Clerical Mains Computer Practice test 2
Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
Online Practice Test – 2
- English (Ques 1 to 30)
Time Duration 30 minutes.
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score | |
Your score |
Categories
- Computer 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
- Question 1 of 30
1. Question
Category: ComputerIn CSMA/CD, the computer sends a fixed unit of data called a(n)_______
CorrectSolution: A network packet is a formatted unit of data carried by a packet-switched network.
IncorrectSolution: A network packet is a formatted unit of data carried by a packet-switched network.
- Question 2 of 30
2. Question
Category: ComputerWAV, WMA and AIFF are examples of_________.
CorrectSolution: WAV (Waveform Audio File Format), WMA(Windows Media Audio), AIFF(Audio Interchange File Format) are examples of audio file format.
IncorrectSolution: WAV (Waveform Audio File Format), WMA(Windows Media Audio), AIFF(Audio Interchange File Format) are examples of audio file format.
- Question 3 of 30
3. Question
Category: ComputerA simple automated program that scans the web for specific data and insert into a designated database is ________.
CorrectSolution: A web crawler (also known as a web spider or web robot) is a program or automated script which browses the World Wide Web in a methodical, automated manner. This process is called Web crawling or spidering.
IncorrectSolution: A web crawler (also known as a web spider or web robot) is a program or automated script which browses the World Wide Web in a methodical, automated manner. This process is called Web crawling or spidering.
- Question 4 of 30
4. Question
Category: Computerwhich of the following allows you to communicate over the internet similar to a newsgroup but is easier to use.
CorrectSolution: A message board is an online discussion area in which users with similar interests discuss topics. These conversations or discussions are available in the form of posted messages.
IncorrectSolution: A message board is an online discussion area in which users with similar interests discuss topics. These conversations or discussions are available in the form of posted messages.
- Question 5 of 30
5. Question
Category: ComputerWhich of the following printers is used in conjunction with computers and uses dry ink powder?
CorrectSolution: Laser printers use a dry ink powder in cartridge called toner.
IncorrectSolution: Laser printers use a dry ink powder in cartridge called toner.
- Question 6 of 30
6. Question
Category: Computer________ determines the appearance of your desktop and controls the performance of your hardware.
CorrectSolution: The Control Panel is a section of Microsoft Windows that enables a user to change various computer hardware and software features. Settings for the mouse, display, sound, network, and keyboard represent just a few examples of what may be modified in the Control Panel.
IncorrectSolution: The Control Panel is a section of Microsoft Windows that enables a user to change various computer hardware and software features. Settings for the mouse, display, sound, network, and keyboard represent just a few examples of what may be modified in the Control Panel.
- Question 7 of 30
7. Question
Category: Computer_____ is a Windows utility program that located and eliminates unnecessary fragments and rearranges filed and unused to disk space to optimize operations.
CorrectSolution: Disk defragmenter is a Windows utility program that located and eliminates unnecessary fragments and rearranges filed and unused to disk space to optimise operations.
IncorrectSolution: Disk defragmenter is a Windows utility program that located and eliminates unnecessary fragments and rearranges filed and unused to disk space to optimise operations.
- Question 8 of 30
8. Question
Category: ComputerIf a word is typed that is not in MS Word’s dictionary, a wavy underline appears below the word. What is the color of the underline that appears in this situation?
CorrectSolution: This indicates either a possible spelling error or that Word doesn’t recognize a word, such as a proper name or place. Green underline- Word thinks that grammar should be revised. Blue underline- A word is spelled correctly but does not seem to be the correct word for the sentence.
IncorrectSolution: This indicates either a possible spelling error or that Word doesn’t recognize a word, such as a proper name or place. Green underline- Word thinks that grammar should be revised. Blue underline- A word is spelled correctly but does not seem to be the correct word for the sentence.
- Question 9 of 30
9. Question
Category: ComputerWhat is decorative text called, that you can add to a document?
CorrectSolution: WordArt is decorative text that you can add to a document. You can make changes to WordArt, such as the font size and the text colour, by using the drawing tools options available automatically after you insert or select the WordArt in a document.
IncorrectSolution: WordArt is decorative text that you can add to a document. You can make changes to WordArt, such as the font size and the text colour, by using the drawing tools options available automatically after you insert or select the WordArt in a document.
- Question 10 of 30
10. Question
Category: ComputerWhat is a named area on a disk that is used to store related subfolders and files called?
CorrectSolution: A folder is a virtual location where programs, files, and other folders can be located.
IncorrectSolution: A folder is a virtual location where programs, files, and other folders can be located.
- Question 11 of 30
11. Question
Category: Computer__________ operation is not performed by a general computer.
CorrectSolution: Except thoughtful all other operations are performed by general computers.
IncorrectSolution: Except thoughtful all other operations are performed by general computers.
- Question 12 of 30
12. Question
Category: ComputerBridge is a _________ device.
CorrectSolution: A bridge is a network device used at the data link layer to connect two dissimilar networks as well as similar networks.
IncorrectSolution: A bridge is a network device used at the data link layer to connect two dissimilar networks as well as similar networks.
- Question 13 of 30
13. Question
Category: ComputerCopying a process from memory to disk to allow space for other processes is Called
CorrectSolution: Swapping concept comes in terms of process scheduling. Scheduler removes process from CPU for duration and reduces the degree of multiprogramming. And after some time these process can again be reintroduced into main memory.
IncorrectSolution: Swapping concept comes in terms of process scheduling. Scheduler removes process from CPU for duration and reduces the degree of multiprogramming. And after some time these process can again be reintroduced into main memory.
- Question 14 of 30
14. Question
Category: ComputerWhich of these is not a feature of Hierarchical model?
CorrectSolution: A hierarchical database model is a data model in which the data is organized into a tree-like structure. The hierarchical database model mandates that each child record has only one parent, whereas each parent record can have one or more child records.
IncorrectSolution: A hierarchical database model is a data model in which the data is organized into a tree-like structure. The hierarchical database model mandates that each child record has only one parent, whereas each parent record can have one or more child records.
- Question 15 of 30
15. Question
Category: ComputerPalmtop computer is also known as _______.
CorrectSolution: A Palmtop PC was an about pocket calculator-sized, battery-powered PC in a horizontal clamshell design with integrated keyboard and display. It could be used like a subnotebook, but was light enough to be comfortably used handheld as well. That is the reason they were also known as handheld devices.
IncorrectSolution: A Palmtop PC was an about pocket calculator-sized, battery-powered PC in a horizontal clamshell design with integrated keyboard and display. It could be used like a subnotebook, but was light enough to be comfortably used handheld as well. That is the reason they were also known as handheld devices.
- Question 16 of 30
16. Question
Category: ComputerWhich of the following option will not be helpful to instruct Word to stop bulleting paragraphs?
CorrectSolution: Clicking undo button in this context will not end bulleting.
IncorrectSolution: Clicking undo button in this context will not end bulleting.
- Question 17 of 30
17. Question
Category: Computer___________are attempts by individuals to obtain confidential information from you by falsifying their identity.
CorrectSolution: Phishing trips are attempts by individuals to obtain confidential information from you by falsifying their identity.
IncorrectSolution: Phishing trips are attempts by individuals to obtain confidential information from you by falsifying their identity.
- Question 18 of 30
18. Question
Category: ComputerThe DBMS acts as an interface between what two components of an enterprise-class database system?
CorrectSolution: DBMS acts as an interface between database application and the database.
IncorrectSolution: DBMS acts as an interface between database application and the database.
- Question 19 of 30
19. Question
Category: ComputerWhich of the following keeps a list of web pages you have visited during the current session?
CorrectIncorrect - Question 20 of 30
20. Question
Category: ComputerWhich of the following line describes the contents of the message, When sending an e-mail?
CorrectSolution: Subject define the content of the email message.
IncorrectSolution: Subject define the content of the email message.
- Question 21 of 30
21. Question
Category: ComputerTo move to the beginning of a line of text, press the __________ key.
CorrectSolution: Home key returns you to the beginning of the line, document, page, cell, or screen of where your cursor is positioned.
IncorrectSolution: Home key returns you to the beginning of the line, document, page, cell, or screen of where your cursor is positioned.
- Question 22 of 30
22. Question
Category: ComputerWhich of the following is used to enter the current time in ms-excel?
CorrectIncorrect - Question 23 of 30
23. Question
Category: ComputerEach box in a spreadsheet is called a ________.
CorrectSolution: Each box in a spreadsheet is called a cell.
IncorrectSolution: Each box in a spreadsheet is called a cell.
- Question 24 of 30
24. Question
Category: ComputerA key that will erase information from the computer’s memory and characters on the screen:
CorrectSolution: Delete key is used to delete data.
IncorrectSolution: Delete key is used to delete data.
- Question 25 of 30
25. Question
Category: ComputerWhich of the following statements is false in the context of client/server network?
CorrectSolution: The client/server network contains a centralized server that manages and controls all the other nodes of the network. It is expensive as it requires NOS and a specialized server system. It is highly secure and possesses good speed. However, it becomes congested when more clients simultaneously request for a service to the server.
IncorrectSolution: The client/server network contains a centralized server that manages and controls all the other nodes of the network. It is expensive as it requires NOS and a specialized server system. It is highly secure and possesses good speed. However, it becomes congested when more clients simultaneously request for a service to the server.
- Question 26 of 30
26. Question
Category: ComputerBy what name are two or more fields of a database table called when they are collectively used to specify the primary key?
CorrectSolution: Composite key is formed when two or more fields of a database table are combined together in order to uniquely identify the records stored in the table.
IncorrectSolution: Composite key is formed when two or more fields of a database table are combined together in order to uniquely identify the records stored in the table.
- Question 27 of 30
27. Question
Category: ComputerWhich of the following gates is a complement of the X-OR gate?
CorrectSolution: X-NOR gate is a complement of the X-OR gate. The truth table of the X-NOR gate is the complement (opposite) to the X-OR gate.
IncorrectSolution: X-NOR gate is a complement of the X-OR gate. The truth table of the X-NOR gate is the complement (opposite) to the X-OR gate.
- Question 28 of 30
28. Question
Category: ComputerCopying a process from memory to disk to allow space for other processes is called _______.
CorrectSolution: Swapping concept comes in terms of process scheduling. Scheduler removes process from CPU for duration and reduces the degree of multiprogramming. And after some time these process can again be reintroduced into main memory.
IncorrectSolution: Swapping concept comes in terms of process scheduling. Scheduler removes process from CPU for duration and reduces the degree of multiprogramming. And after some time these process can again be reintroduced into main memory.
- Question 29 of 30
29. Question
Category: ComputerDBMS ensures data integrity by managing transactions through ACID test. What does ACID stands for in computer science?
CorrectSolution: ACID (Atomicity, Consistency, Isolation, and Durability) is a set of properties of database transactions.
IncorrectSolution: ACID (Atomicity, Consistency, Isolation, and Durability) is a set of properties of database transactions.
- Question 30 of 30
30. Question
Category: ComputerWhat does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?
CorrectSolution: The CMOS is a physical part of the motherboard: it is a memory chip that houses setting configurations and is powered by the onboard battery. The CMOS is reset and loses all custom settings in case the battery runs out of energy, additionally, the system clock resets when the CMOS loses power.
IncorrectSolution: The CMOS is a physical part of the motherboard: it is a memory chip that houses setting configurations and is powered by the onboard battery. The CMOS is reset and loses all custom settings in case the battery runs out of energy, additionally, the system clock resets when the CMOS loses power.
Leaderboard: Clerical Mains Computer Practice test 2
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||