Sunteți pe pagina 1din 120

Multiple Choice Questions, COPA - Semester-1

Dr.V.Nagaradjane

December 27, 2017


ii Prepared by: Dr.V.Nagaradjane
Contents

1 Semester 1 1
1.1 Basic hardware and software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.1 History of computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.2 Types of computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.3 Advantages of computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1.4 Application of computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1.5 Concept of hardware and software . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1.6 Computer hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1.7 Output devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.1.8 Central Processing Unit (CPU) . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.1.9 Computer software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.2 Computer Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
1.2.1 Booting error signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
1.2.2 BIOS settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
1.2.3 Installation of windows operating system . . . . . . . . . . . . . . . . . . . . . . 26
1.2.4 Common computer problems and solutions . . . . . . . . . . . . . . . . . . . . . 26
1.3 MS DOS and Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.3.1 MS DOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.3.2 Internal DOS commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.3.3 External DOS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
1.3.4 Output redirection in MS DOS . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
1.3.5 Wild cards in MS DOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
1.3.6 Open Source Software (OSS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
1.3.7 Linux shell commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
1.3.8 Special characters in Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
1.4 MS Word . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
1.4.1 Introduction to various application in MS Office . . . . . . . . . . . . . . . . . . 39
1.4.2 Features of MS Word . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
1.4.3 Office button in MS Word . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
1.4.4 Menus and toolbars in MS Word . . . . . . . . . . . . . . . . . . . . . . . . . . 40
1.4.5 Creating & saving a document in MS Word . . . . . . . . . . . . . . . . . . . . . 49
1.4.6 Inserting objects in MS Word . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
1.4.7 Inserting Macros in MS Word . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
1.4.8 Creating mail merge in MS Word . . . . . . . . . . . . . . . . . . . . . . . . . . 52
1.4.9 Creating templates in MS Word . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
1.4.10 Page setup & printing in MS Word . . . . . . . . . . . . . . . . . . . . . . . . . 53
1.5 MS Excel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
1.5.1 Data types in MS Excel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
1.5.2 Cell referencing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
1.5.3 Categories of functions in MS Excel . . . . . . . . . . . . . . . . . . . . . . . . . 57
1.5.4 Sorting in MS Excel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
1.5.5 Filtering in MS Excel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

iii
iv Prepared by: Dr.V.Nagaradjane

1.5.6 Validation in MS Excel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65


1.5.7 Charting in MS Excel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
1.5.8 Data tables in MS Excel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
1.5.9 Pivot table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
1.5.10 Goal seek in MS Excel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
1.5.11 Scenarios in MS Excel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
1.6 Powerpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
1.6.1 Introduction to PowerPoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
1.6.2 Advantages of Powerpoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
1.6.3 Creating Slide Shows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
1.6.4 Fine tuning the presentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
1.6.5 Good presentation techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
1.7 OpenOffice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
1.7.1 Introduction to Open Office . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
1.7.2 Image properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
1.7.3 Image types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
1.7.4 Editing of images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
1.8 Database Management Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
1.8.1 Data, Information and Database . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
1.8.2 Overview of popular databases systems . . . . . . . . . . . . . . . . . . . . . . . 77
1.8.3 Rules for designing good tables . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
1.8.4 Integrity rules and constraints in a table . . . . . . . . . . . . . . . . . . . . . . . 81
1.8.5 Relationships in tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
1.8.6 Introduction to various types of Queries and their uses . . . . . . . . . . . . . . . 82
1.8.7 Designing Access Reports and Forms . . . . . . . . . . . . . . . . . . . . . . . . 83
1.8.8 Macros in MS Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
1.9 Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
1.9.1 Computer Networks, Necessity and Advantages . . . . . . . . . . . . . . . . . . . 86
1.9.2 Client Server and peer to Peer networking concepts . . . . . . . . . . . . . . . . 86
1.9.3 Concept of Proxy Server and proxy firewall server . . . . . . . . . . . . . . . . . . 87
1.9.4 Network topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
1.9.5 Network components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
1.9.6 Network Cables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
1.9.7 Wireless networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
1.9.8 Bluetooth technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
1.9.9 OSI 7 Layer Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
1.9.10 Various Network protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
1.9.11 Logical and Physical Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
1.9.12 Classes of Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
1.9.13 Network Security & Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
1.9.14 DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
1.9.15 Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
1.9.16 Introduction to the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
1.9.17 Introduction to WWW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
1.9.18 Web Browsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
1.9.19 Internet servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
1.9.20 Search engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
1.9.21 Domain naming Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
1.9.22 E-mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
1.9.23 Video chatting tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
1.9.24 VOIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
1.9.25 Social Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
CONTENTS v

1.9.26 Cloud storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100


1.9.27 Internet Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
1.10 Web Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
1.10.1 Web server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
1.10.2 Static and Dynamic Web pages . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
1.10.3 Introduction to HTML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
1.10.4 Various tags in HTML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
1.10.5 Creating Forms with controls using HTML . . . . . . . . . . . . . . . . . . . . . 109
1.10.6 Concepts of CSS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
1.10.7 Applying CSS to HTML . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
1.10.8 Open source CMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
1.10.9 Web authoring tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

Prepared by: Dr.V.Nagaradjane


vi Prepared by: Dr.V.Nagaradjane
Chapter 1

Semester 1

1.1 Basic hardware and soft- (a) punched card (b) DVD
(c) hard disk (d) floppy disk
ware
8. Difference engine provided its output
1.1.1 History of computers through .
(a) printer
1. Logarithm was invented by . (b) curve plotter
(a) John Napier (c) card punching machine/ bell
(b) Edmund Gunter (d) all of them
(c) Blaise Pascal 9. The computer which worked on contin-
(d) Charles Babbage uously changing quantities (like electric-
2. Mechanical calculator was invented by ity, water flow, etc.) for input were
. called .
(a) John Napier (a) ENIAC
(b) Edmund Gunter (b) logarithm
(c) Blaise Pascal (c) analog computer
(d) Charles Babbage (d) mainframe computer
3. Slide rule was invented by . 10. Analog computer was invented by
(a) John Napier .
(a) John Napier
(b) Edmund Gunter
(b) Sir William Thomson
(c) Blaise Pascal
(c) Blaise Pascal
(d) Charles Babbage
(d) Charles Babbage
4. First general purpose computer was in-
11. Computers like Colossus, were used for
vented by .
(a) John Napier German military communica-
(b) Edmund Gunter tion during World War II.
(a) decrypting (b) scrambling
(c) Blaise Pascal
(c) randomizing (d) encrypting
(d) Charles Babbage
12. Theoretical definition of a general
5. The first computer was invented by
purpose computer was provided by
Charles Babbage was called .
(a) slide rule .
(a) Allen Turing
(b) difference engine (b) John Napier
(c) ENIAC (c) Blaise Pascal
(d) calculator (d) Edmund Gunter
6. is called father of modern 13. The first general purpose computer,
computers. which fulfilled Turing’s definition of a
(a) John Napier
general purpose computing machine was
(b) Edmund Gunter
.
(c) Blaise Pascal (a) slide rule (b) ENIAC
(d) Charles Babbage (c) logarithm (d) Colossus
7. Difference engine used for in- 14. The first generation computer was called
put. .
1
2 Prepared by: Dr.V.Nagaradjane

(a) slide rule (b) ENIAC 23. Second generation computer was cre-
(c) logarithm (d) Colossus ated in the year .
(a) 1945 (b) 1959
15. First generation computer (named
ENIAC) was designed and fabricated by (c) 1965 (d) 1971
. 24. Second generation computer used
(a) John Napier technology for processing
(b) Endmund Gunter data.
(c) Blaise Pascal (a) transistor
(d) J.P. Eckert & J.W. Mauchy (b) Integrated Circuit (IC)
(c) vacuum tube
16. First generation computer (named
ENIAC) was designed and fabricated at (d) Very Large Scale Integration (VLSI)
. 25. Second generation computer used
(a) University of Pensylvenia, USA for main memory.
(b) University College, London (a) DVD
(c) University of California, Berkeley, USA (b) magnetic core
(d) Cambridge University, UK (c) hard disk
17. First generation computer (named (d) CD
ENIAC) was created in the year 26. Second generation computer used
. for input.
(a) 1945 (b) 1959 (a) magnetic disk
(c) 1965 (d) 1971 (b) magnetic tape
18. First generation computer (named (c) both a & b
ENIAC) used technology for (d) neither a nor b
processing data. 27. Second generation computer used
(a) transistor for output.
(b) Integrated Circuit (IC) (a) magnetic disk
(c) vacuum tube (b) magnetic tape
(d) Very Large Scale Integration (VLSI) (c) both a & b
19. First generation computer (named (d) neither a nor b
ENIAC) used more than kW of 28. language was used to pro-
electric power. gram second generation computer.
(a) 200 (b) 1000 (a) FORTRAN
(c) 2000 (d) 3000 (b) COBOL
20. First generation computer (named (c) both a & b
ENIAC) used for input. (d) neither a nor b
(a) punched card
29. Third generation computer was created
(b) paper tape in the year .
(c) magnetic tape (a) 1945 (b) 1959
(d) all of them (c) 1965 (d) 1971
21. First generation computer (named 30. Third generation computer used
ENIAC) used for output. technology for processing
(a) punched card data.
(b) paper tape (a) transistor
(c) magnetic tape (b) Integrated Circuit (IC)
(d) all of them (c) vacuum tube
22. language was used to pro- (d) Very Large Scale Integration (VLSI)
gram first generation computer (named 31. Third generation computer used
ENIAC). for input.
(a) C (a) magnetic disk
(b) machine language (b) magnetic tape
(c) C++ (c) keyboard
(d) Java (d) all of them
Q. Bank [COPA Semester - 1] 3

32. Third generation computer used 41. Internet was created during the era of
for output. generation compuers.
(a) magnetic disk (a) second (b) third
(b) magnetic tape (c) fourth (d) fifth
(c) monitor 42. Fifth generation computer was created
(d) all of them in the year .
33. language was used to pro- (a) 1959 (b) 1965
gram third generation computer. (c) 1971 (d) 1980
(a) FORTRAN-II to IV,COBOL 43. Fifth generation computer used
(b) BASIC,PASCAL technology for processing
(c) PL/1, ALGOL-60 data.
(d) all of them (a) Integrated Circuit (IC)
(b) vacuum tube
34. Fourth generation computer was created
(c) Very Large Scale Integration (VLSI)
in the year .
(a) 1959 (b) 1965 (d) Ultra Large Scale Integration (ULSI)
(c) 1971 (d) 1980 44. Fifth generation computer used
for input.
35. Fourth generation computer used
(a) mouse
technology for processing
(b) keyboard
data.
(a) Integrated Circuit (IC) (c) scanner/light pen
(b) vacuum tube (d) all of them
(c) Very Large Scale Integration (VLSI) 45. language created during the
(d) Ultra Large Scale Integration (ULSI) advent of fifth generation computers.
(a) Java
36. Fourth generation computer used
(b) C#
for input.
(a) magnetic disk (c) both a & b
(b) magnetic tape (d) neither a nor b
(c) keyboard 46. In fifth generation computers,
(d) all of them were used for secondary
storage of data.
37. language was created during
(a) floppy disk
the advent of fourth generation comput-
(b) hard disk
ers.
(a) C (c) CD/ DVD drive
(b) C++ (d) all of them
(c) both a & b 47. Several new forms of personal computer,
(d) neither a nor b viz., laptop, notebook, ultrabook, tablet
PC, smartphones, Chromebook, Rasp-
38. In fourth generation computers,
were used for secondary berry PI, were created during the era of
storage of data. .
(a) second (b) third
(a) floppy disk (b) hard disk
(c) fourth (d) fifth
(c) tape drive (d) all of them
39. generation computers
first earned the name of Personal Com- 1.1.2 Types of computer
puter (PC).
(a) first (b) second 48. Personal computer is otherwise called
.
(c) third (d) fourth (a) micro-computer
40. Productivity tools like Wordstar, Lotus, (b) desktop
DBASE, FOXPRO, etc. flourished dur- (c) both a & b
ing the era of generaton (d) neither a nor b
computers. 49. In a personal computer, multiple users
(a) first (b) second .
(c) third (d) fourth (a) can login and work at differnt times

Prepared by: Dr.V.Nagaradjane


4 Prepared by: Dr.V.Nagaradjane

(b) cannot login and work at the same time 56. A computer having large processing
(c) although multiple users are supported, only power, used for scientific research, simu-
one person can login at given time lation of experiments, nuclear research,
(d) all of them high power number crunching, etc. is
called .
50. The computer having better graphics (a) smartphone
capacity, more main memory, more pro- (b) micro-computer
cessing power and more storage com- (c) workstation computer
pared to personal computer is called (d) supercomputer
.
(a) tablet PC 57. The most common type of computer
(b) Raspberry PI used at homes and offices is called
.
(c) workstation computer (a) Personal Computer (PC)
(d) smartphone (b) super computer
51. The computer used for professional (c) main frame computer
works like CAD/CAM, animation, desk- (d) mini computer
top publication, high power gaming, etc. 58. In computers, PC is expanded as
is called . .
(a) tablet PC (a) Process Computer
(b) Raspberry PI (b) Progressive Computer
(c) workstation computer (c) Personal Computer
(d) smartphone (d) Plus Computer
59. Personal computer is otherwise called
52. A computer which supports concurrent
.
login for 100 or 200 persons is called (a) super computer
. (b) main frame computer
(a) mini-computer
(c) mini computer
(b) micro-computer (d) micro-computer
(c) tablet PC
60. A micro-computer/PC permits working
(d) laptop
of at the same time.
53. A computer which supports concurrent (a) many users
login for thousands of users is called (b) one user
. (c) hundreds of users
(a) mainframe computer (d) thousands of users
(b) micro-computer 61. Laptops, tabs, mobile phones, raspberry
(c) tablet PC PI, etc. are classified under .
(d) laptop (a) super computer
(b) main frame computer
54. computer has enormous (c) mini computer
processing power, memory and storage (d) micro-computer
and supports thousands of concurrent
logins.
(a) mainframe computer 1.1.3 Advantages of computers
(b) micro-computer
(c) cloud computer 62. The main advantage of computer is
.
(d) laptop (a) speed
55. A collection of computers used for on- (b) large storage capacity
line data storage through the Internet is (c) ease of creating programs for new jobs
called . (d) all of them
(a) mainframe computer 63. CAD stands for .
(b) micro-computer (a) Computer Analog Design
(c) cloud computer (b) Computer Aided Dialog
(d) laptop (c) Computer Aided Design
Q. Bank [COPA Semester - 1] 5

(d) Computer Android Design 1.1.5 Concept of hardware and soft-


64. CAM stands for . ware
(a) Computer Analog Manufacture
(b) Computer Aided Monitoring 72. All the physical components of a com-
(c) Computer Aided Maintenance puter are collectively called .
(d) Computer Aided Manufacturing (a) software (b) hardware
(c) malware (d) junkware
65. CAD/CAM help in reduction of
required for manufacture 73. The component which makes a com-
while maintaining high quality and puter to work through commands is
precision. called .
(a) software (b) hardware
(a) time
(c) malware (d) junkware
(b) money
(c) both a & b 74. Software be touched.
(d) neither a nor b (a) cannot (b) can
(c) may (d) would
66. Mission critital operations (like rocket
launching, control of space vehicles) are 75. Hardware be touched.
possible through comput- (a) cannot (b) can
ers. (c) may (d) would
(a) real time (b) main frame
76. Hardware electric power for
(c) super (d) mini working.
67. Real time computers have (a) consumes
lag in processing input signals. (b) does not consume
(a) zero (b) lengthy (c) generates
(c) lot of (d) heavy (d) creates
77. Hardware space.
1.1.4 Application of computers (a) does not occupy
(b) occupies
68. Banks store and retrieve core banking (c) does not require
transactions using . (d) does not need
(a) mobile phones
(b) centralized server computers 78. Software .
(c) tablet computers (a) consumes power through hardware
(d) micro-computers (b) is inferred through the working of hardware
(c) controls the hardware
69. Computer servers are used in (d) all of them
applications.
(a) online reservation of tickets
(b) e-commerce 1.1.6 Computer hardware
(c) tracking of consignments
(d) all of them 79. A computer has .
70. Computers help in creation of high (a) input unit
quality multi-media content at (b) Central Processing Unit (CPU)
. (c) output unit
(a) high speed (d) all of them
(b) high quality 80. Keyboard, mouse, scanner, stylus,
(c) lower cost compared to manual creation light pen, etc. are classified under
(d) all of them unit.
71. Computer networks in the form of LAN, (a) input
WAN, MAN and the Internet help in (b) central processing
. (c) output
(a) sharing of information (d) none of them
(b) transactions of e-commerce 81. Monitor (VDU), printer, plotter, etc.
(c) sharing of hardware (like printers) are classified under unit.
(d) all of them (a) input

Prepared by: Dr.V.Nagaradjane


6 Prepared by: Dr.V.Nagaradjane

(b) central processing 90. The button ends current


(c) output line of input.
(d) none of them (a) space bar (b) enter
(c) backspace (d) tab
82. All the processing work of computer
takes place in . 91. The button moves the
(a) input unit cursor to the next predetermined stop
(b) Central Processing Unit (CPU) location.
(c) output unit (a) space bar (b) enter
(d) all of them (c) backspace (d) tab
83. produces output/results 92. The button toggles capi-
after processing the input data. tal letter for input.
(a) input unit (a) caps lock (b) print screen
(b) Central Processing Unit (CPU) (c) scroll lock (d) pause/break
(c) output unit 93. The button takes a screen
(d) all of them shot and copies it to clipboard or saves
84. is called the ’Brain of it to a file.
(a) caps lock (b) print screen
Computer’.
(c) scroll lock (d) pause/break
(a) input unit
(b) Central Processing Unit (CPU) 94. The button stops or re-
(c) output unit sumes the boot process.
(d) all of them (a) caps lock (b) print screen
(c) scroll lock (d) pause/break
85. Processor, main memory (RAM),
hard disk, CD/DVD drive, CMOS, 95. button keeps the scroll
BIOS chip, etc. are housed inside mode on or off.
(a) caps lock (b) print screen
.
(a) input unit (c) scroll lock (d) pause/break
(b) Central Processing Unit (CPU) 96. The group of number keys and ba-
(c) output unit sic arithmetic operators placed on the
(d) all of them left side of a keyboard is called
86. contains slots for fix- .
(a) number pad
ing/ connecting processor, main mem-
(b) note pad
ory (RAM), hard disk, CD/DVD drive,
(c) arrow keys
CMOS, BIOS chip, etc.
(a) Mother board (b) bread board (d) cursor controls
(c) key board (d) dash board 97. The key toggles number
pad on or off.
(a) num lock (b) caps lock
Input units
(c) scroll lock (d) Esc
87. Common keyboards used in India have 98. The keys can move the
layout of keys. cursor up, down, left or right.
(a) English US (a) num lock (b) arrow
(b) English UK (c) scroll lock (d) Esc
(c) either a or b 99. The key moves out of cur-
(d) neither a nor b rent screen or terminates current opera-
88. The longest/largest button on keyboard tion.
is . (a) num lock (b) arrow
(a) space bar (b) enter (c) scroll lock (d) Esc
(c) backspace (d) tab 100. The key helps to access
89. The button removes a alternate character of each key (e.g. !
character to the left of cursor position. by pressing 1, @ by pressing 2, etc.).
(a) space bar (b) enter (a) num lock (b) arrow
(c) backspace (d) tab (c) shift (d) Esc
Q. Bank [COPA Semester - 1] 7

101. The keys are placed to Mouse


the left and right of space bar.
(a) Ctrl 111. The helps to move the cur-
(b) Windows button sor on screen and point at specific icons.
(c) Alt (a) scanner (b) mouse
(d) all of them (c) keyboard (d) printer
112. Normally, pressing the
102. The key opens context
button of mouse once or twice on an
menu.
(a) Ctrl icon opens the program associated with
(b) Windows button that icon.
(a) left (b) right
(c) Alt (c) centre (d) bottom
(d) function key
113. Normally, pressing the
103. The series of keys named F1 ... F12 are button of mouse opens a context menu.
called . (a) left (b) right
(a) function keys (c) centre (d) bottom
(b) scroll keys
114. Normally, button of
(c) number keys
mouse doubles as a scroller.
(d) navigation keys (a) left (b) right
104. Function keys are placed at the (c) centre (d) bottom
of keyboard. 115. The computer can be configured to open
(a) bottom (b) right a program on the icon using
(c) top (d) left mouse.
(a) single clicking
105. The Insert, Delete, Home, End, Page Up (b) double clicking
and Page Down keys are placed above
(c) both a & b
.
(a) arrow keys (d) neither a nor b
(b) number lock 116. Mouse may have for sens-
(c) function keys ing movement.
(d) scroll lock (a) ball
(b) light sensor
106. A second enter key is available in (c) either a or b
area of keyboard. (d) neither a nor b
(a) arrow keys
(b) number lock
(c) function keys Other input devices
(d) scroll lock
117. A device which can process characters
107. Most of the shortcut keys are designed and drawings on paper and convert them
to use key along with one to digital images (or editable objects) for
or two characters. computers is called .
(a) Ctrl (b) Alt (a) scanner
(c) both a & b (d) none of them (b) digital tablet
108. opens the start menu. (c) light pen
(a) Windows key (b) Ctrl (d) printer
(c) Alt (d) F1 118. A device which converts handwriting to
computer input is called .
109. opens help.
(a) scanner
(a) Windows key (b) Ctrl (b) digital tablet
(c) Alt (d) F1 (c) light pen
110. The function keys are arranged in 3 (d) printer
groups of keys in a group. 119. A stylus used to provide input through
(a) 2 (b) 3 CRT monitor is called .
(c) 4 (d) 5 (a) scanner

Prepared by: Dr.V.Nagaradjane


8 Prepared by: Dr.V.Nagaradjane

(b) digital tablet (a) large displays (> 32”)


(c) light pen (b) small displays
(d) printer (c) display of mobile phone
(d) display of watches
1.1.7 Output devices 129. TFT is expanded as .
(a) Tiny Film Transistor
Monitor/ VDU (b) Thin Film Transistor
(c) Thin Floppy Transistor
120. is the most common out-
(d) Thin Film Transmission
put device for a computer.
(a) monitor 130. The density of pixels in a monitor sur-
(b) printer face is called .
(c) both a & b (a) revolution (b) reaction
(d) neither a nor b (c) resolution (d) relation

121. VDU is expanded as . 131. The number of pixels per inch of monitor
(a) Visual Display Unit length is called .
(a) LPI (Lines Per Inch)
(b) Virtual Display Unit
(b) DPI (Dots Per Inch)
(c) Visual Deception Unit
(c) SPI Sides Per Inch
(d) Visual Display University
(d) PPI (Pixels Per Inch)
122. In computer monitors, CRT stands for
. 132. Height to width ratio of a monitor screen
(a) Cadmium Ray Tube is called .
(a) aspect ratio
(b) Cathode Ray Tube
(b) length ratio
(c) Cathode Ray Twist
(c) width ratio
(d) Cathode Rim Tube
(d) diagonal ratio
123. Cathode Ray Tube (CRT) monitor sup-
ports input. 133. Generally, CRT monitors had aspect ra-
(a) LASER printer tio of .
(a) 16:9 (b) 4:3
(b) line printer
(c) 16:10 (d) 1:1
(c) light pen
(d) plotter 134. LCD, LED, TFT and Plasma monitors
have aspect ratio of .
124. Cathode Ray Tube (CRT) monitor has (a) 16:9
level of power consumption (b) 16:10
amongst monitors. (c) both a & b
(a) highest (b) lowest
(d) neither a nor b
(c) zero (d) least
135. The monitor having pixel resolution
125. LCD is expanded as .
of 1280 × 720 has aspect ratio of
(a) Linear Crystal Display
.
(b) Liquid Crystal Dialog (a) 16:9 (b) 16:10
(c) Liquid Crystal Display (c) 4:3 (d) 1:1
(d) Liquid Canister Display
136. The monitor having pixel resolution
126. LED is expanded as . of 800 × 600 has aspect ratio of
(a) Linear Emitting Diode .
(b) Light Emitting Diode (a) 16:9 (b) 16:10
(c) Liquid Emitting Diode (c) 4:3 (d) 1:1
(d) Light Emitting Display 137. The monitor having pixel resolution
127. The display of LCD monitor is of 1280 × 800 has aspect ratio of
than that of LED .
monitor. (a) 16:9 (b) 16:10
(a) lighter (b) heavier (c) 4:3 (d) 1:1
(c) brighter (d) duller 138. The monitor having pixel resolution
128. Plasma monitor is suitable for of 1920 × 1080 has aspect ratio of
. .
Q. Bank [COPA Semester - 1] 9

(a) 16:9 (b) 16:10 147. The method of displaying screen con-
(c) 4:3 (d) 1:1 tents using even rows for half a second
and odd rows for another half second is
139. In monitors, HD stands for
. called of video.
(a) Hyper Density (a) progressive video
(b) High Direct (b) interlacing
(c) deinterlacing
(c) Hot Definition
(d) reducing
(d) High Definition
148. The p in display resolutions of
140. Display resolution of 1920 × 1080 pixels
1080p, 720p, 576p&480p stands for
is called display.
(a) 480p (a) progressive video
(b) 576p (b) interlacing
(c) 720p (c) deinterlacing
(d) Full High Definition (FHD) (d) reducing
141. Full High Definition (FHD) of dis- 149. The method of painting each row of
plays correspondes to (ver- video frame from top to bottom is called
tical pixel resolution). .
(a) 480p (b) 576p (a) progressive video
(c) 720p (d) 1080p (b) interlacing
142. Display resolution of 1280 × 720 pixels (c) deinterlacing
is called . (d) reducing
(a) 480p 150. The method of painting odd rows during
(b) 576p the fist pass and even rows during the
(c) 720p second pass is called .
(d) Full High Definition (FHD) (a) progressive video
143. Display resolution of 768 × 576 pixels is (b) interlacing
called . (c) deinterlacing
(a) 480p (d) reducing
(b) 576p
(c) 720p Printer
(d) Full High Definition (FHD)
144. Display resolution of 720 × 480 pixels is 151. The device that produces hard copies on
called . paper is called .
(a) 480p (a) monitor (b) scanner
(b) 576p (c) tablet (d) printer
(c) 720p 152. Paper copy of a document is called
(d) Full High Definition (FHD) .
(a) light copy (b) hard copy
145. The notation HDi for display resolution
denotes . (c) soft copy (d) hot copy
(a) 1080p Interlaced 153. Digital copy of a document stored in
(b) 720p Interlaced secondary storage device (like hard disk,
(c) 576p Interlaced floppy disk, CD, DVD, pen drive, SD
(d) 480p Interlaced card, etc.) is called .
(a) light copy (b) hard copy
146. The method of displaying screen con-
tents using even rows for half a second (c) soft copy (d) hot copy
and odd rows for another half second is 154. The type of printer which hits the paper
called of video. to produce print is called .
(a) progressive scanning (a) monitor
(b) interlacing (b) scanner
(c) deinterlacing (c) non-impact type printer
(d) reducing (d) impact type printer

Prepared by: Dr.V.Nagaradjane


10 Prepared by: Dr.V.Nagaradjane

155. The type of printer which does not hit 163. Thermal printer uses
the paper to produce print is called coated paper, which turns black when
. heat is applied.
(a) monitor (a) chromium (b) BisPhenol A
(b) scanner (c) nickel (d) toner powder
(c) non-impact type printer
(d) impact type printer
1.1.8 Central Processing Unit
156. Dot matrix printer belongs to (CPU)
category.
(a) monitor Micro-processor
(b) scanner
(c) non-impact type printer 164. CPU is expanded as .
(d) impact type printer (a) Central Power Unit
(b) Critical Processing Unit
157. Dot matrix printer, line printer, chain (c) Central Processing Unit
printer, golf ball printer and daisy wheel (d) Cerebral Processing Unit
printer belong to category.
(a) monitor 165. The symbol µP denotes of
(b) scanner a computer.
(a) mighty processor
(c) non-impact type printer
(b) micro presenter
(d) impact type printer
(c) million power
158. LASER printer, ink jet printer, ther- (d) micro-processor
mal printer and plotter belong to 166. is casually called the ”Brain
category. of Computer”.
(a) monitor (a) CPU (b) monitor
(b) scanner (c) keyboard (d) mouse
(c) non-impact type printer
167. The main components housed in CPU
(d) impact type printer are .
159. In LASER printer, the LASER beam pro- (a) micro-processor
duces charge on paper, which (b) Mother board, Random Access Memory
makes the toner powder to adhere to the (RAM)
charged area. (c) Secondary storage devices (hard disk,
(a) (-)ve (b) (+)ve CD/DVD drive, floppy disk drive, etc.)
(c) neutral (d) none of them (d) all of them
168. In the CPU of a computer,
160. In ink jet printer,
delivers power supply to all the compo-
colour cartridges are used to produce
nents at appropriate voltages.
colour/black print. (a) Hard Disk
(a) Red, Blue & Green (RBG)
(b) Mother Board
(b) Cyan, Magenta, Yellow & blacK (CMYK) (c) Switch Mode Power Supply (SMPS)
(c) Red, Green & Blue (RGB) (d) DVD drive
(d) VIBGYOR
169. The chip carrying out all process-
161. In ink jet printer, CMYK stands for ing works in a computer is called
. .
(a) Cream, Magenta, Yellow & blacK (a) micro-processor (µP )
(b) Crimson, Magenta, Yellow & blacK (b) keyboard
(c) Cyan, Magenta, Yellow & blacK (c) BIOS chip
(d) Cyan, Mango, Yellow & blacK (d) RAM
162. The type of printer used for printing on 170. The part of micro-processor which per-
large size papers (A0, A1, etc.) is called forms number crunching and logical
. comparisons is called .
(a) monitor (b) scanner (a) Arithmetic and Logic Unit (ALU)
(c) mouse (d) plotter (b) Register
Q. Bank [COPA Semester - 1] 11

(c) Cache (c) zero


(d) timer (d) more than one
171. ALU stands for . 179. Intel Pentium processor was preceded by
(a) Arithmetic and Logic University Intel processor.
(b) Arithmetic and Local Unit (a) Core 2 duo (b) 80486/ 486
(c) Arithmetic and Logic Unit (c) Core i3 (d) Core i5
(d) Analysis and Logic Unit
172. The part of micro-processor used for Main memory (or) Primary Storage or Ran-
storing values needed for next cycle of dom Access Memory
processing is called .
(a) Arithmetic and Logic Unit (ALU) 180. The storage which handles data required
(b) Register for the processor (by fetching data from
(c) clock or saving data to secondary storage) is
(d) timer called .
(a) main memory
173. The part of micro-processor holding
(b) primary storage/ volatile storage
data which is needed for forthcoming cy-
(c) Random Access Memory (RAM)
cles of processing is called .
(a) Arithmetic and Logic Unit (ALU) (d) all of them
(b) Register 181. Main memory data after
(c) Cache power off.
(d) timer (a) retains
174. The part of micro-processor which main- (b) remembers
tains a clock and induces each cycle (c) does not keep
of processing through a pulse is called (d) keeps all
. 182. Since main memory looses data after
(a) Arithmetic and Logic Unit (ALU) power off, it is called .
(b) Register (a) data storage
(c) Cache (b) volatile storage
(d) timer (c) power storage
175. The number of floating point operations (d) secondary storage
carried out by a micro-processor in one 183. RAM is expanded as .
second is called . (a) Right Access Memory
(a) FLOPS (b) timer
(b) Random Active Memory
(c) clock (d) frequency
(c) Random Access Memory
176. The number of cycles of operations per- (d) Random Access Meter
formed by a processor per second is
called its . 184. SRAM stands for .
(a) bus speed (a) Static Random Access Memory
(b) connection speed (b) Stable Random Access Memory
(c) clock speed (c) Static Read Access Memory
(d) baud rate (d) Static Random Arithmetic Memory
177. Whereas clock speed is the gross num- 185. DRAM stands for .
ber of operations performed by a pro- (a) Draft Random Access Memory
cessor per second, FLOPS represents (b) Direct Random Access Memory
of processor per second. (c) Disk Random Access Memory
(a) wasted time (d) Dynamic Random Access Memory
(b) effective out turn
(c) wasted cycles 186. FPM DRAM stands for .
(a) First Page Mode Dynamic Random Access
(d) clock speed
Memory
178. A floating point operation may require (b) Fast Page Mode Dynamic Random Access
clock cycle to complete. Memory
(a) just one (c) Fill Page Mode Dynamic Random Access
(b) less than one Memory

Prepared by: Dr.V.Nagaradjane


12 Prepared by: Dr.V.Nagaradjane

(d) Fast Package Mode Dynamic Random Access Mother board


Memory
194. In a desktop computer, the board
187. EDO DRAM stands for
containing micro-processor, RAM and
.
(a) Extended Disk Out Dynamic Random Access other components is called
Memory board.
(a) graphics (b) mother
(b) Expanded Data Out Dynamic Random Access
(c) white (d) black
Memory
(c) Extended Data Out Dynamic Random Access 195. CMOS in motherboard is expanded as
Memory .
(a) Customary Metal Oxide Semiconductor
(d) Extended Data Onboard Dynamic Random
(b) Complementary Mineral Oxide Semiconductor
Access Memory
(c) Complete Metal Oxide Semiconductor
188. SDRAM stands for . (d) Complementary Metal Oxide Semiconductor
(a) Synchronous Dynamic Random Access Mem- 196. CMOS is a type of RAM, which is con-
ory stantly powered by .
(b) Simple Dynamic Random Access Memory (a) UPS battery (b) CMOS battery
(c) Synchronous Double Random Access Memory (c) AC main (d) AA battery
(d) Syntax Dynamic Random Access Memory 197. In motherboard, BIOS is expanded as
189. DDR SDRAM stands for .
(a) Beginner Input Output System
.
(a) Double Data Rate Synchronous Dynamic Ran- (b) Bit Input Output System
dom Access Memory (c) Basic Input Output System
(b) Double Data Rate Simple Dynamic Random (d) Basic Input Output Syntax
Access Memory 198. In motherboard, CNR stands for
(c) Double Data Rate Synchronous Double Ran- .
dom Access Memory (a) Communication & Network Riser
(d) Double Data Rate Syntax Dynamic Random (b) Contact & Network Riser
Access Memory (c) Communication & Network Ripper
(d) Complementary & Networking Riser
190. RDRAM stands for .
(a) Resultant Random Access Memory 199. In motherboard, AGP stands for
.
(b) Reactive Random Access Memory (a) Automated Graphics Port
(c) Rational Random Access Memory (b) Accelerated Graphics Point
(d) Rambus Random Access Memory (c) Audio Graphics Port
(d) Accelerated Graphics Port
191. VRAM stands for .
(a) Visual Random Access Memory 200. In motherboard, PATA stands for
.
(b) Video Random Access Memory (a) Peripheral Advanced Technology Attachment
(c) Virtual Random Access Memory (b) Port Advanced Technology Attachment
(d) Vintage Random Access Memory (c) Parallel Advanced Technology Attachment
(d) Part Advanced Technology Attachment
192. MPDRAM stands for .
(a) Major Port Dynamic Random Access Memory 201. In motherboard, SATA stands for
.
(b) Multi-Point Dynamic Random Access Memory (a) Serial Advanced Technology Attachment
(c) Multi-Port Dynamic Random Access Memory (b) Synchronous Advanced Technology Attach-
(d) Multi-Port Data Random Access Memory ment
(c) Synaptic Advanced Technology Attachment
193. SGRAM stands for . (d) Systematic Advanced Technology Attachment
(a) Synchronous Graphics Random Access Mem-
202. In motherboard, chipset
ory takes care of data transfer to and from
(b) Syntax Graphics Random Access Memory the processor.
(c) Simple Graphics Random Access Memory (a) Southbridge (b) Eastbridge
(d) Synchronous Gross Random Access Memory (c) Northbridge (d) Westbridge
Q. Bank [COPA Semester - 1] 13

203. In motherboard, chipset (c) Micro Secure Digital Card


takes care of data transfer to and from (d) Major Secure Digital Card
the secondary storage devices (like hard 212. Mini SD card is expanded as
disk, CD/DVD drive, etc.). .
(a) Southbridge (b) Eastbridge (a) Secure Digital Card
(c) Northbridge (d) Westbridge (b) Mini Secure Digital Card
(c) Micro Secure Digital Card
Secondary storage units (d) Major Secure Digital Card
213. Micro SD card is expanded as
204. Secondary storage is otherwise called .
. (a) Secure Digital Card
(a) auxiliary storage (b) Mini Secure Digital Card
(b) permanent storage (c) Micro Secure Digital Card
(c) both a & b (d) Major Secure Digital Card
(d) main memory
214. PCMCIA stands for .
205. Data store in secondary storage is (a) Protected Computer Memory Card Interna-
. tional Association
(a) volatile (b) Personal Computer Memory Card Interna-
(b) lost after power off tional Association
(c) is deleted after every reboot (c) Personal Complementary Memory Card Inter-
(d) permanent (available till deletion) national Association
(d) Pen drive Computer Memory Card Interna-
206. Secondary storage devices are
tional Association
in speed when compared to RAM.
(a) faster (b) slower
Storage capacities
(c) equal (d) none of them
207. Hard disk uses for data 215. The smallest storage unit permitting
storage and retrieval. storage of 0 and 1 is called .
(a) LASER beam acting on light sensitive layer (a) bit (b) nibble
(b) magnetic disk mounted in spindle (c) byte (d) kilo byte
(c) flash memory
216. One bit can store range of
(d) plastic magnetic plate values.
208. CD/DVD drive uses for (a) 0 or 1 (b) 0 to 255
data storage and retrieval. (c) 0 to 512 (d) 0 to 1024
(a) LASER beam acting on light sensitive layer 217. 4 bits of memory is called .
(b) magnetic disk mounted in spindle (a) bit (b) nibble
(c) flash memory (c) byte (d) kilo byte
(d) plastic magnetic plate
218. Nibble is a storage unit consisting of
209. SD card, mini SD card and micro SD bits.
card use for data storage (a) 8 (b) 16
and retrieval. (c) 4 (d) 64
(a) LASER beam acting on light sensitive layer
219. 8 bits of memory is called .
(b) magnetic disk mounted in spindle
(a) bit (b) nibble
(c) flash memory
(c) byte (d) kilo byte
(d) plastic magnetic plate
220. Byte is a storage unit consisting of
210. Floppy disk used for data
bits.
storage and retrieval. (a) 8 (b) 16
(a) LASER beam acting on light sensitive layer (c) 4 (d) 64
(b) magnetic disk mounted in spindle
(c) flash memory 221. 1024 bits of storage is called
.
(d) plastic magnetic plate (a) bit (b) nibble
211. SD card is expanded as . (c) byte (d) kilo byte
(a) Secure Digital Card 222. Kilo Byte (KB) is a storage unit consist-
(b) Mini Secure Digital Card ing of bits.

Prepared by: Dr.V.Nagaradjane


14 Prepared by: Dr.V.Nagaradjane

(a) 1024 (21 0) (b) Tera Byte (TB)


(b) 1048576 (22 0) (c) Peta Byte (PB)
(c) 1073741824 (23 0) (d) Exa Byte (EB)
(d) 1099511627776 (24 0)
223. 22 0 (1048576) bits of storage is called
Storage capacities of devices
.
(a) byte
(b) Kilo Byte (KB) 233. The storage capacity of a Compact Disk
(c) Mega Byte (MB) (CD) is .
(d) Tera Byte (TB) (a) 800MB (b) 4.7GB
(c) 512MB (d) 1TB
224. 1024 KB of storage is called
. 234. The storage capacity of a Digital Versa-
(a) byte tile Disk (DVD) is .
(b) Kilo Byte (KB) (a) 800MB (b) 4.7GB
(c) Mega Byte (MB) (c) 512MB (d) 1TB
(d) Tera Byte (TB)
235. The storage capacity of a common hard
225. 1 MB = KB.
disk is .
(a) 1024 (21 0) (a) 256MB
(b) 1048576 (22 0) (b) 512GB
(c) 1073741824 (23 0) (c) 1TB
(d) 1099511627776 (24 0) (d) any one of a, b or c
226. 1 MB = bits.
1
(a) 1024 (2 0) 236. The storage capacity of a Secure Digi-
tal (SD) card/ Mini SD card/ Micro SD
(b) 1048576 (22 0)
card or pen drive can be in the range of
(c) 1073741824 (23 0)
.
(d) 1099511627776 (24 0) (a) 1 bit to 8 bits
227. 1024 MB of storage is called (b) 4 bits to 8 bits
. (c) 2GB to 128GB
(a) byte
(d) 1 MB to 1024MB
(b) Kilo Byte (KB)
(c) Mega Byte (MB)
(d) Tera Byte (TB) Switch Mode Power Supply (SMPS)
228. 1 TB = MB.
(a) 256 (b) 512 237. The unit which splits power supply to
(c) 1024 (d) 2048 various voltages required for ther units
229. 1024 TB = 1 . of a computer is called .
(a) Mega Byte (MB) (a) transformer
(b) Tera Byte (TB) (b) Switch Mode Power Supply (SMPS)
(c) Peta Byte (PB) (c) transistor
(d) Exa Byte (EB) (d) transducer
230. 1 PB = 1024 . 238. Full form for SMPS in computer is
(a) Mega Byte (MB) .
(b) Tera Byte (TB) (a) Sync Mode Power Supply
(c) Peta Byte (PB) (b) Switch Mode Power Supply
(d) Exa Byte (EB) (c) Stake Mode Power Supply
231. 1024 PB = 1 . (d) Switch Mode Power Socket
(a) Mega Byte (MB) 239. In a desktop computer, pro-
(b) Tera Byte (TB) duces radio frequency interference.
(c) Peta Byte (PB) (a) SMPS
(d) Exa Byte (EB) (b) Micro-Processor (µP )
232. 1 EB (Exa Byte) = 1024 . (c) RAM
(a) Mega Byte (MB) (d) Mouse
Q. Bank [COPA Semester - 1] 15

CPU Ports 248. Audio input, microphone and speaker


output can be connected to computer
240. The opening provided in the front panel using .
or rear panel of a CPU for connecting (a) 3.5mm jack (b) RJ11
peripherals is called . (c) RJ45 (d) LPT
(a) socket (b) pin
249. Joystick can be connected to computer
(c) port (d) part
using port.
241. External devices/ peripherals like key- (a) 3.5mm jack (b) RJ11
board and mouse can be connected to (c) RJ45 (d) Game
a computer using ports.
(a) PS/2 250. PS/2 stands for .
(a) Registered Jack 11
(b) USB
(b) Registered Jack 45
(c) both a & b
(c) Personal System 2
(d) neither a nor b
(d) Recommended Standard 232
242. External dialup MODEM can be con-
nected to a computer using 251. RJ11 stands for .
(a) Registered Jack 11
port.
(a) RS232/ serial (b) Registered Jack 45
(b) PS/2 (c) Personal System 2
(c) VGA (d) Recommended Standard 232
(d) LPT 252. RJ45 stands for .
243. Monitor is connected to a computer us- (a) Registered Jack 11
ing port. (b) Registered Jack 45
(a) RS232/ serial (c) Personal System 2
(b) PS/2 (d) Recommended Standard 232
(c) VGA 253. RS232 stands for .
(d) LPT (a) Registered Jack 11
244. Old style (SIMPLEX) printer (like dot (b) Registered Jack 45
matrix printer) may be connected to a (c) Personal System 2
computer using port. (d) Recommended Standard 232
(a) RS232/ serial
254. RJ45 port is otherwise called .
(b) PS/2 (a) Ethernet (b) LPT
(c) VGA (c) USB (d) VGA
(d) LPT
255. IEEE 1392 port is otherwise called
245. Modern (DUPLEX) printer (like LASER .
jet, inkjet printers) may be connected to (a) Ethernet (b) LPT
a computer using port. (c) USB (d) Firewire
(a) RS232/ serial
256. LPT stands for .
(b) USB
(a) Registered Jack 11
(c) PS/2
(b) Registered Jack 45
(d) VGA
(c) Line Printer Terminal
246. Broadband connection may be con- (d) Recommended Standard 232
nected through port.
(a) RJ45/ Ethernet 257. USB stands for .
(b) USB (a) Registered Jack 11
(c) PS/2 (b) Registered Jack 45
(d) VGA (c) Line Printer Terminal
(d) Universal Serial Bus
247. Printer, fax machine, scanner, web cam-
era, external DVD writer, external hard 258. High definition graphics output may be
disk, etc. can be connected to computer taken from port of a PC.
using port. (a) 3.5mm jack (b) HDMI
(a) RJ45 (b) USB (c) RJ45 (d) LPT
(c) PS/2 (d) VGA 259. HDMI stands for .

Prepared by: Dr.V.Nagaradjane


16 Prepared by: Dr.V.Nagaradjane

(a) Registered Jack 11 268. schedules processor time


(b) High Definition Multimedia Interface and handles concurrency and paral-
(c) Line Printer Terminal lel processing using multiple processor
(d) Universal Serial Bus cores.
(a) application software
(b) virus
1.1.9 Computer software (c) malware
(d) operating system
260. The component of computer which is
not physically accessible, but can be 269. allots memory for each pro-
realized through its working is called gram and frees memory when it is no
. longer needed for a program.
(a) hardware (b) software (a) application software
(c) RAM (d) port (b) virus
261. decides how hardware (c) malware
should work. (d) operating system
(a) hardware (b) software
(c) RAM (d) port 270. The core of the operating system which
controls all hardware and application
262. helps to hardware to pro- software, but does not directly interact
duce output based on given input. with the users is called .
(a) Game port (b) software (a) kernel (b) shell
(c) IEEE 1392 (d) SMPS (c) sap (d) heart
263. The operating system & driver software 271. A layer of application software available
are categorized under software. for the user to interact with operating
(a) system (b) application
system kernel is called .
(c) malware (d) junkware (a) kernel (b) shell
264. The software tools required for various (c) sap (d) heart
types of productive works like prepara-
272. is an operating system.
tion of documents, spreadsheets, play-
(a) Mac OS X
ing audio/video, browsing Internet, etc.
(b) Microsoft Windows
are are categorized under soft-
(c) Unix/ Linux/ Free BSD/ Solaris, BeOS
ware.
(a) system (b) application (d) all of them
(c) malware (d) junkware
265. Operating system identifies and con- Windows
trols hardware in coordination with
. 273. MS DOS stands for .
(a) power cable (b) mouse (a) MicroSoft Disk Operating System
(c) SMPS (d) BIOS
(b) MiniSoft Disk Operating System
266. Operating system uses a special software (c) MicroSoft Disk Operating Standard
called to initialize, operate (d) MicroSoft Dirty Operating System
and control hardware.
(a) conductor 274. MS DOS was first released in the year
(b) Ethernet controller .
(c) driver (a) 1970 (b) 1981
(d) SMPS (c) 1985 (d) 2000

267. schedules processor time in 275. Development of MS DOS was stopped


such a way as to allow the user to feel in the year .
that may programs are running at the (a) 1970 (b) 1981
same time. (c) 1985 (d) 2000
(a) application software 276. Windows 1.0 was released in the year
(b) operating system .
(c) virus (a) 1970 (b) 1981
(d) malware (c) 1985 (d) 2000
Q. Bank [COPA Semester - 1] 17

277. Windows 1.0, Windows 3.1, Windows 285. First release of Linux kernel took place
95, Windows 98 and Windows Me were in the year .
based on kernel. (a) 1981 (b) 1984
(a) LINUX (c) 1991 (d) 1993
(b) UNIX
286. Linux is distributed under an open
(c) NT (New Technology) source license called .
(d) MS DOS (a) GNU GPL (GNU Not Unix General Public Li-
278. Windows NT, Windows 2000, Windows cense)
XP, Windows 2003, Windows Vista, (b) Apache license
Windows 7, Windows 8 and Windows (c) Berkeley Software Distribution (BSD) license
10 were based on kernel. (d) Microsoft End User License Agreement
(a) LINUX (EULA)
(b) UNIX 287. Linux operating system was inspired by
(c) NT (New Technology) operating system.
(d) MS DOS (a) Windows (b) Unix
(c) Mac OS (d) iOS
279. The New Technology (NT) kernel based
Windows NT was released in . 288. Linux kernel supports for
(a) 1981 (b) 1993 Graphical User Interface (GUI) based
(c) 2000 (d) 2010 desktop.
(a) GNOME
Mac OS X (b) KDE
(c) Enlightenment
280. First version of Mac OS was released in (d) all of them
the year . 289. is a version of Linux ker-
(a) 1981 (b) 1984 nel modified to run on mobile phones/
(c) 1993 (d) 2000 tablets/ other devices.
281. was the first commercial (a) Android (b) Firefox OS
operating system to support Graphical (c) Tizen (d) all of them
User Interface (GUI). 290. are the shell environments
(a) Windows (b) UNIX commonly supported by Linux.
(c) Linux (d) Mac OS (a) Bourne Again Shell (bash)
282. The latest version of Mac OS X is based (b) Korn Shell (ksh)
on free UNIX kernel called . (c) C Shell (csh)
(a) Darwin (d) all of them
(b) Cygwin
(c) Solaris UNIX
(d) Berkeley Software Distribution
283. The mobile version of Mac OS X, used 291. UNIX was one of the first operating sys-
in iPhone, iPad, iWatch, iPod, etc., is tems to support .
called . (a) multi-tasking
(a) Android (b) Internet
(b) Firefox OS (c) email
(c) iOS (d) all of them
(d) Blackberry OS 292. UNIX operating system was developed
at .
Linux (a) AT&T Bell Labs
(b) Carnegie Milan University
284. Linux kernel was developed by (c) CERN
. (d) NASA
(a) Richard Stallman
293. UNIX was developed in the year
(b) Linus Torvalds .
(c) Bill Gates (a) 1970 (b) 1984
(d) Steve Jobs (c) 1985 (d) 1993

Prepared by: Dr.V.Nagaradjane


18 Prepared by: Dr.V.Nagaradjane

294. was a member of the team Features of Windows operating system


that developed UNIX operating system.
(a) Ken Thompson 303. The graphical work environment pro-
(b) Dennis Ritchie vided by Windows is called .
(c) M.D. McIllary, J.F. Ossanna (a) Desktop (b) Laptop
(d) all of them (c) My Documents (d) Downloads
295. POSIX stands for . 304. The Shortcuts visible on the Desktop of
(a) Power Operating System Interface Windows are called .
(a) clipboard
(b) Portable Operating System Interface (b) desktop icons
(c) Portable Operating System Internet (c) download icons
(d) Portable Overall System Interface (d) document icons
296. SUS stands for . 305. The thin strip (usually placed at bot-
(a) Simple UNIX Standard tom) of Windows desktop, contain-
(b) Single Universal Standard ing several important icons, is called
(c) Single UNIX Standard .
(d) Single UNIX Supplement (a) menu bar (b) title bar
(c) status bar (d) task bar
297. shell is supported by
UNIX kernel. 306. The special button at the left edge of
(a) Bourne (b) Korn task bar, used to open many programs
(c) C (d) all of them and settings, is called .
(a) stop menu (b) popup menu
298. Early versions of UNIX supported
a graphical user environment called (c) start menu (d) file menu
. 307. Task bar in Windows desktop contains
(a) KDE (b) CDE .
(c) GNOME (d) none of them (a) start menu
(b) quick launch icons, system tray
299. CDE stood for .
(a) Common Desktop Environment (c) list of running programs
(d) all of them
(b) Command Desktop Environment
(c) Common Desktop Entry 308. The collection of icons placed on the
(d) Common Directory Environment right side of task bar (representing back-
ground tasks and their statuses, date,
time, volume control, network status
Overview of operating systems icon, etc.) is called .
(a) system tray
300. operating system has the
(b) start menu
largest number of installations for desk-
(c) quick launch icon
top computers.
(d) file menu
(a) Windows (b) Android
(c) Mac OS X (d) UNIX 309. The list of programs currently running
in the desktop environment is displayed
301. Considering mobile phones as small
in the .
computers, is the most domi- (a) menu bar (b) title bar
nant operating system. (c) status bar (d) task bar
(a) Windows mobile
(b) iOS
Directory structure of Windows operating sys-
(c) Android
tem
(d) Blackberry OS
302. Linux is repackaged for specific user re- 310. The installation drive (usually C:) con-
quirements by . tains a folder named to store
(a) Fedora/ Red Hat user specific data.
(b) SUSE (a) temp
(c) Debian/ Ubuntu (b) Program Files
(d) all of them (c) users
Q. Bank [COPA Semester - 1] 19

(d) Windows Features of Windows Explorer


311. The c : \user folder contains a
bearing the name of each user 320. The shortcut for opening Windows Ex-
to save user specific data. plorer is .
(a) sub-folder (b) file (a) Windows+E (b) Windows+R
(c) movie (d) music (c) Windows+F (d) Windows+L
312. For a user named krish, the folder C : 321. In Windows Explorer, a file may be re-
\users\krish is called . named by right clicking and selecting re-
(a) movies folder name or by pressing key.
(b) home folder (a) F2 (b) F3
(c) documents folder (c) F1 (d) F4
(d) Windows folder 322. In Windows Explorer, is the
313. For a user named buvan, typical home shortcut to copy a file.
directory would be . (a) Ctrl+X (b) Ctrl+C
(a) C : \P rogramF iles (c) Ctrl+V (d) Ctrl+A
(b) C : \W indows 323. In Windows Explorer, is the
(c) C : \users\buvan shortcut to cut a file.
(d) C : \W indows\T emp (a) Ctrl+X (b) Ctrl+C
(c) Ctrl+V (d) Ctrl+A
314. The folder inside a user’s
home directory contains desktop icons. 324. In Windows Explorer, is the
(a) Desktop shortcut to paste a file, which has al-
(b) My Documents/ Documents ready been cut or copied.
(c) Pictures (a) Ctrl+X (b) Ctrl+C
(d) Music (c) Ctrl+V (d) Ctrl+A
315. is the default folder for 325. In Windows Explorer, is the
saving document files created by a user. shortcut to select all files and folders in
(a) Desktop the current directory.
(b) My Documents/ Documents (a) Ctrl+X (b) Ctrl+C
(c) Pictures (c) Ctrl+V (d) Ctrl+A
(d) Music
326. To create Desktop shortcut for a file
316. is the default folder for or program, right click on the file and
music related to a user. choose menu in Windows Ex-
(a) Desktop
plorer.
(b) My Documents/ Documents (a) Send To− >Desktop
(c) Pictures (b) Send To− >Drive name
(d) Music (c) Send To− >Compressed/Zipped archive
317. is the default folder for im- (d) Send To− >Bluetooth Device
age and drawing files related to a user.
(a) Desktop 327. To compress a file, right click on the file
(b) My Documents/ Documents and choose menu in Windows
(c) Pictures Explorer.
(a) Send To− >Desktop
(d) Music
(b) Send To− >Drive name
318. is the default folder to (c) Send To− >Compressed/Zipped archive
save content downloaded from the In- (d) Send To− >Bluetooth Device
ternet.
(a) Downloads 328. To write a file or folder in an empty
(b) My Documents/ Documents CD or DVD, right click on the file and
(c) Pictures choose menu in Windows Ex-
(d) Music plorer.
is the default folder for (a) Send To− >Desktop
319.
videos related to a user. (b) Send To− >Drive name
(a) Downloads (b) Videos (c) Send To− >Compressed/Zipped archive
(c) Pictures (d) Music (d) Send To− >Bluetooth Device

Prepared by: Dr.V.Nagaradjane


20 Prepared by: Dr.V.Nagaradjane

329. To share a file from a bluetooth en- (a) F2 (b) F3


abled computer to a bluetooth enabled (c) F5 (d) F1
device, right click on the file and choose 338. To refresh the display, press
menu in Windows Explorer. key.
(a) Send To− >Desktop (a) F2 (b) F3
(b) Send To− >Drive name (c) F5 (d) F1
(c) Send To− >Compressed/Zipped archive
339. To move through various panes in Win-
(d) Send To− >Bluetooth Device
dows Explorer, press key.
330. To delete a file, right click on the file (a) F6 (b) F3
and choose menu in Windows (c) F5 (d) F1
Explorer.
(a) Delete 340. To lock computer display, press
.
(b) Rename (a) Windows+R
(c) Properties (b) Windows+M/ Windows+D
(d) Decompress/ Unzip (c) Windows+P
331. To view details of a file, right click on (d) Windows+L
the file and choose menu in 341. To run a command, press
Windows Explorer. keys.
(a) Delete (a) Windows+R
(b) Rename (b) Windows+M/ Windows+D
(c) Properties (c) Windows+P
(d) Decompress/ Unzip (d) Windows+L
332. To uncompress a zip file, right click on 342. To minimize all windows and show the
the file and choose menu in desktop, press keys.
Windows Explorer. (a) Windows+R
(a) Delete (b) Windows+M/ Windows+D
(b) Rename (c) Windows+P
(c) Properties (d) Windows+L
(d) Decompress/ Unzip
343. To start print manager, press
333. In Windows, deleted file goes to keys.
. (a) Windows+R
(a) Control Panel
(b) Windows+M/ Windows+D
(b) Music
(c) Windows+P
(c) Recycle Bin
(d) Windows+L
(d) Documents
344. To open control panel, press
334. Pressing keys in Windows Ex-
keys.
plorer will permanently delete a file (by-
(a) Windows+C
passing Recycle Bin).
(b) Windows+M/ Windows+D
(a) Shift+Delete (b) Alt+Delete
(c) Windows+P
(c) Ctrl+Delete (d) Enter+Delete
(d) Windows+L
Shortcut keys in Windows 345. To open accessibility features in Win-
dows, press keys.
335. To get Windows help, press (a) Windows+K (b) Windows+V
key. (c) Windows+I (d) Windows+A
(a) F2 (b) F3 346. To open keyboard settings, press
(c) F5 (d) F1 keys.
336. To rename a file in Windows Explorer, (a) Windows+K (b) Windows+V
press key. (c) Windows+I (d) Windows+A
(a) F2 (b) F3 347. To open mouse settings, press
(c) F5 (d) F1 keys.
337. To search and find a file, press (a) Windows+K (b) Windows+V
key. (c) Windows+I (d) Windows+A
Q. Bank [COPA Semester - 1] 21

348. To start clipboard settings, press (d) Shift+F10


keys. 358. To move back to previous folder in
(a) Windows+K (b) Windows+V
Windows/File Explorer, press
(c) Windows+I (d) Windows+A
keys.
349. To toggle caps lock on or off, press (a) Alt+Enter
keys. (b) Alt+Left Arrow
(a) Windows+S (b) Windows+F (c) Shift+Delete
(c) Windows+E (d) Windows+A (d) Shift+F10
350. To start open Windows/File Explorer,
359. To permanently delete a file, press
press keys.
(a) Windows+K (b) Windows+V keys.
(a) Alt+Enter
(c) Windows+E (d) Windows+A
(b) Alt+Left Arrow
351. To close current program, press (c) Shift+Delete
keys.
(a) Alt+F4 (d) Shift+F10
(b) Alt+Tab 360. To open context menu (similar to right
(c) Alt+Down arrow clicking using mouse), press
(d) Alt+Space keys.
(a) Alt+Enter
352. To open the menu for shutdown,
restart, hibernate Windows, etc., press (b) Alt+Left Arrow
keys on Desktop. (c) Shift+Delete
(a) Alt+F4 (d) Shift+F10
(b) Alt+Tab 361. To disable Autorun for newly inserted
(c) Alt+Down arrow media, keep pressing key while
(d) Alt+Space inserting the media.
353. To move from one program window to (a) Alt (b) Ctrl
another, press keys. (c) Shift (d) Space
(a) Alt+F4 362. To move from one child window to an-
(b) Alt+Tab other, press keys.
(c) Alt+Down arrow (a) Ctrl+Tab
(d) Alt+Space (b) Ctrl+F4
354. To open pop down menu list, press (c) Ctrl+Esc
keys. (d) Ctrl+Shift+Esc
(a) Alt+F4
(b) Alt+Tab 363. To close a child window, press
keys.
(c) Alt+Down arrow
(a) Ctrl+Tab
(d) Alt+Space
(b) Ctrl+F4
355. To access system menu for a window, (c) Ctrl+Esc
press keys. (d) Ctrl+Shift+Esc
(a) Alt+F4
(b) Alt+Tab 364. To display start menu, press
(c) Alt+Down arrow keys.
(d) Alt+Space (a) Ctrl+Tab
(b) Ctrl+F4
356. To access system menu for a child win-
(c) Ctrl+Esc
dow, press keys.
(a) Alt+F4 (b) Alt+Tab (d) Ctrl+Shift+Esc
(c) Alt+- (d) Alt+Space 365. To open task manager, press
357. To view properties of selected window, keys.
press keys. (a) Ctrl+Tab
(a) Alt+Enter (b) Ctrl+F4
(b) Alt+Left Arrow (c) Ctrl+Esc
(c) Shift+Delete (d) Ctrl+Shift+Esc

Prepared by: Dr.V.Nagaradjane


22 Prepared by: Dr.V.Nagaradjane

Using scanner, printer and webcam 29. (c) 30. (b) 31. (d) 32. (d)
33. (d) 34. (c) 35. (c) 36. (d)
366. To run a peripheral unit like scan- 37. (c) 38. (d) 39. (d) 40. (d)
ner, printer or webcam, appropriate 41. (c) 42. (d) 43. (d) 44. (d)
needs to be installed first. 45. (c) 46. (d) 47. (d) 48. (c)
(a) driver (b) connector
(c) conductor (d) resistor 49. (d) 50. (c) 51. (c) 52. (a)
53. (a) 54. (a) 55. (c) 56. (d)
367. On connecting a device with pre- 57. (a) 58. (c) 59. (d) 60. (b)
installed driver, Windows .
(a) rejects the device 61. (d) 62. (d) 63. (c) 64. (d)
(b) displays unknown hardware message 65. (c) 66. (a) 67. (a) 68. (b)
(c) initializes the device and makes it ready to 69. (d) 70. (d) 71. (d) 72. (b)
work 73. (a) 74. (a) 75. (b) 76. (a)
(d) does not care about the new device 77. (b) 78. (d) 79. (d) 80. (a)
368. Scanned images may be acquired using 81. (c) 82. (b) 83. (b) 84. (b)
software. 85. (b) 86. (a) 87. (c) 88. (a)
(a) scanner specific 89. (c) 90. (b) 91. (d) 92. (a)
(b) MS Paint 93. (b) 94. (d) 95. (c) 96. (a)
(c) Photoshop 97. (a) 98. (b) 99. (d) 100. (c)
(d) all of them 101. (d) 102. (b) 103. (a) 104. (c)
369. Printer settings permit selection of ap- 105. (a) 106. (b) 107. (c) 108. (a)
propriate of paper. 109. (d) 110. (c) 111. (b) 112. (a)
(a) size 113. (b) 114. (c) 115. (c) 116. (c)
(b) orientation (portrait or landscape) 117. (a) 118. (b) 119. (c) 120. (c)
(c) thickness (in GSM) 121. (a) 122. (b) 123. (c) 124. (a)
(d) all of them 125. (c) 126. (b) 127. (d) 128. (a)
370. A web camera is normally suitable for 129. (b) 130. (c) 131. (d) 132. (a)
. 133. (b) 134. (c) 135. (a) 136. (c)
(a) low resolution images 137. (b) 138. (a) 139. (d) 140. (d)
(b) streaming videos during video conferencing 141. (d) 142. (c) 143. (b) 144. (a)
(c) both a & b 145. (a) 146. (b) 147. (b) 148. (a)
(d) none of them 149. (a) 150. (b) 151. (d) 152. (b)
371. Web camera is normally for 153. (c) 154. (d) 155. (c) 156. (d)
high resolution photography. 157. (d) 158. (c) 159. (a) 160. (b)
(a) recommended (b) not suitable 161. (c) 162. (d) 163. (b) 164. (c)
(c) used (d) suitable 165. (d) 166. (a) 167. (d) 168. (c)
372. Voice Over Internet Protocol (VOIP) 169. (a) 170. (a) 171. (c) 172. (b)
programs like make use of 173. (c) 174. (d) 175. (a) 176. (c)
web camera. 177. (b) 178. (d) 179. (b) 180. (d)
(a) Skype
181. (c) 182. (b) 183. (c) 184. (a)
(b) Hangouts/ Yahoo messenger
185. (d) 186. (b) 187. (c) 188. (a)
(c) WhatsApp/ Viber
189. (a) 190. (d) 191. (b) 192. (c)
(d) all of them
193. (a) 194. (b) 195. (d) 196. (b)
197. (c) 198. (a) 199. (d) 200. (c)
Answers (1 - 372) 201. (a) 202. (c) 203. (a) 204. (c)
205. (d) 206. (a) 207. (b) 208. (a)
1. (a) 2. (c) 3. (b) 4. (d) 209. (c) 210. (d) 211. (a) 212. (b)
5. (b) 6. (d) 7. (a) 8. (d) 213. (c) 214. (b) 215. (a) 216. (a)
9. (c) 10. (b) 11. (a) 12. (a) 217. (b) 218. (c) 219. (c) 220. (a)
13. (b) 14. (b) 15. (d) 16. (a) 221. (d) 222. (a) 223. (c) 224. (c)
17. (a) 18. (c) 19. (a) 20. (d) 225. (a) 226. (b) 227. (d) 228. (c)
21. (d) 22. (b) 23. (b) 24. (a) 229. (c) 230. (b) 231. (d) 232. (c)
25. (b) 26. (c) 27. (c) 28. (c) 233. (a) 234. (b) 235. (d) 236. (c)
Q. Bank [COPA Semester - 1] 23

237. (b) 238. (b) 239. (a) 240. (c) 305. (d) 306. (c) 307. (d) 308. (a)
241. (c) 242. (a) 243. (c) 244. (d) 309. (d) 310. (c) 311. (a) 312. (b)
245. (b) 246. (a) 247. (b) 248. (a) 313. (c) 314. (a) 315. (b) 316. (d)
249. (d) 250. (c) 251. (a) 252. (b) 317. (c) 318. (a) 319. (b) 320. (a)
253. (d) 254. (a) 255. (d) 256. (c) 321. (a) 322. (b) 323. (a) 324. (c)
257. (d) 258. (b) 259. (b) 260. (b) 325. (d) 326. (a) 327. (c) 328. (b)
261. (b) 262. (b) 263. (a) 264. (b) 329. (d) 330. (a) 331. (c) 332. (d)
265. (d) 266. (c) 267. (b) 268. (d) 333. (c) 334. (a) 335. (d) 336. (a)
269. (d) 270. (a) 271. (b) 272. (d) 337. (b) 338. (c) 339. (a) 340. (d)
273. (a) 274. (b) 275. (d) 276. (c) 341. (a) 342. (b) 343. (c) 344. (a)
277. (d) 278. (c) 279. (b) 280. (b) 345. (d) 346. (a) 347. (c) 348. (b)
281. (d) 282. (a) 283. (c) 284. (b) 349. (a) 350. (c) 351. (a) 352. (a)
285. (c) 286. (a) 287. (b) 288. (d) 353. (b) 354. (c) 355. (d) 356. (c)
289. (d) 290. (d) 291. (d) 292. (a) 357. (a) 358. (b) 359. (c) 360. (d)
293. (a) 294. (d) 295. (b) 296. (c) 361. (c) 362. (a) 363. (b) 364. (c)
297. (d) 298. (c) 299. (a) 300. (a) 365. (d) 366. (a) 367. (c) 368. (d)
301. (c) 302. (d) 303. (a) 304. (b) 369. (d) 370. (c) 371. (b) 372. (d)

Prepared by: Dr.V.Nagaradjane


24 Prepared by: Dr.V.Nagaradjane

1.2 Computer Administration (c) EPROM (d) EEPROM


11. Memory which can be erased using elec-
1. The power on process of a computer is tric current and reprogrammed is called
called . .
(a) waking up (a) RAM (b) ROM
(b) boot strapping (c) EPROM (d) EEPROM
(c) formatting
12. ROM stands for .
(d) installing (a) Random Ordinary Memory
2. The test performed by computer to iden- (b) Read Only Memory
tify the hardware peripherals and units (c) Read Ordinary Memory
attached to it is called . (d) Read Only Mail
(a) Power On Self Test
(b) Disk Defragmenting 13. EPROM stands for .
(c) formatting (a) Erasable Partition Read Only Memory
(d) scandisk (b) Erasable Pointer Read Only Memory
In booting of computer, POST is ex- (c) Extended Programmable Read Only Memory
3.
panded as . (d) Erasable Programmable Read Only Memory
(a) Power On Self Test 14. EEPROM stands for .
(b) Disk Defragmenting (a) Electrically Erasable Programmable Read Only
(c) formatting Memory
(d) scandisk (b) Extremely Erasable Programmable Read Only
Primary boot process is otherwise called Memory
4. (c) Effectively Erasable Programmable Read Only
.
(a) POST Memory
(b) loading of operating system (d) Extended Erasable Programmable Read Only
(c) installation Memory
(d) formatting 15. keeps CMOS is in power
on condition.
5. Full form of BIOS is . (a) Hard disk
(a) Bare Input Output System (b) RAM
(b) Basic Intermediate Operating System (c) SMPS
(c) Banned Input Output System (d) CMOS Battery (CR2032)
(d) Basic Input Output System
16. After booting process, BIOS helps in
6. Essential settings like date, time, boot .
order, etc. needed for BIOS at boot (a) data transfer
time are stored in . (b) processing
(a) POST (b) CMOS (c) graphics
(c) Hard Disk (d) DVD (d) cloud storage
7. In computer mother board, CMOS 17. First part of boot loader accessed from
stands for . BIOS chip is called .
(a) Corroded Metal Oxide Semiconductor
(a) intermediate boot loader
(b) Contact Metal Oxide Semiconductor
(b) tertiary boot loader
(c) Complementary Metal Oxide Semiconductor
(c) secondary boot loader
(d) Complementary Metal Oxide Syntax
(d) primary boot loader
8. CMOS is a .
18. On completion of POST, the computer
(a) RAM (b) ROM
emits .
(c) EPROM (d) EEPROM (a) foul odour (b) music
9. Memory which can be written only once (c) beep (d) water
is called . 19. The second part of boot loader respon-
(a) RAM (b) ROM
sible for booting the operating system is
(c) EPROM (d) EEPROM
called .
10. Memory which can be erased and repro- (a) intermediate boot loader
grammed is called . (b) tertiary boot loader
(a) RAM (b) ROM (c) secondary boot loader
Q. Bank [COPA Semester - 1] 25

(d) primary boot loader (c) power problem


20. GRUB stands for . (d) mother board problem
(a) GRand Unified Boot Loader 29. 2 short beeps during POST denotes
(b) Generic Unified Boot Loader of computer.
(c) Grand United Boot Loader (a) normal boot
(d) Great Unified Boot Loader (b) error code displayed on screen
21. In booting a computer, MBR stands for (c) power problem
. (d) mother board problem
(a) Master Boot Reader 30. Continuous beep or repeated
(b) Multi Boot Record short beeps during POST denotes
(c) Meta Boot Record of computer.
(d) Master Boot Record (a) normal boot
22. In booting a computer, BOOTMGR (b) error code displayed on screen
stands for . (c) power problem
(a) Best Master (b) Boot Man (d) mother board problem
(c) Boot Manager (d) Boot Mirage
31. 1 long and 2 short beeps during POST
23. In booting a computer, NTLDR stands denotes of computer.
for . (a) video card (VGA) problem
(a) Next Technology LoaDeR (b) keyboard error
(b) New Technology LoaDeR (c) power problem
(c) New Terminal LoaDeR (d) mother board problem
(d) New Talent LoaDeR
32. 1 long and 3 short beeps during POST
24. In booting a computer, UEFI stands for denotes of computer.
. (a) video card (EGA) problem
(a) Unified Extensible Firmware Interface
(b) United Extensible Firmware Interface (b) keyboard error
(c) Universal Extensible Firmware Interface (c) power problem
(d) Uniform Extensible Firmware Interface (d) mother board problem
25. In booting a computer, ESP stands for 33. 3 long beeps during POST denotes
. of computer.
(a) EFI System Package (a) video card (EGA) problem
(b) EFI Sorted Partition (b) keyboard error
(c) EFI System Partition (c) power problem
(d) EFI Self Partition (d) mother board problem

1.2.1 Booting error signals 1.2.2 BIOS settings


26. The type of error signal depends upon 34. CMOS is a type of .
of the computer. (a) ROM (b) DVD
(a) power switch (c) CD (d) RAM
(b) manufacturer of the BIOS chip 35. CMOS is kept powered on using
(c) type of monitor .
(d) type of keyboard (a) AA battery
27. 1 short beep during POST denotes (b) AAA battery
of computer. (c) CMOS battery (CR2032)
(a) normal boot (d) wet cell battery
(b) error code displayed on screen 36. When CMOS battery fails, all BIOS set-
(c) power problem tings are .
(d) mother board problem (a) remembered (b) lost
28. 1 short and 1 long beeps during POST (c) maintained (d) kept stored
denotes of computer. 37. BIOS settings may be accessed by press-
(a) normal boot ing key immediately after
(b) error code displayed on screen switching power supply on.

Prepared by: Dr.V.Nagaradjane


26 Prepared by: Dr.V.Nagaradjane

(a) DEL 46. When the menu for managing hard disk
(b) F2 partitions is displayed, op-
(c) ESC tions help to create, delete and format
(d) any one of them partitions.
Usually, date, time, drive options, mem- (a) New (b) Delete
38.
ory details, etc. are accessible under (c) Format (d) all of them
menu of BIOS settings. 47. After choosing a suitable partition for
(a) Advanced (b) Main installation of Windows, .
(c) Power (d) Boot (a) delete that partition
Usually, processor configuration, on (b) select that partition and press Next button
39.
board settings of motherboard, USB (c) press Ctrl+Alt+Delete
configuration, etc. are accessible under (d) Switch off power supply
menu of BIOS settings. 48. Durign installation of Windows, the
(a) Advanced (b) Main computer after copying
(c) Power (d) Boot files, installing features.
Usually, power options are accessible un- (a) reboots
40.
der menu of BIOS settings. (b) keeps on processing
(a) Advanced (b) Main (c) keeps on beeping
(c) Power (d) Boot (d) plays music
41. Usually, UEFI settings, order of boot 49. During installation of Windows, user
media, etc. are accessible under names and passwords are entered
menu of BIOS settings. the operating system gets
(a) Advanced (b) Main fully ready.
(c) Power (d) Boot (a) before
Passwords for user and administra- (b) after
42.
tor of BIOS may be accessed using (c) only after
menu of BIOS settings. (d) subsequent to
(a) Advanced (b) Security 50. After completing installation of Win-
(c) Power (d) Boot dows, are to be installed
43. Options for saving or discarding changes for making the computer safe and pro-
and exiting BIOS settings is accessible ductive.
(a) anti-virus
from menu of BIOS set-
(b) Office package
tings.
(a) Advanced (b) Security (c) Adobe Reader and other application software
(c) Power (d) Exit packages
(d) all of them

1.2.3 Installation of windows operat- 1.2.4 Common computer problems


ing system and solutions
44. After inserting the Windows installation
51. For many problems, the com-
media (like CD, DVD or pen drive),
puter solves the troubles.
message is displayed. (a) rebooting (b) selling off
(a) Press any key to boot from CD/ DVD ...
(c) condemning (d) cursing
(b) Press Ctrl+Alt+Delete
(c) Press left button of mouse 52. If the computer is very slow,
(d) Press centre button of mouse .
(a) unplug Internet connection
45. When Windows loads during installa- (b) open task manager (Ctrl+Shift+ESC or
tion, are to be chosen first. Ctrl+Alt+Delete)
(a) keyboard layout (c) right click and end runaway programs
(b) language selection for installation (d) try any one or all the techniques
(c) both a & b
53. When the computer exhibits unpre-
(d) neither a nor b
dictable behaviour, .
Q. Bank [COPA Semester - 1] 27

(a) remove all peripherals except keyboard, mouse (c) start print spooler service from control panel
and monitor and reboot (d) all of them
(b) identify the erring peripheral by connecting 61. If a PC displays access violation error
each peripheral one by one and reboots in the middle of working,
(c) try system restore to a previous date
.
(d) all of them (a) check the RAM chip
54. When the PC does not boot, try (b) replace the RAM chip and try whether the
. problem continues
(a) verify power cables (c) both a & b
(b) check whether green LED on mother board (d) neither a nor b
glows If the Internet connection is very slow,
(c) switch on SMPS power switch, if any, and ver- 62.
do .
ify whether the SMPS fan runs (a) disable automatic software updates
(d) all of them (b) stop cloud storage services like drop box, one
55. If a computer emits beeps and halts, do drive, iCloud, etc. from syncing on slow con-
to make the computer work nection
again. (c) stop messenger services which have opened at
(a) remove RAM, clean and refix boot time
(b) remove VGA cable and reconnect (d) all of them
(c) remove CMOS battery (CR2032) and replace 63. If a program does not install or closes
it with new one just after install screen opens, do
(d) all or any one of them .
56. If computer displays the error message (a) check whether the program is compatible to
”Insert boot media”, do . the operating system (64 bit or 32 bit)
(a) modify BIOS settings to boot from hard disk (b) right click on setup program and choose Run
(b) configure the BIOS to boot from alternate in- as Administrator
stallation media like CD/DVD (c) try to run the program in compatibility mode
(c) reboot to try whether secondary boot process (d) all of them
starts 64. When there is a paper jam in printer, do
(d) all of them .
57. When boot is halted due to wrong BIOS (a) switch off printer
settings, . (b) open the lid
(a) press DEL, F2 or ESC key to enter BIOS set- (c) gently remove the jammed paper
tings (d) all of them
(b) set correct date and time
(c) set correct boot order
(d) all of them Answers (373 - 436)
58. If a computer does not switch on, do
1. (b) 2. (a) 3. (a) 4. (a)
.
(a) check power cables 5. (d) 6. (b) 7. (c) 8. (a)
(b) check whether SMPS is running 9. (b) 10. (c) 11. (d) 12. (b)
(c) switch on SMPS, if it has any switch 13. (d) 14. (a) 15. (d) 16. (a)
(d) all of them 17. (d) 18. (c) 19. (c) 20. (a)
59. If a computer looses BIOS settings after 21. (d) 22. (c) 23. (b) 24. (a)
each power off, do . 25. (c) 26. (b) 27. (a) 28. (d)
(a) replace CMOS battery (CR2032) 29. (b) 30. (c) 31. (a) 32. (a)
(b) sell off the computer 33. (b) 34. (d) 35. (c) 36. (b)
(c) switch off the computer 37. (d) 38. (b) 39. (a) 40. (c)
(d) clean the computer 41. (d) 42. (b) 43. (d) 44. (a)
60. If printer does not work in a computer, 45. (c) 46. (d) 47. (b) 48. (a)
do . 49. (a) 50. (d) 51. (a) 52. (d)
(a) check PC to printer connection 53. (d) 54. (d) 55. (d) 56. (d)
(b) check whether appropriate driver has been in- 57. (d) 58. (d) 59. (a) 60. (d)
stalled for the printer 61. (c) 62. (d) 63. (d) 64. (d)

Prepared by: Dr.V.Nagaradjane


28 Prepared by: Dr.V.Nagaradjane

1.3 MS DOS and Linux 11. Of the following alternatives,


command displays current
1.3.1 MS DOS value of path variable.
(a) CLS %PATH%
1. MS DOS stands for . (b) PROMPT %PATH%
(a) MicroSoft Disk Operating System (c) PAUSE %PATH%
(b) MicroSecond Disk Operating System (d) ECHO %PATH%
(c) MicroSoft Dirty Operating System 12. A new folder (e.g., C :
(d) Microsoft Disk Opening System \U SERS\COP A\BIN ) may be
2. MS DOS was first released in the year appended to PATH variable using the
. command .
(a) 1969 (b) 1972 (a) SET PATH=%PATH%;C :
(c) 1981 (d) 2000 \U SERS\COP A\BIN
3. All development activities on MS DOS (b) export PATH=$PATH;C :
ceased in the year . \U SERS\COP A\BIN
(a) 1969 (b) 1972 (c) CLS %PATH%;C : \U SERS\COP A\BIN
(c) 1981 (d) 2000 (d) PAUSE %PATH%;C :
4. The last version of MS DOS was \U SERS\COP A\BIN
. 13. To clear screen contents,
(a) 7.0 (b) 8.0 command is used.
(c) 9.0 (d) 10.0 (a) VER (b) DIR
(c) CLS (d) VOL
5. MS DOS executable files normally have
extension. 14. command displays version
(a) .EXE (b) .COM number of MS DOS.
(c) .BAT (d) all of them (a) VER (b) DIR
The commands loaded to main mem- (c) CLS (d) VOL
6.
ory along with MS DOS operating sys- 15. command displays the list of
tem are called DOS com- files and directories.
(a) VER (b) DIR
mands.
(a) internal (b) external (c) CLS (d) VOL
(c) useless (d) unwanted 16. command displays volume
7. The commands stored in a disk and label of given drive.
loaded to main memory only when first (a) VER (b) DIR
invoked are called DOS (c) CLS (d) VOL
commands. 17. command displays current
(a) internal (b) external date and gets new date for resetting.
(c) useless (d) unwanted (a) DATE
8. If a file has .BAT extension and contains (b) TIME
a list of commands to be executed, the (c) COPY
file is called a file. (d) COPY CON < f ile.txt >
(a) database (b) temporary DATE command should be run as
18.
(c) batch (d) shell script to set new date.
(a) unknown user
1.3.2 Internal DOS commands (b) guest user
(c) ordinary user
9. Typical first line in a DOS batch file is (d) Administrator
. 19. Recommended format for entering new
(a) @ECHO OFF (b) DIR
date using DATE command (in Indian
(c) MD (d) RD
locale) is .
10. The list of directories in which exter- (a) yyy-ddd-mmm (b) yy-dd-mm
nal DOS commands will be searched is (c) dd-mm-yy (d) yyy-mm-dd
called .
(a) WINDIR (b) PATH 20. command displays current
(c) HOME (d) VER date and gets new date for resetting.
Q. Bank [COPA Semester - 1] 29

(a) DATE 29. To delete a file, DOS com-


(b) TIME mand is used.
(c) COPY (a) MOVE (b) DEL
(d) COPY CON < f ile.txt > (c) COPY (d) MKDIR
21. command displays current 30. issuing the DOS command DEL *.*
time and gets new time for resetting. deletes .
(a) last file in the current directory
(a) DATE
(b) parent directory
(b) TIME
(c) current directory
(c) COPY
(d) all files in current directory
(d) COPY CON < f ile.txt >
22. TIME command should be run as 31. To change from one directory to an-
to set new time. other, DOS command is
(a) unknown user used.
(b) guest user (a) CD (b) MD
(c) ordinary user (c) RD (d) ATTRIB
(d) Administrator 32. command may also be
Recommended format for entering new used in place of the DOS command CD.
23.
(a) CHDIR (b) MKDIR
date using TIME command (in Indian
(c) RMDIR (d) ERASE
locale) is .
(a) hh:mm:ss (b) mm:ss:hh 33. command may also be
(c) ss:mm:hh (d) mm:hh:ss used in place of the DOS command MD.
(a) CHDIR (b) MKDIR
24. command creates a text file
(c) RMDIR (d) ERASE
(named file.txt) and saves keyboard in-
put to that file. 34. command may also be
(a) DATE used in place of the DOS command RD.
(b) TIME (a) CHDIR (b) MKDIR
(c) COPY (c) RMDIR (d) ERASE
(d) COPY CON < f ile.txt > 35. command may also be
25. To end the input to the command COPY used in place of the DOS command
CON < f ile.txt > and to save text to DEL.
(a) CHDIR (b) MKDIR
that file, enter .
(a) Ctrl+Z Ctrl+C Enter (c) RMDIR (d) ERASE
(b) Ctrl+X Ctrl+C Enter 36. To create a directory, DOS
(c) Ctrl+Z Ctrl+C Shift command may be used.
(d) Ctrl+Z Ctrl+X Enter (a) CD/ CHDIR (b) MD/ MKDIR
(c) RD/ RMDIR (d) DEL/ ERASE
26. To display the contents of a file (e.g.,
FILE.TXT) on the screen, issue the 37. To remove a directory, DOS
command . command may be used.
(a) MKDIR FILE.TXT (a) CD/ CHDIR (b) MD/ MKDIR
(b) DEL FILE.TXT (c) RD/ RMDIR (d) DEL/ ERASE
(c) TYPE FILE.TXT 38. Issuing command causes
(d) MOVE FILE.TXT .. commands in a batch file to be hidden.
To create copy of an existing file (a) ECHO OFF (b) ECHO ON
27.
(F 1.T XT ) in a new name (F 2.T XT ), (c) PAUSE (d) PROMPT
issue the command . 39. Issuing command causes
(a) COPY F1.TXT F2.TXT commands in a batch file to be visible.
(b) DEL F1.TXT F2.TXT (a) ECHO OFF (b) ECHO ON
(c) REN F1.TXT F2.TXT (c) PAUSE (d) PROMPT
(d) ATTRIB +H F1.TXT F2.TXT 40. To display the value of PATH environ-
28. To create a copy of one file in a new ment variable, of the fol-
name, command is used. lowing commands is useful.
(a) MOVE (b) REN (a) SET %PATH%
(c) COPY (d) MKDIR (b) PAUSE %PATH%

Prepared by: Dr.V.Nagaradjane


30 Prepared by: Dr.V.Nagaradjane

(c) DEL %PATH% (c) MOVE (d) ASSIGN


(d) ECHO %PATH% 51. The command changes file
41. The environment variable attributes like archive, hidden or read-
in DOS contains the list of folders in only.
which commands would be searched. (a) ATTRIB (b) APPEND
(a) PATH (b) CLASSPATH (c) MOVE (d) ASSIGN
(c) WINDIR (d) HOME
52. To hide a file (say FILE.TXT),
42. The environment variable DOS command is used.
in DOS contains the name of home di- (a) ATTRIB -A FILE.TXT
rectory for current user. (b) ATTRIB +A FILE.TXT
(a) PATH (b) CLASSPATH (c) ATTRIB -H FILE.TXT
(c) WINDIR (d) HOME (d) ATTRIB +H FILE.TXT
43. To rename a file (X.TXT) to a new 53. To unhide a file (say FILE.TXT),
name (Y.TXT), which of the following DOS command is used.
commands would be suitable? (a) ATTRIB -A FILE.TXT
(a) COPY X.TXT Y.TXT (b) ATTRIB +A FILE.TXT
(b) REN X.TXT Y.TXT (c) ATTRIB -H FILE.TXT
(c) MKDIR X.TXT (d) ATTRIB +H FILE.TXT
(d) DEL X.TXT Y.TXT 54. To set archive attribute to file (say
44. To hold the processing of commands till FILE.TXT), DOS com-
any key is pressed, DOS mand is used.
command is used. (a) ATTRIB -A FILE.TXT
(a) SLEEP (b) PROMPT (b) ATTRIB +A FILE.TXT
(c) PAUSE (d) SET (c) ATTRIB -H FILE.TXT
45. To change the command prompt in MS (d) ATTRIB +H FILE.TXT
DOS, command is used. 55. To remove archive attribute from file
(a) SLEEP (b) PROMPT (say FILE.TXT), DOS
(c) PAUSE (d) SET command is used.
46. To set value for an environment vari- (a) ATTRIB -A FILE.TXT
able in MS DOS, command (b) ATTRIB +A FILE.TXT
is used. (c) ATTRIB -H FILE.TXT
(a) SLEEP (b) PROMPT (d) ATTRIB +H FILE.TXT
(c) PAUSE (d) SET
56. To set a file (say FILE.TXT) to read-
47. To create a remarks line (which is ig- only mode, DOS com-
nored during processing) in MS DOS, mand is used.
command is used. (a) ATTRIB -A FILE.TXT
(a) REM (b) PROMPT (b) ATTRIB +A FILE.TXT
(c) PAUSE (d) SET (c) ATTRIB +R FILE.TXT
48. command closes the MS (d) ATTRIB -R FILE.TXT
DOS session. 57. To set a file (say FILE.TXT) to read
(a) CLS (b) PAUSE
(c) EXIT (d) REM write (i.e., to remove read-only at-
tribute) mode, DOS com-
mand is used.
1.3.3 External DOS Commands (a) ATTRIB -A FILE.TXT
(b) ATTRIB +A FILE.TXT
49. The command (removed in (c) ATTRIB +R FILE.TXT
the latest version of MS DOS) adds (d) ATTRIB -R FILE.TXT
given string to the end of PATH envi-
58. MS DOS command (re-
ronment variable.
(a) SORT (b) APPEND moved from latest version of MS DOS)
(c) MOVE (d) ASSIGN creates a backup of all files having
archive attribute.
50. The command changes (a) CHKDSK (b) BACKUP
given drive to a new name. (c) COMMAND.COM (d) COMP
(a) SORT (b) APPEND
Q. Bank [COPA Semester - 1] 31

59. MS DOS command ver- (a) FC (b) EDIT


ifies file system in given drive and repairs (c) EDLIN (d) EXPAND
the file system if necessary. 71. MS DOS command
(a) CHKDSK (b) BACKUP compares 2 files.
(c) COMMAND.COM (d) COMP (a) FC (b) EDIT
60. MS DOS command is (c) EDLIN (d) EXPAND
the DOS shell. 72. MS DOS command
(a) CHKDSK (b) BACKUP
(c) COMMAND.COM (d) COMP helps to create and manage partitions
in hard disk.
61. MS DOS command (a) FDISK (b) FORMAT
compares two files and reports any dif- (c) EDLIN (d) EXPAND
ferences. MS DOS command for-
(a) CHKDSK (b) BACKUP 73.
(c) COMMAND.COM (d) COMP mats (creates new file system on) given
partition.
62. MS DOS command (a) FDISK (b) FORMAT
helps to debug a program and inspect (c) EDLIN (d) EXPAND
values stored in variables.
(a) DEBUG (b) DISKCOMP 74. MS DOS command dis-
(c) DISKCOPY (d) DOSKEY plays help information about given com-
63. MS DOS command mand.
(a) FDISK (b) FORMAT
keeps history of previous DOS com-
(c) HELP (d) LABEL
mands and permits navigation on press-
ing UP or DOWN arrows. 75. MS DOS command dis-
(a) DEBUG (b) DISKCOMP plays disk label.
(c) DISKCOPY (d) DOSKEY (a) FDISK (b) FORMAT
(c) HELP (d) LABEL
64. MS DOS command
compares the contents of 2 disks and 76. MS DOS command dis-
reports the differences, if any. plays volume details.
(a) DEBUG (b) DISKCOMP (a) VOL (b) FORMAT
(c) DISKCOPY (d) DOSKEY (c) HELP (d) LABEL
65. MS DOS command 77. MS DOS command dis-
copies the contents of one disk to an- plays memory usage details.
other. (a) MOVE (b) MEM
(a) DEBUG (b) DISKCOMP (c) MIRROR (d) MORE
(c) DISKCOPY (d) DOSKEY 78. MS DOS command cre-
66. MS DOS command dis- ates a backup file for restoration of data
plays a visual window for accessing files at a later date.
and folders. (a) MOVE (b) MEM
(a) DOSSHEL (b) DISKCOMP (c) MIRROR (d) MORE
(c) DISKCOPY (d) DOSKEY 79. MS DOS command cre-
67. MS DOS command ates a new copy of the file and deletes
opens a full screen editor. the source file.
(a) FC (b) EDIT (a) MOVE (b) MEM
(c) EDLIN (d) EXPAND (c) MIRROR (d) MORE
68. MS DOS command ed- 80. MS DOS command
its text data line by line. displays screen output in readable
(a) FC (b) EDIT chunks/pages.
(c) EDLIN (d) EXPAND (a) MOVE (b) MEM
69. MS DOS command ex- (c) MIRROR (d) MORE
pands a compressed file. 81. MS DOS command
(a) FC (b) EDIT prints a file to the default printer.
(c) EDLIN (d) EXPAND (a) SCANDISK (b) SORT
70. MS DOS command
compares 2 files with text or binary con-
tent.
Prepared by: Dr.V.Nagaradjane
32 Prepared by: Dr.V.Nagaradjane

(c) PRINT (d) SYS (a) green cards (b) white cards
82. MS DOS command (re- (c) SIM cards (d) wild cards
moved in the latest version of MS DOS) 92. wild card matches any
checks and repairs files in given drive. number of characters in the name.
(a) SCANDISK (b) SORT (a) * (b) ?
(c) PRINT (d) SYS (c) & (d) $
83. MS DOS command 93. wild card matches a single
sorts the contents of file in alphabetic character.
or numerical order. (a) * (b) ?
(a) SCANDISK (b) SORT (c) & (d) $
(c) PRINT (d) SYS
84. MS DOS command 1.3.6 Open Source Software (OSS)
copy system files and make a disk
bootable. 94. Any software (paid or free), for which
(a) SCANDISK (b) SORT source code is available is called
(c) PRINT (d) SYS .
85. MS DOS command (a) open source software
displays files and folders in a tree struc- (b) free software
ture. (c) virus software
(a) TREE (b) UNDELETE (d) hacked software
(c) XCOPY (d) MOVE 95. helps capable users to im-
86. MS DOS command prove and bug fix the software.
restores the latest file deleted from MS (a) open source software
DOS file system. (b) closed source software
(a) TREE (b) UNDELETE (c) virus software
(c) XCOPY (d) MOVE (d) hacked software
87. MS DOS command 96. model of software helps de-
copies files, directories and subdirecto- velopers across the world to cooperate
ries. in development of software.
(a) TREE (b) UNDELETE (a) open source software
(c) XCOPY (d) MOVE (b) closed source software
(c) virus software
1.3.4 Output redirection in MS DOS (d) hacked software
97. An example of the most popular open
88. redirector writes output of source software is .
a program to a new file, deleting the old (a) Mozilla Firefox browser, GIMP image editor,
contents, if any. QCAD drafting tool, Blender 3D modelling
(a) > (b) >> software
(c) | (d) none of them (b) Linux operating system
89. redirector appends output (c) Open office, Libre Office, KOffice, gnumeric,
of a program to an existing file, creating AbiWord, Scribus
(d) all of them
the file if it does not exist.
(a) > (b) >> 98. are some of the open
(c) | (d) none of them source licensing models.
90. redirector sends output of (a) GNU GPL/ GNU LGPL
a program to another program as input. (b) Apache lincense
(a) > (b) >> (c) BSD/ MIT/ Eclipse/ Mozilla license
(c) | (d) none of them (d) all of them
99. GNU GPL stands for .
1.3.5 Wild cards in MS DOS (a) GNU General Public License
(b) GNU Lesser General Public License
91. The *, ? characters in MS DOS are (c) GNU Not Unix
called . (d) GNU Image Manipulation Programme
Q. Bank [COPA Semester - 1] 33

100. GNU LGPL stands for (c) Korn-shell


and it permits embedding open source (d) none of them
libraries in closed source projects. 109. The Linux shell having features simi-
(a) GNU General Public License lar to the C-Programming language is
(b) GNU Lesser General Public License called .
(c) GNU Not Unix (a) Bourne Again SHell
(d) GNU Image Manipulation Programme (b) C-Shell
101. GNU stands for . (c) Korn-shell
(a) GNU General Public License (d) none of them
(b) GNU Lesser General Public License 110. shell was released by AT&T
(c) GNU Not Unix as an improvement to the Bourne shell.
(d) GNU Image Manipulation Programme (a) Bourne Again SHell
102. GIMP stands for . (b) C-Shell
(a) GNU General Public License (c) Korn-shell
(b) GNU Lesser General Public License (d) none of them
(c) GNU Not Unix 111. The command csh in Linux opens
(d) GNU Image Manipulation Programme shell.
(a) Bourne Again SHell
103. founded the GNU project (b) C-Shell
to create an alternative to UNIX oper- (c) Korn-shell
ating system from scratch. (d) none of them
(a) Richard Stallman
(b) Linus Torvalds 112. The command ksh in Linux opens
(c) Dennis Ritchie shell.
(a) Bourne Again SHell
(d) Brian Kernighan
(b) C-Shell
104. created and released Linux (c) Korn-shell
operating system. (d) none of them
(a) Richard Stallman
(b) Linus Torvalds 113. Any shell script begins with the line
to denote the name of the
(c) Dennis Ritchie
shell to be used for interpretation.
(d) Brian Kernighan
(a) #!/bin/sh
105. Linux operating system was released in (b) #!/bin/csh
the year . (c) #!/bin/ksh
(a) 1969 (b) 1972 (d) any one of them
(c) 1981 (d) 1991
106. The core of the Linux operating system,
which manages files, peripherals and 1.3.7 Linux shell commands
other resources, is called .
(a) kernel 114. To display the list of files and directories,
Linux command is used.
(b) shell (a) ls (b) chmod
(c) neither a nor b (c) mkdir (d) rmdir
(d) both a and b
115. Linux command creates a
107. The software which helps the user to new directory.
communicate with the kernel of Linux (a) ls (b) chmod
operating system is called . (c) mkdir (d) rmdir
(a) kernel
116. Linux command removes
(b) shell
given directory.
(c) neither a nor b (a) ls (b) chmod
(d) both a and b (c) mkdir (d) rmdir
108. Bash in Linux shell stands for 117. Linux command changes the
. access mode of a file.
(a) Bourne Again SHell (a) pwd (b) chmod
(b) C-Shell (c) mkdir (d) rmdir

Prepared by: Dr.V.Nagaradjane


34 Prepared by: Dr.V.Nagaradjane

118. The numeric value of read permission is (a) user (b) group
. (c) world (d) all of them
(a) 4 (b) 2
130. Linux command creates a
(c) 1 (d) 0
copy of given file in new name.
119. The numeric value of write permission is (a) cp (b) ln
. (c) mv (d) cd
(a) 4 (b) 2
(c) 1 (d) 0 131. Linux command creates a
link to the current file (not a full copy
120. In Linux, the numeric value of execute
permission is . of the file).
(a) 4 (b) 2 (a) cp (b) ln
(c) 1 (d) 0 (c) mv (d) cd
121. In Linux, a file having read and write 132. Linux command deletes
permissions would have a numeric value the source file and creates copy of the
of as argument to chmod. source file in a new name.
(a) cp (b) ln
(a) 6 (b) 7
(c) mv (d) cd
(c) 4 (d) 5
133. Linux command helps
122. In Linux, a file having read only per-
missions would have a numeric value of user to change current working direc-
as argument to chmod. tory.
(a) 6 (b) 7 (a) cp (b) ln
(c) 4 (d) 5 (c) mv (d) cd
123. In Linux, a file having read, write and 134. Linux command displays
execute permissions would have a nu- full path of the current directory.
(a) cp (b) pwd
meric value of as argument
(c) mv (d) cd
to chmod.
(a) 6 (b) 7 135. In Linux, the character . denotes
(c) 4 (d) 5 directory.
124. In Linux, a file having read and execute (a) current (b) parent
permissions would have a numeric value (c) home (d) root
of as argument to chmod. 136. In Linux, the characters .. denote
(a) 6 (b) 7 directory.
(c) 4 (d) 5 (a) current (b) parent
125. In Linux, access permission meant for (c) home (d) root
. 137. In Linux, the character denotes
(a) user (b) group directory.
(c) world (d) all of them (a) current (b) parent
126. In Linux, first value of permission pro- (c) home (d) root
vided to chmod command is meant for 138. In Linux, the character / denotes
. directory.
(a) user (b) group
(a) current (b) parent
(c) world (d) all of them
(c) home (d) root
127. In Linux, second value of permission pro-
vided to chmod command is meant for 139. In Linux, command is used
to mount a new file system.
. (a) eject (b) mount
(a) user (b) group
(c) world (d) all of them (c) umount (d) shutdown
128. In Linux, third value of permission pro- 140. In Linux, command is used
vided to chmod command is meant for to unmount a new file system.
. (a) eject (b) mount
(a) user (b) group (c) umount (d) shutdown
(c) world (d) all of them
129. Any person unrelated to the current
user or the group of the current user is
treated with permissions.
Q. Bank [COPA Semester - 1] 35

141. In Linux, command ejects (c) gzip (d) ls -l


removable media drive like CD/DVD 152. Linux command unzips a
drive. zip file.
(a) eject (b) mount (a) tar (b) unzip
(c) umount (d) shutdown (c) gunzip (d) ls -l
142. In Linux, command should 153. Linux command unpacks a
be run as root user to shutdown the gzip file.
computer. (a) tar (b) unzip
(a) eject (b) mount (c) gunzip (d) ls -l
(c) umount (d) shutdown Linux command displays
154.
143. The command shutdown − r now the output of program in readable
the computer immediately. chunks.
(a) reboots (b) halts (a) more
(c) sleep (d) sort (b) less
144. The command shutdown − h now or (c) both a & b
shutdown − P now or shutdown − (d) neither a nor b
H now the computer imme- 155. Linux command searches
diately. for a given file and optionally executes
(a) reboots (b) halts given command on that file.
(c) sleep (d) sort (a) banner (b) find
145. The Linux command shutdown − c (c) rm (d) cat
the computer. 156. Linux command removes
(a) reboots given file.
(b) halts (a) banner (b) find
(c) sleep (c) rm (d) cat
(d) cancels reboot or power-off of 157. Linux command creates a
146. Linux command sorts the large banner out of given text.
input. (a) banner (b) find
(a) reboots (b) halts (c) rm (d) cat
(c) sleep (d) sort 158. Linux command displays
147. Linux command makes the contents of text file on screen.
shell to stop processing for specified du- (a) banner (b) find
ration. (c) rm (d) cat
(a) reboots (b) halts 159. The command cat − > f l.txt stores
(c) sleep (d) sort keyboard input to a new file named
148. Linux command creates a .
single archive from specified files and di- (a) - (b) fl.txt
rectories. (c) cat (d) none of them
(a) tar (b) zip 160. The command cat − >> f l.txt
(c) gzip (d) ls -l appends keyboard input to a new file
149. Linux command creates named .
zip file using given source file. (a) - (b) fl.txt
(a) tar (b) zip (c) cat (d) none of them
(c) gzip (d) ls -l 161. In Linux, − symbol denotes the
150. Linux command creates .
(a) standard input (keyboard)
gzip file using given source file.
(a) tar (b) zip (b) mouse
(c) gzip (d) ls -l (c) standard output
(d) monitor
151. Linux command displays
full information about files and directo- 162. In Linux, command displays
ries. the current date and time.
(a) tar (b) zip (a) time (b) date
(c) cat (d) man

Prepared by: Dr.V.Nagaradjane


36 Prepared by: Dr.V.Nagaradjane

163. In Linux, command dis- 176. In Linux, command


plays help about given command (man- searches the path and displays location
ual page). of a given file.
(a) time (b) date (a) which (b) file
(c) cat (d) man (c) tr (d) chown
164. In Linux, command displays 177. In Linux, command displays
time taken by a process to complete. the type of given file.
(a) time (b) date (a) which (b) file
(c) cat (d) man (c) tr (d) chown
165. In Linux, command invokes 178. In Linux, command trans-
text editors. lates given input characters to specified
(a) vi/vim (b) emacs equivalent characters.
(c) gedit/nedit (d) all of them (a) which (b) file
166. In Linux, command com- (c) tr (d) chown
piles a C-language file to binary output. 179. In Linux, command
(a) cc (b) useradd changes ownership of a file to specified
(c) userdel (d) passwd owner and group.
167. In Linux, command adds a (a) which (b) file
new user. (c) tr (d) chown
(a) cc (b) useradd
(c) userdel (d) passwd 180. In Linux, command
changes ownership of a file to specified
168. In Linux, command deletes owner and group.
a new user. (a) which (b) file
(a) cc (b) useradd
(c) tr (d) chown
(c) userdel (d) passwd
181. In Linux, command creates
169. In Linux, command
group having specified name.
changes password for given user. (a) groupadd (b) groupdel
(a) cc (b) useradd
(c) grep (d) test
(c) userdel (d) passwd
170. In Linux, command takes 182. In Linux, command deletes
normal user to super user mode. specified group.
(a) su (b) cal (a) groupadd (b) groupdel
(c) bc (d) cron (c) grep (d) test

171. In Linux, command helps a 183. In Linux, command catches


normal user to execute given command given string from the input lines or spec-
with root privileges. ified files.
(a) groupadd (b) groupdel
(a) sudo (b) cal
(c) grep (d) test
(c) bc (d) cron
184. In Linux, command tests
172. In Linux, command displays
whether given condition is true or false.
calendar. (a) groupadd (b) groupdel
(a) sudo (b) cal
(c) bc (d) cron (c) grep (d) test
173. In Linux, command displays 185. In Linux, command helps
binary calculator in the terminal. to make decisions.
(a) if ; then ... fi
(a) sudo (b) cal
(b) if ; then... elif .. fi
(c) bc (d) cron
(c) both a & b
174. In Linux, command exe- (d) neither a nor b
cutes jobs at scheduled timing.
(a) sudo (b) cal 186. In Linux, command helps
(c) bc (d) cron create looping.
(a) for
175. In Linux, is a text filter. (b) while
(a) sed (b) awk (c) both a & b
(c) perl (d) all of them
Q. Bank [COPA Semester - 1] 37

(d) neither a nor b (b) matches all characters


187. In Linux, command displays (c) matches any single character
tree structure of all files and directories. (d) appends output to a file
(a) tree (b) c++ 198. The | character in Linux .
(c) export (d) clear (a) sends output of left side program to the input
188. In Linux, command clears of right side program
the display. (b) matches all characters
(a) tree (b) c++ (c) matches any single character
(c) export (d) clear (d) appends output to a file
189. In Linux, command com- 199. The $? character in Linux .
piles C++ source file to binary exe- (a) stores exit status of previous command
cutable file. (b) matches all characters
(a) tree (b) c++
(c) matches any single character
(c) export (d) clear
(d) appends output to a file
190. In Linux, command exports
200. The & character placed at the end of
given value to the shell environment.
(a) tree (b) c++ command line in Linux .
(a) stores exit status of previous command
(c) export (d) clear (b) matches all characters
191. In Linux, command exports (c) sends to process to the background
displays the list of currently running pro- (d) appends output to a file
cesses. 201. The − character in Linux .
(a) tree (b) ps
(c) kill (d) clear (a) stores exit status of previous command
(b) denotes standard input
192. In Linux, command termi-
(c) sends to process to the background
nates a process with given process id.
(a) tree (b) ps (d) appends output to a file
(c) kill (d) clear 202. The ˜ character in Linux .
(a) denotes home directory
(b) denotes standard input
1.3.8 Special characters in Linux (c) sends to process to the background
(d) appends output to a file
193. Any # character in Linux .
(a) starts a comment, ignored by shell script 203. The [[...]] sequence in Linux .
(b) matches all characters (a) tests the enclosed condition
(c) matches any single character (b) denotes standard input
(d) sends output to a new file (c) sends to process to the background
(d) appends output to a file
194. The * character in Linux .
(a) starts a comment, ignored by shell script 204. The ! sequence in Linux .
(b) matches all characters (a) tests the enclosed condition
(c) matches any single character (b) denotes standard input
(d) sends output to a new file (c) negates given condition
195. The ? character in Linux . (d) appends output to a file
(a) starts a comment, ignored by shell script 205. The && sequence in Linux .
(b) matches all characters (a) tests the enclosed condition
(c) matches any single character (b) denotes standard input
(d) sends output to a new file (c) runs the right side process only if the left side
196. The > character in Linux . process fails
(d) runs the right side process only if the left side
(a) starts a comment, ignored by shell script
process succeeds
(b) matches all characters
(c) matches any single character 206. The || sequence in Linux .
(d) sends output to a new file (a) tests the enclosed condition
(b) denotes standard input
197. The >> character in Linux . (c) runs the right side process only if the left side
(a) starts a comment, ignored by shell script process fails

Prepared by: Dr.V.Nagaradjane


38 Prepared by: Dr.V.Nagaradjane

(d) runs the right side process only if the left side 93. (b) 94. (a) 95. (a) 96. (a)
process succeeds 97. (d) 98. (d) 99. (a) 100. (b)
101. (c) 102. (d) 103. (a) 104. (b)
Answers (437 - 642) 105. (d) 106. (a) 107. (b) 108. (a)
109. (b) 110. (c) 111. (b) 112. (c)
1. (a) 2. (c) 3. (d) 4. (b) 113. (d) 114. (a) 115. (c) 116. (d)
5. (d) 6. (a) 7. (b) 8. (c) 117. (b) 118. (a) 119. (b) 120. (c)
9. (a) 10. (b) 11. (d) 12. (a) 121. (a) 122. (c) 123. (b) 124. (d)
13. (c) 14. (a) 15. (b) 16. (d) 125. (d) 126. (a) 127. (b) 128. (c)
17. (a) 18. (d) 19. (c) 20. (a) 129. (c) 130. (a) 131. (b) 132. (c)
21. (b) 22. (d) 23. (a) 24. (d) 133. (d) 134. (b) 135. (a) 136. (b)
25. (a) 26. (c) 27. (a) 28. (c) 137. (c) 138. (d) 139. (b) 140. (c)
29. (b) 30. (d) 31. (a) 32. (a) 141. (a) 142. (d) 143. (a) 144. (b)
33. (b) 34. (c) 35. (d) 36. (b) 145. (d) 146. (d) 147. (c) 148. (a)
37. (c) 38. (a) 39. (b) 40. (d) 149. (b) 150. (c) 151. (d) 152. (b)
41. (a) 42. (d) 43. (b) 44. (c) 153. (c) 154. (c) 155. (b) 156. (c)
45. (b) 46. (d) 47. (a) 48. (c) 157. (a) 158. (d) 159. (b) 160. (b)
49. (b) 50. (d) 51. (a) 52. (d) 161. (a) 162. (b) 163. (d) 164. (a)
53. (c) 54. (b) 55. (a) 56. (c) 165. (d) 166. (a) 167. (b) 168. (c)
57. (d) 58. (b) 59. (a) 60. (c) 169. (d) 170. (a) 171. (a) 172. (b)
61. (d) 62. (a) 63. (d) 64. (b) 173. (c) 174. (d) 175. (d) 176. (a)
65. (c) 66. (a) 67. (b) 68. (c) 177. (b) 178. (c) 179. (d) 180. (d)
69. (d) 70. (a) 71. (a) 72. (a) 181. (a) 182. (b) 183. (c) 184. (d)
73. (b) 74. (c) 75. (d) 76. (a) 185. (c) 186. (c) 187. (a) 188. (d)
189. (b) 190. (c) 191. (b) 192. (c)
77. (b) 78. (c) 79. (a) 80. (d)
193. (a) 194. (b) 195. (c) 196. (d)
81. (c) 82. (a) 83. (b) 84. (d)
197. (d) 198. (a) 199. (a) 200. (c)
85. (a) 86. (b) 87. (c) 88. (a)
201. (b) 202. (a) 203. (a) 204. (c)
89. (b) 90. (c) 91. (d) 92. (a)
205. (d) 206. (c)
Q. Bank [COPA Semester - 1] 39

1.4 MS Word 1.4.2 Features of MS Word

1.4.1 Introduction to various appli- 9. The default extension for an MS Word


document is .
cation in MS Office (a) .docx
(b) .doc
1. The collection of Microsoft tools for (c) both a & b
preparation of documents, spreadsheets, (d) neither a nor b
presentations, database management,
10. MS Word can be used for the prepara-
time scheduling and mailing is called
tion of .
. (a) letters
(a) MS Office
(b) books/ reports/theses
(b) OpenOffice.org
(c) brochures/ visiting cards
(c) StarOffice
(d) all of them
(d) LibreOffice
11. In Graphical User Interface (GUI)
2. In MS Office, is the software
based programs, WYSWYG stands for
for preparation of documents.
(a) MS Access .
(a) Whatever You See, Wherever You Get
(b) MS Word (b) What You See, What You Get
(c) MS Excel (c) Whichever You See, What You Get
(d) MS Powerpoint (d) Wherever You See, What You Get
3. In MS Office, is the software The paradigm of WYSWYG signifies
12.
for preparation of spreadsheets. that .
(a) MS Access (a) the printed document resembles exactly what
(b) MS Word you see on screen
(c) MS Excel (b) printed document is different from that on
(d) MS Powerpoint screen
(c) screen document is better than printed one
4. In MS Office, is the software
(d) printed one is better than screen document
for preparation of presentations.
(a) MS Access 13. in MS Word serves as a stan-
(b) MS Word dard typeset document for creating pro-
(c) MS Excel fessional looking documents.
(d) MS Powerpoint (a) Macro (b) XML
(c) Template (d) HTML
5. In MS Office, is the software
for preparation of databases. 14. The collection of artworks/images avail-
(a) MS Access able in MS Office is called .
(b) MS Word (a) drawing (b) images
(c) MS Excel (c) cliparts (d) tables
(d) MS Powerpoint 15. To create mail merged results, MS
In MS Office, is the software Word can take address input from
6.
for managing emails. .
(a) MS Excel (b) MS Access
(a) MS Access (b) MS Publisher
(c) text files (d) all of them
(c) MS Outlook (d) MS Onenote
16. In MS Word, spelling mistakes are high-
7. In MS Office, is the software
lighted by .
for preparation of banners, ID cards, (a) bold text
brochures and page based professional (b) green underline
publications. (c) red underline
(a) MS Access (b) MS Publisher
(d) italic text
(c) MS Outlook (d) MS Onenote
17. In MS Word, grammatic errors are high-
8. In MS Office, is the software
lighted by .
for preparation and sharing of notes. (a) bold text
(a) MS Access (b) MS Publisher
(b) green underline
(c) MS Outlook (d) MS Onenote

Prepared by: Dr.V.Nagaradjane


40 Prepared by: Dr.V.Nagaradjane

(c) red underline (b) Ctrl + N


(d) italic text (c) Alt + F + N
18. MS Word can handle to enrich (d) both Ctrl + N & Alt + F + N
a document. 29. To select Print item in MS Office menu,
(a) lists (b) images use shortcut.
(c) tables (d) all of them (a) Ctrl + P
19. The text or image which appears faintly (b) Alt + F + P
in the background of a page is called (c) both Ctrl + P & Alt + F + P
. (d) Ctrl + S
(a) water mark (b) trade mark
30. To select Save & Send item in MS Office
(c) copy right (d) embossing menu, use shortcut.
(a) Ctrl + P
1.4.3 Office button in MS Word (b) Alt + F + D
(c) Alt + F + H or F 1
20. MS Office button is located on the (d) Ctrl + S
of MS Word window. 31. To select Help item in MS Office menu,
(a) top right (b) top left
use shortcut.
(c) bottom left (d) bottom right (a) Ctrl + P
21. is the shortcut to open Of- (b) Alt + F + D
fice menu of MS Word. (c) Alt + F + H or F 1
(a) Alt + H (b) Alt + N (d) Ctrl + S
(c) Alt + P (d) Alt + F
32. To select Options item in MS Office
22. The save button is MS Office menu can menu, use shortcut.
be accessed through . (a) Alt + F + X
(a) Alt + F + S (b) Alt + F + D
(b) Ctrl + S (c) Alt + F + H or F 1
(c) both Alt + F + S & Ctrl + S (d) Alt + F + T
(d) none of them
33. To select Exit item in MS Office menu,
23. To access Save As item in Office menu use shortcut.
of MS Word, use shortcut. (a) Alt + F + X
(a) Alt + F + A (b) Ctrl + O (b) Alt + F + D
(c) Ctrl + N (d) Ctrl + P (c) Alt + F + H or F 1
24. To select Open item in Office menu of (d) Alt + F + T
MS Word, use shortcut.
(a) Ctrl + O
(b) Alt + F + O 1.4.4 Menus and toolbars in MS
(c) both Ctrl + O & Alt + F + O Word
(d) Ctrl + S
25. For Close item in MS Office menu, use 34. The first menu, containing most com-
shortcut. mon tools required for preparation
(a) Alt + F + A (b) Ctrl + O of document in MS Word, is called
(c) Ctrl + N (d) Alt + F + C .
(a) Home (b) Insert
26. To select Info item in MS Office menu, (c) Page Layout (d) References
use shortcut.
(a) Alt + F + A (b) Ctrl + O 35. The tools for Clipboard, Font Style,
(c) Alt + F + I (d) Alt + F + C Paragraph Formating, Styles & Search
27. To view recently opened files, use are contained in menu.
(a) Home (b) Insert
shortcut in Office menu of MS
(c) Page Layout (d) References
Word.
(a) Alt + F + R (b) Ctrl + O 36. is the shortcut for Home
(c) Ctrl + F + I (d) Ctrl + F + C menu in MS Word.
(a) Alt+H (b) Alt+N
28. To select New item in Office menu of
(c) Alt+P (d) Alt+S
MS Word,
(a) Ctrl + S use shortcut.
Q. Bank [COPA Semester - 1] 41

37. menu permits insertion (c) Review (d) References


of tables, images, drawing objects and 48. is the shortcut for View
hyperlinks, headers and footers in MS menu in MS Word.
Word. (a) Alt+W (b) Alt+M
(a) Home (b) Insert (c) Alt+R (d) Alt+S
(c) Page Layout (d) References
38. is the shortcut for Insert Home menu in MS Word
menu in MS Word.
(a) Alt+H (b) Alt+N 49. Clipboard menu can be accessed using
(c) Alt+P (d) Alt+S the shortcut .
39. menu contains tools to (a) Alt+H+FO
control theme, page setup, page back- (b) Ctrl+X/ Alt+H+X
ground, paragraph & text wrap. (c) Ctrl+C/ Alt+H+C
(a) Home (b) Insert (d) Ctrl+V/ Alt+H+V
(c) Page Layout (d) References 50. In MS Word, selected content can be
40. is the shortcut for Page cut using the shortcut .
Layout menu in MS Word. (a) Alt+H+FO
(a) Alt+H (b) Alt+N (b) Ctrl+X/ Alt+H+X
(c) Alt+P (d) Alt+S (c) Ctrl+C/ Alt+H+C
41. menu contains tools re- (d) Ctrl+V/ Alt+H+V
lated to table of contents, foot notes, 51. In MS Word, selected content can be
citation, bibliography, caption, index & copied to clipboard using the shortcut
table of authorities. .
(a) Home (b) Insert (a) Alt+H+FO
(c) Page Layout (d) References (b) Ctrl+X/ Alt+H+X
42. is the shortcut for Refer- (c) Ctrl+C/ Alt+H+C
ences menu in MS Word. (d) Ctrl+V/ Alt+H+V
(a) Alt+H (b) Alt+N
(c) Alt+P (d) Alt+S 52. In MS Word, contents of clipboard may
be pasted to the document using the
43. menu contains tools for shortcut .
creating mailings, merging mails, insert- (a) Alt+H+FO
ing merge fields, preview of mail merged (b) Ctrl+X/ Alt+H+X
results, printing mail merged pages or (c) Ctrl+C/ Alt+H+C
saving the mail merge results in a new (d) Ctrl+V/ Alt+H+V
file. 53. In MS Word, format painter may be ac-
(a) Home (b) Mailings
(c) Review (d) References cessed using the shortcut .
(a) Alt+H+FP
44. is the shortcut for Mailings (b) Ctrl+X/ Alt+H+X
menu in MS Word. (c) Ctrl+C/ Alt+H+C
(a) Alt+H (b) Alt+M
(c) Alt+R (d) Alt+S (d) Ctrl+V/ Alt+H+V
45. menu contains tools for 54. In MS Word, font style may be accessed
proofing, languages, comments, track- using the shortcut .
(a) Alt+H+FN
ing, changes, compare & protect.
(a) Home (b) Mailings (b) Ctrl+B/ Alt+H+1
(c) Review (d) References (c) Ctrl+I/ Alt+H+2
(d) Ctrl+U/ Alt+H+3
46. is the shortcut for Review
menu in MS Word. 55. In MS Word, bold font style may be ac-
(a) Alt+H (b) Alt+M cessed using the shortcut .
(c) Alt+R (d) Alt+S (a) Alt+H+FN
47. menu contains tools for (b) Ctrl+B/ Alt+H+1
document views, showing/hiding ruler, (c) Ctrl+I/ Alt+H+2
zoom, managing windows & macros. (d) Ctrl+U/ Alt+H+3
(a) View (b) Mailings

Prepared by: Dr.V.Nagaradjane


42 Prepared by: Dr.V.Nagaradjane

56. In MS Word, italic font style may be ac- (a) Alt+H+U (b) Alt+H+N
cessed using the shortcut . (c) Alt+H+M (d) Alt+H+PG
(a) Alt+H+FN
65. In MS Word, bullets may be accessed
(b) Ctrl+B/ Alt+H+1 using the shortcut .
(c) Ctrl+I/ Alt+H+2 (a) Alt+H+U (b) Alt+H+N
(d) Ctrl+U/ Alt+H+3 (c) Alt+H+M (d) Alt+H+PG
57. In MS Word, underline font style may be 66. In MS Word, numbering may be ac-
accessed using the shortcut . cessed using the shortcut .
(a) Alt+H+FN (a) Alt+H+U (b) Alt+H+N
(b) Ctrl+B/ Alt+H+1 (c) Alt+H+M (d) Alt+H+PG
(c) Ctrl+I/ Alt+H+2
67. In MS Word, multi-level list may be ac-
(d) Ctrl+U/ Alt+H+3
cessed using the shortcut .
58. In MS Word, subscript font style may be (a) Alt+H+U (b) Alt+H+N
accessed using the shortcut . (c) Alt+H+M (d) Alt+H+PG
(a) Alt+H+4
(b) Ctrl+Plus/ Alt+H+5 68. In MS Word, left alignment of para-
graph may be accessed using the short-
(c) Ctrl+Shift+Plus/ Alt+H+6
cut .
(d) Alt+H+FF (a) Ctrl+L/ Alt+H+AL
59. In MS Word, superscript font style (b) Ctrl+J/ Alt+H+AJ
may be accessed using the shortcut (c) Ctrl+E/ Alt+H+AC
. (d) Ctrl+R/ Alt+H+AR
(a) Alt+H+4
(b) Ctrl+Plus/ Alt+H+5 69. In MS Word, right alignment of para-
graph may be accessed using the short-
(c) Ctrl+Shift+Plus/ Alt+H+6
cut .
(d) Alt+H+FF (a) Ctrl+L/ Alt+H+AL
60. In MS Word, font name may be accessed (b) Ctrl+J/ Alt+H+AJ
using the shortcut . (c) Ctrl+E/ Alt+H+AC
(a) Alt+H+4 (d) Ctrl+R/ Alt+H+AR
(b) Ctrl+Plus/ Alt+H+5
70. In MS Word, centre alignment of para-
(c) Ctrl+Shift+Plus/ Alt+H+6
graph may be accessed using the short-
(d) Alt+H+FF
cut .
61. In MS Word, strike through font style (a) Ctrl+L/ Alt+H+AL
may be accessed using the shortcut (b) Ctrl+J/ Alt+H+AJ
. (c) Ctrl+E/ Alt+H+AC
(a) Alt+H+4 (d) Ctrl+R/ Alt+H+AR
(b) Ctrl+Plus/ Alt+H+5
(c) Ctrl+Shift+Plus/ Alt+H+6 71. In MS Word, justified alignment of para-
graph may be accessed using the short-
(d) Alt+H+FF
cut .
62. In MS Word, font size may be accessed (a) Ctrl+L/ Alt+H+AL
using the shortcut . (b) Ctrl+J/ Alt+H+AJ
(a) Alt+H+FC (c) Ctrl+E/ Alt+H+AC
(b) Ctrl+Plus/ Alt+H+5 (d) Ctrl+R/ Alt+H+AR
(c) Ctrl+Shift+Plus/ Alt+H+6
72. In MS Word, line spacing of paragraph
(d) Alt+H+FS
may be accessed using the shortcut
63. In MS Word, fill color may be accessed .
using the shortcut . (a) Alt+H+K (b) Alt+H+B
(a) Alt+H+FC (c) Alt+H+H (d) Alt+H+AO
(b) Ctrl+Plus/ Alt+H+5
73. In MS Word, borders may be accessed
(c) Ctrl+Shift+Plus/ Alt+H+6 using the shortcut .
(d) Alt+H+FS (a) Alt+H+K (b) Alt+H+B
64. In MS Word, paragraph formating (c) Alt+H+H (d) Alt+H+AO
may be accessed using the shortcut 74. In MS Word, fill colour may be accessed
. using the shortcut .
Q. Bank [COPA Semester - 1] 43

(a) Alt+H+K (b) Alt+H+B Insert menu in MS Word


(c) Alt+H+H (d) Alt+H+AO
84. In MS Word, cover page may be inserted
75. In MS Word, indent may be decreased
using the shortcut .
using the shortcut . (a) Alt+N+NP (b) Alt+N+V
(a) Alt+H+AI (b) Alt+H+B
(c) Alt+N+B (d) Alt+N+T
(c) Alt+H+H (d) Alt+H+AO
85. In MS Word, blank page may be inserted
76. In MS Word, indent may be increased
using the shortcut .
using the shortcut .
(a) Alt+N+NP (b) Alt+N+V
(a) Alt+H+AI (b) Alt+H+B
(c) Alt+N+B (d) Alt+N+T
(c) Alt+H+H (d) Alt+H+AO
86. In MS Word, page break may be inserted
77. In MS Word, styles dialog may be
using the shortcut .
changed using the shortcut .
(a) Alt+N+NP (b) Alt+N+V
(a) Alt+H+FY
(c) Alt+N+B (d) Alt+N+T
(b) Alt+H+L
(c) Alt+H+G 87. In MS Word, table may be inserted using
(d) Ctrl+F/ Alt+H+FD the shortcut .
(a) Alt+N+T+I (b) Alt+N+D
78. In MS Word, styles may be changed us- (c) Alt+N+T+V (d) Alt+N+T
ing the shortcut .
(a) Alt+H+FY 88. In MS Word, text with column sepa-
(b) Alt+H+L ration by TAB and row separation by
(c) Alt+H+G NEWLINE may be converted to table
(d) Ctrl+F/ Alt+H+FD using the shortcut .
(a) Alt+N+T+I (b) Alt+N+D
79. In MS Word, normal style may be set (c) Alt+N+T+V (d) Alt+N+T
using the shortcut .
(a) Alt+H+FY 89. In MS Word, table may be created by
(b) Alt+H+L drawing on screen using the shortcut
(c) Alt+H+G .
(a) Alt+N+T+I (b) Alt+N+D
(d) Ctrl+F/ Alt+H+FD (c) Alt+N+T+V (d) Alt+N+T
80. In MS Word, search and find may be 90. In MS Word, table may be created by
accessed using the shortcut . choosing rows and columns using the
(a) Ctrl+H/ Alt+H+R
shortcut .
(b) Alt+H+SL (a) Alt+N+T+I (b) Alt+N+D
(c) Ctrl+A/ Alt+H+SL+A (c) Alt+N+T+V (d) Alt+N+T
(d) Ctrl+F/ Alt+H+FD
91. In MS Word, Excel spreadsheet may
81. In MS Word, search and replace may be be inserted as table using the shortcut
accessed using the shortcut . .
(a) Ctrl+H/ Alt+H+R (a) Alt+N+T+I (b) Alt+N+D
(b) Alt+H+SL (c) Alt+N+T+X (d) Alt+N+T+T
(c) Ctrl+A/ Alt+H+SL+A 92. In MS Word, quick table from ready
(d) Ctrl+F/ Alt+H+FD made templates may be inserted using
82. In MS Word, text selection may be ac- the shortcut .
cessed using the shortcut . (a) Alt+N+T+I (b) Alt+N+D
(a) Ctrl+H/ Alt+H+R (c) Alt+N+T+X (d) Alt+N+T+T
(b) Alt+H+SL 93. In MS Word, pictures may be inserted
(c) Ctrl+A/ Alt+H+SL+A using the shortcut .
(d) Ctrl+F/ Alt+H+FD (a) Alt+N+P (b) Alt+N+F
83. In MS Word, select all may be accessed (c) Alt+N+SH (d) Alt+N+C
using the shortcut . 94. In MS Word, clip arts may be inserted
(a) Ctrl+H/ Alt+H+R using the shortcut .
(b) Alt+H+SL (a) Alt+N+P (b) Alt+N+F
(c) Ctrl+A/ Alt+H+SL+A (c) Alt+N+SH (d) Alt+N+C
(d) Ctrl+F/ Alt+H+FD

Prepared by: Dr.V.Nagaradjane


44 Prepared by: Dr.V.Nagaradjane

95. In MS Word, shapes like line, rectangle, 108. In MS Word, drop cap may be inserted
circle, text box, etc. may be inserted using the shortcut .
using the shortcut . (a) Alt+N+Q (b) Alt+N+X
(a) Alt+N+P (b) Alt+N+F (c) Alt+N+I (d) Alt+N+RC
(c) Alt+N+SH (d) Alt+N+C 109. In MS Word, signature may be inserted
96. In MS Word, chart may be inserted using using the shortcut .
the shortcut . (a) Alt+N+G (b) Alt+N+D
(a) Alt+N+P (b) Alt+N+F (c) Alt+N+J (d) Alt+N+RC
(c) Alt+N+SH (d) Alt+N+C
110. In MS Word, date & time may be in-
97. In MS Word, smart art may be inserted serted using the shortcut .
using the shortcut . (a) Alt+N+G (b) Alt+N+D
(a) Alt+N+P (b) Alt+N+M (c) Alt+N+J (d) Alt+N+RC
(c) Alt+N+SC (d) Alt+N+C
111. In MS Word, object may be inserted us-
98. In MS Word, screen shot may be in- ing the shortcut .
serted using the shortcut . (a) Alt+N+G (b) Alt+N+D
(a) Alt+N+P (b) Alt+N+M (c) Alt+N+J (d) Alt+N+RC
(c) Alt+N+SC (d) Alt+N+C
112. In MS Word, equations may be inserted
99. In MS Word, hyper link may be inserted using the shortcut .
using the shortcut . (a) Alt+N+U/ Alt+N+U+M
(a) Alt+N+I (b) Alt+N+K (b) Alt+N+D
(c) Alt+N+RF (d) Alt+N+H (c) Alt+N+J
100. In MS Word, bookmark may be inserted (d) Alt+N+E/ Alt+N+E+I
using the shortcut . 113. In MS Word, symbols and special char-
(a) Alt+N+I (b) Alt+N+K
acters may be inserted using the short-
(c) Alt+N+RF (d) Alt+N+H
cut .
101. In MS Word, cross references may be in- (a) Alt+N+U/ Alt+N+U+M
serted using the shortcut . (b) Alt+N+D
(a) Alt+N+I (b) Alt+N+K (c) Alt+N+J
(c) Alt+N+RF (d) Alt+N+H (d) Alt+N+E/ Alt+N+E+I
102. In MS Word, header may be inserted us-
ing the shortcut . Page Layout menu in MS Word
(a) Alt+N+NU (b) Alt+N+X
(c) Alt+N+O (d) Alt+N+H 114. In MS Word, document theme may be
103. In MS Word, footer may be inserted us- accessed using the shortcut .
ing the shortcut . (a) Alt+P+TH (b) Alt+P+TC
(a) Alt+N+NU (b) Alt+N+X (c) Alt+P+TF (d) Alt+P+TE
(c) Alt+N+O (d) Alt+N+H 115. In MS Word, document colors may be
104. In MS Word, page number may be in- accessed using the shortcut .
serted using the shortcut . (a) Alt+P+TH (b) Alt+P+TC
(a) Alt+N+NU (b) Alt+N+X (c) Alt+P+TF (d) Alt+P+TE
(c) Alt+N+O (d) Alt+N+H 116. In MS Word, document fonts may be
105. In MS Word, text box may be inserted accessed using the shortcut .
using the shortcut . (a) Alt+P+TH (b) Alt+P+TC
(a) Alt+N+NU (b) Alt+N+X (c) Alt+P+TF (d) Alt+P+TE
(c) Alt+N+O (d) Alt+N+H 117. In MS Word, document effects may be
106. In MS Word, word art may be inserted accessed using the shortcut .
using the shortcut . (a) Alt+P+TH (b) Alt+P+TC
(a) Alt+N+Q (b) Alt+N+X (c) Alt+P+TF (d) Alt+P+TE
(c) Alt+N+I (d) Alt+N+RC 118. In MS Word, page setup may be ac-
107. In MS Word, quick parts may be inserted cessed using the shortcut .
using the shortcut . (a) Alt+P+SP (b) Alt+P+M
(a) Alt+N+Q (b) Alt+N+X (c) Alt+P+O (d) Alt+P+SZ
(c) Alt+N+I (d) Alt+N+RC
Q. Bank [COPA Semester - 1] 45

119. In MS Word, margins of page may be (c) Alt+P+IR (d) Alt+P+SB


modified using the shortcut . 130. In MS Word, spacing after paragraph
(a) Alt+P+SP (b) Alt+P+M may be accessed using the shortcut
(c) Alt+P+O (d) Alt+P+SZ .
120. In MS Word, orientation of page may be (a) Alt+P+SA (b) Alt+P+IL
modified using the shortcut . (c) Alt+P+IR (d) Alt+P+SB
(a) Alt+P+SP (b) Alt+P+M 131. In MS Word, objects may be arranged in
(c) Alt+P+O (d) Alt+P+SZ position using the shortcut .
121. In MS Word, size of page may be mod- (a) Alt+P+PO (b) Alt+P+TW
ified using the shortcut . (c) Alt+P+AF (d) Alt+P+AE
(a) Alt+P+SP (b) Alt+P+M 132. In MS Word, text wrapping may be ac-
(c) Alt+P+O (d) Alt+P+SZ cessed using the shortcut .
122. In MS Word, columns in page may be (a) Alt+P+PO (b) Alt+P+TW
modified using the shortcut . (c) Alt+P+AF (d) Alt+P+AE
(a) Alt+P+J/ Alt+P+J+C
133. In MS Word, bring forward may be ac-
(b) Alt+P+B cessed using the shortcut .
(c) Alt+P+LN (a) Alt+P+PO (b) Alt+P+TW
(d) Alt+P+H (c) Alt+P+AF (d) Alt+P+AE
123. In MS Word, page breaks may be mod- 134. In MS Word, selection pane may be ac-
ified using the shortcut . cessed using the shortcut .
(a) Alt+P+J/ Alt+P+J+C (a) Alt+P+AP (b) Alt+P+TW
(b) Alt+P+B (c) Alt+P+AF (d) Alt+P+AE
(c) Alt+P+LN
135. In MS Word, paragraph selection may be
(d) Alt+P+H
accessed using the shortcut .
124. In MS Word, line number may be in- (a) Alt+P+AP (b) Alt+P+AA
serted or removed using the shortcut (c) Alt+P+G (d) Alt+P+AY
.
(a) Alt+P+J/ Alt+P+J+C 136. In MS Word, alignment of page may be
(b) Alt+P+B accessed using the shortcut .
(a) Alt+P+AP (b) Alt+P+AA
(c) Alt+P+LN
(c) Alt+P+G (d) Alt+P+AY
(d) Alt+P+H
125. In MS Word, hyphenation may be in- 137. In MS Word, grouping of objects may be
serted or removed using the shortcut accessed using the shortcut .
(a) Alt+P+AP (b) Alt+P+AA
.
(a) Alt+P+J/ Alt+P+J+C (c) Alt+P+G (d) Alt+P+AY
(b) Alt+P+B 138. In MS Word, object rotation may be ac-
(c) Alt+P+LN cessed using the shortcut .
(d) Alt+P+H (a) Alt+P+AP (b) Alt+P+AA
(c) Alt+P+G (d) Alt+P+AY
126. In MS Word, paragraph layout may be
accessed using the shortcut .
(a) Alt+P+PG (b) Alt+P+IL References menu in MS Word
(c) Alt+P+IR (d) Alt+P+SB
127. In MS Word, left indent may be accessed 139. In MS Word, table of contents may be
using the shortcut . inserted using the shortcut .
(a) Alt+P+SA (b) Alt+P+IL (a) Alt+S+A (b) Alt+S+T
(c) Alt+P+IR (d) Alt+P+SB (c) Alt+S+U (d) Alt+S+Q
128. In MS Word, right indent may be ac- 140. In MS Word, add text may be accessed
cessed using the shortcut . using the shortcut .
(a) Alt+P+SA (b) Alt+P+IL (a) Alt+S+A (b) Alt+S+T
(c) Alt+P+IR (d) Alt+P+SB (c) Alt+S+U (d) Alt+S+Q
129. In MS Word, spacing before paragraph 141. In MS Word, table of contents may be
may be accessed using the shortcut updated using the shortcut .
(a) Alt+S+A (b) Alt+S+T
(a) Alt+P+SA. (b) Alt+P+IL

Prepared by: Dr.V.Nagaradjane


46 Prepared by: Dr.V.Nagaradjane

(c) Alt+S+U (d) Alt+S+Q (a) Alt+S+P (b) Alt+S+G


142. In MS Word, foot notes dialog may be (c) Alt+S+V (d) Alt+S+RF
accessed using the shortcut . 155. In MS Word, mark entry under refer-
(a) Alt+S+A (b) Alt+S+T ences menu may be accessed using the
(c) Alt+S+U (d) Alt+S+Q shortcut .
143. In MS Word, foot notes may be inserted (a) Alt+S+N (b) Alt+S+X
using the shortcut . (c) Alt+S+D (d) Alt+S+I
(a) Alt+S+F (b) Alt+S+E 156. In MS Word, insert index under refer-
(c) Alt+S+O (d) Alt+S+H ences menu may be accessed using the
144. In MS Word, end notes may be inserted shortcut .
using the shortcut . (a) Alt+S+N (b) Alt+S+X
(a) Alt+S+F (b) Alt+S+E (c) Alt+S+D (d) Alt+S+I
(c) Alt+S+O (d) Alt+S+H 157. In MS Word, update index under refer-
145. In MS Word, next foot notes may be ences menu may be accessed using the
inserted using the shortcut . shortcut .
(a) Alt+S+F (b) Alt+S+E (a) Alt+S+N (b) Alt+S+X
(c) Alt+S+O (d) Alt+S+H (c) Alt+S+D (d) Alt+S+I
146. In MS Word, show notes (to view all 158. In MS Word, mark citation under refer-
foot/end notes) may be accessed using ences menu may be accessed using the
the shortcut . shortcut .
(a) Alt+S+F (b) Alt+S+E (a) Alt+S+N (b) Alt+S+X
(c) Alt+S+O (d) Alt+S+H (c) Alt+S+D (d) Alt+S+I
147. In MS Word, citation may be inserted 159. In MS Word, insert table of authorities
using the shortcut . under references menu may be accessed
(a) Alt+S+C (b) Alt+S+M using the shortcut .
(c) Alt+S+L (d) Alt+S+B (a) Alt+S+RT (b) Alt+S+RU
148. In MS Word, manage citation sources (c) Alt+S+D (d) Alt+S+I
dialog may be accessed using the short- 160. In MS Word, update table of authorities
cut . under references menu may be accessed
(a) Alt+S+C (b) Alt+S+M using the shortcut .
(c) Alt+S+L (d) Alt+S+B (a) Alt+S+RT (b) Alt+S+RU
149. In MS Word, bibliography may be ac- (c) Alt+S+D (d) Alt+S+I
cessed using the shortcut .
(a) Alt+S+C (b) Alt+S+M Mailings menu in MS Word
(c) Alt+S+L (d) Alt+S+B
150. In MS Word, citation style be accessed 161. menu contains items re-
using the shortcut . quired for mail merge functionality in
(a) Alt+S+C (b) Alt+S+M MS Word.
(c) Alt+S+L (d) Alt+S+B (a) Home (b) Insert
(c) Mailings (d) Reference
151. In MS Word, insert caption may be ac-
cessed using the shortcut . 162. is the shortcut to create en-
(a) Alt+S+P (b) Alt+S+G velops using Mailings menu in MS Word.
(c) Alt+S+V (d) Alt+S+RF (a) Alt+M+E (b) Alt+M+L
152. In MS Word, table of figures may be (c) Alt+M+S (d) Alt+M+R
inserted using the shortcut . 163. is the shortcut to create la-
(a) Alt+S+P (b) Alt+S+G bels using Mailings menu in MS Word.
(c) Alt+S+V (d) Alt+S+RF (a) Alt+M+E (b) Alt+M+L
153. In MS Word, table of figures may be (c) Alt+M+S (d) Alt+M+R
updated using the shortcut . 164. is the shortcut to start mail
(a) Alt+S+P (b) Alt+S+G merge in MS Word.
(c) Alt+S+V (d) Alt+S+RF (a) Alt+M+E (b) Alt+M+L
154. In MS Word, cross references may be (c) Alt+M+S (d) Alt+M+R
inserted using the shortcut .
Q. Bank [COPA Semester - 1] 47

165. is the shortcut to select 177. is the shortcut to preview


the list of recipients for mailings in MS results for Mailings in MS Word.
Word. (a) Alt+M+W (b) Alt+M+P
(a) Alt+M+E (b) Alt+M+L (c) Alt+M+Q (d) Alt+M+M
(c) Alt+M+S (d) Alt+M+R is the shortcut to preview
178.
166. is the shortcut to type new results of the first record for Mailings in
list of recipients for Mailings in MS MS Word.
Word. (a) Alt+M+W (b) Alt+M+P
(a) Alt+M+R+E (b) Alt+M+R+N (c) Alt+M+Q (d) Alt+M+M
(c) Alt+M+R+O (d) Alt+M+D is the shortcut to preview
179.
167. is the shortcut to use exist- mail merge results of the last record for
ing list of recipients for Mailings in MS Mailings in MS Word.
Word. (a) Alt+M+W (b) Alt+M+X
(a) Alt+M+R+E (b) Alt+M+R+N (c) Alt+M+V (d) Alt+M+M
(c) Alt+M+R+O (d) Alt+M+D
180. is the shortcut to preview
168. is the shortcut to use con-
results of previous record for Mailings in
tacts from Outlook Express for Mailings
MS Word.
in MS Word. (a) Alt+M+W (b) Alt+M+P
(a) Alt+M+R+E (b) Alt+M+R+N
(c) Alt+M+Q (d) Alt+M+M
(c) Alt+M+R+O (d) Alt+M+D
181. is the shortcut to set the
169. is the shortcut to edit the
record number to preview results for
list of recipients for Mailings in MS
Mailings in MS Word.
Word. (a) Alt+M+W (b) Alt+M+P
(a) Alt+M+R+E (b) Alt+M+R+N
(c) Alt+M+R+O (d) Alt+M+D (c) Alt+M+Q (d) Alt+M+M
is the shortcut to highlight 182. is the shortcut to preview
170.
merge fields of Mailings in MS Word. mail merge results of the next record for
(a) Alt+M+H (b) Alt+M+A Mailings in MS Word.
(c) Alt+M+G (d) Alt+M+I (a) Alt+M+F (b) Alt+M+X
(c) Alt+M+V (d) Alt+M+M
171. is the shortcut to open ad-
dress book for Mailings in MS Word. 183. is the shortcut to finish and
(a) Alt+M+H (b) Alt+M+A merge for Mailings in MS Word.
(c) Alt+M+G (d) Alt+M+I (a) Alt+M+F (b) Alt+M+X
(c) Alt+M+V (d) Alt+M+M
172. is the shortcut to open
greeting line for Mailings in MS Word.
(a) Alt+M+H (b) Alt+M+A Review menu in MS Word
(c) Alt+M+G (d) Alt+M+I
184. is the shortcut for spelling
173. is the shortcut to insert
and grammar corrections under review
merge field for Mailings in MS Word.
(a) Alt+M+H (b) Alt+M+A menu in MS Word.
(a) Alt+R+R (b) Alt+R+E
(c) Alt+M+G (d) Alt+M+I (c) Alt+R+S (d) Alt+R+W
174. is the shortcut to rules for 185. is the shortcut for research
Mailings in MS Word. under review menu in MS Word.
(a) Alt+M+U (b) Alt+M+A (a) Alt+R+R (b) Alt+R+E
(c) Alt+M+B (d) Alt+M+T (c) Alt+R+S (d) Alt+R+W
175. is the shortcut to match 186. is the shortcut for word
fields for Mailings in MS Word. count under review menu in MS Word.
(a) Alt+M+U (b) Alt+M+A (a) Alt+R+R (b) Alt+R+E
(c) Alt+M+B (d) Alt+M+T (c) Alt+R+S (d) Alt+R+W
176. is the shortcut to update 187. is the shortcut for the-
labels for Mailings in MS Word. saurus under review menu in MS Word.
(a) Alt+M+U (b) Alt+M+A (a) Alt+R+R (b) Alt+R+E
(c) Alt+M+B (d) Alt+M+T (c) Alt+R+S (d) Alt+R+W

Prepared by: Dr.V.Nagaradjane


48 Prepared by: Dr.V.Nagaradjane

188. is the shortcut for lan- 200. is the shortcut to navigate


guages under review menu in MS Word. to previous change under review menu
(a) Alt+R+R (b) Alt+R+T in MS Word.
(c) Alt+R+S (d) Alt+R+U (a) Alt+R+A (b) Alt+R+J
is the shortcut for translate (c) Alt+R+F (d) Alt+R+H
189.
under review menu in MS Word. 201. is the shortcut to navigate
(a) Alt+R+R (b) Alt+R+T to next change under review menu in MS
(c) Alt+R+S (d) Alt+R+U Word.
is the shortcut for new (a) Alt+R+A (b) Alt+R+J
190.
comment under review menu in MS (c) Alt+R+F (d) Alt+R+H
Word. 202. is the shortcut to compare
(a) Alt+R+C (b) Alt+R+D documents under review menu in MS
(c) Alt+R+V (d) Alt+R+N Word.
is the shortcut for delete (a) Alt+R+M (b) Alt+R+PB
191.
comment under review menu in MS (c) Alt+R+PE (d) Alt+R+H
Word. 203. is the shortcut to block au-
(a) Alt+R+C (b) Alt+R+D thors under review menu in MS Word.
(c) Alt+R+V (d) Alt+R+N (a) Alt+R+M (b) Alt+R+PB
192. is the shortcut for next (c) Alt+R+PE (d) Alt+R+H
record of comment under review menu 204. is the shortcut to restrict
in MS Word. editing under review menu in MS Word.
(a) Alt+R+C (b) Alt+R+D (a) Alt+R+M (b) Alt+R+PB
(c) Alt+R+V (d) Alt+R+N (c) Alt+R+PE (d) Alt+R+H
193. is the shortcut for previous
record of comment under review menu Review menu in MS Word
in MS Word.
(a) Alt+R+C (b) Alt+R+D 205. Document view may be changed to Page
(c) Alt+R+V (d) Alt+R+N Layout using shortcut in
194. is the shortcut to track View menu of MS Word.
changes under review menu in MS Word. (a) Alt+W+P (b) Alt+W+F
(a) Alt+R+G (b) Alt+R+TD (c) Alt+W+L (d) Alt+W+U
(c) Alt+R+TM (d) Alt+R+TP 206. Document view may be changed to full
195. is the shortcut to show screen reading using short-
markup under review menu in MS Word. cut in View menu of MS Word.
(a) Alt+R+G (b) Alt+R+TD (a) Alt+W+P (b) Alt+W+F
(c) Alt+R+TM (d) Alt+R+TP (c) Alt+W+L (d) Alt+W+U

196. is the shortcut to show final 207. Document view may be changed to web
markup under review menu in MS Word. layout using shortcut in
(a) Alt+R+G (b) Alt+R+TD View menu of MS Word.
(a) Alt+W+P (b) Alt+W+F
(c) Alt+R+TM (d) Alt+R+TP
(c) Alt+W+L (d) Alt+W+U
197. is the shortcut to show re-
208. Document view may be changed to out-
viewing pane under review menu in MS
line layout using shortcut in
Word.
(a) Alt+R+G (b) Alt+R+TD View menu of MS Word.
(a) Alt+W+P (b) Alt+W+F
(c) Alt+R+TM (d) Alt+R+TP
(c) Alt+W+L (d) Alt+W+U
198. is the shortcut to accept
209. Document view may be changed to draft
changes under review menu in MS Word.
(a) Alt+R+A (b) Alt+R+J layout using shortcut in
(c) Alt+R+F (d) Alt+R+H View menu of MS Word.
(a) Alt+W+P (b) Alt+W+F
199. is the shortcut to reject (c) Alt+W+E (d) Alt+W+U
changes under review menu in MS Word. 210. Ruler may be set visible or invisible using
(a) Alt+R+A (b) Alt+R+J
shortcut in MS Word.
(c) Alt+R+F (d) Alt+R+H (a) Alt+W+R (b) Alt+W+G
Q. Bank [COPA Semester - 1] 49

(c) Alt+W+K (d) Alt+W+Q (c) Alt+W+S (d) Alt+W+B


211. Grid lines may be set visible or invisi- 222. Scrolling on 2 documents opened side
ble using shortcut in MS by side may be synchronized using
Word. shortcut in MS Word.
(a) Alt+W+R (b) Alt+W+G (a) Alt+W+YS (b) Alt+W+T
(c) Alt+W+K (d) Alt+W+Q (c) Alt+W+S (d) Alt+W+W
212. Navigation pane may be set visible or 223. Window positions of 2 side by side doc-
invisible using shortcut in uments may be reset to equal propor-
MS Word. tion using shortcut in MS
(a) Alt+W+R (b) Alt+W+G Word.
(c) Alt+W+K (d) Alt+W+Q (a) Alt+W+YS (b) Alt+W+T
213. Zoom options dialog may be opened us- (c) Alt+W+S (d) Alt+W+W
ing shortcut in MS Word. 224. Cursor focus may be switched from
(a) Alt+W+R (b) Alt+W+G one window to another window using
(c) Alt+W+K (d) Alt+W+Q shortcut in MS Word.
214. Zoom level may be set to 100% using (a) Alt+W+YS (b) Alt+W+T
shortcut in MS Word. (c) Alt+W+S (d) Alt+W+W
(a) Alt+W+J (b) Alt+W+1 225. Macros may be recorded using
(c) Alt+W+2 (d) Alt+W+I shortcut in MS Word.
215. Zoom level may be adjusted to width of (a) Alt+W+YS (b) Alt+W+T
single page using shortcut (c) Alt+W+M (d) Alt+W+W
in MS Word. 226. A set of VBA instructions to assist in
(a) Alt+W+J (b) Alt+W+1 carrying out recurring activities in is
(c) Alt+W+2 (d) Alt+W+I called .
216. Zoom level may be adjusted to width of (a) mail merge (b) macro
two pages using shortcut (c) thesaurus (d) spell check
in MS Word. 227. Macro may be assigned a for
(a) Alt+W+J (b) Alt+W+1 convenient invocation.
(c) Alt+W+2 (d) Alt+W+I (a) keyboard shortcut
217. Zoom level may be adjusted to full page (b) a button on office menu
width using shortcut in (c) either keyboard shortcut or a button in office
MS Word. menu
(a) Alt+W+J (b) Alt+W+1 (d) neither keyboard shortcut nor a button in office
(c) Alt+W+2 (d) Alt+W+I menu
228. Macro may be assigned a for
218. New MS Word window may be opened
convenient invocation.
using shortcut in MS (a) keyboard shortcut
Word. (b) a button on office menu
(a) Alt+W+N (b) Alt+W+A
(c) either keyboard shortcut or a button in office
(c) Alt+W+S (d) Alt+W+B
menu
219. All open windows may be arranged side- (d) neither keyboard shortcut nor a button in office
by-side using shortcut in menu
MS Word.
(a) Alt+W+N (b) Alt+W+A 1.4.5 Creating & saving a document
(c) Alt+W+S (d) Alt+W+B
in MS Word
220. Current window may be split to 2 parts
to enable viewing of different sections 229. On opening MS Word (without click-
of the document at the same time using ing on a target document), it displays
shortcut in MS Word. document.
(a) Alt+W+N (b) Alt+W+A (a) previous (b) formatted
(c) Alt+W+S (d) Alt+W+B (c) completed (d) blank/ new
221. 2 documents may be opened side by 230. MS Word provides to func-
side using shortcut in MS tion as the starting point special new
Word. documents like report, visiting card,
(a) Alt+W+N (b) Alt+W+A
brochure, etc.

Prepared by: Dr.V.Nagaradjane


50 Prepared by: Dr.V.Nagaradjane

(a) template (b) macro (b) Home− > F ont Color (Alt + H + F C)
(c) image (d) table (c) Home− > Background (Alt + H + I)
231. After opening a new document in MS (d) Home− > F ont Size (Alt + H + F S)
Word, one should to create 238. In MS Word, tables, figures and equa-
a comfortable experience. tions may be assigned numbers using
(a) set paper size menu.
(b) set font size (a) P age Layout− > P age Setup (Alt + P +
(c) set paragraph spacing, line spacing SP )
(d) all of them (b) Home− > F ont Color (Alt + H + F C)
232. Page setup in MS Word may be accessed (c) Home− > Background (Alt + H + I)
using menu. (d) Ref erences− > Insert Caption (Alt + S +
(a) P ageLayout− > P ageSetup(Alt + P + SP ) P)
(b) Home− > P aragraph(Alt + H + P G) or 239. In MS Word, book title, chapter title,
P ageLayout− > P aragraph(Alt + P + P G) heading1, heading2, normal text, etc.
(c) Home− > F ontF ace(Alt + H + F F ) may be inserted using menu.
(d) Home− > F ontSize(Alt + H + F S) (a) Home− > Styles (Alt + H + L)
233. Paragraph settings in MS Word may be (b) Home− > F ont Color (Alt + H + F C)
accessed using menu. (c) Home− > Background (Alt + H + I)
(a) P age Layout− > P age Setup (Alt + P + (d) Ref erences− > Insert Caption (Alt + S +
SP ) P)
(b) Home− > P aragraph (Alt + H + P G) or 240. In MS Word, citation to references may
P age Layout− > P aragraph(Alt+P +P G) be inserted using menu.
(c) Home− > F ont F ace (Alt + H + F F ) (a) Ref erences− > Insert Citation(Alt + S +
(d) Home− > F ont Size (Alt + H + F S) C)
234. Font face may be changed in MS Word (b) Ref erences− > M ark Entry (Alt+S +N )
using menu. (c) Home− > Background (Alt + H + I)
(a) P age Layout− > P age Setup (Alt + P + (d) Ref erences− > Insert Caption (Alt + S +
SP ) P)
(b) Home− > P aragraph (Alt + H + P G) or 241. In MS Word, words to be indexed at
P age Layout− > P aragraph (Alt + P + the end of book may be marked using
P G) menu.
(c) Home− > F ont F ace (Alt + H + F F ) (a) Ref erences− > Insert Citation (Alt + S +
(d) Home− > F ont Size (Alt + H + F S) C)
(b) Ref erences− > M ark Entry (Alt+S +N )
235. Font size may be changed in MS Word
(c) Home− > Background (Alt + H + I)
using menu.
(a) P age Layout− > P age Setup (Alt + P + (d) Ref erences− > InsertCaption (Alt + S +
SP ) P)
(b) Home− > P aragraph (Alt + H + P G) or 242. In MS Word, table, picture, shapes, flow
P age Layout− > P aragraph (Alt + P + charts, headers, footers, page numbers,
P G) word art, drop cap, equations or symbols
(c) Home− > F ont F ace (Alt + H + F F ) may be inserted using menu.
(d) Home− > F ont Size (Alt + H + F S) (a) Ref erences− > Insert Citation (Alt + S +
236. In MS Word, font colour may be C)
changed using menu. (b) Ref erences− > M ark Entry(Alt + S + N )
(a) P age Layout− > P age Setup (Alt + P + (c) Home− > Background (Alt + H + I)
SP ) (d) Insert
(b) Home− > F ont Color (Alt + H + F C) 243. In MS Word, menu helps to
(c) Home− > F ont F ace (Alt + H + I) save the document in a new name.
(d) Home− > F ont Size (Alt + H + F S) (a) Home− > Save As (Alt + F + A)
(b) Ref erences− > M ark Entry (Alt+S +N )
237. In MS Word, background colour may be
changed using menu. (c) Home− > Background (Alt + H + I)
(a) P age Layout− > P age Setup (Alt + P + (d) Insert
SP )
Q. Bank [COPA Semester - 1] 51

1.4.6 Inserting objects in MS Word (a) Insert− > Clip Art (Alt + N + F )
(b) Insert− > W ord Art (Alt + N + W )
244. are the most important (c) Insert− > Drop Cap (Alt + N + RC)
objects used in MS Word documents. (d) Insert− > Equation (Alt + N + E)
(a) tables & pictures
(b) shapes, flow charts & clip arts 252. In MS Word, special symbols may be
(c) equations, lists, bullets & numbering inserted using menu.
(a) Insert− > Clip Art (Alt + N + F )
(d) all of them
(b) Insert− > Symbols (Alt + N + U )
245. In MS Word, table can be inserted using (c) Insert− > Drop Cap (Alt + N + RC)
menu. (d) Insert− > Equation (Alt + N + E)
(a) Insert− > T able (Alt + N + T )
(b) Insert− > P icture (Alt + N + P ) 253. In MS Word, objects from other
(c) Ref erences− > Insert Caption (Alt + S + applications may be inserted using
N) menu.
(a) Insert− > T ext f rom F ile (Alt + N + J +
(d) Insert− > Equation (Alt + N + E)
F)
246. In MS Word, picture can be inserted us- (b) Insert− > Symbols (Alt + N + U )
ing menu. (c) Insert− > Objects− > Objects (Alt + N +
(a) Insert− > T able (Alt + N + T )
J + J)
(b) Insert− > P icture (Alt + N + P ) (d) Insert− > Equation (Alt + N + E)
(c) Ref erences− > Insert Caption (Alt + S +
N) 254. In MS Word, text from other ap-
(d) Insert− > Equation (Alt + N + E) plications may be inserted using
menu.
247. In MS Word, caption for table, image or (a) Insert− > T ext f rom F ile (Alt + N + J +
equation number can be inserted using F)
menu. (b) Insert− > Symbols (Alt + N + U )
(a) Insert− > T able (Alt + N + T ) (c) Insert− > Objects− > Objects (Alt + N +
(b) Insert− > P icture (Alt + N + P ) J + J)
(c) Ref erences− > Insert Caption (Alt + S + (d) Insert− > Equation (Alt + N + E)
N)
(d) Insert− > Equation (Alt + N + E)
1.4.7 Inserting Macros in MS Word
248. In MS Word, equation can be inserted
using menu. 255. MS Word has the ability to automate
(a) Insert− > T able (Alt + N + T )
repeated tasks using .
(b) Insert− > P icture (Alt + N + P ) (a) tables (b) pictures
(c) Ref erences− > Insert Caption (Alt + S + (c) equations (d) macros
N)
(d) Insert− > Equation (Alt + N + E) 256. In MS Word, a Macro may be assigned
to invoke its functionality.
249. In MS Word, clip art can be inserted (a) keyboard shortcut
using menu. (b) a button
(a) Insert− > Clip Art (Alt + N + F )
(c) either keyboard shortcut or button
(b) Insert− > P icture (Alt + N + P )
(d) neither keyboard shortcut nor button
(c) Ref erences− > Insert Caption (Alt + S +
N) 257. To make the M acros tab visible, one
(d) Insert− > Equation (Alt + N + E) needs to open the options dialog using
.
250. In MS Word, special artistic design text (a) F ile− > Options (Alt + F + T )
may be inserted using (b) Review− > Options
menu. (c) Insert− > Options
(a) Insert− > Clip Art (Alt + N + F )
(d) Home− > Options
(b) Insert− > W ord Art (Alt + N + RC)
(c) Ref erences− > Insert Caption (Alt + S + 258. In MS Word, one may display the
N) Developer tab in the menu bar
(d) Insert− > Equation (Alt + N + E) through the options dialog by choosing
251. In MS Word, drop cap may be inserted .
(a) CustomizeRibbon− > T oolT abs− >
using menu. Design

Prepared by: Dr.V.Nagaradjane


52 Prepared by: Dr.V.Nagaradjane

(b) CustomizeRibbon− > M ainT abs− > 266. In MS Word, coding in Visual Basic for
Developer Applications (VBA) may be carried out
(c) CustomizeRibbon− > M ainT abs− > to customize the available features or
Outlining add new features using .
(d) CustomizeRibbon− > M ainT abs− > (a) M acros− > M acros (Alt + L + P M )
Insert (b) M acros− > Record M acro (Alt + L + R)
259. In MS Word, Macro security settings (c) M acros− > V isual Basic (Alt + L + V )
may be accessed through . (d) M acros− >
(a) M acros− > M acro Security (Alt+L+AS)
M acros Resume Recorder (Alt + L + S)
(b) M acros− > Record M acro (Alt + L + R)
While creating a macro, its availability
(c) M acros− > P ause Recording (Alt+L+S) 267.
may be .
(d) M acros− > M acros (Alt + L + P M )
(a) granted to all documents
260. In MS Word, New macro may be (b) restricted to the current document
recorded through . (c) both a & b
(a) M acros− > M acro Security (Alt+L+AS)
(d) neither a nor b
(b) M acros− > Record M acro (Alt + L + R)
(c) M acros− > P ause Recording (Alt+L+S)
(d) M acros− > M acros (Alt + L + P M ) 1.4.8 Creating mail merge in MS
261. In MS Word, the default macro security Word
setting is .
(a) Enable all macros 268. The feature in MS Word which helps
(b) Disable all macros to create customized correspondence
(c) Trust VBA Code targeting different recipients is called
(d) Do not trust VBA code .
(a) mail merge (b) charting
262. In MS Word, it is better change macro (c) clip art (d) equations
security setting to before
starting record or use macros. 269. A mail merge document requires a
(a) Enable all macros to fill the blank spaces.
(b) Disable all macros (a) picture
(c) Trust VBA Code (b) record source
(d) Do not trust VBA code (c) chart
(d) equation
263. In MS Word, recording of macros may
be paused and certain actions which 270. To create mail merge using existing list
need not be recorded in the macro may of recipients, choose .
(a) Mailings− >Select Recepients− >Use Exist-
be performed through .
(a) M acros− > M acro Security (Alt+L+AS) ing List
(b) Mailings− >Select Recepients− >Type New
(b) M acros− > Record M acro (Alt + L + R)
List
(c) M acros− > P ause Recording (Alt+L+S) (c) Mailings− >Select Recepients− >Select
(d) M acros− > from Outlook Contacts
M acros Resume Recorder (Alt + L + S) (d) Mailings− >Insert Merge Field
264. In MS Word, paused macro recording 271. To create mail merge using new list,
may be resumed through . choose .
(a) M acros− > M acro Security (Alt+L+AS) (a) Mailings− >Select Recepients− >Use Exist-
(b) M acros− > Record M acro (Alt + L + R) ing List
(c) M acros− > P ause Recording (Alt+L+S) (b) Mailings− >Select Recepients− >Type New
(d) M acros− > List
(c) Mailings− >Select Recepients− >Select
M acros Resume Recorder (Alt + L + S)
from Outlook Contacts
265. In MS Word, recorded macros may be (d) Mailings− >Insert Merge Field
edited or deleted through .
(a) M acros− > M acros (Alt + L + P M ) 272. To create mail merge using Outlook
(b) M acros− > Record M acro (Alt + L + R) contacts list, choose .
(a) Mailings− >Select Recepients− >Use Exist-
(c) M acros− > P ause Recording (Alt+L+S) ing List
(d) M acros− >
M acros Resume Recorder (Alt + L + S)
Q. Bank [COPA Semester - 1] 53

(b) Mailings− >Select Recepients− >Type New (a) template


List (b) pdf file
(c) Mailings− >Select Recepients− >Select (c) plain text file
from Outlook Contacts (d) HTML file
(d) Mailings− >Insert Merge Field
273. In MS Word, to insert a mail merge field 280. A document may be saved as a template
in document, choose . using File− >Save As from the menu
(a) Mailings− >Select Recepients− >Use Exist- and choosing as the docu-
ing List ment type.
(b) Mailings− >Select Recepients− >Type New (a) Excel Template
List (b) HTML file
(c) Mailings− >Select Recepients− >Select (c) Word Template
from Outlook Contacts (d) Open Document Format (ODF)
(d) Mailings− >Insert Merge Field
281. Default extension for word template is
274. In MS Word, data sources for
mail merge may be prepared using .
(a) .docx (b) .dotx
. (c) .xlsx (d) .pptx
(a) MS Excel
(b) MS Access 282. Content created using template docu-
(c) Plain text file with tab for field separation & ment .
(a) should be saved as Excel file
newline for record separation
(d) all of them (b) should be saved as new word document
(c) should be saved as new power point document
275. Mail merge results may be previewed us-
(d) none of them
ing menu.
(a) Mailings− >Edit Individual Documents 283. Magazines, journals and proceedings
(b) Mailings− >Preview Results (Alt+M+P) may publish for the help of
(c) Mailings− >Print Documents authors in following the right styles for
(d) Mailings− >Send E-Mail Messages publication.
(a) picture
276. In MS Word, individual documents re-
(b) screenshot
sulting from mail merge may be edited
(c) template document
using menu.
(a) Mailings− >Edit Individual Documents (d) Excel spreadsheets
(b) Mailings− >Preview Results (Alt+M+P)
(c) Mailings− >Print Documents 1.4.10 Page setup & printing in MS
(d) Mailings− >Send E-Mail Messages Word
277. In MS Word, mail merge results may be
printed using menu. 284. In MS Word, Selecting page size, mar-
(a) Mailings− >Edit Individual Documents gins and paper orientation is possible
(b) Mailings− >Preview Results (Alt+M+P) through .
(c) Mailings− >Print Documents (a) Page Layout− >Columns
(d) Mailings− >Send E-Mail Messages (b) Page Layout− >Page Setup (Alt+P+SP)
278. In MS Word, mail merge results may (c) Page Layout− >Water Mark
be sent through email using (d) Page Layout− >Page Color
menu. 285. In MS Word, choosing number of
(a) Mailings− >Edit Individual Documents columns per page is possible through
(b) Mailings− >Preview Results (Alt+M+P) through .
(c) Mailings− >Print Documents (a) Page Layout− >Columns
(d) Mailings− >Send E-Mail Messages (b) Page Layout− >Page Setup (Alt+P+SP)
(c) Page Layout− >Water Mark
1.4.9 Creating templates in MS (d) Page Layout− >Page Color
Word 286. In MS Word, water mark can be inserted
or removed through .
279. A standard standard document with (a) Page Layout− >Columns
proper formatting and layout may be
saved as a , which may be
used as the base for new documents.
Prepared by: Dr.V.Nagaradjane
54 Prepared by: Dr.V.Nagaradjane

(b) Page Layout− >Page Setup (Alt+P+SP) (b) scale


(c) Page Layout− >Water Mark (c) printer properties− >Finishing-¿Print on both
(d) Page Layout− >Page Color sides
(d) Properties− >Paper/Quality
287. In MS Word, page background colour
may be selected through . 295. A document may be printed on both
(a) Page Layout− >Columns sides of paper using op-
(b) Page Layout− >Page Setup (Alt+P+SP) tion available in print dialog.
(c) Page Layout− >Water Mark (a) collate
(d) Page Layout− >Page Color (b) scale
(c) printer properties− >Finishing-¿Print on both
288. In MS Word, page border may be se- sides
lected through . (d) Properties− >Paper/Quality
(a) Page Layout− >Page Border
(b) Page Layout− >Page Setup (Alt+P+SP) 296. The print resolution (quality) and
colour preferences may be set using
(c) Page Layout− >Water Mark
option available in print
(d) Page Layout− >Page Color
dialog.
289. When the width of paper is smaller and (a) collate
height of paper is larger, the orientation (b) scale
is called . (c) printer properties− >Finishing-¿Print on both
(a) landscape
sides
(b) portrait (d) Properties− >Paper/Quality
(c) both a & b
(d) neither a nor b
290. When the width of paper is larger and Answers (643 - 938)
height of paper is smaller, the orienta-
tion is called . 1. (a) 2. (b) 3. (c) 4. (d)
(a) landscape 5. (a) 6. (c) 7. (b) 8. (d)
(b) portrait 9. (c) 10. (d) 11. (b) 12. (a)
(c) both a & b 13. (c) 14. (c) 15. (d) 16. (c)
(d) neither a nor b 17. (b) 18. (d) 19. (a) 20. (b)
291. Commonly used paper sizes for MS 21. (d) 22. (c) 23. (a) 24. (c)
Word documents are . 25. (d) 26. (c) 27. (a) 28. (d)
(a) A4 (b) letter 29. (c) 30. (b) 31. (c) 32. (d)
(c) legal (d) all of them 33. (a) 34. (a) 35. (a) 36. (a)
292. In MS Word, a document may be printed 37. (b) 38. (b) 39. (c) 40. (c)
using . 41. (d) 42. (d) 43. (b) 44. (b)
(a) File− >Print (Ctrl+P) 45. (c) 46. (c) 47. (a) 48. (a)
(b) Home− >Copy (Ctrl+C) 49. (a) 50. (b) 51. (c) 52. (d)
(c) Home− >Cut (Ctrl+X) 53. (a) 54. (a) 55. (b) 56. (c)
(d) Home− >Paste (Ctrl+V) 57. (d) 58. (b) 59. (c) 60. (d)
293. MS Word document typeset on specific 61. (a) 62. (d) 63. (a) 64. (d)
paper size may be printed on a different 65. (a) 66. (b) 67. (c) 68. (a)
paper size using option 69. (d) 70. (c) 71. (b) 72. (a)
available in print dialog. 73. (b) 74. (c) 75. (d) 76. (a)
(a) collate 77. (a) 78. (c) 79. (b) 80. (d)
(b) scale 81. (a) 82. (b) 83. (c) 84. (b)
(c) printer properties− >Finishing-¿Print on both 85. (a) 86. (c) 87. (d) 88. (c)
sides 89. (b) 90. (a) 91. (c) 92. (d)
(d) Properties− >Paper/Quality 93. (a) 94. (b) 95. (c) 96. (d)
294. Multiple copies of a document may be 97. (b) 98. (c) 99. (a) 100. (b)
printed in complete sets (divide by set) 101. (c) 102. (d) 103. (c) 104. (a)
using option available in 105. (b) 106. (c) 107. (a) 108. (d)
print dialog. 109. (a) 110. (b) 111. (c) 112. (d)
(a) collate 113. (a) 114. (a) 115. (b) 116. (c)
Q. Bank [COPA Semester - 1] 55

117. (d) 118. (a) 119. (b) 120. (c) 209. (c) 210. (a) 211. (b) 212. (c)
121. (d) 122. (a) 123. (b) 124. (c) 213. (d) 214. (a) 215. (b) 216. (c)
125. (d) 126. (a) 127. (b) 128. (c) 217. (d) 218. (a) 219. (b) 220. (c)
129. (d) 130. (a) 131. (a) 132. (b) 221. (d) 222. (a) 223. (b) 224. (d)
133. (c) 134. (d) 135. (a) 136. (b) 225. (c) 226. (b) 227. (c) 228. (c)
137. (c) 138. (d) 139. (b) 140. (a) 229. (d) 230. (a) 231. (d) 232. (a)
141. (c) 142. (d) 143. (a) 144. (b) 233. (b) 234. (c) 235. (d) 236. (b)
145. (c) 146. (d) 147. (a) 148. (b) 237. (c) 238. (d) 239. (d) 240. (a)
149. (d) 150. (c) 151. (a) 152. (b) 241. (b) 242. (d) 243. (a) 244. (d)
153. (c) 154. (d) 155. (a) 156. (b) 245. (a) 246. (b) 247. (c) 248. (d)
157. (c) 158. (d) 159. (a) 160. (b) 249. (a) 250. (b) 251. (c) 252. (b)
161. (c) 162. (a) 163. (b) 164. (c) 253. (c) 254. (a) 255. (d) 256. (c)
165. (d) 166. (b) 167. (a) 168. (c) 257. (a) 258. (b) 259. (a) 260. (b)
169. (d) 170. (a) 171. (b) 172. (c) 261. (b) 262. (a) 263. (c) 264. (d)
173. (d) 174. (a) 175. (d) 176. (c) 265. (a) 266. (b) 267. (c) 268. (a)
177. (b) 178. (c) 179. (c) 180. (d) 269. (b) 270. (a) 271. (b) 272. (c)
181. (a) 182. (b) 183. (a) 184. (c) 273. (d) 274. (d) 275. (b) 276. (a)
185. (a) 186. (d) 187. (b) 188. (d) 277. (c) 278. (d) 279. (a) 280. (c)
189. (b) 190. (a) 191. (b) 192. (d) 281. (b) 282. (b) 283. (c) 284. (b)
193. (c) 194. (a) 195. (c) 196. (b) 285. (a) 286. (c) 287. (d) 288. (a)
197. (d) 198. (a) 199. (b) 200. (d) 289. (b) 290. (a) 291. (d) 292. (a)
201. (c) 202. (a) 203. (b) 204. (c) 293. (b) 294. (a) 295. (c) 296. (d)
205. (a) 206. (b) 207. (c) 208. (d)

Prepared by: Dr.V.Nagaradjane


56 Prepared by: Dr.V.Nagaradjane

1.5 MS Excel (a) Javascript


(b) Visual Basic for Applications (VBA)
1. Columns in MS Excel are named in the (c) ASP.NET
form of . (d) C#.NET
(a) alphabets (A, B, C, D,...)
12. Each file in MS Excel is called a
(b) numbers (1,2,3,4,...)
.
(c) roman numerals (I,II, III, IV,...) (a) workbook (b) worksheet
(d) none of them (c) notesheet (d) notebook
2. Rows in MS Excel are named in the form 13. Each sheet in MS Excel file is called a
of . .
(a) alphabets (A, B, C, D,...) (a) workbook (b) worksheet
(b) numbers (1,2,3,4,...) (c) notesheet (d) notebook
(c) roman numerals (I,II, III, IV,...)
14. By default, Excel worksheets are named
(d) none of them
.
3. The intersection of a row and column in (a) book1, book2, book3, ...
MS Excel is called . (b) sheet1, sheet2, sheet3,...
(a) spreadsheet (b) workbook (c) page1, page2, page3, ...
(c) document (d) cell (d) note1, note2, note3, ...
4. The cell having and column number 3
15. Excel file without any macros has the
and row number 6 is denoted by the
default extension of .
name . (a) .xlsx (b) .xls
(a) F3 (b) C6
(c) .xlsm (d) .xlst
(c) C3 (d) F6
16. Excel file containing macros has the de-
5. In MS Excel, a function is entered by
fault extension of .
typing symbol first. (a) .xlsx (b) .xls
(a) @ (b) $ (c) .xlsm (d) .xlst
(c) # (d) =
17. MS Excel can reference data in
6. MS Excel can given data. .
(a) sort (a) the same sheet
(b) statistically analyze (b) different sheet in the same workbook
(c) draw graphs for (c) different sheet in a different workbook
(d) all of them (d) all of them
7. The latest version of MS Excel can have
rows. 1.5.1 Data types in MS Excel
(a) 10,48,576 (b) 16,384
(c) 1024 (d) 512
18. In MS Excel, the common type of data
8. The latest version of MS Excel can have applicable to any cell is called
columns. data type.
(a) 10,48,576 (b) 16,384
(a) General (b) Number
(c) 1024 (d) 512
(c) Currency (d) Text
9. Excel supports recording of repeated ac-
tions with the help of . 19. In MS Excel, the data type suitable for
(a) graph handling numbers is called
(b) chart data type.
(a) General (b) Number
(c) macro
(c) Currency (d) Text
(d) other applications
10. MS Excel macros can be invoked using 20. In MS Excel, number data type can con-
. trol the .
(a) button (a) digit grouping
(b) keystroke (b) number of decimal places
(c) both a & b (c) both a & b
(d) neither a nor b (d) neither a nor b
11. MS Excel supports a version of Visual
Basic called for program-
ming.
Q. Bank [COPA Semester - 1] 57

21. In MS Excel, numbers can be grouped (a) 0 (b) #


and prefixed with a currency symbol us- (c) $ (d) ˆ
ing data type.
(a) Accounting
(b) Currency
1.5.2 Cell referencing
(c) both a & b
32. When copying and pasting an excel for-
(d) neither a nor b mula, the method which permits for-
22. In MS Excel, data type is suit- mula to progressively update cell ref-
able for handling dates. erences is called referecing
(a) Date (b) Time system.
(c) Percentage (d) Fraction (a) static
23. In MS Excel, data type is suit- (b) semi-relative
able for handling time values. (c) relative
(a) Date (b) Time (d) none of them
(c) Percentage (d) Fraction
33. When copying and pasting an excel for-
24. In MS Excel, data type takes mula, the method which permits for-
values between 0 and 1 and displays mula to progressively update either col-
them in percentage format. umn reference or row reference (but
(a) Date (b) Time
not both column and row references) is
(c) Percentage (d) Fraction
called referecing system.
25. In MS Excel, data type displays (a) static
decimal fractions as vulgar or mixed (b) semi-relative
fractions. (c) relative
(a) Date (b) Time
(d) none of them
(c) Percentage (d) Fraction
34. When copying and pasting an excel for-
26. In MS Excel, data type displays
mula, the method which keeps refer-
numbers in scientific notation.
(a) Scientific (b) Text ences to a particular cell address is called
(c) Custom (d) Date referecing system.
(a) static
27. In MS Excel, data type is suit-
(b) semi-relative
able for names and other character se-
(c) relative
quences.
(a) Scientific (b) Text (d) none of them
(c) Custom (d) Date 35. The formula = A5 ∗ 5 is written in
28. In MS Excel, data type sup- system.
ports formating of numbers with suit- (a) static
able customization. (b) semi-relative
(a) Scientific (b) Text (c) relative
(c) Custom (d) Date (d) none of them
29. In MS Excel, for the number 45453453 36. The formula = A5 ∗ 5, when copied to
to be displayed as 4,54,53,453.0, the the next row of the same column, will
custom format could be . become system.
(a) ##,##,##,##0.0 (a) = A4 ∗ 5 (b) = B5 ∗ 5
(b) ###,###,##0.0 (c) = A7 ∗ 5 (d) = A6 ∗ 5
(c) ########0.0
(d) ##,##,##,###.#
1.5.3 Categories of functions in MS
30. In custom formating of numbers, an op-
tional digit is denoted by Excel
symbol.
(a) 0 (b) # 37. In MS Excel, functions help
(c) $ (d) ˆ to access databases stored in spread-
31. In custom formating of numbers, a com- sheets.
(a) Cube/ Database
pulsory/ mandatory digit is denoted by (b) Date/ Time
symbol.

Prepared by: Dr.V.Nagaradjane


58 Prepared by: Dr.V.Nagaradjane

(c) Engineering (d) Math & Trigonometric


(d) Financial 45. In MS Excel, statistical functions like
38. functions help to access date average, standard deviation, median,
and time functions in MS Excel. mode, etc. can be accessed under the
(a) Cube/ Database category .
(b) Date/ Time (a) Logical
(c) Engineering (b) Lookup & reference
(d) Financial (c) Math & Trigonometric
39. functions help to access base (d) Statistical
conversion, logarithmic and other Engi- 46. In MS Excel, functions for length of text,
neering features in MS Excel. text search, text concatenation, upper,
(a) Cube/ Database lower and proper, etc. can be accessed
(b) Date/ Time under the category .
(c) Engineering (a) Text
(d) Financial (b) Logical
40. In MS Excel, functions help (c) Lookup & reference
to access interest calculation, account- (d) Math & Trigonometric
ing and currency related calculations.
(a) Cube/ Database Date functions
(b) Date/ Time
(c) Engineering 47. function in MS Excel takes
(d) Financial year, month and date values and displays
In MS Excel, functions help given date.
41.
(a) DATE (b) DATEDIF
to check the status of cells, as to
(c) DATEVALUE (d) DAY
whether the cell is blank, contains a
number, text, type of data, etc. 48. function in MS Excel takes a
(a) Information date value and returns the day of month.
(b) Logical (a) DATE (b) DATEDIF
(c) Lookup & reference (c) DATEVALUE (d) DAY
(d) Math & Trigonometric 49. function in MS Excel takes
42. In MS Excel, functions help 2 date values and calculates the differ-
to make logical functions like AND, OR, ence between the dates in years (”Y”),
NOT, etc. months (”M”) or days (”D”).
(a) Information (a) DATE (b) DATEDIF
(b) Logical (c) DATEVALUE (d) DAY
(c) Lookup & reference 50. function in MS Excel takes
(d) Math & Trigonometric a date string and returns parsed date
43. In MS Excel, functions help value.
(a) DATE (b) DATEDIF
to make lookup in other sheets and ref-
(c) DATEVALUE (d) DAY
erences.
(a) Information 51. function in MS Excel returns
(b) Logical number of days between given dates.
(c) Lookup & reference (a) DAYS/ DAYS360
(d) Math & Trigonometric (b) EDATE
In MS Excel, mathematical functions (c) EOMONTH
44.
like round, absolute, ceiling, floor, etc. (d) HOUR
and trigonometric functions like sin, cos, 52. function in MS Excel takes
tan, asin, acos, atan, etc are containing a date, number of months to offset from
the category of . that date and returns new date.
(a) Information (a) DAYS/ DAYS360
(b) Logical (b) EDATE
(c) Lookup & reference (c) EOMONTH
(d) HOUR
Q. Bank [COPA Semester - 1] 59

53. function in MS Excel returns 64. In MS Excel, function con-


last date of the month represented by verts a binary number to hexadecimal
given date. number.
(a) DAYS/ DAYS360 (a) BIN2DEC (b) BIN2HEX
(b) EDATE (c) BIN2OCT (d) BITAND
(c) EOMONTH 65. In MS Excel, function con-
(d) HOUR verts a binary number to octal number.
54. function in MS Excel returns (a) BIN2DEC (b) BIN2HEX
the hour represented by the given time. (c) BIN2OCT (d) BITAND
(a) DAYS/ DAYS360 66. In MS Excel, function per-
(b) EDATE forms bitwise AND operation.
(c) EOMONTH (a) BIN2DEC (b) BIN2HEX
(d) HOUR (c) BIN2OCT (d) BITAND
55. function in MS Excel returns 67. In MS Excel, function per-
minutes from a time value. forms bitwise OR operation.
(a) MINUTES (b) SECOND (a) BITOR (b) BITSHIFT
(c) EOMONTH (d) HOUR (c) BITXOR (d) BITAND
56. function in MS Excel returns 68. In MS Excel, function per-
seconds from a time value. forms bitwise right shift operation.
(a) MINUTES (b) SECOND (a) BITOR (b) BITSHIFT
(c) EOMONTH (d) HOUR (c) BITXOR (d) BITAND
57. function in MS Excel returns
69. In MS Excel, function per-
current time. forms bitwise XOR operation.
(a) MINUTES (b) SECOND
(a) BITOR (b) BITSHIFT
(c) NOW (d) HOUR
(c) BITXOR (d) BITAND
58. function in MS Excel returns
current date. 70. In MS Excel, function con-
(a) MINUTES (b) SECOND verts given value from one unit to an-
(c) NOW (d) TODAY other (for example, ”m” to ”ft”).
(a) COVNERT (b) DEC2BIN
59. function in MS Excel returns
(c) DEC2HEX (d) DEC2OCT
day of week for given date.
(a) WEEKDAY (b) WORKDAY 71. In MS Excel, function con-
(c) YEAR (d) YEARFRAC verts decimal number to binary number.
function in MS Excel returns (a) COVNERT (b) DEC2BIN
60.
the date after given number of working (c) DEC2HEX (d) DEC2OCT
days. 72. In MS Excel, function con-
(a) WEEKDAY (b) WORKDAY verts decimal number to hexadecimal
(c) YEAR (d) YEARFRAC number.
(a) COVNERT (b) DEC2BIN
61. function in MS Excel returns
(c) DEC2HEX (d) DEC2OCT
the year part of given date.
(a) WEEKDAY (b) WORKDAY 73. In MS Excel, function con-
(c) YEAR (d) YEARFRAC verts decimal number to octal number.
(a) COVNERT (b) DEC2BIN
62. function in MS Excel returns (c) DEC2HEX (d) DEC2OCT
fractional year between given dates.
(a) WEEKDAY (b) WORKDAY 74. In MS Excel, function returns
(c) YEAR (d) YEARFRAC 1 if given values are equal.
(a) DELTA (b) DEC2BIN
(c) DEC2HEX (d) DEC2OCT
Engineering functions
75. In MS Excel, function con-
63. In MS Excel, function con- verts hexadecimal number to binary
verts a binary number to decimal num- number.
(a) DELTA (b) HEX2BIN
ber.
(a) BIN2DEC (b) BIN2HEX (c) HEX2DEC (d) HEX2OCT
(c) BIN2OCT (d) BITAND

Prepared by: Dr.V.Nagaradjane


60 Prepared by: Dr.V.Nagaradjane

76. In MS Excel, function con- (a) ISNUMBER (b) ISNONTEXT


verts hexadecimal number to decimal (c) ISNA (d) ISLOGICAL
number. 87. In MS Excel, function re-
(a) DELTA (b) HEX2BIN
turns true if #NA error has occurred.
(c) HEX2DEC (d) HEX2OCT (a) ISNUMBER (b) ISNONTEXT
77. In MS Excel, function con- (c) ISNA (d) ISLOGICAL
verts hexadecimal number to octal num-
88. In MS Excel, function re-
ber.
(a) DELTA (b) HEX2BIN turns number equivalent of text value.
(c) HEX2DEC (d) HEX2OCT (a) N (b) NA
(c) TYPE (d) AND
Cell information functions 89. In MS Excel, function re-
turns #NA error number.
78. In MS Excel, function re- (a) N (b) NA
turns true if a cell is blank. (c) TYPE (d) AND
(a) ISBLANK (b) ISERR
90. In MS Excel, function re-
(c) ISEVEN (d) ISODD turns a number corresponding to the
79. In MS Excel, function re- data type of the cell.
turns true if there is an error in the for- (a) N (b) NA
mula contained in given cell. (c) TYPE (d) AND
(a) ISBLANK (b) ISERR
(c) ISEVEN (d) ISODD
Logical functions
80. In MS Excel, function re-
turns true if the given cell contains an 91. In MS Excel, function re-
even number. turns true only if all the given conditions
(a) ISBLANK (b) ISERR are true.
(c) ISEVEN (d) ISODD (a) OR (b) FALSE
81. In MS Excel, function re- (c) TRUE (d) AND
turns true if the given cell contains an 92. In MS Excel, function re-
odd number. turns true even if just one of the given
(a) ISBLANK (b) ISERR
conditions is true.
(c) ISEVEN (d) ISODD (a) OR (b) FALSE
82. In MS Excel, function re- (c) TRUE (d) AND
turns true if the given cell contains a 93. In MS Excel, function tests
formula. the condition given in the first part, exe-
(a) ISFORMULA (b) ISERR
cutes second part if the condition is true
(c) ISEVEN (d) ISODD
or executes third part if the condition is
83. In MS Excel, function re- false.
turns true if the given cell a logical value (a) OR (b) IF
(TRUE or FALSE). (c) TRUE (d) AND
(a) ISNUMBER (b) ISNONTEXT
(c) ISNA (d) ISLOGICAL Math functions
84. In MS Excel, function re-
turns true if the given cell contains a 94. In MS Excel, function returns
number. positive value irrespective of whether
(a) ISNUMBER (b) ISNONTEXT the input is positive or negative.
(c) ISNA (d) ISLOGICAL (a) ABS (b) ASIN
85. In MS Excel, function re- (c) ACOS (d) ATAN
turns true if the given cell contains Log- 95. In MS Excel, function returns
ical value (TRUE or FALSE). sin−1 value.
(a) ISNUMBER (b) ISNONTEXT (a) ABS (b) ASIN
(c) ISNA (d) ISLOGICAL (c) ACOS (d) ATAN
86. In MS Excel, function re-
turns true if the given cell contains a
value other than text (number, logical,
etc.).
Q. Bank [COPA Semester - 1] 61

96. In MS Excel, function returns (a) ROUNDUP (b) FLOOR


−1
cos value. (c) ROUND (d) ROUNDDOWN
(a) ABS (b) ASIN
(c) ACOS (d) ATAN 108. In MS Excel, function returns
the number of statistical combinations
97. In MS Excel, function returns (n Cr ) possible.
−1
tan value. (a) ROUNDUP (b) FLOOR
(a) ABS (b) ASIN
(c) COMBIN (d) PERMUT
(c) ACOS (d) ATAN
98. In MS Excel, function returns 109. In MS Excel, function returns
cot−1 value. the number of statistical permutations
(a) ACOT (b) ASIN (n Pr ) possible.
(c) ACOS (d) ATAN (a) ROUNDUP (b) FLOOR
99. In MS Excel, function returns (c) COMBIN (d) PERMUT
aggregate value like count, sum, aver- 110. In MS Excel, function con-
age, etc. verts given angle from radian to degrees.
(a) ARABIC (b) ASINH (a) DEGREES (b) RADIANS
(c) ATANH (d) AGGREGATE (c) EVEN (d) ODD
100. In MS Excel, function returns 111. In MS Excel, function con-
hyperbolic sin value. verts given angle from degrees to radi-
(a) ACOSH (b) ASINH ans.
(c) ATANH (d) AGGREGATE (a) DEGREES (b) RADIANS
101. In MS Excel, function returns (c) EVEN (d) ODD
hyperbolic cosine value. 112. In MS Excel, function returns
(a) ACOSH (b) ASINH the nearest even number.
(c) ATANH (d) AGGREGATE (a) DEGREES (b) RADIANS
(c) EVEN (d) ODD
102. In MS Excel, function returns
hyperbolic tan value. 113. In MS Excel, function returns
(a) ACOSH (b) ASINH the nearest odd number.
(c) ATANH (d) AGGREGATE (a) DEGREES (b) RADIANS
(c) EVEN (d) ODD
103. In MS Excel, function returns
the integer just above a fractional num- 114. In MS Excel, function returns
ber. the exponential value for given number.
(a) CEILING (b) FLOOR (a) EXP (b) LN
(c) ROUND (d) ROUNDDOWN (c) LOG/ LOG10 (d) FACT
104. In MS Excel, function returns 115. In MS Excel, function returns
the integer just below a fractional num- the natural logarithm for given number.
ber. (a) EXP (b) LN
(a) CEILING (b) FLOOR (c) LOG/ LOG10 (d) FACT
(c) ROUND (d) ROUNDDOWN 116. In MS Excel, function returns
105. In MS Excel, function returns the common logarithm (to the base 10)
the number rounded to the given digits. for given number.
(a) CEILING (b) FLOOR (a) EXP (b) LN
(c) ROUND (d) ROUNDDOWN (c) LOG/ LOG10 (d) FACT
106. In MS Excel, function re- 117. In MS Excel, function returns
turns the number rounded DOWN to the factorial of given number in integer
the given digits, simply discarding the format.
trailing value even if it is greater than or (a) FACTDOUBLE (b) LN
equal to 5. (c) LOG/ LOG10 (d) FACT
(a) CEILING (b) FLOOR 118. In MS Excel, function returns
(c) ROUND (d) ROUNDDOWN the factorial of given number in double
107. In MS Excel, function re- number format.
turns the number rounded UP to the (a) FACTDOUBLE (b) LN
given digits, simply discarding the trail-
ing value even if it is greater than or
equal to 5.
Prepared by: Dr.V.Nagaradjane
62 Prepared by: Dr.V.Nagaradjane

(c) LOG/ LOG10 (d) FACT (c) MROUND (d) RAND


119. In MS Excel, function returns 130. In MS Excel, function returns
the greatest common divisor for given a random number.
(a) PI (b) POWER
numbers.
(a) FACTDOUBLE (b) GCD (c) MROUND (d) RAND
(c) LCM (d) INT 131. In MS Excel, function returns
120. In MS Excel, function returns a random number between given lower
the least common multiple for given limit and upper limit.
numbers. (a) PI (b) POWER
(a) FACTDOUBLE (b) GCD (c) MROUND (d) RANDBETWEEN
(c) LCM (d) INT 132. In MS Excel, function con-
121. In MS Excel, function returns verts a number from Roman numeral to
the integer equivalent of given number, Arabic numeral.
after discarding fractional parts. (a) ROMAN (b) ARABIC
(a) FACTDOUBLE (b) GCD (c) SIGN (d) SQRT
(c) LCM (d) INT 133. In MS Excel, function con-
122. In MS Excel, function returns verts a number from Arabic numeral to
the determinant of given matrix. Roman numeral.
(a) MDTERM (b) MINVERSE (a) ROMAN (b) ARABIC
(c) MMUL (d) MOD (c) SIGN (d) SQRT
123. In MS Excel, function returns 134. In MS Excel, function returns
the inverse of given matrix. −1 if given number is negative and 1 if
(a) MDTERM (b) MINVERSE is positive.
(c) MMUL (d) MOD (a) ROMAN (b) ARABIC
(c) SIGN (d) SQRT
124. In MS Excel, function returns
the multiplication result of given matrix. 135. In MS Excel, function returns
(a) MDTERM (b) MINVERSE the square root of the given number.
(c) MMUL (d) MOD (a) ROMAN (b) ARABIC
(c) SIGN (d) SQRT
125. In MS Excel, function returns
the modulo remainder for given number 136. In MS Excel, function returns
and divisor. the subtotal of given numbers.
(a) QUOTIENT (b) MINVERSE (a) SUBTOTAL (b) SUM
(c) MMUL (d) MOD (c) SUMIF (d) SUMSQ
126. In MS Excel, function returns 137. In MS Excel, function returns
the quotient for given number and divi- the sum of given numbers.
sor. (a) SUBTOTAL (b) SUM
(a) QUOTIENT (b) MINVERSE (c) SUMIF (d) SUMSQ
(c) MMUL (d) MOD 138. In MS Excel, function returns
127. In MS Excel, function returns the sum of squares of given numbers.
the number rounded to the nearest mul- (a) SUBTOTAL (b) SUM
tiple of the second argument. (c) SUMIF (d) SUMSQ
(a) PI (b) POWER 139. In MS Excel, function returns
(c) MROUND (d) RAND the sum of those numbers that fulfill
128. In MS Excel, function returns given condition.
the value of π. (a) SUBTOTAL (b) SUM
(a) PI (b) POWER (c) SUMIF (d) SUMSQ
(c) MROUND (d) RAND
140. In MS Excel, function trun-
129. In MS Excel, function returns cates decimal digits of given real number
the power of given number raised by sec- to produce an integer value.
ond argument. (a) TRUNC (b) SUM
(a) PI (b) POWER (c) SUMIF (d) SUMSQ
Q. Bank [COPA Semester - 1] 63

Statistical functions in MS Excel (c) LARGE (d) MEDIAN


153. In MS Excel, function returns
141. In MS Excel, function cal- th
a n lastest value, where n is the second
culates the average absolute (unsigned)
argument for the function.
deviation. (a) GROWTH (b) GEOMEAN
(a) AVERAGE (b) AVEDEV
(c) AVERAGEIFS (d) CORREL (c) LARGE (d) MEDIAN
142. In MS Excel, function calcu- 154. In MS Excel, function returns
lates the average of given numbers. geometric mean.
(a) AVERAGE (b) AVEDEV (a) GROWTH (b) GEOMEAN
(c) AVERAGEIFS (d) CORREL (c) LARGE (d) MEDIAN
143. In MS Excel, function cal- 155. In MS Excel, function returns
culates the average of given numbers the largest value from a list.
(a) MAX (b) MIN
which fulfill the given conditions.
(a) AVERAGE (b) AVEDEV (c) PERMUT (d) RANK
(c) AVERAGEIFS (d) CORREL 156. In MS Excel, function returns
144. In MS Excel, function calcu- the smallest value from a list.
(a) MAX (b) MIN
lates the coefficient of correlation.
(a) AVERAGE (b) AVEDEV (c) PERMUT (d) RANK
(c) AVERAGEIFS (d) CORREL 157. In MS Excel, function returns
145. In MS Excel, function counts result of permutations.
the number of objects. (a) MAX (b) MIN
(a) COUNT (b) DEVSQ (c) PERMUT (d) RANK
(c) FORECAST (d) COUNTBLANK 158. In MS Excel, function returns
146. In MS Excel, function counts the rank of given number when com-
the number of blank cells. pared to a list of numbers.
(a) COUNT (b) DEVSQ (a) MAX (b) MIN
(c) FORECAST (d) COUNTBLANK (c) PERMUT (d) RANK
147. In MS Excel, function returns 159. In MS Excel, function returns
the sum of squares of deviations. th
the n smallest value from a sorted list.
(a) COUNT (b) DEVSQ (a) MAX (b) SMALL
(c) FORECAST (d) COUNTBLANK (c) PERMUT (d) RANK
148. In MS Excel, function counts 160. In MS Excel, function returns
the items based on given condition. the standard deviation of given numbers.
(a) COUNT (b) DEVSQ (a) MAX (b) SMALL
(c) FORECAST (d) COUNTIF (c) PERMUT (d) STDEV
149. In MS Excel, function counts
the items based on given conditions. Text functions
(a) COUNT (b) DEVSQ
(c) FORECAST (d) COUNTIFS 161. In MS Excel, function re-
150. In MS Excel, function pro- turns the character equivalent of nu-
vides a linear estimate of the result ex- meric ASCII value.
(a) CHAR (b) CODE
pected for given input. (c) DOLLAR (d) CONCATENATE
(a) COUNT (b) DEVSQ
(c) FORECAST (d) COUNTIFS 162. In MS Excel, function re-
turns the ASCII code for given character
151. In MS Excel, function pro-
value.
vides an exponential estimate of the re- (a) CHAR (b) CODE
sult expected for given input. (c) DOLLAR (d) CONCATENATE
(a) GROWTH (b) GEOMEAN
(c) LARGE (d) MEDIAN 163. ASCII stands for .
(a) American Standard Code for Information In-
152. In MS Excel, function returns
terface
the median value of a list. (b) African Standard Code for Information Inter-
(a) GROWTH (b) GEOMEAN
change

Prepared by: Dr.V.Nagaradjane


64 Prepared by: Dr.V.Nagaradjane

(c) American Standard Code for Information In- (c) PROPER (d) LEN
terchange 175. In MS Excel, function re-
(d) American Standard Character for Information turns a string after replacing given char-
Interchange acters of first string using the last string.
164. In MS Excel, function for- (a) SEARCH (b) REPLACE
mats a number as currency and prefixes (c) REPT (d) LOWER
the currency symbol of the locale.
(a) CHAR (b) CODE 176. In MS Excel, function re-
peats a string for given number of times.
(c) DOLLAR (d) CONCATENATE
(a) SEARCH (b) REPLACE
165. In MS Excel, function ap- (c) REPT (d) LOWER
pends several strings one after the other.
(a) CHAR (b) CODE 177. In MS Excel, function re-
(c) DOLLAR (d) CONCATENATE turns the location of the first string oc-
curring inside the second string.
166. In MS Excel, function com- (a) SEARCH (b) REPLACE
pares two text values. (c) REPT (d) LOWER
(a) FORMAT (b) LEFT
(c) EXACT (d) FIND 178. In MS Excel, function re-
turns a string only when the given input
167. In MS Excel, function re-
is a string, returning blank value other-
turns the location of the first string oc-
wise.
curring within the second, larger string. (a) TEXT (b) SUBSTITUTE
(a) FORMAT (b) LEFT (c) TRIM (d) T
(c) EXACT (d) FIND
179. In MS Excel, function re-
168. In MS Excel, function for- turns formatted version of given num-
mats given number based on rules pro- ber.
vided using # and 0 characters. (a) T (b) TEXT
(a) FORMAT (b) LEFT (c) SUBSTITUTE (d) TRIM
(c) EXACT (d) FIND
180. In MS Excel, function sub-
169. In MS Excel, function re- stitutes new text in place of given old
turns the leftmost character of a string. text.
(a) FORMAT (b) LEFT (a) T (b) TEXT
(c) EXACT (d) RIGHT (c) SUBSTITTE (d) TRIM
170. In MS Excel, function re- 181. In MS Excel, function re-
turns the rightmost character of a string. moves space at the beginning or end of
(a) FORMAT (b) LEFT a string.
(c) EXACT (d) RIGHT (a) T (b) TEXT
171. In MS Excel, function re- (c) SUBSTITTE (d) TRIM
turns the length of given string. 182. In MS Excel, function con-
(a) LOWER (b) UPPER verts given text to number.
(c) PROPER (d) LEN (a) T (b) VALUE
172. In MS Excel, function re- (c) SUBSTITTE (d) TRIM
turns the lower case version of given
string. 1.5.4 Sorting in MS Excel
(a) LOWER (b) UPPER
(c) PROPER (d) LEN 183. Data can be sorted using menu
173. In MS Excel, function re- in MS Excel.
turns the upper case version of given (a) Data− >Filter
string. (b) Data− >Sort
(a) LOWER (b) UPPER (c) Data− >What if analysis− >Data table
(c) PROPER (d) LEN (d) Data− >What if analysis− >Pivot table
174. In MS Excel, function re- 184. To sort data in MS Excel,
turns the first letter capitalized version containing data for sorting should be se-
of given string. lected.
(a) LOWER (b) UPPER (a) all the cells
Q. Bank [COPA Semester - 1] 65

(b) just the column (d) all of them


(c) just one row
(d) only one cell
1.5.6 Validation in MS Excel
185. The sort dialog in MS Excel contains
a tick box named to select 192. After selecting the cells to be subjected
whether the data contains a header row to data validation, choose from
or not. the menu to validate data in MS Excel.
(a) My data contains footers (a) Data− >Filter
(b) My data contains errors (b) Data− >Sort
(c) My data contains pictures (c) Data− >Validation
(d) My data contains headers (d) Data− >What if analysis− >Pivot table
186. The sorting dialog in MS Excel contains 193. In MS Excel, permitting data values in
boxes to choose sorting cri- specific range for entry in a cell is called
teria. of data.
(a) column name to be used for sorting (a) validation (b) sorting
(b) whether to sort by value, color or icon (c) filtering (d) chart
(c) whether to sort ascending or descending 194. The data validation dialog shows, allow
(d) all of them criterion with conditions.
187. In MS Excel, if the sorting requires sev- (a) between/ not between
eral levels of criteria, the same can be (b) equal to/ not equal to
added using button in sorting (c) >, <, ≥, ≤
dialog. (d) all of them
(a) Add level (b) add row 195. In MS Excel, data violating the val-
(c) add column (d) add filter idation rule may be using
Data− >Validation− >Circle invalid
1.5.5 Filtering in MS Excel data.
(a) encircled (b) deleted
188. Data can be filtered using (c) sorted (d) coloured
menu in MS Excel. 196. In MS Excel, to display a specific error
(a) Data− >Filter message for invalid data entry,
(b) Data− >Sort tab in validation dialog can be opened to
(c) Data− >What if analysis− >Data table set a custom message.
(d) Data− >What if analysis− >Pivot table (a) Error display
189. For applying filtering, the data should (b) Input message
contain . (c) Output message
(a) no header row
(d) Result message
(b) header row
(c) footer row
(d) pivot table 1.5.7 Charting in MS Excel
190. After selecting data and invoking
197. MS Excel supports type
Data− >Filter from the menu, a
chart.
appears in each column of (a) column/ bar
the first row to enable filtering. (b) pie/ area/ stock/ surface/ doughnut/ bubble/
(a) circle radar
(b) square (c) scatter/ line
(c) triangular button (d) all of them
(d) red dot 198. The data used for charting should have
191. The triangular filter button at header to decide the graph parame-
row of data helps sorting of data using ters like axis name.
. (a) header row (b) footer row
(a) ascending/descending order (c) blank row (d) blank column
(b) color 199. In MS Excel, pie chart may be inserted
(c) search specific values or applying filter condi- using menu.
tions for numbers

Prepared by: Dr.V.Nagaradjane


66 Prepared by: Dr.V.Nagaradjane

(a) Insert− >Pie (a) Row Input and Result


(b) Insert− >Column (b) Column Input and Result
(c) Insert− >Bar (c) both row input and column input along with
(d) Insert− >line result
(d) none of them
200. In MS Excel, bar chart may be inserted
using menu. 207. In MS Excel, for a column wise data ta-
(a) Insert− >Pie ble, fill input values in left column, cal-
(b) Insert− >Column culate result for first row in the right side
(c) Insert− >Bar column and choose in the Data
(d) Insert− >line table dialog.
(a) Row Input and Result
201. In MS Excel, column chart may be in- (b) Column Input and Result
serted using menu. (c) both row input and column input along with
(a) Insert− >Pie
result
(b) Insert− >Column (d) none of them
(c) Insert− >Bar
208. In MS Excel, to calculate results based
(d) Insert− >line
on two input values (like a matrix),
202. In MS Excel, line chart may be inserted choose from the Data table
using menu. dialog.
(a) Insert− >Pie (a) Row Input and Result
(b) Insert− >Column (b) Column Input and Result
(c) Insert− >Bar (c) both row input and column input along with
(d) Insert− >line result
203. In MS Excel, scatter chart may be in- (d) none of them
serted using menu.
(a) Insert− >Pie
1.5.9 Pivot table
(b) Insert− >Column
(c) Insert− >Bar 209. In MS Excel, summary of data in a table
(d) Insert− >X-Y scatter may be created using .
204. In MS Excel, charts may be customized (a) data table (b) pivot table
by on appropriate element of (c) chart (d) validation
the graph. 210. In MS Excel, data meant for pivot ta-
(a) selecting ble may be converted to a table using
(b) right clicking first.
(c) both a & b (a) Insert− >Table
(d) none of them (b) Insert− >Pie
(c) Insert− >Column
1.5.8 Data tables in MS Excel (d) Insert− >Scatter
211. In MS Excel, pivot table may be inserted
205. Results for several input values can be using first.
calculated based on one sample result (a) Insert− >Table
using menu in MS Excel. (b) Insert− >Pivot− >Pivot table
(a) Data− >Filter (c) Insert− >Pivot− >Pivot chart
(b) Data− >Sort (d) Insert− >Scatter
(c) Data− >What if analysis− >Pivot table
212. In MS Excel, pivot chart may be inserted
(d) Data− >What if analysis− >Data table using first.
206. In MS Excel, for a row wise data table, (a) Insert− >Table
fill input values in top row, calculate re- (b) Insert− >Pivot− >Pivot table
sult for first column in the second row (c) Insert− >Pivot− >Pivot chart
and choose in the Data table (d) Insert− >Scatter
dialog.
Q. Bank [COPA Semester - 1] 67

1.5.10 Goal seek in MS Excel Answers (939 - 1157)


213. After selecting the cells to be subjected 1. (a) 2. (b) 3. (d) 4. (b)
to data validation, choose from 5. (d) 6. (d) 7. (a) 8. (b)
the menu to apply goal seek in MS Ex- 9. (c) 10. (c) 11. (b) 12. (a)
cel. 13. (b) 14. (b) 15. (a) 16. (c)
(a) Data− >Filter
17. (d) 18. (a) 19. (b) 20. (c)
(b) Data− >What if analysis− >Data table
21. (c) 22. (a) 23. (b) 24. (c)
(c) Data− >What if analysis− >Goal seek
25. (d) 26. (a) 27. (b) 28. (c)
(d) Data− >What if analysis− >Pivot table
29. (a) 30. (b) 31. (a) 32. (c)
214. In MS Excel, adjusting an input value to 33. (b) 34. (a) 35. (c) 36. (d)
get specific result is called . 37. (a) 38. (b) 39. (c) 40. (d)
(a) goal seek (b) charting 41. (a) 42. (b) 43. (c) 44. (d)
(c) sorting (d) validation 45. (d) 46. (a) 47. (a) 48. (d)
215. In MS Excel, after choosing 49. (b) 50. (c) 51. (a) 52. (b)
Data− >What if analysis− >Goal 53. (c) 54. (d) 55. (a) 56. (b)
seek from the menu, a dialog appears 57. (c) 58. (d) 59. (a) 60. (b)
to take values. 61. (c) 62. (d) 63. (a) 64. (b)
(a) desired result
65. (c) 66. (d) 67. (a) 68. (b)
(b) input cell in which values are to changed
69. (c) 70. (a) 71. (b) 72. (c)
(c) both a & b
73. (d) 74. (a) 75. (b) 76. (c)
(d) none of them
77. (d) 78. (a) 79. (b) 80. (c)
81. (d) 82. (a) 83. (d) 84. (a)
1.5.11 Scenarios in MS Excel 85. (d) 86. (b) 87. (c) 88. (a)
89. (b) 90. (c) 91. (d) 92. (a)
216. After selecting the cells to be subjected 93. (b) 94. (a) 95. (b) 96. (c)
to data validation, choose from 97. (d) 98. (a) 99. (d) 100. (b)
the menu to apply scenario in MS Excel. 101. (a) 102. (c) 103. (a) 104. (b)
(a) Data− >Filter
105. (c) 106. (d) 107. (a) 108. (c)
(b) Data− >What if analysis− >Data table
109. (d) 110. (a) 111. (b) 112. (c)
(c) Data− >What if analysis− >Goal seek
113. (d) 114. (a) 115. (b) 116. (c)
(d) Data− >What if analysis− >Scenario
117. (d) 118. (a) 119. (b) 120. (c)
217. In MS Excel, creating resulting condi- 121. (d) 122. (a) 123. (b) 124. (c)
tions based on several uncertain future 125. (d) 126. (a) 127. (c) 128. (a)
conditions is called . 129. (b) 130. (d) 131. (d) 132. (b)
(a) validation (b) scenario
133. (a) 134. (c) 135. (d) 136. (a)
(c) goal seek (d) charting
137. (b) 138. (d) 139. (c) 140. (a)
218. Each scenario created using MS Excel 141. (b) 142. (a) 143. (c) 144. (d)
may contain . 145. (a) 146. (d) 147. (b) 148. (d)
(a) a title
149. (d) 150. (c) 151. (a) 152. (d)
(b) a selection of cells which are affected by that
153. (c) 154. (b) 155. (a) 156. (b)
scenario
(c) both a & b 157. (c) 158. (d) 159. (b) 160. (d)
(d) none of them 161. (a) 162. (b) 163. (c) 164. (c)
165. (d) 166. (c) 167. (d) 168. (a)
219. After creating several scenario repre-
senting future conditions, resulting con- 169. (b) 170. (d) 171. (d) 172. (a)
ditions may be displayed by choosing 173. (b) 174. (c) 175. (b) 176. (c)
. 177. (a) 178. (d) 179. (b) 180. (c)
(a) appropriate scenario from the scenarios box 181. (d) 182. (b) 183. (b) 184. (a)
(b) charting 185. (d) 186. (d) 187. (a) 188. (a)
(c) validation 189. (b) 190. (c) 191. (d) 192. (c)
(d) sorting 193. (a) 194. (d) 195. (a) 196. (a)
197. (d) 198. (a) 199. (a) 200. (c)
201. (b) 202. (d) 203. (d) 204. (c)

Prepared by: Dr.V.Nagaradjane


68 Prepared by: Dr.V.Nagaradjane

205. (d) 206. (a) 207. (b) 208. (c) 213. (c) 214. (a) 215. (c) 216. (d)
209. (c) 210. (a) 211. (b) 212. (c) 217. (b) 218. (c) 219. (a)
Q. Bank [COPA Semester - 1] 69

1.6 Powerpoint (b) who could not attend


(c) who become interested to know the informa-
1.6.1 Introduction to PowerPoint tion after completion of
(d) all of them
1. The MS office tool used for preparation 9. Powerpoint helps to create a mix of
of presentations is called . to make the presentation
(a) MS Word lively and interesting.
(b) MS Excel (a) audio/video
(c) MS Access (b) text/ table/ lists
(d) MS Powerpoint (c) images/ graphs
2. The command to invoke power point (d) all of them
from command line is . 10. Powerpoint presentation may be ex-
(a) powerpnt (b) power
ported to .
(c) point (d) msppt (a) Portable Document Format (PDF)
3. The default extension for a presenta- (b) Video file (through File− >Save & send)
tion prepared in powerpoint contained (c) both a & b
in MS Office version 2007 or later is (d) none of them
.
(a) .accdb (b) .pptx 11. Powerpoint can help to deliver content
(c) .xlsx (d) .docx over .
(a) web (b) email
4. The default extension for a presenta- (c) social media (d) all of them
tion prepared in powerpoint contained
in MS Office version 2003 or earlier is
. 1.6.3 Creating Slide Shows
(a) .doc (b) .xls
(c) .ppt (d) .mdb 12. New presentation in power point can be
created using .
5. Powerpoint is suitable for creating
(a) File− >New (b) Ctrl + N
presentations.
(c) both a & b (d) none of them
(a) business
(b) educational 13. On choosing File− >New,
(c) strategic (military) can be chosen to start the presentation.
(d) all of them (a) Blank Presentation
(b) Themes
6. Powerpoint may be started using
(c) either a or b
.
(a) Start− >All Apps− >Microsoft (d) none of them
Office− >Microsoft Powerpoint 14. In Powerpoint, slide styles may be cho-
(b) Pressing Windows+R, typing ”powerpnt” and sen from menu.
pressing enter (a) Design− >Themes
(c) both a & b (b) Home− >Font
(d) none of them (c) Home− >Slides
(d) Home− >Paragraph
1.6.2 Advantages of Powerpoint 15. In Powerpoint, font for presentation may
be chosen from menu.
7. Delivering an information through Pow- (a) Design− >Themes
erpoint helps . (b) Home− >Font
(a) to keep the attention of audience (c) Home− >Slides
(b) to create a collaborative environment (d) Home− >Paragraph
(c) permits the speaker to maintain the flow of 16. In Powerpoint, new slide, slide layout,
information slide reset and slide sectioning may be
(d) all of them chosen from menu.
8. Creating a presentation in Powerpoint (a) Design− >Themes
helps to share the information with those (b) Home− >Font
who the direct session. (c) Home− >Slides
(a) who could attend (d) Home− >Paragraph

Prepared by: Dr.V.Nagaradjane


70 Prepared by: Dr.V.Nagaradjane

17. In Powerpoint, paragraph style for (b) Insert− >Text


presentation may be chosen from (c) Insert− >Symbol
menu. (d) Insert− >Media
(a) Home− >Drawing
(b) Home− >Font 25. In Powerpoint, equations and mathe-
matical symbols can can be inserted us-
(c) Home− >Slides
ing menu.
(d) Home− >Paragraph (a) Insert− >Tables
18. In Powerpoint, drawing for use in (b) Insert− >Text
the presentation may be created using (c) Insert− >Symbol
menu. (d) Insert− >Media
(a) Home− >Drawing
(b) Home− >Font 26. In Powerpoint, media objects like video
(c) Home− >Slides and audio can can be inserted using
(d) Home− >Paragraph menu.
(a) Insert− >Tables
19. In Powerpoint, drawing for use in (b) Insert− >Text
the presentation may be created using (c) Insert− >Symbol
menu. (d) Insert− >Media
(a) Home− >Drawing
(b) Home− >Font
(c) Home− >Slides 1.6.4 Fine tuning the presentation
(d) Home− >Paragraph
27. In Powerpoint, page setup and slide
20. In Powerpoint, table can be inserted us-
orientation may be controlled using
ing menu.
(a) Insert− >Tables menu.
(a) Design− >Page Setup
(b) Insert− >Images
(b) Design− >Themes
(c) Insert− >Illustrations
(c) Insert− >Colors
(d) Insert− >Links
(d) Insert− >Fonts
21. In Powerpoint, images like picture from
28. In Powerpoint, slide transition effects
file, clipart and photo albums can be in-
may be controlled using
serted using menu.
(a) Insert− >Tables menu.
(a) Design− >Effects
(b) Insert− >Images (b) Design− >Themes
(c) Insert− >Illustrations (c) Insert− >Colors
(d) Insert− >Links (d) Insert− >Fonts
22. In Powerpoint, geometric shapes, hyper- 29. In Powerpoint, slide theme can be con-
link and action link can be inserted using trolled using menu.
menu. (a) Design− >Background
(a) Insert− >Tables
(b) Design− >Themes
(b) Insert− >Images
(c) Insert− >Colors
(c) Insert− >Illustrations
(d) Insert− >Fonts
(d) Insert− >Links
30. In Powerpoint, color themes (back-
23. In Powerpoint, geometric shapes, smart
ground, foreground, title color, etc.)
art and chart can be inserted using
can be controlled using
menu.
(a) Insert− >Tables menu.
(a) Design− >Background
(b) Insert− >Images
(b) Design− >Themes
(c) Insert− >Illustrations
(c) Insert− >Colors
(d) Insert− >Links
(d) Insert− >Fonts
24. In Powerpoint, textbox, header &
footer, word art, date & time, slide 31. In Powerpoint, fonts can be chosen us-
ing menu.
number and text objects from other
(a) Design− >Background
applications can can be inserted using
(b) Design− >Themes
(a) Insert− >Tablesmenu.
(c) Insert− >Colors
Q. Bank [COPA Semester - 1] 71

(d) Insert− >Fonts (b) Slide show− >Set up


32. In Powerpoint, background fill colour, (c) Slide show− >Monitors
hide background graphics using (d) none of them
menu. 40. In Powerpoint, slide shows can be setup,
(a) Design− >Background slide can be hidden, timing can be re-
(b) Design− >Themes hearsed and slide transition times can be
(c) Insert− >Colors recorded using menu.
(d) Insert− >Fonts (a) Slide show− >Start slide show
33. In Powerpoint, presentation preview can (b) Slide show− >Set up
be started using using menu. (c) Slide show− >Monitors
(a) Transition− >Preview (d) none of them
(b) Transition− >Transition to this slide
41. In Powerpoint, proofing, language, com-
(c) Timing
ments and comparison of 2 slide shows
(d) none of them
can be accomplished using
34. In Powerpoint, slide transition effects menu.
can be applied using using (a) Review (b) View
menu. (c) Slide show (d) Animations
(a) Transition− >Preview
42. In Powerpoint, presentation views, mas-
(b) Transition− >Transition to this slide
ter views, ruler, grilines, guides, zoom,
(c) Timing
fit to window, color, grayscale, black and
(d) none of them
white, new window, arrange all, cascade,
35. In Powerpoint, sound effects for slide move split, swich windows and macros
transition, automatic-transition time, can be accessed using menu.
etc. can be applied using (a) Review (b) View
menu. (c) Slide show (d) Animations
(a) Transition− >Preview
(b) Transition− >Transition to this slide
(c) Timing 1.6.5 Good presentation techniques
(d) none of them
43. To make effective presentation, mini-
36. In Powerpoint, animated flow of text
mize text and maximize .
and images in presentation can be ap- (a) images (b) graphs
plied using menu. (c) videos (d) all of them
(a) Animations− >Advanced Animation
(b) Animations− >Preview 44. To make an effective impact, a presen-
(c) Animation− >Timing tation should be .
(a) very long, running to 2 or 3 hours
(d) none of them (b) short and sweet
37. In Powerpoint, slide animation preview (c) unorganized, mixing head and tail at one place
can be opened using menu. (d) blank from first to last slide
(a) Animations− >Advanced Animation
45. To make an effective impact, a presen-
(b) Animations− >Preview
tation should be .
(c) Animation− >Timing (a) very long, running to 2 or 3 hours
(d) none of them (b) short and sweet
38. In Powerpoint, animation timings can be (c) unorganized, mixing head and tail at one place
controlled using menu. (d) blank from first to last slide
(a) Animations− >Advanced Animation
46. Optimum duration for making a presen-
(b) Animations− >Preview tation is .
(c) Animation− >Timing (a) 7 hours
(d) none of them (b) 3 to 4 hours
39. In Powerpoint, slide shows from begin- (c) 1 minute
ning, slide show from current slide and (d) 22 to 35 minutes
custom slide show can be started using 47. In presentation, the rule of 3 means,
menu. .
(a) Slide show− >Start slide show (a) people forget the first 3 items

Prepared by: Dr.V.Nagaradjane


72 Prepared by: Dr.V.Nagaradjane

(b) people forget the last 3 items (a) a backup plan for alternate delivery (like
(c) people remember the best 3 items through paper handouts)
(d) people remember the worst 3 items (b) a style to say sorry
48. After preparing a presentation, it should (c) a practice to weep in front of the audience over
to make it effective. the failure
(a) be kept in a pen drive or CD till delivery (d) guts to say good bye without making the pre-
(b) never be opened till delivery sentation
(c) be opened just for delivery 53. Before making a presentation, the pre-
(d) be rehearsed many times senter should .
(a) arrive at the room early
49. To make an effective presentation, one (b) verify the presentation loaded on the projector
should the text typed in the (c) choose the best place to stand during the pre-
slides. sentation
(a) simply keep reading (d) all of them
(b) add spice to the text through stories and fables
(c) keep reading (whether the audience listens or
not) Answers (1158 - 1210)
(d) none of them
50. One should record the presentation in 1. (d) 2. (a) 3. (b) 4. (c)
and watch it again to find the 5. (d) 6. (c) 7. (d) 8. (d)
mistakes done during delivery. 9. (d) 10. (c) 11. (d) 12. (c)
(a) paper (b) video 13. (c) 14. (a) 15. (b) 16. (c)
(c) text (d) transcript 17. (d) 18. (a) 19. (a) 20. (a)
21. (b) 22. (d) 23. (c) 24. (b)
51. To make an effective presentation, one
25. (c) 26. (d) 27. (a) 28. (a)
should .
(a) forget what is on the current slide 29. (b) 30. (c) 31. (d) 32. (a)
(b) forget what is on the next slide 33. (a) 34. (b) 35. (c) 36. (a)
(c) remember offer a lead to the next slide 37. (b) 38. (c) 39. (a) 40. (b)
(d) never care for the order of slides 41. (a) 42. (b) 43. (d) 44. (b)
52. One should have to cater 45. (b) 46. (d) 47. (c) 48. (d)
to the unexpected situations of projector 49. (b) 50. (b) 51. (c) 52. (a)
failure, power failure, computer failure, 53. (d)
disk error, etc.
Q. Bank [COPA Semester - 1] 73

1.7 OpenOffice 11. In OpenOffice.org, presentation can be


prepared using application.
1.7.1 Introduction to Open Office (a) writer (b) calc
(c) draw (d) impress
1. The suit of free software offered by
Apache foundation for document prepa- 1.7.2 Image properties
ration, spreadsheet, presentation, draw-
ing and database management is called 12. are the important properties of
. images.
(a) OpenOffice.org (a) Colour (b) Width
(b) Microsoft Office (c) Height (d) all of them
(c) Star Office An image is made of small dots called
13.
(d) KOffice .
2. OpenOffice.org text document file has (a) pixel (b) dot
extension of . (c) point (d) line
(a) .odt (b) .ods Each pixel possess the properties of
14.
(c) .odg (d) .odp .
3. OpenOffice.org text spreadsheet file has (a) Colour
extension of . (b) Transparency (alpha)
(a) .odt (b) .ods (c) both a & b
(c) .odg (d) .odp (d) none of them
4. OpenOffice.org drawing file has exten- 15. Normally, color coding in images is rep-
sion of . resented in system.
(a) .odt (b) .ods (a) Red Green Blue Alpha (RGBA)
(c) .odg (d) .odp (b) Cyan Magenta Yellow blacK (CMYK)
5. OpenOffice.org presentation file has ex- (c) both a & b
tension of . (d) neither a nor b
(a) .odt (b) .ods
(c) .odg (d) .odp 16. Any visible colour can be created using
appropriate combination of .
6. OpenOffice.org presentation file has ex- (a) Red (b) Green
tension of . (c) Blue (d) all of them
(a) .odt (b) .ods
(c) .odg (d) .odp 17. Alpha value of 0 represents
In OpenOffice.org, text document can colour.
7. (a) opaque
be prepared using . (b) transparent
(a) writer (b) calc
(c) semitransparent
(c) draw (d) impress
(d) none of them
8. In OpenOffice.org, spreadsheet can be
18. Maximum alpha value represents
prepared using application.
(a) writer (b) calc colour.
(a) opaque
(c) draw (d) impress (b) transparent
9. In OpenOffice.org, spreadsheet can be (c) semitransparent
prepared using application. (d) none of them
(a) writer (b) calc
19. Alpha value between 0 and maxim rep-
(c) draw (d) impress
resents colour.
10. In OpenOffice.org, drawing can be pre- (a) opaque
pared using application. (b) transparent
(a) writer (b) calc (c) semitransparent
(c) draw (d) impress (d) none of them

Prepared by: Dr.V.Nagaradjane


74 Prepared by: Dr.V.Nagaradjane

1.7.3 Image types (d) Tagged Image File Format


29. In digital imaging, TIFF stands for
20. BMP in image format stands for .
. (a) Tagged Initial File Format
(a) Binary Magnified Photo (b) Tagged Image File Frame
(b) Binary Machine Picture (c) Triggered Image File Format
(c) Binary Machine Photo (d) Tagged Image File Format
(d) BitMaP
30. TIFF is more suitable for
21. JPG or JPEG in image format stands for than for digital photography.
. (a) digital printing
(a) Joint Photographic Experts Group (b) digital drawing
(b) Joint Picture Experts Group (c) digital video
(c) Joint Photographic Experts Graph (d) digital audio
(d) Joint Photographic Experts General
31. PNG in digital imaging stands for .
22. JPEG is a compression for- (a) Palate Network Graphics
mat. (b) Portable Network Graphics
(a) lossy
(b) lossless (c) Portable Number Graphics
(c) both a & b (d) Portable Network Grayscale
(d) neither a nor b 32. PNG supports compres-
23. JPEG format is widely adopted for sion.
(a) lossy
. (b) lossless
(a) digital photography
(b) printing (c) both a & b
(c) image editing (d) neither a nor b
(d) all of them 33. Google WebP is an image format which
24. JPEG 2000 is a new version of JPEG supports compression.
(a) lossy
adopted in .
(a) video frame compression (b) lossless
(b) audio compression (c) both a & b
(c) grayscale image compression (d) neither a nor b
(d) none of them 34. Google WebP aims to supersede
25. JPEG 2000 is a compression as a file format for digital
format. cameras.
(a) lossy (a) JPG (b) PNG
(b) lossless (c) GIF (d) TIFF
(c) both a & b 35. ICO is an image format containing one
(d) neither a nor b or more icons of type.
(a) BMP
26. In digital imaging, GIF stands for
(b) PNG
.
(a) Graphics Interchange Frame (c) both a & b
(b) Graphics Interchange Format (d) neither a nor b
(c) Graphics Interlaced Format 36. CPT file extension stands for
(d) Graphics Intersection Format .
(a) Corel Picture Paint
27. file format supports simple an-
(b) Corel Photo Paint
imations in an image.
(a) GIF (b) JPG (c) Creative Photo Paint
(c) BMP (d) TIF (d) Corel Photo Print
28. In digital imaging, TIFF stands for 37. PSD file extension stands for
. .
(a) Tagged Initial File Format (a) Photo Shop Drawing
(b) Tagged Image File Frame (b) Picture Shop Document
(c) Triggered Image File Format (c) Photo Scan Document
(d) Photo Shop Document
Q. Bank [COPA Semester - 1] 75

38. PSP file extension stands for (a) selecting portions of images
. (b) deleting images
(a) Paint Shop Pro (c) creating images
(b) Paint Shop Photo (d) drawing on images
(c) Paint Shop Picture
46. In GIMP, color in one part of image may
(d) Paint Shop Print
be picked for painting another part using
39. XCF file extension stands for tool.
. (a) color picker (b) zoom
(a) eXtreme Computing Facility (c) measure (d) move
(b) eXtended Computing Facility
47. In GIMP, image size may be enlarged or
(c) eXperimental Computing Facility
reduced using tool.
(d) eXperimental Counting Facility
(a) color picker (b) zoom
40. SVG in image format stands for (c) measure (d) move
.
(a) Scanned Vector Graphics 48. In GIMP, distances and angles can be
(b) Scalable Vector Graphics measured using tool.
(c) Scalable Vector Grayscale (a) color picker (b) zoom
(d) Scalable Vintage Graphics (c) measure (d) move
49. In GIMP, selected portions can be
moved using tool.
1.7.4 Editing of images (a) color picker (b) zoom
(c) measure (d) move
41. The process of enhancing image qual-
ity by rotation, extraction, colour trans- 50. In GIMP, selected portions can be
formation, partial relocation, morphing moved using tool.
and conversion from/ to colour image (a) color picker (b) zoom
to grayscale, etc. are categorized as (c) measure (d) move
. 51. Edges of images can be removed using
(a) image capture tool in GIMP.
(b) image viewing (a) crop tool
(c) image editing (b) alignment tool
(d) none of them (c) rotate tool
42. Adobe Photoshop, Corel Paint Shop (d) scale tool
Pro, GIMP, etc. belong to the category 52. Layers may be aligned using
of software. tool in GIMP.
(a) image capture (a) crop tool
(b) image viewing (b) alignment tool
(c) image editing (c) rotate tool
(d) none of them (d) scale tool
43. is a free and open source 53. Selected portions or layers may be ro-
software for image editing. tated using tool in GIMP.
(a) Adobe Photoshop (a) crop tool
(b) Corel Paint Shop Pro (b) alignment tool
(c) GIMP (c) rotate tool
(d) none of them (d) scale tool
44. GIMP toolbox can be opened using 54. Selected portions or layers may be scaled
. using tool in GIMP.
(a) Windows− >Toolbox menu (a) crop tool
(b) Ctrl+B shortcut (b) alignment tool
(c) both a & b (c) rotate tool
(d) none of them (d) scale tool
45. GIMP toolbox contains rectangle, el- 55. Selected region or layer may be distorted
lipse, freehand, fuzzy tool, colour select, using tool in GIMP.
scissor selection tool, foreground select (a) shear
and path tools for . (b) perspective

Prepared by: Dr.V.Nagaradjane


76 Prepared by: Dr.V.Nagaradjane

(c) flip 62. Pencil drawing can be done using


(d) cage transform tool tool in GIMP.
(a) text (b) bucket fill
56. Selected region or layer converted to
(c) blend (d) pencil
3D appearance using tool in
GIMP. 63. Simple painting can be done using
(a) shear tools in GIMP.
(b) perspective (a) brush/ airbrush
(c) flip (b) eraser
(d) cage transform tool (c) ink
(d) all of them
57. Selected portions may be distorted in-
side a cage using tool in GIMP. 64. GIMP permits manipulation at
(a) shear levels.
(b) perspective (a) image (b) layer
(c) flip (c) color space (d) all of them
(d) cage transform tool
58. Image may be flipped (horizontally or Answers (1211 - 1274)
vertically) using tool in GIMP.
(a) shear 1. (a) 2. (a) 3. (b) 4. (c)
(b) perspective 5. (d) 6. (d) 7. (a) 8. (b)
(c) flip 9. (b) 10. (c) 11. (d) 12. (d)
(d) cage transform tool 13. (a) 14. (c) 15. (a) 16. (d)
59. Text can be inserted into an image using 17. (a) 18. (b) 19. (c) 20. (d)
tool in GIMP. 21. (a) 22. (a) 23. (d) 24. (a)
(a) text (b) bucket fill 25. (c) 26. (b) 27. (a) 28. (d)
(c) blend (d) pencil 29. (d) 30. (a) 31. (b) 32. (b)
60. Filling can be done using 33. (c) 34. (a) 35. (c) 36. (b)
tool in GIMP. 37. (d) 38. (a) 39. (c) 40. (b)
(a) text (b) bucket fill 41. (c) 42. (c) 43. (c) 44. (c)
(c) blend (d) pencil 45. (a) 46. (a) 47. (b) 48. (c)
61. Colour difference between adjacent por- 49. (d) 50. (d) 51. (a) 52. (b)
tions can be healed through proper gra- 53. (c) 54. (d) 55. (a) 56. (b)
dient using tool in GIMP. 57. (d) 58. (c) 59. (a) 60. (b)
(a) text (b) bucket fill 61. (c) 62. (d) 63. (d) 64. (d)
(c) blend (d) pencil
Q. Bank [COPA Semester - 1] 77

1.8 Database Management (a) integrity (b) duplicity


(c) multiplicity (d) atomicity
Systems
1.8.1 Data, Information and 1.8.2 Overview of popular databases
Database systems

1. refers to collection, stor- 9. DBMS stands for .


age, manipulation, reporting and mining (a) Database Maintenance System
of available information. (b) Database Management Syntax
(a) Database management (c) Database Management System
(b) Presentation (d) Digital Management System
(c) Charting 10. Oracle, IBM DB2, SAP HANA, MySQL,
(d) Document preparation PostgreSQL, Microsoft SQL server,
2. A database contains to Sybase, MongoDB, MariaDB & SQLite
help management of information. are the most popular tools.
(a) schemes (a) graphics & animation
(b) tables (b) image editing
(c) queries/ views (c) document typesetting
(d) all of them (d) database management
3. SQL stands for . 11. Oracle, IBM DB2, SAP HANA &
(a) Synchronized Query Language Microsoft SQL server are
(b) Structured Query Language database management tools.
(c) Simplified Query Language (a) professional (paid)
(d) Structured Question Language (b) free/ open source
4. Creation and modification of databases (c) outdated
and tables is called . (d) unsuitable
(a) update MySQL, PostgreSQL, MariaDB &
12.
(b) retrieval SQLite are database manage-
(c) data definition ment tools.
(d) administration (a) professional (paid)
5. Inserting data and modifying values in (b) free/ open source
previously inserted data in tables of a (c) outdated
database is called . (d) unsuitable
(a) data update
13. Among the open source and free
(b) data retrieval
database management systems,
(c) data definition
is the most popular.
(d) database administration (a) MySQL (b) PostgreSQL
6. Querying and selecting data from a table (c) MariaDB (d) SQLite
is called . Among the professional (paid) database
(a) data update 14.
(b) data retrieval management systems, is the
(c) data definition most popular.
(a) IBM DB2
(d) database administration
(b) SAP HANA
7. Defining the users, passwords and roles (c) Oracle
for users to control a database is called (d) Microsoft SQL Server
.
(a) data update 15. is the most popular
(b) data retrieval database management system in the
(c) data definition embedded (mobile phones/ tablets)
(d) database administration category.
Maintaining data in error free manner is (a) MySQL (b) SQLite
8.
called data . (c) Oracle (d) PostgreSQL

Prepared by: Dr.V.Nagaradjane


78 Prepared by: Dr.V.Nagaradjane

RDBMS (a) information


(b) access
16. RDBMS stands for . (c) null value
(a) Relational Digital Base Management System (d) database description
(b) Restricted Data Base Management System
24. Codd’s Rule 5 is otherwise called
(c) Relational Data Base Management System
rule and it permits com-
(d) Relational Data Binary Management System
mands for creating, managing, rolling
17. Relational database model was proposed back and authorizing data access.
by . (a) data sublanguage
(a) Bill Gates (b) view updating
(b) Steve Jobs (c) insert, update, delete
(c) Dennis Ritchie (d) independence from physical storage
(d) Edgar F Codd
25. Codd’s Rule 6 is otherwise called
18. A database management system re-
rule and it specifies that ev-
quires to fulfill to be called
ery view which is theoretically update-
a relational database system.
(a) Codd’s 12 Rules able should be updateable through the
(b) 10 commandments of Moses system.
(a) data sublanguage
(c) 3 laws of Isac Newton
(b) view updating
(d) 2 laws of Kirchoff
(c) insert, update, delete
19. Codd’s Rule 0 defines a relational (d) independence from physical storage
database system as the one which man-
26. Codd’s Rule 7 is otherwise called
ages data through capabili-
rule and it specifies that
ties.
(a) hierarchical database insertion, delete and update of data
(b) network database should also be based on relational prin-
(c) relational database ciples.
(d) none of them (a) data sublanguage
(b) view updating
20. Codd’s Rule 1 is otherwise called
(c) insert, update, delete
rule and specifies that all
(d) independence from physical storage
information should be held in tables.
(a) information 27. Codd’s Rule 8 is otherwise called
(b) access rule and it specifies that the
(c) null value type of physical storage media should
(d) database description not affect the access methods of data
21. Codd’s Rule 2 is otherwise called through the database management sys-
rule and it guarantees that tem.
each and every information stored in a (a) data sublanguage
database is accessible. (b) view updating
(a) information (c) insert, update, delete
(b) access (d) independence from physical storage
(c) null value 28. Codd’s Rule 9 is otherwise called
(d) database description rule and application pro-
22. Codd’s Rule 3 is otherwise called grams are unaffected by changes to the
rule and it specifies that data unless it impairs the results of the
there should be unique NULL value to application program.
denote missing information. (a) logical data independence
(a) information (b) integrity independence
(b) access (c) distribution independence
(c) null value (d) non-subversion
(d) database description
23. Codd’s Rule 4 is otherwise called
rule and it states that meta
data should also be stored as normal
data.
Q. Bank [COPA Semester - 1] 79

29. Codd’s Rule 10 is otherwise called (b) Object Oriented Programming Languages like
rule and it specifies that C++, Java, Smalltalk, Delphi, etc.
data integrity conditions should be de- (c) pen drive
fined in the database management sys- (d) wired connection
tem and not in the application program. 37. OODB with support for SQL (like rela-
(a) logical data independence tional database) is called .
(b) integrity independence (a) hybrid object relational database
(c) distribution independence (b) programming
(d) non-subversion (c) pure relational database
30. Codd’s Rule 11 is otherwise called (d) NOSQL database
rule and it specifies that 38. Objects of OODB may be accessed us-
the end user should feel that the data is ing .
stored at one place, although the stor- (a) NOSQL
age may be distributed on several com- (b) SQL
puters. (c) Object Query Language (OQL)
(a) logical data independence (d) none of them
(b) integrity independence
39. Object schema in OODB use data types
(c) distribution independence to object oriented program-
(d) non-subversion ming languages.
31. Codd’s Rule 12 is otherwise called (a) unrelated
rule and it specifies that (b) unconnected
data access should be provided only (c) similar
through the relational model, without (d) not connected
exposing the low level storage APIs to 40. ODMG stands for , which is
the end user. the consortium in charge of the stan-
(a) logical data independence
dardizing the development of Object
(b) integrity independence
Oriented Data Base.
(c) distribution independence (a) Object Data Management General
(d) non-subversion (b) Object Data Management Group
32. API stands for . (c) Object Digital Management Group
(a) Applied Programming Interface (d) Object Data Maintenace Group
(b) Application Programming Interface 41. OMG in object oriented database stands
(c) Application Programming Integration for .
(d) Application Provider Interface (a) Object Maintenance Group
(b) Oh My God
OODB (c) Object Management Group
(d) Object Management Gimmick
33. Object oriented databases are based on 42. XQuery is language.
the concept of , similar to (a) XML based Query
object oriented programming. (b) Structured Query
(a) SQL (b) table
(c) programming
(c) objects (d) column
(d) object oriented programming
34. Relational databases are
oriented. 43. Object Oriented Data Base is suitable
(a) method (b) table for cases in which relational tables are
(c) objects (d) program to design and manipulate.
(a) too complex (b) too easy
35. OODB stands for .
(c) too simple (d) too plain
(a) Object Oriented Digital Base
(b) Offset Oriented Data Base 44. ORM in database management stands
(c) Object Oriented Data Binary for .
(a) Object Reverse Mapping
(d) Object Oriented Data Base
(b) Offset Relational Mapping
36. OODB is more accessible from (c) Object Relational Mapping
(a) SQL . (d) Object Restricted Mapping

Prepared by: Dr.V.Nagaradjane


80 Prepared by: Dr.V.Nagaradjane

NOSQL (a) Integer ID column


(b) no column
45. The system of managing databases us- (c) all columns
ing models other than tables and retriev- (d) none of them
ing data using methods other than or re-
54. As a good practice, each user should
lated to SQL is called data
have user id and password.
management system. (a) same (b) different
(a) relational database
(c) root (d) admin
(b) table oriented
(c) Query oriented 55. As a good practice, select queries
(d) NOSQL should have contain col-
umn names.
46. NOSQL is suitable for social media sites (a) * for
because it . (b) blank for
(a) permits fast queries
(b) permits ad-hoc joins (c) required field names
(d) none of them
(c) compromises data integrity rules in favour of
speed 56. In defining a database table, it is a good
(d) all of them practice to define frequently searched
47. NOSQL databases permit updates columns with .
(a) primary key
which and are prone to
(b) foreign key
data loss.
(a) may be incomplete (c) either a or b
(b) are complete (d) neither a nor b
(c) which are immediately effected 57. When a column value cannot be null, it
(d) which are subject to strict rules of integrity is a good practice to include
declaration for that column when creat-
1.8.3 Rules for designing good tables ing the table.
(a) DEFAULT 0
48. A good database table has (b) DEFAULT < SOM E V ALU E >
naming. (c) NULL
(a) inconsistent (b) consistent (d) NOT NULL
(c) unrelated (d) haphazard 58. When a column value should be filled
49. The name of table and column should with a default of 0 or any other value,
be in . it is a good practice to include
(a) plural declaration for that column when creat-
(b) vernacular ing the table.
(c) incoherent words (a) DEFAULT 0
(d) singular (b) DEFAULT < SOM E V ALU E >
50. In a well defined database, names of (c) either a or b
database, table and column (d) NOT NULL
contain space. 59. For mission critical databases,
(a) do (b) may should be created to
(c) should not (d) should avoid data loss.
51. If the name of database, table or column (a) backup (b) program
should have separation, use in- (c) SQL (d) table
stead of the space character. 60. The process of dividing the data in suit-
(a) & (b) able tables to avoid repition of data is
(c) @ (d) $ called .
52. As a good practice in the design of (a) normalization
database tables, passwords should be (b) data insertion
stored in format. (c) data deletion
(a) numeric (b) random (d) data updation
(c) plain text (d) encrypted
53. As a good practice in design of database
tables, it is advisable to have
for indexing.
Q. Bank [COPA Semester - 1] 81

1.8.4 Integrity rules and constraints (d) cascade


in a table 68. rule in data reference in-
tegrity ensures that whenever data is
61. The database rule which permits insert- deleted, all dependencies are set to their
ing a row without any specific value for default value.
a column is called . (a) restrict
(a) null rule (b) set to null
(b) unique column rule (c) set to default
(c) primary key rule (d) cascade
(d) referential integrity rule
69. rule in data reference in-
62. in database manage- tegrity ensures that whenever data is up-
ment permits inserting a new value only dated or deleted, all dependency rows
if there is no previous entry having the are correspondingly updated or deleted.
same value. (a) restrict
(a) null rule
(b) set to null
(b) unique column rule
(c) set to default
(c) primary key rule
(d) cascade
(d) referential integrity rule
70. rule in data reference in-
63. in database manage-
tegrity ensures that whenever data is up-
ment permits unique values to be used
dated or deleted, all dependency rows
for searching and indexing of data.
(a) null rule are correspondingly updated or deleted.
(a) restrict
(b) unique column rule
(b) set to null
(c) primary key rule
(c) set to default
(d) referential integrity rule
(d) cascade
64. in database manage-
71. rule in data reference in-
ment ensures that key values in one ta-
tegrity ensures that no action is taken
ble are referenced in a related table.
(a) null rule when attempt is made to delete or up-
(b) unique column rule date referenced data.
(a) No action
(c) primary key rule
(b) Set to null
(d) referential integrity rule
(c) Set to default
65. in database manage- (d) Cascade
ment ensures that user defined con-
straints are enforced to restrict deletion 72. The practice of specifying only specified
or updating of rows. values are entered in particular column
(a) Complex integrity checking rule (like NOT NULL, DEFAULT 0) is called
(b) unique column rule .
(a) integrity rule
(c) primary key rule
(b) integrity constraint
(d) referential integrity rule
(c) updation rule
66. rule in data reference in- (d) relational rule
tegrity ensures that referred data is not
deleted or updated.
(a) restrict 1.8.5 Relationships in tables
(b) set to null
(c) set to default 73. Creating relationship for data in one
(d) cascade table with that in another table in
database is called .
67. rule in data reference in- (a) integrity (b) constraint
tegrity ensures that whenever data is (c) relationship (d) none of them
deleted, all dependencies to deleted data is used to relate data in one
74.
are set to null value. table to that in another table.
(a) restrict (a) key (b) column
(b) set to null (c) row (d) table
(c) set to default

Prepared by: Dr.V.Nagaradjane


82 Prepared by: Dr.V.Nagaradjane

75. A key which is unique to a table is called (a) update query


. (b) select query
(a) primary key (b) foreign key (c) both a & b
(c) unique (d) none of them (d) neither a nor b
76. A key which helps to connect data in 84. The clause which specifies constraints
one secondary table to that in a primary for selecting or updating data is called
table is called . clause.
(a) primary key (b) foreign key (a) GROUP BY (b) HAVING
(c) unique (d) none of them (c) ORDER BY (d) WHERE
77. A key which helps to connect data in The clause which specifies rule for data
85.
one secondary table to that in a primary
aggregation is called clause.
table is called . (a) GROUP BY (b) HAVING
(a) primary key
(b) foreign key (c) ORDER BY (d) WHERE
(c) alternate key or candidate key 86. The clause which specifies rule for se-
(d) none of them lecting data needed for aggregation is
78. A key which can be used as a prospec- called clause.
(a) GROUP BY (b) HAVING
tive primary key (in the future) is called (c) ORDER BY (d) WHERE
.
(a) primary key 87. The clause which specifies the rule for
(b) foreign key sorting of data is called clause.
(c) alternate key or candidate key (a) GROUP BY (b) HAVING
(d) none of them (c) ORDER BY (d) WHERE
79. A key which can be used as a prospec- 88. The clause which specifies that data
tive primary key (in the future) is called should be sorted in descending order is
. called clause.
(a) primary key (a) DESC (b) HAVING
(b) foreign key (c) ORDER BY (d) WHERE
(c) alternate key or candidate key 89. Which of the following queries creates
(d) none of them a table named contact with name and
mobile columns?
(a) create table contact (name varchar(30), mo-
1.8.6 Introduction to various types bile varchar(20), primary key(name));
of Queries and their uses (b) insert into contact val-
ues(’Desiga’,’329842893’);
80. SQL stands for . (c) update contact set mobile=’322312112’ where
(a) Structured Query Language name=’Desiga’;
(b) Standard Query Language (d) select * from contact;
(c) Synchronized Query Language 90. Which of the following queries selects all
(d) Structured Question Language records from a table named contact?
81. A query which creates database, table, (a) create table contact (name varchar(30), mo-
inserts rows, deletes rows & updates ex- bile varchar(20), primary key(name));
isting values is called . (b) insert into contact val-
(a) update query ues(’Desiga’,’329842893’);
(b) select query (c) update contact set mobile=’322312112’ where
(c) both a & b name=’Desiga’;
(d) neither a nor b (d) select * from contact;
82. A query which selects values based from 91. Which of the following queries sets a
a table is called . new mobile number (322312112) for a
(a) update query person named Desiga in the contact ta-
(b) select query ble?
(c) both a & b (a) create table contact (name varchar(30), mo-
(d) neither a nor b bile varchar(20), primary key(name));
A query which selects values from a ta- (b) insert into contact val-
83.
ble is called . ues(’Desiga’,’329842893’);
Q. Bank [COPA Semester - 1] 83

(c) update contact set mobile=’322312112’ where (a) 2332323423 (b) 34234242234
name=’Desiga’; (c) 33423423242 (d) 2342342323
(d) select * from contact;
99. The following query inserts
92. Which of the following queries inserts a in the name column.
new record in a table named contact? insert into contact (name, mobile) val-
(a) create table contact (name varchar(30), mo-
ues (’Nathiya’, ’2332323423’);
bile varchar(20), primary key(name));
(a) values (b) contact
(b) insert into contact val-
(c) name (d) Nathiya
ues(’Desiga’,’329842893’);
(c) update contact set mobile=’322312112’ where 100. The following query updates the mobile
name=’Desiga’; column to new value if the name is
(d) select * from contact; .
93. The following query creates column update contact set mo-
named name, with a data type bile=’453453445343’ where
. name=’Girija’;
create table contact (name var- (a) name (b) Girija
char(30), mobile varchar(20), primary (c) mobile (d) contact
key(name)); 101. The following query updates the mobile
(a) varchar (b) int to where the name is
(c) double (d) blob Girija.
94. The following query creates column update contact set mo-
named name, having varchar type bile=’453453445343’ where
with maximum length of name=’Girija’;
characters. (a) 453453445343 (b) 435353453453
create table contact (name var- (c) 56454646544 (d) 23424234233
char(30), mobile varchar(20), primary 102. The following query deletes a row if the
key(name)); name is .
(a) 10 (b) 20 delete from contact where
(c) 30 (d) 40 name=’Gayathri’;
95. The following query creates column (a) contact (b) name
named mobile, having varchar type (c) Gayathri (d) delete
with maximum length of 103. The following query a table
characters. named contact.
create table contact (name var- drop table contact;
char(30), mobile varchar(20), primary (a) deletes
key(name)); (b) creates
(a) 10 (b) 20 (c) updates
(c) 30 (d) 40 (d) adds new column to
96. The following query designates 104. The following query selects data in
as primary key. order.
create table contact (name var- select * from contact order by name
char(30), mobile varchar(20), primary DESC;
key(name)); (a) ascending (b) descending
(a) name (b) mobile (c) unordered (d) none of them
(c) contact (d) primary key
97. Adding keyword to an inte- 1.8.7 Designing Access Reports and
ger field permits automatic increment to Forms
the record number.
(a) primary key
105. Microsoft Access provides visual envi-
(b) key
ronment for design of .
(c) auto increment
(d) automatic
98. The following query inserts
in the mobile column.
insert into contact (name, mobile) val-
Preparedues
by:(’Nathiya’,
Dr.V.Nagaradjane
’2332323423’);
84 Prepared by: Dr.V.Nagaradjane

(a) tables (b) reports (b) Create− >Split Form


(c) forms (d) all of them (c) Create− >Multiple Items
106. MS Access creates files are stored with (d) Create− >Blank Form
extension. 116. In MS Access, blank form may be cre-
(a) .docx (b) .xlsx ated using menu.
(c) .accdb (d) .pptx (a) Create− >Form
107. New database created in MS Access has (b) Create− >Split Form
got a default table named . (c) Create− >Multiple Items
(a) Table1 (b) Database1 (d) Create− >Blank Form
(c) Column1 (d) Row1
117. In MS Access, form may created through
108. By default, new table is displyed in a wizard using menu.
view. (a) Create− >More Forms− >Form Wizard
(a) Datasheet View (b) Create− >Split Form
(b) Design View (c) Create− >Multiple Items
(c) Report View (d) Create− >Blank Form
(d) Form View
118. In MS Access, data sheet may be cre-
109. is an alternate to datasheet
ated using menu.
view for design of table in MS Access. (a) Create− >More Forms− >Form Wizard
(a) Datasheet View
(b) Create− >More Forms− >Data Sheet
(b) Design View
(c) Create− >More Forms− >Modal Dialog
(c) Report View
(d) Create− >Blank Form
(d) Fom View
119. In MS Access, form dialog may be cre-
110. can be created to help easy
ated using menu.
data entry in MS Access tables. (a) Create− >More Forms− >Form Wizard
(a) Form (b) Report
(b) Create− >More Forms− >Data Sheet
(c) database (d) spreadsheet
(c) Create− >More Forms− >Modal Dialog
111. view permits selection of (d) Create− >Blank Form
datatypes, default values and con-
straints for each column. 120. In MS Access, form may be manually
(a) Datasheet (b) Design designed through available components
(c) Report (d) Form (like textfield, datapicker, combo-box,
112. By default, first column of an MS Access etc.) using menu.
(a) Create− >More Forms− >Form Wizard
table is named and it has
(b) Create− >More Forms− >Data Sheet
auto increment property.
(a) NAME (b) DATE (c) Create− >More Forms− >Modal Dialog
(c) NULL (d) ID (d) Create− >Form Design
113. An ordinary form for data enetry in 121. In MS Access, default report may be cre-
MS Access tables may be created using ated using menu.
menu. (a) Create− >Report
(a) Create− >Form (b) Create− >Blank Report
(b) Create− >Split Form (c) Create− >Report Wizard
(c) Create− >Multiple Items (d) Create− >Report Design
(d) Create− >Blank Form 122. In MS Access, blank report may be cre-
114. In MS Access, a form with data ated using menu.
records at one half and entry format (a) Create− >Report
at the other half may be created using (b) Create− >Blank Report
menu. (c) Create− >Report Wizard
(a) Create− >Form (d) Create− >Report Design
(b) Create− >Split Form
123. In MS Access, report may be created
(c) Create− >Multiple Items through wizard using
(d) Create− >Blank Form menu.
115. In MS Access, multiple rows of data may (a) Create− >Report
be created using menu. (b) Create− >Blank Report
(a) Create− >Form
Q. Bank [COPA Semester - 1] 85

(c) Create− >Report Wizard Answers (1275 - 1401)


(d) Create− >Report Design
124. In MS Access, report may be designed 1. (a) 2. (d) 3. (b) 4. (c)
using components like combobox, text 5. (a) 6. (b) 7. (d) 8. (a)
field, text area, list, etc. using 9. (c) 10. (d) 11. (a) 12. (b)
menu. 13. (a) 14. (c) 15. (b) 16. (c)
(a) Create− >Report 17. (d) 18. (a) 19. (c) 20. (a)
(b) Create− >Blank Report 21. (b) 22. (c) 23. (d) 24. (a)
(c) Create− >Report Wizard 25. (b) 26. (c) 27. (d) 28. (a)
(d) Create− >Report Design 29. (b) 30. (c) 31. (d) 32. (b)
33. (c) 34. (b) 35. (d) 36. (b)
37. (a) 38. (c) 39. (c) 40. (b)
1.8.8 Macros in MS Access
41. (c) 42. (a) 43. (a) 44. (c)
125. In MS Access, macro may be recorded 45. (d) 46. (d) 47. (a) 48. (b)
to carry out different actions using 49. (d) 50. (c) 51. (b) 52. (d)
menu. 53. (a) 54. (b) 55. (c) 56. (c)
(a) Create− >Report 57. (d) 58. (c) 59. (a) 60. (a)
(b) Create− >Blank Report 61. (a) 62. (b) 63. (c) 64. (d)
(c) Create− >Report Wizard 65. (a) 66. (a) 67. (b) 68. (c)
(d) Create− >Macro 69. (d) 70. (d) 71. (a) 72. (b)
126. In MS Access, a macro can be activated 73. (c) 74. (a) 75. (a) 76. (b)
by pressing, button. 77. (b) 78. (c) 79. (c) 80. (a)
(a) Form (b) Report 81. (a) 82. (b) 83. (b) 84. (d)
(c) Run (d) Table 85. (a) 86. (b) 87. (c) 88. (a)
89. (a) 90. (d) 91. (c) 92. (b)
127. In MS Access, macros can automate
. 93. (a) 94. (c) 95. (b) 96. (a)
(a) program flow/ data entry 97. (c) 98. (a) 99. (d) 100. (b)
(b) data import/ data export 101. (a) 102. (c) 103. (a) 104. (b)
(c) filter/ query/ search 105. (d) 106. (c) 107. (a) 108. (a)
(d) all of them 109. (b) 110. (a) 111. (b) 112. (d)
113. (a) 114. (b) 115. (c) 116. (d)
117. (a) 118. (b) 119. (c) 120. (d)
121. (a) 122. (b) 123. (c) 124. (d)
125. (d) 126. (c) 127. (d)

Prepared by: Dr.V.Nagaradjane


86 Prepared by: Dr.V.Nagaradjane

1.9 Networking (d) none of them


10. Wireless network connections use
1.9.1 Computer Networks, Necessity technologies.
and Advantages (a) Wireless Fidelity (WiFi)
(b) Bluetooth
1. Connecting several computers and de- (c) both a & b
vices using wired or wireless technology (d) neither a nor b
is called . 11. are the hardware devices
(a) hard disk (b) RAM
that help the computer to connect to
(c) pen dirve (d) networking
a network.
2. Internet is constituted of . (a) Routers
(a) network of networks (b) MODEMs
(b) hard disk (c) Wireless MODEMs
(c) DVD (d) all of them
(d) pen drive 12. MODEM stands for .
3. Computers and devices can be con- (a) MODulation DEMocracy
nected using technology to (b) MODulation DEModulation
create a network. (c) MODern DEModulation
(a) wired (d) MODerate DEModulation
(b) wireless
(c) both a & b 13. Routers help in .
(d) neither a nor b (a) transmission of data between networks
(b) connecting different devices using appropriate
4. The systematic design (like radial, ring,
protocol
etc.) of connecting computers in a net- (c) both a & b
work is called network . (d) neither a nor b
(a) topology (b) protocol
(c) firewall (d) antivirus
5. The procedure used by computers con- 1.9.2 Client Server and peer to Peer
nected in a network for data exchange is networking concepts
called network .
(a) topology (b) protocol 14. A network connection requires
(c) firewall (d) antivirus important components
6. The computer which separates a local to connect to each other.
network from external Internet is called (a) IP address (b) Port number
network . (c) both a & b (d) none of them
(a) topology (b) protocol 15. IP address helps to a com-
(c) firewall (d) antivirus puter connected to a network.
7. The piece of software which prevents (a) uniquely identify
malicious software from entering a com- (b) format
puter is called network . (c) reset
(a) topology (b) protocol (d) reject
(c) firewall (d) antivirus 16. Port number on a computer host
8. Most of the wired network connections connected to a network denotes a
use . .
(a) Optical Fibre Cable (OFC) (a) background server program
(b) USB cable (b) client program
(c) pen drive (c) both a & b
(d) hard drive (d) none of them
9. The port for connecting broadband ca- 17. A program which runs in the background
ble to a computer is called . and sends results requested by a client
(a) ethernet port is called a .
(b) Registered Jack 45 (RJ-45) (a) server (b) client
(c) both a & b (c) port (d) IP address
Q. Bank [COPA Semester - 1] 87

18. A program which runs in the foreground, (b) forward proxy


communicates with server and displays (c) reverse proxy
results sent by the server is called a (d) all of them
. 26. Firewall can be implemented through
(a) server (b) client
.
(c) port (d) IP address (a) hardware (b) software
19. Computers connected to a network with- (c) both a & b (d) none of them
out any client or server system (all hosts
are equally equally important) are in
network.
1.9.4 Network topologies
(a) client server
(b) peer to peer 27. Each computer or device connected to a
network is generally called .
(c) firewall
(a) node
(d) proxy server
(b) host
(c) both a & b
1.9.3 Concept of Proxy Server and (d) neither a nor b
proxy firewall server 28. The design adopted for connecting sev-
eral hosts on a network is called .
20. The intermediary host which communi- (a) telephony (b) wiring
cates with the clients on behalf of a an- (c) connection (d) topology
other server is called . 29. When 2 devices are connected through a
(a) proxy server (b) firewall
dedicated line, it is topology.
(c) ethernet (d) WiFi (a) point to point
21. The intermediary host which protects a (b) bus
network from any communication with (c) star
prohibited hosts outside the protected (d) ring
network is called .
(a) proxy server (b) firewall 30. When all nodes are connected a com-
(c) ethernet (d) WiFi mon transmission line (backbone line
with 2 or more end points), it is
22. Firewall can .
(a) deny access to specific sites topology.
(a) point to point
(b) allow access to only white listed sites
(b) bus
(c) both a & b
(c) star
(d) none of them
(d) ring
23. A proxy server which simply forwards
messages from one network to another 31. When all nodes are connected to a cen-
tral hub, it is topology.
network is called proxy. (a) point to point
(a) gateway/ tunneling
(b) bus
(b) forward proxy
(c) star
(c) reverse proxy
(d) ring
(d) all of them
24. A proxy server which communicates with 32. When all nodes are connected in a cir-
the Internet and retrieves data from the cular form (the first node becomes the
Internet is called proxy. last node), it is topology.
(a) gateway/ tunneling (a) point to point
(b) forward proxy (b) bus
(c) reverse proxy (c) star
(d) all of them (d) ring
25. A proxy server which communicates 33. When each host has a dedicated line
with the servers in a local network (for connected to any other host on the net-
services like decryption, authentication, work, it is topology.
etc.) is called proxy. (a) fully connected
(a) gateway/ tunneling (b) Daisy chain

Prepared by: Dr.V.Nagaradjane


88 Prepared by: Dr.V.Nagaradjane

(c) tree (d) Medium Area Network


(d) partly connected 41. WAN stands for .
34. For fully connected topology, the num- (a) Wide Area Number
ber of connections (c) required for n (b) Wide Assignment Network
hosts is . (c) Wise Area Network
(a) c = n(n−2)
2
(d) Wide Area Network
(b) c = n(n−1)
4 42. Usually, the network connecting hosts
(c) c = n(n−1)
2
inside a single building is called
(d) c = (n−1)(n−2) .
2 (a) LAN (b) WAN
35. When each host has a dedicated line (c) MAN (d) none of them
connected to any other host on the net- 43. Usually, the network connecting hosts
work, it is topology. inside a city/ metropoliton limit is called
(a) fully connected
.
(b) daisy chain (a) LAN (b) WAN
(c) tree (c) MAN (d) none of them
(d) partly connected Usually, the network connecting hosts
44.
36. When computers are connected in chain located in several cities or nations is
(from one host to another) and data called .
hops between hosts till it reaches the in- (a) LAN (b) WAN
tended host, it is topology. (c) MAN (d) none of them
(a) fully connected 45. WLAN stands for .
(b) daisy chain (a) Wireless Local Area Network
(c) tree (b) Wired Local Area Network
(d) partly connected (c) Wireless Local Area Number
37. When data travels in branching connec- (d) Wireless Local Arithmatic Network
tions to reach intended host, the net- 46. When network hosts are connected with-
work topology is called . out wires, protocol is used.
(a) fully connected (a) LAN (b) WAN
(b) daisy chain (c) MAN (d) WLAN
(c) tree
(d) partly connected
1.9.5 Network components
38. When hosts are connected in a part fully
connected manner (with many missing Modem
connections), it is topology.
(a) fully connected 47. MODEM is a device used for converting
(b) daisy chain .
(a) digital signal to analog
(c) tree
(b) analog signal to digital
(d) partly connected
(c) both a & b
(d) neither a nor b
LAN, WAN and MAN
48. MODEM stands for .
39. LAN stands for . (a) MOdulation DEmodulation
(a) Local Area Number (b) MOdulation DEclaraction
(b) Local Area Network (c) MOdern DEmodulation
(c) Local Assignment Network (d) MOdulation DEcision
(d) Lead Area Network 49. MODEM is used to convey data over
40. MAN stands for . .
(a) air
(a) Metropolitan Area Number
(b) telephone line
(b) Metropolitan Assignment Network
(c) train track
(c) Metropolitan Area Network
(d) bus route
Q. Bank [COPA Semester - 1] 89

Hub (a) unshielded twisted cable


(b) shielded twisted cable
50. The device which repeats a signal on (c) coaxial cable
all lines except incoming one is called (d) fibre optic cable
.
(a) hub (b) switch 58. The cable containing 4 pairs of twisted
(c) MODEM (d) router wires with shielding foil to control in-
terference with other electrical signals
51. Hub is to switch/ bridge
and used for data transmission is called
since it repeats data even to the un-
.
wanted connections. (a) unshielded twisted cable
(a) inferior (b) superior
(b) shielded twisted cable
(c) equivalent (d) none of them
(c) coaxial cable
(d) fibre optic cable
Switch
59. A cable with single copper core and
52. The networking device which receives braided metal shield is called .
(a) unshielded twisted cable
a packet and repeats it to just the
(b) shielded twisted cable
intended recipient lines is called a
(c) coaxial cable
.
(a) hub (b) switch (d) fibre optic cable
(c) MODEM (d) none of them 60. A cable with single fibre optic core line
53. Switch is to a hub since un- surrounded by several layers of protec-
wanted repetitions are curtailed. tive materials is called .
(a) inferior (b) superior (a) unshielded twisted cable
(c) equivalent (d) none of them (b) shielded twisted cable
(c) coaxial cable
(d) fibre optic cable
Router
61. Fibre optic cables are inter-
54. The device used to transfer data from ferences from electric cables and electro-
one network to another network on the magnetic waves.
Internet is called . (a) prone to
(a) hub (b) switch (b) unaffected by
(c) MODEM (d) router (c) susceptible to
(d) affected by
Bridge 62. Out of the several cable options,
cable provides high speed over
55. The device which connects one Local long distances without being affected by
Area Network to another Local Area local interferences.
Network is called . (a) fibre optic
(a) hub (b) switch (b) unshielded twisted pair
(c) MODEM (d) bridge (c) shielded twisted pair
(d) none of them
Gateway

56. The node which connects one large net- 1.9.7 Wireless networks
work (a WAN, MAN, etc.) to another
large network is called . 63. Wireless networks communicate using
(a) hub (b) switch signal instead of cables.
(c) gateway (d) MODEM (a) infrared
(b) low frequency radio wave
(c) Wireless Fidelity (WiFi - IEEE 802.11 stan-
1.9.6 Network Cables dard)
(d) all of them
57. The cable containing 4 pairs of twisted
wires without any shielding foil for data 64. In the modern days, is the
transmission is called . best choice for wireless networking.

Prepared by: Dr.V.Nagaradjane


90 Prepared by: Dr.V.Nagaradjane

(a) WiFi (b) infrared (a) bluetooth


(c) radio waves (d) micro-wave (b) coaxial cable
65. The WiFi standard which permits trans- (c) fibre optic cable
mission distance of 50m with data rate (d) twisted pair cable
of 54MBPS is . 76. The network established using bluetooth
(a) IEEE 802.11a (b) IEEE 802.11b technology is called a .
(c) IEEE 802.11g (d) IEEE 802.11n (a) Local Area Network (LAN)
66. The WiFi standard which permits trans- (b) Wide Area Network (WAN)
mission distance of 100m with data rate (c) Metropolitan Area Network (MAN)
of 11MBPS is . (d) Personal Area Network (PAN)
(a) IEEE 802.11a (b) IEEE 802.11b
(c) IEEE 802.11g (d) IEEE 802.11n 77. Bluetooth signals have a range of
.
67. The WiFi standard which permits trans- (a) 1m (b) 5m
mission distance of 100m with data rate (c) 10m (d) 100m
of 54MBPS is . Bluetooth permits .
(a) IEEE 802.11a (b) IEEE 802.11b 78.
(c) IEEE 802.11g (d) IEEE 802.11n (a) pairing by acceptance
(b) pairing by password authentication
68. The WiFi standard which permits trans-
(c) pairing by verification
mission distance of more than 100m
(d) all of them
with data rate of 100MBPS is .
(a) IEEE 802.11a (b) IEEE 802.11b
(c) IEEE 802.11g (d) IEEE 802.11n 1.9.9 OSI 7 Layer Model
69. Wireless networks are wired net-
works. 79. The 7 layer model of OSI stands for
(a) slower than (b) faster than .
(c) as fast as (d) none of them (a) Open System Interconnection
70. In terms of data safety, wireless networks (b) Open System Interface
are wired networks. (c) Open Synchronous Interconnection
(a) more secure than (d) Ordered System Interconnection
(b) less secure than 80. The first layer of the OSI model is
(c) as safe as layer and it controls transmis-
(d) none of them sion of bits of data.
71. Normally, WiFi signal reach m (a) physical
distance. (b) data link layer
(a) 50 to 100m (b) 1 to 2m (c) network
(c) 0.5 to 1.0m (d) 2 to 3m (d) transport
72. WiFi networks have for con- 81. The second layer of the OSI model is
necting. layer and it controls reliable
(a) name (b) password transmission of data frames.
(c) both a & b (d) none of them (a) physical (b) data link
73. Name of a WiFi network may be (c) network (d) transport
. 82. The third layer of the OSI model is
(a) visible (b) invisible
layer and it controls address-
(c) both a & b (d) none of them
ing, routing and traffic control for data
74. Open WiFi networks have . frame transmission.
(a) a visible name (a) physical (b) data link
(b) no password (c) network (d) transport
(c) visible name without any password 83. The fourth layer of the OSI model is
(d) none of them layer and it controls trans-
mission of data using particular proto-
1.9.8 Bluetooth technology cols like TCP or UDP.
(a) physical (b) data link
75. The technology which permits data
transmission between devices like com-
puters, mobile phones, tablets, head-
sets, etc. is called .
Q. Bank [COPA Semester - 1] 91

(c) network (d) transport (b) Reverse Address Resolution Protocol (RARP)
84. The fifth layer of the OSI model is (c) Open System Interconnection (OSI)
layer and it controls connec- (d) none of them
tion between 2 hosts (like client and 93. is the version of Internet
server) during data communication. Protocol now being phased out.
(a) session (b) presentation (a) IP version 1 (IPV1)
(c) application (d) transport (b) IP version 2 (IPV2)
85. The sixth layer of the OSI model is (c) IP version 4 (IPV4)
layer and it takes care of en- (d) IP version 6 (IPV6)
cryption, decryption, compression, de- 94. is the version of Internet
compression and data encoding. Protocol now being introduced to han-
(a) session (b) presentation dle increased size of the Internet.
(c) application (d) transport (a) IP version 1 (IPV1)
86. The seventh layer of the OSI model is (b) IP version 2 (IPV2)
layer and it deals with file (c) IP version 4 (IPV4)
sharing, video sharing, audio sharing, (d) IP version 6 (IPV6)
browsing, etc. using specific programs. 95. IPV4 addresses have a by nu-
(a) session (b) presentation meric address.
(c) application (d) transport (a) 4 (b) 6
(c) 8 (d) 16
1.9.10 Various Network protocols 96. The addresses 216.58.213.36
(www.google.com), 209.191.88.254
87. TCP stands for . (www.yahoo.com) belong to IP version
(a) Transmission Control Protocol .
(b) Transmission Control Procedure (a) 1 (b) 2
(c) Transit Control Protocol (c) 3 (d) 4
(d) Transmission Convergence Protocol
88. UDP stands for . TCP/IP
(a) Unified Datagram Protocol
97. In a client server network, the ports
(b) User Datagram Protocol
in the range of 0 to 1023 are called
(c) User Datagram Procedure
ports.
(d) User Digital Protocol (a) relational ports
89. IP stands for . (b) general ports
(a) Information Protocol (c) well known ports
(b) Internet Procedure (d) user ports
(c) Identity Protocol
98. Network protocols are standardized
(d) Internet Protocol through .
90. DNS stands for . (a) Request For Comment (RFC)
(a) Domain Name Synchronized (b) email
(b) Data Name System (c) web server
(c) Domain Name System (d) telnet
(d) Domain Network System 99. RFC in networking stands for
91. allows for mapping IP ad- .
dress to an ethernet or hardware ad- (a) Rejection For Comment
dress. (b) Request For Comment
(a) Address Resolution Protocol (ARP) (c) Request For Contest
(b) Reverse Address Resolution Protocol (RARP) (d) Request Freight Comment
(c) Open System Interconnection (OSI) 100. W3C in networking stands for
(d) none of them .
92. allows for mapping an eth- (a) World Wide Winter Consortium
ernet or hardware address to an IP ad- (b) World Wide Web Contest
dress. Resolution Protocol (ARP) (c) World White Web Consortium
(a) Address

Prepared by: Dr.V.Nagaradjane


92 Prepared by: Dr.V.Nagaradjane

(d) World Wide Web Consortium (c) Structured Query Language (SQL)
101. TCP/IP port number 7 is assigned for (d) Network News Transfer Protocol (NNTP)
protocol. 110. TCP/IP port number 109 is assigned for
(a) daytime .
(b) echo (a) Hyper Text Transfer Protocol (HTTP)
(c) quote of the day (b) Post Office Protocol (POP)
(d) message send (c) Structured Query Language (SQL)
(d) Network News Transfer Protocol (NNTP)
102. TCP/IP port number 13 is assigned for
protocol. 111. TCP/IP port number 118/ 156 is as-
(a) daytime signed for .
(b) echo (a) Hyper Text Transfer Protocol (HTTP)
(c) quote of the day (b) Post Office Protocol (POP)
(d) message send (c) Structured Query Language (SQL)
(d) Network News Transfer Protocol (NNTP)
103. TCP/IP port number 17 is assigned for
protocol. 112. TCP/IP port number 119/ 443 is as-
(a) daytime signed for .
(b) echo (a) Hyper Text Transfer Protocol (HTTP)
(c) quote of the day (b) Post Office Protocol (POP)
(d) message send (c) Structured Query Language (SQL)
(d) Network News Transfer Protocol (NNTP)
104. TCP/IP port number 18 is assigned for
protocol. 113. TCP/IP port number 143/ 220 is as-
(a) daytime signed for .
(b) echo (a) Internet Message Access Protocol (IMAP)
(c) quote of the day (b) Simple Network Management Protocol
(d) message send (SNMP)
(c) Internet Relay Chat (IRC)
105. TCP/IP port number 20 is assigned for
(d) Precision Time Protocol (PTP)
.
(a) Telnet 114. TCP/IP port number 161 is assigned for
(b) Simple Mail Transfer Protocol (SMTP) .
(c) File Transfer Protocol Protocol (FTP) (a) Internet Message Access Protocol (IMAP)
(d) Trivial File Transfer Protocol (TFTP) (b) Simple Network Management Protocol
(SNMP)
106. TCP/IP port number 23 is assigned for (c) Internet Relay Chat (IRC)
.
(a) Telnet (d) Precision Time Protocol (PTP)
(b) Simple Mail Transfer Protocol (SMTP) 115. TCP/IP port number 194 is assigned for
(c) File Transfer Protocol Protocol (FTP) .
(d) Trivial File Transfer Protocol (TFTP) (a) Internet Message Access Protocol (IMAP)
(b) Simple Network Management Protocol
107. TCP/IP port number 25 is assigned for (SNMP)
. (c) Internet Relay Chat (IRC)
(a) Telnet
(b) Simple Mail Transfer Protocol (SMTP) (d) Precision Time Protocol (PTP)
(c) File Transfer Protocol Protocol (FTP) 116. TCP/IP port number 319 is assigned for
(d) Trivial File Transfer Protocol (TFTP) .
(a) Internet Message Access Protocol (IMAP)
108. TCP/IP port number 69 is assigned for (b) Simple Network Management Protocol
. (SNMP)
(a) Telnet
(c) Internet Relay Chat (IRC)
(b) Simple Mail Transfer Protocol (SMTP)
(d) Precision Time Protocol (PTP)
(c) File Transfer Protocol Protocol (FTP)
(d) Trivial File Transfer Protocol (TFTP) 117. TCP/IP port number 319 is assigned for
.
109. TCP/IP port number 80 is assigned for (a) Internet Message Access Protocol (IMAP)
. (b) Simple Network Management Protocol
(a) Hyper Text Transfer Protocol (HTTP)
(SNMP)
(b) Post Office Protocol (POP)
(c) Internet Relay Chat (IRC)
Q. Bank [COPA Semester - 1] 93

(d) Precision Time Protocol (PTP) (a) get (b) put


118. TCP/IP port number 443 is assigned for (c) cd (d) lcd
. 126. Using FTP, a file can be copied from lo-
(a) HTTP over Secure Socket Layer HTTPS cal host to remote host using the com-
(b) Remote Procedure Call (RPC) mand .
(c) Dynamic Host Configuration Protocol (a) get (b) put
(DHCP) (c) cd (d) lcd
(d) Internet Message Access Protocol over Secure
127. Using FTP, working directory on the re-
Socket Layer (IMAPS) mote host can be changed using the
119. TCP/IP port number 530 is assigned for command .
. (a) pwd (b) put
(a) HTTP over Secure Socket Layer HTTPS (c) cd (d) lcd
(b) Remote Procedure Call (RPC)
(c) Dynamic Host Configuration Protocol 128. Using FTP, working directory on the lo-
cal host can be changed using the com-
(DHCP)
(d) Internet Message Access Protocol over Secure mand .
(a) pwd (b) bye
Socket Layer (IMAPS) (c) cd (d) lcd
120. TCP/IP port number 546/ 547 is as-
129. Using FTP, list of files on the remote
signed for .
(a) HTTP over Secure Socket Layer HTTPS host can be viewed using the command
(b) Remote Procedure Call (RPC) .
(a) pwd (b) bye
(c) Dynamic Host Configuration Protocol (c) cd (d) lcd
(DHCP)
(d) Internet Message Access Protocol over Secure 130. Using FTP, a file on the remote host
Socket Layer (IMAPS) may be deleted using the command
.
121. TCP/IP port number 993 is assigned for (a) delete (b) bye
. (c) cd (d) lcd
(a) HTTP over Secure Socket Layer HTTPS
(b) Remote Procedure Call (RPC) 131. Using FTP, connection to remote FTP
(c) Dynamic Host Configuration Protocol server may be terminated using the com-
(DHCP) mand .
(a) delete (b) bye/ quit
(d) Internet Message Access Protocol over Secure
(c) cd (d) lcd
Socket Layer (IMAPS)
132. Popular FTP clients are .
FTP (a) CoreFTP (b) FireFTP
(c) FileZilla (d) all of them
122. The TCP/IP protocol which permits
sharing of large files over the Internet Telnet
is called .
(a) File Transfer Protocol (FTP) 133. The network protocol which permits
(b) Hyper Text Transmission Protocol (HTTP) a person to login to a remote com-
(c) Simple Mail Transfer Protocol (SMTP) puter, access files, execute commands
(d) Network Time Protocol (NTP) on the remote computer, etc. is called
123. FTP runs on port number . .
(a) 7 (b) 13 (a) FTP (b) HTTP
(c) 20 (d) 23 (c) Telnet (d) SMTP
124. The FTP server which does not require 134. Port No. is reserved for telnet
login process is called . protocol.
(a) Hyper Text Transmission Protocol (a) 7 (b) 13
(b) Simple Mail Transfer Protocol (c) 20 (d) 23
(c) Network Time Protocol 135. Usually, telnet connection is established
(d) Anonymous File Transfer Protocol using command followed by
125. Using FTP, a file can be copied from name of host.
remote system to the local system using (a) ftp (b) telnet
the command . (c) ping (d) ls

Prepared by: Dr.V.Nagaradjane


94 Prepared by: Dr.V.Nagaradjane

1.9.11 Logical and Physical Ad- (c) 192 - 223 (d) none of them
dresses 145. First byte of class C network is in the
range of .
136. The address of the physical networking (a) 1 - 126 (b) 128 - 191
component (like ethernet, WiFi, etc.) is (c) 192 - 223 (d) none of them
called address. 146. Each class A network supports
(a) virtual (b) logical
(c) physical (d) imaginary hosts.
(a) 1,67,77,214 (b) 65,534
137. The address assigned to a host on get- (c) 254 (d) none of them
ting connected to a network (like the In- 147. Each class B network supports
ternet) is called address. hosts.
(a) virtual (b) logical (a) 1,67,77,214 (b) 65,534
(c) physical (d) imaginary (c) 254 (d) none of them
138. In networking, MAC stands for 148. Each class C network supports
. hosts.
(a) Media Address Control (a) 1,67,77,214 (b) 65,534
(b) Machine Access Control (c) 254 (d) none of them
(c) Media Access Contact
149. IPV4 has got bits for address-
(d) Media Access Control ing of hosts.
139. Logical address of a host connected to (a) 128 (b) 64
a network is otherwise called (c) 32 (d) 16
address. 150. IPV6 has got bits for address-
(a) IP address
ing of hosts.
(b) IP version 4 address (a) 128 (b) 64
(c) IP version 6 address (c) 32 (d) 16
(d) all of them
151. IPV4 has got bytes for ad-
dressing of hosts.
1.9.12 Classes of Networks (a) 16 (b) 8
(c) 4 (d) 2
140. The addresses of class A network has
152. IPV6 has got bytes for ad-
subnet mask of .
(a) 255.0.0.0 dressing of hosts.
(b) 255.255.0.0 (a) 16 (b) 8
(c) 255.255.255.0 (c) 4 (d) 2
(d) none of them 153. The address 2001:db8:a0b:12f0::1 is for-
141. The addresses of class B network has matted in .
(a) IPV0 (b) IPV2
subnet mask of . (c) IPV4 (d) IPV6
(a) 255.0.0.0
(b) 255.255.0.0
(c) 255.255.255.0 1.9.13 Network Security & Firewall
(d) none of them
142. The addresses of class C network has 154. Connection to the Internet requires en-
subnet mask of . forcement of security.
(a) 255.0.0.0 (a) low (b) high
(b) 255.255.0.0 (c) zero (d) no
(c) 255.255.255.0 155. Filtering connections and disallowing
(d) none of them prohibited connections is carried out us-
143. First byte of class A network is in the ing .
range of . (a) MODEM (b) router
(a) 1 - 126 (b) 128 - 191 (c) firewall (d) bridge
(c) 192 - 223 (d) none of them 156. First general firewalls operated at layer
144. First byte of class B network is in the of the OSI model.
range of . (a) 3 (b) 4
(a) 1 - 126 (b) 128 - 191 (c) 5 (d) 7
Q. Bank [COPA Semester - 1] 95

157. Second general firewalls operated at (b) Transmission Control Protocol (TCP)
layer of the OSI model. (c) User Datagram Protocol (UDP)
(a) 3 (b) 4 (d) File Transfer Protocol (FTP)
(c) 5 (d) 7
158. Third general firewalls operated at layer 1.9.15 Internet
of the OSI model.
(a) 3 (b) 4 166. The global network of networks is called
(c) 5 (d) 7 .
159. First generation firewalls were otherwise (a) Local Area Network
called . (b) Internet
(a) packet filters (c) Intranet
(b) stateful filters (d) Metropolitan Area Network
(c) application filters 167. The global network established for a par-
(d) none of them ticular business (not for public access) is
160. Second generation firewalls were other- called .
wise called . (a) Local Area Network
(a) packet filters (b) Internet
(b) stateful filters (c) Intranet
(c) application filters (d) Metropolitan Area Network
(d) none of them
161. Third generation firewalls were other- 1.9.16 Introduction to the Internet
wise called .
(a) packet filters 168. Internet may be used for .
(b) stateful filters (a) sharing information through World Wide Web
(c) application filters (b) sending and receiving emails
(d) none of them (c) sharing of large files
162. IPS in firewall stands for . (d) all of them
(a) Intrusion Protection System 169. Internet may be used for .
(b) Intrusion Prevention Software (a) cloud storage of data in remote computers
(c) Internet Prevention System (b) secure operation of bank accounts through
(d) Intrusion Prevention System netbanking and mobile banking
163. The identity management system binds (c) secure operation of wallet payments
logical addresses to for reputed (d) all of them
servers. 170. Internet helps scientists to .
(a) MAC address
(a) share their research results with other scien-
(b) specific programs
tists
(c) other computers (b) learn what happens in the state of the arch
(d) none of them research
(c) download articles published by other re-
164. Third generation of firewall offers
to prevent web fingerprint at- searchers
(d) all of them
tacks.
(a) web application firewall 171. Internet helps in .
(b) packet filter (a) conducting online examinations
(c) stateful filter (b) conducting online classes
(d) none of them (c) conducting online interaction sessions to clear
the doubts of students
(d) all of them
1.9.14 DHCP Server 172. Internet helps to .
(a) update correct time using Network Time Pro-
165. The protocol used to automatically as-
tocol (NTP)
sign IP address to a newly connected
(b) e-commerce
host in a network is called .
(a) Dynamic Host Configuration Procol (DHCP) (c) job search
(d) all of them

Prepared by: Dr.V.Nagaradjane


96 Prepared by: Dr.V.Nagaradjane

1.9.17 Introduction to WWW 181. holds information about files


downloaded from the Internet.
173. WWW stands for . (a) history (b) downloads
(a) World Wide Web (c) tab (d) home page
(b) World Wire Web 182. A opens new web page inside
(c) Work Wide Web the current browser window itself.
(d) World Wise Web (a) history (b) downloads
174. The World Wide Web requires a (c) tab (d) home page
for page navigation.
(a) document editor 1.9.18 Web Browsers
(b) browser
(c) drawing program 183. The software used for viewing web pages
(d) image editor is called .
(a) browser (b) media player
175. Microsoft Internet Explorer, Microsoft
(c) anti-virus (d) virus
Edge, Firefox, Chrome, Safari, Kon-
queror, Seamonkey, etc. are 184. Microsoft Internet Explorer, Firefox,
applications. Chrome, Opera, Microsoft Edge, Apple
(a) word processing Safari, etc. are software.
(b) spreadsheet (a) browser (b) media player
(c) browser (c) anti-virus (d) virus
(d) presentation 185. A browser has for typing the
176. The space at the top of browser for en- address.
(a) address bar
tering the address of web site is called
(b) security lock icon
.
(a) bookmarks bar (c) history tab
(b) history bar (d) bookmarks
(c) status bar 186. A browser shows icon when an
(d) address bar encrypted connection is present.
(a) address bar
177. The list of addresses visited by a person
during browsing is called . (b) security lock icon
(a) history (c) history tab
(b) bookmark (d) bookmarks
(c) private browsing 187. A browser shows the list of web pages
(d) home page visited in the recent past at .
178. The list of addresses saved by a person (a) address bar
for easy revisit is called . (b) security lock icon
(a) history (c) history tab
(b) bookmark (d) bookmarks
(c) private browsing 188. A browser has for storing im-
(d) home page portant pages likely to be revisited in the
179. The method of browsing the web with- future.
(a) address bar
out storing any session information on
(b) security lock icon
the local device is called .
(a) history (c) history tab
(b) bookmark (d) bookmarks
(c) private browsing 189. A browser has for monitoring
(d) home page downloads.
(a) address bar
180. The web page which loads just as the
browser opens is called . (b) downloads tab
(a) history (c) history tab
(b) bookmark (d) bookmarks
(c) private browsing 190. When visiting unprotected websites, the
(d) home page lock icon is shown with .
Q. Bank [COPA Semester - 1] 97

(a) red X to denote unsafe connection 197. Before clicking the link provided in the
(b) Green tick to denote safe connection result list of search engines, one should
(c) both a and b .
(d) none of them (a) believe that the URL is correct
(b) naively click all links
(c) ensure that the URL is authentic
1.9.19 Internet servers (d) click the links without consideration and pay
the sums demanded therein
191. The computers which run software pack- 198. If the user wants a complete phrase to be
ages for web pages (HTTP), email included in verbatim search, the phrase
(SMTP), file transfer (FTP), network should be .
time protocol (NTP), etc are called (a) deleted
. (b) enclosed in double quotes
(a) Internet servers (c) enclosed in brackets
(b) clients (d) enclosed in curly braces
(c) browsers
(d) media players 199. Clicking on links from untrusted search
engines might take an innocent user to
192. Apache web server & Internet Informa- .
tion Server are examples of (a) video sharing websites
servers. (b) audio streaming web sites
(a) web (c) social media websites
(b) email (d) hackers web site which extracts login ID and
(c) file transfer password
(d) none of them
200. Search terms entered in a search engine
.
1.9.20 Search engines (a) can be traced back to the original source
(b) cannot be traced back to the source
193. An Internet service which helps on- (c) can never be traced back to the source
line searching of information is called (d) may not be traced to the source
.
(a) steam engine
(b) search engine 1.9.21 Domain naming Systems
(c) email server
201. All computers on a network are uniquely
(d) video stream identified by .
194. Google, Bing, Yahoo, Rediff, Ask, AOL (a) IP address
etc. are some of the well known (b) mobile number
. (c) landline number
(a) spread sheet programs (d) none of them
(b) search engines
(c) image editors 202. Since IP address is difficult to remem-
ber, easy to remember names are as-
(d) video players
signed to .
195. To get a particular type of files in the re- (a) server hosts
sult list, one should use (b) clients
option at the end of the search string. (c) mobile phones
(a) mailto (b) address (d) none of them
(c) filetype (d) option
203. server offers name for given IP
196. To get only PDF files in the result list, address or IP address for given server
may be used. name.
(a) filetype:pdf (a) Domain Name Service (DNS) server
(b) filetype:mp3 (b) web server
(c) filetype:3gp (c) email server
(d) filetype:docx (d) FTP server

Prepared by: Dr.V.Nagaradjane


98 Prepared by: Dr.V.Nagaradjane

1.9.22 E-mail (a) right click and choose save image as


(b) left click
204. Transmission and delivery of informa- (c) double click
tion containing text, image, video, docu- (d) press delete button
ments etc. to targeted recepient(s) over
the Internet is called . 214. Electronic communication between
(a) email 2 persons having unique iden-
(b) world wide web tifiers over the Internet is called
(c) e-commerce .
(a) India post
(d) social media
(b) Speed post
205. An email address contains (c) Registered post
parts separated by a @ symbol. (d) email
(a) 5 (b) 4
(c) 3 (d) 2 215. is a technology that allows
you to send and receive messages over
206. The first part of email address identifies
. the Internet without the delay of tradi-
(a) name of individual user tional postal services.
(b) name of the email server (a) India post
(c) name of the mobile phone operator (b) Speed post
(d) name of bank (c) Registered post
(d) email
207. The second part of email address iden-
tifies . 216. Each user of a email communication
(a) name of individual user should possess .
(b) name of the email server (a) a unique identifier, called email ID
(c) name of the mobile phone operator (b) pen drive
(d) name of bank (c) external hard disk
208. The user name and email server parts (d) DVD writer
of an email address are separated by 217. The email ID of a person contains
symbol. parts.
(a) @ (b) # (a) 2 (b) 3
(c) $ (d) & (c) 4 (d) 5
209. Gmail.com, yahoo.com, yahoo.co.in, 218. The first part of an email ID contains
ymail.com, rediff.com, rediffmail.com, .
fastmail.fm, etc. are popular . (a) name of the city
(a) FTP servers (b) name of the owner of the email service provider
(b) social media sites (c) name/identifier of the email user
(c) email servers (d) name of the email server
(d) none of them 219. The second part of an email ID contains
210. Content found in the web can be .
to the local computer/ device (a) name of the city
for reading at leisure. (b) name of the owner of the email service provider
(a) uploaded (b) downloaded (c) name/identifier of the email user
(c) transmitted (d) erased (d) name of the email server
211. An email may contain non-text informa- 220. In email communication, CC stands for
tion which may be . .
(a) uploaded (b) downloaded (a) carbon copy
(c) transmitted (d) erased (b) cold coffee
(c) blind carbon copy
212. To download an email attachment, the
user the attachment. (d) casual copy
(a) clicks 221. In email communication, BCC stands for
(b) right clicks and chooses save .
(c) both a & b (a) carbon copy
(d) neither a nor b (b) cold coffee
213. An image displayed on web page can be
to download the file.
Q. Bank [COPA Semester - 1] 99

(c) blind carbon copy (a) spam bin (b) inbox


(d) casual copy (c) sent mails (d) draft
222. The email ID of the primary recipient of 234. Before entering user ID and password,
email is entered in field. one should ensure that the browser dis-
(a) To (b) CC plays icon for safe com-
(c) BCC (d) Subject munication with the server.
223. The email ID of the secondary recipi- (a) print (b) lock
ent of email is entered in (c) clock (d) lens
field. 235. Logging into an email server from a ded-
(a) To (b) CC
icated application (APP) installed on a
(c) BCC (d) Subject
smartphone helps to
224. The email ID of the anonymous recipi- email messages.
ent of email is entered in (a) auto delete
field. (b) hide
(a) To (b) CC
(c) periodically check, retrieve and notify
(c) BCC (d) Subject
(d) purge
225. The crisp essence of email message is
entered in field. 236. It is a good practice to
(a) To (b) CC email messages from unknown senders
(c) BCC (d) Subject to avoid virus infection of computer.
(a) avoid opening attachments in
226. The actual message of an email is called
(b) open message and all attachments of
the .
(a) content (b) attachment (c) sit looking for
(c) subject (d) BCC (d) invite more spammers to send
227. The file attached to an email is called 237. Images and videos attached to a junk
the . email may .
(a) content (b) attachment (a) contain anti-virus
(c) subject (d) BCC (b) repair troubles in the operating system
228. An email sent from unknown persons (c) help fast working of computers
for improving the sale, image, appeal (d) contain trojens and virusses to attack a com-
or other characteristics of a product is puter
called . 238. Opening a new email ID requires entry of
(a) Junk (b) Important in the email opening
(c) Virus (d) Trojan form.
229. mail refers to e-mail messages (a) name and address
sent by an unknown sender, usually for (b) date of birth and father name
commercial purposes. (c) alternate email ID if necessary
(a) Junk (b) Important (d) all of them
(c) Virus (d) Trojan
230. Unsolicited emails may be filtered and 1.9.23 Video chatting tools
separated into .
(a) spam bin (b) inbox 239. The exchange of audio, video and text
(c) sent mails (d) draft over the Internet is called .
231. The primary place for receiving an email (a) video chat (b) audio chat
is . (c) text chat (d) SMS
(a) spam bin (b) inbox 240. are some of the video chat
(c) sent mails (d) draft applications.
232. All emails sent by the user may be saved (a) Google video chat
in . (b) Skype/ Viber
(a) spam bin (b) inbox (c) iChat/VSee
(c) sent mails (d) draft (d) all of them
233. A half completed email may be saved
for later editing and transmission to the
receiver in folder.

Prepared by: Dr.V.Nagaradjane


100 Prepared by: Dr.V.Nagaradjane

1.9.24 VOIP (b) might fetch good employment


(c) might result in unknown dangers to innocent
241. VOIP stands for . users
(a) Voice Over Internet Procedure (d) all of them
(b) Voice Over Internet Protocol 250. During natural calamities like earth-
(c) Voice Over Instant Protocol quake, floods, Tsunami, etc.,
(d) Virtue Over Internet Protocol plays a vital role in
242. VOIP permits . damage assessment and rescue efforts.
(a) calling of mobile and telephone numbers (a) multi-media (b) email
through Internet (c) social media (d) SMS
(b) browsing web 251. Professional sites like Linked-In offer
(c) exchanging email to its users.
(d) text chat (a) no benefits
243. VOIP can reduce the cost of long dis- (b) respectable job opportunities
tance International calls when . (c) no profiles
(a) call charges are zero (d) no professional contacts
(b) data charges are very high 252. A professional should
(c) calls charges are cheaper than data charges the time allotted for social media, lest
(d) data is cheaper than call charges she/he begins to waste productive work-
ing hours in the social media.
1.9.25 Social Media (a) restrict
(b) increase
244. The Internet repository for sharing ca- (c) not worry about
sual information (text, documents, au- (d) be liberal about
dio, images, videos, etc.) is called 253. Noways, it is possible to carry out little
. on social media sites
(a) multi-media
like Facebook.
(b) social media (a) exchange of legal papers
(c) storage media (b) financial transactions with the support of bank
(d) email (c) legal arguments
245. Information stored in social media (d) trading of goods
. 254. An innocent user interacting with
(a) is highly secure
strangers in social media may be
(b) encrypted and secured with password
to share forbidden con-
(c) strongly secured
tent with those stranger.
(d) not secure (a) commanded (b) coerced
246. The services like Facebook, Twit- (c) threatened (d) persuaded
ter, Linked-In are categorized under
255. Interaction with strangers on social me-
.
(a) social media (b) MS Officer dia is as as it is exciting.
(a) appreciable (b) happy
(c) PDF reader (d) video player
(c) dangerous (d) laudable
247. Most of the social media websites re-
quire as user ID.
(a) Postal code 1.9.26 Cloud storage
(b) PAN number
(c) email address 256. Permitting storage of files on a web
(d) Adhar ID number based server is called .
(a) cloud storage
248. Sharing personal information on social (b) local storage
media is . (c) email storage
(a) right (b) unsafe
(c) appreciable (d) commendable (d) had disk storage

249. Interacting with strangers on social me- 257. Cloud storage can be accessed from any
dia might . host having a .
(a) result in great future (a) RS232 port
Q. Bank [COPA Semester - 1] 101

(b) Internet connection (d) Distributed Denial of Service


(c) USB port 265. A group of sending fake service re-
(d) VGA port quests to a server to such an extent that
258. Popular cloud storages are . the server buckles due to overloading is
(a) Microsoft One Drive called .
(b) Google Drive (a) spoofing
(c) Dropbox/ Apple iCloud (b) phishing
(d) all of them (c) botnet
(d) Distributed Denial of Service
259. Documents in Microsoft One Drive can
be edited using . 266. An intrusive login to a protected system
(a) online version of Microsoft office tools using from a remote system to carry out ma-
browser licious acts is called .
(b) installed version of Microsoft office tools (a) hacking (b) malware
(c) both a & b (c) pharming (d) ransomeware
(d) none of them 267. A piece of software designed for ill inten-
260. Cloud storage can be accessed from tions (virus), to steal user id/ password
. (trojen), erase data on computer (virus),
(a) computers etc. is called .
(b) mobile devices (a) hacking (b) malware
(c) both a & b (c) pharming (d) ransomeware
(d) none of them 268. Redirecting a legitimate web address to
a malicious host is called .
(a) hacking (b) malware
1.9.27 Internet Security (c) pharming (d) ransomeware
Threats, attacks & Malicious Software 269. The malicious software which enters a
computer, locks files and threatens to
261. A malicious server posing as an authen- destroy files unless payment is made to
tic server is called . a partcular account is called .
(a) spoofing
(a) hacking (b) malware
(b) phishing
(c) pharming (d) ransomeware
(c) botnet
(d) Distributed Denial of Service 270. The piece of malware which spreads
through attachments to emails is called
262. A malicious email or SMS communica-
tion inviting the user to click a link and .
(a) worm (b) spam
taking the user to a malicious web site (c) spyware (d) trojen
is .
(a) spoofing 271. The piece of malware which keeps send-
(b) phishing ing junk message advertising certain
(c) botnet products is called .
(d) Distributed Denial of Service (a) worm (b) spam
(c) spyware (d) trojen
263. A malicious email or SMS communica-
tion inviting the user to click a link and 272. The simply records computer activities
taking the user to a malicious web site and transmits them to a malicious site
is . is called .
(a) spoofing (a) worm (b) spam
(b) phishing (c) spyware (d) trojen
(c) botnet 273. The poses as an authenticator but steals
(d) Distributed Denial of Service login data is called .
(a) worm (b) spam
264. A group of malware infected computers
(c) spyware (d) trojen
controlled by a remote system to carry
out malicious tasks is called . 274. The method of stealing user information
(a) spoofing by allowing the user to connect to a free
(b) phishing WiFi network (as in a Coffee shop, Ho-
(c) botnet tel, etc.) is called .

Prepared by: Dr.V.Nagaradjane


102 Prepared by: Dr.V.Nagaradjane

(a) WiFi evesdropping 17. (a) 18. (b) 19. (b) 20. (a)
(b) spam 21. (b) 22. (c) 23. (a) 24. (b)
(c) spyware 25. (c) 26. (c) 27. (c) 28. (d)
(d) trojen 29. (a) 30. (b) 31. (c) 32. (d)
33. (a) 34. (c) 35. (a) 36. (b)
Internet security products 37. (c) 38. (d) 39. (b) 40. (c)
41. (d) 42. (a) 43. (c) 44. (b)
275. Anti-virus software packages help to 45. (a) 46. (d) 47. (c) 48. (a)
. 49. (b) 50. (a) 51. (a) 52. (b)
(a) protect files 53. (b) 54. (d) 55. (d) 56. (c)
(b) protect login data 57. (a) 58. (b) 59. (c) 60. (d)
(c) protect against online phishing, spoofing, 61. (b) 62. (a) 63. (d) 64. (a)
pharming, etc. 65. (a) 66. (b) 67. (c) 68. (d)
(d) all of them
69. (a) 70. (b) 71. (a) 72. (c)
276. Internet security products mainly con- 73. (c) 74. (d) 75. (a) 76. (d)
centrate on . 77. (c) 78. (d) 79. (a) 80. (a)
(a) firewall
(b) anti-spam 81. (b) 82. (c) 83. (d) 84. (a)
(c) parental control 85. (b) 86. (c) 87. (a) 88. (b)
(d) all of them 89. (d) 90. (c) 91. (a) 92. (b)
93. (c) 94. (d) 95. (a) 96. (d)
277. Popular internet security products are 97. (c) 98. (a) 99. (b) 100. (d)
.
(a) McAffee livescan/ Internet security 101. (b) 102. (a) 103. (c) 104. (d)
(b) Kaspersky Internet Security 105. (c) 106. (a) 107. (b) 108. (d)
(c) Trend Micro Internet security/ Bit defender In- 109. (a) 110. (b) 111. (c) 112. (d)
ternet security 113. (a) 114. (b) 115. (c) 116. (c)
(d) all of them 117. (c) 118. (a) 119. (b) 120. (c)
278. A total security software protects a com- 121. (d) 122. (a) 123. (c) 124. (d)
puter against attacks. 125. (a) 126. (b) 127. (c) 128. (d)
(a) offline attacks 129. (a) 130. (a) 131. (b) 132. (d)
(b) online attacks 133. (c) 134. (d) 135. (b) 136. (c)
(c) both a & b 137. (b) 138. (d) 139. (d) 140. (a)
(d) neither a nor b 141. (b) 142. (c) 143. (a) 144. (b)
279. Examples of total security software 145. (c) 146. (a) 147. (b) 148. (c)
packages are . 149. (c) 150. (a) 151. (c) 152. (a)
(a) Norton total security 153. (d) 154. (b) 155. (c) 156. (a)
(b) Kaspersky Total Security 157. (b) 158. (d) 159. (a) 160. (b)
(c) both a & b 161. (c) 162. (d) 163. (a) 164. (a)
(d) none of them 165. (a) 166. (b) 167. (c) 168. (d)
280. In addition to offering firewall, anti- 169. (d) 170. (d) 171. (d) 172. (d)
spam control and parental control, total 173. (a) 174. (b) 175. (c) 176. (d)
security software offers . 177. (a) 178. (b) 179. (c) 180. (d)
(a) backup and restoration options for data 181. (b) 182. (c) 183. (a) 184. (a)
(b) tuning up the computer for better performance 185. (a) 186. (b) 187. (c) 188. (d)
(c) both a & b 189. (b) 190. (a) 191. (a) 192. (a)
(d) none of them 193. (b) 194. (b) 195. (c) 196. (a)
197. (c) 198. (b) 199. (d) 200. (a)
201. (a) 202. (a) 203. (a) 204. (a)
Answers (1402 - 1681) 205. (d) 206. (a) 207. (b) 208. (a)
209. (c) 210. (b) 211. (b) 212. (c)
1. (d) 2. (a) 3. (c) 4. (a) 213. (a) 214. (d) 215. (d) 216. (a)
5. (b) 6. (c) 7. (d) 8. (a) 217. (a) 218. (c) 219. (d) 220. (a)
9. (c) 10. (c) 11. (d) 12. (b) 221. (c) 222. (a) 223. (b) 224. (c)
13. (c) 14. (c) 15. (a) 16. (c) 225. (d) 226. (a) 227. (b) 228. (a)
Q. Bank [COPA Semester - 1] 103

229. (a) 230. (a) 231. (b) 232. (c) 257. (b) 258. (d) 259. (c) 260. (c)
233. (d) 234. (b) 235. (c) 236. (a) 261. (a) 262. (b) 263. (b) 264. (c)
237. (d) 238. (d) 239. (a) 240. (d) 265. (d) 266. (a) 267. (b) 268. (c)
241. (b) 242. (a) 243. (d) 244. (b) 269. (d) 270. (a) 271. (b) 272. (c)
245. (d) 246. (a) 247. (c) 248. (b) 273. (d) 274. (a) 275. (d) 276. (d)
249. (d) 250. (c) 251. (b) 252. (a) 277. (d) 278. (c) 279. (c) 280. (c)
253. (b) 254. (d) 255. (c) 256. (a)

Prepared by: Dr.V.Nagaradjane


104 Prepared by: Dr.V.Nagaradjane

1.10 Web Design (c) machine (d) binary


9. Web pages containing script to be pro-
1.10.1 Web server cessed by the browser (in languages like
Javascript, VisualBasic.NET, etc.) are
1. Web pages are designed primarily in said to contain side script.
. (a) client (b) server
(a) HTML (b) C++
(c) machine (d) binary
(c) Basic (d) Fortran
2. Web pages are stored in a remote host
called the . 1.10.2 Static and Dynamic Web
(a) client pages
(b) email server
(c) database server 10. HTML stands for .
(d) web server (a) Hyper Text Machine Language
3. The client of a web server uses (b) Higher Text Markup Language
for display of the page. (c) Hyper Text Markup Language
(a) word processor (d) Hyper Tension Markup Language
(b) spreadsheet 11. Web pages which do not change to in-
(c) web browser teract with user are called
(d) power point HTML pages.
4. is the name of the software (a) intrinsic (b) righteous
which fulfills the request of a browser (c) dynamic (d) static
based client. 12. Web pages which interact with user are
(a) email server called HTML pages.
(b) web server (a) intrinsic (b) extrinsic
(c) database server (c) dynamic (d) static
(d) FTP server
13. Dynamic HTML pages can be coded us-
5. Apache HTTP, Microsoft Internet In- ing .
formation Sever (IIS), IBM Websphere, (a) Adobe Flash (b) Javascript
etc. are some of the popular (c) VBScript (d) all of them
. 14. The portion of script code (written in
(a) email servers
(b) web servers Javascript/ VBScript) executed inside a
(c) database servers browser is called side script-
(d) FTP servers ing.
(a) client (b) server
6. is the consortium responsible (c) right (d) left
for maintaining the web standards.
(a) World Wide Web Consortium 15. Most of the dynamic pages deploy
(b) World Wide Water Consortium to create dynamic interac-
(c) Write Wide Web Consortium tion.
(a) server side script
(d) World Wide Web Condition (b) client side script
7. W3C (the International body for web (c) shell script
standards) stands for . (d) SQL script
(a) World Wide Web Consortium DHTML stands for .
16.
(b) World Wide Water Consortium (a) Dynamic Hyper Text Machine Language
(c) Write Wide Web Consortium (b) Drastic Hyper Text Markup Language
(d) World Wide Web Condition (c) Dynamic Hyper Text Markup Language
8. Web pages containing script to be pro- (d) Dynamic Higher Text Markup Language
cessed by the web server (in languages CSS in web scripting stands for
17.
like PHP, Perl, Python, ASP.NET, etc.) .
are said to contain side (a) Cascading System Sheet
script. (b) Crisp Style Sheet
(a) client (b) server (c) Cascading Style Set
Q. Bank [COPA Semester - 1] 105

(d) Cascading Style Sheet (a) Brian Kernighan


18. CSS helps to . (b) Tim Berners-Lee
(a) alter the colour of the document (c) Dennis Ritchie
(b) alter the font size of the document (d) James Gosling
(c) alter the default font faces of the document 29. SGML stands for .
(d) all of them (a) Standard Grand Markup Language
19. DOM stands for for . (b) Synchronized Generalized Markup Language
(a) Document Object Model (c) Standard Generalized Markup Language
(b) Different Object Model (d) Simple Generalized Markup Language
(c) Dynamic Object Model 30. DTD stands in markup language for
(d) Document Offset Model .
(a) Document Type Definition
20. The method of treating document ele- (b) Data Type Definition
ments (like input, button, etc.) as pro-
(c) Digital Type Definition
gram elements is called .
(a) Different Object Model (d) Design Type Definition
(b) Dynamic Ooutput Model 31. DDL stands for .
(c) Document Object Model (a) Data Description Libray
(d) Desktop Object Model (b) Data Description Language
(c) Data Description Liberty
21. Ajax is a side scripting system
for creating user interaction. (d) Data Description License
(a) client (b) server 32. Most of the HTML tags have a corre-
(c) right (d) left sponding closing tag, which begins with
22. Dynamic web pages provide interaction symbol.
through . (a) <! − − (b) < /
(a) input response (c) <. (d) < &nbsp;
(b) keyboard response 33. If a HTML tag does not have explicit
(c) mouse response closing tag, the tag may be closed with
(d) all of them symbol instead of a simple >
symbol.
(a) (b) . >
1.10.3 Introduction to HTML >
(c) /> (d) @ >
23. Default extension for a HTML docu-
ment is .
(a) .htm (b) .html 1.10.4 Various tags in HTML
(c) both a & b (d) none of them
24. HTML tag begins with sym- 34. HTML document is contained inside a
bol. set of tags.
(a) < (b) > (a) < HT M L > ... < /HT M L >
(c) <! − − (d) −− > (b) < HEAD > ... < /HEAD >
(c) < T IT LE > ... < /T IT LE >
25. HTML tag ends with sym-
bol. (d) < BODY > ... < /BODY >
(a) < (b) > 35. The top portion of a HTML document
(c) <! − − (d) −− > containing many meta items and script
26. HTML comment begins with functions is called .
symbol. (a) < HT M L > ... < /HT M L >
(a) < (b) > (b) < HEAD > ... < /HEAD >
(c) <! − − (d) −− > (c) < T IT LE > ... < /T IT LE >
(d) < BODY > ... < /BODY >
27. HTML comment ends with
symbol. 36. The title to be displayed at the top of
(a) < (b) > the browser window or browser tab is
(c) <! − − (d) −− > enclosed in .
(a) < HT M L > ... < /HT M L >
28. HTML was created by . (b) < HEAD > ... < /HEAD >

Prepared by: Dr.V.Nagaradjane


106 Prepared by: Dr.V.Nagaradjane

(c) < T IT LE > ... < /T IT LE > (d) < ahref = “target.htm” > ... < /a >
(d) < BODY > ... < /BODY > 44. HTML tag displays a ta-
37. The main portion of a HTML document ble without border.
is contained between tags. (a) < img src = “f ile.jpg” >
(a) < HT M L > ... < /HT M L > (b) < tableborder = 1 > ... < /table >
(b) < HEAD > ... < /HEAD > (c) < tableborder = 0 > ... < /table >
(c) < T IT LE > ... < /T IT LE > (d) < ahref = “target.htm” > ... < /a >
(d) < BODY > ... < /BODY > 45. HTML tag creates a
38. Paragraph is contained inside click-able hyper link for navigation in-
HTML tags. side the same page or between different
(a) < p > ... < /p > pages.
(b) < center > ... < /center > or < div align = (a) < img src = “f ile.jpg” >
“center” > ... < /div > (b) < tableborder = 1 > ... < /table >
(c) < div align = “lef t” > ... < /div > (c) < tableborder = 0 > ... < /table >
(d) < div align = “right” > ... < /div > (d) < ahref = “target.htm” > ... < /a >
39. Elements to be centre aligned in browser 46. HTML tag displays a ta-
display are enclosed inside ble with border thickness of 1 pixel.
HTML tags. (a) < img src = “f ile.jpg” >
(a) < p > ... < /p > (b) < table border = 1 > ... < /table >
(b) < center > ... < /center > or < div align = (c) < table border = 0 > ... < /table >
“center” > ... < /div > (d) < a href = “target.htm” > ... < /a >
(c) < div align = “lef t” > ... < /div > 47. HTML tag can control font
(d) < div align = “right” > ... < /div > face, size and colour.
40. Elements to be left aligned in browser (a) < f ont f ace = “Arial” size = “ +
display are enclosed inside 1” color = “red” > ... < /f ont >
HTML tags. (b) < H1 > ... < /H1 >
(a) < div align = “justif ied” > ... < /div > (c) < H2 > ... < /H2 >
(b) < center > ... < /center > or < div align = (d) < H3 > ... < /H3 >
“center” > ... < /div > 48. HTML tag displays headings
(c) < div align = “lef t” > ... < /div > of the largest size.
(d) < div align = “right” > ... < /div > (a) < f ont f ace = “Arial” size = “+1”color =
41. Elements to be right aligned in browser “red” > ... < /f ont >
display are enclosed inside (b) < H1 > ... < /H1 >
HTML tags. (c) < H2 > ... < /H2 >
(a) < div align = “justif ied” > ... < /div > (d) < H3 > ... < /H3 >
(b) < center > ... < /center > or < div align = 49. HTML tag displays headings
“center” > ... < /div > of the second largest size.
(c) < div align = “lef t” > ... < /div > (a) < H4 > ... < /H4 >
(d) < div align = “right” > ... < /div > (b) < H1 > ... < /H1 >
42. Elements to be justified (aligned flush (c) < H2 > ... < /H2 >
with left and right edges) in browser dis- (d) < H3 > ... < /H3 >
play are enclosed inside tags in 50. HTML tag displays headings
HTML. of the third largest size.
(a) < div align = “justif ied” > ... < /div > (a) < H4 > ... < /H4 >
(b) < center > ... < /center > or < div align = (b) < H1 > ... < /H1 >
“center” > ... < /div > (c) < H2 > ... < /H2 >
(c) < div align = “lef t” > ... < /div > (d) < H3 > ... < /H3 >
(d) < div align = “right” > ... < /div >
51. HTML tag displays headings
43. HTML tag displays an of the smallest size.
image in HTML page. (a) < H4 > ... < /H4 >
(a) < img src = “f ile.jpg” > (b) < H1 > ... < /H1 >
(b) < tableborder = 1 > ... < /table > (c) < H2 > ... < /H2 >
(c) < tableborder = 0 > ... < /table > (d) < H3 > ... < /H3 >
Q. Bank [COPA Semester - 1] 107

52. In HTML, text size represents (d) < span style = “f ont − weight : 900” >
the normal size of text. ... < /span >
(a) -4 (b) 0 among the given HTML5
59.
(c) +4 (d) +8 tags sets font weight to normal.
53. In HTML5, font tag has been (a) < span style = “f ont − weight : bold” >
. ... < /span >
(a) appreciated (b) reinstated (b) < span style = “f ont−weight : normal” >
(c) deprecated (d) beautified ... < /span >
54. In HTML5, font name can be controlled (c) < span style = “f ont − weight : 1200” >
using tag sets. ... < /span >
(a) < span style = “f ont − weight : bold” > (d) < span style = “f ont − weight : 900” >
... < /span > ... < /span >
(b) < span style = “f ont − size : 16px” > ... <
/span > Colour coding in HTML
(c) < span style = “color : red” > ... <
/span > 60. Colour can be specified using colour
(d) < span style = “f ont − f amily : name (like red, gray, blue, cyan, ma-
verdhana” > ... < /span > genta, etc.) or numeric value in
55. In HTML5, font colour can be controlled colour order.
using tag sets. (a) Red-Green-Blue
(a) < span style = “f ont − weight : bold” > (b) Blue-Green-Red
... < /span > (c) Green-Red-Blue
(b) < span style = “f ont − size : 16px” > ... < (d) Blue-Green-Blue
/span >
61. Colour code of #FF0000 stands for
(c) < span style = “color : red” > ... <
colour.
/span > (a) blue (b) green
(d) < span style = “f ont − f amily : (c) red (d) black
verdhana” > ... < /span >
62. Colour code of #00FF00 stands for
56. In HTML5, font size can be controlled colour.
using tag sets. (a) blue (b) green
(a) < span style = “f ont − weight : bold” > (c) red (d) black
... < /span >
(b) < span style = “f ont − size : 16px” > ... < 63. Colour code of #0000FF stands for
/span > colour.
(a) blue (b) green
(c) < span style = “color : red” > ... <
(c) red (d) black
/span >
(d) < span style = “f ont − f amily : 64. Colour code of #000000 stands for
verdhana” > ... < /span > colour.
(a) blue (b) green
57. among the given HTML5
(c) red (d) black
tags sets font size to 16px.
(a) < span style = “f ont − weight : bold” > 65. Colour code of #FFFFFF stands for
... < /span > colour.
(a) white (b) green
(b) < span style = “f ont − size : 16px” > ... <
(c) red (d) black
/span >
(c) < span style = “color : red” > ... < 66. In HTML, the two digit color code value
/span > ranges from 00 to in hexadec-
(d) < span style = “f ont − f amily : imal.
verdhana” > ... < /span > (a) AA (b) 11
58. among the given HTML5 (c) FF (d) CC
tags sets font weight to bold. 67. tag is used to display different
(a) < span style = “f ont − weight : bold” > HTML pages in a single window (not
... < /span > recommended for mobile viewing).
(b) < span style = “f ont−weight : normal” > (a) font (b) frameset
... < /span > (c) table (d) img
(c) < span style = “f ont − weight : 1200” >
... < /span >

Prepared by: Dr.V.Nagaradjane


108 Prepared by: Dr.V.Nagaradjane

68. Width of elements like image, table, (a) < marquee direction = “lef t” > ... <
etc. can be controlled using at- /marquee >
tribute. (b) < marquee direction = “right” > ... <
(a) width (b) height /marquee >
(c) length (d) breadth (c) < marquee direction = “up” > ... <
69. Height of elements like image, table, /marquee >
etc. can be controlled using at- (d) < marquee direction = “down” > ... <
tribute. /marquee >
(a) width (b) height 77. Text scrolling downwards may be cre-
(c) length (d) breadth ated using tag in HTML.
70. Width and height value can be specified (a) < marquee direction = “lef t” > ... <
in or in pixels. /marquee >
(a) metre (b) kilometre (b) < marquee direction = “right” > ... <
(c) percentage (d) inches /marquee >
71. HTML tag creates a break. (c) < marquee direction = “up” > ... <
(a) < center > ... < /center > /marquee >
(b) < table > ... < /table > (d) < marquee direction = “down” > ... <
(c) < img width = “80%” src = “globe.jpg” > /marquee >
(d) < br/ >
Hyperlink in HTML
72. HTML tag displays an image
named globle.jpg at 80% of the total 78. tag in HTML creates a click-
width available in the browser. able hyperlink.
(a) < center > ... < /center >
(a) < p > ... < /p >
(b) < table > ... < /table >
(b) < img src = “globe.png” >
(c) < img width = “80%” src = “globe.jpg” >
(c) < table border = 1 > ... < /table >
(d) < br/ >
(d) < a href = “page.html” > ... < /a >
73. Scrolling text may be created using
tag in HTML.
(a) < marquee > ... < /marquee > Table in HTML
(b) < span > ... < /span >
79. HTML tag displays a table
(c) < p > ... < /p >
without border.
(d) < f ont > ... < /f ont > (a) < tr > ... < /tr >
74. Text scrolling to left may be created us- (b) < th > ... < /th >
ing tag in HTML. (c) < table border = 1 > ... < /table >
(a) < marquee direction = “lef t” > ... < (d) < table border = 0 > ... < /table >
/marquee > HTML tag displays a table
80.
(b) < marquee direction = “right” > ... <
with border thickness of 1 pixel.
/marquee > (a) < tr > ... < /tr >
(c) < marquee direction = “up” > ... < (b) < th > ... < /th >
/marquee > (c) < table border = 1 > ... < /table >
(d) < marquee direction = “down” > ... <
(d) < table border = 0 > ... < /table >
/marquee >
75. Text scrolling to right may be created 81. HTML tag is used to mark
using tag in HTML. header column for a table.
(a) < tr > ... < /tr >
(a) < marquee direction = “lef t” > ... <
(b) < th > ... < /th >
/marquee >
(b) < marquee direction = “right” > ... < (c) < table border = 1 > ... < /table >
/marquee > (d) < table border = 0 > ... < /table >
(c) < marquee direction = “up” > ... < 82. HTML tag is used to mark a
/marquee > row for a table.
(d) < marquee direction = “down” > ... < (a) < tr > ... < /tr >
/marquee > (b) < th > ... < /th >
76. Text scrolling upwards may be created (c) < table border = 1 > ... < /table >
using tag in HTML. (d) < table border = 0 > ... < /table >
Q. Bank [COPA Semester - 1] 109

83. HTML tag is used to mark a 91. Input tag in HTML supports
column inside a row. attribute.
(a) < td > ... < /td > (a) type (b) value
(b) < th > ... < /th > (c) name/ID (d) all of them
(c) < table border = 1 > ... < /table > 92. among the following tags dis-
(d) < table border = 0 > ... < /table > plays a text field named address.
84. Among the following options, (a) < input type = “text” name =
HTML tag merges 3 columns to create “address” value = “” autocomplete =
a large column. “on” >
(a) < tr > ... < /tr > (b) < input type = “number” name =
(b) < td > ... < /td > “height” value = “”autocomplete =
(c) < td colspan = 3 > ... < /td > “on” >
(c) < input type = “email” name =
(d) < td rowspan = 4 > ... < /td >
“email” value = “” autocomplete =
85. Among the following options, “on” >
HTML tag merges 4 rows to create a (d) < input type = “tel” name =
large row. “phone” value = “” autocomplete =
(a) < tr > ... < /tr > “on” >
(b) < td > ... < /td > 93. among the following tags dis-
(c) < td colspan = 3 > ... < /td > plays a text field named phone.
(d) < td rowspan = 4 > ... < /td > (a) < input type = “text” name =
86. creates an ordered list. “address” value = “” autocomplete =
(a) < ul > ... < /ul > “on” >
(b) < input type = “number” name =
(b) < ol > ... < /ol > “height” value = “”autocomplete =
(c) < li > ... < /li > “on” >
(d) none of them (c) < input type = “email” name =
87. creates an unordered list. “email” value = “” autocomplete =
(a) < ul > ... < /ul > “on” >
(b) < ol > ... < /ol > (d) < input type = “tel” name =
(c) < li > ... < /li > “phone” value = “” autocomplete =
(d) none of them “on” >
94. among the following tags dis-
88. declares a list item which plays a text field named height.
may be part of ordered list or unordered (a) < input type = “text” name =
list. “address” value = “” autocomplete =
(a) < ul > ... < /ul >
“on” >
(b) < ol > ... < /ol > (b) < input type = “number” name =
(c) < li > ... < /li > “height” value = “”autocomplete =
(d) none of them “on” >
(c) < input type = “email” name =
“email” value = “” autocomplete =
1.10.5 Creating Forms with controls
“on” >
using HTML (d) < input type = “tel” name =
“phone” value = “” autocomplete =
89. HTML form controls commonly use “on” >
tag for taking form input. 95. among the following tags dis-
(a) < input > plays a text field named email.
(b) < table > ... < /table > (a) < input type = “text” name =
(c) < img > “address” value = “” autocomplete =
(d) < f orm > ... < /f orm > “on” >
90. HTML form is contained insde (b) < input type = “number” name =
tag. “height” value = “”autocomplete =
(a) < input > “on” >
(c) < input type = “email” name =
(b) < f orm > ... < /f orm >
“email” value = “” autocomplete =
(c) < img >
(d) < f orm > ... < /f orm > “on” >

Prepared by: Dr.V.Nagaradjane


110 Prepared by: Dr.V.Nagaradjane

(d) < input type = “tel” name = 106. To create number input field in HTML
“phone” value = “” autocomplete = form, attribute is used in the
“on” > input tag.
96. To display a button in HTML form, (a) month (b) number
attribute is used in the input (c) password (d) radio
tag. 107. To create password input field in HTML
(a) button (b) checkbox form, attribute is used in the
(c) color (d) date input tag.
97. To display a checkbox in HTML form, (a) month (b) number
attribute is used in the input (c) password (d) radio
tag. 108. To create radio button input field in
(a) button (b) checkbox HTML form, attribute is used
(c) color (d) date in the input tag.
98. To display a colour selection input in (a) month (b) number
HTML form, attribute is used (c) password (d) radio
in the input tag. 109. To create an input field to display num-
(a) button (b) checkbox
bers with specific start, end and step val-
(c) color (d) date
ues in HTML form, attribute
99. To display a date input in HTML form, is used in the input tag.
attribute is used in the input (a) range (b) reset
tag. (c) search (d) tel
(a) button (b) checkbox
110. To create an input field to reset all in-
(c) color (d) date
put elements of a form in HTML form,
100. To display a date and time input in attribute is used in the input
HTML form, attribute is used tag.
in the input tag. (a) range (b) reset
(a) button (b) checkbox (c) search (d) tel
(c) color (d) datetime
111. To create search field (behviour depends
101. To display a field for email input in upon server implementation) in HTML
HTML form, attribute is used form, attribute is used in the
in the input tag. input tag.
(a) email (b) file (a) range (b) reset
(c) hidden (d) image (c) search (d) tel
102. To display a file input input dialog in 112. To create field for telephone number in-
HTML form, attribute is used put in HTML form, attribute
in the input tag. is used in the input tag.
(a) email (b) file (a) range (b) reset
(c) hidden (d) image (c) search (d) tel
103. To create a hidden field in HTML form, 113. To create a field for submitting the
attribute is used in the input contents of HTML form to the server,
tag. attribute is used in the input
(a) email (b) file
tag.
(c) hidden (d) image (a) submit (b) text
104. To create an image selection tool in (c) time (d) url
HTML form, attribute is used
114. To create a text input field in HTML,
in the input tag.
(a) email (b) file attribute is used in the input
(c) hidden (d) image tag.
(a) submit (b) text
105. To create month selection field in HTML (c) time (d) url
form, attribute is used in the
115. To create a time input in HTML,
input tag.
(a) month (b) number attribute is used in the input
(c) password (d) radio tag.
Q. Bank [COPA Semester - 1] 111

(a) submit (b) text (c) Value (d) all of them


(c) time (d) url 125. Selector in CSS means .
116. To create a field for taking a web address (a) the browser
in HTML, attribute is used in (b) the tag which uses a particular CSS compo-
the input tag. nent
(a) submit (b) text (c) the property which is modified
(c) time (d) url (d) the new value assigned to the given property
117. To create a field for taking a web address 126. Property in CSS means .
in HTML, attribute is used in (a) the browser
the input tag. (b) the tag which uses a particular CSS compo-
(a) week (b) text nent
(c) time (d) url (c) the property which is modified
(d) the new value assigned to the given property
1.10.6 Concepts of CSS 127. Value in CSS means .
(a) the browser
118. CSS stands for . (b) the tag which uses a particular CSS compo-
(a) Cascading System Sheet nent
(c) the property which is modified
(b) Crisp Style Sheet
(d) the new value assigned to the given property
(c) Cascading Style Set
(d) Cascading Style Sheet 128. The format for applying CSS style to se-
lector is .
119. CSS is used to control of a (a) selector{property:value;}
HTML document. (b) value{property:selector;}
(a) content
(b) styles aspects like colour, size, background, (c) property{selector:value;}
etc. (d) selector{value:property;}
(c) server type 129. among the following CSS ele-
(d) browser type ments declares that headings shall have
120. CSS definitions are contained inside red colour.
tags. (a) ∗{color : blue; }
(a) < style > ... < /style > (b) h1{color:red;}
(b) < h1 > ... < /h1 > (c) < span class = “center bold” > ... <
(c) < table > ... < /table > /span >
(d) < f orm > ... < /f orm > (d) body{bgcolor: gray;}
121. CSS may be defined . 130. among the following CSS ele-
(a) at the header section ments declares that the entire document
(b) in a separate file will be rendered in blue colour.
(a) ∗{color : blue; }
(c) inline as an attribute to a HTML tag
(b) h1{color:red;}
(d) all of them
(c) < span class = “center bold” > ... <
122. External style sheet may be embed- /span >
ded in HTML header section using the (d) body{bgcolor: gray;}
tag.
(a) < linkrel = “stylesheet”href = 131. The method of applying CSS at-
tribute using an identifier (num-
“styleset.css” >
(b) < ahref = “styleset.css” > ber/alphanumeric) is called
(c) < imgsrc = “globe.gif ” > selector method.
(a) class (b) attribute
(d) < p > ... < /p > (c) ID (d) style
123. A CSS tag has main compo-
CSS tag among the defines
132.
nents.
(a) 1 (b) 2 blue colour for headings having ID of
(c) 3 (d) 6 blue.
(a) h1#blue {color:blue;}
124. component(s) are important (b) #black h2 {color:red;}
for marking CSS in HTML. (c) p#redpara{color:red; text-align:justified;}
(a) Selector (b) Property

Prepared by: Dr.V.Nagaradjane


112 Prepared by: Dr.V.Nagaradjane

(d) p#centerpara{color=blue; text- (d) ol > li{color : magenta; text − align =


align=center;} lef t; decoration : underline}
133. CSS tag among the defines 139. among the following child se-
red colour for all h2 tags enclosed in a lector makes all items of an unordered
block of red ID. list to have magenta colour text, left
(a) h1#blue {color:blue;} alignment and normal font style.
(b) #red h2 {color:red;} (a) body > p{color : green; text − align =
(c) p#redpara{color:red; text-align:justified;} justif ied; f ont − style : bold}
(d) p#centerpara{color=blue; text- (b) table > td{color : green; text − align =
align=center;} center; f ont − style : italic}
134. CSS tag among the makes (c) ul > li{color : magenta; text − align =
a paragraph justified and having red lef t; f ont − style : normal}
colour text. (d) ol > li{color : magenta; text − align =
(a) h1#blue {color:blue;} lef t; decoration : underline}
(b) #red h2 {color:red;} 140. among the following child se-
(c) p#redpara{color:red; text-align:justified;} lector makes all items of an ordered list
(d) p#centerpara{color=blue; text- to have red colour text, left alignment
align=center;} and underline decoration.
135. CSS tag among the makes (a) body > p{color : green; text − align =
a paragraph centre aligned and having justif ied; f ont − style : bold}
blue colour text. (b) table > td{color : green; text − align =
(a) h1#blue {color:blue;} center; f ont − style : italic}
(b) #red h2 {color:red;} (c) ul > li{color : magenta; text − align =
(c) p#redpara{color:red; text-align:justified;} lef t; f ont − style : normal}
(d) p#centerpara{color=blue; text- (d) ol > li{color : red; text − align =
align=center;} lef t; decoration : underline}
136. in CSS applies given style to
direct child elements. 1.10.7 Applying CSS to HTML
(a) Child selector
(b) ID selector 141. CSS may be applied to HTML using
(c) class selector .
(d) none of them (a) < linktype = “text/css”rel =
137. among the following child se- “stylesheet”href =
lector makes all paragraphs which are di- “sylesheetname.css” > in the header
rect children of body HTML tag to have section of HTML document
(b) declaration through class and ID selectors
green text with justified alignment and
(c) inline application of styles
bold style.
(a) body > p{color : green; text − align = (d) all of them
justif ied; f ont − style : bold}
(b) table > td{color : green; text − align = 1.10.8 Open source CMS
center; f ont − style : italic}
(c) ul > li{color : magenta; text − align = 142. CMS in web content stands for
lef t; f ont − style : normal} .
(d) ol > li{color : magenta; text − align = (a) Content Maintenance System
lef t; decoration : underline} (b) Content Management Symbol
138. among the following child se- (c) Content Management System
lector makes all columns in a table to (d) Client Management System
have green colour text, centre alignment 143. Open source stands for software for
and italic style. which .
(a) body > p{color : green; text − align = (a) source code is available
justif ied; f ont − style : bold} (b) source code is not available
(b) table > td{color : green; text − align = (c) source code is lost
center; f ont − style : italic} (d) source code is bugged
(c) ul > li{color : magenta; text − align =
lef t; f ont − style : normal}
Q. Bank [COPA Semester - 1] 113

144. Joomla, wordpress, Apache Roller, (b) web page editing


OpenCMS, AmetysCMS, Dot CMS, (c) both a & b
Drupal, Django CMS, etc. are some of (d) none of them
the software packages. 151. Development work on KompoZer
(a) professional/ paid stopped in the year .
(b) escrow source (a) 2017 (b) 2010
(c) none of them (c) 2015 (d) 2014
(d) open source
FrontPage
Joomla
152. Frontpage is a tool.
145. Joomla is a Content Management Sys- (a) web page creation
tem based on scripting lan- (b) web page editing
guage. (c) both a & b
(a) Python (b) PHP
(d) none of them
(c) Ruby (d) Perl
153. Frontpage was part of Microsoft
146. Joomla requires creation of a package.
in MySQL database for effective CMS (a) Office
with data support. (b) Visual Studio
(a) database
(c) Windows
(b) user
(d) none of them
(c) both database and user
(d) none of them 154. Frontpage was discontinued from Mi-
crosoft office version .
147. To begin working with Joomla, the con- (a) 1997 (b) 2001
tents of the zip file need to be . (c) 2003 (d) 2007
(a) deleted
(b) extracted to Downloads folder
(c) copied to the web server root directory (ht- Answers (1682 - 1835)
docs/ html)
(d) divided into several pieces 1. (a) 2. (d) 3. (c) 4. (b)
5. (b) 6. (a) 7. (a) 8. (b)
Wordpress 9. (a) 10. (c) 11. (d) 12. (c)
13. (d) 14. (a) 15. (b) 16. (c)
148. Wordpress files need to be copied to 17. (d) 18. (d) 19. (a) 20. (c)
to start creating a website. 21. (b) 22. (d) 23. (c) 24. (a)
(a) Documents 25. (b) 26. (c) 27. (d) 28. (b)
(b) root directory of the web server 29. (c) 30. (a) 31. (a) 32. (b)
(c) Downloads 33. (c) 34. (a) 35. (b) 36. (c)
(d) Pictures 37. (d) 38. (a) 39. (b) 40. (c)
149. After copying Wordpress, the URL 41. (d) 42. (a) 43. (a) 44. (c)
< wordpress root >/ 45. (d) 46. (b) 47. (a) 48. (b)
should be opened to start the configu- 49. (c) 50. (d) 51. (a) 52. (b)
ration process. 53. (c) 54. (d) 55. (c) 56. (b)
(a) index.html 57. (b) 58. (a) 59. (b) 60. (a)
(b) index.php 61. (c) 62. (b) 63. (a) 64. (d)
(c) readme.html 65. (a) 66. (c) 67. (b) 68. (a)
(d) wp-admin/install.php 69. (b) 70. (c) 71. (d) 72. (c)
73. (a) 74. (a) 75. (b) 76. (c)
1.10.9 Web authoring tools 77. (d) 78. (d) 79. (d) 80. (c)
81. (b) 82. (a) 83. (a) 84. (c)
Kompozer 85. (d) 86. (b) 87. (a) 88. (c)
89. (a) 90. (b) 91. (d) 92. (a)
150. KompoZer is a tool.
(a) web page creation 93. (d) 94. (b) 95. (c) 96. (a)

Prepared by: Dr.V.Nagaradjane


114 Prepared by: Dr.V.Nagaradjane

97. (b) 98. (c) 99. (d) 100. (d) 129. (b) 130. (a) 131. (c) 132. (a)
101. (a) 102. (b) 103. (c) 104. (d) 133. (a) 134. (c) 135. (d) 136. (a)
105. (a) 106. (b) 107. (c) 108. (d) 137. (a) 138. (b) 139. (c) 140. (d)
109. (a) 110. (b) 111. (c) 112. (d) 141. (d) 142. (c) 143. (a) 144. (d)
113. (a) 114. (a) 115. (c) 116. (d) 145. (b) 146. (c) 147. (c) 148. (b)
117. (a) 118. (d) 119. (b) 120. (a) 149. (d) 150. (c) 151. (b) 152. (c)
121. (d) 122. (a) 123. (c) 124. (d) 153. (a) 154. (d)
125. (b) 126. (c) 127. (d) 128. (a)

S-ar putea să vă placă și