Q. 1 Computer system is consists of
(A) Hardware
(B) Software
(C) CPU
(D) None of These
Q. 2 Which of the following is/are primary memory ?
(A) RAM
(B) ROM
(C) Both (A) & (B)
(D) Hard Disk
Q. 3 Which keys are programmable keys ?
(A) Alphanumeric keys
(B) Function keys
(C) Numeric keys
(D) Enter key
Q. 4 Storage that retains its data after the power is turned off is refferred to as
(A) Volatile storage
(B) Non Volatile storage
(C) Sequential storage
(D) Direct storage
Q. 5 Which of the following inputs a computer's memory, but unlike a virus, it does not replicate itself ?
(A) Trojan horse
(B) Cracker
(C) Firewall
(D) Logic Bomb
Q. 6 Each IP packet must contain
(A) Only source address
(B) Only destination address
(C) Source & destination address
(D) Source or destination address
Q. 7 Encryption and decryption are the functions of
(A) Transport layer
(B) Session layer
(C) Presentation layer
(D) All of the Above
Q. 8 Key to represent relationship between tables is called.
(A) Primary key
(B) Secondary key
(C) Foreign key
(D) Composite key
Q. 9 What does an electronic spreadsheet consist of ?
(A) Raws
(B) Columns
(C) Cells
(D) All of These
Q. 10 Sound card is used to convert voice into digital form, it is
(A) Hardware
(B) Software
(C) Program
(D) None of These
Ans. 1 (A & B), 2 (C), 3 (B), 4 (B), 5(D), 6 (C), 7 (C), 8 (C), 9 (D), 10 (A)
(A) Hardware
(B) Software
(C) CPU
(D) None of These
Q. 2 Which of the following is/are primary memory ?
(A) RAM
(B) ROM
(C) Both (A) & (B)
(D) Hard Disk
Q. 3 Which keys are programmable keys ?
(A) Alphanumeric keys
(B) Function keys
(C) Numeric keys
(D) Enter key
Q. 4 Storage that retains its data after the power is turned off is refferred to as
(A) Volatile storage
(B) Non Volatile storage
(C) Sequential storage
(D) Direct storage
Q. 5 Which of the following inputs a computer's memory, but unlike a virus, it does not replicate itself ?
(A) Trojan horse
(B) Cracker
(C) Firewall
(D) Logic Bomb
Q. 6 Each IP packet must contain
(A) Only source address
(B) Only destination address
(C) Source & destination address
(D) Source or destination address
Q. 7 Encryption and decryption are the functions of
(A) Transport layer
(B) Session layer
(C) Presentation layer
(D) All of the Above
Q. 8 Key to represent relationship between tables is called.
(A) Primary key
(B) Secondary key
(C) Foreign key
(D) Composite key
Q. 9 What does an electronic spreadsheet consist of ?
(A) Raws
(B) Columns
(C) Cells
(D) All of These
Q. 10 Sound card is used to convert voice into digital form, it is
(A) Hardware
(B) Software
(C) Program
(D) None of These
Ans. 1 (A & B), 2 (C), 3 (B), 4 (B), 5(D), 6 (C), 7 (C), 8 (C), 9 (D), 10 (A)
No comments:
Post a Comment