Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

1) __________ tags, when placed on an animal, can be used to track in a database all of the

animal's movements:
a) POS
b) RFID
c) PPS
d) GPS
e) None of the above

2) Surgeons can perform delicate operations by manipulating devices through computers


instead of manually. This technology is known as:
a) Robotics
b) Computer forensics
c) Simulation
d) Forecasting
e) None of the above

3) Computers gather data, which means that they allow users to ____________ data
a) present
b) input
c) output
d) store
e) None of the above

4) Computers use the ____________ language to process data


a) processing
b) kilobyte
c) binary
d) representational
e) None of the above

5) The term bit is short for


a) Megabyte
b) Binary language
c) Binary digit
d) Binary number
e) None of the above

6) A string of eight 0s and 1s is called a


a) megabyte
b) byte
c) kilobyte
d) gigabyte
e) None of the above

7) All of the following are examples of input devices EXCEPT


a) Scanner
b) Mouse
c) Keyboard
d) Printer
e) None of the above

8) The CPU and memory are located on the


a) expansion board
b) motherboard
c) storage device
d) output device
e) None of the above

9) Word processing, spreadsheet and photo-editing are examples of


a) application software
b) system software
c) operating system software
d) platform software
e) None of the above

10) System software is the set of programs that enables your computer's hardware devices
and ___________ software to work together
a) management
b) processing
c) utility
d) application
e) None of the above

1) Servers are computers that provide resources to other computers connected to a


a) network
b) mainframe
c) supercomputer
d) client
e) None of the above

2) The difference between people with access to computers and the Internet and those
without this access is known as the
a) digital divide
b) Internet divide
c) Web divide
d) broadband divide
e) None of the above
3) One byte consists of ________ bits
a) 8
b) 2
c) 4
d) 16
e) None of the above

4) The binary language consists of ____________ digit(s).


a) 8
b) 2
c) 1,000
d) 1
e) None of the above

5) All of these are suggestions for safe computing EXCEPT


a) don’t borrow disks from other people
b) open all e-mail messages but open them slowly
c) download shareware and freeware with caution
d) disinfect your system
e) None of the above

6) What is the most common tool used to restrict access to a computer system?
a) User logins
b) Passwords
c) Computer keys
d) Access-control software
e) None of the above

7) First generation computer systems used


a) Transistors
b) Vacuum tubes
c) Magnetic cores
d) Silicon chips
e) None of the above

8) Transistors are associated with which computer system?


a) First generation
b) Fifth generation
c) Second generation
d) Third generation
e) Fourth generation

9) 18. Charles Babbage invented


a) ENIAC
b) Difference Engine
c) Electronic Computer
d) Punched Card
e) None of the above

10) A terabyte comprises of


a) 1024 GB
b) 1024 KB
c) 1024 MB
d) 1024 Bytes
e) None of the above

1) Select the smallest memory size


a) Terabyte
b) Gigabyte
c) Kilobyte
d) Megabyte
e) Petabyte

2) Ctrl, Shift and Alt are called _________________ Keys


a) Modifier
b) Function
c) Alphanumeric
d) Adjustment
e) Hot

3) If a word typed is not in MS Word’s dictionary, a ____________ wavy underline appears


below the word
a) red
b) green
c) blue
d) black
e) None of these

4) ____________Software allows users to perform calculations on rows and columns of


data
a) Word processing
b) Presentation graphics
c) Database Management Systems
d) Electronic Spreadsheet
e) None of these
5) The horizontal and vertical lines on a worksheet are called
a) cells
b) sheets
c) block lines
d) gridlines
e) None of these

6) To delete an incorrect character in a document, ____________ to erase to the right of the


insertion point (cursor)
a) press the left mouse key
b) double-click the right mouse key
c) press the BACKSPACE key
d) press the delete key
e) None of these

7) The operating system does all of the following EXCEPT


a) provide a way for the user to interact with the computer
b) manage the central processing unit (CPU)
c) manage memory and storage
d) enable users to perform a specific task such as document editing
e) None of the above

8) ____________ are lists of commands that appear on the screen


a) GUIs
b) Icons
c) Menus
d) Windows
e) None of the above

9) Verification of a login name and password is known as


a) configuration
b) accessibility
c) authentication
d) logging in
e) None of the above

10) The computer's contents are organised in a hierarchical structure of directories that
include all of the following EXCEPT
a) files
b) folders
c) drives
d) systems
e) None of the above

You might also like