Computer Knowledge
1.A_____ typically
connects personal computers within a very limited geographical area, usually
within a single building.
1) LAN 2) BAN 3) TAN
4) NAN 5) None of these
2. Computers
manipulate data in many ways, and this manipulation is called___
1) utilizing 2)
batching
3) upgrading 4)
processing
5) None of these
3.An e-mail address
typically consists of a user ID followed by the ____sign and the name of
the e-mail server
that manages the user's electronic post office box
1) @ 2) # 3) & 4) * 5) None of these
4. Software applies
________also called algorithms, to process data
1) arithmetic 2) procedures
3) objects 4) rules 5) None of these
5.A file extension is
separated from the mainfile name with a(n)______ but no spaces
1) question mark 2) exclamation mark
3) underscore 4) period 5) None of these
6. An ad hoc query is
a _____
1) pre-planned question
2) pre-scheduled question
3) spur-of-the moment question
4) question that will not return any results
5) None of these
7.A web _____
consists of one or more web pages located on a web server
1) hub 2) site 3) story
4) template 5) None of these
8.A computer ______is
a set of program instruction that can be attach itself to a file, reproduce
itself, and spread to other files
1) worm 2) virus
3) Trojan horse 4) phishing scam
5) None of these
9. The desktop
contains small graphic called_______
1) windows 2) logos 3) icons
4) pictures 5) None of these
10. C, BASIC, COBOL
and JAVA are examples of _________ languages
1) low-level 2) computer
3) system programming 4) high-level
5) None of these
11.A(n)_____camera is
a peripheral device used to capture still images in a digital format that can
be easily transferred into a computer and manipulated using graphic software
1) digital 2) analog 3) classic
4) film 5) None of these
12. ____ makes it
possible for shoppers to make purchase using their computers
1) E-world 2) E-commerce
3) E-spend 4) E-business
5) None of these
13. Networks are
monitored by security personal and supervised by __who set(s) up accounts and
password for authorized network users.
1) IT managers 2) the government
3) network administrators
4) password administrators
5) None of these
14.Application
software is designed to accomplish___
1) real-world task 2) computer-centric tasks
3) gaming tasks 4) operating system tasks
5) None of these
15.A telephone
number, a birth date and a customer name are all examples of__
1) a record 2) data 3) a file
4) a database 5) None of these
16. The
human-readable version of a program is called___
1) source code 2) program code
3) human code 4) system code
5) None of these
17.A_____ computer
(also referred to as a laptop), is a small, lightweight personal computer that
incorporates the screen, the keyboard, storage and processing components into a
single portable unit.
1) notebook 2) journal 3) diary
4) input 5) None of these
18. ______ is the
result produced by a computer
1) Data 2) memory 3) output
4) input 5) None of these
19. Programs such as
Internet Explorer that server as navigation windows into the web are
called_________
1) Hyper text 2) networks
3) internet 4) web browser
5) None of these
20.A____is a device
that not only provides surge protection, but also furnishes your computer
with battery backup
power during a power outage
1) surge strip 2) USB 3) UPS
4) battery strip 5) None of these
21. When you save
to_____ your data will remain intact even when the computer is turned off
1) RAM 2) motherboard
3) secondary storage device
4) primary storage device 5) None of these
22. The motherboard
is the____
1) circuit board that houses peripherals devices
2) same as the CPU chip
3) the first chip that is accessed when the computer is
turned on
4) circuit board that contains a CPU and other chips
5) None of these
23. A computer
intensive problem runs on a __
1) server 2) mainframe
3) super computer 4) super PC
5) None of these
24.A(n)____ convert
and executes one statement at a time
1) compiler 2) interpreter
3) converter 4) instruction 5) None of these
25. The term__
designates equipment that might be added to a computer system to enhance its
functionality
1) digital device 2) system add-on
3) disk pack 4) peripherals
5) None of these
26. Approximately how
many bytes make one megabyte?
1) One thousand 2) Ten thousand
3) One hundred 4) One million
5) None of these
27. What is MP3 ?
1) A mouse 2) A
Printer
3) A sound format 4) A Scanner
5) None of these
28. All the deleted
files goes to
1) Recycle Bin 2) Task Bar
3) Tool Bar 4) My
Computer
5) None of these
29. ______this is the
act of copying or downloading a program from a network and marking multiple
copies of it
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-licence piracy
5) None of these
30.A directory within
a directory is called______
1) Mini directory 2)
Junior directory
3) Part directory 4)
sub directory
5) None of these
31. Which is the best
definition of a software package?
1) An add-on for your computer such as additional memory
2) A set of computer program used for a certain function
such as word processing
3) a protection you can buy for a computer
4) The box, manual and licence agreement
5) None of these
32. In MICR, C stands
for _______
1) code 2) colour
3) computer 4) character
5) None of these
33. Fax machines and
imaging system are examples of _____
1) bar-code readers
2) imaging system
3) scanning devices
4) pen-based system
5) None of these
34. When writing a
document, you can use the ______ feature to find an appropriate word or an
alternative word if you find yourself stuck for the right word
1) dictionary 2) word finder
3) encyclopaedia 4) thesaurus
5) None of these
35. Which key is used
in combination with another key to perform a specific task?
1) Function 2) Control 3) Arrow
4) Space bar 5) None of these
36.A disk's content
that is recorded at the time of manufacture and that cannot be changed
or erased by the user
is____
1) read-only 2) memory-only
3) run-only 4) write-only 5) None of these
37. In an information
system, alphanumeric data normally takes the form of___
1) Sentence and paragraphs
2) Numbers and alphabetical
3) Graphic shapes and figures
4) Human voice and other sounds
5) None of these
38. A website's main
page is called its______
1) home page 2) browser page
3) search place 4) bookmark
5) None of these
39.A collection of
interrelated files in a computer is a _____
1) file manager 2) field 3) record
4) database 5) None of these
40. Which of the
following is not the part of standard office suite?
1) Word Processor 2) Database
3) Image Editor 4) File manager
5) None of these
41. Which of the
following is not a practical data-processing approach?
1) batch-sequential 2) batch-direct
3) immediate-sequential
4) immediate-direct 5) All of the above
42.A screen element
of MS Word that is usually located below the title bar that provides
categorized options
is
1) Menu mar 2) Tool Bar 3) Status Bar
4) All of the above 5) None of the above
43. The processes of
starting or restarting a computer system by loading instructions from a
secondary storage device into the computer memory is called
1) Duping 2) Booting 3) Padding
4) All of above 5) None of the above
44. Which one of the
following input device is user-programmable?
1) Dumb terminal 2) Smart terminal
3) VDT 4) Intelligent terminal
5) None of the above
45. The ability to
recover and read deleted or damaged files from a criminal's computer is an
example of a law enforcement specialty called:
1) robotics 2) simulation
3) computer forensics 4) animation
5) None of the above
46. Binary equivalent
of 10 is
1) 1110 2) 1010 3) 1011
4) 0111 5) None of the above
47. The easiest way
of broadcasting news in internet is known as
1) Blog 2) RSS feed 3) Portal
4) CBS Feed 5) None of the above
48.A 32 bit
microprocessor has the word length equal to?
1) 2 bytes 2) 32
bytes 3) 4 bytes
4) 8 bytes 5) None of
the above
49. Radio, TV
broadcasting comes under __________ transmission mode
1) Simplex 2) Half Duplex 3) Full Duplex
4) Duplex 5) None of the above
50.What is the name
of the temporary data storage area between a peripheral deviceand the CPU which
compensates for the difference between their speeds?
1) Backing storage 2)
Buffer
3) Main storage 4)
Temporary storage
5) None of the above
No comments:
Post a Comment