Q. 1 A ................ is a software program used to view web pages.
(A) Site
(B) Host
(C) Link
(D) Browser
Q. 2 The .................. of a threat measures its potential impact on a system.
(A) Vulnerabilities
(B) Counter Measures
(C) Degree of Harm
(D) None of These
Q. 3 The first computer which provides storage is.
(A) EDSAC
(B) EDBAC
(C) MARK 1
(D) ACE
Q. 4 Connecting points of chip on the motherboard are called ?
(A) Connector
(B) Sockets
(C) USB
(D) All of Above
Q. 5 The higher the resolution of a monitor, the
(A) Larger the pixels
(B) Less clear the screen is
(C) Further apart the pixels
(D) Closer together the pixels
Q. 6 The term bit is short for.
(A) Megabyte
(B) Binary Language
(C) Binary Digit
(D) Binary Number
Q. 7 .................. are words that a programming language has set aside for its own use.
(A) Control Words
(B) Control Structure
(C) Reserved Words
(D) Reserved Keys
Q. 8 Task bar consists of .................
(A) Start Button
(B) Middle Section
(C) Notification Area
(D) All of Above
Q. 9 Which of the following is not a term pertaining to MS WORD ?
(A) Delete
(B) Edit
(C) Copy
(D) Slide Show
Q. 10 How many layers are in the TCP/IP model ?
(A) 4 Layer
(B) 5 Layer
(C) 6 Layer
(D) 7 Layer
Ans. 1 (D), 2 (C), 3 (A), 4 (B), 5(D), 6 (C), 7 (C), 8 (D), 9 (D), 10 (B)
(A) Site
(B) Host
(C) Link
(D) Browser
Q. 2 The .................. of a threat measures its potential impact on a system.
(A) Vulnerabilities
(B) Counter Measures
(C) Degree of Harm
(D) None of These
Q. 3 The first computer which provides storage is.
(A) EDSAC
(B) EDBAC
(C) MARK 1
(D) ACE
Q. 4 Connecting points of chip on the motherboard are called ?
(A) Connector
(B) Sockets
(C) USB
(D) All of Above
Q. 5 The higher the resolution of a monitor, the
(A) Larger the pixels
(B) Less clear the screen is
(C) Further apart the pixels
(D) Closer together the pixels
Q. 6 The term bit is short for.
(A) Megabyte
(B) Binary Language
(C) Binary Digit
(D) Binary Number
Q. 7 .................. are words that a programming language has set aside for its own use.
(A) Control Words
(B) Control Structure
(C) Reserved Words
(D) Reserved Keys
Q. 8 Task bar consists of .................
(A) Start Button
(B) Middle Section
(C) Notification Area
(D) All of Above
Q. 9 Which of the following is not a term pertaining to MS WORD ?
(A) Delete
(B) Edit
(C) Copy
(D) Slide Show
Q. 10 How many layers are in the TCP/IP model ?
(A) 4 Layer
(B) 5 Layer
(C) 6 Layer
(D) 7 Layer
Ans. 1 (D), 2 (C), 3 (A), 4 (B), 5(D), 6 (C), 7 (C), 8 (D), 9 (D), 10 (B)
No comments:
Post a Comment