Computer Quiz

Share:
Computer Quiz
Q1. Which bar is usually located below the Title Bar that provides categorized options?
(a) Menu Bar
(c) Toolbar
(b) Status bar
(d) Scroll Bar
(e) None of the above


Ans.(a)
Sol. The Menu Bar is the horizontal band that contains commands and options that can be chosen.

Q2.  Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups? 
(a) program thievery
(b) data snatching
(c) software piracy
(d) program looting
(e) data looting

Ans.(c)
Sol. Software piracy is the illegal copying, distribution, or use of software.

Q3. In first generation of computers, they used ______.
(a) batch processing
(b) multithreading
(c) multiprogramming
(d) networking
(e) All of the above

Ans.(a)
Sol. In First Generation mainly batch processing operating system were used.

Q4. A/(n) ___________ is an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content.
(a) email
(b) virus
(c) web beacon
(d) spam
(e) firewall

Ans.(c)
Sol. Common uses of web beacon are email tracking and page tagging for web analytics. Its alternative names are web bug, tracking bug, tag, or page tag. 

Q5. Which of the following terms is related to Internet connectivity? 
(a) IP
(b) TCP
(c) Gopher
(d) Both (a) and (b)
(e) All of the above

Ans.(e)
Sol.IP, TCP and Gopher all are protocols governing the internet. IP-Internet Protocol, TCP- Transmission Control Protocol. 

Q6. Which of the following is not example of Utility Software?
(a) Backup software
(b) Antivirus software
(c) Disk tools
(d) Media Players
(e) None of the above 

Ans.(d)
Sol. Utility software is system software designed to help analyse, configure, optimize or maintain a computer.

Q7. Example of telecommunication device is a ________ .
(a) modem
(b) printer
(c) keyboard
(d) scanner
(e) mouse

Ans.(a)
Sol. A telecommunication device is an electronic device used for communication via a telecommunication network. 

Q8. What is ‘Trend Micro’?
(a) virus program
(b) anti-virus software
(c) just a program
(d) All of these
(e) None of the above

Ans.(b)
Sol. Trend Micro is an antivirus.

Q9. Storage of instructions in computer memory to enables it to perform a variety of tasks in sequence or intermittently. Who introduced the idea of stored program concepts?
(a) Charles Babbage
(b) Dennis Ritchie
(c) Howard Aiken
(d) John Neumann
(e) Anna Lovelace

Ans.(d)
Sol. In the late 1940s by John von Neumann, proposed that a program be electronically stored in binary-number format in a memory device so that instructions could be modified by the computer as determined by intermediate computational results.

Q10. Table of contents can be prepared by using :
(a) macros
(b) headings as H1, H2, H3 and more in the document
(c) by table of contents in tools menu
(d) (b) and (c)
(e) By File menu

Ans.(b)
Sol. You can make Table of Content by using Headings.

Q11. Which of the following is the feature that keeps track of the right margin?
(a) Find and replace
(b) Word-wrap
(c) Right justified
(d) Left justified
(e) Ragged right

Ans.(c)
Sol. right justified—text is aligned along the right margin. 

Q12. To move data from one part of the document to another, which of the following is used?
(a) Cut and Insert
(b) Copy and Paste
(c) Copy and Delete
(d) Copy and Undo
(e) Cut and Paste

Ans.(e)
Sol. Cut and Paste moves data and Copy and Paste replicates data.

Q13. Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
(a) hacker
(b) analyst
(c) instant messenger
(d) programmer
(e) spammer

Ans.(a)
Sol.  hacker is someone who seeks and exploits weaknesses in a computer system.

Q14. To allow someone else schedule your meetings and appointments, ______ feature of Outlook is used. 
(a) Monthly calendar
(b) Event manager
(c) Appointments
(d) Delegate Access
(e) None of these

Ans.(d)
Sol. Delegate Access is a more advanced feature than just sharing your Outlook folders. If you want to grant additional permissions, such as allowing a delegate the ability to create e-mail messages or respond to meeting requests on your behalf, you must use Delegate Access.

Q15. Which of the following is the valid subnet mask for class B IP Address?
(a) 251.254.25.5
(b) 255.255.0.0
(c) 155.151.12.9
(d) 255.0.0.0
(e) 255.255.255.0


Ans.(b)
Sol. 255.255.0.0 is a valid subnet mask for class B IP.