Direction (Qs.1-15): Study the following questions carefully and choose your answer from the given five options.
Question No : 1
Digital banking can be restored through _____
(1) Mobile phones
(2) Internet
(3) Telephones
(4) Credit card
(5) None of these
Question No : 2
Codes consisting of bars or lines of varying width or lengths that are computer readable are known as _____
(1) ASCII codes
(2) magnetic tapes
(3) OCR scanners
(4) bar codes
(5) None of these
Question No : 3
Editing a document consists of reading through the document you have created and then _____
(1) correcting your errors
(2) printing it
(3) saving it
(4) deleting it
(5) None of these
Question No : 4
Free hard-disk space used to extend the capacity of the RAM is termed as _____
(1) Cache
(2) Flash Memory
(3) ROM
(4) Virtual memory
(5) None of these
Question No : 5
Making illegal copies of copyrighted software is called as _____
(1) collaboration
(2) software piracy
(3) browsing
(4) electronic distribution
(5) None of these
Question No : 6
The _____ also called the web, contains billions of documents.
(1) World Wide Web
(2) HTTP
(3) Web Portal
(4) Domain
(5) None of these
Question No : 7
The _____ becomes different shapes depending on the task you are performing.
(1) active tab
(2) Insertion point
(3) Mouse printer
(4) Ribbon
(5) None of these
Question No : 8
_____ and _____ are objects in an access database.
(1) table, form
(2) queries, reports
(3) macros, modules
(4) All of these
(5) None of these
Question No : 9
To find an individual item in a file immediately, _____ is used.
(1) file allocation table
(2) directory
(3) sequential access
(4) direct access
(5) None of these
Question No : 10
IP addresses are converted to _____
(1) alphanumeric string
(2) a hexadecimal string
(3) a binary string
(4) a hierarchy of domain names
(5) None of these
Question No : 11
All the deleted files go to______
(1) Recycle Bin
(2) Task Bar
(3) Tool Bar
(4) My Computer
(5) None of these
Question No : 12
The secret code that restricts entry to some programs _______
(1) password
(2) passport
(3) entry-code
(4) access-code
(5) None of these
Question No : 13
Which of the following is not an example of hardware?
(1) Word
(2) Printer
(3) Monitor
(4) Mouse
(5) Scanner
Question No : 14
An error in a computer programme-
(1) Crash
(2) Power Failure
(3) Bug
(4) Virus
(5) None of these
Question No : 15
A set of instructions telling the computer what to do is called
(1) mentor
(2) instructor
(3) compiler
(4) program
(5) None of these