61
|
Papyras was used as a writing material by
|
|
(A) Summarians
|
|
(B) Italians
|
|
(C) Egyptians
|
|
(D) Assyrians
|
|
62
|
The intrinsic value of information lies in its
|
|
(A) Procurement
|
|
(B) Processing and Storage
|
|
(C) Communication and Retrieval
|
|
(D) Usage
|
|
63
|
|
|
(A) display the numbered list
|
|
(B) underline the text
|
|
(C) display the bulleted list
|
|
(D) bold the text
|
|
64
|
… tag must be within ________
|
|
(A) Title
|
|
(B) Form
|
|
(C) Header
|
|
(D) Body
|
|
65
|
A homepage is __________
|
|
(A) an index of encyclopedia
articles
|
|
(B) where all Internet data is
stored
|
|
(C) required for access to the
Internet
|
|
(D) the first page of a website
|
|
66
|
Which HTML tag produces the biggest heading?
|
|
(A)
|
|
(B)
|
|
(C)
|
|
(D)
|
|
67
|
Which of the following is an attribute of tag?
|
|
(A) SRC
|
|
(B) LINK
|
|
(C) CELLPADDING
|
|
(D) BOLD
|
|
68
|
The _______ shortcut is used to copy text or images into the
windows operating system.
|
|
(A) Ctrl + X
|
|
(B) Ctrl + C
|
|
(C) Ctrl + D
|
|
(D) Ctrl + V
|
|
69
|
Which shortcut key is used to cut data in the windows
operating system?
|
|
(A) Ctrl + X
|
|
(B) Ctrl + D
|
|
(C) Ctrl + V
|
|
(D) Ctrl + C
|
|
70
|
_______ is used to store data and program.
|
|
(A) Recycle bin
|
|
(B) File
|
|
(C) Icon
|
|
(D) None
|
|
71
|
Identification of an e-article and paying for full-text is
known as
|
|
(A) Pay-per-view
|
|
(B) Consortium
|
|
(C) Campus license
|
|
(D) E-subscription
|
|
72
|
Which of the following web resource for LIS has been compiled
by academic librarians of universities of California ?
|
|
(A) Infomine
|
|
(B) Internet Public Library
|
|
(C) Internet Library for Librarians
|
|
(D) Current Informed Librarian
|
|
73
|
The ‘C’ language is
|
|
(A) Context free language
|
|
(B) Context sensitive language
|
|
(C) Regular language
|
|
(D) None of the above
|
|
74
|
The Mobile Application Protocol (MAP) typically runs on top of
which protocol?
|
|
(A) SNMP (Simple Network Management
Protocol)
|
|
(B) SMTP (Simple Mail Transfer
Protocol)
|
|
(C) SS7 (Signalling System 7)
|
|
(D) HTTP (Hyper Text Transfer
Protocol)
|
|
75
|
If a packet arrives with an M-bit value is ‘l’ and a
fragmentation offset value ‘0’, and then it is ______ fragment.
|
|
(A) First
|
|
(B) Middle
|
|
(C) Last
|
|
(D) All of the above
|
|
76
|
The number of bit strings of length eight that will either
start with a 1 bit or end with two bits 00 shall be
|
|
(A) 32
|
|
(B) 64
|
|
(C) 128
|
|
(D) 160
|
|
77
|
In compiler design ‘reducing the strength’ refers to
|
|
(A) Reducing the range of values of
input variables.
|
|
(B) Code optimization using cheaper
machine instructions.
|
|
(C) Reducing efficiency of program.
|
|
(D) None of the above
|
|
78
|
RAD stands for ______.
|
|
(A) Rapid and Design
|
|
(B) Rapid Aided Development
|
|
(C) Rapid Application Development
|
|
(D) Rapid Application Design
|
|
79
|
Eco system is a Frame work for
|
|
(A) Building a Computer System
|
|
(B) Building Internet Market
|
|
(C) Building Offline Market
|
|
(D) Building Market
|
|
80
|
The technique of temporarily delaying outgoing
acknowledgements so that they can be hooked onto the next outgoing data frame
is known as
|
|
(A) Bit stuffing
|
|
(B) Piggy backing
|
|
(C) Pipelining
|
|
(D) Broadcasting
|
|
0 Comments