1. Which of the following is an output device?
A) Microphone
B) Keyboard
C) Digitizer
D) Speakers
Answer:D) Speakers
2. What is MICR?
A) Magnetic Ink Character Recognition
B) Microsoft Intrinsic Code Recorder
C) Magnetic Intensity Code Recognition
D) Micro Information Code Recorder
Answer:A) Magnetic Ink Character Recognition
3) What is the binary representation of decimal number 12?
A) 1010
B) 1100
C) 1011
D) 1110
Answer: B) 1100
4) Which of the following is not a key property of a transaction carried out in a database system?
A) Durability
B) Atomicity
C) Information
D) Consistency
Answer:C) Information
5) Which type of software is used for creating slide shows?
A)Spreadsheet software
B)Word-processing software
C)Presentation software
D)Web design software
Answer:C)Presentation software
6) Which of the following lets a computer communicate with a variety of musical instruments?
A) MIDI
B) DMAIC
C) CDMA
D) DMIIC
Answer:A) MIDI
7)An attack that tries to flood a computer resource with more requests than it can handle is known as--
A)Firewall
B)Spyware
C)Worms
D) DoS Attack
Answer:D) DoS Attack
8) Malicious software that poses as legitimate programs or files that user may recognize and want to use are known as ---
A)Trojan
B)Spam
C)Worm
D)Shield
Answer:A)Trojan
9) Which of the following is a Certifying Authority to issue Digital Signature Certificates in India?
A) CCA
B) Safescrypt
C) Meity
D) ISP
Answer:B) Safescrypt
10) The information Technology Act was made effective from ---
A) 27 October 2009
B) 17 October 2008
C) 27 October 2001
D) 17 October 2000
Answer:D) 17 October 2000