1.
The operation of combining two cells into a single cell in Excel is referred to as ________.
Answer: Option 'B'
The operation of combining two cells into a single cell in Excel is referred to as merge cells.
2.
Programs designed to perform specific tasks related to managing computer resources are called_____.
Answer: Option 'C'
Application software (an application) is a set of computer programs designed to permit the user to perform a group of coordinated functions, tasks, or activities. Application software cannot run on itself but is dependent on system software to execute.
3.
In Excel, a ______ is identified by the cell in the upper-left corner and the cell in the lower-right corner, separated by a colon.
Answer: Option 'D'
range
4.
Telnet is a _______ based computer protocol
Answer: Option 'B'
Telnet is a session layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP)
5.
Which type of software is similar to an accountant’s worksheet?
Answer: Option 'C'
A spreadsheet is an interactive computer application for organization, analysis and storage of data in tabular form.Spreadsheets are developed as computerized simulations of paper accounting worksheets.
6.
Which device uses a handheld operating system?
Answer: Option 'A'
A tablet (along with smartphone)is one of the most commonly used handheld devices. It uses handheld OS like Android, iOS, Symbian etc
7.
Signals can be analog or digital and a computer that processes the both type of signals is known as?
Answer: Option 'C'
Hybrid Computer
8.
Information that comes from an external source and fed into computer software is called ______.
Answer: Option 'B'
Information that comes from an external source and fed into computer software is called Input.
9.
A computer system includes
Answer: Option 'D'
All are the parts of a computer system.
10.
A remote control that is used to turn on or off some machine is called__________
Answer: Option 'B'
interface
11.
Which among the following is a software package from Sun Microsystems?
Answer: Option 'B'
JDK
12.
A system call of OS which is used to create a new process is known as ________
Answer: Option 'C'
Fork
13.
‘Handshaking’ in Networking parlance means ______.
Answer: Option 'A'
Handshaking is a networking process where two computers establish a connection. Handshaking occurs when packets of data are exchanged between two computers.
Note: Handshaking is the action of exchanging standardized signals between devices in a computer network to regulate the transfer of data.
14.
Which of the following groups contains graphical file extensions?
Answer: Option 'A'
JPG, GIF, BMP
15.
The main directory of a disk is called the ____ directory.
Answer: Option 'A'
In a computer file system, and primarily used in the Unix and Unix-like operating systems, the root directory is the first or top-most directory in a hierarchy. It can be likened to the trunk of a tree, as the starting point where all branches originate from.
16.
Which one of the following is a key function of a firewall?
Answer: Option 'A'
A firewall is a network security system that monitors and controls the incomingand outgoing network traffic based on predetermined security rules.
17.
What is the full form of SIM?
Answer: Option 'C'
A subscriber identity module (SIM) is an integrated circuit that is intended to securely store the international mobile subscriber identity (IMSI) number and its related key, which are used to identify and authenticate subscribers on mobile telephony devices.
18.
Which of the following transactions requires maximum security?
Answer: Option 'B'
Master file manipulations require maximum security.
High level security access controls should be placed to check the authority and authenticity of the individuals or processes making manipulation to master files.
19.
Objects on the slide that hold text are called _______
Answer: Option 'A'
Place holders
20.
_______ is the integration of digital information with the user’s environment in real time.
Answer: Option 'B'
Augmented Reality
21.
_______ is a way to quickly access a favorite website by saving it in your browser
Answer: Option 'B'
Bookmark
22.
Which of the following are computers that can be carried around easily?
Answer: Option 'D'
Laptops
23.
Which among the following options is a Window utility program that locates and eliminates unnecessary fragments and rearranges files and unused disk space to optimize operations?
Answer: Option 'C'
Disk Defragmenter is a utility in Microsoft Windows designed to increase access speed by rearranging files stored on a disk to occupy contiguous storage locations, a technique called defragmentation.
24.
A table consists of?
Answer: Option 'B'
Rows and columns
25.
Who among the following was the inventor of Analytical Engine?
Answer: Option 'A'
Charles Babbage invented the analytical engine.