Professional Documents
Culture Documents
Computing Fundamentalsupgrd PDF
Computing Fundamentalsupgrd PDF
CREATED BY:ANONYMOUS
Hardware are the equipment used to process the data and create useful information.
Select one:
True
False
Select one:
True
False
Select one:
a. Application Software
b. System Software
It is used by the first IBM personal computer as the Operating System
Answer: 1981
a. Application Software
b. System Software
Select one:
True
False
Software is a program that consists of step-by-step instructions that tells the computer how
to do its work.
Select one:
True
False
The First commercially available portable computer by IBM
Answer: 1981
a. Application Software
b. System Software
Information Technology involves the development, maintenance and use of computer systems,
software and networks for the processing and distribution of data.
Select one:
True
False
Hardware are the equipment used to process the data and create useful information.
Select one:
True
False
Select one:
a. object code
b. machine language
c. assembly language
d. source code
Answer: 1937
What type of computers in a client-server system are client computers (most of the time).
Select one:
a. PDA
b. Minicomputer
c. Mainframe
d. Microcomputer
Software is a program that consists of step-by-step instructions that tells the computer how
to do its work.
Select one:
True
False
Graphical User Interface ( GUI) has made computers easier to use because:
Select one:
a. they became smaller.
b. they used a mouse.
c. they used icons instead of commands.
d. they became faster.
Answer: 1981
Information is the result of processing a raw data.
Select one:
True
Select one:
a. CD Drive
b. Joystick
c. NIC Card
d. Modem
Select one:
a. state hypothesis, collect data, test, and conclude
b. input, process, output, store
c. science, technology, engineering, math
d. prophase, metaphase, anaphase, telophase
Which of these governs the interaction process between the user and the operating system?
Select one:
a. User interface
b. Platform
Select one:
a. A name must be given to identify it
b. Don't need a tag
c. All you need is a name if it isn't printed
d. A copy is printed out automatically
Select one:
a. Augusta Adaming
b. Simur Cray
c. Allen Turing
d. Charles Babbage
The First commercially available portable computer by IBM
Answer: 1975
Select one:
True
False
Software is a program that consists of step-by-step instructions that tells the computer
how to do its work.
Select one:
True
False
Select one:
True
False
Answer: 1981
Hardware are the equipment used to process the data and create useful information.
Select one:
True
False
Answer:1937
Answer:1975
Answer:1943
True
False
Select one:
a. System Software
b. Application Software
Select one:
a. Application Software
b. System Software
Answer:1970
Answer:1890
Select one:
a. System Software
b. Application Software
One of the developer of the ENIAC
Answer:1943
Answer:1953
Software and Hardware manufacturer provides procedure manuals for their products
and it can be in printed or electronic copy.
Select one:
True
False
Select one:
a. Application Software
b. System Software
Select one:
True
False
Answer:1800
Select one:
a. Application Software
b. System Software
Software is a program that consists of step-by-step instructions that tells the computer
how to do its work.
Select one:
True
False
Raw Data are the unprocessed facts including text, numbers, images and sounds.
Select one:
True
False
People are the commonly overlook part of the information system. And the reason
why systems are created is to make end-user (people) more productive
Select one:
True
False
Laser Printers are printers that used the same technology as to photocopying machines.
It uses a laser light beam to produce images with excellent letter and graphics quality.
Select one:
True
False
Select one:
a. System Unit Component
b. Input and Output Component
c. Storage Component
Select one:
True
False
Serial Advanced Technology Attachment (SATA) Hard Disk is a standard electronic
interface used between a computer motherboard’s data paths or bus and the
computer’s disk storage devices.
Select one:
True
False
Select one:
a. System Unit Component
b. Input and Output Component
c. Storage Component
Select one:
a. System Unit Component
b. Input and Output Component
c. Storage Component
Read-Only Memory is a memory chip that stores information or data in it and usually
data written to or programmed to a ROM by the manufacturer or the computer engineer.
Select one:
True
False
Select one:
a. System Unit Component
b. Input and Output Component
c. Storage Component
Select one:
True
False
Select one:
True
False
Select one:
a. Product Engineering Software
b. Simulation Software
c. Enterprise Infrastructure Software
d. Media Development Software
This type of software includes a variety of PC utilities for managing and optimizing your
computer systems
Select one:
a. Device Drivers
b. System Utility Software
c. Operating System
d. None of the Choices
It is a category of Application Software that is related to content access software but has
the content and/or features adapted for use in by educators or students.
Select one:
a. Information Worker Software
b. Content Access Software
c. Educational Software
d. Entertainment Software
Select one:
a. Simulation Software
b. Media Development Software
c. Enterprise Infrastructure Software
d. Product Engineering Software
The use of UNIX spread around the country and initially Answer
Bell Labs gave it away free.
Answer60
Million of Windows 8 licenses have been sold through January 2013, a
number which includes both upgrades and sales to OEM for new PCs.
Select one:
a. None of the Choices
b. Operating System
c. Device Drivers
d. System Utility Software
It is a category of Application Software that is used primarily to access a content without
editing but may include software that allows for content editing.
Select one:
a. Entertainment Software
b. Information Worker Software
c. Content Access Software
d. Educational Software
Select one:
a. DHCP Server
b. Firewall
c. DNS Server
Select one:
a. Enterprise Infrastructure Software
b. Media Development Software
c. Product Engineering Software
d. Simulation Software
Answer session
Layer allows session establishment between processes running on
different stations
One of the greatest contribution of ISO in the Computer networking industry because it
is used by company as their references.
Select one:
a. OSI Model
b. Peer-to-Peer Model
c. Client-Server Model
d. TCP/IP Model
Select one:
True
False
It is the way to arrange or configure a network.
Select one:
a. Network Topology
b. Local Area Network
c. TCP/IP Model
d. Local Area Network
It is a category of Application Software that are originally offered for general productivity
and information retrieval including email, calendar, contacts, stock market and weather
information
Select one:
a. Media Development Software
b. Enterprise Infrastructure Software
c. Mobile Applications
d. Product Engineering Software
Select one:
True
False
Laser Printers are printers that used the same technology as to photocopying machines.
It uses a laser light beam to produce images with excellent letter and graphics quality.
Select one:
True
False
Select one:
True
False
This are set of rules that governs a communication or the exchange of information.
Select one:
a. Architecture
b. Protocol
c. Connectivity
d. Standards
Select one:
a. System Unit Component
b. Input and Output Component
c. Storage Component
Read-Only Memory is a memory chip that stores information or data in it and usually
data written to or programmed to a ROM by the manufacturer or the computer engineer.
Select one:
True
False
Select one:
a. Client-Server Model
b. Business-to-Business Model
c. Machine-to-Machine Model
d. Peer-to-Peer Model
Select one:
a. Simulation Software
b. Media Development Software
c. Enterprise Infrastructure Software
d. Product Engineering Software
The use of UNIX spread around the country and initially Answer Bell Labs
gave it away
It is a category of Application Software that is related to content access software but has
the content and/or features adapted for use in by educators or students.
Select one:
a. Information Worker Software
b. Content Access Software
c. Entertainment Software
d. Educational Software
Select one:
a. Operating System
b. Device Drivers
c. None of the Choices
d. System Utility Software
Select one:
True
False
Select one:
a. Content Access Software
b. Information Worker Software
c. Educational Software
d. Entertainment Software
It is a category of Application Software that generates print and electronic media for
other to consume, most often in a commercial or educational settings.
Select one:
a. Product Engineering Software
b. Simulation Software
c. Media Development Software
d. Enterprise Infrastructure Software
Personal Cloud storage is the combination of public and private cloud storage where
some critical data resides in the enterprise’s private cloud while other data is stored and
accessible from a public cloud storage provider.
Select one:
True
False
It is a category of Application Software that allows the user to create and manage
information, usually for individual projects within a department, in contrast to enterprise
management.
Select one:
a. Entertainment Software
b. Information Worker Software
c. Content Access Software
d. Educational Software
Select one:
a. System Unit Component
b. Input and Output Component
c. Storage Component
Blu-ray Disc is the next generation optical disc that can hold high-definition video due to
its high capacity.
Select one:
True
False
Answer Ubuntu
is an open source Debian-based Linux distribution sponsored by
Canonical Ltd.
Select one:
True
False
Select one:
a. System Unit Component
b. Input and Output Component
c. Storage Component
Select one:
a. System Unit Component
b. Input and Output Component
c. Storage Component
Select one:
a. System Unit Component
b. Input and Output Component
c. Storage Component
This type of software includes a variety of PC utilities for managing and optimizing your
computer systems
Select one:
a. Operating System
b. None of the Choices
c. System Utility Software
d. Device Drivers
Select one:
a. Peer-to-Peer Model
b. OSI Model
c. Client-Server Model
d. TCP/IP Model
Select one:
a. System Unit Component
b. Input and Output Component
c. Storage Component
Network Layer controls the operations of the subnet, deciding which physical path
the data takes.
It is a category of Application Software that is used in developing hardware and
software products.
Select one:
a. Media Development Software
b. Enterprise Infrastructure Software
c. Product Engineering Software
d. Simulation Software
It is a type of software that operates and controls a particular type of device that is
attached to a computer.
Select one:
a. None of the Choices
b. Operating System
c. Device Drivers
d. System Utility Software
Processor is the heart and brain of the computer because without this computer cannot
do anything.
Select one:
True
False
It is the fast-growing area of crime because more and more criminals are exploiting the
speed, convenience and anonymity of the internet to commit a diverse range of criminal
activities.
Select one:
a. Disk Cleanup
b. Ethical Hacking
c. Backup
d. Cyber Crime
Firewall is the process of converting a data or information into another form also known as
cipher text.
Select one:
True
False
It is a software application installed in your computer that is spying in your data, meaning
this software gets information from your computer without you knowing it and sends it to
the attacker or the hacker.
Select one:
a. Malware
b. Spyware
It is a virus that replicates itself to infect the whole computer and typically used by attacker
to make a DoS or Denial of Service attack..
Select one:
a. Worms
b. Trojans
c. Rootkits
d. Key Loggers
A special type of software that is used to hide malware, bots and worms. This software
should be installed in the target computer.
Select one:
a. Rootkits
b. Trojans
c. Worms
d. Key Loggers
Honey Pot is a software application that scans your whole computer’s hard drives and
folders for possible malware or virus infections.
Select one:
True
False
It is a special type of application that prevents its user to access the computer system
without paying its creator or subscribing/buying to its creator’s product or services.
Select one:
a. Ransomware
b. Adware
c. Patch
d. Driver
Bootstrap Loader is a part of the BIOS that test the computer hardware and make sure that
no errors exist before loading the operating system.
Select one:
True
False
Copyright is a legal right credited by law of a country that grants the creator of an original
work exclusive rights to its use and distribution, usually for a limited time.
False
It is the term used to describe an individual’s anonymity and how safe they feel in a website
location.
Select one:
a. Software Update
b. Computer Privacy
c. Defragmentation
d. Disk Cleanup
It is a software application that brings potential harm to your computer because it disrupt
your computer operation by installing Trojan, viruses, worms, spyware, adware and
other software that does malicious intent.
Select one:
a. Phishing
b. Malware
c. Spyware
d. Pharming
Network Security is the process of taking physical and software preventative measure to
protect the underlying networking infrastructure from unauthorized access, misuse,
malfunctions, modification, destruction or improper disclosure, thereby creating a secure
platform for computers, users and programs to perform their permitted critical functions
within a secure environment.
Select one:
True
False
Honey Net is the whole set-up of the network infrastructure that has intentional
vulnerabilities to attract hackers or intruders.
Select one:
True
False
A maintenance utility included in Microsoft Windows that is used to free up disk spaces
on the computer hard drive.
Select one:
a. Software Updates
b. Disk Cleanup
c. Backup
d. Defragmentation
Computer Security is very important to learn because it enables the people to carry out
their jobs, education and research, it supports critical business process and lastly it
protects personal and sensitive information.
Select one:
True
False
It is a hacking activity that redirects the website visitor from their legitimate websites into
fraudulent website without them knowing it.
Select one:
a. Malware
b. Pharming
c. Phishing
d. Spyware
It is a type of software application that is used for surveillance wherein attackers make
use of this to record or gather the keystroke made by the users of the infected
computer.
Select one:
a. Key Loggers
b. Rootkits
c. Worms
d. Trojans
It is a software package that automatically renders advertisements in order to generate
revenue for its authors.
Select one:
a. Ransomware
b. Adware
c. Driver
d. Patch
The process of physically organizing the content of the mass storage device into the
smallest number of contiguous regions (fragments).
Select one:
a. Software Updates
b. Backup
c. Defragmentation
It is the process of copying and archiving the computer data so that it may be used to
restore its original data after a data loss event.
Select one:
a. Defragmentation
b. Back-up
c. Disk Cleanup
d. Software Update