1.
One advantage of
dial-up-internet access is __________
a.
It utilizes
broadband technology
b.
It uses a router
for security
c. It utilizes existing telephone service
d.
Modem speeds are
very fast
2.
When we run a
program in HTML coding _____ is used as back-end and ____ works as front-end.
b.
Notepad -
Msn-messenger
c.
MS-Word - Internet Explorer
d.
Both (1) and (2)
3.
Computers process
data into information by working exclusively with :
a.
Sound
b.
Electric charge
c. Numbers
d.
Pictures
4.
You must install
a (n) ......... on a network if you want to share a broadband Internet
connection
a.
Modem
b. Router
c.
Server
d.
Printer
5.
The purpose of the primary key in a database
is to _______
a.
unlock the database
b.
provide a map of
the data
c. uniquely
identify a record
d.
establish
constraints on database operations
6.
The design of the network is called the
network
a. Architecture
b.
Server
c.
Transmission
d.
Type
7.
The most
frequently used instructions of a computer program are likely to be fetched
from
a. RAM
b.
ROM
c.
Hard Disk
d.
Cache Memory
8.
Which of the following would most likely NOT
be a symptom of a virus?
a.
Existing program
files and icons disappear
b. The CD-ROM
stops functioning
c.
The Web browser
opens to an unusual home page 4
d.
Odd messages or images are displayed on the
screen
9.
The errors that
can be pointed out by the compiler are
a. Syntax error
b.
Symantec error
c.
Logical error
d.
Internal error
10. By default, your documents print in___________ mode
a.
Landscape
b. Portrait
c.
Page setup
d.
Print preview
11. A Web site's main page is called its:
a.
Home Page
b. Browser Page
c. Search Page
d. Bookmark
12. The simultaneous processing of two or more programs
by multiple processors is:
a. Multiprogramming
b. Multitasking
c.
time-sharing
d. multiprocessing
13. Codes consisting of lines of varying widths or
lengths that are computer readable are known as:
a. an ASCII code
b. a magnetic tape
c. an OCR scanner
d. a
bar code
14. To instruct Word to fit the width of a column to
the contents of a table automatically, click the button and then point to
AutoFit Contents.
a. Fit to Form
b. Format
c. Autosize
d. AutoFit
15. Why is it unethical to share copyrighted files
with your friends?
a. It is not unethical, because it is legal.
b. It is unethical because the files are being
given for free.
c.
Sharing copyrighted files without permission
breaks copyright laws.
d. It is not unethical because the files are being
given for free.
16. Reusable optical storage will typica1ly have the
acronym:
a. CO
b. DVD
c. ROM
d.
RW
17. The most common type of storage devices are:
a. Persistent
b. Optical
c. Magnetic
d.
Flash
18. A device that connects to a network without the
use of cables is said to be:
a. Distributed
b.
Free
c. Centralized
d. open source
19. A person who used his or her expertise to gain
access to other people's computers to get information illegally or do damage is
a:
a.
Hacker
b. Analyst
c. instant messenger
d. programmer
20. To access properties of an object, the mouse
technique to use is:
a. Dragging
b. Dropping
c. right-clicking
d. shift-clicking
No comments:
Post a Comment