of Mylar that is coated with iron oxide, thereby enabling
the introduction (writing); retention (memory) and reading of magnetically recorded information. The best
use of tape storage is for data that you do not use very often.
2. Peripherals: Peripheral devices are devices connected to the computer externally. If a peripheral device is
disconnected, the computer will still be able to work; only functions performed by this peripheral device
will not be available.
Mainly there are following types of peripheraldevices:
A. Input Devices (How to tell it what to do): This unit makes link between user and computer. The
input devices translate the information into the form understandable by computer.
a. Keyboard- The most common and very popular input device which helps in inputting data to the
computer
b. Mouse- Mouse is the most popular pointing device and cursor-control device having a small palm size
box with a round ball at its basewhich senses the movement of mouse and sends corresponding signals
to CPU when the mouse buttons are pressed.
c. Joy Stick- To move cursor position on a monitor screen. It is mainly used in Computer Aided Designing
(CAD) and playing computergames.
d. Light pen- It is used to select a displayed menu item or draw pictures on the monitor screen.
e. Track Ball- Mostly used in notebook or laptop computer, instead of a mouse .This is a ball which is half
inserted and by moving fingers on ball, pointer can be moved
f. Scanner- A scanner allows you to scan printed material and convert it into a file format that may be
used within the PC.
g. Digitizer- It converts analog information into digital form.
h. Microphone-Microphone is an input device to input sound that is then stored in digital form.
i. Magnetic Ink Card Reader (MICR)-MICR input device is generally used in banks because of a large
number of check to be processed every day.
j. Optical Character Reader (OCR)- OCR scans text optically character by character, converts them
into a machine readable code and stores the text on the system memory.
k. Bar Code Reader- A device used for reading bar coded data (data in form of light and dark lines).
Bar coded data is generally used in labeling goods, numbering the books.
l. Optical Mark Reader(OMR)- A special type of optical scanner used to recognize the type of mark
made by pen or pencil.
B. Output Devices: (How it shows you what it is doing) Output devices translate the computer's output into
the form understandable by users.
Monitors: Monitors, commonly called as Visual Display Unit (VDU), are the main output device of a computer.
It forms images from tiny dots, called pixels that are arranged in a rectangular form. The sharpness of the
image depends upon the number of pixels.
There are two kinds of viewing screen used formonitors.
a. Cathode-Ray Tube (CRT): The CRT display is made up of small picture elements called pixels.
The smaller the pixels, the better the image clarity, or resolution
b. Flat- Panel Display: The flat-panel display refers to a class of video devices that have reduced
volume, weight and power requirement in comparison to the CRT.
Printer: Printer is an output device, which is used to print information on paper.
c. Impact Printers: The impact printers print the characters by striking them on the ribbon which is
then pressed on the paper.
d. Non-Impact Printers: Non-impact printers print the characters without using ribbon. These
printers print a complete page at a time so they are also called as Page Printers. Laser
Printers, Inkjet Printers
Note:
✓ Data: Data can be defined as a representation of facts, concepts or instructions in a formalized manner
which should be suitable for communication, interpretation, or processing by human or electronic machine.
✓ Information:- Information is organized or classified data which has some meaningful values for the
receiver. Information is the processed data on which decisions and actions arebased.
✓ Data Processing Cycle: Data processing is the re-structuring or re-ordering of data by people or machine to
increase their usefulness and add values for particular purpose. Data processing consists of basic steps input,
processing and output.
These three steps constitute the data processingcycle.
✓ Input -Input data is prepared in some convenient form for processing. The form will depend on the
processing machine. For example, when electronic computers are used, the input data could be recorded
on any one of several types of input medium, such as magnetic disks, tapes and soon.
✓ Processing - In this step input data is changed to produce data in a more useful form. For example,
paychecks may be calculated from the time cards, or a summary of sales for the month may be calculated
from the sales orders.
✓ Output - The result of the proceeding processing step are collected. The particular form of the output data
depends on the use of the data. For example, output data may be pay-checks foremployees.
Language Processors:
Assembler: This language processor converts the program written in assembly language into machine language.
Interpreter: This language processor converts a HLL(High Level Language) program into machine
language by converting and executing it line byline.
Compiler:-It also converts the HLL program into machine language but the conversion manner is different.
It converts the entire HLL program in one go, and reports all the errors of the program along with the line
numbers.
Classification of Computers:
Computers can be broadly classified by their speed and computing power:
Sr.
No.
Type Specifications
1 PC
(Personal
Computer
)
It is a single user computer system having
moderately powerful microprocessor.
2 WorkStation It is also a single user computer system which is similar to
personal computer but have more powerful microprocessor.
3 Mini Computer It is a multi-user computer system which is capable of supporting
hundreds of users simultaneously. Software technology is
different fromminicomputer.
4 Main Frame It is a multi-user computer system which is capable of supporting
hundreds of users simultaneously. Software technology is
different fromminicomputer.
5 Supercomputer It is an extremely fast computer which can execute hundreds
of millions of instructions per second.
S.No. Unit Description
1 Bit(Binary
Digit)
A binary digit is logical 0 and 1 representing a passive or an active state of a
component in an electric circuit.
2 Nibble A group of 4 bits is called nibble.
3 Byte A group of 8 bits is called byte. A byte is the smallest unit which can represent a
data item or a character. (1 byte = 8 bits)
4 Word A computer word, like a byte, is a group of fixed number of bits processed as a unit
which varies from computer to computer but is fixed for each computer. The length
of a computer word is called word-size or word length and it may be as small as 8
bits or may be as long as 96 bits. A computer stores the information in the form of
computer words.
Few higher storage units arefollowing:
S.No. Unit Description
1 Kilobyte (KB) 1 KB = 1024 Bytes
2 Megabyte(MB) 1 MB = 1024 KB
3 GigaByte (GB) 1 GB = 1024 MB
4 TeraByte (TB) 1 TB = 1024 GB
5. PetaByte (PB) 1 PB = 1024 TB
Software
Software: software represents the set of programs that govern the operation of a computer system and make the
hardware run. There are two types of software
➢ System Software: The system software is collection of programs designed to operate, control, and extend
the processing capabilities of the computer itself. System software are generally prepared by computer
manufactures. System software serves as the interface between hardware and the end users. Examples:
Operating System, Compilers, Interpreter, Assembler etc.
➢ Application Software: It is the set of programs necessary to carry out operations for a specified application.
Application software can subdivide into threecategories:
(A) Packages:-
Packages
Word Processing A package that process textual matter and creates
organized and flawless documents.
Spreadsheets An electronic spreadsheet is a program that
accepts data in a tabular form and allow users to
manipulate , calculate, analyze data in the desired
manner.
Database Management Systems DBMS is a package that can handle and manage
bulk of stored data.
Desktop Publishing Software Handles page layout by combining the functions of
a traditional typesetter and a layoutartist.
Graphics, Multimedia and Presentation
applications
Application software that manipulates images is
known as Graphics software.
(B) Utilities: Utilities are those application programs that assist the computer by performing
housekeeping functions like backing up disk or scanning viruses etc.
Text Editor Program is used for creating, editing text files.
Backup Utility Program facilities the backing-up of disk.
Compression Utility Large files can be compressed so that it takes less
storage area.
Disk Defragmentor It speeds up disk access by rearranging the files
and free space on your computer.
Antivirus Software It scans yours disk for viruses and removes them if
any virus is found.
C. Customized Software: This type of software is tailor-made software according to a user’s requirement.
Number System
When we type some letters or words, the computer translates them in numbers as computers can understand
only numbers. A computer can understand positional number system where there are only a few symbols called
digits and these symbols represent different values depending on the position they occupy in thenumber.
A value of each digit in a number can be determinedusing
✓ The digit
✓ The position of the digit in the number
✓ The base of the number system (where base is defined as the total number of digits available in the
number system).
1. Decimal Number System: The number system that we use in our day-to-day life is the decimal number
system. Decimal number system has base 10 as it uses 10 digits from 0 to 9. In decimal number system,
the successive positions to the left of the decimal point represent units, tens, hundreds, thousands and
soon.
2. Binary Number System: Uses two digits, 0 and 1, also called base 2 number system . Each position
in a binary number represents a 0 power of the base (2). Last position in a binary number
represents a x power of the base (2).
3. Octal Number System: Uses eight digits, 0,1,2,3,4,5,6,7, also called base 8 number system, Each
position in an octal number represents a 0 power of the base(8).
4. Hexadecimal Number System: Uses 10 digits and 6 letters, 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F. Letters
represents numbers starting from 10. A = 10. B = 11, C = 12, D = 13, E = 14, F = 15. Also called base 16
number system .Each position in a hexadecimal number represents a 0 power of the base(16).
Number Conversion
There are many methods or techniques which can be used to convert numbers from one base to another.
We'll demonstrate here the following
✓ Decimal to Binary System
✓ Binary to Decimal
Decimal to Binary System
Steps
Step 1 - Divide the decimal number to be converted by the value of the newbase.
Step 2 - Get the remainder from Step 1 as the rightmost digit (least significant digit) of new base number.
Step 3 - Divide the quotient of the previous divide by the newbase.
Step 4 - Record the remainder from Step 3 as the next digit (to the left) of the new base number.
Repeat Steps 3 and 4, getting remainders from right to left, until the quotient becomes zero in Step 3. The last
remainder thus obtained will be the most significant digit (MSD) of the new base number.
Example
Decimal Number: (29)10
Calculating Binary Equivalent:
Step Operation Result Remainder
Step 1 29 / 2 14 1
Step 2 14 / 2 7 0
Step 3 7 / 2 3 1
Step 4 3 / 2 1 1
Step 5 1 / 2 0 1
As mentioned in Steps 2 and 4, the remainders have to be arranged in the reverse order so that the first
remainder becomes the least significant digit (LSD) and the last remainder becomes the most significant digit
(MSD).
Decimal Number: (29)10 = Binary Number: (11101)2.
Binary toDecimal System
Steps
Step 1 - Determine the column (positional) value of each digit (this depends on the position of the digit and the
base of the number system).
Step 2 - Multiply the obtained column values (in Step 1) by the digits in the corresponding columns.
Step 3 - Sum the products calculated in Step 2. The total is the equivalent value in decimal.
Example
Binary Number: (11101)2
Calculating Decimal Equivalent:
Step Binary Number Decimal Number
Step 1 (11101)2
((1 x 24) + (1 x 23) + (1 x 22) + (0 x 21) + (1 x 2
0))10
Step 2 (11101)2 (16 + 8 + 4 + 0 + 1)10
Step 3 (11101)2 (29)10
Binary Number: (11101)2 = Decimal Number: (29)10
Networking
Network: Computer Networks means interconnected set of autonomous system that permit distributed
processing to information.
✓ Sender Computer
✓ Sender equipment
(Modem)
Five components:
✓ Receiver Equipment(Modem)
✓ Receiver Computer
✓ Communication Channel ( TelephoneCables)
Classified on the basis of GeographicalCoverage:
connectivity within a campus or small
➢ Local Area Network (LAN): A local area
network is relatively smaller and privately
owned network with the maximum span of 10
km.
➢ Metropolitan Area Network (MAN) : MAN is
defined for less than 50 Km and provides
regional
geographical area.
➢ Wide Area Network (WAN): A wide
Area Network (WAN) is a group
Communication Technology ,provides
no limit ofdistance.
Types of Network
1. Point to Point Network: When a packet is sent from one router to another intermediate routers, the
entire packet is stored at each intermediate router, stored there till the output line is free and then
forwarded. A subnet using this principle is called point to point or packet switchednetwork.
Topologies for a point to point Subnet
➢ Star: Each device has a dedicated point to point link only to a central controller, usually called a hub.
➢ Tree: A tree topology is a variation of a star.
➢ Ring: Each device has a dedicated point to point line configuration only with the two devices on either side
of it.
➢ Bus: One long cable acts as a backbone to link all the devices in the network.
2. Broadcast Networks: Broadcast networks have a single communication channel that is shared by all the
machines on the network.
Transmission Media
➢ Network Cables: Network cables are
used to connect computers. The most
commonly used cable is Category 5 cable
RJ-45.
➢ Distributors: A computer can be connected
to another one via a serial port but if we need
to connect many computers to produce a
network, this serial connection will not work.
The solution is to use a central body to which
other computers, printers, scanners etc. can
be connected and then this body will manage
or distribute network traffic
➢ Repeaters: A repeater is an electronic
device that receives a signal and retransmits
it at a higher level or higher power, or onto
the other side of an obstruction, so that the
signal can cover longer distances.
➢ Bridge: A bridge is a product that connects a
local area network (LAN) to another local area
network that uses the same protocol (for
example, Ethernet or token ring).
➢ Routers: A router is a device that forwards data
packets along networks. A router is connected to at
least two networks, commonly two LANs or WANs
➢ Internal Network Cards: Network
card is a necessary component of a
computer without which a computer
cannot be connected over a network.
It is also known as network adapter
or Network Interface Card (NIC).
Most branded computers have
network card pre-installed. Network
cards are of two types: Internal and
External Network Cards.
➢ External Network Cards: External
network cards come in two flavours
like Wireless and USB based. Wireless
network card need to be inserted into
the motherboard but no network cable
is required to connect to network.
➢ Universal Serial Bus (USB): USB card
are easy to use and connect via USB
port. Computers automatically detect
USB card and can install the drivers
required to support the USB network
card automatically.
➢ Modem (Modulator –DE Modulator):
Modem is a device attached to computers that
can convert digital signals to analog signals to
analog signals and vice versa.
Operating System
An Operating system is a program, which acts as an interface between a user and the hardware.
Characteristics of Operating System:
✓ Memory Management -- keeps tracks of
primary memory i.e. what part of it is in
use by whom,what part is not in use etc.
and allocates the memory when a process
or program requests it.
✓ Processor Management -- allocates
the processor(CPU) to a process and
de-allocates processor when it is no
longer required.
✓ Device Management -- keeps track of all
devices. This is also called I/O controller
that decideswhich process gets the device,
when, and for how much time.
✓ File Management -- allocates and de-
allocates the resources and decides who
gets theresources.
✓ Security -- prevents unauthorized
access to programs and data by means
of passwordsand similar other
techniques.
✓ Job accounting -- keeps track of time and
resources used by various jobs and/orusers.
✓ Control over system performance --
records delays between request for a
service and fromthe system.
✓ Interaction with the operators -- The
interaction may take place via the console
of the computer in the form of instructions.
Operating System acknowledges the same,
does the corresponding action and informs
the operation by a display screen.
✓ Error-detecting aids -- Production of
dumps, traces, error messages and other
debuggingand error-detectingmethods.
✓ Coordination between other software and
users -
- Coordination and assignment of compilers,
interpreters, assemblers and other software to
the various users of the computer systems.
MS - Window
MS-Windows is a GUI (Graphic User Interface) based operating system. In Windows Operating system
multiple applications can be simultaneously run in different windows.
➢ In MS-Windows, the screen upon which
icons, windows, too are displayed is
known asdesktop.
➢ An icon is a graphic symbol that
represents a window element like, file,
folder, orshortcut.
➢ Loading up of operating system files
into the computer’s memory in called
booting up.
➢ The taskbar is a bar, which is usually
located at the bottom of the screen.
➢ My computer is helpful for viewing the
contents of a single folder or drive.
➢ Windows Explorer is another way of
seeing what is on your computer.
Windows Explorer shows the
computer’s contents as a hierarchy.
➢ File: A program or document stored on a
disk.
➢ Toolbar: A set of button you click to
perform common tasks.
➢ A folder is a location in which you can
store files and other folders.
➢ To create a new folder, File—New—Folder
commands are clicked in My Computer
windows.
➢ To find files or folders, Start---Find---
Files or Folder commands are clicked.
➢ To create a shortcut to a file, firstly select
the file or folder, whose shortcut is to be
created. Then drag the file icon through
right mouse button to desired location
where shortcut to be placed, and then
select create shortcut(s).
➢ To shut down the computer, Start—
Shut Down commands are clicked.

Shortcut Description
Ctrl+W Close the active window /document
Ctrl+Z Undo an action
Ctrl+Y Redo the last action or repeat an action
Ctrl+S Save a document
Ctrl+P Print a document
Ctrl+K Insert a hyperlink.
Alt+Right. Arrow Go forward one page.
Ctrl+C Copy selected text or graphics to the OfficeClipboard.
Ctrl+V Paste the most recent addition to the OfficeClipboard.
Ctrl+Shift+A Format all letters as capitals.
Ctrl+B Applies or removes bold formatting.
Ctrl+I Applies or removes italic formatting.
Ctrl+= Apply subscript formatting (automaticspacing).
F1 Open Help
F4 Repeat the last action performed(Word2000+)
F5 Open the Find, Replace, and Go To window in MicrosoftWord
F7 Spellcheck and grammar check selected text ordocument
F12 Save As
Internet
The Internet is a global system of interconnected computer networks that use the standard Internet
protocol suite (TCP/IP) to link several billion devices worldwide. It also known as “network of networks”
that consists of millions of private, public, academic, business, and governmentnetworks.
Various Applications of Internetare:
✓ Exchange messages using e-mail
(Electronic mail).
✓ Transfer files as well as software.
✓ Browse through information on any
topic on web.
✓ Communicate in real time (chat) with
others connected to the Internet.
✓ Search databases of government, individuals
and organizations.
✓ Read news available from leading newsgroups.
✓ Send or receive animation and picture files
from distant places.
✓ Set up a site with information about
your company’s products and
services.
The World Wide Web commonly known as the Web or www developed founded by Tim Berners – Lee in
1989, is a system of interlinked hypertext documents that are accessed via the Internet. These multimedia
pages are ever- changing.
A web browser (commonly referred to as a browser) is a software application for retrieving, presenting and
traversing information resources on the World WideWeb.
Ex. WorldWideWeb( First Web Browser), Netscape, Internet Explorer, Opera, Mozilla Firefox, Safari,
Google Chrome,
Various features of a Web Browserare:
• Menu bar: The menu bar, located at the very top of the screen, can be accessed using the mouse. Actions
that are in black can be performed, while actions that cannot be performed will be in gray or lightened.
• Tool bar: The tool bar is located at the top of the browser; it contains navigational buttons for the
Web. Basic functions of these buttons include:
Command Function
Home Opens or returns to startingpage
Back Takes you to the previous page
Forward Takes you to the next page
Print Prints current page
Stop Stops loading a page
Reload Refresh/redisplays current page
Search Accesses search engine
✓ Location bar: The location bar, below the tool bar, is a box labelled "Location," "GoTo," or "Address." You
can type in a site's address, and press the Return or Enter key to open thesite.
✓ Status bar: The status bar is located at the very bottom of the browser window. You can watch the
progress of a web page download to determine if the host computer has been contacted and text and
images are being downloaded.
✓ Scroll bar: The scroll bar is the vertical bar located on the right of the browser window. You can scroll
up and down a web page by placing the cursor on the slider control and holding down the mouse button.
✓ A website is a set of related web pages served from a single webdomain.
✓ The Uniform Resource Locator, abbreviated as URL is the Address for web sites. Most of them begin
with http (HyperText Transfer Protocol), followed by a colon and two slashes.. In most web browsers, the
URL of a web page is displayed on top inside an address bar. An example of a typical URL would be
"http://www.cbsenetonline.in".
✓ A Home page, index page, or main page is a page on a website. A home page usually refers to:
✓ A Hyperlink is a reference to data that the reader can directly follow either by clicking or by hovering or
that is followed automatically.
✓ Downloading means to receive data to a local system from a remote system, or to initiate such a data
transfer.
✓ Uploading refers to the sending of data from a local system to a remote system such as a server or
another client with the intent that the remote system should store a copy of the data being transferred.
ELECTRONIC MAIL (e-mail):
Electronic Mail (e-mail) was invented by "John Von Neumann". Electronic Mail transfers the data from one
system to another system in the form of messages (test), pictures (images), Multi Media messages.
An e-mail address normally consists of Three parts.
1. Name of the User
2. "@" Sign
3. 3
rd part comes after @ sign and it is the name of the DNS.
 Example : google @ gmail .com
User Name "@" sign Domain NameSystem (DNS)
Toview an e-mail, you have to use e-mail software is "Outlook Express".
Inthe e-mailwindow,you canfind "folderPane" atthe left side ofthewindow.It has set offolders named as Composed
mail, Inbox, Out Box, Sent Items, Drafts, Trash, Spam etc.,
* Inbox is used to store incomingmail.
* Outbox is used to store outgoing mail before it is sent.
* Sent Items is used to store mail that has already been sent.
* Deleted Items (Trash) is used to store deleted mail up to 30 days.
*. Draft folder is use to store mail that is not yet complete.
* Spam is used to store the unsolicited bulk e-mail up to 30 days.
* Compose Mail is use to create a newmail.
✓ To:Totype the e-mail address ofthepersontowhomyouwanttosendamailinthisbox.
✓ Subject:Totypeafewwordsaboutthesubjectoftheletteryouwanttowrite.
✓ CC (Carbon Copy) : To type the e-mail address of the other recipients in this box, each address is separated by a
comma (,). When you complete the mail and click the "Send" button, then the mail will automatically be sent to all
the recipients. Here, all the recipients will know who the other recipientsare.
✓ BCC(BandCarbonCopy)or(BlindCurtseyCopy):Ifyoudon'twantthemtoknowwhoelse have received copies,
you can type the addresses in the BCC text box. In this case, only you (the sender)willknowtheidentityofallthe
recipientsofmail.
✓ Reply :Youcansendyour reply using the samewindow. The subjectboxwill have the same subject,butwiththe
words"Re:"beforeit.
✓ Forward:Youcansendtheforwardmessageusingthesamewindow. Thesubjectboxwill havethesamesubject,
butwiththewords"Fwd:"beforeit.
✓ An email attachment is a computer file sent along with an email message. One or more files can be
attached to any email message, and be sent along with it to the recipient. The first email was sent by Ray
Tomlinson to himself in 1971.
✓ The Drafts folder retains copies of messages that you have started but are not yet ready to send.
✓ Hotmail, a free e-mail service provided by Microsoft which was established in 1995 was co - founded by
an Indian American entrepreneur Sabeer Bhatia along with Jack Smith in July of1996.
✓ An Internet Protocol address (also known as an IP address) is a numerical label assigned to each
device (e.g., computer, printer) participating in a computer network. It acts as an identifier for a
computer. It is a unique address for every computer.
✓ Top-level domain: Each part of a domain name contains certain information. The first field is the host name,
identifying a single computer or organization. The last field is the top-level domain, describing the type of
organization and occasionally country of origin associated with the address. For e.g. - .com – Commercial,
.edu – Educational.
Protocols:
✓ Transmission Control Protocol (TCP)
✓ User Datagram Protocol(UDP)
✓ Internet Protocol (IP)
✓ Post Office Protocol (POP3)
✓ Hyper Text Transfer Protocol(HTTP)
✓ File Transfer Protocol(FTP)
✓ Internet Control Message Protocol(ICMP)
✓ Internet Message Access Protocol(IMAP)
Function keys – A function key is a key on a computer or terminal keyboard which can be programmed
so as to cause an operating system command interpreter or application program to perform certain
actions, a form of soft key. For e.g. - F1 through F12 keys are known as function keys. Each keys perform
different functions.
E-Commerce
E - Commerce (Electronic Commerce) : E-Commerce is the buying and selling of goods and ser- vices on the
internet.The visitor tothe site cansellorbuyanyproductor serviceonline.Thetransac- tions are enable through
credit cards, Debit cardsetc.
E-Business (Electronic Business) : E-Business is the administration of conducting business via the Internet.
This would include the buying and selling of goods and services, along with providing technical or customer
support through the Internet. E-Business is used in conjunction with E-Com- merce, but includes services in
addition to the sale of goods.
E-Administration:The use of ICTs (Information and Communication technologies) to modernize the state, the
creation of data repositories for MIS (ManagementInformation Systems), computerisation of records.
E-Services: the emphasis here is to bring the state closer to the citizens. Examples include provi- sionofonline
services.E-Services andE-Administrationtogether constitutewhatis generally termed e-governance.
E-Governance: The use of IT to improve the ability of government to address the needs of society. It includes
the publishing of policy and programme related information to transact with citizens. It extends beyond
provision of on-line services and use of IT for strategic planning and reaching devel- opment goals of the
government.
E-Democracy: The use of IT to facilitate the ability of all sections of society to participate in the governance of
the state. The remit is much broader here with a stated emphasis on transparency', accountability and
participation. Examples are online disclosure policies, online grievance redress forums and e-referendums.
Electronic Funds Transfer (EFT): A cashless approach used to pay for goods and services. Electronic signals
between computers are used to adjust the accounts of the parties involved in a transaction. Electronic Funds
transfer (EFT) is also known as "Electronic Banking (E-Banking)". E- Banking is the use of electronic means to
transfer funds directly from one account to another, rather than by cheque orcash.
InternetBanking orOnlineBanking:internetBanking allows customers to conductfinancialtrans- actions on
a secure website operated by their retail or virtual bank, credit union or building soeicty.
E-Marketing: E-Marketing is also known as Internet Marketing, Digital Marketing, Web Marketing, Online
Marketing, SearchMarketing,I-Marketing(InternetMarketing)is theMarketingofproducts or services over the
Internet.
E-Procurement (Supplier exchange) : E-Procurement is more than just a system for making pur- chases
online. A properly implemented system can connect companies and their business processes directly with
suppliers while managing all interactions between them. Examples are bids, manage- ment correspondence,
questions and answers, previous pricing and multiple emails sent to multiple participants.
Types of E-Commerce:
1. Business to Customer (B2C): The basic concept of this model is to sell the product online to the
customers. It provides direct selling through online. B2C is the indirect trade between the company
and consumers. Directly interact with the customers is the main difference with other business
model.
2. Business toBusiness (B2B):Itis similar to manufacturer issuing goods to the retailer orwhole- saler.
This model defines that Buyer and seller are two different entities. It consists of longest form of E-
Commerce. It is one of the cost effective way to sell out product through out the world.
3. Customer to Customer (C2C): It helps the online dealing of goods or services among people. though
there is no major parties needed but the parties will not fulfill the transactions without the program
which is supplied by the online market dealer such as eBay.
4. Peer to Peer (P2P): It is a discipline that deal itself, which assists people to instantly shares related
computer files and computer sources without having to interact with central webserver.
5. M-Commerce: This model deals with conducting the transactions with the help of mobile. The mobile
consumers can interact each other and can lead the business. M-Commerce (Mobile Com- merce)
involves the change of ownership or rights to utilize goods and related services.
Companies and Their Founders:
Microsoft Bill gates
Google Sergey Brain and Larrypase(1997)
Yahoo JourneyingandDavid(1994)
Facebook MarkZukerberg
Apple Steeve Jobbs
Oracle TimNerveski
Wikipedia Jimmy Wales
Twitter Bizz Stone
Instagram Kevin Systrom and Mike Krieger
Whatsapp Brian Acton and Jan Koum
YouTube Chad Hurley, Steve Chen and Jawed Karim
COMPUTER S E C U R I T Y
Security: Security controls access to data in files and permits only authorized use of terminals and other
equipment. Control is usually through various levels of passwords assigned on the basis of need toknow.
Typical approaches to improving Computer security can include the following :
• Physically limit access to computers to only those who will not compromise security.
• Hardware Mechanisms that impose rules on computer programs, thus avoiding depending on computer
programs for computer security.
• Operating system Mechanisms that impose rules on programs to avoid trusting Computer Programs.
• Programming strategies to make computer programs dependable and resist subversion.
Security Tools:
Firewall:Afirewallisa setof relatedprograms,locatedat anetworkgatewayserver,thatprotects the resourcesof a
privatenetworkfromusersofothernetworks. Firewall caneitherbehardwaredevices or software programs.
They provide protection from Online intrusions. A firewall is designed to pre- vent unauthorized Internet
users from accessing your computer. All messages entering your Computer from the Internet pass through the
firewall which examines each message. The firewall blocks any message that was not specifically requested by
yoursystem.
Encryption: It can be used to protect the message from unauthorized users. It can be done in several ways by
switching the characters around, replacing characterswith others, and even removing characters from the
message.
Cryptographic Techniques: It can be used to defend data in transit between systems reducing the probability that
data exchanged between systems can be intercepted or modified. Secure crypto processors can be used to
leverage physical security techniques into detecting the security of the system. Strong authentication
techniques can be used to ensure that communication end-points are who they say they are.
Intrusion-Detection- System: It can be scan a network for people that are on thenetwork butwho should not be
there or redoing things that they should not be doing. For example trying a lot of pass- words to gain access to
the network.
Pinging: The Ping application can be used by potential crackers to find if an IP address is reachable. If a cracker finds
a computer they can try a port scan to detect and attack services on that computer.
Anti-Virus Software : Anti-virus software consists of computer programs that attempt to identify, thwart and
eliminate computer viruses and other malicious software (Malware). The term "Antivirus" is used because it is
designed exclusively to combat computerviruses.
Antivirus software typically uses two different approaches to accomplish this:
☛ Examining (Scanning) files to look for known viruses matching definitions in a virus dictionary.
☛ Identifying suspicious behaviour from any computer program which might indicate infections.
VIRUS (Vital Information Resource Under Siege): The full form is "Vital Information Resource Under Siege". A
computer virus is a computer program that spreads by inserting copies of itself into other executable code or
documents. Virus program that runs on your computer without your knowledge and can cause damage to your
files.Acommon way to receive a virus is through an attachment viae-mail.
Worm: Worm is a self-replicating program. It replicates itself to new computers using the flaws and then begins
scanning and replicating again. The difference between a virus and worm is that a worm does not create copies
of itself on one system. It propagates through computer networks.
Trojan Horse : It is a program in which malicious or harmful code is contained inside apparently harmless
programming or data in such a way that it can get control and do its chosen form of dam- age.TrojanHorses
cannot replicate automatically.ATrojanhorse canbeused to setup a back door in a computer system so that the
intruder can return later and gainaccess.
Malware (Malicious Software) : Itis a software designed specifically to damage or disrupt a system such as a virus
or Trojan horse.
Spyware: Spyware is a software that performs actions such as advertising, collecting personal data, or changing the
configuration of your computer, usually without obtaining your consent. Spyware that displays advertisements
and tracks your personal information is known as "Adware".
Spam: E-mail spam also known as "Junk e-mail" or "Unsolicited Bulk e-mail (UBE), is a subset of spam that
involves nearly identical messages sent to numerous recipients by e-mail.
Phishing: Phishing is a fraudulent activity of acquiring the sensitive information by the use of a fake identity during
electroniccommunication.
Spoofing: It occurs when the sender of an e-mail message pretends to be someone else, they falsely manipulate
the "From" field in an e-mail. This is usually done to make you release sensitive information
Key loggers : Key logger is a software program designed to record (log) every keystroke on the machine on which
it runs. Key logger is also known as "Key Stroke logger" or "System Monitor".
Packet Sniffer: A packet sniffer is an application that captures TCP/IP data packets, which can maliciously be used
to capture passwords and other data while it is in transit either within the computer or over the network.
Root Kit: Aroot kit is a computer program that enable administrator - level access to a computer or computer
network. A cracker installs a root kit on a computer after first obtaining user-level access, eitherbyexploitinga
knownvulnerabilityorcrackingapassword.Oncetherootkitisinstalled,itallows the hacker to mask intrusion
and gain root or privileged access to the computer.
Cyber crime: It contains all criminal offences which are committed with the aid of communication devices in a
network.
example are:
• Unauthorized access, malicious code, and denial-of-service attacks.
• Theft of service and certain financial frauds.
• Spamming and copyright crimes, particularly those facilitated through peer-to-peer networks.
• Hacking, phishing, identify theft, child pornography, online gambling securities fraud.
Hacking:Hacking is the activity of programmatically gaining access to a computer application thatis otherwise in
accessible.The act of gaining anunauthorised access to a computer is knownas "Hacking".
Hacker: AHacker is someone involved in computer security specializing in the discovery of exploits in systems orin
obtaining or preventing unauthorized access to systems through skills, tactics and detailedknowledge.
Polymorphic Virus: A polymorphic virus modifies its program code each time it attaches itself to another
program orfile.
Commonly Used ComputerTerms
Abort: To stop a program or function before it has finished. Algorithm: A set of instructions that
provides a solution to a given problem.
Animation: A simulation of movement created by displaying a series of pictures, or frames. For example,
cartoons on television.
ANSI: American National Standards Institute, a powerful industry association of USA, promoting
Programming language standards.
Antivirus: Program A utility that searches a hard disk for viruses and removes any, that is found.
Architecture: A design. It can refer to either hardware or software or to a combination of hardware and
software. The architecture of a system defines its broad outlines.
ASCII: American Standard Code for Information Inter change. This is a seven/eight bit code widely used in
computers for the transfer of data.
Bandwidth: The amount of data that can be transmitted in a fixed amount of time. It is usually expressed
in bits per second (bps) or bytes per second.
Bit: The smallest unit of information in computer system. Bit is short for binary digit; either a "1” or a "0".
Boot: The process of getting the computer started.
Byte: A byte is made up of 8 bits. The amount of memory it takes to store a single character.
Cache: A separate area of Primary Memory (RAM) where the computer stores a copy of frequently used
information for quick access. This is meant to speed up the operation of the hard disk.
CD-ROM: Compact Disk-Read Only Memory. This is a permanent storage device used to store large quantities
of information that need not be changed.
CGA: Color Graphics Adapter. Low-resolution screen (640x200 pixels) with colorcapability.
Character: A number, letter, symbol, or punctuation mark.
Chip: A small piece of silicon containing thousands or millions of electrical elements. Also called an
Integrated Circuit(IC).
Compatible: The ability of one device or program to work with another device or program. For example, a
printer and a computer are said to be compatible if they can be connected to each other.
Conventional Memory: The first 640K of electronic Memory (RAM) in a computer used to run OS and
applications.
Debug: In computer related systems, fixing software related problem is known as debugging.
Digitize To scan a piece of artwork in very fine detail and store it in a form that computerunderstands.
DOS: It stands for Disk Operating System. It is a single user operating system.
DVD: Digital Versatile Disc or Digital VideoDisc
Dynamic: Refers to actions that take place at the moment they are needed rather than in advance.
EDP: Electronic Data Processing.
E-Mail: Electronic Mail. A facility to send electronic messages to another person on a computernetwork.
End-User: The end user is the individual who uses the product after it has been fully developed and
marketed.
EPROM: Erasable Programmable Read Only Memory. A type of ROM that can be programmed or
reprogrammed usually by exposing a normally covered sector to UV-Light.
Extended Memory: Memory in addition to conventional memory used to run and manage applications;
together with expanded memory, it helps PCs to address increased amounts of data in memory.
Fax/Facsimile: A way of transmitting copies of documents over telephone lines. Fax is short for Facsimile.
Gigabyte: Abbreviated as GB, is equal to 1024 MB. GUI Graphical User Interface. A user interface that works
visually and is based on the selection of actions using a mouse or a similar pointing device to click on icons or
to pick options from menus; see alsoicon.
Hertz: A unit of frequency that means Cycles per Second.
High Density: The amount of information a disk can hold. High Density disks hold more information than
Double Density disks.
Hypertext: A method of presenting information so the user can view it in a non-sequential way, regardless of
how the topics were originally arranged. It has now evolved as a flexible software technology to create electronic
books provides fast and flexible access to search criteria and provides quick access to information in large
documents.
HTML: Hyper Text Markup Language. A markup or structuring language used to describe Web and Intranet
documents. It is used to define structure, appearance and placement of HTML elements including, fonts,
graphics, text, hypertext links to other sites and many more details.
IBM: International Business Machines, a USA based multinational Company.
Icon: A graphical screen element that executes one or more commands when selected with a mouse or other
pointing device
IDE: Integrated Device Electronics, a standard used for connecting hard drive to a computer. IDE hard drives
are very common and relatively inexpensive.
Intel: The manufacturer of the most popular microprocessors or CPUs.
Intelligent: Printer Printer combining laser, computer and photocopying technology.
Internet: The world's largest computer network that links many of the scientific, research and educational
computers as well as commercial networks. The internet uses TCP/IP protocols, and computers on Internet can
run on any operating system, like,several variations of UNIX, Windows NT, and VMS etc.
Intranet: In the most general sense, a private corporate network that uses Internet technology based software
and TCP/IP protocol standards. Many companies use intranets for tasks as simple as distributing a company
letter and for tasks as complex as posting and updating technical support bulletins to service personnel
worldwide. An intranet does not always include permanent connection toInternet.
Kilobyte (K, KB) Approximately one thousand characters; actually 1024bytes.
LAN An acronym for local area network. A system of PCs that are located relatively near to each other
and connected by wire so that individual users can cooperatively process information and share
resources; see also WAN.
Laptop Computer: A portable computer, small enough to be held on a lap,but slightly larger than a
notebook computer.
LED: Light Emitting Diode. An electronic device that lights up when electricity is passed throughit.
Light Pen: An input device that allows a user to write on or point to a special pad or the screen of a pen-
based computer, such as a PDA.
Macintosh: A PC based on a Motorola microprocessor employing GUI. Apple Macintosh has been in use since
late eighties.
Macro: A symbol, name, or key that represents a list of commands, actions or keystrokes.
Math co-processor: Part of the microprocessor; a companion chip designed to perform complex
calculations.
Megabyte (M, MB): Approximately one million characters; actually 1,048,576 bytes. A measure of
memory or storage.
Megahertz (MHz): A measure of processing speed. The higher the value, the faster a computer canwork.
Microprocessor: A single chip containing all the elements of a computer's CPU.
MIPS: Million Instructions Per Seconds, a unit for measuring the speed of a computer.
Mother Board: The main circuit board of a computer, which carries electrical signals to and from various
parts of the computer.
Multimedia: A computer system that combines text, graphics, animation, music, voice and video media;
may include stereo speakers as an output device.
Multiprocessing: It refers to a computer system’s ability to support more than one process at the same
time. It is also called multitasking.
Nibble: Half a byte i.e. 4bits.
Non-Volatile Memory: This is data storage that does not lose its contents on power off; for example,ROM.
Notebook Computer: A portable computer, approximately 8½ by 11 inches, that fits insidea briefcase.
Numeric keypad: The part of a keyboard that looks like an adding machine, with 10 digits and
mathematical operators; usually located on the right side of the keyboard.
Office-Automation: The use of computer systems to execute a variety of office operations, such as word
processing, accounting and Email.
Parallel Port: An outlet on a computer used to attach a device, such as a printer. A parallel port sends data
(bits) down the wire side by side (parallel to each other).
Pentium: The fifth generation of microprocessors. The Pentium is 2 to 3 times faster than the 80486, the
fourth generation of microprocessors.
Peripheral: Any piece of hardware attached to the outside of a computer. Examples are printers and
modems.
Pixel: Short for "Picture Element". A Pixel is the smallest dot the computer can control on the screen.
Portable computer: A small computer that usually runs on batteries. In the categories of portable
computers are laptop, notebook, sub-notebook and palmtop.
Protocol: In networking and communications, the formal specification that defines the procedures to follow
when transmitting and receiving data.Protocol defines the format, timing, sequence and error checking used
on the network.
Resolution: The size and quantity of dots that make up a printed page, screen or scanned image.
Runtime: Error An error that occurs during the execution of a program.
Scanner: An input device used to copy a printed document into a computer’s memory in digital form, without
requiring manual keying.
SCSI: Small Computer System Interface. A standard for connecting a hard drive to a computer.
Serial Port: An outlet on a computer used to attach a device, such as a modem. A serial port sends data (bits)
down the wire one at a time (in a series)
Service Pack: It is an update to a software version that fixes an existing problem, such as a bug or provides
enhancements to the product that will appear in the next version of theproduct.
TCP/IP: Transmission Control Protocol / Internet Protocol is a set of communication protocols that
encompass media access, packet transport, session communications, file transfer, e-mail, and terminal
emulation. TCP/IP is supported by a large number of H/W and S/W vendors and is available on many
computer systems, from PCs to mainframes.
Troubleshoot: To isolate the source of a problem and fix it. In case of computer systems, troubleshoot is
usually used when the problem is hardwarerelated.
UNIX: A multi user operating system.
Upgrade: A new version of a software or hardware product designed to replace an older version of the same
product.
UPS: Uninterruptible Power Supply. It is a power supply that includes a battery to maintain power in the
event of a power cut for several minutes to some hours.
Utility: A program that performs a very specific task, usually related to managing system resources.
Multiple Choice Questions (MCQs)
 ICT Part 1:
Q1) Where does a computer add and compare its data?
Options:
A) CPU B) Memory C) Hard disk D) Floppy disk
Q2) Computers on an internet are identified by
Options:
A) e-mail address B) street address C) IP address D) None of the above
Q3) Which one of the following is not an Internet Service Provider (ISP)?
Options:
A) MTNL B) BSNL C) ERNET India D) Infotech India Ltd
Q4) Using websites to pour out one’s grievances is called:
Options:
A) cyber venting B) cyber ranting C) web hate D) web plea
Q5) In web search, finding a large number of documents with very little relevant information is termed:
Options:
A) poor recall B) web crawl C) poor precision rate D) poor web response
Q6) The concept of connect intelligence is derived from:
Options:
A) virtual reality B) fuzzy logic C) Bluetooth technology D) value added networks
Q7) Use of an ordinary telephone as an Internet appliance is called:
Options:
A) voice net B) voice telephone C) voice line D) voice portal
Q8) Video transmission over the Internet that looks like delayed live casting is called:
Options:
A) virtual video B) direct broadcast C) video shift D) real-time video
Q9) LAN stands for:
Options:
A) Local And National B) Local Area Network C) Large Area Network D) Live Area Network
Q10) Which of the following statement is correct?
Options:
A) Modem is a software B) Modem helps in stabilizing the voltage C) Modem is the operating system D) Modem
converts the analog signal into digital signal and vice-versa
Q11) Which of the following is the appropriate definition of a computer?
Options:
A) Computer is a machine that can process information. B) Computer is an electronic device that can store, retrieve
and process both qualitative and quantitative data quickly and accurately. C) Computer is an electronic device that
can store, retrieve and quickly process only quantitative data. D) Computer is a machine that can store, retrieve and
process quickly and accurately only qualitative information
Q12) Information and Communication Technology includes:
Options:
A) On line learning B) Learning through the use of EDUSAT C) Web Based Learning D) All the above
Q13) Which of the following is the appropriate format of URL of e-mail?
Options:
A) www_ail. com B) www@mail. com C) WWW@mail. com D) www.mail. com
Q14) On the keyboard of computer each character has an ”ASCII” value which stands for:
Options:
A) American Stock Code for Information Interchange B) American Standard Code for Information Interchange C)
African Standard Code for Information Interchange D) Adaptable Standard Code for Information Change
Q15) Which part of the Central Processing Unit (CPU) performs calculation and makes decision
Options:
A) Arithmetic Logic Unit B) Alternating Logic Unit C) Alternate Local Unit D) American Logic Unit
Q16) “DPI” stands for:
Options:
A) Dots per inch B) Digits per unit C) Dots pixel inch D) Diagrams per inch
Q17) The process of laying out a document with text, graphics, headlines and photographs is involved in
Options:
A) Deck Top Publishing B) Desk Top Printing C) Desk Top Publishing D) Deck Top Printing
Q18) Transfer of data from one application to another line is known as:
Options:
A) Dynamic Disk Exchange B) Dodgy Data Exchange C) Dogmatic Data Exchange D) Dynamic Data Exchange
Q19) CD ROM stands for:
Options:
A) Computer Disk Read Only Memory B) Compact Disk Read Over Memory C) Compact Disk Read Only
Memory D) Computer Disk Read Over Memory
Q20) The ’brain’ of a computer which keeps peripherals under its control is called:
Options:
A) Common Power Unit B) Common Processing Unit C) Central Power Unit D) Central Processing Unit
Q21) Data can be saved on backing storage medium known as:
Options:
A) Compact Disk Recordable B) Computer Disk Rewritable C) Compact Disk Rewritable D) Computer Data
Rewritable
Q22) RAM means:
Options:
A) Random Access Memory B) Rigid Access Memory C) Rapid Access Memory D) Revolving Access Memory
Q23) www represents:
Options:
A) who what and where B) weird wide web C) word wide web D) world wide web
Q24) WYSIWYG -describes the display of a document on screen as it will actually print:
Options:
A) What you state is what you get B) What you see is what you get C) What you save is what you get D) What you
suggest is what you get
Q25) Which of the following is not a Computer language?
Options:
A) PASCAL B) UNIX C) FORTRAN D) COBOL
Q26) A key-board has at least:
Options:
A) 91 keys B) 101 keys C) 111 keys D) 121 keys
Q27) An E-mail address is composed of:
Options:
A) two parts B) three parts C) four parts D) five parts
Q28) Corel Draw is a popular:
Options:
A) Illustration programme B) Programming language C) Text programme D) None of the above
Q29) The accounting software ’Tally’ was developed by:
Options:
A) HCL B) TCS C) Infosys D) Wipro
Q30) Errors in computer programmes are called:
Options:
A) Follies B) Mistakes C) Bugs D) Spa
Q31) HTML is basically used to design:
Options:
A) Web-page B) Web-site C) Graphics D) Tables and Frames
Q32) Micro Processing' is made for:
Options:
A) Computer B) Digital System C) Calculator D) Electronic Goods
Q33) Information, a combination of graphics, text, sound, video and animation is called: (DECEMBER-008)
Options:
A) Mulitprogramme B) Multifacet C) Multimedia D) Multiprocess
Q34) What do you need to put your web pages on the www?
Options:
A) a connection to internet B) a web browser C) a web server D) all of the above
Q35) Which was the first company to launch mobile phone services in India?
Options:
A) Essar B) BPL C) Hutchison D) Airtel
Q36) Chandrayan I was launched on 22nd October, 2008 in India from:
Options:
A) Bangalore B) Sri Harikota C) Chennai D) Ahmedabad
Q37) What is blog?
Options:
A) Online music B) Intranet C) A personal or corporate website in the form of an online journal D) A personal or
corporate Google search
Q38) Which is not online Indian Matrimonial website?
Options:
A) www.jeevansathi. com B) www.bharatmatrimony. com C) www.shaadi. com D) www. u.k. singlemuslim. com
Q39) Which of the following is not related to information security on the Internet?
Options:
A) Data Encryption B) Water marking C) Data Hiding D) Information Retrieval
Q40) Which is the largest unit of storage among the following?
Options:
A) Terabyte B) Megabyte C) Kilobyte D) Gigabyte
Q41) bit stands for
Options:
A) binary information term B) binary digit C) binary tree D) Bivariate Theory
Q42) Which one of the following is not a linear data structure?
Options:
A) Array B) Binary Tree C) Queue D) Stack
Q43) Which one of the following is not a network device?
Options:
A) Router B) Switch C) Hub D) CPU
Q44) A compiler is used to convert the following to object code which can be executed
Options:
A) High-level language B) Low-level language C) Assembly language D) Natural language
Q45) Which number system is usually followed in a typical 32-bit computer?
Options:
A) 2 B) 8 C) 10 D) 16
Q46) Which one of the following is an example of Operating System?
Options:
A) Microsoft Word B) Microsoft Excel C) Microsoft Access D) Microsoft Windows
Q47) Which one of the following represents the binary equivalent of the decimal number 23?
Options:
A) 1011 B) 10111 C) 10011 D) None of the above
Q48) Which one of the following is different from other members?
Options:
A) Google B) Windows C) Linux D) Mac
Q49) The hexadecimal number system consists of the symbols
Options:
A) 0 -7 B) 0 -9 , A -F C) 0 -7, A -F D) None of these
Q50) The binary equivalent of (-15)10 is (2?s complement system is used)
Options:
A) 11110001 B) 11110000 C) 10001111 D) None of these
Q51) The two parts of a computer are
Options:
A) Zip Drive and CD. B) Monitor and Keyboard C) Hardware and Software D) Bus and Power
Q52) The Central Processor Unit (CPU) is a
Options:
A) Place where your files live. B) Main chip on the computer that makes everything go. C) Space where your
computer does its processing. D) Disk Drive
Q53) What does RAM stand for?
Options:
A) Random access memory B) Read access memory C) Random auxiliary memory D) Random Anti Memory
Q54) Using websites to pour out one’s grievances is called:
Options:
A) cyber venting B) cyber ranting C) web hate D) web plea
Q55) In web search, finding a large number of documents with very little relevant information is termed:
Options:
A) poor recall B) web crawl C) poor precision rate D) poor web response
Q56) The concept of connect intelligence is derived from:
Options:
A) virtual reality B) fuzzy logic C) Bluetooth technology D) value added networks
Q57) Use of an ordinary telephone as an Internet appliance is called:
Options:
A) voice net B) voice telephone C) voice line D) voice portal
Q58) Video transmission over the Internet that looks like delayed live casting is called:
Options:
A) virtual video B) direct broadcast C) video shift D) real-time video
Q59) LAN stands for:
Options:
A) Local And National B) Local Area Network C) Large Area Network D) Live Area Network
Q60) A normal CD-ROM usually can store up to .......... data?
Options:
A) 680 KB B) 680 Bytes C) 680 MB D) 680 GB
Q61) Which of the following required large computer memory?
Options:
A) Imaging B) Graphics C) Voice D) All of above
Q62) Offline device is
Options:
A) A device which is not connected to CPU B) A device which is connected to CPU C) A direct access storage
device D) An I/O device
Q63) Which of the following programming language started from second generation?
Options:
A) LISP B) C C) QBASIC D) FORTRAN
Q64) Which one of the following input device is user-programmable?
Options:
A) Dumb terminal B) Smart terminal C) VDT D) Intelligent terminal
Q65) Which is not consisted in a processor
Options:
A) ALU B) CU C) Memory D) Registers
Q66) IBM 1401 is the first computer to enter in Nepal. It belonged to
Options:
A) First Generation B) Second Generation C) Third Generation D) Fourth Generation
Q67) The Third Generation Computer was made with..........
Options:
A) Vacuum Tube B) Discrete Components C) IC D) Bio Chips
Q68) Which of the following are the two main components of the CPU?
Options:
A) Control Unit and Registers B) Registers and Main Memory C) Control unit and ALU D) ALU and bus
Q69) Disk space is the
Options:
A) Place where the computer does the processing. B) Box that holds the guts of the computer. C) Place where your
files live. D) Main memory of computer
Q70) A Mega =
Options:
A) 1 Million B) 10 Million C) 100 Thousand D) 1000 Thousand
Q71) A byte stores enough information for one
Options:
A) File B) Keystroke (e.g.: ’d’) C) Word (e.g. "boy”) D) Movie
Q72) Which of the following statement is correct?
Options:
A) Modem is a software B) Modem helps in stabilizing the voltage C) Modem is the operating system D) Modem
converts the analog signal into digital signal and vice-versa
Q73) Which of the following is the appropriate definition of a computer?
Options:
A) Computer is a machine that can process information. B) Computer is an electronic device that can store, retrieve
and process both qualitative and quantitative data quickly and accurately. C) Computer is an electronic device that
can store, retrieve and quickly process only quantitative data. D) Computer is a machine that can store, retrieve and
process quickly and accurately only qualitative information
Q74) Information and Communication Technology includes:
Options:
A) On line learning B) Learning through the use of EDUSAT C) Web Based Learning D) All the above
Q75) Which of the following is the appropriate format of URL of e-mail?
Options:
A) www mail. com B) www@mail. com C) WWW@mail. com D) www.mail. com
Q76) On the keyboard of computer each character has an ”ASCII” value which stands for:
Options:
A) American Stock Code for Information Interchange B) American Standard Code for Information Interchange C)
African Standard Code for Information Interchange D) Adaptable Standard Code for Information Change
Q77) Which part of the Central Processing Unit (CPU) performs calculation and makes decision
Options:
A) Arithmetic Logic Unit B) Alternating Logic Unit C) Alternate Local Unit D) American Logic Unit
Q78) If f you had a 1 Mb text file, how many keystrokes would you have?
Options:
A) It depends on how many words you have. B) 1 Million C) 10 Million D) 1000 Million
Q79) What else do we measure in Megabytes (MB)?
Options:
A) RAM B) Disk Space C) Both Disk Space and RAM D) Only RAM
Q80) Megahertz (MHz) measures
Options:
A) Sound B) Speed C) Space D) None
Q81) UNIVAC is
Options:
A) Universal Automatic Computer B) Universal Array Computer C) Unique Automatic Computer D) Unvalued
Automatic Computer
Q82) The basic operations performed by a computer are
Options:
A) Arithmetic operation B) Logical operation C) Storage and relative D) All the above
Q83) c. d-R.O.M. is a
Options:
A) Random Access Memory B) Volatile memory C) Optical memory D) None of the above
Q84) Laser Printer uses
Options:
A) Raster Scan B) Camera Lanes C) Heat Sensitive paper D) None of the above
Q85) Bandwidth is maximum, along the following communication channel.
Options:
A) Twisted pairs B) Optical fibre C) Co-axial cable D) Infrared
Q86) EBCDIC code developed by
Options:
A) ANSI B) IBM C) SILICA D) Plastic
Q87) CPU chip is made of
Options:
A) Carbon B) Copper C) flexible stack D) None of the above
Q88) Winchester disk means
Options:
A) Disk stack B) Removable disk C) Flexible stack D) None of the above
Q89) A CPU’s processing power is measured in
Options:
A) IPS B) CIPS C) MIPS D) KIPS
Q90) One Kilobyte means
Options:
A) 2^2 Bytes B) 2^10 Bytes C) 2^100 Bytes D) None of the above
Q91) A billionth of a second is defined as
Options:
A) Mill Second B) Micro second C) Nano second D) Pico second
Q92) A computer system that combines text, graphics, voice and video is Known as
Options:
A) Multi user system B) Multitasking system C) Multimedia D) None of the above
Q93) The range of frequencies available for data transmission is known as
Options:
A) PCI B) Multitasking system C) Multimedia D) None of the above
Q94) WAN Hardware does not include
Options:
A) Multiplexer B) Router C) Bridge D) None of these
Q95) Dpi” stands for:
Options:
A) Dots per inch B) Digits per unit C) Dots pixel inch D) Diagrams per inch
Q96) The process of laying out a document with text, graphics, headlines and photographs is involved in
Options:
A) Deck Top Publishing B) Desk Top Printing C) Desk Top Publishing D) Deck Top Printing
Q97) Transfer of data from one application to another line is known as:
Options:
A) Dynamic Disk Exchange B) Dodgy Data Exchange C) Dogmatic Data Exchange D) Dynamic Data Exchange
Q98) CD ROM stands for:
Options:
A) Computer Disk Read Only Memory B) Compact Disk Read Over Memory C) Compact Disk Read Only
Memory D) Computer Disk Read Over Memory
Q99) The ’brain’ of a computer which keeps peripherals under its control is called:
Options:
A) Common Power Unit B) Common Processing Unit C) Central Power Unit D) Central Processing Unit
Q100) RAM chip was invented by
Options:
A) Intel B) Motorola C) IBM D) None of these
Q101) What is diameter of CD-ROM
Options:
A) 12 CM B) 12 Inch C) 12 mm D) None of the above
Q102) Internet addresses are assigned by
Options:
A) TETF B) IEEE C) INTERNIC D) None of the above
Q103) AMD’s full name is
Options:
A) Automated Micro Device B) Advanced Micro Device C) Arithmetic Multiple Device D) None of the above
Q104) Cyrix makes
Options:
A) Monitor B) Microprocessor C) Printer D) None of the above
Q105) Hertz Means
Options:
A) One cycle per Minute B) One cycle per second C) One cycle per millisecond D) One cycle per hour
Q106) PCI was developed by
Options:
A) Motorola B) ASCII C) Intel D) None of the above
Q107) The function of NIC is
Options:
A) Link computer with memory B) Link computer with network C) Link computer with printer D) None of the
above
Q108) Laser printer uses
Options:
A) PDL B) HTML C) COBOL D) None of the above
Q109) Printer resolutions are measured in
Options:
A) Bits per inch B) Dots per inch. C) Dots per centimetre D) None of the above
Q110) Photo sensitive chip used in a video camera is know
Options:
A) BCD B) CCD C) FDD D) None of the above
Q111) ........ is internet address.
Options:
A) HTML B) URL C) HTTP D) None of the above
Q112) PTM is a ........
Options:
A) Utility software B) System software C) Application software D) None of the above
Q113) Data can be saved on backing storage medium known as:
Options:
A) Compact Disk Recordable B) Computer Disk Rewritable C) Compact Disk Rewritable D) Computer Data
Rewritable
Q114) RAM means:
Options:
A) Random Access Memory B) Rigid Access Memory C) Rapid Access Memory D) Revolving Access Memory
Q115) www represents:
Options:
A) who what and where B) weird wide web C) word wide web D) world wide web
Q116) WYSIWYG -describes the display of a document on screen as it will actually print:
Options:
A) What you state is what you get B) What you see is what you get C) What you save is what you get D) What you
suggest is what you get
Q117) Which of the following is not a Computer language?
Options:
A) PASCAL B) UNIX C) FORTRAN D) COBOL
Q118) A key-board has at least:
Options:
A) 91 keys B) 101 keys C) 111 keys D) 121 keys
Q119) An E-mail address is composed of:
Options:
A) two parts B) three parts C) four parts D) five parts
Q120) Which is pre cursor of the internet?
Options:
A) Gopher B) ARPANET C) IETF D) None of the above
Q121) Gateway works on ........ level of OSI model.
Options:
A) 2 B) 3 C) 7 D) None of the above
Q122) ........ provides port number.
Options:
A) IETF B) IANA C) MIMC D) None of the above
Q123) Storage capacity of floppy is maximum in ........
Options:
A) DSSD B) DSDD C) SSSD D) All the above
Q124) The ISA is a ........ architecture.
Options:
A) 8 bit Data bus B) 16 bit data bus C) 32 bit data bus D) 64 bit data bus
Q125) The serial mouse has a ........
Options:
A) 9-pin connector B) 16-pin connector C) 25 -pin connector D) 32 pin connector
Q126) Server is also known as ........
Options:
A) Front end B) Back end C) Connecting end D) None of the above
Q127) POP is ........
Options:
A) Mail B) Mail server C) Mail protocol D) None of the above
Q128) Inventor of WWW is ........
Options:
A) Bill Gates B) Sachin Tendulkar C) Tim Berner Lee D) None of the above
Q129) ISA has ........ number of address line.
Options:
A) 18 B) 24 C) 16 D) 20
Q130) The 5.25 inch floppy can ........ MB data.
Options:
A) 2.8 MB B) 1.2 MB Data C) 1.4 M.B D) None of the above
Q131) Which one is not a Database Management system.
Options:
A) Access B) Fox Pro C) Netscape D) Oracle
Q132) The .........was created in 1989 at the European particle. Physics laboratory in Geneva, Switzerland.
Options:
A) Arpanet B) WWW C) Firewalls D) folders
Q133) The operating system uses ........ to help the CPU coordinate processes.
Options:
A) Webs B) Interrupt Requests (IRQ) C) Firewalls D) Folders
Q134) Corel Draw is a popular:
Options:
A) Illustration programme B) Programming language C) Text programme D) None of the above
Q135) The accounting software ’Tally’ was developed by:
Options:
A) HCL B) TCS C) Infosys D) Wipro
Q136) Errors in computer programmes are called:
Options:
A) Follies B) Mistakes C) Bugs D) Spam
Q137) HTML is basically used to design:
Options:
A) Web-page B) Web-site C) Graphics D) Tables and Frame
Q138) Micro Processing' is made for:
Options:
A) Computer B) Digital System C) Calculator D) Electronic Goods
Q139) Information, a combination of graphics, text, sound, video and animation is called:
Options:
A) Mulitprogramme B) Multifacet C) Multimedia D) Multiprocess
Q140) Refresh rate of monitors is measured in
Options:
A) Hertz B) measured in C) Megavolt D) Megahorse
Q141) PCI is a type of ........
Options:
A) Plug; and Play B) Browser C) Bus D) Software
Q142) PPP stands for
Options:
A) Print to print protocol B) Point to point Protocol C) Print to Print protocol D) none of the above
Q143) Cache memory is
Options:
A) High Speed Register B) Low-Speed RAM C) Non-Volatile RAM D) High-Speed RAM
Q144) A GUI is a
Options:
A) Hardware B) Language interpreter C) Software interface D) An operating system
Q145) Which of the following is not a procedural language.
Options:
A) PASCAL B) Basic C) Visual Basic D) None of the above
Q146) A ........works like an upside-down mouse.
Options:
A) Joystick B) Track pad C) Track point D) Trackball
Q147) On a CD-ROM data is stored in the form of ........& ........
Options:
A) Lands and pits B) Dots and Dash C) High and Low D) None of these
Q148) TCP/IP is
Options:
A) Software B) Hardware C) Network D) None of the above
Q149) Computer virus is a ........
Options:
A) Hardware B) Software C) Both A &B D) None of the above
Q150) Three types of memory chips are RAM, ROM and
Options:
A) EISA B) RISC C) CD-ROME D) CMOS
Q151) Which one is not a multitasking operating system
Options:
A) MS-DOS B) Windows C) LINOX D) UNIX
Q152) What do you need to put your web pages on the www?
Options:
A) a connection to internet B) a web browser C) a web server D) all of the above
Q153) Which was the first company to launch mobile phone services India?
Options:
A) Essar B) BPL C) Hutchison D) Airtel
Q154) Chandrayan I was launched on 22nd October, 2008 in India from:
Options:
A) Bangalore B) Sri Harikota C) Chennai D) Ahmedabad
Q155) What is blog?
Options:
A) Online music B) Intranet C) A personal or corporate website in the form of an online journal D) A personal or
corporate Google search
Q156) Which is not online Indian Matrimonial website?
Options:
A) www.jeevansathi.com B) www.bharatmatrimony.com C) www.shaadi.com D) www.u.k.singlemuslim.com
Q157) ........provides field for entering or comment of any length.
Options:
A) Counter field B) Logical field C) Memo field D) Date field
Q158) The scroll lock key is a ........key.
Options:
A) Function B) Numeric C) Toggle D) Cursor control
Q159) A PCM CIA hard drive uses........
Options:
A) Type I slot B) Type II slot C) Type III slot D) Type IV slot
Q160) Tape is accessed
Options:
A) Randomly B) Sequentially C) Direct D) None of the above
Q161) A devise that receives analog signal and converts them into digital data is known as
Options:
A) Modulator B) Demodulator C) Multiplexer D) None of the above
Q162) Master Boot Record is also known as
Options:
A) Partition Sector B) Master Partition table C) Both A and B D) None of the above
Q163) Electronic instructions that tells the hardware what to do are known as
Options:
A) Modem B) Electronic pen C) Program D) Micro computer
Q164) Which of the following memories need refresh?
Options:
A) SRAM B) DRAM C) ROM D) All of the above
Q165) Which of the following is not related to information security on the internet?
Options:
A) Data Encryption B) Water marking C) Data Hiding D) Information Retrieval
Q166) Which is the largest unit of storage among the following?
Options:
A) Terabyte B) Megabyte C) Kilobyte D) Gigabyte
Q167) bit stands for
Options:
A) binary information term B) binary digit C) binary tree D) Bivariate Theory
Q168) Which one of the following is not a linear data structure?
Options:
A) Array B) Binary Tree C) Queue D) Stack
Q169) Which one of the following is not a network device?
Options:
A) Router B) Switch C) Hub D) CPU
Q170) A compiler is used to convert the following to object code which can be executed
Options:
A) High-level language B) Low-level language C) Assembly language D) Natural language
Q171) The number of records contained within a block of data on magnetic tape is defined by the
Options:
A) Block definition B) Record contain clause C) Blocking factor D) Record per block
Q172) Mark I is also known as
Options:
A) American Sequence Controlled Calculator B) Automatic Sequence Calculating Controller C) American
Sequence Controlled Computer D) Automatic Sequence Controlled Calculator
Q173) Which of the following registers is loaded with the contents of the memory location pointed by the PC?
Options:
A) Memory address registers B) Memory data registers C) Instruction register D) Program counter
Q174) Which of the following are the cheapest memory devices in terms of Cost/Bit?
Options:
A) Semiconductor memories B) Magnetic Disks C) Compact Disks D) Magnetic Tapes
Q175) MIS is designed to provide information needed for effective decision making by?
Options:
A) Consumers B) Workers C) Foremen D) Managers
Q176) Which is valid statement
Options:
A) 1 kB = 1024 Bytes B) 1 MB = 1024 Bytes C) 1 kB = 1000 Bytes D) 1 MB = 1000 Bytes
Q177) Latency time is
Options:
A) Time to spin the needed data under head B) Time to spin the needed data under track C) Time to spin data under
sector D) All of above
Q178) Which number system is usually followed in a typical 32-bit computer?
Options:
A) 2 B) 8 C) 10 D) 16
Q179) Which one of the following is an example of Operating System?
Options:
A) Microsoft Word B) Microsoft Excel C) Microsoft Access D) Microsoft Windows
Q180) Which one of the following represents the binary equivalent of the decimal number 23?
Options:
A) 1011 B) 10111 C) 10011 D) None of the above
Q181) Which one of the following is different from other members?
Options:
A) Google B) Windows C) Linux D) Mac
Q182) Who built the first Mechanical Calculator
Options:
A) Joseph Marie Jacquard B) John Mauchly C) Blaise Pascal D) Howard Aike
Q183) The most important advantage of a video disk is
Options:
A) Compactness B) Potential capacity C) Durability D) Cost effectiveness
Q184) Which of the following generation computers had expensive operation cost?
Options:
A) First B) Second C) Third D) Fourth
Q185) An IBM system/38 represents the computer class of
Options:
A) Small-scale computer B) Medium-scale computer C) Large-scale computer D) Super computer
Q186) Another word for a daisy wheel printer
Options:
A) Petal printer B) Golf ball printer C) Laser printer D) Line printer
Q187) Cursor is a
Options:
A) Pixel B) Thin blinking line C) Pointing device D) None of these
Q188) Which device is used to backup the data?
Options:
A) Floppy Disk B) Tape C) Network Drive D) All of the above
Q189) Which of the following printers are you sure will not to use if your objective is to print on multi carbon
forms?
Options:
A) Daisy wheel B) Dot matrix C) Laser D) Thimble
Q190) Which of the following items are examples of storage devices?
Options:
A) Floppy / hard disks B) CD-ROMs C) Tape devices D) All of the above
Q191) ASCII and EBCDIC are the popular character coding systems. What does ASCII stand for?
Options:
A) American Stable Code for International Interchange B) American Standard Case for Institutional Interchange C)
American Standard Code for Information Interchange D) American Standard Code for Interchange Information
Q192) Which computers are used as servers for any medium sized organizations?
Options:
A) Mainframe Computer B) Mini Computers C) Micro Computers D) Super Computers
Q193) Slide Rules was invented in
Options:
A) 1614 B) 1617 C) 1620 D) None of above
Q194) A typical personal computer used for business purposes would have..........of RAM.
Options:
A) 4 KB B) 16 K C) 64 K D) 256 K
Q195) The ALU of a computer normally contains a number of high speed storage element called
Options:
A) Semiconductor memory B) Registers C) Hard disks D) Magnetic disk
Q196) Which was the computer conceived by Babbage?
Options:
A) Analytical Engine B) Arithmetic Machine C) Donald Kunth D) All of above
Q197) The processing speed of first generation computers was
Options:
A) milliseconds B) microseconds C) nanoseconds D) picoseconds
Q198) Model 5100 was ........ in 1957.
Options:
A) The first PC built by IBM B) The first PC built by Apple C) The first PC built by Motorola D) The first PC built
by Intel
Q199) VGA is
Options:
A) Video Graphics Array B) Visual Graphics Array C) Volatile Graphics Array D) Video Graphics Adapter
Q200) A kind of scanner MICR is the short form of
Options:
A) Magnetic Ink Character Reader B) Magnetic Ink Code Reader C) Magnetic Ink Cases Reader D) None of the
above
Q201) Which of the following is not a class based on size?
Options:
A) Mainframe Computer B) Micro Computer C) Mini Computer D) Digital Computer
Q202) Which 8-bit chip was used in many of today’s TRS-80 computers?
Options:
A) Z-8000 B) Motorola 6809 C) Z-8808 D) Z-80
Q203) Which of the following disk is fixed disk?
Options:
A) Hard Disks B) Flash Disks C) Blu-Ray Disks D) DVDs
Q204) Which of the following professions has not been affected by personal computers?
Options:
A) Medical B) Clerical and law C) Accounting D) None of the above
Q205) The word Abacus is derived from Abax, a word from
Options:
A) Latin language B) Greek Language C) Sanskrit language D) Ancient Egypt
Q206) In latest generation computers, the instructions are executed
Options:
A) Parallel only B) Sequentially only C) Both sequentially and parallel D) All of above
Q207) Which of the following memory medium is not used as main memory system?
Options:
A) Magnetic core B) Semiconductor C) Magnetic tape D) Both A and B
Q208) An online backing storage system capable of storing larger quantities of data is
Options:
A) CPU B) Memory C) Mass storage D) Secondary storage
Q209) A kind of serial dot-matrix printer that forms characters with magnetically charged ink sprayed dots is called
Options:
A) Laser printer B) Ink-jet printer C) Drum printer D) Chan printer
Q210) Which of the following does not affect the resolution of a video display image?
Options:
A) Bandwidth B) Raster scan rage C) Vertical and horizontal lines of resolution D) Screen size
Q211) Which of the following printing devices an output composed of a series of data?
Options:
A) Wire matrix printer B) Band printer C) Wang image printer D) Both A and C
Q212) Which of the following is an example of fifth generation computer?
Options:
A) PIM/m B) ICL 2950 C) IBM 140 D) None of above
Q213) Magnetic disks are the most popular medium for
Options:
A) Direct access B) Sequential access C) Both A and B D) None of above
Q214) Which of the following is not a third generation computer?
Options:
A) IBM 360 B) IBM 1401 C) PDP-8 D) HP 2115
Q215) What is a compiler?
Options:
A) A compiler does a conversion line by line as the program is run B) A compiler converts the whole of a higher
level program code into machine code in one step C) A compiler is a general purpose language providing very
efficient execution D) None of the above
Q216) .......... computers are also called personal computers
Options:
A) Mainframe Computer B) Mini Computers C) Micro Computers D) Super Computers
Q217) Which of the following is not input unit device?
Options:
A) scanner B) camera C) plotter D) digitizer
Q218) Identify the correct statement
Options:
A) IBM PCs used RISC CPU designs B) Macintosh used CISC CPU design C) IBM used CISC CPU design D)
None of above is true
Q219) Which of the following statement is false?
Options:
A) Mechanical analog computers have existed for thousands of years B) There are mechanical analog computers
and electronic analog computers. C) All electronic computers are digital computers D) All of above are false
Q220) Which of the following require large computers memory?
Options:
A) Imaging B) Graphics C) Voice D) All of Above
Q221) The two major types of computer chips are
Options:
A) External memory chip B) Primary memory chip C) Microprocessor chip D) Both B and C
Q222) Microprocessors as switching devices are for which generation computers
Options:
A) First Generation B) Second Generation C) Third Generation D) Fourth Generation
Q223) What is the main difference between a mainframe and a super computer?
Options:
A) Super computer is much larger than mainframe computers B) Super computers are much smaller than
mainframe computers C) Supercomputers are focused to execute few programs as fast as possible while mainframe
uses its power to execute as many programs concurrently D) Supercomputers are focused to execute as many
programs as possible while mainframe uses its power to execute few programs as fast as possible.
Q224) ASCII and EBCDIC are the popular character coding systems. What does EBCDIC stand for?
Options:
A) Extended Binary Coded Decimal Interchange Code B) Extended Bit Code Decimal Interchange Code C)
Extended Bit Case Decimal Interchange Code D) Extended Binary Case Decimal Interchange Code
Q225) The brain of any computer system is
Options:
A) ALU B) Memory C) CPU D) Control unit
Q226) Storage capacity of magnetic disk depends on
Options:
A) tracks per inch of surface B) bits per inch of tracks C) disk pack in disk surface D) All of above
Q227) The two kinds of main memory are
Options:
A) Primary and secondary B) Random and sequential C) ROM and RAM D) All of above
Q228) Which of the following devices can be sued to directly image printed text?
Options:
A) OCR B) OMR C) MICR D) All of above
Q229) The output quality of a printer is measured by
Options:
A) Dot per inch B) Dot per sq. inch C) Dots printed per unit time D) All of above
Q230) In analog computer
Options:
A) Input is first converted to digital form B) Input is never converted to digital form C) Output is displayed in
digital form D) All of above
Q231) Which of the following memories needs refresh?
Options:
A) SRAM B) DRAM C) ROM D) All of above
Q232) Through which device the main components of the computer communicate with each other?
Options:
A) Keyboard B) System Bus C) Monitor D) Memory
Q233) What type of device is computer keyboard?
Options:
A) Memory B) Output C) Storage D) Input
Q234) Which is the limitation of high level language?
Options:
A) Lower efficiency B) Machine dependence C) machine level coding D) None of above
Q235) An example of a digital device can be
Options:
A) Digital clock B) Automobile speed meter C) Clock with a dial and two hands D) All of the above
Q236) Where does a computer add and compare its data?
Options:
A) CPU B) Memory C) Hard disk D) Floppy disk
Q237) Computers on an internet are identified by
Options:
A) e-mail address B) street address C) IP address D) None of the above
Q238) Which one of the following is not an Internet Service Provider (ISP)?
Options:
A) MTNL B) BSNL C) ERNET India D) Infotech India Ltd.
Q239) The hexadecimal number system consists of the symbols
Options:
A) 0 -7 B) 0 -9 , A -F C) 0 -7, A -F D) None of these
Q240) The binary equivalent of (-15)10 is (2?s complement system is used)
Options:
A) 11110001 B) 11110000 C) 10001111 D) None of these
Q241) Which of the following is not true?
Options:
A) Transistors are much smaller B) Transistors produce low heat C) Transistors were less reliable D) Transistors
were used in radios and other electronic devices
Q242) A characteristic of card systems is
Options:
A) Slowness in processing data B) Using cards as records of transactions C) Needing a larger DP staff D) All of the
above
Q243) The full form of EEPROM is
Options:
A) Electrically Erasable Programmable Read Only Memory B) Easily Erasable Programmable Read Only Memory
C) Electronic Erasable Programmable Read Only Memory D) None of the above
Q244) The original ASCII code used .......... bits of each byte, reserving that last bit for error checking
Options:
A) 5 B) 6 C) 7 D) 8
Q245) A computer programmer
Options:
A) Does all the thinking for a computer B) Can enter input data quickly C) Can operate all types of computer
equipments D) Can draw only flowchart
Q246) Fifth generation computer is also known as
Options:
A) Knowledge information processing system B) Very large scale integration (VLSI) C) Both of above D) None of
above
Q247) The commonly used standard data code to represent alphabetical, Numerical and punctuation characters
used in electronic data processing system is called
Options:
A) ASCII B) EBCDIC C) BCD D) All of above
Q248) Which of the following have low failure rate?
Options:
A) mechanical devices B) electronic devices C) electro-mechanical devices D) None of above
Q249) Who designed the first electronics computer-ENIAC?
Options:
A) Van-Neuma B) Joseph M. Jacquard C) J. Presper Eckert and John W Mauchly D) All of above
Q250) Who invented the high level language C?
Options:
A) Dennis M. Ritchie B) Niklaus Wirth C) Donald Kunth D) Cormen and Rivest
Q251) Which of the following is the appropriate definition of Information Technology?
Options:
A) Information Technology refers to the use of hardware and software for processing information. B) Information
Technology refers to the use of hardware and software for distribution of useful in-formation C) Information
Technology refers to the use of hardware and software for storage, retrieval, processing and distributing
information of Book Examination system? any kinds. D) Information Technology refers to the use of principles of
Physical sciences and Social sciences for processing of information of many kinds
Q252) ICT stands for:
Options:
A) International Communication Technology B) Computer is capable of analyzing both quantitative and qualitative
data C) Information and Communication Technology D) Inter connected Terminals
Q253) Which of the following statement is NOT correct?
Options:
A) Computer is capable of processing only digital signal. B) Computer is capable of analyzing both quantitative
and qualitative data. C) Appropriate software is required for processing the data D) Computer is capable of
processing digital as well as analog signals
Q254) Boot is......
Options:
A) start-up of a computer B) loading software in a computer C) managing memory of computer D) all of above
Q255) Generalized conclusion on the basis of a sample is technically know as:
Options:
A) statistical inference of external validity of the research B) data analysis and interpretation C) parameter inference
D) All of the above
Q256) DTH (Direct to Home)
Options:
A) TV communication B) Cinema C) Radio D) None of these
Q257) Digital Subscriber Line Access Multiplexer (DSLAM) is used for
Options:
A) high speed data transfer B) developing efficient digital network over existing one C) accessing remote computer
D) synchronizing protocols of different network
Q258) Corel Draw is a popular
Options:
A) Illustration programme B) Programming language C) Text programme D) None of the above
Q259) The first question that a re-searcher interested in the applicable for statistical techniques to his problem has
to as
Options:
A) whether the data could be quantified B) whether appropriate statistical techniques are available C) whether
analysis of data would be possible D) whether worthwhile inferences could be draw
Q260) Radio waves of constant amplitude can be generated with
Options:
A) filter B) rectified C) FET D) oscillator
Q261) File
Options:
A) is a collection of related records B) is a automated processing system C) TDM D) None of these
Q262) ASCII represents ...... Number of characters C if it is using 7 bits
Options:
A) 127 B) 256 C) 128 D) None of these
Q263) An input operation performs two functions, they are
Options:
A) It causes an input device to physically read data, and transmits the data from the input de-vice to an input area of
CPU. B) It causes an input device to transmits the data convert into image form. C) It causes an input device to
physically read data, transmit the data to printer. D) None of these
Q264) Very small time intervals less than Nano seconds are accurately measured by the
Options:
A) Quartz clocks B) Pulsars C) Atomic clocks D) White dwarfs
Q265) Which broadcasting system for TV is followed in India?
Options:
A) NTSE B) PAL C) SECAM D) NTCS
Q266) Which of the following is recording source of data?
Options:
A) Books B) Journals, Magazines and Newspapers C) Internet clippings D) All of these
Q267) ...... are self replicating malicious code independent of the action of the user but slow down the processes on
entering a network.
Options:
A) Viruses B) Worm C) Trojan Horse D) None of these
Q268) RAM means:
Options:
A) Random Access Memory B) Rigid Access Memory C) Rapid Access Memory D) Revolving Access Memory
Q269) Which of the following is a job of DNS?
Options:
A) Name display B) File transfer C) IP address display D) None of these
Q270) MICR devices can read
Options:
A) letter B) numbers C) Both (a) and (b) D) None of these
Q271) DTH service was started in the year:
Options:
A) 2000 B) 2002 C) 2004 D) 2006
Q272) Jon Von Neumann developed
Options:
A) the first electronic computer. B) first electronic flip flop machine C) stored programme concept D) None of
these
Q273) The VIRUS is a
Options:
A) Software program B) Hardware C) Device D) None of these
Q274) Which of the following statements is true with respect to Electronic Fund Transfer?
Options:
A) To verify the identity of the card holder using signature is more than using the PIN. B) All cards are not checked
with hot card number C) A central authority verifies the signature of the card D) None of these
Q275) Ethernet is an example of
Options:
A) LAN B) WAN C) MAN D) None of these
Q276) what is EDI?
Options:
A) Electronic Data Interface B) Electronic Data Internet C) Electronic Data Interchange D) None of these
Q277) LAN stands for:
Options:
A) Local and National B) Local Area Network C) Large Area Network D) Live Area Network
Q278) SITE stands for
Options:
A) System for International Tele-vision based Education. B) Satellite Instruction Television Experiment. C)
Satellite Instructional Technological Experiment. D) System of Indian Trade in Europe.
Q279) Communication satellites work through
Options:
A) Transponders B) Transmitters C) Radars D) None of these
Q280) The question to be answered by factorial analysis of the quantitative data does not explain one of the
following:
Options:
A) Is ’X’ related to ’Y’? B) How is ’X’ related to ’Y’? C) How does ’X’ affect the dependent variable ’Y’ at
different levels of another independent variable ’K’ or ’M’? D) How is ’X’ by ’K’ related to ’M’?
Q281) Which of the following is meant of information collection?
Options:
A) Schedule B) Report C) Plan D) Scope
Q282) Hybrid computer is a combination of
Options:
A) Calculator and Laptop B) Laptop and Abacus C) Analog Computer and Digital Computer D) Punch Card and
Analog Computer
Q283) Which of the following is not a part of Information?
Options:
A) logical B) formal C) impersonal D) perception
Q284) Close Circuit Television CCT is useful
Options:
A) only for a restricted audience residing at a particular place. B) for large group communication C) only for poor
students of the class D) None of these
Q285) Using antivirus software is a
Options:
A) detective measure B) preventive measure C) corrective measure D) All of the above
Q286) Data in a computer can be represented as
Options:
A) hexadecimal B) decimal C) binary D) All of the above
Q287) which of the following is used to append a digital signature?
Options:
A) Public key B) Private key C) Digital key D) none of these
Q288) Benefits of computer are that
Options:
A) they are accurate B) they are intelligent C) they are machine D) None of these
Q289) Logic of induction is very close to
Options:
A) logic of sampling B) logic of observation C) logic of controlled variables D) None of these
Q290) Which satellite channel uses the ad line, Knowing is everything?
Options:
A) BBC World B) Star C) Sony D) Zee
Q291) Which of the following statements is correct?
Options:
A) An increase in the production of machines increases the organizational efficiency of the economy. B) Better
economic organization produces more machines C) Better economic organization leads to a more efficient use of
machines. D) Machines produce money leading to an increase in productivity of the economy.
Q292) Nano knowledge city is being established at
Options:
A) Jaipur B) Hyderabad C) Bangalore D) Chandigarh
Q293) The system file of an operating system is
Options:
A) ASM B) COM C) DOT D) pdf
Q294) Data is computerized to
Options:
A) meet the business requirement B) to increase the integrity value of the data C) to ensure optimal utilization of
resources D) modularity
Q295) Color cards are used for
Options:
A) Monitors B) CPU C) Video graphics D) All of these
Q296) ATMs of bank have
Options:
A) emoney B) only money transferring capabilities C) real currency D) None of these
Q297) Line access and avoidance of collision are the main functions of:
Options:
A) the CPU B) the monitor C) network protocols D) wide area networks
Q298) Laptop is a
Options:
A) Mini-computer B) Micro-computer C) Desktop PC D) None of these
Q299) ............. Is the most advantageous payment way when orders are mostly received through phone or e-mail.
Options:
A) Real time processing solution B) Weblink C) API D) Virtual terminal solution
Q300) FTP is better than HTTP because
Options:
A) it uses separate channels for data transmission and flow control. B) it transfers data from the web server. C) it
transfers data from the life sever. D) it copies file to the user's hard disk in the destination specified by the user.
Q301) Video transmission over the Internet that looks like delayed live casting is called:
Options:
A) virtual video B) direct broadcast C) video shift D) real-time video
Q302) Which is the source of primary data
Options:
A) Books B) newspapers C) Respondent D) Reports
Q303) Ethernet is an example of
Options:
A) LAN B) WAN C) MAN D) None of these
Q304) What is EDI?
Options:
A) Electronic Data Interface B) Electronic Data Internet C) Electronic Data Interchange D) None of these
Q305) SITE stands for
Options:
A) System for International Television based Education. B) Satellite Instruction Television Experiment. C) Satellite
Instructional Technological Experiment. D) System of Indian Trade in Europe
Q306) The VIRUS is a
Options:
A) Software program B) Hardware C) Device D) None of these
Q307) Which of the following statements is true with respect to Electronic Fund Transfer?
Options:
A) To verify the identity of the card holder using signature is more than using the PIN. B) All cards are not checked
with hot card number C) A central authority verifies the signature of the card D) None of these
Q308) Jon Von Neumann developed
Options:
A) the first electronic computer. B) first electronic flip flop machine C) stored programme concept D) None of
these
Q309) MICR devices can read
Options:
A) letter B) numbers C) Both (a) and (b) D) None of these
Q310) RAM means:
Options:
A) Random Access Memory B) Rigid Access Memory C) Rapid Access Memory D) Revolving Access Memory
Q311) Which of the following is recording source of data?
Options:
A) Books B) Journals, Magazines and Newspapers C) Internet clippings D) All of these
Q312) An input operation performs two functions, they are
Options:
A) It causes an input device to physically read data, and transmits the data from the input device to an input area of
CPU. B) It causes an input device to transmits the data convert into image form. C) It causes an input device to
physically read data, transmit the data to printer. D) none of these
Q313) Very small time intervals less than Nano seconds are accurately measured by the
Options:
A) Quartz clocks B) Pulsars C) Atomic clocks D) White dwarfs
Q314) DTH (Direct to Home)
Options:
A) TV communication B) Cinema C) Radio D) None of these
Q315) Digital Subscriber Line Access Multiplexer (DSLAM) is used for
Options:
A) high speed data transfer B) developing efficient digital network over existing one C) accessing remote computer
D) synchronizing protocols of different network
Q316) Corel Draw is a popular
Options:
A) Illustration programme B) Programming language C) Text programme D) None of the above
Q317) Radio waves of constant amplitude can be generated with
Options:
A) filter B) rectified C) FET D) oscillator
Q318) File
Options:
A) is a collection of related records B) is a automated processing system C) TDM D) None of these
Q319) Boot is --
Options:
A) start up of a computer B) loading software in a computer C) managing memory of computer D) all of above
Q320) Generalized conclusion on the basis of a sample is technically known as:
Options:
A) statistical inference of external validity of the research B) data analysis and interpretation C) parameter inference
D) All of the above
Q321) Which of the following is not an input device /
Options:
A) Joystick B) Scanner C) VDU D) Keyboard
Q322) Which of the following is the appropriate definition of Information Technology?
Options:
A) Information Technology refers to the use of hardware and software for processing information. B) Information
Technology refers to the use of hardware and software for distribution of useful information C) Information
Technology refers to the use of hardware and software for storage, retrieval, processing and distributing
information of many kinds. D) Information Technology refers to the use of principles of Physical sciences and
Social sciences for processing of information of many kinds.
Q323) ICT stands for:
Options:
A) International Communication Technology B) Computer is capable of analyzing both quantitative and qualitative
data. C) Information and Communication Technology D) Inter connected Terminals
Q324) Which of the following Satellites helps to telecast T.V. Network Programmes all over the country?
Options:
A) Apple B) Aryabhatta C) Rohini D) INSAT -IB
Q325) Which of the following statement is NOT correct?
Options:
A) Computer is capable of processing only digital signal. B) Computer is capable of analyzing both quantitative
and qualitative data. C) Appropriate software is required for processing the data D) Computer is capable of
processing digital as well as analog signals
Q326) Memory protection is normally done by
Options:
A) the operating system B) the antivirus C) the processor and the associated hardware D) the user programme
Q327) Data can be saved on backing storage medium known as:
Options:
A) Common Power Unit B) Common Processing Unit C) Compact Disk Rewritable D) Computer Data Rewritable
Q328) www represents:
Options:
A) who what and where B) weird wide web C) word wide web D) world wide web
Q329) Which of the following satellites is known as Resources at -1?
Options:
A) IRSP -5 B) IRSP -6 C) IRSC -1 D) IRSD -1
Q330) The ' brain' of a computer which keeps peripherals under its control is called
Options:
A) Common Power Unit B) Common Processing Unit C) Central Power Unit D) Central Processing Unit
Q331) Errors in computer programmes are called
Options:
A) Follies B) Mistakes C) Bugs D) Spam
Q332) Micro Processing ' is made for
Options:
A) Mulitprogramme B) Multifacet C) Multimedia D) Multiprocess
Q333) A transmission mode that uses different wire for different bits is ............ transmission.
Options:
A) parallel B) serial C) random D) fat
Q334) Back up means:
Options:
A) to create a duplicate set of programme or data files in case the original is damaged. B) provide different kinds of
connection and band width in computers. C) the type of data transmission. D) All of the above
Q335) Programs stored in which of the following memories can't be erased?
Options:
A) RAM B) ROM C) Cache Memory D) Virtual Memory
Q336) The set of computer programs that manage the hardware/software of a computer is called
Options:
A) Compiler system B) Operation system C) Operating system D) None of these
Q337) Which of the following is/are steps of software developments?
Options:
A) Specify the problem B) Analyze the problem C) Test the program D) All of the above
Q338) A peripheral is:
Options:
A) firmware B) sleek ware C) software D) hardware
Q339) Which of the following is/are modem's characteristics?
Options:
A) Transmission speed B) Data compression C) Error detection and correction D) All of these
Q340) Plotter is a
Options:
A) LAN B) Language C) Output device D) All of these
Q341) Which of the following FM radio stations is owned by the Times of India group?
Options:
A) Radio City B) Radio Mirchi C) Radio Rainbow D) Red FM
Q342) An example of asynchronous medium is
Options:
A) Radio B) Television C) Film D) Newspaper
Q343) Which of the following is not a characteristic of VPN (Virtual Private Network ) /
Options:
A) Low Capital Requirement B) High Pay Back Period C) Less expensive than leased line network D) More
flexible than WAN technology
Q344) ISDN stands for:
Options:
A) Indian Standard Digital Network B) Integrated Service Digital Network C) Integrated Service Data Network D)
International Standard Data Network
Q345) Which one of the following is not an Internet Service Provider (ISP)?
Options:
A) MTNL B) BSNL C) ERNET India D) Infotech India Ltd.
Q346) HTTP stands for
Options:
A) hypertext type protocol B) hypertext transfer protocol C) honorary text transfer protocol D) None of these
Q347) An MMS is
Options:
A) an audio media B) a visual media C) audio-visual media D) None of these
Q348) Which of the following is associated with implementation of e-commerce/
Options:
A) MAN B) Wireless WAN C) Value-added network D) None of these
Q349) For security we should consider -----------in internet
Options:
A) local data reduction B) event correction C) low resource utilization D) All of these
Q350) A session can be defined as
Options:
A) a link between two network nodes B) series of transmission between nay disconnection C) a specific connection
place in a system D) None of these
Q351) Which is the oldest soap opera telecasted in India?
Options:
A) Kahani Ghar Ghar Ki B) Buniad C) Humlog D) Saas Bhi Kabhi Bahu Thee
Q352) Which of the following methods implies the collection of information by way of investigators own
examination without interviewing the respondents?
Options:
A) Observation B) Posting questionnaire C) Schedule method D) Random probability sampling
Q353) Attributes of objects, events or things which can be measured are called
Options:
A) qualitative measure B) data C) variables. D) none of these
Q354) Which of the following statement is correct?
Options:
A) Modem is a software. B) Modem helps in stabilizing the voltage C) Modem is the operating system. D) Modem
converts the analog signal into digital signal and vice-versa.
Q355) Which of the following is the appropriate format of Url of e-mail?
Options:
A) www_ mail. com B) www@mail. com C) WWW@mail. com D) www.mail. com
Q356) Which of the following is the appropriate definition of a computer?
Options:
A) Computer is a machine that can process information B) Computer is an electronic device that can store, retrieve
and process both qualitative accurately. C) Computer is an electronic device that can store, retrieve and quickly
process only quantitative data. D) Computer is a machine that can store, retrieve and process quickly and accurately
only information
Q357) SONET uses .......................
Options:
A) twisted-pair cable B) fibre-optic cable C) coaxial cable D) none of these
Q358) What is browser?
Options:
A) A special program to use the Internet B) A special program to run the computer C) A machine D) None of these
Q359) Viruses that can change their appearance and use encryption are known as
Options:
A) boot sector virus B) polymorphic virus C) stealth virus D) None of these
Answers:
Q1) A, Q2) C, Q3) D, Q4) A, Q5) A, Q6) D, Q7) C, Q8) D, Q9) B, Q10) D, Q11) B, Q12) D, Q13) B, Q14) B,
Q15) A, Q16) A, Q17) C, Q18) D, Q19) C, Q20) D, Q21) C, Q22) A, Q23) D, Q24) B, Q25) B, Q26) B, Q27) A,
Q28) A, Q29) B, Q30) C, Q31) A, Q32) B, Q33) C, Q34) D, Q35) B, Q36) B, Q37) C, Q38) D, Q39) D, Q40) A,
Q41) B, Q42) B, Q43) D, Q44) A, Q45) A, Q46) D, Q47) B, Q48) A, Q49) B, Q50) A, Q51) C, Q52) B, Q53) A,
Q54) A, Q55) A, Q56) D, Q57) C, Q58) D, Q59) B, Q60) C, Q61) D, Q62) A, Q63) D, Q64) D, Q65) C, Q66) B,
Q67) C, Q68) C, Q69) C, Q70) A, Q71) B, Q72) D, Q73) B, Q74) D, Q75) B, Q76) B, Q77) A, Q78) B, Q79) C,
Q80) B, Q81) A, Q82) D, Q83) C, Q84) A, Q85) B, Q86) B, Q87) C, Q88) A, Q89) C, Q90) B, Q91) C, Q92) C,
Q93) B, Q94) C, Q95) A, Q96) C, Q97) D, Q98) C, Q99) D, Q100) C, Q101) C, Q102) C, Q103) B, Q104) B,
Q105) B, Q106) C, Q107) B, Q108) A, Q109) B, Q110) A, Q111) B, Q112) C, Q113) C, Q114) A, Q115) D,
Q116) B, Q117) B, Q118) B, Q119) A, Q120) B, Q121) C, Q122) B, Q123) B, Q124) B, Q125) A, Q126) B,
Q127) C, Q128) C, Q129) B, Q130) B, Q131) C, Q132) B, Q133) B, Q134) A, Q135) B, Q136) C, Q137) A,
Q138) B, Q139) C, Q140) A, Q141) C, Q142) B, Q143) D, Q144) C, Q145) C, Q146) D, Q147) A, Q148) C,
Q149) C, Q150) D, Q151) A, Q152) D, Q153) B, Q154) B, Q155) C, Q156) D, Q157) C, Q158) C, Q159) C,
Q160) B, Q161) B, Q162) C, Q163) C, Q164) B, Q165) D, Q166) A, Q167) B, Q168) B, Q169) D, Q170) A,
Q171) C, Q172) D, Q173) C, Q174) C, Q175) D, Q176) A, Q177) A, Q178) A, Q179) D, Q180) B, Q181) A,
Q182) C, Q183) B, Q184) A, Q185) A, Q186) B, Q187) B, Q188) D, Q189) C, Q190) D, Q191) C, Q192) B,
Q193) C, Q194) D, Q195) B, Q196) A, Q197) A, Q198) A, Q199) A, Q200) A, Q201) D, Q202) D, Q203) A,
Q204) D, Q205) A, Q206) C, Q207) C, Q208) C, Q209) B, Q210) D, Q211) D, Q212) A, Q213) C, Q214) B,
Q215) B, Q216) C, Q217) C, Q218) C, Q219) C, Q220) D, Q221) D, Q222) D, Q223) C, Q224) A, Q225) C,
Q226) D, Q227) C, Q228) A, Q229) B, Q230) B, Q231) B, Q232) B, Q233) D, Q234) A, Q235) A, Q236) A,
Q237) C, Q238) D, Q239) B, Q240) A, Q241) C, Q242) D, Q243) A, Q244) C, Q245) A, Q246) A, Q247) D,
Q248) B, Q249) C, Q250) A, Q251) C, Q252) C, Q253) D, Q254) D, Q255) A, Q256) A, Q257) A, Q258) A,
Q259) A, Q260) D, Q261) A, Q262) C, Q263) A, Q264) C, Q265) B, Q266) D, Q267) A, Q268) A, Q269) C,
Q270) B, Q271) D, Q272) C, Q273) D, Q274) D, Q275) A, Q276) A, Q277) B, Q278) B, Q279) A, Q280) D,
Q281) A, Q282) C, Q283) D, Q284) A, Q285) D, Q286) C, Q287) B, Q288) A, Q289) A, Q290) A, Q291) C,
Q292) C, Q293) B, Q294) C, Q295) A, Q296) C, Q297) C, Q298) D, Q299) D, Q300) A, Q301) D, Q302) C,
Q303) A, Q304) A, Q305) B, Q306) D, Q307) D, Q308) C, Q309) B, Q310) A, Q311) D, Q312) A, Q313) C,
Q314) A, Q315) A, Q316) A, Q317) D, Q318) A, Q319) D, Q320) A, Q321) C, Q322) C, Q323) C, Q324) C,
Q325) D, Q326) C, Q327) C, Q328) D, Q329) B, Q330) D, Q331) C, Q332) C, Q333) B, Q334) A, Q335) B,
Q336) C, Q337) D, Q338) D, Q339) D, Q340) C, Q341) B, Q342) D, Q343) C, Q344) B, Q345) D, Q346) B,
Q347) C, Q348) C, Q349) D, Q350) B, Q351) C, Q352) A, Q353) C, Q354) D, Q355) B, Q356) B, Q357) B,
Q358) A, Q359) B,
ICT Part 2:
Q1) The name of the first Electronic computer is
Options:
A) E DVAC B) E NIAC C) E DSAC D) UNIVAC
Q2) Which of the following is the example of input device?
Options:
A) Visual Display unit, Dot-matrix Printer, Laser Printer B) Key board, Mouse, OMR C) RAM, ROM, PROM D)
Arithmetic and Logic unit, Control unit
Q3) Which of the following statement does describe best the computer based information system?
Options:
A) A system is which computer is used to change data into information’s B) Input data C) Processing data D) To
analyse the complex mathematical calculations
Q4) Two main types of Computer Chips are
Options:
A) External Memory Chip B) Primary Memory Chip C) Microprocessor Chip D) Both B and C
Q5) Which of the following is measured in Bits and Bytes?
Options:
A) Computer Memory B) Computer Speed C) Computer Storage Capacity D) None of the above
Q6) The operation for adding two numbers has been carried out in
Options:
A) Programme B) ALU C) Control unit D) Output unit
Q7) The amount of cheque is recorded through magnetic ink through
Options:
A) Encoder B) Embosser C) Inscriber D) Imprinter
Q8) The term computer is generally used for CPU and
Options:
A) External memory B) Internal memory C) Input device D) Output device
Q9) Such a Network which helps in communicating regional, national and global information’s through large
institutions is called
Options:
A) MAN B) LAN C) WAN D) VAN
Q10) MODEM is used for communicating data
Options:
A) In LAN B) In MAN C) In WAN D) None of the above
Q11) Which of the following is NOT an ingredient of 'MS Office'?
Options:
A) MS Word B) MS Excel C) MS Power Point D) MS Super Power
Q12) For joining gateways one uses
Options:
A) Two similar network B) Two different network C) Best channels available for communication D) Best networks
for communication
Q13) C, C++ and JAVA are the example of
Options:
A) Programming language B) Secondary memory device C) Internal parts of a computer D) Brands of professional
computers
Q14) For booting a computer related information’s are stored in
Options:
A) Random Access Memory B) CD-ROM C) Read only Memory D) In all the above
Q15) The Computer Monitor is joined with
Options:
A) A Cable B) A Bus C) A Wire D) A Modem
Q16) The best economic method of Data processing is
Options:
A) Batch processing B) Transaction processing C) Distributed processing D) Real time processing
Q17) Web client is called
Options:
A) Web server B) Web Browser C) Both of the above D) None of the above
Q18) Computer Assisted Instruction (CAI) is generally used to fulfil
Options:
A) Cognitive objective B) Affective objectives C) Psycho-motor objectives D) Only A and B
Q19) When and where the first computer was installed in India?
Options:
A) Indian Statistical Institute, Kolkata in 1955 B) Indian Institute of Statistics, Delhi in 1957 C) Indian Institute of
Science, Bangalore, in 1971 D) Indian Institute of Management, Ahmedabad, in 1975
Q20) Which of the following does not use in Local Area Network (LAN)?
Options:
A) Modem B) Printer C) Calse D) Computer
Q21) Machine language and Assembly language are the examples of
Options:
A) High level language B) Low level language C) Both of the above D) None of the above
Q22) Which type of Hardware input is being used in computer supported information system?
Options:
A) Key board B) Printer C) Monitor D) Hard Disk
Q23) Multimedia is
Options:
A) A technology B) A software C) A media D) A popular computer game
Q24) Optical Character Reader (OCR) can read
Options:
A) The data printed by machine only B) The numbers printed by machine and hand only C) Both of the above
except hand written material D) The machine
Q25) Which part of Menu Bar will you open for the selection of New Slide?
Options:
A) File B) Edit C) Insert D) View
Q26) Which of the following Network had developed first of all in the field of Education?
Options:
A) NICNET B) MAN C) WAN D) None of the above
Q27) A Byte is equal to
Options:
A) 2 Bits B) 8 Bits C) 16 Bits D) 32 Bits
Q28) The advantage of MS WORD is in
Options:
A) Letter writing B) Preparing lecture C) Preparing question paper D) All the above
Q29) Headers and Footers are exhibited
Options:
A) In print layout B) In normal view C) In web layout D) In all the above
Q30) A person can make out presentations for
Options:
A) Sales promotion B) Teaching C) Orientation training of employees D) All the above
Q31) By which one of the following Data Entry cannot be carried out?
Options:
A) KOM B) OCR C) OMR D) Voice identification system
Q32) For preparing new presentation one should use the following command
Options:
A) Auto content wizard B) MS outlook C) Command Prompt D) MS Access
Q33) The Father of the Linear Programming is
Options:
A) B.F. Skinner B) Sydney Pressy C) Norman A.crowder D) Thomas F.Gilbert
Q34) Which of the following devices is just against the Key Board in a computer system?
Options:
A) Printer B) Track ball C) Joystick D) Mouse
Q35) UNIX, DOS and WINDOWS are the examples of
Options:
A) Application programme B) Operating system C) Word processing D) Commercial computer brands
Q36) The first webpage of any organisation is called
Options:
A) Portal B) Home page C) Portal D) Web site
Q37) Which of the following command would you like to follow to change the slide order?
Options:

A) Replace B) Paste C) Duplicate D) Slide sorter
Q38) Generally all the formulae in Excel start with the sign of
Options:
A) Astrix(*) B) And (&) C) Dollar ($) D) Equivalent (=)
Q39) The advantage of the application of MICR is
Options:
A) In evolving cashless social structure B) In making cheque less society C) In evolving credit less society D) None
of the above
Q40) The clock speed of a computer measured through
Options:
A) Megabytes and Gigabytes B) Megahertz and Gigahertz C) Bits and Megabits D) Nano seconds and Pico seconds
Q41) The role of information and communication technology in education is
Options:
A) To give face-to-face counselling B) To give counselling through telephone C) To use audio-visual cassettes in
counselling D) All the above
Q42) In MS WORD last action can be reversed by
Options:
A) Repeat' B) UNDO' C) REDO' D) All the above
Q43) The presentation package and slides are prepared by
Options:
A) Power point B) Excel C) MS Word D) All the above
Q44) Which of the following measuring unit is applied in reference to computer system?
Options:
A) Byte B) Kilobyte C) Megabyte D) All the above
Q45) Font size can be changed through
Options:
A) Insert menu B) Tools menu C) Format menu D) Edit menu
Q46) CAI is a model of
Options:
A) Hardware approach B) Software approach C) System analysis D) All the above
Q47) The computer is used through multimedia devices for
Options:
A) Automation B) Entertainment C) Military use D) Medicinal use
Q48) In a computer which type of the devices are extending the facility to join components and capabilities in it?
Options:
A) System boards B) Storage devices C) Input devices D) Expansion slots
Q49) Data and information in it
Options:
A) Similar concepts B) Data retains information in it C) The information takes birth from data D) Cannot say
Q50) The great disadvantage of the Laser Printing is
Options:
A) It is comparatively silent(Noiseless) B) It is working with very slow speed C) Its output is of low quality D)
None of the above
Q51) The computer display which is generally used for typing, editing and formatting is
Options:
A) Normal view B) Web layout C) Print layout D) All the above
Q52) The need of information and communication technology in education is
Options:
A) To satisfy the growing demand of education and to form knowledge-based society B) To make educational
material more interesting and comprehending C) To give support to various mediums of instruction D) All the
above
Q53) MS Word is an example of
Options:
A) Application software B) System software C) Operating system D) Translating programme
Q54) The Control Unit in a digital Computer is called
Options:
A) Clock B) IC's C) Nerve centre D) All the above
Q55) When in a small area, we joined a number of computers in a group and do not use telephone line in it, then it
is called?
Options:
A) Local Area Network B) Remote Communication Network C) Wide Area Network D) Value Aided Network
Q56) A Kilobyte and a Megabyte is equal to
Options:
A) 1024 Bytes and 1000 kilobytes B) 1000 Bytes and 100 kilobytes C) 1024 Bytes and 100 kilobytes D) 1000
Bytes and 10, 000 kilobytes
Q57) A Floppy Disk consists of
Options:
A) 2,500 Bytes B) 1,440,000 Bytes C) 25,000 Bytes D) 2,500,000 Bytes
Q58) The group of instructions which directs computer, is called
Options:
A) Storage B) Logic C) Memory D) Programme
Q59) The limitation of a traditional computer is
Options:
A) The handling of the text B) The handling of numbers C) Effective communication D) None of the above
Q60) POP3 and IMAP -the e-mail accounts by which a person
Options:
A) Is associated with a server for sending and receiving B) May get his e-mail easy C) Is associated with a server
for reading and noting of his e-mails D) Do not require a telephone line
Q61) The abbreviation DNS stands for
Options:
A) Domain Name System B) Dependent Name Server C) Defence Nuclear System D) Downloadable New
Software
Q62) The father of modern computer is called
Options:
A) Charles Babbage B) Blaize Pascal C) Howard Icons D) William Wordsworth
Q63) A teacher can develop a Question Bank with the help of
Options:
A) MS Word B) Excel C) Power Point D) All the above
Q64) Generally Modem is connected with Telephone line and
Options:
A) In middle of Network B) Communication Adopter C) Serial port D) Computer
Q65) Registers-the elements of fast pace are located in
Options:
A) Memory B) CPU C) I/O Devices D) ROM
Q66) The function of Information and Communication Technology is
Options:
A) Collection and storage of the information’s B) Communication of information’s C) Processing of information’s
D) All the above
Q67) The objective of information and communication technology is
Options:
A) To propagate more and more the material related to education and research B) To usher the present generation in
Cyber Age C) To disseminate and propagate the informal education D) All the above
Q68) The mechanical digital calculator was invented by
Options:
A) Human Hollirith B) Blaize Pascal C) Charles Babbage D) Howard Icons
Q69) Which of the following topology is considered best among the following?
Options:
A) Ring Topology B) Star Topology C) Bus Topology D) None of the above
Q70) In multimedia the following range of CD-ROM is employed
Options:
A) 150-500 Megabyte (MB) B) 200-600 Megabyte C) 250-700 Megabyte D) 300-800 Megabyte
Q71) Magnetic Tape can work
Options:
A) As an input media B) As an output media C) As an secondary storage media D) All the above
Q72) HTML is a brief name given to
Options:
A) HOTMAIL-for the convenience of e-mail B) A computer language which assist in preparation of web page C)
For the modulation level of MODEM D) For the high-tension requirement of the computer
Q73) The present age is called the age of information revolution therefore the information’s are treated as
Options:
A) Commodity B) Article of economic development C) Article of National progress and development D) All the
above
Q74) The advantage of internet to a teacher is
Options:
A) He can modernise his knowledge and enrich it B) He can counsel the students C) He can prepare teaching aid
material D) All the above
Q75) The instrument which helps in receiving the web page matter through internet is called
Options:
A) Client B) Browser C) Server D) None of the above
Q76) When in a work sheet there are 256 columns, the number of rows in it should be
Options:
A) 65555 B) 56565 C) 65536 D) 65356
Q77) RAM in reference to computer stands for
Options:
A) Random Awareness Memory B) Read All Memory C) Read Any Memory D) Random Access Memory
Q78) We can draw a pie graph in
Options:
A) Excel B) Power Point C) Both of the above D) None of the above
Q79) The computer monitor is appeared like a TV set but cannot perform the function of
Options:
A) Receiving of TV signals B) An immediate picture C) Display graphics D) Clear picture
Q80) http://www.cbsenetonline.in -It is the example of
Options:
A) URL B) HTML C) AML D) LAN
Q81) Generally Super Computers are used
Options:
A) For intensive processing of input and output B) For data Retrieval operations C) In Mathematical intensive
scientific Application D) In all the above
Q82) The meaning of the term Programme is
Options:
A) List of information’s B) Internal design of computer C) Information’s collected in Memory D) Information’s
processed by computer
Q83) Who is called the grandfather of computer among the following?
Options:
A) Blaize Pascal B) Charles Babbage C) Herman Holirath D) Joseph jaequard
Q84) We can prepare Report card through
Options:
A) MS WORD B) Power Point C) Excel D) All the above
Q85) The advantage of using the computer is
Options:
A) The computer calculates with fast pace and more and more data can be stored in it B) If your input may be
wrong but output is correct C) Computer is an unfatigable machine D) All the above
Q86) In the following the fastest computer constituent is
Options:
A) CPU B) Magnetic Tape C) Video Terminal D) Sensors and Mechanical controllers
Q87) A computer performs it’s all mathematical and logical calculations through
Options:
A) CPU B) Memory unit C) Output unit D) Visual Display unit
Q88) The computer cannot perform any job without
Options:
A) Chip B) Programme C) Memory D) Output device
Q89) The meaning of MODEM is
Options:
A) Modulator-Demodulator B) Essential Equipment for Internet C) An Electronic device D) None of the above
Q90) The first step of preparing multimedia kit is
Options:
A) To determine the content and its objectives B) To select the appropriate communication techniques C) To follow
the instructions to apply the above techniques D) All the above
Answers:
Q1) B, Q2) B, Q3) A, Q4) D, Q5) C, Q6) B, Q7) A, Q8) B, Q9) C, Q10) C, Q11) D, Q12) B, Q13) A, Q14) C,
Q15) A, Q16) A, Q17) B, Q18) D, Q19) A, Q20) A, Q21) B, Q22) A, Q23) A, Q24) D, Q25) C, Q26) C, Q27) B,
Q28) D, Q29) A, Q30) D, Q31) A, Q32) A, Q33) A, Q34) A, Q35) B, Q36) B, Q37) D, Q38) D, Q39) A, Q40) B,
Q41) D, Q42) B, Q43) A, Q44) D, Q45) A, Q46) A, Q47) B, Q48) D, Q49) C, Q50) D, Q51) A, Q52) D, Q53) A,
Q54) D, Q55) A, Q56) A, Q57) B, Q58) C, Q59) C, Q60) A, Q61) A, Q62) A, Q63) A, Q64) B, Q65) B, Q66) D,
Q67) D, Q68) B, Q69) C, Q70) B, Q71) D, Q72) B, Q73) D, Q74) D, Q75) C, Q76) C, Q77) D, Q78) A, Q79) A,
Q80) A, Q81) D, Q82) A, Q83) B, Q84) B, Q85) D, Q86) A, Q87) A, Q88) B, Q89) A, Q90) D

Multiple Choice Questions (MCQs)
1. The Central Processing Unit (CPU) consists of .
(1) Registers and Arithmetic LogicUnit
(2) Instruction Decoding Circuit
(3) a control and timing section
(4) All of the above
(5) None of these Ans (4)
2. What are the two essential parts of thecomputer?
(1) Keyboard & Mouse (2) Hardware &
Software
(3) Printer & Screen (4) Monitor &
Keyboard
(5) None of these Ans (2)
3. The computer size was very large in .
(1) First Generation (2) Second Generation
(3) Third Generation (4) Fourth Generation
(5) None of these Ans (1)
4. The earliest calculating device is:
(1) Abacus (2) Clock
(3) Difference Engine (4) Calculator
(5) None of these Ans (1)
5. The man who built the first Mechanical Calculator
was:
(1) Joseph Marie Jacquard (2) John Mauchly
(3) Blaise Pascal (4) Harward Ailken
(5) None of these Ans (3)
6. Punch cards were first introduced by .
(1) James Pascal (2) Harward Ailken
(3) Herman Hollerith (4) Marie Jacquard
(5) None of these Ans (3)
7. Integrated circuiut contained:
(1) vacuum tube (2)transistor
(3) condenser (4) resistance
(5) None of these Ans (2)
8. VLSI (Very Large Scale Integration) Integration
Circuit Technology was used in which
generation?
(1) first generation (2) second generation
(3) third generation (4) fourth
generation
(5) None of these Ans (4)
9. IC chips were used in .
(1) first generation (2) second generation
(3) third generation (4) fourth generation
(5) None of these Ans (3)
10. Artificial Intelligence is associated with which
generation?
(1) First Generation (2) Second Generation
(3) Third Generation (4) Fourth Generation
(5) Fifth Generation Ans (5)
11. Each digit in Binary Coded Decimal (BCD) is knownas:
(1) Bit (2) Byte
(3) Nibble (4) Bite
(5) None of these Ans (3)
12. What is a term used for a half byte?
(1) bit (2) nibble
(3) bug (4) word
(5) None of these Ans (2)
13. The oldest form of computer language is called
(1) Machine Language (2) BASIC
(3) FORTRAN (4) COBOL
(5) PASCAL Ans (1)
14. PARAM and ANURAG is super computer developedin:
(1) China (2) USA
(3) India (4) England
(5) Japan Ans (3)
15. Which device is used as the standard pointing device in a
Graphical User Environment?
(1) Keyboard (2) Mouse
(3) Joystick (4) Track Ball
(5) None of these Ans (2)
16. Which printer is very commonly used for desktop
publishing?
(1) Laser Printer (2) Inkjet Printer
(3) Daisywheel Printer (4) Dot matrix printer
(5) None of these Ans (1)
17. Which of the following is the term related with
scanners?
(1) Laser (2) TWAIN
(3) Cartridge (4) Toner
(5) None of these Ans (2)
18. Which is considered a direct entry input device?
(1) Optical scanner (2) Mouse and digitizer
(3) Light pen (4) All of the above
(5) None of these Ans (4)
19. Time during which a job is processed by the
computer is:
(1) Delay times (2) Execution time
(3) Real time (4) Down time
(5) None of these Ans (2)
20. Which of the following memories has the shortes
access times?
(1) Cache memory (2) Magnetic bubble
memory
(3) Magnetic core memory (4)RAM
(5) None of these Ans (1)
21. Cursor is a .
(1) Pixel (2) Thin blinking line
(3) Pointing device (4) Track Ball
(5) None of these Ans (3)
22. Which of the following is not an output device?
(1) Scanner (2) Printer
(3) Flat Screen (4) Mouse
(5) None of these Ans (1)
23. The touch pad is a device.
(1) Dynamic Pointing (2) Stationary Pointing
(3) Temporary Pointing (4) Sensitive Pointing
(5) None of these Ans (2)
24. The OMR used in the competitive examination
stands for:
(1) Optical Magnetic Reader
(2) Optical Mark Reader
(3) Optical Memory Reader
(4) Optical Monitor Reader
(5) None of these Ans (2)
25. Memory unit is one part of:
(1) Input Device (2) Control Unit
(3) Output Device (4) Central Processing
Unit
(5) None of these Ans (4)
26. Which of the following device can store large
amount of data?
(1) Floppy Disk (2) Hard Disk
(3) CDROM (4) Zip Disk
(5) None of these Ans (2)
27. Memory is made up of:
(1) Set of wires (2) Set of circuits
(3) Large number of cells (4) All of the above
(5) None of these Ans (3)
28. EPROM can be used for:
(1) Erasing the contents of ROM
(2) Reconstructing the contents ofROM
(3) Erasing and reconstructing the contents ofROM
(4) Duplicating ROM
(5) None of these Ans (3)
29. DRAM stands for:
(1) Decimal Randam Access Memory
(2) Direct Random Access Memory
(3) Dynamic Random Access Memory
(4) Double Randam Access Memory
(5) None of these Ans (3)
30. EEPROM stands for:
(1) Effective Erasable Programmable Read Only
Memory
(2) Electrically Erasable Programmable Read Only
Memory
(3) Entities Erasable Programmable Read OnlyMemory
(4) Electronically Erasable Programmable RandomOnly
Memory
(5) None of these Ans (2)
31. Which of the following is not the step ofCPU?
(1) decode (2) execute
(3) fetch (4) logic
(5) None of these Ans (4)
32. Which of the following is a read only memory storage
device?
(1) Floppy disk (2) Hard disk
(3) CDROM (4) Both 1 & 2
(5) None of these Ans (3)
33. Computer software includes .
(1) Application software (2) Systemsoftware
(3) Both 1 & 2 (4) Integrated software
(5) None of these Ans (3)
34. A collection of data for one or multiple uses is knownas:
(1) Database (2) Information
(3) Datum (4) System
(5) None of these Ans (1)
35. Which of the following is not a toggle key?
(1) Num Lock Key (2) F12 key
(3) Caps Lock Key (4) Scroll Lock Key
(5) None of these Ans (2)
36. Which of the following is not a modifier key?
(1) Shift (2) Ctrl
(3) Alt (4) Caps lock
(5) None of these Ans (4)
37. What is the file extension of MS –PowerPoint?
(1) .exe (2) .xls
(3) .ppt (4) .pst
(5) None of these Ans (3)
38. In , slides cannot be edited. They can
only be copied, pasted and change positions.
(1) Master slide (2) Slide sorter
(3) Design template (4) Both 1 & 2
(5) None of these Ans (2)
39. The key feature of formatting text in MS- Word is:
(1) Table (2) Style
(3) Font (4) Column
(5) None of these Ans (2)
40. What is the shortcut key to "Delete word to
rightof cursor"?
(1) Ctrl + Del (2) Ctrl + Backspace
(3) Ctrl + End (4) Alt + Del
(5) Shift + Ctrl + DelAns (1)
41. What is the shortcut key to "Insertlink"?
(1) Ctrl + L (2) Ctrl + Shift + K
(3) Ctrl + K (4) Ctrl + Shift + L
(5) Ctrl + H Ans (3)
42. In MS Excel, what is the shortcut key to "Edit
the selected cell"?
(1) F1 (2) F2
(3) F4 (4) F3
(5) F6 Ans (2)
43. In MS Excel, what is the shortcut key to "Select
entire row"?
(1) Ctrl + Space (2) Shift + Space
(3) Ctrl + - (4) Alt + Space
(5) Alt + Shift Ans (2)
44. In MS Excel, what is the shortcut key to
"Create a formula to sum all of the above
cells"?
(1) Alt + = (2) Ctrl + =
(3) Alt + Shift + = (4) Ctrl + Shift + =
(5) Alt + Shift + / Ans (1)
45. In MS word short cut key CTRL +W is used for:
(1) Open the Print Dialog box
(2) Update the current web page
(3) Close the current window
(4) Open the new window
(5) None of these Ans (3)
46. In Ms-Word shortcut Shift+ Delete is used to:
(1) Delete the select item permanently without
replacing the item in the Recycle bin
(2) Copy the selected item
(3) Rename the selected item
(4) Create a shortcut to the selected item
(5) None of these Ans (1)
47. Software, such as Explorer and Firefox, are referred to as
.
(1) Systems software (2) Utility software
(3) Browsers (4) Internet tools
(5) None of these Ans (3)
48. What type of telecommunications hardware allows you to
access the web?
(1) Browser (2) Modem
(3) FTP protocol (4) IRC
(5) All of above Ans (2)
49. is data that has been organized or presented in
a meaningful fashion.
(1) A process (2) Software
(3) Storage (4) Information
(5) None of these Ans (4)
50. The name for the way that computers manipulate data
into information is called:
(1) programming. (2) processing
(3) storing (4) organizing
(5) None of these Ans (2)
51. A is approximately a million bytes.
(1) gigabyte (2) kilobyte
(3) megabyte (4)terabyte
(5) None of these Ans (3)
52. The binary language consists of digit(s).
(1) 8 (2) 2
(3) 1,000 (4) 1
(5) None of these Ans (2)
53. A string of eight 0s and 1s is called a:
(1) megabyte (2) byte
(3) kilobyte (4) gigabyte
(5) None of these Ans (2)
54. What menu is selected to print?
(1) File (2) Tools
(3) Special (4) Edit
(5) None of these Ans (1)
55. A contains buttons and menus thatprovide
quick access to commonly used commands.
(1) menu bar (2) tool bar
(3) window (4) find
(5) None of these Ans (2)
56. Which of the following terms is just the
collection of networks that can be joined
together?
(1) virtual private network (2) LAN
(3) Intranet (4) Extranet
(5) Internet Ans (5)
57. The standard protocol of the Internet is .
(1) TCP/IP (2) Java
(3) HTML (4) Flash
(5) None of these Ans (1)
58. Servers are computer that provide resources
to the other computers connected to a .
(1) Network (2) Mainframe
(3) Super Computer(4) Client
(5) None of these Ans (1)
59. A repair for known software bug, usually available
tono charge on the internet, is called a (n)
.
(1) version (2) patch
(3) tutorial (4) FAQ
(5) None of these Ans (2)
60. To access, a mainframe or super computer, users
often use a .
(1) Terminal (2) Node
(3) Desktop (4) Handheld
(5) None of these Ans (1)
61. Which type of memory gets lost when your switch
off?
(1) ROM (2) RAM
(3) Cache (4) Dynamic
(5) Static Ans (2)
62. Which type of network would use phone lines?
(1) WAN (2) LAN
(3) WWAN (4) Wireless
(5) None of these Ans (1)
63. Which type of memory holds the program to start up
the computer?
(1) ROM (2) RAM
(3) Cache (4) Static
(5) None of these Ans (1)
64. The term used to describe the intangible instructions
that tell the computer what to do is
(1) hardware (2) software
(3) storage (4)input/output
(5) None of these Ans (2)
65. The disks stores information in
(1) Tracks and Sectors (2) Blocks
(3) Rows and Columns (4) Tables
(5) None of these Ans (1)
66. To connect networks of similar protocols, are
used
(1) Routers (2) Gateways
(3) Bridges (4) Dial-up routes
(5) None of these Ans (3)
67. Viruses, Trojan horses and Worms are
(1) harmless applications resident on computer
(2) able to harm computer system
(3) unable to detect if present on computer
(4) user-friendly applications
(5) None of these Ans (2)
68. A set of instructions telling the computer what to dois
called
(1) mentor (2) program
(3) compiler (4)instructor
(5) None of these Ans (2)
69. Which of the following refers to the process of a
computer receiving information from a server on the
Internet?
(1) Downloading (2) outputting
(3) inputting (4) uploading
(5) None of these Ans (1)
70. Which keys enable the input of numbers quickly?
(1) ctrl, shift and alt(2) function keys
(3) arrow keys (4) the numeric keypad
(5) None of these Ans (4)
71. Which of the following is the advantage of
using a spreadsheet?
(1) Calculations can be doneautomatically.
(2) Changing data automatically updates
calculations.
(3) More flexibility (4) All the above
(5) None of these Ans (4)
72. Which of the following shortcut keys is used to
check spelling?
(1) F1 (2) F2 (3) F7
(4) F9 (5) None of these Ans (3)
73. On an excel sheet the active cell is indicated by------
-----
(1) dark wide border (2) a dotted border
(3) a blinking border (4) All the above
(5) None of these Ans (1)
74. To move to the previous worksheet, we press:
(1) Alt + Pg Up (2) Ctrl + PgUP
(3) Ctrl + PgDn (4) Shift + Tab
(5) None of these Ans (4)
75. If you press ……………., the cell accepts your typing
as its contents.
(1) Enter (2) Ctrl + Enter
(3) Tab (4) Insert
(5) None of these Ans (1)
76. Which of the following displays the
buttons for changing text sytle, alignment
and size?
(1) Standard tool bar (2) Status bar
(3) Drawing tool bar (4) Formatting tool bar
(5) None of these Ans(4)
77. All formulas in Excel start with .
(1) 1 % (2) + (3) =
(4) – (5) None of these Ans (3)
78. To add two cells (A1 and A2 ) together you use
which of the following formula?
(1) = A1 + A2 (2) = AdD (A1 + A2)
(3) = together (A1: A2) (4) A1 plus A2
(5) None of these Ans (1)
79. Find the correct set of three types of data
found in a spreadsheet.
(1) Data, words, numbers
(2) Equations, data, numbers
(3) Words, numbers, labels
(4) Numbers, formulas, labels
(5) None of these Ans (4)
80. Which key is used in combination with another key to
perform a specific task?
(1) function (2) arrow
(3) space bar (4) control
(5) None of these Ans (4)
81. What is an embedded system?
(1) A program that comes wrapped in a box
(2) A program that is permanently part of computer
(3) A computer that is part of a larger computer
(4) A computer and software system that controls a
machine or appliance
(5) None of these Ans (4)
82. Text in a column is generally aligned
(1) justified (2) right
(3) center (4) left
(5) None of these Ans (4)
83. A directory within a directory is called
(1) Mini Directory (2) Junior Directory
(3) Part Directory (4) Sub Directory
(5) None of these Ans (4)
84. Why should you delete unknown e-mail attachments?
(1) You could go to jail
(2) the person could track you down and hurt you
(3) it is bad manners
(4) it might contains a virus that could hurt your
computer
(5) None of these Ans (4)
85. The altering of data so that it is not usable unless the
changes are undone is:
(1) Biometrics (2) Compression
(3) Encryption (4) Ergonomics
(5) None of these Ans (3)
86. ......... are used to identify a user who returns to a
Website.
(1) Cookies (2) Plug-in (3) Scripts
(4) ASPs (5) None of these Ans (1)
87. Which term identifies a specific computer on the web
and the main page of the entire site
(1) URL (2) Web site address
(3) Hyperlink (4) Domain name
(5) None of these Ans (1)
88. The code that relational database management systems
use to perform their database task is referred to as…
(1) QBE (2) SQL
(3) OLAP (4) Sequel Server
(5) None of these Ans (2)
89. The contains data descriptions and
defines the name, data type, and length of each
field in the database.
(1) data dictionary (2) data table
(3) data record (4) data field
(5) None of these Ans (1)
90. Personal logs or journal entries posted on the Web
are known as:
(1) listservs (2) Webcasts
(3) blogs (4) subject directories
(5) None of these Ans (3)
91. Arranging of data in a logical sequence is knows as

(1) Classifying (2) Searching
(3) Sorting (4) Reproducing
(5) None of these Ans (3)
92. One of the more recent e-mail scams, which
lures internet users into revealing personal
information is referred to as :
(1) phishing (2) flaming
(3) blogging (4) pop- ups
(5) None of these Ans (1)
93. A process known as is used by large
retailers to study trends.
(1) data mining (2) data selection
(3) POS (4) data conversion
(5) None of these Ans (1)
94. Nibble describes a bits combination of:
(1) 5 bits (2) 6 bits
(3) 7 bits (4) 4 bits
(5) None of these Ans (4)
95. The OSI model is divided into processes
called layers.
(1) five (2) six
(3) seven (4) eight
(5) None of these Ans (3)
96. When data changes in multiple lists and all lists
are not updated, this causes:
(1) data redundancy (2) information
overload
(3) duplicate data (4) data
inconsistency
(5) None of these Ans (4)
97. are words that a programminglanguage has
set aside for its own use.
(1) Control worlds (2) Reserved words
(3) Control structures (4) Reserved keys
(5) None of these Ans (2)
98. describe what is a database field.
(1) Structures (2) Field markers
(3) Field definition (4) Field names
(5) None of these Ans (4)
99. Which of the following places the common data
elements in order from smallest to largest ?
(1) Character, file, record, field, database
(2) Character, record, field, file, database
(3) Character, field, record, file, database
(4) Bit, byte, character, record, field, file,database
(5) None of the above Ans (4)
100. terminals (formerly known as cash registers)
are often connected to complex inventory and sales
computer systems.
(1) Data (2) Point-of-sale (POS)
(3) Sales (4) Query
(5) None of these Ans (4)
Share This

Human-Omics is an initiative to help students to crack competitive exams with notes, mock tests and other educational aids and trade and earn profit

Related Posts