1. A collection of
program that controls how your computer system runs and processes information
is called
1) Operating System
2) Computer
3) Office
4) Compiler
5) Interpreter
Ans:-1
2. Computer connected
to a LAN (Local Area Network) can
1) run faster
2) go on line
3) share information and /or share peripheral equipment
4) E-mail
5) None
Ans:-3
3. Information
travels between components on the mother board through
1) Flash memory
2) CMOS
3) Bays
4) Buses
5) Peripherals
Ans:-3
4. How are data
organized in a spreadsheet?
1) Lines & spaces
2) Layers & Planes
3) Height & Width
4) Rows & Columns
5) None
Ans:-4
5. The blinking
symbol on the computer screen is called the
1) mouse
2) logo
3) hand
4) palm
5) cursor
Ans:-5
6. When you are
selecting a mouse for a particular computer system, what is the most important consideration?
(1) The type of drivers that come with the mouse
(2) The length of the mouse cord
(3) The type of connector the mouse is equipped with
(4) The number of buttons the mouse has
(5) None of these
Ans: (3)
7. How is power
supplied to a low-power USB device?
(1) Through a power cable
(2) From an external power supply
(3) Directly from the computers power supply
(4) Through the USB cable
(5) None of these
Ans: (4)
8. All of the
following are basic principles of net works, except —
(1) each computer must have a network card
(2) there must be communications media connecting the network hardware devices
(3) there must be at least one connecting device
(4) each computer must have software that supports the movement of information
(5) None of these
Ans: (2)
9.
The.............data mining technique derives rules from real-world case
examples.
(1) Rule discover
(2) Signal processing
(3) Neural nets
(4) Case-based reasoning
(5) None of these
Ans: (3)
10.
................are used to identify a user who returns to a Website.
(1) Cookies
(2) Plug-ins
(3) Scripts
(4) ASPs
(5) None of these
Ans: (1)
11. Computer uses the
.......... number system to store data and perform calculations.
(1) binary
(2) octal
(3) decimal
(4) hexadecimal
(5) None of these
ANSWER: 1
12. A disk's content
that is recorded at the time of manufacture and that cannot be changed or
erased by the user is-
(1) Memory-only
(2) Write-only
(3) Once-only
(4) Run-only
(5) Read-only
ANSWER: 5
13. Which of the
following can be used to select the entire document?
(1) CTRL + A
(2) ALT + F5
(3) SHIFT + A
(4) CTRL + K
(5) CTRL + H
ANSWER: 1
14. .......... are
attempts by individuals to obtain confidential information from you by
falsifying their identity.
(1) Phishing
(2) Computer viruses
(3) Spyware scams
(4) Viruses
(5) None of the above
ANSWER: 1
15. Port number, port
description, and number of ports ordered are examples of
(1) control
(2) output
(3) processing
(4) feedback
(5) input
ANSWER: 5
16. A Web site's main
page is called its-
(1) Home Page
(2) Browser Page
(3) Search Page
(4) Bookmark
(5) None of these
ANSWER: 1
17. The simultaneous
processing of two or more programs by multiple processors is-
(1) multiprogramming
(2) multitasking
(3) time-sharing
(4) multiprocessing
(5) None of these
ANSWER: 1
18. Codes consisting
of lines of varying widths or lengths that are computer-readable are known as-
(1) an ASCII code
(2) a magnetic tape
(3) an OCR scanner
(4) a bar code
(5) None of these
ANSWER: 4
19. To instruct Word
to fit the width of a column to the contents of a table automatically, click
the..... button and then point to AutoFit Contents.
(1) Fit to Form
(2) Format
(3) Autosize
(4) Contents
(5) AutoFit
ANSWER: 5
20. Why is it
unethical to share copyrighted files with your friends?
(1) It is not unethical, because it is legal.
(2) It is unethical because the files are being given for free.
(3) Sharing copyrighted files without permission breaks copyright laws.
(4) It is not unethical because the files are being given for free.
(5) It is not unethical-anyone can access a computer
ANSWER: 3
21. Reusable optical
storage will typically have the acronym-
(1) CD
(2) DVD
(3) ROM
(4) RW
(5) ROS
ANSWER: 4
22. The most common
type of storage devices are-
(1) persistent
(2) optical
(3) magnetic
(4) flash
(5) steel
ANSWER: 2
23. A device that
connects to a network without the use of cables is said to be-
(1) distributed
(2) free
(3) centralized
(4) open source
(5) None of these
ANSWER:5
24. A person who used
his or her expertise to gain access to other people's computers to get information
illegally or do damage is a-
(1) hacker
(2) analyst
(3) instant messenger
(4) programmer
(5) spammer
ANSWER: 1
25. To access
properties of an object, the mouse technique to use is-
(1) dragging
(2) dropping
(3) right-clicking
(4) shift-clicking
(5) None of these
ANSWER:3
No comments:
Post a Comment