Sunteți pe pagina 1din 5

COMPUTER PAST SQE

1. Which of the following is not necessary in order to attain computer literacy?


a. Ability to interact with a computer
b. Expertise in computer programming
c. Knowledge of the basics of how computer work
d. Awareness of the importance of computers
2. Characteristics of computers include all the following except:
a. Reliability of accurate results
c. Capacity for high storage volume
b. Speed of processing
d. Propensity to make errors
3. Most computer errors are caused by:
a. Humans
c. Hardware Failures
b. Data corruption
d. Program Bugs
4. A computer program is considered to be:
a. Network
c. User
b. Hardware
d. Software
5. The set of instructions that tell a computer what to do is called a:
a. Program
c. Instruction Set
b. Programmer
d. System
6. Another term for processed data is:
a. Information
c. Processor
b. Storage
d. Output Device
7. The general term used for describing software that helps solve everyday personal or business
tasks is:
a. Application Software
c. Custom Software
b. Vertical Software
d. System Software
8. Software that controls the computing resources, such as an operating system, is referred to as:
a. System Software
c. Application Software
b. Custom Software
d. Vertical Software
9. A softwares documentation is:
a. The purchase agreement for the software
b. The instructions for using the software
c. The data that users input into the computer when running the software
d. The program code written by the computer programmer
10. Software that has not been copyrighted is considered to be:
a. Open Source
c. Public Domain
b. Software Piracy
d. Shareware
11. In order for programmers to be able to modify a programs operations,
a. They must purchase a site license
b. The program must be machine-readable
c. The source code must be available
d. The software cannot be copyrighted
12. Another term for commercial software is:
a. Spreadsheet Software
c. ASP
b. Packaged Software
d. Private Software
13. An operating system is considered to be:
a. System Software
c. Application Software
b. Computer Hardware
d. Memory
14. Which of the following types of software would not be considered to be system software?
a. Spreadsheet Software
c. Operating Software
b. Program Language Translators
d. Utility Programs

15. The program that initiates in the bootstrapping process permanently resides:
a. On a CD
c. In the computers RAM
b. On the Hard Drive
d. In the computers ROM
16. Which of the following operating systems offers only a command-line user interface?
a. Windows XP
c. Linux
b. MS Dos
d. Mac OS
17. All of the following involve using the computers monitor in the input process except:
a. Electronic Pen
c. Touch Screen
b. Touch Pad
d. Kiosk
18. Converting a document image into text that can be edited in a word processor requires special
software for:
a. Discrete Word Systems
c. Document Imaging
b. Optical Character Recognition
d. Continuous Word Systems
19. A decentralized data communications network is considered to be:
a. Server
c. LAN
b. Distributed
d. Internet
20. A computer system that uses communications equipment to connect two or more computers
and their resources is:
a. Intranet
c. LAN
b. Network
d. Modem
21. To represent binary digits in an analog signal, one can:
a. Alter the amplitude of a carrier wave
c. Modulate the signal
b. Duplex a carrier wave
d. Demodulate the signal
22. The feature by which word processing program recognizes that the word being typed in by a
user wont fit on a line, and therefore moves it to the next line, is called:
a. Text Justification
c. Margin Set
b. Word Wrap
d. Autoformat
23. The benefit of word wrap is to:
a. Wrap a highlight around text for the purpose of selecting and copying
b. Automatically move full words of text that dont fit on one line to the next
c. Allow the user to control the type of text justification in the document
d. Remind the user to hit the enter key for each line of text.
24. The first electronic spreadsheet program was called:
a. VisiCalc
c. Lotus
b. Excel
d. Quanto Pro
25. The total number of columns in most electronic spreadsheets is:
a. 1024
c. 26
b. 100
d. 256
26. Older systems that often contain data of poor quality are called _____ systems.
a. Controlled
c. Database
b. Legacy
d. Mainframe
27. The most common source of database failures on organization is:
a. Lack of planning
c. Inadequate hardware
b. Inadequate budget
d. Failure to implement a strong DBA
28. Which of the following is not a component of an information systems architecture:
a. Data
c. Networks
b. Hardware
d. Reasons for events and rules
29. The SDLC phase in which functional data specifications and processing rules are created is the
_____ phase.
a. Planning
c. Analysis
b. Design
d. Implementation

30. A requirement to begin designing physical files and database is:


a. Normalize relations
c. Technology descriptions
b. Definitions of each attribute
d. All of the above
31. One of the most popular RAD methods is:
a. Automated Design
c. Prototyping
b. Structured Walkthrough
d. Crafting
32. The first in a series of steps to follow when creating a table is to:
a. Identify columns that must be unique
b. Identify columns that must be null
c. Identify each attribute and its characteristics
d. Create an index
33. User-defined data types:
a. Can be a subclass of a standard type
c. Can have define functions and methods
b. Can behave as an object
d. All of the above
34. Which of the following have affected the way businesses use computing systems to meet the
demand of the competitive marketplace?
a. GUI evolutions
c. Communication changes
b. Networking advances
d. All of the above
35. A device that manages file operations and is shared by each client PC on a LAN is called a:
a. File server
c. Database server
b. File processor
d. Fat client
36. A PC configured to handle user interface with little or no local storage is called a:
a. Server
c. Thin client
b. Fat client
d. Workstation
37. The most common bottleneck in a client/server environment is the:
a. Users
c. Network
b. Software
d. Company politics
38. All of the following are characteristics of the Web environment which have supported the rapid
adoption of Internet and intranet business applications except:
a. Simplicity and functional similarity of browsers
b. End-users buying habits
c. Software and hardware independence of browsers
d. Reduced development time and costs
39. A star schema contains both fact and _____ tables.
a. Narrative
c. Dimension
b. Cross functional
d. Starter
40. Quality data can be defined as being:
a. Unique
c. Historical
b. Inaccurate
d. Precise
41. Which of the following is true of poor data and/or database administration?
a. Data timing problems
c. Unknown meaning of stored data
b. Multiple entity definitions
d. All of the above
42. _____ is a technical function responsible for database design, security, and disaster recovery.
a. Data administration
c. Technical support
b. Database administration
d. Operations
43. An open-source DBMS is:
a. Free source code RDMS that provides the functionality of an SQL-compliant DBMS
b. Beta release of a commercial RDBMS
c. Object oriented Database Management System
d. Source Code for a commercial RDBMS
44. Which of the following is a type of network security:

45.

46.

47.

48.

49.

50.

a. Authentication of the client workstation


b. Password naming conventions
c. Guidelines for frequency of password changes
d. All of the above
Controls designed to restrict access and activities are called:
a. Schemas
c. Encryptions Controls
b. Business Rules
d. Authorization Rules
A device to measure or detect fingerprints or signatures is called a(n) _____ device.
a. Biometric
c. Ink
b. View
d. Laser
A(n) _____ is a database stored on multiple computers in multiple locations that are not
connected by a data communications link.
a. Distributed database
c. Unlinked database
b. Decentralized database
d. Data repository
Which of the following is true of distributed databases?
a. Less reliable
c. Slower response time
b. Better local control
d. None of the above
Which of the following is an advantage to data replication?
a. Reliability
c. Node decoupling
b. Fast response
d. All of the above
Which of the following is a reason for using an object oriented design?
a. The analysis model is not formal enough to be implemented in a programming language.
b. The actual system must be adapted to the environment in which the system will actually be
implemented.
c. The analysis results can be validated using object-oriented design
c. All of the above

ANSWER KEY:
1. B
2. D
3. A
4. D
5. A
6. A
7. A
8. A
9. B
10. C
11. C
12. B
13. A
14. A
15. D
16. B
17. B
18. B
19. B
20. B
21. D
22. B
23. B
24. A
25. D
26. B
27. D
28. B
29. B
30. D
31. C
32. C
33. C
34. D
35. A
36. C
37. C
38. A
39. C
40. A
41. D
42. B
43. A
44. D
45. D
46. A
47. B
48. B
49. D
50. D

S-ar putea să vă placă și