1.The most widely used input device is--- the
2. ____________ bits equal one byte.
3.The binary language consists of ____________ digit(s).
4. A byte can hold one ____________ of data.
- A.Keyboard
- B.Mouse
- C.Modem
- D.Moniter
Answer Click here :
2. ____________ bits equal one byte.
- A.8
- B.16
- C.24
- D.18
Answer Click here :
3.The binary language consists of ____________ digit(s).
- A.8
- B.1000
- C.2
- D.1
Answer Click here :
4. A byte can hold one ____________ of data.
- A.bit
- B.binary digit
- C.character
- D.kilobyte
Answer Click here :
5. A CPU contains_
- A.a card reader and a printing device
- B.an analytical engine and a control unit
- C.a control unit and an arithmetic logic unit
- D.an arithmetic logic unit and a card reader
Answer Click here :
6.In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
- A.8 bits
- B.8 bytes
- C.8 characters
- D.None of these
Answer Click here :
7.Computers use the ____________ language to process data.
- A.processing
- B.kilobyte
- C.binary
- D.representational
Answer Click here :
8. Computers process data into information by working exclusively with:
- A.Multimedia
- B.Character
- C.Numbers
- D.Words
Answer Click here :
9.The ability of an OS to run more than one application at a time is called
- A.multitasking
- B.object-oriented programming
- C.multi-user computing
- D.time sharing
Answer Click here :
10.Permanent instructions that the computer uses when it is turned on and that cannot be changed by other instructions are contained in
- A.ROM
- B.RAM
- C.REM
- D.EPROM
Answer Click here :
11.All of the following are examples of real security and privacy risks EXCEPT
- A.hackers
- B.spam
- C.viruses
- D.identity theft
Answer Click here :
12.A process known as ____________ is used by large retailers to study trends.
- A.data mining
- B.data selection
- C.POS
- D.data conversion
Answer Click here :
13.____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
- A.Data
- B.Point-of-sale (POS)
- C.Sales
- D.Query
Answer Click here :
14.What type of resource is most likely to be a shared common resource in a computer network?
- A.Printers
- B.Speakers
- C.Floppy disk drives
- D.Keyboards
Answer Click here :
15.The vast network of computers that connects millions of people all over the world is called
- A.LAN
- B.Web
- C.Hypertext
- D.Internet
Answer Click here :
16.Which is not an item of hardware?
- A.AnMP3file
- B.A keyboard
- C.A disk drive
- D.A monitor
Answer Click here :
17.To shrink a window to an icon_
- A.open a group window
- B.minimise a window
- C.maximise a window
- D.restore a window
Answer Click here :
18.Computers connected to a LAN (local area network) can
- A.run faster
- B.go on line
- C.share information and/or ' share peripheral equipment
- D.E-mail
Answer Click here :
19.____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
- A.Nanoscience
- B.Microelectrodes
- C.Computer forensics
- D.Artificial intelligence
Answer Click here :
20.Every device on the Internet has a unique______address (also called an “Internet address”) that identifies it in the same way that a street address identifies the location of a house.
- A.DH
- B.DA
- C.IP
- D.IA
Answer Click here :
21.In a client/ server model, a client program -
- A.asks for information
- B.provides information and files
- C.serves software files to other computers
- D.distributes data files to other computers
Answer Click here :
22.The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
- A.instructions.
- B.the operating system.
- C.application software.
- D.the system unit.
Answer Click here :
23.The two broad categories of software are:
- A.word processing and spreadsheet
- B.transaction and application.
- C.Windows and Mac OS.
- D.system and application.
Answer Click here :
24.Storing same data in many places is called
- A.iteration
- B.concurrency
- C.redundancy
- D.enumeration
Answer Click here :
25.The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
- A.robotics.
- B.simulation
- C.computer forensics
- D.animation
good:)
ReplyDeletepls add more