1.
The __________ menu contains the options to add symbols in a Word document.
Answer: Option 'B'
Insert The Insert menu is MS Word contains the Symbol option that allows you to insert symbols in the document.
2.
The DBMS acts as an interface between what two components of an enterprise-class database system?
Answer: Option 'A'
Database application and the database DBMS acts as an interface between database application and the database.
3.
What is that computer program called which translates one program instruction at a time into machine language?
Answer: Option 'B'
Interpreter Interpreter Takes Single instruction as input and Compiler Takes Entire program as input.
4.
Which of the following statements is true in the context of Watermark?
Answer: Option 'C'
A watermark is a ghost text A watermark is a ghost text that is set behind the content of a page.
5.
An input device that utilizes a light-sensitive detector to select objects on a display screen is known as _________.
Answer: Option 'D'
Light Pen A light pen is a pointing device that uses a photoelectric (light-sensitive) cell to indicate a position on the display screen.
6.
__________ are graphics created using computers and, more generally, the representation and manipulation of image data by a computer with help from specialized software and hardware.
Answer: Option 'A'
Computer graphics are pictures and movies created using computers – usually referring to image data created by a computer specifically with help from specialized graphical hardware and software.
7.
A popular way to learn about computers without ever going to a classroom is called __________?
Answer: Option 'C'
e- learning A popular way to learn about computers without ever going to a classroom is called e- learning.
8.
A Bug can be called an error which generally comes in a software or a hardware. Which among the following is another name that may refer to bugs in computers?
Answer: Option 'D'
Glitch Glitch is a term used to express temporary malfunctioning of software, whereas a bug refers to a problem inherent in the design or coding of the software.
9.
Which of the following converts all the source code into machine code, creating an executable file.
Answer: Option 'C'
Compiler compiler converts all source code of high-level programming language into low level machine code.
10.
____________ is a Windows utility program that locates and eliminates unnecessary fragments and rearranges files and unused disk space to optimize operations.
Answer: Option 'C'
Disk Defragmenter Disk Defragmenter is a utility in Microsoft Windows designed to increase access speed by rearranging files stored on a disk to occupy contiguous storage locations, a technique called defragmentation.
11.
Robot ________ is the homemade, artificially intelligent, multilingual, social and educational humanoid robot, made-up of waste materials, developed by Dinesh Kunwar Patel, a Kendriya Vidyalaya, Computer Science teacher from Mumbai.
Answer: Option 'A'
Shalu Robot shalu is the homemade, artificially intelligent, multilingual, social and educational humanoid robot, made-up of waste materials, developed by Dinesh Kunwar Patel, a Kendriya Vidyalaya, Computer Science teacher from Mumbai.
12.
The process of a computer receiving information from a server on the internet is known as ____________.
Answer: Option 'B'
Download Downloading is the process of a computer receiving information from a server.
13.
A word in a web page that, when clicked, opens another document.
Answer: Option 'C'
hyperlink hyperlink is a word in a web page that, when clicked, opens another document.
14.
The altering of data so that it is not usable unless the changes are undone is __________.
Answer: Option 'B'
Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.
15.
ARPANET stands for __________.
Answer: Option 'D'
Advanced Research Projects Agency Network
16.
Which of the following is a folder that retains copies of messages have started but are not yet send to the recipient?
Answer: Option 'D'
Drafts A draft is simply an email message you haven’t yet sent.
17.
The basic input/output system (BIOS) is stored in:
Answer: Option 'A'
ROM System BIOS, ROM BIOS or PC BIOS is a type of firmware used to perform hardware initialization during the booting process. BIOS is stored on the ROM chip because it is Non-volatile which means that it doesn’t go away when the power is turned off. In other words, it is effectively permanent (at least until it is reprogrammed).
18.
Which shortcut key is used to create a new folder in MS Windows?
Answer: Option 'B'
Ctrl+Shift+N Ctrl+Shift+N is also the shortcut key to open new incognito mode in chrome web browser.
19.
To allow someone else to schedule your meetings and appointments, ______ feature of Outlook is used.
Answer: Option 'A'
Delegate Access Delegate Access is a more advanced feature than just sharing your Outlook folders. If you want to grant additional permissions, such as allowing a delegate the ability to create e-mail messages or respond to meeting requests on your behalf, you must use Delegate Access.
20.
Every computer connected to an internet must have a distinct____
Answer: Option 'A'
IP address IP address is short for Internet Protocol (IP) address. An IP address is an identifier for a computer or device on a network.