9 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (54) Q(1). ______bar displays the heading for each drop down menu. Commands are grouped under each of these menu headings according to function: (A) Title Bar (B) Formatting Toolbar (C) Menu bar (D) None of These Q(2). ________toolbar contains shortcuts to some of the most frequently used commands from the menu bar: (A) Formatting Toolbar (B) Standard Toolbar (C) Both of Above (D) None of These Q(3). The toolbar which contains shortcuts to some of the most frequently used commands found under the FORMAT menu item is: (A) Standard Toolbar (B) Status Bar (C) Formatting Toolbar (D) None of These Q(4). ______bar displays information about the active document: (A) Status Bar (B) Title Bar (C) Menu Bar (D) None of These Q(5). Which of the following is incorrect: (A) File - Print (B) File - Open (C) File - Spelling (D) None of These Q(6). In MS Word, which checks active document for spelling and grammatical errors is: (A) Spell Corrector (B) Spell Checker (C) Spell Improver (D) None of These Q(7). Which of the following is incorrect: (A) Print Preview - Displays what the document will look like when you print it (B) Save - Saves the active document to a specified location (C) Open - Displays the open dialog box so that you can retrieve an existing document (D) None of These Q(8). Which is correct among the following: (A) Edit - Copy (B) Edit - Paste (C) Edit - Undo (D) All of the Above (E) None of These Q(9). Which of the following definitions is incorrect: (A) Document Map - Changes the view of the document (B) View - Magnifies or reduces the document contents by the specified zoom percentage (C) Office Assistant - Help Function (D) None of These Q(10). Microsoft Power Point is a _______ program: (A) Multi Task Presentation (B) Slide Show Presentation (C) Slide Stand Presentation (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
9 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (53) Q(1). The role of IP addressing is: (A) A name indicates what we seek (B) An address indicates where it is (C) A route indicates how to get there (D) All of the Above (E) None of These Q(2). The designers of the Internet Protocol defined an IP address as a ____number: (A) 32 Bit (B) 34 Bit (C) 31 Bit (D) None of These Q(3). The 32 Bit system was known as Internet protocol version ____which is still in use today: (A) 4 (B) 5 (C) 3 (D) None of These Q(4). Due to the growth of the internet and the predicted depletion of available addresses, a new version of IP version 6 using _____for the address was developed in 1995: (A) 128 Bits (B) 129 Bits (C) 130 Bits (D) None of These Q(5). Two versions of the internet protocol (IP) are in use such as IP version 4 and IP version 6, each version defines an IP address ____: (A) Same (B) Unique (C) Different (D) None of These Q(6). In the early stages of the development of the internet protocol, network administrators interpreted an IP address in ____parts: (A) Network Number Portion (B) Host Number Portions (C) Both of Above (D) None of These Q(7). High levels of demand have decreased the supply of unallocated internet protocol version 4 addresses available for assignment to internet service providers and end-user organizations since the _____: (A) 1980s (B) 1990s (C) 2000s (D) None of These Q(8). Which among the following definitions is correct: (A) Address - The unique number ID assigned to one host or interface in a network (B) Subnet - A portion of a network sharing a particular subnet address (C) Subnet mask - A 32 bit combination used to describe which portion of an address refers to the subset and which part refers to the host (D) Interface - A network connection (E) None of These (F) All of the Above Q(9). NAT stands for: (A) Network Address Translator (B) Network Access Translator (C) Network Acquired Translator (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
9 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (52) Q(1). Which among the following is correct about goals in cryptography: (A) Confidentiality - Only an authorized recipient should be able to extract the contents of the message from its encrypted form. Resulting from steps to hide, stop or delay free access to the encrypted information. (B) Message Integrity - The recipient should be able to determine if the message has been altered. (C) Sender Authentication - The recipient should be able to verify from the message, the identity of the sender, the origin or the path it traveled (or combinations) so to validate claims from emitter or to validate the recipient expectations. (D) Sender Non-repudiation - The emitter should not be able to deny sending the message (E) None of These (F) All of the Above Q(2). A license is still required to use cryptography in which among the following countries: (A) Iran and China (B) China and India (C) India and Pakistan (D) None of These Q(3). NSA stands for: (A) National Security Agency (B) Norway Security Agency (C) National Security Assessment (D) None of These Q(4). In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: (A) Hand over passwords (B) Decrypt Files (C) Both of Above (D) None of These Q(5). An IP address is a: (A) binary number that uniquely identifies computers. (B) also identifies other devices on TCP/IP network (C) Both of Above (D) None of These Q(6). TCP stands for: (A) Tools Control Protocol (B) Transmission Control Protocol (C) Transfer Control Protocol (D) None of These Q(7). IP stands for: (A) Internal Protocol (B) Internet Protocol (C) Interior Protocol (D) None of These Q(8). Which among the following is correct: (A) An IP address can be private - for use on Local Area Network (LAN). (B) It can be used on the internet or another wide area network (WAN). (C) IP addresses can be determined statically (assigned to a computer by a system administrator) or dynamically (assigned by another device on the network on demand). (D) All of the Above (E) None of These Q(9). An internet protocol address (IP address) is: (A) a numerical label assigned to each device (e.g. computer, printer) participating in a computer network (B) It works for the communication (C) Both of Above (D) None of These Q(10). An IP address serves which among the following principal functions: (A) Host or network interface identification (B) Location Addressing (C) Both of Above (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
9 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (51) Q(1). Cryptography is the study of information______: (A) Hiding (B) Verification (C) Both of Above (D) None of These Q(2). Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in communication: (A) Protocols (B) Algorithms (C) Strategies (D) All of the Above (E) None of These Q(3). Cryptography and Cryptanalysis are sometimes grouped together under the ____term cryptology, encompassing the entire subject. In practice, "cryptography" is also often used to refer to the field as a whole, especially as an applied science: (A) Umbrella (B) Shield (C) Veil (D) None of These Q(4). Cryptography is an interdisciplinary subject, drawing from several fields. Before the time of computers, it was closely related to linguistic. Nowadays the emphasis has shifted, and cryptography makes extensive use of technical areas of mathematics, especially those areas collectively known as _______mathematics: (A) Increte (B) Discrete (C) Both of Above (D) None of These Q(5). An example of the sub-fields of cryptography is: (A) Steganography (B) Traffic Analysis (C) Both of Above (D) None of These Q(6). Which among the following is correct: (A) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. (B) Steganography is the study of hiding the very existence of a message, and not necessarily the contents of the message itself like microdots or invisible ink. (C) Both of Above (D) None of These Q(7). When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: (A) Encryption (B) Decryption (C) Both of Above (D) None of These Q(8). When the information is reverted back into a useful form, it is called: (A) Standard encryption (B) Plain text encryption (C) Decryption (D) None of These Q(9). Symmetric-key cryptography refers to ______methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different but related in an easily computable way): (A) Encryption (B) Decryption (C) Both of above (D) None of These Q(10). Symmetric key cryptography was the only kind of encryption publicly known until: (A) July 195 (B) June 1976 (C) June 1988 (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (50) Q(1). Malicious Software is also known as: (A) Statware (B) Malware (C) Dareware (D) None of These Q(2). _____are computer programs developed to harm and disrupt computers: (A) Malicious (B) Stanford (C) Stipulated (D) None of These Q(3). _____and extensions are software that extends or modifies the functionality of another piece of software and require that software to be used to function: (A) Plugs Stan (B) Plug-outs (C) Plugins (D) None of These Q(4). A person who creates software is called a: (A) Programmer (B) Software Engineer (C) Software Developer (D) All of the Above (E) None of These Q(5). The informal term for a programmer is: (A) Coder (B) Hacker (C) Both of Above (D) None of These Q(6). Software available for a fee, often inaccurately termed _______which can only be legally used on the purchase of a license: (A) Commercial Software (B) Trade Software (C) Exchange Software (D) None of These Q(7). Which among the following is correct about Device Drivers: (A) They operate or control a particular type of device that is attached to a computer. (B) Each device needs at least one corresponding device driver because a computer typically has at minimum one input device and at least one output device. (C) A computer typically needs more than one device driver. (D) None of These (E) All of the Above Q(8). Which among the following is incorrect about application software: (A) It consists of standalone programs. (B) Used to solve specific business needs. (C) Both of Above (D) None of These Q(9). Which among the following is incorrect about the characteristics of Software: (A) Software is developed; it is not manufactured. (B) Software does not "wear out." (C) Although the industry is moving toward component-based construction, most software continues to be custom-built. (D) None of These Q(10). Cryptography is derived from the ____word: (A) Greek (B) French (C) Latin (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (49) Q(1). Which among the following are Malicious Softwares: (A) Virus and Worms (B) Trojan Horse and Time Bomb (C) Logic Bomb and Rabbit and Bacterium (D) None of These (E) All of the Above Q(2). IRC stands for: (A) Internet Relay Chat (B) Internal Relay Chat (C) Information Relay Chat (D) None of These Q(3). MOD refers to: (A) Monitor of Deception (B) Master of Deception (C) Management of Deception (D) None of These Q(4). INTERPOL stands for: (A) International Police (B) Internal Polythims (C) Internet Protocol (D) None of These Q(5). The term Software refers to the set of ________or data a computer processor reads to perform a task or operation: (A) Electronic Program Instructions (B) Planned program instructions (C) Assembled and attached program instructions (D) None of These Q(6). Types of Software include: (A) Systems Software (B) Application Software (C) Both System and Application Softwares (D) None of These Q(7). Without software, computers would be ____: (A) Obsolete (B) Inconvenient (C) Useless (D) None of These Q(8). Computer software includes_______and their associated documentation: (A) Computer Programs (B) Libraries (C) Both of the Above (D) None of These Q(9). In Platform software, Platform includes the: (A) Firmware (B) Device Drivers (C) Operating System and Graphical User Interface (D) All of the Above (E) None of These Q(10). Software quality is essential, especially for commercial and system software like: (A) Microsoft Office (B) Microsoft Windows (C) Linux (D) All of the Above (E) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (48) Q(1). Net crime is the criminal exploitation of the ___: (A) Browsers (B) Servers (C) Internet (D) None of These Q(2). Crime through the Internet includes: (A) Telemarketing (B) Internet fraud (C) Identity Theft (D) Credit Card account thefts (E) All of the Above (F) None of These Q(3). Which among the following is correct about "Hacking": (A) Hacking is an illegal intrusion into a computer system and/or network. (B) Cracking term is equivalent to Hacking (In Indian Laws perspective there is no difference between the term hacking and cracking). (C) Every act committed towards breaking into a computer and/or network is hacking. (D) Hackers can hack for personal monetary gains, such as stealing credit card information, transferring money from various bank accounts to their own account, followed by withdrawal of money. (E) All of the Above (F) None of These Q(4). Which among the following is correct about "Child Pornography": (A) Pedophiles lure children by distributing pornographic material. (B) Pedophiles falsely represent themselves as of the same age and win the confidence of children by chatting and by sending images. (C) Pedophiles, after winning the confidence of children, then offer them monetary as well as physical rewards. (D) Pedophiles may sexually exploit children by using them as sexual objects or by taking their pornographic pictures, in order to sell those over the Internet. (E) All of the Above (F) None of These Q(5). Which among the following characteristics are correct about 'Cyberstalking': (A) Cyberstalking is the use of the Internet or electronics to stalk or harass an individual or any group. (B) It includes making harassing phone calls, killing the victim's pet, vandalizing victims' property, leaving written messages or objects. (C) It may be offline as well as online. (D) All of the Above (E) None of These Q(6). Denial-of-service attack includes: (A) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. (B) DoS attacks are included in it. (C) Both of Above (D) None of These Q(7). Which among the following is a wrong characteristic of "Phishing": (A) Fakers, by offering special rewards or money prizes, etc., ask for personal information such as passwords, credit card information, social security, and bank account numbers or other material information. (B) The main purpose is theft or misuse of the acquired material. (C) Both of Above (D) None of These Q(8). Credit Card Fraud includes: (A) Credit cards are illegally obtained and used to get movable or immovable property. (B) Unauthorized and illegal use of credit cards. (C) Both of Above (D) None of These Q(9). The punishment for Hacking in India is: (A) Imprisonment up to 3 years only. (B) Fine (Depends on case to case only). (C) Both of Above (D) None of These Q(10). Which among the following is best suitable for the term "Software Piracy": (A) Counterfeiting original products. (B) The illegal copying of genuine programs. (C) Both of Above (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (47) Q(1). ISP refers to: (A) Information Security Policy (B) Internet Security Policy (C) Internal Security Policy (D) None of These Q(2). _____ is a computer program that is loaded into a computer without the owner's knowledge: (A) Hack Material (B) Viruses (C) Both of Above (D) None of These Q(3). Which among the following is correct regarding the Boot Sector Viruses: (A) These viruses reside in the boot sector of a floppy or hard disk. (B) Such viruses are activated every time a computer boots from an infected disk. (C) The virus remains in memory until an uninfected floppy disk is inserted into the floppy drive. (D) All of the Above (E) None of These Q(4). _______viruses infect executable program files: (A) File Infector Viruses (B) Macro Viruses (C) Multi-Partite Viruses (D) None of These Q(5). _____ infections have cost more money and taken more time to repair than any other virus type: (A) File Infector Viruses (B) Multi-Partite Viruses (C) Macro Viruses (D) None of These Q(6). _____was the virus that first appeared on Friday, March 26, 1999, and spread all over the world faster than any virus seen before: (A) 9 Melissa (B) 10 Melissa (C) 99 Melissa (D) None of These Q(7). 9 Melissa was a _____macro virus: (A) Microsoft Word (B) Microsoft Excel (C) Internet (D) Microsoft PowerPoint (E) None of These Q(8). A ______ is a harmful computer program that has been hidden inside something benign, such as an email attachment or even an innocent-looking program: (A) Trojan Horses (B) Worms (C) Macro Viruses (D) None of These Q(9). Which among the following is correct about Antivirus Programs: (A) They contain a database of signatures for all known viruses and worms. (B) The software searches a computer for the presence of these signatures. (C) Both of Above (D) None of These Q(10). Computer crime or Cybercrime is crime that involves: (A) Computer (B) Network (C) Both of Above (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (46) Q(1). If you want to 'Go to the previous presentation window' you will press: (A) Ctrl + Shift + F6 (B) Ctrl + F6 (C) Ctrl + Alt + F6 (D) None of These Q(2). For 'Maximize presentation window' you have to press: (A) Shift + F10 (B) Ctrl + F10 (C) Ctrl + Shift + F10 (D) None of These Q(3). For 'Maximize Power Point application window' you have to press: (A) Ctrl + Shift + F10 (B) Shift + F10 (C) Alt + F10 (D) None of These Q(4). For 'open existing presentation' you have to press: (A) Ctrl + N (B) Ctrl + O (C) Ctrl + K (D) None of These Q(5). An error in a computer program is called: (A) Hacking (B) Virus (C) Bug (D) None of These Q(6). ______was the first technique that posed a serious threat to virus scanners: (A) Vulnerability Code (B) Polymorphic Code (C) Antimorphic Code (D) None of These Q(7). A/an ______ is a system susceptibility or flaw: (A) Error (B) Vulnerability (C) Virus (D) None of These Q(8). _______vulnerability is one for which at least one working attack exists: (A) Democratic (B) Exploitable (C) Dominative (D) None of These Q(9). CVE stands for: (A) Common Vulnerabilities Exposures (B) Cyber Vulnerabilities Exposures (C) Cycolic Vulnerabilities Exposures (D) None of These Q(10). _____ is unauthorized access to or use of data, systems, server, or networks, including any attempt to probe, scan, or test the vulnerability of a system, server, or network, or to breach security or authentication measures without the express authorization of the owner of the system, server, or network: (A) Hacking (B) Cracking (C) Viruses (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (45) Q(1). MS Power Point was officially launched on: (A) May 22, 1990 (B) May 25, 1990 (C) May 27, 1990 (D) None of These Q(2). MS Power Point is written in: (A) C (B) C++ (C) Java (D) None of These Q(3). Power Point was officially launched on May 22, 1990, the same day that Microsoft released which of the following windows: (A) Window 4.0 (B) Windows 3.0 (C) Window 1.0 (D) None of These Q(4). Power Point 97 incorporated the _______ language, underlying all macro generation in office 97: (A) Visual Basic for Applications (B) Visual Basic for Software (C) Virtual Base Language (D) None of These Q(5). _______massively overhauled the animation engine, allowing users to create more advanced and custom animations: (A) Power Point 2002 (B) Power Point 2004 (C) Power Point 2006 (D) None of These Q(6). MS - Power Point consists of: (A) Soft Documental Pages (B) Slides (C) Cells (D) None of These Q(7). Slides may contain: (A) Text and Graphics Only (B) Sound and Movies Only (C) Text, Movies, Images, Sound Only and all other objects (D) All of the Above (E) None of These Q(8). Entrance, emphasis and exit of elements on a slide itself are controlled by what Power Point calls____: (A) Custom Effects (B) Custom Animations (C) Custom Videology and analogy (D) None of These Q(9). Which of the following is correct about Power Point movements: (A) Entrance, emphasis and exit of elements on a slide itself are controlled by what Power Point calls custom animations (B) Transitions on the other hand are movements between slides. These can be animated in a variety of ways (C) Custom animation can be used to create small storyboards by animating picture to enter, exit or move (D) All of the Above (E) None of These Q(10). Presentations password protected for opening or modifying can be opened by: (A) Power Point Analyzer (B) Power Point Viewer (C) Power Point Conductor (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (44) Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (43) Q(1). ARPANET stands for: (A) American Research Project Agency Network (B) Advanced Research Project Agency Network (C) Admissible Research Project Agency Networking (D) None of These Q(2). Microsoft Word was first released in: (A) 1980 (B) 1981 (C) 1983 (D) None of These Q(3). XML stands for: (A) Excess Markup Language (B) Extensible Markup Language (C) Excessive Markup Language (D) None of These Q(4). Web 2.0 does not refer to: (A) Rich User Experience (B) Mobility(C) Podcasting (C) Podcasting (D) High Definition (E) None of These Q(5). Microsoft Word was first released in: (A) 1984 (B) 1983 (C) 1985 (D) None of These Q(6). First time after establishment, its MS - Word was known as: (A) Multi Work Word (B) Multi Tool Word (C) Multi Task Word (D) None of These Q(7). MS Word is written in: (A) Java (B) C++ (C) C (D) None of These Q(8). Microsoft Word is available on _______: (A) Windows Only (B) Macintosh Operating Systems Only (C) Both of Above (D) None of These Q(9). RTF stands for: (A) Rich Text Format (B) Reliable Text Format (C) Resting Text Format (D) None of These Q(10. At the bottom of the word interface is the ______: (A) Status Bar (B) Title Bar (C) Menu Bar (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (42) Q(1). Ms Excel version 5 was launched in: (A) 1992 (B) 1993 (C) 1995 (D) None of These Q(2). VBA stands for: (A) Visual Basic For Application (B) Virtual Based For Application (C) Various Basics Application (D) None of These Q(3). The window version of Excel supports programming through Microsoft's Visual Basic for Applications (VBA), which is a dialect of _____: (A) Visual Support (B) Visual Basic (C) Visual Format (D) None of These Q(4). In MS -Excel, the option of NEW is available under which of the following menu: (A) Insert (B) Home (C) File (D) None of These Q(5). In MS-EXCEL, to move the current selected range down a row, you will press: (A) Shift + Up Arrow Key (B) Shift + Down Arrow Key (C) Ctrl + Down Arrow Key (D) None of These Q(6). In MS-Excel, which of the following keys helps you to select all cells below the current selection, up to the edge of the current data region: (A) Ctrl + Shift + Down Arrow Key (B) Ctrl + Shift + Right Arrow Key (C) Ctrl + Shift + D (D) None of These Q(7). In MS - Excel, Move to the next worksheet in the workbook can be done through: (A) Ctrl + Page Down (B) Ctrl + Page Up (C) Ctrl + F3 (D) None of These Q(8). Ctrl + Page up (In Ms - Excel) is used for: (A) Move to the previous worksheet in the workbook (B) Insert a new worksheet into the current workbook (C) Select the current worksheet and the next worksheet (D) None of These Q(9). IRTF stands for: (A) Internet Research Task Force (B) International Research Task Force (C) Input Research Transfer Fidelity (D) None of These Q(10). IP stands for: (A) Internet Protocol (B) Input Protocol (C) Internal Processing (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (41) Q(1). Which among the following is correct about WRAM: (A) Makes it easier to allow blocks of memory to be addressed with just a few commands (B) Makes it easier to allow windows of memory to be addressed with just a few commands. (C) Both of Above (D) None of These Q(2). Compact Disk (CD) is a portable disk having data storage capacity between____: (A) 650 - 700 MB (B) 700 - 800 MB (C) 800 - 900 MB (D) None of These Q(3). Which among the following is incorrect about CD's features: (A) It contains digital information that can be read but cannot be rewritten. (B) It is a very reliable storage media. It is very often used as a medium for distributing a large amount of information to a large number of users. (C) Separate drives exist for reading and writing CDs. (D) All of the Above (E) None of These Q(4). DVD stands for: (A) Digital Video Disk (B) Digital Versatile Disk (C) Both of Above (D) None of These Q(5). Find out the wrong feature of DVD among the following: (A) DVD is similar to CD but has a larger storage capacity and enormous clarity (B) DVDs are primarily used to store music or 6 movies and can be played back on your television or the computer too (C) Depending upon the disk type it can store several Gigabytes of data (as opposed to around 650 MB of a CD) (D) It is not rewritable media (E) None of These Q(6). Blu-Ray Technology was developed by Blu-ray Disc Association with more than ____members: (A) 180 (B) 190 (C) 210 (D) None of These Q(7). A database is an organized collection of____: (A) Data Structures (B) Data (C) Information (D) None of These Q(8). Which of the following is included in the database collection: (A) Schemes, Tables, Queries (B) Queries, Report, Views and other Objects (C) Both of Above (D) None of These Q(9). DBMS stands for: (A) Data Base Management Software (B) Data Base Management System (C) Diode Base Management System (D) None of These Q(10). Microsoft Excel is a ________ application: (A) Talbex Sheet (B) Page Sheet (C) Spreadsheet (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (40) Q(1). HTML tags are not case sensitive: (A) True (B) False (C) May be (D) None of These Q(2). In HTML, you can specify a font of a document with the _____ element: (A) font (B) size (C) face (D) None of These Q(3). In HTML, you can set the color of text with the ____ attribute: (A) textColor (B) text (C) bgcolor (D) None of These Q(4). In HTML, you can specify the size of text with the ___ attribute: (A) text (B) size (C) height (D) None of These Q(5). In HTML, you can _______an email link: (A) EMail (B) Email (C) Mail (D) None of These Q(6). In HTML, you can _______a bookmark link: (A) Bookmark (B) Book (C) Anchor (D) None of These Q(7). In HTML, you can _______a telephone link: (A) Call (B) Call Link (C) Telephone (D) None of These Q(8). In HTML, the _______attribute is used to specify a URL for linked resources: (A) Ref (B) Link (C) Href (D) None of These Q(9). Which of the following tag is used to create a hyperlink: (A) (B) (C) (D) None of These Q(10). Which of the following is correct about Cascading Style Sheets (CSS): (A) CSS stands for Cascading Style Sheets (B) CSS is a language for describing the look and formatting of a document written in HTML (C) CSS describes how elements should be rendered on screen, on paper, in speech, or on other media (D) All of the Above (E) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (39) Q(1). C language was originally developed by ____: (A) Dennis Ritchie (B) James Gosling (C) Peter Charles Babbage (D) None of These Q(2). All Unix applications are written in the _____: (A) C (B) Java (C) HTML (D) None of These Q(3). C language was invented to write an operating system called UNIX. C is a successor to the language which was introduced around 1970: (A) A Language (B) B Language (C) Both of Above (D) None of These Q(4). C language was formalized in _____by the American National Standard Institute: (A) 1988 (B) 1989 (C) 1990 (D) None of These Q(5). Java Programming Language was originally developed by Sun Microsystems which was initiated by _______: (A) James Gosling (B) Charles Babbage (C) Steford Pascal (D) None of These Q(6). Java Language was released in _____as a core component of Sun Microsystems Java platform: (A) 1994 (B) 1993 (C) 1995 (D) None of These Q(7). HTML is a markup language for describing web documents (web pages). Which among the following features is correct about HTML: (A) HTML stands Hyper Text Markup Language (B) A Markup language is a set of markup tags (C) HTML documents are described by HTML tags (D) Each HTML tag describes different document content (E) None of These (F) All of the Above Q(8). The first version of HTML was _______that includes elements like Bold, Italics etc but it did not support (A) HTML 1.0 (B) HTML 1.2 (C) HTML 1.5 (D) None of These Q(9). HTML is the most widely used language on the Web as it is a ________ language: (A) Markup (B) Scripting (C) Programming (D) None of These Q(10). HTML tags are surrounded by ____: (A) Parentheses (B) Square Brackets (C) Angle Brackets (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (38) Q(1). In ring topology, repeater works in 3 modes: _____, _____ and ______: (A) Read, Transmit, Bypass (B) Listen, Transmit, Bypass (C) Store, Spread, Bypass (D) None of These Q(2). Which among the following is incorrect: (A) Computer - Machine that will carry out the process described by the program (B) Person - Programmer who serves as the source of the communication (C) Process - The Activity being described by the program (D) Problem - Actual System or environment where the problem arises (E) None of These (F) All of the above Q(3). _______ is a programming language that is interpreted & executed directly by the computer: (A) Machine Language (B) Assembly Language (C) HTML (D) None of These Q(4). Each computer can only understand programs that are written in its own ____: (A) Machine Language (B) Assembly Language (C) Java (D) None of These Q(5). Which among the following is correct about Machine Language: (A) Each computer can only understand programs that are written in its own Machine Language (B) Machine Language is provided by the computer manufacturer (C) Translation is needed when executing programs written in Pascal or BASIC (D) It is written at the most basic level of computer operation (E) All of the Above (F) None of These Q(6). Find out the incorrect feature of Assembly language among the following: (A) It is also provided by the manufacturer (B) One instruction for each computer operation (C) Instruction codes are represented by mnemonics (a set of letters) and the code must be assembled into machine language for execution (D) All of the Above (E) None of These Q(7). FORTRAN, COBOL, BASIC, PASCAL & C LANGUAGE are examples of _____: (A) High Level Languages (B) Middle Level Languages (C) Low Level Languages (D) None of These Q(8). A program written in a ________language is called a source program or source text: (A) High Level Language (B) Middle Level Language (C) Low Level Language (D) None of These Q(9). Rules of content, interpretation and meaning are called semantic rules. A high-level programming language is determined by its _____rules: (A) Semantic Rules (B) Syntactic Rules (C) Both of Above (D) None of These Q(10). ____is a general-purpose high-level language: (A) C++ (B) C (C) Java (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (37) Q(1). In a star network, each node (file server, workstations, and peripherals) is connected to a central device called a _____: (A) Bug (B) Center (C) Hub (D) None of These Q(2). Which of the following is correct about Star Topology: (A) Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. (B) The hub, switch, or concentrator manages and controls all functions of the network (C) The star topology reduces the chance of network failure by connecting all of the systems to a central node. (D) All of Above (E) None of These Q(3). A tree topology (hierarchical topology) can be viewed as a collection of _______in a hierarchy: (A) Bus Networks (B) Star Networks (C) Both of Above (D) None of These Q(4). Which of the following topologies functions most helpfully for colleges, universities, and schools so that each of the connect of that topology to the big network in some way: (A) Bus (B) Star (C) Tree (D) None of These Q(5). Implementing the ______topology is expensive and difficult: (A) Tree (B) Mesh (C) Bus (D) None of These Q(6). A combination of any two or more network topologies is known as: (A) Bi-Lateral (B) Hybrid (C) Collateral (D) None of These Q(7). Which of the following is incorrect about Hybrid Topology: (A) A Hybrid topology always accrues when two different basic network topologies are connected. (B) It is a mixture of above-mentioned topologies (C) Central computer is attached to sub-controllers which, in turn, participate in a variety of topologies (D) All of Above (E) None of These Q(8). Coaxial cable is suitable for use in ______topology: (A) Tree (B) Bus (C) Ring (D) None of These Q(9). _________is suitable for use in star and ring topologies: (A) Twisted Pair (B) Bind Pair (C) Combined Pair (D) None of These Q(10). _______topology can be considered as an extension of Bus Topology: (A) Ring (B) Tree (C) Hybrid (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (36) Q(1). A mistake in an algorithm that causes incorrect results is called: (A) Logical Error (B) Syntax Error (C) Procedural Error (D) None of These Q(2). FDDI stands for: (A) Fired Distributed Data Interface (B) Fiber Distributed Data Interface (C) Forced Distributed Data Interface (D) None of These Q(3). ANSI stands for: (A) American National Standards Institute (B) Asia National Standards Institute (C) Australia National Standards Institute (D) None of These Q(4). Which of the following characters is correct regarding network topologies: (A) Network Topologies describe the ways in which the elements of a network are mapped. (B) Network Topologies describe the physical and logical arrangement of the network nodes. (C) Both of Above (D) None of These Q(5). Which of the following is correct regarding Bus Topology: (A) All nodes (file server, workstations and peripherals) are connected to the linear cable. (B) Popular on LANs because that are inexpensive and easy to install (C) A bus topology consists of a main run of cable with a terminator at each end. (D) All of Above (E) None of These Q(6). A bus consists of a single linear cable called a__: (A) Head (B) Tail (C) Trunk (D) None of These Q(7). Data is sent to all computers on the _____: (A) Addressal (B) Trunk (C) Portal (D) None of These Q(358). In a ring network, every device has exactly ______neighbors for communicating purpose: (A) 2 (B) 4 (C) 6 (D) None of These Q(9). To implement a ring network we use the ______technology: (A) Stand Ring (B) Flash Ring (C) Token Ring (D) None of These Q(10). A token or small data packet is ______passed around the network: (A) Intimately (B) Continuously (C) Twicely (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (35) Q(1). When you turn on the computer, the boot routine will perform this test: (A) Power on Self Test (B) Disk Drive Test (C) Memory Test (D) None of These Q(2). A compiler translates a program written in a high - level language into: (A) An Algorithm (B) Machine Level Language (C) A Debugged Program (D) None of These Q(3). The primary purpose of software is to turn data into: (A) Information (B) Programs (C) Objects (D) None of These Q(4). Office LANs that are spread geographically apart on a large scale can be connected using a corporate: (A) CAN (B) WAN (C) LAN (D) None of These Q(5). A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is: (A) Write Only (B) Memory Only (C) Read Only (D) None of These Q(6). You organize files by storing them in: (A) Archives (B) Folders (C) Lists (D) None of These Q(7). When sending an e-mail, the _____line describes the contents of the message: (A) Subject (B) Contents (C) CC (D) None of These Q(8). What is the term for how words will appear on a page: (A) Character Formatting (B) Text Formatting (C) Typeface (D) None of These Q(9). A computer's type, processor, and operating system define its: (A) Speed (B) Platform (C) Brand (D) None of These Q(10). A device for changing the connection on a connector to a different configuration is: (A) A Converter (B) An Attachment (C) An Adapter (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (34) Q(1). If you want to 'Go to the beginning of the document' you will press: (A) Home (B) Ctrl + Home (C) Alt + Home (D) None of These Q(2). The person who writes and tests computer programs is called a: (A) Programmer (B) Software Engineer (C) Project Developer (D) None of These Q(3). What is Output: (A) What the processor takes from the user (B) What the processor gives to the user (C) What the processor gets from the user (D) None of These Q(4). An error in a computer program is: (A) Crash (B) Bug (C) Power Failure (D) None of These Q(5). Computer systems are comprised of: (A) Hardware, Software, Procedures, Networks and People (B) Hardware, Programs, Processors, Procedures, and People (C) Hardware Programs, Information, People and Networks (D) None of These Q(6). _______ is the process of carrying commands: (A) Storing (B) Executing (C) Fetching (D) None of These Q(7). The main function of the ALU is: (A) Store Data and Information for Future Use (B) Perform arithmetic and logical operations (C) Control Computer Output, such as Printing (D) None of These Q(8). The secret code that restricts entry to some programs: (A) Password (B) Passport (C) Entry Code (D) None of These Q(9). The simultaneous processing of two or more programs by multiple processors is a: (A) Multi - Tasking (B) Multi - Programming (C) Multi - Processing (D) None of These Q(10). A _______ is a unique name that you give to a file of information: (A) Device Letter (B) File Name (C) File Name Extension (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (33) Q(1). DHCP stands for: (A) Deferred Host Comparable Protocol (B) Diode Host Counter Protocol (C) Dynamic Host Configuration Protocol (D) None of These Q(2). VPN stands for: (A) Virtual Perfect Network (B) Virtual Power Network (C) Virtual Private Network (D) None of These Q(3). UDP stands for: (A) User Datagram Protocol (B) User Defined Protocol (C) Un-Dispatched Protocol (D) None of These Q(4). The original ______ grew into the internet: (A) CASDER (B) ARPANET (C) INFANET (D) None of These Q(5). The ________ is a three-layer network protocol that contains addressing information and some control information that enables packets to be routed: (A) User Datagram Protocol (B) Internet Protocol (C) Dynamic Host Configuration Protocol (D) None of These Q(6). The ________ is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: (A) Internet Control Message Protocol (B) Internet Standard Flexible Message Protocol (C) Internet Dynamic Chartered Message Protocol (D) None of These Q(7). POP (In computer language) stands for: (A) Point of Perfection (B) Point of Presence (C) Point of Pictures (D) None of These Q(8). You listen to the term ARPA-NET, Expand the term ARPA: (A) Advanced Research Projects Agency (B) Abstract Research Projects Agency (C) Army Research Projects Agency (D) None of These Q(9). Short cut key for 'Move the cursor to the beginning of the next word' is: (A) Shift + Right Arrow (B) Ctrl + Right Arrow (C) Ctrl + Left Arrow (D) None of These Q(10). If you want to 'Go to the beginning of the current line' you will press: (A) Shift + Home (B) Home (C) Alt + Home (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (32) Q(1). SVGA stands for: (A) Super VGA (B) Special VGA (C) Standard VGA (D) None of These Q(2). At the top of the word interface, there is ___: (A) Title Bar (B) Standard Tool Bar (C) Menu Bar (D) None of These Q(3). ______toolbar contains shortcuts to some of the most frequently used commands from the menu bar: (A) Standard (B) Title (C) Status Bar (D) None of These Q(4). _____toolbar contains shortcuts to some of the most frequently used command found under the FORMAT menu item: (A) Status Bar (B) Formatting Toolbar (C) Standard Toolbar (D) None of These Q(5). ____displays information about the active document: (A) Title Bar (B) Menu Bar (C) Status Bar (D) None of These Q(6). Microsoft Word was released in: (A) 1983 (B) 1984 (C) 1985 (D) None of These Q(7). Microsoft Word was initially known as: (A) Micro Word (B) Multi - Tool Word (C) Sample Word (D) None of These Q(8). SAN stands for: (A) Specific Area Network (B) System Area Network (C) Standard Area Network (D) None of These Q(9). NAP stands for: (A) Network Access Point (B) Naptive Area Protocol (C) Node for Assessing Pattern (D) None of These Q(10). Router that connects multiple backbones, known as: (A) Internet Service Providers (B) Network Access Point (C) Point of Presence (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (31) Q(31). Which of the following file extension is used for Microsoft Word : (A) .doc (B) .jpg (C) .mp (D) None of These Q(2). Which of the following file extension is used for Microsoft Power Point : (A) .xls (B) .ppt (C) .dox (D) None of These Q(3). Which of the following file extension is used for images : (A) .jpg (B) .gif (C) Both of Above (D) None of These Q(4). Which of the following file extension is used for Video : (A) .mov (B).mp (C) Both of Above (D) None of These Q(5). Which of the following file extension is used for Audio or Sound : (A) .wav (B) .mp3 (C) Both of Above (D) None of These Q(6). Which of the following pair is incorrect: (A) Cut - CTRL + X (B) Copy - CTRL + C (C) Paste - CTRL + V (D) Select All - CTRL + A (E) Find - CTRL + F (F) Undo -CTRL + Z (G) None of These (H) All of Above Q(7). VGA stands for: (A) Virtual Graphics Assessment (B) Video Graphics Array (C) Various Graphics Arrays (D) None of These Q(8). Can you lock your file in MS Word: (A) Yes (B) No (C) Never (D) None of These Q(9). For Paste as plain text, you will press: (A) Ctrl + Shift + I (B) Ctrl + Shift + V (C) Ctrl + Shift + K (D) None of These Q(10). Which of the following is correct: (A) ALU - Arithmetic Logic Unit (B) CU - Control Unit (C) CPU - Central Processing Unit (D) All of Above (E) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit
5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (30) Q(1). The first Mini Computer was: (A) PDP - 0 (B) PDP-1 (C) PDP - A (D) None of These Q(2). The first Micro Computer was: (A) MK 10 (B) Micro 20 (C) Micro 15 (D) None of These Q(3). The first Super Computer was: (A) CDC 6600 (B) CDC 7100 (C) CDC 7200 (D) None of These Q(4). The first Digital Signal Processor was: (A) DSP 56 (B) DSP 36 (C) DSP 46 (D) None of These Q(5). The first Computer Language was: (A) BCPL (B) ALGOL (C) FORTRAN (D) None of These Q(6). The first High Level Language was: (A) COBOL (B) BASIC (C) ALGOL (D) None of These Q(7). The first Integrated Circuit was: (A) IC 101 (B) IC 102 (C) IC 103 (D) None of These Q(8). The first Digital Computer was: (A) Z 1 (B) Z 2 (C) Z 3 (D) None of These Q(9). The first Analog Computer was: (A) EDSAC (B) ABC (C) Diodic (D) None of These Q(10). The first Digital Computer was: (A) ABC (B) Colossus (C) ENIAC (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit