1. The result after applying an encryption key and algorithm to a message is
(1) Cybertext
(2) Decryption
(3) Plain text
(4) Ciphertext
(5) None of these
Solution:4
2. Which of the following is graphics solution for Word Processors?
(1) Clipart
(2) WordArt
(3) Drop Cap
(4) All of the above
(5) None of these
Solution:1
3. The process of copying Software program from secondary storage media to hard
disk is called
(1) Configuration
(2) Download
(3) Storage
(4) Upload
(5) Installation
Solution:4
4. Which network security features prevent users on a network from using program
and information that are unauthorized?
(1) Firewall
(2) Anti Virus
(3) Jammer
(4) Plotter
(5) Defender
Solution:1
5. Accidental click on undo button in Excel 2007 is reversed by clicking
(1) Revert
(2) Step to the Back
(3) Redo
(4) Step Backward
(5) Undo
Solution:3
6. First generation programming language used
(1) Translator
(2) Machine level language
(3) Compiler
(4) Assembler
(5) All of the above
Solution:2
7. When a computer is turned on, where does it get the first instructions that it loads
into RAM?
(1) From RAM
(2) From ROM
(3) From the Hard Disk
(4) From a CD
(5) None of these
Solution:2
8. What is the name for a thin credit card size device used principally on laptop to
expand capabilities?
(1) Expansion card
(2) Flash card
(3) PC card
(4) Smart card
(5) None of the above
Solution:3
9. When you save a file, it is permanently saved on the
(1) CPU
(2) Monitor
(3) Hard Drive
(4) RAM
(5) None of these
Solution:3
10. Good password helps organization
(1) In securing information
(2) From spyware
(3) From hackers
(4) Both 2 and 3
(5) All of the above
Solution:5
0 comments:
Post a Comment
MAHENDRA GURU