Sunday 13 December 2020

General Computer Test - 147

 

1. To prevent the loss of data during power failures, use a(n):

A. encryption program.

B. surge protector.

C. firewall.

D. UPS.

Answer: D

2. A(n) can shield electronic equipment from power spikes.

A. encryption program

B. surge protector

C. firewall

D. UPS

Answer: B

3. All of these are suggestions for safe computing EXCEPT:

A. don‘t borrow disks from other people.

B. open all e-mail messages but open them slowly.

C. download shareware and freeware with caution.

D. disinfect your system.

Answer: B

4. Freeware encrypts data.

A. encryption

B. firewall software

C. PGP

D. private and public keys

Answer: C

5. is defined as any crime completed through the use of computer technology.

A. Computer forensics

B. Computer crime

C. Hacking

D. Cracking

Answer: B

6. Most computer systems rely solely on for authentication.

A. logins

B. passwords

C. encryption

D. lock and key

Answer: B

7. Creating strong computer security to prevent computer crime usually simultaneously helps protect :

A. privacy rights.

B. personal ethics.

C. the number of cookies downloaded to your personal computer.

D. personal space.

Answer: A

8. Over was spent by businesses and government to repair problems in regard to Y2K.

A. 20 million dollars

B. 100 million dollars

C. 1 billion dollars

D. 100 billion dollars

Answer: D

9. What is a complex system that takes on nearly complete responsibility for a task eliminating the need for people, verification, or decision-making?

A. Autonomous system

B. Missile defense auto-system

C. Smart weapon

D. Independent system

Answer: D

10. Security procedures can:

A. will eliminate all computer security risk.

B. reduce but not eliminate risks.

C. are prohibitively expensive.

D. are inaccessible for the average home user.

Answer: B

6. Which of the following is the largest unit of storage?

A) KB

B) MB

C) TC

D) GB

ANSWER:V

7. A(n) __________ is a program that makes the computer easier to use.

A) application

B) utility

C) network

D) operating system

ANSWER:B

8. The contents of __________ are lost when the computer turns off.

A) storage

B) input

C) output

D) memory

ANSWER: D

9. A __________ is an electronic device that process data, converting it into information.

A) processor

B) computer

C) case

D) stylus

Answers

Answers: B

10. __________ computers represent data as variable points along a continuous spectrum of values.

A) Analog

B) Digital

C) Precise

D) Mainframe

Answers: A

11. The ‘Difference Analyzer’ was created in the early 1920s by __________.

A) Peter Norton

B) Douglas Knuth

C) Vannevar Bush

D) Alan Kay

Answers: C

12. Personal computers can be connected together to form a __________.

A) server

B) supercomputer

C) network

D) enterprise

Answers: C

13. The main component of a desktop PC is the __________ which houses the computer’s critical parts.

A) processor

B) memory

C) keyboard

D) system case

Answers: D

14. To make a notebook act as a desktop model, the notebook can be connected to a __________ which is connected to a monitor and other devices.

A) bay

B) docking station

C) port

D) network

Answers: B

15. Minicomputers are also called __________ computers.

A) midrange

B) laptop

C) handheld

D) smart

Answers:A

16. The most important or powerful computer in a typical network.

A) desktop

B) network client

C) network server

D) network station

Answers:D

17. The __________ is used by the tablet PC to write on the screen.

A) finger

B) mouse

C) digitizer

D) stylus

Answers:C

18. Which of the following is a part of the Central Processing Unit?

a. Printer

 b. Key board

c. Mouse

 d. Arithmetic & Logic unit

18.D             

19. CAD stands for

a. Computer aided design

b. Computer algorithm for design

c. Computer application in design

d. Computer analogue design

19. A

20. Junk e-mail is also called

a. spam

b. spoof

c. sniffer script

 d. spool

20. A

21. Hackers

a. all have the same motive

b. break into other people's computers

c. may legally break into computers as long as they do not do any damage

d. are people who are allergic to computers

21. B

22. What type of computers are client computers (most of the time) in a client-server system?

a. Mainframe

 b. Mini-computer

c. Microcomputer

 d. PDA

22.C

23. A computer cannot 'boot' if it does not have the

a. Compiler

 b. Loader

c. Operating System

 d. Assembler

23.C

24. The amount of vertical space between lines of text in a document is called

a. double-space

 b. line spacing

 c. single space

 d. vertical spacing

24.B

25. Example of non-numeric data is

a. Employee address

 b. Examination score

 c. Bank balance

 d. All of these

25.A

No comments:

Post a Comment