Q1. Which of the following computer technology helps you to easily insert, retrieve, and manage data from databases with appropriate security measures?
A. Database Management Systems (DBMS) B. Firewall
C. Antivirus software D. Pendrives
Correct Ans: A
Q2. Which of the following constraints help uniquely identify records in a table?
A. Primary key constraint B. Foreign key constraint
C. Check constraint D. Default constraint
Correct Ans: A
Q3. Which of the following is an input device?
A. Keyboard B. Printer C. CDROM D. Monitor
Correct Ans: A
Q4. Which of the following is NOT a computer peripheral?
A. Motherboard B. Scanner C. LCD projector D. Pen drive
Correct Ans: A
Q5. ____________ is a temporary memory that loses information when the computer is switched off.
A. Random Access Memory (RAM) B. Read Only Memory (ROM)
C. Flash memory D. Electrically Erasable Programmable Read Only Memory (EEPROM)
Correct Ans: A
Q6. Bluetooth is a widely used technology for:
A. Wireless Personal Area Network (WPAN) B. Local Area Network (LAN)
C. Metropolitan Area Network (MAN) D. Wide Area Network (WAN)
Correct Ans: A
Q7. A variable in programming is a:
A. named piece of memory for storing data
B. procedure that performs some operation
C. Classification of data
D. template that defines states and behaviors for creating objects
Correct Ans: A
Q8. An object in an object oriented programming is:
A. An instance of a class
B. A template that defines a collection of fields and methods
C. A builtin data type
D. An array that holds a collection of similar types
Correct Ans: A
Q9. Protocol used for forwarding email messages is:
A. Simple Mail Transfer Protocol (SMTP)
B. Post Office Protocol (POP)
C. Internet Message Access Protocol (IMAP)
D. Secure Socket Layer (SSL) Protocol
Correct Ans: A
Q10. _________ is the electronic equivalent of ordinary signatures that provides authenticity of the electronic data.
A. Digital signature B. Access control C. Encipherment D. Plaintext
Correct Ans: A
Q11. Which one of the following is an installer package file format that is used for installation and uninstallation of programs in Windows operating systems?
A. MSI B. EXE C. DMG D. IMG
Correct Ans: A
Q12. Which of the following software installation type requires a user intervention to make choices and preferences?
A. Attended installation B. Unattended installation
C. Automatic installation D. Silent installation
Correct Ans: A
Q13. When you are connected to the Internet, several advertisements keep popping up even without clicking on them. This is an example of _________ attack.
A. Adware B. Spam C. Phishing D. Pharming
Correct Ans: A
Q14. Which one of the following is NOT a function of antivirus?
A. Detect and remove malicious code
B. Protect all entry points to the computer
C. Regularly updates against new attacks
D. Perform compression and decompression of files
Correct Ans: D
Q15. An equivalent representation for the Boolean expression A' + 1 is A. A B. A' C. 1 D. 0
Correct Ans: C
Q16. What is the result of the Boolean expression PQ + PQR + PQRS + PQRST?
A. PQ B. PQ + RS + T C. P + Q + R + S + T D. PQRST
Correct Ans: A
Q17. Complete the sentence with the correct option. Firewall on a computer _____________.
A. Reduces over heating of the computer
B. Prevents unauthorized access to the computer
C. Allows more devices to share the same Internet connection
D. Enables to utilize maximum Internet bandwidth
Correct Ans: B
Q18. For more protection against unauthorized access to a computer, you can use:
A. Only one software firewall
B. Two or more software firewalls
C. Only one hardware firewall
D. A combination of one software firewall and a hardware firewall
Correct Ans: D
Q19. A help desk in an IT organization:
A. Does employee management
B. Answers technical questions of its customers
C. Does finance management
D. Administers system software
Correct Ans: B
Q20. ____________ helps IT customer support agents to receive and respond to service requests.
A. Webware B. System software
C. Help desk software D. Antimalware software
Correct Ans: C
Q21. What file system does Windows NT or Windows Server operating systems use?
A. New Technology File System (NTFS) B. File Allocation Table (FAT)
C. File Allocation Table 32(FAT32) D. Tape file system
Correct Ans: A
Q22. What do you mean by starvation in operating system?
A. When a thread is waiting indefinitely for some resource, but other threads are using it.
B. When a thread wants permission.
C. When only one thread is allowed to use the resource.
D. None of the above.
Correct Ans: A
Q23. Which of the following tool is used to complete online transactions or mobile banking to combat cyber fraud?
A. Onetime Password (OTP) B. Automated Teller Machine (ATM)
C. SMS alerts D. Core Banking Solution (CBS)
Correct Ans: A
Q24. Choose the correct procedure to add the CONFIDENTIAL watermark to your Word 2010 document.
A. Click Page Layout, in the Page Background group, select Watermark and select CONFIDENTIAL from the gallery.
B. Click Page Layout, in the Page Background group, select CONFIDENTIAL.
C. Click Page Layout, in the Page Background group, select Page Color and select CONFIDENTIAL from the gallery.
D. Click Insert, in the Page Background group, select Add Watermark and select CONFIDENTIAL from the gallery
Correct Ans: A
Q25. You want to create an envelope for a letter. What is the procedure to create envelopes in Word 2010?
A. Click Mailings > Envelopes B. Click Mailings > Select Recipients > Envelopes
C. Click File > Advanced > General > Envelopes D. Click File > Envelopes
Correct Ans: A
Q26. While saving a Word2010 document, what is the default file extension?
A. .ppt B. .xlsx C. .txt D. .docx
Correct Ans: D
Q27. You need to share the electronic copy of a legal agreement with your business partner. Before sharing the document with the partner, you need to remove all personal information such as author's name and cropped out image data. How can you achieve the requirement in MS Word 2010?
A. By using the Document Inspector feature
B. By using the Protect Document feature
C. By encrypting the document
D. By using the Check Accessibility feature Correct Ans: A
Q28. You want to highlight numbers between 11 and 30 in a range of cells in yellow color. Which of the following commands in MS Excel 2010 helps you to visually highlight important values in your worksheets?
A. Conditional Formatting command B. Sort command
C. Filter command D. Format command
Correct Ans: A
Q29. You have a long text in a cell and you want the text to appear in multiple lines. How can you achieve this in MS Excel 2010?
A. Select the text, click View > Page Break Preview
B. Select the text, click Page Layout > Breaks
C. Select the text, click Home, in the Alignment group, choose Wrap Text
D. None of the above
Correct Ans: C
Q30. How will you paint the inside of a row in an MS Excel worksheet with a specified color?
A. By using the Fill Color command B. By using the Borders command
C. By using the Font Color command D. By using the Alignment commands
Correct Ans: A
Q31. You want to change the font face/theme of the text in an Excel 2010 worksheet cell. Which of the following command would you use?
A. Font command on the Home tab B. Font size command on the Home tab
C. Font color command on the Home tab D. Alignment commands
Correct Ans: A
Q32. Which of the following views help you to view your presentation with speaker notes on your laptop while your audience views the presentation without the notes on a projector?
A. Presenter View B. Slider Sorter View C. Reading View D. Outline View
Correct Ans: A
Q33. In PowerPoint presentations, F7 key is used to/for:
A. Grammar check B. Start slide show view
C. Spelling check D. None of the above
Correct Ans: C
Q34. One of the largest fulfillment centers operated by Amazon in India is located in which city?
A. Chandigarh B. Sonipat C. Gurugram D. Bengaluru
Correct Ans: B
Q35. What does LAN stand for in networking?
A. Local Area Network B. Last Area Network
C. Long Area Network D. Line area Network
Correct Ans: A
Q35. What does LAN stand for in networking?
A. Local Area Network B. Last Area Network
C. Long Area Network D. Line area Network
Correct Ans: A
Q36. What is the fullform of IBM – the multinational technology Company?
A. Indian Business Management B. International Business Machines
C. International Business Magnates D. Indian Business Marketing
Correct Ans: B
Q37. What is the fullform of HTTP?
A. HyperTest Transport Protocol B. HyperTent Transfer Protocol
C. HyperText Transfer Protocol D. HyperText Transmission Protocol
Correct Ans: C
Q38. IBM has its headquarters in which city in India?
A. Gurugram B. Mumbai C. Hyderabad D. Bengaluru
Correct Ans: D
Q39. What is the expansion of HTTPS?
A. HyperText Transfer Protocol Social
B. HyperText Transfer Protocol Security
C. HyperText Transfer Protocol Secure
D. HyperText Transmission Protocol Secure
Correct Ans: C
Q38. IBM has its headquarters in which city in India?
A. Gurugram B. Mumbai C. Hyderabad D. Bengaluru
Correct Ans: D
Q39. What is the expansion of HTTPS?
A. HyperText Transfer Protocol Social
B. HyperText Transfer Protocol Security
C. HyperText Transfer Protocol Secure
D. HyperText Transmission Protocol Secure
Correct Ans: C
0 Comment to "Computer Quiz from HSSC Exams. 2017"
Post a Comment