Documente Academic
Documente Profesional
Documente Cultură
2.
3.
4.
5.
6.
A file extension is separated from the main file name with a(n) _______, but no spaces.
1) question mark
2) exclamation mark
3) underscore
4) period
5) None of these
7.
A telephone number, a birth date, and a customer name are all examples of
1) a record
2) data
3) a file
4) a database
5) None of these
8.
The term _______ designates equipment that might be added to a computer system to
enhance its functionality.
1) digital device
2) system add-on
3) disk pack
4) peripheral device
5) None of these
9.
Which key is used in combination with another key to perform a specific task?
1) Function
2) Control
3) Arrow
4) Space bar
5) None of these
10. The real business and competitive value of information technology lies in
1) The software applications that are used by many companies
2) The capabilities of the software and value of the information, a business acquires and uses
3) The infrastructure of hardware, networks, and other IT facilities that are commonly used
by many companies
4) The capabilities of the hardware and the speed at which it processes information
5) None of these
11. OCR stands for _____
(1) Optical Character Recognition
(2) Optical CPU Recognition
(3) Optimal Character Rendering
(4) Other Character Restoration
(5) None of these
12. If a new device is attached to a computer, such as a printer or scanner, its ______ must be
installed before the device can be used.
1) buffer
2) driver
3) pager
4) server
5) None of these
13. The software that allows users to surf the Internet is called a/an
(1) Search engine
(2) Internet Service Provider (ISP)
(3) Multimedia application
(4) Browser
(5) None of these
14. A tuple is a
1) column of a table
2) two-dimensional table
3) row of a table
4) key of a table
5) None of these
15. The method of file organization in which data records in a file are arranged in a specified
order according to a key field is known as the
1) Direct access method
2) Queuing method
3) Predetermined method
4) Sequential access method
5) None of these
16. In Excel,_____ contains one or more worksheets.
1) Template
2) Workbook
3) Active cell
4) Label
5) None of these
17. Which of the following is a popular programming language for developing multimedia web
pages, websites, and web-based applications?
1) COBOL
2) Java
3) BASIC
4) Assembler
5) None of these
18. Compiling creates a(n) _____ .
1) program specification
2) algorithm
3) executable program
4) subroutine
5) None of these
19. A CD-RW disk
(1) has a faster access than an internal disk
(2) is a form of optical disk, so it can only be written once
(3) holds less data than a floppy disk
(4) can be erased and rewritten
(5) None of these
20. The first page of a Web site is called the
1) Home page
2) Index
3) Java Script
4) Book mark
5) None of these
__ provides a common address space and routes the packets of data across the entire
internet?
(1) IP
(2) TCP
(3) UDP
(4) ALU
(5) None of these
3. Cyberspace is being governed by a system of law and regulation called?
(1) Civil Law
(2) Criminal Law
(3) Electronic Law
(4) Cyber Law
(5) Cyber Authority
4. To move to the beginning of a line of text, press __key?
(1) Home
(2) Ctrl
(3) Space
(4) Enter
(5) None of these
5. What menu is selected to change the font and style?
(1) Tools
(2) File
(3) Format
(4) Edit
(5) None of these
6.
The process of starting the computer and loading of operating system programs for execution
is known as
(1) initialization
(2) retrieving
(3) loading
(4) searching
(5) booting
7. Primary memory is used by the:
(1) user
(2) input device
(3) CPU
(4) 948
(5) None of these
14. The ---------- button on the quick access toolbar allow you to cancel your recent
commands or action.
(1) Search
(2) Cut
(3) Document
(4) Undo
(5) None of these
15. What type of virus use computer hosts to reproduces it?
(1) Time bomb
(2) worm
(3) Melissa virus
(4) Macro virus
(5) None of these
16. ---------- is a signaling method that handles a relatively wide range of frequencies.
(1) Broadband
(2) DLF
(3) Dial-up
(4) both 1& 3
(5) None of these
17. Block on buffer caches are used:
(1) to handle interrupts
(2) to increase capacity of main memory
(3) to improve disk performance
(4)to speed up main memory read operation
(5) None of these
18. The term --- designate equipment that might be added to a computer system to enhance.
Its functionality.
(1) Digital device
(2) system add
(3) Disk pack
(4) Peripheral device
(5) None of these
19. A disk content that is recorded at the time of manufacture and that cannot be changed or
erased by the user.
(1) READ ONLY
(2) Memory only
(3) Run only
(4) WRITES ONLY
(5) None of these
20. A device designed to read information encoded onto a small plastic card is .
(1) light pen
Computer Quiz
1. The vast network of computers that connects millions of people all over the world is called.
(1)LAN
(2)web
(3)hypertext
(4)internet
(5)None of these
2. The property that, when classes are arranged in a hierarchy, each class assumes the
attributes and methods of its ancestors is
(1) generalization
(2) inheritance
(3) encapsulation
(4) information hiding
(5) None of these
3. The software component of an expert system that draws conclusions is the.
(1)user interface
(2)database
(3)inference engine
(4)1/0 controller
(5)model base
4. The attributes and methods for each object are stored in.
(1) an object instance
(2) an object connection
(3) an assembly structure
(4) an object repository
(5) None of these
5. An E-R diagram is a graphic method of presenting
(1) primary keys and their relationships
(2) primary keys and their relationships to instances
(3) entity classes and their relationships
(4) entity classes and their relationships to primary keys
(5) None of the above
6. The OCR is used for the preparation of
(1) electricity bills
(2) insurance premium
(3) telephone bills
(4) All of these
(5) None of these
Computer Quiz
1. Extension name of flash file is ___.
1) .pdf
2) .swf
3) .pmd
4) .prd
5) None of these
2. Who invented world wide web?
1) Mosaic corporation
2) Opera corporation
3) Tim berner lee
4) Vint cert
5) None of these
3. URL stands for ____.
1) Uniform Resource Locator
2) Universal resource locator
3) Address bar
4) All 1, 2 & 3 are correct
5) None of these
4. A thing present in real world in physical form is called____.
1) DBMS
2) Entity
3) Modulation
4) Keywords
5) None of these
5. BUG is 1) To find error in any software testing
2) To find error in any software code
3) logical error of any program
4) both 1 & 2
5) None of these
6. Which of the following is not a type of key?
1) Alphabetic Keys
2) Numeric keys
3) Function keys
4) Toggle keys
5) None of these
7. If a previously saved file is edited ___?
(1) it cannot be saved again
(2) the changes will automatically be saved in the file
(3) the file will only have to be saved again if it is more than one page in length
2. EEPROM permits?
(1) Read Permission only
(2) read and byte erase permission
(3) Read, byte erase and byte write operations
(4) Read, byte erase, byte write and chip erase operations
(5) None of these
3. The process of identifying specific rows and columns so that so that certain columns and
rows are always visible on the screen is called:
(1) Freezing
(2) locking
(3) Selecting
(4) fixing
(5) none
4. Where can you find the horizontal split bar on MS Word screen?
(1) On the left of horizontal scroll bar
(2) On the right of horizontal scroll bar
(3) On the top of vertical scroll bar
(4) On the bottom of vertical scroll bar
(5) None of these
5. A microprocessor is generally?
(1) Single chip SSI
(3) SMTP
(4) Telnet
(5) None of these
12. .com is related to(1) Personal Site
(2) Art
(3) Organization
(4) Commercial Organization
(5) None of these
13. Time sharing systems require:
(1) a number of terminals connected to a system
(2) memory protection mechanism to prevent a jobs instructions
(3) job status preservation mechanism to preserve a jobs status s
(4) an alarm clock mechanism to send an interrupt
(5) All of the above
14. Computers use the ____language to process data.
(1) processing
(2) kilobyte
(3) binary
(4) representational
(5) None of these
15. By default, your document will print in __ mode
(1) landscape
(2) portrait
(3) page setup
(4) print view
(5) None of these
16. Track ball is _______.
(1) Programming devices
(2) Pointing device
(3) Output device
(4) Software device
(5) Printing device
17. What is the meaning of page break up
(1) Page of document is break into small parts.
(2) Next part of the document will be started on the new page.
(3) Page of the document is break in small 2 sentences.
(4) Page of the document is break into small paragraph
(2)
(3)
(4)
(5)
six
seven
eight
None of these
17. System software is the set of programs that enables your computers
hardware devices and______ software to work together.
(1) management
(2) processing
(3) utility
(4) application
(5) None of these
18. ________ are specially designed computer chips which reside inside
other devices, such as your car or your electronic thermostat.
(1) Servers
(2) Embedded computers
(3) Robotic computers
(4) Mainframes
(5) None of these
19. The following are all computing devices , except
(1) notebook computers
(2) cellular telephones
(3) digital scanners
(4) personal digital assistants
(5) None of these
20. In a ring topology , the computer in possession of the______ can
trasmit data
(1) packet
(2) data
(3) access method
(4) token
(5) None of these
Computer Quiz
1. When you save to _______, your data will remain intact even when the computer is
turned off.
a. RAM
b. motherboard
c. secondary storage device
4) A scanner
5) None of these
8. All the deleted files go to
1) Recycle Bin
2) Task Bar
3) Tool Bar
4) My Computer
5) None of these
9. _______ is the act of copying or downloading a program from a network and making
multiple copies of it.
1) Network piracy
2) Plagiarism
3) Software piracy
4) Site-license piracy
5) None of these
10. A directory within a directory is called a _______.
1) Mini Directory
2) Junior Directory
3) Part Directory
4) Sub Directory
5) None of these
11. Which is the best definition of a software package?
a. An add-on for your computer such as additional memory
b. A set of computer programs used for a certain function such as word processing
c. A protection you can buy for a computer
d. The box, manual and licence agreement that accompany commercial software
e. None of these
12. In MICR, C stands for
1) Code
2) Colour
3) Computer
4) Character
5) None of these
13. Fax machines and imaging systems are examples of
1) bar-code readers
2) imaging systems
3) scanning devices
4) pen-based systems
5) None of these
14. When writing a document, you can use the _______ feature to find an appropriate
word or an alternative word if you find yourself stuck for the right word.
1) dictionary
2) word finder
3) encyclopedia
4) thesaurus
5) None of these
17. In an information system, alphanumeric data normally takes the form of
a. Sentences and paragraphs
b. Numbers and alphabetical characters
c. Graphic shapes and figures
d. Human voice and other sounds
e. None of these
19. When installing _______, the user must copy and usually decompress program files
from a CD-ROM or other medium to the hard disk.
1) programming software
2) system hardware
3) applications hardware
4) applications software
5) None of these
20. A collection of interrelated files in a computer is a _______.
1) file manager
2) field
3) record
4) database
5) None of these
Computer Quiz
1. A device operating at the physical layer is called a
1) Bridge
2) Router
3) Repeater
4) All of the above
5) None of these
5. ________ is when the more power-hungry components, such as the monitor and the
hard drive, are put in idle.
1) Hibernation
2) Power down
3) Standby mode
4) The shutdown procedure
5) None of these
7. The ________ key and the ________ key can be used in combination with other keys
to perform shortcuts and special tasks.
1) Control, Alt
2) Function, toggle
3) Delete, Insert
4) Caps Lock, Num Lock
5) None of these
8. The most common input devices are the ________ and the ________.
1) microphone, printer
2) scanner, monitor
3) digital camera, speakers
4) keyboard, mouse
5) None of these
9. To save an existing file with a new name or to a new location, you should use the
________ command.
1) Save
2) Save and Replace
3) Save As
4) New File
5) None of these
10. A(n) ________ is a combination of hardware and software that facilitates the
sharing of information between computing devices.
1) network
2) peripheral
3) expansion board
4) digital device
5) None of these
11.
1) megabyte
2) binary language
3) binary digit
4) binary number
5) None of these
12.
Computers gather data, which means that they allow users to ________ data.
1) present
2) input
3) output
4) store
5) None of these
13. Which of the following terms is just the connection of networks that can be joined
together ?
1) virtual private network
2) internet
3) intranet
4) extranet
5) None of these
14. ________ is a form of permanent memory that holds all the instructions the
computer needs to start up and does not get erased when the power is turned off.
1) The Network Interface Card (NIC)
2) The CPU
3) RAM
4) ROM
5) None of these
15. Servers are computers that provide resources to other computers connected to a
________
1) network
2) mainframe
3) supercomputer
4) client
5) None of these
Computer Quiz
1. What is the responsibility of the logical unit in the CPU of a computer?
a) Producing result
b) Comparing numbers
c) Controlling flow of information
d) Performing mathematical operations
e) Controlling flow of data
will be ___
a) 216
b) 65,536
c) 64K
d) 128K
e) 135K
4. Instructions and memory address are represented by ___
a) Character code
b) Binary code
c) Binary word
d) Parity bit
e) Bite code
5. The terminal device that functions as a cash register, computer terminal and OCR reader is:
a) Data collection terminal
b) OCR register terminal
c) Video Display terminal
d) POS terminal
e) None of the above
6. A set of flip flops integrated together is called ____
a) Counter
b) Adder
c) Register
d) Flip flop
e) All of the above
7. People often call ______ as the brain of computer system.
a) Control Unit
b) Arithmetic Logic Unit
c) Central Processing Unit
d) Storage Unit
e) Store data
8. Which of the following is used for manufacturing chips?
a) Bus
b) Control unit
c) Semiconductors
d) a and b only
e) None of the above
9. The value of each bead in heaven is ___
a) 1
b) 3
c) 5
d) 7
e) 8
11. Bluetooth is a type of radio wave information transmission system that is good for about:
a) 30 feet
b) 30 yards
c) 30 miles
d) 300 miles
e) 3000 miles
12. The telephone is an example of a(n)____ signal.
a) analog
b) digital
c) modulated
d) demodulated
e) compiler
13. Acredit card-sized expansion board that is inserted into portable computers that connects
the modem
to the telephone wall jack is:
a) Internal modem
b) External modem
c) PC Card modem
d) Wireless modem
e) Wired modem
14. A modem that is contained within the system unit is called:
a) External
b) Internal
c) Wireless
d) Wi-Fi
e) Bluetooth
15. A modem that doesn't need to be connected to a telephone line is the ___ modem.
a) external
b) internal
c) wireless
d) DSL
e) NSL
16. Aspecial high-speed line used by large corporations to support digital communications is
known as:
notify();
sleep();
yield();
interrupt();
is Interrupted();
call();
select();
top();
grant();
DTE/DCE interface
create()
insert()
rename()
drop()
Network Layer
Session Layer
Presentation Layer
Application Layer
6. What type of join is needed when you wish to include rows that do not have matching values?
Inner join
Outer join
equi join
None of these
All of these
7. Process is :
program in High level language kept on disk
a program in execution
255.0.0.0
255.255.0.0
255.255.255.0
255.255.255.255
None of these
Loop testing
Behavioral testing
None of these
Graph Testing
None of these
1. TELNET is
(1) running complex programs by logging on to supercomputers belonging to other countries
(2) a telephone call made by the help of Internet
(3) a software to perfect viral attack
(4) All of the above
(5) None of the above
2. Which one of the following computer language is not the procedure-oriented language?
(1) C-language
(2) FORTRAN
(3) COBOL
(4) Simula
(5) None of these
3. Which one of the following internet protocol version is the most deployed internet layer
protocol?
(1) IPv2
(2) IPv4
(3) IPv6
(4) IPv8
(5) None of these
4. Which one of the following malware is used in the Internet Relay chart channel or other
chart system to coordinate the activity of many infected computer?
(1) Keyloggers
(2) Adwares
(3) Dialers
(4) Botnets
(5) None of these
5. Which one of the following rebooting commonly occurs when the system of computer is
crashed?
(1) Soft rebooting
(2) Cold rebooting
(3) Hard rebooting
(4) Random rebooting
(5) None of the above
6. Which one of the following computers is the worlds first commercial computer?
(1) Ferranti Mar-I
(2) Mark-I Star
(3) UNIVAC-I
(4) IBM-704
(5) None of these