Monday 14 December 2020

General Computer Test - 161

 

1. A collection of program that controls how your computer system runs and processes information is called

1) Operating System

2) Computer

3) Office

4) Compiler

5) Interpreter

Ans:-1

2. Computer connected to a LAN (Local Area Network) can

1) run faster

2) go on line

3) share information and /or share peripheral equipment

4) E-mail

5) None

Ans:-3

3. Information travels between components on the mother board through

1) Flash memory

2) CMOS

3) Bays

4) Buses

5) Peripherals

Ans:-3

4. How are data organized in a spreadsheet?

1) Lines & spaces

2) Layers & Planes

3) Height & Width

4) Rows & Columns

5) None

Ans:-4

5. The blinking symbol on the computer screen is called the

1) mouse

2) logo

3) hand

4) palm

5) cursor

Ans:-5

6. When you are selecting a mouse for a particular computer system, what is the most important consideration?

(1) The type of drivers that come with the mouse

(2) The length of the mouse cord

(3) The type of connector the mouse is equipped with

(4) The number of buttons the mouse has

(5) None of these

Ans: (3)

7. How is power supplied to a low-power USB device?

(1) Through a power cable

(2) From an external power supply

(3) Directly from the computers power supply

(4) Through the USB cable

(5) None of these

Ans: (4)

8. All of the following are basic principles of net works, except —

(1) each computer must have a network card

(2) there must be communications media connecting the network hardware devices

(3) there must be at least one connecting device

(4) each computer must have software that supports the movement of information

(5) None of these

Ans: (2)

9. The.............data mining technique derives rules from real-world case examples.

(1) Rule discover

(2) Signal processing

(3) Neural nets

(4) Case-based reasoning

(5) None of these

Ans: (3)

10. ................are used to identify a user who returns to a Website.

(1) Cookies

(2) Plug-ins

(3) Scripts

(4) ASPs

(5) None of these

Ans: (1)

11. Computer uses the .......... number system to store data and perform calculations.

(1) binary

(2) octal

(3) decimal

(4) hexadecimal

(5) None of these

ANSWER: 1

12. A disk's content that is recorded at the time of manufacture and that cannot be changed or erased by the user is-

(1) Memory-only

(2) Write-only

(3) Once-only

(4) Run-only

(5) Read-only

ANSWER: 5

13. Which of the following can be used to select the entire document?

(1) CTRL + A

(2) ALT + F5

(3) SHIFT + A

(4) CTRL + K

(5) CTRL + H

ANSWER: 1

14. .......... are attempts by individuals to obtain confidential information from you by falsifying their identity.

(1) Phishing

(2) Computer viruses

(3) Spyware scams

(4) Viruses

(5) None of the above

ANSWER: 1

15. Port number, port description, and number of ports ordered are examples of

(1) control

(2) output

(3) processing

(4) feedback

(5) input

ANSWER: 5

16. A Web site's main page is called its-

(1) Home Page

(2) Browser Page

(3) Search Page

(4) Bookmark

(5) None of these

ANSWER: 1

17. The simultaneous processing of two or more programs by multiple processors is-

(1) multiprogramming

(2) multitasking

(3) time-sharing

(4) multiprocessing

(5) None of these

ANSWER: 1

18. Codes consisting of lines of varying widths or lengths that are computer-readable are known as-

(1) an ASCII code

(2) a magnetic tape

(3) an OCR scanner

(4) a bar code

(5) None of these

ANSWER: 4

19. To instruct Word to fit the width of a column to the contents of a table automatically, click the..... button and then point to AutoFit Contents.

(1) Fit to Form

(2) Format

(3) Autosize

(4) Contents

(5) AutoFit

ANSWER: 5

20. Why is it unethical to share copyrighted files with your friends?

(1) It is not unethical, because it is legal.

(2) It is unethical because the files are being given for free.

(3) Sharing copyrighted files without permission breaks copyright laws.

(4) It is not unethical because the files are being given for free.

(5) It is not unethical-anyone can access a computer

ANSWER: 3

21. Reusable optical storage will typically have the acronym-

(1) CD

(2) DVD

(3) ROM

(4) RW

(5) ROS

ANSWER: 4

22. The most common type of storage devices are-

(1) persistent

(2) optical

(3) magnetic

(4) flash

(5) steel

ANSWER: 2

23. A device that connects to a network without the use of cables is said to be-

(1) distributed

(2) free

(3) centralized

(4) open source

(5) None of these

ANSWER:5

24. A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a-

(1) hacker

(2) analyst

(3) instant messenger

(4) programmer

(5) spammer

ANSWER: 1

25. To access properties of an object, the mouse technique to use is-

(1) dragging

(2) dropping

(3) right-clicking

(4) shift-clicking

(5) None of these

ANSWER:3

No comments:

Post a Comment