1. Data theft or destroy from another person's Computer through Internet is known as -

a. Hacking
b. Browsing
c. Chatting
d. Searching

2. The resolution of a printer is measured in -

a. Megabits
b. Hz
c. Dots Per Inch (DPI)
d. Inches (diagonal)

3. All computers must have -

a. word processing software
b. an operating system
c. a printer
d. a virus checking program

4. What is a URL ?

a. An email address
b. The title of a web site
c. The address of a page on the World Wide Web
d. A communication method between computers and printers

5. Which file extensions indicate ony graphics files ?

a. BMP and DOC
b. JPEG and TXT
c. TXT and STK
d. BMP : and GIF

6. The general term for buying and selling through the Internet is -

a. click through
b. wholesale
c. e-commerce
d. streaming

7. In order to access the World Wide Web you need-

a. An Internet connection, an Internet Service Provider and Browser Software
b. Only Internet Explorer or Netscape Navigator
c. A Modem and a Browser
d. Nothing

8. Which one works as an output and input device ?

a. Modem
b. Scanner
c. Mouse
d. Monitor

9. Suppose cels A5 and B5 contain the values 30000 and 100, respectively . In cell C5, if we apply the formula = IF (A5<>20000, B5*10%, B5*20%), what will be the result in C5 ?

a. 20
b. 10
c. 3000
d. None of the above

10. A separate file sent as a part of an e-mail message is called a/an-

a. folder
b. spreadsheet
c. attachment
d. message body

11. Which type of chart is the best for showing parts of a whole ?

a. column
b. Line
c. Area
d. Pie

12. The process of staring or staring a computer is ___

a. Bios
b. Boot
c. Cache
d. Bus

13. which of the following is spreadsheet software?

a. MS word
b. Power point
c. MS excel
d. Google

14. SPSSA stands for what ?

a. Standard packaging and storage system
b. statistical package for social sciences
c. Statistical process for social sciences
d. Standard processing and storage system

15. which type of chart is the best for showing parts of a whole?

a. column
b. Line
c. Pie
d. Area

16. what does RAM stand for?

a. read Access Model
b. Rapid Action Memory
c. Random Access Memory
d. Random Active Memory

17. The brain of any computer system is ----

a. ALU
b. CPU
c. Memory
d. Control Unit

18. Which device uses a DMA Channel?

a. Modern
b. Network card
c. Sound Card
d. All of the above

19. The binary system uses powers of ----

a. 2
b. 10
c. 8
d. 16

20. DIBOR stands for

a. Dhaka Inter Bank Offer Rate
b. Dhaka International Board Only Ready
c. Dark International Board of Regulators
d. Delhi International Board of Operation Research

21. ASCII is a coding system that provides-

a. 128 different characters
b. 256 different characters
c. 1024 different characters
d. 512 different characters

22. A person who used his or her expertise to gain access to other people's computers to get information illegally is a-

a. Hacker
b. Spammer
c. Programmer
d. instant messenger

23. ______are set of rules and procedures to control the data transmission over the internet?

a. Gateway
b. Protocol
c. IP address
d. Domains