The operating system does all of the following except-
The operating system does all of the following except-
The horizontal and vertical lines on a spreadsheet are called:
The horizontal and vertical lines on a spreadsheet are called:
Gmail, a free web-based email service operated by which company -
Gmail, a free web-based email service operated by which company -
What is the name of an application program that gathers user information and sends it to someone through the Internet?
What is the name of an application program that gathers user information and sends it to someone through the Internet?
The computer code for interchange of information between
terminals is
The computer code for interchange of information between
terminals is
What does HTTP stands for?
What does HTTP stands for?
The ______ storage on ROM chip, is responsible for loading the operating system from its permanent location on the hard drive in to RAM.
The ______ storage on ROM chip, is responsible for loading the operating system from its permanent location on the hard drive in to RAM.
ALU is termed as-
ALU is termed as-
How are data organized in a spreadsheet?
How are data organized in a spreadsheet?
Which was the first web browser?
Which was the first web browser?
What is the shortcut key of printing a document for computer having windows?
What is the shortcut key of printing a document for computer having windows?
Which company is nicknamed "Big Blue"?
Which company is nicknamed "Big Blue"?
What does BCC means in EMail?
What does BCC means in EMail?
In computers, '.TMP' extension refers usually to what kind of file?
In computers, '.TMP' extension refers usually to what kind of file?
Which of the following has the most capacity?
Which of the following has the most capacity?
A websites main page is called its-
A websites main page is called its-
In 1999, the Melissa virus was a widely publicized:
In 1999, the Melissa virus was a widely publicized:
All of the following are steps involved in the boot process except-
All of the following are steps involved in the boot process except-
A disk's content that is recorded at the time of manufacture and cannot be changed or erased by user is -
A disk's content that is recorded at the time of manufacture and cannot be changed or erased by user is -
A collection of interrelated file in computer is a-
A collection of interrelated file in computer is a-
The term that we use to describe physical components of the system
The term that we use to describe physical components of the system
Measuring unit of capacity of hard drive is-
Measuring unit of capacity of hard drive is-
A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is
A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is
Process of Combining strings is known as
Process of Combining strings is known as
Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:
Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:
A logic bomb that was created to erupt on Michelangelo's birthday is an example of a:
A logic bomb that was created to erupt on Michelangelo's birthday is an example of a:
HTML viruses infect:
HTML viruses infect:
Where would you find the letters QWERTY?
Where would you find the letters QWERTY?
Which of the following is different from other
Which of the following is different from other
Surgeons can perform delicate operation by manipulating devices through computers instead of manually. this technology is known as-
Surgeons can perform delicate operation by manipulating devices through computers instead of manually. this technology is known as-
What is usually used for displaying information at public places?
What is usually used for displaying information at public places?
The common name for the crime of stealing passwords is:
The common name for the crime of stealing passwords is:
What is the first Indigenously developed Super Computer of India?
What is the first Indigenously developed Super Computer of India?
Collecting personal information and effectively posing as another individual is known as the crime of:
Collecting personal information and effectively posing as another individual is known as the crime of:
ROM tells the computer to-
ROM tells the computer to-
What is meant by a dedicated computer?
What is meant by a dedicated computer?
A ______ represent approximately one billion memory locations.
A ______ represent approximately one billion memory locations.
If you want to secure a message, use a(n):
If you want to secure a message, use a(n):
Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards?
Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards?
In processing cheques which of the following I/O techniques have banks traditionally followed?
In processing cheques which of the following I/O techniques have banks traditionally followed?
When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
What Does BIOS Stand For?
What Does BIOS Stand For?
In an information system, alphanumeric data normally takes the form of-
In an information system, alphanumeric data normally takes the form of-
A program that performs a useful task while simultaneously allowing destructive acts is:
A program that performs a useful task while simultaneously allowing destructive acts is:
Hyper-threading (HT) is related to-
Hyper-threading (HT) is related to-
The real business and competitive value of information technology lies in:
The real business and competitive value of information technology lies in:
USB is a type of-
USB is a type of-
Intel and AMD are leaders in-
Intel and AMD are leaders in-
LAN speeds are measured in
LAN speeds are measured in
It is a small piece of text stored on a user's computer by a web browser for maintaining the state. What we are talking about?
It is a small piece of text stored on a user's computer by a web browser for maintaining the state. What we are talking about?
Which of these is the first web-based e-mail service?
Which of these is the first web-based e-mail service?
Memory in which any location can be reached in a fixed and short amount of time after specifying its address is called -
Memory in which any location can be reached in a fixed and short amount of time after specifying its address is called -
_______ software allows users to perform calculation on rows and columns of data.
_______ software allows users to perform calculation on rows and columns of data.
How did the computer mouse get its name?
How did the computer mouse get its name?
The term 'memory' applies to which one of the following:
The term 'memory' applies to which one of the following:
A digitizing tablet can be used for?
A digitizing tablet can be used for?
The ALU of a computer responds to the commands coming from
The ALU of a computer responds to the commands coming from
Which of the following is not a storage device?
Which of the following is not a storage device?
Ensuring that the essential peripheral devices are attached and operational is the ____ Process.
Ensuring that the essential peripheral devices are attached and operational is the ____ Process.
The majority of computer crimes are committed by:
The majority of computer crimes are committed by:
Resolution of laser printer is specified in terms of
Resolution of laser printer is specified in terms of
What is the Super Computer developed in India
What is the Super Computer developed in India
To delete an incorrect character in a document, ______ to erase to the right of the insertion point.
To delete an incorrect character in a document, ______ to erase to the right of the insertion point.
General purpose computer are those that can be adopted to countless uses simply by changing its-
General purpose computer are those that can be adopted to countless uses simply by changing its-
Which of the following is not a Search engine?
Which of the following is not a Search engine?
What is object of UPS?
What is object of UPS?
Software programs that close potential security breaches in an operating system are known as:
Software programs that close potential security breaches in an operating system are known as:
Which of the following will happen when data is entered into a memory location?
Which of the following will happen when data is entered into a memory location?
An error in software or hardware is called a bug. What is the alternative computer jargon for it?
An error in software or hardware is called a bug. What is the alternative computer jargon for it?
In computers ,what is the smallest and basic unit of information storage?
In computers ,what is the smallest and basic unit of information storage?
Virtual memory is-
Virtual memory is-
What is Windows XP?
What is Windows XP?
What was the first general-purpose electronic computer?
What was the first general-purpose electronic computer?
Which key on keyboard of a computer does not have its name printed on the key?
Which key on keyboard of a computer does not have its name printed on the key?
The length of a word in computer is measured in:
The length of a word in computer is measured in:
Which Indian IT expert started web-based email service HOTMAIL in 1996?
Which Indian IT expert started web-based email service HOTMAIL in 1996?
.......... Is known as unauthorized access into others system.
.......... Is known as unauthorized access into others system.
The vast network of computers that connects millions of people all over the world is called.
The vast network of computers that connects millions of people all over the world is called.
The term USER INTERFACE refers to-
The term USER INTERFACE refers to-
WAV file format is associated with what type of files?
WAV file format is associated with what type of files?
The basic input/output system (BIOS) is storage in-
The basic input/output system (BIOS) is storage in-
What is the most common tool used to restrict access to a computer system?
What is the most common tool used to restrict access to a computer system?
When installing ______ The user must copy usually decompress program file from CDROM or medium to the hard disk.
When installing ______ The user must copy usually decompress program file from CDROM or medium to the hard disk.
The ______ cells involve creating a single cell by combining two or more selected cells.
The ______ cells involve creating a single cell by combining two or more selected cells.
Which of the followings is not a search engine?
Which of the followings is not a search engine?
When a logic bomb is activated by a time-related event, it is known as a:
When a logic bomb is activated by a time-related event, it is known as a:
VIRUS stands for
VIRUS stands for
Malicious software is known as:
Malicious software is known as:
Integrated Circuits (IC) chips used in computers are made with
Integrated Circuits (IC) chips used in computers are made with
A byte represents a group of
A byte represents a group of
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
The operating system is the most common type of ______ software.
The operating system is the most common type of ______ software.
A collection of 8 bit is called -
A collection of 8 bit is called -
Instructions and memory address are represented by
Instructions and memory address are represented by
Which of these is a correct format of Email address?
Which of these is a correct format of Email address?
What does FTP stand for?
What does FTP stand for?
An intentionally disruptive program that spreads from program to program or from disk to disk is known as
An intentionally disruptive program that spreads from program to program or from disk to disk is known as
The thing that eventually terminates a worm virus is a lack of:
The thing that eventually terminates a worm virus is a lack of:
What is the full form of e-mail?
What is the full form of e-mail?
When you quickly press and release the left mouse button twice, you are :
When you quickly press and release the left mouse button twice, you are :
"Zipping" a file means
"Zipping" a file means
IDE (ATE) or SATA interface connect Mother board with-
IDE (ATE) or SATA interface connect Mother board with-
Which of the following is responsible for the management and coordination of activities and the sharing of the resources of the computer?
Which of the following is responsible for the management and coordination of activities and the sharing of the resources of the computer?
QWERTY is used with reference to
QWERTY is used with reference to
Word BLOG is combination of two words-
Word BLOG is combination of two words-
The scrambling of code is known as:
The scrambling of code is known as:
__________ is the measurement of things such as fingerprints and retinal scans used for security access.
__________ is the measurement of things such as fingerprints and retinal scans used for security access.
Protocols are
Protocols are
The term 'Pentium' is related to what?
The term 'Pentium' is related to what?