1
1
1
D.) Mouse
Show Answer
Answer: Option 'C'
Internal hard disk
B.) Program
C.) Data
D.) Software
Show Answer
Answer: Option 'B'
Program
A.) 6
B.) 7
C.) 5
D.) 4
Show Answer
Answer: Option 'C'
5
6. ________ controls the way in which the computer system functions and
provides a means by which users can interact with the computer.
1-Which of the following retains the information it’s storing when the power to the system is turned off?
(A) CPU
(B) ROM
(C) RAM
(D) DIMM
(Ans: B)
2-A network of computers and other devices that is confined to a relatively small space is called?
(A) Wide Area Network
(B) Local Area Network
(C) Global Network
(D) Peer-to-Peer Network
(Ans: B)
3-Every computer connected to the Internet is identified by a unique four-part string, known as
(A) IP address
(B) Host name
(C) Domain name
(D) None of the above
(Ans: A)
4-ENIAC was the first general-purpose electronic computer. ENIAC stands for
(A) Electronic Network Interactive Analytic Computer
(B) Electronic Numerical Integrator and Computer
(C) Electronic Network Integrated Analytical Computer
(D) Electronic Numerical Integrated Automatic Computer
(Ans: B)
6-Which of the following memories must be refreshed many times per second?
(A) Static RAM
(B) Dynamic RAM
(C) EPROM
(D) ROM
(Ans: B)
7-.PNG refers to
(A) Image file
(B) Movie/animation file
(C) Audio file
(D) MS Office document
(Ans: A)
9- ______ is a technology that allows telephone calls to be made over computer networks like the Internet.
(A) VoIP
(B) GSM
(C) Modem
(D) CDMA
(Ans: A)
10-To identify TCP/IP errors such as connection problems ______ command can be used
(A) FTP
(B) Ping
(C) POP3
(D) STP
(Ans: B)
11-A program that runs in the background on your computer, sending information about your browsing
habits to the company that installed it on your computer is called as
(A) Pop-ups
(B) Adware
(C) Grayware
(D) Spyware
(Ans: C)
12-Software is a set of programs, which is designed to perform a well defined function and there are two types
of software, application and system. The following are all application software except for
(A) Microsoft Word
(B) Microsoft Excel
(C) Microsoft Power Point
(D) Microsoft Windows
(Ans: D)
13-1 Gigabyte (GB) is equal to
(A) 1024 bytes
(B) 1024 KB
(C) 1024 MB
(D) 1024 TB
(Ans: C)
16-A CD-RW has a speed rating of 12x 10x 32x. What do the three numbers refer to in order?
(A) Write, rewrite, read
(B) Read, write, rewrite
(C) Rewrite, read, write
(D) Write, read, rewrite
(Ans: A)
17-The information stored in ______ is erased when the computer is turned off
(A) ROM
(B) RAM
(C) BIOS
(D) CPU
(Ans: B)
18-Malware is the short form for malicious software and used to refer to
(A) Spyware
(B) Worm
(C) Virus
(D) All of the above
(Ans: D)
20-The following device is used to connect two systems using different protocols
(A) Modem
(B) Repeater
(C) Gateway
(D) Bridge
(Ans: C)
21-The computer language used for artificial intelligence is
(A) FOTRAN
(B) PROLOG
(C) C
(D) COBOL
(Ans: C)
22-Open source software is software whose source code is available for modification or enhancement by
anyone. Which of the following is an example of open source software?
(A) Adobe Photoshop
(B) Microsoft Word
(C) Libre Office
(D) Skype
(Ans: C)
23-JPEG seen with the .jpg or .jpeg filename extension is commonly used method for compression of digital
images. What does JPEG stand for?
(A) Joint Picture Encoding Graphics
(B) Joint Photographic Experts Group
(C) Joint Photo Edit Grid
(D) Joint Picture Express Grid
(Ans: B)
24-A “URL” is a formatted text string used by web browsers, email clients and other software to identify a
network resource on the Internet. It stands for
(A) Universal Resource Link
(B) Uniform Resource Locator
(C) Unlimited Resource Locator
(D) Universal Reference Link
(Ans: B)
25-SD Card is a memory cards used in electronic equipments including digital cameras and cell
phones. What does SD stands for?
(A) Secure Digital
(B) Scan Disk
(C) Short Drive
(D) Slot Disk
(Ans: A)
26-A byte is equivalent to
(A) 2 bits
(B) 6 bits
(C) 8 bits
(D) 10 bits
(Ans: C)
o A.
System Software
o B.
Application Software
o C.
Utility Software
o D.
Malware
2.
Files are Organized in:
o A.
RAM
o B.
Cache
o C.
Directories
o D.
3.
Computer Hardware is:
Discuss
o A.
o B.
o C.
o D.
4.
Two types of Networks are :
Discuss
o A.
o B.
o C.
o D.
5.
The Window’s Desktop is:
Discuss
o A.
o B.
o C.
o D.
6.
A graphic artist would use:
o A.
Accounting Software
o B.
o D.
Antivirus Software
7.
Backing up of computer data is the process of:
Discuss
o A.
o B.
o C.
o D.
8.
The process of carrying out a command is called:
o A.
Fetching
o B.
Controlling
o C.
Storing
o D.
Executing
9.
A Database is used to:
o A.
o B.
o C.
o D.
10.
ABC Super Market has a new inventory system, what type of software is
managing it?
Discuss
o A.
Communications Software
o B.
System Software
o C.
Accounting Software
o D.
Database Software
11.
Electronic mail is best used to:
o A.
Send and Receive messages over a network
o B.
o C.
o D.
A and B
12.
The term Icon refers to:
o A.
o B.
A Photograph
o C.
A Leader
o D.
A Symbol of Power
13.
Word Processing and Desktop Publishing are Applications
o A.
True
o B.
False
14.
What does the “R” in RAM stands for?
o A.
Rewrite
o B.
Read
o C.
Readable
o D.
Random
15.
Which of the following is a multi-user, multi-tasking Operating System?
o A.
MSDOS
o B.
Windows 95/98
o C.
UNIX
o D.
Utility Software
16.
Which one of the following applications is used to manage non-numeric lists?
o A.
o B.
Spreadsheet
o C.
Graphics Software
o D.
17.
Raw facts such as letters, words and sounds are called:
o A.
Commands
o B.
Data
o C.
User Response
o D.
Programs
18.
The first electronic digital computer was built in the:
o A.
1920’s
o B.
1940’s
o C.
1960's
o D.
1970's
19.
Modem is short for:
o A.
Modulation Demolition
o B.
Modulator Demodulator
o C.
A and B
o D.
20.
The Main directory is otherwise called the _____________?
o A.
Truck Directory
o B.
C directory
o C.
Root Directory
o D.
LAN Directory
21.
Software development is most often done by:
o A.
Analyst
o B.
Programmer
o C.
End User
o D.
22.
C++ is a Programming Language
o A.
True
o B.
False
23.
DVD stands for ______________
o A.
o B.
Direct video
o C.
o D.
24.
GUI Stands for ____________________
o A.
o B.
o C.
o D.
25.
The special formatting language used to create Web Pages is called:
o A.
HTML
o B.
COBOL
o C.
Perl
o D.
JAVA
26.
Skyquest Inc has a large science and research facility. They hope to improve
their systems performance and simulations, the types of computers they are
using are: I) Work Stations II) Terminals III) Main Frame IV) Super Computers
o A.
I and IV
o B.
II and III
o C.
I and III
o D.
I only
27.
An example of an Input device is a:
o A.
Digital Camera
o B.
Plotter
o C.
Optical Disc
o D.
Monitor
28.
An example of an Output device is a:
o A.
Scanner
o B.
Plotter
o C.
Tapes
o D.
Software
29.
The Stages of Storage are:
o A.
o B.
o C.
o D.
30.
The most popular device for computer games is called:
o A.
Track Ball
o B.
Touch Screen
o C.
Glide Pad
o D.
Joystick
31.
Multimedia is similar to Multi-Tasking
o A.
True
o B.
False
32.
A computer Virus is a malicious program that affects the computer
o A.
True
o B.
False
33.
Which of the following is required to access the internet from a home location?
Discuss
o A.
o B.
Access to a LAN
o C.
o D.
34.
ISP Stands for Internet Service Provider
o A.
True
o B.
False
35.
The main difference between a super computer and a main frame is
o A.
o B.
Architecture
o C.
Architecture
o D.
Number of users
o E.
36.
The WWW and the INTERNET are the same thing
o A.
True
o B.
False
37.
1024 KB make 1MB
o A.
True
o B.
False
38.
Diagnosis Software is used to:
o A.
o B.
o C.
Stop Viruses
o D.
Format a disk
39.
The size of the computer’s memory is measured by the number of:
o A.
Memory Space
o B.
Bytes
o C.
RAM
o D.
ROM
40.
In Spread Sheets values, formulas and Labels are stored in :
o A.
Ranges
o B.
Functions
o C.
Labels
o D.
Cells
41.
The keyboard is output Device used to input data to the computer
o A.
True
o B.
False
42.
In Word Processing to Embolden means:
Discuss
o A.
o B.
o C.
o D.
o A.
True
o B.
False
44.
ENIAC stands for:
o A.
o B.
o C.
o D.
45.
Micro Computers are:
o A.
o B.
o C.
46.
A Network is:
o A.
o B.
o C.
o D.
47.
The WWW is:
o A.
o B.
o C.
o D.
48.
A byte is a:
o A.
o B.
o C.
o D.
49.
When it comes to database Records are:
o A.
o B.
o C.
A storage system
o D.
50.
The primary key is software used to open virtual doors
o A.
True
o B.
False
51.
Which storage device is considered portable?
o A.
Hard Disk
o B.
Magnetic Tape
o C.
Flash Drive
o D.
ROM
52.
A web portal is
o A.
o B.
o C.
A sports website
o D.
53.
Which of the following is true regarding deleted files in Windows?
o A.
Once the files have been deleted, there is no scope left for recovering them
o B.
The last 100 files that have been deleted can be recovered
o C.
o D.
54.
You are preparing a letter in Notepad and your computer reboots without your
saving the file, can you recover what you had written?
o A.
Yes
o B.
No
55.
Which of the following are extensions of graphics files?
o A.
.BMP
o B.
.TXT
o C.
.DOC
o D.
.EXE
1. Which of the following languages is more suited to a structured program?
A. PL/1
B. FORTRAN
C. BASIC
D. PASCAL
2. A computer assisted method for the recording and analyzing of existing or hypothetical systems
is
A. Data transmission
B. Data flow
C. Data capture
D. Data processing
B. Memory
C. CPU
D. Control unit
4. What difference does the 5th generation computer have from other generation computers?
A. Technological advancement
B. Scientific code
B. PROLOG
C. C
D. COBOL
D.) Mouse
Show Answer
Answer: Option 'C'
Internal hard disk
B.) Program
C.) Data
D.) Software
Show Answer
Answer: Option 'B'
Program
A.) 6
B.) 7
C.) 5
D.) 4
Show Answer
Answer: Option 'C'
5
6. ________ controls the way in which the computer system functions and
provides a means by which users can interact with the computer.
8. All of the following are examples of real security and privacy risks
EXCEPT:
A.) Viruses
B.) Hackers
C.) Spam
A.) DVD
D.) Mouse
Show Answer
Answer: Option 'C'
Microprocessor
A.) Allotting
B.) Crashing
C.) Formatting
D.) Tracking
Show Answer
Answer: Option 'B'
Formatting
12. Which computer memory is used for storing programs and data
currently being processed by the CPU ?
D.) PROM
Show Answer
Answer: Option 'A'
Internal memory
A.) Compression
B.) Fragmentation
C.) Encapsulation
D.) Unzipped
Show Answer
Answer: Option 'A'
Compression
Tit-Bits
* Enter key is an alternative to press OK button
* Shift key is used in combination with other keys, so this is also called
combination key.
* Caps lock and num lock keys are called as 'toggle keys' because when
pressed, they toggle or change their status from one state to another.
* Numeric keypaid is used only, when the num lock key is in active state.
14. Which of the following is used for close a tab on a browser?
A.) Ctrl + Y
B.) Ctrl + A
C.) Ctrl + W
D.) Ctrl + T
Show Answer
Answer: Option 'C'
Ctrl + W
15. Which of the following is NOT a component of the Central
Processing Unit of the computer?
C.) CU
A.) Dashboard
B.) Clipboard
D.) Diskette
Show Answer
17. You can move between two or more Excel files opened by using
the
D.) ctrl + F9
Show Answer
Cache Memory
* Cache memory is a very high-speed semiconductor memory which
can speed up CPU. It acts as a buffer between the CPU and main
memory.
A.) F1
B.) F2
C.) F3
D.) F5
Show Answer
A.) Multiprocessing
B.) Multi programming
C.) Recovery
D.) Integrity
Show Answer
A.) Scheduling
B.) Logging
C.) Chumping
D.) Dumping
Show Answer
Pascal Calculator
In the year 1642, Blaise Pascal a French scientist invented the adding
machine called Pascal’s calculator, which represents the position of
the digit with the help of gears in it.
Analytical Engine
A scientist from England knows to be Charles Babbage invented such
the machine.
This device is known as Analytical engine and it is the first
mechanical computer.
It includes such feature which we use in today’s computer language.
For this great invention of the computer, Sir Charles Babbage is also
known as the father of the computer.
22. He period of First generation computers is
A.) 1940-1956
B.) 1940-1958
C.) 1950-1960
D.) 1960-2000
Show Answer
A.) 1956-1964
B.) 1956-1963
C.) 1957-1970
D.) 1958-1963
Show Answer
Characteristics of Computer
* Speed
* Accuracy
* Storage
* Diligence
* Versatility
* Automation
Peripheral Devices
* The peripheral device connects to a computer system to add
functionality. Examples are a mouse, keyboard, monitor, printer and
scanner.
* A computer peripheral is a device that connects to a computer but
is not part of the core computer architecture.
* The core elements of a computer are the central processing unit,
power supply, motherboard and the computer case that contains
those three components.
A.) 1964-1974
B.) 1964-1977
C.) 1964-1975
PROM
– Programmable Read Only Memory.
EPROM
– Erasable Programmable Read Only Memory.
EEPROM
– Electrically Erasable Programmable Read Only Memory.
25. e period of Fourth generation computers is
A.) 1975-1995
B.) 1975-1989
C.) 1975-2000
The following questionnaire is for your benefit only. To find out whether
learning is right for you, please respond to these questions honestly. You
selection for each question to proceed with results! When you are finished
"submit."
Your name:
Online course interested in:
Your e-mail address (optional):
1. How regularly will you be able to log on to the Internet to work on this
6. How will you handle the situation if your computer (or software) break
some point during the course?
8. Will you be able to set aside some time to participate in weekly online
9. How capable are you of determining main ideas and concepts when rea
college textbooks?
a) I am a good reader.
b) I prefer listening to reading about things.
c) I have to hear information in order to retain it.
d) I usually don't remember what I read.
e) I don't know the level of my reading skills.
12. How much time do you expect to spend studying for this course?
14. Do you know how to turn your system on and off properly?
a) Yes.
b) Somewhat, but I need to work on it.
c) No, I prefer using the keyboard.
d) I don't like rodents.
17. Are you comfortable with file management on your computer, such a
around different directories and drives, saving files, or deleting files?
19. How will you handle the situation if your internet connection is interr
period of time?
20. How do you feel about taking a class over the internet?