1. Computers process
data into information by working exclusively with :
(a) multimedia
(b) words
(c) characters
(d) numbers
(e) None of these
Ans : (d)
2. The difference
between people with access to computers and the Internet and those without this
access is known as the :
(a) digital divide
(b) Internet divide
(c) Web divide
(d) broadband divide
(e) None of these
Ans : (a)
3. The ability to
recover and read deleted or damaged files from a criminal deleted computer is
an example of a law enforcement specialty called :
(a) robotics
(b) simulation
(c) computer forensic
(d) animation
(e) None of these
Ans : (c)
4. Where does most
data go first with in a computer memory hierarchy?
(a) RAM
(b) ROM
(c) BIOS
(d) CACHE
(e) None of these
Ans : (a)
5. Which command
divides the surface of the blank disk into sectors and assign a unique address
to each one
(a) Ver
(b) Format
(c) Fat
(d) Chkdsk
(e) None of these
Ans : (b)
6. If you need to
duplicate the entire disk, which command will you use?
(a) Copy
(b) Diskcopy
(c) Chkdsk
(d) Format
(e) None of these
Ans : (b)
7. A………..sometimes
called a boot sector virus, executes when a computer boots up because it
resides in the boot sector of a floppy disk or the master boot record of a hard
disk.
(a) system virus
(b) Trojan horse virus
(c) file virus
(d) macro virus
(e) None of these
Ans : (e)
8. A result of a
computer virus can not lead to………
(a) Disk Crash
(b) Mother Board Crash
(c) Corruption of program
(d) Deletion of files
(e) None of these
Ans : (b)
9. Every computer
connected to an intranet or extranet must have a distinct………..
(a) firewall
(b) proxy server
(c) IP address
(d) domain name
(e) None of these
Ans : (b)
10. Programming
language built into user programs such as Word and Excel are known as……………
(a) 4GLs
(b) macro languages
(c) object-oriented languages
(d) visual programming languages
(e) None of these
Ans : (d)
11. Firewalls are
used to protect against………..
(a) Unauthorized Attacks
(b) Virus Attacks
(c) Data Driven Attacks
(d) Fire Attacks
(e) All of these
Ans : (a)
12. Which of the
following extensions suggest that the file is a backup copy
(a) Bak
(b) Bas
(c) Com
(d) Txt
(e) one of these
Ans : (a)
13.Computer programs
are written in a high- level programming language; however, the human-readable
version of a program is called…………..
(a) cache
(b) instruction set
(c) source code
(d) word size
(e) None of these
Ans : (c)
14.The software tools
that enable a user to interact with a computer for specific purposes are known
as………….
(a) Hardware
(b) Networked Software
(c) Shareware
(d) Applications
(e) None of these
Ans : (d)
15. ……….processing is
used when a large mail-order company accumulates orders and processes them
together in one large set.
(a) Batch
(b) Online
(c) Real-time
(d) Group
(e) None of these
Ans : (a)
16.When a file
contains instructions that can be carried out by the computer, it is often
called a(n) file.
(a) data
(b) information
(c) executable
(d) application
(e) None of these
Ans : (c)
17. A compiler
translates a program written in a high-level language into…………
(a) Machine language
(b) An algorithm
(c) A debugged program
(d) Java
(e) None of these
Ans : (a)
18. A set of
step-by-step procedures for accomplishing a task is known as a(n)……….
(a) algorithm
(b) hardware program
(c) software bug
(d) firmware program
(e) None of these
Ans : (a)
19. A complete
electronic circuit with transistors and other electronic components on a small
silicon chip is called a(n)…………
(a) Workstation
(b) CPU
(c) Magnetic disk
(d) Integrated circuit
(e) None of these
Ans : (d)
20. A saved document
is referred to as a ………….
(a) file
(b) word
(c) folde
(d) project
(e) None of these
Ans : (a)
21. What is output?
(a) What the processor takes from the user
(b) What the user gives to the processor
(c) What the processor gets from the user
(d) What the processor gives to the user
(e) None of these
Ans : (d)
22. When you turn on
the computer, the boot routine will perform this test…………
(a) RAM test
(b) Disk drive test
(c) Memory test
(d) Power-on self-test
(e) None of these
Ans : (b)
23. Which of the following
storage media provides sequential access only?
(a) Floppy disk
(b) Magnetic disk
(c) Magnetic tape
(d) Optical disk
(e) None of these
Ans : (a)
24. In word
processing, an efficient way to move the 3rd paragraph to place it after the
5th paragraph is
(a) copy and paste
(b) copy, cut and paste
(c) cut, copy and paste
(d) cut and paste
(e) None of these
Ans : (d)
25. The term ‘user
interface’ refers to………..
(a) What the user sees on the screen and how they can interact with it
(b) How the operating system responds to user commands
(c) the means by which the user interacts with the peripheral devices on the computer
(d) The monitor that is available for the computer
(e) None of these
Ans : (a)