Rehearsal
Custom slide show
Slide show setup
Slide show view
Performance
Reliability
Security
None of the above
Polymorphism
Virtualization
Abstraction
None of the mentioned
Ctrl+F10
Ctrl+F11
Ctrl+F12
None of these
Full Screen
Half Screen
In a Window
Loop and Repeat
$
@
=
None of These
To provide power to the computer
To store data
To connect to a network
To increase processing speed
Impact printers
Laser printers
Non-impact printers
Optical printers
Ctrl + ;
Ctrl + Shift + :
A and B both
None
Application Software
System software
Utility program
To improve the graphical rendering capabilities of the system.
To provide high-speed data storage and faster read/write performance.
To enhance network connectivity and internet speed.
To act as a backup power source during outages.
Ctrl + Shift + ;
Ctrl + T
Spell check it
Review it
Verify and validate it
Organise and simplify it
ALU
RAM
CU
BU
Edited
Shown
Deleted
All the above
File
Edit
Format
View
Application software
Database software
Antivirus software
The number of users
The type of transmission medium
The frequency of failure
Unauthorized access
Match the OSI Model Layers with Their Correct Functions
1 → A, 2 → F, 3 → C, 4 → E
1 → B, 2 → E, 3 → D, 4 → C
1 → C, 2 → D, 3 → A, 4 → B
1 → D, 2 → C, 3 → B, 4 → F
Ctrl + F6
Ctrl + H
Ctrl + F8
Ctrl + F1
Insert
Slide
Slide Show
view
Ctrl + R
Shift + R
Ctrl + Shift + R
General User Interface
Graphical User Interface
Global User Interface
Guided User Interaction
Read / Write Memory
Long Memory
Permanent Memory
Real Memory
Window key + PrtScr
Window key + L
Window key + D
Window key + M
Github
Duckduckgo
Chrome
Infrared
NFC (Near Field Communication)
Wi-Fi Direct
RFID
Bus token
Ethernet
Token Ring
P2P
Common Server
Place to Place
CDMA/CD
Peer to Peer
Farmers
Hunters
Students
Pensioners
Ctrl + Shift + B
Ctrl + Shift + P
Ctrl + Shift + +
a computer program that draws picture
a picture stored in secondary memory
the smallest resolvable part of a picture
Match the Transmission Media Types with Their Characteristics
1 → F, 2 → E, 3 → D, 4 → C
1 → D, 2 → C, 3 → B, 4 → A
Software
Web Servers
Web Browsers
WWW
Electrically Erasable Programmable Read Of Memory
Erasable Electrically Programmable Read Only Memory
Easily Erasable Programmable Read Only Memory
Electrically Erasable Programmable Read Only Memory
Inbox
Outbox
Sent Box
Receive box
Cyber attack
Computer security
Cryptography
Digital hacking
Abacus
Clock
calculator
None of these.
Arrange the following computer technologies in the correct order from first generation to fifth generation:
1️⃣ Transistors
2️⃣ Vacuum Tubes
3️⃣ Artificial Intelligence (AI) & Quantum Computing
4️⃣ Microprocessors
5️⃣ Integrated Circuits (ICs)
2 → 1 → 5 → 4 → 3
1 → 2 → 4 → 5 → 3
5 → 4 → 3 → 2 → 1
2 → 4 → 1 → 5 → 3
Packet switching
Telex switching
Circuit switching
Telephone switching
Internal commands.
External commands.
Utility Programs.
Bootloader
Mouse
Digitizer
Joystick
Light pen
Bits
Bytes
Hertz (Hz)
Cycles
Match the file extensions with their file types.
1 → B, 2 → A, 3 → C, 4 → D
1 → C, 2 → D, 3 → B, 4 → A
1 → D, 2 → C, 3 → A, 4 → B
1 → A, 2 → D, 3 → E, 4 → C
RING
BUS
STAR
OpenDocument
Microsoft Excel
PDF
Ignorance
Trojan horses
Adware
Crackers
Software as a Server
Server as a Service
Software as a Service
Server as a Software
F5
F8
F3
F2
CD
DVD
HDD
Blu-ray disk