Free online test to practice
for LIS Competitive exams. Learn and Practice online test for Free and Prepare
for your exam online with many free tests and study materials with answers and
explanation.
261. An
unsolicited e-mail message sent to many recipient at once is a
(A) Worm
(B) Virus
(C) Threat
(D) Spam
262. The
statement “the study, design, development, implementation, support or
management of computer-based information systems, particularly software
applications and computer Hardware” refers to
(A)
Information Technology (IT)
(B)
Information and Collaborative Technology (ICT)
(C)
Information and Data Technology (IDT)
(D)
Artificial Intelligence (AI)
263. If the
binary equivalent of the decimal number 48 is 110000, then the binary
equivalent of the decimal number 51 is given by
(A) 110011
(B) 110010
(C) 110001
(D) 110100
264. The
process of copying files to a CD-ROM is known as
(A) Burning
(B) Zipping
(C)
Digitizing
(D) Ripping
265. Which of
the following statements regarding the features of Information and
Communication Technology (ICT) is/are true?
I. ICT are
the main instruments for the creation of computer networks and the applications
based on them.
II. ICT
support the spread of information and knowledge, separating the content from
the place where it belongs physically.
III. The
digital and virtual nature of most of ICT products allow the expenditure for
them to be maximized.
Codes:
(A) I and
II only
(B) I and
III only
(C) II and
III only
(D) I, II
and III
266. If one
GigaByte is equal to 230Bytes
of data storage, then 1024 TeraBytes is equal to .............. bits of data
storage.
(A) 250
(B) 253
(C) 240
(D) 256
267. The
software used to navigate through the web is known as
(A) Website
(B) Web
Browser
(C)
Internet
(D) World
Wide Web
268. With
regard to e-mail, what does Bcc : mean ?
(A) Blind
Computer Communication : - The users specified in the Bcc : field will get the
e-mail and see the addresses in the to : and cc : fields.
(B) Blind
Carbon Copy : - The users specified in the Bcc : field will get the e-mail and
see the addresses in the to : and cc : fields.
(C) Blind
Computer Communication :- The users specified in the Bcc : field will get the
e-mail but it will be an audio file because this is how blind people get
e-mail.
(D) Blind
Carbon Copy : The users specified in the Bcc : field will get the e-mail but
will not see the addresses in the to : and cc : fields.
269. Random
Access Memory (RAM), a form of computer storage, is a ............. memory.
(A)
Non-volatile
(B)
Volatile
(C)
Permanent
(D)
Secondary
270. In
Computer Networking, HTTP is referred to as a stateless protocol as servers do
not maintain any information about past client requests. HTTP is an acronym for
0 Comments