New ! Computer Applications MCQ Practise Tests



11th Standard English Medium Computer Applications Subject Book Back 1 Mark Questions with Solution Part - I

11th Standard

    Reg.No. :
  •  
  •  
  •  
  •  
  •  
  •  

Computer Applications

Time : 01:00:00 Hrs
Total Marks : 25

    1 Marks

    25 x 1 = 25
  1. Name the volatile memory _____

    (a)

    ROM

    (b)

    PROM

    (c)

    RAM

    (d)

    EPROM

  2. Identify the input device _____

    (a)

    Printer

    (b)

    Mouse

    (c)

    Plotter

    (d)

    Projector

  3. Which one of the following is used to in ATM machines

    (a)

    Touch Screen

    (b)

    Speaker

    (c)

    Monitor

    (d)

    Printer

  4. Expand POST

    (a)

    Post on Self Test

    (b)

    Power on Software Test

    (c)

    Power on Self Test

    (d)

    Power on Self Text

  5. Which of the following device identifies the location when address is placed in the memory address register?

    (a)

    locator

    (b)

    encoder

    (c)

    decoder

    (d)

    multiplexed

  6. Under which of the following OS, the option Shift + Delete - permanently deletes a file or folder?

    (a)

    Windows 7

    (b)

    MS - DOS

    (c)

    Linux

    (d)

    Android OS

  7. Which button selects all instances of the search text in the document?

    (a)

    Find

    (b)

    Find All

    (c)

    Replace

    (d)

    Replace All

  8. Which menu contains the Slide Transition option?

    (a)

    Slide Show

    (b)

    View

    (c)

    Tools

    (d)

    Format

  9. In presentation tools, the entry effect as one slide replaces another slide in a slideshow. Identity the option that suits after reading the statement.

    (a)

    Animation

    (b)

    Slide Transition

    (c)

    Custom animation

    (d)

    Rehearse Timing

  10. Expansion of W3C

    (a)

    World Wide Web Consortium

    (b)

    Wide World Web Consortium

    (c)

    World Web Wide Consortium

    (d)

    World Wide Web Consortum

  11. Hotspot uses which type of network services?

    (a)

    LAN

    (b)

    PAN

    (c)

    WLAN

    (d)

    CAN

  12. Which of the following symbol is used to define a closing tag?

    (a)

    < >

    (b)

    %

    (c)

    /

    (d)

    \

  13. The tag used to insert a line break:

    (a)

    < h1 >

    (b)

    < br >

    (c)

    < html >

    (d)

    < p >

  14. Which image format was standardized by W3C?

    (a)

    JPEG

    (b)

    SVG

    (c)

    GIF

    (d)

    PNG

  15. Which value causes the audio play as long as the page is in view?

    (a)

    Stop

    (b)

    Never Stop

    (c)

    Continue

    (d)

    Infinite

  16. Inline sound can be inserted using which of the following tag?

    (a)

    < inline >

    (b)

    < backgroundsound >

    (c)

    < bgsound >

    (d)

    < sound >

  17. The declaration should be terminated by

    (a)

    (:)

    (b)

    (;)

    (c)

    (.)

    (d)

    (,)

  18. Which of the following indicates that the text included is a comment?

    (a)

    /* */

    (b)

    !* *!

    (c)

    < * * >

    (d)

    \* *\

  19. Expand DHTML

    (a)

    Distance Hyper Text Markup language

    (b)

    Dynamic Hyper Text Markup language

    (c)

    Distance High Text Markup language

    (d)

    Dynamic High Text Markup language

  20. Which attribute is used to indicate the scripting language and its value should be sent to " Text/JavaScript".

    (a)

    Language

    (b)

    Text 1

    (c)

    Type

    (d)

    Body

  21. Which conditional statement is used to transfer control from current statement to another statement?

    (a)

    Branching

    (b)

    Sequencing

    (c)

    Looping

    (d)

    Interating

  22. What will be the output for the following snippet:
    For (var n=0; n < 10; n+1)
    {
    if (n==3)
    {
    break;
    }
    document write (n+"< br >");
    }

    (a)

    0 1 2

    (b)

    0 1 2 3

    (c)

    0 1 2 3 4

    (d)

    0, 1, 3

  23. Which of the following deals with procedures, practices, and values?

    (a)

    piracy

    (b)

    programs

    (c)

    virus

    (d)

    computer ethics

  24. The process of converting cipher text to plain text is called

    (a)

    Encryption

    (b)

    Decryption

    (c)

    key

    (d)

    proxy server

  25. Distributing unwanted e-mail to others is called

    (a)

    scam

    (b)

    spam

    (c)

    fraud

    (d)

    spoofing

*****************************************

Reviews & Comments about 11th Standard English Medium Computer Applications Subject Book Back 1 Mark Questions with Solution Part - I

Write your Comment