Direction (Qs.1-15): Study the following questions carefully and choose your answer from the given five options.
Question No : 1
VIRUS stands for
(1) Very Important Resource Under Search
(2) Vital Information Resources Under Sieze
(3) Verify Interchange Result Until Source
(4) Very Important Record User Searched
(5) None of these
Question No : 2
When a computer is switched on, the booting process performs _____
(1) Integrity Test
(2) Power-On Self-Test
(3) Correct Functioning Test
(4) Reliability Test
(5) None of these
Question No : 3
_____ operations is safe if an e-mail from an unknown sender is received?
(1) Open it to know about the sender and answer it
(2) Delete it after opening it
(3) Delete is without opening it
(4) Open it and try to find who the sender is
(5) None of these
Question No : 4
Which of the following allows to make copies of the database periodically to help in the cases of crashes and disaster?
(1) Recovery Utility
(2) Monitoring Utility
(3) Backup Utility
(4) Data loading Utility
(5) None of these
Question No : 5
Which of the following is the maximum limit of the height of a row in an Excel Sheet?
(1) 209 points
(2) 309 points
(3) 509 points
(4) 409 points
(5) 609 points
Question No : 6
Which of the following symbols are used to represent numbers in Hexadecimal base system?
(1) 1-9 and A, B, C, D, E, F, G
(2) 1-9 and A, B, C, D, E, F
(3) 0-9 and A, B, C, D, E, F, G
(4) 0-9 and A, B, C, D, E, F
(5) None of these
Question No : 7
In Microsoft Excel, which of the following functions is used for finding the total of a sequence of cells?
(1) TOTAL
(2) SUM
(3) ADD
(4) MERGE
(5) None of these
Question No : 8
The computers used by banks for transactions processing and analyzing bulk data are called.
(1) Desktop Computers
(2) Personal Computers
(3) Mainframe computers
(4) Laptop Computers
(5) Notebook Computers
Question No : 9
Which of the following printers is the fastest?
(1) Dot Matrix Printer
(2) Drum Printers
(3) Chain Printer
(4) Ink Jet Printers
(5) Line Printers
Question No : 10
Unsolicited emails which are usually sent by corporates as marketing materials are called?
(1) Trash
(2) Spam
(3) Business messages
(4) Corporate emails
(5) Promotions
Question No : 11
In an IP address, how many periods or full stops () are there?
(1) 0
(2) 1
(3) 2
(4) 3
(5) 4
Question No : 12
_____ is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law
(1) Robotics
(2) Animation
(3) Simulation
(4) Computer Forensics
(5) None of these
Question No : 13
_____ is a part of computer network that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks.
(1) Server
(2) Client
(3) Protocol
(4) Backbone
(5) None of theseQuestion No : 14
What is the shortcut key to “Update Formula” in a table?
(1) F9
(2) Alt + F9
(3) Ctrl + F9
(4) Shift + F9
(5) None of these
Question No : 15
The two most common types of page orientation are _____.
(1) Header and footer
(2) Top, bottom, right, left
(3) Landscape and portrait
(4) Top and bottom
(5) None of these