Tuesday, October 13, 2009

Computer Fundamental-VI


1. What type of program controls the various computer parts and allows the user to interact with the computer?
a. Utility software
b. Operating system
c. Word processing software
d. Database program

2. What is the term for unsolicited email?
a. Spam
b. Usenet
c. Backbone
d. Flaming

3. What is backup?
a. Adding more components to your network
b. Protecting data by copying it from the original source to a different destination
c. Filtering old data from the new data
d. Accessing data on tape
4. Network components are connected to the same cable in the _______ topology.
a. Star
b. Ring
c. Bus
d. Mesh

5. Each cell in a Microsoft office excel document is referred to by its cell address, which is the-
a. Cell’s column label
b. Cell’s column label and worksheet tab name
c. Cell’s row label
d. Cell’s row and column labels

6. What is the process of copying software programs from secondary storage media to the hard disk called?
a. Installation
b. Download
c. Storage
d. Upload

7. Office LANs that are spread geographically apart on a large scale can be connected using a corporate-
a. CAN
b. LAN
c. TAN
d. WAN

8. One advantage of dial-up Internet access is-
a. It utilizes broadband technology
b. It utilizes existing telephone service
c. It uses a router for security
d. Modem speeds are very fast

9. The code or a webpage is written using-
a. WinZip
b. Perl
c. HTML
d. URL

10. Two or more computers connected to each other for sharing information form a –
a. Network
b. Router
c. Server
d. Tunnel

11. Which of the following true?
a. Byte is a single digit in a binary number
b. Bit represents a grouping of digital numbers
c. Eight-digit binary number is called a byte
d. Eight-digit binary number is called a bit.

12. A computer checks the ___________ of user names and passwords for a match before granting access.
a. Website
b. Network
c. Backup
d. Database

13. Computers that are portable and convenient for users who travel are known as-
a. Supercomputers
b. Laptops
c. Minicomputers
d. File servers

14. When the pointer is positioned on a ________ it is shaped like a hand.
a. Grammar error
b. Hyperlink
c. Screen tip
d. Formatting error

15. How can the user determine what programs are available on a computer?
a. Checking the hard disk properties
b. Viewing the installed programs during the booting process
c. Checking the operating system for a list of installed programs
d. Checking the existing files saved on the disk

16. Which process checks to ensure the components of the computer are operating and connected properly?
a. Booting
b. Processing
c. Saving
d. Editing

17. The first computer were programmed using-
a. Assembly language
b. Machine language
c. Source code
d. Object code

18. Small application programs that runs on a web page and may ensure form is completed properly or provide animation are known as-
a. Flash
b. Spiders
c. Cookies
d. Applets

19. In a relational database, this is a data structure that organizes the information about a single topic into rows and columns-
a. Table
b. Record
c. Block
d. Tuple

20. This component is required to process data into information and consists of integrated circuits-
a. Hard disk
b. RAM
c. CPU
d. ROM

21. ISP stands for-
a. International spy project
b. Indian social planning
c. Initial service provider
d. Internet Service provider

5 comments:

  1. plz post the answers ....

    ReplyDelete
  2. please give answers for the questions above

    ReplyDelete
  3. please give me the answer of above question

    ReplyDelete
  4. 1. a. Utility software
    2. a. Spam
    3. b. Protecting data by copying it from the original source to a different destination
    4. c. Bus
    5. d. Cell’s row and column labels
    6. b. Download
    7. d. WAN
    8. b. It utilizes existing telephone service
    9.c. HTML
    10.a. Network
    11.c. Eight-digit binary number is called a byte
    12.d. Database
    13.b. Laptops
    14.b. Hyperlink
    15.c. Checking the operating system for a list of installed programs
    16.a. Booting
    17.a. Assembly language
    18.d. Applets
    19.a. Table
    20.d. ROM
    21.d. Internet Service provider

    ReplyDelete
  5. Great articles and great layout. Your blog post deserves all of the positive feedback it’s been getting. xmeye for pc

    ReplyDelete

Open Researcher and Contributor ID (ORCID)

Search Aptipedia