Author name: Umar Draz

educationist

In Excel which key is used to select entire row?

A. Ctrl+Space
B. Shift+Space
C. Alt+Space
D. None of
Correct answer is: B. Shift+Space

Which key is used to create chart from selected data in excel?

A. F11
B. F1
C. F10
D. Both A & B
Correct answer is: A. F11

All of the following are examples of real security and privacy risks EXCEPT                           ?

A. hackers
B. Spam
C. Viruses
D. identity theft
Correct answer is: B. Spam

Where does most data go first with in a computer memory hierarchy ?

A. RAM
B. ROM
C. BIOS
D. CACHE
Correct answer is: A. RAM

A DVD is an example of a (n)                        ?

A. hard disk
B. optical disc
C. output device
D. solid-state storage device
Correct answer is: B. optical disc

Which of the following contains permanent data and gets updated during the processing of transactions?

A. Operating System File
B. Transaction file
C. Software File
D. Master file
Correct answer is: D. Master file

An intentionally disruptive program that spreads from program to program or from disk to disk is known as a                             ?

A. Trojan horse.
B. Virus.
C. Time bomb.
D. Time- related bomb sequence.
Correct answer is: B. Virus.

To prevent the loss of data during power failures, use a(n)                             ?

A. Encryption
B. Surge
C. Firewall
D. UPS
Correct answer is: D. UPS

Touch Screen is                        ?

A. Input device
B. Output
C. Both A & B
D. None of
Correct answer is: C. Both A & B

Computers, combine both measuring and counting, are called                                   ?

A. Analog
B. Digital
C. Hybrid
D. All of these
Correct answer is: C. Hybrid

Scroll to Top