1. Hackers ………………
(A) all have the same motive
(B) are people who maintain computers
(C) may legally break into computers as long as they do not do any damage
(D) break into other people's computers
Answer: break into other peoples computers
2. Unauthorised copying of software to be used for personal gain instead of for
personal backups is called ………………
(A) program thievery
(B) data snatching
(C) software piracy
(D) program looting
Answer: software piracy
3. Junk e-mail is also called ………………
(A) spam
(B) spoof
(C) cookie crumbs
(D) sniffer script
Answer: spam
4. What is usually used for displaying information at public places ?
(A) Monitors
(B) Overhead Projections
(C) Monitors and Overhead Projections
(D) Touch Screen Kiosks
Answer: Overhead Projections
5. What is MP3 ?
(A) A Mouse
(B) A Printer
(C) A Sound Format
(D) A Scanner
Answer: A Sound Format
6. What is the most popular hardware for multimedia creations ?
(A) PCs
(B) Minicompiiters
(C) Mainframe Computers
(D) WANs
Answer: PCs
7. For sound recording, what is necessary ?
(A) Speaker
(B) Microphone
(C) Talker
(D) Mouse
Answer: Microphone
8. The life-span of a CD-ROM is………………
(A) approximately one year
(B) approximately two years
(C) approximately five years
(D) approximately twenty-five years
Answer: approximately five years
9. The ……………… settings are automatic and standard.
(A) default
(B) CPU
(C) peripheral
(D) user frien9ly
Answer: default
10. What are the two parts of an E-mail address ?
(A) User name and street address
(B) Legal name and phone number
(C) User name and domain name
(D) Initials and password
Answer: User name and domain name
11. Participants can see and hear each other in a/an ………………
(A) electronic mail system
(B) message system
(C) tele-conference
(D) bulletin board
Answer: tele-conference
12. Magnetic tape is not practical for applications where data must be quickly
recalled because tape is ………………
(A) a random-access medium
(B) expensive
(C) a read-only medium
(D) a sequential-access medium
Answer: a sequential-access medium
13. Why should you delete unknown e-mail attachments ?
(A) You could go to jail
(B) The person could track you down and hurt you
(C) It is bad manners
(D) It might contain a virus that could hurt your computer
Answer: It might contain a virus that could hurt your computer
14. How is it possible that both programs and data can be stored on the same
floppy disk ?
(A) A floppy disk has two sides, one for data and one for programs
(B) A floppy disk has to be formatted for one or for the other
(C) Programs and data are both software, and both can be stored on any memory
device
(D) Floppy disks can only store data, not programs
Answer: Programs and data are both software, and both can be stored on any memory device
15. What is an embedded system ?
(A) A program that comes wrapped in a box
(B) A program that is permanently part of a computer
(C) A computer that is part of a larger computer
(D) A computer and software system that controls a machine or appliance
Answer: A computer and software system that controls a machine or appliance
16. Which of the following will you require to hear music on your computer ?
(A) Video Card
(B) Tape Recorder
(C) Mouse
(D) Sound Card
Answer: Sound Card
17. The signal that a computer is waiting for a command from the user is ………………
(A) prompt
(B) event
(C) time slice
(D) interrupt
Answer: prompt
18. This software allows the user to move from page to page on the Web by
clicking on or selecting a hyperlink, or by typing in the address of the
destination page ………………
(A) Web browser
(B) Web search engine
(C) Web homepage
(D) Web service
Answer: Web browser
19. For viewing video CDs, you would use………………
(A) CD Player
(B) Windows Media Player
(C) Windows Video Player
(D) Windows Movie Player
Answer: Windows Media Player
20. Executing more than one program concurrently by one user on one computer is
known as ………………
(A) multi-programming
(B) multi-processing
(C) time-sharing
(D) multi-tasking
Answer: multi-tasking
21. Which of the following controls the manner of interaction between the user
and the operating system ?
(A) language translator
(B) platform
(C) user interface
(D) icon
Answer: user interface
22. You can keep your personal flies / folders in ………………
(A) My Folder
(B) My Documents
(C) My Files
(D) My Text
Answer: My Documents
23. Three types of compact disks include CD-ROM, CD-R, and ………………
(A) CD-W
(B) CD-RAM
(C) CD-DVD
(D) CD-RW
Answer: CD-RW
24. All computers must have ………………
(A) Word processing software
(B) An operating system
(C) A printer attached
(D) A virus checking program
Answer: An operating system
25. Collecting personal information and effectively posing as another individual
is known as the crime of ………………
(A) spooling
(B) spoofing
(C) hacking
(D) identity theft
Answer: identity theft
No comments:
Post a Comment