1. Registers are located in _____
a) Memory
b) ALU
c) OS
d) CPU
e) None of these
2. ODBC stands for
a) object database connectivity
b) oral database connectivity
c) oracle database connectivity
d) open database connectivity
e) none of these
3. Which kind of malware typically has a tendency to reside in/to get attach to a computer program?
a) Worm
b) Trojan Horse
c) Computer Virus
d) All the Above
e) None of the above
4. What does router do in a network?
a) forwards a packet to all outgoing links
b) forwards a packet to the next free outgoing links
c) determines on which outgoing link a packet is to be forwarded
d) forwards a packet to all outgoing links except the originated link
e) none of these
5. Each cell in a Microsoft office excel document is referred to by its cell address, which is the…
a) cell's column label
b) cell's column label and work sheet tab name
c) cell's row and column labels
d) cell's row label
e) none of these
6. Windows 7 is an example of a(n)
a) Application software
b) browser
c) operating system
d) shareware
e) none of these
7. Many individuals create their own personal sites called web logs or
a) Social network
b) blogs
c) wikis
d) search engines
e) none of these
8. Programs that automatically submit your search request to several search engines simultaneously are called
a) Meta search engines
b) inclusive search engines
c) spiders
d) hits
e) none of these
9. LINKEDIN is a _____
a) Search Engine
b) Web Browser
c) Social Networking Site
d) Name of Operating System
e) None of these
10. A computer that is on the network is a
a) Node
b) terminal
c) client
d) online
e) none of these
11. The name a user assigns to a document is called a(n)
a) File name
b) Program
c) Record
d) Data
e) None of these
12. The system /tool which has made it possible to reduce paper work in offices is_______:
a) LAN
b) WAN
c) E-mail
d) Paper shredder
e) None of these
13. Decision support system in banking technology means a system which_____:
a) Allows creation of simulations
b) Allows analyzing created situations
c) Dont Allows creation of simulations
d) a, b
e) None of these
14. Computer audit involves review of ____
a) Established policies
b) Efficiency of operations
c) Checking of data integrity
d) All
e) None of these
15. The electronic payment system seeks to automate financial transactions as far as possible. What is the most popular electronic payment system?
a) The ATM
b) The HWAK
c) Electronic Purse
d) Electronic Cheque
e) None of these
16. The ____ is a device that connects in inputs to out puts
a) cross point
b) crossbar
c) modem
d) RAM
e) none of these
17. Which multiplexing technique transmits analogue signals?
a) FDM
b) synchronous TDM
c) asynchronous TDM
d) 2 and 3
e) none
18. ______was a search engine
system for the Gopher protocol
a) gobbler
b) archie
c) mikky
d) veronica
e) none of these
19. array is _____
a) linear data structure
b) object
c) class
d) interface
e) none of these
20. Flash memory is a type of ___ ?
a) ROM
b) PROM
c) EPROM
d) EEPROM
e) RAM
21. Data going into the computer is called
a) output
b) algorithm
c) input
d) flowchart
e) all of these
22. How many values can be represented by a single byte?
a) 4
b) 16
c) 64
d) 256
e) 512
23. Transformation of input into output is performed by
a) Peripherals
b) memory
c) storage
d) the input output unit
e) the CPU
24. Which of the following refers to a small , single site network?
a) LAN
b) DSL
c) RAM
d) USB
e) CPU
25. A set of instructions telling the computer what to do is called
a) Mentor
b) instructor
c) compiler
d) program
e) debugger
26. Computer connected to a LAN can
a) run faster
b) go on line
c) share information
d) E-mail
e) none
27. Which of the following refers to the memory in your computer?
a) RAM
b) DSL
c) USB
d) LAN
e) CPU
28. Information travels between components on the motherboard through
a) flash memory
b) CMOS
c) bays
d) buses
e) peripherals
29. One megabyte equals approximately
a) 1000 bytes
b) 1000 bits
c) 1 million bytes
d) 1 million bits
e) 2000 bytes
30. When you are working on a document on pc, where is the document temporarily stored ?
a) RAM
b) ROM
c) the CPU
d) flash memory
e) the cd-ROM
31. If the system has no ability to store data then it is a _____
a) Dump terminal
b) Computer
c) Microprocessor
d) Microcontroller
e) Mini processor
32. _____ is an electronic device for reading printed barcodes.
a) Barcode reader
b) Barcode scanner
c) Bar code converter
d) Both a & b
e) None of these
33. The simultaneous processing of two or more Programs by multiple processors is
a) Multiprogramming
b) Multitasking
c) Time-sharing
d) Multiprocessing
e) None
34. The advantage of touch screen is ____.
a) that it is not as tiring as the keyboard input
b) that it uses little screen space for each choice
c) that it is natural to touch things
d) All of the above
e) None
35. A hacker contacts you my phone or email and attempts to acquire your password
a) Spoofing
b) phishing
c) spamming
d) bugging
e) None of these
36. Getting an instruction from the main memory to the CPU is known as _______.
a) getting
b) gathering
c) fetching
d) framing
e) downloading
37. A silicon chip containing CPU, ALU and some memory is known as _________.
a) Microcontroller
b) Microprocessor
c) Computer
d) Minicomputer
e) Laptop
38. Which of the following problem causes an exception?
a) Missing semicolon in statement in main
b) A problem in calling function
c) A syntax error
d) A run-time error
e) None of these
39. A computer derives its basic strength from
a) Speed
b) Accuracy
c) Memory
d) All the above
e) None of the above
40. To access a mainframe or supercomputer, users often use a ___.
a) terminal
b) node
c) desktop
d) handheld
e) None of these
41. Which of the following is not a mode in starting windows
a) Command Prompt
b) Safe Mode
c) Normal Mode
d) Turbo Mode
e) None of these
42. Which of the following process rearranges file fragments into contiguous files:
a) Folder folding
b) Defragmentation
c) Unfragging
d) Disk scanning
e) None of these
43. Which of the following server stores and manages files for network users?
a) Authorization Server
b) Main Server
c) Web Server
d) File Server
e) None of these
44. Custom software developed to address specific needs of a company is usually referred to as:
a) Developmental
b) Privately owned
c) Copyrighted
d) Proprietary
e) None of these
45. CD-ROM stands for:
a) Central Disk - Remote Open Mouse
b) CD - Resize
c) CD- Read Only Memory
d) CD-Remote Open Mouse
e) None of these
46. What is the name of an application program that gathers user information and sends it to someone through internet?
a) Virus
b) Spybot
c) Logic Bomb
d) Security Patch
e) None of these
47. Server or computer that provide resources to other computers connected to a?
a) Network
b) Mainframe
c) Supercomputer
d) Client
e) None of these
48. Which of the following is the fastest memory?
a) DDR RAM
b) DDR2 RAM
c) DDR3 RAM
d) Swap Memory
e) None of these
49. "Process" in computer terminology is synonymous to which of the following?
a) Job
b) Program
c) Task
d) Method
e) Call
ANSWERS:
1) d; 2) d; 3) c; 4) c; 5) c; 6) c; 7) b; 8) a; 9) c; 10) a;
11) a; 12) c; 13) d; 14) d; 15) a; 16) c; 17) a; 18) d; 19) a; 20) d;
21) c; 22) d; 23) d; 24) a; 25) d; 26) c; 27) a; 28) d; 29) c; 30) d;
31) a; 32) d; 33) d; 34) c; 35) b; 36) c; 37) b; 38) d; 39) d; 40) a;
41) d; 42) b; 43) d; 44) d; 45) c; 46) b; 47) a; 48) c; 49) c.
a) Memory
b) ALU
c) OS
d) CPU
e) None of these
2. ODBC stands for
a) object database connectivity
b) oral database connectivity
c) oracle database connectivity
d) open database connectivity
e) none of these
3. Which kind of malware typically has a tendency to reside in/to get attach to a computer program?
a) Worm
b) Trojan Horse
c) Computer Virus
d) All the Above
e) None of the above
4. What does router do in a network?
a) forwards a packet to all outgoing links
b) forwards a packet to the next free outgoing links
c) determines on which outgoing link a packet is to be forwarded
d) forwards a packet to all outgoing links except the originated link
e) none of these
5. Each cell in a Microsoft office excel document is referred to by its cell address, which is the…
a) cell's column label
b) cell's column label and work sheet tab name
c) cell's row and column labels
d) cell's row label
e) none of these
6. Windows 7 is an example of a(n)
a) Application software
b) browser
c) operating system
d) shareware
e) none of these
7. Many individuals create their own personal sites called web logs or
a) Social network
b) blogs
c) wikis
d) search engines
e) none of these
8. Programs that automatically submit your search request to several search engines simultaneously are called
a) Meta search engines
b) inclusive search engines
c) spiders
d) hits
e) none of these
9. LINKEDIN is a _____
a) Search Engine
b) Web Browser
c) Social Networking Site
d) Name of Operating System
e) None of these
10. A computer that is on the network is a
a) Node
b) terminal
c) client
d) online
e) none of these
11. The name a user assigns to a document is called a(n)
a) File name
b) Program
c) Record
d) Data
e) None of these
12. The system /tool which has made it possible to reduce paper work in offices is_______:
a) LAN
b) WAN
c) E-mail
d) Paper shredder
e) None of these
13. Decision support system in banking technology means a system which_____:
a) Allows creation of simulations
b) Allows analyzing created situations
c) Dont Allows creation of simulations
d) a, b
e) None of these
14. Computer audit involves review of ____
a) Established policies
b) Efficiency of operations
c) Checking of data integrity
d) All
e) None of these
15. The electronic payment system seeks to automate financial transactions as far as possible. What is the most popular electronic payment system?
a) The ATM
b) The HWAK
c) Electronic Purse
d) Electronic Cheque
e) None of these
16. The ____ is a device that connects in inputs to out puts
a) cross point
b) crossbar
c) modem
d) RAM
e) none of these
17. Which multiplexing technique transmits analogue signals?
a) FDM
b) synchronous TDM
c) asynchronous TDM
d) 2 and 3
e) none
18. ______was a search engine
system for the Gopher protocol
a) gobbler
b) archie
c) mikky
d) veronica
e) none of these
19. array is _____
a) linear data structure
b) object
c) class
d) interface
e) none of these
20. Flash memory is a type of ___ ?
a) ROM
b) PROM
c) EPROM
d) EEPROM
e) RAM
21. Data going into the computer is called
a) output
b) algorithm
c) input
d) flowchart
e) all of these
22. How many values can be represented by a single byte?
a) 4
b) 16
c) 64
d) 256
e) 512
23. Transformation of input into output is performed by
a) Peripherals
b) memory
c) storage
d) the input output unit
e) the CPU
24. Which of the following refers to a small , single site network?
a) LAN
b) DSL
c) RAM
d) USB
e) CPU
25. A set of instructions telling the computer what to do is called
a) Mentor
b) instructor
c) compiler
d) program
e) debugger
26. Computer connected to a LAN can
a) run faster
b) go on line
c) share information
d) E-mail
e) none
27. Which of the following refers to the memory in your computer?
a) RAM
b) DSL
c) USB
d) LAN
e) CPU
28. Information travels between components on the motherboard through
a) flash memory
b) CMOS
c) bays
d) buses
e) peripherals
29. One megabyte equals approximately
a) 1000 bytes
b) 1000 bits
c) 1 million bytes
d) 1 million bits
e) 2000 bytes
30. When you are working on a document on pc, where is the document temporarily stored ?
a) RAM
b) ROM
c) the CPU
d) flash memory
e) the cd-ROM
31. If the system has no ability to store data then it is a _____
a) Dump terminal
b) Computer
c) Microprocessor
d) Microcontroller
e) Mini processor
32. _____ is an electronic device for reading printed barcodes.
a) Barcode reader
b) Barcode scanner
c) Bar code converter
d) Both a & b
e) None of these
33. The simultaneous processing of two or more Programs by multiple processors is
a) Multiprogramming
b) Multitasking
c) Time-sharing
d) Multiprocessing
e) None
34. The advantage of touch screen is ____.
a) that it is not as tiring as the keyboard input
b) that it uses little screen space for each choice
c) that it is natural to touch things
d) All of the above
e) None
35. A hacker contacts you my phone or email and attempts to acquire your password
a) Spoofing
b) phishing
c) spamming
d) bugging
e) None of these
36. Getting an instruction from the main memory to the CPU is known as _______.
a) getting
b) gathering
c) fetching
d) framing
e) downloading
37. A silicon chip containing CPU, ALU and some memory is known as _________.
a) Microcontroller
b) Microprocessor
c) Computer
d) Minicomputer
e) Laptop
38. Which of the following problem causes an exception?
a) Missing semicolon in statement in main
b) A problem in calling function
c) A syntax error
d) A run-time error
e) None of these
39. A computer derives its basic strength from
a) Speed
b) Accuracy
c) Memory
d) All the above
e) None of the above
40. To access a mainframe or supercomputer, users often use a ___.
a) terminal
b) node
c) desktop
d) handheld
e) None of these
41. Which of the following is not a mode in starting windows
a) Command Prompt
b) Safe Mode
c) Normal Mode
d) Turbo Mode
e) None of these
42. Which of the following process rearranges file fragments into contiguous files:
a) Folder folding
b) Defragmentation
c) Unfragging
d) Disk scanning
e) None of these
43. Which of the following server stores and manages files for network users?
a) Authorization Server
b) Main Server
c) Web Server
d) File Server
e) None of these
44. Custom software developed to address specific needs of a company is usually referred to as:
a) Developmental
b) Privately owned
c) Copyrighted
d) Proprietary
e) None of these
45. CD-ROM stands for:
a) Central Disk - Remote Open Mouse
b) CD - Resize
c) CD- Read Only Memory
d) CD-Remote Open Mouse
e) None of these
46. What is the name of an application program that gathers user information and sends it to someone through internet?
a) Virus
b) Spybot
c) Logic Bomb
d) Security Patch
e) None of these
47. Server or computer that provide resources to other computers connected to a?
a) Network
b) Mainframe
c) Supercomputer
d) Client
e) None of these
48. Which of the following is the fastest memory?
a) DDR RAM
b) DDR2 RAM
c) DDR3 RAM
d) Swap Memory
e) None of these
49. "Process" in computer terminology is synonymous to which of the following?
a) Job
b) Program
c) Task
d) Method
e) Call
ANSWERS:
1) d; 2) d; 3) c; 4) c; 5) c; 6) c; 7) b; 8) a; 9) c; 10) a;
11) a; 12) c; 13) d; 14) d; 15) a; 16) c; 17) a; 18) d; 19) a; 20) d;
21) c; 22) d; 23) d; 24) a; 25) d; 26) c; 27) a; 28) d; 29) c; 30) d;
31) a; 32) d; 33) d; 34) c; 35) b; 36) c; 37) b; 38) d; 39) d; 40) a;
41) d; 42) b; 43) d; 44) d; 45) c; 46) b; 47) a; 48) c; 49) c.