Wednesday 25 September 2013

Computer Awareness-40

1.     You can use the………bar to type a URL and display a Web page, or type a keyword to display a list of related Web pages.
a.      Menu
b.     Title
c.      Search
d.     Address
2.     Storage media such as a CD read and write information using:
a.      a laser beam of red light
b.     magnetic dots
c.      magnetic strips
d.     All of these
3.     Vendor-created program modifications are called:
a.     Patches
b.     Antiviruses
c.      Holes
d.     Fixes

4.     Cache and main memory will lose their contents when the power is off. They are:
a.      Dynamic
b.     Static
c.      Volatile
d.      non-volatile
5.     The collection of links throughout the Internet creates an interconnected network called the:
a.      WWW
b.     Web
c.      World Wide Web
d.     All of the above
6.     Every computer has a(n)_______,many also have.__________
a.      operating system, a client system
b.     operating system; instruction sets
c.      application programs; an operating system
d.     operating system; application programs
7.     Main memory works in conjunction with:
a.      special function cards
b.     RAM
c.      CPU
d.     Intel
8.     A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using:
a.      input automation
b.     item data automation
c.      scanning automation
d.     source data automation
9.     A(n)……is composed of several computers connected together to share resources and data.
a.      Internet
b.     Network
c.      Backbone
d.     Hyperlink
10. Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information:
a.      floppy diskette
b.     hard disk
c.      permanent disk
d.     optical disk
11. Microsoft Office is an example of a:
a.      closed-source software
b.     open-source software
c.      horizontal-market software
d.     vertical-market software
12. A popular way to learn about computers without ever going to a classroom is called:
a.      i-learning
b.     isolated learning
c.      e-learning
d.     close learning
13. A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a:
a.      Spammer
b.     Hacker
c.      instant messenger
d.     programmer
14. Which of the following is an example of storage devices?
a.      Magnetic disks
b.     Tapes
c.      DVDs
d.     All of these
15. The………folder retains copies of messages that you have started but are not yet ready to send.
a.      Inbox
b.     Outbox
c.      Drafts
d.     Sent Items
16. Which of the following is an example of an optical disk?
a.     Digital versatile disks
b.     Magnetic disks
c.      Memory disks
d.     Data bus disks
17. The main job of a CPU is to:
a.      carry out program instructions
b.     store data/information for future use
c.      process data and information
d.     Both (A) and (C)
18.  ……are attempts by individuals to obtain confidential information from you by falsifying their identity.
a.      Phishing trips
b.     Computer viruses
c.      Spyware scams
d.     Phishing scams
19. An example of a processing device would be:
a.       a magnetic ink reader
b.     a tablet PC
c.       special function cards
d.     Scanners
20. Which of the following is not a type of computer software which can be bought?
a.      Off-the-shelf
b.     Tailor-made
c.      Custom-developed

d.     Off-the-shelf with alterations

No comments: