Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Computer awareness paper

1. A person who used his or expertise to gain access to other peoples computers to get information
illegally or do damage is
a. hacker
b. analyst
c. instant messenger
d. programmer
2. A device that connects to a network without the use of cables is said to be__________
a. distributed
b. free
c. centralized
d. none of these
3.To chance selected text to all capital letters, click the change case button, and then click______
a. UPPERCASE
b .UPPER ALL
c. CAPS LOCK
d. Lock upper
4. Reusable optical storage will typically have the acronym
a. CD
b. DVD
c. ROM
d. RW
5. the most common type of storage devices are___________
a. persistence
b. optical
c. magnetic
d. flash
6. Codes consisting of lines of varying widths or lengths that are computer readable are known
as_______
a. an ASCII Code
b. a magnetic type
c. an OCR scanner
d. a bar code
7.A websites main page is called its__________
a. home page
b. browser page
c. search page
d. a bar code
8.Part number, part description ,and number of parts ordered are examples of_______
a. control
b. processing
c. bookmark
d. output
9. To access properties of an object, the mouse technique to use is __________
a. dragging
b. dropping
c. right-clicking
d. shift-clicking
10. Computers used the__________ number systems to store data and perform calculations
a. binary
b. octal
c. decimal
d. hexadecimal

You might also like