Sunteți pe pagina 1din 5

COMPUTER PAST SQE

1. Which of the following is not necessary in order to attain computer literacy?

a. Ability to interact with a computer

b. Expertise in computer programming

c. Knowledge of the basics of how computer work

d. Awareness of the importance of computers

2. Characteristics of computers include all the following except:

a. Reliability of accurate results

c.

Capacity for high storage volume

b. Speed of processing

d.

Propensity to make errors

3. Most computer errors are caused by:

a. Humans

c.

Hardware Failures

b. Data corruption

d.

Program Bugs

4. A computer program is considered to be:

a. Network

c.

User

b. Hardware

d.

Software

5. The set of instructions that tell a computer what to do is called a:

a. Program

c.

Instruction Set

b. Programmer

d.

System

6. Another term for processed data is:

a. Information

c.

Processor

b. Storage

d.

Output Device

7. The general term used for describing software that helps solve everyday personal or business

tasks is:

a. Application Software

c.

Custom Software

b. Vertical Software

d.

System Software

8. Software that controls the computing resources, such as an operating system, is referred to as:

a. System Software

c.

Application Software

b. Custom Software

d.

Vertical Software

9. A software’s documentation is:

a. The purchase agreement for the software

b. The instructions for using the software

c. The data that user’s input into the computer when running the software

d. The program code written by the computer programmer

10. Software that has not been copyrighted is considered to be:

a. Open Source

c.

Public Domain

b. Software Piracy

d.

Shareware

11. In order for programmers to be able to modify a program’s operations,

a. They must purchase a site license

b. The program must be machine-readable

c. The source code must be available

d. The software cannot be copyrighted

12. Another term for commercial software is:

a. Spreadsheet Software

c.

ASP

b. Packaged Software

d.

Private Software

13. An operating system is considered to be:

a. System Software

c.

Application Software

b. Computer Hardware

d.

Memory

14. Which of the following types of software would not be considered to be system software?

a. Spreadsheet Software

c.

Operating Software

b. Program Language Translators

d.

Utility Programs

15. The program that initiates in the bootstrapping process permanently resides:

a. On a CD

c.

In the computer’s RAM

b. On the Hard Drive

d.

In the computer’s ROM

16. Which of the following operating systems offers only a command-line user interface?

a. Windows XP

c.

Linux

b. MS Dos

d.

Mac OS

17. All of the following involve using the computer’s monitor in the input process except:

a. Electronic Pen

c.

Touch Screen

b. Touch Pad

d.

Kiosk

18. Converting a document image into text that can be edited in a word processor requires special software for:

a. Discrete Word Systems

c.

Document Imaging

b. Optical Character Recognition

d.

Continuous Word Systems

19. A decentralized data communications network is considered to be:

a. Server

c.

LAN

b. Distributed

d.

Internet

20. A computer system that uses communications equipment to connect two or more computers and their resources is:

a. Intranet

c.

LAN

b. Network

d.

Modem

21. To represent binary digits in an analog signal, one can:

a. Alter the amplitude of a carrier wave

c.

Modulate the signal

b. Duplex a carrier wave

d.

Demodulate the signal

22. The feature by which word processing program recognizes that the word being typed in by a user won’t fit on a line, and therefore moves it to the next line, is called:

a. Text Justification

c.

Margin Set

b. Word Wrap

d.

Autoformat

23. The benefit of word wrap is to:

a. Wrap a highlight around text for the purpose of selecting and copying

b. Automatically move full words of text that don’t fit on one line to the next

c. Allow the user to control the type of text justification in the document

d. Remind the user to hit the enter key for each line of text.

24. The first electronic spreadsheet program was called:

a. VisiCalc

c.

Lotus

b. Excel

d.

Quanto Pro

25. The total number of columns in most electronic spreadsheets is:

a. 1024

c.

26

b. 100

d.

256

26. Older systems that often contain data of poor quality are called

systems.

a. Controlled

c.

Database

b. Legacy

d.

Mainframe

27. The most common source of database failures on organization is:

a. Lack of planning

c.

Inadequate hardware

b. Inadequate budget

d.

Failure to implement a strong DBA

28. Which of the following is not a component of an information systems architecture:

a. Data

c.

Networks

b. Hardware

d.

Reasons for events and rules

29. The SDLC phase in which functional data specifications and processing rules are created is the phase.

a. Planning

c.

Analysis

b. Design

d.

Implementation

30. A requirement to begin designing physical files and database is:

a. Normalize relations

c.

Technology descriptions

b. Definitions of each attribute

d.

All of the above

31. One of the most popular RAD methods is:

a. Automated Design

c.

Prototyping

b. Structured Walkthrough

d.

Crafting

32. The first in a series of steps to follow when creating a table is to:

a. Identify columns that must be unique

b. Identify columns that must be null

c. Identify each attribute and its characteristics

d. Create an index

33. User-defined data types:

a. Can be a subclass of a standard type

c.

Can have define functions and methods

b. Can behave as an object

d.

All of the above

34. Which of the following have affected the way businesses use computing systems to meet the demand of the competitive marketplace?

a. GUI evolutions

c.

Communication changes

b. Networking advances

d.

All of the above

35. A device that manages file operations and is shared by each client PC on a LAN is called a:

a. File server

c.

Database server

b. File processor

d.

Fat client

36. A PC configured to handle user interface with little or no local storage is called a:

a. Server

c.

Thin client

b. Fat client

d.

Workstation

37. The most common bottleneck in a client/server environment is the:

a. Users

c.

Network

b. Software

d.

Company politics

38. All of the following are characteristics of the Web environment which have supported the rapid

adoption of Internet and intranet business applications except:

a. Simplicity and functional similarity of browsers

b. End-users buying habits

c. Software and hardware independence of browsers

d. Reduced development time and costs

39. A star schema contains both fact and

tables.

a. Narrative

c.

Dimension

b. Cross functional

d.

Starter

40. Quality data can be defined as being:

a. Unique

c.

Historical

b. Inaccurate

d.

Precise

41. Which of the following is true of poor data and/or database administration?

a. Data timing problems

c.

Unknown meaning of stored data

b. Multiple entity definitions

d.

All of the above

42. is a technical function responsible for database design, security, and disaster recovery.

a. Data administration

c.

Technical support

b. Database administration

d.

Operations

43. An open-source DBMS is:

a. Free source code RDMS that provides the functionality of an SQL-compliant DBMS

b. Beta release of a commercial RDBMS

c. Object oriented Database Management System

d. Source Code for a commercial RDBMS

44. Which of the following is a type of network security:

a. Authentication of the client workstation

b. Password naming conventions

c. Guidelines for frequency of password changes

d. All of the above

45. Controls designed to restrict access and activities are called:

a. Schemas

c.

Encryptions Controls

b. Business Rules

d.

Authorization Rules

46. A device to measure or detect fingerprints or signatures is called a(n)

device.

a.

Biometric

c.

Ink

b.

View

d.

Laser

A(n)

47. is a database stored on multiple computers in multiple locations that are not

connected by a data communications link.

a. Distributed database

c.

Unlinked database

b. Decentralized database

d.

Data repository

48. Which of the following is true of distributed databases?

a. Less reliable

c.

Slower response time

b. Better local control

d.

None of the above

49. Which of the following is an advantage to data replication?

a. Reliability

c.

Node decoupling

b. Fast response

d.

All of the above

50. Which of the following is a reason for using an object oriented design?

a.

The analysis model is not formal enough to be implemented in a programming language.

b.

The actual system must be adapted to the environment in which the system will actually be

implemented.

c.

The analysis results can be validated using object-oriented design

c.

All of the above

ANSWER KEY:

1. B

2. D

3. A

4. D

5. A

6. A

7. A

8. A

9. B

10. C

11. C

12. B

13. A

14. A

15. D

16. B

17. B

18. B

19. B

20. B

21. D

22. B

23. B

24. A

25. D

26. B

27. D

28. B

29. B

30. D

31. C

32. C

33. C

34. D

35. A

36. C

37. C

38. A

39. C

40. A

41. D

42. B

43. A

44. D

45. D

46. A

47. B

48. B

49. D

50. D