1. A ________ is a person who breaks into computers
and computer networks for profit, as protest, or sometimes by the motivation of the challenge.
a. Software engineer
b. Progammer
c. Hacker
d. Spammar
2. A(n)_______ is a collection of computers and
devices interconnected by communications channels to share information and
resources.
a. Internet
b. Network
d. Blog
3. The use of technology to enable people to learn
anytime and anywhere is called
a. e-commerce
b. information technology
c. e-learning
d. online business
4. A way of accessing information over the medium
of the Internet is
a. WWW
b. Web server
c. Website
d. All the above
5. The external devices that are connected to a
computer system are known as:
a. Slots
b. Peripheral
c. Buses
d. Expansion cards
6. The____________button on the quick access
Toolbar allows you to cancel your recent commands or actions.
a. Search
b. Cut
c. Document
d. Undo
7. In Excel, any set of characters containing a letter , hyphen, or space is
considered:
a. a formula
b.
text
c. a name
d. a title
8. ____________Software allows users to perform
calculations on rows and columns of data.
a. Word processing
b. Presentation graphics
c.
Database Management Systems
d. Electronic Spreadsheet
9. A ____________represent approximately one
billion memory locations.
a. Kilobyte
b. Megabyte
c.
Gigabyte
d. Terabyte
10. ____________cells involves creating a single
cell by combining two or more selected cells.
a. Formatting
b.
Merging
c. Embedding
d. Splitting
11. The operating system is the most common type
of____________software.
a. Communication
b. Application
c.
System
d. word-processing
12. When you quickly press and release the left
mouse button twice , you are:
a. Primary-clicking
b. Pointing
c.
Double-clicking
d. Secondary-clicking
13. The horizontal and vertical lines on a worksheet
are called:
a. Cells
b. Sheets
c. block lines
d. gridlines
14. To delete an incorrect character in a document,
____________ to erase to the right of the insertion point.
a. press the left mouse key
b. double-click the right mouse key
c. press the BACKSPACE key
d. press
the delete key
15. The operating system does all of the following
EXCEPT:
a. provide a way for the user to interact with the
computer.
b. manage the central processing unit (CPU).
c. manage memory and storage.
d. enable
users to perform a specific task such as document editing.
16. During the boot process, the____________looks
for the system files.
a. CD
b.
BIOS
c. CPU
d. DVD
17. ____________ are lists of commands that appear
on the screen.
a. GUIs
b.
Icons
c.
Menus
d. Windows
18. ____________ is the ability of an operating
system to control the activities of multiple programs at the same time.
a.
Multitasking
b. Streamlining
c. Multiuser
d. Simulcasting
19. The unique signal, generated by a device, that
tells the operating system that it is in need of immediate attention is called
an:
a. action.
b. event.
c.
interrupt.
d. activity.
20. The operating system controls access to the
processor by assigning a(n) ____________ to each task requiring the processor’s
attention.
a. CPU
b.
slice of time
c. stack
d. event
No comments:
Post a Comment