Computer Knowledge MCQ-121

The coding language used to create documents for use on the World Wide Web is

(D) All of these
(E) None of these

Which of the following is not a function of the control unit?

(A) Read instructions
(B) Execute instructions
(C) Interpret instructions
(D) Direct operations
(E) None of these

Which of the following is/are file extension(s) in DOS?

(D) All of these
(E) None of these

The terms ‘push’ and ‘pop’ are related to the

(A) array
(B) lists
(C) stacks
(D) All of these
(E) None of these

Toolbars contain small outlined areas called __ that provide shortcuts for quick access to commonly used commands.

(A) buttons
(B) dials
(C) bullets
(D) pointers
(E) None of these

In Word, you can use styles to

(A) make copies of documents
(B) save changes to documents
(C) delete text in documents
(D) format documents
(E) None of the above

Codec refers to

(A) Coder- decoder
(B) Co-declaration
(C) Command declaration
(D) Command decoding
(E) None of these

A subset of characters within a data field is known as

(A) data string
(B) record
(C) file
(D) byte
(E) None of these

Which Windows 95 core operating system file is written in full 32-bit code?

(A) Kernel
(C) User
(D) All of these
(E) None of these

Have the cursor one spaces to the right or put spaces in between words __.

(A) control key
(B) space bar
(C) printer
(D) mouse
(E) None of these

A web site’s main page is called its __

(A) Home Page
(B) Browser Page
(C) Search Page
(D) Bookmark
(E) None of these

Which of the following is NOT associated with Computers?

(A) Bit
(B) Binary
(C) Pencil
(D) Mouse
(E) Screen

To see any report in detailed way, press

(A) Alt+F2
(B) F2
(C) Alt + C
(D) Alt +F1
(E) None of these

Background color or effects applied on a document is not visible in

(A) Web layout view
(B) Print Layout view
(C) Reading View
(D) Print Preview
(E) None of these

The- process of a computer receiving information from a server on the internet is known as

(A) Browsing
(B) Download
(C) Upload
(D) All of these
(E) None of these

A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a

(A) hacker
(B) analyst
(C) instant messenger
(D) programmer
(E) spammer