This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Monday, April 25, 2016

Computer Test

1. Cipher is a key–pad that can be used to ––––
1) Control access into areas 
2) Work for all 
3) Control specific task
4) All of the above 
5) None of these

2. What is the primary goal of a computer system ?
1) To utilize the stored data 
2) To start the application
3) To turn data into information 
4) All of the above 
5) None of these

3. An organized collection of data about a single entity is called ––––
1) Directory 
2) File 
3) Sub–directory 
4) Database 
5) None of these

4. User–friendly means –––
1) Easy to use, operate and understand etc.
2) Understood by means of straight forward guide.
3) Process that makes it easier for novice to use a computer.
4) All of the above
5) None of these

5.Which is not a functions of firewall ?
1) To block websites from being able to access your computer.
2) To regulate some of the flow of traffic between computers networks of different trust level.
3) It stops anyone on the outside from establishing a connection with a computer in your private network.
4) Only 2 and 3
5) None of these

6. The Process of analyzing the data stored with the back office staff is known as ––––
1) Data mining 
2) Data migration 
3) Data entry 
4) Data interpretation 
5) Data warehousing

7.What term is used for the occurrence of values for data elements more than once ?
1) Concurrency 
2) Redundancy 
3) Enumeration 
4) Iteration 
5) None of these

8. Which of the following is a high level language ?
1) Java script 
2) Php 
3) C# 
4) C 
5) All of the above

9. CUI stands for –––
1) Character User Interface 
2) Central User Intercom
3) Common User Interface 
4) Control User Interface 
5) None of these

10. 1024 MB = ?
1) 1 YB 
2) 1 KB 
3) 1 PB 
4) 1 ZB 
5) None of these

11. What is a shortcut key to print the current page or document ?
1) Alt + P 
2) Ctrl + V 
3) Ctrl + P 
4) Shift + P 
5) None of these

12. .jpeg stands for –––
1) Joint Photographic Experts Group 
2) JPEG image file
3) Power point presentation 
4) Multiple network graphic
5) None of these

13.Who was the inventor of world wide web ?
1) Marks Zuckerberg 
2) Tim Berners Lee 
3) Thomas Reardon 
4) Ray Tomlinson 
5) Henery A Rowland

14. Logo of amazon.com indicates that ––––
1) Look at the top
2) Save your time and money
3) You can get everything from A to Z
4) Best deal on amazon
5) None of these

15. The first spam email was sent by –––
1) Gary Thuerk 
2) Adi Shamir 
3) Alan Kay 
4) Charles Thomas 
5) Henry Phillips

Answers:
1. 1 
2. 3 
3. 2 
4. 4 
5. 5
6. 1 
7. 2 
8. 5 
9. 1 
10. 5
11. 3 
12. 1 
13. 2 
14. 3 
15. 1

Monday, April 11, 2016

Computer Awareness Test

1. What is the term for unsolicited e-mail ?
(1) newsgroup
(2) Usenet
(3) backbone
(4) spam 
(5) flaming

2. The code for a Web page is written using ——
(1) a fifth generation language
(2) Hypertext Markup Language
(3) Win Zip        
(4) Perl
(5) URL 

3. Internet uses
(1) Telex switching
(2) Circuit switching
(3) Telephone switching
(4) Packet switching  
(5) None of these

4. When the pointer is positioned on a ______ , it is shaped like a hand.
(1) hyperlink
(2) grammar error
(3) screen tip
(4) spelling error
(5) formatting error 

5. Internet is
(1) a local computer network
(2) a world wide network of computers
(3) a world wide interconnected network of computers which use a common protocol to communicate with one another
(4) an interconnected network of computers
(5) None of these

6. Which facilities is/are available on the internet are 
(i) electronic mail
(ii) remote login
(iii) file transfer
(iv) word processing

(1) i,ii
(2) ii, iii and iv
(3) i.ii.iv 
(4) i, ii.iii 
(5) None of these

7.  Internet requires
(1) an international agreement to connect computers
(2) a commonly agreed set of rules to communicate between computers
(3) a local area network
(4) a LAN wire
(5) None of these

8.  Each computer connected to the internet must
(1) be an IBM PC
(2) be internet compatible
(3) have a unique IP address
(4) have a modem connection
(5) None of these

9.  IP address is currently
(1) None of these
(2) available in plenty
(3) 6 bytes long
(4) not assigned as it is all used up
(5) 4 bytes long

10. IP addresses are converted to
(1) a binary string
(2) a hierarchy of domain names
(3) alphanumeric string
(4) a hexadecimal string
(5) None of these

Answers
1.   4
2.   2
3.   4
4.   1
5.   3
6.   4
7.   2
8.   3
9.   5

Saturday, April 2, 2016

Computer practice questions

                                                         Computer Test

1. To change selected text to all capital letters, click the change case button, then click
1) Uppercase
2) Upper all
3) Capslock
4) Lock Upper
5) Large Size

2. A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a
1) hacker
2) analyst
3) instant messenger
4) programmer
5) spammer

3. A device that connects to a network without the use of cables is said to be
1) distributed
2) free
3) centralized
4) open source
5) None of these

4. Reusable optical storage will typically have the acronym
1) CD
2) DVD
3) ROM
4) RW
5) ROS

5. The most common type of storage devices are
1) persistent
2) optical
3) magnetic
4) flash
5) steel

6. Codes consisting of lines of varying widths or lengths that are computer readable are known as
1) an ASCII code
2) a magnetic tape
3) a bar code
4) an OCR scanner
5) None of these

7. A Web site’s main page is called its
1) Homepage
2) Browser page
3) Search Page
4) Bookmark
5) None of these

8. Part number, part description, and number of parts ordered are examples of
1) control
2) output
3) processing
4) feedback
5) input

9. To access properties of an object, the mouse technique to use is
1) dragging
2) dropping
3) right-clicking
4) shift-clicking
5) None of these

10. Computers use the ________ number system to store data and perform calculations.
1) binary
2) octal
3) decimal
4) hexadecimal
5) None of these

11. ________ are attempts by individuals to obtain confidential information from you by falsifying their identity.
1) Phishing trips
2) Computer viruses
3) Spyware scams
4) Viruses
5) Phishing scams

12. Why is it unethical to share copyrighted files with your friends?
1) It is not unethical, because it is legal.
2) It is unethical because the files are being given for free.
3) Sharing copyrighted files without permission breaks copyright laws.
4) It is not unethical because the files are being given for free.
5) It is not unethical - anyone can access a computer

13. Which of the following can be used to select the entire document?
1) CTRL + A
2) ALT + F5
3) SHIFT + A
4) CTRL + K
5) CTRL + H

14. To instruct Word to fit the width of a column to the contents of a table automatically, click the________ button and then point to AutoFit Contents.
1) Fit to Form
2) Format
3) Auto-size
4) Contents
5) Auto Fit

15. The simultaneous processing of two or more programs by multiple processors is
1) multiprogramming
2) multitasking
3) time-sharing
4) multiprocessing
5) None of these

Answers..
1. 1  2. 1   3. 5   4. 4   5. 3   6. 3   7. 1  8. 5   9. 3   10. 1    11. 1   12. 3   13. 1   14. 5  15. 4