Q1. Cache and main memory will lose their content when
power is turned off. They are categorized as ______.
a) Volatile
b) Non-Volatile
c) Tangible
d) Static
e) None of the above
Q2. DRAM stands for ____.
a) Digital Random Access Memory
b) Domain Random Access Memory
c) Dynamic Random Access Memory
d) Dividend Random Access Memory
e) None of the above
Q3. What is the name given to the process of initializing a personal computer with its operating system?
a) Rooting
b) Knotting
c) Routing
d) Booting
e) None of the above
Q4. Which among the following is/are parts associated with an operating system?
a) Device drivers
b) Kernel
c) User Interface
d) System Utilities
e) All of the above
a) Volatile
b) Non-Volatile
c) Tangible
d) Static
e) None of the above
Q2. DRAM stands for ____.
a) Digital Random Access Memory
b) Domain Random Access Memory
c) Dynamic Random Access Memory
d) Dividend Random Access Memory
e) None of the above
Q3. What is the name given to the process of initializing a personal computer with its operating system?
a) Rooting
b) Knotting
c) Routing
d) Booting
e) None of the above
Q4. Which among the following is/are parts associated with an operating system?
a) Device drivers
b) Kernel
c) User Interface
d) System Utilities
e) All of the above
Q5. Which among the given options is graphical representation of an application?
a) Windows Explorer
b) Task Bar
c) Icon
d) Microsoft Explorer
e) Windows 95
Q6. What is the shortcut key if you want to justify the selected text?
a) Ctrl+1
b) Ctrl+Alt+J
c) Ctrl+J
d) Alt+J
e) Shift+J
Q7. What is a special visual and audio effect applied in PowerPoint called?
a) Swipe
b) Wipe
c) Flash
d) Animation
e) None of the above
Q8. What type of language is HTML?
a) Scripting
b) Programming
c) Web Browser
d) Encryption
e) Protocol
Q9. What is Authentication?
a) asserting data
b) Assuring the identity of the user
c) establishing connection
d) managing memory
e) All of the above
Q10. Which of the following is/are threat for electronic payment system?
a) Computer Worms
b) Computer Virus
c) Trojan Horse
d) All of the above
e) None of the above
No comments:
Post a Comment