1. Firewalls are used to protect a
communication network system against
(A)
Unauthorized attacks (B) Virus
attacks
(C)
Data-driven attacks (D) Fire-attacks
Answer: A
2. HTML is used to create
(A)
machine language program (B) high
level program
(C)
web page (D)
web server
Answer: C
3. The process of laying out a document
with text, graphics, headlines and photographs is involved in
(A)
Deck Top Publishing (B) Desk Top
Printing
(C)
Desk Top Publishing (D) Deck Top
Printing
Answer: C
4. Transfer of data from one application
to another line is known as
(A)
Dynamic Disk Exchange (B)
Dodgy Data Exchange
(C)
Dogmatic Data Exchange (D) Dynamic
Data Exchange
Answer: D
5. Networking of libraries through
electronic media is known as
(A)
Inflibnet (B) Libinfnet
(C)
Internet (D) HTML
Answer: A
6. A …………. is a collection of data that
is stored electronically as a series of records in a table.
(A)
spreadsheet (B) presentation
(C)
database (D) MS Word
Answer: C
7. Changing an existing document is
called …………. the document.
(A)
editing (B) modifying
(C)
adjusting (D) creating
Answer: A
8. The hardware device commonly referred
to as the ‘brain’ of the Computer is the ……….…
(A)
RAM chip (B) data input
(C)
CPU (D) secondary
storage
Answer: C
9. Statistical calculations and
preparation of tables and graphs can be done using
(A)
Adobe Photoshop (B) Excel
(C)
Notepad (D)
Power Point
Answer: B
10. Nod 32, Norton and Panda are
(A)
Search engines (B)
Operating Systems
(C)
Antivirus software (D)
Internet browsers
Answer: C
0 Comments