REASONING TEST
-
-
Q.1 To move to the bottom of a document, press.
-
Q.3Which of the following controls the process of interaction between the user and the operating system?
-
Q.4 A________________ is a combination of hardware and software that facilitates the sharing of information between computing devices.
-
Q.5 Coded entries which are used to gain access to a computer system are called
-
Q.6 To view information on the web you must have a-
-
Q.7 Which of the following commands is given to reboot the computer-
-
Q.8Which of the following is a part of the Central Processing Unit
-
Q.10 The Word FTP stands for
-
Q.11 Memory which forgets everything when you switch off the power is known as
-
Q.12The linking of computers with a communication system is called
-
Q.13Data going into the computer is called
-
Q.14Which of the following refers to a small, single-site network?
-
Q.16 A collection of program that controls how your computer system runs and processes information is called
-
Q.17 Unwanted repetitious messages, such as unsolicited bulk e-mail is known as
-
Q.19Which of the following are input devices.
-
Q.20 Examples of output devices are
-
Q.21 Which of the following is also known as brain of computer
-
Q.24 The device used to carry digital data on analog lines is called
-
Q.26 Which of the following does not store data permanently?
-
Q.27 A modem is connected to
-
Q.28 Which of the following can be used to store a large number of files in a small amount of storage space?
-
Q.29 In a computer, most processing takes place in
-
Q.30Which of the following is not a storage medium?
-
Q.31Which of the following is the hardware and not the software
-
Q.32The ALU performs .......... operations.
-
Q.33 Excel is a program that is used to prepare a
-
Q.34A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is-
-
Q.35Which of the following can be used to select the entire document?
-
Q.36Web site's main page is called its-
-
Q.37 A person who used his or her expertise to gain access to other people Computers to get information illegally or do damage is a-
-
Q.38 The process of transferring files from a computer on the Internet to your computer is called
-
Q.39………………..is the process of dividing the disk into tracks and sectors.
My results will appear here