1. Which of the following is a software programs that help us to run the computer and
coordinates instructions between application software and the computer’s hardware devices?
Correct : B. System software
2. ------------------------------is a group of programs that controls how your computer system
functions.
Correct : D. The operating system
3. The software we use to do everyday tasks at home and at work is called
Correct : B. Application software
4. Which are called two basic types of software?
Correct : B. application software and program software
5. Which of the following is an example for system software.
Correct : C. Windows
6. Which of the following is an example for application software.
Correct : A. Microsoft Word
7. A computer cannot operate without ----------------------------------
Correct : A. operating system
8. Which of the following is an open-source operating system?
Correct : B. Linux
9. Which one of the following is an example for Spreadsheet software?
Correct : C. Microsoft Excel
10. -------------------------------enables the computer to translates your spoken words into typed
text.
Correct : A. Speech-recognition software
11. Microsoft has incorporated speech recognition software into its latest operating system
called
Correct : C. Windows Vista
12. Who developed Linux?
Correct : A. Linus Torvalds
13. ------------------------------- is basically a complex electronic filing system
Correct : A. Database software
14. Which of the following is a personal information manager software
Correct : D. Microsoft Outlook
15. In a computer the letter K is represented as
Correct : C. 01001011
16. In computer terms, data means
Correct : D. representation of an idea
17. The data which has been organized or presented in a meaningful fashion is called
Correct : B. information
18. A computers work exclusively with
Correct : C. numbers
19. The language which consists of just two digits is called
Correct : B. binary language
20. A binary digit contains
Correct : D. one zero and one one
21. One byte is equal to
Correct : B. 8 bits
22. In binary language, the letter K is represented as
Correct : D. 01001011.
23. Kilobytes, megabytes, and gigabytes are
Correct : B. amounts of bytes
24. A kilobyte (KB) is approximately
Correct : A. 1,000 bytes
25. A megabyte (MB) is
Correct : C. a million bytes
26. A gigabyte (GB) is equal to
Correct : A. billion bytes
27. A peta byte of data-that’s more than------------------------------bytes
Correct : D. one quadrillion
28. ---------------------------------feature helps the user to return to a specific Web page without
always having to remember to type the address.
Correct : C. Bookmark
29. A Search engine has ------------parts
Correct : A. Three
30. Which of the following is not a part of search engine?
Correct : D. bookmark
31. Which of the following is a search engine?
Correct : D. all of these
32. -----------------------------------is a guide to the internet organized by topics and subtopics.
Correct : C. a subject directory
33. Among the following which one is not a subject dictionary?
Correct : C. Triton
34. What is the name of the program that enables us to communicate in real time with others
who also are online?
Correct : A. Instant messaging
35. A clip of audio or video content that is broadcast over the internet using compressed files is
called
Correct : D. podcast
36. Weblogs or blogs are
Correct : C. personal logs or journal entries that are posted on the web.
37. Which of the following is a blog site that devotes itself to discussing techno gadgets?
Correct : B. www.gizmodo.com
38. A written message that is sent and received over electronic communication systems is
called
Correct : A. E .mail
39. -------------------------is the broadcast of audio or video content over the Internet.
a.
Correct : B. a webcast
40. Name of the educational initiative backed by government of India for information
technology is called
Correct : A. Sakshat
41. E.-books and e-journals are
Correct : C. the content of open access publishing
42. Claiming another person’s words as your own- this action is known as
Correct : B. plagiarism
43. WebCT and Enspire are the tools for
Correct : C. E-learning
44. Through ----------------------students can get online education from remote places.
Correct : A. virtual classrooms
45. -------------------------------is a virtual network of libraries
Correct : B. INFLIBNET
46. Name the networking infrastructure built by NIC for the e-governance applications.
Correct : A. NICNET
47. BRNET is related with
Correct : C. biological information resources
48. WBT is an example for
Correct : D. a computer-based training
49. Which of the following is true?
Correct : D. all of these
50. Which of the following statement is not true to e-mail
Correct : C. it is not a popular means of communication
51. Broadband connections includes
Correct : D. all of these
52. ICQ is related with
Correct : B. Instant messaging
53. CCTV is
Correct : A. Closed circuit television
54. Britannica is a
Correct : A. Free online educational software
55. INFLIBNET is
Correct : A. Sharing of library and information resources
56. Google earth is --------
Correct : B. Educational software
57. Which among shows IT for national integration
Correct : D. All of these.
58. ------- is a non-profit corporation formed to educate about and advocate for the benefits of
open source and to build bridges among different constituencies in the open source community.
Correct : D. The open Source Initiative.
59. ------- can be referred as the use or application of computational devices in the field of
biological sciences and research.
Correct : A. Bio-computing
60. This unlawful acts wherein the computer is either a tool or target or both
Correct : B. Cyber crime
61. Which of the following is annoying, but really doesn’t render any harm to our computer?
Correct : D. Adware
62. Why do you not want too much personal data about you on the Internet?
Correct : B. It might be used by an identity thief to impersonate you
63. What is the top rule for avoiding Internet fraud?
Correct : C. Only work with people who have verifiable e-mail address
64. One scam that lures internet users into revealing personal information is
Correct : C. Phishing
65. When hackers use a program that pretends to be useful to a user while actually allowing the
hacker to gain control of the user’s computer, this is called a(n)
Correct : B. Trojan Horse Attack
66. Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called
Correct : A. Worms
67. How could hacker use information about you found through Internet searches?
Correct : D. All of the above
68. What is the first step in protecting yourself from identity theft?
Correct : A. Never provide any personal data about yourself unless absolutely necessary
69. A backup is a ...................... against data loss a.Threat b. Security c. Countermeasure d. Abuse
111. What is malware?
Correct : B. Software that is not functioning properly
70. Which of the following is a step that all computer users should take to protect against virus
attacks?
Correct : D. Install and use antivirus software
71. -------- uses the principles and tools of computer science to model or algorithmically
specify complexes biological information system and computational systems with life-like capabilities.
Correct : C. Bio-computing
72. ------ uses software to allow people to interact with three-dimensional simulated
environment.
Correct : A. Virtual Computing
73. The science and engineering of making intelligent machines, especially intelligent computer programs.
Correct : A. Artificial Intelligence
74. Computers are programmed to make decisions in real-life situations are known as
Correct : D. Expert System
75. Computing systems, which imitate human brain through a network of highly interconnected
processing elements.
Correct : C. Neural Networks
76. Which among the following is not applicable to internet use
Correct : D. Pretend to be someone else when you are online.
77. Which among the following is applicable to internet use
Correct : D. All of these
78. Which among the following is unethical use of cell phone
Correct : C. Do capture the images of others without permission of that person
79. A repetitive strain injury (RSI) in computer users caused by
Correct : A. Improperly positioned key-boards
80. Which of the following is not true of ethical computing guidelines
Correct : D. Snoop in other people’s computer files.
81. The following metric is a measure of the journal quality
Correct : A. Impact factor
82. The main advantage(s) of online education is (are)
Correct : D. All of the above
83. Pick the odd one out
Correct : C. Antivirus
84. A ............. is a small text file which is placed on your computer on the request made by the
web server to your browser.
Correct : B. Cookie
85. The commission of illegal acts through the use of computer or against a computer system.
Correct : A. Computer Crime
86. ----- is an example of software being created independent of any money- making incentive or
any property rights
Correct : C. Freeware
87. A computer user, who copies an application onto more than one computer, if the license
agreement does not permit this, is participating in:
Correct : A. Software piracy
88. Experts who are performing a needed service for society by helping companies realize the
vulerabilities that exist in their systems by break into system just for the challenge.
Correct : B. White-hat hackers
89. If the antivirus software detects a virus signature or suspicious activity, it stops the execution
of the file and virus and notifies you that it has dtected virus is known as:
Correct : A. Quarantining
90. The discrepancy between the “haves” and “have-notes” with regards to computer technology
is commonly referred as:
Correct : C. Digital Divide
91. An online archive of multidiscipline journal articles in the most significant professional
journals.
Correct : B. Jstor
92. Which among the following is true
Correct : D. None of the above
93. Which among the following skills need for locating appropriate information on the Internet