1. When installing ………, the
user must copy and usually decompress program files from a CDROM or other
medium to the hard disk.
a.
programming software
b. system hardware
c. applications hardware
d. applications software
2. A collection of interrelated
files in a computer is a:
a. file manager
b. field
c. record
3. A ……… computer is a
large and expensive computer capable of simultaneously processing data for
hundreds or thousands of users.
a. Server
b. Mainframe
c. Desktop
d. Tablet
4. What is usually used for
displaying information at public places?
a. Monitors
b. Overhead Projections
c. Monitors and Overhead
Projections
d. Touch Screen Kiosks
5. Collecting personal
information and effectively posing as another individual is known as the crime
of:
a. Spooling
b.
identity theft
c. spoofing
d. hacking
6. The first step in the transaction
processing cycle is:
a. database operations
b. audit
c.
data entry
d. user inquiry
7. The____________button on the quick access
Toolbar allows you to cancel your recent commands or actions.
a. Search
b. Cut
c. Document
d. Undo
8. In Excel, any set of characters containing a
letter , hyphen, or space is considered:
a. a formula
b.
text
c. a name
d. a title
9. ____________Software allows users to perform
calculations on rows and columns of data.
a. Word processing
b. Presentation graphics
c.
Database Management Systems
d. Electronic Spreadsheet
10. A ____________represent approximately one
billion memory locations.
a. Kilobyte
b. Megabyte
c. Gigabyte
d. Terabyte
11. ____________cells involves creating a single
cell by combining two or more selected cells.
a. Formatting
b.
Merging
c. Embedding
d. Splitting
12. The operating system is the most common type of__________software.
a. Communication
b. Application
c.
System
d. word-processing
13. The horizontal and vertical lines on a worksheet
are called:
a. Cells
b. Sheets
c. block lines
d. gridlines
14. The unique signal, generated by a device, that
tells the operating system that it is in need of immediate attention is called
an:
a. action.
b. event.
c. interrupt.
d. activity.
15. The operating system controls access to the
processor by assigning a(n) ____________ to each task requiring the processor’s
attention.
a. CPU
b.
slice of time
c. stack
d. event
16. The blocks of code, included in the operating
system, that software applications interact with are known as:
a.
application programming interfaces (APIs).
b. complimentary metal-oxide conductors (CMOS).
c. device drivers.
d. bootstrap loaders.
17. An interrupt handler is a(n):
a. location in memory that keeps track of recently
generated interrupts.
b. peripheral device.
c. utility program.
d. special
numeric code that indicates the priority of a request.
18. A spooler is a(n):
a. location in memory that maintains the contents
of a document until it prints out.
b. print job.
c. program
that coordinates the print jobs that are waiting to print.
d. message sent from the printer to the operating
system when a print job is completed.
19. Virtual memory is typically located:
a. on a floppy disk.
b. in the CPU.
c. in a flash card.
d. on
the hard drive.
20. The purpose of a swap (or page) file is to:
a. maintain pages of documents that are being
spooled to the printer.
b. hold
a program’s data or instructions in virtual memory when it can’t fit in RAM.
c. prevent thrashing in a multitasking environment.
d. allow multiple print jobs
to print their pages out simultaneously.
No comments:
Post a Comment