0% found this document useful (0 votes)
122 views

Computer Quest

Cookies are used to identify returning website users. The fax machine transmits digitized images of data, drawings or pictures from one point to another. Optical character recognition (OCR) converts images of typed, handwritten or printed text into machine-encoded text. The resolution of a computer screen is determined by the number of pixels. A plotter is a printer that uses robotics to draw with colored pens on paper. Binary 1010 is part of the binary number system. Email systems provide each user with a mailbox located on a computer server to store and access messages. Electronic commerce (ec-commerce) involves commercial transactions conducted over the internet. Biometric security uses features like fingerprints or eye retina patterns to allow entry into

Uploaded by

Xavier Mundattil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
122 views

Computer Quest

Cookies are used to identify returning website users. The fax machine transmits digitized images of data, drawings or pictures from one point to another. Optical character recognition (OCR) converts images of typed, handwritten or printed text into machine-encoded text. The resolution of a computer screen is determined by the number of pixels. A plotter is a printer that uses robotics to draw with colored pens on paper. Binary 1010 is part of the binary number system. Email systems provide each user with a mailbox located on a computer server to store and access messages. Electronic commerce (ec-commerce) involves commercial transactions conducted over the internet. Biometric security uses features like fingerprints or eye retina patterns to allow entry into

Uploaded by

Xavier Mundattil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

1) __________ are used to identify a user who returns to a Website.

a) Cookies
b) Plug-ins
c) Scripts
d) ASPs
e) None of these

2) The device that is used for transmission of digitised images of data, drawings or
picture from one point to another
a) email
b) Fax
c) Dotmatrix printer
d) Laser printer
e) All the above

3) The term OCR stands for


a) Open Character Recognition
b) Optical Character Recognition
c) Optical Mark Reader
d) Optical Micro Reader
e) None of the above

4) The resolution of the computer screen is determined by which of the following?


a) Colour
b) Memory
c) Pixels
d) Processor speed
e) b and c

5) The printing device that is designed to produce large drawing / image by using
robotics arm to draw with coloured pens on a sheet of paper is called:
a) Laser Printer
b) Plotter
c) Inkjet Printer
d) Scanner
e) Dotmatrix Printer

6) Which of the following is a part of Binary Number System?


a) ABC
b) A1034
c) 160
d) 1010
e) 11401

7) Email systems work on the principle of providing each user with a ____________
located in a computer in which messages are stored and can be accessed:
a) Password
b) Personal ID
c) Mail Box
d) Pass Phrase
e) Mail Server

8) The term ecommerce represents which of the following?


a) Economical Commerce
b) Electrical Commerce
c) Electronic Commerce
d) Elementary Commerce
e) Any of the above

9) Under Computer security, where the entry to the system is allowed with features like
fingerprint or eye-retina pattern is called
a) Physical security
b) Logical security
c) Network security
d) Biometric security
e) None of the above

10) The frauds and other kinds of crimes that happen on the internet network are called:
a) Internet frauds
b) Internet crimes
c) Cyber crimes
d) Electronic frauds
e) None of the above

1) The physical parts of a computer are known as


a) Software
b) Hardware
c) Shareware
d) Fixedware
e) Digitalware

2) Which cannot be treated as Computer Hardware?


a) Motherboard
b) Cards
c) Memory
d) Ports
e) Power Supply

3) The software that consists of all the programs, languages and documents supplied by
the manufacturer of the computers is called
a) Application Software
b) System Software
c) Utility Software
d) a and c
e) b and c

4) Which type of the following software is used by a person for preparation of


documents?
a) Data Processor
b) Word Processor
c) Compiler
d) Multimedia
e) b and c

5) A process known as ____________ is used by large retailers to study trends


a) data mining
b) data selection
c) POS
d) data conversion
e) None of the above

6) MICR stands for


a) Magnetic Ink Code Reader
b) Magnetic link Character Recognition
c) Magnetic Ink Cases Reader
d) Magnetic Ink Character Recognition
e) None of the above

7) A computer consists of
a) Central Processing Unit
b) Memory
c) Input and Output Unit
d) All the above
e) None of the above

8) Properly arranged data is called


a) Field
b) Words
c) Information
d) File
e) None of the above

9) What type of device is Computer Keyboard?


a) Memory
b) Output
c) Storage
d) Input
e) None of the above

10) Which of the following items are examples of storage devices?


a) Floppy / Hard Disks
b) CD-ROMs
c) Tape devices
d) Pen drives
e) All the above

1) A computer checks the _____ of user names and passwords for a match before
granting access.
a) Website
b) Network
c) Backup file
d) Database
e) None of these

2) Office LANs that are spread geographically apart on a large scale can be connected
using a corporate _____
a) CAN
b) LAN
c) RAN
d) WAN
e) TAN

3) The code for a Web page is written using _____


a) A fifth generation language
b) Win Zip
c) Peripherals
d) Hypertext Markup Language
e) URL

4) What is the process of copying software programs from secondary storage media to
the hard disk called?
a) Configuration
b) Programming
c) Storage
d) Upload
e) Installation
5) Small application programs that run on a web page and may ensure a form is
completed properly or provide animation are known as _____
a) Flash
b) Spiders
c) Cookies
d) Applets
e) Sparks

6) The first computers were programmed using _____


a) Assembly language
b) Machine language
c) Source code
d) Object code
e) Spaghetti code

7) Which process checks to ensure the components of the computer and operating are
connected properly?
a) Booting
b) Processing
c) Saving
d) Editing
e) None of these

8) In a relational database, this is a data structure that organizes the information about a
single topic into rows and columns.
a) Block
b) Record
c) Tuple
d) Table
e) Command line interface

9) How can the user determine what programs are available on a computer?
a) Checking the hard disk properties
b) Viewing the installed programs during the booting process
c) Checking the operating system for a list of installed programs.
d) Checking the existing files saved on the disk
e) None of these

10) When we run a program in HTML coding _____ is used as backend and ____ works
as front-end.
a) Notepad - Internet Explorer
b) Notepad - MSN Messenger
c) MS-Word - Internet Explorer
d) Both (a) and (b)
e) None of these
1) When sending an e-mail, the _____ line describes the contents of the message.
a) to
b) subject
c) contents
d) CC
e) None of these

2) The _____ tells the computer how to use its components.


a) Utility
b) Network
c) Operating system
d) Application program
e) None of these

3) Which grouping do you work with when formatting text in word?


a) Tables, paragraphs and indexes
b) Paragraphs, indexes and sections
c) Characters, sections and paragraphs
d) Indexes, characters and tables
e) None of these

4) What is backup?
a) Adding more components to your network
b) Protecting data by copying it from the original source to a different
destination
c) Filtering old data from the new data
d) Accessing data on tape
e) None of these

5) Network components are connected to the same cable in the _____ topology.
a) Star
b) Ring
c) Bus
d) Mesh
e) Mixed

6) This component is required to process data into information and consists of integrated
circuits.
a) Hard disk
b) RAM
c) CPU
d) ROM
e) None of these

7) One advantage of dial-up-internet access is ___


a) It utilises broadband technology
b) It utilises existing telephone service
c) It uses a router for security
d) Modem speeds are very fast
e) None of these

8) What is the term for unsolicited e-mail?


a) News group
b) Use net
c) Backbone
d) Flaming
e) Spam

9) Two or more computers connected to each other of sharing information form a _____
a) Network
b) Router
c) Server
d) Tunnel
e) Pipeline

10) Computers that are portable and convenient for users who travel are known as _____
a) Super computers
b) Laptops
c) Mini computers
d) File servers
e) None of these

1) Storage that retains its data after the power is tuned off is referred to as
a) volatile storage
b) non-volatile storage
c) sequential storage
d) direct storage
e) None of these

2) _____ is the science that attempts to produce machines that display the same type of
intelligence that humans do.
a) Nano science
b) Nanotechnology
c) Simulation
d) Artificial intelligence (AI)
e) None of these

3) Changing an existing document is called _____ the document.


a) Creating
b) Editing
c) Modifying
d) Adjusting
e) None of these

4) Computers use the _____ number system to store data and perform calculations.
a) Decimal
b) Hexadecimal
c) Octal
d) Binary
e) None of these

5) Which of the following is the largest unit of storage?


a) GB
b) KB
c) MB
d) TB
e) None of these

6) The _____ key will launch the start buttons.


a) Esc
b) Shift
c) Windows
d) Shortcut
e) None of these

7) _____is the process of finding errors in software code.


a) Compiling
b) Testing
c) Running
d) Debugging
e) None of these

8) To move to the beginning of a line of text, press the _____ key.


a) Home
b) A
c) Page-up
d) Enter
e) None of these

9) Virtual memory is_____


a) Memory on the hard disk that the CPU uses as an extended RAM
b) RAM
c) Only necessary if you do not have any RAM in your computer
d) A back up device for floppy disks
e) None of these

10) A _____ contains specific rules and words that express the logical steps of an
algorithm.
a) Syntax
b) Programming structure
c) Programming language
d) Logic chart
e) None of these

1) One megabyte equals approximately?


a) 1,000 bits
b) 1,000 bytes
c) million bytes
d) million bits
e) 2,000 bytes

2) Data going into the computer is called?


a) Output
b) Algorithm
c) Input
d) Calculations
e) Flowchart

3) Which of the following refers to the memory in your computer?


a) RAM
b) DSL
c) USB
d) LAN
e) CPU

4) When you are working on a document on PC, where is the document temporarily
stored?
a) RAM
b) ROM
c) The CPU
d) Flash memory
e) The CD-Rom

5) Information travels between components on the mother board through-


a) Flash memory
b) CMOS
c) Bays
d) Buses
e) Peripherals

6) How are data organised in a spreadsheet?


a) Lines and spaces
b) Layers and planes
c) Height and width
d) Rows and columns
e) None of these

7) Which of the following is true?


a) Byte is a single digit in a binary number
b) Bit represents a grouping of digital numbers
c) Eight-digit binary number is called a byte
d) Eight-digit binary number is called a bit
e) None of these

8) Transformation of input into output is performed by?


a) Peripherals
b) Memory
c) Storage
d) The Input-Output unit
e) The CPU

9) How many options does a binary choice offer?


a) None
b) One
c) Two
d) It depends on the amount of memory in the computer
e) It depends on the speed of the computer's processor

10) .....is collection of web pages and ......is the very first page that we see on opening of a
web-site
a) Home-page, Web-page
b) Web-site, Home-page
c) Web-page, Home-page
d) Web-page, Web-site
e) None of these

You might also like