11th Class Computer Science MCQS Information Networks Online Test 1
3-cp-3-e-3-cspan-style-3-d-22-font-family-3-a-tahoma-2-c-sans-serif-22-3-e-3-cspan-style-3-d-22-font-size-3-a-14-6667-px-22-3-ea-special-device-that-is-used-for-playing-games-is-3-a-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e_-_3-cp-3-e-joystick-3-c-2-fp-3-e,3-cp-3-e-3-cspan-style-3-d-22-font-size-3-a-10-0-pt-22-3-e-3-cspan-style-3-d-27-font-family-3-a-22-tahoma-22-2-c-22-sans-serif-22-27-3-e-short-cut-key-for-paste-is-3-a-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e_-_3-cp-3-e-3-cspan-style-3-d-22-font-size-3-a-10-0-pt-22-3-e-3-cspan-style-3-d-27-font-family-3-a-22-tahoma-22-2-c-22-sans-serif-22-27-3-e-ctrl-2-b-v-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e,3-cp-3-e-3-cspan-style-3-d-22-font-size-3-a-10-0-pt-22-3-e-3-cspan-style-3-d-27-font-family-3-a-22-tahoma-22-2-c-22-sans-serif-22-27-3-e-the-right-of-person-to-keep-his-information-away-from-othes-is-called-3-a-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e_-_3-cp-3-e-3-cspan-style-3-d-22-font-size-3-a-10-0-pt-22-3-e-3-cspan-style-3-d-22-background-color-3-awhite-22-3-e-3-cspan-style-3-d-27-font-family-3-a-22-tahoma-22-2-c-22-sans-serif-22-27-3-e-privacy-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e,3-cp-3-e-3-cspan-style-3-d-22-font-size-3-a-10-0-pt-22-3-e-3-cspan-style-3-d-27-font-family-3-a-22-tahoma-22-2-c-22-sans-serif-22-27-3-e-which-of-the-following-is-e-mail-client-software-3-f-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e_-_3-cp-3-e-3-cspan-style-3-d-22-font-size-3-a-10-0-pt-22-3-e-3-cspan-style-3-d-27-font-family-3-a-22-tahoma-22-2-c-22-sans-serif-22-27-3-e-outlook-express-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e,3-cp-3-e-3-cspan-style-3-d-22-font-size-3-a-10-0-pt-22-3-e-3-cspan-style-3-d-27-font-family-3-a-22-tahoma-22-2-c-22-sans-serif-22-27-3-ea-kilobyte-is-exactly-equal-to-3-a-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e_-_3-cp-3-e-3-cspan-style-3-d-22-font-size-3-a-10-0-pt-22-3-e-3-cspan-style-3-d-27-font-family-3-a-22-tahoma-22-2-c-22-sans-serif-22-27-3-e-1024-bytes-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e,3-cp-3-e-3-cspan-style-3-d-22-font-size-3-a-11-0-pt-22-3-e-3-cspan-style-3-d-27-font-family-3-a-22-tahoma-22-2-c-22-sans-serif-22-27-3-e-the-amplitude-is-measured-in-3-a-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e_-_3-cp-3-e-3-cspan-style-3-d-22-font-size-3-a-11-0-pt-22-3-e-3-cspan-style-3-d-27-font-family-3-a-22-tahoma-22-2-c-22-sans-serif-22-27-3-e-volts-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e,3-cp-3-e-3-cspan-style-3-d-22-font-size-3-a-11-0-pt-22-3-e-3-cspan-style-3-d-27-font-family-3-a-22-tahoma-22-2-c-22-sans-serif-22-27-3-e-the-process-of-encoding-data-for-security-is-called-3-a-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e_-_3-cp-3-e-3-cspan-style-3-d-22-font-size-3-a-11-0-pt-22-3-e-3-cspan-style-3-d-27-font-family-3-a-22-tahoma-22-2-c-22-sans-serif-22-27-3-e-encryption-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e,3-cp-3-e-3-cspan-style-3-d-22-font-size-3-a-11-0-pt-22-3-e-3-cspan-style-3-d-27-font-family-3-a-22-tahoma-22-2-c-22-sans-serif-22-27-3-e-which-software-is-used-to-search-and-view-web-pages-3-f-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e_-_3-cp-3-e-3-cspan-style-3-d-22-font-size-3-a-11-0-pt-22-3-e-3-cspan-style-3-d-27-font-family-3-a-22-tahoma-22-2-c-22-sans-serif-22-27-3-e-web-browser-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e,3-cp-3-e-3-cspan-style-3-d-22-font-size-3-a-11-0-pt-22-3-e-3-cspan-style-3-d-27-font-family-3-a-22-tahoma-22-2-c-22-sans-serif-22-27-3-eosi-model-was-created-by-3-a-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e_-_3-cp-3-e-3-cspan-style-3-d-22-font-size-3-a-11-0-pt-22-3-e-3-cspan-style-3-d-27-font-family-3-a-22-tahoma-22-2-c-22-sans-serif-22-27-3-eiso-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e,3-cp-3-e-3-cspan-style-3-d-27-5-c-5-c-22-font-size-5-c-5-c-3-a-11-0-pt-5-c-5-c-22-27-3-e-3-cspan-style-3-d-27-5-c-5-c-22-font-family-5-c-5-c-3-a-22-tahoma-22-2-c-22-sans-serif-22-5-c-5-c-22-27-3-e-which-is-an-example-of-un-guided-media-5-c-5-c-3-a-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e_-_3-cp-style-3-d-22-margin-right-3-a-0-in-3-b-text-align-3-ajustify-22-3-e-3-cspan-style-3-d-22-font-size-3-a-11-pt-22-3-e-3-cspan-style-3-d-27-font-family-3-a-tahoma-2-c-22-sans-serif-22-27-3-e-3-cspan-style-3-d-22-background-color-3-awhite-22-3-e-fiber-optic-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fspan-3-e-3-c-2-fp-3-e,3-cp-3-e-data-processing-is-also-known-as-3-a-3-c-2-fp-3-e_-_3-cp-3-e-computing-3-c-2-fp-3-e,3-cp-3-e-expansion-slots-connect-interface-cards-to-3-a-3-c-2-fp-3-e_-_3-cp-3-e-mother-board-3-c-2-fp-3-e,3-cp-3-e-freely-distributed-software-without-violating-copy-right-laws-are-called-3-a-3-c-2-fp-3-e_-_3-cp-3-e-none-3-c-2-fp-3-e,3-cp-3-e-how-a-virus-reaches-from-on-compute-to-another-3-f-3-c-2-fp-3-e_-_3-cp-3-e-data-is-exchanged-between-computers-3-c-2-fp-3-e,3-cp-3-e-in-ms-excel-2-c-formula-beings-with-3-a-3-c-2-fp-3-e_-_3-cp-3-e-3-d-3-c-2-fp-3-e,which-topology-uses-multiple-star-topologies_-_tree
Questions | 16 |
---|---|
Available | Always |
Pass rate | 45 % |
Backwards navigation | Allowed |