Saturday 28 September 2013

Computer Awareness-41

1.     You can use………to copy selected text, and ……… to paste it in a document.
a.     CTRL + C, CTRL + V
b.     CTRL + C, CTRL + P
c.      CTRL + S, CTRL + S
d.     SHIFT + C, ALT + P
2.     Video processors consist of ……… and ……, which store and process images.
a.      CPU and VGA
b.     CPU and memory
c.      VGA and memory
d.     VGI and DVI
3.     The main memory of a computer can also be called:
a.      primary storage
b.     internal memory
c.      primary memory
d.     All of these

4.     Computer software can be defined as:
a.      the computer and its associated equipment
b.     the instructions that tell the computer what to do
c.      computer components that act to accomplish a goal
d.     an interface between the computer and the network
5.     When speaking of computer input and output, input refers to:
a.      any data processing that occurs from new data input into the computer
b.     data or information that has been entered into the computer
c.      the transmission of data that has been input into the computer
d.     Both (b) and (c) above
6.     A ……… is a set of rules.
a.      resource locator
b.     domain
c.      hypertext
d.     protocol
7.     The connection between your computer at home and your local ISP is called:
a.      the last mile
b.     the home stretch
c.       the home page
d.      the backbone
8.     All of the logic and mathematical calculations done by the computer happen in/on the:
a.      system board
b.     central control unit
c.      central processing unit
d.      mother board
9.     There are several primary categories of procedures. Which of the following is not a primary category of procedures?
a.      Testing
b.     Backup and recovery
c.      Firewall development
d.     Design
10. The operating system called UNIX is typically used for:
a.      desktop computers
b.     laptop computers
c.      supercomputers
d.     All of these
11. The………file format is a method of encoding pictures on a computer.
a.      HTML
b.     JPEG
c.      FTP
d.     URL
12. Press………to move the insertion point to the Address box, or to highlight the URL in the Address box.
a.     ALT + D
b.     ALT + A
c.      SHIFT + TAB
d.     TAB + CTRL
13. Computer systems are comprised of:
a.     hardware, programs, information, people and networks
b.     hardware, software, procedures, networks and people
c.      hardware, programs, information, people and procedures
d.     hardware, programs, processors, procedures, networks and people
14. A passive threat to computer security is:
a.      Malicious Intent
b.     Sabotage
c.      Accident Errors
d.     Espionage Agents
15. The Secure Electronic Transaction (SET) specification:
a.      is a notice, issued and verified by a certificate authority, that guarantees a user  or Web site is legitimate
b.     provides private-key encryption of all data that passes between a client and a server
c.      allows users to choose an encryption scheme for the data that passes between a client and a server
d.     uses a public-key encryption to secure credit-card transaction systems
16.  ……………allows wireless mobile devices to access the Internet and its services such as the Web and e-mail:
a.      TCP/IP
b.     Ethernet
c.      WAP
d.     Token ring
17.  'DOS' floppy disk does not have:
a.      A Boot Record
b.     A File Allocation Table
c.      A Root Directory
d.     Virtual Memory
18. 'MICR' technology used for clearance of cheques by banks refers to:
a.      Magnetic Ink Character Recognition
b.     Magnetic Intelligence Character Recognition
c.      Magnetic Information Cable Recognition
d.     Magnetic Insurance Cases Recognition
19. All the information collected during database development is stored in a:
a.      Repository
b.     data warehouse
c.      RAD
d.     CASE
20. The……………….component is used by the data analyst to create the queries that access the database.
a.      data extraction
b.     end-user query tool
c.      end-user presentation tool

d.     data store

No comments: