1.
The _______ icon and bold message heading indicating that the e-mail message has not been read.
Answer: Option 'C'
Closed Envelope
2.
Which is an open standard application programming interface (API) for accessing a database?
Answer: Option 'B'
Open Database Connectivity
3.
Press _________ to move the insertion point to the Address box, or to highlight the URL in the Address box.
Answer: Option 'D'
ALT + D
4.
_________ is a short-range wireless connectivity standard that uses magnetic field induction to enable communication between devices when they’re touched together, or brought within a few centimeters of each other.
Answer: Option 'C'
Near Field Communication(NFC)
5.
In computer technology, _________ is a program, usually part of a compiler, that receives input in the form of sequential source program instructions
Answer: Option 'C'
Parser
6.
Which is a standard interactive and programming language for getting information from and updating a database?
Answer: Option 'B'
Structured Query Language
7.
Which of the following is a program that controls the computer’s resources?
Answer: Option 'D'
Operating System
8.
Which of the following is a two-dimensional barcode consisting of a black and white pixel pattern which allows to encode up to a few hundred characters?
Answer: Option 'D'
Quick Response Code
9.
The fastest component for accessing stored data is ________
Answer: Option 'B'
Cache
10.
Part number, part description, and number of parts ordered are examples of _______
Answer: Option 'D'
input
11.
Which of the following source code is highly protected and only available to trusted employees and contractors?
Answer: Option 'D'
Closed Source
12.
In the field of computers, what is the term for the process of adapting software so that an executable program can be created for a computing environment that is different from the one for which it was originally designed?
Answer: Option 'B'
Porting
13.
Which of the following is a cyber attack intended to redirect a website’s traffic to another, fake site?
Answer: Option 'A'
Pharming
14.
In computing,______________ is an Adaptec-developed programming interface which standardizes communication on a computer bus.
Answer: Option 'A'
ASPI
15.
_______ is the masking of server resources, including the number and identity of individual physical servers, processors, and operating systems, from server users.
Answer: Option 'B'
Server virtualization
16.
While selecting multiple worksheets in Excel, the following key must also be used when clicking the sheet tab ________
Answer: Option 'C'
Ctrl
17.
________ is a method of providing website content such as news stories or software updates.
Answer: Option 'A'
RSS
18.
Which of the following is a method of transferring information between digital devices, especially audio and video equipment?
Answer: Option 'D'
Firewire
19.
Which of the following is a type of malware that collects information about users without their knowledge?
Answer: Option 'C'
Spyware
20.
A portion of the worksheet displayed on the screen can be viewed through a _______
Answer: Option 'A'
Worksheet Window