61. Communication between a computer device and a keyboard involves _____ transmission.
- Simpex
- Half-duplex
- Full-duplex
- Both (A) and (B)
62. To connect a computer with a device in the room, we might be likely to use a
- Coaxial cable
- Dedicated line
- Ground station
- All of these
63. A communication network which is used by large organizations over regional, national or global area is
- LAN
- WAN
- MAN
- Internet
64. A device that can convert digital signals to analog signals is a/an
- Packet
- Modem
- Emulator
- All of these
65. End to end connectivity is provided from host-to-host in
- Network layer
- Session layer
- Datalink layer
- Transport layer
66. Which is just the opposite of download?
- Upgrade
- Access
- Upload
- Push
67. The weakest link in any computer security system is
- People
- Hardware
- Programme
- Communication system
68. When a logic bomb is activated by a time-related event, it is known as a
- Time related bomb sequence
- Virus
- Time bomb
- Trojan horse
69. When was the first recorded cyber crime took place?
- 1820
- 1850
- 1880
- 1910
70. The NAND’ gate output will be low, if the two inputs are
- 00
- 01
- 10
- 11
71. Grammar of the programming is checked at ………………. Phase of compiler.
- Semantic analysis
- Code generation
- Syntax analysis
- Code optimization
72. ‘C’ is a ……………… generation language.
- 2nd
- 3rd
- 4th
- 5th
73. Terminal node is also known as
- Last node
- Leaf node
- Ended node
- All of these
74. Shift reduce parsers are
- Top down parser
- Bottom up parser
- Right- most parser
- Left-most parser
75. Software quality metrics focus on the
- Process
- Project
- Product
- All of these
76. A/An …………….. in C language is also known as record.
- Array
- Structure
- Pointer
- Enum
77. In data structure each item in a linked list is called
- Element
- Information
- Data
- Node
78. In SQL, which command is used to changes data in a data table?
- UPDATE
- INSERT
- BROWSE
- APPEND
79. With respect to a network interface card, the term 10/100 refers to
- Protocol speed
- A fibre speed
- Megabits per second
- None of these
80. A hard disk is divided into tracks which are further subdivided into
- Clusters
- Sectors
- Vectors
- Heads
81. Which part of the LASER printer should not be exposed to sunlight?
- Transfer corona assembly
- PC drum
- Toner cartridge
- None of these
82. Modems use which transmission?
- Synchronous
- Asynchronous
- Timed interval
- ATA
83. Changing computer language of 1’s and 0’s to characters that a person can understand is
- Highlight
- Clip Art
- Highlight
- Execute
84. How many bits in a byte?
- 8
- 32
- 64
- 128
85. The speed of your net access is defined in terms of
- RAM
- MHz
- Kbps
- Megabytes
86. Another word for ‘Graphics for a word processor’ is
- Peripheral
- Clip Art
- Highlight
- Execute
87. Which is part of a database that holds only one type of information?
- Report
- Field
- Record
- File
88. What do you call a computer on a network that requests files from another Computer?
- A client
- A host
- A router
- A web server
89. Which is not an internet protocol ?
- HTTP
- FTP
- STP
- IP
90. Which is not a programming language?
- Basic
- Java
- Turing
- C++
91. Which operating system is produced by IBM ?
- OS-2
- Windows
- DOS
- UNIX
92. What is not always necessary for accessing the web?
- A web browser
- A computer
- A modem
- A connection to an internet access provider
93. Which of the following word processors came first ?
- Word perfect
- Lotus Notes
- MS Word
- Word Star
94. The first graphical browser for the www was named
- Netscape
- Veronica
- Mosaic
- Explorer
95. Pentium is related with which part of the computer ?
- DVD
- Hard disk
- Microprocessor
- Mouse
96. Which option is used to get back the information immediately after deleting from the file?
- Undo
- Redo
- Copy
- Paste
97. Which toolbar is used to change the font and font size in MS word?
- Formatting toolbar
- Standard toolbar
- Font toolbar
- Text toolbar
98. Which program does not fall into the MS office package?
- Word
- Excel
- Writer
- Access
99. Which is not an operating system?
- Windows XP
- Linus
- Ubuntu
- Apple
100. Which program is used to compress the big file into small file?
- winZip
- winspread
- winstyple
- winmicro
101. USB stands for
- Universal Security Block
- Universal Serial Bus
- Universal Software Barrier
- Universal Stage Base
102. Which is not Application Software?
- Windows NT
- PAGE Maker
- Win Word XP
- Photoshop
103. Which function key is used to check the grammar and spelling in MS Word ?
- F6
- F7
- F8
- F9
104. In which type of computer, data are represented as discrete signals?
- Analog computer
- Digital Computer
- Both a and b
- Hybrid Computer
105. Light pen & Joystick are
- Algorithm
- Input devices
- Output devices
- Portals
106. Switching device of the fifth-generation computer is
- VLSI
- IC
- Transistor
- Vacuum Tube
107. The scrambling of code is known as
- Password proofing
- Scrambling
- A firewall
- Encryption
108. Malicious Software is known as
- Badware
- Malware
- Maliciousware
- Illegalware
109. Computers manipulate data in many ways and this manipulation is called
- Upgrading
- Processing
- Batching
- Utilizing
110. What is the other name for programmed chip?
- RAM
- ROM
- LSIC
- PROM
111. Father of ‘c’ programming language is
- Dennis Ritchie
- John Keenly
- Thomas Kurtz
- Bill Gates
112. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
- Leech
- Squid
- Slug
- Glitch
113. A computer cannot ‘Boot’ if does not have the
- Compiler
- Loader
- Operating system
- Assembler
114. Junk E-mail is also called
- Spool
- Sniffer script
- Spoof
- Spam
115. The first computers were programmed using
- Assembly language
- Machine language
- Source code
- Object code
116. Shell is the exclusive feature of
- Application software
- DOS
- UNIX
- System software
117. An IP address is ………….. bits.
- 24
- 32
- 48
- None of these
118. A repeater recognizes …………………….. layer addresses.
- Data link
- Network
- Transport
- None of these
119. Token Bus is physically configured like
- Ethernet
- Token ring
- FDDI
- All of these
120. A computer network permits sharing of
- Resources
- Information
- Both a and b
- None of these
Read the next part: ।। Part-3 ।। Part-1 ।।
Read also:
- Solved Paper Superintendent of Jails 2021
- Solved Paper Panchayat Secretary Exam 2021 – HPU Shimla
- Solved Paper JOA IT 2021 – Dr. YSP University
- Solved Paper Clerk Exam 2021 – HPSSC Hamipur
- Solved Paper JOA IT – HPCSKV Palampur
- Solved Paper Traffic Inspector 2021
- Solved Paper JOA Accounts 2021
- Solved Paper Staff Nurse 2021
- Junior Office Assistant (IT) Paper 2021
- Senior Scientific Officer Paper 2021
- Hotel Inspector Paper 2021
This key is wrong there’s atleast wrong answers in this key
Kindly let us know which answer are wrong. We’ll make corrections.
Too many questions are wrong
Kindly let us know which answer are wrong. We’ll make corrections.