With each visit, the list of questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1. Which of the following is a common method to secure personal data and protect online privacy?
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2. Which key combination is commonly used to minimize all open windows and show the desktop?
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.Software required to run the hardware is known as
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4. Which software is commonly used for designing business reports and proposals with text and graphics?
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5. What is a pipeline in CPU design?
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.In which form the data is stored in CD/DVD?
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7. When cleaning a computer monitor screen, what should you avoid using to prevent damage?
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8. Which of the following is NOT a commonly used email attachment file format?
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9. What is the term for the act of using copyrighted material without proper attribution or permission, presenting it as one's own work?
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10. What should you do to create strong, unique passwords for your online accounts?
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11. Which of the following is NOT a common authentication factor used in multi-factor authentication (MFA)?
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12. In a GUI, what does the "taskbar" typically contain?
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13. Which input device is often used in music production for controlling virtual instruments?
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.Reusable optical storage will typically have the acronym-
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15. Which programming language is known for its use in developing machine learning and artificial intelligence applications?
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16. What is the primary function of an optical character recognition (OCR) device?
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17. What does the term "edge computing" refer to in the context of IoT?
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.C language were used in________generation of computers
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19. What is the term for the feeling of being physically present in a VR environment, despite being physically located elsewhere?
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.Office LANS, which are scattered geographically on large scale, can be connected by the use
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21. What is the term for the act of pretending to be someone else online for malicious purposes?
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.The CPU and memory are located on the :
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23. What does GUI stand for?
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24. What is the primary goal of artificial intelligence (AI)?
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25. What is the term for the practice of using IoT sensors to monitor and optimize the use of energy in manufacturing facilities?
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26. Which LAN technology allows data to be transmitted over coaxial cables with a central bus or trunk line?
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27. What is the term for the ability of IoT devices to communicate and interact with each other without human intervention?
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28. What is "motion tracking" used for in video editing?
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29. What is the purpose of RAM in a computer system?
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30. Which network technology is commonly used for connecting devices within a personal workspace, such as a laptop and a wireless mouse?
Your Answer:Correct
Your Answer:Incorrect