ICT
Direction
Choose the correct answer from the below mentioned questions. Be sure to consider all the choices before deciding which one is the best.
Q. The basic unit of M/s Excel spreadsheet to enter data______ .
A) Cell
A spreadsheet is comprised of homogeneous numerous small boxes and this small boxes are the basic unit or cell of a Spreadsheet.
B) Row
C) Column
D) Unit
Discuss
Q. Which of the following is not the Section Break option?
A) Next Page
B) Previous Page
To change layout or formatting of page of a document Previous Page is used as Section Break option.
C) Odd Page
D) Even Page
Discuss
Q. Which of the following is the Word Processing software?
A) WordPerfect
Word Linear-A portion of Linear Programming
Algorithm- A sequence of instructions which are written to solve for computation purposes or to solve any problem.
Cobol- A high level programming language.
Word Perfect-WordPerfect is a word processing application.
Algorithm- A sequence of instructions which are written to solve for computation purposes or to solve any problem.
Cobol- A high level programming language.
Word Perfect-WordPerfect is a word processing application.
B) Word Linear
C) Algorithm
D) Cobol
Discuss
Q. Any data or instruction entered into the memory of a computer is considered as _____ .
A) Storage
Any data or instruction entered into the memory of a computer is considered as storage. Storage enables a computer to contain data both temporarily or permanently.
B) Output
C) Information
D) Memory
Discuss
Q. What kind of storage device can be affected by fragmentation?
A) Magnetic
B) Optical
Fragmentation refers to the segmentation of a disk in which files are divided into small sectors scattered around the disk. Optical storage uses low beam laser to write and retrieve data.
C) solid-stale
D) laser
Discuss
Q. Which of the following is a ‘Text Editor’ for Microsoft Windows?
A) Power Point
B) M/s Excel
C) Word Pad
D) Note Pad
Notepad is a basic text editor that does not include rich text formatting.
On the other hand Power Point, M/s Excel and Word Pad are the widely used Office Application software of Windows.
On the other hand Power Point, M/s Excel and Word Pad are the widely used Office Application software of Windows.
Discuss
Q. Who is the first computer programmer?
A) Alan Turing
B) Ada Lovelace
Ada Lovelace, daughter of the famous poet Lord Byron, is considered the world's first computer programmer.
C) Charles Babbage
D) Vint Cerf
Discuss
Q. USB is a device used to store data and it stands for __________ ?
A) Ultimate Service Band
B) Ultimate Serial Bus
C) Universal Serial Bus
USB, universal serial bus, is a mechanism used to connect peripheral devices with computers.
D) Universal Serial Band
Discuss
Q. Which language is mostly used for Android Operating System?
A) Kotlin
Mostly, Android apps are written in Java and Kotlin. Android Studio also supports C/C++ with the use of the Java NDK
But, Kotlin has emerged as a popular choice for developers due to its modern features and ease of use
But, Kotlin has emerged as a popular choice for developers due to its modern features and ease of use
B) Java
C) Python
D) C++
Discuss
Q. Which programming language is used extensively for Artificial Intelligence (AI)?
A) Java
B) Python
Python, Java, Prolog, Lisp, R, Julia and C++ are widely used programming languages for AI; but, Python is mostly used for AI.
C) Cobol
D) Fortran
Discuss
Q. RAM stands for _____________ ?
A) Read Access Memory
B) Read Advanced Memory
C) Random Access Memory
Random access memory (RAM) is the hardware in a computer that provides temporary storage for data in current use to make available to the processor.
D) Random Access Memory
Discuss
Q. ROM stands for _____________ ?
A) Register Only Memory
B) Read Owing Memory
C) Read Only Memory
Read-only memory (ROM) is a type of non-volatile memory used in computers and other electronic devices in order to store data that can't be electronically modified.
D) Random Onsite Memory
Discuss
Q. RAM belongs to which kind of memory?
A) Volatile memory
B) Bubble memory
C) Main Memory
RAM(Random Access Memory) is a part of the computer's Main Memory or primary memory which is directly accessible by the CPU whenever needs to retrieve data.
D) Supporting memory
Discuss
Q. The memory is for short term storage and is lost when the computer is turned off.
A) ROM
B) Register
C) ALU
D) RAM
RAM(Random Access Memory) is a part of the computer's Main Memory which is directly accessible by the CPU whenever needs to retrieve data. RAM contains data only as long as the computer is switched on. Hence, it is also called Volatile memory.
Discuss
Q. Which of the following is an example of a non-volatile computer memory?
A) RAM
B) ROM
ROM is non-volatile memory as it doesn't erase data even after reboot.
C) DRAM
D) ERAM
Discuss
Q. Semiconductor memory device in which stored data will remain permanently stored as long as power is supplied?
A) Dynamic memory device
B) Storage device
C) Static memory device
Description not available. Let’s discuss.
D) Flash device
Discuss
Q. Which one is external Cache Memory?
A) Integrated Circuit
An external cache memory (IC) is a hardware component that stores frequently-used data outside the main memory (RAM) of a computer to ensure faster access to stored data and reduces processing times by minimizing the need for the CPU to access the memory.
B) Pen Drive
C) Memory Card
D) Portable HDD
Discuss
Q. Phishing Attack is related to fake______ .
A) SMS
B) E-mail
Phishing is a malicious attack through e-mail or instant message setting a bug with an enticing request or lures with an attempt to steal sensitive information.
C) Apps
D) Voice call
Discuss
Q. Which device is mainly related to providing security of a network?
A) Firewall
Description not available. Let’s discuss.
B) Network filter
C) HDMI
D) Data Bus
Discuss
Q. Firewall protects which of the following attack?
A) Inside Attack
B) Newly Released Threats
C) Social Engineering
D) Remote login
Meaning: 100% identical.
Discuss
Q. When you start your computer, then which component works first?
A) ALU
B) BIOS
Description not available. Let’s discuss.
C) Register
D) RAM
Discuss
Q. CPU consists of __________.
A) Control Unit
B) Arithmetic and Logic Unit
C) Main Store
D) All of the above
Description not available. Let’s discuss.
Discuss
Q. Which one works as both an output and input device?
A) Speaker
B) Keyboard
C) Pen drive
Description not available. Let’s discuss.
D) Plutter
Discuss
Q. Which one is the default ‘Word Processor’ for Microsoft Windows?
A) M/s Word
B) M/s Paint
C) Word Pad
Description not available. Let’s discuss.
D) Note Pad
Discuss
Q. What is the maximum number of primary partitions that can be created on a Hard Disk?
A) 2
B) 4
Description not available. Let’s discuss.
C) 6
D) 3
Discuss
Q. Which protocol can cause overload on a CPU of a managed device ?
A) Netflow
B) WCCP
C) IP SLA
D) SNMP
Description not available. Let’s discuss.
Discuss
Q. Which protocol dynamically assigns IP address in TCP/IP network?
A) ARP
B) RIP
C) SMTP
D) DHCP
Description not available. Let’s discuss.
Discuss
Q. The combination of an IP address and a port number is known as ________________?
A) Network Number
B) Socket Address
Description not available. Let’s discuss.
C) Subnet Mask Number
D) MAC Address
Discuss
Q. When a key is pressed on the keyboard, which standard is used for converting the key-stroke into the corresponding bits ?
A) ANSI
B) ISO
C) EBCDIC
D) ASCII
Description not available. Let’s discuss.
Discuss
Q. Advanced Encryption standard (AES) is based on ________________?
A) Public Key Algorithm
B) Symmetric Key Algorithm
Description not available. Let’s discuss.
C) Key Exchange
D) Asymmetric Key Algorithm
Discuss
Q. The word length of a computer is measured in __________.
A) Bytes
B) Kilobytes
C) Megabytes
D) Bits
Description not available. Let’s discuss.
Discuss
Q. Which number system is usually followed in a typical 32-bit computer ?
A) 10
B) 2
Description not available. Let’s discuss.
C) 16
D) 32
Discuss
Q. What is LINUX ?
A) Malware
B) Operating System
Description not available, Let’s discuss.
C) Application Program
D) Firmware
Discuss
Q. The programs which are as permanent as hardware and stored in ROM is known as ____________ ?
A) Firmware
Description not available. Let’s discuss.
B) Software
C) ROM
D) Hardware
Discuss
Q. Nibble describes a combination of ____________ ?
A) 6 Bits
B) 5 Bits
C) 4 Bits
Description not available. Let’s discuss.
D) 3 Bits
Discuss
Q. Which is a counting system using only two numbers 0 and 1 ?
A) Binary
Description not available. Let’s discuss.
B) Decimal
C) UNIX
D) HTML
Discuss
Q. Which protocol provides e-mail facility among different hosts ?
A) FTP
B) TELNET
C) SMTP
Simple Mail Transfer Protocol (SMPT) used for sending and receiving e-mail.
D) Hyperlink
Discuss
Q. Which is widely used protocol to receive e-mail ?
A) POP3
Description not available. Let’s discuss.
B) POP9
C) HTML
D) SMTP
Discuss
Q. Which of the protocol is used to send a destination network unknown message back to the original host?
A) TCP
B) ARP
C) ICMP
Description not available. Let’s discuss.
D) BOOTP
Discuss
Q. Which of the following is a message authentication service beyond?
A) Message Sending
B) Message Receiving
C) Message Integrity
Explanation not available here. Let’s discuss.
D) Message Splashing
Discuss
Q. A computer that stores and forwards e-mail messages is called?
A) Mail center
B) Mail system
C) Mail server
Description not available. Let’s discuss.
D) Mail sender
Discuss
Q. What is called F1 to F12 button of a Key Board ?
A) Help Key
B) Function Key
Description not available. Let’s discuss.
C) Space Key
D) Delete Key
Discuss
Q. An unwanted repetitious message, such as unsolicited bulk e-mail is known as _________ .
A) courier
B) trash
C) calibri
D) Spam
Description not available. Let’s discuss.
Discuss
Q. What is the meaning of “CC “ in e-mail ?
A) Carbon Copy
Description not available. Let’s discuss.
B) Close Contact
C) Carbon Connection
D) Close Copy
Discuss
Q. Junk e-mail is also called ?
A) Spam
Description not available. Let’s discuss.
B) Sniffer script
C) Spoof
D) Spool
Discuss
Q. WWW stands for _____________ ?
A) World Whole Web
B) Wide World Web
C) World Wide Web
Description not available. Let’s discuss.
D) Wide World Web
Discuss
Q. Most World Wide Web pages contain commands in the language of ______ ?
A) NIH
B) HTML
Description not available, Let’s discuss.
C) URL
D) IRC
Discuss
Q. Which HTML attribute is used to hide characters of an input password?
A) Type
Description not available, Let’s discuss.
B) Tyle
C) Href
D) Src
Discuss
Q. Which one of the following is not a computer language ?
A) PASCAL
B) UNIX
Description not available, Let’s discuss.
C) FORTRAN
D) COBOL
Discuss
Q. WAN stands for ________ .
A) Wap Area Network
B) Wide Array Network
C) Wireless Area Network
D) Wide Area Network
Description not available. Let’s discuss.
Discuss
Q. What is related with the word WAN ?
A) CPU
B) Monitor
C) Motherboard
D) Network
Description not available. Let’s discuss.
Discuss
Q. Which device uses a DMA channel ?
A) Modern
B) Network Card
C) Sound Card
Description not available. Let's discuss.
D) Data Bus
Discuss
Q. The brain of any computer system is ___________ ?
A) ALU
B) CEMOS
C) CPU
Description not available. Let’s discuss.
D) Control Unit
Discuss
Q. Which of the following memory is non-volatile ?
A) ROM
Description not available. Let’s discuss.
B) RAM
C) DRAM
D) SRAM
Discuss
Q. Microsoft Window is a(n)?
A) Graphic program
B) Database Program
C) Operating System
Description not available. Let’s discuss.
D) Word Processing
Discuss
Q. For which purpose MS Outlook is used ?
A) Using Database
B) Creating Documents
C) Internet Browsing
D) Using E-mail
Description not available. Let’s discuss.
Discuss
Q. SHTTP stands for which of the following ?
A) Secure Hyper Text Transmission Protocol
B) Smooth Hyper Text Transmission Protocol
C) Secure Hyper Text Transfer Protocol
Description not available. Let’s discuss.
D) Slow Hyper Text Transfer Protocol
Discuss
Q. Computer Keyboard is also known as _____________________ .
A) Console
Description not available. Let’s discuss.
B) Control Board
C) Option Board
D) Function Board
Discuss
Q. Which of the following companies launched world’s first Smartphone ?
A) Samsung
B) IBM
On 16th August, 1994 IBM launched the first Smartphone “SIMON” in market.
C) Apple
D) Blackberry
Discuss
Q. PNG refers to _____________ ?
A) Image File
Description not available. Let’s discuss.
B) Animation File
C) MS Office Document
D) Audio File
Discuss
Q. “.INI” extension refers usually to what kind of file ?
A) Image File
B) Hypertext file
C) System File
Description not available. Let’s discuss.
D) Image Color Matching Profile
Discuss
Q. In M/s Office package, which of the following is a series of recorded commands for automate a task ?
A) Auditing
B) Outlining
C) Macro
Description not available. Let’s discuss.
D) Status Bar
Discuss
Q. In MS Word, which of the following function key activates the spell checking ?
A) F7
Description not available. Let’s discuss.
B) F9
C) F11
D) F12
Discuss
Q. Which of the following is the modifier key of the keyboard?
A) Esc
B) Enter
C) Backspace
D) Shift
Description not available. Let’s discuss.
Discuss
Q. What is part of a database that holds only one type of information ?
A) Report
B) Field
Description not available, Let’s discuss.
C) Record
D) File
Discuss
Q. The collection of information stored in a database at a particular moment is called__________?
A) Relation
B) Instance
Description not available. Let’s discuss.
C) Schema
D) Record
Discuss
Q. Which is a type of Electrically-Erasable Programmable Read-Only Memory ?
A) Flange
B) Flash
Description not available, Let’s discuss.
C) Fury
D) FRAM
Discuss
Q. Who developed Yahoo ?
A) Dennis Ritchie & Ken Thompson
B) Vint Cerf & Robert Kan
C) Steve Case & Jeff Bezos
D) David Filo & Jerry Yang
Description not available. Let’s discuss.
Discuss
Q. A network of computers and other devices that is confined to a relatively small space called ?
A) Wide Area Network
B) Local Area Network
Description not available, Let’s discuss.
C) Peer-to-Peer Network
D) Global Area Network
Discuss
Q. What do we call a network whose elements may be separate by some distance if it usually involves two or more small networks and dedicated high speed telephone lines ?
A) URL
B) LAN
C) WWW
D) WAN
Description not available. Let’s discuss.
Discuss
Q. Which one of the following extends a price network across public networks ?
A) Local Area Network
B) Virtual Private Network
Description not available, Let’s discuss.
C) Enterprise Private Network
D) Storage Area Network
Discuss
Q. Which item appears dimly behind the main body text ?
A) Water Color
B) Watermark
Description not available, Let’s discuss.
C) Background
D) Back Color
Discuss
Q. Which one is an example of spreadsheet software ?
A) MS Access
B) MS Power Point
C) MS Word
D) MS Excel
Description not available. Let’s discuss.
Discuss
Q. In internet terminology IP means________ .
A) Internet Provider
B) Internet Procedure
C) Internet Processor
D) Internet Protocol
Description not available. Let’s discuss.
Discuss
Q. Which is the short-cut command (using Keyboard) to add a new slide in a power point slide?
A) ctrl + n
B) ctrl + p
C) ctrl + m
Description not available. Let’s discuss.
D) ctrl + o
Discuss
Q. In M/s Word, a paragraph mark can be created on pressing the ______________ key ?
A) Enter
Description not available. Let’s discuss.
B) Tab
C) End
D)Ctrl
Discuss
Q. In a spreadsheet program, a __________ is a set of worksheets to the same file ?
A) formula
B) workbook
Description not available, Let’s discuss.
C) value
D) label
Discuss
Q. In a spreadsheet, ___________ can help you make sense of a worksheet’s content ?
A) labels
Description not available. Let’s discuss.
B) formulae
C) values
D) tables
Discuss
Q. DPI stands for _____________ ?
A) Digits Per Instruction
B) Dots Per Inch
C) Dot Per Inch
Description not available. Let’s discuss.
D) Diagrams Per Inch
Discuss
Q. A laser printer’s speed is measured in _________ ?
A) cps
B) ppm
Description not available, Let’s discuss.
C) dpi
D) cpi
Discuss
Q. Which programming language(s) are classified as low level language(s) ?
A) BASIC, COBOL, FORTRAN
B) C, C++
C) Assembly language
Description not available. Let’s discuss.
D) Prolog
Discuss
Q. In MS Power Point, which function key in the keyboard is used as shortcut key for starting slideshow ?
A) F1
B) F3
C) F5
Description not available. Let’s discuss.
D) F10
Discuss
Q. Existing Excel charts can be edited by pressing which of the following key ?
A) F1
B) F2
Description not available, Let’s discuss.
C) F3
D) F4
Discuss
Q. Which of the following expresses the elaboration of VIRUS?
A) Vital Information Resource under Seize
Explanation not available here. Let’s discuss.
B) Vital Information Resource under Segment
C) Volatile Information Resources under Suspect
D) Very Important Resource under Secrecy
Discuss
Q. Computer Virus is a type of ________________?
A) Hardware
B) Software
Description not available. Let’s discuss.
C) Micro Organism
D) Non-living Cell
Discuss
Q. Antivirus is a type of ___________ ?
A) System Software
B) Utility Software
Description not available, Let’s discuss.
C) Application Software
D) Publishing software
Discuss
Q. Which of the following is not antivirus software ?
A) Oracle
Description not available. Let’s discuss.
B) Avira
C) Kaspersky
D) e-scan
Discuss
Q. Which of the following is not application software?
A) Windows
System Softwares are Macintosh, DOS, Unix, Windows.
B) Google Chrome
C) Messenger
D) Netscape Navigator
Discuss
Q. A megabyte is actually equal to __________ kilobytes ?
A) 1,000
B) 1,028
C) 1,024
Description not available. Let’s discuss.
D) 100
Discuss
Q. In MS Word, pressing F8 key for three times selects __________ .
A) whole page
B) a paragraph
C) a word
D) a sentence
Description not available. Let’s discuss.
Discuss
Q. Which of the following data structures can be used both as Stack and Queue?
A) Vector
B) Hash Table
C) Deque
Description not available. Let’s discuss.
D) Binary Search Tree
Discuss
Q. Which of the following device take data sent from one network device and forward to the destination node based on MAC address?
A) Switch
Description not available, Let’s discuss.
B) Gateway
C) HUB
D) Router
Discuss
Q. Which of the following uses the flip-flop circuit in a memory cell?
A) EEPROM
B) DRAM
C) SDRAM
D) SRAM
Description not available. Let’s discuss.
Discuss
Q. Which of the following is the data control language in SQL?
A) Create
B) Insert
C) Grant
Description not available. Let’s discuss.
D) Drop
Discuss
Q. Banking software is a/an______________ .
A) System Software
B) DBMS
C) Operating System
D) Application Software
Banking softare is an application softare. Example-Microbanker, Finacle, T24, Mysis, Flora Bank Online, Bank Ultimas, Ababil, Stealer.
Discuss
Q. Which one of the following is an object Oriented Programming language?
A) Cobol
B) C++
Object Oriented Programming Languages are Java and C++.
C) Auto CAD
D) Eudora
Discuss
Q. Hyperlink is used to_____________ .
A) brows Web Browser
B) store a web page
C) navigate the hypertext.
Hyperlink is a link from a hypertext document to another location, activated by clicking on a highlighted word or image.
D) transmit data
Discuss
Q. The balance and transactions of a bank account are recorded into ____________ .
A) DBMS
DBMS softwares are Oracle, DB2 and SQL Server.
B) RAM
C) Field
D) Processor
Discuss
Q. Where a Dark Fiber is used?
A) In a Data Bus
B) In Fiber Optic Cable
C) Between DC and DRS
Dark Fiber is a dedicated direct fiber optic (high bandwidth and high speed) between two points.
D) Between LAN and MAN
Discuss
Q. A hash function is used to detect ___________ .
A) changes to a message
Explanation not available here. Let’s discuss.
B) bug in a message
C) receiver of a message
D) destination of message
Discuss
Q. Which of the following is used to identify and verify individuals and ensure the integrity of the message?
A) Encryption
B) Digital signature
Explanation not available here. Let’s discuss.
C) Authentication bar
D) URL identifier
Discuss
Q. Compromising confidential information results in ____________ .
A) Malfunction
B) Bug
C) Threat
Explanation not available here. Let’s discuss.
D) Surveillance
Discuss