1.A websites main page is called its-
A.Home page
B.Browser page
C.Bookmark page
D.Search page
ans-a
2.When installing ______ The user must copy usually decompress program file from CDROM or medium to the hard disk.
A.Programming software
B.System hardware
C.Application hardware
D.Application software
ans-a
3.A collection of interrelated file in computer is a-
A.File manager
B.Field
C.Record
D.Database
ans-d
4.A collection of 8 bit is called –
A.Byte
B.Record
C.Word
D.Nibble
ans-a
5.General purpose computer are those that can be adopted to countless uses simply by changing its-
A.Output device
B.Input device
C.Processor
D.Program
ans-d
6.Memory in which any location can be reached in a fixed and short amount of time after specifying its address is called –
A.Sequential access memory
B.Random access memory
C.Secondary memory
D.Mass storage
ans-b
7._______ software allows users to perform calculation on rows and columns of data.
A.Word processing
B.Presentation graphics
C.Database management system
D.Electronic spreadsheet
ans-d
8.The horizontal and vertical lines on a spreadsheet are called:
A.Cells
B.Sheets
C.Block lines
D.Grid-lines
ans-d
9.To delete an incorrect character in a document, ______ to erase to the right of the insertion point.
A.Press the left mouse key
B.Double click the right mouse
C.Press the BACKSPACE key
D.Press the delete key
ans-d
10.The operating system does all of the following except-
A.Provide a way for the user to interact with the computer.
B.Manage the central processing unit (CPU).
C.Manage memory and storage.
D.Enable users to perform a specific task as document editing.
ans-d
11.All of the following are steps involved in the boot process except-
A.Load the operating system in to RAM.
B.The power on self test.
C.Activate the basic input/ output system (BIOS).
D.Load application programs.
ans-d
12.The ______ storage on ROM chip, is responsible for loading the operating system from its permanent location on the hard drive in to RAM.
A.BIOS
B.API
C.Device driver
D.Supervisor program
ans-a
13.The basic input/output system (BIOS) is storage in-
A.RAM
B.ROM
C.The CPU
D.The hard drive
ans-b
14.Ensuring that the essential peripheral devices are attached and operational is the ____ Process.
A.Configuration
B.CMOS
C.POST
D.ROM
ans-c
15.Hyper-threading (HT) is related to-
A.Processor
B.RAM
C.Mother board
D.Hard Disk
ans-a
16.Intel and AMD are leaders in-
A.Processor
B.RAM
C.Mother board
D.Hard Disk
ans-a
17.IDE (ATE) or SATA interface connect Mother board with-
A.Mother board
B.RAM
C.Processor
D.Hard disk
ans-d
18.USB is a type of-
A.Processor
B.Port
C.Monitor
D.Program
ans-b
19.Surgeons can perform delicate operation by manipulating devices through computers instead of manually. this technology is known as-
A.Robotics
B.Computer forensics
C.Simulation
D.Forecasting
ans-a
20.Process of Combining strings is known as
A.Compiling
B.Combining
C.Attaching
D.Concatenation
ans-d
21.A program that performs a useful task while simultaneously allowing destructive acts is:
A.Worm
B.Trojan Horse
C.Virus
D.Macro Virus
ans-b
22.In 1999, the Melissa virus was a widely publicized:
A.e-mail Virus
B.Macro virus
C.Trojan Horse
D.Time Bomb
ans-a
23.An intentionally disruptive program that spreads from program to program or from disk to disk is known as
A.Trojan horse
B.Virus
C.Time bomb
D.Time related bomb sequence
ans-b
24.Malicious software is known as:
A.Badware
B.Malware
C.Maliciousware
D.Illegalware
ans-b
25.Collecting personal information and effectively posing as another individual is known as the crime of:
A.Spooling
B.Identity Theft
C.Spoofing
D.Hacking
ans-b
26.The common name for the crime of stealing passwords is:
A.Spooling
B.Identity theft
C.Spoofing
D.Hacking
ans-c
27.The majority of computer crimes are committed by:
A.Hackers
B.Insiders
C.Overseas criminals
D.Young teenage computer geniuses
ans-b
28.The thing that eventually terminates a worm virus is a lack of:
A.Memory or disk space
B.Time
C.CD drive space
D.CD-RW
ans-a
29.When a logic bomb is activated by a time-related event, it is known as a:
A.Time-related bomb sequence
B.Virus
C.Time bomb
D.Trojan horse
ans-c
30.A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:
A.Time-related bomb sequence
B.Virus
C.Time bomb
D.Trojan horse
ans-c
31.What is the name of an application program that gathers user information and sends it to someone through the Internet?
A.
A virus
B.Spybot
C.Logic bomb
D.Security patch
ans- b
32.Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:
A.More complicated
B.More difficult
C.Easier
D.Slower
ans-c
33.HTML viruses infect:
A.Your computer
B.A Web page in the HTML code
C.Both a Web page and the computer that is viewing it.
D.None of these
ans-b
34.Software programs that close potential security breaches in an operating system are known as:
A.Security breach fixes
B.Refresh patches
C.Security repairs
D.Security patches
35.When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
A.A virus
B.A Trojan Horse
C.Cracking
D.A denial of service attack
ans-d
36.__________ is the measurement of things such as fingerprints and retinal scans used for security access.
A.Biometrics
B.Biomeasurement
C.Computer security
D.Smart weapon machinery
ans-a
37.What is the most common tool used to restrict access to a computer system?
A.User log in
B.Passwords
C.Computer keys
D.Access-control software
ans-b
38.Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
A.Hacker-proof program
B.Firewall
C.Hacker-resistant server
D.Encryption safe wall
ans-b
39.The scrambling of code is known as:
A.Encryption
B.A firewall
C.Scrambling
D.Password-proofing
ans-a
40.If you want to secure a message, use a(n):
A.Cryptology source
B.Encryption key
C.Encryption software package
D.Cryptosystem
ans-d
41.Instructions and memory address are represented by
A.Character code
B.Binary codes
C.Binary word
D.Parity bit
ans-b
42.A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is
A.Memory
B.Buffer
C.Accumulator
D.Address
ans-b
43.Which of the following will happen when data is entered into a memory location?
A.It will add to the content of the location.
B.It will change the address of the memory location.
C.It will erase the previous content.
D.It will not be fruitful if there is already some data at the location.
ans-c
44.The ALU of a computer responds to the commands coming from
A.Primary memory
B.Control section
C.External memory
D.Cache memory
ans-b
45.An error in software or hardware is called a bug. What is the alternative computer jargon for it?
A.Leech
B.Squid
C.Slug
D.Glitch
ans-d
46.The vast network of computers that connects millions of people all over the world is called.
A.LAN
B.Web
C.Hypertext
D.Internet
ans-d
47.Resolution of laser printer is specified in terms of
A.DPI
B.LPM
C.CPM
D.PPM
ans-a
48.A byte represents a group of
A.10 bits
B.40 bits
C.8 bits
D.22 bits
ans-c
49.Which key on keyboard of a computer does not have its name printed on the key?
A.ESC
B.SHIFT
C.F1
D.SPACE
ans-b
52.Where would you find the letters QWERTY?
A.Mouse
B.Screen
C.Numeric Keypad
D.Keyboard
ans-d
53.How did the computer mouse get its name?
A.Its cable looks like a tail.
B.Because it squeaks when moved
C.It has ears.
D.Teeth outside mouth.
ans-a
54.A digitizing tablet can be used for?
A.Tracing diagrams
B.Printing letters
C.Reading bar-codes
D.Playing
ans-a
55.Which of the following is a pointing device?
A.Hard disk
B.CD-ROM drive
C.Touch screen used for computer input.
D.RAM
ans-c
49.Personal computers use a number of chips mounted on a main circuit board. What is the common name for such boards?
A.Daughter board
B.Motherboard
C.Father board
D.Breadboard
ans-b
50.What is meant by a dedicated computer?
A.Which is used by one person only
B.Which is assigned one and only one task
C.Which uses one kind of software
D.Which is meant for application software
ans-b
57.What would be the best way to move around a 3D environment?
A.Use a tracker ball
B.Use a keyboard
C.Use a space mouse
D.Use Joystick
ans-a
58.Where would you find a magnetic strip?
A.Speakers
B.Credit card
C.Smart card
D.All of the above
ans-b
59.Hard copy is a term used to describe?
A.Printed output
B.Writing on a hard board
C.Storing information on the hard disk
D.All of the above
ans-a
60.What do the abbreviations VAB stand for?
A.Voice activated broadcasting
B.Visual audio board
C.Voice answer back
D.None of these
ans-c
61.What are the individual dots which make up a picture on the monitor screen called?
A.Colored spots
B.Pixies
C.Pixels
D.None of these
ans-c
62.A daisy wheel is a type of?
A.Storage device
B.Pointing device
C.Scaning Device
D.Printer
ans-d
63.Factory production lines can be automated using?
A.Machine tools
B.VDUs
C.Plotters
D.None of these
ans-b
64.An impact printer creates characters by using?
A.An inked ribbon and print head
B.Electrically charged ink
C.An ink pen
D.All of the above
ans-a
65.What would you not use with a flatbed plotter?
A.A pen
B.Eraser
C.Paper
D.None of these
ans-c
66.What do you need for an ink jet printer?
A.A drum
B.A cartridge
C.A ribbon
D.All of the above
ans-b
67.A laser printer does NOT use?
A.A photo-conductive drum
B.A print head
C.A laser beam
D.None of these
ans-b
68.The amount of data that a disk may contains known as the disk’s?
A.Volume
B.Size
C.Tracking Unit
D.Storage capacity
ans-d
69.You can protect a floppy disk.
A.Read
B.Write
C.Read and Write
D.All of the above
ans-b
70.Information on a hard disk is usually backed-up using a?
A.CD-ROM
B.Magnetic tape
C.Floppy disk
D.All of the above
ans-a