Saturday, July 9, 2016

1. What is a common medium used by thieves to steal others' identities?
 Email
 Pick pocketing
 Burglary
 Telephone
 None of the above

2. To select a column the easiest method is to?

 drag from the top cell in the column to the last cell in the column
 double click any cell in the column
 click the row heading
 click the column heading
 None of the above

3. Which of the following is the valid subnet mask for class B IP Address?

 251.254.25.5
 255.255.0.0
 155.151.12.9
 255.0.0.0
 255.255.255.0

4. Functions of keys F1, F2 and F3 are _____________ respectively.

 activating menu bar, search and renaming selected icon
 search, reboot and activating menu bar
 activating help, renaming selected icon and search
 reboot, activating help and refresh
 activating help, reboot, renaming selected icon

5. ____________is a set of interface specifications for high speed wired communication between electronics systems peripherals. 

 Universal Serial Bus
 Unique Serial Port
 Universal Stationary Bus
 Unique Serial Bus
 None of the above

6. Which among the following is not legitimate type of computer virus?

 Macro Virus
 File infector Virus
 Resident Virus
 Boot Virus
 Hangout Virus

7. __________ is a self-contained step-by-step set of operations to be performed.

 System Software
 Algorithm
 Network topology
 Application software
 Utility software

8. What is Windows 10?

 Processing system
 Microsoft Office suite
 Drawing system
 Graphics System
 Operating System

9. What does MODEM stands for?

 Modulator-Demodulator
 Multiplexing Other Device Encoding Message
 Main of Domain End Machine
 Multiplexing On Demultiplexed Embedded Machine
 None of the above

10. What type of internet technology sends you the information without your request?

 J2SE SDK
 Adware
 Wiki
 Push
 None of the above

Advertisement

Blog Archive