1. When your computer stops working suddenly, it is referred to as a
1) crash
2) die
3) death
4) penalty
5) None of these
2. A program that converts a high-level language
source file into a machine-language file is called a
1) translator
2) assembler
3) compiler
4) linker
5) None of these
1) translator
2) assembler
3) compiler
4) linker
5) None of these
3. Which keys can be used together
with other keys for special tasks?
1) Insert, Delete
2) Ctrl, Shift
3) Left Arrow, Right Arrow
4) Page Up, Page Down
5) None of these
1) Insert, Delete
2) Ctrl, Shift
3) Left Arrow, Right Arrow
4) Page Up, Page Down
5) None of these
4. The ________ button on the Quick
Access Toolbar allows you to cancel your recent commands or actions.
1) Search
2) Cut
3) Document
4) Undo
5) None of these
1) Search
2) Cut
3) Document
4) Undo
5) None of these
5. In MS Access, a table can have
________ primary key/keys.
1) one
2) two
3) three
4) four
5) None of these
1) one
2) two
3) three
4) four
5) None of these
6. A DVD-RAM is similar to a
____________ except it has storage capacities up to 5.2 GB,
1) CD-R
2) Floppy disk
3) CD-RW
4) Hard Disk
5) None of these
1) CD-R
2) Floppy disk
3) CD-RW
4) Hard Disk
5) None of these
7. A proxy server is used for which of
the following?
1) To provide security against unauthorised users
2) To process client requests for web pages.
3) To process client requests for database access
4) To provide TCP/IP
5) None of these
1) To provide security against unauthorised users
2) To process client requests for web pages.
3) To process client requests for database access
4) To provide TCP/IP
5) None of these
8. A file extension is separated from
the main file name with a(n) ________, but no spaces.
1) question mark
2) exclamation mark
3) underscore
4) dot
5) None of these
1) question mark
2) exclamation mark
3) underscore
4) dot
5) None of these
9. What is an email attachment?
1) A receipt sent by the recipient.
2) A separate document from another program sent along with an email message.
3) A malicious parasite that feeds off your messages and destroys the contents.
4) A list of CC or BCC recipients.
5) None of these
1) A receipt sent by the recipient.
2) A separate document from another program sent along with an email message.
3) A malicious parasite that feeds off your messages and destroys the contents.
4) A list of CC or BCC recipients.
5) None of these
10. SMTP, FTP and DNS are applications
of the _________ layer.
1) Data Link
2) Network
3) Transport
4) Application
5) None of these
1) Data Link
2) Network
3) Transport
4) Application
5) None of these
No comments:
Post a Comment