(a) 200
(b) 400
(c) 300
(d) 500
2. Which of the following is related with persons associated with computing process ?
(a) Hardware
(b) Software
(c) Firmware
(d) Humanware
(e) None of these
3. Which of following is hardware and not a software ?
(a) Excel
(b) Printer driver
(c) Operating system
(d) System board
(e) None of these
4. A device that connects multiple network segments along the data link layer is called as _________.
(a) Multiplexer
(b) Modem
(c) Bridge
(d) Hub
(e) None of these
5. A programmer that converts a high level language source file into a machine language file is called a _________.
(a) Translator
(b) Assembler
(c) Compiler
(d) Linker
(e) None of these
6. Most application software today come with an interface called __________________.
(a) Graphical User interface
(b) Character user interface
(c) Iron user interface
(d) Button user interface
(e) None of these
7. Which of the following was an early desktop operating systems that included an integrated graphic user interface point-and-click features ?
(a) MS-DOS
(b) Mac OS
(c) UNIX
(d) Gnome
(e) None of these
8. Microsoft Windows came to dominate the World's personal Computer Market with ___________% market share.
(a) 65%
(b) 82%
(c) 91%
(d) 90%
(e) None of these
9. What types of keys are 'Ctrl' and 'Shift' ?
(a) adjustment
(b) Function
(c) modifier
(d) Alphanumeric
(e) None of these
10. In which tool bar we will find short button for "Auto Sum" ?
(a) Formatting Bar
(b) Standard Bar
(c) Clipboard Bar
(d) Formula Bar
(e) None o0f these
11. In order to move from one work sheet to another in excel work book, which of the following should be clicked ?
(a) Active cell
(b) Scroll bar
(c) Sheet tab
(d) Tab buttom
(e) None of these
12. In which chart, only one data series can be plotted ?
(a) Pie
(b) Line
(c) Stacked bar
(d) embedded
(e) None of these
13. Material consisting of text and numbers is best presented as ____________.
(a) a table slide
(b) a bullet slide
(c) a title slide
(d) a structure slide
(e) None of these
14. Coded entries which are used to gain access to a computer system are called _____________.
(a) Entry codes
(b) Passwords
(c) Code words
(d) Security commands
(e) None of these
15. A program designed to destroy data on a computer which can travel to infect other computers is called a ________________.
(a) Disease
(b) Torpedo
(c) Virus
(d) Hurricane
(e) None of these
Answers
1. 300
2. Software
3. System board
4. Bridge
5. Compiler
6. Graphical User interface
7. Mac OS
8. 90%
9. modifier
10. Formula Bar
11. Sheet tab
12. Stacked bar
13. a table slide
14. Passwords