300 MCQ -COMPUTER SCIENCE [SLC / SEE]
1. Data communication means:
i. We can easily send and receive the message Data computing system is fastest in network
ii. The process of transferring data and information None of above
2. The term network basically refers to:
Communication Interconnection Sharing All of them
3. Which of the following are is not a goal of computer networks?
Resource sharing High reliability Scalability None of the above
4. Which one of the device is simplex?
i. Television ii. Telephone iii. Computer iv. Walkie-Talkie
5. TV broadcasting is an example for data transmitting
i. Half-duplex Mode ii. Simplex Mode iii. Full duplex mode iv. None of them
6. Which refers to the communication media: [SLC 2065]
UTP Cable Fiber optics cable Satellite All of above
7. Which is not a communication media? [SLC 2067]
Wire Microwave Satellite NIC
8. Which is not unguided media? [SLC 2069]
i) Fiber optics ii) Microwave iii) Infrared iv) Radio wave
9. Which is NOT a guided media? [SLC 2066 S]
i) UTP Cable ii) STP Cable iii) Satellite iv) Fiber Optics
10. Which of the following is not a guided data communication media? [SLC 2068 S]
i) Coaxial cable ii) Fiber optic iii) twisted pair iv) Satellite
11. Which transmission media is not used for guided transmission media?
Fiber Optic Coaxial Cable RJ45 Satellite
12. Which one is an example of bounded media? [SLC 2067 S] [SLC 2070]
i) Fiber optics ii) Microwave transmission iii)Laser transmission iv) infrared transmission
13. An example of guided media_______
Radio wave Infrared Fiber Optics Micro wave
14. In which communication media data transfer high? [SLC 2068]
i) Twisted pair ii) Co-axial cable iii) Fiber optics iv) Microwave
15. Fastest and high bandwidth data communication medium is:
Optical fiber Twisted Pair Coaxial Cable Telephone Line
16. Media used to transfer data in forms of light? [SLC 2070 S]
i. Microwave ii. Fiber optical iii. Radio wave iv. Satellite
17. Microwave and Infrared technology are related with:
Unbounded media Bounded Media Confounded Hot Bounded
18. A form of wireless transmission in which signals are sent via pulses of infrared light.
i) Radio networking ii) Infrared transmission iii) Microwave transmission iv) None of the above
19. Which is the connector of UTP cable?
i. BNC ii. T-Connector iii. ST connector iv. RJ-45 connector
20. Which is the connector of coaxial cable.
i. RJ 45 ii. BNC iii. ST iv. None of them
21. Which of the following is not Media connector?
BNC ii. terminator iii.RJ-45 iv.NIC
22. The device used for connecting PC to telephone line is
i) CD-ROM ii) MODEM iii) Printer iv) Port
23. A device that converts the discrete stream of digital ON-OFF electric pulses used by computer into the continuously variable analog wave patterns used to transmit the human voice over many existing telephone lines.
i) Modem ii) Bridge iii) Gateway
24. Modem converts ______________ [SLC 2066 S]
Sound into digital Digital signal into sound Both (i) and (ii) None of above
25. The speed of Modems is measured in terms of
mbps ii.bps iii. kbps iv. bits
26. Which device is used to connect multiple networks that uses the same protocol. [SLC 2074]
(i) Bridge (ii) NIC (iii) Switch (iv) Gateway
27. Which of the following is used to connect totally dissimilar networks?
i) Router ii) Bridge iii) Gateway iv) None of the above
28. A networking device that joins multiple networks having different protocols is_
Switch ii. Router iii. Gateway iv. Bridge
29. Which is not a network device?
Hub Repeater switch TCP/IP
30. Which is not a physical component of computer network ?
i) Cable ii) NIC iii) Network OS iv) Hub
31. Which is not network hardware component?
HUB ii. Repeater iii. Router iv. Windows NT
32. Which is the component of a network?
i. MSDOS ii. Hub iii. Volt guard iv. None of them
33. Devices installed on long cable runs to amplify the signal are called:
Repeaters Adapters Switches Routers
34. A network navigation device that merely retransmits a signal to all other nodes attached to it:
Router NIC Hub Adapter
35. A device that lets you link two networks together.
i. Switch ii. Hub iii. Router iv. None of above
36. Which of the following device is multi ports repeater?
Hub ii. router iii. bridge iv. Gateway
37. Any network device that can connect to the network and can generate ,process or transfer network data.
i) Node ii) Client iii) Peer
38. A network interface card is the card that physically makes the connection between the computer
and the network cable.
i) Network cables ii) Network connector iii) NIC
39. Which is not the network operating system:
Linux UNIX MS-DOS Windows Server 2012
40. Which is Network operating system(NOS)? [SLC 2064]
i. Linux ii. Windows XP iii. MS-DOS iv. All
41. Which is the network operating system used in a server computer?
i. Windows XP ii. Windows Vista iii. Windows NT server iv. None of them
42. Which one is an operating system software? [SLC 2070]
i) MS-Word ii) MS-Excel iii) Firefox iv) MS-DOS
43. Protocols in network means
i) Language for communication between computer
ii) Rules for exchange of message between two or more hosts
iii) Both i) and ii) iv) None of the above
44. Which of the following is not a protocol? [SLC 2068] [SLC 2074]
i) POP ii) TCP/IP iii) NOS iv) FTP
45. Which is not a network protocol?
i. TCP/IP ii. HTTP iii. LAN iv. FTP
46. Which of the following is not a protocol?
TCP/IP ii.IPX/SPX iii.NETBIOS/NETBUI iv. Client
47. Which is not the network protocol?
TCP/IP ii. STP iii. FTP iv. SMTP
48. Which of the following is protocol?
TCP/IP HTTP FTP All of them
49. The communication protocol used to connect to web servers on the internet or on a local network (intranet).
i) TCP/IP ii) HTTP i) SMTP iv) POP
50. _______ is the protocol used to send email:
HTTP SMTP POP FTP
51. Which protocol is used to receive mail from mail server?
POP FTP HTTP SMTP
52. Which of the following networking solution is suitable for networking within a building?
i) WAN ii) LAN iii) MAN iv) None of above
53. A data communications system allowing a number of independent devices to communicate directly with each other, within a moderately sized geographic area.
i.LAN ii.WAN iii. MAN iv.CAN
54. A network of computer spread over a city or town located in the same geographical area.
i) LAN ii) MAN iii) WAN
55. A telecommunication network, usually used for connecting computers, that spans a wide geographical area.
i) LAN ii) MAN iii) CAN iv) WAN
56. Which type of network is used in the internet?
LAN MAN GAN WAN
57. Which of the following topologies share a single channel on which all stations can receive and transmit the data?
i) LAN ii) BUS iii) TREE iv) None of the above
58. Physical layout of computer:
Network Topology LAN MAN
59. Which is not a network topology? [SLC 2066]
STAR Ring Client Server BUS
60. A topology with a single cable that connects all the workstations, servers, printers and other devices on the network.
i. Ring Topology ii. Bus Topology iii. Star Topology iv. Mesh Topology
61. Which of the following topologies is least affected by addition/removal of a node?
i) Star ii) Ring iii) Bus iv) None of the above
62. In which topology network devices are connected through hub? [SLC 2067]
i) Ring topology ii) Bus topology iii) Star topology iv) None of the above
63. Token passing system is used in _____ topology.
Star Ring Bus Mesh
64. The network architecture used in most home networks is:
Client-server LAN Peer-to-peer LAN Client-server WAN Peer-to-peer WAN
65. A _______ is a self-sufficient computer that acts both as a server and a client to other similar computers on the network.
i. Node ii. Client iii. Peer
66. A group of computers that functions both as a client and as a server.
Centralized computing ii) Client/server iii) Peer-to-peer iv)Local Area Network
67. In which of the following network model all the computers have equal access?
i. Peer-to-peer network ii. apple talk network
iii. Client/server network iv. None of the above
68. A specialized network device on a host-based network that transmits the data entered by the user to the host for processing and displays the results.
i. Client ii. Network Server iii. Terminal iv. None of the above
69. A centralized computing network is a type of network where all the users connect to a host computer that is the acting agent for all communication.
i) Peer-to peer ii) Client/server iii) None of the above
70. A network in which a central host computer performs data processing and storage on behalf of clients.
i. Centralized computing network ii. Client/Server network iii. Peer-to-peer network
71. Which of the following acts as the central authority in the network?
protocol ii.client iii.server iv.none of the above
72. A server in LAN is a
i) Device offering service to user ii) NIC
iii) Workstation with huge secondary storage iv) None of the above
73. A dedicated server that manages printers and printing jobs is_
Network Server ii. Printer Server iii. Modem Server iv. File Server
74. The maximum speed at which data can be transmitted between two nodes on a network.
Bit rate Bandwidth Band length None of them
75. The bandwidth of digital signal is measured in_
i. Hertz ii. Cycle per second iii. Bits per second iv. None of the above
Internet and Its services
76. The internet was developed by US.
Department of Defence Department of Electronics Department of Commerce None
77. The large group of millions of computers around the world that are all connected to one another.
LAN Intranet Internet All of above
78. Which is not related to Internet? [SLC 2067]
i.ISP ii.TCP/IP iii.WWW iv.UPS
79. Which of the following network connects computer to the Internet? [SLC 2069 S]
i) Intranet ii) LAN iii) WAN iv) MAN
80. Which device is necessary to operate the internet? [SLC 2066 S]
i.CD-ROM ii. ISP iii. Modem iv. All of above
81. Connection between a computer and the Internet done using a normal telephone is called
i. Satellite network Dial-Up network Cable network None of them
82. Which is the protocol used in internet?
i. TCP/IP ii.FTP iii.ICP iv.ISP
83. __________ is the main line of defense between a local network or intranet and the Internet.
USB port Encryption key Firewall Decryption key
84. Each computer on the Internet has a unique numeric address called a/an …. [SLC 2069 S]
i) Web address ii) Domain address iii) Network binding iv) IP address
85. The ARPAnet that helped to develop protocol is
i. TCP/IP ARP POPA None of above
86. Which of the flowing is the internet service? [SLC 2069]
IRC E-Mail Telnet All of above
87. Which is the internet service? [SLC 2064]
i) Telnet ii) POP iii) Both iv) None
88. Which one is not the service of the Internet?
Electronic Fax ii. Chatting iii. Sharing hardware iv. Electronic mail
89. Which is not an internet service? [SLC 2066 S]
i) e-mail ii) e-telephone iii)e-fax iv) e-commerce
90. WWW is a
Protocol of Internet Service of Internet Language of Internet None of them
91. Email is
i. Mail concerning electronic devices
ii. Transaction of letters,messages and memos over a communication network.
iii. Transaction of messages within a computer. None of them.
92. E-mail is a/an …………… [SLC 2067 S]
i) organization which controls internet ii) protocol to access internet iii) service of Internet iv) none
93. Which is the correct Email ID? [SLC 2065]
i) Yahoo@ramesh ii) Ramesh@yahoo.com iii) @ramesh.yahoo.com iv) None of the above
94. In an email address : abc@yahoo.com, what does ‘yahoo’ refer?
User account name ii. Domain name iii. Top level domain name iv. None of them.
95. Which of the following is online business?
E-Commerce E-shopping E-Business All of the above
96. E-commerce is ………….[SLC 2067 S]
i) a type of business ii) a type of virus iii) both (i) &(ii) iv) None of the above
97. Each web page has its own unique address known as
i) Uniform Resource Locator ii) Universal Resource Locator
iii) Uniform Resources Locator iv) Universal Resources Locator
98. The unique address of a web page on the internet is called
i.URL ii. Browser iii. Protocol iv. HTTP
99. Which of the following allows the user to surf and interact with the web-page?
i. website ii. Browser iii.web page iv.web server
100. Which is web browser software? [SLC 2067]
i. Windows 2007 ii. Internet explorer iii. Windows NT iv. All of the above
101. Web sites that allow the users to search information based on keywords or a combination of keywords.
i)World Wide Web ii) Electronic mail iii) Search engines
102. Which is not the search engine?
Yahoo.com ii. Google.com iii. Bing.com iv. Ebay.com
103. Yahoo! Is a ……..
i. browser ii .home page iii. search engines
104. FTP is used to
i. Browse the Internet Send emails
ii. transfer files from one computer to another None of above
105. Used to transfer file from one computer to another computer in Internet. [SLC 2070 S]
i. FAQ ii. IRC iii. FTP iv. TPF
106. Which of the following is remote login service? [SLC 2068 S] [SLC 2071]
i) Video conferencing ii) Telnet iii) FTP iv) TCP/IP
107. A web site in the internet that brings people together in central location to talk, share ideas, share
interests, make new friends.
i)USENET ii) Social network iii) Web chat
108. An online interactive communication mechanism that lets people to make a real time decision with
one or more people through the Internet.
i)Web chat ii)Newsgroup iii)Videoconferencing
109. The service of the Internet that provides audio and video conversation is_
Chat ii. E-mail iii. Video conference iv. Video chat
110. The process of transferring file from a remote computer to local computer is:
Uploading Downloading Searching File transfer protocol
111. The process of transferring file from a local computer to internet is:
Uploading Downloading Searching File transfer protocol
112. Web-site is a collection of
HTML documents Graphics File audio and video files All of above
113. A set of interconnected WebPages, usually including a homepage, generally located on the same server, and prepared and maintained as a collection of information by a person, group, or organization.
i. Web site ii. Web Browser iii. Web server iv. None of above
114. A technology that allows the creation of collaborative web sites.
i. Wiki ii. E-Mail iii. Search Engine iv. All of above
Computer Security
115. The term computer security refers to:
Use of antivirus Protection of software
Protection to a computer system Use of firewall
116. Common computer security is
Hardware Security Software security
Hardware & software security None of them
117. _______ protect the machine and peripheral hardware from theft, electronic intrusion and damage.
i) Information security ii) Hardware security iii) Software security iv) None of the above
118. Some of the methods of hardware protection are:
i) Fire Alarms ii) Security Lighting iii) Closed-circuit cameras iv) All of above
119. Some of the methods of hardware protection are:
i. Password security ii. Security lighting iii. Scandisk iv. All of the above
120. Which of the following is not hardware security method?
i. Insurance ii. Maintenance iii. Closed-circuit cameras iv. Hard lock key
121. Hardware security includes
Regular maintenance Use of power of regulator devices Both None of them
122. Which is not the power protection device?
UPS Spike Guard Volt Guard Scan disk
123. Which of the following is not power supply device?
i. Volt guard ii.UPS iii. Constant Voltage Transformer iv. Power Plug
124. A device that protects your PC against power surges and spikes.
i) UPS ii) Voltage Regulator iii) Surge suppressor iv) All of the above
125. An electrical regulator designed to automatically maintain a constant voltage level.
i.UPS ii. Voltage regulator iii. Surge processor iv. All of the above
126. UPS is a
Voltage filtration device Voltage processing device Voltage regulator device None
127. ……….. is a device that allows your computer to keep running for at least a short time when the primary power source is lost.
i.UPS ii. Voltage regulator iii. Surge processor iv. All of the above
128. To prevent the loss of data during power failures, we use:
Encryption program Surge protector Firewall UPS
129. Which device protects hardware? [SLC 2068]
i) UPS ii) MODEM iii) Gateway iv) All of the above
130. The temperature in computer system should be maintained between ______to________
i)21`C to 24`C ii) 20`C to 25`C iii) 23`C to 28`C iv) None of the above
131. The temperature in the computer system should be maintained between ………. and ……….
i. 68 to 72 degree Fahrenheit ii.88 to 78 degree Fahrenheit
iii.68 to 27 degree Fahrenheit iv. All
132.
133. The type of security that provides barriers and other cyber –tools that protect programs, files
and the information flow to and from a computer.
i) Computer security ii) Hardware security iii) Software security iv) None of the above
134. Which of the following is not software security measure?
i. Virus Scanning ii. Scandisk iii. Password iv. Security Guard
135. Data and software security includes
Protection from computer virus Cover the computer property Both None of them
136. An important counter measure against data corruption or loss.
Password policy Defragmentation Scan disk Backup system
137. Which of the following measure allows to protect computers being opened from unauthorized user?
i. Antivirus program ii. Password iii. Debug iv. program
138. Scan disk is used for
Removing virus Removing bad clusters Backup data All of above
139. Scan disk is performed by using
Application software Operating system software Utility software None
140. Backup is way of
i. Securing data and information Securing internal part of the computer
ii. Securing external parts of the computer None of them
141. refers to the condition of a disk in which files are divided into pieces scattered around the disk.
i. Fragmentation ii. Defragmentation iii. Scan disk iv. All of the above
142. Process of arranging the scattered parts of file into a contiguous manner. [SLC 2068 S] [SLC 2071] [SLC 2074]
i) Backup ii) Defragmentation iii) Debugging iv) All of the above
143. The process of loading the noncontiguous fragments of data, rearranging the fragments and restoring them into fewer fragments or into the whole life.
i)Fragmentation ii) Defragmentation iii) Scan disk
144. Defragmentation is a process of
Formatting the disk Relocation of the disk
Relocation of the files of the disk None of them
Computer Virus
145. Computer virus is___________software.
i. Malware ii. Utility iii. Application iv. Operating System
146. Computer virus is ………. [SLC 2068 S]
i) dust particle ii) computer programs iii) useful program iv) none of the above
147. Virus is a [SLC 2071]
i. Utility program ii. Destructive program iii. System program iv. None
148. Computer virus can
i. Hide in a host file ii. Replicate iii. Spread iv. All of the above.
149. Computer virus can destroy
i. Hardware ii. Software iii. Data iv. All
150. Which is not a virus? [SLC 2064]
i. Worm ii. Logic bomb iii. Trojan Horse iv. Win-zip
151. Which one is not a type of virus? [SLC 2067 S] [SLC 2070]
i) Message Carrying virus ii) Boot sector virus
iii)System virus iv)Special Purpose Application Infector
152. Route of virus transmission. [SLC 2065]
Mouse Printer Microphone Pen drive
153. What is the route of virus transmission? [SLC 2070 S]
i. Monitor ii. Flash drive iii. Mouse iv. Cable
154. Computer virus can spread from one computer to another through_
i. Infected portable disk ii. The Internet iii. Pirated software iv. All of the above.
155. A program or set of programs designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, Trojans, adware and more.
i)Shareware ii)Freeware ii)Antivirus
156. Which of the following is not anti-virus
i.AVG ii.NAV iii, Kaspersky iv. I Love you
157. Which of the following is an anti-virus program? [SLC 2068 S]
i) NAV ii) Windows iii) Photoshop iv) All of the above
158. An example of antivirus software is
i. NAV ii. McAfee iii. CPAV iv. All
159. Which is antivirus software?
i. Scan ii. Defrag iii. Kaspersky iv. Power point
160. Norton antivirus, when loaded onto a computer system , checks the following areas for viruses
boot record programs at the time you use them both
161. ________ Virus are often transmitted by a floppy disk left in the floppy disk drive.
Boot-sector Trojan horse Script logic bomb
162. Which computer virus damages the master boot record? [SLC 2068]
i) Macro virus ii) File virus iii) New folder virus iv) Boot sector virus
163. Which virus infects boot sector files? [SLC 2069]
i) Macro virus ii) Multipartite virus iii) Boot sector virus iv) Program virus
164. Boot sector virus infects [SLC 2066]
i. System files ii. Master boot record iii. Application software iv. Document file
165. Disk Killer, stoned and Michelangelo are examples of ________________
i) Boot sector virus ii) File infecting virus
iii) Polymorphic virus iv) All of the above
166. A virus that infects the part of the computer called a system sector.
i. Boot sector virus ii. File infecting Virus iii. Polymorphic virus iv. None of the above
167. Which of the following virus infects the various parts of operating system?
i. boot sector ii. Worm iii. Macro iv. system infector
168. A type of virus that infects executable files having .exe, .com, .ovl, .drv, .sys, or .dil.
i) Boot sector virus ii) File infecting iii) Script virus iv) Macro virus
169. __________ Virus can infect both programs and boot sectors.
Stealth virus File infectors Multipartite virus Polymorphic virus
170. Multipartite viruses have combination features of
i. Boot sector & stealth virus ii. Boot sector ¯o virus
iii. Boot sector & program virus iv. None
171. Viruses attach themselves to documents such as Word and Excel.
Macro virus File infectors Polymorphic virus
172. A type of virus that replaces a macro , which is what enables a program to work and instigates a designated group of actions and commands.
i)Macro virus ii)File infecting virus iii)Polymorphic virus
173. A virus that can change its appearance with every infection is called_____________
i) Boot virus ii) Micro virus iii) Script virus iv) None of them
174. is a self-encrypted virus designed to avoid detection by a scanner.
i. Polymorphic virus ii. Macro virus iii. Script virus iv. None of the above
Multimedia and Its Application
175. A computer-derived electronic system that allows the user to control, combine, and manipulate different types different types of media, such as text, sound, video, computer graphics and animation.
Monomedia Multimedia Hypermedia None of the above
176. In order to work with multimedia a personal computer typically requires the following hardware components.
i)Faster CPU ii)Large main memory iii)All of above iv)None of above
177. In order to work with multimedia, a personal computer typically requires the following hardware components.
Power microprocessor Huge main memory Compact disk All of them
178. Which of the following media are used in Multimedia system?
i. Text-audio ii. Text-visual iii. Text, graphic, audio and visual iv. Text, graphic and sound
179. The types of media used in multimedia includes
i. Text Graphics Sound All of them
180. A MUK consists of the
i. CD-ROM Drive Sound Card Speaker All of them
181. Which of the following are components of multimedia?
i. Computer ii. Software iii. Projector iv. All of above
182. Which of the following is main component of multimedia? [SLC 2065]
i. Floppy disk ii. Floppy drive iii. Sound card iv. Magnetic tape
183. Which of the following is the component of multimedia? [SLC 2069 S]
i) Network ii) Microphone iii) Power cable iv) Printer
184. Select the common components of the multimedia computer system.
i. Floppy Floppy drive CD-ROM None
185. Which is not related to multimedia? [SLC 2069]
i) Printer ii) Sound card iii) Microphone iv) CD-ROM
186. Which of the following is an audio output device? [SLC 2070]
i) Microphone ii) Speaker iii) Monitor iv) Printer
187. Which of the following is an audio input device? [SLC 2071]
i. Printer ii. Microphone iii. Head phone iv. Speaker
188. Which of these software is used for photo editing? [SLC 2074]
(i) Ms-Excel (ii) Photoshop (iii) Power-Point (iv) Ms-Word
189. Which one is the software used in multimedia?
CD-ROM Sound Card Sound Forge MS-Word
190. Software used in multimedia system.
Photoshop Flash Maya All of them
191. The software associated with the multimedia technology is .
i. Macromedia Flash ii. Microsoft Word. iii. Adobe In design iv. None of the above
192. Software associated with the multimedia technology is
Windows XP Macromedia Flash QBASIC None
193. Which of the following is software used in multimedia technology.
i. Office XP ii. Adobe Photoshop iii. Basic iv. None of the above
194. Which of the following is not multimedia software?
i. Windows media player ii. Windows XP iii. Adobe illustrator iv. Macromedia flash
195. Which of the following is multimedia application?
i. Education ii. Entertainment iii. virtual reality iv. All of above
196. Multimedia technology is very effective in
i. Market Classroom War None
197. Multimedia technology is used in ……… [SLC 2066]
i) Education ii) Business iii) Health care iv) All of the above
198. An artificial reality that projects the user into a 3D space generated by the computer.
Virtual Reality Virtual Computer All of the above None of the above
199. An upcoming technology that makes users feel in Virtual Environment(VE) by using computer hardware and software.
i)Virtual space ii)Virtual computer iii)Virtual reality iv)None of above
200. _____ deals with the recording and display sequence of images at a reasonable speed to create an impression of movement.
Graphics Video Animation Text
201. Graphics that contain movement often referred to as .
i. Graphics ii. Video iii. Animation iv. Text
202. _______ provides a visual impact.
Image Graphics Video None of them
203. The process of displaying still images in a rapid sequence to create the illusion of movement.
i)Text ii)Graphics iii)Video iv)Animation
204. An extension to hypertext supports linking graphics, sound and video elements in addition to text elements.
Interactive media Hypermedia All of the above None of the above
Cyber Law and Computer Ethics
205. A genetic term that is concerned to the legal and regulatory aspects of Internet and computer technology.
Copyright law Cyber law Computer Crime None of them
206. “The Electronic Transaction and Digital Signature Act-Ordinance” is Known as:
i. Intellectual Property Law Cyber Law
ii. Telecommunication Law Data Protection Law
207. When did cyber law introduced in Nepal?
i.2002 A.D. ii.2003 A.D. iii.2004 A.D. iv.2005 A.D.
208. When did cyber law introduced in Nepal? [SLC 2066] [SLC 2070 S]
i) 2061 B.S. ii) 2062 B.S. iii) 2007 B.S. iv) 2016 B.S.
209. The government of Nepal has passed the cyber law on:
31st Bhadra 2061 BS 29th Bhadra 2061 BS 30thBhadra 2062 BS 30thBhadra 2061 BS
210. The term ‘cyberspace’ was used in:
1984 1884 1985 1885
211. A criminal activity within the information technology infrastructure.
Digital crime Intellectual property Cybercrime All of them
212. Which of the following is computer crime?
i. piracy ii. pornography iii. harassment iv.All of above
213. Which of the following is not computer crime?
i. Plagiarism ii. Password guessing iii. Internet iv. virus transferring
214. _______ is the normal Principal that regulates the use of computers.
Cyber Law Cyber act Computer ethics All of them
215. Which of the following is not computer ethics?
Not to steal data Not to bear false message Not to use Internet Not to harm the society
216. Premeditated, usually politically-motivated violence committed against civilians through the use of, or with the help of, computer technology
i) Cyber stalking ii) Cyber laundering iii) Cyber theft iv) Cyber terrorism
217. The act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trust worthy source.
i) Hacking ii) Phishing iii) Computer Virus iv) Cyber stalking
218. Electronic transfer of illegally-obtained monies with the goal of hiding its source and possibly its destination.
i)Cyber stalking ii) Cyber laundering iii) Cyber theft iv) Cyber terrorism
219. The method of making the data or message unreadable by unauthorized people.
Digital signature Decryption Encryption All of them
220. Which of the following is included in cyber law?
i. Trademark right ii. Copyright iii. Data privacy iv. All of the above
221. The law which includes literature and art, films, computer programs, invention, designed used by traders for their goods or services is called:
i. Data Privacy Law Intellectual Property Law
ii. Telecommunication Law Cyber crime Law
222. The Process of ensuring the preservation, integrity and reliability of data is Known as:
i. Intellectual Property Law Data Protection and Privacy law
ii. Cyber Law Telecommunication Law
223. The law that provides a legal framework to facilitate and safeguard electronic transaction in the electronic medium.
i. Digital signature law ii. Intellectual property law ii. Telecommunication law
224. A federal law enacted in 1970 to ensure confidentiality of consumer credit information held by lenders and credit reporting agencies.
i. Fair credit reporting act ii.Federal privacy act iii.Copyright act
Database Management System
225. Database is a
i.tool of editing documents ii. way to automate common tasks
iii. collection of related information
226. A (n) ____________________ is an organized collection of the related information.
Object database Property document
227. Which is the database?
Data of SLC Exam Oracle MS-Access Excel
228. Which is not the database?
i. Phone diary ii. Mark ledger iii. Attendance Register iv. Report Card
229. Which is the example of Relational Database Management System?
i.Oracle ii.FoxBASE iii.Sybase iv.FoxPro
230. __________ is a Database Management System.
DBase MSAV EXCEL All of above
231. MS-Access is a
DBMS RDBMS Database Metabase
232. MS-Access is used to create _____________.
Database DBMS Record Table
233. ___________ is not DBMS.
Oracle dBase FoxPro Paint
234. Which is an example of database? [SLC 2064]
DBase MS-Access Telephone Directory All
235. …………… is the DBMS. [SLC 2065]
i) Fox-Pro ii) MS-Excel iii) Lotus-123 iv) All of the above
236. Which of the following is database application? [SLC 2070]
i) MS-Word ii) MS-Access iii) MS-Excel iv) QBASIC
237. Which of the following is not a database application? [SLC 2069]
i) Oracle ii) Foxpro iii) MS-Access iv) MS-Excel
238. MS-Access is a software.
i. Utility ii. Application iii. System iv. None of the above.
239. Which is DBMS?
i. Database ii. Metabase iii. dBase iv. MS-Excel.
240. A Database Management System can be used to .
i. retrieve information ii. search information iii. sort information iv. all of the above
241. ___________________ is a set of rules used by Access to ensure that the relationships between tables are valid and that the related data is not accidentally changed or deleted.
Relationship Referential integrity Query Forms
242. What is extension of access database? (MS-Access 2003 version) [SLC 2066]
DBF MDB MBD DBM
243. _____ is the table design creating option to create custom table design.
Datasheet Design view Wizard Link Table
244. _____ is a data type used for lengthy text and numbers
Text Long Text OLE Object Memo
245. A field name can be up to _____ characters long.
40 46 64 2048
246. Data type that requires 8 bytes of storage.
Yes/No Currency Long Integer All of them
247. Memory space consumed by a currency data type maximally is …………[SLC 2069]
i) 2 bytes ii) 4 bytes iii) 8 bytes iv) 1 GB
248. The data type appropriate to store salary is: [SLC 2067]
i)Memo ii)Currency iii)Text iv) Auto number
249. The name of caption can be declared up to _____ characters.
1024 2024 2048 2005
250. Memory space used by a auto number data type is _____
1 Byte 2 Bytes 4 Bytes 8 Bytes
251. What is the default size of Access?
(i) 10 (ii) 20 (iii) 30 (iv) 50
252. Date/Time occupies ………. bytes of memory. [SLC 2066] [SLC 2067]
i) 4 ii) 2 iii) 8 iv) 16
253. The maximum size of text field in MS-Access is …………. [SLC 2068 S] [SLC 2070]
i) 50 ii) 10 iii) 6400 iv) 255
254. Format symbol that converts all characters to uppercase.
@ & < >
255. …………… is not the data type of MS-Access. [SLC 2065] [SLC 2068]
i) Number ii) Text iii) Memo iv) Form
256. The logical field data type of MS-Access is______________ [SLC 2064]
i. Yes/No ii. True/False iii. On/Off iv. All of the above.
257. The field size of logical field data type is __________ in MS-Access.
i. 1 bit ii. 1 byte iii. 2 bytes iv. 2 bits
258. Which data type consumes the least storage space? [SLC 2074]
(i) Text (ii) Yes/No (iii) OLE object (iv) Memo
259. Which of the following data type is appropriate to store gender of person in terms M or F?
i. Memo ii. Currency iii. Yes no iv. Auto number
260. The default data type of MS-Access is: [SLC 2068 S] [SLC 2069] [SLC 2074]
i) Number ii)Text iii) Memo iv) Auto number
261. The default field size of “AutoNumber” data type is .
i. Byte ii. Integer iii. Long Integer iv. Long Integer
262. Which is the subtypes for the number data type?
Hyperlink Bit Index Integer
263. Which is the subtype of number data type?
i. Integer ii. Byte iii. Single iv. All of the above.
264. Number field is used for storing only _______________.
Number Text and Number Number and Time Number and Year
265. The datatype which is used for only integer value.
i.text ii.currency iii.number iv.OLE
266. Which of them is not a data type?
Memo Yes/No Time/Date Caption
267. Which of the following is not a data type?
i. Picture ii.date/time iii.text iv.number
268. Which of the following is not the data type used in MS-Access?
i. Date/Time ii. Counter iii. Hyperlink iv. Caption
269. Which of the following is not a data type in Microsoft Access?
i. Text ii. Currency iii. Hypertext iv. Date/Time
270. What field type is used to store picture in a table?
i.memo ii.OLE iii.hyperlink iv.None
271. Which is suitable data type to store video? [SLC 2070] [SLC 2073]
i) Text ii) Number iii) Hyperlink iv) OLE object
272. The data type appropriate to store address is .
i. Memo ii. Currency iii. Text iv. Auto number
273. What kind of data is kept in memo field?
(i) Hyperlink (ii) Software (iii) Data (iv) Pictures
274. What kind of data are kept in memo field?
i.Name of Student ii.Students phone number iii.Students Bio data iv.Students picture
275. Which specifies the expression that checks the invalid data?
Validation Rule Validation Text Input Mask Required
276. _____ is not a field property of MS-Access.
Caption Index Color Format
277. …………… defines a standard pattern for the appearance of all data entered in the field
i.format ii.input mask iii.default value
278. A field property that limits the data to be entered in a field is___________
i. Validation Rule ii. Format iii. Input Mask iv. Indexed
279. The maximum number of characters that can be stored in a field is determined by_
i. Field Type ii. Field Size iii. Field Length iv. Field width
280. Field size, format, input mask, caption and default values are:
Key elements field properties Navigating modes data types
281. The primary key contains _____ value.
Null No Null Number Auto number
282. The _________________ key uniquely identifies each record. [SLC 2066]
Primary database Object premier
283. Primary key does not accept …………… [SLC 2064] [SLC 2065] [SLC 2068] [SLC 2074]
i) Text ii) Number iii) Null value iv) None of the above
284. In MS-Access data are stored in ……………… [SLC 2068]
i) Form ii) Query iii) Table iv) All of the above
285. Form is designed for
i. filters data ii. Sort data iii. Print data iv. Modify data
286. Which component of MS-Access is used to enter data? [SLC 2065]
Query Forms Report Both (i) and (ii)
287. Which component of MS-ACCESS does not allow entering data? [SLC 2064]
i. Table ii. Query iii. Form iv. None of them
288. Query is used to
i. retrieves data from database ii. Create table in database iii. Print database iv. All
289. …………….. query changes value in main table. [SLC 2068 S]
i) Select ii) Update iii) Both (i) &(ii) iv) None of the above
290. Which is not a type of query? [SLC 2067] [SLC 2073]
i) Search ii) Select iii) Update iv)All of the above
291. Report can be generated by using data from …………[SLC 2068 S]
i) Table ii) Query iii) Forms iv) Both (i) &(ii)
292. ……………….. object of access is used to print formatted data. [SLC 2068] [SLC 2073]
i) Query ii) Form iii) Report iv) Table
293. The object of MS-Access that is used to generate hard copy of records. [SLC 2066]
i) Query ii) Table iii) Form iv) Report
294. __________allows MS-Access to query and sort record faster.
i. Sorting ii. Editing iii. Filtering iv. Indexing
295. Which of the following is not MS-Access database object?
i. Table ii. Form iii. Query iv. Print
296. A collection of records for a single subject, such as all of the customer records.
i. Field ii. Record iii. Table iv. Data
297. Collecting multiple related fields is called: [SLC 2067]
i)Records ii)Table iii) Forms iv)Query
298. A field is also known as
i.records ii.column iii.Database iv.entity
299. Row is also called …………[SLC 2069] [SLC 2074]
i) Record ii) Field iii) Database iv) Table
300. The columns in database tables are called: [SLC 2070] [SLC 2073]
i) Record ii) Field iii) Report iv) Memo
Tìm hiểu thêm những dịch vụ mà chuyenhangvevietnam.com đang cung cấp tới quý khách hàng sau đây:
ReplyDelete- đơn vị cho thuê xe tải 500kg giá rẻ
- vận chuyển hàng hóa bắc nam bằng container
- vận chuyển ô tô bắc nam giá rẻ
- cho thuê xe tải tự lái theo tháng
- đơn vị cung cấp dịch vụ chuyển phát nhanh tại tphcm
- bốc xếp giá rẻ tại tphcm
- dịch vụ giao hàng tận nơi
- dịch vụ cho thuê kho
- ship cod toàn quốc giá rẻ
Nếu có nhu cầu sử dụng dịch vụ của chúng tôi, vui lòng liên hệ hotline 093 9999 247 để được tư vấn miến phí kĩ hơn.