Saturday 28 September 2013

Computer Awareness-52

                1.     A ________ is a person who breaks into computers and computer networks for                    profit, as protest, or sometimes by the motivation of the challenge.
     a.      Software engineer
     b.     Progammer
     c.      Hacker
     d.     Spammar
2.     A(n)_______ is a collection of computers and devices interconnected by communications channels to share information and resources.
     a.      Internet
     b.     Network
     c.      Server
     d.     Blog
3.     The use of technology to enable people to learn anytime and anywhere is called
     a.      e-commerce
     b.     information technology
     c.      e-learning
     d.     online business

4.     A way of accessing information over the medium of the Internet is 
     a.      WWW
     b.     Web server
     c.      Website
     d.     All the above
5.     The external devices that are connected to a computer system are known as:
      a.      Slots
      b.     Peripheral
      c.      Buses
      d.     Expansion cards
6.     The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.
     a.      Search
     b.     Cut
     c.      Document
     d.     Undo
7.     In Excel, any set of characters containing a letter , hyphen, or space is considered:
     a.      a formula
     b.     text
     c.      a name
     d.     a title
8.     ____________Software allows users to perform calculations on rows and columns of data.
a.      Word processing
b.     Presentation graphics
c.      Database Management Systems
d.     Electronic Spreadsheet
9.     A ____________represent approximately one billion memory locations.
a.      Kilobyte
b.     Megabyte
c.      Gigabyte
d.     Terabyte
10.  ____________cells involves creating a single cell by combining two or more selected cells.
a.      Formatting
b.     Merging
c.      Embedding
d.     Splitting
11. The operating system is the most common type of____________software.
a.      Communication
b.     Application
c.      System
d.     word-processing
12. When you quickly press and release the left mouse button twice , you are:
a.      Primary-clicking
b.     Pointing
c.      Double-clicking
d.     Secondary-clicking
13. The horizontal and vertical lines on a worksheet are called:
a.      Cells
b.     Sheets
c.      block lines
d.     gridlines
14. To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
a.      press the left mouse key
b.     double-click the right mouse key
c.      press the BACKSPACE key
d.     press the delete key
15. The operating system does all of the following EXCEPT:
a.      provide a way for the user to interact with the computer.
b.     manage the central processing unit (CPU).
c.      manage memory and storage.
d.     enable users to perform a specific task such as document editing.
16. During the boot process, the____________looks for the system files.
a.      CD
b.     BIOS
c.      CPU
d.     DVD
17.  ____________ are lists of commands that appear on the screen.
a.      GUIs
b.     Icons
c.      Menus
d.     Windows
18.  ____________ is the ability of an operating system to control the activities of multiple programs at the same time.
a.     Multitasking
b.     Streamlining
c.      Multiuser
d.     Simulcasting
19. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:
a.      action.
b.     event.
c.      interrupt.
d.      activity.
20. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
a.      CPU
b.     slice of time
c.      stack

d.     event

No comments: