Thursday, 10 December 2020

General Computer Test - 80


1. Computers process data into information by working exclusively with :

(a)    multimedia

(b)    words

(c)     characters

(d)    numbers

(e)    None of these

Ans : (d)

2. The difference between people with access to computers and the Internet and those without this access is known as the :

(a)    digital divide

(b)    Internet divide

(c)     Web divide

(d)    broadband divide

(e)    None of these

Ans : (a)

3. The ability to recover and read deleted or damaged files from a criminal deleted computer is an example of a law enforcement specialty called :

(a)    robotics

(b)    simulation

(c)     computer forensic

(d)    animation

(e)    None of these

Ans : (c)

4. Where does most data go first with in a computer memory hierarchy?

(a)    RAM

(b)    ROM

(c)     BIOS

(d)    CACHE

(e)    None of these

Ans : (a)

5. Which command divides the surface of the blank disk into sectors and assign a unique address to each one

(a)    Ver

(b)    Format

(c)     Fat

(d)    Chkdsk

(e)    None of these

Ans : (b)

6. If you need to duplicate the entire disk, which command will you use?

(a)    Copy

(b)    Diskcopy

(c)     Chkdsk

(d)    Format

(e)    None of these

Ans : (b)

7. A………..sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

(a)    system virus

(b)    Trojan horse virus

(c)     file virus

(d)    macro virus

(e)    None of these

Ans : (e)

8. A result of a computer virus can not lead to………

(a)    Disk Crash

(b)    Mother Board Crash

(c)     Corruption of program

(d)    Deletion of files

(e)    None of these

Ans : (b)

9. Every computer connected to an intranet or extranet must have a distinct………..

(a)    firewall

(b)    proxy server

(c)     IP address

(d)    domain name

(e)    None of these

Ans : (b)

10. Programming language built into user programs such as Word and Excel are known as……………

(a)    4GLs

(b)    macro languages

(c)     object-oriented languages

(d)    visual programming languages

(e)    None of these

Ans : (d)

11. Firewalls are used to protect against………..

(a)    Unauthorized Attacks

(b)    Virus Attacks

(c)     Data Driven Attacks

(d)    Fire Attacks

(e)    All of these

Ans : (a)

12. Which of the following extensions suggest that the file is a backup copy

(a)    Bak

(b)    Bas

(c)     Com            

(d)    Txt

(e)    one of these

Ans : (a)

13.Computer programs are written in a high- level programming language; however, the human-readable version of a program is called…………..

(a)    cache

(b)    instruction set

(c)     source code             

(d)    word size

(e)    None of these

Ans : (c)

14.The software tools that enable a user to interact with a computer for specific purposes are known as………….

(a)    Hardware

(b)    Networked Software

(c)     Shareware

(d)    Applications

(e)    None of these

Ans : (d)

15. ……….processing is used when a large mail-order company accumulates orders and processes them together in one large set.

(a)    Batch

(b)    Online

(c)     Real-time

(d)    Group

(e)    None of these

Ans : (a)

16.When a file contains instructions that can be carried out by the computer, it is often called a(n) file.

(a)    data

(b)    information

(c)     executable

(d)    application

(e)    None of these

Ans : (c)

17. A compiler translates a program written in a high-level language into…………

(a)    Machine language

(b)    An algorithm

(c)     A debugged program

(d)    Java

(e)    None of these

Ans : (a)

18. A set of step-by-step procedures for accomplishing a task is known as a(n)……….

(a) algorithm

(b) hardware program

(c) software bug

(d) firmware program

(e) None of these

Ans : (a)

19. A complete electronic circuit with transistors and other electronic components on a small silicon chip is called a(n)…………

(a)    Workstation

(b)    CPU

(c)     Magnetic disk

(d)    Integrated circuit

(e)    None of these

Ans : (d)

20. A saved document is referred to as a ………….

(a)    file

(b)    word

(c)     folde

(d)    project

(e)    None of these

Ans : (a)

21. What is output?

(a)    What the processor takes from the user

(b)    What the user gives to the processor

(c)     What the processor gets from the user

(d)    What the processor gives to the user

(e)    None of these

Ans : (d)

22. When you turn on the computer, the boot routine will perform this test…………

(a)    RAM test

(b)    Disk drive test

(c)     Memory test

(d)    Power-on self-test

(e)    None of these

Ans : (b)

23. Which of the following storage media provides sequential access only?

(a)    Floppy disk

(b)    Magnetic disk

(c)     Magnetic tape

(d)    Optical disk

(e)    None of these

Ans : (a)

24. In word processing, an efficient way to move the 3rd paragraph to place it after the 5th paragraph is

(a)    copy and paste

(b)    copy, cut and paste

(c)     cut, copy and paste

(d)    cut and paste

(e)    None of these

Ans : (d)

25. The term ‘user interface’ refers to………..

(a)    What the user sees on the screen and how they can interact with it

(b)    How the operating system responds to user commands

(c)     the means by which the user interacts with the peripheral devices on the computer

(d)    The monitor that is available for the computer

(e)    None of these

Ans : (a)

No comments:

Post a Comment