0

Computer Applications

Description: all
Number of Questions: 15
Created by:
Tags: all Computer Knowledge
Attempted 0/15 Correct 0 Score 0

Which of the following shortcut keys is used to remove all character formats?

  1. Alt + Shift + Tab

  2. Spacebar or enter

  3. Alt + Tab

  4. Ctrl + spacebar

  5. Shift + Tab


Correct Option: D
Explanation:

Yes,  

Ctrl+ spacebar operation will remove all the character formats. 

What type of data does WAVE file contain?

  1. Video

  2. Audio

  3. Images

  4. Text

  5. None of the above


Correct Option: B
Explanation:

Yes it is correct choice. The data in the audio files are in the form of WAVE.  WAVE is an audio format used to store sound data. It is is similar to the AIFF format, but is based on the Resource Interchange File Format (RIFF), a container format designed to store data in "chunks."

What is the purpose of software quality assurance?

  1. Error prevention

  2. Error detection

  3. Error correction

  4. Either 1 or 3

  5. All of the above


Correct Option: E
Explanation:

Yes, this is the correct answer. Software quality assurance (SQA) involves error detection , error correction and error prevention. 

Which of the following is a type of page orientation?

  1. Landscape

  2. Portait

  3. Gutter

  4. Both 1 and 2

  5. None of the above


Correct Option: D
Explanation:

Yes,  this is correct choice. As landscape and portrait are the types of page oreintation.

Which type of image formats do not use a type of media compression?

  1. GIF

  2. BMP

  3. JPEG

  4. PNG

  5. None of the above


Correct Option: B
Explanation:

BMP is not a type of media compression. Like file compression, the goal of media compression is to reduce file size and save disk space. Most popular image formats use some type of compression. Three of the most common include JPEG, GIF, and PNG.

The paragraph mark (¶) is a formatting mark that indicates where the _____ was pressed.

  1. spacebar

  2. shift

  3. tab key

  4. enter key

  5. alt key


Correct Option: C
Explanation:

Yes it is the correct choice. The paragraph mark (¶) is a formatting mark that indicates where the tab was pressed. It appears in the standard tool bar.

Which of the following provides information about open document, current settings and operations in progress?

  1. Tool bar

  2. Command bar

  3. Status bar

  4. Task pane

  5. None of the above


Correct Option: C
Explanation:

Yes, it is the correct choice. Status bar provides information about open document, current settings and operations in progress.

In which topology are all the computers and devices (nodes) on the network connected to central device?

  1. Bus

  2. Ring

  3. Star

  4. Tree

  5. Both 1 and 3


Correct Option: E
Explanation:

Yes,  in bus and star architecture all the nodes are connected to the central device. Some times it is called as hub or main system.

Which of the following statements about bus topology is false?

  1. It is suitable for small networks.

  2. It requires more number of cables.

  3. In bus topology, limited number of stations can be connected.

  4. It is cheap.

  5. It is easy to handle.


Correct Option: B
Explanation:

No bus topology requires only single cable. So this choice is incorrect .

What should we take care of to make secure access of the program?

  1. Strong authentication controls

  2. Access controls

  3. Error checking controls

  4. Do risk analysis

  5. All of the above


Correct Option: E
Explanation:

Yes, it is  correct.

How many bytes are there in a terabyte?

  1. 108

  2. 1012

  3. 1010

  4. 1011

  5. None of the above


Correct Option: B
Explanation:

Yes,  it is  correct.  I terabyte = 1012

In 2 tier architecture, the client interacts with a ___.

  1. server

  2. network

  3. ethernet

  4. coaxial cables

  5. other clients


Correct Option: A
Explanation:

Yes, it is correct choice. In 2 tier architecture, the client interacts with a server.

Which of the following is/are required by efficient system requirement analysis?

  1. Reverse engineering

  2. Joint application design

  3. Traditional system development life cycle

  4. Either 1 or 3

  5. All of the above


Correct Option: E
Explanation:

Yes, all three choices deal with system analysis.

Various kinds of email threats are examples of ____

  1. spam

  2. trojan horse

  3. international tampering

  4. junk mail

  5. bug


Correct Option: A
Explanation:

Yes, it is correct choice. Spam is a threat email .

Which of the following makes network secure?

  1. Error checking tools

  2. Encryption

  3. Network interface card

  4. Static keys

  5. Strong authentication controls


Correct Option: B
Explanation:

Yes, it is correct.. Encryption is the coding or scrambling of information,  so that it can only be decoded and read by someone who has the correct decoding key. Encryption is used in  secure Web sites as well as other mediums of data transfer.

- Hide questions