Computer Knowledge MCQ-180

Which of the following system(s) of arithmetic is/are not often used in digital system?

(A) Binary digit
(B) Decimal digit
(C) Octal digit
(D) Hexadecimal digit
(E) Terabyte digit

Why IP Protocol is considered as unreliable?

(A) A packet may be lost
(B) Packets may arrive out of order
(C) Duplicate packets may be generated
(D) All of the above
(E) None of Above

__ represents raw facts, whereas __ is data made meaningful.

(A) Information, reporting
(B) Data, information
(C) Information, bits
(D) Records, bytes
(E) None of these

__ is the operating system that reads and reacts in terms of actual time.

(A) Real time system
(B) Batch system
(C) Quick response system
(D) Time sharing system
(E) None of these

A program written in machine language is called

(A) assembler
(B) object code
(C) computer
(D) machine
(E) None of these

Title bar, ribbon, status bar, views and document workspace are factors of __ program of Words.

(A) Windows
(B) Browser
(C) Explorer
(D) Website
(E) None of these

Go to beginning of a document, press__.

(A) End
(B) Home
(C) Num Lock
(D) Tab
(E) None of these

The word processing task associated with changing the appearance of documents is

(A) Writing
(B) Formatting
(C) Editing
(D) Storing
(E) None of these

The main characteristic of fourth generation was

(A) transistor
(C) vacuum tubes
(D) circuit
(E) None of these

You can undo and redo up to __ actions in Microsoft Office Excel, even after a worksheet is saved.

(A) 100
(B) 50
(C) 99
(D) 500
(E) None of these

The dbase III plus is mostly used for

(A) Office automation
(B) Database management problems
(C) Scientific problems
(D) Calculations only
(E) None of these

CD-ROM is a

(A) Semiconductor memory
(B) Memory register
(C) Magnetic memory
(D) Software
(E) None of these

Which view does not allow to change the format of a table?

(A) Datasheet view
(B) Design view
(C) Pivot table view
(D) Both (a) and (b)
(E) None of these

Generally the mouse has __ buttons.

(A) 1
(B) 2
(C) 3
(D) 2 or 3
(E) None of these

Specialised programs that assist users in locating information on the Web are called __

(A) information engines
(B) search engines
(C) web browsers
(D) resource locators
(E) None of these

You can protect sensitive data from prying eyes using __

(A) Encryption
(B) Passwords
(C) File locks
(D) File permissions
(E) None of these