Monday 14 December 2020

General Computer Test - 155

 

1. ............ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously

1) Multitasking

2) Multithreading

3) Multiprocessing

4) Multicoputing

5) None of these

Answers:1

2.The task of performing operations like arithmetic and logical operations is called ......

1) Processing

2) Storing

3) Editing

4) Sorting

5) None of these

Answers:3

3.The ALU and Control Unit jointly known as

1) RAM

2) ROM

3) CPU

4) PC

5) None of these

Answers:2

4. RAM is an example of

1) Secondary memory

2) Primary memory

3) Main memory

4) Both (1) and (2)

5) None of these

Answers:1

5.Magnetic disk is an example of

1) Secondary memory

2) Primary memory

3) Main memory

4) Both (1) and (2)

5) None of these

Answers:1

6. Which one of the following is NOT a computer language /

1) MS-Excel

2) BASIC

3) COBOL

4) C++

5) None of these

Answers:1

7.Each memory cell has a unique number, assigned to it is called as the....... of the cell

1) Address

2) Register

3) Number

4) Path

5) None of these

Answers:1

8.RAM is also called as

1) Read / Write Memory

2) Long Memory

3) Permanent Memory

4) Primary Memory

5) None of these

Answers:2

9. ............ Store data or information temporarily and pass it on as directed by the control unit

1) Address

2) Register

3) Number

4) Memory

5) None of these

Answers:2

10.Select the Odd one

1) Operating system

2) Interpreter

3) Compiler

4) Assembler

5) None of these

Answers:1

11. A ............ is an additional set of commands that the computer displays after you make a selection from the main menu

1) dialog box

2) submenu

3) menu selection

4) All of the above

5) None of these

Answers:1

12. COBOL is an acronym for .............

1) Common Business Oriented Language

2) Computer Business Oriented Language

3) Common Business Operated Language

4) Common Business Organized Language

5) None of these

Answers:1

13.All of the following are examples of real security and privacy risks EXCEPT

1) hackers

2) Spam

3) viruses

4) identity theft

5) None of these

Answers:2

14. Which of the following is NOT one of the four major data processing functions of a computer?

1) gathering data

2) processing data into information

3) analyzing the data or information

4) storing the data or information

5) None of these

Answers:3

15.All of the following are examples of storage devices EXCEPT :

1) hard disk drives

2) printers

3) floppy disk drives

4) CD drives

5) Pen drives

Answers:2

16.The CPU and memory are located on the :

1) expansion board

2) motherboard

3) storage device

4) output device

5) display board

Answers:2

17............... is the science that attempts to produce machines that display the same type of intelligence that humans do

1) Nanoscience

2) Nanotechnology

3) Simulation

4) Artificial intelligence (Al)

5) None of these

Answers:4

18.Servers are computers that provide resources to other computers connected to a :

1) networked

2) mainframe

3) supercomputer

4) client

5) internet

Answers:2

19.When creating a computer program, the ......... designs the structure of the program

1) End user

2) System Analyst

3) Programmer

4) All of the above

5) None of these

Answers:2

20.A computer program that converts an entire program into machine language at one time is called a/ an

1) interpreter

2) simulator

3) characters

4) numbers

5) None of these

Answers:3

21.Computers process data into information by working exclusively with :

1) multimedia

2) words

3) characters

4) numbers

5) None of these

Answers:4

22.The difference between people with access to computers and the Internet and those without this access is known as the :

1) digital divide

2) Internet divide

3) Web divide

4) broadband divide

5) None of these

Answers:1

23. Computers manipulate data in many ways, and this manipulation is called......

1) upgrading

2) processing

3) batching

4) utilizing

5) None of these

Answers:2

24.The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement speciality called:

1) robotics

2) simulation

3) computer forensics

4) animation

5) None of these

Answers:3

25.Where does most data go first with in a computer memory hierarchy ?

1) RAM

2) ROM

3) BIOS

4) CACHE

5) None of these

Answers:1

No comments:

Post a Comment