1. Soft copy of a document has the characteristics that it can be:
(a) touched
(b) viewed only
(c) touched and viewed
(d) All of the above
(e) None of the above
2. What is the meaning of ‘justified text’?
(a) the text headings are all in the same style
(b) all four margins on the page are the same size
(c) the text is the maximum size that will fit on a page
(d) the text aligns with both the right and left margins
(e) None of these
3. To identify the document, it is helpful to include the file name on each page as a
(a) bibliography
(b) header/footer
(c) find/search
(d) macro
(e) None of these
4. Which of the following allows wireless mobile devices to access the Internet and its services such as the Web and e-mail etc?
(a) TCP/IP
(b) WAP
(c) Ethernet
(d) WiFi
(e) None of these
5. A passive threat to computer security is
(a) Malicious Intent
(b) Espionage Agents
(c) Accident Errors
(d) Sabotage
(e) None of these
6. The browser’s ________ keeps a list of web pages you have visited during the current session.
(a) history
(b) cache
(c) favorites
(d) trail
(e) None of these
7. Which application is not typically included in an MS Office suite?
(a) word processor
(b) spreadsheet
(c) antivirus
(d) database
(e) None of these
8. Which device can not be shared in network?
(a) Floppy
(b) Computer
(c) Mouse
(d) Printer
(e) None of these
9. Bold, italics and underline are features used in many, programs. To which of the following items can these features be applied?
(a) files
(b) pictures
(c) text
(d) windows
(e) None of these
10. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is
(a) Bridge
(b) Modem
(c) Router
(d) Gateway
(e) None of these
1.(b), 2.(d), 3.(b), 4.(b), 5.(a), 6.(a), 7.(c), 8(c), 9.(c), 10.(d)