Monday, June 26, 2017

Computer Quiz from HSSC Exams. 2017

Q1. Which of the following computer technology helps you to easily insert, retrieve, and manage data from databases with appropriate security measures? 
A. Database Management Systems (DBMS) B. Firewall 
C. Anti­virus software D. Pen­drives 
Correct Ans: A 
Q2. Which of the following constraints help uniquely identify records in a table? 
A. Primary key constraint B. Foreign key constraint 
C. Check constraint D. Default constraint 
Correct Ans: A 
Q3. Which of the following is an input device? 
A. Keyboard B. Printer C. CD­ROM D. Monitor 
Correct Ans: A 
Q4. Which of the following is NOT a computer peripheral? 
A. Motherboard B. Scanner C. LCD projector D. Pen drive 
Correct Ans: A 
Q5. ____________ is a temporary memory that loses information when the computer is switched off. 
A. Random Access Memory (RAM) B. Read Only Memory (ROM) 
C. Flash memory D. Electrically Erasable Programmable Read Only Memory (EEPROM) 
Correct Ans: A 
Q6. Bluetooth is a widely used technology for: 
A. Wireless Personal Area Network (WPAN) B. Local Area Network (LAN) 
C. Metropolitan Area Network (MAN) D. Wide Area Network (WAN) 
Correct Ans: A 
Q7. A variable in programming is a: 
A. named piece of memory for storing data 
B. procedure that performs some operation 
C. Classification of data 
D. template that defines states and behaviors for creating objects 
Correct Ans: A 
Q8. An object in an object oriented programming is: 
A. An instance of a class 
B. A template that defines a collection of fields and methods 
C. A built­in data type 
D. An array that holds a collection of similar types 
Correct Ans: A 
Q9. Protocol used for forwarding e­mail messages is: 
A. Simple Mail Transfer Protocol (SMTP) 
B. Post Office Protocol (POP) 
C. Internet Message Access Protocol (IMAP) 
D. Secure Socket Layer (SSL) Protocol 
Correct Ans: A 
Q10. _________ is the electronic equivalent of ordinary signatures that provides authenticity of the electronic data. 
A. Digital signature B. Access control C. Encipherment D. Plaintext 
Correct Ans: A 
Q11. Which one of the following is an installer package file format that is used for installation and uninstallation of programs in Windows operating systems? 
A. MSI B. EXE C. DMG D. IMG 
Correct Ans: A 
Q12. Which of the following software installation type requires a user intervention to make choices and preferences? 
A. Attended installation B. Unattended installation 
C. Automatic installation D. Silent installation 
Correct Ans: A 
Q13. When you are connected to the Internet, several advertisements keep popping up even without clicking on them. This is an example of _________ attack. 
A. Adware B. Spam C. Phishing D. Pharming 
Correct Ans: A 
Q14. Which one of the following is NOT a function of antivirus? 
A. Detect and remove malicious code 
B. Protect all entry points to the computer 
C. Regularly updates against new attacks 
D. Perform compression and decompression of files 
Correct Ans: D 
Q15. An equivalent representation for the Boolean expression A' + 1 is A. A B. A' C. 1 D. 0 
Correct Ans: C 
Q16. What is the result of the Boolean expression PQ + PQR + PQRS + PQRST? 
A. PQ B. PQ + RS + T C. P + Q + R + S + T D. PQRST 
Correct Ans: A 
Q17. Complete the sentence with the correct option. Firewall on a computer _____________. 
A. Reduces over heating of the computer 
B. Prevents unauthorized access to the computer 
C. Allows more devices to share the same Internet connection 
D. Enables to utilize maximum Internet bandwidth 
Correct Ans: B 
Q18. For more protection against unauthorized access to a computer, you can use: 
A. Only one software firewall 
B. Two or more software firewalls 
C. Only one hardware firewall 
D. A combination of one software firewall and a hardware firewall 
Correct Ans: D 
Q19. A help desk in an IT organization: 
A. Does employee management 
B. Answers technical questions of its customers 
C. Does finance management 
D. Administers system software 
Correct Ans: B 
Q20. ____________ helps IT customer support agents to receive and respond to service requests. 
A. Webware B. System software 
C. Help desk software D. Anti­malware software 
Correct Ans: C 
Q21. What file system does Windows NT or Windows Server operating systems use? 
A. New Technology File System (NTFS) B. File Allocation Table (FAT) 
C. File Allocation Table 32(FAT32) D. Tape file system 
Correct Ans: A 
Q22. What do you mean by starvation in operating system? 
A. When a thread is waiting indefinitely for some resource, but other threads are using it. 
B. When a thread wants permission. 
C. When only one thread is allowed to use the resource. 
D. None of the above. 
Correct Ans: A 
Q23. Which of the following tool is used to complete online transactions or mobile banking to combat cyber fraud? 
A. One­time Password (OTP) B. Automated Teller Machine (ATM) 
C. SMS alerts D. Core Banking Solution (CBS) 
Correct Ans: A 
Q24. Choose the correct procedure to add the CONFIDENTIAL watermark to your Word 2010 document. 
A. Click Page Layout, in the Page Background group, select Watermark and select CONFIDENTIAL from the gallery. 
B. Click Page Layout, in the Page Background group, select CONFIDENTIAL. 
C. Click Page Layout, in the Page Background group, select Page Color and select CONFIDENTIAL from the gallery. 
D. Click Insert, in the Page Background group, select Add Watermark and select CONFIDENTIAL from the gallery 
Correct Ans: A 
Q25. You want to create an envelope for a letter. What is the procedure to create envelopes in Word 2010? 
A. Click Mailings ­> Envelopes B. Click Mailings ­> Select Recipients ­> Envelopes 
C. Click File ­> Advanced ­> General ­> Envelopes D. Click File ­> Envelopes 
Correct Ans: A 
Q26. While saving a Word2010 document, what is the default file extension? 
A. .ppt B. .xlsx C. .txt D. .docx 
Correct Ans: D 
Q27. You need to share the electronic copy of a legal agreement with your business partner. Before sharing the document with the partner, you need to remove all personal information such as author's name and cropped out image data. How can you achieve the requirement in MS Word 2010? 
A. By using the Document Inspector feature 
B. By using the Protect Document feature 
C. By encrypting the document 
D. By using the Check Accessibility feature Correct Ans: A 
Q28. You want to highlight numbers between 11 and 30 in a range of cells in yellow color. Which of the following commands in MS Excel 2010 helps you to visually highlight important values in your worksheets? 
A. Conditional Formatting command B. Sort command 
C. Filter command D. Format command 
Correct Ans: A 
Q29. You have a long text in a cell and you want the text to appear in multiple lines. How can you achieve this in MS Excel 2010? 
A. Select the text, click View ­> Page Break Preview 
B. Select the text, click Page Layout ­> Breaks 
C. Select the text, click Home, in the Alignment group, choose Wrap Text 
D. None of the above 
Correct Ans: C 
Q30. How will you paint the inside of a row in an MS Excel worksheet with a specified color? 
A. By using the Fill Color command B. By using the Borders command 
C. By using the Font Color command D. By using the Alignment commands 
Correct Ans: A 
Q31. You want to change the font face/theme of the text in an Excel 2010 worksheet cell. Which of the following command would you use? 
A. Font command on the Home tab B. Font size command on the Home tab 
C. Font color command on the Home tab D. Alignment commands 
Correct Ans: A 
Q32. Which of the following views help you to view your presentation with speaker notes on your laptop while your audience views the presentation without the notes on a projector? 
A. Presenter View B. Slider Sorter View C. Reading View D. Outline View 
Correct Ans: A 
Q33. In PowerPoint presentations, F7 key is used to/for: 
A. Grammar check B. Start slide show view 
C. Spelling check D. None of the above 
Correct Ans: C 
Q34. One of the largest fulfillment centers operated by Amazon in India is located in which city? 
A. Chandigarh B. Sonipat C. Gurugram D. Bengaluru 
Correct Ans: B
Q35. What does LAN stand for in networking? 
A. Local Area Network B. Last Area Network 
C. Long Area Network D. Line area Network 
Correct Ans: A 
Q36. What is the full­form of IBM – the multi­national technology Company? 
A. Indian Business Management B. International Business Machines 
C. International Business Magnates D. Indian Business Marketing 
Correct Ans: B
Q37. What is the full­form of HTTP? 
A. HyperTest Transport Protocol B. HyperTent Transfer Protocol 
C. HyperText Transfer Protocol D. HyperText Transmission Protocol 
Correct Ans: C
Q38. IBM has its headquarters in which city in India? 
A. Gurugram B. Mumbai C. Hyderabad D. Bengaluru 
Correct Ans: D
Q39. What is the expansion of HTTPS? 
A. HyperText Transfer Protocol Social 
B. HyperText Transfer Protocol Security 
C. HyperText Transfer Protocol Secure 
D. HyperText Transmission Protocol Secure 
Correct Ans: C

0 comments:

Post a Comment