1. _______ is a powder used in laser printers to form the images on a paper
a) cartridge
b) ribbon
c) gel
d) toner
2. Worms and Trojan Horses are examples of :
a) hardware
b) firmware
c) malware
d) freeware
3. _______ printers work by selectively heating regions of special heat sensitive paper
a) impact
b) inkjet
c) thermal
d) dot-matrix
4. The ISI mark is given by
a) BIS
b) ISO
c) ANSI
d) IEEE
5.The Laser printer was invented at :
a) Canon
b) Epson
c) HP
d) Xerox
6. In 100BASE-T, " T " stands for :
a) type
b) traffic
c) twisted pair
d) bytes
7. Which among the following utilities can detect a bad sector?
a) CHKDSK
b) SCANDISK
c) Both A & B
d) None
8. The port number used by SMTP is :
a) 13
b) 21
c) 25
d) 27
9. A packet filter is a type of :
a) compiler
b) firewall
c) inverter
d) search tool
10. The TTL field is inside the ____ header
a) Ethernet
b) IP
c) TCP
d) HTTP
11. GRUB is a / an :
a) Search Tool
b) Editor
c) Boot Loader
d) Compiler
12. Power-on-self-test is built into the
a) BIOS
b) Hard disk
c) SMPS
d) UPS
13. Powerpoint can embed content from other applications through :
a) NFS
b) OLE
c) JDBC
d) CUPS
14. In Powerpoint presentations, individual pages are called :
a) Cells
b) Tables
c) Columns
d) Slides
15. The port number used by the HTTP protocol is :
a) 13
b) 25
c) 80
d) 255
16. The utility which can be used to clean the windows registry is :
a) chkdsk
b) scandisk
c) regedit
d) fixboot
17. Indiscriminate sending of unsolicited bulk messages is known as :
a) instant messaging
b) flaming
c) phishing
d) spamming
18. Kerberos is a _________ protocol
a) Network authentication
b) Data compression
c) Network Management
d) File Transfer
19. Athlon series of processors are made by :
a) AMD
b) Intel
c) IBM
d) Motorola
20. The ability to replace components of a computer , while it is operating is called
a) De-fragmentation
b) Hot swapping
c) Boot Strapping
d) OLE
Answer are given in blue color . if any errors found, pls comment
More >>
No comments:
Post a Comment