1.
You can use………to copy selected text, and ……… to paste it in a
document.
a.
CTRL + C, CTRL + V
b. CTRL + C, CTRL + P
c. CTRL + S, CTRL + S
d. SHIFT + C, ALT + P
2.
Video processors consist of ……… and ……, which store and process
images.
a. CPU and VGA
b. CPU and memory
c.
VGA and memory
3.
The main memory of a computer can also be called:
a. primary storage
b. internal memory
c.
primary memory
d. All of these
4.
Computer software can be defined as:
a. the computer and its
associated equipment
b.
the instructions that
tell the computer what to do
c. computer components that
act to accomplish a goal
d. an interface between the
computer and the network
5.
When speaking of computer input and output, input refers to:
a. any data processing that
occurs from new data input into the computer
b. data or information that
has been entered into the computer
c. the transmission of data
that has been input into the computer
d. Both (b) and (c) above
6.
A ……… is a set of rules.
a. resource locator
b. domain
c. hypertext
d. protocol
7.
The connection between your computer at home and your local ISP is
called:
a. the last mile
b. the home stretch
c.
the home page
d. the backbone
8.
All of the logic and mathematical calculations done by the
computer happen in/on the:
a. system board
b. central control unit
c. central processing unit
d. mother board
9.
There are several primary categories of procedures. Which of the
following is not a primary category of procedures?
a. Testing
b. Backup and recovery
c.
Firewall development
d. Design
10.
The operating system called UNIX is typically used for:
a. desktop computers
b. laptop computers
c. supercomputers
d. All of these
11.
The………file format is a method of encoding pictures on a computer.
a. HTML
b.
JPEG
c. FTP
d. URL
12.
Press………to move the insertion point to the Address box, or to
highlight the URL in the Address box.
a.
ALT + D
b. ALT + A
c. SHIFT + TAB
d. TAB + CTRL
13.
Computer systems are comprised of:
a.
hardware, programs,
information, people and networks
b. hardware, software,
procedures, networks and people
c. hardware, programs,
information, people and procedures
d. hardware, programs,
processors, procedures, networks and people
14.
A passive threat to
computer security is:
a. Malicious
Intent
b. Sabotage
c. Accident Errors
d. Espionage Agents
15.
The Secure Electronic Transaction
(SET) specification:
a. is a notice, issued and verified by a certificate
authority, that guarantees a user or Web site is legitimate
b. provides private-key encryption of all data that
passes between a client and a server
c. allows users to choose an encryption scheme for
the data that passes between a client and a server
d. uses
a public-key encryption to secure credit-card transaction systems
16.
……………allows wireless mobile devices to access
the Internet and its services such as the Web and e-mail:
a. TCP/IP
b. Ethernet
c. WAP
d. Token ring
17.
'DOS' floppy disk does not have:
a. A Boot Record
b. A File Allocation Table
c. A Root Directory
d. Virtual
Memory
18.
'MICR' technology used
for clearance of cheques by banks refers to:
a. Magnetic
Ink Character Recognition
b. Magnetic Intelligence Character Recognition
c. Magnetic Information Cable Recognition
d. Magnetic Insurance Cases Recognition
19.
All the information
collected during database development is stored in a:
a. Repository
b. data
warehouse
c. RAD
d. CASE
20.
The……………….component is
used by the data analyst to create the queries that access the database.
a. data extraction
b. end-user
query tool
c. end-user presentation tool
d. data store
No comments:
Post a Comment