03-11-23 Computer Marathon NAB Edutap
03-11-23 Computer Marathon NAB Edutap
Q.1
What term describes the physical and touchable components of a computer system?
A. Hardware
B. Software
C. User
D. Data
E. Mother Board
Answer: Option A
Computer:
A computer is an electronic machine or device that performs processes, calculations, and operations based on instructions provided by a
software or hardware program.
Explanation-
• Hardware: It refers to all the physical components of a computer system that you can touch and see. These components are essential for
the computer to function and execute tasks. Hence, option A is correct
• Software: It refers to the non-tangible programs and instructions that run on a computer. It includes applications, operating systems, and
any code that enables the computer to perform specific tasks. Hence, option B is incorrect
• User: The user is the individual or entity that interacts with the computer system. Hence, option C is incorrect
• Data: Data represents the information processed and stored by a computer system. It can be in various forms, such as text, numbers,
images, videos, or any other digital content. Hence, option D is incorrect
• Motherboard: The motherboard is a critical hardware component inside a computer that houses the CPU (Central Processing Unit),
memory modules, and various connectors for other hardware components. Hence, option E is incorrect
Introduction to computer
Answer: Option D
Explanation-
• "Abacus was the first counting device.“- The abacus is one of the earliest known counting devices and has
a long history of use in various cultures. Hence, statement 1 is correct
• "It was developed in Egypt." - The origins of the abacus is from China. Hence, statement 2 is incorrect
• "The wooden frame contains horizontal rods and beads which are passed through the rods." - The
abacus typically consists of a wooden frame with rods or wires running horizontally, and beads or counters
that can be moved up and down on these rods to perform calculations. Hence, statement 3 is correct
Who among the following is known as the one of the inventors of microprocessors?
A. Keith Davis
B. Charles Babbage
C. Varun Sharma
D. Alan Turing
E. Tod Hoff
Introduction to computer
Answer: Option E
Q.4
The_______________, computers replaced transistors with integrated circuits (ICs). They performed
computation in Nanoseconds.
A. First generation
B. Second generation
C. Third generation
D. Fourth generation
E. Fifth generation
Explanation-
• The third-generation computers replaced transistors with integrated circuits (ICs). They performed
computation in Nanoseconds.
• It used high-level languages like FORTRAN, COBOL, PASCAL, ALGO-68, and BASIC were used. In this
generation, remote processing, time-sharing, and multiprogramming operating system were used.
________________ was the first commercially available computer. It was made by the Eckert-Mauchly
Computer Company. It represents the birth of the modern computers.
A. ABC
B. EDISAC
C. ENIAC
D. UNIVAC
E. None of the above
Micro-Processor
Electronic
(Intel 4004)
Numerical
Atanasoff Berry Electronic Discrete Electronic Delay
Integrator and Universal Automatic
Computer (ABC) Variable Automatic Storage Automatic
Calculator (ENIAC) Computer (UNIVAC) First general-purpose
. Computer (EDVAC) Calculator (EDSAC)
programmable
processor
UNIVAC was the first commercially available computer. It was made by the Eckert-Mauchly
Computer Company. It represents the birth of the modern computers.
Q.7
1. Analog computers store data continuously in the form of physical quantities and perform calculations
with the help of measures
2. A Hybrid computer is a combined feature of Analog and Digital Computers
3. Analog computers produce output in the form of a graph.
Which among the above statement/s is/are correct?
A. 1 only
B. 2 only
C. 1 and 2
D. 1 and 3
E. All statements are correct
Explanation-
• Analog computers use physical quantities, such as electrical voltages or currents, to represent data and
perform calculations. They continuously vary these physical quantities to process information, making
them suitable for certain types of calculations. Hence, statement 1 is correct
• A hybrid computer combines the features of both analog and digital computers. It typically uses analog
components for specific tasks where continuous data is crucial (like simulations or scientific experiments)
and digital components for more general-purpose computing tasks. Hence, statement 2 is correct
• Analog computers produce output in the form of a graph. The output format depends on the specific
application and how the analog computer is programmed or configured. It can produce numerical results,
graphs, or other types of analog representations. Hence, statement 3 is correct
Answer: Option E
Explanation
• The Input Unit in a computer system is responsible for receiving instructions and data from input devices such as
keyboards, mice, scanners, and other peripherals. It is the gateway through which data and instructions enter the
computer for processing. Hence, option A is correct
• A microprocessor is a central processing unit (CPU) that is implemented as a single integrated circuit (IC) chip. It
contains the control unit (CU), arithmetic and logical unit (ALU), and other components necessary for executing
instructions and performing calculations. Microprocessors are the heart of most modern computers. Hence, option B
is correct
• The Control Unit (CU) is a vital component of the CPU responsible for controlling the execution of instructions. It
ac
manages the flow of data between the CPU's components, fetches instructions from memory, decodes them, and
directs the ALU to perform the necessary operations. It ensures that instructions are executed in the correct
sequence. Hence, option C is correct
• The Arithmetic and Logic Unit (ALU) is responsible for carrying out the actual computations and logical comparisons
that are the core of a computer's processing capabilities. Hence, option D is correct
• "CPU consists of the Control Unit, the Arithmetic Logical Unit (ALU), and the Memory Unit. Hence, option E is
incorrect
Therefore, option E is the correct answer.
Q.9
Answer: Option E
Explanation
• Primary memory, often referred to as RAM (Random Access Memory), is volatile, which means it loses its
data when power is dissipated or turned off. Hence, option A is correct
• Secondary memory, which includes devices like hard drives, SSDs, and optical disks, is typically non-volatile
and retains data even when the power is turned off. Hence, option B is correct
• Secondary memory is primarily used for long-term storage of data, including program instructions and a
large volume of information such as files and databases. Hence, option C is correct
• Primary memory (RAM) is used for holding runningac program instructions, data intermediate results, and
the results of ongoing processing. It provides fast access to data that the CPU needs during its operation.
Hence, option D is correct
A. Input unit
B. Output unit
C. Primary memory
D. Control Unit
E. None of the above
Explanation-
• The component described in the statement, which accepts the results produced by the CPU, converts
them into human-acceptable form, and presents them as readable information to the outside world, is
typically known as the "Output unit.“
• So, X in this context is "Output unit.
Which computers are used for solving complex application such as Global Weather Forecasting?
A. Super Computers
B. Mainframe Computers
C. Embedded computers
D. Hybrid computers
E. None of the above
Answer: Option A
Super Computers are used with complex applications like Global Weather Forecasting, Creating Graphic Images,
Engineering Design and Testing, Space Exploration, etc
Q.12
A. Copy text
B. Accept input
C. Process data
D. Store data.
E. None of the above
All computer systems perform the following five basic operations for
converting raw input data into useful information-
Explanation-
• Information is not the same as raw facts and figures. Information is derived from data when it is
processed and organized in a meaningful way. Raw data, on the other hand, consists of unprocessed and
unorganized facts and figures. So, information is the organized form of data, not the raw facts and figures
themselves.
Explanation-
• Garbage In, Garbage Out. GIGO is a common acronym in the field of computing and data processing,
which emphasizes that the quality of output data is determined by the quality of the input data. If
incorrect or low-quality data is fed into a computer or information system, the results or output will also
be incorrect or of low quality.
FTP
CAD
WWW/PDF/LED/OLED
BIOS
CC/BCC
TFT
API
Q.15
Computer manipulate data in many ways, and this manipulation is called as _____________
A. Utilizing
B. batching
C. Upgrading
D. Processing
E. None of the above
Answer: Option D
Data processing refers to the transformation of raw data into meaningful output. Data can be done manually using a pen
and paper, mechanically using simple devices e.g. typewriter or electronically using modern data processing tools e.g.
computers
Q.16
In the field of computer which of the following controls the machine cycle?
A. Control Unit
B. Memory Unit
C. Logic Unit
D. Arithmetic Unit
E. None of the above
Answer: Option A
The control unit (CU) is a component of a computer's central processing unit (CPU) that directs the operation of the
processor. It tells the computer's memory, arithmetic and logic unit and input and output devices how to respond to the
instructions that have been sent to the processor.
Q.17
What is the primary characteristic of Multi-Processing?
Answer: Option C
Explanation-
• Multi-Processing is a data processing approach that makes use of multiple CPUs, dividing tasks or sets of
operations among them simultaneously to increase efficiency and throughput.
ac
Q.18
_________________ makes use of CPUs (more than one CPU). The task or sets of operations are divided
between CPUs available simultaneously thus increasing efficiency and throughput.
A. Multi-processing
B. Manual Processing
C. Real Time Processing
D. Batch Processing
E. None of the above
Answer: Option A
Multi-Processing
This type of processing perhaps the most widely used types of data processing. It is used almost everywhere and forms
the basis of all computing devices relying on processors. Multi-processing makes use of CPUs (more than one CPU). The
task or sets of operations are divided between CPUs available simultaneously thus increasing efficiency and throughput.
The result and benefit of this type of processing is the reduction in time required and increasing the output.
Q.19
A. 5
B. 4
C. 3
D. 2
E. 8
Answer: Option B
Q.20
The circuit that includes the CPU and memory chips is located on the ___________
A. System unit
B. Operating system
C. Motherboard
D. Computer
E. None of the above
Answer: Option C
A motherboard, often referred to as the mainboard or system board, is a critical component in a computer
system. It is a large, flat circuit board that serves as the central hub for connecting and interconnecting
various hardware components and peripherals within the computer.
The motherboard is typically located inside the computer case, and it plays a fundamental role in facilitating
communication between different parts of the computer system.
Q.21
Which keyboard key is primarily used to change the input mode of a group of keys and capitalize all letters?
A) Shift key
B) Caps Lock key
C) Function key (Fn)
D) Escape key
E) Num Lock key
Answer: Option B
Input devices
Input devices serve as a link between a user and the computer. It allows users to feed instructions and data
to computers for processing, display, storage, and/or transmission.
Explanation
• The key primarily used to change the input mode of a group of keys and capitalize all letters is the Caps
Lock key. When Caps Lock is activated, all letters typed on the keyboard will be in uppercase. Therefore,
the correct answer is option B, "Caps Lock key." ac
Therefore, option B is the correct answer.
Q.22
______X______, is used to change the input mode of a group of keys on a keyboard. Caps Lock, Num Lock,
and Scroll Lock are ______X______.
Identify X from the below-given options
A. Num Lock
B. Alt key
C. Control key
D. Toggle Keys
E. None of the above
Answer: Option D
Explanation-
• Toggle Keys, such as Caps Lock, Num Lock, and Scroll Lock, are used to change the input mode of a group of
keys on a keyboard. These keys toggle between different states when pressed, indicating whether certain
features like capitalization, numeric keypad, or scrolling are active or not.
ac
Q.23
Consider the following table in the context of Mouse-
S. Number Functions
1 It is a pointing and cursor-control device
2 A mouse has two or three buttons called Left, Right, and Middle button.
3 It is an output device
Answer: Option D
Explanation-
• Mouse is a pointing and cursor-control device- The statement is correct
• A mouse has two or three buttons called Left, Right, and Middle button- The statement is correct
• It is an output device- The statement is incorrect. As the mouse is an input device.
ac
Q.24
__________________ is a character recognition system that uses special ink and characters. It is used to
verify the legitimacy or originality of paper documents, especially cheques
A. OCR
B. MICR
C. OMR
D. CAD
E. None of the above
Hence, C is the correct answer.
Answer: Option B
ac
Q.25
Answer: Option D
ac
Q.26
Which type of printer uses a non-impact photocopier technology, and its ink is dry, providing high-quality output?
A) Dot-Matrix Printer
B) Laser Printer
C) Inkjet Printer
D) Line Printer
E) LED Printer
Hence, C is the correct answer.
Answer: Option B
Explanation-
• Laser Printer: Laser printers use non-impact photocopier technology. They use dry ink (toner) and produce
high-quality output. Resolution in laser printers is measured in dots-per-inch (dpi).
ac
Q.27
The individual dots that form the image on a monitor are called
A. Particles
B. frames
C. Pixels
D. Picture Dots
E. None of the above
Hence, C is the correct answer.
Answer: Option C
The pixel (a word invented from "picture element") is the basic unit of programmable color on a computer display or in a
computer image.
ac
Q.28
Which component of the motherboard is responsible for storing BIOS settings such as time, date, and
hardware configurations?
A) CPU Slot
B) RAM Slot
C) CMOS battery
D) Expansion Slot
E) None
Hence, C is the correct answer.
Answer: Option C
Explanation-
• CPU Slot: This slot is used to install the CPU (Central Processing Unit) onto the motherboard, facilitating its connection
and preventing damage during installation or removal. Hence, option A is incorrect
• RAM Slot: These slots are used for installing RAM (Random Access Memory) modules. Computers can have multiple RAM
slots, allowing for memory expansion. Hence, option B is incorrect
• CMOS battery: This battery, also known as a Complementary metal-oxide-semiconductor battery, stores essential BIOS
settings like time, date, and hardware configurations. It keeps these settings even when the computer is turned off.
Hence, option C is correct
• Expansion Slot: An expansion slot, also called a bus slot ac or expansion port, provides a connection point on the
motherboard for installing hardware expansion cards, such as graphics cards or network adapters. Hence, option D is
incorrect
A) Register
B) Cache memory
C) RAM
D) Hard disk
E) None of the above
Answer: Option A
Explanation-
• Register: Registers are the fastest memory and are located very close to the CPU, making them ideal for
immediate data manipulation. Hence, option A is correct
• Cache memory: Cache memory is fast and small, but registers are even faster and typically closer to the CPU.
Hence, option B is incorrect
• RAM: RAM is relatively fast but not as fast as registers or cache memory. Hence, option C is incorrect
• Hard disk: Hard disks are much slower than registers, cache memory, and RAM. Hence, option D is incorrect
• Optical disk: Optical disks are also slower than registers,
ac cache memory, RAM, and hard disks. Hence, option
E is incorrect
________ is a permanent memory, which halls data and instruction for start-up the computer and does not
erase data after power off.
Answer: Option D
Read-only memory is a type of non-volatile memory used in computers and other electronic devices. Data stored in ROM
cannot be electronically modified after the manufacture of the memory device.
ac
Q.31
Which type of RAM does not require constant refreshing to maintain its data and retains information as long
as it has power?
Answer: Option B
Explanation
• Dynamic RAM (DRAM): Requires constant refreshing to maintain data and is volatile. Hence, option A is
incorrect
• Static RAM (SRAM): Holds data in a static form, retaining it as long as there is power and is non-volatile.
Hence, option B is correct
• Synchronous Dynamic RAM: A type of DRAM with higher clock speeds but still requires refreshing and is
volatile. Hence, option C is incorrect
• Volatile RAM: RAM that loses its data when power isaclost. Hence, option D is incorrect
• Non-volatile RAM: RAM that retains data even when power is lost. Hence, option E is incorrect
Consider the following statements in the context of memory and select the correct option.
Answer: Option E
Explanation
• Secondary memory refers to storage devices that are external to the computer's main memory (RAM) and
are typically non-volatile, meaning they retain data even when the power is turned off. Hence, option A is
correct
• A hard drive is a non-removable storage device that consists of magnetic disks or platters that rotate at high
speeds to store and retrieve data. Hence, option B is correct
• Compact discs (CDs) are portable optical storage media that can be used to record and store digital data,
including audio, video, and computer files. Hence, option
ac C is correct
• A Winchester disk is an early term used to describe a type of hard disk drive (HDD) that used a sealed,
stacked disk design. It was a precursor to modern HDDs. Hence, option D is correct
A) 2 bits
B) 4 bits
C) 8 bits
D) 16 bits
E) 32 bits
Answer: Option C
Explanation-
• 8 bits: Correct, a Byte is a group of 8 bits and is equal to one character.
ac
Q.34
A. Device Drivers
B. Language Translator
C. Operating Software
D. Utility Software
E. None of the above
Hence, C is the correct answer.
Answer: Option E
ac
Q.35
Answer: Option A
Explanation-
A) An operating system manages and coordinates the functioning of hardware and software. Hence, option A
is correct
B) Scanning for viruses is typically the role of antivirus software. Hence, option B is incorrect
C) Data compression on the hard disk is not the primary function of an operating system. Hence, option C is
incorrect
D) Rearranging files and unused space on the hard disk is typically done by disk defragmentation utilities.
Hence, option D is incorrect ac
E) Facilitating the creation and correction of text is a function of text editors, not the operating system.
Hence, option E is incorrect
Answer: Option D
Explanation-
• Word Processing Software: This type of software is used for creating, editing, formatting, and
manipulating text documents, but it doesn't typically handle videos or audio. Hence, option A is incorrect
• Spreadsheet Software: Spreadsheet software is primarily designed for performing calculations, data
storage, and creating charts. Hence, option B is incorrect
• Presentation Software: Presentation software is used to create slideshows with text and graphics, not for
video and audio editing. Hence, option C is incorrect
• Multimedia Software: Multimedia software is specifically
ac developed for editing videos, audio, and text
and allows users to combine these elements to enhance documents. Hence, option D is correct
• Database Package Software: Database software is used for creating and managing structured databases,
not for multimedia editing. Hence, option E is incorrect
A. 312
B. 255
C. 1024
D. 1025
E. None of the above
Hence, C is the correct answer.
Answer: Option B
A bit is the most basic unit and can be either 1 or 0. A byte is not just 8 values between 0 and 1, but 256 (28) different
combinations (rather permutations) ranging from 00000000 via e.g. 01010101 to 11111111. Thus, one byte can represent
a decimal number between 0(00) and 255
ac
Q.38
Which type of programming language provides human-readable instructions for the CPU and is considered a
low-level language?
A) Machine language
B) Binary language
C) Assembly language
D) High-level language
E) All of the above
Answer: Option C
Computer language:
A Computer Language is the means by which instructions and data are transmitted to computers
Explanation-
• Machine language: Machine language uses binary code (0s and 1s), making it not human-readable.
Hence, option A is incorrect
• Binary language: This term is often used interchangeably with machine language and is also not human-
readable. Hence, option B is incorrect ac
• Assembly language: Assembly language is a low-level language that offers human-readable instructions
for the CPU. Hence, option C is correct
• High-level language: High-level languages are more abstract and user-friendly than low-level languages,
making them less similar to CPU instructions. Hence, option D is incorrect
The _______________ is a test the computer must complete to verify all hardware is working properly before
starting the remainder of the boot process.
A. BIOS
B. POST
C. OSPT
D. PPOS
E. None of the above
Hence, C is the correct answer.
Answer: Option B
POST
Short for power-on self-test, the POST is a test the computer must complete to verify all hardware is working
properly before starting the remainder of the boot process. The POST process checks computer hardware,
like RAM (random access memory), hard drive, CD-ROM drive, keyboard, etc., to ensure everything is working
correctly.
ac
Q.40
Answer: Option A
A cold boot involves turning on a computer that has been completely powered off, which initializes the
system from a "cold" state, and it typically involves clearing the contents of RAM (random access memory).
This is in contrast to a warm boot (option B), which is a restart of the computer without a complete power-
off. Options C and D do not accurately describe a cold boot.
ac
Q.41
Consider the following statements in the context of the operating system
1. An operating system is a type of software without which you cannot operate or run a computer
2. It acts as an intermediary or translation system between computer hardware and application programs
3. Examples of operating systems include – Linux (Ubuntu), DOS, Apple IOS (MacOS 10.15)
Answer: Option E
Explanation-
• An operating system is a type of software without which you cannot operate or run a computer. Hence,
statement 1 is correct
• It acts as an intermediary or translation system between computer hardware and application programs.
Hence, statement 2 is correct
• Examples of operating systems include – Linux (Ubuntu), DOS, and Apple IOS (MacOS 10.15). Hence,
statement 3 is correct
ac
Therefore, option E is the correct answer
Q.42
A _____X______ is the central part of an operating system. It manages the operations of the computer and
the hardware, most notably memory and CPU time.
Identify X from the below-given options
A) Device Driver
B) Processor
C) Kernel
D) Thread
E) Register
Hence, C is the correct answer.
Answer: Option C
Explanation-
• Processor: While the "processor" generally denotes the CPU, it is not the central operating system
component responsible for managing the computer and hardware.
• Kernel: "kernel" is the central part of an operating system that manages computer operations, hardware,
memory, and CPU resources.
• Thread: A "thread" is a unit of execution within a process but is not the central part of the operating
system responsible for overall management.
• Register: A "register" is a small, fast storage locationacwithin a CPU and is not the central component of the
operating system.
DTP is a tool for graphic designers and non-designers to create visual communications for professional. DTP
stands for ___________
Answer: Option B
Desktop publishing (DTP) is the creation of documents using page layout software on a personal computer. It was first
used almost exclusively for print publications, but now it also assists in the creation of various forms of online content.
COBOL
CD – DVD
CRT
DBMS
ac
DOC
Dpi
DNS
Q.44
What was the first computer network developed by Robert Kahn and Vinton Cerf in 1969?
Answer: Option B
Explanation-
• ARPANET, developed by Robert Kahn and Vinton Cerf in 1969, is considered the precursor to the modern
internet and was the first computer network of its kind.
• ARPANET (Advanced Research Projects Agency Network) was the first Wide Area Network (WAN) used by
them
Which of the following is NOT one of the five components of a computer network?
A) Sender (Device)
B) Sender Equipment (Encoder)
C) Communication Channel (Cables, Wireless)
D) Receiver Equipment (Decoder)
E) Adjuster (Device)
Answer: Option E
Explanation-
• The five components of a computer network are Sender (Device), Sender Equipment (Encoder),
Communication Channel (Cables, Wireless), Receiver Equipment (Decoder), and Receiver (Device).
ac
Q.46
Which type of network interface card (NIC) uses radio wave technology for communication?
A) Wireless NIC
B) Wired NIC
C) Ethernet NIC
D) Bluetooth NIC
E) Optical NIC
Answer: Option A
Explanation-
• Wireless NIC. A Wireless NIC enables communication through radio waves and is commonly used in
modern laptops for wireless networking.
• Wired NIC: A Wired NIC uses physical cables to transfer data over the network medium, typically Ethernet
cables.
• Ethernet NIC: This is another term for Wired NIC, which is used to connect devices through Ethernet
cables.
• Bluetooth NIC: Bluetooth NICs enable short-rangeac wireless communication primarily for connecting
peripherals and devices like headphones, keyboards, and mice.
• Optical NIC: Optical NICs use optical signals, such as light, for high-speed data transmission in optical
networks, like fiber optic connections.
Which of the following statements best describes the primary characteristic of a Metropolitan Area Network
(MAN)?
Answer: Option C
ac
Q.48
Which scientist is credited with the idea of the Personal Area Network (PAN)?
A) Thomas Edison
B) Thomas Jefferson
C) Thomas Zimmerman
D) Alexander Graham Bell
E) Benjamin Franklin
Hence, C is the correct answer.
Answer: Option C
Explanation-
• Thomas Zimmerman is credited with the idea of the Personal Area Network (PAN).
ac
Q.49
Which network protocol is commonly used for sending and receiving email messages?
A. HTTP
B. FTP
C. SMTP
D. POP
E. URL
Hence, C is the correct answer.
Answer: Option C
ac
Q.50
Answer: Option B
ac
Q.51
What is the primary purpose of a Unique Resource Locator (URL) on the Internet?
Answer: Option B
Explanation-
• URLs do not identify the user's location but rather a website's location.
• A URL is used to access a website on the Internet.
• Sending emails is not the primary purpose of a URL.
• Storing files is not the primary purpose of a URL.
• Making phone calls is not the primary purpose of a URL.
A. Processor
B. Printer
C. Motherboard
D. Phone line
E. None of the above
Answer: Option D
Explanation
• A modem is connected between a telephone line and a Serial port. A modem is a device or program that
enables a computer to transmit data over, for example, telephone or cable lines.
ac
Q.53
In which channel the flow of data is always in one direction, with no capability to support response in other
direction?
A. Duplex Channel
B. Half Duplex Channel
C. Simplex Channel
D. Autocratic Channel
E. None of the above
Hence, C is the correct answer.
Answer: Option C
Simplex communication is a communication channel that sends information in one direction only. The International
Telecommunication Union definition is a communications channel that operates in one direction at a time, but that may
be reversible; this is termed half duplex in other contexts
ac
Q.54
Which is a network device that is used to regenerate or replicate signals that are weakened or distorted by
transmission over long distances?
A. Repeater
B. Hub
C. Switch
D. Bridge
E. None of the above
Hence, C is the correct answer.
Answer: Option A
ac
Q.55
Answer: Option A
A Network Interface Card (NIC) is a hardware component without which a computer cannot be connected over a
network. It is a circuit board installed in a computer that provides a dedicated network connection to the computer.
ac
Q.56
__________ is a network topology in which each node connects to exactly two other nodes, forming a single
continuous pathway for signals through each node.
A. Star topology
B. Bus topology
C. Mesh topology
D. Ring topology
E. None of the above
Hence, C is the correct answer.
Answer: Option D
– A ring topology is a network configuration in which device connections create a circular data path. Each networked
device is connected to two others, like points on a circle. Together, devices in a ring topology are referred to as a ring
network
ac
Q.57
In the ________ topology, each workstation is connected directly to each of the others.
A. Star topology
B. Bus topology
C. Mesh topology
D. Ring topology
E. None of the above
Hence, C is the correct answer.
Answer: Option C
ac
Q.58
A. Bill Gates
B. Bill Rogers
C. Tim Berners Lee
D. Vinton Gray Cerf
E. None of These
Hence, C is the correct answer.
Answer: Option C
In 1989, while working at CERN, Tim Berners-Lee, a British scientist, invented the World Wide Web (WWW). It was
developed to meet the demand for automated information-sharing between scientists in universities and institutes
around the world.
ac
Q.59
Answer: Option D
A hyperlink is a word, phrase, or image that you can click on to jump to a new document or a new section within the
current document. Hyperlinks are found in nearly all Web pages, allowing users to click their way from page to page.
ac
Q.60
In ____X______, the recipients of the message and other recipients cannot see the persons who all receive
the e-mail.
A. E-mail
B. Drafts
C. Carbon copy
D. Blind Carbon copy
E. None of the above
Answer: Option D
Explanation
• E-mail: Refers to electronic mail in general, which includes sending messages to recipients who can usually
see each other's addresses.
• Drafts: Refers to emails that are saved as drafts and not yet sent to any recipients.
• Carbon copy (CC): Refers to a list of additional recipients in an email, and all recipients can see who else
received the email.
• "Blind Carbon Copy (BCC)," the recipients of the message and other recipients cannot see the persons who all
receive the e-mail. ac
Answer: Option A
Explanation
• The full form of ASCII is the American Standard Code for Information Interchange. ASCII is operated by
the IANA (Internet Assigned Numbers Authority) and was also established in the US. It is categorized under
ISO 646 series and is an old encoding method name.
ac
Q. 62
A. 0 or 1
B. 0 to 9
C. 0 to 7
D. 0 to 9 and A to F
E. None of the above
Hence, C is the correct answer.
Answer: Option B
– Decimal. Decimal, also called Hindu-Arabic, or Arabic, number system, in mathematics, positional numeral system
employing 10 as the base and requiring 10 different numerals, the digits 0, 1, 2, 3, 4, 5, 6, 7, 8, 9.
ac
Q. 63
A. bytes
B. bits
C. nibbles
D. Number
E. Data
Hence, C is the correct answer.
Answer: Option B
A binary number is a number expressed in the base-2 numeral system or binary numeral system, which uses only two
symbols: typically "0" (zero) and "1" (one). Each digit is referred to as a bit.
ac
Q. 64
Answer: Option C
Explanation-
• Microsoft Office is not primarily designed for gaming and entertainment.
• While Office may be used for document design and presentations, it's not primarily for graphic design and
video editing.
• Microsoft Office is a suite of software primarily designed for productivity and office work, including word
processing, spreadsheets, presentations, and more.
• While Office can be used for various tasks, its primary focus is not scientific research and data analysis.
• Microsoft Office is not primarily focused on social media
ac management.
What file extensions are associated with Microsoft Word's native file formats?
Answer: Option C
Explanation-
• .txt and .pdf are not the file extensions for Microsoft Word's native file formats.
• .xls and .ppt are file extensions for Microsoft Excel and PowerPoint, respectively, not Word.
• Microsoft Word's native file formats are denoted by .doc and .docx filename extensions.
• .jpg and .png are image file formats, not associated with Microsoft Word.
• .html and .css are web-related file formats and not Word's native formats.
A) Grammar checker
B) Spell Corrector
C) Spell checker
D) Plagiarism checker
E) Text-to-speech converter
Answer: Option C
Explanation-
• The Spell Checker in Microsoft Word is used for correcting spelling and suggesting alternatives for
incorrectly spelled words.
ac
Q.67
Consider the following statements in the context of Microsoft Word
1- Mail merge is used to create form letters or address labels, certificates with unique names, and more.
2- Alignment option is used to align the text in a document to adhere to the right side, left, center, or
justified.
3- The shortcut key Ctrl + [ is used to Decrease font size by 1
Answer: Option E
Explanation-
• Mail merge is a feature in Microsoft Word that allows you to create personalized documents, such as form
letters or address labels, by merging a template document with a data source. Hence, statement 1 is
correct
• The alignment option in Microsoft Word is used to control the horizontal positioning of text, allowing you
to align it to the right, left, center, or justify it. Hence, statement 2 is correct
• The shortcut key Ctrl + [ is used to Decrease font size by 1. Hence, statement 3 is correct
ac
Hence, option E is the correct answer
Q. 68
Presentation designs that regulate the formatting and layout for the slide are commonly called as ______
A. Design plates
B. Templates
C. Place-holders
D. Blueprints
E. None of the above
Hence, C is the correct answer.
Answer: Option B
A PowerPoint template is a pattern or blueprint of a slide or group of slides that you save as a .potx file. Templates can
contain layouts, colors, fonts, effects, background styles, and even content. You can create your own custom templates
and store them, reuse them, and share them with others.
ac
Q. 69
A. Effects
B. Custom animations
C. Transitions
D. Preset animations
E. None of the above
Hence, C is the correct answer.
Answer: Option C
In Microsoft PowerPoint, slide transitions are motion effects that occur in Slide Show view when you move from one slide
to the next during a presentation. You can control the speed, add sound, and even customize the properties of transition
effects.
ac
Q. 70
A. 8%
B. 10 %
C. 12 %
D. 20 %
E. None of the above
Hence, C is the correct answer.
Answer: Option B
ac
Q.71
In MS Excel, ____X______, displays the name of the application and the file currently in use. Identify X from
the below options-
A. Title Bar
B. Status Bar
C. Formula Bar
D. Menu Bar
E. Ribbon
Answer: Option A
Explanation-
• Title Bar - The Title Bar in MS Excel displays the name of the application and the file currently in use.
• Status Bar - The Status Bar typically shows information about the current status of the workbook and does
not display the name of the application.
• Formula Bar - The Formula Bar displays the contents of the active cell and allows users to edit cell
formulas, but it doesn't show the name of the application and file in use.
• Menu Bar - The Menu Bar contains various menus and commands for Excel, but it doesn't display the
application and file name. ac
• Ribbon - The Ribbon is a tabbed toolbar that provides access to various Excel features and commands but
does not display the application and file name.
A. WordColor
B. WordFont
C. WordArt
D. WordFill
E. None of the above
Hence, C is the correct answer.
Answer: Option C
ac
Q.73
In MS Access, ________X______, answer a question by selecting and sorting and filtering data based on
search criteria.
Identify the X from the below options
A. Query
B. Form
C. Table
D. Report
E. Macro
Answer: Option A
Explanation-
• Query - Enables users to filter and sort data based on specific criteria to answer questions or extract
specific information from a database.
• Form - Provides a user-friendly interface for entering, viewing, and editing data in a database.
• Table - Stores data in a structured format with rows and columns, serving as the foundation of a database.
• Report - Allows users to present and format data in a structured and printable format for analysis or
sharing.
• Macro - Automates repetitive tasks in Access by recording
ac a series of actions and replaying them with a
single command.
Answer: Option C
Explanation-
• A database is defined as logically related information that is organized in a way that allows for easy
access, management, and updating.
ac
Q.75
DBMS is comprised of tables that made up of rows called _______ and columns called ________
A. fields, records
B. records, fields
C. address, fields
D. ranges, sheet
E. None of the above
Hence, C is the correct answer.
Answer: Option B
Record – The data that is contained in rows inside a table is called a record. A record is a type of entry in which a person's
name, phone number etc. can be.
Field - Each column inside the table is called a field. In this, specific part of every data is stored like customer number,
customer name, street address, state etc
ac
Q.76
A. Relation
B. Tuples
C. Data structure
D. An entity
E. None of the above
Hence, C is the correct answer.
Answer: Option B
The relational data model represents the database as collection of relations, which resembles a table of values (or data
table). The table name and column names are used to help in interpreting the meaning of values in each row. Each row of
a table is called a data record.
ac
Q.77
Under _____________ type of database, data is organized in the form of tree with nodes.
A. Relational Database
B. Network Database
C. Hierarchical Database
D. Plant Database
E. None of the above
Hence, C is the correct answer.
Answer: Option C
Network Database
In this type of database, data is represented as collection of records and relationships among data
are represented as links.
Hierarchical Database
In this type of database, data is organised in the form of treeac
with nodes.
Relational Database
This database is also known as structured database in which data is stored in the form of tables.
Where, columns define the type of data stored in the table and rows define the information
about the data.
Q.78
A. Two levels
B. Four levels
C. Three levels
D. One level
E. None of the above
Answer: Option C
Architecture of DBMS
Internal Level
• It is the lowest level of data abstraction that deals with the
physical representation of the database on the computer. It is
also known as physical level. It defines how the data are
actually stored and organised on the storage medium.
Conceptual Level
• It is the overall view of the database and includes all the
information that is going to be represented in the database.
It describes what type of data is stored in the database, the
relationship among the data without effecting to the physical
level. It is also known as logical level.
External Level
• This is the highest level of data abstraction which describes
the interaction between the user and the system. It permits the
users to access data in a way that is customised according to
their needs, so that the same data can be seen by different
users in different ways, at the same time. It is also known as view
level.
Q.79
VIRUS stands for _______X_______. It is a software program that affects the system to corrupt the files in the
form of executable files. The first computer virus is _____Y_____ creepers and was developed in ____Z____.
A. X: Vital Information Resource Under Siege; Y: Creepers; Z: 1986
B. X: Very Intrusive Rogue User Software; Y: Creeper; Z: 1971
C. X: Virtual Intrusion & Replication of User Systems; Y: Mydoom; Z: 2004
D. X: Visual Interface for Reliable User Security; Y: Brain; Z: 1986
E. X: Virtual Information Retrieval Using Software; Y: Sasser; Z: 2003
Hence, C is the correct answer.
Answer: Option A
Explanation-
• VIRUS stands for Vital Information Resource Under Siege.
• It is a software program that affects the system to corrupt the files in the form of executable files.
• The first computer virus was creepers and was developed in 1986.
ac
Q.80
Which software is designed to prevent, search for, detect, and remove software viruses, as well as other
malicious software like worms, trojans, and adware?
A) Firewall
B) Adware
C) Antivirus Program
D) Intrusion Detection System
E) VPN
Answer: Option C
Explanation-
• Firewall - A firewall is a network security system that monitors and controls network traffic based on
security rules, but it doesn't focus on virus detection and removal.
• Adware - Adware is software that displays advertisements to generate revenue for its author and is not
primarily focused on virus protection.
• Antivirus Program - An antivirus program is specifically designed to prevent, search for, detect, and
remove software viruses and other malicious software.
• Intrusion Detection System - An Intrusion Detection ac System (IDS) is used to detect and alert on suspicious
network activities but is not designed for virus protection.
• VPN - A Virtual Private Network (VPN) is used for secure and private communication over the internet and
is not primarily designed for virus protection.
______X______ is an excessively large email (typically many thousands of messages) or one large message
sent to a user’s email account. This is done to crash the system and prevent genuine messages from being
received.
A. Rootkit
B. Sniffers
C. Scareware
D. Cookies
E. Mail Bomb
Hence, C is the correct answer.
Answer: Option E
Explanation-
• Rootkit- A program designed to hide objects such as processes, files or Windows registry entries (often
including its own).
• Sniffers - A software program used to monitor the traffic in a network. The hackers may use the sniffed
data to access important confidential data.
• Scareware - A common trick cybercriminal uses to make users think that their computer has become
infected with malware to get them to purchase a fake application.
• Cookies - These are program or information secretlyac
stored in a computer especially the internet browser,
which allows other users to monitor the internet activities of a person. These programs usually monitor
the browsing nature of person so that the companies can create better marketing strategies.
• Mail Bomb - An excessively large email (typically many thousands of messages) or one large message sent
to a user’s email account. This is done to crash the system and prevent genuine messages from being
received.
________________ type of virus is known as a space filler virus. As the name suggests, this virus tends to
install itself by occupying the empty sections of a file.
A. Rootkit
B. Phishing
C. Scareware
D. Cavity Virus
E. Mail Bomb
Hence, C is the correct answer.
Answer: Option D
ac
Q.83
A. firewall
B. antivirus
C. digital signature
D. Formatting
E. None of the above
Hence, C is the correct answer.
Answer: Option A
A firewall is a network security device or software application that is designed to monitor, filter, and control
incoming and outgoing network traffic based on a set of predetermined security rules. The primary purpose of
a firewall is to establish a barrier between a trusted internal network (such as a company's private network or
home network) and untrusted external networks (such as the internet) to protect against unauthorized access,
cyberattacks, and the spread of malware
ac
Q.84
Answer: Option C
Trojan horse is a type of malware that disguises itself as a legitimate or benign program but, once executed,
carries out malicious actions without the user's knowledge or consent.
Option A describes a worm, option B mentions a security protocol unrelated to Trojans, and option D
references a different security technology (firewall).
ac
Q.85
The _________ enables you to simultaneously keep multiple Web pagers open in one browser window.
A. Tab box
B. Pop-up Blocker
C. Tab row
D. Address Bar
E. Tab column
Hence, C is the correct answer.
Answer: Option C
The tab row or tab bar is the horizontal row of tabs at the top of a web browser that allows users to open and switch
between multiple web pages or tabs within a single browser window.
ac
Q.86
Answer: Option B
The capacity of a communication channel is typically measured in bandwidth, which refers to the amount of data that can
be transmitted over the channel in a given amount of time.
It is commonly expressed in bits per second (bps) or its multiples (e.g., Mbps for megabits per second or Gbps for gigabits
per second).
Bandwidth represents how much data can flow through the channel per unit of time and is a crucial factor in
determining the speed and capacity of data transmission in networks and communication systems.
ac
Q.87
Which of the following shortcut key is used to duplicate the current slide in MS PowerPoint?
A. Ctrl + C
B. Ctrl + V
C. Ctrl + D
D. Ctrl + E
E. eCtrl + M
Hence, C is the correct answer.
Answer: Option C
Pressing Ctrl + D will create a duplicate of the currently selected slide or the slide that is currently active in the
PowerPoint presentation. This shortcut is handy when you want to quickly replicate a slide and make modifications to the
copy without starting from scratch.
ac
Hence, C is the correct answer.
Answer: Option C
ac
Q.88
What shortcut key is commonly used to paste content in various applications?
A) Ctrl + V
B) Ctrl + P
C) Ctrl + O
D) Ctrl + C
E) Ctrl + X
Answer: Option A
Explanation-
• Ctrl + V is the correct shortcut key to paste content in various applications. It is widely used for pasting
text or objects that have been copied or cut to the clipboard.
• Alt + P pressing Alt + P opens the Page Layout tab in the Ribbon
• Shift + P Shift + P lets you capitalize the letter "p"
• Ctrl + C is the shortcut key for copying content to the clipboard, not for pasting.
• Ctrl + X is the shortcut key for cutting content, which removes it from its current location and copies it to
the clipboard. It is not used for pasting. ac
Answer: Option A
ac
Hence, C is the correct answer.
Answer: Option A
ac
Q.89
Which shortcut key is commonly used to open a new document in most text editing software?
A) Ctrl + N
B) Ctrl + S
C) Ctrl + O
D) Ctrl + C
E) Ctrl + X
Answer: Option A
Explanation
The correct answer is A) Ctrl + N.
• Ctrl + N is commonly used to open a new document. When you press Ctrl + N, it typically creates a new,
blank document or file, allowing you to start fresh with a new project or document.
• Ctrl + S is used to save a document,
• Ctrl + O is used to open an existing document,
• Ctrl + C is used to copy selected text or objects, and
• Ctrl + X is used to cut selected text or objects.
ac
Therefore, option A is the correct answer.
Q.90
Which of the following shortcut key will be used to Bold the Text in MS Word?
A. Ctrl + O
B. Ctrl + B
C. Ctrl + V
D. Ctrl + C
E. Ctrl + A