Computer and IT Quiz SET 8

Question 1. A computer derives its strength from __________.

(A) Its speed

(B) Accuracy

(C) Memory

(D) All of these

View Answer

(D) All of these

Question 2. …… is the process of carrying out commands. 

(A) Fetching

(B) Storing

(C) Decoding

(D) Executing

View Answer

(D) Executing

Question 3. Multimedia can contain __________.

(A) Numeric, text and picture data

(B) Graphics, animation, video, music and voice

(C) Only numeric type data

(D) None of the above

View Answer

(B) Graphics, animation, video, music and voice

Question 4. A ‘menu’ contains a list of _________.

(A) Data

(B) Objects

(C) Reports

(D) Commands

View Answer

(D) Commands

Question 5. The practice of using more than one type of medium in computer at the same time is called ___________.

(A) Multimedia

(B) Macromedia

(C) Interactivity

(D) None of these

View Answer

(A) Multimedia

Question 6. Size of virtural memory depends on  __________.

(A) Address lines

(B) Database

(C) Disc space

(D) All of these

View Answer

(C) Disc space

Question 7. The ability of an operating system to run more than one application at a time is called ___________.

(A) Multiuser computing

(B) Time sharing

(C) Multiprogramming

(D) Multitasking

View Answer

(D) Multitasking

Question 8. Which of the following is not a search engine?

(A) Google

(B) Altavista

(C) Science direct

(D) Orkut

View Answer

(D) Orkut

Question 9. What can we send through video mail? 

(A) Graphics

(B) Video clips

(C) Video messages

(D) All of the above

View Answer

(D) All of the above

Question 10. Which of the following is a search engine?

(A) Baidu

(B) Packets

(C) Cookies

(D) None of these

View Answer

(A) Baidu

Question 11. Video conferencing is __________.

(A) Conduct of video calls using telecom technology

(B) Conduct of telephone calls

(C) Conduct of video conference using a set of telescopic technology

(D) None of the above

View Answer

(A) Conduct of video calls using telecom technology

Question 12. The set of protocols, which defines all transmission exchanges across the Internet is called __________.

(A) CSMA/CD

(B) TCP/IP

(C) FDDI

(D) None of these

View Answer

(B) TCP/IP

Question 13. Which of the following devices is compulsory for video conferencing?

(A) Printer

(B) Scanner

(C) Webcam

(D) Mouse

View Answer

(C) Webcam

Question 14. How many days will picture message stay in private inbox?

(A) 28 days

(B) 30 days

(C) 15 days

(D 7 days

View Answer

(B) 30 days

Question 15. E-Mail stands for __________.

(A) Electrical Mail

(B) Electronic Mail

(C) Elastic Mail

(D) None of the above

View Answer

(B) Electronic Mail

Question 16. The full form of SIM is ___________.

(A) Subscriber’s Identity Module

(B) Subscriber’s Identity Machine

(C) Self Identity Machine

(D) Self Identity Module

View Answer

(A) Subscriber’s Identity Module

Question 17. What are the two parts of e-mail address? 

(A) Username and home address

(B) Legal name and phone number

(C) Signature and password

(D) Username and domain name

View Answer

(D) Username and domain name

Question 18. ICT stands for __________.

(A) Information and Computer Technology

(B) Information and Communication Technology

(C) Information Code Techniques

(D) Integrated Circuit Technology

View Answer

(B) Information and Communication Technology

Question 19. Which of the following is free e-mail service provider?

(A) Hotmail

(B) Rediffmail

(C) Yahoo

(D) All of these

View Answer

(D) All of these

Question 20. SMS means _________.

(A) Swift Mail System

(B) Short Messaging Service

(C) Shorthand Manual Script

(D) Speed Mail Service

View Answer

(B) Short Messaging Service

Question 21. What kind of digital files can be attached to the e-mail?

(A) Music

(B) Documents

(C) Photos

(D) All of these

View Answer

(D) All of these

Question 22. What do you understand by hacking? 

(A) Searching

(B) Security

(C) Both (A) and (B)

(D) None of the above

View Answer

(D) None of the above

Question 23. Which of the following types of files can be sent as an e-mail attachment? 

(A) Text files only

(B) Audio files only

(C) Video files only

(D) All of the above

View Answer

(D) All of the above

Question 24. A computer hacker is ___________.

(A) A person who maintains computer security

(B) A person who violates computer security with malicious intention for personal gain

(C) A person responsible for safe computer operation

(D) A person who repairs computer

View Answer

(B) A person who violates computer security with malicious intention for personal gain

Question 25. What is singular of data?

(A) Datum

(B) Dat

(C) Data

(D) None of these

View Answer

(A) Datum

Question 26. Cyber crime is __________.

(A) Hacking

(B) Stalking

(C) Denial of service attacks

(D) All of the above

View Answer

(D) All of the above

Question 27. Word ‘blog’ is combination of two words __________.

(A) Web-log

(B) Wave-log

(C) Web-blog

(D) Wed-lock

View Answer

(A) Web-log

Question 28. Basic Input-Output system in computer resides __________.

(A) On the Hard Disc

(B) In the RAM

(C) In the ROM

(D) None of the above

View Answer

(A) On the Hard Disc

Question 29. ‘Stuxnet’ worm detected in the computers of Iran is ___________.

(A) A Hardware to speed up Internet working

(B) A malicious program to sabotage nuclear centrifuges

(C) A software to off-set hacking

(D) A device to undertake BPO

View Answer

(B) A malicious program to sabotage nuclear centrifuges

Question 30. Networking of computers ___________.

(A) Increases the chances of threats

(B) Increases the utility of computers

(C) Increases the information access possibilities

(D) All of the above

View Answer

(D) All of the above