Sie sind auf Seite 1von 22

Exam aid Computer

Exam Aid Computer: Model Test-1


1. In general, ‘My document’ is located at? Ans.
a) A drive b) B drive
c) C drive d) D drive
2. The “add or remove programs” utility can be found in-
a) My document b) Desktop Ans.
c) System restores d) Control panel
3. RAM in computer stands for-
a) Revised Access Memory b) Running Applied Memory Ans.
c) Random Access Memory d) Random Applied memory
4. What is the meaning of e-mail? Ans.
a) emergency mail b) electronic mail
c) electronical mail d) express mail
5. Which of the following is a valid ending for a word file?
a) .xls b) .wmv Ans.
c) .mac d) .doc
6. With regards to e-mail addresses:
a) They must always contain an $ symbol Ans.
b) they can never contain spaces
c) they are case-insensitive
d) they must always contain an @ symbol
Ans.
7. One Megabyte is equal to
6 2
a) 10 bytes b) 10 bytes
c) 1010 bytes d) 105 bytes
8. The brain of a computer is Ans.
a) Memory b) Hardware
c) Software d) Microprocessor (CPU)
9. Which number system is used to store data in a computer?
a) Decimal b) Binary Ans.
c) Octal d) Hexadecimal
10. Which of the following is a keyboard command to copy some text in
MS Word?
a) Shift + Copy b) Ctrl + C Ans.
c) Alt + G d) Shift + C
11. Which of the following is an example of optical storage device?
a) CD ROM b) Hard Disk
c) RAM d) CPU Ans.
12. েকােনা ে�া�ােমর ভুল েবর করােক িক বেল?
a) এরিরং b) কােরি�ং Ans.
c) ময্ােনিজং d) িডবািগং

707 | P a g e
Exam aid Computer: Model Test
13. Common keyboard arrangement is called?
a) QWETRY b) QWRETY Ans.
c) QWRTEY d) QWERTY
14. Which types of interface allow connect, control musical instruments
to computer?
Ans.
a) MIDI b) DIMI
c) DIIM d) MDII
15. Every web page has a unique address called:
Ans.
a) http b) Uniform Resource Locator
c) Hypertext d) Hyperlink
16. Which one is an application package? Ans.
a) DOS b) LOTUS
c) LUNUX d) UBUNTU
17 URL means -
a) Uniform Resource Locator Ans.
b) University Resource
c) Uniform Research Locator
d) Universal Research Locator
18. The size of Internet Protocol (IP) address is
a) 8 Bits b) 16 bits Ans.
c) 32 bits d) 64 bits
Hints: Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit
number. New version of IP (IPv6), using 128 bits for the IP address,
19. RAM is -
a) Non-volatile b) Secondary storage Ans.
c) Permanent storage d) Volatile
20. e¨vswKs wk‡í †Kvb ai‡bi ¯‹¨vbvi e¨eüZ nq?
a) OCR b) OMR Ans.
c) MICR d) CAT

Answer: 1 – C / 2 – D / 3 – C / 4 – B / 5 - D / 6 – D / 7 – A / 8 - D / 9 – B
/ 10 – B / 11 – A / 12 – D/ 13 – D / 14 – A / 15 – B / 16 – B / 17 – A/ 18 –
C / 19 – D/ 20 – A

708 | P a g e
Exam aid Computer

Exam Aid Computer: Model Test-2


1. In MS Power Point, short cut for creating a new slide is Ans.
a) Ctrl + N b) Ctrl + S
c) Ctrl + M d) Ctrl + P
2. The computer stores its program and data in it’s: Ans.
a) memory b) control unit
c) monitor d) cache memory
3. A hard disk is divided into tracks which are further subdivided into:
a) Clusters b) Sectors Ans.
c) Vector d) Strata
4. The last part of the IP address represents the address of:
a) Unicast b) Network Ans.
c) Broadcast d) Topology
5. Which is the name of the structure where data move through a
network?
Ans.
a) Packets b) Payload
c) Datagrams d) Token
6. POP3 is a protocol for Ans.
a) Email sending b) Email Receiving
c) Email Composing d) Email Storing
7. The step by step instructions that solve a problem are called?
a) An algorithm b) A list Ans.
c) A plan d) None of them
8. Which OS is recommended for real time systems?
a) Windows b) Unix Ans.
c) Oracle d) None of them
Hints: Real-Time Operating Systems Must be "Real-Time" Microsoft
Windows, MacOS, Unix, and Linux are not "real-time." They are often
completely unresponsive for seconds at a time. But windows can be
performed by an extension RTX (Real time OS)
9. Which protocol can cause overload on a CPU of a managed device?
a) NetFlow b) WCCP Ans.
c) IP SLA d) SNMP
10. Which type of cable is used to connect the COM port of a host to the
COM port of a router or switch? Ans.
a) Crossover b) Straight-through
c) Rolled d) Shielded twisted pair
11.The world LAN is related to- Ans.
a) air traffic control b) bridge design
c) atomic reactor d) computer network

709 | P a g e
Exam aid Computer
12.Which of the following extensions is used for picture files stored in
computer?
Ans.
a) .exe b) .jpg
c) .doc d) .xls
13.Which will be the most suitable computer program that you can use
to prepare your bio-data?
a) MS Word b) MS Excel Ans.
c) Oracle d) Power Point
14. Data and instruction waiting to be processed and the resulting output
are stored in-
Ans.
a) Control Unit b) Memory
c) Analog decoder d) Logic unit
15. Which menu includes the command ‘find’?
Ans.
a) Select b) Format
c) Close d) Edit
16. What is the permanent memory storage of a computer? Ans.
a) Software b) ROM
c) RAM d) CD
17. Which of the following protects a computer system from hacking?
a) Backup b) anti-virus Ans.
c) firewall d) applet
18. What is the name of the structure where data move through a
network?
Ans.
a) packets b) payload
c) datagrams d) token
19. Which one of the following is an example of optical storage device?
a) Hard Disk b) CD ROM
c) RAM d) CPU Ans.
20. Which one of the following is Utility software?
a) CD ROM b) MS WORD Ans.
c) McAfee d) Oracle

Answer: 1 – C / 2 – A / 3 – B / 4 – C/ 5 – A / 6 – B / 7 – A / 8 – A / 9 – D /
10 – C / 11 – D / 12 – B / 13 – A/ 14 – B / 15 – D / 16 – B / 17 – C / 18 – A
/ 19 – B / 20 – C

710 | P a g e
Exam aid Computer

Exam Aid Computer: Model Test-3


1. In centralized database system, the role of the front office in a bank is
to-
Ans.
a) assessment and approval b) customer dealing
c) internal audit d) IT management
2. Internet access by transmitting fastest digital data with heavy
bandwidth over the wires are best possible by-
a) Digital lines b) Regular cable lines Ans.
c) Optical fibers d) Analog lines
3. Which protocol assigns IP address to the client, connected in the
internet?
a) DHCP b) IP Ans.
c) RPC d) WWW
4. When you can access your account from any branch of the same bank
that is called?
Ans.
a) Online Banking b) Internet Banking
c) Off Shore Banking d) Any Branch Banking
5. The abbreviation of VSAT is-
a) Very small Aperture Terminal Ans.
b) Very Soft Apparatus Tunnel
c) Vital Satellite Altitude Tester
d) Vital and Small Apparatus Tester
6 Which of the following processors use RISC technology?
a) 486dx b) 486sx Ans.
c) Power PC d) 6340
7. What type of device is computer keyboard?
a) Memory b) Output Ans.
c) Input d) Storage
8. Plotter accuracy is measured in terms of repeatability and _
a) Resolution b) Buffer size Ans.
c) Vertical dimensions d) Intelligence
9. Which is the first electronic digital computer?
a) ENIAC b) Mark I Ans.
c) ABC d) Z3
10. FORTRAN is a programming language. What does FORTRAN
stand for?
a) File Translation b) Format Translation Ans.
c) Floppy Translation d) Formula Translation
11. What is the shortcut key for Spelling Check in document?
a) Alt + F7 b) Shift + F7 Ans.
c) Ctrl + F7 d) F7

711 | P a g e
Exam aid Computer: Model Test
12. The subject of cybernetics deals with the science of- Ans.
a) Control and communication b) Genetics
c) Molecular biology d) Biochemistry
13. FTP stands for- Ans.
a) Folder Transfer Protocol b) File Transfer Process
c) File text Protocol d) File Transfer Protocol
14. The volatile memory of the computer is known as: Ans.
a) ROM b) BIOS
c) RAM d) None
15. What part of the computer interprets and executes instructions that
are posted to it? Ans.
a) RAM b) CPU
c) ROM d) Cache
16. The letter ‘E’ in the word E-commerce stands for:
Ans.
a) Express b) Emergency
c) Essential d) Electronic
17. Which of the following is not related to a computer?
a) RAM b) BIOS Ans.
c) ROM d) All are related
18. WWW stands for_ Ans.
a) World b) World Wide Web
c) Who What When d) Word Wide Wonders
19. The brain of a computer is-
a) Memory b) Hardware Ans.
c) Software d) Microprocessor
20. Submarine cable is the term used in_
Ans.
a) Education system b) Data transformation
c) Information Technology d) Fast Technology

Answer: 1 – B / 2 – C / 3 – A / 4 – A / 5 – A / 6 – C / 7 – C / 8 – A / 9 – C /
10 – D / 11 – D / 12 – A / 13 – D / 14 – C / 15 – B / 16 – D / 17 – D / 18 – B
/ 19 – D / 20 – C

712 | P a g e
Exam aid Computer

Exam Aid Computer: Model Test-4


1. USB stands for-
(a) United Serial Bus (b) Universal Strategic Bus Ans.
(c) Universal Serial Bus (d) Uninterrupted Strategic Bus
2. The command ‘Shift + Del’ will send the file to the –
(a) My document (b) Control Panel Ans.
(c) Recycle Bin (d) None of these
3. Which of the following is a software for Bangla typing and composing?
(a) Ananda (b) Bijoy
(c) Rakhi (d) Akhi Ans.
4. Which of the following is not an antivirus software?
(a) Symantec (b) MacAfee
Ans.
(c) Adobe d) AVG
5. The process of starting or resetting computer is –
(a) BIOS (b) Boot Ans.
(c) Bus (d) Cache
6. Trojan Horse is a kind of-
(a) virus (b) malware Ans.
(c) spyware (d) Worm
7. Which of the following protocols uses both TCP and UDP ports?
(a) SMTP (b) Telnet Ans.
(c) FTP (d) DNS
8. In MS Word application package, you can produce same letter for
different person by using –
(a) Mail sender (b) Mail merge Ans.
(c) Mail tracker (d) Mail table
9. In MS Power Point, the function for launching slide show is?
(a) F3 (b) F5
(c) F7 (d) F9 Ans.
10. Bluetooth operations use –
(a) Magnetic technology (b) Optical technology
Ans.
(c) Laser technology (d) Radio technology
11. In MS Word pressing CTRL+E will- Ans.
(a) draw table (b) make center alignment
(c) exit word (d) underline text
12. Which protocol is used for the internet access? Ans.
(a) TCP/IP (b) Novel Network
(c) Net blue (d) Linux
13. What is the paper feeding technology most commonly associated with
dot-matrix printers? Ans.
A. sheet feed B. tractor feed
C. friction feed D. manual feed
713 | P a g e
Exam aid Computer: Model Test
14. Which provides the fastest data access time? Ans.
A. RAM B. ROM
C. CD-ROM D. Hard disk
15. Time during which a job is processed by the computer is:
A. Execution Time B. Delay Time Ans.
C. Real Time D. Waiting Time
16. In a client/server model, a client program _______.
A. Asks for information
B. Provides information and files Ans.
C. Serves software files to other computers
D. Distributes data files to other computers
17. What technology of memory is Cache RAM usually?
A. DRAM B. Flash Ans.
C. SRAM D. EEPROM
18. ...... is collection of web pages and ...... is the very first page that we
see on opening of a web-site
A. Home-page, Web-page B. Web-site, Home-page Ans.
C. Web-page, Home-page D. Web-page, Web-site
19. What is the term used for unsolicited e-mail?
A. News group B. Use net Ans.
C. Backbone D. Spam
20. The _____ tells the computer how to use its components.
A. Utility B. Network Ans.
C. Operating system D. Application program

Answer: 1 – C / 2 – D / 3 – B / 4 – C / 5 – B / 6 – B / 7 – D / 8 – B / 9 – B /
10 – D / 11 – B / 12 – A / 13 – B / 14 – A / 15 – A / 16 – A / 17 – C / 18 –
C / 19 – D / 20 – C

714 | P a g e
Exam aid Computer

Exam Aid Computer: Model Test-5


1. Spreadsheet G wb‡Pi †KvbwU Øviv worksheet content m¤ú‡K©
aviYv Kiv m¤¢e
a) Formula b) Values Ans.
c) Labels d) Cell format
2. Kw¤úDUvi AvB, wKD n‡”Q-
Ans.
a) Unlimited b) Greater than 120
c) Less than 120 d) Zero
3. wb‡Pi †KvbwU Zviwenxb bZzb mvP© BwÄb?
Ans.
a) WiMAX b) Bluetooth
c) Broadband d) CMOS
4. HTTP 404 wK ai‡bi mZK© evZ©v?
a) mvf©vi eÜ
Ans.
b) m¤ú~Y©fv‡e cwieZ©b n‡q †M‡Q
c) mvf©vi cvIqv hv‡”Q bv
d) ‡cBR cvIqv hv‡”Q bv
5. Which of the following is spreadsheet analysis software?
a) Latex b) Illustrator Ans.
c) Access d) Excel
6. Which is not an Object-Oriented Programming Language?
a) C# b) C Ans.
c) Java d) C++
7. How many bits are used by Unicode to represent one character?
a) 8 b) 16 Ans.
c) 32 d) 48
8. Which one is a language translator?
a) Pearl b) Assembler Ans.
c) JavaScript d) BCD
9. The cell reference for a range of cells that starts in cell C1 and goes
over to column H and down to row 10 is
Ans.
a) C1: 10H b) C1: H10
c) C1: H-10 d) C1: H: 10
10. Which topology does not allow transferring data directly from
computer to computer?
a) Ring b) Bus Ans.
c) Tree d) Star
11. The code for a Web page is written using _____ .
A. A fifth generation language Ans.
B. Win Zip
C. Peripherals
D. Hypertext Markup Language
715 | P a g e
Exam aid Computer
12. What does the SMTP in an SMTP server stand for?
A. Simple Mail Transfer Protocol Ans.
B. Serve Message Text Process
C. Short Messaging Text Process
D. Short Messaging Transfer Protocol
13. What's considered the 'backbone' of the World Wide Web?
A. Uniform resource locator (URL) Ans.
B. Hypertext mark-up language (HTML)
C. Hypertext transfer protocol (HTTP)
D. File transfer protocol (FTP)
14. Which of the following is not a characteristic of a computer?
A. Intelligence B. Speed Ans.
C. Versatility D. Automation
15. Which command is used to set a name to a disk in DOS?
A. VOLUME B. VOL
Ans.
C. LABEL D. DISKLABEL
16. Shimmer, Sparkle text, Blinking Background etc. are known as ......
A. Font Styles B. Font Effects Ans.
C. Word Art D. Text Effects
17. Firewalls are used to protect against .......
A. Unauthorized Access B. Virus Attacks Ans.
C. Data Driven Attacks D. Fire Attacks
18. The software tools that enable a user to interact with a computer for
specific purposes are known as .......
Ans.
A. Hardware B. Network Software
C. Shareware D. Applications
19. For creating a document, you select ........ option at File Menu.
A. Open B. Close
Ans.
C. New D. Save
20. "Zipping" a file means
A. Encrypting the message B. Compressing the message Ans.
C. Transfer the message D. All of the above

Answer: 1 – C / 2 – D / 3 – A / 4 – C / 5 – D / 6 – C / 7 – B / 8 – B / 9 – B /
10 – D / 11 – D / 12 – A / 13 – C / 14 – A / 15 – C / 16 – D / 17 – A / 18 –
D / 19 – C / 20 – B

716 | P a g e
Exam aid Computer

Exam Aid Computer: Model Test-6


1. Which of the following program is an example of Platform
Independent Program?
a) FORTRAN b) C ++ Ans.
c) Java d) Visual Basic
2. Firewall is a device used for filtering—
Ans.
a) Password b) File
c) Packet d) Virus
Hints: Packet filtering is a firewall technique used to control network access
by monitoring outgoing and incoming packets and allowing them to pass or
halt based on the source and destination Internet Protocol (IP) addresses,
protocols and ports
3. How many layers are in a TCP/IP protocol suite?
a) 7 b) 5 Ans.
c) 10 d) 4
Hints: The four layers of the DARPA model are: Application, Transport,
Internet, and Network Interface.
4. What is the length of a Unicode character?
a) 4 bits b) 8 bits Ans.
c) 16 bits d) 32 bits
5. What does ATM stand for Ans.
a) Automatic Teller Machine b) Automated Teller Machine
c) Augmented Teller Machine d) Automatic Telling Machine
6. Which one of the following is the first program of Microsoft?
a) Windows XP b) Windows 98 Ans.
c) MS DOS d) Windows7
7. DOT MATRIX is a kind of:
a) Scanner b) Operating System Ans.
c) MS DOS d) Printer @
8. What is the elaboration of VOIP?
a) Voice over Internet program Ans.
b) Voice over Internet protocol
c) Voice of Internet program
d) Voice on Internet protocol
9. The buying and selling of goods over the interest is known as:
a) E-buying b) E- commerce Ans.
c) E- selling d) E-business
10. Which of the following is related is related to memory of a computer?
a) Cache b) PS Ans.
c) DSP d) Flops

717 | P a g e
Exam aid Computer: Model Test
11. Which of the following is not an output device?
a) Monitor b) Printer Ans.
c) Mouse d) Speaker
12. The add or remove programs utility can be found in:
Ans.
a) Control panel b) CPU
c) Desktop d) Search engine
13. The thing that eventually terminates a worm virus is a lack of:
A. Memory or disk space B. Time
Ans.
C. CD drive space D. CD-RW
14. Software programs that close potential security breaches in an
operating system are known as:
A. Security breach fixes B. Refresh patches Ans.
C. Security repairs D. Security patches
15. What is the most common tool used to restrict access to a computer
system?
A. User log in B. Passwords Ans.
C. Computer keys D. Access-control software
16. Hardware or software designed to guard against unauthorized access
to a computer network is known as a (n):
Ans.
A. Hacker-proof program B. Firewall
C. Hacker-resistant server D. Encryption safe wall
17. The scrambling of code is known as:
Ans.
A. Encryption B. A firewall
C. Scrambling D. Password-proofing
18. If you want to secure a message, use a (n):
A. Cryptology source B. Encryption key Ans.
C. Encryption software package D. Cryptosystem
19. Instructions and memory address are represented by
A. Character code B. Binary codes Ans.
C. Binary word D. Parity bit
20. An error in software or hardware is called a bug. What is the
alternative computer jargon for it?
A. Leech B. Squid Ans.
C. Slug D. Glitch

Answer: 1 – C / 2 – C / 3 – D / 4 – C / 5 – B / 6 – C / 7 – D / 8 – B / 9 –
B / 10 – A / 11 – C / 12 – A / 13 – A / 14 – D / 15 – B / 16 – B / 17 – A /
18 – D / 19 – B / 20 – D

718 | P a g e
Exam aid Computer

Exam Aid Computer: Model Test-7


1. Portable program means?
a) Program with wheel b) Independent from its authors Ans.
c) Independent of platform d) None of these
2. When a computer is first turned on or restarted, a special type of
absolute loader is executed, called-
a) Compile and go loader b) Boot loader Ans.
c) Bootstrap loader d) None of these
3. Each IP packed must contain-
a) Only Source address b) Only Destination address
c) Source and Destination address Ans.
d) None of these
4. In a client/server model, a client program –
Ans.
a) asks for information
b) provides information and files
c) distributes data files to other computers
d) None of these
5. How do the main components of the computer communicate with each
other?
a) System bus b) Memory Ans.
c) Keyboard d) None of these
6. Which of the following protocols uses both TCP and UDP ports?
a) SMTP b) Telnet Ans.
c) FTP d) DNS
7. Two dimensional arrays are also called
a) tables arrays b) matrix arrays Ans.
c) both a and b d) None of the above
8. Which of the following is an SQL trigger supported by Oracle?
a) BEFORE b) INSTEAD OF Ans.
c) AFTER d) All of the above
9. Which one is a universal logic gate?
a) NAND b) AND Ans.
c) OR d) NOT
10. The data structure required to evaluate a postfix expression is --
a) Queue b) stack Ans.
c) Array d) linked-list
11. Which key on keyboard of a computer does not have its name printed
on the key?
A. ESC B. SHIFT Ans.
C. F1 D. SPACE

719 | P a g e
Exam aid Computer: Model Test
12. Which file is transferred when computer is start up?
A. Document B. Program files Ans.
C. Operating system D. System files
13. A tiny dot of light on the monitor is called
A. Silicon chip B. Optical illusion Ans.
C. Icon D. Pixel
14. Where will store data first time when you copy
A. Clipboard B. Clipbook Ans.
C. Hard disk D. CD
15. Unicode standard is Ans.
A. Keyboard layout B. Software
C. Font D. Character encoding system
16. Boot startup process
A. Loads system files to RAM Ans.
B. Checks the computer connections
C. Clean up the computer memory
D. Prepare the computer ready
17. When a computer is first turned on or restarted, a special type of
absolute loader called
A. Compile and go loader B. Boot loader Ans.
C. Bootstrap loader D. Relating loader
18. Which of the following is not essential component to perform a mail
merge operation?
A. Main document B. Data source Ans.
C. Merge fields D. Word fields
19. What is gutter margin?
A. Margin that is added to the left margin when printing Ans.
B. Margin that is added to right margin when printing
C. Margin that is added to the binding side of page when printing
D. Margin that is added to the outside of the page when printing
20. Short cut Ctrl + T is used to
Ans.
A. Hanging Indent B. Left Indent
C. Open Tabs Dialog box D. Terminate all opened Dialog box

Answer: 1 – C / 2 – C / 3 – C / 4 – A / 5 – A /6 - D / 7 – C / 8 - D / 9 –
A / 10 – B / 11 – D / 12 – D / 13 – D / 14 – A / 15 – D / 16 – A / 17 – D
/ 18 – D / 19 – C / 20 – A

720 | P a g e
Exam aid Computer

Exam Aid Computer: Model Test-8


1. For which purpose is MS Outlook used?
Ans.
a) Internet browsing b) Creating documents
c) Using Email d) Using Database
2. In MS Word, which of the following shortcut keys are used for
aligning text to center? Ans.
a) Ctrl + E b) Ctrl + C
c) Ctrl + M c) Ctrl + J
3. what natural element is the primary ingredient in computer chips?
a) Silicon b) Carbon Ans.
c) Iron d) Uranium
4. The type of data storage that is considered to be non - volatile is?
a) ROM b) RAM Ans.
c) TAPE d) DISK
5. A--- is a pointing device.
a) Monitor b) Mouse Ans.
c) Keyboard d) CPU
6. An organization is granted a block; one address is 2.2.2.64/20. The
organization needs 10 subnets. What is the subnet prefix length?
a) /20 b) /24@ Ans.
c) /23 d) /28
7. Which of the following is used to transfer files? Ans.
a) http b) FTP
c) HTML d) None
8. The primary job of the operating system of a computer is to
a) Manage resources Ans.
b) Provide utilizes
c) Provide communication interface
d) None
9. DHCP is the abbreviation of Ans.
a) Dynamic host control protocol
b) Dynamic host configuration protocol
c) Dynamic hyper control protocol
d) None
10.When CPU is executing a program that is part of the operating
system, it is said to be in _
a) Interrupt mode b) System mode Ans.
c) Simplex mode d) None

721 | P a g e
Exam aid Computer
11.Which organization defines the web standards?
a) Microsoft corporation Ans.
b) IBM corporation
c) World Wide Web Consortium
d) None
12.Bridge works in which layer of the OSI model? Ans.
a) Application layer b) Transport layer
c) Datalink layer d) None
13.From what location are the 1st computer instructions available on
boot up?
a) ROM BIOS b) CPU Ans.
c) Boot.ini d) None
14.Which of the following service does not normally use TCP?
a) DNS b) HTTP Ans.
c) FTP d) None.
15.A hard disk is divided into tracks which are further subdivided into:
a) Clusters b) Sectors Ans.
c) Vectors d) None
16.Which of the following represent the binary equivalent of the decimal
number 23?
Ans.
a) 01011 b) 10111@
c) 10011 d) None
17.How long is an IPv6 address?
Ans.
a) 32 bits b) 128bits@
c) 64bits d) None
18.Which of the following is NOT a peripheral device?
a) Motherboard b) Scanner Ans.
c) Monitor d) None
19.Spot the odd one out among the following
a) UNIX b) Basic Ans.
c) Windows d) DOS
20. To Redo the last work, press .....
A. Ctrl+U B. Ctrl+Y Ans.
C. Ctrl+Z D. Ctrl+W

Answer: 1 – C/ 2 -A / 3 – A / 4 – A / 5 – B / 6 – B / 7 – B / 8 – A / 9 – B
/ 10 – B / 11 – C / 12 – C / 13 – A / 14 – D / 15 – B / 16 – B / 17 – B
/ 18 – A / 19 – B / 20 – B

722 | P a g e
Exam aid Computer

Exam Aid Computer: Model Test-9


1. A numeric value can be treated as label value if ...... precedes it.
A. Apostrophe ( ‘ ) B. Exclamation ( ! )
Ans. A
C. Hash ( # ) D. Tilde ( ~ )
2. Concatenation of text can be done using
A. Apostrophe ( ‘ ) B. Exclamation ( ! ) Ans. D
C. Hash ( # ) D. Ampersand ( & )
3. Comments can be added to cells using ......
A. Edit -> Comments B. Insert -> Comment Ans. B
C. File -> Comments D. View –> Comments
4. Which area in an Excel window allows entering values and formulas?
A. Title Bar B. Menu Bar
Ans. C
C. Formula Bar D. Standard Tool Bar
5. An Excel Workbook is a collection of .......
A. Workbooks B. Worksheets Ans. D
C. Charts D. Worksheets and Charts
6. How do you display current date and time in MS Excel?
A. date () B. Today ()
Ans. C
C. now () D. time ()
7. How do you display current date only in MS Excel?
A. date () B. Today () Ans. B
C. now () D. time ()
8. Comments can be added to cells using
A. Edit > Comments B. Insert > Comments Ans. B
C. File > Comments D. View > Comments
9. Which symbol must all formula begin with? Ans. A
A. = B. +
C. ( D. @
9. To add a header or footer to your handout, you can use
A. The title master B. The slide master Ans. C
C. The handout master D. All of above
10. In Microsoft PowerPoint in order to see all the slides on one screen
use
A. view, slide sorter B. view, slide Ans. A
C. view, master D. view, slide show
11. Which key deletes text before, or the left of, the insertion point?
A. Backspace B. Page up Ans. A
C. Delete D. Page down
12. Ellipse Motion is a predefined ......
A. Design template B. Color scheme Ans. C
C. Animation scheme D. None of these

723 | P a g e
Exam aid Computer

Exam Aid Computer: Model Test-10


1. When a key is pressed on the keyboard, which standard is used for
converting the key-stroke into the corresponding bits?
a) ANSI b) ASCII Ans. B
c) EBCDIC d) ISO
2. Which number system is usually followed in a typical 32-bit
computer?
a) 2 b) 10 Ans. A
c) 16 d) 32
3. The arrangement of elements such as Title and Subtitle text, pictures,
tables etc. is called
A. Layout B. Presentation Ans. A
C. Design D. Scheme
4. Which of the following will not advance the slides in a slide show view?
A. The esc key B. The space bar Ans. A
C. The enter key D. The mouse button
5. In which menu can you find features like Slide Design, Slide Layout
etc.?
A. Insert Menu B. Format Menu Ans. B
C. Tools Menu D. Slide Show Menu
6. The spelling dialog box can be involved by choosing spelling from
________ menu.
A. Insert B. File Ans. C
C. Tools D. View
7. To open the existing presentation, press
A. Ctrl + L B. Ctrl + N Ans. D
C. Ctrl + A D. Ctrl + O
8. Which one of following is not a database? Ans. B
(a) Oracle (b) AJAX
(c) MYSQL (d) SQL Server (B)
9. The decimal number equivalent of (1010)2 is- Ans. C
(a) 5010 (b) 2210
(c) 1010 (d) 2010
10 Which one of the following is not a type of a computer printer?
(a) Laser (b) Dot Matrix Ans. C
(c) Dual core (Ink-Jet (d) None of these (C)
11. Which one of the following enables the mobile devices to access
internet resources?
Ans. A
(a) WAP (b) ISP
(c) TCP (d) HTTP

724 | P a g e
Exam aid Computer

Exam Aid Computer: BCS Model Test-01


১। কি�উটােরর মূল েমমির ৈতির হয় িক িদেয় ?
ক. এয্ালুিমিনয়াম খ. িসিলকন Ans. B
গ. �াসিটক ঘ. েকানিটই নয়
২। িনেচর েকান সাইটিট েকনা েবচারর জ� নয় ? Ans. B
ক. এখােনই.কম খ. গুগল.কম
গ. ওএলএ�.কম ঘ. আমাজন .কম
৩। পােসর্ানাল কি�উটার যু� কের িনেচর েকানিট ৈতির করা যায় ? Ans. C
ক. সুপার কি�উটার খ. সাভর্ার
গ. েনটওয়াকর্ ঘ. ইন্টার�াইস
৪। একিট �িত�ােন িডভাইস ভাগাভািগ কের েনওয়ার সুিবধা হেলা
Ans. D
ক. অথর্ সা�য় খ. সময় সা�য়
গ. �ােনর সা�য় ঘ. উপেরর সবকিট
৫। জয়ি�ক েকান ধরেণর িডভাইস ? Ans. A
ক. ইনপুট খ. আউটপুট
গ. ইনপুট-আউটপুট ঘ.েকানিটই নয়
৬। অয্ান্�েয়েডর সবর্েশষ সং�রেণর নাম কী ? Ans. C
ক. মাশর্াল খ. লিলপপ
গ. ওিরও ঘ. েকানিটই নয়
৭। ে�াশাল েনটওয়ািকর্ং ইন�টা�াম কত সােল চালু হয় ? Ans. A
ক. ২০১০ সােল খ. ২০১২ সােল
গ. ২০১১ সােল ঘ. ২০০৬
৮। বাংলােদেশর �থম সুপার কি�উটােরর নাম কী ? Ans. B
ক. েদােয়ল খ. নয়ন
গ. আইিবএম ১৬২০ ঘ. েকানিটই নয়
৯। Wifi - এর েচেয় অিধক শি�স�� তারিবহীন �যুি�র নাম কী ?
ক. হট�ট খ. WiMax Ans. C
গ. Lifi*** ঘ. েকানিটইনয়
Hints: Li-Fi is a technology for wireless communication between devices
using light to transmit data and position. In its present state only LED
lamps can be used for the transmission of visible light. The term was first
introduced by Harald Haas during a 2011 TEDGlobal talk in Edinburgh.
১০। ৮০৮৬ কত িবেটর মাইে�াকি�উটার ?
ক. ৮ খ. ১৬ * Ans. B
গ. ৩২ ঘ ৬৪

725 | P a g e
Exam aid Computer: Model Test

১১। িনেচর েকানিট ডাটােবজ লয্া�ুেয়জ ? Ans. A


ক. ওরাকল ** খ. িস
গ. এমএস ওয়াডর্ ঘ. েকানিটই ন য়
১২। িনেচর েকানিট কি�উটােরর �াইমাির েমমির ?
Ans. A
ক. রয্াম খ. হাডর্ িড�
গ. েপন �াইভ ঘ. েকানিটই নয়
১৩। ইউিনেকােডর মাধয্েম কতগুেলা িচ�েক িনিদর্� করা যায় ?
ক. ২৫৬িট খ. ৪০৯৬িট Ans. C
গ. ৬৫৫৩৬িট ঘ. েকানিটই নয়
১৪। IPV6 এর এে�স কত িবেটর ?
ক. ১২৮ খ. ৩২ Ans. A
গ. ১২ ঘ. ৬
১৫। িনেচর েকানিট অপােরিটং িসে�ম নয় ?
a. C b. DOS Ans. A
c. Cp/M d. Xenix

Exam Aid Computer: BCS Model Test-02


১। েকাথায় আলফা িনউেমিরক েকাড বয্বহার হয়?
ক। ACSSI খ। ASCCI Ans. C
গ। ASCII ঘ। ACSII
২। NOTেগইেট ইনপুট কয়িট?
ক।১ খ।২ Ans. A
গ।৩ ঘ। েকানিটই নয়।
৩। 'ফেরন কী' েকাথায় বয্বহৃত হয়?
ক। ডাটােবজ খ। ে�া�াম Ans. A
গ। এিন্ট ভাইরাস ঘ। এিডিটং
৪। িভিডও ফাইল ফরেমট এ�েটনশন েকানিট? Ans. C
ক।.jpg খ।.exe
গ।.mpg ঘ।.bmp
৫। অপিটকয্াল ে�ােরজ িডভাইজ েকানিট?
Ans. A
ক। CD ROM খ। RAM
গ। HADR DISK ঘ। CPU
৬। কি�উটােরর �থম ে�া�ািমং ভাষা েকানিট? Ans. A
ক। ADA খ। PASCAL
গ। PANCH CARD ঘ। FORTRAN

726 | P a g e
Exam aid Computer
৭। িক-েবােডর্ shift, ctrl, alt কী গুেলােক বলা হয়?
ক। Function key খ। Numeric key Ans. C
গ। Modifier key ঘ। Space key
৮। ে�া�াম রচনা সবেচেয় কিঠন েকান ভাষায়?
ক। পয্ােকজ খ। উ�তর Ans. C
গ। েমিশন ঘ। এেস�িল
৯। সবেচেয় �ত কাজ কের েকান েকবল?
ক। েকা এি�য়াল খ। টুইে�ড েপয়ার Ans. C
গ। ফাইবার অপিটক ঘ। কয্াট ৫
১০।েকানিট computer ভাইরাস? Ans. C
ক। C++ খ। SQL
গ। CIH ঘ। SPSS
১২। Spread Sheet Program েকানিট? Ans. D
ক। MS Word খ। MS Power Point
গ। MS Access ঘ। MS Excel
১৩। এম এস ওয়ােডর্ 'Re do' করা হয়_____
Ans. B
ক। Ctrl Z খ। Ctrl Y
গ। Shift Z ঘ। Shift Y
১৪। এন্�েয়ড উ�াবেন ভূিমকা রেয়েছ কার ?
ক। Thomas Hobes খ। Charles Harry Ans. C
গ। Andy Rubin ঘ। Andy Burin
১৫। IPV4 address কত িবেটর?
ক। ১৬ খ। ৩২ Ans. B
গ। ৬৪ ঘ। ৮৬

Exam Aid Computer: BCS Model Test-03


১. িসিরয়াল েপাটর্ মাউেস কয়িট িপন থােক?
ক।৭ িট খ।৮ িট Ans. C
গ।৯ িট* ঘ।১০ িট
২. �য্ানার েয ধরেনর িডভাইস?
ক।ইনপুট* খ।আউটপুট Ans. A
গ।উভয় ঘ।েকানিটই নয়
৩.OMR এর পূণরূ র্ প িক?
ক।Optimise Marked Reader খ।Optical Mark Reader *
গ।Opening Mark Reader ঘ।Opposed Mark Reader Ans. B

727 | P a g e
Exam aid Computer: Model Test

৪. �টার িক
ক।ইনপুট িডভাইস খ।আউটপুট িডভাইস* Ans. B
গ।উভয় ঘ।েকানিটই নয়
৫. েহডেফান িক ধরেনর িডভাইস?
ক।ইনপুট খ।আউটপুট** Ans. B
গ।েকানিটই নয় ঘ।দুিটই
৬. মেডম িক ধরেনর িডভাইস?
ক।ইনপুট খ।আউটপুট Ans. C
গ। উভয়* ঘ।েকানিটই নয়
৭. ি�ন্টােরর েরজুেলশন পিরমাপক একক িক?
ক।DPI* খ।DPS Ans. A
গ।DPR ঘ।DON
৮.মিনটর কয় ধরেনর?
ক।২ খ।৩ Ans. B
গ।৪ ঘ।৫
৯.Refresh rate েক িক একেক �কাশ করা হয়?
Ans. A
ক।হাটর্জ খ।িকেলাবাইট
গ।বাইট ঘ।জুল
১০.�থম িমিন কি�উটােরর নাম িক? Ans. A
ক।িপিডিপ -১ খ।িপিডিপ-২
গ।িপিডিপ-৩ ঘ।িপিডিপ-৪
১১. িবে�র �থম ইেলক�িনক কি�উটার (বািনিজয্ক) েকানিট?
Ans. A
ক। ইউিনভয্াক খ।এিনয়াক
গ।িপিডিপ ঘ।এড�াক
১২. িবে�র একমা� কি�উটার জাদুঘর েকাথায়?
ক।যু�রা�* খ।যু�রাজয্ Ans. A
গ।জাপান ঘ।কানাডা
১৩.কি�উটার হাডর্ওয়ার বলেত িক েবাঝায়?
ক।�ৃিত অংশ খ।েক�ীয় �ি�য়াকরণ অংশ Ans. D
গ।শ� ধাতব অংশ ঘ।কি�উটার সংি�� যাি�ক সর�াম*
১৪.েকানিট কি�উটার এর �হনমুখ নয়?
ক।কী েবাডর্ খ।বারেকাড
Ans. C
গ।মিনটর* ঘ।ও এম আর
১৫. উপা� �হন ও িনগর্মন বােসর নাম?
ক।ইনপুট খ। আউটপুট Ans. D
গ।পাওয়ার সা�াই ঘ।েডটােবস*

728 | P a g e

Das könnte Ihnen auch gefallen