Core Module - 01
Core Module - 01
3. What is a boot sector virus? 8. Anti-static wrist straps are used to:
A. A virus that infects the master boot record A. Prevent damage to components due to
B. A virus that infects executable files static electricity
D. A virus that infects the operating system C. Connect components to the motherboard
Page | 1
10. When installing software, it's important to: 14. Malware is:
A. Ignore any prompts or warnings A. Beneficial software
B. Read and agree to the license agreement B. Malicious software
C. Install all software without considering C. A type of hardware
system requirements
D. A computer game
D. Share the installation file with others
ANSWER: B
ANSWER: B
30. What is the difference between a full installation 34. What is a window manager?
and a custom installation?
A. A software application that controls the
A. Full installation installs all components, placement and appearance of windows
while custom allows selecting specific
B. A hardware component that manages the
features.
display
B. Full installation is faster, while custom is
C. A type of input device
slower.
D. A network protocol
C. Full installation requires more disk space,
while custom requires less. ANSWER: A
D. There is no difference between the two.
ANSWER: A 35. What is a widget?
A. A small graphical element that performs a
specific function
31. What is a GUI?
B. A type of software application
A. A text-based interface for interacting with
a computer C. A hardware component
B. A graphical interface for interacting with D. A network protocol
a computer
ANSWER: A
C. A programming language
D. A type of hardware
36. Which of the following is an example of a CLI
ANSWER: B command?
A. Click on the "Start" button
32. Which of the following is an example of a GUI B. Type "ls" to list files and directories
element?
C. Double-click on an icon
A. Command prompt
D. Drag and drop a file
B. Icon
ANSWER: B
C. CLI
D. Terminal
ANSWER: B
Page | 4
37. What is a shell? 42. What is the purpose of the "mkdir" command in
Linux?
A. A hardware component
A. Make directory
B. A software application that provides a
CLI interface B. Move directory
C. A programming language C. Modify directory
D. A network protocol D. Delete directory
ANSWER: B ANSWER: A
38. What is Linux? 43. What is the purpose of the "rm" command in
Linux?
A. A type of hardware
A. Remove file or directory
B. A programming language
B. Rename file or directory
C. An operating system
C. Read file
D. A network protocol
D. Write to file
ANSWER: C
ANSWER: A
48. What is a database? 53. Which of the following is NOT a core component
of OpenOffice?
A. A collection of organized information
A. Writer
B. A type of software application
B. Excel
C. A hardware component
C. Calc
D. A network protocol
D. Impress
ANSWER: A
ANSWER: B
Page | 6
55. What is the purpose of styles in OpenOffice 59. What is a conditional formatting in OpenOffice
Writer? Calc?
A. To format text consistently A. Applying specific formatting based on
certain conditions
B. To create tables
B. A type of chart
C. To insert images
C. A formula for calculating values
D. To check spelling
D. A data validation rule
ANSWER: A
ANSWER: A
Page | 7
63. What is a connector in OpenOffice Draw? 67. How can you update a device driver?
A. A line that connects two objects A. Through the Device Manager
B. A type of shape B. By downloading the driver from the
manufacturer's website
C. A text box
C. Both A and B
D. A picture
D. Neither A nor B
ANSWER: A
ANSWER: C
Page | 8
71. How can you uninstall a device in the Device 75. What is real-time protection?
Manager?
A. An antivirus feature that constantly
A. Right-click the device and select monitors a computer for threats
"Uninstall device"
B. A type of antivirus software
B. Delete the device's driver file
C. A hardware component
C. Disconnect the device from the computer
D. A network protocol
D. Use the "Uninstall" program
ANSWER: A
ANSWER: A
Page | 9
79. What is a ransomware? 83. What is cleaning computer hardware?
A. Malware that encrypts files and demands A. Removing dust and debris from
a ransom to decrypt them components
B. A self-replicating program B. Replacing damaged components
C. A virus that infects executable files C. Upgrading the operating system
D. A type of antivirus software D. Installing new software
ANSWER: A ANSWER: A
80. What is a malware? 84. How often should computer hardware be cleaned?
A. A general term for malicious software A. Once a year
B. A specific type of virus B. Every six months
C. A hardware component C. Every three months
D. A network protocol D. Monthly
ANSWER: A ANSWER: C
Page | 10
87. What is BIOS? 92. What is a hard disk drive (HDD)?
A. Basic Input/Output System A. A type of primary storage
B. Binary Input/Output System B. A type of output device
C. Basic Internal Output System C. A type of input device
D. Built-in Input/Output System D. A type of network device
ANSWER: A ANSWER: A
Page | 12
104. Which of the following Operating System 108. Most widely used Text Editor is________
is not type of Linux?
A. Wordpad
A. BSD
B. Paint
B. Ubuntu
C. Photoshop
C. Redhat
D. Notepad
D. CentOS
ANSWER: D
ANSWER: A
114. An electronic tool that allows information 118. If you turn ON a PC and the unit is
to be input, processed, and output clearly ON but the monitor is dark, the problem
could be that:
A. Operating Systems
A. The monitor is not plugged in
B. Motherboard
B. The monitor is not turned on
C. Computer
C. The monitor is not plugged into the PC
D. CPU
D. Any or all of the mentioned
ANSWER: C
ANSWER: D
Page | 14
121. A message saying “Invalid drive 125. What program can be used to keep your
configuration” appears during the bootup of a PC. system up to date and patched up?
The problem most likely could be
A. Windows dispatcher
A. The hard drive cable is not attached to the
B. Windows Upgrade
controller
C. Windows Update
B. The hard drive has failed
D. Device Manager
C. The hard drive has no partitions
ANSWER: C
D. Any of the mentioned
ANSWER: D
126. What do we call the power protection
device that has a battery and provides a few
122. You have loaded a new video card on minutes of power?
your computer and now everything looks really
A. Generator
bad. What should you do first?
B. UPS
A. Check the log in the event viewer
C. Line conditioner
B. View the device manager and see if the
card is configured correctly. D. Surge suppressor
C. Go to the printed manual ANSWER: B
D. Restart the computer
ANSWER: B 127. What is the measurement unit of
resistance?
A. Ohms
123. Which of the following should be done
first to remove an application that you no longer B. Watts
need?
C. Volts
A. Delete the program files
D. Amperes
B. Use the uninstall program that came with
the application ANSWER: A
C. Task Manager
D. System Information
ANSWER: C
Page | 15
129. RS-232 is a standard that applies to? 133. ___________ is designed to solve a
specific problem or execute a specific task.
A. Serial Communication
A. Utility software
B. Parallel Communication
B. User software
C. Audio ports
C. Application software
D. Network ports
D. System software
ANSWER: A
ANSWER: C
131. What is the software that controls system 135. In a computer, an Operating System is an
performances called? example of
A. Overlay Software A. System Software
B. System Software B. Device drivers
C. Control Software C. Application Softwares
D. Application Software D. Custom Softwares
ANSWER: B ANSWER: A
Page | 16
137. Which of the following is NOT an 142. Cursor is a___________
Operating System?
A. Pixel
A. Windows
B. Thin blinking line
B. Android
C. Pointing indicator
C. Ubuntu
D. None of mentioned
D. None of the mentioned
ANSWER:C
ANSWER: D
150. File virus attaches itself to the file 154. mv command used for which purpose?
_____________
A. Renaming a file
A. source file
B. Move the file to different directory.
B. object file
C. None of the mentioned
C. executable file
D. Both A and B
D. all of the mentioned
ANSWER:D
ANSWER:C
Page | 18
155. Which of the following is primarily 159. Which of the following components
responsible for converting input (data) into remains on the motherboard?
meaningful output (information)?
A. CMOS battery
A. RAM
B. PCI slot
B. CPU
C. Case fan
C. Storage device
D. Expansion slot
D. Input and Output device
E. All of these
ANSWER: B
ANSWER: E
Page | 19
163. External devices/ peripherals like 167. Which command is used to display disk
keyboard and mouse can be connected to a consumption of a specific directory
computer using ______ ports.
A. du
A. PS/2
B. ds
B. USB
C. dd
C. both A & B
D. dds
D. neither A nor B
ANSWER: A
ANSWER: C
166. Which command changes a file’s group 170. The primary function of the CPU is:
owner
A. Storing data
A. cgrp
B. Processing data
B. chgrp
C. Inputting data
C. change
D. Outputting data
D. group
ANSWER: B
ANSWER: B
Page | 20
171. Which storage device is typically the 175. A graphics card is primarily used for:
fastest?
A. Processing text
A. Hard Disk Drive (HDD)
B. Processing audio
B. Solid State Drive (SSD)
C. Processing images and video
C. Optical Disk Drive (ODD)
D. Storing data
D. Magnetic Tape
ANSWER: C
ANSWER: B
Page | 22
188. When installing a power supply unit, it's 192. When uninstalling software, it's important
important to: to:
A. Connect all cables before securing the A. Delete the software folder manually
PSU
B. Use the operating system's uninstaller
B. Align the mounting holes correctly
C. Restart the computer before uninstalling
C. Install the PSU before the motherboard
D. Ignore any prompts or warnings
D. Apply thermal paste to the PSU
ANSWER: B
ANSWER: B
Page | 23
196. What is the purpose of the "cd" command 200. What is a shell script?
in Linux?
A. A graphical user interface script
A. Change directory
B. A text-based program that runs in a shell
B. Create directory environment
C. Copy directory C. A programming language
D. Delete directory D. A type of hardware
ANSWER: A ANSWER: B
197. What is the purpose of the "ls" command 201. What is the purpose of the "if" statement
in Linux? in a shell script?
A. List files and directories A. To perform conditional execution
B. Create a file B. To create loops
C. Copy a file C. To define functions
D. Delete a file D. To manipulate variables
ANSWER: A ANSWER: A
198. What is the purpose of the "mv" 202. What is a variable in a shell script?
command in Linux?
A. A named storage location for data
A. Move or rename files or directories
B. A keyword
B. Modify files or directories
C. A function
C. Make a copy of files or directories
D. A control structure
D. Delete files or directories
ANSWER: A
ANSWER: A
Page | 24
204. What is a function in a shell script? 208. What is a macro in Excel?
A. A reusable block of code A. A pre-defined formula
B. A variable B. A recorded series of actions that can be
automated
C. A control structure
C. A chart type
D. A command
D. A data validation rule
ANSWER: A
ANSWER: B
206. What is a query in a database? 210. What is the purpose of the "xargs"
command in a shell script?
A. A request for information from a database
A. Builds command lines from standard
B. A table in a database
input
C. A record in a database
B. Creating files
D. A field in a database
C. Modifying file permissions
ANSWER: A
D. Changing file ownership
ANSWER: A
207. What is a mail merge in Word?
A. Combining a document template with a
211. What is a pivot chart in Excel?
data source to create personalized
documents A. A graphical representation of pivot table
data
B. Sending an email from within Word
B. A type of chart
C. Merging multiple documents into one
C. A formula for calculating values
D. Formatting text in a specific style
D. A data validation rule
ANSWER: A
ANSWER: A
Page | 25
212. What is a conditional formatting in 216. What is the purpose of the "eval"
Excel? command in a shell script?
A. Applying specific formatting based on A. To evaluate an expression
certain conditions
B. To create a function
B. A chart type
C. To handle signals
C. A formula for calculating values
D. To change the working directory
D. A data validation rule
ANSWER: A
ANSWER: A
Page | 26
220. How do you enter a formula in 224. What is a slide master in OpenOffice
OpenOffice Calc? Impress?
A. Start with an equal sign (=) A. A predefined layout for slides
B. Use the "Formula" menu B. A type of chart
C. Click the "Formula" button C. A sound effect
D. All of the above D. A transition effect
ANSWER: A ANSWER: A
221. What is the function of the SUM function 225. What is a transition effect in OpenOffice
in OpenOffice Calc? Impress?
A. Adds a range of numbers A. The animation effect between slides
B. Averages a range of numbers B. A type of chart
C. Counts the number of cells C. A formula for calculating values
D. Finds the maximum value D. A data validation rule
ANSWER: A ANSWER: A
222. How do you create a chart in OpenOffice 226. How do you start a slide show in
Calc? OpenOffice Impress?
A. Use the "Insert" -> "Chart" menu A. Press the "F5" key
B. Use the "Data" -> "Chart" menu B. Click the "Slide Show" button
C. Use the "Format" -> "Chart" menu C. Use the "File" -> "Slide Show" menu
D. All of the above D. All of the above
ANSWER: A ANSWER: D
223. What is a pivot table in OpenOffice Calc? 227. What is OpenOffice Draw primarily used
for?
A. A type of chart
A. Creating text documents
B. A way to summarize and analyze data
B. Creating spreadsheets
C. A formula for calculating values
C. Creating presentations
D. A database function
D. Creating diagrams and illustrations
ANSWER: B
ANSWER: D
Page | 27
228. What is a table in OpenOffice Base? 233. What is the Event Viewer used for?
A. A collection of related data A. Viewing system events and errors
B. A type of chart B. Managing hardware devices
C. A query C. Creating system restore points
D. A form D. Monitoring network activity
ANSWER: A ANSWER: A
229. What is a query in OpenOffice Base? 234. What is the purpose of the Event Viewer
in troubleshooting computer problems?
A. A request for specific data from a
database A. To identify potential causes of issues
B. A table B. To fix problems automatically
C. A form C. To prevent future problems
D. A report D. To delete unnecessary files
ANSWER: A ANSWER: A
230. What is a form in OpenOffice Base? 235. How do you open the Device Manager in
Windows?
A. A user interface for entering and editing
data A. Right-click the Start button and select
"Device Manager"
B. A table
B. Open the Control Panel and select
C. A query
"Device Manager"
D. A report
C. Both A and B
ANSWER: A
D. None of the above
ANSWER: C
231. What is a report in OpenOffice Base?
A. A formatted presentation of data
236. What is a logical drive?
B. A table
A. A physical division of a hard drive
C. A query
B. A logical division of a partition
D. A form
C. A file system format
ANSWER: A
D. A type of file
ANSWER: B
232. What is the NTFS file system?
A. A file system developed by Apple
B. A file system developed by Linux
C. A file system developed by Microsoft
D. A file system developed by Sony
ANSWER: C
Page | 28
237. What is the purpose of disk cleanup? 241. How can you save an event log for later
analysis?
A. Deleting unnecessary files
A. By exporting it to a text file
B. Combining fragmented files into
contiguous blocks B. By copying and pasting the contents
C. Creating a backup of the hard drive C. By saving it as a CSV file
D. Checking for errors on the hard drive D. By printing the log
ANSWER: A ANSWER: A
238. What is a custom view in the Event 242. What is the purpose of the "Scan for
Viewer? hardware changes" option in the Device
Manager?
A. A predefined filter for events
A. To detect newly installed or modified
B. A user-defined filter for events
hardware
C. A type of event log
B. To fix hardware problems
D. A way to clear event logs
C. To uninstall hardware
ANSWER: B
D. To update device drivers
ANSWER: A
239. What is the purpose of the Clear Event
Log option?
243. How can you troubleshoot a device
A. Deletes all events from a log
problem using the Device Manager?
B. Deletes events older than a specified date
A. Check for yellow exclamation marks
C. Deletes events from a specific source
B. Update device drivers
D. Deletes events with a specific event ID
C. Uninstall and reinstall the device
ANSWER: A
D. All of the above
ANSWER: D
240. What is the difference between an error
event and a warning event?
244. What is a keylogger?
A. Error events indicate a critical problem,
while warning events indicate a potential A. Software that records keystrokes
issue
B. A virus that infects executable files
B. Error events are less severe than warning
C. A type of antivirus software
events
D. A hardware component
C. There is no difference between the two
ANSWER: A
D. Error events are always generated by
hardware, while warning events are
always generated by software
ANSWER: A
Page | 29
245. What is a polymorphic virus? 249. What is the purpose of using surge
protectors?
A. A virus that changes its code to avoid
detection A. To protect computer equipment from
power surges
B. A virus that infects multiple files
B. To increase internet speed
C. A type of antivirus software
C. To improve computer performance
D. A hardware component
D. To reduce noise
ANSWER: A
ANSWER: A
Page | 30
253. What is a server? 257. What is encryption?
A. A computer that provides services to A. Converting data into a secret code
other computers
B. Speeding up data transfer
B. A computer that requests services from
C. Compressing data
other computers
D. Storing data
C. A software application
ANSWER: A
D. A network device
ANSWER: A
258. Types of malware is?
A. Caterpillars
254. What is a client?
B. Worms
A. A computer that provides services to
other computers C. Lions
B. A computer that requests services from D. Horses
other computers
ANSWER:B
C. A software application
D. A network device
259. Which one Not a linux distribution?
ANSWER: B
A. debian
B. gentoo
255. What is the client-server model?
C. open SUSE
A. A distributed computing model where
clients request services from servers D. multicsr
Page | 31
261. Antivirus software is an example 265. A strong password should contain these
of______ are
A. business software A. Both uppercase and lowercase letters.
B. an operating system B. A word that is easy to remember, such as
the name of a pet.
C. a security utility
C. At least 8 characters, and a combination
D. An office suite
of letters, numbers, and characters.
ANSWER:C
D. None of the mentioned
ANSWER:C
262. Which of the following self-replicating
software that causes damages to file and system?
266. What is the first boot sector virus?
A. Viruses
A. Brain
B. Trojan horses
B. Mind
C. Bots
C. ELK cloner
D. Worms
D. None of the mentioned
ANSWER:D
ANSWER:A
Page | 32
269. The taskbar located in the windows (by 273. Pressing and releasing the left mouse
default) _________- button quickly is called______
A. On the start menu A. clicking
B. At the bottom of the screen B. dropping
C. On the quick launch toolbar C. pointing
D. at the top of the screen D. dragging
ANSWER:B ANSWER:A
270. Date and Time are available on the 274. Graphics Application in windows named
desktop at is________
A. Key board A. Brush
B. recycle Bin B. Notepad
C. My computer C. paint
D. Task bar D. Fill
ANSWER:D ANSWER:C
271. The computer administrative tools is 275. The distance between lines in a paragraph
called is called_________.
A. Control panel A. Spacing
B. Start button B. Word Spacing
C. Internet explorer C. Line Spacing
D. Recycle bin D. Row Spacing
ANSWER:A ANSWER:C
272. Elements is used to manage files & 276. Which of the following is an example of
folders is open source software?
A. Control panel A. Adobe Photoshop
B. Windows B. Microsoft Word
C. Window explorer C. Libre Office
D. Internet explorer D. Skype
ANSWER:C ANSWER:C
Page | 33
277. Shortcut key used in Word select 281. Which of the following is NOT a type of
everything pliers.
A. Ctrl+S A. Electronic
B. Ctrl+Alt+Delete B. Pump
C. Ctrl+N C. Flush cutter
D. Ctrl+A D. Square
ANSWER:D ANSWER: D
278. Watermark uses of word document 282. A computer program which is designed to
is______ help people perform an activity using the
computer.
A. Text
A. Internet
B. Image
B. Application
C. Both A & B
C. Hardware
D. None of the mentioned
D. Software
ANSWER:C
ANSWER: B
Page | 34
285. All the parts of the computers are 289. Which of the following should be used to
connected to this part and this allows all the part extinguish a computer fire?
of the computer to work together
A. Fire hose
A. Operating System
B. Class A extinguisher
B. Disk Drive
C. Class C extinguisher
C. Output Device
D. Silver Foam Water
D. Motherboard
ANSWER: C
ANSWER: D
Page | 35
293. If a program is being executed, we call it 297. Which of the following can be transferred
a ___________ over HDMI cable?
A. Task A. Video
B. Instance B. Sound
C. Instruction C. Video and Sound
D. Process D. Neither Video nor Sound
ANSWER: D ANSWER: C
294. Choose the correct statement from the 298. Which type of connector is mostly used
following. these days to connect to network cards?
A. Software is a collection of programs A. BNC
B. A program is a collection of software B. 6 pin
C. There is no relation between software and C. RJ-11
program
D. RJ-45
D. Software becomes a program after
ANSWER: D
installation
ANSWER: A
299. From the following choose the option
which is NOT system software.
295. What beep codes may indicate a system
A. MS Office
board or power supply failure?
B. Language translator
A. No beep
C. Navigator
B. Continuous beep
D. Utility
C. Steady long beeps
ANSWER: A
D. All of the mentioned
ANSWER: D
300. Who takes care of running and loading
programs by use of peripherals?
296. What are physical ports on a computer
A. Operating System
usually referred to as?
B. Control System
A. Buses
C. Dump programs
B. Jacks
D. Function System
C. Interfaces
ANSWER: A
D. Hardware plugs
ANSWER: C
301. Uninstalling an application can be done
only by removing the program folder.
A. True
B. False
ANSWER: B
Page | 36
302. Some software in linux is assembled 306. Syntax used to get the following
using other programs in order to use.this is called: permissions -rwxrw-rw-
A. Creating A. chmod 744
B. Initiating B. chmod 766
C. Compiling C. chmod 777
D. Programming D. chmod 754
ANSWER: C ANSWER: B
303. Linux has configuration files stored in 307. Which program provides user access to
one folder.What is the folder name? delete files in Windows OS?
A. etc A. Window Manager
B. var B. Window Explorer
C. bin C. Internet Explorer
D. home D. Start Menu
ANSWER: A ANSWER: B
304. Evaluates the bash order of evalution to 308. Window task bar shows which programs
determine the first instance to the given command are currently running on the computer
A. type A. True
B. which-a B. False
C. which ANSWER: A
D. hash
ANSWER: A 309. Adding new peripherals(hardware) to
your computer often requires what software to
allow Windows to communicate with the new
305. Which will return a value of 9: hardware?
A. echo $[[4+5]] A. Application Software
B. echo $((4+5)) B. Driver
C. echo [4+5] C. Passenger
D. echo "4+5" D. Installers
ANSWER: B ANSWER: B
Page | 37
310. What program shows the user how much 314. TPI stands for
free space remains on their hard drive?
A. Tongs passing increments
A. Window Explorer
B. Triangle penetrating increments
B. Window Manager
C. Teeth per inch
C. Internet Explorer
D. Tangible penetrating instruments
D. Task Managment
ANSWER: C
ANSWER: A
Page | 38
318. Firewall is__________ 322. Computer gets the input with the help of
A. A program that protects against viruses. A. mouse and keyboard
B. A wall that is reinforced and cannot catch B. joystick
on fire.
C. printer
C. A filter for an internet connection that
D. both a and b
monitors outgoing and incoming activity.
ANSWER: D
D. None of the mentioned
ANSWER:C
323. Which of the following are not input
devices?
319. Which among the following is the fastest
A. Keyboard, trackball, light pen
memory in a computer that holds information?
B. Barcode reader, OMR, OCR, MICR
A. Register
C. Biometric sensor, scanner, Mic
B. Cache
D. Plotter, projector, headphones
C. Main memory
ANSWER: D
D. RAM
ANSWER: A
324. CPU is fabricated on a single integrated
circuit board that is known as
320. Which of the following are the
A. Motherboard
predominant manufacturers for desktop and
laptop processors? B. Microprocessor
A. Intel C. CU
B. AMD (Advanced Micro Devices) D. ALU
C. Motorola ANSWER: B
D. Both A and B
ANSWER: D 325. Monitor is connected to a computer using
______ port.
A. RS232/ serial
321. Which bus is used to carry data to and
from the memory? B. PS/2
A. Address bus C. VGA (Video Graphics Array)
B. Data bus D. LPT (Line printer Terminal)
C. Control bus ANSWER: C
D. None of these
ANSWER: B
Page | 39
326. On a dot matrix printer, you should never 330. Secondary storage of a computer
lubricate which part? performs______operation
A. carriage rails A. Volatile
B. printhead pins B. Non-volatile
C. paper advance bearings C. Complex
D. carriage bearings D. Non-circuit
ANSWER: B ANSWER:B
327. Which provides the fastest data access 331. The most common buses inside the
time? microcomputer are
A. RAM A. Address bus
B. ROM B. Address bus and Data bus
C. CD-ROM C. Address bus and Control bus
D. Hard disk D. Address bus, Data bus, and Control bus
ANSWER: A ANSWER: D
328. What is the first thing you could do to 332. Which command creates an empty file if
check for damage to a printer after receiving it? file does not exist?
A. Run MSD diagnostics A. cat
B. Attach it to a PC and print something B. touch
C. Check the cables C. ed
D. Unbox it and examine it for physical D. read
damage
ANSWER: B
ANSWER: D
Page | 40
334. A rollback is used to: 338. What is a database relationship?
A. Restore a system to a previous state A. A connection between two tables based
on a common field
B. Upgrade the operating system
B. A formula for calculating values
C. Install new software
C. A chart type
D. Increase system performance
D. A report format
ANSWER: A
ANSWER: A
Page | 41
342. What is a soft link in Linux? 346. What is the purpose of the "getopts"
command in a shell script?
A. A physical copy of a file
A. To parse command-line arguments
B. A pointer to another file
B. To create functions
C. A type of hardware device
C. To handle signals
D. A network protocol
D. To perform arithmetic operations
ANSWER: B
ANSWER: A
Page | 42
350. What is the difference between single 353. What is a relative cell reference in
quotes and double quotes in a shell script? OpenOffice Calc?
A. Single quotes treat all characters literally, A. A cell reference that changes when a
while double quotes allow variable formula is copied
expansion
B. A cell reference that remains constant
B. Single quotes allow variable expansion, when a formula is copied
while double quotes treat all characters
C. A type of chart
literally
D. A data validation rule
C. There is no difference between single
quotes and double quotes ANSWER: A
D. Single quotes are used for strings, double
quotes for numbers
354. What are the three main types of logs in
ANSWER: A the Event Viewer?
A. System, Application, and Security
351. What is the purpose of the "here B. Error, Warning, and Information
document" (<<) in a shell script?
C. Critical, Error, and Warning
A. To redirect output to a file
D. Debug, Information, and Verbose
B. To create a multi-line string
ANSWER: A
C. To define a function
D. To handle signals
355. What is a hidden device in the Device
ANSWER: B Manager?
A. A device that is physically broken
352. What is an absolute cell reference in B. A device that is not currently installed
OpenOffice Calc?
C. A device that is not visible by default
A. A cell reference that changes when a
formula is copied D. A device that is malfunctioning
Page | 43
357. What is latency? 361. How do we comment in shell script?
A. The time taken for a data packet to travel A. #
from one point to another
B. /* */
B. The error rate of a communication
C. '
channel
D. //
C. Amount of data that can be transmitted
over a communication channel in a given ANSWER: A
amount of time
D. The type of network topology
362. cd command in Linux is used for;
ANSWER: A
A. Change directory
B. Copy dictionary
358. How can you filter events in the Event
Viewer? C. Create directory
Page | 45
374. Cable management is important for: 379. Which component stores the BIOS?
A. Better aesthetics A. ROM
B. Reducing noise B. HDD
C. Improving airflow C. SSD
D. All of these D. RAM
ANSWER: D ANSWER: A
375. Disk Management is primarily used for 380. Which unit is used to measure the speed
of CPU:
A. Managing files and folders
A. Hertz
B. Managing hardware devices
B. Bytes
C. Managing system processes
C. Bits
D. Managing network connections
D. Watts
ANSWER: A
ANSWER: A
Page | 46
383. What is bandwidth? 387. Which is not a System tool?
A. The amount of data that can be A. Files
transmitted over a communication
B. Backup
channel in a given amount of time
C. Scandisk
B. The distance between two points on a
network D. Format
C. The number of devices connected to a ANSWER:A
network
D. The type of network topology
388. Dir/W is
ANSWER: A
A. Show all details of file
B. Show only file name and directory name
384. The clock speed of a CPU determines:
C. Shows only directory
A. The amount of data it can process
D. All of the mentioned
B. The speed at which it can execute
instructions ANSWER:B
393. What type of file system is used in most 396. The operations of the arithmetic unit and
modern Linux Operating Systems? the control unit in a computer are controlled by
A. FAT32 A. ALU itself
B. FAT16 B. Control Unit itself
C. NTFS C. Applications
D. EXT4 D. Memory Unit
ANSWER: D ANSWER: B
394. What is the difference between touch and 397. The programs and data currently being
cat command? processed by CPU is stored in
A. cat command is used to create the file A. Mass Memory
with content whereas touch command is
B. RAM
used to create a file without any content.
C. PROM
B. touch command is used to create the file
with content whereas cat command is D. Non-volatile Memory
used to create a file without any content.
ANSWER: B
C. cat command is used to create the folder
with content whereas touch command is
used to create a folder without any 398. Which of the following controls the
content. process of interaction between the user and the
D. touch command is used to create the file computer?
with content whereas cat command is A. User interface
used to create a folder without any
content. B. Screensaver
ANSWER: A C. Platform
D. Language translator
ANSWER: A
Page | 48
399. What characteristic of read-only memory 403. If the Windows system resources drop
(ROM) makes it useful? below 60%, the system is likely to
A. ROM information can be easily updated. A. Overheat
B. Data in ROM is non-volatile, that is, it B. Crash
remains there even without electrical
C. Run optimally if it has an Intel chip
power.
D. Anti-virus systems start running
C. ROM provides very large amounts of
inexpensive data storage. ANSWER: B
D. ROM chips are easily swapped between
different brands of computers
404. How do you know the right direction of
ANSWER: B plugging in an unscreened flat ribbon cable into a
connector?
A. The red line in the cable goes to the
400. A light-sensitive device that converts
highest pin number
drawing, printed text or other images into digital
form is B. The colored line in the cable goes to the
first pin
A. Keyboard
C. The colored line in the cable goes to the
B. Scanner
last pin
C. Plotter
D. It can be connected in any way.
D. OMR
ANSWER: B
ANSWER: B
402. What is GPF? 406. To test the serial and parallel ports on
your computer, which of the following tools
A. A hard drive with insufficient space
might be used?
B. Part of the Microsoft General Procedures
A. High Volt probe
Windows Format toolkit
B. Cable Scanner
C. A Windows General Protection Fault
C. Oscilloscope
D. None of the mentioned
D. Loopbacks (Wrap Plugs)
ANSWER: C
ANSWER: D
Page | 49
407. How can the CMOS be cleared, including 411. How many pins are there in the USB-C
the password? Connector?
A. Unplug the PC A. 12
B. Unplug the PC and remove the CMOS B. 24
battery
C. 16
C. Run a CMOS command from the
D. 20
command line
ANSWER: B
D. It is not possible
ANSWER: B
412. The software can be installed on a
computer by
408. What could result in a fixed disk error?
(i) Simply copying the software into a folder
A. No CD-Drive installed on the computer
B. Bad RAM (ii) Running an installation procedure to
make the software executable
C. Incorrect CMOS settings
A. Only (i)
D. Bad ROM
B. Only (ii)
ANSWER: C
C. Neither (i) nor (ii)
D. Both (i) and (ii)
409. What is the bus architecture used by
SATA cables? ANSWER: D
A. Parallel
B. Serial 413. The supermarket near your house has
installed a new inventory management system.
C. Depends on the chipset used
What type of software is that?
D. Multiplexed
A. Operating System
ANSWER: B
B. Communications Software
C. System Software
410. How many pins does a PS/2 connector
D. Database Software
have?
ANSWER: D
A. 5
B. 9
C. 12
D. 6
ANSWER: D
Page | 50
414. Select the correct statement about 417. Which command are using view Hidden
application software files?
(i) First, the user deals with system software A. ls -a
and then deals with application software.
B. ls -l
(ii) It is programmed for simple as well as
C. ls -h
complex tasks.
D. Is -k
(iii) It can only be installed on a computer.
ANSWER:A
(iv) It can be a single program or a group of
small programs that are referred to as an
application suite.
418. Which command is used to change
A. All the above statements are correct password of linux system?
B. Only (i), (ii), and (iv) A. password
C. Only (i), (ii), and (iii) B. pass
D. Only (i) and (ii) C. change -p
ANSWER: B D. passwd
ANSWER:D
415. Which of the following is NOT a function
performed by application software?
419. Which of the following command is used
A. Managing Information to print the login shell of an user?
B. Manipulating Data A. echo $SHELL
C. Calculating figures B. echo $LSHELL
D. Memory Management C. echo $LOGIN
ANSWER: D D. None of the mentioned
ANSWER:A
416. Which command is used to view
processes running in the background in linux?
420. Which of the following command is used
A. ls delete the directory?
B. bg A. Deltree/f
C. jobs B. Erase *.*
D. dmsg C. Deltree *.*
ANSWER:C D. Del *.*/p
ANSWER: C
Page | 51
421. We can change the thickness of a line 425. Open office writer is not compatible with
from _______ these extension?
A. Line width A. txt
B. Line Height B. doc
C. Line Thick C. sxw
D. Line Style D. csv
ANSWER:D ANSWER:D
422. Color and pattern used to fill a closed 426. List of files are waiting to be printed on
shape is called___________ printer is called
A. Shapes A. print list
B. Word B. print stack
C. Fill Style C. print queue
D. Fill Back D. print line
ANSWER: C ANSWER:C
Page | 52
429. Home directory represented by a _______ 433. which of the following attacks firewall
symbol. protects is?
A. # A. Phishing
B. ~ B. Dumpster diving
C. ! C. Denial of Service (DoS)
D. $ D. Shoulder surfing
ANSWER:B ANSWER:C
430. Which of the command will be used to 434. Not a reason why people create a
delete all the files from the current directory ? computer virus ?
A. rm ? A. Protection
B. rm ?* B. Identity theft
C. rm [*1 C. Pranks
D. rm * D. Research purpose
ANSWER:D ANSWER:A
431. Which module gives control of the CPU 435. How to set the environmental variable in
to the process selected by the short-term Linux?
scheduler?
A. grep i NAME=VALUE
A. dispatcher
B. grep NAME=VALUE
B. interrupt
C. export NAME=VALUE
C. schedule
D. env NAME=VALUE
D. None of the mentioned
ANSWER: C
ANSWER:A
Page | 53
437. When is it mandatory to use a antivirus 441. How to check how long the windows
on linux machine? machine was running in windows machine?
A. While updating the softwares in linux A. System time in Administration Tab
B. For Upgrading linux versions B. System up time in Administration Tab
C. When running linux based C. System wakeup time in Performance Tab
fileserver/mailserver
D. System up time in Performance Tab
D. While executing the linux commands in
ANSWER: D
shell
ANSWER: C
442. Which of the following statement is
correct in windows?
438. How to find a word hello in a
A. MSI is used only with installers
welcome.txt file using linux command?
B. MSI files cannot be used with installers
A. grep welcome.txt find "hello"
C. MSI & EXE can be executed with
B. grep "hello" welcome.txt
installers
C. grep --find "hello" welcome.txt
D. Something else
D. find "hello" welcome.txt
ANSWER: C
ANSWER: B
440. What is the following command used to 444. Which register holds the actual
check the IP Address of the machine using instruction being executed currently by the
command prompt? computer?
A. ipcheck A. Memory address register (MIR)
B. ipaddress B. Instruction register (IR)
C. ipaddr C. Memory data register (MDR)
D. ipconfig D. Program counter register
ANSWER: D ANSWER: B
Page | 54
445. Which register holds the address of the 449. A device that allows entering data and
current instruction being executed? instruction into a computer system is called
A. Instruction register A. interaction
B. Memory data register (MDR) B. terminal
C. Stack register C. communication
D. Program counter D. input
ANSWER: D ANSWER: D
446. Which register holds the address of a 450. Which of the keys are also known as
memory location? modifier keys?
A. Memory data register A. Shift
B. Memory address register B. Ctrl
C. Status register C. Alt
D. Stack address D. All the above
ANSWER: B ANSWER: D
447. Which register shows the results of 451. Which keys are also known as toggle
arithmetic and logical operations such as carry, keys?
overflow, negative?
A. Caps lock, Num lock
A. Stack register
B. Control key, Enter key
B. Status register
C. Shift, Esc
C. Memory data register
D. Both a and b
D. Memory buffer
ANSWER: A
ANSWER: B
Page | 55
453. Which key is used to open the Start 457. Which of the following device provides
menu? surge protection and battery backup power during
a power outage?
A. Windows
A. Battery strip
B. Alt
B. Surge strip
C. Ctrl + Alt
C. UPS
D. None of these
D. USB
ANSWER: A
ANSWER: C
Page | 56
461. What is the full form of DMA? 465. Most PCs give a single beep on bootup to
indicate they are ok hardware wise. You boot
A. Direct memory access
your PC and don’t get a beep. What should you
B. Dynamic memory access check first?
C. Double memory access A. system board
D. None of these B. RAM
ANSWER: A C. microprocessor
D. speaker
462. Internal memory of central processing ANSWER: D
unit is nothing but
A. a set of registers
466. _____ is the term used to refer to the
B. a set of ALU and CU process of two modems establishing
communications with each other.
C. buses
A. interacting
D. None
B. handshaking
ANSWER: A
C. connecting
D. linking
463. Which memory is used for storing data
and program instructions currently being executed ANSWER: B
by CPU?
A. Mass memory
467. The opening provided in the front panel
B. Auxiliary memory or rear panel of a CPU for connecting peripherals
is called _____.
C. Internal memory
A. socket
D. Non-volatile memory
B. pin
ANSWER: C
C. port
D. part
464. Which of the following key should be
pressed to move to the beginning of a line of text? ANSWER: C
A. Page up
B. Shift 468. External dialup MODEM can be
connected to a computer using ______ port.
C. Home
A. RS232/ serial
D. Enter
B. PS/2
ANSWER: C
C. VGA
D. LPT
ANSWER: A
Page | 57
469. Home Key helps of 473. You suspect that a virus has entered your
PC. What will not be affected by the virus?
A. Moves the cursor beginning of the
document A. Program Files
B. Moves the cursor beginning of the B. Boot sector
paragraph
C. CD in the CD-Drive
C. Moves the cursor beginning of the screen
D. CMOS
D. Moves the cursor beginning of the line
ANSWER: D
ANSWER:D
472. You suspect that your system is failing to 476. What access rights are required for the
boot because of a corrupt master boot record. /etc/shadow file?
Which utility is the best to fix this?
A. -r--------
A. Device Manager
B. -rw-rw-r--
B. Task Manager
C. -r--r-----
C. Recovery Console
D. -rwxr--r--
D. Automated System Restore
Answer: A
ANSWER: C
Page | 58
477. Which command will immediately shut
down a computer running Linux?
A. shutdown
B. telinit 6
C. shutdown now
D. telinit 0
Answer: D
Page | 59