ICT (Тест)
14. In web search, finding a large number of documents with very little relevant information is termed:
poor recall
253. In web search, finding a large number of documents with very little relevant information is termed:
poor recall
17. Video transmission over the Internet that looks like delayed live casting is called:
real-time video
256. Video transmission over the Internet that looks like delayed live casting is called:
real-time video
210. The size of the MxN graphic grid determines
screen resolution
83. The file extension of MS-Word document in Office 2007 is _______.
.docx
201. Which top level domain does Russia have?
.ru
64. The octal number system consists of the following symbols :
0 - 7
59. The hexadecimal number system consists of the symbols
0 - 9 , A - F
77. Minimum number of bits required to store any 3 digit decimal number is equal to
10
185. Binary equivalent of decimal number 35 is
100011
35. A key-board has at least:
101 Keys
87. A Gigabyte is equal to
1024 Megabytes
114. Which one of the following represents the binary equivalent of the decimal number 25
11001
286. Which one of the following represents the binary equivalent of the decimal number 25
11001
292. Which one of the following represents the binary equivalent of the decimal number 25
11001
126. If the binary equivalent of the decimal number 48 is 110000, then the binary equivalent of the decimal number 51 is given by
110011
293. If the binary equivalent of the decimal number 48 is 110000, then the binary equivalent of the decimal number 51 is given by
110011
133. When IT Act 2000 came into effect?
2000 October 17
182. Identify the IP address from the following
202.50.20.148
134. How many schedules are there in IT Act 2000?
4
192. How many parts (numbers) does IP consist of?
4 parts separated by a dot
180. In MS-Access the maximum length of validation text is?
55
153. How many rows are there in MS Excel 2003?
65536
216. What is a firewall?
A filter for an internet connection
46. What is blog?
A personal or corporate website in the form of an online journal
200. Specify the program to work with video:
Adobe Premiere Pro
208. Specify the antivirus programs:
Aidstest.exe, drweb.exe
109. Digital Empowerment means
All of the above
117. Which of the following is an instant messaging application?
All of the above
156. Which of the following is an instant messaging application?
All of the above
21. Information and Communication Technology includes:
All of the above
242. What is Cloud Computing replacing?
All of the above
281. Digital Empowerment means
All of the above
289. Which of the following is an instant messaging application?
All of the above
4. Which of the following is correct statement?
All of the above
24. Which part of the Central Processing Unit (CPU) performs calculation and makes decisions:
Arithmetic Logic Unit
262. ALU stands for
Arithmetic Logic Unit
80. ALU stands for
Arithmetic Logic Unit
217. A strong password should contain:
At least 8 characters, and a combination of letters, numbers, and characters
44. Which was the first company to launch mobile phone services in India?
BPL
50. Which one of the following is not a linear data structure?
Binary Tree
244.Which of these companies is not a leader in cloud computing?
Blackboard
130. With regard to e-mail, what does Bcc: mean?
Blind Carbon Copy : - The users specified in the Bcc : field will get the e-mail and see the addresses in the to : and cc : fields
260. Internet explorer is a type of
Browser
78. Internet explorer is a type of
Browser
39. Errors in computer programmes are called:
Bugs
127. The process of copying files to a CD-ROM is known as
Burning
294. The process of copying files to a CD-ROM is known as
Burning
51. Which one of the following is not a network device?
CPU
241. How is Access data searched?
CTRL+F
178. In MS-Access to open new database press
CTRL+N
177. In MS-Access to open an existing database press
CTRL+O
183. CSS stands for
Cascading Style Sheets
30. The 'brain' of a computer which keeps peripherals under its control is called:
Central Processing Unit
108. Which one of the following is not a search engine?
Chrome
280. Which one of the following is not a search engine?
Chrome
214. Which of the following is not an antivirus software?
Code Red
29.CD ROM stands for:
Compact Disk Read Only Memory
31. Data can be saved on backing storage medium known as:
Compact Disk Rewritable
297. High level programming language can be converted to machine language using which of the following?
Compiler
70. High level programming language can be converted to machine language using which of the following?
Compiler
20. Which of the following is the appropriate definition of a computer?
Computer is an electronic device that can store, retrieve and process data quickly and accurately
259. Which of the following is the appropriate definition of a computer?
Computer is an electronic device that can store, retrieve and process data quickly and accurately
196. Which of the following statements is NOT correct?
Computer is capable of processing only digital signal
3. Which of the following statements is NOT correct?
Computer is capable of processing only digital signal
211. The first computer virus is
Creeper
165. What keyboard shortcuts can recover deleted Microsoft Excel data?
Ctrl + Z
239. Which of the examples below is not a database?
Culinary book
37. Corel Draw is a popular:
Illustration programme
106. gif, jpg, bmp, png are used as extensions for files which store
Image data
147. gif, jpg, bmp, png are used as extensions for files which store
Image data
278. gif, jpg, bmp, png are used as extensions for files which store
Image data
47. Which of the following is not related to information security on the Internet?
Information Retrieval
125. The statement "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer Hardware" refers to
Information Technology (IT)
164. The statement "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer Hardware" refers to
Information Technology (IT)
195. Which of the following is the appropriate definition of Information Technology?
Information Technology refers to the use of hardware and software for storage, retrieval, processing and distributing information of many kinds.
2. Which of the following is the appropriate definition of Information Technology?
Information Technology refers to the use of hardware and software for storage, retrieval, processing and distributing information of many kinds.
1. ICT stands for:
Information and Communication Technology
110. Encoding or scrambling data for transmission across a network is known as
Encryption
150. Encoding or scrambling data for transmission across a network is known as
Encryption
282. Encoding or scrambling data for transmission across a network is known as
Encryption
67. Which of the following is type of LAN?
Ethernet
240. Which key can be used to call MS Access Help?
F1
172. In Microsoft PowerPoint the key on the keyboard can be used to view slide show
F5
181. What Are The Columns In A Microsoft Access Table Called?
Fields
101. The acronym FTP stands for
File Transfer Protocol
144. The acronym FTP stands for
File Transfer Protocol
187. What is FTP?
File Transfer Protocol
190. What formats use graphic elements of web pages
GIF, JPEG
102. Which one of the following is not a/an image/graphic file format?
GUI
112. Which of the following represents one billion characters
Gigabyte
151. Which of the following represents one billion characters
Gigabyte
284. Which of the following represents one billion characters
Gigabyte
55. Which one of the following is different from other members?
115. Which is an instant messenger that is used for chatting
Google Talk
154. Which is an instant messenger that is used for chatting
Google Talk
287. Which is an instant messenger that is used for chatting
Google Talk
139. GIF stands for
Graphics Interchange Format
269. GIF stands for
Graphics Interchange Format
93. GIF stands for
Graphics Interchange Format
56. Where does a computer add and compare its data?
Hard disk
246. Which of these is not a major type of cloud computing usage?
Hardware as a Service
107. Symbols A-F are used in which one of the following?
Hexadecimal number system
148. Symbols A-F are used in which one of the following?
Hexadecimal number system
279. Symbols A-F are used in which one of the following?
Hexadecimal number system
52. A compiler is used to convert the following to object code which can be executed
High-level language
66. HTML stands for
Hyper Text Markup Language
132. In Computer Networking, HTTP is referred to as a stateless protocol as servers do not maintain any information about past client requests. HTTP is an acronym for
Hyper Text Transfer Protocol
247. Which is not a major cloud computing platform?
IBM Deep blue
105. Which one of the following is not the same as the other three?
IP address
146. Which one of the following is not the same as the other three?
IP address
225. A computer connected to the Internet must have
IP address
277. Which one of the following is not the same as the other three?
IP address
57. Computers on an internet are identified by
IP address
141. The post-industrial society is designated as
Information society
271. The post-industrial society is designated as
Information society
95. The post-industrial society is designated as
Information society
58. Which one of the following is not an Internet Service Provider (ISP)?
Infotech India LtD
250. Model of "clouds"
Infrastructure as a Service (IaaS, Infrastructure as a Service)
206. What is multimedia?
Integration of still and moving images, text, and sounds
74. TCP/IP is necessary if one is to connect to the
Internet
113. Which of the following is not open source software
Internet Explorer
285. Which of the following is not open source software
Internet Explorer
291. Which of the following is not open source software
Internet Explorer
128. A computer program that translates a program statement by statement into machine languages is called a/an
Interpreter
263. A computer program that translates a program statement by statement into machine languages is called a/an
Interpreter
86. A computer program that translates a program statement by statement into machine languages is called a/an
Interpreter
219. What is the virus that spread in computer?
It is a computer program
220. What is anti-virus?
It is a program code
218. What is "Trend Micro"?
It is anti-virus software
111. Which of the following is not an output device
Keyboard
283. Which of the following is not an output device
Keyboard
142. Internal communication within institutions done through
LAN
273. Internal communication within institutions done through
LAN
97. Internal communication within institutions done through
LAN
249. Which one of these is not a cloud computing pricing model?
Ladder
173. In Microsoft PowerPoint the following is not a feature of PowerPoint
Linking a slide transition with a laser pointer
18. LAN stands for:
Local Area Network
257. LAN stands for:
Local Area Network
229. Database management system is ...
MS Access
76. Which of the following is not a programming language ?
MS Office
234. What is the name of the set of special macros?
Macro
121. Which of the following enables us to send the same letter to different persons in MS Word?
Mail merge
160. Which of the following enables us to send the same letter to different persons in MS Word?
Mail merge
184 . MOOC stands for
Massive Open Online Course
205. What are the benefits of groupware?
Members of the group can share programs, computer files, and other resources
54. Which one of the following is an example of Operating System?
Microsoft Windows
272. The initial efforts for internet based communication was for
Military purposes
96. The initial efforts for internet based communication was for
Military purposes
19. Which of the following statement is correct
Modem converts the analog signal into digital signal and vice-versa
258. Which of the following statement is correct
Modem converts the analog signal into digital signal and vice-versa
235. What is the name of a program written in Access Basic or VBasic?
Module
119. Which of the following is not an input device?
Monitor
158. Which of the following is not an input device?
Monitor
81. A Personal Computer uses a number of chips mounted on a circuit board called
Mother Board
120. Which of the following is an open source software?
Mozilla Firefox
159. Which of the following is an open source software?
Mozilla Firefox
290. Which of the following is an open source software?
Mozilla Firefox
42. Information, a combination of graphics, text, sound, video and animation is called:
Multimedia
116. NMEICT means
National Mission on Education through ICT
155. NMEICT means
National Mission on Education through ICT
288. NMEICT means
National Mission on Education through ICT
138. Manuel Castelle was the first to use the term
Network society
268. Manuel Castelle was the first to use the term
Network society
92. Manuel Castelle was the first to use the term
Network society
299. IPv4 and IPv6 are addresses used to identify computers on the internet. Find the correct statement out of the following:
Number of bits required for IPv4 address is less than number of bits required for IPv6 address
73. IPv4 and IPv6 are addresses used to identify computers on the internet. Find the correct statement out of the following:
Number of bits required for IPv4 address is less than number of bits required for IPv6 address
171. There are three types of data found in a spreadsheet:
Numbers, formulas, labels
261. POP3 and IMAP are e-mail accounts in which
One only has to be connected to the server to send and receive email
79. POP3 and IMAP are e-mail accounts in which
One only has to be connected to the server to send and receive email
176. In MS-Access press CTRL+O to
Open an existing database
60. The set of computer programs that manage the hardware/software of a computer is called
Operating system
62. What is the name given to the organized collection of software that controls the overall operation of a computer?
Operating system
104. When a computer is booting, BIOS is loaded to the memory by
ROM
145. When a computer is booting, BIOS is loaded to the memory by
ROM
122 . .............. is a type of memory circuitry that holds the computer's start-up routine.
ROM (ReadOnlyMemory)
161 . .............. is a type of memory circuitry that holds the computer's start-up routine.
ROM (ReadOnlyMemory)
32. RAM means:
Random Access Memory
230. Specify the type of Access DBMS:
Relational DBMS
232. What tool is a specially described requirement that determines the composition of database operations performed on a sample?
Request
236. Specify the command to summarize the data of one field or group of data of one field in ACCESS?
SUM
85. A hard disk is divided into tracks which is further subdivided into
Sectors
63. S/MIME in Internet technology stands for
Secure Multipurpose Internet Mail Extension
204. What are presentations?
Secure Socket Layers
243. What is the number one concern about cloud computing?
Security concerns
38. The accounting software 'Tally' was developed by:
TCS
179. Which of the following is not a data type in MS-Access?
Table
296. Microsoft Excel is:
Table Editor
143. The first virtual university of India came up in
Tamil Nadu
275. The first virtual university of India came up in
Tamil Nadu
99. The first virtual university of India came up in
Tamil Nadu
48. Which is the largest unit of storage among the following?
Terabyte
7) Processor (CPU) stands for:
The Central Processing Unit
245. Model of "clouds"
The platform as a service (PaaS, Platform as a Service)
223. Hypertext is
The text in which you can click on the selected links
295. Which of the following series type is not valid for Fill Series dialog box?
Time
215. Both email attachments and downloaded files can spread malware
True
34. Which of the following is not a Computer language?
UNIX
189. What is the address used for hyperlinks
URL address
226. Login is
Username
202. Multimedia is made up of two words:
Video and Images
207. What are some examples of multimedia?
Video games, movies, and television
5. Which of the following statements is correct?
Virus is a part of software
213. VIRUS stands for:
Vital Information Resource Under Slege
131. Random Access Memory (RAM), a form of computer storage, is a ............. memory.
Volatile
129. The software used to navigate through the web is known as
Web Browser
40. HTML is basically used to design:
Web-page
137. Commercial messages on the net are identified as
Webmercials
267. Commercial messages on the net are identified as
Webmercials
91. Commercial messages on the net are identified as
Webmercials
33. WYSIWYG - describes the display of a document on screen as it will actually print:
What you see is what you get
152. Service Software includes programs (utilities):
WinRar, DrWeb, APBackUp
8. Service Software includes programs (utilities):
WinRar, DrWeb, APBackUp
43. What do you need to put your web pages on the www?
all of the above
136. Virtual memory is
an illusion of extremely large main memory.
265. Virtual memory is
an illusion of extremely large main memory.
89. Virtual memory is
an illusion of extremely large main memory.
212. To protect a computer from virus, you should install ......... in your computer
antivirus
11. An electronic bill board that has a short text or graphical advertising message is referred to as:
banner
49. Bit stands for
binary digit
10. Communications bandwidth that has the highest capacity and is used by microwave, cable and fibre optics lines is known as:
broadband
199. Communications bandwidth that has the highest capacity and is used by microwave, cable and fibre optics lines is known as:
broadband
168. The area defined by the intersection of a column and a row of a spreadsheet that has its unique address is:
cell
221. All of the logic and mathematical calculations done by the computer happen in/on the.....
central processing unit
12. Which of the following is not the characteristic of a computer?
computer is an electrical machine
251. Which of the following is not the characteristic of a computer?
computer is an electrical machine
228. Indicate the main functions of the DBMS.
creation, transformation, database management
13. Using websites to pour out one's grievances is called:
cyber venting
252. Using websites to pour out one's grievances is called:
cyber venting
186. The mail server address consists of ...
domains
175. To exit the PowerPoint application, you should
double-click the application Control-menu icon
233. Specify when creating a object in Access, you can use the following modes: column, tape, pivot table, chart?
forms
209. Computer graphics system includes:
graphic display and video adapter
61. Windows is:
graphic operating system
135. A Compiler is a software which converts
high level language to machine language
264. A Compiler is a software which converts
high level language to machine language
88. A Compiler is a software which converts
high level language to machine language
193. Hypertext markup language is:
html
194. Receiving an image from an external source - a scanner, a digital camera, is called
import
140. Which one of the following is not an Operating System?
irefox
270. Which one of the following is not an Operating System?
irefox
94. Which one of the following is not an Operating System?
irefox
149. Digital Empowerment means
ll of the above
222. In relational databases, single column data:
must necessarily have one type
266. The Internet ethical protocol is called
netiquette
90. The Internet ethical protocol is called
netiquette
197. Line access and avoidance of collision are the main functions of:
network protocols
6) Line access and avoidance of collision are the main functions of:
network protocols
198. In the hypermedia database, information bits are stored in the form of:
nodes
9. In the hypermedia database, information bits are stored in the form of:
nodes
103. The first Web Browser is
orld Wide Web
188. How many parts does the URL consist of?
out of three
237. Specify the basic objects ACCESS.
table, form, query, report, page
231. Specify when creating a object in Access, you can use the following modes: import of tables, connection to tables?
tables
36. An E-mail address is composed of:
two parts
15. The concept of connect intelligence is derived from:
value added networks
254. The concept of connect intelligence is derived from:
value added networks
227. What is the name of the device controlling the operation of the graphic display?
video controller
16. Use of an ordinary telephone as an Internet appliance is called:
voice line
255. Use of an ordinary telephone as an Internet appliance is called:
voice line
71. HTML is used to create
web page
100. Which of the following is a social network?
witter
276. Which of the following is a social network?
witter
28. www represents:
world wide web
22. Which of the following is the appropriate format of URL of e-mail?
224. WEB pages have an extension ...
НТМ
169. In an excel sheet the active cell is indicated by:
A dark wide boarder
45. Chandrayan I was launched on 22nd October, 2008 in India from:
Sri Harikota
191. What defines a top-level domain?
State name
53. Which number system is usually followed in a typical 32-bit computer?
8
118. In a Computer a byte generally consists of:
8 bits
157. In a Computer a byte generally consists of:
8 bits
166. Entering a formula in a Microsoft Excel cell begins
=
167. Which symbol must all formula begin with:
=
170. To add two cells (A1 and A2) together you use the following formula:
=A1 + A2
238. The database is ...
A collection of data organized in a specific order.
123. An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, numbers and control keys that the computer user selects on the keyboard ASCII
American Standard Code for Information Interchange
162. An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, numbers and control keys that the computer user selects on the keyboard ASCII
American Standard Code for Information Interchange
23. On the keyboard of computer each character has an "ASCII" value which stands for:
American Standard Code for Information Interchange
300. Each character on the keyboard of computer has an ASCII value which stands for
American Standard Code for Information Interchange
75. Each character on the keyboard of computer has an ASCII value which stands for
American Standard Code for Information Interchange
69. Which of the following operating system is used on mobile phones?
Android
203. Movement created by displaying a series of pictures like cartoons
Animation
26. The process of laying out a document with text, graphics, headlines and photographs is involved in
Desk Top Publishing
41. 'Micro Processing'is made for:
Digital System
298. The term DNS stands for
Domain Name System
65. DNS in internet technology stands for
Domain Name System
72. The term DNS stands for
Domain Name System
25. "Dpi" stands for:
Dots per inch
27. Transfer of data from one application to another line is known as:
Dynamic Data Exchange
84. _______ is a protocol used by e-mail clients to download e-mails to your computer.
POP
274. Virtual reality provides
Participatory experience
98. Virtual reality provides
Participatory experience
174. Objects on the slide that hold text are called
Placeholders
68 . Which of the following statements is true ?
Smart cards and PCs use some operating system
82. Computer Virus is a
Software
248. Model of "clouds"
Software as a Service (SaaS, Software as a Servise)
124. An unsolicited e-mail message sent to many recipient at once is a
Spam
163. An unsolicited e-mail message sent to many recipient at once is a
Spam