Q1. Which among the following is the extension of font file?
(a) .ff
(b) .fnf
(c) .fnt
(d) .font
(e) .fn
Q2. Which among the given options in Microsoft PowerPoint will allow you to select more than one slide in a presentation?
(a) Alt + Click each slide
(b) Shift + drag each slide
(c) Shift + Click each slide
(d) Ctrl + Click each slide
(e) Alt + Drag each slide
Q3. What is the smallest and largest font size available in Font Size tool of MS World on formatting toolbar?
(a) 8 and 72
(b) 8 and 68
(c) 6 and 72
(d) 6 and 68
(e) 9 and 90
Q4. A character that is raised and smaller above the baseline is known as _______________.
(a) Raised
(b) Outlined
(c) Capscript
(d) Superscript
(e) Highscript
Q5. In MS-Word, a ruler can help to perform which of the following actions?
(a) to set tabs
(b) to set indents
(c) to change page margins
(d) All of the above
(e) None of the above
Q6. Which key should be pressed to start a new paragraph in MS-Word?
(a) Down Cursor Key
(b) Enter Key
(c) Shift + Enter
(d) Ctrl + Enter
(e) Ctrl + N
Q7 . Which bar is usually located below that Title Bar that provides categorised options?
(a) Menu bar
(b) Status Bar
(c) Tool bar
(d) Scroll bar
(e) None of the above
Q8. What is the maximum zoom percentage in Microsoft PowerPoint?
(a) 100%
(b) 200%
(c) 400%
(d) 500%
(e) None of these
Q9. Which among the following option does DBMS helps to achieve?
(a) Data independence
(b) More redundancy
(c) Centralised manner to control of data
(d) Both (a) and (c)
(e) None of the above
Q10. What is Telnet?
(a) Network or Telephones
(b) Television Network
(c) Remote Login
(d) All of these
(e) None of these
Q11. What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?
(a) CMOS
(b) RAM
(c) DRAM
(d) CPU
(e) None of these
Q12. Which of the following is a machine independent program?
(a) High level language
(b) Low level language
(c) Assembly language
(d) Machine language
(e) None of these
Q13. Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
(a) program thievery
(b) data snatching
(c) software piracy
(d) program looting
(e) data looting
Q14. In first generation of computers, they used ______.
(a) batch processing
(b) multithreading
(c) multiprogramming
(d) networking
(e) All of the above
Q15. Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
(a) hacker
(b) analyst
(c) instant messenger
(d) programmer
(e) spammer