1. To prevent the
loss of data during power failures, use a(n):
A. encryption program.
B. surge protector.
C. firewall.
D. UPS.
Answer: D
2. A(n) can shield
electronic equipment from power spikes.
A. encryption program
B. surge protector
C. firewall
D. UPS
Answer: B
3. All of these are
suggestions for safe computing EXCEPT:
A. don‘t borrow disks from other people.
B. open all e-mail messages but open them slowly.
C. download shareware and freeware with caution.
D. disinfect your system.
Answer: B
4. Freeware encrypts
data.
A. encryption
B. firewall software
C. PGP
D. private and public keys
Answer: C
5. is defined as any
crime completed through the use of computer technology.
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
Answer: B
6. Most computer
systems rely solely on for authentication.
A. logins
B. passwords
C. encryption
D. lock and key
Answer: B
7. Creating strong
computer security to prevent computer crime usually simultaneously helps protect
:
A. privacy rights.
B. personal ethics.
C. the number of cookies downloaded to your personal computer.
D. personal space.
Answer: A
8. Over was spent by
businesses and government to repair problems in regard to Y2K.
A. 20 million dollars
B. 100 million dollars
C. 1 billion dollars
D. 100 billion dollars
Answer: D
9. What is a complex
system that takes on nearly complete responsibility for a task eliminating the need
for people, verification, or decision-making?
A. Autonomous system
B. Missile defense auto-system
C. Smart weapon
D. Independent system
Answer: D
10. Security
procedures can:
A. will eliminate all computer security risk.
B. reduce but not eliminate risks.
C. are prohibitively expensive.
D. are inaccessible for the average home user.
Answer: B
6. Which of the following
is the largest unit of storage?
A) KB
B) MB
C) TC
D) GB
ANSWER:V
7. A(n) __________ is
a program that makes the computer easier to use.
A) application
B) utility
C) network
D) operating system
ANSWER:B
8. The contents of
__________ are lost when the computer turns off.
A) storage
B) input
C) output
D) memory
ANSWER: D
9. A __________ is an
electronic device that process data, converting it into information.
A) processor
B) computer
C) case
D) stylus
Answers
Answers: B
10. __________
computers represent data as variable points along a continuous spectrum of
values.
A) Analog
B) Digital
C) Precise
D) Mainframe
Answers: A
11. The ‘Difference
Analyzer’ was created in the early 1920s by __________.
A) Peter Norton
B) Douglas Knuth
C) Vannevar Bush
D) Alan Kay
Answers: C
12. Personal
computers can be connected together to form a __________.
A) server
B) supercomputer
C) network
D) enterprise
Answers: C
13. The main
component of a desktop PC is the __________ which houses the computer’s
critical parts.
A) processor
B) memory
C) keyboard
D) system case
Answers: D
14. To make a
notebook act as a desktop model, the notebook can be connected to a __________
which is connected to a monitor and other devices.
A) bay
B) docking station
C) port
D) network
Answers: B
15. Minicomputers are
also called __________ computers.
A) midrange
B) laptop
C) handheld
D) smart
Answers:A
16. The most
important or powerful computer in a typical network.
A) desktop
B) network client
C) network server
D) network station
Answers:D
17. The __________ is
used by the tablet PC to write on the screen.
A) finger
B) mouse
C) digitizer
D) stylus
Answers:C
18. Which of the following
is a part of the Central Processing Unit?
a. Printer
b. Key board
c. Mouse
d. Arithmetic & Logic unit
18.D
19. CAD stands for
a. Computer aided design
b. Computer algorithm for design
c. Computer application in design
d. Computer analogue design
19. A
20. Junk e-mail is
also called
a. spam
b. spoof
c. sniffer script
d. spool
20. A
21. Hackers
a. all have the same motive
b. break into other people's computers
c. may legally break into computers as long as they do not do any damage
d. are people who are allergic to computers
21. B
22. What type of
computers are client computers (most of the time) in a client-server system?
a. Mainframe
b. Mini-computer
c. Microcomputer
d. PDA
22.C
23. A computer cannot
'boot' if it does not have the
a. Compiler
b. Loader
c. Operating System
d. Assembler
23.C
24. The amount of
vertical space between lines of text in a document is called
a. double-space
b. line spacing
c. single space
d. vertical spacing
24.B
25. Example of
non-numeric data is
a. Employee address
b. Examination score
c. Bank balance
d. All of these
25.A
No comments:
Post a Comment