Q1. In a word processor application, the user might want to cut text from one part of a document and paste it in another part of the document or somewhere else. When the user copies the selected content, it’s stored in the________
(a) Cache Memory
(b) RAM
(c) Virtual Memory
(d) Clipboard
Q2. _____are often used to stop bots and other automated programs from using blogs to affect search engine rankings, signing up for e-mail accounts to send out spam or take part in on-line polls.
(a) Malware
(b) Firewall
(c) CAPTCHA
(d) biometrics
Q3. What is the purpose of the query in the database?
(a) input data
(b) output results
(c) sort data
(d) All of the above
Q4.Which of the following is a high-speed, broadband transmission data communication technology based on packet switching, which is used by telcos, long distance carriers, and campus-wide backbone networks to carry integrated data, voice, and video information?
(a) Synchronous Transfer Mode
(b) Asynchronous Transfer Mode(ATM)
(c) Wireless
(d) GPRS
Q5. What kind of server converts IP addresses to domain names?
(a) DNS
(b) MNS
(c) UTP
(d) RTP
Q6. Hard drive is used to store :
(a) volatile data
(b) non volatile data
(c) permanent data
(d) temporary data
Q7. Which of the following is the combination of numbers, alphabets along with username used to get access to a user account?
(a) password
(b) username
(c) title name
(d) host-id
Q8. Where it is likely to find an embedded operating system?
(a) Networked PC
(b) Mainframe
(c) Networked pc
(d) On a PDA
Q9. Compiler in a computer system is :
(a) program
(b) System software
(c) Application software
(d) Process
Q10. Which of the following can be used to create a new presentation:
(a) Auto content Wizard
(b) an Design templates
(c) Sample presentation
(d) All of the above
