Friday 12 October 2012

COMPUTER OBJECTEV QUESTION--16

1. The rules with regards to conduct for internet users is known as
A. Mouse
B. Netiquette
C. Protocol
D. Internet Protocol

ANSWER :-

2. TCP/IP is
A. Abbreviation for transmission control and Internet Protocol
B. A suite of network protocols
C. A standard protocol that lets disparate types of computers communicate over the Net
D.All the above


ANSWER :-

3. The protocol that allows a computer to use the Internet Protocol with  standard voice -grade telephone in and a high-speed modem is -
A. SLIP
B. SMTP
C. SGML
D. RTF

ANSWER :-

4.  A  Spider is    
A. A computer virus
B. A Browser
C. A program that catalogs web sites
D. A hacker community

ANSWER :-

5.  FTP does not use 
A. Two transfer mode
B. Control connection to remote computer before file can be transferred
C. User Datagram Protocol
D. Authorization of a user through login and password verification

ANSWER :-
6. A terminal emulation protocol that allows users to log on to a host computer from remote computer is 
A. Telnet
B. TCP/IP
C. FTP
D. Point -to -pint protocol (PPP)

ANSWER :-

7. Which of the following is used to enable the use of active documents?
A. HTML
B. CGI
C. JAVA
D. All of the above

ANSWER :-

8. A Networking standard developed by Xerox, Intel and DFC;capable of connecting as many as 1,024worksstation and transmitting data at a maximum speed of 10Mbps 
A. Ethernet
B. FDDI
C. File Transfer protocol
D. Gopher

ANSWER :-

9. The HTML tags that create a table header are
A. <head><head>
B. <ttop> </ttop>
C. <th> </th>
D. <td> </td>

ANSWER :-

10. Which HTML tags that create a table header are
A. <background img="background.gif">
B. <img src="background.gif"background/>
C. <a href="background. gif">
D. <body background="background.gif">

ANSWER :-



ANSWER :-

1. B
2. D
3. A
4. C
5. C
6. A
7. D
8. A
9. C
10.  D


 

COMPUTER OBJECTEV QUESTION--16

1. The rules with regards to conduct for internet users is known as
A. Mouse
B. Netiquette
C. Protocol
D. Internet Protocol

ANSWER :-

2. TCP/IP is
A. Abbreviation for transmission control and Internet Protocol
B. A suite of network protocols
C. A standard protocol that lets disparate types of computers communicate over the Net
D.All the above


ANSWER :-

3. The protocol that allows a computer to use the Internet Protocol with  standard voice -grade telephone in and a high-speed modem is -
A. SLIP
B. SMTP
C. SGML
D. RTF

ANSWER :-

4.  A  Spider is    
A. A computer virus
B. A Browser
C. A program that catalogs web sites
D. A hacker community

ANSWER :-

5.  FTP does not use 
A. Two transfer mode
B. Control connection to remote computer before file can be transferred
C. User Datagram Protocol
D. Authorization of a user through login and password verification

ANSWER :-
6. A terminal emulation protocol that allows users to log on to a host computer from remote computer is 
A. Telnet
B. TCP/IP
C. FTP
D. Point -to -pint protocol (PPP)

ANSWER :-

7. Which of the following is used to enable the use of active documents?
A. HTML
B. CGI
C. JAVA
D. All of the above

ANSWER :-

8. A Networking standard developed by Xerox, Intel and DFC;capable of connecting as many as 1,024worksstation and transmitting data at a maximum speed of 10Mbps 
A. Ethernet
B. FDDI
C. File Transfer protocol
D. Gopher

ANSWER :-

9. The HTML tags that create a table header are
A. <head><head>
B. <ttop> </ttop>
C. <th> </th>
D. <td> </td>

ANSWER :-

10. Which HTML tags that create a table header are
A. <background img="background.gif">
B. <img src="background.gif"background/>
C. <a href="background. gif">
D. <body background="background.gif">

ANSWER :-



ANSWER :-

1. B
2. D
3. A
4. C
5. C
6. A
7. D
8. A
9. C
10.  D


 

COMPUTER OBJECTEV QUESTION--16

1. The rules with regards to conduct for internet users is known as
A. Mouse
B. Netiquette
C. Protocol
D. Internet Protocol

ANSWER :-

2. TCP/IP is
A. Abbreviation for transmission control and Internet Protocol
B. A suite of network protocols
C. A standard protocol that lets disparate types of computers communicate over the Net
D.All the above


ANSWER :-

3. The protocol that allows a computer to use the Internet Protocol with  standard voice -grade telephone in and a high-speed modem is -
A. SLIP
B. SMTP
C. SGML
D. RTF

ANSWER :-

4.  A  Spider is    
A. A computer virus
B. A Browser
C. A program that catalogs web sites
D. A hacker community

ANSWER :-

5.  FTP does not use 
A. Two transfer mode
B. Control connection to remote computer before file can be transferred
C. User Datagram Protocol
D. Authorization of a user through login and password verification

ANSWER :-
6. A terminal emulation protocol that allows users to log on to a host computer from remote computer is 
A. Telnet
B. TCP/IP
C. FTP
D. Point -to -pint protocol (PPP)

ANSWER :-

7. Which of the following is used to enable the use of active documents?
A. HTML
B. CGI
C. JAVA
D. All of the above

ANSWER :-

8. A Networking standard developed by Xerox, Intel and DFC;capable of connecting as many as 1,024worksstation and transmitting data at a maximum speed of 10Mbps 
A. Ethernet
B. FDDI
C. File Transfer protocol
D. Gopher

ANSWER :-

9. The HTML tags that create a table header are
A. <head><head>
B. <ttop> </ttop>
C. <th> </th>
D. <td> </td>

ANSWER :-

10. Which HTML tags that create a table header are
A. <background img="background.gif">
B. <img src="background.gif"background/>
C. <a href="background. gif">
D. <body background="background.gif">

ANSWER :-



ANSWER :-

1. B
2. D
3. A
4. C
5. C
6. A
7. D
8. A
9. C
10.  D


 

COMPUTER OBJECTEV QUESTION--16

1. The rules with regards to conduct for internet users is known as
A. Mouse
B. Netiquette
C. Protocol
D. Internet Protocol

ANSWER :-

2. TCP/IP is
A. Abbreviation for transmission control and Internet Protocol
B. A suite of network protocols
C. A standard protocol that lets disparate types of computers communicate over the Net
D.All the above


ANSWER :-

3. The protocol that allows a computer to use the Internet Protocol with  standard voice -grade telephone in and a high-speed modem is -
A. SLIP
B. SMTP
C. SGML
D. RTF

ANSWER :-

4.  A  Spider is    
A. A computer virus
B. A Browser
C. A program that catalogs web sites
D. A hacker community

ANSWER :-

5.  FTP does not use 
A. Two transfer mode
B. Control connection to remote computer before file can be transferred
C. User Datagram Protocol
D. Authorization of a user through login and password verification

ANSWER :-
6. A terminal emulation protocol that allows users to log on to a host computer from remote computer is 
A. Telnet
B. TCP/IP
C. FTP
D. Point -to -pint protocol (PPP)

ANSWER :-

7. Which of the following is used to enable the use of active documents?
A. HTML
B. CGI
C. JAVA
D. All of the above

ANSWER :-

8. A Networking standard developed by Xerox, Intel and DFC;capable of connecting as many as 1,024worksstation and transmitting data at a maximum speed of 10Mbps 
A. Ethernet
B. FDDI
C. File Transfer protocol
D. Gopher

ANSWER :-

9. The HTML tags that create a table header are
A. <head><head>
B. <ttop> </ttop>
C. <th> </th>
D. <td> </td>

ANSWER :-

10. Which HTML tags that create a table header are
A. <background img="background.gif">
B. <img src="background.gif"background/>
C. <a href="background. gif">
D. <body background="background.gif">

ANSWER :-



ANSWER :-

1. B
2. D
3. A
4. C
5. C
6. A
7. D
8. A
9. C
10.  D


 

COMPUTER OBJECTIVE QUESTION-15

1. Computer on the internet owned and operated by research institutions form part of the 
A. com domain
B. edu domain
C. mail domain
D. None of the above.
2. Linux is 
A. A person
B. A file
C. A program for copying files from one computer to another
D. An Operating system.
3. All web addresses start with which of the following?
A. htp
B. http://
C. http:/
D. www
4. The method of transferring files with roots in unix is 
A. Bin Hex
B. Unencoding
C. FTP
D. Telnet
5. In HTML language the tag<U> displays text as
A. Boldface
B. Italics
C. Underlined
D. Colored
6. The H in HTML stands for 
A. Hypo
B. High
C. Higher
D. Hyper
7. SMTP is a simple 
A. TCP protocol
B. TCP/IP protocol
C. IP protocol
D. None of the above.
8. Main protocol used in Internet
A. IPX/SPX
B. TCP/IP
C. Token Bus
D.X. 25
9. Web page are uniquely defined using
A. IP addresses
B. URL
C. Domain
D. Filename
10. A word that looks underlined on a web page is usually
A. an important word
B. the web address
C. a"link" to another web page
D. a mistake

Answer:
1.B
2.D
3.B
4.C
5.C
6.D
7.B
8.B
9.C
10. C

COMPUTER OBJECTIVE QUESTION-15

1. Computer on the internet owned and operated by research institutions form part of the 
A. com domain
B. edu domain
C. mail domain
D. None of the above.
2. Linux is 
A. A person
B. A file
C. A program for copying files from one computer to another
D. An Operating system.
3. All web addresses start with which of the following?
A. htp
B. http://
C. http:/
D. www
4. The method of transferring files with roots in unix is 
A. Bin Hex
B. Unencoding
C. FTP
D. Telnet
5. In HTML language the tag<U> displays text as
A. Boldface
B. Italics
C. Underlined
D. Colored
6. The H in HTML stands for 
A. Hypo
B. High
C. Higher
D. Hyper
7. SMTP is a simple 
A. TCP protocol
B. TCP/IP protocol
C. IP protocol
D. None of the above.
8. Main protocol used in Internet
A. IPX/SPX
B. TCP/IP
C. Token Bus
D.X. 25
9. Web page are uniquely defined using
A. IP addresses
B. URL
C. Domain
D. Filename
10. A word that looks underlined on a web page is usually
A. an important word
B. the web address
C. a"link" to another web page
D. a mistake

Answer:
1.B
2.D
3.B
4.C
5.C
6.D
7.B
8.B
9.C
10. C

COMPUTER OBJECTIVE QUESTION-15

1. Computer on the internet owned and operated by research institutions form part of the 
A. com domain
B. edu domain
C. mail domain
D. None of the above.
2. Linux is 
A. A person
B. A file
C. A program for copying files from one computer to another
D. An Operating system.
3. All web addresses start with which of the following?
A. htp
B. http://
C. http:/
D. www
4. The method of transferring files with roots in unix is 
A. Bin Hex
B. Unencoding
C. FTP
D. Telnet
5. In HTML language the tag<U> displays text as
A. Boldface
B. Italics
C. Underlined
D. Colored
6. The H in HTML stands for 
A. Hypo
B. High
C. Higher
D. Hyper
7. SMTP is a simple 
A. TCP protocol
B. TCP/IP protocol
C. IP protocol
D. None of the above.
8. Main protocol used in Internet
A. IPX/SPX
B. TCP/IP
C. Token Bus
D.X. 25
9. Web page are uniquely defined using
A. IP addresses
B. URL
C. Domain
D. Filename
10. A word that looks underlined on a web page is usually
A. an important word
B. the web address
C. a"link" to another web page
D. a mistake

Answer:
1.B
2.D
3.B
4.C
5.C
6.D
7.B
8.B
9.C
10. C

COMPUTER OBJECTIVE QUESTION-15

1. Computer on the internet owned and operated by research institutions form part of the 
A. com domain
B. edu domain
C. mail domain
D. None of the above.
2. Linux is 
A. A person
B. A file
C. A program for copying files from one computer to another
D. An Operating system.
3. All web addresses start with which of the following?
A. htp
B. http://
C. http:/
D. www
4. The method of transferring files with roots in unix is 
A. Bin Hex
B. Unencoding
C. FTP
D. Telnet
5. In HTML language the tag<U> displays text as
A. Boldface
B. Italics
C. Underlined
D. Colored
6. The H in HTML stands for 
A. Hypo
B. High
C. Higher
D. Hyper
7. SMTP is a simple 
A. TCP protocol
B. TCP/IP protocol
C. IP protocol
D. None of the above.
8. Main protocol used in Internet
A. IPX/SPX
B. TCP/IP
C. Token Bus
D.X. 25
9. Web page are uniquely defined using
A. IP addresses
B. URL
C. Domain
D. Filename
10. A word that looks underlined on a web page is usually
A. an important word
B. the web address
C. a"link" to another web page
D. a mistake

Answer:
1.B
2.D
3.B
4.C
5.C
6.D
7.B
8.B
9.C
10. C

COMPUTER OBJECTIVE QUESTION -14

1. TCP is a commonly used protocol at 
A. Application layer
B. Transport layer
C. Network layer
D. Physical layer
2. The process of keeping addresses in memory for future use is called:
A. Caching
B. Routing
C. Resolving
D. RFC
3. The following is NOT an Internet search engine:
A. Google
B. Webcrawler
C. Excite
D. Scientia ans
4. The domain name in a URL refers to the 
A. protocol
B. file name
C. server
D. directory
5. The world wide web integrates which of the following:
A. E -mail, Telnet, Usenet
B. Sound and movies files
C. A and B
D. All Internet communication tools
6. All web addresses start with which of the following?
A. Htp
B. http://
C. http:/
D. www
7. Which of the following terms is a "browser"?
A. Netscape
B. World Wide Web
C. Launcher
D. E -mail
8. Which of the following is not a method of accessing the web?
A. ISDN
B. MODEM
C. DSL
D. CPU
9. A word that is underlined on a web page is usually
A. Show emphasis
B. Recently added to the page
C. A link to another web page
D. The title of something
10. What is a cookie?
A. Computer code used to show animations and play sound.
B. Information sent to your computer that is used later to give information back to a visited website.
C. Computer code that automatically records all purchases and payments you make from your computer .
D. An advertisement that will at some time be displayed on your computer screen.


Answer:
1.B
2.A
3.D
4.C
5.D
6.B
7.A
8.D
9.C
10. B

COMPUTER OBJECTIVE QUESTION -14

1. TCP is a commonly used protocol at 
A. Application layer
B. Transport layer
C. Network layer
D. Physical layer
2. The process of keeping addresses in memory for future use is called:
A. Caching
B. Routing
C. Resolving
D. RFC
3. The following is NOT an Internet search engine:
A. Google
B. Webcrawler
C. Excite
D. Scientia ans
4. The domain name in a URL refers to the 
A. protocol
B. file name
C. server
D. directory
5. The world wide web integrates which of the following:
A. E -mail, Telnet, Usenet
B. Sound and movies files
C. A and B
D. All Internet communication tools
6. All web addresses start with which of the following?
A. Htp
B. http://
C. http:/
D. www
7. Which of the following terms is a "browser"?
A. Netscape
B. World Wide Web
C. Launcher
D. E -mail
8. Which of the following is not a method of accessing the web?
A. ISDN
B. MODEM
C. DSL
D. CPU
9. A word that is underlined on a web page is usually
A. Show emphasis
B. Recently added to the page
C. A link to another web page
D. The title of something
10. What is a cookie?
A. Computer code used to show animations and play sound.
B. Information sent to your computer that is used later to give information back to a visited website.
C. Computer code that automatically records all purchases and payments you make from your computer .
D. An advertisement that will at some time be displayed on your computer screen.


Answer:
1.B
2.A
3.D
4.C
5.D
6.B
7.A
8.D
9.C
10. B

COMPUTER OBJECTIVE QUESTION -14

1. TCP is a commonly used protocol at 
A. Application layer
B. Transport layer
C. Network layer
D. Physical layer
2. The process of keeping addresses in memory for future use is called:
A. Caching
B. Routing
C. Resolving
D. RFC
3. The following is NOT an Internet search engine:
A. Google
B. Webcrawler
C. Excite
D. Scientia ans
4. The domain name in a URL refers to the 
A. protocol
B. file name
C. server
D. directory
5. The world wide web integrates which of the following:
A. E -mail, Telnet, Usenet
B. Sound and movies files
C. A and B
D. All Internet communication tools
6. All web addresses start with which of the following?
A. Htp
B. http://
C. http:/
D. www
7. Which of the following terms is a "browser"?
A. Netscape
B. World Wide Web
C. Launcher
D. E -mail
8. Which of the following is not a method of accessing the web?
A. ISDN
B. MODEM
C. DSL
D. CPU
9. A word that is underlined on a web page is usually
A. Show emphasis
B. Recently added to the page
C. A link to another web page
D. The title of something
10. What is a cookie?
A. Computer code used to show animations and play sound.
B. Information sent to your computer that is used later to give information back to a visited website.
C. Computer code that automatically records all purchases and payments you make from your computer .
D. An advertisement that will at some time be displayed on your computer screen.


Answer:
1.B
2.A
3.D
4.C
5.D
6.B
7.A
8.D
9.C
10. B

COMPUTER OBJECTIVE QUESTION -14

1. TCP is a commonly used protocol at 
A. Application layer
B. Transport layer
C. Network layer
D. Physical layer
2. The process of keeping addresses in memory for future use is called:
A. Caching
B. Routing
C. Resolving
D. RFC
3. The following is NOT an Internet search engine:
A. Google
B. Webcrawler
C. Excite
D. Scientia ans
4. The domain name in a URL refers to the 
A. protocol
B. file name
C. server
D. directory
5. The world wide web integrates which of the following:
A. E -mail, Telnet, Usenet
B. Sound and movies files
C. A and B
D. All Internet communication tools
6. All web addresses start with which of the following?
A. Htp
B. http://
C. http:/
D. www
7. Which of the following terms is a "browser"?
A. Netscape
B. World Wide Web
C. Launcher
D. E -mail
8. Which of the following is not a method of accessing the web?
A. ISDN
B. MODEM
C. DSL
D. CPU
9. A word that is underlined on a web page is usually
A. Show emphasis
B. Recently added to the page
C. A link to another web page
D. The title of something
10. What is a cookie?
A. Computer code used to show animations and play sound.
B. Information sent to your computer that is used later to give information back to a visited website.
C. Computer code that automatically records all purchases and payments you make from your computer .
D. An advertisement that will at some time be displayed on your computer screen.


Answer:
1.B
2.A
3.D
4.C
5.D
6.B
7.A
8.D
9.C
10. B

Thursday 11 October 2012

COMPUTER OBJECTIVE QUESTION

1. How many rows Microsoft Excel work sheets have?
A. 65,536
B. 60790
C. None  of the above
D. 56,563
2. Files in MS- Excel is known as 
A. Worksheet
B. File
C. Workbook
D. Document
3. Address of first cell in Excel is 
A. First
B. A1
C. 1A
D. 11
4. Workbook contains maximum_____ sheets.
A. 10
B. 16
C. 256
D. None of the above.
5. Title bar in excel have ______ buttons.
A. Maximize
B.
Minimize, close
C.
Open, close
D. Both a &b
6. Excel, have not______ feature.
A. Function .
B. Copy and move.
C. Graph.
D. Mail Merge.
7. Column Bar has _______ columns
A. 256
B. 65,536
C. 16
D. Both a&b
8. _________short cut key is used to move cell pointer to the next sheet.
A.
B.
Alt + pg dn
C. Ctrl + pgdn
D. Ctrl + Home
9. Value Entry contains-
A. 0-9
B. +,-
C. Decimal
D. All of the above
10. Formula Entries are of ______ types.
A. Relative, Mixed
B. Mixed, Absolute
C. Absolute
D. Both a&b

COMPUTER OBJECTIVE QUESTION

1. How many rows Microsoft Excel work sheets have?
A. 65,536
B. 60790
C. None  of the above
D. 56,563
2. Files in MS- Excel is known as 
A. Worksheet
B. File
C. Workbook
D. Document
3. Address of first cell in Excel is 
A. First
B. A1
C. 1A
D. 11
4. Workbook contains maximum_____ sheets.
A. 10
B. 16
C. 256
D. None of the above.
5. Title bar in excel have ______ buttons.
A. Maximize
B.
Minimize, close
C.
Open, close
D. Both a &b
6. Excel, have not______ feature.
A. Function .
B. Copy and move.
C. Graph.
D. Mail Merge.
7. Column Bar has _______ columns
A. 256
B. 65,536
C. 16
D. Both a&b
8. _________short cut key is used to move cell pointer to the next sheet.
A.
B.
Alt + pg dn
C. Ctrl + pgdn
D. Ctrl + Home
9. Value Entry contains-
A. 0-9
B. +,-
C. Decimal
D. All of the above
10. Formula Entries are of ______ types.
A. Relative, Mixed
B. Mixed, Absolute
C. Absolute
D. Both a&b

COMPUTER OBJECTIVE QUESTION

1. How many rows Microsoft Excel work sheets have?
A. 65,536
B. 60790
C. None  of the above
D. 56,563
2. Files in MS- Excel is known as 
A. Worksheet
B. File
C. Workbook
D. Document
3. Address of first cell in Excel is 
A. First
B. A1
C. 1A
D. 11
4. Workbook contains maximum_____ sheets.
A. 10
B. 16
C. 256
D. None of the above.
5. Title bar in excel have ______ buttons.
A. Maximize
B.
Minimize, close
C.
Open, close
D. Both a &b
6. Excel, have not______ feature.
A. Function .
B. Copy and move.
C. Graph.
D. Mail Merge.
7. Column Bar has _______ columns
A. 256
B. 65,536
C. 16
D. Both a&b
8. _________short cut key is used to move cell pointer to the next sheet.
A.
B.
Alt + pg dn
C. Ctrl + pgdn
D. Ctrl + Home
9. Value Entry contains-
A. 0-9
B. +,-
C. Decimal
D. All of the above
10. Formula Entries are of ______ types.
A. Relative, Mixed
B. Mixed, Absolute
C. Absolute
D. Both a&b

COMPUTER OBJECTIVE QUESTION

1. How many rows Microsoft Excel work sheets have?
A. 65,536
B. 60790
C. None  of the above
D. 56,563
2. Files in MS- Excel is known as 
A. Worksheet
B. File
C. Workbook
D. Document
3. Address of first cell in Excel is 
A. First
B. A1
C. 1A
D. 11
4. Workbook contains maximum_____ sheets.
A. 10
B. 16
C. 256
D. None of the above.
5. Title bar in excel have ______ buttons.
A. Maximize
B.
Minimize, close
C.
Open, close
D. Both a &b
6. Excel, have not______ feature.
A. Function .
B. Copy and move.
C. Graph.
D. Mail Merge.
7. Column Bar has _______ columns
A. 256
B. 65,536
C. 16
D. Both a&b
8. _________short cut key is used to move cell pointer to the next sheet.
A.
B.
Alt + pg dn
C. Ctrl + pgdn
D. Ctrl + Home
9. Value Entry contains-
A. 0-9
B. +,-
C. Decimal
D. All of the above
10. Formula Entries are of ______ types.
A. Relative, Mixed
B. Mixed, Absolute
C. Absolute
D. Both a&b

Tuesday 9 October 2012

Computer True False Question-

1. BIOS program is stored on the RAM.
2. ASCII Codes are 10 Bit binary codes.
3. Machine language is machine de4pendent while assembly languages are machine independent.
4. When you link an object, the actual data remains separate from the client data .
5. Excel, it is not possible to select two non adjacent ranges at a time.
6. Program Counter does not hold the address of next instruction to be executed.
7. An object program is created by  compiler ,from a sources program at run time.
8. Serial data transfer moves data faster then parallel data transfer.
9. You can embed sound, video clips and animations in t your Power Point presentation.
10. In Excel, by default, the numbers are left aligned and text values are right aligned.


TRUE/FALSE
1. F
2. F
3. T
4. T
5. F
6. F
7. F
8. F
9. T
10. F
 

Computer True False Question-

1. BIOS program is stored on the RAM.
2. ASCII Codes are 10 Bit binary codes.
3. Machine language is machine de4pendent while assembly languages are machine independent.
4. When you link an object, the actual data remains separate from the client data .
5. Excel, it is not possible to select two non adjacent ranges at a time.
6. Program Counter does not hold the address of next instruction to be executed.
7. An object program is created by  compiler ,from a sources program at run time.
8. Serial data transfer moves data faster then parallel data transfer.
9. You can embed sound, video clips and animations in t your Power Point presentation.
10. In Excel, by default, the numbers are left aligned and text values are right aligned.


TRUE/FALSE
1. F
2. F
3. T
4. T
5. F
6. F
7. F
8. F
9. T
10. F
 

Computer True False Question-

1. BIOS program is stored on the RAM.
2. ASCII Codes are 10 Bit binary codes.
3. Machine language is machine de4pendent while assembly languages are machine independent.
4. When you link an object, the actual data remains separate from the client data .
5. Excel, it is not possible to select two non adjacent ranges at a time.
6. Program Counter does not hold the address of next instruction to be executed.
7. An object program is created by  compiler ,from a sources program at run time.
8. Serial data transfer moves data faster then parallel data transfer.
9. You can embed sound, video clips and animations in t your Power Point presentation.
10. In Excel, by default, the numbers are left aligned and text values are right aligned.


TRUE/FALSE
1. F
2. F
3. T
4. T
5. F
6. F
7. F
8. F
9. T
10. F
 

Computer True False Question-

1. BIOS program is stored on the RAM.
2. ASCII Codes are 10 Bit binary codes.
3. Machine language is machine de4pendent while assembly languages are machine independent.
4. When you link an object, the actual data remains separate from the client data .
5. Excel, it is not possible to select two non adjacent ranges at a time.
6. Program Counter does not hold the address of next instruction to be executed.
7. An object program is created by  compiler ,from a sources program at run time.
8. Serial data transfer moves data faster then parallel data transfer.
9. You can embed sound, video clips and animations in t your Power Point presentation.
10. In Excel, by default, the numbers are left aligned and text values are right aligned.


TRUE/FALSE
1. F
2. F
3. T
4. T
5. F
6. F
7. F
8. F
9. T
10. F
 

COMPUTER TURE - FALSE -11

1. All modem Computer use the Binary number System. 

2. Analog computer is a mixture of Hybrid and digital Computer.

3. The EBCDIC is a 16 bit code.

4. Compilers are system software.

5. In WORD, search is case sensitive.

6. You can embed sound, video clips and animation into your power point presentation.

7. In EXCEL, a formula start with=.

8. In EXCEL, by default, the numbers are left aligned and text  values are right aligned.

9. Date and Time are internally stored as serial number in EXCEL.

10. Auto Correct can be used to correct common typing errors automatically as you work.


Answer:
1. T
2.F
3.F
4.T
5.F
6.T
7.T
8.F
9. T
10. T

COMPUTER TURE - FALSE -11

1. All modem Computer use the Binary number System. 

2. Analog computer is a mixture of Hybrid and digital Computer.

3. The EBCDIC is a 16 bit code.

4. Compilers are system software.

5. In WORD, search is case sensitive.

6. You can embed sound, video clips and animation into your power point presentation.

7. In EXCEL, a formula start with=.

8. In EXCEL, by default, the numbers are left aligned and text  values are right aligned.

9. Date and Time are internally stored as serial number in EXCEL.

10. Auto Correct can be used to correct common typing errors automatically as you work.


Answer:
1. T
2.F
3.F
4.T
5.F
6.T
7.T
8.F
9. T
10. T

COMPUTER TURE - FALSE -11

1. All modem Computer use the Binary number System. 

2. Analog computer is a mixture of Hybrid and digital Computer.

3. The EBCDIC is a 16 bit code.

4. Compilers are system software.

5. In WORD, search is case sensitive.

6. You can embed sound, video clips and animation into your power point presentation.

7. In EXCEL, a formula start with=.

8. In EXCEL, by default, the numbers are left aligned and text  values are right aligned.

9. Date and Time are internally stored as serial number in EXCEL.

10. Auto Correct can be used to correct common typing errors automatically as you work.


Answer:
1. T
2.F
3.F
4.T
5.F
6.T
7.T
8.F
9. T
10. T

COMPUTER TURE - FALSE -11

1. All modem Computer use the Binary number System. 

2. Analog computer is a mixture of Hybrid and digital Computer.

3. The EBCDIC is a 16 bit code.

4. Compilers are system software.

5. In WORD, search is case sensitive.

6. You can embed sound, video clips and animation into your power point presentation.

7. In EXCEL, a formula start with=.

8. In EXCEL, by default, the numbers are left aligned and text  values are right aligned.

9. Date and Time are internally stored as serial number in EXCEL.

10. Auto Correct can be used to correct common typing errors automatically as you work.


Answer:
1. T
2.F
3.F
4.T
5.F
6.T
7.T
8.F
9. T
10. T

COMPUTER TURE - FALSE -10

1. The hexadecimal representation for the binary number 100100101011 is 98B.

2. Sequential file organization of a disk file is particularly appropriate for files of low activity.

3. In a relational table, no two rows are identical.

4. The autoexec.bat file can tell the computer where to look first for executable files.

5. The background of any Word document is always white color.

6. In Power Point, when you use Save as Web Page, the presentation is turned into an animated gif image.

7. To add a chart to a slide, click on the Insert Chart button to get a blank.

8. Absolute cell reference always refers to the sane cell in spreadsheet.

9. Data modeling is the process of organizing data into tables to ensure that the database is always unambiguous.

10. Inject printer is an impact printer.


Answer:
1. T
2.T
3.T
4.T
5.T
6.F
7.T
8.T
9.F
10.F
 

COMPUTER TURE - FALSE -10

1. The hexadecimal representation for the binary number 100100101011 is 98B.

2. Sequential file organization of a disk file is particularly appropriate for files of low activity.

3. In a relational table, no two rows are identical.

4. The autoexec.bat file can tell the computer where to look first for executable files.

5. The background of any Word document is always white color.

6. In Power Point, when you use Save as Web Page, the presentation is turned into an animated gif image.

7. To add a chart to a slide, click on the Insert Chart button to get a blank.

8. Absolute cell reference always refers to the sane cell in spreadsheet.

9. Data modeling is the process of organizing data into tables to ensure that the database is always unambiguous.

10. Inject printer is an impact printer.


Answer:
1. T
2.T
3.T
4.T
5.T
6.F
7.T
8.T
9.F
10.F
 

COMPUTER TURE - FALSE -10

1. The hexadecimal representation for the binary number 100100101011 is 98B.

2. Sequential file organization of a disk file is particularly appropriate for files of low activity.

3. In a relational table, no two rows are identical.

4. The autoexec.bat file can tell the computer where to look first for executable files.

5. The background of any Word document is always white color.

6. In Power Point, when you use Save as Web Page, the presentation is turned into an animated gif image.

7. To add a chart to a slide, click on the Insert Chart button to get a blank.

8. Absolute cell reference always refers to the sane cell in spreadsheet.

9. Data modeling is the process of organizing data into tables to ensure that the database is always unambiguous.

10. Inject printer is an impact printer.


Answer:
1. T
2.T
3.T
4.T
5.T
6.F
7.T
8.T
9.F
10.F
 

COMPUTER TURE - FALSE -10

1. The hexadecimal representation for the binary number 100100101011 is 98B.

2. Sequential file organization of a disk file is particularly appropriate for files of low activity.

3. In a relational table, no two rows are identical.

4. The autoexec.bat file can tell the computer where to look first for executable files.

5. The background of any Word document is always white color.

6. In Power Point, when you use Save as Web Page, the presentation is turned into an animated gif image.

7. To add a chart to a slide, click on the Insert Chart button to get a blank.

8. Absolute cell reference always refers to the sane cell in spreadsheet.

9. Data modeling is the process of organizing data into tables to ensure that the database is always unambiguous.

10. Inject printer is an impact printer.


Answer:
1. T
2.T
3.T
4.T
5.T
6.F
7.T
8.T
9.F
10.F
 

COMPUTER TURE- FALSE - 9

1. The wrong choice of colors can make text difficult to read on a slide in power point.

2. A1 is an example of an absolute cell reference.

3. A serial port transmits data one bit at a time.

4. In UNIX, commands are case sensitive.

5. MS- Word does not allow the user to mix the graphical pictures with text.

6. The title bar displays the name of the currently active word document.

7. You can create a table in your document by using the insert option from the Table menu.

8. An operating system can be viewed as "resource allocator" to control various I/O devices and user programs.

9. In general, the data size for multimedia is much smaller than textual information.

10. Pie chart show the relationship of parts to a whole area whereas line charts are best for showing the amount of change in over time.


Answer:
1.T
2.F
3.T
4.T
5.F
6.T
7.T
8.T
9.F
10.T 

COMPUTER TURE- FALSE - 9

1. The wrong choice of colors can make text difficult to read on a slide in power point.

2. A1 is an example of an absolute cell reference.

3. A serial port transmits data one bit at a time.

4. In UNIX, commands are case sensitive.

5. MS- Word does not allow the user to mix the graphical pictures with text.

6. The title bar displays the name of the currently active word document.

7. You can create a table in your document by using the insert option from the Table menu.

8. An operating system can be viewed as "resource allocator" to control various I/O devices and user programs.

9. In general, the data size for multimedia is much smaller than textual information.

10. Pie chart show the relationship of parts to a whole area whereas line charts are best for showing the amount of change in over time.


Answer:
1.T
2.F
3.T
4.T
5.F
6.T
7.T
8.T
9.F
10.T 

COMPUTER TURE- FALSE - 9

1. The wrong choice of colors can make text difficult to read on a slide in power point.

2. A1 is an example of an absolute cell reference.

3. A serial port transmits data one bit at a time.

4. In UNIX, commands are case sensitive.

5. MS- Word does not allow the user to mix the graphical pictures with text.

6. The title bar displays the name of the currently active word document.

7. You can create a table in your document by using the insert option from the Table menu.

8. An operating system can be viewed as "resource allocator" to control various I/O devices and user programs.

9. In general, the data size for multimedia is much smaller than textual information.

10. Pie chart show the relationship of parts to a whole area whereas line charts are best for showing the amount of change in over time.


Answer:
1.T
2.F
3.T
4.T
5.F
6.T
7.T
8.T
9.F
10.T 

COMPUTER TURE- FALSE - 9

1. The wrong choice of colors can make text difficult to read on a slide in power point.

2. A1 is an example of an absolute cell reference.

3. A serial port transmits data one bit at a time.

4. In UNIX, commands are case sensitive.

5. MS- Word does not allow the user to mix the graphical pictures with text.

6. The title bar displays the name of the currently active word document.

7. You can create a table in your document by using the insert option from the Table menu.

8. An operating system can be viewed as "resource allocator" to control various I/O devices and user programs.

9. In general, the data size for multimedia is much smaller than textual information.

10. Pie chart show the relationship of parts to a whole area whereas line charts are best for showing the amount of change in over time.


Answer:
1.T
2.F
3.T
4.T
5.F
6.T
7.T
8.T
9.F
10.T 

COMPUTER TURE-FALSE-8

1. ROM is a volatile memory. 

2. Inkjet printer is an impact printer.

3. The machine language of all computers are idenrical.

4. The kernel performs the basic functions of a computer.

5. Linux is a multiuser, multitasking, time sharing operating system.

6. 'Even' and 'Odd' pages in MS - WORD can have different footers.

7. In MS - Word, multiple columns cannot be viewed in the page layout view.

8. Clearing cells in MS - Excel is different from cutting or copying entries.

9. You can view a template before choosing it.

10. MS- Window is an open source, GNU license operating system.



Answer:
1. F
2.F
3.T
4.T
5.T
6.T
7.F
8.T
9.T
10.F

COMPUTER TURE-FALSE-8

1. ROM is a volatile memory. 

2. Inkjet printer is an impact printer.

3. The machine language of all computers are idenrical.

4. The kernel performs the basic functions of a computer.

5. Linux is a multiuser, multitasking, time sharing operating system.

6. 'Even' and 'Odd' pages in MS - WORD can have different footers.

7. In MS - Word, multiple columns cannot be viewed in the page layout view.

8. Clearing cells in MS - Excel is different from cutting or copying entries.

9. You can view a template before choosing it.

10. MS- Window is an open source, GNU license operating system.



Answer:
1. F
2.F
3.T
4.T
5.T
6.T
7.F
8.T
9.T
10.F

COMPUTER TURE-FALSE-8

1. ROM is a volatile memory. 

2. Inkjet printer is an impact printer.

3. The machine language of all computers are idenrical.

4. The kernel performs the basic functions of a computer.

5. Linux is a multiuser, multitasking, time sharing operating system.

6. 'Even' and 'Odd' pages in MS - WORD can have different footers.

7. In MS - Word, multiple columns cannot be viewed in the page layout view.

8. Clearing cells in MS - Excel is different from cutting or copying entries.

9. You can view a template before choosing it.

10. MS- Window is an open source, GNU license operating system.



Answer:
1. F
2.F
3.T
4.T
5.T
6.T
7.F
8.T
9.T
10.F

COMPUTER TURE-FALSE-8

1. ROM is a volatile memory. 

2. Inkjet printer is an impact printer.

3. The machine language of all computers are idenrical.

4. The kernel performs the basic functions of a computer.

5. Linux is a multiuser, multitasking, time sharing operating system.

6. 'Even' and 'Odd' pages in MS - WORD can have different footers.

7. In MS - Word, multiple columns cannot be viewed in the page layout view.

8. Clearing cells in MS - Excel is different from cutting or copying entries.

9. You can view a template before choosing it.

10. MS- Window is an open source, GNU license operating system.



Answer:
1. F
2.F
3.T
4.T
5.T
6.T
7.F
8.T
9.T
10.F

COMPUTER TURE- FALSE-7

1. A 16-bit CPU can process 2 bytes at a time.

2. An electronic multiplexer can be considered as a multiple- input, single-output switch, and a de- multiplexer as a single- input, multiple- output switch.

3. An  EPROM is a type of computer memory chip and is non- volatile.

4. Hard disks can be divided into one or more logical disks called partitions. This division is described in the partition table found in sector 0 of the disk.

5. Audio - output devices can output only music.

6. Mnemonics are associated with machine language.

7. MEM and Cls are internal DOS commands.

8. You can add dates to worksheets, but spreadsheets cannot use dates in calculations.

9. Linux is a proprietary software.

10. The kernel is a program that constitutes the central core of a computer operating system.


Answer:
1 T
2T
3.T
4.T
5.F
6.F
7.T
8.F
9.F
10.T
  

COMPUTER TURE- FALSE-7

1. A 16-bit CPU can process 2 bytes at a time.

2. An electronic multiplexer can be considered as a multiple- input, single-output switch, and a de- multiplexer as a single- input, multiple- output switch.

3. An  EPROM is a type of computer memory chip and is non- volatile.

4. Hard disks can be divided into one or more logical disks called partitions. This division is described in the partition table found in sector 0 of the disk.

5. Audio - output devices can output only music.

6. Mnemonics are associated with machine language.

7. MEM and Cls are internal DOS commands.

8. You can add dates to worksheets, but spreadsheets cannot use dates in calculations.

9. Linux is a proprietary software.

10. The kernel is a program that constitutes the central core of a computer operating system.


Answer:
1 T
2T
3.T
4.T
5.F
6.F
7.T
8.F
9.F
10.T
  

COMPUTER TURE- FALSE-7

1. A 16-bit CPU can process 2 bytes at a time.

2. An electronic multiplexer can be considered as a multiple- input, single-output switch, and a de- multiplexer as a single- input, multiple- output switch.

3. An  EPROM is a type of computer memory chip and is non- volatile.

4. Hard disks can be divided into one or more logical disks called partitions. This division is described in the partition table found in sector 0 of the disk.

5. Audio - output devices can output only music.

6. Mnemonics are associated with machine language.

7. MEM and Cls are internal DOS commands.

8. You can add dates to worksheets, but spreadsheets cannot use dates in calculations.

9. Linux is a proprietary software.

10. The kernel is a program that constitutes the central core of a computer operating system.


Answer:
1 T
2T
3.T
4.T
5.F
6.F
7.T
8.F
9.F
10.T
  

COMPUTER TURE- FALSE-7

1. A 16-bit CPU can process 2 bytes at a time.

2. An electronic multiplexer can be considered as a multiple- input, single-output switch, and a de- multiplexer as a single- input, multiple- output switch.

3. An  EPROM is a type of computer memory chip and is non- volatile.

4. Hard disks can be divided into one or more logical disks called partitions. This division is described in the partition table found in sector 0 of the disk.

5. Audio - output devices can output only music.

6. Mnemonics are associated with machine language.

7. MEM and Cls are internal DOS commands.

8. You can add dates to worksheets, but spreadsheets cannot use dates in calculations.

9. Linux is a proprietary software.

10. The kernel is a program that constitutes the central core of a computer operating system.


Answer:
1 T
2T
3.T
4.T
5.F
6.F
7.T
8.F
9.F
10.T
  

COMPUTER TURE- FALSE-6

1. Motherboard is the main circuit board in the computer where memory, CPU and other components are plugged in.

2. Cache memory makes memory transfer rates higher and thus raise the speed of the processor.

3. The laser printer uses a technology called thermal process.

4. You can protect scenario so other users cannot change or modify it.

5. Without a mouse one cannot work with MS- WINDOWS.

6. Folders organize files on a disk.

7. In Linux error messages are placed in a standard byte stream called the standard error.

8. In DOS system FATs are stored before boot sector.

9. # REF! error in MS-Excel occurs when the formula refers to an invalie cell.

10. MICR stands for Magnetic Ink Course Reader. 


Answer:
1.T
2.T
3.F
4.T
5.F
6.T
7.T
8.F
9.T
10.F

COMPUTER TURE- FALSE-6

1. Motherboard is the main circuit board in the computer where memory, CPU and other components are plugged in.

2. Cache memory makes memory transfer rates higher and thus raise the speed of the processor.

3. The laser printer uses a technology called thermal process.

4. You can protect scenario so other users cannot change or modify it.

5. Without a mouse one cannot work with MS- WINDOWS.

6. Folders organize files on a disk.

7. In Linux error messages are placed in a standard byte stream called the standard error.

8. In DOS system FATs are stored before boot sector.

9. # REF! error in MS-Excel occurs when the formula refers to an invalie cell.

10. MICR stands for Magnetic Ink Course Reader. 


Answer:
1.T
2.T
3.F
4.T
5.F
6.T
7.T
8.F
9.T
10.F

COMPUTER TURE- FALSE-6

1. Motherboard is the main circuit board in the computer where memory, CPU and other components are plugged in.

2. Cache memory makes memory transfer rates higher and thus raise the speed of the processor.

3. The laser printer uses a technology called thermal process.

4. You can protect scenario so other users cannot change or modify it.

5. Without a mouse one cannot work with MS- WINDOWS.

6. Folders organize files on a disk.

7. In Linux error messages are placed in a standard byte stream called the standard error.

8. In DOS system FATs are stored before boot sector.

9. # REF! error in MS-Excel occurs when the formula refers to an invalie cell.

10. MICR stands for Magnetic Ink Course Reader. 


Answer:
1.T
2.T
3.F
4.T
5.F
6.T
7.T
8.F
9.T
10.F

COMPUTER TURE- FALSE-6

1. Motherboard is the main circuit board in the computer where memory, CPU and other components are plugged in.

2. Cache memory makes memory transfer rates higher and thus raise the speed of the processor.

3. The laser printer uses a technology called thermal process.

4. You can protect scenario so other users cannot change or modify it.

5. Without a mouse one cannot work with MS- WINDOWS.

6. Folders organize files on a disk.

7. In Linux error messages are placed in a standard byte stream called the standard error.

8. In DOS system FATs are stored before boot sector.

9. # REF! error in MS-Excel occurs when the formula refers to an invalie cell.

10. MICR stands for Magnetic Ink Course Reader. 


Answer:
1.T
2.T
3.F
4.T
5.F
6.T
7.T
8.F
9.T
10.F

COMPUTER TURE-FALSE -5 COMPUTER TURE- FALSE-5

1. If the text entered in a cell does not fit, Excel will display # # # # # to indicate that the text is too long.

2. A mouse is a pointing device.

3. An example of an input device is a printer.

4. microsoft office word is an application program.

5. When you download files you send files from your computer to the Intenet.

6. A bit is bigger than a byte.

7. An inkjet printer hammers rows of pins against paper to produce words or pictures.

8. You can add dates to worksheets, but spreadsheets cannot use dates in calculations.

9. In a spreadsheet, ordinary text id called a "label"

10. Presentation programs create notes for each slide, which are visible only to the presenter.



Answer:
1. F
2.T
3.F
4.T
5.F
6.F
7.F
8.F
9.F
10.F

COMPUTER TURE-FALSE -5 COMPUTER TURE- FALSE-5

1. If the text entered in a cell does not fit, Excel will display # # # # # to indicate that the text is too long.

2. A mouse is a pointing device.

3. An example of an input device is a printer.

4. microsoft office word is an application program.

5. When you download files you send files from your computer to the Intenet.

6. A bit is bigger than a byte.

7. An inkjet printer hammers rows of pins against paper to produce words or pictures.

8. You can add dates to worksheets, but spreadsheets cannot use dates in calculations.

9. In a spreadsheet, ordinary text id called a "label"

10. Presentation programs create notes for each slide, which are visible only to the presenter.



Answer:
1. F
2.T
3.F
4.T
5.F
6.F
7.F
8.F
9.F
10.F

COMPUTER TURE-FALSE -5 COMPUTER TURE- FALSE-5

1. If the text entered in a cell does not fit, Excel will display # # # # # to indicate that the text is too long.

2. A mouse is a pointing device.

3. An example of an input device is a printer.

4. microsoft office word is an application program.

5. When you download files you send files from your computer to the Intenet.

6. A bit is bigger than a byte.

7. An inkjet printer hammers rows of pins against paper to produce words or pictures.

8. You can add dates to worksheets, but spreadsheets cannot use dates in calculations.

9. In a spreadsheet, ordinary text id called a "label"

10. Presentation programs create notes for each slide, which are visible only to the presenter.



Answer:
1. F
2.T
3.F
4.T
5.F
6.F
7.F
8.F
9.F
10.F

COMPUTER TURE-FALSE -5 COMPUTER TURE- FALSE-5

1. If the text entered in a cell does not fit, Excel will display # # # # # to indicate that the text is too long.

2. A mouse is a pointing device.

3. An example of an input device is a printer.

4. microsoft office word is an application program.

5. When you download files you send files from your computer to the Intenet.

6. A bit is bigger than a byte.

7. An inkjet printer hammers rows of pins against paper to produce words or pictures.

8. You can add dates to worksheets, but spreadsheets cannot use dates in calculations.

9. In a spreadsheet, ordinary text id called a "label"

10. Presentation programs create notes for each slide, which are visible only to the presenter.



Answer:
1. F
2.T
3.F
4.T
5.F
6.F
7.F
8.F
9.F
10.F

COMPUTER STATEMENT TRUE-FALSE-4

1. A storage device is a hardware component that writes data to and reads data from a storage medium. 

2. In a binary representation, we used digits 1 and 2.

3. ROM, which stands for read only memory and is also known as firmware, cannot be written on or erased by the computer user.

4. High end laser printers offer resolutions as high as 300 dpi.

5. One of the operating system's function is to manage the way information is stored on and retrieved from disks.

6. The default file extension for all word documents os .doc

7. In order to create columnar data in Word you need to set tabs or use the table menu.

8. A1 is an example of an absolute cellreference.

9. The wrong choice of colors can make text difficult to read on a slide in Power Point.

10. A presentation usually includes a single slide.


Answer:
1. T
2.F
3. T
4.T
5.T
6.T
7.T
8.F
9.T
10.F  

COMPUTER STATEMENT TRUE-FALSE-4

1. A storage device is a hardware component that writes data to and reads data from a storage medium. 

2. In a binary representation, we used digits 1 and 2.

3. ROM, which stands for read only memory and is also known as firmware, cannot be written on or erased by the computer user.

4. High end laser printers offer resolutions as high as 300 dpi.

5. One of the operating system's function is to manage the way information is stored on and retrieved from disks.

6. The default file extension for all word documents os .doc

7. In order to create columnar data in Word you need to set tabs or use the table menu.

8. A1 is an example of an absolute cellreference.

9. The wrong choice of colors can make text difficult to read on a slide in Power Point.

10. A presentation usually includes a single slide.


Answer:
1. T
2.F
3. T
4.T
5.T
6.T
7.T
8.F
9.T
10.F  

COMPUTER STATEMENT TRUE-FALSE-4

1. A storage device is a hardware component that writes data to and reads data from a storage medium. 

2. In a binary representation, we used digits 1 and 2.

3. ROM, which stands for read only memory and is also known as firmware, cannot be written on or erased by the computer user.

4. High end laser printers offer resolutions as high as 300 dpi.

5. One of the operating system's function is to manage the way information is stored on and retrieved from disks.

6. The default file extension for all word documents os .doc

7. In order to create columnar data in Word you need to set tabs or use the table menu.

8. A1 is an example of an absolute cellreference.

9. The wrong choice of colors can make text difficult to read on a slide in Power Point.

10. A presentation usually includes a single slide.


Answer:
1. T
2.F
3. T
4.T
5.T
6.T
7.T
8.F
9.T
10.F  

COMPUTER STATEMENT TRUE-FALSE-4

1. A storage device is a hardware component that writes data to and reads data from a storage medium. 

2. In a binary representation, we used digits 1 and 2.

3. ROM, which stands for read only memory and is also known as firmware, cannot be written on or erased by the computer user.

4. High end laser printers offer resolutions as high as 300 dpi.

5. One of the operating system's function is to manage the way information is stored on and retrieved from disks.

6. The default file extension for all word documents os .doc

7. In order to create columnar data in Word you need to set tabs or use the table menu.

8. A1 is an example of an absolute cellreference.

9. The wrong choice of colors can make text difficult to read on a slide in Power Point.

10. A presentation usually includes a single slide.


Answer:
1. T
2.F
3. T
4.T
5.T
6.T
7.T
8.F
9.T
10.F  

Monday 8 October 2012

COMPUTER TURE- FALSE 3

1. To be computer literate, you must be able to write computer programs.

2. The computerized processing of data can only be applied to the field of business.

3. The ASCII computer code is primarily used in the preparation of punched paper tapes and has little value with terminal devices.
 
4. The binary system, the place value of a digit increases or decreases by power of 

5. The word 'bit' is contraction of the word ' binare digits' 

6. The primary function of I/O peripherals is to facilitate computer to computer - to computer data.

7. The file protection ring is am important part of the lable-checking operation to protect tape files.

8. Dot matrix printer technology is available in serial and line printers.

9. The octal number system hasa base of 8using number from 1to8.

10 The standard toolbar has buttons for the most common tasks you perform in Power Point, such as saving, printing, or spell checking a presentation.


Answer:
1. F
2. T
3. F
4. T
5. T
6. F
7. T
8. F
9. F
10 . T

COMPUTER TURE- FALSE 3

1. To be computer literate, you must be able to write computer programs.

2. The computerized processing of data can only be applied to the field of business.

3. The ASCII computer code is primarily used in the preparation of punched paper tapes and has little value with terminal devices.
 
4. The binary system, the place value of a digit increases or decreases by power of 

5. The word 'bit' is contraction of the word ' binare digits' 

6. The primary function of I/O peripherals is to facilitate computer to computer - to computer data.

7. The file protection ring is am important part of the lable-checking operation to protect tape files.

8. Dot matrix printer technology is available in serial and line printers.

9. The octal number system hasa base of 8using number from 1to8.

10 The standard toolbar has buttons for the most common tasks you perform in Power Point, such as saving, printing, or spell checking a presentation.


Answer:
1. F
2. T
3. F
4. T
5. T
6. F
7. T
8. F
9. F
10 . T

COMPUTER TURE- FALSE 3

1. To be computer literate, you must be able to write computer programs.

2. The computerized processing of data can only be applied to the field of business.

3. The ASCII computer code is primarily used in the preparation of punched paper tapes and has little value with terminal devices.
 
4. The binary system, the place value of a digit increases or decreases by power of 

5. The word 'bit' is contraction of the word ' binare digits' 

6. The primary function of I/O peripherals is to facilitate computer to computer - to computer data.

7. The file protection ring is am important part of the lable-checking operation to protect tape files.

8. Dot matrix printer technology is available in serial and line printers.

9. The octal number system hasa base of 8using number from 1to8.

10 The standard toolbar has buttons for the most common tasks you perform in Power Point, such as saving, printing, or spell checking a presentation.


Answer:
1. F
2. T
3. F
4. T
5. T
6. F
7. T
8. F
9. F
10 . T

COMPUTER TURE- FALSE 3

1. To be computer literate, you must be able to write computer programs.

2. The computerized processing of data can only be applied to the field of business.

3. The ASCII computer code is primarily used in the preparation of punched paper tapes and has little value with terminal devices.
 
4. The binary system, the place value of a digit increases or decreases by power of 

5. The word 'bit' is contraction of the word ' binare digits' 

6. The primary function of I/O peripherals is to facilitate computer to computer - to computer data.

7. The file protection ring is am important part of the lable-checking operation to protect tape files.

8. Dot matrix printer technology is available in serial and line printers.

9. The octal number system hasa base of 8using number from 1to8.

10 The standard toolbar has buttons for the most common tasks you perform in Power Point, such as saving, printing, or spell checking a presentation.


Answer:
1. F
2. T
3. F
4. T
5. T
6. F
7. T
8. F
9. F
10 . T

COMPUTER TURE- FALSE.2

1. The translator that is used to translate a high-level language into a machine language is system software and is called as the compiler.

2. A word processor package may have the facility for checking the spelling of words in a document.

3. Word dose not present a new blank document when you start the program but you need to click the New Blank Document button at the far-left end of the standard toolbar or press Ctrl+N.
 
4 . A real time system is used when there are rigid time requirements on the operation of a processor or the flow of data, and thus is often used as a control device in a dedicated application.

5. Many a times the operating system does not act as a Resource Manager but only as Device Manager.

6. A formula is always to be proceeded by specific operator like+ or-

7. Function keys are programmable keys.

8. The operating system provides the interface that a software application program needs to communicate with the PC.

9. A mini diskette is more rugged then a micro floppy diskette.

10. TCP allows several concurrent logins to the sane host.



Answer:
1.T
2. T
3. F
4. T
5. F
6. F
7. T
8. T
9. F
10 . T

COMPUTER TURE- FALSE.2

1. The translator that is used to translate a high-level language into a machine language is system software and is called as the compiler.

2. A word processor package may have the facility for checking the spelling of words in a document.

3. Word dose not present a new blank document when you start the program but you need to click the New Blank Document button at the far-left end of the standard toolbar or press Ctrl+N.
 
4 . A real time system is used when there are rigid time requirements on the operation of a processor or the flow of data, and thus is often used as a control device in a dedicated application.

5. Many a times the operating system does not act as a Resource Manager but only as Device Manager.

6. A formula is always to be proceeded by specific operator like+ or-

7. Function keys are programmable keys.

8. The operating system provides the interface that a software application program needs to communicate with the PC.

9. A mini diskette is more rugged then a micro floppy diskette.

10. TCP allows several concurrent logins to the sane host.



Answer:
1.T
2. T
3. F
4. T
5. F
6. F
7. T
8. T
9. F
10 . T

COMPUTER TURE- FALSE.2

1. The translator that is used to translate a high-level language into a machine language is system software and is called as the compiler.

2. A word processor package may have the facility for checking the spelling of words in a document.

3. Word dose not present a new blank document when you start the program but you need to click the New Blank Document button at the far-left end of the standard toolbar or press Ctrl+N.
 
4 . A real time system is used when there are rigid time requirements on the operation of a processor or the flow of data, and thus is often used as a control device in a dedicated application.

5. Many a times the operating system does not act as a Resource Manager but only as Device Manager.

6. A formula is always to be proceeded by specific operator like+ or-

7. Function keys are programmable keys.

8. The operating system provides the interface that a software application program needs to communicate with the PC.

9. A mini diskette is more rugged then a micro floppy diskette.

10. TCP allows several concurrent logins to the sane host.



Answer:
1.T
2. T
3. F
4. T
5. F
6. F
7. T
8. T
9. F
10 . T

COMPUTER TURE- FALSE.2

1. The translator that is used to translate a high-level language into a machine language is system software and is called as the compiler.

2. A word processor package may have the facility for checking the spelling of words in a document.

3. Word dose not present a new blank document when you start the program but you need to click the New Blank Document button at the far-left end of the standard toolbar or press Ctrl+N.
 
4 . A real time system is used when there are rigid time requirements on the operation of a processor or the flow of data, and thus is often used as a control device in a dedicated application.

5. Many a times the operating system does not act as a Resource Manager but only as Device Manager.

6. A formula is always to be proceeded by specific operator like+ or-

7. Function keys are programmable keys.

8. The operating system provides the interface that a software application program needs to communicate with the PC.

9. A mini diskette is more rugged then a micro floppy diskette.

10. TCP allows several concurrent logins to the sane host.



Answer:
1.T
2. T
3. F
4. T
5. F
6. F
7. T
8. T
9. F
10 . T

COMPUTER TRUE-FALSE -1

1. Mail memory is a software component.
2. A computer's CD-ROM drive can read data disks, but it cannot play audio CDs.
3. The first successful GUI appeared on the Macintosh computer in 1984.
4. A utility program can be used to improve the function of an operating system in some way.
5. During the formatting process,a disk's surface is divided into sectors, which are then further divided into rings, called tracks.
6. Bold,italics and bold italics are available for all fonts.
7. All sections in a document necessarily use the same margins.
8. You can add dates to worksheets, but spreadsheets cannot use dates in calculations.
9. In a spreadsheet, ordinary text is called a"label."
10. Presentation programs let you create notes for each slide, which are visible only to you.



Answer:
1. F
2. F
3. T
4. T
5. F
6. F
7. F
8. F
9. F
10 . T

COMPUTER TRUE-FALSE -1

1. Mail memory is a software component.
2. A computer's CD-ROM drive can read data disks, but it cannot play audio CDs.
3. The first successful GUI appeared on the Macintosh computer in 1984.
4. A utility program can be used to improve the function of an operating system in some way.
5. During the formatting process,a disk's surface is divided into sectors, which are then further divided into rings, called tracks.
6. Bold,italics and bold italics are available for all fonts.
7. All sections in a document necessarily use the same margins.
8. You can add dates to worksheets, but spreadsheets cannot use dates in calculations.
9. In a spreadsheet, ordinary text is called a"label."
10. Presentation programs let you create notes for each slide, which are visible only to you.



Answer:
1. F
2. F
3. T
4. T
5. F
6. F
7. F
8. F
9. F
10 . T

COMPUTER TRUE-FALSE -1

1. Mail memory is a software component.
2. A computer's CD-ROM drive can read data disks, but it cannot play audio CDs.
3. The first successful GUI appeared on the Macintosh computer in 1984.
4. A utility program can be used to improve the function of an operating system in some way.
5. During the formatting process,a disk's surface is divided into sectors, which are then further divided into rings, called tracks.
6. Bold,italics and bold italics are available for all fonts.
7. All sections in a document necessarily use the same margins.
8. You can add dates to worksheets, but spreadsheets cannot use dates in calculations.
9. In a spreadsheet, ordinary text is called a"label."
10. Presentation programs let you create notes for each slide, which are visible only to you.



Answer:
1. F
2. F
3. T
4. T
5. F
6. F
7. F
8. F
9. F
10 . T

COMPUTER TRUE-FALSE -1

1. Mail memory is a software component.
2. A computer's CD-ROM drive can read data disks, but it cannot play audio CDs.
3. The first successful GUI appeared on the Macintosh computer in 1984.
4. A utility program can be used to improve the function of an operating system in some way.
5. During the formatting process,a disk's surface is divided into sectors, which are then further divided into rings, called tracks.
6. Bold,italics and bold italics are available for all fonts.
7. All sections in a document necessarily use the same margins.
8. You can add dates to worksheets, but spreadsheets cannot use dates in calculations.
9. In a spreadsheet, ordinary text is called a"label."
10. Presentation programs let you create notes for each slide, which are visible only to you.



Answer:
1. F
2. F
3. T
4. T
5. F
6. F
7. F
8. F
9. F
10 . T

COMPUTER OBJECTIVE QUESTION - 13

1. Multiprocessing means
A. Simultaneous processing with two or more process
B. Simultaneous running of two or more programs
C. Running of two or more process
D. None of the above
Answer:
2.Virtual memory is 
A. part of main memory only used for swapping
B. A technique to allow a program, of size more than the size of main memory, to run.
C. Part of secondary storage used in program execution
D. None of the above
Answer:
3. Data Bus is used in
A. Parallel Data Transfer
B. Serial Data Transfer
C. Computers using analog signals
D. None of the above
Answer:
4. Software used by the computer hardware to interact with the user is 
A. System Software
B. Compiler
C. Interpretator
D  . Application Software
Answer:
5. The DOS command to retrieve the properties of a file is
A. FORMAT
B. DOSKEY
C. ATTRIB
D. DIR
Answer:
6 An impact printer uses 
A. Ink jet technology
B. Thermal technology
C. Electro-Mechanical mechanism
D. None of the above
Answer:
7. Mark the most appropriate statement
A. Mail Marge can be used to print the form letters
B. Mail Marge cam be used to print the form letters and mailing labels
C. Mail Marge can be used to print envelopes
D . All of the above
Answer:
8. The following is not a image file format
A. .gif
B. .bmp
C. .cde
D . .tiff
Answer:
9. The function ROUND(1343.45,-2) returns
A. 1343
B. -1343
C. -1300
D . 1300
Answer:
10. Virus survives by capturing
A. Executable programs
B. Interrupts
C. COM programs 
D. None of the above
Answer:


Answer:
1. A
2. B,C
3. A
4. A
5. C
6. C
7. D
8. C
9. D
10 . A
 

COMPUTER OBJECTIVE QUESTION - 13

1. Multiprocessing means
A. Simultaneous processing with two or more process
B. Simultaneous running of two or more programs
C. Running of two or more process
D. None of the above
Answer:
2.Virtual memory is 
A. part of main memory only used for swapping
B. A technique to allow a program, of size more than the size of main memory, to run.
C. Part of secondary storage used in program execution
D. None of the above
Answer:
3. Data Bus is used in
A. Parallel Data Transfer
B. Serial Data Transfer
C. Computers using analog signals
D. None of the above
Answer:
4. Software used by the computer hardware to interact with the user is 
A. System Software
B. Compiler
C. Interpretator
D  . Application Software
Answer:
5. The DOS command to retrieve the properties of a file is
A. FORMAT
B. DOSKEY
C. ATTRIB
D. DIR
Answer:
6 An impact printer uses 
A. Ink jet technology
B. Thermal technology
C. Electro-Mechanical mechanism
D. None of the above
Answer:
7. Mark the most appropriate statement
A. Mail Marge can be used to print the form letters
B. Mail Marge cam be used to print the form letters and mailing labels
C. Mail Marge can be used to print envelopes
D . All of the above
Answer:
8. The following is not a image file format
A. .gif
B. .bmp
C. .cde
D . .tiff
Answer:
9. The function ROUND(1343.45,-2) returns
A. 1343
B. -1343
C. -1300
D . 1300
Answer:
10. Virus survives by capturing
A. Executable programs
B. Interrupts
C. COM programs 
D. None of the above
Answer:


Answer:
1. A
2. B,C
3. A
4. A
5. C
6. C
7. D
8. C
9. D
10 . A
 

COMPUTER OBJECTIVE QUESTION - 13

1. Multiprocessing means
A. Simultaneous processing with two or more process
B. Simultaneous running of two or more programs
C. Running of two or more process
D. None of the above
Answer:
2.Virtual memory is 
A. part of main memory only used for swapping
B. A technique to allow a program, of size more than the size of main memory, to run.
C. Part of secondary storage used in program execution
D. None of the above
Answer:
3. Data Bus is used in
A. Parallel Data Transfer
B. Serial Data Transfer
C. Computers using analog signals
D. None of the above
Answer:
4. Software used by the computer hardware to interact with the user is 
A. System Software
B. Compiler
C. Interpretator
D  . Application Software
Answer:
5. The DOS command to retrieve the properties of a file is
A. FORMAT
B. DOSKEY
C. ATTRIB
D. DIR
Answer:
6 An impact printer uses 
A. Ink jet technology
B. Thermal technology
C. Electro-Mechanical mechanism
D. None of the above
Answer:
7. Mark the most appropriate statement
A. Mail Marge can be used to print the form letters
B. Mail Marge cam be used to print the form letters and mailing labels
C. Mail Marge can be used to print envelopes
D . All of the above
Answer:
8. The following is not a image file format
A. .gif
B. .bmp
C. .cde
D . .tiff
Answer:
9. The function ROUND(1343.45,-2) returns
A. 1343
B. -1343
C. -1300
D . 1300
Answer:
10. Virus survives by capturing
A. Executable programs
B. Interrupts
C. COM programs 
D. None of the above
Answer:


Answer:
1. A
2. B,C
3. A
4. A
5. C
6. C
7. D
8. C
9. D
10 . A
 

COMPUTER OBJECTIVE QUESTION - 13

1. Multiprocessing means
A. Simultaneous processing with two or more process
B. Simultaneous running of two or more programs
C. Running of two or more process
D. None of the above
Answer:
2.Virtual memory is 
A. part of main memory only used for swapping
B. A technique to allow a program, of size more than the size of main memory, to run.
C. Part of secondary storage used in program execution
D. None of the above
Answer:
3. Data Bus is used in
A. Parallel Data Transfer
B. Serial Data Transfer
C. Computers using analog signals
D. None of the above
Answer:
4. Software used by the computer hardware to interact with the user is 
A. System Software
B. Compiler
C. Interpretator
D  . Application Software
Answer:
5. The DOS command to retrieve the properties of a file is
A. FORMAT
B. DOSKEY
C. ATTRIB
D. DIR
Answer:
6 An impact printer uses 
A. Ink jet technology
B. Thermal technology
C. Electro-Mechanical mechanism
D. None of the above
Answer:
7. Mark the most appropriate statement
A. Mail Marge can be used to print the form letters
B. Mail Marge cam be used to print the form letters and mailing labels
C. Mail Marge can be used to print envelopes
D . All of the above
Answer:
8. The following is not a image file format
A. .gif
B. .bmp
C. .cde
D . .tiff
Answer:
9. The function ROUND(1343.45,-2) returns
A. 1343
B. -1343
C. -1300
D . 1300
Answer:
10. Virus survives by capturing
A. Executable programs
B. Interrupts
C. COM programs 
D. None of the above
Answer:


Answer:
1. A
2. B,C
3. A
4. A
5. C
6. C
7. D
8. C
9. D
10 . A