Thursday 6 September 2018

Information Technology (Questions & Answers ) - 32

626. Graphics are inserted in:
(a) Frame (b) Box
(c) Page (d) None of these
Answer: (a)

627. RTF stands for:
(a) Real Time Fonts (b) Real Time Files
(c) Rich Text Format (d) Rich Text Fonts
Answer: (c)

628. Decision tables link conditions and:
(a) Tables (b) Programs
(c) Actions (d) None of these
Answer: (c)

629. The template function declaration specifies:
(a) Template class (b) A generic class
(c) Exception (d) Identifier
Answer: (b)

630. Programming errors generally fall into which of the following categories?
(a) Syntax errors (b) Execution errors
(c) Logical errors (d) All of these
Answer: (d)

631. The name a user assigns to a document is called a(n):
(a) Filename (b) Program
(c) Record (d) Data
Answer: (a)

632. Modem refers to:
(a) Modulator (b) Modulation
(c) Modulator and demodulator
(d) Modern modes of communication
Answer: (c)

633. The programming language FORTRAN is mainly used for:
(a) Data processing applications
(b) Scientific applications
(c) Real time applications
(d) None of these
Answer: (b)

634. A byte is made up of:
(a) 8 bits (b) 7 bits
(c) 16 bits (d) None of these
Answer: (a)

635. When a computer suddenly stops working, it is said to be:
(a) Crashed (b) Bugged
(c) Hanged (d) Held up
Answer: (c)

636. Which of the following is a Web Browser?
(a) Paint (b) Fire fox
(c) Power Point (d) Word
Answer: (b)

637. What is correcting errors in a program called?
(a) Grinding (b) Interpreting
(c) Compiling (d) Debugging
Answer: (d)

638. To prepare a presentation/ slide show which application is commonly used?
(a) Photoshop (b) Outlook Express
(c) PowerPoint (d)  Internet Explorer
Answer: (c)

639. A repair for a known software bug, usually available at no charge on the internet, is called:
(a) Version (b) Ad-on
(c) Tutorial (d) Patch
Answer: (d)

640. Alta Vista is a:
(a) Programme (b) Software
(c) Browser (d)  Search engine
Answer: (d)

641. Most of the commonly used personal computers/laptops do not have a command key known as:
(a) Turnover (b) Shift
(c) Alter (d) Delete
Answer: (a)

642. The first recorded cyber crime was committed by:
(a) Joseph Mary Jacquard(b) Gulshankumar
(c) Pawan Duggal (d) Muhammad Feroz
Answer: (a)

643. Who discovered Unix operating system?
(a) Angelbart (b) Paul Allen
(c) Dennis Ritchie (d) John Newman
Answer: (c)

644. Which one of the following is not a hardware of a computer?
(a) Monitor (b) CPU
(c) Windows (d) Keyboard
Answer: (c)

645. The storage that supplements the primary internal storage of a computer is known as:
(a) Back-end storage (b) Back ground storge
(c) Primary storage (d) Secondary storage
Answer: (d)

646. What is the full form of USB?
(a) Universal Security Block(b) Ultra Serial Block
(c) United Service Block (d) Universal Serial Bus
Answer: (d)

647. The vast network of computers that connects millions of people all over the world is called:
(a) OUAN (b) Hypertext
(c) Interpol (d)   Internet
Answer: (d)

648. The primary purpose of the software is turn the data into:
(a) Websites (b) Information
(c) Programs (d) Objects
Answer: (b)

649. The components of a computer system with the circutry to control in control interpretation and execution of instructions is known as:
(a) ALU (b) Memory
(c) Control (d) CPU
Answer: (d)

650. Most of the commonly available personal computers/ laptops have a key board popularly known as:
(a) QWERTY (b) QOLTY
(c) ALTER (d) UCLIF
Answer: (a)
<Next Page><01,.... 2728293031, 32, 33343536>
Cyber laws (Questions & Answers)
* General English - Questions & Answers


PSC TODAYS EXAM RESULTS ---> Click here
PSC EXAM PROGRAMME -> Click here
PSC RANK LISTS / SHORT LISTS -> Click here
PSC FREE MOCK TEST -> Click here
Related Links
* SCERT KERALA TEXT BOOKS FOR CLASS II, IV, VI, VIII, IX, X, XII – FREE DOWNLOAD ---> Click here
* NCERT & CBSE TEXT BOOKS FOR ALL CLASSES – FREE DOWNLOAD ---> Click here
* NCERT & CBSE TEXT BOOKS SOLUTIONS FOR ALL CLASSES ---> Click here

No comments:

Post a Comment