(d)
Sol. Ctrl + A is used to select all the text.
S2. Ans.(b)
Sol. MS word is an Application software. An Application software is a program or
group of programs designed for end users,
S3. Ans.(c)
Sol. C trl + V is a shortcut key used to paste text or image in MS Word
S4. Ans.(b)
Sol. M onitor is an output device.
S5. Ans.(a)
Sol. “Modifier keys are commonly used to enter keyboard shortcuts.” A modifier key is
a key that modifies the action of another key when the two are pressed together.
Common modifier keys include Shift, Control, Alt, Command, Option, and Function
S6. Ans.(b)
Sol. The shift key is a modifier key on a keyboard, used to type capital letters and
other alternate “upper” characters. There are typically two shift keys, on the left and
right sides of the row below the home row.
S7. Ans.(a)
Sol. Q WERTY model used by US standard.
S8. Ans.(b)
Sol. C++, Java, and PHP are Object-oriented programming language. Object-oriented
programming (OOP) refers to a type of computer programming (software design) in
which programmers define not only the data type of a data structure, but also the
types of operations (functions) that can be applied to the data structure. In this way,
the data structure becomes an object that includes both data and functions
S9. Ans.(b)
Sol. I n all these options Pascal is the programming language.
S10. Ans.(c)
Sol. FORTRAN is a general-purpose, imperative programming language that is
especially suited to numeric computation and scientific computing.
S11. Ans.(a)
Sol. J ava was introduced by Sun Micro system and released in 1995.
S12. Ans.(d)
Sol. Low-level language is a programming language that deals with a computer’s
hardware components and constraints. It has no or a minute level of abstraction in
reference to a computer and works to manage a computer’s operational semantics.
Low-level language may also be referred to as a computer’s native language.
Assembly language is an example of low level language.
S13. Ans. (c)
Sol. Super key is a set of one or more attributes taken collectively to uniquely identify
a record.
S14. Ans. (b)
Sol. Key is a property of the entire relation (relation is a table).
S15. Ans. (a)
Sol. Data model is an abstract model that describes, how the data are organized and
represented.
S16. Ans.(a)
Sol. Trojan horse is a malicious program which looks like a normal program and is
accompanied with useful applications like computer games. When you run the
game, the Trojan horse gets activated and destroys the information in the
background.
S17. Ans.(a)
Sol. E-commerce refers to the electronic mode of selling and buying products and
services.
S18. Ans.(e)
Sol. In cryptography, data are sent in such a way that they look completely different
from the original data. Thus, cryptography ensures secure transfer of data over an
unsecured network.
S19. Ans.(e)
Sol. SubSeven is a Trojan horse program that appears or pretends to be a genuine
application, but actually causes damage to the executable files on the computer.
S20. Ans.(a)
Sol. Wide Area Network (WAN) usually uses telephone lines for connectivity, as WAN
is spread over a large area and offers Internet-related services such as browsing,
email, chatting, etc.
S21. Ans.(b)
Sol. A Web portal is a specially designed website that often serves as the single point
of access for information.
The first Web portals were online services, such as AOL, that provided access to the
Web, but by now most of the traditional search engines have transformed
themselves into Web portals to attract and keep a larger audience.
S22. Ans.(b)
Sol. A firewall acts as a barrier between a trusted network and an untrusted network.
A firewall controls access to the resources of a network through a positive control
model. This means that the only traffic allowed onto the network is defined in the
firewall policy; all other traffic is denied.
Firewalls can be implemented in both hardware and software, or a combination of
both.
S23. Ans.(d)
S24. Ans.(a)
Sol. Mail merge is used to create multiple documents at once. These documents have
identical layout, formatting, text, and graphics. Only specific sections of each
document vary and are personalised.
S25. Ans. (b)
Sol. I t is a formula to get sum of the data from cell number S3 to S10.
S26. Ans.(d)
Sol. As the installation cost of thinnet coaxial cable is less, it is also known as
cheapernet.
S27. Ans.(a)
Sol. In 10BaseT, 10 means the transfer rate of this Ethernet is 10 Mbps; Base describes
the type of signaling used, that is Baseband; and T denotes that the cable used is
twisted -pair cable.
S28. Ans.(d)
Sol. A wireless network allows a user to connect different computers or devices by
using wireless network protocols. It provides mobility by allowing access to a network
irrespective of the location. The installation of a wireless network is easy compared to
a wired network. Also, a wireless network does not required expensive wires a cables;
therefore, this type of network is cost effective. However, this type of network is
insecure.
S29. Ans.(a)
Sol. In the Bus topology, all the nodes and peripherals are connected to a single cable
that acts as the backbone of the network. Therefore, there is no need for a hub,
switch or router for connecting nodes in this topology.
S30. Ans.(b)
Sol. The Physical layer handles voltage, electrical pulses, connectors and, switches so
that data can be transmitted over transmission media.
S31. Ans. (a)
Sol. U nion operation performs a set union of two ‘similarly structured’ tables.
S32. Ans. (a)
Sol. Tuple is a row.
S33. Ans. (d)
Sol. A field is category of information.
S34. Ans. (c)
Sol. Super key is a set of one or more attributes taken collectively to uniquely identify
a record.
S35. Ans. (b)
Sol. Key is a property of the entire relation (relation is a table).
S36. Ans.(e)
Sol. In cryptography, data are sent in such a way that they look completely different
from the original data. Thus, cryptography ensures secure transfer of data over an
unsecured network.
S37. Ans.(e)
Sol. SubSeven is a Trojan horse program that appears or pretends to be a genuine
application, but actually causes damage to the executable files on the computer.
S38. Ans.(a)
Sol. Wide Area Network (WAN) usually uses telephone lines for connectivity, as WAN
is spread over a large area and offers Internet-related services such as browsing,
email, chatting, etc.
S39. Ans.(c)
Sol. In software, JAR (Java Archive) is a package file format typically used to
aggregate many Java class files and associated metadata and resources (text, images,
etc.) into one file to distribute application software or libraries on the Java platform.
S40. Ans.(b)
Sol. A bridge is a network device used at the data link layer to connect two dissimilar
networks as well as similar networks.