Saturday 28 September 2013

Computer Awareness-56

1.     When installing ………, the user must copy and usually decompress program files from a CDROM or other medium to the hard disk.
a.     programming software
b.     system hardware
c.      applications hardware
d.     applications software
2.     A collection of interrelated files in a computer is a:
a.      file manager
b.     field
c.      record
d.     database
3.     A ……… computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.
a.      Server
b.     Mainframe
c.      Desktop
d.      Tablet

4.     What is usually used for displaying information at public places?
a.      Monitors
b.     Overhead Projections
c.      Monitors and Overhead Projections
d.     Touch Screen Kiosks
5.     Collecting personal information and effectively posing as another individual is known as the crime of:
a.      Spooling
b.     identity theft
c.      spoofing
d.     hacking
6.     The first step in the transaction processing cycle is:
a.      database operations
b.     audit
c.      data entry
d.     user inquiry
7.     The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.
a.      Search
b.     Cut
c.      Document
d.     Undo
8.     In Excel, any set of characters containing a letter , hyphen, or space is considered:
a.      a formula
b.      text
c.      a name
d.     a title
9.     ____________Software allows users to perform calculations on rows and columns of data.
a.      Word processing
b.     Presentation graphics
c.      Database Management Systems
d.     Electronic Spreadsheet
10. A ____________represent approximately one billion memory locations.
a.      Kilobyte
b.     Megabyte
c.      Gigabyte
d.     Terabyte
11.  ____________cells involves creating a single cell by combining two or more selected cells.
a.      Formatting
b.     Merging
c.      Embedding
d.     Splitting
12. The operating system is the most common type of__________software.
a.      Communication
b.     Application
c.      System
d.     word-processing
13. The horizontal and vertical lines on a worksheet are called:
a.      Cells
b.     Sheets
c.      block lines
d.     gridlines
14. The unique signal, generated by a device, that tells the operating system that it is in need of immediate attention is called an:
a.      action.
b.     event.
c.      interrupt.
d.     activity.
15. The operating system controls access to the processor by assigning a(n) ____________ to each task requiring the processor’s attention.
a.      CPU
b.     slice of time
c.      stack
d.     event
16. The blocks of code, included in the operating system, that software applications interact with are known as:
a.     application programming interfaces (APIs).
b.     complimentary metal-oxide conductors (CMOS).
c.      device drivers.
d.     bootstrap loaders.
17. An interrupt handler is a(n):
a.      location in memory that keeps track of recently generated interrupts.
b.     peripheral device.
c.      utility program.
d.     special numeric code that indicates the priority of a request.
18. A spooler is a(n):
a.      location in memory that maintains the contents of a document until it prints out.
b.     print job.
c.      program that coordinates the print jobs that are waiting to print.
d.     message sent from the printer to the operating system when a print job is completed.
19. Virtual memory is typically located:
a.      on a floppy disk.
b.     in the CPU.
c.      in a flash card.
d.     on the hard drive.
20. The purpose of a swap (or page) file is to:
a.      maintain pages of documents that are being spooled to the printer.
b.     hold a program’s data or instructions in virtual memory when it can’t fit in RAM.
c.      prevent thrashing in a multitasking environment.
                d. allow multiple print jobs to print their pages out simultaneously.

No comments: