ICT (Тест)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

14. In web search, finding a large number of documents with very little relevant information is termed:

poor recall

253. In web search, finding a large number of documents with very little relevant information is termed:

poor recall

17. Video transmission over the Internet that looks like delayed live casting is called:

real-time video

256. Video transmission over the Internet that looks like delayed live casting is called:

real-time video

210. The size of the MxN graphic grid determines

screen resolution

83. The file extension of MS-Word document in Office 2007 is _______.

.docx

201. Which top level domain does Russia have?

.ru

64. The octal number system consists of the following symbols :

0 - 7

59. The hexadecimal number system consists of the symbols

0 - 9 , A - F

77. Minimum number of bits required to store any 3 digit decimal number is equal to

10

185. Binary equivalent of decimal number 35 is

100011

35. A key-board has at least:

101 Keys

87. A Gigabyte is equal to

1024 Megabytes

114. Which one of the following represents the binary equivalent of the decimal number 25

11001

286. Which one of the following represents the binary equivalent of the decimal number 25

11001

292. Which one of the following represents the binary equivalent of the decimal number 25

11001

126. If the binary equivalent of the decimal number 48 is 110000, then the binary equivalent of the decimal number 51 is given by

110011

293. If the binary equivalent of the decimal number 48 is 110000, then the binary equivalent of the decimal number 51 is given by

110011

133. When IT Act 2000 came into effect?

2000 October 17

182. Identify the IP address from the following

202.50.20.148

134. How many schedules are there in IT Act 2000?

4

192. How many parts (numbers) does IP consist of?

4 parts separated by a dot

180. In MS-Access the maximum length of validation text is?

55

153. How many rows are there in MS Excel 2003?

65536

216. What is a firewall?

A filter for an internet connection

46. What is blog?

A personal or corporate website in the form of an online journal

200. Specify the program to work with video:

Adobe Premiere Pro

208. Specify the antivirus programs:

Aidstest.exe, drweb.exe

109. Digital Empowerment means

All of the above

117. Which of the following is an instant messaging application?

All of the above

156. Which of the following is an instant messaging application?

All of the above

21. Information and Communication Technology includes:

All of the above

242. What is Cloud Computing replacing?

All of the above

281. Digital Empowerment means

All of the above

289. Which of the following is an instant messaging application?

All of the above

4. Which of the following is correct statement?

All of the above

24. Which part of the Central Processing Unit (CPU) performs calculation and makes decisions:

Arithmetic Logic Unit

262. ALU stands for

Arithmetic Logic Unit

80. ALU stands for

Arithmetic Logic Unit

217. A strong password should contain:

At least 8 characters, and a combination of letters, numbers, and characters

44. Which was the first company to launch mobile phone services in India?

BPL

50. Which one of the following is not a linear data structure?

Binary Tree

244.Which of these companies is not a leader in cloud computing?

Blackboard

130. With regard to e-mail, what does Bcc: mean?

Blind Carbon Copy : - The users specified in the Bcc : field will get the e-mail and see the addresses in the to : and cc : fields

260. Internet explorer is a type of

Browser

78. Internet explorer is a type of

Browser

39. Errors in computer programmes are called:

Bugs

127. The process of copying files to a CD-ROM is known as

Burning

294. The process of copying files to a CD-ROM is known as

Burning

51. Which one of the following is not a network device?

CPU

241. How is Access data searched?

CTRL+F

178. In MS-Access to open new database press

CTRL+N

177. In MS-Access to open an existing database press

CTRL+O

183. CSS stands for

Cascading Style Sheets

30. The 'brain' of a computer which keeps peripherals under its control is called:

Central Processing Unit

108. Which one of the following is not a search engine?

Chrome

280. Which one of the following is not a search engine?

Chrome

214. Which of the following is not an antivirus software?

Code Red

29.CD ROM stands for:

Compact Disk Read Only Memory

31. Data can be saved on backing storage medium known as:

Compact Disk Rewritable

297. High level programming language can be converted to machine language using which of the following?

Compiler

70. High level programming language can be converted to machine language using which of the following?

Compiler

20. Which of the following is the appropriate definition of a computer?

Computer is an electronic device that can store, retrieve and process data quickly and accurately

259. Which of the following is the appropriate definition of a computer?

Computer is an electronic device that can store, retrieve and process data quickly and accurately

196. Which of the following statements is NOT correct?

Computer is capable of processing only digital signal

3. Which of the following statements is NOT correct?

Computer is capable of processing only digital signal

211. The first computer virus is

Creeper

165. What keyboard shortcuts can recover deleted Microsoft Excel data?

Ctrl + Z

239. Which of the examples below is not a database?

Culinary book

37. Corel Draw is a popular:

Illustration programme

106. gif, jpg, bmp, png are used as extensions for files which store

Image data

147. gif, jpg, bmp, png are used as extensions for files which store

Image data

278. gif, jpg, bmp, png are used as extensions for files which store

Image data

47. Which of the following is not related to information security on the Internet?

Information Retrieval

125. The statement "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer Hardware" refers to

Information Technology (IT)

164. The statement "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer Hardware" refers to

Information Technology (IT)

195. Which of the following is the appropriate definition of Information Technology?

Information Technology refers to the use of hardware and software for storage, retrieval, processing and distributing information of many kinds.

2. Which of the following is the appropriate definition of Information Technology?

Information Technology refers to the use of hardware and software for storage, retrieval, processing and distributing information of many kinds.

1. ICT stands for:

Information and Communication Technology

110. Encoding or scrambling data for transmission across a network is known as

Encryption

150. Encoding or scrambling data for transmission across a network is known as

Encryption

282. Encoding or scrambling data for transmission across a network is known as

Encryption

67. Which of the following is type of LAN?

Ethernet

240. Which key can be used to call MS Access Help?

F1

172. In Microsoft PowerPoint the key on the keyboard can be used to view slide show

F5

181. What Are The Columns In A Microsoft Access Table Called?

Fields

101. The acronym FTP stands for

File Transfer Protocol

144. The acronym FTP stands for

File Transfer Protocol

187. What is FTP?

File Transfer Protocol

190. What formats use graphic elements of web pages

GIF, JPEG

102. Which one of the following is not a/an image/graphic file format?

GUI

112. Which of the following represents one billion characters

Gigabyte

151. Which of the following represents one billion characters

Gigabyte

284. Which of the following represents one billion characters

Gigabyte

55. Which one of the following is different from other members?

Google

115. Which is an instant messenger that is used for chatting

Google Talk

154. Which is an instant messenger that is used for chatting

Google Talk

287. Which is an instant messenger that is used for chatting

Google Talk

139. GIF stands for

Graphics Interchange Format

269. GIF stands for

Graphics Interchange Format

93. GIF stands for

Graphics Interchange Format

56. Where does a computer add and compare its data?

Hard disk

246. Which of these is not a major type of cloud computing usage?

Hardware as a Service

107. Symbols A-F are used in which one of the following?

Hexadecimal number system

148. Symbols A-F are used in which one of the following?

Hexadecimal number system

279. Symbols A-F are used in which one of the following?

Hexadecimal number system

52. A compiler is used to convert the following to object code which can be executed

High-level language

66. HTML stands for

Hyper Text Markup Language

132. In Computer Networking, HTTP is referred to as a stateless protocol as servers do not maintain any information about past client requests. HTTP is an acronym for

Hyper Text Transfer Protocol

247. Which is not a major cloud computing platform?

IBM Deep blue

105. Which one of the following is not the same as the other three?

IP address

146. Which one of the following is not the same as the other three?

IP address

225. A computer connected to the Internet must have

IP address

277. Which one of the following is not the same as the other three?

IP address

57. Computers on an internet are identified by

IP address

141. The post-industrial society is designated as

Information society

271. The post-industrial society is designated as

Information society

95. The post-industrial society is designated as

Information society

58. Which one of the following is not an Internet Service Provider (ISP)?

Infotech India LtD

250. Model of "clouds"

Infrastructure as a Service (IaaS, Infrastructure as a Service)

206. What is multimedia?

Integration of still and moving images, text, and sounds

74. TCP/IP is necessary if one is to connect to the

Internet

113. Which of the following is not open source software

Internet Explorer

285. Which of the following is not open source software

Internet Explorer

291. Which of the following is not open source software

Internet Explorer

128. A computer program that translates a program statement by statement into machine languages is called a/an

Interpreter

263. A computer program that translates a program statement by statement into machine languages is called a/an

Interpreter

86. A computer program that translates a program statement by statement into machine languages is called a/an

Interpreter

219. What is the virus that spread in computer?

It is a computer program

220. What is anti-virus?

It is a program code

218. What is "Trend Micro"?

It is anti-virus software

111. Which of the following is not an output device

Keyboard

283. Which of the following is not an output device

Keyboard

142. Internal communication within institutions done through

LAN

273. Internal communication within institutions done through

LAN

97. Internal communication within institutions done through

LAN

249. Which one of these is not a cloud computing pricing model?

Ladder

173. In Microsoft PowerPoint the following is not a feature of PowerPoint

Linking a slide transition with a laser pointer

18. LAN stands for:

Local Area Network

257. LAN stands for:

Local Area Network

229. Database management system is ...

MS Access

76. Which of the following is not a programming language ?

MS Office

234. What is the name of the set of special macros?

Macro

121. Which of the following enables us to send the same letter to different persons in MS Word?

Mail merge

160. Which of the following enables us to send the same letter to different persons in MS Word?

Mail merge

184 . MOOC stands for

Massive Open Online Course

205. What are the benefits of groupware?

Members of the group can share programs, computer files, and other resources

54. Which one of the following is an example of Operating System?

Microsoft Windows

272. The initial efforts for internet based communication was for

Military purposes

96. The initial efforts for internet based communication was for

Military purposes

19. Which of the following statement is correct

Modem converts the analog signal into digital signal and vice-versa

258. Which of the following statement is correct

Modem converts the analog signal into digital signal and vice-versa

235. What is the name of a program written in Access Basic or VBasic?

Module

119. Which of the following is not an input device?

Monitor

158. Which of the following is not an input device?

Monitor

81. A Personal Computer uses a number of chips mounted on a circuit board called

Mother Board

120. Which of the following is an open source software?

Mozilla Firefox

159. Which of the following is an open source software?

Mozilla Firefox

290. Which of the following is an open source software?

Mozilla Firefox

42. Information, a combination of graphics, text, sound, video and animation is called:

Multimedia

116. NMEICT means

National Mission on Education through ICT

155. NMEICT means

National Mission on Education through ICT

288. NMEICT means

National Mission on Education through ICT

138. Manuel Castelle was the first to use the term

Network society

268. Manuel Castelle was the first to use the term

Network society

92. Manuel Castelle was the first to use the term

Network society

299. IPv4 and IPv6 are addresses used to identify computers on the internet. Find the correct statement out of the following:

Number of bits required for IPv4 address is less than number of bits required for IPv6 address

73. IPv4 and IPv6 are addresses used to identify computers on the internet. Find the correct statement out of the following:

Number of bits required for IPv4 address is less than number of bits required for IPv6 address

171. There are three types of data found in a spreadsheet:

Numbers, formulas, labels

261. POP3 and IMAP are e-mail accounts in which

One only has to be connected to the server to send and receive email

79. POP3 and IMAP are e-mail accounts in which

One only has to be connected to the server to send and receive email

176. In MS-Access press CTRL+O to

Open an existing database

60. The set of computer programs that manage the hardware/software of a computer is called

Operating system

62. What is the name given to the organized collection of software that controls the overall operation of a computer?

Operating system

104. When a computer is booting, BIOS is loaded to the memory by

ROM

145. When a computer is booting, BIOS is loaded to the memory by

ROM

122 . .............. is a type of memory circuitry that holds the computer's start-up routine.

ROM (ReadOnlyMemory)

161 . .............. is a type of memory circuitry that holds the computer's start-up routine.

ROM (ReadOnlyMemory)

32. RAM means:

Random Access Memory

230. Specify the type of Access DBMS:

Relational DBMS

232. What tool is a specially described requirement that determines the composition of database operations performed on a sample?

Request

236. Specify the command to summarize the data of one field or group of data of one field in ACCESS?

SUM

85. A hard disk is divided into tracks which is further subdivided into

Sectors

63. S/MIME in Internet technology stands for

Secure Multipurpose Internet Mail Extension

204. What are presentations?

Secure Socket Layers

243. What is the number one concern about cloud computing?

Security concerns

38. The accounting software 'Tally' was developed by:

TCS

179. Which of the following is not a data type in MS-Access?

Table

296. Microsoft Excel is:

Table Editor

143. The first virtual university of India came up in

Tamil Nadu

275. The first virtual university of India came up in

Tamil Nadu

99. The first virtual university of India came up in

Tamil Nadu

48. Which is the largest unit of storage among the following?

Terabyte

7) Processor (CPU) stands for:

The Central Processing Unit

245. Model of "clouds"

The platform as a service (PaaS, Platform as a Service)

223. Hypertext is

The text in which you can click on the selected links

295. Which of the following series type is not valid for Fill Series dialog box?

Time

215. Both email attachments and downloaded files can spread malware

True

34. Which of the following is not a Computer language?

UNIX

189. What is the address used for hyperlinks

URL address

226. Login is

Username

202. Multimedia is made up of two words:

Video and Images

207. What are some examples of multimedia?

Video games, movies, and television

5. Which of the following statements is correct?

Virus is a part of software

213. VIRUS stands for:

Vital Information Resource Under Slege

131. Random Access Memory (RAM), a form of computer storage, is a ............. memory.

Volatile

129. The software used to navigate through the web is known as

Web Browser

40. HTML is basically used to design:

Web-page

137. Commercial messages on the net are identified as

Webmercials

267. Commercial messages on the net are identified as

Webmercials

91. Commercial messages on the net are identified as

Webmercials

33. WYSIWYG - describes the display of a document on screen as it will actually print:

What you see is what you get

152. Service Software includes programs (utilities):

WinRar, DrWeb, APBackUp

8. Service Software includes programs (utilities):

WinRar, DrWeb, APBackUp

43. What do you need to put your web pages on the www?

all of the above

136. Virtual memory is

an illusion of extremely large main memory.

265. Virtual memory is

an illusion of extremely large main memory.

89. Virtual memory is

an illusion of extremely large main memory.

212. To protect a computer from virus, you should install ......... in your computer

antivirus

11. An electronic bill board that has a short text or graphical advertising message is referred to as:

banner

49. Bit stands for

binary digit

10. Communications bandwidth that has the highest capacity and is used by microwave, cable and fibre optics lines is known as:

broadband

199. Communications bandwidth that has the highest capacity and is used by microwave, cable and fibre optics lines is known as:

broadband

168. The area defined by the intersection of a column and a row of a spreadsheet that has its unique address is:

cell

221. All of the logic and mathematical calculations done by the computer happen in/on the.....

central processing unit

12. Which of the following is not the characteristic of a computer?

computer is an electrical machine

251. Which of the following is not the characteristic of a computer?

computer is an electrical machine

228. Indicate the main functions of the DBMS.

creation, transformation, database management

13. Using websites to pour out one's grievances is called:

cyber venting

252. Using websites to pour out one's grievances is called:

cyber venting

186. The mail server address consists of ...

domains

175. To exit the PowerPoint application, you should

double-click the application Control-menu icon

233. Specify when creating a object in Access, you can use the following modes: column, tape, pivot table, chart?

forms

209. Computer graphics system includes:

graphic display and video adapter

61. Windows is:

graphic operating system

135. A Compiler is a software which converts

high level language to machine language

264. A Compiler is a software which converts

high level language to machine language

88. A Compiler is a software which converts

high level language to machine language

193. Hypertext markup language is:

html

194. Receiving an image from an external source - a scanner, a digital camera, is called

import

140. Which one of the following is not an Operating System?

irefox

270. Which one of the following is not an Operating System?

irefox

94. Which one of the following is not an Operating System?

irefox

149. Digital Empowerment means

ll of the above

222. In relational databases, single column data:

must necessarily have one type

266. The Internet ethical protocol is called

netiquette

90. The Internet ethical protocol is called

netiquette

197. Line access and avoidance of collision are the main functions of:

network protocols

6) Line access and avoidance of collision are the main functions of:

network protocols

198. In the hypermedia database, information bits are stored in the form of:

nodes

9. In the hypermedia database, information bits are stored in the form of:

nodes

103. The first Web Browser is

orld Wide Web

188. How many parts does the URL consist of?

out of three

237. Specify the basic objects ACCESS.

table, form, query, report, page

231. Specify when creating a object in Access, you can use the following modes: import of tables, connection to tables?

tables

36. An E-mail address is composed of:

two parts

15. The concept of connect intelligence is derived from:

value added networks

254. The concept of connect intelligence is derived from:

value added networks

227. What is the name of the device controlling the operation of the graphic display?

video controller

16. Use of an ordinary telephone as an Internet appliance is called:

voice line

255. Use of an ordinary telephone as an Internet appliance is called:

voice line

71. HTML is used to create

web page

100. Which of the following is a social network?

witter

276. Which of the following is a social network?

witter

28. www represents:

world wide web

22. Which of the following is the appropriate format of URL of e-mail?

[email protected]

224. WEB pages have an extension ...

НТМ

169. In an excel sheet the active cell is indicated by:

A dark wide boarder

45. Chandrayan I was launched on 22nd October, 2008 in India from:

Sri Harikota

191. What defines a top-level domain?

State name

53. Which number system is usually followed in a typical 32-bit computer?

8

118. In a Computer a byte generally consists of:

8 bits

157. In a Computer a byte generally consists of:

8 bits

166. Entering a formula in a Microsoft Excel cell begins

=

167. Which symbol must all formula begin with:

=

170. To add two cells (A1 and A2) together you use the following formula:

=A1 + A2

238. The database is ...

A collection of data organized in a specific order.

123. An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, numbers and control keys that the computer user selects on the keyboard ASCII

American Standard Code for Information Interchange

162. An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, numbers and control keys that the computer user selects on the keyboard ASCII

American Standard Code for Information Interchange

23. On the keyboard of computer each character has an "ASCII" value which stands for:

American Standard Code for Information Interchange

300. Each character on the keyboard of computer has an ASCII value which stands for

American Standard Code for Information Interchange

75. Each character on the keyboard of computer has an ASCII value which stands for

American Standard Code for Information Interchange

69. Which of the following operating system is used on mobile phones?

Android

203. Movement created by displaying a series of pictures like cartoons

Animation

26. The process of laying out a document with text, graphics, headlines and photographs is involved in

Desk Top Publishing

41. 'Micro Processing'is made for:

Digital System

298. The term DNS stands for

Domain Name System

65. DNS in internet technology stands for

Domain Name System

72. The term DNS stands for

Domain Name System

25. "Dpi" stands for:

Dots per inch

27. Transfer of data from one application to another line is known as:

Dynamic Data Exchange

84. _______ is a protocol used by e-mail clients to download e-mails to your computer.

POP

274. Virtual reality provides

Participatory experience

98. Virtual reality provides

Participatory experience

174. Objects on the slide that hold text are called

Placeholders

68 . Which of the following statements is true ?

Smart cards and PCs use some operating system

82. Computer Virus is a

Software

248. Model of "clouds"

Software as a Service (SaaS, Software as a Servise)

124. An unsolicited e-mail message sent to many recipient at once is a

Spam

163. An unsolicited e-mail message sent to many recipient at once is a

Spam


संबंधित स्टडी सेट्स

Biology Quiz Question for Test 2

View Set

consumer behavior- exam 3- quiz questions

View Set

Crisis 2 Exam 2 Book Questions BSN3

View Set

EXAM FX (Types of Property Policies)

View Set

Photosynthesis and Respiration Quiz

View Set