1.Unauthorised attacks
2.Virus attacks
3.Data driven attacks
4.Fire attacks
5.None of these
ANS(1)-Unauthorised Attacks
Q2.The resolution of a printer is measured in-
1.Dots per inch
2.Inches
3.Impact
4.Non-impact
5.Dot's per square inch
ANS(1)-Dots per inch
Q3.A computer having more than one processor is called?
1.Multitasking
2.Processors
3.Multiprogramming
4.Multiprocessing
5.Multisegmentation
ANS(4)-Multiprocessing
Q4.Which of these is not designed to be portable?
1.PDA
2.Laptop computers
3.Notebook computers
4.Mini computer
5.None of these
ANS(4)-Mini computer
Q5.To select multiple non–adjacent cells in a worksheet you will click them holding-
1.CTRL key
2.ALT key
3.Shift key
4.Ctrl + Shift key
5.None of these
ANS(1)-CTRL key
Q6.In Word Processing the red underline indicates-
1.Start paragraph
2.Start word
3.Spelling mistakes
4.All of the above
5.None of these
ANS(3)-Spelling mistakes
Q7.What is phishing?
1.A computer virus
2.A corrupt website
3.A distribution of spam
4.An identity theft scheme
5.An antivirus
ANS(4)-An identity theft scheme
Q8.The density of pixels on a screen is known as-
1.Screen clarity
2.Pixility
3.Pixel depth
4.Resolution
5.Point
ANS(4)-Resolution
Q9.A DVD is an example of a(n)?
1.Hard disk
2.Optical disk
3.Output device
4.Solid-state storage device
5.Input device
ANS(2)-Optical disk
Q10.Linux is a type of____ software.
1.Share ware
2.Commercial
3.Proprietary
4.Open source
5.Hidden type
ANS(4)-Open source