Page 1 :
Multiple Choice Questions, COPA - Semester-1, Dr.V.Nagaradjane, December 27, 2017
Page 2 :
ii, , Prepared by: Dr.V.Nagaradjane
Page 3 :
Contents, 1 Semester 1, 1.1 Basic hardware and software . . . . . . . . . . . . . . ., 1.1.1 History of computers . . . . . . . . . . . . . . ., 1.1.2 Types of computer . . . . . . . . . . . . . . . ., 1.1.3 Advantages of computers . . . . . . . . . . . ., 1.1.4 Application of computers . . . . . . . . . . . ., 1.1.5 Concept of hardware and software . . . . . . . ., 1.1.6 Computer hardware . . . . . . . . . . . . . . ., 1.1.7 Output devices . . . . . . . . . . . . . . . . . ., 1.1.8 Central Processing Unit (CPU) . . . . . . . . ., 1.1.9 Computer software . . . . . . . . . . . . . . . ., 1.2 Computer Administration . . . . . . . . . . . . . . . ., 1.2.1 Booting error signals . . . . . . . . . . . . . . ., 1.2.2 BIOS settings . . . . . . . . . . . . . . . . . ., 1.2.3 Installation of windows operating system . . . ., 1.2.4 Common computer problems and solutions . . ., 1.3 MS DOS and Linux . . . . . . . . . . . . . . . . . . ., 1.3.1 MS DOS . . . . . . . . . . . . . . . . . . . . ., 1.3.2 Internal DOS commands . . . . . . . . . . . . ., 1.3.3 External DOS Commands . . . . . . . . . . . ., 1.3.4 Output redirection in MS DOS . . . . . . . . ., 1.3.5 Wild cards in MS DOS . . . . . . . . . . . . ., 1.3.6 Open Source Software (OSS) . . . . . . . . . ., 1.3.7 Linux shell commands . . . . . . . . . . . . . ., 1.3.8 Special characters in Linux . . . . . . . . . . ., 1.4 MS Word . . . . . . . . . . . . . . . . . . . . . . . . ., 1.4.1 Introduction to various application in MS Office, 1.4.2 Features of MS Word . . . . . . . . . . . . . ., 1.4.3 Office button in MS Word . . . . . . . . . . . ., 1.4.4 Menus and toolbars in MS Word . . . . . . . ., 1.4.5 Creating & saving a document in MS Word . . ., 1.4.6 Inserting objects in MS Word . . . . . . . . . ., 1.4.7 Inserting Macros in MS Word . . . . . . . . . ., 1.4.8 Creating mail merge in MS Word . . . . . . . ., 1.4.9 Creating templates in MS Word . . . . . . . . ., 1.4.10 Page setup & printing in MS Word . . . . . . ., 1.5 MS Excel . . . . . . . . . . . . . . . . . . . . . . . . ., 1.5.1 Data types in MS Excel . . . . . . . . . . . . ., 1.5.2 Cell referencing . . . . . . . . . . . . . . . . ., 1.5.3 Categories of functions in MS Excel . . . . . . ., 1.5.4 Sorting in MS Excel . . . . . . . . . . . . . . ., 1.5.5 Filtering in MS Excel . . . . . . . . . . . . . ., iii, , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , 1, 1, 1, 3, 4, 5, 5, 5, 8, 10, 16, 24, 25, 25, 26, 26, 28, 28, 28, 30, 32, 32, 32, 33, 37, 39, 39, 39, 40, 40, 49, 51, 51, 52, 53, 53, 56, 56, 57, 57, 64, 65
Page 4 :
iv, , Prepared by: Dr.V.Nagaradjane, , 1.6, , 1.7, , 1.8, , 1.9, , 1.5.6 Validation in MS Excel . . . . . . . . . . . . . . . . ., 1.5.7 Charting in MS Excel . . . . . . . . . . . . . . . . ., 1.5.8 Data tables in MS Excel . . . . . . . . . . . . . . . ., 1.5.9 Pivot table . . . . . . . . . . . . . . . . . . . . . . ., 1.5.10 Goal seek in MS Excel . . . . . . . . . . . . . . . . ., 1.5.11 Scenarios in MS Excel . . . . . . . . . . . . . . . . ., Powerpoint . . . . . . . . . . . . . . . . . . . . . . . . . . ., 1.6.1 Introduction to PowerPoint . . . . . . . . . . . . . ., 1.6.2 Advantages of Powerpoint . . . . . . . . . . . . . . ., 1.6.3 Creating Slide Shows . . . . . . . . . . . . . . . . . ., 1.6.4 Fine tuning the presentation . . . . . . . . . . . . . ., 1.6.5 Good presentation techniques . . . . . . . . . . . . ., OpenOffice . . . . . . . . . . . . . . . . . . . . . . . . . . ., 1.7.1 Introduction to Open Office . . . . . . . . . . . . . ., 1.7.2 Image properties . . . . . . . . . . . . . . . . . . . ., 1.7.3 Image types . . . . . . . . . . . . . . . . . . . . . ., 1.7.4 Editing of images . . . . . . . . . . . . . . . . . . ., Database Management Systems . . . . . . . . . . . . . . . ., 1.8.1 Data, Information and Database . . . . . . . . . . . ., 1.8.2 Overview of popular databases systems . . . . . . . ., 1.8.3 Rules for designing good tables . . . . . . . . . . . ., 1.8.4 Integrity rules and constraints in a table . . . . . . . ., 1.8.5 Relationships in tables . . . . . . . . . . . . . . . . ., 1.8.6 Introduction to various types of Queries and their uses, 1.8.7 Designing Access Reports and Forms . . . . . . . . ., 1.8.8 Macros in MS Access . . . . . . . . . . . . . . . . ., Networking . . . . . . . . . . . . . . . . . . . . . . . . . . ., 1.9.1 Computer Networks, Necessity and Advantages . . . ., 1.9.2 Client Server and peer to Peer networking concepts ., 1.9.3 Concept of Proxy Server and proxy firewall server . . ., 1.9.4 Network topologies . . . . . . . . . . . . . . . . . . ., 1.9.5 Network components . . . . . . . . . . . . . . . . . ., 1.9.6 Network Cables . . . . . . . . . . . . . . . . . . . ., 1.9.7 Wireless networks . . . . . . . . . . . . . . . . . . ., 1.9.8 Bluetooth technology . . . . . . . . . . . . . . . . ., 1.9.9 OSI 7 Layer Model . . . . . . . . . . . . . . . . . . ., 1.9.10 Various Network protocols . . . . . . . . . . . . . . ., 1.9.11 Logical and Physical Addresses . . . . . . . . . . . ., 1.9.12 Classes of Networks . . . . . . . . . . . . . . . . . ., 1.9.13 Network Security & Firewall . . . . . . . . . . . . . ., 1.9.14 DHCP Server . . . . . . . . . . . . . . . . . . . . . ., 1.9.15 Internet . . . . . . . . . . . . . . . . . . . . . . . . ., 1.9.16 Introduction to the Internet . . . . . . . . . . . . . ., 1.9.17 Introduction to WWW . . . . . . . . . . . . . . . . ., 1.9.18 Web Browsers . . . . . . . . . . . . . . . . . . . . ., 1.9.19 Internet servers . . . . . . . . . . . . . . . . . . . . ., 1.9.20 Search engines . . . . . . . . . . . . . . . . . . . . ., 1.9.21 Domain naming Systems . . . . . . . . . . . . . . . ., 1.9.22 E-mail . . . . . . . . . . . . . . . . . . . . . . . . ., 1.9.23 Video chatting tools . . . . . . . . . . . . . . . . . ., 1.9.24 VOIP . . . . . . . . . . . . . . . . . . . . . . . . . ., 1.9.25 Social Media . . . . . . . . . . . . . . . . . . . . . ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., ., , 65, 65, 66, 66, 67, 67, 69, 69, 69, 69, 70, 71, 73, 73, 73, 74, 75, 77, 77, 77, 80, 81, 81, 82, 83, 85, 86, 86, 86, 87, 87, 88, 89, 89, 90, 90, 91, 94, 94, 94, 95, 95, 95, 96, 96, 97, 97, 97, 98, 99, 100, 100
Page 5 :
CONTENTS, 1.9.26 Cloud storage . . . . . . . . . . . . . . ., 1.9.27 Internet Security . . . . . . . . . . . . . ., 1.10 Web Design . . . . . . . . . . . . . . . . . . . ., 1.10.1 Web server . . . . . . . . . . . . . . . . ., 1.10.2 Static and Dynamic Web pages . . . . . ., 1.10.3 Introduction to HTML . . . . . . . . . . ., 1.10.4 Various tags in HTML . . . . . . . . . . ., 1.10.5 Creating Forms with controls using HTML, 1.10.6 Concepts of CSS . . . . . . . . . . . . . ., 1.10.7 Applying CSS to HTML . . . . . . . . . ., 1.10.8 Open source CMS . . . . . . . . . . . . ., 1.10.9 Web authoring tools . . . . . . . . . . . ., , Prepared by: Dr.V.Nagaradjane, , v, ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , ., ., ., ., ., ., ., ., ., ., ., ., , 100, 101, 104, 104, 104, 105, 105, 109, 111, 112, 112, 113
Page 6 :
vi, , Prepared by: Dr.V.Nagaradjane
Page 7 :
Chapter 1, Semester 1, 1.1, , Basic hardware and software, , (a) punched card, (c) hard disk, 8., , 1.1.1, 1., (a), (b), (c), (d), 2., (a), (b), (c), (d), 3., (a), (b), (c), (d), 4., (a), (b), (c), (d), 5., (a), (b), (c), (d), 6., (a), (b), (c), (d), 7., , History of computers, , (a), (b), (c), (d), , Logarithm was invented by, ., John Napier, Edmund Gunter, Blaise Pascal, Charles Babbage, Mechanical calculator was invented by, ., John Napier, Edmund Gunter, Blaise Pascal, Charles Babbage, Slide rule was invented by, ., John Napier, Edmund Gunter, Blaise Pascal, Charles Babbage, First general purpose computer was invented by, ., John Napier, Edmund Gunter, Blaise Pascal, Charles Babbage, The first computer was invented by, Charles Babbage was called, ., slide rule, difference engine, ENIAC, calculator, is called father of modern, computers., John Napier, Edmund Gunter, Blaise Pascal, Charles Babbage, Difference engine used, for input., , 9., , (a), (b), (c), (d), , (b) DVD, (d) floppy disk, , Difference engine provided its output, through, ., printer, curve plotter, card punching machine/ bell, all of them, The computer which worked on continuously changing quantities (like electricity, water flow, etc.) for input were, ., called, ENIAC, logarithm, analog computer, mainframe computer, , 10. Analog computer was invented by, ., (a) John Napier, (b) Sir William Thomson, (c) Blaise Pascal, (d) Charles Babbage, 11. Computers like Colossus, were used for, German military communication during World War II., (a) decrypting, (b) scrambling, (c) randomizing, (d) encrypting, 12. Theoretical definition of a general, purpose computer was provided by, ., (a) Allen Turing, (b) John Napier, (c) Blaise Pascal, (d) Edmund Gunter, 13. The first general purpose computer,, which fulfilled Turing’s definition of a, general purpose computing machine was, ., (a) slide rule, (b) ENIAC, (c) logarithm, (d) Colossus, 14. The first generation computer was called, ., 1
Page 8 :
2, , Prepared by: Dr.V.Nagaradjane, (a) slide rule, (c) logarithm, , (b) ENIAC, (d) Colossus, , 15. First generation computer (named, ENIAC) was designed and fabricated by, ., (a) John Napier, (b) Endmund Gunter, (c) Blaise Pascal, (d) J.P. Eckert & J.W. Mauchy, 16. First generation computer (named, ENIAC) was designed and fabricated at, ., (a) University of Pensylvenia, USA, (b) University College, London, (c) University of California, Berkeley, USA, (d) Cambridge University, UK, 17. First generation computer (named, ENIAC) was created in the year, ., (a) 1945, (b) 1959, (c) 1965, (d) 1971, 18. First generation computer (named, technology for, ENIAC) used, processing data., (a) transistor, (b) Integrated Circuit (IC), (c) vacuum tube, (d) Very Large Scale Integration (VLSI), 19. First generation computer, ENIAC) used more than, electric power., (a) 200, (b) 1000, (c) 2000, (d) 3000, , (named, kW of, , 20. First generation, ENIAC) used, (a) punched card, (b) paper tape, (c) magnetic tape, (d) all of them, , computer (named, for input., , 21. First generation, ENIAC) used, (a) punched card, (b) paper tape, (c) magnetic tape, (d) all of them, , computer (named, for output., , 22., , (a), (b), (c), (d), , 23. Second generation computer was created in the year, ., (a) 1945, (b) 1959, (c) 1965, (d) 1971, 24. Second, (a), (b), (c), (d), , data., transistor, Integrated Circuit (IC), vacuum tube, Very Large Scale Integration (VLSI), , 25. Second, (a), (b), (c), (d), , generation computer used, technology for processing, , generation computer, for main memory., , DVD, magnetic core, hard disk, CD, , 26. Second, (a), (b), (c), (d), , generation computer, for input., magnetic disk, magnetic tape, both a & b, neither a nor b, , 27. Second, (a), (b), (c), (d), 28., (a), (b), (c), (d), , used, , generation computer, for output., magnetic disk, magnetic tape, both a & b, neither a nor b, , used, , used, , language was used to program second generation computer., FORTRAN, COBOL, both a & b, neither a nor b, , 29. Third generation computer was created, ., in the year, (a) 1945, (b) 1959, (c) 1965, (d) 1971, , language was used to program first generation computer (named, ENIAC)., C, machine language, C++, Java, , 30. Third, (a), (b), (c), (d), , data., transistor, Integrated Circuit (IC), vacuum tube, Very Large Scale Integration (VLSI), , 31. Third, (a), (b), (c), (d), , generation computer used, technology for processing, , generation computer, for input., magnetic disk, magnetic tape, keyboard, all of them, , used
Page 9 :
Q. Bank [COPA Semester - 1], 32. Third, (a), (b), (c), (d), 33., (a), (b), (c), (d), , generation computer, for output., magnetic disk, magnetic tape, monitor, all of them, , 3, used, , language was used to program third generation computer., FORTRAN-II to IV,COBOL, BASIC,PASCAL, PL/1, ALGOL-60, all of them, , 34. Fourth generation computer was created, in the year, ., (a) 1959, (b) 1965, (c) 1971, (d) 1980, 35. Fourth, (a), (b), (c), (d), , generation computer used, technology for processing, , data., Integrated Circuit (IC), vacuum tube, Very Large Scale Integration (VLSI), Ultra Large Scale Integration (ULSI), , 36. Fourth, , generation computer, for input., (a) magnetic disk, (b) magnetic tape, (c) keyboard, (d) all of them, 37., , (a), (b), (c), (d), , used, , language was created during, the advent of fourth generation computers., C, C++, both a & b, neither a nor b, , 38. In, , fourth, , generation computers,, were used for secondary, storage of data., (a) floppy disk, (b) hard disk, (c) tape drive, (d) all of them, generation computers, first earned the name of Personal Computer (PC)., (a) first, (b) second, (c) third, (d) fourth, 39., , 40. Productivity tools like Wordstar, Lotus,, DBASE, FOXPRO, etc. flourished during the era of, generaton, computers., (a) first, (b) second, (c) third, (d) fourth, Prepared by: Dr.V.Nagaradjane, , 41. Internet was created during the era of, generation compuers., (a) second, (b) third, (c) fourth, (d) fifth, 42. Fifth generation computer was created, in the year, ., (a) 1959, (b) 1965, (c) 1971, (d) 1980, 43. Fifth generation computer used, technology for processing, data., (a) Integrated Circuit (IC), (b) vacuum tube, (c) Very Large Scale Integration (VLSI), (d) Ultra Large Scale Integration (ULSI), 44. Fifth generation computer used, for input., (a) mouse, (b) keyboard, (c) scanner/light pen, (d) all of them, language created during the, 45., advent of fifth generation computers., (a) Java, (b) C#, (c) both a & b, (d) neither a nor b, fifth, generation, computers,, 46. In, were used for secondary, storage of data., (a) floppy disk, (b) hard disk, (c) CD/ DVD drive, (d) all of them, 47. Several new forms of personal computer,, viz., laptop, notebook, ultrabook, tablet, PC, smartphones, Chromebook, Raspberry PI, were created during the era of, ., (a) second, (b) third, (c) fourth, (d) fifth, , 1.1.2, , Types of computer, , 48. Personal computer is otherwise called, ., (a) micro-computer, (b) desktop, (c) both a & b, (d) neither a nor b, 49. In a personal computer, multiple users, ., (a) can login and work at differnt times
Page 10 :
4, , Prepared by: Dr.V.Nagaradjane, (b) cannot login and work at the same time, (c) although multiple users are supported, only, one person can login at given time, (d) all of them, 50. The computer having better graphics, capacity, more main memory, more processing power and more storage compared to personal computer is called, ., (a) tablet PC, (b) Raspberry PI, (c) workstation computer, (d) smartphone, 51. The computer used for professional, works like CAD/CAM, animation, desktop publication, high power gaming, etc., ., is called, (a) tablet PC, (b) Raspberry PI, (c) workstation computer, (d) smartphone, 52. A computer which supports concurrent, login for 100 or 200 persons is called, ., (a) mini-computer, (b) micro-computer, (c) tablet PC, (d) laptop, 53. A computer which supports concurrent, login for thousands of users is called, ., (a) mainframe computer, (b) micro-computer, (c) tablet PC, (d) laptop, 54., , (a), (b), (c), (d), , computer has enormous, processing power, memory and storage, and supports thousands of concurrent, logins., mainframe computer, micro-computer, cloud computer, laptop, , 55. A collection of computers used for online data storage through the Internet is, called, ., (a) mainframe computer, (b) micro-computer, (c) cloud computer, (d) laptop, , 56. A computer having large processing, power, used for scientific research, simulation of experiments, nuclear research,, high power number crunching, etc. is, called, ., (a) smartphone, (b) micro-computer, (c) workstation computer, (d) supercomputer, 57. The most common type of computer, used at homes and offices is called, ., (a) Personal Computer (PC), (b) super computer, (c) main frame computer, (d) mini computer, 58. In computers, PC is expanded as, ., (a) Process Computer, (b) Progressive Computer, (c) Personal Computer, (d) Plus Computer, 59. Personal computer is otherwise called, ., (a) super computer, (b) main frame computer, (c) mini computer, (d) micro-computer, 60. A micro-computer/PC permits working, at the same time., of, (a) many users, (b) one user, (c) hundreds of users, (d) thousands of users, 61. Laptops, tabs, mobile phones, raspberry, ., PI, etc. are classified under, (a) super computer, (b) main frame computer, (c) mini computer, (d) micro-computer, , 1.1.3, , Advantages of computers, , 62. The main advantage of computer is, ., (a) speed, (b) large storage capacity, (c) ease of creating programs for new jobs, (d) all of them, ., 63. CAD stands for, (a) Computer Analog Design, (b) Computer Aided Dialog, (c) Computer Aided Design
Page 11 :
Q. Bank [COPA Semester - 1], (d) Computer Android Design, ., 64. CAM stands for, (a) Computer Analog Manufacture, (b) Computer Aided Monitoring, (c) Computer Aided Maintenance, (d) Computer Aided Manufacturing, 65. CAD/CAM help in reduction of, required for manufacture, while maintaining high quality and, precision., (a) time, (b) money, (c) both a & b, (d) neither a nor b, 66. Mission critital operations (like rocket, launching, control of space vehicles) are, computpossible through, ers., (a) real time, (b) main frame, (c) super, (d) mini, 67. Real time computers have, lag in processing input signals., (a) zero, (b) lengthy, (c) lot of, (d) heavy, , 1.1.4, , Application of computers, , 68. Banks store and retrieve core banking, transactions using, ., (a) mobile phones, (b) centralized server computers, (c) tablet computers, (d) micro-computers, 69. Computer servers are used in, applications., (a) online reservation of tickets, (b) e-commerce, (c) tracking of consignments, (d) all of them, 70. Computers help in creation of high, quality, multi-media, content, at, ., (a) high speed, (b) high quality, (c) lower cost compared to manual creation, (d) all of them, 71. Computer networks in the form of LAN,, WAN, MAN and the Internet help in, ., (a) sharing of information, (b) transactions of e-commerce, (c) sharing of hardware (like printers), (d) all of them, Prepared by: Dr.V.Nagaradjane, , 5, , 1.1.5, , Concept of hardware and software, , 72. All the physical components of a computer are collectively called, ., (a) software, (b) hardware, (c) malware, (d) junkware, 73. The component which makes a computer to work through commands is, ., called, (a) software, (b) hardware, (c) malware, (d) junkware, be touched., 74. Software, (a) cannot, (b) can, (c) may, (d) would, be touched., 75. Hardware, (a) cannot, (b) can, (c) may, (d) would, electric power for, 76. Hardware, working., (a) consumes, (b) does not consume, (c) generates, (d) creates, space., 77. Hardware, (a) does not occupy, (b) occupies, (c) does not require, (d) does not need, ., 78. Software, (a) consumes power through hardware, (b) is inferred through the working of hardware, (c) controls the hardware, (d) all of them, , 1.1.6, 79., (a), (b), (c), (d), 80., (a), (b), (c), (d), 81., (a), , Computer hardware, A computer has, ., input unit, Central Processing Unit (CPU), output unit, all of them, Keyboard, mouse, scanner, stylus,, light pen, etc. are classified under, unit., input, central processing, output, none of them, Monitor (VDU), printer, plotter, etc., are classified under, unit., input
Page 12 :
6, , Prepared by: Dr.V.Nagaradjane, (b) central processing, (c) output, (d) none of them, 82. All the processing work of computer, takes place in, ., (a) input unit, (b) Central Processing Unit (CPU), (c) output unit, (d) all of them, 83., (a), (b), (c), (d), 84., (a), (b), (c), (d), , produces output/results, after processing the input data., input unit, Central Processing Unit (CPU), output unit, all of them, is called the ’Brain of, Computer’., input unit, Central Processing Unit (CPU), output unit, all of them, , 85. Processor, main memory (RAM),, hard disk, CD/DVD drive, CMOS,, BIOS chip, etc. are housed inside, ., (a) input unit, (b) Central Processing Unit (CPU), (c) output unit, (d) all of them, contains slots for fixing/ connecting processor, main memory (RAM), hard disk, CD/DVD drive,, CMOS, BIOS chip, etc., (a) Mother board, (b) bread board, (c) key board, (d) dash board, 86., , Input units, 87. Common keyboards used in India have, layout of keys., (a) English US, (b) English UK, (c) either a or b, (d) neither a nor b, 88. The longest/largest button on keyboard, ., is, (a) space bar, (b) enter, (c) backspace, (d) tab, button removes a, 89. The, character to the left of cursor position., (a) space bar, (b) enter, (c) backspace, (d) tab, , 90. The, line of input., (a) space bar, (c) backspace, , button ends current, (b) enter, (d) tab, , button moves the, 91. The, cursor to the next predetermined stop, location., (a) space bar, (b) enter, (c) backspace, (d) tab, button toggles capi92. The, tal letter for input., (a) caps lock, (b) print screen, (c) scroll lock, (d) pause/break, button takes a screen, 93. The, shot and copies it to clipboard or saves, it to a file., (a) caps lock, (b) print screen, (c) scroll lock, (d) pause/break, button stops or re94. The, sumes the boot process., (a) caps lock, (b) print screen, (c) scroll lock, (d) pause/break, button keeps the scroll, mode on or off., (a) caps lock, (b) print screen, (c) scroll lock, (d) pause/break, , 95., , 96. The group of number keys and basic arithmetic operators placed on the, left side of a keyboard is called, ., (a) number pad, (b) note pad, (c) arrow keys, (d) cursor controls, 97. The, pad on or off., (a) num lock, (c) scroll lock, , key toggles number, (b) caps lock, (d) Esc, , keys can move the, 98. The, cursor up, down, left or right., (a) num lock, (b) arrow, (c) scroll lock, (d) Esc, key moves out of cur99. The, rent screen or terminates current operation., (a) num lock, (b) arrow, (c) scroll lock, (d) Esc, key helps to access, 100. The, alternate character of each key (e.g. !, by pressing 1, @ by pressing 2, etc.)., (a) num lock, (b) arrow, (c) shift, (d) Esc
Page 13 :
Q. Bank [COPA Semester - 1], keys are placed to, 101. The, the left and right of space bar., (a) Ctrl, (b) Windows button, (c) Alt, (d) all of them, 102. The, menu., (a) Ctrl, (b) Windows button, (c) Alt, (d) function key, , key opens context, , 103. The series of keys named F1 ... F12 are, ., called, (a) function keys, (b) scroll keys, (c) number keys, (d) navigation keys, 104. Function keys are placed at the, of keyboard., (a) bottom, (b) right, (c) top, (d) left, 105. The Insert, Delete, Home, End, Page Up, and Page Down keys are placed above, ., (a) arrow keys, (b) number lock, (c) function keys, (d) scroll lock, 106. A second enter key is available in, area of keyboard., (a) arrow keys, (b) number lock, (c) function keys, (d) scroll lock, 107. Most of the shortcut keys are designed, to use, key along with one, or two characters., (a) Ctrl, (b) Alt, (c) both a & b, (d) none of them, opens the start menu., 108., (a) Windows key, (b) Ctrl, (c) Alt, (d) F1, opens help., 109., (a) Windows key, (b) Ctrl, (c) Alt, (d) F1, 110. The function keys are arranged in 3, groups of, keys in a group., (a) 2, (b) 3, (c) 4, (d) 5, Prepared by: Dr.V.Nagaradjane, , 7, Mouse, helps to move the cur111. The, sor on screen and point at specific icons., (a) scanner, (b) mouse, (c) keyboard, (d) printer, 112. Normally, pressing the, button of mouse once or twice on an, icon opens the program associated with, that icon., (a) left, (b) right, (c) centre, (d) bottom, 113. Normally, pressing the, button of mouse opens a context menu., (a) left, (b) right, (c) centre, (d) bottom, button of, 114. Normally,, mouse doubles as a scroller., (a) left, (b) right, (c) centre, (d) bottom, 115. The computer can be configured to open, the icon using, a program on, mouse., (a) single clicking, (b) double clicking, (c) both a & b, (d) neither a nor b, for sens116. Mouse may have, ing movement., (a) ball, (b) light sensor, (c) either a or b, (d) neither a nor b, Other input devices, 117. A device which can process characters, and drawings on paper and convert them, to digital images (or editable objects) for, computers is called, ., (a) scanner, (b) digital tablet, (c) light pen, (d) printer, 118. A device which converts handwriting to, computer input is called, ., (a) scanner, (b) digital tablet, (c) light pen, (d) printer, 119. A stylus used to provide input through, CRT monitor is called, ., (a) scanner
Page 14 :
8, , Prepared by: Dr.V.Nagaradjane, (b) digital tablet, (c) light pen, (d) printer, , 1.1.7, , Output devices, , Monitor/ VDU, is the most common output device for a computer., (a) monitor, (b) printer, (c) both a & b, (d) neither a nor b, ., 121. VDU is expanded as, (a) Visual Display Unit, (b) Virtual Display Unit, (c) Visual Deception Unit, (d) Visual Display University, 122. In computer monitors, CRT stands for, ., (a) Cadmium Ray Tube, (b) Cathode Ray Tube, (c) Cathode Ray Twist, (d) Cathode Rim Tube, 123. Cathode Ray Tube (CRT) monitor supinput., ports, (a) LASER printer, (b) line printer, (c) light pen, (d) plotter, 124. Cathode Ray Tube (CRT) monitor has, level of power consumption, amongst monitors., (a) highest, (b) lowest, (c) zero, (d) least, ., 125. LCD is expanded as, (a) Linear Crystal Display, (b) Liquid Crystal Dialog, (c) Liquid Crystal Display, (d) Liquid Canister Display, ., 126. LED is expanded as, (a) Linear Emitting Diode, (b) Light Emitting Diode, (c) Liquid Emitting Diode, (d) Light Emitting Display, 127. The display of LCD monitor is, than that of LED, monitor., (a) lighter, (b) heavier, (c) brighter, (d) duller, 128. Plasma monitor is suitable for, ., 120., , (a), (b), (c), (d), , large displays (> 32”), small displays, display of mobile phone, display of watches, ., 129. TFT is expanded as, (a) Tiny Film Transistor, (b) Thin Film Transistor, (c) Thin Floppy Transistor, (d) Thin Film Transmission, 130. The density of pixels in a monitor surface is called, ., (a) revolution, (b) reaction, (c) resolution, (d) relation, 131. The number of pixels per inch of monitor, length is called, ., (a) LPI (Lines Per Inch), (b) DPI (Dots Per Inch), (c) SPI Sides Per Inch, (d) PPI (Pixels Per Inch), 132. Height to width ratio of a monitor screen, ., is called, (a) aspect ratio, (b) length ratio, (c) width ratio, (d) diagonal ratio, 133. Generally, CRT monitors had aspect ra., tio of, (a) 16:9, (b) 4:3, (c) 16:10, (d) 1:1, 134. LCD, LED, TFT and Plasma monitors, have aspect ratio of, ., (a) 16:9, (b) 16:10, (c) both a & b, (d) neither a nor b, 135. The monitor having pixel resolution, of 1280 × 720 has aspect ratio of, ., (a) 16:9, (b) 16:10, (c) 4:3, (d) 1:1, 136. The monitor having pixel resolution, of 800 × 600 has aspect ratio of, ., (a) 16:9, (b) 16:10, (c) 4:3, (d) 1:1, 137. The monitor having pixel resolution, of 1280 × 800 has aspect ratio of, ., (a) 16:9, (b) 16:10, (c) 4:3, (d) 1:1, 138. The monitor having pixel resolution, of 1920 × 1080 has aspect ratio of, .
Page 15 :
Q. Bank [COPA Semester - 1], (a) 16:9, (c) 4:3, 139. In, , 9, , (b) 16:10, (d) 1:1, monitors,, , HD, , stands, , for, , ., (a), (b), (c), (d), , Hyper Density, High Direct, Hot Definition, High Definition, , 140. Display resolution of 1920 × 1080 pixels, is called, display., (a) 480p, (b) 576p, (c) 720p, (d) Full High Definition (FHD), 141. Full High Definition (FHD) of displays correspondes to, (vertical pixel resolution)., (a) 480p, (b) 576p, (c) 720p, (d) 1080p, 142. Display resolution of 1280 × 720 pixels, is called, ., (a) 480p, (b) 576p, (c) 720p, (d) Full High Definition (FHD), 143. Display resolution of 768 × 576 pixels is, called, ., (a) 480p, (b) 576p, (c) 720p, (d) Full High Definition (FHD), 144. Display resolution of 720 × 480 pixels is, called, ., (a) 480p, (b) 576p, (c) 720p, (d) Full High Definition (FHD), 145. The notation HDi for display resolution, ., denotes, (a) 1080p Interlaced, (b) 720p Interlaced, (c) 576p Interlaced, (d) 480p Interlaced, 146. The method of displaying screen contents using even rows for half a second, and odd rows for another half second is, called, of video., (a) progressive scanning, (b) interlacing, (c) deinterlacing, (d) reducing, Prepared by: Dr.V.Nagaradjane, , 147. The method of displaying screen contents using even rows for half a second, and odd rows for another half second is, called, of video., (a) progressive video, (b) interlacing, (c) deinterlacing, (d) reducing, 148. The p in display resolutions of, 1080p, 720p, 576p&480p stands for, (a), (b), (c), (d), , progressive video, interlacing, deinterlacing, reducing, , 149. The method of painting each row of, video frame from top to bottom is called, ., (a) progressive video, (b) interlacing, (c) deinterlacing, (d) reducing, 150. The method of painting odd rows during, the fist pass and even rows during the, ., second pass is called, (a) progressive video, (b) interlacing, (c) deinterlacing, (d) reducing, Printer, 151. The device that produces hard copies on, paper is called, ., (a) monitor, (b) scanner, (c) tablet, (d) printer, 152. Paper copy of a document is called, ., (a) light copy, (b) hard copy, (c) soft copy, (d) hot copy, 153. Digital copy of a document stored in, secondary storage device (like hard disk,, floppy disk, CD, DVD, pen drive, SD, card, etc.) is called, ., (a) light copy, (b) hard copy, (c) soft copy, (d) hot copy, 154. The type of printer which hits the paper, to produce print is called, ., (a) monitor, (b) scanner, (c) non-impact type printer, (d) impact type printer
Page 16 :
10, , Prepared by: Dr.V.Nagaradjane, , 155. The type of printer which does not hit, the paper to produce print is called, ., (a) monitor, (b) scanner, (c) non-impact type printer, (d) impact type printer, 156. Dot, (a), (b), (c), (d), , matrix printer, category., , belongs, , to, , monitor, scanner, non-impact type printer, impact type printer, , 157. Dot matrix printer, line printer, chain, printer, golf ball printer and daisy wheel, category., printer belong to, (a) monitor, (b) scanner, (c) non-impact type printer, (d) impact type printer, 158. LASER printer, ink jet printer, thermal printer and plotter belong to, category., (a) monitor, (b) scanner, (c) non-impact type printer, (d) impact type printer, 159. In LASER printer, the LASER beam produces, charge on paper, which, makes the toner powder to adhere to the, charged area., (a) (-)ve, (b) (+)ve, (c) neutral, (d) none of them, 160. In ink jet printer,, colour cartridges are used to produce, colour/black print., (a) Red, Blue & Green (RBG), (b) Cyan, Magenta, Yellow & blacK (CMYK), (c) Red, Green & Blue (RGB), (d) VIBGYOR, 161. In ink jet printer, CMYK stands for, ., (a) Cream, Magenta, Yellow & blacK, (b) Crimson, Magenta, Yellow & blacK, (c) Cyan, Magenta, Yellow & blacK, (d) Cyan, Mango, Yellow & blacK, 162. The type of printer used for printing on, large size papers (A0, A1, etc.) is called, ., (a) monitor, (b) scanner, (c) mouse, (d) plotter, , 163. Thermal printer uses, coated paper, which turns black when, heat is applied., (a) chromium, (b) BisPhenol A, (c) nickel, (d) toner powder, , 1.1.8, , Central, (CPU), , Processing, , Unit, , Micro-processor, ., 164. CPU is expanded as, (a) Central Power Unit, (b) Critical Processing Unit, (c) Central Processing Unit, (d) Cerebral Processing Unit, of, 165. The symbol µP denotes, a computer., (a) mighty processor, (b) micro presenter, (c) million power, (d) micro-processor, is casually called the ”Brain, 166., of Computer”., (a) CPU, (b) monitor, (c) keyboard, (d) mouse, 167. The main components housed in CPU, ., are, (a) micro-processor, (b) Mother board, Random Access Memory, (RAM), (c) Secondary storage devices (hard disk,, CD/DVD drive, floppy disk drive, etc.), (d) all of them, 168. In the CPU of a computer,, delivers power supply to all the components at appropriate voltages., (a) Hard Disk, (b) Mother Board, (c) Switch Mode Power Supply (SMPS), (d) DVD drive, 169. The chip carrying out all processing works in a computer is called, ., (a) micro-processor (µP ), (b) keyboard, (c) BIOS chip, (d) RAM, 170. The part of micro-processor which performs number crunching and logical, comparisons is called, ., (a) Arithmetic and Logic Unit (ALU), (b) Register
Page 17 :
Q. Bank [COPA Semester - 1], (c) Cache, (d) timer, ., 171. ALU stands for, (a) Arithmetic and Logic University, (b) Arithmetic and Local Unit, (c) Arithmetic and Logic Unit, (d) Analysis and Logic Unit, 172. The part of micro-processor used for, storing values needed for next cycle of, ., processing is called, (a) Arithmetic and Logic Unit (ALU), (b) Register, (c) clock, (d) timer, 173. The part of micro-processor holding, data which is needed for forthcoming cycles of processing is called, ., (a) Arithmetic and Logic Unit (ALU), (b) Register, (c) Cache, (d) timer, 174. The part of micro-processor which maintains a clock and induces each cycle, of processing through a pulse is called, ., (a) Arithmetic and Logic Unit (ALU), (b) Register, (c) Cache, (d) timer, 175. The number of floating point operations, carried out by a micro-processor in one, ., second is called, (a) FLOPS, (b) timer, (c) clock, (d) frequency, 176. The number of cycles of operations performed by a processor per second is, called its, ., (a) bus speed, (b) connection speed, (c) clock speed, (d) baud rate, 177. Whereas clock speed is the gross number of operations performed by a processor per second, FLOPS represents, of processor per second., (a) wasted time, (b) effective out turn, (c) wasted cycles, (d) clock speed, 178. A floating point operation may require, clock cycle to complete., (a) just one, (b) less than one, Prepared by: Dr.V.Nagaradjane, , 11, (c) zero, (d) more than one, 179. Intel Pentium processor was preceded by, Intel, processor., (a) Core 2 duo, (b) 80486/ 486, (c) Core i3, (d) Core i5, Main memory (or) Primary Storage or Random Access Memory, 180. The storage which handles data required, for the processor (by fetching data from, or saving data to secondary storage) is, called, ., (a) main memory, (b) primary storage/ volatile storage, (c) Random Access Memory (RAM), (d) all of them, data after, 181. Main memory, power off., (a) retains, (b) remembers, (c) does not keep, (d) keeps all, 182. Since main memory looses data after, power off, it is called, ., (a) data storage, (b) volatile storage, (c) power storage, (d) secondary storage, ., 183. RAM is expanded as, (a) Right Access Memory, (b) Random Active Memory, (c) Random Access Memory, (d) Random Access Meter, ., 184. SRAM stands for, (a) Static Random Access Memory, (b) Stable Random Access Memory, (c) Static Read Access Memory, (d) Static Random Arithmetic Memory, ., 185. DRAM stands for, (a) Draft Random Access Memory, (b) Direct Random Access Memory, (c) Disk Random Access Memory, (d) Dynamic Random Access Memory, ., 186. FPM DRAM stands for, (a) First Page Mode Dynamic Random Access, Memory, (b) Fast Page Mode Dynamic Random Access, Memory, (c) Fill Page Mode Dynamic Random Access, Memory
Page 18 :
12, , Prepared by: Dr.V.Nagaradjane, , (d) Fast Package Mode Dynamic Random Access Mother board, Memory, 194. In a desktop computer, the board, DRAM, stands, for, 187. EDO, containing micro-processor, RAM and, ., other components is called, (a) Extended Disk Out Dynamic Random Access, board., Memory, (a) graphics, (b) mother, (b) Expanded Data Out Dynamic Random Access, (c) white, (d) black, Memory, (c) Extended Data Out Dynamic Random Access 195. CMOS in motherboard is expanded as, ., Memory, (a) Customary Metal Oxide Semiconductor, (d) Extended Data Onboard Dynamic Random, (b) Complementary Mineral Oxide Semiconductor, Access Memory, (c) Complete Metal Oxide Semiconductor, ., 188. SDRAM stands for, (d) Complementary Metal Oxide Semiconductor, (a) Synchronous Dynamic Random Access Mem- 196. CMOS is a type of RAM, which is conory, stantly powered by, ., (b) Simple Dynamic Random Access Memory, (a) UPS battery, (b) CMOS battery, (c) Synchronous Double Random Access Memory (c) AC main, (d) AA battery, (d) Syntax Dynamic Random Access Memory, 197. In motherboard, BIOS is expanded as, ., SDRAM, stands, for, 189. DDR, (a) Beginner Input Output System, ., (a) Double Data Rate Synchronous Dynamic Ran- (b) Bit Input Output System, (c) Basic Input Output System, dom Access Memory, (b) Double Data Rate Simple Dynamic Random (d) Basic Input Output Syntax, Access Memory, 198. In motherboard, CNR stands for, ., (c) Double Data Rate Synchronous Double Ran(a), Communication, & Network Riser, dom Access Memory, (b), Contact, &, Network, Riser, (d) Double Data Rate Syntax Dynamic Random, (c) Communication & Network Ripper, Access Memory, (d) Complementary & Networking Riser, ., 190. RDRAM stands for, 199. In motherboard, AGP stands for, (a) Resultant Random Access Memory, ., (b) Reactive Random Access Memory, (a) Automated Graphics Port, (c) Rational Random Access Memory, (b) Accelerated Graphics Point, (c) Audio Graphics Port, (d) Rambus Random Access Memory, (d) Accelerated Graphics Port, ., 191. VRAM stands for, 200. In motherboard, PATA stands for, (a) Visual Random Access Memory, ., (b) Video Random Access Memory, (a) Peripheral Advanced Technology Attachment, (c) Virtual Random Access Memory, (b) Port Advanced Technology Attachment, (c) Parallel Advanced Technology Attachment, (d) Vintage Random Access Memory, (d) Part Advanced Technology Attachment, ., 192. MPDRAM stands for, (a) Major Port Dynamic Random Access Memory 201. In motherboard, SATA stands for, ., (b) Multi-Point Dynamic Random Access Memory (a) Serial Advanced Technology Attachment, (c) Multi-Port Dynamic Random Access Memory (b) Synchronous Advanced Technology Attachment, (d) Multi-Port Data Random Access Memory, (c) Synaptic Advanced Technology Attachment, ., 193. SGRAM stands for, (d) Systematic Advanced Technology Attachment, (a) Synchronous Graphics Random Access Memchipset, 202. In motherboard,, ory, takes care of data transfer to and from, (b) Syntax Graphics Random Access Memory, the processor., (c) Simple Graphics Random Access Memory, (a) Southbridge, (b) Eastbridge, (c) Northbridge, (d) Westbridge, (d) Synchronous Gross Random Access Memory
Page 19 :
Q. Bank [COPA Semester - 1], chipset, 203. In motherboard,, takes care of data transfer to and from, the secondary storage devices (like hard, disk, CD/DVD drive, etc.)., (a) Southbridge, (b) Eastbridge, (c) Northbridge, (d) Westbridge, Secondary storage units, 204. Secondary storage is otherwise called, ., (a) auxiliary storage, (b) permanent storage, (c) both a & b, (d) main memory, 205. Data store in secondary storage is, ., (a) volatile, (b) lost after power off, (c) is deleted after every reboot, (d) permanent (available till deletion), 206. Secondary storage devices are, in speed when compared to RAM., (a) faster, (b) slower, (c) equal, (d) none of them, for data, 207. Hard disk uses, storage and retrieval., (a) LASER beam acting on light sensitive layer, (b) magnetic disk mounted in spindle, (c) flash memory, (d) plastic magnetic plate, for, 208. CD/DVD drive uses, data storage and retrieval., (a) LASER beam acting on light sensitive layer, (b) magnetic disk mounted in spindle, (c) flash memory, (d) plastic magnetic plate, 209. SD card, mini SD card and micro SD, card use, for data storage, and retrieval., (a) LASER beam acting on light sensitive layer, (b) magnetic disk mounted in spindle, (c) flash memory, (d) plastic magnetic plate, for data, 210. Floppy disk used, storage and retrieval., (a) LASER beam acting on light sensitive layer, (b) magnetic disk mounted in spindle, (c) flash memory, (d) plastic magnetic plate, ., 211. SD card is expanded as, (a) Secure Digital Card, (b) Mini Secure Digital Card, Prepared by: Dr.V.Nagaradjane, , 13, (c) Micro Secure Digital Card, (d) Major Secure Digital Card, 212. Mini SD card is expanded as, ., (a) Secure Digital Card, (b) Mini Secure Digital Card, (c) Micro Secure Digital Card, (d) Major Secure Digital Card, 213. Micro SD card is expanded as, ., (a) Secure Digital Card, (b) Mini Secure Digital Card, (c) Micro Secure Digital Card, (d) Major Secure Digital Card, ., 214. PCMCIA stands for, (a) Protected Computer Memory Card International Association, (b) Personal Computer Memory Card International Association, (c) Personal Complementary Memory Card International Association, (d) Pen drive Computer Memory Card International Association, Storage capacities, 215. The smallest storage unit permitting, ., storage of 0 and 1 is called, (a) bit, (b) nibble, (c) byte, (d) kilo byte, range of, 216. One bit can store, values., (a) 0 or 1, (b) 0 to 255, (c) 0 to 512, (d) 0 to 1024, ., 217. 4 bits of memory is called, (a) bit, (b) nibble, (c) byte, (d) kilo byte, 218. Nibble is a storage unit consisting of, bits., (a) 8, (b) 16, (c) 4, (d) 64, ., 219. 8 bits of memory is called, (a) bit, (b) nibble, (c) byte, (d) kilo byte, 220. Byte is a storage unit consisting of, bits., (a) 8, (b) 16, (c) 4, (d) 64, 221. 1024 bits of storage is called, ., (a) bit, (b) nibble, (c) byte, (d) kilo byte, 222. Kilo Byte (KB) is a storage unit consisting of, bits.
Page 20 :
14, 1024 (21 0), 1048576 (22 0), 1073741824 (23 0), 1099511627776 (24 0), 223. 22 0 (1048576) bits of storage is called, ., (a) byte, (b) Kilo Byte (KB), (c) Mega Byte (MB), (d) Tera Byte (TB), 224. 1024 KB of storage is called, ., (a) byte, (b) Kilo Byte (KB), (c) Mega Byte (MB), (d) Tera Byte (TB), KB., 225. 1 MB =, (a) 1024 (21 0), (b) 1048576 (22 0), (c) 1073741824 (23 0), (d) 1099511627776 (24 0), bits., 226. 1 MB =, 1, (a) 1024 (2 0), (b) 1048576 (22 0), (c) 1073741824 (23 0), (d) 1099511627776 (24 0), 227. 1024 MB of storage is called, ., (a) byte, (b) Kilo Byte (KB), (c) Mega Byte (MB), (d) Tera Byte (TB), MB., 228. 1 TB =, (a) 256, (b) 512, (c) 1024, (d) 2048, ., 229. 1024 TB = 1, (a) Mega Byte (MB), (b) Tera Byte (TB), (c) Peta Byte (PB), (d) Exa Byte (EB), ., 230. 1 PB = 1024, (a) Mega Byte (MB), (b) Tera Byte (TB), (c) Peta Byte (PB), (d) Exa Byte (EB), ., 231. 1024 PB = 1, (a) Mega Byte (MB), (b) Tera Byte (TB), (c) Peta Byte (PB), (d) Exa Byte (EB), ., 232. 1 EB (Exa Byte) = 1024, (a) Mega Byte (MB), (a), (b), (c), (d), , Prepared by: Dr.V.Nagaradjane, (b) Tera Byte (TB), (c) Peta Byte (PB), (d) Exa Byte (EB), Storage capacities of devices, 233. The storage capacity of a Compact Disk, (CD) is, ., (a) 800MB, (b) 4.7GB, (c) 512MB, (d) 1TB, 234. The storage capacity of a Digital Versatile Disk (DVD) is, ., (a) 800MB, (b) 4.7GB, (c) 512MB, (d) 1TB, 235. The storage capacity of a common hard, ., disk is, (a) 256MB, (b) 512GB, (c) 1TB, (d) any one of a, b or c, 236. The storage capacity of a Secure Digital (SD) card/ Mini SD card/ Micro SD, card or pen drive can be in the range of, ., (a) 1 bit to 8 bits, (b) 4 bits to 8 bits, (c) 2GB to 128GB, (d) 1 MB to 1024MB, Switch Mode Power Supply (SMPS), 237. The unit which splits power supply to, various voltages required for ther units, of a computer is called, ., (a) transformer, (b) Switch Mode Power Supply (SMPS), (c) transistor, (d) transducer, 238. Full form for SMPS in computer is, ., (a) Sync Mode Power Supply, (b) Switch Mode Power Supply, (c) Stake Mode Power Supply, (d) Switch Mode Power Socket, pro239. In a desktop computer,, duces radio frequency interference., (a) SMPS, (b) Micro-Processor (µP ), (c) RAM, (d) Mouse
Page 21 :
Q. Bank [COPA Semester - 1], CPU Ports, 240. The opening provided in the front panel, or rear panel of a CPU for connecting, ., peripherals is called, (a) socket, (b) pin, (c) port, (d) part, 241. External devices/ peripherals like keyboard and mouse can be connected to, a computer using, ports., (a) PS/2, (b) USB, (c) both a & b, (d) neither a nor b, 242. External dialup MODEM can be connected to a computer using, port., (a) RS232/ serial, (b) PS/2, (c) VGA, (d) LPT, 243. Monitor is connected to a computer usport., ing, (a) RS232/ serial, (b) PS/2, (c) VGA, (d) LPT, 244. Old style (SIMPLEX) printer (like dot, matrix printer) may be connected to a, port., computer using, (a) RS232/ serial, (b) PS/2, (c) VGA, (d) LPT, 245. Modern (DUPLEX) printer (like LASER, jet, inkjet printers) may be connected to, a computer using, port., (a) RS232/ serial, (b) USB, (c) PS/2, (d) VGA, 246. Broadband connection may be connected through, port., (a) RJ45/ Ethernet, (b) USB, (c) PS/2, (d) VGA, 247. Printer, fax machine, scanner, web camera, external DVD writer, external hard, disk, etc. can be connected to computer, using, port., (a) RJ45, (b) USB, (c) PS/2, (d) VGA, Prepared by: Dr.V.Nagaradjane, , 15, 248. Audio input, microphone and speaker, output can be connected to computer, using, ., (a) 3.5mm jack, (b) RJ11, (c) RJ45, (d) LPT, 249. Joystick can be connected to computer, port., using, (a) 3.5mm jack, (b) RJ11, (c) RJ45, (d) Game, ., 250. PS/2 stands for, (a) Registered Jack 11, (b) Registered Jack 45, (c) Personal System 2, (d) Recommended Standard 232, ., 251. RJ11 stands for, (a) Registered Jack 11, (b) Registered Jack 45, (c) Personal System 2, (d) Recommended Standard 232, ., 252. RJ45 stands for, (a) Registered Jack 11, (b) Registered Jack 45, (c) Personal System 2, (d) Recommended Standard 232, ., 253. RS232 stands for, (a) Registered Jack 11, (b) Registered Jack 45, (c) Personal System 2, (d) Recommended Standard 232, ., 254. RJ45 port is otherwise called, (a) Ethernet, (b) LPT, (c) USB, (d) VGA, 255. IEEE 1392 port is otherwise called, ., (a) Ethernet, (b) LPT, (c) USB, (d) Firewire, ., 256. LPT stands for, (a) Registered Jack 11, (b) Registered Jack 45, (c) Line Printer Terminal, (d) Recommended Standard 232, ., 257. USB stands for, (a) Registered Jack 11, (b) Registered Jack 45, (c) Line Printer Terminal, (d) Universal Serial Bus, 258. High definition graphics output may be, port of a PC., taken from, (a) 3.5mm jack, (b) HDMI, (c) RJ45, (d) LPT, ., 259. HDMI stands for
Page 22 :
16, (a), (b), (c), (d), , 1.1.9, , Prepared by: Dr.V.Nagaradjane, Registered Jack 11, High Definition Multimedia Interface, Line Printer Terminal, Universal Serial Bus, , Computer software, , 260. The component of computer which is, not physically accessible, but can be, realized through its working is called, ., (a) hardware, (b) software, (c) RAM, (d) port, decides how hardware, 261., should work., (a) hardware, (b) software, (c) RAM, (d) port, helps to hardware to pro262., duce output based on given input., (a) Game port, (b) software, (c) IEEE 1392, (d) SMPS, 263. The operating system & driver software, are categorized under, software., (a) system, (b) application, (c) malware, (d) junkware, 264. The software tools required for various, types of productive works like preparation of documents, spreadsheets, playing audio/video, browsing Internet, etc., softare are categorized under, ware., (a) system, (b) application, (c) malware, (d) junkware, 265. Operating system identifies and controls hardware in coordination with, ., (a) power cable, (b) mouse, (c) SMPS, (d) BIOS, 266. Operating system uses a special software, called, to initialize, operate, and control hardware., (a) conductor, (b) Ethernet controller, (c) driver, (d) SMPS, schedules processor time in, 267., such a way as to allow the user to feel, that may programs are running at the, same time., (a) application software, (b) operating system, (c) virus, (d) malware, , 268., , (a), (b), (c), (d), 269., , (a), (b), (c), (d), , schedules processor time, and handles concurrency and parallel processing using multiple processor, cores., application software, virus, malware, operating system, allots memory for each program and frees memory when it is no, longer needed for a program., application software, virus, malware, operating system, , 270. The core of the operating system which, controls all hardware and application, software, but does not directly interact, ., with the users is called, (a) kernel, (b) shell, (c) sap, (d) heart, 271. A layer of application software available, for the user to interact with operating, ., system kernel is called, (a) kernel, (b) shell, (c) sap, (d) heart, is an operating system., 272., (a) Mac OS X, (b) Microsoft Windows, (c) Unix/ Linux/ Free BSD/ Solaris, BeOS, (d) all of them, Windows, ., 273. MS DOS stands for, (a) MicroSoft Disk Operating System, (b) MiniSoft Disk Operating System, (c) MicroSoft Disk Operating Standard, (d) MicroSoft Dirty Operating System, 274. MS DOS was first released in the year, ., (a) 1970, (b) 1981, (c) 1985, (d) 2000, 275. Development of MS DOS was stopped, in the year, ., (a) 1970, (b) 1981, (c) 1985, (d) 2000, 276. Windows 1.0 was released in the year, ., (a) 1970, (b) 1981, (c) 1985, (d) 2000
Page 23 :
Q. Bank [COPA Semester - 1], , 17, , 277. Windows 1.0, Windows 3.1, Windows, 95, Windows 98 and Windows Me were, based on, kernel., (a) LINUX, (b) UNIX, (c) NT (New Technology), (d) MS DOS, 278. Windows NT, Windows 2000, Windows, XP, Windows 2003, Windows Vista,, Windows 7, Windows 8 and Windows, kernel., 10 were based on, (a) LINUX, (b) UNIX, (c) NT (New Technology), (d) MS DOS, 279. The New Technology (NT) kernel based, Windows NT was released in, ., (a) 1981, (b) 1993, (c) 2000, (d) 2010, Mac OS X, 280. First version of Mac OS was released in, the year, ., (a) 1981, (b) 1984, (c) 1993, (d) 2000, was the first commercial, operating system to support Graphical, User Interface (GUI)., (a) Windows, (b) UNIX, (c) Linux, (d) Mac OS, , 281., , 282. The latest version of Mac OS X is based, ., on free UNIX kernel called, (a) Darwin, (b) Cygwin, (c) Solaris, (d) Berkeley Software Distribution, 283. The mobile version of Mac OS X, used, in iPhone, iPad, iWatch, iPod, etc., is, called, ., (a) Android, (b) Firefox OS, (c) iOS, (d) Blackberry OS, Linux, 284. Linux, (a), (b), (c), (d), , kernel was, ., Richard Stallman, Linus Torvalds, Bill Gates, Steve Jobs, , Prepared by: Dr.V.Nagaradjane, , developed, , by, , 285. First release of Linux kernel took place, in the year, ., (a) 1981, (b) 1984, (c) 1991, (d) 1993, 286. Linux is distributed under an open, source license called, ., (a) GNU GPL (GNU Not Unix General Public License), (b) Apache license, (c) Berkeley Software Distribution (BSD) license, (d) Microsoft End User License Agreement, (EULA), 287. Linux operating system was inspired by, operating system., (a) Windows, (b) Unix, (c) Mac OS, (d) iOS, for, 288. Linux kernel supports, Graphical User Interface (GUI) based, desktop., (a) GNOME, (b) KDE, (c) Enlightenment, (d) all of them, is a version of Linux ker289., nel modified to run on mobile phones/, tablets/ other devices., (a) Android, (b) Firefox OS, (c) Tizen, (d) all of them, are the shell environments, 290., commonly supported by Linux., (a) Bourne Again Shell (bash), (b) Korn Shell (ksh), (c) C Shell (csh), (d) all of them, UNIX, 291. UNIX was one of the first operating systems to support, ., (a) multi-tasking, (b) Internet, (c) email, (d) all of them, 292. UNIX operating system was developed, at, ., (a) AT&T Bell Labs, (b) Carnegie Milan University, (c) CERN, (d) NASA, 293. UNIX was developed in the year, ., (a) 1970, (b) 1984, (c) 1985, (d) 1993
Page 24 :
18, 294., (a), (b), (c), (d), , Prepared by: Dr.V.Nagaradjane, was a member of the team, that developed UNIX operating system., Ken Thompson, Dennis Ritchie, M.D. McIllary, J.F. Ossanna, all of them, , ., 295. POSIX stands for, (a) Power Operating System Interface, (b) Portable Operating System Interface, (c) Portable Operating System Internet, (d) Portable Overall System Interface, 296. SUS stands for, (a) Simple UNIX Standard, (b) Single Universal Standard, (c) Single UNIX Standard, (d) Single UNIX Supplement, 297., UNIX kernel., (a) Bourne, (c) C, , ., , shell is supported by, (b) Korn, (d) all of them, , 298. Early versions of UNIX supported, a graphical user environment called, ., (a) KDE, (b) CDE, (c) GNOME, (d) none of them, ., 299. CDE stood for, (a) Common Desktop Environment, (b) Command Desktop Environment, (c) Common Desktop Entry, (d) Common Directory Environment, Overview of operating systems, operating system has the, largest number of installations for desktop computers., (a) Windows, (b) Android, (c) Mac OS X, (d) UNIX, 300., , 301. Considering mobile phones as small, computers,, is the most dominant operating system., (a) Windows mobile, (b) iOS, (c) Android, (d) Blackberry OS, 302. Linux is repackaged for specific user requirements by, ., (a) Fedora/ Red Hat, (b) SUSE, (c) Debian/ Ubuntu, (d) all of them, , Features of Windows operating system, 303. The graphical work environment provided by Windows is called, ., (a) Desktop, (b) Laptop, (c) My Documents, (d) Downloads, 304. The Shortcuts visible on the Desktop of, Windows are called, ., (a) clipboard, (b) desktop icons, (c) download icons, (d) document icons, 305. The thin strip (usually placed at bottom) of Windows desktop, containing several important icons, is called, ., (a) menu bar, (b) title bar, (c) status bar, (d) task bar, 306. The special button at the left edge of, task bar, used to open many programs, and settings, is called, ., (a) stop menu, (b) popup menu, (c) start menu, (d) file menu, 307. Task bar in Windows desktop contains, ., (a) start menu, (b) quick launch icons, system tray, (c) list of running programs, (d) all of them, 308. The collection of icons placed on the, right side of task bar (representing background tasks and their statuses, date,, time, volume control, network status, ., icon, etc.) is called, (a) system tray, (b) start menu, (c) quick launch icon, (d) file menu, 309. The list of programs currently running, in the desktop environment is displayed, in the, ., (a) menu bar, (b) title bar, (c) status bar, (d) task bar, Directory structure of Windows operating system, 310. The installation drive (usually C:) contains a folder named, to store, user specific data., (a) temp, (b) Program Files, (c) users
Page 25 :
Q. Bank [COPA Semester - 1], (d) Windows, 311. The c : \user folder contains a, bearing the name of each user, to save user specific data., (a) sub-folder, (b) file, (c) movie, (d) music, 312. For a user named krish, the folder C :, \users\krish is called, ., (a) movies folder, (b) home folder, (c) documents folder, (d) Windows folder, 313. For a user named buvan, typical home, ., directory would be, (a) C : \P rogramF iles, (b) C : \W indows, (c) C : \users\buvan, (d) C : \W indows\T emp, folder inside a user’s, 314. The, home directory contains desktop icons., (a) Desktop, (b) My Documents/ Documents, (c) Pictures, (d) Music, is the default folder for, 315., saving document files created by a user., (a) Desktop, (b) My Documents/ Documents, (c) Pictures, (d) Music, is the default folder for, 316., music related to a user., (a) Desktop, (b) My Documents/ Documents, (c) Pictures, (d) Music, is the default folder for im317., age and drawing files related to a user., (a) Desktop, (b) My Documents/ Documents, (c) Pictures, (d) Music, is the default folder to, 318., save content downloaded from the Internet., (a) Downloads, (b) My Documents/ Documents, (c) Pictures, (d) Music, is the default folder for, 319., videos related to a user., (a) Downloads, (b) Videos, (c) Pictures, (d) Music, Prepared by: Dr.V.Nagaradjane, , 19, Features of Windows Explorer, 320. The shortcut for opening Windows Explorer is, ., (a) Windows+E, (b) Windows+R, (c) Windows+F, (d) Windows+L, 321. In Windows Explorer, a file may be renamed by right clicking and selecting rekey., name or by pressing, (a) F2, (b) F3, (c) F1, (d) F4, is the, 322. In Windows Explorer,, shortcut to copy a file., (a) Ctrl+X, (b) Ctrl+C, (c) Ctrl+V, (d) Ctrl+A, is the, 323. In Windows Explorer,, shortcut to cut a file., (a) Ctrl+X, (b) Ctrl+C, (c) Ctrl+V, (d) Ctrl+A, is the, 324. In Windows Explorer,, shortcut to paste a file, which has already been cut or copied., (a) Ctrl+X, (b) Ctrl+C, (c) Ctrl+V, (d) Ctrl+A, is the, 325. In Windows Explorer,, shortcut to select all files and folders in, the current directory., (a) Ctrl+X, (b) Ctrl+C, (c) Ctrl+V, (d) Ctrl+A, 326. To create Desktop shortcut for a file, or program, right click on the file and, menu in Windows Exchoose, plorer., (a) Send To− >Desktop, (b) Send To− >Drive name, (c) Send To− >Compressed/Zipped archive, (d) Send To− >Bluetooth Device, 327. To compress a file, right click on the file, and choose, menu in Windows, Explorer., (a) Send To− >Desktop, (b) Send To− >Drive name, (c) Send To− >Compressed/Zipped archive, (d) Send To− >Bluetooth Device, 328. To write a file or folder in an empty, CD or DVD, right click on the file and, choose, menu in Windows Explorer., (a) Send To− >Desktop, (b) Send To− >Drive name, (c) Send To− >Compressed/Zipped archive, (d) Send To− >Bluetooth Device
Page 26 :
20, 329. To share a file from a bluetooth enabled computer to a bluetooth enabled, device, right click on the file and choose, menu in Windows Explorer., (a) Send To− >Desktop, (b) Send To− >Drive name, (c) Send To− >Compressed/Zipped archive, (d) Send To− >Bluetooth Device, 330. To delete a file, right click on the file, menu in Windows, and choose, Explorer., (a) Delete, (b) Rename, (c) Properties, (d) Decompress/ Unzip, 331. To view details of a file, right click on, menu in, the file and choose, Windows Explorer., (a) Delete, (b) Rename, (c) Properties, (d) Decompress/ Unzip, 332. To uncompress a zip file, right click on, the file and choose, menu in, Windows Explorer., (a) Delete, (b) Rename, (c) Properties, (d) Decompress/ Unzip, 333. In Windows, deleted file goes to, ., (a) Control Panel, (b) Music, (c) Recycle Bin, (d) Documents, keys in Windows Ex334. Pressing, plorer will permanently delete a file (bypassing Recycle Bin)., (a) Shift+Delete, (b) Alt+Delete, (c) Ctrl+Delete, (d) Enter+Delete, Shortcut keys in Windows, 335. To get Windows help, press, key., (a) F2, (b) F3, (c) F5, (d) F1, 336. To rename a file in Windows Explorer,, press, key., (a) F2, (b) F3, (c) F5, (d) F1, 337. To search and find a file, press, key., , Prepared by: Dr.V.Nagaradjane, (a) F2, (b) F3, (c) F5, (d) F1, 338. To refresh the display, press, key., (a) F2, (b) F3, (c) F5, (d) F1, 339. To move through various panes in Winkey., dows Explorer, press, (a) F6, (b) F3, (c) F5, (d) F1, 340. To lock computer display, press, ., (a) Windows+R, (b) Windows+M/ Windows+D, (c) Windows+P, (d) Windows+L, 341. To run a command, press, keys., (a) Windows+R, (b) Windows+M/ Windows+D, (c) Windows+P, (d) Windows+L, 342. To minimize all windows and show the, keys., desktop, press, (a) Windows+R, (b) Windows+M/ Windows+D, (c) Windows+P, (d) Windows+L, 343. To start print manager, press, keys., (a) Windows+R, (b) Windows+M/ Windows+D, (c) Windows+P, (d) Windows+L, 344. To open control panel, press, keys., (a) Windows+C, (b) Windows+M/ Windows+D, (c) Windows+P, (d) Windows+L, 345. To open accessibility features in Windows, press, keys., (a) Windows+K, (b) Windows+V, (c) Windows+I, (d) Windows+A, 346. To open keyboard settings, press, keys., (a) Windows+K, (b) Windows+V, (c) Windows+I, (d) Windows+A, 347. To open mouse settings, press, keys., (a) Windows+K, (b) Windows+V, (c) Windows+I, (d) Windows+A
Page 27 :
Q. Bank [COPA Semester - 1], 348. To start clipboard settings, press, keys., (a) Windows+K, (b) Windows+V, (c) Windows+I, (d) Windows+A, 349. To toggle caps lock on or off, press, keys., (a) Windows+S, (b) Windows+F, (c) Windows+E, (d) Windows+A, 350. To start open Windows/File Explorer,, press, keys., (a) Windows+K, (b) Windows+V, (c) Windows+E, (d) Windows+A, 351. To close current program, press, keys., (a) Alt+F4, (b) Alt+Tab, (c) Alt+Down arrow, (d) Alt+Space, 352. To open the menu for shutdown,, restart, hibernate Windows, etc., press, keys on Desktop., (a) Alt+F4, (b) Alt+Tab, (c) Alt+Down arrow, (d) Alt+Space, 353. To move from one program window to, another, press, keys., (a) Alt+F4, (b) Alt+Tab, (c) Alt+Down arrow, (d) Alt+Space, 354. To open pop down menu list, press, keys., (a) Alt+F4, (b) Alt+Tab, (c) Alt+Down arrow, (d) Alt+Space, 355. To access system menu for a window,, press, keys., (a) Alt+F4, (b) Alt+Tab, (c) Alt+Down arrow, (d) Alt+Space, 356. To access system menu for a child window, press, keys., (a) Alt+F4, (b) Alt+Tab, (c) Alt+(d) Alt+Space, 357. To view properties of selected window,, press, keys., (a) Alt+Enter, (b) Alt+Left Arrow, (c) Shift+Delete, Prepared by: Dr.V.Nagaradjane, , 21, (d) Shift+F10, 358. To move back to previous folder in, Windows/File Explorer, press, keys., (a) Alt+Enter, (b) Alt+Left Arrow, (c) Shift+Delete, (d) Shift+F10, 359. To permanently delete a file, press, keys., (a) Alt+Enter, (b) Alt+Left Arrow, (c) Shift+Delete, (d) Shift+F10, 360. To open context menu (similar to right, clicking using mouse), press, keys., (a) Alt+Enter, (b) Alt+Left Arrow, (c) Shift+Delete, (d) Shift+F10, 361. To disable Autorun for newly inserted, key while, media, keep pressing, inserting the media., (a) Alt, (b) Ctrl, (c) Shift, (d) Space, 362. To move from one child window to another, press, keys., (a) Ctrl+Tab, (b) Ctrl+F4, (c) Ctrl+Esc, (d) Ctrl+Shift+Esc, 363. To close a child window, press, keys., (a) Ctrl+Tab, (b) Ctrl+F4, (c) Ctrl+Esc, (d) Ctrl+Shift+Esc, 364. To display start menu, press, keys., (a) Ctrl+Tab, (b) Ctrl+F4, (c) Ctrl+Esc, (d) Ctrl+Shift+Esc, 365. To open task manager, press, keys., (a) Ctrl+Tab, (b) Ctrl+F4, (c) Ctrl+Esc, (d) Ctrl+Shift+Esc
Page 28 :
22, , Prepared by: Dr.V.Nagaradjane, , Using scanner, printer and webcam, 366. To run a peripheral unit like scanner, printer or webcam, appropriate, needs to be installed first., (a) driver, (b) connector, (c) conductor, (d) resistor, 367. On connecting a device with preinstalled driver, Windows, ., (a) rejects the device, (b) displays unknown hardware message, (c) initializes the device and makes it ready to, work, (d) does not care about the new device, 368. Scanned images may be acquired using, software., (a) scanner specific, (b) MS Paint, (c) Photoshop, (d) all of them, 369. Printer settings permit selection of apof paper., propriate, (a) size, (b) orientation (portrait or landscape), (c) thickness (in GSM), (d) all of them, 370. A web camera is normally suitable for, ., (a) low resolution images, (b) streaming videos during video conferencing, (c) both a & b, (d) none of them, for, 371. Web camera is normally, high resolution photography., (a) recommended, (b) not suitable, (c) used, (d) suitable, 372. Voice Over Internet Protocol (VOIP), programs like, make use of, web camera., (a) Skype, (b) Hangouts/ Yahoo messenger, (c) WhatsApp/ Viber, (d) all of them, , Answers (1 - 372), 1. (a), 5. (b), 9. (c), 13. (b), 17. (a), 21. (d), 25. (b), , 2. (c), 6. (d), 10. (b), 14. (b), 18. (c), 22. (b), 26. (c), , 3. (b), 7. (a), 11. (a), 15. (d), 19. (a), 23. (b), 27. (c), , 4. (d), 8. (d), 12. (a), 16. (a), 20. (d), 24. (a), 28. (c), , 29. (c), 33. (d), 37. (c), 41. (c), 45. (c), 49. (d), 53. (a), 57. (a), 61. (d), 65. (c), 69. (d), 73. (a), 77. (b), 81. (c), 85. (b), 89. (c), 93. (b), 97. (a), 101. (d), 105. (a), 109. (d), 113. (b), 117. (a), 121. (a), 125. (c), 129. (b), 133. (b), 137. (b), 141. (d), 145. (a), 149. (a), 153. (c), 157. (d), 161. (c), 165. (d), 169. (a), 173. (c), 177. (b), 181. (c), 185. (d), 189. (a), 193. (a), 197. (c), 201. (a), 205. (d), 209. (c), 213. (c), 217. (b), 221. (d), 225. (a), 229. (c), 233. (a), , 30. (b), 34. (c), 38. (d), 42. (d), 46. (d), 50. (c), 54. (a), 58. (c), 62. (d), 66. (a), 70. (d), 74. (a), 78. (d), 82. (b), 86. (a), 90. (b), 94. (d), 98. (b), 102. (b), 106. (b), 110. (c), 114. (c), 118. (b), 122. (b), 126. (b), 130. (c), 134. (c), 138. (a), 142. (c), 146. (b), 150. (b), 154. (d), 158. (c), 162. (d), 166. (a), 170. (a), 174. (d), 178. (d), 182. (b), 186. (b), 190. (d), 194. (b), 198. (a), 202. (c), 206. (a), 210. (d), 214. (b), 218. (c), 222. (a), 226. (b), 230. (b), 234. (b), , 31. (d), 35. (c), 39. (d), 43. (d), 47. (d), 51. (c), 55. (c), 59. (d), 63. (c), 67. (a), 71. (d), 75. (b), 79. (d), 83. (b), 87. (c), 91. (d), 95. (c), 99. (d), 103. (a), 107. (c), 111. (b), 115. (c), 119. (c), 123. (c), 127. (d), 131. (d), 135. (a), 139. (d), 143. (b), 147. (b), 151. (d), 155. (c), 159. (a), 163. (b), 167. (d), 171. (c), 175. (a), 179. (b), 183. (c), 187. (c), 191. (b), 195. (d), 199. (d), 203. (a), 207. (b), 211. (a), 215. (a), 219. (c), 223. (c), 227. (d), 231. (d), 235. (d), , 32. (d), 36. (d), 40. (d), 44. (d), 48. (c), 52. (a), 56. (d), 60. (b), 64. (d), 68. (b), 72. (b), 76. (a), 80. (a), 84. (b), 88. (a), 92. (a), 96. (a), 100. (c), 104. (c), 108. (a), 112. (a), 116. (c), 120. (c), 124. (a), 128. (a), 132. (a), 136. (c), 140. (d), 144. (a), 148. (a), 152. (b), 156. (d), 160. (b), 164. (c), 168. (c), 172. (b), 176. (c), 180. (d), 184. (a), 188. (a), 192. (c), 196. (b), 200. (c), 204. (c), 208. (a), 212. (b), 216. (a), 220. (a), 224. (c), 228. (c), 232. (c), 236. (c)
Page 29 :
Q. Bank [COPA Semester - 1], 237., 241., 245., 249., 253., 257., 261., 265., 269., 273., 277., 281., 285., 289., 293., 297., 301., , (b), (c), (b), (d), (d), (d), (b), (d), (d), (a), (d), (d), (c), (d), (a), (d), (c), , 238., 242., 246., 250., 254., 258., 262., 266., 270., 274., 278., 282., 286., 290., 294., 298., 302., , (b), (a), (a), (c), (a), (b), (b), (c), (a), (b), (c), (a), (a), (d), (d), (c), (d), , 239., 243., 247., 251., 255., 259., 263., 267., 271., 275., 279., 283., 287., 291., 295., 299., 303., , Prepared by: Dr.V.Nagaradjane, , 23, (a), (c), (b), (a), (d), (b), (a), (b), (b), (d), (b), (c), (b), (d), (b), (a), (a), , 240., 244., 248., 252., 256., 260., 264., 268., 272., 276., 280., 284., 288., 292., 296., 300., 304., , (c), (d), (a), (b), (c), (b), (b), (d), (d), (c), (b), (b), (d), (a), (c), (a), (b), , 305., 309., 313., 317., 321., 325., 329., 333., 337., 341., 345., 349., 353., 357., 361., 365., 369., , (d), (d), (c), (c), (a), (d), (d), (c), (b), (a), (d), (a), (b), (a), (c), (d), (d), , 306., 310., 314., 318., 322., 326., 330., 334., 338., 342., 346., 350., 354., 358., 362., 366., 370., , (c), (c), (a), (a), (b), (a), (a), (a), (c), (b), (a), (c), (c), (b), (a), (a), (c), , 307., 311., 315., 319., 323., 327., 331., 335., 339., 343., 347., 351., 355., 359., 363., 367., 371., , (d), (a), (b), (b), (a), (c), (c), (d), (a), (c), (c), (a), (d), (c), (b), (c), (b), , 308., 312., 316., 320., 324., 328., 332., 336., 340., 344., 348., 352., 356., 360., 364., 368., 372., , (a), (b), (d), (a), (c), (b), (d), (a), (d), (a), (b), (a), (c), (d), (c), (d), (d)
Page 30 :
24, , 1.2, 1., (a), (b), (c), (d), 2., (a), (b), (c), (d), 3., (a), (b), (c), (d), 4., (a), (b), (c), (d), 5., (a), (b), (c), (d), 6., (a), (c), 7., (a), (b), (c), (d), 8., (a), (c), 9., (a), (c), 10., (a), , Prepared by: Dr.V.Nagaradjane, , Computer Administration, The power on process of a computer is, called, ., waking up, boot strapping, formatting, installing, The test performed by computer to identify the hardware peripherals and units, ., attached to it is called, Power On Self Test, Disk Defragmenting, formatting, scandisk, In booting of computer, POST is ex., panded as, Power On Self Test, Disk Defragmenting, formatting, scandisk, Primary boot process is otherwise called, ., POST, loading of operating system, installation, formatting, ., Full form of BIOS is, Bare Input Output System, Basic Intermediate Operating System, Banned Input Output System, Basic Input Output System, Essential settings like date, time, boot, order, etc. needed for BIOS at boot, ., time are stored in, POST, (b) CMOS, Hard Disk, (d) DVD, In computer mother board, CMOS, stands for, ., Corroded Metal Oxide Semiconductor, Contact Metal Oxide Semiconductor, Complementary Metal Oxide Semiconductor, Complementary Metal Oxide Syntax, CMOS is a, ., RAM, (b) ROM, EPROM, (d) EEPROM, Memory which can be written only once, is called, ., RAM, (b) ROM, EPROM, (d) EEPROM, Memory which can be erased and reprogrammed is called, ., RAM, (b) ROM, , (c) EPROM, (d) EEPROM, 11. Memory which can be erased using electric current and reprogrammed is called, ., (a) RAM, (b) ROM, (c) EPROM, (d) EEPROM, ., 12. ROM stands for, (a) Random Ordinary Memory, (b) Read Only Memory, (c) Read Ordinary Memory, (d) Read Only Mail, ., 13. EPROM stands for, (a) Erasable Partition Read Only Memory, (b) Erasable Pointer Read Only Memory, (c) Extended Programmable Read Only Memory, (d) Erasable Programmable Read Only Memory, ., 14. EEPROM stands for, (a) Electrically Erasable Programmable Read Only, Memory, (b) Extremely Erasable Programmable Read Only, Memory, (c) Effectively Erasable Programmable Read Only, Memory, (d) Extended Erasable Programmable Read Only, Memory, keeps CMOS is in power, 15., on condition., (a) Hard disk, (b) RAM, (c) SMPS, (d) CMOS Battery (CR2032), 16. After booting process, BIOS helps in, ., (a) data transfer, (b) processing, (c) graphics, (d) cloud storage, 17. First part of boot loader accessed from, ., BIOS chip is called, (a) intermediate boot loader, (b) tertiary boot loader, (c) secondary boot loader, (d) primary boot loader, 18. On completion of POST, the computer, emits, ., (a) foul odour, (b) music, (c) beep, (d) water, 19. The second part of boot loader responsible for booting the operating system is, called, ., (a) intermediate boot loader, (b) tertiary boot loader, (c) secondary boot loader
Page 31 :
Q. Bank [COPA Semester - 1], (d) primary boot loader, ., 20. GRUB stands for, (a) GRand Unified Boot Loader, (b) Generic Unified Boot Loader, (c) Grand United Boot Loader, (d) Great Unified Boot Loader, 21. In booting a computer, MBR stands for, ., (a) Master Boot Reader, (b) Multi Boot Record, (c) Meta Boot Record, (d) Master Boot Record, 22. In booting a computer, BOOTMGR, ., stands for, (a) Best Master, (b) Boot Man, (c) Boot Manager, (d) Boot Mirage, 23. In booting a computer, NTLDR stands, ., for, (a) Next Technology LoaDeR, (b) New Technology LoaDeR, (c) New Terminal LoaDeR, (d) New Talent LoaDeR, 24. In booting a computer, UEFI stands for, ., (a) Unified Extensible Firmware Interface, (b) United Extensible Firmware Interface, (c) Universal Extensible Firmware Interface, (d) Uniform Extensible Firmware Interface, 25. In booting a computer, ESP stands for, ., (a) EFI System Package, (b) EFI Sorted Partition, (c) EFI System Partition, (d) EFI Self Partition, , 1.2.1, , Booting error signals, , 26. The type of error signal depends upon, of the computer., (a) power switch, (b) manufacturer of the BIOS chip, (c) type of monitor, (d) type of keyboard, 27. 1 short beep during POST denotes, of computer., (a) normal boot, (b) error code displayed on screen, (c) power problem, (d) mother board problem, 28. 1 short and 1 long beeps during POST, denotes, of computer., (a) normal boot, (b) error code displayed on screen, Prepared by: Dr.V.Nagaradjane, , 25, (c) power problem, (d) mother board problem, 29. 2 short beeps during POST denotes, of computer., (a) normal boot, (b) error code displayed on screen, (c) power problem, (d) mother board problem, beep, or, repeated, 30. Continuous, short beeps during POST denotes, of computer., (a) normal boot, (b) error code displayed on screen, (c) power problem, (d) mother board problem, 31. 1 long and 2 short beeps during POST, of computer., denotes, (a) video card (VGA) problem, (b) keyboard error, (c) power problem, (d) mother board problem, 32. 1 long and 3 short beeps during POST, of computer., denotes, (a) video card (EGA) problem, (b) keyboard error, (c) power problem, (d) mother board problem, 33. 3 long beeps during POST denotes, of computer., (a) video card (EGA) problem, (b) keyboard error, (c) power problem, (d) mother board problem, , 1.2.2, , BIOS settings, , ., 34. CMOS is a type of, (a) ROM, (b) DVD, (c) CD, (d) RAM, 35. CMOS is kept powered on using, ., (a) AA battery, (b) AAA battery, (c) CMOS battery (CR2032), (d) wet cell battery, 36. When CMOS battery fails, all BIOS settings are, ., (a) remembered, (b) lost, (c) maintained, (d) kept stored, 37. BIOS settings may be accessed by pressing, key immediately after, switching power supply on.
Page 32 :
26, (a), (b), (c), (d), 38., (a), (c), 39., , (a), (c), 40., (a), (c), 41., (a), (c), 42., (a), (c), 43., , (a), (c), , 1.2.3, , Prepared by: Dr.V.Nagaradjane, DEL, F2, ESC, any one of them, Usually, date, time, drive options, memory details, etc. are accessible under, menu of BIOS settings., Advanced, (b) Main, Power, (d) Boot, Usually, processor configuration, on, board settings of motherboard, USB, configuration, etc. are accessible under, menu of BIOS settings., Advanced, (b) Main, Power, (d) Boot, Usually, power options are accessible unmenu of BIOS settings., der, Advanced, (b) Main, Power, (d) Boot, Usually, UEFI settings, order of boot, media, etc., are accessible under, menu of BIOS settings., Advanced, (b) Main, Power, (d) Boot, Passwords for user and administrator of BIOS may be accessed using, menu of BIOS settings., Advanced, (b) Security, Power, (d) Boot, Options for saving or discarding changes, and exiting BIOS settings is accessible, menu of BIOS setfrom, tings., Advanced, (b) Security, Power, (d) Exit, , 46. When the menu for managing hard disk, partitions is displayed,, options help to create, delete and format, partitions., (a) New, (b) Delete, (c) Format, (d) all of them, 47. After choosing a suitable partition for, ., installation of Windows,, (a) delete that partition, (b) select that partition and press Next button, (c) press Ctrl+Alt+Delete, (d) Switch off power supply, 48. Durign installation of Windows, the, computer, after copying, files, installing features., (a) reboots, (b) keeps on processing, (c) keeps on beeping, (d) plays music, 49. During installation of Windows, user, names and passwords are entered, the operating system gets, fully ready., (a) before, (b) after, (c) only after, (d) subsequent to, 50. After completing installation of Winare to be installed, dows,, for making the computer safe and productive., (a) anti-virus, (b) Office package, (c) Adobe Reader and other application software, packages, (d) all of them, , Installation of windows operat- 1.2.4, ing system, , 44. After inserting the Windows installation, media (like CD, DVD or pen drive),, message is displayed., (a) Press any key to boot from CD/ DVD ..., (b) Press Ctrl+Alt+Delete, (c) Press left button of mouse, (d) Press centre button of mouse, 45. When Windows loads during installation,, are to be chosen first., (a) keyboard layout, (b) language selection for installation, (c) both a & b, (d) neither a nor b, , Common computer problems, and solutions, , the com51. For many problems,, puter solves the troubles., (a) rebooting, (b) selling off, (c) condemning, (d) cursing, 52. If the computer is very slow,, ., (a) unplug Internet connection, (b) open task manager (Ctrl+Shift+ESC or, Ctrl+Alt+Delete), (c) right click and end runaway programs, (d) try any one or all the techniques, 53. When the computer exhibits unpredictable behaviour,, .
Page 33 :
Q. Bank [COPA Semester - 1], , 27, , (a) remove all peripherals except keyboard, mouse (c) start print spooler service from control panel, (d) all of them, and monitor and reboot, (b) identify the erring peripheral by connecting 61. If a PC displays access violation error, each peripheral one by one, and reboots in the middle of working,, (c) try system restore to a previous date, ., (d) all of them, (a) check the RAM chip, (b) replace the RAM chip and try whether the, 54. When the PC does not boot, try, ., problem continues, (a) verify power cables, (c) both a & b, (b) check whether green LED on mother board (d) neither a nor b, glows, If the Internet connection is very slow,, (c) switch on SMPS power switch, if any, and ver- 62., ., do, ify whether the SMPS fan runs, (a) disable automatic software updates, (d) all of them, (b) stop cloud storage services like drop box, one, 55. If a computer emits beeps and halts, do, drive, iCloud, etc. from syncing on slow conto make the computer work, nection, (c) stop messenger services which have opened at, again., (a) remove RAM, clean and refix, boot time, (d), all of them, (b) remove VGA cable and reconnect, (c) remove CMOS battery (CR2032) and replace 63. If a program does not install or closes, just after install screen opens, do, it with new one, (d) all or any one of them, ., (a), check, whether, the program is compatible to, 56. If computer displays the error message, the operating system (64 bit or 32 bit), ., ”Insert boot media”, do, (a) modify BIOS settings to boot from hard disk (b) right click on setup program and choose Run, as Administrator, (b) configure the BIOS to boot from alternate in(c), try, to run the program in compatibility mode, stallation media like CD/DVD, (d), all, of, them, (c) reboot to try whether secondary boot process, 64. When there is a paper jam in printer, do, starts, (d) all of them, ., (a), switch, off, printer, 57. When boot is halted due to wrong BIOS, (b) open the lid, ., settings,, (a) press DEL, F2 or ESC key to enter BIOS set- (c) gently remove the jammed paper, (d) all of them, tings, (b) set correct date and time, (c) set correct boot order, Answers (373 - 436), (d) all of them, 58. If a computer does not switch on, do, 1. (b), 2. (a), 3. (a), 4. (a), ., 5., (d), 6., (b), 7., (c), 8. (a), (a) check power cables, 9. (b), 10. (c), 11. (d), 12. (b), (b) check whether SMPS is running, 13., (d), 14., (a), 15., (d), 16. (a), (c) switch on SMPS, if it has any switch, 17. (d), 18. (c), 19. (c), 20. (a), (d) all of them, 21. (d), 22. (c), 23. (b), 24. (a), 59. If a computer looses BIOS settings after, 25., (c), 26., (b), 27., (a), 28. (d), each power off, do, ., 29. (b), 30. (c), 31. (a), 32. (a), (a) replace CMOS battery (CR2032), 33., (b), 34., (d), 35., (c), 36. (b), (b) sell off the computer, 37. (d), 38. (b), 39. (a), 40. (c), (c) switch off the computer, 41. (d), 42. (b), 43. (d), 44. (a), (d) clean the computer, 45., (c), 46., (d), 47., (b), 48. (a), 60. If printer does not work in a computer,, 49. (a), 50. (d), 51. (a), 52. (d), do, ., (a) check PC to printer connection, 53. (d), 54. (d), 55. (d), 56. (d), (b) check whether appropriate driver has been in- 57. (d), 58. (d), 59. (a), 60. (d), stalled for the printer, 61. (c), 62. (d), 63. (d), 64. (d), , Prepared by: Dr.V.Nagaradjane
Page 34 :
28, , 1.3, 1.3.1, 1., (a), (b), (c), (d), 2., (a), (c), 3., (a), (c), 4., (a), (c), 5., (a), (c), 6., , (a), (c), 7., , (a), (c), 8., (a), (c), , 1.3.2, 9., (a), (c), 10., (a), (c), , Prepared by: Dr.V.Nagaradjane, , MS DOS and Linux, MS DOS, MS DOS stands for, ., MicroSoft Disk Operating System, MicroSecond Disk Operating System, MicroSoft Dirty Operating System, Microsoft Disk Opening System, MS DOS was first released in the year, ., 1969, (b) 1972, 1981, (d) 2000, All development activities on MS DOS, ceased in the year, ., 1969, (b) 1972, 1981, (d) 2000, The last version of MS DOS was, ., 7.0, (b) 8.0, 9.0, (d) 10.0, MS DOS executable files normally have, extension., .EXE, (b) .COM, .BAT, (d) all of them, The commands loaded to main memory along with MS DOS operating sysDOS comtem are called, mands., internal, (b) external, useless, (d) unwanted, The commands stored in a disk and, loaded to main memory only when first, DOS, invoked are called, commands., internal, (b) external, useless, (d) unwanted, If a file has .BAT extension and contains, a list of commands to be executed, the, file., file is called a, database, (b) temporary, batch, (d) shell script, , Internal DOS commands, Typical first line in a DOS batch file is, ., @ECHO OFF, (b) DIR, MD, (d) RD, The list of directories in which external DOS commands will be searched is, called, ., WINDIR, (b) PATH, HOME, (d) VER, , 11. Of, (a), (b), (c), (d), 12., , (a), (b), (c), (d), 13., (a), (c), 14., (a), (c), 15., (a), (c), 16., (a), (c), 17., (a), (b), (c), (d), 18., (a), (b), (c), (d), 19., , (a), (c), 20., , the, , following, alternatives,, command displays current, value of path variable., CLS %PATH%, PROMPT %PATH%, PAUSE %PATH%, ECHO %PATH%, A new folder (e.g.,, C, :, \U SERS\COP A\BIN ) may be, appended to PATH variable using the, ., command, SET, PATH=%PATH%;C, :, \U SERS\COP A\BIN, export, PATH=$PATH;C, :, \U SERS\COP A\BIN, CLS %PATH%;C : \U SERS\COP A\BIN, PAUSE, %PATH%;C, :, \U SERS\COP A\BIN, To clear screen contents,, command is used., VER, (b) DIR, CLS, (d) VOL, command displays version, number of MS DOS., VER, (b) DIR, CLS, (d) VOL, command displays the list of, files and directories., VER, (b) DIR, CLS, (d) VOL, command displays volume, label of given drive., VER, (b) DIR, CLS, (d) VOL, command displays current, date and gets new date for resetting., DATE, TIME, COPY, COPY CON < f ile.txt >, DATE command should be run as, to set new date., unknown user, guest user, ordinary user, Administrator, Recommended format for entering new, date using DATE command (in Indian, locale) is, ., yyy-ddd-mmm, (b) yy-dd-mm, dd-mm-yy, (d) yyy-mm-dd, command displays current, date and gets new date for resetting.
Page 35 :
Q. Bank [COPA Semester - 1], (a), (b), (c), (d), 21., (a), (b), (c), (d), 22., (a), (b), (c), (d), 23., , (a), (c), 24., (a), (b), (c), (d), 25., (a), (b), (c), (d), 26., (a), (b), (c), (d), 27., (a), (b), (c), (d), 28., (a), (c), , DATE, TIME, COPY, COPY CON < f ile.txt >, command displays current, time and gets new time for resetting., DATE, TIME, COPY, COPY CON < f ile.txt >, TIME command should be run as, to set new time., unknown user, guest user, ordinary user, Administrator, Recommended format for entering new, date using TIME command (in Indian, ., locale) is, hh:mm:ss, (b) mm:ss:hh, ss:mm:hh, (d) mm:hh:ss, command creates a text file, (named file.txt) and saves keyboard input to that file., DATE, TIME, COPY, COPY CON < f ile.txt >, To end the input to the command COPY, CON < f ile.txt > and to save text to, ., that file, enter, Ctrl+Z Ctrl+C Enter, Ctrl+X Ctrl+C Enter, Ctrl+Z Ctrl+C Shift, Ctrl+Z Ctrl+X Enter, To display the contents of a file (e.g.,, FILE.TXT) on the screen, issue the, command, ., MKDIR FILE.TXT, DEL FILE.TXT, TYPE FILE.TXT, MOVE FILE.TXT .., To create copy of an existing file, (F 1.T XT ) in a new name (F 2.T XT ),, issue the command, ., COPY F1.TXT F2.TXT, DEL F1.TXT F2.TXT, REN F1.TXT F2.TXT, ATTRIB +H F1.TXT F2.TXT, To create a copy of one file in a new, name,, command is used., MOVE, (b) REN, COPY, (d) MKDIR, , Prepared by: Dr.V.Nagaradjane, , 29, DOS com29. To delete a file,, mand is used., (a) MOVE, (b) DEL, (c) COPY, (d) MKDIR, 30. issuing the DOS command DEL *.*, ., deletes, (a) last file in the current directory, (b) parent directory, (c) current directory, (d) all files in current directory, 31. To change from one directory to another,, DOS command is, used., (a) CD, (b) MD, (c) RD, (d) ATTRIB, command may also be, 32., used in place of the DOS command CD., (a) CHDIR, (b) MKDIR, (c) RMDIR, (d) ERASE, command may also be, 33., used in place of the DOS command MD., (a) CHDIR, (b) MKDIR, (c) RMDIR, (d) ERASE, command may also be, 34., used in place of the DOS command RD., (a) CHDIR, (b) MKDIR, (c) RMDIR, (d) ERASE, command may also be, 35., used in place of the DOS command, DEL., (a) CHDIR, (b) MKDIR, (c) RMDIR, (d) ERASE, DOS, 36. To create a directory,, command may be used., (a) CD/ CHDIR, (b) MD/ MKDIR, (c) RD/ RMDIR, (d) DEL/ ERASE, DOS, 37. To remove a directory,, command may be used., (a) CD/ CHDIR, (b) MD/ MKDIR, (c) RD/ RMDIR, (d) DEL/ ERASE, command causes, 38. Issuing, commands in a batch file to be hidden., (a) ECHO OFF, (b) ECHO ON, (c) PAUSE, (d) PROMPT, command causes, 39. Issuing, commands in a batch file to be visible., (a) ECHO OFF, (b) ECHO ON, (c) PAUSE, (d) PROMPT, 40. To display the value of PATH environment variable,, of the following commands is useful., (a) SET %PATH%, (b) PAUSE %PATH%
Page 36 :
30, , Prepared by: Dr.V.Nagaradjane, , (c) DEL %PATH%, (d) ECHO %PATH%, environment variable, 41. The, in DOS contains the list of folders in, which commands would be searched., (a) PATH, (b) CLASSPATH, (c) WINDIR, (d) HOME, environment variable, 42. The, in DOS contains the name of home directory for current user., (a) PATH, (b) CLASSPATH, (c) WINDIR, (d) HOME, 43. To rename a file (X.TXT) to a new, name (Y.TXT), which of the following, commands would be suitable?, (a) COPY X.TXT Y.TXT, (b) REN X.TXT Y.TXT, (c) MKDIR X.TXT, (d) DEL X.TXT Y.TXT, 44. To hold the processing of commands till, DOS, any key is pressed,, command is used., (a) SLEEP, (b) PROMPT, (c) PAUSE, (d) SET, 45. To change the command prompt in MS, DOS,, command is used., (a) SLEEP, (b) PROMPT, (c) PAUSE, (d) SET, 46. To set value for an environment varicommand, able in MS DOS,, is used., (a) SLEEP, (b) PROMPT, (c) PAUSE, (d) SET, 47. To create a remarks line (which is ignored during processing) in MS DOS,, command is used., (a) REM, (b) PROMPT, (c) PAUSE, (d) SET, command closes the MS, 48., DOS session., (a) CLS, (b) PAUSE, (c) EXIT, (d) REM, , 1.3.3, , External DOS Commands, , command (removed in, 49. The, the latest version of MS DOS) adds, given string to the end of PATH environment variable., (a) SORT, (b) APPEND, (c) MOVE, (d) ASSIGN, command changes, 50. The, given drive to a new name., (a) SORT, (b) APPEND, , (c) MOVE, (d) ASSIGN, command changes file, 51. The, attributes like archive, hidden or readonly., (a) ATTRIB, (b) APPEND, (c) MOVE, (d) ASSIGN, 52. To hide a file (say FILE.TXT),, DOS command is used., (a) ATTRIB -A FILE.TXT, (b) ATTRIB +A FILE.TXT, (c) ATTRIB -H FILE.TXT, (d) ATTRIB +H FILE.TXT, 53. To unhide a file (say FILE.TXT),, DOS command is used., (a) ATTRIB -A FILE.TXT, (b) ATTRIB +A FILE.TXT, (c) ATTRIB -H FILE.TXT, (d) ATTRIB +H FILE.TXT, 54. To set archive attribute to file (say, DOS comFILE.TXT),, mand is used., (a) ATTRIB -A FILE.TXT, (b) ATTRIB +A FILE.TXT, (c) ATTRIB -H FILE.TXT, (d) ATTRIB +H FILE.TXT, 55. To remove archive attribute from file, DOS, (say FILE.TXT),, command is used., (a) ATTRIB -A FILE.TXT, (b) ATTRIB +A FILE.TXT, (c) ATTRIB -H FILE.TXT, (d) ATTRIB +H FILE.TXT, 56. To set a file (say FILE.TXT) to readDOS comonly mode,, mand is used., (a) ATTRIB -A FILE.TXT, (b) ATTRIB +A FILE.TXT, (c) ATTRIB +R FILE.TXT, (d) ATTRIB -R FILE.TXT, 57. To set a file (say FILE.TXT) to read, write (i.e., to remove read-only atDOS comtribute) mode,, mand is used., (a) ATTRIB -A FILE.TXT, (b) ATTRIB +A FILE.TXT, (c) ATTRIB +R FILE.TXT, (d) ATTRIB -R FILE.TXT, MS DOS command (re58., moved from latest version of MS DOS), creates a backup of all files having, archive attribute., (a) CHKDSK, (b) BACKUP, (c) COMMAND.COM (d) COMP
Page 37 :
Q. Bank [COPA Semester - 1], MS DOS command verifies file system in given drive and repairs, the file system if necessary., (a) CHKDSK, (b) BACKUP, (c) COMMAND.COM (d) COMP, MS DOS command is, 60., the DOS shell., (a) CHKDSK, (b) BACKUP, (c) COMMAND.COM (d) COMP, MS DOS command, 61., compares two files and reports any differences., (a) CHKDSK, (b) BACKUP, (c) COMMAND.COM (d) COMP, MS DOS command, 62., helps to debug a program and inspect, values stored in variables., (a) DEBUG, (b) DISKCOMP, (c) DISKCOPY, (d) DOSKEY, MS DOS command, 63., keeps history of previous DOS commands and permits navigation on pressing UP or DOWN arrows., (a) DEBUG, (b) DISKCOMP, (c) DISKCOPY, (d) DOSKEY, MS DOS command, 64., compares the contents of 2 disks and, reports the differences, if any., (a) DEBUG, (b) DISKCOMP, (c) DISKCOPY, (d) DOSKEY, MS DOS command, 65., copies the contents of one disk to another., (a) DEBUG, (b) DISKCOMP, (c) DISKCOPY, (d) DOSKEY, MS DOS command dis66., plays a visual window for accessing files, and folders., (a) DOSSHEL, (b) DISKCOMP, (c) DISKCOPY, (d) DOSKEY, MS DOS command, 67., opens a full screen editor., (a) FC, (b) EDIT, (c) EDLIN, (d) EXPAND, MS DOS command ed68., its text data line by line., (a) FC, (b) EDIT, (c) EDLIN, (d) EXPAND, MS DOS command ex69., pands a compressed file., (a) FC, (b) EDIT, (c) EDLIN, (d) EXPAND, MS DOS command, 70., compares 2 files with text or binary content., Prepared by: Dr.V.Nagaradjane, 59., , 31, (a) FC, (c) EDLIN, 71., compares 2 files., (a) FC, (c) EDLIN, 72., (a), (c), 73., (a), (c), 74., (a), (c), 75., (a), (c), 76., (a), (c), 77., (a), (c), 78., (a), (c), 79., (a), (c), 80., , (a), (c), 81., (a), , (b) EDIT, (d) EXPAND, MS DOS command, , (b) EDIT, (d) EXPAND, MS DOS command, helps to create and manage partitions, in hard disk., FDISK, (b) FORMAT, EDLIN, (d) EXPAND, MS DOS command formats (creates new file system on) given, partition., FDISK, (b) FORMAT, EDLIN, (d) EXPAND, MS DOS command displays help information about given command., FDISK, (b) FORMAT, HELP, (d) LABEL, MS DOS command displays disk label., FDISK, (b) FORMAT, HELP, (d) LABEL, MS DOS command displays volume details., VOL, (b) FORMAT, HELP, (d) LABEL, MS DOS command displays memory usage details., MOVE, (b) MEM, MIRROR, (d) MORE, MS DOS command creates a backup file for restoration of data, at a later date., MOVE, (b) MEM, MIRROR, (d) MORE, MS DOS command creates a new copy of the file and deletes, the source file., MOVE, (b) MEM, MIRROR, (d) MORE, MS DOS command, displays screen output in readable, chunks/pages., MOVE, (b) MEM, MIRROR, (d) MORE, MS DOS command, prints a file to the default printer., SCANDISK, (b) SORT
Page 38 :
32, , Prepared by: Dr.V.Nagaradjane, , (c) PRINT, 82., (a), (c), 83., (a), (c), 84., (a), (c), 85., (a), (c), 86., (a), (c), 87., (a), (c), , 1.3.4, 88., (a), (c), 89., (a), (c), 90., (a), (c), , 1.3.5, , (d) SYS, MS DOS command (removed in the latest version of MS DOS), checks and repairs files in given drive., SCANDISK, (b) SORT, PRINT, (d) SYS, MS DOS command, sorts the contents of file in alphabetic, or numerical order., SCANDISK, (b) SORT, PRINT, (d) SYS, MS DOS command, copy system files and make a disk, bootable., SCANDISK, (b) SORT, PRINT, (d) SYS, MS DOS command, displays files and folders in a tree structure., TREE, (b) UNDELETE, XCOPY, (d) MOVE, MS DOS command, restores the latest file deleted from MS, DOS file system., TREE, (b) UNDELETE, XCOPY, (d) MOVE, MS DOS command, copies files, directories and subdirectories., TREE, (b) UNDELETE, XCOPY, (d) MOVE, , Output redirection in MS DOS, redirector writes output of, a program to a new file, deleting the old, contents, if any., >, (b) >>, |, (d) none of them, redirector appends output, of a program to an existing file, creating, the file if it does not exist., >, (b) >>, |, (d) none of them, redirector sends output of, a program to another program as input., >, (b) >>, |, (d) none of them, , Wild cards in MS DOS, , 91. The *, ? characters in MS DOS are, called, ., , (a) green cards, (c) SIM cards, 92., (a), (c), 93., (a), (c), , 1.3.6, , (b) white cards, (d) wild cards, wild card matches any, number of characters in the name., *, (b) ?, &, (d) $, wild card matches a single, character., *, (b) ?, &, (d) $, , Open Source Software (OSS), , 94. Any software (paid or free), for which, source code is available is called, ., (a) open source software, (b) free software, (c) virus software, (d) hacked software, helps capable users to im95., prove and bug fix the software., (a) open source software, (b) closed source software, (c) virus software, (d) hacked software, model of software helps de96., velopers across the world to cooperate, in development of software., (a) open source software, (b) closed source software, (c) virus software, (d) hacked software, 97. An example of the most popular open, source software is, ., (a) Mozilla Firefox browser, GIMP image editor,, QCAD drafting tool, Blender 3D modelling, software, (b) Linux operating system, (c) Open office, Libre Office, KOffice, gnumeric,, AbiWord, Scribus, (d) all of them, are some of the open, 98., source licensing models., (a) GNU GPL/ GNU LGPL, (b) Apache lincense, (c) BSD/ MIT/ Eclipse/ Mozilla license, (d) all of them, ., 99. GNU GPL stands for, (a) GNU General Public License, (b) GNU Lesser General Public License, (c) GNU Not Unix, (d) GNU Image Manipulation Programme
Page 39 :
Q. Bank [COPA Semester - 1], 100. GNU LGPL stands for, and it permits embedding open source, libraries in closed source projects., (a) GNU General Public License, (b) GNU Lesser General Public License, (c) GNU Not Unix, (d) GNU Image Manipulation Programme, ., 101. GNU stands for, (a) GNU General Public License, (b) GNU Lesser General Public License, (c) GNU Not Unix, (d) GNU Image Manipulation Programme, ., 102. GIMP stands for, (a) GNU General Public License, (b) GNU Lesser General Public License, (c) GNU Not Unix, (d) GNU Image Manipulation Programme, founded the GNU project, 103., to create an alternative to UNIX operating system from scratch., (a) Richard Stallman, (b) Linus Torvalds, (c) Dennis Ritchie, (d) Brian Kernighan, created and released Linux, 104., operating system., (a) Richard Stallman, (b) Linus Torvalds, (c) Dennis Ritchie, (d) Brian Kernighan, 105. Linux operating system was released in, ., the year, (a) 1969, (b) 1972, (c) 1981, (d) 1991, 106. The core of the Linux operating system,, which manages files, peripherals and, other resources, is called, ., (a) kernel, (b) shell, (c) neither a nor b, (d) both a and b, 107. The software which helps the user to, communicate with the kernel of Linux, operating system is called, ., (a) kernel, (b) shell, (c) neither a nor b, (d) both a and b, 108. Bash in Linux shell stands for, ., (a) Bourne Again SHell, (b) C-Shell, Prepared by: Dr.V.Nagaradjane, , 33, (c) Korn-shell, (d) none of them, 109. The Linux shell having features similar to the C-Programming language is, called, ., (a) Bourne Again SHell, (b) C-Shell, (c) Korn-shell, (d) none of them, shell was released by AT&T, 110., as an improvement to the Bourne shell., (a) Bourne Again SHell, (b) C-Shell, (c) Korn-shell, (d) none of them, 111. The command csh in Linux opens, shell., (a) Bourne Again SHell, (b) C-Shell, (c) Korn-shell, (d) none of them, 112. The command ksh in Linux opens, shell., (a) Bourne Again SHell, (b) C-Shell, (c) Korn-shell, (d) none of them, 113. Any shell script begins with the line, to denote the name of the, shell to be used for interpretation., (a) #!/bin/sh, (b) #!/bin/csh, (c) #!/bin/ksh, (d) any one of them, , 1.3.7, , Linux shell commands, , 114. To display the list of files and directories,, Linux command is used., (a) ls, (b) chmod, (c) mkdir, (d) rmdir, Linux command creates a, 115., new directory., (a) ls, (b) chmod, (c) mkdir, (d) rmdir, Linux command removes, 116., given directory., (a) ls, (b) chmod, (c) mkdir, (d) rmdir, Linux command changes the, 117., access mode of a file., (a) pwd, (b) chmod, (c) mkdir, (d) rmdir
Page 40 :
34, 118. The numeric value of read permission is, ., (a) 4, (b) 2, (c) 1, (d) 0, 119. The numeric value of write permission is, ., (a) 4, (b) 2, (c) 1, (d) 0, 120. In Linux, the numeric value of execute, permission is, ., (a) 4, (b) 2, (c) 1, (d) 0, 121. In Linux, a file having read and write, permissions would have a numeric value, of, as argument to chmod., (a) 6, (b) 7, (c) 4, (d) 5, 122. In Linux, a file having read only permissions would have a numeric value of, as argument to chmod., (a) 6, (b) 7, (c) 4, (d) 5, 123. In Linux, a file having read, write and, execute permissions would have a numeric value of, as argument, to chmod., (a) 6, (b) 7, (c) 4, (d) 5, 124. In Linux, a file having read and execute, permissions would have a numeric value, as argument to chmod., of, (a) 6, (b) 7, (c) 4, (d) 5, 125. In Linux, access permission meant for, ., (a) user, (b) group, (c) world, (d) all of them, 126. In Linux, first value of permission provided to chmod command is meant for, ., (a) user, (b) group, (c) world, (d) all of them, 127. In Linux, second value of permission provided to chmod command is meant for, ., (a) user, (b) group, (c) world, (d) all of them, 128. In Linux, third value of permission provided to chmod command is meant for, ., (a) user, (b) group, (c) world, (d) all of them, 129. Any person unrelated to the current, user or the group of the current user is, treated with, permissions., , Prepared by: Dr.V.Nagaradjane, (a) user, (c) world, , (b) group, (d) all of them, Linux command creates a, 130., copy of given file in new name., (a) cp, (b) ln, (c) mv, (d) cd, Linux command creates a, 131., link to the current file (not a full copy, of the file)., (a) cp, (b) ln, (c) mv, (d) cd, Linux command deletes, 132., the source file and creates copy of the, source file in a new name., (a) cp, (b) ln, (c) mv, (d) cd, Linux command helps, 133., user to change current working directory., (a) cp, (b) ln, (c) mv, (d) cd, Linux command displays, 134., full path of the current directory., (a) cp, (b) pwd, (c) mv, (d) cd, 135. In Linux, the character . denotes, directory., (a) current, (b) parent, (c) home, (d) root, 136. In Linux, the characters .. denote, directory., (a) current, (b) parent, (c) home, (d) root, denotes, 137. In Linux, the character, directory., (a) current, (b) parent, (c) home, (d) root, 138. In Linux, the character / denotes, directory., (a) current, (b) parent, (c) home, (d) root, command is used, 139. In Linux,, to mount a new file system., (a) eject, (b) mount, (c) umount, (d) shutdown, command is used, 140. In Linux,, to unmount a new file system., (a) eject, (b) mount, (c) umount, (d) shutdown
Page 41 :
Q. Bank [COPA Semester - 1], command ejects, 141. In Linux,, removable media drive like CD/DVD, drive., (a) eject, (b) mount, (c) umount, (d) shutdown, command should, 142. In Linux,, be run as root user to shutdown the, computer., (a) eject, (b) mount, (c) umount, (d) shutdown, 143. The command shutdown − r now, the computer immediately., (a) reboots, (b) halts, (c) sleep, (d) sort, 144. The command shutdown − h now or, shutdown − P now or shutdown −, H now, the computer immediately., (a) reboots, (b) halts, (c) sleep, (d) sort, 145. The Linux command shutdown − c, the computer., (a) reboots, (b) halts, (c) sleep, (d) cancels reboot or power-off of, Linux command sorts the, 146., input., (a) reboots, (b) halts, (c) sleep, (d) sort, Linux command makes the, 147., shell to stop processing for specified duration., (a) reboots, (b) halts, (c) sleep, (d) sort, Linux command creates a, 148., single archive from specified files and directories., (a) tar, (b) zip, (c) gzip, (d) ls -l, Linux command creates, 149., zip file using given source file., (a) tar, (b) zip, (c) gzip, (d) ls -l, Linux command creates, 150., gzip file using given source file., (a) tar, (b) zip, (c) gzip, (d) ls -l, Linux command displays, 151., full information about files and directories., (a) tar, (b) zip, , Prepared by: Dr.V.Nagaradjane, , 35, (c) gzip, 152., zip file., (a) tar, (c) gunzip, 153., gzip file., (a) tar, (c) gunzip, , (d) ls -l, Linux command unzips a, (b) unzip, (d) ls -l, Linux command unpacks a, , (b) unzip, (d) ls -l, Linux command displays, 154., the output of program in readable, chunks., (a) more, (b) less, (c) both a & b, (d) neither a nor b, Linux command searches, 155., for a given file and optionally executes, given command on that file., (a) banner, (b) find, (c) rm, (d) cat, Linux command removes, 156., given file., (a) banner, (b) find, (c) rm, (d) cat, Linux command creates a, 157., large banner out of given text., (a) banner, (b) find, (c) rm, (d) cat, Linux command displays, 158., contents of text file on screen., (a) banner, (b) find, (c) rm, (d) cat, 159. The command cat − > f l.txt stores, keyboard input to a new file named, ., (a) (b) fl.txt, (c) cat, (d) none of them, >> f l.txt, 160. The command cat −, appends keyboard input to a new file, named, ., (a) (b) fl.txt, (c) cat, (d) none of them, 161. In Linux, − symbol denotes the, ., (a) standard input (keyboard), (b) mouse, (c) standard output, (d) monitor, command displays, 162. In Linux,, the current date and time., (a) time, (b) date, (c) cat, (d) man
Page 42 :
36, command dis163. In Linux,, plays help about given command (manual page)., (a) time, (b) date, (c) cat, (d) man, command displays, 164. In Linux,, time taken by a process to complete., (a) time, (b) date, (c) cat, (d) man, command invokes, 165. In Linux,, text editors., (a) vi/vim, (b) emacs, (c) gedit/nedit, (d) all of them, command com166. In Linux,, piles a C-language file to binary output., (a) cc, (b) useradd, (c) userdel, (d) passwd, command adds a, 167. In Linux,, new user., (a) cc, (b) useradd, (c) userdel, (d) passwd, command deletes, 168. In Linux,, a new user., (a) cc, (b) useradd, (c) userdel, (d) passwd, command, 169. In Linux,, changes password for given user., (a) cc, (b) useradd, (c) userdel, (d) passwd, command takes, 170. In Linux,, normal user to super user mode., (a) su, (b) cal, (c) bc, (d) cron, command helps a, 171. In Linux,, normal user to execute given command, with root privileges., (a) sudo, (b) cal, (c) bc, (d) cron, command displays, 172. In Linux,, calendar., (a) sudo, (b) cal, (c) bc, (d) cron, command displays, 173. In Linux,, binary calculator in the terminal., (a) sudo, (b) cal, (c) bc, (d) cron, command exe174. In Linux,, cutes jobs at scheduled timing., (a) sudo, (b) cal, (c) bc, (d) cron, is a text filter., 175. In Linux,, (a) sed, (b) awk, (c) perl, (d) all of them, , Prepared by: Dr.V.Nagaradjane, command, 176. In Linux,, searches the path and displays location, of a given file., (a) which, (b) file, (c) tr, (d) chown, command displays, 177. In Linux,, the type of given file., (a) which, (b) file, (c) tr, (d) chown, command trans178. In Linux,, lates given input characters to specified, equivalent characters., (a) which, (b) file, (c) tr, (d) chown, command, 179. In Linux,, changes ownership of a file to specified, owner and group., (a) which, (b) file, (c) tr, (d) chown, command, 180. In Linux,, changes ownership of a file to specified, owner and group., (a) which, (b) file, (c) tr, (d) chown, command creates, 181. In Linux,, group having specified name., (a) groupadd, (b) groupdel, (c) grep, (d) test, command deletes, 182. In Linux,, specified group., (a) groupadd, (b) groupdel, (c) grep, (d) test, command catches, 183. In Linux,, given string from the input lines or specified files., (a) groupadd, (b) groupdel, (c) grep, (d) test, command tests, 184. In Linux,, whether given condition is true or false., (a) groupadd, (b) groupdel, (c) grep, (d) test, command helps, 185. In Linux,, to make decisions., (a) if ; then ... fi, (b) if ; then... elif .. fi, (c) both a & b, (d) neither a nor b, command helps, 186. In Linux,, create looping., (a) for, (b) while, (c) both a & b
Page 43 :
Q. Bank [COPA Semester - 1], , 37, , (d) neither a nor b, command displays, 187. In Linux,, tree structure of all files and directories., (a) tree, (b) c++, (c) export, (d) clear, command clears, 188. In Linux,, the display., (a) tree, (b) c++, (c) export, (d) clear, command com189. In Linux,, piles C++ source file to binary executable file., (a) tree, (b) c++, (c) export, (d) clear, command exports, 190. In Linux,, given value to the shell environment., (a) tree, (b) c++, (c) export, (d) clear, command exports, 191. In Linux,, displays the list of currently running processes., (a) tree, (b) ps, (c) kill, (d) clear, command termi192. In Linux,, nates a process with given process id., (a) tree, (b) ps, (c) kill, (d) clear, , 1.3.8, , Special characters in Linux, , 193. Any # character in Linux, (a) starts a comment, ignored by, (b) matches all characters, (c) matches any single character, (d) sends output to a new file, 194. The * character in Linux, (a) starts a comment, ignored by, (b) matches all characters, (c) matches any single character, (d) sends output to a new file, 195. The ? character in Linux, (a) starts a comment, ignored by, (b) matches all characters, (c) matches any single character, (d) sends output to a new file, 196. The > character in Linux, (a) starts a comment, ignored by, (b) matches all characters, (c) matches any single character, (d) sends output to a new file, 197. The >> character in Linux, (a) starts a comment, ignored by, Prepared by: Dr.V.Nagaradjane, , ., shell script, , ., shell script, , ., shell script, , ., shell script, , ., shell script, , (b) matches all characters, (c) matches any single character, (d) appends output to a file, ., 198. The | character in Linux, (a) sends output of left side program to the input, of right side program, (b) matches all characters, (c) matches any single character, (d) appends output to a file, ., 199. The $? character in Linux, (a) stores exit status of previous command, (b) matches all characters, (c) matches any single character, (d) appends output to a file, 200. The & character placed at the end of, command line in Linux, ., (a) stores exit status of previous command, (b) matches all characters, (c) sends to process to the background, (d) appends output to a file, ., 201. The − character in Linux, (a) stores exit status of previous command, (b) denotes standard input, (c) sends to process to the background, (d) appends output to a file, ., 202. The ˜ character in Linux, (a) denotes home directory, (b) denotes standard input, (c) sends to process to the background, (d) appends output to a file, ., 203. The [[...]] sequence in Linux, (a) tests the enclosed condition, (b) denotes standard input, (c) sends to process to the background, (d) appends output to a file, ., 204. The ! sequence in Linux, (a) tests the enclosed condition, (b) denotes standard input, (c) negates given condition, (d) appends output to a file, ., 205. The && sequence in Linux, (a) tests the enclosed condition, (b) denotes standard input, (c) runs the right side process only if the left side, process fails, (d) runs the right side process only if the left side, process succeeds, ., 206. The || sequence in Linux, (a) tests the enclosed condition, (b) denotes standard input, (c) runs the right side process only if the left side, process fails
Page 44 :
38, , Prepared by: Dr.V.Nagaradjane, , (d) runs the right side process only if the left side, process succeeds, , Answers (437 - 642), 1. (a), 5. (d), 9. (a), 13. (c), 17. (a), 21. (b), 25. (a), 29. (b), 33. (b), 37. (c), 41. (a), 45. (b), 49. (b), 53. (c), 57. (d), 61. (d), 65. (c), 69. (d), 73. (b), 77. (b), 81. (c), 85. (a), 89. (b), , 2. (c), 6. (a), 10. (b), 14. (a), 18. (d), 22. (d), 26. (c), 30. (d), 34. (c), 38. (a), 42. (d), 46. (d), 50. (d), 54. (b), 58. (b), 62. (a), 66. (a), 70. (a), 74. (c), 78. (c), 82. (a), 86. (b), 90. (c), , 3. (d), 7. (b), 11. (d), 15. (b), 19. (c), 23. (a), 27. (a), 31. (a), 35. (d), 39. (b), 43. (b), 47. (a), 51. (a), 55. (a), 59. (a), 63. (d), 67. (b), 71. (a), 75. (d), 79. (a), 83. (b), 87. (c), 91. (d), , 4. (b), 8. (c), 12. (a), 16. (d), 20. (a), 24. (d), 28. (c), 32. (a), 36. (b), 40. (d), 44. (c), 48. (c), 52. (d), 56. (c), 60. (c), 64. (b), 68. (c), 72. (a), 76. (a), 80. (d), 84. (d), 88. (a), 92. (a), , 93. (b), 97. (d), 101. (c), 105. (d), 109. (b), 113. (d), 117. (b), 121. (a), 125. (d), 129. (c), 133. (d), 137. (c), 141. (a), 145. (d), 149. (b), 153. (c), 157. (a), 161. (a), 165. (d), 169. (d), 173. (c), 177. (b), 181. (a), 185. (c), 189. (b), 193. (a), 197. (d), 201. (b), 205. (d), , 94. (a), 98. (d), 102. (d), 106. (a), 110. (c), 114. (a), 118. (a), 122. (c), 126. (a), 130. (a), 134. (b), 138. (d), 142. (d), 146. (d), 150. (c), 154. (c), 158. (d), 162. (b), 166. (a), 170. (a), 174. (d), 178. (c), 182. (b), 186. (c), 190. (c), 194. (b), 198. (a), 202. (a), 206. (c), , 95. (a), 99. (a), 103. (a), 107. (b), 111. (b), 115. (c), 119. (b), 123. (b), 127. (b), 131. (b), 135. (a), 139. (b), 143. (a), 147. (c), 151. (d), 155. (b), 159. (b), 163. (d), 167. (b), 171. (a), 175. (d), 179. (d), 183. (c), 187. (a), 191. (b), 195. (c), 199. (a), 203. (a), , 96. (a), 100. (b), 104. (b), 108. (a), 112. (c), 116. (d), 120. (c), 124. (d), 128. (c), 132. (c), 136. (b), 140. (c), 144. (b), 148. (a), 152. (b), 156. (c), 160. (b), 164. (a), 168. (c), 172. (b), 176. (a), 180. (d), 184. (d), 188. (d), 192. (c), 196. (d), 200. (c), 204. (c)
Page 45 :
Q. Bank [COPA Semester - 1], , 1.4, 1.4.1, 1., , (a), (b), (c), (d), 2., (a), (b), (c), (d), 3., (a), (b), (c), (d), 4., (a), (b), (c), (d), 5., (a), (b), (c), (d), 6., (a), (c), 7., , (a), (c), 8., (a), (c), , MS Word, Introduction to various application in MS Office, The collection of Microsoft tools for, preparation of documents, spreadsheets,, presentations, database management,, time scheduling and mailing is called, ., MS Office, OpenOffice.org, StarOffice, LibreOffice, In MS Office,, is the software, for preparation of documents., MS Access, MS Word, MS Excel, MS Powerpoint, is the software, In MS Office,, for preparation of spreadsheets., MS Access, MS Word, MS Excel, MS Powerpoint, is the software, In MS Office,, for preparation of presentations., MS Access, MS Word, MS Excel, MS Powerpoint, is the software, In MS Office,, for preparation of databases., MS Access, MS Word, MS Excel, MS Powerpoint, is the software, In MS Office,, for managing emails., MS Access, (b) MS Publisher, MS Outlook, (d) MS Onenote, In MS Office,, is the software, for preparation of banners, ID cards,, brochures and page based professional, publications., MS Access, (b) MS Publisher, MS Outlook, (d) MS Onenote, In MS Office,, is the software, for preparation and sharing of notes., MS Access, (b) MS Publisher, MS Outlook, (d) MS Onenote, , Prepared by: Dr.V.Nagaradjane, , 39, , 1.4.2, 9., (a), (b), (c), (d), 10., (a), (b), (c), (d), 11., (a), (b), (c), (d), 12., (a), (b), (c), (d), 13., (a), (c), 14., (a), (c), 15., (a), (c), 16., (a), (b), (c), (d), 17., (a), (b), , Features of MS Word, The default extension for an MS Word, ., document is, .docx, .doc, both a & b, neither a nor b, MS Word can be used for the preparation of, ., letters, books/ reports/theses, brochures/ visiting cards, all of them, In Graphical User Interface (GUI), based programs, WYSWYG stands for, ., Whatever You See, Wherever You Get, What You See, What You Get, Whichever You See, What You Get, Wherever You See, What You Get, The paradigm of WYSWYG signifies, that, ., the printed document resembles exactly what, you see on screen, printed document is different from that on, screen, screen document is better than printed one, printed one is better than screen document, in MS Word serves as a standard typeset document for creating professional looking documents., Macro, (b) XML, Template, (d) HTML, The collection of artworks/images avail., able in MS Office is called, drawing, (b) images, cliparts, (d) tables, To create mail merged results, MS, Word can take address input from, ., MS Excel, (b) MS Access, text files, (d) all of them, In MS Word, spelling mistakes are highlighted by, ., bold text, green underline, red underline, italic text, In MS Word, grammatic errors are highlighted by, ., bold text, green underline
Page 46 :
40, , Prepared by: Dr.V.Nagaradjane, , (c) red underline, (d) italic text, to enrich, 18. MS Word can handle, a document., (a) lists, (b) images, (c) tables, (d) all of them, 19. The text or image which appears faintly, in the background of a page is called, ., (a) water mark, (b) trade mark, (c) copy right, (d) embossing, , 1.4.3, , Office button in MS Word, , 20. MS Office button is located on the, of MS Word window., (a) top right, (b) top left, (c) bottom left, (d) bottom right, is the shortcut to open Of21., fice menu of MS Word., (a) Alt + H, (b) Alt + N, (c) Alt + P, (d) Alt + F, 22. The save button is MS Office menu can, ., be accessed through, (a) Alt + F + S, (b) Ctrl + S, (c) both Alt + F + S & Ctrl + S, (d) none of them, 23. To access Save As item in Office menu, shortcut., of MS Word, use, (a) Alt + F + A, (b) Ctrl + O, (c) Ctrl + N, (d) Ctrl + P, 24. To select Open item in Office menu of, MS Word, use, shortcut., (a) Ctrl + O, (b) Alt + F + O, (c) both Ctrl + O & Alt + F + O, (d) Ctrl + S, 25. For Close item in MS Office menu, use, shortcut., (a) Alt + F + A, (b) Ctrl + O, (c) Ctrl + N, (d) Alt + F + C, 26. To select Info item in MS Office menu,, use, shortcut., (a) Alt + F + A, (b) Ctrl + O, (c) Alt + F + I, (d) Alt + F + C, 27. To view recently opened files, use, shortcut in Office menu of MS, Word., (a) Alt + F + R, (b) Ctrl + O, (c) Ctrl + F + I, (d) Ctrl + F + C, 28. To select New item in Office menu of, MS Word,, shortcut., (a) Ctrl, + S use, , (b) Ctrl + N, (c) Alt + F + N, (d) both Ctrl + N & Alt + F + N, 29. To select Print item in MS Office menu,, shortcut., use, (a) Ctrl + P, (b) Alt + F + P, (c) both Ctrl + P & Alt + F + P, (d) Ctrl + S, 30. To select Save & Send item in MS Office, menu, use, shortcut., (a) Ctrl + P, (b) Alt + F + D, (c) Alt + F + H or F 1, (d) Ctrl + S, 31. To select Help item in MS Office menu,, use, shortcut., (a) Ctrl + P, (b) Alt + F + D, (c) Alt + F + H or F 1, (d) Ctrl + S, 32. To select Options item in MS Office, shortcut., menu, use, (a) Alt + F + X, (b) Alt + F + D, (c) Alt + F + H or F 1, (d) Alt + F + T, 33. To select Exit item in MS Office menu,, shortcut., use, (a) Alt + F + X, (b) Alt + F + D, (c) Alt + F + H or F 1, (d) Alt + F + T, , 1.4.4, , Menus and toolbars in MS, Word, , 34. The first menu, containing most common tools required for preparation, of document in MS Word, is called, ., (a) Home, (b) Insert, (c) Page Layout, (d) References, 35. The tools for Clipboard, Font Style,, Paragraph Formating, Styles & Search, are contained in, menu., (a) Home, (b) Insert, (c) Page Layout, (d) References, is the shortcut for Home, 36., menu in MS Word., (a) Alt+H, (b) Alt+N, (c) Alt+P, (d) Alt+S
Page 47 :
Q. Bank [COPA Semester - 1], 37., , (a), (c), 38., (a), (c), 39., (a), (c), 40., (a), (c), 41., , (a), (c), 42., (a), (c), 43., , (a), (c), 44., (a), (c), 45., (a), (c), 46., (a), (c), 47., (a), , menu permits insertion, of tables, images, drawing objects and, hyperlinks, headers and footers in MS, Word., Home, (b) Insert, Page Layout, (d) References, is the shortcut for Insert, menu in MS Word., Alt+H, (b) Alt+N, Alt+P, (d) Alt+S, menu contains tools to, control theme, page setup, page background, paragraph & text wrap., Home, (b) Insert, Page Layout, (d) References, is the shortcut for Page, Layout menu in MS Word., Alt+H, (b) Alt+N, Alt+P, (d) Alt+S, menu contains tools related to table of contents, foot notes,, citation, bibliography, caption, index &, table of authorities., Home, (b) Insert, Page Layout, (d) References, is the shortcut for References menu in MS Word., Alt+H, (b) Alt+N, Alt+P, (d) Alt+S, menu contains tools for, creating mailings, merging mails, inserting merge fields, preview of mail merged, results, printing mail merged pages or, saving the mail merge results in a new, file., Home, (b) Mailings, Review, (d) References, is the shortcut for Mailings, menu in MS Word., Alt+H, (b) Alt+M, Alt+R, (d) Alt+S, menu contains tools for, proofing, languages, comments, tracking, changes, compare & protect., Home, (b) Mailings, Review, (d) References, is the shortcut for Review, menu in MS Word., Alt+H, (b) Alt+M, Alt+R, (d) Alt+S, menu contains tools for, document views, showing/hiding ruler,, zoom, managing windows & macros., View, (b) Mailings, , Prepared by: Dr.V.Nagaradjane, , 41, (c) Review, , (d) References, is the shortcut for View, 48., menu in MS Word., (a) Alt+W, (b) Alt+M, (c) Alt+R, (d) Alt+S, Home menu in MS Word, 49. Clipboard menu can be accessed using, ., the shortcut, (a) Alt+H+FO, (b) Ctrl+X/ Alt+H+X, (c) Ctrl+C/ Alt+H+C, (d) Ctrl+V/ Alt+H+V, 50. In MS Word, selected content can be, cut using the shortcut, ., (a) Alt+H+FO, (b) Ctrl+X/ Alt+H+X, (c) Ctrl+C/ Alt+H+C, (d) Ctrl+V/ Alt+H+V, 51. In MS Word, selected content can be, copied to clipboard using the shortcut, ., (a) Alt+H+FO, (b) Ctrl+X/ Alt+H+X, (c) Ctrl+C/ Alt+H+C, (d) Ctrl+V/ Alt+H+V, 52. In MS Word, contents of clipboard may, be pasted to the document using the, ., shortcut, (a) Alt+H+FO, (b) Ctrl+X/ Alt+H+X, (c) Ctrl+C/ Alt+H+C, (d) Ctrl+V/ Alt+H+V, 53. In MS Word, format painter may be ac., cessed using the shortcut, (a) Alt+H+FP, (b) Ctrl+X/ Alt+H+X, (c) Ctrl+C/ Alt+H+C, (d) Ctrl+V/ Alt+H+V, 54. In MS Word, font style may be accessed, using the shortcut, ., (a) Alt+H+FN, (b) Ctrl+B/ Alt+H+1, (c) Ctrl+I/ Alt+H+2, (d) Ctrl+U/ Alt+H+3, 55. In MS Word, bold font style may be accessed using the shortcut, ., (a) Alt+H+FN, (b) Ctrl+B/ Alt+H+1, (c) Ctrl+I/ Alt+H+2, (d) Ctrl+U/ Alt+H+3
Page 48 :
42, 56. In MS Word, italic font style may be accessed using the shortcut, ., (a) Alt+H+FN, (b) Ctrl+B/ Alt+H+1, (c) Ctrl+I/ Alt+H+2, (d) Ctrl+U/ Alt+H+3, 57. In MS Word, underline font style may be, accessed using the shortcut, ., (a) Alt+H+FN, (b) Ctrl+B/ Alt+H+1, (c) Ctrl+I/ Alt+H+2, (d) Ctrl+U/ Alt+H+3, 58. In MS Word, subscript font style may be, ., accessed using the shortcut, (a) Alt+H+4, (b) Ctrl+Plus/ Alt+H+5, (c) Ctrl+Shift+Plus/ Alt+H+6, (d) Alt+H+FF, 59. In MS Word, superscript font style, may be accessed using the shortcut, ., (a) Alt+H+4, (b) Ctrl+Plus/ Alt+H+5, (c) Ctrl+Shift+Plus/ Alt+H+6, (d) Alt+H+FF, 60. In MS Word, font name may be accessed, ., using the shortcut, (a) Alt+H+4, (b) Ctrl+Plus/ Alt+H+5, (c) Ctrl+Shift+Plus/ Alt+H+6, (d) Alt+H+FF, 61. In MS Word, strike through font style, may be accessed using the shortcut, ., (a) Alt+H+4, (b) Ctrl+Plus/ Alt+H+5, (c) Ctrl+Shift+Plus/ Alt+H+6, (d) Alt+H+FF, 62. In MS Word, font size may be accessed, ., using the shortcut, (a) Alt+H+FC, (b) Ctrl+Plus/ Alt+H+5, (c) Ctrl+Shift+Plus/ Alt+H+6, (d) Alt+H+FS, 63. In MS Word, fill color may be accessed, using the shortcut, ., (a) Alt+H+FC, (b) Ctrl+Plus/ Alt+H+5, (c) Ctrl+Shift+Plus/ Alt+H+6, (d) Alt+H+FS, 64. In MS Word, paragraph formating, may be accessed using the shortcut, ., , Prepared by: Dr.V.Nagaradjane, (a) Alt+H+U, (b) Alt+H+N, (c) Alt+H+M, (d) Alt+H+PG, 65. In MS Word, bullets may be accessed, ., using the shortcut, (a) Alt+H+U, (b) Alt+H+N, (c) Alt+H+M, (d) Alt+H+PG, 66. In MS Word, numbering may be accessed using the shortcut, ., (a) Alt+H+U, (b) Alt+H+N, (c) Alt+H+M, (d) Alt+H+PG, 67. In MS Word, multi-level list may be accessed using the shortcut, ., (a) Alt+H+U, (b) Alt+H+N, (c) Alt+H+M, (d) Alt+H+PG, 68. In MS Word, left alignment of paragraph may be accessed using the shortcut, ., (a) Ctrl+L/ Alt+H+AL, (b) Ctrl+J/ Alt+H+AJ, (c) Ctrl+E/ Alt+H+AC, (d) Ctrl+R/ Alt+H+AR, 69. In MS Word, right alignment of paragraph may be accessed using the short., cut, (a) Ctrl+L/ Alt+H+AL, (b) Ctrl+J/ Alt+H+AJ, (c) Ctrl+E/ Alt+H+AC, (d) Ctrl+R/ Alt+H+AR, 70. In MS Word, centre alignment of paragraph may be accessed using the short., cut, (a) Ctrl+L/ Alt+H+AL, (b) Ctrl+J/ Alt+H+AJ, (c) Ctrl+E/ Alt+H+AC, (d) Ctrl+R/ Alt+H+AR, 71. In MS Word, justified alignment of paragraph may be accessed using the short., cut, (a) Ctrl+L/ Alt+H+AL, (b) Ctrl+J/ Alt+H+AJ, (c) Ctrl+E/ Alt+H+AC, (d) Ctrl+R/ Alt+H+AR, 72. In MS Word, line spacing of paragraph, may be accessed using the shortcut, ., (a) Alt+H+K, (b) Alt+H+B, (c) Alt+H+H, (d) Alt+H+AO, 73. In MS Word, borders may be accessed, using the shortcut, ., (a) Alt+H+K, (b) Alt+H+B, (c) Alt+H+H, (d) Alt+H+AO, 74. In MS Word, fill colour may be accessed, using the shortcut, .
Page 49 :
Q. Bank [COPA Semester - 1], (a) Alt+H+K, (b) Alt+H+B, (c) Alt+H+H, (d) Alt+H+AO, 75. In MS Word, indent may be decreased, ., using the shortcut, (a) Alt+H+AI, (b) Alt+H+B, (c) Alt+H+H, (d) Alt+H+AO, 76. In MS Word, indent may be increased, using the shortcut, ., (a) Alt+H+AI, (b) Alt+H+B, (c) Alt+H+H, (d) Alt+H+AO, 77. In MS Word, styles dialog may be, changed using the shortcut, ., (a) Alt+H+FY, (b) Alt+H+L, (c) Alt+H+G, (d) Ctrl+F/ Alt+H+FD, 78. In MS Word, styles may be changed using the shortcut, ., (a) Alt+H+FY, (b) Alt+H+L, (c) Alt+H+G, (d) Ctrl+F/ Alt+H+FD, 79. In MS Word, normal style may be set, ., using the shortcut, (a) Alt+H+FY, (b) Alt+H+L, (c) Alt+H+G, (d) Ctrl+F/ Alt+H+FD, 80. In MS Word, search and find may be, ., accessed using the shortcut, (a) Ctrl+H/ Alt+H+R, (b) Alt+H+SL, (c) Ctrl+A/ Alt+H+SL+A, (d) Ctrl+F/ Alt+H+FD, 81. In MS Word, search and replace may be, accessed using the shortcut, ., (a) Ctrl+H/ Alt+H+R, (b) Alt+H+SL, (c) Ctrl+A/ Alt+H+SL+A, (d) Ctrl+F/ Alt+H+FD, 82. In MS Word, text selection may be accessed using the shortcut, ., (a) Ctrl+H/ Alt+H+R, (b) Alt+H+SL, (c) Ctrl+A/ Alt+H+SL+A, (d) Ctrl+F/ Alt+H+FD, 83. In MS Word, select all may be accessed, using the shortcut, ., (a) Ctrl+H/ Alt+H+R, (b) Alt+H+SL, (c) Ctrl+A/ Alt+H+SL+A, (d) Ctrl+F/ Alt+H+FD, Prepared by: Dr.V.Nagaradjane, , 43, Insert menu in MS Word, 84. In MS Word, cover page may be inserted, ., using the shortcut, (a) Alt+N+NP, (b) Alt+N+V, (c) Alt+N+B, (d) Alt+N+T, 85. In MS Word, blank page may be inserted, using the shortcut, ., (a) Alt+N+NP, (b) Alt+N+V, (c) Alt+N+B, (d) Alt+N+T, 86. In MS Word, page break may be inserted, using the shortcut, ., (a) Alt+N+NP, (b) Alt+N+V, (c) Alt+N+B, (d) Alt+N+T, 87. In MS Word, table may be inserted using, ., the shortcut, (a) Alt+N+T+I, (b) Alt+N+D, (c) Alt+N+T+V, (d) Alt+N+T, 88. In MS Word, text with column separation by TAB and row separation by, NEWLINE may be converted to table, using the shortcut, ., (a) Alt+N+T+I, (b) Alt+N+D, (c) Alt+N+T+V, (d) Alt+N+T, 89. In MS Word, table may be created by, drawing on screen using the shortcut, ., (a) Alt+N+T+I, (b) Alt+N+D, (c) Alt+N+T+V, (d) Alt+N+T, 90. In MS Word, table may be created by, choosing rows and columns using the, ., shortcut, (a) Alt+N+T+I, (b) Alt+N+D, (c) Alt+N+T+V, (d) Alt+N+T, 91. In MS Word, Excel spreadsheet may, be inserted as table using the shortcut, ., (a) Alt+N+T+I, (b) Alt+N+D, (c) Alt+N+T+X, (d) Alt+N+T+T, 92. In MS Word, quick table from ready, made templates may be inserted using, the shortcut, ., (a) Alt+N+T+I, (b) Alt+N+D, (c) Alt+N+T+X, (d) Alt+N+T+T, 93. In MS Word, pictures may be inserted, using the shortcut, ., (a) Alt+N+P, (b) Alt+N+F, (c) Alt+N+SH, (d) Alt+N+C, 94. In MS Word, clip arts may be inserted, using the shortcut, ., (a) Alt+N+P, (b) Alt+N+F, (c) Alt+N+SH, (d) Alt+N+C
Page 50 :
44, 95. In MS Word, shapes like line, rectangle,, circle, text box, etc. may be inserted, using the shortcut, ., (a) Alt+N+P, (b) Alt+N+F, (c) Alt+N+SH, (d) Alt+N+C, 96. In MS Word, chart may be inserted using, ., the shortcut, (a) Alt+N+P, (b) Alt+N+F, (c) Alt+N+SH, (d) Alt+N+C, 97. In MS Word, smart art may be inserted, using the shortcut, ., (a) Alt+N+P, (b) Alt+N+M, (c) Alt+N+SC, (d) Alt+N+C, 98. In MS Word, screen shot may be in., serted using the shortcut, (a) Alt+N+P, (b) Alt+N+M, (c) Alt+N+SC, (d) Alt+N+C, 99. In MS Word, hyper link may be inserted, ., using the shortcut, (a) Alt+N+I, (b) Alt+N+K, (c) Alt+N+RF, (d) Alt+N+H, 100. In MS Word, bookmark may be inserted, using the shortcut, ., (a) Alt+N+I, (b) Alt+N+K, (c) Alt+N+RF, (d) Alt+N+H, 101. In MS Word, cross references may be in., serted using the shortcut, (a) Alt+N+I, (b) Alt+N+K, (c) Alt+N+RF, (d) Alt+N+H, 102. In MS Word, header may be inserted using the shortcut, ., (a) Alt+N+NU, (b) Alt+N+X, (c) Alt+N+O, (d) Alt+N+H, 103. In MS Word, footer may be inserted using the shortcut, ., (a) Alt+N+NU, (b) Alt+N+X, (c) Alt+N+O, (d) Alt+N+H, 104. In MS Word, page number may be inserted using the shortcut, ., (a) Alt+N+NU, (b) Alt+N+X, (c) Alt+N+O, (d) Alt+N+H, 105. In MS Word, text box may be inserted, using the shortcut, ., (a) Alt+N+NU, (b) Alt+N+X, (c) Alt+N+O, (d) Alt+N+H, 106. In MS Word, word art may be inserted, using the shortcut, ., (a) Alt+N+Q, (b) Alt+N+X, (c) Alt+N+I, (d) Alt+N+RC, 107. In MS Word, quick parts may be inserted, using the shortcut, ., (a) Alt+N+Q, (b) Alt+N+X, (c) Alt+N+I, (d) Alt+N+RC, , Prepared by: Dr.V.Nagaradjane, 108. In MS Word, drop cap may be inserted, ., using the shortcut, (a) Alt+N+Q, (b) Alt+N+X, (c) Alt+N+I, (d) Alt+N+RC, 109. In MS Word, signature may be inserted, using the shortcut, ., (a) Alt+N+G, (b) Alt+N+D, (c) Alt+N+J, (d) Alt+N+RC, 110. In MS Word, date & time may be in., serted using the shortcut, (a) Alt+N+G, (b) Alt+N+D, (c) Alt+N+J, (d) Alt+N+RC, 111. In MS Word, object may be inserted using the shortcut, ., (a) Alt+N+G, (b) Alt+N+D, (c) Alt+N+J, (d) Alt+N+RC, 112. In MS Word, equations may be inserted, using the shortcut, ., (a) Alt+N+U/ Alt+N+U+M, (b) Alt+N+D, (c) Alt+N+J, (d) Alt+N+E/ Alt+N+E+I, 113. In MS Word, symbols and special characters may be inserted using the short., cut, (a) Alt+N+U/ Alt+N+U+M, (b) Alt+N+D, (c) Alt+N+J, (d) Alt+N+E/ Alt+N+E+I, Page Layout menu in MS Word, 114. In MS Word, document theme may be, ., accessed using the shortcut, (a) Alt+P+TH, (b) Alt+P+TC, (c) Alt+P+TF, (d) Alt+P+TE, 115. In MS Word, document colors may be, ., accessed using the shortcut, (a) Alt+P+TH, (b) Alt+P+TC, (c) Alt+P+TF, (d) Alt+P+TE, 116. In MS Word, document fonts may be, accessed using the shortcut, ., (a) Alt+P+TH, (b) Alt+P+TC, (c) Alt+P+TF, (d) Alt+P+TE, 117. In MS Word, document effects may be, accessed using the shortcut, ., (a) Alt+P+TH, (b) Alt+P+TC, (c) Alt+P+TF, (d) Alt+P+TE, 118. In MS Word, page setup may be accessed using the shortcut, ., (a) Alt+P+SP, (b) Alt+P+M, (c) Alt+P+O, (d) Alt+P+SZ
Page 51 :
Q. Bank [COPA Semester - 1], 119. In MS Word, margins of page may be, modified using the shortcut, ., (a) Alt+P+SP, (b) Alt+P+M, (c) Alt+P+O, (d) Alt+P+SZ, 120. In MS Word, orientation of page may be, ., modified using the shortcut, (a) Alt+P+SP, (b) Alt+P+M, (c) Alt+P+O, (d) Alt+P+SZ, 121. In MS Word, size of page may be modified using the shortcut, ., (a) Alt+P+SP, (b) Alt+P+M, (c) Alt+P+O, (d) Alt+P+SZ, 122. In MS Word, columns in page may be, ., modified using the shortcut, (a) Alt+P+J/ Alt+P+J+C, (b) Alt+P+B, (c) Alt+P+LN, (d) Alt+P+H, 123. In MS Word, page breaks may be mod., ified using the shortcut, (a) Alt+P+J/ Alt+P+J+C, (b) Alt+P+B, (c) Alt+P+LN, (d) Alt+P+H, 124. In MS Word, line number may be inserted or removed using the shortcut, ., (a) Alt+P+J/ Alt+P+J+C, (b) Alt+P+B, (c) Alt+P+LN, (d) Alt+P+H, 125. In MS Word, hyphenation may be inserted or removed using the shortcut, ., (a) Alt+P+J/ Alt+P+J+C, (b) Alt+P+B, (c) Alt+P+LN, (d) Alt+P+H, 126. In MS Word, paragraph layout may be, ., accessed using the shortcut, (a) Alt+P+PG, (b) Alt+P+IL, (c) Alt+P+IR, (d) Alt+P+SB, 127. In MS Word, left indent may be accessed, using the shortcut, ., (a) Alt+P+SA, (b) Alt+P+IL, (c) Alt+P+IR, (d) Alt+P+SB, 128. In MS Word, right indent may be accessed using the shortcut, ., (a) Alt+P+SA, (b) Alt+P+IL, (c) Alt+P+IR, (d) Alt+P+SB, 129. In MS Word, spacing before paragraph, may be accessed using the shortcut, (a) Alt+P+SA., (b) Alt+P+IL, Prepared by: Dr.V.Nagaradjane, , 45, (c) Alt+P+IR, (d) Alt+P+SB, 130. In MS Word, spacing after paragraph, may be accessed using the shortcut, ., (a) Alt+P+SA, (b) Alt+P+IL, (c) Alt+P+IR, (d) Alt+P+SB, 131. In MS Word, objects may be arranged in, position using the shortcut, ., (a) Alt+P+PO, (b) Alt+P+TW, (c) Alt+P+AF, (d) Alt+P+AE, 132. In MS Word, text wrapping may be ac., cessed using the shortcut, (a) Alt+P+PO, (b) Alt+P+TW, (c) Alt+P+AF, (d) Alt+P+AE, 133. In MS Word, bring forward may be accessed using the shortcut, ., (a) Alt+P+PO, (b) Alt+P+TW, (c) Alt+P+AF, (d) Alt+P+AE, 134. In MS Word, selection pane may be ac., cessed using the shortcut, (a) Alt+P+AP, (b) Alt+P+TW, (c) Alt+P+AF, (d) Alt+P+AE, 135. In MS Word, paragraph selection may be, accessed using the shortcut, ., (a) Alt+P+AP, (b) Alt+P+AA, (c) Alt+P+G, (d) Alt+P+AY, 136. In MS Word, alignment of page may be, accessed using the shortcut, ., (a) Alt+P+AP, (b) Alt+P+AA, (c) Alt+P+G, (d) Alt+P+AY, 137. In MS Word, grouping of objects may be, ., accessed using the shortcut, (a) Alt+P+AP, (b) Alt+P+AA, (c) Alt+P+G, (d) Alt+P+AY, 138. In MS Word, object rotation may be accessed using the shortcut, ., (a) Alt+P+AP, (b) Alt+P+AA, (c) Alt+P+G, (d) Alt+P+AY, References menu in MS Word, 139. In MS Word, table of contents may be, inserted using the shortcut, ., (a) Alt+S+A, (b) Alt+S+T, (c) Alt+S+U, (d) Alt+S+Q, 140. In MS Word, add text may be accessed, using the shortcut, ., (a) Alt+S+A, (b) Alt+S+T, (c) Alt+S+U, (d) Alt+S+Q, 141. In MS Word, table of contents may be, updated using the shortcut, ., (a) Alt+S+A, (b) Alt+S+T
Page 52 :
46, (c) Alt+S+U, (d) Alt+S+Q, 142. In MS Word, foot notes dialog may be, accessed using the shortcut, ., (a) Alt+S+A, (b) Alt+S+T, (c) Alt+S+U, (d) Alt+S+Q, 143. In MS Word, foot notes may be inserted, ., using the shortcut, (a) Alt+S+F, (b) Alt+S+E, (c) Alt+S+O, (d) Alt+S+H, 144. In MS Word, end notes may be inserted, using the shortcut, ., (a) Alt+S+F, (b) Alt+S+E, (c) Alt+S+O, (d) Alt+S+H, 145. In MS Word, next foot notes may be, ., inserted using the shortcut, (a) Alt+S+F, (b) Alt+S+E, (c) Alt+S+O, (d) Alt+S+H, 146. In MS Word, show notes (to view all, foot/end notes) may be accessed using, the shortcut, ., (a) Alt+S+F, (b) Alt+S+E, (c) Alt+S+O, (d) Alt+S+H, 147. In MS Word, citation may be inserted, ., using the shortcut, (a) Alt+S+C, (b) Alt+S+M, (c) Alt+S+L, (d) Alt+S+B, 148. In MS Word, manage citation sources, dialog may be accessed using the short., cut, (a) Alt+S+C, (b) Alt+S+M, (c) Alt+S+L, (d) Alt+S+B, 149. In MS Word, bibliography may be accessed using the shortcut, ., (a) Alt+S+C, (b) Alt+S+M, (c) Alt+S+L, (d) Alt+S+B, 150. In MS Word, citation style be accessed, ., using the shortcut, (a) Alt+S+C, (b) Alt+S+M, (c) Alt+S+L, (d) Alt+S+B, 151. In MS Word, insert caption may be accessed using the shortcut, ., (a) Alt+S+P, (b) Alt+S+G, (c) Alt+S+V, (d) Alt+S+RF, 152. In MS Word, table of figures may be, inserted using the shortcut, ., (a) Alt+S+P, (b) Alt+S+G, (c) Alt+S+V, (d) Alt+S+RF, 153. In MS Word, table of figures may be, updated using the shortcut, ., (a) Alt+S+P, (b) Alt+S+G, (c) Alt+S+V, (d) Alt+S+RF, 154. In MS Word, cross references may be, inserted using the shortcut, ., , Prepared by: Dr.V.Nagaradjane, (a) Alt+S+P, (b) Alt+S+G, (c) Alt+S+V, (d) Alt+S+RF, 155. In MS Word, mark entry under references menu may be accessed using the, ., shortcut, (a) Alt+S+N, (b) Alt+S+X, (c) Alt+S+D, (d) Alt+S+I, 156. In MS Word, insert index under references menu may be accessed using the, shortcut, ., (a) Alt+S+N, (b) Alt+S+X, (c) Alt+S+D, (d) Alt+S+I, 157. In MS Word, update index under references menu may be accessed using the, ., shortcut, (a) Alt+S+N, (b) Alt+S+X, (c) Alt+S+D, (d) Alt+S+I, 158. In MS Word, mark citation under references menu may be accessed using the, shortcut, ., (a) Alt+S+N, (b) Alt+S+X, (c) Alt+S+D, (d) Alt+S+I, 159. In MS Word, insert table of authorities, under references menu may be accessed, ., using the shortcut, (a) Alt+S+RT, (b) Alt+S+RU, (c) Alt+S+D, (d) Alt+S+I, 160. In MS Word, update table of authorities, under references menu may be accessed, ., using the shortcut, (a) Alt+S+RT, (b) Alt+S+RU, (c) Alt+S+D, (d) Alt+S+I, Mailings menu in MS Word, menu contains items required for mail merge functionality in, MS Word., (a) Home, (b) Insert, (c) Mailings, (d) Reference, is the shortcut to create en162., velops using Mailings menu in MS Word., (a) Alt+M+E, (b) Alt+M+L, (c) Alt+M+S, (d) Alt+M+R, is the shortcut to create la163., bels using Mailings menu in MS Word., (a) Alt+M+E, (b) Alt+M+L, (c) Alt+M+S, (d) Alt+M+R, is the shortcut to start mail, 164., merge in MS Word., (a) Alt+M+E, (b) Alt+M+L, (c) Alt+M+S, (d) Alt+M+R, 161.
Page 53 :
Q. Bank [COPA Semester - 1], is the shortcut to select, the list of recipients for mailings in MS, Word., (a) Alt+M+E, (b) Alt+M+L, (c) Alt+M+S, (d) Alt+M+R, is the shortcut to type new, 166., list of recipients for Mailings in MS, Word., (a) Alt+M+R+E, (b) Alt+M+R+N, (c) Alt+M+R+O, (d) Alt+M+D, is the shortcut to use exist167., ing list of recipients for Mailings in MS, Word., (a) Alt+M+R+E, (b) Alt+M+R+N, (c) Alt+M+R+O, (d) Alt+M+D, is the shortcut to use con168., tacts from Outlook Express for Mailings, in MS Word., (a) Alt+M+R+E, (b) Alt+M+R+N, (c) Alt+M+R+O, (d) Alt+M+D, is the shortcut to edit the, 169., list of recipients for Mailings in MS, Word., (a) Alt+M+R+E, (b) Alt+M+R+N, (c) Alt+M+R+O, (d) Alt+M+D, is the shortcut to highlight, 170., merge fields of Mailings in MS Word., (a) Alt+M+H, (b) Alt+M+A, (c) Alt+M+G, (d) Alt+M+I, is the shortcut to open ad171., dress book for Mailings in MS Word., (a) Alt+M+H, (b) Alt+M+A, (c) Alt+M+G, (d) Alt+M+I, is the shortcut to open, 172., greeting line for Mailings in MS Word., (a) Alt+M+H, (b) Alt+M+A, (c) Alt+M+G, (d) Alt+M+I, is the shortcut to insert, 173., merge field for Mailings in MS Word., (a) Alt+M+H, (b) Alt+M+A, (c) Alt+M+G, (d) Alt+M+I, is the shortcut to rules for, 174., Mailings in MS Word., (a) Alt+M+U, (b) Alt+M+A, (c) Alt+M+B, (d) Alt+M+T, is the shortcut to match, 175., fields for Mailings in MS Word., (a) Alt+M+U, (b) Alt+M+A, (c) Alt+M+B, (d) Alt+M+T, is the shortcut to update, 176., labels for Mailings in MS Word., (a) Alt+M+U, (b) Alt+M+A, (c) Alt+M+B, (d) Alt+M+T, 165., , Prepared by: Dr.V.Nagaradjane, , 47, is the shortcut to preview, results for Mailings in MS Word., (a) Alt+M+W, (b) Alt+M+P, (c) Alt+M+Q, (d) Alt+M+M, is the shortcut to preview, 178., results of the first record for Mailings in, MS Word., (a) Alt+M+W, (b) Alt+M+P, (c) Alt+M+Q, (d) Alt+M+M, is the shortcut to preview, 179., mail merge results of the last record for, Mailings in MS Word., (a) Alt+M+W, (b) Alt+M+X, (c) Alt+M+V, (d) Alt+M+M, is the shortcut to preview, 180., results of previous record for Mailings in, MS Word., (a) Alt+M+W, (b) Alt+M+P, (c) Alt+M+Q, (d) Alt+M+M, is the shortcut to set the, 181., record number to preview results for, Mailings in MS Word., (a) Alt+M+W, (b) Alt+M+P, (c) Alt+M+Q, (d) Alt+M+M, is the shortcut to preview, 182., mail merge results of the next record for, Mailings in MS Word., (a) Alt+M+F, (b) Alt+M+X, (c) Alt+M+V, (d) Alt+M+M, is the shortcut to finish and, 183., merge for Mailings in MS Word., (a) Alt+M+F, (b) Alt+M+X, (c) Alt+M+V, (d) Alt+M+M, 177., , Review menu in MS Word, is the shortcut for spelling, and grammar corrections under review, menu in MS Word., (a) Alt+R+R, (b) Alt+R+E, (c) Alt+R+S, (d) Alt+R+W, is the shortcut for research, 185., under review menu in MS Word., (a) Alt+R+R, (b) Alt+R+E, (c) Alt+R+S, (d) Alt+R+W, is the shortcut for word, 186., count under review menu in MS Word., (a) Alt+R+R, (b) Alt+R+E, (c) Alt+R+S, (d) Alt+R+W, is the shortcut for the187., saurus under review menu in MS Word., (a) Alt+R+R, (b) Alt+R+E, (c) Alt+R+S, (d) Alt+R+W, 184.
Page 54 :
48, is the shortcut for languages under review menu in MS Word., (a) Alt+R+R, (b) Alt+R+T, (c) Alt+R+S, (d) Alt+R+U, is the shortcut for translate, 189., under review menu in MS Word., (a) Alt+R+R, (b) Alt+R+T, (c) Alt+R+S, (d) Alt+R+U, is the shortcut for new, 190., comment under review menu in MS, Word., (a) Alt+R+C, (b) Alt+R+D, (c) Alt+R+V, (d) Alt+R+N, is the shortcut for delete, 191., comment under review menu in MS, Word., (a) Alt+R+C, (b) Alt+R+D, (c) Alt+R+V, (d) Alt+R+N, is the shortcut for next, 192., record of comment under review menu, in MS Word., (a) Alt+R+C, (b) Alt+R+D, (c) Alt+R+V, (d) Alt+R+N, is the shortcut for previous, 193., record of comment under review menu, in MS Word., (a) Alt+R+C, (b) Alt+R+D, (c) Alt+R+V, (d) Alt+R+N, is the shortcut to track, 194., changes under review menu in MS Word., (a) Alt+R+G, (b) Alt+R+TD, (c) Alt+R+TM, (d) Alt+R+TP, is the shortcut to show, 195., markup under review menu in MS Word., (a) Alt+R+G, (b) Alt+R+TD, (c) Alt+R+TM, (d) Alt+R+TP, is the shortcut to show final, 196., markup under review menu in MS Word., (a) Alt+R+G, (b) Alt+R+TD, (c) Alt+R+TM, (d) Alt+R+TP, is the shortcut to show re197., viewing pane under review menu in MS, Word., (a) Alt+R+G, (b) Alt+R+TD, (c) Alt+R+TM, (d) Alt+R+TP, is the shortcut to accept, 198., changes under review menu in MS Word., (a) Alt+R+A, (b) Alt+R+J, (c) Alt+R+F, (d) Alt+R+H, is the shortcut to reject, 199., changes under review menu in MS Word., (a) Alt+R+A, (b) Alt+R+J, (c) Alt+R+F, (d) Alt+R+H, 188., , Prepared by: Dr.V.Nagaradjane, is the shortcut to navigate, to previous change under review menu, in MS Word., (a) Alt+R+A, (b) Alt+R+J, (c) Alt+R+F, (d) Alt+R+H, is the shortcut to navigate, 201., to next change under review menu in MS, Word., (a) Alt+R+A, (b) Alt+R+J, (c) Alt+R+F, (d) Alt+R+H, is the shortcut to compare, 202., documents under review menu in MS, Word., (a) Alt+R+M, (b) Alt+R+PB, (c) Alt+R+PE, (d) Alt+R+H, is the shortcut to block au203., thors under review menu in MS Word., (a) Alt+R+M, (b) Alt+R+PB, (c) Alt+R+PE, (d) Alt+R+H, is the shortcut to restrict, 204., editing under review menu in MS Word., (a) Alt+R+M, (b) Alt+R+PB, (c) Alt+R+PE, (d) Alt+R+H, 200., , Review menu in MS Word, 205. Document view may be changed to Page, shortcut in, Layout using, View menu of MS Word., (a) Alt+W+P, (b) Alt+W+F, (c) Alt+W+L, (d) Alt+W+U, 206. Document view may be changed to full, shortscreen reading using, cut in View menu of MS Word., (a) Alt+W+P, (b) Alt+W+F, (c) Alt+W+L, (d) Alt+W+U, 207. Document view may be changed to web, layout using, shortcut in, View menu of MS Word., (a) Alt+W+P, (b) Alt+W+F, (c) Alt+W+L, (d) Alt+W+U, 208. Document view may be changed to outshortcut in, line layout using, View menu of MS Word., (a) Alt+W+P, (b) Alt+W+F, (c) Alt+W+L, (d) Alt+W+U, 209. Document view may be changed to draft, layout using, shortcut in, View menu of MS Word., (a) Alt+W+P, (b) Alt+W+F, (c) Alt+W+E, (d) Alt+W+U, 210. Ruler may be set visible or invisible using, shortcut in MS Word., (a) Alt+W+R, (b) Alt+W+G
Page 55 :
Q. Bank [COPA Semester - 1], (c) Alt+W+K, (d) Alt+W+Q, 211. Grid lines may be set visible or invisible using, shortcut in MS, Word., (a) Alt+W+R, (b) Alt+W+G, (c) Alt+W+K, (d) Alt+W+Q, 212. Navigation pane may be set visible or, shortcut in, invisible using, MS Word., (a) Alt+W+R, (b) Alt+W+G, (c) Alt+W+K, (d) Alt+W+Q, 213. Zoom options dialog may be opened using, shortcut in MS Word., (a) Alt+W+R, (b) Alt+W+G, (c) Alt+W+K, (d) Alt+W+Q, 214. Zoom level may be set to 100% using, shortcut in MS Word., (a) Alt+W+J, (b) Alt+W+1, (c) Alt+W+2, (d) Alt+W+I, 215. Zoom level may be adjusted to width of, single page using, shortcut, in MS Word., (a) Alt+W+J, (b) Alt+W+1, (c) Alt+W+2, (d) Alt+W+I, 216. Zoom level may be adjusted to width of, shortcut, two pages using, in MS Word., (a) Alt+W+J, (b) Alt+W+1, (c) Alt+W+2, (d) Alt+W+I, 217. Zoom level may be adjusted to full page, shortcut in, width using, MS Word., (a) Alt+W+J, (b) Alt+W+1, (c) Alt+W+2, (d) Alt+W+I, 218. New MS Word window may be opened, using, shortcut in MS, Word., (a) Alt+W+N, (b) Alt+W+A, (c) Alt+W+S, (d) Alt+W+B, 219. All open windows may be arranged sideby-side using, shortcut in, MS Word., (a) Alt+W+N, (b) Alt+W+A, (c) Alt+W+S, (d) Alt+W+B, 220. Current window may be split to 2 parts, to enable viewing of different sections, of the document at the same time using, shortcut in MS Word., (a) Alt+W+N, (b) Alt+W+A, (c) Alt+W+S, (d) Alt+W+B, 221. 2 documents may be opened side by, side using, shortcut in MS, Word., (a) Alt+W+N, (b) Alt+W+A, Prepared by: Dr.V.Nagaradjane, , 49, (c) Alt+W+S, (d) Alt+W+B, 222. Scrolling on 2 documents opened side, by side may be synchronized using, shortcut in MS Word., (a) Alt+W+YS, (b) Alt+W+T, (c) Alt+W+S, (d) Alt+W+W, 223. Window positions of 2 side by side documents may be reset to equal proportion using, shortcut in MS, Word., (a) Alt+W+YS, (b) Alt+W+T, (c) Alt+W+S, (d) Alt+W+W, 224. Cursor focus may be switched from, one window to another window using, shortcut in MS Word., (a) Alt+W+YS, (b) Alt+W+T, (c) Alt+W+S, (d) Alt+W+W, 225. Macros may be recorded using, shortcut in MS Word., (a) Alt+W+YS, (b) Alt+W+T, (c) Alt+W+M, (d) Alt+W+W, 226. A set of VBA instructions to assist in, carrying out recurring activities in is, ., called, (a) mail merge, (b) macro, (c) thesaurus, (d) spell check, for, 227. Macro may be assigned a, convenient invocation., (a) keyboard shortcut, (b) a button on office menu, (c) either keyboard shortcut or a button in office, menu, (d) neither keyboard shortcut nor a button in office, menu, for, 228. Macro may be assigned a, convenient invocation., (a) keyboard shortcut, (b) a button on office menu, (c) either keyboard shortcut or a button in office, menu, (d) neither keyboard shortcut nor a button in office, menu, , 1.4.5, , Creating & saving a document, in MS Word, , 229. On opening MS Word (without clicking on a target document), it displays, document., (a) previous, (b) formatted, (c) completed, (d) blank/ new, to func230. MS Word provides, tion as the starting point special new, documents like report, visiting card,, brochure, etc.
Page 56 :
50, (a) template, (b) macro, (c) image, (d) table, 231. After opening a new document in MS, to create, Word, one should, a comfortable experience., (a) set paper size, (b) set font size, (c) set paragraph spacing, line spacing, (d) all of them, 232. Page setup in MS Word may be accessed, menu., using, (a) P ageLayout− > P ageSetup(Alt + P + SP ), (b) Home− > P aragraph(Alt + H + P G) or, P ageLayout− > P aragraph(Alt + P + P G), (c) Home− > F ontF ace(Alt + H + F F ), (d) Home− > F ontSize(Alt + H + F S), 233. Paragraph settings in MS Word may be, menu., accessed using, (a) P age Layout− > P age Setup (Alt + P +, SP ), (b) Home− > P aragraph (Alt + H + P G) or, P age Layout− > P aragraph(Alt+P +P G), (c) Home− > F ont F ace (Alt + H + F F ), (d) Home− > F ont Size (Alt + H + F S), 234. Font face may be changed in MS Word, menu., using, (a) P age Layout− > P age Setup (Alt + P +, SP ), (b) Home− > P aragraph (Alt + H + P G) or, P age Layout− > P aragraph (Alt + P +, P G), (c) Home− > F ont F ace (Alt + H + F F ), (d) Home− > F ont Size (Alt + H + F S), 235. Font size may be changed in MS Word, menu., using, (a) P age Layout− > P age Setup (Alt + P +, SP ), (b) Home− > P aragraph (Alt + H + P G) or, P age Layout− > P aragraph (Alt + P +, P G), (c) Home− > F ont F ace (Alt + H + F F ), (d) Home− > F ont Size (Alt + H + F S), 236. In MS Word, font colour may be, menu., changed using, (a) P age Layout− > P age Setup (Alt + P +, SP ), (b) Home− > F ont Color (Alt + H + F C), (c) Home− > F ont F ace (Alt + H + I), (d) Home− > F ont Size (Alt + H + F S), 237. In MS Word, background colour may be, changed using, menu., (a) P age Layout− > P age Setup (Alt + P +, SP ), , Prepared by: Dr.V.Nagaradjane, (b) Home− > F ont Color (Alt + H + F C), (c) Home− > Background (Alt + H + I), (d) Home− > F ont Size (Alt + H + F S), 238. In MS Word, tables, figures and equations may be assigned numbers using, menu., (a) P age Layout− > P age Setup (Alt + P +, SP ), (b) Home− > F ont Color (Alt + H + F C), (c) Home− > Background (Alt + H + I), (d) Ref erences− > Insert Caption (Alt + S +, P), 239. In MS Word, book title, chapter title,, heading1, heading2, normal text, etc., may be inserted using, menu., (a) Home− > Styles (Alt + H + L), (b) Home− > F ont Color (Alt + H + F C), (c) Home− > Background (Alt + H + I), (d) Ref erences− > Insert Caption (Alt + S +, P), 240. In MS Word, citation to references may, menu., be inserted using, (a) Ref erences− > Insert Citation(Alt + S +, C), (b) Ref erences− > M ark Entry (Alt+S +N ), (c) Home− > Background (Alt + H + I), (d) Ref erences− > Insert Caption (Alt + S +, P), 241. In MS Word, words to be indexed at, the end of book may be marked using, menu., (a) Ref erences− > Insert Citation (Alt + S +, C), (b) Ref erences− > M ark Entry (Alt+S +N ), (c) Home− > Background (Alt + H + I), (d) Ref erences− > InsertCaption (Alt + S +, P), 242. In MS Word, table, picture, shapes, flow, charts, headers, footers, page numbers,, word art, drop cap, equations or symbols, menu., may be inserted using, (a) Ref erences− > Insert Citation (Alt + S +, C), (b) Ref erences− > M ark Entry(Alt + S + N ), (c) Home− > Background (Alt + H + I), (d) Insert, menu helps to, 243. In MS Word,, save the document in a new name., (a) Home− > Save As (Alt + F + A), (b) Ref erences− > M ark Entry (Alt+S +N ), (c) Home− > Background (Alt + H + I), (d) Insert
Page 57 :
Q. Bank [COPA Semester - 1], , 1.4.6, , Inserting objects in MS Word, , 51, (a), (b), (c), (d), , Insert− > Clip Art (Alt + N + F ), Insert− > W ord Art (Alt + N + W ), Insert− > Drop Cap (Alt + N + RC), Insert− > Equation (Alt + N + E), 252. In MS Word, special symbols may be, inserted using, menu., (a) Insert− > Clip Art (Alt + N + F ), (b) Insert− > Symbols (Alt + N + U ), (c) Insert− > Drop Cap (Alt + N + RC), (d) Insert− > Equation (Alt + N + E), 253. In MS Word, objects from other, applications may be inserted using, menu., (a) Insert− > T ext f rom F ile (Alt + N + J +, F), (b) Insert− > Symbols (Alt + N + U ), (c) Insert− > Objects− > Objects (Alt + N +, J + J), (d) Insert− > Equation (Alt + N + E), 254. In MS Word, text from other applications may be inserted using, menu., (a) Insert− > T ext f rom F ile (Alt + N + J +, F), (b) Insert− > Symbols (Alt + N + U ), (c) Insert− > Objects− > Objects (Alt + N +, J + J), (d) Insert− > Equation (Alt + N + E), , are the most important, objects used in MS Word documents., (a) tables & pictures, (b) shapes, flow charts & clip arts, (c) equations, lists, bullets & numbering, (d) all of them, 245. In MS Word, table can be inserted using, menu., (a) Insert− > T able (Alt + N + T ), (b) Insert− > P icture (Alt + N + P ), (c) Ref erences− > Insert Caption (Alt + S +, N), (d) Insert− > Equation (Alt + N + E), 246. In MS Word, picture can be inserted usmenu., ing, (a) Insert− > T able (Alt + N + T ), (b) Insert− > P icture (Alt + N + P ), (c) Ref erences− > Insert Caption (Alt + S +, N), (d) Insert− > Equation (Alt + N + E), 247. In MS Word, caption for table, image or, equation number can be inserted using, menu., (a) Insert− > T able (Alt + N + T ), (b) Insert− > P icture (Alt + N + P ), (c) Ref erences− > Insert Caption (Alt + S +, N), (d) Insert− > Equation (Alt + N + E), 1.4.7 Inserting Macros in MS Word, 248. In MS Word, equation can be inserted, menu., using, 255. MS Word has the ability to automate, (a) Insert− > T able (Alt + N + T ), ., repeated tasks using, (b) Insert− > P icture (Alt + N + P ), (a) tables, (b) pictures, (c) Ref erences− > Insert Caption (Alt + S + (c) equations, (d) macros, N), 256. In MS Word, a Macro may be assigned, (d) Insert− > Equation (Alt + N + E), to invoke its functionality., 249. In MS Word, clip art can be inserted, (a) keyboard shortcut, menu., using, (b) a button, (a) Insert− > Clip Art (Alt + N + F ), (c) either keyboard shortcut or button, (b) Insert− > P icture (Alt + N + P ), (d) neither keyboard shortcut nor button, (c) Ref erences− > Insert Caption (Alt + S +, 257. To make the M acros tab visible, one, N), needs to open the options dialog using, (d) Insert− > Equation (Alt + N + E), ., 250. In MS Word, special artistic design text, (a) F ile− > Options (Alt + F + T ), may be inserted using, (b) Review− > Options, menu., (c) Insert− > Options, (a) Insert− > Clip Art (Alt + N + F ), (d) Home− > Options, (b) Insert− > W ord Art (Alt + N + RC), (c) Ref erences− > Insert Caption (Alt + S + 258. In MS Word, one may display the, Developer tab in the menu bar, N), through the options dialog by choosing, (d) Insert− > Equation (Alt + N + E), ., 251. In MS Word, drop cap may be inserted, (a) CustomizeRibbon− > T oolT abs− >, using, menu., Design, 244., , Prepared by: Dr.V.Nagaradjane
Page 58 :
52, , Prepared by: Dr.V.Nagaradjane, , (b) CustomizeRibbon− > M ainT abs− > 266. In MS Word, coding in Visual Basic for, Applications (VBA) may be carried out, Developer, (c) CustomizeRibbon− > M ainT abs− >, to customize the available features or, Outlining, add new features using, ., (d) CustomizeRibbon− > M ainT abs− > (a) M acros− > M acros (Alt + L + P M ), Insert, (b) M acros− > Record M acro (Alt + L + R), 259. In MS Word, Macro security settings, (c) M acros− > V isual Basic (Alt + L + V ), ., may be accessed through, (d) M acros−, >, (a) M acros− > M acro Security (Alt+L+AS), M acros Resume Recorder (Alt + L + S), (b) M acros− > Record M acro (Alt + L + R), While creating a macro, its availability, (c) M acros− > P ause Recording (Alt+L+S) 267., ., may be, (d) M acros− > M acros (Alt + L + P M ), (a) granted to all documents, 260. In MS Word, New macro may be, (b) restricted to the current document, ., recorded through, (c) both a & b, (a) M acros− > M acro Security (Alt+L+AS), (d) neither a nor b, (b) M acros− > Record M acro (Alt + L + R), (c) M acros− > P ause Recording (Alt+L+S), 1.4.8 Creating mail merge in MS, (d) M acros− > M acros (Alt + L + P M ), Word, 261. In MS Word, the default macro security, ., setting is, 268. The feature in MS Word which helps, (a) Enable all macros, to create customized correspondence, (b) Disable all macros, targeting different recipients is called, (c) Trust VBA Code, ., (d) Do not trust VBA code, (a) mail merge, (b) charting, 262. In MS Word, it is better change macro, (c) clip art, (d) equations, before, security setting to, 269. A mail merge document requires a, starting record or use macros., to fill the blank spaces., (a) Enable all macros, (a), picture, (b) Disable all macros, (b) record source, (c) Trust VBA Code, (c) chart, (d) Do not trust VBA code, (d) equation, 263. In MS Word, recording of macros may, 270. To create mail merge using existing list, be paused and certain actions which, ., of recipients, choose, need not be recorded in the macro may, (a) Mailings− >Select Recepients− >Use Existbe performed through, ., ing List, (a) M acros− > M acro Security (Alt+L+AS), (b) Mailings− >Select Recepients− >Type New, (b) M acros− > Record M acro (Alt + L + R), List, (c) M acros− > P ause Recording (Alt+L+S) (c) Mailings− >Select Recepients− >Select, (d) M acros−, >, from Outlook Contacts, (d) Mailings− >Insert Merge Field, M acros Resume Recorder (Alt + L + S), 264. In MS Word, paused macro recording, 271. To create mail merge using new list,, may be resumed through, ., choose, ., (a) M acros− > M acro Security (Alt+L+AS) (a) Mailings− >Select Recepients− >Use Exist(b) M acros− > Record M acro (Alt + L + R), ing List, (b), Mailings− >Select Recepients− >Type New, (c) M acros− > P ause Recording (Alt+L+S), List, (d) M acros−, >, (c) Mailings− >Select Recepients− >Select, M acros Resume Recorder (Alt + L + S), from Outlook Contacts, 265. In MS Word, recorded macros may be, (d) Mailings− >Insert Merge Field, edited or deleted through, ., 272. To create mail merge using Outlook, (a) M acros− > M acros (Alt + L + P M ), contacts list, choose, ., (b) M acros− > Record M acro (Alt + L + R), (a) Mailings− >Select Recepients− >Use Exist(c) M acros− > P ause Recording (Alt+L+S), ing List, (d) M acros−, >, M acros Resume Recorder (Alt + L + S)
Page 59 :
Q. Bank [COPA Semester - 1], , 53, , (b) Mailings− >Select Recepients− >Type New (a) template, List, (b) pdf file, (c) Mailings− >Select Recepients− >Select (c) plain text file, from Outlook Contacts, (d) HTML file, (d) Mailings− >Insert Merge Field, 280. A document may be saved as a template, 273. In MS Word, to insert a mail merge field, using File− >Save As from the menu, ., in document, choose, as the docuand choosing, (a) Mailings− >Select Recepients− >Use Existment, type., ing List, (b) Mailings− >Select Recepients− >Type New (a) Excel Template, (b) HTML file, List, (c) Mailings− >Select Recepients− >Select (c) Word Template, from Outlook Contacts, (d) Open Document Format (ODF), (d) Mailings− >Insert Merge Field, 281. Default extension for word template is, 274. In MS Word, data sources for, ., mail merge may be prepared using, (a) .docx, (b) .dotx, ., (c) .xlsx, (d) .pptx, (a) MS Excel, 282. Content created using template docu(b) MS Access, ment, ., (c) Plain text file with tab for field separation &, (a) should be saved as Excel file, newline for record separation, (b) should be saved as new word document, (d) all of them, (c) should be saved as new power point document, 275. Mail merge results may be previewed us(d) none of them, menu., ing, 283. Magazines, journals and proceedings, (a) Mailings− >Edit Individual Documents, for the help of, may publish, (b) Mailings− >Preview Results (Alt+M+P), authors in following the right styles for, (c) Mailings− >Print Documents, publication., (d) Mailings− >Send E-Mail Messages, (a) picture, 276. In MS Word, individual documents re(b) screenshot, sulting from mail merge may be edited, (c) template document, menu., using, (d) Excel spreadsheets, (a) Mailings− >Edit Individual Documents, (b) Mailings− >Preview Results (Alt+M+P), (c) Mailings− >Print Documents, 1.4.10 Page setup & printing in MS, (d) Mailings− >Send E-Mail Messages, Word, 277. In MS Word, mail merge results may be, printed using, menu., 284. In MS Word, Selecting page size, mar(a) Mailings− >Edit Individual Documents, gins and paper orientation is possible, (b) Mailings− >Preview Results (Alt+M+P), through, ., (c) Mailings− >Print Documents, (a) Page Layout− >Columns, (d) Mailings− >Send E-Mail Messages, (b) Page Layout− >Page Setup (Alt+P+SP), (c) Page Layout− >Water Mark, 278. In MS Word, mail merge results may, (d) Page Layout− >Page Color, be sent through email using, menu., 285. In MS Word, choosing number of, (a) Mailings− >Edit Individual Documents, columns per page is possible through, (b) Mailings− >Preview Results (Alt+M+P), through, ., (c) Mailings− >Print Documents, (a) Page Layout− >Columns, (d) Mailings− >Send E-Mail Messages, (b) Page Layout− >Page Setup (Alt+P+SP), (c) Page Layout− >Water Mark, 1.4.9 Creating templates in MS, (d) Page Layout− >Page Color, Word, 286. In MS Word, water mark can be inserted, or removed through, ., 279. A standard standard document with, (a) Page Layout− >Columns, proper formatting and layout may be, saved as a, , which may be, used as the base for new documents., Prepared by: Dr.V.Nagaradjane
Page 60 :
54, , Prepared by: Dr.V.Nagaradjane, , (b) scale, (b) Page Layout− >Page Setup (Alt+P+SP), (c) printer properties− >Finishing-¿Print on both, (c) Page Layout− >Water Mark, sides, (d) Page Layout− >Page Color, (d) Properties− >Paper/Quality, 287. In MS Word, page background colour, 295. A document may be printed on both, ., may be selected through, sides of paper using, op(a) Page Layout− >Columns, tion, available, in, print, dialog., (b) Page Layout− >Page Setup (Alt+P+SP), (a) collate, (c) Page Layout− >Water Mark, (b) scale, (d) Page Layout− >Page Color, (c) printer properties− >Finishing-¿Print on both, 288. In MS Word, page border may be sesides, ., lected through, (d) Properties− >Paper/Quality, (a) Page Layout− >Page Border, 296. The print resolution (quality) and, (b) Page Layout− >Page Setup (Alt+P+SP), colour preferences may be set using, (c) Page Layout− >Water Mark, option available in print, (d) Page Layout− >Page Color, dialog., 289. When the width of paper is smaller and, (a) collate, height of paper is larger, the orientation, (b) scale, ., is called, (c) printer properties− >Finishing-¿Print on both, (a) landscape, sides, (b) portrait, (d) Properties− >Paper/Quality, (c) both a & b, (d) neither a nor b, Answers (643 - 938), 290. When the width of paper is larger and, height of paper is smaller, the orienta1. (a), 2. (b), 3. (c), 4. (d), ., tion is called, 5. (a), 6. (c), 7. (b), 8. (d), (a) landscape, 9., (c), 10., (d), 11., (b), 12. (a), (b) portrait, 13. (c), 14. (c), 15. (d), 16. (c), (c) both a & b, 17. (b), 18. (d), 19. (a), 20. (b), (d) neither a nor b, 21., (d), 22., (c), 23., (a), 24. (c), 291. Commonly used paper sizes for MS, 25. (d), 26. (c), 27. (a), 28. (d), ., Word documents are, (a) A4, (b) letter, 29. (c), 30. (b), 31. (c), 32. (d), (c) legal, (d) all of them, 33. (a), 34. (a), 35. (a), 36. (a), 37. (b), 38. (b), 39. (c), 40. (c), 292. In MS Word, a document may be printed, 41., (d), 42., (d), 43., (b), 44. (b), using, ., 45. (c), 46. (c), 47. (a), 48. (a), (a) File− >Print (Ctrl+P), 49. (a), 50. (b), 51. (c), 52. (d), (b) Home− >Copy (Ctrl+C), 53. (a), 54. (a), 55. (b), 56. (c), (c) Home− >Cut (Ctrl+X), 57. (d), 58. (b), 59. (c), 60. (d), (d) Home− >Paste (Ctrl+V), 61., (a), 62., (d), 63., (a), 64. (d), 293. MS Word document typeset on specific, 65. (a), 66. (b), 67. (c), 68. (a), paper size may be printed on a different, 69. (d), 70. (c), 71. (b), 72. (a), paper size using, option, 73., (b), 74., (c), 75., (d), 76. (a), available in print dialog., 77. (a), 78. (c), 79. (b), 80. (d), (a) collate, 81., (a), 82., (b), 83., (c), 84. (b), (b) scale, 86. (c), 87. (d), 88. (c), (c) printer properties− >Finishing-¿Print on both 85. (a), 89. (b), 90. (a), 91. (c), 92. (d), sides, (d) Properties− >Paper/Quality, 93. (a), 94. (b), 95. (c), 96. (d), 97. (b), 98. (c), 99. (a), 100. (b), 294. Multiple copies of a document may be, printed in complete sets (divide by set), 101. (c), 102. (d), 103. (c), 104. (a), using, option available in, 105. (b), 106. (c), 107. (a), 108. (d), print dialog., 109. (a), 110. (b), 111. (c), 112. (d), (a) collate, 113. (a), 114. (a), 115. (b), 116. (c)
Page 61 :
Q. Bank [COPA Semester - 1], 117., 121., 125., 129., 133., 137., 141., 145., 149., 153., 157., 161., 165., 169., 173., 177., 181., 185., 189., 193., 197., 201., 205., , (d), (d), (d), (d), (c), (c), (c), (c), (d), (c), (c), (c), (d), (d), (d), (b), (a), (a), (b), (c), (d), (c), (a), , 118., 122., 126., 130., 134., 138., 142., 146., 150., 154., 158., 162., 166., 170., 174., 178., 182., 186., 190., 194., 198., 202., 206., , (a), (a), (a), (a), (d), (d), (d), (d), (c), (d), (d), (a), (b), (a), (a), (c), (b), (d), (a), (a), (a), (a), (b), , 119., 123., 127., 131., 135., 139., 143., 147., 151., 155., 159., 163., 167., 171., 175., 179., 183., 187., 191., 195., 199., 203., 207., , Prepared by: Dr.V.Nagaradjane, , 55, (b), (b), (b), (a), (a), (b), (a), (a), (a), (a), (a), (b), (a), (b), (d), (c), (a), (b), (b), (c), (b), (b), (c), , 120., 124., 128., 132., 136., 140., 144., 148., 152., 156., 160., 164., 168., 172., 176., 180., 184., 188., 192., 196., 200., 204., 208., , (c), (c), (c), (b), (b), (a), (b), (b), (b), (b), (b), (c), (c), (c), (c), (d), (c), (d), (d), (b), (d), (c), (d), , 209., 213., 217., 221., 225., 229., 233., 237., 241., 245., 249., 253., 257., 261., 265., 269., 273., 277., 281., 285., 289., 293., , (c), (d), (d), (d), (c), (d), (b), (c), (b), (a), (a), (c), (a), (b), (a), (b), (d), (c), (b), (a), (b), (b), , 210., 214., 218., 222., 226., 230., 234., 238., 242., 246., 250., 254., 258., 262., 266., 270., 274., 278., 282., 286., 290., 294., , (a), (a), (a), (a), (b), (a), (c), (d), (d), (b), (b), (a), (b), (a), (b), (a), (d), (d), (b), (c), (a), (a), , 211., 215., 219., 223., 227., 231., 235., 239., 243., 247., 251., 255., 259., 263., 267., 271., 275., 279., 283., 287., 291., 295., , (b), (b), (b), (b), (c), (d), (d), (d), (a), (c), (c), (d), (a), (c), (c), (b), (b), (a), (c), (d), (d), (c), , 212., 216., 220., 224., 228., 232., 236., 240., 244., 248., 252., 256., 260., 264., 268., 272., 276., 280., 284., 288., 292., 296., , (c), (c), (c), (d), (c), (a), (b), (a), (d), (d), (b), (c), (b), (d), (a), (c), (a), (c), (b), (a), (a), (d)
Page 62 :
56, , 1.5, 1., (a), (b), (c), (d), 2., (a), (b), (c), (d), 3., (a), (c), 4., (a), (c), 5., (a), (c), 6., (a), (b), (c), (d), 7., (a), (c), 8., (a), (c), 9., (a), (b), (c), (d), 10., (a), (b), (c), (d), 11., , Prepared by: Dr.V.Nagaradjane, , MS Excel, Columns in MS Excel are named in the, form of, ., alphabets (A, B, C, D,...), numbers (1,2,3,4,...), roman numerals (I,II, III, IV,...), none of them, Rows in MS Excel are named in the form, ., of, alphabets (A, B, C, D,...), numbers (1,2,3,4,...), roman numerals (I,II, III, IV,...), none of them, The intersection of a row and column in, ., MS Excel is called, spreadsheet, (b) workbook, document, (d) cell, The cell having and column number 3, and row number 6 is denoted by the, name, ., F3, (b) C6, C3, (d) F6, In MS Excel, a function is entered by, symbol first., typing, @, (b) $, #, (d) =, MS Excel can, given data., sort, statistically analyze, draw graphs for, all of them, The latest version of MS Excel can have, rows., 10,48,576, (b) 16,384, 1024, (d) 512, The latest version of MS Excel can have, columns., 10,48,576, (b) 16,384, 1024, (d) 512, Excel supports recording of repeated actions with the help of, ., graph, chart, macro, other applications, MS Excel macros can be invoked using, ., button, keystroke, both a & b, neither a nor b, MS Excel supports a version of Visual, Basic called, for programming., , (a), (b), (c), (d), 12., (a), (c), 13., (a), (c), 14., (a), (b), (c), (d), 15., (a), (c), 16., (a), (c), 17., (a), (b), (c), (d), , 1.5.1, , Javascript, Visual Basic for Applications (VBA), ASP.NET, C#.NET, Each file in MS Excel is called a, ., workbook, (b) worksheet, notesheet, (d) notebook, Each sheet in MS Excel file is called a, ., workbook, (b) worksheet, notesheet, (d) notebook, By default, Excel worksheets are named, ., book1, book2, book3, ..., sheet1, sheet2, sheet3,..., page1, page2, page3, ..., note1, note2, note3, ..., Excel file without any macros has the, default extension of, ., .xlsx, (b) .xls, .xlsm, (d) .xlst, Excel file containing macros has the de., fault extension of, .xlsx, (b) .xls, .xlsm, (d) .xlst, MS Excel can reference data in, ., the same sheet, different sheet in the same workbook, different sheet in a different workbook, all of them, , Data types in MS Excel, , 18. In MS Excel, the common type of data, applicable to any cell is called, data type., (a) General, (b) Number, (c) Currency, (d) Text, 19. In MS Excel, the data type suitable for, handling numbers is called, data type., (a) General, (b) Number, (c) Currency, (d) Text, 20. In MS Excel, number data type can control the, ., (a) digit grouping, (b) number of decimal places, (c) both a & b, (d) neither a nor b
Page 63 :
Q. Bank [COPA Semester - 1], 21. In MS Excel, numbers can be grouped, and prefixed with a currency symbol using, data type., (a) Accounting, (b) Currency, (c) both a & b, (d) neither a nor b, data type is suit22. In MS Excel,, able for handling dates., (a) Date, (b) Time, (c) Percentage, (d) Fraction, data type is suit23. In MS Excel,, able for handling time values., (a) Date, (b) Time, (c) Percentage, (d) Fraction, data type takes, 24. In MS Excel,, values between 0 and 1 and displays, them in percentage format., (a) Date, (b) Time, (c) Percentage, (d) Fraction, data type displays, 25. In MS Excel,, decimal fractions as vulgar or mixed, fractions., (a) Date, (b) Time, (c) Percentage, (d) Fraction, data type displays, 26. In MS Excel,, numbers in scientific notation., (a) Scientific, (b) Text, (c) Custom, (d) Date, data type is suit27. In MS Excel,, able for names and other character sequences., (a) Scientific, (b) Text, (c) Custom, (d) Date, data type sup28. In MS Excel,, ports formating of numbers with suitable customization., (a) Scientific, (b) Text, (c) Custom, (d) Date, 29. In MS Excel, for the number 45453453, to be displayed as 4,54,53,453.0, the, custom format could be, ., (a) ##,##,##,##0.0, (b) ###,###,##0.0, (c) ########0.0, (d) ##,##,##,###.#, 30. In custom formating of numbers, an optional digit is denoted by, symbol., (a) 0, (b) #, (c) $, (d) ˆ, 31. In custom formating of numbers, a compulsory/ mandatory digit is denoted by, symbol., Prepared by: Dr.V.Nagaradjane, , 57, (a) 0, (c) $, , 1.5.2, , (b) #, (d) ˆ, , Cell referencing, , 32. When copying and pasting an excel formula, the method which permits formula to progressively update cell references is called, referecing, system., (a) static, (b) semi-relative, (c) relative, (d) none of them, 33. When copying and pasting an excel formula, the method which permits formula to progressively update either column reference or row reference (but, not both column and row references) is, referecing system., called, (a) static, (b) semi-relative, (c) relative, (d) none of them, 34. When copying and pasting an excel formula, the method which keeps references to a particular cell address is called, referecing system., (a) static, (b) semi-relative, (c) relative, (d) none of them, 35. The formula = A5 ∗ 5 is written in, system., (a) static, (b) semi-relative, (c) relative, (d) none of them, 36. The formula = A5 ∗ 5, when copied to, the next row of the same column, will, become, system., (a) = A4 ∗ 5, (b) = B5 ∗ 5, (c) = A7 ∗ 5, (d) = A6 ∗ 5, , 1.5.3, , Categories of functions in MS, Excel, , functions help, 37. In MS Excel,, to access databases stored in spreadsheets., (a) Cube/ Database, (b) Date/ Time
Page 64 :
58, , Prepared by: Dr.V.Nagaradjane, , (c) Engineering, (d) Financial, 38., (a), (b), (c), (d), 39., (a), (b), (c), (d), 40., (a), (b), (c), (d), 41., , (a), (b), (c), (d), 42., (a), (b), (c), (d), 43., (a), (b), (c), (d), 44., , (a), (b), (c), , functions help to access date, and time functions in MS Excel., Cube/ Database, Date/ Time, Engineering, Financial, functions help to access base, conversion, logarithmic and other Engineering features in MS Excel., Cube/ Database, Date/ Time, Engineering, Financial, In MS Excel,, functions help, to access interest calculation, accounting and currency related calculations., Cube/ Database, Date/ Time, Engineering, Financial, functions help, In MS Excel,, to check the status of cells, as to, whether the cell is blank, contains a, number, text, type of data, etc., Information, Logical, Lookup & reference, Math & Trigonometric, functions help, In MS Excel,, to make logical functions like AND, OR,, NOT, etc., Information, Logical, Lookup & reference, Math & Trigonometric, functions help, In MS Excel,, to make lookup in other sheets and references., Information, Logical, Lookup & reference, Math & Trigonometric, In MS Excel, mathematical functions, like round, absolute, ceiling, floor, etc., and trigonometric functions like sin, cos,, tan, asin, acos, atan, etc are containing, the category of, ., Information, Logical, Lookup & reference, , (d) Math & Trigonometric, 45. In MS Excel, statistical functions like, average, standard deviation, median,, mode, etc. can be accessed under the, category, ., (a) Logical, (b) Lookup & reference, (c) Math & Trigonometric, (d) Statistical, 46. In MS Excel, functions for length of text,, text search, text concatenation, upper,, lower and proper, etc. can be accessed, ., under the category, (a) Text, (b) Logical, (c) Lookup & reference, (d) Math & Trigonometric, Date functions, 47., (a), (c), 48., (a), (c), 49., , (a), (c), 50., (a), (c), 51., (a), (b), (c), (d), 52., (a), (b), (c), (d), , function in MS Excel takes, year, month and date values and displays, given date., DATE, (b) DATEDIF, DATEVALUE, (d) DAY, function in MS Excel takes a, date value and returns the day of month., DATE, (b) DATEDIF, DATEVALUE, (d) DAY, function in MS Excel takes, 2 date values and calculates the difference between the dates in years (”Y”),, months (”M”) or days (”D”)., DATE, (b) DATEDIF, DATEVALUE, (d) DAY, function in MS Excel takes, a date string and returns parsed date, value., DATE, (b) DATEDIF, DATEVALUE, (d) DAY, function in MS Excel returns, number of days between given dates., DAYS/ DAYS360, EDATE, EOMONTH, HOUR, function in MS Excel takes, a date, number of months to offset from, that date and returns new date., DAYS/ DAYS360, EDATE, EOMONTH, HOUR
Page 65 :
Q. Bank [COPA Semester - 1], 53., (a), (b), (c), (d), 54., (a), (b), (c), (d), 55., (a), (c), 56., (a), (c), 57., (a), (c), 58., (a), (c), 59., (a), (c), 60., (a), (c), 61., (a), (c), 62., (a), (c), , function in MS Excel returns, last date of the month represented by, given date., DAYS/ DAYS360, EDATE, EOMONTH, HOUR, function in MS Excel returns, the hour represented by the given time., DAYS/ DAYS360, EDATE, EOMONTH, HOUR, function in MS Excel returns, minutes from a time value., MINUTES, (b) SECOND, EOMONTH, (d) HOUR, function in MS Excel returns, seconds from a time value., MINUTES, (b) SECOND, EOMONTH, (d) HOUR, function in MS Excel returns, current time., MINUTES, (b) SECOND, NOW, (d) HOUR, function in MS Excel returns, current date., MINUTES, (b) SECOND, NOW, (d) TODAY, function in MS Excel returns, day of week for given date., WEEKDAY, (b) WORKDAY, YEAR, (d) YEARFRAC, function in MS Excel returns, the date after given number of working, days., WEEKDAY, (b) WORKDAY, YEAR, (d) YEARFRAC, function in MS Excel returns, the year part of given date., WEEKDAY, (b) WORKDAY, YEAR, (d) YEARFRAC, function in MS Excel returns, fractional year between given dates., WEEKDAY, (b) WORKDAY, YEAR, (d) YEARFRAC, , Engineering functions, function con63. In MS Excel,, verts a binary number to decimal number., (a) BIN2DEC, (b) BIN2HEX, (c) BIN2OCT, (d) BITAND, Prepared by: Dr.V.Nagaradjane, , 59, function con64. In MS Excel,, verts a binary number to hexadecimal, number., (a) BIN2DEC, (b) BIN2HEX, (c) BIN2OCT, (d) BITAND, function con65. In MS Excel,, verts a binary number to octal number., (a) BIN2DEC, (b) BIN2HEX, (c) BIN2OCT, (d) BITAND, function per66. In MS Excel,, forms bitwise AND operation., (a) BIN2DEC, (b) BIN2HEX, (c) BIN2OCT, (d) BITAND, function per67. In MS Excel,, forms bitwise OR operation., (a) BITOR, (b) BITSHIFT, (c) BITXOR, (d) BITAND, function per68. In MS Excel,, forms bitwise right shift operation., (a) BITOR, (b) BITSHIFT, (c) BITXOR, (d) BITAND, function per69. In MS Excel,, forms bitwise XOR operation., (a) BITOR, (b) BITSHIFT, (c) BITXOR, (d) BITAND, function con70. In MS Excel,, verts given value from one unit to another (for example, ”m” to ”ft”)., (a) COVNERT, (b) DEC2BIN, (c) DEC2HEX, (d) DEC2OCT, function con71. In MS Excel,, verts decimal number to binary number., (a) COVNERT, (b) DEC2BIN, (c) DEC2HEX, (d) DEC2OCT, function con72. In MS Excel,, verts decimal number to hexadecimal, number., (a) COVNERT, (b) DEC2BIN, (c) DEC2HEX, (d) DEC2OCT, function con73. In MS Excel,, verts decimal number to octal number., (a) COVNERT, (b) DEC2BIN, (c) DEC2HEX, (d) DEC2OCT, function returns, 74. In MS Excel,, 1 if given values are equal., (a) DELTA, (b) DEC2BIN, (c) DEC2HEX, (d) DEC2OCT, function con75. In MS Excel,, verts hexadecimal number to binary, number., (a) DELTA, (b) HEX2BIN, (c) HEX2DEC, (d) HEX2OCT
Page 66 :
60, function con76. In MS Excel,, verts hexadecimal number to decimal, number., (a) DELTA, (b) HEX2BIN, (c) HEX2DEC, (d) HEX2OCT, function con77. In MS Excel,, verts hexadecimal number to octal number., (a) DELTA, (b) HEX2BIN, (c) HEX2DEC, (d) HEX2OCT, Cell information functions, function re78. In MS Excel,, turns true if a cell is blank., (a) ISBLANK, (b) ISERR, (c) ISEVEN, (d) ISODD, function re79. In MS Excel,, turns true if there is an error in the formula contained in given cell., (a) ISBLANK, (b) ISERR, (c) ISEVEN, (d) ISODD, function re80. In MS Excel,, turns true if the given cell contains an, even number., (a) ISBLANK, (b) ISERR, (c) ISEVEN, (d) ISODD, function re81. In MS Excel,, turns true if the given cell contains an, odd number., (a) ISBLANK, (b) ISERR, (c) ISEVEN, (d) ISODD, function re82. In MS Excel,, turns true if the given cell contains a, formula., (a) ISFORMULA, (b) ISERR, (c) ISEVEN, (d) ISODD, function re83. In MS Excel,, turns true if the given cell a logical value, (TRUE or FALSE)., (a) ISNUMBER, (b) ISNONTEXT, (c) ISNA, (d) ISLOGICAL, function re84. In MS Excel,, turns true if the given cell contains a, number., (a) ISNUMBER, (b) ISNONTEXT, (c) ISNA, (d) ISLOGICAL, function re85. In MS Excel,, turns true if the given cell contains Logical value (TRUE or FALSE)., (a) ISNUMBER, (b) ISNONTEXT, (c) ISNA, (d) ISLOGICAL, function re86. In MS Excel,, turns true if the given cell contains a, value other than text (number, logical,, etc.)., , Prepared by: Dr.V.Nagaradjane, (a) ISNUMBER, (b) ISNONTEXT, (c) ISNA, (d) ISLOGICAL, function re87. In MS Excel,, turns true if #NA error has occurred., (a) ISNUMBER, (b) ISNONTEXT, (c) ISNA, (d) ISLOGICAL, function re88. In MS Excel,, turns number equivalent of text value., (a) N, (b) NA, (c) TYPE, (d) AND, function re89. In MS Excel,, turns #NA error number., (a) N, (b) NA, (c) TYPE, (d) AND, function re90. In MS Excel,, turns a number corresponding to the, data type of the cell., (a) N, (b) NA, (c) TYPE, (d) AND, Logical functions, function re91. In MS Excel,, turns true only if all the given conditions, are true., (a) OR, (b) FALSE, (c) TRUE, (d) AND, function re92. In MS Excel,, turns true even if just one of the given, conditions is true., (a) OR, (b) FALSE, (c) TRUE, (d) AND, function tests, 93. In MS Excel,, the condition given in the first part, executes second part if the condition is true, or executes third part if the condition is, false., (a) OR, (b) IF, (c) TRUE, (d) AND, Math functions, function returns, 94. In MS Excel,, positive value irrespective of whether, the input is positive or negative., (a) ABS, (b) ASIN, (c) ACOS, (d) ATAN, function returns, 95. In MS Excel,, sin−1 value., (a) ABS, (b) ASIN, (c) ACOS, (d) ATAN
Page 67 :
Q. Bank [COPA Semester - 1], function returns, 96. In MS Excel,, −1, cos value., (a) ABS, (b) ASIN, (c) ACOS, (d) ATAN, function returns, 97. In MS Excel,, −1, tan value., (a) ABS, (b) ASIN, (c) ACOS, (d) ATAN, function returns, 98. In MS Excel,, cot−1 value., (a) ACOT, (b) ASIN, (c) ACOS, (d) ATAN, function returns, 99. In MS Excel,, aggregate value like count, sum, average, etc., (a) ARABIC, (b) ASINH, (c) ATANH, (d) AGGREGATE, function returns, 100. In MS Excel,, hyperbolic sin value., (a) ACOSH, (b) ASINH, (c) ATANH, (d) AGGREGATE, function returns, 101. In MS Excel,, hyperbolic cosine value., (a) ACOSH, (b) ASINH, (c) ATANH, (d) AGGREGATE, function returns, 102. In MS Excel,, hyperbolic tan value., (a) ACOSH, (b) ASINH, (c) ATANH, (d) AGGREGATE, function returns, 103. In MS Excel,, the integer just above a fractional number., (a) CEILING, (b) FLOOR, (c) ROUND, (d) ROUNDDOWN, function returns, 104. In MS Excel,, the integer just below a fractional number., (a) CEILING, (b) FLOOR, (c) ROUND, (d) ROUNDDOWN, function returns, 105. In MS Excel,, the number rounded to the given digits., (a) CEILING, (b) FLOOR, (c) ROUND, (d) ROUNDDOWN, function re106. In MS Excel,, turns the number rounded DOWN to, the given digits, simply discarding the, trailing value even if it is greater than or, equal to 5., (a) CEILING, (b) FLOOR, (c) ROUND, (d) ROUNDDOWN, function re107. In MS Excel,, turns the number rounded UP to the, given digits, simply discarding the trailing value even if it is greater than or, equal to 5., Prepared by: Dr.V.Nagaradjane, , 61, (a) ROUNDUP, (b) FLOOR, (c) ROUND, (d) ROUNDDOWN, function returns, 108. In MS Excel,, the number of statistical combinations, (n Cr ) possible., (a) ROUNDUP, (b) FLOOR, (c) COMBIN, (d) PERMUT, function returns, 109. In MS Excel,, the number of statistical permutations, (n Pr ) possible., (a) ROUNDUP, (b) FLOOR, (c) COMBIN, (d) PERMUT, function con110. In MS Excel,, verts given angle from radian to degrees., (a) DEGREES, (b) RADIANS, (c) EVEN, (d) ODD, function con111. In MS Excel,, verts given angle from degrees to radians., (a) DEGREES, (b) RADIANS, (c) EVEN, (d) ODD, function returns, 112. In MS Excel,, the nearest even number., (a) DEGREES, (b) RADIANS, (c) EVEN, (d) ODD, function returns, 113. In MS Excel,, the nearest odd number., (a) DEGREES, (b) RADIANS, (c) EVEN, (d) ODD, function returns, 114. In MS Excel,, the exponential value for given number., (a) EXP, (b) LN, (c) LOG/ LOG10, (d) FACT, function returns, 115. In MS Excel,, the natural logarithm for given number., (a) EXP, (b) LN, (c) LOG/ LOG10, (d) FACT, function returns, 116. In MS Excel,, the common logarithm (to the base 10), for given number., (a) EXP, (b) LN, (c) LOG/ LOG10, (d) FACT, function returns, 117. In MS Excel,, the factorial of given number in integer, format., (a) FACTDOUBLE, (b) LN, (c) LOG/ LOG10, (d) FACT, function returns, 118. In MS Excel,, the factorial of given number in double, number format., (a) FACTDOUBLE, (b) LN
Page 68 :
62, (c) LOG/ LOG10, (d) FACT, function returns, 119. In MS Excel,, the greatest common divisor for given, numbers., (a) FACTDOUBLE, (b) GCD, (c) LCM, (d) INT, function returns, 120. In MS Excel,, the least common multiple for given, numbers., (a) FACTDOUBLE, (b) GCD, (c) LCM, (d) INT, function returns, 121. In MS Excel,, the integer equivalent of given number,, after discarding fractional parts., (a) FACTDOUBLE, (b) GCD, (c) LCM, (d) INT, function returns, 122. In MS Excel,, the determinant of given matrix., (a) MDTERM, (b) MINVERSE, (c) MMUL, (d) MOD, function returns, 123. In MS Excel,, the inverse of given matrix., (a) MDTERM, (b) MINVERSE, (c) MMUL, (d) MOD, function returns, 124. In MS Excel,, the multiplication result of given matrix., (a) MDTERM, (b) MINVERSE, (c) MMUL, (d) MOD, function returns, 125. In MS Excel,, the modulo remainder for given number, and divisor., (a) QUOTIENT, (b) MINVERSE, (c) MMUL, (d) MOD, function returns, 126. In MS Excel,, the quotient for given number and divisor., (a) QUOTIENT, (b) MINVERSE, (c) MMUL, (d) MOD, function returns, 127. In MS Excel,, the number rounded to the nearest multiple of the second argument., (a) PI, (b) POWER, (c) MROUND, (d) RAND, function returns, 128. In MS Excel,, the value of π., (a) PI, (b) POWER, (c) MROUND, (d) RAND, function returns, 129. In MS Excel,, the power of given number raised by second argument., (a) PI, (b) POWER, , Prepared by: Dr.V.Nagaradjane, (c) MROUND, (d) RAND, function returns, 130. In MS Excel,, a random number., (a) PI, (b) POWER, (c) MROUND, (d) RAND, function returns, 131. In MS Excel,, a random number between given lower, limit and upper limit., (a) PI, (b) POWER, (c) MROUND, (d) RANDBETWEEN, function con132. In MS Excel,, verts a number from Roman numeral to, Arabic numeral., (a) ROMAN, (b) ARABIC, (c) SIGN, (d) SQRT, function con133. In MS Excel,, verts a number from Arabic numeral to, Roman numeral., (a) ROMAN, (b) ARABIC, (c) SIGN, (d) SQRT, function returns, 134. In MS Excel,, −1 if given number is negative and 1 if, is positive., (a) ROMAN, (b) ARABIC, (c) SIGN, (d) SQRT, function returns, 135. In MS Excel,, the square root of the given number., (a) ROMAN, (b) ARABIC, (c) SIGN, (d) SQRT, function returns, 136. In MS Excel,, the subtotal of given numbers., (a) SUBTOTAL, (b) SUM, (c) SUMIF, (d) SUMSQ, function returns, 137. In MS Excel,, the sum of given numbers., (a) SUBTOTAL, (b) SUM, (c) SUMIF, (d) SUMSQ, function returns, 138. In MS Excel,, the sum of squares of given numbers., (a) SUBTOTAL, (b) SUM, (c) SUMIF, (d) SUMSQ, function returns, 139. In MS Excel,, the sum of those numbers that fulfill, given condition., (a) SUBTOTAL, (b) SUM, (c) SUMIF, (d) SUMSQ, function trun140. In MS Excel,, cates decimal digits of given real number, to produce an integer value., (a) TRUNC, (b) SUM, (c) SUMIF, (d) SUMSQ
Page 69 :
Q. Bank [COPA Semester - 1], Statistical functions in MS Excel, function cal141. In MS Excel,, culates the average absolute (unsigned), deviation., (a) AVERAGE, (b) AVEDEV, (c) AVERAGEIFS, (d) CORREL, function calcu142. In MS Excel,, lates the average of given numbers., (a) AVERAGE, (b) AVEDEV, (c) AVERAGEIFS, (d) CORREL, function cal143. In MS Excel,, culates the average of given numbers, which fulfill the given conditions., (a) AVERAGE, (b) AVEDEV, (c) AVERAGEIFS, (d) CORREL, function calcu144. In MS Excel,, lates the coefficient of correlation., (a) AVERAGE, (b) AVEDEV, (c) AVERAGEIFS, (d) CORREL, function counts, 145. In MS Excel,, the number of objects., (a) COUNT, (b) DEVSQ, (c) FORECAST, (d) COUNTBLANK, function counts, 146. In MS Excel,, the number of blank cells., (a) COUNT, (b) DEVSQ, (c) FORECAST, (d) COUNTBLANK, function returns, 147. In MS Excel,, the sum of squares of deviations., (a) COUNT, (b) DEVSQ, (c) FORECAST, (d) COUNTBLANK, function counts, 148. In MS Excel,, the items based on given condition., (a) COUNT, (b) DEVSQ, (c) FORECAST, (d) COUNTIF, function counts, 149. In MS Excel,, the items based on given conditions., (a) COUNT, (b) DEVSQ, (c) FORECAST, (d) COUNTIFS, function pro150. In MS Excel,, vides a linear estimate of the result expected for given input., (a) COUNT, (b) DEVSQ, (c) FORECAST, (d) COUNTIFS, function pro151. In MS Excel,, vides an exponential estimate of the result expected for given input., (a) GROWTH, (b) GEOMEAN, (c) LARGE, (d) MEDIAN, function returns, 152. In MS Excel,, the median value of a list., (a) GROWTH, (b) GEOMEAN, , Prepared by: Dr.V.Nagaradjane, , 63, (c) LARGE, (d) MEDIAN, function returns, 153. In MS Excel,, th, a n lastest value, where n is the second, argument for the function., (a) GROWTH, (b) GEOMEAN, (c) LARGE, (d) MEDIAN, function returns, 154. In MS Excel,, geometric mean., (a) GROWTH, (b) GEOMEAN, (c) LARGE, (d) MEDIAN, function returns, 155. In MS Excel,, the largest value from a list., (a) MAX, (b) MIN, (c) PERMUT, (d) RANK, function returns, 156. In MS Excel,, the smallest value from a list., (a) MAX, (b) MIN, (c) PERMUT, (d) RANK, function returns, 157. In MS Excel,, result of permutations., (a) MAX, (b) MIN, (c) PERMUT, (d) RANK, function returns, 158. In MS Excel,, the rank of given number when compared to a list of numbers., (a) MAX, (b) MIN, (c) PERMUT, (d) RANK, function returns, 159. In MS Excel,, th, the n smallest value from a sorted list., (a) MAX, (b) SMALL, (c) PERMUT, (d) RANK, function returns, 160. In MS Excel,, the standard deviation of given numbers., (a) MAX, (b) SMALL, (c) PERMUT, (d) STDEV, Text functions, function re161. In MS Excel,, turns the character equivalent of numeric ASCII value., (a) CHAR, (b) CODE, (c) DOLLAR, (d) CONCATENATE, function re162. In MS Excel,, turns the ASCII code for given character, value., (a) CHAR, (b) CODE, (c) DOLLAR, (d) CONCATENATE, ., 163. ASCII stands for, (a) American Standard Code for Information Interface, (b) African Standard Code for Information Interchange
Page 70 :
64, , Prepared by: Dr.V.Nagaradjane, , (c) American Standard Code for Information In- (c) PROPER, (d) LEN, terchange, function re175. In MS Excel,, (d) American Standard Character for Information, turns a string after replacing given charInterchange, acters of first string using the last string., function for164. In MS Excel,, (a) SEARCH, (b) REPLACE, mats a number as currency and prefixes, (c) REPT, (d) LOWER, the currency symbol of the locale., function re176. In MS Excel,, (a) CHAR, (b) CODE, peats a string for given number of times., (c) DOLLAR, (d) CONCATENATE, (a) SEARCH, (b) REPLACE, function ap165. In MS Excel,, (c) REPT, (d) LOWER, pends several strings one after the other., function re177. In MS Excel,, (a) CHAR, (b) CODE, turns the location of the first string oc(c) DOLLAR, (d) CONCATENATE, curring inside the second string., function com166. In MS Excel,, (a) SEARCH, (b) REPLACE, pares two text values., (c) REPT, (d) LOWER, (a) FORMAT, (b) LEFT, function re178. In MS Excel,, (c) EXACT, (d) FIND, turns a string only when the given input, function re167. In MS Excel,, is a string, returning blank value otherturns the location of the first string ocwise., curring within the second, larger string., (a) TEXT, (b) SUBSTITUTE, (a) FORMAT, (b) LEFT, (c) TRIM, (d) T, (c) EXACT, (d) FIND, function re179. In MS Excel,, function for168. In MS Excel,, turns formatted version of given nummats given number based on rules prober., (a) T, (b) TEXT, vided using # and 0 characters., (a) FORMAT, (b) LEFT, (c) SUBSTITUTE, (d) TRIM, (c) EXACT, (d) FIND, function sub180. In MS Excel,, function re169. In MS Excel,, stitutes new text in place of given old, turns the leftmost character of a string., text., (a) FORMAT, (b) LEFT, (a) T, (b) TEXT, (c) EXACT, (d) RIGHT, (c) SUBSTITTE, (d) TRIM, function refunction re170. In MS Excel,, 181. In MS Excel,, turns the rightmost character of a string., moves space at the beginning or end of, (a) FORMAT, (b) LEFT, a string., (c) EXACT, (d) RIGHT, (a) T, (b) TEXT, (c), SUBSTITTE, (d) TRIM, function re171. In MS Excel,, turns the length of given string., function con182. In MS Excel,, (a) LOWER, (b) UPPER, verts given text to number., (c) PROPER, (d) LEN, (a) T, (b) VALUE, (c) SUBSTITTE, (d) TRIM, function re172. In MS Excel,, turns the lower case version of given, string., 1.5.4 Sorting in MS Excel, (a) LOWER, (b) UPPER, (c) PROPER, (d) LEN, menu, 183. Data can be sorted using, function rein MS Excel., 173. In MS Excel,, (a) Data− >Filter, turns the upper case version of given, (b) Data− >Sort, string., (c) Data− >What if analysis− >Data table, (a) LOWER, (b) UPPER, (d) Data− >What if analysis− >Pivot table, (c) PROPER, (d) LEN, 184. To sort data in MS Excel,, function re174. In MS Excel,, containing data for sorting should be seturns the first letter capitalized version, lected., of given string., (a) LOWER, (b) UPPER, (a) all the cells
Page 71 :
Q. Bank [COPA Semester - 1], (b) just the column, (c) just one row, (d) only one cell, 185. The sort dialog in MS Excel contains, to select, a tick box named, whether the data contains a header row, or not., (a) My data contains footers, (b) My data contains errors, (c) My data contains pictures, (d) My data contains headers, 186. The sorting dialog in MS Excel contains, boxes to choose sorting criteria., (a) column name to be used for sorting, (b) whether to sort by value, color or icon, (c) whether to sort ascending or descending, (d) all of them, 187. In MS Excel, if the sorting requires several levels of criteria, the same can be, button in sorting, added using, dialog., (a) Add level, (b) add row, (c) add column, (d) add filter, , 1.5.5, , Filtering in MS Excel, , 65, (d) all of them, , 1.5.6, , Validation in MS Excel, , 192. After selecting the cells to be subjected, to data validation, choose, from, the menu to validate data in MS Excel., (a) Data− >Filter, (b) Data− >Sort, (c) Data− >Validation, (d) Data− >What if analysis− >Pivot table, 193. In MS Excel, permitting data values in, specific range for entry in a cell is called, of data., (a) validation, (b) sorting, (c) filtering, (d) chart, 194. The data validation dialog shows, allow, criterion with, conditions., (a) between/ not between, (b) equal to/ not equal to, (c) >, <, ≥, ≤, (d) all of them, 195. In MS Excel, data violating the valusing, idation rule may be, Data− >Validation− >Circle invalid, data., (a) encircled, (b) deleted, (c) sorted, (d) coloured, 196. In MS Excel, to display a specific error, message for invalid data entry,, tab in validation dialog can be opened to, set a custom message., (a) Error display, (b) Input message, (c) Output message, (d) Result message, , 188. Data can be filtered using, menu in MS Excel., (a) Data− >Filter, (b) Data− >Sort, (c) Data− >What if analysis− >Data table, (d) Data− >What if analysis− >Pivot table, 189. For applying filtering, the data should, contain, ., (a) no header row, (b) header row, (c) footer row, 1.5.7 Charting in MS Excel, (d) pivot table, 190. After selecting data and invoking, type, 197. MS Excel supports, Data− >Filter from the menu, a, chart., appears in each column of, (a) column/ bar, the first row to enable filtering., (b) pie/ area/ stock/ surface/ doughnut/ bubble/, (a) circle, radar, (b) square, (c) scatter/ line, (c) triangular button, (d) all of them, (d) red dot, 198. The data used for charting should have, The, triangular, filter, button, at, header, to decide the graph parame191., row of data helps sorting of data using, ters like axis name., (a) header row, (b) footer row, ., (a) ascending/descending order, (c) blank row, (d) blank column, (b) color, 199. In MS Excel, pie chart may be inserted, (c) search specific values or applying filter condiusing, menu., tions for numbers, Prepared by: Dr.V.Nagaradjane
Page 72 :
66, , Prepared by: Dr.V.Nagaradjane, , (a) Insert− >Pie, (b) Insert− >Column, (c) Insert− >Bar, (d) Insert− >line, 200. In MS Excel, bar chart may be inserted, menu., using, (a) Insert− >Pie, (b) Insert− >Column, (c) Insert− >Bar, (d) Insert− >line, 201. In MS Excel, column chart may be inmenu., serted using, (a) Insert− >Pie, (b) Insert− >Column, (c) Insert− >Bar, (d) Insert− >line, 202. In MS Excel, line chart may be inserted, menu., using, (a) Insert− >Pie, (b) Insert− >Column, (c) Insert− >Bar, (d) Insert− >line, 203. In MS Excel, scatter chart may be inserted using, menu., (a) Insert− >Pie, (b) Insert− >Column, (c) Insert− >Bar, (d) Insert− >X-Y scatter, 204. In MS Excel, charts may be customized, on appropriate element of, by, the graph., (a) selecting, (b) right clicking, (c) both a & b, (d) none of them, , 1.5.8, , Data tables in MS Excel, , 205. Results for several input values can be, calculated based on one sample result, using, menu in MS Excel., (a) Data− >Filter, (b) Data− >Sort, (c) Data− >What if analysis− >Pivot table, (d) Data− >What if analysis− >Data table, 206. In MS Excel, for a row wise data table,, fill input values in top row, calculate result for first column in the second row, and choose, in the Data table, dialog., , (a) Row Input and Result, (b) Column Input and Result, (c) both row input and column input along with, result, (d) none of them, 207. In MS Excel, for a column wise data table, fill input values in left column, calculate result for first row in the right side, column and choose, in the Data, table dialog., (a) Row Input and Result, (b) Column Input and Result, (c) both row input and column input along with, result, (d) none of them, 208. In MS Excel, to calculate results based, on two input values (like a matrix),, from the Data table, choose, dialog., (a) Row Input and Result, (b) Column Input and Result, (c) both row input and column input along with, result, (d) none of them, , 1.5.9, , Pivot table, , 209. In MS Excel, summary of data in a table, ., may be created using, (a) data table, (b) pivot table, (c) chart, (d) validation, 210. In MS Excel, data meant for pivot table may be converted to a table using, first., (a) Insert− >Table, (b) Insert− >Pie, (c) Insert− >Column, (d) Insert− >Scatter, 211. In MS Excel, pivot table may be inserted, first., using, (a) Insert− >Table, (b) Insert− >Pivot− >Pivot table, (c) Insert− >Pivot− >Pivot chart, (d) Insert− >Scatter, 212. In MS Excel, pivot chart may be inserted, using, first., (a) Insert− >Table, (b) Insert− >Pivot− >Pivot table, (c) Insert− >Pivot− >Pivot chart, (d) Insert− >Scatter
Page 73 :
Q. Bank [COPA Semester - 1], , 1.5.10, , Goal seek in MS Excel, , 213. After selecting the cells to be subjected, from, to data validation, choose, the menu to apply goal seek in MS Excel., (a) Data− >Filter, (b) Data− >What if analysis− >Data table, (c) Data− >What if analysis− >Goal seek, (d) Data− >What if analysis− >Pivot table, 214. In MS Excel, adjusting an input value to, get specific result is called, ., (a) goal seek, (b) charting, (c) sorting, (d) validation, after choosing, 215. In MS Excel,, Data− >What if analysis− >Goal, seek from the menu, a dialog appears, values., to take, (a) desired result, (b) input cell in which values are to changed, (c) both a & b, (d) none of them, , 1.5.11, , Scenarios in MS Excel, , 216. After selecting the cells to be subjected, from, to data validation, choose, the menu to apply scenario in MS Excel., (a) Data− >Filter, (b) Data− >What if analysis− >Data table, (c) Data− >What if analysis− >Goal seek, (d) Data− >What if analysis− >Scenario, 217. In MS Excel, creating resulting conditions based on several uncertain future, conditions is called, ., (a) validation, (b) scenario, (c) goal seek, (d) charting, 218. Each scenario created using MS Excel, may contain, ., (a) a title, (b) a selection of cells which are affected by that, scenario, (c) both a & b, (d) none of them, 219. After creating several scenario representing future conditions, resulting conditions may be displayed by choosing, ., (a) appropriate scenario from the scenarios box, (b) charting, (c) validation, (d) sorting, , Prepared by: Dr.V.Nagaradjane, , 67, , Answers (939 - 1157), 1. (a), 5. (d), 9. (c), 13. (b), 17. (d), 21. (c), 25. (d), 29. (a), 33. (b), 37. (a), 41. (a), 45. (d), 49. (b), 53. (c), 57. (c), 61. (c), 65. (c), 69. (c), 73. (d), 77. (d), 81. (d), 85. (d), 89. (b), 93. (b), 97. (d), 101. (a), 105. (c), 109. (d), 113. (d), 117. (d), 121. (d), 125. (d), 129. (b), 133. (a), 137. (b), 141. (b), 145. (a), 149. (d), 153. (c), 157. (c), 161. (a), 165. (d), 169. (b), 173. (b), 177. (a), 181. (d), 185. (d), 189. (b), 193. (a), 197. (d), 201. (b), , 2. (b), 6. (d), 10. (c), 14. (b), 18. (a), 22. (a), 26. (a), 30. (b), 34. (a), 38. (b), 42. (b), 46. (a), 50. (c), 54. (d), 58. (d), 62. (d), 66. (d), 70. (a), 74. (a), 78. (a), 82. (a), 86. (b), 90. (c), 94. (a), 98. (a), 102. (c), 106. (d), 110. (a), 114. (a), 118. (a), 122. (a), 126. (a), 130. (d), 134. (c), 138. (d), 142. (a), 146. (d), 150. (c), 154. (b), 158. (d), 162. (b), 166. (c), 170. (d), 174. (c), 178. (d), 182. (b), 186. (d), 190. (c), 194. (d), 198. (a), 202. (d), , 3. (d), 7. (a), 11. (b), 15. (a), 19. (b), 23. (b), 27. (b), 31. (a), 35. (c), 39. (c), 43. (c), 47. (a), 51. (a), 55. (a), 59. (a), 63. (a), 67. (a), 71. (b), 75. (b), 79. (b), 83. (d), 87. (c), 91. (d), 95. (b), 99. (d), 103. (a), 107. (a), 111. (b), 115. (b), 119. (b), 123. (b), 127. (c), 131. (d), 135. (d), 139. (c), 143. (c), 147. (b), 151. (a), 155. (a), 159. (b), 163. (c), 167. (d), 171. (d), 175. (b), 179. (b), 183. (b), 187. (a), 191. (d), 195. (a), 199. (a), 203. (d), , 4. (b), 8. (b), 12. (a), 16. (c), 20. (c), 24. (c), 28. (c), 32. (c), 36. (d), 40. (d), 44. (d), 48. (d), 52. (b), 56. (b), 60. (b), 64. (b), 68. (b), 72. (c), 76. (c), 80. (c), 84. (a), 88. (a), 92. (a), 96. (c), 100. (b), 104. (b), 108. (c), 112. (c), 116. (c), 120. (c), 124. (c), 128. (a), 132. (b), 136. (a), 140. (a), 144. (d), 148. (d), 152. (d), 156. (b), 160. (d), 164. (c), 168. (a), 172. (a), 176. (c), 180. (c), 184. (a), 188. (a), 192. (c), 196. (a), 200. (c), 204. (c)
Page 74 :
68, 205. (d), 209. (c), , Prepared by: Dr.V.Nagaradjane, 206. (a), 210. (a), , 207. (b), 211. (b), , 208. (c), 212. (c), , 213. (c), 217. (b), , 214. (a), 218. (c), , 215. (c), 219. (a), , 216. (d)
Page 75 :
Q. Bank [COPA Semester - 1], , 1.6, 1.6.1, 1., (a), (b), (c), (d), 2., (a), (c), 3., , (a), (c), 4., , (a), (c), 5., (a), (b), (c), (d), 6., (a), (b), (c), (d), , 1.6.2, 7., (a), (b), (c), (d), 8., (a), , Powerpoint, Introduction to PowerPoint, , 69, (b) who could not attend, (c) who become interested to know the information after completion of, (d) all of them, Powerpoint helps to create a mix of, 9., to make the presentation, lively and interesting., (a) audio/video, (b) text/ table/ lists, (c) images/ graphs, (d) all of them, 10. Powerpoint presentation may be ex., ported to, (a) Portable Document Format (PDF), (b) Video file (through File− >Save & send), (c) both a & b, (d) none of them, 11. Powerpoint can help to deliver content, ., over, (a) web, (b) email, (c) social media, (d) all of them, , The MS office tool used for preparation, ., of presentations is called, MS Word, MS Excel, MS Access, MS Powerpoint, The command to invoke power point, ., from command line is, powerpnt, (b) power, point, (d) msppt, The default extension for a presentation prepared in powerpoint contained, in MS Office version 2007 or later is, ., .accdb, (b) .pptx, .xlsx, (d) .docx, The default extension for a presentation prepared in powerpoint contained, in MS Office version 2003 or earlier is, 1.6.3, ., .doc, (b) .xls, 12., .ppt, (d) .mdb, Powerpoint is suitable for creating, (a), presentations., (c), business, 13., educational, strategic (military), (a), all of them, (b), Powerpoint may be started using, (c), ., Start−, >All, Apps−, >Microsoft (d), Office− >Microsoft Powerpoint, 14., Pressing Windows+R, typing ”powerpnt” and, (a), pressing enter, (b), both a & b, (c), none of them, (d), , Advantages of Powerpoint, Delivering an information through Powerpoint helps, ., to keep the attention of audience, to create a collaborative environment, permits the speaker to maintain the flow of, information, all of them, Creating a presentation in Powerpoint, helps to share the information with those, who, the direct session., who could attend, , Prepared by: Dr.V.Nagaradjane, , 15., (a), (b), (c), (d), 16., (a), (b), (c), (d), , Creating Slide Shows, New presentation in power point can be, ., created using, File− >New, (b) Ctrl + N, both a & b, (d) none of them, On choosing File− >New,, can be chosen to start the presentation., Blank Presentation, Themes, either a or b, none of them, In Powerpoint, slide styles may be chosen from, menu., Design− >Themes, Home− >Font, Home− >Slides, Home− >Paragraph, In Powerpoint, font for presentation may, be chosen from, menu., Design− >Themes, Home− >Font, Home− >Slides, Home− >Paragraph, In Powerpoint, new slide, slide layout,, slide reset and slide sectioning may be, chosen from, menu., Design− >Themes, Home− >Font, Home− >Slides, Home− >Paragraph
Page 76 :
70, 17. In Powerpoint, paragraph style for, presentation may be chosen from, menu., (a) Home− >Drawing, (b) Home− >Font, (c) Home− >Slides, (d) Home− >Paragraph, 18. In Powerpoint, drawing for use in, the presentation may be created using, menu., (a) Home− >Drawing, (b) Home− >Font, (c) Home− >Slides, (d) Home− >Paragraph, 19. In Powerpoint, drawing for use in, the presentation may be created using, menu., (a) Home− >Drawing, (b) Home− >Font, (c) Home− >Slides, (d) Home− >Paragraph, 20. In Powerpoint, table can be inserted usmenu., ing, (a) Insert− >Tables, (b) Insert− >Images, (c) Insert− >Illustrations, (d) Insert− >Links, 21. In Powerpoint, images like picture from, file, clipart and photo albums can be inmenu., serted using, (a) Insert− >Tables, (b) Insert− >Images, (c) Insert− >Illustrations, (d) Insert− >Links, 22. In Powerpoint, geometric shapes, hyperlink and action link can be inserted using, menu., (a) Insert− >Tables, (b) Insert− >Images, (c) Insert− >Illustrations, (d) Insert− >Links, 23. In Powerpoint, geometric shapes, smart, art and chart can be inserted using, menu., (a) Insert− >Tables, (b) Insert− >Images, (c) Insert− >Illustrations, (d) Insert− >Links, 24. In Powerpoint, textbox, header &, footer, word art, date & time, slide, number and text objects from other, applications can can be inserted using, menu., (a) Insert− >Tables, , Prepared by: Dr.V.Nagaradjane, (b) Insert− >Text, (c) Insert− >Symbol, (d) Insert− >Media, 25. In Powerpoint, equations and mathematical symbols can can be inserted usmenu., ing, (a) Insert− >Tables, (b) Insert− >Text, (c) Insert− >Symbol, (d) Insert− >Media, 26. In Powerpoint, media objects like video, and audio can can be inserted using, menu., (a) Insert− >Tables, (b) Insert− >Text, (c) Insert− >Symbol, (d) Insert− >Media, , 1.6.4, , Fine tuning the presentation, , 27. In Powerpoint, page setup and slide, orientation may be controlled using, menu., (a) Design− >Page Setup, (b) Design− >Themes, (c) Insert− >Colors, (d) Insert− >Fonts, 28. In Powerpoint, slide transition effects, may be controlled using, menu., (a) Design− >Effects, (b) Design− >Themes, (c) Insert− >Colors, (d) Insert− >Fonts, 29. In Powerpoint, slide theme can be controlled using, menu., (a) Design− >Background, (b) Design− >Themes, (c) Insert− >Colors, (d) Insert− >Fonts, 30. In Powerpoint, color themes (background, foreground, title color, etc.), can be controlled using, menu., (a) Design− >Background, (b) Design− >Themes, (c) Insert− >Colors, (d) Insert− >Fonts, 31. In Powerpoint, fonts can be chosen using, menu., (a) Design− >Background, (b) Design− >Themes, (c) Insert− >Colors
Page 77 :
Q. Bank [COPA Semester - 1], (d) Insert− >Fonts, 32. In Powerpoint, background fill colour,, hide background graphics using, menu., (a) Design− >Background, (b) Design− >Themes, (c) Insert− >Colors, (d) Insert− >Fonts, 33. In Powerpoint, presentation preview can, be started using using, menu., (a) Transition− >Preview, (b) Transition− >Transition to this slide, (c) Timing, (d) none of them, 34. In Powerpoint, slide transition effects, can be applied using using, menu., (a) Transition− >Preview, (b) Transition− >Transition to this slide, (c) Timing, (d) none of them, 35. In Powerpoint, sound effects for slide, transition, automatic-transition time,, etc. can be applied using, menu., (a) Transition− >Preview, (b) Transition− >Transition to this slide, (c) Timing, (d) none of them, 36. In Powerpoint, animated flow of text, and images in presentation can be apmenu., plied using, (a) Animations− >Advanced Animation, (b) Animations− >Preview, (c) Animation− >Timing, (d) none of them, 37. In Powerpoint, slide animation preview, can be opened using, menu., (a) Animations− >Advanced Animation, (b) Animations− >Preview, (c) Animation− >Timing, (d) none of them, 38. In Powerpoint, animation timings can be, controlled using, menu., (a) Animations− >Advanced Animation, (b) Animations− >Preview, (c) Animation− >Timing, (d) none of them, 39. In Powerpoint, slide shows from beginning, slide show from current slide and, custom slide show can be started using, menu., (a) Slide show− >Start slide show, Prepared by: Dr.V.Nagaradjane, , 71, (b) Slide show− >Set up, (c) Slide show− >Monitors, (d) none of them, 40. In Powerpoint, slide shows can be setup,, slide can be hidden, timing can be rehearsed and slide transition times can be, menu., recorded using, (a) Slide show− >Start slide show, (b) Slide show− >Set up, (c) Slide show− >Monitors, (d) none of them, 41. In Powerpoint, proofing, language, comments and comparison of 2 slide shows, can be accomplished using, menu., (a) Review, (b) View, (c) Slide show, (d) Animations, 42. In Powerpoint, presentation views, master views, ruler, grilines, guides, zoom,, fit to window, color, grayscale, black and, white, new window, arrange all, cascade,, move split, swich windows and macros, menu., can be accessed using, (a) Review, (b) View, (c) Slide show, (d) Animations, , 1.6.5, , Good presentation techniques, , 43. To make effective presentation, mini., mize text and maximize, (a) images, (b) graphs, (c) videos, (d) all of them, 44. To make an effective impact, a presentation should be, ., (a) very long, running to 2 or 3 hours, (b) short and sweet, (c) unorganized, mixing head and tail at one place, (d) blank from first to last slide, 45. To make an effective impact, a presen., tation should be, (a) very long, running to 2 or 3 hours, (b) short and sweet, (c) unorganized, mixing head and tail at one place, (d) blank from first to last slide, 46. Optimum duration for making a presentation is, ., (a) 7 hours, (b) 3 to 4 hours, (c) 1 minute, (d) 22 to 35 minutes, 47. In presentation, the rule of 3 means,, ., (a) people forget the first 3 items
Page 78 :
72, (b), (c), (d), 48., (a), (b), (c), (d), 49., (a), (b), (c), (d), 50., (a), (c), 51., (a), (b), (c), (d), 52., , Prepared by: Dr.V.Nagaradjane, people forget the last 3 items, (a) a backup plan for alternate delivery (like, people remember the best 3 items, through paper handouts), (b) a style to say sorry, people remember the worst 3 items, (c) a practice to weep in front of the audience over, After preparing a presentation, it should, the failure, to make it effective., (d), guts, to say good bye without making the prebe kept in a pen drive or CD till delivery, sentation, never be opened till delivery, 53. Before making a presentation, the prebe opened just for delivery, ., senter should, be rehearsed many times, (a) arrive at the room early, To make an effective presentation, one, (b) verify the presentation loaded on the projector, the text typed in the, should, (c) choose the best place to stand during the preslides., sentation, simply keep reading, (d) all of them, add spice to the text through stories and fables, keep reading (whether the audience listens or, Answers (1158 - 1210), not), none of them, 1. (d), 2. (a), 3. (b), 4. (c), One should record the presentation in, 5., (d), 6., (c), 7., (d), 8., (d), and watch it again to find the, 9. (d), 10. (c), 11. (d), 12. (c), mistakes done during delivery., 13., (c), 14., (a), 15., (b), 16. (c), paper, (b) video, 17. (d), 18. (a), 19. (a), 20. (a), text, (d) transcript, 21. (b), 22. (d), 23. (c), 24. (b), To make an effective presentation, one, 25. (c), 26. (d), 27. (a), 28. (a), ., should, 29., (b), 30., (c), 31., (d), 32. (a), forget what is on the current slide, 33. (a), 34. (b), 35. (c), 36. (a), forget what is on the next slide, 37., (b), 38., (c), 39., (a), 40. (b), remember offer a lead to the next slide, 41. (a), 42. (b), 43. (d), 44. (b), never care for the order of slides, 45. (b), 46. (d), 47. (c), 48. (d), to cater, One should have, 49., (b), 50., (b), 51., (c), 52. (a), to the unexpected situations of projector, 53. (d), failure, power failure, computer failure,, disk error, etc.
Page 79 :
Q. Bank [COPA Semester - 1], , 1.7, 1.7.1, 1., , (a), (b), (c), (d), 2., (a), (c), 3., (a), (c), 4., (a), (c), 5., (a), (c), 6., (a), (c), 7., (a), (c), 8., (a), (c), 9., (a), (c), 10., (a), (c), , OpenOffice, Introduction to Open Office, The suit of free software offered by, Apache foundation for document preparation, spreadsheet, presentation, drawing and database management is called, ., OpenOffice.org, Microsoft Office, Star Office, KOffice, OpenOffice.org text document file has, extension of, ., .odt, (b) .ods, .odg, (d) .odp, OpenOffice.org text spreadsheet file has, extension of, ., .odt, (b) .ods, .odg, (d) .odp, OpenOffice.org drawing file has exten., sion of, .odt, (b) .ods, .odg, (d) .odp, OpenOffice.org presentation file has ex., tension of, .odt, (b) .ods, .odg, (d) .odp, OpenOffice.org presentation file has extension of, ., .odt, (b) .ods, .odg, (d) .odp, In OpenOffice.org, text document can, be prepared using, ., writer, (b) calc, draw, (d) impress, In OpenOffice.org, spreadsheet can be, prepared using, application., writer, (b) calc, draw, (d) impress, In OpenOffice.org, spreadsheet can be, prepared using, application., writer, (b) calc, draw, (d) impress, In OpenOffice.org, drawing can be prepared using, application., writer, (b) calc, draw, (d) impress, , Prepared by: Dr.V.Nagaradjane, , 73, 11. In OpenOffice.org, presentation can be, application., prepared using, (a) writer, (b) calc, (c) draw, (d) impress, , 1.7.2, 12., (a), (c), 13., (a), (c), 14., (a), (b), (c), (d), 15., (a), (b), (c), (d), 16., (a), (c), 17., (a), (b), (c), (d), 18., (a), (b), (c), (d), 19., (a), (b), (c), (d), , Image properties, are the important properties of, images., Colour, (b) Width, Height, (d) all of them, An image is made of small dots called, ., pixel, (b) dot, point, (d) line, Each pixel possess the properties of, ., Colour, Transparency (alpha), both a & b, none of them, Normally, color coding in images is repsystem., resented in, Red Green Blue Alpha (RGBA), Cyan Magenta Yellow blacK (CMYK), both a & b, neither a nor b, Any visible colour can be created using, ., appropriate combination of, Red, (b) Green, Blue, (d) all of them, Alpha value of 0 represents, colour., opaque, transparent, semitransparent, none of them, Maximum alpha value represents, colour., opaque, transparent, semitransparent, none of them, Alpha value between 0 and maxim represents, colour., opaque, transparent, semitransparent, none of them
Page 80 :
74, , 1.7.3, , Prepared by: Dr.V.Nagaradjane, , Image types, , 20. BMP in image format stands for, ., (a) Binary Magnified Photo, (b) Binary Machine Picture, (c) Binary Machine Photo, (d) BitMaP, 21. JPG or JPEG in image format stands for, ., (a) Joint Photographic Experts Group, (b) Joint Picture Experts Group, (c) Joint Photographic Experts Graph, (d) Joint Photographic Experts General, compression for22. JPEG is a, mat., (a) lossy, (b) lossless, (c) both a & b, (d) neither a nor b, 23. JPEG format is widely adopted for, ., (a) digital photography, (b) printing, (c) image editing, (d) all of them, 24. JPEG 2000 is a new version of JPEG, ., adopted in, (a) video frame compression, (b) audio compression, (c) grayscale image compression, (d) none of them, compression, 25. JPEG 2000 is a, format., (a) lossy, (b) lossless, (c) both a & b, (d) neither a nor b, 26. In digital imaging, GIF stands for, ., (a) Graphics Interchange Frame, (b) Graphics Interchange Format, (c) Graphics Interlaced Format, (d) Graphics Intersection Format, file format supports simple an27., imations in an image., (a) GIF, (b) JPG, (c) BMP, (d) TIF, 28. In digital imaging, TIFF stands for, ., (a) Tagged Initial File Format, (b) Tagged Image File Frame, (c) Triggered Image File Format, , (d) Tagged Image File Format, 29. In digital imaging, TIFF stands for, ., (a) Tagged Initial File Format, (b) Tagged Image File Frame, (c) Triggered Image File Format, (d) Tagged Image File Format, 30. TIFF is more suitable for, than for digital photography., (a) digital printing, (b) digital drawing, (c) digital video, (d) digital audio, 31. PNG in digital imaging stands for ., (a) Palate Network Graphics, (b) Portable Network Graphics, (c) Portable Number Graphics, (d) Portable Network Grayscale, compres32. PNG supports, sion., (a) lossy, (b) lossless, (c) both a & b, (d) neither a nor b, 33. Google WebP is an image format which, compression., supports, (a) lossy, (b) lossless, (c) both a & b, (d) neither a nor b, 34. Google WebP aims to supersede, as a file format for digital, cameras., (a) JPG, (b) PNG, (c) GIF, (d) TIFF, 35. ICO is an image format containing one, or more icons of, type., (a) BMP, (b) PNG, (c) both a & b, (d) neither a nor b, 36. CPT file extension stands for, ., (a) Corel Picture Paint, (b) Corel Photo Paint, (c) Creative Photo Paint, (d) Corel Photo Print, 37. PSD file extension stands for, ., (a) Photo Shop Drawing, (b) Picture Shop Document, (c) Photo Scan Document, (d) Photo Shop Document
Page 81 :
Q. Bank [COPA Semester - 1], 38. PSP, (a), (b), (c), (d), 39., (a), (b), (c), (d), 40., (a), (b), (c), (d), , file, , extension, , 75, stands, , for, , ., Shop Pro, Shop Photo, Shop Picture, Shop Print, file extension stands for, ., eXtreme Computing Facility, eXtended Computing Facility, eXperimental Computing Facility, eXperimental Counting Facility, SVG in image format stands for, ., Scanned Vector Graphics, Scalable Vector Graphics, Scalable Vector Grayscale, Scalable Vintage Graphics, Paint, Paint, Paint, Paint, XCF, , (a), (b), (c), (d), 46., (a), (c), 47., (a), (c), 48., (a), (c), 49., , 1.7.4, , Editing of images, , 41. The process of enhancing image quality by rotation, extraction, colour transformation, partial relocation, morphing, and conversion from/ to colour image, to grayscale, etc. are categorized as, ., (a) image capture, (b) image viewing, (c) image editing, (d) none of them, 42. Adobe Photoshop, Corel Paint Shop, Pro, GIMP, etc. belong to the category, software., of, (a) image capture, (b) image viewing, (c) image editing, (d) none of them, is a free and open source, 43., software for image editing., (a) Adobe Photoshop, (b) Corel Paint Shop Pro, (c) GIMP, (d) none of them, 44. GIMP toolbox can be opened using, ., (a) Windows− >Toolbox menu, (b) Ctrl+B shortcut, (c) both a & b, (d) none of them, 45. GIMP toolbox contains rectangle, ellipse, freehand, fuzzy tool, colour select,, scissor selection tool, foreground select, and path tools for, ., Prepared by: Dr.V.Nagaradjane, , (a), (c), 50., (a), (c), 51., (a), (b), (c), (d), 52., (a), (b), (c), (d), 53., (a), (b), (c), (d), 54., (a), (b), (c), (d), 55., (a), (b), , selecting portions of images, deleting images, creating images, drawing on images, In GIMP, color in one part of image may, be picked for painting another part using, tool., color picker, (b) zoom, measure, (d) move, In GIMP, image size may be enlarged or, reduced using, tool., color picker, (b) zoom, measure, (d) move, In GIMP, distances and angles can be, tool., measured using, color picker, (b) zoom, measure, (d) move, In GIMP, selected portions can be, moved using, tool., color picker, (b) zoom, measure, (d) move, In GIMP, selected portions can be, tool., moved using, color picker, (b) zoom, measure, (d) move, Edges of images can be removed using, tool in GIMP., crop tool, alignment tool, rotate tool, scale tool, Layers may be aligned using, tool in GIMP., crop tool, alignment tool, rotate tool, scale tool, Selected portions or layers may be rotool in GIMP., tated using, crop tool, alignment tool, rotate tool, scale tool, Selected portions or layers may be scaled, using, tool in GIMP., crop tool, alignment tool, rotate tool, scale tool, Selected region or layer may be distorted, tool in GIMP., using, shear, perspective
Page 82 :
76, (c) flip, (d) cage transform tool, 56. Selected region or layer converted to, tool in, 3D appearance using, GIMP., (a) shear, (b) perspective, (c) flip, (d) cage transform tool, 57. Selected portions may be distorted intool in GIMP., side a cage using, (a) shear, (b) perspective, (c) flip, (d) cage transform tool, 58. Image may be flipped (horizontally or, tool in GIMP., vertically) using, (a) shear, (b) perspective, (c) flip, (d) cage transform tool, 59. Text can be inserted into an image using, tool in GIMP., (a) text, (b) bucket fill, (c) blend, (d) pencil, 60. Filling can be done using, tool in GIMP., (a) text, (b) bucket fill, (c) blend, (d) pencil, 61. Colour difference between adjacent portions can be healed through proper gratool in GIMP., dient using, (a) text, (b) bucket fill, (c) blend, (d) pencil, , Prepared by: Dr.V.Nagaradjane, 62. Pencil drawing can be done using, tool in GIMP., (a) text, (b) bucket fill, (c) blend, (d) pencil, 63. Simple painting can be done using, tools in GIMP., (a) brush/ airbrush, (b) eraser, (c) ink, (d) all of them, permits, manipulation, at, 64. GIMP, levels., (a) image, (b) layer, (c) color space, (d) all of them, , Answers (1211 - 1274), 1. (a), 5. (d), 9. (b), 13. (a), 17. (a), 21. (a), 25. (c), 29. (d), 33. (c), 37. (d), 41. (c), 45. (a), 49. (d), 53. (c), 57. (d), 61. (c), , 2. (a), 6. (d), 10. (c), 14. (c), 18. (b), 22. (a), 26. (b), 30. (a), 34. (a), 38. (a), 42. (c), 46. (a), 50. (d), 54. (d), 58. (c), 62. (d), , 3. (b), 7. (a), 11. (d), 15. (a), 19. (c), 23. (d), 27. (a), 31. (b), 35. (c), 39. (c), 43. (c), 47. (b), 51. (a), 55. (a), 59. (a), 63. (d), , 4. (c), 8. (b), 12. (d), 16. (d), 20. (d), 24. (a), 28. (d), 32. (b), 36. (b), 40. (b), 44. (c), 48. (c), 52. (b), 56. (b), 60. (b), 64. (d)
Page 83 :
Q. Bank [COPA Semester - 1], , 1.8, 1.8.1, 1., (a), (b), (c), (d), 2., (a), (b), (c), (d), 3., (a), (b), (c), (d), 4., (a), (b), (c), (d), 5., (a), (b), (c), (d), 6., (a), (b), (c), (d), 7., (a), (b), (c), (d), 8., , Database, Systems, , 77, , Management, , Data,, Information, Database, , and 1.8.2, , refers to collection, storage, manipulation, reporting and mining, of available information., Database management, Presentation, Charting, Document preparation, to, A database contains, help management of information., schemes, tables, queries/ views, all of them, ., SQL stands for, Synchronized Query Language, Structured Query Language, Simplified Query Language, Structured Question Language, Creation and modification of databases, ., and tables is called, update, retrieval, data definition, administration, Inserting data and modifying values in, previously inserted data in tables of a, database is called, ., data update, data retrieval, data definition, database administration, Querying and selecting data from a table, is called, ., data update, data retrieval, data definition, database administration, Defining the users, passwords and roles, for users to control a database is called, ., data update, data retrieval, data definition, database administration, Maintaining data in error free manner is, called data, ., , Prepared by: Dr.V.Nagaradjane, , (a) integrity, (c) multiplicity, , 9., (a), (b), (c), (d), 10., , (a), (b), (c), (d), 11., (a), (b), (c), (d), 12., (a), (b), (c), (d), 13., (a), (c), 14., (a), (b), (c), (d), 15., , (a), (c), , (b) duplicity, (d) atomicity, , Overview of popular databases, systems, DBMS stands for, ., Database Maintenance System, Database Management Syntax, Database Management System, Digital Management System, Oracle, IBM DB2, SAP HANA, MySQL,, PostgreSQL, Microsoft SQL server,, Sybase, MongoDB, MariaDB & SQLite, tools., are the most popular, graphics & animation, image editing, document typesetting, database management, Oracle, IBM DB2, SAP HANA &, Microsoft SQL server are, database management tools., professional (paid), free/ open source, outdated, unsuitable, MySQL, PostgreSQL, MariaDB &, SQLite are, database management tools., professional (paid), free/ open source, outdated, unsuitable, Among the open source and free, database, management, systems,, is the most popular., MySQL, (b) PostgreSQL, MariaDB, (d) SQLite, Among the professional (paid) database, management systems,, is the, most popular., IBM DB2, SAP HANA, Oracle, Microsoft SQL Server, is the most popular, database management system in the, embedded (mobile phones/ tablets), category., MySQL, (b) SQLite, Oracle, (d) PostgreSQL
Page 84 :
78, , Prepared by: Dr.V.Nagaradjane, , RDBMS, 16., (a), (b), (c), (d), 17., (a), (b), (c), (d), 18., (a), (b), (c), (d), 19., , (a), (b), (c), (d), 20., (a), (b), (c), (d), 21., , (a), (b), (c), (d), 22., , (a), (b), (c), (d), 23., , RDBMS stands for, ., Relational Digital Base Management System, Restricted Data Base Management System, Relational Data Base Management System, Relational Data Binary Management System, Relational database model was proposed, ., by, Bill Gates, Steve Jobs, Dennis Ritchie, Edgar F Codd, A database management system reto be called, quires to fulfill, a relational database system., Codd’s 12 Rules, 10 commandments of Moses, 3 laws of Isac Newton, 2 laws of Kirchoff, Codd’s Rule 0 defines a relational, database system as the one which mancapabiliages data through, ties., hierarchical database, network database, relational database, none of them, Codd’s Rule 1 is otherwise called, rule and specifies that all, information should be held in tables., information, access, null value, database description, Codd’s Rule 2 is otherwise called, rule and it guarantees that, each and every information stored in a, database is accessible., information, access, null value, database description, Codd’s Rule 3 is otherwise called, rule and it specifies that, there should be unique NULL value to, denote missing information., information, access, null value, database description, Codd’s Rule 4 is otherwise called, rule and it states that meta, data should also be stored as normal, data., , (a), (b), (c), (d), 24., , (a), (b), (c), (d), 25., , (a), (b), (c), (d), 26., , (a), (b), (c), (d), 27., , (a), (b), (c), (d), 28., , (a), (b), (c), (d), , information, access, null value, database description, Codd’s Rule 5 is otherwise called, rule and it permits commands for creating, managing, rolling, back and authorizing data access., data sublanguage, view updating, insert, update, delete, independence from physical storage, Codd’s Rule 6 is otherwise called, rule and it specifies that every view which is theoretically updateable should be updateable through the, system., data sublanguage, view updating, insert, update, delete, independence from physical storage, Codd’s Rule 7 is otherwise called, rule and it specifies that, insertion, delete and update of data, should also be based on relational principles., data sublanguage, view updating, insert, update, delete, independence from physical storage, Codd’s Rule 8 is otherwise called, rule and it specifies that the, type of physical storage media should, not affect the access methods of data, through the database management system., data sublanguage, view updating, insert, update, delete, independence from physical storage, Codd’s Rule 9 is otherwise called, rule and application programs are unaffected by changes to the, data unless it impairs the results of the, application program., logical data independence, integrity independence, distribution independence, non-subversion
Page 85 :
Q. Bank [COPA Semester - 1], 29. Codd’s Rule 10 is otherwise called, rule and it specifies that, data integrity conditions should be defined in the database management system and not in the application program., (a) logical data independence, (b) integrity independence, (c) distribution independence, (d) non-subversion, 30. Codd’s Rule 11 is otherwise called, rule and it specifies that, the end user should feel that the data is, stored at one place, although the storage may be distributed on several computers., (a) logical data independence, (b) integrity independence, (c) distribution independence, (d) non-subversion, 31. Codd’s Rule 12 is otherwise called, rule and it specifies that, data access should be provided only, through the relational model, without, exposing the low level storage APIs to, the end user., (a) logical data independence, (b) integrity independence, (c) distribution independence, (d) non-subversion, ., 32. API stands for, (a) Applied Programming Interface, (b) Application Programming Interface, (c) Application Programming Integration, (d) Application Provider Interface, OODB, 33. Object oriented databases are based on, , similar to, the concept of, object oriented programming., (a) SQL, (b) table, (c) objects, (d) column, 34. Relational databases are, oriented., (a) method, (b) table, (c) objects, (d) program, ., 35. OODB stands for, (a) Object Oriented Digital Base, (b) Offset Oriented Data Base, (c) Object Oriented Data Binary, (d) Object Oriented Data Base, 36. OODB is more accessible from, ., (a) SQL, Prepared by: Dr.V.Nagaradjane, , 79, (b) Object Oriented Programming Languages like, C++, Java, Smalltalk, Delphi, etc., (c) pen drive, (d) wired connection, 37. OODB with support for SQL (like rela., tional database) is called, (a) hybrid object relational database, (b) programming, (c) pure relational database, (d) NOSQL database, 38. Objects of OODB may be accessed us., ing, (a) NOSQL, (b) SQL, (c) Object Query Language (OQL), (d) none of them, 39. Object schema in OODB use data types, to object oriented programming languages., (a) unrelated, (b) unconnected, (c) similar, (d) not connected, , which is, 40. ODMG stands for, the consortium in charge of the standardizing the development of Object, Oriented Data Base., (a) Object Data Management General, (b) Object Data Management Group, (c) Object Digital Management Group, (d) Object Data Maintenace Group, 41. OMG in object oriented database stands, ., for, (a) Object Maintenance Group, (b) Oh My God, (c) Object Management Group, (d) Object Management Gimmick, language., 42. XQuery is, (a) XML based Query, (b) Structured Query, (c) programming, (d) object oriented programming, 43. Object Oriented Data Base is suitable, for cases in which relational tables are, to design and manipulate., (a) too complex, (b) too easy, (c) too simple, (d) too plain, 44. ORM in database management stands, ., for, (a) Object Reverse Mapping, (b) Offset Relational Mapping, (c) Object Relational Mapping, (d) Object Restricted Mapping
Page 86 :
80, , Prepared by: Dr.V.Nagaradjane, , NOSQL, 45. The system of managing databases using models other than tables and retrieving data using methods other than or redata, lated to SQL is called, management system., (a) relational database, (b) table oriented, (c) Query oriented, (d) NOSQL, 46. NOSQL is suitable for social media sites, ., because it, (a) permits fast queries, (b) permits ad-hoc joins, (c) compromises data integrity rules in favour of, speed, (d) all of them, 47. NOSQL databases permit updates, and are prone to, which, data loss., (a) may be incomplete, (b) are complete, (c) which are immediately effected, (d) which are subject to strict rules of integrity, , 1.8.3, , Rules for designing good tables, , 48. A good database table has, naming., (a) inconsistent, (b) consistent, (c) unrelated, (d) haphazard, 49. The name of table and column should, be in, ., (a) plural, (b) vernacular, (c) incoherent words, (d) singular, 50. In a well defined database, names of, database, table and column, contain space., (a) do, (b) may, (c) should not, (d) should, 51. If the name of database, table or column, should have separation, use, instead of the space character., (a) &, (b), (c) @, (d) $, 52. As a good practice in the design of, database tables, passwords should be, stored in, format., (a) numeric, (b) random, (c) plain text, (d) encrypted, 53. As a good practice in design of database, tables, it is advisable to have, for indexing., , (a), (b), (c), (d), 54., (a), (c), 55., (a), (b), (c), (d), 56., (a), (b), (c), (d), 57., , (a), (b), (c), (d), 58., , (a), (b), (c), (d), 59., (a), (c), 60., (a), (b), (c), (d), , Integer ID column, no column, all columns, none of them, As a good practice, each user should, user id and password., have, same, (b) different, root, (d) admin, As a good practice, select queries, colshould have contain, umn names., * for, blank for, required field names, none of them, In defining a database table, it is a good, practice to define frequently searched, columns with, ., primary key, foreign key, either a or b, neither a nor b, When a column value cannot be null, it, is a good practice to include, declaration for that column when creating the table., DEFAULT 0, DEFAULT < SOM E V ALU E >, NULL, NOT NULL, When a column value should be filled, with a default of 0 or any other value,, it is a good practice to include, declaration for that column when creating the table., DEFAULT 0, DEFAULT < SOM E V ALU E >, either a or b, NOT NULL, For, mission, critical, databases,, should be created to, avoid data loss., backup, (b) program, SQL, (d) table, The process of dividing the data in suitable tables to avoid repition of data is, called, ., normalization, data insertion, data deletion, data updation
Page 87 :
Q. Bank [COPA Semester - 1], , 1.8.4, , Integrity rules and constraints, in a table, , 61. The database rule which permits inserting a row without any specific value for, a column is called, ., (a) null rule, (b) unique column rule, (c) primary key rule, (d) referential integrity rule, in database manage62., ment permits inserting a new value only, if there is no previous entry having the, same value., (a) null rule, (b) unique column rule, (c) primary key rule, (d) referential integrity rule, in database manage63., ment permits unique values to be used, for searching and indexing of data., (a) null rule, (b) unique column rule, (c) primary key rule, (d) referential integrity rule, in database manage64., ment ensures that key values in one table are referenced in a related table., (a) null rule, (b) unique column rule, (c) primary key rule, (d) referential integrity rule, in database manage65., ment ensures that user defined constraints are enforced to restrict deletion, or updating of rows., (a) Complex integrity checking rule, (b) unique column rule, (c) primary key rule, (d) referential integrity rule, rule in data reference in66., tegrity ensures that referred data is not, deleted or updated., (a) restrict, (b) set to null, (c) set to default, (d) cascade, rule in data reference in67., tegrity ensures that whenever data is, deleted, all dependencies to deleted data, are set to null value., (a) restrict, (b) set to null, (c) set to default, Prepared by: Dr.V.Nagaradjane, , 81, (d) cascade, 68., , (a), (b), (c), (d), 69., , (a), (b), (c), (d), 70., , (a), (b), (c), (d), 71., , (a), (b), (c), (d), 72., , (a), (b), (c), (d), , 1.8.5, , rule in data reference integrity ensures that whenever data is, deleted, all dependencies are set to their, default value., restrict, set to null, set to default, cascade, rule in data reference integrity ensures that whenever data is updated or deleted, all dependency rows, are correspondingly updated or deleted., restrict, set to null, set to default, cascade, rule in data reference integrity ensures that whenever data is updated or deleted, all dependency rows, are correspondingly updated or deleted., restrict, set to null, set to default, cascade, rule in data reference integrity ensures that no action is taken, when attempt is made to delete or update referenced data., No action, Set to null, Set to default, Cascade, The practice of specifying only specified, values are entered in particular column, (like NOT NULL, DEFAULT 0) is called, ., integrity rule, integrity constraint, updation rule, relational rule, , Relationships in tables, , 73. Creating relationship for data in one, table with that in another table in, database is called, ., (a) integrity, (b) constraint, (c) relationship, (d) none of them, is used to relate data in one, 74., table to that in another table., (a) key, (b) column, (c) row, (d) table
Page 88 :
82, , Prepared by: Dr.V.Nagaradjane, , 75. A key which is unique to a table is called, ., (a) primary key, (b) foreign key, (c) unique, (d) none of them, 76. A key which helps to connect data in, one secondary table to that in a primary, table is called, ., (a) primary key, (b) foreign key, (c) unique, (d) none of them, 77. A key which helps to connect data in, one secondary table to that in a primary, table is called, ., (a) primary key, (b) foreign key, (c) alternate key or candidate key, (d) none of them, 78. A key which can be used as a prospective primary key (in the future) is called, ., (a) primary key, (b) foreign key, (c) alternate key or candidate key, (d) none of them, 79. A key which can be used as a prospective primary key (in the future) is called, ., (a) primary key, (b) foreign key, (c) alternate key or candidate key, (d) none of them, , 1.8.6, 80., (a), (b), (c), (d), 81., (a), (b), (c), (d), 82., (a), (b), (c), (d), 83., , Introduction to various types, of Queries and their uses, SQL stands for, ., Structured Query Language, Standard Query Language, Synchronized Query Language, Structured Question Language, A query which creates database, table,, inserts rows, deletes rows & updates ex., isting values is called, update query, select query, both a & b, neither a nor b, A query which selects values based from, a table is called, ., update query, select query, both a & b, neither a nor b, A query which selects values from a table is called, ., , (a), (b), (c), (d), 84., (a), (c), 85., (a), (c), 86., (a), (c), 87., (a), (c), 88., (a), (c), 89., (a), (b), (c), (d), 90., (a), (b), (c), (d), 91., , (a), (b), , update query, select query, both a & b, neither a nor b, The clause which specifies constraints, for selecting or updating data is called, clause., GROUP BY, (b) HAVING, ORDER BY, (d) WHERE, The clause which specifies rule for data, aggregation is called, clause., GROUP BY, (b) HAVING, ORDER BY, (d) WHERE, The clause which specifies rule for selecting data needed for aggregation is, called, clause., GROUP BY, (b) HAVING, ORDER BY, (d) WHERE, The clause which specifies the rule for, clause., sorting of data is called, GROUP BY, (b) HAVING, ORDER BY, (d) WHERE, The clause which specifies that data, should be sorted in descending order is, called, clause., DESC, (b) HAVING, ORDER BY, (d) WHERE, Which of the following queries creates, a table named contact with name and, mobile columns?, create table contact (name varchar(30), mobile varchar(20), primary key(name));, insert, into, contact, values(’Desiga’,’329842893’);, update contact set mobile=’322312112’ where, name=’Desiga’;, select * from contact;, Which of the following queries selects all, records from a table named contact?, create table contact (name varchar(30), mobile varchar(20), primary key(name));, insert, into, contact, values(’Desiga’,’329842893’);, update contact set mobile=’322312112’ where, name=’Desiga’;, select * from contact;, Which of the following queries sets a, new mobile number (322312112) for a, person named Desiga in the contact table?, create table contact (name varchar(30), mobile varchar(20), primary key(name));, insert, into, contact, values(’Desiga’,’329842893’);
Page 89 :
Q. Bank [COPA Semester - 1], , 83, , (b) 34234242234, (c) update contact set mobile=’322312112’ where (a) 2332323423, (c) 33423423242, (d) 2342342323, name=’Desiga’;, (d) select * from contact;, 99. The following query inserts, 92. Which of the following queries inserts a, in the name column., new record in a table named contact?, insert into contact (name, mobile) val(a) create table contact (name varchar(30), moues (’Nathiya’, ’2332323423’);, bile varchar(20), primary key(name));, (a) values, (b) contact, (b) insert, into, contact, val(c) name, (d) Nathiya, ues(’Desiga’,’329842893’);, (c) update contact set mobile=’322312112’ where 100. The following query updates the mobile, column to new value if the name is, name=’Desiga’;, ., (d) select * from contact;, update, contact, set, mo93. The following query creates column, bile=’453453445343’, where, named name, with a data type, name=’Girija’;, ., (a) name, (b) Girija, create table contact (name var(c) mobile, (d) contact, char(30), mobile varchar(20), primary, 101. The following query updates the mobile, key(name));, (a) varchar, (b) int, where the name is, to, (c) double, (d) blob, Girija., update, contact, set, mo94. The following query creates column, bile=’453453445343’, where, named name, having varchar type, name=’Girija’;, with maximum length of, (a) 453453445343, (b) 435353453453, characters., (c) 56454646544, (d) 23424234233, create table contact (name varchar(30), mobile varchar(20), primary, 102. The following query deletes a row if the, ., name is, key(name));, (a) 10, (b) 20, delete, from, contact, where, (c) 30, (d) 40, name=’Gayathri’;, (a) contact, (b) name, 95. The following query creates column, (c) Gayathri, (d) delete, named mobile, having varchar type, a table, with maximum length of, 103. The following query, named contact., characters., drop table contact;, create table contact (name var(a), deletes, char(30), mobile varchar(20), primary, (b) creates, key(name));, (c) updates, (a) 10, (b) 20, (d) adds new column to, (c) 30, (d) 40, following, query, designates, 104. The following query selects data in, 96. The, order., as primary key., select * from contact order by name, create table contact (name varDESC;, char(30), mobile varchar(20), primary, (a) ascending, (b) descending, key(name));, (c) unordered, (d) none of them, (a) name, (b) mobile, (c) contact, (d) primary key, keyword to an inte97. Adding, 1.8.7 Designing Access Reports and, ger field permits automatic increment to, Forms, the record number., (a) primary key, 105. Microsoft Access provides visual envi(b) key, ronment for design of, ., (c) auto increment, (d) automatic, 98. The following query inserts, in the mobile column., insert into contact (name, mobile) valPreparedues, by:(’Nathiya’,, Dr.V.Nagaradjane, ’2332323423’);
Page 90 :
84, (a) tables, (b) reports, (c) forms, (d) all of them, 106. MS Access creates files are stored with, extension., (a) .docx, (b) .xlsx, (c) .accdb, (d) .pptx, 107. New database created in MS Access has, got a default table named, ., (a) Table1, (b) Database1, (c) Column1, (d) Row1, 108. By default, new table is displyed in, view., (a) Datasheet View, (b) Design View, (c) Report View, (d) Form View, is an alternate to datasheet, 109., view for design of table in MS Access., (a) Datasheet View, (b) Design View, (c) Report View, (d) Fom View, can be created to help easy, 110., data entry in MS Access tables., (a) Form, (b) Report, (c) database, (d) spreadsheet, view permits selection of, 111., datatypes, default values and constraints for each column., (a) Datasheet, (b) Design, (c) Report, (d) Form, 112. By default, first column of an MS Access, and it has, table is named, auto increment property., (a) NAME, (b) DATE, (c) NULL, (d) ID, 113. An ordinary form for data enetry in, MS Access tables may be created using, menu., (a) Create− >Form, (b) Create− >Split Form, (c) Create− >Multiple Items, (d) Create− >Blank Form, 114. In MS Access, a form with data, records at one half and entry format, at the other half may be created using, menu., (a) Create− >Form, (b) Create− >Split Form, (c) Create− >Multiple Items, (d) Create− >Blank Form, 115. In MS Access, multiple rows of data may, be created using, menu., (a) Create− >Form, , Prepared by: Dr.V.Nagaradjane, (b) Create− >Split Form, (c) Create− >Multiple Items, (d) Create− >Blank Form, 116. In MS Access, blank form may be cremenu., ated using, (a) Create− >Form, (b) Create− >Split Form, (c) Create− >Multiple Items, (d) Create− >Blank Form, 117. In MS Access, form may created through, a wizard using, menu., (a) Create− >More Forms− >Form Wizard, (b) Create− >Split Form, (c) Create− >Multiple Items, (d) Create− >Blank Form, 118. In MS Access, data sheet may be cremenu., ated using, (a) Create− >More Forms− >Form Wizard, (b) Create− >More Forms− >Data Sheet, (c) Create− >More Forms− >Modal Dialog, (d) Create− >Blank Form, 119. In MS Access, form dialog may be cremenu., ated using, (a) Create− >More Forms− >Form Wizard, (b) Create− >More Forms− >Data Sheet, (c) Create− >More Forms− >Modal Dialog, (d) Create− >Blank Form, 120. In MS Access, form may be manually, designed through available components, (like textfield, datapicker, combo-box,, menu., etc.) using, (a) Create− >More Forms− >Form Wizard, (b) Create− >More Forms− >Data Sheet, (c) Create− >More Forms− >Modal Dialog, (d) Create− >Form Design, 121. In MS Access, default report may be cremenu., ated using, (a) Create− >Report, (b) Create− >Blank Report, (c) Create− >Report Wizard, (d) Create− >Report Design, 122. In MS Access, blank report may be cremenu., ated using, (a) Create− >Report, (b) Create− >Blank Report, (c) Create− >Report Wizard, (d) Create− >Report Design, 123. In MS Access, report may be created, through wizard using, menu., (a) Create− >Report, (b) Create− >Blank Report
Page 91 :
Q. Bank [COPA Semester - 1], (c) Create− >Report Wizard, (d) Create− >Report Design, 124. In MS Access, report may be designed, using components like combobox, text, field, text area, list, etc., using, menu., (a) Create− >Report, (b) Create− >Blank Report, (c) Create− >Report Wizard, (d) Create− >Report Design, , 1.8.8, , Macros in MS Access, , 125. In MS Access, macro may be recorded, to carry out different actions using, menu., (a) Create− >Report, (b) Create− >Blank Report, (c) Create− >Report Wizard, (d) Create− >Macro, 126. In MS Access, a macro can be activated, button., by pressing,, (a) Form, (b) Report, (c) Run, (d) Table, 127. In MS Access, macros can automate, ., (a) program flow/ data entry, (b) data import/ data export, (c) filter/ query/ search, (d) all of them, , Prepared by: Dr.V.Nagaradjane, , 85, , Answers (1275 - 1401), 1. (a), 5. (a), 9. (c), 13. (a), 17. (d), 21. (b), 25. (b), 29. (b), 33. (c), 37. (a), 41. (c), 45. (d), 49. (d), 53. (a), 57. (d), 61. (a), 65. (a), 69. (d), 73. (c), 77. (b), 81. (a), 85. (a), 89. (a), 93. (a), 97. (c), 101. (a), 105. (d), 109. (b), 113. (a), 117. (a), 121. (a), 125. (d), , 2. (d), 6. (b), 10. (d), 14. (c), 18. (a), 22. (c), 26. (c), 30. (c), 34. (b), 38. (c), 42. (a), 46. (d), 50. (c), 54. (b), 58. (c), 62. (b), 66. (a), 70. (d), 74. (a), 78. (c), 82. (b), 86. (b), 90. (d), 94. (c), 98. (a), 102. (c), 106. (c), 110. (a), 114. (b), 118. (b), 122. (b), 126. (c), , 3. (b), 7. (d), 11. (a), 15. (b), 19. (c), 23. (d), 27. (d), 31. (d), 35. (d), 39. (c), 43. (a), 47. (a), 51. (b), 55. (c), 59. (a), 63. (c), 67. (b), 71. (a), 75. (a), 79. (c), 83. (b), 87. (c), 91. (c), 95. (b), 99. (d), 103. (a), 107. (a), 111. (b), 115. (c), 119. (c), 123. (c), 127. (d), , 4. (c), 8. (a), 12. (b), 16. (c), 20. (a), 24. (a), 28. (a), 32. (b), 36. (b), 40. (b), 44. (c), 48. (b), 52. (d), 56. (c), 60. (a), 64. (d), 68. (c), 72. (b), 76. (b), 80. (a), 84. (d), 88. (a), 92. (b), 96. (a), 100. (b), 104. (b), 108. (a), 112. (d), 116. (d), 120. (d), 124. (d)
Page 92 :
86, , 1.9, 1.9.1, 1., (a), (c), 2., (a), (b), (c), (d), 3., (a), (b), (c), (d), 4., (a), (c), 5., (a), (c), 6., (a), (c), 7., (a), (c), 8., (a), (b), (c), (d), 9., (a), (b), (c), , Prepared by: Dr.V.Nagaradjane, , Networking, Computer Networks, Necessity, and Advantages, Connecting several computers and devices using wired or wireless technology, ., is called, hard disk, (b) RAM, pen dirve, (d) networking, Internet is constituted of, ., network of networks, hard disk, DVD, pen drive, Computers and devices can be contechnology to, nected using, create a network., wired, wireless, both a & b, neither a nor b, The systematic design (like radial, ring,, etc.) of connecting computers in a net., work is called network, topology, (b) protocol, firewall, (d) antivirus, The procedure used by computers connected in a network for data exchange is, ., called network, topology, (b) protocol, firewall, (d) antivirus, The computer which separates a local, network from external Internet is called, ., network, topology, (b) protocol, firewall, (d) antivirus, The piece of software which prevents, malicious software from entering a com., puter is called network, topology, (b) protocol, firewall, (d) antivirus, Most of the wired network connections, use, ., Optical Fibre Cable (OFC), USB cable, pen drive, hard drive, The port for connecting broadband cable to a computer is called, ., ethernet port, Registered Jack 45 (RJ-45), both a & b, , (d) none of them, 10. Wireless network connections use, technologies., (a) Wireless Fidelity (WiFi), (b) Bluetooth, (c) both a & b, (d) neither a nor b, are the hardware devices, 11., that help the computer to connect to, a network., (a) Routers, (b) MODEMs, (c) Wireless MODEMs, (d) all of them, ., 12. MODEM stands for, (a) MODulation DEMocracy, (b) MODulation DEModulation, (c) MODern DEModulation, (d) MODerate DEModulation, ., 13. Routers help in, (a) transmission of data between networks, (b) connecting different devices using appropriate, protocol, (c) both a & b, (d) neither a nor b, , 1.9.2, , Client Server and peer to Peer, networking concepts, , 14. A, (a), (c), 15., (a), (b), (c), (d), 16., (a), (b), (c), (d), 17., (a), (c), , network, , connection, requires, important components, to connect to each other., IP address, (b) Port number, both a & b, (d) none of them, IP address helps to, a computer connected to a network., uniquely identify, format, reset, reject, Port number on a computer host, connected to a network denotes a, ., background server program, client program, both a & b, none of them, A program which runs in the background, and sends results requested by a client, is called a, ., server, (b) client, port, (d) IP address
Page 93 :
Q. Bank [COPA Semester - 1], 18. A program which runs in the foreground,, communicates with server and displays, results sent by the server is called a, ., (a) server, (b) client, (c) port, (d) IP address, 19. Computers connected to a network without any client or server system (all hosts, are equally equally important) are in, network., (a) client server, (b) peer to peer, (c) firewall, (d) proxy server, , 1.9.3, , Concept of Proxy Server and, proxy firewall server, , 20. The intermediary host which communicates with the clients on behalf of a an., other server is called, (a) proxy server, (b) firewall, (c) ethernet, (d) WiFi, 21. The intermediary host which protects a, network from any communication with, prohibited hosts outside the protected, ., network is called, (a) proxy server, (b) firewall, (c) ethernet, (d) WiFi, ., 22. Firewall can, (a) deny access to specific sites, (b) allow access to only white listed sites, (c) both a & b, (d) none of them, 23. A proxy server which simply forwards, messages from one network to another, proxy., network is called, (a) gateway/ tunneling, (b) forward proxy, (c) reverse proxy, (d) all of them, 24. A proxy server which communicates with, the Internet and retrieves data from the, Internet is called, proxy., (a) gateway/ tunneling, (b) forward proxy, (c) reverse proxy, (d) all of them, 25. A proxy server which communicates, with the servers in a local network (for, services like decryption, authentication,, etc.) is called, proxy., (a) gateway/ tunneling, Prepared by: Dr.V.Nagaradjane, , 87, (b) forward proxy, (c) reverse proxy, (d) all of them, 26. Firewall can be implemented through, ., (a) hardware, (b) software, (c) both a & b, (d) none of them, , 1.9.4, , Network topologies, , 27. Each computer or device connected to a, network is generally called, ., (a) node, (b) host, (c) both a & b, (d) neither a nor b, 28. The design adopted for connecting sev., eral hosts on a network is called, (a) telephony, (b) wiring, (c) connection, (d) topology, 29. When 2 devices are connected through a, dedicated line, it is, topology., (a) point to point, (b) bus, (c) star, (d) ring, 30. When all nodes are connected a common transmission line (backbone line, with 2 or more end points), it is, topology., (a) point to point, (b) bus, (c) star, (d) ring, 31. When all nodes are connected to a central hub, it is, topology., (a) point to point, (b) bus, (c) star, (d) ring, 32. When all nodes are connected in a circular form (the first node becomes the, last node), it is, topology., (a) point to point, (b) bus, (c) star, (d) ring, 33. When each host has a dedicated line, connected to any other host on the network, it is, topology., (a) fully connected, (b) Daisy chain
Page 94 :
88, , Prepared by: Dr.V.Nagaradjane, , (c) tree, (d) partly connected, 34. For fully connected topology, the number of connections (c) required for n, ., hosts is, (a) c = n(n−2), 2, (b) c = n(n−1), 4, (c) c = n(n−1), 2, (d) c = (n−1)(n−2), 2, When, each, host has a dedicated line, 35., connected to any other host on the nettopology., work, it is, (a) fully connected, (b) daisy chain, (c) tree, (d) partly connected, 36. When computers are connected in chain, (from one host to another) and data, hops between hosts till it reaches the intended host, it is, topology., (a) fully connected, (b) daisy chain, (c) tree, (d) partly connected, 37. When data travels in branching connections to reach intended host, the net., work topology is called, (a) fully connected, (b) daisy chain, (c) tree, (d) partly connected, 38. When hosts are connected in a part fully, connected manner (with many missing, connections), it is, topology., (a) fully connected, (b) daisy chain, (c) tree, (d) partly connected, LAN, WAN and MAN, 39., (a), (b), (c), (d), 40., (a), (b), (c), , ., LAN stands for, Local Area Number, Local Area Network, Local Assignment Network, Lead Area Network, MAN stands for, ., Metropolitan Area Number, Metropolitan Assignment Network, Metropolitan Area Network, , (d), 41., (a), (b), (c), (d), 42., (a), (c), 43., (a), (c), 44., (a), (c), 45., (a), (b), (c), (d), 46., (a), (c), , Medium Area Network, WAN stands for, ., Wide Area Number, Wide Assignment Network, Wise Area Network, Wide Area Network, Usually, the network connecting hosts, inside a single building is called, ., LAN, (b) WAN, MAN, (d) none of them, Usually, the network connecting hosts, inside a city/ metropoliton limit is called, ., LAN, (b) WAN, MAN, (d) none of them, Usually, the network connecting hosts, located in several cities or nations is, called, ., LAN, (b) WAN, MAN, (d) none of them, WLAN stands for, ., Wireless Local Area Network, Wired Local Area Network, Wireless Local Area Number, Wireless Local Arithmatic Network, When network hosts are connected withprotocol is used., out wires,, LAN, (b) WAN, MAN, (d) WLAN, , 1.9.5, , Network components, , Modem, 47. MODEM is a device used for converting, ., (a) digital signal to analog, (b) analog signal to digital, (c) both a & b, (d) neither a nor b, ., 48. MODEM stands for, (a) MOdulation DEmodulation, (b) MOdulation DEclaraction, (c) MOdern DEmodulation, (d) MOdulation DEcision, 49. MODEM is used to convey data over, ., (a) air, (b) telephone line, (c) train track, (d) bus route
Page 95 :
Q. Bank [COPA Semester - 1], Hub, 50. The device which repeats a signal on, all lines except incoming one is called, ., (a) hub, (b) switch, (c) MODEM, (d) router, to switch/ bridge, 51. Hub is, since it repeats data even to the unwanted connections., (a) inferior, (b) superior, (c) equivalent, (d) none of them, Switch, , 89, (a), (b), (c), (d), 58., , (a), (b), (c), (d), 59., , 52. The networking device which receives, a packet and repeats it to just the, intended recipient lines is called a, ., (a) hub, (b) switch, (c) MODEM, (d) none of them, to a hub since un53. Switch is, wanted repetitions are curtailed., (a) inferior, (b) superior, (c) equivalent, (d) none of them, Router, , (a), (b), (c), (d), 60., (a), (b), (c), (d), 61., , 54. The device used to transfer data from, one network to another network on the, ., Internet is called, (a) hub, (b) switch, (c) MODEM, (d) router, Bridge, , (a), (b), (c), (d), 62., , 55. The device which, Area Network to, Network is called, (a) hub, (c) MODEM, , connects one Local, another Local Area, ., (b) switch, (d) bridge, , (a), (b), (c), (d), , unshielded twisted cable, shielded twisted cable, coaxial cable, fibre optic cable, The cable containing 4 pairs of twisted, wires with shielding foil to control interference with other electrical signals, and used for data transmission is called, ., unshielded twisted cable, shielded twisted cable, coaxial cable, fibre optic cable, A cable with single copper core and, ., braided metal shield is called, unshielded twisted cable, shielded twisted cable, coaxial cable, fibre optic cable, A cable with single fibre optic core line, surrounded by several layers of protective materials is called, ., unshielded twisted cable, shielded twisted cable, coaxial cable, fibre optic cable, interFibre optic cables are, ferences from electric cables and electromagnetic waves., prone to, unaffected by, susceptible to, affected by, Out of the several cable options,, cable provides high speed over, long distances without being affected by, local interferences., fibre optic, unshielded twisted pair, shielded twisted pair, none of them, , Gateway, 56. The node which connects one large network (a WAN, MAN, etc.) to another, large network is called, ., (a) hub, (b) switch, (c) gateway, (d) MODEM, , 1.9.6, , Network Cables, , 57. The cable containing 4 pairs of twisted, wires without any shielding foil for data, transmission is called, ., Prepared by: Dr.V.Nagaradjane, , 1.9.7, , Wireless networks, , 63. Wireless networks communicate using, signal instead of cables., (a) infrared, (b) low frequency radio wave, (c) Wireless Fidelity (WiFi - IEEE 802.11 standard), (d) all of them, is the, 64. In the modern days,, best choice for wireless networking.
Page 96 :
90, , Prepared by: Dr.V.Nagaradjane, , (a) WiFi, (b) infrared, (c) radio waves, (d) micro-wave, 65. The WiFi standard which permits transmission distance of 50m with data rate, ., of 54MBPS is, (a) IEEE 802.11a, (b) IEEE 802.11b, (c) IEEE 802.11g, (d) IEEE 802.11n, 66. The WiFi standard which permits transmission distance of 100m with data rate, of 11MBPS is, ., (a) IEEE 802.11a, (b) IEEE 802.11b, (c) IEEE 802.11g, (d) IEEE 802.11n, 67. The WiFi standard which permits transmission distance of 100m with data rate, ., of 54MBPS is, (a) IEEE 802.11a, (b) IEEE 802.11b, (c) IEEE 802.11g, (d) IEEE 802.11n, 68. The WiFi standard which permits transmission distance of more than 100m, with data rate of 100MBPS is, ., (a) IEEE 802.11a, (b) IEEE 802.11b, (c) IEEE 802.11g, (d) IEEE 802.11n, wired net69. Wireless networks are, works., (a) slower than, (b) faster than, (c) as fast as, (d) none of them, 70. In terms of data safety, wireless networks, wired networks., are, (a) more secure than, (b) less secure than, (c) as safe as, (d) none of them, m, 71. Normally, WiFi signal reach, distance., (a) 50 to 100m, (b) 1 to 2m, (c) 0.5 to 1.0m, (d) 2 to 3m, for con72. WiFi networks have, necting., (a) name, (b) password, (c) both a & b, (d) none of them, 73. Name of a WiFi network may be, ., (a) visible, (b) invisible, (c) both a & b, (d) none of them, ., 74. Open WiFi networks have, (a) a visible name, (b) no password, (c) visible name without any password, (d) none of them, , 1.9.8, , Bluetooth technology, , 75. The technology which permits data, transmission between devices like computers, mobile phones, tablets, headsets, etc. is called, ., , (a), (b), (c), (d), 76., (a), (b), (c), (d), 77., (a), (c), 78., (a), (b), (c), (d), , 1.9.9, , bluetooth, coaxial cable, fibre optic cable, twisted pair cable, The network established using bluetooth, ., technology is called a, Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN), Personal Area Network (PAN), Bluetooth signals have a range of, ., 1m, (b) 5m, 10m, (d) 100m, Bluetooth permits, ., pairing by acceptance, pairing by password authentication, pairing by verification, all of them, , OSI 7 Layer Model, , 79. The 7 layer model of OSI stands for, ., (a) Open System Interconnection, (b) Open System Interface, (c) Open Synchronous Interconnection, (d) Ordered System Interconnection, 80. The first layer of the OSI model is, layer and it controls transmission of bits of data., (a) physical, (b) data link layer, (c) network, (d) transport, 81. The second layer of the OSI model is, layer and it controls reliable, transmission of data frames., (a) physical, (b) data link, (c) network, (d) transport, 82. The third layer of the OSI model is, layer and it controls addressing, routing and traffic control for data, frame transmission., (a) physical, (b) data link, (c) network, (d) transport, 83. The fourth layer of the OSI model is, layer and it controls transmission of data using particular protocols like TCP or UDP., (a) physical, (b) data link
Page 97 :
Q. Bank [COPA Semester - 1], (c) network, (d) transport, 84. The fifth layer of the OSI model is, layer and it controls connection between 2 hosts (like client and, server) during data communication., (a) session, (b) presentation, (c) application, (d) transport, 85. The sixth layer of the OSI model is, layer and it takes care of encryption, decryption, compression, decompression and data encoding., (a) session, (b) presentation, (c) application, (d) transport, 86. The seventh layer of the OSI model is, layer and it deals with file, sharing, video sharing, audio sharing,, browsing, etc. using specific programs., (a) session, (b) presentation, (c) application, (d) transport, , 1.9.10, 87., (a), (b), (c), (d), 88., (a), (b), (c), (d), 89., (a), (b), (c), (d), 90., (a), (b), (c), (d), 91., (a), (b), (c), (d), 92., (a), , Various Network protocols, , 91, (b) Reverse Address Resolution Protocol (RARP), (c) Open System Interconnection (OSI), (d) none of them, is the version of Internet, 93., Protocol now being phased out., (a) IP version 1 (IPV1), (b) IP version 2 (IPV2), (c) IP version 4 (IPV4), (d) IP version 6 (IPV6), is the version of Internet, 94., Protocol now being introduced to handle increased size of the Internet., (a) IP version 1 (IPV1), (b) IP version 2 (IPV2), (c) IP version 4 (IPV4), (d) IP version 6 (IPV6), by nu95. IPV4 addresses have a, meric address., (a) 4, (b) 6, (c) 8, (d) 16, addresses, 216.58.213.36, 96. The, (www.google.com),, 209.191.88.254, (www.yahoo.com) belong to IP version, ., (a) 1, (b) 2, (c) 3, (d) 4, , ., TCP stands for, Transmission Control Protocol, Transmission Control Procedure, Transit Control Protocol, Transmission Convergence Protocol, TCP/IP, ., UDP stands for, Unified Datagram Protocol, 97. In a client server network, the ports, User Datagram Protocol, in the range of 0 to 1023 are called, User Datagram Procedure, ports., User Digital Protocol, (a) relational ports, ., IP stands for, (b) general ports, Information Protocol, (c) well known ports, Internet Procedure, (d) user ports, Identity Protocol, 98. Network protocols are standardized, Internet Protocol, ., through, ., DNS stands for, (a) Request For Comment (RFC), Domain Name Synchronized, (b) email, Data Name System, (c) web server, Domain Name System, (d) telnet, Domain Network System, 99. RFC in networking stands for, allows for mapping IP ad., (a) Rejection For Comment, dress to an ethernet or hardware ad(b) Request For Comment, dress., Address Resolution Protocol (ARP), (c) Request For Contest, Reverse Address Resolution Protocol (RARP) (d) Request Freight Comment, Open System Interconnection (OSI), 100. W3C in networking stands for, none of them, ., (a) World Wide Winter Consortium, allows for mapping an eth(b) World Wide Web Contest, ernet or hardware address to an IP ad(c) World White Web Consortium, dress. Resolution Protocol (ARP), Address, , Prepared by: Dr.V.Nagaradjane
Page 98 :
92, (d) World Wide Web Consortium, 101. TCP/IP port number 7 is assigned for, protocol., (a) daytime, (b) echo, (c) quote of the day, (d) message send, 102. TCP/IP port number 13 is assigned for, protocol., (a) daytime, (b) echo, (c) quote of the day, (d) message send, 103. TCP/IP port number 17 is assigned for, protocol., (a) daytime, (b) echo, (c) quote of the day, (d) message send, 104. TCP/IP port number 18 is assigned for, protocol., (a) daytime, (b) echo, (c) quote of the day, (d) message send, 105. TCP/IP port number 20 is assigned for, ., (a) Telnet, (b) Simple Mail Transfer Protocol (SMTP), (c) File Transfer Protocol Protocol (FTP), (d) Trivial File Transfer Protocol (TFTP), 106. TCP/IP port number 23 is assigned for, ., (a) Telnet, (b) Simple Mail Transfer Protocol (SMTP), (c) File Transfer Protocol Protocol (FTP), (d) Trivial File Transfer Protocol (TFTP), 107. TCP/IP port number 25 is assigned for, ., (a) Telnet, (b) Simple Mail Transfer Protocol (SMTP), (c) File Transfer Protocol Protocol (FTP), (d) Trivial File Transfer Protocol (TFTP), 108. TCP/IP port number 69 is assigned for, ., (a) Telnet, (b) Simple Mail Transfer Protocol (SMTP), (c) File Transfer Protocol Protocol (FTP), (d) Trivial File Transfer Protocol (TFTP), 109. TCP/IP port number 80 is assigned for, ., (a) Hyper Text Transfer Protocol (HTTP), (b) Post Office Protocol (POP), , Prepared by: Dr.V.Nagaradjane, (c) Structured Query Language (SQL), (d) Network News Transfer Protocol (NNTP), 110. TCP/IP port number 109 is assigned for, ., (a) Hyper Text Transfer Protocol (HTTP), (b) Post Office Protocol (POP), (c) Structured Query Language (SQL), (d) Network News Transfer Protocol (NNTP), 111. TCP/IP port number 118/ 156 is assigned for, ., (a) Hyper Text Transfer Protocol (HTTP), (b) Post Office Protocol (POP), (c) Structured Query Language (SQL), (d) Network News Transfer Protocol (NNTP), 112. TCP/IP port number 119/ 443 is as., signed for, (a) Hyper Text Transfer Protocol (HTTP), (b) Post Office Protocol (POP), (c) Structured Query Language (SQL), (d) Network News Transfer Protocol (NNTP), 113. TCP/IP port number 143/ 220 is as., signed for, (a) Internet Message Access Protocol (IMAP), (b) Simple Network Management Protocol, (SNMP), (c) Internet Relay Chat (IRC), (d) Precision Time Protocol (PTP), 114. TCP/IP port number 161 is assigned for, ., (a) Internet Message Access Protocol (IMAP), (b) Simple Network Management Protocol, (SNMP), (c) Internet Relay Chat (IRC), (d) Precision Time Protocol (PTP), 115. TCP/IP port number 194 is assigned for, ., (a) Internet Message Access Protocol (IMAP), (b) Simple Network Management Protocol, (SNMP), (c) Internet Relay Chat (IRC), (d) Precision Time Protocol (PTP), 116. TCP/IP port number 319 is assigned for, ., (a) Internet Message Access Protocol (IMAP), (b) Simple Network Management Protocol, (SNMP), (c) Internet Relay Chat (IRC), (d) Precision Time Protocol (PTP), 117. TCP/IP port number 319 is assigned for, ., (a) Internet Message Access Protocol (IMAP), (b) Simple Network Management Protocol, (SNMP), (c) Internet Relay Chat (IRC)
Page 99 :
Q. Bank [COPA Semester - 1], (d) Precision Time Protocol (PTP), 118. TCP/IP port number 443 is assigned for, ., (a) HTTP over Secure Socket Layer HTTPS, (b) Remote Procedure Call (RPC), (c) Dynamic Host Configuration Protocol, (DHCP), (d) Internet Message Access Protocol over Secure, Socket Layer (IMAPS), 119. TCP/IP port number 530 is assigned for, ., (a) HTTP over Secure Socket Layer HTTPS, (b) Remote Procedure Call (RPC), (c) Dynamic Host Configuration Protocol, (DHCP), (d) Internet Message Access Protocol over Secure, Socket Layer (IMAPS), 120. TCP/IP port number 546/ 547 is as., signed for, (a) HTTP over Secure Socket Layer HTTPS, (b) Remote Procedure Call (RPC), (c) Dynamic Host Configuration Protocol, (DHCP), (d) Internet Message Access Protocol over Secure, Socket Layer (IMAPS), 121. TCP/IP port number 993 is assigned for, ., (a) HTTP over Secure Socket Layer HTTPS, (b) Remote Procedure Call (RPC), (c) Dynamic Host Configuration Protocol, (DHCP), (d) Internet Message Access Protocol over Secure, Socket Layer (IMAPS), FTP, 122. The TCP/IP protocol which permits, sharing of large files over the Internet, ., is called, (a) File Transfer Protocol (FTP), (b) Hyper Text Transmission Protocol (HTTP), (c) Simple Mail Transfer Protocol (SMTP), (d) Network Time Protocol (NTP), ., 123. FTP runs on port number, (a) 7, (b) 13, (c) 20, (d) 23, 124. The FTP server which does not require, login process is called, ., (a) Hyper Text Transmission Protocol, (b) Simple Mail Transfer Protocol, (c) Network Time Protocol, (d) Anonymous File Transfer Protocol, 125. Using FTP, a file can be copied from, remote system to the local system using, the command, ., Prepared by: Dr.V.Nagaradjane, , 93, (a) get, (b) put, (c) cd, (d) lcd, 126. Using FTP, a file can be copied from local host to remote host using the com., mand, (a) get, (b) put, (c) cd, (d) lcd, 127. Using FTP, working directory on the remote host can be changed using the, command, ., (a) pwd, (b) put, (c) cd, (d) lcd, 128. Using FTP, working directory on the local host can be changed using the com., mand, (a) pwd, (b) bye, (c) cd, (d) lcd, 129. Using FTP, list of files on the remote, host can be viewed using the command, ., (a) pwd, (b) bye, (c) cd, (d) lcd, 130. Using FTP, a file on the remote host, may be deleted using the command, ., (a) delete, (b) bye, (c) cd, (d) lcd, 131. Using FTP, connection to remote FTP, server may be terminated using the com., mand, (a) delete, (b) bye/ quit, (c) cd, (d) lcd, ., 132. Popular FTP clients are, (a) CoreFTP, (b) FireFTP, (c) FileZilla, (d) all of them, Telnet, 133. The network protocol which permits, a person to login to a remote computer, access files, execute commands, on the remote computer, etc. is called, ., (a) FTP, (b) HTTP, (c) Telnet, (d) SMTP, is reserved for telnet, 134. Port No., protocol., (a) 7, (b) 13, (c) 20, (d) 23, 135. Usually, telnet connection is established, using, command followed by, name of host., (a) ftp, (b) telnet, (c) ping, (d) ls
Page 100 :
94, , 1.9.11, , Prepared by: Dr.V.Nagaradjane, , Logical, dresses, , and, , Physical, , Ad-, , 136. The address of the physical networking, component (like ethernet, WiFi, etc.) is, address., called, (a) virtual, (b) logical, (c) physical, (d) imaginary, 137. The address assigned to a host on getting connected to a network (like the Internet) is called, address., (a) virtual, (b) logical, (c) physical, (d) imaginary, 138. In networking, MAC stands for, ., (a) Media Address Control, (b) Machine Access Control, (c) Media Access Contact, (d) Media Access Control, 139. Logical address of a host connected to, a network is otherwise called, address., (a) IP address, (b) IP version 4 address, (c) IP version 6 address, (d) all of them, , 1.9.12, , Classes of Networks, , 140. The addresses of class A network has, ., subnet mask of, (a) 255.0.0.0, (b) 255.255.0.0, (c) 255.255.255.0, (d) none of them, 141. The addresses of class B network has, ., subnet mask of, (a) 255.0.0.0, (b) 255.255.0.0, (c) 255.255.255.0, (d) none of them, 142. The addresses of class C network has, subnet mask of, ., (a) 255.0.0.0, (b) 255.255.0.0, (c) 255.255.255.0, (d) none of them, 143. First byte of class A network is in the, range of, ., (a) 1 - 126, (b) 128 - 191, (c) 192 - 223, (d) none of them, 144. First byte of class B network is in the, range of, ., (a) 1 - 126, (b) 128 - 191, , (c) 192 - 223, (d) none of them, 145. First byte of class C network is in the, ., range of, (a) 1 - 126, (b) 128 - 191, (c) 192 - 223, (d) none of them, 146. Each class A network supports, hosts., (a) 1,67,77,214, (b) 65,534, (c) 254, (d) none of them, 147. Each class B network supports, hosts., (a) 1,67,77,214, (b) 65,534, (c) 254, (d) none of them, 148. Each class C network supports, hosts., (a) 1,67,77,214, (b) 65,534, (c) 254, (d) none of them, bits for address149. IPV4 has got, ing of hosts., (a) 128, (b) 64, (c) 32, (d) 16, bits for address150. IPV6 has got, ing of hosts., (a) 128, (b) 64, (c) 32, (d) 16, bytes for ad151. IPV4 has got, dressing of hosts., (a) 16, (b) 8, (c) 4, (d) 2, bytes for ad152. IPV6 has got, dressing of hosts., (a) 16, (b) 8, (c) 4, (d) 2, 153. The address 2001:db8:a0b:12f0::1 is formatted in, ., (a) IPV0, (b) IPV2, (c) IPV4, (d) IPV6, , 1.9.13, , Network Security & Firewall, , 154. Connection to the Internet requires enforcement of, security., (a) low, (b) high, (c) zero, (d) no, 155. Filtering connections and disallowing, prohibited connections is carried out using, ., (a) MODEM, (b) router, (c) firewall, (d) bridge, 156. First general firewalls operated at layer, of the OSI model., (a) 3, (b) 4, (c) 5, (d) 7
Page 101 :
Q. Bank [COPA Semester - 1], 157. Second general firewalls operated at, layer, of the OSI model., (a) 3, (b) 4, (c) 5, (d) 7, 158. Third general firewalls operated at layer, of the OSI model., (a) 3, (b) 4, (c) 5, (d) 7, 159. First generation firewalls were otherwise, called, ., (a) packet filters, (b) stateful filters, (c) application filters, (d) none of them, 160. Second generation firewalls were otherwise called, ., (a) packet filters, (b) stateful filters, (c) application filters, (d) none of them, 161. Third generation firewalls were other., wise called, (a) packet filters, (b) stateful filters, (c) application filters, (d) none of them, ., 162. IPS in firewall stands for, (a) Intrusion Protection System, (b) Intrusion Prevention Software, (c) Internet Prevention System, (d) Intrusion Prevention System, 163. The identity management system binds, for reputed, logical addresses to, servers., (a) MAC address, (b) specific programs, (c) other computers, (d) none of them, 164. Third generation of firewall offers, to prevent web fingerprint attacks., (a) web application firewall, (b) packet filter, (c) stateful filter, (d) none of them, , 1.9.14, , DHCP Server, , 165. The protocol used to automatically assign IP address to a newly connected, host in a network is called, ., (a) Dynamic Host Configuration Procol (DHCP), , Prepared by: Dr.V.Nagaradjane, , 95, (b) Transmission Control Protocol (TCP), (c) User Datagram Protocol (UDP), (d) File Transfer Protocol (FTP), , 1.9.15, , Internet, , 166. The global network of networks is called, ., (a) Local Area Network, (b) Internet, (c) Intranet, (d) Metropolitan Area Network, 167. The global network established for a particular business (not for public access) is, called, ., (a) Local Area Network, (b) Internet, (c) Intranet, (d) Metropolitan Area Network, , 1.9.16, , Introduction to the Internet, , ., 168. Internet may be used for, (a) sharing information through World Wide Web, (b) sending and receiving emails, (c) sharing of large files, (d) all of them, ., 169. Internet may be used for, (a) cloud storage of data in remote computers, (b) secure operation of bank accounts through, netbanking and mobile banking, (c) secure operation of wallet payments, (d) all of them, ., 170. Internet helps scientists to, (a) share their research results with other scientists, (b) learn what happens in the state of the arch, research, (c) download articles published by other researchers, (d) all of them, ., 171. Internet helps in, (a) conducting online examinations, (b) conducting online classes, (c) conducting online interaction sessions to clear, the doubts of students, (d) all of them, ., 172. Internet helps to, (a) update correct time using Network Time Protocol (NTP), (b) e-commerce, (c) job search, (d) all of them
Page 102 :
96, , 1.9.17, , Prepared by: Dr.V.Nagaradjane, , Introduction to WWW, , ., 173. WWW stands for, (a) World Wide Web, (b) World Wire Web, (c) Work Wide Web, (d) World Wise Web, 174. The World Wide Web requires a, for page navigation., (a) document editor, (b) browser, (c) drawing program, (d) image editor, 175. Microsoft Internet Explorer, Microsoft, Edge, Firefox, Chrome, Safari, Konqueror, Seamonkey, etc. are, applications., (a) word processing, (b) spreadsheet, (c) browser, (d) presentation, 176. The space at the top of browser for entering the address of web site is called, ., (a) bookmarks bar, (b) history bar, (c) status bar, (d) address bar, 177. The list of addresses visited by a person, ., during browsing is called, (a) history, (b) bookmark, (c) private browsing, (d) home page, 178. The list of addresses saved by a person, for easy revisit is called, ., (a) history, (b) bookmark, (c) private browsing, (d) home page, 179. The method of browsing the web without storing any session information on, ., the local device is called, (a) history, (b) bookmark, (c) private browsing, (d) home page, 180. The web page which loads just as the, browser opens is called, ., (a) history, (b) bookmark, (c) private browsing, (d) home page, , holds information about files, downloaded from the Internet., (a) history, (b) downloads, (c) tab, (d) home page, opens new web page inside, 182. A, the current browser window itself., (a) history, (b) downloads, (c) tab, (d) home page, 181., , 1.9.18, , Web Browsers, , 183. The software used for viewing web pages, ., is called, (a) browser, (b) media player, (c) anti-virus, (d) virus, 184. Microsoft Internet Explorer, Firefox,, Chrome, Opera, Microsoft Edge, Apple, Safari, etc. are, software., (a) browser, (b) media player, (c) anti-virus, (d) virus, for typing the, 185. A browser has, address., (a) address bar, (b) security lock icon, (c) history tab, (d) bookmarks, icon when an, 186. A browser shows, encrypted connection is present., (a) address bar, (b) security lock icon, (c) history tab, (d) bookmarks, 187. A browser shows the list of web pages, ., visited in the recent past at, (a) address bar, (b) security lock icon, (c) history tab, (d) bookmarks, for storing im188. A browser has, portant pages likely to be revisited in the, future., (a) address bar, (b) security lock icon, (c) history tab, (d) bookmarks, for monitoring, 189. A browser has, downloads., (a) address bar, (b) downloads tab, (c) history tab, (d) bookmarks, 190. When visiting unprotected websites, the, lock icon is shown with, .
Page 103 :
Q. Bank [COPA Semester - 1], (a), (b), (c), (d), , red X to denote unsafe connection, Green tick to denote safe connection, both a and b, none of them, , 1.9.19, , Internet servers, , 191. The computers which run software packages for web pages (HTTP), email, (SMTP), file transfer (FTP), network, time protocol (NTP), etc are called, ., (a) Internet servers, (b) clients, (c) browsers, (d) media players, 192. Apache web server & Internet Information Server are examples of, servers., (a) web, (b) email, (c) file transfer, (d) none of them, , 1.9.20, , Search engines, , 193. An Internet service which helps online searching of information is called, ., (a) steam engine, (b) search engine, (c) email server, (d) video stream, 194. Google, Bing, Yahoo, Rediff, Ask, AOL, etc., are some of the well known, ., (a) spread sheet programs, (b) search engines, (c) image editors, (d) video players, 195. To get a particular type of files in the result list, one should use, option at the end of the search string., (a) mailto, (b) address, (c) filetype, (d) option, 196. To get only PDF files in the result list,, may be used., (a) filetype:pdf, (b) filetype:mp3, (c) filetype:3gp, (d) filetype:docx, , Prepared by: Dr.V.Nagaradjane, , 97, 197. Before clicking the link provided in the, result list of search engines, one should, ., (a) believe that the URL is correct, (b) naively click all links, (c) ensure that the URL is authentic, (d) click the links without consideration and pay, the sums demanded therein, 198. If the user wants a complete phrase to be, included in verbatim search, the phrase, ., should be, (a) deleted, (b) enclosed in double quotes, (c) enclosed in brackets, (d) enclosed in curly braces, 199. Clicking on links from untrusted search, engines might take an innocent user to, ., (a) video sharing websites, (b) audio streaming web sites, (c) social media websites, (d) hackers web site which extracts login ID and, password, 200. Search terms entered in a search engine, ., (a) can be traced back to the original source, (b) cannot be traced back to the source, (c) can never be traced back to the source, (d) may not be traced to the source, , 1.9.21, , Domain naming Systems, , 201. All computers on a network are uniquely, ., identified by, (a) IP address, (b) mobile number, (c) landline number, (d) none of them, 202. Since IP address is difficult to remember, easy to remember names are assigned to, ., (a) server hosts, (b) clients, (c) mobile phones, (d) none of them, server offers name for given IP, 203., address or IP address for given server, name., (a) Domain Name Service (DNS) server, (b) web server, (c) email server, (d) FTP server
Page 104 :
98, , 1.9.22, , Prepared by: Dr.V.Nagaradjane, , E-mail, , 204. Transmission and delivery of information containing text, image, video, documents etc. to targeted recepient(s) over, ., the Internet is called, (a) email, (b) world wide web, (c) e-commerce, (d) social media, 205. An email address contains, parts separated by a @ symbol., (a) 5, (b) 4, (c) 3, (d) 2, 206. The first part of email address identifies, ., (a) name of individual user, (b) name of the email server, (c) name of the mobile phone operator, (d) name of bank, 207. The second part of email address iden., tifies, (a) name of individual user, (b) name of the email server, (c) name of the mobile phone operator, (d) name of bank, 208. The user name and email server parts, of an email address are separated by, symbol., (a) @, (b) #, (c) $, (d) &, 209. Gmail.com, yahoo.com, yahoo.co.in,, ymail.com, rediff.com, rediffmail.com,, ., fastmail.fm, etc. are popular, (a) FTP servers, (b) social media sites, (c) email servers, (d) none of them, 210. Content found in the web can be, to the local computer/ device, for reading at leisure., (a) uploaded, (b) downloaded, (c) transmitted, (d) erased, 211. An email may contain non-text information which may be, ., (a) uploaded, (b) downloaded, (c) transmitted, (d) erased, 212. To download an email attachment, the, user, the attachment., (a) clicks, (b) right clicks and chooses save, (c) both a & b, (d) neither a nor b, 213. An image displayed on web page can be, to download the file., , (a), (b), (c), (d), , right click and choose save image as, left click, double click, press delete button, 214. Electronic communication between, 2 persons having unique identifiers over the Internet is called, ., (a) India post, (b) Speed post, (c) Registered post, (d) email, is a technology that allows, 215., you to send and receive messages over, the Internet without the delay of traditional postal services., (a) India post, (b) Speed post, (c) Registered post, (d) email, 216. Each user of a email communication, ., should possess, (a) a unique identifier, called email ID, (b) pen drive, (c) external hard disk, (d) DVD writer, 217. The email ID of a person contains, parts., (a) 2, (b) 3, (c) 4, (d) 5, 218. The first part of an email ID contains, ., (a) name of the city, (b) name of the owner of the email service provider, (c) name/identifier of the email user, (d) name of the email server, 219. The second part of an email ID contains, ., (a) name of the city, (b) name of the owner of the email service provider, (c) name/identifier of the email user, (d) name of the email server, 220. In email communication, CC stands for, ., (a) carbon copy, (b) cold coffee, (c) blind carbon copy, (d) casual copy, 221. In email communication, BCC stands for, ., (a) carbon copy, (b) cold coffee
Page 105 :
Q. Bank [COPA Semester - 1], (c) blind carbon copy, (d) casual copy, 222. The email ID of the primary recipient of, field., email is entered in, (a) To, (b) CC, (c) BCC, (d) Subject, 223. The email ID of the secondary recipient of email is entered in, field., (a) To, (b) CC, (c) BCC, (d) Subject, 224. The email ID of the anonymous recipient of email is entered in, field., (a) To, (b) CC, (c) BCC, (d) Subject, 225. The crisp essence of email message is, entered in, field., (a) To, (b) CC, (c) BCC, (d) Subject, 226. The actual message of an email is called, ., the, (a) content, (b) attachment, (c) subject, (d) BCC, 227. The file attached to an email is called, ., the, (a) content, (b) attachment, (c) subject, (d) BCC, 228. An email sent from unknown persons, for improving the sale, image, appeal, or other characteristics of a product is, ., called, (a) Junk, (b) Important, (c) Virus, (d) Trojan, mail refers to e-mail messages, 229., sent by an unknown sender, usually for, commercial purposes., (a) Junk, (b) Important, (c) Virus, (d) Trojan, 230. Unsolicited emails may be filtered and, separated into, ., (a) spam bin, (b) inbox, (c) sent mails, (d) draft, 231. The primary place for receiving an email, is, ., (a) spam bin, (b) inbox, (c) sent mails, (d) draft, 232. All emails sent by the user may be saved, in, ., (a) spam bin, (b) inbox, (c) sent mails, (d) draft, 233. A half completed email may be saved, for later editing and transmission to the, receiver in, folder., Prepared by: Dr.V.Nagaradjane, , 99, (a) spam bin, (b) inbox, (c) sent mails, (d) draft, 234. Before entering user ID and password,, one should ensure that the browser displays, icon for safe communication with the server., (a) print, (b) lock, (c) clock, (d) lens, 235. Logging into an email server from a dedicated application (APP) installed on a, smartphone helps to, email messages., (a) auto delete, (b) hide, (c) periodically check, retrieve and notify, (d) purge, 236. It is a good practice to, email messages from unknown senders, to avoid virus infection of computer., (a) avoid opening attachments in, (b) open message and all attachments of, (c) sit looking for, (d) invite more spammers to send, 237. Images and videos attached to a junk, ., email may, (a) contain anti-virus, (b) repair troubles in the operating system, (c) help fast working of computers, (d) contain trojens and virusses to attack a computer, 238. Opening a new email ID requires entry of, in the email opening, form., (a) name and address, (b) date of birth and father name, (c) alternate email ID if necessary, (d) all of them, , 1.9.23, , Video chatting tools, , 239. The exchange of audio, video and text, ., over the Internet is called, (a) video chat, (b) audio chat, (c) text chat, (d) SMS, are some of the video chat, 240., applications., (a) Google video chat, (b) Skype/ Viber, (c) iChat/VSee, (d) all of them
Page 106 :
100, , 1.9.24, , Prepared by: Dr.V.Nagaradjane, , VOIP, , ., 241. VOIP stands for, (a) Voice Over Internet Procedure, (b) Voice Over Internet Protocol, (c) Voice Over Instant Protocol, (d) Virtue Over Internet Protocol, ., 242. VOIP permits, (a) calling of mobile and telephone numbers, through Internet, (b) browsing web, (c) exchanging email, (d) text chat, 243. VOIP can reduce the cost of long dis., tance International calls when, (a) call charges are zero, (b) data charges are very high, (c) calls charges are cheaper than data charges, (d) data is cheaper than call charges, , 1.9.25, , Social Media, , 244. The Internet repository for sharing casual information (text, documents, audio, images, videos, etc.) is called, ., (a) multi-media, (b) social media, (c) storage media, (d) email, 245. Information stored in social media, ., (a) is highly secure, (b) encrypted and secured with password, (c) strongly secured, (d) not secure, 246. The services like Facebook, Twitter, Linked-In are categorized under, ., (a) social media, (b) MS Officer, (c) PDF reader, (d) video player, 247. Most of the social media websites require, as user ID., (a) Postal code, (b) PAN number, (c) email address, (d) Adhar ID number, 248. Sharing personal information on social, media is, ., (a) right, (b) unsafe, (c) appreciable, (d) commendable, 249. Interacting with strangers on social media might, ., (a) result in great future, , (b) might fetch good employment, (c) might result in unknown dangers to innocent, users, (d) all of them, 250. During natural calamities like earthquake,, floods,, Tsunami,, etc.,, plays a vital role in, damage assessment and rescue efforts., (a) multi-media, (b) email, (c) social media, (d) SMS, 251. Professional sites like Linked-In offer, to its users., (a) no benefits, (b) respectable job opportunities, (c) no profiles, (d) no professional contacts, 252. A professional should, the time allotted for social media, lest, she/he begins to waste productive working hours in the social media., (a) restrict, (b) increase, (c) not worry about, (d) be liberal about, 253. Noways, it is possible to carry out little, on social media sites, like Facebook., (a) exchange of legal papers, (b) financial transactions with the support of bank, (c) legal arguments, (d) trading of goods, 254. An innocent user interacting with, strangers in social media may be, to share forbidden content with those stranger., (a) commanded, (b) coerced, (c) threatened, (d) persuaded, 255. Interaction with strangers on social media is as, as it is exciting., (a) appreciable, (b) happy, (c) dangerous, (d) laudable, , 1.9.26, , Cloud storage, , 256. Permitting storage of files on a web, based server is called, ., (a) cloud storage, (b) local storage, (c) email storage, (d) had disk storage, 257. Cloud storage can be accessed from any, host having a, ., (a) RS232 port
Page 107 :
Q. Bank [COPA Semester - 1], (b) Internet connection, (c) USB port, (d) VGA port, ., 258. Popular cloud storages are, (a) Microsoft One Drive, (b) Google Drive, (c) Dropbox/ Apple iCloud, (d) all of them, 259. Documents in Microsoft One Drive can, be edited using, ., (a) online version of Microsoft office tools using, browser, (b) installed version of Microsoft office tools, (c) both a & b, (d) none of them, 260. Cloud storage can be accessed from, ., (a) computers, (b) mobile devices, (c) both a & b, (d) none of them, , 1.9.27, , Internet Security, , Threats, attacks & Malicious Software, 261. A malicious server posing as an authentic server is called, ., (a) spoofing, (b) phishing, (c) botnet, (d) Distributed Denial of Service, 262. A malicious email or SMS communication inviting the user to click a link and, taking the user to a malicious web site, ., is, (a) spoofing, (b) phishing, (c) botnet, (d) Distributed Denial of Service, 263. A malicious email or SMS communication inviting the user to click a link and, taking the user to a malicious web site, is, ., (a) spoofing, (b) phishing, (c) botnet, (d) Distributed Denial of Service, 264. A group of malware infected computers, controlled by a remote system to carry, out malicious tasks is called, ., (a) spoofing, (b) phishing, (c) botnet, Prepared by: Dr.V.Nagaradjane, , 101, (d) Distributed Denial of Service, 265. A group of sending fake service requests to a server to such an extent that, the server buckles due to overloading is, called, ., (a) spoofing, (b) phishing, (c) botnet, (d) Distributed Denial of Service, 266. An intrusive login to a protected system, from a remote system to carry out malicious acts is called, ., (a) hacking, (b) malware, (c) pharming, (d) ransomeware, 267. A piece of software designed for ill intentions (virus), to steal user id/ password, (trojen), erase data on computer (virus),, etc. is called, ., (a) hacking, (b) malware, (c) pharming, (d) ransomeware, 268. Redirecting a legitimate web address to, ., a malicious host is called, (a) hacking, (b) malware, (c) pharming, (d) ransomeware, 269. The malicious software which enters a, computer, locks files and threatens to, destroy files unless payment is made to, ., a partcular account is called, (a) hacking, (b) malware, (c) pharming, (d) ransomeware, 270. The piece of malware which spreads, through attachments to emails is called, ., (a) worm, (b) spam, (c) spyware, (d) trojen, 271. The piece of malware which keeps sending junk message advertising certain, ., products is called, (a) worm, (b) spam, (c) spyware, (d) trojen, 272. The simply records computer activities, and transmits them to a malicious site, is called, ., (a) worm, (b) spam, (c) spyware, (d) trojen, 273. The poses as an authenticator but steals, login data is called, ., (a) worm, (b) spam, (c) spyware, (d) trojen, 274. The method of stealing user information, by allowing the user to connect to a free, WiFi network (as in a Coffee shop, Ho., tel, etc.) is called
Page 108 :
102, (a), (b), (c), (d), , Prepared by: Dr.V.Nagaradjane, WiFi evesdropping, spam, spyware, trojen, , Internet security products, 275. Anti-virus software packages help to, ., (a) protect files, (b) protect login data, (c) protect against online phishing, spoofing,, pharming, etc., (d) all of them, 276. Internet security products mainly concentrate on, ., (a) firewall, (b) anti-spam, (c) parental control, (d) all of them, 277. Popular internet security products are, ., (a) McAffee livescan/ Internet security, (b) Kaspersky Internet Security, (c) Trend Micro Internet security/ Bit defender Internet security, (d) all of them, 278. A total security software protects a comattacks., puter against, (a) offline attacks, (b) online attacks, (c) both a & b, (d) neither a nor b, 279. Examples of total security software, ., packages are, (a) Norton total security, (b) Kaspersky Total Security, (c) both a & b, (d) none of them, 280. In addition to offering firewall, antispam control and parental control, total, security software offers, ., (a) backup and restoration options for data, (b) tuning up the computer for better performance, (c) both a & b, (d) none of them, , Answers (1402 - 1681), 1. (d), 5. (b), 9. (c), 13. (c), , 2. (a), 6. (c), 10. (c), 14. (c), , 3. (c), 7. (d), 11. (d), 15. (a), , 4. (a), 8. (a), 12. (b), 16. (c), , 17. (a), 21. (b), 25. (c), 29. (a), 33. (a), 37. (c), 41. (d), 45. (a), 49. (b), 53. (b), 57. (a), 61. (b), 65. (a), 69. (a), 73. (c), 77. (c), 81. (b), 85. (b), 89. (d), 93. (c), 97. (c), 101. (b), 105. (c), 109. (a), 113. (a), 117. (c), 121. (d), 125. (a), 129. (a), 133. (c), 137. (b), 141. (b), 145. (c), 149. (c), 153. (d), 157. (b), 161. (c), 165. (a), 169. (d), 173. (a), 177. (a), 181. (b), 185. (a), 189. (b), 193. (b), 197. (c), 201. (a), 205. (d), 209. (c), 213. (a), 217. (a), 221. (c), 225. (d), , 18. (b), 22. (c), 26. (c), 30. (b), 34. (c), 38. (d), 42. (a), 46. (d), 50. (a), 54. (d), 58. (b), 62. (a), 66. (b), 70. (b), 74. (d), 78. (d), 82. (c), 86. (c), 90. (c), 94. (d), 98. (a), 102. (a), 106. (a), 110. (b), 114. (b), 118. (a), 122. (a), 126. (b), 130. (a), 134. (d), 138. (d), 142. (c), 146. (a), 150. (a), 154. (b), 158. (d), 162. (d), 166. (b), 170. (d), 174. (b), 178. (b), 182. (c), 186. (b), 190. (a), 194. (b), 198. (b), 202. (a), 206. (a), 210. (b), 214. (d), 218. (c), 222. (a), 226. (a), , 19. (b), 23. (a), 27. (c), 31. (c), 35. (a), 39. (b), 43. (c), 47. (c), 51. (a), 55. (d), 59. (c), 63. (d), 67. (c), 71. (a), 75. (a), 79. (a), 83. (d), 87. (a), 91. (a), 95. (a), 99. (b), 103. (c), 107. (b), 111. (c), 115. (c), 119. (b), 123. (c), 127. (c), 131. (b), 135. (b), 139. (d), 143. (a), 147. (b), 151. (c), 155. (c), 159. (a), 163. (a), 167. (c), 171. (d), 175. (c), 179. (c), 183. (a), 187. (c), 191. (a), 195. (c), 199. (d), 203. (a), 207. (b), 211. (b), 215. (d), 219. (d), 223. (b), 227. (b), , 20. (a), 24. (b), 28. (d), 32. (d), 36. (b), 40. (c), 44. (b), 48. (a), 52. (b), 56. (c), 60. (d), 64. (a), 68. (d), 72. (c), 76. (d), 80. (a), 84. (a), 88. (b), 92. (b), 96. (d), 100. (d), 104. (d), 108. (d), 112. (d), 116. (c), 120. (c), 124. (d), 128. (d), 132. (d), 136. (c), 140. (a), 144. (b), 148. (c), 152. (a), 156. (a), 160. (b), 164. (a), 168. (d), 172. (d), 176. (d), 180. (d), 184. (a), 188. (d), 192. (a), 196. (a), 200. (a), 204. (a), 208. (a), 212. (c), 216. (a), 220. (a), 224. (c), 228. (a)
Page 109 :
Q. Bank [COPA Semester - 1], 229., 233., 237., 241., 245., 249., 253., , (a), (d), (d), (b), (d), (d), (b), , 230., 234., 238., 242., 246., 250., 254., , (a), (b), (d), (a), (a), (c), (d), , 231., 235., 239., 243., 247., 251., 255., , Prepared by: Dr.V.Nagaradjane, , 103, (b), (c), (a), (d), (c), (b), (c), , 232., 236., 240., 244., 248., 252., 256., , (c), (a), (d), (b), (b), (a), (a), , 257., 261., 265., 269., 273., 277., , (b), (a), (d), (d), (d), (d), , 258., 262., 266., 270., 274., 278., , (d), (b), (a), (a), (a), (c), , 259., 263., 267., 271., 275., 279., , (c), (b), (b), (b), (d), (c), , 260., 264., 268., 272., 276., 280., , (c), (c), (c), (c), (d), (c)
Page 110 :
104, , Prepared by: Dr.V.Nagaradjane, , 1.10, , Web Design, , 1.10.1, , Web server, , 1., (a), (c), 2., (a), (b), (c), (d), 3., (a), (b), (c), (d), 4., (a), (b), (c), (d), 5., , (a), (b), (c), (d), 6., (a), (b), (c), (d), 7., (a), (b), (c), (d), 8., , (a), , Web pages are designed primarily in, ., HTML, (b) C++, Basic, (d) Fortran, Web pages are stored in a remote host, called the, ., client, email server, database server, web server, The client of a web server uses, for display of the page., word processor, spreadsheet, web browser, power point, is the name of the software, which fulfills the request of a browser, based client., email server, web server, database server, FTP server, Apache HTTP, Microsoft Internet Information Sever (IIS), IBM Websphere,, etc., are some of the popular, ., email servers, web servers, database servers, FTP servers, is the consortium responsible, for maintaining the web standards., World Wide Web Consortium, World Wide Water Consortium, Write Wide Web Consortium, World Wide Web Condition, W3C (the International body for web, standards) stands for, ., World Wide Web Consortium, World Wide Water Consortium, Write Wide Web Consortium, World Wide Web Condition, Web pages containing script to be processed by the web server (in languages, like PHP, Perl, Python, ASP.NET, etc.), are said to contain, side, script., client, (b) server, , (c) machine, (d) binary, Web pages containing script to be pro9., cessed by the browser (in languages like, Javascript, VisualBasic.NET, etc.) are, side script., said to contain, (a) client, (b) server, (c) machine, (d) binary, , 1.10.2, 10., (a), (b), (c), (d), 11., (a), (c), 12., (a), (c), 13., (a), (c), 14., , (a), (c), 15., (a), (b), (c), (d), 16., (a), (b), (c), (d), 17., (a), (b), (c), , Static and Dynamic Web, pages, , HTML stands for, ., Hyper Text Machine Language, Higher Text Markup Language, Hyper Text Markup Language, Hyper Tension Markup Language, Web pages which do not change to interact with user are called, HTML pages., intrinsic, (b) righteous, dynamic, (d) static, Web pages which interact with user are, called, HTML pages., intrinsic, (b) extrinsic, dynamic, (d) static, Dynamic HTML pages can be coded using, ., Adobe Flash, (b) Javascript, VBScript, (d) all of them, The portion of script code (written in, Javascript/ VBScript) executed inside a, side scriptbrowser is called, ing., client, (b) server, right, (d) left, Most of the dynamic pages deploy, to create dynamic interaction., server side script, client side script, shell script, SQL script, DHTML stands for, ., Dynamic Hyper Text Machine Language, Drastic Hyper Text Markup Language, Dynamic Hyper Text Markup Language, Dynamic Higher Text Markup Language, CSS in web scripting stands for, ., Cascading System Sheet, Crisp Style Sheet, Cascading Style Set
Page 111 :
Q. Bank [COPA Semester - 1], (d) Cascading Style Sheet, ., 18. CSS helps to, (a) alter the colour of the document, (b) alter the font size of the document, (c) alter the default font faces of the document, (d) all of them, ., 19. DOM stands for for, (a) Document Object Model, (b) Different Object Model, (c) Dynamic Object Model, (d) Document Offset Model, 20. The method of treating document elements (like input, button, etc.) as pro., gram elements is called, (a) Different Object Model, (b) Dynamic Ooutput Model, (c) Document Object Model, (d) Desktop Object Model, side scripting system, 21. Ajax is a, for creating user interaction., (a) client, (b) server, (c) right, (d) left, 22. Dynamic web pages provide interaction, ., through, (a) input response, (b) keyboard response, (c) mouse response, (d) all of them, , 1.10.3, , Introduction to HTML, , 23. Default extension for a HTML docu., ment is, (a) .htm, (b) .html, (c) both a & b, (d) none of them, sym24. HTML tag begins with, bol., (a) <, (b) >, (c) <! − −, (d) −− >, sym25. HTML tag ends with, bol., (a) <, (b) >, (c) <! − −, (d) −− >, comment, begins, with, 26. HTML, symbol., (a) <, (b) >, (c) <! − −, (d) −− >, 27. HTML comment ends with, symbol., (a) <, (b) >, (c) <! − −, (d) −− >, ., 28. HTML was created by, Prepared by: Dr.V.Nagaradjane, , 105, (a), (b), (c), (d), 29., (a), (b), (c), (d), 30., (a), (b), (c), (d), 31., (a), (b), (c), (d), 32., (a), (c), 33., , (a), (c), , Brian Kernighan, Tim Berners-Lee, Dennis Ritchie, James Gosling, SGML stands for, ., Standard Grand Markup Language, Synchronized Generalized Markup Language, Standard Generalized Markup Language, Simple Generalized Markup Language, DTD stands in markup language for, ., Document Type Definition, Data Type Definition, Digital Type Definition, Design Type Definition, ., DDL stands for, Data Description Libray, Data Description Language, Data Description Liberty, Data Description License, Most of the HTML tags have a corresponding closing tag, which begins with, symbol., <! − −, (b) < /, <., (d) < , If a HTML tag does not have explicit, closing tag, the tag may be closed with, symbol instead of a simple >, symbol., (b) . >, >, />, (d) @ >, , 1.10.4, , Various tags in HTML, , 34. HTML document is contained inside a, set of, tags., (a) < HT M L > ... < /HT M L >, (b) < HEAD > ... < /HEAD >, (c) < T IT LE > ... < /T IT LE >, (d) < BODY > ... < /BODY >, 35. The top portion of a HTML document, containing many meta items and script, functions is called, ., (a) < HT M L > ... < /HT M L >, (b) < HEAD > ... < /HEAD >, (c) < T IT LE > ... < /T IT LE >, (d) < BODY > ... < /BODY >, 36. The title to be displayed at the top of, the browser window or browser tab is, enclosed in, ., (a) < HT M L > ... < /HT M L >, (b) < HEAD > ... < /HEAD >
Page 112 :
106, (c) < T IT LE > ... < /T IT LE >, (d) < BODY > ... < /BODY >, 37. The main portion of a HTML document, tags., is contained between, (a) < HT M L > ... < /HT M L >, (b) < HEAD > ... < /HEAD >, (c) < T IT LE > ... < /T IT LE >, (d) < BODY > ... < /BODY >, 38. Paragraph is contained inside, HTML tags., (a) < p > ... < /p >, (b) < center > ... < /center > or < div align =, “center” > ... < /div >, (c) < div align = “lef t” > ... < /div >, (d) < div align = “right” > ... < /div >, 39. Elements to be centre aligned in browser, display are enclosed inside, HTML tags., (a) < p > ... < /p >, (b) < center > ... < /center > or < div align =, “center” > ... < /div >, (c) < div align = “lef t” > ... < /div >, (d) < div align = “right” > ... < /div >, 40. Elements to be left aligned in browser, display are enclosed inside, HTML tags., (a) < div align = “justif ied” > ... < /div >, (b) < center > ... < /center > or < div align =, “center” > ... < /div >, (c) < div align = “lef t” > ... < /div >, (d) < div align = “right” > ... < /div >, 41. Elements to be right aligned in browser, display are enclosed inside, HTML tags., (a) < div align = “justif ied” > ... < /div >, (b) < center > ... < /center > or < div align =, “center” > ... < /div >, (c) < div align = “lef t” > ... < /div >, (d) < div align = “right” > ... < /div >, 42. Elements to be justified (aligned flush, with left and right edges) in browser display are enclosed inside, tags in, HTML., (a) < div align = “justif ied” > ... < /div >, (b) < center > ... < /center > or < div align =, “center” > ... < /div >, (c) < div align = “lef t” > ... < /div >, (d) < div align = “right” > ... < /div >, HTML tag displays an, 43., image in HTML page., (a) < img src = “f ile.jpg” >, (b) < tableborder = 1 > ... < /table >, (c) < tableborder = 0 > ... < /table >, , Prepared by: Dr.V.Nagaradjane, (d) < ahref = “target.htm” > ... < /a >, HTML tag displays a ta44., ble without border., (a) < img src = “f ile.jpg” >, (b) < tableborder = 1 > ... < /table >, (c) < tableborder = 0 > ... < /table >, (d) < ahref = “target.htm” > ... < /a >, HTML tag creates a, 45., click-able hyper link for navigation inside the same page or between different, pages., (a) < img src = “f ile.jpg” >, (b) < tableborder = 1 > ... < /table >, (c) < tableborder = 0 > ... < /table >, (d) < ahref = “target.htm” > ... < /a >, HTML tag displays a ta46., ble with border thickness of 1 pixel., (a) < img src = “f ile.jpg” >, (b) < table border = 1 > ... < /table >, (c) < table border = 0 > ... < /table >, (d) < a href = “target.htm” > ... < /a >, HTML tag can control font, 47., face, size and colour., (a) < f ont f ace = “Arial” size = “ +, 1” color = “red” > ... < /f ont >, (b) < H1 > ... < /H1 >, (c) < H2 > ... < /H2 >, (d) < H3 > ... < /H3 >, HTML tag displays headings, 48., of the largest size., (a) < f ont f ace = “Arial” size = “+1”color =, “red” > ... < /f ont >, (b) < H1 > ... < /H1 >, (c) < H2 > ... < /H2 >, (d) < H3 > ... < /H3 >, HTML tag displays headings, 49., of the second largest size., (a) < H4 > ... < /H4 >, (b) < H1 > ... < /H1 >, (c) < H2 > ... < /H2 >, (d) < H3 > ... < /H3 >, HTML tag displays headings, 50., of the third largest size., (a) < H4 > ... < /H4 >, (b) < H1 > ... < /H1 >, (c) < H2 > ... < /H2 >, (d) < H3 > ... < /H3 >, HTML tag displays headings, 51., of the smallest size., (a) < H4 > ... < /H4 >, (b) < H1 > ... < /H1 >, (c) < H2 > ... < /H2 >, (d) < H3 > ... < /H3 >
Page 113 :
Q. Bank [COPA Semester - 1], , 107, , (d) < span style = “f ont − weight : 900” >, represents, 52. In HTML, text size, ... < /span >, the normal size of text., (a) -4, (b) 0, among the given HTML5, 59., (c) +4, (d) +8, tags sets font weight to normal., 53. In HTML5, font tag has been, (a) < span style = “f ont − weight : bold” >, ., ... < /span >, (a) appreciated, (b) reinstated, (b) < span style = “f ont−weight : normal” >, (c) deprecated, (d) beautified, ... < /span >, (c) < span style = “f ont − weight : 1200” >, 54. In HTML5, font name can be controlled, using, tag sets., ... < /span >, (a) < span style = “f ont − weight : bold” > (d) < span style = “f ont − weight : 900” >, ... < /span >, ... < /span >, (b) < span style = “f ont − size : 16px” > ... <, /span >, Colour coding in HTML, (c) < span style = “color : red” > ... <, /span >, 60. Colour can be specified using colour, (d) < span style = “f ont − f amily :, name (like red, gray, blue, cyan, maverdhana” > ... < /span >, genta, etc.) or numeric value in, 55. In HTML5, font colour can be controlled, colour order., (a) Red-Green-Blue, tag sets., using, (a) < span style = “f ont − weight : bold” > (b) Blue-Green-Red, ... < /span >, (c) Green-Red-Blue, (b) < span style = “f ont − size : 16px” > ... < (d) Blue-Green-Blue, /span >, 61. Colour code of #FF0000 stands for, (c) < span style = “color : red” > ... <, colour., /span >, (a) blue, (b) green, (d) < span style = “f ont − f amily : (c) red, (d) black, verdhana” > ... < /span >, 62. Colour code of #00FF00 stands for, 56. In HTML5, font size can be controlled, colour., tag sets., using, (a) blue, (b) green, (a) < span style = “f ont − weight : bold” > (c) red, (d) black, ... < /span >, (b) < span style = “f ont − size : 16px” > ... < 63. Colour code of #0000FF stands for, colour., /span >, (a) blue, (b) green, (c) < span style = “color : red” > ... <, (c) red, (d) black, /span >, (d) < span style = “f ont − f amily : 64. Colour code of #000000 stands for, colour., verdhana” > ... < /span >, (a) blue, (b) green, among the given HTML5, 57., (c) red, (d) black, tags sets font size to 16px., (a) < span style = “f ont − weight : bold” > 65. Colour code of #FFFFFF stands for, colour., ... < /span >, (a) white, (b) green, (b) < span style = “f ont − size : 16px” > ... <, (c) red, (d) black, /span >, (c) < span style = “color : red” > ... < 66. In HTML, the two digit color code value, ranges from 00 to, in hexadec/span >, imal., (d) < span style = “f ont − f amily :, (a) AA, (b) 11, verdhana” > ... < /span >, (c), FF, (d), CC, among the given HTML5, 58., tag is used to display different, 67., tags sets font weight to bold., (a) < span style = “f ont − weight : bold” >, HTML pages in a single window (not, ... < /span >, recommended for mobile viewing)., (b) < span style = “f ont−weight : normal” > (a) font, (b) frameset, ... < /span >, (c) table, (d) img, (c) < span style = “f ont − weight : 1200” >, ... < /span >, Prepared by: Dr.V.Nagaradjane
Page 114 :
108, , Prepared by: Dr.V.Nagaradjane, , (a) < marquee direction = “lef t” > ..., 68. Width of elements like image, table,, etc. can be controlled using, at/marquee >, (b) < marquee direction = “right” > ..., tribute., (a) width, (b) height, /marquee >, (c) length, (d) breadth, (c) < marquee direction = “up” > ..., /marquee >, 69. Height of elements like image, table,, (d) < marquee direction = “down” > ..., etc. can be controlled using, at/marquee >, tribute., (a) width, (b) height, 77. Text scrolling downwards may be cre(c) length, (d) breadth, tag in HTML., ated using, (a) < marquee direction = “lef t” > ..., 70. Width and height value can be specified, /marquee >, in, or in pixels., (b) < marquee direction = “right” > ..., (a) metre, (b) kilometre, /marquee >, (c) percentage, (d) inches, (c), < marquee direction = “up” > ..., HTML tag creates a break., 71., /marquee >, (a) < center > ... < /center >, (d), < marquee direction = “down” > ..., (b) < table > ... < /table >, /marquee >, (c) < img width = “80%” src = “globe.jpg” >, (d) < br/ >, Hyperlink in HTML, HTML tag displays an image, 72., named globle.jpg at 80% of the total, tag in HTML creates a click78., width available in the browser., able, hyperlink., (a) < center > ... < /center >, (a) < p > ... < /p >, (b) < table > ... < /table >, (b) < img src = “globe.png” >, (c) < img width = “80%” src = “globe.jpg” >, (c) < table border = 1 > ... < /table >, (d) < br/ >, (d) < a href = “page.html” > ... < /a >, 73. Scrolling text may be created using, tag in HTML., Table in HTML, (a) < marquee > ... < /marquee >, (b) < span > ... < /span >, HTML tag displays a table, 79., (c) < p > ... < /p >, without border., (d) < f ont > ... < /f ont >, (a) < tr > ... < /tr >, (b) < th > ... < /th >, 74. Text scrolling to left may be created us(c) < table border = 1 > ... < /table >, tag in HTML., ing, (a) < marquee direction = “lef t” > ... < (d) < table border = 0 > ... < /table >, /marquee >, HTML tag displays a table, 80., (b) < marquee direction = “right” > ... <, with border thickness of 1 pixel., /marquee >, (a) < tr > ... < /tr >, (c) < marquee direction = “up” > ... < (b) < th > ... < /th >, /marquee >, (c) < table border = 1 > ... < /table >, (d) < marquee direction = “down” > ... <, (d) < table border = 0 > ... < /table >, /marquee >, HTML tag is used to mark, 81., 75. Text scrolling to right may be created, header, column, for a table., tag in HTML., using, (a) < tr > ... < /tr >, (a) < marquee direction = “lef t” > ... <, (b) < th > ... < /th >, /marquee >, (b) < marquee direction = “right” > ... < (c) < table border = 1 > ... < /table >, (d) < table border = 0 > ... < /table >, /marquee >, HTML tag is used to mark a, (c) < marquee direction = “up” > ... < 82., row for a table., /marquee >, (d) < marquee direction = “down” > ... < (a) < tr > ... < /tr >, (b) < th > ... < /th >, /marquee >, (c) < table border = 1 > ... < /table >, 76. Text scrolling upwards may be created, (d) < table border = 0 > ... < /table >, using, tag in HTML., , <, <, <, <, , <, <, <, <
Page 115 :
Q. Bank [COPA Semester - 1], 83., (a), (b), (c), (d), 84., (a), (b), (c), (d), 85., (a), (b), (c), (d), 86., (a), (b), (c), (d), 87., (a), (b), (c), (d), 88., (a), (b), (c), (d), , HTML tag is used to mark a, column inside a row., < td > ... < /td >, < th > ... < /th >, < table border = 1 > ... < /table >, < table border = 0 > ... < /table >, Among the following options,, HTML tag merges 3 columns to create, a large column., < tr > ... < /tr >, < td > ... < /td >, < td colspan = 3 > ... < /td >, < td rowspan = 4 > ... < /td >, Among the following options,, HTML tag merges 4 rows to create a, large row., < tr > ... < /tr >, < td > ... < /td >, < td colspan = 3 > ... < /td >, < td rowspan = 4 > ... < /td >, creates an ordered list., < ul > ... < /ul >, < ol > ... < /ol >, < li > ... < /li >, none of them, creates an unordered list., < ul > ... < /ul >, < ol > ... < /ol >, < li > ... < /li >, none of them, declares a list item which, may be part of ordered list or unordered, list., < ul > ... < /ul >, < ol > ... < /ol >, < li > ... < /li >, none of them, , 1.10.5, , Creating Forms with controls, using HTML, , 89. HTML form controls commonly use, tag for taking form input., (a) < input >, (b) < table > ... < /table >, (c) < img >, (d) < f orm > ... < /f orm >, 90. HTML form is contained insde, tag., (a) < input >, (b) < f orm > ... < /f orm >, (c) < img >, (d) < f orm > ... < /f orm >, Prepared by: Dr.V.Nagaradjane, , 109, 91. Input tag in HTML supports, attribute., (a) type, (b) value, (c) name/ID, (d) all of them, among the following tags dis92., plays a text field named address., (a) < input type = “text” name, “address” value = “” autocomplete, “on” >, (b) < input type = “number” name, “height” value = “”autocomplete, “on” >, (c) < input type = “email” name, “email” value = “” autocomplete, “on” >, (d) < input type = “tel” name, “phone” value = “” autocomplete, “on” >, among the following tags dis93., plays a text field named phone., (a) < input type = “text” name, “address” value = “” autocomplete, “on” >, (b) < input type = “number” name, “height” value = “”autocomplete, “on” >, (c) < input type = “email” name, “email” value = “” autocomplete, “on” >, (d) < input type = “tel” name, “phone” value = “” autocomplete, “on” >, among the following tags dis94., plays a text field named height., (a) < input type = “text” name, “address” value = “” autocomplete, “on” >, (b) < input type = “number” name, “height” value = “”autocomplete, “on” >, (c) < input type = “email” name, “email” value = “” autocomplete, “on” >, (d) < input type = “tel” name, “phone” value = “” autocomplete, “on” >, among the following tags dis95., plays a text field named email., (a) < input type = “text” name, “address” value = “” autocomplete, “on” >, (b) < input type = “number” name, “height” value = “”autocomplete, “on” >, (c) < input type = “email” name, “email” value = “” autocomplete, “on” >, , =, =, =, =, =, =, =, =, , =, =, =, =, =, =, =, =, , =, =, =, =, =, =, =, =, , =, =, =, =, =, =
Page 116 :
110, (d) < input type = “tel” name, “phone” value = “” autocomplete, “on” >, 96. To display a button in HTML form,, attribute is used in the input, tag., (a) button, (b) checkbox, (c) color, (d) date, 97. To display a checkbox in HTML form,, attribute is used in the input, tag., (a) button, (b) checkbox, (c) color, (d) date, 98. To display a colour selection input in, attribute is used, HTML form,, in the input tag., (a) button, (b) checkbox, (c) color, (d) date, 99. To display a date input in HTML form,, attribute is used in the input, tag., (a) button, (b) checkbox, (c) color, (d) date, 100. To display a date and time input in, attribute is used, HTML form,, in the input tag., (a) button, (b) checkbox, (c) color, (d) datetime, 101. To display a field for email input in, attribute is used, HTML form,, in the input tag., (a) email, (b) file, (c) hidden, (d) image, 102. To display a file input input dialog in, attribute is used, HTML form,, in the input tag., (a) email, (b) file, (c) hidden, (d) image, 103. To create a hidden field in HTML form,, attribute is used in the input, tag., (a) email, (b) file, (c) hidden, (d) image, 104. To create an image selection tool in, HTML form,, attribute is used, in the input tag., (a) email, (b) file, (c) hidden, (d) image, 105. To create month selection field in HTML, form,, attribute is used in the, input tag., (a) month, (b) number, (c) password, (d) radio, , Prepared by: Dr.V.Nagaradjane, =, =, , 106. To create number input field in HTML, attribute is used in the, form,, input tag., (a) month, (b) number, (c) password, (d) radio, 107. To create password input field in HTML, form,, attribute is used in the, input tag., (a) month, (b) number, (c) password, (d) radio, 108. To create radio button input field in, attribute is used, HTML form,, in the input tag., (a) month, (b) number, (c) password, (d) radio, 109. To create an input field to display numbers with specific start, end and step valattribute, ues in HTML form,, is used in the input tag., (a) range, (b) reset, (c) search, (d) tel, 110. To create an input field to reset all input elements of a form in HTML form,, attribute is used in the input, tag., (a) range, (b) reset, (c) search, (d) tel, 111. To create search field (behviour depends, upon server implementation) in HTML, attribute is used in the, form,, input tag., (a) range, (b) reset, (c) search, (d) tel, 112. To create field for telephone number input in HTML form,, attribute, is used in the input tag., (a) range, (b) reset, (c) search, (d) tel, 113. To create a field for submitting the, contents of HTML form to the server,, attribute is used in the input, tag., (a) submit, (b) text, (c) time, (d) url, 114. To create a text input field in HTML,, attribute is used in the input, tag., (a) submit, (b) text, (c) time, (d) url, 115. To create a time input in HTML,, attribute is used in the input, tag.
Page 117 :
Q. Bank [COPA Semester - 1], (a) submit, (b) text, (c) time, (d) url, 116. To create a field for taking a web address, in HTML,, attribute is used in, the input tag., (a) submit, (b) text, (c) time, (d) url, 117. To create a field for taking a web address, attribute is used in, in HTML,, the input tag., (a) week, (b) text, (c) time, (d) url, , 1.10.6, , Concepts of CSS, , ., 118. CSS stands for, (a) Cascading System Sheet, (b) Crisp Style Sheet, (c) Cascading Style Set, (d) Cascading Style Sheet, of a, 119. CSS is used to control, HTML document., (a) content, (b) styles aspects like colour, size, background,, etc., (c) server type, (d) browser type, 120. CSS definitions are contained inside, tags., (a) < style > ... < /style >, (b) < h1 > ... < /h1 >, (c) < table > ... < /table >, (d) < f orm > ... < /f orm >, ., 121. CSS may be defined, (a) at the header section, (b) in a separate file, (c) inline as an attribute to a HTML tag, (d) all of them, 122. External style sheet may be embedded in HTML header section using the, tag., (a) < linkrel = “stylesheet”href, =, “styleset.css” >, (b) < ahref = “styleset.css” >, (c) < imgsrc = “globe.gif ” >, (d) < p > ... < /p >, main compo123. A CSS tag has, nents., (a) 1, (b) 2, (c) 3, (d) 6, component(s) are important, 124., for marking CSS in HTML., (a) Selector, (b) Property, Prepared by: Dr.V.Nagaradjane, , 111, (c) Value, (d) all of them, ., 125. Selector in CSS means, (a) the browser, (b) the tag which uses a particular CSS component, (c) the property which is modified, (d) the new value assigned to the given property, ., 126. Property in CSS means, (a) the browser, (b) the tag which uses a particular CSS component, (c) the property which is modified, (d) the new value assigned to the given property, ., 127. Value in CSS means, (a) the browser, (b) the tag which uses a particular CSS component, (c) the property which is modified, (d) the new value assigned to the given property, 128. The format for applying CSS style to se., lector is, (a) selector{property:value;}, (b) value{property:selector;}, (c) property{selector:value;}, (d) selector{value:property;}, among the following CSS ele129., ments declares that headings shall have, red colour., (a) ∗{color : blue; }, (b) h1{color:red;}, (c) < span class = “center bold” > ... <, /span >, (d) body{bgcolor: gray;}, among the following CSS ele130., ments declares that the entire document, will be rendered in blue colour., (a) ∗{color : blue; }, (b) h1{color:red;}, (c) < span class = “center bold” > ... <, /span >, (d) body{bgcolor: gray;}, 131. The method of applying CSS attribute using an identifier (number/alphanumeric) is called, selector method., (a) class, (b) attribute, (c) ID, (d) style, CSS tag among the defines, 132., blue colour for headings having ID of, blue., (a) h1#blue {color:blue;}, (b) #black h2 {color:red;}, (c) p#redpara{color:red; text-align:justified;}
Page 118 :
112, , Prepared by: Dr.V.Nagaradjane, , (d) p#centerpara{color=blue;, text- (d) ol > li{color : magenta; text − align =, align=center;}, lef t; decoration : underline}, CSS, tag, among, the, defines, among the following child se133., 139., red colour for all h2 tags enclosed in a, lector makes all items of an unordered, block of red ID., list to have magenta colour text, left, (a) h1#blue {color:blue;}, alignment and normal font style., (b) #red h2 {color:red;}, (a) body > p{color : green; text − align =, (c) p#redpara{color:red; text-align:justified;}, justif ied; f ont − style : bold}, (d) p#centerpara{color=blue;, text- (b) table > td{color : green; text − align =, align=center;}, center; f ont − style : italic}, CSS tag among the makes, (c) ul > li{color : magenta; text − align =, 134., a paragraph justified and having red, lef t; f ont − style : normal}, (d) ol > li{color : magenta; text − align =, colour text., (a) h1#blue {color:blue;}, lef t; decoration : underline}, (b) #red h2 {color:red;}, among the following child se140., (c) p#redpara{color:red; text-align:justified;}, lector makes all items of an ordered list, (d) p#centerpara{color=blue;, textto have red colour text, left alignment, align=center;}, and underline decoration., CSS tag among the makes, (a) body > p{color : green; text − align =, 135., a paragraph centre aligned and having, justif ied; f ont − style : bold}, (b) table > td{color : green; text − align =, blue colour text., (a) h1#blue {color:blue;}, center; f ont − style : italic}, (b) #red h2 {color:red;}, (c) ul > li{color : magenta; text − align =, (c) p#redpara{color:red; text-align:justified;}, lef t; f ont − style : normal}, (d) p#centerpara{color=blue;, text- (d) ol > li{color : red; text − align =, lef t; decoration : underline}, align=center;}, in, CSS, applies, given, style, to, 136., direct child elements., 1.10.7 Applying CSS to HTML, (a) Child selector, (b) ID selector, 141. CSS may be applied to HTML using, (c) class selector, ., (a) <, linktype, =, “text/css”rel, =, (d) none of them, “stylesheet”href, =, among the following child se137., “sylesheetname.css”, >, in, the, header, lector makes all paragraphs which are disection of HTML document, rect children of body HTML tag to have, (b) declaration through class and ID selectors, green text with justified alignment and, (c) inline application of styles, bold style., (a) body > p{color : green; text − align = (d) all of them, justif ied; f ont − style : bold}, (b) table > td{color : green; text − align = 1.10.8 Open source CMS, center; f ont − style : italic}, (c) ul > li{color : magenta; text − align = 142. CMS in web content stands for, lef t; f ont − style : normal}, ., (a), Content, Maintenance, System, (d) ol > li{color : magenta; text − align =, (b) Content Management Symbol, lef t; decoration : underline}, (c) Content Management System, among the following child se138., (d) Client Management System, lector makes all columns in a table to, have green colour text, centre alignment, 143. Open source stands for software for, and italic style., which, ., (a) body > p{color : green; text − align = (a) source code is available, (b) source code is not available, justif ied; f ont − style : bold}, (b) table > td{color : green; text − align = (c) source code is lost, (d) source code is bugged, center; f ont − style : italic}, (c) ul > li{color : magenta; text − align =, lef t; f ont − style : normal}
Page 119 :
Q. Bank [COPA Semester - 1], 144. Joomla, wordpress, Apache Roller,, OpenCMS, AmetysCMS, Dot CMS,, Drupal, Django CMS, etc. are some of, the, software packages., (a) professional/ paid, (b) escrow source, (c) none of them, (d) open source, , 113, (b) web page editing, (c) both a & b, (d) none of them, 151. Development work on KompoZer, stopped in the year, ., (a) 2017, (b) 2010, (c) 2015, (d) 2014, FrontPage, , Joomla, tool., 152. Frontpage is a, 145. Joomla is a Content Management Sys(a) web page creation, scripting lantem based on, (b) web page editing, guage., (c) both a & b, (a) Python, (b) PHP, (d) none of them, (c) Ruby, (d) Perl, 153. Frontpage was part of Microsoft, 146. Joomla requires creation of a, package., in MySQL database for effective CMS, (a) Office, with data support., (b) Visual Studio, (a) database, (c) Windows, (b) user, (d) none of them, (c) both database and user, 154. Frontpage was discontinued from Mi(d) none of them, ., crosoft office version, 147. To begin working with Joomla, the con(a) 1997, (b) 2001, ., tents of the zip file need to be, (c) 2003, (d) 2007, (a) deleted, (b) extracted to Downloads folder, (c) copied to the web server root directory (ht- Answers (1682 - 1835), docs/ html), (d) divided into several pieces, 1. (a), 2. (d), 3. (c), 4. (b), 5. (b), 6. (a), 7. (a), 8. (b), 9. (a), 10. (c), 11. (d), 12. (c), Wordpress, 13. (d), 14. (a), 15. (b), 16. (c), 148. Wordpress files need to be copied to, 17. (d), 18. (d), 19. (a), 20. (c), to start creating a website., 21. (b), 22. (d), 23. (c), 24. (a), (a) Documents, 25. (b), 26. (c), 27. (d), 28. (b), (b) root directory of the web server, 29. (c), 30. (a), 31. (a), 32. (b), (c) Downloads, 33. (c), 34. (a), 35. (b), 36. (c), (d) Pictures, 37. (d), 38. (a), 39. (b), 40. (c), 149. After copying Wordpress, the URL, 41. (d), 42. (a), 43. (a), 44. (c), < wordpress root >/, 45. (d), 46. (b), 47. (a), 48. (b), should be opened to start the configu49. (c), 50. (d), 51. (a), 52. (b), ration process., 53. (c), 54. (d), 55. (c), 56. (b), (a) index.html, 57. (b), 58. (a), 59. (b), 60. (a), (b) index.php, 61. (c), 62. (b), 63. (a), 64. (d), (c) readme.html, 65. (a), 66. (c), 67. (b), 68. (a), (d) wp-admin/install.php, 69. (b), 70. (c), 71. (d), 72. (c), 73. (a), 74. (a), 75. (b), 76. (c), 77. (d), 78. (d), 79. (d), 80. (c), 1.10.9 Web authoring tools, 81. (b), 82. (a), 83. (a), 84. (c), Kompozer, 85. (d), 86. (b), 87. (a), 88. (c), 89. (a), 90. (b), 91. (d), 92. (a), tool., 150. KompoZer is a, 93. (d), 94. (b), 95. (c), 96. (a), (a) web page creation, Prepared by: Dr.V.Nagaradjane
Page 120 :
114, 97. (b), 101. (a), 105. (a), 109. (a), 113. (a), 117. (a), 121. (d), 125. (b), , Prepared by: Dr.V.Nagaradjane, 98. (c), 102. (b), 106. (b), 110. (b), 114. (a), 118. (d), 122. (a), 126. (c), , 99. (d), 103. (c), 107. (c), 111. (c), 115. (c), 119. (b), 123. (c), 127. (d), , 100., 104., 108., 112., 116., 120., 124., 128., , (d), (d), (d), (d), (d), (a), (d), (a), , 129., 133., 137., 141., 145., 149., 153., , (b), (a), (a), (d), (b), (d), (a), , 130., 134., 138., 142., 146., 150., 154., , (a), (c), (b), (c), (c), (c), (d), , 131., 135., 139., 143., 147., 151., , (c), (d), (c), (a), (c), (b), , 132., 136., 140., 144., 148., 152., , (a), (a), (d), (d), (b), (c)