JavaScript isn't enabled in your browser, so this file can't be opened. Enable and reload.
YASH COMPUTER EDUCATION
CCC Exam 2 (50)
Sign in to Google
to save your progress.
Learn more
1. Restarting a Computer already started is called?
1 point
Warm booting
Cold booting
Login off
shut down
Clear selection
2. Which topology is called linear topology?
1 point
I. Bus
II. Tree
III. Star
IV. Mesh
Clear selection
3. Microprocessor is often called a CPU
1 point
True
False
Clear selection
4. ................... are graphical objects used to represent commonly used application.
1 point
GUI
Drivers
Windows NT
Icons
Clear selection
5. GUI Stands For.................
1 point
Graphical User Interface
Greater User Interface
Raphical Union Interface
Graphical User Interest
Clear selection
6. ................... are graphical objects used to represent commonly used application.
1 point
GUI
Drivers
Windows NT
Icons
Clear selection
7. The operating system provides the user interface, controls the computers resources and runs programs.
1 point
True
False
Clear selection
8. Provides the user interface, Controls the Computers resources and runs programs
1 point
Drivers
Operating System
Desktop
None of these
Clear selection
9. Starting or restarting a computer is called ............. the system.
1 point
Booting
Coping
Pasting
Multitasking
Clear selection
10. Starting or restarting a computer is called multitasking the system.
1 point
True
False
Clear selection
11. Starting or restarting a computer is called booting the system.
1 point
True
False
Clear selection
12. ............. are used to store data and programs.
1 point
Folder
File
Recycle Bin
None of these
Clear selection
13. ............. are used to store data and programs.
1 point
Folder
File
Recycle Bin
None of these
Clear selection
14. The __________ Displays at list of commands that can be used to gain access to information, change hardware settings, find information stored in the, get online help and shut down the computer.
1 point
GUI
Desktop
Icon
Start Button
Clear selection
15. The operating system provides the user interface, controls the computers resources and runs programs.
1 point
True
False
Clear selection
16. Starting or restarting a computer is called ............. the system.
1 point
Booting
Coping
Pasting
Multitasking
Clear selection
17. Starting or restarting a computer is called multitasking the system.
1 point
True
False
Clear selection
18. Starting or restarting a computer is called booting the system.
1 point
True
False
Clear selection
19. ............. are used to store data and programs.
1 point
Folder
File
Recycle Bin
None of these
Clear selection
20. The __________ Displays at list of commands that can be used to gain access to information, change hardware settings, find information stored in the, get online help and shut down the computer.
1 point
GUI
Desktop
Icon
Start Button
Clear selection
21. A __________ is a concentric ring.
1 point
Track
Sectors
Round
None of these
Clear selection
22. Disk Defragmenter is a utility program that locates and eliminates unnecessary fragments and rearranges files and unused disk space to optimize operations.
1 point
True
False
Clear selection
23. Capacity of a storage device is usually measured in terms of bytes.
1 point
True
False
Clear selection
24. Which of the following is the primary memory?
1 point
RAM
CD
Floppy
Hard Disk
Clear selection
25. Which of the following is the unit of Computer memory?
1 point
Kilogram
Kilo Bytes
Meter
Celsius
Clear selection
26. __________ is also known as the system cabinet or chassis.
1 point
System Unit
Monitor
Keyboard
None of these
Clear selection
27. Which of the following components is used to store data?
1 point
CPU
Memory
Input Device
Output Device
Clear selection
28. Each 0 and 1 in the binary numbering system is called a bit.
1 point
True
False
Clear selection
29. Eight bits make up a byte.
1 point
True
False
Clear selection
30. Which of the following is a data processing unit?
1 point
CPU
RAM
Hard Disk
Floppy
Clear selection
31. Notebook system units are often called as _________
1 point
PDA
Laptop
Desktop
None of these
Clear selection
32. The process of encoding messages in such a way that only authorised users can read it is referred to as
1 point
I. Decryption
II. Encryption
III. Privacy
IV. Message Secrecy
Clear selection
33. Which topology has a host computer
1 point
I. बस
II. Star
III. Tree
IV. Mesh
Clear selection
34. Which of the following devices is responsible for forwarding data packets between computer networks ?
1 point
I. Repeater
II. Hub
III. Modem
IV. Routers
Clear selection
35. Which is called circular network
1 point
I. बस
II. Star
III. Ring
IV. Mesh
Clear selection
36. Which of the following is a standard network protocol used to transfer the files between client and a server ?
1 point
I. SMTP
II. FTP
III. IP
IV. STTP
Clear selection
37. Which of the following is called completely connected network
1 point
I. Ring
II. Tree
III. Mesh
IV. Star
Clear selection
38. What topology is the root node related to
1 point
I. Mesh
II. Star
III. Ring
IV. Tree
Clear selection
39. SMTP connections secured by SSL are known as
1 point
i. SMTPS
ii. SSMTP
iii. SNMP
iv. SSLM
Clear selection
40. In tree topology what is called the other node connecting to the root node?
1 point
I. Child node
II. Last node
III. SECOND node
IV. Nota
Clear selection
41. What is the number of buttons in the mouse?
1 point
2
3
4
2, 3 both
Clear selection
42. What is the full name of PNG?
1 point
Portable Network Graphics
Portable Net Graphics
Portable Network Group
None of these
Clear selection
43. ................. Kilobytes make 1 megabyte?
1 point
256
1024
128
512
Clear selection
44. Blink (nap) on computer monitor is called?
1 point
Pointer
Cursor
Track ball
Mouse
Clear selection
45. The size of virtual memory depends on..............
1 point
on the database
on the address line
on disk space
All of the above
Clear selection
46. Computer CPU has three units Memory, Control and .............. ?
1 point
Arithmetic and Logic
Input-Outpur
Microprocessor
None
Clear selection
47. What is the full Form of ENIAC?
1 point
Electronic Numerical Integrator and Coder
Electronic Numerical Integrator and Computer
Electronic Numerical Interpreter and Comutger
Electronic Numerical Isolator and Compuer
Clear selection
48. What is the Meaning of firmware
1 point
Hardware software
application software
system software
All of the Above
Clear selection
49. Who was used in the fifth generation of computers?
1 point
IC
Transistor
ULSI
None of these
Clear selection
50. ____________ programs that guard your computer system against viruses or other damaging Programs.
1 point
Backup
Antivirus
Uninstall
None of these
Clear selection
Submit
Clear form
This content is neither created nor endorsed by Google. -
Terms of Service
-
Privacy Policy
Does this form look suspicious?
Report
Forms
Help and feedback
Contact form owner
Help Forms improve
Report