1. Computer can not do anything without a
(A) Chip
(B) Memory
(C) Output device
(D) Program
(E) None of these
ANSWER: (D)
2. A process known as ____________ is used by large retailers to study trends.
(A) data mining
(B) data selection
(C) POS
(D) data conversion
(E) None of these
ANSWER: (A)
3.Which generation of computers is covered by the period 1964-77?
(A) First
(B) Second
(C) Third
(D) Forth
(E) None of these
ANSWER: (C)
4. __________ is data that has been organized or presented in a meaningful fashion.
(A) A process
(B) Software
(C) Storage
(D) Information
(E) None of these
ANSWER: (D)
5. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
(A) Data
(B) Point-of-sale
(C) Sales
(D) Query
(E) None of these
ANSWER: (B)
6. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
(A) PSS
(B) POS
(C) inventory
(D) data mining
(E) None of these
ANSWER: (A)
7. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
(A) robotics
(B) simulation
(C) computer forensics
(D) animation
(E) None of these
ANSWER: (C)
8. Which of the following is not one of the four major data processing functions of a computer?
(A) gathering data
(B) processing data into information
(C) analyzing the data or information
(D) storing the data or information
(E) None of these
ANSWER: (C)
9. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
(A) POS
(B) RFID
(C) PPS
(D) GPS
(E) None of these
ANSWER: (B)
10. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as
(A) robotics
(B) computer forensics
(C) simulation
(D) forecasting
(E) None of these
ANSWER: (A)
11. Technology no longer protected by copyright, available to everyone, is considered to be:
(A) proprietary
(B) open
(C) experimental
(D) in the public domain
(E) None of these
ANSWER: (A)
12. All of the following are examples of real security and privacy risks except
(A) hackers
(B) spam
C. viruses
(D) identity theft
(E) None of these
ANSWER: (B)
13. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
(A) Nanoscience
(B) Microelectrodes
(C) Computer forensics
(D) Artificial intelligence
(E) None of these
ANSWER: (A)
14. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
(A) Nanoscience
(B) Nanotechnology
(C) Simulation
(D) Artificial intelligence
(E) None of these
ANSWER: (D)
15. The name for the way that computers manipulate data into information is called
(A) programming
(B) processing
(C) storing
(D) organizing
(E) None of these
ANSWER: (B)
16. Computers gather data, which means that they allow users to ____________ data.
(A) present
(B) input
(C) output
(D) store
(E) None of these
ANSWER: (B)
17. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
(A) data
(B) output
(C) input
(D) the process
(E) None of these
ANSWER: (B)
18. A ____ typically connects personal computers within a very limited geographical area, usually within a single building.
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
ANSWER: (A)
19. Computers manipulate data in many ways, and this manipulation is ca1led—
(A) utilizing
(B) hatching
(C) upgrading
(D) processing
(E) None of these
ANSWER: (D)
20. Programming language
1) A accurate notation used to express algorithms understand bycomputers
2) Instructions written in natural language
3) An algorithm expressed in a graphical form
4) All of the above
5) None of these
ANSWER: (A)
21. An e-mail address typically consists of a user ID followed by the ____ sign and the name of the e-mail server that manages the user’s electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
ANSWER: (A)
22. Software applies ____ also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
ANSWER: (A)
23. A file extension is separated from the main file name with a(n) ____ but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
ANSWER: (E)
24. An ad hoc query is a—
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the moment question
(D) question that will not return any results
(E) None of these
ANSWER: (B)
25. A Web ……… consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these
ANSWER: (B)
26. A computer ……… is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files.
(A) worm
(B) virus
(C) trojan horse
(D) phishing scam
(E) None of these
ANSWER: (B)
27. The desktop contains small graphics calledé
(A) windows
(B) logos
(C) icons
(D) pictures
(E) None of these
ANSWER: (C)
28. C, BASIC, COBOL, and Java are examples of ______ languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
ANSWER: (D)
29. A(n) _______ camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software.
(A) digital
(B) analog
(C) classic
(D) film
(E) None of these
ANSWER: (A)
30. _____ makes it possible for shoppers to make purchases using their computers.
(A) E-world
(B) Ecommerce
(C) E-spend
(D) E-business
(E) None of these
ANSWER: (D)
31. Networks are monitored by security personnel and super vised by _____who set(s) up accounts and passwords for authorized network users.
(A) IT managers
(B) the government
(C) network administrators
(D) password administrators
(E) None of these
ANSWER: (C)
32. Application software is designed to accomplish—
(A) real world tasks
(B) computer-centric tasks
(C) gaming tasks
(D) operating system tasks
(E) None of these
ANSWER: (D)
33. A telephone number, a birth date, and a customer name are all examples of
(A) a record
(B) data
(C) a file
(D) a database
(E) None of these
ANSWER: (D)
34. The human-readable version of a program is called—
(A) source code
(B) program code
(C) human code
(D) system code
(E) None of these
ANSWER: (D)
35. A ……… computer is a small, lightweight personal computer that incorporates the screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook
(B) journal
(C) diary
(D) briefcase
(E) None of these
ANSWER: (A)
36. ....... is the result produced by a computer.
(A) Data
(B) Memory
(C) Output
(D) Input
(E) None of these
ANSWER: (C)
37. Programs such as Internet Explorer that serve as navigable windows into the Web are
called......
(A) Hypertext
(B) Networks
(C) Internet
(D) Web browsers
(E) None of these
ANSWER: (D)
38. Which is an another name for functional language
(A) Machine
(B) Application
(C) Low-level language
(D) High-level language
(E) None of these
ANSWER: (B)
39. The first computer made available for commercial use was
(A) Mark-I
(B) ENIAC
(C) EDSAC
(D) UNIVAC
(E) None of these
ANSWER: (D)
40. Who is called the “grand father” of the computer?
(A) Blaise Pascal
(B) Charles Babbage
(C) Joseph Jacquard
(D) Dr. Herman Hollerith
(E) None of these
ANSWER: (B)
41. The first mechanical computer designed by Charles Babbage was called
(A) Abacus
(B) Processor
(C) Calculator
(D) Analytical Engine
(E) None of these
ANSWER: (D)
42. The motherboard is the—
(A) circuit board that houses peripheral devices
(B) same as the CPU chip
(C) the first dup that is accessed when the computer is turned on
(D) circuit board that contains a CPU and other chips
(E) None of these
ANSWER: (D)
43. The transformation of a message into an encoded form is known as
(A) Mnemonics
(B) Encoding
(C) Encryption
(D) Decoding
(E) None of these
ANSWER: (B)
44. Which is device that interconnect two or more network, enabling data transfer to be made between them
(A) Plotter
(B) Joystick
(C) Gateway
(D) Path
(E) None of these
ANSWER: (C)
45. Which of the following is directory controlled from a keyboard.
(A) Card punch
(B) punched paper tape
(C) Magnetic disk
(D) Magnetic tape
(E) None of these
ANSWER: (A)
46. Which of the following is a part of the Central Processing Unit
(A) Printer
(B) Keyboard
(C) Mouse
(D) Arithmetic Logic Unit
(E) None of these
ANSWER: (D)
47. Control Unit of a digital computer is often called the
(A) Clock
(B) Nerve center
(C) ICs
(D) All of the above
(E) None of these
ANSWER: (D)
48. A typical modern computer uses
(A) LSI chips
(B) Vacuum tubes
(C) Valves
(D) All the above
(E) None of these
ANSWER: (A)
49. A is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
(A) surge strip
(B) USB
(C) UPS
(D) battery strip
(E) None of these
ANSWER: (C)
50. When you save to _____ your data will remain intact even when the computer is turned off.
(A) RAM
(B) motherboard
(C) secondary storage device
(D) primary storage device
(E) None of these
ANSWER: (C)
(A) Chip
(B) Memory
(C) Output device
(D) Program
(E) None of these
ANSWER: (D)
2. A process known as ____________ is used by large retailers to study trends.
(A) data mining
(B) data selection
(C) POS
(D) data conversion
(E) None of these
ANSWER: (A)
3.Which generation of computers is covered by the period 1964-77?
(A) First
(B) Second
(C) Third
(D) Forth
(E) None of these
ANSWER: (C)
4. __________ is data that has been organized or presented in a meaningful fashion.
(A) A process
(B) Software
(C) Storage
(D) Information
(E) None of these
ANSWER: (D)
5. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
(A) Data
(B) Point-of-sale
(C) Sales
(D) Query
(E) None of these
ANSWER: (B)
6. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
(A) PSS
(B) POS
(C) inventory
(D) data mining
(E) None of these
ANSWER: (A)
7. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
(A) robotics
(B) simulation
(C) computer forensics
(D) animation
(E) None of these
ANSWER: (C)
8. Which of the following is not one of the four major data processing functions of a computer?
(A) gathering data
(B) processing data into information
(C) analyzing the data or information
(D) storing the data or information
(E) None of these
ANSWER: (C)
9. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
(A) POS
(B) RFID
(C) PPS
(D) GPS
(E) None of these
ANSWER: (B)
10. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as
(A) robotics
(B) computer forensics
(C) simulation
(D) forecasting
(E) None of these
ANSWER: (A)
11. Technology no longer protected by copyright, available to everyone, is considered to be:
(A) proprietary
(B) open
(C) experimental
(D) in the public domain
(E) None of these
ANSWER: (A)
12. All of the following are examples of real security and privacy risks except
(A) hackers
(B) spam
C. viruses
(D) identity theft
(E) None of these
ANSWER: (B)
13. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
(A) Nanoscience
(B) Microelectrodes
(C) Computer forensics
(D) Artificial intelligence
(E) None of these
ANSWER: (A)
14. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
(A) Nanoscience
(B) Nanotechnology
(C) Simulation
(D) Artificial intelligence
(E) None of these
ANSWER: (D)
15. The name for the way that computers manipulate data into information is called
(A) programming
(B) processing
(C) storing
(D) organizing
(E) None of these
ANSWER: (B)
16. Computers gather data, which means that they allow users to ____________ data.
(A) present
(B) input
(C) output
(D) store
(E) None of these
ANSWER: (B)
17. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
(A) data
(B) output
(C) input
(D) the process
(E) None of these
ANSWER: (B)
18. A ____ typically connects personal computers within a very limited geographical area, usually within a single building.
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
ANSWER: (A)
19. Computers manipulate data in many ways, and this manipulation is ca1led—
(A) utilizing
(B) hatching
(C) upgrading
(D) processing
(E) None of these
ANSWER: (D)
20. Programming language
1) A accurate notation used to express algorithms understand bycomputers
2) Instructions written in natural language
3) An algorithm expressed in a graphical form
4) All of the above
5) None of these
ANSWER: (A)
21. An e-mail address typically consists of a user ID followed by the ____ sign and the name of the e-mail server that manages the user’s electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
ANSWER: (A)
22. Software applies ____ also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
ANSWER: (A)
23. A file extension is separated from the main file name with a(n) ____ but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
ANSWER: (E)
24. An ad hoc query is a—
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the moment question
(D) question that will not return any results
(E) None of these
ANSWER: (B)
25. A Web ……… consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these
ANSWER: (B)
26. A computer ……… is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files.
(A) worm
(B) virus
(C) trojan horse
(D) phishing scam
(E) None of these
ANSWER: (B)
27. The desktop contains small graphics calledé
(A) windows
(B) logos
(C) icons
(D) pictures
(E) None of these
ANSWER: (C)
28. C, BASIC, COBOL, and Java are examples of ______ languages.
(A) low-level
(B) computer
(C) system programming
(D) high-level
(E) None of these
ANSWER: (D)
29. A(n) _______ camera is a peripheral device used to capture still images in a digital format that can be easily transferred into a computer and manipulated using graphics software.
(A) digital
(B) analog
(C) classic
(D) film
(E) None of these
ANSWER: (A)
30. _____ makes it possible for shoppers to make purchases using their computers.
(A) E-world
(B) Ecommerce
(C) E-spend
(D) E-business
(E) None of these
ANSWER: (D)
31. Networks are monitored by security personnel and super vised by _____who set(s) up accounts and passwords for authorized network users.
(A) IT managers
(B) the government
(C) network administrators
(D) password administrators
(E) None of these
ANSWER: (C)
32. Application software is designed to accomplish—
(A) real world tasks
(B) computer-centric tasks
(C) gaming tasks
(D) operating system tasks
(E) None of these
ANSWER: (D)
33. A telephone number, a birth date, and a customer name are all examples of
(A) a record
(B) data
(C) a file
(D) a database
(E) None of these
ANSWER: (D)
34. The human-readable version of a program is called—
(A) source code
(B) program code
(C) human code
(D) system code
(E) None of these
ANSWER: (D)
35. A ……… computer is a small, lightweight personal computer that incorporates the screen, the keyboard, storage, and processing components into a single portable unit.
(A) notebook
(B) journal
(C) diary
(D) briefcase
(E) None of these
ANSWER: (A)
36. ....... is the result produced by a computer.
(A) Data
(B) Memory
(C) Output
(D) Input
(E) None of these
ANSWER: (C)
37. Programs such as Internet Explorer that serve as navigable windows into the Web are
called......
(A) Hypertext
(B) Networks
(C) Internet
(D) Web browsers
(E) None of these
ANSWER: (D)
38. Which is an another name for functional language
(A) Machine
(B) Application
(C) Low-level language
(D) High-level language
(E) None of these
ANSWER: (B)
39. The first computer made available for commercial use was
(A) Mark-I
(B) ENIAC
(C) EDSAC
(D) UNIVAC
(E) None of these
ANSWER: (D)
40. Who is called the “grand father” of the computer?
(A) Blaise Pascal
(B) Charles Babbage
(C) Joseph Jacquard
(D) Dr. Herman Hollerith
(E) None of these
ANSWER: (B)
41. The first mechanical computer designed by Charles Babbage was called
(A) Abacus
(B) Processor
(C) Calculator
(D) Analytical Engine
(E) None of these
ANSWER: (D)
42. The motherboard is the—
(A) circuit board that houses peripheral devices
(B) same as the CPU chip
(C) the first dup that is accessed when the computer is turned on
(D) circuit board that contains a CPU and other chips
(E) None of these
ANSWER: (D)
43. The transformation of a message into an encoded form is known as
(A) Mnemonics
(B) Encoding
(C) Encryption
(D) Decoding
(E) None of these
ANSWER: (B)
44. Which is device that interconnect two or more network, enabling data transfer to be made between them
(A) Plotter
(B) Joystick
(C) Gateway
(D) Path
(E) None of these
ANSWER: (C)
45. Which of the following is directory controlled from a keyboard.
(A) Card punch
(B) punched paper tape
(C) Magnetic disk
(D) Magnetic tape
(E) None of these
ANSWER: (A)
46. Which of the following is a part of the Central Processing Unit
(A) Printer
(B) Keyboard
(C) Mouse
(D) Arithmetic Logic Unit
(E) None of these
ANSWER: (D)
47. Control Unit of a digital computer is often called the
(A) Clock
(B) Nerve center
(C) ICs
(D) All of the above
(E) None of these
ANSWER: (D)
48. A typical modern computer uses
(A) LSI chips
(B) Vacuum tubes
(C) Valves
(D) All the above
(E) None of these
ANSWER: (A)
49. A is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
(A) surge strip
(B) USB
(C) UPS
(D) battery strip
(E) None of these
ANSWER: (C)
50. When you save to _____ your data will remain intact even when the computer is turned off.
(A) RAM
(B) motherboard
(C) secondary storage device
(D) primary storage device
(E) None of these
ANSWER: (C)
keka
ReplyDeletethanks for everying
ReplyDelete