What should come in the place of question mark in the following series? 3,8,6, 14, ?,20

A. 11
B. 10
C. 8
D. 9

What is the most likely cause of an erratic mouse cursor?

A. An’unplugged mouse cable
B. A broken wire in the mouse cable.
C. A dirty ball and roller in the mouse
D. An incorrectly installed mouse driver

Which text formatting feature changes the thickness of the letters?

A. Bold
B. Italic
C. Underline
D. Alignment

Bold Italics and Underline are features In many programs. To which of the following items these features can be applied?.

A. Files
B. Pictures
C. Text
D. Windows

A block of the text automatically added to the end of an outgoing email is called____

A. An attachment
B. A signature
C. A footer
D. an encryption

Viruses are often contained in email attachments. The virus infects the computer when attachment is opened. Which of the following attachment is least likely to carry a virus?

A. A text file
B. A screensaver
C. A program
D. EXE file

What information would be safe to include In a public profile on a social networking site?

A. User name
B. Date of birth
C. Home address
D. Mobile phone number.

What is the clip board?

A. A list of the recently accessed files.
B. A place where you can post messages
C. A temporary storage location for items that have been cut or copied
D. A gallery of graphics, movies, pictures and sounds for any application:

‘Strong ‘passwords are used and recommended when using internet banking. A ‘Strong’ password is one which is difficult to guess. Which of the following would be the ‘Strongest’ password?

A. e7 Jm51
B. nothahks
C. xyz123456
D. 123456

X and Y can make a machine In 12 days and Y alone can make it in 48 days. X alone can make the machine in

A. 40
B. 24
C. 32
D. 1