1. Which of the following could be digit input devices for computers?
(a) Digital camcorder
(b) Microphone
(c) Scanner
(d) All of these
(e) None of these
Ans : (d)
2. The……..enables you to simultaneously keep multiple Web pages open in one browser window.
(a) tab box
(b) pop-up-helper
(c) tab row
(d) address bar
(e) Esc key
Ans : (c)
3. You can use the bar to type a URL and display a Web page, or type a keyword to display a list of related Web pages.
(a) Menu
(b) Title
(c) Search
(d) Web
(e) Address
Ans : (e)
4. Storage media such as CD read and write information using………
(a) a laser beam of red light
(b) magnetic dots
(c) magnetic strips
(d) All of these
(e) None of these
Ans : (a)
5. The collection of links throughout the Internal creates an interconnected network called the…………
(a) Wide Area Web
(b) Web
(c) World Wide Web
(d) All of these
(e) None of these
Ans : (c)
6. Every computer has a(n)………..; many also have……….
(a) operating system, a client system
(b) operating system, instruction sets
(c) application programs, an operating system
(d) application programs, a client system
(e) operating system, application programs
Ans : (c)
7. Main memory works in conjunction with ………….
(a) special function cards
(b) RAM
(c) CPU
(d) Intel
(e) All of these
Ans : (c)
8. A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using
(a) input automation
(b) item data automation
(c) scanning automation
(d) source data automation
(e) None of these
Ans : (c)
9. A(n) …………composed of several computers connected together to share resources and data.
(a) internet
(b) network
(c) backbone
(d) hyperlink
(e) protocol
Ans : (b)
10. Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information………….
(a) floppy diskette
(b) hard disk
(c) permanent disk
(d) optical disk
(e) None of these
Ans : (b)
11. Microsoft Office is an example of a ……………
(a) closed-source software
(b) open-source software
(c) horizontal-market software
(d) vertical-market software
(e) compiler
Ans : (b)
12. A popular way to learn about computers without ever going to a classroom is called……..
(a) i-learning
(b) isolated learning
(c) e-learning
(d) close learning
(e) Distance learning
Ans : (c)
13. A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a……….
(a) spammer
(b) hacker
(c) instant messenger
(d) programmer
(e) analyst
Ans : (b)
14. Computer software can be defined as ………
(a) the computer and its associated equipment
(b) the instructions that tell the computer what to do
(c) computer components that act to accomplish a goal
(d) an interface between the computer and the network
(e) the interaction between the computer and its database
Ans : (b)
15. When speaking of computer input and output, input refers to……….
(a) any data processing that occurs from new data input into the computer
(b) retrieval of data or information that has been input into the computer
(c) data or information that has been entered into the computer
(d) the transmission of data that has been input into the computer
(e) Both (c) and (d)
Ans : (c)
16. There are several primary categories of procedures. Which of the following is not a primary category of procedures?
(a) Testing
(b) Backup and recovery
(c) Firewall development
(d) Design
(e) None of these
Ans : (d)
17. The operating system called UNIX is typically used for……….
(a) desktop computers
(b) laptop computers
(c) supercomputers
(d) Web servers
(e) All of these
Ans : (d)
18. The………..file format is a method of encoding pictures on a computer.
(a) HTML
(b) JPEG
(c) FTP
(d) URL
(e) DOC
Ans : (b)
19. Press…………to move the insertion point to the Address box, or highlight the URL in the Address box.
(a) ALT + D
(b) ALT + A
(c) SHIFT + TAB
(d) TAB + CTRL
(e) CTRL + S
Ans : (c)
20. Computer systems are comprised of………
(a) hardware, programs, information, people and networks
(b) hardware, software, procedures, networks, and people
(c) hardware, programs, information, people and procedures
(d) hardware, programs, processors, proce- dures, and people
Ans : (d)
21. Which of the following procedures can be done through net banking?
(a) Fund transfer
(b) Viewing recent transactions
(c) Payment of utility bills
(d) All of these
(e) None of these
Ans : (d)
22. Computers use the………..language to process data.
(a) processing
(b) code
(c) binary
(d) representational
(e) None of these
Ans : (c)
23. Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called………
(a) instructions
(b) programs
(c) commands
(d) application
(e) None of these
Ans : (a)
24. Malicious software is known as :
(a) badware
(b) malware
(c) malicious ware
(d) illegal ware
(e) None of these
Ans : (b)
25. …………is the measurement of things such as fingerprints and retinal scans used for security access.
(a) Biometrics
(b) Biomeasurement
(c) Computer Security
(d) Smart weapon machinery
(e) None of these
Ans : (a)