Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

1.

Which of the following is not acceptable as an integer


variable name? INSERTS
22. What does USB stands for?
2. What is a set of instructions that resides on a storage Universal Serial Bus
device, such as hard drive, and can loaded into memory
and executive called? Stored program 23. Which device of computer operation dispenses with
the use of keyboard? Mouse
3. Which of the following does not threaten the
operation of a computer? Firewall 24. The alternate banking Delivery Channels are:
SMS banking
4. What does FTTH mean? Fiber to the Home
25. The basic unit of a worksheet into which you enter
5. Which of the following is a volatile memory? data in Excel is called a cell
RAM
26. In a spreadsheet (EXCEL), the number in cell A2 is
6. What is the term to describe the moving of software set to 2. Then cell B2 is set to A2*4$A$2, where $
from another computer to your own computer? indicates the absolute cell address. This formula is
Downloading copied into cells C2 and D2. What is the value shown in
cell D2? 16
7. Which is the longest key on the keyboard board?
Space bar 27 MS-DOS is a type of? System software

8. What refers to the computer’s use of hard disk storage 28. A KB is how many bytes? 1024
to simulate RAM? Virtual memory
29. A software that a commonly known as firmware.
9. A modem is connected to A telephone line BIOS

10. Which language is used to create macros in MS 30. The brain of any computer system is CPU
Excel? Visual basic
31. A storage system for small amounts of data is
11. Which one is the portion of an instruction cycle Magnetic card
where the instruction is sent from memory to the
instruction register? FETCH 32. Which is most common language used in web
designing? HTML
12. What is BASIC stands for?
Beginner’s All-purpose Symbolic Instruction Code 33. BCD is Binary Coded Decimal

13. In flow cart, what is the symbol used in decision 34. The process of outsmarting the search engine.
making? diamond Search Engine Optimizing

14. A byte is composed of how many bits? 8 35. Process of posting latitude and longitude to pictures
and images. Geotagging
15. Which function key is used to check spellings? F7
36. What does HTTP stand for?
16. Which of the following classes of mass memory Hypertext Transfer Protocol
devices used a laser beam to write and read onto a
specified coated disk? Optical disk memory 37. Which is not a programming language used in web
development? FORTRAN
17. Which of the following are NOT examples of
nonvolatile memory in the computer system? 38. Which is not used in programming applications?
RAMs Oracle

18. Who was the father of internet? 39. After installing a new modem and router to a
Vint Cerf computer, what is the order of turning on?
modem, router, computer
19.The way of stealing valuable information using a
form of internet fraud that uses a replica of a trusted site 40. _______ is an act of sending e-mails or creating web
is called______ pages that are designed to collect an individual’s online
Phishing bank, credit card or other login information?
Phishing
20. Which device among following is used for sending
digital data over a phone line? Modem 41. A method identifying the location of a given data
record by its name. Hashing
21. Which method is used to connect a remote
computer? Dialup 42. What is the shortcut key to reach the end of the
document?
Ctrl + End 62. What is the smallest unit if information handled by a
computer? Bit

63. Which is not a programming language?


43.BIOS stands for LOTUS
Basic Input Output System
64. What is the UPS stand for?
44. Fastest internet connection for home users Uninterruptible Power Supply
nowadays. FTTH
65. The central Processing Unit of computer is a
45. Which of the following computer language is used combination of _____.
for artificial intelligence? PROLOG Arithmetic logic and control unit

46.. Which of the following is spreadsheet software? 66. A technician has installed a new video card and the
Microsoft Excel computer will now only boot into VGA mode. Which of
the following may be the cause of the problem?
47. A computer is self-replicating The incorrect drivers are installed
computer program. Worms
67. When installing the heatsink back into a computer
48. What is the other term for storing data in memory? after replacing a failed processor, which of the following
writing must be done during installation?
Thermal compound must be installed between the
49. What is the common input device? keyboard processor and the heatsink

50. The process of detecting, locating and correcting 68. Which of the following computer program is NOT
logic errors in a program. debugging considered open-source software?
Microsoft Office
51. Absolute reference in a spreadsheet is used by
inserting a ________sign before the column and row. 69. A printed circuit board that has (at least) slots to
This is used for data reference in another cell. connect cards into. Often, they also include a CPU and
dollar memory is called _____.
Motherboard
52. What are the system programs used to translate
directly an assembly language to machine language 70. Which of the following is the basic symbol used a
called? beginning or termination in logic diagram or flowchart?
Assembler Oval symbol

53. MS-WORD is a type of? 71. What form of software can also be called firmware?
application software System BIOS

54. What is CD ROM? 72. In printing your document in the computer, what is
Compact Disk Read Only Memory the default mode?
Portrait
55. which of the following is an instruction that causes
to be bought from memory into an accumulator register? 73. What is the standardized communication technique
LOAD for expressing instructions to a computer?
Programing language
56.The abbreviation for binary digit bit
74. Which of the following are used in designing and
documenting complex processes or programs that help to
57.Which of the following is not a function of computer?
visualize what is going on and thereby help the viewer to
Understanding
understand a process or algorithm? Flowcharts
58. ASCII means
75. A megabyte is exactly ______ bytes.
American Standard Code for Information
1,048,576
Interchange
76. Which of the following is a correct IF statement?
59. WWW stands for
IF (I.GE.5) GO TO 7
World Wide Web

60. ALU stands for 77. Encryption can provide all the following features of
Arithmetic Logic Unit information system security EXCEPT ____.
Privacy
61. Which gate is formed by inverting the output of the
AND gate? 78. What is the web version of facebook wikipedia and
NAND gate other similar interaction group? 2.0
79. Really Simple Syndication (RSS) allows you to do
following except, edit 101. What device is used in converting a computer
digital signal to analog signals for transmission over
80. In excel, which shall you use to make a colomn telephone wires? modem
chart? bar chart
102. What do you call a communication network that
81. It is a form of audio broadcasting on the internet. covers a wide geographical area such as a state or a
podcasting country? wide area network
82.. Which of the following is used to find a particular
webpage? URL
103. What type of communication system uses light
83. VIRUS means, rather than electricity o communicate?
Vital Information Resource Under Siege fiber optic communication

84.. Which of the following is represented by JPEG? 104. FLAG means,


Joint Photographic Experts Group fiber optic link around the globe

85. A circle in the flowchart symbols represent which 105. DSL means,
one of the following? Connector digital subscriber line

86. Nibble is composed of how many bits? 4 106. PDF means, portable document format

87. Which of the following is represented by CMOS? 107. FTP means, a file transfer protocol
Complementary Metal Oxide Semiconductor Logic
108. What refers to the debugging method in which the
88. Which of the following represented by COBOL? program is executed one instruction at a time and the
Common Business Oriented Language register contents can be examined after each step?
trace
89. A rectangular shape symbol in a flow chart
represent, 109. What is the term used to describe the moving of
process software from another computer t your own computer?
downloading
90. PDF mean, portable document format
110. What is that part of computer instruction that
91. DSL means, digital subscriber line defines what type of operation the computer is to
execute on specified data? op code
92. URL means,
uniform resource locator 111. What is the term for a computer or software that
request that request information from another computer
to server? client
93. What refers to the computer’s use of head disk
storage to simulate RAM? Virtual memory
112. What refers to the time with which a disc can find
data being sought? access time
94. What is the term for a deadlock situation that occurs
when a program references a different page for almost
every instructions and there is not even enough memory 113. What is the term for a high speed memory used to
to hold most of the virtual memory? trashing store a smallamount of data temporarily so that the data
can be retrieved quickly?
scratchpad memory
95. What do you call a translated program in machine
language? an object program
114. What is the most common type of digital IC
package? DIP
96. A special file that is used by he operating system to
store the physical location of all the files on a storage
medium such as hard disc or floppy disc is called. 115. What term is used to describe retrieval of data from
file allocation table a memory? reading

97. A digital circuit is known as logic circuit 116. What refers to the manner in which alphanumeric
data and control characters are represented by sequences
of bits? coding
98. Which device puts data on the data bus during a
write operation? CPU
117. Which one refers to a device that amplifies signal
and passes it on? repeater
99. What do you call viruses designed to corrupt
antivirus software? retro virus
118. What do you call a communication network
covering a geographical area the size of a city or
100. What is the term for computer professional who
suburban?
plans an entire computer system?
metropolitan area network (MAN)
system analyst
119. A computer that is smaller and more portable than a
computer notebook which is sometimes called palm top
computer.
personal digital assistant (PDA)

120. What refers to a technique where each user of a


computer takes turn, under be control of the operating
system, using the entire computer main memory for a
length of time?
time sharing

121. A computer virus that infects the macros that are


attached to documents and spreadsheets is called,
micro virus

122. Which of the following devices merges signal?


multiplexer

123. What do you call a collection of fields?


record

124. What is the another term of operating system (OS)?


monitor program

125. Network particle allow two or more pc to


communicate unto network with the same language then
commercially and standard
OSI

126. _____________is a software that allows users to


have a fast and flexible access to information in large
documents, constructing associations among data items
needed.
hypertext

127. A software program designed to enter a computer


system usually a network through security holes and
then replicate itself.
trojan horse

128. An instruction that causes data to be moved to the


memory or a peripheral register.
STORE

129. Which computer port is commonly used in order to


speed up the transfer of the computer data?
Parallel Port

130. What is the standardized communication technique


for expressing instructions to a computer?
Programing language

You might also like