Saturday, August 25, 2018

300 MCQ -COMPUTER SCIENCE [SLC / SEE] with answers



Networking and Telecommunication
1.      Data communication means:
                           i.          We can easily send and receive the message                    Data computing system is fastest in network
                         ii.          The process of transferring data and information                    None of above
2.      The term network basically refers to:
Communication                         Interconnection                         Sharing                         All of them
3.      Which of the following are is not a goal of computer networks?
Resource sharing                       High reliability                          Scalability            None of the above
4.      Which one of the device is simplex?
i. Television           ii. Telephone                 iii. Computer                 iv. Walkie-Talkie
5.      TV broadcasting is an example for data transmitting
i. Half-duplex Mode   ii. Simplex Mode   iii. Full duplex mode   iv. None of them
6.      Which refers to the communication media: [SLC 2065]
UTP Cable              Fiber optics cable          Satellite                        All of above
7.      Which is not a communication media? [SLC 2067]
Wire                 Microwave                    Satellite                        NIC
8.      Which is not unguided media? [SLC 2069]
i) Fiber optics        ii) Microwave               iii) Infrared                   iv) Radio wave
9.      Which is NOT a guided media? [SLC 2066 S]
i) UTP Cable           ii) STP Cable    iii) Satellite                  iv) Fiber Optics
10.   Which of the following is not a guided data communication media? [SLC 2068 S]
i) Coaxial cable       ii) Fiber optic    iii) twisted pair              iv) Satellite
11.   Which transmission media is not used for guided transmission media?
Fiber Optic             Coaxial Cable               RJ45                             Satellite
12.   Which one is an example of bounded media? [SLC 2067 S] [SLC 2070]
i) Fiber optics        ii) Microwave transmission        iii)Laser transmission     iv) infrared transmission
13.   An example of guided media_______
Radio wave             Infrared                        Fiber Optics                 Micro wave
14.   In which communication media data transfer high? [SLC 2068]
i) Twisted pair         ii) Co-axial cable           iii) Fiber optics            iv) Microwave
15.   Fastest and high bandwidth data communication medium is:
Optical fiber          Twisted Pair                  Coaxial Cable               Telephone Line
16.   Media used to transfer data in forms of light? [SLC 2070 S]
i. Microwave   ii. Fiber optical   iii. Radio wave   iv. Satellite
17.   Microwave and Infrared technology are related with:
Unbounded media              Bounded Media             Confounded                  Hot Bounded
18.   A form of wireless transmission in which signals are sent via pulses of infrared light.
i) Radio networking   ii) Infrared transmission  iii) Microwave transmission  iv) None of the above  
19.   Which is the connector of UTP cable?
i. BNC                    ii. T-Connector              iii. ST connector            iv. RJ-45 connector
20.   Which is the connector of coaxial cable.
i. RJ 45      ii. BNC      iii. ST      iv. None of them
21.   Which of the following is not Media connector?
BNC             ii. terminator    iii.RJ-45            iv.NIC
22.   The device used for connecting PC to telephone line is
i) CD-ROM            ii) MODEM                 iii) Printer                     iv) Port
23.   A device that converts the discrete stream of digital ON-OFF electric pulses used by computer into the continuously variable analog wave patterns used to transmit the human voice over many existing telephone lines.
i) Modem                   ii) Bridge                              iii) Gateway
24.   Modem converts ______________ [SLC 2066 S]
Sound into digital                Digital signal into sound            Both (i) and (ii)        None of above
25.   The speed of Modems is measured in terms of
mbps                 ii.bps   iii. kbps                 iv. bits
26.   Which device is used to connect multiple networks that uses the same protocol. [SLC 2074]
(i) Bridge               (ii) NIC            (iii) Switch                    (iv) Gateway
27.   Which of the following is used to connect  totally dissimilar networks?
i) Router                 ii) Bridge                      iii) Gateway                 iv) None of the above
28.   A networking device that joins multiple networks having different protocols is_
 Switch                   ii. Router                      iii. Gateway                 iv. Bridge
29.   Which is not a network device?
Hub                  Repeater                       switch                           TCP/IP
30.   Which is not a physical component of computer network ?
i) Cable                  ii) NIC                          iii) Network OS                        iv) Hub
31.   Which is not network hardware component?
HUB                                  ii. Repeater                   iii. Router                     iv. Windows NT
32.   Which is the component of a network?
i. MSDOS      ii. Hub      iii. Volt guard      iv. None of them
33.   Devices installed on long cable runs to amplify the signal are called:
Repeaters                     Adapters                                   Switches                       Routers
34.   A network navigation device that merely retransmits a signal to all other nodes attached to it:
Router                          NIC                                          Hub                             Adapter
35.   A device that lets you link two networks together.
i. Switch                      ii. Hub                     iii. Router           iv. None of above
36.   Which of the following device is multi ports repeater?
Hub                       ii. router                       iii. bridge                      iv. Gateway
37.   Any network device that can connect to the network and can generate ,process or transfer network data.
i) Node                        ii) Client                              iii) Peer
38.   A network interface card is the card that physically makes the connection between the computer
and the network cable.
i) Network cables            ii) Network connector              iii) NIC
39.   Which is not the network operating system:
Linux                           UNIX                           MS-DOS                      Windows Server 2012
40.   Which is Network operating system(NOS)? [SLC 2064]
i. Linux                  ii. Windows XP                         iii. MS-DOS                 iv. All
41.   Which is the network operating system used in a server computer?
i. Windows XP        ii. Windows Vista          iii. Windows NT server    iv. None of them
42.   Which one is an operating system software? [SLC 2070]
i) MS-Word            ii) MS-Excel     iii) Firefox        iv) MS-DOS
43.   Protocols in network means
i)                 Language for communication between computer  
ii)               Rules for exchange of message between two or more hosts
iii) Both i) and ii)                                       iv) None of the above
44.   Which of the following is not a protocol? [SLC 2068] [SLC 2074]
i) POP        ii) TCP/IP         iii) NOS                       iv) FTP
45.   Which is not a network protocol?
i. TCP/IP      ii. HTTP         iii. LAN                         iv. FTP
46.   Which of the following is not a protocol?
TCP/IP        ii.IPX/SPX       iii.NETBIOS/NETBUI        iv. Client
47.   Which is not the network protocol?
 TCP/IP                  ii. STP                         iii. FTP             iv. SMTP

48.   Which of the following is protocol?
TCP/IP                   HTTP               FTP                  All of them
49.   The communication protocol used to connect to web servers on the internet or on a local network (intranet).
i) TCP/IP                 ii) HTTP         i) SMTP             iv) POP
50.   _______ is the protocol used to send email:
HTTP               SMTP              POP                 FTP
51.   Which protocol is used to receive mail from mail server?
POP                       FTP                  HTTP               SMTP
52.   Which of the following networking solution is suitable for networking within a building?
i) WAN                  ii) LAN            iii) MAN          iv) None of above
53.   A data communications system allowing a number of independent devices to communicate directly with each other, within a moderately sized geographic area.
i.LAN                     ii.WAN                        iii. MAN                         iv.CAN
54.   A network of computer spread over a city or town located in the same geographical area.
i) LAN                      ii) MAN                     iii) WAN
55.   A telecommunication network, usually used for connecting computers, that spans a wide   geographical area.
                        i) LAN                ii) MAN                   iii) CAN                 iv) WAN
56.   Which type of network is used in the internet?
LAN                MAN                            GAN                            WAN
57.   Which of the following topologies share a single channel on which all stations can receive and transmit the data?
i) LAN                   ii) BUS             iii) TREE          iv) None of the above
58.   Physical layout of computer:
Network                       Topology                      LAN                             MAN
59.   Which is not a network topology? [SLC 2066]
STAR                           Ring                             Client Server               BUS
60.   A topology with a single cable that connects all the workstations, servers, printers and other devices on the network.
i. Ring Topology           ii. Bus Topology                 iii. Star Topology     iv. Mesh Topology
61.   Which of the following topologies is least affected by addition/removal of a node?
i) Star                    ii) Ring             iii) Bus             iv) None of the above
62.   In which topology network devices are connected through hub? [SLC 2067]
i) Ring topology      ii) Bus topology            iii) Star topology                      iv) None of the above
63.   Token passing system is used in _____ topology.
Star                              Ring                                         Bus                              Mesh
64.   The network architecture used in most home networks is:
Client-server LAN                     Peer-to-peer LAN        Client-server WAN            Peer-to-peer WAN
65.   A _______ is a self-sufficient computer that acts both as a server and a client to other similar computers on the network.
i. Node       ii. Client                       iii. Peer
66.   A group of computers that functions both as a client and as a server.
                        Centralized computing          ii) Client/server      iii) Peer-to-peer          iv)Local Area Network
67.   In which of the following network model all the computers have equal access?
i. Peer-to-peer network              ii. apple talk network
iii. Client/server network            iv. None of the above
68.   A specialized network device on a host-based network that transmits the data entered by the user to the host for processing and displays the results.
i. Client                   ii. Network Server                    iii. Terminal                 iv. None of the above
69.   A centralized computing network is a type of network where  all the users connect to a host computer that is the acting agent for all communication.
i) Peer-to peer                     ii) Client/server                          iii) None of the above
70.   A network in which a central host computer performs data processing and storage on behalf of clients.
i. Centralized computing network              ii. Client/Server network            iii. Peer-to-peer network
71.   Which of the following acts as the central authority in the network?
protocol                  ii.client             iii.server           iv.none of the above
72.   A server in LAN is a
i) Device offering service to user                ii) NIC             
iii) Workstation with huge secondary storage             iv) None of the above
73.   A dedicated server that manages printers and printing jobs is_
 Network Server      ii. Printer Server          iii. Modem Server         iv. File Server
74.   The maximum speed at which data can be transmitted between two nodes on a network.
Bit rate                   Bandwidth                   Band length                  None of them
75.   The bandwidth of digital signal is measured in­_
i. Hertz                   ii. Cycle per second       iii. Bits per second       iv. None of the above

Internet and Its services

76.   The internet was developed by US.
Department of Defence      Department of Electronics          Department of Commerce       None
77.   The large group of millions of computers around the world that are all connected to one another.
LAN                             Intranet                         Internet                               All of above
78.   Which is not related to Internet? [SLC 2067]
i.ISP                             ii.TCP/IP               iii.WWW                       iv.UPS
79.   Which of the following network connects computer to the Internet? [SLC 2069 S]
i) Intranet                ii) LAN            iii) WAN                      iv) MAN
80.   Which device is necessary to operate the internet? [SLC 2066 S]
i.CD-ROM         ii. ISP                         iii. Modem                 iv. All of above
81.   Connection between a computer and  the Internet done using a normal telephone is called
                                     i.          Satellite network                 Dial-Up network          Cable network         None of them
82.   Which is the protocol used in internet?
i. TCP/IP            ii.FTP                                    iii.ICP                           iv.ISP
83.   __________ is the main line of defense between a local network or intranet and the Internet.
USB port                Encryption key              Firewall           Decryption key
84.   Each computer on the Internet has a unique numeric address called a/an …. [SLC 2069 S]
i) Web address        ii) Domain address        iii) Network binding      iv) IP address
85.   The ARPAnet that helped to develop protocol is
                                     i.          TCP/IP                  ARP                 POPA               None of above
86.   Which of the flowing is the internet service? [SLC 2069]
IRC                        E-Mail              Telnet               All of above
87.   Which is the internet service? [SLC 2064]
i) Telnet                        ii) POP             iii) Both           iv) None
88.   Which one is not the service of the Internet?
Electronic Fax               ii. Chatting        iii. Sharing hardware               iv. Electronic mail
89.   Which is not an internet service? [SLC 2066 S]
i) e-mail                        ii) e-telephone              iii)e-fax            iv) e-commerce
90.   WWW is a
Protocol of Internet              Service of Internet       Language of Internet      None of them
91.   Email is
                                     i.          Mail concerning electronic devices
                                   ii.          Transaction of letters,messages and memos over a communication network.
                                  iii.          Transaction of messages within a computer.                          None of them.
92.   E-mail is a/an …………… [SLC 2067 S]
i) organization which controls internet          ii) protocol to access internet      iii) service of Internet iv) none
93.   Which is the correct Email ID? [SLC 2065]
i) Yahoo@ramesh   ii)
Ramesh@yahoo.com                       iii) @ramesh.yahoo.com    iv) None of the above
94.   In an email address : abc@yahoo.com, what does ‘yahoo’ refer?
User account name        ii. Domain name          iii. Top level domain name         iv. None of them.
95.   Which of the following is online business?
E-Commerce           E-shopping       E-Business        All of the above
96.   E-commerce is ………….[SLC 2067 S]
i) a type of business                        ii) a type of virus           iii) both (i) &(ii)            iv) None of the above
97.   Each web page has its own unique address known as
i) Uniform Resource Locator                                   ii) Universal Resource Locator
iii) Uniform Resources Locator                               iv) Universal Resources Locator
98.   The unique address of a web page on the internet is called
i.URL                 ii. Browser                 iii. Protocol                 iv. HTTP
99.   Which of the following allows the user to surf and interact with the web-page?
i. website                  ii. Browser                 iii.web page                  iv.web server
100.          Which is web browser software? [SLC 2067]
 i. Windows 2007             ii. Internet explorer  iii. Windows NT                       iv. All of the above
101.          Web sites that allow the users to search information based on keywords or a combination of keywords.
                        i)World Wide Web          ii) Electronic mail                iii) Search engines
102.          Which is not the search engine?
Yahoo.com                   ii. Google.com              iii. Bing.com                 iv. Ebay.com
103.          Yahoo! Is a ……..
i. browser                     ii .home page                iii. search engines
104.          FTP is used to
                                     i.          Browse the Internet             Send emails
                                   ii.          transfer files from one computer to another                       None of above
105.          Used to transfer file from one computer to another computer in Internet. [SLC 2070 S]
i. FAQ              ii. IRC              iii. FTP                        iv. TPF
106.          Which of the following is remote login service? [SLC 2068 S] [SLC 2071]
        i) Video conferencing  ii) Telnet          iii) FTP             iv) TCP/IP
107.          A web site in the internet that brings people together in central location to talk, share ideas, share
                        interests, make new friends.
                        i)USENET                   ii) Social network                        iii) Web chat
108.          An online interactive communication mechanism that lets people to make a real time decision with
one or more people through the Internet.
                         i)Web chat               ii)Newsgroup                     iii)Videoconferencing
109.          The service of the Internet that provides audio and video conversation is_
Chat                 ii. E-mail          iii. Video conference                iv. Video chat
110.          The process of transferring file from a remote computer to local computer is:
Uploading                     Downloading                Searching                      File transfer protocol
111.          The process of transferring file from a local computer to internet is:
Uploading              Downloading                Searching                      File transfer protocol
112.          Web-site is a collection of
HTML documents         Graphics File                audio and video files      All of above
113.          A set of interconnected WebPages, usually including a homepage, generally located on the same server, and prepared and maintained as a collection of information by a person, group, or organization.
i. Web site                    ii. Web Browser            iii. Web server              iv. None of above    
114.          A technology that allows the creation of collaborative web sites.
i. Wiki                         ii. E-Mail                     iii. Search Engine          iv. All of above


Computer Security
115.          The term computer security refers to:
Use of antivirus                                     Protection of software   
Protection to a computer system                      Use of firewall

116.          Common computer security is
Hardware Security                                 Software security          
Hardware & software security             None of them
117.          _______ protect the machine and peripheral hardware from theft, electronic intrusion and damage.
i) Information security         ii) Hardware security       iii) Software security            iv) None of the above
118.          Some of the methods of hardware protection are:
i) Fire Alarms            ii) Security Lighting  iii) Closed-circuit cameras               iv) All of above
119.          Some of the methods of hardware protection are:
i. Password security                  ii. Security lighting               iii. Scandisk                iv. All of the above
120.          Which of the following is not hardware security method?
i. Insurance     ii. Maintenance       iii. Closed-circuit cameras        iv. Hard lock key
121.          Hardware security includes
Regular maintenance           Use of power of regulator devices           Both               None of them
122.          Which is not the power protection device?
UPS                                   Spike Guard                  Volt Guard              Scan disk
123.          Which of the following is not power supply device?
i. Volt guard               ii.UPS     iii. Constant Voltage Transformer                   iv. Power Plug
124.          A device that protects your PC against power surges and spikes.
i) UPS              ii) Voltage Regulator                       iii) Surge suppressor                iv) All of the above
125.          An electrical regulator designed to automatically maintain a constant voltage level.
i.UPS                ii. Voltage regulator                      iii. Surge processor        iv. All of the above
126.          UPS is a
Voltage filtration device       Voltage processing device          Voltage regulator device           None
127.          ……….. is a device that allows your computer to keep running for at least a short time when the primary power source is lost.
i.UPS           ii. Voltage regulator     iii. Surge processor        iv. All of the above
128.          To prevent the loss of data during power failures, we use:
Encryption program             Surge protector              Firewall                  UPS
129.          Which device protects hardware? [SLC 2068]
i) UPS        ii) MODEM      iii) Gateway      iv) All of the above
130.          The temperature in computer system should be maintained between ______to________
i)21`C to 24`C              ii) 20`C to 25`C                   iii) 23`C to 28`C                       iv) None of the above
131.          The temperature in the computer system should be maintained between  ……….   and          ……….
i. 68 to 72 degree Fahrenheit                     ii.88 to 78 degree Fahrenheit     
iii.68 to 27 degree Fahrenheit                       iv. All

132.          The type of security that provides barriers and other cyber –tools that protect programs, files
and the information flow to and from a computer.
i) Computer security            ii) Hardware security     iii) Software security       iv) None of the above
133.          Which of the following is not software security measure?
i. Virus Scanning          ii. Scandisk                  iii. Password             iv. Security Guard
134.          Data and software security includes
Protection from computer virus     Cover the computer property      Both          None of them
135.          An important counter measure against data corruption or loss.
Password policy                  Defragmentation            Scan disk                Backup system
136.          Which of the following measure allows to protect computers being opened from unauthorized user?
i. Antivirus program      ii. Password                 iii. Debug               iv. program
137.          Scan disk is used for
Removing virus                   Removing bad clusters             Backup data      All of above
138.          Scan disk is performed by using
Application software            Operating system software                     Utility software      None

139.          Backup is way of
                                     i.          Securing data and information                              Securing internal part of the computer
                                   ii.          Securing external parts of the computer                     None of them
140.                                      refers to the condition of a disk in which files are divided into pieces scattered around the disk.
i. Fragmentation    ii. Defragmentation       iii. Scan disk     iv. All of the above
141.          Process of arranging the scattered parts of file into a contiguous manner. [SLC 2068 S] [SLC 2071] [SLC 2074]
        i) Backup        ii) Defragmentation      iii) Debugging   iv) All of the above
142.                                                                                  The process of loading the noncontiguous fragments of data, rearranging   the fragments and restoring them into fewer fragments or into the whole life.
i)Fragmentation              ii) Defragmentation              iii) Scan disk
143.          Defragmentation is a process of
Formatting the disk                                      Relocation of the disk               
Relocation of the files of the disk                           None of them

Computer Virus
144.          Computer virus is___________software.
i. Malware                   ii. Utility                       iii. Application  iv. Operating System
145.          Computer virus is ………. [SLC 2068 S]
         i) dust particle                        ii) computer programs iii) useful program         iv) none of the above
146.          Virus is a [SLC 2071]
i. Utility program          ii. Destructive program            iii. System program        iv. None
147.          Computer virus can
i. Hide in a host file                   ii. Replicate                  iii. Spread                    iv. All of the above.
148.          Computer virus can destroy
i. Hardware                         ii. Software                  iii. Data                                iv. All
149.          Which is not a virus? [SLC 2064]
i. Worm                        ii. Logic bomb              iii. Trojan Horse            iv. Win-zip
150.          Which one is not a type of virus? [SLC 2067 S] [SLC 2070]
i) Message Carrying virus                      ii) Boot sector virus      
iii)System virus                                     iv)Special Purpose Application Infector
151.          Route of virus transmission. [SLC 2065]
Mouse                    Printer              Microphone                  Pen drive
152.          What is the route of virus transmission? [SLC 2070 S]
i. Monitor         ii. Flash drive   iii. Mouse                     iv. Cable
153.          Computer virus can spread from one computer to another through_
i. Infected portable disk       ii. The Internet              iii. Pirated software       iv. All of the above.
154.          A program or set of programs designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, Trojans, adware and more.
i)Shareware                     ii)Freeware                          ii)Antivirus
155.          Which of the following is not anti-virus
i.AVG                                  ii.NAV                      iii, Kaspersky                      iv. I Love you
156.          Which of the following is an anti-virus program? [SLC 2068 S]
        i) NAV                       ii) Windows      iii) Photoshop    iv) All of the above
157.          An example of antivirus software is
i. NAV   ii. McAfee   iii. CPAV       iv. All

158.          Which is antivirus software?
i. Scan                    ii. Defrag          iii. Kaspersky               iv. Power point
159.          Norton antivirus, when loaded onto a computer system , checks the following areas for viruses  
boot record             programs at the time you use them                                  both
160.          ________ Virus are often transmitted by a floppy disk left in the floppy disk drive.
Boot-sector             Trojan horse                  Script               logic bomb
161.          Which computer virus damages the master boot record? [SLC 2068]
i) Macro virus  ii) File virus      iii) New folder virus      iv) Boot sector virus
162.          Which virus infects boot sector files? [SLC 2069]
i) Macro virus         ii) Multipartite virus      iii) Boot sector virus     iv) Program virus
163.          Boot sector virus infects [SLC 2066]
i. System files                     ii. Master boot record  iii. Application software    iv. Document file
164.          Disk Killer, stoned and Michelangelo are examples of ________________
i) Boot sector virus                         ii) File infecting virus  
iii) Polymorphic virus                      iv) All of the above
165.          A virus that infects the part of the computer called a system sector.
i. Boot sector virus              ii. File infecting Virus  iii. Polymorphic virus              iv. None of the above
166.          Which of the following virus infects the various parts of operating system?
i. boot sector                        ii. Worm                    iii. Macro                             iv. system infector
167.          A type of virus that infects executable files having .exe, .com, .ovl, .drv, .sys, or .dil.
i) Boot sector virus                ii) File infecting          iii) Script virus                                   iv) Macro virus
168.          __________ Virus can infect both programs and boot sectors.
Stealth virus                        File infectors                 Multipartite virus              Polymorphic virus
169.          Multipartite viruses have combination features of
i. Boot sector & stealth virus                        ii. Boot sector &macro  virus    
iii. Boot sector & program virus                            iv. None
170.          Viruses attach themselves to documents such as Word and Excel.
Macro virus            File infectors                            Polymorphic virus        
171.          A type of virus that replaces a macro , which is what enables a program to work and instigates a designated group of actions and commands.
i)Macro virus                         ii)File infecting virus                       iii)Polymorphic virus
172.          A virus that can change its appearance with every infection is called_____________
i) Boot virus                        ii) Micro virus               iii) Script virus                                       iv) None of them
173.                                        is a self-encrypted virus designed to avoid detection by a scanner.
i. Polymorphic virus                      ii. Macro virus  iii. Script virus  iv. None of the above
Multimedia and Its Application
174.          A computer-derived electronic system that allows the user to control, combine, and manipulate different types different types of media, such as text, sound, video, computer graphics and animation.
Monomedia             Multimedia                  Hypermedia                  None of the above
175.                                                                                                    In order to work with multimedia a personal computer typically requires the following hardware   components.
                          i)Faster CPU                   ii)Large main memory              iii)All of above          iv)None of above
176.          In order to work with multimedia, a personal computer typically requires the following hardware components.
Power microprocessor                      Huge main memory       Compact disk    All of them
177.          Which of the following media are used in Multimedia system?
i. Text-audio          ii. Text-visual     iii. Text, graphic, audio and visual       iv. Text, graphic and sound
178.          The types of media used in multimedia includes
                                     i.          Text                                   Graphics                       Sound                           All of them
179.          A MUK consists of the
                                     i.          CD-ROM Drive      Sound Card                   Speaker            All of them
180.          Which of the following are components of multimedia?
i. Computer                     ii. Software                             iii. Projector                   iv. All of above
181.          Which of the following is main component of multimedia? [SLC 2065]
i. Floppy disk                 ii. Floppy drive                 iii. Sound card               iv. Magnetic tape
182.          Which of the following is the component of multimedia? [SLC 2069 S]
         i) Network     ii) Microphone             iii) Power cable             iv) Printer
183.          Select the common components of the multimedia computer system.
                                     i.          Floppy                    Floppy drive                 CD-ROM                     None
184.          Which is not related to multimedia? [SLC 2069]
i) Printer                      ii) Sound card                           iii) Microphone             iv) CD-ROM
185.          Which of the following is an audio output device? [SLC 2070]
i) Microphone         ii) Speaker                               iii) Monitor                   iv) Printer
186.          Which of the following is an audio input device? [SLC 2071]
i. Printer                  ii. Microphone                                     iii. Head phone                        iv. Speaker
187.          Which of these software is used for photo editing? [SLC 2074]
(i) Ms-Excel                        (ii) Photoshop (iii) Power-Point            (iv) Ms-Word
188.          Which one is the software used in multimedia?
CD-ROM                Sound Card                   Sound Forge                MS-Word
189.          Software used in multimedia system.
Photoshop               Flash                            Maya                            All of them
190.          The software associated with the multimedia technology is                           .
i. Macromedia Flash           ii. Microsoft Word. iii. Adobe In design           iv. None of the above
191.          Software associated with the multimedia technology is
Windows XP                 Macromedia Flash       QBASIC                       None
192.          Which of the following is software used in multimedia technology.
i. Office XP                     ii. Adobe Photoshop             iii. Basic                       iv. None of the above
193.          Which of the following is not multimedia software?
i. Windows media player           ii. Windows XP     iii. Adobe illustrator         iv. Macromedia flash
194.          Which of the following is multimedia application?
i. Education                  ii. Entertainment                   iii. virtual reality          iv. All  of above
195.          Multimedia technology is very effective in
                                     i.          Market                                Classroom                    War                        None
196.          Multimedia technology is used in ……… [SLC 2066]
i) Education                  ii) Business                   iii) Health care              iv) All of the above
197.          An artificial reality that projects the user into a 3D space generated by the computer.
Virtual Reality             Virtual Computer                      All of the above             None of the above
198.          An upcoming technology that makes users feel in Virtual Environment(VE) by using computer    hardware and software.
  i)Virtual space                      ii)Virtual computer           iii)Virtual reality          iv)None of above
199.          _____ deals with the recording and display sequence of images at a reasonable speed to create an impression of movement.
Graphics                 Video                           Animation                     Text
200.          Graphics that contain movement often referred to as                        .
i. Graphics                      ii. Video               iii. Animation                                iv. Text
201.          _______ provides a visual impact.
Image                     Graphics                      Video               None of them
202.                                                                                                    The process of displaying still images in a rapid sequence to create the illusion of movement.
                          i)Text                                ii)Graphics                      iii)Video                    iv)Animation
203.          An extension to hypertext supports linking graphics, sound and video elements in addition to text elements.
Interactive media                       Hypermedia                 All of the above             None of the above
Cyber Law and Computer Ethics
204.          A genetic term that is concerned to the legal and regulatory aspects of Internet and computer technology.
Copyright law                     Cyber law                    Computer Crime      None of them
205.          “The Electronic Transaction and Digital Signature Act-Ordinance” is Known as:
                                                              i.     Intellectual Property Law                             Cyber Law
                                                            ii.     Telecommunication Law                              Data Protection Law
206.          When did cyber law introduced in Nepal?
i.2002 A.D.        ii.2003 A.D.                      iii.2004 A.D.                  iv.2005 A.D.
207.          When did cyber law introduced in Nepal? [SLC 2066] [SLC 2070 S]
i) 2061 B.S.      ii) 2062 B.S.     iii) 2007 B.S.    iv) 2016 B.S.
208.          The government of Nepal has passed the cyber law on:
31st Bhadra 2061 BS                        29th Bhadra 2061 BS      30thBhadra 2062 BS            30thBhadra 2061 BS
209.          The term ‘cyberspace’ was used in:
1984                              1884                             1985                            1885
210.          A criminal activity within the information technology infrastructure.
Digital crime                       Intellectual property       Cybercrime                  All of them
211.          Which of the following is computer crime?
i. piracy            ii. pornography                  iii. harassment                iv.All of above
212.          Which of the following is not computer crime?
i. Plagiarism        ii. Password guessing         iii. Internet                      iv. virus transferring
213.          _______ is the normal Principal that regulates the use of computers.
Cyber Law              Cyber act                      Computer ethics          All of them
214.          Which of the following is not computer ethics?
Not to steal data                   Not to bear false message    Not to use Internet        Not to harm the society
215.          Premeditated, usually politically-motivated violence committed against civilians through the use of, or with the help of, computer technology
i) Cyber stalking             ii) Cyber laundering           iii) Cyber theft              iv) Cyber terrorism
216.          The act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trust worthy source.
i) Hacking                     ii) Phishing                        iii) Computer Virus              iv) Cyber stalking
217.          Electronic transfer of illegally-obtained monies with the goal of hiding its source and possibly its destination.
                        i)Cyber stalking          ii) Cyber laundering       iii) Cyber theft                      iv) Cyber terrorism
218.          The method of making the data or message unreadable by unauthorized people.
Digital signature                        Decryption        Encryption                   All of them
219.          Which of the following is included in cyber law?
i. Trademark right    ii. Copyright                  iii. Data privacy               iv. All of the above
220.          The law which includes literature and art, films, computer programs, invention, designed used by traders for their goods or services is called:
                                                              i.     Data Privacy Law                            Intellectual Property Law
                                                            ii.     Telecommunication Law                  Cyber crime Law
221.          The Process of ensuring the preservation, integrity and reliability of data is Known as:
                                                              i.     Intellectual Property Law                 Data Protection and Privacy law
                                                            ii.     Cyber Law                                      Telecommunication Law
222.          The law that provides a legal framework to facilitate and safeguard electronic transaction in the electronic medium.
i. Digital signature law ii. Intellectual property law        ii. Telecommunication law
223.          A federal law enacted in 1970 to ensure confidentiality of consumer credit information held by lenders and credit reporting agencies.
i. Fair credit reporting act                   ii.Federal privacy act     iii.Copyright act
Database Management System
224.          Database is a
i.tool of editing documents               ii. way to automate common tasks
iii. collection of related information
225.          A (n) ____________________ is an organized collection of the related information.
            Object              database          Property                        document
226.          Which is the database?
Data of SLC Exam             Oracle              MS-Access                   Excel
227.          Which is not the database?
i. Phone diary              ii. Mark ledger  iii. Attendance Register    iv. Report Card
228.          Which is the example of Relational Database Management System?
i.Oracle                ii.FoxBASE                  iii.Sybase                          iv.FoxPro
229.          __________ is a Database Management System.
DBase                    MSAV              EXCEL            All of above
230.          MS-Access is a
DBMS                    RDBMS           Database           Metabase
231.          MS-Access is used to create _____________.
Database    DBMS              Record              Table
232.          ___________ is not DBMS.
Oracle                    dBase               FoxPro             Paint
233.          Which is an example of database? [SLC 2064]
DBase                    MS-Access       Telephone Directory    All
234.          …………… is the DBMS. [SLC 2065]
i) Fox-Pro  ii) MS-Excel                 iii) Lotus-123    iv) All of the above
235.          Which of the following is database application? [SLC 2070]
i) MS-Word            ii) MS-Access               iii) MS-Excel                iv) QBASIC
236.          Which of the following is not a database application? [SLC 2069]
          i) Oracle                   ii) Foxpro         iii) MS-Access      iv) MS-Excel
237.          MS-Access is a ------------ software.
i. Utility                        ii. Application               iii. System        iv. None of the above.
238.          Which is DBMS?
i. Database                   ii. Metabase                  iii. dBase          iv. MS-Excel.
239.          A Database Management System can be used to                               .
i. retrieve information          ii. search information    iii. sort information   iv. all of the above
240.          ___________________ is a set of rules used by Access to ensure that the relationships between tables are valid and that the related data is not accidentally changed or deleted.
            Relationship                  Referential integrity                 Query               Forms
241.          What is extension of access database? (MS-Access 2003 version) [SLC 2066]
DBF                       MDB                MBD                DBM
242.          _____ is the table design creating option to create custom table design.
Datasheet                Design view                  Wizard             Link Table
243.          _____ is a data type used for lengthy text and numbers
Text                       Long Text                     OLE Object                 Memo
244.          A field name can be up to _____ characters long.
40                          46                    64                    2048
245.          Data type that requires 8 bytes of storage.
Yes/No                   Currency                     Long Integer                 All of them
246.          Memory space consumed by a currency data type maximally is …………[SLC 2069]
          i) 2 bytes                  ii) 4 bytes         iii) 8 bytes        iv) 1 GB
247.          The data type appropriate to store salary is: [SLC 2067]
i)Memo                        ii)Currency      iii)Text             iv) Auto number
248.          The name of caption can be declared up to _____ characters.
1024                       2024                             2048                             2005
249.          Memory space used by a auto number data type is _____
1 Byte                    2 Bytes                         4 Bytes                         8 Bytes
250.          What is the default size of Access?                                                        
(i) 10                (ii) 20               (iii) 30              (iv) 50
251.          Date/Time occupies ……….  bytes of memory. [SLC 2066] [SLC 2067]
i) 4             ii) 2                  iii) 8                             iv) 16
252.          The maximum size of text field in MS-Access is …………. [SLC 2068 S] [SLC 2070]
         i) 50              ii) 10                iii) 6400                        iv) 255
253.          Format symbol that converts all characters to uppercase.
@                           &                                 <                                  >
254.          …………… is not the data type of MS-Access. [SLC 2065] [SLC 2068]
i) Number         ii) Text             iii) Memo         iv) Form
255.          The logical field data type of MS-Access is______________ [SLC 2064]
i. Yes/No                ii. True/False                 iii. On/Off                     iv. All of the above.
256.          The field size of logical field data type is __________ in MS-Access.
i. 1 bit                          ii. 1 byte                       iii. 2 bytes                     iv. 2 bits
257.          Which data type consumes the least storage space? [SLC 2074]
(i) Text       (ii) Yes/No        (iii) OLE object             (iv) Memo
258.          Which of the following data type is appropriate to store gender of person in terms M or F?
i. Memo                    ii. Currency              iii. Yes no                         iv. Auto number
259.          The default data type of MS-Access is: [SLC 2068 S] [SLC 2069] [SLC 2074]
          i) Number     ii)Text              iii) Memo         iv) Auto number
260.          The default field size of “AutoNumber” data type is                 .
i. Byte              ii. Integer                      iii. Long Integer                        iv. Long Integer
261.          Which is the subtypes for the number data type?
Hyperlink         Bit                    Index                Integer
262.          Which is the subtype of number data type?
i. Integer                       ii. Byte                         iii. Single                      iv. All of the above.
263.          Number field is used for storing only _______________.
Number           Text and Number          Number and Time         Number and Year
264.          The datatype which is used for only integer value.
i.text                     ii.currency                    iii.number                         iv.OLE
265.          Which of them is not a data type?
Memo               Yes/No             Time/Date         Caption
266.          Which of the following is not a data type?
i. Picture                  ii.date/time                       iii.text                              iv.number
267.          Which of the following is not the data type used in MS-Access?
i. Date/Time                  ii. Counter                    iii. Hyperlink               iv. Caption
268.          Which of the following is not a data type in Microsoft Access?
i. Text               ii. Currency                  iii. Hypertext               iv. Date/Time
269.          What field type is used to store picture in a table?
i.memo                  ii.OLE                          iii.hyperlink                     iv.None
270.          Which is suitable data type to store video? [SLC 2070] [SLC 2073]
i) Text              ii) Number        iii) Hyperlink    iv) OLE object

271.          The data type appropriate to store address is                   .
i. Memo                        ii. Currency                   iii. Text                                    iv. Auto number
272.          What kind of data is kept in memo field?                                                           
(i) Hyperlink     (ii) Software      (iii) Data          (iv) Pictures
273.          What kind of data are kept in memo field?
i.Name of Student     ii.Students phone number     iii.Students Bio data     iv.Students picture
274.          Which specifies the expression that checks the invalid data?
Validation Rule                  Validation Text             Input Mask       Required
275.          _____ is not a field property of MS-Access.
Caption                   Index                            Color                            Format
276.          …………… defines a standard pattern for the appearance of all data entered in the field
i.format                  ii.input mask                iii.default value
277.          A field property that limits the data to be entered in a field is___________
i. Validation Rule   ii. Format                      iii. Input Mask              iv. Indexed
278.          The maximum number of characters that can be stored in a field is determined by_
i. Field Type                       ii. Field Size                 iii. Field Length iv. Field width
279.          Field size, format, input mask, caption and default values are:
            Key elements                field properties             Navigating modes          data types
280.          The primary key contains _____ value.
Null                       No Null                                    Number                  Auto number
281.          The _________________ key uniquely identifies each record. [SLC 2066]
            Primary            database                      Object              premier
282.          Primary key does not accept …………… [SLC 2064] [SLC 2065] [SLC 2068] [SLC 2074]
i) Text              ii) Number        iii) Null value   iv) None of the above
283.          In MS-Access data are stored in ……………… [SLC 2068]
        i) Form                       ii) Query           iii) Table                      iv) All of the above
284.          Form is designed for
i. filters data              ii. Sort data               iii. Print data                      iv. Modify data
285.          Which component of MS-Access is used to enter data? [SLC 2065]
Query                     Forms               Report              Both (i) and (ii)
286.          Which component of MS-ACCESS does not allow entering data? [SLC 2064]
i. Table                   ii. Query                       iii. Form           iv. None of them
287.          Query is used to
i. retrieves data from database          ii. Create table in database    iii. Print database      iv. All 
288.          …………….. query changes value in main table. [SLC 2068 S]
         i) Select                     ii) Update         iii) Both (i) &(ii)           iv) None of the above
289.          Which is not a type of query? [SLC 2067] [SLC 2073]
i) Search    ii) Select           iii) Update        iv)All of the above
290.          Report can be generated by using data from …………[SLC 2068 S]
         i) Table                      ii) Query           iii) Forms                     iv) Both (i) &(ii)
291.          ……………….. object of access is used to print formatted data. [SLC 2068] [SLC 2073]
        i) Query                      ii) Form            iii) Report                    iv) Table
292.          The object of MS-Access that is used to generate hard copy of records. [SLC 2066]
i) Query      ii) Table            iii) Form                       iv) Report
293.          __________allows MS-Access to query and sort record faster.
i. Sorting                ii. Editing                     iii. Filtering                   iv. Indexing
294.          Which of the following is not MS-Access database object?
i. Table                      ii. Form                     iii. Query                         iv. Print
295.          A collection of records for a single subject, such as all of the customer records.
i. Field                    ii. Record                      iii. Table                      iv. Data
296.          Collecting multiple related fields is called: [SLC 2067]
i)Records    ii)Table                        iii) Forms          iv)Query
297.          A field is also known as
i.records               ii.column                     iii.Database                          iv.entity
298.          Row is also called …………[SLC 2069] [SLC 2074]
          i) Record                  ii) Field            iii) Database                  iv) Table
299.          The columns in database tables are called: [SLC 2070] [SLC 2073]
i) Record                      ii) Field                        iii) Report                     iv) Memo

No comments:

Post a Comment