Thursday, October 8

Computer Fundamental-IV


1. The component is required to process data into information and consists of integrated circuits-
a. Hard disk
b. RAM
c. ROM
d. CPU


2. One advantage of dial-up Internet access is-
a. It utilizes broadband technology
b. It utilizes existing telephone service
c. It uses a router for security
d. Modem speeds are very fast


3. What is back-up?
a. Adding more components to your network
b. Protecting data by copying it from the original source to a different destination.
c. Filtering old data from the new data
d. Accessing data on tape


4. Network components are connected to the same cable in the ___________ topology.
a. Star
b. Ring
c. Bus
d. Mesh


5. Two or more computers connected to each other for sharing information form a ____
a. Network
b. Router
c. Server
d. Tunnel


6. A computer checks the _________ of user names and passwords for a match before granting access.
a. Website
b. Network
c. Backup file
d. Database


7. computers that are portable and convenient for users who travel are known as-
a. supercomputers
b. laptops
c. minicomputers
d. file server


8. What is the term for unsolicited e-mail?
a. Spam
b. Usenet
c. Backbone
d. Flaming


9. What type of program controls the various computers parts and allows the user to interact with the computer?
a. Utility software
b. Operating system
c. Word processing software
d. Database program


10. Each cell in a Microsoft Office Excel document is referred to by its cell address, which is the-
a. Cell’s column label
b. Cell’s column label and worksheet tab name
c. Cell’s row label
d. Cell’s row and column labels


11. Which of the following is true?
a. Byte is a single digit in a binary number
b. Bit represents a grouping of digital numbers
c. Eight-digit binary number is called a byte
d. Eight-digit number is called a bit


12. Office LANs that are spread geographically apart on a large scale can be connected using a corporate-
a. CAN
b. LAN
c. DAN
d. WAN


13. What is the process of copying software programs from secondary storage media to the hard disk called?
a. Configuration
b. Download
c. Storage
d. Installation


14. The code for a web page is written using-
a. A fifth generation language
b. WinZip
c. Perl
d. HTML


15. Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as-
a. Flash
b. Spiders
c. Cookies
d. Applets


16. Ina relational database, this is a data structure that organizes the information about a single topic into rows and columns-
a. Block
b. Record
c. Tuple
d. Table


17. The first computers were programmed using-
a. Object code
b. Assembly language
c. Machine language
d. Source code


18. When the pointer is positioned on a ___________, is shaped lake a hand
a. Grammar error
b. Hyperlink
c. Screen tip
d. Spelling error


19. Which process checks to ensure the components of the computer are operating and connected properly?
a. Booting
b. Processing
c. Saving
d. Editing


20. How can the user determine what programs are available on a computer?
a. Checking the hard disk properties
b. Viewing the installed programs during the booting process
c. Checking the operating system for a list of installed programs
d. Checking the existing files saved on the disk
________________________________________________________________

No comments: