Q1. The most widely used type of database management system is the:
(a) Flat database
(b) Network database
(c) Relational database
(d) Hierarchical database
SHOW ANSWER
©navclasses
Q2. Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
(a) Toggle
(b) Cold booting
(c) Warm booting
(d) Logging off
SHOW ANSWER
©navclasses
Q3.To protect your system from computer hackers you must turn on a(n) _______.
(a) USP
(b) VLC
(c) Another system
(d) Firewall
SHOW ANSWER
©navclasses
Q4.The point at which the flow of text in a document moves to the top of a new page–
(a) Page insert
(b) Page break
(c) Page format
(d) All of the above
SHOW ANSWER
©navclasses
Q5. __________are ‘attempts by individuals to obtain confidential information from you by falsifying their identity.
(a) Phishing
(b) Computer viruses
(c) Spyware scams
(d) Viruses
SHOW ANSWER
©navclasses
Q6. Which is the command used to remove text or graphics from a document and the information is then stored on a clipboard, so you can paste it later on?
(a) Cut
(b) Clip
(c) Chop
(d) Chew
SHOW ANSWER
©navclasses
Q7.Which of the following groups contains graphical file extensions?
(a) JPG, GIF, BMP
(b) GIF, TCF, WMF
(c) TCP, JPG, BMP
(d) ADP, GIF, PPT
SHOW ANSWER
©navclasses
Q8.Which of the following technologies is used in answer sheets to check them electronically?
(a) MICR
(b) OMR
(c) OCR
(d) Bar code
SHOW ANSWER
©navclasses
Q9.Which of the following mouse can work on any surface from a granite countertop to a carpet?
(a) Mechanical mouse
(b) Optical mouse
(c) Laser mouse
(d) Blue Track mouse
SHOW ANSWER
©navclasses
Q10.Which of the following programs is used to restrict access to selected websites?
(a) Channels
(b) Filters
(c) Browsers
(d) Telnet
SHOW ANSWER
©navclasses