Q1-A structured programming has/have _____.
1-Sequence
2-Selection
3-Iteration
4-All of Above
5-None of these
ANS-(4)- All of Above
Q2- Which of the following is the most oriented to scientific programming?
1. FORTRAN
2. COBOL
3. BASIC
4. PL/1
5. RPG
ANS (1) -FORTRAN is the most oriented to scientific programming.
Q3. Outlook Express is a_____?
1. E-mail client
2. Scheduler
3. Address book
4. Presentation software
5. 1, 2 and 3
ANS (5) -Outlook Express is an e-mail client, scheduler and address book.
Q4. Which of the following is the short cut for opening Task Manager?
1. Ctrl + Shift + Del
2. Alt + Shift + Del
3. Ctrl + Alt + Del
4. Alt + Windows + Del
5. None of these
ANS (3) - Ctrl + Alt + Del is the short cut for opening Task Manager.
Q5.Youtube, which provides a service of streaming videos online is provided by ______.
1. Google
2. Microsoft
3. IBM
4. Apple
5. Sony
ANS (1) –Youtube, which provides a service of streaming videos online, is provided by google.
Q6.A ____________ represent approximately one billion memory locations?
1. Kilobyte
2. Megabyte
3. Gigabyte
4. Terabyte
5. None of these
ANS(3) -A gigabyte represent approximately one billion memory locations.
Q7.The time needed to access data directly on a disk is called __________?
1. Head speed
2. Access time
3. Access speed
4. Run time
5. Fetch time
ANS (2) -The time needed to access data directly on a disk is called access time.
Q8.At which OSI layer does data translation and code formatting occur?
1.Network
2.Physical
3.Data link
4.Transport
5.Presentation
ANS (5)-At presentation layer of OSI model data translation and code formatting occur.
Q9.Which of the following is a function of UPS?
1.It limits damage caused by fluctuating levels of electricity
2. It provides battery backup for limited time
3.It delivers electronic messages via a bus
4.It conducts a power-on self test or POST
5.None of above
ANS(2)-UPS provides battery back-up for limited time.
Q10.______________ is known as unauthorized access to others system.
1.Hacking
2.Encryption
3.Decryption
4.Trafficking
5.None of these
ANS(1) -Hacking is known as unauthorized access to others system.
0 comments:
Post a Comment
MAHENDRA GURU