24.11.2018 Views

Pareekshavijayi e-Book

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

R<br />

12 Veto<br />

follow us: facebook.com/vetotrivandrum 23<br />

24. When using Microsoft Word, how<br />

can you increase the font size of<br />

selected text by one point every<br />

time?<br />

[University Assistant Calicut –<br />

2013]<br />

a) By pressing Ctrl + [<br />

b) By pressing Ctrl + ]<br />

c) By pressing Ctrl + Shift<br />

d) By pressing Ctrl + 1<br />

25. ______ is the modification of<br />

software to removes or disable<br />

features which are undesirable<br />

by a person<br />

[Assistant KSEB – 2015]<br />

a) Software hacking<br />

b) Software licensing<br />

c) Software piracy<br />

d) Software cracking<br />

26. In the e-mail address – admin@<br />

vms.org, ‘vms’ is the? [Assistant<br />

KSEB – 2015]<br />

a) Host name with commercial<br />

domain<br />

b) Host name with noncommercial<br />

domain<br />

c) Client name with educational<br />

domain<br />

d) Client name with government<br />

domain<br />

27. A device that combines data from<br />

multiple computers and load them<br />

on a common communication<br />

channel is?<br />

[Assistant KSEB – 2015]<br />

a) Modem b) Repeater<br />

c) Multiplexer d) Encoder<br />

28. The Walkie Talkie is an example of<br />

which mode of communication?<br />

[Assistant KSEB – 2015]<br />

a) Simplex b) Half Duplex<br />

c) Duplex d) None of these<br />

29. A collection of four bits is called<br />

[Assistant KSEB – 2015]<br />

a) Nibble b) Byte<br />

c) Word d) Double word<br />

30. Which hardware device is used<br />

to interconnect different types of<br />

networks with different protocols?<br />

[Assistant KSEB – 2015]<br />

a) Bridge b) Router<br />

c) Gateway d) Repeater<br />

31. Data Diddling involves [Assistant<br />

KSEB – 2015]<br />

a) Destroying data before input to<br />

the computer<br />

b) Unauthorised copying of data<br />

c) Changing data into information<br />

d) Changing data prior or during<br />

input to the computer<br />

32. When did Information Technology<br />

Act come into force in India?<br />

[Assistant KSEB – 2015]<br />

a) October 17, 2000<br />

b) October 17, 2001<br />

c) June 4, 2000<br />

d) June 4, 2001<br />

33. ‘Ice cream sandwich’ and<br />

‘Jellybean’ are the latest version<br />

of which operating system?<br />

[Assistant KSEB – 2015]<br />

a) Ubuntu b) Android<br />

c) Apple d) Unix<br />

34. Which technology is used in<br />

CDROM Drive? [Assistant KSEB –<br />

2015]<br />

a) Mechanical<br />

b) Electromechanical<br />

c) Optical<br />

d) Fiber optical<br />

35. A memory management technique<br />

that uses hard drives space as<br />

additional RAM [Assistant KSEB –<br />

2015]<br />

a) Virtual private network<br />

b) Virtual memory<br />

c) Virtual machine<br />

d) None of them<br />

36. VIRUS stands for (in the case of<br />

networking)<br />

[Assistant KSEB – 2015]<br />

a) Very Important Resource Under<br />

Search<br />

b) Virtual Information Resource<br />

Under Seize<br />

c) Verify Interchange Result Until<br />

Source<br />

d) Very important Record User<br />

Searched<br />

37. The translator program that<br />

converts source code in high level<br />

language into machine code line by<br />

line is called<br />

[Assistant KSEB – 2015]<br />

a) Assembler b) Computer<br />

c) Loader d) Interpreter<br />

38. Programs stored in ROM are<br />

called<br />

[Assistant KSEB – 2015]<br />

a) Hardware b) Firmware<br />

c) Software d) None of these<br />

39. Which of the following is the<br />

Universal Gate?<br />

[Assistant KSEB – 2015]<br />

a) NAND – Gate<br />

b) OR – Gate<br />

c) AND – Gate d) NOT - Gate<br />

40. Which of the following program is<br />

not a utility?<br />

[Assistant KSEB – 2015]<br />

a) Debugger b) Editor<br />

c) Spooler d) All of the above<br />

41. What is the number of bit patterns<br />

provided by a 7-bit code?<br />

[Assistant KSEB – 2015]<br />

a) 128 b) 512<br />

c) 256 d) 64<br />

42. Which are the main provisions of<br />

IT Act 2000?<br />

[Assistant KSEB – 2015]<br />

a) Finalization of contracts through<br />

electronic media<br />

b) Legal recognition to digital<br />

signatures and documents<br />

c) Making hacking with computer<br />

system an offence<br />

d) All of the above<br />

43. The first Generation computers<br />

used _______ for circuitry<br />

[Women Sub Inspector – 2016]<br />

a) Vacuum Tubes<br />

b) Transistors<br />

c) Integrated Circuit<br />

d) Large Scale Integration<br />

44. A byte consist of how many bits?<br />

[Women Sub Inspector – 2016]<br />

a) Nine<br />

b) Fair<br />

c) Eight<br />

d) Sixteen<br />

45. Internet works on<br />

[Women Sub Inspector – 2016]<br />

a) Circuit switching<br />

b) Packet switching<br />

c) Both a and b<br />

d) None of the mentioned<br />

46. Cyber stalker is<br />

[Women Sub<br />

Inspector – 2016]<br />

a) A person securing<br />

access to a computer<br />

system without<br />

permission of the<br />

owner<br />

b) Using internet, email<br />

or other electronic<br />

JAVA<br />

communication<br />

Cobol<br />

devices to stalk<br />

Prolog<br />

c) Member of an<br />

organization using its LISP<br />

internet resources for Fortan<br />

non work purpose<br />

d) Person who introduces<br />

computer virus to any computer<br />

47. Speed of the modem is measured<br />

in<br />

[Women Sub Inspector – 2016]<br />

a) Bytes per minute<br />

b) Bytes per second<br />

c) Bits per mille second<br />

d) Bits per second<br />

48. Which of the following languages<br />

is used for artificial intelligence?<br />

[Women Sub Inspector – 2016]<br />

a) Fortran b) Prolog<br />

c) C d) Cobol<br />

49. GUI refers to<br />

[Women Sub Inspector – 2016]<br />

a) Graphical User Interface<br />

b) Guaranteed User Interface<br />

c) Graphics Utilized Internally<br />

d) None of the above<br />

50. Spam is<br />

[Women Sub Inspector – 2016]<br />

a) Fraudulent way of getting<br />

confidential information<br />

b) Unwanted instant messages<br />

c) Unsolicited e-mails<br />

d) None of the above<br />

Answer:<br />

1(d) 2(d) 3(c) 4(b) 5(b) 6(b) 7(a)<br />

8(c) 9(a) 10(b) 11(c) 12(d) 13(b)<br />

14(d) 15(a) 16(b) 17(d) 18(a) 19(b)<br />

20(a) 21(a) 22(c) 23(d) 24(b) 25(d)<br />

26(b) 27(c) 28(b) 29(a) 30(c) 31(d)<br />

32(a) 33(b) 34(c) 35(b) 36(b) 37(d)<br />

38(b) 39(a) 40(c) 41(a) 42(d) 43(a)<br />

44(c) 45(c) 46(c) 47(d) 48(b) 49(a)<br />

50(b)<br />

Confusing Facts<br />

Computer languages<br />

- Internet language<br />

- Business language<br />

- Artificial intelligent language<br />

- First Commercialy available<br />

highlevel language

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!