Saturday, 6 July 2013

Computer Awareness-6

              1.      One advantage of dial-up-internet access is __________
a.      It utilizes broadband technology
b.      It uses a router for security
c.        It utilizes existing telephone service
d.      Modem speeds are very fast
              2.      When we run a program in HTML coding _____ is used as back-end and ____ works as front-end.
a.      Notepad - Internet-Explorer
b.      Notepad - Msn-messenger
c.        MS-Word - Internet Explorer
d.      Both (1) and (2)
             3.      Computers process data into information by working exclusively with :
a.      Sound
b.      Electric charge
c.       Numbers
d.      Pictures

             4.      You must install a (n) ......... on a network if you want to share a broadband Internet connection
a.      Modem
b.      Router
c.       Server
d.      Printer
             5.       The purpose of the primary key in a database is to _______
a.      unlock the database
b.      provide a map of the data
c.       uniquely identify a record
d.      establish constraints on database operations
             6.       The design of the network is called the network
a.      Architecture
b.      Server
c.        Transmission
d.       Type
             7.      The most frequently used instructions of a computer program are likely to be fetched from
a.      RAM
b.      ROM
c.       Hard Disk
d.      Cache Memory
             8.       Which of the following would most likely NOT be a symptom of a virus?
a.      Existing program files and icons disappear
b.      The CD-ROM stops functioning
c.       The Web browser opens to an unusual home page 4
d.       Odd messages or images are displayed on the screen
              9.      The errors that can be pointed out by the compiler are
a.      Syntax error
b.      Symantec error
c.       Logical error
d.      Internal error
             10.  By default, your documents print in___________ mode
a.      Landscape
b.      Portrait
c.       Page setup
d.      Print preview
11.  A Web site's main page is called its:
a.      Home Page
b.      Browser Page
c.       Search Page
d.      Bookmark
12.  The simultaneous processing of two or more programs by multiple processors is:
a.       Multiprogramming
b.      Multitasking
c.       time-sharing
d.      multiprocessing
13.  Codes consisting of lines of varying widths or lengths that are computer readable are known as:
a.       an ASCII code
b.      a magnetic tape
c.       an OCR scanner
d.      a bar code
14.  To instruct Word to fit the width of a column to the contents of a table automatically, click the button and then point to AutoFit Contents.
a.       Fit to Form
b.      Format
c.       Autosize
d.      AutoFit
15.  Why is it unethical to share copyrighted files with your friends?
a.       It is not unethical, because it is legal.
b.      It is unethical because the files are being given for free.
c.       Sharing copyrighted files without permission breaks copyright laws.
d.      It is not unethical because the files are being given for free.
16.  Reusable optical storage will typica1ly have the acronym:
a.       CO
b.      DVD
c.       ROM
d.      RW
17.  The most common type of storage devices are:
a.       Persistent
b.      Optical
c.       Magnetic
d.      Flash
18.  A device that connects to a network without the use of cables is said to be:
a.       Distributed
b.      Free
c.       Centralized
d.      open source
19.  A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a:
a.      Hacker
b.      Analyst
c.       instant messenger
d.      programmer
20.  To access properties of an object, the mouse technique to use is:
a.       Dragging
b.      Dropping
c.        right-clicking
d.      shift-clicking


No comments: